content
stringlengths
1
15.9M
\section{Introduction} Modification and external control of the electronic structure of two-dimensional materials via the proximity effect is of great experimental and technological interest for designing systems with novel magnetic and spin properties~\cite{Han2014,Sierra2021,RevModPhys.92.021003}. Of particular importance is the introduction of spin interactions in graphene, whose Dirac electrons exhibit only weak spin-orbit coupling. Placing graphene in proximity to transition metal dichalcogenides (TMDCs) is a viable route, resulting in spin-orbit couplings on the meV scale~\cite{Gmitra2015,Wang2015, Gmitra2016, Gani2020}, also tunable by twisting \cite{Li2019,David2019,naimer2021twistangle,pezo2021manipulation}. While the proximity spin-orbit coupling is in general sublattice dependent \cite{Frank2016, Kochan2017}, TMDC substrates induce valley-Zeeman and Rashba couplings, providing uniform pseudospin spin-orbit fields, opposite at $K$ and $K'$~\cite{Gmitra2015, Wang2015,PhysRevB.94.241106}. Similar proximity spin-orbit physics and the appearance of the valley-Zeeman coupling has been predicted for graphene on Bi$_2$Se$_3$-family of topological insulators \cite{Song2018,PhysRevB.100.165141}, but also for bilayer Jacutingaite\cite{Rademaker2021}. There already exists a significant body of experimental evidence demonstrating the presence of valley-Zeeman coupling in proximitized graphene~\cite{Garcia2018,Island2019,Karpiak2019,Tang2020,Hoque2021,Ghiasi2017,Benitez2018,Ghiasi2019,Safeer2019,Herling2020,Bentez2020,Avsar2014,Banszerus2020,Khokhriakov2020, Wakamura2019, Wakamura2020,amann2021gatetunable,2021boosting,InglaAyns2021}. In proximitized graphene with valley-Zeeman coupling, two groups of edge states---pseudohelical (intervelley) and intravalley states---form within the spin-orbit gap. At each edge there are those two pairs of states, conforming to the trivial topology of the system \cite{Frank2018}. However, for ribbons on the nanoscale, with the widths less than a micron, the intravalley states are gapped out by the confinement-induced hybridization and only the lone pseudohelical pair remains at each edge. This pair is fully protected against backscattering by time-reversal defects, similarly to helical states of the spin quantum Hall effect \cite{Kane2005}. But, unlike helical states, the pseudohelical states in a flake change the helicity from one sigzag edge to the other, flipping the spin along the armchair edge at which perfect tunneling of the states occurs. In large flakes, where also intravalley states propagate, the backscattering protection by time-reversal symmetry is lifted, as the pseudohelical states reflect at armchair edges to intravalley states at the same edge. Is there a way to reinstate the lone pseudopotential pair also in larger ribbons and flakes, where there are nominally intravelley states as well. We show in this paper that placing proximitized graphene in a perpendicular magnetic field achieves exactly that. Magnetic effects are typicall twofold: Zeeman-like, providing spin imbalance, and orbital effects, leading to Landau quantization. Zeeman effects in proximitized graphene were investigated earlier, demonstrating the appearance of the quantum anomalous Hall effect \cite{Hogl2020} and chiral Majorana modes \cite{Hogl2020a}. Magnetic orbital response of helical edge states to magnetic fields was studied in previous works \cite{Luo2020,Frank2020,Yang2016,Li2018,DeMartino2011,Lado2015,Delplace2010,Gani2020}. Rather surprisingly, the quantum spin Hall edge states, which are generated by uniform intrinsic (Kane-Mele) spin-orbit coupling, are not necessarily destroyed by the cyclotron effect~\cite{Shevtsov2012, Goldman2012}, which can theoretically be used to switch between the quantum spin Hall and quantum Hall regimes by gating. However, there can be a crossover between topological and trivial regimes in the presence of a perpendicular magnetic field ~\cite{Scharf2015,Bottcher2019}. In this paper we study theoretically the response of the pseudohelical and intravalley edge states in proximitized graphene (using realistic paramaters for a graphene/WSe2 heterostucture) to an external perpendicular magnetic field, as depicted in Fig. 1.(a). We employ a tight-binding model supplemented with Peierl's substitution to study the electronic structure of graphene zigzag nanoribbons and finite flakes. The Landau levels calculated by the tight-binding approach are in excellent agreement with the bulk Landau level predictions \cite{Frank2020}. The pairs of pseudohelical edge states, see Fig.\ref{fig:schema}(b), are preserved even if time-reversal symmetry is broken by the magnetic field. This is similar to what happens in the quantum spin Hall effect, where helical edge states are preserved in an applied field~\cite{Shevtsov2012}. However, the intravalley states (originating from Rashba SOC~\cite{Frank2018}) disappear once the magnetic field increases beyond some critical value $B_c$. At $B > B_c$, intravalley edge states merge with the conduction and valence bands, opening an intravalley gap. Inside the gap one finds a lone pair of pseudohelical states, at each zigzag edge. Effectively, the magnetic field gaps out the weakly localized intravalley states, mimicking finite-size confinement. \cite{Frank2018}. The paper is organized as follows. In Sec. II. we introduce a tight-binding model Hamiltonian for graphene with proximity induced spin-orbit coupling, and present a scaling method to obtain the energy spectrum for microscopic structures. In Sec. III. we analyze the electronic structures of zigzag ribbons and finite flakes states in the presence of an external perpendicular magnetic field. We also discuss the crossover at which the intravalley edges states are gapped, referring to bulk Landau level results. Finally, in Sec. IV., we briefly summarize the main results. \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{1.pdf} \end{center} \caption{(a) Sketch of a graphene ribbon or flake on a substrate such as a TMDC which yields valley-Zeeman spin-orbit and Rashba couplings. A perpendicular magnetic field is applied to affect the orbital states of the Dirac electrons. (b) Two types of edge states near the Fermi level in graphene with valley-Zeeman spin-orbit interaction: (1-4) spin-polarized pseudohelical (intervalley) states, and (5) intravalley states. (c) Lone pairs of pseudohelical states above the crossover magnetic field.} \label{fig:schema} \end{figure} \section{Model and Methods} We consider Dirac electrons in proximitized graphene, with sizeable (on the meV scale) spin-orbit interactions of the valley-Zeeman and Rashba types. Such interactions are induced by the proximity effects with TMDCs or TIs, as discussed above. To investigate finite systems, zigzag ribbons and flakes, we implement the following tight-binding Hamiltonian, \cite{Gmitra2016,Kochan2017,Gmitra2013} \begin{align} \hat{\mathcal{H}}&=\sum_{\langle i,j \rangle}t c_{is}^\dagger c_{js}+\sum_{i}\Delta\xi_i c_{is}^\dagger c_{is} \nonumber \\ &+\frac{2i}{3}\sum_{\langle i,j \rangle}\lambda_R c_{is}^\dagger c_{js^\prime}\left[\left(\hat{\mathbf{s}}\times \mathbf{d}_{ij}\right)_{z}\right]_{ss^\prime} \nonumber \\ &+\frac{i}{3}\sum_{\langle\langle i,j \rangle\rangle}\frac{\lambda_{I}^{i}}{\sqrt{3}}c_{is}^\dagger c_{js} \left[\nu_{ij}\hat{\mathbf{s}}_z\right]~, \label{eq:tb-ham} \end{align} where $c_{is}^\dagger$ and $c_{is}$ are the creation and annihilation operators for site $i$ and spin $s$, $\langle i,j \rangle$ denotes the nearest, $\langle\langle i,j \rangle\rangle$ the next nearest neighbors. The Hamiltonian of Eq.~\eqref{eq:tb-ham} has four terms: First, the nearest-neighbour hopping with amplitude $t$ occurs between sites $i$ and $j$ with spin preservation. Second, the proximity effects induces the staggered potential $\Delta$ with signs $\xi_i$ equal to $+1$ or $-1$ for A and B sublattices, respectively. The third term describes Rashba spin-orbit coupling \cite{Rashba2009,Tsaran2014} with amplitude $\lambda_{R}$, which breaks horizontal reflection symmetry and mixes states of opposite spins and sublattices. Symbols $\mathbf{d}_{ij}$ and $\hat{\mathbf{s}}$ denote the unit vector from site $j$ to site $i$ and the vector of spin Pauli matrices, respectively. Finally, the fourth term models the valley-Zeeman spin-orbit coupling \cite{Gmitra2015, Wang2015, Yang2016}. This term preserves the spin, but the intra-sublattice hopping is different for clockwise ($\nu_{ij} = -1$) and counterclockwise ($\nu_{ij} = +1$) paths along a hexagonal ring from site $j$ to $i$. The intrinsic spin-orbit coupling $\lambda_{I}^{i}$ is written here in a more general way, allowing for different strengths at $A$ and $B$ sublattices. The orbital effects of a perpendicular magnetic field are modelled by Peierl's phase \cite{Peierls1933,PhysRev.115.1460}. We do not consider the Zeeman effects of the field, as they are negligible for the fields we consider, on the millitesla scale. In the following, when we present numerical results, we use parameters from first-principles calculations for graphene/WSe$_2$, see Ref. \cite{Gmitra2016}: the nearest-neighbor hopping $t=-2.507$~eV, staggered potential $\Delta=0.56$~meV, Rashba SOC parameter $\lambda_R=0.54$~meV, and intrinsic SOC parameters $\lambda_I^A=1.22$~meV and $\lambda_I^B=-1.16$~meV. We wish to investigate micron-size systems, in which magnetic orbital effects are not quenched, and in which the intravalley edge states are not gapped out. Since the spin-orbit parameters are on the meV scales, the considered systems need to be large enough to resolve such energies in the subband structure. To reduce computational efforts and avoid dealing with intractably large structures, we employ a scaling trick ~\cite{Liu2015}, which allows us to consider smaller structures but with rescaled parameters. Finite-size level spacings in graphene ribbons are on the order of $\Delta E\approx\pi\hbar v_F / w$~\cite{Lin2008}, which can be reduced by changing the Fermi velocity $v_F\rightarrow v_F/r= \sqrt{3}a t /2\hbar r$, by rescaling the nearest-neighbor hopping $t$. Such a rescaling affects the interpretation of the lattice constant $a$, which is mapped to $ra$, in order to keep the energy spectrum invariant. The cyclotron energy in graphene is given by $\hbar\omega_c = \sqrt{2e\hbar B} v_F$. To preserve this energy scale, we rescale the external perpendicular magnetic field by $B\rightarrow Br^2$. The rescaling does not influence the underlying physics as long as we consider low-energy states for which the linear dispersion holds\cite{Liu2015}. The scaling trick permits us to keep the cyclotron energy scale at the level of SOC parameters, while decreasing the computational burden to simulate large-scale systems. The main criterion for choosing the rescaling parameter is $r\ll3t\pi/E_{\text{max}}$, where $E_{\text{max}}$ is the maximal energy of interest~\cite{Liu2015}. We wish to resolve energies up to $E_{\text{max}}=2$ meV, which safely covers the spin-orbit gap region in which the edge states form, the scaling parameter $r\ll3t\pi/E_{\text{max}}$=11809. In our work we we choose $r=400$. With that, the finite-size effects are decreased to $0.05$~meV for a width of 400 unit cells. The magnetic field strength equivalent to this energy scale is about $10^{-5}$~T, well below the value for the crossover magnetic field (see the next chapter) for gap closing. To calculate the band structure of zigzag nanoribbons and the electronic states of a graphene flake with proximity induced spin-orbit interaction, we implement the above model using the Python-based numerical package KWANT~\cite{Groth2014}. \section{Results} \subsection{Bulk results} The starting point for analyzing the behavior of edge states of proximitized graphene in the presence of an external perpendicular magnetic field is the study of Landau levels in the bulk system. A detailed derivation of the Hamiltonian of the Landau levels for bulk proximitized graphene is presented in Ref.~\cite{Frank2020}. Graphene with spin-orbit coupling in magnetic fields was studied from different perspectives by other groups as well~\cite{Cysne2018, DeMartino2011}. We construct the Landau fan diagram, shown in Fig.~\ref{fig:bulk_landau}. Comparing to the Kane-Mele model \cite{Kane2005,Shevtsov2012} for graphene, a staggered intrinsic SOC does not preserve the gap in the presence of an external magnetic field. The bulk band gap mainly forms between nonzero Landau levels from the $K$ and $K^{\prime}$ valley, which can be shifted by the magnetic field. On the other hand, in the Kane-Mele model, a bulk band gap forms between the zero Landau levels, which is stable under an external magnetic field. In the systems with valley-Zeeman spin-orbit coupling, the bulk band gap closes and reopens at a crossover value of the external magnetic field equal to \cite{Frank2020} \begin{align} B_{c}= \frac{ \left[\lambda_I^A-\lambda_I^B-2\Delta\right] \left[\left(\Delta+\lambda_I^A\right)\left(\Delta-\lambda_I^B\right)+4\lambda_R^2\right] } { 2e\hbar v_F^2\left[2\Delta+\lambda_I^A-\lambda_I^B\right] }. \end{align} For the given parameters set from Ref.~\cite{Gmitra2015,Frank2018} of our Hamiltonian\eqref{eq:tb-ham}, the crossover value of the magnetic field will be equal to 1.942~mT for the graphene/WSe$_2$ heterostructure. This crossover point distinguishes two regimes, below the crossover field, a bulk band gap formed by the different nonzero Landau levels, while above the crossover field bounded by the first Landau levels. \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{2.png} \end{center} \label{fig:bulk_landau} \caption{Calculated evolution of the bulk Landau levels in graphene/WSe$_2$ with increasing of the external magnetic field. The crossover magnetic field is indicated as a dashed line. The color code corresponds to the $s_z$ expectation value in the left column and $\kappa_z$ (valley) expectation value in the right column, see Ref.~\onlinecite{Frank2020}.} \end{figure} \subsection{Zigzag ribbon results} \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{3.png} \end{center} \label{fig:band} \caption{Calculated band structures of a proximitized graphene zigzag ribbon in the presence of a perpendicular magnetic field B=0~mT (a), B=1.5~mT, and B=3~mT. The color code denotes spin polarization in the left column and edge polarization in the right column. Thin dashed lines indicate bulk Landau levels.} \end{figure} The band structure of a zigzag graphene ribbon is calculated for different values of the external perpendicular magnetic field. We consider zigzag ribbons with the width of 4.1~$\mu$m. With the scaling factor $r=400$, the simulation size of the ribbon is reduced to 72 carbon-carbon bonds. The results for the zigzag ribbon band structure for magnetic fields of 0~mT, 1.5~mT, and 3.0~mT are shown in Fig.~\ref{fig:band}. At zero magnetic field, we can distinguish two types of edge states: spin unpolarized intravalley states and pseudohelical intervalley states with strong spin polarization~\cite{Frank2018, Gmitra2016}. The intravalley edge states are more delocalized towards the bulk than intervalley states, due to their spectral proximity to the bulk states. To compare with the bulk~\cite{Frank2020}, we also plot bulk Landau levels at $K$ and $K^{\prime}$. For small magnetic fields (1.5~mT), the Landau levels start to form and bands at the $K$ and $K^{\prime}$ valleys lose their dispersion. In general, the Landau levels are rather bulk-like, indicated by the absence of edge polarization. They coincide with the analytic prediction\cite{Frank2020}. At the borders of the bulk continuum, edge states form, which are responsible for the quantum Hall effect in graphene. With the increase of the external magnetic field, intervalley edge states shift in $k$-space: states with the same spin polarization shift in the same direction, while states with the opposite spin polarization shift in the opposite direction. Generally, intervalley edge states are not much affected by the perpendicular magnetic field. However, the intravalley states get strongly modified, merging with the bulk bands; this happens already at magnetic fields less than 1.5~mT. This is similar to what is predicted for 2D topological insulators in a magnetic field~\cite{Bottcher2019}. The bulk gap is openning at the crossover magnetic field $B_c \approx 1.942$~mT. As a consequence, the intravalley edge states disappear, leaving behind the lone pairs of pseudohelical edge states, ona pair at each zigzag edge. \subsection{Flake results} To analyze the nature of the edge states, we have calculated low energy states of differently sized proximitized graphene flakes. At zero magnetic field the pseudohelical states which form at the zigzag edges reflect back to the intravalley states, which generates standing waves spread out through the flake. In nanoribbons, with sizes less than a micron, the intravalley states are gapped out and the pseudohelical states tunnel through the armchair edges, allowing them to fully propagate through the flake edges. As we showed above, for $B > B_c$ the intravalley states in wide ribbons are gapped out as well. Can then the pseudohelical states follow the same scenario as in nanoribbons? The answer is no. While at zero magnetic field the pseudohelical states cannot reflect back at the armchair edges due to time-reversal symmetry (the pseudohelical pair is formed by time-reversal partners), in the presence of a magnetic field such a reflection is possible. In fact, as we demonstrate below, this reflection is perfect, leading to the localization of the pseudohelical pair at zigzag edges and formation of standing waves that carry pure spin current. The qualitative difference between propagating pseudohelical edge states and pure spin current non-propagating states is depicted in Fig.\ref{fig:states}. \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{2_.pdf} \end{center} \caption{(a) Schematic representation of pseudohelical states in a proximitized graphene flake. The states form at zigzag edges, propagate towards the armchair edges, along which they tunnel and undergo spin flip due to Rashba coupling. The colors represent the spin which is perpendicular to the sheet. At zero magnetic field the tunneling along the armchair edges is perfect. (b) In large flakes, if $B > B_c$, the counterpropagating pseudohelical edge states are perfectly reflected at the armchair edges. The pair then forms a standing, nonpropagating wave, which carries net spin current, but no charge current. The resulting state is spin unpolarized. See also Fig.~\ref{fig:schema}(c).} \label{fig:states} \end{figure} While the formation of the pseudohelical states can be explained by perfect tunnelling of the intervalley states across the armchair edge, the formation of the pure spin current states corresponds to perfect reflection off the armchair edge. Such a difference in the mechanisms of the formation of states is possible due to the exponential decay of the probability of tunnelling between zigzag edges as the distance between them increases. It is not possible to continuously go from one limit to another due to the periodic subband gap opening and closing~\cite{Frank2018}. However, we can clearly distinguish pseudohelical states for a narrow graphene flake and pure spin current states for a wide graphene flake, because these states represent two different physical limits. We estimated the distance between zigzag edges at which perfect tunneling still occurs as the typical spin-flip length of the Rashba spin-orbit interaction \begin{align} l_{R}\approx3a\frac{t}{\lambda_R}. \end{align} For our parameters (graphene/WSe$_2$) $l_{R}$ is about 3.4~$\mu$m, which is less than the flake width we use in this work. Pseudohelical states and pure spin current states are formed by combinations of intervalley states. They both consist of states (1) and (2) at the left edge and of (3) and (4) at the right edge, see Fig.\ref{fig:states}(c). Both types of states, pseudohelical states and pure spin current states, are formed using the same edge states and the only difference is the mechanism of their combination. We have specifically investigated pure spin current (i.e., spin current without any charge current) states for a flake whose size is equal to 16.3584~$\mu$m $\times$ 4.0896~$\mu$m, taking into account the scaling factor $r=400$, which corresponds to an auxiliary 288 $\times$ 72 carbon-carbon bond sized flake. The width of this flake is greater than the Rashba spin-flip length, so the perfect reflection mechanism is dominant in this case. We trace the evolution of the highest occupied state with incremental steps in the external perpendicular magnetic field. The spin and charge currents and densities through a cut in the middle of the flake, orthogonal to the armchair direction are shown in Fig.\ref{fig:cut}. The data indicates that with the increase of the magnetic field, the charge current and spin densities disappear and complete edge localization of the state occurs. Also, the spatial spin current oscillations vanish and the highest occupied states become pure spin current states with negligible spin density. A similar situation occurs with the lowest unoccupied state. The evolution of the spin currents of the highest occupied and the lowest unoccupied states are shown in Fig.\ref{fig:spin}. Both states exhibit similar behavior of their spin currents, located on different zigzag edges of the flake. Pure spin currents arise in the presence of an external magnetic above the crossover value $B_c$. The evolution of the charge density is similar to the previous case, depicted in Fig.~\ref{fig:charge}. With an external magnetic field below the crossover value, the states closest to the Fermi level are a mixture of strongly localized intervalley states and weakly localized intravalley states; they form a standing wave at the zigzag boundary, as tunneling through the armchair edge is forbidden (this can explicitly be seen in gapped ribbon armchair band structures~\cite{Frank2018}). \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{4.pdf} \end{center} \caption{Calculated spin (a) and charge (b) currents of the highest occupied flake states (see text for flake parameters) through the cut in the middle of the flake and in the presence of a perpendicular magnetic field. Spin (c) and charge (d) densities of the highest occupied state at the cut in the middle of the flake and in the presence of a magnetic field.} \label{fig:cut} \end{figure} \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{5_new.png} \end{center} \caption{Evolution of the spin current of the highest occupied flake state in the left column and of the lowest unoccupied flake state in the right column.} \label{fig:spin} \end{figure} \begin{figure} \begin{center} \includegraphics[width=.5\textwidth]{6_new.png} \end{center} \caption{Evolution of the charge density of the highest occupied flake state in the left column and of the lowest unoccupied flake state in the right column.} \label{fig:charge} \end{figure} However, with a magnetic field above the crossover value $B_c$, we find states with pronounced pure spin current, localized strongly at a single edge. From the zigzag ribbon band-structure analysis, we can conclude that the pure spin current states correspond to the combination of the intervalley edge states on the same edge, which is stable under the application of a magnetic field. Similar to the pseudohelical states, pure spin current states are stable against scattering on defects at the zigzag edge of the graphene flake, see Appendix A. \section{Conclusion} We investigated the behavior of the electronic structure of proximitized graphene ribbons and flakes of microscopic sized in the presence of a perpendicular magnetic field. We have chosen graphene/WSe$_2$ heterostructure for the numerical parameters, as in such structures pseudohelical states were predicted to exist. We found that under the influence of a magnetic field, the pseudohelical (intervalley) edge states are preserved, while the intravalley edge states disappear at the crossover value of the magnetic field $B_c \approx 1.9~mT$. This value corresponds to the closing/reopening of the gap between the bulk Landau levels. We also studied a finite flake of micron sizes, finding that instead of perfect tunneling of the pseudohelical states at the armchair edges at zero magnetic field, for $B > B_c$ the states perfectly reflect to their counterpropagating partners and form non-propagating, spin unpolarized pure spin current states which are stable under scattering off zigzag edge defects. Pure spin current states should be observable in wide flakes of at least a few microns (for graphene/TMDC heterostructures) already at rather weak (a few millitesla) fields. Lone pseudohelical pairs at a given edge should be observable in wide ribbons for $B > B_c$ of in nanosized flakes where perfect tunneling through armchair edges is allowed and intravalley states are gapped even at zero magnetic field. \begin{acknowledgments} We would like to thank D. Kochan for useful discussions. This work was supported by the DFG SFB Grant No. 1277 (A09 and B07), DFG SPP 2244 (Project-ID 443416183), the International Doctorate Program Topological Insulators of the Elite Network of Bavaria. The authors gratefully acknowledge the Gauss Centre for Supercomputing e.V. (www.gauss-centre.eu) for providing computing time on the GCS Supercomputer SuperMUC at Leibniz Supercomputing Centre (LRZ, www.lrz.de). \end{acknowledgments}
\section{Introduction} \label{sec:intro} With the advent of new wireless communications systems and novel radar technologies, electromagnetic spectrum has become a contested resource \cite{mishra2019toward}. This has led to the development of various system engineering and signal processing approaches for an optimal spectrum sharing performance \cite{paul2016survey}. In general, spectrum-sharing technologies follow three major approaches: co-design \cite{liu2020co}, cooperation \cite{bicua2018radar}, and coexistence \cite{wu2021resource}. While co-design requires designing new systems and waveforms to efficiently utilize the spectrum \cite{duggal2020doppler}, spectral cooperation requires exchange of additional information between radar and communications to enhance their respective performances \cite{paul2016survey}. The coexistence approach, on the other hand, does not mandate any additional hardware redesign or new waveforms. However, among all three approaches, separating the radar and communications signals at the coexistence receiver is the most challenging because of lack of any degrees-of-freedom in distinguishing the two signals. In this paper, we focus on the coexistence problem. In general, coexistence systems employ different radar and communications waveforms and separate receivers, wherein the management of interference from different radio systems is key to retrieving useful information \cite{bicua2018radar}. When the received radar signal reflected-off from the target is overlaid with communications messages occupying the same bandwidth, knowledge of respective waveforms is useful in designing matched filters to extract the two signals \cite{paul2016survey}. Usually, the radar signal is known and the goal of the radar receiver is to extract unknown target parameters from the received signal. In a typical communications receiver, the channel is known and the unknown transmit message is of interest in the receive processing. However, these assumptions do not extend to a general scenario. For example, in a passive \cite{sedighi2021localization} or multistatic \cite{dokhanchi2019mmwave} radar system, the receiver may not have information about the radar transmit waveform. Similarly, in communications over dynamic channels such as millimeter-wave \cite{mishra2019toward} or terahertz-band \cite{elbir2021terahertz}, the channel coherence times are very short. As a result, the channel state information changes rapidly and the channel cannot be considered perfectly known. In this paper, we consider this general spectral coexistence scenario, where both radar and communications channels and the respective transmit signals are unknown to the common receiver. Accordingly, we model the extraction of all four of these quantities as a \textit{dual-blind deconvolution} (DBD). The formulation is an extension of the \textit{blind deconvolution} --- a longstanding problem that occurs in a variety of engineering and scientific applications, such as astronomy, communication, image deblurring, system identification and optics --- wherein two unknown signals are estimated from an observation of their convolution~\cite{jefferies1993restoration,ayers1988iterative,abed1997blind}. This problem is ill-posed and, usually, structural constraints on signals are imposed to obtain algorithms with provable performance guarantees. The underlying ideas in these techniques are based on compressed sensing and low-rank matrix recovery, wherein signals lie in the low-dimensional random subspace and/or in high signal-to-noise ratio (SNR) regime \cite{lee2016blind,li2019rapid,ahmed2013blind,kuo2019geometry}. Previously, \cite{farshchian2016dual} studied the \textit{dual deconvolution} problem, where the radar transmit signal and communications channel were known. In this paper, unlike prior works, we examine the overlaid radar-communications signal as an ill-posed DBD problem. Our approach toward this more challenging problem is inspired by some recent works \cite{chi2016guaranteed,yang2016super} that have analyzed the basic blind deconvolution for off-the-grid sparse scenarios. The radar and communications channels are usually sparse \cite{mishra2018sub}, more so at higher frequency bands, and their parameters are continuous-valued \cite{mishra2015spectral}. Hence, sparse reconstruction in the off-the-grid or continuous parameter domain through techniques based on atomic norm minimization (ANM) \cite{off_the_grid} are appropriate for our application. While ANM has been extended to higher dimensions \cite{xu2014precise} and multiple parameters (e.g. delay-Doppler) \cite{heckel2016super}, prior works have not dealt with mixed radar-communications signal structures. We formulate an ANM-based recovery of both continuous-valued target parameters (range-time and Doppler velocities) as well as delay-Doppler communications channel estimates from a DBD receiver signal. We assume both channels are sparse, radar transmits a train of pulses and communications is a multi-carrier signal. Numerical experiments validate our approach through perfect recovery. The rest of the paper is organized as follows. In the next section, we introduce the system model and DBD problem. We describe our ANM-based semi-definite program (SDP) to solve DBD in Section~\ref{sec:formulation}. We validate our model and methods in Section~\ref{sec:results} through numerical experiments. We conclude in Section~\ref{sec:summ}. Throughout the paper, we reserve boldface lowercase, boldface uppercase, and calligraphic letters for vectors, matrices, and index sets, respectively. We denote the transpose, conjugate, Hermitian, and trace by $(\cdot)^T$, $(\cdot)^*$, $(\cdot)^H$, and $\text{Tr}(\cdot)$, respectively. The identity matrix of size $N\times N$ is $\mathbf{I}_N$. $||\cdot||_p$ is the $\ell_p$ norm. For notational convenience, the variables with subindex $r$ refer to the signals and parameters related to the radar system, while those with subindex $c$ refer to the communications system. \section{System Model} Consider a continuous-time linear system model that receives an overlaid radar-communications signal \begin{align} y(t) = x_r(t)*h_r(t)+x_c(t)*h_c(t), \end{align} where $x_r(t)$ is a train of $P$ transmitted pulses $s(t)$ with a pulse repetition interval (PRI) $T$; $x_c(t)$ is the transmitted communications signal composed of $P$ messages $\mathbf{g}_p$ with symbol duration $T$; and $h_r(t)$ and $h_c(t)$ are, respectively, the radar and communications channels modeled as a delay-Doppler channel with attenuation $\alpha$, time delay $\tau$ and shifting frequencies $\nu$. Assume $L$ targets/sources and $Q$ propagation paths for the radar and communications channels, respectively. Then, the set of vectors $\{{\boldsymbol{\alpha}}_r \in \mathbb{C}^{L}, \bar{\boldsymbol{\tau}}_r\in \mathbb{R}^{L}, \bar{\boldsymbol{\nu}}_r \in \mathbb{R}^{L}\} $ and $\{{\boldsymbol{\alpha}}_c \in \mathbb{C}^{Q}, \bar{\boldsymbol{\tau}}_c \in \mathbb{R}^{Q}, \bar{\boldsymbol{\nu}}_c \in \mathbb{R}^{Q}\}$ contain the parameters of all $L$ targets and $Q$ paths, respectively. The communications messages are modulated by orthogonal frequency-division multiplexing (OFDM) waveform with $K$ sub-carriers, each separated by $\Delta f$. The communications messages and radar pulses are transmitted in the same PRI. Then, the continuous-time received signal in the coherent processing interval (CPI) comprising $P$ pulse, i.e. $t\in[0,(P-1)T]$, is \begin{flalign} {y}(t) &= \sum_{p=0}^{P-1}\sum_{\ell=0}^{L-1}[\bsym{\alpha}_r]_\ell s(t-pT-[\bar{\boldsymbol{\tau}}_r]_\ell)e^{-\mathrm{j}2\pi[\bsym{\bar{\nu}}_r]_\ell pT}\nonumber\\&+\sum_{p=0}^{P-1}\sum_{q=0}^{Q-1}\sum_{k=0}^{K-1} [\bsym{\alpha}_c]_q [\mathbf{g}_p]_k e^{\mathrm{j}2\pi k\Delta f (t - pT - [\bsym{\bar{\tau}}_c]_q)}e^{-\mathrm{j}2\pi [\bsym{\bar{\nu}}_c]_q pT}.\nonumber \end{flalign} Expressing the received signal as ${y}(t)= \sum_{p=0}^{P-1} \tilde{y}_p(t)$, our measurements are determined in terms of shifted signals $y_p(t) = \tilde{y}_p(t+ pT)$, such that the signals $\tilde{y}_p(t+ p\tau)$ are time-aligned with $y_0(t)$. Therefore, the signal $y_0(t)$ and the shifted signals $y_p(t)$ contain the same set of parameters. Take the continuous-time Fourier Transform (CTFT) of $y_p(t)$ in $f\in[-\frac{B}{2},\frac{B}{2}]$, with $p = 0,\dots, P-1$ and uniformly sample at $f_n= \frac{Bn}{M}=n\Delta f$, with $n = -N,\dots,N$, $M = 2N+1$. Assume $M = K$, i.e. sample in frequency domain at the OFDM separation frequency $\Delta f$ \cite{zheng2017super} to obtain \begin{align} Y_p(f_n) = &\sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_r]_\ell S(f_n)e^{-\mathrm{j}2\pi n \Delta f[\bsym{\bar{\tau}}_r]_\ell}e^{-\mathrm{j}2\pi[\bsym{\bar{\nu}}_r]_\ell pT}\nonumber\\ &+\sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q e^{-\mathrm{j}2\pi n \Delta f[\bsym{\bar{\tau}}_c]_q }e^{-\mathrm{j}2\pi[\bar{\boldsymbol{\nu}}_c]_{q}pT}[\mathbf{g}_p]_{n+N}, \label{ft_2} \end{align} where $S(f)$ is the Fourier transform of $s(t)$. Concatenating $Y_p(f_n)$ in the vector $\mathbf{y}_p$, i.e., $\en{\mathbf{y}_p}_{n+N} = Y_p(f_n)$ for $n=-N,\cdots,N$, the discrete values of the Fourier transform in \eqref{ft_2} are \begin{align} [\mathbf{y}_p]_{n+N} = &\sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_r]_\ell [\mathbf{s}]_{n+N} e^{-\mathrm{j}2\pi(n[{\boldsymbol{\tau}}_r]_\ell+ p[{\boldsymbol{\nu}}_r]_\ell )}\nonumber\\&+\sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q[\mathbf{g}_p]_{n+N} e^{-\mathrm{j}2\pi(n[{\boldsymbol{\tau}}_c]_\ell+ p[{\boldsymbol{\nu}}_c]_\ell )}, \label{eq:y_p} \end{align} where $[{\boldsymbol{\tau}}_r]_\ell = \frac{[\bar{\boldsymbol{\tau}}_r]_\ell}{T}$, $[\boldsymbol{\nu}_r]_\ell = \frac{[\bar{\boldsymbol{\nu}}_r]_\ell}{\Delta f}$, $[\boldsymbol{\tau}_c]_\ell = \frac{[\bar{\boldsymbol{\tau}}_c]_\ell}{T}$, $[\boldsymbol{\nu}_c]_\ell = \frac{[\bar{\boldsymbol{\nu}}_c]_\ell}{\Delta f} \in [0,1)$ are normalized sets of target parameters and $\en{\mathbf{s}}_{n+N} = S(f_n)$. Define the vector $\mathbf{y} = \en{\mathbf{y}_0^T,\cdots,\mathbf{y}_{P-1}^T}^T$. Then, all samples of the $P$ received blocks of information are \begin{align} &[\mathbf{y}]_{v} =\sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_r]_\ell [\mathbf{s}]_{n+N} e^{-\mathrm{j}2\pi(n[{\boldsymbol{\tau}}_r]_\ell+ p[{\boldsymbol{\nu}}_r]_\ell )}\label{eq:y_v}\\&+\sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q[\mathbf{g}]_v e^{-\mathrm{j}2\pi(n[{\boldsymbol{\tau}}_c]_q+ p[{\boldsymbol{\nu}}_c]_q )},\;v=0,\cdots,MP-1,\nonumber \end{align} where $v = n +N+Np $ is the sequence index with $n = -N,\dots,N$ and $p = 0,\dots,P-1$, and $\mathbf{g} = [\mathbf{g}_0^T,...,\mathbf{g}_{P-1}^T]$. Note that $\en{\mathbf{y}}_v = \en{\mathbf{y}_p}_{n+N} $ and $\en{\mathbf{g}}_v = \en{\mathbf{g}_p}_{n+N}$. Our goal is to estimate the set of parameters $\boldsymbol{\alpha}_r,\boldsymbol{\tau}_r, \boldsymbol{\nu}_r,\boldsymbol{\alpha}_c,\boldsymbol{\tau}_c$ and $\boldsymbol{\nu}_c$ when the radar pulses $\mathbf{s}$ and communications symbols $\mathbf{g}$ are also unknown. To this end, we exploit the sparsity of the channels in our ANM formulation. We first employ the lifting trick \cite{chi2016guaranteed} that consists on representing the unknown signals in a low-dimensional sub-space, which follows the isotropy and incoherence properties \cite{candes2011probabilistic}. This implies spectral flatness over the represented signals. Highly spectrum-efficient waveforms such as OFDM \cite{ofdm_flat} or certain modulating Gaussian radar waveforms \cite{pralon2021analysis} satisfy this property. We represent the pulse signal $\mathbf{s}$ and the set of symbols $\mathbf{g}_p$ for $p=0,\cdots,P-1$ as $\mathbf{s} = \mathbf{B}\mathbf{u}$, where $\mathbf{B} = \en{\mathbf{b}_{-N},\dots, \mathbf{b}_{N}}^H\text{, }\mathbf{b}_n\in \mathbb{C}^J$, $\mathbf{g}_p = \mathbf{D}_p\mathbf{v}_p$, $\mathbf{D}_p = \en{\en{\mathbf{D}_p}_{-N},\cdots,\en{\mathbf{D}_p}_{N}}^H$, $\en{\mathbf{D}_p}_n \in \mathbb{C}^{J}$, and $\en{\mathbf{D}_p}_n$ denotes the $n$-th column of matrix $\mathbf{D}_p$. Define the full set of symbols $ \mathbf{g}$ as $\mathbf{g} = \mathbf{D}\mathbf{v}$, $\mathbf{D} =\en{\mathbf{d}_{0},\cdots,\mathbf{d}_{MP-1}}^H =\text{blockdiag}\en{\mathbf{D}_0^H,\cdots,\mathbf{D}_{P-1}^H}$, where $\textrm{blockdiag}\en{\mathbf{X}_1,\cdots,\mathbf{X}_n}$ is a block diagonal matrix with matrices $\mathbf{X}_1,\cdots, \mathbf{X}_n$. The matrices $\mathbf{B}\in\mathbb{C}^{M\times J}$ and $\mathbf{D}\in\mathbb{C}^{MP\times PJ}$ are known representation basis for the pulses and symbols and $\mathbf{u} \in \mathbb{C}^J$ and $\mathbf{v}=[\mathbf{v}_0^T,\cdots,\mathbf{v}_P^T]^T \in \mathbb{C}^{PJ}$ are the corresponding coefficients vector with $J\ll N$. Using this representation, \eqref{eq:y_v} becomes: \begin{align} [\mathbf{y}]_{v} = &\sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_r]_\ell \mathbf{b}_n^H\mathbf{u}e^{-\mathrm{j}2\pi(n[\boldsymbol{\tau}_r]_\ell+p[\boldsymbol{\nu}_r]_\ell )}\nonumber\\&+\sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q \mathbf{d}_{v}^H\mathbf{v}e^{-\mathrm{j}2\pi (n[\boldsymbol{\tau}_c]_q+p[\boldsymbol{\nu}_c]_q )}.\label{signal} \end{align} Denote the channel vectors $\mathbf{h}_r = \sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_r]_\ell\mathbf{a}(\mathbf{r}_\ell)$ and $\mathbf{h}_c = \sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_c]_q\mathbf{a}(\mathbf{c}_q)$ where $\mathbf{r}_\ell = [[\boldsymbol{\tau}_r]_\ell,[\boldsymbol{\nu}_r]_\ell], \mathbf{c}_q = [[\boldsymbol{\tau}_c]_q,[\boldsymbol{\nu}_c]_q]$ are the parameter-tuples, and the vector $\mathbf{a}(\mathbf{r})$ is \begin{align} \mathbf{a}([\tau,\nu]) = \big[&e^{\mathrm{j}2\pi(\tau (-N)+\nu (0))},\dots,e^{\mathrm{j}2\pi(\tau (N)+\nu(0))},\nonumber\\&\dots,e^{\mathrm{j}2\pi(\tau (N)+\nu(P-1))}\big] \in\mathbb{C}^{MP}. \end{align} Then, \eqref{signal} becomes \begin{align} [\mathbf{y}]_{v} = \mathbf{h}_r^H \mathbf{e}_{v} \mathbf{b}_n^H \mathbf{u} + \mathbf{h}_c^H\mathbf{e}_{v}\mathbf{d}_{v}^H\mathbf{v}\label{signal_2}. \end{align} Denote the matrices $\mathbf{Z}_r = \mathbf{u}\mathbf{h}_r^H \in \mathbb{C}^{J\times MP}$, $\mathbf{Z}_c =\mathbf{v}\mathbf{h}_c^H \in \mathbb{C}^{PJ\times MP}$, $\mathbf{G}_v = \mathbf{e}_{v}\mathbf{b}_n^H \in \mathbb{C}^{MP\times J}$ and $\mathbf{A}_v = \mathbf{e}_{v}\mathbf{d}_{v}^H \in \mathbb{C}^{MP\times PJ}$, where $\mathbf{e}_{v}$ is the $v$-th canonical vector of $\mathbb{R}^{MP}$. Therefore, we formulate \eqref{signal_2} as $ \mathbf{y} = \aleph_r(\mathbf{Z}_r) + \aleph_c(\mathbf{Z}_c) $ where the linear operators $\aleph_r: \mathbb{C}^{J\times MP}\rightarrow \mathbb{C}^{MP}$ and $\aleph_c: \mathbb{C}^{PJ\times MP}\rightarrow \mathbb{C}^{MP}$ are \begin{align} &[\aleph_r(\mathbf{Z}_r)]_{v} = \text{Tr}(\mathbf{G}_v\mathbf{Z}_r), \quad [\aleph_c(\mathbf{Z}_c)]_{v} = \text{Tr}(\mathbf{A}_v\mathbf{Z}_c). \end{align} Finally, we write the measured vector as \begin{equation} \mathbf{y} = \aleph_r(\mathbf{Z}_r) + \aleph _c(\mathbf{Z}_c). \label{eq:received_signal} \end{equation} Note that the matrices $\mathbf{Z}_r$ and $\mathbf{Z}_c$ contain all the unknown variables that we want to estimate. \section{Dual-Blind Deconvolution Algorithm} \label{sec:formulation} The radar and communications channels are often characterized by a few continuous-valued parameters. Leveraging the sparse nature of these channels, we use ANM framework \cite{off_the_grid} for super-resolved estimations of continuous-valued channel parameters. For the overlaid radar-communications signal, we formulate the parameter recovery as the minimization of two atomic norms, each corresponding to the radar and communications signal trails. Define the sets of atoms for the radar and communications signals as, respectively, \begin{align} &\mathcal{A}_r = \Big\{\mathbf{u}\mathbf{a}(\mathbf{r})^H: \mathbf{r}\in[0,1)^2,||\mathbf{u}||_2 = 1 \Big\} \\&\mathcal{A}_c = \Big\{\mathbf{v}\mathbf{a}(\mathbf{c})^H: \mathbf{c}\in[0,1)^2,||\mathbf{v}||_2 = 1 \Big\}. \label{eq:atomic_sets} \end{align} The corresponding atomic norms are \begin{align} &||\mathbf{Z}_r||_{\mathcal{A}_r} = \inf_{\stackrel{[\bsym{\alpha}_r]_\ell \in \mathbb{C}, \boldsymbol{r}_\ell \in [0,1]^2}{||\mathbf{u}||_2 = 1}} \Bigg\{\sum_\ell |[\bsym{\alpha}_r]_\ell| \Big| \mathbf{Z}_r = \sum_\ell [\bsym{\alpha}_r]_\ell\mathbf{u}\mathbf{a}(\mathbf{r}_\ell)^H\Bigg\}\nonumber\\ &||\mathbf{Z}_c||_{\mathcal{A}_c} = \inf_{\stackrel{[\bsym{\alpha}_c]_q \in \mathbb{C}, \boldsymbol{c}_q \in [0,1]^2}{||\mathbf{v}||_2 = 1}} \Bigg\{\sum_q |[\bsym{\alpha}_c]_q| \Big| \mathbf{Z}_c = \sum_q [\bsym{\alpha}_c]_q\mathbf{v}\mathbf{a}(\mathbf{c}_q)^H\Bigg\}\nonumber. \end{align} Consequently, our proposed ANM problem is \begin{align} &\minimize_{\mathbf{Z}_r,\mathbf{Z}_c} ||\mathbf{Z}_r||_{\mathcal{A}_r} +||\mathbf{Z}_c||_{\mathcal{A}_c}\nonumber\\ &\text{subject to } \mathbf{y} = \aleph_r(\mathbf{Z}_r) + \aleph_c(\mathbf{Z}_c). \label{eq:primal_problem} \end{align} In order to formulate the semidefinite program (SDP) of the above-mentioned ANM, we find its dual problem \cite{mishra2015spectral,xu2014precise} via standard Lagrangian analysis. The Lagrangian function of \eqref{eq:primal_problem} is \begin{align} \mathcal{L}(\mathbf{Z}_r,\mathbf{Z}_c,\mathbf{q})=||\mathbf{Z}_r||_{\mathcal{A}_r} +||\mathbf{Z}_c||_{\mathcal{A}_c}+ \langle\mathbf{q,y}-\aleph_r(\mathbf{Z}_r) - \aleph_c(\mathbf{Z}_c)\rangle \end{align} where $\mathbf{q}$ is the dual variable. The dual function $g(\mathbf{q})$ is obtained from the Lagrangian function as \begin{flalign} &g(\mathbf{q})\nonumber\\ &=\inf_{\mathbf{Z}_r,\mathbf{Z}_c}\mathcal{L}(\mathbf{Z}_r,\mathbf{Z}_c,\mathbf{q})\nonumber\\ &=\langle\mathbf{q,y}\rangle \label{eq:dual}\\ &\;\;+ \inf_{\mathbf{Z}_r,\mathbf{Z}_c} (||\mathbf{Z}_r||_{\mathcal{A}_r} +||\mathbf{Z}_c||_{\mathcal{A}_c})-\langle\mathbf{q},\aleph_r(\mathbf{Z}_r)\rangle-\langle\mathbf{q}, \aleph_c(\mathbf{Z}_c)\rangle)\nonumber\\ &=\langle\mathbf{q,y}\rangle\nonumber \\ &\;\;- \sup_{\mathbf{Z}_r} \left(\langle\aleph^*_r(\mathbf{q}),\mathbf{Z}_r \rangle-||\mathbf{Z}_r||_{\mathcal{A}_r}\right)-\sup_{\mathbf{Z}_c} \left(\langle\aleph^*_c(\mathbf{q}),\mathbf{Z}_c \rangle-||\mathbf{Z}_c||_{\mathcal{A}_c}\right).\nonumber \end{flalign} The supremum values in \eqref{eq:dual} correspond to the convex conjugate function of the atomic norms $||\mathbf{Z}_r||_{\mathcal{A}_r}$ and $||\mathbf{Z}_c||_{\mathcal{A}_c}$. For the atomic norm, $f=||\cdot||_\mathcal{A}$ the conjugate function is the indicator function of the dual norm unit ball \[ f^*(\mathbf{Z}) = \begin{cases} 0 & \text{if } ||\mathbf{Z}||_{\mathcal{A}}^*\leq 1,\\ \infty & \text{otherwise,} \\ \end{cases} \] where the dual norm is defined as $ ||\mathbf{Z}||_{\mathcal{A}}^* = \sup_{||\mathbf{U}||_{\mathcal{A}}\leq 1} \langle \mathbf{U},\mathbf{Z} \rangle $. Based on the dual function, the dual optimization problem of \eqref{eq:primal_problem} is \begin{align} &\underset{\mathbf{q}}{\textrm{maximize}}\langle\mathbf{q,y}\rangle_{\mathbb{R}}\nonumber\\ &\text{subject to } \Vert\aleph_r^\star(\mathbf{q})\Vert^\star_{\mathcal{A}_r}\leq1, \nonumber\\ &\;\;\;\;\;\;\;\;\;\;\;\;\;\;\; \Vert \aleph_c^\star(\mathbf{q})\Vert^\star_{\mathcal{A}_c}\leq1, \label{eq:dual_problem_op} \end{align} where $\aleph_r^\star: \mathbb{C}^{MP}\rightarrow\mathbb{C}^{J \times MP}$ and $\aleph_c^\star: \mathbb{C}^{MP}\rightarrow\mathbb{C}^{PJ \times MK}$ are adjoint operators of $\aleph_r$ and $\aleph_c$ respectively, i.e. $\aleph_r^\star(\boldsymbol{q}) = \sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v}\mathbf{G}_v^H,\aleph_c^\star(\mathbf{q}) = \sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v}\mathbf{A}_v^H $. The SDP of this dual problem is found using the trigonometric vector polynomials \begin{align} &\mathbf{f}_r(\mathbf{r}) = \sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v} \mathbf{G}_v^H \mathbf{a}(\mathbf{r}) \in \mathbb{C}^{J}, \label{eq:poly_r}\\ &\mathbf{f}_c(\mathbf{c})=\sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v}\mathbf{A}_v^H \mathbf{a}(\mathbf{c}) \in \mathbb{C}^{JP}. \label{eq:poly_c} \end{align} In particular, the SDP relaxation is achieved through the Bounded Real Lemma \cite{dumitrescu2007positive} to convert the constraints on \eqref{eq:dual_problem_op} into linear matrix inequalities and using the fact that polynomials \eqref{eq:poly_r} and \eqref{eq:poly_c} are parameterized by positive definite matrices. The relaxation of \eqref{eq:dual_problem_op} leads to the following equivalent SDP problem \begin{align} &\underset{\mathbf{q,Q}}{\textrm{maximize}}\quad \langle\mathbf{q,y}\rangle_{\mathbb{R}}\nonumber\\ &\text{subject to }\mathbf{Q}\succeq 0,\nonumber\\&\hphantom{\text{subject to }} \begin{bmatrix} \mathbf{Q} & \hat{\mathbf{Q}}_r^H \\ \hat{\mathbf{Q}}_r & \mathbf{I}_J \end{bmatrix} \succeq0,\nonumber\\&\hphantom{\text{subject to }} \begin{bmatrix} \mathbf{Q} & \hat{\mathbf{Q}}_c^H \\ \hat{\mathbf{Q}}_c & \mathbf{I}_{JP} \end{bmatrix}\succeq 0, \nonumber\\&\hphantom{\text{subject to }} \text{Tr}(\boldsymbol{\Theta}_\mathbf{n}\boldsymbol{Q}) = \delta_{\mathbf{n}},\label{dual_opt} \end{align} where $\hat{\mathbf{Q}}_r = \sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v}\mathbf{G}_v^H \in \mathbb{C}^{MP\times J}$ and $\hat{\mathbf{Q}}_c = \sum_{p=0}^{P-1}\sum_{n=-N}^{N} [\mathbf{q}]_{v} \mathbf{A}_v^H \in \mathbb{C}^{MP\times PJ}$ are the coefficients of two-dimensional (2-D) trigonometric polynomials, the matrix $\boldsymbol{\Theta}_\mathbf{n} $, $\mathbf{n} = [n_1,n_2]$ for the 2-D case is $\boldsymbol{\Theta}_\mathbf{n} = \boldsymbol{\Theta}_{n_2} \otimes \boldsymbol{\Theta}_{n_1}$, where $\boldsymbol{\Theta}_n$ is the Toeplitz matrix with ones in the $n$-th diagonal with $0<n_1<m_1$ and $-m_2<n_2<m_2$. Here, we define $m_1 = P-1$ and $m_2=N-1$. Finally, $\delta_\mathbf{n} = 1 $ if $\mathbf{n} = [0,0]$ and $0$ otherwise. This SDP formulation is solved by employing off-the-shelf solvers. Based on the strong duality implied by Slater's conditions, the following proposition states the conditions for exact recovery of the radar and communications channels parameters. \begin{proposition} Let $\mathbf{y}$ be as defined in \eqref{eq:received_signal} and the atomic sets $\mathcal{A}_r$ and $\mathcal{A}_c$ as defined in \eqref{eq:atomic_sets}. Let $\mathcal{R} = \{\mathbf{r}_\ell\}_{\ell=0}^{L-1}$ and $\mathcal{C} = \{\mathbf{c}_q\}_{q=0}^{Q-1}$ and the solution of \eqref{eq:primal_problem} be $\hat{\mathbf{Z}}_r$ and $\hat{\mathbf{Z}}_c$. Then, $\hat{\mathbf{Z}}_r={\mathbf{Z}}_r$ and $\hat{\mathbf{Z}}_c={\mathbf{Z}}_c$ are the primal optimal solutions of \eqref{eq:primal_problem} if the following condition is satisfied: There exist two 2-D trigonometric polynomials \begin{align} &\mathbf{f}_r(\mathbf{r}) = \sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v}\mathbf{G}_{v}^H \mathbf{a}(\mathbf{r}) \in \mathbb{C}^{J}\\&\mathbf{f}_c(\mathbf{c})=\sum_{p=0}^{P-1}\sum_{n=-N}^{N}[\mathbf{q}]_{v} \mathbf{A}^H_v \mathbf{a}(\mathbf{c}) \in \mathbb{C}^{PJ} \end{align} with complex coefficients $\mathbf{q}$ such that \begin{align} \mathbf{f}_r(\mathbf{r}_\ell) &= \mathrm{sign}( [\boldsymbol{\alpha}_r]_\ell) \mathbf{u} \hspace{1em} \text{if} \hspace{1em} \forall \mathbf{r}_\ell \in \mathcal{R} \label{eq:cert_1}\\ \mathbf{f}_c(\mathbf{c}_q) &= \mathrm{sign}( [\boldsymbol{\alpha}_c]_q) \mathbf{v} \hspace{1em} \text{if} \hspace{1em} \forall\mathbf{c}_q \in \mathcal{C} \label{eq:cert_2}\\ \Vert \mathbf{f}_r(\mathbf{r}) \Vert_2^2 &< 1 \hspace{1em } \forall \mathbf{r} \in [0,1]^2 \setminus \mathcal{R} \label{eq:cert_3}\\ \Vert \mathbf{f}_c(\mathbf{c}) \Vert_2^2 &< 1 \hspace{1em } \forall \mathbf{c} \in [0,1]^2 \setminus \mathcal{C}\label{eq:cert_4} \end{align} where $\operatorname{sign}(c) = \frac{c}{|c|}$ . \begin{proof} The variable $\mathbf{q}$ is dual feasible. \par\noindent\small \begin{flalign} &\langle\mathbf{q,y}\rangle_{\mathbb{R}} = \langle\aleph_r^*(\mathbf{q}),\mathbf{Z}_r\rangle_{\mathbb{R}}+ \langle\aleph_c^*(\mathbf{q}),\mathbf{Z}_c\rangle_{\mathbb{R}}\nonumber\\ & = \sum_{\ell=0}^{L-1} [\boldsymbol{\alpha}_r]_\ell^* \langle\aleph_r^*(\mathbf{q}),\mathbf{u}\mathbf{a}(\mathbf{r}_\ell)^H\rangle_{\mathbb{R}} + \sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q^* \langle\aleph_c^*(\mathbf{q}),\mathbf{v}\mathbf{a}(\mathbf{c}_q)^H\rangle_{\mathbb{R}}\nonumber \\ &= \sum_{\ell=0}^{L-1} [\boldsymbol{\alpha}_r]_\ell^* \langle\mathbf{f}_r(\mathbf{r}_\ell),\mathbf{u}\rangle_{\mathbb{R}} + \sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q^* \langle\mathbf{f}_c(\mathbf{c}_q),\mathbf{v}\rangle_{\mathbb{R}}\nonumber\\ & =\sum_{\ell=0}^{L-1}[\boldsymbol{\alpha}_r]_\ell^*\textrm{sign}( [\boldsymbol{\alpha}_r]_\ell) + \sum_{q=0}^{Q-1} [\boldsymbol{\alpha}_c]_q^*\textrm{sign}( [\boldsymbol{\alpha}_c]_q)\nonumber\\ &= \sum_{\ell=0}^{L-1} |[\boldsymbol{\alpha}_r]_\ell| + \sum_{q=0}^{Q-1} |[\boldsymbol{\alpha}_c]_q|\geq ||\mathbf{Z}_r||_{\mathcal{A}_r} + ||\mathbf{Z}_c||_{\mathcal{A}_c}.\label{eq:lower_bound_dual} \end{flalign}\normalsize On the other hand, it follows from H\"{o}lder inequality that \begin{align} \langle\mathbf{q,y}\rangle_{\mathbb{R}}&=\langle\aleph_r^*(\mathbf{q}),\mathbf{Z}_r\rangle_{\mathbb{R}}+ \langle\aleph_c^*(\mathbf{q}),\mathbf{Z}_c\rangle_{\mathbb{R}}\\ &\leq ||\aleph_r^*(\mathbf{q})||_{\mathcal{A}_r}^*||\mathbf{Z}_r||_{\mathcal{A}_r} + \leq ||\aleph_c^*(\mathbf{q})||_{\mathcal{A}_c}^*||\mathbf{Z}_c||_{\mathcal{A}_c}\\ &\leq ||\mathbf{Z}_r||_{\mathcal{A}_r}+||\mathbf{Z}_c||_{\mathcal{A}_c}, \label{eq:upper_bound_dual} \end{align} where the first inequality is due to Cauchy-Schwarz inequality and the last inequality follows from \eqref{eq:cert_1}, \eqref{eq:cert_2}, \eqref{eq:cert_3}, and \eqref{eq:cert_4}. Therefore, based on \eqref{eq:lower_bound_dual} and \eqref{eq:upper_bound_dual}, we conclude that $\langle\mathbf{q,y}\rangle_{\mathbb{R}}=||\mathbf{Z}_r||_{\mathcal{A}_r}+||\mathbf{Z}_c||_{\mathcal{A}_c}$ showing that the pair $(\mathbf{Z}_r,\mathbf{Z}_c)$ is primal optimal and, from strong duality, $\mathbf{q}$ is dual optimal. \end{proof} \end{proposition} The existence of the polynomial has been previously demonstrated in 2-D (non-blind) deconvolution of a radar channel \cite{heckel2016super} as well as in the blind case \cite{suliman2021mathematical}. In our problem, two different trigonometric polynomials are directly related through the dual variable $\mathbf{q}$. Thus, to prove the existence of these polynomials under this constraint implies a more extended analysis that the above-mentioned works \cite{heckel2016super}, \cite{suliman2021mathematical}. Finally, even though this paper focuses on the channel estimation, the information embedded in the atoms $\mathbf{Z}_r$ and $\mathbf{Z}_c$ also allow for exact estimation of the radar waveform and the communications symbols. We omit the proof of the existence of these polynomials and the guarantees for the unique solution of $\mathbf{Z}_r$ and $\mathbf{Z}_c$ because of paucity of space. Briefly, the proof follows from \cite{candes_superresolution ,yang2016super, chi2016guaranteed}, where the polynomials are formulated as linear combination of fast decaying random kernels (\textit{e.g.} randomized F\'ejer kernel) and their derivatives with the constraint that the polynomials have common kernels \begin{comment} \subsection{Main result} From \cite{chi2016guaranteed, candes2011probabilistic}, the columns of the subspace representation matrices $\mathbf{B}$ and $\mathbf{D}_p \forall p$ are sampled from a distribution that achieves the incoherence and isotropy properties as \begin{enumerate} \item \textbf{Isotropy:} $\mathcal{F}$ achieves the isotropy property if $\mathbf{x}\sim \mathcal{F}$ satisfies $ \mathbb{E}\mathbf{x}\mathbf{x}^H =\mathbf{I}_N$. \item \textbf{Incoherence:} for $\mathbf{x} = [x_0, \dots, x_{N}]\sim \mathcal{F}$, let $\mu$ be the coherence parameter of the distribution $\mathcal{F}$ as the smallest constant that satisfies $\max_{0<i<N}|x_i|\leq\mu$. \end{enumerate} \settheoremtag{3.1} \begin{theorem} Let $[\mathbf{y}]_v$ be defined as \ref{eq:received_signal}, which the columns of the matrices $\mathbf{B}$ and $\mathbf{D}_p$ achieves the isotropy and incoherence property, also defining the sets $\mathcal{R} = {\mathbf{r}_0,\dots,\mathbf{r}_{L-1}}$ and $\mathcal{C} = \mathcal{R} = {\mathbf{c}_0,\dots,\mathbf{c}_{Q-1}}$ where \begin{equation} M\geq \frac{100 \operatorname{max}(L,Q)\mu J}{P\epsilon_1^2}\log\left(\frac{\operatorname{max}(6QPJ,6LJ)}{\delta}\right) \end{equation} such that $\delta>0$, then, $\mathbf{Z}_r$ and $\mathbf{Z}_c$ are the optimal minimizers of \ref{eq:primal_problem} with a probability at least $1-4\delta$ \end{theorem} \begin{IEEEproof} We omit the proof because of paucity of space. \end{IEEEproof} \subsection{Estimating the communications messages} After computing the dual polynomials \eqref{eq:poly_r} \eqref{eq:poly_c}, the radar and communications coefficients vectors $\mathbf{g}_r $ and $\mathbf{g}_c$ can be estimated solving a linear system of equations. First, defining the matrices $\mathbf{W}_r \in \mathbb{C}^{MP\times LJ}$ and $\mathbf{W}_c \in \mathbb{C}^{MP\times PLJ}$ as \begin{equation} \mathbf{W}_r = \left[\begin{array}{ccc} \mathbf{a}\left(\hat{\mathbf{r}}_{0}\right)^{H} \mathbf{A}_{0} & \ldots & \mathbf{a}\left(\hat{\mathbf{r}}_{L-1}\right)^{H} \mathbf{A}_{0} \\ \vdots & \ddots & \vdots \\ \mathbf{a}\left(\hat{\mathbf{r}}_{0}\right)^{H} \mathbf{A}_{MP-1} & \ldots & \mathbf{a}\left(\hat{\mathbf{r}}_{L-1}\right)^{H} \mathbf{A}_{MP-1} \end{array}\right] \end{equation} \begin{equation} \mathbf{W}_c = \left[\begin{array}{ccc} \mathbf{a}\left(\hat{\mathbf{c}}_{0}\right)^{H} \mathbf{G}_{0} & \ldots & \mathbf{a}\left(\hat{\mathbf{c}}_{Q-1}\right)^{H} \mathbf{G}_{0} \\ \vdots & \ddots & \vdots \\ \mathbf{a}\left(\hat{\mathbf{c}}_{0}\right)^{H} \mathbf{G}_{MP-1} & \ldots & \mathbf{a}\left(\hat{\mathbf{c}}_{Q-1}\right)^{H} \mathbf{G}_{MP-1} \end{array}\right] \end{equation} the system can be formulated as \begin{equation} \left[\mathbf{W}_r,\mathbf{W}_c \right] \left[\begin{array}{c} [\boldsymbol{\alpha}_r]_0\mathbf{g}_r \\ \vdots \\ \left[\boldsymbol{\alpha}_r\right]_{L-1}\mathbf{g}_r \\ \left[\boldsymbol{\alpha}_c\right]_{0}\mathbf{g}_c \\ \vdots\\ \left[\boldsymbol{\alpha}_c\right]_{Q-1}\mathbf{g}_c \\ \end{array}\right] = \mathbf{y}\label{syst} \end{equation} \end{comment} \section{Numerical Experiments \label{sec:results} To numerically validate the proposed method, we set $M = 13, P=9, Q=L=3$ and $J=3$. The delay-Doppler parameters were taken from a random uniform distribution, which results in $\boldsymbol{\tau}_r = [0.23, 0.68,0.87]$, $\boldsymbol{\nu}_r = [0.45, 0.42,0.71]$, $\boldsymbol{\tau}_c = [0.12, 0.21,0.95]$, and $\boldsymbol{\nu}_c = [0.09, 0.25,0.87] $. The columns of the transformation matrices $\mathbf{B}$ and $\mathbf{D}_p$ were generated following the distribution described in \cite{chi2016guaranteed}, i.e. $\mathbf{b}_n= [1, e^{\mathrm{j}2\pi \sigma_n}, \dots, e^{\mathrm{j}2\pi(J-1) \sigma_n}]$, where $\sigma_n \sim \mathcal{N}(0,1)$. The parameters $\boldsymbol{\alpha}_r$ and $\boldsymbol{\alpha}_c$ are drawn from a normal distribution with $|[\boldsymbol{\alpha}_r]_\ell|=|[\boldsymbol{\alpha}_c]_q|=1 \;\forall q, \forall \ell$. The coefficient vectors $\mathbf{u}, \mathbf{v}$ are generated from a normal random distribution and normalized $\Vert\mathbf{u}\Vert=\Vert\mathbf{v}\Vert=1$. We solve the SDP optimization problem in \eqref{dual_opt} using CVX SDP3 solver \cite{grant2009cvx}. With the dual solution, we build the dual trigonometric polynomials by evaluating them in a discrete 2-D time-delay and doppler domain with a sampling step of $1e-3$. The resulting dual polynomials are depicted in Fig. \ref{fig:results_dual}, showing that the set of the radar and communications channels parameter are exactly located when $\Vert\mathbf{f}_r(\mathbf{r})\Vert = 1$ and $\Vert\mathbf{f}_c(\mathbf{c})\Vert = 1$. Fig. \ref{fig:stats} shows the phase transition of the proposed method by varying the number of the targets and paths $Q=L$ and the subspace size $J$ for $10$ realizations of $L$ and $J$. The other parameters are same as before. We declare a successful estimation when $\Vert \mathbf{r} - \hat{\mathbf{r}}\Vert_2<1e^{-3}$ and $\Vert \mathbf{c} - \hat{\mathbf{c}}\Vert_2<1e^{-3}$. \begin{figure}[t] \centering \includegraphics[width=0.75 \linewidth]{Fig/poly_final.png} \caption{Dual polynomials corresponding to estimating the (a) radar and (b) communications channels in dual-blind deconvolution set-up. The locations of the parameters are given when the maximum modulus of the polynomials is unity.} \label{fig:results_dual} \end{figure \begin{figure}[t] \centering \includegraphics[width=0.95\linewidth]{Fig/final_JL_5.png \caption{Exact localization probability of (a) radar and (b) communications channels as a function of the number of the targets and paths $Q=L$ and the subspace size $J$. } \label{fig:stats \end{figure} \section{Summary} \label{sec:summ} We proposed a dual-blind deconvolution method for jointly estimating the channel parameters of radar and communications systems from the information acquired with a single receiver. The proposed approach leverage the sparse structure of the channels to formulate the recovery problem as the minimization of two atomic norms corresponding to the radar and communications signals. The dual problem leads to the construction of two trigonometric polynomials corresponding to the radar and communications signal directly coupled through the dual variable. This problem is reformulated as an equivalent SDP by harnessing the parametrization of the dual trigonometric polynomials using positive semidefinite matrix and efficiently solved using off-the-shelf solvers. Numerical experiments validate the proposed approach that estimates the radar and communications channels parameters perfectly. \clearpage \bibliographystyle{IEEEtr}
\section{Introduction}\label{intro:} At high redshifts, large reservoirs of circum-galactic medium (CGM) are known to play a crucial role in the evolution of massive galaxies. Giant gaseous halos, generally detected in Ly$\alpha$ ($T > 10^{4}$K), have been known to be associated with massive galaxies in high-$z$ proto-clusters since the early 2000s \cite[e.g.,][]{Reuland2003, Villar_Martin2003, Miley2006, Cai2017b, Cai2018}. Nevertheless, a limitation in our understanding of the multi-phase CGM around distant galaxies is that we have little information about the coldest phase of the CGM. This means that a direct connection to the stellar growth of massive galaxies remains missing, until we identify the ultimate reservoir of halo gas that can fuel widespread star-formation, namely the cold molecular gas ($\sim$10-100 K). This gap in our understanding started to be filled when large amounts of widespread, cold molecular gas were detected in CO, [C\,{\sc i}], and [C\,{\sc ii}]\ on scales of many tens of kpc in the halo environments of massive high-$z$ galaxies. \cite[e.g.,][]{Emonts2014, Emonts2015, Emonts2016, Emonts2018, Cicone2015, Cicone2021, Ginolfi2017, Frayer2018, Fujimoto2019}. The best studied example is the Spiderweb Galaxy, which contains a giant ($\sim$250 kpc) Ly$\alpha$ halo \citep{Miley2006}. Sensitive surface-brightness observations of CO(1-0), CO(4-3) and [C\,{\sc i}]~$^{3}$P$_{1}$-$^{3}$P$_{0}$\ revealed a widespread ($\sim$70 kpc) reservoir of cold molecular gas across the CGM of the Spiderweb \citep{Emonts2016, Emonts2018}. This cold CGM has a carbon abundance and excitation properties similar to the ISM in star-forming galaxies \citep{Emonts2018}, and follows diffuse blue light from in-situ star formation in the CGM \citep{Hatch2008, Emonts2016}. This suggests that recycling and mixing through metal-enriched outflows or mass transfer among galaxies, as well as star formation, occurs on a massive scale in the CGM of the Spiderweb \citep{Narayanan2015, Faucher_Giguere2016}. Recently, molecular gas on even larger scales was detected in CO(3-2) across the CGM around a quasar at $z$\,$\sim$\,2 \citep{Cicone2021}. If other high-$z$ proto-cluster galaxies show similar nebulae with cold star-forming gas, then this requires us to revise our ideas of star formation, and the early build-up of the most massive galaxies in the Universe. Driven by the major advances in optical integral-field-unit (IFU) spectrographs, a new sample of giant Ly$\alpha$-emitting nebulae reminiscent of the Spiderweb, and sufficiently luminous for quantitative analysis of diffuse gas emission, was discovered. These “Enormous Ly$\alpha$ Nebulae (ELANe)” are the extrema of Ly$\alpha$ nebulae at $z\sim$2-3, with sizes exceeding the diameters of even massive dark matter halos ($\sim$250 kpc) and Ly$\alpha$ luminosities $>$10$^{44}$ erg/s \citep{Cai2017a, Cantalupo2014, Arrigoni_Battaia2019, Hennawi2015, Borisova2016}. They generally contain one or more luminous AGN, and are typically located within proto-clusters. To trace the molecular CGM across ELANe, the Karl G. Jansky Very Large Array (VLA) was used to observe the enigmatic Mammoth ELAN \citep{Emonts2019}. These data reveal a large reservoir of cold molecular gas ($\sim$6 $\times$10$^{10}$ M$_{\odot}$) that is spread across tens of kpc in the CGM, even in the presence of an obscured Quasi-Stellar Object (QSO). This suggests that a molecular CGM may occur among the general population of ELANe. However, in other ELANe, such a molecular CGM was not detected \citep{Decarli2021}. To study the CGM around active galaxies in the Early Universe in a systematic way, we started a survey with the Atacama Large Millimeter/submillimeter Array (ALMA), ALMA Compact Array (ACA), and Karl G. Jansky Very Large Array (VLA) entitled SUPERCOLD-CGM: “Survey of Protocluster ELANe Revealing CO/CI in the Ly$\alpha$ Detected CGM”. The goal of the SUPERCOLD-CGM survey is to use radio telescopes with short baseline configurations to image low-surface-brightness CO and [C\,{\sc i}]\ emission of widespread cold molecular gas around the massive host galaxies of active galactic nuclei (AGN) at high-$z$. Our initial ALMA/ACA sample consists of 10 type-I quasi-stellar objects (QSOs) at $z\sim$2, which were selected from the SDSS-IV/eBOSS sample. \citep[e.g.,][]{Paris2017} These QSOs contain Enormous Ly$\alpha$ Nebulae (ELANe) mapped by the Keck Cosmic Web Imager (KCWI) \citep{Cai2019}. Here we present observations sensitive to low-surface-brightness emission of molecular gas, CO(4-3), of Q1228+3128 at $z=2.2218$. Q1228+3128 is the most extended and brightest Ly$\alpha$ nebula in our sample of ELANe. We assume a ${\Lambda}$CDM cosmology with H$_{0} = 70$\,km s$^{-1}$\,Mpc$^{-1}$, $\Omega_\textrm{M} = 0.30$ and $\Omega_{\Lambda} = 0.70$, i.e., 8.25 kpc/$^{\prime\prime}$ and D$_{L}$= 17620 Mpc at $z=2.2218$. \section{Observation and data reduction}\label{Observations} We observed Q1228+3128 (12:28:24.97, 31:28:37.70) at $z=2.2218$ for 1.5 hrs on-source during ALMA cycle-7 on 20 and 23 Nov 2019 and 4 Jan 2020 with a compact configuration(C43-2) of the 12m Array (51 antennas), which baselines range from 15 to 314m, as well as for 12.4 hrs between Oct 2019 $\sim$\ Mar 2020 with the ACA 7m Array (12 antennas). We simultaneously centered two adjacent spectral windows of 1.875 GHz on CO(4-3) at $\nu_{\rm obs}$\,$\sim$\,143.10 GHz ($\nu_{\rm rest}$\,=\,461.04 GHz) and another two spectral windows to cover the continuum but also including part of the [C\,{\sc i}]~$^{3}$P$_{1}$-$^{3}$P$_{0}$\ line, which is also detected but much weaker and fell at the outer edge of the band. The [C\,{\sc i}]\ results will be discussed in a future paper. The ALMA data were reduced in CASA 5.6.1-8 (Common Astronomy Software Applications; \cite{McMullin2007}). To calibrate the data, we used the archival calibration script supplied by ALMA. After the calibration, we subtracted the continuum from the data by fitting a straight line to the line-free channels in the $uv$-domain, and then combined the respective 12m and 7m datasets in preparation for imaging in tclean\footnote{https://casadocs.readthedocs.io/en/stable/api/tt/casatasks.\ imaging.tclean.html}. In the step of tclean, we imaged the 12m data using natural weighting, and also imaged the combined 12m+7m datasets using various degree of tapering\footnote{Tapering means applying a Gaussian taper to the weights of the $uv$-data during imaging, which increases the weighting of the shorter baselines. This decreases spatial resolution and increases the surface brightness sensitivity for detecting extended emission.}. In this paper, we present the combined 12m+7m data tapered to the baseline of 39m. We also present the untapered (full resolution) data derived from the continuum-subtracted 12m Array. In addition, we obtained multi-frequency synthesis images of the 150 GHz rest-frame continuum by imaging the line-free channels of the 12m and 7m data using natural weighting, which revealed an unresolved point source with flux density $S_{\rm 150 GHz}$\,=\,8.1\,$\pm$\,0.5 mJy\,beam$^{-1}$. For the tapered and untapered CO(4-3) line-data sets, we imaged our field out to $\sim$70$^{\prime\prime}$ and binned both of them to 60 km\,s$^{-1}$\ per channel. We then convolved the tapered CO(4-3) datacube with a 5.0$^{\prime\prime}\times$5.0$^{\prime\prime}$ Gaussian to obtain a smoothed synthesized beam of 8.0$^{\prime\prime}\times$7.5$^{\prime\prime}$ with PA=24.2$^{\circ}$. The synthesized beam size of the untapered CO(4-3) datacube is 2.8$^{\prime\prime}\times$2.0$^{\prime\prime}$ with PA=13.6$^{\circ}$. The root-mean-square (rms) noise of the untapered and smoothed tapered CO(4-3) datacubes is 0.17 and 0.32 mJy\,beam$^{-1}$ channel$^{-1}$, respectively. To get position-velocity (P-V) maps, we binned our smoothed tapered CO(4-3) datacube to 180 km\,s$^{-1}$\ per channel, resulting in a noise of 0.18 mJy\,beam$^{-1}$ channel$^{-1}$. To check the validity of the features that we describe in this paper, we also performed a self calibration using the model of the continuum image. All features that we describe in this paper where still present in the self-calibrated datacubes. However, since the continuum is faint, our data quality did not improve after the self calibration. Therefore we present in this paper the data products without self calibration applied. Also, we found that the flux density of the 12m and 7m data was consistent when comparing the continuum image of the unresolved radio continuum in the untapered 12m data and the smoothed tapered 12m+7m data, which confirmed that the flux calibration between the different data sets is accurate. \begin{deluxetable*}{lccccccc} \tablecaption{Results of the Gaussian fits to the CO(4-3) emission line spectrum of the QSO and extended region \label{tab:gauss_fit}} \tablehead{\colhead{Component} & \colhead{$v$} & \colhead{$\sigma_v$} & \colhead{$I_{\nu}$} & \colhead{$L^{\prime}_{\rm CO(4-3)}$} & \colhead{M$_\mathrm{H_2}$} \\ \colhead{} & \colhead{[km\,s$^{-1}$]} & \colhead{[km\,s$^{-1}$]} & \colhead{[Jy km\,s$^{-1}$]} & \colhead{[10$^{10}$ K km\,s$^{-1}$\ pc$^{2}$]} & \colhead{10$^{10}$ M$_{\odot}$} } \startdata Narrow & -21 $\pm$ 17 & 130 $\pm$ 20 & 0.64 $\pm$ 0.13 &0.94 $\pm$ 0.19&3.4 $\pm$ 0.7\\ Broad & -346 $\pm$ 130&495 $\pm$ 96&0.79 $\pm$ 0.18&1.17 $\pm$ 0.26&4.2$\pm$ 0.9\\ Extended emission &-413 $\pm$ 45&182 $\pm$ 44&0.43 $\pm$ 0.09 &0.62 $\pm$ 0.13&5.0 $\pm$ 1.0 \enddata \end{deluxetable*} \section{Results}\label{Results} The left panel of Fig.~\ref{fig:spectrum0} shows the total intensity map of CO(4-3) collapsed from the smoothed tapered datacube integrated within the velocity range of $-596<v< -236$ km\,s$^{-1}$, and the right panel shows the Position-Velocity (P-V) map extracted along the P-V slice-direction indicated in the left panel. Both of them revealed a very extended reservoir of CO, which is spreading more than 100 kpc in NE direction. "Q" and "E" resemble the QSO and the extended region respectively. The left panel of Fig.~\ref{fig:spectrum1} shows the 1D spectrum extracted from the smoothed tapered CO(4-3) datacube against the peak of the CO emission associated with the quasar. To measure the quasar centroid, we collapsed a total intensity broad-band map integrated within the velocity range of $-1217$ km\,s$^{-1}$\ $<v< 883$ km\,s$^{-1}$\ from the untapered datacube and then regard the brightest pixel in CO as the QSO centroid. This is also consistent with the optical coordinate of the QSO. The spectrum was fitted by a double Gaussian, a narrow component to fit the central core, tracing the quiescent gas in the QSO, and a broad component to fit the broad wings. The curve fit Python package was used to do this fitting \footnote{https://docs.scipy.org/doc/scipy/reference/generated/\\scipy.optimize.curve\_fit.html}. We chose the area, center and sigma in the Gaussian function as free parameters, and regarded the 1 / rms of each channel as the weighting. The broad component in Fig.\,\ref{fig:spectrum1} (left) has a full width at half the maximum intensity of FWHM = 1160 km\,s$^{-1}$, which is significantly larger than what is typically for high-$z$ QSOs and Sub-Millimeter Galaxies \citep{Carilli_Walter2013}. We therefore argue that this broad component is most likely a massive outflow of molecular gas. The right panel of Fig.~\ref{fig:spectrum1} shows the 1D spectrum extracted against the peak of the CO(4-3) emission in the extended region from the smoothed tapered data cube after primary beam correction. The spectrum was fitted by a Gaussian Function (blue dash line) in the same way described above. The fitting results and the corresponding luminosity and gas mass are reported in Table\,\ref{tab:gauss_fit}. Fig.~\ref{fig:uv} in Appendix.2 shows an analysis of the extended CO emission in the $uv$-domain by plotting the $uv$-distance of the baselines against the real part of the visibility amplitudes in the extended region \citep{Ivison2010, Cicone2021}. With the length of baselines decreasing, the flux increases conspicuously. From the Gaussian fitting(red dash line in Fig.~\ref{fig:uv}), we derived a FWHM = (8.8 $\pm$ 1.7) $^{\prime\prime}$ of the extended CO emission in the image plane, which corresponds to a minimum spatial extent of 73\,$\pm$14 kpc. The zero-baseline flux is 1.03 $\pm$ 0.25 mJy, which is consistent with the right panel of Fig.~\ref{fig:spectrum1}. To estimate molecular gas masses, for the QSO, as thermal excitation is reasonable, we assume r$_{\rm 4-3/1-0}$ = $L^{\prime}_{\rm CO(4-3)}$/$L^{\prime}_{\rm CO(1-0)}=1$ \citep{Riechers2011} and for the extended emission we assume r$_{\rm 4-3/1-0}$ = $L^{\prime}_{\rm CO(4-3)}$/$L^{\prime}_{\rm CO(1-0)}=0.45$ \citep{Emonts2018}. The molecular gas mass M$_\mathrm{H_2}$ is derived from $L'_{\rm CO(1-0)}$ \citep{Solomon_Vanden_Bout2005}, assuming $\alpha_{\rm CO}$\,=\,3.6 M$_{\odot}$ (K km\,s$^{-1}$\ pc$^{2}$)$^{-1}$ \citep{Bolatto2013, Daddi2010, Genzel2010}. In this case, the molecular gas mass M$_\mathrm{H_2}$of the QSO host galaxy, outflow and extended region that we derived from the smoothed tapered datacube is (3.4 $\pm$ 0.7), (4.2 $\pm$ 0.9) and (5.0 $\pm$ 1.0) $\times$ 10$^{10}$ M$_{\odot}$, respectively. The left panel of Fig.~\ref{fig:spectrum2} shows the extended emission at two different resolutions. The red contours represent the total intensity map collapsed from all the line emission channels of the full-resolution (untapered) CO(4-3) datacube, which is spread across $\sim$25 kpc. The blue contours represent the total intensity map collapsed from the blue side of $-596<v< -236$ km\,s$^{-1}$\ of the smoothed tapered datacube, revealing emission on scales of more than 100 kpc. The right panel of Fig.~\ref{fig:spectrum2} shows the two components of the untapered CO(4-3) datacube separated spatially. The red and blue contours represent the quiescent gas in the QSO host galaxy and the blue-sided outflow, respectively. There is an offset of $\sim$15 kpc between the central QSO component and the peak of the CO emission in the outflow. We can make a rough estimate of the mass flow rate of the outflow if assume that the outflow originated from the QSO core and traveled at a velocity of $\Delta v$\,+\,0.5\,$\times$\,(FWHM$_{\rm outflow}$), with $\Delta v$ the velocity difference between the peak velocity of the narrow and broad component and FWHM\,=\,2.35$\sigma_{v}$ (Table \ref{tab:gauss_fit}). This results in an estimated outflow rate of \.{M}$_{\rm H2}$\,$\sim$\,2600 M$_{\odot}$\,yr$^{-1}$. The background in Fig.\,\ref{fig:spectrum2} shows the ALMA continuum image and the black dash arrow represents the radio-jet direction\citep{Helmboldt2007} which is the same as the outflow direction. The left panel of Fig.~\ref{fig:spectrum3} shows an optimally re-extracted image from PSF- and continuum-subtracted data previously obtained with the Keck Cosmic Web Imager of the Ly$\alpha$ nebula around Q1228+3128 \citep[see][]{Cai2019}. And the right panel of Fig.~\ref{fig:spectrum3} shows the kinematics image of the Ly$\alpha$ nebula in our CO(4-3) frame, with "0 km/s" corresponding to $z=2.2218$, determined from the narrow component of CO(4-3). \begin{figure*} \centering \includegraphics[width=1.0\textwidth]{np123.pdf} \caption{{\sl left}: Total intensity map collapsed from the smoothed tapered CO(4-3) datacube integrated within $(-596<v< -236)$ km\,s$^{-1}$ and 1$\sigma$ is 0.05 Jy beam$^{-1}$ km s$^{-1}$. {\sl right}: Position-Velocity (P-V) map extracted along the P-V slice-direction indicated in above panel with 1$\sigma$ equaling 0.18 mJy\,beam$^{-1}$ channel$^{-1}$. In both panels, contours start at 3$\sigma$ and increase with 1$\sigma$.} \label{fig:spectrum0} \end{figure*} \begin{figure*} \centering \includegraphics[width=1.0\textwidth]{newnp543210.pdf} \caption{{\sl left}: 1D spectrum of the beam-integrated CO(4-3) flux extracted from the smoothed tapered datacube against the peak of the CO emission associated with the quasar. A double Gaussian fit has been applied to the line profile(black), including a narrow systemic component which traces quiescent gas and a broad blueshifted line component which traces the outflow. The grey line shows the combination of the two Gaussian functions and the red spectrum in the bottom panel shows the residual. The black vertical dash line shows the mean redshift of diffuse Ly$\alpha$ emission in CO(4-3) frame(the same as the right panel). {\sl right}: 1D spectrum of the beam-integrated CO(4-3) flux extracted from the smoothed tapered datacube after primary beam correction against the peak of the CO emission in the extended region. Also, a Gaussian fit (blue dash line) has been applied to the line profile (black), and the red spectrum shows the residual.} \label{fig:spectrum1} \end{figure*} \begin{figure*} \centering \includegraphics[width=1.0\textwidth]{new1228F3.pdf} \caption{{\sl Left:} The blue contours show the total intensity CO(4-3) map from Fig. \ref{fig:spectrum0}. The red contours show the total intensity map collapsed from the untapered CO(4-3) datacube integrated within $v\in(-1217, 883)$ km\,s$^{-1}$ and 1$\sigma$ is 0.097 Jy beam$^{-1}$ km s$^{-1}$. The synthesized beams of the tapered and untapered data are shown in the bottom-left corner of this panel. {\sl Right:} Blue and red contours: Total intensity contour map collapsed from the untapered CO(4-3) datacube integrated within $v\in(-1217, -377)$ km\,s$^{-1}$ and $v\in(-377, 343)$ km\,s$^{-1}$ with 1$\sigma$ equals 0.046 and 0.047 Jy beam$^{-1}$ km s$^{-1}$ respectively. The velocity ranges across which we integrated the systemic and outflow signal are indicated with a red and blue bar in the quasar spectrum in Fig.~\ref{fig:spectrum1}. The background shows the ALMA continuum image. In both panels, contours start at 3$\sigma$ and increase with 1$\sigma$. The black dashed arrow represents the radio-jet direction\citep{Helmboldt2007}.} \label{fig:spectrum2} \end{figure*} \begin{figure*} \centering \includegraphics[width=1.0\textwidth]{realfilnal2.pdf} \caption{{\sl Left:} The black contours show the total intensity CO(4-3) map from Fig.~\ref{fig:spectrum0}, and the background shows the "Optimally extracted" Ly$\alpha$ nebula image from PSF- and continuum-subtracted KCWI data cubes for Q1228+3128 starting at 2$\sigma$, which corresponds to 1.9 $\times$ 10$^{-18}$ erg s$^{-1}$ cm$^{-2}$ arcsec$^{-2}$. {\sl Right:} The kinematics image of the Ly$\alpha$ nebula shown on the left side, with "0 km/s" corresponding to $z=2.2218$.} \label{fig:spectrum3} \end{figure*} \section{discussion} We have presented large-scale extended CO(4-3) emission spread across $\sim$100 kpc and a massive bluesided outflow from QSO 1228+3128 at $z=2.2218$ as part of the SUPERCOLD-CGM survey. For the central outflow, there is an offset of $\sim15$ kpc between the peak of the systemic CO emission in the host galaxy and the CO in the outflow component, with the outflow found towards the NE (see the right panel of Fig.3). The much more extended and quiescent CO reservoir, found after tapering and smoothing our data, stretches across $\sim100$ kpc in the same direction as the central outflow, and has roughly the same velocity as the bulk velocity of the outflow(see Fig.2). This demonstrates that the molecular outflow and the extended, quiescent molecular gas reservoir may have the same origin. After re-analysis of Ly$\alpha$ data of Q1228+3128 from the Keck Cosmic Web Imager, we converted the Ly$\alpha$ emission into our CO(4-3) redshift frame and found that the mean redshift of Ly$\alpha$ nebula is close to -350 km/s, which is very consistent with the bulk velocity of the outflow and extended CO reservoir. Our case of Q1228+3128 resembles the detection by \citet{Cicone2015} of a massive outflow of [C\,{\sc ii}]\ and a very extended [C\,{\sc ii}]\ reservoir from the radio-quiet QSO host galaxy SDSS J1148+5251 at $z > 6$, with filamentary structures that have a complex morphology and reach a maximum projected radius of $\sim$ 30 kpc. They found quasar feedback is likely the dominant mechanism driving the outflow, and their observations are qualitatively consistent with radiation-pressure driven dusty shells. Compared to SDSS J1148+5251, the molecular outflow and quiescent CO reservoir appear to be much more collimated in Q1228+3128. We know from existing radio data from FIRST (Faint Images of the Radio Sky at Twenty-Centimeters) \citep{Becker1994} and VLASS (VLA Sky Survey) \citep{Lacy2020} that Q1228+3128 is the only radio-detected QSO, or quasar, in our 10 targets sample. In addition, as a flat-spectrum radio source, it was shown by \citet{Helmboldt2007} that there is a radio-jet at a scale of a few tens of milli-arcsec in the same direction as our extended CO reservoir and massive outflow(see Fig.~\ref{fig:spectrum2}.) In high-z radio galaxies (HzRGs), the CO-emission is often aligned with the radio-jets, and found tens of kpc outside the host galaxy \citep{Klamer2004, Emonts2014, Falkendal2021}. The most intriguing part of our work is that Q1228+3128 is the first radio source at high-$z$ where both phenomena have been observed simultaneously. For our target, the outflow and extended CO reservoir have roughly the same bulk velocity (see Table\,\ref{tab:gauss_fit}), and are both aligned in the same direction. We propose the scenario that the extended CO-emitting gas is formed when the propagating radio-jet drives the outflow, shocks and cools pre-existing dusty halo gas \citep{Gullberg2016, Emonts2016}, and possibly also enriches the gas by dragging metals out into the environment \citep{Kirkpatrick2011}. If this scenario is viable, we can make the testable prediction that a faint extended radio-jet should be found to be aligned with the extended CO(4-3) emission with sensitive surface-brightness (low resolution but high sensitivity on short baselines) radio imaging. Besides, the diffuse Ly$\alpha$ nebula also owns the same mean velocity as the extended CO reservoir. However, because the spatial distribution of the extended CO and Ly$\alpha$ emission appears to be almost perpendicular, the respective cold and warm gas phases may not represent a well-mixed CGM. \citet{Villar_Martin2003} resolved kinematically the emission from ambient non-shocked gas (the quiescent haloes) and the emission from (jet induced) shocked gas of a sample of 10 high red-shift radio galaxies at $z\sim 2.5$. They argue that the quasar continuum is the dominant excitation mechanism of the quiescent haloes along the radio axis. In our case, if the radio jet is responsible for the cooling and enrichment of gas in the CGM, then photo-ionization of the quasar would be expected to occur roughly along the same direction, which would not explain the perpendicular orientation of the extended CO and Ly$\alpha$ emission. Instead, an alternative scenario is that the Ly$\alpha$ emission may be infalling gas behind the quasar. It is widely recognized that the collisions with cold gas streams could excite Ly$\alpha$ emission \citep{Dijkstra_Loeb2009, Goerdt2010, Rosdahl_Blaizot2012, Vernet2017}. Observationally, \citet{Daddi2021} performed imaging of the Ly$\alpha$ kinematics across a 300 kpc-wide giant Ly$\alpha$ nebula centered on the massive galaxy group RO-1001, which contains three Ly$\alpha$-emitting filaments and may indicate the case for gas infall. An inflow of gas was also proposed by \citet{Vernet2017} to describe the Ly$\alpha$ properties of MRC\,0316-257 at $z$\,$\sim$\,3. The Ly$\alpha$ nebula of Q1228+3128 could present a similar case. Another alternative scenario is that there is a separate merging galaxy in the extended region, and that the extended molecular gas is tidal debris from galaxy interactions. Although we see a 3$\sigma$ detection of the extended region in the untapered CO(4-3) image, the total flux of the extended region in the untapered CO(4-3) image is only $\sim$40$\%$ of that in the smoothed tapered image, meaning that the bulk of the extended emission is spread on scales that are over-resolved even with the compact 12m ALMA array (see Fig. \ref{fig:uv}). If there is a companion galaxy associated with part of the CO(4-3) emission, it is associated with a non-detection in the ALMA continuum image. When converting the 3$\sigma$ flux density of 0.15 mJy from the untapered continuum image to the IR luminosity($L_{\rm IR\_SF}$) integrated within the wavelength range 8$\sim$1000 $\mu$m, we derived an upper limit for the $L_{\rm IR}$ which is 3.0 $\times$ 10$^{12}$ L$_{\odot}$.\citep{Wang2008} According to the correlation between $L^{\prime}_{\rm CO(4-3)}$ and $L_{\rm IR}$ described in \cite{Greve2014}, we derived a $L_{\rm IR}$ of the extended region which is (4.5 $\pm$ 1.0) $\times$ 10$^{11}$ L$_{\odot}$ from untapered $L^{\prime}_{\rm CO(4-3)}$. The fact that the $L_{\rm IR}$ limit for detecting the continuum is much higher than that calculated for CO(4-3) means we do not have the sensitivity at this frequency to detect the continuum. However, a deep optical image of Q1228 obtained with Keck(see Appendix.1) helped us to investigate the existence of the companion galaxy. Although the QSO was saturated, there is still a non-detection in the extended region. Using the 3$\sigma$ flux density of 3.0 $\times$ 10$^{-30}$ erg s$^{-1}$ cm$^{-2}$ Hz$^{-1}$(g$_{AB}$ $\sim$ 25 mags) from an aperture with diameter equating 2$^{\prime\prime}$, we derived an upper limit of the star formation rate(SFR) for the extended region from the deep optical image which is 2.4 M$_{\odot}$ yr$^{-1}$ \citep{Kroupa2001}. But the $L^{\prime}_{\rm CO(4-3)}$ predicts a SFR of 49 $\pm$ 12 M$_{\odot}$ yr$^{-1}$ \citep{Kennicutt1998}, which is much higher than the optical result. This, combined with the fact that the total amount of molecular gas that must be spread on large scales as part of the tidal debris would be comparatively large ($\sim$3\,$\times$\,10$^{10}$ M$_{\odot}$), suggests that the extended emission is not likely the results of a tidal interaction with a companion galaxy. \section{Acknowledgement} Z.C. and J.L. are supported by the National Key R\&D Program of China (grant No. 2018YFA0404503), the National Science Foundation of China (grant No. 12073014) and Tsinghua University Initiative Scientific Research Program (grant No. 2019Z07L02017). MVM work was funded by grant PGC2018-094671-B-I00 funded by MCIN/AEI/10.13039/501100011033 and by the European Union NextGenerationEU/PRTR. We thank the anonymous referee for the very valuable feedback. This paper makes use of the following ALMA data: ADS/JAO.ALMA$\#$2019.1.01251.S. ALMA is a partnership of ESO (representing its member states), NSF (USA) and NINS (Japan), together with NRC (Canada), MOST and ASIAA (Taiwan), and KASI (Republic of Korea), in cooperation with the Republic of Chile. The Joint ALMA Observatory is operated by ESO, AUI/NRAO and NAOJ. The National Radio Astronomy Observatory is a facility of the National Science Foundation operated under cooperative agreement by Associated Universities, Inc.
\section{Introduction} \label{intro} The occurrence of flat, non-dispersive energy bands in periodic crystalline lattice geometries~\cite{leykam1,flach,leykam2}, and a revelation of the marvels of topological phase transitions along with the concepts of symmetry protected edge states~\cite{asboth,su,heeger,zhao,dias1,dias2,dias3}, have been two important areas (among many) in condensed matter physics that have spurred immense research activity over a period of two decades now. The flatband (FB) networks, realized experimentally in the arena of photonics~\cite{seba1,rodrigo,seba2}, using ultrafast laser writing techniques, have unfolded a particularly interesting working platform where one encounters a class of perfectly localized compact modes, the so called `compact localized states' (CLS). The CLS's arise due to certain special geometries embedded in a perfectly periodic lattice, leading to a destructive quantum interference between different connecting paths. The CLS's are the Hamiltonian eigenstates, and are marked by strictly vanishing amplitudes outside a spatial subcluster of the lattice points in a given geometry. In recent times, topological flat bands in decorated, Archimedian lattices in two dimensions have drawn considerable interest~\cite{biplab1,biplab2,crasto,yan}. The CLS's have also been identified as prospective candidates for the storage and transfer of quantum information~\cite{rontgen}. This special geometry-induced localization may easily be differentiated from its counterpart, viz, the canonical case of a disorder-driven Anderson localization~\cite{anderson}. The path breaking idea of a `topological' phase transition was put forward in the early 1970's~\cite{thouless1}. It was argued that a two dimensional system could exhibit a phase transition, engineered by the topological defects (vortices), that didn't break the Landau symmetry, as observed in the conventional phase transitions. Instead, it changed the {\it topology} of the system. The concept of the topological phases was further invoked to explain the remarkably precise quantization of the Hall conductivity in two dimensional electronic systems~\cite{thouless2}, and this made `topology' the arena of an intense research in condensed matter theory and experiments in the last couple of decades~\cite{dalibard}. The two fields of interest, as described above, perfectly amalgamate in the analysis of electronic or photonic modes of excitations described on one, quasi-one or two dimensional decorated lattices. Experimental realization of flat bands with non-trivial topology in kagom\'{e} lattice structure~\cite{li} and, the Lieb architecture~\cite{xia,dias3,rodrigo} has been achieved in optical~\cite{taie}, and in ultracold atomic lattices~\cite{nathan,bloch}. These geometries have subsequently been analysed to unravel non-trivial localization properties~\cite{rudo1,rudo2}. The canonical example of a Su-Schrieffer-Heeger (SSH) chain~\cite{asboth,su}, that triggered the fundamental interest in the study of topological properties has also been an inspiration in the quest for a richer variety of topological properties in low dimensional lattice models with a nominal quasi-one dimensionality introduced in the systems. The simplest extensions have been the so called `coupled SSH chains'~\cite{padavic,sen,zhang}, and the preceding work on the chiral ladder models~\cite{hugel}. These quasi-one dimensional models generally consist of two strands, and in a way, simulate the optical ladders loaded with cold atoms, systems that are now experimentally realizable in optical lattice-based experiments~\cite{aidelsburger}. \begin{figure}[ht] \centering \includegraphics[clip,width=\columnwidth,angle=0]{ladder.png} \caption{(Color online) A quasi-one dimensional $N$-strand ladder network. The nearest neighbor hopping integrals along $x$ and $y$-directions are $t_x$ and $t_y$ respectively. The second neighbor hopping, along the diagonals, alternate between the values $u$ (blue) and $v$ (red), as shown.} \label{ladder} \end{figure} The Creutz ladders~\cite{creutz} form a substantial part of the research focused on quasi-one dimensional ladder networks - chiral or non-chiral. Such topological ladders or their equivalents\cite{bermudez,cuadra,zurita} are realized experimentally using the laser assisted tunnelling, and are now drawing serious attention from the experimentalists~\cite{aidelsburger,atala,junemann}. These systems have been really useful in unmasking the two dimensional topological phases and new symmetry classification schemes from their apparent one dimensional character~\cite{hugel}. Interestingly, the ladder networks belonging to the Creutz family have also been scrutinized in respect of the flat energy bands~\cite{orito}, their identity as a flat-band topological insulator~\cite{zurita}, or as a prototype system exhibiting the flat band many body localization~\cite{kuno}, to name a few (but definitely, not all) exciting recent works. Motivated by the eruption of these developments, in the present communication we examine an hitherto unexamined (to the best of our knowledge) quasi-one dimensional network, namely, a Creutz strip network (CSN), in search of any flat bands and a topological phase transition. We choose the CSN to have an infinite extent along the $x$-direction, being restricted to a finite, but arbitrarily large number of strands $N$ in the $y$-direction. We introduce a staggered distribution of the second neighbor hopping along the $x$-axis, as shown in Fig. \ref{ladder}, making it belong to a class of an extended SSH model, where the staggering is introduced only in the `connectivity' among the distant neighbors. We introduce a simple real space decimation scheme to discern the non-dispersive, flat energy bands occurring in such systems. The decimation scheme explains the degeneracy of the flat bands and also yields the condition needed to lift the degeneracy. Apart from exploring the flat bands, we explicitly work out the condition of observing the topological phase transition, based again on the prescribed real space decimation method. The topological invariant, viz, the Zak phase~\cite{zak} is calculated and the topologically protected edge states, that pay a tribute to the bulk-boundary correspondence~\cite{asboth}, are obtained and discussed. In what follows we describe our findings. In section II we elaborate on how to extract the flat, non-dispersive bands in a CSN, as proposed here. The occurrence of degeneracy and its lifting is made clear by exploiting a real space decimation scheme that is simple and intuitively appealing. The cases of a two and a three strand CSN are explicitly discussed and the general $N$-strand case follows easily. Section III discusses the topological properties of the strip, namely, the topological invariant, the edge states and all that. In section IV we draw our conclusion. \section{Discerning the Flat Bands} Let's refer to Fig.~\ref{ladder} that represents an $N$-strand CSN, with an infinite extent along the $x$-axis. The analysis begins with the tight binding Hamiltonian, \begin{equation} H = \epsilon \sum_j c_j^\dag ~ c_j + \sum_{j,k} [ t_{jk}~ c_j^\dag c_k + h.c.] \label{ham} \end{equation} Here, $\epsilon$ is the `on-site' potential, taken a constant throughout. The hopping (overlap) integral $t_{jk}=t_x$ for hopping between the nearest neighbors along the $x$-axis. Along the $y$-axis, we assume hopping between the nearest neighboring strands only, and this hopping integral is designated by $t_y$. The staggered second neighbor interactions are along the diagonals, and alternate between the values $u$ (blue), and $v$ (red) along the $x$-axis. It should be noted that, such an $N$-strand mesh, in the presence of the second neighbor (diagonal) hopping integrals, makes the sites sitting on the edges, in the $y$-direction, to have a coordination number equal to four. The sites in the bulk of the system naturally, have eight nearest neighbors. Knowing the existence, if any, of the flat, non-dispersive bands, is thus a non-trivial task. Our scheme explains how the flat bands can occur, and for what choices of the parameters. \begin{figure}[ht] \centering (a) \includegraphics[width=0.40\columnwidth]{binaryladder-disp-l1-1-l2-1.png} (b) \includegraphics[width=0.40\columnwidth]{binaryladder-disp-l1-1-l2-2.png}\\ (c) \includegraphics[width=0.36\columnwidth]{threearmladder-disp-l1-1-l2-1.png} (d) \includegraphics[width=0.41\columnwidth]{threearmladder-disp-l1-1-l2-2.png} \caption{(Color online) Energy-momentum dispersion relation for \textit{two-strand} (a,b) and \textit{three-strand} (c,d) ladder networks. The values of the parameters are respectively (a) $t_x = 1$, $t_y = 4$, $u = 1 = v$ and (b) $t_x = 1$, $t_y = 4$, $u = 1$, $v = 2$, (c) $t_x = \sqrt{2}$, $t_y = 8$, $u= 1 = v$ and (d) $t_x = \sqrt{2}$, $t_y = 8$, $u = 1$, $ v = 2$. For both the cases, when $u = v $ the flat band is doubly degenerate while the degeneracy is removed when $u \ne v$.} \label{ladderdisp} \end{figure} Let us now explain the basic working principle first in terms of a $2$-strand ladder with staggered second neighbor interactions, and then for a three-strand ladder. In each case we restrict ourselves to only two kinds of second neighbor hoppings, though the scheme for a general $N$ with any number of staggered diagonal hopping integrals follow a similar analysis. Definitely these latter cases offer a richer in variety in terms of the flat bands (and topological properties as well) - their energies and degeneracies. \subsection{Flat bands in a Creutz strip: degeneracy and it's lifting} \subsubsection{ A two-strand ladder with staggered second neighbor hopping} Fig.~\ref{ssh2strand}(a) shows a two-strand CSN with a periodic arrangement of second neighbor hopping (along the diagonals) integrals. We see that, there is a two-sublattice structure, $A$, and $B$ (shaded in golden and sky blue respectively), depending on the arrangement of the second neighbor hoppings on either side of $A$ and $B$. Sites on one sublattice, say $A$, have the diagonal connection (hopping) $u$ to their left, and $v$ to their right, and for the sites belonging to the $B$ sublattice, it is just the opposite. The time independent Schr\"{o}dinger equation can be cast in the equivalent `difference equation' forms, for any pair of sites $(j,1)$ and $(j,2)$ along the $j$-th rung of the ladder, as the following pairs of equations: \begin{widetext} \begin{eqnarray} (E - \epsilon)\psi_{j,1} & = & t_x (\psi_{j+1,1} + \psi_{j-1,1} ) + t_y \psi_{j,2} + u \psi_{j-1,2} + v \psi_{j+1,2} \nonumber \\ (E - \epsilon)\psi_{j,2} & = & t_x (\psi_{j+1,2} + \psi_{j-1,2} ) + t_y \psi_{j,1} + u \psi_{j-1, 1} + v \psi_{j+1, 1} \label{diff} \end{eqnarray} \end{widetext} It is obvious that, if the site $j$ belongs to the $A (B)$-sublattice, then all its neighbors, nearest of the next nearest, belong to the sublattice $B (A)$. Let us sequentially subtract and add the second equation in Eq.\eqref{diff} from (to) the first, and define $\phi_{j,1}=\psi_{j,1} - \psi_{j,2}$, and $\phi_{j,2}=\psi_{j,1} + \psi_{j,2}$ That is, we change the basis. Then from Eq.~\eqref{diff} we arrive at a simpler set of {\it decoupled} equations in this new basis, viz. \begin{eqnarray} [E-(\epsilon-t_y)]\phi_{j,1} & = & (t_x-u)\phi_{j-1,1} + (t_x-v) \phi_{j+1,1} \nonumber \\ \left [ E - (\epsilon+t_y) \right ] \phi_{j,2} & = & (t_x+u) \phi_{j-1,2} + (t_x+v) \phi_{j+1,2} \nonumber \\ \label{binary} \end{eqnarray} A look at the two equations in Eq.~\eqref{binary} immediately reveals that, the change of basis, from $\psi_j$ to $\phi_j$ casts the pair of original equations in Eq.~\eqref{diff} into a pair of equations, each representing a single, perfectly periodic chain with a staggered, alternating {\it effective} pair of hopping integrals $t_x - u$, and $t_x-v$ for the first, and $t_x + u$ and $t_x + v$ for the second. The effective on-site potentials read $\epsilon-t_y$, and $\epsilon + t_y$ respectively. Evidently, no physics is lost in this transformation. The original two-strand ladder is shown in Fig.~\ref{ssh2strand} (a), and the effective one dimensional chain, described in the new basis $\{\phi_{j,1} \equiv \psi_{j,1}-\psi_{j,2}\}, j \in [-\infty,\infty]$ is shown in Fig.~\eqref{ssh2strand} (b) respectively. \begin{figure}[ht] \centering \includegraphics[width=\columnwidth]{ssh2strand.png} \caption{(Color online) (a) A two-strand ladder network with staggered second neighbor hoppings $u$ (blue) and $v$ (red), and the two sublattices $A$ and $B$. (b) The corresponding effective one dimensional chain (cyan colored sites) with the renormalized on-site potential $\epsilon-t_y$, and the hopping integrals $t_x-u$ (double bond) and $t_x-v$ (single bond). (c) The second decimation of the alternate sites in (b) maps it into a uniform periodic chain with an energy dependent on-site potential $\mu$ (the green colored sites) and a constant, energy dependent renormalized hopping integral $\tau$.} \label{ssh2strand} \end{figure} Let us, without loss of any generality, pick up the first of the two equations in Eq.~\eqref{binary}. This equation can further be renormalized, by eliminating the amplitudes $\phi_{j-1,1}$ and $\phi_{j+1,1}$ at alternate sites, so as as to have a difference equation representing a periodic lattice with a {\it single} on-site potential $\mu$, and a {\it uniform} hopping integral $\tau$, both being functions of the energy $E$. The {\it final} lattice is shown in Fig.~\ref{ssh2strand}(c). The difference equation describing this lattice reads, \begin{equation} (E-\mu) \phi_{j,1} = \tau (\phi_{j-2,1} + \phi_{j+2,1}) \label{pure} \end{equation} with, \begin{eqnarray} \mu & = & \epsilon - t_y + \frac{(t_x-u)^2 + (t_x-v)^2}{E-\epsilon+t_y} \nonumber \\ \tau & = & \frac{(t_x - u) (t_x - v)}{E-\epsilon+t_y} \label{parameters} \end{eqnarray} The subscript $j$ in Eq.~\eqref{pure} runs over the the green colored sites in Fig.~\ref{ssh2strand}(c), that survive the decimation. The set of Eqs.~\eqref{parameters} immediately reveals that, if we select either $t_x=u$, or $t_x=v$, the right hand site of Eq.~\eqref{pure} becomes zero and consequently, Eq.~\eqref{pure} admits a {\it localized} atomic-like state at an energy, which is a solution of the equation $E-\mu =0$, that is, at $E=\epsilon - t_y \pm (v-u)$. This is a CLS, and gives a flat band. The energy eigenvalues can be easily verified from Fig.~\ref{ladderdisp}(a) and (b). The amplitudes of the wavefunction for such a FB can be worked out as well. One such configuration is $\psi_{j,1} = \pm \psi_{j,2} = 1$ (say) on sublattice $A$, and $\psi_{j,1} = \pm \psi_{j,2} =0$ on sublattice $B$, satisfying the Schr\"{o}dinger equation at the FB energy eigenvalues. Had we taken up the second equation of the set of Eq.~\eqref{binary}, the CLS would have appeared for $t_x = -u$ or $t_x = -v$, and at $E = \epsilon + t_y \pm (v+u)$. The dispersion relations obtained from the pair of equations in Eq.~\eqref{binary} are easily obtained after scaling them once more, by decimating the alternate sites, as explained before. The result is, \begin{widetext} \begin{equation} [E - (\epsilon \mp t_y)]^2 - [(t_x \mp u)^2 + (t_x \mp v)^2] - 2 (t_x \mp u) (t_x \mp v) \cos ka =0 \label{disp} \end{equation} \end{widetext} Here, $k$ is the wave vector, and $a$ is the lattice constant defined on the linear chain in Fig.~\ref{ssh2strand}(c). The sign `$-$' or `$+$' needs to be chosen depending on whether we are dealing with the first, or the second of the set of Eq.~\eqref{binary}. The non-dispersive bands can easily be traced back to the appropriate correlation between the hopping integrals. It is easy to see that $t_x=u$, or $t_x=v$ (or, $t_x=-u$, or $t_x=-v$) makes the equation independent of the wave vector $k$ and the band becomes non-dispersive or flat. Also, the two-fold degeneracy for $t_x=u=v$ is obvious. \begin{figure}[ht] \centering (a) \includegraphics[width=0.4\columnwidth]{binary-ladderdos1.png} (b) \includegraphics[width=0.4\columnwidth]{binary-ladderdos21.png}\\ (c) \includegraphics[width=0.40\columnwidth]{3strandladderdos1.png} (d) \includegraphics[width=0.40\columnwidth]{3strandladderdos21.png} \caption{(Color online) Variation of the density of states $(\rho)$ for a \textit{two-strand} (a,b) and \textit{three-strand} (c,d) CSN. The values of the parameters are respectively (a) $t_x = 1$, $t_y = 4$, $u = 1 = v$ and (b) $t_x = 1$, $t_y = 4$, $u = 1$, $v= 2$. The degenerate CLS at $E=-4$ for $u = v$ is seen to be present. The degeneracy is lifted for $u \ne v$, and the FB states appear at $E=-3$ ,$-5$. The topologically protected edge state lying in between, is discussed in text. In (c) we show the overall DOS and the two-fold degenerate FB for $t_x=\sqrt{2}$, $t_y=8$, $u=v=1$, and in (d) we select $t_x=\sqrt{2}$, $t_y=8$, $u=1$, and $v=2$, to show the removal of the degeneracy of the FB's.} \label{dos} \end{figure} Let us specifically talk in respect of the basis $\{ \phi_{j,1} \equiv \psi_{j,1} - \psi_{j,2} \}, j \in [-\infty,\infty]$. For $v \ne u$, the degeneracy is lifted, but as we choose $t_x=u$ or $v$, the non-dispersive bands still show up at $E=-t_y \pm (v-u)$. The results tally exactly with Fig.~\ref{ladderdisp}, where, with $t_y=4$, $u=2$, and $v=1$, the flat bands appear at $E=-5$, and at $E=-3$ (Fig.~\ref{ladderdisp}(b)), while a doubly degenerate flat band appears for $u=v=1$ at $E=-t_y=-4$ (Fig.~\ref{ladderdisp}(a)). Energy $E$ is always measured in unit of $t_x$. We have chosen $\epsilon=0$. The two-fold degenerate CLS shows up at $E=-4$ in the display of the density of states (DOS) of a Creutz strip, and at $E=-3$ and at $E=-5$ when the degeneracy is lifted. Fig.~\ref{dos}(a) and (b) depict these cases respectively. The atomic-like CLS, that represents the FB is clearly visible in the density of states (DOS) spectrum shown in Fig.~\ref{dos}(a). The DOS is calculated using a Green's function formalism for a finite sized system. With the parameters chosen for the discussion so far, the DOS in Fig.~\ref{dos}(a) exhibits a sharp delta-like spike at $E=-4$, which is exactly the FB energy depicted in Fig.~\ref{ladderdisp}(a). The localized FB state appears outside the main band of extended states ranging between $E = [0,8]$ for the selection of the parameters elaborated in the text. With $u \ne v$ the degenerate FB in (a) splits into two, at $E=-3$ and $E=-5$, as we have already proved. There is a smaller localized peak in between these two FB states that corresponds to a topological edge state, as we will see later. Needless to say, similar arguments can be woven if we use the basis $\{ \phi_{j,2} \equiv \psi_{j,1} + \psi_{j,2} \}, j \in [-\infty,\infty]$. In this case we would need to set $t_x=-u$ or $t_x=-v$. The negative sign in front of the hopping integrals do not affect the energy spectrum. The flat band now appears at $E=t_y$. The degeneracy and its removal follow the same line of arguments. However, we have not shown this set of images here, to save space. Before we end this subsection, an obvious and a very pertinent discussion regarding Eq.~\eqref{pure} is in order. A situation with $\tau=0$ on the the right hand side of Eq.~\eqref{pure} is also satisfied by setting $E \ne \mu$, but with $\phi_{j,1} \equiv \psi_{j,1} - \psi_{j,2} = 0$. This implies $\psi_{j,1} = \psi_{j,2}$ for all $j$. We can easily exploit this information to work out the band of the allowed energy eigenvalues given by the second of the Eq.~\eqref{binary}. A simple algebra shows that the band edges obtained from the second equation in Eq.~\eqref{binary} are given by, \begin{equation} E = t_y \pm \sqrt{9 u^2 + v^2 + 6 u v} \label{edges} \end{equation} when we set $t_x=u$, for example. With $t_y = 4$, and $t_x=u=v=1$ the edges of the energy band turn out to be at $E=0$ and at $E=8$. These edges, as we mentioned just now, are obtained from the second of Eq.~\eqref{binary}. This is important, as we need to consider both the equations in Eq.~\eqref{binary} to get the full spectrum. The edge energy values exactly match with the DOS displayed in Fig.~\ref{dos}(a). There is a continuous distribution of the energy eigenvalues, all corresponding to Bloch-like extended states within this band. \begin{figure}[ht] \centering \includegraphics[width=\columnwidth]{ssh3strand.png} \caption{(Color online) The three-strand Creutz strip with infinite extent along $x$-direction. The $A$ and $B$ sublattices are highlighted.} \label{ssh3strand} \end{figure} \subsubsection{The three-strand ladder} The power of the proposed change of basis, resulting in a decoupling of the coupled difference equations for a multi-strand ladder, to discern the flat bands, is appreciated further if we consider a three-strand ladder, as shown in Fig.~\ref{ssh3strand}. The strands are marked as `$1$', `$2$' and `$3$', and the sublattices $A$ and $B$ are painted in golden and blue, just like before. Since we have three strands now, its advantageous to cast the difference equation in a matrix form, connecting the amplitudes of the wavefunction at the three sites along any vertical $j$-th strand on an $A$ (or, a $B$) sublattices. The matrix formalism was used earlier to study a quasiperiodic ladder network~\cite{shreekantha}, and a two dimensional system with correlated disorder~\cite{alberto}, and is used in the same spirit here. Let's define, for any sublattice $A$ or $B$, \begin{equation} \bf \Psi_{j} \equiv \left[ \begin{array}{c} \psi_{j,1} \\ \psi_{j,2} \\ \psi_{j,3} \end{array} \right ] \end{equation} where $j$ denotes the site index, and `1', `2' and `3' give the `strand index'. The difference equation, in matrix form, now appears to be, \begin{eqnarray} (E\bf I - \tilde {\bf \epsilon}) \bf \Psi_{j,A (B)} = \tilde{\bf t}_{L} \bf \Psi_{j-1, B (A)} + \tilde{\bf t}_{R} \bf \Psi_{j+1, B (A)} \label{diff3strand} \end{eqnarray} where, {\bf I} is the $3 \times 3$ unit matrix, $\tilde {\bf {\epsilon}}$ is the `potential matrix' given by, \begin{equation} \mathcal{\tilde \epsilon} = \left[ \begin{array}{cccccccccccccccc} \epsilon & t_y & 0 \\ t_y & \epsilon & t_y \\ 0 & t_y & \epsilon \end{array} \right ] \label{pot} \end{equation} The hopping matrices $\tilde{\bf t}_{L (R)}$ connecting the $j$-th rung on an $A$ sublattice to the $j-1$-th and the $j+1$-th ones on the $B$ sublattice on its left and right sides, \begin{equation} \tilde{\bf t}_L = \left[ \begin{array}{cccccccccccccccc} t_x & u & 0 \\ u & t_x & u \\ 0 & u & t_x \end{array} \right ] ~; \tilde{\bf t}_R = \left[ \begin{array}{cccccccccccccccc} t_x & v & 0 \\ v & t_x & v \\ 0 & v & t_x \end{array} \right ] \label{hop} \end{equation} Obviously, while writing the hopping matrices for the $B$ rung one needs to replace $u (v)$ by $v (u) $ in $\tilde{\bf t}_{L (R)}$. It is immediately verified that, the commutators $[\mathcal{\tilde \epsilon}, \tilde{\bf t}_L] = [\mathcal{\tilde \epsilon}, \tilde{\bf t}_R] = 0$ irrespective of the energy $E$. This means that, all the three matrices are simultaneously diagonalizable using the same matrix $\mathcal M$ (say). Taking advantage of this, we make a change of basis, going from the $\{\bf \Psi_j \}$ basis, to a new basis $\{ \bf \Phi_j \} = \mathcal M^{-1} \{ \bf \Psi_j \}$, which, when written explicitly reads, \begin{equation} \left [ \begin{array}{c} \phi_{j,1} \\ \phi_{j,2} \\ \phi_{j,3} \end{array} \right ] = \mathcal M^{-1} \left[ \begin{array}{c} \psi_{j,1} \\ \psi_{j,2} \\ \psi_{j,3} \end{array} \right ] \end{equation} In the new basis, we now have three decoupled equations corresponding to the strands 1, 2 and 3, viz, \begin{widetext} \begin{eqnarray} (E-\epsilon)~ \phi_{j,1} & = & t_x~(\phi_{j-1,1} + \phi_{j+1,1}) \nonumber \\ \left [E-(\epsilon-\sqrt{2} t_y) \right ] \phi_{j,2} & = & (t_x-\sqrt{2} u) ~\phi_{j-1,2} + (t_x-\sqrt{2} v)~ \phi_{j+1,2} \nonumber \\ \left [E-(\epsilon+\sqrt{2} t_y) \right ] \phi_{j,3} & = & (t_x+\sqrt{2} u) ~\phi_{j-1,3} + (t_x+\sqrt{2} v) ~\phi_{j+1,3} \label{diff3} \end{eqnarray} \end{widetext} It's now easy, in the spirit of the discussion, to analyze the existence of the FB's and check their dispersionless character using the decimation argument used for the two-strand network case. For example, in the first of the set of Eqs.~\eqref{diff3}, setting $t_x=0$ created a FB at $E=\epsilon$, irrespective of the choice of the second neighbor hoppings $u$ and $v$. This FB at $E=\epsilon$ will be present in all Creutz strips with an odd number of strands. The three-strand CSN in this case becomes an extended version of the simple diamond network used recently, to study the influence of a magnetic field on the FB's and the topological phases~\cite{amrita}. Similarly, from the second and the third of Eqs.~\eqref{diff3}, setting $t_x=\pm \sqrt{2}u=\pm \sqrt{2}v$ yield doubly degenerate FB's at $E=\epsilon-\sqrt{2}t_y$ and $E=\epsilon+\sqrt{2}t_y$ respectively. Making $u \ne v$ lifts the degeneracy. The threads of the arguments follow exactly the same line as discussed before, and need not be repeated here. The discussion above is corroborated by the DOS of a three strand Creutz ladder, as shown in Fig.~\ref{dos}(c) and (d). \begin{figure}[ht] \centering (a) \includegraphics[width=\columnwidth]{ssh3.png}\\ (b) \includegraphics[width=0.50\columnwidth]{tertiaryladderdisp1.png}\\ (c) \includegraphics[width=0.50\columnwidth]{tertiaryladderdisp2.png} \caption{(Color online) (a) A two-strand Creutz strip with a periodic repetition of three kinds of second neighbor (diagonal) hoppings $u$ (blue), $v$ (red) and $w$ (green). (b) The dispersion relation when $u=v \ne w$, revealing a two-fold degenerate flat band. (c) The removal of the degeneracy on making $u = w \ne v$ The values of the parameters are (b) $t_x = 1$, $t_y = 4$, $u = v = 1 = w$ and (c) $t_x = 1$, $t_y = 4$, $u = 1 = w$, $v = 2$ respectively.} \label{tertiary} \end{figure} Before we leave this section, its relevant to draw the attention of the reader to the fact that, the scheme laid out above works perfectly well to unravel the FB's and their degeneracies or the lifting of it, in an $N$-strand ladder network with {\it any number} of second neighbor interactions, arranged periodically. The same decoupling scheme, initiated by an appropriate change of basis will conveniently extract all the different combinations of the intra and inter-strand hopping integrals, need to enforce FB's in the energy spectra. The topological issues, that are discussed later, can also be understood in the same way as we do for the two, and the three strand ladder here. Though we decide not to go into such details, for the sake of completeness, we present an energy-momentum dispersion relation of a two-strand Creutz ladder with three kinds of second neighbor (diagonal hoppings) interactions $u$, $v$ and $w$ arranged periodically along the $x$ direction. The lattice and the dispersion relations are presented in Fig.~\ref{tertiary}. The degenerate FB appears in (a), while in (b) we see that the degeneracy is lifted just by making $u \ne v$. \section{Topological properties} Let us refer to the two-strand ladder network. The change of basis decouples the two strands, and each member of the set of two equations in Eq.~\eqref{binary} unfolds two different SSH chains with the staggered pairs of overlap integrals $(t_x-u, t_x-v)$ and $(t_x+u, t_x+v)$ respectively. Choosing any one of the equations, and setting say, $t_x - u > t_x-v$ or $t_x - u < t_x-v$ takes the system from one topological phase to another. \subsection{The Topological invariant} Let us get back to Fig.~\ref{ladderdisp} (b) and (d). To inspect the topological invariant, its quantization and the consequential topological phase transition, we write the Hamiltonian for a two-strand Creutz ladder in reciprocal space (k-space), viz, \begin{widetext} \begin{equation} \hat{\mathcal{H}}(k) = \left[ \begin{array}{cccccccccccccccc} 0 & t_y & t_{x} (1+e^{-2ika}) & u + v e^{-2ika} \\ t_y & 0 & u + v e^{-2ika} & t_{x} (1+e^{-2ika}) \\ t_{x} (1+e^{2ika}) & u +v e^{2ika} & 0 & t_y \\ u +v e^{2ika} & t_{x} (1+e^{2ika}) & t_y & 0 \end{array} \right ] \label{hamilton} \end{equation} \end{widetext} A similar Hamiltonian, but now of dimension $6 \times 6$ can easily be written down for a three-strand ladder. However, with increasing number of strands the matrix becomes more and more intricate, and a clear understanding of the dispersion relations and the topological aspects are conveniently obtained through the use of the decoupling scheme and the decimation technique. Here we discuss in terms of the two-strand case only, to save space. We set the lattice constant $a=1$, and $\epsilon=0$. It is seen here that, the matrix $\hat{\mathcal{H}}(k)$, is, by construction, time-reversal symmetric obeying $\hat{\mathcal{H}}(-k)^\ast = \hat{\mathcal{H}}(k)$, and also exhibits chiral symmetry. The chiral symmetry operator in this case is, \begin{equation} \hat{\Gamma} = \left[ \begin{array}{c|c} {\bf {\sigma_z}} & \mathcal{O} \\ \hline \mathcal{O} & {\bf {\sigma_z}} \end{array} \right] \label{chiral} \end{equation} where, $\bf{\sigma_z}$ is the Pauli matrix, and $\mathcal{O}$ represents a $2 \times 2$ null matrix. It is easily verified that, $\hat{\Gamma}~\hat{\mathcal{H}}(k)~\hat{\Gamma}^{\dag} = - \hat{\mathcal{H}}(k)$, the basic requirement for the system to exhibit chiral symmetry. This form of the Hamiltonian is also used to cross-check the dispersion relation and the FB's, that were initially obtained through decimation technique, and a decoupling of the coupled difference equations. Making $u \ne v$ makes the gap open up both for the two, and the three strand ladders (and subsequently, for an $N$-strand ladder). The opening of an energy gap that was closed for $u=v$ at the Brillouin zone boundary is indicative of a topological phase transition. We expect a topological invariant to be associated with this phenomenon, a quantity such as the Zak phase~\cite{zak} that flips its quantized value from {\it unity} (in unit of $\pi$) to {\it zero} corresponding to the non-trivial and the trivial insulating phases respectively. Recent experiments have suggested mechanisms for a possible measurement of this topological invariant~\cite{atala}. The Zak phase for the $n$-th bulk bands is defined as, \begin{equation} Z = \oint_{BZ} \mathcal{A}_{nk}(k) dk \label{zak} \end{equation} where $\mathcal{A}_{nk}$ is called the Berry curvature of the $n$-th Bloch eigenstate, which is again defined as, \begin{equation} \mathcal{A}_{n{k}}(k)= \bra{\psi_{n{k}}}\ket{\frac{d\psi_{nk}}{dk}} \end{equation} The integral is performed around a closed loop in the Brillouin zone, and $\ket{\psi_{nk}}$ is the $n$-th Bloch state. We use the Wilson loop approach~\cite{fukui}, a gauge invariant formalism. It protects the numerical value of the Zak phase against any arbitrary phase change of Bloch wavefunction. In Fig.~\ref{ladderdisp}(b) the bands exhibit an opening of the energy gap at the Brillouin zone boundary, and for $u<v$ the Zak phase assumes a quantized value of $\pi$, including the two non-degenerate FB's. With $u>v$ the Zak phase is identically zero for every band, confirming a topological phase transition in the Creutz ladders. Incidentally, it is observed that, experimental realization of topological FB's in a frustrated kagom\'{e} metal has recently been reported~\cite{kang}. A theoretical analysis of {\it nearly} flat bands with non-trivial topology has previously been pointed out in the literature~\cite{sankar}. The present geometry, simpler in nature may be inspiring to experimentalists, to test the existence of topological flat bands in a rectangular mesh. \subsection{The edge states} From the pair of Eqs.~\eqref{binary}, each one of which represents an SSH chain with $u \ne v$, it is easy to work out the chiral symmetry protected edge states when one has a finite array of the unit cells. The analyses go exactly parallel to what we already do for a normal SSH model, and need not be repeated here. However, the results, as depicted in Fig.~\ref{edge-twoarm} for a two-strand and a three-strand CSN may be elaborated a bit. For example, in case of a two-strand CSN, from the first of the Eqs.~\eqref{binary}, representing an effective SSH chain in the basis $\phi_{j,1} = \psi_{j,1} - \psi_{j,2}$, an edge state exists at $E= \epsilon - t_y$ if one deals with a finite segment of such an {\it effective} SSH chain with an integer number of unit cells. With $t_x=u \ne v$, this state is topologically non-trivial, as the corresponding Zak phase is quantized in units of $\pi$ (the bulk-boundary correspondence). This is exactly what we see when we deal with the full two-strand Creutz network, represented by the Hamiltonian in Eq.~\eqref{hamilton}. With $\epsilon=0$, and $t_y=4$, the topologically protected edge state appears at $E=-4$. Similarly, its other variant, obtained from the second of the Eqs.~\eqref{binary}, is at $E=4$. The edge states for a 3-strand ladder appear when we set $t_x = \sqrt{2} u$. With $u=1$, the state appears at $E=\sqrt{2} t_y$, as is seen in Fig.~\ref{edge-twoarm}(b), where we have set $t_y=8$. The distribution of the amplitudes in both the two-strand and the three-strand cases are shown in Fig.~\ref{edgeampli-twoarm}. The edge states at $E=-t_y$ (for the two-strand CSN, in Fig.~\ref{edgeampli-twoarm}(a)) and at $E=- \sqrt{2} t_y$ (for the three-strand CSN, in Fig.~\ref{edgeampli-twoarm}(c)) are sharply localized around the left edges of the sample, while the states with $E=t_y$ (Fig.~\ref{edgeampli-twoarm}(b)) and $E=\sqrt{2}t_y$ (Fig.~\ref{edgeampli-twoarm}(d)) corresponding to the two- and the three-strands CSN's exhibit an exponentially decaying penetration into the bulk of the system. \begin{figure}[ht] (a)\includegraphics[width=0.65\columnwidth]{edge-2-tx-1-ty-4-l1-1-l2-2.png}\\ (b)\includegraphics[width=0.65\columnwidth]{edge-3-tx-root2-ty-8-l1-1-l2-205.png} \caption{(Color online) Distribution of energy spectra for a two arm and three arm Creutz strip network with open boundary condition for $N=20$ unit cells. The values of the parameters are chosen as (a) $t_x = 1$, $t_y = 4$, $u = 1$, $v = 2$. (b) $t_x = \sqrt{2}$, $t_y = 8$, $u = 1$, $v = 2.5$. The pairs of edge states are at (a) $\pm 4$, and (b) $\pm \sqrt{2} t_y$ and placed on blue dashed lines.} \label{edge-twoarm} \end{figure} \begin{figure}[ht] (a)\includegraphics[width=0.40\columnwidth]{ladder-two-e-m4.png} (b)\includegraphics[width=0.40\columnwidth]{ladder-two-e-4-.png}\\ (c)\includegraphics[width=0.40\columnwidth]{ladder-3arm-e-m1.png} (d)\includegraphics[width=0.40\columnwidth]{ladder-3arm-e-1.png}\ \caption{(Color online) Amplitude distributions of two pairs of in-gap edge states with energies $E = \pm 4$ and $E = \pm \sqrt{2} t_y$ for a \textit{two-strand} and a \textit{three-strand} ladder network respectively with open boundary condition for $N=20$ unit cells. The values of the parameters are (a,b) $t_x = 1$, $t_y = 4$, $u = 1$, $v = 2$ and (c,d) $t_x = \sqrt{2}$, $t_y = 8$, $u = 1$, $v = 2$. Here the wavefunctions for energies (a) $E = -t_y$ and (c) $E = -\sqrt{2} t_y$ are sharply confined only at the left rung of both ladder networks. (b,d) portray a decay of wave amplitudes from the left edge of both ladder networks respectively for the energy (b) $E= t_y$ (two-strand case) and (d) $E= \sqrt{2} t_y$ (three-strand case).} \label{edgeampli-twoarm} \end{figure} \section{Conclusion} We have shown how a suitable change of basis can turn out to be instrumental in bringing out the flat band states in an $N$-strand Creutz ladder. A simple real space decimation scheme enables us to determine the criteria for degeneracy, or it's removal. The second neighbor staggered hopping, be it a binary or a higher order staggering, unravels the topological features of the system. This latter observation is facilitated again by the change of basis technique, that unveils the hidden SSH character in the Creutz strip. The topological invariant and the edge states have been explicitly obtained. The present day advancement in designing tailor-made optical and cold atom systems is inspiring and the present analysis may be put to test and be used to suggest possible applications. \section{Acknowledgments} A. M. acknowledges DST for providing her INSPIRE Fellowship $[IF160437]$. Both A. M. and A. N. thank Presidency University for providing the computational facility.
\section{Introduction}\label{sec:introduction} Numerous searches for physics beyond the standard model (SM) at the CERN LHC target weakly interacting massive particles (WIMPs) as potential candidates to explain the nature of dark matter (DM). These WIMPs are predicted to be produced either directly through the interaction of SM particles or indirectly through the decays of new particles with higher mass. Stable WIMPs would escape undetected, yielding a characteristic signature of significant missing transverse momentum (\ptmiss) together with any energetic leptons, photons and hadronic jets produced in the cascade of the decaying higher-mass states. In scenarios where the WIMP is the lightest among new particles with a nearly degenerate mass spectrum, the production of these new particles leads to events with relatively low visible energy, and by inference, also low \ptmiss. These scenarios are referred to as compressed mass spectra. Among theories beyond the SM, Supersymmetry (SUSY) \cite{SUSY0,SUSY1,SUSY2,SUSY3,SUSY4} is particularly attractive owing to the fact that it can provide answers to questions unanswered in the context of the SM, such as the naturalness of the theory \cite{LightStop1,Witten:1981nf,Dimopoulos:1981zb} and the nature of DM. In models where $R$-parity conservation is imposed~\cite{Farrar:1978xj}, SUSY particles can only be produced in pairs, and each of their decay chains must lead to the lightest SUSY particle (LSP), which has to be stable. In many models this corresponds to the lightest neutralino (\PSGczDo), a neutral and stable WIMP, which is thus a viable DM candidate~\cite{PDG2020}. As indicated in several studies, such as in Refs.~\cite{LightStop1,LightStop2,Dimopoulos:1981zb,Witten:1981nf,Dine:1981za,Dimopoulos:1981au,Sakai:1981gr,Kaul:1981hi}, naturalness imposes constraints on the masses of higgsinos, top squarks, and gluinos, placing them potentially within the reach of the experiments at the LHC. Despite numerous searches for new particles, no experimental evidence for their production in LHC collisions has been found, and strong experimental constraints on the masses of SUSY particles have been set. As a result, the relevance of SUSY at the electroweak scale has come under intense scrutiny and several possibilities of how electroweak-scale SUSY might have escaped detection are being considered. Compressed mass spectra offer a possible scenario in which low-energy SUSY might have eluded experiments thus far, if the new particles exist in a region of SUSY parameter space where experimental searches have lower sensitivity. In compressed spectra scenarios, most of the energy and momentum of higher-mass states is carried away in the rest energy of the LSPs and the remaining detectable SM particles have low momentum. Events with such characteristics can be distinguished from bulk SM processes by requiring a jet with large transverse momentum (\pt) from initial state radiation (ISR) that leads to a large boost of the SUSY particle pair and thus large \ptmiss. Final states with only soft jets and moderate \ptmiss do not exhibit high sensitivity to new physics because of the presence of huge backgrounds from quantum chromodynamics (QCD) multijet production and $\PZ$+jets events with invisible \PZ boson decays. In the latter case, the SM background can be reduced effectively with the additional requirement of two or three soft light leptons (electrons or muons). These soft leptons, along with moderate or large \ptmiss, constitute the signature of the search presented in this paper. Specifically, the production of charginos (\PSGcpmDo) and neutralinos (\PSGczDo) with nearly degenerate mass, decaying to soft leptons and \ptmiss is considered. In what follows, neutralinos and charginos are collectively referred to as electroweakinos. The results are interpreted in the context of $R$-parity conserving SUSY. A simplified wino-bino model is probed. In such scenarios the LSP can be a WIMP DM candidate that was depleted in the early universe through co-annihilation processes to match the observed DM density \cite{Griest:1990kh,Edsjo:1997bg}. Light higgsinos, which are favored by naturalness arguments, are likely to be nearly degenerate in mass~\cite{Baer:2011ec,Baer:2014kya,Han:2013usa,Han:2014kaa}. Two minimal SUSY SM (MSSM) hypotheses, where the lightest electroweakinos are higgsino-like, are tested: a simplified higgsino model and a phenomenological MSSM higgsino model based on the pMSSM~\cite{Djouadi:1998di}. The search is also sensitive to top squark pair production models where a light top squark and the LSP are nearly degenerate in mass and the top squark decays directly to four fermions. The near-degeneracy in mass of the top squark and the LSP is a typical example of the so-called co-annihilation region, in which the LSP is the sole source of DM~\cite{Coannihilation}. Results of searches in final states with soft leptons and missing transverse momentum were previously presented by ATLAS and CMS using data sets at center of mass energy 8 and 13\TeV \cite{CMS:2015epp, sos2016,ATLAS:2017vat,PhysRevD.101.052005,ATLASTrilepton}. The previous iteration of this CMS analysis targeted signal events with moderate or large \ptmiss, by requiring an ISR jet and a pair of soft oppositely charged (opposite sign (OS)) leptons. The analysis presented in this paper extends the previous search with the addition of soft trilepton final states, as well as a relaxed selection on the dilepton invariant mass (from 4 to 1\GeV) and reoptimized signal regions, yielding extended sensitivity towards lower values of the \PSGczDt-\PSGczDo mass difference ($\Delta m$), where \PSGczDt is the next to lightest neutralino. The analysis also employs improved methods for the estimation of the nonprompt lepton background and uses the CMS data set collected during 2016--2018, corresponding to an integrated luminosity of up to 137\fbinv. The final results are extracted from a simultaneous binned maximum likelihood fit to the data of the signal and background expectations from all the signal and control regions. The experimental and theoretical uncertainties affecting the background and signal estimations are incorporated as nuisance parameters. The results of this analysis are included in tabulated form in the HEPData record~\cite{hepdata}. The paper is organized as follows: Section~\ref{sec:cms} summarizes the general features of the CMS detector, while Section~\ref{sec:sample} describes the data set and simulation samples used in this search. After defining the physics objects in Section~\ref{sec:objects}, the event selection and the signal regions of the search are described in Section~\ref{sec:eventselection}. The background estimation and the systematic uncertainties are discussed in Sections~\ref{sec:background} and \ref{sec:systematics}, respectively. The results of the search are presented in Section~\ref{sec:results} and their interpretations in the relevant SUSY scenarios in Section~\ref{sec:interpretations}. The summary of the paper is given in Section~\ref{sec:summary}. \section{The CMS detector}\label{sec:cms} The central feature of the CMS apparatus is a superconducting solenoid of 6\unit{m} internal diameter, providing a magnetic field of 3.8\unit{T}. Within the solenoid volume are a silicon pixel and strip tracker, a lead tungstate crystal electromagnetic calorimeter (ECAL), and a brass and scintillator hadron calorimeter (HCAL), each composed of a barrel and two endcap sections. Forward calorimeters extend the pseudorapidity ($\eta$) coverage provided by the barrel and endcap detectors. Muons are detected in gas-ionization chambers embedded in the steel flux-return yoke outside the solenoid. Events of interest are selected using a two-tiered trigger system. The first level, composed of custom hardware processors, uses information from the calorimeters and muon detectors to select events at a rate of around 100\unit{kHz} within a fixed latency of about 4\mus~\cite{Sirunyan:2020zal}. The second level, known as the high-level trigger, consists of a farm of processors running a version of the full event reconstruction software optimized for fast processing, and reduces the event rate to around 1\unit{kHz} before data storage~\cite{Khachatryan:2016bia}. A more detailed description of the CMS detector, together with a definition of the coordinate system used and the relevant kinematic variables, can be found in Ref.~\cite{Chatrchyan:2008zzk}. \section{Data and simulated samples}\label{sec:sample} The data used in this search have been collected by the high-level trigger system using three different algorithms (trigger paths): First, an inclusive trigger path requiring the selected events to have online $\ptmiss > 120\GeV$, where \ptmiss is the missing transverse momentum, corrected to account for the contribution of muons. Second, a trigger path that requires at least two muons in addition to \ptmiss, with a lower online threshold $\ptmiss > 60\GeV$. This trigger path also requires the online raw \ptmiss, \ie not corrected for the presence of muons, to be greater than 50\GeV, the \pt of each muon to satisfy $\pt > 3\GeV$, and the invariant mass of the muon pair to be between 3.8 and 56\GeV. As this last requirement becomes limiting for events used in the $\PW\PZ$-enriched region of the analysis (defined in Section~\ref{sec:background}), a third trigger path, with a requirement only on the \pt of the highest \pt muons ($\pt(\Pell_1) > 17\GeV$ and $\pt(\Pell_2) > 8\GeV$), is also used. Some of the trigger requirements affect the event selection, \eg, the relaxed selection of the dilepton invariant mass. This is discussed in greater detail in Section~\ref{sec:eventselection}. The data sample collected with the inclusive \ptmiss trigger corresponds to the total integrated luminosity of each year (35.9\fbinv in 2016, 41.5\fbinv in 2017, and 59.7\fbinv in 2018). The luminosity that corresponds to the dimuon-only trigger path is slightly lower in 2017 (36.7\fbinv), while it is slightly lower for the dimuon+\ptmiss trigger path in all years (33.2\fbinv in 2016, and 59.2\fbinv in 2018), due to the fact that the trigger paths were disabled for some runs. Simulated signal and major background processes, such as \ttbar, DY, $\PW$+jets, and $\PZ$+jets are generated with the \MGvATNLO \cite{Alwall:2014hca,Frederix:2012ps} event generator at leading order (LO) precision in perturbative QCD, with the MLM merging scheme \cite{Alwall:2007fs} used to consolidate additional partons from the event generator with parton shower generator. The diboson processes $\PW\PW$, $\PZ\PZ$, and $\PW\PGg$ are generated with the same event generator as above at next-to-LO (NLO) precision using the {FxFx} merging scheme~\cite{Frederix:2012ps}, while the $\PW\PZ$ process is generated at NLO with {\POWHEG}~v2.0~\cite{Nason:2004rx,Frixione:2007vw,Alioli:2010xd,Melia:2011tj,Nason:2013ydw}. Rare background processes (\eg, $\ttbar\PW$, $\ttbar\PZ$, $\PW\PW\PW$, $\PZ\PZ\PZ$, $\PW\PZ\PZ$, and $\PW\PW\PZ$) are also generated at NLO precision with \MGvATNLO \cite{Alwall:2014hca,Frederix:2012ps}. The rare background from single top quarks produced in association with a \PW boson is generated at NLO precision with {\POWHEG}~v1.0~\cite{Re:2010bp}. The \MGvATNLO versions used are the 2.2.2 (2.3.2 for $\ttbar\PZ$) for 2016 and 2.4.2 (2.6.5 for $\ttbar\PZ$) for 2017 and 2018. The NNPDF3.0~\cite{Ball:2014uwa} (2016) or NNPDF3.1~\cite{Ball2017} (2017 and 2018) LO and NLO parton distribution functions (PDF) are used for the simulated samples generated at LO and NLO respectively. Showering, hadronization, and the underlying event description are carried out using the \PYTHIA 8.212 package \cite{Sjostrand:2014zea} with the CUETP8M1 (CP5) underlying event tune for 2016~\cite{Skands:2014pea,CMS-PAS-GEN-14-001} (2017 and 2018~\cite{CP5tune}). A detailed simulation of the CMS detector, based on the \GEANTfour~\cite{Agostinelli:2002hh} package, is performed. The five signal models considered in this analysis include the production of electroweakinos and top squark pairs. Simplified models~\cite{Alwall:2008ag, LHCNewPhysicsWorkingGroup:2011mji,CMS:2013wdg} are used in which all SUSY particles other than the electroweakinos (or the top squarks) under study are assumed to be too massive to affect the analysis observables. Such models target scenarios with a bino LSP and wino next-to-LSP (NLSP), a higgsino LSP, and top squarks decaying to electroweakino LSPs. In all of the simplified models in this search, the assumption of 100\% branching fractions to a single, representative decay is made. A pMSSM-inspired model is also considered and is described below. Figure \ref{fig:Signals} shows representative diagrams for simplified models of electroweakino and top squark pair production. \begin{figure}[!hbtp] \centering \includegraphics[width=0.35\textwidth]{Figure_001-a.pdf} \includegraphics[width=0.35\textwidth]{Figure_001-b.pdf} \includegraphics[width=0.35\textwidth]{Figure_001-c.pdf} \includegraphics[width=0.35\textwidth]{Figure_001-d.pdf} \caption{Production and decay of electroweakinos in the \textsc{TChiWZ}\xspace model (upper left), in the higgsino simplified model (upper left and right), in the \textsc{T2b}ff\PSGczDo\xspace model (lower left) and in the \textsc{T2bW} model (lower right).} \label{fig:Signals} \end{figure} In the wino-bino simplified model (denoted as \textsc{TChiWZ}\xspace), the neutralino-chargino (\PSGczDt-\PSGcpmDo) pair production process is studied assuming a pure wino production cross section, where the $\PSGczDt$ and $\PSGcpmDo$ are assumed to be mass degenerate and taken to decay to the LSP via virtual \PZ\ and \PW\ bosons. For the higgsino simplified model, production through both $\PSGczDt\PSGcpmDo$ and $\PSGczDt\PSGczDo$ channels is considered and $m_{\PSGcpmDo}=\frac{1}{2}(m_{\PSGczDo}+m_{\PSGczDt})$ is assumed. In each case, the production cross sections are computed at NLO plus next-to-leading logarithmic (NLL) precision~\cite{Beenakker:1999xh,Fuks:2012qx,Fuks:2013vua} and correspond to the cases of pure wino and pure higgsino states, respectively. Mass differences between the $\PSGczDt$ and $\PSGczDo$ ranging from 1 to 50\GeV are considered in these simplified models of electroweakino production. A model inspired by the pMSSM is used for further interpretations in the case of a higgsino LSP. For a higgsino LSP in the pMSSM, the physical mass eigenstates of the $\PSGczDo$, $\PSGcpmDo$, and $\PSGczDt$ are determined primarily by the higgsino, bino, and wino mass parameters ($\mu$, $M_1$, and $M_2$, respectively) through the neutralino and chargino mixing matrices. The residual dependence on the ratio of the two vacuum expectation values \tanb of the Higgs fields is small when \tanb is relatively large; here, \tanb is fixed to 10. In this model, $\mu$ is scanned from 100 to 240\GeV and $M_1$ from 0.3 to 1.2\TeV with the electroweakino masses and branching fractions calculated from the prescribed pMSSM parameters. The choice of parameters in the scan translates to values for the \PSGczDt-\PSGczDo mass difference that range from 4 to 28\GeV. In the scan, trilinear couplings are removed and the gluino mass parameter $M_3$ is assumed to be sufficiently high to decouple from the observable phenomena. The unification-inspired relation $M_1 = 0.5 M_2$ is further assumed, in order to reduce the parameter space to a two-dimensional scan. Cross sections are independently calculated for each model point in the pMSSM space using the \textsc{prospino2} computational package~\cite{Beenakker:1996ed}. The SUSY parameters are used to calculate the physical mass spectra and decay rates via additional computational tools~\cite{Djouadi:2002ze,Muhlleitner:2003vg,Djouadi:1997yw,Djouadi:2006bz,Skands:2003cj}. Electroweakino decays are implemented using \PYTHIA, and are reweighted to incorporate further modeling improvements with respect to Ref.~\cite{sos2016}: the dilepton mass spectrum is reproduced from the matrix element and depends on the sign of the product of the two smallest (in magnitude) eigenvalues of the diagonalized neutralino mass matrix~\cite{DeSanctis:2007yoa}, denoted as \ensuremath{\widetilde{m}_{\PSGczDt}}\xspace, \ensuremath{\widetilde{m}_{\PSGczDo}}\xspace. While this product is always negative for a higgsino LSP, both cases are possible in the simplified wino-bino model and each is separately considered, since it leads to slightly different invariant mass distributions for the final state leptons. The branching fractions of highly virtual \PW and \PZ bosons to leptons are corrected for massive decay products, as functions of the electroweakino mass splittings, using the \textsc{susy-hit}~1.5a computational package~\cite{Djouadi:2006bz}. Finally, two simplified models are considered for top squark pair production. The first model, denoted by \textsc{T2b}ff\PSGczDo\xspace and motivated by Ref.~\cite{Grober:2014aha}, considers the scenario of a top squark NLSP that decays via an off-shell top quark undergoing the four-body process $\sTop\to\cPqb{f}\overline{f}\PSGczDo$, where the $f$ and $\overline{f}$ fermions are decay products of the virtual \PW. In the second model, denoted by \textsc{T2bW}, each top squark is taken to decay to a bottom quark and a chargino $\sTop\to\PQb\PSGcpmDo$, with each $\PSGcpmDo$ subsequently decaying to the LSP with a 100\% branching fraction $\PSGcpmDo\to\PW\PSGczDo$, in which the \PW boson is always off-shell. This decay dominates in naturalness-inspired models featuring light top squarks and higgsinos where only the chargino-mediated decay is not suppressed by an off-shell top quark. In this simplified model, $m_{\PSGcpmDo}=\frac{1}{2}(m_{\sTop}+m_{\PSGczDo})$ is assumed. For each scenario, a range of top squark and LSP masses are considered with a mass difference ranging from 10 to 80\GeV. Whereas the full detector simulation is used for the wino-bino and the higgsino simplified models, a fast detector simulation \cite{cmsfastsim11,cmsfastsim14} is utilized for samples of simulated events for top squark pair production and the pMSSM higgsino model. Typically, in the investigated phase space, the fast detector simulation provides a percent-level agreement with the full detector simulation. The trigger, lepton identification, and \PQb tagging efficiencies, as well as the distribution of pileup interactions (PU) are corrected in the simulation with scale factors measured in dedicated data samples~\cite{CMS-BTV-16-002}. Corrections for the use of the fast detector simulation are also applied to the top squark pair production and the pMSSM higgsino signal samples. \section{Object reconstruction}\label{sec:objects} Vertices are reconstructed from tracks according to the deterministic annealing algorithm \cite{Chabanat:865587}. The candidate vertex with the largest value of summed physics-object $\pt^2$ is taken to be the primary $\Pp\Pp$ interaction vertex (PV). The physics objects are the jets, clustered using the jet finding algorithm~\cite{Cacciari:2008gp,Cacciari:2011ma} with the tracks assigned to candidate vertices as inputs, and the associated \ptmiss, taken as the negative vector sum of the \pt of those jets. The PV must lie within 24\cm in the $z$ axis direction and 2\cm in the transverse direction from the nominal interaction point. Vertices other than the PV are associated with either PU interactions or with the decay of particles with nonnegligible lifetime (\eg, bottom quarks). The PV is then used in association with the charged-hadron subtraction algorithm \cite{PUMitigationCMS,PUMitigationJetAreas} to mitigate the effects of pileup in this analysis. Events are reconstructed using the particle-flow (PF) algorithm~\cite{particleFlow}, which significantly improves the event description, reconstructing and identifying final-state particles by combining information gathered from the entirety of the CMS detector. The energy of photons is obtained from the ECAL measurement. The energy of electrons is determined from a combination of the electron momentum at the PV, as determined by the tracker, the energy of the corresponding ECAL cluster, and the energy sum of all bremsstrahlung photons spatially compatible with originating from the electron tracks. The muon tracks are built by the combination of measurements in the tracker and muon chambers. The momentum of a muon is obtained from the curvature of the corresponding tracks. The energy of charged hadrons is determined from a combination of their momentum measured in the tracker and the matching ECAL and HCAL energy deposits, corrected for the response function of the calorimeters to hadronic showers. Finally, the energy of neutral hadrons is obtained from the corresponding corrected ECAL and HCAL energies. The electron momentum is estimated by combining the energy measurement in the ECAL with the momentum measurement in the tracker. It is generally better in the barrel region ($\abs{\eta} < 1.48 $) than in the endcaps ($1.48 < \abs{\eta} < 2.50$), and also depends on the bremsstrahlung energy emitted by the electron as it traverses the material in front of the ECAL~\cite{Khachatryan:2015hwa}. Muons are measured in the range $\abs{\eta} < 2.4$. Matching muons to tracks measured in the silicon tracker results in a relative muon \pt resolution of 1\% in the barrel and 3\% in the endcaps \cite{Sirunyan:2018} for \pt up to 100\GeV. In the current analysis, which targets the compressed region of SUSY parameter space, the final-state leptons tend to be soft: the lower \pt threshold of the electrons (muons) is set as low as 5.0 (3.5)\GeV. Only soft leptons with \pt up to 30\GeV are used in this analysis. To identify electrons, a multivariate discriminant based on the energy distribution in the ECAL shower and track quality variables is used. Electrons must be built from tracks that have a hit at every pixel detector layer and are not associated to a conversion vertex. These requirements suppress backgrounds arising from misreconstruction or photon conversions. The identification criteria applied on the muons are based on the quality of the track in the muon system and/or the track in the tracker, and correspond to the loose and soft identification criteria of Ref.~\cite{Sirunyan:2018}. Leptons must be isolated according to the absolute and relative isolation variables. The former counts the energy sum deposited by PF candidates in a cone of radius $\Delta R = 0.3$ around the lepton, where $\Delta R = \sqrt{\smash[b]{(\Delta\eta)^2+(\Delta\phi)^2}}$, and $\phi$ is the azimuthal angle measured in radians. The latter isolation variable is obtained by dividing the absolute isolation by the lepton candidate \pt. The relative isolation criterion is chosen to be rather loose (less than 0.5) in order to ensure a high selection efficiency for soft leptons, while the added absolute isolation requirement is useful for candidates with higher \pt. To mitigate the effect of PU, only charged PF candidates with tracks associated to the PV are considered in the computation of the isolation. Tight three-dimensional impact parameter requirements are imposed on the leptons~\cite{primaryVertex} to ensure that they are prompt, meaning that they originate from the PV. Leptons are selected only if they satisfy $\mathrm{IP}_\text{3D} < 0.01\unit{cm}$ with a significance $<2$, where $\mathrm{IP}_\text{3D}$ is the 3D distance of the lepton from the PV. The lepton reconstruction, identification, and selection efficiencies depend on the lepton \pt and are different for electrons and muons. For electrons, the efficiency increases with \pt, starting from ${\sim}30\%$ at 5\GeV and increasing to ${\sim}70\%$ at 30\GeV. For muons, the \pt dependence is less strong and the efficiency ranges from 70 to 85\%. Jets are reconstructed using the anti-\kt\ algorithm~\cite{Cacciari:2008gp} with a distance parameter $R = 0.4$. Tracks from charged particles not associated with the PV are removed from the clustering. Each jet is required to have $\pt \geq 25\GeV$ and to be located within the tracker acceptance ($\abs{\eta} < 2.4$). In what follows, the scalar sum of all selected jets is referred to as the transverse hadronic energy, \HT. The energy of the jets is calibrated by correcting for PU effects, the detector response and residual differences between data and simulation~\cite{JECR}. The corrections are verified using data in dijet and $\PZ$/photon+jet events~\cite{Khachatryan:2016kdb}, exploiting the conservation of momentum in the transverse plane. A jet tagged as originating from the hadronization of a bottom quark is referred to as \PQb-tagged jet. The identification is achieved using the \textsc{DeepCSV} flavor tagging discriminant which combines secondary vertex and track-based information into a deep neural network~\cite{CMS-BTV-16-002}. The medium working point, which is used in this analysis, corresponds to an efficiency of about 68\% for a mistagging rate for light flavor quark and gluon jets of approximately 1\%. The raw \ptmiss is defined as the magnitude of the negative vector \pt sum of all PF candidates reconstructed in the event \cite{Sirunyan:2019kia}, corrected by propagating the jet calibration corrections presented above. In this analysis we apply a further correction to account for the presence of muons, with the goal of matching more closely the definition used in the trigger system. We define the resulting variable as \ptmiss. Anomalous high-\ptmiss events can be present due to a variety of reconstruction failures, detector malfunctions, or noncollision backgrounds. Such events are rejected by event filters that are designed to identify more than 85--90\% of the spurious high-\ptmiss events with a mistagging rate of less than 0.1\%~\cite{Sirunyan:2019kia}. \section{Event selection}\label{sec:eventselection} The analysis requires events with a distinct signature of two or three leptons with low \pt, forming at least one OS pair and significant \ptmiss induced by an ISR jet. The search regions (SRs) are defined in bins of raw \ptmiss and \ptmiss (for simplicity referred to as MET bins), with boundaries selected such that in each bin high efficiency and stable online selection are ensured by either the \ptmiss or the dimuon+\ptmiss trigger path. The MET binning of the analysis is presented in Table ~\ref{tab:MET_bins}. Four MET bins are defined for the SRs that target signal events with electroweakinos (Ewk) that decay into final states with 2 leptons (2\Pell-Ewk). Only two MET bins are considered for signal events with three leptons in the final state (3\Pell-Ewk). For signal events with top squarks (2\Pell-Stop) the upper boundaries of the MET bins are higher by 50\GeV, to increase the sensitivity of the search. \begin{table}[!hbtp] \centering \topcaption{Definition of the MET bins of the SRs. The boundaries of raw \ptmiss and \ptmiss (in {\GeVns}) of every bin are described.} \label{tab:MET_bins} \begin{tabular}{c c c c c c } \hline Search region & \multicolumn{2}{c}{Low-MET} & Med-MET & High-MET & Ultra-MET\\[\cmsTabSkip] & Raw \ptmiss & \ptmiss & \ptmiss & \ptmiss & \ptmiss \\ \hline $2\Pell$-Ewk & $>125$ & $(125,200]$ & $(200,240]$ & $(240,290]$ & $>290$ \\ $2\Pell$-Stop & $>125$ & $(125,200]$ & $(200,290]$ & $(290,340]$ & $>340$ \\ $3\Pell$-Ewk & $>125$ & $(125,200]$ & \multicolumn{3}{c}{$>200$} \\ \hline \end{tabular} \end{table} Each MET bin is further categorized by a specific discriminating variable. In the 2\Pell-Ewk SRs, the dilepton invariant mass \ensuremath{M(\Pell\Pell)}\xspace of a pair of OS same flavor (SF) leptons, (\ensuremath{M_{\text{SFOS}}(\Pell\Pell)}\xspace), is used as it has an endpoint at the mass difference of \PSGczDt-\PSGczDo. In the 3\Pell regions, the minimum of the invariant masses, (\ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace), is used as the binning variable, since we expect our signal to have small mass differences. The \ensuremath{M(\Pell\Pell)}\xspace binning used in the low-MET bin is [4, 10, 20, 30, 50]\GeV, where the lowest boundary at 4\GeV is set due to the dimuon+\ptmiss trigger requirements described in Section~\ref{sec:sample}. Because of the requirements of this trigger, only $\PGm\PGm$ pairs are used in the low-MET bin. In the medium-, high- and ultra-MET bins, where the pure \ptmiss trigger is used, the lowest \ensuremath{M(\Pell\Pell)}\xspace boundary is relaxed to 1\GeV and the binning is [1, 4, 10, 20, 30, 50]\GeV. Dielectron pairs are also accepted in these bins. In the 2\Pell-Stop SR, the leptons are not bound to have same flavor (except for the low-MET bin, where again only $\PGm\PGm$ pairs are allowed due to the trigger requirements mentioned above) and their \ensuremath{M(\Pell\Pell)}\xspace spectrum has no sharp endpoint. The binning in this case is applied on the \pt of the leading lepton, with boundaries [3.5, 8, 12, 16, 20, 25, 30]\GeV. Table~\ref{tab:CUTS} summarizes the event selection criteria applied in the three SR groups, i.e. 2\Pell-Ewk, 2\Pell-Stop and 3\Pell-Ewk, respectively. The selection requirements based on lepton quantities are shown in the upper part of Table \ref{tab:CUTS}. Further requirements on the topology of the event are applied as listed in the lower part of Table \ref{tab:CUTS}. The motivations for some of the requirements are presented below: \begin{itemize} \item An $\PGU$-meson veto and a $\PJGy$-meson veto are applied by rejecting events with \ensuremath{M(\Pell\Pell)}\xspace in the [9, 10.5] and [3, 3.2]\GeV ranges respectively. \item $\HT > 100\GeV$ suppresses background events with low hadronic activity. \item $2/3<(\ptmiss/\HT)<1.4$ in the dilepton final state selection is found to suppress effectively QCD multijets events, while retaining signal events boosted by ISR. \item The requirement of ``tight lepton veto" \cite{JetID} identification criteria for the leading jet, which removes jets from calorimetric noise as well as jets from misreconstructed leptons, in combination with the sizable \HT required, can only be realized by a jet coming from the initial state (ISR jet). This is because there is no photon or gluon final state radiation (FSR) from the LSP, which is neutral and not strongly interacting. Moreover, since the emitted SM particles and their subsequent decay products are off-shell and soft, due to the small $\Delta M$ of the signal, potential FSR from those particles or the jets from the hadronic decay of the \PW are going to have low \pt, which is much lower than the \HT required for the event selection. Finally, events with high multiplicity of soft jets that could potentially add up to 100\GeV of \HT are very unlikely. \item Leptonic \PW boson decays in \ttbar events can yield two prompt leptons and $\PQb$-tagged jets in the final state. The \ttbar background is suppressed by vetoing events with $\PQb$-tagged jets with \pt above 25\GeV. Events containing softer jets from the fragmentation and hadronization of a bottom quark are still retained, e.g., in the case of the top squark decay in \textsc{T2b}ff\PSGczDo\xspace and \textsc{T2bW} models. \item The contamination from Drell--Yan (DY) events can be reduced significantly by applying a selection on the approximate invariant mass of the \PZ boson. Lorentz-boosted \PZ bosons that decay into two \PGt leptons, which further decay into two leptons and four neutrinos, can satisfy the event selection requirements. In such decays, the momentum direction of the final leptons is close to the original momentum direction of the \PZ boson. The momenta of the leptons are rescaled to balance the hadronic recoil of the \PZ boson, thus yielding an estimate of the transverse momenta of the two \PGt leptons. These are then used to estimate the invariant mass of the two \PGt leptons, $M_{\PGt\PGt}$ ~\cite{mtautau}. The range $0 \leq M_{\PGt\PGt} \leq 160\GeV$ is vetoed, since it is found to contain most of the DY events and negligible contributions from signal events. Negative values of $M_{\PGt\PGt}$ correspond to the cases when the momentum of either lepton flips direction during rescaling. \item The requirement on the transverse mass between each lepton and \ptmiss, \ensuremath{\mT(\Pell_i,\ptmiss)}\xspace ($i=1,2$), to be less than 70\GeV, has been found to be effective in reducing the \ttbar background, the scale being set by the \PW boson mass. It is not applied in the 2\Pell-Stop SRs in order to increase the stop signal acceptance. \end{itemize} \begin{table}[!hbtp] \centering \topcaption{List of all criteria that events must satisfy to be selected in one of the SRs. The label ``Low-MET" refers to the low-MET bin of the analysis, while the label ``Higher-MET" refers collectively to the Med-, High- and Ultra-MET bins of the analysis.} \label{tab:CUTS} \cmsTable{ \begin{tabular}{lcccccc} \hline \multirow{2}{*}{Variable} & \multicolumn{2}{c}{2\Pell-Ewk} & \multicolumn{2}{c}{2\Pell-Stop} & \multicolumn{2}{c}{3\Pell-Ewk}\\ & Low-MET & Higher-MET & Low-MET & Higher-MET & Low-MET & Higher-MET \\ \hline $N_\text{lep}$ & $2$ & $2$ & $2$ & $2$ & $3$ & $3$\\ $\pt(\Pell_{1})$ $[\GeVns]$ for e($\mu$) & $(5,30)$ & $(5(3.5),30)$ & $(5,30)$ & $(5(3.5),30)$ & $(5,30)$ & $(5(3.5),30)$ \\ $\pt(\Pell_{2})$ $[\GeVns]$ for e($\mu$) & $(5,30)$ & $(5(3.5),30)$ & $(5,30)$ & $(5(3.5),30)$ & $(5,30)$ & $(5(3.5),30)$ \\ $\pt(\Pell_{3})$ $[\GeVns]$ for e($\mu$) & \NA & \NA & \NA & \NA & $(5,30)$ & $(5(3.5),30)$ \\ 1 OS pair & \checkmark & \checkmark & \checkmark & \checkmark & \checkmark & \checkmark \\ 1 OSSF pair & \checkmark & \checkmark & \checkmark & \NA & \checkmark & \checkmark \\ $\Delta R(\Pell_i\Pell_j)$ ($i,j=1,2,3$, $i \neq j$) & \NA & $>0.3$ & \NA & $>0.3$ & \NA & $>0.3$ \\ \ensuremath{M_{\text{SFOS}}(\Pell\Pell)}\xspace (\ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace in 3\Pell) $[\GeVns]$ & $(4,50)$ & $(1,50)$ & $(4,50)$ & $(1,50)$ & $(4,50)$ & $(1,50)$ \\ $M_\text{SFAS}^\text{max}(\Pell\Pell)$ (AS=any sign) $[\GeVns]$ & \NA & \NA & \NA & \NA & $<60$ & \NA \\ \ensuremath{M_{\text{SFOS}}(\Pell\Pell)}\xspace (\ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace in 3\Pell) $[\GeVns]$ & \multicolumn{6}{c}{veto $(3,3.2)$ and $(9,10.5)$} \\ $\pt(\Pell\Pell)$ $[\GeVns]$ & \multicolumn{2}{c}{$>3$} & \multicolumn{2}{c}{$>3$} & \multicolumn{2}{c}{\NA} \\[\cmsTabSkip] Leading jet ``Tight lepton veto" & \multicolumn{2}{c}{\checkmark} & \multicolumn{2}{c}{\checkmark}& \multicolumn{2}{c}{\NA}\\ \ensuremath{\mT(\Pell_i,\ptmiss)}\xspace $[\GeVns]$ ($i=1,2$) &\multicolumn{2}{c}{$<70$} &\multicolumn{2}{c}{\NA} & \multicolumn{2}{c}{\NA} \\ $\HT$ $[\GeVns]$ & \multicolumn{6}{c}{$>100$} \\ \ptmiss/\HT & \multicolumn{2}{c}{$(2/3,1.4)$} & \multicolumn{2}{c}{$(2/3,1.4)$} & \multicolumn{2}{c}{\NA} \\ N$_{b}(\pt>25 \GeV$) & \multicolumn{6}{c}{$=0$} \\ $M_{\PGt\PGt}$ $[\GeVns]$ & \multicolumn{2}{c}{veto $(0,160)$} & \multicolumn{2}{c}{veto $(0,160)$} & \multicolumn{2}{c}{\NA} \\ \hline \end{tabular} } \end{table} \section{Background estimation}\label{sec:background} The residual SM background present in the dilepton and trilepton SRs can be classified into four main categories. Two major backgrounds with prompt leptons arise from DY and \ttbar production. A third background arises from diboson production: $\PW\PW$ production for dileptons and $\PW\PZ$ production for trileptons. A fourth background arises from nonprompt or misidentified leptons, mainly from $\PW$+jets events in the dilepton search and mainly from \ttbar events in the trilepton search. Finally, rare SM processes lead to minor contributions in all SRs. For each of the dominant prompt lepton SM backgrounds, a control region (CR) orthogonal to the SRs and enriched in the associated background process is defined. Each CR is split into two MET bins according to raw \ptmiss and \ptmiss to match the event categorization employed in the search regions: \begin{itemize} \item Low-MET: Raw $\ptmiss > 125\GeV$ and $125 < \ptmiss < 200\GeV$; \item High-MET: $\ptmiss > 200\GeV$. \end{itemize} In particular, to verify and constrain the modeling of the dominant prompt-lepton backgrounds, two CRs with negligible signal contribution and with very high purity in the DY and \ttbar dilepton processes, referred to as the DY and \ttbar CRs, are used. Correspondingly, a CR designed to be enriched in trilepton $\PW\PZ$ with nonnegligible signal contamination is referred to as the $\PW\PZ$-enriched region. Another CR, with moderate purity targeting dileptons from diboson processes, VV, is introduced and is referred to as the validation region (VR). The \ensuremath{M(\Pell\Pell)}\xspace distributions from the DY CR, \ttbar CR, and $\PW\PZ$-enriched regions are included in the signal extraction procedure, which is based on a maximum likelihood fit to the data, while the VV VR is only used to assess an estimate of the corresponding background normalization uncertainty. An additional dilepton CR comprising events with same sign (SS) leptons is used to constrain the background from nonprompt or misidentified leptons. This is described in detail in Section~\ref{sub:backgrounds:nonpromptbkg}. The SS CR is defined only for $\ptmiss >200\GeV$ (high-MET bin) and cannot be extended to lower \ptmiss, due to the opposite-sign requirement of the dimuon+\ptmiss trigger. The \ensuremath{M(\Pell\Pell)}\xspace distributions of this CR are included in the maximum likelihood fit to the data as well. Table~\ref{tab:CR_changes} presents the selection criteria for the various background CRs that are modified with respect to those of the SR, described in Table~\ref{tab:CUTS}. For each of the DY, \ttbar, and $\PW\PZ$ processes, and for each of the two MET bins, an unconstrained scale factor is included as a nuisance parameter in the maximum likelihood fit, to correct the normalization of the simulation yields of each process to match the data. The uncertainties on the predicted yields include the statistical and systematic components, as described in Section~\ref{sec:systematics}. \begin{table}[!hbtp] \topcaption{Summary of changes in the selection criteria with respect to the SR for all the background control and validation regions.} \label{tab:CR_changes} \centering \begin{tabular}{cc} \hline Region & Modified selection criteria \\ \hline \multirow{2}{*}{DY(2\Pell) CR}& $0 < M_{\PGt\PGt} <160 \GeV$\\ & No upper requirement on the lepton \pt\\ & \\ \multirow{3}{*}{\ttbar\!(2\Pell) CR} & At least one $\PQb$-tagged jet with $\pt > 25 \GeV$\\ & No requirement on \ensuremath{\mT(\Pell_i,\ptmiss)}\xspace (instead of $<70 \GeV$)\\ & No upper requirement on the lepton \pt\\ & \\ \multirow{2}{*}{VV(2\Pell) VR} & $\ensuremath{\mT(\Pell_i,\ptmiss)}\xspace > 90\GeV$ (instead of $<70\GeV$)\\ & No upper requirement on the lepton \pt \\ & \\ \multirow{6}{*}{\shortstack{$\PW\PZ$(3\Pell)\\enriched region}} & No \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace upper requirement at $50 \GeV$ \\ & No $M_\text{SFAS}^\text{max}(\Pell\Pell)$ requirement\\ & $\pt(\Pell_{1}) >30 \GeV$\\ & $\pt(\Pell_{2}) >10 \GeV$ ($>15 \GeV$ if \Pell is electron in high-MET bin)\\ & $\pt(\Pell_{3}) >10 \GeV$ ($>15 \GeV$ if \Pell is electron in high-MET bin) \\ & At least one $\mu$ with $\pt>20 \GeV$ \\ & \\ \multirow{2}{*}{SS(2\Pell) CR} & Same-sign requirement on lepton electric charge\\ & No requirement on \ensuremath{\mT(\Pell_i,\ptmiss)}\xspace \\ \hline \end{tabular} \end{table} \subsection{DY control region} As explained in Section~\ref{sec:eventselection}, the reconstructed mass $M_{\PGt\PGt}$ of the $\PGt$ pair is used to suppress DY events. The dedicated DY CR is defined by inverting the $M_{\PGt\PGt}$ requirement, selecting events in the range of 0--160\GeV. Additionally, the 30\GeV upper bound on the lepton \pt is removed. The post-fit distributions of the \ensuremath{M(\Pell\Pell)}\xspace variable in the DY CRs are shown in Fig.~\ref{fig:CRDYTT}. Typical scale factors of 1.2--1.7 for each data set are found between the pre- and post-fit normalizations of the DY background in the low-MET bin, and of 1.2--1.4 in the high-MET bin of the DY CR. The slightly higher deviations from unity with respect to other CRs arise because these factors correct for events that contain large amounts of instrumental \ptmiss, which is typically mismodeled in the simulation. \begin{figure}[!htb] \centering \includegraphics[width=0.49\textwidth]{Figure_002-a.pdf} \includegraphics[width=0.49\textwidth]{Figure_002-b.pdf} \includegraphics[width=0.49\textwidth]{Figure_002-c.pdf} \includegraphics[width=0.49\textwidth]{Figure_002-d.pdf} \caption{The post-fit distribution of the \ensuremath{M(\Pell\Pell)}\xspace variable is shown for the low- (left) and high- (right) MET bins for the DY (upper) and \ttbar (lower) CRs. Uncertainties include both the statistical and systematic components.} \label{fig:CRDYTT} \end{figure} \subsection{\texorpdfstring{\ttbar}{tt} control region} Even though the \ttbar background component is significantly suppressed in the search regions by vetoing events containing at least one $\PQb$-tagged jet, it is the dominant prompt background in the dilepton SRs. For the definition of the dedicated \ttbar CR at least one $\PQb$-tagged jet with $\pt > 25\GeV$ is required, ensuring orthogonality to the SR selection. In addition, the upper bound on the $\mT(\Pell,\ptmiss)$ for each lepton is removed, and no upper bound on the lepton \pt is applied. The post-fit distributions of the \ensuremath{M(\Pell\Pell)}\xspace variable are shown in Fig.~\ref{fig:CRDYTT}. Typical scale factors of 0.9--1.1 are found for each data set between the pre- and post-fit normalization of the \ttbar background in the low-MET bin, and of 0.8--1.2 in the high-MET bin. \subsection{\texorpdfstring{$\PW\PZ$-enriched region}{WZ-enriched region}} The decay of bosons in $\PW\PZ$ events to three leptons is the dominant prompt background process for the $3\Pell$ SRs (the $\PW\PZ$ label shown in the plots corresponds to \PW and \PZ bosons both decaying leptonically while the other decay modes are included in the VV label, described in the next subsection). In order to assess the normalization of the SM $\PW\PZ$ process to fully leptonic final states, a $\PW\PZ$-enriched region is employed, split in the same two MET bins as for the other CRs. In the low-MET bin of the $\PW\PZ$-enriched region, a pure dimuon trigger is used instead of the dimuon+\ptmiss one, since the latter includes a requirement on the invariant mass of the two muons. The event selection in the $\PW\PZ$-enriched region differs from the 3\Pell SR event selection in that no upper \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace selection or $M^{\text{max}}(\Pell\Pell)$ \PZ veto is applied. Furthermore, no upper bound on $\pt(\Pell)$ is applied, while the lower bounds on $\pt(\Pell)$ are set to $\pt(\Pell_1) >30\GeV$, $\pt(\Pell_2) >10\GeV$ and ${\pt(\Pell_3)>10 \GeV}$, requiring at least one muon with ${\pt > 20 \GeV}$ as driven by the pure dimuon trigger. The fraction of events from $\PW\PZ$ decays in this selection is $78(88)\%$ in the low(high)-MET bin. When split into the \ensuremath{M(\Pell\Pell)}\xspace bins, the low-\ensuremath{M(\Pell\Pell)}\xspace range of the $\PW\PZ$-enriched region could have some nonnegligible signal contribution in the case of intermediate- and higher-mass splittings (30--40\GeV) with respect to the overall $\PW\PZ$ process contribution. Therefore, the part of the $\PW\PZ$-enriched region that satisfies $1 < \ensuremath{M(\Pell\Pell)}\xspace < 30\GeV$ contributes to the sensitivity of the analysis and is defined as $\PW\PZ$-like SR. The $\ensuremath{M(\Pell\Pell)}\xspace > 30\GeV$ region, which includes the majority of the $\PW\PZ$ process yields, is defined as $\PW\PZ$ CR. The post-fit distributions of the \ensuremath{M(\Pell\Pell)}\xspace variable are shown in Fig.~\ref{fig:CRWZ}. Typical scale factors of 0.7--0.8 are found for each data set between the pre- and post-fit normalizations of the $\PW\PZ$ background in the low-MET bin, and of 0.6--0.8 in the high-MET bin. These scale factors tend to have somewhat large deviations from unity, as they account for the overestimation of the $\PW\PZ$ background normalization in the simulation. \begin{figure}[!htb] \centering \includegraphics[width=0.49\textwidth]{Figure_003-a.pdf} \includegraphics[width=0.49\textwidth]{Figure_003-b.pdf} \caption{The post-fit distribution of the \ensuremath{M(\Pell\Pell)}\xspace variable is shown for the low- (left) and high- (right) MET bins for the $\PW\PZ$-enriched region. Uncertainties include both the statistical and systematic components.} \label{fig:CRWZ} \end{figure} \subsection{VV validation region} \label{sub:backgrounds:vv} Diboson production VV accounts for the mixture of $\PW\PW$, $\PW\PZ$ (all decay modes, except the fully leptonic one), and $\PZ\PZ$ events, where the processes are given in descending order with respect to their contribution in the dilepton search regions. The event selection of the VV VR is obtained by inverting the \ensuremath{\mT(\Pell_i,\ptmiss)}\xspace requirement, removing the upper bound on the lepton \pt and requiring a high-\pt ($>30\GeV$) leading lepton to ensure orthogonality to the SRs. This region is less pure with respect to the CRs mentioned so far; it has a purity of 18\% and 31\% for the low-MET and high-MET selection, respectively. It is thus only used to check the pre-fit data and simulation agreement, which is found to be good. This VV-like region is not included in the maximum likelihood fit. \subsection{Rare SM processes} The previously mentioned SM processes leading to minor contributions in the SRs are collectively referred to as rare. These comprise the production of a {\PW}, {\PZ} or Higgs boson ({\PH}) in association with top quarks, such as $\PQt\PW$, $\ttbar$V, $\ttbar\PH$, $\PQt\PZ\PW$, and triboson processes VVV. Due to their very small contribution in the SR, no dedicated CR is designed for the estimation of these processes and their yield is taken directly from simulation. \subsection{Nonprompt background} \label{sub:backgrounds:nonpromptbkg} The background from nonprompt or misidentified leptons is evaluated with the ``tight-to-loose" method \cite{Khachatryan:2017qgo}. For the calculation of the nonprompt background in the SR two additional regions need to be defined. The application region (AR) is selected by applying the SR requirements except the tight identification and isolation lepton requirement which is replaced by at least one lepton failing the tight identification and isolation criteria but passing a looser selection. Therefore, the AR is enriched in nonprompt leptons. The measurement region (MR) is a region enriched in events that contain strongly produced jets, referred to as QCD multijet events. The MR is defined by requiring one loose lepton, and a jet separated from the lepton by $\Delta R \geq 0.7$. The probability that a nonprompt lepton that passes the loose selection also satisfies the tight selection is called the fake rate and it is measured in MR data as a function of lepton \pt and $\eta$. The probability of a prompt lepton to pass the tight identification and isolation requirement is called prompt rate and it is measured in simulation. The nonprompt background estimation in the SR is performed by weighting the AR events by a transfer factor (TF), which depends on the fake rate and the prompt rate. The MR for muons is selected by prescaled single-muon triggers with no isolation requirement, while for electrons, a mixture of prescaled jet triggers is used. The jet selection requirements applied for the MR for muons is $\pt \geq 50 \GeV$ and for the electrons are $\pt \geq 30 (40)\GeV$ in 2018 (2016 and 2017), according to the trigger requirements that evolved during data-taking. In the data-driven tight-to-loose method, the fake rate is measured in QCD multijet data events of the MR and applied in $\PW$+jets and \ttbar data events with loose leptons in the AR. Therefore, the jet flavor composition of the MR and the AR may differ and this can affect the prediction of the nonprompt background. The fake rate calculated in QCD multijet simulation was studied and found to be consistent across the different processes. The closure of the method is verified by applying the fake rate determined from QCD multijet data events to simulated $\PW$+jets and \ttbar events containing at least one nonprompt lepton in the AR. The resulting estimated nonprompt background in the SR is compared with the observed simulated $\PW$+jets and \ttbar events with at least one nonprompt lepton in the SR. The maximum nonclosure of the method is found to be 40\% and this value is used as the systematic uncertainty in the normalization of the nonprompt background. The TF are constructed with the prompt rate and the fake rate and they are applied on the AR events, in which at least one lepton fails the tight identification and isolation criteria. This yields the number of events with nonprompt leptons in the SR. This method is applied in MET bins with sizable numbers of events, \eg, the low-MET bins of the 2\Pell-Ewk and Stop SRs. In MET bins with limited numbers of events, namely the medium-, high- and ultra-MET bins of the 2\Pell-Ewk and Stop SR and the low- and high-MET bins of the 3\Pell SR, the nonprompt-lepton background is estimated by applying the TF to the \ensuremath{M(\Pell\Pell)}\xspace shapes in the AR, as obtained by simulation and normalized to data. This latter approach maintains the robustness in the measurement of the misidentification probability by utilizing control samples in data and in the normalization of the misidentified-lepton background in the AR, while using the \ensuremath{M(\Pell\Pell)}\xspace shape in simulation to reduce statistical fluctuations. To reduce the statistical uncertainty in the estimation of the nonprompt-lepton background in the 2\Pell-Ewk medium-, high- and ultra-MET SRs, the \ensuremath{M(\Pell\Pell)}\xspace shape of the nonprompt-lepton simulation in the AR is merged into one inclusive MET bin. The simulated \ensuremath{M(\Pell\Pell)}\xspace shape of the nonprompt-lepton background is indeed found to be compatible across different MET bins. A dedicated systematic uncertainty is applied to the nonprompt-lepton background in the 2\Pell-Ewk medium-, high- and ultra-MET bins, to account for the \ensuremath{M(\Pell\Pell)}\xspace shape extrapolation across the MET bins. The SS CR is used to further constrain the nonprompt-lepton background prediction uncertainty using data. This CR is obtained by requiring two leptons of the same sign instead of opposite sign when applying the 2\Pell-Stop SR selection in the $\ptmiss>200\GeV$ region. The requirement of two SS leptons increases significantly the probability that at least one of the two is nonprompt, thus enriching the CR in nonprompt-lepton background. The \ensuremath{M(\Pell\Pell)}\xspace distribution of the SS CR, with the nonprompt-lepton background predicted with the tight-to-loose method, is included in the maximum likelihood fit. The post-fit \ensuremath{M(\Pell\Pell)}\xspace distribution of the SS CR is shown in Fig.~\ref{fig:CRSS}. A scale factor of 1.06 is estimated between the pre- and post-fit normalizations of the tight-to-loose prediction. \begin{figure}[!htb] \centering \includegraphics[width=0.49\textwidth]{Figure_004.pdf} \caption{The post-fit distribution of the \ensuremath{M(\Pell\Pell)}\xspace variable is shown for the high-MET bin for the SS CR. Uncertainties include both the statistical and systematic components.} \label{fig:CRSS} \end{figure} \section{Systematic uncertainties}\label{sec:systematics} Systematic uncertainties arise from experimental effects and from the modeling of the simulated processes. This section describes the sources of systematic uncertainties and quantifies their effect on the estimated background. The post-fit effect of each source of uncertainty is quoted. All of the trigger, lepton selections, and \PQb tagging efficiency corrections that are applied to simulated samples have uncertainties related to the methods used to estimate them from data; these uncertainties affect the final predictions with values that fall in the ranges 2--9\%, 2--9\% and 1--4\%, respectively. Additional experimental uncertainties arise from the jet energy scale and resolution corrections that account for any differences between data and simulation when measuring the jet energies. These uncertainties affect all simulated backgrounds and result in 1--10\% uncertainty in the total background prediction. The uncertainties of the trigger efficiency and lepton selection are applied separately for each year, while the \PQb tagging efficiency and the jet energy corrections are correlated across years and are treated accordingly. Dedicated weights are applied to the simulated samples to correct the distribution of the true number of PV to the one measured in data. The number of interactions per bunch crossing is estimated from the total inelastic cross section, which has been measured with an uncertainty of 4.6\% \cite{PUMeasurement}. The PU uncertainty is estimated by propagating the total inelastic cross section uncertainty to the PU weights and using their variation as a shape uncertainty for all years combined. The net effect on the final total background prediction is found to be at most 1--2\%. The uncertainties in the luminosity measurements are incorporated in the estimates of all the prompt-lepton backgrounds and the predicted signal yields. These uncertainties are 2.5\%, 2.3\% and 2.5\% for the 2016~\cite{CMS-PAS-LUM-17-001}, 2017~\cite{CMS-PAS-LUM-17-004}, and 2018~\cite{CMS-PAS-LUM-18-002} data set, respectively, treated as uncorrelated among the different years. As presented in Section 6, the dedicated CRs for the dominant prompt-lepton backgrounds are included in the maximum likelihood fit to the data. The normalization of each of these processes is left to float freely in the fit, independently for each year and for each MET bin. The resulting uncertainties are found to be in the ranges 15--35\% for the DY, ${\sim}15\%$ for the \ttbar, and 12--27\% for the $\PW\PZ$ backgrounds. The VV background, described in Section~\ref{sec:background}, accounts for all the diboson processes that enter the dilepton search. Its modeling is validated in the VV VR, and its estimated contribution is assigned an uncertainty of 50\%, correlated across the three years. To fully account for all uncertainties related to the simulation of the rare SM processes, a conservative uncertainty of 50\% has been assigned to these minor backgrounds for all years. From the closure tests of the tight-to-loose method, which are presented in Section~\ref{sub:backgrounds:nonpromptbkg}, a pre-fit systematic uncertainty of 40\%, correlated across the three years of data-taking, is assigned on the misidentified-lepton background estimation. This background, however, is constrained significantly by including the SS CR in a single MET bin ($\ptmiss > 200\GeV$) in the maximum likelihood fit. With the inclusion of the SS CR in the fit, the post-fit uncertainty in the nonprompt-lepton background after the fit is reduced to ${\sim}5\%$. An extra shape uncertainty is applied to the nonprompt-lepton background prediction to account for potential disagreements between data distributions and the templates from simulation used in the ARs. An additional shape uncertainty is included for the SRs for which the corresponding AR distributions are merged across MET bins to account for minor shape discrepancies in different MET bins. These shape uncertainties are applied to the nonprompt prediction independently for every year. The post-fit effect of these two separate shape uncertainties on the nonprompt background is approximately 8\% and 5\%, respectively. Two additional uncertainties are assigned to all simulated signal samples: The uncertainty in the theoretical cross section due to the variation of the parton density functions is included in the ${\pm}1\sigma$ curves on the limit scans, and amounts to 3.5--8.5\%. The acceptance uncertainties due to the variations of the renormalization and factorization scales are added separately as nuisance parameters in the maximum likelihood fit and are of ${\sim}1\%$ each. Potential differences between data and simulation in modeling ISR jets are also a source of systematic uncertainty. To this end, the data are compared with the simulation in a general selection that requires two isolated leptons and at least one ISR jet. The residual differences between data and simulation are used to determine \pt-dependent correction factors, independently for each data-taking year. The correction factors are applied to the simulation and their differences from unity (1--5\%) are assigned as a systematic uncertainty. Differences in the \ptmiss reconstruction in the detailed and fast simulations used for the signal samples are taken into account as an additional systematic uncertainty for each year separately. This uncertainty varies between 1 and 10\% for the yields of the fast simulation signal samples. During the 2016 and 2017 data-taking periods, a gradual shift was observed in the timing of the trigger information from the ECAL towards early values. This causes a sizable fraction of electromagnetic objects with $\abs{\eta} > 2.5$ to be assigned to the previous bunch crossing. To account for this issue, correction factors are applied and their uncertainties ($\sim$1\%) are propagated to the final result. The uncertainties presented above are included as nuisance parameters in the likelihood fit to the data. To freely float in the fit, the DY, \ttbar and $\PW\PZ$ backgrounds are assigned uniformly distributed uncertainties, whereas all other fit parameters are assigned normally distributed uncertainties. The dominant uncertainties are generally the statistical ones. The prompt and nonprompt background normalization uncertainties also become important, depending on the part of the phase space that is probed. \section{Results}\label{sec:results} The signal and background expectations are fitted to the data using a binned maximum likelihood fit with the uncertainties incorporated as nuisance parameters, as mentioned above. The signal yields are scaled in all regions of the analysis (also in the CRs to account for possible signal contamination) by a single, unconstrained parameter of interest. The CRs for the DY, \ttbar and $\PW\PZ$ processes are added to determine the normalization of the respective processes. Similarly, the SS dilepton CR is included in the fit in order to constrain the nonprompt background. The distribution that enters the maximum likelihood fit is the \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace for the 3\Pell CRs and the 3\Pell-Ewk SRs, and the \ensuremath{M(\Pell\Pell)}\xspace for the 2\Pell CRs and the 2\Pell-Ewk SRs. Each distribution is comprised by 4 bins in the low-MET bins and 5 bins otherwise. For the 2\Pell-Stop SRs, the \pt distribution of the leading lepton (6 bins in each MET bin) is used. In total, the fit that targets signal models with electroweakinos is given 28 SRs (19 dilepton and 9 trilepton SRs), while for models with top squark production 24 SRs (dilepton only) are used. In both cases, the same 32 CR bins are used. The estimated yields for the SM background processes and the data observed in the 2\Pell- and 3\Pell-Ewk SRs are shown in Figs.~\ref{fig:results:2lEwkSR} and \ref{fig:results:3lSR} respectively, while Fig.~\ref{fig:results:2lColSR} shows the 2\Pell-Stop SRs. The estimated yields from the different backgrounds and the data are also summarized in Tables \ref{tab:results:2lEwkSR}--\ref{tab:results:2lColSR} for each SR. The estimates correspond to the post-fit results (background-only), extracted from the maximum likelihood fit to the data. The uncertainties in the predicted yields include both statistical and systematic components, as described in Section~\ref{sec:systematics}. No significant deviation from the SM prediction is observed in the data. \begin{table}[!hbt] \centering \topcaption{Observed and predicted yields as extracted from the maximum likelihood fit, in the 2\Pell-Ewk SRs. Uncertainties include both the statistical and systematic components.} \label{tab:results:2lEwkSR} \cmsTable{ \renewcommand{\arraystretch}{1.3} \begin{tabular}{ccccccccccc} \hline \ptmiss [{\GeVns}] & \ensuremath{M(\Pell\Pell)}\xspace [{\GeVns}] & \ttbar & DY & VV & $\PW\PZ$ & Rare & Nonprompt & Total bkg & Data \\ \hline \multirow{4}{*}{125--200} & 4--10 & $4.0 \pm 2.0$ & $20.6 \pm 5.2$ & $3.7 \pm 2.4$ & $8.3 \pm 2.6$ & $0.28^{+0.72}_{-0.27}$ & $31.9 \pm 5.6$ & $68.7 \pm 8.7$ & $73$ \\ & 10--20 & $16.5 \pm 4.2$ & $28.0 \pm 6.2$ & $6.2 \pm 3.2$ & $6.5 \pm 2.3$ & $2.8 \pm 2.1$ & $90.1 \pm 9.3$ & $151 \pm 13$ & $165$ \\ & 20--30 & $18.0 \pm 4.4$ & $36.3 \pm 7.1$ & $7.8 \pm 3.5$ & $3.5 \pm 1.7$ & $2.9 \pm 2.1$ & $82.1 \pm 8.9$ & $151 \pm 13$ & $156$ \\ & 30--50 & $22.4 \pm 4.9$ & $10.2 \pm 3.7$ & $7.4 \pm 3.5$ & $1.3 \pm 1.0$ & $2.1 \pm 1.8$ & $39.6 \pm 6.2$ & $82.9 \pm 9.6$ & $80$ \\[\cmsTabSkip] \multirow{5}{*}{200--240} & 1--4 & $0.11^{+0.33}_{-0.10}$ & $0.37^{+0.72}_{-0.36}$ & $0.7^{+1.1}_{-0.7}$ & $1.3 \pm 1.0$ & $0.04^{+0.23}_{-0.03}$ & $3.0 \pm 2.0$ & $5.5 \pm 2.5$ & $2$ \\ & 4--10 & $0.75^{+0.90}_{-0.74}$ & $0.15^{+0.50}_{-0.14}$ & $1.4^{+1.5}_{-1.4}$ & $3.5 \pm 1.7$ & $0.14^{+0.39}_{-0.13}$ & $11.9 \pm 3.6$ & $17.8 \pm 4.4$ & $19$ \\ & 10--20 & $2.9 \pm 1.7$ & $7.9 \pm 3.4$ & $2.9 \pm 2.2$ & $2.5 \pm 1.4$ & $1.2 \pm 1.2$ & $42.8 \pm 6.8$ & $60.1 \pm 8.3$ & $59$ \\ & 20--30 & $4.3 \pm 2.1$ & $4.7 \pm 2.6$ & $2.6 \pm 2.0$ & $1.1 \pm 1.0$ & $0.27^{+0.54}_{-0.26}$ & $31.3 \pm 5.8$ & $44.3 \pm 7.1$ & $47$ \\ & 30--50 & $5.7 \pm 2.4$ & $0.6^{+1.0}_{-0.6}$ & $2.8 \pm 2.1$ & $0.63^{+0.70}_{-0.62}$ & $0.35^{+0.65}_{-0.34}$ & $17.6 \pm 4.4$ & $27.7 \pm 5.6$ & $24$ \\[\cmsTabSkip] \multirow{5}{*}{240--290} & 1--4 & $<0.02$ & $<0.1$ & $0.43^{+0.88}_{-0.42}$ & $0.8 \pm 0.8$ & $<0.07$ & $1.5 \pm 1.3$ & $2.7 \pm 1.9$ & $2$ \\ & 4--10 & $0.9^{+1.2}_{-0.9}$ & $0.57^{+0.97}_{-0.56}$ & $0.8^{+1.1}_{-0.8}$ & $1.5 \pm 1.1$ & $0.3^{+2.6}_{-0.3}$ & $3.7 \pm 2.0$ & $7.7 \pm 3.9$ & $11$ \\ & 10--20 & $2.4 \pm 1.6$ & $3.4 \pm 2.3$ & $1.6 \pm 1.6$ & $1.2 \pm 0.9$ & $0.3^{+1.3}_{-0.3}$ & $14.9 \pm 4.0$ & $23.8 \pm 5.4$ & $19$ \\ & 20--30 & $2.0 \pm 1.5$ & $2.4 \pm 1.9$ & $1.9 \pm 1.7$ & $0.61^{+0.67}_{-0.60}$ & $0.03^{+0.45}_{-0.02}$ & $10.1 \pm 3.3$ & $17.0 \pm 4.5$ & $13$ \\ & 30--50 & $2.3 \pm 1.7$ & $0.32^{+0.73}_{-0.31}$ & $1.2^{+1.4}_{-1.1}$ & $0.40^{+0.53}_{-0.39}$ & $0.8^{+4.6}_{-0.7}$ & $6.6 \pm 2.7$ & $11.6 \pm 5.8$ & $10$ \\[\cmsTabSkip] \multirow{5}{*}{$>290$} & 1--4 & $<0.02$ & $<0.1$ & $0.18^{+0.65}_{-0.17}$ & $0.57^{+0.65}_{-0.56}$ & $<0.01$ & $0.70^{+0.88}_{-0.69}$ & $1.5 \pm 1.3$ & $1$ \\ & 4--10 & $0.38^{+0.64}_{-0.37}$ & $0.8^{+1.1}_{-0.8}$ & $0.9^{+1.2}_{-0.9}$ & $1.3 \pm 1.0$ & $0.12^{+0.44}_{-0.11}$ & $1.7 \pm 1.3$ & $5.2 \pm 2.5$ & $3$ \\ & 10--20 & $1.3 \pm 1.2$ & $0.8^{+1.2}_{-0.8}$ & $1.6 \pm 1.6$ & $1.05 \pm 0.89$ & $0.9^{+1.4}_{-0.9}$ & $7.8 \pm 2.9$ & $13.5 \pm 4.1$ & $15$ \\ & 20--30 & $0.9^{+1.0}_{-0.9}$ & $0.06^{+0.28}_{-0.05}$ & $1.5^{+1.6}_{-1.5}$ & $0.3^{+0.50}_{-0.34}$ & $<0.09$ & $5.9 \pm 2.5$ & $8.8 \pm 3.2$ & $13$ \\ & 30--50 & $1.2 \pm 1.1$ & $<0.1$ & $1.3^{+1.5}_{-1.3}$ & $0.09^{+0.24}_{-0.08}$ & $0.7^{+1.2}_{-0.7}$ & $3.6 \pm 2.0$ & $6.8 \pm 3.0$ & $9$ \\ \hline \end{tabular} } \end{table} \begin{table}[!hbt] \centering \topcaption{Observed and predicted yields as extracted from the maximum likelihood fit, in the 3\Pell-Ewk SRs. Uncertainties include both the statistical and systematic components.} \label{tab:results:3lSR} \cmsTable{ \renewcommand{\arraystretch}{1.3} \begin{tabular}{ccccccccccc} \hline \ptmiss [{\GeVns}] & \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace [{\GeVns}] & VV & $\PW\PZ$ & Rare & Nonprompt & Total bkg & Data \\ \hline \multirow{4}{*}{125--200} & 4--10 & $0.18^{+0.54}_{-0.17}$ & $4.8 \pm 1.9$ & $0.08^{+0.38}_{-0.07}$ & $0.61^{+0.83}_{-0.60}$ & $5.7 \pm 2.2$ & $3$ \\ & 10--20 & $0.08^{+0.35}_{-0.07}$ & $2.3 \pm 1.3$ & $0.5^{+1.0}_{-0.5}$ & $1.9 \pm 1.4$ & $4.9 \pm 2.2$ & $7$ \\ & 20--30 & $0.03^{+0.23}_{-0.02}$ & $1.0 \pm 1.0$ & $0.07^{+0.35}_{-0.06}$ & $1.3 \pm 1.2$ & $2.4 \pm 1.5$ & $4$ \\ & 30--50 & $0.01^{+0.13}_{-0.01}$ & $0.39^{+0.55}_{-0.38}$ & $0.08^{+0.37}_{-0.07}$ & $1.4 \pm 1.2$ & $1.8 \pm 1.4$ & $1$ \\[\cmsTabSkip] \multirow{5}{*}{$>200$} & 1--4 & $0.01^{+0.18}_{-0.01}$ & $1.5 \pm 1.0$ & $0.03^{+0.20}_{-0.02}$ & $0.18^{+0.44}_{-0.17}$ & $1.7 \pm 1.2$ & $3$ \\ & 4--10 & $0.05^{+0.34}_{-0.04}$ & $2.9 \pm 1.4$ & $0.16^{+0.47}_{-0.15}$ & $0.85^{+0.99}_{-0.84}$ & $4.0 \pm 1.8$ & $1$ \\ & 10--20 & $0.06^{+0.32}_{-0.05}$ & $2.0 \pm 1.2$ & $0.05^{+0.26}_{-0.04}$ & $2.1 \pm 1.5$ & $4.2 \pm 2.0$ & $5$ \\ & 20--30 & $<0.002$ & $0.52^{+0.60}_{-0.51}$ & $0.06^{+0.29}_{-0.05}$ & $1.1 \pm 1.1$ & $1.7 \pm 1.3$ & $2$ \\ & 30--50 & $<0.002$ & $0.31^{+0.46}_{-0.30}$ & $0.03^{+0.23}_{-0.02}$ & $1.0 \pm 1.0$ & $1.3 \pm 1.1$ & $1$ \\ \hline \end{tabular} } \end{table} \newpage \begin{table}[!hbt] \centering \topcaption{Observed and predicted yields as extracted from the maximum likelihood fit, in the $\PW\PZ$-like selection SRs. Uncertainties include both the statistical and systematic components.} \label{tab:results:WZSR} \cmsTable{ \renewcommand{\arraystretch}{1.3} \begin{tabular}{ccccccccccc} \hline \ptmiss [{\GeVns}] & \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace [{\GeVns}] & VV & $\PW\PZ$ & Rare & Nonprompt & Total bkg & Data \\ \hline \multirow{3}{*}{125--200} & 4--10 & $0.13^{+0.47}_{-0.12}$ & $2.6 \pm 1.4$ & $0.31^{+0.67}_{-0.30}$ & $0.49^{+0.70}_{-0.48}$ & $3.5 \pm 1.8$ & $4$ \\ & 10--20 & $0.14^{+0.47}_{-0.13}$ & $4.3 \pm 1.8$ & $0.47^{+0.83}_{-0.46}$ & $1.2 \pm 1.1$ & $6.1 \pm 2.3$ & $11$ \\ & 20--30 & $0.17^{+0.51}_{-0.16}$ & $5.0 \pm 2.0$ & $0.50^{+0.85}_{-0.49}$ & $2.1 \pm 1.5$ & $7.8 \pm 2.6$ & $9$ \\[\cmsTabSkip] \multirow{4}{*}{$>200$} & 1--4 & $0.16^{+0.56}_{-0.15}$ & $0.11^{+0.29}_{-0.10}$ & $0.06^{+0.33}_{-0.05}$ & $0.44^{+0.66}_{-0.43}$ & $0.78^{+0.97}_{-0.77}$ & $0$ \\ & 4--10 & $0.22^{+0.60}_{-0.21}$ & $2.6 \pm 1.4$ & $0.10^{+0.38}_{-0.09}$ & $0.24^{+0.59}_{-0.23}$ & $3.1 \pm 1.6$ & $3$ \\ & 10--20 & $0.7^{+1.1}_{-0.7}$ & $10.6 \pm 2.8$ & $0.9^{+1.1}_{-0.9}$ & $1.9 \pm 1.4$ & $14.0 \pm 3.4$ & $19$ \\ & 20--30 & $0.7^{+1.0}_{-0.7}$ & $15.2 \pm 3.3$ & $1.2^{+1.3}_{-1.2}$ & $4.0 \pm 2.0$ & $21.0 \pm 4.2$ & $23$ \\ \hline \end{tabular} } \end{table} \begin{table}[!hbtp] \centering \topcaption{Observed and predicted yields as extracted from the maximum likelihood fit, in the 2\Pell-Stop SRs. Uncertainties include both the statistical and systematic components.} \label{tab:results:2lColSR} \cmsTable{ \renewcommand{\arraystretch}{1.3} \begin{tabular}{ccccccccccc} \hline \ptmiss [{\GeVns}] & $\pt(\Pell_1)$ [{\GeVns}] & \ttbar & DY & VV & $\PW\PZ$ & Rare & Nonprompt & Total bkg & Data \\ \hline \multirow{6}{*}{125--200} & 3.5--8 & $1.2 \pm 1.2$ & $5.2 \pm 3.1$ & $1.0^{+1.2}_{-1.0}$ & $1.4 \pm 1.1$ & $0.06^{+0.27}_{-0.05}$ & $41.0 \pm 6.3$ & $49.9 \pm 7.2$ & $52$ \\ & 8--12 & $15.0 \pm 4.0$ & $22.9 \pm 5.9$ & $6.6 \pm 3.1$ & $6.0 \pm 2.1$ & $0.96^{+0.99}_{-0.95}$ & $93.1 \pm 9.4$ & $144 \pm 12$ & $156$ \\ & 12--16 & $31.8 \pm 5.9$ & $24.0 \pm 6.1$ & $13.7 \pm 4.5$ & $7.2 \pm 2.4$ & $2.8 \pm 1.7$ & $101.3 \pm 9.9$ & $180 \pm 14$ & $196$ \\ & 16--20 & $59.9 \pm 8.0$ & $36.9 \pm 7.5$ & $19.8 \pm 5.5$ & $7.9 \pm 2.5$ & $4.2 \pm 2.1$ & $100.2 \pm 9.8$ & $229 \pm 16$ & $238$ \\ & 20--25 & $103 \pm 11$ & $27.2 \pm 6.5$ & $33.2 \pm 7.1$ & $7.7 \pm 2.5$ & $7.5 \pm 2.8$ & $95.0 \pm 9.5$ & $273 \pm 18$ & $285$ \\ & 25--30 & $114 \pm 11$ & $21.4 \pm 5.7$ & $35.5 \pm 7.3$ & $5.1 \pm 2.0$ & $8.0 \pm 2.8$ & $71.5 \pm 8.3$ & $256 \pm 17$ & $246$ \\[\cmsTabSkip] \multirow{6}{*}{200--290} & 3.5--8 & $1.1 \pm 1.0$ & $1.7 \pm 1.5$ & $2.8 \pm 2.1$ & $2.9 \pm 1.4$ & $0.04^{+0.20}_{-0.03}$ & $41.3 \pm 6.6$ & $49.9 \pm 7.3$ & $53$ \\ & 8--12 & $11.0 \pm 3.3$ & $1.6 \pm 1.5$ & $7.3 \pm 3.3$ & $5.6 \pm 2.0$ & $0.43^{+0.65}_{-0.42}$ & $103 \pm 10$ & $129 \pm 12$ & $130$ \\ & 12--16 & $24.1 \pm 4.9$ & $5.0 \pm 2.6$ & $17.1 \pm 5.0$ & $5.5 \pm 2.0$ & $2.9 \pm 1.7$ & $102 \pm 10$ & $156 \pm 13$ & $153$ \\ & 16--20 & $40.3 \pm 6.3$ & $11.7 \pm 4.2$ & $24.7 \pm 6.1$ & $5.6 \pm 2.0$ & $2.4 \pm 1.6$ & $92.0 \pm 9.8$ & $177 \pm 14$ & $163$ \\ & 20--25 & $69.9 \pm 8.3$ & $7.6 \pm 3.4$ & $41.9 \pm 7.9$ & $6.7 \pm 2.2$ & $5.0 \pm 2.2$ & $89.3 \pm 9.7$ & $220 \pm 16$ & $220$ \\ & 25--30 & $69.0 \pm 8.3$ & $11.8 \pm 4.1$ & $47.3 \pm 8.4$ & $5.9 \pm 2.0$ & $9.6 \pm 3.1$ & $74.2 \pm 8.9$ & $218 \pm 16$ & $219$ \\[\cmsTabSkip] \multirow{6}{*} {290--340} & 3.5--8 & $0.15^{+0.35}_{-0.14}$ & $0.67^{+0.90}_{-0.66}$ & $0.34^{+0.72}_{-0.33}$ & $0.29^{+0.44}_{-0.28}$ & $<0.05$ & $2.7 \pm 1.7$ & $4.1 \pm 2.1$ & $4$ \\ & 8--12 & $1.9 \pm 1.4$ & $0.8^{+1.1}_{-0.8}$ & $1.9 \pm 1.7$ & $0.64^{+0.67}_{-0.63}$ & $0.01^{+0.11}_{-0.01}$ & $9.9 \pm 3.2$ & $15.0 \pm 4.1$ & $15$ \\ & 12--16 & $3.4 \pm 1.8$ & $0.33^{+0.61}_{-0.32}$ & $3.4 \pm 2.3$ & $0.69 \pm 0.69$ & $0.64^{+0.85}_{-0.63}$ & $6.4 \pm 2.6$ & $14.8 \pm 4.1$ & $16$ \\ & 16--20 & $5.5 \pm 2.3$ & $0.8^{+1.1}_{-0.8}$ & $4.5 \pm 2.6$ & $0.91 \pm 0.80$ & $1.0 \pm 1.0$ & $11.8 \pm 3.5$ & $24.6 \pm 5.2$ & $23$ \\[0.5ex] & 20--25 & $8.1 \pm 2.8$ & $0.9^{+1.2}_{-0.9}$ & $7.6 \pm 3.4$ & $1.24 \pm 0.93$ & $0.82^{+0.89}_{-0.81}$ & $10.1 \pm 3.2$ & $28.8 \pm 5.8$ & $30$ \\ & 25--30 & $8.8 \pm 2.9$ & $0.58^{+0.97}_{-0.57}$ & $8.6 \pm 3.6$ & $0.96 \pm 0.81$ & $1.7 \pm 1.3$ & $10.8 \pm 3.4$ & $31.5 \pm 6.0$ & $38$ \\[\cmsTabSkip] \multirow{6}{*}{$>340$} & 3.5--8 & $0.12^{+0.37}_{-0.11}$ & $0.14^{+0.51}_{-0.13}$ & $0.48^{+0.86}_{-0.47}$ & $0.29^{+0.46}_{-0.28}$ & $<0.03$ & $3.7 \pm 2.0$ & $4.7 \pm 2.3$ & $7$ \\ & 8--12 & $1.8 \pm 1.3$ & $0.22^{+0.59}_{-0.21}$ & $1.5 \pm 1.5$ & $0.78 \pm 0.75$ & $0.02^{+0.12}_{-0.01}$ & $7.8 \pm 2.9$ & $12.2 \pm 3.6$ & $11$ \\ & 12--16 & $2.4 \pm 1.5$ & $0.31^{+0.63}_{-0.30}$ & $3.5 \pm 2.3$ & $0.87 \pm 0.78$ & $0.60^{+0.79}_{-0.59}$ & $4.0 \pm 2.0$ & $11.6 \pm 3.6$ & $14$ \\ & 16--20 & $4.0 \pm 2.0$ & $0.64^{+0.89}_{-0.63}$ & $4.9 \pm 2.7$ & $0.80 \pm 0.75$ & $0.90^{+0.93}_{-0.89}$ & $5.5 \pm 2.5$ & $16.7 \pm 4.4$ & $11$ \\ & 20--25 & $5.8 \pm 2.3$ & $0.62^{+0.95}_{-0.61}$ & $8.6 \pm 3.6$ & $1.22 \pm 0.93$ & $0.84^{+0.92}_{-0.83}$ & $8.6 \pm 3.0$ & $25.7 \pm 5.5$ & $26$ \\ & 25--30 & $6.5 \pm 2.5$ & $0.7^{+1.0}_{-0.7}$ & $9.3 \pm 3.7$ & $1.12 \pm 0.88$ & $2.6 \pm 1.6$ & $7.7 \pm 2.9$ & $27.9 \pm 5.7$ & $25$ \\[0.5ex] \hline \end{tabular} } \end{table} \begin{figure}[!hbtp] \centering \includegraphics[width=0.49\textwidth]{Figure_005-a.pdf} \includegraphics[width=0.49\textwidth]{Figure_005-b.pdf} \includegraphics[width=0.49\textwidth]{Figure_005-c.pdf} \includegraphics[width=0.49\textwidth]{Figure_005-d.pdf} \caption{The 2\Pell-Ewk SR: the post-fit distribution of the \ensuremath{M(\Pell\Pell)}\xspace variable is shown for the low- (upper left), medium- (upper right), high- (lower left) and ultra- (lower right) MET bins. Uncertainties include both the statistical and systematic components. The signal distributions overlaid on the plot are from the \textsc{TChiWZ}\xspace and the simplified higgsino models in the scenario where the product of $\ensuremath{\widetilde{m}_{\PSGczDo}}\xspace\ensuremath{\widetilde{m}_{\PSGczDt}}\xspace$ eigenvalues is positive and negative, respectively. The numbers after the model name in the legend indicate the mass of the NLSP and the mass splitting between the NLSP and LSP, in {\GeVns}.} \label{fig:results:2lEwkSR} \end{figure} \begin{figure}[!hbtp] \centering \includegraphics[width=0.49\textwidth]{Figure_006-a.pdf} \includegraphics[width=0.49\textwidth]{Figure_006-b.pdf} \caption{The 3\Pell-Ewk search regions: the post-fit distribution of the \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace variable is shown for the low- (left) and high- (right) MET bins. Uncertainties include both the statistical and systematic components. The signal distributions overlaid on the plot are from the \textsc{TChiWZ}\xspace and the simplified higgsino models in the scenario where the product of $\ensuremath{\widetilde{m}_{\PSGczDo}}\xspace\ensuremath{\widetilde{m}_{\PSGczDt}}\xspace$ eigenvalues is positive and negative, respectively. The numbers after the model name in the legend indicate the mass of the NLSP and the mass splitting between the NLSP and LSP, in {\GeVns}.} \label{fig:results:3lSR} \end{figure} \begin{figure}[!hbtp] \centering \includegraphics[width=0.49\textwidth]{Figure_007-a.pdf} \includegraphics[width=0.49\textwidth]{Figure_007-b.pdf} \includegraphics[width=0.49\textwidth]{Figure_007-c.pdf} \includegraphics[width=0.49\textwidth]{Figure_007-d.pdf} \caption{The 2\Pell-Stop SR: the post-fit distribution of the leading lepton \pt variable is shown for the low- (upper left), medium- (upper right), high- (lower left) and ultra- (lower right) MET bins. Uncertainties include both the statistical and systematic components. The signal distributions overlaid on the plot are from the \textsc{T2b}ff\PSGczDo\xspace and the \textsc{T2bW} models. The numbers after the model name in the legend indicate the mass of the top squark and the mass splitting between the top squark and LSP, in {\GeVns}.} \label{fig:results:2lColSR} \end{figure} \section{Interpretation}\label{sec:interpretations} The results of the search are interpreted in the context of the SUSY scenarios described in Section~\ref{sec:sample}. Limits on the production cross section for SUSY particle pairs as a function of their masses are computed using a modified frequentist approach that employs the \CLs criterion and an asymptotic formulation~\cite{frequentist_limit,Read:2002hq,Cowan:2010js,LHC-HCG}. We express the results as upper limits at 95\% confidence level (\CL) on the potential presence of a SUSY signal in the data. The limits of the \textsc{TChiWZ}\xspace\ simplified model for the production of a wino pair decaying into bino LSPs are shown for the two signal scenarios described in Section~\ref{sec:sample}. When considering the full matrix element of the electroweakino decay, the relative sign of the eigenvalues of the neutralino mass matrix leads to two slightly different \ensuremath{M(\Pell\Pell)}\xspace distributions in \PSGczDt decays. The upper plot in Fig.~\ref{fig:interpretations:tchiwz} shows the limit for the scenario where the product of \ensuremath{\widetilde{m}_{\PSGczDo}}\xspace, \ensuremath{\widetilde{m}_{\PSGczDt}}\xspace eigenvalues is positive, while the negative case is shown by the lower plot. The results are reweighted to account for the branching fraction modulation of the off-shell \PW and \PZ bosons, as mentioned in Section~\ref{sec:sample}. The observed exclusion limit shown in Fig.~\ref{fig:interpretations:tchiwz} is weaker than the expected one in the intermediate and high $\Delta m$ ranges. This is due to data yields that are higher than the predictions in specific bins of the 2\Pell-Ewk SR (Table~\ref{tab:results:2lEwkSR}, ultra-MET bin, $20 < \ensuremath{M(\Pell\Pell)}\xspace \leq 30\GeV$), the 3\Pell-Ewk SR (Table~\ref{tab:results:3lSR}, low-MET bin, $10 < \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace \leq 30\GeV$) and $\PW\PZ$-like selection SR (Table~\ref{tab:results:WZSR}, low- and high-MET bin, $10 < \ensuremath{M^{\text{min}}_{\text{SFOS}}(\Pell\Pell)}\xspace \leq 20\GeV$). The shift of the \ensuremath{M(\Pell\Pell)}\xspace distribution for the negative case for the product of \ensuremath{\widetilde{m}_{\PSGczDo}}\xspace, \ensuremath{\widetilde{m}_{\PSGczDt}}\xspace eigenvalues causes the observed upper limit signal cross section to be higher, leading to a smaller range of excluded mass parameters in this scenario. The excess has a maximum local significance of 2.4 standard deviations for the signal mass point with $m_{\PSGczDt} = 125\GeV$ and $\Delta m = 40\GeV$. The upper plot of Fig.~\ref{fig:interpretations:higgsino} displays the space of allowed electroweakino masses for the higgsino simplified model, assuming a chargino with mass halfway between the two lightest neutralinos. The simplified higgsino model includes neutralino pair production and neutralino-chargino production, while the pMSSM higgsino model includes all possible production modes. The dilepton invariant mass distributions are reweighted for the case where $\ensuremath{\widetilde{m}_{\PSGczDo}}\xspace\ensuremath{\widetilde{m}_{\PSGczDt}}\xspace < 0$, since this is the combination allowed when the higgsino is the LSP. The results also take into account the off-shell \PW and \PZ boson branching fraction corrections mentioned in Section~\ref{sec:sample}. A weaker than expected observed exclusion limit in the higher $\Delta m$ region is present also for this interpretation for the reasons mentioned above. The expected and observed exclusion contours for the pMSSM higgsino model are shown in the lower plot of Fig.~\ref{fig:interpretations:higgsino}. The limits are presented in the plane of the higgsino-bino mass parameters $\mu$-$M_1$. In the pMSSM, larger $\mu$ values roughly correspond to larger masses for the parent SUSY particles. Larger values of the $M_1$ parameter correspond to smaller values of the mass difference between the LSP and its parent SUSY particle. Due to this, the fact that the observed limit is weaker than the expected one for intermediate and higher $\Delta m$ values of the \textsc{TChiWZ}\xspace and higgsino simplified models manifests at small $M_1$ values for the pMSSM higgsino model. For direct production of top squarks, the 2\Pell-Stop SRs are instead used in the maximum likelihood fit to extract upper limits on the \textsc{T2b}ff\PSGczDo\xspace and \textsc{T2bW} models presented in Section~\ref{sec:sample}. Figure \ref{fig:interpretations:t2tt} shows the limits of the \textsc{T2b}ff\PSGczDo\xspace (upper) and \textsc{T2bW} (lower) simplified models. For both models, the corrections for the modulation of the off-shell \PW bosons branching fraction are considered. The drop in the exclusion line around $\Delta m = 20\GeV$ is caused by the smaller acceptance when going to lower $\Delta m$, which is due to the minimum lepton \pt requirements of the SRs. \begin{figure}[!hbtp] \centering \includegraphics[width=0.80\textwidth]{Figure_008-a.pdf} \includegraphics[width=0.80\textwidth]{Figure_008-b.pdf} \caption{The observed 95\% \CL exclusion contours (black curves) assuming the NLO+NLL cross sections, with the variations (thin lines) corresponding to the uncertainty in the cross section for the \textsc{TChiWZ}\xspace model. The red curves present the 95\% \CL expected limits with the band (thin lines) covering 68\% of the limits in the absence of signal. Results are reported for the $\ensuremath{\widetilde{m}_{\PSGczDt}}\xspace\ensuremath{\widetilde{m}_{\PSGczDo}}\xspace>0(<0)$ \ensuremath{M(\Pell\Pell)}\xspace spectrum reweighting scenario in the upper (lower) plot. The range of luminosities of the analysis regions included in the fit is indicated on the plot.} \label{fig:interpretations:tchiwz} \end{figure} \begin{figure}[!hbtp] \centering \includegraphics[width=0.80\textwidth]{Figure_009-a.pdf} \includegraphics[width=0.80\textwidth]{Figure_009-b.pdf} \caption{The observed 95\% \CL exclusion contours (black curves) assuming the NLO+NLL cross sections, with the variations (thin lines) corresponding to the uncertainty in the cross section for the simplified (upper) and the pMSSM (lower) higgsino models. The simplified model includes both neutralino pair and neutralino-chargino production modes, while the pMSSM one includes all possible production modes. The red curves present the 95\% \CL expected limits with the band (thin lines) covering 68\% of the limits in the absence of signal. The results are reported for the $\ensuremath{\widetilde{m}_{\PSGczDt}}\xspace\ensuremath{\widetilde{m}_{\PSGczDo}}\xspace<0$ \ensuremath{M(\Pell\Pell)}\xspace spectrum reweighting scenario. The range of luminosities of the analysis regions included in the fit is indicated on the plot.} \label{fig:interpretations:higgsino} \end{figure} \begin{figure}[!hbtp] \centering \includegraphics[width=0.80\textwidth]{Figure_010-a.pdf} \includegraphics[width=0.80\textwidth]{Figure_010-b.pdf} \caption{The observed 95\% \CL exclusion contours (black curves) assuming the NLO+NLL cross sections, with the variations (thin lines) corresponding to the uncertainty in the cross section for the \textsc{T2b}ff\PSGczDo\xspace (upper) and \textsc{T2bW} (lower) simplified models. The red curves present the 95\% \CL expected limits with the band (thin lines) covering 68\% of the limits in the absence of signal. The range of luminosities of the analysis regions included in the fit is indicated on the plot.} \label{fig:interpretations:t2tt} \end{figure} \clearpage \section{Summary}\label{sec:summary} A search for new physics is performed using events with two or three soft leptons and missing transverse momentum. These signatures are motivated by models predicting a weakly interacting massive particle that originates from the decay of another new particle with nearly degenerate mass. The results are based on data collected by the CMS experiment at the LHC during 2016--2018, corresponding to an integrated luminosity of up to 137\fbinv. The observed event yields are in agreement with the standard model expectations. The results are interpreted in the framework of supersymmetric (SUSY) simplified models targeting electroweakino mass-degenerate spectra and top squark-lightest neutralino (\sTop-$\PSGczDo$) mass-degenerate benchmark models. An interpretation of the analysis is performed also in the phenomenological minimal SUSY standard model (pMSSM) framework. In particular, the simplified wino-bino model in which the next-to-lightest neutralino and the lightest chargino are produced and decay according to $\PSGczDt\PSGcpmDo\to\PZ^{*}\PW^{*}\PSGczDo\PSGczDo$ are explored for mass differences ($\Delta m$) between \PSGczDt and \PSGczDo of less than 50\GeV, assuming wino production cross sections. At 95\% confidence level, wino-like $\PSGcpmDo$/$\PSGczDt$ masses are excluded up to 275\GeV for $\Delta m$ of 10\GeV relative to the lightest neutralino. The higgsino simplified model is of particular interest; mass-degenerate electroweakinos are expected in natural SUSY, which predicts light higgsinos. In this model, excluded masses reach up to 205\GeV for $\Delta m$ of 7.5\GeV and 150\GeV for a highly compressed scenario with $\Delta m$ of 3\GeV. In the pMSSM higgsino model, the limits are presented in the plane of the higgsino-bino mass parameters $\mu$-$M_1$; the higgsino mass parameter $\mu$ is excluded up to 170\GeV, when the bino mass parameter $M_1$ is 600\GeV. For larger values of $M_1$, the mass splitting $\Delta m (\PSGczDt, \PSGczDo)$ becomes smaller; for $M_1 = 800\GeV$, $\mu$ is excluded up to 180\GeV. Finally, two \sTop-$\PSGczDo$ mass-degenerate benchmark models are considered. Top squarks with masses below 540 (480)\GeV are excluded for the four-body (chargino-mediated) top squark decay model, with a (\sTop-$\PSGczDo$) mass splitting at 30\GeV. \begin{acknowledgments} We congratulate our colleagues in the CERN accelerator departments for the excellent performance of the LHC and thank the technical and administrative staffs at CERN and at other CMS institutes for their contributions to the success of the CMS effort. In addition, we gratefully acknowledge the computing centers and personnel of the Worldwide LHC Computing Grid and other centers for delivering so effectively the computing infrastructure essential to our analyses. Finally, we acknowledge the enduring support for the construction and operation of the LHC, the CMS detector, and the supporting computing infrastructure provided by the following funding agencies: BMBWF and FWF (Austria); FNRS and FWO (Belgium); CNPq, CAPES, FAPERJ, FAPERGS, and FAPESP (Brazil); MES and BNSF (Bulgaria); CERN; CAS, MoST, and NSFC (China); MINCIENCIAS (Colombia); MSES and CSF (Croatia); RIF (Cyprus); SENESCYT (Ecuador); MoER, ERC PUT and ERDF (Estonia); Academy of Finland, MEC, and HIP (Finland); CEA and CNRS/IN2P3 (France); BMBF, DFG, and HGF (Germany); GSRI (Greece); NKFIA (Hungary); DAE and DST (India); IPM (Iran); SFI (Ireland); INFN (Italy); MSIP and NRF (Republic of Korea); MES (Latvia); LAS (Lithuania); MOE and UM (Malaysia); BUAP, CINVESTAV, CONACYT, LNS, SEP, and UASLP-FAI (Mexico); MOS (Montenegro); MBIE (New Zealand); PAEC (Pakistan); MSHE and NSC (Poland); FCT (Portugal); JINR (Dubna); MON, RosAtom, RAS, RFBR, and NRC KI (Russia); MESTD (Serbia); SEIDI, CPAN, PCTI, and FEDER (Spain); MOSTR (Sri Lanka); Swiss Funding Agencies (Switzerland); MST (Taipei); ThEPCenter, IPST, STAR, and NSTDA (Thailand); TUBITAK and TAEK (Turkey); NASU (Ukraine); STFC (United Kingdom); DOE and NSF (USA). \hyphenation{Rachada-pisek} Individuals have received support from the Marie-Curie program and the European Research Council and Horizon 2020 Grant, contract Nos.\ 675440, 724704, 752730, 758316, 765710, 824093, 884104, and COST Action CA16108 (European Union); the Leventis Foundation; the Alfred P.\ Sloan Foundation; the Alexander von Humboldt Foundation; the Belgian Federal Science Policy Office; the Fonds pour la Formation \`a la Recherche dans l'Industrie et dans l'Agriculture (FRIA-Belgium); the Agentschap voor Innovatie door Wetenschap en Technologie (IWT-Belgium); the F.R.S.-FNRS and FWO (Belgium) under the ``Excellence of Science -- EOS" -- be.h project n.\ 30820817; the Beijing Municipal Science \& Technology Commission, No. Z191100007219010; the Ministry of Education, Youth and Sports (MEYS) of the Czech Republic; the Deutsche Forschungsgemeinschaft (DFG), under Germany's Excellence Strategy -- EXC 2121 ``Quantum Universe" -- 390833306, and under project number 400140256 - GRK2497; the Lend\"ulet (``Momentum") Program and the J\'anos Bolyai Research Scholarship of the Hungarian Academy of Sciences, the New National Excellence Program \'UNKP, the NKFIA research grants 123842, 123959, 124845, 124850, 125105, 128713, 128786, and 129058 (Hungary); the Council of Science and Industrial Research, India; the Latvian Council of Science; the Ministry of Science and Higher Education and the National Science Center, contracts Opus 2014/15/B/ST2/03998 and 2015/19/B/ST2/02861 (Poland); the Funda\c{c}\~ao para a Ci\^encia e a Tecnologia, grant CEECIND/01334/2018 (Portugal); the National Priorities Research Program by Qatar National Research Fund; the Ministry of Science and Higher Education, projects no. 14.W03.31.0026 and no. FSWW-2020-0008, and the Russian Foundation for Basic Research, project No.19-42-703014 (Russia); the Programa Estatal de Fomento de la Investigaci{\'o}n Cient{\'i}fica y T{\'e}cnica de Excelencia Mar\'{\i}a de Maeztu, grant MDM-2015-0509 and the Programa Severo Ochoa del Principado de Asturias; the Hellenic Foundation for Research and Innovation (HFRI) (Project Number: 2288) and the Stavros Niarchos Foundation (Greece); the Rachadapisek Sompot Fund for Postdoctoral Fellowship, Chulalongkorn University and the Chulalongkorn Academic into Its 2nd Century Project Advancement Project (Thailand); the Kavli Foundation; the Nvidia Corporation; the SuperMicro Corporation; the Welch Foundation, contract C-1845; and the Weston Havens Foundation (USA). \end{acknowledgments}
\section{INTRODUCTION} Frustrated magnetism is a fruitful frontier in the contemporary field of quantum materials wherein mutually incompatible interactions, driven by the arrangement of the magnetic ions and their exchange couplings, can lead to a variety of unusual phenomena~\cite{Balents2010,MilaMendelsLacroix}. Due to the dependence of the frustrated interactions on lattice geometry, materials with new lattice structures may offer untapped opportunities for the exploration of new and exotic physics. A long-serving example of the rich physics afforded by frustrated systems is illustrated by the A$_2^{3+}$B$_2^{4+}$O$_7$ magnetic pyrochlore oxides. In these compounds, A is a rare-earth ion (or Y$^{3+}$) and B is typically a transition metal, with both ions potentially carrying a magnetic moment and residing on the vertices of two distinct but interpenetrating lattices of corner-sharing tetrahedra)~\cite{GardnerRMP2010,HallasXYAnnuRevCMP,RauGingrasAnnuRevCMP}. For example, these materials have attracted interest for hosting classical spin ice physics~\cite{Bramwell1495,Springer-spin-ice} in Ho$_2$Ti$_2$O$_7$~\cite{Harris1997,Bramwell1495,PhysRevLett.87.047205} and Dy$_2$Ti$_2$O$_7$~\cite{Ramirez1999} and potentially their quantum analogues~\cite{Gingras_2014,RauGingrasAnnuRevCMP}, unconventional ordered states~\cite{ChangHiggs2012,StewartJPCM2004,Javanparast}, order-by-disorder as in Er$_2$Ti$_2$O$_7$~\cite{Zhitomirsky2012,Savary_Er2ti2O7,PhysRevB.93.184408,Oitmaa} and possibly other, more exotic, quantum spin liquids~~\cite{PhysRevLett.82.1012,KimuraQuantum2013,GaoNatPhys2019}. Over the past few years, a new related class of systems, the ``breathing'' pyrochlores, has garnered excitement. In these, the alternating corner-sharing tetrahedra of the lattice are distinguished by two different bond lengths, breaking inversion symmetry and leading to competition between inter- and intra-tetrahedron exchange interactions. The difference in size between the two types of tetrahedra can be characterized by the ``breathing ratio'', defined as $d'/d$ where $d$ and $d'$ are the nearest-neighbor bond distances between magnetic ions in small and large tetrahedra, respectively. Unfortunately, studies of breathing pyrochlores have been limited to a small number of systems due the scarcity of successfully synthesized compounds, with single crystal samples being even more elusive. One family of breathing pyrochlore materials that has been studied in detail is the Li(In,Ga)Cr$_4$(O,S,Se)$_8$ spinels~\cite{LeePRB2016,Okamoto2013,OkamotoJPSJ2015,OkamotoJPSJ2018,PokharelPRB2016}. These compounds have breathing ratios of $d'/d \approx 1$ and are thus in a regime of effective (competing) interactions close to the regular, non-breathing, pyrochlore lattice. LiInCr$_4$S$_8$, LiGaCr$_4$S$_8$ and CuInCr$_4$S$_8$ (first characterized in the 1970s~\cite{PINCH1970425}) are few members of this family which have been synthesized successfully. While these materials have provided interesting opportunities to study inter-tetrahedron coupling effects for the case of $d'/d \approx 1$ where the ``up'' and ``down'' tetrahedra have similar sizes, they leave unanswered questions about what may be possible with a more exaggerated breathing ratio. The large $S=3/2$ spin for the Cr$^{3+}$ ions in these materials may also suppress quantum effectss~\cite{GhoshNPJQM2019}; an $S=1/2$ breathing pyrochlore magnet is less likely to be classical. Study of the Li(In,Ga)Cr$_4$(O,S,Se)$_8$ has also been hindered by the lack of single crystal samples, which complicates the determination of the magnetic Hamiltonians of these systems~\cite{GhoshNPJQM2019}. Ba$_3$Yb$_2$Zn$_5$O$_{11}${}, however, lies at the opposite extreme where the breathing ratio is large, $d'/d \approx 2$~\cite{KimuraPRB2014}. This large breathing ratio leads to very different sizes for the ``up'' and ``down'' tetrahedra, resulting in rather isolated small tetrahedra with weak inter-tetrahedron interactions. Characterization of Ba$_3$Yb$_2$Zn$_5$O$_{11}${}~\cite{KimuraPRB2014,RauPRL2016,HakuPRB2016,HakuJPSJ2016,Park2016} has confirmed this picture of an interesting kind of ``molecular magnet'' of largely, it appears, independent tetrahedral spin clusters, each exhibiting a pair of degenerate ground states. The presence of these emerging low energy doublet degrees of freedom necessitates the consideration of inter-tetrahedron interactions, even in limit of large $d'/d$ breathing ratio. For example, how this degeneracy is resolved by the collective physics of the tetrahedra and the nature of the ultimate ground state of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} remain open questions. Turning now our focus to Ba$_3$Yb$_2$Zn$_5$O$_{11}${}, we begin with the single-ion physics. The magnetism of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} originates from the Yb$^{3+}$ ions where the $J=7/2$ manifold of the isolated ion is split by the $C_{3v}$ symmetric crystal field. This crystal field leads to a Kramers doublet separated by a gap of $38.2$ meV from the remaining levels~\cite{HakuJPSJ2016}. Given this splitting is large relative to the scale of the ion-ion interactions~\cite{RauPRB2018}, a description in terms of an effective $S = 1/2$ degree of freedom for each Yb$^{3+}$ ion is possible~\cite{RauGingrasAnnuRevCMP,RauPRB2018}. Analysis of inelastic neutron scattering data on powder samples found that antiferromagnetic Heisenberg exchange is dominant~\cite{KimuraPRB2014} with a surprisingly strong, but sub-dominant, Dzyaloshinskii-Moriya interaction~\cite{RauPRL2016,HakuPRB2016,Park2016} within each small tetrahedron. The absence of magnetic ordering down to $\sim 0.1$ K~\cite{HakuPRB2016,RauJPCM_2018}, despite a Curie-Weiss temperature of $-6.1$ K (as measured in the present paper), the observation of a residual entropy of ~$k_{\mathrm{B}}\ln(2)/4$ per Yb~\cite{KimuraPRB2014} and a dispersionless excitation spectrum~\cite{RauPRL2016,HakuPRB2016,Park2016} is consistent with these smaller tetrahedra remaining mostly decoupled (i.e. paramagnetically) down to $T \sim $ 0.1 K. The unexpected observation of a robust Heisenberg plus Dzyaloshinskii-Moriya interactions, with negligible symmetric anisotropies between the effective $S=1/2$ Yb$^{3+}$ spins in Ba$_3$Yb$_2$Zn$_5$O$_{11}${}~\cite{RauPRB2018}, has led to new insights in understanding related ytterbium compounds such as the chalcogenide spinels~\cite{spinel1,spinel2,spinel3} AYb$_2$X$_4$ (with A = Cd, Mg and X = S, Se) and the nearly perfect $S=1/2$ honeycomb Heisenberg antiferromagnet YbCl$_{3}$~\cite{ybcl31,ybcl32,ybcl33}. Proximity to this regime of weak symmetric exchange anisotropy in breathing pyrochlores with a large breathing ratio ($d'/d \gg 1$) has also been predicted to lead to rich collective physics when these tetrahedra are weakly coupled. Theoretical proposals include realizations of bosonic analogues of topological band structures such as Weyl touching points~\cite{Li2016}, enhanced stability of quantum spin ice~\cite{SavaryPRB2016,Gingras_2014}, and possibly the emergence of a rank-2 $U(1)$ spin liquid~\cite{YanPRL2020}. Realization of these kinds of novel collective physics of the small tetrahedra requires inter-tetrahedron interactions to be at play, and thus their presence and magnitude to be exposed and characterized experimentally. For the bulk of the experimental data on Ba$_3$Yb$_2$Zn$_5$O$_{11}${} thus far collected, these have been found to be too small to be observable, with a model of isolated tetrahedra proving sufficient to reproduce qualitatively all of the experimental data above $\sim 1$ K~\cite{RauPRL2016,HakuPRB2016,Park2016,RauJPCM_2018}. However, notable discrepancies appear in the heat capacity~\cite{RauPRL2016,HakuPRB2016,RauJPCM_2018} below $\sim 0.3$ K, suggesting the single-tetrahedron model is incomplete at very low energies. Inter-tetrahedron interactions could provide a natural explanation~\cite{RauPRL2016}, though the effects of structural disorder~\cite{HakuPRB2016} must also be considered carefully, given the non-Kramers $E$ doublet ground state of each small tetrahedron~\cite{RauPRL2016,RauJPCM_2018} can be split by non-magnetic disorder. Resolving the origin of these discrepancies through the investigation of powder samples is difficult, not only due to the small energy scales involved, but also due to the directional averaging inherent for powders~\cite{RauJPCM_2018}. In particular, in neutron scattering, this averaging can render dispersive excitations difficult to resolve beyond a linewidth. Thus, to explore carefully the low-temperature physics of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} and understand the nature of any inter-tetrahedron interactions, single-crystal studies are indeed required. Moreover, single-crystal-studies allow access to the details of field-driven level crossings even at the single-tetrahedron level which are unresolvable using powder samples. In this work, we report the synthesis and characterization results obtained for the first single-crystal samples of Ba$_3$Yb$_2$Zn$_5$O$_{11}${}. We present comprehensive studies of the single-crystal Ba$_3$Yb$_2$Zn$_5$O$_{11}${} using a wide range of experimental techniques including inelastic neutron scattering (INS) and bulk magnetic susceptibility, as well as ultra-sensitive tunnel diode oscillator (TDO) magnetic susceptibility measurements. Our single crystal measurements allow us to directly probe the finite wave-vector dependence of the magnetic excitations and anisotropic response at low temperatures and high magnetic fields. We find that the single tetrahedron model maintains its qualitative agreement with inelastic neutron measurements for most magnetic fields. On the other hand, our diffuse neutron scattering data collected at 70 mK shows evidence of deviations from the single tetrahedron model near the critical magnetic field attributed to the first level crossing and falls short of explaining the very low energy behavior. These results suggest that the inter-tetrahedron interactions could be responsible for the low-energy and low temperature physics, as depicted, for example, by the diffuse neutron scattering above the critical field of the first level crossing in this system. These results are also in agreement with the previously reported low temperature specific heat measurements where the simple single tetrahedron model fails to reproduce the observed data at low temperatures~\cite{RauJPCM_2018}. This work paves the way for further theoretical and experimental investigations aimed at shedding light on the unsolved ground state of this interesting breathing pyrochlore system. \section{EXPERIMENTAL AND THEORETICAL METHODS} \label{sec:Methods} \begin{figure*}[htp] \centering \includegraphics[width=0.95\textwidth]{Figures/Figure1.pdf} \caption{(a) The crystal structure of Ba$_3$Yb$_2$Zn$_5$O$_{11}${}. (b) Single crystal sample of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} used for single crystal neutron scattering experiment and the Laue back-scattering diffraction pattern of plane perpendicular to the $[111]$ direction. (c) Magnetic susceptibility $\chi$ vs temperature, $T$, down to 1.8 K. (Upper Inset) Field-dependent magnetization $M(H)$ at different $T$, with $H$ sweep rate of 0.03 T/min. The inflexion point in the $M$ vs $H$ data corresponds to a transition from an approximate total spin $S_{{\rm tot}}$ = 0 state to an approximate $S_{{\rm tot}}$ = 1 state. (Lower Inset) First derivative of magnetization $M(H)$ as function of field $H$ at temperatures of $T=1.8$ K and $T=2.5$ K. (d) The Rietveld refinement of the neutron powder diffraction pattern of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} at 2 K collected using NOMAD at the Spallation Neutron Source of ORNL. The red and blue solid lines represent the calculated intensity and the difference between observed and calculated intensities (weighted profile $R$-factor~\cite{R_Factors}, $R_{\rm wp}$ = 4.79\%), while the short vertical green marks represent the expected Bragg peak positions. (e) The pair density function (PDF) data at 2 K along with the refinement is shown. Black open circles, red lines and blue lines represent the PDF data, the refinement using the PDFGUI software~\cite{Pdfgui} with assumed space group $F\bar{4} 3 m$ and the difference between PDF data and refinement, respectively. \label{fig:struct-bulk} } \end{figure*} \subsection{Sample Synthesis} A powder sample of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} [structure shown in Fig.~\subref{fig:struct-bulk}{(a)}] was synthesized, as reported earlier \cite{KimuraPRB2014}, by finely grinding mixed powders of Yb$_2$O$_3$ (99.99 \%, Alpha Aesar), ZnO (99.99 \% , Sigma Aldrich) , and BaCO$_3$ (99.95 \%, Alpha Aesar) in the stoichiometric ratio of 1:5:3 and reacting at 1140~$^{\circ}$C in a box furnace for 48 hours with several intermediate grindings at a lower temperature. In preparation for the single crystal growth, the powder was compressed hydrostatically into a cylindrical rod, and then sintered at 1150~$^{\circ}$C in a vertical Bridgman furnace. Finally, large single crystals of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} were grown using the optical floating zone method. A typical crystal was grown in an O\textsubscript{2} atmosphere at 0.9 MPa, with an initial growth speed of 10 mm/hr and, upon stabilization of the liquid zone, at $\sim 6$ mm/hr until finished. To ensure uniform homogeneity of the liquid zone, the feed and seed rods were rotated in opposite directions with a rotation speed of 20 rpm during growth. \subsection{Susceptibility and Magnetization measurements} \label{sec:Susceptibility and Magnetization} Magnetic susceptibility, $\chi$, and magnetization, $M$, measurements were performed on a single crystal sample of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} up to $\mu_0H=$~7 T, using an in-house Cryogenic S700X SQUID magnetometer at temperatures of 1.8 K to 200 K using a Helium-4 probe. To explore the high-field magnetic properties of the Ba$_3$Yb$_2$Zn$_5$O$_{11}${} crystals, tunnel diode oscillator (TDO) measurements (described below) \cite{TDOReference} were carried out at the DC Field Facility of the National High Magnetic Field Laboratory in Tallahassee. A dilution refrigerator and a $ ^{3} $He system were used to cover the temperature range from 41 mK to 20 K. The field-dependent measurements up to 18 T were conducted using a superconducting magnet. The field sweep rate was kept low (0.1 to 0.3 T/min) to minimize the magnetocaloric effect. For a typical TDO measurement, bar-shaped Ba$_3$Yb$_2$Zn$_5$O$_{11}${} crystals of $\sim$ 2 mm in length and $\sim$ 1 mm in transverse width were prepared and placed inside a detection coil, with the $[111]$ direction aligned along the coil axis. Together, the coil and sample within form the inductive component of a LC circuit. The LC circuit, powered by a tunnel diode operating in its negative resistance region, was tuned to resonance in a frequency range between 10 and 50 MHz. The shift in the resonance frequency $f$, which is related to the change in the sample magnetization $M$ ($df/dH \propto d^2M/dH^2$)~\cite{Shi2019}, was then recorded. The TDO method measures the resonance frequency to a very high precision \cite{TDOReference} which enables identifying changes in the magnetic moments down to $\sim$ $10^{-12}$ emu compared to $\sim$ $10^{-8}$ emu in SQUID magnetometry measurements. \subsection{Neutron Scattering} \label{sec:Neutron Scattering} Inelastic neutron scattering (INS) measurements were performed at a number of facilities: using the Disk Chopper Spectrometer (DCS) at the National Institute of Standards and Technology, the Cold Neutron Chopper Spectrometer (CNCS) at Oak Ridge National Laboratory and the Wide Angle Neutron Diffractometer (WAND$^2$) also at Oak Ridge National Laboratory. A superconducting magnet was used in each of the above instrument to provide, in all cases, a vertical magnetic field up to 10 T (DCS), 8 T (CNCS) and 5 T (WAND$^2$). In all experiments, a single crystal sample of mass of about 1 g was mounted on a Cu sample holder in a dilution refrigerator. At DCS and WAND$^2$, the sample was mounted with the $[{h+k},-{h}+k,-2k]$ scattering plane being horizontal and with the magnetic field applied along the $[111]$ cubic direction. Neutron-absorbing Cd was used to shield the sample holder to reduce background scattering. The experiment at CNCS was performed with the sample mounted so the horizontal scattering plane is $[{h}{h}l]$ with the magnetic field applied vertically, along the $[1\bar{1}0]$ cubic direction. In all experiments, low temperature measurements were conducted with applied fields at the 70 mK base temperature and the background determination measurements were conducted under zero magnetic field at 50 K, 100 K and 50 K for DCS, CNCS and WAND$^2$, respectively. The sample stage was rotated close to 180$^\circ$ to cover few Brillouin zones in all the experiments. After carefully investigating the ``as-collected'' (unsymmetrized data), we used the crystallographically-allowed symmetry operations to improve statistics. The specific symmetry operations applied for each figure reported below in Sec.~\ref{sec:neutron} are noted in the pertinent figure captions. In order to investigate any structural disorder in Ba$_3$Yb$_2$Zn$_5$O$_{11}${}, total neutron scattering measurements were performed on a polycrystalline sample using the Nanoscale-Ordered Materials Diffractometer (NOMAD) at the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL, USA) with a lowest temperature of 2 K considered. Analysis and visualization of the neutron scattering data were performed using DAVE MSlice~\cite{DAVEMSLICE}, Mantid ~\cite{Mantid} and Python software packages. \subsection{Single Tetrahedron Model} \label{sec:singleTetra} Given the large inter-tetrahedron distance of $d' \gtrsim 6$ \AA{} compared to the small intra-tetrahedron distance $d \sim 3.3$ \AA{} [as shown in Fig.~\subref{fig:struct-bulk}{(a)}], to model in Ba$_3$Yb$_2$Zn$_5$O$_{11}${}, we begin by assuming that all inter-tetrahedron interactions are negligible and model the system as a set of decoupled “small” tetrahedra, hence focusing on the intra-tetrahedron interactions, which are expected to dominate. Since the first excited crystal field level is $\sim 38.2 \ {\rm meV}$ above the ground doublet~\cite{HakuPRB2016}, we can project the Hamiltonian describing the Yb$^{3+}$--Yb$^{3+}$ interactions~\cite{RauPRB2018} into the lowest ground state doublet, ignoring any higher-order perturbative corrections from virtual crystal-field excitations~\cite{RauGingrasAnnuRevCMP,RauPRB2018,PhysRevB.93.184408,Molavian}. Symmetry strongly constrains the allowed exchange interactions between these resulting (from the projection) $S=1/2$ effective spins, with a bond symmetry group of $2mm$ and full tetrahedral symmetry $\bar{4}3m$ about the center of each tetrahedron~\cite{inta}. These interactions are expected to act pair-wise between the effective Yb$^{3+}$ spins $1/2$ in each tetrahedron~\cite{RauPRB2018}, $\vec{S}_i$, with the model for each individual tetrahedron taking the form~\cite{RauPRL2016,Park2016,HakuPRB2016} \begin{align} \label{eq:model} {\cal H}_{\rm eff} \equiv &\sum_{i=1}^4 \sum_{j<i} \left[ J_{zz} S^z_i S^z_j - J_{\pm}\left(S^+_i S^-_j+S^-_i S^+_j\right)+\right. \nonumber \\ & J_{\pm\pm} \left(\gamma_{ij} S^+_i S^+_j+{\rm h.c.} \right)+ \\ & \left. J_{z\pm} \left( \zeta_{ij} \left[ S^z_i S^+_j+ S^+_i S^z_j \right]+ {\rm h.c.} \right) \nonumber\right] -\mu_{\rm B} \sum_{i=1}^4 \vec{B} \cdot \vec{\mu}_i , \end{align} where we have included a magnetic field $\vec{B}$ with the local Yb$^{3+}$ magnetic moment operators $\vec{\mu}_i$ given by \begin{equation} \label{eq:moment} \vec{\mu}_i \equiv \mu_B \left[ g_{\pm} \left(\vhat{x}_i S^x_i + \vhat{y}_i S^y_i\right) + g_z \vhat{z}_i S^z_i\right] , \end{equation} and associated $g$-factors, $g_z$ and $g_{\pm}$. We borrow definitions from Ref.~\cite{RossPRX2011} for the bond form factors $\gamma_{ij}$ and $\zeta_{ij}$ and the local axes ($\vhat{x}_i$, $\vhat{y}_i$, $\vhat{z}_i$). Note that there is freedom in choosing the sign of $J_{z\pm}$, as it can be changed by a basis transformation. The spectrum of this Hamiltonian is partly constrained by tetrahedral symmetry. The sixteen states of the four-spin system break into the irreducible representations of $\bar{4}3m$ \begin{equation} \label{eq:IR} A_2 \oplus 3 E\oplus T_1 \oplus 2 T_2, \end{equation} under the action of the tetrahedral group~\cite{RauJPCM_2018}. This gives a level structure that consists of a singlet ($A_2$), three doublets ($E$) and three triplets ($T_1$ or $T_2$),with the highest lying doublet ($E$) and triplet ($T_2$) being nearly degenerate; see Fig.~\subref{fig:TDO_hightemp}{(a)}. We use the parameters of Rau \textit{et al.}~\cite{RauJPCM_2018}, which were fit using data from powder samples in finite magnetic fields, and do not reconsider here these values: \begin{align} \label{eq:JValues} J_{zz} &= -0.040 \ {\rm meV}, & J_{\pm} &= +0.141 \ {\rm meV} ,\nonumber\\ J_{\pm\pm} &= +0.160 \ {\rm meV}, & J_{z\pm} &= +0.302 \ {\rm meV} , \end{align} with $g$-factors $g_z$ = 2.726 and $g_{\pm}$ = 2.301. Theoretically, we compute the unpolarized inelastic neutron scattering intensity, $I(\vec{Q},E)$, using the same methods presented in Refs.~[\onlinecite{RauPRL2016},\onlinecite{RauJPCM_2018}], which is given by \begin{align} \label{eq:NeutronIntensity1} I(\vec{Q},E)&\propto F(\vec{Q})^2\sum_{\mu \nu}(\delta_{\mu \nu}-\hat{Q}_\mu \hat{Q}_\nu)S_{\mu \nu}(\vec{Q},E) , \end{align} where $F(\vec{Q})$ is the atomic form factor of Yb\textsuperscript{3+}~\cite{intc}. The spin structure factor for each tetrahedron is given by \begin{align*} S_{\mu \nu}(\vec{Q},E)\equiv \sum_{nm} \rho_{m} \braket{m | \mu^\mu_{-\vec{Q}} | n}\braket{n | \mu^\nu_{\vec{Q}} | m}\delta(E-E_n+E_m), \end{align*} where $\rho_m\equiv e^{-\beta E_m/T}/Z$ is the Boltzmann weight and the Fourier transform of the magnetic moment operator is given by $\vec{\mu}_{\vec{Q}}\equiv {\frac{1}{4}}\sum_{i=1}^4 e^{i\vec{Q} \cdot \vec{r}} \vec{\mu}_i$, with $\vec{\mu}_i$ given by Eq. (2). \section{RESULTS AND DISCUSSION} \label{sec:Results} \subsection{Magnetic property measurements} \label{sec:TDO} The magnetic susceptibility, $\chi$, was measured on our single crystal sample down to 1.8 K under an applied magnetic field of 0.01 T along the crystallographic $[111]$ direction using the aforementioned Cryogenic S700X SQUID system, as shown in Fig.~\subref{fig:struct-bulk}{(c)}. A broad maximum is observed at $\sim$4 K, similar to that in the powder sample~\cite{KimuraPRB2014}. The Curie-Weiss temperature $\theta_{{\rm CW}} = -6.85$ K obtained from the Ba$_3$Yb$_2$Zn$_5$O$_{11}${} single crystal susceptibility data by fitting $\chi = C/ (T -\theta_{{\rm CW}})$ in the temperature range of 10 K $<T<$30 K, agrees well with the previously reported value $\theta_{{\rm CW}} = -6.7$ K using a powder sample \cite{KimuraPRB2014}. \begin{figure*}[htp] \centering \includegraphics[width=0.95\textwidth]{Figures/Figure2.pdf} \caption{(a) Field-dependent energy levels calculated by the single-tetrahedron model. Irreducible representations of the zero-field ($T_d$) and finite field ($C_3$) symmetry groups are indicated. Critical fields where there is a ground state level crossing ($\mu_{0}H_{\rm{c}1} $ = 3.65 T and $\mu_{0}H_{\rm{c}2} $ = 9.48 T) indicated by vertical dash lines are close to the experimental values. The low energy regime (e.g. as would be thermally populated at $ T\lesssim 1$ K) is indicated by a gray shaded box. (b) Tunnel diode oscillator (TDO) frequency ($f$) as a function of magnetic field $\mu_{0}H$ $(|| ~[111])$ up to 20 K. Traces are shifted vertically for clarity. Small dips in frequency in addition to two level crossings are marked by arrows. The sharp features at higher temperatures, e.g. near $\sim 6$ T, are associated with background signal from our experimental apparatus. (c,d) $f$ vs $\mu_{0}H$ $(||~ [111])$ as a function of magnetic field $\mu_{0}H$ $(|| ~[111])$ up to 0.880 K, near the ground state level crossings at (c) 3.5 T, and at (d) 8.8 T. Additional features observed near 3.5 T are marked by grey dash lines. Insets in (c) and (d) show $f$ vs $\mu_{0}H$ for the upsweep (black) and downsweep (red) at $T$ = 0.041 K, where no hysteresis is seen. \label{fig:TDO_hightemp} } \end{figure*} Applying larger magnetic fields, Ba$_3$Yb$_2$Zn$_5$O$_{11}${} can be tuned through two transitions. In powder samples, these appear near the critical fields $\mu_{0}H_{\rm{c}1}\approx 3.5\ {\rm T}$ and $\mu_{0}H_{\rm{c}2} \approx 8.8\ {\rm T}$~\cite{HakuPRB2016,Park2016}. We show in Fig. \subref{fig:TDO_hightemp}{(a)} the energy level results calculated using the single tetrahedron model as a function of field. The theoretical values of $\mu_{0}H_{\rm{c}1}$ and $\mu_{0}H_{\rm{c}2}$ are indicated by vertical dash lines. As alluded to earlier, the TDO frequency $f$ is an extremely sensitive measurement of the magnetic susceptibility~\cite{Haravifard2016,Shi2019,Steinhardt2021} and reveals fine details of changes in the magnetic response of sample. We show in Fig.~\subref{fig:TDO_hightemp}{(b-d)} the measured TDO frequency in Ba$_3$Yb$_2$Zn$_5$O$_{11}${} over a range of magnetic fields along the $[111]$ direction, with strength $0\ {\rm T} \leq \mu_0 H \lesssim 12\ {\rm T}$. Our SQUID and TDO results collected on the single crystal reveal that the critical fields for $H \parallel [111]$ [Fig. \subref{fig:TDO_hightemp}{(c)} and \subref{fig:TDO_hightemp}{(d)}] are nearly identical to those reported previously on powder samples~\cite{Park2016}. As shown in Fig.~\subref{fig:TDO_hightemp}{(c)}, the TDO data reveals the presence of two shoulder-like structures for field values just below the first level crossing at 3.5 T and at the lowest temperature, and become more distinguishable as temperature is increased. These features may suggest the presence of additional level crossings near $\mu_{0}H_{\rm{c}1}$ that are not captured by the single-tetrahedron model. We leave a detailed exploration of the nature of these features to future work. Similar to our SQUID data, we do not see obvious hysteresis either near $\mu_{0}H_{\rm{c}1} $ or $\mu_{0}H_{\rm{c}2} $. This is in contrast to Ref.~\cite{Park2016}, where a field-sweep-rate dependent hysteresis was reported on powder samples of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} and attributed to an avoided level crossing of the ground and first excited state near $\mu_{0}H_{\rm{c}1}$.~\footnote{Depending on the magnitude of the field sweep rate relative to the energy splitting at the avoid crossing, non-adiabatic transitions between the ground and first excited states are possible and their probability can be estimated using the usual Landau-Zener formula. Significant non-adiabatic probability implies hysteresis in the state of the system (and thus magnetization) as the field is swept up or down.} However, in a $[111]$ field, the crossing at $\mu_0 H_{\rm{c}1}$ is \emph{not avoided}; symmetry forbids any coupling between these states [see Fig.~\subref{fig:TDO_hightemp}{(a)}]. We note that no hysteresis is observed (or is in fact expected~\footnote{ The authors of Ref.~\cite{Park2016} attribute the hysteresis observed in their data to a non-equilibrium effect due to the finite rate of change in the magnetic field strength. However, estimates of the probability of non-adiabatic transitions (using the standard Laudau-Zener formula~\cite{landau1987quantum}) for any reasonable splitting size [$O({\rm meV})$] and field sweep rate [$O({\rm mT/min}]$] are negligible. }) in our data, in contrast to that seen in Ref.~\cite{Park2016} [insets of Fig.~\subref{fig:TDO_hightemp}{(c)} and ~\subref{fig:TDO_hightemp}{(d)}]. With increasing temperature to 20 K [Fig. \subref{fig:TDO_hightemp}{(b)}], the sharp features associated with the two ground state level crossings at $\mu_{0}H_{\rm{c}1} $ and $\mu_{0}H_{\rm{c}2} $ get broader and diminished, while new features as indicated by arrows, appear as the temperature is raised. From measurements on our single crystal, we have exposed signatures of two field-driven transitions as expected from the theoretical single-tetrahedron model. We next consider how the spin-spin correlations, as probed by neutron scattering measurements on our single crystal, evolve as a function of field and, in particular, across the two transitions at $\mu_{0}H_{\rm{c}1} $ and $\mu_{0}H_{\rm{c}2}$. \subsection{Neutron scattering} \label{sec:neutron} In this section, we present the results of three complementary neutron scattering experiments. In order, these address the presence or absence of structural disorder (Sec.~\ref{subsec:neutron-struct}), the finite-energy magnetic excitations (Sec.~\ref{subsec:neutron-inelastic}) as well as an indirect view on the low-energy excitations via an energy-integrated experiment (Sec.~\ref{subsec:neutron-diffuse}). \subsubsection{Structural characterization} \label{subsec:neutron-struct} One of the main concerns in previous studies on Ba$_3$Yb$_2$Zn$_5$O$_{11}${}~\cite{HakuPRB2016,RauPRL2016,RauJPCM_2018} was whether or not any disorder played a role in the discrepancies observed in their reported low temperature measurements relative to the theoretical results on the above single tetrahedron model, especially in the heat capacity data. In an attempt to address this concern and investigate the detailed crystal structure at low temperature and any possible disorder, neutron scattering measurements were performed on Ba$_3$Yb$_2$Zn$_5$O$_{11}${} powder sample using the Nanoscale-Ordered Materials Diffractometer (NOMAD) at Oak Ridge National Laboratory. The data was collected for selected temperatures between 100 K to 2 K. Rietveld refinements were performed using the GSAS II software on the collected data. No structural transition is observed down to 2 K and the system can be well described with the $F\bar{4} 3 m$ space group, as shown in Fig 1(d). To understand the local atomic structure of Ba$_3$Yb$_2$Zn$_5$O$_{11}${}, the pair distribution function (PDF) of the total scattering data was also analyzed \cite{TAKESHI201255}. The PDF data, $G(r)$, collected at 2 K is shown in Fig. 1(e). Data were refined using the PDFGUI software ~\cite{Pdfgui} with the $F\bar{4} 3 m$ space group. As evident from the refinement, the observed data is well represented by our model with $F\bar{4} 3 m$ symmetry with weighted $R$-factor~\cite{R_Factors} $R_{\rm w}=5\%$. No additional peak splitting or significant mismatch is resolvable; our measurements thus do not provide any evidence for local structural disorder in this system down to 2 K. \begin{figure}[htp] \centering \includegraphics[width=0.46\textwidth]{Figures/Figure3.pdf} \caption{Intensity for inelastic neutron scattering from a single crystal sample of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} measured at $T$ = 70 mK using the Disk Chopper Spectrometer (DCS) for a series of fields $\vec{H}\parallel[111]$ (a) 0 T (b) 5 T and (c) 10 T. For each field, the left panel shows the intensity as a function of energy transfer and momentum along $[h,-h,0]$ direction. On the right, constant energy intensity maps in the $[h+k,-h+k,-2k]$ plane are shown for selected dispersionless bands which are integrated along energy with an energy width specified to fully capture each band for each magnetic field. \label{fig:Neutron_SQW} } \end{figure} \subsubsection{Energy-resolved inelastic scattering} \label{subsec:neutron-inelastic} To date, only powder samples of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} have been measured with inelastic neutron scattering~\cite{HakuPRB2016,RauPRL2016,RauJPCM_2018} and, within the constraints of powder averaged inelastic neutron scattering data, the experimentally observed low energy excitations are in agreement with the single tetrahedron model~\cite{RauPRL2016,HakuPRB2016,Park2016}. In order to study the detailed physics of this system beyond the single tetrahedron model, such as the details of the energy levels crossing depending on the direction of applied field, single crystal neutron scattering experiments performed at zero and finite fields (applied along different lattice directions) are necessary. Single crystal samples also allow us to investigate the anisotropic behavior of the excitations compared to previous powder neutron scattering studies. To this end, we have performed inelastic neutron scattering experiments using our single crystal sample of Ba$_3$Yb$_2$Zn$_5$O$_{11}${} as explained in Sec.~\ref{sec:Neutron Scattering} with applied field $\vec{H} \parallel [111]$ (at DCS) and $\vec{H} \parallel [1\bar{1}0]$ (at CNCS). The field evolution of the low energy excitations for a few selected fields between $\mu_{0}H_{\rm{c}1} $ and $\mu_{0}H_{\rm{c}2}$ are shown in Fig.~\ref{fig:Neutron_SQW} with applied field $\vec{H} \parallel [111]$. Figure~\ref{fig:Neutron_SQW} shows the wave vector dependence for each energy band as a function of field, in which the cuts were performed over a narrow energy window. Similar to powder samples~\cite{RauPRL2016,Park2016,HakuPRB2016}, dispersionless excitations are observed at zero and finite fields in our single-crystal samples as well. A slight broadening of the excitations, greater than the resolution of the instruments, is observed, although no clear dispersion visible. We note that some intrinsic broadening of the levels is to be expected due to any dispersion-induced by inter-tetrahedron interactions; the slightness of this broadening is consistent with the smallness of these couplings. \begin{figure*}[htp] \centering \includegraphics[width=0.95\textwidth]{Figures/Figure4.pdf} \caption{Comparison of the experimental (top row of each panel) and theoretical (bottom row of each panel) dynamical structure factor for the model of Eq. (1) with the parameters of Eq. (4) for several energy windows at different magnetic fields, including the atomic form factor of Yb$^{3+}$. The energy windows are convoluted with a finite Gaussian to emulate experimental broadening and resolution. In the following, experimental plots symmetry operations were applied to improve the statistics. $\vec{H}\parallel[111]$ at 0 T: 6-fold rotation and ~$H>$~0 T: 3-fold rotation. $\vec{H}\parallel[1\bar{1}0]$ at 0 T: mirror symmetry operations centered at $[h,-h,0]$ and $[0,0,k]$ directions and $H>0$ T mirror symmetry operations centered at $[0,0,k]$. $\vec{H}\parallel[111]$ data was measured at DCS with incident neutron energy $E_{\textrm i}$= 5 meV and only the detector background subtracted (i.e. not including the high-temperature background). $\vec{H}\parallel[1\bar{1}0]$ data was measured at CNCS and 100 K data was used as the background to eliminate unavoidable nearly temperature independent background scattering observed due to scattering from the magnet. \label{fig:Neutron_EnergyCuts} } \end{figure*} Having access to single-crystal samples, we can explore the wave-vector dependence of the intensity of each dispersionless mode in 3-dimension reciprocal space and check for the theoretically expected symmetry of the neutron scattering intensity in the scattering plane in zero and finite fields. In zero field, the presence of full $T_d$ symmetry and time-reversal symmetry imposes a six-fold symmetry in the $[h + k, -h + k, -2k]$ plane. Thus, each band exhibits a pinwheel-type pattern which is 6-fold symmetric in this scattering plane, as shown in the three right panels of ig.~\subref{fig:Neutron_SQW}{(a)}. Upon application of a $[111]$ field, we observe an evolution of the intensity as a function of wave-vector which changes qualitatively across each critical field (level crossing). The details of the redistribution of intensity depend on the field direction: for $[111]$ fields, only a three-fold symmetry remains, while for fields along $[1\bar{1}0]$, only a single two-fold symmetry is present. The zero-field Hamiltonian ${\cal H}_{\rm eff}$ in Eq.~(\ref{eq:model}) has a mirror symmetry, $\sigma = - \vec{C}_2$, that is broken by finite field. However, this mirror reverses a $[111]$ magnetic field and therefore, combining it with time-reversal, yields an additional symmetry \begin{align} \label{eq:NeutronIntensityField} I(\vec{Q},E;\vec{B})=I(\vec{C}_2 \vec{Q},E;\vec{B}), \end{align} for the $[111]$ field direction. Thus, we effectively have a set of two-fold axes in the plane perpendicular to $[111]$, giving a symmetry group of $D_3$ rather than only a $C_3$ symmetry at zero field. Under a finite magnetic field, this effective inversion symmetry [Eq.~(\ref{eq:NeutronIntensityField})] is broken and the intensity pattern becomes 3-fold symmetric. This can be seen in Figs.~\subref{fig:Neutron_SQW}{(b,c)}, which show the $E$-$\vec{Q}$ plots and the energy-integrated cuts for each energy band for a $[111]$ field (5 T) above the first level crossing transition at $H_{\rm{c}1} $ and one (10 T) beyond the second level crossing transition at $H_{\rm{c}2} $. We show the results obtained for a 5 T applied field, where energy cuts obtained for the band centered at $E=0.25$ meV reveal broad features centered around $[20\bar{2}]$ that have the expected three-fold symmetry in the $[h+k,-h+k,-2k]$ plane. It is clear that the obtained pattern for 5 T is different from the results collected in zero field. For the next higher excitation band at $E= 0.65$ meV, the pattern is rotated by 30 degrees compared to the band at $E=0.25$ meV. Similarly, the intensity pattern in $\vec{Q}$ space in this scattering plane changes as we move up in the energy for each flat excitation band and shows a unique pattern for each. Similar to the 5 T results, the 10 T field data also demonstrates a subsequent change in the intensity following the second level crossing. For the energy transfer range determined by our incident energy, we could only observe two flat excitation bands at 10 T. The band centered at $E=0.25$ meV shows a similar 3-fold pattern for this field as observed for 5 T, however, the second band at $E=1.4$ meV shows an intensity that is more concentrated at small wave-vector; likely a transition between approximate $S_{\rm tot}=2$ states of mostly ferromagnetic character. In order to explore the anisotropy of the neutron scattering intensity as function of the field direction, we also performed inelastic neutron scattering experiments with $\vec{H} \parallel [1\bar{1}0]$, perpendicular to the $[111]$ direction. As with the $[111]$ direction, we consider individual energy cuts at several fields ranging from 0 T to 10 T, comparing the applied field along $[1\bar{1}0]$ direction to the analogous cut for $[111]$ field. The results are shown in Fig.~\ref{fig:Neutron_EnergyCuts}. For each panel, the experimental data and theoretical calculation using single tetrahedron model are shown for both field directions, $\vec{H} \parallel [111]$ and $\vec{H} \parallel [1\bar{1}0]$. We emphasize that Fig.~\subref{fig:Neutron_EnergyCuts} ~shows good agreement between the experimental data and the single tetrahedron model calculations, for all energy cuts and for both field directions, and within the constraints from experimental noise, background and resolution. All qualitative features for each energy cut are well captured by the theoretical calculations. This indicates that the nature of the dispersionless bands at energies $E>0.3$ meV are well explained by the single tetrahedron model. The consistency of the single-crystal data and the theoretical model fit to data from polycrystalline samples is non-trivial, given the different sample growth processes (powder vs. single crystal). Further, given the information lost due to powder averaging, one may worry that the theoretical model may not have been fully constrained by the polycrystalline data~\cite{RauPRL2016,RauJPCM_2018}. The agreement reported here is evidence that the single-crystal and powder samples are exhibiting the same physics, and the model determined from powder samples remains valid, at least for energies $\gtrsim O(0.1 \ {\rm meV})$. \subsubsection{Energy-integrated diffuse scattering} \label{subsec:neutron-diffuse} While, the inelastic scattering data in Sec.~\ref{subsec:neutron-inelastic} provides detailed information about the finite-energy excitations, due to the challenges arising from experimental background, instrument resolution and the limited flux, it offers limited information about the physics of the system at low energies, where one might expect to look for evidence of physics beyond the single tetrahedron model. Therefore, in order to capture this very low-energy physics, a diffuse neutron scattering experiment, which integrates over \emph{all} energies, was performed using the Wide Angle Neutron Diffractometer (WAND$^2$) instrument at Oak Ridge National Laboratory. WAND$^2$ features a highly efficient high resolution ${}^3$He 2-dimensional position sensitive detector which enables it to map a large portion of reciprocal space for single crystals. One of the specialized data collection purposes of WAND$^2$ is measurements of diffuse scattering in single crystals. Figure ~\subref{fig:WANDdata}~ shows the neutron scattering data measured at WAND$^2$. Data was collected at 70 mK and fields up to 4.8 T. High temperature data collected at 50 K and zero field, was used as background and subtracted from the 70 mK data for each field. The incident neutron wavelength at WAND$^2$ is $\lambda= 1.486$ \AA{}, with corresponding incident energy $E_{\textrm i}=37.04$ meV. Due to the inability to discriminate the energy and considering the energy resolution ($>3$ meV), one can expect the data obtained at WAND$^2$ to amount to energy-integrated scattering up to $\sim 2$ meV. The diffuse scattering intensity (static structure factor) is given by integrating Eq.~(\ref{eq:NeutronIntensity1}) over energy \begin{align} \label{eq:IQE_integrated} I(\vec{Q},B) \propto F(\vec{Q})^2 \sum_{\mu \nu}(\delta_{\mu \nu}-\hat{Q}_\mu \hat{Q}_\nu)\braket{\mu^\mu_{-Q}\mu^\nu_{Q}} \end{align} where, again, $F(\vec{Q})$ is the atomic form factor of Yb\textsuperscript{3+}~\cite{intc}. Per its definition, this is symmetric under $\vec{Q} \rightarrow -\vec{Q}$, even for finite magnetic fields for unpolarized neutron scattering intensity. Combining this with the three-fold rotational symmetry, the integrated intensity has an enlarged six-fold symmetry for a $[111]$ field.~\footnote{We note that this additional symmetry arises due to the symmetrization of the unpolarized intensity and the integration of over energy transfer that reduces the structure factor to static moment-moment correlation function.} In zero field, the qualitative features of the data are reproduced in the calculation: a hexagon of high-intensity with maximum intensity along $[h,-h,0]$ and equivalent directions. In addition, it shows minima in the intensity at zero, as well as at six points equivalent to $\sim [6,-6,0]$. Six weaker minima are also visible near $[2,2,-4]$ (and equivalent positions) in both the theoretical calculation and the experimental data. However, the agreement is not perfect; these six minima are more pronounced in the theoretical calculation as compared to the experimental data. The pattern for $\mu_{0}H = 1$ T is similar to the zero field one in both the theoretical calculation and the experimental data. In contrast, calculated intensity at $\mu_{0}H = 3.5$ T is considerably different from the experimental data. Namely, the high-intensity hexagon is broader, with a more uniform intensity and minima near $[2,2,-4]$ and its equivalents are essentially absent. However, theoretical calculations obtained for 3.5 T, show very similar pattern to the 0 T and 1 T data, with same set of pronounced minima near $[2,2,-4]$. At 4.8 T, the theoretical result differs from the lower field results. While some experimentally observed features, such as the location of intensity minima, agree with the theoretical results for the 4.8 T data, there are qualitative differences such as absence of intensity modulations in the high-intensity hexagon in the theoretical calculations, as well as in the visibility of the low intensity regions at $[6,-6,0]$ and equivalent positions. In comparison, the DCS and CNCS inelastic neutron scattering results, not at low energy, as discussed in Sec.~\ref{subsec:neutron-inelastic}, were overall in acceptable agreement with the theoretical calculations using the single tetrahedron model (Figs.~\ref{fig:Neutron_EnergyCuts}). Recalling the aforementioned ability of the WAND$^2$ experiment to probe low-energy excitations, we interpret these results in the following way: as the inter-tetrahedron interactions are expected to be small, we can argue that the possible dispersion of the ground state doublet induced by these interactions is also small, with the corresponding excitations lying at very low energies, close to the elastic channel. The differences between the data and the theoretical calculations using the single tetrahedron model may thus be due to low energy diffuse scattering features arising from physics beyond the single tetrahedron model. Such discrepancies at low energy are consistent with the previously reported heat capacity data \cite{HakuPRB2016,RauJPCM_2018}, which showed a broad peak centered at $\sim$ 0.1 K, with an entropy change consistent with the release of two degrees of freedom per single tetrahedron. In the single-tetrahedron model, the ground state doublet is degenerate; the complete release of this entropy, indicating a unique ground state, thus points again to physics beyond the single-tetrahedron model. The energy scale of this splitting was estimated to be $\sim$ 0.015 meV at 0 T~\cite{HakuPRB2016} -- much smaller than the instrumental resolution of current neutron scattering experiments, $\sim$ 0.05 meV, as in the experiments presented in Sec.~\ref{subsec:neutron-inelastic}. We indicate this energy scale by a shaded gray box in Fig.~\subref{fig:TDO_hightemp}{(a)}. Compared to the single-tetrahedron energy levels, we see that this energy scale is indeed small. \begin{figure}[tp] \centering \includegraphics[width=0.5\textwidth]{Figures/Figure5.pdf} \caption{Comparison of the experimental (right) and theoretical (left) energy-integrated structure factor at several magnetic fields using single tetrahedron model. Theoretical plots include the atomic form factor of Yb$^{3+}$. Experimental data was measured using the Wide Angle Neutron Diffractometer (WAND$^2$). Both experimental and theoretical plots show the data at $T$ = 70 mK after subtracting the background at 50 K at 0 T. \label{fig:WANDdata} } \end{figure} The most natural origin for the splitting of the doublets may be attributed to inter-tetrahedron interactions or to non-magnetic disorder that lowers the symmetry of each tetrahedral cluster. Recalling Sec.~\ref{subsec:neutron-struct}, our PDF results show no observable evidence for disorder in our samples, indicating any non-magnetic structural disorder is small and below the resolution threshold of our experiments. However, given the minute energy scale of the doublet splitting ($\sim 0.015$ meV), we cannot rule out that small distortions, below the experimental resolution, could potentially account for the entropy release. At higher magnetic fields, away from the level crossings, the ground state is non-degenerate and thus the effect of either small inter-tetrahedron interactions or of non-magnetic disorder should be less significant. However, we note that there still exist major discrepancies, in the diffuse scattering data from WAND$^2$ as well as in the TDO measurements, with the single tetrahedron model at these higher fields. Crucially, both of these of measurements include contributions from the low-energy physics. A similar disagreement was noted in the high-field heat capacity~\cite{RauJPCM_2018}. The effective strength of the inter-tetrahedron interactions can vary between the different degenerate energy level manifolds of the tetrahedron and as a function of field as they mix. However, it is not clear that higher fields will enhance these interactions sufficiently to account for the discrepancies with the data. \section{CONCLUSION} We reported here the first single crystal synthesis of a breathing pyrochlore. Single crystal neutron scattering data using high quality single crystals of the breathing pyrochlore Ba$_3$Yb$_2$Zn$_5$O$_{11}${} was presented for the first time. Our neutron scattering data show essentially dispersionless bands within the instrument resolution. The single tetrahedron model can overall explain the observed dependence on wave-vector for the individual excitation bands of the system. Discrepancies between experimental data and the single tetrahedron model are observed in the diffuse scattering data at higher fields ($\mu_{0}H>$ 3T) and $T$ = 0.1 K, indicating that physics not included in the single tetrahedron model is responsible. Our powder diffraction data and pair distribution function analysis show that there is no observable disorder in the samples, which further support the suggestion that inter-tetrahedron interactions are the most likely explanation for the discrepancies between the experimental data and the predictions of the single tetrahedron model. Tuning the strength of the inter-tetrahedron interactions in breathing pyrochlores away from the isolated limit where $d'/d \gg 1$, by changing the breathing ratio, may be a path to realizing exotic states in breathing pyrochlores generally. The array of possibilities for such tuning, e.g. chemical or hydrostatic pressure~\cite{MirebeauNature,MirebeauPRL}, or by synthesis of new members of this family with different rare-earth ions (other than Yb$^{3+}$), presents many avenues for future investigations. \label{sec:conclusion} \begin{acknowledgments} We are thankful to Stephen Kuhn for fruitful discussions and for his helps with this project in its early stages. M.J.P.G. acknowledges the Canada Research Chair (Tier I) program for support. S.H. acknowledges support provided by funding from William M. Fairbank Chair in Physics at Duke University, and from the Powe Junior Faculty Enhancement Award. This research used resources at the High Flux Isotope Reactor and Spallation Neutron Source, a DOE Office of Science User Facility operated by the Oak Ridge National Laboratory. We acknowledge the support of the National Institute of Standards and Technology, U.S. Department of Commerce, in providing the neutron research facilities used in this work. The identification of any commercial product or trade name does not imply endorsement or recommendation by the National Institute of Standards and Technology. A portion of this work was performed at the National High Magnetic Field Laboratory, which is supported by the National Science Foundation Cooperative Agreement No. DMR1157490 and DMR-1644779, the State of Florida and the U.S. Department of Energy. \end{acknowledgments} \section{DATA AVAILABILITY} The data that support the findings of this study are available from the corresponding authors upon request. \section{AUTHOR CONTRIBUTIONS} Research conceived by S.H.; Single crystal sample was grown and characterized by C.M., W.S., and S.H.; Thermodynamics and TDO measurements were performed by S.D., Z.S., R.B., D.G., and S.H.; Neutron scattering experiments were performed by S.D., W.S., N.P.B., M.F., A.P., J.L., and S.H.; Theoretical calculations were conducted by J.G.R and M.J.P.G.; All results were discussed and analyzed by S.D., Z.S, J.G.R, M.J.P.G, and S.H.; Manuscript written by S.D., J.G.R, M.J.P.G, and S.H.; All authors commented on the manuscript. \section{COMPETING INTERESTS} The authors declare no competing interests. \bibliographystyle{apsrev4-2}
\section{Introduction} One of the most fascinating aspects of quantum theory is the fact that it does not obey the same common-sense form of causality that is observed at the macroscopic level. This is made formal in Bell's theorem \cite{Bell64}, which proves that any attempt to reformulate the theory in a classical picture of reality is doomed to fail at reproducing the predictions of certain experiments, called Bell tests. In a Bell test, an entangled quantum system is prepared and shared between a number of spatially separated laboratories and subsequently measured. Remarkably, measurements made in these separate locations lead to correlations between outcomes that defy explanation via shared classical resources alone: a phenomenon first shown by Bell \cite{Bell64} and consequently called Bell nonlocality (see \cite{BrunnerReview} for a review article). The discovery of Bell nonlocality has since developed into its own field of research, and much is now known. This research program has also inspired new notions of non-classicality that are closely related to Bell nonlocality. The most widely studied of these is EPR steering \cite{wiseman07,Cavalcanti16Steering,Uola20Steering,jevtic2015einstein,nguyen16LHSmodels,bowles_sufficient}. Like Bell nonlocality, EPR steering is a form of non-classicality exhibited by entangled quantum states, and relates to the fact that a measurement made on one subsystem of an entangled state has the ability to influence or ``steer'' the distant quantum state of another subsystem. EPR steering can also be understood from the perspective of Bell nonlocality, where one makes stronger assumptions about the physics of one of the devices; for this reason, the phenomenon is generally easier to observe in experiments than Bell nonlocality \cite{saunders2010experimental,wittmann12}. Aside from foundational implications, Bell nonlocality and EPR steering also play a key role in quantum information technologies. In particular, the phenomena serve as the fuel for the class of device-independent (DI) \cite{Bowles2018,DIENTbarreiro,acin07deviceind,woodhead2021device,sekatski2021device,nadlinger2021device,zhang2021experimental,pironio2009device}, and certain types of semi-device-independent (SDI) protocols \cite{branciard2012one,gheorghiu2017rigidity,coyle2018one,vsupic2016self}. The most basic of these protocols is that of entanglement certification: since both phenomena require the use of entangled states, the observation of either implies a certificate of entanglement in the underlying physics. Device-independent certification of entanglement is highly desirable, since it allows us to ensure entanglement even in a scenario where the measurements performed by the parties are untrusted and uncharacterised. Additionally, such protocols serve as starting points for advanced protocols of cryptography~\cite{ekert91,barrett05device_ind,acin07deviceind}, randomness certification~\cite{pironio10random,acin16randomnes}, and randomness amplification~\cite{mironowicz13amplification,brandao13amplification}, in which their security is not based on the internal mechanism of the devices but on the fact that events from distant parties are space-like separated. An interesting growing body of work is also showing how Bell nonlocality plays a key role in quantum computational advantages \cite{shallow1,shallow2,shallow3,shallow4}. Basic questions regarding both Bell nonlocality and EPR steering still remain open however. Perhaps the simplest of these is the one asking which entangled states are capable of exhibiting these forms of non-classicality. In particular, it is known that entanglement alone is not sufficient to observe neither Bell nonlocality nor EPR steering, since some mixed entangled states are known to admit so-called local hidden-variable, or local hidden state models \cite{Werner,Barrett02,Quintino15}. A clearer answer to this question is desirable from a foundational perspective, but also from a technological perspective, given their connection to quantum information technologies. An important discovery in this respect was that of activation. The basic message is as follows: some quantum states that show only classical behaviour in the orthodox ``standard scenario'' can have their non-classicality activated, or revealed, by subjecting the state to a more complex measurement scenario. This both expands the set of entangled states that exhibit non-classical behaviour, and rekindles the hope of proving Bell nonlocality or EPR steering of all entangled states. There are a number of different methods that have been shown to activate quantum states (see \cite{bowles21broadcast} for a more detailed discussion). In Refs.~\cite{PopescuHNL,FlaHNL}, it is shown that Bell nonlocality can be activated by applying local filters to the state before a Bell test. This can be seen as a specific case of the more general sequential measurement scenario, in which a sequence of time-ordered measurements is made on the local subsystems of the state \cite{Gallego14}. Later, it was shown that activation of Bell nonlocal and EPR-steering is also possible by taking multiple copies of the state, and performing joint measurements on the local subsystems \cite{Palazuelos12,quintino16activation}. This method appears to be more powerful than the sequential scenario~\cite{FlaNoHNL}, which is perhaps to be expected given the additional resources and entanglement granted by the multiple copies. Recently, a new technique based on broadcasting was discovered and shown to lead to Bell nonlocality activation~\cite{bowles21broadcast} (see also \cite{temistocles2019measurement} for a prior related work which inspired the definition of broadcast nonlocality). In this scenario, one or more of the local subsystems is broadcast to a number of additional parties (see Fig.~\ref{fig:broadcast}). The entanglement present in the original state is thus shared between a larger number of parties, and interestingly, this can be used to activate the Bell non-locality of the original state. The broadcast scenario also appears to be significantly more powerful than the sequential measurement scenario: for instance, for the two-qubit Werner state, broadcasting leads to activation of Bell nonlocality for significantly lower visibilities~\cite{bowles21broadcast}. This has practical implications, since although stronger examples of activation are known by using many copies, the broadcast scenario requires the manipulation of a single copy of the state per experimental round and is therefore within the reach of available technology. In this article we build on this initial work, and prove a number of new results related to nonlocality, device-independent (DI) and semi-DI entanglement certification, which we summarize here. \begin{itemize} \item \textbf{Bell nonlocality in broadcast scenarios}---We give two methods to construct Bell inequalities tailored to the broadcast Bell scenario, starting from a Bell inequality in the standard scenario. We then study Bell nonlocality of high dimensional isotropic states, and show that Bell nonlocality can be demonstrated for lower visibilities than previously known. We also study detector inefficiencies in the broadcast scenario. For the case of the two-qubit maximally entangled state $\ket{\Phi^+}=[\ket{00}+\ket{11}]/\sqrt{2}$, we show how one can demonstrate Bell nonlocality with lower detection inefficiencies than in the standard scenario. \item \textbf{Stronger activation through broadcasting}---We prove a stronger notion of activation than previously shown in \cite{bowles21broadcast}. More precisely, we show that through broadcasting, it is possible to convert a state with a local hidden-variable (LHV) model for general (POVM) measurements, to a state this exhibits genuinely multipartite nonlocal correlations. This is probably the most extreme ``jump'' in Bell nonlocality class that has been demonstrated using a single quantum state. Such a result highlights the extent to which notions of locality in the standard scenario (i.e. the existence of an LHV model) are unable to capture the strongly nonlocal properties of entangled states. \item \textbf{Device-independent entanglement certification}---We investigate device-independent entanglement certification in the broadcast scenario. In Ref.~\cite{bowles21broadcast} it was shown that broadcasting allows entanglement certification for noise thresholds much lower than previously known. For the case of the isotropic state of two qubits (local unitary equivalent to the two-qubit Werner state \cite{Werner}), \begin{align}\label{isotropic} \rho(\alpha)=\alpha\proj{\Phi^+}+(1-\alpha)\mathbb{1}/4, \end{align} it was shown that DI entanglement certification is possible for visibilities $\alpha>\frac{1}{2}$. Here, we show that this can in fact be extended to visibilities greater than $\alpha>0.338$, using a numerical technique based on the NPA hierarchy. Since the state is entangled for $\alpha>\frac{1}{3}$, this is essentially the entire range of entanglement, and we suspect that this could be lowered arbitrarily close to $\alpha=\frac{1}{3}$ with more computational power. This suggests the possibility of designing device-independent protocols with much greater tolerance to noise, which is highly desirable given the high experimental requirements that hinder device-independent protocols. \item \textbf{Broadcast steering}---We extend the definition of EPR steering to the broadcast scenario, and study the phenomenon using the two-qubit isotropic state, showing that broadcast steering is possible for visibilities greater than 0.4945 when broadcasting to two parties and visibility greater than 0.4679 when broadcasting to three parties. This is below the threshold of $\frac{1}{2}$ below which the state has a local hidden state model in the standard scenario \cite{Werner,wiseman07}, and is the first example of the activation of steering using a single copy of this state. \end{itemize} \section{The broadcast scenario} \begin{figure} \centering \includegraphics[width=\textwidth]{Images/scenarios_activation.pdf} \caption{ Three broadcast scenarios. One (or more) of the local systems is broadcast via the application of a quantum channel, resulting in a multipartite state, sent to distant parties. Local measurements are then performed on this state, and the resulting statistics are used to rule out a local hidden-variable description for the original bipartite state.} \label{fig:broadcast} \end{figure} Here we describe Bell nonlocality in the broadcasting scenario, starting with the definition of standard bipartite Bell nonlocality. \subsection{Bell nonlocality in the standard scenario} In a Bell scenario, Alice and Bob are distant parties that can perform various local measurements on a shared physical system. We denote by $x$ the choice of measurements performed by Alice and $a$ the output received by Alice by performing her measurement. Analogously, $y$ and $b$ stand for the choice of respective measurement and outcome performed by Bob. The probability of Alice and Bob obtaining the outcomes $a$ and $b$ after performing the measurements $x$ and $y$ is described by $p(ab|xy)$ and the set of all probabilities on a given scenario is referred to as a behaviour $\{p(ab|xy)\}$. A behaviour with probabilities $p(ab|xy)$ is Bell local if it can be explained by a classical mixture of independent strategies which only depend on their local input. More formally, if the probabilities can be explained by the following: Alice and Bob share a physical system, sometimes referred to as a hidden variable, which assumes the value $\lambda$ with probability density $\Pi(\lambda)$. Whenever Alice performs the measurement labelled by $x$, she outputs $a$ with probability $p_A(a|x,\lambda)$. Whenever Bob performs the measurement labelled by $y$, he outputs $b$ with probability $p_B(b|y,\lambda)$. In this way, the behaviour $\{p(ab|xy)\}$ admits a Bell local decomposition if it can be written as \begin{align}\label{Eq:standard_Bell} p(ab\vert xy) = \int \Pi(\lambda) \; p_A (a|x,\lambda ) \; p_{B} (b|y,{\lambda}) \; d\lambda. \end{align} In a seminal work~\cite{Bell64}, Bell showed that quantum correlations do not necessarily respect \eqref{Eq:standard_Bell}, a phenomenon now known as Bell nonlocality. More formally, let $\rho_{AB}$ be a quantum state shared by Alice and Bob, \textit{i.e.}, $\rho_{AB}$ is a positive semidefinite operator, $\rho_{AB}\geq0$, with unit trace, $\Tr(\rho_{AB})=1$. Let $\{A_{a|x}\}$ be a set of POVMs representing the quantum measurement $x$ with output $a$, \textit{i.e.} $A_{a|x}$ is a positive semidefinite operator, $A_{a|x}\geq0$, and the set $\{A_{a|x}\}_a$ respects the normalization constraint $\sum_a A_{a|x}=\mathbb{1},\forall x$. Analogously, $\{B_{b|y}\}$ is a set of POVMs representing Bob's measurements. The probability of Alice and Bob obtaining the outcomes $a$ and $b$ when performing the quantum measurements on their shared system is given by \begin{align}\label{eq:Quantum} p(ab\vert xy)= \Tr(\rho_{AB} A_{a|x}\otimes B_{b|y}). \end{align} Bell theorem thus states that there exist quantum states and measurements such that this behaviour does not admit a Bell local decomposition as in Eq.~\eqref{Eq:standard_Bell} \cite{Bell64,CHSH,BrunnerReview}. A quantum state $\rho_{AB}$ is separable if it admits a decomposition \begin{align}\label{Eq:sep} \rho_{AB} = \int \Pi(\lambda) \;\rho_A^\lambda\otimes\rho_B^\lambda \; d\lambda, \end{align} where $\rho_A^\lambda$ and $\rho_B^\lambda$ are quantum states and $\Pi$ is a probability density. States which are not separable are denoted as \textit{entangled}. From \eqref{Eq:standard_Bell} it is easy to see that separable states can only lead to Bell local behaviours, hence if a quantum behaviour does not admit a Bell local decomposition, we certify that Alice and Bob share an entangled state. Interestingly, there exist quantum states which, despite being entangled, can only lead to Bell local correlations in standard Bell scenarios \cite{Werner,Barrett02,bowles_sufficient,hirsch2016algorithmic,cavalcanti2016general,nguyen16LHSmodels,Augusiak_2014}. That is, there are entangled states $\rho_{AB}$ such that for every possible choice of local measurements performed by Alice and Bob, the behaviour given by $p(ab\vert xy)= \Tr(\rho_{AB} A_{a|x}\otimes B_{b|y})$ is necessarily Bell local (i.e. admits a decomposition \eqref{Eq:standard_Bell}). Such quantum states are said to admit a local-hidden-variable (LHV) model. Over the years, researchers have proposed extended scenarios that are able to ``activate'' the Bell nonlocality of quantum states. That is, states which have an LHV model, hence Bell local in standard Bell tests, may display nonlocal correlations in more complex scenarios. Examples of these scenarios include allowing local filtering operations before the Bell test~\cite{PopescuHNL,FlaNoHNL}, applying sequential measurements~\cite{zukowski98sequential,Gallego14}, using multiple copies of the shared state~\cite{Palazuelos12} or distributing the bipartite state in networks~\cite{sende05activation,DaniNetwork}. \subsection{Bell nonlocality in broadcast scenarios} Recently, Ref.~\cite{bowles21broadcast} proposed a Bell scenario entitled \textit{broadcast nonlocality} which brings novel insights to quantum nonlocality and can also activate Bell nonlocality for some entangled states with an LHV model. We now present the concept of broadcast nonlocality by starting with the scenario illustrated in Fig.~\ref{fig:broadcast}a). Let $\rho_{AB_0}$ be a quantum state shared between Alice and Bob$_0$ (denoted by the black line in the figure). A quantum channel is performed on the $B_0$ subsystem which will ``broadcast'' this system to two distant parties, Bob and Charlie. More formally, let $\Omega_{B_0\rightarrow BC}$ be a quantum channel, \textit{i.e.,} a completely positive trace preserving (CPTP) channel, that enlarges the $B_0$ space to a tensor product space of $B$ and $C$. Due to this property of transforming a single system into multiple systems, we refer to this channel as ``broadcast channel''. Examples of such channels are approximate cloning~\cite{werner98cloning,scarani05cloning} or broadcasting of quantum information as in Ref.~\cite{yard06broadcast}, although the channel need not be of this form. When the quantum state $\rho_{AB_0}$ undergoes a broadcast channel $\Omega_{B_0\rightarrow BC}$, the resulting tripartite state is \begin{align} \rho_{ABC}=\mathbb{1}\otimes\Omega_{B_0\rightarrow BC}[\rho_{AB_0}]. \end{align} Let $A_{a|x}$, $B_{b|y}$, and $C_{c|z}$ be POVMs representing quantum measurements performed by Alice Bob, and Charlie respectively. The probabilities of obtaining outcomes $a,b,c$ when measurements labelled by $x,y,z$ are performed are given by \begin{align} \label{pRaf} p(abc|xyz) = \Tr ( A_{a|x} \otimes B_{b|y} \otimes C_{c|z} \; \rho_{ABC} ). \end{align} In a standard bipartite Bell scenario under the bipartition $A\vert BC$, we would say that this behaviour is Bell nonlocal if it cannot be written as \begin{align}\label{Eq:standard_bip_Bell} p(abc\vert xyz)= \int \Pi(\lambda) \; p_A (a|x,\lambda ) \; p_{B} (bc|yz,{\lambda}) \; d\lambda. \end{align} The key difference is that, in a broadcast scenario, we assume that, since Bob and Charlie are far apart, they are restricted by non-signalling constraints. That is, the broadcast channel represented by $\Omega$ may provide Bob and Charlie strong non-signalling correlations (even supra-quantum ones, such as PR-box correlations \cite{PRbox,rastall85prbox,tsirelson1993PRbox}), but they are necessarily non-signalling. This is needed to ensure that the non-classicality in the observed correlations is not a result of the transformation device alone (See Ref.~\cite{bowles21broadcast} for a more detailed discussion). In mathematical terms, a behaviour $\{p(abc|xyz)\}$ is broadcast nonlocal if it cannot be written as \begin{align} \label{model2} p(abc|xyz) = \int \Pi(\lambda) \; p_A (a|x,\lambda ) \; p^{\text{NS}}_{BC} (b,c|y,z,\lambda) \; d\lambda, \end{align} where the behaviour $\{p^{\text{NS}}_{BC} (b,c|y,z,\lambda)\}$ respect the non-signalling constraints which are given by \begin{align} \sum_b p_{BC}^{\text{NS}} (bc|yz,\lambda) &= \sum_b p_{BC}^{\text{NS}} (bc|y'z,\lambda) \;\forall y,y',c,z,\lambda, \\ \sum_c p_{BC}^{\text{NS}} (bc|yz,\lambda) &= \sum_c p_{BC}^{\text{NS}} (bc|yz',\lambda) \;\forall z,z',b,y,\lambda. \end{align} In a similar vein, one can also consider a broadcast scenario where both sides (Alice and Bob) perform broadcast channels before the Bell test, as in example b) of Fig.~\ref{fig:broadcast}, or that the broadcast channel broadcasts the state into multiple parties, as in example c) of Fig.~\ref{fig:broadcast}. The corresponding definitions of broadcast nonlocality in these scenarios follow the same logic as above, by allowing parties that share a common broadcast channel to share non-signalling resources. \section{Novel results and methods for broadcast nonlocality}\label{sec:novel} \subsection{Promoting standard Bell inequalities to the broadcast scenario} \noindent {Here we give a method to construct Bell inequalities tailored to the broadcast scenario, starting from Bell inequalities defined in the standard scenario.} In the broadcast scenario, it is shown that one can activate nonlocality for the isotropic state, $\rho_{\alpha}=\alpha\left|\Phi^{+}\right\rangle\left\langle\Phi^{+}\right|+(1-\alpha) \mathbb{1}/4$, for $\alpha>\frac{1}{\sqrt{3}}$ \cite{bowles21broadcast}. This is certified by the inequality \begin{equation} \begin{aligned} \label{eq:sec3:best_ineq} \mathcal{I}=\left\langle A_{0} B_{0} C_{0}\right\rangle+\left\langle A_{0} B_{1} C_{1}\right\rangle+\left\langle A_{1} B_{1} C_{1}\right\rangle-\left\langle A_{1} B_{0} C_{0}\right\rangle &\\ +\left\langle A_{0} B_{0} C_{1}\right\rangle+\left\langle A_{0} B_{1} C_{0}\right\rangle+\left\langle A_{1} B_{0} C_{1}\right\rangle-\left\langle A_{1} B_{1} C_{0}\right\rangle &\\ +2\left\langle A_{2} B_{1}\right\rangle -2\left\langle A_{2} B_{0}\right\rangle &\leq 4\,, \end{aligned} \end{equation} written in the standard correlator notation, where \begin{align} \left\langle A_{x} B_{y} C_{z}\right\rangle&=\sum_{a, b, c=\pm 1} a b c \,p(a b c | x y z), \\ \left\langle A_{x} B_{y}\right\rangle&=\sum_{a, b=\pm 1} a b \,p(a b | x y), \\ \left\langle A_{x}\right\rangle&=\sum_{a=\pm 1} a \,p(a | x). \end{align} Similar definitions hold for $\left\langle A_{x} C_{z}\right\rangle$ and $\left\langle B_{y} C_{z}\right\rangle$, and for $\left\langle B_{y}\right\rangle$ and $\left\langle C_{z}\right\rangle$. The best quantum violation found for this inequality is $4\sqrt{3}$ with the measurements and channel given in Ref. \cite{bowles21broadcast} and using the isotropic state with $\alpha=1$. Ineq. \eqref{eq:sec3:best_ineq} can be restructured as follows \begin{equation} \label{broadcast_chsh} \langle \operatorname{CHSH}\left[A_{0}, A_{1}, C_{0}, C_{1}\right]\left(B_{0}+B_{1}\right)\rangle +\mathcal{L}_{\mathrm{CHSH}} \langle A_{2}\left(B_{1}-B_{0}\right) \rangle \leq 2 \mathcal{L}_{\mathrm{CHSH}}\,,\end{equation} where \begin{equation} \operatorname{CHSH}\left[A_{0}, A_{1}, C_{0}, C_{1}\right] \coloneqq (A_0-A_1)C_0+(A_0+A_1)C_1 \end{equation} and $\mathcal{L}_{\mathrm{CHSH}}$ denotes the local bound of the CHSH inequality in the standard Bell scenario, \textit{i.e.}, $\mathcal{L}_{\mathrm{CHSH}}=2$. Here, we slightly abuse notation so that for example $\langle A_{2}\left(B_{1}-B_{0}\right) \rangle$ is understood as $\langle A_{2}B_{1}\rangle - \langle A_{2}B_{0}\rangle$. The form of \eqref{broadcast_chsh} suggests the following recipe for promoting any two-outcome Bell inequality $\mathcal{I}\left[A_{0}, \ldots, A_{m}, C_{0}, \ldots, C_{k}\right]$ to the broadcast scenario through the following \textit{ansatz} \begin{equation}\label{eq:sec3:lift_ansatz}\langle \mathcal{I}\left[A_{0}, \ldots, A_{m}, C_{0}, \ldots, C_{k}\right]\left(B_{0}+B_{1}\right) \rangle+\mathcal{L}_{\mathcal{I}} \langle A_{m+1}\left(B_{1}-B_{0}\right) \rangle \leq 2 \mathcal{L}_{\mathcal{I}}\,,\end{equation} where $\mathcal{L}_{\mathcal{I}}$ is the local bound of $\mathcal{I}$ in the standard scenario. {We prove in Appendix \ref{ap:liftingansatz} that \eqref{eq:sec3:lift_ansatz} is valid so long as the Bell inequality $\mathcal{I}$ does not contain any 1-body correlator terms $\langle A_x \rangle$ for Alice.} The same procedure can also be applied to the 4-partite symmetric broadcast scenario of Fig.~\ref{fig:broadcast}b). In \cite[Sec. 4.2]{bowles21broadcast} an inequality is given for this scenario which can be written \begin{align} \langle \text{CHSH}\left[A_{0},A_{1}, C_{0}, C_{1}\right]\left(B_{0}+B_{1}\right)D_0\rangle +\mathcal{L}_{\text{CHSH}} \langle \left(B_{1}-B_{0}\right) D_1 \rangle \leq 2 \mathcal{L}_{\text{CHSH}}, \end{align} where Alice and Bob are on the left side and Charlie and Dave are on the right side, as in Fig.~\ref{fig:broadcast}b). This inequality is also violated by the isotropic state for $\alpha>\frac{1}{\sqrt{3}}$. Similarly to above, this suggests the construction \begin{equation} \label{sec3:eq:lifting4party} \langle \mathcal{I}\left[A_{0}, \ldots, A_{m}, C_{0}, \ldots, C_{k}\right]\left(B_{0}+B_{1}\right)D_0\rangle +\mathcal{L}_{\mathcal{I}} \langle \left(B_{1}-B_{0}\right) D_1 \rangle \leq 2 \mathcal{L}_{\mathcal{I}}\,.\end{equation} We prove in Appendix \ref{ap:liftingansatz} that \eqref{sec3:eq:lifting4party} is valid so long as the Bell inequality does not contain any 1-body correlator terms $\langle A_x\rangle$ or $\langle C_z\rangle$. We now apply these constructions to two well-known Bell inequalities in the standard scenario, and study noise resistance with respect to the isotropic state \eqref{isotropic}. The two Bell inequalities we consider are (i) the chained Bell inequality \cite{pearle1970hidden, braunstein1990wringing} in the case of both parties having 3 input settings, and (ii) the elegant Bell inequality \cite{bechmann2003intermediate}, where Alice has 3 inputs and Bob 4 inputs. These inequalities are both maximally violated by the maximally entangled state ($\alpha=1)$, and are violated by the isotropic state for (i) $\alpha>\frac{4}{6\cos \frac{\pi}{6}}\approx 0.7698$, and (ii) $\alpha>\frac{6}{4\sqrt{3}}\approx 0.8660$ respectively. Via a numerical see-saw optimization in the broadcast scenario, we have found that the corresponding inequalities \eqref{eq:sec3:lift_ansatz} are violated in the broadcast scenario for visibilities (i) $\alpha>0.6100$ and (ii) $\alpha>0.6799$. Surprisingly, the same bounds are obtained using the construction \eqref{sec3:eq:lifting4party}. Notice that for both examples this visibility is below $\alpha=1/K_3$ where $0.683 < 1/K_3 < 0.697$ and $K_3$ is Grothendieck’s constant \cite{grothendieck1956resume,FlaGro,Peter}. This means that both examples show activation of nonlocality of the isotropic state in the range in which it has a projective-LHV model \cite{Acin2006}. These examples however do not improve on the $\alpha>\frac{1}{\sqrt{3}}$ visibility achieved via the CHSH inequality. It would be interesting to investigate further if other Bell inequalities (probably with more input settings) could be used to show activation of the isotropic state below this threshold. \subsection{Robustness to detection inefficiencies} The isotropic state, $\rho_{\alpha}=\alpha\left|\Phi^{+}\right\rangle\left\langle\Phi^{+}\right|+(1-\alpha) \frac{\mathbb{1}}{4}$, is a simple model for a noisy quantum state, with $\alpha$ representing the probability of applying a depolarizing channel to one half of a pair of maximally entangled qubits. From an experimental perspective, there are other interesting notions of noise. Notably, detectors are not ideal, and they often fail to register an outcome, opening up loopholes in Bell test experiments. Thus, it is important to study the robustness of nonlocality with respect to detector inefficiencies. Let us first consider the standard Bell scenario and let $\eta$ represent the detection efficiency, the probability of the detector working correctly. We take all detectors to have the same detection efficiency, and assume no detection events of different detectors are statistically independent. Here we consider scenarios with binary inputs taking values in $\{0,1\}$ and binary outcomes taking values in $\{+1,-1\}$. When a no detection event occurs, an outcome in $\{+1,-1\}$ is chosen deterministically as a function of the measurement input of the detector in the round. Mathematically, this is described by two functions $f_{A}(x), f_{B}(y): \{0,1\}\rightarrow \pm1$ which give the corresponding outputs given a failure event for each party and their input in that round. Given ideal statistics $p(ab|xy)$ ---computed with the noiseless quantum state and measurements--- the noisy statistics $P^\eta(a,b\vert x,y)$ are given by \begin{multline} P^{\eta}(ab\,\vert\, xy) = \eta^2 \,p(ab \vert xy) + \eta(1-\eta)\left[\delta_{f_{A}(x),a}\,p(b\vert y)+\delta_{f_{B}(y),b}\,p(a\vert x)\right] +(1-\eta)^2 \delta_{f_{A}(x),a}\delta_{f_{B}(y),b}\,, \end{multline} where $\delta_{i,j}$ is the Kronecker delta function. The critical detection threshold $\eta_c$ is defined as the lowest $\eta$ such that, for all $\eta'>\eta$, $P^{\eta'}(a,b\vert x,y)$ is outside the local set. In this scenario, the best known critical visibility for the two-qubit maximally entangled state is $\eta=0.8214$ achieved using a Bell inequality with four settings per party \cite{Brunner_2008}. This is very close to the critical detection efficiency of $\eta=2(\sqrt{2}-1)\simeq 0.8284$ resulting from the CHSH Bell inequality. Here, we show that by using a single copy of the maximally entangled state in the broadcast scenario, one can achieve a significantly lower critical detection efficiency of $\eta_c=0.7355$. We consider the tripartite broadcast scenario of Fig.~\ref{fig:broadcast}a). In this case, we have three measurement devices, and we assume again the same detection efficiency $\eta$ for each device. We similarly consider a strategy in which the detectors output either $\pm1$ when a failure event occurs, and describe this choice of strategy by three functions $f_{A}(x), f_{B}(y), f_{C}(z): \{0,1\}\rightarrow \pm1$. The statistics given a detection efficiency $\eta$ are thus, \begin{multline} P^{\eta}(abc\,\vert\, xyz) = \eta^3 \,p(abc \vert xyz) \\ + \eta^2(1-\eta)\left[\delta_{f_{A}(x),a}\,p(bc\vert yz)+\delta_{f_{B}(y),b}\,p(ac\vert xz)+\delta_{f_{C}(z),c}\,p(ab\vert xy)\right]\\ +\eta(1-\eta)^2\left[\delta_{f_{A}(x),a}\delta_{f_{B}(y),b}\,p(c\vert z)+\delta_{f_{A}(x),a}\delta_{f_{C}(z),c}\,p(c\vert z) + \delta_{f_{B}(y),b}\delta_{f_{C}(z),c}\,p(a\vert x)\right] \\ +(1-\eta)^3 \delta_{f_{A}(x),a}\delta_{f_{B}(y),b}\delta_{f_{C}(z),c}\,. \end{multline} To find the noiseless statistics that give $\eta_c=0.7355$, we use the see-saw algorithm from \cite[Appx. B]{bowles21broadcast}. This algorithm optimizes the robustness of the isotropic state with respect to the visibility parameter $\alpha$ and returns a corresponding Bell inequality valid in the broadcast scenario. We extract the channel and measurements after the algorithm converges and build the ideal statistics $p(abc\vert xyz)$ using the noiseless isotropic state (i.e.\ the maximally entangled two-qubit state). Then we find $\eta$ such that $P^\eta (abc\vert xyz)$ saturates the local bound of the returned Bell inequality, and we do this process over all possible detector strategies $f_A$, $f_B$ and $f_C$. The lowest efficiency found is $\eta_c=0.7355$, certified by the following inequality \begin{equation} \label{eq:det_eff_ineq} \langle \operatorname{CHSH}\left[A_{0}, A_{1}, B_{0}, B_{1}\right] C_1 \rangle - \langle \operatorname{CHSH}\left[A_{0}, A_{1}, B_{0}, B_{1}\right] \rangle + 2(\langle C_1 \rangle -1) \leq 0 \end{equation} where $ \operatorname{CHSH}\left[A_{0}, A_{1}, B_{0}, B_{1}\right] \coloneqq (A_0-A_1)B_0+(A_0+A_1)B_1$. Here, one adopts a detector failure strategy such that $f_A(x)=-1\;\forall x, f_B(y)=1\;\forall y, f_C(z)=1\;\forall z$. We remark that the best detection efficiency is not achieved for the inequality that gives the best visibility (\textit{i.e.,} \ Eq.\ \eqref{eq:sec3:best_ineq}). For this inequality, the best critical efficiency we found is $\eta_c=0.7997$. Our result can be compared with the results of \cite{marton2021bounding}, where improved bounds are found by using multiple copies of the maximally entangled two-qubit state achieving $\eta_c=0.8086$, $\eta_c=0.7399$ and $\eta_c=0.6929$ for two, three and four copies of the state respectively (and local quantum measurements). Note that that our bound is strictly better than that achieved with three copies of the state, while using a single copy in our scenario (plus a channel). It would be interesting to study if the techniques presented in \cite{marton2021bounding} could be used to find lower efficiency thresholds by applying our strategy in parallel with the use of several copies of the maximally entangled state. \section{Activation of non-signalling genuine multipartite nonlocality} \label{sec:activation_gmnl} In Refs.~\cite{MNLdefs,gallego12operational}, the authors analyse different notions of genuine multipartite Bell nonlocality and introduce the concept of non-signalling bilocality, which is intimately related to the idea of broadcast nonlocality presented here. Following Ref.~\cite{MNLdefs}, a tripartite behaviour with probabilities $p(abc|xyz)$ is non-signalling bilocal ($NS_2$-local) if it can be written as \begin{align} \label{eq:GNL} p(abc|xyz)=&\,q_1 \sum_\lambda \Pi_A(\lambda) p_A(a|x\lambda) p_{BC}^{\text{NS}}(bc|yz\lambda) +q_2 \sum_\lambda \Pi_B(\lambda) p_B(b|y\lambda) p_{AC}^{\text{NS}}(ac|xz\lambda) \nonumber \\ &+q_3 \sum_\lambda \Pi_C(\lambda) p_C(c|z\lambda) p_{AB}^{\text{NS}}(ab|xy\lambda), \end{align} where all functions $q,p,\pi$ are probability distributions and $p_{AB}^{\text{NS}}(ab|xy\lambda)$, $p_{BC}^{\text{NS}}(bc|yz\lambda)$, $p_{AC}^{\text{NS}}(ac|xz\lambda)$ are non-signalling behaviours. Behaviours that are not $NS_2$-local are then referred to as non-signalling (NS) genuine multipartite nonlocal, see Fig.~\ref{fig:sets}. \begin{figure} \label{fig:genuine_tripartite} \centering \includegraphics[scale=0.8]{Images/sets.pdf} \caption{A vector $\vec{p}$ corresponding to a behaviour $\{p(abc|xyz)\}$ is non-signalling bilocal if it is inside the convex hull of all bipartite local polytopes (dashed line), where distant parties respect the non-signalling constraints. Behaviours which are not non-signalling bilocal are referred here as NS genuine tripartite Bell nonlocal. Here, we show that using the broadcast scenario bipartite quantum states with an LHV model for all POVMs can lead to NS genuine tripartite nonlocality.} \label{fig:sets} \end{figure} We recall from Eq.~\eqref{model2} that a tripartite behaviour with probabilities $p(abc|xyz)$ is broadcast local if it can be written as \begin{align} p(abc|xyz)= \sum_\lambda \Pi_A(\lambda) p_A(a|x\lambda) p_{BC}^{\text{NS}}(bc|yz\lambda). \end{align} By direct inspection, we then see that any NS genuine multipartite nonlocal behaviour (that is, under definition Eq.~\eqref{eq:GNL}) is also broadcast nonlocal. Indeed, the set of non-signalling bilocal behaviours may be viewed as the convex hull of the set of broadcast local in every possible bipartition. We now present a bipartite state which admits a local hidden-variable model for all possible local measurements but can lead to correlations that are nonlocal in the broadcast scenario. Additionally, we will show that, despite being Bell local in bipartite scenarios, this state displays NS genuine multipartite nonlocality, following the definition of Eq.~\eqref{eq:GNL}. Consider the following family of two-qubit states: \begin{equation} \label{rhoPOVM} \rho_{\mathrm{POVM}}(\alpha, \chi):=\frac{1}{2} \rho(\alpha, \chi)+\frac{1}{2} \rho_{A} \otimes |0\rangle\langle 0| \end{equation} where \begin{align} \rho(\alpha, \chi)&:=\alpha\left|\psi_{\chi}\right\rangle\left\langle\psi_{\chi}\right|+(1-\alpha) \frac{\mathbb{1}}{2} \otimes \rho_{\chi}^{B}\\ \left|\psi_{\chi}\right\rangle&:=\cos \chi|00\rangle+\sin \chi|11\rangle \end{align} and \begin{align} \rho_{\chi}^{B}:=\operatorname{Tr}_{A}\left|\psi_{\chi}\right\rangle\left\langle\psi_{\chi}\right\vert, \quad \rho_A:=\operatorname{Tr}_B \rho(\alpha, \chi). \end{align} As shown in Ref.~\cite{bowles_sufficient}, if $\cos^2(2\chi)\geq\frac{2\alpha-1}{(2-\alpha)\alpha^3}$, the state $\rho_{\mathrm{POVM}}(\alpha, \chi)$ admits a local hidden-variable model for all local POVMs performed by Alice and Bob. We will make use of the inequalities for NS genuine tripartite nonlocality. Reference~\cite{MNLdefs} listed all non-signalling bilocal Bell inequalities in a tripartite scenario where each party has two inputs and two outputs. Using the optimization methods detailed in Appendix B.1 of Ref.~\cite{bowles21broadcast}, we have analysed all these inequalities to check whether there exist a channel $\Omega_{B_0\rightarrow BC}$ and local quantum measurements such that the tripartite state, \begin{equation} \rho_{ABC}:=\mathbb{1}\otimes\Omega_{B_0\rightarrow BC}[ \rho_{\mathrm{POVM}}(\alpha, \chi)] \end{equation} leads to NS-bilocal nonlocality. We have identified that the inequality 16 of Ref.~\cite{MNLdefs}, \begin{align} -2\left\langle C_{0}\right\rangle + \left\langle A_{1} B_{0}\right\rangle&+\left\langle A_{0} B_{1}\right\rangle-\left\langle A_{0} B_{0}\right\rangle-\left\langle A_{1} B_{1}\right\rangle +2\left\langle A_{1} C_{1}\right\rangle+2\left\langle B_{1} C_{1}\right\rangle\\ &+\left\langle A_{1} B_{0} C_{0} \right\rangle - \left\langle A_{0} B_{0} C_{0} \right\rangle +\left\langle A_{0} B_{1} C_{0}\right\rangle+\left\langle A_{1} B_{1} C_{0}\right\rangle \leq 4 \nonumber \end{align} can be used to show that the state $\rho_{\mathrm{POVM}}(\alpha, \chi)$ is NS-genuine tripartite nonlocal (hence, also broadcast nonlocal) in a region where it admits an LHV model for general POVMs. In Fig.~\ref{fig:my_label} we present the $(\alpha,\chi)$ values for which $\rho_{\mathrm{POVM}}(\alpha, \chi)$ is guaranteed to have a local hidden-variable model (shaded region) and, for each $\chi$, the lowest visibility $\alpha$ for which the state violates an $NS_2$ inequality (dashed blue line). In the intersection of these two regions, The POVM local state \eqref{rhoPOVM} can therefore be transformed to a NS genuinely multipartite nonlocal state via the application of a broadcast channel. We note that although standard bipartite nonlocality has been activated from bipartite POVM-local states before, this is the first example of the creation of genuine multipartite nonlocality using a single copy of such a state. \begin{figure}[h!] \centering \includegraphics[width=0.5\linewidth]{Images/plotNS2.pdf} \caption{In the shaded (yellow) region, the state $\rho_{\mathrm{POVM}}(\alpha, \chi)$ admits a local hidden-variable model for all POVM measurements. Also, above the (blue) dashed line the state $\rho_{\mathrm{POVM}}(\alpha, \chi)$, with $\chi>0$, violates the $NS_2$ genuine tripartite inequality number 16 of Ref.~\cite{MNLdefs}. We can see that for small values of $\chi$, there is a range of visibility $\alpha$ such that the state $\rho_{\mathrm{POVM}}(\alpha, \chi)$ is bipartite Bell local in the standard scenario but broadcast nonlocal and NS genuine tripartite nonlocal.} \label{fig:my_label} \end{figure} \subsection{Broadcast activation without a broadcast channel} A reinterpretation of the above results also allows us to construct an example of broadcast activation without a broadcast channel. More precisely, consider the state $\rho_{\mathrm{POVM}}$ defined in Eq. \eqref{rhoPOVM}, in the activation region of Fig.~\ref{fig:my_label}. Let us now apply the channel $\Omega_{B_0\rightarrow BC}$ which leads to activation of NS genuine multipartite nonlocality, the final state thus being \begin{align} \rho_{\Omega}=\mathbb{1}\otimes\Omega_{B_0\rightarrow BC}[\rho_{\mathrm{POVM}}]. \end{align} Note that, since local quantum channels cannot create Bell nonlocality from states admitting an LHV model for all POVMs\footnote{Essentially because applying the dual channel on the measurements (instead of applying the channel on the state) gives rise to the same behaviour, implying a model for all POVMs still holds for that final behaviour.}~\cite{Barrett02}, $\rho_{\Omega}$ has a POVM LHV model on the partition $A\vert BC$. However, our previous result shows that it is NS genuine tripartite nonlocal, and thus broadcast nonlocal too. From this perspective, we can view $\rho_{\Omega}$ as a bipartite state and ``activation'' is obtained by performing the identity channel, that is, by understanding Bob and Charlie as distinct parties (meaning here that they are restricted to local measurements quantum mechanically and non-signalling strategies classically). \section{Device-independent entanglement certification} \label{sec:di_entanglement_cert} Here we apply the broadcast scenario to the task of DI entanglement certification. In \cite{bowles21broadcast} it was shown that DI entanglement of the two-qubit isotropic state \eqref{isotropic} is possible for $\alpha>\frac{1}{2}$, significantly lower than previous best known bound $\alpha \approx 0.6964$~\cite{Peter}. This result gave promising evidence that DI entanglement certification may be possible in the entire range $\alpha>\frac{1}{3}$ in which the state is entangled. In this section, we give strong evidence this is the case, by showing that DI entanglement certification is possible for $\alpha>0.338$. To do this, we make use of semi-definite programming (SDP) tools \cite{Vandenberghe1996}. As we discuss below, given the proximity of $0.338$ to $\frac{1}{3}$, we suspect that this value could be improved to any visibility arbitrarily close to $\frac{1}{3}$ with more computational resources. The broadcast scenario we consider is the four party scenario shown in Fig.\ \ref{fig:broadcast}b). Each local subsystem of the state of the source is broadcasted to two additional parties. If one considers an arbitrary separable state at the source \begin{align} \rho_{SEP}=\int \Pi(\lambda)\,\sigma_\lambda^{A_0}\otimes\sigma_\lambda^{C_0} \;{d}\lambda, \end{align} with $\Pi(\lambda)$ a normalized probability density, then after the application of the broadcast channels, the most general state shared between the four parties is \begin{align}\label{bisep} \rho_{ABCD}=\int \Pi(\lambda)\, \sigma_{\lambda}^{AB}\otimes \sigma_\lambda^{CD} \;{d}\lambda, \end{align} where $\sigma^{AB}_{\lambda}=\Omega_{A_0\rightarrow AB}[\sigma_{\lambda}^{A_0}]$ and $\sigma^{CD}_{\lambda}=\Omega_{C_0\rightarrow CD}[\sigma_\lambda^{C_0}]$ and $\Omega_{C_0\rightarrow CD}$ and $\Omega_{A_0\rightarrow AB}$ are the quantum channels describing the broadcasting. Local measurements performed on this state lead to behaviours of the form \begin{align} p(abcd|xyzw) &= \Tr\left[\rho_{ABCD} A_{a\vert x}\otimes B_{b\vert y} \otimes C_{c\vert z} \otimes D_{d\vert w} \right] \\ &= \int \Pi(\lambda)\Tr\left[\sigma^{AB}_\lambda A_{a\vert x}\otimes B_{b\vert y} \right] \Tr\left[ \sigma^{CD}_\lambda C_{c\vert z} \otimes D_{d\vert w} \right] \; d\lambda\\ &=\int \Pi(\lambda) \; p^Q_{AB} (ab|xy\lambda) \; p^Q_{CD} (cd|zw\lambda) \; d\lambda, \label{bisepprob} \end{align} where for each $\lambda$, $p^Q_{AB}(ab\vert xy\lambda)$ and $p^Q_{CD}(cd \vert zw\lambda)$ are behaviours from the quantum set of correlations. Alternatively, the behaviours \eqref{bisepprob} are the most general that can be obtained by making local measurements on a state which is separable with respect to the bipartition AB vs CD. Since these behaviours are the most general that can be obtained from a separable source state, it follows that if a decomposition \eqref{bisepprob} cannot be found, the source must be entangled, and this therefore constitutes a DI certification of the entanglement of the source. The question remains, however, of how to prove that a given behaviour does not admit a decomposition \eqref{bisepprob}. This is complicated by the fact that the states and the measurements can in principle act on infinite dimensional Hilbert spaces. In order to tackle this, we will make use of a semi-definite programming technique introduced in \cite{Moroder2013} and based on the NPA hierarchy \cite{npa}. For a fixed number of inputs and outputs, let us denote the set of behaviours admitting a decomposition \eqref{bisepprob} by $\mathcal{Q}_{AB\vert CD}$ so that $p\in\mathcal{Q}_{AB\vert CD}$ if and only if \eqref{bisepprob} is satisfied. Furthermore, let us denote by $\mathcal{Q}_{AB\vert CD}^{PPT}$ the set of correlations\footnote{To be more precise, for both $\mathcal{Q}_{AB\vert CD}$ and $\mathcal{Q}_{AB\vert CD}^{PPT}$ we assume that a behaviour is generated by a ‘commuting operator’ strategy, \textit{i.e.} where measurement operators for different parties are assumed to commute, but a tensor product structure does not necessarily hold} obtained by using states that admit a positive partial transpose (PPT) with respect to the bipartition AB vs CD. Since separable states are PPT, it follows that $\mathcal{Q}_{AB\vert CD}\subseteq\mathcal{Q}_{AB\vert CD}^{PPT}$ and thus $p\not\in\mathcal{Q}_{AB\vert CD}^{PPT}\implies p\not\in\mathcal{Q}_{AB\vert CD}$. A certificate that $p\not\in\mathcal{Q}_{AB\vert CD}^{PPT}$ is therefore a device-independent proof of entanglement. We now describe how one can obtain such a certificate. In \cite{Moroder2013} it is shown that the set $\mathcal{Q}_{AB\vert CD}^{PPT}$ can be characterized from the outside by a sequence of semidefinite programs. The first and simplest SDP in this sequence is constructed as follows. One defines a set \begin{multline} \mathcal{S}_1 = \{\{\tilde{A}_{a\vert x}\}_{a,x},\{\tilde{B}_{b\vert y}\}_{b,y},\{\tilde{C}_{c\vert z}\}_{c,z},\{\tilde{D}_{d\vert w}\}_{d,w},\\ \{\tilde{A}_{a\vert x}\tilde{B}_{b\vert y}\}_{a,b,x,y} , \{\tilde{A}_{a\vert x}\tilde{C}_{c\vert z}\}_{a,c,x,z},\dots, \{\tilde{C}_{c\vert z}\tilde{D}_{d\vert w}\}_{c,d,z,w},\{\tilde{A}_{a\vert x}\tilde{B}_{b\vert y}\tilde{C}_{c\vert z}\}_{a,b,c,x,y,z},\dots, \\ \{\tilde{B}_{b\vert y}\tilde{C}_{c\vert z}\tilde{D}_{d\vert w}\textbf{}\}_{b,c,d,y,z,w}, \{\tilde{A}_{a\vert x}\tilde{B}_{b\vert y}\tilde{C}_{c\vert z}\tilde{D}_{d\vert w}\textbf{}\}_{a,b,c,d,x,y,z,w}\} \end{multline} consisting of arbitrary measurement operators for the four parties. Measurement operators for different parties commute since they act on different Hilbert spaces, \textit{e.g.}, \begin{align}\label{lin_con1} [\tilde{A}_{a\vert x},\tilde{B}_{b\vert y}] = 0. \end{align} Since the Hilbert space dimension is unbounded, one can assume the measurements are projective without loss of generality, \textit{e.g.}, \begin{align}\label{lin_con2} \tilde{A}_{a\vert x}\tilde{A}_{a'\vert x} =\tilde{A}_{a\vert x}\delta_{a,a'} \end{align} and similarly for the other parties. A matrix $\Gamma$, called the moment matrix, is then constructed, with elements \begin{equation} \Gamma^{i,j} = \Tr(\rho_{ABCD}E_iE_j^\dagger), \end{equation} and $E_i, E_j \in \mathcal{S}_1$. The matrix $\Gamma$ can be shown to be positive semi-definite, and satisfies a number of linear constraints that follow from \eqref{lin_con1} and \eqref{lin_con2}. Furthermore, from the Born rule, some elements correspond to observable probabilities $p(abcd\vert xyzw)$. Finally, as operators acting on $\mathcal{S}_1$ preserve the structure of each local system, operations with respect to each subsystem can be applied to the moment matrix. For example, performing a partial transpose of $\rho_{ABCD}$ results in a corresponding partial transposition defined on the moment matrix $\Gamma$ \cite{Moroder2013}. Importantly, this implies that if $\rho_{ABCD}$ is PPT with respect to $AB\vert CD$, a corresponding PPT constraint also holds for $\Gamma$. Any $p\in\mathcal{Q}_{AB\vert CD}^{PPT}$ therefore implies the existence of a matrix $\Gamma$ with the above constraints. For a given set of probabilities $p(abcd\vert xyzw)$, these constraints give a necessary condition for $p\in\mathcal{Q}_{AB\vert CD}^{PPT}$. Namely, if $p\in\mathcal{Q}_{AB\vert CD}^{PPT}$ then there must exist a way of completing the matrix $\Gamma$ (having fixed the elements corresponding to the probabilities), such that $\Gamma\succeq 0$, $\Gamma$ satisfies the linear constraints implied by \eqref{lin_con1} and \eqref{lin_con2}, and $\Gamma$ is PPT in the sense described in \cite{Moroder2013}. Conversely, if such a completion cannot be found, then the state $\rho_{AB\vert CD}$ cannot be PPT, and is therefore entangled. Note that since these constraints are linear and semi-definite with respect to $\Gamma$, this can be cast as an instance of a semi-definite program, which in the case of infeasibility, returns a numerical certificate that $p\not\in \mathcal{Q}_{AB\vert CD}$, \textit{i.e.},\ that certifies the entanglement of the state. Using the above, we were able to prove device-independent entanglement certification for $\rho_\alpha$ for $\alpha>0.338$. To achieve this, we used a heuristic optimization procedure described in Appendix \ref{ap:di_heuristic}. The precise strategy involves each of the parties making one of three measurements. The numerical values of the measurement and channels, as well as the corresponding Bell inequality that certifies this visibility, can be found in the GitHub repository for the article. Although we could not obtain a proof that $\alpha>\frac{1}{3}$ implies the possibility of a DI entanglement certification in the broadcast scenario, our numerical analysis strongly suggests that all entangled two-qubit Werner states can be DI certified in the broadcast scenario. This result suggests that an analytic proof of DI entanglement certification for $\alpha>\frac{1}{3}$ may be within reach, and would be an exciting avenue of future research. Given that this is exactly the separability limit, one may even hope that broadcasting could activate DI entanglement cert for all entangled states. \section{Broadcast steering} \label{sec:broadcast_steering} In this section, we introduce a new broadcast scenario which is based on EPR-steering from Bob to Alice. This represents a scenario where the measurements performed by Alice are completely characterised, but no assumption is made on the measurements made by Bob. In this broadcast steering scenario we present a novel example of activation of EPR-steering correlations, which does not rely on previous methods such as local filtering~\cite{Quintino15} or the multi-copy regime~\cite{quintino16activation}. \begin{figure}[h!] \centering \includegraphics[scale=1.0]{Images/steering.pdf} \caption{Illustration of a steering scenario where the measurements performed by Alice are trusted to be completely characterized (hence, represented by a circle). Figure a) represents the standard steering scenario and b) represents the case where a broadcast channel sends the system to two parties which only have access to non-signalling resources.} \label{fig:steering} \end{figure} \subsection{Standard quantum steering} Before presenting the EPR-steering broadcast scenario, we review the concept of standard EPR-steering \cite{wiseman07}. For a more detailed introduction, we recommend the review articles \cite{Cavalcanti16Steering,Uola20Steering}. We consider a scenario where Alice and Bob share a bipartite state $\rho$ and Bob has access to a set of local POVMs described by $\{B_{b|y}\}$. When Bob performs the measurement labelled by $y$ and obtains the outcome $b$, the physical system held by Alice is described by its \textit{assemblage}, a set of unnormalized states defined by \begin{align} \sigma_{b|y} := \Tr_B ( \mathbb{1} \otimes B_{b|y} \rho) \end{align} where $\Tr_B$ denotes the partial trace over Bob's subsystem and the $ \Tr(\sigma_{b|y})$ corresponds to the probability of obtaining the output $b$ given input $y$ for Bob. An assemblage admits a local hidden-state (LHS) model if it can be written as \begin{align} \label{LHSassemblage} \sigma_{b|y} = \int \Pi(\lambda) \; \sigma_{\lambda} \; p_B(b|y,\lambda) \; d\lambda \end{align} where $\lambda$ stands for a hidden variable and $\{\Pi(\lambda)\}_\lambda$ and $\{p_B(b|y,\lambda)\}_b$ are probability distributions. We thus say that an assemblage $\sigma_{b|y}$ is \emph{steerable} if it does not admit an LHS decomposition of the form \eqref{LHSassemblage}. \subsection{Steering in the broadcast scenario} In the simplest broadcast scenario, we start with bipartite state $\rho_{A B_0}$, which after channel $\Omega_{B_0 \rightarrow BC}$ is mapped to state $\rho_{A B C}$, shared by Alice, Bob and Charlie (who can perform local measurements $x,y,z$, with respective outcomes $a,b,c$). The question is then whether the statistics observed by Alice can be explained by a local hidden-state model. That is, can the assemblage \begin{align} \sigma_{bc|yz} = \Tr_{BC} \left( \mathbb{1} \otimes B_{b|y} \otimes C_{c|z} \left[ \mathbb{1}\otimes \Omega_{B_0 \rightarrow BC}(\rho)\right] \right) \end{align} be written as \begin{align} \label{broadcastLHS} \sigma_{bc|yz} = \int \Pi(\lambda) \; \sigma_{\lambda} \; p^{\text{NS}}_{BC} (b,c|y,z,\lambda) \; d\lambda \end{align} where $p^{\text{NS}}_{BC} (b,c|y,z,\lambda)$ is an arbitrary non-signalling behaviour between Bob and Charlie, for each value $\lambda$. We refer to a violation of \eqref{broadcastLHS} as \emph{broadcast steering}, and similarly to broadcast nonlocality, such a violation cannot be explained by the transformation device alone, as long as it generates non-signalling resources only. In this work, we also consider the scenario where the broadcast channel $\Omega$ maps the space $B_0$ to a tripartite space $B \otimes C \otimes D$. That is, after the channel the state is a four-partite state $\rho_{A B C D}$, shared between Alice, Bob, Charlie and Dave. We then consider an assemblage \begin{align} \sigma_{bcd|yzw} = \Tr_{BCD} \left( \mathbb{1}\otimes B_{b|y} \otimes C_{c|z} \otimes D_{d|w} \left[ \mathbb{1}\otimes \Omega_{B_0 \rightarrow BCD}(\rho)\right] \right), \end{align} which is broadcast steerable if it can be written as \begin{align} \sigma_{bcd|yzw} = \int \Pi(\lambda) \; \sigma_{\lambda} \; p^{\text{NS}}_{BCD} (b,c,d|y,z,w\lambda) \; d\lambda \end{align} where $p^{\text{NS}}_{BCD} (b,c,d|y,z,w\lambda)$ is an arbitrary non-signalling behaviour. Before finishing this subsection, we remark that, in a standard steering scenario (steering from Bob to Alice), the main hypothesis is that Alice's measurements are trusted to be fully characterized. In the broadcast steering case, we need an additional hypothesis, which is that Bob and Charlie are restricted to non-signalling resources, that is, they may be strongly correlated, but they cannot communicate. Nevertheless, this hypothesis can be imposed in a physical and fair way by ensuring that the parties after the broadcast channel are in space-like separated areas at the time of the measurements. \subsubsection{Other potential notions of broadcast steering}We presented broadcast steering for the case where Alice is the trusted party. In principle, one could consider other natural configurations for defining broadcast steering: \begin{itemize} \item Bob and Charlie are the trusted parties: in that case, one wonders whether the assemblage \begin{align} \sigma_{a|x} = \Tr_{A} ( A_{a|x} \otimes \mathbb{1}_B \otimes \mathbb{1}_C [\mathbb{1}\otimes \Omega_{B_0 \rightarrow BC}(\rho)] ) \end{align} can be written as \begin{align} \sigma_{a|x} = \int \Pi(\lambda) \; \sigma_{\lambda} \; p_{A} (a|x,\lambda) \; d\lambda. \end{align} Note however that, this corresponds to standard steering, where Bob and Charlie can be seen as a single party. Thus, this scenario is trivial and no activation is possible in this case. \item Hybrid cases: either Alice and Bob are trusted, or only Charlie is trusted. In either case, the absence of an LHS model does not imply anything about $\rho_{A B_0}$, since it could be explained by (standard) bipartite steering between Bob and Charlie. \end{itemize} Since these two other approaches lead to trivial definitions, we focus on the definition described by \eqref{broadcastLHS} where only Alice performed trusted and characterized measurements. \subsection{Broadcast steering with the two-qubit isotropic state} We now present some steering activation results in broadcast scenarios by carefully analysing the two-qubit isotropic state\footnote{We remark that since the two-qubit isotropic state is local-unitary equivalent to the two-qubit Werner state, all results presented in this subsection also hold for the two-qubit Werner state.}: \begin{align} \rho_{\alpha} = \alpha \ketbra{\phi^+}{\phi^+} + (1-\alpha) \frac{\mathbb{1}}{4}. \end{align} The isotropic state represents a maximally entangled state which undergoes white noise. Due to its symmetry, simplicity, and experimental relevance, the isotropic state is often used as a benchmark for several tasks in quantum information. Up to the moment of writing this manuscript, in the standard steering scenario, the two-qubit isotropic state was only shown to be steerable for visibility $\alpha>\frac{1}{2}$ \cite{wiseman07}. Moreover, the two-qubit isotropic state has an LHS model for projective measurements when $\alpha\leq\frac{1}{2}$ \cite{wiseman07}, and there is evidence that it also has an LHS model for general POVMs when $\alpha\leq\frac{1}{2}$~\cite{bavaresco17most,nguyen18POVM}. The results presented in this subsection were obtained with the help of the heuristic search described in the Appendix~\ref{App:heuristic} found in the GitHub online repository \cite{git_broadcast_NL}. \emph{Two broadcasted parties}---We first consider a scenario where there are two parties, Bob and Charlie after the broadcast channel as in Fig.\ \ref{fig:broadcast}a). When Bob and Charlie can choose between two dichotomic measurements each, that is, $y\in\{0,1\}$ and $z\in\{0,1\}$, we could find a channel $\Omega$ and measurements $\{B_{b|y}\}$, $\{C_{c|z}\}$, to certify broadcast steering for $\alpha > 0.5616$. We also investigated the scenario where Bob and Charlie have access to three dichotomic measurements each, \textit{i.e.}, $y\in\{0,1,2\}$ and $z\in\{0,1,2\}$. In this case, we detected broadcast steering up to $\alpha > 0.4945$. \emph{Three broadcasted parties}---We now consider the scenario where there are three parties, Bob, Charlie and Dave, after the broadcast channel as in Fig.\ \ref{fig:broadcast}c). We focused on the scenario where Bob, Charlie and Dave can choose between two dichotomic measurements. Since the vertices of the non-signalling polytope for three parties performing two dichotomic measurements were explicitly obtained at Ref.~\cite{Pironio2011NoSignaling}, we can use these vertices to run (a straightforward extension of) our heuristic procedure presented in Appendix~\ref{App:heuristic}. This allowed us to certify that the two-qubit isotropic state exhibits broadcast steering for $\alpha> 0.4678$, showcasing an even stronger example of steering activation. Note that the latter two results are example of activation of steering (relative to projective measurements), since the isotropicc state admits a LHS model in the range $\alpha\leq\frac{1}{2}$. These are the first examples of single-copy activation of steering for this class of states. \section{Discussion} The relationship between quantum entanglement and Bell nonlocality plays a major role in understanding quantum correlations and the development of device-independent protocols. In a seminal paper, Werner showed that entangled states may admit a local hidden-variable model and cannot lead to Bell nonlocal correlations in the standard Bell scenario~\cite{Werner}. What seemed to be definite proof that some entangled states cannot lead to nonlocality is today recognized as only a first (fundamental) step. Over the past years, natural extensions of Bell scenarios revealed that states admitting local hidden-variable models may also display nonlocal correlations~\cite{PopescuHNL} and we are forced to accept that the relationship between entanglement and nonlocality is far from being fully understood. This work investigates entanglement and nonlocality scenarios where the parties can broadcast their systems to reveal strong correlations which are hidden in the standard Bell test. From a foundational perspective, we provided novel examples of how to activate the nonlocality of entangled states which admit local hidden-variable models. We presented an example of bipartite local states leading to genuine multipartite nonlocality, introduced the concept of broadcast device-independent entanglement certification and the concept of broadcast steering. From a more practical aspect, we developed analytical and computational methods to analyse entanglement and nonlocality in broadcast scenarios. Our findings advance the discussion on whether entanglement can lead to nonlocality, and we hope that the methods presented here may pave the way for network-based and broadcast-based device-independent protocols. All our code can be found in the GitHub online repository \cite{git_broadcast_NL} and can be freely used under the MIT licence~\cite{MIT_license}. \section{Acknowledgments} We thank Máté Farkas for interesting discussions on detection efficiencies. M.T.Q. acknowledges the Austrian Science Fund (FWF) through the SFB project BeyondC (sub-project F7103), a grant from the Foundational Questions Institute (FQXi) as part of the Quantum Information Structure of Spacetime (QISS) Project (qiss.fr). The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the John Templeton Foundation. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sk{\l}odowska-Curie grant agreement No 801110. It reflects only the authors' view, the EU Agency is not responsible for any use that may be made of the information it contains. ESQ has received funding from the Austrian Federal Ministry of Education, Science and Research (BMBWF). E-CB. and JB acknowledge support from Fundació Cellex, Fundació Mir-Puig, and from Generalitat de Catalunya through the CERCA program. JB acknowledges support from the AXA Chair in Quantum Information Science. E-CB. acknowledges financial support from the Spanish State Research Agency through the “Severo Ochoa” program for Centers of Excellence in R\&D (CEX2019-000910-S), from Fundació Cellex, Fundació Mir-Puig, and from Generalitat de Catalunya through the CERCA program. This project has received funding from the ``Presidencia de la Agencia Estatal de Investigación” within the “Convocatoria de tramitación anticipada, correspondiente al año 20XX, de las ayudas para contratos predoctorales (Ref. PRE2019-088482) para la formación de doctores contemplada en el Subprograma Estatal de Formación del Programa Estatal de Promoción del Talento y su Empleabilidad en I+D+i, en el marco del Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020, cofinanciado por el Fondo Social Europeo.'' F.H. acknowledges funding from the Swiss National Fund (SNF) through the Postdoc Mobility fellowship P400P2$\_$199309.
\section*{Introduction} In 1990, Ian Putnam proved in \cite{Putnam90} that the crossed product $ C^* $-algebras associated to minimal Cantor systems are A$\mathbb{T}$-algebras of real rank zero. Using the classification results of Geroge Elliott in \cite{Elliott93} and Dadarlat-Gong in \cite{DadarlatGong97}, one sees that such $ C^* $-algebras are classifiable by their $ K $-theory. In 1995, Putnam, along with Thierry Giordano and Christian Skau, expanded this classification theorem to include dynamics; in \cite{GiordanoPutnamSkau95}, they showed that there is a condition on the dynamical systems, called ``strong orbit equivalence", that is equivalent to isomorphism of the crossed product $ C^* $-algebras. This dynamical classification was motivated by Krieger's theorem (see \cite{Krieger69} and \cite{Krieger76}), which says that for ergodic non-singular systems, the associated von Neumann crossed product factors are isomorphic if and only if the systems are orbit equivalent. The goal of this paper is to expand these results in the $ C^* $-setting. In our previous paper \cite{Herstedt21}, we determined a condition on a zero-dimensional dynamical system called ``fiberwise essentially minimal" (see Definition \ref{defnFiberwiseEssentiallyMinimal} below) that guarantees that the associated crossed product is an A$\mathbb{T}$-algebra. As its name suggests, this class is a broadening of minimal (and also essentially minimal). If we further restrict the system to have no periodic points, this crossed product has real rank zero and is therefore classifiable by $ K $-theory (due to the work of Elliott in \cite{Elliott93} and Dadarlat-Gong in \cite{DadarlatGong97}). This was an expansion of work done on the minimal Cantor case in 1990 by Ian Putnam (see \cite{Putnam89} and \cite{Putnam90}) in which the crossed products are simple, and work done on the essentially minimal case in 1992 by Putnam and Skau along with Richard Herman (see \cite{HermanPutnamSkau92}) in which the crossed products are not necessarily simple. Our result from \cite{Herstedt21} includes many more non-simple crossed products. This paper expands on the work in \cite{Herstedt21} in two major ways. The first of which is what we explore in Section 2, where we discuss some specifics about the $ K $-theory of the crossed products. We define ``large subalgebras" of our crossed products (see Definition \ref{defnAZ}) which are AF-subalgebras (see Theorem \ref{thmAZisAF}) that have the same $ K_0 $ group as the crossed product (see Theorem \ref{thmK0AZIsomorphism}). This mirrors the result of large subalgebras in the minimal case by Putnam in \cite{Putnam90}. We also give a simple description of the $ K_1 $ group of the crossed product in Theorem \ref{thmK1Formula}. The second major aspect of this paper is expanding the dynamical classification of minimal Cantor systems that coincides with the $ K $-theoretic classification, introduced by Giordano, Putnam, and Skau in \cite{GiordanoPutnamSkau95}. They introduce the notion of ``strong orbit equivalence", which we expand to the fiberwise essentially minimal case in Definition \ref{defnFiberwiseEssentiallyMinimal}. In Section 3, we discuss how the circle algebra direct system that gives the A$\mathbb{T}$-algebra of the crossed product gives us an ordered Bratteli diagram whose Vershik system is conjugate to the original dynamical system. Using this Bratteli diagram along with our $ K $-theory results, we then prove Theorem \ref{thmMainTheoremPrelude}, which tells us that for fiberwise essentially minimal zero-dimensional systems, $ K $-theory isomorphism of the crossed products is equivalent to strong orbit equivalence of the dynamical systems. This, combined with the classification result of \cite{Elliott93} and \cite{DadarlatGong97}, gives us Theorem \ref{thmMainTheorem}, which tells us that if the dynamical systems have no periodic points, this is also equivalent to isomorphism of the crossed products. \textbf{Acknowledgements.} This work was done at the Ben Gurion University of the Negev, funded by the Israel Science Foundation (grant no.476/16). \section{Preliminaries} This section introduces terms that will be used to prove the main theorems of the paper, along with some examples and some previous relevant results. Let $ X $ be a totally disconnected compact metrizable space and let $ h : X \to X $ be a homeomorphism of $ X $. We call $ ( X , h ) $ a \emph{zero-dimensional system}. Let $ \alpha $ be the automorphism of $ C ( X ) $ induced by $ h $; that is, $ \alpha $ is defined by $ \alpha ( f ) ( x ) = f ( h^{ -1 } ( x ) ) $ for all $ f \in C ( X ) $ and all $ x \in X $. Then we denote the crossed product of $ C ( X ) $ by $ \alpha $ by $ C^* ( \mathbb{Z} , X , h ) $ (or, less commonly, $ C^* ( \mathbb{Z} , C ( X ) , \alpha ) $). We denote the ``standard unitary" of $ C^* ( \mathbb{Z} , X , h ) $ by $ u $, which is a unitary element of $ C^* ( \mathbb{Z} , X , h ) $ that satisfies $ u f u^* = \alpha ( f ) $ for all $ f \in C ( X ) $. We will use the disjoint union symbol $ \bigsqcup $ to denote unions of disjoint sets. We will not always say explicitly that the sets in this union are disjoint, as this will be implied by the notation. By a partition $ \mathcal{P} $ of $ X $, we mean a finite set of mutually disjoint compact open subsets of $ X $ whose union is $ X $. We say that a nonempty closed subset $ Y $ of $ X $ is a \emph{minimal set} if it is $ h $-invariant and has no nonempty $ h $-invariant proper closed subsets. By Zorn's lemma, minimal sets exist for every zero-dimensional system. We say that a dynamical system $ ( X , h ) $ is an \emph{essentially minimal system} if it has a unique minimal set. The following definition is introduced as Definition 1.10 in \cite{Herstedt21}. \begin{defn}\label{defnSystemOfFiniteReturnTimeMaps} Let $ ( X , h ) $ be a zero-dimensional system and let $ \mathcal{P} $ be a partition of $ X $. We define a \emph{system of finite first return time maps subordinate to $ \mathcal{P} $} to be a tuple \[ \sS=( T,( X_t )_{ t = 1 , \ldots , T }, ( K_t )_{ t = 1 , \ldots , T }, ( Y_{ t , k } )_{ t = 1 , \ldots , T ; k = 1 , \ldots , K_t } , ( J_{ t , k } )_{ t = 1 , \ldots , T ; k = 1 , \ldots , K_t } ) \] such that: \begin{enumerate}[(a)] \item We have $ T \in \mathbb{Z}_{ > 0 } $. \item For each $ t \in \{ 1 , \ldots , T \} $, $ X_t $ is a compact open subset of $ X $. That $ \mathcal{S} $ is subordinate to $ \mathcal{P} $ means that, for each $ t \in \{ 1 , \ldots , T \}$, $ X_t $ is contained in an element of $ \mathcal{P} $. \item For each $ t \in \{ 1 , \ldots , T \} $, $ K_t \in \mathbb{Z}_{ > 0 } $. \item For each $ t \in \{ 1 , \ldots , T \} $ and each $ k \in \{ 1 , \ldots , K_t \} $, $ Y_{ t , k } $ is a compact open subset of $X_t$. Moreover, for each $ t \in \{ 1 , \ldots , T\}$, $ \{ Y_{ t , 1 } , \ldots , Y_{ t , K_t } \} $ is a partition of $X_t$; that is, \[ \bigsqcup_{ k = 1 }^{ K_t } Y_{ t , k } = X_t . \] \item For each $ t \in \{ 1 , \ldots , T \} $ and each $ k \in \{ 1 , \ldots , K_t \} $, $ J_{ t , k } \in \mathbb{Z}_{ > 0 } $. Using Definition \ref{defnLambdaU}, we can write $ \{ J_{ t , k } \} = \lambda_{ X_t } ( Y_{ t , k } ) $. Moreover, for each $ t \in \{ 1 , \ldots , T \} $, $ \{ h^{ J_{ t , 1 } } ( Y_{ t , 1 } ) , \ldots , h^{ J_{ t , K_t } } ( Y_{ t , K_t } ) \} $ is a partition of $ X_t $; that is, \[ \bigsqcup_{ k = 1 }^{ K_t } h^{ J_{ t , k } } ( Y_{ t , k } ) = X_t . \] \item The set \[ \mathcal{P}_1 ( \mathcal{S} ) = \big\{ h^j ( Y_{ t , k } ) \,\big|\, \mbox{$ t \in \{ 1 , \ldots , T \} $, $ k \in \{ 1 , \ldots , K_t \} $, and $ j \in \{ 0 , \ldots , J_{ t , k } - 1 \} $} \big\} \] is a partition of $X$. Note that this combined with condition (e) also implies \[ \mathcal{P}_2 ( \mathcal{S} ) = \big\{ h^j ( Y_{ t , k } ) \,\big|\, \mbox{$ t \in \{ 1 , \ldots , T \} $, $ k \in \{ 1 , \ldots , K_t \} $, and $ j \in \{ 1 , \ldots , J_{ t , k } \} $} \big\} \] is a partition of $X$. \end{enumerate} \end{defn} The following definition is introduced as Definition 1.18 in \cite{Herstedt21}. \begin{defn}\label{defnFiberwiseEssentiallyMinimal} Let $ ( X , h ) $ be a zero-dimensional system and let $ Z \subset X $ be a closed subset. We say that the triple $ ( X , h , Z ) $ is a \emph{fiberwise essentially minimal zero-dimensional system} if there is a quotient map $ \psi: X \to Z $ such that \begin{enumerate}[(a)] \item $ \psi|_Z : Z \to Z $ is the identity map. \item $ \psi \circ h = \psi $. \item For each $ z \in Z $, $ ( \psi^{ -1 } ( z ) , h|_{ \psi^{ -1 } ( z ) } ) $ is an essentially minimal system and $ z $ is in its minimal set. \end{enumerate} \end{defn} For examples of fiberwise essentially minimal zero-dimensional systems, see Examples 1.18 in \cite{Herstedt21}. The connection between Definition \ref{defnSystemOfFiniteReturnTimeMaps} and Definition \ref{defnFiberwiseEssentiallyMinimal} is the following theorem, which appears as Theorem 2.1 of \cite{Herstedt21}. \begin{thm}\label{thmFiberwiseIffAdmitsPartitions} Let $ ( X , h ) $ be a zero-dimensional system. Then there exists some closed $ Z \subset X $ such that $ ( X , h , Z ) $ is fiberwise essentially minimal if and only if for any partition $ \mathcal{P} $ of $ X $, $ ( X , h ) $ admits a system of finite first return time maps subordinate to $ \mathcal{P} $. \end{thm} The following is Theorem 2.2 in \cite{Herstedt21}. \begin{thm}\label{thmPreviousMainTheorem} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. Then $ C^* ( \mathbb{Z} , X , h ) $ is an A$\mathbb{T}$-algebra. \end{thm} The following is a consequence of the proof of Theorem \ref{thmPreviousMainTheorem}. By ``circle algebra", we mean an algebra isomorphic to a finite direct sum of matrices and matrices over $ C ( S^1 ) $. \begin{coro}\label{coroCircleAlgebraApproximation} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system, let $ \mathcal{P} $ be a partition of $ X $, let $ a_1 , \ldots , a_n \in C^* ( \mathbb{Z} , X , h ) $, and let $ \varepsilon > 0 $. Then there is a circle algebra $ A \subset C^* ( \mathbb{Z} , X , h ) $ and a partition $ \mathcal{P}' $ of $ X $ that is finer than $ \mathcal{P} $ such that \begin{enumerate}[(a)] \item The diagonal matrices of $ A $ are $ C ( \mathcal{P}' ) $. \item For each $ k \in \{ 1 , \ldots , n \} $, there is a $ b_k \in A $ such that $ \| a_k - b_k \| < \varepsilon $. \end{enumerate} \end{coro} We now introduce the concepts important to the dynamical side of the discussion in this paper. Let $ ( X_1 , h_1 ) $ and $ ( X_2 , h_2 ) $ be dynamical systems. By an \emph{orbit map}, we mean a homeomorphism $ F : X_1 \to X_2 $ such that for all $ x \in X_1 $, we have $ F ( \text{orb}_{ h_1 } ( x ) ) = \text{orb}_{ h_2 } ( F ( x ) ) $, where $ \text{orb}_{ h_1 } ( x ) $ denotes the $ h_1 $-orbit of $ x $ (and likewise for $ \text{orb}_{ h_2 } $). We say that $ ( X_1 , h_1 ) $ and $ ( X_2 , h_2 ) $ are \emph{orbit equivalent} if there exists such an $ F $. If the orbit map satisfies $ F \circ h_1 = h_2 \circ F $, we say that $ ( X_1 , h_1 ) $ and $ ( X_2 , h_2 ) $ are \emph{conjugate}. When we consider orbit maps between $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ for closed sets $ Z_1 \subset X_1 $ and $ Z_2 \subset X_2 $, we require that $ F ( Z_1 ) = Z_2 ) $. \begin{defn} Let $ ( X_1 , h_1 ) $ and $ ( X_2 , h_2 ) $ be dynamical systems and let $ F : X_1 \to X_2 $ be an orbit map. Then there are functions $ \beta, \gamma : X_1 \to \mathbb{Z} $, called \emph{orbit cocycles}, that satisfy $ ( F \circ h_1^{ \beta ( x ) } ) ( x ) = ( h_2 \circ F ) ( x ) $ and $ ( h_2^{ \gamma ( x ) } \circ F ) ( x ) = ( F \circ h_1 ) ( x ) $. \end{defn} The following is a generalization of Definition 1.3 of \cite{GiordanoPutnamSkau95} from the minimal case to the fiberwise essentially minimal case. \begin{defn} Let $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ be fiberwise essentially minimal zero-dimensional systems. We say that $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ are \emph{strong orbit equivalent} if there is an orbit map $ F : X_1 \to X_2 $ such that the orbit cocycles $ \beta , \gamma : X_1 \to \mathbb{Z} $ are continuous on $ X_1 \setminus Z_1 $. \end{defn} \section{$K$-Theory} In this section we discuss the $ K $-theory of the crossed products associated to fiberwise essentially minimal zero-dimensional systems. For some references on work done in the minimal case, see \cite{Putnam90} and \cite{GiordanoPutnamSkau95}. For a reference on work done in the essentially minimal case, see \cite{HermanPutnamSkau92}. \begin{defn}\label{defnOrderedGroup} An \emph{ordered group} is a pair $ ( G , G^+ ) $, where $ G $ is a countable abelian group and $ G^+ $ is a subset of $ G $, called the \emph{positive cone}, that satisfies the following: \begin{enumerate}[(a)] \item For all $ g_1 , g_2 \in G^+ $, we have $ g_1 + g_2 \in G^+ $. \item For all $ g \in G $, there are $ g_1 , g_2 \in G^+ $ such that $ g = g_1 - g_2 $. \item The identity of $ G $ is the only element in both $ G^+ $ and $ -G^+ $. \end{enumerate} We call $ e \in G^+ $ an \emph{order} unit if for all $ g \in G^+ $, there is some $ n \in \mathbb{Z}_{ > 0 } $ such that $ n e - g \in G^+ $. \end{defn} Given an ordered group $ ( G , G^+ ) $, we may write $ g \geq 0 $ to denote $ g \in G^+ $. The notation $ g_1 \geq g_2 $ means that $ g_1 - g_2 \in G^+ $. By a homomorphism of ordered groups $ ( G_1 , G_1^+ ) $ and $ ( G_2 , G_2^+ ) $, we mean a homomorphism of groups $ \varphi : G_1 \to G_2 $ such that $ \varphi ( G_1^+ ) \subset G_2^+ $. When we fix a particular order unit $ e \in G^+ $, we may write the triple $ ( G , G^+ , e ) $ and call this an ordered group with distinguished order unit. By a homomorphism of ordered groups with distinguished order units $ ( G_1 , G_1^+ , e_1 ) $ and $ ( G_2 , G_2^+ , e_2 ) $, we mean a homomorphism of ordered groups $ \varphi : G_1 \to G_2 $ such that $ \varphi ( e_1 ) = e_2 $. We introduce notation important to the following proposition, which is Proposition 2.2 of \cite{Herstedt21}, and a direct consequence of Theorem 2.4 of \cite{PimsnerVoiculescu80}. Let $ \mathcal{T} $ denote the Toeplitz algebra, the universal $ C^* $-algebra generated by a single isometry $ s $. Let $ A $ be a unital $ C^* $-algebra and let $ \alpha $ be an automorphism of $ A $, and let $ u $ be the standard unitary of $ C^*( \mathbb{Z} , A , \alpha ) $. We denote by $ \mathcal{T} ( A , \alpha ) $ the Toeplitz extension of $ A $ by $ \alpha $, which is the subalgebra of $ C^* ( \mathbb{Z} , A , \alpha ) \otimes \mathcal{T} $ generated by $ A \otimes 1 $ and $ u \otimes s $. The ideal generated by $ A \otimes ( 1 - s s^* ) $ is isomorphic to $ A \otimes \mathcal{K} $, and the quotient by this ideal is isomorphic to $ C^* ( \mathbb{Z} , A , \alpha) $. \begin{prop}\label{propKTheoryExactSequence} Let $ ( X , h ) $ be a zero-dimensional system. Let $ \alpha $ be the automorphism of $ C ( X ) $ induced by $ h $; that is, $ \alpha $ is defined by $ \alpha ( f ) ( x ) = f ( h^{ -1 } ( x ) ) $ for all $ f \in C ( X ) $ and all $ x \in X $. Let $ \delta $ be the connecting map obtained from the exact sequence \begin{center} \begin{tikzcd} 0 \arrow[r] & C(X) \otimes \mathcal{K} \arrow[r] & \mathcal{T}(C(X),\alpha) \arrow[r] & C^*(\mathbb{Z},A,\alpha) \arrow[r] & 0, \end{tikzcd} \end{center} where $ K_0 ( C ( X ) \otimes \mathcal{K} ) $ is identified with $ K_0 ( C ( X ) ) $ in the standard way. Let $ i : C(X) \to C^* ( \mathbb{Z} , X , h ) $ be the natural inclusion. Then there is an exact sequence \begin{center} \begin{tikzcd} 0 \arrow[r] & K_1(C^*(\mathbb{Z},X,h)) \arrow[r, "\delta"] & K_0(C(X)) \arrow[r, "\text{id}-\alpha_*"] & K_0(C(X)) \arrow[r, "i_*"] & K_0(C^*(\mathbb{Z},X,h)) \arrow[r] & 0. \end{tikzcd} \end{center} \end{prop} \begin{proof} Since $ K_1 ( C ( X ) ) = 0 $, this follows immediately from Theorem 2.4 of \cite{PimsnerVoiculescu80}. \end{proof} Note that $ K_0 ( C ( X ) ) \cong C ( X , \mathbb{Z} ) $; we will use this identification throughout the paper. Let $ C ( X , \mathbb{Z} )^+ $ denote the subset of $ C ( X , \mathbb{Z} ) $ consisting of $ f $ such that $ f ( x ) \geq 0 $ for all $ x \in X $. Then it is easy to check that $ ( C ( X , \mathbb{Z} ) , C ( X , \mathbb{Z} )^+ ) $ is an ordered group and the function $ \chi_X $ is an order unit. The following is closely related to Proposition 5.1 of \cite{HermanPutnamSkau92}; although the hypotheses are broadened, the proof is essentially the same. Adopting the notation of Proposition \ref{propKTheoryExactSequence}, we denote $ K_0 ( C ( X ) ) / \image ( \text{id} - \alpha_* ) $ by $ K^0 ( X , h ) $. \begin{prop} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system and adopt the notation of Proposition \ref{propKTheoryExactSequence}. Let $ \pi : C ( X , \mathbb{Z} ) \to K^0 ( X , h ) $ denote the quotient map. Define $ K^0 ( X , h )^+ = \pi ( C ( X , \mathbb{Z} )^+ ) $. Then $ ( K^0 ( X , h ) , K^0 ( X , h )^+ , \pi ( 1 ) ) $ is an ordered group with distinguished order unit. \end{prop} \begin{proof} We check the conditions of Definition \ref{defnOrderedGroup}. Conditions (a) and (b) follow from surjectivity of $ \pi $. For condition (c), let $ g \in K^0 ( X , h )^+ \cap -K^0 ( X , h )^+ $. This means that there is $ f_1 \in C ( X , \mathbb{Z} )^+ $ such that $ \pi ( f_1 ) = g $ and $ f_2 \in C ( X , \mathbb{Z} )^+ $ such that $ \pi ( - f_2 ) = g $. But then $ \pi ( f_1 + f_2 ) = 0 $ and so $ f_1 + f_2 \in \image ( \text{id} - \alpha_* ) $. Let $ f \in C ( X , \mathbb{Z} ) $ satisfy $ f - \alpha_* ( f ) = f_1 + f_2 $. Let $ E = f^{ -1 } ( \max_{ x \in X } f ( x ) ) $. Since $ f - \alpha_* ( f ) \geq 0 $, we must have $ h ( E ) \subset E $. Let $ \psi $ be as in Definition \ref{defnFiberwiseEssentiallyMinimal} and let $ z \in \psi ( E ) $ and define $ E_z = E \cap \psi^{ -1 } ( z ) $. Since $ h ( E_z ) \subset E_z $, $ E_z $ is invariant so must intersect the minimal set. But then by Theorem 1.1 of \cite{HermanPutnamSkau92}, since $ E_z \neq \varnothing $, we have $ \bigcup_{ n \in \mathbb{Z}_{ \geq 0 } } h^n ( E_z ) = \psi^{ -1 } ( z ) $, and so $ E_z = \psi^{ -1 } ( z ) $. Since this holds for all $ z \in \psi ( E ) $, we see that $ f $ is constant on $ \psi^{ -1 } ( z ) $ for all $ z \in Z $. Since $ \psi^{ - 1 } ( z ) $ is invariant for all $ z \in Z $, we must have $ f = \alpha_* ( f ) $, and so $ f_1 + f_2 = 0 $, and since $ f_1 , f_2 \geq 0 $, we see $ f_1 = f_2 = 0 $, and finally we see $ g = 0 $. This proves condition (c). Finally, the fact that $ \pi ( 1 ) $ is an order unit is also clear from the surjectivity of $ \pi $. \end{proof} \begin{thm}\label{thmK0isomK0} Let $ ( X , h ) $ be a zero-dimensional system. Then adopting the notation of Proposition \ref{propKTheoryExactSequence}, we have $ ( K_0 ( C^* ( \mathbb{Z} , X , h ) ) , K_0 ( C^* ( \mathbb{Z} , X , h ) )^+ , 1 ) \cong ( K^0 ( X , h ) , K^0 ( X , h )^+ , 1 ) $. \end{thm} \begin{proof} Since $ \ker ( i_* ) = \image ( \text{id} - \alpha_* ) $, and since $ i : C ( X ) \to C^* ( \mathbb{Z} , X , h ) $ is the natural inclusion, the map $ i_* $ induces a map $ \varphi : K^0 ( X , h ) \to K_0 ( C^* ( \mathbb{Z} , X , h ) ) $ which is an isomorphism of groups and satisfies $ K^0 ( X , h )^+ \subset K_0 ( C^* ( \mathbb{Z} , X , h ) )^+ $. Let $ p \in C^* ( \mathbb{Z} , X , h ) $ be a projection. By applying Corollary \ref{coroCircleAlgebraApproximation} with $ a_1 = p $ and $ \varepsilon = 1/2 $, $ p $ is unitarily equivalent to $ \chi_U $ for some compact open $ U \subset X $. Let $ q $ be the image of $ \chi_U $ under the quotient map $ C ( X ) \to C ( X ) / \image ( \text{id} - \alpha ) $. Then $ [ \varphi ( q ) ] = [ \chi_U ] = [ p ] $. Repeating this argument for $ M_n ( C^* ( \mathbb{Z} , X , h ) ) $, we see that $ K_0 ( C^* ( \mathbb{Z} , X , h ) )^+ \subset K^0 ( X , h )^+ $. Finally, that $ \varphi ( 1 ) = 1 $ is clear, proving the theorem. \end{proof} What we have also shown in the previous proof is the following. \begin{coro}\label{coroSurjectiveOrderedGroupMap} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. Let $ i : C ( X ) \to C^* ( \mathbb{Z} , X , h ) $ denote the canonical inclusion. Then the induced map $ i_* : K_0 ( C ( X ) ) \to K_0 ( C^* ( \mathbb{Z} , X , h ) ) $ is surjective as a map between ordered groups. \end{coro} The following definition is from Section 2 of \cite{Poon90}, later studied in the minimal case in \cite{Putnam89}. These have been referred to as ``large subalgebras" in the literature. \begin{defn}\label{defnAZ} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. We define $ A_Z $ to be the $ C^* $-algebra generated by $ C ( X ) $ and $ u C_0 ( X \setminus Z ) $. \end{defn} The following theorem is contained in Theorem 2.3 of \cite{Poon90}. We provide a direct proof in our context for the reader, which helps give an idea of the AF structure of the large subalgebra. \begin{thm}\label{thmAZisAF} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. Then $ A_Z $ is an AF-algebra. \end{thm} \begin{proof} Let $ ( \mathcal{P}^{ ( n ) } ) $ be a generating sequence of partitions of $ X $. For each $ n \in \mathbb{Z}_{ > 0 } $, we inductively define systems $ \systemarg{ ( n ) } $ of finite first return time maps. First, let $ \systemarg{ ( 1 ) } $ be any system of finite first return time maps subordinate to $ \mathcal{P}^{ ( n ) } $ such that $ \mathcal{P}_1 ( \mathcal{S}^{ ( 1 ) } ) $ is finer than $ \mathcal{P}^{ ( 1 ) } $ and such that $ \bigsqcup_{ t = 1 }^{ T^{ ( 1 ) } } X_t^{ ( 1 ) } \supset Z $ (the former is possible by Proposition 1.14 of \cite{Herstedt21} and the latter is possible by Lemma 4.12 of \cite{Herstedt21}). Now, let $ n \in \mathbb{Z}_{ > 0 } $ and suppose we have chosen $ \systemarg{ ( n ) } $. Let $ \systemarg{ ( n + 1 ) } $ be any system of finite first return time maps subordinate to $ \mathcal{P}^{ ( n + 1 ) } $ such that $ \mathcal{P}_1 ( \mathcal{S}^{ ( n + 1 ) } ) $ is finer than $ \mathcal{P}^{ ( n + 1 ) } $ and finer than $ \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) $ and such that $ \bigsqcup_{ t = 1 }^{ T^{ ( n + 1 ) } } X_t^{ ( n + 1 ) } \supset Z $. Let $ n \in \mathbb{Z}_{ > 0 } $. Let $ A^{ ( n ) } $ be the finite dimensional $ C^* $-subalgebra of $ C^* ( \mathbb{Z} , X , h ) $ spanned by the matrix units $ u^{ i - j } \chi_{ h^j ( Y_{ t , k }^{ ( n ) } ) } $ for $ t \in \{ 1 , \ldots , T^{ ( n ) } \} $, $ k \in \{ 1 , \ldots , K_t^{ ( n ) } \} $, and $ i , j \in \{ 0 , \ldots , J_{ t , k }^{ ( n ) } - 1 \} $. We see $ A^{ ( n ) } \cong \bigoplus_{ t = 1 }^{ T^{ ( n ) } } \bigoplus_{ k = 1 }^{ K_t^{ ( n ) } } M_{ J_{ t , k }^{ ( n ) } } $. Notice that $ C ( \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) ) \subset A^{ ( n ) } $ as the diagonal matrices. Set $ Z^{ ( n ) } = \bigsqcup_{ t = 1 }^{ T^{ ( n + 1 ) } } X_t^{ ( n ) } $ and then notice that $ u C ( X \setminus Z^{ ( n ) } ) \subset A^{ ( n ) } $ as the superdiagonal matrices, so $ A^{ ( n ) } $ is generated by $ C ( \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) ) $ and $ u C ( X \setminus Z^{ ( n ) } ) $. Notice that $ A^{ ( n ) } \subset A^{ ( n + 1 ) } $, so we get a directed system of finite dimensional $ C^* $-algebras, whose limit $ A^{ ( \infty ) } $ contains $ C ( X ) $ since $ ( \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) ) $ is a generating sequence of partitions and since $ \bigcap_{ n = 1 }^\infty Z^{ ( n ) } = Z $, we have $ u C ( X \setminus Z^{ ( n ) } ) \to u C_0 ( X \setminus Z ) \subset A_Z $. It now clear that $ A^{ ( \infty ) } $ is generated by $ C ( X ) $ and $ u C_0 ( X \setminus Z ) $, and is therefore equal to $ A_Z $. \end{proof} The following is Lemma 4.2 from \cite{Putnam89}. \begin{lemma}\label{lemmaProjectionsZeroOnZn} Adopt the notation of Theorem \ref{thmAZisAF} and its proof. Let $ p $ be a projection in $ C ( X ) \cap A^{ ( n ) } $ and suppose that $ p = 0 $ on $ Z^{ ( n ) } $. Then $ \alpha ( p ) \in C ( X ) \cap A^{ ( n ) } $ and $ [ \alpha ( p ) ] = [ p ] $ in $ K_0 ( A^{ ( n ) } ) $. \end{lemma} We finally have the following theorem, which tells us enough about the $ K_0 $ structure of the crossed product to be able to prove Theorems \ref{thmMainTheoremPrelude} and Theorem \ref{thmMainTheorem}. The proof follows that of Theorem 4.1 in \cite{Putnam89}. \begin{thm}\label{thmK0AZIsomorphism} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. Then $ K_0 ( A_Z ) \cong K_0 ( C^* ( \mathbb{Z} , X , h ) ) $ as ordered groups. \end{thm} \begin{proof} Let $ i : A_Z \to C^* ( \mathbb{Z} , X , h ) $ denote the inclusion map, and let $ i_* : K_0 ( A_Z ) \to K_0 ( C^* ( \mathbb{Z} , X , h ) ) $ denote map induced by $ i $ on $ K_0 $. Let $ i_1 : C ( X ) \to A_Z $ denote the canonical inclusion, let $ i_2 : C ( X ) \to C^* ( \mathbb{Z} , X , h ) $ denote the canonical inclusion, and let $ ( i_1 )_* $ and $ ( i_2 )_* $ denote the induced maps on $ K_0 $. We then clearly have $ i \circ i_1 = i_2 $. By Corollary \ref{coroSurjectiveOrderedGroupMap}, $ ( i_2 )_* : K_0 ( C ( X ) ) \to K_0 ( C^* ( \mathbb{Z} , X , h ) ) $ is a surjective map between ordered groups, and therefore so is $ i^* $. By Proposition \ref{propKTheoryExactSequence}, $ \ker ( ( i_2 )_* ) = \text{ran} ( \text{id} - \alpha_* ) $. Thus, since $ ( i_2 )_* = ( i_1 )_* \circ i_* $, we have $ ( i_1 )_* ( \text{ran} ( \text{id} - \alpha_* ) ) \subset \ker ( i_* ) $. Now suppose that $ a \in \ker ( i_* ) $. Because $ ( i_1 )_* $ is surjective, we can find $ g \in C ( X , \mathbb{Z} ) $ such that $ ( i_1 )_* ( g ) = a $. Then $ ( i_2 )_* ( g ) = i_* ( a ) = 0 $, so $ g \in \ker ( ( i_2 )_* ) = \text{ran} ( \text{id} - \alpha_* ) $, so $ a \in ( i_1 )_* ( \text{ran} ( \text{id} - \alpha_* ) ) $. Altogether, we have \begin{equation}\label{eq: ran equals ker} ( i_1 )_* ( \text{ran} ( \text{id} - \alpha_* ) ) = \ker ( i_* ) . \end{equation} We adopt the notation of the proof of Theorem \ref{thmAZisAF}. That is, we have a generating sequence of partitions $ ( \mathcal{P}^{ ( n ) } ) $ and a sequence of systems of finite first return time maps $ ( \mathcal{S}^{ ( n ) } ) $ and a sequence of subalgebras $ ( A^{ ( n ) } ) $ of $ C^* ( \mathbb{Z} , X , h ) $ as in the proof. We now claim that $ ( i_1 )_* ( \text{ran} ( \text{id} - \alpha_* ) ) = 0 $. Suppose $ g_1 , g_2 \in C ( X , \mathbb{Z} ) $ satisfy $ g_1|_Z = g_2|_Z $. Since $ ( \mathcal{P}^{ ( n ) } ) $ is a generating sequence of partitions and for each $ n \in \mathbb{Z}_{ > 0 } $, we have $ \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) $ is finer than $ \mathcal{P}^{ ( n ) } $, there is some $ n \in \mathbb{Z}_{ > 0 } $ such that $ g_1 , g_2 \in A^{ ( n ) } $ and such that $ g_1|_{ Z^{ ( n ) } } = g_2|_{ Z^{ ( n ) } } $ (where $ Z^{ ( n ) } $ is defined in the proof of Theorem \ref{thmAZisAF}). So $ g_1 - g_2 $ is $ 0 $ on $ Z^{ ( n ) } $, so we can write $ g_1 - g_2 $ as a linear combination of projections in $ C ( X ) \cap A^{ ( n ) } $ each of which is zero on $ Z^{ ( n ) } $. So by Lemma \ref{lemmaProjectionsZeroOnZn}, we have $ [ \alpha ( g_1 - g_2 ) ] = [ g_1 - g_2 ] $ in $ K_0 ( A^{ ( n ) } ) $, and so $ ( i_1 )_* ( g_1 - \alpha ( g_1 ) ) = ( i_1 )_* ( g_2 - \alpha ( g_2 ) ) $ in $ K_0 ( A_Z ) $. So let $ g \in C ( X , \mathbb{Z} ) $. Define $ f \in C ( X , \mathbb{Z} ) $ by $ f = g \circ \psi $. Then $ f|_Z = g|_Z $, and so by the above paragraph, we have $ ( i_1 )_* ( g - \alpha ( g ) ) = ( i_1 )_* ( f - \alpha ( f ) ) $. But then notice that $ \alpha ( f ) = g \circ \psi \circ h^{ -1 } = g \circ \psi = f $, and so $ ( i_1 )_* ( f - \alpha ( f ) ) = 0 $. Thus, we have $ ( i_1 )_* ( \text{ran} ( \text{id} - \alpha_* ) ) = 0 $. Combining this with (\ref{eq: ran equals ker}), we see $ \ker ( i_* ) = 0 $. Altogether, we have shown that $ i_* $ is an isomorphism of ordered groups. \end{proof} \begin{thm}\label{thmK1Formula} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. Then $ K_1 ( C^* ( \mathbb{Z} , X , h ) ) \cong C ( Z , \mathbb{Z} ) $. \end{thm} \begin{proof} Adopt the notation of Proposition \ref{propKTheoryExactSequence}. Then $ K_1 ( C^* ( \mathbb{Z} , X , h ) ) \cong \ker ( \text{id} - \alpha_* ) $. Identifying $ K_0 ( C ( X ) ) $ with $ C ( X , \mathbb{Z} ) $, we may replace $ \alpha_* $ with $ \alpha $. Let $ f \in \ker ( \text{id} - \alpha ) $ and let $ z \in Z $. Suppose $ f|_{ \psi^{ -1 } ( z ) } $ is not constant. Then there is some $ x \in \psi^{ -1 } ( z ) $ such that $ f ( z ) \neq f ( x ) $. Let $ U $ be a compact open subset of $ \psi^{ -1 } ( z ) $ such that $ f ( U ) = f ( z ) $. Since $ ( \psi^{ -1 } ( z ) , h|_{ \psi^{ -1 } ( z ) } ) $ is an essentially minimal zero-dimensional system, by Theorem 1.1 of \cite{HermanPutnamSkau92}, there is an $ n \in \mathbb{Z}_{ > 0 } $ such that $ x \in h^{ -n } ( U ) $. Let $ x' = h^{ n } ( x ) \in U $. Then $ f ( x' ) \neq f ( x ) = f ( h^{ -n } ( x' ) ) = \alpha^n ( f ) ( x' ) $, and so $ f \neq \alpha^n ( f ) $, and so $ f \neq \alpha ( f ) $, a contradiction to $ x \in \ker ( \text{id} - \alpha ) $. Therefore, $ f|_{ \psi^{ -1 } ( z ) } $ is constant. Now suppose $ f \in C ( X , \mathbb{Z} ) $ and suppose $ f|_{ \psi^{ -1 } ( z ) } $ is constant for each $ z \in Z $. Then for each $ x \in X $, we have $ \alpha ( f ) ( x ) = f ( h^{ -1 } ( x ) ) = f ( \psi ( x ) ) = f ( x ) $, and so $ f = \alpha ( f ) $, and so $ f \in \ker ( \text{id} - \alpha ) $. Thus, we have \[ \ker ( \text{id} - \alpha ) = \{ f \in C ( X , \mathbb{Z} ) \,\big|\, \mbox{$f|_{ \psi^{ -1 } ( z ) } $ is constant for each $ z \in Z $} \} \cong C ( Z , \mathbb{Z} ) \] as desired. \end{proof} \begin{coro} Let $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ be fiberwise essentially minimal zero-dimensional systems such that $ C^*( \mathbb{Z} , X_1 , h_1 ) \cong C^* ( \mathbb{Z} , X_2 , h_2 ) $. Then $ Z_1 \cong Z_2 $. \end{coro} \section{Bratelli Diagrams} In this section, we explore the construction of ordered Bratelli diagrams associated to fiberwise essentially minimal zero-dimensional systems. This correspondence is used to prove Theorem \ref{thmMainTheoremPrelude}. For work done in the minimal case, see \cite{BezuglyiKwiatkowskiYassawi14} and \cite{GiordanoPutnamSkau95}. For work done in the essentially minimal case, see \cite{AminiElliottGolestani21} and \cite{HermanPutnamSkau92}. \begin{defn} A \emph{Bratteli diagram} $ B $ is a pair of sets $ ( V , E ) $ such that: \begin{enumerate}[(a)] \item The set $ V $ is called \emph{the set of vertices of $ B $}. We can write $ V = \bigsqcup_{ n = 0 }^\infty V_n $ where $ V_0 $ contains a single point $ v_0 $ and $ V_n $ is finite and nonempty for all $ n \in \mathbb{Z}_{ \geq 0 } $. For each $ n \in \mathbb{Z}_{ \geq 0 } $, we call $ V_n $ \emph{the set of vertices of $ B $ at level $ n $}. \item The set $ E $ is called \emph{the set of edges of $ B $}. We can write $ E = \bigsqcup_{ n = 1 }^\infty E_n $ where $ E_n $ is finite and nonempty for all $ n \in \mathbb{Z}_{ > 0 } $. For each $ n \in \mathbb{Z}_{ > 0 } $, we call $ E_n $ \emph{the set of edges at level $ n $}. \item There are maps $ r , s : E \to V $ such that for $ n \in \mathbb{Z}_{ > 0 } $ and $ e \in E_n $, $ s ( e ) \in V_{ n - 1 } $ and $ r ( e ) \in V_n $. Moreover, $ r^{ -1 } ( v ) $ is nonempty for all $ v \in V $ and $ s^{ -1 } ( v ) $ is nonempty for all $ v \in V \setminus V_0 $. The map $ r $ is called the \emph{range map of $ B $} and the map $ s $ is called \emph{the source map of $ B $}. \end{enumerate} \end{defn} \begin{nota} Let $ B = ( V , E ) $ be a Bratteli diagram. For each $ v \in V $, we denote $ R ( v ) = r ( s^{ -1 } ( v ) ) $, and for each $ v \in V \setminus V_0 $, we denote $ S ( v ) = s ( r^{ -1 } ( v ) ) $. If $ v \in V_n $, then $ R ( v ) $ is the set of all vertices in $ V_{ n + 1 } $ that are connected to $ v $ by an edge, and $ S ( v ) $ is the set of all vertices in $ V_{ n - 1 } $ connected to $ v $ by an edge. In a reasonable sense, this gives us range and source maps for vertices. \end{nota} \begin{defn} An \emph{ordered Bratteli diagram} $ B $ is a Bratteli diagram $ ( V , E ) $ together with a partial order $ \leq $ on $ E $ such that $ e , e' \in E $ are comparable if and only if $ r ( e ) = r ( e' ) $. We write $ B = ( V , E , \leq ) $. \end{defn} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram. We define $ E_{ \min } $ ($ E_{ \max } $) to be the set of all edges that are minimal (maximal, resp.) with respect to $ \leq $. We define $ V_{ \min } $ ($ V_{ \max } $) to be the set of all $ v \in V $ such that there is an $ e $ in $ E_{ \min } $ ($ E_{ \max } $, resp.) with $ s ( e ) = v $. \begin{defn} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram. We define a \emph{partial Vershik transformation} $ \widetilde{ h }_B : ( X_B \setminus X_{ B ,\max } ) \cup X_{ B ,\min } \to ( X_B \setminus X_{ B , \min } ) \cup X_{ B , \max } $ in the following way. If $ x \in X_{ B , \max } \cap X_{ B , \min } $, we define $ \widetilde{ h }_B ( x ) = x $. If $ x = ( x_1 , x_2 , \ldots ) \in X_B \setminus X_{ B , \max } $, then there is some smallest $ k \in \mathbb{Z}_{ > 0 } $ such that $ x_k \notin E_{ \max } $. Let $ y_k $ denote the successor of $ x_k $ in $ E $ and let $ ( y_1 , y_2 , \ldots , y_{ k - 1 } ) $ be the unique path from $ v_0 $ to $ s ( y_k ) $ such that $ y_j \in E_{ \min } $ for all $ j \in \{ 1 , \ldots , k - 1 \} $. We define $ \widetilde{ h }_B ( p ) = ( y_1 , y_2 , \ldots , y_k , x_{ k + 1 } , x_{ k + 2 } , \ldots ) $. \end{defn} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram. For each $ k , k' \in \mathbb{Z}_{ > 0 } $ with $ k < k' $, we define $ P_{ k , k' } $ to be the set of all paths from $ V_k $ to $ V_{ k' } $. Formally, $ P_{ k , k' } $ is the set of $ ( e_{ k + 1 } , \ldots , e_{ k' } ) $ such that for all $ j \in \{ k + 1 , \ldots , k' \} $, $ e_j \in E_j $ and for all $ j \in \{ k + 1 , \ldots , k' - 1 \} $, we have $ r ( e_j ) = s ( e_{ j + 1 } ) $. \begin{defn} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram. We define the \emph{infinite path space} $ X_B $ to be the set of all sequences $ x = ( x_1 , x_2 , \ldots ) $ where $ x_n \in E_n $ and $ r ( x_n ) = s ( x_{ n + 1 } ) $ for all $ n \in \mathbb{Z}_{ > 0 } $ together with the topology generated by sets of the form $ U ( e_1 , \ldots , e_k ) $, which is the set of all $ x = ( x_1 , x_2 , \ldots ) $ with $ x_j = e_j $ for all $ j \in \{ 1 , \ldots , k \} $. \end{defn} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram. It is easy to see that the infinite path space is a zero-dimensional space. We define $ X_{ B , \min } $ ($ X_{ B , \max }$) to be the set of all $ x = ( x_1 , x_2 , \ldots ) \in X_B $ such that $ x_j $ is in $ E_{ \min } $ ($ E_{ \max } $, resp.) for all $ j \in \mathbb{Z}_{ > 0 } $. The following terminology appears in Definition 2.18 of \cite{BezuglyiKwiatkowskiYassawi13}, although we restate it to give more clarity as to when the definition applies. \begin{defn} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram and let $ \widetilde{ h }_B $ be its partial Vershik transformation. We say that the ordering on $ B $ is \emph{perfect} if for every $ e \in X_{ B , \min } $, $ \overline{ \text{orb}_{ \widetilde{ h }_B ( e ) } } \cap X_{ B , \max } $ contains a single element, and if for every $ e \in X_{ B , \max } $, $ \overline{ \text{orb}_{ \widetilde{ h }_B ( e ) } } \cap X_{ B , \min } $ contains a single element. In this case, we define the \emph{Vershik transformation} of $ X_B $, denoted by $ h_B $, to be the extension of $ \widetilde{ h }_B $ which, for each $ e \in X_{ B , \min } $, sends the unique element of $ \overline{ \text{orb}_{ \widetilde{ h }_B ( e ) } } \cap X_{ B , \max } $ to $ e $. \end{defn} Thus, given an ordered Bratteli diagram $ B = ( V , E , \leq ) $ with a perfect ordering, the system $ ( X_B , h_B ) $ is a zero-dimensional system. \begin{lemma}\label{lemmaSystemSetUpForDiagrams} Let $ ( X , h ) $ be a fiberwise essentially minimal zero-dimensional system, let $ \mathcal{P} $ and $ \mathcal{P}' $ be partitions of $ X $, and let $ \sS=( T, ( X_t ) , ( K_t ), ( Y_{ t , k } ) , ( J_{ t , k } ) ) $ be a system of finite first return time maps subordinate to $ \mathcal{P} $ such that for each $ t \in \{ 1 , \ldots , T \} $, we have $ \psi ( X_t ) \subset X_t $. Then there is a system $ \systemarg{ 0 } $ of finite first return time maps subordinate to $ \mathcal{P} $ and a system $ \systemarg{ \prime } $ of finite first return time maps subordinate to $ \mathcal{P}' $ such that: \begin{enumerate}[(a)] \item The partition $ \mathcal{P}_1 ( \mathcal{S}' ) $ is finer than $ \mathcal{P}' $ and $ \mathcal{P}_1 ( \mathcal{S}^0 ) $. \item The partition $ \mathcal{P}_1 ( \mathcal{S}^0 ) $ is finer than $ \mathcal{P}_1 ( \mathcal{S} ) $. \item We have $ T^0 = T $ and for each $ t \in \{ 1 , \ldots , T \} $, we have $ X_t^0 = X_t $. \item For each $ t' \in \{ 1 , \ldots , T' \} $, there is a $ t \in \{ 1 , \ldots , T^0 \} $ and $ k \in \{ 1 , \ldots , K_t^0 \} $ such that $ X_{ t' }' \subset Y_{ t , k }^0 $. \item For each $ t' \in \{ 1 , \ldots , T' \} $, there is a $ t \in \{ 1 , \ldots , T^0 \} $ and $ k \in \{ 1 , \ldots , K_t^0 \} $ such that $ X_{ t' }' \subset h^{ J_{ t , k }^0 } ( Y_{ t , k }^0 ) $. \item For each $ t \in \{ 1 , \ldots , T^0 \} $ and each $ k \in \{ 1 , \ldots , K^0 \} $, there is a $ t' \in \{ 1 , \ldots , T' \} $ such that $ Y_{ t , k }^0 \subset \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t' }' ) $. \end{enumerate} \end{lemma} \begin{proof} We first construct $ \mathcal{S}' $ and then use it to modify $ \mathcal{S} $ to obtain $ \mathcal{S}^0 $. By applying Lemma 4.13 of \cite{Herstedt21}, we may assume that $ \mathcal{S} $ satisfies the conclusions of the lemma; in particular, for all $ t \in \{ 1 , \ldots , T \} $, we have $ \psi ( X_t ) \subset Y_{ t , 1 } $, and the partitions $ \mathcal{P}_1 ( \mathcal{S} ) $ and $ \mathcal{P}_2 ( \mathcal{S} ) $ are finer than $ \mathcal{P} $. Let $ \mathcal{P}^{\prime\prime} $ be a partition finer than $ \mathcal{P}' $, $ \mathcal{P}_1 ( \mathcal{S} ) $, and $ \mathcal{P}_2 ( \mathcal{S} ) $. Then apply Lemma 3.2 of \cite{Herstedt21} to obtain a system $ \systemarg{ \prime } $ of finite first return time maps subordinate to $ \mathcal{P}^{\prime\prime} $ such that for all $ t' \in \{ 1 , \ldots , T' \} $, there is a $ t \in \{ 1 , \ldots , T \} $ such that $ X_{ t' }' \subset X_t $. Since $ \mathcal{P}^{\prime\prime} $ is finer than $ \mathcal{P}' $, $ \mathcal{S}' $ is also subordinate to $ \mathcal{P}' $. By applying Proposition 1.9 of \cite{Herstedt21}, we may assume that $ \mathcal{P}_1 ( \mathcal{S}' ) $ is finer than $ \mathcal{P}^{\prime\prime} $. Let $ t' \in \{ 1 , \ldots , T' \} $ and let $ t \in \{ 1 , \ldots , T \} $ be such that $ X_{ t' }' \subset X_t $. Since $ \mathcal{P}^{\prime\prime} $ is finer than $ \mathcal{P}_1 ( \mathcal{S} ) $, there is some $ k \in \{ 1 , \ldots , K_t \} $ such that \begin{equation}\label{eq: X_t' subset Ytk} X_{ t' }' \subset Y_{ t , k } . \end{equation} Since $ \mathcal{P}^{\prime\prime} $ is finer than $ \mathcal{P}_2 ( \mathcal{S} ) $, there is some $ l \in \{ 1 , \ldots , K_t \} $ such that \begin{equation}\label{eq: X_t' subset hJtkYtk} X_{ t' }' \subset h^{ J_{ t , l } } ( Y_{ t , l } ) . \end{equation} Define $ T^0 = T $ and for each $ t \in \{ 1 , \ldots , T \} $, define $ X_t^0 = X_t $ (note that after finishing this construction this verifies conclusion (c) of the lemma). Let $ t \in \{ 1 , \ldots , T \} $ and let $ \{ s ( 1 ) , \ldots , s ( N_t ) \} $ be the set of all $ t' \in \{ 1 , \ldots , T' \} $ such that $ X_{ t' } \subset X_t $. For each $ n \in \{ 1 , \ldots , N_t \} $, let $ \{ a ( n , 1 ) , \ldots , a ( n , C_n ) \} $ be the set of all $ k \in \{ 1 , \ldots , K_t \} $ such that $ Y_{ t , k } \cap \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ s ( n ) }' ) \neq \varnothing $. Define $ K_t^0 = \sum_{ n = 1 }^{ N_t } C_n $ and define $ C_0 = 0 $. Let $ k \in \{ 1 , \ldots , K_t^0 \} $ and let $ n \in \{ 1 , \ldots , N_t \} $ and $ c \in \{ 1 , \ldots , C_n \} $ be such that $ k = C_{ n - 1 } + c $. Then define \begin{equation}\label{eq : Ytk0 defn} Y_{ t , k }^0 = Y_{ t , a ( n , c ) } \cap \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ s ( n ) }' ) \end{equation} and define $ J_{ t , k }^0 = J_{ t , a ( n , c ) } $. It is routine to verify that $ \systemarg{ 0 } $ is a system of finite first return time maps subordinate to $ \mathcal{P} $. By applying Proposition 1.9 of \cite{Herstedt21}, we may assume that $ \mathcal{P}_1 ( \mathcal{S}^0 ) $ is finer than $ \mathcal{P} $ (note that this proves conclusion (b) of the lemma). We now verify the conclusions of the lemma. Conclusions (a), (b), and (c) have already been verified. Conclusion (d) follows from (\ref{eq: X_t' subset Ytk}) and from the fact that $ \mathcal{P}_1 ( \mathcal{S}^0 ) $ is finer than $ \mathcal{P}_1 ( \mathcal{S} ) $. Conclusion (e) follows from (\ref{eq: X_t' subset Ytk}) and the fact that that $ \mathcal{P}_2 ( \mathcal{S}^0 ) $ is finer than $ \mathcal{P}_2 ( \mathcal{S} ) $. Conclusion (f) is shown by (\ref{eq : Ytk0 defn}). This proves the lemma. \end{proof} \begin{prop}\label{propAssociatedBratteliDiagram} Let $ ( X , h , Z ) $ be a fiberwise essentially minimal zero-dimensional system. There is an ordered Bratteli diagram $ B = ( V , E , \leq ) $ with a perfect ordering such that \begin{enumerate}[(a)] \item The system $ ( X_B , h_B , X_{ B , \min } ) $ is conjugate to $ ( X , h , Z ) $. \item For each $ v $ in $ V_{ \min } $ (or $ V_{ \max } $) there is a $ v' $ in $ V_{ \min } $ ($ V_{ \max } $, resp.) and an edge $ e $ in $ E_{ \min } $ ($ E_{ \max } $, resp.) such that $ s ( e ) = v $ and $ r ( e ) = v' $. \item For each $ v $ in $ V_{ \min } $ (or $ V_{ \max } $) and each $ e $ in $ E_{ \min } $ ($ E_{ \max } $, resp.) with $ r ( e ) \in R ( v ) $ satisfies $ s ( e ) = v $. \item For each $ v $ in $ V_{ \min } $ (or $ V_{ \max } $) and each $ m \in \mathbb{Z}_{ > 0 } $, $ R^m ( v ) = ( R^m \circ S^m \circ R^m ) ( v ) $. \end{enumerate} \end{prop} \begin{proof} Let $ Z $ and $ \psi $ correspond to $ ( X , h ) $ as in Definition \ref{defnFiberwiseEssentiallyMinimal}, and let $ ( \mathcal{P}^{ ( n ) } ) $ be a generating sequence of partitions of $ X $. We will construct an ordered Bratteli diagram $ B = ( V , E , \leq ) $ such that $ ( X_B , h_B ) $ is conjugate to $ ( X , h ) $ via a map $ F : X \to X_B $ that satisfies $ F ( Z ) = X_{ B , \min } $. First, we construct a sequence $ ( \mathcal{S}^{ ( n ) } ) $ of finite first return time maps subordinate to $ ( \mathcal{P}^{ ( n ) } ) $. First, let $ \mathcal{S}^{ ( 1 ) \prime } $ be any system of finite first return time maps subordinate to $ \mathcal{P}^{ ( 1 ) } $ such that $ \mathcal{P}_1 ( \mathcal{S}^{ ( 1 ) \prime } ) $ is finer than $ \mathcal{P}^{ ( 1 ) } $ (such a system exists by Proposition 1.9 of \cite{Herstedt21}). We construct the other systems inductively. For each $ n \in \mathbb{Z}_{ > 0 } $, we apply Lemma \ref{lemmaSystemSetUpForDiagrams} with $ \mathcal{S}^{ ( n ) \prime } $ in place of $ \mathcal{S} $, $ \mathcal{P}^{ ( n ) } $ in place of $ \mathcal{P} $, $ \mathcal{P}^{ ( n + 1 ) } $ in place of $ \mathcal{P}' $, and get $ \mathcal{S}^{ ( n ) } $ (that is $ \mathcal{S}^0 $ in the lemma) and $ \mathcal{S}^{ ( n + 1 )\prime } $ (that is $\mathcal{S}'$ in the lemma) satisfying the conclusions of the lemma. Thus, to construct the sequence of systems, we only need to define $ \mathcal{S}^{ ( 0 ) } $ by $ T^{ ( 0 ) } = 1 $ , $ X_1^{ ( 0 ) } = X $, $ K_1^{ ( 0 ) } = 1 $, $ Y_{ 1 , 1 }^{ ( 0 ) } = 1 $, and $ J_{ 1 , 1 }^{ ( 0 ) } = 1 $. Now we begin to define $ B $. For each $ n \in \mathbb{Z}_{ \geq 0 } $, define \[ V_n = \{ ( n , t , k ) \,\big|\, \mbox{$ t \in \{ 1 , \ldots , T^{ ( n ) } \} $ and $ k \in \{ 1 , \ldots , K_t^{ ( n ) } \} $} \} \] The set of edges from $ ( n , t , k ) \in V_n $ to $ ( n + 1 , t' , k' ) \in V_{ n + 1 } $ is the set of all $ ( n + 1 , t' , k' , j ) $ such that $ h^j ( Y_{ t' , k' }^{ ( n + 1 ) } ) \subset Y_{ t , k }^{ ( n ) } $. Note that this is well defined; by assumption, $ h^j ( Y_{ t' , k' }^{ ( n + 1 ) } ) $ is a subset of an element of $ \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) $, so we do not need to include $ t $ and $ k $ in the tuple defining this edge. We define an order on the edges $ r^{ -1 } ( ( n , t , k ) ) $ by $ ( n , t , k , j_1 ) \leq ( n , t , k , j_2 ) $ if $ j_1 < j_2 $. We now construct the orbit map $ F : X \to X_B $. Let $ x \in X $. Then for each $ n \in \mathbb{Z}_{ > 0 } $, there is precisely one $ t \in \{ 1 , \ldots , T^{ ( n ) } \} $, one $ k \in \{ 1 , \ldots , K_t^{ ( n ) } \} $, and one $ j \in \{ 0 , \ldots , J_{ t , k }^{ ( n ) } \} $ such that $ x \in h^j ( Y_{ t , k }^{ ( n ) } ) $. If $ x \in h^j ( Y_{ t , k }^{ ( n ) } ) \cap h^{ j' } ( Y_{ t' , k' }^{ ( n + 1 ) } ) $, then $ j' \geq j $, since otherwise we would have $ h^{ j - j' } ( Y_{ t , k }^{ ( n ) } ) \subset X_t^{ ( n + 1 ) } $ (this follows from Lemma \ref{lemmaSystemSetUpForDiagrams}(c) and (d)), which is not possible since by definition $ h^i ( Y_{ t , k }^{ ( n ) } ) \cap X_t^{ ( n + 1 ) } = \varnothing $ for $ i \in \{ 1 , \ldots , J_{ t , k }^{ ( n ) } - 1 \} $. This, combined with the fact that $ \mathcal{P}_1 ( \mathcal{S}^{ ( n + 1 ) } ) $ is finer than $ \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) $, tells us that $ h^{ j' - j } ( Y_{ t' , k' }^{ ( n + 1 ) } ) \subset Y_{ t , k }^{ ( n ) } $, and therefore there is an edge from $ ( n , t , k ) $ to $ ( n + 1 , t' , k' ) $; namely, $ ( n + 1 , t' , k' , j' - j ) $. Thus, this gives us an infinite path in $ X_B $ associated to $ x $. We define $ F $ by sending $ x $ to this infinite path. We now show that $ F $ is injective. Suppose $ x , x' \in X $ and $ F ( x ) = F ( x' ) = ( e_1 , e_2 , \ldots ) $ where we write $ e_n = ( n , t_n , k_n , j_n ) $ for $ n \in \mathbb{Z}_{ > 0 } $. First, by definition is it clear that for each $ n \in \mathbb{Z}_{ > 0 } $, there are $ i_n , i_n' \in \{ 0 , \ldots , J_{ t_n , k_n }^{ ( n ) } - 1 \} $ such that $ x \in h^{ i_n } ( Y_{ t_n , k_n }^{ ( n ) } ) $ and $ x' \in h^{ i_n' } ( Y_{ t_n , k_n }^{ ( n ) } ) $. First, notice that $ i_1 = j_1 $ and $ i_1' = j_1 $ by definition of $ F $. Then, by definition of $ F $ we have $ j_2 = i_2 - j_1 $ and $ j_2 = i_2' - j_2 $; in particular, $ i_2 = i_2' $. Proceeding like this, we see that $ i_n = i_n' $ for all $ n \in \mathbb{Z}_{ > 0 } $. Since $ ( \mathcal{P}^{ ( n ) } ) $ is a generating sequence of partitions, so is $ ( \mathcal{P}_1 ( \mathcal{S}^{ ( n ) } ) ) $, and therefore $ \bigcap_{ n = 0 }^\infty h^{ i_n } ( Y_{ t_n , k_n }^{ ( n ) } ) $ contains at most one element of $ X $. Thus, $ x = x' $, and therefore $ F $ is injective. Next, we show that $ F $ is surjective. Let $ e = ( e_1 , e_2 , \ldots ) \in X_B $ and write $ e_n = ( n , t_n , k_n , j_n ) $ for $ n \in \mathbb{Z}_{ > 0 } $. We construct a sequence $ ( i_n ) $ with $ i_n \in \{ 0 , \ldots , J_{ t_n , k_n }^{ ( n ) } - 1 \} $ for all $ n \in \mathbb{Z}_{ > 0 } $ such that $ \bigcap_{ n = 0 }^\infty h^{ i_n } ( Y_{ t_n , k_n }^{ ( n ) } ) $ is nonempty and contains the element of $ X $ that $ F $ maps to $ e $. First, let $ i_1 = j_1 $. Then, for all $ n \in \mathbb{Z}_{ > 1 } $, let $ i_n = j_n + i_{ n - 1 } $ (note that this can be rewritten as $ i_n = \sum_{ k = 1 }^n j_k $). The claim now follows from the definition of $ B $, and $ F $ is therefore surjective. So far we have shown that $ F $ is bijective. We now show that $ F $ is a homeomorphism. Let $ U ( e_1 , \ldots , e_N ) $ be an element of the basis of the topology of $ X_B $. For each $ n \in \{ 1 , \ldots , N \} $, write $ e_n = ( n , t_n , k_n , j_n ) $. For each $ n \in \{ 1 , \ldots , N \} $, write $ j_n' = \sum_{ k = 1 }^n j_k $. We claim that if $ x \in h^{ j_N' } ( Y_{ t_N , k_N }^{ ( N ) } ) $, then $ F ( x ) \in U ( e_1 , \ldots , e_N ) $. So let $ x \in h^{ j_N' } ( Y_{ t_N , k_N }^{ ( N ) } ) $. First notice that by definition of $ e_N $, \[ h^{ j_N } ( Y_{ t_N , k_N }^{ ( N ) } ) \subset Y_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } . \] Thus, \[ h^{ j_N' } ( Y_{ t_N , k_N }^{ ( N ) } ) \subset h^{ j_{ N - 1 }' } ( Y_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } ) , \] since $ j_N + j_{ N - 1 }' = j_N' $. Similarly, we have \[ h^{ j_{ N - 1 } } ( Y_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } ) \subset Y_{ t_{ N - 2 } , k_{ N - 2 } }^{ ( N - 2 ) } . \] Thus, for every $ n \in \{ 1 , \ldots , N \} $, we have \[ x \in h^{ j_n' } ( Y_{ t_n , k_n }^{ ( N ) } ) , \] and so since $ j_n' - j_{ n - 1 }' = j_n $, the $ n $th edge of $ F ( x ) $ is indeed $ e_n $, and $ F ( x ) \in U ( e_1 , \ldots , e_N ) $ as desired. Next, we claim that if $ x \in X $ satisfies $ F ( x ) \in U ( e_1 , \ldots , e_N ) $, then $ x \in h^{ j_N' } ( Y_{ t_N , k_N }^{ ( N ) } ) $. So let $ x \in X $ satisfy $ F ( x ) \in U ( e_1 , \ldots , e_N ) $. Then for each $ n \in \{ 1 , \ldots , N \} $, $ x \in h^{ i_n } ( J_{ t_n , k_n }^{ ( n ) } ) $ for some $ i_n \in \{ 0 , \ldots , J_{ t_n , k_n }^{ ( n ) } - 1 \} $. It is clear that $ i_1 = j_1 $. Then, notice that $ i_2 $ is such that $ j_2 = i_2 - j_1 $, and so $ i_2 = j_1 + j_2 = j_2' $. Repeating this process inductively, we see that $ i_N = j_N' $, and so $ x \in h^{ j_N' } ( Y_{ t_N , k_N }^{ ( N ) } ) $ as desired. Altogether, this shows that $ F $ is a homeomorphism. If $ x \in Z $, then there are sequences of integers $ ( t_n ) $ and $ ( k_n ) $ such that $ x \in \bigcap_{ n = 0 }^\infty Y_{ t_n , k_n }^{ ( n ) } $. By definition of the order on $ B $, this means that $ F ( x ) \in X_{ B , \min } $. Conversely, suppose $ x \in X $ satisfies $ F ( x ) \in X_{ B , \min } $. Write $ F ( x ) = ( e_1 , e_2 , \ldots ) $ and for $ n \in \mathbb{Z}_{ > 0 } $ write $ e_n = ( n , t_n , k_n , i_n ) $. Since $ e_n $ is minimal, $ i_n $ is the minimal element of $ \{ 0 , \ldots , J_{ t_n , k_n }^{ ( n ) } - 1 \} $ such that $ h^{ i_n } ( Y_{ t_n , k_n }^{ ( n ) } ) \subset X_{ t_{ n - 1 } }^{ ( n - 1 ) } $. But since $ X_{ t_n }^{ ( n ) } \subset X_{ t_{ n - 1 } }^{ ( n - 1 ) } $, we have $ i_n = 0 $. Hence, $ x \in \bigcap_{ n = 0 }^\infty Y_{ t_n , k_n }^{ ( n ) } $. Thus, $ F ( Z ) = X_{ B , \min } $. Also notice that if $ x \in h^{ -1 } ( Z ) $, there are sequences of integers $ ( t_n ) $ and $ ( k_n ) $ such that $ x \in \bigcap_{ n = 0 }^\infty h^{ J_{ t_n , k_n }^{ ( n ) } - 1 } ( Y_{ t_n , k_n }^{ ( n ) } ) $. By definition of the order on $ B $, this means that $ F ( x ) \in X_{ B , \max } $. Similarly, the converse holds, and so $ F ( h^{ - 1 } ( Z ) ) = X_{ B , \max } $. We now show that $ ( F \circ h )|_{ X \setminus h^{ -1 } ( Z ) } = ( \widetilde{ h }_B \circ F )|_{ X \setminus h^{ -1 } ( Z ) } $. Let $ x \in X \setminus h^{ -1 } ( Z ) $. For each $ n \in \mathbb{Z}_{ > 0 } $, let $ t_n \in \{ 1 , \ldots , T^{ ( n ) } \} $, let $ k_n \in \{ 1 , \ldots , K_{ t_n }^{ ( n ) } \} $, and let $ j_n \in \{ 0 , \ldots , K_{ t_n }^{ ( n ) } - 1 \} $ satisfy $ x \in h^{ j_n } ( Y_{ t_n , k_n }^{ ( n ) } ) $. Since $ x \notin h^{ -1 } ( Z ) $, there is some smallest $ N \in \mathbb{Z}_{ > 0 } $ such that $ j_N \neq J_{ t_N , k_N }^{ ( N ) } - 1 $. We have \[ h^{ j_N + 1 } ( Y_{ t_N , k_N }^{ ( N ) } ) \subset J_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } ( Y_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } ) \] and so by Lemma \ref{lemmaSystemSetUpForDiagrams}(d), there is a $ k_{ N - 1 }' \in \{ 1 , \ldots , K_{ t_{ N - 1 } }^{ ( N - 1 ) } \} $ such that \begin{equation}\label{eq: hJN+1 equation} h^{ j_N + 1 } ( Y_{ t_N , k_N }^{ ( N ) } ) \subset Y_{ t_{ N - 1 } , k_{ N - 1 }' }^{ ( N - 1 ) } . \end{equation} Inductively, we can find for each $ n \in \{ 1 , \ldots , N - 2 \} $ a $ k_n' \in \{ 1 , \ldots , K_{ t_n }^{ ( n ) } \} $ such that $ Y_{ t_{ n + 1 }' , k_{ n + 1 }' }^{ ( n + 1 ) } \subset Y_{ t_{ n }' , k_n' }^{ ( n ) } $. Since $ j_N + 1 < J_{ t_N , k_N }^{ ( N ) } $ and since for each $ n \in \mathbb{Z}_{ > N } $ we have $ X_{ t_n }^{ ( n ) } \subset X_{ t_N }^{ ( N ) } $, it follows that $ j_n + 1 < J_{ t_N , k_N }^{ ( N ) } $ as well. So let $ k_n' = k_n $ and let $ j_n' = 0 $ for $ n \in \{ 1 , \ldots , N - 1 \} $, and let $ j_n' = j_n + 1 $ for $ n \in \mathbb{Z}_{ \geq N } $. Then for each $ n \in \mathbb{Z}_{ > 0 } $, $ h ( x ) \in h^{ j_n' } ( Y_{ t_n , k_n' }^{ ( n ) } ) $. Now write $ F ( x ) = ( e_1 , e_2 , \ldots ) $ and $ \widetilde{ h }_B ( F ( x ) ) = ( e_1' , e_2' , \ldots ) $ and for each $ n \in \mathbb{Z}_{ > 0 } $ write $ e_n = ( n , s_n , l_n , i_n ) $ and $ e_n' = ( n , s_n' , l_n' , i_n' ) $. By definition of $ F $, for all $ n \in \mathbb{Z}_{ > 0 } $ we have $ s_n = t_n $, $ l_n = k_n $, and $ i_n = j_n - j_{ n - 1 } $ where $ j_0 = 0 $. We also see that $ N $ is the smallest element of $ \mathbb{Z}_{ > 0 } $ such that $ e_N \notin E_{ \max } $, so $ e_N' $ is the successor of $ e_N $, $ ( e_1', \ldots , e_{ N - 1 }' ) $ is the minimal path such that $ r ( e_{ N - 1 }' ) = s ( e_N' ) $, and $ e_n' = e_n $ for all $ n \in \mathbb{Z}_{ > N } $. In particular we see that $ s_n' = t_n $ for all $ n \in \mathbb{Z}_{ > 0 } $, $ l_n' = k_n $ for all $ n \in \mathbb{Z}_{ \geq N } $, $ i_n' = 0 $ for $ n \in \{ 1 , \ldots , N - 1 \} $ and $ i_n' = i_n = j_n - j_{ n - 1 } $ for all $ n \in \mathbb{Z}_{ > N } $. Observe that $ i_N' $ is the smallest integer greater than $ i_N $ such that $ h^{ i_N' } ( Y_{ t_N , k_N }^{ ( N ) } ) \subset Y_{ t_{ N - 1 } , l_{ N - 1 }' }^{ ( N - 1 ) } $. Thus, this combined with \begin{equation}\label{eq: hiN equation} h^{ i_N } ( Y_{ t_N , k_N }^{ ( N ) } ) \subset Y_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } \end{equation} tells us \begin{align*} i_N' &= i_N + J_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } \\ &= j_N - j_{ N - 1 } + J_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } \\ &= j_N - ( J_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } - 1 ) + J_{ t_{ N - 1 } , k_{ N - 1 } }^{ ( N - 1 ) } \\ &= j_N + 1 \\ &= j_N' . \end{align*} From (\ref{eq: hJN+1 equation}) and (\ref{eq: hiN equation}) we see $ l_{ N - 1 }' = k_{ N - 1 }' $. Similarly, for $ n \in \{ 2 , \ldots , N - 1 \} $ since $ i_n' = j_n' = 0 $, we have $ l_{ n - 1 }' = k_{ n - 1 }' $. Write $ F ( h ( x ) ) = ( e_1^{\prime\prime} , e_2^{\prime\prime} , \ldots ) $ and for each $ n \in \mathbb{Z}_{ > 0 } $ write $ e_n^{\prime\prime} = ( n , s_n^{\prime\prime} , l_n^{\prime\prime} , i_n^{\prime\prime} ) $. For each $ n \in \mathbb{Z}_{ > 0 } $, we have $ s_n^{\prime\prime} = t_n' = t_n $ and $ l_n^{\prime\prime} = k_n' $. For $ n \in \{ 1 , \ldots , N - 1 \} $ , we have $ i_n^{\prime\prime} = i_n' = 0 $. We also have $ i_N^{\prime\prime} = j_N' - j_{ N - 1 }' = j_N' - 0 = i_N' $. For $ n \in \mathbb{Z}_{ > N } $, we have \begin{align*} i_n^{\prime\prime} = j_n' - j_{ n - 1 }' &= j_n + 1 - ( j_{ n - 1 } - 1 ) \\ &= j_n - j_{ n - 1 } \\ &= i_n \\ &= i_n' . \end{align*} Altogether, we see $ F ( h ( x ) ) = \widetilde{ h }_B ( F ( x ) ) $, and so \begin{equation}\label{eq: partial orbit map} ( F \circ h )|_{ X \setminus h^{ -1 } ( Z ) } = ( \widetilde{ h }_B \circ F )|_{ X \setminus h^{ -1 } ( Z ) } . \end{equation} We now show that the order on $ B $ is perfect. For each $ x \in X $, $ z $ is in the minimal set of the essentially minimal zero-dimensional system $ ( \psi^{ -1 } ( Z ) , h|_{ \psi^{ -1 } ( Z ) } ) $, $ \overline{ \text{orb} } ( x ) $ contains exactly one element of $ Z $ and exactly one element of $ h^{ -1 } ( Z ) $. Now, (\ref{eq: partial orbit map}) combined with $ F ( Z ) = X_{ B , \min } $ and $ F ( h^{ -1 } ( Z ) ) = X_{ B , \max } $ tells us that the ordering on $ B $ is perfect. It is now clear that $ F \circ h = h_B \circ F $. This proves conclusion (a) of the proposition. Before we prove the rest, we first prove two claims that will be used a few times in the proof. Claim ($\ast$): Let $ n \in \mathbb{Z}_{ > 0 } $, $ t_n \in \{ 1 , \ldots , T^{ ( n ) } \} $, $ k_n \in \{ 1 , \ldots , K_{ t_n }^{ ( n ) } \} $, and $ t_{ n + 1 } \in \{ 1 , \ldots , T^{ ( n + 1 ) } \} $. If $ X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) $, then for any $ k_{ n + 1 } \in \{ 1 , \ldots , K_{ t_{ n + 1 } }^{ ( n + 1 ) } \} $, there is an $ i_{ n + 1 } \in \{ 1 , \ldots , J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } \} $ such that $ e = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) $ is a maximal edge with $ s ( e ) = ( n , t_n , k_n ) $. We now prove ($\ast$). Let $ k_{ n + 1 } \in \{ 1 , \ldots , K_{ t_{ n + 1 } }^{ ( n + 1 ) } \} $. Then \[ h^{ J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } } ( Y_{ t_{ n + 1 } , k_{ n + 1 } } ) \subset X_{ t_{ n + 1 }^{ ( n + 1 ) } } \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ), \] so we have \[ h^{ J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } - J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_{ n + 1 } , k_{ n + 1 } } ) \subset Y_{ t_n , k_n }^{ ( n ) } \] Set $ i_{ n + 1 } = J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } - J_{ t_n , k_n }^{ ( n ) } $. Let $ j \in \{ 1 , \ldots , J_{ t_n , k_n }^{ ( n ) } - 1 \} $. Then \[ h^{ i_{ n + 1 } + j } ( Y_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } ) \subset h^j ( Y_{ t_n , k_n }^{ ( n ) } ), \] and since $ h^j ( Y_{ t_n , k_n }^{ ( n ) } ) \cap \left( \bigsqcup_{ t = 1 }^{ T^{ ( n ) } } X_t^{ ( n ) } \right) = \varnothing $, we indeed see that $ e = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) \in E_{ \max } $. This proves ($\ast$). Claim ($\ast \ast$): If there is a $ k_{ n + 1 } \in \{ 1 , \ldots , K_{ t_{ n + 1 } }^{ ( n + 1 ) } \} $ and a $ i \in \{ 1 , \ldots , J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } \} $ such that $ e = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) $ is a maximal edge with $ s ( e ) = ( n , t_n , k_n ) $, then $ X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) $. We now prove ($\ast \ast$). Since $ s ( e ) = ( n , t_n , k_n ) $, we have \[ h^{ i_{ n + 1 } } ( Y_{ t_{ n + 1 }, k_{ n + 1 } }^{ ( n + 1 ) } ) \subset Y_{ t_n , k_n }^{ ( n ) } \] Since $ e $ is maximal, there is no $ j \in \{ i_{ n + 1 } + 1 , \ldots , J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } - 1 \} $ with $ h^j ( Y_{ t_{ n + 1 }, k_{ n + 1 } }^{ ( n + 1 ) } ) \subset X_{ t_n , k_n }^{ ( n ) } $. However, notice that \[ h^{ i_{ n + 1 } + J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } ) \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) \subset X_{ t_n , k_n }^{ ( n ) } . \] Thus, we must have $ i_{ n + 1 } + J_{ t_n , k_n }^{ ( n ) } = J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } $. Thus, $ X_{ t_{ n + 1 } }^{ ( n + 1 ) } \cap h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) \neq \varnothing $, and so by Lemma \ref{lemmaSystemSetUpForDiagrams}(e), we actually have $ X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) $. This proves ($\ast \ast$). We now prove conclusion (b) of the proposition. Let $ v \in V_{ \min } $. Write $ v = ( n , t_n , k_n ) $. Since $ v \in V_{ \min } $, there is some $ v^{\prime\prime} \in V_{ n + 1 } $ and some $ e' \in E_{ \min } $ with $ s ( e' ) = v $ and $ r ( e' ) = v^{\prime\prime} $. Write $ v^{\prime\prime} = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } ) $ and then $ e' = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) $. By Lemma \ref{lemmaSystemSetUpForDiagrams}(d), since $ e' \in E_{ \min } $, we have $ i_{ n + 1 } = 0 $, so $ Y_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } \subset Y_{ t_n , k_n }^{ ( n ) } $. Again by Lemma \ref{lemmaSystemSetUpForDiagrams}(d), we have \begin{equation}\label{eq: whole base is a subset} X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset Y_{ t_n , k_n }^{ ( n ) } . \end{equation} Now, let $ t_{ n + 2 } \in \{ 1 , \ldots , T^{ ( n + 2 ) } \} $ satisfy \[ X_{ t_{ n + 2 } }^{ ( n + 2 ) } \cap \left( \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t_{ n + 1 } }^{ ( n + 1 ) } ) \right) \neq \varnothing . \] By Lemma \ref{lemmaSystemSetUpForDiagrams}(d), there is actually a $ k_{ n + 1 }' \in \{ 1 , \ldots , K_{ t_{ n + 1 } }^{ ( n + 1 ) } \} $ such that \[ X_{ t_{ n + 2 } }^{ ( n + 2 ) } \subset Y_{ t_{ n + 1 } , k_{ n + 1 }' }^{ ( n + 1 ) }. \] So for any $ k_{ n + 2 } \in \{ 1 , \ldots , K_{ t_{ n + 2 } }^{ ( n + 2 ) } \} $, we have a minimal edge $ e^{\prime\prime} = ( n + 2 , t_{ n + 2 } , k_{ n + 2 } , 0 ) $ with $ s ( e^{\prime\prime} ) = v' = ( n + 1 , t_{ n + 1 } , k_{ n + 1 }' ) $. Thus, $ v' \in V_{ \min } $. By (\ref{eq: whole base is a subset}), $ Y_{ t_{ n + 1 } , k_{ n + 1 }' }^{ ( n + 1 ) } \subset Y_{ t_n , k_n }^{ ( n ) } $, and so there is a minimal edge $ e = ( n + 1 , t_{ n + 1 } , k_{ n + 1 }' , 0 ) $ with $ s ( e ) = v $ and $ r ( e ) = v' $. Now let $ v \in V_{ \max } $ and write $ v = ( n , t_n , k_n ) $. Since $ v \in V_{ \max } $, there is some $ v^{\prime\prime} \in V_{ n + 1 } $ and some $ e' \in E_{ \max } $ with $ s ( e' ) = V $ and $ r ( e' ) = v^{\prime\prime} $. Write $ v^{\prime\prime} = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } ) $ and then $ e' = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) $. By $(\ast \ast)$, we have \[ X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) \] Now, let $ t_{ n + 2 } \in \{ 1 , \ldots , T^{ ( n + 2 ) } \} $ satisfy \[ X_{ t_{ n + 2 } }^{ ( n + 2 ) } \cap \left( \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t_{ n + 1 } }^{ ( n + 1 ) } ) \right) \neq \varnothing . \] By Lemma \ref{lemmaSystemSetUpForDiagrams}(e), there is actually a $ k_{ n + 1 }' \in \{ 1 , \ldots , K_{ t_{ n + 1 } }^{ ( n + 1 ) } \} $ such that \[ X_{ t_{ n + 2 } }^{ ( n + 2 ) } \subset h^{ J_{ t_{ n + 1 } , k_{ n + 1 }' }^{ ( n + 1 ) } } ( Y_{ t_{ n + 1 } , k_{ n + 1 }' }^{ ( n + 1 ) } ) . \] By $(\ast)$, $ v' = ( n + 1 , t_{ n + 1 } , k_{ n + 1 }' ) \in V_{ \max } $. By $(\ast)$, there is $ e \in E_{ \max } $ with $ s ( e ) = v $ and $ r ( e ) = v' $. This completes the proof of conclusion (b). We now prove conclusion (c) of the proposition. Let $ v \in V_{ \min } $ and $ e \in E_{ \min } $ satisfy $ r ( e ) \in R ( v ) $. Write $ v = ( n , t_n , k_n ) $ and $ e = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) $. Since $ r ( e ) \in R ( v ) $, there is an edge $ e' = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 }' ) $ with $ s ( e' ) = v $, which tells us there is $ j_{ n + 1 } \in \{ 0 , \ldots , J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } - 1 \} $ such that $ h^{ j_{ n + 1 } } ( Y_{ t_{ n + 1 } , k_{ n + 1 } } ) \subset Y_{ t_n , k_n }^{ ( n ) } $. By Lemma \ref{lemmaSystemSetUpForDiagrams}(f), $ Y_{ t_n , k_n }^{ ( n ) } \subset \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t_{ n + 1 } }^{ ( n + 1 ) } ) $. Since $ v \in V_{ \min } $, there is some edge $ e^{\prime\prime} = ( n + 1 , t_{ n + 1 } , k_{ n + 1 }^{\prime\prime} , i_{ n + 1 }^{\prime\prime} ) \in E_{ \min } $ with $ s ( e ) = v $. By Lemma \ref{lemmaSystemSetUpForDiagrams}(d), since $ e^{\prime\prime} \in E_{ \min } $, we have $ i_{ n + 1 }^{\prime\prime} = 0 $, so $ Y_{ t_{ n + 1 } , k_{ n + 1 }^{\prime\prime} }^{ ( n + 1 ) } \subset Y_{ t_n , k_n }^{ ( n ) } $. Again by Lemma \ref{lemmaSystemSetUpForDiagrams}(d), we actually have \begin{equation}\label{eq: Xtn+1 subset Ytn} X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset Y_{ t_n , k_n }^{ ( n ) } . \end{equation} Now, since $ e \in E_{ \min } $, by Lemma \ref{lemmaSystemSetUpForDiagrams}(d), we have $ i_{ n + 1 } = 0 $. But by (\ref{eq: Xtn+1 subset Ytn}), we must have $ Y_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } \subset Y_{ t_n , k_n }^{ ( n ) } $, which means that $ s ( e ) = v $. Let $ v \in V_{ \max } $ and $ e \in E_{ \max } $ satisfy $ r ( e ) \in R ( v ) $. Write $ v = ( n , t_n , k_n ) $ and $ e = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 } ) $. Since $ r ( e ) \in R ( v ) $, there is an edge $ e' = ( n + 1 , t_{ n + 1 } , k_{ n + 1 } , i_{ n + 1 }' ) $ with $ s ( e' ) = v $, which tells us there is $ j_{ n + 1 } \in \{ 0 , \ldots , J_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } - 1 \} $ such that $ h^{ j_{ n + 1 } } ( Y_{ t_{ n + 1 } , k_{ n + 1 } }^{ ( n + 1 ) } ) \subset Y_{ t_n , k_n }^{ ( n ) } $. By Lemma \ref{lemmaSystemSetUpForDiagrams}(f), $ Y_{ t_n , k_n }^{ ( n ) } \subset \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t_{ n + 1 } }^{ ( n + 1 ) } ) $. Since $ v \in V_{ \max } $, there is some edge $ e^{\prime\prime} = ( n + 1 , t_{ n + 1 } , k_{ n + 1 }^{\prime\prime} , i_{ n + 1 }^{\prime\prime} ) \in E_{ \max } $ with $ s ( e ) = v $. By $(\ast \ast)$, we have \[ X_{ t_{ n + 1 } }^{ ( n + 1 ) } \subset h^{ J_{ t_n , k_n }^{ ( n ) } } ( Y_{ t_n , k_n }^{ ( n ) } ) . \] By ($\ast$), $ s ( e ) = v $. This completes the proof of conclusion (c). Now we prove conclusion (d) of this lemma. Let $ v \in V_{ \min } $, let $ m \in \mathbb{Z}_{ > 0 } $, and write $ v = ( n , t_n , k_n ) $. It is clear that $ v \in ( S^m \circ R^m ) ( v ) $, and so \[ R^m ( v ) \subset ( R^m \circ S^m \circ R^m ) ( v ) . \] Now, let $ w = ( n + m , t_{ n + m } , k_{ n + m } ) \in R^m ( v ) $. By Lemma \ref{lemmaSystemSetUpForDiagrams}(d) (applied $ m $ times), we have \[ \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t_{ n + m } }^{ ( n + m ) } ) \subset \bigcup_{ j \in \mathbb{Z} } h^j ( X_{ t_n }^{ ( n ) } ) \] So every element of $ ( S^m \circ R^m ) ( v ) $ has the form $ ( n , t_n , k_n' ) $ for some $ k_n' \in \{ 1 , \ldots , K_{ t_n }^{ ( n ) } \} $. Let $ w' = ( n + m , t_{ n + m }' , k_{ n + m }' ) \in ( R^m \circ S^m \circ R^m ) ( v ) $, meaning there is an path $ ( e_1 , \ldots , e_m ) $ with $ s ( e_1 ) = ( n , t_n , k_n' ) $ for some $ k_n' \in \{ 1 , \ldots , K_{ t_n }^{ ( n ) } \} $ and $ r ( e_m ) = w' $. Write $ e_m = ( n + m , t_{ n + m }' , k_{ n + m }' , i_{ n + m }' ) $. This means that $ h^{ i_{ n + m }' } ( Y_{ t_{ n + m }' , k_{ n + m }' }^{ ( n + m ) } ) \subset Y_{ t_n , k_n' }^{ ( n ) } $. But then by Lemma \ref{lemmaSystemSetUpForDiagrams}(d) (applied $ m $ times), we must have $ Y_{ t_{ n + m }' , k_{ n + m }' }^{ ( n + m ) } \subset Y_{ t_n , k_n }^{ ( n ) } $. Therefore $ w' \in R^m ( v ) $ (by a minimal path), as desired. An identical argument using Lemma \ref{lemmaSystemSetUpForDiagrams}(e) in place of (d) shows that this equation also holds when $ v \in V_{ \max } $. This proves conclusion (d) of this proposition and therefore finishes the proof of the proposition. \end{proof} \begin{prop}\label{propTelescopingPreservesAssociatedDiagramProperties} Let $ ( X , h ) $ be a fiberwise essentially minimal zero-dimensional system and let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram that satisfies the conclusions of Proposition \ref{propAssociatedBratteliDiagram}. If $ B' = ( V' , E' , \leq' ) $ is a telescoping of $ B $, then $ B' $ also satisfies the conclusions of Proposition \ref{propAssociatedBratteliDiagram}. \end{prop} \begin{proof} Let $ ( k_n ) $ be the telescoping sequence corresponding to $ B' $, so that $ V_n' = V_{ k_n } $ and $ E_n' = P_{ k_n + 1 , k_{ n + 1 } } $ for all $ n \in \mathbb{Z}_{ > 0 } $ (where $ k_0 = 0 $). This identification induces a map $ \varphi : X_B \to X_{ B' } $ by sending $ e = ( e_1 , e_2 , \ldots ) $ to $ \varphi ( e ) = ( ( e_1 , \ldots , e_{ k_1 } ) , ( e_{ k_1 + 1 } , \ldots , e_{ k_2 } ) , \ldots ) $. By definition of the induced order on a telescoped Bratteli diagram, $ \varphi $ is a conjugation, and therefore $ B' $ satisfies conclusion (a) of Proposition \ref{propAssociatedBratteliDiagram}. We now show that conclusion (b) holds. Let $ v \in V_{ n , \min }' $. What we are looking for is a $ v' \in V_{ n + 1 , \min }' $ and $ e \in E_{ n + 1 , \min }' $ such that $ s ( e ) = v $ and $ r ( e ) = v' $. We can regard all of this as happening in $ B $ instead of $ B' $, so that we have $ v \in V_{ k_n , \min } $, and we are looking for $ v' \in V_{ k_{ n + 1 } , \min } $ and a minimal path $ ( e_{ k_n + 1 } , \ldots , e_{ k_{ n + 1 } } ) \in P_{ k_n + 1 , k_{ n + 1 } } $. By Proposition \ref{propAssociatedBratteliDiagram}(b), there is a $ e_{ k_n + 1 } \in E_{ k_n + 1 , \min } $ and a $ v_{ k_n + 1 } \in V_{ k_n + 1 , \min } $ with $ s ( e ) = v $ and $ r ( e ) = v_{ k_n + 1 } $. Proceeding inductively, we construct the desired result, with $ v' = v_{ k_{ n + 1 } } $. The same argument works for $ V_{ \max }' $ in place of $ V_{ \min }' $. This proves that conclusion (b) holds. Next, we prove that conclusion (c) holds. Let $ v \in V_{ n , \min }' $ and let $ e \in E_{ n + 1 , \min }' $ satisfy $ r ( e ) \in R ( v ) $. We want to show that $ s ( e ) = v $. We once again regard all of this as happening in $ B $ instead of $ B' $. What this means is that we have $ v \in V_{ k_n , \min }' $ and a minimal path $ ( e_{ k_n + 1 } , \ldots , e_{ k_{ n + 1 } } ) \in P_{ k_n + 1 , k_{ n + 1 } } $ such that there is some path $ ( e_{ k_n + 1 }' , \ldots , e_{ k_{ n + 1 } }' ) \in P_{ k_n + 1 , k_{ n + 1 } } $ such that $ s ( e_{ k_n + 1 }' ) = v $ and $ r ( e_{ k_{ n + 1 } }' ) = r ( e_{ k_{ n + 1 } } ) $, and we want to show that $ s ( e_{ k_n + 1 } ) = v $. Suppose not. Then by Proposition \ref{propAssociatedBratteliDiagram}(c), we have $ r ( e_{ k_n + 1 } ) \notin R ( v ) $; in particular, we have $ r ( e_{ k_n + 1 } ) \neq r ( e_{ k_n + 1 }' ) $. Proceeding like this, we eventually see $ r ( e_{ k_{ n + 1 } } ) \neq r ( e_{ k_{ n + 1 } }' ) $, a contradiction. Thus, $ s ( e_{ k_n + 1 } ) = v $. The proof for $ V_{ \max }' $ in place of $ V_{ \min }' $ is analogous. This proves that conclusion (c) holds. That conclusion (d) holds is immediate; replace $ m $ with $ k_{ n + m } - k_n $. This completes the proof of the proposition. \end{proof} \section{The Dynamical Classification Theorem} We now prove our main theorems, Theorem \ref{thmMainTheoremPrelude} and Theorem \ref{thmMainTheorem}. \begin{lemma}\label{lemmaPassesThoughSameVertex} Let $ B = ( V , E , \leq ) $ be an ordered Bratteli diagram with a perfect ordering. Let $ e , f \in X_B $ and suppose $ e $ and $ f $ pass through the same vertex $ v $ at level $ k $. Then there is some $ N \in \mathbb{Z} $ such that $ h_B^N ( e ) = f $. \end{lemma} \begin{proof} Write $ e = ( e_1 , e_2 , \ldots ) $ and write $ f = ( f_1 , f_2 , \ldots ) $. Let $ n_1 $ be the largest element of $ \{ 1 , \ldots , k \} $ such that $ e_{ n_1 } \neq f_{ n_1 } $. Suppose $ e_{ n_1 } < f_{ n_1 } $. Then there is an $ N_1 \in \mathbb{Z}_{ > 0 } $ such that \[ h_B^{ N_1 } ( e ) = ( e_1' , \ldots , e_{ n_1 - 1 }' , f_{ n_1 } , e_{ n_1 + 1 } , e_{ n_1 + 2 } , \ldots ) , \] where $ ( e_1' , \ldots , e_{ n_1 - 1 }' ) $ is the minimal path from $ v_0 \in V_0 $ to $ s ( f_{ n_1 } ) $. Now, $ h_B^{ M } ( e ) $ and $ f $ pass through the same vertex at level $ n_1 - 1 $. So let $ n_2 $ be the largest element of $ \{ 1 , \ldots , n_1 - 1 \} $ such that $ e_{ n_2 }' \neq f_{ n_2 } $. Clearly $ e_{ n_2 }' < f_{ n_2 } $. So repeating the above process, we find an integer $ N_2 \in \mathbb{Z}_{ > 0 } $ such that $ h_B^{ N_1 + N_2 } ( e ) = ( e_1^{\prime\prime} , \ldots , e_{ n_2 - 1 }^{\prime\prime} , f_{ n_2 } , \ldots , f_{ n_1 } , e_{ n_1 + 1 } , \ldots ) $. Repeating this process inductively, we arrive at an integer $ N $ such that $ h_B^N ( e ) = f $. \end{proof} \begin{thm}\label{thmMainTheoremPrelude} Let $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ be fiberwise essentially minimal zero-dimensional systems. Then $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ are strong orbit equivalent if and only if \[ ( K_0 ( C^* ( \mathbb{Z} , X_1 , h_1 ) ) , K_0 ( C^* ( \mathbb{Z} , X_1 , h_1 ) )^+ , 1 ) \cong ( K_0 ( C^* ( \mathbb{Z} , X_2 , h_2 ) ) , K_0 ( C^* ( \mathbb{Z} , X_2 , h_2 ) )^+ , 1 ) \] and \[ K_1 ( C^* ( \mathbb{Z} , X_1 , h_1 ) ) \cong K_1 ( C^* ( \mathbb{Z} , X_2 , h_2 ) ) . \] \end{thm} \begin{proof} ($ \Leftarrow $). Let $ B_1 $ and $ B_2 $ be the Bratteli diagrams satisfying the conclusions of Proposition \ref{propAssociatedBratteliDiagram} for $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $, respectively. By Theorem \ref{thmK0isomK0}, we have $ K^0 ( X_1 , h_1 ) \cong K^0 ( X_2, h_2 ) $. By Proposition \ref{propAssociatedBratteliDiagram}(a), we have $ K^0 ( X_{ B_1 } , h_{ B_1 } ) \cong K^0 ( X_{ B_2 } , h_{ B_2 } ) $. By a slight but trivial extension of Theorem 5.4 in \cite{HermanPutnamSkau92}, we have $ K_0 ( B_1 ) \cong K_0 ( B_2 ) $. By \cite{Elliott76}, we have $ B_1 \sim B_2 $ (in the equivalence class of Bratteli diagrams generated by telescoping and isomorphism), which tells us that there is a (non-ordered) Bratteli diagram $ B $ such that telescoping $ B $ to odd levels yields a telescoping of $ B_1 $ and telescoping $ B $ to even levels yields a telescoping of $ B_2 $. By replacing $ B_1 $ and $ B_2 $ with their telescopings (which can be done without changing the above due to Proposition \ref{propTelescopingPreservesAssociatedDiagramProperties}), we may assume that telescoping $ B $ to odd levels yields $ B_1 $ and telescoping $ B_2 $ to even levels yields $ B_2 $. Let $ B' $ be the telescoping of $ B $ by the sequence $ ( 3n - 2 ) $, so that telescoping $ B $ to odd levels yields a telescoping of $ B_1 $ by $ ( 3n - 2 ) $ and telescoping $ B $ to even levels yields a telescoping of $ B_2 $ by $ ( 3n - 1 ) $. Note that by Proposition \ref{propTelescopingPreservesAssociatedDiagramProperties}, these telescopings of $ B_1 $ and $ B_2 $ also satisfy the conclusions of Proposition \ref{propAssociatedBratteliDiagram}. We denote by $ V_{ \min }' $ ($ V_{ \max }' $) the minimal (resp. maximal) vertices as inherited by $ B_1 $ and $ B_2 $. We claim that $ B' $ has the following properties: \begin{enumerate}[(i)] \item Let $ v \in V_{ \min }' $. There is at least one $ v' \in V_{ \min }' $ with $ v' \in R ( v ) $. \item Let $ v \in V_{ \min }' $. There is precisely one $ v' \in V_{ \min }' $ with $ v' \in S ( v ) $. \end{enumerate} We first prove property (i). Let $ v \in V_{ \min , n }' $. The statement is trivially true for $ n = 0 $ so suppose $ n > 0 $ and without loss of generality suppose that $ n $ is odd. View $ v $ as a vertex in $ V_{ \min , 3n - 2 } $, so that the statement we are trying to prove becomes $ R^3 ( v ) \cap V_{ \min } \neq \varnothing $. Notice that for every vertex $ w \in V^{ ( 2 ) } \setminus V^{ ( 2 ) }_0 $, $ S ( w ) \cap V^{ ( 2 ) }_{ \min } \neq \varnothing $, since there is always an $ e \in E^{ ( 2 ) }_{ \min } $ with $ s ( e ) = w $. Thus, it follows that $ ( S^2 \circ R^3 ) ( v ) \cap V_{ \min } \neq \varnothing $. By Proposition \ref{propAssociatedBratteliDiagram}(b), we have $ ( R^2 \circ S^2 \circ R^3 ) ( v ) \cap V_{ \min } \neq \varnothing $. By Proposition \ref{propAssociatedBratteliDiagram}(d), we have $ R^2 \circ S^2 \circ R^2 = R^2 $. Thus, $ R^2 \circ S^2 \circ R^3 = R^3 $, so $ R^3 ( v ) \cap V_{ \min } \neq \varnothing $. The proof for $ v \in V_{ \max }' $ is analogous. Altogether, this proves property (i). We now prove property (ii). Let $ v \in V_{ \min , n }' $ and without loss of generality suppose that $ n $ is odd. The case $ n = 1 $ is trivial so suppose $ n > 1 $. View $ v $ as a vertex in $ V_{ \min , 3n - 2 } $, so that the statement we are trying to prove is that $ S^3 ( v ) $ contains precisely one element. Let $ w \in S ( v ) $ and let $ ( e_1 , e_2 ) $ be a minimal path with $ r ( e_2 ) = w $. Since $ s ( e_1 ) \in V_{ \min } $, we have $ S^3 ( v ) \cap V_{ \min } \neq \varnothing $. Now, suppose $ S^3 ( v ) \cap V_{ \min } $ contains two elements, $ v_1 $ and $ v_2 $. By Proposition \ref{propAssociatedBratteliDiagram}(c), we have $ R^2 ( v_1 ) \cap R^2 ( v_2 ) = \varnothing $. By Proposition \ref{propAssociatedBratteliDiagram}(b), $ R^2 ( v_1 ) \cap V_{ \min } \neq \varnothing $ and $ R^2 ( v_2 ) \cap V_{ \min } \neq \varnothing $. By Proposition \ref{propAssociatedBratteliDiagram}(c) again, \begin{equation}\label{eq:lastproof1} R^2 ( R^2 ( v_1 ) \cap V_{ \min } ) \cap R^2 ( R^2 ( v_2 ) \cap V_{ \min } ) = \varnothing \end{equation} Since $ v \in R^3 ( v_1 ) $ and $ v \in R^3 ( v_2 ) $, we have \begin{equation}\label{eq:lastproof2} R^4 ( v_1 ) \cap R^4 ( v_2 ) \neq \varnothing . \end{equation} But now notice that by Proposition \ref{propAssociatedBratteliDiagram}(d), we have $ R^4 ( v_1 ) = R^2 ( R^2 ( v_1 ) \cap V_{ \min } ) $ and $ R^4 ( v_2 ) = R^2 ( R^2 ( v_2 ) \cap V_{ \min } ) $. Thus, we see that (\ref{eq:lastproof1}) and (\ref{eq:lastproof2}) yield a contradiction. Therefore, $ S^3 ( v ) \cap V_{ \min } $ contains precisely one element. The proof for $ v \in V_{ \max }' $ is analogous. This proves property (ii). For convenience, replace $ B^{ ( 1 ) } $ with its telescoping by $ ( 3 n - 2 ) $ and replace $ B^{ ( 2 ) } $ with its telescoping by $ ( 3 n - 1 ) $. Now, let $ e = ( e_1 , e_2 , \ldots ) \in X_{ B^{ ( 1 ) } , \min } $ and let $ ( v_1 , v_2 , \ldots ) $ be its associated vertices. Let $ n \in \mathbb{Z}_{ > 1 } $. We view $ v_n $ as a vertex in $ V_{ 2n - 1 }' $. By property (ii), there is a unique vertex $ v_{ n - 1 }' \in V_{ \min , 2n - 2 }' $ such that $ v_{ n - 1 }' \in S ( v_n ) $. We claim that $ v_{ n - 1 } \in S ( v_{ n - 1 }' ) $. If not, then by property (ii) there is some $ w \in S ( v_{ n - 1 }' ) $ such that $ w \neq v_{ n - 1 } $. But then $ R^2 ( w ) \cap R^2 ( v_{ n - 1 } ) \neq \varnothing $, which is a contradiction again by Proposition \ref{propAssociatedBratteliDiagram}(c). Thus, for each $ n \in \mathbb{Z}_{ > 1 } $, $ v_{ n - 1 }' $ is connected by a path to $ v_n' $, there is an $ e_n' \in E_{ \min , n }^{ ( 2 ) } $ with $ s ( e_n' ) = v_{ n - 1 }' $ and $ r ( e_n' ) = v_n' $ by Proposition \ref{propAssociatedBratteliDiagram}(c). Thus, this gives us $ e' = ( e_1' , e_2' , \ldots ) \in X_{ B^{ ( 2 ) } , \min } $ such that for each $ n \in \mathbb{Z}_{ > 0 } $, we have $ s ( e_n' ) = v_{ n - 1 }' $ and $ r ( e_n' ) = v_n' $. Let $ f = ( f_1 , f_2 , \ldots ) \in X_{ B' } $ be any path with $ r ( f_n ) = s ( f_{ n + 1 } ) = v_{ 2n - 1 } $ for all odd $ n \in \mathbb{Z}_{ > 0 } $ and $ r ( f_n ) = s ( f_{ n + 1 } ) = v_{ 2n }' $ for all even $ n \in \mathbb{Z}_{ > 0 } $. Since this respects the vertices and the range and source maps, we are free to define $ F_1 ( e ) = f $ and $ F_2 ( e' ) = f $. We now show that the above pairing is a bijection between $ X_{ B , \min }^{ ( 1 ) } $ and $ X_{ B , \min }^{ ( 2 ) } $. Let $ e' = ( e_1' , e_2' , \ldots ) \in X_{ B^{ ( 2 ) } , \min } $ and $ ( v_n' ) $ be as above. By property (ii), for each $ n \in \mathbb{Z}_{ > 0 } $ there is precisely one $ w_n \in V_{ \min }' $ with $ w_n \in S ( v_n' ) $. Since $ v_n \in S ( v_n' ) $, we must have $ w_n = v_n $. Thus, the bijection is established, and so $ F_1 ( X_{ B^{ ( 1 ) } , \min } ) = F_2 ( X_{ B^{ ( 2 ) } , \min } ) $. We now repeat the process for maximal vertices, choosing edges which are not minimal if the number of edges between the vertices is more than one. This extends $ F_1 $ and $ F_2 $ so that $ F_1 ( X_{ B^{ ( 1 ) } , \max } ) = F_2 ( X_{ B^{ ( 2 ) } , \max } ) $. We now extend $ F_1 $ and $ F_2 $ by any bijection between $ E_n^{ ( 1 ) } $ and $ E_{ 2 n - 1 }' $ and any bijection between $ E_n^{ ( 2 ) } $ and $ E_{ 2 n } $ that respect the range and source maps. In this way, we get homeomorphisms $ F_1 : X_{ B^{ ( 1 ) } } \to X_{ B' } $ and $ F_2 : X_{ B^{ ( 2 ) } } \to X_{ B' } $. Define $ F = F_2^{ -1 } \circ F_1 : X_{ B^{ ( 1 ) } } \to X_{ B^{ ( 2 ) } } $. Let $ \alpha , \beta : X_{ B^{ ( 1 ) } } \to \mathbb{Z} $ be the orbit cocyles of $ F $. We will show that $ \alpha $ and $ \beta $ are continuous on $ X_{ B^{ ( 1 ) } } \setminus X_{ B^{ ( 1 ) } , \max } $. So let $ e = ( e_1 , e_2 , \ldots ) \in X_{ B^{ ( 1 ) } } \setminus X_{ B^{ ( 1 ) } , \max } $. Let $ k $ be the smallest element of $ \mathbb{Z}_{ > 0 } $ such that $ e_k \notin E^{ ( 1 ) }_{ \max } $. Then $ e $ and $ h_{ B^{ ( 1 ) } } ( e ) $ are confinal from level $ k $. This means that $ F_1 ( e ) $ and $ F_1 ( h_{ B^{ ( 1 ) } } ( e ) ) $ are cofinal from level $ 2 k - 1 $, and so $ F ( e ) $ and $ F ( h_{ B^{ ( 1 ) } } ( e ) ) $ are cofinal from level $ k $. In particular, $ F ( e ) $ and $ F ( h_{ B^{ ( 1 ) } } ( e ) ) $ pass through the same vertex $ v $ at level $ k $. By Lemma \ref{lemmaPassesThoughSameVertex}, there is an integer $ N $ such that \[ h_{ B^{ ( 1 ) } }^N ( e ) = F ( h_{ B^{ ( 1 ) } } ( e ) ) \] Let $ f \in U ( e_1 , \ldots , e_{ k + 1 } ) $. Then $ y $ and $ h_{ B^{ ( 1 ) } } ( f ) $ are confinal from level $ k $. This means that $ F_1 ( f ) $ and $ F_1 ( h_{ B^{ ( 1 ) } } ( f ) ) $ are cofinal from level $ 2 k - 1 $, and so $ F ( y ) $ and $ F ( h_{ B^{ ( 1 ) } } ( f ) ) $ are cofinal from level $ k $. Since $ e , f \in U ( e_1 , \ldots , e_{ k + 1 } ) $, $ h_{ B^{ ( 1 ) } } ( x ) $ and $ h_{ B^{ ( 1 ) } } ( f ) $ have the same initial segment from level $ 0 $ to level $ k + 1 $, and so $ F ( h_{ B^{ ( 1 ) } } ( e ) ) $ and $ F ( h_{ B^{ ( 1 ) } } ( f ) ) $ have the same initial segment from level $ 0 $ to level $ k $. Similarly, $ F ( e ) $ and $ F ( f ) $ have the same initial segment from level $ 0 $ to level $ k $. Thus, the integer $ N $ from above satisfies \[ h_{ B^{ ( 1 ) } }^N ( f ) = F ( h_{ B^{ ( 1 ) } } ( f ) ) \] Since $ f \in U ( e_1 , \ldots , e_{ k + 1 } ) $ was arbitrary, this shows that $ \alpha $ is continuous at $ e $. The argument for $ \beta $ is analogous to $ \alpha $. Thus, $ ( X_{ B^{ ( 1 ) } } , h_{ B^{ ( 1 ) } } , X_{ B^{ ( 1 ) } , \max } ) $ and $ ( X_{ B^{ ( 2 ) } } , h_{ B^{ ( 2 ) } } , X_{ B^{ ( 2 ) } , \max } ) $ are strong orbit equivalent. By replacing $ F $ with $ h_{ B^{ ( 1 ) } }^{ - 1 } \circ F $, we see that $ ( X_{ B^{ ( 1 ) } } , h_{ B^{ ( 1 ) } } , X_{ B^{ ( 1 ) } , \min } ) $ and $ ( X_{ B^{ ( 2 ) } } , h_{ B^{ ( 2 ) } } , X_{ B^{ ( 2 ) } , \min } ) $ are strong orbit equivalent. Therefore, by Proposition \ref{propAssociatedBratteliDiagram}(a), $ ( X_1 , h_1 . Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ are strong orbit equivalent. ($\Rightarrow$). Assume $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ are strong orbit equivalent. By the definition of strong orbit equivalence, we have $ Z_1 \cong Z_2 $ and so by Theorem \ref{thmK1Formula}, we have $ K_1 ( C^* ( \mathbb{Z} , X_1 , h_1 ) ) \cong K_1 ( C^* ( X_2 , h_2 , Z_2 ) ) $. Let $ \beta , \gamma : X_1 \to \mathbb{Z} $ be the associated orbit cocyles defined by $ F \circ h_1 = h_2^\beta \circ F $ and $ F \circ h_1^\gamma = h_2 \circ F $. Recall that strong orbit equivalence tells us that $ \beta $ and $ \gamma $ are continuous on $ X_1 \setminus Z_1 $ and $ F ( Z_1 ) = Z_2 $. Let $ \widetilde{ h }_2 = F^{ - 1 } \circ h_2 \circ F : X_1 \to X_1 $. Then $ \widetilde{ h }_2 $ is conjugate to $ h_2 $, has the same orbits as $ h_1 $, and \[ h_1 = \widetilde{ h }_2^\beta , \widetilde{ h }_2 = h_1^\gamma. \] We also see that $ ( X_1 , \widetilde{ h }_2 , Z_1 ) $ is a fiberwise essentially minimal zero-dimensional system that is conjugate to $ ( X_2 , h_2 , Z_2 ) $, so we work with the former for the remainder of the proof. Let $ \alpha_1 $ be the automorphism of $ C ( X_1 ) $ induced by $ h_1 $ and let $ \alpha_2 $ be the automorphism of $ C ( X_1 ) $ induced by $ \widetilde{ h }_2 $. We now show that $ \text{ran} ( \text{id} - ( \alpha_1 )_* ) \subset \text{ran} ( \text{id} - ( \alpha_2 )_* ) $. It is enough to show that for any compact open set $ E \subset X_1 $, we have $ ( \text{id} - ( \alpha_1 )_* ) ( \chi_E ) \in \text{ran} ( \text{id} - ( \alpha_2 )_* ) $. Given $ f \in C ( X_1 , \mathbb{Z} ) $, we denote the image of $ f $ in $ K_0 ( C^* ( \mathbb{Z} , X_1 , h_i ) ) $ by $ [ f ]_1 $ and denote the image of $ f $ in $ K_0 ( C^* ( \mathbb{Z} , X_1 , \widetilde{ h }_2 ) ) $ by $ [ f ]_2 $. Since $ h_1 $ and $ \widetilde{ h }_2 $ have the same orbits, there is a probably measure $ \mu $ that is both $ h_1 $- and $ \widetilde{ h }_2 $-invariant. Note that $ C^* ( \mathbb{Z} , X_1 , h_1 ) $ is the $ C^* $-subalgebra of $ L ( L^2 ( X_1 , \mu ) ) $ generated by $ C ( X ) $ and the unitary $ u_1 : g \to g \circ h_1^{ -1 } $. Also note that $ C^* ( \mathbb{Z} , X_1 , \widetilde{ h }_2 ) $ is the $ C^* $-subalgebra of $ L ( L^2 ( X_1 , \mu ) ) $ generated by $ C ( X ) $ and the unitary $ u_2 : g \to g \circ \widetilde{ h }_2^{ -1 } $. For the remainder of the proof, we identify these crossed products with these corresponding subalgebras of $ L ( L^2 ( X_1 , \mu ) ) $. We claim that map $ \varphi : K_0 ( C^* ( \mathbb{Z} , X_1 , h_1 ) ) \to K_0 ( C^* ( \mathbb{Z} , X_1 , \widetilde{ h }_2 ) ) $ defined by $ \varphi ( [ \chi_U ]_1 ) = [ \chi_U ]_2 $ is an isomorphism of ordered groups. Since the positive cone and distinguished order units agree via this map, the only thing to check is that $ \image ( \text{id} - ( \alpha_1 )_* ) = \image ( \text{id} - ( \alpha_2 )_* ) $. Let $ E $ be a compact open subset of $ X_1 $ such that $ E \cap Z_1 = \varnothing $. Then since $ \beta $ is continuous on $ E $, $ \text{ran} ( \beta|_E ) = \{ k_1 , \ldots , k_N \} $. Then \[ u_1 \chi_E = \sum_{ n = 1 }^N u_2^{ k_n } \chi_{ E \cap \beta^{ -1 } ( k_n ) } . \] Thus, $ u_1 \chi_E \in C^* ( \mathbb{Z} , X_1 , \widetilde{ h }_2 ) $, and, letting $ A_{ Z_1 }^{ ( 1 ) } $ correspond to $ C^* ( \mathbb{Z} , X_1 , h_1 ) $ as in Definition \ref{defnAZ}, we have $ A_{ Z_1 }^{ ( 1 ) } \subset C^* ( \mathbb{Z} , X_1 , \widetilde{ h }_2 ) $. Since $ E \cap Z_1 = \varnothing $, there is a unitary $ v \in A_{ Z_1 }^{ ( 1 ) } $ such that $ v \chi_E v^* = \chi_{ h_1 ( E ) } $. Since we also have $ v \in C^* ( \mathbb{Z} , X_1 , \widetilde{ h }_2 ) $, we have $ [ \chi_E ]_2 = [ \chi_{ h_1 ( E ) } ]_2 $, so $ \chi_E - \chi_{ h_1 ( E ) } \in \image ( \text{id} - ( \alpha_2 )_* ) $. Theorem \ref{thmK0AZIsomorphism} (and the proof) tells us that $ K_0 ( A_{ Z_1 } )^{ ( 1 ) } \cong K_0 ( \mathbb{Z} , X_1 , h_1 ) $ by the injection map. Thus, $ \image ( \text{id} - ( \alpha_1 )_* ) \subset \image ( \text{id} - ( \alpha_2 )_* ) $. By repeating the above process with $ \gamma $ instead of $ \beta $, we can similarly show that $ \image ( \text{id} - ( \alpha_2 )_* ) \subset \image ( \text{id} - ( \alpha_1 )_* ) $. This completes the proof. \end{proof} \begin{thm}\label{thmMainTheorem} Let $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ be fiberwise essentially minimal zero-dimensional systems with no periodic points. The following are equivalent: \begin{enumerate}[(a)] \item $ C^* ( \mathbb{Z} , X_1 , h_1 ) \cong C^* ( \mathbb{Z} , X_2 , h_2 ) $. \item $ ( K_0 ( C^* ( \mathbb{Z} , X_1 , h_1 ) ) , K_0 ( C^* ( \mathbb{Z} , X_1 , h_1 ) )^+ , 1 ) \cong ( K_0 ( C^* ( \mathbb{Z} , X_2 , h_2 ) ) , K_0 ( C^* ( \mathbb{Z} , X_2 , h_2 ) )^+ , 1 ) $ and \noindent $ K_1 ( C^* ( \mathbb{Z} , X_1 , h_1 ) ) \cong K_1 ( C^* ( \mathbb{Z} , X_2 , h_2 ) ) $. \item $ ( X_1 , h_1 , Z_1 ) $ and $ ( X_2 , h_2 , Z_2 ) $ are strong orbit equivalent. \end{enumerate} \end{thm} \begin{proof} (a) $ \Longleftrightarrow $ (b). By Theorem 2.2 and 2.3 of \cite{Herstedt21}, $ C^* ( \mathbb{Z} , X_1 , h_1 ) $ and $ C^* ( \mathbb{Z} , X_2 , h_2 ) $ are A$\mathbb{T}$-algebras of real rank zero, so this result follows from \cite{DadarlatGong97}. (b) $ \Longleftrightarrow $ (c). This is implied by Theorem \ref{thmMainTheoremPrelude}. \end{proof} \bibliographystyle{plain}
\section{Introduction}% \label{sec:introduction} In equation discovery we try to find a mathematical expression that describes either a dataset or a model in order to get fundamental theoretical insight into a problem that goes beyond being able to predict it. Here we focus on finding differential equations such as \begin{equation} \label{eq:pde} \bm u_t = F(\bm u, \bm u_x, \bm u_{xx}, \dots, \bm x, t). \end{equation} from data. One way of approaching this problem is from the angle of the recently popularized \emph{Neural Differential Equations} which involves fitting a model to represent the RHS of Eq.~\ref{eq:pde}: \begin{equation} \bm x_t = \text{NeuralDE}(\bm x, \bm\theta). \end{equation} \todo{explain further how to do eq discovery with NeuralDE or add citation.} The parameters of the NeuralDE can be found by solving it with a classic DE solver and some trial parameters $\bm\theta$ and computing the MSE between the solution and data without needing labeled $(\bm x,\bm x_t)$ pairs. However, this approach comes with all the problems that typically arise during RNN training such as bifurcations in the parameters $\bm\theta$ which complicates convergence. In this paper we apply a different approach which builds on a combination of \emph{Physics Informed Neural Networks} (PINN) and sparse identification of dynamical systems (SINDy) to discover governing equations. This combination has been suggested by XXX et al (DeepMoD).\todo{citation} DeepMoD comes with a couple of advantages compared to plain SINDy or NeuralDEs: \begin{enumerate} \item SINDy needs access to derivatives of measurements, which is avoided by DeepMoD. \item DeepMoD can work with much sparser data than SINDy (again because no derivates have to be computed for the measurements) \item DeepMoD does not need to solve the DEs which avoids all the RNN training problems of NeuralODEs. \end{enumerate} \paragraph{Physics Informed Neural Networks}% \label{par:physics_informed_neural_networks} (PINNs) can solve a given partial differential equation (PDE) optionally taking into account some measurement data. Assume we have a PDE of the form of Eq.~\ref{eq:pde}. PINNs then fit a neural network $\hat{\bm u}$ that approximates the solution to Eq.~\ref{eq:pde}: \begin{equation} \hat{\bm u}(\bm x, t, \bm \theta) \approx \bm u(\bm x, t), \end{equation} where $\bm\theta$ are the parameters of the network. To achieve this, PINNs are based on a loss function that is composed of three parts. \begin{equation} \mathcal L = \mathcal L_I + \mathcal L_B + \mathcal L_D \end{equation} The first part forces the solution $\hat{\bm u}$ to obey Eq.~\ref{eq:pde} on a pre-specified spatio-temporal grid \begin{equation} \label{eq:internal_loss} \mathcal L_I = \frac{1}{M}\sum_{i=1}^M || \hat{\bm u}_t - F(\hat{\bm u},\hat{\bm u}_x,\hat{\bm u}_{xx},\dots,\bm x, t) ||_2 \end{equation} The second term $\mathcal L_B$ represents the boundary conditions of the PDE and the third data term $\mathcal L_D$ is a classic MSE between of the solution $\hat{\bm u}$ with inputs $\{\bm x_i,t_i\}_{i=1}^N$ and labels $\{\bm y_i\}_{i=1}^N$ \begin{equation} \mathcal L_D = \frac{1}{N}\sum_{i=1}^N || \hat{\bm u}(\bm x_i, t_i,\bm\theta) - \bm y_i ||_2 \end{equation} Boundary and data loss can both be used but only one or the other is necessary for the PINN to find a valid solution. \paragraph{Sparse Identification of Non-linear Dynamics}% \label{par:sparse_identification_of_non_linear_dynamics} (SINDy\todo{cite}) enables PINNs to not just \emph{solve} a PDE, but to \emph{discover} it just from measurements. By replacing the RHS of the PDE with an instantiation of SINDy we can learn the RHS from data alone. The SINDy approach assumes that we are given state measurements $\bm u$ as well as their derivatives $\bm u_t$ and performs sparse regression on a library of basis functions. Given a (problem specific) library of basis functions. The library has to be chosen manually, but can be very large. It typically contains polynomials up to a degree $N$, time and/or spatial derivatives, and other functions that might seem beneficial for the problem at hand. By collecting all basis functions in a function $\bm\varphi(\bm u) : N\rightarrow M$ \begin{equation} \bm\varphi(\bm u) = [u^1,\, u^2,\, u^1_x,\, u^1 u^2_x \dots]^T, \end{equation} we can represent the RHS of Eq.~\ref{eq:pde} by a linear combination of $\bm\varphi$ if the basis functions contain all necessary terms \begin{equation} \bm u_t = \bm W \bm\varphi(\bm u), \end{equation} where we omit the implicit dependency of $\bm\varphi$ on $\bm u$ and $t$ which comes from $\bm u(\bm x, t)$. The result is obtained by performing sparse regression on the coefficient matrix $\bm W$. This approach alone requires access to the derivatives of the measurements which are often hard to obtain. There are methods to compute them in a pre-processing step, but methods (such as the Savitzky-Golay Filter) require a high sample density. In the next paragraph we describe how a combination of PINNs and SINDy (called DeepMoD) can be used to circumvent this issue. \section{Method}% \label{sec:method} \paragraph{DeepMoD}% \label{par:deepmod} ties together SINDy and PINNs by replacing the known RHS $F$ of the PDE by a linear combination of a library of basis functions. Essentially, it replaces the measurements $\bm u$ by the output of a universal function approximator $\hat{\bm u}$ such that the library becomes \begin{equation} \bm\varphi(\hat{\bm u}) = [\hat u^1,\, \hat u^2,\, \hat u^1_x,\, \hat u^1\hat u^2_x \dots]^T. \end{equation} Then we can rewrite Eq.~\ref{eq:internal_loss}: \begin{equation} \label{eq:deepmod_loss} \mathcal L_I = \frac{1}{N}\sum_{i=1}^N || \hat{\bm u}_t(\bm x_i, t_i, \bm\theta) - \bm W \bm\varphi(\hat{\bm u}) ||_2, \end{equation} where $\bm W$ is a matrix of coefficients choosing from the vector of basis functions. Applying $\ell_1$-regularization to the basis coefficients results in a sparse matrix which effectively discovers a minimal set of functions that are needed to fit the given dataset. Together with the standard PINN data loss the DeepMoD loss is \begin{equation} \mathcal L = \mathcal L_I + \mathcal L_D + \lambda || \bm W ||_1, \end{equation} where $\lambda$ is the $\ell_1$-regularization hyper-parameter. Above, the boundary condition is removed because boundary conditions are generally not known if a system is just measured and the underlying PDE is unknown. To further generalize the approach of DeepMoD we rewrite Eq.~\ref{eq:deepmod_loss} in terms of two functions $\text{LHS}$ and $\text{RHS}$ \begin{equation} \mathcal L_I = \frac{1}{N}\sum_{i=1}^N || \text{LHS}(\hat{\bm u}) - \text{RHS}(\hat{\bm u}, \bm W) ||_2, \end{equation} where $\text{LHS}$ represents our knowledge about the PDE and can contain any number of terms for which we already know the coefficients and the function $\text{RHS}$ represents the terms we want to discover. Both $\text{LHS}$ and $\text{RHS}$ of course implicitly depend on $\bm x$, $t$, and $\bm\theta$. Both $\text{RHS}$ and $\text{LHS}$ can contain derivatives with respect to the input $\bm x$ and/or $t$ which means that in the final optimization w.r.t. $\bm\theta$ and $\bm W$ needs to handle second order gradient computations. We employ forward differentiation and the package \emph{GalacticOptim.jl\todo{cite}} to achieve this. All gradients are computed exactly via automatic differentiation. The approach is flexible and incorporate prior knowledge about the system. For example, given data of a system that follows the generalized Burger's equation we can identify the form of the non-linear term only. \newpage \section{Experiments}% \label{sec:experiments} \subsection{Damped Harmonic Oscillator}% \label{sub:damped_harmonic_oscillator} The damped, harmonic oscillator is a linear, second order ODE \begin{equation} x_{tt} = -\omega^2 x - \delta x_t \end{equation} with position $x$, velocity $x_t$, acceleration $x_{tt}$, frequency $\omega$ and damping coefficient $\delta$. We obtain training data by numerically solving the true ODE and train on a grid of 25 points ($0:0.393:3\pi$). We use only position measurements (no velocities) to learn the generating ODE of the damped oscillator. Typically, this second order system would now be converted to a system of first order equations \begin{align} \frac{dx_1}{dt} &= x_2 \\ \frac{dx_2}{dt} &= -\omega^2 x_1 - \delta x_2 \end{align} In this case, the model would have to learn by itself that the derivative of first variable $x_1$ (i.e. the position) is simply the velocity. In order to reliably converge to this solution the model would need velocity data. We can avoid this additional data collection by directly learning the second order ODE. To achieve this we define the $\text{LHS}$ as \begin{equation} \text{LHS}(\hat x) = \hat x_{tt} \end{equation} and provide the following basis functions for the $\text{RHS}$ \begin{equation} \bm\varphi(\hat x) = [\hat x,\,\hat x^2,\,\hat x^3,\,\hat x_t]^T. \end{equation} We therefore want to solve the problem of finding a network $\hat x : \mathbb R\rightarrow\mathbb R$ and sparse coefficients $\bm w$ \begin{equation} \hat x_{tt} \approx \bm w \cdot \bm\varphi(\hat x), \end{equation} where $\bm w$ is just a vector in this case because we have only one state variable $x$. \begin{figure} \centering \resizebox{\textwidth}{!}{\input{damped-harmonic.tikz}} \caption{Damped harmonic oscillator discovery. $\bm w = [-2.20,\, 0.08,\, 10^{-5},\, -0.51]$. Target parameters $\omega^2=2.25$ and $\delta=0.5$.}% \label{fig:damped-harmonic} \end{figure} \subsection{Lotka-Volterra}% \label{sub:lotka_volterra} The Lotka-Volterra (LV) equations are a pair of non-linear, ordinary differential equations \begin{align} \label{eq:lotka-volterra} x_t &= \alpha x - \beta xy\\ y_t &= \delta xy - \gamma y \end{align} that describe a predator-prey system where $x$ is the number of prey and $y$ the number of predators. The parameters $\alpha$, $\beta$, $\gamma$, and $\delta$ define the interaction of the two species. We obtain training data by solving the true LV equations with \emph{DifferentialEquations.jl} and define a grid of 100 points (-8:0.16:8) from which we sample batches of 25 points in each training step. The $\text{LHS}$ is defined as $\hat{\bm u}_t = [x_t, y_t]^T$ and the $\text{RHS}$ contains the basis functions \begin{equation} \bm\varphi(\hat{\bm u}) = [x,y,x^2,y^2,xy,x^3,y^3]^T. \end{equation} We use a separate network for each one of the two state variables $x$ and $y$ to enforce the two variables to be independent of each other. This way the only way of the two variables interacting is via the terms in the $\text{RHS}$ and not within the network $\hat{\bm u}$ itself. This leads to more reliable convergence to the basis function coefficients we are seeking. \begin{figure} \centering \input{lotka-volterra.tikz} \caption{Data and solution of the LV equations as obtained by the PINN that is part of DeepMoD in the left column, coefficients of the used basis functions during training in the right column.}% \label{fig:lotka-volterra} \end{figure}\todo{x-axis does not show training steps but time...} \begin{table} \centering \caption{(Hyper-)parameters to obtain the results shown in Fig.~\ref{fig:lotka-volterra}.} \label{tab:lotka-volterra} \begin{tabular}{c} please fill out... \end{tabular} \end{table} \subsection{Duffing Oscialltor}% \label{sub:duffing_oscialltor} The Duffing Oscillator is a non-linear, second order, differential equation which includes both damping and a forcing term \begin{equation} x_{tt} + \delta x_t + \alpha x + \beta x^3 = \gamma \cos(\omega t), \end{equation} where $\delta$ controls the damping, $\alpha$ controls the linear stiffness, $\beta$ controls the non-linearity in the restoring force, $\gamma$ is the amplitude of the forcing and $\omega$ is its frequency. The Duffing equation exhibits multiple period cycles and even chaotic behaviour for different coefficients. We fix $\alpha=1$, $\beta=-1$, $\delta=0.3$, and $\omega=1.2$. The forcing coefficient $\gamma$ is varied to obtain different period cycles and chaotic solution as shown in Fig.~\ref{fig:duffing-period-3} and Fig.~\ref{fig:duffing-chaos}. For the discovery of this equation we assume that the frequency $\omega$ of the forcing is known so we aim to find the coeffcients $\alpha$, $\beta$, $\gamma$, and $\delta$ from the basis \begin{equation} \bm\varphi(\hat x) = [\hat x,\, \hat x^2,\, \hat x^3,\, \hat x^4,\, \hat x_t,\, \cos(\omega t)]^T. \end{equation} \todo{} \begin{figure} \centering \input{duffing-period-3.tikz} \caption{Duffing oscillator with forcing coefficient $\gamma=0.29$ resulting in a period-3 cycle. Discovered $\bm w = [1.001,\, 10^{-5},\, -1.010,\, 0.008,\, -0.299,\, 0.290]^T$. Target parameters $[1,\, 0,\, -1,\, 0,\, -0.3,\, 0.29]^T$.}% \label{fig:duffing-period-3} \end{figure} \begin{figure} \centering \input{duffing-chaos.tikz} \caption{Duffing oscillator with forcing coefficient $\gamma=0.5$ resulting in chaotic behaviour. Discovered $\bm w = [0.964,\, -0.019,\, -0.974,\, 0.007,\, -0.298,\, 0.484,\,]^T$. Target parameters $[1,\, 0,\, -1,\, 0,\, -0.3,\, 0.5]^T$.}% \label{fig:duffing-chaos} \end{figure} \newpage \subsection{Burgers' Equation}% \label{sub:burgers_equation} Burgers' Equation is a simplification of the Navier-Stokes equation. It can be investigated in one spatial and one temporal dimension and hence makes for a good example of a low dimensional PDE \begin{equation} \label{eq:burgers} u_t = -uu_x + \nu u_{xx} \end{equation} with the speed of the fluid $u$, spatial coordinate $x$, temporal coordinate $t$, and viscosity $\nu$. The solution to Eq.~\ref{eq:burgers} with sinusoidal initial conditions is shown in Fig.~\ref{fig:burgers-sin}. \begin{figure} \centering \includegraphics[width=0.4\linewidth]{burgers-sin.pdf} \caption{Solution to Burgers' equation with initial condition $u(x,0)=\sin(2\pi x)$ and $\nu=0.005$. Note the shock-wave that is forming around $x=0.5$.}% \label{fig:burgers-sin} \end{figure} \begin{figure} \centering \input{burgers.tikz} \caption{Discovery of the two relevant terms in Burgers' equation. Discovered coefficents $\bm w = [-0.990,\, 0.005,\, <10^{-5},\, <10^{-5},\, <10^{-5},\, <10^{-5},\, -0.003,\, <10^{-5}]^T$. Target coefficients $[1, 0.005, 0, 0,...]$}% \label{fig:burgers-discovery} \end{figure} The generalized Burgers equation extends the linear term in front of $u_x$ to an arbitrary function $c(u)$: \begin{equation} \label{eq:general-burgers} u_t - \nu u_{xx} = -c(u)u_x, \end{equation} which we will use to demonstrate how to encode addition prior knowledge into DeepMoD that goes beyond a single-term LHS. Eq.~\ref{eq:general-burgers} is already rearranged such that we only have to define the LHS of DeepMoD as \begin{equation} \text{LHS}(\hat u) = \hat u_t - \nu\hat u_{xx}. \end{equation} In this case we choose the basis functions as polynomials up to degree three elementwise multiplied by the spatial derivative \begin{equation} \bm\varphi(\hat u) = [1,\, \hat u,\, \hat u^2,\, \hat u^3]^T \odot \hat u_x \end{equation} to discover the function $c(u)$ from an expression $c(u) = (w_1 + w_2u + w_3u^2 + w_4u^3)u_x$. \begin{figure} \centering \input{burgers-general.tikz} \caption{Discovery $c(u)$ in Burgers' equation.}% \label{fig:burgers-general-discovery} \end{figure} \end{document} \section{Equation discovery with Physics Informed Neural Networks}% Assuming a PDE of the form \begin{equation} \frac{d\bm u}{dt} = F(\bm u, \partial_x u, \partial^2_x u, \,\dots\,, \bm x, t), \end{equation} with a vector of dependent variables $\bm u = \{u_m(x_n,t)\}_{mn}$, partial derivatives $\partial_x u=\frac{d\bm u}{dx}$, we want to discover the form $F$ of the RHS. \emph{Physics Informed Neural Networks} (PINNs) can be used to \emph{solve} (partial) differential equations \emph{given} the form $F$ of the PDE. They are trying to find a neural network $\hat u$ that approximates the solution to the PDE \begin{equation} \hat u(\bm x, t, \bm\theta) \approx \bm u(\bm x, t) \end{equation} by minimizing a loss function that is made of three different components: An \emph{internal} loss, a \emph{boundary} loss, and an optional \emph{data} loss. The internal loss $\mathcal L_F$ enforces solutions that follow the form of the PDE $F$ \begin{equation} \label{eq:pinn_f} \mathcal L_F(\bm\theta) = \sum_{ij} \norm{\frac{d\hat u(\bm x_j,t_i,\bm\theta)}{dt} - F(\hat u,\partial_x\uh, \,\dots\,,\bm x_j, t_i)}_2 \end{equation} which is evaluated on a spatio-temporal grid (indicated by the indices $j$ and $i$). The boundary loss $\mathcal L_B$ is a sum of a collection of boundary conditions (e.g. $\hat u(x,0,\bm\theta)-\sin(x)\approx 0$). The data loss $\mathcal L_D$ can be optionally added to the PINN loss: \begin{equation} \mathcal L_D(\bm\theta) = \sum_{ij} \norm{\hat u(\bm x_j,t_i,\bm\theta) - \bm u_{ij}}_2, \end{equation} which results in the final loss $\mathcal L$ \begin{equation} \mathcal L(\bm\theta) = \lambda_1\mathcal L_F(\bm\theta) + \lambda_2\mathcal L_B(\bm\theta) + \lambda_3\mathcal L_D(\bm\theta) \end{equation} In order to \emph{discover} an unknown $F$ from a set of measurements we can construct an $\hat F$ from a set of library functions $\varphi_i$ \begin{equation} \hat F(\hat u,\partial_x\uh, \,\dots\,, \bm x, t) = \bm W \bm\varphi(\hat u,\bm x, t) \end{equation} where $\bm W$ is a matrix of coefficients for the vector library of library functions $\bm\varphi$. Eq.~\ref{eq:pinn_f} therefore becomes \begin{equation} \mathcal L_F(\bm\theta) = \sum_{ij} \norm{\frac{d\hat u(\bm x_j,t_i,\bm\theta)}{dt} - \bm W\bm\varphi(\hat u,\bm x_j, t_i)}_2. \end{equation} In order to obtain only relevant terms from the library $\bm\varphi$ we have to introduce an additional regularization term to the loss \begin{equation} \mathcal L(\bm\theta) = \lambda_1\mathcal L_F(\bm\theta) + \lambda_2\mathcal L_B(\bm\theta) + \lambda_3\mathcal L_D(\bm\theta) + \lambda_4\norm{\bm W}_1 \end{equation} \subsection{Discovering the Lotka-Volterra System}% \label{sub:discovering_the_lotka_volterra_system} \begin{figure} \centering \includegraphics[width=0.6\linewidth]{figures/lotka-volterra.pdf} \caption{Lotka-Volterra discovery. Basis functions: $x, y, x^2, y^2, xy$}% \label{fig:lotka-volterra} \end{figure} \begin{figure} \centering \includegraphics[width=0.6\linewidth]{figures/lotka-volterra-badrun.pdf} \caption{Bad lotka volterra run with additional basis function: Basis functions: $1, x, y, x^2, y^2, xy$}% \label{fig:figures/lotka-volterra-badrun} \end{figure} \subsection{Discovering the a Damped Harmonic Oscillator}% \label{sub:discovering_the_lotka_volterra_system} \begin{figure} \centering \includegraphics[width=0.6\linewidth]{figures/damped-harmonic.pdf} \caption{Damped harmonic oscillator discovery}% \label{fig:damped-harmonic} \end{figure} \section{Solving Navier Stokes with PINNs}% \label{sec:navier_stokes} \begin{itemize} \item NSFnets~\cite{Jin2020} solve the Navier-Stokes equations either in the velocity-pressure formulation or the vorticity-velocity formulation with networks that learn the mapping $(t,x,y,z)\rightarrow(u,v,w,p)$ (or $(t,x,y,z)\rightarrow(u,v,w,\xi)$). They employ \emph{dynamic weights} to determine good coefficients for the different loss contributions. \item Conservative PINNs (cPINN) comes with additional \emph{interface conditions} and solve a viscous Burgers equation (a form of Navier-Stokes) \cite{Jagtap2020}. Interface conditions are additional loss terms that enforce e.g. flux continuity conditions. Additionally they divide the domain in subdomains which each get a separate network (e.g. more complex networks for harder subdomains). Networks are joined by interface conditions \item SINDy: Discovered \emph{mean-field model} of vortex shedding. This was done by reducing the dimension of flow simulation data to three coordinates which were then discovered by SINDy \cite{Rudy2017}. As far as I understand they were not learning from the full simulation data but from the reduced system. \end{itemize} \section{Literature Review} Our problem can be split into two classes of problems. The first one, which is often called \eemph{system identification} is concerned with estimating parameters of a model for which we know the functional form $F$. Consider, for example, trying to identify the frequency of a harmonic oscillator \begin{equation} \label{eq:osc} \ddot{x} = -\omega^2 x = F(x,\dot x,\omega,t) \end{equation} from measurements. The second class of problems which we will refer to as \eemph{equation discovery} assumes only partial/no knowledge of the functional form of the problem (making it much harder). When it comes to doing sparse regression the borders between the two approaches become blurry, because the choice of the model (or the basis functions) already restricts the space of $F$. As an example, we can prescribe $F$ to be a linear combination. Pruning as many parameters as possible could be viewed as discovering a linear equation but ultimately it then is just a fit of the restricted $F$ to the date (i.e. system identification).\\ In our case we also have to distinguish between finding an expression for $F$ (\eemph{discovering the ODE} Sec.~\ref{sub:neural_odes}) or finding the solution $x$ (\eemph{discovering the solution} Sec.~\ref{sub:physics_informed_neural_networks}).\\ Equation discovery can be split into two different approaches. The first one being \eemph{genetic programming}, which tries to fit symbolic expressions to given datasets as described e.g. by \cite{Schmidt2009} and implemented in the Eureqa package \citep{Praksova2011}. Sections~\ref{sec:discovering_symbolic_models} and \ref{sec:ai_feynman} are extensions to this approach. The second class of approaches focusses on \eemph{sparse regression}. For the purpose of equation discovery they all essentially want to solve $\ell_0$-regularization which is a combinatorial, not differentiable problem. Hence most approaches relax the problem and go with $\ell_1$-regularization instead. PINNs (Sec.~\ref{sub:physics_informed_neural_networks}) and Neural ODEs (Sec.~\ref{sub:neural_odes}) can be used here and SINDy (Sec.~\ref{sec:sindy}) and EQL (Sec.~\ref{sec:equation_learner}) are probably the most notable instantiations of this approach. \subsection{Differential Equations}% \label{sec:differential_equations} \emph{Not directly related to equation discovery}. Quick recap on two fundamental scientific machine learning methods. A good place to start reading about them is \href{https://mitmath.github.io/18337/lecture3/sciml.html}{Rackauckas' lecture} on scientific computing. \subsubsection{Physics Informed Neural Networks (PINNs)}% \label{sub:physics_informed_neural_networks} Given a system of ordinary differential equations \begin{equation} \dot{\bm x} = F(\bm x, t) \end{equation} with $t\in[0,1]$ and known initial condition $\bm x(0)=\bm x_0$ we can solve the ODE by fitting a neural network (NN): \begin{equation} \text{NN}(\bm\theta,t) \approx \bm x(t) \end{equation} by training with a loss that just enforces the ODE and its boundary conditions \begin{equation} \text{MSE}_F = \sum_i \left(\frac{\text{NN}(\bm\theta,t_i)}{dt} - F(\text{NN}(\bm\theta,t_i),t_i) \right)^2 + (NN(0) - \bm x_0)^2. \end{equation} PINNs~\citep{Raissi2019} can incorporate measurements with an additional term in the loss function \begin{align} \text{MSE}_x &= \sum_i||\text{NN}(\bm\theta, t_i) - \bm x_i||_2\\ \mathcal L(\bm\theta) &= \text{MSE}_x + \text{MSE}_h \end{align} The information encoded in the loss also does not have to be the full ODE but can be just an additional constraint that the solution should take into account. In the simplest case: $h(t)=\dot{\bm x}-F(\bm x,t)$. Hence, a PINN no longer finds just \emph{any} solution that fits the data, but one that agrees with data \emph{and} the given physical constraint. In order to use PINNs for system identification the network can be limited in its size and/or regularizations can be added to $\mathcal L$. By replacing the NN in the above equation with a Chebyshev basis one essentially ends up at the approach of solving DEs on DQCs by~\cite{Kyriienko2020}. \subsubsection{Neural ODEs}% \label{sub:neural_odes} Neural ODEs (as opposed to PINNs) do not fit a solution of the ODE but the RHS of the ODE itself: \begin{equation} \dot{\bm x} = f(\bm x, \bm\theta, t) \end{equation} This is achieved by solving the ODE with the current parameters $\bm\theta$ and computing the distance to the data \begin{equation} \mathcal L(\bm\theta) = ||\text{solve}(\text{NN}, \bm\theta, \bm t) - \bm X||_2, \end{equation} \todo{fix notation neural ode loss} where $\bm t$ are the times at which $\bm X$ is sampled and $\text{solve}$ refers to some method that can solve a given differential equation (this is also called a shooting method). This training setup forces the NN to have very little drift in early time-steps as opposed to training simply with examples of $\bm X$ and $\dot{\bm X}$ but is much trickier to train due to the classic RNN training problems (i.e. vanishing/exploding gradients and bifurcations). \eemph{Universal differentitial equations} (UDE)~\citep{Rackauckas2020} extend Neural ODEs by hard-coding certain parts of the ODE model which are known. \begin{equation} \dot{\bm x} = f(\bm x, t, \text{NN}(\bm\theta,t)) \end{equation} The known parts of $f$ do not have to be learned and the model can focus on the parts that are missing. \subsection{Sparse Identification of Nonlinear Dynamics (SINDy)}% \label{sec:sindy} SINDy \citep{Brunton2016, Rudy2017, Champion2019} tries to find the RHS of \begin{equation} \dot{\bm x} = F(\bm x, t) \end{equation} that fits snapshots of data $\bm X = [\bm x_1 \, \bm x_2 \, \dots \, \bm x_m]^T$ and $\dot{\bm X} = [\dot{\bm x}_1 \, \dot{\bm x}_2 \, \dots \, \dots{\bm x}_m]^T$ by providing a library of basis functions $\bm\Theta(\bm X) = [\bm\theta_1(\bm X)\, \dots \, \bm\Theta(\bm X)]^T$ on which sparse regression is applied: \begin{equation} \mathcal L(\bm\theta) = ||\dot{\bm X} - \bm\Theta(\bm X)\bm\Xi||_2 + \lambda||\bm\Xi||_1, \end{equation} where $\bm\Xi$ can pick out any combination of inputs $\bm x_i$ and basis functions $\bm\theta_i$. By using an auto-encoder to first compress the given dataset SINDy can by used for high-dimensional datasets as well. SINDy needs access to both measurements $\bm X$ as well as their derivatives $\dot{\bm X}$. The derivatives can be computed from $\bm X$ e.g. via the Savitzky-Golay filter (which needs quite dense measurements, \cite{Schafer}). Instead of using a filter to estimate the derivative, SINDy can be used in conjunction with UDEs to estimate $\dot{\bm X}$ and discover unknown parts of the given dataset (briefly described in~\cite{Rackauckas2020}). \subsection{Koopman Operator Theory}% \label{sub:koopman_operator_theory} \emph{Not directly related to equation discovery}. Koopman Operator Theory (extensively described in the notes of~\cite{Brunton2019Notes}) provides a way of linearising highly non-linear dynamical systems of the form \begin{equation} \bm x_{t+1} = \bm F(\bm x_t) \end{equation} by finding an \eemph{infinite-dimensional} but \eemph{linear} operator $\mathcal K$. Consider a measurement function $g : \bm M \rightarrow \mathbb R$ which represents an observation of the state $\bm x_t$. The Koopman operator $\mathcal K$ defines a linear, infinite-dimensional dynamical system which advances an observation to the next time step: \begin{equation} g(\bm x_{t+1}) = \mathcal K g(\bm x_t) \end{equation} Being infinite-dimensional, the Koopman operator is somewhat problematic to use in practice, which is why it is typically approximated by a finite set of its eigenfunctions $\varphi$ (with corresponding eigenvalue $\lambda$): \begin{equation} \varphi(\bm x_{t+1}) = \mathcal K \varphi(\bm x_t) = \lambda \varphi(\bm x_t) \end{equation} With these eigenfunctions we can approximate any measurement function \begin{equation} g(\bm x_t) = \sum_j^\infty v_j\varphi_j(\bm x_t) \end{equation} \todo{$v_j$ are Koopman modes. what does that mean?} To find the Koopman eigenfunctions we can take the time derivative of the continuous time formulation of the Koopman operator: \begin{equation} \frac{d}{dt}\varphi(\bm x) = \mathcal K\varphi(\bm x) = \lambda \varphi(\bm x) \end{equation} which results in a partial differential equation for the eigenfunction \begin{equation} \nabla \varphi(\bm x) \cdot \bm f(\bm x) = \lambda \varphi(\bm x). \end{equation} Solving this differential equation for a number of important eigenfunctions amounts to finding an approximation of the Koopman operator. Another way of finding eigenfunctions $\bm\varphi(\bm x)$ is by leveraging auto-encoders. The each variable in latent space of the auto-encoder can be trained to represent an eigenfunction by additional terms in the loss function that enforce the linearity and the prediction constraint: \begin{equation} \mathcal L = ||\bm x - \bm\varphi^{-1}(\bm\varphi(\bm x))|| + \alpha||\bm\varphi(\bm x_{t+1}) - \bm K\bm\varphi(\bm x_t)|| + \beta||\bm x_{t+1} - \bm\varphi^{-1}(\bm K\bm\varphi(\bm x_t))||. \end{equation} The correct loss function used in~\cite{Lusch2017} contains some additional terms like a $\ell_2$-regularization. \subsection{Equation Learner}% \label{sec:equation_learner} The Equation Learner (EQL, \cite{Sahoo2018}) could be regarded as a layered SINDy approach. The model consists of linear transformations $\bm y=\bm W\bm x+\bm b$ followed by a layer of \emph{inhomogeneous} functions. These functions include unary functions ($\sin$, $\cos$, etc.) and binary functions like multiplication and division. The divergence problems with division are approached by only including division in the last layer and by using curriculum learning to slowly progress from a strongly regularized division function \begin{equation} h^\theta(a,b) = \begin{cases} \frac{a}{b} \qquad \text{if}\quad b>\theta \\ 0 \qquad \text{otherwise} \end{cases} \end{equation} to the unregularized one. Further, the assumption is that nature does not diverge, so one branch of division ($b>0$) should suffice as a basis function which is enforced by a penalty term $P^\theta$. The network is trained in three phases: 1) train without regularization 2) train with $\ell_1$-regularization 3) prune weights below a threshold $w<0.001$ and train without regularization (which they call fixed $\ell_0$). \subsection{Sparse Symplectically Integrated Neural Networks (SSINNs)}% \label{sec:sparse_symplectically_integrated_neural_networks_ssinns} Inspired by \emph{Hamiltonian Neural Networks} (HNNs; \cite{Greydanus2019}) SSINNs~\citep{Dipietro2020} use two networks $V_{\theta_1}$ (potential energy) and $T_{\theta_2}$ (kinetic energy) and symplectically integrate them to obtain surrogates for separable Hamiltonians. They use $\ell_1$-regularization to get sparse models. The two networks are restricted to a single linear layer in the paper, but they show how the approach could be extended to more complicated models. \subsection{Discovering Symbolic Models}% \label{sec:discovering_symbolic_models} Genetic programming has been used to find symbolic expressions for physical laws from experimental data~\citep{Schmidt2009, Zaremba2014}. The approach unfortunately does not scale well, which is why \citep{Cranmer2020} introduced a hybrid approach of genetic programming and deep learning. They fit a \eemph{graph neural network} GNN to a dataset (e.g. a system of particles) and then try to find symbolic expressions for smaller subparts of the network. \subsection{AI Feynman}% \label{sec:ai_feynman} This approach \citep{Udrescu2020} is a combination of genetic programming and sparse regression (which the authors call symbolic regression) which also build on recursively breaking down the problem into simpler and simpler subtasks before fitting symbolic expressions to them. \subsection{Disentangling Autoencoders}% \label{sec:disentangling_autoencoders} This is not directly equation discovery related, but \cite{Iten2020} use disentangling autoencoders to learn compressed representations of time-series. They prescribe the size of the latent vector that they are using to encode their data and then analyze the latent space. For their examples they show that the latent space represents i.e. conserved quantities (momentum in particle collisions), or other relevant quantities like frequency and damping factor of a pendulum. It seems like they are not doing much more than prescribing the latent size and enforcing the latent variables to independent though. \subsection{$\ell_0$-regularization}% \label{sec:l0_regularization} Most (if not all) the sparse regression problems only use $\ell_1$-regularization because it can be used as a differentiable surrogate for $\ell_0$. Hence, solving $\ell_0$-regularization on a QC would be of interest to many fields far beyond equation discovery. Given a linear regression problem with parameters $\bm\theta$ and assuming we are interested in pushing as many parameters in that model to zero (i.e. we want sparsity). The state of the art for doing this is $\ell_1$-regularization: \begin{equation} \mathcal L(\bm\theta) = ||\bm X\bm\theta - \bm y||_2 + \lambda||\bm\theta||_1 \end{equation} This is computationally efficient and works well in many cases, but $\ell_1$ tends to \emph{over-shrink} the parameters (i.e. bias them too much towards zero). For equation discovery (and many other problems) we really want to avoid this shrinkage. The $\ell_0$-regularization is the much more natural objective, because it encourages parameters to be either exactly zero or some other value: \begin{equation} \mathcal L(\bm\theta) = ||\bm X\bm\theta - \bm y||_2 + \lambda||\bm\theta||_0 = ||\bm X(\bm\theta\odot\bm z) - \bm y||_2 + \lambda\sum_i z_i, \end{equation} where $\bm z \in \{0,1\}^n$. Unfortunately this objective is not differentiable. It essentially poses a combinatorial problem combined with linear regression \citep{Chen2020} for which some relaxations exist like \citep{Louizos2017}. A comparison of different approaches to $\ell_0$-regularization including their computational aspects is given in \cite{Hazimeh2020} (easier to read \href{https://www.mit.edu/~rahulmaz/L0Reg.pdf}{version}). Formally the objective is \begin{equation} \arg\max_{\bm\theta\in\mathbb R^n} ||\bm X\bm\theta - \bm y||_2 \quad \text{s.t.} \quad ||\bm\theta||_0 \leq k \end{equation} where $k$ controls the model size. The most established way of doing this seems to be via the \texttt{leaps} function of \texttt{R} (feasible for less than 30 parameters in $\bm\theta$). Currently \eemph{mixed-integer optimization} (MIO) by \citep{Bertsimas2016} seems to be fastest at solving this problem (for up to 1000 parameters). Intro to $\ell_0$-regularization with \href{https://colab.research.google.com/github/Gurobi/modeling-examples/blob/master/linear_regression/l0_regression_gcl.ipynb}{Gurobi} which links to \href{https://arxiv.org/abs/1507.03133}{this paper by Bertsimas}. The \eemph{Quantum Approximate Optimization Algorithm} (\href{https://qiskit.org/textbook/ch-applications/qaoa.html}{QAOA}) can solve the problem \begin{equation} \arg\max_{x\in\{0,1\}^n} \mathcal L(x) \end{equation} Can we split our problem into a binary part (solved on DQC) and the regression part (solved on CC) as suggested here: \href{https://arxiv.org/pdf/2010.07852.pdf}{MIO on QC}? \href{https://arxiv.org/pdf/1508.04212.pdf}{Constrained Quantum Annealing} might be relevant as well. It could be possible to get at this problem with a more \emph{quantum} approach than what is currently done on classical computers - with ancilliary bits that exploit superpositions of $\ell_0$-regularized terms\todo{Niklas: sorry for the fuzzy formulation. I still have to understand how this would be done exactly}. \subsection{Maybe}% \label{sec:maybe} \begin{itemize} \item \href{https://github.com/AllanSCosta/occam-net}{OccamNet} \item Dynamic Mode Decomposition \& Koopman Operator \item \href{https://arxiv.org/pdf/1812.04426.pdf}{PDE-Net} / \href{https://arxiv.org/pdf/2006.02377.pdf}{RODE-Net} \item \href{https://export.arxiv.org/pdf/1907.00821}{Process Based Modelling} \end{itemize} \printbibliography \end{document} \section{Introduction}% \label{sec:introduction} Recent advances in automatic differentiation in classical computers have led to novel machine learning based approaches to scientific computing, often referred to as scientific machine learning. For example, incorporating neural networks into classical ordinary differential equation solvers \cite{Chen2018a}, or manipulating neural network derivatives towards prescribed differential equations \cite{Raissi2019}. The applications of such techniques have included inference of unobserved states \cite{Mao2020}, inference of differential equation parameters \cite{Tartakovsky2018} and approaches to solve differential equations \cite{Raissi2019}, or discover differential equations from observated data \cite{Brunton2016a}. Such methods depend on machine learning techniques and are often end-to-end differentiable. Recent progress in automatic differentiation on quantum computers \cite{Mitarai2018, vidal2018calculus, Crooks2019a, killoran2019, Mari2021, Banchi2021measuringanalytic, Cerezo2021, hubregtsen2021singlecomponent, hubregtsen2021singlecomponent, kyriienko2021} introduce the prospect of extending recent classical results in scientific machine learning to a quantum setting. These techniques have already led to quantum methods of solving differential equations \cite{Kyriienko2020} which are analogous to methods involving classical neural networks \cite{Raissi2019}. However, the existence of quantum automatic differentiation opens the door to further cross pollination between classical scientific machine learning and quantum computing. In this work, we target an important task in scientific machine learning and modelling in general; while many systems can be modelled using differential equations, and their solving constitutes an important task in phenomenological understanding, in many practical settings these equations are not (fully) known. In such cases, one may have access to observations on some target system, and some initial idea of the dynamics. Parameter inference in differential equations is an essential part of combining theoretical models with empirical observations. Oftentimes a given mechanism might be speculated for an observed process in the form of a differential equation, but whose coefficients must be inferred from empirical observations. Model discovery (often referred to as equation discovery) tries to find a mathematical expression that describes a given dataset. We specifically tackle the problem of discovering a differential equation only from observations of a given system. By \emph{discovery} we mean an interpretable (i.e. human readable) model in symbolic form, which can be converted directly into a differential equation. This task is generally not suited for treatment by finite-differencing techniques, since such applications require many repeated simulations. Instead, to treat such a case of mixture of equation solving and model discovery efficiently, we generalize two techniques from the realm of classical scientific machine learning to a quantum setting: differential equation parameter inference and differential equation model discovery. We also highlight conceptual similarities between scientific machine learning and quantum computing that might point to further research avenues. \begin{figure}[ht] \centering \resizebox{\textwidth}{!}{\input{qmd.tex}} \caption{Schematic of the quantum model discovery approach (QMoD\xspace). The solution to the differential equation is represented by a (quantum) universal function approximator (UFA) with variational angles $\bm\theta$. Both the forward pass and the gradients w.r.t. parameters $\bm\theta$ \emph{as well as} gradients w.r.t. inputs (in this example $x$ and $t$) are computed on the DQC. QMoD\xspace learns a sparse $\bm w$ which chooses only a few functions from the library of basis functions $\bm\varphi$. Gradients w.r.t. the basis function coefficients $\bm w$ are computed classically. The figure depicts how QMoD\xspace learns the solution $\hat u$ and a sparse $\bm w$ that only contains the two basis functions that are necessary to represent the input data from Burgers' equation. }% \label{fig:qmd_schematic} \end{figure} We first recap how quantum computers can be used to represent solutions to differential equations via variational procedures. Then we introduce the broad field of scientific machine learning and propose how quantum computers can be used for these nascent developments. \paragraph{Universal Function Approximation on Quantum Devices.}% \label{par:universal_function_approximation_on_quantum_devices} For the past several decades, the number of transistors on a similarly-sized integrated chip doubles roughly every two years of so; this is known as Moore's law \cite{Moore1965} and is an observation rather than a guarantee. In the past 10 years or so, a shift has started where more computational power can only be reached by parallelization rather than minimization or increasing clock speeds \cite{theis2017}; this is due to the fundamental limitations of electronics. While alternative classical hardware proposals are interesting, such as photonic \cite{krishnamoorthy2009} or biological \cite{Bonnet2013} computers, these will quickly hit a wall of unsustainable exponential speed increase too. \\ A completely different compute paradigm, quantum computing, has existed for over 4 decades but has only recently emerged as a truly promising next stage of computational hardware developments. Large corporate players including IBM \cite{Kandala2017b} and Google \cite{Arute2019a}, as well as a range of startups including IonQ, Pasqal, Xanadu and Rigetti, are investing large amounts of funding for such hardware, and with that the development of quantum computational algorithms has gotten a resurgence from the initial fundamental algorithms like Shor's \cite{Shor1995} or Grover's \cite{Grover1996} algorithms. Some of the promising areas where universal fault-tolerant quantum computing hardware could show a possible quantum advantage include quantum chemistry simulations \cite{Cao2018e, elfving2020quantum} and quantum-enhanced machine learning \cite{Biamonte}.\\ Recent algorithm developments have also focused on compatibility with current noisy intermediate scale quantum (NISQ) devices \cite{Preskill2018c}. Such algorithms are typically variational in nature, and are being applied to fields such as quantum chemistry \cite{Kandala2017b, Elfving2020b} and heuristic optimization \cite{Farhi2014, Borle2020}. \\ Furthermore, such variational quantum algorithms also offer a promising platform for the field of Machine Learning, which largely depends on training models to fit datasets and making predictions. Quantum Machine Learning (QML) algorithms have been developed for solving classification \cite{Havlicek2019SupervisedSpaces} and regression \cite{Mitarai2018} tasks; the techniques include quantum versions of kernel methods \cite{Schuld2018a, SchuldSQMLareKernel}, support vector machines \cite{Rebentrost2013, Liu2020f}, generative adversarial networks \cite{DallaireDemers2018, Lloyd2018}, Born machines \cite{coyle2020born}, Boltzmann machines \cite{Amin2016}, quantum neural networks \cite{Mitarai2018, Benedetti2019, Abbas2021} and more \cite{Biamonte}.\\ One regression task, fitting a continuous function $f(x)$ to a dataset of scalar-valued points $(x_i, y_i)$ in k-dimensional space, was analyzed for example in \cite{Mitarai2018}. A quantum neural network, consisting of a quantum feature map circuit, a variational quantum circuit and a Hamiltonian operator was used to represent a parameterizable function $f(x)$ that could be evaluated after training using gradient descent on analytically computed gradients of the loss function with respect to the variational circuit parameters.\\ In Ref. \cite{Kyriienko2020}, Differentiable Quantum Circuits (DQCs) paradigm was introduced. A DQC implements a quantum neural network that can be analytically differentiated with respect to variational parameters \emph{and} with respect to the network inputs. With automatic differentiation w.r.t. inputs it became possible to solve differential equations in a variational approach. In the current contribution, we will briefly summarize how this is done and we draw more parallels to classical scientific machine learning.\\ \paragraph{Physics-Informed Machine Learning}% \label{par:physics_informed_machine_learning} Physics informed neural networks (PINNs) comprise a a recent technique in scientific machine learning of particular relevance to this current work, since they bear strong conceptual similarities to DQCs. We see both DQCs and PINNs as universal function approximators (UFAs) which can be differentiated with respect to their inputs. Furthermore, both can be optimized so that such derivatives can be manipulated. Consequently, we expect that future applications of PINNs may well translate naturally to a DQC setting. Indeed, part of this current work is to demonstrate how such cross-fertilization between the fields might take place. Introduced in \cite{Lagaris1997}, the essence of PINNs is to use (higher-order) derivatives of neural network outputs with respect to neural network inputs as terms with which to train neural networks. Consequently, neural networks can be trained to satisfy a given differential equation. Recently published work \cite{Raissi2019} has cause a surge in popularity of PINNs. For example, applications of PINNs have been found in diverse fields such as aerodynamic flow modelling \cite{Mao2020} and cardiac activation mapping \cite{Costabal2020}. Apart from solving forward problems, they have also found use in solving inverse problems \cite{Mao2020} and optimal control \cite{Wang2021}. See \cite{KarniadakisNature2021} for a more complete recent review of PINNs and their applications. Due to the conceptual similarity betweens PINNs and DQCs, we anticipate ample scope for cross-pollination of ideas and techniques between these lines of research. Of particular relevance to this current work is the application of PINNs to equation discovery \cite{Both2021}, which we cover in more detail in subsequent sections. \paragraph{Classical Equation Discovery}% \label{par:classical_equation_discovery} A popular technique in equation discovery is to overparameterize a candidate differential equation solution in terms of a library of potential terms, and then fit to data while encouraging sparsity in differential equation coefficients \cite{Brunton2016a} through an appropriate regularization term. The resulting non-zero coefficients provide an interpretable differential equation representation of a process which fits the data. While popularized in the context of ordinary differential equations (ODEs) \cite{Brunton2016a}, such techniques have been extended to the context of partial differential equations (PDEs) \cite{Rudy2017}. Such sparsity-driven equation discovery schemes have recently been introduced to PINNs \cite{Both2021}. We are not aware of any approaches to equation discovery which levereage quantum computation. Given the conceptual similarity between PINNs and DQCs, it is natural to extend such equation discovery techniques to a quantum setting, which is the purpose of this work. Before we introduce our approach to \emph{quantum model discovery} (QMoD\xspace \cite{patent}) in Sec.~\ref{sub:discovering_diffeq} we briefly introduce the DQC strategy that uses \textit{quantum} neural networks as universal function approximators in Sec.~\ref{sub:quantum}. \paragraph{Our Contributions.}% \label{par:our_contributions} Our main contribution is to extend DQCs to wider applications in scientific machine learning, namely: \begin{itemize} \item parameter inference in differential equations \item discovery of unknown differential equations from empirical measurements \end{itemize} We demonstrate our approaches on two exemplary ordinary differential equations (ODE) and on one partial differential equation (PDE). \section{Methods}% \label{sec:method} Differential equations lie at the heart of many engineering disciplines. However, using traditional, mesh-based methods such as finite-differencing or finite-elements do not lend themselves well to several important applications, such as optimal control or solving inverse problems, since such applications require many repeated simulations. Therefore, it is desirable to find cost-effective alternatives such as data-driven differentiable surrogate models which can be optimized via gradient-based means. On classical hardware one way of obtaining differentiable surrogates that respect physical prior information is via \emph{physics-informed neural networks} (PINNs). They can be used to solve PDEs given an equation, boundary conditions, and (optionally) some measurements. Our work builds on top of the quantum PINN analogue \citep{Kyriienko2020} which we briefly describe in Sec.~\ref{sub:solving_diffeq}. We then demonstrate how further scientific machine learning techniques can be extended to a quantum setting. In Sec.~\ref{sub:inferring_diffeq}, we introduce quantum methods for parameter inference in differential equations. Sec.~\ref{sub:discovering_diffeq} describes how to \emph{discover} equations from measurements on quantum computers. By discovering we mean finding a unknown differential equation only from a given dataset and a predetermined (large) library of possible terms. \subsection{Differentiable Quantum Universal Function Approximators}\label{sub:quantum} In DQC, quantum neural networks act as differentiable universal function approximators. These are quantum circuits consisting of three components: a quantum feature map, a variational ansatz, and a Hamiltonian operator for readout/encoding of the function. These elements act on an array of qubits and alter the system wavefunction in a specific way. The feature map encodes the input variable $x$ using a predefined non-linearity $\varphi$ to the amplitudes of a quantum state $\hat{\mathcal U}_\varphi(x)\ket{0}^n$, where $\ket{0^n}$ is some initially prepared state. In the simplest case this can be implemented with a single layer of rotations \begin{equation} \hat{\mathcal U}_\varphi(x) = \bigotimes_{j=1}^n \hat R_{\alpha,j}(\varphi_j(x)). \end{equation} Furthermore, as an example, choosing the non-linearity as \begin{equation} \varphi_j(x) = j \cdot \text{arccos}(x) \end{equation} results in a Chebyshev basis in the amplitudes of $\hat{\mathcal U}_\varphi(x)\ket{0^n}$. The state now represents a basis of $n$ Chebyshev polynomials which can be read out by measuring for example in the Z basis on each qubit. With a subsequent variational circuit (with parameters $\bm\theta$) the Chebyshev basis functions are combined; in the limit of large and controlled entanglement, such a setup allows access to up to $\mathcal{O}(2^n)$ Chebyshev polynomials, due to the chaining and nesting properties of products of these polynomials. Similar effects occur for Fourier-type feature maps and other universal basis function sets. A popular choice for $\hat{\mathcal U}_\theta$ is the so-called hardware efficient ansatz (HEA) with parameterized rotations and CNOT gates between neighboring qubits on the device. The output $\hat u(x,\bm\theta)$ of the circuit is then computed with a Hamiltonian operator of choice, $\hat{\mathcal C}$, such that the final universal approximator for a scalar input variable $x$ and variational parameters $\bm\theta$ then reads \begin{equation} \label{eq:ufa} \hat u(x,\bm\theta) = \bra{0^n}\hat{\mathcal U}_\varphi^\dagger(x)\hat{\mathcal U}_\theta^\dagger\hat{\mathcal C}\hat{\mathcal U}_\theta\hat{\mathcal U}_\varphi(x)\ket{0^n} \end{equation} Under some conditions, equation~\ref{eq:ufa} is fully analytically differentiable via the parameter shift rule~\citep{Mitarai2018} which requires two evaluations of the same circuit with shifted angles for each circuit-level parameter. As a particular example, where the feature map consists of single-qubit rotations, we can write the derivative w.r.t. $x$ as follows \newcommand{\hat{\mathcal U}_{\varphi,j,j'}^\pm(x)}{\hat{\mathcal U}_{\varphi,j,j'}^\pm(x)} \newcommand{\hat{\mathcal U}_{\varphi,j,j'}^{\pm,\dagger}(x)}{\hat{\mathcal U}_{\varphi,j,j'}^{\pm,\dagger}(x)} \begin{align} \label{eq:paramshift} \frac{d}{dx}\hat u(x,\bm\theta) &= \frac{1}{2}\frac{d\varphi}{dx} (\braket\hat{\mathcal C}^+ - \braket\hat{\mathcal C}^-),\\ \braket\hat{\mathcal C}^\pm &= \sum_{j'} \bra{0^n} \hat{\mathcal U}_{\varphi,j,j'}^{\pm,\dagger}(x) \hat{\mathcal U}_\theta^\dagger \hat{\mathcal C} \hat{\mathcal U}_\theta \hat{\mathcal U}_{\varphi,j,j'}^\pm(x) \ket{0^n},\\ \hat{\mathcal U}_{\varphi,j,j'}^\pm(x) &=\bigotimes_{j=1}^n R_{y,j}(\varphi(x)\pm\frac{\pi}{2}\delta_{j,j'}). \end{align} Please note that we so-far considered a single-dimensional independent variable $x$. However, the DQC technique can straightforwardly be extended to multiple variables $x, y, t$ etc by using multiple feature maps, one for each variable, and differentiating only those feature maps relevant to the variable differentiation of interest. An example application where this is shown in Ref. \cite{paine2021}. Furthermore, the example shows the regular parameter shift rule, which only applies to involutory quantum generators in the feature map. Generalized parameter shift rules exist for arbitrary generators, and hence for arbitrary feature map circuits \cite{kyriienko2021}. In some cases, more intricate feature maps can be highly beneficial for increased expressivity of the quantum universal approximator. \subsection{Solving Differential Equations}% \label{sub:solving_diffeq} We begin by recapping how to use automatically differentiable universal function approximators (either quantum or classical) to solve partial differential equations. This section unifies existing treatment of using neural networks to solve differential equations \cite{Raissi2019} and analogous quantum methods \cite{Kyriienko2020}. We write a partial differential equation in the form \begin{equation} \label{eq:de} F(u, \partial_t u, \partial_x u, \partial^2_x u,\,\dots\,, x, t) = 0, \end{equation} where $x$ and $t$ are dependent variables and $u(x,t)$ is the solution we seek. For simplicity we will further refer to the LHS of equation~\ref{eq:de} as $F(u,x,t)$ omitting terms like $\partial_x u$ or $\partial_t u$ which in principle are operators acting on $u$. Let's imagine we had access to a trial function $u(x,t)$ and we would like to ask how well it solves the differential equation system. To find the quality of an approximate solution $\hat u(x,t,\bm\theta)$ parameterized by $\bm\theta$ we can formulate a loss function \begin{equation} \label{eq:diffeqloss} \mathcal L(\bm\theta) = \mathcal L_F + \mathcal L_\Omega, \end{equation} where $\mathcal L_F$ is derived from the differential equation \ref{eq:de} \begin{equation} \mathcal L_F = \frac{1}{M} \sum_{i=1}^M \norm{F(\hat u,x_i,t_i)}_2. \end{equation} and is thus minimized $F(u,x,t) = 0$, i.e. when $\hat u(x,t,\bm\theta)$ satisfies the partial differential equation dynamics. The second loss term $\mathcal L_\Omega$ includes all boundary conditions which have to be met in order to fully specify the DE.\\ In order to effectively train such a model we ideally would like a universal approximator $\hat u$ and access to its higher order derivatives both with respect to inputs $x$ and $t$, as well as parameters $\bm\theta$. Recent advances in automatic differentiation~\citep{Gune2018} have facilitated this using neural networks on classical hardware. On quantum hardware we leverage \emph{differentiable quantum circuits} (DQC)~\citep{Kyriienko2020} which implement a universal approximator based on a quantum featuremap $\hat{\mathcal U}_\varphi(x)$ and a variational circuit $\hat{\mathcal U}_\theta$. \subsection{Inferring Differential Equation Parameters} \label{sub:inferring_diffeq} As a first demonstration of how scientific machine learning can translate to novel quantum algorithms, we consider parameter inference in differential equations. In many situations, an overall structure of a differential equation is known, but specific coefficients must be inferred from data. For example, one might parameterize a given differential equation of some scalar variable $u$ with some parameters $\bm w$ to be identified: \begin{equation} \label{eq:inferdewithweights} F_{\bm w}(u,x,t) = 0, \end{equation} where $F=\bm{w}_{1} \partial^2_x u(x,t) + \bm{w}_2 x$ is one example, and the coefficients $\bm w$ must be inferred from some given data set. We denote a given set of $N$ data points with $\{(x_i, t_i, y_i): i=1,2\dots N \}$, where $x_i$ and $t_i$ denote independent variables and $y_i$ is a scalar dependent variable. We assume that $F$ is constructed so that there is no $\bm w$ such that $F=0$ for every choice of $u$ to avoid trivial solutions. For example, to infer a one-dimensional diffusion coefficient one might define $F$ as follows: \begin{equation} F_{\bm w} = \bm w \partial^2_x u - \partial_t u, \end{equation} where we have been mindful not to introduce a trainable coefficient to $\partial_t u$, which would allow \eqref{eq:inferdewithweights} to be satisfied trivially with coefficients as zero. To infer parameters in such settings, we introduce a loss function \begin{equation} \label{eq:inferdeloss} \mathcal L(\bm\theta, \bm w) = \mathcal L_F + \mathcal L_d. \end{equation} Note that unlike \eqref{eq:diffeqloss}, we do not include a term analagous to $\mathcal L_\Omega$ to represent boundary conditions. Although such terms could be introduced if boundary conditions are known, in principle the dynamics of the interior of the domain are inferrable from the data alone, and consequently boundary effects are not necessarily important to include. In this loss function, \begin{equation} \mathcal L_F = \frac{1}{M} \sum_{i=1}^M \norm{F_{\bm w}(\hat u,x_i,t_i)}_2 \end{equation} ensures that the relevant differential equation dynamics are captured and \begin{equation} \mathcal L_d = \frac{1}{N} \sum_{i=1}^N \norm{\hat u(x_i,t_i,\bm\theta) - y_i}_2 \end{equation} provides incentive for the empirical dataset to be fit. Note that we treat the loss function as a function of both the variational parameters, $\bm\theta$, as well as the inferred parameters, $\bm w$. In our experiments, we optimize both these parameters on an equal footing, i.e. they are trained with the same learning rate and same optimizer, but in principle a more general optimization scheme also suffices. \subsection{Discovering Differential Equations}% \label{sub:discovering_diffeq} Instead of solving a \emph{known} differential equation this section describes how to find an \emph{unknown} DE just from measurements and a library of plausible basis functions. As in section~\ref{sub:inferring_diffeq}, we start by introducing a parameterized differential equation which can be represented in a general form \begin{equation} \label{eq:discoverdewithweights} F(u,x,t) = 0, \end{equation} where again the coefficients $\bm w$ must be inferred from some given data set. However, we parameterize $F$ such that it represents a large family of PDEs of which we expect a given instance to fit the observed data. In particular, in the context of this work, we draw our attention to dynamical systems of the form \begin{equation} \label{eq:regprob} \partial_t u = \bm w \cdot \bm\varphi(u), \end{equation} where $u$ is a scalar dependent variable and $\bm\varphi(u)$ is a library of potentially important functions such as \begin{equation} \label{eq:basis} \bm\varphi(u) = [1, x, t, u, u^2, u^3, \partial_x u, \partial^2_x u, u\partial_x u, \dots]^T. \end{equation} The library $\bm\varphi$ can be large if there is little prior knowledge about the terms that are present in the data, or contain only few specific terms that are likely to have generated the given dataset. Finding a solution that is \emph{sparse} in $\bm w$ results in a simple expression for the right-hand side (RHS) of equation~\ref{eq:regprob}. Hence, we can perform equation discovery by finding a sparse coefficient vector $\bm w$. Equation~\ref{eq:regprob} can be solved via STRidge regression (\cite{Brunton2016a}) if one has access to measurements of both $u$ and $\partial_t u$ which is rare\footnote{If measurements of $\partial_t u$ are not directly available they can be computed e.g. via the Savitzky-Golay filter (\cite{Schaferb}), but such methods typically require very dense measurements.}. \emph{Physics-informed neural networks} (PINN by \cite{Raissi2019}) which are normally used for \emph{solving} DEs can circumvent this problem by learning a surrogate $\hat u$ as described in Sec.~\ref{sub:solving_diffeq}. The surrogate is fully differentiable and therefore gives easy access to the derivatives needed to solve equation~\ref{eq:regprob}. Combining PINNs and equation~\ref{eq:regprob} to DeepMoD (\cite{Both2021}) results in a fully automated framework that can discover DEs purely from data and a pre-specified library of basis functions $\bm\varphi(u)$. On classical hardware neural networks are used to represent the approximate solution $\hat u$. To perform equation discovery on NISQ devices we replace the classical neural networks with quantum universal function approximators implemented on DQCs resulting in our \emph{Quantum Model Discovery} (QMoD\xspace) approach \cite{patent}. This approach is schematically depicted in figure~\ref{fig:qmd_schematic}. The QMoD\xspace loss is composed of three terms: the data-loss $\mathcal L_d$, the DE (or physics) loss $\mathcal L_p$, and the regularization: \begin{equation} \label{eq:discoverdeloss} \mathcal L(\bm\theta, \bm w) = \lambda_d \mathcal L_d + \lambda_p\mathcal L_p + \lambda_r\norm{\bm w}_1. \end{equation} Note, that like equation \ref{eq:inferdeloss}, we do not include a term to impose boundary conditions. If boundary conditions are known, such a term might be introduced. However, we focus on situations where the interior PDE dynamics are inferred from data alone. Also, as in equation \ref{eq:inferdeloss}, we explicitly write the loss in terms of the variational parameters of the UFA ($\bm\theta$), and the coefficients of the learnt differential equation ($\bm w$). We optimize over both these parameters on an equal footing, using the same optimizer and learning rate. The term $\lambda_r\norm{\bm w}_1$ encourages sparsity in the solutions of $\bm w$ and is standard practice in statistical learning \cite{Hastie2009}. The data-loss is the standard mean squared error (MSE) \begin{equation} \label{eq:mse} \mathcal L_d = \frac{1}{N} \sum_{i=1}^N \norm{\hat u(x_i,t_i,\bm\theta) - y_i}_2, \end{equation} running over $N$ data points with temporal, spatial and scalar responses given by $t_i$, $x_i$ and $y_i$ respectively. The differential equation loss is computed via the linear combination of basis functions \begin{equation} \mathcal L_p = \frac{1}{M} \sum_{i=1}^M \norm{\partial_t\uh(x_i,t_i,\bm\theta) - \bm w \bm\varphi(\hat u)}_2. \end{equation} The points $(x_i,t_i)$ at which the DE loss is evaluated can be chosen independently from the data grid of equation~\ref{eq:mse} via a fixed, random, or adaptive grid which gives this method great flexibility. Generalizing QMoD\xspace to higher dimensional $\bm u = [u_1,u_2,\,\dots]^T$ only requires taking care of matching dimensions (e.g. the coefficient vector $\bm w$ turns into a matrix). In the equation discovery setting it makes sense to prevent the surrogates for the variables $u_i$ from interaction, because we want the interaction of terms to occur only via the library $\bm\varphi$. Therefore, we use one individual UFA per operator instead of one large UFA with multiple outputs, that would allow interaction outside the library. \section{Experiments}% \label{sec:experiments} In this section, we demonstrate quantum scientific machine learning to be a viable technique. In addition to demonstrating parameter inference, we also compare our QMoD\xspace to its classical, neural network based counter part (DeepMoD). We generate data from several different differential equations and demonstrate applications of QMoD\xspace. \subsection{Damped Harmonic Oscillator}% \label{sub:damped_harmonic_oscillator} We start by demonstrating the potential of quantum neural networks for parameter inference and equation discovery in second-order ODES. We parameterize a damped harmonic oscillator as follows: \begin{equation} \frac{d^2 u_d}{dt_d^2} = -\omega^2 u_d -\alpha\frac{du_d}{dt_d}, \end{equation} where $u_d$ is the position, $\omega$ the frequency, and $\alpha$ the damping coefficient of the oscillator. The index $d$ indicates that this is the ODE before non-dimensionalization. We non-dimensionalize the equation such that the data lies in within the range $(-1,1)$ by defining $u_d = u u_c$ and $t_d=t t_c$ which results in \begin{equation} \label{eq:damped-harmonic-ode} \frac{d^2u}{dt^2} = -\omega^2 t_c^2 u -\alpha t_c^2\frac{du}{dt}, \end{equation} With the constants $u_c=1\text{\,m}$, $t_c=2\pi\text{\,s}$, $\omega=1.5\frac{1}{\text{s}}$, and $\alpha=0.5\frac{1}{\text{s}}$ we obtain training data as shown on the left plot of figure~\ref{fig:damped-harmonic-param-id}. \subsubsection{Inferring Differential Equation Parameters}% \label{ssub:parameter_identification} As a first step we assume that the form the governing differential equation is known and we must infer the values of the constants $\omega$ and $\alpha$. We compare the method outlined in section~\ref{sub:inferring_diffeq} with an implementation of DeepMoD without regularization coefficients. The optimization problem in \eqref{eq:inferdeloss} with the specialized form of \eqref{eq:inferdewithweights} is defined as: \begin{equation}\label{eq:varphi-param-id} F_{\bm w}(u,x,t) = \frac{d^2u}{dt^2} + \bm w \left[t_c^2 u, t_c^2\frac{du}{dt}\right]^T. \end{equation} We include the known non-dimensionalization constants in the basis functions to scale the problem so that it is more amenable to standard optimization hyperparameters (not doing this would result in the models having to identify coefficients $\gg 10$). Figure~\ref{fig:damped-harmonic-param-id} shows the data and the obtained QMoD\xspace fit $\hat u$ on the left. We use a quantum neural network with 5 qubits as the UFA to approximate $\hat u$. We reach an MSE loss value of $\mathcal L_d=10^{-7}$ after 200 BFGS optimization steps. A neural network with one hidden layer of size 32 and $\tanh$ activations reaches similar MSE. The central and right plot of figure~\ref{fig:damped-harmonic-param-id} show the trajectories of the coefficients of the two basis functions (equation~\ref{eq:varphi-param-id}), namely $\omega$ and $\alpha$, during training. The target values for the two coefficients are $\omega=1.5$ and $\alpha=0.5$. In this experiment we found good solutions using $\lambda_d=1$ (dataloss), $\lambda_p=10^{-5}$ (physics loss) for both QMoD\xspace and DeepMoD within \eqref{eq:inferdeloss}. The identified parameter values are shown in table~\ref{tab:damped_harmonic_param_id}. \begin{figure} \centering \resizebox{\textwidth}{!}{\input{damped-harmonic-param-id.tikz}} \caption{Damped harmonic parameter \textit{identification}. \figuretext Both QMoD\xspace and the classical DeepMoD infer the correct target parameters $\omega^2=2.25$ and $\alpha=0.5$. }% \label{fig:damped-harmonic-param-id} \end{figure} \begin{table} \label{tab:damped_harmonic_param_id} \centering \begin{tabular}{llll} \toprule & & \multicolumn{2}{c}{Basis function} \\ \cmidrule{3-4} Equation & Model & $u$ & $\frac{du}{dt}$ \\ \midrule \multirow{3}{*}{$\frac{d^2u}{dt^2} = -\omega^2 t_c^2 u -\alpha t_c^2\frac{du}{dt}$} & QMoD\xspace & $\omega=\sqrt{2.249} = 1.499$ & $\alpha=0.500$ \\ & DeepMoD & $\omega=\sqrt{2.247} = 1.498$ & $\alpha=0.500$ \\ & Truth & $\omega=1.5$ & $\alpha=0.5$ \\ \bottomrule \end{tabular} \caption{Final basis function parameters $\omega$ and $\alpha$ as inferred by QMoD\xspace and DeepMoD compared to the true coefficients that generated the data (called \emph{truth}). Non-dimensionalization coefficients in the basis functions are omitted for clarity.} \end{table} \subsubsection{Equation Discovery}% \label{ssub:equation_discovery} To go a step beyond the task of parameter inference, we next aim for full "equation discovery"; we assume that only the LHS of equation~\ref{eq:damped-harmonic-ode} (i.e. $\partial u_t^2$) is known and choose a set of plausible basis functions $\bm\varphi$ consisting of polynomials up to degree 4 and the first derivative of $u$ for use in \eqref{eq:regprob}. \begin{equation}\label{eq:varphioscillator} \bm\varphi(u) = \left[t_c^2\, u(t),\quad u_c t_c^2\, u^2(t),\quad u_c^2t_c^2\, u^3(t),\quad u_c^3t_c^2\, u^4(t),\quad t_c \frac{du}{dt} \right]^T \end{equation} \begin{figure} \centering \resizebox{\textwidth}{!}{\input{damped-harmonic.tikz}} \caption{Damped harmonic oscillator \emph{discovery}. \figuretext The difference to figure~\ref{fig:damped-harmonic-param-id} is the larger set of basis functions. Both QMoD\xspace and DeepMoD correctly identify the relevant basis functions ($u$ and $\frac{du}{dt}$) whereas the irrelevant basis function coefficients are all close to zero. }% \label{fig:damped-harmonic} \end{figure} \newcommand{$<10^{-3}$}{$<10^{-3}$} \begin{table} \centering \begin{tabular}{lllcccl} \toprule & & \multicolumn{5}{c}{Basis function} \\ \cmidrule{3-7} Equation & Model & $u$ & $u^2$ & $u^3$ & $u^4$ & $\frac{du}{dt}$ \\ \midrule \multirow{3}{*}{$\frac{d^2u}{dt^2} = -\omega^2 t_c^2 u -\alpha t_c^2\frac{du}{dt}$} & QMoD\xspace & $\omega=\sqrt{2.239} = 1.496$ &$<10^{-3}$&$<10^{-3}$&$<10^{-3}$& $\alpha=0.497$ \\ & DeepMoD & $\omega=\sqrt{2.242} = 1.498$ &$<10^{-3}$&$<10^{-3}$&$<10^{-3}$& $\alpha=0.496$ \\ & Truth & $\omega= 1.5$ &$0$&$0$&$0$& $\alpha=0.5$ \\ \bottomrule \end{tabular} \label{tab:damped_harmonic} \caption{Final basis function parameters resulting from QMoD\xspace/DeepMoD training with a larger library of basis functions (equation~\ref{eq:varphioscillator}). All irrelevant coefficients are very close to zero while the inferred $\omega$ and $\alpha$ are close to their true values. Non-dimensionalization coefficients in the basis functions are omitted for clarity. } \end{table} We optimize \eqref{eq:discoverdeloss} and achieve good results with a regularization parameter $\lambda_r=10^{-4}$. Otherwise we use the same training and model setup (5 qubits, 200 BFGS steps, $\lambda_p=10^{-5}$) as in section~\ref{ssub:parameter_identification}. Both our quantum equation discovery QMoD\xspace and DeepMoD successfully identify the relevant basis functions and their correct coefficients. All other basis function coefficients are close to zero after training. \subsection{Lotka-Volterra System}% \label{sub:lotka_volterra_system} We now demonstrate that coupled non-linear differential equations can be discovered with quantum circuits. Our model system is given by the Lotka-Volterra (LV) equations: \begin{align} \label{eq:lotka-volterra} \frac{dx_d}{dt_d} &= \alpha x_d - \beta x_dy_d\\ \frac{dy_d}{dt_d} &= \delta x_dy_d - \gamma y_d \end{align} that describe a predator-prey system where $x_d$ is the number of prey and $y_d$ the number of predators. The parameters $\alpha$, $\beta$, $\gamma$, and $\delta$ define the interaction of the two species which we chose to $\alpha=1.5$, $\beta=1$, $\gamma=1$, $\delta=1$. Again, the index $d$ indicates dimensional quantities. We non-dimensionalize the LV system with critical time $t_c=8$ and a critical number of individuals $x_c=2.5$ which results in \begin{align} \label{eq:lotka-volterra-nd} \frac{dx}{dt} &= \alpha t_c x - t_c x_c \beta xy\\ \frac{dy}{dt} &= t_c x_c \delta xy - t_c\gamma y. \end{align} The non-dimensionalization coefficients are again included in the basis functions $\bm\varphi$ which consist of polynomials up to degree 2 \begin{equation} \bm\varphi(x,y) = \left[t_c x,\, t_c y,\, t_c x_c x^2 ,\, t_c x_c y^2 ,\, t_c x_c xy\right]^T. \end{equation} QMoD\xspace is trained with a time-series of 30 datapoints for each variable $x$ and $y$. For this task we need a slightly larger featuremap with 7 qubits to fit the data. Each variable of the LV system is modeled by a separate UFA driving its own set of (identical) library functions. After 200 BFGS steps we discover the correct basis function coefficients as shown in figure~\ref{fig:lotka-volterra} and table~\ref{tab:lotka-volterra}. The QMoD\xspace loss coefficients are $\lambda_d=1$, $\lambda_p=10^{-3}$, and $\lambda_r=10^{-5}$. We compare QMoD\xspace to classical DeepMoD with two neural networks (one for each variable $x$ and $y$) with one hidden layer of size 32. Classical DeepMoD receives the same data. For this dataset we observe that the classical neural networks suffer from stronger gradient pathologies which could only be resolved by decreasing the physics loss coefficient to $\lambda_p=10^{-6}$ which weakens the training signal on the basis function coefficients. This explains why DeepMoD needs more training steps to converge (see figure~\ref{fig:lotka-volterra}). \begin{figure} \centering \resizebox{\textwidth}{!}{\input{lotka-volterra.tikz}} \caption{Lotka-Volterra discovery. \figuretext Both QMoD\xspace and DeepMoD correctly identify the relevant basis functions for each variable.}% \label{fig:lotka-volterra} \end{figure} \begin{table} \label{tab:lotka-volterra} \centering \begin{tabular}{llccccc} \toprule & & \multicolumn{5}{c}{Basis function} \\ \cmidrule{3-7} Equation & Model & $x$ & $y$ & $x^2$ & $y^2$ & $xy$ \\ \midrule \multirow{3}{*}{$\frac{dx}{dt} = \alpha t_c x - t_c x_c \beta xy$} & QMoD\xspace & \caleft{$\alpha = 1.483$} & $0.001$ & $-0.001$ & $-0.007$ & \caleft{$\beta=0.986$} \\ & DeepMoD & \caleft{$\alpha = 1.475$} & $<10^{-3}$ & $<10^{-3}$ & $-0.003$ & \caleft{$\beta=0.979$} \\ & Truth & \caleft{$\alpha = 1.5$} & $0$ & $0$ & $0$ & \caleft{$\beta=1$}\\ \midrule \multirow{3}{*}{$\frac{dy}{dt} = t_c x_c \delta xy - t_c\gamma y$} & QMoD\xspace & $0.006$ & \caleft{$\delta = 0.993$} & $0.008$ & $<10^{-3}$ & \caleft{$\gamma=0.991$} \\ & DeepMoD & $<10^{-3}$ & \caleft{$\delta = 0.987$} & $0.011$ & $<10^{-3}$ & \caleft{$\gamma=0.979$} \\ & Truth & $0$ & \caleft{$\delta = 1$} & $0$ & $0$ & \caleft{$\gamma=1$}\\ \bottomrule \end{tabular} \caption{Final basis function parameters of the LV system discovered by QMoD\xspace and DeepMoD compared to the true coefficients that generated the data (called \emph{truth}). Non-dimensionalization coefficients in the basis functions are omitted for clarity. Both models identify the correct basis functions as relevant.} \end{table} \newpage \subsection{Burgers' Equation}% \label{sub:burgers_equation} In this last section we present the discovery of Burgers' equation, a non-linear second-order partial differential equation. We chose the general (or \emph{viscous}) Burgers equation with one spatial dimension $x$ and one time dimension $t$: \begin{equation} \frac{\partial u}{\partial t} = \varepsilon\frac{\partial^2u}{\partial x^2} - \alpha u\frac{\partial u}{\partial x}, \end{equation} where $u(x,t)$ is the velocity field, $\varepsilon$ the viscosity, and $\alpha$ the coefficient of the advection term. To obtain training data we solve Burgers' equation on the domain $(x \times t)\in([0,1]\times[0,\frac{1}{2}])$ with parameters $\varepsilon=0.05$ and $\alpha=1$. The true solution with sinusoidal initial conditions \begin{equation} u(x,0) = \sin(2\pi x) \end{equation} is shown in the left plot of figure~\ref{fig:burgers-heatmap} as the gray-scale contour. We train on 200 uniformly sampled points\footnote{Note that no intricate grid definition is needed for DQC/QMoD\xspace to solve PDEs} which are scattered on top of the left plot of figure~\ref{fig:burgers-heatmap}. For Burgers' equation we do not need to perform non-dimensionalization as the domain is already within $(-1,1)$. \begin{figure} \centering \includegraphics[width=\linewidth]{burgers-heatmap.pdf} \caption{\emph{Left}: Scatter plot of Burgers' equation dataset and the full solution as a gray-scale contour underneath (parameters $\varepsilon=0.05$, $\alpha=1$, and initial condition $u(x,0)=\sin(2\pi x)$). \emph{Center}: Learned QMoD\xspace solution. \emph{Right}: Error of QMoD\xspace solution.}% \label{fig:burgers-heatmap} \end{figure} We assume that the LHS $\partial u_t$ is known and want to discover $\varepsilon$ and $\alpha$ from the library \begin{equation} \bm\varphi(u) = \left[u,\quad u^2,\quad \frac{\partial u}{\partial x},\quad \frac{\partial^2u}{\partial x^2},\quad u\frac{\partial u}{\partial x},\quad u^2\frac{\partial u}{\partial x} \right]^T. \end{equation} To solve this PDE we need a UFA with two inputs $(x,t)$ and one output. Therefore, we employ two input featuremaps with 6 qubits each. The two featuremaps are stacked in parallel onto one circuit, and connected to a variational circuit with a base on all 12 qubits, effectively entangling the two feature registers. The physics loss coefficient is set to $\lambda_p=10^{-2}$ and the regularization to $\lambda_r=10^{-3}$. Figure~\ref{fig:burgers-discovery} and table~\ref{tab:burgers} show that $\varepsilon$ is discovered very precisely but the advection term $\alpha$ is slightly too low in both models. However, we can still conclude that QMoD\xspace and DeepMoD correctly identify the two relevant basis functions for advection and diffusion. To get an even closer fit to the true basis function parameters it is possible to re-run the model only with the two relevant basis functions an switch off the regularization (as we demonstrated in section~\ref{ssub:parameter_identification}). \begin{figure} \centering \resizebox{\textwidth}{!}{\input{burgers.tikz}} \caption{Burgers' equation discovery. \figuretext The trajectory of viscosity $\varepsilon$ (red line) is scaled by $\frac{1}{\varepsilon}$ for better visibility. Both QMoD\xspace and DeepMoD discover $\varepsilon$ with good precision. The advection term $\alpha$ (blue line) is clearly discovered as a relevant term but does not match the true value $\alpha=1$ perfectly. }% \label{fig:burgers-discovery} \end{figure} \begin{table} \centering \begin{tabular}{llcccllc} \toprule & & \multicolumn{6}{c}{Basis function} \\ \cmidrule{3-8} Equation & Model & $u$ & $u^2$ & $\frac{du}{dx}$ & $\frac{d^2u}{dx^2}$ & $u\frac{du}{dx}$ & $u^2\frac{du}{dx}$ \\ \midrule \multirow{3}{*}{$\frac{\partial u}{\partial t} = \varepsilon\frac{\partial^2u}{\partial x^2} - \alpha u\frac{\partial u}{\partial x}$} & QMoD\xspace & $<10^{-3}$ & $<10^{-3}$ & $<10^{-3}$ & $\varepsilon=0.050$ & $\alpha = 0.838$ & $<10^{-3}$ \\ & DeepMoD & $<10^{-3}$ & $<10^{-3}$ & $<10^{-3}$ & $\varepsilon=0.049$ & $\alpha = 0.924$ & $<10^{-3}$ \\ & Truth & $0$ & $0$ & $0$ & $\varepsilon=0.05$ & $\alpha = 1$ & $<10^{-3}$ \\ \bottomrule \end{tabular} \label{tab:burgers} \caption{Final basis function parameters for Burgers' equation discovered by QMoD\xspace and DeepMoD compared to the true coefficients that generated the data. Both QMoD\xspace and DeepMoD correctly identify that only two basis functions are needed to describe Burgers' equation. The parameters $\varepsilon$ is found very precisely by both models. DeepMoD is closer to the true parameter $\alpha$ but still slightly too low.} \end{table} \section{Discussion \& Conclusion}% \label{sec:conclusion} We demonstrated that techniques from scientific machine learning can be placed in a quantum computational setting. In particular, our numerical experiments show that relatively small quantum circuits can be used for meaningful computations in scientific machine learning. We have demonstrated how to implement an automated parameter inference and equation discovery framework (QMoD\xspace) using a differentiable quantum circuit strategy, and reached results that are on par with the classical machine learning method DeepMoD. With this demonstration of what can be achieved with DQCs the fields of quantum computing and scientific machine learning are moving closer together. We should note that all experiments described here involve classical simulators of quantum computers with unrealistic assumptions such as zero sampling noise, no environment noise and no measurement noise. Although many error mitigation strategies for NISQ hardware exist, it should still be investigated how well the strategies described work in more realistic settings and importantly on real quantum hardware, and which quantum hardware is most compatible/natural for this strategy. Furthermore, due to the intrinsic scaling issues of simulating quantum many-body systems, we did not consider more than 12 qubits in the largest simulations described here, and thus also compared with only small-sized classical neural networks. It will be important to investigate the performance for larger number of qubits on quantum hardware, and compare them to realistic classical PINN architectures. The strategies described above work for systems governed by sets of Partial Differential Equations, but also for those governed by stochastic processes modelled as Stochastic (Partial) Differential Equations (SDEs), through the perspective of \textit{quantile mechanics} combined with DQCs as described in the recent paper on Quantum Quantile Mechanics (QQM) \cite{paine2021}. In such setting, an SDE may be learned (`discovered') based on just statistical data. This could prove valuable in the generative modelling case, where synthetic data generation of time-series is learned based on a combination of data and a parameterized SDE with a library of candidate model operators. In such real-world setting as financial markets, there is often not exact knowledge of the underlying model dynamics but there is access to historical data, where QMoD\xspace could infer the SDE from data and make better predictions compared to a purely data-only approach. An interesting area of potential yet unexplored, is the identification of quantum computational speedup for scientific machine learning in other aspects than Neural Network enhancement, for example by combining QMoD\xspace with combinatorial optimization. \textit{Ethics declaration.} A patent application for the method described in this manuscript has been submitted by Qu\&Co. \printbibliography \end{document}
\section{Introduction} Full row-rank integer matrices with minors bounded by a given constant $\Delta$ in the absolute value have been extensively studied in integer linear programming as well as matroid theory: The interest for optimization was coined by the paper of Artmann, Weismantel \& Zenklusen~\cite{artmannweismantelzenklusen2017astrongly} who showed that integer linear programs with a \emph{bimodular} constraint matrix, meaning that all its maximal size minors are bounded by two in absolute value, can be solved in strongly polynomial time. With the goal of generalizing the results of Artmann et al.~beyond the bimodular case, N\"agele, Santiago \& Zenklusen~\cite{naegelesantiagozenklusen2021congruency} studied feasibility and proximity questions of a subclass of integer programs with bounded subdeterminants. Fiorini et al.~\cite{fiorinijoretweltgeyuditsky2021integer} obtained a strongly polynomial-time algorithm for integer linear programs whose defining coefficient matrix has the property that all its subdeterminants are bounded by a constant and all of its rows contain at most two nonzero entries. For more information on the development regarding this topic, we refer to the three cited contributions above and the references therein. For a matrix $A \in \mathbb{R}^{m \times n}$ and for $1 \leq k \leq \min\{m,n\}$, we write \[ \Delta_k(A) := \max\{ \card{\det(B)} : B \textrm{ is a } k \times k \textrm{ submatrix of } A \} \] for the maximal absolute value of a $k \times k$ minor of~$A$. Given an integer $\Delta \in \mathbb{Z}_{>0}$, a matrix $A \in \mathbb{R}^{m \times n}$ of rank~$m$ is said to be \emph{$\Delta$-modular} and \emph{$\Delta$-submodular}, if $\Delta_m(A) = \Delta$ and~$\Delta_m(A) \leq \Delta$, respectively.\footnote{The authors of~\cite{glanzerweismantelzenklusen2018onthenumber,leepaatstallknechtxu2021polynomial} use the term $\Delta$-modular for what we call $\Delta$-submodular.} Moreover, a matrix $A \in \mathbb{R}^{m \times n}$ is said to be \emph{totally $\Delta$-modular} and \emph{totally $\Delta$-submodular}, if $\max_{k \in [m]} \Delta_k(A) = \Delta$ and $\max_{k \in [m]} \Delta_k(A) \leq \Delta$, respectively, where $[m] := \{1,2,\ldots,m\}$. \noindent Our object of studies is the \emph{generalized Heller constant}, which we define as \begin{align*} \h(\Delta,m) := \max\bigl\{ n \in \mathbb{Z}_{>0} : A \in \mathbb{Z}^{m \times n} \ & \textrm{has pairwise distinct columns} \bigr. \\ \bigl. & \text{and} \ \Delta_m(A) = \Delta \bigr\}. \end{align*} The value $\h(\Delta,m)$ is directly related to the value $\mathfrak{c}(\Delta,m)$ studied in~\cite{glanzerweismantelzenklusen2018onthenumber,leepaatstallknechtxu2021polynomial} and defined as the maximum number~$n$ of columns in a $\Delta$-submodular integer matrix~$A$ with~$m$ rows with the properties that~$A$ has no zero columns and for any two distinct columns $A_i$ and~$A_j$ with $1 \le i <j \le n$ one has $A_i \ne A_j$ and $A_i \ne - A_j$. It is clear that \[ \mathfrak{c}(\Delta,m) = \frac{1}{2} \bigl( \max \{\h(1,m),\ldots, \h(\Delta,m)\} -1 \bigr), \] showing that $\mathfrak{c}(\Delta,m)$ and $\h(\Delta,m)$ are ``equivalent'' in many respects. However, our proofs are more naturally phrased in terms of $\h(\Delta,m)$ rather than $\mathfrak{c}(\Delta,m)$, as we prefer to prescribe $\Delta_m(A)$ rather than providing an upper bound on $\Delta_m(A)$ and we do not want to eliminate the potential symmetries within $A$ coming from taking columns $A_i$ and $A_j$ that satisfy $A_i = -A_j$. Upper bounds on the number of columns in (totally) $\Delta$-(sub)modular integer matrices with~$m$ rows have been gradually improved over time. In the case $\Delta = 1$, we are concerned with the notion of (totally) unimodular integer matrices. The maximal number of pairwise distinct columns in a (totally) unimodular integer matrix with~$m$ rows has been shown by Heller~\cite{heller1957onlinear} to be equal to $\h(1,m) = m^2 + m + 1$. Lee~\cite[Sect.~10]{lee1989subspaces} initiated the study of the maximal number of columns beyond unimodular matrices, in 1989, and proved a bound of order $\mathcal{O}(r^{2\Delta})$, for totally $\Delta$-submodular integer matrices of row-rank~$r$. Glanzer, Weismantel \& Zenklusen~\cite{glanzerweismantelzenklusen2018onthenumber} revived the story by extending the investigation to $\Delta$-submodular integer matrices and obtaining a polynomial bound in the parameter~$m$. More precisely, they showed that for each fixed $\Delta \geq 2$, $\h(\Delta,m)$ is of order at most $\mathcal{O}(\Delta^{2 + \log_2 \log_2 \Delta} \cdot m^2)$. This result has been recently improved by Lee, Paat, Stallknecht \& Xu~\cite[Thm.~2 \& Prop.~1 \& Prop.~2]{leepaatstallknechtxu2021polynomial} who obtained the exact value \begin{align} \h(\Delta,m) = m^2 + m + 1 + 2m(\Delta - 1) \qquad \textrm{if} \qquad \Delta \leq 2 \ \textrm{ or }\ m \leq 2,\label{eqn:lee-et-at-exact} \end{align} and, for every $\Delta,m \in \mathbb{Z}_{\geq 3}$, proved the estimates\footnote{Lee et al.~\cite[p.~23]{leepaatstallknechtxu2021polynomial} remark that their techniques provide $\h(\Delta,m) \leq \mathcal{O}(m^2 \cdot \Delta^{1.95})$.} \begin{align} m^2 + m + 1 + 2m(\Delta - 1) \leq \h(\Delta,m) \leq (m^2 + m)\Delta^2 + 1.\label{eqn:lee-et-al-bound} \end{align} Bounds on $\h(\Delta,m)$ can also be derived using the machinery of matroid theory. In their recent work, Geelen, Nelson \& Walsh~\cite[Prop. 8.6.1]{geelennelsonwalsh2021excludingaline} rely on the fact that the class of matroids representable by integer $\Delta$-submodular matrices is minor-closed and that the line on $2 \Delta +2$ points (that is, the uniform matroid of rank two with $2 \Delta +2$ elements) is an excluded minor for $\Delta$-submodular representability. This shows that $\h(\Delta,m)$ can be bounded by providing a bound, for given positive integers $t$ and $m$, on the size of a simple matroid of rank~$m$ that is representable over real numbers with no $(t+2)$-point line being a minor. Employing this approach, in~\cite[Thm.~2.2.4]{geelennelsonwalsh2021excludingaline} the bound $\h(\Delta,m) \leq m^2 + f(\Delta) m$ is derived with $f(\Delta)$ being at least double exponential in~$\Delta$ (see the comment in~\cite[p.~3]{leepaatstallknechtxu2021polynomial}). The best known upper bounds on $\h(\Delta,m)$ to date have the form of a quadratic polynomial $a(\Delta) m^2 + b(\Delta) m + c$ in $m$, with the coefficients for~$m^2$ and~$m$ possibly depending on~$\Delta$, and the constant term $c \in \mathbb{R}$ being independent of~$\Delta$. The bounds are incomparable, since for $\Delta \to \infty$, for some results $a(\Delta)$ is large but $b(\Delta)$ is small, while for other bounds it is the other way around. The lower bound $\h(\Delta,m) \geq m^2 + m + 1 + 2m (\Delta - 1)$ in~\eqref{eqn:lee-et-al-bound} is obtained from the $\Delta$-modular integer matrix with~$m$ rows and whose columns are the elements of the difference set of \[ \left\{ \mathbf{0},e_1,e_2,\ldots,e_m \right\} \cup \left\{ 2e_1,3e_1,\ldots,\Delta e_1\right\}, \] where~$e_i$ denotes the $i$th coordinate unit vector. This is a natural generalization of the unimodular matrix ($\Delta = 1$) that attains Heller's result $\h(1,m) = m^2+m+1$. With this perspective and their precise result~\eqref{eqn:lee-et-at-exact}, for $\Delta \leq 2$ or $m \leq 2$, Lee et al.~\cite{leepaatstallknechtxu2021polynomial} conjecture that the lower bound in~\eqref{eqn:lee-et-al-bound} is actually the correct value of $\h(\Delta,m)$, for any choice of~$\Delta,m \in \mathbb{Z}_{>0}$. \begin{conjecture}[Lee et al.~\cite{leepaatstallknechtxu2021polynomial}] \label{conj:lee-exact-value-hDm} For every $\Delta,m \in \mathbb{Z}_{>0}$, holds \[ \h(\Delta,m) = m^2 + m + 1 + 2m (\Delta - 1). \] \end{conjecture} \noindent On the qualitative side, Conjecture~\ref{conj:lee-exact-value-hDm} implies that $h(\Delta,m) \le a(\Delta) m^2 + b(\Delta) m+c$ holds with $a(\Delta) \in \mathcal{O}(1)$ and $b(\Delta) \in \mathcal{O}(\Delta)$. If this is true, we would also have $h(\Delta,m) \leq \mathcal{O}(\Delta) m^2$, but even this estimate has not yet been confirmed since the currently available bounds are asymptotically too large for $\Delta \to \infty$. The authors of \cite[p.~24]{leepaatstallknechtxu2021polynomial} ask if there exists a bound of the form $\mathcal{O}(m^d) \Delta$, for some constant $d \in \mathbb{Z}_{>0}$. As our main result, we answer this question in the affirmative by showing that a bound of order $\mathcal{O}(m^4) \Delta$ exists. \begin{theorem} \label{thm:polynomial-linear} Let $\Delta,m \in \mathbb{Z}_{>0}$. \begin{enumerate}[label=(\roman*)] \item If $m \geq 5$, then \[ \h(\Delta,m) \leq m^2 + m + 1 + 2\,(\Delta - 1) \cdot \sum_{i=0}^4 \binom{m}{i} \in \mathcal{O}(m^4) \cdot \Delta. \] \item If $m \geq 4$ and $\Delta$ is odd, then \[ \h(\Delta,m) \leq m^2 + m + 1 + 2\,(\Delta - 1) \cdot \sum_{i=0}^3 \binom{m}{i} \in \mathcal{O}(m^3) \cdot \Delta. \] \end{enumerate} \end{theorem} \noindent It remains an open question whether our bound can be improved, for all~$\Delta$, to a bound of order $\mathcal{O}(m^d) \Delta$ for some exponent~$d < 4$. Based on computational experiments for small values of~$m$ and~$\Delta$, we found series of counterexamples to \Cref{conj:lee-exact-value-hDm} for~$\Delta \in \{4,8,16\}$. \begin{theorem} \label{thm:counterexamples-Delta-4} We have \begin{align*} \h(4,m) &\geq m^2 + 9m - 3 &&\hspace{-1cm}\textrm{ for } \quad m \geq 3, \\ \h(8,m) &\geq m^2 + 19m - 11 &&\hspace{-1cm}\textrm{ for } \quad m \geq 4, \quad \textrm{ and} \\ \h(16,m) &\geq m^2 + 33m - 17 &&\hspace{-1cm}\textrm{ for } \quad m \geq 10. \end{align*} \end{theorem} \noindent These lower bounds exceed the conjecture for~$\h(4,m),\h(8,m)$ and~$\h(16,m)$ by Lee et al.~by the additive terms $2(m-2)$, $4(m-3)$, and $2(m-9)$, respectively. This means that the qualitative side of \Cref{conj:lee-exact-value-hDm} as described above still stands. \subsection*{Organisation of the paper} The paper is organized as follows. In \Cref{sect:residue-classes}, we describe our geometric idea that explains the linearity in~$\Delta$ of the bounds in \Cref{thm:polynomial-linear}, and we introduce two variants of the Heller constant $\h(1,m)$ which we aim to polynomially bound in \Cref{sec:poly-bound-shifted-heller,sec:sauer-matrix-proof}. In \Cref{sect:computations}, we describe our approach to compute the generalized Heller constant $\h(\Delta,m)$ for small parameters $\Delta,m$. We also discuss the results of our computer experiments, and identify counterexamples to \Cref{conj:lee-exact-value-hDm} whose structure lead us to construct the lower bounds in \Cref{thm:counterexamples-Delta-4}. Finally, in \Cref{sect:open-problems}, we pose some natural open problems that result from our investigations. \section{Counting by Residue Classes} \label{sect:residue-classes} Our main idea is to count the columns of a $\Delta$-modular integer matrix by residue classes of a certain lattice. This is the geometric explanation for the linearity in~$\Delta$ of our upper bounds in \Cref{thm:polynomial-linear}. To be able to count in the non-trivial residue classes, we need to extend the Heller constant $\h(1,m)$ to a \emph{shifted} setting. Given a translation vector $t \in \mathbb{R}^m$ and a matrix $A \in \mathbb{R}^{m \times n}$, the shifted matrix $t + A := t \mathbf{1}^\intercal + A$ has columns $t + A_i$, where $A_1,\ldots,A_n$ are the columns of~$A$, and $\mathbf{1}$ denotes the all-one vector. \begin{definition}[Shifted Heller constants] \label{def:shifted-heller-constant} Let $m \in \mathbb{Z}_{>0}$ and $\delta \in \mathbb{Z}_{\geq2}$. \begin{enumerate}[label=(\roman*)] \item We define the \emph{shifted Heller constant} $\hs(m)$ as the maximal number~$n$ such that there exists a translation vector $t \in [0,1)^m \setminus \{\mathbf{0}\}$ and a matrix $A \in \{-1,0,1\}^{m \times n}$ with pairwise distinct columns such that $t+A$ is totally $1$-submodular, that is, $\max_{k \in [m]} \Delta_k(t+A) \leq 1$. \item We define the \emph{refined shifted Heller constant} $\hsd{\delta}{m}$ as the maximal number~$n$ such that there exists a vector $t \in [0,1)^m \cap (\tfrac{1}{\delta}\mathbb{Z})^m \setminus \{\mathbf{0}\}$ and a matrix $A \in \{-1,0,1\}^{m \times n}$ with pairwise distinct columns such that $t+A$ is totally $1$-submodular, that is, $\max_{k \in [m]} \Delta_k(t+A) \leq 1$. \end{enumerate} \end{definition} \noindent Note that, in contrast to the generalized Heller constant $\h(\Delta,m)$, we do not necessarily require $t+A$ to have full rank in the above definition, but we restrict $A$ to have entries in $\{-1,0,1\}$ only. Compared with $\hs(m)$, in the definition of $\hsd{\delta}{m}$ we only allow the translation vectors~$t$ to have rational coordinates all of whose denominators are divisors of~$\delta$. Hence, we clearly have $\hsd{\delta}{m} \leq \hs(m)$, for any $\delta \geq 2$. Moreover, we exclude $t = \mathbf{0}$ in the definition of both $\hs(m)$ and $\hsd{\delta}{m}$ in order to allow the possibility that $\hsd{\delta}{m} \leq \h(1,m)$, or even $\hs(m) \leq \h(1,m)$. The reason for restricting the non-zero translation vectors to the half-open unit cube $[0,1)^m$ becomes apparent in the proof of our main lemma. However, we need to prepare it with an observation on the representation of integer points modulo a sublattice of~$\mathbb{Z}^m$. \begin{proposition} \label{prop:coefficients} Let $\Lambda \subseteq \mathbb{Z}^m$ be a full-dimensional sublattice with basis $b_1,\ldots,b_m \in \Lambda$ and index~$\Delta$. Then, for every $x \in \mathbb{Z}^m$, the uniquely determined coefficients $\alpha_1,\ldots,\alpha_m$ in the representation \[ x = \alpha_1 b_1 + \ldots + \alpha_m b_m \] satisfy $\alpha_i \in \tfrac{1}{\Delta} \mathbb{Z}$, for every $1 \leq i \leq m$. \end{proposition} \begin{proof} By definition, the finite group $\mathbb{Z}^m / \Lambda$ has order~$\Delta$. Hence, the order of any of its elements $x + \Lambda$, where $x \in \mathbb{Z}^m$, divides~$\Delta$. \end{proof} \begin{lemma} \label{lem:residue-class-approach} For every $\Delta , m \in \mathbb{Z}_{>0}$, we have \[ \h(\Delta,m) \leq \h(1,m) + (\Delta-1) \cdot \hsd{\Delta}{m}. \] In particular, $\h(\Delta,m) \leq \h(1,m) + (\Delta-1) \cdot \hs(m)$. \end{lemma} \begin{proof} Let $A \in \mathbb{Z}^{m \times n}$ be a matrix with $\Delta_m(A) = \Delta$ and pairwise distinct columns and let $X_A \subseteq \mathbb{Z}^m$ be the set of columns of~$A$. Further, let $b_1,\ldots,b_m \in X_A$ be such that $\card{\det(b_1,\ldots,b_m)} = \Delta$ and consider the parallelepiped \[ P_A := [-b_1,b_1] + \ldots + [-b_m,b_m] = \bigg\{ \sum_{i=1}^m \alpha_i b_i : -1 \leq \alpha_i \leq 1, \forall i \in [m]\bigg\} . \] Observe that $X_A \subseteq P_A$. Indeed, assume to the contrary that there is an $x = \sum_{i=1}^m \alpha_i b_i \in X_A$, with, say $|\alpha_j| > 1$. Then, \[ \card{\det(b_1,\ldots,b_{j-1},x,b_{j+1},\ldots,b_m)} = \card{\alpha_j} \Delta > \Delta, \] which contradicts that $A$ was chosen to be $\Delta$-modular. Now, consider the sublattice $\Lambda := \mathbb{Z} b_1 + \ldots + \mathbb{Z} b_m$ of $\mathbb{Z}^m$, whose index in~$\mathbb{Z}^m$ equals~$\Delta$. We seek to bound the number of elements of $X_A$ that fall into a fixed residue class of~$\mathbb{Z}^m$ modulo~$\Lambda$. To this end, let $x \in \mathbb{Z}^m$ and consider the residue class $x + \Lambda$. Every element $z \in (x + \Lambda) \cap P_A$ is of the form $z = \sum_{i=1}^m \alpha_i b_i$, for some uniquely determined $\alpha_1,\ldots,\alpha_m \in [-1,1]$ which, in view of \Cref{prop:coefficients}, satisfy $\alpha_i \in \tfrac{1}{\Delta} \mathbb{Z}$, for every $1 \leq i \leq m$. Moreover, $z$ can be written as \begin{align} z &= \sum_{i=1}^m \lfloor \alpha_i \rfloor b_i + \sum_{i=1}^m \{\alpha_i\} b_i,\label{eqn:representation-z-refined} \end{align} where $\{\alpha_i\} = \alpha_i - \lfloor \alpha_i \rfloor \in \left\{ 0,\tfrac{1}{\Delta},\ldots,\tfrac{\Delta-1}{\Delta}\right\}$ is the fractional part of $\alpha_i$, and where $\bar x := \sum_{i=1}^m \{\alpha_i\} b_i$ is the unique representative of $x + \Lambda$ in the half-open parallelepiped $[\mathbf{0},b_1) + \ldots + [\mathbf{0},b_m)$, and in particular, is independent of~$z$. We use the notation $\lfloor z \rfloor := (\lfloor \alpha_1 \rfloor, \ldots, \lfloor \alpha_m \rfloor) \in \{-1,0,1\}^m$ and $\{ z \} := (\{\alpha_1\},\ldots,\{\alpha_m\}) \in [0,1)^m$ and thus have $z = B (\lfloor z \rfloor + \{ z \})$, where $B = (b_1,\ldots,b_m) \in \mathbb{Z}^{m \times m}$. Because the vectors $(x + \Lambda) \cap X_A$ constitute a $\Delta$-submodular system and since $\card{\det(b_1,\ldots,b_m)} = \Delta$, the set of vectors $\{ \lfloor z \rfloor + \{ z \} : z \in (x + \Lambda) \cap X_A \}$ are a $1$-submodular system. For the residue class $\Lambda$, this system is given by $\{ \lfloor z \rfloor : z \in \Lambda \cap X_A \} \subseteq \{-1,0,1\}^m$ and moreover has full rank as it contains $e_1,\ldots,e_m$, and we are thus in the setting of the classical Heller constant $\h(1,m)$. For the $\Delta - 1$ non-trivial residue classes $x + \Lambda$, $x \notin \Lambda$, we are in the setting of the refined shifted Heller constant $\hsd{\Delta}{m}$. Indeed, as the matrix with columns $\{b_1,\ldots,b_m\} \cup \left((x + \Lambda)\cap X_A\right) \subseteq X_A$ is $\Delta$-submodular, the matrix with columns \[ \{e_1,\ldots,e_m\} \cup \left\{ \lfloor z \rfloor + \{ z \} : z \in (x + \Lambda) \cap X_A \right\} \] has all its minors, of any size, bounded by~$1$ in absolute value. By the definition of $\hsd{\Delta}{m}$, the second set in this union has at most $\hsd{\Delta}{m}$ elements. As a consequence, we get $n = \card{X_A} \leq \h(1,m) + (\Delta-1) \cdot \hsd{\Delta}{m}$, as desired. \end{proof} \begin{remark}\ \begin{enumerate}[label=(\roman*)] \item The proof above shows that we actually want to bound the number of columns~$n$ of a matrix $A \in \{-1,0,1\}^{m \times n}$ such that the system \[ \{e_1,\ldots,e_m\} \cup \{t+A_1, \ldots, t + A_n\} \] is $1$-submodular, for some $t \in [0,1)^m \setminus \{\mathbf{0}\}$. However, $t+A$ is totally $1$-submodular if and only if $\{e_1,\ldots,e_m\} \cup (t+A)$ is $1$-submodular. \item As any matrix $A \in \{-1,0,1\}^{m \times n}$ with pairwise distinct columns can have at most $3^m$ columns, one trivially gets the bound $\hs(m) \leq 3^m$. Thus, \Cref{lem:residue-class-approach} directly implies the estimate $\h(\Delta,m) \leq 3^m \cdot \Delta$. \end{enumerate} \end{remark} \subsection{Small Dimensions and Lower Bounds in the Shifted Setting} \label{sec:lower-bounds} Recall that the original Heller constant is given by $\h(1,m) = m^2 + m + 1$. The following exact results for dimensions two and three show the difference between this original (unshifted) and the shifted setting grasped by~$\hs(m)$. Note that as in the shifted setting we require $t \neq \mathbf{0}$, the Heller constant $\h(1,m)$ is not a lower bound on the shifted Heller constant $\hs(m)$. \begin{proposition} \label{prop:shifted-Heller-dim-2-and-3} We have $\hs(2) = 6$ and $\hs(3) = 12$. \end{proposition} \begin{proof} First, we show that $\hs(2) = 6$. Let $A \in \{-1,0,1\}^{2 \times n}$ have distinct columns and let $t \in [0,1)^2 \setminus \{\mathbf{0}\}$ be such that $t+A$ is totally $1$-submodular. Since $t \neq \mathbf{0}$, it has a non-zero coordinate, say $t_1 > 0$. As the $1\times1$ minors of $t+A$, that is, the entries of $t+A$, are bounded in absolute value by~$1$, we get that the first row of $A$ can only have entries in $\{-1,0\}$. This shows already that $n \leq 6$, as there are simply only $6$ options for the columns of~$A$ respecting this condition. An example attaining this bound is given by \[ A = {\small \left[\!\begin{array}{rrr|rrr} -1 & -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & 1 & -1 & \phantom{-}0 & \phantom{-}1 \end{array}\!\right]} \quad\textrm{ and }\quad t = {\small \begin{bmatrix} 1/2 \\ 0 \end{bmatrix}}. \] One can check that (up to permutations of rows and columns) this is actually the unique example $(A,t)$ with $6$ columns in~$A$. Now, we turn our attention to proving $\hs(3) = 12$. The lower bound follows by the existence of the following matrix and translation vector \[ A = {\small \left[\!\begin{array}{rrr|rrr|rrr|rrr} -1 & -1 & -1 & -1 & -1 & -1 & 0 & 0 & 0 & 0 & \phantom{-}0 & \phantom{-}0 \\ -1 & -1 & -1 & 0 & 0 & 0 & -1 & -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & 1 & -1 & 0 & 1 & -1 & 0 & 1 & -1 & 0 & 1 \end{array}\!\right]} \ ,\ t = {\small \begin{bmatrix} 1/2 \\ 1/2 \\ 0 \end{bmatrix}}. \] Checking that $t+A$ is indeed totally $1$-submodular is a routine task that we leave to the reader. For the upper bound, let $A \in \{-1,0,1\}^{3 \times n}$ and $t \in [0,1)^3 \setminus \{\mathbf{0}\}$ be such that $t+A$ is totally $1$-submodular. Let~$s$ be the number of non-zero entries of~$t \neq \mathbf{0}$. Just as we observed for $\hs(2)$, we get that there are~$s \geq 1$ rows of~$A$ only containing elements from~$\{-1,0\}$. Thus, if $s=3$ there are only $2^3 = 8$ possible columns and if $s=2$, there are only $2^2 \cdot 3 = 12$ possible columns, showing that $n \leq 12$ in both cases. We are left with the case that $s=1$, and we may assume that~$A$ has no entry equal to~$1$ in the first row and that $t_1 > 0$. Assume for contradiction that $n \geq 13$. There must be $\ell \geq 7$ columns of~$A$ with the same first coordinate, which we subsume into the submatrix~$A'$. By the identity $\h(1,2) = 7$ applied to the last two rows, and $t_2 = t_3 = 0$, we must have $\ell = 7$ and up to permutations and multiplication of any of the last two rows by $-1$, $A' = {\tiny \left[\!\begin{array}{*{7}r} a & a & a & a & a & a & a \\ 0 & 1 & 0 & -1 & 0 & 1 & -1 \\ 0 & 0 & 1 & 0 & -1 & -1 & 1 \end{array}\!\right]}$, for some $a \in \{-1,0\}$. Since the absolute values of the $2 \times 2$ minors of $t+A$ are bounded by~$1$, the remaining $n-\ell \geq 6$ columns of~$A$ are different from $(b,1,1)^\intercal$ and $(b,-1,-1)^\intercal$, where $b$ is such that $\{a,b\} = \{-1,0\}$. Under these conditions, we find that~$A$ contains either $B = {\tiny \left[\!\begin{array}{*{3}r} -1 & -1 & 0 \\ 1 & 0 & 1 \\ 0 & -1 & -1 \end{array}\!\right]}$, $B' = {\tiny \left[\!\begin{array}{*{3}r} -1 & -1 & 0 \\ -1 & 0 & -1 \\ 0 & 1 & 1 \end{array}\!\right]}$, $C = {\tiny \left[\!\begin{array}{*{3}r} 0 & 0 & -1 \\ 1 & 0 & 1 \\ 0 & -1 & -1 \end{array}\!\right]}$ or $C' = {\tiny \left[\!\begin{array}{*{3}r} 0 & 0 & -1 \\ -1 & 0 & -1 \\ 0 & 1 & 1 \end{array}\!\right]}$ as a submatrix. However, both the conditions $\card{\det(t+B)} \leq 1$ and $\card{\det(t+B')} \leq 1$ give $t_1 \geq 1$, and both $\card{\det(t+C)} \leq 1$ and $\card{\det(t+C')} \leq 1$ give $t_1 \leq 0$. Hence, in either case we get a contradiction to the assumption that $0 < t_1 < 1$. \end{proof} Combining \Cref{lem:residue-class-approach}, the identity $\h(1,m) = m^2 + m + 1$, and \Cref{prop:shifted-Heller-dim-2-and-3} yields the bounds $\h(\Delta,2) \leq 6 \Delta + 1$ and $\h(\Delta,3) \leq 12 \Delta + 1$. The latter bound improves upon the bound~\eqref{eqn:lee-et-al-bound} of Lee et al. However, as $\h(\Delta,2) = 4 \Delta + 3$ by~\eqref{eqn:lee-et-at-exact}, we see that the approach via the shifted Heller constant~$\hs(m)$ cannot give optimal results for all~$m$. A quadratic lower bound on $\hs(m)$ can be obtained as follows: \begin{proposition} \label{prop:shifted-heller-lower-bound} For every $m \in \mathbb{Z}_{>0}$, we have \[ \hs(m) \geq \h(1,m-1) = m(m-1)+1. \] \end{proposition} \begin{proof} Let $A' \in \{-1,0,1\}^{(m-1) \times n}$ be a totally unimodular matrix with $n = \h(1,m-1)$ columns, and let $A \in \{-1,0,1\}^{m \times n}$ be obtained from~$A'$ by simply adding a zero-row as the first row. Then, for the translation vector $t = (\frac{1}{m},0,\ldots,0)^\intercal$ the matrix $t+A$ is totally $1$-submodular. Indeed, we only need to look at its $k \times k$ minors, for $k \leq m$, that involve the first row, as~$A'$ is totally unimodular by choice. But then, the triangle inequality combined with developing the given minor by the first row, shows that its absolute value is bounded by~$1$. \end{proof} The proof shows that the same lower bound holds for the refined shifted Heller constant $\hsd{\mathit{m}}{m}$. Note that the denominators of the allowed translation vectors for this constant depend on~$m$ though. \section{Polynomial Upper Bounds on \texorpdfstring{$\hsd{\Delta}{m}$}{h\_s\textasciicircum\textDelta(m)} and \texorpdfstring{$\hs(m)$}{h\_s(m)}} \label{sec:poly-bound-shifted-heller} An elegant and alternative proof for Heller's result that $\h(1,m) = m^2 + m + 1$ has been suggested by Bixby \& Cunningham~\cite{bixbycunningham1987short} and carried out in detail in Schrijver's book~\cite[\S~21.3]{schrijver1986theory}. They first reduce the problem to consider only the supports of the columns of a given (totally) unimodular matrix and then apply Sauer's Lemma from extremal set theory that guarantees the existence of a large cardinality set that is shattered by a large enough family of subsets of~$[m]$. We show that this approach can in fact be adapted for the shifted Heller constant $\hs(m)$. The additional freedom in the problem that is introduced by the translation vectors $t \in [0,1)^m \setminus \{\mathbf{0}\}$ makes the argument a bit more involved, but still gives a low degree polynomial bound. To this end, we write $\supp(y) := \left\{ j \in [m] : y_j \neq 0 \right\}$ for the \emph{support} of a vector $y \in \mathbb{R}^m$ and \[ \mathcal{E}_A := \left\{ \supp(A_i) : i \in [n] \right\} \subseteq 2^{[m]} \] for the family of supports in a matrix~$A \in \mathbb{R}^{m \times n}$ with columns $A_1,\ldots,A_n$. We use the notation~$2^Y$ for the power set of a finite set~$Y$. Just as in the unshifted Heller setting, each support can be realized by at most two columns of~$A$, if there exists a translation vector $t \in [0,1)^m$ such that $t+A$ is totally $1$-submodular. \begin{proposition} \label{prop:shifted-heller-supports} Let $A \in \{-1,0,1\}^{m \times n}$ and $t \in [0,1)^m$ be such that $\Delta_k(t + A) \leq 1$, for $k \in \{1,2\}$. Then, each $E \in \mathcal{E}_A$ is the support of at most two columns of~$A$. \end{proposition} \begin{proof} Observe that in view of the condition $\Delta_1(t+A) \leq 1$ and the assumption that $t_i \geq 0$, for every $i \in [m]$, we must have $t_r = 0$, as soon as there is an entry equal to~$1$ in the $r$th row of~$A$. Now, assume to the contrary that there are three columns $A_i,A_j,A_k$ of~$A$ having the same support $E \in \mathcal{E}_A$. Then, clearly $\card{E} \geq 2$ and the restriction of the matrix~$(A_i,A_j,A_k) \in \{-1,0,1\}^{m \times 3}$ to the rows indexed by~$E$ is a $\pm 1$-matrix. Also observe that there must be two rows $r,s \in E$ so that~$(A_i,A_j,A_k)$ contains an entry equal to~$1$ in both of these rows. Indeed, if there is at most one such row, then the columns~$A_i$, $A_j$, $A_k$ cannot be pairwise distinct. Therefore, we necessarily have $t_r = t_s = 0$. Now, there are two options. Either two of the columns $A_i,A_j,A_k$ are such that their restriction to the rows~$r,s$ give linearly independent $\pm 1$-vectors. This however would yield a $2 \times 2$ submatrix of $t+A$ with minor $\pm 2$, contradicting that $\Delta_2(t+A) \leq 1$. In the other case, the restriction of the three columns to the rows~$r,s$ has the form $\pm{\tiny\begin{bmatrix}1 & 1 & 1 \\ 1 & 1 & 1 \end{bmatrix}}$ or $\pm{\tiny\begin{bmatrix}1 & 1 & -1 \\ 1 & 1 & -1\end{bmatrix}}$, up to permutation of the indices~$i,j,k$. If $\card{E} = 2$, then this cannot happen as~$A$ is assumed to have pairwise distinct columns. So, $\card{E} \geq 3$, and considering the columns, say $A_i,A_j$, which agree in the rows~$r,s$, there must be another index $\ell \in E \setminus \{r,s\}$ such that $(A_i)_\ell = 1$ and $(A_j)_\ell = -1$, or vice versa. In any case this means that also $t_\ell = 0$ and that there is a $2 \times 2$ submatrix of~$t+A$ in the rows~$r,\ell$ consisting of linearly independent $\pm 1$-vectors. Again this contradicts that $\Delta_2(t+A) \leq 1$, and thus proves the claim. \end{proof} As mentioned above, this observation on the supports allows to use \emph{Sauer's Lemma} from extremal set theory which we state for the reader's convenience.\footnote{Sauer's Lemma was used already by Glanzer, Weismantel \& Zenklusen~\cite[Lem.~3.4]{glanzerweismantelzenklusen2018onthenumber} for the sake of bounding the number of columns in a $\Delta$-submodular matrix.} It was independently published by Sauer~\cite{sauer1972onthedensity} and Shelah~\cite{shelah1972acombinatorial} (who also credits M.~Perles) in 1972, and again independently by Vapnik \& Chervonenkis~\cite{vapnikchervonenkis1971onthe} a few years earlier. \begin{lemma} \label{lem:sauer-lemma} Let $m,k \in \mathbb{Z}_{>0}$ be such that $m > k$. If $\mathcal{E} \subseteq 2^{[m]}$ is such that $ \card{\mathcal{E}} > \binom{m}{0} + \binom{m}{1} + \ldots + \binom{m}{k}, $ then there is a subset $Y \subseteq [m]$ with $k+1$ elements that is \emph{shattered by~$\mathcal{E}$}, meaning that $\left\{ E \cap Y : E \in \mathcal{E} \right\} = 2^Y$. \end{lemma} Now, the strategy to bounding the number of columns in a matrix $A \in \{-1,0,1\}^{m \times n}$ such that $t+A$ is totally $1$-submodular for some $t \in [0,1)^m$ is to use the inequality $|\mathcal{E}_A| \geq \frac12 n$, which holds by \Cref{prop:shifted-heller-supports}, and then to argue by contradiction. Indeed, if $n > 2 \sum_{i=0}^{k-1} \binom{m}{i}$, then by Sauer's Lemma there would be a $k$-element subset $Y \subseteq [m]$ that is shattered by~$\mathcal{E}_A$. In terms of the matrix~$A$, this means that (possibly after permuting rows or columns) it contains a submatrix of size $k \times 2^k$ which has exactly one column for each of the~$2^k$ possible supports and where in each column the non-zero entries are chosen arbitrarily from~$\{-1,1\}$. For convenience we call any such matrix a \emph{Sauer Matrix} of size~$k$. For concreteness, a Sauer Matrix of size~$3$ is of the form \[ \left[\!\begin{array}{*8{c}} 0 & \pm 1 & 0 & 0 & \pm 1 & \pm1 & 0 & \pm 1 \\ 0 & 0 & \pm 1 & 0 & \pm 1 & 0 & \pm 1 & \pm 1 \\ 0 & 0 & 0 & \pm 1 & 0 & \pm 1 & \pm 1 & \pm 1 \end{array}\!\right], \] for any choice of signs. The combinatorial proof of $\h(1,m) = m^2+m+1$ is based on the fact that \begin{align} \textrm{No Sauer Matrix of size } 3 \textrm{ is totally } 1\textrm{-submodular.}\label{eqn:no-TU-Sauer-Matrix-size-3} \end{align} This is discussed in Schrijver~\cite[\S 21.3]{schrijver1986theory}, Bixby \& Cunningham~\cite{bixbycunningham1987short}, and Tutte~\cite{tutte1958ahomotopy}, and also implicitly in the analysis of the first equation on page 1361 of Heller's paper~\cite{heller1957onlinear}. In order to extend this kind of argument to the (refinded) shifted setting, we need some more notation. \begin{definition} \label{def:feasible-sauer-matrices} Let $S$ be a Sauer Matrix of size~$k$. We say that a vector $r \in [0,1)^k$ is \emph{feasible for~$S$} if $r+S$ is totally $1$-submodular. Further, we say that~$S$ is \emph{feasible for translations} if there exists a vector $r \in [0,1)^k$ that is feasible for~$S$, and otherwise we say that~$S$ is \emph{infeasible for translations}. Moreover, the Sauer Matrix~$S$ is said to be \emph{of type $(s,k-s)$}, if there are exactly~$s$ rows in~$S$ that contain at least one entry equal to~$1$. \end{definition} Note that there is (up to permuting rows or columns) only one Sauer Matrix of type~$(0,k)$. As feasibility of a Sauer Matrix of type $(s,k-s)$ is invariant under permuting rows, we always make the assumption that each of its first~$s$ rows contains an entry equal to~$1$. \begin{proposition} \label{prop:sauer-matrix-condition} Let $m,k,\Delta \in \mathbb{Z}_{>0}$ be such that $m > k$. \begin{enumerate}[label=(\roman*)] \item If no Sauer Matrix of size~$k$ is feasible for translations, then \[ \hs(m) \leq 2 \cdot \sum_{i=0}^{k-1} \binom{m}{i} \in \mathcal{O}(m^{k-1}). \] \item If no Sauer Matrix~$S$ of size~$k$ admits a translation vector $t \in [0,1)^k \cap (\frac{1}{\Delta} \mathbb{Z})^k \setminus \{\mathbf{0}\}$ such that $t+S$ is totally $1$-submodular, then \[ \hsd{\Delta}{m} \leq 2 \cdot \sum_{i=0}^{k-1} \binom{m}{i} \in \mathcal{O}(m^{k-1}). \] \end{enumerate} \end{proposition} \begin{proof} (i): Assume for contradiction that there is a matrix $A \in \{-1,0,1\}^{m \times n}$ and a translation vector $t \in [0,1)^m$ such that $t+A$ is totally $1$-submodular and $n > 2 \sum_{i=0}^{k-1} \binom{m}{i}$. By Proposition~\ref{prop:shifted-heller-supports}, we have $|\mathcal{E}_A| \geq \frac12 n > \sum_{i=0}^{k-1} \binom{m}{i}$ and thus by Sauer's Lemma (up to permuting rows or columns) the matrix~$A$ has a Sauer Matrix~$S$ of size~$k$ as a submatrix. Writing $r \in [0,1)^k$ for the restriction of~$t$ to the~$k$ rows of~$A$ in which we find the Sauer Matrix~$S$, we get that by the total $1$-submodularity of $t+A$, the matrix $r+S$ necessarily must be totally $1$-submodular as well. This however contradicts the assumption. (ii): The argument is analogous to the one given for part (i). \end{proof} In contrast to the unshifted setting, for the sizes~$3$ and~$4$, there are Sauer Matrices~$S$ and vectors~$r$, such that $r+S$ is totally $1$-submodular. Consider, for instance, for size~$3$ the pair \[ S = {\small \left[\!\begin{array}{*{8}r} 0 & -1 & 0 & 0 & -1 & -1 & 0 & -1 \\ 0 & 0 & -1 & 0 & -1 & 0 & -1 & -1 \\ 0 & 0 & 0 & -1 & 0 & -1 & -1 & -1 \end{array}\!\right]} \,,\, r = {\small \begin{bmatrix} 1/2 \\ 1/2 \\ 1/2 \end{bmatrix}} , \] and, for size~$4$ the pair \[ S = {\tiny \left[\!\begin{array}{*{16}r} 0 & -1 & 0 & 0 & 0 & -1 & -1 & -1 & 0 & 0 & 0 & -1 & -1 & -1 & 0 & -1 \\ 0 & 0 & -1 & 0 & 0 & -1 & 0 & 0 & -1 & -1 & 0 & -1 & -1 & 0 & -1 & -1 \\ 0 & 0 & 0 & -1 & 0 & 0 & -1 & 0 & -1 & 0 & -1 & -1 & 0 & -1 & -1 & -1 \\ 0 & 0 & 0 & 0 & -1 & 0 & 0 & -1 & 0 & -1 & -1 & 0 & -1 & -1 & -1 & -1 \end{array}\!\right]} \,,\, \] and $r = (\frac12,\frac12,\frac12,\frac12)^\intercal$. In both cases, $2(r+S)$ is a matrix all of whose entries are either~$1$ or~$-1$. By Hadamard's inequality, the determinant of any $\pm 1$-matrix of size~$k \leq 4$ is at most~$2^k$, and thus $\Delta_k(r+S) \leq 1$ for all $k \leq 4$, in the two examples above. Our aim is to show that this pattern does not extend to higher dimensions. In particular, we prove that no Sauer Matrix of size~$5$ is feasible for translations, which leads to \Cref{thm:polynomial-linear}~(\romannumeral1), and that feasible vectors for Sauer Matrices of size~$4$ must have all its entries in $\{0,\frac12\}$ leading to \Cref{thm:polynomial-linear}~(\romannumeral2). The proof requires a more detailed study of Sauer Matrices of special types and sizes~$4$ and~$5$. \begin{proposition} \label{prop:Sauer-size-4} Let $S$ be a Sauer Matrix of size~$4$ and let $r \in [0,1)^4$ be feasible for~$S$. \begin{enumerate}[label=(\roman*)] \item If $S$ is of type~$(0,4)$, then $r = (\frac12,\frac12,\frac12,\frac12)^\intercal$. \item If $S$ is of type~$(1,3)$, then $r = (0,\frac12,\frac12,\frac12)^\intercal$. \item If $S$ is of type~$(2,2)$, then $r = (0,0,\frac12,\frac12)^\intercal$. \item If $S$ is of type~$(3,1)$ or~$(4,0)$, then~$S$ is infeasible for translations. \end{enumerate} \end{proposition} \begin{proposition} \label{prop:sauer-matrix-infeasibility-size-5} There does not exist a Sauer Matrix $S$ of size~$5$ and a translation vector $r \in [0,1)^5$ such that $r+S$ is totally $1$-submodular. \end{proposition} \noindent The proof of these statements is based on identifying certain full-rank submatrices of the respective Sauer Matrix for which the minor condition provides a strong obstruction for feasibility. The technical details are given in \Cref{sec:sauer-matrix-proof}. With these preparations we are now able to prove our main result. \begin{proof}[{\Cref{thm:polynomial-linear}}] (i): In view of \Cref{lem:residue-class-approach}, we have $\h(\Delta,m) \leq \h(1,m) + (\Delta - 1) \cdot \hs(m)$. The claimed bound now follows by Heller's identity $\h(1,m) = m^2 + m + 1$ and the fact that $\hs(m) \leq 2 \sum_{i=0}^4 \binom{m}{i}$, which holds by combining \Cref{prop:sauer-matrix-condition}~(\romannumeral1) and \Cref{prop:sauer-matrix-infeasibility-size-5}. (ii): Again, in view of \Cref{lem:residue-class-approach}, we have $\h(\Delta,m) \leq \h(1,m) + (\Delta - 1) \cdot \hsd{\Delta}{m}$. By \Cref{prop:Sauer-size-4}, for every Sauer Matrix~$S$ of size~$4$, any vector $t \in [0,1)^4$ such that $t+S$ is totally $1$-submodular has all its coordinates in~$\{0,\frac12\}$. If $\Delta$ is odd, then using \Cref{prop:coefficients}, such translation vectors are excluded from the definition of $\hsd{\Delta}{m}$. Thus, by \Cref{prop:sauer-matrix-condition}~(\romannumeral2), we get $\hsd{\Delta}{m} \leq 2 \sum_{i=0}^3 \binom{m}{i}$, which together with Heller's identity $\h(1,m) = m^2 + m + 1$ proves the claimed bound. \end{proof} \section{Feasibility of Sauer Matrices in Low Dimensions} \label{sec:sauer-matrix-proof} Here, we complete the discussion from the previous section and give the technical details and the proof of \Cref{prop:Sauer-size-4,prop:sauer-matrix-infeasibility-size-5}. Parts of the arguments are based on the fact that the condition $\card{\det(r+M)} \leq 1$, for any $M \in \mathbb{R}^{k \times k}$, is equivalent to a pair of linear inequalities in the coordinates of~$r \in \mathbb{R}^k$. This turns the question on whether a given Sauer Matrix is feasible for translations into the question of whether an associated polyhedron is non-empty. To this end, let $S \in \{-1,0,1\}^{k \times 2^k}$ be a Sauer Matrix of size~$k$ and consider the set \[ \mathcal{P}(S) = \left\{ r \in [0,1]^k : \Delta_\ell(r+S) \leq 1 \textrm{ for each } 1 \leq \ell \leq k \right\} \] of feasible vectors for~$S$ in the unit cube $[0,1]^k$. \begin{proposition} \label{prop:polyhedrality-feasible-set} For every Sauer Matrix~$S$, the set $\mathcal{P}(S)$ is a polytope. \end{proposition} \begin{proof} A vector $r \in [0,1]^k$ is contained in~$\mathcal{P}(S)$ if and only if $\card{\det(r_I+S_{I,J})} \leq 1$, for every $I \subseteq [k]$ and $J \subseteq [2^k]$ with $\card{I} = \card{J} = \ell$ and $1 \leq \ell \leq k$, and where~$r_I$ denotes the subvector of~$r$ with coordinates indexed by~$I$ and $S_{I,J}$ denotes the submatrix of~$S$ with rows and columns indexed by~$I$ and~$J$, respectively. Now, in general, for an $\ell \times \ell$ matrix~$A$ with columns $a_1,\ldots,a_\ell$ and a vector $t \in \mathbb{R}^\ell$, we have \begin{align} \det(t+A) = \det(t + a_1,\ldots,t + a_\ell) = \det\left( \begin{matrix} a_1 & \ldots & a_\ell & -t \\ 1 & \ldots & 1 & 1 \end{matrix} \right).\label{eqn:linearity-det-A-t} \end{align} Therefore, the multilinearity of the determinant translates the condition $\card{\det(r_I+S_{I,J})} \leq 1$ into a pair of linear inequalities in the entries of~$r$. \end{proof} \subsection{Sauer Matrices of size 3} We start by illustrating the polyhedrality of $\mathcal{P}(S)$ on the Sauer Matrix $S_{(0,3)}$ of type $(0,3)$. Note that the columns of $-S_{(0,3)}$ are given by the eight~$0/1$ vectors $\{0,1\}^3$. Further, for any $3 \times 3$ submatrix $A = (a_1,a_2,a_3)$ of $S_{(0,3)}$, we have \[ \card{\det(t+A)} = \card{\det(-a_1 - t,-a_2 - t,-a_3 - t)} = 6 \vol(\conv\{-a_1,-a_2,-a_3,t\}), \] so the condition $\card{\det(t+A)} \leq 1$ is a condition on the volume of the simplex in~$[0,1]^3$ with vertices $-a_1,-a_2,-a_3,t$. It is straightforward to see that the only case in which this imposes a condition on~$t$ is when the vertices $-a_1,-a_2,-a_3 \in \{0,1\}^3$ are chosen such that they are pairwise not connected by an edge of the cube. Also the $2 \times 2$ minors of $t+S_{(0,3)}$ do not further restrict the feasibility of~$t$ and in summary, we thus get \begin{align} \mathcal{P}(S_{(0,3)}) &= \Big\{ r \in [0,1]^3 : 1 \leq r_1 + r_2 + r_3 \leq 2 , \ 0 \leq -r_1 + r_2 + r_3 \leq 1 , \nonumber \\ &\phantom{= \Big\{ r \in [0,1]^3 :\ }\,0 \leq r_1 - r_2 + r_3 \leq 1 , \ 0 \leq \phantom{-}r_1 + r_2 - r_3 \leq 1 \,\Big\} \nonumber\\ &= \conv\left\{ {\small\begin{bmatrix} 0 \\ 1/2 \\ 1/2 \end{bmatrix}}, {\small\begin{bmatrix} 1/2 \\ 0 \\ 1/2 \end{bmatrix}}, {\small\begin{bmatrix} 1/2 \\ 1/2 \\ 0 \end{bmatrix}}, {\small\begin{bmatrix} 1 \\ 1/2 \\ 1/2 \end{bmatrix}}, {\small\begin{bmatrix} 1/2 \\ 1 \\ 1/2 \end{bmatrix}}, {\small\begin{bmatrix} 1/2 \\ 1/2 \\ 1 \end{bmatrix}}\right\}. \label{eqn:P-Sauer-type-03} \end{align} This is a regular crosspolytope with each of its vertices being the center of a facet of the cube~$[0,1]^3$. Our second goal is to characterize the feasible vectors for Sauer Matrices of size~$3$ and type~$(1,2)$. \begin{proposition} \label{prop:Sauer-size-3-type-1-2} Let $S$ be a Sauer Matrix of type~$(1,2)$, that is, \[ S = \left[\!\begin{array}{*8{c}} 0 & \pm 1 & 0 & 0 & \pm 1 & \pm1 & 0 & \pm 1 \\ 0 & 0 & - 1 & 0 & - 1 & 0 & - 1 & - 1 \\ 0 & 0 & 0 & - 1 & 0 & - 1 & - 1 & - 1 \end{array}\!\right] \] for any signs and such that at least one entry in the first row of~$S$ equals~$1$. Let $\sigma \in \{+,-\}^4$ be the sign vector of the non-zero entries in the first row of~$S$, and let $r \in [0,1)^3$ be feasible for~$S$. \begin{enumerate}[label=(\roman*)] \item If $\sigma \in \left\{ (+,-,+,-) , (-,+,-,+) \right\}$, then $r \in \conv\left\{ (0,\frac14,\frac12)^\intercal , (0,\frac34,\frac12)^\intercal \right\}$. \item If $\sigma \in \left\{ (+,+,-,-) , (-,-,+,+) \right\}$, then $r \in \conv\left\{ (0,\frac12,\frac14)^\intercal , (0,\frac12,\frac34)^\intercal \right\}$. \item If $\sigma$ is different from any of those in parts~(i) and~(ii), then $r = (0,\frac12,\frac12)^\intercal$. \end{enumerate} \end{proposition} \begin{proof} We start with some general observations: By assumption, we have $r_1 = 0$ in any case, because there is an entry equal to~$1$ in the first row of~$S$. This means that the possibilities for feasible vectors~$r$ are not affected by possibly negating the first row of~$S$. It thus suffices to consider only those~$\sigma$ with $\sigma_1 = +$, and we make this assumption throughout the following. Now, for any $i,j \in \{1,2,3\}$ and any $k,\ell \in \{1,2,\ldots,8\}$, we denote by $S_{ij,k\ell}$ the $2 \times 2$ submatrix of~$S$ with entries in rows either~$i$ or~$j$ and columns either~$k$ or~$\ell$. With this notation and the condition $\Delta_2(r+S) \leq 1$ on the minors of size~$2$, we obtain: \begin{enumerate}[label=(C12)] \item[(C$_{12}$)] If $\sigma_2 \neq \sigma_1$, then $r+S$ contains ${\small\begin{bmatrix} 0 \\ r_3 \end{bmatrix}}+S_{13,25} = \left[\!\begin{array}{*2{c}} \pm 1 & \mp 1 \\ r_3 & r_3 \end{array}\!\right]$, which implies $r_3 \leq \frac12$. \item[(C$_{13}$)] If $\sigma_3 \neq \sigma_1$, then $r+S$ contains ${\small\begin{bmatrix} 0 \\ r_2 \end{bmatrix}}+S_{12,26} = \left[\!\begin{array}{*2{c}} \pm 1 & \mp 1 \\ r_2 & r_2 \end{array}\!\right]$, which implies $r_2 \leq \frac12$. \item[(C$_{24}$)] If $\sigma_2 \neq \sigma_4$, then $r+S$ contains ${\small\begin{bmatrix} 0 \\ r_2 \end{bmatrix}}+S_{12,58} = \left[\!\begin{array}{*2{c}} \pm 1 & \mp 1 \\ r_2 - 1 & r_2 - 1 \end{array}\!\right]$, which implies $r_2 \geq \frac12$. \item[(C$_{34}$)] If $\sigma_3 \neq \sigma_4$, then $r+S$ contains ${\small\begin{bmatrix} 0 \\ r_3 \end{bmatrix}}+S_{13,68} = \left[\!\begin{array}{*2{c}} \pm 1 & \mp 1 \\ r_3 - 1 & r_3 - 1 \end{array}\!\right]$, which implies $r_3 \geq \frac12$. \end{enumerate} Finally, for any indices $i,j,k \in \{1,2,\ldots,8\}$, we denote by $S_{ijk}$ the $3 \times 3$ submatrix of~$S$ consisting of its columns indexed by~$i,j$, and~$k$. {\bfseries (i)}: Let $\sigma = (+,-,+,-)$. As the first two and the last two entries of~$\sigma$ differ, in view of the conditions (C$_{12}$) and (C$_{34}$), we get $r_3 = \frac12$. Since $\sigma_1 = +$ and $\sigma_2 = -$, the matrix $r+S$ contains $r+S_{245} = \left[\!\begin{array}{*3{c}} 1 & 0 & -1 \\ r_2 & r_2 & r_2 - 1 \\ r_3 & r_3 - 1 & r_3 \end{array}\!\right]$, for which the condition $\Delta_3(t+S) \leq 1$ yields $2r_2 + r_3 \leq 2$, and thus $r_2 \leq \frac34$. Similarly, $r+S$ also contains $r+S_{257} = \left[\!\begin{array}{*3{c}} 1 & -1 & 0 \\ r_2 & r_2 - 1 & r_2 - 1 \\ r_3 & r_3 & r_3 - 1 \end{array}\!\right]$, for which the condition $\Delta_3(t+S) \leq 1$ yields $2r_2 - r_3 \geq 0$, and thus $r_2 \geq \frac14$. {\bfseries (ii)}: Since interchanging the last two rows of~$S$ means to interchange $\sigma_2$ and $\sigma_3$, and since this change of rows in~$S$ translates into exchanging the coordinates~$r_2$ and~$r_3$, the claim follows by~(i). {\bfseries (iii)}: By negating the first row of~$S$, the case $\sigma = (+,+,+,+)$ corresponds to the Sauer Matrix $S_{(0,3)}$ of type~$(0,3)$ with the additional restriction that $r_1 = 0$. In view of the characterization~\eqref{eqn:P-Sauer-type-03} of its feasible vectors, this leaves as the only possibility $r = (0,\frac12,\frac12)^\intercal$, as claimed. So, we may assume that at least one of the coordinates $\sigma_2,\sigma_3,\sigma_4$ equals~$-$. First, assume that $\sigma_1 = \sigma_4 = +$. If $\sigma_2 = -$, then the submatrix $S_{248}$ of~$S$ yields $r_2 \leq r_3$ via the minor condition $\Delta_3(r+S)$ just as in part~(i). Since by (C$_{12}$) and (C$_{24}$) we have $r_3 \leq \frac12$ and $r_2 \geq \frac12$, respectively, we obtain $r = (0,\frac12,\frac12)^\intercal$, as claimed. An analogous argument works for the case that $\sigma_3 = -$, by using the submatrix~$S_{238}$ of~$S$. Second, assume that $\sigma_4 = - \neq \sigma_1$. The only cases left to consider are those for which $\sigma_2 = \sigma_3$. If $\sigma_2 = \sigma_3 = +$, then by (C$_{24}$) and (C$_{34}$), we get $r_2 \geq \frac12$ and $r_3 \geq \frac12$, respectively. Moreover, using the submatrix~$S_{156}$ of~$S$ as before yields that $r_2 + r_3 \leq 1$ implying the desired $r = (0,\frac12,\frac12)^\intercal$. Again, the case $\sigma_2 = \sigma_3 = -$ is completely analogous, using the conditions (C$_{12}$) and~(C$_{13}$), and the submatrix~$S_{567}$ of~$S$. \end{proof} \subsection{Sauer Matrices of size 4} Based on the knowledge of feasibility of Sauer Matrices of size~$3$, we are now in position to prove \Cref{prop:Sauer-size-4}. Sauer Matrices of the types $(0,4)$, $(3,1)$ and $(4,0)$ are easy to deal with, so let us start with those. \begin{proof}[Proof of \Cref{prop:Sauer-size-4}~(i) and~(iv)] {\bfseries (i)}: Assume that $r \in [0,1)^4$ is such that $r+S$ is totally $1$-submodular, and consider the following two $4 \times 4$ submatrices of~$S$: \begin{align} M = {\tiny \left[\!\begin{array}{r|rrr} 0 & 0 & 0 & 0 \\\hline 0 & 0 & -1 & -1 \\ 0 & -1 & 0 & -1 \\ 0 & -1 & -1 & 0 \end{array}\!\right]} \quad\textrm{ and }\quad N = {\tiny \left[\!\begin{array}{r|rrr} -1 & -1 & -1 & -1 \\\hline -1 & -1 & 0 & 0 \\ -1 & 0 & -1 & 0 \\ -1 & 0 & 0 & -1 \end{array}\!\right]}.\label{eqn:matrix-N} \end{align} By the $4 \times 4$ minor condition on $r+S$, we have \[ \card{\det(r+M)} = r_1 \cdot \det {\tiny \begin{bmatrix} 0 & 1 & 1 \\ 1 & 0 & 1 \\ 1 & 1 & 0 \end{bmatrix}} = 2 r_1 \leq 1, \] and hence $r_1 \leq \frac12$. Likewise, we have \[ \card{\det(r+N)} = (1-r_1) \cdot \det {\tiny \begin{bmatrix} 0 & 1 & 1 \\ 1 & 0 & 1 \\ 1 & 1 & 0 \end{bmatrix}} = 2 (1-r_1) \leq 1, \] and hence $r_1 \geq \frac12$, so that actually $r_1 = \frac12$. Analogous arguments for the other coordinates of~$r$, show that $r = (\frac12,\frac12,\frac12,\frac12)^\intercal$ as claimed. {\bfseries (iv)}: If in the $i$th row of a Sauer Matrix~$S$ there is an entry equal to~$1$, then $r_i=0$, because of $\Delta_1(r+S) \leq 1$. In the types $(3,1)$ and $(4,0)$, the first three rows in~$S$ contain an entry equal to~$1$, so that they contains a Sauer Matrix of size~$3$ that is itself totally $1$-submodular. However, we noted in~\eqref{eqn:no-TU-Sauer-Matrix-size-3} that no such Sauer Matrix exists. \end{proof} \begin{proof}[{Proof of \Cref{prop:Sauer-size-4}~(ii)}] We assume that the first row of each considered Sauer Matrix~$S$ of type $(1,3)$ contains an entry equal to~$1$, so that $r_1 = 0$. We can moreover assume that $(-1,-1,-1,-1)^\intercal$ is a column of~$S$ (by possibly multiplying the first row by~$-1$). We now employ a case distinction based on the signs of the entries in the first row of the columns $a = (\pm 1,-1,0,0)^\intercal$, $b = (\pm1,0,-1,0)^\intercal$, and $c = (\pm1,0,0,-1)^\intercal$ of~$S$. \smallskip \noindent\emph{Case 1:} $a_1 = b_1 = c_1 = -1$. Under this assumption, $S$ contains the matrix~$N$ from~\eqref{eqn:matrix-N} as a submatrix and thus $r_1 \geq \frac12$, contradicting that $r_1 = 0$. \smallskip \noindent\emph{Case 2:} $a_1 = b_1 = c_1 = 1$. In this case, $S$ contains the submatrices \[ A = {\tiny \left[\!\begin{array}{r|rrr} 0 & 1 & 1 & 1 \\\hline 0 & -1 & 0 & 0 \\ 0 & 0 & -1 & 0 \\ 0 & 0 & 0 & -1 \end{array}\!\right]} \quad\textrm{ and }\quad B = {\tiny \left[\!\begin{array}{r|rrr} 0 & 1 & 1 & 1 \\\hline -1 & -1 & 0 & 0 \\ -1 & 0 & -1 & 0 \\ -1 & 0 & 0 & -1 \end{array}\!\right]}. \] The conditions $\card{\det(r+A)} \leq 1$ and $\card{\det(r+B)} \leq 1$ translate into the contradicting inequalities $r_2+r_3+r_4 \leq 1$ and $r_2+r_3+r_4 \geq 2$, respectively. \smallskip \noindent\emph{Case 3:} Exactly two of the entries $a_1,b_1,c_1$ equal~$-1$. Without loss of generality, we may permute the last three rows of~$S$, and assume that $a_1 = b_1 = -1$. We find that $S$ now contains the submatrices \[ C = {\tiny \left[\!\begin{array}{r|rrr} 0 & -1 & -1 & 0 \\\hline 0 & -1 & 0 & 0 \\ 0 & 0 & -1 & 0 \\ 0 & 0 & 0 & -1 \end{array}\!\right]} \,,\, D = {\tiny \left[\!\begin{array}{r|rrr} 0 & -1 & -1 & 0 \\\hline -1 & -1 & 0 & 0 \\ -1 & 0 & -1 & 0 \\ -1 & 0 & 0 & -1 \end{array}\!\right]} \,,\, E = {\tiny \left[\!\begin{array}{r|rrr} -1 & -1 & -1 & 0 \\\hline -1 & -1 & 0 & -1 \\ -1 & 0 & -1 & -1 \\ -1 & 0 & 0 & 0 \end{array}\!\right]}. \] The conditions $\card{\det(r+C)} \leq 1$, $\card{\det(r+D)} \leq 1$ and $\card{\det(r+E)} \leq 1$ translate into the contradicting inequalities $r_2 + r_3 \leq 1$, $r_4 \geq \frac12$, and $r_4 + 1 \leq r_2 + r_3$, respectively. \smallskip \noindent\emph{Case 4:} Exactly two of the entries $a_1,b_1,c_1$ equal~$1$. As in Case~3, we may assume that $a_1 = b_1 = 1$. Here, the following six matrices can be found as submatrices in~$S$: \[ \tiny \left[\!\begin{array}{r|rrr} -1 & 0 & 0 & -1 \\\hline -1 & -1 & 0 & 0 \\ -1 & 0 & -1 & 0 \\ -1 & 0 & 0 & -1 \end{array}\!\right] \ ,\ \left[\!\begin{array}{r|rrr} -1 & 0 & 0 & -1 \\\hline -1 & -1 & -1 & 0 \\ -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & -1 \end{array}\!\right] \ ,\ \left[\!\begin{array}{r|rrr} -1 & 0 & 0 & -1 \\\hline -1 & 0 & 0 & 0 \\ -1 & -1 & -1 & 0 \\ -1 & -1 & 0 & -1 \end{array}\!\right], \] \[ \tiny \left[\!\begin{array}{r|rrr} 0 & 1 & 1 & 0 \\\hline -1 & -1 & 0 & 0 \\ -1 & 0 & -1 & 0 \\ -1 & 0 & 0 & -1 \end{array}\!\right] \ ,\ \left[\!\begin{array}{r|rrr} 0 & 1 & 1 & 0 \\\hline -1 & -1 & 0 & -1 \\ -1 & 0 & -1 & -1 \\ -1 & 0 & 0 & 0 \end{array}\!\right] \ ,\ \left[\!\begin{array}{r|rrr} 0 & 1 & 1 & 0 \\\hline 0 & -1 & 0 & 0 \\ 0 & 0 & -1 & 0 \\ 0 & 0 & 0 & -1 \end{array}\!\right]. \] The minor conditions for these matrices translate into the inequality system \begin{align*} r_4 &\leq \tfrac12 & r_3 &\leq r_2 & r_2 &\leq r_3 \\ r_4 &\geq \tfrac12 & r_2 + r_3 &\geq 1 & r_2 + r_3 &\leq 1 \end{align*} in the same order as the matrices were given above. Solving this system of inequalities shows that necessarily $r_2 = r_3 = r_4 = \frac12$, and the proof is complete. \end{proof} \begin{proof}[{Proof of \Cref{prop:Sauer-size-4}~(iii)}] We write a Sauer Matrix~$S$ of type $(2,2)$ in the form \[ {\small \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} \multicolumn{4}{c|}{$Block 1$} & \multicolumn{4}{c|}{$Block 2$} & \multicolumn{4}{c|}{$Block 3$} & \multicolumn{4}{c}{$Block 4$} \\ \hline 0 & 0 & 0 & 0 & \pm1 & \pm1 & \pm1 & \pm1 & 0 & 0 & 0 & 0 & \pm1 & \pm1 & \pm1 & \pm1 \\ \hline 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & \pm1 & \pm1 & \pm1 & \pm1 & \pm1 & \pm1 & \pm1 & \pm1 \\ \hline 0 & -1 & 0 & -1 & 0 & -1 & 0 & -1 & 0 & -1 & 0 & -1 & 0 & -1 & 0 & -1 \\ 0 & 0 & -1 & -1 & 0 & 0 & -1 & -1 & 0 & 0 & -1 & -1 & 0 & 0 & -1 & -1 \end{array}\!\right]} \] where in each of the first two rows we have at least one entry equal to~$1$. We find four Sauer Matrices of type $(1,2)$ as submatrices of~$S$: \begin{align*} M_{1,1,2} - \textrm{consisting of rows } 1,3,4 \textrm{ and the columns in Block 1 and Block 2}\\ M_{1,3,4} - \textrm{consisting of rows } 1,3,4 \textrm{ and the columns in Block 3 and Block 4}\\ M_{2,1,4} - \textrm{consisting of rows } 2,3,4 \textrm{ and the columns in Block 1 and Block 4}\\ M_{2,2,3} - \textrm{consisting of rows } 2,3,4 \textrm{ and the columns in Block 2 and Block 3} \end{align*} Now, let $r \in [0,1)^4$ be feasible for~$S$. As the first two rows of~$S$ both contain an entry equal to~$1$, we always have $r_1 = r_2 = 0$. We find that $(0,r_3,r_4)^\intercal$ must be a feasible vector for the Sauer Matrices $M_{1,1,2}$, $M_{1,3,4}$, $M_{2,1,4}$, and $M_{2,2,3}$. Using \Cref{prop:Sauer-size-3-type-1-2}, we see that if we want to allow the possibility of $r$ being different from $(0,0,\frac12,\frac12)^\intercal$, then the sign patterns in the $1 \times 4$ blocks $[\pm1,\pm1,\pm1,\pm1]$ in those four matrices must all belong either to $\{(+,-,+,-) , (-,+,-,+)\}$ or to $\{(+,+,-,-) , (-,-,+,+)\}$. Moreover, as $r_1 = r_2 = 0$, we may multiply the first or the second row of~$S$ with $-1$ without loosing the total $1$-submodularity of $r+S$. This means that we may assume that the sign patterns in the $1 \times 4$ blocks corresponding to $(\textrm{Row 1},\textrm{Block 2})$ and $(\textrm{Row 2},\textrm{Block 3})$ are the same. Again as $r_1 = r_2 = 0$, total $1$-submodularity of $r+S$ is also not affected if we exchange the first two rows of~$S$, or Block 2 with Block 3. These reductions show that the only Sauer Matrices of type $(2,2)$ that possibly allow feasible translation vectors $r = (0,0,r_3,r_4)^\intercal$ different from $(0,0,\frac12,\frac12)^\intercal$ have its first two rows given by \begin{align*} R_1 &= \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 & 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 & 1 & -1 & 1 & -1 \end{array}\!\right], \\ R_2 &= \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 & 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 & -1 & 1 & -1 & 1 \end{array}\!\right], \\ R_3 &= \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 & 0 & 0 & 0 & 0 & -1 & 1 & -1 & 1 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & -1 & 1 & -1 & -1 & 1 & -1 & 1 \end{array}\!\right], \end{align*} or by \begin{align*} R_4 &= \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 & 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 & 1 & 1 & -1 & -1 \end{array}\!\right], \\ R_5 &= \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 & 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 & -1 & -1 & 1 & 1 \end{array}\!\right], \\ R_6 &= \left[\!\begin{array}{rrrr|rrrr|rrrr|rrrr} 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 & 0 & 0 & 0 & 0 & -1 & -1 & 1 & 1 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & 1 & -1 & -1 & -1 & -1 & 1 & 1 \end{array}\!\right]. \end{align*} Observe also that for the first three matrices, the feasible vectors are of the form $r = (0,0,r_3,\frac12)^\intercal$, for $\frac14 \leq r_3 \leq \frac34$, whereas for the second three matrices they have the form $r = (0,0,\frac12,r_4)^\intercal$, for $\frac14 \leq r_4 \leq \frac34$. Let us denote the $4 \times 4$ submatrix of~$S$ indexed by the columns $i,j,k,\ell \in \{1,2,\ldots,16\}$ by $S_{i,j,k,\ell}$. \smallskip \noindent\emph{Case 1:} First two rows of~$S$ either $R_1$, $R_2$, or $R_3$, and $r = (0,0,r_3,\frac12)^\intercal$. For $R_1$, applying the condition $\Delta_4(r+S) \leq 1$ to the submatrices $S_{1,6,10,16}$ and $S_{2,5,9,15}$, yields $r_3 \leq \frac12$ and $r_3 \geq \frac12$, respectively. Thus $r = (0,0,\frac12,\frac12)^\intercal$. For $R_2$, applying the condition $\Delta_4(r+S) \leq 1$ to the submatrices $S_{1,5,10,15}$ and $S_{2,6,9,16}$, yields $r_3 \leq \frac12$ and $r_3 \geq \frac12$, respectively. Thus $r = (0,0,\frac12,\frac12)^\intercal$. For $R_3$, the submatrix $S_{1,6,10,14}$ gives determinant $\card{\det(r+S_{1,6,10,14})} = \frac32$, contradicting the condition $\Delta_4(r+S) \leq 1$. Thus, there is no feasible vector $r \in [0,1)^4$ at all in this case. \smallskip \noindent\emph{Case 2:} First two rows of~$S$ either $R_4$, $R_5$, or $R_6$, and $r = (0,0,\frac12,r_4)^\intercal$. For $R_4$, applying the condition $\Delta_4(r+S) \leq 1$ to the submatrices $S_{1,6,10,13}$ and $S_{3,5,9,14}$, yields $r_3 \leq \frac12$ and $r_3 \geq \frac12$, respectively. Thus $r = (0,0,\frac12,\frac12)^\intercal$. For $R_5$, applying the condition $\Delta_4(r+S) \leq 1$ to the submatrices $S_{1,5,10,14}$ and $S_{3,6,9,13}$, yields $r_3 \leq \frac12$ and $r_3 \geq \frac12$, respectively. Thus $r = (0,0,\frac12,\frac12)^\intercal$. For $R_6$, the submatrix $S_{1,7,11,15}$ gives determinant $\card{\det(r+S_{1,6,10,14})} = \frac32$, contradicting the condition $\Delta_4(r+S) \leq 1$. Thus, there is no feasible vector $r \in [0,1)^4$ at all in this case. \smallskip Summarizing our results from above, we see that if a Sauer Matrix of type $(2,2)$ admits a feasible vector $r \in [0,1)^4$, then $r = (0,0,\frac12,\frac12)^\intercal$, as desired. \end{proof} \subsection{Sauer Matrices of size 5} \begin{proposition}\ \label{prop:negative-Sauer-size-5} \begin{enumerate}[label=(\roman*)] \item The Sauer Matrix of type $(0,5)$ is infeasible for translations. \item No Sauer Matrix of type $(1,4)$ is feasible for translations. \item No Sauer Matrix of type $(2,3)$ is feasible for translations. \end{enumerate} \end{proposition} \begin{proof} {\bfseries (i)}: The argument is similar to the one for \Cref{prop:Sauer-size-4}~(\romannumeral1). Assume for contradiction, that there is a vector $r \in [0,1)^5$ with $\Delta_5(r+S) \leq 1$. Consider the following two $5 \times 5$ submatrices of~$S$: \[ X = {\tiny \left[\!\begin{array}{r|rrrr} 0 & 0 & 0 & 0 & 0 \\\hline 0 & 0 & -1 & -1 & -1 \\ 0 & -1 & 0 & -1 & -1 \\ 0 & -1 & -1 & 0 & -1 \\ 0 & -1 & -1 & -1 & 0 \end{array}\!\right]} \quad\textrm{ and }\quad Y = {\tiny \left[\!\begin{array}{r|rrrr} -1 & -1 & -1 & -1 & -1 \\\hline -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]}. \] By the $5 \times 5$ minor condition on $r+S$, we have \[ \card{\det(r+X)} = r_1 \cdot \det {\tiny \begin{bmatrix} 0 & 1 & 1 & 1 \\ 1 & 0 & 1 & 1 \\ 1 & 1 & 0 & 1 \\ 1 & 1 & 1 & 0 \end{bmatrix}} = 3 r_1 \leq 1, \] and hence $r_1 \leq \frac13$. Likewise, we have \[ \card{\det(r+Y)} = (1-r_1) \cdot \det {\tiny \begin{bmatrix} 0 & 1 & 1 & 1 \\ 1 & 0 & 1 & 1 \\ 1 & 1 & 0 & 1 \\ 1 & 1 & 1 & 0 \end{bmatrix}} = 3 (1-r_1) \leq 1. \] Therefore, we get $r_1 \geq \frac23$, a contradiction. {\bfseries (ii)}: Let $S$ be a Sauer Matrix of type $(1,4)$ and without loss of generality, we may assume that the first row of~$S$ contains an entry equal to~$1$. We also assume for contradiction that there is some $r \in [0,1)^5$ such that $r+S$ is totally $1$-submodular. As the entries of $r+S$ are contained in $[-1,1]$, we get that $r_1 = 0$. Moreover, the last four rows of~$S$ contain a Sauer Matrix of type $(0,4)$. By \Cref{prop:Sauer-size-4}~(\romannumeral1), this means that $r_2 = r_3 = r_4 = r_5 = \frac12$, so that in summary there is only one possibility for the translation vector~$r$. Now, as $r_1 = 0$, we may multiply the first row of~$S$ with $-1$ if needed, and can assume that the vector $(-1,-1,-1,-1,-1)^\intercal$ is a column of~$S$. If~$M$ denotes any of the four matrices \begin{align*} &{\tiny \left[\!\begin{array}{r|rrrr} -1 & -1 & 0 & 0 & 0 \\\hline -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right] \,,\, \left[\!\begin{array}{r|rrrr} -1 & 0 & -1 & 0 & 0 \\\hline -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right] \,,} \\ &{\tiny \left[\!\begin{array}{r|rrrr} -1 & 0 & 0 & -1 & 0 \\\hline -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right] \,,\, \left[\!\begin{array}{r|rrrr} -1 & 0 & 0 & 0 & -1 \\\hline -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]\,, } \end{align*} then the absolute value of the determinant of $r+M$ equals~$3/2$. Thus, if indeed $\Delta_5(r+S) \leq 1$, then these matrices cannot be submatrices of~$S$. In particular, this implies that \[ M' = {\tiny \left[\!\begin{array}{r|rrrr} 0 & 1 & 1 & 1 & 1 \\\hline -1 & -1 & 0 & 0 & 0 \\ -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \] must be a submatrix of~$S$. However, the determinant of $r+M'$ equals~$-2$, in contradiction to $r+S$ being totally $1$-submodular. {\bfseries (iii)}: Assume that there is a Sauer Matrix~$S$ of type $(2,3)$ and a vector $r \in [0,1)^5$ that is feasible for~$S$. Observe that~$S$ contains feasible Sauer Matrices of types $(1,3)$ in its rows indexed by~$\{1,3,4,5\}$ and by~$\{2,3,4,5\}$. By \Cref{prop:Sauer-size-4}~(ii) this means that necessarily we have $r = (0,0,\frac12,\frac12,\frac12)^\intercal$, and we can now argue similarly as we did in part~(ii). First of all, as $r_1 = r_2 = 0$, we may multiply the first or second row of~$S$ with $-1$ if needed, and can assume that the vectors $(-1,0,-1,-1,-1)^\intercal$ and $(0,-1,0,0,0)^\intercal$ are columns of~$S$. We distinguish cases based on the signs of the entries in the first or second row of the columns $a = (\pm 1,0,-1,0,0)^\intercal$, $b = (\pm1,0,0,-1,0)^\intercal$, $c = (\pm1,0,0,0,-1)^\intercal$, and $a' = (0,\pm 1,-1,0,0)^\intercal$, $b' = (0,\pm1,0,-1,0)^\intercal$, $c' = (0,\pm1,0,0,-1)^\intercal$ of~$S$. \smallskip \noindent\emph{Case 1:} $a_1 = b_1 = c_1 = 1$ or $a'_2 = b'_2 = c'_2 = -1$. Here, one of the matrices \[ C_1 = {\tiny \left[\!\begin{array}{rr|rrr} 0 & 0 & 1 & 1 & 1 \\ 0 & -1 & 0 & 0 & 0 \\\hline -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \quad \textrm{ or } \quad C_2 = {\tiny \left[\!\begin{array}{rr|rrr} 0 & -1 & 0 & 0 & 0 \\ 0 & 0 & -1 & -1 & -1 \\\hline 0 & -1 & -1 & 0 & 0 \\ 0 & -1 & 0 & -1 & 0 \\ 0 & -1 & 0 & 0 & -1 \end{array}\!\right]} \] must be a submatrix of~$S$, but the absolute value of the determinant of both $r+C_1$ and $r+C_2$ equals $3/2$. \smallskip \noindent\emph{Case 2:} Two of the entries $a_1,b_1,c_1$ equal $-1$ or two of the entries $a'_2,b'_2,c'_2$ equal~$1$. Without loss of generality, we may permute the last three rows of~$S$, and assume that either $a_1 = b_1 = -1$ or $a'_2 = b'_2 = 1$. Now, one of the matrices \[ C_3 = {\tiny \left[\!\begin{array}{rr|rrr} -1 & 0 & -1 & -1 & 0 \\ 0 & -1 & 0 & 0 & 0 \\\hline -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \quad \textrm{ or } \quad C_4 = {\tiny \left[\!\begin{array}{rr|rrr} -1 & 0 & 0 & 0 & 0 \\ 0 & -1 & 1 & 1 & 0 \\\hline -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \] must be a submatrix of~$S$, but again the absolute value of the determinant of both $r+C_3$ and $r+C_4$ equals $3/2$. \smallskip \noindent\emph{Case 3:} Up to permuting the last three rows of~$S$ we have $\tiny \left[\!\begin{array}{*{3}r} a_1 & b_1 & c_1 \\ a'_2 & b'_2 & c'_2 \end{array}\!\right] = \left[\!\begin{array}{*{3}r} -1 & 1 & 1 \\ 1 & -1 & -1 \end{array}\!\right] $. With this assumption, one of the matrices \begin{align*} &{\tiny \left[\!\begin{array}{rr|rrr} -1 & 0 & 0 & 1 & 1 \\ -1 & -1 & 0 & 0 & 0 \\\hline -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \ ,\ {\tiny \left[\!\begin{array}{rr|rrr} -1 & -1 & 0 & 0 & 0 \\ 1 & 0 & 1 & 0 & 0 \\\hline -1 & -1 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \ ,\ \\ &{\tiny \left[\!\begin{array}{rr|rrr} 1 & 0 & -1 & 1 & 1 \\ -1 & -1 & 0 & 0 & 0 \\\hline -1 & 0 & -1 & 0 & 0 \\ -1 & 0 & 0 & -1 & 0 \\ -1 & 0 & 0 & 0 & -1 \end{array}\!\right]} \ ,\ {\tiny \left[\!\begin{array}{rr|rrr} 1 & -1 & 0 & 0 & 0 \\ 1 & 0 & 0 & -1 & -1 \\\hline -1 & -1 & -1 & 0 & 0 \\ -1 & -1 & 0 & -1 & 0 \\ -1 & -1 & 0 & 0 & -1 \end{array}\!\right]} \end{align*} must be a submatrix of~$S$, because one of the four vectors $(\pm1,\pm1,-1,-1,-1)^\intercal$ must be a column of~$S$. As before, if~$F$ denotes any of these four matrices, then the absolute value of the determinant of~$r+F$ equals~$3/2$. \smallskip \noindent\emph{Case 4:} Up to permuting the last three rows of~$S$ we have $\tiny \begin{bmatrix} a_1 & b_1 & c_1 \\ a'_2 & b'_2 & c'_2 \end{bmatrix} = \left[\!\begin{array}{rrr} -1 & 1 & 1 \\ -1 & -1 & 1 \end{array}\!\right] $. In this case, one of the matrices \[ C_7 = {\tiny \left[\!\begin{array}{rr|rrr} -1 & 0 & 1 & 0 & 0 \\ 0 & -1 & 0 & -1 & 0 \\\hline 0 & -1 & 0 & 0 & 0 \\ 0 & 0 & -1 & -1 & 0 \\ 0 & 0 & 0 & 0 & -1 \end{array}\!\right]} \quad \textrm{ or } \quad C_8 = {\tiny \left[\!\begin{array}{rr|rrr} 1 & -1 & 0 & 0 & 0 \\ 0 & 0 & -1 & -1 & 0 \\\hline 0 & -1 & -1 & 0 & 0 \\ 0 & 0 & 0 & -1 & 0 \\ 0 & 0 & 0 & 0 & -1 \end{array}\!\right]} \] must be a submatrix of~$S$, because one of the vectors $(\pm1,0,0,0,0)^\intercal$ must be a column of~$S$. As before, the absolute value of the determinant of both $r+C_7$ and $r+C_8$ equals~$3/2$. In conclusion, in all cases we found a $5 \times 5$ minor of $r+S$ whose absolute value is greater than~$1$, and thus no feasible Sauer Matrix of type~$(2,3)$ can exist. \end{proof} With these preparations we can now exclude the existence of any Sauer Matrix of size~$5$ that is feasible for translations. \begin{proof}[Proof of \Cref{prop:sauer-matrix-infeasibility-size-5}] Just as in the proof of \Cref{prop:Sauer-size-4}~(iv), whenever there are at least three rows in a Sauer Matrix that contain an entry equal to~$1$, then it is infeasible for translations. Thus, we may assume that~$S$ is a Sauer Matrix whose type is either $(0,5)$, $(1,4)$, or $(2,3)$. We have just proven in \Cref{prop:negative-Sauer-size-5} however, that all such Sauer Matrices are infeasible for translations. \end{proof} \section{Computational Experiments and the Proof of Theorem~\ref{thm:counterexamples-Delta-4}} \label{sect:computations} In this part, we describe a computational approach to determine so far unknown values of $\h(\Delta,m)$ for small parameters $m,\Delta \in \mathbb{Z}_{>0}$. The results of our computations led us to identify a family of counterexamples to \Cref{conj:lee-exact-value-hDm} that lie behind the lower bounds in \Cref{thm:counterexamples-Delta-4}. Our approach is based on the \emph{sandwich factory classification scheme} described and utilized by Averkov, Borger \& Soprunov~\cite[Section 7.3]{averkovborgersoprunov2021classification}. As we have done implicitly already in previous sections, we now explicitly work with sets of integer points in~$\mathbb{Z}^m$, rather than with $\Delta$-modular integer matrices with~$m$ rows and full rank. To this end, for a point set $S \subseteq \mathbb{Z}^m$, we write \[ \Delta(S) := \max\left\{ \card{\det(S')} : S' \subseteq S , \card{S'} = m \right\} \] for the maximum absolute value of the determinant of a matrix whose columns constitute an $m$-element subset of~$S$. If $P \subseteq \mathbb{R}^m$ is a \emph{lattice polytope}, meaning that all its vertices belong to~$\mathbb{Z}^m$, then we write $\Delta(P) := \Delta(P \cap \mathbb{Z}^m)$. Since the maximum determinant is attained by an $m$-element subset of the vertices of~$P$, we also have $\Delta(P) = \Delta(\{x \in \mathbb{Z}^m : x \textrm{ a vertex of } P\})$. For the same reason, we have $\Delta(\conv\{S\}) = \Delta(S)$, for every full-dimensional set $S \subseteq \mathbb{Z}^m$. Since the value of $\h(\Delta,m)$ is attained by a matrix~$A$ whose columns come in opposite pairs $A_i, -A_i$, we restrict our attention to \emph{$o$-symmetric} lattice polytopes $P \subseteq \mathbb{R}^m$, that is, we require $P = -P$ to hold. In this language the generalized Heller constant now expresses as \begin{align} \h(\Delta,m) = \max\bigl\{ \card{P \cap \mathbb{Z}^m} : P \subseteq \mathbb{R}^m &\textrm{ an }o\textrm{-symmetric lattice polytope} \bigr. \nonumber\\ \bigl. & \text{ with } \Delta(P) = \Delta \bigr\}.\label{eqn:hDm-via-polytopes} \end{align} \noindent Therefore, in order to computationally determine the value $\h(\Delta,m)$ for a pair $(\Delta,m)$ of parameters, we may want to solve any of the following classification problems. \begin{prob} \label{prob:classification-full} Given $m,\Delta \in \mathbb{Z}_{>0}$, classify up to unimodular equivalence all $o$-symmetric lattice polytopes $P \subseteq \mathbb{R}^m$ with $\Delta(P) = \Delta$. \end{prob} The second classification problem is a variant of the first and is computationally less expensive. \begin{prob} \label{prob:classification-maximal} Given $m,\Delta \in \mathbb{Z}_{>0}$, classify up to unimodular equivalence all $o$-symmetric lattice polytopes $Q \subseteq \mathbb{R}^m$ with $\Delta(Q) = \Delta$ and with the maximal number of integer points under these constraints. \end{prob} \subsection{Classification by Sandwich Factory Approach} As hinted above, we tackle these problems with the sandwich factory classification scheme of Averkov, Borger \& Soprunov~\cite[Section 7.3]{averkovborgersoprunov2021classification}. This is a quite general and versatile approach that can be applied to various enumeration problems for lattice polytopes. The basic idea is to use a so-called \emph{sandwich} $(A,B)$ with the inner part~$A$ and the outer part $B$, that is, a pair of lattice polytopes satisfying the inclusion $A \subseteq B$. Such a sandwich represents the family of all lattice polytopes $P$ that are unimodularly equivalent to a lattice polytope $P'$ satisfying $A \subseteq P' \subseteq B$. If the latter condition holds, one says that $P$ occurs in the sandwich $(A,B)$. If a family $\mathcal{F}$ of polytopes needs to be enumerated up to unimodular equivalence, and it is possible to find a finite list of sandwiches with the property that every polytope $P \in \mathcal{F}$ occurs in one of the sandwiches of the finite list, then the enumeration is carried out by iteratively refining sandwiches with $A \varsubsetneq B$, for which the discrepancy between $A$ and $B$ is large and replacing each such sandwich $(A,B)$ with finitely many sandwiches that have a smaller discrepancy between the inner and the outer part. For the quantification of the discrepancy between~$A$ and~$B$ one can employ different functions. For our purposes it is natural to use the \emph{lattice point gap} $\card{B \cap \mathbb{Z}^m} - \card{A \cap \mathbb{Z}^m}$. A natural approach to replace $(A,B)$ by sandwiches with a smaller lattice point gap is to pick a vertex $v$ of $B$ that is not contained in $A$ and modify $(A,B)$ to two sandwiches: one with the inner part containing $v$ and one with the outer part not containing $v$. The iterative procedure continues until all sandwiches in the list have lattice point gap equal to zero. There are two important aspects that allow to optimize the running time. Two sandwiches $(A,B)$ and $(A',B')$ are called \emph{equivalent} if there is a unimodular transformation that simultaneously brings $A$ to $A'$ and $B$ to $B'$. Thus, for the enumeration of polytopes with a property $\mathsf{P}$ that is invariant up to unimodular equivalence, it is sufficient to keep sandwiches up to this notion of equivalence. Our enumeration task concerns the property $\mathsf{P}$ of a lattice polytope~$A$, describing that $\Delta(A) = \Delta$. As described in~\cite[Lem.~7.9]{averkovborgersoprunov2021classification}, equivalence of two given sandwiches can be expressed as unimodular equivalence of suitable higher-dimensional lattice polytopes associated with the two sandwiches. The second aspect that allows to optimize the running time is \emph{monotonicity}. If~$\mathsf{P}$ is the conjunction $\mathsf{P} = \mathsf{P}_1 \wedge \mathsf{P}_2$, where $\mathsf{P}_1$ is a downward closed property, while~$\mathsf{P}_2$ is an upward closed property, we can prune those sandwiches $(A,B)$ that are generated for which $A$ does not satisfy $\mathsf{P}_1$, or $B$ does not satisfy $\mathsf{P}_2$. A further tool for an efficient implementation of these ideas is the \emph{reduction of a polytope $B$} relative to some polytope $A \subseteq B$. This simply means, that before adding a possible new sandwich $(A,B)$ during the iteration, we neglect all integer points~$v \in B$ such that $\Delta(A \cup \{v\}) > \Delta(A)$. More precisely, the \emph{reduced sandwich} $(A,B')$ of $(A,B)$ is defined by $B' = \conv\{ v \in B \cap \mathbb{Z}^m : \Delta(A \cup \{v\}) = \Delta(A) \}$. With these details of the implementation in mind, we can now describe the procedure to solve \Cref{prob:classification-full} as done in \Cref{algo:sandwich-full}. Regarding the classification of all $o$-symmetric lattice polytopes $P \subseteq \mathbb{R}^m$ with $\Delta(P) = \Delta$ and $\h(\Delta,m) = \card{P \cap \mathbb{Z}^m}$ in \Cref{prob:classification-maximal}, we need to make the following adjustments to \Cref{algo:sandwich-full}: \begin{algorithm*}[hb] \caption{Sandwich Factory Algorithm that solves \Cref{prob:classification-full}} \label{algo:sandwich-full} \begin{algorithmic}[0] \REQUIRE{A dimension $m \in \mathbb{Z}_{>0}$ and a value $\Delta \in \mathbb{Z}_{>0}$.} \ENSURE{A list of all full-dimensional $o$-symmetric lattice polytopes $P \subseteq \mathbb{R}^m$ with $\Delta(P) = \Delta$, up to unimodular equivalence.} \STATE{\medskip\textbf{Step 1:} Initialization} \STATE{ \begin{itemize} \item enumerate $o$-symmetric lattice crosspolytopes $A \subseteq \mathbb{R}^m$ with $\Delta(A) = \Delta$ \item for each $A = \conv\{\pm v_1,\ldots,\pm v_m\}$ as above choose \[ Q := \left\{ \sum_{i=1}^m \alpha_i v_i : -1 \leq \alpha_i \leq 1, \forall i \in [m]\right\} \] as the lattice parallelepiped spanned by the vertices of~$A$ \item $B := $ reduction of $Q$ relative to $A$ \item initialize the sandwich factory $\mathcal{F}$ with all pairs $(A,B)$ obtained above \end{itemize}} \STATE{\medskip\textbf{Step 2:} Iterative reduction of maximal lattice point gap} \WHILE{there are sandwiches with a positive lattice point gap} \STATE{ \setlist[itemize]{leftmargin=20pt} \begin{itemize} \item $(A,B) :=$ a sandwich with maximal lattice point gap \item $v :=$ a vertex of $B$ that is not contained in $A$ \item $A' := \conv\{A \cup \{\pm v\}\}$ \item $B' := $ reduction of $B$ relative to $A'$ \item $B'' := \conv\{(B \cap \mathbb{Z}^m) \setminus \{\pm v\}\}$ \item add $(A',B')$ to $\mathcal{F}$, if $\mathcal{F}$ does not already contain a sandwich that is equivalent to $(A',B')$ \item add $(A,B'')$ to $\mathcal{F}$, if $\mathcal{F}$ does not already contain a sandwich that is equivalent to $(A,B'')$ \end{itemize} } \ENDWHILE \STATE{\medskip\textbf{Step 3:} Return the results} \STATE{ \begin{itemize} \item all sandwiches $(A,B)$ in $\mathcal{F}$ have now the form $A = B$ \item return the set of all~$A$ such that $(A,B) \in \mathcal{F}$ \end{itemize} } \end{algorithmic} \end{algorithm*} \begin{enumerate}[label=(\roman*)] \item We maintain a value $\mathrm{cmax}$ that we initialize with the valid lower bound $m^2 + m + 1 + 2m(\Delta-1)$ on $\h(\Delta,m)$ (see~\eqref{eqn:lee-et-al-bound}). \item We never add a sandwich $(A,B)$ during the algorithm with $\card{B \cap \mathbb{Z}^m} < \mathrm{cmax}$. \item If we add a sandwich $(A,B)$ to $\mathcal{F}$ with $\card{A \cap \mathbb{Z}^m} > \mathrm{cmax}$, then we update $\mathrm{cmax}$ to $\card{A \cap \mathbb{Z}^m}$. \end{enumerate} \begin{remark}\ \begin{enumerate}[label=(\roman*)] \item The initialization of the sandwich factory in Step 1 of \Cref{algo:sandwich-full} can be done by generating all Hermite normal forms of integer matrices $M \in \mathbb{Z}^{m \times m}$ with $\Delta(M) = \Delta$ (cf.~Schrijver~\cite[Sect.~4.1]{schrijver1986theory}). \item One can interpret our sandwich factory based approach to \Cref{prob:classification-maximal} as a branch-and-bound procedure for the maximization of $|P \cap \mathbb{Z}^m|$ subject to $\Delta(P) \le \Delta$. In fact, each sandwich $(A,B)$ corresponds to a node of a branch-and-bound tree. Replacing a sandwich with two new sandwiches is branching, and the removal of sandwiches in adjustment~(ii) is pruning of a node from the branch-and-bound tree. \end{enumerate} \end{remark} \subsection{Computational Results} We have implemented the previously described algorithms in \texttt{sagemath}~\cite{sage}, based on the existing implementation of the sandwich factory used in~\cite{averkovborgersoprunov2021classification} by Christopher Borger\footnote{see \url{https://github.com/christopherborger/mixed_volume_classification}}. The source code as well as data files containing the results of our computations are available at \url{https://github.com/mschymura/delta-classification}. The computational results regarding the constant $\h(\Delta,m)$ and the number of equivalence classes of $o$-symmetric lattice polytopes for a given~$\Delta$ are gathered in Tables~\ref{table:h-delta-m},\ref{table:number-delta-polytopes} and~\ref{table:number-extremal-delta-polytopes}. \begin{table}[ht] \centering \begin{tabular}{|c||c|c|c|c|c|c|c|c|c|c|c|} \hline $m \ \backslash\ \Delta$ & $1$ & $2$ & $3$ & $4$ & $5$ & $6$ & $7$ & $8$ & $9$ & $10$ & $11$ \\ \hline\hline $2$ & $7$ & $11$ & $15$ & $19$ & $23$ & $27$ & $31$ & $35$ & $39$ & $43$ & $47$ \\ \hline $3$ & $13$ & $19$ & $\mathbf{25}$ & $\mathbf{33}^*$ & $\mathbf{37}$ & $\mathbf{43}$ & $\mathbf{49}$ & $\mathbf{55}$ & $\mathbf{61}$ & $\mathbf{67}$ & $\mathbf{73}$ \\ \hline $4$ & $21$ & $29$ & & $\mathbf{\geq 49^*}$ & & & & $\mathbf{\geq 81^*}$ & & & \\ \hline $5$ & $31$ & $41$ & & $\mathbf{\geq 67^*}$ & & & & $\mathbf{\geq 109^*}$ & & & \\ \hline \end{tabular} \caption{The values of $\h(\Delta,m)$ for small numbers $m,\Delta$. The values in bold have not been known before. Values with an asterisk $^*$ indicate that $\h(\Delta,m)$ is larger than it was conjectured by Lee et al. (see \Cref{conj:lee-exact-value-hDm}).} \label{table:h-delta-m} \end{table} \Cref{table:h-delta-m} determines the previously unknown exact values of $\h(\Delta,m)$, for $m=3$ and $3 \leq \Delta \leq 11$. It also reveals a counterexample to \Cref{conj:lee-exact-value-hDm} for the case $(\Delta,m) = (4,3)$, whose structure we used to construct counterexamples for every $(\Delta,m) \in \{ (4,4) , (4,5) , (8,4) , (8,5) \}$ as well. The construction is discussed further below in the next section. \Cref{table:number-delta-polytopes} reports on the classification \Cref{prob:classification-full} and lists the number of equivalence classes of $o$-symmetric lattice polytopes $P \subseteq \mathbb{R}^m$ with $\Delta(P) = \Delta$, and for the parameters~$\Delta,m$ for which our algorithm stopped within at most~$3$ days of running time. \begin{table}[ht] \centering \begin{tabular}{|c||c|c|c|c|c|c|c|c|c|c|c|} \hline $m \ \backslash\ \Delta$ & $1$ & $2$ & $3$ & $4$ & $5$ & $6$ & $7$ & $8$ & $9$ & $10$ & $11$ \\ \hline\hline $2$ & $2$ & $4$ & $7$ & $15$ & $16$ & $35$ & $29$ & $72$ & $77$ & $126$ & $99$ \\ \hline $3$ & $5$ & $32$ & $102$ & $554$ & $996$ & $5937$ & $8029$ & & & & \\ \hline $4$ & $17$ & $448$ & & & & & & & & & \\ \hline \end{tabular} \caption{The number of equivalence classes of $o$-symmetric lattice polytopes $P \subseteq \mathbb{R}^m$ for given~$\Delta(P) = \Delta$.} \label{table:number-delta-polytopes} \end{table} For the pairs $(\Delta,3)$ with $8 \leq \Delta \leq 11$, we used the modification of \Cref{algo:sandwich-full} that solves \Cref{prob:classification-maximal}. The corresponding number of equivalence classes of \emph{extremizers} of~$\h(\Delta,m)$ are given in \Cref{table:number-extremal-delta-polytopes}. It is interesting to observe that, starting from dimension $m=3$, non-uniqueness of an extremizer of~$\h(\Delta,m)$ is the norm. \begin{table}[ht] \centering \begin{tabular}{|c||c|c|c|c|c|c|c|c|c|c|c|} \hline $m \ \backslash\ \Delta$ & $1$ & $2$ & $3$ & $4$ & $5$ & $6$ & $7$ & $8$ & $9$ & $10$ & $11$ \\ \hline\hline $2$ & $1$ & $1$ & $1$ & $2$ & $1$ & $1$ & $1$ & $1$ & $1$ & $1$ & $1$ \\ \hline $3$ & $1$ & $3$ & $3$ & $1$ & $5$ & $7$ & $8$ & $12$ & $13$ & $14$ & $16$ \\ \hline $4$ & $1$ & $2$ & & & & & & & & & \\ \hline \end{tabular} \caption{The number of equivalence classes of $o$-symmetric lattice polytopes $P \subseteq \mathbb{R}^m$ for given~$\Delta(P) = \Delta$, and which satisfy $\h(\Delta,m) = \card{P \cap \mathbb{Z}^m}$.} \label{table:number-extremal-delta-polytopes} \end{table} \subsection{Construction of Counterexamples and {\Cref{thm:counterexamples-Delta-4}}} For a finite set $S \subseteq \mathbb{R}^m$, we denote by \[ \mathcal{D}(S) := S - S = \left\{ a - b : a,b \in S \right\} \] its \emph{difference set}, and by \[ \pyr(S) := \left( S \times \{0\} \right) \cup \{ e_{m+1} \} \subseteq \mathbb{R}^{m+1} \] the \emph{pyramid} over~$S$ of height one. It turns out that a combination of these two operations behaves very well with respect to the maximal absolute value of the determinant of $m$-element subsets. \begin{lemma} \label{lem:delta-of-pyramids} For every finite non-empty set $S \subseteq \mathbb{R}^m$, we have \[ \card{\mathcal{D}(\pyr(S))} = \card{\mathcal{D}(S)} + 2 \card{S} \quad \textrm{and} \quad \Delta(\mathcal{D}(\pyr(S))) = \Delta(\mathcal{D}(S)). \] \end{lemma} \begin{proof} The difference set of the pyramid over~$S$ is given by \[ \mathcal{D}(\pyr(S)) = \left( (S - S) \times \{0\} \right) \cup \left( -S \times \{1\} \right) \cup \left( S \times \{-1\} \right). \] Since $S$ is finite, this immediately yields the cardinality count. So, let's prove the statement on the largest $m \times m$ minors in $\mathcal{D}(\pyr(S))$. First of all, we have $\Delta(\mathcal{D}(\pyr(S))) \geq \Delta(\mathcal{D}(S))$, because we can take an $m$-element subset $S' \subseteq \mathcal{D}(S)$ with $\card{\det(S')} = \Delta(\mathcal{D}(S))$ and lift this to the set $S'' := (S' \times \{0\}) \cup \{ (-s,1) \} \subseteq \mathcal{D}(\pyr(S))$, for some $s \in S$. Clearly, $\card{\det(S'')} = \card{\det(S')} = \Delta(\mathcal{D}(S))$. Conversely, let $S' = \{s_0',s_1',\ldots,s_m'\} \subseteq \mathcal{D}(\pyr(S))$ be a subset of size $m+1$, and without loss of generality, let $s_0',s_1',\ldots,s_\ell' \in \left( (S-S) \times \{0\} \right)$ be with $s_i' = (s_{i1}-s_{i2},0)$, for suitable $s_{i1},s_{i2} \in S$, and $s_{\ell+1}',\ldots,s_m' \in \left( -S \times \{1\} \right)$ be with $s_j' = (-s_j,1)$, for suitable $s_j \in S$. With this notation, we obtain \begin{align*} \card{\det(S')} &= \card{\det\left(\tbinom{s_{01}-s_{02}}{0},\ldots,\tbinom{s_{\ell1}-s_{\ell2}}{0},\tbinom{-s_{\ell+1}}{1},\ldots,\tbinom{-s_{m}}{1}\right)}\\ &= \card{\det\left(\tbinom{s_{01}-s_{02}}{0},\ldots,\tbinom{s_{\ell1}-s_{\ell2}}{0},\tbinom{s_m-s_{\ell+1}}{0},\ldots,\tbinom{s_m-s_{m-1}}{0},\tbinom{-s_{m}}{1}\right)}\\ &= \card{\det\left(s_{01}-s_{02},\ldots,s_{\ell0}-s_{\ell1},s_m-s_{\ell+1},\ldots,s_m-s_{m-1}\right)}\\ &\leq \Delta(\mathcal{D}(S)).\qedhere \end{align*} \end{proof} Based on this lemma we can now construct series of examples that exceed the conjectured value of~$\h(4,m),\h(8,m)$, and $\h(16,m)$ in Conjecture~\ref{conj:lee-exact-value-hDm} by an additive term that is linear in~$m$, and for~$m$ large enough. Our construction is based on the unique (up to unimodular equivalence) set attaining the value $\h(4,3) = 33$, resulting from our enumeration approach described earlier (see \Cref{table:h-delta-m,table:number-extremal-delta-polytopes}). This set can be written as \[ \mathcal{D}(\pyr(H_2)) = \left( 2 \cdot H_2 \times \{0\} \right) \cup \left( H_2 \times \{-1,1\} \right), \] where $H_2 = \mathcal{D}(\{\mathbf{0},e_1,e_2\}) = \left\{ \mathbf{0}, \pm e_1, \pm e_2, \pm (e_1 - e_2) \right\} \subseteq \mathbb{Z}^2$ is the two-dimensional set attaining the Heller constant $\h(1,2) = 7$. Iterating this pyramid construction and using the $\ell$-dimensional set $H_\ell = \mathcal{D}(\{\mathbf{0},e_1,\ldots,e_\ell\})$ attaining the Heller constant $\h(1,\ell) = \ell^2 + \ell + 1$, we define \[ C_m^\ell := \pyr^{m-\ell}(H_\ell) = \underbrace{\pyr(\ldots\pyr(\pyr(H_\ell))\ldots)}_{m-\ell \textrm{ times}} \subseteq \mathbb{Z}^m. \] \begin{proof}[Proof of \Cref{thm:counterexamples-Delta-4}] The point sets yielding the claimed lower bounds are of the form~$\mathcal{D}(C_m^\ell)$, that is, the difference set of~$C_m^\ell$. In view of \Cref{lem:delta-of-pyramids}, we get \[ \Delta(\mathcal{D}(C_m^\ell)) = \Delta(\mathcal{D}(C_{m-1}^\ell)) = \ldots = \Delta(\mathcal{D}(H_\ell)) = \Delta(2 \cdot H_\ell) = 2^\ell, \] and, using that the pyramid construction adds exactly one point to the set that the pyramid is taken over, we also obtain $\card{C_m^\ell} = m - \ell + \card{H_\ell}$. Hence, using \Cref{lem:delta-of-pyramids} once more, we get \begin{align} \card{\mathcal{D}(C_m^\ell)} &= \card{\mathcal{D}(C_{m-1}^\ell)} + 2\card{C_{m-1}^\ell} = \card{\mathcal{D}(C_{m-2}^\ell)} + 2\card{C_{m-2}^\ell} + 2\card{C_{m-1}^\ell} \nonumber\\ &= \card{\mathcal{D}(H_\ell)} + 2 \sum_{i=\ell}^{m-1} \card{C_i^\ell} = \card{\mathcal{D}(H_\ell)} + 2 \sum_{i=\ell}^{m-1} (i - \ell + \card{H_\ell}) \nonumber\\ &= \card{\mathcal{D}(H_\ell)} + 2 \sum_{j=0}^{m-\ell-1} (\card{H_\ell} + j) \nonumber\\ &= \card{\mathcal{D}(H_\ell)} + 2(m-\ell)\card{H_\ell} + (m-\ell)(m-\ell-1) \nonumber\\ &= m^2 + \left(2 \card{H_\ell} - 2 \ell - 1 \right) m + \left( \card{\mathcal{D}(H_\ell)} - 2\ell\card{H_\ell} + \ell(\ell+1) \right).\label{eqn:counterexamples} \end{align} The conjectured value in \Cref{conj:lee-exact-value-hDm} is $\h(2^\ell,m) = m^2 + (2^{\ell+1} - 1) m + 1$. Using $\card{H_\ell} = \ell^2 + \ell + 1$ and~\eqref{eqn:counterexamples}, this means that $\mathcal{D}(C_m^\ell)$ is a counterexample to \Cref{conj:lee-exact-value-hDm}, for fixed $\ell$ and large enough~$m$, if and only if \[ 2 \card{H_\ell} - 2 \ell - 1 = 2\ell^2 + 1 > 2^{\ell+1} - 1. \] This holds exactly for $\ell \in \{2,3,4\}$, and computing $\card{\mathcal{D}(H_2)} = 19$, $\card{\mathcal{D}(H_3)} = 55$, and $\card{\mathcal{D}(H_4)} = 131$, we get by~\eqref{eqn:counterexamples} \begin{align*} \h(4,m) &\geq \card{\mathcal{D}(C_m^2)} = m^2 + 9m - 3 &&= m^2 + 7m + 1 + 2(m-2), \\ \h(8,m) &\geq \card{\mathcal{D}(C_m^3)} = m^2 + 19m - 11 &&= m^2 + 15m + 1 + 4(m-3), \\ \h(16,m) &\geq \card{\mathcal{D}(C_m^4)} = m^2 + 33m - 17 &&= m^2 + 31m + 1 + 2(m-9), \end{align*} and the claim follows. \end{proof} \section{Open Problems} \label{sect:open-problems} The determination of the exact value of $\h(\Delta,m)$ remains the major open problem. Note that the bounds from other sources and the bound we prove here are incomparable when both $m$ and $\Delta$ vary. In order to understand the limits of our method for upper bounding $\h(\Delta,m)$, it is necessary to determine the exact asymptotic behavior of $\hs(m)$ or $\hsd{\Delta}{m}$. \Cref{prop:shifted-Heller-dim-2-and-3} suggests that the following may have an affirmative answer: \begin{question} It is true that for every $m \in \mathbb{Z}_{>0}$, we have $\hs(m) \leq \h(1,m) $? \end{question} This would imply a bound of order $\h(\Delta,m) \in \mathcal{O}(m^2) \cdot \Delta$, which is with a view at \Cref{prop:shifted-heller-lower-bound} the best possible we can achieve based on $\hs(m)$. A relaxed question concerns the refined shifted Heller constant: \begin{question} Do we have $\hsd{\Delta}{m} \leq \h(1,m)$, for every $m,\Delta \in \mathbb{Z}_{>0}$? \end{question} Again an affirmative answer would imply the bound $\h(\Delta,m) \in \mathcal{O}(m^2) \cdot \Delta$, but \Cref{prop:shifted-heller-lower-bound} does not rule out the possibility that $\hsd{\Delta}{m}$ actually grows sublinearly with~$m$, for fixed~$\Delta$, as the construction therein uses a translation vector with denominator equal to~$m$. Relaxing the question once again, we may ask \begin{question} Is it true that $\h(\Delta,m) \in \mathcal{O}(m^2) \cdot \Delta$? \end{question} Our computational experiments described in \Cref{sect:computations} suggest that there are more constraints on the maximal size of a $\Delta$-modular integer matrix, when $\Delta$ is a prime (compare also with the improved bound in \Cref{thm:polynomial-linear}~(ii) for odd~$\Delta$). \begin{question} Does \Cref{conj:lee-exact-value-hDm} hold for every $m \in \mathbb{Z}_{>0}$, and every \emph{prime} $\Delta \in \mathbb{Z}_{>0}$? In particular, does it hold for $\h(3,m)$? \end{question} Moreover, from the data in \Cref{table:h-delta-m} one may also suspect that for any given $m \in \mathbb{Z}_{>0}$ there are only finitely many $\Delta \in \mathbb{Z}_{>0}$ that possibly violate \Cref{conj:lee-exact-value-hDm}. For instance, it could very well be that the value $\h(4,3) = 33$ is the only exception from \Cref{conj:lee-exact-value-hDm} in dimension $m=3$. \begin{question} Given $m \in \mathbb{Z}_{>0}$, is there always a threshold $\Delta(m) \in \mathbb{Z}_{>0}$ such that $\h(\Delta,m) = m^2+m+1+2m(\Delta-1)$, for every $\Delta \geq \Delta(m)$? \end{question} Finally, while investigating the extreme examples attaining $\h(\Delta,m)$, for small values of $m$ and $\Delta$, and which are enumerated in \Cref{table:number-extremal-delta-polytopes}, we found that for each computed pair $(\Delta,m)$ there is at least one extremizer that can be written as the set of integer points in the convex hull of the difference set of some subset of~$\mathbb{Z}^m$. We wonder whether this is a general phenomenon: \begin{question} Is there always an extremizer for $\h(\Delta,m)$ that can be written as the set of integer points in the convex hull of the difference set of a subset of~$\mathbb{Z}^m$? \end{question} \subsection*{Acknowledgments} We thank Rudi Pendavingh for pointing us to the paper of Geelen et al.~\cite{geelennelsonwalsh2021excludingaline}. \bibliographystyle{amsplain}
\section{Introduction} Motivated by heavy-ion collision experiments, our goal is to study microscopic properties of QCD out of equilibrium from first principles, and to assess their impact on the description of the quark-gluon plasma. This can be done efficiently by studying the spectral functions $\rho(\omega,p)$ of gluons or quarks since they encode the full single-particle excitation spectrum. Having the initial stage of heavy-ion collisions in mind \cite{Gelis:2010nm,Lappi:2006fp}, we use a weak-coupling ($g^2 \ll 1$) far from equilibrium approach where we study a highly occupied gluon plasma with a large gluon distribution function $f(p) \sim 1/g^2$ for soft momenta below a characteristic scale $p \lesssim Q$. In this case both nonperturbative lattice and perturbative diagrammatic methods are available. Focusing on the former, we run classical-statistical lattice simulations in real time and extract the spectral functions. Our results are then compared to perturbative hard-thermal loop (HTL) calculations extended to out-of-equilibrium situations to assess which properties of the spectral functions are beyond HTL results. Our main questions involve: \begin{itemize} \item[$\star$] What are the spectral functions in heavy-ion collisions at early times? \item[$\star$] Do they have general features that are common in other non-equilibrium states or in thermal equilibrium at high temperatures? \item[$\star$] Are nonperturbative extensions of kinetic theory or anisotropic HTL necessary for a faithful description of the dynamics? \end{itemize} To address these questions, we extract spectral functions in a linear-response framework in classical-statistical simulations. Here we apply our framework in Minkowski space-time to isotropic 3+1 dimensional plasmas and (effectively) 2+1 dimensional plasmas, corresponding to the limit of extreme momentum anisotropy. Details of our approach and results can be found in Refs.~\cite{Boguslavski:2021buh,Boguslavski:2019fsb,Boguslavski:2018beu}. Planned extensions of these studies are outlined in the Conclusion. \section{Method \& setup} We consider $\mrm{SU}(N_c)$ Yang-Mills theory with classical action \begin{equation} \label{eq:YM_S} S_{\mathrm YM}[A] = -\frac{1}{4}\,\int d^{d+1}x\;F_a^{\mu\nu}[A] F^a_{\mu\nu}[A] \end{equation} in $d$ spatial dimensions. Simulations are performed for $N_c = 2$ in a gauge-covariant formulation with link fields $U_j(x) \approx \exp\left( ig\, a_s A_j(x) \right)$ discretized on a cubic lattice of size $N_s^3$ with lattice spacing $a_s$. Motivated by different initial stages in heavy-ion collisions, we study three models for highly occupied gluonic systems (here in a Minkowski space-time for simplicity): {\em isotropic 3+1 dimensional} system (i.e., $d=3$ in \eqref{eq:YM_S}), a purely {\em 2+1 dimensional} plasma ($d=2$), and a {\em Glasma-like 2+1 dimensional} system. The latter extends the {\em 2+1D} model by including an adjoint scalar field $\phi_a$, and corresponds to a $3+1D$ system with independence of the $x^3$ coordinate. In each case we initialize the system with large occupation numbers (with $E = \partial_t A$) \begin{align} f(t{=}0, p \lesssim Q) \sim \frac{1}{g^2} \gg 1\;, \qquad f(t,p) = \frac{\langle |E_T(t,p)|^2\rangle}{p}\;. \end{align} \subsection{Classical-statistical real-time lattice simulations} For classical-statistical lattice simulations as employed in our studies, we first set the initial conditions by choosing fields randomly that satisfy $\langle E_T^*(0,\mathbf p) E_T(0,\mathbf q) \rangle \propto p\,f(0,p)\, (2\pi)^3\delta(\mathbf p - \mathbf q)$ with transverse fields $E_T^j p_j = 0$ and vanishing $\langle E_L^*(0,\mathbf p) E_L(0,\mathbf q) \rangle = 0$. We set the gauge fields $A$ similarly, and restore the Gauss law initially if needed. Each of the initial configurations $\{ U(0,\mathbf x), E(0,\mathbf x) \}$ is evolved by solving the classical field equations in a leapfrog scheme in temporal gauge $A_0 = 0$, i.e., $U_0 = \mathds{1}$. An observable $O[U,E]$ that depends on the fields is computed at a time $t>0$ by averaging over the initial configurations \begin{equation} O(t) = \frac{1}{\# k} \sum_k O[U(t),E(t)]\,. \end{equation} \subsection{Self-similar turbulent attractors} \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{./Figures/Distr_diffIC_2D.pdf} \includegraphics[width=0.48\textwidth]{./Figures/Distr_selfsim_eff2D_gauge.pdf} \caption{ Gluon distribution function $f_E \equiv f$ as a function of momentum of a Glasma-like plasma. {\em Left:} Different initial conditions lead to the same attractor (shown at $Q t = 4000$). {\em Right:} Rescaling $f$ and $p$ with universal power-laws of time signals self-similarity. Figures taken from Ref.~\cite{Boguslavski:2019fsb}. } \label{fig:2D_selfsim} \end{figure} Each of the highly occupied systems approaches a self-similar attractor with defining property \begin{align} \label{eq:selfsim} f(t,p) = (Q t)^{\alpha} f_s\left((Q t)^{\beta} p \right). \end{align} The scaling exponents $\alpha$, $\beta$ and scaling function $f_s(p)$ are universal, insensitive to details of initial conditions, and given by \begin{eqnarray} \label{eq:selfsim_expo_2D} \beta = -1/5\;, &\quad& \alpha = 3\beta \qquad \text{for 2+1D and Glasma-like \cite{Boguslavski:2019fsb}} \\ \beta = -1/7\;, &\quad& \alpha = 4\beta \qquad \text{for isotropic 3+1D \cite{Berges:2008mr,Kurkela:2012hp}.} \end{eqnarray} This is shown in Fig.~\ref{fig:2D_selfsim} for the example of 2+1D Glasma-like simulations. In the left panel, different initial conditions ($Qt = 0$) lead to the same universal distribution at a later time ($Qt = 4000$). In the right panel, distributions at different times fall on top of each other after rescaling with power-laws of time with the universal exponents in \eqref{eq:selfsim_expo_2D}. \subsection{Spectral and statistical correlation functions} Due to Eq.~\eqref{eq:selfsim}, the evolution of self-similar attractors is known. We extract the spectral and statistical correlation functions at these attractor states because their scaling properties allow us to study the dependence of the correlators on time and momentum scales. For instance, if a quantity in the spectral function scales like a mass $\sim Q(Qt)^{\beta}$, it is likely that the soft scale plays an important role. We will return to this below. Hiding indices, the {\em spectral} function is defined as the commutator of fields \begin{equation} \rho (x', x) = \frac{i}{N_c^2-1}\left\langle \left[ \hat{A}(x'), \hat{A}(x) \right] \right\rangle \end{equation} and we also denote $\dot{\rho} = \partial_t \rho$ with $t \equiv x^0$. The {\em statistical} correlation function $\langle EE \rangle$ ($\equiv \ddot{F}$) is in general, out of equilibrium, independent of $\dot{\rho}$ and defined as the anti-commutator of fields \begin{equation} \langle EE \rangle (x', x) = \frac{1}{2(N_c^2-1)}\left\langle \left\{ \hat{E}(x'), \hat{E}(x) \right\} \right\rangle \,. \end{equation} To extract the correlation functions from our simulations, we first fix the residual gauge freedom to Coulomb-type gauge $\left. \partial^j A_j\right|_{t} = 0$ at time $t$ and Fourier transform the correlations in $t'-t$ and $\mathbf x' - \mathbf x$ to frequency $\omega$ and momentum $\mathbf p$. Instead of doing this at fixed $\tcent = \frac{1}{2}(t+t')$, we keep $t$ fixed, which requires the approximation $t \approx \tcent \gg \Delta t \equiv t'-t$ that is satisfied in our simulations. The statistical correlator can be measured as \begin{equation} \langle EE \rangle (t',t,p) = \frac{1}{N_c^2-1}\left\langle E(t',\mathbf p)E^*(t,\mathbf p) \right\rangle\,. \end{equation} \subsection{Nonperturbative computation of spectral function $\rho$} \begin{wrapfigure}{l}{0.37\linewidth} \includegraphics[width=0.35\textwidth]{./Figures/PRD_Graphic_1.pdf} \caption{Visualization of the method to compute $\rho$ (see \cite{Boguslavski:2018beu}).} \label{fig:visual_perturb} \end{wrapfigure} In order to measure the spectral function, we combine classical-statistical simulations with linear response theory, as introduced in Ref.~\cite{Boguslavski:2018beu} and visualized in Fig.~\ref{fig:visual_perturb} on the left. At time $t$ we perturb the fields with an instantaneous source $j(t',\mathbf p) = j_{0}(\mathbf p)\, \delta\left( t' - t \right)$. Splitting $A(t,\mathbf x) \mapsto A(t,\mathbf x) + \delta A(t,\mathbf x)$ due to the perturbation, the background field $A$ keeps following the classical Yang-Mills equations while for the linear response field $\delta A$ we solve linearized equations of motion formulated in a gauge-covariant form in Ref.~\cite{Kurkela:2016mhu} that are consistent with Gauss law conservation by construction. The solution is linked to the retarded propagator $\langle \delta A(t', \mathbf p)\rangle = G_{R}(t', t, \mathbf p)\, j_{0}(\mathbf p)$ and to the spectral function via $\theta(t' - t) \rho(t',t,p) = G_{R}(t',t,p)$. While the spectral function in thermal equilibrium is usually computed by using the statistical correlation function and relating it to the spectral function via the fluctuation dissipation relation (FDR) \cite{Aarts:2001yx,Schlichting:2019tbr}, a separate and independent computation of the spectral function like ours is crucial out of equilibrium since the existence of a FDR is not guaranteed. Similar methods to the one for gauge theories described here have also been developed for scalar systems far from equilibrium \cite{PineiroOrioli:2018hst,Boguslavski:2019ecc} and recently introduced for fermionic spectral functions in Ref.~\cite{Boguslavski:2021kdd}. There the Dirac field and the Dirac equation play the role of the linear response field and linearized equation of motion, respectively. \section{Numerically extracted spectral functions} \subsection{Gluon spectral function in isotropic 3+1D plasmas} \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{./Figures/Mode_rho_Landau_multi.pdf} \includegraphics[width=0.45\textwidth]{./Figures/Mode_rho_F_w_multi.pdf} \caption{Correlations in isotropic 3+1D systems. {\em Left:} Spectral function of transversely polarized gluons $\rho_T(\omega,p)$ for different momenta in relative time $\Delta t$ and frequency domains. {\em Right:} Normalized correlations $\ddot{F}_T/\ddot{F}_T(t,t) \equiv \langle E_T E_T\rangle/\langle E_T(t) E_T(t)\rangle$ and $\dot{\rho}_T$ for different momenta. Figures taken from Ref.~\cite{Boguslavski:2018beu}. } \label{fig:rho_3D} \end{figure} \begin{figure} \centering \includegraphics[width=0.45\textwidth]{./Figures/Damping_rate_long_trans.pdf} \includegraphics[width=0.45\textwidth]{./Figures/Damping_rate_trans_diff_t.pdf} \caption{Damping rates $\gamma_\alpha(t,p)/Q$ of an isotropic 3+1D plasma in the self-similar regime as a function of momentum. {\em Left:} For transverse and longitudinal polarizations ($\alpha=T,L$) and different discretizations at fixed time $Q t = 1500$. {\em Right:} Transverse damping rate $\gamma_T(t,p)$ rescaled by $(t/t_{\text{ref}})^{3/7}$ as a function of rescaled momentum at different times, with $Q t_{\text{ref}} = 1500$. Figures taken from Ref.~\cite{Boguslavski:2018beu}. } \label{fig:gamma_3D} \end{figure} We start with Fig.~\ref{fig:rho_3D} where we discuss the gluonic spectral function of an isotropic 3+1D plasma at a self-similar attractor \cite{Boguslavski:2018beu}. In the left panel we show the spectral function of transversely polarized gluons $\rho_T$ at different momenta $p$ as functions of relative time $\Delta t \equiv t'-t$ (left) and frequency $\omega$ (right). The spectral function is shown to exhibit two distinguishable features: a narrow Lorentzian quasiparticle peak at the position $\omega_T(p)$ (dispersion relation) with the width $\gamma_T(p)$ (damping rate), and the Landau cut region at frequencies $|\omega| < p$. Perturbative results at leading order (LO) HTL (black dashed lines) describe the main features well. The existence of a generalized fluctuation dissipation relation (FDR) between statistical and spectral correlations \begin{equation} \label{eq:gen_FDR} \frac{\langle EE \rangle_{\alpha}(t,\omega,p)}{\langle EE \rangle_{\alpha}(t,\Delta t {=} 0,p)} \approx \frac{\dot{\rho}_{\alpha}(t,\omega,p)}{\dot{\rho}_{\alpha}(t,\Delta t {=} 0,p)}\,, \end{equation} with $\ddot F \equiv \langle EE \rangle$, $\dot\rho_T(\omega,p) \approx \omega \rho_T(\omega,p)$, $\dot{\rho}_{T}(t,\Delta t {=} 0,p) = 1$ and $\alpha=T,L$ corresponding to transverse and longitudinal polarizations, is shown in the right panel of Fig.~\ref{fig:rho_3D} using transversely polarised gluons as an example. The damping rates are extracted from $\dot\rho_\alpha(\omega,p)$ by performing fits with a Lorentzian shape and are shown in Fig.~\ref{fig:gamma_3D}. One observes in the left panel that $\gamma_\alpha$ agree for both polarizations for momenta below the mass $p \lesssim m \approx 0.15\,Q$, despite having different dispersion relations (see Fig.~12 in \cite{Boguslavski:2018beu}). Comparing the values, one finds a separation of scales \begin{equation} \label{eq:gwQ_scaleSep} \gamma_\alpha(t,p) \ll \omega_\alpha(t,p) \ll Q\,, \end{equation} where $\omega(t,p{=}0) \equiv \omega_{\mrm{pl}} \sim m$. For comparison, we have included curves from different simulations to show the insensitivity to discretization parameters $N_s$ and $a_s$ of our results. The finite peak width is a subleading order effect in HTL and is of order $\gamma_\alpha(t,p) \sim g^2 T_*(t) \sim Q (Q t)^{-3/7}$ in the self-similar regime. The point $\gamma_{\rm HTL}(p{=}0)$ corresponds to the HTL result at $p=0$ \cite{Braaten:1990it}. In the right panel of Fig.~\ref{fig:gamma_3D}, $\gamma_T$ is rescaled with $g^2 T_*(t)$ and becomes time-independent when plotted as a function of rescaled momentum. This confirms $\gamma_\alpha(t,p) \sim g^2 T_*(t)$ and implies that $\frac{\gamma_\alpha(t,p)}{\omega(t,p{=}0)} \sim (Q t)^{-2/7}$ decreases with time, making the quasiparticle peaks even more narrow. \begin{figure} \centering \includegraphics[width=0.48\textwidth]{./Figures/eff2D_dFT_w_T.pdf} \includegraphics[width=0.48\textwidth]{./Figures/eff2D_dFT_w_L.pdf} \caption{ Normalized transverse {\em (left)} and longitudinal {\em (right)} correlations $\dot{\rho}_\alpha(\omega,p)/\dot{\rho}_\alpha(\Delta t {=} 0,p)$ and $\langle EE \rangle_{\alpha}(\omega,p)/\langle EE \rangle_{\alpha}(\Delta t {=} 0,p)$ in 2+1D systems for different momenta. Green dashed lines correspond to HTL results. Figures taken from Ref.~\cite{Boguslavski:2021buh}. } \label{fig:rho_2D} \end{figure} \begin{figure} \centering \includegraphics[width=0.7\textwidth]{./Figures/OmegaGammaPlt_2DSc_Gauss_Hann_withXLab.pdf} \caption{ {\em Left:} Dispersion relation $\omega_T(t,p)/\omega_{\mrm{pl}}(t)$ and {\em right:} damping rate $\gamma_T(t,p)/\omega_{\mrm{pl}}(t)$ of the Glasma-like system at times $Q t = 200$, $500$, $2000$ as a function of $p/\omega_{\mrm{pl}}(t)$. Figures taken from Ref.~\cite{Boguslavski:2021buh}. } \label{fig:w_g_2D} \end{figure} \begin{figure} \centering \includegraphics[width=0.7\textwidth]{./Figures/eff2D_dFT_w_class.pdf} \caption{ Gluon spectral function in 2+1D classical thermal equilibrium with $f = T / \omega(p)$ (from \cite{Boguslavski:2021buh}). } \label{fig:2D_class} \end{figure} \newpage \subsection{Limit of extreme anisotropy: spectral functions in 2+1D plasmas} \begin{wrapfigure}{l}{0.28\linewidth} \includegraphics[width=0.28\textwidth]{./Figures/aisotropy_small.pdf} \caption{{\em Blue:} 3+1D distribution, {\em red:} 2+1D limiting distribution.} \label{fig:anisotropy} \end{wrapfigure} So far, we have discussed the situation of an isotropic 3+1 dimensional system with distribution $f(t,p)$. However, in heavy-ion collisions, the distribution function can be very anisotropic at initial stages, with the limiting case being an effectively 2+1 dimensional system with distribution $f(t,p_T, p_z{=}0)$, as illustrated in Fig.~\ref{fig:anisotropy} on the left. We will again employ Minkowski metric for simplicity, as in the 3+1D case, and extract unequal-time correlation functions from our simulations at the corresponding self-similar attractor (see Ref.~\cite{Boguslavski:2021buh} for a more detailed discussion of our results). The normalized spectral and statistical correlation functions are shown in Fig.~\ref{fig:rho_2D} for both transverse and longitudinal polarizations. Both types of correlators lie on top of each other to good accuracy, confirming the validity of the generalized FDR \eqref{eq:gen_FDR} also for 2+1 dimensional systems. However, there are several differences to the 3+1D case: the resonances are {\em broad peaks} and the correlators remain finite even for $\omega \to 0$. They have a {\em non-Lorentzian shape} that is well approximated by a Gaussian distribution, as shown in Fig.~\ref{fig:rho_2D}. The green dashed lines correspond to the {\em HTL results} that would be expected in 2+1D, but {\em fail to reproduce} our nonperturbative simulation results. The latter is not too surprising since, as argued already in Ref.~\cite{Boguslavski:2019fsb}, 2+1 dimensional gauge systems lack the scale separation that is required for a hard loop approximation underlying HTL calculations. More concretely, we show in Fig.~\ref{fig:w_g_2D} the transverse dispersion relation and damping rate of the 2+1D Glasma-like system at different times. Rescaling all dimensionful quantities by the plasmon mass $\omega_{\mrm{pl}}(t)$, one finds that both become time-independent. This leads to \begin{eqnarray} \gamma(t,p) &\sim& \omega_{\mrm{pl}}(t)\,, \\ \gamma(t,p) &\sim& \omega(t,p) \qquad \text{for} \quad p\lesssim \omega_{\mrm{pl}}\,. \end{eqnarray} Due to their short lifetime, this implies that no quasiparticles exist for $p \lesssim \omega_{\mrm{pl}}$. Note that these statements remain true also at later times, in sharp contrast to the scale separation we observed for isotropic 3+1D gluonic plasmas in Eq.~\eqref{eq:gwQ_scaleSep}. We find the same properties also in classical thermal equilibrium, as shown in Fig.~\ref{fig:2D_class}. Running simulations with a classical thermal distribution $f(p) \approx \frac{T}{\omega(p)}$, we observe that $\rho(\omega,p)$ behaves qualitatively similarly to our far-from-equilibrium case above: one finds broad gluonic excitations of non-Lorentzian shape with $\gamma(p) \sim \omega_{\mrm{pl}}$, HTL provides a poor description, and for $\omega \to 0$ the spectral function $\dot{\rho}_T = \omega \rho_T$ remains finite at low $p$. This indicates that the extracted properties in 2+1D theories are not special to the non-equilibrium self-similar regime but also emerge in the time-translation invariant classical thermal equilibrium, and may be even found in more general 2+1 dimensional states. \begin{comment} \subsection{Nonperturbative computation of {\bf fermion} spectral function} The spectral function of fermions in a highly occupied plasma can be computed in a very similar way as for gluons, as has been developed in \cite{Boguslavski:2021kdd}. In short, one couples classical-statistical $\mrm{SU}(N_c)$ simulations with the Dirac equation for fermions. Here a backreaction from the fermions to the gauge fields can be neglected due to the large gluon occupation numbers. \begin{align*} \rho^{\alpha \beta}(x,y) = \left\langle\left\lbrace \hat{\psi}^{\alpha}(x), \hat{\bar{\psi}}^{\beta}(y) \right\rbrace\right\rangle \end{align*} \begin{itemize} \item \alert{Mode function} expansion of $\psi$ \newline {\scriptsize \color{gray} Aarts, Smit, {\it Nucl.\ Phys.\ B 555, 355 (1999)}} \vspace*{0.2\baselineskip} \item At time $t$ \alert{plane waves} \vspace*{0.2\baselineskip} \item $t'>t$: solve Dirac \& Yang-Mills EOM \item Compute fermion spectral function \newline {\scriptsize \color{gray} with spin \& color indices $\lambda=1,\cdots,2N_c$} \vspace*{-0.5\baselineskip} {\scriptsize \begin{align*} &\rho^{\alpha \beta}(t',t,\mathbf p)= \\ &\frac{1}{V}\sum_{\lambda} \left[ \tilde{\phi}^{u,\alpha}_{\lambda,\mathbf p}(t',\mathbf p) u_{\lambda}^{\dagger,\gamma}(\mathbf p) + \tilde{\phi}^{v,\alpha}_{\lambda,-\mathbf p}(t',\mathbf p) v_{\lambda}^{\dagger,\gamma}(-\mathbf p) \right] \gamma_{0}^{\gamma\beta} \end{align*} } \end{itemize} \subsection{Fermion spectral function in isotropic 3+1D plasmas} {\scriptsize \color{gray} {KB, Lappi, Mace, Schlichting,} {arXiv:2106.11319}} \begin{figure} \centering \includegraphics[width=0.65\textwidth]{./Figures/Plot_3D.pdf} \end{figure} We find (see Backup or paper): \begin{itemize} \item Lorentzian quasiparticle peaks + Landau cut ($\omega < p$) \vspace*{0.2\baselineskip} \item very good description by \alert{HTL} \vspace*{0.2\baselineskip} \item \alert{full $p$-dependence} of $\gamma_+(t,p)$, where $\gamma_+(t,p{=}0) \sim m_F(t)$ \end{itemize} \end{comment} \section{Conclusion} In this work we have presented a non-perturbative tool developed in \cite{Boguslavski:2018beu} to extract gluonic spectral functions in highly occupied non-Abelian plasmas far from equilibrium in classical-statistical lattice simulations, and that we have applied to 3+1 and (effectively) 2+1 dimensional systems at classical self-similar attractors (see Refs.~\cite{Boguslavski:2021buh,Boguslavski:2019fsb,Boguslavski:2018beu} for details). In general, we find that even far from equilibrium there exists a generalized fluctuation-dissipation relation that relates spectral and statistical correlation functions. However, there are crucial differences between the studied systems. On the one hand, the gluonic spectral function of an isotropic 3+1 dimensional plasma is well described by HTL perturbation theory. Our method allowed us to determine the damping rates of transverse and longitudinal quasiparticle excitations as functions of momentum from first principles. These were much smaller than the dispersion relation, showing that quasiparticles are long-lived and a perturbative description is, indeed, justified. In contrast, the gluonic spectral functions of 2+1 dimensional plasmas agree poorly with HTL predictions. They exhibit broad non-Lorentzian excitation peaks with a width of the order of the plasmon mass. This is observed for different times and even in classical thermal equilibrium, indicating that these properties are not special to the classical self-similar attractor, but may be even found in more general 2+1 dimensional states. As a consequence of the broad peaks, momentum modes up to the mass scale have only short-lived excitations and have to be treated non-perturbatively. These results are relevant for the description of gluonic excitations at low momenta in heavy-ion collisions and for anisotropic HTL perturbation theory. They show that 2+1D plasmas have genuinely nonperturbative properties. Since the effectively 2+1D system stems from an extreme momentum anisotropy of the plasma, our results suggest that there may be significant nonperturbative corrections present also in systems with finite but large anisotropy, which are relevant to phenomenological applications in heavy-ion collisions. To approach these questions in more detail, the simulations will be extended to expanding and anisotropic plasmas to study what may be lacking in the current kinetic \cite{Arnold:2002zm,Kurkela:2018wud,Fu:2021jhl} and HTL descriptions. Moreover, we study how nonperturbative properties in correlation functions affect transport coefficients, which has been started in Ref.~\cite{Boguslavski:2020tqz}. \begin{acknowledgments} The author is grateful to A.~Kurkela, T.~Lappi and J.~Peuron for collaboration on different projects presented here. He would also like to thank the organizers for the interesting conference. This research was funded in part by the Austrian Science Fund (FWF) project P 34455-N. The author wishes to acknowledge the CSC - IT Center for Science, Finland, and the Vienna Scientific Cluster (VSC) for computational resources. \end{acknowledgments}
\section{Introduction} Accurate determination of the 3D atomic structure of biomolecules is of crucial importance for various biomedical and bioengineering applications including protein design, drug design, diagnosing of diseases, \textit{etc.} In the past, this task was mainly achieved using expensive experimental methods, such as X-ray crystallography, Cryo-EM, NMR, \textit{etc.}, in a low-throughput manner. The recent success of AlphaFold \footnote{AlphaFold v2.0. For expediency, we refer to this model simply as AlphaFold throughout the rest of this paper.} \cite{jumper2021highly,alphafoldgithub,Evans2021.10.04.463034} greatly changes the paradigm and catalyzes the transition from the experiment-dominated solution to the AI driven process. Not only does AlphaFold render many research groups and industrial players without access to the expensive experimental tools the capability to explore the structure of biomolecules they concerned, it will also greatly change the scientific research model from low-throughput to high-throughput manner \cite{tunyasuvunakool2021highly}. For example, by using AlphaFold, one can compare the structures of thousands of pairs of proteins of similar functions between two different bacterial or explore how the structure of one single protein varies among many thousands of species along the evolution tree. The availability of large numbers of predicted protein structures provides a veritable cornucopia of data to be exploited, analysed and mined by structural bioinformaticians. The breakthrough will lead to an encyclopedia of the structures of all known protein domains, enabling a complete structural coverage of proteomes. AlphaFold is most likely to be the start of a revolution based on data-driven prediction in biology and medicine \cite{thornton2021alphafold}. The overall prediction process of AlphaFold consists of two main stages: MSA (multiple sequence alignments) construction and model inference. 1) For the MSA construction stage, AlphaFold uses the input sequence and queries databases to generate an MSA and a list of templates. 2) For the model inference stage, AlphaFold extracts the information from the MSA using a new Evoformer architecture, and passes that information to the structure module. The structure module takes the representation and builds a 3D structure model followed by local refinement to provide the final prediction. AlphaFold operates the end-to-end prediction in a single task, yet the two main stages require different resources. In the first stage, MSA construction runs on CPUs only, while in the second stage, model inference performs best on GPUs. Therefore, for speed and convenience, AlphaFold runs prediction tasks on GPUs. Meanwhile, the first CPU stage dominates the overall runtime. Due to the large database sizes and I/O bottlenecks, MSA construction can take up to hours for a single protein \cite{jumper2021highly,tunyasuvunakool2021highly,mirdita2021colabfold}. However, GPUs remain idle in the MSA construction stage, accounting for a large part of the total runtime. AlphaFold was mainly designed to predict single protein target in CASP14 (an independently assessed biennial community-wide competition) \cite{pereira2021high}. In order to rapidly explore large number of protein molecules like proteome or design protein libraries, a parallel optimized version of AlphaFold for high throughput use is highly desired. Therefore, we proposed {\small ParaFold}{}, a parallel version of AlphaFold with separated and optimized CPU and GPU tasks. Our work consists of two parts: pipeline design and performance optimization. First, we optimized the pipeline by segregating the CPU and GPU workload into individual jobs with proper resources. Second, we applied two performance optimizations to the pipeline: 1) Parallel acceleration on CPUs with three MSA searches running in parallel. 2) JAX \cite{bradbury2018jax} compile optimization on GPUs by avoiding recompilation in batch inferences. We evaluated {\small ParaFold}{} with three datasets (small, medium, and large). 1) The large dataset consists of $\sim$20,000 small proteins (50 residues in length). Structure predictions were performed on one NVIDIA DGX-2 multi-GPU system (16 V100/32G GPUs) and 10,400 cores of Intel Xeon Gold 6248 CPU on a cluster. The result showed that, {\small ParaFold}{} took only five hours to complete model 1 inference of $\sim$20,000 proteins on one NVIDIA DGX-2. The GPU runtime for these proteins was only 1/241 of the total GPU time needed by AlphaFold. 2) The medium dataset consists of 100 proteins of various lengths to represent a typical use of protein predictions and to illustrate the speed of {\small ParaFold}{}. 3) The small dataset contains four proteins. We evaluated the accuracy and efficiency of optimizations in {\small ParaFold}{} by comparing to those of AlphaFold with this small dataset. {\small ParaFold}{} is an open-sourced project, and the code is available at GitHub \cite{zurichogithub,hpcgithub}. As far as we know, {\small ParaFold}{} is the first open source parallel version of AlphaFold for large-scale predictions. Although DeepMind used a proteome-scale pipeline to predict structures of the UniProt human reference proteome, the script and details of the pipeline was not published \cite{tunyasuvunakool2021highly}. Concisely, this work makes the following contributions: \begin{itemize} \item We proposed the first pipeline optimized for rapid and large-scale protein structure predictions based on AlphaFold, suitable for running on supercomputers. \item We effectively reduced the runtime on CPUs using multi-threaded parallelism and on GPUs using optimized JAX compilation, without compromising the quality of results. \item We reported the first accomplishment of model 1 inferences of $\sim$20,000 small proteins in five hours on one NVIDIA DGX-2. \end{itemize} \section{Background} Proteins are essential to life, and understanding their structure is a key step towards understanding and modifying their function. For decades, researchers deciphered protein 3D structures using experimental techniques such as X-ray crystallography or cryo-electron microscopy (cryo-EM). But such methods can take months or years of experimental process. Structures have been solved for only about 170,000 of the more than 200 million proteins discovered across life forms \cite{burley2021rcsb,thornton2021alphafold}. It has been considered the holy grail of biology to predicting 3D structures of proteins based solely on amino acid sequences \cite{jumper2021applying}. Many computational approaches have been developed, focusing on either thermodynamics or evolutionary approaches \cite{kuhlman2019advances}. However, all of them failed to live up to expectations until recently AlphaFold was entered into the CASP14 assessment. AlphaFold achieved a median score of 92.4 GDT-TS overall across all targets, with an average error of 1.6 Angstroms — about the radius of an atom \cite{jumper2021applying}. The AlphaFold models will be used in exactly the same way as experimental structural data (and indeed will be used to help determine low-resolution experimental structures) \cite{akdel2021structural}. Briefly, the operation of AlphaFold falls into two parts (Fig. 1): 1) MSA construction on CPUs and 2) model inference on GPUs. \begin{figure}[h] \centering \includegraphics[width=0.9\textwidth]{img/alphafoldpipeline.pdf} \caption{The AlphaFold structure prediction process consists of two main steps: 1) MSA construction using CPUs and 2) Model inference using GPUs.} \label{fig:alphafoldpipeline} \end{figure} First, for the CPU part, AlphaFold uses the input amino acid sequence to search through several protein sequence databases, and constructs an MSA for query sequence. AlphaFold also tries to identify proteins that may have a similar structure to the input (“templates”), and constructs an initial representation of the structure, which it calls the “pair representation”. To build diverse MSAs, large collections of protein sequences from public reference and environmental databases \cite{uniprot2019uniprot,steinegger2018clustering,steinegger2019protein,mitchell2020mgnify} are searched by AlphaFold using the sensitive homology detection methods jackhmmer \cite{eddy2011accelerated} and HHblits \cite{steinegger2019protein}. Specifically, AlphaFold uses jackhmmer for MSA search on Uniref90 \cite{suzek2015uniref} and clustered MGnify \cite{mitchell2020mgnify}, and uses HHBlits for MSA search on BFD \cite{jumper2021applying} + Uniclust30 \cite{mirdita2017uniclust}, and HHSearch \cite{steinegger2019protein} for template search against PDB70 \cite{zimmermann2018completely}. AlphaFold restricts itself to 8 CPU cores for jackhmmer and 4 CPU cores for HHblits to process one query. Due to the large database sizes (over 2 TB) and the high number of random file accesses, the MSA search can take up to hours for a single prediction \cite{jumper2021highly,tunyasuvunakool2021highly,mirdita2021colabfold}. Second, for the GPU part, AlphaFold takes the features generate from MSA and the templates, and passes them through a complicated neural network. The objective of this neural network is to refine the representations for both the MSA and the pair interactions, but also to iteratively exchange information between them. Then it moves to the second neural network that produces a structure. It takes the refined “MSA representation” and “pair representation”, and leverages them to construct a 3D model of the structure. After generating a final structure, it will take all the information and pass it back to the beginning of the Evoformer blocks, in a “recycling” procedure to further refine the structure predictions. The model is trained end-to-end with gradients propagating from the predicted structure through the entire network. AlphaFold provides 5 models which were used during CASP14 and were extensively validated for structure prediction quality, as well as 5 pTM models \cite{jumper2021highly}, which were fine-tuned to produce pTM (predicted TM-score) and predicted aligned error values alongside their structure predictions. \section{Research Motivation} To explore the potential for optimizing for large-scale protein predictions, and for improving the GPU utilization, we ran structure prediction of four proteins of lengths ranging from 45 to 707 residues on one V100/32G GPU (Fig \ref{fig:profiling}). Because the current estimate for the average protein length of all proteins is around 300 residues ($\textit{e}.\textit{g}.$, the median length of the proteins annotated among Eukaryotes is 361 residues, Bacteria 267 residues, and Archaea 247 residues) \cite{brocchieri2005protein}, the four proteins with an average length of 436 residues in our test represented a typical usage in AlphaFold. \begin{figure}[h] \centering \includegraphics[width=0.7\textwidth]{img/profiling.pdf} \caption{AlphaFold runtime for four proteins on one V100 GPU. The predictions were run entirely on the V100 GPU. However, the first three MSA searches (jackhmmer1, jackhmmer2, and HHblits) in the MSA construction stage used only CPUs, and GPUs remained idle in this stage. The green-colored inference stage was the only procedure that needed GPUs.} \label{fig:profiling} \end{figure} Fig \ref{fig:profiling} shows that, the predictions were run entirely on one V100/32G GPU, with runtime up to hours depending on the length of the proteins. The V100 GPU remained idle during the first three MSA searches, because these MSA searches used only CPUs. It was the fourth procedure (inference) that really needed GPUs. The real GPU workload accounted for 73\% of the total runtime for protein 1, 30\% for protein 2, 33\% for protein 3, and 38\% for protein 4. It means that the GPU utilization for these four proteins ranged from 33\% to 73\%. To avoid low GPU utilization in AlphaFold, the three MSA searches in the CPU stage could be separated from the whole GPU workload. For high throughout predictions, these three CPU operations in AlphaFold could be scheduled to run on multiple CPU nodes on supercomputers. Furthermore, the three CPU operations could be arranged in parallel to reduce the CPU runtime. \section{Design of ParaFold} Our work on {\small ParaFold}{} consists of two parts: pipeline design and performance optimization. First, we designed the pipeline for large-scale structure predictions. Second, we applied two performance optimizations on the pipeline to speedup the CPU and GPU operations. \subsection{Pipeline for large-scale structure predictions} By segregating the CPU and GPU workload into individual jobs with proper resources, we developed an efficient and scalable pipeline in {\small ParaFold}{} for high throughput use. {\small ParaFold}{} first runs the MSA construction on CPU nodes, then executes the model inference on GPUs. {\small ParaFold}{} allows us to run large-scale protein predictions on supercomputer, with shorter time, and at a lower cost. As shown in Fig \ref{fig:split}, {\small ParaFold}{} works by checking whether a file named $\textit features.pkl$ exists. $\textit features.pkl$ stores the MSA and structure template search results obtained on the CPUs and passes them to the neural network prediction on GPUs, and serves as the connection between the CPU and GPU stage in the whole end-to-end neural network process. {\small ParaFold}{} distributes the first stage jobs to CPUs. These CPU jobs usually take a few minutes or hours to complete. Once the file $\textit features.pkl$ is generated by CPUs, the second stage of model inference on GPUs starts. {\small ParaFold}{} also supports to run entirely on GPUs, like AlphaFold, if the prediction job is submitted to GPUs but without the existence of $\textit features.pkl$. \begin{figure}[h] \centering \includegraphics[width=0.9\textwidth]{img/split.pdf} \caption{{\small ParaFold}{} works by checking the existence of file $\textit features.pkl$. {\small ParaFold}{} distributes the first stage jobs to CPUs. Once the file $\textit features.pkl$ is generated, the second stage of model inference on GPUs starts. {\small ParaFold}{} also supports to run entirely on GPUs if the prediction job is submitted to GPUs but without the existence of $\textit features.pkl$.} \label{fig:split} \end{figure} \subsection{Performance optimizations} We applied two performance optimizations on {\small ParaFold}{}: one to run multiple MSA searches in parallel for speedup on CPUs, and the other to avoid JAX recompilation for speedup on GPUs. \subsubsection{CPU acceleration} To accelerate the CPU stage, three independent sequential MSA searches can be arranged in parallel (Fig \ref{fig:search}). Due to the limited CPU cores accompanying GPUs, AlphaFold restricts itself to 8 CPU cores for jackhmmer and 4 CPU cores for HHblits to process one query. With unlimited processors on CPU nodes, {\small ParaFold}{} enhances the speed of MSA construction by orchestrating these searches in parallel using a total of 20 cores, $\textit{i}.\textit{e}.$ 8 CPUs for jackhmmer1, 8 CPUs for jackhmmer2, and 4 CPUs for HHblits. In AlphaFold, as shown in Fig \ref{fig:search}(a), three datasets UniRef90, MGnify, and BFD sequentially were searched by jackhmmer1, jackhmmer2, and HHblits, respectively. In contrast, In {\small ParaFold}{}, we simultaneously started three processes through Python's multiprocessing library to perform MSA searches in parallel, as shown in Fig \ref{fig:search}(b). \begin{figure}[h] \centering \includegraphics[width=1\textwidth]{img/search.pdf} \caption{Acceleration of MSA searches procedure on CPUs by running in parallel.} \label{fig:search} \end{figure} \subsubsection{GPU acceleration} To accelerate the GPU stage, {\small ParaFold}{} provides optimized batch inference script to avoid JAX recompilation for proteins of similar length. In AlphaFold, JAX compiled the neural network to be specialized to exactly the size of the protein, MSA, and templates. For a single protein, the compile time was 5 when computing 5 models (model 1-5), and 10 when computing 10 models (model 1-5, pTM model 1-5). For large proteins, the compile time is a negligible fraction of the runtime, but it may become more significant for small proteins \cite{alphafoldgithub}. In {\small ParaFold}{}, we optimized JAX to avoid recompilation in batch inferences of proteins of similar length. All the proteins of similar length were sorted by length, and JAX compiled for the first and largest protein only, and all the other proteins shared the model compiled, without triggering recompilation. Therefore, in batch inferences of $N$ proteins, the compile time was thus reduced from 5$N$ to 5 when computing 5 models, and 10$N$ to 10 when computing 10 models. \section{Evaluation} \subsection{Experimental Setup} \subsubsection{Hardware and Software} We used one NVIDIA DGX-2 multi-GPU system (16 V100/32G GPUs), and 10,400 cores of Intel Xeon Gold 6248 2.5 GHz CPUs with 192 GB RAM on the $\pi$ 2.0 supercomputer in Shanghai Jiao Tong University. The version of AlphaFold is v2.0.1, released in Oct. 2021. The {\small ParaFold}{} is v1.0. Both of AlphaFold and {\small ParaFold}{} used CASP14 preset and default databases stored on the Lustre file system. Templates and Amber relaxation were not used in the prediction. \subsubsection{Test Cases} Three protein datasets of small, medium, and large size were used to evaluate the efficiency and operating performance of {\small ParaFold}{}, as listed in Table\ref{tab:bench}. \begin{itemize} \item The small dataset consists of four proteins, the mutants GA98, GB98, 2LHE, and 2LHG. These four proteins differing in single mutation positions, with a chain length of 56 amino acids, represent diverse 3D structures: monomeric 3$\alpha$ and 4$\beta$ + $\alpha$ folds \cite{alexander2009minimal,he2012mutational}. \item The medium dataset consists of 100 proteins of varying lengths ranging from 77 to 734 residues, with an average of 296 residues. It is a randomly selected subset of sequences from a archaea proteome \cite{zhao2015thermococcus}. \item The large dataset contains 19,704 small proteins from the a \textit{de novo} designed dataset \cite{rocklin2017global}. These \textit{de novo} proteins are of the same length of 50 residues. \end{itemize} \begin{table} \caption{The benchmark datasets used for ParaFold evaluation.} \label{tab:bench} \begin{center} \begin{tabular}{rrrr} \hline Dataset & Number of proteins & Length (residues) & Source\\ \hline small & 4 & 56 & \cite{alexander2009minimal,he2012mutational}\\ medium & 100 & 77$\sim$734 (average: 296) & \cite{zhao2015thermococcus}\\ large & 19,704 & 50 & \cite{rocklin2017global}\\ \hline \end{tabular} \end{center} \end{table} \begin{figure}[h] \centering \includegraphics[width=0.7\textwidth]{img/Correct.pdf} \caption{Correctness evaluation with the small dataset. Structure visualised with the ground structures predicted with AlphaFold (blue) and predicted structures with ParaFold (green).} \label{fig:Correct} \end{figure} \subsection{Evaluation Methods} We compared {\small ParaFold}{} with AlphaFold in performance on three datasets of different sizes and lengths. For high throughput protein structure predictions, time, especially the GPU runtime, is the dominant performance metrics of {\small ParaFold}{} and AlphaFold. We extracted the CPU and GPU runtime recorded in the $timings.json$ file generated by {\small ParaFold}{} and AlphaFold. \section{Results and Discussions} To evaluate the accuracy and efficiency of {\small ParaFold}{}, we performed comparison across a range of dataset sizes and lengths. We started from the small dataset to show the accuracy and effects of the CPU and GPU optimizations of {\small ParaFold}{}. We then illustrate the application of {\small ParaFold}{} for the medium and large dataset to show the efficiency of {\small ParaFold}{}. \subsection{Correctness Evaluation} As for the accuracy, all the optimizations in {\small ParaFold}{} were implemented without compromising any of the quality of the results. {\small ParaFold}{} shares the same degree of accuracy as AlphaFold. We avoided any modification of the functional part of AlphaFold. The MSA searches, the databases, the model inference, the three recycling procedures, \textit{et al}., were all without any change. Because of the random seeds used in AlphaFold, and also because of processes like GPU inference that are nondeterministic, the prediction results in AlphaFold (and in {\small ParaFold}{} as well) may have run variance \cite{alphafoldgithub}. As shown in Fig \ref{fig:Correct}, the structures of the four proteins in the small dataset predicted by both AlphaFold and {\small ParaFold}{} were highly identical. \subsection{CPU acceleration} With parallel optimization, {\small ParaFold}{} attained a 3X average speedup on CPUs. Fig \ref{fig:cpu} illustrates the effect of parallel optimization on CPUs with the small dataset. {\small ParaFold}{} implemented the three MSA searches (1.jackhmmer on UniRef90, 2.jackhmmer on MGnify, 3.HHblits) in parallel on 20 CPU cores. The total CPU runtime achieved $\sim$68\% reduction in {\small ParaFold}{}, comparing with the original serial process. \begin{figure}[h] \centering \includegraphics[width=0.7\textwidth]{img/cpu.pdf} \caption{CPU acceleration. For proteins in the small dataset, with parallelism approach in ParaFold, the total CPU runtime was nearly 1/3 of that of the serial process in AlphaFold.} \label{fig:cpu} \end{figure} \begin{figure}[h] \centering \includegraphics[width=0.8\textwidth]{img/jax.pdf} \caption{GPU acceleration. Total GPU runtime for four proteins in batch inferences on one V100 GPU. The average time for each compilation was $\sim$60 seconds. (a) Without the JAX compile optimization, JAX compiled 40 times. (b) With the JAX compile optimization, only the first protein's ten models were compiled, thus JAX compiled only 10 times.} \label{fig:jax} \end{figure} \subsection{GPU acceleration} \begin{figure}[h] \centering \includegraphics[width=0.7\textwidth]{img/medium.pdf} \caption{CPU and GPU runtime of ParaFold predictions of the medium dataset. (a) The CPU runtime for each protein ranged from 1 to 7 hours, with an average of $\sim$2 hours. 8 CPU cores were assigned to each job to process one protein's MSA construction. (b) The GPU runtime ranged from 0.1 hour to 0.6 hour, with an average of $\sim$0.2 hour. One DGX-2 was assigned for these 100 proteins' model 1 inference.} \label{fig:medium} \end{figure} With optimization on GPUs to avoid JAX recompilation, {\small ParaFold}{} largely reduced GPU runtime for proteins with similar lengths. The speedup was attained by avoiding JAX recompilation in batch inferences. Fig \ref{fig:jax} shows the GPU runtime for four proteins with similar lengths in the small dataset. To predict with 10 models (model 1-5, pTM model 1-5), JAX compiled 10 times for the four proteins in {\small ParaFold}{}, compared with 40 times in AlphaFold. {\small ParaFold}{} reused the models compiled for the first protein, without triggering recompilation for the rest proteins in the task. As shown in Fig \ref{fig:jax}, the average time for JAX compilation was $\sim$60 seconds. Therefore, for each protein (except the first protein), the compile time was reduced by 10$\times$60 seconds. In massive inferences, this optimization resulted in a notable reduction of GPU runtime, as shown later with the large dataset. \subsection{Pipeline efficiency with the medium dataset} We show the speed of prediction with {\small ParaFold}{} across the medium dataset of 100 proteins (Fig \ref{fig:medium}). The lengths of proteins in the medium dataset range from 77 to 734 residues, representing a typical usage scenario with AlphaFold and {\small ParaFold}{}. Fig \ref{fig:medium}(a) illustrates the CPU and GPU runtime of {\small ParaFold}{}. The CPU runtime for each protein ranged from 1 to 7 hours, with an average of $\sim$2 hours, mainly depending on the protein's length. For each CPU job, 8 cores were assigned to process one protein's MSA construction. Fig \ref{fig:medium}(b) indicates the GPU runtime for model 1 inference of these proteins on one DGX-2 (GPU 01-16). The GPU runtime ranged from 0.1 hour to 0.6 hour, with an average of $\sim$0.2 hour. For each protein, the model 1 inference was performed on one V100/32G GPU. As shown in the left corner of the bottom figure, 16 jobs were simultaneously allocated for 16 proteins' model 1 inference. \subsection{Pipeline efficiency with the large dataset} \begin{figure}[h] \centering \includegraphics[width=1\textwidth]{img/GPU_20000.pdf} \caption{GPU runtime for proteins in the large dataset. We performed the inferences of 19,704 proteins on one DGX-2 (GPU 01-16) using ParaFold (solid line). 1,231 proteins were processed in a single task on GPU 01. The dash line indicates the estimation of GPU runtime if using AlphaFold, based on our calculation result that the average GPU runtime for one protein (50 residues) using AlphaFold for model 1 inference was 128 seconds.} \label{fig:GPU_20000} \end{figure} {\small ParaFold}{} accomplished model 1 inference of $\sim$20,000 proteins (50 residues) in 5.4 hours on one NVIDIA DGX-2. Model 1 inferences of 19,704 proteins in the large dataset were run in 16 tasks, each task for $\sim$1,232 proteins assigned with one V100/32G GPU. The average GPU runtime for one protein was 13.8 seconds (Table \ref{tab:large}). {\small ParaFold}{} reduced 99.5\% of the total GPU runtime for these $\sim$20,000 proteins, compared with AlphaFold when taking both MSA generation and model inference into account. To predict these proteins on one NVIDIA DGX-2, AlphaFold would take 1,129 hours. The average GPU runtime of one protein using AlphaFold in our test was 3,312 seconds on one V100 GPU, including 128 seconds for model 1 inference and 3,184 seconds for workload without the need of GPUs. \begin{table} \caption{GPU runtime for predictions using model 1 with the large dataset on one NVIDIA DGX-2} \label{tab:large} \begin{center} \begin{tabular}{ccccc} \hline Device & Number of Proteins & Total runtime (hour) & Average runtime (second) \\ \hline GPU 01 & 1,232 & 3.9 & 11.5 \\ GPU 02 & 1,232 & 5.4 & 15.7 \\ GPU 03 & 1,232 & 3.9 & 11.5 \\ GPU 04 & 1,232 & 5.1 & 14.8 \\ GPU 05 & 1,232 & 3.9 & 11.5 \\ GPU 06 & 1,232 & 5.0 & 14.7 \\ GPU 07 & 1,232 & 3.8 & 11.2 \\ GPU 08 & 1,232 & 5.0 & 14.6 \\ GPU 09 & 1,232 & 5.3 & 15.5 \\ GPU 10 & 1,232 & 5.0 & 14.5 \\ GPU 11 & 1,232 & 3.9 & 11.5 \\ GPU 12 & 1,232 & 5.0 & 14.7 \\ GPU 13 & 1,232 & 5.2 & 15.2 \\ GPU 14 & 1,232 & 5.1 & 14.8 \\ GPU 15 & 1,232 & 5.1 & 14.8 \\ GPU 16 & 1,224 & 5.0 & 14.8 \\ \midrule Total on DGX-2 & 19,704 & 5.4 & 13.8 \\ \hline \end{tabular} \end{center} \end{table} \begin{figure}[h] \centering \includegraphics[width=0.4\textwidth]{img/io.pdf} \caption{CPU runtime relative to the concurrent jobs for the large dataset. The runtime varies in the range of [0.6, 4.5] hours because of I/O workload on the Lustre file system.} \label{fig:io} \end{figure} Fig \ref{fig:GPU_20000}(a) shows that, in the GPU stage for model 1 inference, with JAX compile optimization, {\small ParaFold}{} attained a 13.8X average speedup over AlphaFold. The average GPU runtime of model 1 inference for each protein was 9.2 seconds in {\small ParaFold}{}, and 128 seconds in AlphaFold. The average GPU runtime decreased as more proteins were processed in the batch inferences, benefiting from the reuse of the models compiled for the first protein. Fig \ref{fig:GPU_20000}(b) shows that, the total execution time for the 1,231 proteins on GPU 01 was 3.18 hours in {\small ParaFold}{}, compared with 43.82 hours in AlphaFold. {\small ParaFold}{} attained a 13.9x total speedup over AlphaFold in model 1 inference. In the CPU stage, the total resources used for MSA construction amounted to 340,070 CPU core hours. For each protein, the CPU runtime varied with the number of concurrent jobs, ranging from 0.6 hour to 4 hours, as illustrated in Fig \ref{fig:io}. MSA construction took a longer time to process with more concurrent jobs on the Lustre file system of the cluster due to the I/O bottleneck. This is because the genetic search tools such as HHblits in the MSA construction are very I/O intensive. HHblits needs to do many random file access and read operations. In summary, using {\small ParaFold}{}, we observed the performance improvement that on the small, medium and large dataset. The GPU runtime was largely reduced, and the high throughput protein structure prediction were effectively empowered by the appropriate usage of the CPU and GPU resources on a supercomputer. \section{Related work} Inspired by AlphaFold's recent success, there have now been a few attempts to make AlphaFold faster and more convenient in structure predictions. Contrary to all these work, aimed at providing a parallel version of AlphaFold without any modification of its functions, {\small ParaFold}{} improves the parallel scalability and efficiency of AlphaFold without any loss in accuracy and virtues in design. \subsection{ColabFold} ColabFold \cite{mirdita2021colabfold} combines AlphaFold and RoseTTAFold \cite{baek2021accurate} and uses MMseqs2 \cite{steinegger2017mmseqs2} for a faster MSA generation. ColabFold is an easy-to-use Notebook based environment, and offers many advanced features, such as homo- and hetero-complex modeling and exposes AlphaFold internals. ColabFold's 20-30x faster search and optimized model use allows predicting thousands of proteins per day on a server with one GPU. Coupled with Google Colaboratory, ColabFold becomes a free and accessible platform for protein folding that does not require any installation or expensive hardware. Though the power of ColabFold is often restricted to the limited GPU resources supplied by Google Colab (16G-GPU to predict a max total length of 1400 residues, and a maximum 12 hours at a time), ColabFold recently offered a solution for use on local servers. \subsection{End-to-end learning of MSA} Petti \textit{et al}. \cite{Petti2021.10.23.465204} modified AlphaFold, replacing the MSA with the LAM (Learned alignment module). For a given set of unaligned related sequences, they backpropped through AlphaFold to update the parameters of LAM, maximizing the pLDDT. They demonstrated that by connecting their differentiable alignment module to AlphaFold and maximizing the predicted confidence metric, they can learn MSAs that improve structure predictions over the initial MSAs. This work highlights the potential of differentiable dynamic programming to improve neural network pipelines that rely on an alignment. \subsection{AlphaDesign} M Jendrusch \textit{et al}. \cite{jendrusch2021alphadesign} embedded AlphaFold into the design loop as a prediction oracle to enable rapid prediction of completely novel protein monomers starting from random sequences. Their work, AlphaDesign, integrated AlphaFold into target functions to provide high-quality structure prediction and measures of prediction confidence. They then combine this with state-of-the art validation using Rosetta \cite{baek2021accurate} \textit{ab initio} structure prediction and molecular dynamics simulations. AlphaDesign modified AlphaFold for single-sequence use by disabling ensembling, templates, extra MSA features and restricting the number of MSA features to the number of monomers modelled. The number of AlphaFold iterations (recycling steps) was kept as a parameter for each optimisation run. \section{Conclusion and Future Work} To accelerate scientific discovery in structural biology, {\small ParaFold}{} offers an efficient and scalable pipeline for predicting protein structures with AlphaFold. {\small ParaFold}{} builds beyond the initial offerings of AlphaFold by splitting the CPU and GPU parts of the pipeline, providing a speedup for MSA searches with parallel optimization on the CPUs and a speedup for batch inferences by avoiding JAX recompilation on GPUs. We evaluated {\small ParaFold}{} with the three datasets on one NVIDIA DGX-2. The results showed that {\small ParaFold}{} achieved dramatic reduction in GPU runtime without compromising the quality of the prediction results. High throughput protein structure predictions were effectively empowered by the appropriate usage of the CPU and GPU resources on a supercomputer. {\small ParaFold}{} completed $\sim$20,000 small proteins structure predictions on one NVIDIA DGX-2 in five hours. {\small ParaFold}{} is an open-source software available at GitHub \cite{zurichogithub,hpcgithub}. {\small ParaFold}{} made rapid and high-quality prediction of protein structures accessible with limited GPU resources, offering effective approach for large-scale structure predictions, leveraging the predictive power of AlphaFold. Two important tasks are planned in the future, examining to what extend I/O bottlenecks limit the scalability on MSA searches on CPUs, and optimizing JAX for supporting multiple GPUs in model inference. \section{Acknowledgement} The computations in this paper were run on the $\pi$ 2.0 supercomputer supported by the Center for High Performance Computing at Shanghai Jiao Tong University. The corresponding author is James Lin (<EMAIL>). \bibliographystyle{ACM-Reference-Format}
\section{Introduction} There has been a growing interest over the past years in the analysis of elastic waves in thin plates in the metamaterial community with the theoretical proposal \cite{farhat09,farhat09PRL}, and its subsequent experimental validation \cite{stenger12,misseroni16} of a broadband cloak for flexural waves. Square \cite{colquitt14} and diamond \cite{pomot2019form} cloaks are based on an improved transformed plate model, while form-invariance of the transformed equations in the framework of pre-stressed anisotropic plates is analized in \cite{Brun14b,morvaridi18,Golgoon21}. There is currently a keen activity in transformation optics, whereby transformation based solutions to the Maxwell equations expressed in curvilinear coordinate systems travel along geodesics rather than in straight lines \cite{rayoptics}. The fact that light follows shortest trajectories, the physical principle behind transformation optics, was formulated by de Fermat back in 1662. This minimization principle is applicable to ray optics, when the wavelength is much smaller than the size of the diffraction object. Leonhardt has shown in 2006 \cite{leonhardt06} that this allows for instance the design of invisibility cloaks using conformal mappings. Pendry, Schurig and Smith simultaneously reported that the same principle applies to electromagnetic waves, i.e. when the wavelength is in resonance with the scattering object, by creating a hole in the curved space \cite{pendry2006controlling}. Interestingly, the mathematicians Greenleaf, Lassas and Uhlmann proposed an earlier route to invisibility using an inverse problem approach in 2003 \cite{greenleaf03}, and together with Kurylev have been able since then to bridge the cloaking theory with Einstein theory of relativity, thereby suggesting possible avenues towards electromagnetic wormholes \cite{greenleafprl07,kadic2014invisible}. Leonhardt and Philbin have further proposed an optical fibre experiment \cite{philbin08} for an analogue of Hawking's famous event horizon in his theory of black holes \cite{hawking}. It seems therefore fair to say that transformation optics offers a unique laboratory for thought experiments, leading to a plethora of electromagnetic paradigms. However, this would remain some academic curiosity without the practical side effect: so-called metamaterials, first introduced by Pendry in 1999 to obtain artificial magnetism in locally resonant periodic structures\cite{pendry1999magnetism}. The first realization of an electromagnetic invisibility cloak \cite{schurig06} is a metamaterial consisting of concentric arrays of split-ring resonators. This structured material effectively maps a concealment region into a surrounding shell thanks to its strongly anisotropic effective permittivity and permeability which further fulfil some impedance matching with the surrounding vacuum. The cloak thus neither scatter waves nor induces a shadow in the transmitted field. Split ring resonators enable to meet among others the prerequisite artificial magnetism property, otherwise unobtainable with materials at hand \cite{pendry1999magnetism}. This locally resonant micro-structured cloak was shown to conceal a copper cylinder around $8.5$ GHz, as predicted by numerical simulations \cite{schurig06}. The effectiveness of the transformation based invisibility cloak was demonstrated theoretically by Leonhardt \cite{leonhardt06} solving the Schr\"odinger equation. Note that this equation is not only valid to compute ray trajectories (geodesics) in the geometrical optic limit, but also for matter waves in the quantum theory framework. Zhang et al. used this analogy to propose a quantum cloak based upon ultracold atoms within an optical lattice \cite{zhangprl08}. Greenleaf et al. subsequently discussed resonances (so-called trapped modes) occurring at a countable set of discrete frequencies inside the quantum cloak, using a spectral theory approach \cite{greenleafprl08}. Using analogies between the Helmholtz and the Schr\"odinger equations, Cummer and Schurig demonstrated that pressure acoustic waves propagating in a fluid also undergo the same geometric transform in 2D \cite{cummer06b}. Chen and Chan further extended this model to 3D acoustic cloaks \cite{chen07}, followed by an independent derivation of the acoustic cloak parameters in \cite{cummer08}. Such meta-fluids require an effective anisotropic mass density as in the model of Torrent and Sanchez-Dehesa \cite{sanchez}. However, an acoustic cloak for linear surface water waves studied experimentally and theoretically in \cite{farhat08}, only involves an effective anisotropic shear viscosity. Nevertheless, transformation based invisibility cloaks cannot be applied in general to elastodynamic waves in structural mechanics as there is a lack of one-to-one correspondence between the equations of elasticity and the Schr\"odinger equation \cite{milton06b}. Bigoni et al. actually studied such neutral inclusions in the elastostatic context using asymptotic and computational methods in the case of anti-plane shear and in-plane coupled pressure and shear polarizations \cite{bigoni98}, but when one moves to the area of elastodynamics, geometrical transforms become less tractable and neutrality breaks down: there are no conformal maps available in that case, and one has to solve inherently coupled tensor equations. More precisely, Milton, Briane and Willis have actually shown that there is no symmetric rank 4 elasticity tensor describing the heterogeneous anisotropic medium required for an elastodynamic cloak in the context of Cauchy elasticity \cite{milton06b}. However, so-called Willis's equations, discovered by the British applied mathematician John Willis in the early 80's \cite{willis1981variational,willis1985nonlocal}, offer a new paradigm for elastodynamic cloaking, as they allow for introduction of additional rank-3 and rank-2 tensors in the equations of motion that make cloaking possible. Nevertheless, Brun, Guenneau and Movchan have shown \cite{brunapl} that it is possible to design an elastic cloak without invoking Willis's equations for in-plane coupled shear and pressure waves with a metamaterial described by a rank 4 elasticity tensor preserving the main symmetries, as well as a scalar density. Importantly, both elasticity tensor and density are spatially varying, and the former one becomes singular at the inner boundary of the cloak \cite{brunapl}. Some design based on a homogenization approach for polar lattices has been proposed by Nassar, Chen and Huang \cite{nassar2018degenerate} and Garau et al. \cite{Garau2019}. Achaoui et al. have proposed an alternative design making use of elastic swiss-rolls \cite{achaoui2020cloaking}. Diatta and Guenneau \cite{diatta2014controlling} have shown that a spherical elastodynamic cloak can be designed using the same route as in \cite{brunapl}, but the corresponding metamaterial design remains an open problem. There is an alternative, pre-stress, route to elastic cloaking proposed by Norris and Parnell that greatly relaxes constraints on material properties compared to the previous routes \cite{parnell2012nonlinear,norris2012hyperelastic,parnell2012employing}. In the present article, we further investigate cylindrical cloaks for in-plane elastic waves using a radially symmetric linear geometric transform which depends upon a parameter. Depending upon the value of the parameter, the transform is applied to the design of neutral (invisibility) cloaks, elastic concentrators or cylindrical lenses. We discuss their underlying mechanism using a finite element approach which is adequate to solve the Navier equations in anisotropic heterogeneous media. \section{Governing equations and elastic properties of cloaks} \subsection{The equations of motion} The propagation of in-plane elastic waves is governed by the Navier equations. Assuming time harmonic $\exp(-i\omega t)$ dependence, with $\omega$ as the wave frequency, allows us to work directly in the spectral domain. Such dependence is assumed henceforth and suppressed, leading to \begin{equation} \nabla\cdot{\bf C}:\nabla{\bf u}+\rho\,\omega^2 {\bf u}+{\bf b}={\bf 0} \; , \label{navier} \end{equation} where, considering cylindrical coordinates $(r,\theta)$, ${\bf u}=(u_r,u_\theta)$ is the in-plane displacement, $\rho$ the density and $C_{ijkl}$ $(i,j,k,l=r,\theta)$ the fourth-order elasticity tensor of the (possibly heterogeneous anisotropic) elastic medium. In eqn. (\ref{navier}) ${\bf b}$ is the body force. \subsection{The transformed equations of motion} Let us now consider the radial linear geometric transform $(r,\theta)\rightarrow(r',\theta')$, with $\theta'=\theta$, shown in Fig. \ref{fig01} \begin{equation} r'\!=\!\left\{ \begin{array}{lcrl} [(1\!+\!\alpha)r_1\!-\!\alpha r_0] \frac{r}{r_0} & \mbox{for} & r'\leq r'_0 & \mbox{(domain A)},\\ (1\!+\!\alpha)r_1\!-\!\alpha r & \mbox{for} & r'_0\leq\! r'\!\leq r'_1 & \mbox{(domain B)},\\ r & \mbox{for} & r'\geq r'_1 & \mbox{(domain C)}, \end{array} \right. \label{PTransform} \end{equation} where $\alpha=-(r'_1-r'_0)/(r_1-r_0)$ is a real parameter and $r'_0=(1+\alpha)r_1-\alpha\, r_0$, $r'_1=r_1$. The transformation gradient is ${\bf F}=(dr'/dr){\bf I}_r+(r'/r){\bf I}_\bot$ where ${\bf I}_r={\bf e}_r\otimes{\bf e}_r$ is the second-order projection tensor along the radial direction identified by the unit vector ${\bf e}_r$, and ${\bf I}_\bot={\bf I}-{\bf I}_r$, with ${\bf I}$ second-order identity tensor. Furthermore, $J=\det {\bf F}$ is the Jacobian of the transformation. Design of in-plane transformation-based elastic cloaks has been first discussed in \cite{brunapl} when $\alpha=-1+r'_0/r'_1$ ($r_0=0$): in that case, (\ref{PTransform}) simplifies into the geometric transform for an invisibility cloak $ r'=r'_0+ \frac{r'_1-r'_0}{r'_1} r$ in the domain (B) \cite{pendry2006controlling,greenleaf03}, where $r'_0$ and $r'_1$, respectively, denote the inner and outer radii of the circular cloak. However, other values of the parameter $\alpha$ lead to equally interesting cloaks, such as neutral concentrators, first studied in the context of electromagnetism \cite{rahm}, and we would like to discuss these in the sequel. \begin{figure} \centering \includegraphics[width=10cm]{Transform1.pdf} \vspace{0.2cm} \caption{Geometric transform of eqn. (\ref{PTransform}). (a) Representation of the transform $r\rightarrow r'$ for different values of the parameter $\alpha$. The domains A $(r'\leq r'_0)$, B $(r'_0\leq r'\leq r'_1)$ and C $(r'\geq r'_1)$ are indicated. (b) Transformation of the geometry for $\alpha>0$, $\alpha<1$ and $\alpha=-1+r'_0/r'_1$ (perfect cloak).} \label{fig01} \end{figure} We now need to consider two cases for the transformed equations of motion. \subsubsection{Gauge transform ${\bf u}'(r',\theta')={\bf u}(r,\theta)$} By application of transformation (\ref{PTransform}) with the Gauge ${\bf u}'(r',\theta')={\bf u}(r,\theta)$ the Navier eqns.(\ref{navier}) are mapped into the equations \begin{equation} \nabla'\cdot{\mbox{${\bf{C}}$}'}:\nabla'{\bf u}'+\rho'\omega^2 {\bf u}'+{\bf b}'={\bf 0} \;,\label{snavier} \end{equation} where ${\bf u}'(r',\theta')$ and ${\bf b}'(r',\theta')$ are the transformed displacement and body force, respectively, and $\nabla'={\bf F}^t\nabla$ the gradient operator in the transformed coordinates. In particular, we stress that we assume an identity gauge transformation\cite{brunapl,NorrisShuvalov2011}, i.e. ${\bf u}'(r',\theta')={\bf u}(r,\theta)$. The stretched density is the scalar field \begin{equation} \rho'= \left\{ \begin{array}{ll} \displaystyle{\left[\frac{(1\!+\!\alpha)r'_1-r'_0}{\alpha r'_0}\right]^2 \rho} & \mbox{in A},\\[3.5 mm] \displaystyle{\frac{r'-(1\!+\!\alpha)r'_1}{\alpha^2 r'} \rho} & \mbox{in B},\\[4.5 mm] \rho & \mbox{in C}, \end{array} \right. \label{srho} \end{equation} homogeneous in A and C. The transformed linear elasticity tensor has components \begin{equation} \label{sc0} C'_{ijkl}=J^{-1}C_{mnop}F_{im}F_{ko}\delta_{jn}\delta_{lp}\;, \end{equation} where $(i,j,k,l=r',\theta')$, $(m,n,o,p=r,\theta)$, $\delta_{jn}$ is the Kronecker delta and the usual summation convention over repeated indices is used. In particular, if before transformation the material is isotropic, i.e. $C_{ijkl}=\lambda\delta_{ij}\delta_{kl}+\mu(\delta_{ik}\delta_{jl}+\delta_{il}\delta_{jk})$ $(i,j,k,l=r,\theta)$, with $\lambda$ and $\mu$ the Lam\'e moduli, the transformed elasticity tensor $\mbox{${\bf{C}}$}'$ has non zero cylindrical components \begin{equation} \begin{array}{ll} C'_{r'\!r'\!r'\!r'\!}\!=\!\frac{r'-(1+\alpha)r_1}{r'}(\lambda\!+\!2\mu), \!& C'_{\!\theta'\!\theta'\!\theta'\!\theta'}\!=\!\frac{r'}{r'-(1+\alpha)r_1}(\lambda\!+\!2\mu),\\[1.6mm] C'_{r'\!r'\!\theta'\!\theta'\!}=C'_{\theta'\!\theta'\! r'\!r'}=\lambda, & C'_{r'\!\theta'\!\theta' \!r'}=C'_{\theta'\! r'\!r'\!\theta'}=\mu, \\[1.6mm] C'_{r'\!\theta'\! r'\!\theta'}=\frac{r'-(1+\alpha)r_1}{r'} \mu, & C'_{\theta'\! r'\!\theta'\! r'}=\frac{r'}{r'-(1+\alpha)r_1} \mu \; , \end{array} \label{sc} \end{equation} in B and $\mbox{${\bf{C}}$}'=\mbox{${\bf{C}}$}$ in A and C. The transformation and the corresponding transformed density $\rho'$ and elasticity tensor $\mbox{${\bf{C}}$}'$ are broadband, they do not depend on the applied frequency $\omega$. \subsubsection{Gauge transform ${\bf u}'(r',\theta')={\bf F}^{-t}{\bf u}(r,\theta)$} As noted in \cite{milton06b}, by application of transformation (\ref{PTransform}) with the Gauge ${\bf u}'(r',\theta')={\bf F}^{-t}{\bf u}(r,\theta)$, where ${\bf F}$ is the transformation gradient, the Navier eqns.(\ref{navier}) are mapped into the equations \begin{equation} \begin{array}{ll} \label{eq:willis-model-change-of-variable-princ} \nabla' \cdot \Big(\mbox{${\bf{C}}$}'': \nabla' {\mathbf u}' + \mbox{${\bf{D}}$}' \cdot {\mathbf u}' \Big) + \mbox{${\bf{S}}$}' : \nabla' {\mathbf u}' + \omega^2 \rho' \mathbf{u}' + \mathbf{b}' = \mathbf{0} \; . \end{array} \end{equation} The transformed rank-4 elasticity tensor $\mbox{${\bf{C}}$}''$ has components \begin{equation} \label{scwill} C''_{ijkl}=J^{-1}F_{im}F_{jn}C_{mnop}F_{ko}F_{lp} \; , \end{equation} where $(i,j,k,l=r',\theta')$, $(m,n,o,p=r,\theta)$. We note that $\mbox{${\bf{C}}$}''$ in (\ref{scwill}) has all the symmetries, unlike $\mbox{${\bf{C}}$}'$ in (\ref{sc}), which has the major but not the minor simmetries. The rank-3 tensors $\mbox{${\bf{D}}$}'$ and $\mbox{${\bf{S}}$}'$ in (\ref{scwill}) have elements \begin{equation} \label{sDwill} D'_{ijk}=J^{-1}F_{im}F_{jn} C_{mnop} \frac{\partial^2 x'_k}{\partial x_o \partial x_p} = D'_{jik} \; , \end{equation} and \begin{equation} \label{sSwill} S'_{ijk}=J^{-1} \frac{\partial^2 x'_i}{\partial x_m \partial x_n} C_{mnop} F_{jo}F_{kp} =S'_{jik} \; . \end{equation} Finally, the transformed density $\rho'$ in (\ref{scwill}) is matrix valued \begin{equation} \label{srhowill} \rho'_{ij}=J^{-1}\rho F_{im}F_{jm}+J^{-1} \frac{\partial^2 x'_i}{\partial x_m \partial x_n} C_{mnop} \frac{\partial^2 x'_j}{\partial x_o \partial x_p} = \rho'_{ji} \; . \end{equation} These expressions were first derived in \cite{milton06b}. Now, if before transformation the material is isotropic, then the transformed elasticity tensor $\mbox{${\bf{C}}$}''$ has non zero cylindrical components \begin{equation} \begin{array}{l} C''_{r'\!r'\!r'\!r'\!}\!=\!\frac{r'-(1+\alpha)r_1}{r'(r_1-r_0)^2}(\lambda\!+\!2\mu), \\[1.6mm] C''_{\!\theta'\!\theta'\!\theta'\!\theta'}\!=\!\frac{r'^3}{(r_1-r_0)^2(r'-(1+\alpha)r_1)^3}(\lambda\!+\!2\mu), \\[1.6mm] C''_{r'\!r'\!\theta'\!\theta'\!}=C''_{\theta'\!\theta'\! r'\!r'}=\frac{r'}{(r_1-r_0)^2(r'-(1+\alpha)r_1)}\lambda, \\[1.6mm] C''_{r'\!\theta'\!\theta' \!r'}=C'_{\theta'\! r'\!r'\!\theta'} =C''_{r'\!\theta'\! r'\!\theta'}=C''_{\theta'\! r'\!\theta'\! r'}= \frac{r'}{(r_1-r_0)^2(r'-(1+\alpha)r_1)} \mu \; , \end{array} \label{scwillwill} \end{equation} in B and $\mbox{${\bf{C}}$}''=\mbox{${\bf{C}}$}$ in A and C. On the other hand, the rank-3 tensors $\mbox{${\bf{D}}$}'$ and $\mbox{${\bf{S}}$}'$ have non zero cylindrical components \begin{equation} \begin{array}{l} D'_{r'\!r'\!r'\!}\!=\frac{1}{(r_1-r_0)^2(r'-(1+\alpha)r_1)(r'+r_1r_0/(r_1-r_0))}\lambda =-S'_{r'\!r'\!r'}\! \\[1.6mm] D'_{r'\!\theta'\!\theta'}=D'_{\theta'\! r'\!\theta'} =2\frac{1}{(r_1-r_0)^2(r'-(1+\alpha)r_1)^2} \mu =-S'_{\theta'\!\theta'\! r'}=-S'_{\theta'\! r'\!\theta'} \\[1.6mm] D'_{\theta'\!\theta'\! r'}\!=\frac{r'+r_1r_0/(r_1-r_0)}{(r_1-r_0)^2(r'-(1+\alpha)r_1)^3}(2\mu+\lambda) =-S'_{r'\!\theta'\!\theta'}\! \; . \end{array} \label{sdwillwill} \end{equation} Similar expressions can be derived for the transformed density. Expressions in (\ref{scwillwill}) and \ref{sdwillwill}) are more intricate than those in (\ref{sc}); thus, in the sequel, we focus on the transformed equations of motion (\ref{snavier}). \subsection{Interface conditions for Gauge ${\bf u}'(r',\theta')={\bf u}(r,\theta)$} \label{SectionIC} Perfect cloaking and perfect concentrator require additional conditions on displacements and tractions at the interfaces between the domains with different material properties introduced by the transformation (\ref{PTransform}). In the transformed problem (\ref{snavier}) there are two interfaces, between domains A and B, at $r'=r'_0$ and $r=r_0$, and at the cloak's outer boundary, between domains B and C, at $r'=r=r_1$. Transformed equations (\ref{snavier}) together with the assumption ${\bf u}'(r',\theta')={\bf u}(r,\theta)$ assure that displacements and tractions in the inhomogeneous transformed domain at a point $(r',\theta')$ coincide with displacements and tractions at the corresponding point $(r,\theta)$ in the original homogeneous problem (\ref{navier}) where no interfaces between different materials are present. In particular, if we introduce the Cauchy stress tensors ${\bf \sigma}'=\mbox{${\bf{C}}$}'\!:\!\nabla'{\bf u}'$ and ${\bf \sigma}=\mbox{${\bf{C}}$}\!:\!\nabla{\bf u}$ for the transformed and original problem, respectively, it is verified the following equality between tractions \begin{equation} {\bf \sigma}'\cdot{\bf e}_r'={\bf \sigma}\cdot{\bf e}_r, \label{EqTrac} \end{equation} at $r'=r'_0$, $r=r_0$ and at $r'=r=r_1$. Equality (\ref{EqTrac}) can be easily demonstrated by using Nanson's formula \cite{Ogden1997} ${\bf e}_r'=J {\bf F}^{-t}{\bf e}_r$ for the radial unit vectors. Note that the matching is independent on the particular value assumed by $\alpha$. \subsection{Perfect cloak. Singularity at the inner interface} We note that for the perfect cloak\cite{brunapl}, i.e. $r_0=0$ and $\alpha=-1+r'_0/r'_1$, a point at $r=0$ is mapped into a disk of radius $r'_0$. This is a singular transformation and, at the cloak inner boundary, $r'-(1+\alpha)r_1\to 0$. Therefore, at $r'=r'_0$, from (\ref{srho}) and (\ref{sc}) one can see that $\rho'\to 0$, $C'_{r'\!r'\!r'\!r'\!}\,,\, C'_{r'\!\theta'\! r'\!\theta'}\to 0$, while $C'_{\theta'\!\theta'\! \theta'\!\theta'}\,, C'_{\theta'\! r'\!\theta'\!r'}\to \infty$. Similarly, at $r'=r'_0$, from (\ref{scwillwill}) and (\ref{sdwillwill}) one can see that $C''_{r'\!r'\!r'\!r'\!}\to 0$, while $C''_{\theta'\!\theta'\! \theta'\!\theta'}\,,C''_{r'\!r'\!\theta'\!\theta'\!}=C''_{\theta'\!\theta'\! r'\!r'} \,, C''_{r'\!\theta'\!\theta' \!r'}=C'_{\theta'\! r'\!r'\!\theta'} =C''_{r'\!\theta'\! r'\!\theta'}=C''_{\theta'\! r'\!\theta'\! r'}\to \infty$. Moreover, one notes that the rate of divergence is faster for ${\bf C''}$ than ${\bf C}'$, and thus anisotropy is even more extreme in the neighborhood of the inner boundary for ${\bf C''}$. All expressions in (\ref{sdwillwill}) diverge when $r'-(1+\alpha)r_1\to 0$. The required extreme anisotropy physically means that pressure and shear waves propagate with an infinite velocity in the azimuthal $\theta'$-direction and zero velocity in the radial $r'$-direction along the inner boundary, which results in a vanishing phase shift between a wave propagating in a homogeneous elastic space and another one propagating around the coated region. Clearly the presence of unbounded physical properties poses limitations on possible realizations and numerical implementation of the model; regularization techniques have been proposed introducing the concept of {\em near cloak} \cite{Kohn2008,Colquittetal2013,Jonesetal2015}, but the realization of such elastodynamic cloaks remains a challenge. \subsection{General transformation} We now wish to extend first the proposal of Rahm et al. \cite{rahm} of an omni-directional electromagnetic concentrator to the elastic setting and second to consider a more general transformation including folded transformed geometries, as proposed by for quasi static equations of electromagnetism by Milton et al. \cite{Miltonetal2008}. We recall that the transformation (\ref{PTransform}) compress/expand a disc with radius $r_0$ at the expense of an expansion/compression of the annulus between $r_0$ and $r_1$. The inner disk is expanded for $-1<\alpha<-1+r_0'/r_1'$ with the limiting cases $\alpha=-1$ corresponding to an identity and $\alpha=-1+r_0'/r_1'$ to perfect cloaking. On the contrary the disk is compressed for $\alpha<-1$ and $\alpha>0$, and, in the case of positive value of the topological parameter $\alpha$, $r_0>r_1$ and a folding of the original geometry is obtained. The material remains homogeneous and isotropic in the inner disk A where only the density is changed. In the annulus region B the material is heterogeneous and elastically anisotropic. Consistently with Brun et al.\cite{brunapl} and differently from Milton et al. \cite{milton06b} the density remains a scalar field. We stress that the heterogeneity is smoothly distributed and the material is functionally graded with the absence of any jump in the material properties leading to possible scattering effects. As detailed above interface conditions are automatically satisfied and do not introduce any scattering. It is important to note that, excluding the perfect cloaking case, for bounded values of $\alpha$ all the elastic rigidities and the density are bounded leading to possible physical and numerical implementation of the metamaterial structure. \subsection{The radial field concentrator. Unbounded $\alpha$} The limiting cases $\alpha\to \pm\infty$, where $r_0=r_1$, correspond asymptotically to the radial transformation \begin{equation} r'= \left\{ \begin{array}{ll} \frac{r}{r_1} & \mbox{in A},\\ r_1 & \mbox{in B},\\ r & \mbox{in C}. \end{array} \right. \label{eqn1001} \end{equation} In such a case in the annulus region B $C'_{\theta'\!\theta'\! \theta'\!\theta'}\,, C'_{\theta'\! r'\!\theta'\!r'}\to \infty$, $\rho'\to\infty$ and all the other elastic rigidities components are unchanged. In such material, independently on the external field impinging the metamaterial region $r'\le r'_1$, the elastic fields in B are radially independent and depend only on the azimuthal coordinate $\theta'$. However, the harmonic behavior cannot be reached in a finite time after the transient since the density $\rho'$ is unbounded. \section{Numerical results and discussion} In this section, we report the finite element computations performed in the COMSOL multiphysics package. Normalized material parameters are used. A cloak of density $\rho'$ (\ref{srho}) and elasticity tensor $\mbox{${\bf{C}}$}'$ (\ref{sc0},\ref{sc}) is embedded in an infinite isotropic elastic material with normalized Lam\'e moduli $\lambda=2.3$ and $\mu=1$, and mass density $\rho=1$. The cloak has inner and outer radii $r_0'=0.2$ and $r_1'=0.4$, respectively. The disc inside the cloak consists of the same elastic material as the outer medium but different density. We further consider a harmonic unit concentrated force applied either in the direction $x_1$ or $x_2$ which vibrates with an angular frequency $\omega=40$. This force is sometimes located outside the cloak (cf. Fig. \ref{fig02}-\ref{fig04}), sometimes inside the coating (cf. Fig. \ref{fig05}) or within the central disc (cf. Fig. \ref{fig06}), depending upon whether we are looking for some neutrality feature, lensing/mirage effect or some localization. Before we start looking at the cloaks's features depending upon the ranges of values of the parameter $\alpha$, we briefly discuss the implementation of elastic perfectly matched layers (PMLs), in the framework of transformation elasticity. \subsection{Implementation of elastic cylindrical PMLs} A perfectly matched layer has been implemented in order to model the infinite elastic medium surrounding the cloak (cf. outer ring in Figs. \ref{fig02}-\ref{fig06}); this has been obtained by application of the geometric transform \cite{zh02}, \begin{equation} x_i''=(1+a)\hat x_i-ax_i, \qquad i=1,2, \end{equation} for $|x_i|>|\hat{x}_i|$, where $a$ is now a complex number whose imaginary part accounts for the decay of the elastic waves and $\hat{x}_i=\pm 1$ in Fig. \ref{fig02}-\ref{fig06}. The corresponding (complex) density $\rho'''$ and elasticity tensor $\mbox{${\bf{C}}$}'''$ are still given by (\ref{srho}) and (\ref{sc}). The accuracy of the PMLs has been numerically validated when $a=i-1$, by comparison with the Green's function in homogeneous elastic space (cf. Eq. \ref{eqn100} and Fig. \ref{fig02}b, c). \begin{figure} \centering \includegraphics[width=6.2cm]{Cloak_Out_Hz.png} \vspace{0.2cm} \caption{Elastic field generated by an horizontal unit force applied in the external homogenous region; $\alpha=-1+r'_0/r'_1=-0.5$, $\omega=40$, source ${\bf x}_0=(-0.42,0)$. Magnitude $u=\sqrt{u_1^2+u_2^2}$ of the displacement field in the system with inclusion and cloaking (a) and in an homogenous system (b). Comparison between the displacement magnitude $u$ computed in Comsol for a cloaked inclusion (black line) and the analytical Green's function in an infinite homogeneous linear elastic and isotropic material (gray line), see Eq. (\ref{eqn100}).} \label{fig02} \end{figure} \begin{figure} \centering \includegraphics[width=6.cm]{Cloak_Out_Vc.png} \vspace{0.2cm} \caption{Elastic field generated by a vertical unit force applied in the external homogeneous region. $\alpha=-1+r'_0/r'_1=-0.5$, $\omega=40$, source ${\bf x}_0=(-0.42,0)$. (a) Magnitude $u$ of the displacement field; (b) Comparison between the displacement magnitude $u$ computed in Comsol for a cloaked inclusion (black line) and the analytical Green's function in an infinite homogeneous linear elastic and isotropic material (gray line).} \label{fig03} \end{figure} We can therefore confidently carry out computations with these PMLs. We start by the study of an invisibility cloak for in-plane elastic waves, whereby the point source considered in \cite{brunapl} now lies in the close vicinity of the cloak (intense near field limit when the acoustic ray picture breaks down). \subsection{Neutrality for a point source outside the cloak} We report in Fig. \ref{fig02} and Fig. \ref{fig03} the computations for a point force applied at a distance $r=0.42$ away from the center of the cloak and close to the cloak itself of outer radius $r'_1=0.4$. The force is applied in the horizontal direction in Fig. \ref{fig02} and in the vertical direction in Fig. \ref{fig03}. In both upper panels (a), we clearly see that both the wave patterns of the magnitude of the displacement field are smoothly bent around the central region within the cloak (where the magnitude is uniform). The comparative analyses between panels (a) and (b) of Fig. \ref{fig02} shows that the wave patterns in the external homogeneous domain is not perturbed by the presence of the inclusion and cloaking interface. This is verified quantitatively in Fig. \ref{fig02} panel (c) and in Fig. \ref{fig03} panel (b) where the numerically computed wave pattern is compared with the Green's function in homogeneous elastic space \begin{equation} \label{eqn100} {\bf G}({\bf x})\!=\!\frac{i}{4\mu} \left\{ H_0^{(1)}(k_s r){\bf I}\!-\!\frac{Q}{\omega^2} \nabla\nabla\left[H_0^{(1)}(k_s r)\!-\!H_0^{(1)}(k_p r)\right] \right\}, \end{equation} with $H_0^{(1)}$ the Hankel function, $\bf I$ the second order identity tensor, $\nabla$ the gradient operator, $k_p=\omega/c_p$, $k_s=\omega/c_s$, $Q=(1/c_p^2+1/c_s^2)^{-1}(\lambda+\mu)/(\lambda+2\mu)$, $c_p=\sqrt{(\lambda+2\mu)/\rho}$, $c_s=\sqrt{\mu/\rho}$. The plot are reported along the horizontal line $x_2=0$ passing from the point of application of the force. The absence of forward or backward scattering is demonstrated by the excellent agreement between the two fields in the external homogeneous domain $r>0.4$. Clearly, the profile is much different when the coating is removed and the inner disc is clamped or freely vibrating. We also see that the field in the cloaking region has the same amplitude as the one in homogeneous case but shifted following the transformation $r'(r)$; in the inner disk the field is homogeneous. Finally the effectiveness of the PML domains can also be appreciated. In Fig. \ref{fig04} the deformation fields are also reported for both cases, where the force is applied in horizontal (first column) and vertical (second column) direction. In the upper (a,b) and central (c,d) panels the skew-symmetric nature of the components $\varepsilon_{11}$ and $\varepsilon_{22}$ of the deformation tensor reveals the tensor nature of the problem. The component $\varepsilon_{12}$ leads to a non-intuitive pattern whereby fully-coupled shear and pressure components create the optical illusion of interferences. Again, the effect of the cloaking is shown and also for deformation fields waves are bent around the cloaking region without backward and forward scattering. \begin{figure} \centering \includegraphics[width=10cm]{Cloak_Out_Deff.png} \vspace{0.2cm} \caption{Elastic deformation fields generated by a unit force applied in the the external homogeneous region. $\alpha=-1+r'_0/r'_1=-0.5$, $\omega=40$, source$=(-0.42,0)$ . (a), (c), (e) Force applid in the horizontal direction $x_1$. (b), (d), (f) Force applied in the vertical direction $x_2$. (a), (b) Component $\varepsilon_{11}=\frac{\partial u_1}{\partial x_1}$; (c), (d) Component $\varepsilon_{22}=\frac{\partial u_2}{\partial x_2}$; (e), (f) Component $\varepsilon_{12}=\varepsilon_{21}=\frac{1}{2}(\frac{\partial u_1}{\partial x_2}+\frac{\partial u_2}{\partial x_1})$.} \label{fig04} \end{figure} \subsection{Mirage effect for a point source in the coating} In this section, we look at the case of a point force located inside the coating. In a way similar to what was observed for an electromagnetic circular cylindrical cloak \cite{zolla07}, we observe in Fig. \ref{fig05} a mirage effect: the point force seems to radiate from a location shifted towards the inner boundary (further away from an observer) as given by \begin{equation} r=\frac{(1+\alpha)r_1-r'}{\alpha} \; , \; \theta=\theta' \;, \label{invPTransform} \end{equation} as also shown in panel (b). Importantly, the profile of the shifted point source in homogeneous elastic space is superimposed with that of the point source located inside the coating, but only outside the cloak. In the invisibility region i.e. the disc at the center of the cloak, the field is constant and this suggest that the central region behaves as a cavity. We study this cavity phenomenon in the next section. The example in Fig. \ref{fig05} reveals that any object located inside the coating would appear as a different elastic material with a different shape to an observer. \begin{figure} \centering \includegraphics[width=7cm]{Cloak_Mid_Vc.png} \vspace{0.2cm} \caption{Elastic field generated by a vertical unit force applied in the cloaking region. $\alpha=-1+r'_0/r'_1=-0.5$, $\omega=40$, source ${\bf x}_0=(-0.3,0)$. (a) Magnitude $u$ of the displacement field; (b) Comparison between the displacement magnitude $u$ computed in Comsol for a cloaked inclusion (black line) and the analytical Green's function in an infinite homogeneous linear elastic and isotropic material (gray line), corresponding to a force applied in a shifted source point ${\bf x}_0=(-.2,0)$.} \label{fig05} \end{figure} \subsection{Confinement for a point source in the central region} We now consider a point force inside the invisibility region. Interestingly, a point source located in the invisibility zone always radiates outside the cloak as if it was located at the origin and this is quite natural as the central disc is simply the image of the origin via the geometric transform (\ref{invPTransform}). The fact that the central disc behaves as a closed cavity is also intuitive, as the elasticity tensor $\mbox{${\bf{C}}$}'$ is singular on the boundary of the disc. \begin{figure} \centering \includegraphics[width=7cm]{Cloak_In_Vc.png} \vspace{0.2cm} \caption{Elastic field generated by a vertical unit force applied in the internal inclusion. $\alpha=-1+r'_0/r'_1=-0.5$, $\omega=40$, source ${\bf x}_0=(-0.17,0)$. (a) Magnitude $u$ of the displacement field; (b) Comparison between the displacement magnitude $u$ computed in Comsol for a cloaked inclusion (black line) and the analytical Green's function in an infinite homogeneous linear elastic and isotropic material (gray line), corresponding to a force applied at the origin ${\bf x}_0=(0,0)$.} \label{fig06} \end{figure} \subsection{Squeezing the wavelength with an elastic concentrator} \begin{figure} \centering \includegraphics[width=7cm]{PW_Pressure.png} \vspace{0.2cm} \caption{Elastic field generated by a pressure plane wave ${\bf u}=(A \exp(ik_pt),0)$ with $\omega=60$. Left column: magnitude $u$ of the displacement field. Right column: comparison between the displacement magnitude $u$ computed in Comsol for a cloaked inclusion (black line) and the pressure plane wave in an infinite homogeneous linear elastic and isotropic material (gray line), results are plotted along an horizontal line passing from the center of the inclusion. (a) $\alpha=-0.5$, (b) $\alpha=-0.6$, (c) $\alpha=-1$, (d) $\alpha=-5$} \label{fig07} \end{figure} We report the effects associated to an increase in the magnitude of the parameter $\alpha$ describing the linear transformation (\ref{PTransform}). In Fig. \ref{fig07} the effect of the cylindrical coating on the inclusion is given for a pressure plane wave ${\bf u}=(A \exp(ik_pt),0)$ propagating in the horizontal direction $x_1$. A decrease of $\alpha$ from $\alpha=-1+r'_0/r'_1=-0.5$ introduces wave propagation within the inclusion with progressive shorter wavelengths while the amplitude of the wave remains unchanged. From Fig. \ref{fig07}d it is evident that, when $\alpha<-1$, the interface act as an energy concentrator within the inclusion increasing the energy flux. The energy crossing the inclusion region $r\le r'_0=0.2$ equals the energy crossing the larger region $r\le r_0$, in a homogeneous material. In the interval $-1>\alpha>-\infty$, $r'_0<r_0<r'_1$. We also note that, when $\alpha\neq -0.5$ the transformation is regular and material parameters remain bounded indicating additional advantages in technological and numerical implementations of the model. Last but not least, the field in the external domain remains unchanged. \begin{figure} \centering \includegraphics[width=7cm]{Pressure_PW_Folding.png} \vspace{0.2cm} \caption{Elastic field generated by a pressure plane wave ${\bf u}=(A \exp(ik_pt),0)$ with $\omega=60$ and $\alpha=0.94$. (a) Magnitude $u$ of the displacement field. (b) Displacement magnitude $u$ computed in Comsol for a cloaked inclusion plotted along an horizontal line passing from the center of the inclusion.} \label{fig08} \end{figure} \subsection{Folding transformation. Superconcentration of an elastic wave with a cylindrical lens} We finally report in Fig. \ref{fig08} an enhanced energy concentration effect obtained from a folding transformation ($\alpha>0$). In such a case all the energy crossing a circular region larger than the region delimited by the cloaking interface is concentrated into the inner inclusion. In Fig. 8, $\alpha=0.94$ and the radius of the circular region in the homogenous space is $3.06$ times the radius of the inner inclusion. Again, such an effect is obtained by an increase in the energy flux leaving unperturbed both the wave amplitude and the fields in the external region. \section{Conclusion} We have proposed to use stretched coordinates in order to design an elastic cloak bending the trajectory of in-plane coupled shear and pressure waves around an obstacle, concentrating them in its core, or focussing them. We investigated the transformed equations of motion for the Mitlon-Briane-Willis transformation gauge ${\bf u}'(r',\theta')={\bf F}^{-t}{\bf u}(r,\theta)$ and the Brun-Guenneau-Movchan gauge ${\bf u}'(r',\theta')={\bf u}(r,\theta)$ (see \cite{NorrisShuvalov2011}). The former leads to Willis's equations with more extreme anisotropic parameters in the cloak than for the latter. However, the latter requires a transformed elasticity tensor without the minor symmetries, which is another hurdle for a metamaterial design. We have studied various limiting cases for the value of a parameter in the considered radially symmetric linear geometric transforms. These transforms are applied to the design of neutral (invisibility) cloaks, elastic concentrators or cylindrical lenses. We have numerically explored all the above for the gauge ${\bf u}'(r',\theta')={\bf u}(r,\theta)$ leading to a non-fully symmetric transformed elasticity tensor, and have notably shown that a source located inside the anisotropic heterogeneous elastic coating seems to radiate from a shifted location, and can also lead to anamorphism. We believe that our space folding based design of elastic cylindrical lenses can lead to an in-plane counterpart of the external cylindrical cloak for anti-plane shear waves introduced in \cite{guenneau2021time} and applied periodically in \cite{Meirbekova2020}. We hope our results might open new vistas in cloaking devices for elastodynamic waves. Whereas their governing equations do not generally retain their form under geometric transforms, unlike for electromagnetic and acoustic waves, one can choose specific gauges that can make the transformed equations of motions easier to handle.
\section{Introduction} \label{introduction} Trusted Research Environments (TREs) are becoming commonly used for the analysis of data from a range of sources, particularly electronic health records (EHRs). Data within TREs are kept secure and are only accessible following appropriate approvals and access being granted, to comply with the legal requirements of data providers like the National Health Service (NHS), allowing research to be carried out safely \citep{arenas_design_2019}. The volume of collaborative TRE-based research is growing, a trend that began before, but has been accelerated by, the COVID-19 pandemic. This report summarizes a collaborative project between Swansea University, The University of Manchester and The Alan Turing Institute. The objectives of this partnership project were: (i) to develop a strategy for the Swansea and Manchester based researchers participating in the Wales Multimorbidity Machine Learning (WMML) project to follow, to implement best practices for research software engineering and data science in the context of the SAIL (Secure Anonymised Information Linkage) Databank TRE at Swansea, and (ii) to develop a strategy to move the researcher's code to a form that is citation and publication ready, outside of the TRE. This report describes the resulting recommendations from The Alan Turing Institute, which can be used as a template for making the transition from script-based (and notebook-based) research code that works on sensitive data in a TRE, to a format that is publicly accessible and can be cited by future research. The WMML researchers are working on various novel analytical techniques and machine learning methods for clustering diseases in the Wales Multimorbidity e-Cohort (WMC) within the SAIL databank, with the aim of uncovering the multimorbidities that lead to the largest problems for both the NHS and individuals. One example of this research is \cite{rafferty_ranking_2021}. Following recommendations made in section \ref{publishing} of this report, research code associated with this paper is also published to Zenodo; see \cite{james_rafferty_2021_5285009}. The WMC is an anonymised population-scale healthcare dataset, developed within SAIL from other source data by \cite{lyons_protocol_2021}. The recommendations discussed in this report include alternative workflows for the development of research code to be used for analysis within TREs on sensitive data, as well as best practices for working collaboratively within a TRE. In addition, recommendations are made on how to publish the work done in a TRE, including the research code. For the WMML project, this code includes the novel methods for multimorbidity clustering, as well as any scripts used for data preparation and manipulation. This report discusses how (and why) to publish this code alongside the results of the research, which include any analyses, statistics, data visualizations and other outputs relevant for publication. This report focuses on adapting existing best practices in research software engineering and data science for the specific use case of the SAIL Databank TRE and the WMML project. However, much of the guidance developed here, in the context of a live research project, will be of broader relevance. The target audience includes any researcher or data scientist looking to work with, or publish research from a TRE. The reader is assumed to have programming skills in a language commonly used for data science such as Python or R and some familiarity with GitHub or GitLab for version controlled code projects. Resources that can help with these prerequisites are offered in section \ref{training}. It is also hoped that this report evidences the need for computational research projects in the healthcare field to spend time and resources on implementing these recommendations. Though an operational product in the form of published research code may seem like a secondary objective, with healthcare research outputs focused more on the clinical and policy implications of results, ensuring that such code is developed to a high standard and published will increase the odds that any important results can be reproduced. This is of direct relevance to clinicians, policymakers and other researchers who are making decisions based on those results and need to understand how reliable the findings are. \newpage \subsection{Project Scoping} The project that has culminated in this report was conducted by (and report authored by) Ed Chalstrey on behalf of The Alan Turing Institute, in collaboration with WMML researchers and principal investigators (PIs), see \ref{acknowledgements} (Acknowledgements). Scoping for the report involved individual and group discussions between the author and WMML team members, carried out over the duration of the project via conference call and email. Initial discussions revolved around defining the project output, suggestions for which included code contributions to \citep{james_rafferty_2021_5285009} and other WMML code repositories within SAIL. Upon further discussion, it became apparent that much of the advice presented in \href{https://the-turing-way.netlify.app/welcome.html}{The Turing Way} \citep{the_turing_way_community_2019_3233986}, an open source handbook for reproducible, ethical and collaborative data science, developed in large part by members of The Alan Turing Institute, would be of direct relevance to WMML researchers. However, recommendations of this nature that cater to TRE-based research specifically are not something currently included in the handbook or comparable resources elsewhere. This gap was identified as something valuable to address, both for the WMML project, for future SAIL projects and for TRE-based research in general. The author and collaborators coalesced around the idea of addressing the gap in the literature with this report, which combines ways of working suggestions of direct relevance to the WMML project with more generally applicable guidance for the publishing of research conducted with TREs. This output was suggested by the author and independently agreed upon each of the collaborators. Useful revisions to this report have been suggested by the collaborators listed in \ref{acknowledgements} (Acknowledgements) and implemented by the author. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{Turing-WMML Collaboration Objectives:} \begin{itemize} \item Offer best practices for research software development in the TRE context \item Provide a template for publishing code from research carried out with TREs \item Ensure WMML project team can realise the first two objectives \item Report summarising collaboration and resulting recommendations for TRE research \end{itemize} \end{tcolorbox} \section{The Turing Way for TREs} \label{turingwaytres} This section of the report, discusses some of the most pertinent best practices for reproducible data science and scientific software development in the context of TRE-based research. Much of this section is directly adapted from \href{https://the-turing-way.netlify.app/welcome.html}{The Turing Way} handbook \citep{the_turing_way_community_2019_3233986}. A variety of topics applicable to TRE-based research are covered including: \ref{notebooks}) using notebooks (such as Jupyter or RMarkdown), \ref{testing}) how to ensure that code meets the quality requirements necessary for publishing research code (via testing, formatting and use of continuous integration) and \ref{environments}) controlling the computational environment to aid reproducibility. Advice on how to best utilise each of these are offered alongside commentary on the pitfalls and tradeoffs of various approaches. This report assumes a basic degree of familiarity with the core concepts of version control with Git. For an overview of this topic in the context of reproducible scientific research code, see the \href{https://the-turing-way.netlify.app/reproducible-research/vcs.html}{"Version Control" subsection} of the "Guide for Reproducible Research" within The Turing Way online handbook \citep{the_turing_way_community_2019_3233986}. See also section \ref{training} of this report for additional resources and relevant training. \subsection{Using Notebooks Effectively} \label{notebooks} It's common for researchers to use digital notebooks such as Jupyter or RMarkdown for carrying out data science tasks, especially when this involves visualisation, and this is no different when these tools are available within TREs. When publishing research nowadays, it's not unusual to include figures than began life as the output of a data analysis task in a notebook. Indeed notebooks themselves have in some cases become the primary output of computational research in the form of executable papers, published in open repositories and hosted with online solutions such as Binder \citep{lasser_creating_2020}. The applicability of such tools to the publishing of TRE-based research outputs will be discussed later in this report (see section \ref{executable}), but here several suggestions are made about how best to utilise notebooks themselves in both the context of TRE research and the desire to publish code as a research output. It's important to recognise that whilst notebooks are invaluable resources for experimentation and reporting, they do not fulfil the same purpose as afforded by scripts in version-controlled repositories. Notebooks make conflict resolution for version control difficult and each time they are opened, cells can be run in different orders, meaning that it can be easy to lose track of what code has already been run. Whilst it is possible to keep notebooks in version-controlled repositories (hosted on GitLab for example), the code cells of Jupyter notebooks in particular are not ideal places to store important methods code for machine learning projects such as the WMML. The main reason for this is that the Jupyter notebook files (.ipynb extension) are JSON documents that include metadata. RMarkdown notebooks by contrast are based on markdown documents, which are better for tracking changes. Nonetheless, both options are suboptimal for the purpose of developing publishable research code of a high quality (unless the aim is to publish the notebook itself as an executable paper, which will be discussed later on in this report). This is because they lack the functionality to test and format methods code (a topic covered in section \ref{testing}). In addition, inclusion of methods code will quickly render notebooks unreadable, defeating a key purpose for the usage of notebooks in the first place. Core research methods code should be developed separately and imported into notebooks if and when needed for analysis. In the context of TRE-based research, notebooks can be used as a tool to explore and report on sensitive data, rather than as a research output themselves for export from the TRE (though exceptions to this will be discussed in section \ref{tredevworkflows}). Notebooks could for instance contain sensitive data in the commit history of their GitHub/GitLab repository, even if the data is not present in the code cells at the time of export. Having said this, the combination of code cells that can generate plots for figures and markdown cells for text can make notebooks a useful starting point for the structuring of a research paper. Using tools readily available within the SAIL TRE, it is relatively simple to convert an interactive notebook to a static research paper PDF. Indeed, several members of the WMML team have found this approach fruitful already. In order to do this, pandoc (available at \href{https://pandoc.org/}{pandoc.org}) must be installed (as is the case in SAIL). To convert a Jupyter notebook to PDF, simply use nbconvert as follows: \begin{minted}{python} jupyter nbconvert --to pdf notebook.ipynb \end{minted} Converting an R markdown notebook to PDF, is even easier when using the RStudio application; simply choose the "Knit to PDF" option. In both cases, there are options to embed LaTeX and include useful features such as a table of contents when doing this conversion (documentation for this is readily available online). If notebooks are the method that researchers working in a TRE wish to use to draft their papers, converting to a static format such as PDF makes the checks required for exporting from the TRE far simpler than would be the case if exporting notebooks themselves. Documentation for nbconvert can be found at \href{https://nbconvert.readthedocs.io/}{nbconvert.readthedocs.io}, including how use cell tags to hide input (or both input and output) in generated documents, something that could be useful if generating a research paper from a notebook. However, members of the WMML team have found that converting to PDF with nbconvert can result in errors for complex Jupyter notebooks that are hard to debug. Therefore it would be prudent to test conversion works as expected at regular intervals if generating a research paper from a notebook. A suggested approach when such errors do occur, is to generate a LaTeX source file with nbconvert, which enables easier debugging. It's also possible to use nbconvert to convert a Jupyter notebook into a code script, which includes the content of markdown cells as comments. This can be useful if development that has been initiated in a notebook reaches a point where it would be better to continue in a script, for example if any functions have been created in code cells that need to be tested (see section \ref{testing} for more information on code testing). Conversion of a Jupyter notebook to a script can be done like so: \begin{minted}{python} jupyter nbconvert --to script notebook.ipynb \end{minted} For the development of research methods code used in TREs, it makes sense to use scripts or modules that are independent of any notebook, especially if such code is destined for export from the TRE. Any code being developed in the context of a notebook cell that cannot be quickly re-written should be moved to a separate file that is tracked within the Git repository (e.g. a Python module or R script). Developing research methods within a Git repository offers more advantages than just version control. It also increases the ease with which the code can be developed to a standard of quality appropriate for both publishability and reproducibility, via the use of tests and formatting amongst other things (see \ref{testing}). \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{notebooks}) Key Points:} \begin{itemize} \item Core research code should be developed in version controlled repositories \item Jupyter/Rmd notebooks should not be exported from the TRE \item Notebooks containing draft papers and figures can be converted to static PDFs \end{itemize} \end{tcolorbox} \subsection{Code Testing and Quality} \label{testing} Test-driven development is a software engineering philosophy that prioritises the writing of unit tests, which test individual elements of code rather than entire applications, before the writing of the application code itself \citep{the_turing_way_community_2019_3233986}. In the context of research software, unit testing (and by extension, test-driven development) has several benefits. Testing makes development faster because bugs are far easier to isolate and can be spotted early. By encouraging the modularisation of the research code into functions and groups of functions, researchers are better able to focus on the lines of code relevant to the part of their analysis being worked on \citep{the_turing_way_community_2019_3233986}. Researchers who set up tests for their functions can be confident those functions work as expected when the tests pass. This means functions can be easily reused whenever needed. When working on analyses in notebooks, these functions can be imported from the local script or module where development is taking place (or from the package if the code has already been packaged). The recommended testing framework for Python is "pytest" and for R, there are several good choices such as "testthat", "tinytest" and "svUnit". Each of these are available on PyPI and CRAN respectively (meaning they are installable in SAIL via pip or install.packages). In the context that this report seeks to address (that of publishing TRE-based research code), having well tested (and documented) code will ensure that researchers can prioritise the minimal amount of code for export from the environment (assuming development takes place within the TRE, see section \ref{tredevworkflows} for more on development options). This reduces the burden on the export process and should save time. Furthermore, writing research code that is modularised, well documented and appropriately tested, ensures that results generated with that code can be reproduced. It also adds to the clarity of the code when published, better enabling paper reviewers and other scientists that access, run or wish to further develop the code, to understand what it does and how it works. Testing of software can be automated with continuous integration (CI). In software development, CI is typically used when multiple people are working on the same codebase and want to push changes regularly without breaking anything. It can however also be a valuable tool for individual researchers looking to produce well structured and well tested code for publication. In addition, by forcing the researcher to specify the requirements for their code to run (e.g. the packages/libraries and their versions), CI can help to keep track of the computational environment. The computational enviroment is discussed further in section \ref{environments}. CI can be added to both GitLab and GitHub repositories and be set up so that unit tests (and other checks) are run each time a feature or bug-fix branch is merged into the main code. The advantage of this approach is that breaking changes in the code should be found early, because they cause (well-written) tests to fail. CI can be set up such that merging into the main code branch is not possible without tests and other checks passing on the new code branch. This makes bugs easier to spot and prevents stable code branches becoming compromised \citep{the_turing_way_community_2019_3233986}. To make effective use of CI, a good fundamental understanding of version control is required. Researchers that don't have this experience, can read the subsection titled \href{https://the-turing-way.netlify.app/reproducible-research/vcs.html}{"Version Control"} in the "Guide for Reproducible Research" section of The Turing Way online handbook. There is also a subsection of the handbook on \href{https://the-turing-way.netlify.app/reproducible-research/ci.html}{CI}, which details how to get set up with GitHub actions. Documentation on how to use CI in GitLab is available at \href{https://docs.gitlab.com/ee/ci/}{docs.gitlab.com/ee/ci/}, however it is worth noting that at the time of writing, CI tools are not included for GitLab in SAIL. In order to make use of CI as part of the internal TRE development workflow described later on in section \ref{internal} of this report, GitLab CI will need available in the TRE. One other way of improving the quality of research code destined for publication is to adopt a consistent code style. A code style is a set of conventions on how to format code, for example standardising things like indentation and the placement of comments. Conforming to a particular code style can make code easier to understand for collaborators and reviewers. Code style checks can also be set up to run alongside tests with CI in an automated fashion, enabling consistency throughout the development process. Once again, \href{https://the-turing-way.netlify.app/reproducible-research/code-quality/code-quality-style.html}{The Turing Way} contains additional information on this topic, including recommended formatter tools for Python, R and other languages. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{testing}) Key Points:} \begin{itemize} \item Testing research code speeds up development because bugs are easier to spot \item Automatically run tests when changes are made via Continuous Integration (CI) \item Consistent code styling can keep code easy to understand \end{itemize} \end{tcolorbox} \newpage \subsection{Reproducible Environments} \label{environments} Every computer or virtual machine has a unique computational environment consisting of its operating system and the installed software (including language and package versions) and TREs are no different. When publishing research code, or indeed any scientific output, being able to reproduce results is of paramount importance to enable other researchers to check the claims made by the research. An additional consideration for computer science research is the computational environment in which published research results were generated. Capturing important aspects of this environment can ensure that others can run the code and reproduce the results \citep{the_turing_way_community_2019_3233986}. When considering to what extent a computational environment needs to be captured, a key decision to make is whether managing the software and versions via a package management system is sufficient, or whether it is worth controlling the entire operating system, via containerisation. Containers are essentially lightweight virtual machines, which can contain their own files, software and settings and are particularly useful if projects need to run on high-performance computing (HPC) environments \citep{the_turing_way_community_2019_3233986}. There are a variety of package management solutions for both Python and R, but this report focuses on "Conda". Conda is an open source package and environment management system that installs, runs and updates packages and their dependencies. Though Conda was originally created for Python programs, it can be used with most commonly used data science languages, including R (Anaconda, 2016). In SAIL, Conda is installed by default. Conda can be used to create a virtual environment for a project, which keeps track of the packages (and package versions) being used by the code under development. This is possible via the "environment.yml" file, which can be used to quickly re-create the virtual environment from scratch. By including this file in their GitHub/GitLab repository, researchers can ensure that when others wish to use their project code, installing all the packages and dependencies required for the code to work is simple. A Conda virtual environment can be created from the "environment.yml" and activated by running the following shell commands: \begin{minted}[gobble=2]{bash} > conda env create -f environment.yml > conda activate projectvenv \end{minted} \newpage For a Python project, the "environment.yml" file should look something like this example (which will create a virtual environment called "projectvenv"): \begin{tcolorbox}[colback=white!95!black, colframe=white] \begin{tcolorbox}[colback=white!95!black, colframe=white!95!black] \begin{minted}[ gobble=2, linenos ]{yaml} name: projectvenv channels: - defaults dependencies: - numpy>=1.18 - scipy - pandas - pip=21.2.4 - pytest - python=3.9.7 \end{minted} \end{tcolorbox} \end{tcolorbox} If a researcher is already using a conda virtual environment for package management, but hasn't yet created an "environment.yml", it can be created from the existing virtual environment: \begin{minted}[gobble=2]{bash} > conda env export > environment.yml \end{minted} New packages can also be added to the environment with a single command. For example, a researcher working in R could use the following command to add the "ggplot2" package to the environment: \begin{minted}[gobble=2]{bash} > conda install r-ggplot2 \end{minted} Adding packages this way could be useful when experimenting with new software dependencies for research code, in advance of deciding they are essential and should be added to the "environment.yml". For more information on how to use conda for package management, consult the \href{https://docs.conda.io/projects/conda/en/master/user-guide/tasks/manage-environments.html#}{online documentation} (see also \href{https://docs.anaconda.com/anaconda/user-guide/tasks/using-r-language/}{R specific information}). There are of course other package management solutions for both languages, and researchers should feel free to use those that duplicate (or exceed) the functionality of Conda. For R in particular, package/environment managers such as "packrat" and "renv" may be more commonly used. However this report recommends Conda, on the basis of its simplicity to get started with, its ability to build environments from a single file and to re-build them on other machines with that file. When it comes to the question of whether to make use of containerisation, this likely falls outside the requirements of the WMML project. Containers are best placed for distributing software that needs to be run on a variety of different computers, where those computers only have to have the container software itself (e.g. Docker) installed as a pre-requisite. Containers not only include the operating system, but often also the project files (including data), neither of which seem necessary or appropriate for the WMML project's goal of publishing machine learning methods code for R and Python. For interested readers, the most popular containerisation software is \href{www.docker.com}{Docker}, however there is also \href{https://sylabs.io/guides/3.5/user-guide/introduction.html}{Singularity} which specialises in containers for HPC. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{environments}) Key Points:} \begin{itemize} \item Controlling the computational environment of a project aids reproducibility \item Packages and versions for Python/R code can be managed with Conda \item Containers can reproduce the entire computational environment if needed \end{itemize} \end{tcolorbox} \subsection{Reproducible Workflows} \label{reproducibleworkflows} In scientific research, and computer science in particular, we often want to ensure that the results of our analyses are \emph{reproducible}. Reproducibility in scientific research can be differentiated from \emph{replicability}, whereby consistent results and similar conclusions are reached across different studies and methodologies answering the same research question. A fully reproducible workflow for computational research would include the option to use the same input data, computational environment and code (research methods) in order to reproduce the results exactly. Achieving a fully reproducible workflow is difficult in practice and working in a TRE on a dataset that isn't publicly available adds additional challenges. Most obviously, there is the question of how a paper reviewer (or other researcher) might gain access to the input data, given that the researchers themselves required a login to the TRE system for access. There is already a process in place to enable journal reviewers access to the SAIL databank, should they require it and SAIL is open to all researchers, subject to approval and adequate qualification. However, when it comes to reproducibility from the perspective of the broader scientific community, access to data available within a TRE (such as the WMC dataset used by the WMML project in SAIL) is not immediately available. In section \ref{tredevworkflows} of this report, possible workflows for developing and publishing code from research with TREs are discussed and section \ref{synthetic} specifically addresses the possibility of sharing synthetic data as a substitute for sensitive datasets that cannot be exported from TREs. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{reproducibleworkflows}) Key Point:} Changes in any of the following can lead to differences in the results of scientific research: \begin{itemize} \item Data \item Code \item The computational environment \end{itemize} \end{tcolorbox} \section{TRE Development Workflows} \label{tredevworkflows} When it comes to the question of how to publish research conducted with sensitive data in a TRE, and in particular how to publish code, there is little in the way of best practice suggestions or guidance that has been previously written up in a comprehensive manner. Importantly, thinking about this problem forces us to tackle the question of how best to develop code for TRE research in the first place, given the appropriate constraints when it comes to accessing data within TREs. The development of research code for use on sensitive data within a TRE could involve the development of novel methods and models, or it could merely involve the application of existing models, methods or libraries to the research question at hand. In the case of the WMML project, researchers are working in novel methods, which necessitates some of the considerations already discussed in this report, such as testing. Even were this not the case, computational research will generally involve some code scripts that can be published alongside the results of the research, to clearly demonstrate the methodology and improve reproducibility. When deciding which parts of the research code are relevant for publication, a decision should be made to omit any code that is specific to the particular TRE. However, it is recommended that where possible, such code is at least made available to others using the same TRE. For example, a script written by a WMML researcher that could have value to other SAIL databank users, but isn't useful outside the TRE, could be stored in a shared folder, to which users are granted access by default. This will ensure that such code is available to researchers on other projects, even if not relevant to the wider research community who lack access to the TRE. This report presents two alternative workflows for the development and publication of code from TRE-based research. The first, described in section \ref{external} and shown in figure \ref{fig:extdev}, takes the approach of developing the primary research code (that which is destined for publication) externally from a TRE, whereas section \ref{internal} and figure \ref{fig:intdev} document a workflow based on developing code within a TRE. In each workflow, researchers export their results (which could include analyses, statistics, data visualizations and reports) from the TRE for publication, but where they differ is whether the code used to generate those results also needs to be exported. The benefits and tradeoffs of these development workflows are discussed and some light suggestions are made as to which approaches are most appropriate for the WMML project and SAIL. Regardless of the chosen development workflow, researchers on the project are assumed to have access to the TRE (including the contained sensitive data) as well as any code or results they produce. Also highlighted are several optional extras that can further enhance the reproducibility and find-ability of the research, such as making use of synthetic data (\ref{synthetic}) and executable papers (\ref{executable}). \subsection{External Development} \label{external} One problem that arises from the desire to publish research code developed in a TRE, is that the burden of checking the code for inappropriate content by disclosure control reviewers (during releases from a TRE), increases with the scale and complexity of the code base. Such content could include data-disclosive comments in the code or extracts of data embedded within the code. In addition, researchers are limited by the software tools available in the TRE for development. As an example, a limitation highlighted by discussions with the WMML team was the lack of CI tools available for GitLab within SAIL. As such, some members of the team have taken the approach to develop much of their primary research code in an external GitHub repository, in order to make use of GitHub Actions CI. Developing in this way, researchers can import snapshots of their code into the environment whenever changes have been made and an analysis needs to be re-run. Another issue is that as virtual machines, TRE systems have the potential for slow responsiveness that is anathema to software development. Based upon discussions between colleagues at The Alan Turing Institute, it appears that problems of the nature faced by the WMML team are common in TRE-based research. Given these issues, this report further develops the idea of working on primary research code in an external repository as a workflow for TRE research (figure \ref{fig:extdev}) and offers a comparable alternative workflow that involves developing within a TRE (figure \ref{fig:intdev}). The external development workflow begins with the researcher creating a publicly hosted code repository (e.g. with GitHub). This repository houses the primary research methods code and can optionally be set up to include tests and CI (see section \ref{environments} of this report). Development of the code is carried out here and each time a new feature is added that will affect the researcher's analysis, the researcher can import a snapshot of the code (e.g. the most recent commit) to the TRE and re-run that analysis. This process iterates until the researcher has completed their work in the TRE and has a final analysis that is ready for publication. In this workflow, export from the TRE will only include the results of the analysis (e.g. plots generated or a draft paper); the code repository is already publicly available (section \ref{citation} will outline additional steps to make the repository citation/publication ready). A disadvantage of external development could be that writing the code (e.g. machine learning methods for the WMML project) is difficult without access to the data it is designed to run on. It could be possible to overcome this obstacle by including dummy data, which replicates the structure of the original data from the TRE (but contains randomly generated data), in the external repository. Section \ref{synthetic}, describes in more detail how algorithmicly generated synthetic data (that is statistically representative of the original data) could also be used. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{external}) External Development Advantages:} \begin{itemize} \item Make use of development tools unavailable in the TRE such as GitHub Actions \item Fewer steps required to publish code developed on a public website than from a TRE \end{itemize} \textbf{(\ref{external}) External Development Disadvantages:} \begin{itemize} \item Progress may be slowed if data access is critical for development \end{itemize} \end{tcolorbox} \subsection{Internal Development} \label{internal} Downsides of developing research code inside the TRE that have been discussed include being limited by the TRE's available software tools and the potential for a high burden on disclosure control reviewers. However, some researchers may find the convenience of developing their research code in the same environment they are running it, outweighs these downsides. For this case, figure \ref{fig:intdev} shows a modified version of the workflow where the primary research code development occurs within the TRE. In the internal development workflow, researchers set up their repository in much the same way as the external workflow, but make use of the TREs version control system (GitLab in the case of SAIL) instead of an external repository. When the researcher has completed their work, export from the TRE will include both the research results and the code used to generate them. An important recommendation here is to only export the final version of the code, rather than the entire repository, as this will simplify the audit process for export. Checking an entire commit history for sensitive data leaks will be far more time consuming than doing so for just the code itself. Figures \ref{fig:extdev} and \ref{fig:intdev} also highlight several optional steps aimed at improving the reproducibility of the research including making use of synthetic data and executable research papers, which are discussed in sections \ref{synthetic} and \ref{executable} respectively. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{internal}) Internal Development Advantages:} \begin{itemize} \item Code can be developed in the same environment it is run \end{itemize} \textbf{(\ref{internal}) Internal Development Disadvantages:} \begin{itemize} \item Useful development tools maybe unavailable in the TRE e.g. GitLab CI in SAIL \item Exporting code from a TRE can run the risk of accidental data disclosure \end{itemize} \end{tcolorbox} \begin{figure}[] \hspace*{-1.7cm} \includegraphics[width=0.6\textwidth]{TRE-workflow-1-external.drawio} \caption{Workflow for external development of TRE research code. Snapshots of externally developed code are imported into the TRE whenever new features are added that can be used for the analysis of sensitive data. Only the results of the analysis need be exported from the TRE, since externally developed code is ready for publication. The blue backdrop and arrows show steps involving and moving into a public code repository, whereas orange represents the TRE. Steps indicated by darker arrows occur later in the workflow. Smaller arrows link to optional steps that can be taken to further improve the reproducibility and availability of the research.} \label{fig:extdev} \end{figure} \begin{figure}[] \includegraphics[width=0.6\textwidth]{TRE-workflow-2-internal.drawio} \caption{Workflow for internal development of TRE research code. A snapshot of the research code (e.g. the final GitLab commit) is exported alongside the results of the analysis, after passing any security processes required to export from the TRE. The blue backdrop and arrows show steps involving and moving into a public code repository (or other online location to which the code will be uploaded for publishing purposes), whereas orange represents the TRE. Steps indicated by darker arrows occur later in the workflow. Smaller arrows link to optional steps that can be taken to further improve the reproducibility and availability of the research.} \label{fig:intdev} \end{figure} \subsection{Synthetic Data} \label{synthetic} As previously stated, one of the problems with reproducibility of research conducted with data stored securely in a TRE, is that since that data is not publicly available, other researchers wishing to reproduce the results of the research are unable to do so without first gaining access. There is however a partial substitute for this in the form of creating publicly available synthetic data resembling the original data, which the published research code can also be run on. Synthetic data can be described as data generated by a statistical model which replaces identifying or sensitive values from an original confidential dataset with draws from the model \citep{drechsler_empirical_2011}. Synthetic data should retain some of the statistical properties of the original data, without leaking the sensitive original data itself. There are a variety of methods and software packages that have been developed for this task. Indeed, synthetic data research is an active field in of itself. A key challenge these methods face is balancing the utility of the synthetic data as a substitute for the original dataset, against the risk of accidental disclosure of sensitive data \citep{drechsler_empirical_2011}. In the context of TRE-based research, it will often be the case that the very reason for working in a TRE is to analyse datasets that are inherently too sensitive to publish publicly, as is the case with the WMC in SAIL being analysed by the WMML project team. In cases such as this, the question then is: can a synthetic version of the dataset be produced that can be published alongside the code and analysis results? Doing this would enable reviewers and other researchers to try out the published methods (the code) for themselves on the synthetic dataset, with the caveat that they will not be able to reproduce the exact results of the code being run on the original data. Figures \ref{fig:extdev} (e) and \ref{fig:intdev} (e) show how synthetic data could be incorporated into a TRE development workflow. In addition to its application in improving research reproducibility from the perspective of external researchers, synthetic data could also be utilised by researchers who are waiting for access to a TRE when beginning a project. This would enable them to make a start on their research before gaining access. For the purposes of the WMML project, it's unlikely that creating a synthetic version of the WMC would prove a worthwhile endeavour, given the maturity of the project and the challenges associated with creating non-disclosive synthetic data. This may however be a route work looking into for future SAIL TRE research projects that aim to publish research carried out in the TRE. A good starting point would be to investigate how existing software packages for synthetic data generation (such as \href{https://www.synthpop.org.uk/}{synthpop}) perform on the healthcare data being analysed in SAIL. Researchers should also investigate any existing synthetic data projects already in progress in the SAIL databank. A more lightweight approach that could be of value to the WMML project and others where synthetic data research falls out of scope, is to produce a small dummy dataset that has the same data structure (e.g. table columns and data types) as the original sensitive dataset, but randomly generated data. A dummy dataset of this nature could be small enough to be included as part of the published code repository and would give an example of the kind of data that the methods code could be run on, thereby reducing at least some of the friction to reproducibility. Where working in notebooks, a duplicate version of the notebook that loads the dummy data instead of the original dataset could be included (see figures \ref{fig:extdev} e and \ref{fig:intdev} e). \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{synthetic}) Key Points:} \begin{itemize} \item Project researchers could develop code on synthetic data prior to TRE access \item Dummy data replicating the original data structure can be published with code \item Synthetic data that retain original data size and properties are a larger challenge \item External researchers lacking TRE access could further develop published code that has accompanying dummy/synthetic data \end{itemize} \end{tcolorbox} \subsection{Executable Research Papers} \label{executable} In section \ref{notebooks}, this report cautioned against the exporting of notebooks from TREs. However, one exception could be if a duplicate of a notebook used for the researchers analysis is created that loads a synthetic or dummy dataset, suitable for export (see figures \ref{fig:extdev} and \ref{fig:intdev} e). If a researcher has reached the point where they're publishing notebooks and code to online repositories, they're just one step away from publishing an interactive online executable research notebook. These online notebooks demonstrate research methods as clearly as is possible, by actually running them, something that is fast becoming the gold standard of reproducible computational research. By extension, notebooks that contain an entire research paper can be hosted as executable papers \citep{lasser_creating_2020}. Pairing executable papers with a published synthetic dataset could be a good option for achieving the highest degree of scientific reproducibility possible for sensitive data research (including TRE-based research). Figures \ref{fig:extdev} (f) and \ref{fig:intdev} (f) show how executable papers could fit in to the TRE research development workflow. A key software tool used for creating executable papers from Jupyter notebooks is Binder. Binder uses a tool called "repo2docker" to create a Docker image (the instructions to build a Docker container) for a GitHub repository, based on included configuration files (such as Conda's "environment.yml" file). The resulting image can be accessed via a cloud-based BinderHub, which allows anyone with the url to view, edit and run the Jupyter notebook from their web browser \citep{the_turing_way_community_2019_3233986}. Check out \href{https://mybinder.readthedocs.io/en/latest/examples/sample_repos.html#conda-environment-with-environment-yml}{this example} of a Python Jupyter notebook hosted with Binder which uses packages specified by a Conda "environment.yml" file. Hosting a research notebook online in this way gives people the ability to see the results of analyses in the notebook reproduced in real time, as well as the ability to edit the notebook code to try out different parameters or variations of the analysis. Binder can also be used with R, but at the time of writing, lacks the capability to create a url that loads an RMarkdown notebook in the same way as for Jupyter (note: Binder is an open source community project that is constantly evolving and readers should investigate current options for R notebooks online). To learn more about Binder, review the relevant section in \href{https://the-turing-way.netlify.app/reproducible-research/renv/renv-binder.html}{The Turing Way handbook}. Executable papers can be used to demonstrate that choices made when carrying out the research only had a minor impact on the outcome. This approach both strengthens the conclusions from the readers perspective and allows author to feel more confident about the decisions made during their analysis \citep{lasser_creating_2020}. It's likely that producing online executable versions of the research notebooks being developed by WMML researchers falls outside the achievable goals within the time frame of the project. However, researchers working on TRE-based projects should not feel discouraged from pursuing this option in future, in tandem with the publishing of a synthetic dataset (or dummy dataset - see section \ref{synthetic}) that can be loaded by the executable paper. A potential blocker to this approach of interactive research communication, is that some analyses carried out in notebooks may require large or specific compute resources that aren't feasible in the context of a Binder notebook. That being said, if such a notebook was set up to run on a small synthetic dataset, this could reduce the barrier presented by lesser compute resources. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{executable}) Key Points:} \begin{itemize} \item Binder can be used to create online notebooks anyone with the url can access \item For sensitive data research, executable papers could be paired with synthetic data \end{itemize} \end{tcolorbox} \section{Publishing Research Outputs} \label{publishing} At the outset of this collaboration project with The Alan Turing Institute, the WMML project team expressed the desire to investigate best practices for conducting and publishing reproducible research, in particular the research code, in the specific context of working with a TRE. In this report, workflows for TRE research and development are described which include a final step of publishing the research (see the final stage of figures 1 and 2). This final step in both example workflows involves making the code publicly available alongside the paper, to enhance the reproducibility of the research. This section includes recommendations on how the publicly available research code can be made easily citable and findable, as well as how to choose an appropriate software license. \subsection{Citation Ready Software} \label{citation} There are various reasons why people don't cite the research software they use, but one of the biggest ones is that it’s not clear how. Following the suggestions outlined here will maximise the chance of the WMML researchers published code being cited correctly, allowing others to build on the work in a way that acknowledges their contribution. In addition, it will increase the odds of researchers working on machine learning methods or multimorbidity from discovering their work. A key suggestion here is to create a Digital Object Identifier (DOI) for the code. DOIs are unique identifiers or persistent links for digital objects (including data as well as code) that make it much easier for researchers to cite each other's work. DOIs reduce the risk of link rot and mean researchers can track how their work is being used and cited \citep{the_turing_way_community_2019_3233986}. A DOI for the research code can be generated by uploading it to \href{https://zenodo.org/}{Zenodo}. In addition, researchers can sign up for an \href{https://orcid.org/login}{ORCID} account. An ORCID (Open Researcher and Contributor ID) allows a researcher to provide a unique identity for their body of work independent of their name. It enables them to collect together (and others to find) all their research papers and related outputs so they can be easily cited \citep{the_turing_way_community_2019_3233986}. Another useful option is to inlcude a \href{https://citation-file-format.github.io/}{CITATION.cff file} in the published code's GitHub repository, containing a message explaining how someone can refer to different outputs from the research. This file can include the DOI, as well as a link to the researcher's ORCID account and other relevant metadata. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{citation}) Key Suggestions:} \begin{itemize} \item Upload code to Zenodo to get a unique Digital Object Identifier (DOI) \item Sign up for an Open Researcher and Contributor ID (ORCID) \item Include a citation file alongside the code when published in a GitHub repo \end{itemize} \end{tcolorbox} \subsection{Packaging Software} \label{packaging} As an optional extra step, researchers may wish to convert their software into a package. This allows for the option of publishing the code to online repositories such as PyPI for Python and CRAN for R, increasing the ease with which this code can be re-used in future projects. This could be of value in TREs such as SAIL, which has open ports to PyPI and CRAN servers, enabling easy install of research code developed in past projects to new work-spaces or environments. Explaining the process of turning a code repository into, for example, a "pip" installable Python package on PyPI falls outside the scope of this report. However, research projects following the TRE development workflows described in section \ref{tredevworkflows} of this report should be able to create packages from their software, by modifying these example workflows to include the setting up of their code repositiories with any required files and publishing the code to the chosen package repository as a final step. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{packaging}) Key Point:} Packaging research code increases ease of re-use in future projects \end{tcolorbox} \subsection{Software Licenses} \label{licenses} When publishing software, its common practice to include a license which governs the extent of use or redistribution of the software. The easiest way to choose the license most appropriate for a piece of research software is to visit \href{https://choosealicense.com/}{choosealicense.com}, which offers a straightforward mechanism to help pick one. To learn more about software licenses before making a choice, consult the licensing section in \href{https://the-turing-way.netlify.app/reproducible-research/licensing.html}{The Turing Way} which covers this in more detail \citep{the_turing_way_community_2019_3233986}. For maximal engagement with published code, it is recommended to use a permissive open source software licence. However, some projects may find it necessary to opt for a less permissive license if their research code requires propriety software tools. It is recommended to check out the software licence suggestions of the funder(s) of research, but in general, charitable or altruistic funders are more likely to encourage open source licenses. Once a licence has been chosen, it can be saved to a file within a public code repository (e.g. GitHub) alongside the research code. This file can be named appropriately (e.g. License.txt or License.md) and stored it in the top level of the repository directory structure so it's easy for people to find. \begin{tcolorbox}[colback=white!95!blue, colframe=DodgerBlue3] \textbf{(\ref{licenses}) Key Suggestion:} Choose an appropriate software licence for published research code and include it in any public repositories that contain the code \end{tcolorbox} \section{Conclusion} \label{summary} The volume of TRE-based research is likely to grow in the coming years and decades, so the establishment of a set of best practices and norms for developing and publishing research code for these projects should be of broad appeal to the research community. This applies in particular at the intersection of healthcare and data science. As such, this report should be viewed as an initial step towards formalising these processes and not the final word on the topic. By developing code to a common workflow such as described in this report, the WMML project (as well as other SAIL projects and projects in other TREs) will be able to increase the efficiency of collaboration within a project, maximise the visibility of the research once published and the improve the reproducibility of the results. \begin{tcolorbox}[colback=white!95!orange, colframe=orange] \textbf{Report Summary:} \begin{itemize} \item Develop methods code as scripts/modules in a GitLab/GitHub repository \item Developing code in a public repository external from the TRE should be considered \item Test code to ensure it works as expected \item Where possible, automate tests and code quality checks with Continuous Integration \item Jupyter/Rmd notebooks should be used for data analysis, but not code development \item Adopt a consistent development workflow and coding style for the project duration \item Publish research code with a DOI, citation file and software licence \item Optionally, explore synthetic data and executable papers to enhance reproducibility \end{itemize} \end{tcolorbox} \section{Resources and Training} \label{training} To make the most of the recommendations in this report, researchers will need to have gained some experience programming in a commonly used data science language such as Python or R, and have some familiarity with the basics of version control with Git. This section lists some useful online resources, reading material and links to organisations that run training courses. These resources will be useful to researchers who wish to learn the basics of research software engineering and data science skills, but also to more experienced researchers looking to expand their knowledge of these topics and practices. \subsection{Turing Courses} The Alan Turing Institute's \href{https://alan-turing-institute.github.io/rsd-engineeringcourse}{Research Software Engineering course with Python}: \begin{itemize} \item Online resource enabling learning via Jupyter notebook tutorials \item Version Control section is language agnostic \item Topics include testing and advanced Python programming \end{itemize} The Alan Turing Institute's \href{https://alan-turing-institute.github.io/rds-course/}{Introduction to Research Data Science} is also in development (work in progress at the time of writing). \subsection{Software Carpentry} Visit \href{https://software-carpentry.org/}{software-carpentry.org} to find out about the wide range of lessons and workshops available. \begin{itemize} \item Run by \href{https://carpentries.org/}{The Carpentries} in the United States \item Relevant \href{https://software-carpentry.org/lessons/}{lessons} include Version Control with Git and best practices for reproducible scientific analysis with R \end{itemize} \subsection{The Turing Way} \href{https://the-turing-way.netlify.app/welcome}{Online handbook} developed by an open source community \citep{the_turing_way_community_2019_3233986}. Many of the topics in the \href{https://the-turing-way.netlify.app/reproducible-research/reproducible-research.html}{Guide for Reproducible Research} have been adapted to the TRE context for this report. Additional topics covered by this resource not featured in this report include: \begin{itemize} \item Code reviewing processes \item Research data management \item Risk assessment \item Project design \item Working collaboratively with GitHub \item Guidance for science communication \item Introduction to research ethics \end{itemize} \section{Acknowledgements} \label{acknowledgements} With thanks to the WMML project researchers: Rowena Bailey, James Rafferty, Jane Lyons, Ashley Akbari (Swansea University), Farideh Jalali, Thamer Ba dhafari (University of Manchester), and PIs Ronan Lyons (Swansea University), Niels Peek (University of Manchester). With thanks also to May Yong, Emma Karoune and the Research Engineering Group at The Alan Turing Institute and The Turing Way community. This work was supported by the Medical Research Council (MRC), grant no. MR/S027750/1. This work was supported by Health Data Research UK, which receives its funding from HDR UK Ltd (HDR-9006) funded by the UK Medical Research Council, Engineering and Physical Sciences Research Council, Economic and Social Research Council, Department of Health and Social Care (England), Chief Scientist Office of the Scottish Government Health and Social Care Directorates, Health and Social Care Research and Development Division (Welsh Government), Public Health Agency (Northern Ireland), British Heart Foundation (BHF) and the Wellcome Trust. This work was supported by the ADR Wales programme of work. The ADR Wales programme of work is aligned to the priority themes as identified in the Welsh Government’s national strategy: Prosperity for All. ADR Wales brings together data science experts at Swansea University Medical School, staff from the Wales Institute of Social and Economic Research, Data and Methods (WISERD) at Cardiff University and specialist teams within the Welsh Government to develop new evidence which supports Prosperity for All by using the SAIL Databank at Swansea University, to link and analyse anonymised data. ADR Wales is part of the Economic and Social Research Council (part of UK Research and Innovation) funded ADR UK (grant ES/S007393/1). \FloatBarrier \def\UrlBreaks{\do\/\do-} \newpage \bibliographystyle{apalike}
\section{Introduction} \CG Proliferation of the Over-the-Top (OTT) platforms such as Netflix, Amazon Prime Video, Youtube etc., has increased the demand for high definition (HD) video contents over wireless networks \cite{CVNI}. It is seen that, depending on the geographic location, a finite subset of the contents hosted by these platforms can sometimes become highly popular \cite{itube}. The wireless base stations (BS) receive repeated requests for these contents from different users in a localised geographic location \cite{Netflix}. Such characteristics of request traffic in the current generation wireless networks have spawned an array of studies focused on Content Centric Networks (CCNs), to leverage such redundancies and improve the network capacity. Further, the broadcast nature of wireless transmitters has been exploited by many of these studies, to provide improvements to both the physical layer and the network layer, by serving the redundant requests in a multigroup-multicast manner. In physical layer, multiple antenna, MISO (multiple input, single output) based designs \cite{MMMISO,RS2User,RS2017,MaliMISO,KhalajMISO,precodersurvey} have gained traction due to increased delivery rates they provide in multigroup, multicast transmissions. These schemes utilise high degrees of spatial diversity provided by multiple antennas. The diversity is two fold: First the diversity comes from the broadcast nature of the wireless channel. Multiple antennas in MISO systems accentuate this advantage by enabling simultaneous multicast of different contents. The second diversity comes from the enhanced spatial multiplexing capabilities provided by the multiple antennas. In other words, more than one content can be delivered to the same user (e.g., small base station) simultaneously. Naturally, MISO (and MIMO) has become the cornerstone of 5G, 6G and eMBB (Enhanced Mobile Broadband) networks. However many of these works study the physical layer performance in MISO CCNs in isolation. There are other aspects of networks which affect the performance/QoS in a wireless networks such as queueing, user dynamics etc. The importance of cross-layer design with queues in a multiuser MIMO network and the effect of user dynamics was identified in early works, \cite{crosslayer}. However, cross-layer studies of MISO networks, particularly with queues, is seemingly limited, even today. In this paper, we take a holistic approach to the analysis of multigroup-multicasting in a MISO network. We study the interplay between queueing, multiantenna beamforming and user dynamics and the effect it has on the network performance. Unlike, the physical layer studies which study the delivery rate, we concentrate on the user experienced QoS, namely the user's mean delay (sojourn time). In a practical system we will see that the queueing design plays an important role in reducing the delay, as queueing is what controls the scheduling of service transmissions, to a time-varying set of users and their requests. In the following we provide the relevant literature survey. In \cite{MMMISO}, the authors showthat in a MISO network, that the sum rate maximization, has no QoS or Fairness guarantees. Thus \cite{MMMISO} proposed MMF beamforming that helps in getting QoS (SINR, Rate) guarantees and provide fairness to users with bad channels. Lately, in MISO literature, MMF beamforming has become a norm. Further more, multiple schemes based on non-orthogonal multiple access (NOMA), orthogonal multiple access (OMA), space division multiple access (SDMA) and rate splitting (RS) have also been studied, \cite{RS2User,RS2017, precodersurvey}. Among these schemes, \cite{RS2User} showed that the Rate-Splitting based MMF beamforming has superior performance in terms of content delivery rate (particularly in overloaded conditions). Performance of RS in overloaded Multigroup-Multicast scenario with max-min fairness has been studied in \cite{RS2017} with similar results as in \cite{RS2User}, for a larger system. We revisit this conclusion and study MMF beamforming schemes from a cross-layer, queueing perspective. We show that the formulation of RS needs modification in a practical system with queues and that this modification gives a different picture of performance, for different beamforming schemes. Rate-Splitting with a common message to all users is studied in \cite{RSCom}. Joint beamforming and coded caching techniques for MISO content centric networks (CCN) has been studied in \cite{MaliMISO,KhalajMISO}. In \cite{MaliMISO} the authors consider caches both at the transmitters and the receivers and propose a joint beamforming that leverages additional degrees of freedom provided by coded caching. Schemes in \cite{KhalajMISO} improve over \cite{MaliMISO} by controlling the group sizes. For a more comprehensive list of beamforming schemes, see \cite{mimosurvey,precodersurvey}. All of these studies either consider delivery to fixed non-intersecting groups of users or deliver different common message(s) separately to the users from multiple groups. But, in CCNs it is possible that there are time-varying combinations of common users across different groups. We propose adaptations of some of the beamforming schemes mentioned above to cater to this requirement. We show that Max-Min Fairness (MMF), which is a common theme in the above mentioned works, degrades performance for the users with good channels in a queueing system. We address this issue in this paper with an appropriate queueing architecture. There are a handful of works which consider queueing in MIMO networks. Queueing Models for Multi-Rate, Multi-User MIMO systems were studied in \cite{mrmu}. The work considers a FIFO queue with finite buffer size and batch service. As a result many user requests go unserviced due to buffer overflow as the traffic increases. In our work, none of the user requests are ever dropped. In \cite{queuestable}, a queueing system with an infinite buffer queue for each user is proposed for MIMO networks. Similar queues for Multiuser MIMO systems with queue-aware scheduling are also proposed in \cite{Qaware}. Queueing specific to SDMA based beamforming schemes is studied in \cite{huang2012stability}. Unlike our system, the proposed queues in these works are not stable across arrival rates due to the nature of queue management. Further, the queues in \cite{huang2012stability,queuestable,Qaware}, are not content-centric, hence, do not leverage the redundancies in the requests. In \cite{delayperform}, the authors analyse delay quantiles in addition to average delay for a multi-user MIMO system. Work in \cite{largedevqueue} performs joint queueing and beamforming decisions in two stages that involve probabilistic selection of users and queue state dependent scheduling. It is shown that this two stage operation improves queue length and channel feedback performance. However, \cite{delayperform} and \cite{largedevqueue}, do not consider multi-group, multicast transmissions as in our work and hence, are inherently not efficient for CCNs. Also, the queues in these works are also not always stable. In fact, instability of queues in these queueing systems arises due to a common drawback. All these works have different queues for different users which reduces the multicast opportunities enabled by the redundancy in the content. Infact we have shown that such queues have inferior performance in the content-centric networks, as seen in our previous work \cite{TWC2021}. Hence, it behoves to design queueing systems, that are content-centric in nature, even for a MIMO system. That is, the queue(s) must exploit the redundancies in the content and perform content dependent scheduling. To the best of our knowledge, the only alternative to \cite{TWC2021}, for content centric queues is \cite{zhou2017optimal}. In \cite{zhou2017optimal} a dynamic multicast scheduling is proposed, which minimizes queueing delay and power using reinforcement learning (RL). Scheduling in \cite{zhou2017optimal} is state-dependent and is not scalable with system size due to computational complexity. Hence it is not suitable for MIMO systems. We point out that, though the queueing system in \cite{zhou2017optimal} is content centric, the stability across all arrival rates is not guaranteed. Further, \cite{TWC2021, Arxiv2019} propose simple multicast queueing schemes and reinforcement learning based power control, which are shown to outperform other similar queueing schemes in literature. In addition, the Simple Multicast Queue (SMQ) proposed in \cite{TWC2021} is analytically guaranteed to be always stable across any arrival rate. Readers are referred to \cite{mimosurvey} for a comprehensive list of queueing schemes for MIMO systems Since, the Simple Multicast Queue (SMQ) proposed for SISO networks is simple, scalable, content-centric and stable across all arrival rates, it is natural to consider it for MISO setup as well. However, in MISO systems with MMF Beamforming, when user channel statistics are heterogenous (where there are different sets of users with good and bad channel statistics), we will see that the adaptations of SMQ in \cite{TWC2021} such as Loopback, Defer \cite{panju19}, and Power control in time \cite{Arxiv2019} are no longer directly useful. We will show that though this combination of MMF schemes and SMQ, may provide good overall mean delay for the network, it may penalise good channel users in a heterogenous network. Thus, in this paper, we propose modifications to SMQ to address this issue. Following are our main contributions in this work: \begin{itemize} \item We consider a recently proposed SMQ \cite{TWC2021} and show that it can be directly adapted to MISO CCNs. The aim here, is to provide a queueing architecture for MISO systems which is easy to implement and computationally simple, yet provide significantly better performance than existing solutions. \item We study various beamforming schemes studied in literature \cite{RS2017,RS2User} from a cross-layer, queueing perspective. We provide necessary adaptations to these beamforming schemes, required for queueing and transmission to time-varying and common users across different multicast groups. We show that the performance of RS differs significantly from \cite{RS2017,RS2User} in such a setup \item We show that, in a heterogenous network, MMF beamforming schemes can be pretty unfair to the users with good channel statistics. We propose a novel two queue architecture, named Dual Simple Multicast Queue (DSMQ), to address this issue. We show that DSMQ, provides a decoupled, fair QoS to users with good channels, in a network with heterogeneous channels. The users with bad channel gains also may not suffer much. \item We provide theoretical analysis and insights to the proposed queues. \begin{itemize} \setlength{\itemindent}{0em} \item First, we prove the stationarity of SMQ and DSMQ and show that they are always stable even in MISO setup. \item Second, we derive queueing theoretical approximations to the user experienced delay (mean sojourn time) in a Multiuser MISO CCNs with queues and MMF beamforming. These approximations serve as tools to system engineers, to evaluate the cross-layer aspects of queueing and beamforming, without computationally expensive and time consuming simulations. \end{itemize} \item Finally, we present extensive performance study via simulations, for the queueing and MMF beamforming schemes considered in this paper. Here, we also show that for Multiuser MISO CCNs, the schemes developed for SISO systems such as Loopback, Defer \cite{panju19,TWC2021} and reinforcement learning based Power control in time \cite{Arxiv2019} are not useful. This is because, the time diversity utilised by these schemes in a SISO system is compensated by the spatial diversity of the MISO system. \end{itemize} Rest of the paper is organised as follows. Section \ref{sec:system_model} describes the system model, assumptions and SMQ. Section \ref{sec:beamf} presents the beamforming schemes considered in this paper. Section \ref{sec:DSMQ} describes a new type of queue called Dual Simple Multicast Queue (DSMQ) which improves over SMQ in terms of fairness. Section \ref{sec:station} provides proof of stationarity for SMQ and DSMQ. In Section \ref{sec:smq_theory} we present the theoretical approximations for mean delay (sojourn time) for SMQ and DSMQ in the MISO system. Section \ref{sec:sim} provides simulation results and compares different schemes. Finally, Section \ref{sec:conclusion} concludes the paper. \textit{Notation: $\{.\}^H$, $\{.\}^T$ represent Hermitian and Transpose operations respectively, $[N]$ represents the set of natural numbers upto $N$, $\norm{.}_2$ represents $\mathcal{L}_2$ norm, $diag(\textbf{g})$ represent a diagonal matrix formed by elements of vector $\textbf{g}$.}\CE \section{System Model} \label{sec:system_model} We consider a wireless content-centric network with one BS endowed with $L$ transmit antennas and $K$ user equipments (UE). The system model is shown in Fig. \ref{fig:MISO}. Each UE requests contents from a library of $N$ files. Each file is of size $F$ bits and the receiver bandwidth is, $B$ MHz. In practical networks the UEs can be either a mobile user or a small BS (SBS). The channel between transmit antennas and a UE follows flat fading. In other words the channel stays constant for the duration of each file transmission and independently changes in the next transmission. The request traffic from each user follows Independent Reference Model (IRM). In IRM, the request process of each content $n\in[N]$ from each UE $k$, is an independent Poisson process with rate $\lambda_{nk}$. The overall rate of request traffic to the BS is given as $\lambda=\sum_{n,k}\lambda_{nk}$. These requests are queued and served by the BS using SMQ, \cite{TWC2021} \begin{figure}[!h] \centering \includegraphics[height=6.5cm,width = 7cm]{MISO_Content_Network.pdf} \caption{Simple Multicast Queue system with Multi Antenna Base Station.} \label{fig:MISO} \end{figure} \CK\textbf{Simple Multicast Queue (SMQ):} In this queue, the files are served in a First-Come-First-Serve fashion with a slight modification: \textit{\CK when a file is transmitted, it serves all the users who have requests for it in the queue}. At a given instance the $j^{th}$ entry of the queue is denoted by $(n,\mathbb{L}_n)_j$, where $n\in[N]$ is the file index, $\mathbb{L}_n\neq\{\phi\}$ is the list of users requesting file $n$. When a new request for a file $n$ from user $k$ arrives at SMQ, it is merged at $j^{th}$ location as $\mathbb{L}_n=\mathbb{L}_n\bigcup k$. If none of the entries of SMQ has the file $n$ then a new entry $(n,L_n=\{k\})$ is added to the tail of the queue. The BS simultaneously transmits first $\min(s,S)$ files starting from the head of the line of SMQ using one of the schemes in Section \ref{sec:beamf}, where $s$ is the queue length and $S$ is a configurable system parameter. New requests for a file under service are added to the tail of SMQ and the subsequent requests are merged as before. Thus the queue length does not exceed $N$ at any given time. Further, the \textbf{\textit{sojourn time}}, $D$ of a request arriving at the BS at time $t_r$ and serviced at time, $t_c$ is given by, $D=t_c-t_r$. Here $D$ includes the service time $T^*$ (defined for each scheme in Section \ref{sec:beamf}). The mean sojourn time under stationarity (see Section \ref{sec:station}) is denoted as $E[D]$\CE. In the following sections we describe the beamforming strategies considered in this paper\CE. We assume complete channel state information at the transmitter (CSIT). In each channel use, the channel matrix $\textbf{H}\in \mathbb{C}^{L\times K}$ is drawn independently as $\textbf{H} \sim \mathcal{CN}(0,\Sigma )$, the complex Gaussian distribution with mean $0$ and covariance $\Sigma$. We consider two cases, namely, \textit{homogeneous} channels and \textit{heterogeneous} channels. In homogenous channel case, $\Sigma=g \textbf{I}$, where $\textbf{I}$ is the identity matrix of size $KL\times KL$, and $g$ is the mean of channel gain of each channel when all the users have similar channel statistics. In a heterogenous network different users channel statistics may be different. Here, $\Sigma=diag(\textbf{g}_{1}^T,\cdots,\textbf{g}_{K}^T)$, where, $\textbf{g}_{k}=g_k \textbf{1}$, $g_k$ is the mean fading (or) channel gain of user $k$ and $\textbf{1}$ is the vector of all ones of size $L$\CE. Further the transmitter may choose to transmit one or more files from the queue depending on the beamforming strategy. $S$ files in the head of the line of SMQ are denoted by $\mathcal{X}_S\triangleq\{X_1,X_2,...,X_S\}$. We assume that the transmitter uses Gaussian codebook to assign a codeword $\tilde{X}_s$ for each file $X_s$ and the codebook is known to the receiver as well \cite{KhalajMISO}. Since SMQ merges different requests across users for the same content, it is possible that a user might have requested more than one content in $\mathcal{X}_S$. \section{Beamforming Schemes} \label{sec:beamf} We now describe the \CK SDMA, OMA, NOMA and RS based beamforming schemes used in this paper. For $S=1$, schemes in Sections \ref{sec:MMF} and \ref{sec:MMF_SIC} are same and correspond to OMA. For $S\geq 2$, the scheme in Section \ref{sec:MMF}, corresponds to SDMA when there are no common users and otherwise, a combination of NOMA (for common) and SDMA (for other users). For $S\geq 2$, Section \ref{sec:MMF_SIC} gives a NOMA based scheme. Finally, Section \ref{sec:MMF_RS} presents our RS based scheme. These beamforming schemes are designed for queueing, time varying sets of active users and also cater to common users across multiple groups\CE. \subsection{Max-Min Fair (MMF) Beamforming:} \label{sec:MMF} \CK Let the subset $\mathcal{X}\subset\{X_1,\cdots,X_S\}$, be the set of files requested by user $k$. In this strategy the transmitter chooses a precoding vector $\textbf{w}_s\in \mathbb{C}^{L\times1}$ for each file $s\in[S]$ from $S$ head of the line files. Thus received signal $y_k$ at user $k$ is given as \begin{equation} y_k=\sum_{s:X_s\in\mathcal{X}} {\textbf{h}_k^H}\textbf{w}_s\tilde{X_s}+\sum_{t:X_t\in\mathcal{X}_S\setminus\mathcal{X}} {\textbf{h}_k^H}\textbf{w}_t\tilde{X_t}+n_k, \end{equation} where $k\in\mathcal{U},\ n_k\sim \mathcal{CN}(0,\sigma_k^2)$, $\textbf{w}_s\in \mathcal{C}^{L\times1}$, is the spatial precoding vector selected by the transmitter for file/stream $s$ and $\textbf{h}_k\in \mathcal{C}^{L\times1}$ is the $k^{th}$ column of matrix $\textbf{H}$. The SINR of transmitted file $s \in \mathcal{X}$, requested by the $k^{th}$ user is: \begin{equation} \gamma_k^s=\frac{{\vert\textbf{h}_k^H}\textbf{w}_s\vert^2}{\sigma_k^2+\sum_{t\in\mathcal{X}_S\setminus\mathcal{X}}{\vert\textbf{h}_k^H}\textbf{w}_t\vert^2}. \end{equation} Let $\mathcal{U}_s$ be the set of users requesting file $s$ and let $\mathcal{U}_A$ be the set of users requesting subset $A\subset[S]$. Further let $\mathcal{A}$ be the collection of all the subsets of $A\subset[S]$ with cardinality greater than one. That is, if $\tilde{B}\in\mathcal{A}$, then $\vert \tilde{B} \vert >1$. The precoding weights $\textbf{w}_s, s\in[S]$ are obtained by solving the following optimization problem $P1$: \begin{equation} \label{eq:opt} \centering \begin{split} \max_{R_k^s, \textbf{w}_s, s\in[S]}\ \min_{k\in\mathcal{U}_s, s\in[S]} R^s_k\ \ \ \ \ \ \ \ \ \ \ & \ \ \\ \text{s.t. } R_k^s\leq\log_2\left( 1+ \gamma_k^s\right), \forall k\in\mathcal{U}_s,\ s\in[S],\ \ \\ \sum_{j\in \tilde{B}}R_u^j\leq\log_2(1+\sum_{j\in \tilde{B}}\gamma_u^j),\ \ \ \ \ \ \ \\ \text{for all $\tilde{B}\in\mathcal{A}$, $u\in\mathcal{U}_A$, } A\subset [S],\text{ and}\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq P.\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \end{split} \end{equation} The first set of inequalities are the rate constraints based on the Gaussian capacity for a single stream, considering the unwanted streams as noise. The users who want more than one file (common users), decode the required files using Successive Interference Cancellation (SIC). The second set of inequalities are for SIC MAC constraints for the common users or users who have more than one file requests in the queue. Finally, the last inequality is the total power constraint with power $P$. Since $S$ files are being transmitted simultaneously, the total transmit time, $T^*=F/(R^*B)$, where $R^*$ is the optimal rate (in bits/sec/Hz) obtained by solving $P1$\CE. \subsection{Max-Min Fair Beamforming with Full SIC (MMF-SIC)} \label{sec:MMF_SIC} \CE In this strategy $S$ head of the line requests, $\mathcal{X}_S$ are transmitted to all the users $\overline{\mathcal{U}}=\underset{s\in[S]}{\bigcup}\mathcal{U}_s$. Thus SINR for stream, $s$ at user, $k$ is $\overline{\gamma}^s_k={{\vert\textbf{h}_k^H}\textbf{w}_s\vert^2}/{\sigma_k^2}$. All the messages are decoded at all the users using SIC. Let $R^s_k$ be the rate alloted to stream $s$ for user $k$, $\forall$ $s\in[S]$ and $k\in\overline{\mathcal{U}}$. Since all the users receive all the files, we have the flexibility to consider $S$ files in $\mathcal{X}_S$ as a single file of size $SF$ and rearrange the sizes of files to be transmitted in different streams as $\mathcal{X}^{\beta}_S=\{X^{\beta_1}_1,\cdots,X^{\beta_S}_S\}$, where the file $X^{\beta_s}_s$ is of size $\beta_s S F$, $\beta_s\in[0,1]$, $s\in[S]$ and $\sum_{s\in[S]}\beta_s=1$. Thus transmit time of stream $s$ to user $k$ is given by $T^s_k=\frac{\beta_s SF}{B R^{s}_k}$. Therefore, to minimize the transmit time of $S$ files, we have the following optimization problem $P_2$: \begin{equation} \label{eq:opt_SIC} \centering \begin{split} \min_{R^{s}_k,\beta_s, \textbf{w}_s, s\in[S]} \ \max_{k\in\overline{\mathcal{U}}, s \in [S]}{T^s_k}\\ \text{s.t. } \sum_{s \in \overline{\mathcal{S}}} R^s_k \leq \log_2( 1+ \sum_{s \in \overline{\mathcal{S}}} {\overline{\gamma}^s_k}),& \forall \overline{\mathcal{S}}\subset [S], k \in \overline{\mathcal{U}},\\ \sum_{s \in [S]} \beta_s = 1,\ \sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq& P. \end{split} \end{equation} The channel from the BS to a given user $k$ forms a MAC channel with $S$ messages. The first set of constraints ensure $R^s_k$ for $s \in [S]$ and $k \in \overline{\mathcal{U}}$, lie in the achievable region for every user. This ensures that every user can decode all the $S$ streams using SIC\CE. The second equality constraint on file size fraction ensures that all the $SF$ bits are split to $S$ streams. The last inequality is the total power constraint. \subsection{Max-Min Fair Rate Splitting (MMF-RS) Beamforming} \label{sec:MMF_RS} In this section we give a new formulation of Rate Splitting (RS) proposed in \cite{RS2017}. In RS \cite{RS2017}, the idea is to split a particular file into two parts, map the parts to two symbols and transmit both the parts simultaneously with different precoding weights. At the receiver the first symbol is decoded considering the other part as interference and then the decoded symbol is cancelled from the received signal and the second signal is recovered. The optimal weights are obtained by optimizing the sum rates of both the streams. While this is a good objective for physical layer, the queueing layer has to wait for transmission of both the files before the next can be served\CK. Thus instead of maximizing the sum rate, we need to minimize the maximum transmit time for both the parts. For our MISO case, the problem is formulated as follows\CE: As in section \ref{sec:MMF}, we consider $S$ files at the head of the line of the queue. Each file $X_s\in\mathcal{X}_S$ of size $F$ bits is split into two parts $X^0_s$ and $X^1_s$ with corresponding sizes $\alpha_s F$ and $(1-\alpha_s) F$ correspondingly, where $\alpha_s\in[0,1]$ is an optimization parameter for file $s$. The transmitter chooses weights $\textbf{w}_s, s\in[S]$ for transmitting mapped symbols $X^1_s\rightarrow\tilde{X}^1_s, s\in[S]$. The parts $\{X^0_1,\cdots,X^0_S\}$ are mapped to a single symbol as $\{X^0_1,\cdots,X^0_S\}\rightarrow\tilde{X}^0_D$. The subscript $D$ represents degraded transmission as in \cite{RS2017}. The SINR for the degraded stream at user $k$ is given as: \begin{equation} \gamma^D_k=\frac{{\vert\textbf{h}_k^H}\textbf{w}_D\vert^2}{\sigma_k^2+\sum_{s\in[S]}{\vert\textbf{h}_k^H}\textbf{w}_s\vert^2}. \end{equation} Let $R_s$ be the rate allocated to stream $s$ and $R_D$ be the rate allocated to stream $D$. The transmitter chooses precoder $\textbf{w}_D$ for transmitting $\tilde{X}^0_D$. The transmission times of symbols $\tilde{X}^1_s, s\in[S]$ and $\tilde{X}^0_D$ are $(1-\alpha_s)F/(R^s B), s\in[S]$ and $\sum_{s\in[S]}\alpha_sF/(R^D B)$ respectively. Now we want to minimize the maximum transmit time. This leads to the following optimization problem $P3$: \begin{equation} \label{eq:opt_RS} \centering \begin{split} \min_{\substack{R^D,\textbf{w}_D,R^s_k, \textbf{w}_s\\ 0\leq\alpha_s\leq1, s\in[S]}}\ \max_{k\in\mathcal{U}_s, s\in[S]} \{\frac{\sum_{s\in[S]}\alpha_sF}{BR^D },\frac{(1-\alpha_s)F}{BR^s_k}\} \\ \text{s.t.\ } R^D\leq\log_2\left( 1+ \gamma_k^D\right), \forall k\in\mathcal{U}_s,\ s\in[S],\ \ \ \ \ \\ \norm{\textbf{w}_D}_2^2+\sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq P,\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \text{and rest of the constraints, as in (\ref{eq:opt})}. \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \end{split} \end{equation} The constraint on $R_D$ ensures delivery of the degraded stream to all the users. Finally the last inequality is the total power constraint\CK. In both, $P2$ and $P3$, the service time $T^*$ is the optimal value of the respective objective function\CE. \subsection{Optimization Reformulation and Service Time:} \label{sec:reformulate} \CK For a tractable queueing system, the transmitter serving multiple groups simultaneously should start the next transmission after all the transmissions are complete. Thus imposing symmetric rate across all groups (i.e., transmitting all groups with the optimal min rate), does not change the optimal transmit time obtained by solving $P1-P3$. Thus by imposing symmetric rate requirement our problem $P1$ can be reformulated as: \begin{equation} \label{eq:opt_re} \centering \begin{split} \max_{r,\textbf{w}_s, s\in[S]}r\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\%\min_{k\in\mathcal{U}_s, s\in[S]} &r \\ \text{s.t. } r\leq\log_2\left( 1+ \gamma_k^s\right),\ \forall k\in\mathcal{U}_s,\ s\in[S],\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ r\leq\frac{1}{\vert\tilde{B}\vert}\log_2(1+\sum_{j\in\tilde{B}}\gamma_u^j),\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \text{for all $\tilde{B}\in\mathcal{A}$, $u\in\mathcal{U}_A$, } A\subset [S],\text{ and}\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq P.\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \end{split} \end{equation} The optimization $P2$ and $P3$ however require a slightly different reformulation when we impose a symmetric rate constraint. In $P_2$, we impose that the time taken to transmit each stream to be the same. Towards this we consider $R^{s}=\min_{k\in\overline{\mathcal{U}}} R^s_k$ for all $s \in [S]$. Further, for achieving same transmit time, we set the fraction $\beta_s = R^{s}/(\sum_{t\in[S]} R^{t})$, $\forall s \in [S]$. The symmetric transmission time is thus, $T = SF/(B\sum_{s} R^{s})$ for each stream. We define the symmetric rate of transmission as $r=1/T$. Thus $P2$ can be reformulated as maximization of $\sum_{s} R^{s}$. This leads us to the following simplified formulation of $P2$: \begin{equation} \label{eq:opt_SIC_re} \centering \begin{split} \max_{R^{s}, \textbf{w}_s, \forall s\in[S]} \sum_{s \in [S]} R^s \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \text{s.t. } \forall \overline{\mathcal{S}}\subset [S] \text{ and } k \in \overline{\mathcal{U}},\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \sum_{s \in \overline{\mathcal{S}}} R^s \leq \log_2\left( 1+ \sum_{s \in \overline{\mathcal{S}}} {\textbf{h}_k^H}\textbf{w}_s\right), \ \ \ \ \ \ \ \ \ \ \\ \sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq P.\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \end{split} \end{equation} Similarly, in $P3$ we impose $r=\frac{BR^D}{\sum_{s\in[S]}\alpha_sF }=\frac{BR^s_k}{(1-\alpha_s)F}$ for all feasible $s,k$'s. This leads to the following reformulation of the optimization problem $P3$: \begin{equation} \label{eq:opt_RS_re} \centering \begin{split} \max_{r, \textbf{w}_D,\textbf{w}_s, s\in[S]}r\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\%\min_{k\in\mathcal{U}_s, s\in[S]} &r \\ \text{s.t.}\ \ \forall k\in\mathcal{U}_s,\ s\in[S],\ 0\leq\alpha_s\leq1,\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ r\sum_{s\in[S]}\alpha_sF\leq B\log_2\left( 1+ \gamma_k^D\right),\ \ \ \ \ \ \ \ \ \ \\ r(1-\alpha_s)F\leq B\log_2\left( 1+ \gamma_k^s\right),\ \ \ \ \ \ \ \ \ \ \\ r\sum_{j\in\tilde{B}}{(1-\alpha_j)}F\leq B\log_2(1+\sum_{j\in\tilde{B}}\gamma_u^j),\ \ \ \ \ \ \ \ \ \ \\ \text{for all $\tilde{B}\in\mathcal{A}$, $u\in\mathcal{U}_A$, } A\subset [S],\text{ and}\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \norm{\textbf{w}_D}_2^2+\sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq P.\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \end{split} \end{equation} \textit{Service Time:} For the above reformulations, the service time $T^*$, is given by $T^*=\frac{F}{B r^*}$ for MMF (\ref{eq:opt_re}), MMF-SIC (\ref{eq:opt_SIC_re}) and $T^*=\frac{1}{r^*}$ for MMF-RS (\ref{eq:opt_RS_re}) Beamforming, where $r^*$s are the optimal values of the objectives in (\ref{eq:opt_re}), (\ref{eq:opt_SIC_re}) and (\ref{eq:opt_RS_re}). \textit{Solver:} The MMF problems (like $P1$-$P3$) are known to be NP-Hard \cite{KhalajMISO}. However good sub-optimal algorithms such as SCA, SOCP are available \cite{KhalajMISO}. We use the reformulations (\ref{eq:opt_re}), (\ref{eq:opt_SIC_re}) and (\ref{eq:opt_RS_re}) along with Python's, SciPy SLSQP, to directly solve for the beamformers. We have seen that this gives better performance than SOCP in our simulations\CE \section{Dual Simple Multicast Queue (DSMQ)} \label{sec:DSMQ} Performance of SMQ in MISO with MMF beamforming schemes is severely affected by the presence of bad channel users. This is because (\ref{eq:opt}), (\ref{eq:opt_SIC}) and (\ref{eq:opt_RS}) maximise the min rate, which is controlled by users with bad channel statistics. Under stationarity, by PASTA \cite{Asmussen}, the users with good channel also experience the same mean sojourn times as bad users. Hence the performance of the overall system degrades\CE. To improve the performance of good channel users while maintaining fairness to bad channel users \CE in multi-antenna case\CE, we modify the SMQ scheme. We call the new kind of queue as Dual Simple Multicast Queue (DSMQ). In DSMQ, the requests from the good and the bad channel users are put in two different simple multicast queues, SMQ-G and SMQ-B, respectively. We assume that the BS keeps track of the statistics \CK(e.g., mean/moving average of channel gains\CE) of each user and thus can differentiate between good and bad channel users\CK. When a user channel changes (e.g., due to movement) the BS appropriately changes the queue (SMQ-G/B) for the user (such variations are not in the scope of this work)\CE. Further, only one queue is serviced at a time, using all the antennas. Depending on the setting the BS solves $P1$, $P2$ or $P3$ and serves users in first $S$ head of the line files of the queue. We fix a number $C$ and we allow the SMQ-B to be serviced once in every $C$ channel uses or when SMQ-G is empty. If both SMQ-G and SMQ-B are empty the first arrival to the system is served. In all the other conditions, only SMQ-G is serviced. This way we decouple the QoS (delay) of good channel users from that of bad channel users. \CK We will see in Section \ref{sec:sim} that an appropriate choice of $C$ and beamforming strategy improves the QoS of good channel users without drastically affecting the bad channel users\CE. \CE DSMQ can be generalised to the case when there are $G (\geq2)$ groups of users with sufficiently different channel statistics (\CK e.g., 15dB difference in $g_k$s\CE). Here, the number of queues can be increased to, $G$. However, increasing the number of queues reduces the multicast opportunities and perhaps the performance. Thus choosing the number of queues is a tradeoff between fairness and the system performance\CE. \CR \textit{Remarks:} We record here, that the DSMQ, is a culmination of evaluation of multiple schemes that could serve as a potential candidate for providing differentiated QoS (delay). One possible candidate (named ``2Q Simultaneous'', see Section \ref{sec:sim}) is the one that maintains two different queues as DSMQ and serves all the users in head-of-the-line, in both the queues simultaneously, via two streams using one of the MMF beamforming schemes ($P1-P3$). This gives poor performance mainly because the service times become coupled for both the queues, thus bringing down the performance of the good user queue and the overall system. We note that in literature \cite{huang2012stability,queuestable,Qaware,delayperform,largedevqueue}, queueing systems for MIMO/MISO use individual queues for individual users and the transmission/service is performed simultaneously for a subset of users in the head-of-the-line of these queues. These are generalizations of the ``2Q Simultaneous'' queueing system, albeit without merging of redundant requests. We show via simulations, that splitting queues this way (particularly for homogenous system), is detrimental to the performance, since the splitting of queues reduces the multicast opportunities offered by redundant requests for the same files in CCNs. Further, we also point out that DSMQ is useful only in heterogeneous case. For homogenous case, where we are interested in overall mean sojourn time, we show in Section \ref{sec:sim}, that DSMQ gives poor performance.\\ \CE \section{\CE Stationarity of SMQ and DSMQ\CE} \label{sec:station} \CK Before we proceed it is important to establish the existence of stationarity of the proposed queueing systems. Towards this, we define the state of the queue at a given time $t$, as $X_t=\{(i_1,\mathbb{L}_{i_1}),\cdots,(i_q,\mathbb{L}_{i_q})\}$, where the tuple $(i_j,\mathbb{L}_{i_j})$ represents the $j^{th}$ queue entry of file $i_j$ and $\mathbb{L}_{i_j}$ is the list of users requesting file $i_j$ and $q$ is the queue length. Let, $E[T]$ be the mean service time when all the users request all the $S$ head of the line files (for any given beamformer setting, $P1,P2$ or $P3$). We assume that $E[T] < \infty$. Let $D_j$ denote the sojourn time of $j^{th}$ request arrival to the queue (SMQ/DSMQ). For DSMQ let $\{X_t^G,X_t^B\}$ be the state of the queue, where $X_t^G$ and $X_t^B$ are defined for the good user queue and the bad user queue in a similar manner. We have the following proposition: \begin{prop} \label{prop:station} Under IRM, if $E[T]<\infty$, then for SMQ and DSMQ, $\{D_j\}$ is an aperiodic regenerative process with finite mean regeneration interval and hence has a unique stationary distribution. Also, starting from any initial distribution, $\{D_j\}$ converges in total variation to the stationary distribution. \end{prop} \begin{proof} Let, $Y_n$, be the state of the queue just after $n^{th}$ departure. Since, there are only $N$, finite number of files in the library, by IRM assumption, $\{Y_n\}$ is a finite state, irreducible discrete time Markov chain (DTMC), \cite{Asmussen}. Now, we show that $\{Y_n\}$ is also aperiodic. To see this, consider the state $Y_n=\{\phi\}$, that is the queue is empty. We note that $P(Y_{n+1}=\{\phi\} \vert Y_n=\{\phi\})>0$, since starting from $Y_n=\{\phi\}$, the event that there is exactly one arrival, has positive probability. Thus the DTMC has a unique stationary distribution. Next, consider the delay $D_j$ of the $j^{th}$ arrival to the system just after $Y_n=\{\phi\}$. The epochs, $Y_n=\{\phi\}$ are also regeneration epochs for $\{D_j\}$. Let $E[\tau]$ be the mean regeneration length of $\{Y_n\}$. The mean number of total request arrivals to the BS during these regeneration epochs, defined as $\overline{\eta}$ is bounded by $\lambda E[\tau] E[T]+1$ which is finite. Further $\overline{\eta}$ is also the mean regeneration length of the $\{D_j\}$ process. Therefore, $\{D_j\}$ also has finite mean regeneration length and is aperiodic by the argument given for $\{Y_n\}$. Thus $\{D_j\}$ has a unique stationary distribution. Also, starting from any initial distribution, $\{D_j\}$ converges in total variation to the stationary distribution. \end{proof} Similarly, we can show that $\{X_t\}$ also has a unique stationary distribution and that starting from any initial distribution, converges in total variation to the stationary distribution. We can also show stationarity for DSMQ, in a similar manner by considering the state of the two queue system $\{Y^G_n,Y^B_n\}$ just after the $n^{th}$ departure. We remark that the stationary distribution itself can be quite complicated, given that the dimensionality of $Y_n$ and $(Y^G_n,Y^B_n)$ will be very large. Further, since $E[T]<\infty$ and the queue length is bounded by $N$, the mean sojourn time is upper bounded by $(N+1)E[T]$. This is a unique feature of our queue. {The assumption that $E[T]<\infty$, can be satisfied with slight modification to the service of SMQ/DSMQ. Let, $r^*=1/T^*$, where $T^*$ is the optimal service time obtained after solving (\ref{eq:opt_re}), (\ref{eq:opt_SIC_re}) or (\ref{eq:opt_RS_re}). Further we, fix $r_\epsilon>0$, such that, if $r^*< r_\epsilon$, we do not transmit for $1/r_\epsilon$ secs. This time is typically greater than the coherence time after which the channel, $\textbf{H}$ changes. We then solve for the new $\textbf{H}$ and repeat the procedure, say $n$ times, till $r^*\geq r_\epsilon$. Here, $n$ has a geometric distribution with parameter $p$, where $p$ is the probability, $P(r^*\geq r_\epsilon)$. We choose $r_\epsilon$ such that $1-p$ is close to zero. Thus $E[T]\leq (1+p)/(p r_\epsilon)<\infty$.}\CE \CG \section{Theoretical Approximations of Mean Sojourn Time: SMQ and DSMQ} \label{sec:smq_theory} In this section we derive approximate mean delays/sojourn times for SMQ and DSMQ\CG. In \cite{TWC2021} we derived approximate mean sojourn time for the Simple Multicast Queue for single antenna case where the service time distribution was i.i.d, its first and second order statistics were known and also when only head of the line was serviced $(S=1)$. However, in Multi-Antenna case the service time distribution is dependent on \begin{enumerate} \item the distribution of channel gains, of different users, \item the solutions of the optimization problems $P1-P3$ and \item the stationary user distribution in the queue\CG. \end{enumerate} Among these the distribution of channel gains is known (from assumptions). A closed form solution to the optimization problems $P1-P3$ is not available as the problem is known to be NP Hard\CR. Further, the stationary user distribution itself is dependent on service time distribution\CG. Thus, although the service time distribution in principle can be obtained given the channel gain distribution and the user distribution, its closed form is not available. But it can be easily obtained in simulation. We denote the first and second moment of service time as $\overline{T_\Sigma(\pi)}$ and $\overline{T^2_\Sigma(\pi)}$ for a given channel gain distribution $\Sigma$ and user distribution $\pi$. In this section we derive approximations for the user distribution also, following that we propose a method for getting the mean sojourn times. As a first step we approximate the mean sojourn time of SMQ, when the services have a known general and independent distribution ($GI$ services) as in \cite{TWC2021} and extend it to $S\geq2$. This approximation will be further generalized to the multi-antenna case. \subsection{Approximation of Mean Sojourn Time of SMQ for $GI$ services} \label{sec:smq_mst} In SMQ for $S=1$, we first typify the requests into two types, Type 1 (T1) and Type 2 (T2). Among the overall requests arriving at the Base Station queue, T1 requests correspond to the first request for a file that is either unavailable in the queue (or) is in service. Thus when a T1 request arrives at the queue it is put at the tail of the queue and the subsequent requests (T2) for the file are merged with this entry, as mentioned in section \ref{sec:system_model}. Let $\lambda_i'$ correspond to the rate of arrival of file $i$ in T1. Now, let $D_{1i}$ represent the delay experienced by the T1 arrival of file $i$. By PASTA (\cite{Asmussen}\CG), the mean number of total arrivals to the queue till this request is served is given as $1+\lambda_i E[D_{1i}]$, where $\lambda_i=\sum_{j=1}^K \lambda_{ij}$. Thus, \begin{equation} \label{eq:eff_lam} \lambda_i'=\frac{\lambda_i}{1+\lambda_i E[D_{1i}]}. \end{equation} Further, the rate of total T1 traffic for all the files is given as $\lambda'=\sum_{i=1}^N \lambda_i'$. We further assume $E[D_{1i}] = d$, for some $d$ and all $i$. In \cite{TWC2021}, we showed that this approximation is quite accurate and have verified that it holds even for varying file sizes. Finally we approximate the mean delay of T1 traffic using P-K formula for M/G/1 queues \cite{Asmussen} as \begin{equation} \label{eq:mg1} d= \frac{\rho_d}{1-\rho_d} \left(\frac{E[T^2]}{2 E[T]}\right), \end{equation} where $\rho_d=E[T]\lambda' =E[T]\sum_{i=1}^N \frac{\lambda_i}{1+\lambda_i d}$ and $E[T]$ and $E[T^2]$ are first and second order means of i.i.d service times. The mean delay of T1 traffic can be calculated by recursively solving (\ref{eq:mg1}), starting from any $d$. Further, if $d^*$ is the T1 delay obtained from the recursion, the delay experienced by T2 traffic has mean $d^*/2$. This is because the overall traffic is Poisson and hence the T2 arrivals have uniform distribution in the duration $d^*$. Thus the overall mean sojourn time is given as \begin{equation} \label{eq:mst} \overline{D}=\frac{\lambda'}{\lambda} d^* + \frac{\lambda-\lambda'}{\lambda} \frac{d^*}{2} + E[T]. \end{equation} For $S>1$, since more than $1$ file is being served in a service the utility $\rho_d$ reduces $S$ times. Thus, \CG we make another approximation \CG in (\ref{eq:mg1}) and replace $\rho_d$ by $\rho_d/S$ and we get \begin{equation} \label{eq:mg1_S} d= \frac{\rho_d}{S-\rho_d} \left(\frac{E[T^2]}{2 E[T]}\right)=f(d,S,E[T],E[T^2]). \end{equation} Again, the mean sojourn time can be derived using (\ref{eq:mst})\CG. It is worth noting that the SMQ may not always have queue length greater than $S$, particularly at low arrival rates. However, (\ref{eq:mg1_S}) assumes that the queue length is always at least $S$. This is a source of error which could be large when $S$ is large. Thus, (\ref{eq:mg1_S}) gives a lower bound on Type 1 delay in such cases, since $\rho_d$ is reduced $S$ times. Following comments are in order: \begin{itemize} \item The intuition behind the assumption $E[D_{1i}] = d$ is that the T1 traffic is a thinned superposition of the original \CG Poisson processes \cite{kallenberg}. With appropriate conditions (Theorem 16.18, \cite{kallenberg})\CG, the thinned, superposed process tends to a Poisson process. Thus if the T1 process can be approximated as Poisson, then PASTA holds and hence the assumption. Indeed we have seen in simulations that our assumption is true for a wide range of system parameters $\gamma$, $\lambda_{ij}$s, $N$, $K$, etc. \item Further, the M/G/1 approximation also holds true due to the above reason. \item Similar to \cite{TWC2021}, via a qualitatively typical example we show that the fixed point equation in (\ref{eq:mg1_S}) has a unique solution for any service time. We have verified that the curves for different $\lambda,\ K,\ S,\ N,\ \gamma$s are typically similar to those presented in this section. We consider a system with $\lambda=40$, $K=40$, $S=1$, $N=100$ and the file popularity has Zipf distribution with $\gamma=1$. Further lets consider two pairs of first and second moments of service times $(E[T],E[T^2])=$$(S_1,S_1^2)$ and $(S_2,S_2^2)$ where $S_1=0.15$ and $S_2=0.2$. From Figure \ref{fig:unique_fd} we see that for both the pairs of service time moments have unique solutions for $d=f(d,1,E[T],E[T^2])$. It is also worth noting that the unique solutions lie in the region (right of black vertical lines in figure \ref{fig:unique_fd} for each pair of service moments) where $\rho_d/S <1$\CG. We also see from Figure \ref{fig:unique_fd}\CG, that $d^*$ increases, with increase in moments. This is typically the case for all system parameters. In fact, we have seen that $d^*$ is non-decreasing in both $E[T],\ E[T^2]$ for different sets of system parameters. \item To see the stability of the queue analytically, in (\ref{eq:mg1_S}), if $\lambda \rightarrow \infty$, then $f \rightarrow \frac{{E}[T^2] N/ d}{2(S-{E}[T] N/d)} < \infty $. Thus solving the quadratic equation from (\ref{eq:mg1_S}), arising in the limit, we get \begin{equation} d=\frac{2E[T]N\pm \sqrt{4(E[T]N)^2-8E[T^2]NS}}{4S}. \end{equation} Now, ignoring the negative (irrelevant) root, for large $N$, we get $d\sim E[T]N/S$. Thus Type-1 delay (and hence the mean sojourn time in (\ref{eq:mst})) is upper bounded by $E[T]N/S$ for all $\lambda$s. Thus our queue is stable for all arrival rates, a feature unique to our queue. \end{itemize} \begin{figure}[!h] \centering \includegraphics[height=4cm,width=8cm,trim={1cm 9.5cm 1cm 9.5cm},clip]{Figures_WS/d_vs_fd.pdf} \caption{Uniqueness of solution to the fixed point (\ref{eq:mg1_S}): $K=40,\ \lambda=40,\ N=100,\ \gamma=1$, $S_1=.15$ secs, $S_2=.2$ secs} \label{fig:unique_fd} \end{figure} Now, we proceed with approximation of distribution of users for different file requests, under stationarity, in the queue. \subsection{Approximate User Distribution for SMQ} \label{sec:smq_approx} \CG We are concerned with the distribution of users requesting first $S$ head of the line files (service times depend only on this). We first derive the user distribution for the case $S=1$ and then generalize it to $S\geq 1$. Towards this note that the probability that file $i\in[N]$ is in the queue is given as \begin{equation} \label{eq:file_d} P(i \in Q)=\frac{\lambda_i'}{\lambda'}. \end{equation} Further, the probability that a T1 request for file $i$ is made by user $j$ is given by \begin{equation} P_{ij}=\frac{\lambda_{ij}}{\lambda_i}. \end{equation} Let $\mathbb{L}_{ij}$ represent the set of users requesting file $i$ when the T1 request was made by user $j$. Now, just before the service of file $i$, the $\mathbb{L}_{ij}$ would contain all the users who have made atleast one request within time $D_{1i}$. We approximate the probability that user $k\neq j$ makes atleast one request within time $D_{1i}$ as \begin{equation} \label{eq:user_request} q^k_{ij}=P(k\in \mathbb{L}_{ij})=1-e^{-\lambda_{ik}E[D_{1i}]}=1-e^{-\lambda_{ik}d}. \end{equation} In the above expression we use the approximation in the previous section, $E[D_{1i}]=d$ for all $i$. Now, let $U_1\in\{0,1\}^K$ represent a $K$ length vector where $k^{th}$ element is $1$, \textit{if the $k^{th}$ user has requested the file in head of the line} and $0$ otherwise. We can now approximate the conditional user distribution for head of the line entry given the requested file is $i_1$ as \begin{multline} \label{eq:cond_ud_1} P(U_1=[u_1^1,\cdots,u_1^K]\vert i_1)=\\\prod_{j=[K]}P_{i_1j} \prod_{k\neq j,k=[K]}(u_1^k q^k_{i_1j}+(1-u_1^k)(1-q^k_{i_1j}) ). \end{multline} Combining (\ref{eq:file_d}) and (\ref{eq:cond_ud_1}) we get the head of the line user distribution as \begin{multline} \label{eq:ud_1} \pi^d_{1}=P(U_1=[u_1^1,\cdots,u_1^K])=\\ \sum_{i_1\in[N]}P(i_1 \in Q) P(U_1=[u_1^1,\cdots,u_1^K]\vert i_1) \end{multline} \textit{$S\geq 1$ case:} Proceeding as for $S=1$, the probability that first $S$ entries have files $i_s,s=[S]$, $i_l\neq i_q$, for $l\neq q$ is given as \begin{equation} \label{eq:file_d_s} P(i_s \in Q, s=[S])=\frac{\lambda_{i_1}'}{\lambda'}\prod_{s=[S-1]}{\frac{\lambda_{i_{s+1}}'}{\lambda'-\sum_{p=[s]}{\lambda_{i_p}'}}}, \end{equation} where $Q$ is the set of files in SMQ. Note that this is an approximation of the actual distribution since the Type 1 delay will actually be less than $d$ for queue entries (file request positions) other than the head of the line entry. However, we calculate all $\lambda'_{i_s}$, $\forall i_s \in Q, s=[S]$ using the same $d$. The error due to this approximation may increase for large $S$. Nevertheless, we will see that for the values of interest of the parameter $S$ ($=1$,$2$ and $3$), the approximations work well and give low error. Now, let $U_s\in\{0,1\}^K$ represent a $K$ length vector where $k^{th}$ element is $1$, \textit{if the $k^{th}$ user has requested the file in $s^{th}$ entry of the queue} and $0$ otherwise. We can now define the conditional user distribution in the first $S$ head of the line entries given the files in positions $1,\cdots,S$ are $i_1,\cdots,i_S$ respectively, as \begin{multline} \label{eq:cond_ud} P(U_s=[u_s^1,\cdots,u_s^K], s=[S]\vert i_s, s=[S])=\\\prod_{s=[S],j=[K]}P_{i_sj} \prod_{k\neq j,k=[K]}(u_s^k q^k_{i_sj}+(1-u_s^k)(1-q^k_{i_sj}) ). \end{multline} Combining (\ref{eq:file_d_s}) and (\ref{eq:cond_ud}) we get the user distribution in the $S$ head of the line entries as \begin{multline} \label{eq:ud} \pi^d_{S}=P(U_s=[u_s^1,\cdots,u_s^K], s=[S])=\\ \sum_{i_1\neq\cdots\neq i_S\in[N]^S}P(i_s \in Q, s=[S])\times\\ P(U_s=[u_s^1,\cdots,u_s^K], s=[S]\vert i_1,\cdots,i_S) \end{multline} \CG The superscript $d$ is added to emphasis the dependence of the user distribution on the T1 delay $d$. Thus given the parameter $S$, the user distribution $\pi^d_{S}$ and channel gain parameter $\Sigma$ we can now calculate the first and second moments of service time $\overline{T_\Sigma(\pi^d_{S})}$ and $\overline{T^2_\Sigma(\pi^d_{S})}$. Using the moments of service time along with the M/G/1 approximation in the previous section, enables calculation of the Mean Sojourn Time of SMQ for the MISO System. For simplicity of notation we write $\overline{T_\Sigma(\pi^d_{S})}$ and $\overline{T^2_\Sigma(\pi^d_{S})}$ as $T(d)$ and $T^2(d)$ respectively. \subsection{Theoretical Mean Sojourn Time for SMQ MISO} \label{eq:theory_algo} Having derived $\pi^d_{S}$, we are now equipped to formulate the algorithm to derive the mean sojourn times of SMQ for multi-antenna case. Towards this we first rewrite, (\ref{eq:mg1_S}) as \begin{equation} \label{eq:smq_fp} d'=f(d',S,T(d),T^2(d))= \frac{T(d)\lambda'(d')}{S-T(d)\lambda'(d')} (\frac{T^2(d)}{2 T(d)}), \end{equation} Notice that the fixed point is over the variable $d'$ and also (\ref{eq:smq_fp}) brings in the dependence of service times on $d$. Though the ideal fixed point equation should be with $d'$ replacing $d$, we will see that keeping $d$ and $d'$ as different variables is useful in iterative algorithm formulation. Also, note that the M/G/1 approximation (\ref{eq:smq_fp}) subsumes that the service times are $i.i.d$ which is not true in reality. However, we will see that this approximation works well nevertheless\CG. We will also see that unlike (\ref{eq:mg1_S}), in the MISO system, since service time depends on the parameter $S$, the equivalent equation (\ref{eq:smq_fp}), gives an upper bound at lower arrival rates (seen via simulations)\CG. The algorithm to calculate Mean sojourn time is described in Algorithm \ref{algo:mst_miso_smq}. This algorithm works as follows: \begin{itemize} \item For any given $d$ the moments $T(d)$ and $T^2(d)$ are bounded (the boundedness arguments are similar to the $E[T]<\infty$ argument in Section \ref{sec:station}). \item Now, for a given $d$ we get $T(d)=t1$ and $T^2(d)=t2$ as follows: $M$ samples of service times are obtained using $P_X=P1,P2$ or $P3$ on $M$ realisations of user distribution and the corresponding channel gains using $\pi^d_{S}$, $\Sigma$ as shown in Algorithm \ref{algo:mst_miso_smq}. The $t1$ and $t2$ are then obtained by taking sample average of $M$ service times and square of service times. \item Now iterating the fixed point equation (\ref{eq:smq_fp}) with $t1$ and $t2$, we get a unique $d^*$ such that $d^*=f(d^*,S,t1, t2)$. \item We replace $d\leftarrow d^*$ and repeat the above steps till $\vert d_{n}-d_{n-1} \vert < \epsilon$ for a given $\epsilon$, where $d_n$ is the value of $d$ in the $n^{th}$ iteration. \end{itemize} \begin{algorithm}[h!] \CG \SetAlgoLined \caption{Mean Sojourn Time for MISO SMQ with MMF, MMF-SIC and MMF-RS beamformers} \label{algo:mst_miso_smq} \KwIn{$L$, $K$, $N$, $S$, $P$, $\lambda$, $\gamma$, $\Sigma$, $\epsilon$: error, $M$: Samples} Initialize: $\overline{T}=1,\overline{T^2}=1$, $d_{prev}=0,d=2\epsilon$\\ $P_X=P1,P2$ or $P3$\\ \While{$\vert d-{d_{prev}}\vert>\epsilon$} { $d_{prev}\leftarrow d$\\ $d_{old}=0$\\ \While{$\vert d-{d_{old}}\vert>\epsilon$} { $d_{old}\leftarrow d$,\\ $d\leftarrow f(d,S,\overline{T}, \overline{T^2})$ } Use (\ref{eq:ud}) and calculate $\pi^d_S$ for the new $d$\\ \For{$m=1$ \KwTo $M$} { Sample $U_s,s\in[S]$ using $\pi^d_S$\\ Sample $\textbf{H}$ (Channel Gains) using $\Sigma$\\ Solve $P_X$ for $U_s,s\in[S],\ \textbf{H}$ and obtain the service time $T^*$\\ $T_m\leftarrow T^*$ } ${T(d)}\leftarrow \frac{\sum_{m\in[M]}{T_m}}{M}$, ${T^2(d)}\leftarrow \frac{\sum_{m\in[M]}{T_m^2}}{M}$\\ $\overline{T}\leftarrow {T(d)}$, $\overline{T^2}\leftarrow {T^2(d)}$ } ${d}^{*}\leftarrow d$\\ /*Calculate Mean Sojourn Time*/ $\overline{D}=\frac{\lambda'}{\lambda} d^* + \frac{\lambda-\lambda'}{\lambda} \frac{d^*}{2} +\overline{T} $\\ \KwOut{$\overline{D}$: Mean Sojourn Time} \end{algorithm} We have seen that, starting from any $d$ Algorithm \ref{algo:mst_miso_smq} converges to a unique value of Type 1 delay and hence to a unique mean sojourn time. To show this we continue with our typical example in Figure \ref{fig:unique_fd} and provide some heuristics for the convergence of Algorithm \ref{algo:mst_miso_smq} to a unique fixed point of (\ref{eq:smq_fp}). We fix $L=16$, $g=1$ and $P_X=P1$. In general, for any system parameters the plots and the following heuristics are similar. \subsection{Heuristics for Convergence of Algortihm \ref{algo:mst_miso_smq}} \label{sec:heuristics} We begin by noting that as $d$ increases the number of users in the $S$ entries starting from head of the line, increases. This can be easily seen from (\ref{eq:user_request}) and (\ref{eq:ud}). Thus, naturally the service time increases with $d$ as the number of users in the system increase for all $P_X=P1,P2$ and $P3$. Further for very large $d$, we see that the user distribution is such that all the users are present in all the $S$ entries starting from head of the line. However, we note that the service moments remain bounded (from arguments similar to that of $E[T]<\infty$ in Section \ref{sec:station}). Further, we have seen that the equation in (\ref{eq:mg1_S}) has a unique fixed point $d^*$ for a given set of values of service moments. Similarly, (\ref{eq:smq_fp}) also has a unique fixed point (here the fixed point equation is in variable $d'$) for each value of $d$. Thus in each iteration, for a given $d$ Algorithm 1 gives a unique ${T}(d)$, ${T}^2(d)$ and $d^*$, where $d^*$ is the fixed point of the equation $d'=f(d',S,T(d),T^2(d))$. In Figure \ref{fig:SMQ_MISO_Theory}, we see that $f(d^*,S,T(d),T^2(d))$ is monotonically increasing with $d$. This is again because of monotonic increase in service time moments with $d$, because of which $d^*$ is non-decreasing as seen in Section \ref{sec:smq_mst}. Further, since Type-I delay $d^*$ and $T(d),T^2(d)$ are bounded, $f(d^*,S,T(d),T^2(d))$ is also bounded for all values of $d$. This can be seen in Figure \ref{fig:SMQ_MISO_Theory} where $f$ is bounded and non-decreasing. Now we note that, $T(d)$ and $T^2(d)$ are strictly positive even for $d=0$ since $P_X=P1,P2,P3$ give strictly positive service times even with one user in each entry (the distributions (\ref{eq:user_request}) and (\ref{eq:ud}) are such that there is atleast one user in each entry even for $d=0$). Thus the fixed point equation (\ref{eq:smq_fp}) gives a non-zero positive $d^*$ even for $d=0$. Further assuming continuity (proof of which is beyond the scope of analysis since continuity of $f$ depends on continuity of service moments $T(d)$ and $T^2(d)$ which is further dependent on the NP-Hard problems $P1,\ P2$ or $P3$) the straight line $d$ intersects $f$ at at least one point. We have seen from evaluations of Algorithm 1 for different system parameters that this point is unique. From Figure \ref{fig:SMQ_MISO_Theory} we see that for a typical case, there exists a unique fixed point which the algorithm achieves, starting from any $d$\CG. For every $d$, the algorithm computes the service moments and the corresponding $d^*$ using (\ref{eq:smq_fp}). The algorithm then proceeds iteratively by replacing the $d$ with the new $d^*$ as explained in Section \ref{eq:theory_algo}\CG. The dashed arrows in Figure \ref{fig:SMQ_MISO_Theory} show different paths, the algorithm takes starting from different $d$, to reach this unique fixed point. \begin{figure}[!h] \centering \includegraphics[height=4cm,width=8cm,trim={1cm 9.5cm 1cm 9.5cm},clip]{Figures_WS/SMQ_MISO_Theory.pdf} \caption{Uniqueness of Mean Sojourn Time for SMQ MISO case: $L=16,\ K=40,\ \lambda=40,\ g=1,\ P=10,\ N=100,\ N_0=1,\ \gamma=1$, } \label{fig:SMQ_MISO_Theory} \end{figure} \subsection{Evaluation of Algorithm \ref{algo:mst_miso_smq}:} \label{sec:eval_algo1} In this section we evaluate the accuracy of the approximation of mean sojourn time provided by Algorithm \ref{algo:mst_miso_smq}. Towards this we look at a system with $L=16$, $P=10$, $N_0=1$, $N=100$, $F=100Mb$, $B=100MHz$ and the file popularity follows Zipf distribution with parameter $\gamma=1$. The channels are modelled as complex Gaussian flat fading channels with $g=1$. To evaluate the goodness of fit of our approximation we vary the system parameters as $\lambda=10,20$ and $40$ representing low, medium and high loads, $K=4,10,20,30,40$ and $S=1,2$. We compare the mean sojourn times obtained via full system simulation with the ones obtained via Algorithm \ref{algo:mst_miso_smq}. The simulations are run for $10000$ services of the queue at the BS, to let the queues reach stationarity. The mean sojourn times in simulations are calculated using sample average of sojourn times seen during the simulation. To keep the service times bounded we fix $r_\epsilon=0.01$, (see Section \ref{sec:station}). Th algorithm parameters are fixed as follows $P_X=P1$, $\epsilon=0.1$ and $M=500$. The comparison here is shown for MMF beamforming (P1), other beamforming cases (P2 and P3) also have similar performance. From Figure \ref{fig:Th_Sim_SMQ} we see that Algorithm 1 (Theory) gives a mean sojourn time with less than $10\%$ error for cases $\lambda=20$ and $40$ (medium and high load) and $<15\%$ for the case $\lambda=10$ (low load case). Slight increase in error for $\lambda=10$, is because of less merging opportunities in low load condition. Hence the system (considering Type-1 traffic) deviates from the M/G/1 like system. We point out that in a system design, medium and high load conditions are more critical where our algorithm gives high accuracies. Thus Algorithm 1 gives a quick method for system designers to evaluate the performance of the system without using complicated full system simulations. \begin{figure}[!h] \centering \includegraphics[height=6cm,width=8cm,trim={1cm 7cm 1cm 7cm},clip]{Figures_WS/SMQ_Th_vs_Sim_S_1_2_lam_10_20_40.pdf} \caption{Comparison of Theory vs Simulation for SMQ: $L=16$, $P=10$, $N_0=1$, $N=100$, $F=100Mb$, $B=100MHz$, $g=1$} \label{fig:Th_Sim_SMQ} \end{figure} Now we proceed to derive approximate mean sojourn time for DSMQ. First we derive the mean sojourn time for general independent service times. \subsection{Approximation of Mean Sojourn Time of DSMQ for $GI$ Services} \CG We begin by noting that DSMQ is a Polling system \cite{takagibook}, with zero switching time for the server, with E-limited service discipline \cite{fhurmann}. There are several works which use Pseudo Conservation Laws \cite{boxma,takagi,fhurmann} to derive approximate waiting times in the queues of polling systems. However, these approaches are not conducive to solving the fixed point equations (similar to (\ref{eq:mg1_S}) and (\ref{eq:smq_fp})) arising due to merging of traffic and hence cannot be used directly. We propose an alternate approach where we consider SMQ-G and SMQ-B as independent M/G/1 queues with some modifications to the service times\CG. Towards this we first derive independent M/G/1 approximations for DSMQ for both the queues when the service times are i.i.d. \CG Let $d_1$ and $d_2$ be the Type 1 delays of SMQ-G and SMQ-B of DSMQ. Here, we are again making an approximation that for each queue the corresponding file requests see the same mean Type 1 delays, for reasons similar to SMQ. Let $\overline{T_1}$ and $\overline{T_2}$ be the mean service times and let $\overline{T^2_1}$ and $\overline{T^2_2}$ be the second moments of service times of SMQ-G and SMQ-B, respectively. Now, SMQ-G can be approximated as an independent M/G/1 queue with the first and second moments of service times defined as \begin{multline} \label{eq:mix_serve_G} \overline {T_G}=\overline{T_1}+\overline{T_2}/(C-1),\ \overline {T^2_G}=\overline{T^2_1}+\overline{T^2_2}/(C-1) \end{multline} and effective arrival rate as in Section \ref{sec:smq_approx} considering only rates $\Lambda_G=\{\lambda_{ij}$, $i\in[N]$ and $j\in \mathcal{K}_G\}$, where $\mathcal{K}_G$ is the set of good channel users. Similarly, SMQ-B can be approximated as an M/G/1 queue with the first and second order mean service times given as \begin{multline} \label{eq:mix_serve_B} \overline {T_B}=\overline{T_1}(C-1)+\overline{T_2},\ \overline {T^2_B}=\overline{T^2_1}(C-1)+\overline{T^2_2}. \end{multline} Also, the effective arrival rate as in section \ref{sec:smq_approx} considering only rates $\Lambda_B=\{\lambda_{ij}$, $i\in[N]$ and $j\in \mathcal{K}_B\}$, where $\mathcal{K}_B$ is the set of bad channel users. Now similar to SMQ, we can approximate mean T1 delay of SMQ-G using the fixed point equation \begin{equation} \label{eq:mg1_G} d_1= f_G(d_1,C,S,\overline{T_G},\overline{T^2_G})=\frac{\rho_{d_1}}{S-\rho_{d_1}} (\frac{\overline{T^2_G}}{2 \overline{T_G}}), \end{equation} where $\rho_{d_1}=\overline{T_G}\lambda_G'(d_1)$, and $\lambda_G'=\sum_{i=1}^N \frac{\sum_{j\in \mathcal{K}_G\}}\lambda_{ij}}{1+ d_1{\sum_{j\in \mathcal{K}_G\}}\lambda_{ij}}}$. Also, for SMQ-B the mean T1 delay is obtained using the fixed point equation \begin{equation} \label{eq:mg1_B} d_2= f_B(d_2,C,S,\overline{T_B},\overline{T^2_B})=\frac{\rho_{d_2}}{S-\rho_{d_2}} (\frac{\overline{T^2_B}}{2 \overline{T_B}}), \end{equation} where $\rho_{d_2}=\overline{T_B}\lambda_B'$, and $\lambda_B'(d_2)=\sum_{i=1}^N \frac{\sum_{j\in \mathcal{K}_B}\lambda_{ij}}{1+ d_2{\sum_{j\in \mathcal{K}_B}\lambda_{ij}}}$. Thus T1 delays, $d_1$ and $d_2$ for both SMQ-G and SMQ-B can be calculated using recursive equations (\ref{eq:mg1_G}) and (\ref{eq:mg1_B}) independently. The uniqueness of $d_1$ and $d_2$ holds true even in this case as both the queues are treated independently. Further, the user distributions $\pi^{d_1}_S$ and $\pi^{d_2}_S$ for SMQ-G and SMQ-B can be derived in the same manner as in Section \ref{sec:smq_approx}, with rates $\Lambda_G$ and $\Lambda_B$ respectively. \subsection{Theoretical Mean Sojourn Time for DSMQ MISO} \CG We can extend Algorithm \ref{algo:mst_miso_smq} to derive mean sojourn time for the DSMQ MISO system. The DSMQ can again be considered as a Polling system with $\Lambda_G$ arrivals to SMQ-G and $\Lambda_B$ arrivals to SMQ-B. Similar to $T(d)$ and $T^2(d)$ in the SMQ case, the first and second moments of the service times of SMQ-G and SMQ-B are represented as $T_n(d_n), T_n^2(d_n)$, $n=1,2$, respectively. The moments $T_n(d_n), T_n^2(d_n)$, $n=1,2$ are dependent on $\Sigma$, $\pi^{d_1}_S$ and $\pi^{d_2}_S$. Similar to the SMQ case we replace $\overline{T_n}$ and $\overline{T^2_n}$, $n=1,2$, in equations (\ref{eq:mix_serve_G}) and (\ref{eq:mix_serve_B}) with $T_n(d_n), T_n^2(d_n)$, $n=1,2$ respectively and rewrite (\ref{eq:mg1_G}) and (\ref{eq:mg1_B}) as follows: \begin{equation} \label{eq:mg1_miso_G} d_1'=f_G(d_1',C,S,\overline{T_G},\overline{T^2_G})=\frac{\lambda_G(d_1')\overline{T_G}}{S-\lambda_G(d_1')\overline{T_G}} (\frac{\overline{T^2_G}}{2 \overline{T_G}}). \end{equation} Similarly for SMQ-B the mean T1 delay is obtained using the fixed point equation \begin{equation} \label{eq:mg1_miso_B} d_2'= f_B(d_2',C,S,\overline{T_B},\overline{T^2_B})=\frac{\lambda_B(d_2')\overline{T_B}}{S-\lambda_B(d_2')\overline{T_B}} (\frac{\overline{T^2_B}}{2 \overline{T_B}}). \end{equation} Note that unlike SMQ case, the $\overline{T_G}$ and $\overline{T_B}$ are both dependent on both $d_1$ and $d_2$ as: \begin{equation} \label{eq:mix_serve} \begin{split} \overline {T_G}&=T_1(d_1)+T_2(d_2)/(C-1),\\ \overline {T^2_G}&=T^2_1(d_1)+T^2_2(d_2)/(C-1),\\ \overline {T_B}&=T_1(d_1)(C-1)+T_2(d_2),\\ \overline {T^2_B}&=T^2_1(d_1)(C-1)+T^2_2(d_2). \end{split} \end{equation} However, similar to the SMQ case, the fixed point equation is over the variable $d_1'$ alone for (\ref{eq:mg1_miso_G}) and $d_2'$ alone for (\ref{eq:mg1_miso_B}). The Algorithm \ref{algo:mst_miso_dsmq} proceeds in a manner similar to Algorithm \ref{algo:mst_miso_smq}, except for the coupling in service times coming from equations (\ref{eq:mix_serve_G}) and (\ref{eq:mix_serve_B}). The pseudo-code to calculate the mean sojourn time is given in Algorithm \ref{algo:mst_miso_dsmq}. \CG The uniqueness of the fixed points of Algorithm \ref{algo:mst_miso_dsmq} is seen by heuristics, similar to that of SMQ case (Section \ref{sec:heuristics}). This is because the fixed point iterations run in a decoupled manner even though $\overline{T_G}$ and $\overline{T_B}$ are coupled\CG. \begin{algorithm}[h!] \CG \SetAlgoLined \caption{Mean Sojourn Times for MISO DSMQ with MMF, MMF-SIC and MMF-RS beamformers} \label{algo:mst_miso_dsmq} \KwIn{$L$, $K$, $N$, $S$, $P$, $\Lambda_G$, $\Lambda_B$, $\Sigma$, $\epsilon$: error, $M_1,M_2$: Samples} Initialize: $T_n(d_n)=1,T^2_n(d_n)=1$, $n=1,2$, $d_{prev1}=0,d_1=2\epsilon$, $d_{prev2}=0,d_2=2\epsilon$\\ $P_X=P1,P2$ or $P3$\\ \While{$\vert d_1-{d_{prev1}}\vert>\epsilon$ or $\vert d_1-{d_{prev1}}\vert>\epsilon$} { Calculate $\overline {T_G}$, $\overline {T^2_G}$, $\overline {T_B}$, $\overline {T^2_B}$ as in (\ref{eq:mix_serve})\\ $d_{prev1}\leftarrow d_1$, $d_{prev2}\leftarrow d_2$\\ $d_{old}=0$\\ \While{$\vert d_1-{d_{old}}\vert>\epsilon$} { $d_{old}\leftarrow d_1$,\\ $d_1\leftarrow f_G(d_1,S,\overline{T_G}, \overline{T_G^2})$ } $d_{old}=0$\\ \While{$\vert d_2-{d_{old}}\vert>\epsilon$} { $d_{old}\leftarrow d_2$,\\ $d_2\leftarrow f_B(d_2,C,S,\overline{T_B}, \overline{T_B^2})$ } Use (\ref{eq:ud}), $\Lambda_G,\ \Lambda_B$ and calculate $\pi^{d_n}_S$ for the new $d_n$, $n=1,2$\\ \For{$n=1$ \KwTo $2$} { \For{$m=1$ \KwTo $M_n$} { Sample $U_s,s\in[S]$ using $\pi^{d_n}_S$\\ Sample $\textbf{H}$ (Channel Gains) using $\Sigma$\\ Solve $P_X$ for $U_s,s\in[S]$, $\textbf{H}$ and obtain the service time $T^*$\\ $T_m\leftarrow T^*$ } ${T_n(d_n)}\leftarrow \frac{\sum_{m\in[M_n]}{T_m}}{M_n}$, ${T^2_n(d_n)}\leftarrow \frac{\sum_{m\in[M_n]}{T_m^2}}{M_n}$\\ } } $\lambda_G=\sum_{i\in[N],\ j\in{\mathcal{K}_G}}\lambda_{ij}$, $\lambda_B=\sum_{i\in[N],\ j\in{\mathcal{K}_B}}\lambda_{ij}$\\ $ $\\s /*Calculate Mean Sojourn Times $D_1$ for SMQ-G and $D_2$ for SMQ-B*/\\ ${D_1}=\frac{\lambda_G'}{\lambda_G} d_1 + \frac{\lambda_G-\lambda_G'}{\lambda_G} \frac{d_1}{2} +{T_1(d_1)} $\\ ${D_2}=\frac{\lambda_B'}{\lambda_B} d_2 + \frac{\lambda_B-\lambda_B'}{\lambda_B} \frac{d_2}{2} +{T_2(d_2)} $\\ \KwOut{${D_1}, D_2$: Mean Sojourn Times} \end{algorithm} \subsection{Evaluation of Algorithm \ref{algo:mst_miso_dsmq}} In this section we evaluate the accuracy of the approximation of mean sojourn time provided by Algorithm \ref{algo:mst_miso_dsmq}. Towards this we consider a system with $K=40$ users among which $K_G=20$ are good users and the rest $K_B=20$ are bad users. The mean fading for good users is $g_k=0 dB,\ \forall\ k\in[K_G]$ and for bad users is $g_k=-15 dB,\ \forall\ k\in [K]\setminus[K_G]$. We fix $\lambda=40$. The rest of the parameters are same as in Section \ref{sec:eval_algo1}. We also vary the system parameter $S=1,2$. The algorithm parameters are fixed as follows: $P_X=P1$, $\epsilon=0.1$ and $M_1=500,\ M_2=500$. The comparison here is shown for MMF beamforming (P1). Other beamforming cases (P2 and P3) have similar performance. From Figure \ref{fig:Th_Sim_DSMQ} we see that Algorithm \ref{algo:mst_miso_dsmq} (Theory) gives a mean sojourn time with less than $10\%$ error for the case $\lambda=40$. Here we have considered only the high load condition. The Algorithm \ref{algo:mst_miso_dsmq} performs similar to Algorithm \ref{algo:mst_miso_smq} in low load conditions as well, however we do not present here for clarity of presentation. \begin{figure}[!h] \centering \includegraphics[height=6cm,width=8cm,trim={.5cm 7cm 1cm 7cm},clip]{Figures_WS/Sim_vs_Th_2Q.pdf} \caption{Comparison of Theory vs Simulation for DSMQ (Heterogeneous case): $L=16, \lambda=40,\ K=40,\ K_B=K_G=20,\ P=10,\ N=100,\ N_0=1,\ \gamma=1$} \label{fig:Th_Sim_DSMQ} \end{figure} \textit{Note:} \CG We point out that we are not aware of any other study providing theoretical approximations of such complicated queueing systems. Our approximations provide a theoretical backing for our queues and provide a means to evaluate the performance of queues for varied system settings without performing full system simulation which can be computationally quite expensive and may take longer to reach stationarity depending on the setting. Our algorithms on the other hand approximate the stationary user distribution in the queue, use closed form expressions for mean delays (Type-1,2 and Mean sojourn time) and typically reach the fixed point within $4$ iterations for all settings. Thus the algorithms are quite useful in system design where engineers may need to do a quick system evaluation with different types of queues. These theoretical approximations also provide insight into how the system behaves and the effect of different parameters on the system performance. Further our Algorithms are not restricted to beamforming cases presented in this work but can be adapted to any beamforming strategies a designer may wish to apply by appropriately changing the optimization. It would also be much faster if one could get a closed form expressions for the moments of service time for a given user distribution (which typically is not the case in the current multi-user MIMO literature). We would also like to point out that the Algorithm 2 can be used to analyse any M/G/1 type E-limited Polling system with zero switchover times to get the theoretical waiting times for users, which maybe of independent interest\CE. \section{Simulation Results and Discussion} \label{sec:sim} In this section we present, simulation results and comparison of different beamforming schemes with SMQ and DSMQ. We consider two cases of channel statistics. First with homogenous channel statistics across users and second with heterogenous channel statistics where there are users with good and bad channel statistics\CE. All our simulations use complex Gaussian flat fading channels as explained in Section \ref{sec:system_model}. To avoid arbitrarily large service times, we fix $r_\epsilon=0.01$, (see Section \ref{sec:station}). This ensures that $E[T] <\infty$, needed in Proposition \ref{prop:station}, for all our schemes. All our simulations are run for $10000$ services of the queue at the BS, to let the queues reach stationarity. \textit{\CK The mean sojourn times are estimated using sample average of sojourn times seen during the simulation}\CE. \begin{figure}[h!] \centering \includegraphics[height=6cm,width=8cm,trim={1cm 7cm 1cm 7cm},clip]{Figures_PIMRC/10Users_Single_Statistics.pdf} \caption{Comparison of Beamforming schemes (Homogeneous Case) with SMQ: $K=10,\ P=10,\ N=100,\ N_0=1,\ \gamma=1,\ g=1$} \label{fig:user_10} \end{figure} \begin{figure}[h!] \centering \includegraphics[height=6cm,width=8cm,trim={1cm 7cm 1cm 7cm},clip]{Figures_PIMRC/40Users_Single_Statistics_RS_Panjus.pdf} \caption{Comparison of Beamforming schemes (Homogeneous Case) with SMQ: $K=40,\ P=10,\ N=100,\ N_0=1,\ \gamma=1,\ g=1$} \label{fig:user_40} \end{figure} \textit{Case 1 (Homogeneous Channel Statistics):} \CE We consider a MISO network with $L=16$ antennas, $N=100$ files, each file of size $F=100Mb$ and system bandwidth $B=100MHz$. Channels between each antenna and users are i.i.d complex Gaussian with mean fading $g=1$. The popularity of files follow Zipf distribution with popularity $\gamma=1$. This is a common assumption and is shown to reflect the content request traffic in servers such as youtube \cite{itube}. We fix $P=10$ and assume that the average noise power $\sigma_k^2=N_0=1,\ \forall k\in[K]$ in all our systems. To cater for all scenarios (low, medium and high traffic) we consider systems with $K=10, 40$ users, and the arrival rates $\lambda=10,20,40,60,80$ files/sec. The first case of $K=10$ represents low load scenario. Since the number of antennas are more than the number of users, the beamformer has higher degrees of freedom to null the inter-stream interference (if any) in all kinds of traffic. However, to bring in the effect of queueing we also look at the different arrival rates $\lambda=10,20,40,60,80$. The second case of $K=40$ represents moderate to high load condition, depending on $\lambda$. Here the total active users (for each file in the queue) may actually be less than the total number of antennas, when the traffic is low (e.g., $\lambda=10,20$) and greater when the traffic is high $\lambda=40,60,80$. Figures \ref{fig:user_10} and \ref{fig:user_40} show the comparison of mean sojourn times for different schemes for different arrival rates for cases $K=10$ and $40$ respectively. \CE The first observation we make is that, increasing the number of streams ($S\geq2$) is beneficial for SMQ MMF and SMQ MMF-RS, only in low and moderate arrival rates. Compared to $S=1$, both $S=2,3$ provide around $50-75\%$ improvement for $\lambda=10,20$ and $30-50\%$ improvement for $\lambda=40$. At very high traffic $\lambda=80$, increasing $S$ provides negligible gain. The reason is that at very high traffic each file entry in the queue has enough requests to provide multicast opportunities and hence adding more streams provides no advantage. However at lower and medium arrival rates the spatial multiplexing gains are provided by $S=2,3$ in addition to the multicast gain provided by the SMQ. Note that the performance reduction of $S=2,3$ streams is also due to the fact that there may exist common users in $S$ groups which may limit the rate, thus reducing the multiplexing gain. \CE Our second observation is that the MMF-SIC is beneficial only when the total number of users are less than the total number of antennas, ($K=10,\ L=16$)\CE. Further we make another important observation that MMF-RS beamforming in SMQ performs similar to (or) worse than MMF beamforming case for all cases of $K=10,40$ and $S=2,3$. \CE For $S=1$ the performances of MMF and MMF-RS are similar\CE. This is because of the optimization of the max transmit time (\ref{eq:opt_RS}) among the degraded and designated streams, which is inevitable in queued systems such as SMQ\CG. This result is in stark contrast to what is observed in a system without queues \cite{RS2User,RS2017} where, RS based beamforming always does better than any other beamforming scheme. However we will see in the following that MMF-RS provides significant advantage in the heterogenous case, even in a queued system\CE \textit{Case 2 (Heterogeneous Channel Statistics):} \CE We consider only MMF and MMF-RS in this section (MMF-SIC performs poorly in heterogenous case as well. Hence, we do not present it here for the sake of clarity of presentation). We consider the system with $K=40$ users among which $K_G=20$ are good users and the rest $K_B=20$ are bad users. The mean fading for good users is $g_k=0dB,\ \forall\ k\in[K_G]$ and for bad users is $g_k=-15dB,\ \forall\ k\in [K]\setminus[K_G]$. \CE In other words bad users undergo 15dB deeper fading than the good users. In practical systems this does happen. All the other parameters stay same\CE. We compare the performances of both SMQ and DSMQ in terms of mean sojourn times experienced by good users in Figure \ref{fig:DSMQG} and bad users in Figure \ref{fig:DSMQB}. \begin{figure} \centering \includegraphics[height=5.5cm,width=8cm,trim={1cm 7cm 1cm 8.7cm},clip]{Figures_PIMRC/DSMQ_Good_Final.pdf} \caption{Comparison of Beamforming schemes (Heterogeneous Case) with SMQ and DSMQ for Good users: $K=40,\ K_B=K_G=20,\ P=10,\ N=100,\ N_0=1,\ \gamma=1$, } \label{fig:DSMQG} \end{figure} \begin{figure}[!h] \centering \includegraphics[height=5.5cm,width=8cm,trim={1cm 7cm 1cm 8.7cm},clip]{Figures_PIMRC/DSMQ_Bad_Final.pdf} \caption{Comparison of Beamforming schemes (Heterogeneous Case) with SMQ and DSMQ for Bad users: $K=40,\ K_B=K_G=20,\ P=10,\ N=100,\ N_0=1,\ \gamma=1$} \label{fig:DSMQB} \end{figure} As explained before, in SMQ both good and bad users experience the same mean sojourn time. When we compare MMF SMQ $S=1$ for $\lambda=40$ in Figures \ref{fig:DSMQG}, \ref{fig:DSMQB} with Figure \ref{fig:user_40}, we see that the presence of bad users increases the mean sojourn time of all users (good and bad), from $7$ to $145$ secs. This is a significant degradation\CE. Further, in contrast to the homogeneous case, MMF-RS SMQ $S=1$ improves the mean sojourn time to $70$ secs, in Figure \ref{fig:DSMQG}. Nevertheless, the delay is still significantly high\CE. Now consider MMF DSMQ with $C=8$, and $C=15$. We see from Figure \ref{fig:DSMQG} that $C=15$ mostly recovers the mean sojourn time for good users to $\sim 20$ secs as compared to $\sim 7$ secs for MMF SMQ in Figure \ref{fig:user_40}. However, the delay of bad users is severely degraded to $300$ secs. This is not desirable. Setting $C=8$ improves this situation by providing mean sojourn time of $30$ secs to good users and $210$ secs to bad users. Thus, $C$ can be tuned to get desirable fairness. Next, in Figure \ref{fig:DSMQB} we observe that for $C=8$, MMF-RS DSMQ further reduces the mean sojourn time of bad channel users from $210$ secs for MMF DSMQ to $135$ secs, for $\lambda=40$. This also results in a slight improvement of $5$ secs for the good users, Figure \ref{fig:DSMQG}. Further, fine tuning of MMF-RS DSMQ with $C=5$ controls the fair allocation of QoS to good and bad channel users, resulting in delays of $30$ and $100$ secs, respectively, for $\lambda=40$. We can see similar trends for $\lambda=10,20$ in Figures \ref{fig:DSMQG} and \ref{fig:DSMQB}. Finally we remark that increasing $S$ ($\geq 2$) is only beneficial in MMF SMQ for $\lambda=10,20$ for reasons similar to the homogeneous case. \CE Such QoS allocation by DSMQ is quite useful in practical CCN networks to prevent situations where bad users might restrict good users from watching HD content\CG. We now compare DSMQ to other content centric queues like Loopback (\cite{TWC2021}) which was designed for the same purpose (providing optimal fairness). \textit{DSMQ vs Loopback:} \CG In Figures \ref{fig:DSMQG} we compare the performance of the Loopback scheme proposed in \cite{TWC2021} (Defer scheme \cite{TWC2021} in MISO case also has similar performance. The results are not presented here for the sake of brevity). In the Loopback scheme, we use SMQ and $P1$ MMF beamforming with the following modification. We fix a rate threshold $r_{thresh}$ and transmit at this fixed threshold. We solve $P1$ and obtain rates $R_k$ for all users. Now, the users with rate $R_k\geq r_{thresh}$ only, are successfully served. Rest of the user requests are looped back to the end of the queue. Here, we fix the rate threshold $r_{thresh}=0.5$. This is chosen by trial and error to minimise the overall mean sojourn time. We see in Figure \ref{fig:DSMQG} that Loopback scheme with MMF beamforming, $S=1$, gives a good improvement for the good channel users, for arrival rate $40$, compared to MMF SMQ $S=1$, while slightly degrading the performance for the bad users. However, we note that this improvement is not as good as DSMQ based schemes. Further, we note that Loopback provides no gain for arrival rates $10$ to $30$. This is majorly because the MMF beamforming in a MISO system optimises the transmission rates to users with bad channels. Thus, working with single queues like SMQ and Loopback inherently penalises severely the users with good channels\CG. From these simulations it is clear that DSMQ beats SMQ and Loopback's performance in the heterogenous case. Therefore we can conclude that the choice of queueing in a MISO system is an important problem and that the QoS can be significantly improved with careful design. \textit{RL based Power Control in time:} Finally we evaluate the performance of reinforcement learning based power control in time using Adaptive Constrained Deep Q-Network (AC-DQN) algorithm, \cite{Arxiv2019}, in a multi-antenna system with SMQ, for the heterogeneous case for $K=40$ and $\lambda=40$. Towards this, we modify the power constraint in (\ref{eq:opt_re}) as $\sum_{s\in[S]}\norm{\textbf{w}_s}_2^2 \leq P_t$ where $P_t$ is the transmit power of $t^{th}$ transmission. Further we impose an additional long term time average power constraint, $E[P_t]\leq P$. This constraint is ensured by reinforcement learning based AC-DQN algorithm \cite{Arxiv2019}. \begin{figure}[!h] \centering \includegraphics[height=5.5cm,width=8cm,trim={1cm 7cm 1cm 7cm},clip]{Figures_NCC/PC.pdf} \caption{ACDQN based power control with SMQ (Heterogeneous Case) MMF S=1: $K=40,\ P=10,\ N=100,\ N_0=1,\ \gamma=1$, $\lambda=40$} \label{fig:PC} \end{figure} We see from Figures \ref{fig:PC} that, power control in time for heterogenous user MISO case provides no extra gain. This is in stark contrast to the results obtained in SISO case \cite{Arxiv2019}. This is because spatial diversity in multiple antenna case makes up for most of the time diversity in a SISO systems\CE. \CR \textit{Comparison of SMQ with other architectures in Homogeneous Case:} As mentioned in the introduction, the queueing studies in MIMO literature \cite{huang2012stability,queuestable,Qaware,delayperform,largedevqueue} have invariably considered, different queues for each user. We had argued that this is a suboptimal way of queueing for content-centric networks since such queueing strategies do not utilize the redundancies in the request traffic. In what follows, we show via simulations, that increasing the number of queues to even two in homogeneous case, gives inferior performance, due to reduced multicast opportunities. Therefore, by extension, increasing the number of queues further can only give poorer performance. We show this for a typical case of $K=40$ users and MMF beamforming keeping all other parameters same as in the homogeneous case considered above. The conclusions for other parameters and beamforming cases are similar. There are two possibilities, when we consider two queues for the MISO system as mentioned below: \begin{enumerate} \item DSMQ MMF (Homogeneous case): Here, similar to the DSMQ queueing scheme, we consider two queues. We call the queues as SMQ1 and SMQ2. We divide the set of users into equal sets and assign SMQ1 for users $\{1,2,\cdots,20\}$ and SMQ2 for users $\{21,22,\cdots,40\}$. Since all users have good channels we set $C=2$, that is equal number of slots are given to both the queues. The beamforming (MMF in this case) and service is provided as explained in Section \ref{sec:DSMQ}, in a slotted manner. \item 2Q Simultaneous MMF: Another possibility is that, we assign the users as mentioned above and serve the head-of-the-line entries of both the queues simultaneously. That is we consider the set of users in head-of-the-line of SMQ1 and SMQ2, as two groups. We solve optimization problem $P1$ and serve the users in head of the line of both the queues simultaneously as two streams. Here, there are no common users across the two streams. \end{enumerate} Note that to make a fair comparison and give advantage to the two queue systems, we have retained merging in both the queueing systems as described above. Otherwise, as noted in \cite{TWC2021}, without merging, these queues will certainly perform much worse. Now, from Figure \ref{fig:opt_user_40}, we see that both the two-queue systems perform poorly compared to SMQ with MMF beamforming. We reiterate that this is because, as we split the queues and the users into groups, the number of multicast opportunities per file go down. As a result the performance is also affected. Hence in a MISO CCN (or any CCN for that matter) it is always a good idea to merge requests for same contents to the maximum extent possible and serve them simultaneously. However, when the channel statistics are heterogenous as seen previously, we also need to consider fairness criterion for good users while performing the merging. Thus the requirement of splitting of queue was valid in the heterogenous case and not so in the homogenous case. \begin{figure}[h!] \centering \includegraphics[height=5cm,width=8cm,trim={1cm 9cm 1cm 9cm},clip]{Figures_WS/40Users_SMQ_Optimality.pdf} \caption{Comparison of SMQ with other queues in Homogeneous Case: $K=40,\ P=10,\ N=100,\ N_0=1,\ \gamma=1,\ g=1$} \label{fig:opt_user_40} \end{figure} From these simulations it is clear that MMF-RS DSMQ and SMQ-MMF perform the best in the heterogenous and the homogenous cases, respectively. Therefore we can conclude that the choice of a queueing and a beamforming scheme is a coupled problem and that the QoS and fairness are cross layer objectives which can be significantly improved with careful design. \section{Conclusion and Future work} \label{sec:conclusion} \CE We have considered practical adaptations of beamforming strategies in a MISO CCN with a queue and evaluated their performance We show that the Simple Multicast Queue (SMQ) can be adapted to such a MISO setup. For homogenous channel case, we show that the SMQ combined with the simplest MMF beamforming scheme performs the best. This is in contrast to the results in \cite{RS2017,RS2User} where Rate Splitting (RS) performs the best. Thus the complexities of RS can be avoided in homogeneous case. Further, we have identified SMQ's shortcomings in heterogenous user channel case. We have proposed a new simple queueing scheme called Dual Simple Multicast Queue (DSMQ) which gives flexibility in allocating different QoS for users with good and bad channels. Here, we have shown that MMF-RS DSMQ performs the best, among all schemes. We have also shown that power control and loopback schemes in \cite{TWC2021,Arxiv2019}, are ineffective in MISO setup. \CG We have also proved the stationarity of the queues and have shown that they are always stable across all arrival rates\CE. We have provided queueing theoretic approximations to the mean sojourn time, which could be very useful in cross-layer analysis of Multiuser MISO CCNs with queues. Finally we conclude that the selection of the queueing strategy and beamforming is a coupled problem. The pairs (SMQ, MMF) and (DSMQ, MMF-RS) are optimal strategies for homogeneous and heterogeneous cases respectively, among the ones considered in this paper\CG. Future work may include analysis of the effect of user movements and imperfect CSIT etc., on queueing delays\CE. \bibliographystyle{IEEEtran}
\section{Introduction} Recently there has been renewed interest in the so-called \emph{shear-free fluid conjecture}, which claims that \begin{quote} general relativistic, shear-free perfect fluids obeying a barotropic equation of state such that $p + \mu \neq 0$, are either non-expanding ($\theta\neq 0$) or non-rotating ($\omega\neq 0$). \end{quote} For an overview of the history of the problem we refer to \cite{VdB-Radu2016}, which contained as main results the following theorems: (1) the conjecture is correct for linear equations of state $p = a \mu + b$ ($a,b$ constants, thereby also incorporating the existence of a possible non-0 cosmological constant) and (2) if a shear-free perfect fluid with an general barotropic equation of state is non-rotating and non-expanding, then vorticity and acceleration are mutually orthogonal if and only if a Killing vector exists along the vorticity. Note that, while in the latter case the equations describing the problem simplify dramatically, the accompanying loss of information turns this special case, as remarked already by Collins \cite{CollinsKV}, into an exceptionally elusive one. While the search for a counter-example to the conjecture or the desire to construct a proof has lead to the investigation of a large number of --admittedly sometimes contrived\footnote{see for example the present authors' investigations of shear-free perfect fluids with a solenoidal electric or magnetic part of the Weyl curvature \cite{NorbertCarminatiKarimian2007} \cite{NorbertKarimianCarminatiHuf2012}}-- sub-cases (so far however all in agreement with the conjecture), it also has lead occasionally authors to let their cautiousness slip away, resulting in incorrect claims \footnote{see for example \cite{Carminati2015} where a bug in Maple's solve routine went unnoticed, or \cite{Sikhonde_Dunsby2017} where the abstract of the paper incorrectly claimed to provide a covariant proof for the case where the acceleration and vorticity vectors are orthogonal}. The recent publication \cite{Goswami_Ellis_grqc20021} by R.Goswami and G.F.R.~Ellis, claiming to have obtained a general proof of the conjecture, is a further example of the latter. In their paper the authors use the 1+1+2 formalism, which is a specification of the more well known local 1+3 threading of the space-time manifold, using the unit time-like unit vector $\w{e}_0= \w{u}$ along the fluid flow lines and the unit vector $\w{e}_3$ along the vorticity $\bm{\omega}$ as preferred vector fields. This formalism bears a strong similarity to the orthonormal tetrad formalism \cite{MacCallum1971} \cite{EllisMaartensmacCallum2012}, in so far that the dot and hat derivatives appearing in \cite{Goswami_Ellis_grqc20021} are identical (when acting on scalars $\phi$) to the directional derivatives $\w{e}_0, \w{e}_3$ ($\dot{\phi}=\w{e}_0(\phi), \hat{\phi}=\w{e}_3(\phi)$). On the other hand, the directional derivative operators $\w{e}_1,\w{e}_2$ can be re-defined by absorbing some of the "badly transforming spin coefficients" (under rotations in the (1,2) planes), so as to obtain the $\delta$ operators of the 1+1+2 formalism. For comparison of the equations appearing in both formalisms, we present in table \ref{table1} the correspondence between some of the relevant variables used in \cite{Goswami_Ellis_grqc20021} and their analogs in \cite{VdB-Radu2016}. \begin{table*}[ht] \label{table1} \caption{1+1+2 variables vs.~orthonormal tetrad variables, indices being ordered as (1,2,3,0)} \centering \begin{tabular}{p{0.35\linewidth}p{0.35\linewidth}} \hline \noalign{\vskip 2mm} 1+1+2 & orthonormal tetrad \\ \noalign{\vskip 2mm} \hline \noalign{\vskip 2mm} $\Omega$ & $\omega_3$\\ ${\cal A}$ & $\dot{u}_3$\\ $\xi$ & $ n_{33}/2$\\ $\phi$ & $-2a_3$\\ $\alpha^a$ & $[\Omega_2,\, -\Omega_1, \, 0, \, 0]$\\ ${\cal A}^a$ & $[\dot{u}_1, \, \dot{u}_2, \, 0, \, 0]$ \\ ${\it a}^a $ & $[a_1-n_{23}, \,a_2+n_{13}, \, 0, \, 0]$ \\ $\zeta_{ab}$ & $\left[ \begin{array}{cccc} -n_{12} & (n_{11}-n_{22})/2 & 0 & 0 \\ (n_{11}-n_{22})/2 & n_{12} & 0 & 0\\ 0 & 0 & -a_3 & 0\\ 0 & 0 & 0 & 0\\ \end{array} \right]$\\ $N_{ab}$ & $\left[ \begin{array}{cccc} 1 & 0 & 0 & 0\\ 0 & 1 & 0 & 0\\ 0 & 0 & 0 & 0\\ 0 & 0 & 0 & 0\\ \end{array} \right]$\\ \noalign{\vskip 2mm} \hline \end{tabular} \end{table*} We note the different uses of the symbols in the two formalisms: the vorticity scalar is represented by $\Omega$ in \cite{Goswami_Ellis_grqc20021} and by $\omega_3$ in \cite{VdB-Radu2016}, while the quantities $\Omega_1,\Omega_2,\Omega_3$ in the latter specify the rotation of the spatial triad with respect to a Fermi-propagated triad.\\ In Lemma 1 of \cite{Goswami_Ellis_grqc20021} it is proved that the projection of the time evolution of the unit vector along the vortex line onto the (1,2)-plane vanishes: $\alpha_a=0$. In the tetrad-approach this is reflected by the conditions $\Omega_1=\Omega_2=0$, which follow by applying the commutators $[\w{e}_3, \w{e}_1]$ and $[\w{e}_3, \w{e}_2]$ to $p$ and using the conservation laws. It is then customary to apply a rotation in the (1,2)-plane such that $\Omega_3+\omega_3=0$, ensuring that the spatial triad is Fermi-propagated along the flow. Note that this fixes the spatial triad only modulo \emph{basic} rotations, namely rotations for which the rotation angle $\psi$ satisfies $\dot{\psi}=0$: in \cite{VdB-Radu2016} such a rotation is used to fix the tetrad further such that $n_{11}-n_{22}=0$, therewith diagonalizing the matrix $\zeta_{ab}$. A further fixation making also $n_{12}=0$ is possible when a Killing vector exists along the vorticity.\\ A consequence of the vanishing of $\alpha_a$ is the following important set of "derivative equations", (87-92) of \cite{Goswami_Ellis_grqc20021}: \begin{eqnarray} \dot{\Omega}&=&\left(c_s^2-\frac23\right)\Omega\theta\;,\label{Omdot}\\ \hat{\Omega}&=&({\cal A}-\phi)\Omega\;,\label{Omhat}\\ \dot\xi&=&-\frac13\theta\xi\;,\label{xidot}\\ \dot{\phi}&=&\frac23\theta\left({\cal A}-\frac12\phi\right)+2\xi\Omega\label{phidot},\\ \hat{\theta}&=&3\xi\Omega\;,\label{That}\\ \dot{{\cal A}}&=&-{\cal A}\theta\bra{\frac{1}{c_s^2}\frac{d^2p}{d\mu^2}(\mu+p)-c_s^2+\frac13}+3c_s^2\xi\Omega, \label{Adot} \end{eqnarray} where $c_s^2=\frac{\textrm{d} p}{\textrm{d} \mu}$. Note that these equations are obtained \emph{only} making use of the commutator relations, the conservation laws, \begin{eqnarray} \dot{\mu}+(\mu+p) \theta=0,\label{mudot}\\ \w{e}_\alpha (p)+ (\mu+p) \dot{u}_\alpha =0\ (\alpha=1,2,3),\label{gradp} \end{eqnarray} \emph{and} the $(a=3)$ component of $C_1$, the constraint equation (30) of \cite{Goswami_Ellis_grqc20021}: it is easy to verify that they are identically satisfied under the commutation relations and conservation laws, with (\ref{xidot}) as single exception. The latter in addition requires\footnote{this will be relevant for the construction of the counter example below} as extra information the (03) Einstein field equation, or, equivalently, the 3d component of constraint equation $C_1$. Using the above derivative equations the authors of \cite{Goswami_Ellis_grqc20021} show then in their Theorem 1 that for a rotating shear-free barotropic perfect fluid the flow lines and the vortex lines are 2-surface forming. This is correct and, in fact, one can use the commutator relation $[\w{e}_0,\, \w{e}_3]= \dot{u}_3 \w{e}_0-\smfrac{1}{3} \theta \w{e}_3$ to show that $[\lambda^3 \epsilon^{-1} \w{e}_0, \, \lambda^{-1} \w{e}_3]=0$, where $\lambda$ and $\epsilon$ are functions of the matter density defined by $ \lambda = \exp \int \frac{\textrm{d} \mu}{3(p+\mu)}$, $\epsilon=\mu+p$: coordinates $t,z$ therefore exist such that $\w{e}_0=\epsilon \lambda^{-3} \frac{\partial}{\partial t}$ and $\w{e}_3=\lambda \frac{\partial}{\partial z}$. Adding coordinates $x,y$ such that \begin{equation} \w{e}_{I} = \mathcal{A}_I \frac{\partial}{\partial t}+\mathcal{B}_I \frac{\partial}{\partial z}+\mathcal{C}_I \frac{\partial}{\partial x}+\mathcal{D}_I \frac{\partial}{\partial y}, \end{equation}} %\indent $I=(1,2)$, these 2-surfaces are then just the $(x=constant, y= constant)$ surfaces. \\ The crucial step of \cite{Goswami_Ellis_grqc20021} comes in Part 1 of Theorem 2, where an argument is presented which claims to guarantee a factorisation (101) of the vorticity scalar, \begin{equation} \Omega=\Omega_1\Omega_2\,\neq0, \,\delta^a\Omega_1=0,\,\dot\Omega_2= \hat\Omega_2=0. \label{Om12} \end{equation}} %\indent This is a remarkable claim, it being based on the use of the commutator relations, the conservation laws (\ref{mudot}, \ref{gradp}) and a single field equation only. It is even more remarkable, as this would solve the above mentioned "elusive case" with a single stroke of the pen: the existence of a non-constant function $\Omega_1=\Omega_1(t)$ \footnote{when a Killing vector along the vorticity exists, not only $\delta^a\Omega_1=0$ but also $\hat\Omega_1=0$} would immediately imply that $\w{u}$ is hypersurface-orthogonal, whereas for a constant $\Omega_1$, $\Omega$ would be \emph{basic} and hence $\theta$ would be 0 by (\ref{Omdot}). As we have been unable to convince the authors of their mistake, we proceed to present a counter-example. \section{Counter-example} Of course one cannot expect a counter-example to the conjecture itself, as then the whole issue would have been finished long ago. What we can do however, is construct an example illustrating the failure of the reasoning given in \cite{Goswami_Ellis_grqc20021}, by presenting an explicit space-time and a flow describing a shear-free barotropic perfect fluid for which all the equations (\ref{Omdot}-\ref{Adot}) are satisfied and where the fluid's energy-momentum tensor is also divergence-free, such that the conservation laws (\ref{mudot}, \ref{gradp}) hold. As the tricky point is to guarantee the validity of (\ref{xidot}), i.e.~of the $C_1$ constraint or the (03) field equation, we opt for an example in the "elusive situation" where the acceleration is orthogonal to the vorticity. In that case the hat-operator acting on all scalars is identically 0, implying ${\cal A}=\phi=\xi=0$ and we only have to take into account the dot-operators. As a toy-model we therefore take a space-time in which the orthonormal tetrad $\w{e}_0,\w{e}_1,\w{e}_2,\w{e}_3$ is defined by the dual basis, \begin{eqnarray} \omega^0 &=& \smfrac{1}{2}\mu^{-1/2} (\textrm{d} t – y \textrm{d} x),\\ \omega^1 &=& \mu^{-1/6} \textrm{d} x,\\ \omega^2 &=& \mu^{-1/6} \textrm{d} y,\\ \omega^3 &=& \mu^{-1/6} (\textrm{d} z – \textrm{d} x), \end{eqnarray} where $\mu=\mu(t,x,y)$ is arbitrary. Defining the velocity one-form to be $\omega^0$, it is an easy exercise to verify that the following "stiff fluid" energy momentum tensor, \begin{equation} T_{ab}= \mu ( 2 u_{a}u_{b}+ g_{ab}), \end{equation}} %\indent is divergence-free, while the fluid's kinematical scalars are given by \begin{eqnarray} \theta &=&- \mu^{-1/2} \mu_{,t},\\ \dot{\w{u}} &=& -\smfrac{1}{2}\mu^{-2/3}[(y\mu_{,t}+\mu_{,x}) (y \partial_t + \partial_x + \partial_z)+\mu_{,y}\partial_y],\\ \Omega &=& \smfrac{1}{2} \mu^{-1/6} \end{eqnarray} and satisfy the full set (\ref{Omdot}-\ref{Adot}). As $\Omega$ is clearly not factorizable for a general choice of the function $\mu$, this shows that at least \emph{some} extra argumentation will be needed --based on the full set of field equations and/or Bianchi equations-- in order to warrant the claim made in \cite{Goswami_Ellis_grqc20021}. \newpage {} \vspace{0.2in}
\section{Introduction} \label{sec: intro} Stars form surrounded by disks, the material from which planets form. Over the first Myr (or so) in the life of a disk, its solids are aggregated into planetesimals and protoplanets, and eventually into planets. The first step in this transformation may be hastened as disk solids collect in inhomogeneities---ring-like pressure bumps and other features---triggering processes such as the streaming instability, which create planetesimals. The planetesimals eventually grow into planets, which shape the disk gas and dust, producing rings, gaps, inner holes, and other structures. The concentration of solids in rings may spur further planetesimal (and planet) formation. After the disk gas dissipates, residual planetesimals ``left behind'' in the planet formation process may eventually reveal themselves, as they collide and produce disks of debris that glow in the reprocessed light from the central star. Some of the most dramatic evidence in support of this picture comes from the millimeter continuum morphologies of Class II (protoplanetary) disks, many of which show the substructure that forming planets are expected to induce. When imaged at millimeter wavelengths and in scattered light, large disks (radii $\gtrsim$ 25--30~au) show rings, gaps, central cavities, and other features at distances of 20--200 au from the star \citep[e.g.,][and references therein]{avenhaus2018,huang2018a, long2019,cieza2019}. While central cavities have been imaged for more than a decade \citep[e.g.,][]{andrews2010,andrews2015}, the realization that narrow rings and gaps are common features of disks at large radii is a discovery of the ALMA era \citep{alma2015}. Whereas disk central cavities are thought to be created by a high mass giant planet that orbits within the cavity, the narrow rings and gaps can be created by lower mass (approximately Neptune-mass) planets \citep[e.g.,][]{bae2018,lodato2019}. Emission associated with orbiting gas giant planets has also been detected in disks with central cavities through direct imaging techniques \citep{sallum2015,keppler2018,haffert2019, zurlo2021} and spectroastrometry \citep[e.g.,][]{brittain2019}. However, the lower mass ice giants thought to be responsible for narrow rings and gaps at large radial distances ($\gtrsim$ 25--30 au) remain beyond our ability to detect directly. Because gas and ice giants at such large orbital radii have no counterpart in the Solar System, these protoplanetary disk structures appear to point to an even greater diversity of planet formation outcomes than previously contemplated. Another valuable clue in support of this picture, that planetesimals---the hypothesized building blocks of planets---commonly form in protoplanetary disks, comes from debris disks, the dusty debris that is found around some post-T Tauri and main sequence stars. Best explained as the result of collisions between large parent bodies, and identified by their infrared and millimeter excesses, debris disks accompany stars over wide range of ages. At ages 10 Myr to beyond 1 Gyr, approximately 20\% to 25\% of FGK stars have detected cold excesses at $\sim 100$~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ \citep[e.g.,][]{carp2009a,bryden2009,eiroa2013,sibthorpe2018}, corresponding to debris at distances of $\gtrsim 40$ au. When imaged at high angular resolution, the debris also commonly shows substructure such as rings and gaps \citep[e.g.,][]{marino2018,hughes2018,marino2020, nederlander2021}. Here we explore the possible evolutionary connection between the rings and gaps observed in protoplanetary disks and those in debris disks. Given that both protoplanetary disks and debris disks show structured continuum emission in the form of rings and gaps over similar radial distances (20--200 au) around approximately solar-mass stars, it seems plausible that large protoplanetary disks evolve into the known cold debris disk population. We complement related work on this topic \citep[e.g.,][]{michel2021} using new models of the evolution of rings of solids on Myr to Gyr timescales. The new ring models contrast with earlier generations of models that explored extended disks of solids as the origin of debris disk emission \citep[e.g.,][]{kb2008,kb2010}. Using the new models, we examine how the efficiency of planetesimal formation affects not only the outcome of planet formation, but also its associated debris production. By comparing the model results to observations of debris disk populations, we explore the disk conditions (total initial mass of solids, planetesimal formation efficiency) that can reproduce the properties of debris disks (their incidence rate and luminosity) as a function of stellar age. We also use the comparison to explore questions such as whether cold debris disks feature in the evolutionary histories of all disks or only a special subset. In \S\ref{sec:diskobs}, we review observations that link protostellar disks to debris disks. After a brief review of planetesimal formation in \S\ref{sec:ringmodelback}, we set up a suite of numerical calculations in rings with populations of small and large solids (\S\ref{sec:ringmodelinit}) and describe the formation of planets (\S\ref{sec: ringmodelgrowth}), debris disks (\S\ref{sec: ringmodeldebris}), and gaps (\S\ref{sec: ringmodelgaps}). After discussing the calculations in the context of observations and other models (\S\ref{sec:discussion}), we conclude with a brief summary (\S\ref{sec: summary}). \section{Properties of Protoplanetary Disks and Debris Disks} \label{sec:diskobs} \subsection{Protoplanetary Disks} The millimeter continuum emission from large, bright protoplanetary disks (continuum sizes $\gtrsim 50$ au) is often highly structured. In deep, high angular resolution ALMA images of the brightest disks in nearby star-forming regions, the continuum emission typically arises from multiple concentric rings with radii of $\sim 10-150$ au, widths of a few au to tens of au, and dust masses of 10--70~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ \citep{alma2015, huang2018a,long2018,dullemond2018}. Within larger samples of protoplanetary disks that span a wider range in disk properties, including lower millimeter continuum flux, large resolved structures are less common. Of 147 disks in Ophiuchus studied by the ODISEA survey, the great majority have millimeter continuum emission restricted to radial distances $< 15$ au. Only $\sim 20$\% of the sources show continuum emission larger than 20 au in radius \citep[see Fig.\ 12 of][]{cieza2019}. In a sample of 32 disks in Taurus--Auriga that cover a broad range of continuum brightness, only a modest fraction of disks show large rings \citep{long2019}. Nine of the 27 sources studied with stellar masses $< 1.6\ifmmode {M_{\odot}}\else $M_{\odot}$\fi$ have rings with effective millimeter continuum sizes $> 40$ au; the remainder have more compact emission. To extrapolate the results of Long et al.\ (2018, 2019) and estimate the fraction of Taurus sources with large rings, we consider what is known about the entire Taurus disk population \citep[e.g.,][]{luhman2010,akeson2019}. We follow the rough selection criteria of \citet{long2019} and select the Taurus Class II sources with spectral types M3 or earlier and no companions at angular separations of 0\secpoint14--1\ifmmode ^{\prime \prime}\else $^{\prime \prime}$\fi. We also impose an upper stellar mass limit of $1.6\ifmmode {M_{\odot}}\else $M_{\odot}$\fi$ to mirror the upper mass stellar limit of the debris disk samples. With these criteria, there is a parent sample of 77 sources. The fraction with large rings in this sample is at least 9/77 = 12\%. The actual fraction is likely to be larger. Beyond the 32 disks studied by \citet{long2019}, 17 additional Taurus T Tauri stars were known to have ALMA observations at the time the Long et al.\ paper was written. Several of these sources have rings on large scales, e.g., AA~Tau \citep{loomis2017}, LkCa~15 \citep{facchini2020}, and DM~Tau \citep{hashimoto2021}. Others show smooth emission without rings, e.g., CW~Tau, CY~Tau, and DG~Tau \citep{simon2017,bacciotti2018}. At least one source is compact without large rings \citep[CX~Tau;][]{facchini2019}, and 5 other sources have binary companions within $1\ifmmode ^{\prime \prime}\else $^{\prime \prime}$\fi$ and would be excluded from our sample. The morphology of the remaining 5 sources is unknown (unpublished). As a result, of the 17 additional sources, 3 definitely have large rings; the remaining 5 sources of unknown morphology may also have large rings. If all of 8 of these sources do in fact have large rings, the fraction of Taurus Class II sources with large rings could be as high as 17/77 or $\sim 22$\%. The true fraction of disks with large rings is larger if other (as yet unobserved) sources among the parent sample of 77 sources also have rings. At the same time, a robust estimate of the fraction of young stars with large rings requires that we also account for the lack of rings among the population of (diskless) Class III sources with similar ages, stellar masses, and companion properties as the Class II sources. As a group, the Class III sources represent 25\% of all T Tauri stars in Taurus \citep[e.g.,][]{luhman2010, luhman2018,esplin2019}. Accounting for these diskless sources reduces the fraction of young stars with large rings by a factor of $\sim 3/4$. In summary, the fraction of young stars in Taurus with large rings is plausibly $\sim 17$\%, although with significant uncertainty (J.\ Bae and A.\ Isella, private communication). Further ALMA imaging of a larger sample is needed for a robust estimate. Taking a similar approach, van der Marel \& Mulders 2021 estimated a fraction of $\sim 16$\% of structured disks in a sample study of almost 700 disks in nearby star forming regions. Fig.~\ref{fig: extent} illustrates the range of sizes and widths of continuum emission rings observed in T Tauri disks (primarily from the DSHARP sample; Table 1 of Huang et al.\ 2018). In the left side of the diagram, the purple bars indicate the radial extent of bright rings; the blue bars indicate the rough radial extent of the dust continuum emission from the disk. The high angular resolution of the DSHARP observations (30--60 mas; equivalent to 5-8 au at the distance of the targets) probed structures at much smaller angular scales than was possible with the lower resolution, snapshot ALMA observations of Long et al.\ ($\sim 120$ mas or $\sim 16$ au). \begin{figure}[t] \begin{center} \includegraphics[width=5.0in]{fig1.pdf} \vskip -2ex \caption{ \label{fig: extent} Comparison of the observed positions of bright rings in the continuum emission from protoplanetary disks around T Tauri stars \citep[left side;][]{huang2018a} to bright rings within extended dusty debris disks surrounding FGK main sequence stars \citep[right side;][]{hughes2018}. For each vertical bar, light (dark) regions indicate the extent of the disk (rings). Disks around main sequence stars are ordered by age, from 12~Myr for star 24 (HD~146897) to 8.2~Gyr for star 48 ($\tau$~Cet). Colors denote the spectral type---F (green), G (gold), or K (orange)---of the central star. The vertical grey dashed line separates pre-main-sequence (PMS) from main sequence (MS) stars. The horizontal grey bands represent the two grids used in the numerical calculations described in section 3. } \end{center} \end{figure} \subsection{Debris Disks} Spatially resolved images of debris disks also show rings in scattered light and thermal emission \citep[e.g.,][]{hughes2018}. Fig.~\ref{fig: extent} shows the radial extents of debris disks (light-colored bars) and their rings (dark-colored bars), as measured by direct imaging \citep{hughes2018}. As shown in the Figure, much of the emission from debris arises from within $a = 10$--150 au of the star, similar to the orbital distances from which the millimeter continuum arises from protoplanetary disks. The fractional widths of the rings are typically $\Delta a/a = 0.1 - 0.6,$ with $\Delta a$ typically ranging from a few au to 30 au, overlapping the range of widths of protoplanetary disk rings. While fine substructure (i.e., narrow rings) is reported more commonly for protoplanetary disks than debris disks, only a few debris disks have been imaged with sufficient sensitivity and angular resolution to detect such substructure \citep[see discussion in][]{marino2020,nederlander2021}. Of the 6 sources studied to date at high sensitivity and angular resolution, 4 show gaps in their continuum emission, suggesting that finer substructure may be common among large debris disks, as in protoplanetary disks \footnote{The gaps are all located at $\sim 70$ au; these are HD~107146, HD~92945, HD~15115, HD~206893. The other two sources without reported gaps are beta Pic and AU Mic.}. Future ALMA imaging is needed to explore this possibility. \begin{figure}[t] \begin{center} \includegraphics[width=5.0in]{fig2.pdf} \vskip -8ex \caption{ \label{fig: excess} Relative disk luminosity for debris disks from {\it Spitzer} \citep[upper panel;][]{carp2009a,bryden2009} and {\it Herschel} \citep[lower panel;][]{eiroa2013,sibthorpe2018} observations. Large filled circles indicate detections; small symbols indicate upper limits for all sources ({\it Herschel}) or those with $d \le$ 80~pc ({\it Spitzer}). } \end{center} \end{figure} Surveys of varying sensitivities to dust temperature and fractional luminosity have reported detection rates of debris disk emission. As described in \citet{hillen2008}, the FEPS Survey used the {\it Spitzer Space Telescope} to carry out a census of cool dust surrounding 328 solar-type stars in the age range 3 Myr -- 3 Gyr located at distances of 10 pc -- 200 pc. Over the age range 30 Myr to 3 Gyr, $\sim 10$\% of solar-type stars show evidence for cold debris, with their rising spectral energy distributions toward 70~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ indicating dust temperatures of $\sim 45$--85 K for dust in equilibrium with the stellar radiation field. The detected excesses are bright at young ages, with fractional excess luminosities of $L_d/L_* \sim 10^{-3}-10^{-4}$ at 30 Myr, declining with increasing stellar age to $L_d/L_* \sim 10^{-4}$ at 3 Gyr. While FEPS focused on the excess properties of FGK stars younger than 3 Gyr, other {\it Spitzer} surveys investigated the excess properties of older stars. \citet{bryden2009} reported the excess properties of planet-bearing stars with spectral types F5--K5 that are known from radial velocity studies to harbor one or more planets; the majority of the stars are 4--10 Gyr old where, as in the case of most of the FEPS sources, the ages are based on chromospheric activity and the calibration of \citet{mamajek2008}. The excess properties of the sample are statistically indistinguishable from those of a comparison sample of comparable nearby stars (i.e., similar in spectral type and age) without known planetary companions. To illustrate the limits placed by these {\it Spitzer} results on possible evolutionary paths for disk solids, the upper panel of Fig.~\ref{fig: excess} shows detections (purple dots) and upper limits \citep[smaller gray dots;][]{carp2009a,bryden2009} as a function of stellar age. Protoplanetary disk sources in the FEPS sample are excluded. Only the FEPS sources within 80 pc are shown to highlight the value of the constraints placed by the upper limits on the nearby sample. The full FEPS sample spans a large range in distance (out to $\sim 150$ pc) and upper limits on the distant sources are weak. For the few sources in common between the FEPS and Bryden et al.\ samples (HD38529 and HD150706), we adopted the excess properties reported by FEPS. A few sources with unusually high flux uncertainties and upper limits were removed from the Bryden et al.\ sample (HD 4203, HD 46375, HD168746, and HD330075). To obtain the FEPS upper limits shown, we converted the 70 micron flux upper limits (typically $\sim 10$ mJy, 1-$\sigma$) to upper limits on $L_d/L_*$ assuming a typical ratio of $r= (L_d/L_*)/(F_d/F_*)= 10^{-5},$ a factor appropriate for the typical temperature of detected FIR excesses \citep[60 K;][]{hillen2008}; the conversion factor is insensitive to temperature in the range 40--80 K \citep[e.g., Figure 9 of][]{hillen2008}. Following \citep{carp2009a} for both the FEPS sources discussed here and the {\it Herschel} sources discussed below, the plotted upper limits in Fig.~\ref{fig: excess} of $L_d/L_* = r (F_d/F_* + 3\sigma),$ use the reported value of $F_d/F_*$ when its value is $> 0$ and 0 otherwise. The upper limits shown for the Bryden et al.\ survey are from their paper. Following the {\it Spitzer} studies, the DEBRIS and DUNES surveys searched for infrared excess emission at 100~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ and 160~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ with the {\it Herschel Space Observatory} \citep{eiroa2013,sibthorpe2018}. Both programs observed several sources at 70~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi; DUNES acquired additional data at 250--500~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi. The surveys targeted 275 (DEBRIS) and 133 (DUNES) unique FGK stars with distances within 25~pc \citep[DEBRIS;][]{sibthorpe2018} and 20--25~pc \citep[DUNES;][]{eiroa2013}. Stellar activity ages range from 1~Myr to 11~Gyr (100~Myr to 10~Gyr) for DEBRIS (DUNES), with median ages of $\sim$ 3~Gyr. The DEBRIS (DUNES) survey detected excess emission from debris disks around 47 (31) stars for a nominal detection rate of 17\% (23\%). In DEBRIS, the detection rate is similar across the age bins 0.1--1~Gyr, 1--3~Gyr, and 3--10~Gyr. Corrected for incompleteness, the incidence rate for FGK stars is $\sim$ 28\%. For DUNES, the volume-limited detection rate is $\sim$ 20\% and is independent of spectral type for FGK stars \citep[see also][]{montesinos2016}. For the combined set of DEBRIS and DUNES detections, the median \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ is roughly an order of magnitude smaller than the median dust luminosity of the {\it Spitzer} detections. For both {\it Herschel} programs, blackbody dust temperatures have a broad range, 16--300~K for DEBRIS and 20--100~K for DUNES; the median dust temperatures are 48~K (DUNES) and 63~K (DEBRIS). Inferred radii for the dust are 1--300~au with a median $\sim$ 20~au for DEBRIS and 7--200~au with a median of $\sim$ 30~au for DUNES. Assuming realistic dust properties would place the emission at larger radii. The lower panel of Fig.~\ref{fig: excess} shows the {\it Herschel} detections (green dots) and upper limits (smaller gray dots) for the 43 sources with FGK spectral types (effective temperatures of 4000--7200 K) and ages as estimated from stellar activity \citep[e.g.,][]{vican2012}. To translate flux detection upper limits to $L_d/L_*$, the reported 3-$\sigma$ upper limit on $F_d/F_*$ at 100~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ was converted to $L_d/L_*$ assuming a ratio $r = (L_d/L_*)/(F_d/F_*) \simeq 10^{-5.4},$ the value appropriate for an excess at 100~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ that has a temperature of $\sim 55$ K, the median temperature of detected excesses. The actual adopted value of $r$ is appropriate for the stellar temperature of each source. \begin{figure}[t] \begin{center} \includegraphics[width=5.0in]{fig3.pdf} \vskip -2ex \caption{ \label{fig: alldata} Relative disk luminosity for the full sample of debris disks summarized in the text. Filled circles indicate detections from \citet[][cyan]{matra2018}, {\it Spitzer} (purple, Fig.~\ref{fig: excess}, upper panel), and {\it Herschel} (green, Fig.~\ref{fig: excess}, lower panel). Grey symbols indicate the median of upper limits in 0.1 intervals of log stellar age from FEPS (age $\le$ 100~Myr) or {\it Herschel} (age $\ge$ 100~Myr) data. } \end{center} \end{figure} To illustrate a larger range of excess properties observed among debris disks, Fig.~\ref{fig: alldata} supplements the {\it Spitzer} and {\it Herschel} detections (purple and green dots, respectively) with those from \citet{matra2018}, which compiles properties of (bright) debris disks that have been spatially resolved at millimeter wavelengths. Sources with FGK spectral types not included in the {\it Spitzer} \citep{carp2009a, bryden2009} and {\it Herschel} \citep{eiroa2013,sibthorpe2018} samples are shown. The grey arrows show the median upper limits from FEPS at ages $\le 100$ Myr and from {\it Herschel} at ages $\ge 100$ Myr in 0.1 intervals of log stellar age. Limits on \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ for younger stars with ages $\lesssim$ 4--5~Myr are rare. \citet{lovell2021} detected one source with cold debris in an ALMA survey of 6 class III T Tauri stars that are likely members of the 1-3 Myr Lupus association; the other sources in the \citet{lovell2021} study are likely to be members of the Sco-Cen Association \citep{michel2021}. Future observations of class III T Tauri stars in other star-forming regions would improve links between class II sources with $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \gtrsim 3 \times 10^{-2}$ \citep[e.g.,][]{michel2021} and debris disks with $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \lesssim 10^{-2}$. Finally, parallax data from the {\it Gaia} satellite have revolutionized our knowledge of nearby moving groups of young stars \citep[e.g.,][]{faherty2018,gagne2018,gagne2020,ujjwal2020}, leading to new membership catalogs that allow better probes of the frequency of cold debris disks in the 20--150~Myr age range where the {\it Spitzer} and {\it Herschel} surveys have poor statistics. Among the $\sim 10$ F stars within the 20--25~Myr old $\beta$ Pic moving group, 50\% (75\%) have dusty material at $a \gtrsim$ 40~au \citep[$a \gtrsim$ 1~au;][]{pawellek2021}. For F stars in older moving groups (20 stars in the Tucana/Horologium association and the Columba and Carina groups), the cold debris disk frequency declines to $\sim$ 30\% at 45~Myr and $\sim$ 15\% at 150~Myr\footnote{At 45~Myr (150~Myr), 6 of 20 (1 of 7) stars in these samples have blackbody radii larger than 10~au.}. However, few of the new 45--150~Myr old debris disks have $a \gtrsim$ 30~au. With $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \approx 2 \times 10^{-4}$ to $2 \times 10^{-3}$, the cold debris disks in the $\beta$ Pic moving group have dust luminosities similar to the \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ of stars with ages of 10--40~Myr in Fig.~\ref{fig: alldata}. The new systems with ages of 40--50~Myr from other moving groups have lower dust luminosities, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi $\approx 2 \times 10^{-5}$ to $10^{-4}$, which roughly coincides with the FEPS upper limits in Fig.~\ref{fig: excess}. These data thus follow the observed trend of decreasing \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ with stellar age. Continued analysis of cold debris in 30--100~Myr old stars would provide essential connections between the younger more luminous debris disks and those much older than 100~Myr. To summarize, debris disk detections fall along a broad swath in $L_d/L_*$ and decline with time (Fig.~\ref{fig: alldata}). The most stringent upper limits in $L_d/L_*$ are $\lesssim 10^{-5}$ at ages of 0.1--10 Gyr (from the {\it Herschel} surveys), and $\sim 10^{-4}$ at 10--100 Myr (from FEPS). Current data suggest the frequency of cold debris disks is roughly constant at $\sim$ 25\% for stellar ages of $\sim$ 50~Myr to 10~Gyr. Within the much younger $\beta$ Pic moving group ($\sim$ 20--25~Myr), the frequency may be higher, $\sim$ 50\%, based on the study of a small sample of stars. As discussed below, future observations that lead to greater certainty in the debris disk frequency and \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ for stars with ages of 20--150~Myr will bear on the variety of ways in which protoplanetary disks evolve into debris disks (Section 4). \section{Evolution of Rings of Solids} \label{sec:ringmodel} To understand whether the rings of solids observed at $a \approx$ 20--200 au in young stars could plausibly evolve into the rings of debris detected at similar $a$ in much older stars, we perform a suite of multiannulus coagulation calculations. For the geometry of the rings, we rely on the observed properties outlined in \S\ref{sec:diskobs}. In previous calculations, \citet{kb2008,kb2010} considered the evolution of swarms of 1--100~km planetesimals in disks extending from 30--150~au. These calculations matched the time evolution of available data for \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ rather well. However, for disks with the largest \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi, the models predict that dust is produced at increasingly large distances from the central star at late times. This trend is not observed among known debris disks \citep[e.g.,][see also Fig.~\ref{fig: extent}]{najita2005,kennedy2010,matthews2014,hughes2018}. Moreover, theory currently favors scenarios where planets grow in seas of small and large solids (see below). Together, these observational and theoretical developments motivate an updated set of models of debris production. To support our choices for the initial mix of pebbles and planetesimals, we briefly review recent theoretical results. Following this summary, we outline the numerical procedures and then describe results of new calculations. \subsection{Background} \label{sec:ringmodelback} In the core accretion model, planet formation is a three-step process. Within a circumstellar disk of gas and dust, micron-sized dust grains grow into cm-sized pebbles then km-sized or larger planetesimals then planets. Within each step, various uncertainties in the initial conditions, the physical properties of the gas and solids, and the important chemical and physical processes prevent a robust understanding of the path from grains to planets. For this discussion, we summarize the current picture of planet formation, highlighting several areas of significant uncertainty that we explore in our models. Initially, the gas and dust are well-mixed \citep[e.g.,][]{chiang2010, youdin2010,youdin2013,liu2020}. As the disk evolves, small grains collide slowly, stick together, and grow into larger and larger aggregates \citep[e.g.,][]{dominik1997,wurm1998,blum2008,birnstiel2016,nimmo2018}. As growth proceeds, collisions compactify particles significantly \citep[e.g.,][]{weidling2009}. Particles with larger filling factors are less well-coupled to the gas. When grains uncouple from the gas, they settle to the midplane and collide at higher velocities. Interactions between particles become more elastic, which limits additional growth \citep[e.g.,][]{zsom2010, kelling2014,kruss2017}. Detailed studies suggest that particles experience a `bouncing barrier' at sizes $\sim$ 1--10~cm beyond which agglomeration effectively ceases \citep[see also][]{brauer2008, windmark2012,grundlach2015,kruss2020,teiser2021}. Although the presence of charged or organic grains may circumvent the bouncing barrier \citep[e.g.,][]{homma2019,steinpilz2019}, recent analyses have concentrated on the `streaming instability' as a way to generate km-sized or larger planetesimals from ensembles of cm-sized `pebbles' \citep{youdin2005}. In this mechanism, aerodynamic drag concentrates pebbles into clumps with large overdensities compared to the typical solid-to-gas ratio throughout the disk \citep[e.g.,][]{johansen2007a, johansen2007b,johansen2009}. Continued concentration of pebbles within the clumps enables the formation of planetesimals with radii $r \approx$ 100--1000~km \citep[e.g.,][]{birnstiel2016,simon2016, schafer2017,yang2017,li2018,sekiya2018,lenz2019,lei2019,li2019, chen2020,umurhan2020,pan2020,gerbig2020,squire2020}. In recent numerical studies of the streaming instability, the size distribution of the largest planetesimals and the efficiency of planetesimal formation depend on the physical conditions of the gaseous disk and the size distribution of pebbles \citep[e.g.,][]{simon2016,li2018,abod2019,carrera2020,klahr2020, gole2020,rucska2021}. Large solid-to-gas ratios generated by radial drift and low turbulence ($\alpha \lesssim 10^{-4}$) favor efficient concentration of mono-disperse (i.e., single-sized) sets of pebbles into much larger solids. High turbulence ($\alpha \gtrsim10^{-3}$), smaller solid-to-gas ratios, and broader size distributions of pebbles appear to limit the ability of the streaming instability to form large planetesimals \citep[however, see also][]{mcnally2021}. Among calculations with identical starting conditions, local fluctuations in these and other physical conditions within the disk lead to variations in the maximum size \ifmmode r_{max}\else $r_{max}$\fi\ of a planetesimal and the fraction $f$ of the initial solid mass in pebbles that is concentrated into massive planetesimals. Among other options for planetesimal formation, such as turbulent clustering \citep[e.g.,][]{cuzzi2008,pan2011,hartlep2020} and the settling instability \citep{squire2018}, outcomes for $f$ and \ifmmode r_{max}\else $r_{max}$\fi\ are also uncertain. For any instability mechanism, local chemistry, radial diffusion, and sublimation modify the growth of pebbles and the concentration of pebbles into planetesimals \citep[e.g.,][]{ida2016, hyodo2019}. Prior to the onset of instability, the porosity and compactness of pebbles are also uncertain \citep[e.g.,][]{okuzumi2012, kataoka2013} Once planetesimals form, the path to protoplanets is more certain. In systems with $f \approx$ 1 (completely efficient planetesimal formation), the growth of massive protoplanets may be too slow to form super-Earth mass and larger planets during the likely lifetime of the gaseous disk \citep[e.g.,][]{kb2008,liss2009,kb2009,kb2010,koba2010b, levison2010,dangelo2014,mordasini2015,boden2018,dangelo2021}. From analytical considerations, \citet{gold2004} and \citet{raf2005} demonstrated that a few large planetesimals in a sea of pebbles grow rapidly due to the small scale height of the pebbles. Subsequent numerical calculations of `pebble accretion' yield 10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and larger ice giants on time scales of a few Myr \citep{kb2009,bk2011a,lamb2012}. More recent studies with $\ifmmode r_{max}\else $r_{max}$\fi \gtrsim$ 100~km and $f \lesssim10^{-2}$ illustrate the ability of pebble accretion to form ice and gas giants in many circumstances on short time scales \citep[e.g.,][]{matsumura2017, alibert2018,lin2018,bitsch2019,johansen2019,lambrechts2019,morbidelli2020, voelkel2020,klahr2020,chambers2021}. In contrast to the many studies of giant planet formation via pebble accretion, there have been few attempts to investigate the long-term evolution of the debris signatures produced by growing protoplanets in a sea of pebbles. Formation scenarios for a planet nine at $a \gtrsim$ 200~au in the Solar System illustrate how systems with an initial \ifmmode r_{max}\else $r_{max}$\fi\ = 100~km and various $f$ generate super-Earth mass planets and very luminous debris disks at 200--750~au around solar-type stars on time scales of 0.1--1~Gyr \citep{kb2015a,kb2016b}. The debris disks in some model systems have properties similar to those observed in the bright debris disks orbiting HD~107146, HD~202628, and HD~207129 \citep{corder2009,krist2010,krist2012,marshall2011,ricci2015,marino2018}. In the next sections, we consider whether swarms of pebbles and planetesimals can produce debris disks similar to those in the {\it Herschel} and {\it Spitzer} samples described in section 2. \subsection{Initial Conditions}\label{sec:ringmodelinit} To follow the evolution of pebbles and planetesimals in a ring, we use the multiannulus coagulation routine within {\it Orchestra}, an ensemble of codes for planet formation. As outlined in the Appendix, the code uses a particle-in-a-box algorithm for collision rates and energy scaling for collision outcomes. Particles evolve dynamically with Fokker-Planck routines. To avoid the extra free parameters associated with the gaseous component of the ring, we ignore radial drift and circularization of solids by the gas. \citet{kb2008,kb2010,kb2012} describe the formulation and procedures in more detail. For this study, we perform calculations in two separate grids, each with 28 concentric annuli. With an inner radius of 36~au (60~au) and an outer radius of 54~au (90~au), the grids cover a reasonable subset of the rings observed in protoplanetary and debris disks (Fig.~\ref{fig: extent}). Within each annulus, particles occupy distinct mass bins with sizes ranging from 1~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi\ to $10^5$~km, orbital eccentricity $e$, and inclination $\imath$. Initially, solids have sizes of 1~cm (residual pebbles) and 100~km (planetesimals produced by the streaming instability), eccentricity $e_0 = 10^{-3}$, and inclination $\imath_0 = e/2$. These parameters are appropriate for solids recently liberated from a protostellar disk with turbulence parameter $\alpha \sim 10^{-3}$. Solids initially have a total mass \ifmmode M_{0}\else $M_{0}$\fi, a surface density distribution $\Sigma(a)$, and a fraction $f$ of mass in large planetesimals (see section 3.1). To select these parameters, we rely on the observational constraints described above and shown schematically in Fig.~\ref{fig: schema}. Among class II sources with ages $\sim$ 1~Myr, roughly a quarter have a compact disk with an outer radius of $\sim$ 30~au and bright rings of solids at larger distances (Fig.~\ref{fig: schema}, top left; see also Fig.~\ref{fig: extent}). The rings are well-fit with gaussian distributions of pebbles having total masses $\sim$ 10--60~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and dispersions $\sigma \approx$ 4--8~au \citep{dullemond2018}. To span this range, we adopt upper limits of \ifmmode M_{0}\else $M_{0}$\fi\ = 10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 45~au and \ifmmode M_{0}\else $M_{0}$\fi\ = 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 75~au. For $\Sigma(a)$, we adopt a fixed ratio $\sigma / a$ = 1/15; solids then have a gaussian $\Sigma(a)$ centered at 45~au (75~au) with $\sigma$ = 3~au (5~au). Defining $P$ as the orbital period around the central star, the maximum \ifmmode M_{0}\else $M_{0}$\fi\ and the gaussian $\Sigma(a)$ yield a similar ratio for $P / \Sigma$ at 45~au and 75~au and therefore similar time scales for the growth of planets \citep[e.g.,][]{liss1987}. \begin{figure}[t] \begin{center} \includegraphics[width=5.0in]{fig4.pdf} \vskip -2ex \caption{ \label{fig: schema} Schematic architectures for protoplanetary disks (left diagrams) and older main sequence stars (right diagrams). Each illustration includes the approximate percentage of stars with the sketched architecture. On the left, light purple filled circles indicate compact gaseous disks; dashed circles show possible locations of dense rings within the disk. Outside the compact disks, solid (dotted) circles illustrate locations of dense (invisble) rings of solids. On the right, the gold bands in the upper diagram mark the location of a debris disk. } \end{center} \end{figure} In the majority of class II sources with compact disks and no bright rings (Fig.~\ref{fig: schema}, bottom left), the lack of millimeter emission at large radii is consistent with the solids outside the compact disk having either (i) low mass if composed primarily of pebbles or (ii) higher mass if composed primarily of large planetesimals. These possibilities motivate a broad range in \ifmmode M_{0}\else $M_{0}$\fi (from 0.01~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ to the adopted upper limits) and $f$ (0--1). \footnote{The lower mass limit is somewhat smaller than current mass estimates for the Kuiper belt \citep[0.02--0.06~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi;][]{pitjeva2018, diruscio2020}, which has a dust luminosity well below {\it Herschel} sensitivity limits \citep[e.g.,][]{backman1995,vitense2012}.} A plausible third option for the lack of millimeter emission in these sources is a small vertical scale height which prevents solids from intercepting a detectable fraction of light from the central star. For the calculations reported here, we do not consider this possibility but return to it in the discussion. The observed properties of debris disks also motivate a range in \ifmmode M_{0}\else $M_{0}$\fi\ and $f$. Among solar-mass stars with ages of $\sim$ 1~Gyr, roughly 25\% have bright rings of cold debris at $a \gtrsim$ 40~au (Fig.~\ref{fig: schema}, top right). In the remaining 75\%, cold debris is absent or undetectable (Fig.~\ref{fig: schema}, bottom right). The goal of the calculations is to identify the initial conditions and evolutionary paths that connect the protoplanetary disks (left) to the debris disks (right), while satisfying the constraints on the incidence rates and dust luminosities of known debris disks as a function of stellar age (e.g., Fig.~\ref{fig: extent} and Fig.~\ref{fig: alldata}). One simple hypothesis we explore is whether the massive rings of protoplanetary solids (upper left of Fig.~\ref{fig: schema}) evolve into rings of debris at similar distances at Gyr ages (upper right of Fig.~\ref{fig: schema}). Other evolutionary scenarios are also plausible. If some of the 75\% of class II sources that appear as compact disks at millimeter wavelengths possess substantial rings of solids that are invisible at millimeter wavelengths as a result of their lower mass or lack of pebbles, these may evolve into bright debris disks at late times \citep[e.g.,][and references therein]{wyatt2008,kb2010, matthews2014,krivov2021}. To explore the evolution of these systems, we also follow the evolution of low mass rings of pebbles and more massive rings composed of large planetesimals. Based on these considerations, we consider initial masses \ifmmode M_{0}\else $M_{0}$\fi\ = 0.01--45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ for eight values of $f$ between 0 and 1. As summarized in Appendix Tables~\ref{tab: tab1} and \ref{tab: tab2}, some combinations of \ifmmode M_{0}\else $M_{0}$\fi\ and $f$ are not physically realizable in a ring with pebbles and large planetesimals. For example, with \ifmmode M_{0}\else $M_{0}$\fi\ = 0.01~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f = 10^{-3}$), the mass in a single 100~km planetesimal exceeds $\ifmmode M_{0}\else $M_{0}$\fi \times f$, the total mass allocated for all larger bodies. In identifying the relevant evolutionary path (or combination of paths) for protoplanetary and debris disks, we aim to ensure continuity between the starting and ending points outlined in Fig.~\ref{fig: schema}. That is, if young stars simply move horizontally in Fig.~\ref{fig: schema}, from bright rings at 1~Myr to bright rings at 1~Gyr {\it and} from compact disks into diskless main sequence stars, we are guaranteed to match the observed fraction of debris disks at every epoch from $\sim$ 50~Myr to 10~Gyr. However, if some sources with compact disks and invisible rings of solids at 1~Myr evolve into observable debris disks at 1~Gyr, then a similar fraction of class II sources with bright rings must evolve into diskless main sequence stars. In this case, we need to ensure that the fraction of class II sources that evolve diagonally upward in the figure matches the fraction that evolve diagonally downward. If the high fraction of cold debris disks in the $\beta$ Pic moving group is typical of all 20--25~Myr-old stars \citep[50\%;][]{pawellek2021}, then a large fraction of class II sources without bright rings need to evolve into bright debris disks at 20--25~Myr and then fade below current detection limits for stellar ages of 50--100~Myr. An additional goal of this study is to understand the physical properties of protoplanetary disks that lead to this type of evolution. The following sections describe the growth of the largest objects (\S\ref{sec: ringmodelgrowth}), the evolution of the dust luminosity from collisional debris (\S\ref{sec: ringmodeldebris}), and the impact of the largest objects on the radial distribution of the debris and gap formation (\S\ref{sec: ringmodelgaps}). \subsection{Growth of Planets} \label{sec: ringmodelgrowth} As each calculation proceeds, pebbles and planetesimals collide and merge into larger objects. Along with mergers, debris from collisions deposits mass into other mass bins. At first, the low initial $e$ and $\imath$ limits collisions between particles within different annuli. Evolution of $e$ and $\imath$ allows more interactions among all particles; these interactions disperse collision debris throughout the grid. Most collisions yield some debris with particle sizes smaller than 1~\ifmmode {\rm \,\mu {\rm m}}\else $\rm \,\mu {\rm m}$\fi. This material is assumed ejected by radiation pressure from the central star. Over 10~Gyr of evolution, the amount of lost material ranges from less than 1\% to more than 90\% (see Appendix Tables~\ref{tab: tab1} and \ref{tab: tab2}). Ejected solids do not interact with other solids in the grid. To set some expectations for the calculations, we estimate the time scale for the growth of planets in rings at 45~au and 75~au. In \citet{kb2010}, 100~km planetesimals grow into Pluto-mass planets on a time scale $t_{1k} \sim$ 10~Gyr at 80~au in a disk with the solid surface density distribution of a minimum mass solar nebula. In these calculations, $t_{1k} \propto P / \Sigma$, where $P$ is the orbital period and $\Sigma$ is the initial surface density \citep[see also][]{liss1987,gold2004,raf2005,kb2008}. Scaling these results to 45~au and 75~au, \begin{equation} \label{eq: t1kp} t_{1k} \approx 2~{\rm Gyr} \left ( \frac{M_{ref}}{M_0} \right ) \\ \end{equation} where $f$ = 1 and $M_{ref}$ = 10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) is the mass contained in rings at 45~au (75~au). When $f < 1$, analytical estimates suggest $t_{1k} \propto f^n$, with $n \approx$ 0.5--1.0 \citep{gold2004, raf2005}. The calculations here provide good tests of these estimates, as discussed in the Appendix. \begin{figure}[t] \begin{center} \includegraphics[width=5.5in]{fig5.pdf} \vskip -2ex \caption{ \label{fig: mass0} Time evolution of the mass of the largest object in rings of solids with initial $f$ = 0 and the values for $a_0$ and $M_0$ indicated in the legend. Dashed horizontal lines indicate the mass of Pluto (lower), Mars (middle), and Earth (upper). At 45--75~au, massive rings of solids produce super-Earths in 1~Myr (\ifmmode M_{0}\else $M_{0}$\fi\ = 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 75~au, thick purple curve), Mars mass planets in 10--100~Myr (\ifmmode M_{0}\else $M_{0}$\fi\ = 5--10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 45--75~au, thin purple and thick dark green curves), and Plutos in 100~Myr to 1~Gyr (\ifmmode M_{0}\else $M_{0}$\fi\ = 0.01--0.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 45--75~au, light green and orange curves). } \end{center} \end{figure} In the full set of calculations, outcomes are sensitive to \ifmmode M_{0}\else $M_{0}$\fi\ and $f$. Systems with more mass in solids tend to evolve more rapidly and form the largest planets and the brightest debris disks. For fixed initial mass, rings with more of their initial mass in planetesimals evolve more slowly. When $f$ is large, planetesimals compete for pebbles. As the initial population of pebbles declines, growth depends on infrequent planetesimal--planetesimal collisions and the evolution stalls. When $f$ is small, planetesimals do not compete for pebbles; growth is then rapid. Fig.~\ref{fig: mass0} illustrates the growth of the largest object in systems with $f$ = 0. At the start of each calculation, gravitational focusing is negligible; pebbles grow roughly linearly with time. Slow pebble growth allows collisional damping to reduce $e$ and $\imath$ by an order of magnitude. As the largest particles approach km sizes, collision velocities remain low despite increased dynamical friction and viscous stirring by the largest objects. Larger gravitational focusing factors initiate an explosive phase of runaway growth, where planetesimals with maximum radii $\ifmmode r_{max}\else $r_{max}$\fi\ \sim$ 1~km rapidly reach much larger sizes, $\ifmmode r_{max}\else $r_{max}$\fi\ \gtrsim$ 1000~km. After the runaway, a few protoplanets continue to accrete more and more material from the smaller objects and to stir up the velocities of the leftovers. At first, collisional damping among the pebbles counters stirring by protoplanets. Eventually, stirring overcomes damping and initiates a collisional cascade, where km-sized and smaller objects are ground into smaller and smaller particles. The cascade robs protoplanets of remaining small solids; growth ceases. Aside from the time scale and the final mass, the evolution of the mass of the largest protoplanet is amazingly independent of $a$ and \ifmmode M_{0}\else $M_{0}$\fi. All of the curves in Fig.~\ref{fig: mass0} have the same linear phase for $M \lesssim 10^{12}$~g followed by a nearly vertical rise to a maximum planet mass that scales with \ifmmode M_{0}\else $M_{0}$\fi. During runaway growth, planets accrete nearly all of the mass in their annulus (and sometimes in adjacent annuli). With more mass in protoplanets than pebbles, stirring reduces gravitational focusing factors. The evolution is then oligarchic, where the largest protoplanets slowly accumulate leftover pebbles \citep[e.g.,][]{kok1998,ormel2010c}. Once pebbles are exhausted, growth ceases. In the most massive rings, Earth mass planets form in 3--10~Myr. When \ifmmode M_{0}\else $M_{0}$\fi\ is smaller, growth takes longer and results in lower mass protoplanets. In the lowest mass rings we consider, Pluto mass planets form on Gyr or longer time scales. The progression of longer time scales to produce lower mass planets when \ifmmode M_{0}\else $M_{0}$\fi\ is small is characteristic of coagulation calculations (eq.~\ref{eq: t1kp}). \begin{figure}[t] \begin{center} \includegraphics[width=5.5in]{fig6.pdf} \vskip -2ex \caption{ \label{fig: mass1} As in Fig.~\ref{fig: mass0} for calculations at 45~au (lower panel) and at 75~au (top panel) with various \ifmmode M_{0}\else $M_{0}$\fi\ and $f$. The legend in the upper left of each panel indicates a pair of \ifmmode M_{0}\else $M_{0}$\fi\ for thick (first \ifmmode M_{0}\else $M_{0}$\fi) and thin (second \ifmmode M_{0}\else $M_{0}$\fi) lines and the value of $f$ for each curve. Dashed horizontal lines indicate the masses of Pluto (lower), Mars (middle), and Earth (upper). Runaway growth is more dramatic in rings with small $f$. At 75~au, massive rings with small $f$ produce super-Earths in 20--30~Myr (thick orange curve). Rings with smaller $f$ generate Mars-mass planets on much longer times scales, 1--10~Gyr (thick purple, thick green, and thin green curves) At 45~au, rings with \ifmmode M_{0}\else $M_{0}$\fi\ = 3--10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f \approx 10^{-1} - 10^{-4}$ produce Mars mass planets in 20--100~Myr. Models with $f \approx$ 0.3--1.0 yield Plutos to Mars-mass planets in 1--10~Gyr.. } \end{center} \end{figure} When $f > 0$, the final planet mass correlates well with \ifmmode M_{0}\else $M_{0}$\fi\ and $f$. At 75~au (Fig.~\ref{fig: mass1}, upper panel), rings with $f \approx 10^{-2} -10^{-5}$ have a similar explosive growth phase as systems with $f$ = 0. Initially, 100~km planetesimals slowly accrete pebbles and the occasional planetesimal. Once their masses exceed $10^{23} - 10^{24}$~g, the runaway quickly carries them to super-Earth (\ifmmode M_{0}\else $M_{0}$\fi\ = 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, thick orange curve) to super-Mars (\ifmmode M_{0}\else $M_{0}$\fi\ = 15~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, thin orange curve) masses. Unlike the systems in Fig.~\ref{fig: mass0}, the lack of solids with masses intermediate between planetesimals and pebbles allows protoplanets to accrete a large fraction of the mass in their respective annuli. Oligarchic growth is limited. Protoplanets maintain roughly constant masses for the rest of the calculation. As the initial mass in pebbles drops, protoplanets grow more slowly and just manage to reach the mass of Mars (Fig.~\ref{fig: mass1}, green and purple curves in the upper panel). Systems with $f \approx$ 0.5 produce many Pluto-mass planets in 10--100~Myr. Continued accretion of pebbles and leftover planetesimals during an extended oligarchic growth phase enables protoplanets to match the mass of Mars. When $f \approx$ 1, it takes 1--3~Gyr for several protoplanets to exceed the mass of Pluto. This time scale is close to the estimate derived from scaling previous calculations in 30--150~au disks of solids (eq.~\ref{eq: t1kp}). Oligarchic growth eventually carries some of these to the mass of Mars. At 45~au, the behavior of rings with 3--10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f = 10^{-5}$ to $f$ = 1 closely follows the evolution at 75~au (Fig.~\ref{fig: mass1}, lower panel). Although time scales are similar, the lower mass rings at 45~au prevent planets from reaching the same masses as the higher mass rings at 75~au. Thus, Mars-mass (Earth-mass) planets form in 3--10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (15--45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) rings at 45~au (75~au) in 30--100~Myr when $f \approx 10^{-4}$--0.1, For $f$ = 0.5, time scales to reach Pluto-mass planets at 45~au are somewhat longer than at 75~au; Mars-mass planets take much longer, $\sim$ 3--10~Gyr (green curves). Calculations with $f$ = 1 (purple curves) yield a few Mars-mass planets only at the highest mass considered; lower mass systems manage to form planets with 3--5 $\ifmmode M_P\else $M_P$\fi$ (Pluto masses). When rings have less mass than the examples in Fig.~\ref{fig: mass1}, lower-mass planets form on longer time scales (Fig.~\ref{fig: mass2}). At 45~au (lower panel), rings with \ifmmode M_{0}\else $M_{0}$\fi\ = 1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (0.3~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) and $0 < f < 1$ produce Pluto-mass planets on time scales of 100~Myr to 1~Gyr (green and orange curves). After 10~Gyr, the planets in these systems have masses of 2--10~\ifmmode M_P\else $M_P$\fi. Growth is negligible when $f$ = 1 (purple curves); maximum masses are $\sim$ 0.1~\ifmmode M_P\else $M_P$\fi. The more massive systems at 75~au easily generate Mars mass planets in 300~Myr to 1~Gyr when $f$ is very small (Fig.~\ref{fig: mass2}, upper panel, orange curves). In each of these systems, planetesimals accrete nearly all of the available pebbles during runaway growth and then maintain a roughly constant mass for the rest of the calculation. As $f$ increases, growth slows; the mass of the largest planets drops by several orders of magnitude (green and purple curves). When $f$ = 0.5, Pluto mass planets form on 1--10~Gyr time scales. Very efficient planetesimal formation ($f$ = 1) leads to the growth of Pluto mass planets at late times when \ifmmode M_{0}\else $M_{0}$\fi\ = 5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi; in lower mass rings, large planets fail to form after 10~Gyr. \begin{figure}[t] \begin{center} \includegraphics[width=5.5in]{fig7.pdf} \vskip -2ex \caption{ \label{fig: mass2} Growth of the largest objects in medium mass rings of solids at 45~au (lower panel) and at 75~au (upper panel). The legend associates \ifmmode M_{0}\else $M_{0}$\fi\ and $f$ for each curve. Numbers in parentheses indicate initial mass in \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ for thick (first number) and thin (second number) lines. Horizontal dashed lines indicate the mass of Pluto (lower) and Mars (upper). The final mass of the largest object and the time scale to reach this mass scale inversely with \ifmmode M_{0}\else $M_{0}$\fi: lower mass rings produce lower mass planets. } \end{center} \end{figure} Very low mass rings produce much smaller planets. Mixes of solids and pebbles with \ifmmode M_{0}\else $M_{0}$\fi\ = 0.01--0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ in rings at 45~au struggle to make a single Pluto. For any $f \ne$ 1, the \ifmmode M_{0}\else $M_{0}$\fi\ = 0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ models have a modest runaway that converts 200~km planetesimals into 900~km dwarf planets. Rings with a factor of three (ten) less mass produce several Charon-mass objects (Kuiper belt objects) with radii of 500~km (250~km). Rings with no pebbles barely evolve over 10~Gyr. At 75~au, the lowest mass rings in our study show a little more activity. Models with \ifmmode M_{0}\else $M_{0}$\fi\ = 0.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f \lesssim$ 0.1 begin a robust runaway at 1~Gyr. After 3~Gyr, these rings have a modest set of dwarf planets with masses 5--10 times the mass of Pluto. When $f \approx$ 0.5, the delay in the runaway to 3--6~Gyr fails to produce a Pluto-mass dwarf planet, but generates a few Charon-mass objects. As \ifmmode M_{0}\else $M_{0}$\fi\ drops to 0.01--0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, growth is modest, yielding a few 200--300~km objects in 0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ rings and many 150~km planetesimals in 0.01~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ rings. Once again, systems with $f$ = 1 barely evolve over the age of the universe. To collate some results from the calculations in a convenient form, Tables~\ref{tab: tab1}--\ref{tab: tab2} in the Appendix list the time scale to form at least one Pluto-mass planet, $t_{1k}$; the maximum radius \ifmmode r_{max}\else $r_{max}$\fi\ of the largest planet at 10~Gyr, the final mass in solids $M_f$ at the end of each calculation, and other useful parameters. In addition to examining the relation between $t_{1k}$, \ifmmode M_{0}\else $M_{0}$\fi, and $f$, the discussion in the Appendix includes several examples of collisional damping and some comparisons with previous calculations. \subsection{Evolution of Dust Luminosity} \label{sec: ringmodeldebris} Throughout each calculation, the dust luminosity depends on the vertical scale height and the surface area of small solids. Initially, pebbles and planetesimals have the same typical orbital inclination, $\imath_0 = 5 \times 10^{-4}$. At large distances $a$ = 30--90~au, the upper and lower surfaces of the swarm intercept a negligible fraction of stellar flux \citep[e.g.,][]{kh1987,chiang1997}. The maximum stellar luminosity intercepted by pebbles is then the fraction of solid angle subtended by a ring with vertical scale height $H$ above and below the midplane at distance $a$ from the central star: $L_{d,max} = H /a = 5 \times 10^{-4}$ for the adopted $\imath_0 = 5 \times 10^{-4}$. Ignoring the negligible contribution from large planetesimals for rings with any $f$ the initial dust luminosity is: \begin{equation} \label{eq: ldlstar0} L_{d,0} / \ifmmode {L_{\star}}\else $L_{\star}$\fi \approx \begin{cases} 7.3 \times 10^{-4} ~ (1 - f) \left ( \frac{M_0}{\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi} \right ) & a = 45~{\rm au}, \ifmmode M_{0}\else $M_{0}$\fi\ \lesssim 0.7~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ \\ 1.9 \times 10^{-4} ~ (1 - f) \left ( \frac{M_0}{\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi} \right ) & a = 75~{\rm au}, \ifmmode M_{0}\else $M_{0}$\fi\ \lesssim 2.6~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ \\ \end{cases} \end{equation} When \ifmmode M_{0}\else $M_{0}$\fi\ exceeds the limits quoted in eq.~\ref{eq: ldlstar0}, $L_{d,0} / \ifmmode {L_{\star}}\else $L_{\star}$\fi\ = 5 \times 10^{-4}$. These expressions for \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ establish clear constraints on plausible evolutionary paths for rings of pebbles and planetesimals. To exceed the FEPS upper limits of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi $\approx 10^{-4}$ for young stars with ages $\lesssim$ 100~Myr, rings at 45~au (75~au) must have initial masses $\ifmmode M_{0}\else $M_{0}$\fi \gtrsim$ 0.15~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (0.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi). Lower mass disks require additional dust production from a collisional cascade. Among older stars, exceeding the {\it Herschel} upper limits of $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \approx 3 \times 10^{-6}$ requires much less mass, $\ifmmode M_{0}\else $M_{0}$\fi \gtrsim$ 0.005~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (0.02~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) at 45~au (75~au). If the time evolution of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ is slow, the small {\it Herschel} upper limits allow a broader set of rings to match observed systems. As each calculation proceeds, the dust luminosity responds to changes in $H$ and the surface area of small solids. When $f \lesssim 10^{-2}$, collisional damping initially reduces $H$ by a factor of 2--5. Debris production is minimal; \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ drops as $H$ falls. As planetesimals accrete more and more pebbles, stirring (damping) becomes more (less) efficient. Debris production and $H$ begin to grow; \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ rises. Rings of solids with larger $f$ have more stirring from growing planetesimals and less damping. The dust luminosity then rises at the start of each calculation. In all systems, $H$ eventually reaches a maximum; debris generated from collisions of protoplanets and planetesimals falls below the loss of small particles from the collisional cascade. The dust luminosity then fades with time. \begin{figure}[t] \begin{center} \includegraphics[width=5in]{fig8.pdf} \vskip -2ex \caption{ \label{fig: ldust0} Evolution of the relative dust luminosity \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ for rings at 75~au. In each panel, the dotted line shows the evolution predicted by an analytical model where $ \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ \propto L_0 (1 + t/t_0)^{-\alpha}$ with $\alpha$ = 1.12 \citep{kb2017a}. {\it Upper panel:} For models with $f$ = 0.5, the value for \ifmmode M_{0}\else $M_{0}$\fi\ is listed to the left of each curve. Systems with \ifmmode M_{0}\else $M_{0}$\fi\ $\gtrsim$ 1.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ have a period of constant \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ followed by a $t^{-1}$ decline. In lower mass systems, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ is roughly constant over 10~Gyr. {\it Lower panel:} For models with \ifmmode M_{0}\else $M_{0}$\fi\ = 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, the legend lists $f$ for each curve. Systems with $f$ = 1 evolve slowly to a maximum \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ $\sim 10^{-5}$. When $f \approx$ 0.1--0.5, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ gradually drops from $\sim 10^{-3}$ to $10^{-5}$. Rings of solids with $f \lesssim 10^{-2}$ start fainter, abruptly rise to \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi $\approx 10^{-2}$ and then dramatically fall to \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi $\lesssim 10^{-6}$. Collisions between pairs of protoplanets occasionally produce spikes in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi. } \end{center} \end{figure} The top panel of Fig.~\ref{fig: ldust0} illustrates the smooth evolution of the relative dust luminosity \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ for a set of calculations with $f$ = 0.5 at 75~au. When half of the initial mass is in pebbles, the initial \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ ranges from $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ \sim 10^{-6}$ for \ifmmode M_{0}\else $M_{0}$\fi\ = 0.01~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ to $5 \times 10^{-4}$ for \ifmmode M_{0}\else $M_{0}$\fi\ = 2.6--45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (eq.~\ref{eq: ldlstar0}). As the most massive rings evolve (15--45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, black and purple curves), stirring overcomes collisional damping; $H$ increases. Despite the lack of debris production from planetesimal growth, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ grows with time. Over the next 10--30~Myr, increased debris production roughly balances losses from the collisional cascade; \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ remains roughly constant. As protoplanet growth slows considerably at 100-200~Myr, stirring initiates a stronger cascade that removes more and more of the remaining small solids. The dust luminosity then begins a roughly linear decline. With more massive protoplanets that form earlier and stir solids more strongly, the 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ rings begin to decline before the 15~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ rings. Once the strong cascade begins, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ follows the same roughly linear decline in both systems. Lower mass models have a similar behavior. In rings with 0.5--5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (light green, dark green, and blue curves), the dust luminosity slowly declines with time during most of the first 100~Myr to 1~Gyr of evolution. During this decline, protoplanets gradually reach the mass of Pluto. Stirring from these large solids increases $H$. Larger relative velocities enhance debris production, but mass removal from the cascade keeps \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ falling. Eventually, stirring becomes more effective; the cascade strengthens and removes more and more small solids from the ring. The dust luminosity then declines more rapidly, joining the roughly linear decline of the higher mass models. In the lowest mass models (0.01--0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, beige and orange curves), the evolution is extremely slow. Over 10~Gyr, planetesimal masses grow by a factor of 3 (0.01~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) to 30 (0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi). The collisional cascade is equally weak; the dust luminosity changes little over 10~Gyr. Early in the evolution (1--10~Myr), these systems show a small rise in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ due to the extra production of small dust grains relative to the loss of pebbles. The systems then begin a protracted decline. Were the calculations extended to 20--30~Gyr, the decline in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ would speed up and eventually join the other models on a roughly linear decline of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ with time. Compared to the models with $f$ = 0.5, systems with small $f$ undergo a more erratic evolution (Fig.~\ref{fig: ldust0}, lower panel). When massive rings have $f \approx 10^{-4} - 10^{-2}$, runaway growth is explosive; protoplanets rapidly reach super-Earth masses (Figs.~\ref{fig: mass0}--\ref{fig: mass1}). The dust luminosity echoes this behavior (black, purple, and blue curves). Initially, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ drops by a factor of $\sim$ 2--5 as collisional damping among pebbles reduces the scale height of the smallest solids. After the runaway begins, protoplanets stir up smaller solids; the cascade starts to produce copious amounts of debris. With more debris and a larger scale height, the dust luminosity rises dramatically to $\sim 10^{-2}$ and then drops precipitously as the cascade depletes the rings of pebbles and smaller solids. During the steep decline, protoplanet--protoplanet collisions replenish the debris and produce additional brief rises in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi. After a nearly Gyr-long decline, a few large collisions create enough debris to fuel a final, modest rise in the dust luminosity, $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ \sim 10^{-6} - 10^{-5}$ that lasts until $\sim$ 10~Gyr. Calculations with $f \lesssim 10^{-4}$ behave in a similar fashion. Early on, damping is more important; \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ declines by a factor of 10--20. As km-sized planetesimals evolve into super-Earths, rapid growth of $H$ allows \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ to reach $\sim 10^{-2}$ somewhat earlier than models with $f = 10^{-4} - 10^{-2}$. In these systems, the drop in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ is more dramatic, falling well below $10^{-7}$, and the recovery is smaller than displayed by the black, purple, and blue curves in the lower panel of Fig.~\ref{fig: ldust0}. Rings with a larger initial mass in planetesimals, $f$ = 0.1--0.5, evolve more smoothly (light green and orange curves). In these systems, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ rises by a factor of four during the first 10--20~Myr when planetesimals grow into Pluto-mass planets (Fig.~\ref{fig: mass1}). While protoplanets continue to accrete pebbles, the dust luminosity levels off and begins to decline. The systems then enter an extended oligarchic growth phase from $\sim$ 100~Myr to 10~Gyr, where the dust luminosity declines roughly linearly with time, from $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-3}$ to $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-5}$. Near the end of this epoch, both calculations exhibit a small rise in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ from several collisions among the remaining planetesimals and protoplanets. When $f$ = 1, the ponderous evolution of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ closely parallels the slow growth of planetesimals into Mars-mass planets (Fig.~\ref{fig: ldust0}, beige curve). During the first 30~Myr, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ rises slowly from $\sim 10^{-9}$ to $\sim 10^{-6}$. Growth of planetesimals and a rise in debris production powers a more rapid rise to \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ = a few $ \times 10^{-5}$ at 200--300~Myr. The system then enters oligarchic growth, where protoplanets continue to grow and the cascade grinds leftovers to dust. Unlike other systems with smaller $f$, these rings maintain a roughly constant luminosity from 300~Myr to 10~Gyr. Eventually, the dust luminosity will decline; however, the decline will occur after the central star leaves the main sequence. When the initial mass in solids is smaller than 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, the evolution of the dust luminosity in models with $f \lesssim 10^{-2}$ is slower and less dramatic. The overall shape in the $L_d(t) / \ifmmode {L_{\star}}\else $L_{\star}$\fi$ curve follows the examples in the top panel of Fig.~\ref{fig: ldust0}, with a fairly constant \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ at the start of the calculation followed by a nearly linear decline. Superimposed on this generic evolution is a series of spikes in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ generated by debris from occasional giant collisions between protoplanets and planetesimals. The amplitudes of these spikes decline with decreasing initial mass in solids. Rings with \ifmmode M_{0}\else $M_{0}$\fi\ = 10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 45~au and \ifmmode M_{0}\else $M_{0}$\fi\ = 15~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 75~au have large spikes as in the black, purple, and blue curves in the lower panel of Fig.~\ref{fig: ldust0}, while rings with 0.3--1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi at 45~au and 0.5--1.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 75~au have modest spikes. Lower mass systems have insignificant spikes in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ during the overall decline. In systems with $f$ = 1, the evolution in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ becomes less and less interesting with decreasing \ifmmode M_{0}\else $M_{0}$\fi. Rings with \ifmmode M_{0}\else $M_{0}$\fi\ $\gtrsim$ 1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ (5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) at 45~au (75~au) have $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \gtrsim 10^{-6}$ at 5--10~Gyr. As \ifmmode M_{0}\else $M_{0}$\fi\ decreases from these limits, the maximum dust luminosity also drops. At 45~au, the maximum dust luminosity falls to $3 \times 10^{-7}$ for 0.3~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ rings to less than $10^{-7}$ for 0.01~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ rings. Low mass rings at 75~au are equally invisible with current technology; all systems with \ifmmode M_{0}\else $M_{0}$\fi\ $\lesssim$ 0.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ have a maximum \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ smaller than $10^{-7}$. The tables in the Appendix include the maximum \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ for all calculations and allow for a more extensive comparison among the calculations. To connect these results to previous studies, we compare with published analytical models of collisional cascades \cite[e.g.,][]{wyatt2002,dom2003,krivov2008,lohne2008}. In a cascade at 75~au where the radius $r_c$ of the largest object participating in the cascade does not change, the dust luminosity is constant at early times and then falls linearly with time, $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi = L_0 / (1 + t / \tau_0)$. However, numerical models demonstrate that $r_c$ also declines with time \citep[e.g.,][]{kb2017a}. Including this behavior in the analytical model yields a steeper decline in the dust luminosity, $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi = L_0 / (1 + t / \tau_0)^{1.12}$, where $\tau_0 = 1.12 \alpha t_0$ and $t_0 = r_c \rho P / 12 \pi \Sigma$ is the collision time \citep{kb2017a}. The $\alpha$ term is a function of the ratio of the collision energy to the binding energy of planetesimals. The dotted line in each panel of Fig.~\ref{fig: ldust0} shows the luminosity evolution for $L_0 = 4 \times 10^{-3}$ and $t_0$ = 30~Myr. The dust luminosity is nearly constant for 5--10~Myr and then declines. Although the analytical model has a somewhat larger \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ at early times, it matches numerical models for massive disks with $f$ = 0.1--0.5 at late times. Tracking the behavior of the numerical models for less massive disks requires smaller $L_0$ and larger $t_0$. In the \citet{kb2017a} analytical model, the reference luminosity $L_0$ and the time scale $\tau_0$ depend primarily on $M_0$ and $r_c$: $L_0 \propto M_0 r_c^{-1/2}$ and $\tau_0 \propto r_c M_0^{-1}$. For the cascade in Fig.~\ref{fig: ldust0}, the collision velocity is just large enough to shatter objects with $r \approx r_c$; then, $r_c \approx$ 0.2--0.5~km and $M_0 \approx$ 50--55~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi. For fixed $r_c$, reducing $L_0$ by a factor of 100 yields $M_0 \approx$ 0.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $t_0 \approx$ 3~Gyr. This model provides a reasonable match to numerical calculations with $M_0 \approx$ 0.1--0.5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi. Analytic cascade models with the larger planetesimals expected from streaming instability models, e.g., $r_c \approx$ 100--200~km, require unreasonably large \ifmmode M_{0}\else $M_{0}$\fi\ to approximate the evolution in Fig.~\ref{fig: ldust0} \citep[see also][]{shannon2011,krivov2021}. Adopting $r_c \approx$ 100~km instead of $r_c \approx$ 0.3~km requires $\sim$ 17 times more mass to achieve $L_0 \approx 4 \times 10^{-3}$. To match the short collision time, $\tau_0 \approx$ 30~Myr, collision velocities must be $\sim$ 3--4 times larger than the minimum required to shatter 100~km objects. While this model provides a reasonable match to the simulation, the high mass in solids, $M_0 \approx$ 800--900~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, makes this solution unattractive compared to the analytical model with small planetesimals or the numerical model with a mix of pebbles and large planetesimals. Although not shown in Fig.~\ref{fig: ldust0}, analytic models also match the results of numerical models at 45~au. For \ifmmode M_{0}\else $M_{0}$\fi\ = 10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $r_c$ = 0.2~km, an analytical model with $L_0 \approx 2 \times 10^{-3}$ and $\tau_0 \approx$ 25~Myr tracks the numerical models of disks with $f$ = 0.1--0.3 for evolution times exceeding 30--40~Myr. Lower mass disks with larger $\tau_0$ also match the simulations. Compared to calculations at 75~au, the analytic model prefers a somewhat smaller $r_c$ and shorter $\tau_0$ to track the numerical results adequately at 45~au. Once again, much larger $r_c$ requires unreasonably large \ifmmode M_{0}\else $M_{0}$\fi. \subsection{Gap Formation} \label{sec: ringmodelgaps} In addition to the dust luminosity, the coagulation calculations provide a quantitative measure of the radial distribution of dust as a function of time. For low mass rings that generate little dust luminosity, $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \lesssim 10^{-4}$, final protoplanet masses are typically less than the mass of Mars. These planets tend to follow the initial surface density distribution and cluster near the center of the ring. With little mass in planets, the dust also has a gausssian distribution in surface density with a peak in the center of the ring, e.g., at 45~au and at 75~au. More massive rings have more obvious features in the radial surface density of the dust. The planets in these calculations do not follow the initial surface density distribution and are more evenly distributed among the 28 annuli in each ring. Super-Earth mass planets tend to eliminate all solids from their annuli and sometimes from adjacent annuli. These systems thus have 1--3~au gaps in the surface density of dust along the orbits of the super-Earths. Rings with several super-Earths have multiple gaps. Predicting the structure of these gaps requires a parallel set of coagulation and $n$-body\ calculations to allow the gravity of planets to open gaps with sizes that depend on the mass of the planet and the remaining mass in smaller solids within the ring \citep[e.g.,][and references therein]{kok1995,raf2001,bk2011b,bk2013}. These calculations are computationally expensive \citep[e.g.,][]{bk2020,kb2021a}; we defer them to a later study. Here, we use previous results to infer the likely structure of gaps in the dust distribution of rings with massive planets. For this initial exploration of gap formation, we compare the relative separation of protoplanet orbits to the Hill radius, $\ifmmode r_H\else $r_H$\fi\ = a (M / \ifmmode {M_{\star}}\else $M_{\star}$\fi)^{1/3}$. From analytic and numerical calculations, planets clear out a `ring of influence' with a radial extent $\delta a \approx 2 \sqrt{3} \ifmmode r_H\else $r_H$\fi$ on either side of their orbits \citep[e.g.,][]{gladman1993,kok1995,raf2001}. Among pairs of protoplanets, those separated by more than 4~\ifmmode r_H\else $r_H$\fi\ in semimajor axis do not interact dynamically \citep[e.g.,][]{kok1995,chambers1996, weiden1997b,chambers2001a,bk2006, kb2006}; each carves out its own gap with an extent comparable to $\delta a$. Protoplanets on closer orbits interact dynamically and produce large gaps in an `interaction region' defined by the extent of their chaotic orbits prior to a merger or ejection event. This region has a width of 2--3$\delta a$. \begin{figure}[t] \begin{center} \includegraphics[width=5.5in]{fig9.pdf} \vskip -2ex \caption{ \label{fig: ann0} Radius of the largest object in each annulus for rings of solids with \ifmmode M_{0}\else $M_{0}$\fi\ = 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f = 0.01$ for times listed in the legend. Horizontal lines extending from several points in each panel indicate the extent of the `ring of influence', which has a radial extent of 3.5~\ifmmode r_H\else $r_H$\fi\ around the orbit of each planet. Rings of influence for all protoplanets are omitted for clarity. At the center of the grid, the largest planetesimals slowly grow from 100~km to 200 km (10~Myr) to 700~km (30~Myr). Runaway growth leads to the formation of four protoplanets with $M \gtrsim$ 0.1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and another with $M \approx$ 0.05~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi. The overlapping rings of influence suggest dynamical interactions will begin a phase of chaotic growth where the largest protoplanets merge into one or two super-Earths. } \end{center} \end{figure} Fig.~\ref{fig: ann0} illustrates the evolution for a calculation with \ifmmode M_{0}\else $M_{0}$\fi\ = 45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f$ = 0.01. With a surface density maximum in the middle of the ring, planets grow fastest (slowest) at 75~au (60--65~au and 85--90~au). Once 500--600~km protoplanets form at 30~Myr, runaway growth begins. Over the next 70~Myr, the five fastest-growing protoplanets each surpass the mass of Mars. Smaller protoplanets have much smaller masses, $\sim$ 1--30~\ifmmode M_P\else $M_P$\fi. The horizontal lines in the figure illustrate the extent of the rings of influence for each of the five largest protoplanets. Rings of influence for the two most massive protoplanets at 73--75~au overlap and contain a lower mass protoplanet at 72~au. Rings of influence for the other two protoplanets at 67~au and at 81~au contain several much smaller planetesimals but no other massive protoplanet. The close proximity of the two largest protoplanets in Fig.~\ref{fig: ann0} has two observable outcomes. Initially, the two central protoplanets interact dynamically, scattering smaller solids out of their orbits and trying to move to a larger separation. This interaction involves the protoplanet at 72~au and begins a period of chaotic growth, where the three protoplanets at 72--75~au move chaotically through the grid and sweep up smaller objects along their orbits. Eventually, this process involves the outer two protoplanets at 67~au and 81~au. Subsequent collisions and mergers among the five largest protoplanets, the smaller protoplanets with radii $\sim$ 1000--4000~km, and the smaller planetesimals are likely to leave behind one or two super-Earth mass planets \citep[e.g.,][]{gold2004,kb2006}. Throughout chaotic growth, the ring of smaller solids expands radially inward and outward. Thus, at $\gtrsim$~200~Myr, ALMA observations would reveal thermal emission from a larger ring of small solids with a central depression where the remaining super-Earths orbit. In this example, it seems likely that the size of the gap will be larger than the standard $4\sqrt{3} \ifmmode r_H\else $r_H$\fi$ expected for a {\it single} massive planet in a ring of small solids. The five protoplanets at 67--82~au would experience chaotic growth within an `interaction region' extending from $\sim$ 65~au to $\sim$ 83~au. Once chaotic growth ends, this region would have few small solids. Instead of the $\sim$ 50~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ single planet required to create such a large gap, this gap would contain 1--2 super-Earths with a total mass $\sim$ 5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi. \begin{figure}[t] \begin{center} \includegraphics[width=5.5in]{fig10.pdf} \vskip -2ex \caption{ \label{fig: ann1} Snapshots of the largest protoplanets in each annulus at 1--10 Gyr for rings at 45~au (left panels) and at 75~au (right panels). The upper right corner of each panel lists \ifmmode M_{0}\else $M_{0}$\fi\ and log $f$. Horizontal lines indicate rings of influence for several protoplanets in each panel. Rings of influence for all protoplanets are omitted for clarity. } \end{center} \end{figure} Among the suite of calculations with \ifmmode M_{0}\else $M_{0}$\fi\ = 10~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 45~au and \ifmmode M_{0}\else $M_{0}$\fi\ = 15--45~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 75~au, many have protoplanets with overlapping rings of influence (Fig.~\ref{fig: ann1}). At 45~au (left panel), two systems have as many as a half dozen protoplanets within an interaction region (top left and middle left panels). Another system has $\sim$ 20 large objects in an interaction region that takes up most of the ring. Calculations at 75~au yield similar systems where a few or many massive objects will interact chaotically. Some may yield 1-2 super-Earths; others may produce many Mars-mass planets. In each of these calculations, we expect that chaotic evolution will produce gaps and perhaps narrow rings of small solids within broader, more diffuse rings. With many massive protoplanets evolving within the interaction region, the final sizes of dark gaps may be much larger than expected from the final masses of protoplanets. Lower mass rings are unlikely to have much structure. The protoplanets in these systems are not massive enough to scatter small solids out of their orbits and cannot generate a significant gap in the ring. With little scattering, the final extent of the ring should be similar to the initial extent. \section{Discussion} \label{sec:discussion} The models described in Section 3 illustrate how the collisional evolution of rings of solids---composed of pebbles and planetesimals---follow diverse evolutionary histories depending on the efficiency of planetesimal formation ($f$) and the initial mass in solids ($\ifmmode M_{0}\else $M_{0}$\fi$). These parameters establish whether rings can grow Pluto-, Mars-, or super-Earth-mass planets in 1 Myr to 10 Gyr (Section 3.3; Figs.~\ref{fig: mass0}--\ref{fig: mass2}; see also Appendix Tables \ref{tab: tab1}--\ref{tab: tab2}). Diverse dust luminosity histories result (Section 3.4; Fig.~\ref{fig: ldust0}). The growing planets should create gaps in the radial distribution of solids that reflect their mass and growth history (Section 3.5; Figs.~\ref{fig: ann0}--\ref{fig: ann1}). Here we compare the model results from Section 3 with observations of debris disks to identify the plausible initial conditions and evolutionary paths that connect protoplanetary disks to debris disks (Fig.~\ref{fig: schema}). We also associate planet formation outcomes---Pluto, Mars, or (super-)Earth---with the various paths to debris disks. Fig.~\ref{fig: ldustcomp0} compares the fractional luminosity \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ of the ring models (colored lines) with the observed \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ values of debris disks described in Section 2. In each panel, the colored dots from Fig.~\ref{fig: alldata} are reproduced as black dots; grey arrows repeat the median upper limits from Fig.~\ref{fig: alldata}. The comparison demonstrates that the evolution of massive rings of pebbles and planetesimals at 45--75~au plausibly explains the observed dust luminosities of known debris disks with stellar ages of 10~Myr to 10~Gyr. \begin{figure}[t] \begin{center} \includegraphics[width=5in]{fig11.pdf} \vskip -2ex \caption{ \label{fig: ldustcomp0} Comparison of the relative dust luminosity derived from the numerical calculations (solid lines) with detections (black points, instead of blue, green and purple points) and upper limits (grey symbols) from Fig.~\ref{fig: alldata}. The legend associates values of $a_0$, \ifmmode M_{0}\else $M_{0}$\fi, and $f$ with each model curve. In the upper panel, a set of `bright stalwart' models passes through the ensemble of data points. In the lower panel, `early flare' (purple curve), `steady glow' sources (blue, light green, and dark green curves), and `late bloomers' (orange curve) pass through the data for young stars (ages $\lesssim$ 100~Myr, early flare) or old stars (ages $\gtrsim$ 100~Myr, steady glow sources and late bloomers) but not both. } \end{center} \end{figure} \subsection{Bright young disks} As shown in the two panels of Fig.~\ref{fig: ldustcomp0}, the population of bright young disks ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \gtrsim 10^{-3}$ at 10--100 Myr) is best matched by models of high mass rings (3--45 $\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi$) with a wide range of planetesimal formation efficiencies ($f$ = 0--0.5). In models with $f \lesssim 10^{-2}$, occasional collisions among large protoplanets create copious debris and pronounced spikes in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ (Fig.~\ref{fig: ldustcomp0}, purple curve in the lower panel). The largest spikes rival the observed \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ of the brightest debris disks with ages of 10--100~Myr (upper panel; 75~au). Fainter debris systems in this age range are well matched by rings with smaller masses, smaller radii, or smaller $f$ (Fig.~\ref{fig: ldustcomp0}, upper panel). In contrast to these evolutionary paths, rings with similar or larger masses, but completely efficient planetesimal formation ($f$=1) produce very little debris at early times (Fig.~\ref{fig: ldustcomp0}, orange curve in the lower panel). If planetesimals form with such high efficiency, matching the observed fractional luminosities of the bright young disks requires very large initial masses \citep[$\sim 1000$ \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi;][]{shannon2011,krivov2021}. As shown here, such large masses are unnecessary; more modest planetesimal formation efficiencies and the typical masses of observed protoplanetary disk rings can account for the observed properties of bright young disks. \subsection{Fainter old disks} Debris disks trend fainter with age, with $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-5}$ at ages beyond 1 Gyr (Figs.~\ref{fig: excess}, \ref{fig: alldata}, and \ref{fig: ldustcomp0}). The downward trend of $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi$ with age is readily explained by the simple fading of the bright young disks of Section 4.1. Rings with $f \approx$ 0.01--0.5 follow the classical evolution in dust luminosity of $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \propto t^{-1}$ \citep[see also][]{wyatt2002, dom2003,krivov2008,lohne2008,wyatt2008,kb2017a} via the evolutionary pathway illustrated by nearly all of the curves in the upper panel of Fig.~\ref{fig: ldustcomp0}. We identify this evolution as the ``bright stalwart'' pathway shown in Fig.~\ref{fig: fourpaths}. This interpretation of the known debris disks---that they arise from the fading of a population of initially massive disks partially composed of pebbles and planetesimals---is consistent with the similar fraction of debris disks and protoplanetary disk rings at each evolutionary age ($\sim 25$\%; Section 2). Thus, the bright stalwart pathway accounts for both the incidence rates and luminosities of the known debris disks in the age range $\sim$ 50~Myr to 10~Gyr. The general agreement of this evolutionary path with the observed properties of debris disks potentially limits the possible role of other evolutionary histories. For example, the fainter old disks could also be explained with a population of low mass rings ($\sim 1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi$) with modest $f$ that are moderately bright at early times ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-4}$) and evolve more horizontally in Fig.~\ref{fig: ldustcomp0}, reaching $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-5}$ at 10 Gyr. This pathway---which we refer to as `steady glow'---is illustrated by the green and blue curves in the lower panel of Fig.~\ref{fig: ldustcomp0} (also the gold curve in Fig.~\ref{fig: fourpaths}). Alternatively, high mass disks (10--40 \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) made entirely of planetesimals pursue a stealthy evolutionary path that is extremely faint at early times ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi < 10^{-6}$) and brightens at late times to currently observable levels of $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-5}$. The orange curve in the lower panel of Fig.~\ref{fig: ldustcomp0} (also in Fig.~\ref{fig: fourpaths}) shows this `late bloomer' pathway. If we assume that $\sim 25$\% of stars start out with massive protoplanetary disk rings (Section 2) and subsequently follow the bright stalwart path, we can account for the observed luminosities and incidence rates of debris disks with age; this assignment leaves little room for significant contribution from the steady glow and late bloomer pathways. If these were important pathways, each populated roughly equally to the classical bright stalwart pathway, the incidence rate of debris disks at early times (from the bright stalwart pathway) would be three times smaller than the rate at late times when the steady glow and late bloomer populations become detectable with $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-5}$ at $\sim$~1~Gyr. We can further rule out a significant steady glow population, because it would also overproduce sources at ages of 0.1--1~Gyr with $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \approx 10^{-4}$. The debris disk incidence rate in this age and luminosity range is restricted by the {\it Herschel} survey upper limits (Section 2). Future debris disk surveys that reach fainter luminosity limits at ages 10--300~Myr can provide additional, direct constraints on the steady glow ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-5}$) and late bloomer ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-6}$) populations. One can imagine combining the evolutionary tracks from Section 3 in other ways. For example, if the incidence of cold debris disks at 10--30~Myr is as large as the 50\% rate derived for the small population of F stars in the 20--25~Myr old $\beta$ Pic moving group \citep{pawellek2021}, a significant population of disks must rise to high dust luminosity within a few tens of Myr before fading significantly beyond 100 Myr. This behavior, which we identify as the `early flare' pathway, could explain the high incidence rate of cold debris disks at young ages and the much lower rate among stars with ages $\gtrsim$ 50~Myr. In the calculations, this behavior occurs in rings with high masses and $f \lesssim 10^{-3}$, where the combined impact of damping, rapid planet growth, and an efficient cascade results in a system where \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ rises from $\lesssim 10^{-4}$ to $\sim 10^{-2}$ and declines back down to $\lesssim 10^{-4}$ on time scales of 100~Myr (Fig.~\ref{fig: ldust0}, lower panel, black, purple, and blue curves; Fig.~\ref{fig: fourpaths}, green curve). The late decline in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ in these models is as fast or faster than the $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ \propto t^{-2}$ required to eliminate the descendants of the $\beta$ Pic stars from the DEBRIS and DUNES samples at ages of $\sim$ 1~Gyr \citep{pawellek2021}. We might further imagine that in addition to the early flare pathway producing the vast majority of the luminous debris disks at ages $\lesssim$ 40--50~Myr, we also have the steady glow and late bloomer pathways dominating among much older stars. With this combination, nearly all of the early flares need to fall below current detection limits before rings in the steady glow and late bloomer pathways begin to contribute to the population. Contributions from the classical bright stalwart pathway could `smooth over' the transition between these pathways. Invoking three pathways---early flare, steady glow, and late bloomer---faces several hurdles. Selecting the proper mix to ensure a high incidence rate at the youngest ages and to maintain a roughly constant rate of $\sim$ 25\% for all older stars would require some fine tuning for ages where early flares are fading away and the other pathways first become detectable. In addition, the required mix of initial conditions: massive disks with $f \approx$ 0 for early flares, massive disks with $f$ = 1 for late bloomers, and intermediate-mass disks with $f \approx$ 0.1--0.5 for steady glow sources seems unlikely, unless there are physical mechanisms that can produce such dramatically different planetesimal efficiencies in different disks. The larger parameter space of $f$ that produces the classical bright stalwart sources seems more plausible and more in line with the predictions of simulations of the streaming instability \citep[e.g.,][]{rucska2021}. We can also distinguish these pathways with a different approach, by quantifying the disk substructure created by any massive, embedded planets that form. Massive rings (10--40 \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) that follow the classical bright stalwart pathway ($f$=0.1--0.5; Fig.~\ref{fig: fourpaths}, blue curve) or the late bloomer path ($f$ = 1; Fig.~\ref{fig: fourpaths}, orange curve) would build Mars-mass planets by 10 Gyr. In contrast, massive rings with lower $f$ that ``burn bright, fade fast'' (the early flare pathway; $f \lesssim 10^{-3}$; Fig.~\ref{fig: fourpaths}, green curve) would create more massive objects---super-Mars to super-Earth mass planets---in 20--30~Myr (Fig.~\ref{fig: mass1}). Modest-mass rings that follow the roughly horizontal steady glow pathway ($\sim$1--5 \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi, $f$=0.3--0.5; Fig.~\ref{fig: fourpaths}, gold curve) would only build Pluto-mass objects by 10 Gyr (Fig.~\ref{fig: mass2}). The gaps created by the more massive planets could be resolved spatially. If a ring with a radius of 75 au creates a planet with the mass of Earth, Mars, or Pluto, the planet would open a gap with a fractional width of at least $2da/a = 4{\sqrt 3}(M_p/M_\odot)^{1/3}$ (Section 3), which corresponds to an angular width of 54 mas, 24 mas, and 8 mas at a distance of 140 pc. In comparison, the ngVLA is anticipated to deliver angular resolutions of 0.5 mas to 50 mas at wavelengths of 2.6 mm to 25 cm \citep[e.g.,][and references therein]{matthews2018,tobin2018,chalmers2020}. Thus, future observations could test the hypothesis that the classical bright stalwart evolution is the primary pathway for debris disks, with few systems pursuing either the late bloomer or the steady glow paths. In other words, observations could probe whether protoplanetary disks are born with massive, initially dark rings of planetesimals (late blooming rings) or initially modest-mass rings of pebbles and planetesimals (steady glow rings). \begin{figure}[t] \begin{center} \includegraphics[width=7.0in]{fig12.pdf} \vskip -2ex \caption{ \label{fig: fourpaths} The four generic pathways to produce cold debris disks around solar-type stars with $a \gtrsim$ 40~au. {\it Left Panel:} filled black circles and grey symbols plot observed dust luminosities from Fig.~\ref{fig: alldata}. Four thick solid curves illustrate the evolution of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ for four types of models. In the `bright stalwart' path, models with $\ifmmode M_{0}\else $M_{0}$\fi\ \gtrsim$ 5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f \approx$ 0.1--0.5 approximately match debris disk observations at any stellar age. Massive disks with $f \lesssim 10^{-2}$ (the `early flares') match observations well for young systems with ages $\lesssim$ 50--100~Myr but fade into obscurity for older stars. Massive disks with $f$ = 1 (`late bloomers') have very small \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ until stellar ages $\gtrsim$ 1~Gyr and gradually rise to an observable level at later times. In the `steady glow' pathway, low mass disks have \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ just below detectable levels for stellar ages $\lesssim$ 100~Myr; their relatively constant \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ over time allows them to match observations for older stars. {\it Right panel:} schematic evolution in the four pathways. At 1~Myr, bright stalwarts and early flares have bright rings at $a \gtrsim$ 40~au; steady glow sources have low masses of solids in rings at large $a$ that are undetectable with current instrumentation. Debris rings in late bloomers have much smaller \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ than steady glow sources and are also invisible. At 100~Myr, bright stalwarts and early flares have bright debris disks; late bloomers and steady glow sources have undetectable debris rings. At 1~Gyr, the debris rings in late bloomers, steady glow sources, and Bright stalwarts are bright; early flares have undetectable amounts of debris in rings. } \end{center} \end{figure} \subsection{The Story of Solids in Disks} If bright stalwarts dominate the evolutionary pathways for debris disks, one simple interpretation of the results described here is that extended and compact protoplanetary disks evolve differently, i.e., disks evolve horizontally in Fig.~\ref{fig: schema}. The 25\% of T Tauri systems with large ringed protoplanetary disks produce detectable debris throughout their lives, from $\sim 10$~Myr to 10 Gyr, and are the showy, attention-grabbing celebrities of the debris disk world. In contrast, the majority of T Tauri systems with compact protoplanetary disks live quieter, tidier lives. Few of them are born with `late-blooming' massive, initially dark rings of planetesimals or `steady' modest-mass rings of pebbles and planetesimals. That is, if rings are typically a mixture of pebbles and planetesimals at the end of the protoplanetary disk phase, then compact disks typically leave behind $< 1 \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi$ of solids at large radii, a small reservoir that produces little debris over the lifetime of the star. Instead of each disk evolving along the classical path of Class 0/I/II/III sources into debris disks \citep[e.g.,][]{cieza2007,wahhaj2010,will2011,hardy2015}, this interpretation implies that the ` known debris disks are a chapter in the history of only a subset of low mass stars. While most current observations support this simple picture, the true story may be more complex if the high incidence rate of cold debris disks among the small sample of F stars in the $\beta$ Pic moving group is typical of all 20--25~Myr old solar-type stars. As noted earlier, a high incidence rate of debris that persists for a short time may imply that a significant fraction of the compact protoplanetary disks actually possess massive rings of solids with very small $f$ that are also undetectable because of their very small initial scale height (section 3.2). These disks would evolve into bright early flare sources that appear suddenly on the debris disk stage and quickly fade below current detection limits. This potential complexity aside, the divergent debris-production histories of large and small protoplanetary disks connect back to the more fundamental question of what sets the initial distribution of solids in protoplanetary disks. One possibility is that some protoplanetary disks are born large and others small, a consequence of the initial angular momentum of the cloud core and the extent to which angular momentum is shed (or transported) as collapse proceeds \citep[e.g.,][and references therein]{tsc1984,matsumoto1997, basu1998,yorke1999,nakamura2000,krasnopolsky2002, tscharnuter2009,joos2012,tomida2015,hennebelle2016,zhao2020}. Alternatively, most disks may be born with similar (large) sizes, but some experience greater inward migration of solids and others do not. Disks that create planets (or other disturbances) early on, at large radii, can induce pressure bumps that trap solids and prevent inward migration \citep[e.g.,][]{pinilla2012,zhu2014,vandermarel2018}. If bright stalwarts dominate the production of debris disks, one or more of these scenarios are efficient in concentrating or placing a significant solid mass (10--40 \ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) in rings at large radii in about 20\%--25\% of disks. Our analysis and results complement ideas discussed in the literature. In a recent examination and interpretation of the dust masses and luminosities of protoplanetary and debris disk sources, \citet{michel2021} proposed a similar picture to the one described here: they hypothesized that debris disks are the descendants of large structured protoplanetary disks, which preserve their solids against inward radial drift through the action of dust trapping in pressure bumps. Their compact protoplanetary disk counterparts result from disks without such pressure bumps, whose solids drift inward to small disk radii. In support of their picture, they noted the similar sizes of protoplanetary disk structures (e.g., the central cavity radii of transition disks) and the blackbody radii of debris disks. However, they also offered the caveat that their protoplanetary and debris disk samples did not span the same spectral types, with the debris disks skewed to earlier-type stars. They also asked for modeling that would support their hypothesized scenarios. Our study complements this work by assembling protoplanetary and debris disk data sets that are matched in stellar mass and by comparing orbital distances (of protoplanetary rings and debris) and their incidence rates as a function of age. Our study also provides the detailed modeling that supports the hypothesis of Michel et al. We confirm that rings of solids with the properties inferred for protoplanetary disk rings (sizes, solid masses) can indeed evolve to produce the observed luminosities of known debris disks. Moreover, the approximately constant incidence rates of protoplanetary rings and debris disks as a function of age, when combined with our models, leaves little room for non-structured (i.e., compact) protoplanetary disks to sustain distant reservoirs of solids $> 1\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi.$ This result supports the underlying assumption in Michel et al.\ (and many other studies) that ``what you see is what you get'', i.e., that protoplanetary disks with compact millimeter {\it emission} have a compact solid {\it mass} distribution. Our results also overlap---but may be less compatible---with the picture described by \citet{vandermarel2021}. If they are correct that giant planets create protoplanetary disk rings and eventually migrate in close to the star where they are detected as transiting and radial velocity planets, the radial distribution of the planetesimals that result may not be ring-like. That is, if a giant planet creates a pressure bump outside its orbit where small solids collect and planetesimals form, the pressure bump moves with the planet as it migrates inward, whereas the planetesimals are poorly coupled to the gas and are left behind. If small solids are continually captured by the pressure bump and planetesimals form, the radial distribution of planetesimals is broadened as the pressure bump migrates. If the giant planets migrate from $\sim 40$ au to $< 1$ au and planetesimals form continuously behind the migrating planet, a very broad disk of planetesimals can result \citep[e.g., Figure 2 of][]{shibaike2020}. Such a broad distribution of planetesimals would eventually generate debris at increasing orbital distance with age \citep[e.g.,][]{kb2008,kb2010}, a trend that is not observed in the debris disk population \citep[e.g.,][see also Fig.~\ref{fig: extent}]{najita2005,kennedy2010,matthews2014,hughes2018}. In addition, if small solids migrate inward with the pressure bump, away from the planetesimals they create, the planetesimal-pebble mixture (i.e., the planetesimal mass fraction) will be altered. The scenario we explore relies on the longevity of narrow rings (of planetesimals and pebbles with an appropriate mixture) at large radii to account for the properties and demographics of the known debris disk population. \subsection{Connection to Planetesimal Formation} \begin{figure} \begin{center} \includegraphics[width=6.5in]{fig13.pdf} \vskip -2ex \caption{ Classification of model results as a function of the planetesimal mass fraction $f$ and the initial mass in solids \ifmmode M_{0}\else $M_{0}$\fi. The legend links symbols to $a_0$ for each calculation. Colors refer to the four debris disk pathways summarized in Fig.~\ref{fig: fourpaths}: early flare (green), bright stalwart (blue), steady glow (gold), and late bloomer (orange). Grey symbols indicate models that failed to produce an observable \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ with {\it Herschel} (see also Tables~\ref{tab: tab1}--\ref{tab: tab2}). To avoid overlap, some points have been displaced horizontally. } \label{fig: Mf-summary} \end{center} \end{figure} To place the results of Fig.~\ref{fig: fourpaths} in the context of planetesimal formation theories, we classify each calculation in terms of the four evolutionary pathways. Fig.~\ref{fig: Mf-summary} summarizes the results. Rings with (i) \ifmmode M_{0}\else $M_{0}$\fi\ $\lesssim$ 0.03~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and any $f$ or (ii) \ifmmode M_{0}\else $M_{0}$\fi\ = 0.1-0.3~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f$ = 1 never generate dust in amounts detectable with {\it Herschel} (gray symbols). More massive rings (\ifmmode M_{0}\else $M_{0}$\fi\ $\gtrsim$ 1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) with $f$ = 1 follow the late bloomer pathway (orange symbols). Although the maximum dust luminosity of late bloomers grows with \ifmmode M_{0}\else $M_{0}$\fi, \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ never reaches detectable levels before $\sim$ 1~Gyr. Among the (\ifmmode M_{0}\else $M_{0}$\fi, $f$) combinations considered here, steady glow and bright stalwart outcomes are the most numerous. Rings with \ifmmode M_{0}\else $M_{0}$\fi\ = 0.1--1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and any $f \ne$ 1 usually follow the steady glow pathway (gold symbols). More massive systems (\ifmmode M_{0}\else $M_{0}$\fi\ $\gtrsim$ 3~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi) with $f$ = 0.01--0.5 are bright stalwarts (blue symbols). The boundary between these two outcomes depends on $a_0$. When the ring is closer to the host star (e.g., $a_0 \sim$ 45~au), dust intercepts a larger fraction of stellar radiation and brightens earlier in the evolutionary sequence. The dust in more distant rings (e.g., $a_0 \sim$ 75~au) intercepts less stellar radiation; this lower dust luminosity falls below {\it Spitzer} detection limits for stellar ages of 10--100~Myr. Somewhat more massive rings, $\sim$ 3~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ at 75~au, are more luminous at 10--100~Myr and remain detectable throughout their evolution. For rings with \ifmmode M_{0}\else $M_{0}$\fi\ $\gtrsim$ 3--5~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi\ and $f \lesssim 10^{-2}$, the early evolution of massive solids is stochastic. Sometimes, ensembles of 1000--2000~km protoplanets undergo a series of mergers that produce several super-Earths and generate a rapid rise in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ on time scales of 10--30~Myr. However, this early flare evolution (green symbols) depletes the system of the intermediate mass solids that fuel the collisional cascade; \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ then drops quickly. When mergers of protoplanets are uncommon, the system maintains a plentiful supply of intermediate mass solids, which power a more slowly evolving cascade where the dust luminosity rises and then declines more slowly. On time scales $\lesssim$ 50--100~Myr, this bright stalwart evolution generates super-Mars-mass planets but not super-Earths. A preference for the bright stalwart pathway instead of the early flare and late bloomer tracks is consistent with current understanding of planetesimal formation. In recent numerical studies of the streaming instability \citep[e.g.,][]{simon2016,li2018,abod2019,carrera2020, klahr2020,gole2020,rucska2021}, the planetesimal formation efficiencies required for bright stalwarts ($f \approx$ 0.1--0.5) are more common than either $f \lesssim 10^{-2}$ (early flare) or $f \approx 1$ (late bloomer). Simulations that provide stronger constraints on $f$ would enable better estimates of the importance of each of the four pathways outlined in Fig.~\ref{fig: fourpaths}. The results derived here suggest a way to test numerical simulations observationally. Although rings with a broad range of $f$ can match a specific measurement of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi, robust detection of substructure within a ring may provide useful limits on $f$. For example, if bright debris disks ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-3}$) at an age of 10--30 Myr commonly have a gap that is wide enough to require a several Earth-mass planet, the numerical calculations discussed here require $f \lesssim$ 0.01 in order to form so massive an object so quickly (Fig.~\ref{fig: ldust0}, lower panel; Fig.~\ref{fig: times} in the Appendix). If future observations find a consistent lack of gaps in bright, young debris disks, the results would point to the larger $f \gtrsim 0.01$ of bright stalwarts, which can form Earth-mass planets at much later times ($\sim 100$ Myr; Fig.~\ref{fig: mass1}, upper panel). As a result, finding both a lack of gaps in bright, young debris disks and robust detections of gaps in older debris disks would provide strong support for $f \gtrsim$ 0.01 and the bright stalwart pathway. \subsection{Caveats and Open Questions} The calculations considered here employ standard well-tested techniques and begin with starting conditions that are consistent with observations (\ifmmode M_{0}\else $M_{0}$\fi) and theory ($f$). In a gaussian ring with a constant gas to dust ratio, neglect of radial drift from gas drag has little impact as drift velocities are small. The initial orbital parameters, $e = 10^{-3}$ and $\imath = 5 \times 10^{-4}$, are plausible; however, other options are possible. If cm-sized pebbles are well-coupled to the gas, they would have a large vertical scale-height and a larger initial inclination than considered here \citep[e.g.,][]{chiang2010, riols2018,krapp2020}. As the gas dissipates over several Myr, pebbles decouple from the gas; damping from collisions and residual gas would then act rapidly and reduce $e$ and $\imath$ to values similar to the starting conditions considered here. The growth of larger solids and the evolution of \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ in the four pathways would differ little from our description. If interactions with the gas or other physical processes should produce smaller $e$ and $\imath$ than considered here, outcomes could change dramatically. Except for models with $f$ = 1, all sequences would begin with smaller \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi. Solids in rings following the late bloomer and steady glow pathways would adjust on 10--100~Myr time scales and then follow the evolution described above. Within the bright stalwart and early flare pathways, planetesimals would have larger gravitational focusing factors and grow more rapidly. While it would take a little extra time for \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ to begin to rise, these systems might produce larger planets and brighter debris disks. The early flare tracks might be more peaked and fade more rapidly; the bright stalwart tracks might be somewhat brighter but would fade on time scales similar to those described above. In both pathways, it might be easier for high resolution observations of the debris to identify dark gaps and bright rings due to the more energetic early stages of planet formation. Aside from including the $n$-body\ component of {\it Orchestra}, other changes to the approach (e.g., fragmentation parameters, number of annuli per ring, or number of mass bins per annulus) are unlikely to change the outcomes significantly. As discussed in the Appendix (section B), modifying the fragmentation parameters yields factor of two changes in \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi. Previous tests of the coagulation code demonstrate that improving the mass and spatial resolution of a calculation produces similarly small changes in outcomes as a function of evolution time \cite[e.g.,][]{kb2016a,kb2017a}. \section{Summary} \label{sec: summary} Rings of solids at $a \gtrsim$ 30--40~au offer a way to resolve a long-standing disconnect between detailed evolutionary models of debris disks and their observed properties. The lack of a strong trend in the orbital distance of debris with age \citep[e.g.,][see also Fig.~\ref{fig: extent}]{najita2005,kennedy2010,matthews2014,hughes2018}, which is predicted by earlier generations of planet formation models, is readily explained if the parent bodies that produce the debris are initially distributed in discrete rings rather than over a broad range of orbital radii. The prominent rings that are commonly observed in T Tauri (protoplanetary) disks, which have an incidence rate similar to that of cold debris disks around low mass stars ($\sim$ 20--25\%), suggest a compelling starting point for debris disk evolution (Section 2). We have explored the potential connection between protoplanetary rings and debris disks, using a new set of evolutionary calculations that follow the evolution of rings of solids spanning a range of initial properties. The results show that diverse evolutionary histories are possible as a function of planetesimal formation efficiency $f$ and initial solid mass $\ifmmode M_{0}\else $M_{0}$\fi$ (Section 3). Depending on these parameters, rings of solids can grow Pluto-, Mars-, or super-Earth planets in 0.01--10 Gyr (Section 3.3). The resulting dust luminosity histories are also diverse and fall into four main pathways (Fig.~\ref{fig: fourpaths}): an always-bright classical evolutionary pathway that encompasses the known debris disks (``bright stalwart''); tracks that burn bright and fade fast (``early flare''); those that maintain a relatively constant, lower luminosity from 10 Myr to 10 Gyr (``steady glow''); and those that brighten dramatically at late times to a detectable luminosity (``late bloomer''). The largest objects that form via these pathways are expected to clear detectable gaps in the radial distribution of the accompanying debris (Figs.~\ref{fig: ann0}--\ref{fig: ann1}; Section 3.5). When compared with the model tracks, the known population of bright young debris disks ($\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \gtrsim 10^{-3}$ at 50--100 Myr) is well matched by rings that start out with high initial mass ($\ifmmode M_{0}\else $M_{0}$\fi=$ 5--40 $\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi$). As they evolve, these systems pass through the $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi$ distribution of known debris disks as a function of age, an outcome that is consistent with a large range in planetesimal formation efficiency ($f \lesssim 0.5$). Thus, if $\sim 25$\% of stars start out with massive protoplanetary rings and follow this classical ``bright stalwart'' evolutionary path, we can readily account for the observed luminosities and incidence rates of debris disks over time (Section 4.2). Although most current observations are consistent with this simple picture, the debris disk incidence rate in the 10--50 Myr age range is not well known. The true story may be more complex if the high incidence rate of cold debris disks among the small sample of F stars in the $\beta$ Pic moving group is typical of 10--50 Myr old stars. A large population of such sources may indicate that a significant fraction of disks follow the ``early flare'' pathway, in which massive rings of solids with very small $f$ that are also undetectable because of their very small initial scale height brighten dramatically into observable debris disks, then quickly fade below current detection limits. Future observations that constrain the debris disk frequency and \ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi\ of stars in the 10--50 Myr age range are needed to understand how often protoplanetary disks pursue this evolutionary pathway. Constraints from an even earlier stage of evolution, from the Class III phase, are also important to understand the evolutionary pathways of solids in disks. The recent work of \citet{lovell2021}, which studies a small sample of Class III sources in Lupus, is a good start in this direction. Larger samples and deeper observations are needed to understand whether most Class III sources follow the approximately constant luminosity evolution of the ``bright stalwart'' disks at early times, and/or if disks populate the fainter ``steady glow'' evolutionary tracks. This uncertainty aside, the ability of the classical ``bright stalwart'' pathway to explain the known debris disks appears to limit the role of the other generic pathways in producing known debris disks. The inferred strong evolutionary connection between the $\sim$ 20--25\% of protoplanetary disks with large rings and the $\sim$ 20--25\% of mature stars with cold debris disks implies that the majority population of compact protoplanetary disks ($\sim$ 75--80\% of all disks) leave behind only modest masses of residual solids at large radii ($\lesssim 1~\ifmmode {\rm M_{\oplus}}\else $\rm M_{\oplus}$\fi$) and evolve primarily into mature low-mass stars without detected debris at $a \gtrsim$ 30--40~au (Fig.~\ref{fig: schema} and \ref{fig: fourpaths}). In other words, the cold debris disks studied to date are a chapter in the history of a minority of low mass stars (Section 4.3). We can test this interpretation by looking for dynamical evidence of the planets predicted to form under these conditions. Planets should produce gaps in the accompanying debris, which may be resolvable spatially with facilities such as the ngVLA (Section 4.2). Resolving gaps in young disks can also place constraints on the efficiency of planetesimal formation (Section 4.3). Improved debris disk demographics can also test this picture. More sensitive surveys that probe $\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi$ down to $10^{-5}-10^{-6}$ in the 10--300 Myr age range can directly constrain the extent to which disks follow the ``steady glow'' and ``late bloomer'' paths. It is also important to study larger samples of young stars ($< 100$ Myr) and to characterize the incidence rate of bright cold debris disks $(\ifmmode L_d / L_\star\else $L_d / L_{\star}$\fi \sim 10^{-4}-10^{-2}$) to infer whether they represent $\sim 20$\% of low mass stars or a much larger fraction. A much larger fraction (Pawallek et al.\ 2021) would indicate a more complex situation and a possibly significant role for the ``early flare'' pathway. Although the picture we have described motivates and awaits new tests, our analysis illustrates how models of the evolution of rings of solids, when combined with observational constraints on the demographics of debris disks (e.g., their incidence rate as a function of luminosity and age), can strongly constrain the global evolutionary pathways of debris disks and place constraints on current important unknowns, such as the efficiency of planetesimal formation and the masses of possible dark reservoirs of solids in young disks. \acknowledgements We thank Meredith Hughes and Gaspard Duch\^ene for sharing the data from their ARAA article; Grant Kennedy for sharing summaries of the {\it Herschel} survey results; and Jaehan Bae and Andrea Isella for sharing some results from their upcoming review article. We also acknowledge a thorough and helpful report from an anonymous reviewer. Portions of this project were supported by the {\it NASA } {\it Emerging Worlds} program through grant NNX17AE24G. Useful data from the numerical calculations are available at a publicly-accessible repository (https://hive.utah.edu/) with the url https://doi.org/10.7278/S50d-znrw-973k. Other portions of this work were supported by {\it NASA} under Agreement No.\ NNX15AD94G to the ``Earths in Other Solar Systems'' program. The results reported herein also benefited from collaborations and/or information exchange within NASA’s Nexus for Exoplanet System Science (NExSS) research coordination network sponsored by NASA’s Science Mission Directorate.
\subsection*{Main Text} Building computational self-models of robot bodies, or the ability of a robot to simulate its physical self, is an essential requirement for robot motion planning and control. Similar to humans and animals \cite{gallup1982self, rochat2003five}, robots can use self-models to anticipate future outcomes of various motion plans without explicitly trying them out in the physical world. The predictions via self-models can be utilized in decision criteria of future actions. Importantly, a consistent self-model, once acquired, can be re-purposed to many different of tasks, and thus can serve for lifelong learning. Most available robotic systems rely on dedicated physical simulators \cite{koenig2004design, todorov2012mujoco, faure2012sofa, coumans2016pybullet, lee2018dart, drake} for task planning and control. Yet, these simulators require extensive human effort to develop. In contrast, recent progress in fully data-driven self-modeling has enabled machines to learn their forward kinematics directly using task-agnostic interaction data. Data driven forward-kinematics self-models typically need to know in advance what aspects of the robot need to be modeled, such as the tilt angle of the robot \cite{bongard2006resilient}, the position of end effectors \cite{kwiatkowski2019task}, the velocity of motor joints \cite{sanchez2018graph}, the mirror image of animatronic faces \cite{9560797}, or the contact locations as well as joint configurations of robot grippers \cite{hang2021manipulation}. The restricted predictive scope of traditional data-driven self-models limits the general applicability of these self-models to future, yet unknown, 3D spatial planning tasks. For example, a data-driven self model focusing only on predicting the position of an end effector, may not be useful for tasks involving operation in a crowded workspace, where full body collisions must be factored into the planning. Making sure that the entire robot arm motion will be collision free is a critical aspect for numerous safe robot operations such as object retrieval, trajectory planning and human-robot interaction. Modeling the entire robot morphology and kinematics, without prior knowledge of what aspects of the morphology are relevant to future tasks, has remained a major challenge. \begin{figure*}[t!] \centering \includegraphics[width=0.95\linewidth]{figures_pdf/figure1.pdf} \caption{\textbf{Visual self-modeling robots.} We equip the robot with the ability to model its entire morphology and kinematics in 3D space only given joint angles, known as visual self-model. With the visual self-model, the robot can perform variety of motion planning and control tasks by simulating the potential interactions between itself and the 3D world. Our visual self-model is continuous, memory efficient, differentiable and kinematic aware.} \label{fig:teaser} \end{figure*} In this paper, we present a full-body visual self-modeling approach (Fig.\ref{fig:teaser}) which captures the entire robot morphology and kinematics using a single implicit neural representation. This implicit system is able to answer space occupancy queries, given the current state (pose) or the possible future states of the robot. For example, the query-driven visual self-model can answer queries as to whether a spatial position $(x, y, z)$ will be occupied if the joints move to some specified angles. Since both the spatial and robot state inputs are real values, our visual self-model allow continuous queries in the domain of both control signals and spatial locations. Furthermore, the learning process only requires joint angles and sparse multi-view depth images, which enables generalizable and scalable data acquisition without human supervision. Once learned, the responses from this single visual self-model to a series of queries can then be used for a variety of 3D motion planning and control tasks, even though the self-model was only trained with task-agnostic random motor movements. Because of our fully differentiable parametrization, the robot can directly perform efficient parallel gradient-based optimization on top of the self-model to search for the best plans in real time. We can also combine the self-model in a plug-and-play manner with existing motion planners. Moreover, when the robot sustains physical damage, such as broken motor or changed topology, our self-model can detect, identify and recover from these changes. Since our self-model is inherently visual, it can provide a real-time human-interpretable visualization of the robot's internal belief of its current 3D morphology. This ability to sense pose-conditioned space occupancy is similar to our natural human ability to ``see in our minds eye'' \cite{gardner2011frames} whether our body could fit through a narrow passage, without actually trying it out. In the following sections, we begin by describing our main methods for constructing the visual self-model. We follow up with describing ways in which the robot can re-use the learned self-model in multiple downstream tasks. We then discuss the pipelines of damage detection, recognition and recovery. \subsubsection*{Implicit visual self-model Representation} Robots operate in a 3D world, and therefore being morphologically and kinematically aware in 3D space is essential for them to successfully interact with the physical environments as well as adapt to potential changes in the field. Traditionally, robot engineers build a physical simulator and integrate it with CAD models of the robot. However, designing a simulation environment is not trivial. Accurate CAD models that reflect the real as-built robot geometry may not be easily available, especially for robots that have been modified due to damage, adaptation, wear and repair. This challenge will likely become more acute as the variety and complexity of robotic systems continues to increase in the future, and especially as robots must operate with less human supervision, maintenance, and oversight. We therefore aim to learn the self-model of robots directly through task-agnostic data with minimal human supervision or domain knowledge. Our goal is to learn a visual self-model which can capture the entire body morphology and kinematics, without prior knowledge of the body configurations such as joint placements, part geometry, motor axis and joint types. With the visual self-model, a robot should be able to plan its future actions by rolling out the self-model before executing any actions in the physical world. We can also visualize its final plan from different viewing angles, because the model itself is three-dimensional. \begin{figure*}[t!] \centering \includegraphics[width=\linewidth]{figures_pdf/figure2.pdf} \caption{\textbf{Implicit visual self-model representation.} (A) Real-world setup for data collection. We fused sparse views from five depth cameras to capture the point cloud of the robot body. As the robot arm randomly moved around, we recorded pairs of the robot joint angles and its 3D point cloud. See S1 Movie for real-time data collection. (B) We show the computational diagram of our visual self-model. The coordinate network takes in the spatial coordinate and the kinematic network extracts kinematic features from the input joint angles. We then concatenated the spatial features and the kinematic features into a few layers of MLPs to output the zero-level set SDF values. The implicit representation can be queried at arbitrary continuous 3D spatial coordinates and different sets of joint angles.} \label{fig:diagram} \end{figure*} There are two major challenges when designing a visual self-modeling process. First, we need to carefully decide how to represent the 3D geometry of the robot body. Most existing 3D representations are explicit, such as point cloud, tessellated triangle meshes, or voxelized occupancy grids. However, such approaches come with several limitations. Point clouds, meshes, and grids often consume large amounts of memory to store even a single geometry, let alone a kinetic geometry dependent on input DoF. Point clouds also lose structural connectivity, while voxel representations lose continuous resolutions. These limitations are amplified in kinematic tasks, since the visual self-models are expected to be dependent on trajectories of multiple degrees of freedom of the robot. The second challenge concerns the computational efficiency of leveraging the learned visual self-model for downstream task planning. Once a visual self-model is formed, we hope that the same model can be used for many tasks. In other words, the model must be task-agnostic. Furthermore, real-time planning and control is critical for many robotic applications. Therefore, the ideal representation should render the 3D model in a parallel and memory efficient manner using GPU hardware. The model should also provide fast inference capability to solve common inverse problems in robotics, such as inverse kinematics. Lastly, not every component of the robot body weights equally in all tasks, so it should be possible to query different spatial components of the visual self-model as needed. For example, the full 3D knowledge of the robot base and 3D geometry of other arm components are not required when calculating the inverse kinematic solution of a robot arm trying to reach a 3D object with its end effector. We overcame the above challenges by proposing a state conditioned implicit visual self-model that is continuous, memory efficient, differentiable, and kinematics aware. The key idea is that the model does not simply predict future robot states explicitly; instead, it is able to answer spatial and kinematic queries about the geometry of the robot under various future states. To construct a query-answering self-model, we leverage implicit neural representations to model the 3D body of the robot as shown in Fig.\ref{fig:diagram}. Given a spatial query point coordinate $\vb*{X} \in \mathbb{R}^3$ normalized based on scene boundary, and a robot joint state vector $\vb*{A} \in \mathbb{R}^N$ specifying all the $N$ joint angles, the visual self-model can be represented by a neural network to produce the zero-level set Signed Distance Function (SDF) of the robot body at the given query point $\vb*{X}$. Formally, the model can be expressed as: \[ SDF = \{\vb*{X} \in \mathbb{R}^3, \vb*{A} \in \mathbb{R}^N | F(C(\vb*{X}), K(\vb*{A}))\}, \] where $C$ is the coordinate neural network with several layers of MLPs to encode the spatial coordinate features, $K$ is the kinematic neural network with several layers of MLPs to encode the robot kinematic features, and $F$ is the last few layers of MLPs to fuse the features from both the coordinate network $C$ and kinematic network $K$ after concatenating their outputs to produce the final SDF values conditioned on the queried spatial coordinates and current joint angles. We omit the batch size here for simplicity. For nonlinear activation functions, we used Sine functions to preserve the details on the 3D models \cite{sitzmann2020implicit}. We trained the network by formulating the problem as an Eikonal boundary value problem. Instead of supervising the network with ground-truth SDF, similar to SIREN network \cite{sitzmann2020implicit}, we directly used point clouds and surface normals obtained by fusing observations from sparse RGB-D camera views as labels as indicated in Fig.\ref{fig:diagram}. In both simulation and real-world setup, we used five RGB-D cameras to capture pairs of data for training, namely the joint angles and the fused point cloud. During testing, the only available robot-related information to our visual self-model is a set of joint angles. The detailed loss function is discussed in the Methods section. Overall, our visual self-model is formed by several layers of MLPs that implicitly captures the entire morphology and kinematics of the robot body. We implemented the network with differentiable deep learning framework so that it can be easily deployed on GPUs with end-to-end differentiable capabilities. Notably, though the entire self-model only consumes 1.1 MB memories to store its weights, our visual self-model can represent the 3D morphology of the robot body with different kinds of joint angles at various continuous spatial locations. By separating the kinematic feature encoder and coordinate feature encoder into two sub-networks, each sub-network captures independent semantic meaning. As we will show next, this property allows the self-model to learn rich kinematic features useful for downstream tasks. \begin{figure*}[t!] \centering \includegraphics[width=\linewidth]{figures_pdf/figure3.pdf} \caption{\textbf{3D self-aware motion planning tasks.} We present an overview of three different tasks. Touch 3D sphere with any part of the robot body (Left) asks the robot to generate a set of target joint angles such that some part of the robot body needs to be in contact with a randomly placed target sphere. Touch a 3D sphere with end effector (Middle) requires the robot to generate a set of target joint angles such that the robot needs to touch a randomly placed target sphere with its end effector link. Touch a 3D sphere with end effector while avoiding obstacle (Right) tasks the robot to propose an entire set of collision-free trajectories in the form of intermediate joint angles to touch a randomly placed target sphere using its end effector. The three tasks gradually becomes harder with more constraints.} \label{fig:task-overview} \end{figure*} \subsubsection*{3D Self-Aware Motion Planning} We aim to utilize the learned visual self-model in various motion planning tasks in 3D space. In this section, we will present algorithm designs to show the use cases for three sample tasks (Fig. \ref{fig:task-overview}). However, our model is not limited by only those three tasks. Rather, we use them as representative examples for demonstration purposes and we expect that the model can generalize to other possible tasks. \begin{itemize} \item \textbf{Touch a 3D sphere with any part of the robot body} The goal of this task is to have the robot to touch a 4cm diameter sphere using any part of its body. To solve this problem, the robot needs to calculate inverse kinematics in the 3D space without constraints on which specific body piece touches the target object. \item \textbf{Touch a 3D sphere with end effector} This task not only requires the robot to touch a sphere with about diameter of 4cm, but it also asks the robot to touch the target object with its end effector link. This is a harder task since the robot needs to solve inverse kinematics in the 3D space with a particular link constraint. The solution space is quickly reduced. \item \textbf{Touch a 3D sphere with end effector, while Avoiding an Obstacle} In this task, we ask the robot to go beyond computing a target end state with or without link constraints. Instead, in order to succeed at this task, the robot needs to perform precise motion planning in 3D to touch the final target while avoiding a large obstacle shown as red block in Fig.\ref{fig:task-overview}. Overall, the robot is tasked to propose an entire safe trajectory from its initial state to the target state. During the execution of the proposed trajectory, the robot will fail the task if any part of the robot body collides with the obstacle. \end{itemize} To solve the these motion planning tasks, one immediate thought is to obtain the entire robot body meshes and load them into existing robot simulators. This can be done by traversing all possible spatial points under certain precision and different sets of joint angles through the implicit neural representation, and rendering the entire 3D mesh of the robot body with post-processing algorithms \cite{lorensen1987marching}. This usage of the visual self-model seems to be a straightforward solution to bypasses the need to construct robot kinematic and geometric models such as CAD and URDF files. However, in practice, we found that constantly loading new robot meshes and destroying old robot meshes in commonly available robot simulators costed a significant amount of time. This limits the possibility of applying this method for real-time planning and control. We propose to frame the first two tasks as constrained optimization problems by leveraging the differentiability of the visual self-model as well as its capability of answering partial queries on spatial coordinates. Specifically, for the first task, we initialize thousands sets of joint angles. We then sample $P$ points uniformly on the surface of the target object. Since the output of the visual self-model will be zero when the queried spatial point is on the surface, the overall objective is to find the set of joint angles which can minimize the total sum of output values across all the sampled points on the target object. By freezing the weights of the learned visual self-model, we can perform gradient descent from the output surface predictions with respect to the input joint angles, under the constraint that the motor angles has to be within the range of $[-\pi, \pi]$. Formally, the constrained optimization problem can be expressed as: \[ \vb*{A}^* = \min \mathbb{E}_{\vb*{A}^b} \left[ \Sigma_{\vb*{T}^p} F(C(\vb*{T}^p), K(\vb{A}^b)) \right] \quad \textrm{\textbf{s.t.}} -\pi \leqslant A_{i}^{b} \leqslant \pi , i=1, 2, 3, 4 \] where $\vb*{T} \in \mathbb{R}^{P \times 3}$ is the sampled points on the target object, $i$ is the motor index, and $b=1, 2, ..., B$ is the index of each sampled set of joint angles with the maximum value $B$ to be the batch size on a single GPU. Since the visual self-model runs parallelly on a GPU with small consumption of memories, the entire optimization process can produce accurate solutions within a short period of time. With more GPUs, the process can be further sped up. To solve the second task, we need additional information about where the end effector locates relative to the entire robot body. Since the current visual self-model was only trained to capture the overall body geometries, similar to other works in self modeling, we can supervise the visual self-model to predict the end effector location at the same time. The good news is that our visual self-model already has a specialized sub-network that implicitly captures the robot kinematics. Therefore, we can directly use the pretrained weights of the kinematic sub-network, and train only two nonlinear layers of MLPs $E$ attached to the end of the sub-network with little additional efforts. In fact, as we will show in the experiment section, our visual self-model provides a strong semantic proxy to pre-train the kinematic sub-network, leading to superior performance than training a specialized network to predict the end effector position from scratch. Without our decomposition formulation of kinematic sub-network, the acquired kinematics information may not be easily distilled as an independent feature for future use. Similar to the first task, we now can formalize the solution of the second task by adding another objective function to make sure the resulted end effector reaches the target object. The overall optimization problem can be formalized as follows: \[ \vb*{A}^* = \min \mathbb{E}_{\vb*{A}^b} \left[ \Sigma_{\vb*{T}^p} \lambda_{\textrm{EE}} E(K(\vb{A}^b)) + \lambda_{\textrm{SDF}} F(C(\vb*{T}^p), K(\vb{A}^b)) \right] \textrm{\textbf{s.t.}} -\pi \leqslant A_{i}^{b} \leqslant \pi , i=1, 2, 3, 4 \] As discussed above, the objective function includes two terms weighted by hyperparameters $\lambda_{\textrm{EE}}$ and $\lambda_{\textrm{SDF}}$. The first term ensures the end effector touches the target object and the second term encourages the robot body to touch the target object. We found that adding a small $\lambda_{\textrm{SDF}}$ consistently achieves better results. Regarding the third task, our visual self-model can directly work with existing motion planning algorithms with minimal changes. There have been great success \cite{lavalle2006planning} on motion planning algorithms to solve obstacle avoidance problem in high-dimensional state and action spaces. We thus combine our visual self-model with the existing algorithms in a plug-and-play manner. Specifically, we use RRT* \cite{karaman2010incremental} as our backbone algorithm due to its popularity, probabilistic completeness and computational efficiency. Generally speaking, there are two major components in RRT* that require physical inference with robot bodies. The first component is to calculate the goal state, and the second component is to check whether a collision will happen given a particular state of the robot. With these two components, various planning algorithms can narrow the search space to the final solution without having to explicitly query robot status again. Traditionally, these two components require a dedicated robot simulator and pre-defined robot bodies. With our visual self-model, we can reach the final solution by simply performing fast parallel inference on the learned model. Specifically, the goal state can be obtained by running the same optimization procedure as in the second task. For collision detection, we can pass uniformly sampled points on the obstacle surface as well as the given set of joint angles $A_{query}$ through our visual self-model as shown below. If the total sum of the output values over all the sampled points is equal to or below a small threshold $\tau$ , then there is a collision. Otherwise, the robot will not collide with the obstacle object. \[ \textrm{Collision}=\begin{cases} \textrm{True}, \ \Sigma_{\vb*{O}^i} F(C(\vb*{O}^i), K(\vb*{A}_{query})) \leqslant \tau;\\ \textrm{False}, \ \Sigma_{\vb*{O}^i} F(C(\vb*{O}^i), K(\vb*{A}_{query})) > \tau. \end{cases}\] \subsubsection*{Damage Identification and Recovery} One major promise of machines that can model or identify themselves is the capability of recognizing and inspecting damage or changes, and then quickly adapting to these changes. In this section, we present our method to identify and recover from damage using the learned visual self-model. Our approach involves three steps. The robot first detects a damage or change on its body compared to its original (intact) geometry. Then the robot can identify which specific type of damage or change is happening. Finally, the robot will gather new information about itself with limited data and computational resources to quickly adapt its self-model to the new changes. Overall, our approach introduces several significant advantages over previous methods. First, being able to recognize the specific type of damage or change enables the robot to provide additional feedback information. Previous works have shown that it was possible to detect a damage. However, they were not able to provide additional information to identify the source of the change or which specific type of damage has happened. This information is extremely helpful when the damage requires hardware repair. Instead of relying on a domain expert to perform a series of inspections, our method can automatically generate information about specific damage such as ``the second joint motor is broken''. Another advantage is that our approach performs modeling in the 3D visual world. This means that we can visualize and render the internal belief of the visual self-model in a straightforward and interactive fashion. As we will show in the results, one can immediately tell which section of the internal belief of the robot body does not match the real-world counterpart. We can further tell visually if the internal belief has been updated to match the new changes after learning from new observations. In the following sections, we begin by describing the specific algorithms, and then we follow with real-world results in the next section. In the first step, we measure the current prediction error and the original prediction error. The current prediction error is computed by comparing the internal belief expressed by the learned visual self-model with the current observed 3D mesh of the robot, while the original prediction error is computed by comparing the same internal belief with the previously observed 3D robot body. Both cases share the same joint conditions. By comparing these two prediction errors, a large gap can inform us about a significant change or damage to the robot body. In the second step, we aim to identify the specific type of damage happening on the robot. Based on the robot arm platform we are experimenting with, we assume two types of potential changes: (1) broken motor and (2) changed topology. To reveal which specific type of the current damage is, our key idea is to solve the inverse problem with the learned visual self-model. Concretely, based on a single current observation of the robot body, we infer the best joint angles that the robot should have executed to result to the current 3D observation. This is a very challenging problem because an ideal joint angle set needs to give accurate 3D reconstruction of the entire robot body. Relying on previous gradient-based optimization algorithm is inefficient since the final gradient computation requires the sum over all the sampled points on the whole robot body. This process takes a large amount of memory and computation resources to perform a single gradient step due to the large volume of the robot mesh. Instead, we propose to use random search to locate the best possible joint angles. The simple random search algorithm works very well in this case. It does not require the accumulation of any gradient information so that larger batch of queries can fit on a single forward pass of visual self-model. With the inferred joint angles, we can quantify the damage by comparing them with the actual input motor commands. If a specific inferred joint angle is always different from the actual input and that particular inferred angle always stays as a constant value or some other random values, then we can tell that the corresponding motor is broken. When all the inferred joint angles match closely to the actual input commands, the wrong belief of the 3D body then comes from a topology change and all the motors function well. We leave the research where both changes happen at the same time or more complex changes as future directions. Finally, we also evaluate if our visual self-model can quickly recover from the changes by adapting on several new observations. For this step, the main purpose is to demonstrate the resiliency of the model, rather than proposing a new algorithm for continual adaption. Therefore, we follow common approaches by collecting a few more 3D observations after the changes to keep training the network for several epochs. We then check if the new visual self-model can successfully update its internal belief to match the current robot body both quantitatively and qualitatively. \subsection*{Results} In this section, we aim to evaluate the performance of the learned visual self-model, demonstrate the results of using the visual self-model in various motion planning tasks, and test the resiliency of the learned model under real-world damages. To this end, in the first two subsections, we present quantitative and qualitative evaluations as well as baseline comparisons in simulation. For all three subsections, we also demonstrate the fidelity of directly learning and using the visual self-model in the real-world setup. \subsubsection*{Visual self-model Estimation} We used the WidowX 200 Robot Arm as our experimental platform both in simulation and real-world. In order to obtain the ground truth point cloud data, we mounted five RealSense D435i RGB-D cameras around the robot as shown in Fig.\ref{fig:diagram}(A). Four cameras were around each side of the robot to capture side views. One camera was on the top to capture the top-down view. All cameras were calibrated. The depth images were first projected to point clouds which were then fused into a single point cloud based on the camera extrinsic parameters. The final point cloud was generated by clipping the scene with a pre-defined scene boundary. \begin{figure*}[t!] \centering \includegraphics[width=0.9\linewidth]{figures_pdf/figure4.pdf} \caption{\textbf{visual self-model predictions.} (A) Quantitative evaluations of our visual self-model predictions in both simulated and noisy real-world environments. Our visual self-model outperforms nearest neighbor and random baselines suggesting that the visual self-model learns a generalizable representation of the robot morphology beyond the training samples. (B) With simulated training data, our visual self-model can produce high quality 3D body predictions given a diverse set of novel joint angles. (C) When the training data becomes highly noisy in the real world due to imprecise depth information, noisy camera calibrations and super sparse view points, our visual self-model can still accurately match the ground truth to reflect the overall robot body morphology and kinematics. See S3 Movie and S4 Movie for more examples.} \label{fig:prediction-results} \end{figure*} During data collection, we randomly moved the robot arms to get pairs of joint values and its corresponding point cloud. For each pair of data, the simulation needed less than 1 second and the real-world collection took around 8 seconds. In total, we collected 10,000 data points in simulation with PyBullet \cite{coumans2016pybullet} and 7,888 data points in the physical setup. We partitioned the data into training set ($90\%$), validation set ($5\%$) and testing set ($5\%$). To evaluate the prediction accuracy, we ran several forward passes on the learned visual self-model to obtain the whole body mesh of the robot on the testing set. On a single GPU (NVIDIA RTX 2080Ti), this process took about 2.4 seconds. Following previous works on implicit neural representations of 3D models \cite{park2019deepsdf, sitzmann2020implicit}, we calculated the Chamfer-L1 distance between the predicted mesh and the ground truth mesh as our metric. All units in our paper are in meter. In simulation, the point cloud fusion was nearly perfect due to noiseless depth image and exact camera calibrations. In the real-world experiments, we noticed that the point cloud fusion was very noisy due to imprecise depth information introduced by internal sensor errors, noisy camera calibrations, and importantly, very sparse view points. We did not increase the number of views since the current ground truth scan can already reflect the overall pose of the robot, so we tested the fidelity of our algorithm directly on the noisy real-world data in exchange of adding more resources and time cost. The gap of the ground truth data quality between the simulation and real world suggests that the final results in the real-world setup can be greatly improved with better future 3D scanning techniques. Fig.\ref{fig:prediction-results} (B) visualizes pairs of predicted meshes and the ground truth meshes. In both simulation and real-world cases, our learned visual self-model produced accurate estimations of the robot morphology and kinematics, given only unseen joint angles as input. We also compared our algorithm with a random search baseline and a nearest neighbor baseline. For the random search, we randomly selected a robot mesh from the training set as the prediction. For the nearest neighbor baseline, we compared the testing joint angles with all the joint angles in the training set using L2 distance metric, and then used the robot mesh corresponding to the closest joint angles as the final prediction. We presented the quantitative results in Fig.\ref{fig:prediction-results} (A). Our method outperforms both baselines suggesting that the our visual self-model learns the generalizable correspondence between the joint angles and the robot morphology as well as kinematics rather than memorizing the training set distribution. \begin{figure*}[t!] \centering \includegraphics[width=\linewidth]{figures_pdf/figure5.pdf} \caption{\textbf{Interpolation between joint angles.} We demonstrate that our learned visual self-model can smoothly interpolate between different joint angles. (A) shows the results trained in simulation and (B) shows the results trained on real-world data. See S5 Movie for more examples.} \label{fig:interpolation-results} \end{figure*} In addition to the predictions on individual set of joint angles, we also visualize the predictions over joint angle trajectories by linearly interpolating between sets of starting joint angles and sets of target joint angles. Both the starting and target joint angles are randomly sampled. As shown in Fig.\ref{fig:interpolation-results}, our visual self-model can generate smooth interpolations of robot morphologies between small changes of joint angles. As we will show next, this property allows our visual self-model to generate accurate trajectories for downstream motion planning tasks. \subsubsection*{3D Self-Aware Motion Planning} In this subsection, we aim to evaluate the performance of using our visual self-model and 3D Self-Aware motion planning algorithms for three representative downstream tasks: teach a 3D sphere with any part of the robot body, touch a 3D sphere with end effector and touch a 3D sphere with end effector while avoiding obstacle. Detailed illustrations of the tasks and algorithms have been discussed above. For all three tasks, we present qualitative visualizations of our solutions obtained through the visual self-model in the real-world system in Fig.\ref{fig:motion-planning-results}. We then introduce our quantitative evaluation results in the simulation setup. \begin{figure*}[t!] \centering \includegraphics[width=0.95\linewidth]{figures_pdf/figure6.pdf} \caption{\textbf{3D self-aware motion planning results.} (A) For each of the three tasks, we show the real-world demos by executing the proposed plans from our visual self-model. See S6 Movie for more examples. (B) Our visual self-model outperformed all the baselines by a large margin. Overall, our visual self-model can produce accurate solutions for both tasks. (C) We found that our visual self-model enables the kinematic network to gain better generalization performance on downstream tasks than a plain kinematic self-model trained from scratch.} \label{fig:motion-planning-results} \end{figure*} For the ``Touch a 3D sphere with any part of the body'' task, our evaluation metric measures the Euclidean distance of the closest points between the robot surface and the target object surface. We sampled 100 tasks where the target sphere is placed at different 3D locations within the reachable space of the robot. If the robot was already in contact with the target sphere at initialization, we discarded that task and re-sampled another task. Our results are shown in Fig.\ref{fig:motion-planning-results}(B). We compared our visual self-model with several other baselines. To reflect the task difficulty, we first measured the initial distance between the robot surface body at its home location and all sampled target sphere surfaces. We also compared with a random trial baseline where the only input was also the joint angles, similarly to our visual self-model. In this case, the robot randomly selected a set of joint angles as its final solution. This baseline gave even worse performance than initial distance indicating that the robot needs to perform careful inverse kinematics calculation with considerations of its entire morphology and kinematics. Overall, our method produces much more accurate solutions. Furthermore, our method was also time efficient during the search stage. Each solution took 2.92 seconds on average on a single GPU after 500 optimization iterations. For the ``Touch a 3D sphere with end effector task'', our evaluation metric measures the Euclidean distance between the end effector link and the closest point on the target sphere surface. We sampled 100 tasks and made sure that the robot was not in contact with the target sphere at its home configuration. Our results are shown in Fig.\ref{fig:motion-planning-results}(B). Similar to the first task, we compared our approach with the initial distance and random trail baselines. Both baselines were poor at this task with about 36 cm to 37 cm errors. This is even worse than the first task because the presented task requires more accurate solutions to consider both the 3D body geometry and the end effector position. We have hypothesized that our visual self-model encourages strong semantic knowledge of robot kinematics in the kinematic sub-network. To verify this hypothesize, we re-used the pre-trained weights of the kinematic sub-network, and appended two nonlinear layers of MLPs to perform further training only on the newly added layers, in order to regress the end effector link position. The quantity of the data and the strategy of data splits followed the same definition with our original visual self-model. The test error was around $0.5$cm. We also trained a network with the exact same architecture without pre-trained weights from our visual self-model to predict the end effector position. The test error of this model was $1.3$cm which was nearly three times higher. Moreover, when applying these two models separately with our motion planning pipeline in Fig.\ref{fig:motion-planning-results}(B), our method reached nearly ten times higher accuracy than the model trained from scratch denoted as ``end-effector prediction'' in the table. These results suggest the importance of considering the kinematic structure of the robot together with its 3D morphology. In terms of time efficiency, our method took $4.93$ seconds on average on a single GPU after 500 optimization iterations because of the fast parallel inference property. Furthermore, we found that learning the kinematic structure, together with our visual self-model to learn the entire robot morphology, brought stronger generalization capability to downstream tasks. In Fig.\ref{fig:motion-planning-results}(C), every dot represents a task sample. The y-axis indicates the error measurements on the task of ``touch a 3D sphere with end effector'', and the x-axis denotes the closest distance between each sampled task and their nearest neighbor in the training set. Larger values on the x-axis means that the sampled task is farther away from the training data distribution. Therefore, the errors of the method with strong generalization capability should not raise with the increased distance from the training data distribution. We thus also plotted a linear regression model fit in the same figure. By comparing our visual self-model denoted as red dots and the model trained from scratch indicated as blue dots, we can tell that our visual self-model obtains a much stronger generalization capability, while the model trained from scratch will have a much higher error when the data is away from the training set. Finally, we also provide results of using different values of $\lambda_{\textrm{Link}}$ and $\lambda_{\textrm{SDF}}$ in the objective function. We found that $\lambda_{\textrm{Link}}=0.8$ and $\lambda_{\textrm{SDF}}=0.2$ gives the best results. Therefore, adding a small regularization with the original SDF objective can help achieve better performance in this task. For the ``Touch a 3D sphere with end effector while avoiding obstacle'' task, since the target joint states are generated and evaluated through the above task, we are now interested in evaluating the capability of generating collision-free trajectory when combing existing motion planners with our visual self-model as collision prediction function. Again, we sampled 100 tasks with initial states being contact free with the robot body. We placed a block $40$cm above the robot base as the obstacle object. The block has a dimension of $20$cm $\times$ $20$cm $\times$ $20$cm. In total, after running the motion planner with our visual self-model, we received 95 out of 100 trajectories which the model believes no collision will happen along each trajectory. We then executed these trajectories and found that 92 out of the 95 trajectories successfully passed around the obstacle towards the target object without any collision. This is $96.84\%$ success rate over all the output trajectories. Our method took $7.43$ seconds on average to produce an entire trajectory which includes the time for both inferring the target state as presented in the second task and running the motion planners. This fast inference time enables our method to provide real-time planning and control solutions. \subsubsection*{Resiliency Tests} Being able to identify potential damages or changes to the robot body and quickly recover from these changes is a critical capability of intelligent machines in the real world. We made two type of changes to the robot body as depicted by Fig.\ref{fig:damage-illustration}(A). In the first change, we broke the second motor to the end effector link by disconnecting the data transfer cable from the motor, which results the corresponding joint always stayed at $90\degree$. Motor broken can happen due to various reasons such as loosing cables, over heating or hardware damage, but the common resulted observation is that the motor does not respond to any commands. The second change applies to the topology change of the end effector link. We attached a 3D-printed plastic stick to the end effector so that the reachable space of the robot arm was extended. This is also a representative change in practical applications when different tasks demand new attachments of tools to the robot body or switch different grippers on a robot arm. \begin{figure*}[t!] \centering \includegraphics[width=0.75\linewidth]{figures_pdf/figure7.pdf} \caption{\textbf{Potential change or damage on the robot and visualizations} (A) Two types of potential changes. The left scenario is motor broken where the joint will always stay at $90\degree$. In the right scenario, we attached a 3D-printed plastic stick. (B) Motor broken: we can visualize the robot's original internal belief, its updated belief after continual learning and the current robot morphology. (C) Extended robot link visualizations.} \label{fig:damage-illustration} \end{figure*} \begin{figure*}[t!] \centering \includegraphics[width=0.9\linewidth]{figures_pdf/figure8.pdf} \caption{\textbf{Resiliency Tests.} In the first column, the learned visual self-model can detect the change or damage through the large error gap. In the middle column, the learn3d visual self-model can identify the specific type of change through the mismatch between the input joint values and the inferred joint values. In the last column, we show how the visual self-model can update its internal belief to match the current robot morphology.} \label{fig:resiliency-test} \end{figure*} With our proposed algorithm and the learned visual self-model, we tested the applicability of our method directly on these real world changes. Fig.\ref{fig:resiliency-test} presents several example results. The first step is to detect the change. As shown in the first column, our algorithm detected a clear gap between the original prediction errors and the current prediction errors. The obvious gaps suggest that our visual self-model can capture the changes happening on the robot body. The second step is to identify the specific type of change. In the first two examples, no matter what the input commands were to the robot, the second last joint was always inferred to be around $90\degree$ by solving the inverse problem with the newly observed morphology. This consistent mismatch indicates that the second last motor was broken and the angle stayed at $90\degree$. In the last two examples, even though we can detect that there were some changes from the first step, the inferred joint angles were still well-aligned with the input commands. Following our discussions earlier, our algorithm identified that there was a topology change on the robot body. Our results suggest that our visual self-model can be used to effectively solve inverse problems to help identify what body change or damage might have taken place. Importantly, our approach only requires a single 3D observation of the current robot to produce the above results to detect and further identify the damage. In the final step, our goal is to evaluate whether our visual self-model can quickly recover from the detected changes with only a few new observations. We first collected a few more observations of the current robot through random movements. With the new observations, we used them as the training data to continue the training of our existing visual self-model. Fig.\ref{fig:resiliency-test} plots the intermediate model performances on the test instance at every 10 epochs. We found that our model required $50$ examples to converge. Our visual self-model can quickly recover with the new training data after 100 epochs which took on average $8.13$ minutes in the real world on a single GPU. Another advantage of our visual self-model is its interpretability. In Fig.\ref{fig:damage-illustration}(B), we can visualize the internal belief of the robot before and after the damage adaption. Through these visualizations, we can inspect what the robot's internal belief looks like and whether the robot has successfully updated its belief to match the current robot morphology. These visualizations can be queried in an online fashion with about $2.4$ seconds on a single GPU. \subsection*{Discussion} We have introduced Neural 3D Visual Self-Model and algorithm designs on how to leverage it for 3D motion planning and control tasks. We have also constructed a pipeline to demonstrate the resiliency of the visual self-model from damage detection, identification and recovery. These innovations have equipped our visual self-model with several special properties that are particularly useful in real-world robotic applications. It is important to model the robot morphology in continuous 3D domain. We realized this with the implicit representations of the 3D shape where the input spatial coordinates and joint angles are both continuous. Thus, at inference time, one can query the 3D information of the robot morphology and kinematics at arbitrary spatial location given any joint angles in a highly memory efficient manner where the only storage cost is the weights of the network which is 1.1M. The queried resolution can also vary depending on the precision required for different tasks. Since the entire 3D robot morphology is modelled, the task solutions provided by our visual self-model can always consider relevant body part geometries when different parts of the robot interact with the environment. In order to better model the kinematic structure of the robot, learning the kinematic features of the robot together with its 3D morphology can be very helpful. Due to the decoupling of the spatial information distillation and kinematic information distillation, we can obtain a kinematic branch that explicitly learns the robot's kinematic structure. As we have shown in our ablation study, the kinematic branch captured precise end effector position given input joint angles. In fact, the kinematic branch trained together with the final SDF prediction produced more accurate predictions than a specialized network trained from scratch for end effector predictions. This suggests the importance of explicitly considering the entire robot morphology. Furthermore, making the entire visual self-model differentiable can speed up the planning process. Not only our entire visual self-model is differentiable, the model can also be queried at body parts instead of the entire body. The differentiability of the model allows us to easily perform back-propagation with respect to the input joint angles to solve inverse problems. Since the model can be queried with only subset of inputs that are of our current interests depending on the task, we only need to spend computational resources and time on the task-relevant components. Both benefits make the model super easy and efficient to work with. Lastly, our model can be easily distributed on GPUs. With one single GPU, our experiments already achieved highly efficient planning. With more computing resources, we expect that our model can reach even faster inference speed. There are several opportunities to improve our current approach in future works. Though our visual self-model runs fast for downstream task planning, the training costs about a day to obtain high quality results on a single GPU. For applications requiring faster convergence, the training time could potentially be reduced by applying meta-learning \cite{tancik2021learned} techniques to get better initialization of the neural network weights with a subset of the training data. Another possible solution is to employ an exploration policy \cite{goldberg1984active, bongard2005automatic, bohg2017interactive, ramakrishnan2019emergence} to select informative data samples over uniform random sampling, which may lower the total number of training data needed to obtain faster training speed and higher data efficiency. The second improvement can be noticed from the precision gap between the ground truth data from the simulation environment and the ground truth data from the real-world scans. As we have discussed in the Results section, this gap is caused by imprecise depth data, noisy camera calibrations and super sparse camera views. The current real data quality may not handle very fine-grained details. It is possible to improve the data quality with more dedicated depth sensors or more camera views. However, the dedicated 3D scanners often cost ten to hundreds of times more than our current solution. In our problem formulation, they also suffer from much slower scanning speed, limited scanning range and human efforts to manually posit the scanners around the robot. Another potential solution is to use more camera views. Therefore one may think of using structure from motion and multi-view stereo framework \cite{schoenberger2016sfm, schoenberger2016mvs} to reconstruct the 3D model of the robot. While these state-of-the-art techniques can provide high quality 3D reconstructions, in our trail on a GPU workstation, they required dozens or even hundreds of camera views and hours of processing time to obtain a single scan, which makes it difficult to scale these approaches to our problem setup. As a comparison, our current pipeline takes a few seconds to obtain a complete 3D mesh with only five camera views. The ideal solution should be both fast and accurate without too much human supervision during the scanning phase. Future progresses on hardware and software improvements along this direction can substantially improve the real-world data quality. Overall, our method opens up a new opportunity to learn a visual self-model of robots that is 3D-aware, continuous, memory efficient, differentiable and kinematics-aware for fast motion planning and control, with potentials to scale to other robotic platforms and applications such as locomotion and object interaction. \subsection*{Materials and Methods} Our visual self-model is consisted of three neural network components: a coordinate network, a kinematic network, and a network to fuse the coordinate features and kinematic features to produce the final SDF. The coordinate network is a single layer of MLP, and the kinematic network has four layers of MLPs. The output features from these two networks are concatenated along the feature dimension. The concatenated features are then sent into another four layers of MLPs to output the final SDF value. We used sine function as non-linear activations throughout the entire network to obtain high resolution details and initialized the network weights to preserve the distributions of the activations. We optimized the network for 2,000 epochs with Adam \cite{kingma2014adam} optimizer, and we implemented the entire network with PyTorch \cite{NEURIPS2019_9015} and PyTorch Lightning \cite{Falcon_PyTorch_Lightning_2019} framework. Our training used the batch size of $1.536 \times 10^5$ and the learning rate of $5 \times 10^{-5}$ on a single NVIDIA RTX 2080 Ti GPU. All the input data were normalized to have zero mean and a range of $[-1, 1]$. We followed previous work to minimize the following loss function when predicting the SDF value as an Eikonal boundary value problem \cite{sitzmann2020implicit}: \[L_{SDF} = \int_{\Omega} \vert\vert\ |\nabla_{\vb*{I}} H(\vb*{I}) | - 1 \vert\vert \mathop{d\vb*{I}} + \int_{\Omega_0} \vert\vert H(\vb*{I}) \vert\vert + (1 - \langle \nabla_{\vb*{I}} H(\vb*{I}), \textbf{n}(\vb*{X}) \rangle) \mathop{d\vb*{I}} + \int_{\Omega \setminus \Omega_0} \psi(H(\vb*{I})) \mathop{d\vb*{I}}, \] where $\vb*{I} = (\vb*{X}, \vb*{A})$ is the concatenation of the input coordinates and joint angles, $H = F \circ (C, K)$ and $\psi(\vb*{I}) = \textrm{exp}(-\alpha \cdot \vert H(\vb*{I}) \vert)$. $\Omega$ represents the whole spatial domain and $\Omega_0$ denotes the zero-level set. In total, there are three terms that sums up together to get the final loss. The first term constraints the norm of the spatial gradients of the on-surface points to be one. The second and the third term separately encourages the on-surface points and off-surface points to follow the definition of zero-level SDF. The on-surface points should stay close to zero values and ground truth normals, while the off-surface points should not have close to zero SDFs. During training, we sampled the same number of points for both on-surface and off-surface scenarios for every batch. \textbf{Funding:} This research was supported by DARPA MTO Lifelong Learning Machines (L2M) Program HR0011-18-2-0020, NSF NRI Award \#1925157, NSF CAREER Award \#2046910, and a gift from Facebook Research.\textbf{Author contributions:} B.C. and H.L. proposed the research; B.C. developed the main idea, algorithm designs, implementations, simulation and hardware experiments. H.L. and C.V. provided deep insights and guidance on the algorithm and experiment design. B.C., H.L., and C.V. performed numerical analysis. R.K. provided help on hardware experiments and was involved in the discussions. B.C., H.L., and C.V. wrote the paper; all authors provided feedback. \textbf{Data and materials availability:} We will open source all data and software codebase needed to evaluate the conclusion in the paper, the Supplementary Materials and our project website. Additional information can be addressed to B.C.
\section{Introduction} Generations of large-scale vorticity in turbulent flows have been investigated theoretically, experimentally and numerically in a number of studies due to various applications in geophysical, astrophysical and industrial flows (see, e.g., \cite{L83,P87,C94}). Using an analogy between the induction equation for magnetic field and the vorticity equation (see \cite{B53,M78}), it has been proposed in \cite{MST83,KMT91,CMP94} that the large-scale vorticity can be generated due to a large-scale instability by the kinetic $\alpha$ effect in a helical turbulence with a net kinetic helicity. The kinetic helicity and the kinetic $\alpha$ effect can be produced in rotating density stratified or inhomogeneous turbulence. Another possibility for a generation of large-scale vorticity is related to anisotropic kinetic $\alpha$ effect referred as the AKA effect \cite{FSS87,FSS88,KRK94}, which is caused by a non-Galilean invariant forcing. For example, boundaries can break the Galilean invariance which results in an anisotropic kinetic $\alpha$ effect \cite{BR01}, resulting in a large-scale instability. In astrophysics, a turbulence driven by non-Galilean invariant forcing can exist in galaxies (e.g., supernova-driven turbulence \citep{KKBS99,KGVS18} and the turbulent wakes driven by galaxies moving through the galaxy cluster \citep{RSS89}). In a non-conducting fluid, a non-helical turbulence with an imposed large-scale velocity shear can cause a large-scale instability resulting in generation of the large-scale vorticity due to a combined effect of the large-scale shear motions and Reynolds stress-induced production of perturbations of mean vorticity \citep{EKR03,EGKR07}. This effect referred as ''vorticity dynamo" has been also confirmed in direct numerical simulations (DNS) \cite{YHSKR08,PMB09}. This mechanism of the generation of the large-scale vorticity is also associated with the Prandtl's first and second kinds of secondary flows \cite{P52,B87}. In particular, the skew-induced streamwise mean vorticity generation arises at the lateral boundaries of three-dimensional thin shear layers and corresponds to the Prandtl's first kind of secondary flows. In turbulent flows, the streamwise mean vorticity can be generated by the Reynolds stress, and this mechanism is associated with formation of the Prandtl's second kind of turbulent flows \cite{B87}. A large-scale vorticity also can be produced by a combined effect of a rotating incompressible turbulence and inhomogeneous kinetic helicity \cite{YY93,YB16,IYH17,KR18} or due to a combined action of a density stratified rotating homogeneous turbulence and uniform kinetic helicity \cite{KR18}. These effects result in the formation of a large-scale shear, and in turn its interaction with the small-scale turbulence causes an excitation of the large-scale instability (the vorticity dynamo) due to a combined effect of the large-scale shear and Reynolds stress-induced generation of the mean vorticity \cite{KR18}. Recent DNS have shown that large-scale vortices in rapidly rotating turbulent convection can be formed in compressible \cite{C07,PMH11,MPH11} or Boussinesq fluids \cite{CHJ14,CHJ15,RJK14,FSP14,FGK19}. The produced large-scale motions include cyclonic vortices and anti-cyclonic vortices. It was found that in the cyclonic vortices the temperature is depleted \cite{PMH11,MPH11}. In the present study we develop a theory of the generation of the large-scale vorticity in a fast rotating turbulent convection with inhomogeneous fluid density in anelastic approximation. A particular case when gravity is along rotational axis has been considered. We have found a large-scale instability which results in an excitation of two modes. For the mode with dominant vertical vorticity, the mean velocity is independent of the vertical coordinate. This mode can be excited in both, a fast rotating density stratified hydrodynamic turbulence and fast rotating density stratified turbulent convection. We have demonstrated that for this mode, the mean entropy is depleted inside the cyclonic vortices in agreement with \cite{PMH11,MPH11}. For the second mode, the horizontal component of the mean vorticity is dominant, and the mean momentum is independent of the vertical coordinate. This study may be relevant to formation mechanisms of large spots observed in the form of immense storms in great planets (e.g., the Great Red Spot in Jupiter and large spots in Saturn, see, e.g., \cite{M93,SL91,HA07}), and it may be useful for explanation of an origin of high-latitude spots seen in Doppler imaging in rapidly rotating late-type stars \cite{PMH11,MPH11}. This paper is organized as follows. In Section II we consider the effect of fast rotation on the Reynolds stress and the effective force. Here we outline the method of derivations and approximations made for study of this effect. Using mean-field equations and the derived rotational contributions to the Reynolds stress, we study in Section III the large-scale instability causing the generation of the large-scale vorticity in a fast rotating turbulent convection with inhomogeneous fluid density along the rotational axis. Finally, conclusions are drawn in Section V. In Appendix A we present details of the derivation of equation for the rotational contributions to the Reynolds stress. In Appendix~B we give an explicit form for the mean-field equations describing the large-scale instability which results in generation of the mean vorticity for different modes. In Appendix~C we discuss the role of the centrifugal force in the production of large-scale vorticity. The centrifugal force causes the inhomogeneous density distribution in the plane perpendicular to the angular velocity ${\bm \Omega}$. We have shown in Appendix~C that a combined effect of a fast rotation and horizontal inhomogeneity of the fluid density (caused by the centrifugal force) results in the production of the large-scale vertical vorticity in an anisotropic isothermal turbulence. \section{Effect of fast rotation on the Reynolds stress and the effective force} To derive mean-field equations which describe generation of the large-scale vorticity, we consider a small-scale low-Mach-number fast rotating density stratified turbulent convection in anelastic approximation with equation of state for the ideal gas. To investigate effect of fast rotation on the Reynolds stress in a turbulent convection with inhomogeneous fluid density, we use a mean field approach whereby the velocity, pressure and entropy are decomposed in the mean and fluctuating parts. An ensemble averaging of the momentum and entropy equations yields the equations for mean velocity, $\meanUU(t,{\bm x})$, and mean entropy, $\meanS(t,{\bm x})$, in the reference frame rotating with the constant angular velocity ${\bm \Omega}$: \begin{eqnarray} {\partial \meanU_i \over \partial t} &+& (\meanUU \cdot \bec{\nabla}) \meanU_i = - \nabla_i \left({\meanP \over \rho_0} \right) - g_i \meanS + 2 (\meanUU \times {\bm \Omega})_i \nonumber\\ &-& {1 \over \rho_0} \nabla_j \left(\rho_0 \langle u'_{i} \, u'_{j}\rangle \right), \label{SSA5}\\ {\partial \meanS \over \partial t} &+& (\meanUU \cdot \bec{\nabla}) \meanS = - (\meanUU \cdot \bec{\nabla}) S_0 - {1 \over \rho_0} \bec{\nabla} \cdot \left(\rho_0 \langle {\bm u'} \, s' \rangle \right) , \nonumber\\ \label{SSA6} \end{eqnarray} where $\meanS= \meanT/T_0 - (1-\gamma^{-1})\meanP/P_{0}$, $\meanT$ and $\meanP$ are the mean entropy, the mean temperature and the mean pressure, respectively, $\gamma$ is the ratio of specific heats, ${\bm u}'$ and $s'$ are fluctuations of the fluid velocity and entropy, $\langle u'_{i} \, u'_{j}\rangle$ is the Reynolds stress describing turbulent viscosity and rotational effects to turbulent convection, $\langle {\bm u'} \, s' \rangle$ is the turbulent flux of entropy, $T_0$, $P_0$, $S_0$ and $\rho_0$ are the fluid temperature, pressure, entropy, and density, respectively, in the basic reference state and $\bec{\nabla} S_0 = (\gamma P_{0})^{-1} \bec{\nabla} P_{0} - \rho_{0}^{-1} \bec{\nabla} \rho_{0}$. The variables with the subscript $ "0" $ correspond to the hydrostatic nearly isentropic basic reference state defined by $\bec{\nabla} P_{0} = \rho_{0} {\bm g}$ and ${\bm g} \cdot \bec{\nabla} S_0 \approx 0$, where ${\bm g}$ is the acceleration due to the gravity. In Eqs.~(\ref{SSA5})--(\ref{SSA6}) we neglect small molecular viscosity and heat conductivity terms. To derive equations for the rotational contributions to the Reynolds stress, we follow the method that is developed in \cite{KR18,RK18} and outlined below (see, for details Appendix A). We use equations for fluctuations of velocity ${\bm u}'$ and entropy $s'= \theta/T_0 - (1-\gamma^{-1})p'/P_{0}$: \begin{eqnarray} {\partial {\bm u}' \over \partial t} &=& - (\meanUU \cdot \bec{\nabla}) {\bm u}' - ({\bm u}' \cdot \bec{\nabla}) \meanUU - \bec{\nabla} \biggl({p' \over \rho_{0}}\biggr) - {\bm g} \, s' \nonumber\\ & & + 2 {\bm u}' \times {\bm \Omega} + {\bm U}^{N}, \label{KA1} \\ {\partial s' \over \partial t} &=& - ({\bm u}' \cdot \bec{\nabla}) \meanS - (\meanUU \cdot \bec{\nabla}) s' + S^{N}, \label{KA2} \end{eqnarray} where $p'$ and $\theta$ are fluctuations of fluid pressure and temperature, respectively, ${\bm U}^{N}=\langle ({\bm u}' \cdot \bec{\nabla}) {\bm u}' \rangle - ({\bm u}' \cdot \bec{\nabla}) {\bm u}'$ and $S^{N}=\langle ({\bm u}' \cdot \bec{\nabla}) s \rangle - ({\bm u}' \cdot \bec{\nabla}) s$ are the nonlinear terms, and the angular brackets imply ensemble averaging. In Eqs.~(\ref{KA1})--(\ref{KA2}) we neglect small molecular viscosity and heat conductivity terms. Equation~(\ref{KA1}) is written in the reference frame rotating with the constant angular velocity ${\bm \Omega}$. The turbulent convection is considered as a small deviation from a well-mixed adiabatic reference state. The equations for fluctuations of velocity and entropy are obtained by subtracting equations~(\ref{SSA5})--(\ref{SSA6}) for the mean fields from the corresponding equations for the total velocity $\meanUU + {\bm u}'$ and entropy $\meanS + s'$ fields. The fluid velocity for a low Mach number flows with strong inhomogeneity of the fluid density $\rho_0$ along the gravity field is assumed to be satisfied to the continuity equation written in the anelastic approximation, ${\rm div} \, (\rho_0 \, \meanUU) = 0$ and ${\rm div} \, (\rho_0 \, {\bm u}') = 0$. To study the effects of fast rotation on the Reynolds stress in density stratified turbulent convection, we perform the derivations which include the following steps: (i) using new variables for fluctuations of velocity ${\bm v} = \sqrt{\rho_0} \, {\bm u}' $ and entropy $s = \sqrt{\rho_0} \, s'$; (ii) derivation of the equations for the second-order moments of the velocity fluctuations $\langle v_i \, v_j \rangle$, the entropy fluctuations $\langle s^2 \rangle$ and the turbulent flux of entropy $\langle v_i \, s \rangle$ in the ${\bm k}$ space; (iii) application of the multi-scale approach \cite{RS75} that allows us to separate turbulent scales from large scales; (iv) adopting the spectral $\tau$ approximation \cite{O70,PFL76,KRR90} (see below); (v) solution of the derived second-order moment equations in the ${\bm k}$ space; (vi) returning to the physical space to obtain expression for the Reynolds stress as the function of the rotation rate $\Omega$. The derived equations for the second-order moments of the velocity fluctuations $\langle v_i \, v_j \rangle$, the entropy fluctuations $\langle s^2 \rangle$ and the turbulent flux of entropy $\langle v_i \, s \rangle$ [see Eqs.~(\ref{KB3})--(\ref{KB5}) in Appendix~A], include the first-order spatial differential operators $\hat{\cal N}$ applied to the third-order moments $M^{(III)}$. A problem arises how to close the system of the second-moment equations, i.e., how to express the set of the third-moment terms $\hat{\cal N} M^{(III)}({\bm k})$ through the lower moments (see, e.g., \cite{O70,MY75,Mc90}). Various approximate methods have been proposed to solve this problem. In the present study we use the spectral $\tau$ approximation (see, e.g., \cite{O70,PFL76,KRR90})), which postulates that the deviations of the third-moment terms, $\hat{\cal N} M^{(III)}({\bm k})$, from the contributions to these terms afforded by the background fast rotating turbulent convection, $\hat{\cal N} M^{(III,0)}({\bm k})$, are expressed through the similar deviations of the second-order moments, $M^{(II)}({\bm k})-M^{(II,0)}({\bm k})$ in the relaxation form: \begin{eqnarray} && \hat{\cal N}M^{(III)}({\bm k}) - \hat{\cal N}M^{(III,0)}({\bm k}) \nonumber\\ && \quad \quad \quad \quad \quad = -{M^{(II)}({\bm k}) - M^{(II,0)}({\bm k}) \over \tau_r(k)} , \label{B6} \end{eqnarray} see for details, Eqs.~(\ref{KBBB6})-(\ref{RBBB6}) in Appendix~A. Here the correlation functions with the superscript $(0)$ correspond to the background fast rotating turbulent convection with zero spatial derivatives of the mean velocity, $\nabla_{i} \meanU_{j} = 0$. The time $\tau_r (k)$ is the characteristic relaxation time of the statistical moments, which can be identified with the correlation time $\tau(k)$ of the turbulent velocity field for large Reynolds numbers. Validations of the $\tau$ approximation for different situations have been performed in various direct numerical simulations \citep{BK04,BS05,BS05B,RKKB11,HKRB12,BRK12,RKBE12,EKLR17,RKB18} (see also discussion in Sect.~IV). The $\tau$ approximation is a sort of the high-order closure and in general is similar to Eddy Damped Quasi Normal Markovian (EDQNM) approximation. However some principle difference exists between these two approaches \cite{O70,PFL76}. The EDQNM closures do not relax to equilibrium (the background turbulence), and the EDQNM approach does not describe properly the motions in the equilibrium state in contrast to the $\tau$ approximation. Within the EDQNM theory, there is no dynamically determined relaxation time, and no slightly perturbed steady state can be approached. In the $\tau$ approximation, the relaxation time for small departures from equilibrium is determined by the random motions in the equilibrium state, but not by the departure from the equilibrium. As follows from the analysis in \cite{O70}, the $\tau$ approximation describes the relaxation to the equilibrium state (the background turbulence) much more accurately than the EDQNM approach. We apply the $\tau$ approximation only to study the deviations from the background turbulent convection which are caused by the spatial derivatives of the mean velocity. The background fast rotating turbulent convection is assumed to be known (see below). The $\tau$ approximation is only valid for large Reynolds numbers, where the relaxation time can be clearly identified with the turbulence correlation time. We use the model of the background homogeneous turbulent convection with inhomogeneous fluid density distribution along the gravity field which takes into account an anisotropy of turbulent convection caused by the fast rotation [see Eqs.~(\ref{KB15})--(\ref{KB16}) in Appendix~A]. We assume that the background turbulent convection is of Kolmogorov type with constant flux of energy over the spectrum, i.e., the kinetic energy spectrum function for the range of wave numbers $k_0<k<k_\nu$ is $E(k) = - d \bar \tau(k) / dk$, the function $\bar \tau(k) = (k / k_{0})^{1-q}$ with $1 < q < 3$ being the exponent of the kinetic energy spectrum ($q = 5/3$ for a Kolmogorov spectrum). Here $k_{\nu} = 1 / \ell_{\nu}$ is the wave number based on the viscous scale $\ell_{\nu}$, and $k_{0} = 1 / \ell_{0} \ll k_\nu$, where $\ell_{0}$ is the integral (energy containing) scale of turbulent motions. The turbulent correlation time in ${\bm k}$ space is $\tau(k) = 2\tau_{_{\Omega}} \, \bar \tau(k)$, where the effect of rotation on the turbulent correlation time, $\tau_{_{\Omega}}$, is described just by an heuristic argument. In particular, we assume that \begin{eqnarray} \tau_{_{\Omega}} = {\tau_0 \over [1 + C_\tau \, \Omega^2 \, \tau_0^2]^{1/2}} . \label{AAA21} \end{eqnarray} Here the dimensionless constant $C_\tau \sim 1$ and $\tau_0 = \ell_{0} /u_{0}$ with the characteristic turbulent velocity $u_0$ in the integral scale of turbulence $\ell_0$. In particular, the squared inverse time-scale $\tau_{_{\Omega}}^{-2}$ is considered as a linear combination of the two simple squared inverse time-scales: $\tau_0^{-2}$ and $\Omega^2$: \begin{eqnarray} \tau_{_{\Omega}}^{-2}= \tau_0^{-2} + C_\tau \Omega^2 . \label{AA21} \end{eqnarray} For fast rotation, $\Omega \, \tau_0 \gg 1$, the parameter $\Omega \, \tau_{_{\Omega}}$ tends to be limiting value $C_\tau^{-1/2}$. The above described procedure yields the rotational contribution to the Reynolds stress, and the effective force, ${\cal F}_i^\Omega = \rho_0 \, \langle v_i \, v_j \rangle^\Omega e_j / H_\rho$ for a fast rotating density stratified turbulent convection or for a fast rotating density stratified anisotropic homogeneous turbulence, where $H_\rho = (|\bec{\nabla} \rho_0| / \rho_0)^{-1}$ is the density stratification hight, $\langle v_i \, v_j \rangle^\Omega$ are the rotational contributions to the Reynolds stress given by Eqs.~(\ref{I1})--(\ref{I2}) in Appendix~A and ${\bm e}$ is the vertical unit vector along the $z$ axis (in the direction opposite to the gravity acceleration). The components of the effective force are given by \begin{eqnarray} {\cal F}_x^\Omega &=& - 2 (A_F-A_u) \, \rho_0 \, \nu_{_{T}} \, \Omega \tau_0 \, {\ell_0^2 \over H_\rho^3} \, \nabla_z \meanU_y , \label{I3}\\ {\cal F}_y^\Omega &=& -2 \, \rho_0 \, \nu_{_{T}} \, \Omega \tau_0 \, {\ell_0^2 \over H_\rho^3} \, \biggl[(A_F+A_u)\nabla_x \meanU_z \nonumber\\ &&- (A_F-A_u) \meanW_y \biggr] , \label{I4}\\ {\cal F}_z^\Omega &=& -(5 A_F+ 4A_u) \, \rho_0 \, \nu_{_{T}} \, \Omega \tau_0 \, {\ell_0^2 \over H_\rho^3} \, \nabla_x \meanU_y , \label{I5} \end{eqnarray} where $\meanWW=\bec{\nabla} {\bm \times} \, \meanUU$ is the mean vorticity, $\nu_{_{T}}=\tau_0 u_0^2/6$ is the turbulent viscosity, \begin{eqnarray} A_F &=& {9(q-1) \over 2(2q-1)} \, {\varepsilon_{_{F}} \, \tau_0 \, F_\ast g \over \rho_0 u_0^2} , \label{I6a}\\ A_u &=& {3(q-1) \over 3q-1} \, {\varepsilon_u \over 1+ \varepsilon_u} , \label{I6b} \end{eqnarray} $F_\ast = \rho_0 \, \langle u'_z \, s' \rangle$, the parameter $\varepsilon_u$ is the degree of anisotropy of turbulent velocity field in the background turbulence and the parameter $\varepsilon_{_{F}}$ is the degree of thermal anisotropy of the background turbulence [see Eqs.~(\ref{KB15})--(\ref{KB16}) in Appendix A]. The details of the derivation of Eqs.~(\ref{I3})--(\ref{I5}) are given in Appendix~A. These equations are derived using the following conditions: $\Omega \tau_0 \gg 1$ and the turbulent integral scale $\ell_0$ is much smaller than the density stratification scale $H_\rho$ and the characteristic horizontal scale $L_x$ of variations of the mean velocity $\meanUU$ (i.e., $\ell_0 \ll H_\rho; L_x$). We also assumed that the density stratification scale $H_\rho$ is much smaller than the characteristic vertical scale $L_z$ of variations of the mean velocity $\meanUU$. To introduce anisotropy of turbulent velocity field in the background turbulence caused by a fast rotation, we consider an anisotropic turbulence as a combination of a three-dimensional isotropic turbulence and two-dimensional turbulence in the plane perpendicular to the rotational axis. The degree of anisotropy $\varepsilon_u$ is defined as the ratio of turbulent kinetic energies of two-dimensional to three-dimensional motions. The degree of thermal anisotropy $\varepsilon_{_{F}}$ determines the contribution of the two-dimensional turbulence to the heat flux. The anisotropy parameters $\varepsilon_u$ and $\varepsilon_{_{F}}$ appeared in the model of the background turbulent rotating convection depend on the Coriolis number Co=$2 \Omega \tau_0$. For a slow rotation (small Coriolis numbers or large Rossby numbers), the parameters $\varepsilon_u \to 0$ and $\varepsilon_{_{F}} \to 0$. For a fast rotation (very large Coriolis numbers or very small Rossby numbers), the parameters $\varepsilon_u \gg 1$ and $\varepsilon_{_{F}} \sim 1$. In this case the background turbulent convection is a highly anisotropic nearly two-dimensional turbulence, and the main rotational contributions to the Reynolds stress are from the two-dimensional part of turbulence. Formally, in the present study where we investigate a fast rotating turbulent convection, these parameters are not specified, but they should satisfy the following conditions $\varepsilon_u \gg 1$ and $\varepsilon_{_{F}} \sim 1$. In the derivation of the expressions for the Reynolds stress and the effective force, we take into account the terms which are linear in the angular velocity and drop the terms that are quadratic in the angular velocity. The reason is that the terms that are proportional to the angular velocity causes generation of large-scale vorticity, while the terms that are quadratic in the angular velocity yield small contributions to the anisotropic part of the turbulent viscosity. The latter effect is neglected in the present study. On the other hand, we have taken into account the dominant contributions to the Reynolds stress and the effective force which are caused by the effect of fast rotation on turbulent convection. \section{Mean-field dynamics and large-scale instability} In this section we study large-scale instability resulting in generation of the large-scale vorticity. Using the derived equations~(\ref{I3})--(\ref{I5}) for the effective force, the Navier-Stokes equation~(\ref{SSA5}) for the mean velocity $\meanUU$ and the equation for the mean vorticity $\meanWW=\bec{\nabla} {\bm \times} \, \meanUU$, we investigate the large-scale instability. For simplicity, we consider the case with the angular velocity along $z$ axis (opposite to the gravity field). The linearized equations for $\meanU_y$ and $\meanW_y$ are given by: \begin{eqnarray} &&{\partial \meanU_y \over \partial t} = - 2 \, \meanU_x \Omega + {{\cal F}_y^\Omega \over \rho_0} + {\nu_{_{T}} \over \rho_0} \bec{\nabla} \cdot (\rho_0 \bec{\nabla} \meanU_y) , \nonumber\\ \label{C1} \\ &&{\partial \meanW_y \over \partial t} = 2 \Omega \, \nabla_z \meanU_y + \left(\bec{\nabla} {\bm \times} \, {\bec{\cal F}^\Omega \over \rho_0} \right)_y + {\nu_{_{T}} \over \rho_0} \bec{\nabla} \cdot (\rho_0 \bec{\nabla} \meanW_y) \nonumber\\ && \quad \quad - g \nabla_z \meanS . \label{C2} \end{eqnarray} We introduce new variables $\meanV(t,x,z)$ and $\meanPhi(t,x,z)$: \begin{eqnarray} \rho_0 \meanUU = [\meanV(t,x,z) \rho_0^{1/2}] {\bm e}_y + \bec{\nabla} {\bm \times} \, [\meanPhi(t,x,z) \rho_0^{1/2}] {\bm e}_y, \nonumber\\ \label{CCC2} \end{eqnarray} which corresponds to axi-symmetric problem. In the new variables Eqs.~(\ref{C1}) and~(\ref{C2}) are given by Eqs.~(\ref{I7}) and~(\ref{I8}) (see Appendix~B). First, we consider a mode with the mean velocity that is independent of $z$, i.e., we seek for a solution of Eqs.~(\ref{I7}) and~(\ref{I8}) in the following form: $\meanV, \meanPhi \propto \exp(-\lambda z/2) \, \exp(\gamma_{\rm inst} t + i K_x X)$. Substituting this solution into Eqs.~(\ref{I7}) and~(\ref{I8}), we obtain the growth rate of the large-scale instability resulting in the generation of this mode: \begin{eqnarray} \gamma_{\rm inst} &=&\Omega \, {\ell_0^2 \over H_\rho^2} \biggl[{3 (q-1) \over 2(2q-1)} \biggl({5 \varepsilon_{_{F}} \tau_0 \, F_\ast \, g \over \rho_0 u_0^2} \nonumber\\ && + {4(2q-1) \over 3(3q-1)} \, {\varepsilon_u \over 1+ \varepsilon_u} \biggr)\biggr]^{1/2}- \nu_{_{T}} K_x^2 . \nonumber\\ \label{I9b} \end{eqnarray} This mode is with a dominant vertical mean vorticity, $\meanW_z/\meanW_y \sim (H_\rho L_x) / \ell_0^2 \gg 1$, where $L_x=2 \pi/K_x$. It follows from Eq.~(\ref{I9b}) that the large-scale instability for this mode can be excited even for a hydrodynamic anisotropic turbulence (i.e., when there is no turbulent convection, $F_\ast =0$). The mechanism of the large-scale instability resulting in the generation of the dominant vertical mean vorticity, $\meanW_z=\nabla_x \meanU_y$, is as follows. The Coriolis force for a fast rotation strongly modifies turbulence and the Reynolds stress, so that the second term in Eq.~(\ref{C2}) does not vanish, $[\bec{\nabla} {\bm \times} \, (\bec{\cal F}^\Omega / \rho_0)]_y \not=0$. This term depends on $\meanU_y$ [see Eqs.~(\ref{I5}) and~(\ref{C2})]. The horizontal component of the mean vorticity $\meanW_y$ is produced by this key term, $[\bec{\nabla} {\bm \times} \, (\bec{\cal F}^\Omega / \rho_0)]_y$, which is caused by the effective force, i.e., $\partial \meanW_y / \partial t \sim [\bec{\nabla} {\bm \times} \, (\bec{\cal F}^\Omega / \rho_0)]_y$, see Eq.~(\ref{C2}). On the other hand, the velocity component $\meanU_y$ is produced by the Coriolis force, $\partial \meanU_y / \partial t \sim - 2 \, \meanU_x \Omega$ [see Eq.~(\ref{C1})], which closes the generation loop. Here we took into account that the Coriolis force is much larger than the effective force, i.e., the ratio $|2 \, \meanU_x \Omega|/ |{\cal F}_y^\Omega / \rho_0| \sim L_x H_\rho^3 /\ell_0^4~\gg~1$. Usually for a fast rotation, inertial waves characterised by the dispersion relation, $\omega=2 ({\bm \Omega} \cdot {\bm K})/K$, are dominant and they decrease the growth rate of instabilities for different modes. However, since for the considered mode the vertical derivative $\nabla_z \meanU_y=0$, the contribution of this effect (caused by the inertial waves) to the growth rate of the large-scale instability for this mode vanishes. Let us study the evolution of the mean entropy $\meanS$ in this mode. The linearised equation~(\ref{SSA6}) for $\meanS$ reads: \begin{eqnarray} &&{\partial \meanS \over \partial t} = - \meanU_z \nabla_z S_0 + \rho_0^{-1} \bec{\nabla} \cdot (\rho_0 \kappa_{_{T}} \bec{\nabla} \meanS) , \label{MM1} \end{eqnarray} where $\kappa_{_{T}}$ is the coefficient of turbulent diffusion. This implies that \begin{eqnarray} \meanS = {\meanU_z |\nabla_z S_0| \over \gamma_{\rm inst} + \kappa_{_{T}} K_x^2} = - {\meanW_z H_\rho \over 2 \Omega} \, \left({\gamma_{\rm inst} + \nu_{_{T}} K_x^2 \over \gamma_{\rm inst} + \kappa_{_{T}} K_x^2} \right) \, |\nabla_z S_0|, \nonumber\\ \label{MM2} \end{eqnarray} where we use the solutions for the vertical mean velocity $\meanU_z = K_x \Phi_\ast \cos(K_x X + \varphi) \exp(\gamma_{\rm inst} t)$, and the vertical mean vorticity $\meanW_z = K_x V_\ast \cos(K_x X + \varphi) \exp(\gamma_{\rm inst} t)$. Here the ratio of amplitudes $V_\ast/\Phi_\ast$ for this mode is \begin{eqnarray} {V_\ast \over \Phi_\ast} = - {2 \Omega \over H_\rho (\gamma_{\rm inst} + \kappa_{_{T}} K_x^2)} . \label{MM3} \end{eqnarray} In Eq.~(\ref{MM3}) we neglect the small terms $\sim$ O$(\ell_0^2/H_\rho^2)$. Thus, the solution for the mean entropy is $\meanS = - S_\ast \cos(K_x X + \varphi) \exp(\gamma_{\rm inst} t)$. Equation~(\ref{MM2}) implies that inside the cyclonic vortices where the perturbations of the vertical mean vorticity are positive ($\meanW_z > 0$), the perturbations of the mean entropy are negative ($\meanS < 0$). Therefore, inside the cyclonic vortices the mean entropy is reduced. On the other hand, inside the anti-cyclonic vortices where the perturbations of the vertical mean vorticity are negative ($\meanW_z < 0$), the perturbations of the mean entropy are positive ($\meanS > 0$). Therefore, inside the anti-cyclonic vortices the mean entropy is increased. There is also another mode for which the negative contribution caused by the inertial waves to the growth rate of the instability for this mode vanishes. Indeed, for this mode a solution of Eqs.~(\ref{I7}) and~(\ref{I8}) has the following form: $\meanV, \meanPhi \propto \exp(\lambda z/2) \, \exp(\gamma_{\rm inst} t + i K_x X)$. This is a mode with the mean momentum, $\rho_0 \meanUU$, that is independent of $z$. Substituting this solution into Eqs.~(\ref{I7}) and~(\ref{I8}), we obtain the growth rate of the large-scale instability resulting in the generation of this mode: \begin{eqnarray} &&\gamma_{\rm inst}= \Omega \, {\ell_0^2 \over H_\rho^2} \left[{6 (q-1) \, \varepsilon_{_{F}} \tau_0 \, F_\ast \, g \over (2q-1) \,\rho_0 u_0^2} \right]^{1/2} - \nu_{_{T}} K_x^2 . \label{I9} \end{eqnarray} This mode is with a dominant horizontal mean vorticity, i.e., $\meanW_z/\meanW_y \sim \ell_0^2 / (H_\rho L_x) \ll 1$. It follows from Eq.~(\ref{I9}) that the large-scale instability for this mode can be excited only in turbulent convection (when $F_\ast \not=0)$. For this mode the component of the mean velocity $\meanU_x=0$, and the component $\meanU_y$ is produced by the effective force ${\cal F}_y^\Omega / \rho_0$ [see Eq.~(\ref{C1})]. On the other hand, the dominant horizontal mean vorticity $\meanW_y$ is produced by the term $2 \Omega \, \nabla_z \meanU_y$ caused by the Coriolis force [see Eq.~(\ref{C2})], which closes the generation loop. Let us check if the obtained results are consistent with the Taylor-Proudman theorem. For a fast rotating laminar flow, the Taylor-Proudman theorem implies that the leading-order balance in the equation for the vorticity for large Coriolis number (small Rossby numbers) is $({\bm \Omega} \cdot {\bm \nabla}) {\bm U} =0$. This implies that the velocity is independent of the vertical coordinate $z$, where ${\bm \Omega}=\Omega {\bm e}_z$. For the mode with the dominant vertical mean vorticity, the mean velocity is independent of $z$. This implies that this mode is consistent with the Taylor-Proudman theorem. On the other hand, for the mode with the dominant horizontal mean vorticity, the mean momentum is independent of $z$, while the mean velocity depends on $z$, so that this mode is not consistent with the Taylor-Proudman theorem. \section{Discussion and conclusions} In the present study we have considered a fast rotating turbulence or turbulent convection with inhomogeneous fluid density along the rotational axis in anelastic approximation. A large-scale instability exciting at large Coriolis number has been found, which causes generation of large-scale vorticity for two key modes with dominant vertical or horizontal components. The effective force caused by the rotational contribution to the Reynolds stress in small-scale turbulent convection in combination with the Coriolis force in the mean-field momentum equation are the main effects resulting in the generation of the large-scale vorticity due to the excitation of the large-scale instability. The mode with the vertical vorticity can be generated in both, a fast rotating density stratified hydrodynamic turbulence and turbulent convection, while the mode with the dominant horizontal vorticity can be excited only in a fast rotating density stratified turbulent convection. When the density stratification hight $H_\rho \to \infty$ (i.e., when the fluid density is uniform), the large-scale instability found in the present study cannot be excited [see Eqs.~(\ref{I9b}) and~(\ref{I9}) for the growth rates of the instability]. This implies that this theory cannot describe formation of large-scale vortices observed in the Boussinesq turbulent convection with ${\rm div} \, {\bm u} = 0$ (see Refs.~\cite{CHJ14,CHJ15,RJK14,FSP14,FGK19}). Our theory is developed for a low-Mach number fast rotating turbulent convection with inhomogeneous fluid density, which corresponds to the set-ups of DNS described in Refs.~\cite{PMH11,MPH11}. However, in DNS on the large-scale vorticity growth, it is very difficult to observe the kinematic stage of the evolution of the large-scale vorticity with an exponential growth. Usually in DNS it is only seen the nonlinear evolution of the large-scale vorticity. This implies that it is very difficult to make quantitative comparisons between the kinematic mean-field theory for the large-scale vorticity growth and DNS. We have only performed a qualitative comparison with the DNS described in Refs.~\cite{PMH11,MPH11}. In particular, we confirm the existence of the threshold in the Coriolis number for the generation of the large-scale vorticity. The critical Coriolis number should be much larger than 1. The derived mean-field equations describe formations of both, cyclonic and anti-cyclonic large-scale vortices in the kinematic (linear) stage of the instability. As in the DNS, we also find the similar behaviour of the mean entropy or temperature inside cyclonic and anti-cyclonic vortices. For example, we have shown that for the mode with the dominant vertical mean vorticity, the mean entropy is decreased inside the cyclonic vortices and increased inside the anti-cyclonic vortices in agreement with \cite{PMH11,MPH11}. To derive equations for the rotational contribution to the Reynolds stress and the effective force in fast rotating density stratified turbulent convection, we apply the spectral $\tau$ approximation (see Sect.~II). The $\tau$ approximation is an universal tool in turbulent transport that allows to obtain closed results and compare them with the results of laboratory experiments, observations and numerical simulations. The $\tau$ approximation reproduces many well-known phenomena found by other methods in turbulent transport of particles, temperature and magnetic fields, in turbulent convection and stably stratified turbulent flows (see below). In turbulent transport, the $\tau$ approximation yields correct formulae for turbulent diffusion, turbulent thermal diffusion and turbulent barodiffusion \cite{EKR96,BF03}. The phenomenon of turbulent thermal diffusion (a nondiffusive streaming of particles in the direction of the mean heat flux), has been predicted using the stochastic calculus (the path integral approach), the quasi-linear approach and the $\tau$ approximation. This phenomenon has been already detected in laboratory experiments in oscillating grids turbulence \cite{EEKR04} and in a multi-fan produced turbulence \cite{EEKR06} in both, stably and unstably stratified fluid flows. The phenomenon of turbulent thermal diffusion has been also detected in direct numerical simulations \cite{HKRB12,BRK12,RKB18}. The numerical and experimental results are in a good agreement with the theoretical studies performed by means of different approaches (see \cite{EKR96,PM02}). The $\tau$ approximation reproduces the well-known $k^{-7/3}$-spectrum of anisotropic velocity fluctuations in a sheared turbulence (see \cite{EKRZ02}). This spectrum was previously found in analytical, numerical, laboratory studies and was observed in the atmospheric turbulence (see, e.g., \cite{L67}). In the turbulent boundary layer problems, the $\tau$ approximation yields correct expressions for turbulent viscosity, turbulent thermal conductivity and the classical heat flux. This approach also describes the counter wind heat flux and the Deardorff's heat flux in convective boundary layers (see \cite{EKRZ02}). These phenomena have been previously studied using different approaches (see, e.g., \cite{MY75,Mc90,Z91}). The theory of turbulent convection \cite{EKRZ02} based on the $\tau$ approximation explains the recently discovered hysteresis phenomenon in laboratory turbulent convection \cite{EEKRM06}. The results obtained using the $\tau$ approximation allow also to explain the most pronounced features of typical semi-organized coherent structures observed in the atmospheric convective boundary layers ("cloud cells" and "cloud streets") \cite{ET85}. The theory \cite{EKRZ02} based on the $\tau$ approximation predicts realistic values of the following parameters: the aspect ratios of structures, the ratios of the minimum size of the semi-organized structures to the maximum scale of turbulent motions and the characteristic lifetime of the semi-organized structures. The theory \cite{EKRZ02} also predicts excitation of convective-shear waves propagating perpendicular to the convective rolls ("cloud streets"). These waves have been observed in the atmospheric convective boundary layers with cloud streets \cite{ET85}. A theory \cite{ZEKR07,ZKR08,ZKR09,ZKR13,KRZ19} for stably stratified atmospheric turbulent flows based on both, the budget equations for the key second moments, turbulent kinetic and potential energies and vertical turbulent fluxes of momentum and buoyancy, and the $\tau$ approximation is in a good agrement with data from atmospheric and laboratory experiments, direct numerical simulations and large-eddy simulations (see detailed comparison in \cite{ZEKR07,ZKR13}). The detailed verification of the $\tau$ approximation in the direct numerical simulations of turbulent transport of passive scalar has been performed in \cite{BK04}. In particular, the results on turbulent transport of passive scalar obtained using direct numerical simulations of homogeneous isotropic turbulence have been compared with that obtained using a closure model based on the $\tau$ approximation. The numerical and analytical results are in a good agreement. In magnetohydrodynamics, the $\tau$ approximation reproduces many well-known phenomena found by different methods, e.g., the $\tau$ approximation yields correct formulae for the $\alpha$-effect \cite{KR80,RK93,RK00,RKR03}, the turbulent diamagnetic and paramagnetic velocities \cite{Z57,VK83,RKR03}, the turbulent magnetic diffusion \cite{KR80,VK83,RKR03,RK04}, the ${\bf \Omega} {\bf \times} {\bf J}$ effect and the $\kappa$-effect \cite{KR80,RKR03}. The developed theory in the present study may be important for interpretation of origin of large spots in the great planets (e.g., the Great Red Spot in Jupiter \cite{M93} and large spots in Saturn \cite{SL91}). The giant planets Jupiter and Saturn have outer convection zones of rapidly rotating convection \cite{HA07}. The spots on giant planets are not of magnetic origin and may be related to the large-scale instability excited the convective turbulence. The developed theory may be also useful for explanation of an origin of high-latitude spots in rapidly rotating late-type stars \cite{PMH11,MPH11}. We have also discuss a role of the centrifugal force in production of large-scale vorticity by a fast rotating homogeneous anisotropic turbulence in a special case when the gravity force is small (see Appendix~C). In this case the centrifugal force should be taken into account, which causes an inhomogeneous fluid density distribution in the plane perpendicular to the angular velocity. As a result, the large-scale vertical vorticity is produced by a combined effect of a fast rotation and horizontal inhomogeneity of the fluid density. \begin{acknowledgements} We have benefited from stimulating discussions with Axel Brandenburg, Maarit K\"apyl\"a, Petri K\"apyl\"a and Nishant Singh. This work was supported in part by the Israel Science Foundation governed by the Israeli Academy of Sciences (grant No. 1210/15). \end{acknowledgements}
\section{Introduction} \label{sec:intro} The continuum optical/UV emission of quasars has long been known to vary, with typical rms fluctuations of $\simeq 10-20\%$ correlated on timescales of months to years \citep[e.g.,][]{kelly2009,macleod2010,kozlowski2010}. This variability is often correlated over a wide wavelength range \citep[e.g.,][]{clavel1991,peterson1991}, which requires a propagation speed $\gtrsim 0.1c$ \citep{krolik1991} if the emission region size scales with characteristic emission wavelength $\lambda$ as $R \propto \lambda^{4/3}$ predicted by standard thin accretion disk theory \citep{shakura1973}. This timescale is much shorter than expected for the propagation of accretion rate fluctuations through the disk \citep{pringle1981} and those variations are usually associated with reprocessing of emission from near the black hole. Intensive monitoring campaigns have shown that the X-ray relationship is more complex than for the UV \citep{edelson2019}. When either the UV or X-rays are correlated with the response at longer optical wavelengths, the measured lag in a reprocessing model measures the wavelength-dependent emission region size \citep[e.g.,][]{mchardy2014,fausnaugh2016}. A small fraction of quasars exhibit large optical luminosity variations by factors of $\gtrsim 2$ \citep[``hypervariable,"][]{rumbaugh2018}. Rare, optical ``changing look" AGN show appearance or disappearance of one or more broad emission lines. Those changes are associated with factor of $\sim 10$ variations in optical continuum luminosity on month to year timescales. Long known in nearby Seyferts \citep{tohlineosterbrock1976,cohen1986,clavel1989,storchibergmann1995}, this type of large amplitude, rapid variability is now found in higher luminosity quasars \citep{lamassa2015,macleod2016,ruan2016,runnoe2016,gezari2017,wang2018,yang2018,stern2018,macleod2018,trakhtenbrot2019}. Evidence from short timescale variability of both the broad emission lines and continuum \citep[e.g.,][]{lamassa2015}, a lack of change in optical reddening \citep{macleod2016} or X-ray column \citep{husemann2016}, echoed mid-infrared variability (from warm dust) following optical variability \citep{stern2018}, and spectro-polarimetry \citep{hutsemekers2017} all imply that these objects undergo rapid changes in intrinsic accretion power on timescales much shorter than the $10^{4-6}$ year inflow time expected for a standard thin disk. In certain cases, the variability could be driven by a discrete event such as a tidal disruption flare \citep{merloni2015}, microlensing \citep{bruce2017}, or a binary black hole interaction \citep{kim2018}. Generally, however, changing look events appear to be the rare excursions to large amplitude of the continuous and stochastic variability seen in ``hypervariable" \citep{rumbaugh2018} and ordinary \citep{kelly2009} quasars. Large amplitude, rapid variations in luminous quasars are difficult to explain in the context of standard accretion disk theory. Either the entire AGN optical SED must be powered by reprocessing of central UV or X-ray emission \citep{shappee2014,lawrence2018}, AGN are subject to disk instabilities possibly including fast state transitions \citep[e.g.,][]{noda2018,ross2018}, and/or inflow through the disk can be much more rapid than commonly assumed \citep{dexter2019}. These scenarios make markedly different predictions for spectral evolution during changing look events. Reprocessing in a thin disk should show coordinated variability at all wavelengths with blue leading red. The fractional variability amplitude should also decrease with increasing wavelength due to geometric dilution of the central flux and the larger variation in light travel time to the emission region at long wavelength \citep[e.g.,][]{kazanas2001,sergeev2005,cackett2007,shappee2014}. Rapid inflow should result in red wavelengths leading with long delay timescales corresponding to viscous evolution \citep{pringle1981}. Disk instabilities could produce either band leading, possibly accompanied by a change in SED shape due to changes in disk structure. The quasar SDSS~J141324+530527\,at $z \simeq 0.456$ was recently identified as a ``turn-on" changing look object, in which the broad H$\alpha$\, and H$\beta$\, lines increased in strength during a large change in continuum luminosity in 2017 \citep{wang2018}. This object is included in the Sloan Digital Sky Survey Reverberation Mapping (SDSS-RM, RMID 017) campaign that intensively monitors $849$ quasars with optical imaging and spectroscopy since 2014 \citep{shen2015}. We present extensive optical to X-ray photometric and spectral monitoring data of the source from 2009-2018 taken as part of the SDSS-RM campaign, including intensive SDSS spectral monitoring over the last five years (\autoref{sec:observations}), including from SDSS-IV \citep{blanton2017}. We use the optical continuum (\autoref{sec:continuum}) and broad emission line (\autoref{sec:lines}) evolution from this extensive data set to confirm that optical changing look quasars are powered by order of magnitude intrinsic variations in accretion power. From the line shape and luminosity evolution, we probe the low-ionization broad emission line region structure and physical conditions in a luminous quasar. We describe the difficulties in explaining these observations in terms of simple reprocessing or intrinsic disk emission models (\autoref{sec:discussion}). \section{Observations}\label{sec:observations} SDSS~J141324+530527\, was included in the SDSS-RM campaign \citep{shen2015}. SDSS-RM has observed 849 quasars in a 7 deg$^2$ field coinciding with the Pan-STARRS1 Medium Deep Field MD07 \citep[RA J2000=213.704, Dec J2000=+53.083,][]{tonry2012}. The monitoring included intensive spectroscopy with the Apache Point 2.5 meter SDSS telescope \citep{gunn2006}, along with accompanying photometry obtained from the CFHT and Bok telescopes. Pan-STARRS 1 photometry is also available from 2010-2013, along with GALEX observations and 2 XMM-Newton observations in 2017. We summarize the data set and reduction procedure used here. \begin{table}[t] \centering{} \begin{tabular}{lcc} \hline \hline \textbf{Band} & $\lambda_{\rm min}$ (\AA) & $\lambda_{\rm max}$ (\AA) \\ \hline 2700 & 2655 & 2720 \\ 3050 & 3020 & 3100 \\ 3500 & 3500 & 3600 \\ 4000 & 4000 & 4050 \\ 4500 & 4450 & 4550 \\ 5100 & 5100 & 5200 \\ 5500 & 5500 & 5600 \\ 6000 & 6000 & 6100 \\ 7000 & 6800 & 7000 \\ \hline \end{tabular} \caption{Rest frame continuum luminosity bands used here.} \label{tab:1} \end{table} \begin{table*}[t] \centering{} \begin{tabular}{lccccccccc} \hline \hline Line name & Blue cont. (\AA) & Line region (\AA) & Red cont. (\AA) & log$L_{\rm line,44}$ & $\eta$ & $\sigma_{\rm line,44}$ (km s$^{-1}$) & $p$\\ \hline H$\alpha$ & 6326-6399 & 6399-6755 & 6755-6833 & 42.52 & $0.44 \pm 0.04$ & 3150 & $-0.21 \pm 0.02$\\ H$\beta$ & 4741-4762 & 4762-5027 & 5027-5050 & 42.03 & $0.35 \pm 0.05$ & 4370 & $-0.26 \pm 0.03$\\ H$\gamma$ & 4222-4271 & 4271-4401 & 4401-4452 & 41.33 & $0.81 \pm 0.06$ & 1920 & $-0.12 \pm 0.04$\\ MgII & 2717-2748 & 2748-2851 & 2851-2884 & 42.36 & $0.33 \pm 0.04$ & 1850 & $-0.12 \pm 0.02$\\ HeI & 5783-5850 & 5850-5931 & 5931-6000 & 40.73 & $0.93 \pm 0.09$ & -- & -- \\ HeII & 4475-4527 & 4527-4851 & 4851-4907 & 40.36 & $1.10 \pm 0.14$ & -- & --\\ \hline \end{tabular} \caption{Rest frame continuum and line fitting regions, line luminosities and responsivities ($\eta$), and line widths and breathing indices ($p$). The line luminosity and $\sigma_{\rm line}$ normalizations are scaled to a $2700$\AA\, luminosity $\nu L_\nu = 10^{44} \,\ensuremath{{\rm erg\,s}}^{-1}$. We do not report line width information for the faint He lines where the measurements are unreliable.} \label{tab:2} \end{table*} \subsection{SDSS Spectra} The SDSS-RM spectra analyzed here were obtained with the BOSS spectrographs \citep{smee2013} between Jan 2014 and June 2018. We use data from 77 epochs, with a median cadence of only 4 days in 2014 and 16 days in the other years over 7 months of observing per year. The exposure time was typically 2 hr, and the data were first processed by the BOSS pipeline, followed by a custom scheme to improve spectrophotometry and sky subtraction \citep[for technical details on the SDSS-RM spectroscopy, see][]{shen2015}. The typical absolute spectrophotometric accuracy achieved is $\sim 5\%$. More detail on the spectroscopy data and analysis can be found in \citet{shen2018} and \citet{grier2019}. From the spectra, we estimate continuum luminosities as mean values over narrow bands (\autoref{tab:1}), avoiding clear emission lines in the time-averaged spectrum. We have not tried to model weak narrow emission lines or the pseudo-continuum from FeII. We measured emission line properties after subtracting a polynomial fit to the nearby continuum. The line flux is estimated by numerically integrating over the measured flux in each channel. The line width is charactered by both the FWHM and the square root of the second moment, $\sigma$. Both measurements are made directly on the data rather than using a model. The integration is performed over the spectral windows defined in \autoref{tab:2}. For H$\beta$\, at earlier epochs, the line is very broad and blends with the [O~III]$\lambda 4959$ and $\lambda 5007$ doublet. We fit for and remove those forbidden lines separately before measuring the H$\beta$\, line properties. The [O~III]$\lambda 5007$\, flux is constant to within an rms of 10\%, which is then an estimate of a typical flux error. There is no secular change in [O~III]$\lambda 5007$\, flux over time. Typical errors on the measured line width $\sigma_{\rm line}$, as measured by the distribution of their residuals when subtracting a power law dependence on luminosity (see \autoref{sec:lines}), are $\simeq 250$ km s$^{-1}$ for the reliably measured H$\alpha$, H$\beta$, MgII, and H$\gamma$ lines. We note that the PrepSpec code \citep[described in][]{shen2016} used for SDSS-RM reverberation measurements \citep{shen2016,grier2017,grier2019,homayouni2018} obtains [O~III]$\lambda 5007$\, flux measurements with $\lesssim 5\%$ rms. We next subtract the host galaxy spectrum at each epoch using the template found from spectral decomposition by \citet{shen2015msigma}. The host galaxy contribution exceeds that of the AGN for rest frame $\lambda > 4000$\AA\, in 2014-2015. Finally, we convert the observed frame flux to the emitted monochromatic luminosity $\nu L_\nu$ assuming luminosity distances based on a WMAP 9 year cosmology \citep{hinshaw2013} as implemented in \texttt{astropy} \citep{astropy} ($H_0 = 69.3\, \rm km\, \rm Mpc^{-1}\, \rm s^{-1}$, $\Omega_{\rm M} = 0.287$, $\Omega_\Lambda = 0.713$). \subsection{SDSS-RM photometry} Photometric observations of SDSS~J141324+530527\ were obtained in both the $g$ and $i$ bands \citep{fukugita1996} using the Steward Observatory Bok 2.3m telescope on Kitt Peak and the 3.6m Canada-France-Hawaii Telescope (CFHT) on Mauna Kea. They cover roughly the same monitoring period as the SDSS-RM spectroscopy in 2014 with a cadence of about 2 days in 2014 and more sparse in the following years. The Bok observations were obtained with the 90Prime instrument \citep{williams2004}, which has a 4k $\times$ 4k CCD with a plate scale of 0.\arcsec45 pixel$^{-1}$ and a field of view of 1\degree~$\times$~1\degree. The CFHT observations were taken with the MegaCam instrument \citep{aune2003}, which has a pixel scale of 0.187\arcsec and also has a 1\degree~$\times$~1\degree\ field of view. Details of these observations and their processing will be provided by K. Kinemuchi et al. (in preparation). The data were processed via pipelines for their respective instruments. Light curves were produced using the image subtraction method of \cite{alard1998, alard2000} using the publicly available software ISIS. This method aligns the images and then subtracts each individual epoch from a reference frame that is produced from a subset of the highest-quality images. Before subtraction, ISIS alters the PSF of the reference frame to match that of the individual epoch. This process results in a subtracted image that contains the residual flux, on which a PSF-weighted aperture is placed to measure the flux and produce a residual-flux light curve. For 2014-2017, we also produce a version of the merged photometry and errors between SDSS, Bok, and CFHT. We use the CREAM code and procedure described in \citet{starkey2016}. CREAM models the light curve allowing an additive offset, multiplicative scaling factor, and transfer function for each band/instrument/telescope. These parameters are optimized using a Markov Chain Monte Carlo fitting process. The rescaled $g$ and $i$ band light curves are placed on the same scale and merged into a single continuum light curve. The uncertainties are further rescaled based on the variance between neighboring epochs. The impact of this rescaling is to increase the error bars, typically by factors $\simeq 2-3$ \citep{grier2019}. In this procedure we found a systematic offset of the CFHT data in 2016, likely due to a switch to different filters, and removed them from the merged light curve. \subsection{PS1 photometry} We used PS1 light curves of SDSS~J141324+530527\, in the $g$,$r$,$i$,$z$,$y$ bands from the Medium Deep Field Survey MD07 field \citep{tonry2012} covering the time period 2010-2013. The light curves are taken from \citet{shen2019} and details of the photometric calibration are described in \citet{schlafly2012} and \citet{magnier2013}. We have further removed flagged data (where there is no measured error) and a few obvious outliers (measurements $> 4$ standard deviations away from the median of that year). \subsection{GALEX photometry} A GALEX NUV light curve was obtained using data from the GALEX Time Domain Survey \citep{gezari2013}. We performed aperture photometry on each GALEX epoch at the position of the nearest source to the SDSS position within 3 arcsec in a deep coadd of all the GALEX images. We use an aperture radius of 6 arcsec, and apply an aperture correction for the energy enclosed, and a zeropoint for the AB magnitude system. The photometric error was determined for each epoch empirically from the standard deviation of a control sample of sources between epochs as a function of magnitude, following \citet{gezari2013}. We detect the quasar in 19 GALEX epochs between May 2009 and March 2011. \subsection{XMM-Newton} SDSS~J141324+530527\, was observed by XMM-Newton twice, in June 2017 (OBSID=0804271301) and November 2017 (OBSID=0804271801). The EPIC net counts in the 0.5-10 keV band were 3789 and 420 for the two observations with exposure times of 17ks and 5.4ks. We extracted the PN, MOS1, and MOS2 spectra and fitted them with an absorbed power-law plus a Compton reflection component (``pexrav"). We assumed a Galactic absorbing column density $N_H=1.1\times10^{20} \hspace{3pt} \rm cm^{-2}$. Between the two observations (5 months separation), the $2-10$ keV spectral shape remained an unobscured power-law. The photon index, defined by $N(E) \propto E^{-\Gamma}$, of $\Gamma = 2.15 \pm 0.05$ remained constant between observations, while the flux dropped by a factor of 3.6. The unabsorbed rest-frame 2-10 keV luminosities of the two observations are $L_X = (3.09 \pm 0.17) \times 10^{44}\,\ensuremath{{\rm erg\,s}}^{-1}$ and $(8.6 \pm 1.0) \times 10^{43}\,\ensuremath{{\rm erg\,s}}^{-1}$. Fitting the two spectra simultaneously gives a $90\%$ upper limit for any absorbing column of $N_H =9 \times 10^{19} \,\rm cm^{-2}$. \begin{figure*} \centering \begin{tabular}{ll} \includegraphics[width=\columnwidth]{SDSSJ141324+530527_g_combine_1.pdf} & \includegraphics[width=\columnwidth]{SDSSJ141324+530527_g_merge.pdf}\\ \end{tabular} \caption{Continuum optical light curve for SDSS~J141324+530527\, from 2010-2018 (left). The green and orange points are luminosities derived from Pan-STARRS PS1 and SDSS-RM $g$-band photometry, while the blue points are continuum measurements in the rest frame $3050$\AA\, band defined in \autoref{tab:1}. The dotted curves mark the extrema used to measure SEDs including GALEX NUV data, and the epochs of the XMM-Newton observations. The light curve shows continuous, rapid, large-amplitude variability. Features include a prominent rise and fall by a factor of 2 from 2010-2012, followed by a dramatic rise by almost an order of magnitude over a year from 2015-2016, and a sharp dip and final peak in 2018. In 2018 the optical luminosity increased by a factor of 3-6 in only 6 months. A zoom in of the 2014-2017 merged light curve is shown in the right panel on a linear scale.} \label{fig:gband_combine} \end{figure*} \begin{figure} \centering \includegraphics[width=\columnwidth]{SDSSJ141324+530527_multiband_lcurve.pdf} \caption{Host galaxy subtracted, rest frame multi-band continuum light curves measured from the SDSS spectra. During the initial large rise the continuum maintains a blue shape. In the later drop and sharp rise in 2018 it suddenly reddens. At the final peak, the SED is completely flat across the observed optical range. The host galaxy dominates in the red bands ($\lambda \gtrsim 4000$\AA) in 2014-2015 when the AGN optical luminosity is low \citep[$L \lesssim 10^{44}\,\ensuremath{{\rm erg\,s}}^{-1}$,][]{shen2015msigma}.} \label{fig:multiband} \end{figure} \section{Rapid, large amplitude continuum variations} \label{sec:continuum} SDSS~J141324+530527\,shows continuous, large amplitude optical variability over the past $\simeq 10$ years (left panel of \autoref{fig:gband_combine}). The initial Pan-STARRS monitoring showed a factor $\simeq 2-3$ increase (near MJD 55500) from the luminosity inferred from the 2004 SDSS spectrum. A drop and similar rise occurred again during the high cadence SDSS-RM monitoring in 2014 (near MJD 56600). Subsequently the luminosity increased by a factor $\simeq 10$ over roughly a year period. It has since stayed high, but with large excursions e.g. a factor $\gtrsim 2$ drop in 2017 in all bands (near MJD 58100) followed by a rise by a factor of $\simeq 3-6$ within the 6 month observing window during 2018. The period from 2014-2017 is shown in more detail, with estimated photometric uncertainties from the CREAM modeling and merging, in the right panel of \autoref{fig:gband_combine}. The variations are highly correlated and nearly simultaneous across the measured optical band. This is shown for the SDSS-RM spectra in \autoref{fig:multiband}. A detailed continuum lag analysis for the high cadence data found that the $g$-band leads the $i$-band by $\simeq 3-6$ days \citep{homayouni2018}. The lower cadence of the later light curve precludes a continuum lag measurement, but continues to show rapid and highly correlated variations consistent with the high cadence monitoring. Until 2018, the fractional amplitude changes are similar across all optical bands. The blue bands increase somewhat more during the first dramatic rise with $\nu L_\nu$ consistent with a power law of slope $1.2-1.4$, similar to the value of $4/3$ expected for a thin disk. The subsequent flattening, drop, and dramatic rise in 2018, by contrast, show dramatic reddening of the SED. By the end of observations in 2018 the SED was completely flat in $\nu L_\nu$. Compared to the previous peak at similar luminosity $\simeq 10^{45}\,\ensuremath{{\rm erg\,s}}^{-1}$, the reddest bands increased in luminosity by a factor $\gtrsim 3$ while the bluest band slightly decreased. For the estimated RM black hole mass measured from H$\beta$\ of $M \simeq 8 \times 10^{8} M_{\odot}$ \citep{grier2017}, the optical luminosity varies between $L_{\rm opt}/L_{\rm Edd} \sim 0.2-2\%$, similar to other hypervariable quasars which tend to have low Eddington ratios \citep{rumbaugh2018}. The GALEX near-UV light curve shows similar evolution to that of the $g$-band from PS1 (\autoref{fig:gband_combine}) but with a slightly higher fractional rms amplitude. Sample host-subtracted SEDs are shown in \autoref{fig:sed}. We choose two epochs for the PS1/GALEX data (black) corresponding to low (2009) and high (2011) luminosity states. Continuum luminosities measured from the later SDSS spectra are shown as colored lines. Until 2018 (MJD $\simeq 58100$), the SED rises beyond our bluest optical band, except maybe in the low state of the PS1/GALEX monitoring. This is broadly consistent with a spectral break near $1000$\AA\, as seen in quasar composite spectra \citep[e.g.,][]{shull2012}. For the estimated mass of $\sim 10^9 M_{\rm sun}$ and observed $L_{\rm opt}$, thin accretion disk models predict a peak in $\nu L_\nu$ at $\simeq 10^{15}$ Hz, broadly consistent with a peak location in between the PS1 $g$ and GALEX NUV bands. In many epochs the continuum slope is comparable to the expected $\nu L_\nu \sim \nu^{4/3}$, while notably in 2018 it is much flatter. The X-ray luminosities measured by XMM are a factor of $\simeq 3$ lower than quasi-simultaneous measurements in our bluest SDSS band. The resulting spectral index $\alpha_{\rm OX} \simeq -1.2$. The source is mildly X-ray bright, roughly $1\sigma$ off the relation for ordinary quasars \citep{steffen2006,lusso2010} and similar to other hypervariable ones \citep{rumbaugh2018,collinson2018}. We do not find evidence for a change in $\alpha_{\rm OX}$ between the two epochs where the X-ray luminosity varies by a factor $\simeq 4$. \begin{figure} \centering \includegraphics[width=\columnwidth]{SDSSJ141324+530527_tdep_sed_noxray.pdf}\\ \includegraphics[width=\columnwidth]{SDSSJ141324+530527_tdep_sed_xray.pdf} \caption{Host galaxy subtracted, rest frame, optical to X-ray SEDs. The black curves and points show quasi-simultaneous PS1 and GALEX photometry. The magenta curves show quasi-simultaneous continuum measurements from SDSS spectra along with XMM-Newton data. The colored curves are measurements from SDSS-RM spectra going from early (red) to mid (gray) to late (blue) epochs. The optical SEDs are consistent with power laws. In the lower state, the SED peak appears to be redwards of the GALEX NUV point. In the GALEX higher state and most of the SDSS-RM spectra, the peak is bluewards of our observing band. Where measured, the X-ray luminosity is relatively high but well below that of the bluest optical band. During the dramatic rise in 2018, the SED reddens to become completely flat across the optical band.} \label{fig:sed} \end{figure} \begin{figure*} \centering \includegraphics[width=0.9\textwidth]{SDSSJ141324+530527_averaged_spectra.pdf} \caption{Host galaxy subtracted spectra averaged over each observing season. The continuum luminosity and shape change dramatically between years.} \label{fig:spectra_years} \end{figure*} \begin{figure*} \centering \begin{tabular}{ll} \includegraphics[width=0.48\textwidth]{SDSSJ141324+530527_Hbeta_v10_i10_hostsub.pdf} & \includegraphics[width=0.48\textwidth]{SDSSJ141324+530527_MgIIOIII_v10_i10_hostsub.pdf} \end{tabular} \caption{Sample host galaxy and narrow line subtracted H$\beta$\, (left) and MgII\, (right) profiles from early (red) to blue (late) epochs. The line becomes significantly narrower at late times where the continuum luminosity is higher. The shape also changes, with the core brightening more than the wings.} \label{fig:lines_sample} \end{figure*} \begin{figure} \centering \includegraphics[width=0.48\textwidth]{SDSSJ141324_line_lightcurves.pdf} \caption{Continuum and broad emission line light curves measured from the SDSS spectra. All lines increase in luminosity during the large rise in the optical continuum. The He lines show a stronger response than the Balmer and MgII\, lines.} \label{fig:lines_lc} \end{figure} \begin{figure*} \centering \begin{tabular}{cc} \includegraphics[width=0.45\textwidth]{SDSSJ141324+530527_L2600_sigmahalpha_nlrsub.pdf} & \includegraphics[width=0.45\textwidth]{SDSSJ141324+530527_L2600_sigmahbeta_nlrsub_fix.pdf}\\ \includegraphics[width=0.45\textwidth]{SDSSJ141324+530527_L2600_sigmamgii_nlrsub.pdf} & \includegraphics[width=0.45\textwidth]{SDSSJ141324+530527_L2600_sigmahg.pdf} \\ \end{tabular} \caption{Line width measurements for H$\alpha$, H$\beta$, H$\gamma$, and MgII\, as a function of continuum optical luminosity. Point color indicates observational epoch (red early to blue late). The H$\alpha$\, and H$\beta$\, widths are clearly anti-correlated with luminosity. The same trend is found for MgII\, and H$\gamma$, but with a weaker dependence. The dashed curve is a relation $\sigma \sim L^p$ with $p=-1/4$, expected if the BLR radius $R_{\rm BLR} \sim L^{1/2}$ and radial velocity $v \sim R^{-1/2}$. The consistency of this trend with the data demonstrates the expected ``breathing" of the BLR in response to continuum variations.} \label{fig:blr_breathing} \end{figure*} \begin{figure} \centering \includegraphics[width=\columnwidth]{SDSSJ141324_line_responsivities.pdf} \caption{Line vs. $2700$\AA\, rest frame continuum luminosity for all broad emission lines measured. The solid lines are power law fits. Line luminosity is correlated with that of the continuum, but with a sub-linear slope especially for the low-ionization Balmer and MgII\, lines.} \label{fig:blr_response} \end{figure} \section{Broad emission line response} \label{sec:lines} Host galaxy subtracted spectra averaged by year are shown in figure \autoref{fig:spectra_years}. All observed broad emission lines respond to the dramatic changes in the optical continuum. Example line profiles are shown for H$\beta$\, and MgII\, in \autoref{fig:lines_sample}, with colors coded by time from red (early) to blue (late). In both cases the lines brighten dramatically, especially in their lower velocity cores. The classification for H$\beta$\, changes from Type 1.8 to 1, which led to the classification of SDSS~J141324+530527\, as a turn-on changing look quasar \citep{wang2018}. Nonetheless, broad MgII\, and H$\alpha$\, emission are detected at all times. We also note that \autoref{fig:spectra_years} provides evidence for increased O~III $\lambda 3133$ emission in high flux states, which could be produced by Bowen fluorescence \citep{trakhtenbrot2019bowen}. The similarly excited N~III $\lambda 4640$ line is weak, which might suggest the metallicity in this object is not supersolar. \autoref{fig:lines_lc} shows line luminosity vs. time for all broad emission lines detected: the Balmer lines H$\alpha$, H$\beta$, H$\gamma$ as well as MgII, HeI\, and HeII. The general rising trend is clear in all cases. The variability amplitude of the Balmer lines and MgII\, is much smaller than that of the He lines which more closely follow the changes in the optical continuum. The host galaxy subtraction leads to large systematic uncertainty in the HeI\, and HeII\, measurements in 2014-2015 ($L_{\rm line} \lesssim 10^{41} \,\ensuremath{{\rm erg\,s}}^{-1}$). Many of those points should be interpreted as upper limits. For the more luminous Balmer lines and MgII\, we can also measure changes in the line widths (but not for HeI\, and HeII). Line widths for H$\alpha$, H$\beta$, MgII, and H$\gamma$\, as a function of optical luminosity are shown in \autoref{fig:blr_breathing}, with no correction made for the $\simeq 40$ day light travel time delay to the BLR \citep{grier2017}. We show the results based on $\sigma$, but the results based on FWHM are similar. The H$\alpha$\, and H$\beta$\, lines become significantly narrower at high luminosity. Similar behavior is seen in MgII\, where the line core visibly narrows at higher luminosity (\autoref{fig:lines_sample}), but with a weaker luminosity dependence. This is consistent with the behavior seen in larger samples of both SDSS-RM and hypervariable quasars, where MgII\, shows little or no response to continuum changes \citep{sun2015,wang2019}. The H$\gamma$ trend is also weaker, but the inferred line widths are uncertain at low luminosity due to the low signal-to-noise of the line. We interpret the observed decrease in line width as the expected ``breathing" of the BLR, where the emission peak moves to larger radius from the black hole at higher luminosity \citep{baldwin1977,koratkar1991,cackett2006}. The dashed black curves in \autoref{fig:blr_breathing} show the trend of $\sigma \propto L^p$ with $p=-1/4$, expected if the BLR radius $R_{\rm BLR} \propto L^{1/2}$ and $\sigma \propto R^{-1/2}$ \citep[and assuming a constant SED shape, e.g.,][]{peterson2002}. Those simple scalings are consistent with the data for H$\alpha$\, and H$\beta$. The MgII\, line width is also well constrained and shows a breathing effect, but with a shallower index (best fitting values and uncertainties are listed in \autoref{tab:2}). In all cases the relevant velocity traced by the line width is falling with distance from the black hole. In other hypervariable quasars, the MgII\, line width is independent of continuum luminosity \citep{yang2019}. The FWHM shows similar breathing behavior, consistent with previous work \citep[e.g.,][]{shen2013,zhang2018}. The line and continuum optical luminosities are correlated in all cases (\autoref{fig:blr_response}). The large change in continuum luminosity provides a lever arm for measuring the responsivity $\eta$ for each emission line, defined here as $L_{\rm line} \propto L_{2700\text{\AA}}^\eta$. Best fits of that form are indicated as solid lines in the figure, and the best-fitting values and uncertainties are given in \autoref{tab:2}. The Balmer lines and MgII show flatter, sub-linear correlations (smaller $\eta$), while the He line response is nearly linear. These findings are in excellent agreement with the predictions of photoionization models \citep[e.g.,][]{korista2004}. Among the Balmer lines, the strongest response is in $H\gamma$, consistent with those models. The $H\beta$ response is weaker than expected. \section{Discussion} \label{sec:discussion} We have analyzed optical to X-ray photometric and spectroscopic data of SDSS~J141324+530527, a hypervariable, changing look quasar in the SDSS-RM sample \citep[identified as such by][]{wang2018}. The large number of SDSS spectra as well as PS1 and GALEX NUV photometry and XMM-Newton spectroscopy allow a detailed study of dramatic changes in a luminous quasar. Past SDSS-RM measurements of SDSS~J141324+530527\, found observed frame time delays between the optical $g$-band and the H$\beta$\, line and $i$-band continuum emission regions of $\simeq 30-50$ and $\simeq 3-6$ days, respectively. The measured BLR lag and line width leads to a black hole mass estimate of $M \simeq 8\times10^8 M_\sun$ \citep{grier2017}. The continuum reverberation timescale implies a propagation speed of $\gtrsim 0.5$c for a thin accretion disk \citep{homayouni2018}, consistent with light travel time delay where the optical variability is driven by reprocessed UV or X-ray emission. We have shown that the source increased in brightness by a factor of 10 within about a year from 2015-2016. The variations are coordinated across the optical spectrum, with similar amplitudes at all bands. The SED is peaked towards the blue during the first rise, but remarkably turns red at the latest maximum in 2018, with roughly equal luminosity in all observed optical bands. First, we use the broad emission line response to the changing optical continuum to demonstrate that the changes are due to intrinsic variations in accretion power. Then we assess physical scenarios proposed to account for quasar hypervariability. We consider ``extreme reprocessing," where the entire optical spectrum is driven by reprocessing of a varying central source, and accretion instabilities where the observed changes are caused by rapid evolution of the disk structure. \subsection{Intrinsic variations in accretion power} There are many lines of evidence suggesting that optical changing look AGN are powered by intrinsic changes in central engine luminosity, rather than by changes in obscuration \citep[as is commonly seen in X-rays, e.g.,][]{risaliti2002,matt2003,yang2016}. The changes occur over a few years. To cover both the BLR and optical emission region, an obscurer would need both a super-orbital velocity and large covering factor \citep[e.g.,][]{lamassa2015,runnoe2016}. When observed, the mid-infrared luminosity also varies in response to to the changing continuum \citep{sheng2017,stern2018}. X-ray data show no sign of an increase in column density associated with dramatic dimming of the continuum \citep[e.g.,][]{husemann2016}. Spectro-polarimetry of ``turn off" objects shows the low linear polarization fraction $\lesssim 1\%$ typical of unobscured Type I objects \citep{hutsemekers2017}. Here we also find no evidence for any significant X-ray column in two observations spanning a factor of $\simeq 4$ in luminosity. In addition, the variation of the Balmer and He lines match the expectations of photoionization models \citep[e.g.,][]{korista2004}. The line widths also show a ``breathing" anti-correlation with optical luminosity compatible with a BLR emission size $R \sim L^{1/2}$ and radial velocity $v \sim R^{-1/2}$. The evolution of the emission lines quantitatively demonstrates that the BLR is responding to intrinsic changes in continuum luminosity. Quasars are typically bluer when brighter \citep[e.g.,][]{cutrietal1985,vandenberk2004}. If the rest frame UV luminosity driving photoionization varies more than the optical that we measure, our responsivities could be overestimated. Our best measurements are for the Balmer lines: $\simeq 0.3-0.8$ (\autoref{tab:2}) compared to predicted values $\simeq 0.5-0.7$ \citep{korista2004}. It therefore appears likely that the photoionizing flux in the UV is varying in a similar fashion as that of our observed optical bands. From 2013-2013, the variability amplitude in the GALEX NUV light curve is similar to that of the quasi-simultaneous optical light curves from PS1. When observed at both high and relatively low states, the X-ray luminosity is also consistent with a constant value of $\alpha_{\rm OX} \simeq -1.2$. \subsection{Combined constraints} The combined observational constraints from the observed continuum and broad emission line evolution are as follows: \begin{itemize} \item variations by factors of 10 within $\lesssim 1$ year and $3-6$ within 4 months in the rest-frame that are similar at all optical wavelengths observed (rest $2300-7000$\AA); \item broad emission line variability responding to the continuum variations both in terms of luminosity and line width; \item measured optical to X-ray SEDs that are typical of quasars with similar variability amplitudes in each band ($\alpha_{\rm OX} \simeq -1.2$); \item rapid variability across optical bands with blue leading red, implying a propagation speed $\gtrsim 0.5c$ ($0.1c$) in the 2014 (2015-2018) data; \item an optical color that becomes slightly bluer when brighter during most of the light curve but with a rapid evolution to the red during 2018. \end{itemize} We next evaluate these constraints in terms of physical scenarios invoked for quasar optical (hyper)variability including changing look AGN. \subsection{A high covering factor ``extreme" reprocessor?} There has long been evidence for coordinated optical/UV variability in AGN \citep[e.g.,][]{cutrietal1985,clavel1991}. The implied propagation speed assuming a thin disk model is $\gtrsim 0.1c$ \citep[e.g.,][]{krolik1991,courvoisierclavel1991}, which is naturally explained by reprocessing of the central UV or X-ray emission. Typically the amplitude of these variations is $\simeq 10-20\%$, and the light curves are explained as reprocessing fluctuations superimposed on the more slowly varying local accretion luminosity. \citet{shappee2014} considered a geometric reprocessing model in a thin disk with intrinsic accretion luminosity $L_{\rm acc}$ irradiated by UV or soft X-ray emission from a central source with luminosity $L_C$\footnote{Here we are agnostic as to the origin of $L_C$, most likely either EUV emission from the inner radii of an inflated inner accretion disk or X-rays from the corona.} at a height $h$ above the black hole. Assuming Newtonian gravity, face-on viewing, and zero albedo, the resulting effective temperature at each radius $R$ can be written \citep[see also][]{kazanas2001,cackett2007}, \begin{equation} \sigma T_{\rm eff}^4 = \frac{3 L_{\rm acc} R_{\rm in}}{4\pi R^3} f\left(\frac{R}{R_{\rm in}}\right) + \frac{L_C(t-\tau(R))\,h}{4\pi (h^2+R^2)^{3/2}}, \end{equation} \noindent where $f(x)=1-x^{-1/2}$ \citep{shakura1973} and \begin{equation} \tau(R) = \frac{h}{c} \left[1+\left(1+\frac{R^2}{h^2}\right)^{1/2}\right] \end{equation} \noindent is the geometric time delay. The time-dependent spectrum is obtained by integrating over the disk: \begin{equation} \nu L_\nu = \frac{(4\pi)^2 h\nu^4}{c^2} \int_{R_{\rm in}}^\infty \frac{R dR}{\exp{(h\nu/kT_{\rm eff})}-1}. \end{equation} For SDSS~J141324+530527\, the variability amplitude is a factor of several to ten in the optical. In the model, the light curve consists of contributions both from constant (or slowly varying) local dissipation ($L_{\rm acc})$, and from the rapidly varying central source ($L_C$). To match an optical luminosity of $L_{\rm opt} \simeq 10^{44-45}\,\ensuremath{{\rm erg\,s}}^{-1}$ requires a central luminosity $\sim 10^{45-46} \,\ensuremath{{\rm erg\,s}}^{-1}$, about $\gtrsim 10\times$ higher than the observed optical luminosity due to geometric dilution of the flux propagating out to the optical emission radius $\simeq 50 r_g$. Instead, when observed the NUV luminosity is similar and the X-ray luminosity is a factor of few below the optical. The SED would therefore need to peak sharply at unobserved wavelengths in the far UV or very soft X-ray. Further, the observed variability amplitude in the optical requires that the roughly constant local contribution is negligible: $L_{\rm acc} \lesssim 10^{44} \,\ensuremath{{\rm erg\,s}}^{-1}$. This scenario requires that $\lesssim 1\%$ of the total accretion luminosity of the central source is dissipated farther out in the disk in the optical in this scenario. In most AGN, $L_{\rm UV}$ and $L_X$ are comparable to $L_{\rm opt}$. Further, the line luminosity evolution tracks that of the optical continuum with responsivities close to those expected for photoionization without any need for a large, unseen far UV/soft X-ray spectral peak. A speculative scenario that could alleviate these problems is reprocessing in a high covering factor shell of material around the quasar. The covering factor would need to be order unity to allow $L_{\rm opt} / L_{\rm UV,X} \sim 1$. Such a scenario has been considered to explain optical tidal disruption flares \citep{guillochon2014,roth2016}. The reprocessing layer would need to be optically thick to absorb the incident UV or X-ray flux. It would need to be sufficiently thin not to dampen the intrinsic variability either from photon diffusion or variable light travel time to different regions. We see no evidence for such a reprocessing layer in the X-ray spectrum (low $N_H$ consistent with being unobscured). The X-rays would therefore need to be observed along a low obscuration line of sight, e.g., near the pole. Further, a sudden change in shell radius, thickness, or geometry would still be needed to account for the spectral evolution towards the red seen in 2018. \subsection{Rapid accretion disk evolution?} Alternative models for quasar variability invoke mass accretion \citep{lyubarskii1997} and/or thermal \citep{kelly2009,dexter2011} fluctuations. Similar ideas have been proposed for changing look AGN \citep{ross2018,noda2018,dexter2019}, where the large variations result from either disk instabilities or large accretion rate changes. The high cadence observations of SDSS~J141324+530527\ show blue leading red with a short lag \citep[$\simeq 3-6$ days,][]{homayouni2018}. At least for the variability in 2014, that behavior would seem to rule out a pure inflow scenario, where the red bands should lead. Disk instabilities are thought to drive repeating outbursts, most clearly in dwarf novae systems \citep{osaki1996}. Similar limit cycle instabilities have been proposed to explain changing look quasars \citep{ross2018,noda2018,sniegowska2019}. A heating front associated with such a cycle \citep[e.g.,][]{menou1999} could drive rapid variability with blue leading red if launched from the inner edge of a geometrically thick disk. That scenario should also predict longer variability timescales for fronts launched at larger radius, and red leading blue if they propagate inwards rather than outwards. Detailed models are needed to explore whether such a scenario can produce large amplitude variations on timescales of months that are coordinated across the optical band on timescales of a few days. A potential advantage in this scenario is that dramatic reddening of the SED could result from changes to the disk structure \citep[e.g.,][]{neilsen2011}. This trend is otherwise the opposite of the prediction of optically thick disk emission, where $L \sim T_{\rm eff}^4$ as seen in the soft states of X-ray binaries \citep[e.g.,][]{gierlinski2004}. \subsection{Comparison to other changing look AGN} The rapid coordinated variability between optical bands favors a reprocessing origin for the entire optical SED. At the same time, a basic reprocessing model of a central source in a thin accretion disk geometry is excluded on energetic grounds. A similar problem occurs in several other changing look AGN where $L_X \lesssim L_{\rm opt}$ \citep[][but see \citealt{noda2018}]{husemann2016,ruan2019}. The Seyfert galaxy NGC 2617, studied by also showed short continuum lags with blue leading red as expected for reprocessing \citet{shappee2014}. In that case, the observed $L_X$ was compatible with driving the observed variations in a thin disk geometry. Observationally, the crucial difference there is that the optical rms amplitude fluctuations were relatively small and decreased with increasing wavelength. For SDSS~J141324+530527, the optical varies by a factor $\simeq 10$ in all bands. As a result, a reprocessing scenario requires central UV/X-rays to drive the entire optical SED. That sets stringent limits on both the outer disk ($L_{\rm acc} < 10^{44} \,\ensuremath{{\rm erg\,s}}^{-1}$) and central ($L_C \sim 10^{46} \,\ensuremath{{\rm erg\,s}}^{-1}$) luminosity. Neither possibility is consistent with observations and we would need a high covering factor reprocessor (sufficiently high to intercept order unity of the central radiation) or some other mechanism to produce rapid, coordinated variability. The observed variations are continuous over the past 10 years, with an increase by a factor $\simeq 2-3$ before the ``changing look" event and continuous large amplitude changes since. We favor the proposal that changing look quasars represent the high amplitude tail to the distribution of ordinary quasar optical variability \citep{rumbaugh2018}. The light curve is in this sense quite different from some optical changing look AGN in Seyfert galaxies. For example, the UV luminosity of Fairall 9 steadily decreased by a factor of $30$ in UV luminosity over a period of 5 years \citep{clavel1989}. Mrk 1018 remained in the high state with a relatively low optical rms for $\gtrsim 10$ years before dropping in luminosity by a factor of 10 \citep{mcelroy2016}. Mrk 590 displays a similar secular evolution while decreasing in luminosity by a factor of $100$ \citep{denney2014}. It could be that more than one mechanism is required to explain the diversity of changing look AGN. \section{conclusions} \label{sec:conclusions} We present extensive monitoring data, particularly SDSS optical spectra, from the hypervariable/changing look quasar SDSS~J141324+530527. We find: \begin{itemize} \item All observed broad emission lines respond to the observed continuum changes. Since the BLR sees the same continuum changes that we do, they are intrinsic to the source. The line response adds to mounting evidence for intrinsic changes in accretion power as the origin of hypervariable and optical changing look AGN. The continuous variability also argues against an origin as a discrete event. \item The observed BLR response is consistent with that predicted by photoionization models. The luminosity of the Balmer and MgII\, lines is sub-linear while that of the He lines is nearly linear. The line widths also decrease with increasing luminosity in the fashion expected for a stratified, virialized or rotating BLR. There is no evidence for a change in intrinsic BLR structure or physical properties associated with the changing look event. \item The continuum evolution poses a challenge to all proposed models. The rapid coordination between optical bands with blue leading red points towards a reprocessing origin, but the large variability amplitudes in all bands would require a high covering factor reprocessor (e.g., not a thin disk). This coordination and the rapid variability timescales of months are challenging for disk instability models. They may remain viable if the instability is launched at the inner edge of a geometrically thick disk. \end{itemize} Future studies can use time-resolved spectral evolution to probe accretion and BLR physics in a sample of hypervariable quasars out to high redshift. \acknowledgments JD thanks J.J. Ruan, J.H. Krolik, and R.I. Davies for helpful discussions. JD was supported by a Sofja Kovalevskaja award from the Alexander von Humboldt foundation. Y.S. acknowledges support from an Alfred P. Sloan Research Fellowship and NSF grant AST-1715579. CJG and WNB acknowledge support from NSF grant AST1517113. PH acknowledges support from NSERC grant 2017-05983. KH acknowledges support from STFC grant ST/R000824/1. Funding for the Sloan Digital Sky Survey IV has been provided by the Alfred P. Sloan Foundation, the U.S. Department of Energy Office of Science, and the Participating Institutions. SDSS-IV acknowledges support and resources from the Center for High-Performance Computing at the University of Utah. The SDSS web site is www.sdss.org. SDSS-IV is managed by the Astrophysical Research Consortium for the Participating Institutions of the SDSS Collaboration including the Brazilian Participation Group, the Carnegie Institution for Science, Carnegie Mellon University, the Chilean Participation Group, the French Participation Group, Harvard-Smithsonian Center for Astrophysics, Instituto de Astrof\'isica de Canarias, The Johns Hopkins University, Kavli Institute for the Physics and Mathematics of the Universe (IPMU) / University of Tokyo, the Korean Participation Group, Lawrence Berkeley National Laboratory, Leibniz Institut f\"ur Astrophysik Potsdam (AIP), Max-Planck-Institut f\"ur Astronomie (MPIA Heidelberg), Max-Planck-Institut f\"ur Astrophysik (MPA Garching), Max-Planck-Institut f\"ur Extraterrestrische Physik (MPE), National Astronomical Observatories of China, New Mexico State University, New York University, University of Notre Dame, Observat\'ario Nacional / MCTI, The Ohio State University, Pennsylvania State University, Shanghai Astronomical Observatory, United Kingdom Participation Group, Universidad Nacional Aut\'onoma de M\'exico, University of Arizona, University of Colorado Boulder, University of Oxford, University of Portsmouth, University of Utah, University of Virginia, University of Washington, University of Wisconsin, Vanderbilt University, and Yale University. Based in part on observations obtained with \\MegaPrime/MegaCam, a joint project of CFHT and CEA/DAPNIA, at the Canada-France-Hawaii Telescope (CFHT) which is operated by the National Research Council (NRC) of Canada, the Institut National des Sciences de l'Univers of the Centre National de la Recherche Scientifique of France, and the University of Hawaii. The authors wish to recognize and acknowledge the very significant cultural role and reverence that the summit of Maunakea has always had within the indigenous Hawaiian community. We are most fortunate to have the opportunity to conduct observations from this mountain. \vspace{5mm} \facilities{SDSS,CFHT} \software{astropy, numpy, matplotlib}
\section*{Main} \subsection*{Introduction} Crystallization experiments in which droplets were used have contributed significantly to our current understanding on structural aspects and the kinetics of phase transformations in condensed matter physics. Over half a century ago, David Turnbull \textit{et al.} showed in seminal experiments that liquids could be undercooled by as much as hundreds degrees below the freezing temperature if they were dispersed as small droplets \autocite{turnbull1956phase}. The small size of the droplets ensured the absence of heterogeneous nucleation sites, and as a consequence nucleation could only occur homogeneously. The large undercoolings demonstrated that the local structure of liquids differs substantially from that of crystals. These findings inspired Charles Frank to hypothesise that the short-range order in simple liquids has icosahedral symmetry, which is incompatible with the perfect long-range translational order of crystals \autocite{frank1952supercooling}. The icosahedral order arises locally when one maximises the density, using the convex hull, of a packing of 12 identical spheres on the surface of a central sphere with the same size \autocite{Taffs2016fivefold}. The densest packing is obtained by arranging the outer spheres on the vertices of an icosahedron, rather than by using 13-sphere subunits of face-centered cubic (FCC) and hexagonal close-packed (HCP) bulk crystals, which are known to closely pack 3D space at $\sim$74\% \autocite{steinhardt1983bond,nelson1989polytetrahedral,spaepen2000condensed}. Long-range icosahedral order is found in icosahedral quasicrystals (iQCs), one class of quasicrystals which shows quasiperiodicity in three dimensions~\autocite{shechtman1984metallic,tsai2003review}. Due to their higher point group symmetry than ordinary crystals, iQCs have been demonstrated to be an ideal candidate for complete bandgap photonic crystals~\autocite{man2005experimental}. iQCs have been abundantly discovered in binary, ternary and multinary intermetallic compounds~\autocite{tsai2003review}. Polygonal quasicrystals have been found in non-atomic or soft-matter systems, such as assemblies of NCs and star polymers, whereas iQCs have not yet been found in such systems~\autocite{dotera2011quasicrystals,talapin2009quasicrystalline,ye2017quasicrystalline,Nagaoka2018}. Recently Engel \textit{et al.} showed by computer simulations that iQCs can be obtained by the self-assembly of one-component particles interacting \textit{via} an oscillating isotropic pair potential \autocite{engel2014ico}. Although the realisation of such a potential is non-trivial, this work suggests routes for designing iQCs in precisely tailored systems in the future~\autocite{engel2014ico}. Colloidal suspensions are widely used as model systems to study fundamental processes such as crystallization, melting, nucleation, and the glass transition \autocite{van1995real,gasser2001real,kegel2000direct,cheng2016colloidal,fernandez2016fluids}. This is because they have a well-defined thermodynamic temperature, and consequently they display a phase behaviour similar to atoms and molecules. Additionally, they can be investigated on a single-particle level, even in concentrated systems \autocite{van1995real,gasser2001real,kegel2000direct,cheng2016colloidal,fernandez2016fluids}. The use of droplets has also been of interest in the soft-matter field, not only because it is a powerful method to study protein crystallization, topological defects in liquid crystal droplets, and the crystallization kinetics of colloids \autocite{cheng2016colloidal,fernandez2016fluids}, but also to fabricate clusters of particles composed of smaller particles, also termed `supraparticles’ (SPs), upon drying the droplets \autocite{wintzheimer2018supraparticles,wang2013colloidal}. An unexpected and recent finding in both experiments and simulations is that when up to 90,000 hard spheres (HSs) are compressed under the spherical confinement of a slowly drying emulsion droplet, the system spontaneously crystallizes into icosahedral clusters and not into the thermodynamically stable FCC bulk crystal \autocite{de2015entropy}. Using crystallization in spherical confinement, icosahedral clusters were obtained for a range of particle systems \autocite{Lacava2012,Yang2018binary,Wang2018magic,wang2018interplay}. Free-energy calculations on pure HSs confined in a spherical confinement showed that clusters with an icosahedral symmetry are thermodynamically more stable than FCC clusters at packing fractions just above freezing \autocite{de2015entropy}. This raises the question whether spherical confinement is also able to change the equilibrium structures that form in the case of binary mixtures of spheres, and possibly also induce icosahedral symmetry. Here we demonstrate, by experiments and simulations, that a binary mixture of hard-sphere-like (HS-like) colloids with a size ratio of 0.78, which crystallizes into a structure analogous to the binary metallic MgZn$_2$ Laves phase in bulk, forms an iQC induced by the spherical confinement of a slowly drying droplet. \subsection*{Self-assembly of binary nanocrystals in spherical confinement} The Laves phases (\textit{LS$_2$}) \autocite{Laves1936,Berry1953} are three closely related structures composed of small (\textit{S}) and large (\textit{L}) spheres as schematically illustrated in Figs.~\ref{Figure_1_bulk}a-c: the hexagonal C14 MgZn$_2$ structure, the cubic C15 MgCu$_2$ structure and the hexagonal C36 MgNi$_2$ structure. The three structures can also be identified by the stacking sequence of the \textit{L} spheres as viewed along the [11$\overline{2}$0] or [110] projections of the hexagonal or cubic structures, respectively (Figs.~\ref{Figure_1_bulk}d-f) \autocite{hynninen2007self}. Specifically, the stacking of the \textit{L} sphere-dimers in the C14, C15, and C36 structures is ...\textit{AABB}..., ...\textit{AABBCC}..., and ...\textit{AABBAACC}..., respectively \autocite{hynninen2007self}. The MgZn$_2$ phase was found to be the thermodynamically stable structure for a binary mixture of \textit{L} and \textit{S} HSs with a diameter ratio in the range of 0.76-0.84, although the free-energy difference between the three Laves phases is small ($\sim$10$^{-3}$ $k_BT$ per particle at freezing) \autocite{hynninen2007self,hynninen2009stability}. To study the behaviour of a binary nanocrystal (NC) suspension in spherical confinement, we synthesised monodisperse CdSe NCs (\textit{S}) with a total diameter of 7.7 nm including ligands and monodisperse PbSe NCs (\textit{L}) with a total diameter of 9.9 nm including ligands (Figs.~\ref{Figure_1_bulk}g-h; Extended Data Figs. \ref{ExtendedFig_NCs_BNSL}a-b; Supplementary Section 2), yielding a binary NC mixture with a diameter ratio of 0.78. To investigate the bulk phase behaviour of the binary NC suspension, the mixture was allowed to self-assemble on a diethylene glycol surface according to a well-developed liquid-air interface method \autocite{Dong2010SA}. The Fourier Transform (FT) (Fig. \ref{Figure_1_bulk}i inset) of the transmission electron microscopy (TEM) image of the self-assembled binary NC superlattices (Figs. \ref{Figure_1_bulk}i and Extended Data Fig. \ref{ExtendedFig_NCs_BNSL}c) shows hexagonal order, corresponding to the [0001] projection of the MgZn$_2$ structure (Fig. \ref{Figure_1_bulk}j). \begin{figure}[!t] \includegraphics[width=0.80\textwidth]{Fig1} \centering \caption{ \textbf{Binary Laves crystal structures.} 3D views of the a) C14 (MgZn$_2$), b) C15 (MgCu$_2$) and c) C36 (MgNi$_2$) structures. d) C14 structure viewed along the [11$\bar{2}$0] projection. e) C15 structure viewed along the [110] projection. f) C36 structure viewed along the [11$\bar{2}$0] projection. Transmission electron microscopy (TEM) images of g) \textit{S} CdSe nanocrystals (NCs), h) \textit{L} PbSe NCs and i-j) a self-assembled binary NC superlattice composed of CdSe and PbSe NCs showing a MgZn$_2$-like structure viewed along the [0001] projection at different magnifications. Fourier transform (FT) of the entire image (inset in i) with a MgZn$_2$ structure model (overlay in j) viewed along the [0001] projection, showing hexagonal symmetry. \textit{L} and \textit{S} spheres are coloured in cyan and red, respectively. Scale bars, g-j): 20 nm, 50 nm, 100 nm and 50 nm, respectively. For an interactive 3D view of the three Laves phases, see Supplementary Data 1-3. \label{Figure_1_bulk}} \end{figure} Subsequently, we let the mixture of NCs with a 1:2 number ratio (\textit{L}:\textit{S}) self-assemble in slowly drying emulsion droplets \autocite{de2015entropy}, and investigated the structure of the self-assembled SPs using high angle annular dark-field scanning transmission electron microscopy (HAADF-STEM). We found that about 80\% of our SPs containing a few hundred up to tens of thousands of NCs show five-fold symmetry, pointing to possible icosahedral ordering (Figs. \ref{Figure_2_SP}a,c; Extended Data Fig. \ref{ExtendedFig_ExtendedFig_Exp_SPs_overview_and_tilting_v2}). However, since HAADF-STEM images only correspond to a 2 dimensional (2D) projection of a 3D object, we performed electron tomography \autocite{Saghi2012,Bals2014} to analyse the 3D structure of 6 SPs of different sizes (Figs. \ref{Figure_2_SP}a,c; Supplementary Videos 1 and 3; Extended Data Figs. \ref{ExtendedFig_TEM_five_fold_gallery}a-d). By using an advanced tomographic reconstruction algorithm \autocite{zanaga2016}, recently developed for quantitative analysis of assemblies of spherical nanoparticles, we obtained coordinates of all particles and identified both the \textit{S} and \textit{L} species in the 6 SPs (Figs. \ref{Figure_2_SP}b,d; Extended Data Figs. \ref{Extended_Fig_reconstruction} and \ref{ExtendedFig_TEM_five_fold_gallery}e-h; Supplementary Videos 2 and 4). As will be detailed in the next section, we confirmed the presence of iQCs in all SPs which exhibited five-fold symmetry. It is important to note that the self-assembly in our experiments was hardly influenced by the spherical confinement when the number ratio of binary mixtures corresponded to an excess of \textit{S} spheres compared to the stoichiometry of the Laves phase. In these cases we found that the NCs in the SPs self-assembled into a MgZn$_2$ crystal structure as visible in 2D HAADF-STEM images, not yielding five-fold symmetry (Supplementary Fig. 1). There are only a handful of papers on binary SPs \autocite{wintzheimer2018supraparticles,Wangpengpeng2018binary,Yang2018binary,Chen2014,Kister2016,Yang2016}, but only one recent paper by Dong \textit{et al.} presents MgZn$_2$-type binary crystals \autocite{Yang2018binary}. However, they concluded that a spherical confinement does \textit{not} change the structure of the binary SPs. Instead, we hypothesise that the difference in the effect of spherical confinement on the crystal structure of binary SPs is due to the sensitivity to the stoichiometry. We corroborated our experimental findings with molecular dynamics (MD) simulations, using HOOMD-blue \autocite{Anderson2008,Glaser2015}, where a binary mixture of spheres with a diameter ratio of 0.78 interacting with a HS-like potential inside a spherical confinement nucleated to form iQC clusters. We simulated $N_{\small tot}$ = 3,501, 5,001 and 10,002 spheres under spherical confinement (Extended Data Fig.~\ref{ExtendedFig_Simulated_Colored}) and observed iQCs for all these system sizes, thus indicating that a crossover to the MgZn$_2$ crystal phase requires a bigger system size. This expectation is in line with the observed structural crossover, observed in monodisperse HSs, from icosahedral clusters or larger surface-reconstructed icosahedral clusters to FCC ordering (which is the stable crystal phase in bulk) in system sizes with $>$ 90,000 HSs \autocite{de2015entropy}. The simulations were performed in a fixed spherical volume to speed up equilibration. The number densities, and the corresponding \emph{effective} densities for an equivalent binary HS mixture with a diameter ratio of 0.78, are presented in the Methods and Supplementary Section 5. The striking agreement between the experimental and simulated SPs with regard to the observation of five-fold symmetry is shown in Figs.~\ref{Figure_2_SP} and \ref{Figure_3_Diff}. \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{Fig2} \centering \caption{ \textbf{Binary supraparticles (SPs) as obtained from experiments and computer simulations.} HAADF-STEM images of two typical experimental SPs with diameters of a) 110 nm and c) 187 nm, containing CdSe/PbSe binary NCs. b,d) Cross-section views of 3D representations of the two experimental SPs using electron tomography. Cross-section views of simulated SPs self-assembled from a binary mixture of e) $N_{tot}=$ 3,501 and f) $N_{tot}=$ 5,001 HS-like particles, exhibiting five-fold symmetry, similar to the experimental SPs shown in a-d. Five-fold symmetry is visible in both the experimental and simulated SPs, as indicated by the yellow dashed lines. Scale bars, a): 20 nm, c) 50 nm. For an interactive 3D view of b and f, see Supplementary Data 4 and 5, respectively. For the number of particles of the experimental and simulated SPs, refer to Supplementary Tables 1 and 2. \label{Figure_2_SP}} \end{figure} \subsection*{Fourier-space analysis of icosahedral quasicrystals} Inspired by the beautiful work of Shechtman \textit{et al.} \autocite{shechtman1984metallic} that led to the discovery of iQCs, we calculated diffraction patterns from our real-space data. iQCs have 3D long-range order, but are \textit{not} periodic and therefore display intensity peaks in their diffraction patterns, with symmetries that are not compatible with a periodic repeating unit, such as five-fold rotational symmetry (Fig. \ref{Figure_3_Diff}). We first calculated diffraction patterns of an experimental SP, which were determined by calculating the FTs of 2D projections of the coordinates (Supplementary Fig. 2). Next, we calculated diffraction patterns of data sets corresponding to a simulated SP ($N_{tot}$ = 5,001; Fig. \ref{Figure_3_Diff}) using the same method, but we averaged the coordinates over a relatively long time, and only selected the particles belonging to the iQC cluster according to criteria based on bond-orientational order parameters (BOPs) (Methods and Supplementary Section 4). The sharp Bragg peaks exhibit five-fold (Figs. \ref{Figure_3_Diff}a-b) as well as two-fold and three-fold orientational symmetries (Extended Data Fig. \ref{ExtendedFig_2-3-fold_symmetries_FFT}), which was also observed for simulated one-component iQCs \autocite{engel2014ico}. As the averaging of the coordinates is not applicable to the experimental data set, the calculated diffraction pattern does not show many higher order Bragg peaks (Supplementary Fig. 2). However, as will be detailed in the next section, the SPs obtained from experiments and simulations were found to have the same structure in real space. The calculated diffraction pattern in Fig. \ref{Figure_3_Diff} shows inflated pentagons following a $\tau^n$ sequence, where $\tau$ = $(1+\sqrt{5})/2$ is the irrational golden mean. This so-called $\tau^n$ sequence is a direct consequence of the non-crystallographic icosahedral symmetry and is characteristic of iQCs~\autocite{tsai2003review}. The perfect agreement of the positions of the Bragg peaks in our data along a projection vector as shown in Fig. \ref{Figure_3_Diff}b, with the $\tau^n$ sequence, signifies that our SP structure is indeed an iQC. For instance, multiple-twinned crystals would show diffraction patterns similar to those of iQCs but the Bragg peaks would display a twinned substructure in the diffraction pattern, which we do not see. \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{Fig3} \centering \caption{ \textbf{Calculated diffraction pattern of a simulated binary icosahedral SP.} a) The calculated diffraction pattern of a simulated binary SP containing $N_{\small tot}$ = 5,001 particles, showing five-fold orientational symmetry. The yellow lines highlight the presence of inflating pentagons in the calculated diffraction pattern, which is a direct consequence of the non-crystallographic five-fold orientational symmetry, depicting quasiperiodicity. b) One of the ten domains in the calculated diffraction pattern showing the inflating pentagon sequence. The intensity profile along the horizontal yellow line features peaks whose positions follow the $\tau^n$ sequence, as listed in the table. The bare calculated diffraction pattern and a full overlay can be found in Supplementary Fig. 3. \label{Figure_3_Diff}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{Fig4} \centering \caption{ \textbf{Real-space structure of the iQC cluster.} iQC clusters were found to contain concentric shells around the center of symmetry with geometries corresponding to Platonic and Archimedean solids. a) The regular polygons describing the shells up to the 8$^\textrm{\small th}$ shell and the number of particles (of $L$ or $S$ species) forming them. Corresponding regular shells as found in b) simulations and c) experiments, where \textit{L} and \textit{S} spheres are coloured in cyan and red, respectively. The yellow lines denote the regular polygons corresponding to the surface tiling of the geometric solids. The 44-particle cluster up to the 3$^\textrm{\small rd}$ shell, as delineated by the red box, corresponds to the Bergman cluster. Along the five-fold symmetry axes of the iQC, pentagonal tubes composed of alternating pentagons of $L$ and $S$ particles were found in both d) simulations and e) experiments, all converging at the center of a Bergman cluster. Interactive 3D views of b-e) can be found in Supplementary Data 6-9. \label{Figure_4_clusters}} \end{figure} \subsection*{Real-space analysis of icosahedral quasicrystals} Fundamental clusters that are often used in the classification of iQCs are the Mackay cluster \autocite{mackay1962dense,kuo2002mackay}, the Bergman cluster \autocite{bergman1957crystal,steurer2008fascinating}, and the Tsai cluster \autocite{Tsai2000Tsaicluster,maezawa2004icosahedral}, which consist of concentric shells with regular polygonic shapes. We found that both our experimental and simulated SPs contained such concentric shells of either \textit{S} or \textit{L} particles around a center of symmetry (Figs.~\ref{Figure_4_clusters}a-c). We found that these clusters can be classified as Bergman clusters and positioned not at the center of the spherical confinement. The experimental and simulated SPs show striking structural similarity (Fig.~\ref{Figure_4_clusters}). iQCs have been found in many binary and ternary intermetallic compounds \autocite{tsai2003review,steurer2008fascinating}. To the best of our knowledge, it is not yet known that equilibrium iQCs can form from HS-like particles induced by a spherical confinement. In addition, we analysed the local structural environment of the particles in the SPs using a BOP analysis \autocite{lechner2008accurate} on the \textit{L} particles only (Supplementary Section 3). Interestingly, the BOPs of the \textit{L} particles in the iQC cluster coincide with the BOP signatures of the \textit{L} particles in both equilibrated MgZn$_2$ and MgCu$_2$ Laves phases in bulk. We present typical configurations of experimental and simulated iQC clusters, in which the \textit{L} particles are coloured according to their different BOP values (Extended Data Figs. \ref{ExtendedFig_BOP}a-d). We observe that the iQC clusters consist of twenty tetrahedral domains (or wedges) that predominantly consist of particles with a MgCu$_2$-like symmetry, whereas the \textit{shared faces} of adjacent tetrahedral domains are MgZn$_2$-like (Extended Data Figs. \ref{ExtendedFig_BOP}b,d). Based on single-particle systems, where the tetrahedral domains of the icosahedral clusters were found to be (cubic) FCC-like \autocite{de2015entropy}, it is not surprising that the wedges of our icosahedral SP structures follow a cubic MgCu$_2$-like symmetry. Therefore, effectively, the hexagonal MgZn$_2$ Laves phase which is obtained in bulk has been transformed into a SP comprised of domains with a local symmetry similar to the cubic MgCu$_2$ Laves phase. We further estimated the fraction of MgCu$_2$-like particles in experimental and simulated SPs, for different SP sizes. We see that the spherical confinement forces the local symmetry of 70-80\% of the particles in the SP to resemble that of the MgCu$_2$ Laves phase (Extended Data Fig. \ref{ExtendedFig_BOP}e). In addition, the \textit{edges} of five neighbouring tetrahedral domains form a pentagonal tube (or icosahedral chain~\autocite{yang2018precipitation}) that originates from the Bergman cluster, runs through the whole SP, and ends at one of the twelve vertices with five-fold symmetry on the surface of the SP (Figs. \ref{Figure_4_clusters}d-e). We remark that the pentagonal tubes differ in length as all the Bergman clusters that were found were eccentric with respect to the spherical confinement. We thus find that a binary mixture of HS-like particles, that crystallizes into the MgZn$_2$ Laves phase in bulk, forms an iQC composed of tetrahedral domains with MgCu$_2$-like symmetry induced by a spherical confinement. \subsection*{Nucleation and growth of icosahedral quasicrystals} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{Fig5} \centering \caption{ \textbf{Nucleation and growth of the iQC cluster in simulations.} a) The fraction of crystalline particles as a function of the radial distance from the center of the SP with $N_{tot}$ = 5,001 particles at different MD times. Crystalline particles belonging to the iQC cluster are identified using BOPs. The solid lines denote the crystalline fraction of $L$ spheres and the dashed lines represent that of the $S$ species. The crystalline fraction is calculated over the total number of particles of the same species and averaged over 1,000 configurations. The profile shows that the crystal nucleates at an off-centered position and grows radially outward with time. b-g): Typical configurations corresponding to the crystallization profiles shown in a), the labels (b-g) are shown in a) next to and in the same colour as the corresponding crystallization profile, for clarity. The different crystalline domains are shown in different colours. For crystalline and domain classification, see Supplementary Section 4. The $S$ spheres are coloured in a darker shade of the same colour as the $L$ spheres. Particles not belonging to the iQC cluster are reduced in size for visual clarity. A video of the nucleation of the iQC cluster is shown in Supplementary Video 5. \label{Figure_5_nucleation}} \end{figure} Now that we have established that the structure of our SPs corresponds to a binary iQC cluster, we investigated one of the many open questions on iQCs \autocite{Steurer2018}, namely, how do iQCs grow? Does our binary iQC nucleate from a Bergman cluster and grow shell-by-shell? Or does crystallization start at the spherical interface similar to the formation of icosahedral clusters from single-component HSs in spherical confinement \autocite{de2015entropy}? In order to study the nucleation and growth of iQCs from a supersaturated binary fluid phase, we used a BOP-based criterion to identify and track the crystal nucleation (Supplementary Section 4) in our simulations inside a spherical confinement at fixed volume. In Fig. \ref{Figure_5_nucleation}a, we plot the fraction of crystalline particles as a function of the radial distance from the center of a SP consisting of $N_{tot}$ = 5,001 particles at different times along with corresponding typical configurations (Figs. \ref{Figure_5_nucleation}b-g). The solid lines denote the crystalline fraction of \textit{L} spheres while the dashed lines represent the crystalline fraction of the \textit{S} spheres. The evolution of the structure within the SP shows all the characteristics of nucleation and growth (Figs. \ref{Figure_5_nucleation}b-g; Supplementary Video 5). We find that the system remains for a long time in the supersaturated fluid phase, in which small crystalline clusters form and melt in subsequent frames in the spherical confinement (Fig. \ref{Figure_5_nucleation}c). At longer times, a single primary cluster nucleates at an off-centered position and starts to grow (Fig. \ref{Figure_5_nucleation}d). The nucleus diffuses slightly towards the center of the spherical confinement and grows into the surrounding fluid with time (Figs. \ref{Figure_5_nucleation}e-g). This can also be appreciated from Fig. \ref{Figure_5_nucleation}a that shows that the crystallization front has grown radially outward with time. The long period that the system stayed in a supersaturated fluid phase and the induction time before a single cluster starts to grow are typical for nucleation. We therefore conclude that the iQC cluster nucleates away from the spherical boundary. In addition, we find that first a pentagonal tube is formed from which the structure grows out. The growth is therefore not initiated by the Bergman cluster. An intriguing question is why a mixture that crystallizes into the MgZn$_2$ Laves phase in bulk forms an iQC cluster under spherical confinement. As the iQC cluster forms \textit{via} nucleation away from the spherical confinement, the curvature can only be communicated \textit{via} the supersaturated fluid phase. We measured the radial density profiles of the $L$ and $S$ species in the SP at different times in our simulations and found that the density profiles display pronounced layering of particles in concentric shells, which lends strong support to the formation of the iQC being driven by the structural correlations and frustrations induced by the spherical curvature in the highly structured fluid phase (Extended Data Fig. \ref{ExtendedFig_layering_and_correlations}). \subsection*{Implications for photonic crystal research} Our finding that iQCs can self-assemble from a binary mixture of colloidal HS-like particles in spherical confinement is also interesting for photonic applications. Experiments on 3D printed structures in plastic have already demonstrated that iQCs possess large and overlapping stop bands for microwave radiation \autocite{man2005experimental}. Moreover, our results show that the local symmetry of 70-80\% of the particles has been changed to MgCu$_2$-like, where the MgCu$_2$ is composed of a cubic diamond lattice of the \textit{L} spheres and a pyrochlore lattice of the \textit{S} spheres that both have a photonic band gap for low index contrasts \autocite{hynninen2007self,hynninen2009stability}. Although it still has to be determined theoretically which structure, either the iQC cluster or the wedges with MgCu$_2$-like symmetry, is best suited for opening up a photonic band gap at low refractive index contrast \autocite{man2005experimental}, it is almost certain that if hard particles with a large index contrast such as titania are used, for which the optical properties on the single particle level can be tuned in great detail \autocite{jannasch2012nanonewton}, a photonic band gap can be realised for visible wavelengths. Although it has recently become possible to grow photonic crystals with diamond sub-structures using DNA interactions \autocite{ducrot2017colloidal,wang2017colloidal}, the procedures are complicated and the crystals and index contrasts are not yet good enough to open up photonic band gaps. Crystallization of HS-like particles with a large refractive index contrast provides a much easier route to obtain a band gap for visible light. Moreover, as our results have been obtained for HS-like particles, it will be fairly straightforward to extend these results to particles with a size closer to the wavelengths of visible light. \subsection*{Conclusion} Our findings in this paper have strengthened the connection already made in previous work between icosahedral order and frustration brought about by curved space \autocite{de2015entropy,guerra2018freezing,sadoc1981use}. The spherical shape of the SPs also allowed a quantitative real-space analysis of the iQCs that are formed when binary mixtures of HS-like particles with a size ratio of 0.78 are made to crystallize at a stoichiometry corresponding to a MgZn$_2$ Laves phase. The iQCs were found to consist of Bergman clusters with additional concentric shells of particles. In addition, we found that the local symmetry of the particles in the tetrahedral domains of the icosahedral cluster transformed to a MgCu$_2$-like symmetry which is, next to an iQC itself, an important and much sought after structure in photonic crystal research. Furthermore, we studied the evolution of the iQC in computer simulations, and tracked the nucleation and growth mechanism by identifying the particles belonging to the iQC cluster using BOPs. We observed that the iQC clusters nucleate away from the spherical boundary and that the iQC growth is induced by the pronounced layering of the highly-structured fluid at the spherical boundary. As recently HS-like MgZn$_2$ colloidal crystals have been realised \autocite{schaertl2018formation}, it is likely that by having such systems self-assemble inside a spherical confinement interesting colloidal photonic iQCs can now be realised as well. Finally, our experimental finding that the effect of the spherical confinement can be circumvented by tuning the composition to off-stoichiometric values, is likely transferrable to other binary crystal structures in the rich and complex binary phase behaviour. This means that the droplet platform as explored here, but using larger colloidal particles that can be imaged in 3D by light nanoscopy, can also be used to obtain the first experimental single particle level information on binary nucleation and growth. \subsection*{Methods} {\footnotesize \noindent \textbf{Nanocrystal (NC) syntheses} 7.7 nm CdSe NCs \autocite{Pietryga2008} (a total polydispersity of 2\% by counting 130 CdSe NCs; 5.2 nm core diameter) and 9.9 nm PbSe NCs \autocite{steckel2006} (a total polydispersity of 1\% by counting 170 PbSe NCs; 7.6 nm core diameter) were synthesised with minor modifications according to literature methods. This yields a binary NC mixture with a diameter ratio of 0.78. The NC syntheses were carried out in a nitrogen atmosphere using standard Schlenk line techniques. As-synthesised NCs were purified by isopropanol and were dispersed in cyclohexane with desired weight concentrations. All NCs used in our current work are washed well before self-assembly according to their original experimental protocols. Thus one can assume the amount of free ligands to be negligible after proper washing such that they do not play a significant role during the self-assembly. Our building blocks (cores and ligands) are similar to those used in the work of Evers \textit{et al.} \autocite{Evers2010}, we therefore describe our experimental system with a hard-sphere-like (HS-like) potential. Detailed information relating to the syntheses can be found in Supplementary Sections 1-2. \noindent \textbf{Experimental self-assembly of binary NCs in bulk} Binary NC superlattices were formed at a liquid-air interface \autocite{Dong2010SA} in a glovebox that maintains oxygen- and moisture-free conditions. To prepare a typical MgZn$_2$-type binary NC superlattice, 5.2 nm CdSe and 7.7 nm PbSe NCs were separately dispersed in \textit{n}-hexane at a concentration of 10 mg/mL. The two samples were mixed ($V_{CdSe}/V_{PbSe}\approx 0.9$) to give the right number ratio of NCs and form a high-quality MgZn$_2$-type binary NC superlattice film. Then \SI{10} {\micro L} of the mixture was dropcast onto the surface of diethylene glycol in a square Teflon well. A glass slide was placed to cover the well and reduce the evaporation rate of hexane. After 30 minutes, a solid film was obtained on the liquid-air interface. \noindent \textbf{Experimental self-assembly of binary NCs in spherical confinement} For a typical icosahedral quasicrystal assembled from binary NCs in spherical confinement experiment, 6.5 mg of PbSe NCs and 5.85 mg of CdSe NCs were dispersed in 1.0 mL of cyclohexane and added to a mixture of \SI{400}{mg} of dextran and 70 mg of sodium dodecyl sulfate (SDS) in \SI{10}{mL} of de-ionized (DI) H$_2$O. The resulting emulsion was agitated by shear with a shear rate of $1.56\times10^{5}$ $s^{-1}$, using a Couette rotor-stator device (gap spacing 0.100 mm) following the procedure and home-built equipment described by Mason and Bibette \autocite{mason1997}. The emulsion was then evaporated at room temperature (RT), while sedimentation was prevented by mixing the emulsion using a VWR VV3 vortex mixer for 48 hours. The resulting supraparticles (SPs) suspension was purified by centrifugation with a speed of 2,500 rpm for 15 minutes using an Eppendorf 5415C centrifuge, followed by re-dispersing in DI H$_2$O. The aforementioned procedure was repeated twice. The experimental procedure of a typical binary NC self-assembly with an off-stochiometry is similar to that for obtaining the icosahedral quasicrystal, except that 6.5 mg PbSe and 6.5 mg CdSe NCs were dispersed in 1.0 mL of cyclohexane and added to a mixture of \SI{400}{mg} of dextran and 70 mg of SDS in \SI{10}{mL} of de-ionized (DI) H$_2$O. \noindent \textbf{Electron microscopy (EM) sample preparation and 2D EM measurements} To prepare a sample for conventional EM imaging and electron tomography analysis, \SI{3} {\micro L} of the SPs suspension in DI H$_2$O was deposited on a Quantifoil (2/2, 200 mesh) copper grid and plunge-frozen in liquid ethane using a Vitrobot Mark2 plunge freezer at temperatures around 90 K. The sample was then freeze-dried over a period of 8 hours under vacuum at 177 K and subsequently allowed to warm to RT prior to EM analysis. Conventional transmission electron microscopy (TEM), 2D high angle annular dark-field-scanning transmission electron microscopy (HAADF-STEM) and 2D energy dispersive X-Ray (EDX) spectroscopy chemical mapping measurements were performed on a FEI-Talos F200X electron microscope, equipped with a high-brightness field emission gun (X-FEG) and operated at 200 kV. Images and elemental EDX maps were acquired using Bruker Esprit analytical and imaging software in HAADF-STEM mode. Elemental EDX maps of 418$\times$416 pixels were acquired with a 15-minute acquisition time to get a good signal-to-noise ratio, as shown in Supplementary Fig. 1. \noindent \textbf{Electron tomography} Electron tomography experiments were performed using an aberration-corrected `cubed' FEI-Titan electron microscope, operated at 300 kV in HAADF-STEM mode. Six electron tomography series of self-assembled binary SPs of different sizes were acquired using a Fischione model 2020 single-tilt tomography holder. For the SPs with a diameter of 80 nm, 110 nm, 132 nm, 167 nm, 170 nm and 187 nm, tilt series were acquired over the following tilt ranges: from -\SI{74}{\degree} to +\SI{74}{\degree}, from -\SI{76}{\degree} to +\SI{76}{\degree}, from -\SI{74}{\degree} to +\SI{74}{\degree}, from -\SI{74}{\degree} to +\SI{76}{\degree}, from -\SI{76}{\degree} to +\SI{72}{\degree} and from -\SI{66}{\degree} to +\SI{74}{\degree}, respectively. The increments in all experiments were set to be \SI{2}{\degree}. \noindent \textbf{Tomographic reconstruction} Alignment of the tilt series was performed using cross-correlation based routines \autocite{Guizar-Sicairos2008} developed in MATLAB. Tomographic reconstructions were obtained using the Simultaneous Reconstruction Technique (SIRT) \autocite{gilbert1972}, as implemented in the ASTRA toolbox, and according to the approach explained in Ref.~\cite{zanaga2016}. The SIRT algorithm was used to obtain a preliminary reconstruction of the tilt series yielding morphological information about the 3D shape of the SP. However, in the presence of close packed particles, conventional SIRT is not sufficient to achieve the reconstruction resolution necessary to segment individual particles and obtain structural information. In order to investigate this in more detail, the Sparse Sphere Reconstruction (SSR) algorithm \autocite{zanaga2016} was used to obtain the coordinates of the particles in the assemblies. The SSR technique has been developed specifically for this purpose. The main idea behind the method is to leverage prior-knowledge in the reconstruction process in order to overcome resolution limitations of SIRT when reconstructing assemblies of close-packed particles. The assumption used is that the particles in the assembly are monodisperse spheres of known size. In our case the assemblies present two types of particles. However, the particles differ only slightly in size and density, and at the resolutions used for the reconstructions, the difference in size between the two species was less than 2 pixels. Therefore the SSR algorithm could be applied using the approximation of monodisperse particles, and only one size (estimated from the SIRT reconstructions as the size of the smaller species) was used as prior. Once the coordinates of the particles were obtained from the SSR reconstructions, the SIRT reconstruction was used to differentiate the two species which were labelled \textit{S} species (CdSe NC) and \textit{L} species (PbSe NC). To distinguish them, a spherical neighbourhood around each center coordinate and with a radius equivalent to the one of the smaller species (CdSe NCs) was extracted from the SIRT volume. For each point, an average gray value was calculated for these neighbourhoods. Since tilt series were acquired in HAADF-STEM mode, the different atomic numbers of the cations create a different contrast in the SIRT volumes, which yields two different intensity distributions. The intensity distributions were fitted with two Gaussian distributions, and where the intersection of the two curves was taken as the threshold value to distinguish the two species (Supplementary Fig. 4 of the 110 nm binary SP). The overlap of the two curves gives an estimate of the percentage of particles that might be misidentified (\textit{e.g.} $\sim 1\%$ for the 110 nm SP). The 3D representations of all 6 experimental binary SPs from tomographic reconstruction can be found in Figs. \ref{Figure_2_SP}b,d and Extended Data Fig. \ref{ExtendedFig_TEM_five_fold_gallery}. In order to confirm the validity of the results of the SSR reconstructions, manual segmentation was performed on the SIRT reconstructed volumes of two binary SPs with diameters of 110 nm and 170 nm, respectively, as shown in Extended Data Fig. \ref{Extended_Fig_reconstruction}. Due to the smaller size of the CdSe NCs and the lower contrast that exhibited in the SIRT reconstructions compared to the PbSe NCs, manual segmentation of CdSe NCs is time-consuming and far from straightforward. Therefore, we implemented the approach only on the $L$ PbSe NCs (Extended Data Fig. \ref{Extended_Fig_reconstruction}). 2,825 and 990 PbSe NCs were detected from the 170 nm SP and 110 nm SP, respectively. The number of PbSe NCs obtained from the SSR reconstructed volumes of the 170 nm and 110 nm SP is 2,814 and 982, respectively. The deviation of the number of the PbSe NCs that obtained from SSR and SIRT is only 0.39\% and 0.8\% for the 170 nm SP and 110 nm SP, respectively. \noindent \textbf{Computer simulations} We study the spontaneous nucleation of the binary iQC clusters by performing molecular dynamics (MD) simulations of a binary mixture of particles inside a spherical confinement, interacting \textit{via} the Weeks-Chandler-Andersen (WCA) pair potential \begin{linenomath*} \begin{align*} \phi_{\alpha\beta} \left(r_{ij}\right) &= 4 \epsilon_{\alpha\beta} \left\lbrack \left(\frac{\sigma_{\alpha\beta}}{r_{ij}} \right)^{12} - \left(\frac{\sigma_{\alpha\beta}}{r_{ij}} \right)^6 + \frac{1}{4} \right\rbrack & r_{ij}<2^{1/6}\sigma_{\alpha\beta}\nonumber\\ &= 0 &r_{ij}\geq2^{1/6}\sigma_{\alpha\beta}, \label{wca} \end{align*} \end{linenomath*} where $i$,$j$ are the interacting particles, $\alpha$,$\beta$ denote the particle type (\emph{i.e.} $L$,$S$). For our binary mixture, interaction strength $\epsilon_{LL} = \epsilon_{SS} = \epsilon_{LS} = \epsilon$, $\sigma_{LL} \equiv \sigma_{L}$, $\sigma_{SS} \equiv \sigma_{S}$, diameter ratio $q = \sigma_{S}/\sigma_{L}$ = 0.78 with $\sigma_{LS} = \left(\sigma_{L} + \sigma_{S}\right)/2$, and reduced temperature $T^*=k_BT / \epsilon$ = 0.2. The WCA potential is short-ranged, steeply repulsive and reduces to the hard sphere pair potential in the limit of $T^*\rightarrow 0$. The interaction potential of the particles with the spherical wall is also a repulsive WCA potential with $\epsilon_{w} = \epsilon$ and $\sigma_{w} = \sigma_{L}$. The simulations are performed using HOOMD-blue (Highly Optimized Object-oriented Many-particle Dynamics) \autocite{Anderson2008,Glaser2015} in the canonical $NVT$ ensemble, where the total number of particles $N_{tot}$ = $N_L+N_S$, temperature $T$, and the volume $V$ are fixed. The temperature is kept constant \textit{via} the Martyna-Tobias-Klein (MTK) \autocite{martyna1994constant} integration of the equations of motion based on the Nos\'e-Hoover thermostat \autocite{nose1984unified,hoover1985canonical}, with coupling constant $\tau_{\tiny T}$ = 1.0. The time step is set to $\Delta t = 0.01\tau_{\scriptsize MD}$ where $\tau_{\scriptsize MD} = \sigma_{\scriptsize L}\sqrt{m/\epsilon}$ is the MD time unit. In order to ensure sufficient time for equilibration, the simulations are performed in a constant spherical volume. The iQC nucleation and growth is tracked using a BOP-based cluster criterion as described in the Methods and Supplementary Section 4. The crystallized SPs are then subjected to a fast compression up to very high densities so as to arrest the positions of the spheres in the SP. The compressed SP structures are subsequently analysed using BOPs on \textit{L}-\textit{L} species correlations, as described in Supplementary Section 3. For a close comparison with the experiments, where five-fold SPs were only observed for compositions close to $LS_2$, we modulate the composition of our binary mixtures such that the number fraction of \textit{L} particles $x_{\small L} = \frac{N_{\small L}}{N_{\small L} + N_{\small S}}$ is $\sim$ 0.3 in the `core'. The \emph{core} comprises of the SP \emph{excluding} those particles positioned at a radial distance $> R_{\small SC} - 2\sigma_{\small L}$ from the center of the SP, where $R_{\small SC}$ denotes the radius of the spherical confinement. The effective number of particles in the core is denoted by $N$ while the total number of particles in the SP is denoted by $N_{\small tot}$. In this work, we simulate $N_{\small tot}$ = 3,501, 5,001 and 10,002 spheres, which correspond to an effective number of $N$ = 1,990, 3,060 and 6,870 particles in the core of the SP respectively. The supersaturated reduced densities $\rho\sigma_\textrm{\scriptsize av}^{\small 3}$ (= $\frac{3N_{tot}\sigma_{L}^3}{4\pi R_{\small SC}^3}\left(x_L+\left(1-x_L\right)q^3\right)$) for which crystallization is observed in our constant volume simulations lie between 0.802--0.831. These densities are equivalent to effective packing fractions $\eta_\textrm{\tiny HS, eff}$ in the range 0.506--0.524 for a binary HS mixture with a diameter ratio $q$ = 0.78. The effective packing fraction for the binary HS mixture is calculated using an \emph{effective diameter}, which can be estimated from WCA perturbation theory (see Supplementary Section 5 for details). \noindent \textbf{Calculated diffraction pattern} The calculated diffraction pattern of the simulated 5,001-particle SP was calculated from the coordinates of particles belonging to the iQC cluster after the following treatment: (1) the compressed SP was subjected to an equilibration cycle ($t/\tau_{MD}$ = 10$^6$, $\Delta t = 10^{-3}\tau_{\scriptsize MD}$) and the particle coordinates were averaged over 10,000 configurations, and (2) the time-averaged coordinates were subsequently run through a cluster criterion based on BOPs, which distinguishes the particles belonging to the iQC cluster from particles with a different local order, as determined by $d_{6,\alpha\beta}(i,j)$ correlations of the particles with their neighbours. Here, $\alpha$,$\beta$ denotes the type of species (\emph{i.e.} $L$,$S$) and $i$,$j$ represents the index of the particle and its neighbour respectively. Next, the coordinates of these particles are projected on a 2D plane and the diffraction pattern is obtained by calculating the FT of the resulting projection. The intensity profile in Fig. \ref{Figure_3_Diff}b was filtered with a 1 pixel Gaussian blur to suppress noise. Further details on the BOP criteria are provided in Supplementary Section 4. \subsection*{Acknowledgements} G. A. Blab is gratefully acknowledged for 3D printing numerous truncated tetrahedra which increased our understanding of the connection between the iQC and Laves phase structures. N. Tasios is sincerely thanked for providing the code for the diffraction pattern calculation. M. Hermes is sincerely thanked for providing interactive views of the structures in this work. The authors thank G. van Tendeloo, S. Dussi, L. Filion, E. Boattini, S. Paliwal, N. Tasios, B. van der Meer and I. Lobato for fruitful discussions. D.W., E.B.v.d.W. and A.v.B. acknowledge partial financial support from the European Research Council under the European Union's Seventh Framework Programme (FP-2007–2013)/ERC Advanced Grant Agreement 291667 HierarSACol. T.D. and M.D. acknowledge financial support from the Industrial Partnership Programme, ``Computational Sciences for Energy Research" (Grant no. 13CSER025), of the Netherlands Organization for Scientific Research (NWO), which was co-financed by Shell Global Solutions International B.V. G.M.C. was also financially supported by NWO. S.B. and D.Z. acknowledge financial support from ERC Starting Grant No. 335078 COLOURATOMS. T.A. acknowledges a post-doctoral grant from the Research Foundation Flanders (FWO, Belgium). C.B.M and Y.W. acknowledge support for materials synthesis from the Office of Naval Research Multidisciplinary University Research Initiative Award ONR N00014-18-1-2497. \subsection*{Author contributions} A.v.B. initiated the investigation of icosahedral order in binary crystals under spherical confinement and supervised D.W. and E.B.v.d.W. M.D. initiated the simulation study on the binary iQC clusters in spherical confinement and supervised T.D. and G.M.C. T.D. performed computer simulations of the spontaneous nucleation of binary iQC clusters. D.W. synthesised the SPs and obtained, together with T.A., the electron tomography. D.Z. performed SSR tomographic reconstruction and T.A. performed manual segmentations, under the supervision of S.B. Y.W. synthesised NCs under the supervision of C.B.M. E.B.v.d.W., T.D. and G.M.C. developed the BOP analysis of the Laves phases, the iQC clusters and the cluster criterion to track the nucleation of the iQC clusters. D.W., T.D., E.B.v.d.W., M.D. and A.v.B. analysed the results. A.v.B., M.D., D.W., T.D. and E.B.v.d.W. co-wrote the manuscript. All authors discussed the text and interpretation of the results. \subsection*{Additional information} \subsection*{Competing interests} The authors declare no competing interests. \printbibliography \subsection*{Extended data} \doublespacing \renewcommand{\figurename}{Extended Data Figure \setcounter{figure}{0} \clearpage \begin{figure}[!t] \includegraphics[width=0.80\textwidth]{ExtendedFig_NCs_BNSL} \centering \caption{ \textbf{TEM images of binary NCs and self-assembled binary NC superlattices.} TEM images of a) 7.7 nm CdSe (a total polydispersity of 2\%; 5.2 nm core diameter), b) 9.9 nm PbSe NCs (a total polydispersity of 1\%; 7.6 nm core diameter) and c) self-assembled binary NC superlattices in bulk. Scale bars, a-b) 50 nm, c) 200 nm. \label{ExtendedFig_NCs_BNSL}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{ExtendedFig_Exp_SPs_overview_and_tilting_v2} \centering \caption{ \textbf{HAADF-STEM images of self-assembled binary SPs showing five-fold symmetry.} a) Overview of self-assembled binary SPs. b) A SP with a diameter of 293 nm showing five-fold symmetry, marked with yellow dashed lines. c-j) a SP with a diameter of 158 nm at different tilting angles. The five-fold symmetry can be viewed at a tilting angle of +50$^\circ$. Scale bars: a) 200 nm, b) 50 nm, c-j) 50 nm, respectively. \label{ExtendedFig_ExtendedFig_Exp_SPs_overview_and_tilting_v2}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{Extended_Fig_reconstruction} \centering \caption{ \textbf{Tomographic reconstruction of two self-assembled binary SPs.} Tomographic reconstructed orthoslices through the middle part of the reconstructed volumes using a,f) SIRT and b,g) SSR. c,h) Manually segmented \textit{L} species (PbSe NCs). 3D representation of the reconstructed volumes using d,i) SIRT and e,j) SSR, for two binary SPs with a diameter of a-e) 170 nm and f-j) 110 nm, respectively. a,b,f,g) Bright spheres and dim spheres represent \textit{L} species and \textit{S} species, respectively. e,j) \textit{L} and \textit{S} species are coloured with cyan and red, respectively. The transparency of the particles in d,e,i,j were increased for visual clarity. \label{Extended_Fig_reconstruction}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{ExtendedFig_TEM_five_fold_gallery} \centering \caption{ \textbf{Electron tomography analysis of self-assembled binary SPs of different sizes.} a,b,c,d) 2D HAADF-STEM images and e,f,g,h) corresponding reconstructed 3D representations of self-assembled binary SPs with diameters of a) 80 nm, b) 132 nm, c) 167 nm and d) 170 nm. Particles in cyan and red represent PbSe and CdSe NCs, respectively. Five-fold symmetry was illustrated by yellow dashed lines. Scale bars: a) 20 nm, b-d) 50 nm, respectively. For the number of particles in the self-assembled SPs, see Supplementary Table 1. \label{ExtendedFig_TEM_five_fold_gallery}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{ExtendedFig_Simulated_Colored} \centering \caption{ \textbf{SPs of different system sizes as obtained from MD simulations.} The simulations are performed on system sizes of $N_{\small tot}$ = 3,501, 5,001 and 10,002 spheres, respectively. Binary iQCs are observed to spontaneously crystallize for all of them. Crystalline particles belonging to the iQC cluster are identified using BOPs. The different crystalline domains are shown in different colours. For crystalline and domain classification, see Supplementary Section 4. The \textit{S} particles in each domain are coloured in a darker shade of the same colour as the \textit{L} particles. Particles not belonging to the iQC cluster are reduced in size for visual clarity. \label{ExtendedFig_Simulated_Colored}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{ExtendedFig_2-3-fold_symmetries_FFT} \centering \caption{ \textbf{Cross-section views of computer rendered representations of a simulated SP exhibiting two-, three- and five-fold symmetries.} a,c,e) Real-space configurations of the simulated SP composed of $N_{\small tot}$ = 5,001 spheres and b,d,f) corresponding calculated diffraction patterns of a, c and e, viewed along two- (2f), three- (3f) and five-fold (5f) axes. The diffraction pattern is calculated based on the time-averaged coordinates of the particles belonging to the iQC cluster identified using BOPs described in Supplementary Section 4. \label{ExtendedFig_2-3-fold_symmetries_FFT}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{ExtendedFig_BOP} \centering \caption{ \textbf{Local structural symmetries of \textit{L} species in SPs.} Scatter plot of the average BOPs of the \textit{L} particles in the $\overline{q}_{4,LL}$ - $\overline{q}_{6,LL}$ plane of the crystal structure of a) an experimental and c) a simulated SP. For the simulated SP, only the BOP values of the $N$ particles in the core are plotted (see Supplementary Section 3). The blue and red boxes signify the BOP values that we used to identify the MgCu$_2$-like and MgZn$_2$-like local symmetry, respectively, of the particles in the final structure. The purple box represents the symmetry of the pentagonal tubes (or icosahedral chains) that run through the SP. These pentagonal tubes are formed by the edges of five neighbouring tetrahedral domains. Cross-section views of final configurations of the corresponding b) experimental SP ($N$ = 2,609, 110 nm) and d) simulated SP ($N_{tot}$ = 5,001), in which the particles are coloured accordingly (\textit{i.e.} MgZn$_2$-like, MgCu$_2$-like particles, and pentagonal tubes are coloured in red, blue and purple, respectively). All other particles (not belonging to either of the three boxes) are coloured green. It is observed that the tetrahedral domains in the icosahedral SP are composed of particles with MgCu$_2$-like symmetry (blue). The shared faces of adjacent tetrahedral MgCu$_2$ domains show MgZn$_2$-like symmetry (red). e) Fraction of MgCu$_2$-like particles for different system sizes: experimental with $N$ = 2,609 (110 nm) and 9,898 particles (187 nm) and simulated SPs with $N$ = 1,990, 3,060 and 6,870 ($N_{tot}$ = 3,501, 5,001 and 10,002) particles. The different estimates of the MgCu$_2$-like fraction are based on the different grouping of particle symmetries as described in the legend. The error bars are obtained from three independent simulations. \label{ExtendedFig_BOP}} \end{figure} \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{ExtendedFig_layering_and_correlations_final} \centering \caption{ \textbf{Species density profiles of the highly structured fluid phase.} Radial density profiles of a) $L$ species and b) $S$ species of a binary mixture of $N_{tot}$ = 5,001 HS-like simulated particles in spherical confinement in the equilibrated fluid phase (Fig. \ref{Figure_5_nucleation}b), at the onset of nucleation (Fig. \ref{Figure_5_nucleation}d), and the final SP structure (Fig. \ref{Figure_5_nucleation}g). Strong layering in the outermost shells is observed early in the simulation. The radial density profiles are averaged over 1,000 configurations. \label{ExtendedFig_layering_and_correlations}} \end{figure} \end{document} \section*{Supplementary Methods} \section{Chemicals} Chemicals used were: dextran from Leuconostoc mesenteroides (Sigma Aldrich, mol.\ wt.\ 1,500,000-2,800,000), cyclohexane (Sigma Aldrich, $\ge$99.8\%), \textit{n}-hexane (Sigma Aldrich, $\ge$99.5\%), 1-octadecene (1-ODE, Sigma Aldrich, 90\%) Sodium dodecyl sulfate (SDS, Sigma Aldrich, $\ge$99.0\%), oleic acid (OA, Sigma Aldrich, $\ge$99.0\%), isopropanol (Sigma Aldrich, $\ge$99.5\%), diphenylphosphine (Sigma Aldrich, $>$90\%), trioctylphosphine (TOP, Sigma Aldrich, 97\%), selenium shot (Se, Alfa Aesar, 99.999\%), lead (II) oxide (PbO, Sigma Aldrich, 99.999\%), cadmium oxide (CdO, Sigma Aldrich, $\ge$99.99\%), toluene (Sigma Aldrich, anhydrous, 99.8\%), diethylene glycol (DEG, Sigma Aldrich, 99\%). For de-ionized water (DI H$_2$O) a Millipore Direct-Q UV3 reverse osmosis filter apparatus was used (\SI{18}{M \ohm} at \SI{25}{\degree C}). \section{Nanocrystal (NC) syntheses and self-assembled supraparticles (SPs)} \subsection{CdSe NCs} 7.7 nm CdSe NCs including ligands (a total polydispersity of 2\% by counting 130 CdSe NCs in TEM; 5.2 nm core diameter; Extended Data Fig. 1a) were synthesised by cation exchange from 5.2 nm PbSe template based on reported recipes \autocite{Pietryga2008}. 750 mg of CdO, 5.0 mL of OA and 25 mL 1-ODE were mixed and degassed at \SI{105}{\degree C} for 30 minutes. Then the mixture was heated to \SI{250}{\degree C} in a nitrogen atmosphere to get a clear solution. The solution was kept at \SI{250}{\degree C} for 20 minutes, then allowed to cool down to \SI{105}{\degree C}. It was degassed again for 1 hour and then heated to \SI{210}{\degree C}. 150 mg of PbSe NCs were dispersed in 3.0 mL of toluene and swiftly injected into the reaction flask. The solution turns red in a few seconds, indicating the formation of CdSe NCs. The reaction was kept at \SI{210}{\degree C} for 45 minutes and then cooled down to room temperature (RT). The as-synthesised CdSe NCs were purified with isopropanol three times, dispersed in \textit{n}-hexane and stored in a glove box. \subsection{PbSe NCs} 9.9 nm PbSe NCs including ligands (a total polydispersity of 1\% by counting 170 PbSe NCs in TEM; 7.6 nm core diameter; Extended Data Fig. 1b) were synthesised following reported recipes \autocite{steckel2006}. Specifically, 0.895 g of PbO, 3.0 mL of OA, and 20 mL of 1-ODE were mixed and degassed at \SI{105}{\degree C} for 1.5 hours. Then the solution was heated to \SI{105}{\degree C} in a nitrogen atmosphere. \SI{71} {\micro L} of diphenyl phosphine was mixed with 8.0 mL of trioctylphosphine-selenium (TOP-Se) solution (1 M). The mixture was swiftly injected into the reaction flask. The NCs were allowed to grow at \SI{105}{\degree C} for 10 minutes and then quenched by an ice bath. The as-synthesised PbSe NCs were purified with isopropanol three times, dispersed in \textit{n}-hexane and stored in a glove box. \subsection{Experimental self-assembled SPs} \begin{table}[htp] \centering \begin{tabular}{c c c c } \hline \hline $D$ (nm)&$N$&$N_L$&$N_S$\\[0.1 cm] \hline 80&832&300&532\\ \hline 110&2,609&961&1,648\\ \hline 132&2,631&1,323&1,308\\ \hline 167&7,767&3,037&4,730\\ \hline 170&9,978&2,809&7,169\\ \hline 187&9,898&3,267&6,631\\ \hline \end{tabular} \caption{Details of experimental SPs discussed in this work, from a binary mixture of NCs with a size ratio of 0.78 under spherical confinement. $D$, $N$, $N_L$ and $N_S$ are the diameter, number of binary species, $L$ species (PbSe NCs) and $S$ species (CdSe NCs), respectively. \label{exp_SP_number}} \end{table} \section{\label{bop_ll}Bond-orientational order parameter analysis of the local symmetry of the particles} \noindent The local symmetry of the $L$ particles in the SPs was characterised using averaged bond-orientational order parameters (BOPs)~\autocite{lechner2008accurate}. In particular, the $\overline{q}_{4}$ and $\overline{q}_{6}$ order parameters were used. $\overline{q}_{l}$ of a particle $i$ is defined as: \begin{linenomath*} \begin{equation*} \overline{q}_{l} (i) = \sqrt{\frac{4\pi}{2l+1}\sum_{m=-l}^{l} \vert \overline{q}_{l,m}(i)\vert^2}, \end{equation*} \end{linenomath*} where: \begin{linenomath*} \begin{equation*} \overline{q}_{l,m}(i) = \frac{1}{N_{b}(i)+1}\sum_{k=0}^{N_{b}(i)} q_{l,m}(k), \end{equation*} \end{linenomath*} with $N_{b}(i)$ denoting the number of ($L$) neighbours of ($L$) particle $i$ and $k = 0$ represents the particle $i$ itself. $q_{l,m}(i)$ is the traditionally defined normalised 3D bond order parameter for ($L$) particle $i$~\autocite{steinhardt1983bond}. Nearest neighbours were determined by locating all particles within a cut-off distance $r_c$ from particle $i$, where $r_c$ corresponded to the first minimum of the radial distribution function $g_{LL}(r)$. As particles close to the SP surface have a lower number of nearest neighbours and therefore have a lower BOP value, particles closer than $2\sigma_L$ to the spherical confinement in simulations were not presented in the scatter plot and ignored in the estimation of the threshold BOP values which were used to characterise the local structural environment. For the experimental data sets, the center of mass of the $L$ particles was defined, after which a sphere from this center was defined with a radius such that a minimal of two layers of particles were excluded. The fraction of MgCu$_2$-like particles is calculated without accounting for these `surface' particles. As a reference, the scatter plots of the $\overline{q}_{4,LL}$ and $\overline{q}_{6,LL}$ parameters of the $L$ particles in the three Laves phases were calculated for $NVT$ equilibrated Laves phases at coexistence density $\rho\sigma_\textrm{\scriptsize av}^3$ = 0.953 (Supplementary Fig. \ref{SI_Fig_Bond_Order_Laves_Phases}). By subsequent colouring of the particles in relation to their position in the $\overline{q}_{6,LL}$--$\overline{q}_{4,LL}$ scatter plot, their local symmetry was identified. To distinguish the local environment corresponding to the MgZn$_2$-like and MgCu$_2$-like symmetries, the following regions in the scatter plot were defined as $ 0.305 < \overline{q}_{4,LL} < 0.42 $ and $ 0.4 < \overline{q}_{6,LL} < 0.61 $ (MgZn$_2$-like), and $ 0.42 < \overline{q}_{4,LL} < 0.585 $ and $ 0.48 < \overline{q}_{6,LL} < 0.67 $ (MgCu$_2$-like). In addition, we used an additional region to colour the $L$ particles that are part of the pentagonal tubes: $ 0.18 < \overline{q}_{4,LL} < 0.305 $ and $ 0.35 < \overline{q}_{6,LL} < 0.55$. \section{\label{bop_nucl}Tracking the nucleation and growth of the iQC cluster in spherical confinement} \noindent We used a different approach to detect the nucleation of crystalline clusters in the supersaturated fluid in our simulation trajectories. Here we used a dot product $d_{l,\alpha\beta}(i,j) =\sum\limits_{m=-l}^l q^{\alpha}_{l,m}(i) q^{*\beta}_{l,m}(j)$ correlation between particle $i$ and its neighbour $j$ for all three species combinations, with $\alpha,\beta$ denoting the type of species, to identify particles belonging to the iQC crystalline cluster. Nearest neighbours $j$ were determined by locating all particles within a cut-off distance $r_c$ from particle $i$, where $r_c$ corresponds to the first minimum of the radial distribution function $g_{\alpha\beta}(r)$. For the (i) \textit{L}-\textit{L} species correlation, we used $d_{6,LL} > 0.4$, (ii) \textit{S}-\textit{S} species correlation, $-0.23 < d_{6,SS} < -0.04$ and (iii) \textit{S}-\textit{L} species correlation $-0.46 < d_\textrm{6,LS} < -0.1$. If the dot product $d_{l,\alpha\beta}(i,j)$ between the BOPs of two particles is in the range of the cut-off values specified (based on the species types), they share a ``solid-like'' bond. If the total number of solid-like bonds of a particle $i$ with its neighbours was greater than a threshold value $\xi_c$, then particle $i$ was crystalline. For a \textit{L} particle, $\xi_c^L$ = 10 and for a \textit{S} particle, $\xi_c^S$ = 9. The above criteria were sufficient to distinguish the crystalline particles from the surrounding fluid. Additionally, to distinguish the tetrahedral domains from each other, we employed a dot product $\overline{d}_{6,\alpha\beta}(i,j)$ correlation between two neighbouring \textit{L} crystalline particles $i$ and $j$, and identified $i$ and $j$ as belonging to the same crystalline domain if $\overline{d}_{6,LL}(i,j) > 0.8$. Here $\overline{d}_{l,\alpha\beta}(i,j)$ has the same form as defined above, but is calculated with the average BOPs \autocite{lechner2008accurate}. $\overline{q}_{l,m}(i)$ is defined similarly as in Supplementary~\ref{bop_ll}. The \textit{S} particles were assigned domain IDs corresponding to their closest crystalline \textit{L} particle neighbour. \section{Effective diameter of an equivalent hard-sphere system from WCA theory} \noindent Historically, the soft WCA potential has been employed as a perturbation to a reference hard sphere (HS) system, and can be mapped to an equivalent HS system through the determination of an \emph{effective diameter}. This effective diameter may be calculated through a Taylor expansion of the reduced excess free-energy density of the WCA system $f = \beta F^{ex}/V$, where $\beta = 1/k_B T$, in powers of the difference in the Boltzmann factor of the WCA system and a hard sphere system $\Delta e({\bf r})$: \begin{linenomath*} \begin{equation*} f = f_d + \int \frac{\partial f}{\partial e({\bf r})}\bigg\vert_{e = e_d} \Delta e({\bf r}) \textrm{d}{\bf r} + \frac{1}{2} \int \int \frac{\partial^2 f}{\partial e({\bf r}) \partial e({\bf r}^{\bf '})}\bigg\vert_{e = e_d} \Delta e({\bf r}) \Delta e({\bf r}^{\bf '}) \textrm{d}{\bf r} \textrm{d}{\bf r}^{\bf '} + ... \label{exp_fe} \end{equation*} \end{linenomath*} Here, $\Delta e({\bf r}) = e_0({\bf r}) - e_d({\bf r})$ where $e_0({\bf r}) = \exp\left[-\beta \phi (r)\right]$ is the Boltzmann factor of the WCA system with $\phi(r)$ the WCA potential and $e_d({\bf r})$ the Boltzmann factor of the HS system. A detailed discussion of the effective diameter $\sigma^{\footnotesize eff}$ estimation is found in Ref.~\cite{hansen1990theory}, where in essence, equating the free-energy density of the WCA and HS systems (and ignoring the high order terms) results in the effective diameter $\sigma^{\footnotesize eff}$ of the WCA system being defined as follows: \begin{linenomath*} \begin{equation*} \sigma^{\footnotesize eff} = \int_0^\infty \left(1 - \exp\left[-\beta \phi(r)\right]\right) \textrm{d}r . \label{eff_dia} \end{equation*} \end{linenomath*} For the WCA system $T^* = k_BT/\epsilon = $ 0.2, the effective diameter $\sigma_{\alpha}^{\footnotesize eff} = $ 1.0639 $\sigma_{\alpha}$, where $\sigma$ is the WCA diameter as defined in Methods and $\alpha$ denotes the type of species (\emph{i.e.} $L$,$S$). Our nucleation simulations were performed in a constant spherical volume comprising of a binary mixture of WCA spheres with a size ratio of 0.78, in order to speed up equilibration. The number densities and compositions which yield the simulated SPs discussed in this work, and the corresponding effective packing fractions of an equivalent binary HS mixture with a size ratio of 0.78, are listed in Supplementary Table~\ref{reproduce}. \begin{table}[htp] \centering \begin{tabular}{c c c c c c c} \hline \hline $N_{tot}$&$N_L$&$N_S$&$R_{SC}$&$\rho\sigma_{av}^3$&$\rho\sigma_{av}^{3^{(c)}}$&$\eta_\textrm{\tiny HS,eff}$\\[0.1 cm] \hline 3,501&1,366&2,135&8.913&0.802&0.957&0.506\\ \hline 5,001&2,001&3,000&10.036&0.809&0.945&0.510\\ \hline 1,0002&4,001&6,001&12.532&0.831&0.941&0.524\\ \hline \end{tabular} \caption{Simulation details for nucleating the simulated SPs discussed in this work, from a binary mixture of WCA particles with a size ratio $\sigma_S/\sigma_L$ = 0.78 under spherical confinement. $N_{tot}$, $N_L$ and $N_S$ are the total number of particles, number of large WCA spheres and number of small WCA spheres respectively. $R_{SC}$ denotes the radius of the spherical shell, $\rho\sigma_{av}^3$ = $\frac{3N_{tot}\sigma_{L}^3}{4\pi R_{\small SC}^3}\left(\frac{N_L}{N_{tot}}+q^3\frac{N_S}{N_{tot}}\right)$ is the reduced number density of the spherical volume, $\rho\sigma_{av}^{3^{(c)}}$ is the number density of the compressed SP, and $\eta_\textrm{\tiny HS,eff}$ = $\frac{\pi}{6}\rho\sigma_{av}^3 \times \frac{\sigma_{L}^{\footnotesize eff^3}}{\sigma_{L}^3}$ is the effective packing fraction of an equivalent binary HS mixture with a diameter ratio of 0.78. \label{reproduce}} \end{table} \clearpage \newpage \section*{Supplementary Figures} \newpage \begin{figure}[!t] \includegraphics[width=0.8\textwidth]{SI_Fig_off_stochiometry} \centering \caption{ \textbf{Influence of stochiometry of binary NCs on self-assembled supraparticles (SPs).} a) Overview and b) a zoomed-in view of self-assembled binary SPs without icosahedral geometry, showing a MgZn$_2$ crystal structure (viewed along the [0001] projection) in coexistence with shells containing CdSe NCs. c) High angle annular dark field-scanning transmission electron microscopy (HAADF-STEM) image and d) elemental distribution superimposition of Cd (red) and Pb (cyan) in a SP with a diameter of 246 nm, viewed along the [11$\bar{2}$0] projection of the MgZn$_2$ crystal structure. Pb was found in the core only, while Cd was present in both the core and shell of the SP. Note that the experimental parameters are the same as those used to obtain icosahedral quasicrystals (iQCs) except that an excess amount (10\% by weight) of CdSe NCs was used. Curved outer layers composed of close-packed CdSe NCs can be viewed clearly in the self-assembled SPs, which are indicated for one SP by a yellow arrow (b). Scale bars, a): 200 nm, b): 100 nm, c-d): 60 nm. \label{SI_Fig_off_stochiometry}} \end{figure} \begin{figure}[!t] \includegraphics[width=1\textwidth]{SI_Exp_SP_FT} \centering \caption{ \textbf{Calculated diffraction pattern of an experimental binary icosahedral SP.} a) Calculated diffraction pattern and b) real-space coordinates of an experimental binary SP containing 2,609 NCs, viewed along a five-fold (5f) axis. For an interactive view, see Supplementary Data 4. \label{SI_Fig_exptl_fft}} \end{figure} \begin{figure}[!t] \includegraphics[width=1\textwidth]{SI_Fig_full_patterns} \centering \caption{ \textbf{Calculated diffraction pattern of a simulated binary icosahedral SP.} a) The calculated diffraction pattern of a simulated binary SP containing $N_{\small tot}$ = 5,001 ($N$ = 3,060) particles, showing five-fold orientational symmetry. The diffraction is calculated from time-averaged coordinates of the particles belonging to the iQC cluster identified using bond-orientational order parameters (BOPs) described in Supplementary Section 4. The particle coordinates are time-averaged over 10,000 configurations. b) The same pattern with an overlay pointing out the presence of pentagonal symmetry in the pattern, corresponding to an icosahedral quasicrystalline structure. The yellow lines highlight the presence of inflating pentagons in the pattern, which is a direct consequence of the non-crystallographic five-fold orientational symmetry, depicting quasiperiodicity. \label{SI_Fig_full_patterns}} \end{figure} \begin{figure}[!t] \includegraphics[width=1\textwidth]{SI_Fig_tomo2_int_reassigning} \centering \caption{ \textbf{Pixel intensity distributions of reconstructed particles in a binary SP.} Distribution of the summed pixel intensities of the particles in the 110 nm binary SP. The black curves are two Gaussian distributions fitted to the intensity distributions, from which threshold values were determined to differentiate between the CdSe (red) and PbSe (cyan) NCs. The overlap between the two Gaussian curves gives an estimate for the percentage of particles that might be misidentified ($<1\%$). \label{SI_Fig_tomo2_int_reassigning}} \end{figure} \begin{figure}[!t] \includegraphics[width=1\textwidth]{SI_Fig_Bond_Order_Laves_Phases} \centering \caption{ \textbf{Bond orientational order parameters (BOP) of the three Laves phases.} Computer renderings of the $L$ particles in the perfect crystal structures of the three Laves phases: a) MgZn$_2$, b) MgCu$_2$ and c) MgNi$_2$. The stacking of the \textit{L} particle-dimers in the MgZn$_2$, MgCu$_2$ and MgNi$_2$ phases is ...\textit{AABB}..., ...\textit{AABBCC}... and ...\textit{AABBAACC}..., respectively. d) Scatter plot of the BOP values of the \textit{L} particles in the $\overline{q}_{6}$ - $\overline{q}_{4}$ plane of the three Laves phases MgCu$_2$ (blue squares), MgZn$_2$ (red circles) and MgNi$_2$ (black crosses), where the structures were equilibrated at melting density $\rho\sigma_\textrm{\scriptsize av}^{\small 3}$ = 0.953. The effective binary HS packing fraction $\eta_\textrm{\tiny HS, eff}$ = 0.601. In order to assign local symmetries in the BOP analysis of our SP structures, two regions were specified from these simulations: MgZn$_2$-like as denoted by the red rectangle and MgCu$_2$ as denoted by the blue rectangle. The $L$ particles in a-c) are coloured according to their local symmetry, which can be used to distinguish all three Laves phases. \label{SI_Fig_Bond_Order_Laves_Phases}} \end{figure} \clearpage \printbibliography[title={Supplementary References}] \end{document}
\section{Introduction} \label{sec:intro} Every statistical analysis begins by selecting a study sample from some population of interest. When the sample is representative of the population (e.g. a simple random draw), the inference we draw from the study can be generalized to the whole population. However, if individuals are selected or drop out of the sample non-randomly, then valid inference for the population is no longer guaranteed. Non-random selection can systematically distort the distribution of, and relationships among, variables within the sample. When this, in turn, distorts the distribution of sample statistics of interest, we call this selection bias. Because it occurs during data collection, selection bias cannot be ameliorated with larger samples and it can rarely be detected using the observed sample alone \citep{Bareinboim2014}. As a motivating example, UK Biobank is a large population-based cohort widely analysed by epidemiologists, health economists, clinicians and others. Studies of this cohort show that participants differ systematically from the rest of the UK population on measures such as education, health status, age and geographical location \citep{Fry2017}. This has lead to an intensive discussion among practitioners on the impact of non-random selection for studies using UK Biobank data. For example, \cite{Naimi2017} argues that the protective effects of moderate alcohol consumption on mortality found in previous studies, several of which used UK Biobank data, may be driven by higher probabilities of sample selection among both healthier individuals and moderate drinkers. Inverse probability weighting could be used to correct for this selection bias (\citealp{Horvitz1952, Stuart2011}), but no individual-level data on the non-selected is available for UK Biobank, so the weights cannot be estimated. To address this problem, \cite{Aronow2013} propose an interval estimator which provides bounds on population means under unknown probabilities of sample selection given the assumption that the probabilities are bounded. However, \citeauthor{Aronow2013}'s estimator has many limitations in practice: it is restricted to population means; it does not provide a procedure for conducting statistical inference; the bounds are often implausibly wide for reasonable choices for the probability bounds; and it assumes no knowledge of the selection mechanism or population from which the sample is drawn, whereas some information is typically available to researchers. \cite{Miratrix2018} builds on \citeauthor{Aronow2013}'s approach by showing that the probability weights imply a population distribution for the outcome and that imposing shape constraints, such as symmetry or log-concavity, on this distribution can tighten the bounds for the population mean. While this is an appealing approach for tightening the bounds, it relies on imposing structure on the underlying data distributions, which may become difficult to justify in higher dimensions. \cite{Miratrix2018} also has no procedure for conducting statistical inference. Our paper contributes to the literature on interval estimation for selection bias by addressing the limitations of existing methods outlined above. Namely, we extend \citeauthor{Aronow2013}'s estimator to population parameters defined by a more general class of estimating equations \citep{VanderVaart1998}. We provide a formal approach to inference and hypothesis testing based on the asymptotic properties of stochastic programming problems described in \cite{Shapiro1991}. We demonstrate that the percentile bootstrap confidence intervals of \cite{Zhao2019} for Rosenbaum-type sensitivity models are also applicable in this setting. Lastly, we show how domain knowledge or information from representative samples (e.g. censuses) can be used to tighten the estimated bounds; this information includes the survey response rate, population means of covariates and knowledge of the direction in which certain variables influence sample selection. This work is related to the small but growing literature on sensitivity analyses for selection bias (see further: \citealp{Huang2015, Lash2003, Smith2019}). \section{Set-Up} \label{sec:setup} We outline key notation and definitions that will be used throughout this paper. Consider an independent and identically distributed draw of size $N$ from a potentially infinite population. For concreteness, we can think of this finite draw as the set of individuals who are eligible to enter the sample. Let $S_i \in \lbrace 0, \, 1 \rbrace$ be a missingness indicator for whether individual $i$ enrols in the sample, where $S_i = 1$ indicates sample participation, and let the observed sample size be denoted by $n = \sum_{i=1}^N S_i$. Without loss of generality, assume $S_1 = \ldots = S_n = 1$ and $S_{n+1} = \ldots = S_N = 0$. Denote $T_i \in \mathcal{T} \subset \mathbb{R}^{t}$ as some vector-valued random variable observed within the selected sample. We assume that sample selection is a deterministic function of some other random variable $D_i \in \mathcal{D} \subseteq \mathbb{R}^d$ such that \begin{equation*} \pr\bigl( S_i = 1 \mid D_i \bigr) \, \equiv \, 1/\lambda_0(D_i) \end{equation*} where $\lambda_0 : \mathcal{D} \to [1,\,\infty)$ is individual $i$'s inverse probability of sample selection. Denote $E[ \, \cdot \,]$ as the population expectation and $E_S[\, \cdot \,]$ as a shorthand for $E[\, \cdot \, | \, S_i = 1]$ (i.e. expectation in the selected sample). We assume that our estimand, denoted by $\beta_0$, is defined by the following moment condition: \begin{equation} \begin{array}{l@{}l} 0 &{}= E_S\left[\lambda_0(D_i) \left\lbrace f(T_i) - \beta_0 \, g(T_i)\right\rbrace \right] = E\left[f(T_i) - \beta_0 \, g(T_i) \right] \end{array} \label{eqn:mestimator} \end{equation} \noindent where $f,\,g : \mathcal{T} \to \mathbb{R}$ are finite-valued. The two expressions are equivalent because $ E_S[\lambda_0(D_i) f(T_i)] P(S_i = 1) = E[S_i \lambda_0(D_i) f(T_i)] = E[f(T_i)]$ by the law of iterated expectations. Elements of $T_i$ can overlap or be correlated with elements of $D_i$; indeed, if $T_i$ and $D_i$ are independent, then it is easy to see that sample selection will not bias the estimate. Writing the moment condition \eqref{eqn:mestimator} in terms of the sample expectation $E_S$ makes explicit that changing the function inside the expectation to some other function $\lambda : \mathcal{D} \to [1,\,\infty)$ will imply a different population estimand. Therefore, we will often write $\beta(\lambda)$ as the estimand for a given choice of $\lambda$; in this notation, $\beta_0 = \beta(\lambda_0)$. \begin{equation*} \beta(\lambda) \, \equiv \, \left. E_S\bigl[ \lambda(D_i) \, f(T_i) \bigr] \middle/ E_S\bigl[ \lambda(D_i) \, g(T_i) \bigr]. \right. \end{equation*} The class of estimators characterized by \eqref{eqn:mestimator} embed, among others, population means and ordinary least squares and instrumental variable estimands. \begin{equation*} \begin{array}{r@{}l} &{} \text{1) Population mean: } T_i = Y_i, \, f(T_i) = Y_i, \, g(T_i) = 1 \\[1em] &{} \text{2) Ordinary least squares: } T_i = (X_i, Y_i), \, f(T_i) = X_i\, Y_i, \, g(T_i) = X_i^2 \\[1em] &{} \text{3) Instrumental variables: } T_i = (Z_i, X_i, Y_i), \, f(T_i) = Z_i\, Y_i, \, g(T_i) = Z_i\, X_i \end{array} \end{equation*} If $\lambda_0(D_i)$ was known for each individual in the selected sample, then we could consistently estimate $\beta_0$ using the inverse probability-weighted estimator \begin{equation} \begin{array}{l@{}l} \hat{\beta}_n(\lambda_0) &{}= \displaystyle \left. \left(\sum_{i=1}^n \lambda_0(D_i) \, f(T_i) \right) \middle/ \left(\sum_{i=1}^n \lambda_0(D_i) \, g(T_i) \right) \right.. \end{array} \label{eqn:beta} \end{equation} \noindent The term $\lambda_0(D_i)$, however, is not usually observed or even estimable in an observational study in the absence of individual-level data on the non-selected observations. In such cases, the parameter of interest $\beta_0$ may not be identifiable. However, it is often reasonable to assume that each individual's unobserved sample selection probability is bounded. \begin{assumption} (Bounded selection probabilities) For all $D_i \in \mathcal{D}$, with probability one, \begin{equation} \begin{array}{l@{}l} &{} \, 1 \, \leq \, 1/b \, \leq \, \lambda_0(D_i) \, \leq \, 1/a \, < \, \infty. \end{array} \end{equation} where $a$ and $b$ are fixed constants. \label{assum:bound} \end{assumption} \noindent Then, defining $\Lambda(a,\,b) \equiv \left\lbrace \lambda \, : \, \mathcal{D} \to [1/b,\,1/a] \right \rbrace$ as the set of all functions mapping the support of $D_i$ to the interval $[1/b, \, 1/a]$, we may only identify the set \begin{equation} I(a,\,b) = [\beta^L,\,\beta^H], ~ \beta^H = \displaystyle\sup_{\lambda} \bigl\lbrace \beta(\lambda) : \lambda \in \Lambda(a,\,b) \bigr\rbrace, ~ \beta^L = \displaystyle\inf_{\lambda} \bigl\lbrace \beta(\lambda) : \lambda \in \Lambda(a,\,b) \bigr\rbrace \label{eqn:estimandsup} \end{equation} The population optimisation problem \eqref{eqn:estimandsup} is infinite-dimensional and the number of parameters in the corresponding sample optimisation problem grows with the sample size. In order to apply asymptotic theory for stochastic programs, which requires a finite number of parameters, we impose a technical assumption on the support $\mathcal{T}$ requiring it to be discrete. \begin{assumption} (Discrete support) $T_i \in \mathcal{T} = \lbrace t_k \, : \, k = 1,2,...,K \rbrace \subset \mathbb{R}^{t}$. \label{assum:finite} \end{assumption} Let $\hat{p}_n(\, \cdot \,)$ denote the empirical mass of $T_i$ and let $p(\, \cdot \,)$ denote the population mass. When Assumption \ref{assum:finite} holds, we can rewrite $\beta(\lambda)$, for some $\lambda \in \Lambda(a,\,b)$, as \begin{equation} \begin{array}{l@{}l} \beta(\lambda) &{}= \displaystyle \left. \left(\sum_{k=1}^K w_k \, f(t_k) \, p(t_k) \right) \middle/ \left(\sum_{k=1}^K w_k \, g(t_k) \, p(t_k) \right) \right. \equiv \, \beta(w) \end{array} \label{eqn:betapop} \end{equation} \noindent where $w_k = E_S[\lambda_0(D_i) \mid T_i = t_k]$ is the average of the inverse probability weights at the value $t_k$. We can define the sample estimator similarly: \begin{equation} \hat{\beta}_n(w) = \displaystyle \left. \left(\sum_{k=1}^K w_k \, f(t_k) \, \hat{p}_n(t_k) \right) \middle/ \left(\sum_{k=1}^K w_k \, g(t_k) \, \hat{p}_n(t_k) \right) \right. . \label{eqn:betafinite} \end{equation} \noindent Therefore, we need only optimize over $w \in \mathcal{W}$ where $\mathcal{W} \, \equiv \, [1/b, \, 1/a]^K$. Under Assumption \ref{assum:finite}, the variational optimization problem \eqref{eqn:estimandsup} is equivalent to a finite-dimensional linear fractional programming problem. Simulations in Section \ref{sec:sims} suggest that the discrete support assumption might not be necessary for our asymptotic theory to hold. \section{Estimation} \label{sec:estimation} We estimate $I(a,\,b)$ with natural estimators which replace $\beta(w)$ with $\hat{\beta}_n(w)$ in the optimisation problem. \begin{equation} \hat{I}_n(a,\,b) = [\hat{\beta}_n^L,\,\hat{\beta}_n^H], ~ \hat{\beta}_n^H = \displaystyle\sup_{w} \bigl\lbrace \hat{\beta}_n(w) \, : \, w \in \mathcal{W} \bigr\rbrace, ~ \hat{\beta}_n^L = \displaystyle\inf_{w} \bigl\lbrace \hat{\beta}_n(w) \, : \, w \in \mathcal{W} \bigr\rbrace \label{eqn:sampleopt} \end{equation} \noindent and $\hat{\beta}_n(w)$ is defined as in \eqref{eqn:betafinite}. The optimization problem \eqref{eqn:sampleopt} is deterministic and can be solved via a simple algorithm described below. For \eqref{eqn:estimandsup} and \eqref{eqn:sampleopt} to have unique solutions, we need to impose two additional regularity conditions outlined in the Supplementary Material. The first regularity condition requires that $f(t_k)/g(t_k) \neq \beta^m$ for all $k$ and $m = L,H$. If this is violated for some $k$, then the optimal value is identical for all values of $w_k$, meaning that the solution is not unique. An example of a function violating this condition is the following: \begin{equation*} \beta(w) \, = \, \displaystyle \frac{w_1 \, + \, 7 w_2 \, + \, 10 w_3}{w_1 \, + \, w_2 \, + \, w_3}, ~ \mathcal{W} \, = \, [1,2]^3 \end{equation*} \noindent In this example, $w = (1,1,2)$ and $w = (1,2,2)$ are both maximizers over $\mathcal{W}$. The maximum value is 7 but $f(t_2)/g(t_2) = 7$ as well, which violates the condition. The second reguarity condition simply ensures that the denominators of $\beta(w)$ and $\hat{\beta}_n(w)$ are non-zero for all $w \in \mathcal{W}$ with probability one. This will hold trivially for estimators with strictly positive denominators (such as population means) but may not hold, for example, with instrumental variables estimators when the instrument is weak. We prove that these assumptions imply solution uniqueness with the following lemma: \begin{lemma} For $m = L,H$, under Assumption \ref{assum:bound}, \ref{assum:finite} and some minor regularity conditions, the set $\mathcal{W}^m \equiv \lbrace w \in \mathcal{W} \, : \,\beta(w) = \beta^m \rbrace$ is a singleton, $\mathcal{W}^m = \lbrace w^m \rbrace$. Similarly, for $n$ sufficiently large, $\hat{\mathcal{W}}^m \equiv \lbrace w \in \mathcal{W} \, : \,\hat{\beta}_n(w) = \hat{\beta}_n^m \rbrace$ is a singleton, $\hat{\mathcal{W}}^m = \lbrace \hat{w}^m \rbrace$, with probability one. \label{lemma:unique} \end{lemma} It can be seen in the proof of Lemma \ref{lemma:unique} that the maximizing weights under the empirical (and population) measure will be of the form \begin{equation} w_k^H = \begin{cases} 1/b & \text{ if } f(t_k)/g(t_k) \, \leq \, \hat{\beta}_n^H ~ (\beta^H) \\ 1/a & \text{ if } f(t_k)/g(t_k) \, > \, \hat{\beta}_n^H ~ (\beta^H) \end{cases} \label{eqn:optweights} \end{equation} \noindent and the minimizing weights will be of an equivalent form but with the inequalities reversed. Both Proposition 1 of \cite{Aronow2013} and Section 4.4 of \cite{Zhao2019} propose equivalent algorithms for computing the optimizing weights in the population means setting. Lemma \ref{lemma:unique} shows that we can generalize this algorithm to our broader class of estimands. In short, we can order $f(t_k)/g(t_k)$ from smallest to largest and evaluate $\hat{\beta}_n(w)$ by enumerating over the weight at which $1/b$ changes to $1/a$, which has computational complexity $O(n)$. Alternatively, one could use a general solver for linear fractional programs. The following theorem establishes consistency of our estimator: \begin{theorem} For $m = L, H$, let $\hat{w}^m \in \mathcal{W}$ denote the $K$-dimensional weight vector solving the sample optimization problem \eqref{eqn:sampleopt} and let $w^m$ denote the population optimizing weights. Then, under Assumption \ref{assum:bound}, \ref{assum:finite} and some minor regularity conditions, $\hat{\beta}_n^m \, \to \, \beta^m$ and $\hat{w}^m \, \to \, w^m$ with probability one as $n \to \infty$. \label{thm:consistency} \end{theorem} We can also make a statement about the finite sample bias of \eqref{eqn:sampleopt}. Theorem 21.3 of \cite{Davidson2003} is a general statement about sample averages and implies that if $\hat{\beta}_n(w)$ is an unbiased estimator for $\beta(w)$ for fixed $w$, then, on average, $\hat{\beta}_n^L$ will under-estimate the true $\beta^L$ and $\hat{\beta}_n^H$ will over-estimate the true $\beta^H$. Since the numerator and denominator of \eqref{eqn:betafinite} are dependent in sample, unbiasedness for fixed $w$ is not true in general. The instrumental variables estimator, for example, is biased in finite sample and falls into the class of estimators we consider. \section{Inference} \label{sec:inference} \subsection{Inference under asymptotic normality} \label{sec:inference:asymptotic} There is a well-established literature in stochastic optimization theory on using sample average approximations to solve optimization problems characterized by functions of expected values. Since optimization of expected values is often intractable, sample average approximation methods draw a large number of values from the underlying distribution and optimize the sample average instead, which is a deterministic function. Value and solution convergence rates and distributional properties of these approximations are well known \citep{Shapiro2009}. By framing our estimand as the solution to a stochastic optimization problem and our estimator as a sample average approximation, we can utilize many of these known properties to conduct valid inference. This approach to inference is particularly useful for dealing with large sample sizes, where bootstrap approaches may be computationally intensive; for example, our motivating dataset, UK Biobank, has over 500,000 observations. We begin with an assumption on the convergence properties of our estimator. \begin{assumption} (Convergence in distribution) \\ a) For all $w \in \mathcal{W}$, $\sqrt{n} (\hat{\beta}_n(w) \, - \, \beta(w)) \, \to \, \mathcal{N}\bigl(0, \, \sigma^2(w) \bigr)$ in distribution. \\[0.5em] b) Let $C(\mathcal{W})$ denote the space of continuous functions with domain $\mathcal{W}$. The sequence $V_n(w) = \sqrt{n}(\hat{\beta}_n(w) \, - \, \beta(w))$ converges in distribution to a random element $V(w) \in C(\mathcal{W})$, where $V(w)$ is Gaussian with mean 0 and variance $\sigma^2(w) \in C(\mathcal{W})$. \label{assum:dist} \end{assumption} \noindent Assumption \ref{assum:dist}a means pointwise convergence in distribution of $\hat{\beta}_n(w)$ for any fixed $w$, while Assumption \ref{assum:dist}b means joint convergence of the entire stochastic process. Therefore, Assumption \ref{assum:dist}b is stronger than Assumption \ref{assum:dist}a. Assumption \ref{assum:dist}b is a standard assumption in the stochastic optimization literature and is typically justified by some uniform integrability condition. See \citet[p.164--165]{Shapiro2009} and \citet[p.10--11]{Banholzer2019} for a discussion. Theorem 3.2 of \cite{Shapiro1991}, which is central to the results in this section, is restated in the Supplementary Material. It establishes a central limit theorem for the extremal values of convergent sequences of random functions. We can apply it to our estimator \eqref{eqn:sampleopt} to obtain the following theorem: \begin{theorem} Under Assumption \ref{assum:bound}, \ref{assum:finite} and \ref{assum:dist}b and some minor regularity conditions, \begin{equation} \sqrt{n} \left( \hat{\beta}_n^m - \beta^m \right) \to \mathcal{N}\left(0,\,\sigma^2(w^m)\right), ~ m = L,H \end{equation} in distribution, where $\sigma^2(w^m)$ is the asymptotic variance of $\hat{\beta}_n^m$. \label{thm:distconverge} \end{theorem} Because $\mathcal{W}$ is compact, $\sqrt{n}(\hat{\beta}_n \, - \, \beta)$ converges in distribution to a Gaussian with mean zero and variance $\sigma^2$ by Assumption \ref{assum:dist}b and $\beta(w)$ has a unique minimizer and maximizer by Lemma \ref{lemma:unique}, Theorem \ref{thm:distconverge} follows from Theorem 3.2 of \cite{Shapiro1991}. Naturally, in finite sample, $\sigma^2(w^m)$ will need to be estimated. We establish the conditions needed for a valid estimator with the following proposition: \begin{proposition} Suppose that $\sigma^2(w)$ is continuous and there exists some $\hat{\sigma}^2_n(w)$ such that $\sup_{w \in \mathcal{W}} \vert \hat{\sigma}^2_n(w) \, - \, \sigma^2(w) \vert \, \to 0$ with probability one. Then \begin{equation*} \hat{\sigma}^2_n(\hat{w}^m) \, \to \, \sigma^2(w^m), ~ m = L,H. \end{equation*} \noindent with probability one. \label{prop:stderror} \end{proposition} Some sufficient conditions for almost sure convergence of $\sup_{w \in \mathcal{W}} \vert \hat{\sigma}^2_n(w) \, - \, \sigma^2(w) \vert$ are given by Theorem 21.10 in \cite{Davidson2003}. Now we can define a two-sided $100(1-\alpha)\%$ confidence interval for $I(a,\,b)$ by $[C_n^L(\hat{w}^L; \alpha/2), \, C_n^H(\hat{w}^H; \alpha/2)]$ such that \begin{equation} C_n^L(\hat{w}^L; \alpha) = \hat{\beta}_n^L - Z_{\alpha/2} \, \frac{\hat{\sigma}_n(\hat{w}^L)}{\sqrt{n}}, ~ C_n^H(\hat{w}^H; \alpha) = \hat{\beta}_n^H + Z_{\alpha/2} \, \frac{\hat{\sigma}_n(\hat{w}^H)}{\sqrt{n}} \label{eqn:confidence} \end{equation} \noindent where $Z_{\alpha}$ is the upper $\alpha$-quantile of the standard normal distribution. This is the $100(1-\alpha)\%$ confidence interval for the identified interval $I(a,\,b)$ and not for the parameter $\beta_0$. It follows from Lemma 1 of \cite{Imbens2004} that this confidence interval has at least $1 - \alpha$ coverage for $\beta_0$ as well, however, it will likely be too conservative if $\beta_0$ is the target of coverage. We can perform hypothesis testing by inverting these confidence intervals. \begin{equation} H_0: \, \tilde{\beta}_0 \in [\beta^L,\,\beta^H], ~ H_1: \, \tilde{\beta}_0 \notin [\beta^L,\,\beta^H] \label{eqn:hypothesis} \end{equation} \noindent where $\tilde{\beta}_0$ is a hypothesized value for $\beta_0$. The following proposition gives an asymptotically valid p-value: \begin{proposition} \noindent A valid p-value for the hypothesis $\tilde{\beta}_0 \in [\beta^L,\,\beta^H]$ is \begin{equation} \displaystyle\Phi\left(\frac{\hat{\beta}_n^H - \tilde{\beta}_0}{\hat{\sigma}_n(\hat{w}^H)/\sqrt{n}}\right) \, - \, \Phi \left(\frac{\hat{\beta}_n^L - \tilde{\beta}_0}{\hat{\sigma}_n(\hat{w}^L)/\sqrt{n}}\right) \label{eqn:pvalue} \end{equation} \noindent where $\Phi(\,\cdot \,)$ denotes the standard normal CDF. \end{proposition} \noindent We demonstrate that this p-value has good small sample properties via simulation in Section \ref{sec:sims}. \subsection{Bootstrap confidence intervals} \label{sec:bootstrap} \noindent We can also obtain asymptotically valid inference without assuming convergence of the whole process $\hat{\beta}_n(w)$ (Assumption \ref{assum:dist}b) by using the percentile bootstrap proposed in \cite{Zhao2019}. An additional advantage of this method over the asymptotic approach in the previous section is that it does not require Assumption \ref{assum:finite} of a discrete support $\mathcal{T}$ for the data $T_i$, provided $\mathcal{T}$ is compact. We refer readers to \cite{Zhao2019} for a detailed exposition of their approach, which we only briefly summarize here. Let $T \equiv \lbrace T_1, \ldots, T_n \rbrace$ be a sample drawn non-randomly from the population. For some $\lambda \in \Lambda(a,\,b)$, let $\hat{\beta}_{n,r}(\lambda)$ be the inverse probability weighted estimate \eqref{eqn:beta} from the $r$th independent and identically distributed resample from the empirical distribution of $T$, $r = 1,...,R$. Then the percentile bootstrap confidence interval is written as $[\tilde{C}^L,\,\tilde{C}^H]$ where \begin{equation} \tilde{C}^L_n = Q_{\alpha/2}\biggl(\biggl(\inf_{\lambda \in \Lambda(a,\,b)} \hat{\beta}_{n,r}(\lambda)\biggr)_{r = 1,\ldots,R}\biggr), ~ \tilde{C}^H_n = Q_{1-\alpha/2}\biggl(\biggl(\sup_{\lambda \in \Lambda(a,\,b)} \hat{\beta}_{n,r}(\lambda)\biggr)_{r = 1,...,R}\biggr). \label{eqn:bootci} \end{equation} \noindent where $Q_{\alpha}(\, \cdot \,)$ denotes the $\alpha$ percentile. In practice, this involves solving $R$ fractional programming problems from the bootstrap distribution and calculating the desired percentiles. \begin{proposition} Given Assumption \ref{assum:bound}, Assumption \ref{assum:dist}a, compactness of $\mathcal{T}$ and the regularity conditions in Theorem \ref{thm:distconverge}, $[\tilde{C}^L_n, \tilde{C}^H_n]$ is an asymptotically valid confidence set for $\beta_0$ and $I(a,b)$ with coverage at least $1 - \alpha$ under the collection of weight functions $\Lambda(a,b)$. \label{prop:boot} \end{proposition} Proof of Proposition \ref{prop:boot} follows directly from Theorem 2 of \cite{Zhao2019}. \section{Incorporating population-level information} \label{sec:poplevel} \subsection{General framework} \label{sec:poplevel:framework} In the original set-up in Section \ref{sec:setup}, we assume no knowledge of the population or selection mechanism beyond the bounding parameters $a$ and $b$. However, we often have some additional information about the target population. It seems natural to use this information to place more constraints on the weights. In this section, we develop a general framework for incorporating auxiliary information into the constraint set and conclude with two specific examples: the survey response rate and covariate means. Suppose the weights $w$ fall into the constraint set \begin{equation} \mathcal{W}_0 \, \equiv \, \biggl\lbrace w \in \mathcal{W} \, : \, h_j(w) \, \leq \, 0, ~ j = 1,...,J \biggr\rbrace, ~ h_j(w) \, \equiv \, \displaystyle \sum_{k=1}^K w_k \, H_j(t_k) \, p(t_k). \label{eqn:feasiblepop} \end{equation} \noindent We give examples of possible constraint functions in Sections \ref{sec:poplevel:responserate} and \ref{sec:poplevel:popmeans}. Since $h_j(w)$ are functions of the unobserved population mass $p$, we cannot directly observe $\mathcal{W}_0$. The naive approach of simply replacing $p$ with $\hat{p}_n$ and computing the sample expectation is problematic because there is no guarantee that the resulting set will contain the population constraint set $\mathcal{W}_0$. To solve this problem, we need to construct a set that contains $\mathcal{W}_0$ with high probability under repeated sampling. The approach we adopt is to relax the sample constraint set such that solutions are feasible to the population problem with some level of confidence. This will involve selecting a $J$-dimensional sequence $\epsilon_n(w) \geq 0$ and letting the relaxed sample feasible region be written as \begin{equation*} \hat{\mathcal{W}}_{\epsilon_n} \, \equiv \, \biggl\lbrace w \in \mathcal{W} \, : \, \hat{h}_j(w) \, \leq \, \epsilon_{jn}(w), ~ j = 1,...,J \biggr\rbrace, ~ \hat{h}_j(w) \, \equiv \, \displaystyle \sum_{k=1}^K w_k \, H_j(t_k) \, \hat{p}_n(t_k). \end{equation*} \noindent Then we can write the sample maximization problem as $\sup_{w} \lbrace \hat{\beta}_n(w) \, : \,w \in \hat{\mathcal{W}}_{\epsilon_n} \rbrace$. Setting aside the possible computational complexity of this constraint, it remains to select a sequence $\epsilon_n(w)$ that ensures feasibility with some level of confidence $0 < \alpha_1 < 1$, that is, $\pr\bigl(\mathcal{W}_0 \subseteq \hat{\mathcal{W}}_{\epsilon_n}\bigr) \geq 1-\alpha_1$. If $J = 1$ then a natural choice is to construct a one-sided $100(1-\alpha_1)\%$ confidence interval around $\hat{h}_1(w)$. If $\hat{\sigma}_{h_1}(w)$ is the sample standard deviation of $\hat{h}_1(w)$ then we can write \begin{equation} \epsilon_{1n}(w) = Z_{\alpha_1} \, \hat{\sigma}_{h_1}(w)/\sqrt{n} \end{equation} \noindent where $Z_{\alpha_1}$ is the upper $\alpha_1$-quantile of the standard normal distribution. The resulting $\hat{\mathcal{W}}_{\epsilon_n}$ naturally has the desired coverage as $n$ becomes large. It is straight-forward to extend this to $J > 1$. If we construct confidence intervals around each $\hat{h}_j(w)$ with $1-\alpha_{1j}$ coverage, then, by the intersection bound, $\hat{\mathcal{W}}_{\epsilon_n}$ has coverage of $\mathcal{W}_0$ of at least $1 - \sum_{j=1}^J \alpha_{1j}$. We denote constraint sets with this property by \begin{equation} \begin{array}{l@{}l} &{} \hat{\mathcal{W}}_{\alpha} \, \equiv \, \biggl\lbrace w \in \mathcal{W} \, : \, \hat{h}_j(w) \, \leq \, Z_{\alpha_{1j}} \, \hat{\sigma}_{h_j}(w) n^{-1/2}, ~ j = 1,...,J \biggr\rbrace, ~ \alpha_1 \, = \, \displaystyle \sum_{k=1}^K \alpha_{1j}. \end{array} \label{eqn:feasiblesample} \end{equation} The remaining challenge is to assess the overall coverage of the confidence interval \eqref{eqn:confidence} computed over the relaxed constraint set \eqref{eqn:feasiblesample}. To achieve this, we need to impose some regularity condition on $\hat{\sigma}^2_n(w)$ of Proposition \ref{prop:stderror} with the following assumption. \begin{assumption} Suppose $\hat{\sigma}^2_n(w)$ is a consistent estimator for $\sigma^2(w)$ in the sense of Proposition \ref{prop:stderror}. Then, for sufficiently large $n$, $\hat{\sigma}^2_n(w)$ is Lipschitz continuous in $w$ with probability one. \label{assum:lipschitz} \end{assumption} It follows from \cite{vanKempen2000} that Assumption \ref{assum:finite} implies Lipschitz continuity in $\hat{\sigma}^2_n(w)$ up to a first order Taylor expansion. Therefore, Assumption \ref{assum:lipschitz} only imposes some regularity condition on the remainder term. The following theorem shows that, for a suitable choice of $\alpha_1$, defined as the significance level of the relaxed sample constraint set \eqref{eqn:feasiblesample} and $\alpha_2$, defined as the significance level of the confidence interval \eqref{eqn:confidence}, we can achieve nominal coverage for the true identified interval over $\mathcal{W}_0$. \begin{theorem} Define $\mathcal{W}_0$ as in \eqref{eqn:feasiblepop} and define the sequence $\lbrace \hat{\mathcal{W}}_{\alpha_1} \rbrace$ as in \eqref{eqn:feasiblesample}, where $\alpha_1$ is some positive constant such that \begin{equation*} \lim_{n \to \infty} \pr\bigl(\mathcal{W}_0 \, \subseteq \, \hat{\mathcal{W}}_{\alpha_1} \bigr) \, \geq \, 1 - \alpha_1 \end{equation*} and let $\alpha_2$ denote the significance level of \eqref{eqn:confidence}. Let \begin{equation*} \hat{w}^L_{\alpha_1} \, \equiv \, \displaystyle \argmin_{w \in \hat{\mathcal{W}}_{\alpha_1}} \hat{\beta}_n(w), ~ w^L_0 \, \equiv \, \displaystyle \argmin_{w \in \mathcal{W}_0} \beta(w) \end{equation*} where $\hat{w}^H_{\alpha_1}$ and $w^H_0$ are similarly defined for the $\argmax$. Further, assume $w_0^L$ and $w_0^H$ are unique. Then, under Assumptions \ref{assum:bound}, \ref{assum:finite}, \ref{assum:dist}b and \ref{assum:lipschitz}, \begin{equation*} \lim_{n \to \infty} \pr \biggl( \bigl[\beta\bigl(w_0^L\bigr), \, \beta\bigl(w_0^H\bigr) \bigr] \, \subseteq \, \bigl[C_n^L\bigl(\hat{w}_{\alpha_1}^H; \alpha_2 \bigr), \, C_n^H\bigl(\hat{w}_{\alpha_1}^H; \alpha_2 \bigr) \bigr] \biggr) \, \geq \, 1 \, - \, \alpha_1 \, - \, \alpha_2. \end{equation*} \label{thm:coverage} \end{theorem} To briefly sketch the proof, we begin by showing that, under some regularity conditions, the interval $\bigl[C_n^L\bigl(\hat{w}_{\alpha_1}^H; \alpha_2 \bigr), \, C_n^H\bigl(\hat{w}_{\alpha_1}^H; \alpha_2 \bigr) \bigr]$ becomes arbitrarily close to the interval characterized by the infimum of $C_n^L\bigl(w)$ and supremum of $C_n^H\bigl(w)$ over $\hat{\mathcal{W}}_{\alpha_1}$ as $n$ becomes large. This is achieved by applying Theorem 5.5. of \cite{Shapiro2009}, which establishes consistency of sample average approximations solved over estimated constraint sets. From here, we are able to apply a similar argument to the main lemma of \cite{Berger1994}, which constructs a valid confidence set for a target parameter in the presence of nuisance parameters which cannot be estimated but can be bounded with high probability. In our context, $\beta_0$ is the target parameter and $w_k$ are the nuisance parameters. In addition to these, uniqueness of $w_0^L$ and $w_0^H$ is needed to invoke Theorem 3.2 of \cite{Shapiro1991} over $\mathcal{W}_0$. The population maximisation problem over the set \eqref{eqn:feasiblepop} is a linearly-constrained linear fractional programming problem. Then, since the level sets of $\beta(w)$ are linear, to establish uniqueness of $w_0^L$ and $w_0^H$ it suffices to assume that the coefficient vectors of $h_j$ and the level sets of $\beta(w)$ over $\mathcal{W}_0$ are not parallel. As with the original problem, we also need all coefficients of the level set for the optimal value to be non-zero on $\mathcal{W}_0$. In the Supplementary Material we demonstrate via simulation the coverage frequency of these confidence intervals and the optimal choice of $\alpha_1$ and $\alpha_2$ for fixed $\alpha_1 + \alpha_2$. Since the percentile bootstrap confidence intervals \eqref{eqn:bootci} require strictly fewer assumptions, a straight-forward corollary of Theorem \ref{thm:coverage} is they will also have at least $1- \alpha_1 - \alpha_2$ asymptotic coverage when computed over the constraint set $\hat{\mathcal{W}}_{\alpha_1}$. \subsection{Survey response rate} \label{sec:poplevel:responserate} The response rate represents the unconditional probability that a given individual will enter the sample and is commonly available in survey-based data. One approach to tighten the bounds is to ensure that the optimizing weights imply a response rate that is consistent with the true response rate. Define $r \equiv E\left[S_i\right]$ as the population survey response rate and $\pi_i \equiv \pr\bigl(S_i = 1\bigr)$ as individual $i$'s probability of sample selection, then $E_S\left[1/\pi_i \right] = 1/r$. This means that the expected value within the sample of the inverse selection probabilities is equal to the inverse response rate. Since this is a within-sample expectation, we can use it to construct a constraint set consistent with the framework in Section \ref{sec:poplevel:framework}. Let $c_n \equiv Z_{\alpha_1/2}/\sqrt{n}$, then we can construct a quadratic constraint set with $1 - \alpha_1$ coverage by squaring both sides of the inequality in \eqref{eqn:feasiblesample}: \begin{equation} \begin{array}{l@{}l} &{} \hat{\mathcal{W}}_{\alpha_1} \, \equiv \, \biggl\lbrace w \in \mathcal{W} \, : \displaystyle \, \bigl(1 + c_n^2 \bigr) \biggl\lbrace\sum_{k=1}^K (w_k - 1/r) \hat{p}_n(t_k)\biggr\rbrace^2 \, \leq \, c_n^2 \sum_{k=1}^K (w_k - 1/r)^2 \hat{p}_n(t_k) \biggr\rbrace. \label{eqn:responseratecons} \end{array} \end{equation} While this optimisation problem cannot be solved by the algorithm described in Section \ref{sec:estimation}, it can be solved by other methods (e.g. sequential quadratic programming). \subsection{Covariate means} \label{sec:poplevel:popmeans} In many instances, we know population means of elements of $T_i$ from domain knowledge or large representative samples (e.g. national censuses). Suppose we know $E[Q_i] = \bar{q}$, where $Q_i \in T_i$. Since $\bar{q}$ is known, we want the optimizing weights to be consistent with this known population value in the sense that \begin{equation} E_S[\lambda_0(D_i) (Q_i - \bar{q})] \, = \, \sum_{k=1}^K w_k (q_k - \bar{q}) p(t_k) \, = \, 0. \label{eqn:popmeancons} \end{equation} \noindent where $q_k$ is the value of $Q_i$ in the vector $t_k$. Let $c_n \equiv Z_{\alpha_1/2}/\sqrt{n}$, then we can construct the sample constraint set in much the same way as \eqref{eqn:responseratecons}: \begin{equation} \begin{array}{l@{}l} &{} \hat{\mathcal{W}}_{\alpha_1} \, \equiv \, \biggl\lbrace w \in \mathcal{W} \, : \displaystyle \, \bigl(1 + c_n^2 \bigr) \biggl\lbrace\sum_{k=1}^K w_k (q_k - \bar{q}) \hat{p}_n(t_k)\biggr\rbrace^2 \, \leq \, c_n^2 \sum_{k=1}^K w_k^2 (q_k - \bar{q})^2 \hat{p}_n(t_k) \biggr\rbrace. \end{array} \label{eqn:popmeanconset} \end{equation} Conceptually, this constraint is similar to the raking procedure in survey sampling outlined in \cite{EdwardsDeming1940}, which is a finite-population technique that adjusts estimated survey weights to imply known marginal counts from the population. \subsection{Parametric assumptions} \label{sec:poplevel:parametric} Suppose that $D_i$ is observed within the selected sample and $\mathcal{D} \subseteq \mathbb{R}^d$. Until this point, we have made no claims about whether $D_i$ is observable and so this does represent an additional assumption. If we also suppose that $\lambda_0$ falls into some parametric family, then we can optimize over the parameters of that family, tightening the bounds over the non-parametric estimators considered thus far. This is still a selection-on-unobservables model in the classical sense, since $D_i$ is only observed within the sample. Let $h: \mathbb{R} \to \mathbb{R}$ be some continuous and monotonically increasing function. Then we define \begin{equation*} \Theta \, \equiv \, \bigl\lbrace \alpha \, : \, h(\alpha_0 + \alpha_1^T D_i) \in [1/b,\,1/a] ~ \text{for all} ~ D_i \in \mathcal{D} \bigr\rbrace \end{equation*} as the set of parameters restricting this function to lie in the interval $[1/b,1/a]$, where $\alpha = (\alpha_0, \alpha_1)$. Then we can define a parametric family for $h(\cdot)$ as \begin{equation} \mathcal{F}_{h} \, \equiv \, \bigl \lbrace h(\alpha_0 + \alpha_1^T D_i) \, : \, \alpha \in \Theta \bigr \rbrace \, \subseteq \, \Lambda(a,\,b). \label{eqn:glm} \end{equation} \noindent This embeds a broad class of generalized linear models such as logit and probit. If $\lambda_0 \in \mathcal{F}_h$, the resulting optimization problem takes the form \begin{equation} \begin{array}{l@{}l} \hat{\beta}_n^H &{}= \displaystyle\max_{\alpha} \left\lbrace \hat{\beta}_n(h) \, : \, \alpha \in \Theta \right\rbrace \\ &{}= \displaystyle\max_{\alpha} \left\lbrace \hat{\beta}_n(h) : h^{-1}(b^{-1}) \leq \alpha_0 + \alpha_1^{\prime} D_i \leq h^{-1}(a^{-1}), ~ i = 1,\ldots,n \right\rbrace. \end{array} \label{eqn:parametric} \end{equation} Because we are optimizing over $d+1$ parameters, Assumption \ref{assum:finite}, which assumes a finite support for $T_i$, is no longer necessary to prove consistency or validity of our inference techniques. However, this optimization problem cannot be solved using fractional programming techniques as before. Since the constraints are linear, when $d$ is relatively small, this problem can instead be solved using global optimization methods. As an example, for logit, $h(\cdot)$ can be written as $h(\alpha_0 + \alpha_1^T D_i) = 1+\exp(\alpha_0 + \alpha_1^{\prime} D_i)$, which is continuous and monotonically increasing as desired. Further, if $\mathcal{D}$ is compact, since the image of $h$ is bounded, $\Theta$ is also compact. Therefore, consistency of \eqref{eqn:parametric} follows from similar arguments to those in Theorem \ref{thm:consistency}. The asymptotic inference established in Section \ref{sec:inference:asymptotic} will continue to hold provided the optimizing parameters are unique, however, the bootstrap confidence intervals of Section \ref{sec:bootstrap} will be valid under the weaker condition of pointwise convergence in distribution of $\hat{\beta}_n(h)$ for fixed $h \in \mathcal{F}_h$ \citep{Zhao2019}. Another convenient property of this extension is that external information on the direction of $D_i$'s effects on selection can easily be incorporated. For example, if years of education is an element of $D_i$ and domain knowledge indicates that better educated individuals are more likely to select into the sample, then the element of $\alpha_1$ associated with years of education can be constrained to be non-negative. This can be done by a simple modification of the parameter space. If we believe $\alpha_{11} \geq 0$, for example, then we can modify the parameter space by adding an additional linear constraint $\lbrace \alpha \in \Theta \, : \, \alpha_{11} \geq 0 \rbrace$. \section{Simulations} \label{sec:sims} Assumption \ref{assum:finite} is restrictive in requiring the support of the data to be discrete. The aim of these simulations is to assess and visualize the finite sample and limiting properties of our estimator $\hat{I}(a,\,b)$ when this assumption does not hold, that is, when the support is continuous and unbounded. We demonstrate that our results, in particular those of Sections \ref{sec:inference}, appear to hold in the absence of this assumption. We consider estimation of the mean of $Y_i$ which follows a standard normal distribution $\mathcal{N}(0,1)$ within the hypothetical selected sample. For the purposes of this simulation, we do not need to explicitly model the population distribution or sample selection process. Since it is difficult to calculate $I(a,\,b)$ exactly in this setting, we instead compute our population parameters in a large finite sample of $N = 1,000,000$. Sub-samples of varying size $n$ are drawn randomly without replacement from this sample. The parameters for this data-generating process are \begin{equation*} a = 0.1, \, b = 1, \, I(a,\,b) = [\beta^L,\,\beta^H] \approx [-0.902, \, 0.902] \end{equation*} \begin{figure}[h] \begin{subfigure}[t]{0.48\textwidth} \includegraphics[scale=0.41]{bias_10.pdf} \caption{The red line is the average bias of the upper bound $\hat{\beta}_n^H - \beta^H$ and the blue line is the average bias of the lower bound $\hat{\beta}_n^L - \beta^L$ averaged over 5,000 samples.} \label{fig:mainsim:bias} \end{subfigure} \hfill \begin{subfigure}[t]{0.48\textwidth} \includegraphics[scale=0.41]{asyboot_compare_10.pdf} \caption{The red line is the coverage frequency of the percentile bootstrap CI \eqref{eqn:bootci} and the blue line is the coverage probability of the asymptotic CI \eqref{eqn:confidence} averaged over 5,000 samples.} \vspace{1ex} \label{fig:mainsim:confidence} \end{subfigure}\\[0.5em] \begin{subfigure}[t]{0.48\textwidth} \includegraphics[scale=0.41]{power_curve_10.pdf} \caption{The blue line is the power curve for the $p$-value \eqref{eqn:pvalue} averaged over 1,000 samples. The red lines are the boundaries of the true interval $[\beta^L, \, \beta^H]$.} \label{fig:mainsim:power} \end{subfigure} \hfill \begin{subfigure}[t]{0.48\textwidth} \includegraphics[scale=0.41]{beta_hist_10.pdf} \caption{The light blue bars are a histogram of $\hat{\beta}_n^H$ over 5,000 samples. The blue line is the true limiting distribution.} \label{fig:mainsim:hist} \end{subfigure} \caption{Each simulation is estimating the mean of $Y_i \sim \mathcal{N}(0,1)$ with $a = 0.1$ and $b = 1$. The population identified interval $[\beta^L, \beta^H] \approx [-0.902,0.902]$ is approximated using a large sample of size $N = 1,000,000$ from which sub-samples are drawn without replacement to calculate finite sample values.}\label{fig:mainsim} \end{figure} Figure \ref{fig:mainsim} illustrates our main simulation results. Figure \ref{fig:mainsim:bias} demonstrates the finite sample bias of $\hat{\beta}_n^L$ and $\hat{\beta}_n^H$. We see that, on average, the lower bound is underestimated and the upper bound is overestimated, consistent with the discussion in Section \ref{sec:estimation}. However, this bias dissipates quickly. Figure \ref{fig:mainsim:confidence} depicts the coverage frequency of our two confidence intervals: the asymptotic approxmation \eqref{eqn:confidence} in blue and the percentile bootstrap \eqref{eqn:bootci} in red. The two have roughly equivalent coverage frequencies by $n = 500$ and both converge to nominal 95\% coverage. Figure \ref{fig:mainsim:power} shows the power curve for the hypothesis test \eqref{eqn:hypothesis} for $n = 100$ using a $p$-value cut-off of 0.05. The test exhibits some over-rejection around the boundaries of the true identified interval. This is consistent with the under-coverage seen at around $n = 100$ in Figure \ref{fig:mainsim:confidence}. Lastly, Figure \ref{fig:mainsim:hist} shows a histogram of $\hat{\beta}_n^H$ for $n = 100$ and the true limiting distribution fitted over it, which appears to be a reasonable approximation. These simulations suggest that Assumption \ref{assum:finite} might not be necessary for this estimator to have desirable asymptotic properties. \section{Applied Example: Effect of Education on Income} \label{sec:example} We illustrate the utility of this method in an instrumental variable design looking at the effect of education on income. An in-depth exposition of this design can be found in \cite{Davies2018}. Our instrument is based on a September 1972 education reform in England which raised the school leaving age from 15 to 16. Individuals who turned 15 just prior to the implementation of this reform were allowed to leave school, while individuals who turned 15 just after were required to remain in school until they were 16. This created a sharp discontinuity in the policies that the two groups were exposed to, with age as the forcing variable, which cannot be manipulated. We denote the instrument by $Z_i \in \lbrace 0, \, 1 \rbrace$. Our exposure is whether an individual remained in school at least until age 16, denoted by $X_i \in \lbrace 0, \, 1 \rbrace$, which associates with the instrument with $F > 100$. Lastly, our outcome is whether an individual earned more than \pounds 31,000 per year at the time of UK Biobank measurement in 2006, denoted by $Y_i \in \lbrace 0, \, 1 \rbrace$. We restrict our sample to individuals who turned 15 within 12 months of September 1972 and we control for sex and month-of-birth indicators. For a given weight vector $w$, we write our estimator as \begin{equation*} \begin{array}{l@{}l} \hat{\beta}_n(w) = \displaystyle \left. \left(\sum_{i=1}^n w_i \, Z_i \, Y_i \right) \middle/ \left(\sum_{i=1}^n w_i \, Z_i \, X_i \right) \right. \end{array} \end{equation*} As discussed in the introduction, UK Biobank is known to be non-representative of the UK population along dimensions such as education, health and sex. Since data on these characteristics is available within the UK Biobank sample, we specify a logit model for $\lambda_0$ as in Section \ref{sec:poplevel:parametric}, choosing as selection variables sex, years of education, income and days of physical activity per week as a proxy for health (\citealp{Fry2017, Hughes2019}). For our bound constraint, we choose $a$ of 0.01 and $b$ of 1. This choice allows some individuals to be as much as 100 times more likely to enter the sample than others. We also impose some additional constraints. Specifically, for our directionality constraint, we require the coefficients on years of education, income and days of physical activity per week to be non-negative and for the male indicator to be non-positive. We also know that the response rate for UK Biobank is 5.5\% and the proportion of males in the UK population in the relevant age group is 49.5\%, so these are included as constraints as in Sections \ref{sec:poplevel:responserate} and \ref{sec:poplevel:popmeans} respectively. The unweighted point estimate is 0.183 with 95\% confidence interval of [0.084, 0.282], indicating that an additional year of schooling induced by this reform increases the likelihood of earning more than \pounds 31,000 in later life by 18.3 percentage points. When only the bound constraints are imposed, we estimate an interval $[-1.509, 2.694]$ with a 95\% asymptotic confidence interval of $[-4.022, 5.381]$. This is very wide and contains the null. However, when we impose all available constraints, we obtain an interval $[0.176, 0.27]$ with a 95\% asymptotic confidence interval of $[0.003, 0.456]$. These constraints substantially reduce the width of the estimated interval and result in interpretable effect sizes. The unweighted estimate of 0.183 lies near the lower bound of this interval, however, much of the interval contains values larger than this. This is what we might expect given our knowledge of the selection mechanism. Since education and income both positively influence selection into UK Biobank, this could induce an artificial negative correlation between the two, thus biasing the effect estimate downward. \section{Discussion} \label{sec:discussion} In order to directly apply some existing theoretical results from the stochastic optimization literature, we assume that the data has a discrete support. This is so that the number of parameters is finite and does not depend on the sample size. We demonstrate by simulation in Section \ref{sec:sims} that desirable properties such as nominal coverage of confidence intervals appear to hold for data distributed on a continuous unbounded support. It would be valuable to provide theoretical guarantees for this by extending the results in \cite{Shapiro1991} and \cite{Shapiro2009} to allow for variational problems. \section*{Acknowledgements} This research has been conducted using the UK Biobank Resource. UK Biobank received ethical approval from the Research Ethics Committee (REC reference for UK Biobank is 11/NW/0382). This research was approved as part of application 8786. Tudball would like to acknowledge financial support from the Wellcome Trust (grant number 220067/Z/20/Z). \bibliographystyle{abbrvnatnourl}
\section{Introduction \label{sec:intro}} Applying techniques from quantum field theory to the study of the classical two-body problem in general relativity (GR) has produced significant progress in the treatment of the post-Newtonian (PN) approximation \cite{Holstein:2004dn,Goldberger:2004jt,Porto:2005ac,Levi:2015msa, Porto:2016pyg,Levi:2018nxp}, expanding in small speeds and weak fields. A particular focus of more recent interest has been the use of quantum scattering amplitudes to produce explicit classical results in the post-Minkowskian (PM) approximation~\cite{Neill:2013wsa,Damour:2016gwp}, which resums the expansion in small speeds while still expanding in weak coupling. Several new contributions have been made to the understanding of conservative monopolar two-body dynamics up to 2PM order (through ${\cal O}(G^2)$, where $G$ is Newton's constant) using one-loop amplitudes~\cite{Cachazo:2017jef,Guevara:2017csg,Damour:2017zjx, Bjerrum-Bohr:2018xdl,Cheung:2018wkq,KoemansCollado:2019ggb,Cristofoli:2019neg}, all ultimately confirming an equivalent classical solution from decades ago~\cite{Westpfahl:1985}. A significant milestone has been the first presentation of results at 3PM order from a two-loop amplitude calculation~\cite{Bern:2019nnu}, using an arsenal of modern amplitude techniques \cite{Bern:1994zx,Bern:1994cg,Britto:2004nc,Kawai:1985xq,Bern:2008qj,Johansson:2014zca}. The first results for spin-orbit coupling in the PM scheme have been computed only recently, from purely classical considerations, at 1PM and 2PM orders~\cite{Bini:2017xzy,Bini:2018ywr}. Spin-orbit (or dipole) effects are universal in the two-body problem in GR, in that their form does not depend on the nature of the spinning bodies. It was shown in \rcites{Bini:2017xzy,Bini:2018ywr} how they are determined by the parallel transport map along the geodesic worldline in the (regularized) spacetime metric sourced by monopolar bodies. Going beyond the pole-dipole level, higher-multipole couplings specific to black holes (BHs) were treated at 1PM order in \rcite{Vines:2017hyw}, by means of a classical effective action approach~\cite{Levi:2015msa,Porto:2016pyg} matched to the linearized Kerr solution, to all orders in the spin-induced multipole expansion. In this paper we aim to fully reproduce the central results of \rcite{Vines:2017hyw} from amplitudes, exploiting and further substantiating the remarkable fact that the BH multipole structure up to the $2^{2s}$-pole level is reproduced by considering spin-$s$ particles which are minimally coupled to gravity. This was first demonstrated in \rcite{Vaidya:2014kza} up to the spin-2 level for the leading-PN-order corrections to the two-body interaction potential, following work along similar lines in \rcites{Holstein:2008sw,Holstein:2008sx}. A generalization of minimal-coupling amplitudes to arbitrary spins~$s$ has been proposed recently in \rcite{Arkani-Hamed:2017jhn} using a new massive spinor-helicity formalism. Through the course of \rcites{Guevara:2017csg,Guevara:2018wpp,Chung:2018kqs,Bautista:2019tdr}, there has emerged a consistent picture of how these amplitudes encode the complete tower of spinning-BH multipole moments, at least at 1PM order, when one lets the spin quantum number~$s$ tend to infinity.\footnote{We note that \rcites{Guevara:2017csg,Guevara:2018wpp,Chung:2018kqs} have also treated spin contributions at 2PM order, and that \rcite{Bautista:2019tdr} has also considered radiative effects via a classical double copy with spin.} Concerning explicit specifications of the classical two-body dynamics, the final results of \rcite{Chung:2018kqs} allowed arbitrary spin orientations but restricted to leading orders in the PN expansion, while those of \rcite{Guevara:2018wpp} were complete at 1PM order but restricted to the case where the BH spin vectors are aligned with the orbital angular momentum. In this aligned-spin case, the two-body scattering is confined to a single constant orbital plane, and the spin vectors are conserved, pointing orthogonally to that plane. In the general case, both the orbital plane and the spin vectors are rotated in the course of the interaction. In this paper we consider general spin directions at full 1PM order. The staring point is the tree-level amplitude for one-graviton exchange between two massive spin-$s$ particles shown in \fig{fig:4pt}. We compute its holomorphic classical limit (HCL) \cite{Guevara:2017csg} by gluing two of the minimal-coupling three-point amplitudes~\cite{Arkani-Hamed:2017jhn} depicted in \fig{fig:3pt}. We streamline the treatment of the spin-exponentiated structure of such amplitudes, which was the focus of \rcite{Guevara:2018wpp}, by incorporating additional Lorentz boosts~\cite{Bautista:2019tdr} into the spin exponentials. Finally, we adapt to our needs a general formalism~\cite{Kosower:2018adc,Maybee:2019jus} for extracting gauge-invariant classical observables from amplitudes. It has already been used in \rcite{Maybee:2019jus} to compute the net changes in the momenta and spins for two-body scattering at 1PM order, reproducing the results for BHs up to quadrupolar order from minimally coupled spin-1 particles. Here we extend such calculation to arbitrary spins $s$, and in the limit $s\to\infty$ obtain all orders in the BH multipole expansions at 1PM order \cite{Vines:2017hyw}. \section{Minimal coupling to gravity \label{sec:review}} In this section we review the angular-momentum exponentiation that is inherent to the gravitational coupling of spinning black holes and the corresponding amplitudes. At the linearized-gravity level, the classical stress-energy tensor serving as an effective source for a single Kerr black hole with mass $m$, classical momentum $p^\mu = m u^\mu$ and spin $S^\mu = m a^\mu$ is~\cite{Vines:2017hyw} \begin{equation} T^{\mu\nu}_\text{BH}(x) = \frac{1}{m}\!\int\!d\tau\;\! p^{(\mu} \exp(a*\partial)^{\nu)}_{~~\rho} p^\rho \delta^{4}(x-u \tau) , \label{eq:KerrEnergyTensor} \end{equation} where we have used the shorthand notation \begin{equation} (a*b)^{\mu\nu} = \epsilon^{\mu\nu\alpha\beta} a_\alpha b_\beta . \label{eq:LeviCivitaStar} \end{equation} The spin transversality condition $p\cdot a=0$ is also assumed. The corresponding coupling of the BH to gravity is \begin{equation}\begin{aligned} \label{eq:KerrEnergyTensorCoupling} S_\text{BH} & = -\frac{\kappa}{2} \int\!\hat{d}^4k\;\!h_{\mu\nu}(k) T^{\mu\nu}_\text{BH}(-k) \\ & = -\kappa\!\int\!\hat{d}^4k\;\!\hat{\delta}(2p \cdot k) p^{(\mu} \exp(a*ik)^{\nu)}_{~~\rho} p^\rho h_{\mu\nu}(k) , \end{aligned}\end{equation} where the coupling constant is $\kappa=\sqrt{32 \pi G}$. Here and below the hats over the delta functions and measures encode appropriate positive or negative powers of $2\pi$, respectively. Putting the graviton on shell, $h_{\mu\nu}(k) \to \hat{\delta}(k^2) \varepsilon_\mu \varepsilon_\nu$, we can rewrite the characteristic angular-momentum exponential in another form \begin{equation}\begin{aligned}\! h_{\mu\nu}(k) T^{\mu\nu}_\text{BH}(-k) = \hat{\delta}(k^2) \hat{\delta}(p \cdot k) (p\cdot\varepsilon)^2 \exp\!\bigg(\!{-i}\frac{k_\mu \varepsilon_\nu S^{\mu\nu}} {p\cdot\varepsilon}\bigg) , \label{eq:KerrEnergyTensorExp} \end{aligned}\end{equation} now involving a transverse spin tensor $S^{\mu\nu}$ \begin{equation} \label{eq:SpinTensorSSC} S^{\mu\nu}=\epsilon^{\mu\nu\rho\sigma} p_\rho a_\sigma \qquad \Rightarrow \qquad p_\mu S^{\mu\nu} = 0 . \end{equation} More explicitly, the above transition relies on the equality \begin{equation} \label{eq:KerrEnergyTensorExpDerivation} (p\cdot\varepsilon)^{j-1} \varepsilon_\mu \big[(a*ik)^j\big]^\mu_{~\,\nu} p^\nu = \big({-i}k_\mu \varepsilon_\nu S^{\mu\nu}\big)^j , \end{equation} that is easiest verified in the frame and gauge where $k=(k^0,0,0,k^0)$, $\varepsilon=(0,\varepsilon^1,\pm i\varepsilon^1,0)$ and $p=(p^0,p^1,0,p^0)$. \begin{figure} \includegraphics[width=0.245\textwidth]{graphs/fig_3pt.pdf} \caption{\label{fig:3pt} Three-point amplitude} \end{figure} In \rcite{Guevara:2018wpp} we discovered that the same exponential is hidden inside the minimal-coupling amplitudes proposed recently by Arkani-Hamed, Huang and Huang~\cite{Arkani-Hamed:2017jhn} \begin{subequations} \begin{align} \label{eq:GravityMatter3ptPlus} {\cal M}_3(p_1^{\{a\}}\!,-p_2^{\{b\}}\!,k^{+}) & = -\frac{\kappa}{2} \frac{\braket{1^a 2^b}^{\odot 2s}}{m^{2s-2}} x^2 , \\* \label{eq:GravityMatter3ptMinus} {\cal M}_3(p_1^{\{a\}}\!,-p_2^{\{b\}}\!,k^{-}) & = -\frac{\kappa}{2} \frac{[1^a 2^b]^{\odot 2s}}{m^{2s-2}} x^{-2} . \end{align} \label{eq:GravityMatter3pt}% \end{subequations} The arguments of scattering amplitudes are treated as incoming, so the present choice corresponds to the momentum configuration shown in \fig{fig:3pt}. Here and below the symbol $\odot$ denotes tensor product symmetrized over each massive particle's $2s$ little-group indices $\{a_1,\ldots,a_{2s}\}$ and $\{b_1,\ldots,b_{2s}\}$. Furthermore, $x$ is the positive-helicity factor \begin{equation} x = \frac{[k|p_1\ket{r}}{m \braket{k\;\!r}} = -\frac{\sqrt{2}}{m} (p_1\cdot\varepsilon^+) = \bigg[ \frac{\sqrt{2}}{m} (p_1\cdot\varepsilon^-) \bigg]^{-1} , \label{eq:xFactor} \end{equation} that is dimensionless and independent of the reference momentum~$r$ on the on-shell three-point kinematics~\cite{Arkani-Hamed:2017jhn}. Now one can start by noticing that the amplitudes ${\cal M}_3^{(0)}=-\kappa (p_1\cdot\varepsilon^\pm)^2$, given by the scalar case of \eqn{eq:GravityMatter3pt}, correspond precisely to the $S^{\mu\nu}=0$ case of the vertex~\eqref{eq:KerrEnergyTensorExp}. Moreover, we were able to recast the spin structure of the amplitudes~\eqref{eq:GravityMatter3pt} in an exponential form~\cite{Guevara:2018wpp} \begin{subequations} \begin{align} \label{eq:GravityMatter3ptExpPlus} \braket{2^b 1^a}^{\odot 2s} & = [2^b|^{\odot 2s}\! \exp\!\bigg(\!{-i}\frac{k_\mu \varepsilon_\nu^+ \bar{\sigma}^{\mu\nu}} {p_1\cdot\varepsilon^+}\bigg) |1^a]^{\odot 2s} , \\ \label{eq:GravityMatter3ptExpMinus} [2^b 1^a]^{\odot 2s} & = \bra{2^b}^{\odot 2s}\! \exp\!\bigg(\!{-i}\frac{k_\mu \varepsilon_\nu^- \sigma^{\mu\nu}} {p_1\cdot\varepsilon^-}\bigg) \ket{1^a}^{\odot 2s} , \end{align} \label{eq:GravityMatter3ptExp}% \end{subequations} featuring a tensor-product version of the chiral and antichiral spinorial generators \begin{equation} \sigma^{\mu\nu} = \frac{i}{4} [\sigma^\mu \bar{\sigma}^\nu\!- \sigma^\nu \bar{\sigma}^\mu] , \qquad \bar{\sigma}^{\mu\nu} = \frac{i}{4} [\bar{\sigma}^\mu \sigma^\nu\!- \bar{\sigma}^\nu \sigma^\mu] . \label{eq:LorentzGeneratorSpinor} \end{equation} In \rcite{Guevara:2018wpp} we could translate between the spin-operator exponentials~\eqref{eq:GravityMatter3ptExp} and the classical-spin exponential~\eqref{eq:KerrEnergyTensorExp} and thus identify the minimal-coupling amplitudes~\eqref{eq:GravityMatter3pt} with Kerr black holes. (A complementary identification was done in \rcite{Chung:2018kqs} by matching to the Wilson coefficients in the one-body effective field theory of a Kerr black hole~\cite{Levi:2015msa,Levi:2018nxp}.) Such a translation involved sticking to either chiral or antichiral representation, so that one of the amplitudes in \eqn{eq:GravityMatter3pt} contains no apparent dependence on the spin operator. The correct symmetric dependence on the classical spins was restored in \rcite{Guevara:2018wpp} via a notion of generalized expectation value (GEV), which involved division by the product of the polarization tensors of the incoming and outgoing avatars of the BH. In this paper we follow an alternative path: we recover the entire spin information from the amplitudes by combining the spinor-helicity formalism with the covariant approach to multipoles introduced in \rcite{Bautista:2019tdr}, while the GEV will only serve to fix the normalization. \section{General integer-spin setup \label{sec:spin}} Although the minimal-coupling amplitudes~\eqref{eq:GravityMatter3pt} of \rcite{Arkani-Hamed:2017jhn} are valid for both integer and half-integer spins, for simplicity we will concentrate on the former case. Spin-$s$ polarization tensors are constructed as~\cite{Guevara:2018wpp,Chung:2018kqs} \begin{equation} \varepsilon_{p\:\!\mu_1\ldots\mu_s}^{a_1\ldots a_{2s}} = \varepsilon_{p\:\!\mu_1}^{(a_1 a_2} \ldots \varepsilon_{p\:\!\mu_s}^{a_{2s-1} a_{2s})} , \qquad \varepsilon_{p\:\!\mu}^{ab} = \frac{i\bra{p^{(a}}\sigma_\mu|p^{b)}]}{\sqrt{2}m} . \label{eq:PolTensors} \end{equation} We adopt the spinor-helicity conventions of \rcite{Ochirov:2018uyq}, so the spin-1 polarization vectors are spacelike and obey the standard properties that are expected from them: \begin{subequations} \begin{align} p\cdot\varepsilon_{p}^{ab} & = 0 , \\ \label{eq:PolTensorsCompleteness} \varepsilon_{p\:\!\mu}^{ab} \varepsilon_{p\:\!\nu ab} & =-\eta_{\mu\nu} + \frac{p_\mu p_\nu}{m^2} , \\ \label{eq:PolTensorsNorm} \varepsilon_{p\:\!11}\cdot\varepsilon_{p}^{11} & = \varepsilon_{p\:\!22}\cdot\varepsilon_{p}^{22} = 2\:\!\varepsilon_{p\:\!12}\!\cdot\!\varepsilon_{p}^{12} = -1 , \\ \label{eq:PolTensorsConjugation} (\varepsilon_{p\:\!\mu}^{ab})^* & = \varepsilon_{p\:\!\mu\:\!ab} = \epsilon_{ac} \epsilon_{bd} \varepsilon_{p\:\!\mu}^{cd} . \end{align} \label{eq:PolTensorsProperties}% \end{subequations} In particular, the last line follows from the conjugation rule \begin{equation} (\lambda_{p\:\!\alpha}^{~\;a})^* = \operatorname*{sgn}(p^0) \tilde{\lambda}_{p\:\!\dot{\alpha}\:\!a} \quad \Leftrightarrow \quad (\tilde{\lambda}_{p\:\!\dot{\alpha}}^{~\;a})^* =-\operatorname*{sgn}(p^0) \lambda_{p\:\!\alpha\:\!a} , \label{eq:MassiveSpinorConjugation} \end{equation} which implements the fact that in the little group ${\rm SU}(2)$ upper and lower indices are related by complex conjugation. Since the polarization tensors are essentially symmetrized tensor products $\varepsilon_p^{\odot s}$, the action of the Lorentz generators is trivially induced by the vector representation \begin{equation} \Sigma^{\mu\nu,\sigma}_{~~~~~\tau} = i[\eta^{\mu\sigma} \delta^\nu_\tau - \eta^{\nu\sigma} \delta^\mu_\tau] , \label{eq:LorentzGenerator1} \end{equation} namely, \begin{equation}\begin{aligned} (\Sigma^{\mu\nu})^{\sigma_1\ldots\sigma_{s}}_{~~~~~~~\,\tau_1\ldots\tau_{s}} = \Sigma^{\mu\nu,\sigma_1}_{~~~~~\,\tau_1} \delta^{\sigma_2}_{\tau_2}\!\ldots \delta^{\sigma_s}_{\tau_s} & \\ + \ldots + \delta^{\sigma_1}_{\tau_1}\!\ldots \delta^{\sigma_{s-1}}_{\tau_{s-1}} \Sigma^{\mu\nu,\sigma_s}_{~~~~~\,\tau_s} & . \label{eq:LorentzGenerator} \end{aligned}\end{equation} These matrices realize the Lorentz algebra on the one-particle states of spin~$s$, which are represented by the polarization tensors~\eqref{eq:PolTensors}. A more convenient spin quantity to deal with is the Pauli-Lubanski vector \begin{equation} S_{\lambda} = \frac{1}{2m} \epsilon_{\lambda\mu\nu\rho} S^{\mu\nu} p^{\rho} . \label{eq:PauliLubanski} \end{equation} Here $S^{\mu\nu}$ is the spin tensor, the transverse part of which can be reconstructed from the vector as \begin{equation} S_\perp^{\mu\nu} = \frac{1}{m} \epsilon^{\mu\nu\rho\sigma} p_\rho S_\sigma \quad \Rightarrow \quad p_\mu S_\perp^{\mu\nu} = 0 . \label{eq:PauliLubanski2} \end{equation} Understanding \eqn{eq:PauliLubanski} in the operator sense, we can derive the general form of one-particle matrix element of the Pauli-Lubanski spin operator, here denoted by $\Sigma^{\mu}$, \begin{align} \label{eq:PauliLubanskiLGOperator} & \varepsilon_p^{\{a\}}\!\cdot \Sigma^\mu\!\cdot \varepsilon_p^{\{b\}} = \frac{s(-1)^{s-1}}{2m} \\~& \times\! \big\{ \bra{p^{(a_1}}\sigma^\mu|p^{(b_1}] + [p^{(a_1}|\bar{\sigma}^\mu\ket{p^{(b_1}} \big\} \epsilon^{a_2 b_2}\!\ldots \epsilon^{a_{2s}) b_{2s})} . \nonumber \end{align} One way to give meaning to this formula is to lower one set of indices and set it equal to the other: it then produces an expectation value \begin{equation} \label{eq:PauliLubanskiLGEV} \frac{ \varepsilon_{p\{a\}}\!\cdot \Sigma^\mu\!\cdot \varepsilon_p^{\{a\}} } { \varepsilon_{p\{a\}}\!\cdot \varepsilon_p^{\{a\}} } =\!\left\{\! \begin{aligned} s & s_p^\mu ,~~a_1 = \ldots = a_{2s} = 1 , \\ (s-1) & s_p^\mu ,~~{\textstyle\sum_{j=1}^{2s}} a_j = 2s+1 , \\ (s-2) & s_p^\mu ,~~{\textstyle\sum_{j=1}^{2s}} a_j = 2s+2 , \\ \dots \\ -s & s_p^\mu ,~~a_1 = \ldots = a_{2s} = 2 , \end{aligned} \right.\!\! \end{equation} where we have also accounted for the nontrivial normalization of the tensors. This shows that spin is quantized in terms of the unit-spin vector \begin{equation} s_p^\mu = -\frac{1}{2m} \big\{ \bra{p_1}\sigma^\mu|p^1] + [p_1|\bar{\sigma}^\mu\ket{p^1} \big\} \label{eq:UnitSpinVector} \end{equation} that is transverse and spacelike, $p \cdot s_p = 0$, $s_p^2 = -1$. This vector is familiar from textbook discussions of the Dirac spin, in which context it may be written as $ \frac{1}{2m} \bar{u}_{p\:\!1} \gamma^\mu \gamma^5 u_p^1 =-\frac{1}{2m} \bar{u}_{p\:\!2} \gamma^\mu \gamma^5 u_p^2 $. According to \eqn{eq:PauliLubanskiLGEV}, this vector corresponds to the spin quantization axis and identifies the $(2s+1)$ distinct wavefunctions $\varepsilon_p^{1 \ldots 1 2 \ldots 2}$ with states of definite spin projection. Moving on towards the scattering context, let us consider a three-point kinematics $p_1+k=p_2$ shown in \fig{fig:3pt}. A naive extension of the spin matrix element~\eqref{eq:PauliLubanskiLGOperator}, now between states with different momenta of mass~$m$, is \begin{align} \label{eq:SpinTransitionNaive}\!\!\! \varepsilon_2^{\{b\}}\!\cdot \Sigma^\mu[p_{\rm a}] \cdot \varepsilon_1^{\{a\}} = &\;\frac{s}{4m^{2s}} \big\{ \bra{1^a}\sigma^\mu|2^b] + [1^a|\bar{\sigma}^\mu\ket{2^b} \big\} \\ \odot\, \big\{ \braket{1^a 2^b}\,- &\,[1^a 2^b] \big\} \odot \braket{1^a 2^b}^{\odot(s-1)}\!\odot [1^a 2^b]^{\odot(s-1)} . \nonumber \end{align} Here we have encoded the symmetrization of the little-group indices into the modified tensor-product symbol~$\odot$, and the indices on the right-hand side should be regarded as abstract placeholders. It is important to stress that the symmetrization encoded in the symbol $\odot$ only acts inside the two ${\rm SU}(2)$-index sets $\{a\}$ and $\{b\}$ separately, as symmetrizing a little-group index of momentum $p_1$ with that of $p_2$ would be mathematically inconsistent. Notice that in \eqn{eq:SpinTransitionNaive} we must specify that the Pauli-Lubanski operator is defined with respect to the average momentum $p_{\rm a}=(p_1+p_2)/2$. It is this momentum that we will associate with the classical momentum $p_{\rm a}^\mu = m u_{\rm a}^\mu$ of one of the incoming black holes, so it makes sense to define a spin vector to be orthogonal to it. \Eqn{eq:SpinTransitionNaive} treats the chiral and antichiral spinors on an equal footing and generalizes the spin-1 matrix element considered in \rcite{Guevara:2018wpp}. However, even in the spin-1 case the angular-momentum exponentiation~\eqref{eq:GravityMatter3ptExp}, present in the exclusively chiral and antichiral spinorial representations, was found to be opaque at the level of such a matrix element. The reason for that is physically important. As discussed in \rcite{Levi:2015msa}, a consistent picture of spin-induced multipoles of a pointlike particle must be formulated in the particle's rest frame, in which the spin does not precess~\cite{Weinberg:1972kfs}. Therefore, the formula~\eqref{eq:SpinTransitionNaive} is too naive, as it involves a spin operator defined for momentum $p_{\rm a}$ but acts with it on the states with momenta $p_{\rm a} \pm k/2$. The cure for that is to take into account additional Lorentz boosts, which we will now proceed to do. \section{Angular-momentum exponentiation \label{sec:spinexponents}} Bautista and one of the current authors have recently argued that all spin multipoles of the amplitude can be extracted through a finite Lorentz boost~\cite{Bautista:2019tdr}. This boost is needed to bridge the gap between two states with different momenta. In this way, the quantum picture is made consistent with the classical notion of spin-induced multipoles of a pointlike object on a worldline~\cite{Levi:2015msa}. Here we introduce such a construction in terms of the spinor-helicity variables. Its equivalence to the covariant formalism of \rcite{Bautista:2019tdr} is explained in the Appendix. To start, we note that any two four-vectors $p_1$ and $p_2$ of equal mass $m$ may be related by \begin{equation} p_2^\rho = \exp\!\big( i \mu_{12} p_1^\mu p_2^\nu \Sigma_{\mu\nu} \big)^\rho_{~\sigma} p_1^\sigma , \label{eq:Lorentz1to2vector} \end{equation} where we have used the generators~\eqref{eq:LorentzGenerator1}. The numeric prefactor in the exponent is explicitly \begin{equation} \mu_{12} = \frac{ \log\!\big[ \frac{1}{m^2} \big(p_1 \cdot p_2 {+} \sqrt{(p_1 \cdot p_2)^2 {-} m^2}\big) \big] } { \sqrt{(p_1 \cdot p_2)^2 - m^2} } = \frac{1}{m^2} {+} \mathcal{O}(k^2) . \end{equation} Here we are only interested in the strictly on-shell setup, for which $k^2=(p_2-p_1)^2=0$. The corresponding spinorial transformations are \begin{subequations} \begin{align} \label{eq:Lorentz1to2Spa} \ket{2^b} & = U_{12~a}^{~~b} \exp\!\bigg( \frac{i}{m^2} p_1^\mu k^\nu \sigma_{\mu\nu}\!\bigg) \ket{1^a} , \\ \label{eq:Lorentz1to2Spb} |2^b] & = U_{12~a}^{~~b} \exp\!\bigg( \frac{i}{m^2} p_1^\mu k^\nu \bar{\sigma}_{\mu\nu}\!\bigg) |1^a] , \end{align} \label{eq:Lorentz1to2Spinor}% \end{subequations} where $U_{12} \in {\rm SU}(2)$ is a little-group transformation that depends on the specifics of the massive-spinor realization. The duality properties of the spinorial generators~\eqref{eq:LorentzGeneratorSpinor} allow us to easily rewrite the above exponents as \begin{equation} \frac{i}{m^2} p_1^\mu k^\nu \sigma_{\mu\nu,\alpha}^{~~~~\;\beta} = k \cdot a_{\alpha}^{~\beta} , \qquad \frac{i}{m^2} p_1^\mu k^\nu \bar{\sigma}^{~~~\dot{\alpha}}_{\mu\nu,~\dot{\beta}} =-k \cdot a^{\dot{\alpha}}_{~\,\dot{\beta}} , \label{eq:Tensor2Vector} \end{equation} where we have defined chiral representations for the Pauli-Lubanski operators \begin{subequations} \begin{align} a_{~~\alpha}^{\mu,~\,\beta} & = \frac{1}{2m^2} \epsilon^{\mu\nu\rho\sigma} p_{{\rm a}\:\!\nu} \sigma_{\rho\sigma,\alpha}^{~~~~\;\beta} , \\ a^{\mu,\dot{\alpha}}_{~~~\,\dot{\beta}} & = \frac{1}{2m^2} \epsilon^{\mu\nu\rho\sigma} p_{{\rm a}\:\!\nu} \bar{\sigma}^{~~~\dot{\alpha}}_{\rho\sigma,~\dot{\beta}} . \end{align} \label{eq:PauliLubanskiSpinor}% \end{subequations} (Note that the product $k \cdot a$ is insensitive to the difference between $p_1$ and $p_{\rm a}=p_1+k/2$ in the above definitions, so we could pick the latter for further convenience.) Extension to the higher-spin states represented by tensor products of massive spinors is analogous to \eqn{eq:LorentzGenerator}, e.g. \begin{equation}\begin{aligned} (a^{\mu})_{\alpha_1\ldots\alpha_{2s}}^{~~~~~~~~\beta_1\ldots\beta_{2s}} = a_{~~\alpha_1}^{\mu,~~\beta_1} \delta_{\alpha_2}^{\beta_2}\!\ldots \delta_{\alpha_{2s}}^{\beta_{2s}} & \\ + \ldots + \delta_{\alpha_1}^{\beta_1}\!\ldots \delta_{\alpha_{2s-1}}^{\beta_{2s-1}} a_{~~\alpha_{2s}}^{\mu,~~~\beta_{2s}} & , \label{eq:PauliLubanski2s} \end{aligned}\end{equation} so we have \begin{equation}\begin{aligned} \ket{2}^{\odot 2s}\!& = e^{k \cdot a} \big\{ U_{12} \ket{1} \big\}^{\!\odot 2s} , \qquad |2]^{\odot 2s}\!= e^{-k \cdot a} \big\{ U_{12} |1] \big\}^{\!\odot 2s} , \\ \bra{2}^{\odot 2s}\!& = \big\{ U_{12} \bra{1} \big\}^{\!\odot 2s} e^{-k \cdot a} ,\:\,\quad [2|^{\odot 2s}\!= \big\{ U_{12} [1| \big\}^{\!\odot 2s} e^{k \cdot a} , \label{eq:Lorentz1to2SpinorPL} \end{aligned}\end{equation} where the second line follows from the antisymmetry of $\sigma^{\mu\nu}$ and $\bar{\sigma}^{\mu\nu}$ in the sense of $ \epsilon^{\alpha\beta} \sigma_{~~~\beta}^{\mu\nu,~\gamma} \epsilon_{\gamma\delta} = -\sigma_{~~~\delta}^{\mu\nu,~\alpha} $. Let us now inspect the spin dependence of the three-point amplitudes. In \rcite{Guevara:2018wpp} we used their representation~\eqref{eq:GravityMatter3ptExp} for that. In terms of the same Pauli-Lubanski operators~\eqref{eq:PauliLubanskiSpinor}, they can be rewritten in a simpler form: \begin{subequations} \begin{align} \label{eq:GravityMatter3ptPlus2} {\cal M}_3^{(s)}(k^+) & = -\frac{\kappa x^2}{2m^{2s-2}} [2|^{\odot 2s} e^{-2k \cdot a} |1]^{\odot 2s} , \\* \label{eq:GravityMatter3ptMinus2} {\cal M}_3^{(s)}(k^-) & = -\frac{\kappa x^{-2}}{2m^{2s-2}} \bra{2}^{\odot 2s} e^{2k \cdot a} \ket{1}^{\odot 2s} , \end{align} \label{eq:GravityMatter3pt2}% \end{subequations} which can be derived from \eqn{eq:GravityMatter3pt} using the identities \begin{subequations} \begin{align} [1^a k] & = x \braket{1^a k} , \qquad [2^b k] = x \braket{2^b k} , \\ [1^a 2^b] & = - \braket{1^a 2^b} + \frac{x}{m} \braket{1^a k} \braket{k\;\!2^b} . \end{align} \end{subequations} The apparent spin dependence in the amplitude formulae above is of the form $e^{\mp 2k \cdot a}$, whereas there seems to be no such dependence in the original formulae~\eqref{eq:GravityMatter3pt} from \rcite{Arkani-Hamed:2017jhn}. This apparent contradiction is resolved by taking into account the transformations~\eqref{eq:Lorentz1to2Spinor}: the true angular-momentum dependence inherent to the minimal-coupling amplitudes is independent of the spinorial basis. (Indeed, it must also match the covariant formula~\eqref{eq:Arg}.) For example, the plus-helicity amplitude~\eqref{eq:GravityMatter3ptPlus} involves $\braket{12}^{\odot 2s}$, which in the chiral representation is simply \begin{equation} \braket{21}^{\odot 2s} = \big\{ U_{12} \bra{1} \big\}^{\!\odot 2s} e^{-k \cdot a} \ket{1}^{\odot 2s} , \end{equation} whereas in the antichiral representation it is \begin{equation} [2|^{\odot 2s} e^{-2k \cdot a} |1]^{\odot 2s} = \big\{ U_{12} [1| \big\}^{\!\odot 2s} e^{-k \cdot a} |1]^{\odot 2s} . \end{equation} As pointed out in the Appendix, it is now natural to strip the spin-states to cleanly obtain the spin dependence. Alternatively, in the classical (and arbitrary-spin) limit we should treat the operator in-between as a C-number. In that case, both expressions above become unambiguously \begin{equation} \lim_{s \to \infty} m^{2s} (U_{12})^{\odot 2s} e^{-k \cdot a} . \end{equation} The factor of $m^{2s}$ cancels in the actual amplitudes: \begin{subequations} \begin{align} \label{eq:GravityMatter3ptPlus3} {\cal M}_3^{(\infty)}(k^+) & \approx -\frac{\kappa}{2} m^2 x^2 e^{-k \cdot a}\!\lim_{s \to \infty} (U_{12})^{\odot 2s} , \\* \label{eq:GravityMatter3ptMinus3} {\cal M}_3^{(\infty)}(k^-) & \approx -\frac{\kappa}{2} m^2 x^{-2} e^{k \cdot a}\!\lim_{s \to \infty} (U_{12})^{\odot 2s} . \end{align} \label{eq:GravityMatter3pt3}% \end{subequations} The remaining unitary factor of $(U_{12})^{\odot 2s}$ parametrizes an arbitrary little-group transformation that corresponds to the choice of the spin quantization axis~\eqref{eq:UnitSpinVector}. As such, it is inherently quantum-mechanical and therefore should be removed in the classical limit. Indeed, it also appears in the simple product of polarization tensors \begin{align} \lim_{s \to \infty} \varepsilon_2 \cdot \varepsilon_1 = \lim_{s \to \infty} \frac{1}{m^{2s}} \braket{21}^{\odot s} \odot & [21]^{\odot s} \nonumber \\ \label{eq:SpinTransitionNorm} = \lim_{s \to \infty} \frac{1}{m^{2s}} \big\{ U_{12} \bra{1} \big\}^{\!\odot s} e^{-k \cdot a} & \ket{1}^{\odot s} \\ \times \big\{ U_{12} [1| \big\}^{\!\odot s} e^{k \cdot a} & |1]^{\odot s} = \lim_{s \to \infty} (U_{12})^{\odot 2s} , \nonumber \end{align} where $a$ is defined by \eqn{eq:PauliLubanski2s} but with half as many slots. So we interpret the factor of $(U_{12})^{\odot 2s}$ as the state normalization in accord with the notion of GEV of \rcite{Guevara:2018wpp}. \section{Four-point amplitude \label{sec:4pt}} We are now ready to compute the four-point amplitude that contains the complete information about classical 1PM scattering of two spinning black holes, with masses~$m_{\rm a}$ and~$m_{\rm b}$. In the rigorous framework of Kosower, Maybee and O'Connell~\cite{Kosower:2018adc} for computing the momentum deflection in the spinless case, the tree-level contribution to the impulse expectation value is \begin{align}\!\! \Delta p_{\rm a}^\mu & = \lim_{\hbar \to 0} \int\!\hat{d}^4p_1 \hat{\delta}_+(p_1^2-m_{\rm a}^2) \int\!\hat{d}^4p_2 \hat{\delta}_+(p_2^2-m_{\rm a}^2) \nonumber \\ & \quad~\times\! \int\!\hat{d}^4p_3 \hat{\delta}_+(p_3^2-m_{\rm b}^2) \int\!\hat{d}^4p_4 \hat{\delta}_+(p_4^2-m_{\rm b}^2) \\ & \quad~\times \hat{\delta}^4(p_1\!+p_3\!-p_2\!-p_4) \psi_{\rm a}(p_1) \psi_{\rm a}^*(p_2) \psi_{\rm b}(p_3) \psi_{\rm b}^*(p_4) \nonumber \\ & \quad~\times k^\mu e^{-ik\cdot b/\hbar} i{\cal M}_4(p_1,-p_2,p_3,-p_4) , \nonumber \end{align} where $k=p_2-p_1$ and the wavefunctions~$\psi_{\rm a,b}$ describe quantum-mechanical wave packets with momenta well approximated by the classical momenta $p_{\rm a,b}$. It then leads to a schematic formula \begin{equation} \Delta p_{\rm a}^\mu = \bigg\langle\!\!\!\bigg\langle\!\int\!\hat{d}^4k\;\! \hat{\delta}(2p_{\rm a}\!\cdot k) \hat{\delta}(2p_{\rm b}\!\cdot k) k^\mu e^{-ik \cdot b/\hbar} i{\cal M}_4(k) \bigg\rangle\!\!\!\bigg\rangle . \label{eq:ImpulseKMO} \end{equation} Here the angle-bracket notation of \rcite{Kosower:2018adc} involves a careful analysis of suitable wavefunctions~$\psi_{\rm a,b}$ and powers of~$\hbar$, and roughly amounts to setting the momenta to their classical values as follows \begin{equation} k^\mu = \hbar \bar{k}^\mu \to 0 , \qquad p_1^\mu, p_2^\mu \to m_{\rm a} u_{\rm a}^\mu , \qquad p_3^\mu, p_4^\mu \to m_{\rm b} u_{\rm b}^\mu . \label{eq:Momenta2Classical} \end{equation} \begin{figure} \includegraphics[width=0.4\textwidth]{graphs/fig_4pt.pdf} \caption{\label{fig:4pt} Four-point amplitude for elastic scattering of two distinct massive particles} \end{figure} First of all, we note that in the quantum-mechanical setting of \rcite{Kosower:2018adc} both $p_1$ and $p_2$ are associated with the momentum of the first incoming black hole. This is consistent with the equitable identification \begin{equation} p_{\rm a} = (p_1+p_2)/2 , \qquad p_{\rm b} = (p_3+p_4)/2 , \end{equation} that we will follow. Moreover, the classical limit~\eqref{eq:Momenta2Classical} prescribes inspecting soft-graviton exchange in the $t=k^2$ channel, in which the graviton's momentum is taken to zero uniformly. Here, however, we are going to adhere to an alternative strategy of the HCL~\cite{Guevara:2017csg}: we compute the residue of the scattering amplitude on the pole at $t=0$ on finite complex kinematics and analytically continue the result to real kinematics at a later stage. As shown in \fig{fig:4pt}, the four-point amplitude then conveniently factorizes into two three-point ones: \begin{align} \label{eq:SpinDeflectionAmplitude1} & {\cal M}_4^{(s_{\rm a},s_{\rm b})}(p_1,\!-p_2,p_3,\!-p_4) \\ & = \frac{\!-1}{t}\!\sum_{\pm}\!{\cal M}_3^{(s_{\rm a})}(p_1,\!-p_2,k^\pm) {\cal M}_3^{(s_{\rm b})}(p_3,\!-p_4,\!-k^\mp) + {\cal O}(t^0) \nonumber \\ & = \frac{-(\kappa/2)^2}{m_{\rm a}^{2s_{\rm a}-2} m_{\rm b}^{2s_{\rm b}-2} t} \Big( x_{\rm a}^2 x_{\rm b}^{-2} \braket{21}^{\odot 2s_{\rm a}} [43]^{\odot 2s_{\rm b}} \nonumber \\ & \qquad \qquad \qquad~\;\,\quad + x_{\rm a}^{-2} x_{\rm b}^2 [21]^{\odot 2s_{\rm a}} \braket{43}^{\odot 2s_{\rm b}} \Big) + {\cal O}(t^0) , \nonumber \end{align} of which we now have complete understanding. The helicity factors enter the above amplitude in simple combinations evaluated on the pole kinematics as \begin{equation} x_{\rm a}/x_{\rm b} = \gamma(1-v) , \qquad x_{\rm b}/x_{\rm a} = \gamma(1+v) , \label{eq:MomentumDeflectionVariables} \end{equation} where we have introduced the following interchangeable variables that describe the total energy of the black-hole scattering process: \begin{equation} \gamma = \frac{1}{\sqrt{1-v^2}} = \frac{p_{\rm a}\!\cdot p_{\rm b}}{m_{\rm a} m_{\rm b}} = u_{\rm a}\!\cdot u_{\rm b} . \label{eq:gammaFactor} \end{equation} Evaluating the spin-dependent terms using \eqn{eq:Lorentz1to2SpinorPL} and taking into account the direction of $k^\mu$, we get \begin{align} {\cal M}_4^{(s_{\rm a},s_{\rm b})} = & \frac{-(\kappa/2)^2 \gamma^2 } { m_{\rm a}^{2s_{\rm a}-2} m_{\rm b}^{2s_{\rm b}-2} t } \nonumber \\ \times \Big( (1-v)^2 & \big\{ U_{12} \bra{1} \big\}^{\!\odot 2s_{\rm a}}\;\!\! \exp(-k \cdot a_{\rm a}) \ket{1}^{\odot 2s_{\rm a}} \nonumber \\ \times & \big\{ U_{34} [3| \big\}^{\!\odot 2s_{\rm b}} \exp(-k \cdot a_{\rm b}) |3]^{\odot 2s_{\rm b}} \label{eq:SpinDeflectionAmplitude2} \\ + (1+v)^2 & \big\{ U_{12} [1| \big\}^{\!\odot 2s_{\rm a}} \exp(k \cdot a_{\rm a}) |1]^{\odot 2s_{\rm a}} \nonumber \\ \times & \big\{ U_{34} \bra{3} \big\}^{\!\odot 2s_{\rm b}}\:\!\! \exp(k \cdot a_{\rm b}) \ket{3}^{\odot 2s_{\rm b}} \Big) + {\cal O}(t^0) . \nonumber \end{align} It is straightforward to check that the same result is obtained if we choose to Lorentz-transform the states symmetrically to their averages: $p_1, p_2 \to p_{\rm a}$ and $p_3, p_4 \to p_{\rm b}$. Before we take the classical limit, we should note that the above contractions of the Pauli-Lubanski pseudovector are parity-odd. To obtain a parity even expression, we observe that on the pole kinematics $k^2=0$ the Levi-Civita spin contractions satisfy \begin{subequations} \begin{align} i\epsilon_{\mu\nu\rho\sigma} p_{\rm a}^\mu p_{\rm b}^\nu k^\rho a_{\rm a}^\sigma & = m_{\rm a} m_{\rm b} \gamma v (k \cdot a_{\rm a}) , \\ i\epsilon_{\mu\nu\rho\sigma} p_{\rm a}^\mu p_{\rm b}^\nu k^\rho a_{\rm b}^\sigma & = m_{\rm a} m_{\rm b} \gamma v (k \cdot a_{\rm b}) . \end{align} \label{eq:spin1pole}% \end{subequations} These equalities can be derived by squaring the left-hand sides and computing the resulting Gram determinants using that $ k^2 = p_{\rm a} \cdot k = p_{\rm b} \cdot k = p_{\rm a} \cdot a_{\rm a} = p_{\rm b} \cdot a_{\rm b} = 0 $. Therefore, introducing a two-form constructed from two initial BH momenta \begin{equation} w^{\mu\nu} = \frac{2p_{\rm a}^{[\mu} p_{\rm b}^{\nu]}} {m_{\rm a} m_{\rm b} \gamma v} , \qquad [w*a]_\mu = \frac{1}{2} \epsilon_{\mu\nu\alpha\beta} w^{\alpha\beta} a^\nu , \label{eq:wInForm} \end{equation} and stripping the unitary transition factors $U_{12}^{\odot 2s_{\rm a}}$ and $U_{34}^{\odot 2s_{\rm b}}$ via the GEV, we obtain the classical limit of the scattering amplitude~\eqref{eq:SpinDeflectionAmplitude2} as \begin{equation} \braket{{\cal M}_4(k)} =-\Big(\frac{\kappa}{2}\Big)^{\!2} \frac{m_{\rm a}^2 m_{\rm b}^2}{k^2} \gamma^2 \sum_\pm (1 \pm v)^2 \exp[{\pm i} (k \cdot w*a_0)] , \label{eq:SpinDeflectionAmplitude3} \end{equation} where $a_0^\mu = a_{\rm a}^\mu + a_{\rm b}^\mu$ is the total spin pseudovector. Note that from now on we consider the above expression to be valid for any values of transfer momentum momentum~$k$. \begin{figure} \includegraphics[width=0.2\textwidth]{graphs/fig_COM2.pdf} \caption{\label{fig:COM} The BH three-momenta in the center-of-mass frame and the impact parameter between them} \end{figure} As suggested by \eqn{eq:ImpulseKMO} and the scattering-angle formula of \rcite{Bjerrum-Bohr:2018xdl}, in the classical picture we consider the transfer momentum~$k$ as a Fourier variable dual to the impact parameter $b$, which is a spacelike vector orthogonal to both of initial momenta, $b \cdot p_{\rm a} = b \cdot p_{\rm b} = 0$. Therefore, we define the scattering function \begin{equation} \braket{{\cal M}_4(b)} = \int\!\hat{d}^4k\;\! \hat{\delta}(2p_{\rm a}\!\cdot k) \hat{\delta}(2p_{\rm b}\!\cdot k) e^{-ik \cdot b} \braket{{\cal M}_4(k)} . \label{eq:k2b} \end{equation} The above Fourier transform is easiest performed in the center-of-mass (COM) frame, where $p_{\rm a} = (E_{\rm a}, \boldsymbol p)$ and $p_{\rm b} = (E_{\rm b}, -\boldsymbol p)$, see \fig{fig:COM}. In this frame the eikonal integration measure~\cite{Bjerrum-Bohr:2018xdl} becomes explicitly \begin{equation}\begin{aligned} & \int\!\hat{d}^4k\;\!\hat{\delta}(2p_{\rm a}\!\cdot k) \hat{\delta}(2p_{\rm b}\!\cdot k) e^{-ik \cdot b} \\ &~\quad \overset{\text{COM frame}}{=} \frac{1}{4 (E_{\rm a}+E_{\rm b}) |\boldsymbol p|} \int\!\hat{d}^2 \boldsymbol k\,e^{i\boldsymbol k \cdot \boldsymbol b} \bigg|_{k^0 = \boldsymbol p \cdot \boldsymbol k = 0} . \label{eq:Fourier2d} \end{aligned}\end{equation} In other words, the integration is strictly spacelike and restricted by $\boldsymbol p \cdot \boldsymbol k = 0$ to the two-dimensional subspace orthogonal to the initial momenta, which is the same subspace where the impact parameter is defined. Using $(E_{\rm a}+E_{\rm b}) |\boldsymbol p| = m_{\rm a} m_{\rm b} \gamma v$, we compute \begin{align} \label{eq:SpinDeflectionAmplitudeFourierCOM} & \braket{{\cal M}_4(\boldsymbol b)} = \frac{\kappa^2 m_{\rm a} m_{\rm b} \gamma}{16 v} \sum_\pm (1 \pm v)^2 \\ & \quad\,\times\! \int\!\frac{d^2 \boldsymbol k}{(2\pi)^2 \boldsymbol k^2} \exp\!\big[ i \boldsymbol k \cdot \big(\boldsymbol b \mp [w*a_0]_{2d} \big) \big] \Big|_{\boldsymbol p \cdot \boldsymbol k = 0} \nonumber \\ & =-\frac{\kappa^2 m_{\rm a} m_{\rm b} \gamma}{32\pi v} \sum_\pm (1 \pm v)^2 \log\!\big|\boldsymbol b \mp [w*a_0]_{2d}\big| . \nonumber \end{align} Here by $[w*a_0]_{2d}$ we have denoted the appropriate spacelike projection of the four-vector $w*a_0$. However, recall that \begin{equation} [w*a_0]^\mu = \frac{ \epsilon^{\mu\nu\rho\sigma} a_{0\:\!\nu} p_{\rm a\:\!\rho} p_{\rm b\:\! \sigma} } { m_{\rm a} m_{\rm b} \gamma v } , \label{eq:wInFormCOM} \end{equation} i.e. the vector $w*a_0$ is transverse to $p_{\rm a}$ and $p_{\rm b}$ and hence lies in the same plane as $\boldsymbol k$ and~$\boldsymbol b$. Therefore, no information is lost in the two-dimensional projection above, so we can safely uplift the scattering function~\eqref{eq:SpinDeflectionAmplitudeFourierCOM} to its Lorentz-invariant form \begin{equation} \braket{{\cal M}_4(b)} =-G m_{\rm a} m_{\rm b} \frac{\gamma}{v} \sum_{\pm} (1\pm v)^2 \log\!\sqrt{-(b \mp w*a_0)^2} . \label{eq:SpinDeflectionAmplitude} \end{equation} \section{Linear and angular impulses \label{sec:impulses}} In this section we relate the scattering function~\eqref{eq:SpinDeflectionAmplitude} in the impact-parameter space to the classical changes in linear and angular momentum of a BH after gravitational scattering off another BH. This problem was treated to all orders in spins at 1PM order by one of the present authors~\cite{Vines:2017hyw}, producing the result (rewritten in the mostly-minus metric convention) \begin{subequations} \begin{align} \Delta p_{\rm a}^\mu & = G m_{\rm a} m_{\rm b} \Re Z^\mu , \\ \Delta a_{\rm a}^\mu & =-\frac{G m_{\rm b}}{m_{\rm a}} \big[ p_{\rm a}^\mu (a_{\rm a}\!\cdot\!\Re Z) + \epsilon^{\mu\nu\rho\sigma} (\Im Z_{\nu}) p_{{\rm a}\:\!\rho} a_{{\rm a}\:\!\sigma} \big] ,\! \end{align} \label{eq:Solution1PMgeneral}% \end{subequations} in terms of an auxiliary complex vector \begin{equation} Z^\mu = \frac{\gamma}{v} \sum_\pm \big(1 \pm v\big)^2 [\eta^{\mu\nu} \mp i(*w)^{\mu\nu}] \frac{(b \mp w*a_0)_\nu}{(b \mp w*a_0)^2} . \label{eq:Solution1PMgeneralZ2} \end{equation} Now we can observe that differentiating the scattering function~\eqref{eq:SpinDeflectionAmplitude} automatically produces its real and imaginary parts: \begin{subequations} \begin{align} \frac{\partial~}{\partial b^\mu} \braket{{\cal M}_4(b)} & = -G m_{\rm a} m_{\rm b} \Re Z_\mu , \\ \frac{\partial~}{\partial a^\mu} \braket{{\cal M}_4(b)} & = G m_{\rm a} m_{\rm b} \Im Z_\mu . \end{align} \label{eq:Solution1PMgeneralZfromA}% \end{subequations} Using the known solution~\eqref{eq:Solution1PMgeneral}, we can identify \begin{align} \label{eq:Amp2Solution1PMgeneral} \Delta p_{\rm a}^\mu & =-\frac{\partial~}{\partial b_\mu} \braket{{\cal M}_4(b)} , \\ \Delta a_{\rm a}^\mu & = \frac{1}{m_{\rm a}^2} \bigg[ p_{\rm a}^\mu a_{\rm a}^\nu \frac{\partial~}{\partial b^\nu} - \epsilon^{\mu\nu\rho\sigma} p_{{\rm a}\:\!\nu} a_{{\rm a}\:\!\rho} \frac{\partial~}{\partial a_{\rm a}^\sigma} \bigg] \braket{{\cal M}_4(b)} . \nonumber \end{align} At this point, we have merely matched the derivatives of our scattering function~\eqref{eq:SpinDeflectionAmplitude} to the known result~\eqref{eq:Solution1PMgeneral}. Let us now promote this empirical matching to a derivation, under the assumption that our approach is consistent with that of \rcite{Kosower:2018adc}. Indeed, the first line of \eqn{eq:Amp2Solution1PMgeneral} gives precisely the impulse formula~\eqref{eq:ImpulseKMO} from \rcite{Kosower:2018adc}. So let us focus on the second line. In the concurrent preprint~\cite{Maybee:2019jus}, Maybee, O'Connell and one of the current authors have extended the classical-limit approach of \rcite{Kosower:2018adc} to include corrections in spin. Their starting point for (the expectation value of) the lowest-order angular impulse is \begin{align} \label{eq:AngularImpulseMOV} \Delta S_{\rm a}^\mu & = \bigg\langle\!\!\!\bigg\langle \int\!\hat{d}^4k\;\! \hat{\delta}(2p_{\rm a}\!\cdot k) \hat{\delta}(2p_{\rm b}\!\cdot k) e^{-ik \cdot b} \\ & \quad\:\:\times\! \bigg(\!{-}\frac{i}{m_{\rm a}^2} p_{\rm a}^\mu S_{\rm a}^\nu k_\nu {\cal M}_4(k) + \big[ S_{\rm a}^\mu, i{\cal M}_4(k) \big] \bigg) \bigg\rangle\!\!\!\bigg\rangle . \nonumber \end{align} Here the amplitude is considered to be a function of a one-particle spin vector acting on the space of physical spin degrees of freedom, i.e. the little-group indices. Therefore, we interpret it as the matrix element \begin{equation} (S_{\rm a}^\mu)_{\{a\}}^{~~~\{b\}} = (-1)^s \varepsilon_{{\rm a}\:\!\{a_1 \ldots a_{2s}\}}\!\cdot \Sigma^\mu\!\cdot \varepsilon_{\rm a}^{\{b_1 \ldots b_{2s}\}} , \end{equation} where the prefactor of $(-1)^s$ is due to the spacelike normalization of the polarization vectors in \eqn{eq:PolTensorsNorm}. The explicit form for such a spin vector at finite spin is given in \eqn{eq:PauliLubanskiLGOperator}. It corresponds to the generator of the little-group transformations: as an operator it satisfies the $\rm{so}(3)$ algebra in the rest frame of $p_{\rm a}$. This can also be stated covariantly as \begin{equation} [S_{\rm a}^\mu,S_{\rm a}^\nu] = \frac{i}{m_{\rm a}} \epsilon^{\mu\nu\rho\sigma} p_{{\rm a}\:\!\rho} S_{{\rm a}\:\!\sigma} . \end{equation} As ${\cal M}_4$ is a function of $S_{\rm a}^{\mu}$, these $\rm{so}(3)$ rotations act as \begin{equation} [S_{\rm a}^\mu, {\cal M}_4] = \frac{i}{m_{\rm a}} \epsilon^{\mu\nu\rho\sigma} p_{{\rm a}\:\!\nu} S_{{\rm a}\:\!\rho} \frac{\partial {\cal M}_4}{\partial S_{\rm a}^\sigma} . \end{equation} Therefore, we obtain the formula for the change in rescaled spin \begin{align} \label{eq:AngularImpulseMOV3} \Delta a_{\rm a}^\mu & = \frac{1}{m_{\rm a}^2} \bigg\langle\!\!\!\bigg\langle \int\!\hat{d}^4k\;\! \hat{\delta}(2p_{\rm a}\!\cdot k) \hat{\delta}(2p_{\rm b}\!\cdot k) e^{-ik \cdot b} \\ & \qquad~~\;\times\! \bigg[ p_{\rm a}^\mu a_{\rm a}^\nu (-ik_\nu) - \epsilon^{\mu\nu\rho\sigma} p_\nu a_{{\rm a}\:\!\rho} \frac{\partial~}{\partial a_{\rm a}^\sigma} \bigg] {\cal M}_4(k) \bigg\rangle\!\!\!\bigg\rangle , \nonumber \end{align} which maps directly to the second line of \eqn{eq:Amp2Solution1PMgeneral}. Now that the impulse formulae~\eqref{eq:Amp2Solution1PMgeneral} have meaning on their own, we see that plugging the scattering function~\eqref{eq:SpinDeflectionAmplitude} gives a novel derivation for the complete 1PM solution~\eqref{eq:Solution1PMgeneral}. \section{Summary and Discussion \label{sec:outro}} In this paper we have obtained the dynamically complete solution to the (net) problem of conservative spinning black-hole scattering at 1PM order as given in \rcite{Vines:2017hyw}, using minimal-coupling scattering amplitudes with arbitrarily large quantum spin~\cite{Arkani-Hamed:2017jhn}. We have rederived the spin-exponentiated structure of such three-point amplitudes in four dimensions in a way that takes into account the Lorentz boost between the incoming and outgoing momenta~\cite{Bautista:2019tdr}. In \rcite{Guevara:2018wpp} this boost was overlooked but effectively restored by the introduction of the generalized expectation value. Here we have shown that considering this boost streamlines the discussion of the spin exponentiation, as well as allows for a cleaner connection to the classical notion of spin in general relativity~\cite{Levi:2015msa}. We have computed the change of the momentum and spin of the scattered black holes at 1PM order using a four-point one-graviton-exchange amplitude, which in the holomorphic classical limit~\cite{Guevara:2017csg} is factorized into two three-point minimal-coupling amplitudes. We have adopted the formulae of \rcite{Kosower:2018adc,Maybee:2019jus} in a way that allowed us to extract the full spin dependence of the linear and angular impulses of the black holes. In this way, we obtained a complete match to the known solution 1PM solution~\cite{Vines:2017hyw}, which allows for spins of the incoming black holes in arbitrary directions. This is also a significant step forward from the simpler case of the angular momenta aligned perpendicular to the scattering plane considered in \rcite{Guevara:2018wpp}. It is promising that our calculation displayed a sufficiently uniform level of complexity all the way between the starting point and the final result, even despite the more complex nature of the quantum degrees of freedom. This is thanks to the remarkable fact that the spin multipoles of a black hole exponentiate~\cite{Hansen:1974zz,Vines:2017hyw}, which we could exploit and thus avoid explicit multipole expansions. There are several interesting future directions. One of the most relevant ones is the extension to higher loop, or PM, orders \cite{Cachazo:2017jef,Bjerrum-Bohr:2018xdl,Cheung:2018wkq,Cristofoli:2019neg}, which may require to include radiative corrections \cite{Kosower:2018adc,Bautista:2019tdr,Maybee:2019jus} and finite-size effects \cite{Bini:2012gu,Levi:2014gsa,Chen:2019hac,Cai:2019npx}. One could also attempt to consider higher curvature corrections, such as the ones in \rcites{Brandhuber:2019qpg,Emond:2019crr}. It is also interesting to explore the test-body limit~\cite{Vines:2017hyw,Vines:2018gqi} to improve our understanding of the effective potential in the sense of~\rcite{Antonelli:2019ytb}. Furthermore, it may prove beneficial to use the double-copy approach to quantum gravity amplitudes \cite{Bern:2008qj,Bern:2010ue,Johansson:2014zca,Johansson:2015oia}, which has recently seen classical extensions \cite{Monteiro:2014cda,Goldberger:2016iau,Luna:2016hge}, and in this way apply it to the binary-inspiral problem \cite{Goldberger:2017ogt,Goldberger:2017vcg, Li:2018qap,Shen:2018ebu,Plefka:2018dpa,Bautista:2019tdr,Plefka:2019hmz}. Additional insight may come from studying the same problem in a supersymmetric setting~\cite{Caron-Huot:2018ape}. In conclusion, our work, together with \rcites{Chung:2018kqs,Maybee:2019jus}, opens the way to higher-order calculations for the spin effects in classical black-hole scattering using the modern amplitude techniques in an on-shell and gauge-invariant framework. \begin{acknowledgments} We thank Fabi\'an Bautista, David Kosower, Ben Maybee and Donal O'Connell for illuminating discussions and collaboration on related topics. A.G. acknowledges support via Conicyt grant 21151647. A.O. has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sk\l{}odowska-Curie grant agreement 746138. Research at Perimeter Institute is supported in part by the Government of Canada through the Department of Innovation, Science and Economic Development Canada and by the Province of Ontario through the Ministry of Economic Development, Job Creation and Trade. \end{acknowledgments}
\section{Introduction} One of the key discoveries at RHIC is the identification of quark-gluon plasma (QGP) and its characterization as a near-perfect fluid via its collective flow~\cite{Arsene:2004fa,Back:2004je,Adams:2005dq,Adcox:2004mh,Heinz:2013th}. One of the first observations of collective longitudinal and radial flow and their hydrodynamical coupling in the invariant momentum distribution and Bose-Einstein correlations was made by the EHS/NA22 experiment ~\cite{Agababyan:1997wd} in $h$+$p$ collisions at CERN SPS at the beam momentum of 250 GeV/c, corresponding to $\sqrt{s} \approx 22$ GeV. As one of the first results of the d+Au beam energy scan at RHIC, PHENIX observed collective hydrodynamical behaviour of elliptic flow in d+Au collisions~\cite{Aidala:2017pup,Aidala:2017ajz}, providing evidence for collectivity in d+Au collisions from $\sqrt{s_{NN}} = 20$ GeV to 200 GeV. The LHC experiments observed similar features in small-system collisions~\cite{Khachatryan:2010gv,CMS:2012qk,Abelev:2012ola,Aad:2012gla}. These results not only broaden the domain of the applicability of the hydrodynamical paradigm to a previously unexpected domain, but also raise several fundamental questions as well. Is it due to the appereance of sQGP (i.e.~a strongly coupled fluid)? If yes, how much time is spent in the QGP phase? What is the origin of final state collectivity? Is it due to initial geometry and hydrodynamics? Is the initial state geometry the primary driver of final state momentum correlations in small systems? In order to test and answer these questions RHIC performed not only beam energy scan but also geometry scan measurements which allows for the investigation of the phase diagram of QCD matter by varying the beam energy in the region where the change from crossover to first order phase transition is suggested to occur. The beam-energy-scan program found real-valued $v_2$ in $d+$Au at all collision energies, providing evidence for collectivity in $d+$Au at all energies. Applying the unique capabilities of RHIC a projectile geometry scan~\cite{Nagle:2013lja} was utilized in order to discriminate between hydrodynamical models that couple to the initial geometry and initial-state momentum correlation models that do not. To characterize the fluidity of QGP, the azimuthal distribution of each event's final-state particles, $\frac{dN}{d\phi}$, is decomposed into a Fourier series as follows: $ \frac{dN}{d\phi} \propto 1+ \sum_n 2 v_n(p_T)\cos(n(\phi-\psi_n)),$ where $p_t$ and $\phi$ are the transverse momentum and the azimuthal angle of a particle relative to the beam direction, respectively, and $\psi_n$ is the orientation of the $n^{\rm th}$ order symmetry plane of the produced particles. The second ($v_2$) and third ($v_3$) Fourier coefficients represent the amplitude of elliptic and triangular flow, respectively. Varying the collision system from \mbox{$p$$+$Au}, to \mbox{$d$$+$Au}, to $^{3}$He+Au changes the initial geometry from dominantly circular, to elliptical, and to triangular configurations, as characterized by the 2$^{\rm nd}$ and 3$^{\rm rd}$ order spatial eccentricities, which correspond to ellipticity and triangularity, respectively. The mean $\varepsilon _2$ and $\varepsilon _3$ values for small impact parameter $p/d/^{3}$He+Au collisions are shown in Fig.~\ref{fig:hydro}a. The definition of the $n^{\rm th}$ order spatial eccentricity of the system, $\varepsilon_n$, is $ \varepsilon_n=\frac{\sqrt{\langle r^n\cos(n\phi)\rangle^2+\langle r^n \sin (n\phi)\rangle^2}}{\langle r^n \rangle},$ where $r$ and $\phi$ are the polar coordinates of participating nucleons~\cite{Alver:2010gr}. Based on the calculation from a MC Glauber model, the average second and third order spatial eccentricities ($\epsilon_2$ and $\epsilon_3$) are shown as columns in Fig.~\ref{fig:hydro}a. The second and third order spatial eccentricities are called ellipticity and triangularity, respectively. Hydrodynamical models begin with an initial spatial energy-density distribution with a given temperature that evolves in time following the laws of relativistic viscous hydrodynamics using an equation of state determined from lattice QCD~\cite{Gale:2013da}. Examples of this temperature evolution are shown for $p/d/^{3}$He+Au collisions in Fig.~\ref{fig:hydro}b using the hydrodynamical model SONIC~\cite{Habich:2014jna}. Based on haydrodynamical models a clear prediction for the ordering of the experimentally accessible $v_2$ and $v_3$ can be given, namely \begin{equation} v_2^{\mbox{$p$$+$Au}}<v_2^{\mbox{$d$$+$Au}}\approx v_2^{\mbox{$^3$He$+$Au}}, \hspace{50pt} v_3^{\mbox{$p$$+$Au}}\approx v_3^{\mbox{$d$$+$Au}}<v_3^{\mbox{$^3$He$+$Au}}. \label{eq:vn-hydro} \end{equation} This ordering assumes that hydrodynamics can efficiently translate the initial geometric $\varepsilon_n$ into dynamical $v_n$, which is indeed seen in hydrodynamical simulations with small values of specific shear viscosity, as indicated on Fig.~\ref{fig:hydro}. \begin{figure*}[htbp] \begin{center} \includegraphics[width=0.8\linewidth]{eccentricityAndHydro.pdf} \caption{{\bf Average $\epsilon_n$ from a MC Glauber model and hydrodynamic evolution of small systems.} } \label{fig:hydro} \end{center} \end{figure*} There exist a class of alternative explanations where $v_n$ is not generated via flow, but rather is created at the earliest time in the collision process as described by so-called color glass condensate or initial momentum space correlation models~\cite{Mace:2018vwq}. The expectation from models based on initial-state momentum domain correlations for the ordering of the magnitude of the $v_2$ and $v_3$ coefficients is: \begin{equation} v_n^{\mbox{$p$$+$Au}}>v_n^{\mbox{$d$$+$Au}}>v_n^{\mbox{$^3$He$+$Au}}, \label{eq:vn-momentum} \end{equation} while the MSTV model in which gluons from the Au target do not resolve the individual color domains in the projectile $p/d/^{3}$He does not follow Eq.~(\ref{eq:vn-momentum}).\footnote{Please see the Note Added in Proof at the end of this manuscript for an important update regarding the MSTV calculation.} \section{Models vs.~data} Fig.~\ref{fig:v2_v3} summarizes the results of elliptic and triangular flow measurements in the RHIC $p/d/^{3}$He+Au geometry scan. The data points follow a geometrical ordering in a qualitative agreement with expectations from hydrodynamics. \begin{figure*}[htbp] \begin{center} \includegraphics[width=0.75\linewidth]{v2_v3.png} \caption{ {\bf PHENIX results for $v_2(p_t)$ and $v_3(p_t)$ in the RHIC geometry scan at $\sqrt{s_{NN}} = 200$ GeV.} } \label{fig:v2_v3} \end{center} \end{figure*} Fig.~\ref{fig:hydro_mstv} compares quantitatively the PHENIX elliptic and triangular flow measurements for $p/d/^{3}$He+Au collisions with the results of numerical simulations. Two of these, SONIC and iEBE-VISHNU indicate predictions from numerical solutions of 2d+1 relativistic hydrodynamics with lattice QCD equation of state. The third model MSTV is on the other hand is based on initial state correlations and a color glass condensate initial state. Hydrodynamical models are consistent with the $v_n$ data in all three systems, however, they tend to diverge at higher $p_T$ in case of $v_3$, which may be more sensitive to the hadronic scattering. Focusing on the MSTV, Fig.~\ref{fig:hydro_mstv} shows that this model does a fair job in case of $v_2$, but fails in case of $v_3$. \begin{figure*}[htbp] \begin{center} \includegraphics[width=0.75\linewidth]{hydro_mstv.png} \caption{{\bf Elliptic and triangular flows as a function of $p_T$ in the RHIC geometry scan.} Panel a) shows results for p+Au, panel b) for d+Au and panel c) for $^{3}He+Au$ collisions at $\sqrt{s_{NN}} = 200$ GeV in 0-5\% centrality class, as compared to SONIC (solid red) , VISHNU (dashed blue) predictions and MSTV (solid green) postdictions.} \label{fig:hydro_mstv} \end{center} \end{figure*} In order to distinguish these models, a statistical significance test was made and provided a $p$-value for the MSTV calculations of $v_2$ and $v_3$ for the three collision systems of effectively zero, in contradiction to the robust values found for the hydrodynamical models. The MSTV paper made a clear prediction that the $v_2$ will be identical between systems when selecting on the same event multiplicity. Shown in Fig.~\ref{fig:samemult} are the previously published \mbox{$d$$+$Au} (20-40\%) and \mbox{$p$$+$Au} (0-5\%) $v_2$ where the measured mean charged particle multiplicities ($dN_{\mathrm{ch}}/d\eta$) match~\cite{Adare:2018toe}. Our results contradict to this MSTV prediction, as they indicate clear differences between the $v_2$ of $d$+Au and $p$+Au collisions even if they are measured in the same multiplicity class, as indicated by Fig.~\ref{fig:samemult}. The results are however in a reasonable qualitative agreement with hydrodynamical predictions. \begin{figure*}[htbp] \begin{center} \includegraphics[width=0.4\linewidth]{paudauv2_samemultiplicity.pdf} \caption{ {\bf Measured $v_2(p_T)$ in $p$+Au and $d$+Au collisions at the same event multiplicity, as compared to hydrodynamical calculations with SONIC and MVST color glass condensate calculations }(note that these calculatios predict the same green line for p+Au and d+Au collisions). } \label{fig:samemult} \end{center} \end{figure*} \section*{Note Added in Proof} Subsequent to the preparation of this manuscript we were made aware that there is an issue in the MSTV calculation and that the calculation no longer agrees with the PHENIX data when the issue is corrected. For details see \url{http://www.int.washington.edu/talks/WorkShops/int_19_1b/People/Mace_M/Mace.pdf} . \section*{Acknowledgments} The author is grateful for the support of EFOP 3.6.1-16-2016-0001, and NKFIH grant FK 123842 - 123959 (Hungary), as well as to the full list of \href{https://www.bnl.gov/rhic/phenix.asp}{PHENIX funding agencies}. \section*{References}
\section{Introduction} Recall that a \emph{quasi-order} is a binary relation which is reflexive and transitive. A well-studied quasi-order over the Baire space $\mathbb N^{\mathbb N}$ is the binary relation $\le^*$ which is defined by letting, for any two elements $\eta:\mathbb N\rightarrow\mathbb N$ and $\xi:\mathbb N\rightarrow\mathbb N$, $$\eta\le^*\xi\text{ iff }\{n\in\mathbb N\mid \eta(n)>\xi(n)\}\text{ is finite}.$$ This quasi-order is behind the definitions of cardinal invariants $\mathfrak b$ and $\mathfrak d$ (see~\cite[\S2]{MR2768685}), and serves as a key to the analysis of \emph{oscillation of real numbers} which is known to have prolific applications to topology, graph theory, and forcing axioms (see~\cite{MR980949}). By a classical theorem of Hechler \cite{MR0360266}, the structure $(\mathbb N^{\mathbb N},\le^*)$ is universal in that sense that for any $\sigma$-directed poset $\mathbb P$ with no maximal element, there is a $ccc$ forcing extension in which $(\mathbb N^{\mathbb N},\le^*)$ contains a cofinal order-isomorphic copy of $\mathbb P$. In this paper, we consider (a refinement of) the higher analogue of the relation $\le^*$ to the realm of the generalized Baire space $\kappa^\kappa$ (sometimes refered as the higher Baire space), where $\kappa$ is a regular uncountable cardinal. This is done by simply replacing the ideal of finite sets with the ideal of nonstationary sets, as follows.\footnote{A comparison of the generalization considered here with the one obtained by replacing the ideal of finite sets with the ideal of bounded sets may be found in \cite[\S8]{MR1355135}.} \begin{defn} Given a stationary subset $S\subseteq\kappa$, we define a quasi-order $\sq S$ over $\kappa^\kappa$ by letting, for any two elements $\eta:\kappa\rightarrow\kappa$ and $\xi:\kappa\rightarrow\kappa$, $$\eta\sq S\xi\text{ iff }\{\alpha\in S\mid \eta(\alpha)>\xi(\alpha)\}\text{ is nonstationary}.$$ \end{defn} Note that since the nonstationary ideal over $S$ is $\sigma$-closed, the quasi-order $\le^S$ is well-founded, meaning that we can assign a \emph{rank} value $\|\eta\|$ to each element $\eta$ of $\kappa^\kappa$. The utility of this approach is demonstrated in the celebrated work of Galvin and Hajnal \cite{MR0376359} concerning the behavior of the power function over the singular cardinals, and, of course, plays an important role in Shelah's \textit{pcf theory} (see~\cite[\S4]{MR2768693}). It was also demonstrated to be useful in the study of partition relations of singular cardinals of uncountable cofinality \cite{MR2494318}. \medskip In this paper, we first address the question of how $\sq S$ compares with $\sq{S'}$ for various subsets $S$ and $S'$. It is proved: \begin{thma} Suppose that $\kappa$ is a regular uncountable cardinal and $\axiomfont{GCH}$ holds. Then there exists a cofinality-preserving $\axiomfont{GCH}$-preserving forcing extension in which for all stationary subsets $S,S'$ of $\kappa$, there exists a map $f:\kappa^{\le\kappa}\rightarrow2^{\le\kappa}$ such that, for all $\eta,\xi\in\kappa^{\le\kappa}$, \begin{itemize} \item[$\bullet$] $\dom(f(\eta))=\dom(\eta)$; \item[$\bullet$] if $\eta\subseteq\xi$, then $f(\eta)\subseteq f(\xi)$; \item[$\bullet$] if $\dom(\eta)=\dom(\xi)=\kappa$, then $\eta\sq S\xi$ iff $f(\eta)\sq{S'}f(\xi)$. \end{itemize} \end{thma} Note that as $\rng(f\restriction\kappa^\kappa)\subseteq 2^\kappa$, the above assertion is non-trivial even in the case $S=S'=\kappa$, and forms a contribution to the study of lossless encoding of substructures of $(\kappa^{\le\kappa},\ldots)$ as substructures of $(2^{\le\kappa},\ldots)$ (see, e.g., \cite[Appendix]{paper20}). \medskip To formulate our next result --- an optimal strengthening of Theorem~A --- let us recall a few basic notions from generalized descriptive set theory. \emph{The generalized Baire space} is the set $\kappa^\kappa$ endowed with the \emph{bounded topology}, in which a basic open set takes the form $[\zeta]:=\{\eta\in \kappa^\kappa \mid \zeta\subset \eta\}$, with $\zeta$, an element of $\kappa^{<\kappa}$. A subset $F\subseteq\kappa^\kappa$ is \emph{closed} iff its complement is open iff there exists a tree $T\subseteq\kappa^{<\kappa}$ such that $[T]:=\{ \eta\in\kappa^\kappa\mid\forall\alpha<\kappa(\eta\restriction\alpha\in T)\}$ is equal to $F$. A subset $A\subseteq\kappa^\kappa$ is \emph{analytic} iff there is a closed subset $F$ of the product space $\kappa^\kappa\times \kappa^\kappa$ such that its projection $\pr(F):=\{\eta\in\kappa^\kappa\mid \exists\xi\in\kappa^\kappa~(\eta,\xi)\in F\}$ is equal to $A$. \emph{The generalized Cantor space} is the subspace $2^\kappa$ of $\kappa^\kappa$ endowed with the induced topology. The notions of open, closed and analytic subsets of $2^\kappa$, $2^\kappa\times2^\kappa$ and $\kappa^\kappa\times\kappa^\kappa$ are then defined in the obvious way. \begin{defn} The restriction of the quasi-order $\sq S$ to $2^\kappa$ is denoted by $\sqc S$. \end{defn} For all $\eta,\xi\in\kappa^\kappa$, denote $\Delta(\eta,\xi):=\min(\{\alpha<\kappa\mid \eta(\alpha)\neq\xi(\alpha)\}\cup\{\kappa\})$. \begin{defn} Let $R_1$ and $R_2$ be binary relations over $X_1,X_2\in \{2^\kappa, \kappa^\kappa\}$, respectively. A function $f:X_1\rightarrow X_2$ is said to be: \begin{enumerate}[(a)] \item a \emph{reduction of $R_1$ to $R_2$} iff, for all $\eta,\xi\in X_1$, $$\eta\mathrel{R_1}\xi\text{ iff }f(\eta)\mathrel{R_2}f(\xi).$$ \item \emph{$1$-Lipschitz} iff for all $\eta,\xi\in X_1$, $$\Delta(\eta,\xi)\le\Delta(f(\eta),f(\xi)).$$ \end{enumerate} The existence of a function $f$ satisfying (a) and (b) is denoted by ${R_1}\hookrightarrow_1{R_2}$. \end{defn} In the above language, Theorem~A provides a model in which, for all stationary subsets $S,S'$ of $\kappa$, ${\sq S}\hookrightarrow_1{\sqc S'}$. As $\sq{S}$ is an analytic quasi-order over $\kappa^\kappa$, it is natural to ask whether a stronger universality result is possible, namely, whether it is forceable that \emph{any} analytic quasi-order over $\kappa^\kappa$ admits a $1$-Lipschitz reduction to $\sqc{S'}$ for some (or maybe even for all) stationary $S'\subseteq\kappa$. The answer turns out to be affirmative, hence the choice of the title of this paper. \begin{thmb} Suppose that $\kappa$ is a regular uncountable cardinal and $\axiomfont{GCH}$ holds. Then there exists a cofinality-preserving $\axiomfont{GCH}$-preserving forcing extension in which, for every analytic quasi-order $Q$ over $\kappa^\kappa$ and every stationary $S\subseteq\kappa$, ${Q}\hookrightarrow_1{\sqc S}$. \end{thmb} \begin{uremark} The universality statement under consideration is optimal, as ${Q}\hookrightarrow_1{\sqc S}$ implies that $Q$ analytic. \end{uremark} The proof of the preceding goes through a new diamond-type principle for reflecting second-order formulas, introduced here and denoted by $\dl^*_S(\Pi^1_2)$. This principle is a strengthening of Jensen's $\diamondsuit_S$ and a weakening of Devlin's $\diamondsuit^\sharp_S$. For $\kappa$ a successor cardinal, we have $\dl^*_S(\Pi^1_2)\Rightarrow\diamondsuit^*_S$ but not $\diamondsuit^*_S\Rightarrow\dl^*_S(\Pi^1_2)$ (see Remark~\ref{rmk38} below). Another crucial difference between the two is that, unlike $\diamondsuit^*_S$, the principle $\dl^*_S(\Pi^1_2)$ is compatible with the set $S$ being ineffable. In Section~2, we establish the consistency of the new principle, in fact, proving that it follows from an abstract condensation principle that was introduced and studied in \cite{FHl,HolyWuWelch}. It thus follows that it is possible to force $\dl^*_S(\Pi^1_2)$ to hold over all stationary subsets $S$ of a prescribed regular uncountable cardinal $\kappa$. It also follows that, in canonical models for Set Theory (including any $L[E]$ model with Jensen's $\lambda$-indexing which is sufficiently iterable and has no subcompact cardinals), $\dl^*_S(\Pi^1_2)$ holds for every stationary subset $S$ of every regular uncountable (including ineffable) cardinal $\kappa$. Then, in Section~3, the core combinatorial component of our result is proved: \begin{thmc} Suppose $S$ is a stationary subset of a regular uncountable cardinal $\kappa$. If $\dl^*_S(\Pi^1_2)$ holds, then, for every analytic quasi-order $Q$ over $\kappa^\kappa$, ${Q}\hookrightarrow_1{\sqc S}$. \end{thmc} \section{A Diamond reflecting second-order formulas} In \cite{MR683163}, Devlin introduced a strong form of the Jensen-Kunen principle $\diamondsuit^+_\kappa$, which he denoted by $\diamondsuit^{\sharp}_{\kappa}$, and proved: \begin{fact}[Devlin, {\cite[Theorem~5]{MR683163}}]\label{devlinsthm} In $L$, for every regular uncountable cardinal $\kappa$ that is not ineffable, $\diamondsuit^\sharp_\kappa$ holds. \end{fact} \begin{remark} A subset $S$ of a regular uncountable cardinal $\kappa$ is said to be \emph{ineffable} iff, for every sequence $\langle Z_\alpha\mid\alpha\in S\rangle$, there exists a subset $Z\subseteq\kappa$, for which $\{\alpha\in S\mid Z\cap\alpha=Z_\alpha\cap\alpha\}$ is stationary. Note that the collection of non-ineffable subsets of $\kappa$ forms a normal ideal that contains $\{\alpha<\kappa\mid \cf(\alpha)<\alpha\}$ as an element. Also note that if $\kappa$ is ineffable, then $\kappa$ is strongly inaccessible. Finally, we mention that by a theorem of Jensen and Kunen, for any ineffable set $S$, $\diamondsuit_S$ holds and $\diamondsuit^*_S$ fails. \end{remark} As said before, in this paper, we consider a variation of Devlin's principle compatible with $\kappa$ being ineffable. Devlin's principle as well as its variation provide us with $\Pi^{1}_{2}$-reflection over structures of the form $\langle \kappa,{\in}, (A_{n})_{n\in \omega} \rangle $. We now describe the relevant logic in detail. A $\Pi^{1}_{2}$-sentence $\phi$ is a formula of the form $\forall X\exists Y\varphi$ where $\varphi$ is a first-order sentence over a relational language $\mathcal L$ as follows: \begin{itemize} \item[$\bullet$] $\mathcal L$ has a predicate symbol $\epsilon$ of arity $2$; \item[$\bullet$] $\mathcal L$ has a predicate symbol $\mathbb X$ of arity $m({\mathbb X})$; \item[$\bullet$] $\mathcal L$ has a predicate symbol $\mathbb Y$ of arity $m({\mathbb Y})$; \item[$\bullet$] $\mathcal L$ has infinitely many predicate symbols $(\mathbb A_n)_{n\in \omega}$, each $\mathbb A_n$ is of arity $m(\mathbb A_n)$. \end{itemize} \begin{defn} For sets $N$ and $x$, we say that \emph{$N$ sees $x$} iff $N$ is transitive, p.r.-closed, and $x\cup\{x\}\subseteq N$. \end{defn} Suppose that a set $N$ sees an ordinal $\alpha$, and that $\phi=\forall X\exists Y\varphi$ is a $\Pi^{1}_{2}$-sentence, where $\varphi$ is a first-order sentence in the above-mentioned language $\mathcal L$. For every sequence $(A_n)_{n\in\omega}$ such that, for all $n\in\omega$, $A_n\subseteq \alpha^{m(\mathbb A_n)}$, we write $$\langle \alpha,{\in}, (A_{n})_{n\in \omega} \rangle \models_N \phi$$ to express that the two hold: \begin{enumerate}[(1)] \item $(A_{n})_{n\in \omega} \in N$; \item $\langle N,{\in}\rangle\models (\forall X\subseteq \alpha^{m(\mathbb X)})(\exists Y\subseteq \alpha^{m(\mathbb Y)})[\langle \alpha,{\in}, X, Y, (A_{n})_{n\in \omega} \rangle\models \varphi]$, where: \begin{itemize} \item[$\bullet$] $\in$ is the interpretation of $\epsilon$; \item[$\bullet$] $X$ is the interpretation of $\mathbb X$; \item[$\bullet$] $Y$ is the interpretation of $\mathbb Y$, and \item[$\bullet$] for all $n\in\omega$, $A_n$ is the interpretation of $\mathbb A_n$. \end{itemize} \end{enumerate} \begin{convention}\label{conv23} We write $\alpha^+$ for $|\alpha|^+$, and write $\langle \alpha,{\in}, (A_{n})_{n\in \omega} \rangle \models \phi$ for $$\langle \alpha,{\in}, (A_{n})_{n\in \omega} \rangle \models_{H_{\alpha^+}} \phi.$$ \end{convention} \begin{defn}[Devlin, \cite{MR683163}] Let $\kappa$ be a regular and uncountable cardinal. $\diamondsuit^\sharp_\kappa$ asserts the existence of a sequence $\vec N=\langle N_\alpha\mid\alpha<\kappa\rangle$ satisfying the following: \begin{enumerate}[(1)] \item for every infinite $\alpha<\kappa$, $N_\alpha$ is a set of cardinality $|\alpha|$ that sees $\alpha$; \item for every $X\subseteq\kappa$, there exists a club $C\subseteq\kappa$ such that, for all $\alpha\in C$, $C\cap\alpha,X\cap\alpha\in N_\alpha$; \item whenever $\langle \kappa,{\in},(A_n)_{n\in\omega}\rangle\models\phi$, with $\phi$ a $\Pi^1_2$-sentence, there are stationarily many $\alpha<\kappa$ such that $\langle \alpha,{\in},(A_n\cap(\alpha^{m(\mathbb A_n)}))_{n\in\omega}\rangle\models_{N_\alpha}\phi$. \end{enumerate} \end{defn} Consider the following variation: \begin{defn}\label{reflectingdiamond} Let $\kappa$ be a regular and uncountable cardinal, and $S\subseteq\kappa$ stationary. $\dl^*_S(\Pi^1_2)$ asserts the existence of a sequence $\vec N=\langle N_\alpha\mid\alpha\in S\rangle$ satisfying the following: \begin{enumerate}[(1)] \item for every $\alpha\in S$, $N_\alpha$ is a set of cardinality $<\kappa$ that sees $\alpha$; \item for every $X\subseteq\kappa$, there exists a club $C\subseteq\kappa$ such that, for all $\alpha\in C \cap S$, $X\cap\alpha\in N_\alpha$; \item whenever $\langle \kappa,{\in},(A_n)_{n\in\omega}\rangle\models\phi$, with $\phi$ a $\Pi^1_2$-sentence, there are stationarily many $\alpha\in S$ such that $|N_\alpha|=|\alpha|$ and $\langle \alpha,{\in},(A_n\cap(\alpha^{m(\mathbb A_n)}))_{n\in\omega}\rangle\models_{N_\alpha}\phi$. \end{enumerate} \end{defn} \begin{remark} The choice of notation for the above principle is motivated by \cite[Definition~2.10]{Sh:107} and \cite[Definition~45]{TodoVaan}. \end{remark} The goal of this section is to derive $\dl^*_S(\Pi^1_2)$ from an abstract principle which is both forceable and a consequence of $V=L[E]$, for $L[E]$ an iterable extender model with Jensen $\lambda$-indexing without a subcompact cardinal (see~\cite{MR1860606,MR2081183}). Note that this covers all $L[E]$ models that can be built so far. \begin{convention} The class of ordinals is denoted by $\ord$. The class of ordinals of cofinality $\mu$ is denoted by $\cof(\mu)$, and the class of ordinals of cofinality greater than $\mu$ is denoted by $\cof({>}\mu)$. For a set of ordinals $a$, we write $\acc(a) := \{\alpha \in a \mid \sup(a \cap \alpha) = \alpha > 0\}$. $\axiomfont{ZF}^{-}$ denotes $\axiomfont{ZF}$ without the power-set axiom. The transitive closure of a set $X$ is denoted by $\trcl(X)$, and the Mostowski collapse of a structure $\mathfrak B$ is denoted by $\clps(\mathfrak B)$. \end{convention} \begin{defn}\label{nicefiltration} Suppose $N$ is a transitive set. For a limit ordinal $\lambda$, we say that $\vec{M}=\langle M_\beta \mid \beta < \lambda \rangle $ is a \emph{nice filtration} of $N$ iff all of the following hold: \begin{enumerate}[(1)] \item $\bigcup_{\beta<\lambda}M_\beta=N$; \item $\vec M$ is $\in$-increasing, that is, $\alpha<\beta<\lambda\implies M_\alpha\in M_\beta$; \item $\vec M$ is continuous, that is, for every $\beta\in\acc(\lambda)$, $M_\beta=\bigcup_{\alpha<\beta}M_\alpha$; \item for all $\beta<\lambda$, $M_\beta$ is a transitive set with $M_\beta\cap\ord=\beta$ and $|M_{\beta}|\le|\beta|+\aleph_0$. \end{enumerate} \end{defn} \begin{convention} \label{vecM} Whenever $\lambda$ is a limit ordinal, and $\vec M=\langle M_\beta\mid\beta<\lambda\rangle$ is a $\subseteq$-increasing, continuous sequence of sets, we denote its limit $\bigcup_{\beta<\lambda}M_\beta$ by $M_\lambda$. \end{convention} \begin{defn}[Holy-Welch-Wu, \cite{HolyWuWelch}] \label{LCCupto} Let $\eta < \zeta$ be ordinals. We say that \emph{local club condensation holds in $(\eta,\zeta)$}, and denote this by $\axiomfont{LCC}(\eta,\zeta)$, iff there exist a limit ordinal $\lambda\ge\zeta$ and a sequence $\vec{M}=\langle M_\beta \mid \beta < \lambda \rangle $ such that all of the following hold: \begin{enumerate}[(1)] \item $\vec M$ is \emph{nice filtration} of $M_{\lambda}$; \item $\langle M_\lambda,{\in}\rangle \models\axiomfont{ZF}^{-}$; \item For every ordinal $\alpha$ in the open interval $(\eta,\zeta)$ and every sequence $\vec{\mathcal{F}} = \langle (F_{n},k_{n}) \mid n \in \omega \rangle$ in $M_\lambda$ such that, for all $n \in \omega$, $k_{n} \in \omega$ and $F_{n} \subseteq (M_{\alpha})^{k_{n}}$, there is a sequence $\vec{\mathfrak{B}} = \langle \mathfrak{B}_{\beta} \mid \beta < |\alpha| \rangle $ in $M_\lambda$ having the following properties: \begin{enumerate}[(a)] \item for all $\beta<|\alpha|$, $\mathfrak B_{\beta}$ is of the form $$\langle B_{\beta},{\in}, \vec{M} \restriction (B_{\beta} \cap\ord), (F_n\cap(B_\beta)^{k_n})_{n\in\omega} \rangle;$$ \item for all $\beta<|\alpha|$, $\mathfrak B_{\beta} \prec \langle M_{\alpha},{\in}, \vec{M}\restriction \alpha, (F_n)_{n\in\omega} \rangle$; \item for all $\beta<|\alpha|$, $\beta\subseteq B_\beta$ and $|B_{\beta}| < |\alpha|$; \item for all $\beta < |\alpha|$, there exists $\bar{\beta}<\lambda$ such that $$\clps(\langle B_{\beta},{\in}, \langle B_{\delta} \mid \delta \in B_{\beta}\cap\ord \rangle \rangle) = \langle M_{\bar{\beta}},{\in}, \vec M\restriction \bar{\beta} \rangle;$$ \item $\langle B_\beta\mid\beta<|\alpha|\rangle$ is $\subseteq$-increasing, continuous and converging to $M_\alpha$. \end{enumerate} \end{enumerate} For $\vec{\mathfrak{B}}$ as in Clause~(3) above we say that \emph{$\vec{\mathfrak{B}}$ witnesses $\axiomfont{LCC}$ at $\alpha$ with respect to $\vec M$ and $\vec{\mathcal{F}}$}. \end{defn} \begin{remark}\label{NotationRemark} There are first-order sentences $\psi_0(\dot{\eta},\dot{\zeta})$ and $\psi_{1}(\dot{\eta})$ in the language $\mathcal{L}^*:=\{{\in},\vec{M}, \dot{\eta}, \dot{\zeta}\}$ of set theory augmented by a predicate for a nice filtration and two ordinals such that, for all $\eta < \zeta \le \lambda$ and $\vec M=\langle M_\beta\mid\beta<\lambda\rangle$: \begin{itemize} \item[$\bullet$] $(\langle M_{\lambda},{\in}, \vec{M} \rangle \models \psi_0(\eta,\zeta)) \iff (\vec M\text{ witnesses that }\axiomfont{LCC}(\eta,\zeta)\text{ holds})$, and \item[$\bullet$] $(\langle M_{\lambda},{\in}, \vec{M} \rangle \models \psi_1(\eta)) \iff (\vec M\text{ witnesses that }\axiomfont{LCC}(\eta,\lambda)\text{ holds})$. \end{itemize} Therefore, we will later make an abuse of notation and write $\langle N,{\in}, \vec{M} \rangle \models\axiomfont{LCC}(\eta,\zeta)$ to mean that $\vec M$ is a nice filtration of $N$ witnessing that $\axiomfont{LCC}(\eta,\zeta)$ holds. \end{remark} \begin{fact}[Friedman-Holy, implicit in \cite{FHl}] \label{InaccForcing} Assume $\axiomfont{GCH}$. For every inaccessible cardinal $\kappa$, there is a set-size cofinality-preserving notion of forcing $\mathbb{P}$ such that, in $V^{\mathbb{P}}$, the three hold: \begin{enumerate}[(1)] \item $\axiomfont{GCH}$; \item there is a nice filtration $\vec{M}=\langle M_\beta\mid\beta<\kappa^+\rangle$ of $H_{\kappa^+}$ witnessing that $\axiomfont{LCC}(\omega_{1},\kappa^{+})$ holds; \item there is a $\Delta_{1}$-formula $\Theta$ and a parameter $ a \subseteq \kappa$ such that the relation $<_\Theta$ defined by ($x <_{\Theta} y$ iff $H_{\kappa^{+}} \models \Theta(x,y,a)$) is a global well-ordering of $H_{\kappa^{+}}$. \end{enumerate} \end{fact} \begin{fact}[Holy-Welch-Wu, {\cite[p.~1362 and \S4]{HolyWuWelch}}]\label{forcing} Assume $\axiomfont{GCH}$. For every regular cardinal $\kappa$, there is a set-size notion of forcing $\mathbb{P}$ which is $({<}\kappa)$-directed-closed and has the $\kappa^+{\text{-}}cc$ such that, in $V^{\mathbb P}$, the three hold: \begin{enumerate}[(1)] \item $\axiomfont{GCH}$; \item there is a nice filtration $\vec{M}=\langle M_\beta\mid\beta<\kappa^+\rangle$ of $H_{\kappa^+}$ witnessing that $\axiomfont{LCC}(\kappa,\kappa^{+})$ holds; \item there is a $\Delta_{1}$-formula $\Theta$ and a parameter $ a \subseteq \kappa$ such that the relation $<_\Theta$ defined by ($x <_{\Theta} y$ iff $H_{\kappa^{+}} \models \Theta(x,y,a)$) is a global well-ordering of $H_{\kappa^{+}}$. \end{enumerate} \end{fact} The following is a improvement of \cite[Theorem~8]{FHl}. \begin{fact}[Fernandes, \cite{OnLCC}] \label{NoSubcompact} Let $L[E]$ be an extender model with Jensen $\lambda$-indexing. Suppose that, for every $\alpha \in \ord$, the premouse $L[E] || \alpha $ is weakly iterable.\footnote{Here, $L[E]||\alpha$ stands for $\langle J_{\alpha}^{E}, \in, E\restriction \omega \alpha, E_{\omega \alpha} \rangle$, following the notation from \cite{MR1876087}. For the definition of \emph{weakly iterable}, see \cite[p.~311]{MR1876087}.} Then, for every infinite cardinal $\kappa$, the following are equivalent: \begin{enumerate}[(a)] \item $\langle L_\beta[E]\mid\beta<\kappa^{+} \rangle$ witneses that $\axiomfont{LCC}(\kappa^{+},\kappa^{++})$ holds; \item $L[E] \models``\kappa\text{ is not a subcompact cardinal}"$. \end{enumerate} In addition, for every infinite limit cardinal $\kappa$, $\langle L_\beta[E]\mid\beta<\kappa^{+} \rangle$ witnesses that $\axiomfont{LCC}(\kappa,\kappa^{+})$ holds. \end{fact} \begin{lemma}\label{obvious} Suppose that $\lambda$ is a limit ordinal and that $\vec{M} = \langle M_\beta \mid \beta< \lambda \rangle$ is a nice filtration of $H_\lambda$. Then, for every infinite cardinal $\theta\le\lambda$, $M_\theta\subseteq H_\theta$. \end{lemma} \begin{proof} Let $\theta\le\lambda$ be an infinite cardinal. By Clause~(4) of Definition~\ref{nicefiltration}, for all $\beta < \theta$, the set $M_{\beta}$ is transitive, $M_{\beta} \cap\ord = \beta$, and $|M_{\beta}| = |\beta| < \theta $. It thus follows that $M_{\theta} = \bigcup_{\beta < \theta} M_{\beta} \subseteq H_{\theta}$. \end{proof} Motivated by the property of acceptability that holds in extender models, we define the following property for nice filtrations: \begin{defn} Given a nice filtration $\vec{M} = \langle M_\beta \mid \beta< \kappa^{+} \rangle$ of $H_{\kappa^{+}}$, we say that $\vec{M}$ is \emph{eventually slow at $\kappa$} iff there exists an infinite cardinal $\mu < \kappa$ such that, for every cardinal $\theta$ with $\mu<\theta\le\kappa$, $M_{\theta} = H_{\theta}$. \end{defn} \begin{lemma}\label{MvsH} Suppose that $\vec{M}=\langle M_{\beta} \mid \beta < \kappa^{+} \rangle $ is a nice filtration of $H_{\kappa^{+}}$ that is eventually slow at $\kappa$. Then, for a tail of $\alpha < \kappa$, for every sequence $\vec{\mathcal{F}} = \langle (F_{n},k_{n}) \mid n \in \omega \rangle$ such that, for all $n \in \omega$, $k_{n} \in \omega$ and $F_{n} \subseteq (M_{\alpha^+})^{k_{n}}$, there is $\vec{\mathfrak{B}}$ that witnesses $\axiomfont{LCC}$ at $\alpha^+$ with respect to $\vec M$ and $\vec{\mathcal F}$. \end{lemma} \begin{proof} Fix an infinite cardinal $\mu < \kappa$ such that, for every cardinal $\theta$ with $\mu<\theta\le\kappa$, $M_{\theta} = H_{\theta}$. Let $\alpha \in (\mu,\kappa)$ be arbitrary. Now, given a sequence $\vec{\mathcal{F}}$ as in the statement of the lemma, build by recursion a $\subseteq$-increasing and continuous sequence $\langle\mathfrak{A}_{\gamma} \mid \gamma< \alpha^{+}\rangle$ of elementary submodels of $\langle M_{\alpha^+},{\in},\vec{M}\restriction\alpha^+, (F_n)_{n\in\omega} \rangle$, such that: \begin{itemize} \item[$\bullet$] for each $\gamma < \alpha^{+}$, $|A_{\gamma}|<\alpha^{+}$, and \item[$\bullet$] $\bigcup_{\gamma < \alpha^{+}} A_{\gamma} = H_{\alpha^{+}}$. \end{itemize} By a standard argument, $C:=\{ \gamma<\alpha^+\mid A_\gamma=M_\gamma\}$ is a club in $\alpha^+$. Let $\{ \gamma_\beta\mid\beta<\alpha^+\}$ denote the increasing enumeration of $C$. Denote $\mathcal B_\beta:=\mathcal A_{\gamma_\beta}$. Then $\vec{\mathfrak B}=\langle\mathfrak{B}_\beta \mid \beta<\alpha^+\rangle$ is an $\in$-increasing and continuous sequence of elementary submodels of $\langle M_{\alpha^{+}},{\in},\vec M\restriction\alpha^+,(F_n)_{n\in\omega}\rangle$, such that, for all $\beta < \alpha^{+}$, $\clps(\mathfrak B_{\beta}) = \langle M_{\gamma_{\beta}},{\in},\ldots\rangle$. \end{proof} In the next two lemmas we find sufficient conditions for nice filtrations $\langle M_\beta \mid \beta < \kappa^{+} \rangle $ to be eventually slow at $\kappa$. \begin{lemma}\label{MH2} Suppose that $\kappa$ is a successor cardinal and that $\vec{M}=\langle M_\beta\mid\beta<\kappa^+\rangle$ is a nice filtration of $H_{\kappa^+}$ witnessing that $\axiomfont{LCC}(\kappa,\kappa^{+})$ holds. Then $\vec{M}$ is eventually slow at $\kappa$. \end{lemma} \begin{proof} As $\kappa$ is a successor cardinal, $\vec{M}$ is eventually slow at $\kappa$ iff $M_{\kappa}=H_{\kappa}$. Thus, by Lemma~\ref{obvious}, it suffices to verify that $H_{\kappa}\subseteq M_{\kappa}$. To this end, let $x \in H_{\kappa}$, and we will find $\beta < \kappa$ such that $ x \in M_{\beta}$. Set $\theta := |\trcl\{x\}|$ and fix a witnessing bijection $f:\theta \leftrightarrow \trcl\{x\}$. As $H_{\kappa^{+}}=M_{\kappa^{+}}=\bigcup_{\alpha< \kappa^{+}} M_{\alpha}$, we may fix $\alpha < \kappa^+$ such that $\{f,\theta,\trcl\{x\}\} \subseteq M_{\alpha}$. Let $\vec{\mathfrak{B}}$ witness $\axiomfont{LCC}(\kappa,\kappa^+)$ at $\alpha$ with respect to $\vec M$ and $\vec{\mathcal{F}}:=\langle (f,2) \rangle$. Let $\beta<\kappa^+$ be such that $\clps(\mathfrak B_{\theta+1})=\langle M_{\beta},{\in},\ldots\rangle$. \begin{claim} $\theta<\beta<\kappa$. \end{claim} \begin{proof} By Definition~\ref{LCCupto}(3)(c), $\theta+1\subseteq B_{\theta+1}$, so that, $\theta<\beta$. By Clause~(4) of Definition~\ref{nicefiltration} and by Definition~\ref{LCCupto}(3)(c), $|\beta|=|M_\beta|=|B_{\theta+1}|<|\alpha|\le\kappa$. \end{proof} Now, as $$\mathfrak B_{\theta+1}\prec \langle H_{\kappa^{+}},{\in}, \vec{M},F_0 \rangle \models \exists y(\forall\alpha\forall\delta(F_{0}(\alpha,\delta) \leftrightarrow (\alpha,\delta) \in y)),$$ we have $f\in B_{\theta+1}$. Since $\dom(f)\subseteq\ B_{\theta+1}$, $\rng(f)\subseteq B_{\theta+1}$. But $\rng(f)=\trcl(\{x\})$ is a transitive set, so that the Mostowski collapsing map $\pi:B_{\theta+1}\rightarrow M_\beta$ is the identity over $\trcl(\{x\})$, meaning that $x\in\trcl(\{x\}) \subseteq M_{\beta}$. \end{proof} \begin{lemma}\label{slow} Suppose that $\kappa$ is an inaccessible cardinal, $\mu < \kappa$ and $\vec{M}=\langle M_\beta\mid\beta<\kappa^+\rangle$ witnesses that $\axiomfont{LCC}(\mu,\kappa^{+})$ holds. Then $\mu$ witnesses that $\vec{M}$ is eventually slow at $\kappa$. \end{lemma} \begin{proof} Suppose not. It follows from Lemma~\ref{obvious} that we may fix an infinite cardinal $\theta$ with $\mu\le\theta<\kappa$ along with $x \in H_{\theta^{+}} \setminus M_{\theta^{+}}$. Fix a surjection $f:\theta\rightarrow\trcl(\{x\})$. Let $\alpha < \kappa^{+}$ be the least ordinal such that $x \in M_{\alpha}$, so that $\mu<\theta^+<\alpha<\kappa^+$. Let $\vec{\mathfrak{B}}$ witness $\axiomfont{LCC}(\mu,\kappa^+)$ at $\alpha$ with respect to $\vec M$ and $\vec{\mathcal{F}}:=\langle (f,2) \rangle$. Let $\beta<\kappa^+$ be such that $\clps(\mathfrak B_{\theta+1})=\langle M_{\beta},{\in},\ldots\rangle$. \begin{claim} $\beta<\alpha$. \end{claim} \begin{proof} By Clause~(4) of Definition~\ref{nicefiltration} and by Definition~\ref{LCCupto}(3)(c), $|\beta|=|M_\beta|=|B_{\theta+1}|<|\alpha|$. and hence $\beta<\alpha$. \end{proof} By the same argument used in the proof of Lemma~\ref{MH2}, $x \in M_{\beta}$, contradicting the minimality of $\alpha$. \end{proof} \begin{question} Notice that if $\kappa$ is an inaccessible cardinal and $\vec{M}=\langle M_{\beta} \mid \beta < \kappa^{+} \rangle $ is such that $\langle H_{\kappa^{+}}, \in, \vec{M} \rangle \models \axiomfont{LCC}(\kappa,\kappa^{+})$, then, for club many $\beta < \kappa$, $M_{\beta}=H_{\beta}$. We ask: is it consistent that $\kappa$ is an inaccessible cardinal, $\vec{M}=\langle M_{\beta} \mid \beta < \kappa^{+} \rangle $ is such that $\langle H_{\kappa^{+}},{\in}, \vec{M} \rangle \models \axiomfont{LCC}(\kappa,\kappa^{+})$, yet, for stationarily many $\beta < \kappa$, $M_{\beta^{+}} \subsetneq H_{\beta^{+}}$? \end{question} \begin{lemma} \label{HvecM1} Suppose that $\vec{M}=\langle M_\beta\mid\beta<\kappa^+\rangle$ is a nice filtration of $H_{\kappa^+}$. Given a sequence $\vec{\mathcal{F}} = \langle (F_{n},k_{n}) \mid n \in \omega \rangle$ such that, for all $n \in \omega$, $k_{n} \in \omega$ and $F_{n} \subseteq (H_{\kappa^+})^{k_{n}}$, there are club many $\delta<\kappa^+$ such that $\langle M_{\delta},{\in}, \vec{M}\restriction \delta, (F_n\cap(M_\delta)^{k_n})_{n\in\omega} \rangle \prec \langle M_{\kappa^+}, {\in}, \vec{M}, (F_n)_{n\in\omega}\rangle $. \end{lemma} \begin{proof} Build by recursion an $\in$-increasing continuous sequence $\vec{\mathfrak B}=\langle\mathfrak{B}_{\beta} \mid \beta < \kappa^{+}\rangle$ of elementary submodels of $\langle M_{\kappa^+},{\in},\vec{M}, (F_n)_{n\in\omega} \rangle$, such that: \begin{itemize} \item[$\bullet$] for each $\beta < \kappa^{+}$, $|B_{\beta}|<\kappa^{+}$, and \item[$\bullet$] $\bigcup_{\beta < \kappa^{+}} B_{\beta} = H_{\kappa^{+}}$. \end{itemize} By a standard back-and-forth argument, utilizing the continuity of $\vec{\mathfrak B}$ and $\vec M$, $\{ \delta<\kappa^+\mid B_\delta=M_\delta\}$ is a club in $\kappa^+$. \end{proof} \begin{defn}\label{formallcc} Suppose $\vec{M}=\langle M_{\beta} \mid \beta < \lambda \rangle $ is a nice filtration of $M_{\lambda}$ for some limit ordinal $\lambda>0$. Given $\alpha < \lambda$ and $\vec{\mathcal F}=\langle (F_{n},k_{n} ) \mid n \in \omega \rangle$ in $M_{\lambda}$ such that, for each $n \in \omega$, $k_n\in\omega$ and $F_{n} \subseteq(M_{\alpha})^{k_{n}}$, for every sequence $\vec{\mathfrak{B}} = \langle \mathfrak{B}_{\beta} \mid \beta < |\alpha| \rangle $ in $M_\lambda$ and every letter $l\in\{a,b,c,d,e\}$, we let $\psi_l(\vec{\mathcal B},\vec{\mathcal{F}},\alpha,\vec{M}\restriction(\alpha+1))$ be some formula expressing that Clause~(3)(l) of Definition~\ref{LCCupto} holds. \end{defn} The following forms the main result of this section. \begin{thm}\label{diamond_from_lcc} Suppose that $\kappa$ is a regular uncountable cardinal, and $\vec{M}=\langle M_\beta\mid\beta<\kappa^+\rangle$ is a nice filtration of $H_{\kappa^+}$ that is eventually slow at $\kappa$, and witnesses that $\axiomfont{LCC}(\kappa,\kappa^+)$ holds. Suppose further that there is a subset $ a\subseteq\kappa$ and a formula $ \Theta \in \Sigma_{\omega}$ which defines a well-order $<_\Theta$ in $H_{\kappa^{+}}$ via $ x <_\Theta y $ iff $ H_{\kappa^{+}} \models \Theta(x,y,a)$. Then, for every stationary $ S \subseteq \kappa$, $\dl^*_S(\Pi^{1}_{2})$ holds. \end{thm} \begin{proof} Let $S'\subseteq\kappa$ be stationary. We shall prove that $\dl^*_{S'}(\Pi^{1}_{2})$ holds by adjusting Devlin's proof of Fact~\ref{devlinsthm}. As a first step, we identify a subset $S$ of $S'$ of interest. \begin{claim} There exists a stationary non-ineffable subset $S\subseteq S'\setminus\omega$ such that, for every $\alpha\in S'\setminus S$, $|H_{\alpha^+}|<\kappa$. \end{claim} \begin{proof} If $S'$ is non-ineffable, then let $S:=S'\setminus\omega$, so that $H_{\alpha^+}=H_\omega$ for all $\alpha\in S'\setminus S$. From now on, suppose that $S'$ is ineffable. In particular, $\kappa$ is strongly inaccessible and $|H_{\alpha^+}|<\kappa$ for every $\alpha<\kappa$. Let $S:=S'\setminus(\omega\cup T)$, where $$T:=\{\alpha\in\kappa\cap\cof({>}\omega)\mid S'\cap\alpha\text{ is stationary in }\alpha\}.$$ To see that $S$ is stationary, let $E$ be an arbitrary club in $\kappa$. $\blacktriangleright$ If $S'\cap\cof(\omega)$ is stationary, then since $S'\cap\cof(\omega)\subseteq S$, we infer that $S\cap E\neq\emptyset$. $\blacktriangleright$ If $S'\cap\cof(\omega)$ is non-stationary, then fix a club $C\subseteq E$ disjoint from $S'\cap\cof(\omega)$, and let $\alpha:=\min(\acc(C)\cap S')$. Then $\cf(\alpha)>\omega$ and $C\cap\alpha$ is a club in $\alpha$ disjoint from $S'$, so that $\alpha\notin T$. Altogether, $\alpha\in S\cap E$. To see that $S$ is non-ineffable, we define a sequence $\langle Z_\alpha\mid\alpha\in S\rangle$, as follows. For every $\alpha\in S$, fix a closed and cofinal subset $Z_\alpha$ of $\alpha$ with $\otp(Z_\alpha)=\cf(\alpha)$ such that, if $\cf(\alpha)>\omega$, then the club $Z_\alpha$ is disjoint from $S'\cap\alpha$. Towards a contradiction, suppose that $Z\subseteq\kappa$ is a set for which $\{\alpha\in S\mid Z\cap\alpha=Z_\alpha\}$ is stationary. Clearly, $Z$ is closed and cofinal in $\kappa$, so that $Z\cap S'$ is stationary, $\otp(Z\cap S')=\kappa$ and hence $D:=\{\alpha<\kappa \mid \otp(Z\cap S'\cap\alpha)=\alpha>\omega\}$ is a club. Pick $\alpha\in D\cap S$ such that $Z\cap\alpha=Z_\alpha$. As $$\cf(\alpha)=\otp(Z_\alpha)=\otp(Z\cap\alpha)\ge\otp(Z\cap S'\cap\alpha)=\alpha>\omega,$$ it must be the case that $Z_\alpha$ is a club disjoint from $S'\cap\alpha$, while $Z_\alpha=Z\cap\alpha$ and $Z\cap S'\cap\alpha\neq\emptyset$. This is a contradiction. \end{proof} Let $S$ be given by the preceding claim. We shall focus on constructing a sequence $\langle N_{\alpha} \mid \alpha \in S \rangle $ witnessing $\dl^*_{S}(\Pi^{1}_{2})$ such that, in addition, $|N_\alpha|=|\alpha|$ for every $\alpha\in S$. It will then immediately follow that the sequence $\langle N'_\alpha\mid\alpha\in S'\rangle$ defined by letting $N_\alpha':=N_\alpha$ for $\alpha\in S$, and $N'_\alpha:=H_{\alpha^+}$ for $\alpha\in S'\setminus S$ will witness the validity of $\dl^*_{S'}(\Pi^{1}_{2})$. As $\vec M$ is eventually slow at $\kappa$, we may also assume that, for every $\alpha\in S$, $M_{\alpha^{+}}=H_{\alpha^{+}}$ and the conclusion of Lemma~\ref{MvsH} holds true.\footnote{For all the small $\alpha\in S'\setminus S$ such that $M_{\alpha^+}\neq H_{\alpha^+}$, simply let $N'_\alpha:=N_{\min(S)}$.} If $\kappa$ is a successor cardinal, we may moreover assume that, for every $\alpha\in S$, $M_{\alpha^+}=H_\kappa$. Here we go. As $S$ is non-ineffable, fix a sequence $\vec{Z} = \langle Z_{\alpha} \mid \alpha \in S \rangle $ with $Z_\alpha\subseteq\alpha$ for all $\alpha\in S$, such that, for every $Z\subseteq\kappa$, $\{\alpha\in S\mid Z\cap\alpha=Z_\alpha\}$ is nonstationary. In the course of the rest of the proof, we shall occasionally take witnesses to $\axiomfont{LCC}$ at some ordinal $\alpha$ with respect to $\vec M$ and a finite sequence $\vec{\mathcal F}=\langle (F_n,k_n)\mid n\in 4\rangle$; for this, we introduce the following piece of notation for any positive $m<\omega$, $X\subseteq(\kappa^+)^m$ and $\alpha<\kappa^+$: $$\vec{\mathcal F}_{X,\alpha}:=\langle (X\cap\alpha^m,m),(a\cap\alpha,1),(S\cap\alpha,1),(\vec Z\restriction\alpha,2)\rangle.$$ Next, for each $\alpha \in S$, we define $S_{\alpha}$ to be the set of all $\beta \in \alpha^{+}$ satisfying the following list of conditions: \begin{enumerate}[(i)] \item $\langle M_{\beta},{\in}, \vec{M} \restriction \beta \rangle \models \axiomfont{LCC}(\alpha,\beta)$,\footnote{Note that $\beta$ is not needed to define $\axiomfont{LCC}(\alpha,\beta)$ in the structure $\langle M_{\beta},{\in}, \vec{M} \restriction \beta \rangle$. Indeed, by $\axiomfont{LCC}(\alpha,\beta)$ we mean $\psi_{1}(\alpha)$ as in Remark~\ref{NotationRemark}.} \item $\langle M_{\beta},{\in}\rangle\models \axiomfont{ZF}^{-} ~ \& ~ \alpha \text{ is the largest cardinal}$,\footnote{In particular, $\langle M_{\beta},{\in}\rangle\models\alpha\text{ is uncountable}$.} \item $\langle M_{\beta},{\in}\rangle\models \alpha\text{ is regular}\ \&\ S \cap \alpha ~ \text{is stationary}$, \item $\langle M_{\beta},{\in}\rangle\models \Theta(x,y,a\cap \alpha) ~ \text{defines a global well-order}$, \item $ \vec{Z} \restriction (\alpha + 1) \notin M_{\beta}$. \end{enumerate} Then, we consider the set $$D := \{ \alpha \in S \mid S_{\alpha} \neq \emptyset\ \& \ S_{\alpha} \text{ has no largest element} \}.$$ Define a function $f:S\rightarrow\kappa$ as follow. For every $\alpha \in D $, let $f(\alpha) := \sup(S_{\alpha})$; for every $\alpha\in S\setminus D$, let $f(\alpha)$ be the least $\beta< \kappa$ such that $M_{\beta}$ sees $\alpha$, and $\vec{Z} \restriction ( \alpha+1 ) \in M_{\beta}$. \begin{claim} \label{welldefined} $f$ is well-defined. Furthermore, for all $\alpha\in S $, $\alpha<f(\alpha) < \alpha^+$. \end{claim} \begin{proof} Let $\alpha\in S$ be arbitrary. The analysis splits into two cases: $\blacktriangleright$ Suppose $\alpha\in D$. As $\alpha \in S $, we have $ \bigcup_{\beta < \alpha^{+}} M_{\beta} = M_{\alpha^{+}}=H_{\alpha^{+}}$, and hence we may find some $\beta<\alpha^{+}$ such that $\vec{Z}\restriction(\alpha+1) \in M_{\beta}$. Then, condition~(v) in the definition of $ S_{\alpha}$ implies that $\alpha<f(\alpha)\le\beta<\alpha^+$. $\blacktriangleright$ Suppose $\alpha\notin D$. As $\alpha\in S$, let us fix $\langle \mathfrak{B}_{\beta} \mid \beta < \alpha^+ \rangle $ that witnesses $\axiomfont{LCC}$ at $\alpha^+$ with respect to $\vec M$ and $\vec{\mathcal F}_{\emptyset,\alpha^+}$. Set $\beta:=\alpha+2$ and fix ${\bar\beta}<\kappa^+$ such that $\clps(\mathcal B_\beta)=\langle M_{\bar\beta},\ldots\rangle$. As $\beta\subseteq B_\beta$ and $|B_\beta|<\alpha^+$, by Clause~(4) of Definition~\ref{nicefiltration}, $\beta\le{\bar\beta}<\alpha^+$. In addition, $\vec{Z} \restriction ( \alpha+1 ) \in M_{{\bar\beta}}$ and there exists an elementary embedding from $\langle M_{{\bar\beta}},{\in}\rangle$ to $\langle H_{\alpha^{+}},{\in}\rangle$, so that $M_{\bar\beta}$ sees $\alpha$. Altogether, $\alpha<f(\alpha)\le{\bar\beta}<\alpha^+$. \end{proof} Define $\vec{N}= \langle N_{\alpha} \mid \alpha \in S \rangle $ by letting $N_{\alpha} := M_{f(\alpha)}$ for all $\alpha\in S$. It follows from Definition~\ref{nicefiltration}(4) and the preceding claim that $|N_\alpha|=|\alpha|$ for all $\alpha\in S$. \begin{claim}\label{claim2163} Let $X\subseteq\kappa$. Then there exists a club $C\subseteq\kappa$ such that, for all $\alpha\in C\cap S$, $X\cap\alpha \in N_\alpha$. \end{claim} \begin{proof} By Lemma~\ref{HvecM1}, we now fix $\delta < \kappa^{+}$ such that $\kappa,S,a \in M_{\delta} $ and $\langle M_{\delta},{\in},\vec M\restriction\delta\rangle \prec \langle M_{\kappa^{+}},{\in}, \vec{M}\rangle$. Note that $|\delta|=\kappa$. Let $\vec{\mathfrak B}=\langle\mathfrak B_\alpha\mid\alpha<\kappa\rangle$ witness $\axiomfont{LCC}$ at $\delta$ with respect to $\vec M$ and $\vec{\mathcal{F}}_{X,\kappa}$. \begin{subclaim} $C:= \{ \alpha < \kappa \mid B_{\alpha} \cap \kappa = \alpha \}$ is a club in $\kappa$. \end{subclaim} \begin{proof} To see that $C$ is closed in $\kappa$, fix an arbitrary $\alpha<\kappa$ with $\sup(C \cap \alpha)= \alpha >0$. As $\langle B_\beta\mid\beta<\kappa\rangle$ is $\subseteq$-increasing and continuous, we have $$ \alpha = \bigcup_{\beta \in (C\cap \alpha)} \beta = \bigcup_{\beta \in (C \cap \alpha)} (B_{\beta}\cap \kappa) = \bigcup_{\beta < \alpha} (B_{\beta} \cap \kappa) = B_{\alpha} \cap \kappa.$$ To see that $C$ is unbounded in $\kappa$, fix an arbitrary $\varepsilon<\kappa$, and we shall find $\alpha\in C$ above $\varepsilon$. Recall that, by Clause~(3)(c) of Definition~\ref{LCCupto}, for each $\beta<\kappa$, $\beta\subseteq B_\beta$ and $|B_\beta|<\kappa$. It follows that we may recursively construct an increasing sequence of ordinals $ \langle \alpha_{n} \mid n < \omega \rangle $ such that: \begin{itemize} \item[$\bullet$] $\alpha_0:=\sup(B_{\varepsilon} \cap \kappa)$, and, for all $n<\omega$: \item[$\bullet$] $\sup(B_{\alpha_n} \cap \kappa)<\alpha_{n+1}<\kappa$. \end{itemize} In particular, $\sup(B_{\alpha_{n}} \cap \kappa ) \in \alpha_{n+1}$ for all $n<\omega$. Consequently, for $\alpha:=\sup_{n<\omega}\alpha_{n}$, we have that $\alpha<\kappa$, and $$ B_{\alpha} \cap \kappa = \bigcup_{n <\omega} (B_{\alpha_{n}} \cap \kappa) \leq \bigcup_{n<\omega} \alpha_{n+1} \leq \bigcup_{n <\omega} (B_{\alpha_{n+2}} \cap \kappa) = \alpha,$$ so that $\alpha\in C\setminus(\varepsilon+1)$. \end{proof} To see that the club $C$ is as sought, let $\alpha \in C\cap S$ be arbitrary, and we shall verify that $X\cap\alpha\in N_\alpha$. Let $\beta(\alpha)$ be such that $\clps(\mathfrak B_\alpha)=\langle M_{\beta(\alpha)},{\in},\ldots\rangle$, and let $j_{\alpha}:M_{\beta(\alpha)} \rightarrow B_{\alpha}$ denote the inverse of the collapsing map. As $\alpha\in C$, $j_\alpha(\alpha)=\kappa$, and $j^{-1}_{\alpha}(Y) = Y \cap \alpha$ for all $Y \in B_{\alpha} \cap \mathcal{P}(\kappa)$. \begin{subclaim}\label{nsclaim} For every $\beta<\kappa^+$ such that $\vec Z\restriction(\alpha+1)\in M_\beta$, $\beta>\beta(\alpha)$. \end{subclaim} \begin{proof} Suppose not, so that $\vec{Z} \restriction (\alpha+1) \in M_{\beta(\alpha)} $. As $\langle M_{\delta}, {\in} \rangle \prec \langle M_{\kappa^{+}}, {\in} \rangle $, we infer that \[ \langle M_{\delta},{\in}\rangle\models \forall Z \subseteq \kappa ~ \exists E \text{ club in } \kappa \ (\forall \gamma \in E \cap S \rightarrow Z\cap \gamma \neq Z_{\gamma}),\] and hence \[ \langle M_{\beta(\alpha)},{\in}\rangle\models \forall Z \subseteq \alpha ~ \exists E \text{ club in } \alpha \ (\forall \gamma \in E \cap S \rightarrow Z\cap \gamma \neq Z_{\gamma}).\] In particular, using $ Z := Z_{\alpha}$, we find some $E$ such that \[ \langle M_{\beta(\alpha)},{\in}\rangle\models (E \text{ is a club in } \alpha)\land (\forall \gamma \in E \cap S \rightarrow Z_{\alpha} \cap \gamma \neq Z_{\gamma}).\] Pushing forward with $ E^* := j_{\alpha}(E)$ and $Z^{*}:= j_{\alpha}(Z_{\alpha})$, we infer that \[ \langle M_{\delta},{\in}\rangle \models (E^* \text{ is a club in } \kappa) \land (\forall \gamma \in E^* \cap S \rightarrow Z^{*} \cap \gamma \neq Z_{\gamma}).\] Then $Z^{*}\cap \alpha = j_{\alpha}(Z_{\alpha}) \cap \alpha = Z_{\alpha}$, and hence $\alpha\notin E^*$ (recall that $\alpha\in S$). Likewise $E^*\cap\alpha=j_\alpha(E)\cap\alpha=E$, and hence $\alpha\in\acc(E^*)\subseteq E^*$. This is a contradiction. \end{proof} Now, since $\vec{\mathfrak B}$ witnesses $\axiomfont{LCC}$ at $\delta$ with respect to $\vec M$ and $\vec{\mathcal{F}}_{X,\kappa}$, for each $Y$ in $\{X,a,S\}$, we have that $$\langle B_{\alpha},{\in},Y\cap B_\alpha \rangle \prec \langle M_{\kappa^{+}},{\in}, Y \rangle \models \exists y\forall z ((z \in y)\leftrightarrow (z\in\kappa \land Y(z))),$$ therefore each of $X,a,S$ is a definable element of $\mathfrak B_{\alpha}$. So, as, for all $Y \in B_{\alpha} \cap \mathcal{P}(\kappa)$, $j^{-1}_{\alpha}(Y) = Y \cap \alpha$, we infer that $X\cap\alpha$, $a\cap \alpha$, and $S \cap \alpha$ are all in $M_{\beta(\alpha)}$. We will show that $\beta(\alpha) < f(\alpha)$, from which it will follow that $X \cap \alpha \in N_{\alpha}$. \begin{subclaim}\label{sc61632} $\beta(\alpha) < f(\alpha)$. \end{subclaim} \begin{proof} Naturally, the analysis splits into two cases: $\blacktriangleright$ Suppose $\alpha \notin D$. By definition of $f(\alpha)$ and by Subclaim~\ref{nsclaim}, $\beta(\alpha) < f(\alpha)$. $\blacktriangleright$ Suppose $\alpha \in D$. As $\mathfrak B_\alpha\prec \langle M_{\delta},{\in}, \vec{M}\restriction\delta,X,a,S,\vec Z\rangle $ and $\rng(j_\alpha)=B_\alpha$, we infer that $j_{\alpha}:M_{\beta(\alpha)}\rightarrow M_\delta$ forms an elementary embedding from $\langle M_{\beta(\alpha)},{\in},\ldots\rangle$ to $\langle M_{\delta},{\in}, \vec{M}\restriction\delta,X,a,S,\vec Z\rangle $ with $j_{\alpha}(\alpha)=\kappa$. As $\kappa,S,a\in M_{\delta}$ and $ \langle M_{\delta}, {\in}, M \restriction \delta \rangle \prec \langle M_{\kappa}, {\in}, \vec{M} \rangle$, we have: \begin{enumerate}[(I)] \item $\langle M_{\delta},{\in}, \vec{M} \restriction \delta \rangle \models \axiomfont{LCC}(\kappa,\delta) $, \item $\langle M_{\delta},{\in}\rangle\models \axiomfont{ZF}^{-} ~ \& ~ \kappa \text{ is the largest cardinal}$, \item $\langle M_{\delta},{\in}\rangle\models \kappa\text{ is regular}\ \&\ S \cap \kappa \text{ is stationary}$, \item $\langle M_{\delta},{\in}\rangle\models \Theta(x,y,a\cap \kappa) ~ \text{defines a global well-order}$. \end{enumerate} It now follows that $\beta(\alpha)$ satisfies clauses (i),(ii),(iii) and (iv) of the definition of $S_\alpha$. Together with Subclaim~\ref{nsclaim}, then, $\beta(\alpha) \in S_{\alpha}$. So, by definitions of $f$ and $D$, $\beta(\alpha)<f(\alpha)$. \end{proof} This completes the proof of Claim~\ref{claim2163}. \end{proof} We are left with addressing Clause~(3) of Definition~\ref{reflectingdiamond}. \begin{claim}\label{claim(3)} The sequence $\langle N_\alpha\mid\alpha\in S\rangle$ reflects $\Pi^{1}_{2} $-sentences. \end{claim} \begin{proof} We need to show that whenever $\langle \kappa,{\in},(A_n)_{n\in\omega}\rangle\models\phi$, with $\phi=\forall X\exists Y\varphi$ a $\Pi^1_2$-sentence, for every club $E\subseteq\kappa$, there is $\alpha\in E\cap S$, such that $$\langle \alpha,{\in},(A_n\cap(\alpha^{m(\mathbb A_n)}))_{n\in\omega}\rangle\models_{N_{\alpha}}\phi.$$ But by adding $E$ to the list $(A_n)_{n\in\omega}$ of predicates, and by slightly extending the first-order formula $\varphi$ to also assert that $E$ is unbounded, we would get that any ordinal $\alpha$ satisfying the above will also satisfy that $\alpha$ is an accumulation point of the closed set $E$, so that $\alpha\in E$. It follows that if any $\Pi^1_2$-sentence valid in a structure of the form $\langle \kappa,{\in},(A_n)_{n\in\omega}\rangle$ reflects to some ordinal $\alpha'\in S$, then any $\Pi^1_2$-sentence valid in a structure of the form $\langle \kappa,{\in},(A_n)_{n\in\omega}\rangle$ reflects stationarily often in $S$. Consider a $\Pi^1_2$-formula $\forall X\exists Y\varphi$, with integers $p,q$ such that $X$ is a $p$-ary second-order variable and $Y$ is a $q$-ary second-order variable. Suppose $\vec A=(A_n)_{n\in\omega}$ is a sequence of finitary predicates on $\kappa$, and $\langle\kappa,{\in},\vec A\rangle\models \forall X\exists Y \varphi$. By the reduction established in the proof of Proposition~\ref{Prop2.4} below, we may assume that $\vec A$ consists of a single predicate $A_0$ of arity, say, $m_0$. Recalling Convention~\ref{conv23} and since $M_{\kappa^+}=H_{\kappa^+}$, this altogether means that $$\langle\kappa,{\in},A_0\rangle\models_{M_{\kappa^+}} \forall X\exists Y \varphi.$$ Let $\gamma$ be the least ordinal such that $\vec{Z},A_0,S\in M_\gamma$. Note that $\kappa<\gamma<\kappa^+$. Let $\Delta$ denote the set of all $\delta \le \kappa^{+}$ such that: \begin{enumerate}[(a)] \item $\langle M_{\delta},{\in}, \vec{M}\restriction \delta \rangle \models \axiomfont{LCC}(\kappa,\delta)$,\footnote{In particular, $\delta>\kappa$.} \item $\langle M_{\delta},{\in}\rangle\models \axiomfont{ZF}^{-} \ \&\ \kappa ~ \text{is the largest cardinal}$, \item $\langle M_{\delta},{\in}\rangle\models \kappa\text{ is regular}\ \&\ S \text{ is stationary in } \kappa$, \item $\langle M_{\delta},{\in}\rangle\models \Theta(x,y,a) ~ \text{defines a global well-order}$, \item $\langle\kappa,{\in},A_0\rangle\models_{M_{\delta}} \forall X\exists Y \varphi$, \item $\langle M_{\delta},{\in}\rangle\models \vec{Z} ~ \text{witness that} ~ S ~ \text{is not ineffable}$, and \item $\delta>\gamma$. \end{enumerate} As $\kappa^{+} \in \Delta$, it follows from Lemma~\ref{HvecM1} and elementarity that $\otp(\Delta\cap\kappa^+)=\kappa^+$. Let $\{\delta_n\mid n<\omega\}$ denote the increasing enumeration of the first $\omega$ many elements of $\Delta$. \begin{subdefn} Let $T(\vec{M},\kappa,S,a,A_0,\vec{Z},\gamma)$ denote the theory consisting of the following axioms: \begin{enumerate}[(A)] \item $\vec{M}$ witness $\axiomfont{LCC}(\kappa,\kappa^{+})$, \item $\axiomfont{ZF}^{-} \ \&\ \kappa ~ \text{is the largest cardinal}$, \item $\kappa\text{ is regular}\ \&\ S \text{ is stationary in } \kappa$, \item $\Theta(x,y, a) ~ \text{defines a global well-order}$, \item $\langle \kappa,{\in}, A_0\rangle\models \forall X\exists Y \varphi$, \item $\vec{Z}\text{ witness that } S \text{ is not ineffable}$, \item $\gamma$ is the least ordinal such that $ \{\vec{Z},A_0, S \}\in \vec{M}(\gamma) $. \end{enumerate} \end{subdefn} Let $n<\omega$. Since $M_{\delta_n}$ is transitive, standard facts (cf.~\cite[Chapter~3, \S5]{drake}) yield the existence of a formula $\Psi$ in the language $\{\dot{\vec{M}},\in\}$ which is $\Delta_{1}^{\axiomfont{ZF}^{-}}$, and for all $\delta\in(\gamma,\delta_n)$, \begin{equation}\tag{$\star_1$} \begin{array}{c} \label{Psi} \langle M_{\delta},{\in}, \vec{M}\restriction \delta \rangle \models T(\vec M \restriction\delta, \kappa,S,a,A_0,\vec{Z},\gamma) \\\iff\\ \Psi(\vec M \restriction\delta, \kappa,S,a,A_0,\vec{Z},\gamma) \\\iff\\ \langle M_{\delta_n},{\in},\vec{M}\restriction \delta_n\rangle\models \Psi(\vec M \restriction\delta, \kappa,S,a,A_0,\vec{Z},\gamma). \end{array} \end{equation} Since $\{\delta_k\mid k<\omega\}$ enumerates the first $\omega$ many elements of $\Delta$, $M_{\delta_{n}}$ believes that there are exactly $ n$ ordinals $\delta$ such that Clauses (a)--(g) hold for $M_{\delta}$. In fact, \begin{equation}\label{deltas}\tag{$\star_2$} \langle M_{\delta_{n}},{\in}, \vec{M} \restriction\delta_{n} \rangle \models \{\delta \mid \Psi(\vec M \restriction\delta, \kappa,S,a,A_0, \vec{Z},\gamma) \} = \{\delta_{k} \mid k <n \}. \end{equation} Next, for every $ n < \omega $, as $\langle M_{\delta_{n+1}},{\in}\rangle\models |\delta_{n}|=\kappa$, we may fix in $M_{\delta_{n+1}}$ a sequence $\vec{\mathfrak{B}_{n}}= \langle \mathcal B_{n,\alpha} \mid \alpha < \kappa \rangle $ witnessing $\axiomfont{LCC}$ at $\delta_n$ with respect to $\vec{M}\restriction \delta_{n+1}$ and $\vec{\mathcal F}_{A_0,\kappa}$ such that, moreover, $$\langle M_{\delta_{n+1}},{\in}, \vec{M}\restriction \delta_{n+1}\rangle \models ``\vec{\mathfrak{B}_{n}} \text{ is the } {<_\Theta}\text{-least such witness}".\footnote{Recalling Definition~\ref{formallcc}, this means that $\langle M_{\delta_{n+1}},{\in}, \vec{M}\restriction \delta_{n+1}\rangle \models ``\vec{\mathfrak{B}_{n}} \text{ is the } {<_\Theta}\text{-least }\vec{\mathcal{B}}\text{ such that }(\psi_{a} \wedge \psi_{b} \wedge \psi_{c} \wedge \psi_{d} \wedge \psi_{e})(\vec{\mathcal{B}},\vec{\mathcal{F}}_{A_0,\kappa},\delta_n,\vec{M}\restriction(\delta_n+1))"$.}$$ For every $n<\omega$, consider the club $ C_{n}: = \{ \alpha < \kappa \mid B_{n,\alpha} \cap \kappa = \alpha\}$, and then let $$\alpha':=\min ((\bigcap\nolimits_{n\in \omega} C_{n}) \cap S).$$ For every $n<\omega$, let $\beta_n $ be such that $\clps(\mathfrak B_{n,\alpha'})=\langle M_{\beta_n},{\in},\ldots\rangle$, and let $j_{n}:M_{\beta_{n}} \rightarrow B_{n,\alpha'} $ denote the inverse of the Mostowski collapse. \begin{subclaim} Let $n \in \omega$. Then $j_{n}^{-1}(\gamma) = j_{0}^{-1}(\gamma)$. \end{subclaim} \begin{proof} Since $j^{-1}_{n}(\vec Z) = \vec Z \restriction \alpha'$, $j^{-1}_{n}(A_0) = A_0 \cap (\alpha')^{m_0}$ and $ j^{-1}_{n}(S) = S \cap \alpha'$, it follows from $$\langle M_{\delta_{n}}, {\in} , \vec{M} \restriction \delta_{n} \rangle \models \gamma \text{ is the least ordinal with } \{ \vec{Z}, A_0, S \} \subseteq M_{\gamma},$$ that $$\langle M_{\beta_{n}},{\in}, \vec{M} \restriction \beta_{n} \rangle \models j^{-1}_{n}(\gamma) \text{ is the least ordinal with } \{ \vec{Z}\restriction \alpha', A_0\cap (\alpha')^{m_0}, S \cap \alpha' \} \subseteq M_{\gamma}.$$ Now, let $\bar{\gamma}$ be such that $$\langle M_{\beta_{0}},{\in}, \vec{M} \restriction \beta_0 \rangle \models \bar{\gamma} \text{ is the least ordinal such that } \{ \vec{Z}\restriction \alpha', A_0\cap (\alpha')^{m_0}, S\cap \alpha' \} \subseteq M_{\bar{\gamma}}. $$ Since $\vec{M}$ is continuous, it follows that $\bar{\gamma}$ is a successor ordinal, that is, $\bar{\gamma}=\sup(\bar\gamma)+1$. So $\langle M_{\beta_{0}},{\in}, \vec{M} \restriction \beta_0 \rangle $ satisfies the conjunction of the two: \begin{itemize} \item[$\bullet$] $\{ \vec{Z}\restriction \alpha', A_0\cap (\alpha')^{m_0}, S\cap \alpha' \} \subseteq M_{\bar{\gamma}}$, and \item[$\bullet$] $\{ \vec{Z}\restriction \alpha', A_0\cap (\alpha')^{m_0}, S\cap \alpha' \} \not\subseteq M_{\sup(\bar\gamma)}$. \end{itemize} But the two are $\Delta_{0}$-formulas in the parameters $\vec{Z}\restriction \alpha', A_0\cap (\alpha')^{m_0}, S\cap \alpha' ,M_{\bar\gamma}$ and $M_{\sup(\bar{\gamma})}$, which are all elements of $M_{\beta_0}$. Therefore, $$ \langle M_{\beta_{n}},{\in}, \vec{M} \restriction \beta_n \rangle \models \bar{\gamma} \text{ is the least ordinal such that } \{ \vec{Z}\restriction \alpha', A_0\cap (\alpha')^{m_0}, S\cap \alpha' \} \subseteq M_{\gamma} ,$$ so that $j^{-1}_{n}(\gamma) = \bar{\gamma}= j^{-1}_0(\gamma)$. \end{proof} Denote $ \bar{\gamma}:=j^{-1}_0(\gamma)$. Let $\Psi$ be the same formula used in statement~\eqref{Psi}. For all $n < \omega$ and $\bar\beta\in(\bar\gamma,\beta_n)$, setting $\beta:=j_n(\bar{\beta})$, by elementarity of $j_n$: \begin{equation} \label{PsiBeta}\tag{$\star_3$} \begin{array}{c} \langle M_{\beta_n},{\in},\vec{M}\restriction \beta_n\rangle\models \Psi(\vec{M} \restriction \bar{\beta}, \alpha', S\cap\alpha', a\cap \alpha', A_0\cap (\alpha')^{m_0},\vec{Z}\restriction \alpha',\bar{\gamma}) \\ \iff \\ \langle M_{\delta_n}, {\in},\vec{M}\restriction \delta_n \rangle \models \Psi(\vec{M}\restriction \beta,\kappa,S, a, A_0,\vec{Z}, \gamma). \end{array} \end{equation} Hence, for all $n<\omega$, by statements \eqref{deltas} and \eqref{PsiBeta}, it follows that $$\begin{aligned} \langle M_{\beta_n},{\in}, \vec{M} \restriction\beta_n \rangle \models~ & \{\beta \mid \Psi(\vec{M} \restriction \beta, \alpha', S \cap \alpha',a\cap \alpha', A_0\cap (\alpha')^{m_0},\vec{Z}\restriction \alpha',\bar{\gamma}) \} \\ &= \{ j_n^{-1} (\delta_{k}) \mid k < n \}, \end{aligned}$$ and that, for each $k< n $, $j_{n}(\beta_{k})=\delta_{k}$. \begin{subclaim}$\beta':=\sup_{n \in \omega} \beta_n$ is equal to $\sup(S_{\alpha'})$. \end{subclaim} \begin{proof} For each $n<\omega$, as $\clps(\mathfrak B_{n,\alpha'})=\langle M_{\beta_n},{\in},\ldots\rangle$, the proof of Subclaim~\ref{sc61632}, establishing that $\beta(\alpha)\in S_\alpha$, makes clear that $\beta_n \in S_{\alpha'}$. We first argue that $\beta'\notin S_{\alpha'}$ by showing that $\langle M_{\beta'},{\in}\rangle\not\models\axiomfont{ZF}^-$, and then we will argue that no $\beta>\beta'$ is in $S_{\alpha'}$. Note that $\{\beta_n \mid n < \omega \}$ is a definable subset of $\beta'$ since it can be defined as the first $\omega$ ordinals to satisfy Clauses (a)--(g), replacing $\vec M \restriction\delta, \kappa,S,a,A_0,\vec{Z},\gamma$ by $\vec{M} \restriction \beta, \alpha', S \cap \alpha',a\cap \alpha', A_0\cap (\alpha')^{m_0},\vec{Z}\restriction \alpha',\bar{\gamma}$, respectively. So if $\langle M_{\beta'},{\in}\rangle$ were to model $\axiomfont{ZF}^-$, we would have get that $\sup_{n<\omega}\beta_n$ is in $M_{\beta'}$, contradicting the fact that $M_{\beta'}\cap\ord=\beta'$. Now, towards a contradiction, suppose that there exists $\beta>\beta'$ in $S_{\alpha'}$, and let $\beta$ be the least such ordinal. In particular, $\langle M_{\beta},{\in}\rangle \models \axiomfont{ZF}^{-}$, and $\langle \beta_n \mid n < \omega \rangle\in M_{\beta}$, so that $\langle M_{\beta_{n}} \mid n \in \omega \rangle \in M_{\beta}$. We will reach a contradiction to Clause~(iii) of the definition of $S_{\alpha'}$, asserting, in particular, that $S \cap \alpha'$ is stationary in $\langle M_{\beta},{\in}\rangle$. For each $n<\omega$, we have that $\langle M_{\delta_{n+1}},{\in}, \vec{M}\restriction \delta_{n+1}\rangle \models \Phi(C_{n},\delta_n,\vec{\mathfrak{B}_{n}}, \kappa ),$ where $\Phi(C_{n},\delta_{n},\vec{\mathfrak{B_{n}}},\kappa)$ is the conjunction of the following two formulas: \begin{itemize} \item[$\bullet$] $C_{n} = \{ \alpha < \kappa \mid B_{n, \alpha} \cap \kappa = \alpha \}$, and \item[$\bullet$] $\vec{\mathfrak{B}_{n}}\text{ is the } {<_\Theta}\text{-least witness to } \axiomfont{LCC} \text{ at } \delta_n \text{ with respect to } \vec{M}\restriction\delta_{n+1} \text{ and } \mathcal F_{A_0,\kappa}$. \end{itemize} Therefore, for $ \overline{C_{n}}:=j_{n+1}^{-1}(C_{n})$ and $\overline{\mathfrak{B}_{n}}:=j_{n+1}^{-1}(\vec{\mathfrak{B}_{n}})$, we have $$\langle M_{\beta_{n+1}},{\in}, \vec{M}\restriction \beta_{n+1}\rangle \models \Phi(\overline{C_{n}},\beta_n,\overline{\mathfrak{B}_{n}}, \alpha').$$ In particular, $\overline{C_n}=j_{n+1}^{-1}(C_{n}) = C_{n}\cap \alpha' $. Recalling that $\alpha'=\min ((\bigcap_{n\in \omega} C_{n}) \cap S)$, we infer that $\bigcap_{n<\omega} \overline{C_{n}}$ is disjoint from $S \cap \alpha'$. Thus, to establish that $S\cap\alpha'$ is nonstationary, it suffices to verify the two: \begin{enumerate}[(1)] \item $\langle \overline{C_n}\mid n<\omega\rangle$ belongs to $M_\beta$, and \item for every $n<\omega$, $\langle M_{\beta},{\in}\rangle \models \overline{C_{n}} ~ \text{is a club in} ~ \alpha'$. \end{enumerate} As $\langle M_{\beta_{n}} \mid n \in \omega \rangle \in M_{\beta}$, we can define $\langle \overline{\mathfrak{B}}_{n} \mid n \in \omega \rangle$ using that, for all $n \in \omega$, $$ \begin{aligned} \langle M_{\beta_{n+1}},{\in}, \vec{M}\restriction \beta_{n+1}\rangle \models ``\overline{\mathfrak{B}}_{n} & \text{ is the } {<_\Theta}\text{-least witness to} \\ & \axiomfont{LCC} \text{ at } \alpha' \text{ w.r.t. } \vec{M}\restriction \beta_{n+1} \text{ and } \mathcal{F}_{A_{0},\alpha'}". \end{aligned} $$ This takes care of Clause~(1), and shows that $\langle M_{\beta_{n+1}},{\in}\rangle\models \overline{C_n}\text{ is a club in }\alpha'$. Since $M_{\beta}$ is transitive and the formula expressing that $\overline{C_{n}}$ is a club is $\Delta_{0}$, we have also taken care of Clause~(2). \end{proof} It follows that $\alpha'\in D$ and $f(\alpha')=\sup(S_{\alpha'})=\beta'$.\footnote{Notice that the argument of this claim also showed that $D$ is stationary.} Finally, as, for every $n<\omega$, we have $$\langle \alpha',{\in}, A_0 \cap(\alpha')^{m_0}\rangle \models_{M_{\beta_n}} \forall X \exists Y \varphi,$$ we infer that $N_{\alpha'}= M_{f(\alpha')}=M_{\beta'} = \bigcup_{n\in\omega} M_{\beta_{n}}$ is such that $$\langle \alpha',{\in}, A_0 \cap(\alpha')^{m_0} \rangle \models_{N_{\alpha'}} \forall X \exists Y \varphi.$$ Indeed, otherwise there is $X_{0} \in [\alpha']^p \cap N_{\alpha'}$ such that, for all $Y \in [\alpha']^q\cap N_{\alpha'}$, ${N_{\alpha'}}\models[\langle \alpha',{\in}, A_{0}\cap(\alpha')^{m_0} \rangle \models \neg \varphi(X_0,Y)]$. Find a large enough $n <\omega$ such that $ X_{0} \in M_{\beta_n}$. Now, since $``\langle \alpha',{\in}, A_{0} \cap (\alpha')^{m_{0}} \rangle \models \neg \varphi(X_0,Y)"$ is a $\Delta_{1}^{\axiomfont{ZF}^{-}}$ formula on the parameters $ \langle \alpha',{\in}, A_{0} \cap (\alpha')^{m_{0}} \rangle$, $\varphi$, and since $M_{\beta_n}$ is transitive subset of $N_{\alpha'}$ it follows that, for all $Y \in [\alpha']^q \cap M_{\beta_n}$, $M_{\beta_n} \models [\langle \alpha',{\in},A_{0}\cap(\alpha')^{m_0} \rangle \models \neg \varphi(X_{0},Y)]$, which is a contradiction. \end{proof} This completes the proof of Theorem~\ref{diamond_from_lcc}. \end{proof} As a corollary we have found a strong combinatorial axiom that holds everywhere (including at ineffable sets) in canonical models of Set Theory (including G\"odel's constructible universe). \begin{cor} Suppose that: \begin{itemize} \item[$\bullet$] $L[E]$ is an extender model with Jensen $\lambda$-indexing; \item[$\bullet$] $L[E]\models``\text{there are no subcompact cardinals}"$; \item[$\bullet$] for every $\alpha \in \ord $, the premouse $L[E]||\alpha$ is weakly iterable. \end{itemize} Then, in $L[E]$, for every regular uncountable cardinal $\kappa$, for every stationary $S\subseteq\kappa$, $\dl^*_S(\Pi^1_2)$ holds. \end{cor} \begin{proof} Work in $L[E]$. Let $\kappa$ be any regular and uncountable cardinal. By Fact~\ref{NoSubcompact}, $\vec M=\langle L_{\beta}[E] \mid \beta < \kappa^{+} \rangle$ witnesses that $\axiomfont{LCC}(\kappa,\kappa^{+})$ holds. Since $L_{\kappa^{+}}[E]$ is an acceptable $J$-structure,\footnote{For the definition of acceptable $J$-structure, see \cite[p.~4]{MR1876087}.} $\vec{M}$ is a nice filtration of $L_{\kappa^{+}}[E]$ that is eventually slow at $\kappa$. In addition (cf.~\cite[Lemma~1.11]{MR2768688}), there is a $\Sigma_{1}$-formula $\Theta$ for which $$x <_\Theta y \text{ iff } L[E]|\kappa^{+} \models \Theta(x,y)$$ defines a well-ordering of $L_{\kappa^{+}}[E]$. Finally, acceptability implies that $L_{\kappa^{+}}[E]=H_{\kappa^{+}}$. Now, appeal to Theorem~\ref{diamond_from_lcc}. \end{proof} \section{Universality of inclusion modulo nonstationary} Throughout this section, $\kappa$ denotes a regular uncountable cardinal satisfying $\kappa^{<\kappa}=\kappa$. Here, we will be proving Theorems B and C. Before we can do that, we shall need to establish a \emph{transversal lemma}, as well as fix some notation and coding that will be useful when working with structures of the form $\langle \kappa,{\in}, (A_n)_{n\in \omega} \rangle $. \begin{prop}[Transversal lemma]\label{Prop2.4} Suppose that $\langle N_\alpha\mid\alpha\in S\rangle$ is a $\dl^*_S(\Pi^1_2)$-sequence, for a given stationary $S\subseteq\kappa$. For every $\Pi^1_2$-sentence $\phi$, there exists a transversal $\langle \eta_\alpha\mid\alpha\in S\rangle\in\prod_{\alpha\in S}N_\alpha$ satisfying the following. For every $\eta\in\kappa^\kappa$, whenever $\langle \kappa,{\in},(A_n)_{n\in\omega}\rangle\models \phi$, there are stationarily many $\alpha\in S$ such that \begin{enumerate}[(i)] \item $\eta_\alpha=\eta\restriction\alpha$, and \item $\langle \alpha,{\in},(A_n\cap (\alpha^{m(\mathbb A_n)}))_{n\in\omega}\rangle\models_{N_\alpha}\phi$. \end{enumerate} \end{prop} \begin{proof} Let $c:\kappa \times \kappa \leftrightarrow \kappa$ be some primitive-recursive pairing function. For each $\alpha\in S$, fix a surjection $f_\alpha:\kappa\rightarrow N_\alpha$ such that $f_\alpha[\alpha]=N_\alpha$ whenever $|N_\alpha|=|\alpha|$. Then, for all $i<\kappa$, as $f_\alpha(i)\in N_\alpha$, we may define a set $\eta^i_\alpha$ in $N_\alpha$ by letting $$\eta_\alpha^i:=\begin{cases} \{(\beta,\gamma)\in\alpha\times\alpha\mid c(i,c(\beta,\gamma))\in f_\alpha(i)\},&\text{if }i<\alpha;\\ \emptyset,&\text{otherwise}. \end{cases}$$ We claim that for every $\Pi^1_2$-sentence $\phi$, there exists $i(\phi)<\kappa$ for which $\langle \eta_\alpha^{i(\phi)}\mid \alpha\in S\rangle$ satisfies the conclusion of our proposition. Before we prove this, let us make a few reductions. First of all, it is clear that for every $\Pi^1_2$-sentence $\phi=\forall X\exists Y\varphi$, there exists a large enough $n'<\omega$ such that all predicates mentioned in $\varphi$ are in $\{ \epsilon,\mathbb X,\mathbb Y,\mathbb A_n\mid n<n'\}$. So the only structures of interest for $\phi$ are in fact $\langle \alpha,{\in},(A_n)_{n<n'}\rangle$, where $\alpha\le\kappa$. Let $m':=\max\{m(\mathbb A_n)\mid n<n'\}$. Then, by a trivial manipulation of $\varphi$, we may assume that the only structures of interest for $\phi$ are in fact $\langle \alpha,{\in},A_0\rangle$, where $\omega\le\alpha\le\kappa$ and $m(\mathbb A_0)=m'+1$. Having the above reductions in hand, we now fix a $\Pi^1_2$-sentence $\phi=\forall X\exists Y\varphi$ and positive integers $m$ and $k$ such that the only predicates mentioned in $\varphi$ are in $\{\epsilon,\mathbb X,\mathbb Y,\mathbb A_0\}$, $m(\mathbb A_0)=m$ and $m(\mathbb Y)= k $. \begin{claim} There exists $i<\kappa$ satisfying the following. For all $\eta\in\kappa^\kappa$ and $A\subseteq\kappa^m$, whenever $\langle \kappa,{\in},A\rangle\models\phi$, there are stationarily many $\alpha\in S$ such that \begin{enumerate}[(i)] \item $\eta^i_\alpha=\eta\restriction\alpha$, and \item $\langle \alpha,{\in},A\cap(\alpha^m)\rangle\models_{N_\alpha}\phi$. \end{enumerate} \end{claim} \begin{proof} Suppose not. Then, for every $i<\kappa$, we may fix $\eta_i\in\kappa^\kappa$, $A_i\subseteq\kappa^m$ and a club $C_i\subseteq\kappa$ such that $\langle \kappa,{\in},A_i\rangle\models\phi$, but, for all $\alpha\in C_i\cap S$, one of the two fails: \begin{enumerate}[(i)] \item $\eta_\alpha^i=\eta_i\restriction\alpha$, or \item $\langle \alpha,{\in},A_i\cap(\alpha^m)\rangle\models_{N_\alpha}\phi$. \end{enumerate} Let \begin{itemize} \item[$\bullet$] $Z:=\{ c(i,c(\beta,\gamma))\mid i<\kappa, (\beta,\gamma)\in \eta_i\}$, \item[$\bullet$] $A:=\{(i,\delta_1,\ldots,\delta_m)\mid i<\kappa,(\delta_1,\ldots,\delta_m)\in A_i\}$, and \item[$\bullet$] $C:=\bigtriangleup_{i<\kappa}\{\alpha\in C_i\mid \eta_i[\alpha]\subseteq\alpha\}$. \end{itemize} Fix a variable $i$ that does not occur in $\varphi$. Define a first-order sentence $\psi$ mentioning only the predicates in $\{\epsilon,\mathbb X,\mathbb Y,\mathbb A_1\}$ with $m(\mathbb A_1)=1+m$ and $m(\mathbb Y)=1+k$ by replacing all occurrences of the form $\mathbb A_0(x_1,\ldots,x_m)$ and $\mathbb Y(y_1, \ldots, y_k)$ in $\varphi$ by $\mathbb A_1(i,x_1,\ldots,x_m)$ and $\mathbb Y(i,y_1,\ldots,y_k)$, respectively. Then, let $\varphi':=\forall i(\psi)$, and finally let $\phi':=\forall X\exists Y\varphi'$, so that $\phi'$ is a $\Pi^1_2$-sentence. A moment reflection makes it clear that $\langle\kappa,{\in},A\rangle\models\phi'$. Thus, let $S'$ denote the set of all $\alpha \in S$ such that all of the following hold: \begin{enumerate}[(1)] \item $\alpha\in C$; \item $c[\alpha\times\alpha]=\alpha$; \item $Z\cap\alpha\in N_\alpha$; \item $|N_\alpha|=|\alpha|$; \item $\langle\alpha,{\in},A\cap(\alpha^{m+1})\rangle\models_{N_\alpha}\phi'$. \end{enumerate} By hypothesis, $S'$ is stationary. For all $\alpha\in S'$, by Clauses (3) and (4), we have $Z\cap\alpha\in N_\alpha=f_\alpha[\alpha]$, so, by Fodor's lemma, there exists some $i<\kappa$ and a stationary $S''\subseteq S'\setminus(i+1)$ such that, for all $\alpha\in S''$: \begin{enumerate} \item[(3')] $Z\cap\alpha=f_\alpha(i)$. \end{enumerate} Let $\alpha\in S''$. By Clause~(5), we in particular have \begin{enumerate} \item[(5')] $\langle\alpha,{\in},A_i\cap(\alpha^m)\rangle\models_{N_\alpha}\phi$. \end{enumerate} Also, by Clause~(1), we have $\alpha\in C_i$, and so we must conclude that $\eta_i\restriction\alpha\neq \eta^i_\alpha$. However, $\eta_i[\alpha]\subseteq\alpha$, and $Z\cap\alpha=f_\alpha(i)$, so that, by Clause~(2), $$\eta_i\restriction\alpha=\eta_i\cap(\alpha\times\alpha)=\{(\beta,\gamma)\in\alpha\times\alpha\mid c(i,c(\beta,\gamma))\in f_\alpha(i)\}=\eta^i_\alpha.$$ This is a contradiction. \end{proof} This completes the proof of Proposition~\ref{Prop2.4}. \end{proof} \begin{lemma}\label{prop31} There is a first-order sentence $\psi_{\baire} $ in the language with binary predicate symbols $\epsilon$ and $\mathbb X$ such that, for every ordinal $\alpha$ and every $X\subseteq\alpha\times\alpha$, $$(X\text{ is a function from }\alpha\text{ to }\alpha)\text{ iff }(\langle \alpha,{\in},X\rangle \models \psi_{\baire}).$$ \end{lemma} \begin{proof} Let $\psi_{\baire}:=\forall\beta\exists\gamma(\mathbb X(\beta,\gamma)\land(\forall\delta(\mathbb X(\beta,\delta)\rightarrow\delta=\gamma)))$. \end{proof} \begin{lemma}\label{prop32} Let $\alpha$ be an ordinal. Suppose that $\phi$ is a $\Sigma^1_1$-sentence involving a predicate symbol $\mathbb A$ and two binary predicate symbols $\mathbb X_0,\mathbb X_1$. Denote $R_\phi:=\{ (X_0,X_1)\mid \langle \alpha,{\in},A,X_0,X_1\rangle\models\phi\}$. Then there are $\Pi^1_2$-sentences $\psi_{\reflexive}$ and $\psi_{\transitive}$ such that: \begin{enumerate}[(1)] \item $(R_\phi\supseteq\{(\eta,\eta)\mid \eta\in\alpha^\alpha\})$ iff $(\langle\alpha,{\in},A\rangle\models\psi_{\reflexive})$; \item $(R_\phi\text{ is transitive})$ iff $(\langle\alpha,{\in},A\rangle\models\psi_{\transitive})$. \end{enumerate} \end{lemma} \begin{proof}\begin{enumerate}[(1)] \item Fix a first-order sentence $\psi_{\baire}$ such that ($X_0\in\alpha^\alpha$) iff ($\langle\alpha,{\in},X_0\rangle\models\psi_{\baire}$). Now, let $\psi_{\reflexive}$ be $\forall X_0\forall X_1((\psi_{\baire}\land(X_1=X_0))\rightarrow\phi)$. \item Fix a $\Sigma^1_1$-sentence $\phi'$ involving predicate symbols $\mathbb A, \mathbb X_1,\mathbb X_2$ and a $\Sigma^1_1$-sentence $\phi''$ involving binary symbols $\mathbb A,\mathbb X_0,\mathbb X_2$ such that \begin{gather*} \{ (X_1,X_2)\mid \langle \alpha,{\in},A,X_1,X_2\rangle\models\phi'\}=\\R_\phi=\{ (X_0,X_2)\mid \langle \alpha,{\in},A,X_0,X_2\rangle\models\phi''\} \end{gather*} Now, let $\psi_{\transitive}:=\forall X_0\forall X_1\forall X_2((\phi\land\phi')\rightarrow\phi'')$.\qedhere \end{enumerate} \end{proof} \begin{defn}\label{defn34} Denote by $ \Seq_3(\kappa)$ the set of level sequences in $\kappa^{<\kappa}$ of length $3$: $$ \Seq_3(\kappa):=\bigcup_{\tau<\kappa}\kappa^\tau\times\kappa^\tau\times\kappa^\tau.$$ Fix an injective enumeration $\{\ell_\delta\mid\delta<\kappa\}$ of $\Seq_3(\kappa)$. For each $\delta<\kappa$, we denote $\ell_\delta=(\ell_\delta^0,\ell_\delta^1,\ell_\delta^2)$. We then encode each $T \subseteq \Seq_{3}(\kappa) $ as a subset of $\kappa^5$ via: $$T_\ell := \{ (\delta,\beta, \ell_\delta^0(\beta),\ell_\delta^{1}(\beta),\ell_\delta^{2}(\beta)) \mid \delta<\kappa, \ell_\delta \in T, \beta\in \dom(\ell_\delta^0) \}.$$ \end{defn} We now prove Theorem~C. \begin{thm}\label{Sigmacompl} Suppose $\dl^*_S(\Pi^1_2)$ holds for a given stationary $S\subseteq\kappa$. For every analytic quasi-order $Q$ over $\kappa^\kappa$, there is a $1$-Lipschitz map $f:\kappa^\kappa\rightarrow2^\kappa$ reducing $Q$ to $\sqc{S}$. \end{thm} \begin{proof} Let $Q$ be an analytic quasi-order over $\kappa^\kappa$. Fix a tree $T$ on $\kappa^{<\kappa}\times \kappa^{<\kappa}\times \kappa^{<\kappa} $ such that $Q=\pr([T])$, that is, $$(\eta,\xi) \in Q \iff \exists \zeta\in\kappa^{\kappa}~ \forall \tau < \kappa ~(\eta\restriction\tau,\xi\restriction\tau,\zeta\restriction\tau) \in T.$$ We shall be working with a first-order language having a $5$-ary predicate symbol $\mathbb A$ and binary predicate symbols $\mathbb X_0,\mathbb X_1,\mathbb X_2$ and $\epsilon$. By Lemma~\ref{prop31}, for each $i<3$, let us fix a sentence $\psi_{\baire}^i$ concerning the binary predicate symbol $\mathbb X_i$ instead of $\mathbb X$, so that $$(X_i\in\kappa^{\kappa})\text{ iff }(\langle \kappa,{\in},A,X_0,X_1,X_2\rangle \models \psi_{\baire}^i).$$ Define a sentence $\varphi_Q$ to be the conjunction of four sentences: $\psi_{\baire}^0$, $\psi^1_{\baire}$, $\psi^2_{\baire}$, and $$\forall \tau \exists \delta \forall \beta [\epsilon(\beta,\tau)\rightarrow\exists \gamma_{0}\exists\gamma_{1}\exists\gamma_{2} (\mathbb X_0(\beta,\gamma_{0}) \land \mathbb X_1(\beta,\gamma_{1})\land\mathbb X_2(\beta,\gamma_{2})\land\mathbb A(\delta,\beta,\gamma_{0},\gamma_{1},\gamma_{2}) )].$$ Set $A:=T_\ell$ as in Definition~\ref{defn34}. Evidently, for all $\eta,\xi,\zeta\in\mathcal P(\kappa\times\kappa)$, we get that $$\langle\kappa,{\in},A,\eta,\xi,\zeta\rangle\models\varphi_Q$$ iff the two hold: \begin{enumerate}[(1)] \item $\eta,\xi,\zeta\in\kappa^\kappa$, and \item for every $\tau<\kappa$, there exists $\delta<\kappa$, such that $\ell_\delta=(\eta\restriction\tau,\xi\restriction\tau,\zeta\restriction\tau)$ is in $T$. \end{enumerate} Let $\phi_Q:= \exists X_2(\varphi_Q)$. Then $\phi_Q$ is a $\Sigma^1_1$-sentence involving predicate symbols $\mathbb A,\mathbb X_0,\mathbb X_1$ and $\epsilon$ for which the induced binary relation $$R_{\phi_Q}:=\{(\eta,\xi)\in (\mathcal P(\kappa\times\kappa))^2\mid \langle \kappa,{\in},A,\eta,\xi\rangle \models \phi_Q\}$$ coincides with the quasi-order $Q$. Now, appeal to Lemma~\ref{prop32} with $\phi_Q$ to receive the corresponding $\Pi^1_2$-sentences $\psi_{\reflexive}$ and $\psi_{\transitive}$. Then, consider the following two $\Pi^1_2$-sentences: \begin{itemize} \item[$\bullet$] $\psi^0_Q:=\psi_{\reflexive}\land\psi_{\transitive}\land\phi_Q$, and \item[$\bullet$] $\psi^1_Q:=\psi_{\reflexive}\land\psi_{\transitive}\land\neg(\phi_Q)$. \end{itemize} Let $\vec N=\langle N_\alpha\mid\alpha\in S\rangle$ be a $\dl^*_S(\Pi^1_2)$-sequence. Appeal to Proposition~\ref{Prop2.4} with the $\Pi^1_2$-sentence $\psi^1_Q$ to obtain a corresponding transversal $\langle \eta_\alpha\mid\alpha\in S\rangle\in\prod_{\alpha\in S}N_\alpha$. Note that we may assume that, for all $\alpha\in S$, $\eta_\alpha\in{}^\alpha\alpha$, as this does not harm the key feature of the chosen transversal.\footnote{For any $\alpha$ such that $\eta_\alpha$ is not a function from $\alpha$ to $\alpha$, simply replace $\eta_\alpha$ by the constant function from $\alpha$ to $\{0\}$.} For each $\eta\in\kappa^\kappa$, let $$Z_\eta:=\{\alpha\in S\mid A\cap\alpha^5\text{ and }\eta\restriction\alpha\text{ are in }N_\alpha\}.$$ \begin{claim} Suppose $\eta\in\kappa^\kappa$. Then $S\setminus Z_\eta$ is nonstationary. \end{claim} \begin{proof} Fix primitive-recursive bijections $c:\kappa^2\leftrightarrow\kappa$ and $d:\kappa^5\leftrightarrow\kappa$. Given $\eta\in\kappa^\kappa$, consider the club $D_0$ of all $\alpha<\kappa$ such that: \begin{itemize} \item[$\bullet$] $\eta[\alpha]\subseteq\alpha$; \item[$\bullet$] $c[\alpha\times\alpha]=\alpha$; \item[$\bullet$] $d[\alpha\times\alpha\times\alpha\times\alpha\times\alpha]=\alpha$. \end{itemize} Now, as $c[\eta]$ is a subset of $\kappa$, by the choice $\vec N$, we may find a club $D_1\subseteq\kappa$ such that, for all $\alpha\in D_1\cap S$, $c[\eta]\cap\alpha\in N_\alpha$. Likewise, we may find a club $D_2\subseteq\kappa$ such that, for all $\alpha\in D_2\cap S$, $d[A]\cap\alpha\in N_\alpha$. For all $\alpha\in S\cap D_0\cap D_1\cap D_2$, we have \begin{itemize} \item[$\bullet$] $c[\eta\restriction\alpha]=c[\eta\cap(\alpha\times\alpha)]=c[\eta]\cap c[\alpha\times\alpha]=c[\eta]\cap\alpha\in N_\alpha$, and \item[$\bullet$] $d[A\cap\alpha^5]=d[A]\cap d[\alpha^5]=d[A]\cap\alpha\in N_\alpha$. \end{itemize} As $N_\alpha$ is p.r.-closed, it then follows that $\eta\restriction\alpha$ and $A\cap\alpha^5$ are in $N_\alpha$. Thus, we have shown that $S \setminus Z_\eta$ is disjoint from the club $D_0\cap D_1\cap D_2$. \end{proof} For all $\eta\in\kappa^\kappa$ and $\alpha\in Z_\eta$, let: $$\mathcal{P}_{\eta,\alpha}:=\{p\in \alpha^\alpha\cap N_\alpha\mid \langle\alpha,{\in},A\cap\alpha^5,p,\eta\restriction\alpha\rangle \models_{N_{\alpha}} \psi^0_Q \}.$$ Finally, define a function $f:\kappa^{\kappa} \rightarrow 2^\kappa$ by letting, for all $\eta\in\kappa^\kappa$ and $\alpha<\kappa$, $$f(\eta)(\alpha) := \begin{cases} 1,& \text{if } \alpha\in Z_\eta\text{ and }\eta_\alpha\in \mathcal{P}_{\eta,\alpha};\\ 0, & \text{otherwise}. \end{cases} $$ \begin{claim} $f$ is $1$-Lipschitz. \end{claim} \begin{proof} Let $\eta,\xi$ be two distinct elements of $\kappa^{\kappa}$. Let $\alpha\le\Delta(\eta,\xi)$ be arbitrary. As $\eta\restriction\alpha=\xi\restriction\alpha$, we have $\alpha\in Z_\eta$ iff $\alpha\in Z_\xi$. In addition, as $\eta\restriction\alpha=\xi\restriction\alpha$, $\mathcal P_{\eta,\alpha}=\mathcal P_{\xi,\alpha}$ whenever $\alpha\in Z_\eta$. Thus, altogether, $f(\eta)(\alpha)=1$ iff $f(\xi)(\alpha)=1$. \end{proof} \begin{claim}\label{c353} Suppose $(\eta,\xi)\in Q$. Then $f(\eta)\sqc Sf(\xi)$. \end{claim} \begin{proof} As $(\eta,\xi)\in Q$, let us fix $\zeta\in\kappa^\kappa$ such that, for all $\tau<\kappa$, $(\eta\restriction\tau,\xi\restriction\tau,\zeta\restriction\tau)\in T$. Define a function $g:\kappa\rightarrow\kappa$ by letting, for all $\tau<\kappa$, $$g(\tau):=\min\{\delta<\kappa\mid \ell_\delta=(\eta\restriction\tau,\xi\restriction\tau,\zeta\restriction\tau)\}.$$ As $(S\setminus Z_\eta)$, $(S\setminus Z_\xi)$ and $(S\setminus Z_\zeta)$ are nonstationary, let us fix a club $C\subseteq\kappa$ such that $C\cap S\subseteq Z_\eta\cap Z_\xi\cap Z_\zeta$. Consider the club $D:=\{\alpha\in C\mid g[\alpha]\subseteq\alpha\}$. We shall show that, for every $\alpha\in D\cap S$, if $f(\eta)(\alpha)=1$ then $f(\xi)(\alpha)=1$. Fix an arbitrary $\alpha\in D\cap S$ satisfying $f(\eta)(\alpha)=1$. In effect, the following three conditions are satisfied: \begin{enumerate}[(1)] \item $\langle\alpha,{\in},A\cap\alpha^5\rangle \models_{N_{\alpha}} \psi_{\reflexive}$, \item $\langle\alpha,{\in},A\cap\alpha^5\rangle \models_{N_{\alpha}} \psi_{\transitive}$, and \item $\langle\alpha,{\in},A\cap\alpha^5,\eta_\alpha,\eta\restriction\alpha\rangle \models_{N_{\alpha}} \phi_Q$. \end{enumerate} In addition, since $\alpha$ is a closure point of $g$, by definition of $\varphi_Q$, we have $$\langle\alpha,{\in},A\cap\alpha^5,\eta\restriction\alpha,\xi\restriction\alpha,\zeta\restriction\alpha\rangle\models\varphi_Q.$$ As $\alpha\in S$ and $\varphi_Q$ is first-order,\footnote{$N_{\alpha}$ is transitive and rud-closed (in fact, p.r.-closed), so that $N_{\alpha} \models \axiomfont{GJ}$ (see \cite[\S Other remarks on GJ]{Mathias}). Now, by \cite[\S The cure in $\axiomfont{GJ}$, proposition 10.31]{Mathias}, $\mathbf{Sat}$ is $\Delta_{1}^{\axiomfont{GJ}}$.} $$\langle\alpha,{\in},A\cap\alpha^5,\eta\restriction\alpha,\xi\restriction\alpha,\zeta\restriction\alpha\rangle\models_{N_\alpha}\varphi_Q,$$ so that, by definition of $\phi_Q$, $$\langle\alpha,{\in},A\cap\alpha^5,\eta\restriction\alpha,\xi\restriction\alpha\rangle\models_{N_\alpha}\phi_Q.$$ By combining the preceding with clauses (2) and (3) above, we infer that the following holds, as well: \begin{enumerate} \item[(4)] $\langle\alpha,{\in},A\cap\alpha^5,\eta_\alpha,\xi\restriction\alpha\rangle \models_{N_{\alpha}} \phi_Q$. \end{enumerate} Altogether, $f(\xi)(\alpha)=1$, as sought. \end{proof} \begin{claim} Suppose $(\eta,\xi)\in \kappa^\kappa\times\kappa^\kappa\setminus Q$. Then $f(\eta)\not\sqc{S}f(\xi)$. \end{claim} \begin{proof} As $(S\setminus Z_\eta)$ and $(S\setminus Z_\xi)$ are nonstationary, let us fix a club $C\subseteq\kappa$ such that $C\cap S\subseteq Z_\eta\cap Z_\xi$. As $Q$ is a quasi-order and $(\eta,\xi)\notin Q$, we have: \begin{enumerate}[(1)] \item $\langle\kappa,{\in},A\rangle \models\psi_{\reflexive}$, \item $\langle\kappa,{\in},A\rangle \models\psi_{\transitive}$, and \item $\langle\kappa,{\in},A,\eta,\xi\rangle \models \neg(\phi_Q)$. \end{enumerate} so that, altogether, $$ \langle \kappa,{\in},A,\eta,\xi\rangle \models \psi^1_Q.$$ Then, by the choice of the transversal $\langle \eta_\alpha\mid\alpha\in S\rangle$, there is a stationary subset $S'\subseteq S\cap C$ such that, for all $\alpha\in S'$: \begin{enumerate}[(1')] \item $\langle\alpha,{\in},A\cap\alpha^5\rangle \models_{N_{\alpha}} \psi_{\reflexive}$, \item $\langle\alpha,{\in},A\cap\alpha^5\rangle \models_{N_{\alpha}} \psi_{\transitive}$, \item $\langle\alpha,{\in},A\cap\alpha^5,\eta\restriction\alpha,\xi\restriction\alpha\rangle \models_{N_{\alpha}} \neg(\phi_Q)$, and \item $\eta_\alpha=\eta\restriction\alpha$. \end{enumerate} By Clauses (3') and (4'), we have that $\eta_\alpha\notin\mathcal P_{\xi,\alpha}$, so that $f(\xi)(\alpha)=0$. By Clauses (1'), (2') and (4'), we have that $\eta_\alpha\in\mathcal P_{\eta,\alpha}$, so that $f(\eta)(\alpha)=1$. Altogether, $\{ \alpha\in S\mid f(\eta)(\alpha)>f(\xi)(\alpha)\}$ covers the stationary set $S'$, so that $f(\eta)\not\sqc{S}f(\xi)$. \end{proof} This completes the proof of Theorem~\ref{Sigmacompl} \end{proof} Theorem~B now follows as a corollary. \begin{cor}\label{corollary36} Suppose that $\kappa$ is a regular uncountable cardinal and $\axiomfont{GCH}$ holds. Then there is a set-size cofinality-preserving $\axiomfont{GCH}$-preserving notion of forcing $\mathbb P$, such that, in $V^{\mathbb P}$, for every analytic quasi-order $Q$ over $\kappa^\kappa$ and every stationary $S\subseteq\kappa$, ${Q}\hookrightarrow_1{\sqc S}$. \end{cor} \begin{proof} This follows from Theorems \ref{diamond_from_lcc} and \ref{Sigmacompl}, and one of the following: $\blacktriangleright$ If $\kappa$ is inaccessible, then we use Fact~\ref{InaccForcing} and Lemma~\ref{slow}. $\blacktriangleright$ If $\kappa$ is a successor cardinal, then we use Fact~\ref{forcing} and Lemma~\ref{MH2} \end{proof} \begin{remark} By combining the proof of the preceding with a result of L\"ucke \cite[Theorem~1.5]{MR2987148}, we arrive at following conclusion. Suppose that $\kappa$ is an infinite successor cardinal and $\axiomfont{GCH}$ holds. For every binary relation $R$ over $\kappa^\kappa$, there is a set-size $\axiomfont{GCH}$-preserving $({<}\kappa)$-closed, $\kappa^+$-cc notion of forcing $\mathbb P_R$ such that, in $V^{\mathbb P_R}$, the conclusion of Corollary~\ref{corollary36} holds, and, in addition, $R$ is analytic. \end{remark} \begin{remark}A quasi-order $\unlhd$ over a space $X\in\{2^\kappa,\kappa^\kappa\}$ is said to be \emph{$\Sigma^1_1$-complete} iff it is analytic and, for every analytic quasi-order $Q$ over $X$, there exists a $\kappa$-Borel function $f:X\rightarrow X$ reducing $Q$ to $\unlhd$. As Lipschitz$\implies$continuous$\implies$$\kappa$-Borel, the conclusion of Corollary~\ref{corollary36} gives that each $\sqc S$ is a $\Sigma^1_1$-complete quasi-order. Such a consistency was previously only known for $S$'s of one of two specific forms, and the witnessing maps were not Lipschitz. \end{remark} \section{Concluding remarks} \begin{remark} By \cite[Corollary 4.5]{HKM2}, in $L$, for every successor cardinal $\kappa$ and every theory (not necessarily complete) $T$ over a countable relational language, the corresponding equivalence relation $\cong_T$ over $2^\kappa$ is either $\Delta^1_1$ or $\Sigma^1_1$-complete. This dissatisfying dichotomy suggests that $L$ is a singular universe, unsuitable for studying the correspondence between generalized descriptive set theory and model-theoretic complexities. However, using Theorem~\ref{Sigmacompl}, it can be verified that the above dichotomy holds as soon as $\kappa$ is a successor of an uncountable cardinal $\lambda=\lambda^{<\lambda}$ in which $\dl^{*}_{S}(\Pi^1_2)$ holds for both $S:=\kappa\cap\cof(\omega)$ and $S:=\kappa\cap\cof(\lambda)$. This means that the dichotomy is in fact not limited to $L$ and can be forced to hold starting with any ground model. \end{remark} \begin{remark}\label{rmk38} Let $=^S$ denote the symmetric version of $\sqc S$. It is well known that, in the special case $S:=\kappa\cap\cof(\omega)$, $=^S$ is a $\kappa$-Borel$^*$ equivalence relation \cite[\S6]{MR1242054}. It thus follows from Theorem~\ref{Sigmacompl} that if $\dl^*_S(\Pi^1_2)$ holds for $S:=\kappa\cap\cof(\omega)$, then the class of $\Sigma^1_1$ sets coincides with the class of $\kappa$-Borel$^*$ sets. Now, as the proof of {\cite[Theorem~3.1]{HK18}} establishes that the failure of the preceding is consistent with, e.g., $\kappa=\aleph_2=2^{2^{\aleph_0}}$, which in turn, by \cite[Lemma~2.1]{MR485361}, implies that $\diamondsuit^*_S$ holds, we infer that the hypothesis $\dl^*_S(\Pi^1_2)$ of Theorem~\ref{Sigmacompl} cannot be replaced by $\diamondsuit^*_S$. We thus feel that we have identified the correct combinatorial principle behind a line of results that were previously obtained under the heavy hypothesis of ``$V=L$''. \end{remark} \section*{Acknowledgements} This research was partially supported by the European Research Council (grant agreement ERC-2018-StG 802756). The third author was also partially supported by the Israel Science Foundation (grant agreement 2066/18). The main results of this paper were presented by the second author at the \emph{4th Arctic Set Theory} workshop, Kilpisj\"arvi, January 2019, by the third author at the \emph{50 Years of Set Theory in Toronto} conference, Toronto, May 2019, and by the first author at the \emph{Berkeley conference on inner model theory}, Berkeley, July 2019. We thank the organizers for the invitations.
\section{Sample Applications: Design \& Experiences} \label{samples} In this section, we describe two applications that were designed and implemented using our language. The applications were tested on a single machine and in a docker-based emulator for a cloud, fog, device system. \subsection{Distributed Shell} By running multiple instances of a program written in our language, we can quite easily create a distributed system. Those instances self-organize into a cloud-fog-device hierarchy and connect with each other assuming there is connectivity among the resources running the different instances. With mobiles at the edge, we can expect a collection of volatile and heterogeneous nodes that can be at different states of engagement with the global system. The goal of the Distributed Shell (referred to as DShell) is to create a command-line interface (CLI) backed by our language runtime to tackle the management of a volatile set of nodes. It enhances the programmability of the language by reducing the bootstrapping effort needed while deploying the applications written in the language. It allows parallel (on a tree structure) mass deployment of programs to nodes. Consider a drone fleet that needs management. We want DShell to run on all of them and the edge nodes (fog stations) and cloud. Through DShell, it is possible to deploy patches and execute subprograms in parallel on connected nodes. The organization of the fleet in a tree enables an intuitive traversal of the clouds, fogs, and devices in the network is made possible by the shell, as well as specific targeting of individual nodes and subtrees. The DShell design leverages the non-blocking execution capabilities of the language. This is important because our language is single-threaded; the shell should not halt the collective network awaiting a response from a given node. In DShell, this requirement is realized through the use of {\tt jasync} non-blocking functions in the language, in which requests are fired off towards connected nodes without blocking the calling node. Correspondingly, request responses can be received through {\tt jcallback} functions allowing a node to perform C2J and J2C asynchronous communications. Once instantiated and fully connected, the DShell is a tree rooted at the cloud. When it experiences disconnections, there can be many components of the DShell each not connected to the other. However, as the network disconnections heal and the nodes are able to restore connectivity to each other, the DShell will automatically restore itself to the connected state and become a tree that is rooted at the cloud again. To accomplish this self-healing, DShell relies completely on the self-healing nature of the underlying runtime, which uses a global and local discovery service to detect possible nodes to reconnect at the different levels. At least in its current design there is no additional processing beyond the default runtime processing performed by the language. Like a UNIX shell, one of the key tasks of DShell is to start, stop, and keep track of jobs, which are the execution of other programs written in our language. Any arbitrary program written in our language could be instantiated as a ``tree,'' which mirrors the structure of the DShell itself. However, the size and shape of the tree structure of an executing program depend on the number of nodes that are part of the execution. For instance, if only one node is executing a program, the tree contains only a single J node and possibly a single C node. When DShell is asked to execute another program, it spawns a child of the calling DShell process. Unlike the case of a UNIX shell where spawning creates a single child, in DShell, the spawning could create a subtree of processes. The subtree of processes so spawned will be responsible for loading and running the application DShell was asked to execute. There are several advantages for using DShell to launch a program that is written in our language instead of using the native shell. A native run would create new instances of all resources such as Redis store and MQTT brokers that are needed for the execution of the program. Whereas DShell would reuse the resources already allocated to the parent shell and assign the new application a separate namespace so that the new application is isolated from the parent shell and also from other programs that may already be running within the shell. One of the restrictions of running a program from within DShell is that the new program needs to launch on a subset of the resources or whole of the resources that are already held by the parent DShell. Figure~\ref{shell} shows the startup times of launching programs from inside the shell and natively on different configurations of nodes. These experiments were all performed on a single host with 4 cores. A future evaluation will use the docker-based emulator. \begin{figure}[!ht] \centering \includegraphics[width=2.5in]{Figures/shell.pdf} \caption{CDF showing the startup time for two different tree configurations with shell and without shell.} \label{shell} \end{figure} The results indicate that DShell is much quicker in launching applications. The main reasons for the reduced startup times are: reuse of key resources to execute the application and also parallel spawning in different subtrees. With volatile nodes (i.e., nodes that change state often), it is quite challenging to maintain state in DShell regarding the job execution state across the distributed shell. In our language, persistent node-to-node data flows are implemented through broadcasters and loggers, respectively allowing top down and bottom up data transfer. Another feature implemented in DShell is the Pipes and Filters at the Edge pattern described in Section~\ref{patterns}. Using this feature we can start an application and pipe its output to another program that is spawned to run on the same resource pool. Using this pattern, we can decompose a problem into smaller sub problems and create solutions individually and then compose a complete solution by running the sub programs in a pipe according to the data flow requirements. \subsection{Parking Spot Manager} Our language allows programmers to implement data-intensive applications in different ways by enabling a wide range of edge-oriented data flow possibilities that can provide higher QoS in terms of response times for requests. In order to demonstrate these features, we implemented a parking spot manager application which receives requests for premium parking services and responds with information about available spots within the requested area and makes suggestion for other available spots in nearby areas when none exists within the preferred location. We opted for a parking spot application for two reasons: \begin{enumerate} \item It is non-trivial and is inherently distributed, has time-constrained processing requirements and is representative of many applications in smart city scenarios. \item The implementation cuts across many features of the language discussed previously. \end{enumerate} The parking spot manager application is a stack of applications that consists of several smaller applications that exist at the device, fog and cloud levels. Figure~\ref{parking} shows the constituent applications and the data flows among them. \begin{figure}[!ht] \centering{\includegraphics[width=3.3in, height=2.1in]{Figures/parking-spot.pdf}} \caption{Overall architecture of the parking spot manager.} \label{parking} \end{figure} The different components of the parking spot manager are: \begin{enumerate} \item {\em Car}: The car application is made up of two logical parts: (i) one that models the execution in the device (car in this case) and (ii) component that runs in the fog. The first part consists of a C-Node module which receives location instructions about an available spot sent from the fog or cloud that can be routed to the car's navigation system, a J-Node module which communicates with the C-Node, as well as the car's dashboard where the request can be triggered from by either using a voice command or touch pad. We model a touch pad dashboard with a simple web application that communicates with the J-Node module using socket.io. As previously mentioned, applications in our language can be deployed at different levels without modification which makes the second part technically the same as the first. The second part consists of the same J-Node application module being executed at the device level; however, the conditional constructs allow execution restrictions for user-defined functions to be enabled at either the device, fog or both levels and thus makes it runnable at the fog. \item {\em Sensing}: This component models the detection and sensing of cars on parking spots and informs the fog component of the application about the occupancy status and properties of each spot within its coverage. The J-Node application at the device level can be responsible for 1 or more spots within a parking lot. Ideally, such an application could place a sensor at each spot which is modelled as a C-Node at the device level. \item {\em Allocating}: This is the application that ties all the different application components together and is responsible for receiving requests and forwarding allocations to requesting cars. This application exist at both the fog and cloud levels. \end{enumerate} \section{Conclusions and Future Work} To enjoy the full benefits of edge computing, we need applications that are aware of the edge computing setup and adapt their processing accordingly. The first step in creating such applications is the development of programming languages and patterns that considers edge computing as a key element. This paper does just that. It presents a new polyglot programming language for a cloud-fog-device system. We considered many problems that are paramount in edge computing while designing and implementing the language such as: function placement at the appropriate levels to achieve desired QoS, on-demand data probing to reduce the bandwidth usage, fault tolerance at the fog and load distribution at the edge. Our language is based on a distributed-node programming model. To handle the data-intensive nature of IoT related computing tasks, a flow-based data management scheme is built into the language to handle up flow and down flow of data in the tree. One of the challenges of engaging the fogs is fault tolerance. In this paper, we present an fog-to-device allocation optimizer that works with our language design. Essentially, this optimizer determines the best fog-to-device mapping by finding an optimal partition of the data graph created by the logger objects representing the devices. The optimizer design presented in this paper is not yet part of the language implementation. As part of the future work, we will implement it. All necessary software hooks for implementing the optimizer like request router is already implemented. We also describe several edge-oriented programming patterns that can leverage our language design. In this paper, we present some patterns that relate to the key design concerns. We conducted three experiments as part of evaluating the performance of the language and its runtime: (i) machine learning based experiment performing device-to-fog data logging, (ii) experiment to evaluate the benefits of selecting logging that implements data filtering at the edge versus cloud, (iii) experiment to evaluate the latencies of using resources at different levels. To further demonstrate the applicability and functionality of our language, we developed two applications. The first is a distributed shell application created for easily running, stopping, and managing multiple instances of a program written in our language and the second is a parking spot manager consisting of several smaller applications written in our language for advertising parking spot availability to cars. As part of the future work, we will continue to improve the runtime of the language by integrating efficient synchronization facilities. The existing synchronization capabilities in the language for controller-to-workers is pretty basic. We are also planning on writing and testing more applications in our language and deploying some of the applications in a real-world scenario. \section{Experimental Results and Discussion} \label{results} We performed several experiments to evaluate the performance of the language and runtime as well as demonstrate some of its features. The experiments were conducted using a docker container-based emulator we have developed to run cloud-fog-device topologies with given inter-node latencies to mimic realistic scenarios on a machine running Ubuntu 16.04 with a Intel Xeon CPU with 16 cores and 128GB of RAM. For these experiments, in the emulator, the device to fog latencies are modelled by a Normal distribution with mean 5ms and variance 1ms, the fog to fog latencies are modelled by a Normal distribution with mean 10ms and variance 2ms, and device or fog to cloud latencies are modelled by another Normal distribution with mean 30 ms and variance 5ms. The containers modelling the devices, fogs, and cloud have equal weight in terms of the CPU scheduling. \subsection{Parallel Results Push from Fogs} The purpose of this experiment is to study the benefits of results sharing at the fogs. If the workload can be split among the fogs, we should see performance scaling up (or turn around times decreasing) as the number of fogs is increased. For this experiment, we make use of the Wall-Following Robot Navigation Data dataset\footnote{https://archive.ics.uci.edu/ml/datasets/Wall-Following+Robot+Navigation+Data} from the University of California to perform machine learning using a feed-forward neural network. The time we measure in this experiment is the average of the time it takes a device to log data to the fog, perform machine learning at the fog and offload the trained network to a secondary application running on the same fog using the horizontal data sharing primitives built into the language. We run this experiments using a fixed number of devices (24 devices) and different number of fogs in order to evaluate the application load-balancing deployment feature built into the runtime which associates devices to fogs. In these experiments, the runtime was using a random fog assigning routine for load-balancing. Figure~\ref{measure1} shows the result of this experiment. We observe that when we double the number of fog device, the execution time reduces by more than half. With the distributed memory model of the language, several applications can benefit from data generated in other applications. This language design feature enables large applications like the smart parking to be decomposed into several components. \begin{figure}[!ht] \centering \includegraphics[width=2.7in]{Figures/measure1.pdf} \caption{Average time for data to move from a device through a feed-forward neural network on a fog to a secondary application.} \label{measure1} \end{figure} \subsection{Turnaround Times and Cloud/Fog Levels} In this experiment, we want to demonstrate how tasks implemented in our language are able to obtain better performance from fogs for tiny tasks compared to what could be obtained from the clouds. As previously stated, our tree-based controller-worker programming model enables applications to be written once and deployed at different levels of the tree. In this experiment, we leverage the logger and broadcaster features of the language to determine the benefits of utilizing closeby data resources using turnaround time measurements. The result is shown in Figure~\ref{measure2}. \begin{figure}[!ht] \centering \includegraphics[width=2.9in]{Figures/measure2_plus.pdf} \caption{Turnaround time for different data request scenarios using a single fog and cloud instance.} \label{measure2} \end{figure} We create different scenarios to demonstrate this. First, we simulate a case where the data resources are available at the fog level - \textit{FogOnly}. In the second case which we refer to as \textit{FogCloud}, we consider a situation where an initial request is sent to the fog but the request is always routed to the cloud where the resource is located before the data is forwarded back through the fog to the requesting device. Next, we present a modified version of the second case called \textit{FogCloudCache} that caches data obtained from the cloud on the fog and serves the cached data on subsequent requests. Finally, we examine a traditional device to cloud data resource request which we define as \textit{CloudOnly}. In each scenario, a single fog and cloud instance is configured for use with different number of devices. The execution time is the average round trip time for a device to request a resource from a top-level controller and receive a response. The results show that application response is faster when resources are available at the fog level. With caching at the fog level, we see that the \textit{FogCloud} resource request method can be highly improved. The language runtime allows applications to benefit from closeby resources when available without the need to modify the code. Data requests are automatically sent to the immediate parent controller in the tree which can further request from a higher level when lower levels are unable to serve the request. \subsection{Selective Logging of Data} In order to demonstrate the benefits of the selective logging pattern built into the language, we generated a hypothetical dataset for the heart rate of a possible medical patient. We assume an application that detects abnormal heart rates above 100 beats per minute. It is important that such applications provide real-time data to interested parties to enable timely actions to be taken. We compare two types of applications: (i) One that uses the selective logging reactive mechanism to filter data in real time and forwards it to interested applications using the horizontal data sharing primitives and (ii) One the employs batch processing every 5 seconds to detect the abnormal data from queued logs before forwarding the detected abnormalities to listeners. The execution time is the time from data generation on the device level to the detection time on the fog. The CDF plot in Figure~\ref{measure3} shows that the selective logging with real-time filtering provides faster detection with more than 94\% of the detection falling around 5ms. \begin{figure}[!ht] \centering \includegraphics[width=2.7in]{Figures/local_measure3.pdf} \caption{Comparison between reactive processing with selective logging and batch processing.} \label{measure3} \end{figure} \section{Optimizing Fog-Device Allocations} \label{optmodel} To understand the fog-to-device allocation problem, let's start with a configuration where all the devices are connected to the cloud. The devices are injecting data into the cloud via the logger constructs (defined in the program) and expect the cloud resident program (i.e., controller program) to operate on that data to create further data or actions that will steer the computations at the devices. We can model this situation by representing loggers by vertices of a graph where the edges represent the relations that can exist among the devices with regard to processing the data in a given application scenario~\cite{simmhan2015}. Now, let's say we want to introduce fogs into the system. We can use the above graph to determine the best fog-to-device allocation. There are two considerations: \begin{enumerate} \item We want all devices that are inter-related with regard to data processing (i.e., their logger data) in a given fog. \item We want to account for fog failures by maintaining replicas with certain level of consistency and put the replicas in nearby fogs. \end{enumerate} In this section, we formulate and solve an optimization problem that does just that. The allocation optimizer process illustrated in Figure~\ref{allocator} provides the design to implement this functionality into the language runtime. The allocation optimizer essentially partitions a graph where the vertices represent the data objects (loggers) created by the devices and the edges represent the relationships among them. In addition, this graph holds shadow vertices that are additions created to represent replicas of the data objects created by the devices. As the name shadow implies, we don't expect the replica data object to be always current because maintaining fully consistent replicas is costly and could negate the performance advantage we are seeking from fog computing. To reduce the computation burden associated with maintaining replicas, we could even maintain an aggregate replica (i.e., the shadow vertex could be representing aggregate information about the actual data objects). \begin{figure}[!ht] \centering{\includegraphics[width=3.3in]{Figures/Allocator.pdf}} \caption{Allocation optimization model.} \label{allocator} \end{figure} The optimizer runs in the cloud where it receives the device and fogs locations. It uses the device-to-fog latency and inter-fog latency to map the devices to fog while satisfying the capacity constraint of the fogs. It also gives the placement of the shadow vertices to the fogs. A fog resolver that is embedded in the device receives the fog that the device should connect to called the primary fog and the corresponding shadow fogs. A shadow fog is an alternate fog to the primary fog that the shadow vertex is resident in. The fog resolver routes the device request to the appropriate fog using a request routing algorithm. The algorithm primarily routes the request to the primary fog and in the event of the primary fog failure which is detected by the algorithm, it routes the request to the shadow fogs. Mathematically, the allocation model is presented below. Let $D$ be the set of Devices and let $F$ be the set of Fogs. Let $x_{ij}$ be the decision variable such that \begin{equation*} x_{ij} = \begin{cases} 1 & \text{if device $i$ is mapped to fog $j$}\\ 0 & \text{otherwise} \end{cases} \end{equation*} and let $y_{jk}$ be the decision variable such that \begin{equation*} y_{jk} = \begin{cases} 1 & \text{if shadow vertex of devices in fog $j$ is mapped to fog $k$}\\ 0 & \text{otherwise} \end{cases} \end{equation*} The latency cost between device i and fog j is given as $c_{ij}$ and the update cost for shadow vertices between fog j and fog k is given as $u_{jk}$. Let $f_j$ be the fixed cost of using a fog service, $cap_{j}$ be the capacity of a fog j and the availability of a fog $a_j$ be defined as follows: \begin{equation*} a_{j} = \begin{cases} 1 & \text{if fog $j$ is available}\\ 0 & \text{otherwise} \end{cases} \end{equation*} The model is formulated as follows: \begin{equation} \begin{aligned} & {\text{minimize}} & & z = \sum_{j \in {\cal F}} f_{j}a_{j} + \sum_{j \in {\cal F}}\sum_{k \in {\cal F}}u_{jk}y_{jk} + \sum_{i \in {\cal D}}\sum_{j \in {\cal F}}c_{ij}x_{ij}\\ & \text{subject to} & & \sum_{j \in {\cal F}} x_{ij} = 1, \hspace{101pt} \forall i \!\in \!{\cal D} \\ & & & \sum_{j \in {\cal F}} y_{jk} = 2, \hspace{100pt} \forall k \!\in \!{\cal F}, j\neq k \\ & & & \sum_{i \in {\cal D}} x_{ij} \leq cap_{j}* a_{j}, \hspace{74pt} \forall j \in {\cal F}\\ & & & x_{ij}, y_{ij}, a_j \in \{0,1\} \end{aligned} \end{equation} The objective is to minimize the total costs involved while mapping the devices to fogs and ranking the placement of shadow vertices in fogs for each fog. In the objective function, the first term shows the cost of using an available fog, the second term the shows the cost of placing a shadow vertex in a fog and the third term shows the cost of mapping a device to a fog. The first constraint states that each device must be assigned to exactly one fog and the second constraint states that a shadow vertex should be placed in two fogs such that the initial fog is not chosen. The third constraint states that for each fog, the capacity of the fog should be respected. The model is solved using the IBM Cplex optimization solver. A sample data set and solution of the allocation model is given below. Given 8 devices and 5 fogs, the device-to-fog latency and inter-fog latency is given in tables \ref{devfog} and \ref{fogfog} respectively. The fogs have a fixed cost of service given as \$400 each, and we assume each fog to have a capacity of 3 however, the above parameters can be varied for each fog. The solution shows that three fogs should be employed and the distribution of devices to fogs is given in Figure \ref{soln}. Devices 1, 3 and 5 are mapped to Fog 3, while Fog 1 is mapped to devices 4, 6 and 8. Devices 2 and 7 are given to Fog 4. The shadow vertex for Fog 1 is placed in Fogs 3 and 4 while the shadow vertex for Fog 4 is placed in Fogs 1 and 2. Fog 2 and Fog 5 (not shown in the figure) are not available to devices. \begin{table} \caption{Device-to-Fog latency} \centering \label{devfog} \begin{tabular}{|l|l|l|l|l|l|} \hline \multicolumn{1}{|c|}{} & \multicolumn{1}{c|}{Fog 1} & \multicolumn{1}{c|}{Fog 2} & \multicolumn{1}{c|}{Fog 3} & \multicolumn{1}{c|}{Fog 4} & Fog 5 \\ \hline Device 1 & 24 & 74 & 31 & 51 & 84 \\ \hline Device 2 & 57 & 54 & 86 & 61 & 68 \\ \hline Device 3 & 57 & 67 & 29 & 91 & 71 \\ \hline Device 4 & 54 & 54 & 65 & 82 & 94 \\ \hline Device 5 & 98 & 81 & 16 & 61 & 27 \\ \hline Device 6 & 13 & 92 & 34 & 94 & 87 \\ \hline Device 7 & 54 & 72 & 41 & 12 & 78 \\ \hline Device 8 & 54 & 64 & 65 & 89 & 89 \\ \hline \end{tabular} \end{table} \begin{table} \caption{Inter-Fog latency} \centering \label{fogfog} \begin{tabular}{|l|l|l|l|l|l|} \hline \multicolumn{1}{|c|}{} & \multicolumn{1}{c|}{Fog 1} & \multicolumn{1}{c|}{Fog 2} & \multicolumn{1}{c|}{Fog 3} & \multicolumn{1}{c|}{Fog 4} & Fog 5 \\ \hline Fog 1 & 1000 & 74 & 31 & 51 & 84 \\ \hline Fog 2 & 57 & 1000 & 86 & 61 & 68 \\ \hline Fog 3 & 57 & 67 & 1000 & 91 & 71 \\ \hline Fog 4 & 54 & 54 & 65 & 1000 & 94 \\ \hline Fog 5 & 98 & 81 & 16 & 61 & 1000 \\ \hline \end{tabular} \end{table} \begin{figure}[!ht] \centering{\includegraphics[width=3.3in]{Figures/alloc_soln.pdf}} \caption{Optimization solution for sample data-set.} \label{soln} \end{figure} \section{Introduction} \label{sec1} The continuous popularity of cloud computing has created a large concentration of computing power at the core of the Internet. This has many well-documented~\cite{satyanarayanan2015edge, shi2016promise} problems for the Internet of Things applications that generate data at high rates and want to process them with short response times. Edge computing is a recent initiative to ease this concentration by building peripheral infrastructure that would place computing resources closer to the devices. Various studies have shown the potential of edge computing to reduce response times, lower bandwidth usage, enhance the energy efficiency, and so on. With the recent and escalating interest in smart cities and self-driving cars, a computing infrastructure at the edge that can be quickly leveraged by the devices (that is vehicles, sensors, and actuators) is sorely needed. For instance, self-driving cars generate lots of data using a variety of sensors attached to them. By sharing a portion of that data with edge resident servers, self-driving vehicles can enable powerful edge analytics that can be useful for public safety, augmented reality, and even self-driving cars~\cite{hu2015mobile}. The importance of a shared computing platform between smart cities and self-driving cars is already recognized, and efforts are underway for creating {\em Transportation Mobility Clouds} \footnote{https://medium.com/cityoftomorrow/why-were-working-with-autonomic-to-create-a-platform-that-can-power-future-cities-96700c2824e6}. Creating TMCs with edge and cloud resources will bring us closer to realizing the ultimate pervasive computing vision~\cite{satyanarayanan2001pervasive} at city scales with fast moving objects like cars. To achieve such large-scale platforms combining clouds and edge, we need to solve many interesting problems including: performing a handover of devices (i.e., vehicles or mobiles) from one edge server to another as they move through space, dealing with edge server (fog) failures, and maintaining data consistency across the platform, and handling temporary network disconnections. This paper describes a programming language and middleware we designed and implemented for creating large-scale platform consisting of resources at the cloud, fog, and device levels. Our language is heavily inspired by the ``software-defined networking'' (SDN) paradigm~\cite{mckeown2009software, kirkpatrick2013software} that allows the network operators to control the networks programmatically~\cite{bosshart2014p4}. SDN implements a ``controller-worker pattern'' where programs running in the controller determine how the workers (switches) should process the data flows. In SDN, the controller-worker inter-operation is realized using either a standardized protocol like OpenFlow \cite{mckeown2008openflow} (a bottom-up approach) or an embedded protocol definition language like P4~\cite{bosshart2014p4} (a top-down approach). Our language uses a controller-worker model like SDN. However, instead of relying on a standardized protocol for inter-operation, the controller and worker parts are synthesized from a single program by the compiler leveraging the elements of the language design. In SDN, determining the number of controllers and their locations are important problems that can impact performance and fault tolerance~\cite{lantz2010network}. A large-scale platform that admits mobile elements can be even more sensitive to controller locations. To address this problem, we use a hierarchy of controllers. Therefore, each program can be considered a tree with workers at the leaves and controllers elsewhere. A problem is solved by a horizontal composition of trees with each implementing a solution for a sub-problem. To illustrate the tree model for programs, let's consider a smart parking application (an example we implemented in the language and described in Section~\ref{samples}). The objective of parking. We can decompose this problem into three sub-problems: sensing for free spots, allocating spots for requests, and routing requests from the cars to the spot allocators. We develop one application for each of the sub-problems. So a tree will be responsible for aggregating the parking spot availability information. The leaves of the sensing tree will run in the sensors located at each parking spot, which notify the status of the spot. The root of the sensing tree will run in the cloud and will hold the global status information which may be in aggregate form. Similarly, the allocation application is organized as a tree that runs in the cloud, fogs, and devices. The devices could be street-level management stations. The third application (represented as yet another tree) could be the request broker that routes or aggregate the requests from the cars that seek parking. With the three trees mapped onto the same cloud, fog, and device nodes, the applications can talk with each other even while disconnections exist in the whole resource pool (i.e., some fogs along with their devices are disconnected, or some devices are disconnected from their associated fogs). The language provides primitives for creating inter-application data flows that can be used for the allocator to the spot sensor in the smart parking problem. Although the tree-based controller-worker model we have for each application can have many levels (to accommodate multiple fog levels~\cite{tang2015hierarchical}), we consider a three-level tree corresponding to cloud, fog, and device (mobile) levels like several recent studies~\cite{hong2013mobile, luan2015fog, stojmenovic2014fog}. Because a device has many possible fogs it could associate with to form the tree, there are interesting fog attachment (initial) and reattachment (in the event of a failure or mobility) problems. In the simplest case, these problems are solved by merely considering fog and device proximity. For fault tolerance, we need to replicate the immutable data objects held in the fogs, which creates data movement costs. Our work makes the following contributions towards the development of large-scale edge-centric computing platform. \begin{itemize} \item We developed a distributed-node programming model for the cloud, fog, and device hierarchy that can create horizontally composable programs. The programming model is based on distributed memory; hence, data flow mechanisms are provided to realize intra- and inter-application data exchanges irrespective of the physical node mappings. \item We designed and implemented a polyglot language that implements the distributed-node programming model. The language was used to implement several example applications, including a smart parking system and a distributed shell that runs on the cloud, fogs, and devices. \item We formulated several edge-centric programming patterns that leverage the unique features of the language. The programming patterns provide guidelines for the programmer to solve important problems like task placement and data feeding rate from sensors. \item We carried out several performance evaluation experiments on the language runtime and on the applications developed using the language. A Docker container-based emulator we developed was used to create various cloud, fog, and device configurations for the experiments. \end{itemize} Section~\ref{motivate} provides the motivations and challenges for this research work. The core programming model of the language is provided in Section~\ref{pmodel}. Section~\ref{ldesign} describes the design and implementation of the language. An optimization model for locating the fogs in the best server locations is given in Section~\ref{optmodel}. Experimental results are presented in Section~\ref{results}. Several edge-oriented programming patterns that are enabled by our programming language is given in Section~\ref{patterns}. Two sample applications are discussed in Section~\ref{samples}. Related work is described in Section~\ref{related}. \section{Language Design and Implementation} \label{ldesign} \subsection{Overview} The language described here implements the programming model explained in Section~\ref{pmodel}. It is a polyglot language; it brings together C and JavaScript with some additional constructs needed to implement the programming model. The C side implements the {\em worker} side of the programming model and JavaScript side implements the {\em controller} side. This means the C side runs at the lowest level of the system. For instance, embedded devices (e.g., sensors and actuators) will be running the C component. This allows us to target memory constrained devices (planned for the future). The JavaScript running in a NodeJS runtime is responsible for implementing the controllers. The NodeJS based controller can run from low power devices to all the way to cloud servers. The C side of our language is single threaded to match the JavaScript side. In the controller, if there is a workload that needs intensive processing, the pipes-and-filters pattern discussed in Section~\ref{patterns} should be used instead of holding the main thread. \subsection{Major Elements of the Language} \subsubsection{Remote Functions} Any function either on the C side or JavaScript (J) side could be designated as a remote function by prepending the keyword {\tt jsync} or the keyword {\tt jasync}. If the keyword {\tt jsync} is used, the remote function is a {\em synchronous} function. That is the calling node blocks until the function returns a value. A function prepended with {\tt jasync}, on the other hand, is {\em asynchronous} and is non-blocking. Also, there is no return value from an asynchronous function. However, a callback can be passed into such a function at invocation for future notification from the function. \subsubsection{Shared Persistent Variables} Loggers provide the ability to store data as a time series. Loggers can be specified at the device, fog or cloud level. The data will be stored at the level specified, and can only be accessed from that level. There are two types of loggers: cloud logger and fog logger. \begin{lstlisting}[language=JavaScript] jdata { double x as logger(cloud|fog); } \end{lstlisting} Writing to the logger from the C side is done by simply assigning to a declared logger variable as if it were any other variable that had already been declared. It can be used in any function that contains C code: \begin{lstlisting}[language=C] int testFunction() { x = 32; } \end{lstlisting} Broadcasters provide a mechanism for pushing data from the cloud or fog to the devices. Unlike a logger which contains a time series, a broadcaster contains at most one value available to the program at any given time. A broadcaster is defined with the {\tt broadcaster} keyword: \begin{lstlisting}[language=JavaScript] jdata { double x as broadcaster; } \end{lstlisting} Broadcaster data originates on fog or cloud nodes. Conditions are used to control where the data originates. For example, the execution of an activity that writes a value to a broadcaster may be restricted only to fog nodes (vs device and cloud nodes). Broadcaster data originating on a fog node: \begin{lstlisting}[language=JavaScript] jdata { double x as broadcaster; } jcond { fogonly: sys.type == "fog"; } jasync {fogonly} function fname() { x = fname1(); } \end{lstlisting} Broadcaster data originating on a cloud node: \begin{lstlisting}[language=JavaScript] jdata { double x as broadcaster; } jcond { cloudonly: sys.type == "cloud"; } jasync {cloudonly} function fname() { x = fname1(); } \end{lstlisting} When the broadcaster data is consumed, the latest value is always used. A function referencing a broadcaster does not execute until the node on which the program runs has received the latest value of the broadcaster. A condition referencing a broadcaster is always evaluated using the latest broadcaster value. In order to ensure producer-consumer synchronization, the runtime performs versioning of the broadcaster values. Example: \begin{lstlisting}[language=JavaScript] jdata { double pe as broadcaster; } jcond { pickpe: pe < sys.rank; // evaluated using the latest broadcaster value } jasync {pickpe} function fname() { double y = pe; // assigns the latest broadcaster value } \end{lstlisting} \subsubsection{Conditions on Functions} Conditions can be used to restrict the execution of an activity to certain nodes. For example, the execution of an activity may be restricted only to device nodes (vs fog and cloud nodes). If a logger appears in a {\tt jcond} definition, then its latest value is used when the condition is evaluated. A logger is a collection of data streams each coming from a different device. Each of these data streams has a latest value. The latest among those latest values is used as the value for the logger when the condition is evaluated. For example, consider a thermostat that is measuring the temperature in a room. The measurements are written to a logger temp. A function that executes periodically only on the devices turns on the heater when the temperature is too low. \begin{lstlisting}[language=JavaScript] // logger temp is in the global namespace jdata { double temp as logger(fog); } // condition lowtemp is in the global namespace jcond { lowtemp: sys.type == "dev" && temp < 18.5; } jasync {lowtemp} function fname() { // turns on the heater in the room } \end{lstlisting} \subsection{Implementation of the Language} To implement the language, we created a custom compiler that compiles the C and JavaScript code with added constructs. The compiler outputs a custom executable file that packages all the elements that are required to execute a program. A loader instantiates the custom executable on MacOS, Linux, or Raspberry Pi. The loader is also modified to work with docker containers so that large-scale experiments can be carried out on a docker container-based emulator for cloud-fog-device system. Our custom compiler is written using Ohm~\cite{dubroy2017incremental}, a parser generator created by Alex Warth. The middleware uses MQTT~\cite{hunkeler2008mqtt} and Redis (an in-memory data store)~\cite{carlson2013redis}. Figure~\ref{lstack} shows the key components of the language runtime. One of the foundational components is {\em resource discovery} (RD) that allows a program to discover all elements that would already be running in the network and are potential candidates to connect to. For instance, when a program is run in a device it should see all the fogs that are already running the same program. The device runtime selects the {\em best} fog among the available choices and connects to it. \begin{figure}[!ht] \centering \centering{\includegraphics[width=3.0in]{Figures/langstack.pdf}} \caption{Key components of the language runtime stack.} \label{lstack} \end{figure} Primarily, the language offers support for three operations: remote functions (i.e., RPCs), data management from logging and broadcasting, and conditional execution of remote functions. The remote functions are built on top of the publish-subscribe service provided by MQTT. One of the key additions is the time aligning task scheduling that is required to implement the synchronous Ctrl2Wrk functions. The logging and broadcasting take place through the Redis in-memory datastores. Redis provides very large persistent memory buffers where data could be written into. When a worker writes a fog logger, it would be staged through the intermediate Redis server at the device. Because the data is logged initially to the Redis at the device and then pushed from there to the Redis at the fog, logging can tolerate disconnections. Also, we can optimize the transfers to minimize the number of bytes transferred from the device to the fog. One of the important features we have in the language is the integration of machine learning into the language runtime. Using the RD component runtime determines the fogs that are available at different space-time points. We feed this data into a {\em neural network} (NN) based predictor and train it so that the NN-based predictor can tell the fogs a device would use in its journey ahead of the device reaching a given point. We can use this feature to speculatively change the association to the future work so that the handover latency can be minimized. Also, the any potential disconnections like a vehicle passing through a tunnel could be detected ahead of time and the runtime can advance or delay the launching of the remote tasks according to their criticality. At the core the runtime is responsible for launching the remote function calls and scheduling the data uploads and downloads. In the simplest case, the runtime can immediately launch the requests and data transfers and attempt retries in the event of failures. However, the system needs to more sophisticated to take advantage of the many fog choices and the changing situation with regard to fog proximity. To handle this complexity, we have a {\em resource management} (RM) component in the runtime. The RM expects the RD to discover a pool of resources and the NN-based predictors to forecast the expected performance. \section{Motivating Scenarios and Challenges} \label{motivate} In this section, we describe several scenarios that motivate the different design features of our language. Important challenges that need to be tackled while implementing these features are also discussed. \subsection{System levels \& Function Placement} A triple-leveled system with cloud, fog, device levels is widely~\cite{garcia2015edge} accepted as the edge computing reference architecture. In this architecture, cloud level is expected to handle functions that need to execute with global perspective while the fogs handle functions that need low response time and can run in local scope. The device level would run functions that are very critical but does not need remote data. In certain applications, the programmer may want to place the function statically at a given level. For instance, a directory look-up for people or devices should run at the global scope. However, such a function would fail to execute if the device is partitioned from the cloud. A pothole information collector function, on the other hand, would want to run in the local context (at the fog level) because information from a remote context is not very useful. The above examples illustrate static function to level assignment. In other cases, like a smart parking application, the parking spot search function needs to run at different levels depending on availability of parking spots and price the requester is willing to pay. \subsection{Adaptive Data Probing} The high-rate data updates from IoT is one of the primary motivators for edge computing~\cite{shi2016promise}. With edge computing, the high-speed data updates are stored and processed at the edge; thus, alleviating the network bottlenecks the data updates could create if they are sent to the clouds. Because edge resources have limited capacities and many applications from different users would want to use them, it is important to use the edge resource very efficiently~\cite{liang2017mobile}. One way to reduce the load on the edge itself is to throttle down the data update rates to reduce the storage and processing requirements. The actual data update rate an IoT should use is highly application dependent. However, the amount of throttling we need to employ is dependent on the resource scarcity because the applications would like to go at the highest possible fidelity if there are plenty of resources. For example, consider a heating, ventilation and air condition (HVAC) system which receives temperature, humidity and other measurements from a large number of sensors. To reduce the volume of data and processing overheads, the update rates could be set low. Suppose the system is reporting abnormal fluctuations in temperature or other parameters, we would want to increase the update rates to obtain large data traces and analyze them to detect possible root causes. Similarly, we could adjust sensing rates across different seemingly sensing zones that could shed light on each other in a root cause analysis. For instance, increasing traffic collisions at a road segment might need increased sensing at the road segments that bring in and lead away traffic from the given segment. The key requirements of adaptive data probing are adjusting the update rates of a sensor and selecting the sensors to adjust according to the application requirements and available edge resource capacities. \subsection{Fog Fault Tolerance} Fog resources that are placed at the edge and experiencing harsher conditions are bound to fail more than cloud resources that operate under highly controlled environments. Fog installations consist of small clusters of servers that are physically separated from each other, where the primary placement objective is to remain close to the eventual devices (mobiles or fixed) served by them. Because the different servers in a fog cluster experience the same harsh conditions, we can expect them to have a dominant common mode failure. That means to backup a fog server we need to select another fog from another cluster resulting in a relatively large latency between them. Therefore, typical cloud fault tolerant solutions (e.g., active state machine replication~\cite{bessani2014state}) are not applicable to fogs. Another fault-tolerant technique widely used in batch and stream processing systems is check-pointing and restarting~\cite{bala2012fault}. Because edge computing could be used for real-time applications such as operation control of IoT (e.g., drones), restarting from past checkpoints may not be appropriate; instead, restarts need to be performed from currently valid operating points. Edge computing primarily positioned as a performance enhancer or data/service localizer for the already dominant cloud computing paradigm. Therefore, fault tolerance should be added to fog resources while maintaining the performance and locality benefits. When a device is attached to a fog, it could upload significant amount of data to the server and the fog could apply processing operations on the data. So when the fog fails, one way to recover is to find another fog that could provide the lowest cost restoration of device's operating point to the previous one (e.g., lineage graphs~\cite{zaharia2012resilient}). \subsection{Edge Load balancing \& Unbalancing} Load balancing is an age-old problem~\cite{amis2000load} in server clusters; however, edge computing brings a new flavor because we need a low-latency scheduler~\cite{ousterhout2013sparrow} that is locality-aware and fault tolerant. Furthermore, task scheduling itself needs to be decentralized so that it could proceed without {\em completely} relying on a central scheduler for optimal decisions. For example, with a smart parking application, a car requesting parking needs to be connected to the fog that has most current information regarding the local parking spaces. At the same time, we need a fog that is not overly loaded because otherwise the car would be wasting precious time in the fog and lose available spots to late arriving cars. So the predicted loading of the fogs could be used to deploy multiple servers for a particular request zone. Multiple applications with different quality of service (QoS) requirements could be hosted by a fog resource at the same time. The load balancing requirements of the co-hosted applications could be quite diverse. Therefore, application-level coordination of load balancing is necessary. In emergency situations, devices in a certain zone or devices of a certain type could become more important (e.g., in natural disasters or terrorism-related situations, emergency services will have escalated privileges for resource access). The fog resource allocation for the devices with urgent applications should get precedence over other devices' requests. That is, we need controlled unbalancing schemes that would provide differential QoS to cater for emerging situations at the edge. \section{Edge-Oriented Programming Patterns} \label{patterns} In this section, we describe some interesting patterns that could be implemented in our language leveraging its unique edge-oriented design. The list of patterns provided here are not by any means exhaustive. An exhaustive enumeration of edge-oriented programming patterns would definitely help programmers harness this emerging resource stack. \subsection{Function Placement Pattern} When a controller calls a sub-controller, we could execute the call at any of the possible sub levels. For example, a call from the cloud could be executed at the fog or device. Similarly, when a worker calls a controller, we could execute that call in the device, fog, or cloud. The function placement pattern determines the exact location where the call actually executes. The function placement can be either static or dynamic. With static placement, we know at compile time where the function is going to run. We have either explicitly specified the location to run the function like device, fog, or cloud or we have left it to the default policy. The other option is to determine the location using conditions expressed on data values to determine the execution location. In the example below, we use a {\tt jcondition} rule to specify that function {\tt deviceOnly} should run on a device. This particular definition is redundant because the default policy does the same execution, but it illustrates the use of explicit specification. \begin{lstlisting}[language=JavaScript, caption=Sample \emph{jcondition} code fragment.] jcond { deviceOnly: sys.type == "device"; } jasync function {deviceOnly} deviceOnly { // Code to execute } \end{lstlisting} We can use {\tt logger} and {\tt broadcaster} to express conditionals based on which a function execution location can be decided. Suppose we want to run a function at the edge (on the fog), but if the fog it too overloaded we want to fallback on the cloud. We could implement such a condition as follows. We let the logger values push available load on the devices or fogs and the broadcaster sends down the load threshold set by the cloud. \begin{center} \begin{lstlisting}[language=JavaScript, caption=The \emph{loadCheck} and \emph{cloudRun} conditional rules.] jcond { loadCheck: sys.type == "fog" && load < 50; cloudRun: sys.type == "cloud"; } jdata { int load as logger; } jasync function {loadCheck||cloudRun} loadBalanced { // Code to execute } \end{lstlisting} \end{center} In the above code example, we use two {\tt jcondition} rules. The first rule \textit{loadCheck} will only run on a fog and uses the logger variable \textit{load} to check if the current load is below a fixed threshold. The load variable can be periodically updated elsewhere in the program by writing to the logger. The second {\tt jcondition} rule allows the function to be run on the cloud. We use a logical or with the two rules when defining the function, ensuring the function will always run. Because functions will always try to run on the lowest possible level of the tree, if the loadCheck condition passes the function will run on the fog, and if it fails then the function will run on the cloud. \subsection{Data Filtering Pattern} Data filtering is a pattern for reducing the network bandwidth usage by transforming the data closer to the edge: at the devices or fogs. Our language provides a logger construct to push the data into the network. Data filtering can be applied quite easily by rewriting the data streams carried by the logger at the device or fogs using application specific functions provided by the programmer. For instance, if a vehicle (device) is equipped with multiple ambient temperature sensors it is not necessary to record all of them to get an estimate of the environmental temperature. Suppose each temperature sensor is working as an independent C node with a corresponding logger instance, the device J could compare the results of all sensors and perform a decision about which temperature reading is most likely to be correct. In our example, we will pick the one with the lowest temperature, as this sensor is likely to be least affected by sunlight. We can then send this data to the fog, which can perform a second filter. As each fog represents a local physical area it would not be necessary to relay the temperature readings from each device connected to it to the cloud for the same space. An average of all the reported temperatures from the devices can be taken to account for different calibrations in the sensors. \begin{center} \begin{lstlisting}[language=JavaScript, caption=Controller-side data filtering code snippet.] jdata { int tempSensors as logger(device); int vehicleTemps as logger(fog); int areaAverage as logger(cloud); } jcond { deviceOnly: sys.type == "device"; fogOnly: sys.type == "fog"; } jasync function {deviceOnly} vehicleTempFinder() { var connectedDevices = tempSensors.size(); var lowestValue = tempSensors[0].getLastValue(); for(var i = 0; i < connectedDevices; i++) { var sensorTemp = connectedDevices[i].getLastValue(); if(sensorTemp < lowestValue) { lowestValue = sensorTemp; } } vehicleTemps = lowestValue; } jasync function {fogOnly} areaAverageCalculate() { var connectedVehicles = vehicleTemps.size(); var sum = 0; for(var i = 0; i < connectedVehicles; i++) { sum += vehicleTemps[i].getLastValue(); } areaAverage = sum / connectedVehicles; } \end{lstlisting} \end{center} The above code fragment shows the J side for data filtering. On the C side, not shown, we would have each node writing the temperature values to the device logger \emph{tempSensors}. The \emph{vehicleTempFinder} function will run on the device J node because of the {\tt deviceOnly} rule. This function goes through the last logged state of the {\tt tempSensors} logger and finds the one with the lowest value. It logs the result to a fog logger \emph{vehicleTemps}, which stores the found value. A fog only function \emph{areaAverageCalculate} takes the average of all the vehicle temperatures that are connected to that fog and saves it to the cloud logger \emph{areaAverage}. Another form of data filtering is using the technique of {\tt selective logging}. Instead of nodes' parents deciding which data is important from all the data that is sent, we could select what data we would like to log. In this case, we decide at a parent level such as the cloud, what criteria we are looking for in a device and tell it to turn on additional logging. For example, we could have vehicular devices that are logging their current position using GPS coordinates. The cloud would be connected to a live database of weather anomalies, such as smog. The cloud could then tell any vehicle that is within the GPS coordinates of a weather anomaly to turn on complete engine sensor logging so that a database of how the anomaly can affect engine performance can be created. \subsection{Fog Fail-Over Pattern}\label{fogfail} The Fog Fail-Over pattern deals with minimizing the disruption to the application from failures at the edge. For example, if a device was using the fog to perform long calculations you would not want to restart the calculations from the beginning. We could handle this by periodically saving the progress of the calculations in a logger from the fog. If the fog would then crash, the device would automatically connect to a new fog, but all progress would be lost. The cloud could detect that progress has restarted based on the data being saved to the logger, and could push out the last saved update from the failed fog to the newly connected fog using the broadcaster. This pattern is partially automated by the {\em shadow vertices} concept discussed in Section~\ref{patterns}. \begin{center} \begin{lstlisting}[language=JavaScript, caption=Code fragment showing simplified version fog fail-over pattern.] jdata { int saveState as logger; int recoveryState as broadcaster; } jcond { fogRun: sys.type == "fog"; cloudRun: sys.type == "cloud"; } var computation; jasync function {fogRun} fogCompute() { // assign progress update saveState.log(computation); var oldProgress = recoveryState.getLastValue(); if(oldProgress > computation) { computation = oldProgress; } } var saveStateLog; jasync function {cloudRun} cloudCheck() { var newUpdate = saveState[0].getLastValue(); if(newUpdate) < saveStateLog) { recoveryState.broadcast(saveStateLog); } else { saveStateLog = newUpdate; } } \end{lstlisting} \end{center} In the above code sample, we show a simplified version of the example described above. We assume there is only one device, one fog and one cloud. In the sample code (for illustration), we use an {\tt int} type logger to save progress. The \emph{fogCompute} function performs a calculation that is not shown, and saves the result to the cloud logger \emph{saveState}. The cloud runs a function \emph{cloudCheck} that checks if the state of the logger is further along than the previous result. If the result is less than the previous result, then the cloud can assume that the fog has failed and a new fog was brought in, restarting the computation. It then broadcasts the last recorded value back to the fog. The fog checks each time it writes to the log if the cloud has broadcasted a new greater value, showing that there was a previous fog further along in computation, and replaces its progress with the broadcasted value. When we add more devices and fogs to this example, we would have to include an identifier code in the logger so that the cloud would know which fog it is comparing progress with. \subsection{Pipes and Filters at the Edge Pattern} The Pipes and Filters at the Edge pattern is an adoption of the well known {\em Pipes and Filters} pattern. In our pattern, each J node (cloud, fog, or device) could concurrently communicate with the partner component to interchange data. This way the amount of data that can be interchanged can increase if the applications at the pipe endpoints have more overlapping nodes. Typically, the interchanges happen at the fog level because the devices may not be overlapping. The fogs are the most likely overlapping nodes between the two partner applications that are interconnected by the pipe. Taking advantage of this pattern, we can separate functionality into different sub-applications. Another major advantage of this pattern, the {\em disconnection tolerance}. For example, we could have an application that runs on all the smart lights in a room and a separate application that runs on smartphones. When the user connects the phones to the fog that the lighting is on, the applications could communicate with each other at the fog level using the pipes and filters pattern. When the user changes the state of the lighting on their phone, the message would be sent up to the fog using a logger. The fog would then use a in/out flow (key mechanism implementing the interchange necessary for the pipes and filters) to send a message to the application controlling the state of the lights, which would use a broadcaster to send a message to all lights in the room to change their state. \section{Programming Model} \label{pmodel} \subsection{Controller-Worker Programming Model} As a straw man considers a controller-worker model, where a single controller is managing many workers. A program written for such a model contains two types of functions: {\em local} and {\em remote}. The local functions run either in the controller or worker. They consume execution time and need to be scheduled according to the synchronization requirements of the remote functions. The remote functions can be either controller-to-worker (Ctrl2Wrk) functions or worker-to-controller (Wrk2Ctrl) functions. The Ctrl2Wrk functions run on all workers underneath the controller. Similarly, the Wrk2Ctrl functions are invoked by the workers and run on the controllers. The Wrk2Ctrl and Ctrl2Wrk functions can be either {\em synchronous} or {\em asynchronous}. With synchronous functions, the caller will block until the remote function returns the results. The asynchronous functions, on the other hand, do not block; the caller is free to execute the next statement after the remote execution launches. The controller and workers are independent nodes with independent address spaces. One way of exchanging data is through parameters for remote function calls. In many cases, IoT have time series data and update rates could be quite high. Remote function call parameters is not the best way of exchanging this type of data between the workers and controller. \subsection{Tree of Controllers and Varied Deployments} The single controller model could work with cloud computing. However, with edge computing, the single controller would make either the cloud or the fog not very useful. Therefore, we extend the controller to a tree of controllers. With this model, the root of the controller tree could be in cloud and leaves could connect to the workers. With a controller tree, the edge can host a controller at a subordinate level. Even the devices can host a subordinate controller (of course below the edge-level subordinate controller) to provide deeper autonomy. Figure~\ref{models} shows different ways of deploying tree of controllers and workers, controllers are denoted with J and workers denoted with C. As shown, a program developed for the controller-worker model could be deployed in a single device for stand-alone execution. It could be deployed across a collection of devices under a single fog with the J (controller) running in the fog and another J (local controller) in the devices along with the workers. The most general execution is the one with nodes at all three levels. \begin{figure}[!ht] \centering{\includegraphics[width=3.0in]{Figures/models.pdf}} \caption{Different tree deployment models.} \label{models} \end{figure} With a tree of controllers, it becomes possible for a controller to invoke remote function on another controller. The programming model restricts the remote Controller-to-Controller (Ctrl2Ctrl) functions to a sub-machine that is rooted at the calling controller. That is a controller cannot make a remote call on another controller above its level. \subsection{Data Flows in Controller-Worker Trees} As discussed earlier, we need an efficient data exchange mechanism between the controller and workers. Particularly with IoT, the update rates from workers to controllers could be quite high. The time series data that is predominantly interchanged can have gaps~\cite{fekade2017probabilistic} in them. We introduce two constructs to handle high-rate time-series data: loggers and broadcasters. The logger can be considered as a pipe that takes data written by a worker to its controller and then to the super controller and so on. We could also have the first hop controller processing the data to that it does not propagate further in the form it was written by the worker. Similarly, the broadcasters provide data flow downwards from the controllers to sub controllers or workers. The loggers and broadcasters do not offer any reliability. There could be reliable or learning (that repair the data streams or predict the stream values ahead of time) implementations of these constructs. \subsection{Inter-Application Data Exchanges} Complex applications can benefit from multiple trees that are working together by interchanging data and results. It is a pipe construct like the logger for a controller to push data to another controller. Unlike logger or broadcaster which interchange data with controllers at different levels, this construct works only with controllers at the same level and between two different applications. That is, two controllers (for example, the controllers at the fog or device levels) of the same application cannot be part of this interchange. \section{Related Work} \label{related} \subsection{Software Defined Programming} Software defined networking has inspired a host of software defined programming frameworks for IoT \cite{jararweh2015sdiot, liu2015software, tortonesi2016spf}, edge \cite{jararweh2016sdmec}, fog \cite{truong2015software, gebre2017mist} and cloud computing \cite{nastic2015rtgovops}. A software defined IoT framework encompassing software defined storage \cite{wu2013software} and software defined security \cite{al2015sdsecurity} was developed in \cite{jararweh2015sdiot}. The framework's model includes the following layers, the physical layer consisting of the physical devices in the system, the middleware layer where the IoT and software defined controllers reside and the application layer. A similar three-layered architecture was proposed in \cite{liu2015software} for smart urban sensing. MIST \cite{gebre2017mist}, a software defined fog system leveraging software defined mobility \cite{contreras2016software} for real-time surveillance was developed to provide device mobility and change adaptively based on context. Nodes are classified as being controllers, hosts or switches to enable seamless execution even in the presence of frequent changes in membership. A runtime framework for managing software defined IoT clouds was proposed in \cite{nastic2015rtgovops}. The goal of the framework is to abstract dynamicity and scalability issues from the management of software defined IoT cloud systems. The framework provides an automated and fine-grained central control and an autonomous IoT cloud resources aimed at improving system efficiency. \subsection{Cloud Programming} Orleans \cite{bykov2011orleans} is a software framework for building scalable and reliable cloud applications. Orleans uses an actor-based distributed components called grains that consist of isolated units. Grains communicate asynchronously through message passing and use a single-threaded execution model. In cases of high load and lower system throughput, Orleans creates multiple instances of a busy grain to handle the busy grains multiple simultaneous executions. The consistency model in Orleans is achieved using optimistic and atomic transactions that are isolated. One of the main design goals of Orleans is that the runtime handles system level attributes such as scalability, reliability, fault tolerance and durability while application developers only focus on the application logic. Dripcast \cite{nakagawa2014dripcast} is a Java based application development framework to integrate smart devices into cloud computing infrastructure. Further, it is a server-less framework for storing and processing Java objects in a cloud environment. These Java objects will be made available on smart things and users can manipulate those objects as if they are local objects. It implements transparent Java remote procedure call and a mechanism to read, store, and process Java objects in a distributed, scalable data store. \subsection{IoT Programming} Mobile Fog \cite{hong2013mobile} is a platform as a service programming framework for IoT. An interface with a single code is exposed that allows dynamic scaling. A Mobile Fog application consists of processes that cover defined geographical locations. Processes are connected in a three-tier hierarchical architecture and are distributed on computing elements such as cloud, fog and edge devices. Assumptions made in Mobile Fog are that fog computing infrastructure nodes are placed in the network and a programming interface is provided by the fog. Mobile Fog handles scaling by making application developers specify the scaling policy at each hierarchical level. Load balancing is based on creating on-demand fog instances at the same level as an over-loaded fog instance. Calvin \cite{persson2015calvin} is a framework that merges IoT and cloud in a unified programming model. It is an IoT programming framework, which combines the ideas of actor model and flow based computing. To simplify application development, it proposes four phases to be followed in a sequential fashion: describe, connect, deploy, and manage. These phases are supported by the runtime, APIs and communication protocols. The platform dependent part of Calvin runtime manages inter-runtime communication, transport layer support, abstraction for I/O and sensing mechanisms. The platform-independent runtime provides interface for the actors. The scheduler of the Calvin runtime resides in this layer. Calvin runtime supports multi-tenancy. Once an application is deployed, actors may share runtime with actors from other applications. Simurgh \cite{khodadadi2015simurgh} provides a high level-programming framework for IoT application development. The framework supports exposing of IoT services as RESTful APIs and composing the IoT services to create various flow patterns in a simplified manner. The overall Simurgh architecture has two main layers: things layer and platform layer. In the ``thing layer'' are network discovery and registration broker that listens to incoming connection requests from devices` and handles them. The ``platform layer'' stores information about things and services, manages flow design and composition, and handles requests. An API mediator assists programmers to expose their applications through RESTful APIs. The Simurgh framework provides detailed support to IoT development. Assistance to develop, manage and reuse flow patterns as provided in this framework is crucial for IoT programmers. \subsection{Mobile Computing Programming} Odessa \cite{ra2011odessa} proposes a mobile programming model where application developers structure applications as data flow graphs. Odessa is best suited for streaming applications where automatic data offloading and parallelism are desired attributes. An edge or connector in a data flow graph represents data dependencies between the vertices that represent different stages of processing. Processing stages in an application operate independently with no shared states and only communicate through connectors thus abstracting the programming details and complexity of different processing stages from one another. Odessa's programming design is based on the Sprout runtime \cite{pillai2009slipstream} which allows developers to write parallel and distributed applications while hiding the complexity behind them. \subsection{Comparisons with our Programming Language and Middleware} Inspired by SDN, our language and middleware follow a controller-worker model with multiple levels of controllers. Unlike software defined programming frameworks where the software defined controller has full autonomy over orchestrating the activities of workers, our programming language and middleware requires only a single program to be written for both the controllers and workers. The program is split at compile time into the controller and worker components. A bi-directional relationship exists between controllers and workers. Our language and middleware not only provide a programming interface like existing programming frameworks in IoT and cloud, but includes an allocation optimization model for careful assignment of workers to controllers. Similar to Orleans \cite{bykov2011orleans}, our programming language is single threaded and allows multi-application tenancy as in Calvin \cite{persson2015calvin}. Our language provides different programming patterns for dealing with issues such as fault tolerance, reliability and data manipulation unlike frameworks such as \cite{bykov2011orleans} where optimistic and atomic transactions are used to provide reliable and fault tolerant executions. Our language is not restrictive to certain types of applications like in \cite{ra2011odessa} which is most suited for streaming applications. Our language provides support for writing different types of applications ranging from data-intensive applications to control and actuation based applications.
\section{Introduction} There has been increasing interest in recent years toward applying ideas from coding theory to improve the performance of various computation, communication, and networking applications. For example, ideas from repetition coding has been applied to several setups in computer networks, e.g., by running a request over multiple servers and waiting for the first completion of the request by discarding the rest of the request duplicates \cite{ananthanarayanan2013effective,vulimiri2013low,gardner2015reducing}. Another direction is to investigate the application of coding theory in cloud networks and distributing computing systems \cite{jonas2017occupy,lee2018speeding}. A rule of thumb is that when the computational job consists of linear operations, coding techniques can be applied to improve the run-time performance of the system under consideration. Distributed computing refers to the problem of performing a large computational job over many, say $n$, nodes with limited processing capabilities. A coded computing scheme aims to divide the job to $k<n$ tasks and then to introduce $n-k$ redundant tasks using an $(n,k)$ code, in order to alleviate the effect of slower nodes, also referred to as \textit{stragglers}. In such a setup, it is assumed that each node is assigned one task and hence, the total number of \textit{encoded tasks} is $n$ equal to the number of nodes. Recently, there has been extensive research activities to leverage coding schemes in order to boost the performance of distributed computing systems \cite{lee2018speeding,li2016unified,reisizadeh2017coded,li2016coded,li2017coding,yang2017computing,lee2017high,dutta2016short,vulimiri2013low,wang2018coded,mallick2018rateless}. For example, \cite{lee2018speeding} has applied coding theory to combat the deteriorating effects of stragglers in matrix multiplication and data shuffling. The authors in \cite{reisizadeh2017coded} considered coded distributed computing in heterogeneous clusters consisting of servers with different computational capabilities. Most of the work in the literature focus on the application of maximum distance separable (MDS) codes. However, encoding and decoding of MDS codes over real numbers, especially when the number of servers is large, e.g., more than $100$, face several barriers, such as numerical stability, and decoding complexity. In particular, decoding of MDS codes is not robust against unavoidable rounding errors when used over real numbers \cite{higham2002accuracy}. Employing large finite fields, e.g., coded matrix multiplication using \textit{polynomial codes} in \cite{yu2017polynomial}, can be an alternative approach. However, applying large finite fields imposes further numerical barriers due to quantization when used over real-valued data. As we will show in Section III, MDS codes are \textit{theoretically} optimal in terms of minimizing the average execution time of any linear-coded distributed computing system. However, as discussed above, their application comes with some practical impediments, either when used over real-valued inputs or large finite fields, in most of distributed computing applications comprised of large number of local nodes. A sub-optimal yet practically interesting approach is to apply binary linear codes, consisting of $0$'s and $1$'s, and then perform the computation over real values. In this case, there is no need for the quantization as a zero in the $(i,j)$-th element of the generator matrix of the binary linear code means that the $i$-th task is not included in the $j$-th encoded task sent to the $j$-th node while a one means it is included. To this end, in this paper, we consider $(n,k)$ binary linear codes where all computations are performed over real-valued data inputs. A related work to this model is the very recent work in \cite{bartan2019polar} where binary polar codes are applied for distributed matrix multiplication. The authors in \cite{bartan2019polar} justify the application of binary codes over real-valued data and provide a decoding algorithm using polar decoder. In this work, we connect the problem of characterizing the average execution time of any coded distributed computing system to the error probability of the underlying coding scheme over $n$ uses of erasure channels (see \Lref{lemma1}). Using this connection, we characterize the performance limits of distributed computing systems such as the average execution time that any linear code can achieve (see \Tref{BLC}), the average job completion time using binary random linear codes (see \Cref{RC}), and the best achievable average execution time of any linear code (see \Cref{col5}) that can, provably, be attained using MDS codes requiring operations over large finite fields. Moreover, we study the gap between the average execution time of binary random linear codes and the optimal performance (see \Tref{thm7}) showing the normalized gap approaches zero as $n \rightarrow \infty$ (see \Cref{col8}). This implies that there exist binary linear codes that attain, asymptotically, the best performance any linear code, not necessarily binary, can achieve. We further study the performance of coded distributed computing systems using polar and Reed-Muller (RM) codes that can benefit from low-complexity decoding and superior performance, respectively. \section{System Model} We consider a distributed computing system consisting of $n$ local nodes with the same computational capabilities. The run time $T_i$ of each local node $i$ is modeled using a shifted-exponential random variable (RV), mainly adopted in the literature \cite{liang2014tofec,reisizadeh2017coded,lee2018speeding}. Then, when the computational job is equally divided to $k$ tasks, the cumulative distribution function (CDF) of $T_i$ is given by \begin{align}\label{shifted-exp} \Pr(T_i\leq t)=1-\exp\left(-\mu(kt-1)\right),~~~\forall ~\!t\geq 1/k, \end{align} where $\mu$ is the exponential rate of each local node, also called the straggling parameter. Using \eqref{shifted-exp} one can observe that the probability of the task assigned to the $i$-th server not being completed (equivalent to erasure) until time $t\geq1/k$ is \begin{align}\label{epst} \epsilon(t)\triangleq\Pr(T_i>t)=\exp\left(-\mu(kt-1)\right), \end{align} and is one for $t<1/k$. Therefore, given any time $t$, the problem of computing $k$ parts of the computational job over $n$ servers can be interpreted as the traditional problem of transmitting $k$ symbols, using an $(n,k)$ code, over $n$ independent-and-identically-distributed (i.i.d.) erasure channels. Note that the form of the CDF in \eqref{shifted-exp} suggests that $t_0\triangleq 1/k$ is the (normalized) deterministic time required for each server to process its assigned $1/k$ portion of the total job (all tasks are erased before $t_0$), while any time elapsed after $t_0$ refers to the stochastic time as a result of servers' statistical behavior (tasks are not completed with probability $\epsilon(t)$ for $t\geq t_0$). Given a certain code and a corresponding decoder over erasure channels, a \textit{decodable} set of tasks refers to a pattern of unerased symbols resulting in a successful decoding with probability $1$. Then, $P_e(\epsilon,n)$ is defined as the probability of decoding failure over an erasure channel with erasure probability $\epsilon$. For instance, $P_e(\epsilon,1) = \epsilon$ for a $(1,1)$ code. Note that the reason to keep $n$ in the notation is to specify that the number of servers, when the code is used in distributed computation, is also $n$. Finally, the total job completion time $T$ is defined as the time at which a decodable set of tasks/outputs is obtained from the servers. \section{Fundamental Limits} The following Lemma connects the average execution time of {any} linear-coded distributed computing system to the error probability of the underlying coding scheme over $n$ uses of an erasure channel. \begin{lemma}\label{lemma1} The average execution time of a linear-coded distributed computing system using a given $(n,k)$ code can be characterized as \begin{align} T_{\rm avg}\triangleq\E[T]&=\int_{0}^{\infty}P_e(\epsilon(\tau),n)d\tau\label{ET1}\\ &=\frac{1}{k}+\frac{1}{\mu k}\int_{0}^{1}\frac{P_e(\epsilon,n)}{\epsilon}d\epsilon\label{ET2}, \end{align} where $\epsilon(\tau)$ is defined in \eqref{epst}. \end{lemma} \begin{proof} It is well-known that the expected value of any RV $T$ is related to its CDF $F_T(\tau)$ as $\E[T]=\int_{0}^{\infty}(1-F_T(\tau))d\tau$. Note that $1-F_T(\tau)=\Pr(T>\tau)$ is the probability of the event that the job is not completed until some time $\tau$. Therefore, using the system model in Section II, we can interpret $\Pr(T>\tau)$ as the probability of decoding failure $P_e(\epsilon(\tau),n)$ of the code when used over $n$ i.i.d. erasure channels with the erasure probability $\epsilon(\tau)$. This completes the proof of \eqref{ET1}. Now given that for the shifted-exponential distribution $d\epsilon(\tau)/d\tau=-\mu k\epsilon(\tau)$, and that $P_e(\epsilon(\tau),n)=1$ for all $\tau\leq1/k$, we have \eq{ET2} by the change of variables. \end{proof} \noindent \textbf{Remark 1.} Note that \eqref{ET1} holds given any model for the distribution of the run time of the servers, while \eqref{ET2} is obtained under shifted-exponential distribution, with servers having a same straggling parameter $\mu$, and can be extended to other distributions in a similar approach. \begin{theorem} \label{BLC} The average execution time of any linear-coded distributed computing system can be expressed as \begin{align}\label{BL} T_{\rm avg}=\frac{1}{k}\left[1+\sum_{i=n-k+1}^{n}\frac{1}{i\mu}\right]+\frac{1}{\mu k}\sum_{i=1}^{n-k}\frac{1}{i}p(i,k), \end{align} where $p(i,k)$ is the average conditional probability of decoding failure, for an underlying decoder, given $i$ encoded symbols are erased at random. \end{theorem} \iffalse \begin{proof} The optimal maximum a posteriori (MAP) decoder can recover the $k$ input symbols given $n-i$ unerased encoded symbols if the corresponding $k\times(n-i)$ sub-matrix of the generator matrix of the code is full row rank. Given the definition of $p(i,k)$, this can happen with probability $1-p(i,k)$. Therefore, $P_e(\epsilon,n)$, defined in Lemma 1, can be characterized for linear codes with MAP detection as \begin{align}\label{BL-MAP} P^{\rm LC}_e(\epsilon,n)=\sum_{i=1}^{n}\begin{pmatrix} n\\i \end{pmatrix}\epsilon^{i}(1-\epsilon)^{n-i}p(i,k). \end{align} Accordingly, characterizing $T_{\rm avg}$ requires the calculation of integrals of the form $f_i\triangleq\int_{0}^{1}\epsilon^{i-1}(1-\epsilon)^{n-i}d\epsilon$ for $i=1,2,...,n$. Using part-by-part integration we can find the recursive relation $f_{i+1}=\frac{i}{n-i}f_i$ which, after some mathematical manipulations, results in $1/f_i={i\begin{pmatrix} n\\i \end{pmatrix}}$. Note that $p(i,k)=1$ for $i>n-k$ since we never can extract the $k$ parts of the original job from less than $k$ number of equations. Now, by substituting \eqref{BL-MAP} in \eqref{ET2} we can find $T_{\rm avg}^{\rm LC}$ as \eqref{BL}. \end{proof} \fi \begin{proof} Using the law of total probability and the definition of $p(i,k)$ we have \begin{align}\label{BL-MAP} P_e(\epsilon,n)=\sum_{i=1}^{n}\begin{pmatrix} n\\i \end{pmatrix}\epsilon^{i}(1-\epsilon)^{n-i}p(i,k). \end{align} Accordingly, characterizing $T_{\rm avg}$ requires computing integrals of the form $f_i\triangleq\int_{0}^{1}\epsilon^{i-1}(1-\epsilon)^{n-i}d\epsilon$ for $i=1,2,...,n$. Using part-by-part integration one can find the recursive relation $f_{i+1}=\frac{i}{n-i}f_i$ which results in $1/f_i={i\begin{pmatrix} n\\i \end{pmatrix}}$. Note that $p(i,k)=1$ for $i>n-k$, since one cannot extract the $k$ parts of the original job from less than $k$ encoded symbols. Then plugging \eqref{BL-MAP} into \eqref{ET2} leads to \eqref{BL}. \end{proof} Next, we characterize the average execution time using a random ensemble of binary linear codes with full-rank generator matrices. This random ensemble, denoted by ${\cal R}(n,k)$, is obtained by picking entries of the $k \times n$ generator matrix independently and uniformly at random followed by removing those matrices not having a full row rank from the ensemble. \noindent\textbf{Remark 2.} Note that \eqref{BL-MAP} together with the integral form in \eqref{ET2} suggest that a coded computing system should always encode with a full-rank generator matrix, otherwise, the average execution time does not converge. This is the reason behind picking the particular ensemble described above. Note that this is in contrast with the conventional block coding, where we can get an arbitrarily small average probability of error over a random ensemble of all $k \times n$ binary generator matrices. \iffalse \begin{lemma} \label{lemma2} Consider the random ensemble ${\cal R}(n,k)$ under maximum a posteriori (MAP) decoder. Then for $i=1,2,\dots,n$, the average of $p(i,k)$, defined in Theorem 2, can be expressed as \begin{align}\label{RCpe} P_f\triangleq\ 1-\frac{\prod_{j=1}^{k}\left(1-2^{j-1-n+i}\right)}{\prod_{l=1}^{k}\left(1-2^{l-1-n}\right)}. \end{align} \end{lemma} \fi \begin{lemma} \label{lemma2} The probability that the generator matrix of a code picked from $\mathcal{R}(n,k)$ does not remain full row rank after erasing $i$ columns uniformly at random, denoted by $p_f(i,k)$, can be expressed as \begin{align}\label{RCpe} p_f(i,k)= 1-\frac{\prod_{j=1}^{k}\left(1-2^{j-1-n+i}\right)}{\prod_{l=1}^{k}\left(1-2^{l-1-n}\right)}. \end{align} \end{lemma} \begin{proof} Define $l(m,k)$ as the probability of $k$ binary uniform random vectors $\mathbf{v}_i\in\mathbb{F}_2^m$ being linearly independent. It is well-known that \begin{align}\label{Pf} l(m,k)=\prod_{i=1}^{k}\left(1-2^{i-1-m}\right). \end{align} Let $\tilde{\mathbf{G}}$ denote the $k\times (n-i)$ matrix after removing $i$ columns of the $k\times n$ generator matrix $\mathbf{G}$ uniformly at random. Then \begin{align} p_f(i,k)&=\Pr\!\left(\big\{\mathrm{rank}(\tilde{\mathbf{G}})\neq k\big\}{\big |}\big\{\mathrm{rank}({\mathbf{G}})=k\big\}\right)\label{eq1}\\ &=1-\frac{\Pr\!\big(\big\{\mathrm{rank}(\tilde{\mathbf{G}})= k\big\}\big)}{\Pr\left(\big\{\mathrm{rank}({\mathbf{G}})=k\big\}\right)}\label{eq2}\\ &=1-\frac{\prod_{j=1}^{k}\left(1-2^{j-1-n+i}\right)}{\prod_{l=1}^{k}\left(1-2^{l-1-n}\right)},\label{eq4} \end{align} where \eqref{eq1} is by the definition of $p_f(i,k)$, \eqref{eq2} is by noting that $\Pr\!\big(\big\{\mathrm{rank}({\mathbf{G}})= k\big\}{\big |}\big\{\mathrm{rank}(\tilde{\mathbf{G}})=k\big\}\big)=1$, and \eqref{eq4} is by \eqref{Pf}. \end{proof} \begin{corollary} \label{RC} The average execution time using random linear codes from the ensemble ${\cal R}(n,k)$ under maximum a posteriori (MAP) decoding is given by \eqref{BL} while replacing $p(i,k)$ in \eqref{BL} by $p_f(i,k)$, characterized in Lemma 3. \end{corollary} \begin{proof} The proof is by noting that the optimal MAP decoder fails to recover the $k$ input symbols given $n-i$ unerased encoded symbols if and only if the corresponding $k\times(n-i)$ sub-matrix of the generator matrix of the code is not full row rank which occurs with probability $p_f(i,k)$. \end{proof} \iffalse \noindent\textbf{Remark 2.} Eq. \eqref{BL-MAP} together with the integral form in \eqref{ET2} suggests that a distributed computing system with random linear coding should always encode with full-rank generator matrices (the random generator matrix should be checked at the beginning to be full-rank) in order to guarantee a finite average execution time. Mathematically speaking, the integral in \eqref{ET2} will diverge for any $p^{\rm RC}(0,k)=\delta>0$. Intuitively, the coded distributed computing system never can solve the system of equations resulting in infinite execution time in $\delta$ percent of cases (leading to an infinite average time) no matter what are the other $p^{\rm RC}(i,k)$'s. This intuition is already adopted in the above analysis where the initial generator matrix is assumed to be full rank, i.e., $p(0,k)=0$. This is in contrast with the traditional coding theory where we can still get infinitesimal average error probabilities for small enough, but positive, $p(0,k)$'s (the average probability of error will be lower bounded by $p(0,k)$). \fi \noindent\textbf{Remark 3.} \Tref{BLC} implies that the average execution time using linear codes consists of two terms. The first term is independent of the performance of the underlying coding scheme and is fixed given $k$, $n$, and $\mu$. However, the second term is determined by the error performance of the coding scheme, i.e., $p(i,k)$ for $i=1,2,...,n-k$, and hence, can be minimized by properly designing the coding scheme. The following corollary of \Tref{BLC} demonstrates that MDS codes, if they exist,\footnote{It is in general an open problem whether given $n$, $k$, and $q$, there exists an $(n,k)$ MDS code over ${{\Bbb F}}_{\!q}$ \cite[Ch. 11.2]{macwilliams1977theory}.} are optimal in the sense that they minimize the average execution time by eliminating the second term of the right hand side in \eqref{BL}. However, for a large number of servers $n$, the field size needs to be also large, e.g., $q > n$ for Reed-Solomon (RS) codes. \begin{corollary}[Optimality of MDS Codes]\label{col5} For given $n$,$k$, and underlying field size $q$, an $(n,k)$ MDS code, if exists, achieves the minimum average execution time that can be attained by any $(n,k)$ linear code. \end{corollary} \begin{proof} MDS codes have the minimum distance of $d_{\rm min}^{\rm MDS}=n-k+1$ and can recover up to $d_{\rm min}^{\rm MDS}-1=n-k$ erasures leading to $p(i,k)=0$ for $i=1,2,...,n-k$. Therefore, the second term of \eq{BL} becomes zero for MDS codes and they achieve the following minimum average execution time that can be attained by any $(n,k)$ linear code: \begin{align}\label{MDS1} T_{\rm avg}^{\rm MDS}=\frac{1}{k}+\frac{1}{\mu k}\sum_{i=n-k+1}^{n}\frac{1}{i}. \end{align} \end{proof} Using \Tref{BLC} and Remark 3, and given that the generator matrix of any $(n,k)$ linear code with minimum distance $d_{\rm min}$ remains full rank after removing up to any $d_{\rm min}-1$ columns, we have the following proposition for the \textit{optimality criterion} in terms of minimizing the average execution time. \begin{proposition}[Optimality Criterion]\label{prop6} An $(n,k)$ linear code that minimizes $\sum_{i=d_{\rm min}}^{n-k}{p(i,k)/i}$ also minimizes the average execution time of a coded distributed computing system. \end{proposition} Although MDS codes meet the aforementioned optimality criterion over large field sizes, to the best of our knowledge, the optimal linear codes, given the field size $q$ and in particular for $q=2$, per \Pref{prop6} are not known and have not been studied before, which calls for future studies. In the following theorem we characterize the gap between the execution time of binary random linear codes and the optimal execution time. Then \Cref{col8} proves that binary random linear codes \textit{asymptotically} achieve the normalized optimal execution time, thereby demonstrating the existence of \textit{good} binary codes for distributed computation over real-valued data. The reason we compare the normalized $nT_{\rm avg}$'s instead of $T_{\rm avg}$'s is that, using \eqref{BL}, $T_{\rm avg}$ has a factor of $1/k$ and hence, $\lim_{n\to\infty}T_{\rm avg}=0$ for a fixed rate\footnote{More precisely, the coding rate over field size $q$ is equal to $k\log_2 q/n$ but with slight abuse of terminology we have dropped the factor of $\log_2 q$ since this factor is not relevant for coded distributed computing.} $R\triangleq k/n >0$. \iffalse ****************************************************** \begin{theorem}[Asymptotic Optimality of Binary Random Linear Codes]\label{thm7} Let $T_{\rm avg}^{\rm BRC}$ denote the average execution time of a coded distributed computing system using binary random linear codes. The scaled version of $T_{\rm avg}^{\rm BRC}$ by $n$ asymptotically approaches $nT_{\rm avg}^{\rm MDS}$. In particular, for any given $k$, $n$, and hence fixed encoding rate $R\triangleq k/n$,\footnote{More precisely, the coding rate over field size $q$ is equal to $k\log_2 q/n$. However, the capacity of a $q$-ary erasure channel is also $(1-\epsilon)\log_2 q$. Therefore, since we are dealing with the comparisons among the rate and capacity, we can simply drop the factor of $\log_2 q$; in this case, the rate and capacity are defined in the unit symbols, instead of bits, per transmission.} there exist constants $c_2>c_1>0$ such that \begin{align}\label{asymp-gap} c_1\frac{\log_2n}{n}\leq |nT_{\rm avg}^{\rm MDS}-nT^{\rm BRC}_{\rm avg}|\leq c_2\frac{\log_2n}{n}, \end{align} where \eqref{asymp-gap} holds for asymptotically large $n$. \end{theorem} \begin{proof} Using \Cref{RC} and \Cref{col5}, we have \begin{align}\label{S} \mathcal{S}\triangleq\mu R|nT_{\rm avg}^{\rm MDS}-nT^{\rm BRC}_{\rm avg}|=\sum_{i=1}^{n-k}\frac{1}{i}p_f(i,k). \end{align} The goal here is to show that $\mathcal{S}$ goes to zero as $n\to\infty$. To do so, let us take a function $v(n)$ that sub-linearly grows with $n$ and blows up to infinity as $n\to\infty$. Then, by splitting the summation in \eqref{S}, we have $\mathcal{S}=\mathcal{S}_1+\mathcal{S}_2$ where \begin{align}\label{S1} \mathcal{S}_1\triangleq\sum_{i=n-k-v(n)+1}^{n-k}\frac{1}{i}p_f(i,k). \end{align} Clearly, $\mathcal{S}_1$, in the limit of large $n$, can be upper-bounded as \begin{align}\label{S1inf} \lim_{n\to\infty}\mathcal{S}_1<\frac{v(n)}{n-k}=\frac{1}{1-R}\frac{v(n)}{n}. \end{align} Therefore, $\lim_{n\to\infty}\mathcal{S}_1=0$. Moreover, $\mathcal{S}_2$ is defined as \begin{align}\label{S2} \mathcal{S}_2\triangleq\sum_{i=1}^{n-k-v(n)}\frac{1}{i}p_f(i,k). \end{align} To upper-bound $\mathcal{S}_2$, we first note that $p_f(i,k)$, defined in \eqref{RCpe}, is a monotonically increasing function of $i$. Then, \begin{align} \mathcal{S}_2&<p_f(n-k-v(n),k)\sum_{i=1}^{n-k-v(n)}\frac{1}{i}\label{S2,1}\\ &=p_f(n-k-v(n),k)\ln\left(n-k-v(n)\right)\label{S2,2}. \end{align} Therefore, we only need to show that $p_f(n-k-v(n),k)$ goes to zero in a larger speed than $\ln(n)$ to establish that $\lim_{n\to\infty}\mathcal{S}_2=0$. To do so, we note that \begin{align} \!\!\!\lim_{n\to\infty}p_f(n\!-\!k\!-\!v(n),k)\!&=\!1\!-\!\!\lim_{n\to\infty}{\prod_{j=1}^{k}\!(1\!-\!2^{j-1-k-v(n)})}\!\label{pfinf1}\\ &<1-\lim_{n\to\infty}\exp\left(-k/2^{v(n)}\right)\label{pfinf2}\\ &\approx \lim_{n\to\infty}nR2^{-v(n)}\label{pfinf3}. \end{align} where \eqref{pfinf1} is using \eqref{RCpe} by noting that $\lim_{n\to\infty}{\prod_{l=1}^{k}\left(1-2^{l-1-n}\right)}=1$, Eq. \eqref{pfinf2} follows by noting that $\prod_{j=1}^{k}(1-2^{j-1-k-v(n)})={\prod_{j'=1}^{k}(1-2^{-j'-v(n)})}>[1-2^{-v(n)}]^k\approx\exp\left(-k/2^{v(n)}\right)$, and \eqref{pfinf3} follows by the Taylor's expansion $\exp(-x)\approx1-x$ for small $x>0$ and inserting $k=nR$. Finally, using \eqref{S2,2} and \eqref{pfinf3}, one can observe that the choice of $v(n)=(1+\delta_c)\log_2(n)$ for any $\delta_c>0$ results in $\lim_{n\to\infty}\mathcal{S}_2<\lim_{n\to\infty}\frac{nR\ln(n(1-R))}{n^{1+\delta_c}}$. Therefore, with this choice of $v(n)$ we have shown that $\lim_{n\to\infty}\mathcal{S}_2=0$ and hence, $\lim_{n\to\infty}\mathcal{S}=0$. In fact any $v(n)$ that grows sub-linearly with $n$ proves that $\lim_{n\to\infty}\mathcal{S}=0$. However, given the speed of convergence of $\mathcal{S}_2$ and that of $\mathcal{S}_1$ in \eqref{S1inf}, one can observe that increasing the the growth speed of $v(n)$ decreases the convergence speed of $\mathcal{S}_1$ to zero (increases the upper bound in \eqref{S1inf}) and increases the convergence speed of $\mathcal{S}_2$. The upper bounds on the limits of $\mathcal{S}_1$ and $\mathcal{S}_2$ coincide by the choice of $v(n)$ of the form of $c\log_2(n)$ for some constant $c$; this completes the proof of \eqref{asymp-gap}. \end{proof} *************************************************************************************************** \fi \begin{theorem}[Gap of Binary Random Linear Codes to the Optimal Performance]\label{thm7} Let $T_{\rm avg}^{\rm BRC}$ denote the average execution time of a coded distributed computing system using binary random linear codes. Then, for any given $k$, $n$, we have \begin{align}\label{asymp-gap} &\frac{1}{3\mu R(1-R)n}< |nT_{\rm avg}^{\rm MDS}-nT^{\rm BRC}_{\rm avg}|<\frac{1}{\mu R}\times\nonumber\\ &\hspace{0.8cm}\left[\frac{v(n)}{n\!-\!k\!-\!v(n)\!+\!1}\!+\!nR2^{-v(n)}\ln\left(n\!-\!k\!-\!v(n)\right)\right]\!, \end{align} where $R$ is the rate and $v(n)$ is an arbitrary function of $n$ with $0 \leq v(n)\leq n-k$. \end{theorem} \begin{proof} Using \Cref{RC} and \Cref{col5}, we have \begin{align}\label{S} \mathcal{S}\triangleq\mu R|nT_{\rm avg}^{\rm MDS}-nT^{\rm BRC}_{\rm avg}|=\sum_{i=1}^{n-k}\frac{1}{i}p_f(i,k). \end{align} The lower bound in \eqref{asymp-gap} is by noting that $$ \mathcal{S}>p_f(n-k,k)/(n-k), $$ where $p_f(n-k,k)$ can be expressed as \begin{align}\label{lb1} \!p_f(n\!-\!k,k)\!=\!1\!-\!\frac{1\!-\!2^{-k}}{1\!-\!2^{-n}}\cdot\frac{1\!-\!2^{-k+1}}{1\!-\!2^{-n+1}}\!\cdot\!...\!\cdot\frac{1-2^{-1}}{1\!-\!2^{k-n-1}}.\! \end{align} Note that $p_f(n-k,k)=0$ for $n=k$. For $n>k$, since $1-2^{-k+j}>1-2^{-n+j}$ for $j=0,1,...,k-2$, we have \begin{align} p_f(n-k,k)\!>\!1\!-\!\frac{1-2^{-1}}{1\!-\!2^{k-n-1}}\!>\!1\!-\!\frac{1-2^{-1}}{1\!-\!2^{-1-1}}\!=\!\frac{1}{3}. \end{align} Therefore, $\mathcal{S}>\frac{1}{3(1-R)n}$. To prove the upper bound, the summation in \eqref{S} is split as $\mathcal{S}=\mathcal{S}_1+\mathcal{S}_2$ where \begin{align} \mathcal{S}_1\triangleq\sum_{i=n-k-v(n)+1}^{n-k}\frac{1}{i}p_f(i,k)&<\frac{v(n)}{n-k-v(n)+1},\label{S1,1} \end{align} and \begin{align}\label{S2} \mathcal{S}_2\triangleq\sum_{i=1}^{n-k-v(n)}\frac{1}{i}p_f(i,k). \end{align} To upper-bound $\mathcal{S}_2$, we first note that $p_f(i,k)$, defined in \eqref{RCpe}, is a monotonically increasing function of $i$. Then, \begin{align} \mathcal{S}_2&\leq p_f(n-k-v(n),k)\sum_{i=1}^{n-k-v(n)}\frac{1}{i}\label{S2,1}\\ &<p_f(n-k-v(n),k)\ln\left(n-k-v(n)\right)\label{S2,2}. \end{align} We can further upper-bound $p_f(n-k-v(n),k)$ as \begin{align} p_f(n-k-v(n),k)&<1-{\prod_{j=1}^{k}(1-2^{j-1-k-v(n)})}\label{pfinf1}\\ &<1-\left[1-2^{-v(n)}\right]^k\label{pfinf2}\\ &\leq nR2^{-v(n)}\label{pfinf3}, \end{align} where \eqref{pfinf1} is by \eqref{RCpe} together with ${\prod_{l=1}^{k}\left(1-2^{l-1-n}\right)}\leq1$, \eqref{pfinf2} follows by noting that $$\prod_{j=1}^{k}(1-2^{j-1-k-v(n)})={\prod_{j'=1}^{k}(1-2^{-j'-v(n)})}>[1-2^{-v(n)}]^k,$$ and \eqref{pfinf3} follows by Bernoulli's inequality $(1-x)^k\geq1-kx$ for any $0<x<1$ and then inserting $k=nR$. \end{proof} \begin{corollary}[Asymptotic Optimality of Binary Random Linear Codes]\label{col8} The normalized average execution time $nT_{\rm avg}^{\rm BRC}$ approaches $nT_{\rm avg}^{\rm MDS}$ as $n$ grows large. More precisely, for a given rate $R$, there exist constants $c_1,c_2>0$ such that for sufficiently large $n$, i.e., $k=nR$, we have \begin{align}\label{asymp-gap2} c_1\frac{1}{n}\leq |nT_{\rm avg}^{\rm MDS}-nT^{\rm BRC}_{\rm avg}|\leq c_2\frac{\log_2 n}{n}. \end{align} \end{corollary} \begin{proof} The lower bound holds with $c_1=1/{3\mu R(1-R)}$ according to the left hand side of \eq{asymp-gap}. Observe that with the choice of $v(n)=2\log_2 n$ both terms in the right hand side of \eq{asymp-gap} become $O(\frac{\log_2 n}{n})$. Note that $n-k=n(1-R) \geq 2\log_2 n$, for sufficiently large $n$. Hence, the upper bound of \eq{asymp-gap2} also holds with a proper choice of $c_2$. \end{proof} \iffalse For any fixed $0<\alpha<1$ and $R=\frac{k}{n}$, we have $$ \lim_{n \rightarrow \infty} p_f(n-k-(2+\alpha)\log{n},k)< (1+o(1))Rn2^{-n^\alpha} $$ It is easy to verify that $\lim_{n \rightarrow \infty}\prod_{l=1}^{nR}\left(1-2^{l-1-n}\right)=1$. Then, for numerator of the fraction in \eqref{eq4} with $i=n-k-n^{\alpha}$ we have the following: $$ \prod_{h=1}^{k}\left(1-2^{j-1-k-n^\alpha}\right)=\prod_{j=1}^{k}\left(1-2^{-h-n^\alpha}\right)>(1-2^{n^\alpha})^{nR}= $$ \fi \iffalse ********************************************************************************* \begin{theorem} \label{asymptotMDS} An MDS code (if exists) with a fixed rate $R\triangleq k/n$,\footnote{More precisely, the coding rate over field size $q$ is equal to $k\log_2 q/n$. However, the capacity of a $q$-ary erasure channel is also $(1-\epsilon)\log_2 q$. Therefore, since throughout this subsection we are dealing with the comparisons among the rate and capacity, we can simply ignore the factor of $\log_2 q$ in the definition of rate and capacity; in this case, they are defined in the unit symbols, instead of bits, per transmission.} has the following asymptotic probability of error over an erasure channel with the erasure probability $\epsilon$. \begin{equation} \label{threshold property} \lim_{n \rightarrow \infty} P_e(\epsilon,n)=\left\{ \begin{array}{ll} 0, & \epsilon<1-R\\ 1, & \epsilon>1-R \end{array} \right. \end{equation} \end{theorem} \begin{proof} For an MDS code, the probability of error over erasure channel is $1$ if the number of erased symbols is greater than $n-k$ and $0$ otherwise. Let $X_i$ denote an indicator RV associated with the $i$-th coordinate in a codeword which takes the value of $1$ if the $i$-th symbol is erased and $0$ otherwise. Then, the probability of error for the MDS code is \begin{align} P_e(\epsilon,n)=\Pr\left(X_1+X_2+\hdots+X_n > n-k\right) \end{align} which is closely related to the CDF of a binomial RV. Note that all $X_i$'s are i.i.d. Bernoulli RVs with mean $\epsilon$ and variance $\sigma^2=\epsilon(1-\epsilon)$. Then by central limit theorem we know that $\sqrt{n}(\frac{X_1+\hdots+X_n}{n}-\epsilon)$ converges to a normal RV $N=\mathcal{N}(0,\sigma)$, in distribution. Hence, \begin{align} \lim_{n\to\infty} P_e(\epsilon,n)&= \lim_{n\to\infty} \Pr\!\big(N>\sqrt{n}(\frac{n-k}{n}-\epsilon)\big)\\ &= \lim_{n\to \infty} \Pr\!\big(N>\sqrt{n}(1-R-\epsilon)\big)\\ &=\left\{ \begin{array}{cc} 0,& 1-\epsilon> R \\ 1,& 1-\epsilon< R \end{array}\right \end{align} \end{proof} \begin{corollary} \label{linearcodethresholdproperty} For all linear codes with a fixed rate $R$, the probability of error over an erasure channel with the erasure probability $\epsilon$ approaches $1$ as $n\to\infty$ for $\epsilon>1-R$. \end{corollary} \begin{proof} Since the error probability of an (n,k) linear code is lower-bounded by the error probability of the corresponding MDS code (all linear codes fail to recover the messages if the number of erased symbols is more than $n-k$), from \Tref{asymptotMDS} we conclude that all linear codes have the probability of error approaching $1$ for $\epsilon>1-r$ as $n \rightarrow \infty$. \end{proof} \noindent\textbf{Remark 5.} \Cref{linearcodethresholdproperty} implies that for all linear codes, $\lim_{n\to \infty}P_e(\epsilon,n)=1$, when $\epsilon>1-R$ . Consequently, if there exists a linear code with $\lim_{n\to \infty}P_e(\epsilon,n)=0$, for $\epsilon<1-R$, then this code attains the asymptotically-optimal expected time for any linear-coded distributed computing system (recall \Tref{thm5} and \Pref{prop6}). In fact, any capacity-achieving code for the erasure channel satisfies this requirement, and hence is asymptotically-optimal for coded distributed computation. ************************************************************************************************************ \fi \iffalse \begin{theorem} \label{capacityachieving} Any $(n,k)$ linear capacity-achieving code for the erasure channel can, asymptotically, achieve the optimal $T_{\rm avg}$ of the coded distributed computing system. \end{theorem} \begin{proof} Using the strong converse of Shannon channel coding theorem, see e.g., \cite{cover2012elements}, the error probability goes exponentially to $1$ for rates above capacity. By defining rate as $R\triangleq k/n$ and the capacity of erasure channel as $C=1-\epsilon$,\footnote{More precisely, the coding rate over field size $q$ is equal to $k\log_2 q/n$. However, the capacity of a $q$-ary erasure channel is also $(1-\epsilon)\log_2 q$. Therefore, since throughout this subsection we are dealing with the comparisons among the rate and capacity, we can simply ignore the factor of $\log_2 q$ in the definition of rate and capacity; in this case, they are defined in the unit symbols, instead of bits, per transmission.} we have $\lim_{n\to \infty}P_e(\epsilon,n)=1$, for $\epsilon>1-R$. Moreover, for any capacity-achieving code we have $\lim_{n\to \infty}P_e(\epsilon,n)=0$, for $\epsilon<1-R$. This implies that a linear capacity-achieving code for erasure channels has the same asymptotic behaviour as an MDS code, in the sense of probability of error, thereby asymptotically achieves the optimal $T_{\rm avg}$ in \eqref{MDS1} given $k$, $n$, and $\mu$. Note that the condition $\lim_{n\to \infty}P_e(\epsilon,n)=0$ for $\epsilon<1-R$ can \textit{roughly} be interpreted as $p(i,k)=0$ for the number of erasures $i\approx n\epsilon<n-k\approx n-k+1$ in the limit of $n\to \infty$ which proves the statement of the theorem in a different way using \Cref{col5} and \Pref{prop6}. \end{proof} \noindent\textbf{Remark 4.} \Tref{capacityachieving} determines the criterion for a coding scheme to be asymptotically optimal given $k$, $n$, and $\mu$. In fact, in large block-lengths, the capacity-achieving codes for erasure channels (which are well studied in coding theory literature) have the same performance as MDS codes (in the sense of probability of error) which we even do not know if they exist. \fi \noindent\textbf{Remark 4.} \label{optimumrate} Using \eqref{MDS1} and a similar approach to \cite{lee2018speeding}, one can show that the asymptotically-optimal encoding rate $R^*$ for an MDS-coded distributed computing system is the solution to \begin{align}\label{RR} (1-R^*)\ln(1-R^*)=\mu(1-R^*)-R^*. \end{align} \Cref{col8} implies that for distributed computation using binary random linear codes, the gap of $nT^{\rm BRC}_{\rm avg}$ to $nT^{\rm MDS}_{\rm avg}$ converges to zero as $n$ grows large. Accordingly, the optimal encoding rate also approaches $R^*$, described in \eqref{RR}. \iffalse any homogeneous distributed computing system, using a capac code The asymptotically-optimal encoding rate $R^*$ of any homogeneous distributed computing system, using a capacity-achieving linear code, comprised of $n$ local nodes under shifted-exponential model with straggling parameter $\mu$ can be obtained as the solution of the following equation. Accordingly, the optimal value of $k$ for the underlying $(n,k)$ coding scheme will be $k^*=[nR^*]$, where $[\cdot]$ denotes the nearest integer function. \begin{proof} In the limit of $n\to\infty$, the error probability of the underlying capacity-achieving code takes a sharp transition at the channel capacity $C=1-\epsilon$, i.e., $P_e(\epsilon,n)=0$ for $R<C$ and $P_e(\epsilon,n)=1$ for $R>C$. Using \eqref{ET2} we have \begin{align}\label{asymp} T_{\rm avg}^{(\infty)}=\frac{1}{k}+\frac{1}{\mu k}\int_{1-R}^{1}\frac{1}{\epsilon}d\epsilon=\frac{1}{nR}\left[1-\frac{\ln(1-R)}{\mu}\right], \end{align} where we substituted $k$ by $nR$. Now, by equating the derivative of $T_{\rm avg}^{(\infty)}$ with zero we get the optimal encoding rate as the solution of \eqref{RR}. \end{proof} \f \begin{table*} \centering \caption{Average execution time and optimal $k^*$ values for different coding schemes as well as their gap $g_{\rm opt}$ to the optimal performance and their performance improvement gain ${G}_{\rm cod}$ compared to the uncoded computing.} \label{table}\vspace{-0.2cm} \begin{tabular}{||M{0.09in}||M{0.65in}|M{0.8in}|M{1.1in}|M{1.1in}|M{1.1in}|M{1.1in}||} \hline\hline \vspace{0.1cm} $\!\!n$ & {Uncoded}& {MDS coding}& {Binary random coding}& {Polar coding with SC}& {Polar coding with ML}& {RM coding with ML}\\ \cline{2-7} & $(T_{\rm avg},g_{\rm opt})$ & $(T_{\rm avg},k^*,{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ \\ \hline \hline $\!\!8$ & $(0.4647,25\%)$& $(0.370,6,20\%)$&$(0.460,7,25\%,1.1\%)$&$(0.412,7,11\%,12\%)$&$(0.40,7,5.5\%,16\%)$&$(0.389,7,5.1\%,16\%)$\\\hline $\!\!16$ & $(0.2738,44\%)$& $(0.191,11,31\%)$&$(0.226,11,18\%,18\%)$&$(0.217,11,14\%,21\%)$&$(0.199,11,4.2\%,28\%)$&$\!(0.198,11,3.6\%,28\%)$\\ \hline $\!\!32$ & $(0.1581,63\%)$& $(0.0968,22,39\%)$&$(0.105,21,8.6\%,34\%)$&$(0.114,24,18\%,28\%)$&$(0.105,26,7.9\%,34\%)$&$\!(0.104,26,7.2\%,34\%)$\\ \hline $\!\!64$ & $(0.0897,84\%)$& $(0.0488,44,46\%)$&$(0.051,43,3.9\%,44\%)$&$(0.0584,44,20\%,35\%)$&$\!(0.0533,46,9.4\%,41\%)$&$\!(0.050,42,2.6\%,44\%)$\\ \hline $\!\!\!128$ & $\!\!(0.0503,105\%)$& $\!(0.0245,88,51\%)$&$\!(0.025,87,1.9\%,50\%)$&$\!(0.0293,88,19\%,42\%)$&$\!(0.0255,91,4.2\%,50\%)$&$\!(0.0252,97,2.8\%,50\%)$\\ \hline $\!\!\!256$ & $\!\!(0.0278,127\%)$& $\!\!(0.0123,175,56\%)$&$\!\!(0.0124,174,0.9\%,56\%)$&$\!\!(0.0146,182,19\%,48\%)$&$\!\!(0.0129,186,5.5\%,54\%)$&$\!\!\!(0.0123,166,0.6\%,56\%)$\\ \hline $\!\!\!512$ & $\!\!(0.0153,149\%)$& $\!\!\!(0.0061,350,60\%)$&$\!\!\!(0.0062,349,0.5\%,60\%)$&$\!\!(0.0073,388,19\%,52\%)$&$\!\!\!(0.0065,393,5.9\%,57\%)$&$\!\!\!(0.0061,353,0.1\%,60\%)$\\ \hline\hline \end{tabular} \vspace{-0.4cm} \end{table*} \iffalse *************************** \begin{table*} \centering \caption{Average execution time and optimal $k^*$ values for different coding schemes as well as their gap $g_{\rm opt}$ to the optimal performance and their performance improvement gain ${G}_{\rm cod}$ compared to the uncoded computing.} \begin{tabular}{||M{0.2in}||M{0.7in}||M{1.1in}||M{1.3in}||M{1.3in}||M{1.3in}||} \hline\hline \vspace{0.1cm} $n$ & {Uncoded}& {MDS coding}& {Binary random coding}& {Polar coding with SC}& {Polar coding with ML}& \cline{2-6} & $(T_{\rm avg},g_{\rm opt})$ & $(T_{\rm avg},k^*,{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ & $(T_{\rm avg},k^*,g_{\rm opt},{G}_{\rm cod})$ \\ \hline \hline $8$ & $(0.4647,25\%)$& $(0.370,6,20\%)$&$(0.460,7,25\%,1\%)$&$(0.412,7,11\%,12\%)$&$(0.40,7,5.5\%,16\%)$\\ \hline $16$ & $(0.2738,44\%)$& $(0.191,11,31\%)$&$(0.226,11,18\%,18\%)$&$(0.217,11,14\%,21\%)$&$(0.199,11,4.2\%,28\%)$\\ \hline $32$ & $(0.1581,63\%)$& $(0.0968,22,39\%)$&$(0.105,21,8.6\%,34\%)$&$(0.114,24,18\%,28\%)$&$(0.105,26,7.9\%,34\%)$\\ \hline $64$ & $(0.0897,84\%)$& $(0.0488,44,46\%)$&$(0.051,43,3.9\%,44\%)$&$(0.0584,44,20\%,35\%)$&$(0.0533,46,9.4\%,41\%)$\\ \hline $128$ & $(0.0503,105\%)$& $(0.0245,88,51\%)$&$(0.025,87,1.9\%,50\%)$&$(0.0293,88,19\%,42\%)$&$(0.0255,91,4.2\%,50\%)$\\ \hline $256$ & $(0.0278,127\%)$& $(0.0123,175,56\%)$&$(0.0124,174,0.9\%,56\%)$&$(0.0146,182,19\%,48\%)$&$(0.0129,186,5.5\%,54\%)$\\ \hline $512$ & $(0.0153,149\%)$& $(0.0061,350,60\%)$&$(0.0062,349,0.5\%,60\%)$&$(0.0073,388,19\%,52\%)$&$(0.0065,393,5.9\%,57\%)$\\ \hline\hline \end{tabular} \end{table*} **************** \fi \section{Practical Codes and Simulation Results} In this section, simulation results for the expected-time performance of various coding schemes over distributed computing systems are presented. In particular, their gap to the optimal performance are shown and also, their performance gains are compared with the uncoded computation. \subsection{Polar-Coded Distributed Computation} Binary polar codes are capacity-achieving linear codes with explicit constructions and low-complexity encoding and decoding \cite{Arikan}. Also, the low-complexity $O(n\log n)$ encoding and decoding of polar codes can be adapted to work over real-valued data when dealing with erasures as in coded computation systems, as also noted in \cite{bartan2019polar}. Next, we briefly explain the encoding and decoding procedure of real-valued data using binary polar codes and delineate how we can obtain the average execution times using \Lref{lemma1}. \subsubsection{Encoding Procedure} Ar{\i}kan's $n\times n$ polarization matrix $\mathbf{G}_n=\begin{bmatrix} 1 & 0\\ 1 & 1 \end{bmatrix}^{\otimes r}$ is considered, where $r=\log_2 n$ and $\mathbf{A}^{\otimes r}$ denotes the $r$-th Kronecker power of $\mathbf{A}$. Next, a design parameter $\epsilon_d$ is picked, as specified later in Section IV-C. Then the polarization transform $\mathbf{G}_n$ is applied to a binary erasure channel with erasure probability $\epsilon_d$, BEC$(\epsilon_d)$. The erasure probabilities of polarized bit-channels, denoted by $\{Z_i\}_{i=1}^n$, are sorted and the $k$ rows of $\mathbf{G}_n$ corresponding to the indices of the $k$ smallest $Z_i$'s are picked to construct the $k\times n$ generator matrix $\mathbf{G}$. The encoding procedure using the resulting $k\times n$ generator matrix $\mathbf{G}$, which also applies to any $(n,k)$ binary linear code operating over real-valued data, is as follows. First, the computational job is divided into $k$ smaller tasks. Then the $j$-th encoded task which will be sent to the $j$-th node, for $j=1,2,\dots,n$, is the sum of all tasks $i$'s for which the $(i,j)$-th element of $\mathbf{G}$ is $1$. \subsubsection{Decoding Procedure} The recursive structure of polar codes can be applied for low-complexity detection/decoding of real-valued data using parallel processing for more speedups \cite{jamali2018low}. It is well-known that in the case of successive cancellation (SC) decoding over BECs, the probability of decoding failure of polar codes is $P_e^{\rm SC}(\epsilon,n)=1-\prod_{i\in\mathcal{A}}(1-Z_i)$, where $\mathcal{A}$ denotes the set of indices of the selected rows. \noindent\textbf{Remark 5.} Since polar SC decoder is sub-optimal in terms of successful decoding performance, one can think of optimal maximum-likelihood (ML) decoder to attain a lower failure probability at the cost of higher complexities. Consequently, investigating the possibility of attaining close-to-ML performance, e.g., using SC list decoding of polar codes \cite{tal2015list}, over real-valued data is an interesting problem deserving future studies when taking into account all time-consuming components of a coded distributed computing system. \subsubsection{Performance Characterization} Given the decoding method adopted we can find the average execution time using \Lref{lemma1}. In particular, when SC decoding is adopted, $T_{\rm avg}$ can be obtained by numerically evaluating the integral of \eqref{ET2} involving $P_e^{\rm SC}(\epsilon,n)$. Moreover, for the ML decoding, we first estimate the error probability $P_e^{\rm ML}(\epsilon,n)$ using Monte-Carlo (MC) simulations and then apply \eqref{ET2}. \subsection{RM-Coded Distributed Computation} RM codes are closely related to polar codes, where for an $(n,k)$ RM code the generator matrix $\mathbf{G}$ is constructed by choosing the $k$ rows of $\mathbf{G}_n$ (defined in Section IV-A1) having the largest Hamming weights. It is recently shown that RM codes are capacity achieving over BECs \cite{kudekar2017reed}, though under bit-MAP decoding, and numerical results suggest that they actually achieve the capacity with \textit{almost} optimal scaling \cite{hassani2018almost}. There is still a considerable interest in constructing low-complexity decoding algorithms for RM codes attaining such performances. In this paper, we apply the MC-based simulation to estimate $P_e^{\rm ML}(\epsilon,n)$ for RM codes with the optimal ML decoder, and then evaluate their execution time, numerically, using \eqref{ET2}. The inspiration behind considering RM codes in this paper is that they are believed to have the \textit{almost} optimal scaling which, we conjecture, is sufficient for asymptotic optimality, similar to random linear codes in \Cref{col8}, for coded distributed computing. The simulation results, provided next, support this conjecture. \begin{figure} \centering \includegraphics[trim={0cm 0.5cm 0cm 0cm},width=3.6in]{Fig1-new2.eps} \caption{Scaled average execution time of a homogeneous distributed computing system with $\mu=1$ using various coding schemes for finite number of servers $n=8$, $16$, $32$, $64$, $128$, $256$, and $512$.} \label{F1} \vspace{-0.15in} \end{figure} \begin{figure} \centering \includegraphics[trim={0cm 0.5cm 0cm 0cm},width=3.6in,height=2in]{Fig2_new2.eps} \caption{Scaled average execution time of a homogeneous distributed computing system with $\mu=1$ using various coding schemes for asymptotically large number of servers $n=1024$, $2048$, $4096$, and $8192$.} \label{F2} \vspace{-0.15in} \end{figure} \subsection{Simulation Results} Numerical results for the performance of the coded distributed computing systems utilizing MDS codes, binary random linear codes, polar codes, and RM codes, are presented in Table \ref{table} and are compared with the uncoded scenario over small block-lengths. We assume $\mu=1$ for all numerical results in this section. For MDS and random linear codes, $T_{\rm avg}$ is calculated using \eqref{MDS1} and \Cref{RC}, respectively, and for polar and RM codes, it is numerically evaluated using \eqref{ET2} as discussed in Sections IV-A and IV-B. Then $k^*$ is obtained by minimizing $T_{\rm avg}$ for all possible values of $k$. We designed the polar code with $\epsilon_d =0.1$, which is observed to be good enough for this range of block-lengths but one can also attain slightly better performance for polar codes by optimizing over $\epsilon_d$ specifically for each $n$. Characterizing the best $\epsilon_d$ as a function of block-length $n$ is left for the future work. In Table I, $G_{\rm cod}$ is defined as the percentage of the gain in $T_{\rm avg}$ compared to the uncoded scenario and $g_{\rm opt}$ is defined as the gap of $T_{\rm avg}$ for the underlying coding scheme to that of MDS codes, in percentage. Intuitively, $G_{\rm cod}$ for a coding scheme determines \emph{how much gain} this scheme attains and $g_{opt}$ indicates \emph{how close} this scheme is to the optimal solution. Observe that polar codes with the low-complexity SC decoder achieve large enough $G_{\rm cod}$'s, close to the optimal values of $G_{\rm cod}$, e.g., $52\%$ for $n=512$ versus $60\%$ for the MDS code. Closer performance to the optimal $T_{\rm avg}$ can be obtained by decoding polar codes with ML decoder, e.g., $g_{\rm opt}=5.5\%$ for $n=256$. Figure \ref{F1} shows that random linear codes have weak performance in the beginning but they quickly approach the optimal $T_{\rm avg}$ so that they have small gaps to the optimal values, e.g., $g_{\rm opt}=0.5\%$ for $n=512$. Also, observe that RM codes always outperform polar codes since, perhaps, they have better distance distribution leading to better $p(i,k)$'s defined in \Tref{BLC}. In the case of $\mu=1$, by numerically solving \eqref{RR}, we have for the asymptotically-optimal encoding rate $R^*=0.6822$. Motivated by this fact, in Figure 2, the rate of all discussed underlying coding schemes is fixed to $R^*$ and $nT_{\rm avg}$ is plotted for moderately large block-lengths, i.e., $T_{\rm avg}$ is not optimized over rates for the results demonstrated in this plot. Additionally, the polar code is designed with $\epsilon_d=1-R^*=0.3178$, which makes the code to be capacity-achieving for an erasure channel with capacity equal to $R^*$. Note that there is still a gap between polar codes with ML decoder and MDS codes. We believe this is due to the fact that binary polar codes with the $2 \times 2$ polarization kernel do not have an optimal scaling exponent \cite{hassani2014finite}. Furthermore, Figure \ref{F2} suggests that RM codes attain the optimal performance, and also do so relatively fast, supporting our conjecture in Section IV-B. \section{Conclusion} In this paper, we presented a coding-theoretic approach toward coded distributed computing systems by connecting the problem of characterizing their average execution time to the traditional problem of finding the error probability of a coding scheme over erasure channels. Using this connection, we provided results on the performance of coded distributed computing systems, such as their best performance bounds and asymptotic results using binary random linear codes. We further analyzed the performance of polar and RM codes in the context of distributed computing systems. We conjecture that achieving the capacity of BECs with optimal scaling exponent is a sufficient condition for binary codes to be asymptotically optimal, in the sense defined in \Tref{thm7}. We have shown this for binary random linear codes which are well-known to have optimal scaling exponent, even with sparse generator matrices \cite{mahdavifar2017scaling}, and numerically verified this for RM codes by observing that they attain close to optimal performance using a moderate number of servers. It is also interesting to see whether having an optimal scaling exponent is also a necessary condition for codes to be asymptotically optimal, e.g., whether binary polar codes with the $2 \times 2$ polarization kernel are asymptotically optimal or not. \bibliographystyle{IEEEtran}
\section{Introduction} Two-dimensional celestial conformal field theory (CCFT) has been recently considered as a candidate for a holographic description of four-dimensional space-time. The developments leading to CCFT \cite{Strominger:2017zoo,Pasterski:2019msg} build upon earlier proposals of flat holography \cite{deBoer:2003vf} and extended BMS symmetries of asymptotically flat spacetime \cite{Barnich:2010eb}. In this framework, four-dimensional scattering amplitudes are represented as conformal field correlators, with their Lorentz symmetry realized as the $SL(2,\mathbb{C})$ conformal symmetry group of celestial sphere (${\cal C S}^2$) \cite{Pasterski:2016qvg,Pasterski:2017ylz,Schreiber:2017jsr}. The origin of this connection is a natural identification of the kinematic variables describing asymptotic directions of external particles with the points on ${\cal C S}^2$. The energies are dualized by using Mellin transforms into dimensions of conformal field operators \cite{Pasterski:2017kqt}. The Mellin transforms of Yang-Mills amplitudes are well-defined but the amplitudes involving gravitons usually diverge in the high energy region. Nevertheless, as demonstrated in \cite{Stieberger:2018edy}, this problem does not appear in string amplitudes due to their super-soft ultraviolet behaviour. At this point, it is rather premature to call CCFT a ``theory''. Very few things are known but the emerging picture has some novel and intriguing features. The CCFT correlators describe the scattering processes of conformal wave packets characterized by $SL(2,\mathbb{C})$ conformal weights $(h,\bar h)$. There is a quasi-primary operator associated to each packet. The conformal spin $h-\bar h$ is identified with helicity, while the condition of normalizability restricts the dimension $\Delta=h+\bar h$ to the principal continuous series with $\Delta=1+i\lambda$ \cite{Pasterski:2017kqt}. Four-dimensional Lorentz generators are identified with $SL(2,\mathbb{C})$ generators while four-dimensional translations are realized as dimension-shifting operators \cite{Stieberger:2018onx}. The correlators representing four-dimensional Einstein-Yang-Mills scattering amplitudes have a complicated structure. This is quite puzzling because, at least at the tree level, Yang-Mills amplitudes exhibit a remarkable simplicity when written in the helicity basis \cite{tt}. There is, however, one limit in which these correlators reveal some interesting features of CCFT. In the so-called conformal soft limit of $\Delta=1$ \cite{Donnay:2018neh}, the gauge boson operators can be identified with two-dimensional currents representing particles that are soft in the traditional sense (zero energy) \cite{FFT2019}. As a result, the correlators involving such soft insertions are determined by current Ward identities. The conformal soft limit has been subject of many recent studies \cite{FFT2019,Pate:2019mfs,Nandan:2019jas, Adamo:2019ipt,Puhm:2019zbl,Banerjee:2019aoy,Banerjee:2019tam, Guevara:2019ypd}. In a recent work \cite{FFT2019}, we looked at the soft limit from a different perspective. As Ward identities of CCFT, soft theorems reflect the symmetry algebra -- in two dimensions completely determined by the operator product expansion (OPE). We derived the OPE for the operators representing gauge bosons and used standard CFT techniques to derive Ward identities describing the conformally soft limit. In CCFT, with the scattering amplitudes transformed into conformal correlators, the limit of coinciding points of ${\cal C S}^2$ corresponds to the limit of coinciding momentum directions, that is to the collinear limit. Hence in principle, it should be possible to extract not only the products of gauge boson operators, as it was done in Ref.\cite{FFT2019}, but all OPEs from well-known collinear limits. One particularly important set of OPEs involves the energy momentum tensor. It has been proposed \cite{Kapec:2016jld,Cheung:2016iub} that the energy-momentum tensor of CCFT is the $\Delta=2$ operator obtained by taking a shadow transform of the $\Delta=0$ operator associated to the graviton. The analysis of Ref.\cite{Donnay:2018neh} gave further evidence to this proposal. In this work, we put it on solid foundations by studying the products of this $\Delta=2$ shadow operator with gauge boson operators. We show that the gauge boson operators have the expected OPE with the energy-momentum tensor, appropriate for Virasoro primary fields. \label{intro} \section{Preliminaries: conformal wave packets of gravitons} A general light-like momentum vector of a massless particle can be written as \begin{equation}\label{momparam} p^\mu= \omega q^\mu, \qquad q^\mu={1\over 2} (1+|z|^2, z+\bar{z}, -i(z-\bar{z}), 1-|z|^2)\ , \end{equation} where $\omega$ is the light-cone energy and $q^\mu$ is a null vector -- the direction along which the massless state propagates. It is parametrized by complex $z$ which is identified as a point on ${\cal C S}^2$. On ${\cal C S}^2$, the $SL(2,\mathbb{C})$ Lorentz group acts as the global conformal symmetry group: \begin{equation}\label{SLz} z\to {a z+b\over c z+d}, \qquad ad-bc=1. \end{equation} The usual spin two graviton plane waves are \begin{equation}\label{planewave} \epsilon_{\mu\nu}^{\ell}(p) e^{\mp i |p_0| X^0 \pm i \vec{p} \cdot \vec{X}}, \qquad \ell=\pm 2 \end{equation} where $\epsilon_{\mu\nu}^{\ell}(p)$ is the polarization tensor, $\ell$ is the helicity and the $\pm$ sign in the exponential is used to distinguish between incoming and outgoing solutions.\footnote{From this point, we will be considering outgoing (+) solutions only.} It is convenient to choose a gauge in which \begin{equation}\label{gravg} \epsilon_{\mu\nu}^{\ell}(p) =\partial_Jq^\mu\partial_Jq^\nu, \end{equation} where $J=z$ for $l={+}2$ and $J=\bar{z}$ for $l={-}2$. In order to transform the scattering amplitudes into conformal correlators, the basis of plane waves will be changed to the basis of wave packets transforming as quasi-primary fields under $SL(2,\mathbb{C})$. The chiral weights $h$ and $\bar h$ are constrained by $h-\bar h=\ell$, but the dimensions $\Delta=h+\bar h$ are {\em a prori\/} arbitrary. The quasi-primary wave packets satisfying free spin two wave equations, with $h-\bar h=\ell=\pm 2$ and dimension $\Delta$, were constructed in \cite{Pasterski:2017kqt}. They are given by \begin{equation}\label{eq:spin2confprim} h^{\Delta,\ell}_{\mu \nu}= {1\over 2} {[(-q\cdot X) \partial_J q_\mu+ (\partial_J q \cdot X) q_\mu][(-q\cdot X) \partial_J q_\nu+ (\partial_J q \cdot X) q_\nu] \over (-q \cdot X)^{\Delta+2}} \end{equation} They are related to Mellin transforms of plane waves in the following way. First, we apply $\partial^2_J$ to the following identity \cite{Pasterski:2017kqt}: \begin{equation}\label{eq:diffeo1} {q_\mu q_\nu \over (-q\cdot X)^\Delta}= {1\over 2} {1\over \Delta-1} \bigg[ \partial_\mu \Big({q_\nu \over (-q\cdot X)^{\Delta-1}}\Big) + \partial_\nu{q_\mu \over (-q\cdot X)^{\Delta-1}}\bigg]\ . \end{equation} As a result, \begin{equation}\label{eq:diffeo2} {(\partial_J q\cdot X)^2 q_\mu q_\nu \over (-q \cdot X)^{\Delta+2}}= {-2 \over \Delta (\Delta+1)} {\partial_J q_\mu \partial_J q_\nu \over (- q\cdot X)^\Delta} - {2\over \Delta+1} {\partial_J q_\mu (\partial_J q\cdot X) q_\nu +\partial_J q_\nu (\partial_J q\cdot X) q_\mu \over (- q\cdot X)^{\Delta+1}}+ \makebox{diff} \end{equation} where diff is a ``pure gauge'' part representing a diffeomorphism. Next, we use \begin{equation}\label{eq:diffeo3} \partial_J {(\partial_J q_{\{\mu}) q_{\nu\}} \over (-q\cdot X)^\Delta}= {1\over 2( \Delta-1)} \partial_J\bigg[ \partial_\mu {(\partial_J q_\nu) \over (-q\cdot X)^{\Delta-1}} + \partial_\nu{(\partial_J q_\mu) \over (-q\cdot X)^{\Delta-1}}\bigg] \end{equation} to obtain \begin{equation}\label{eq:diffeo4} {\partial_J q_\mu (\partial_J q\cdot X) q_\nu+ \partial_J q_\nu (\partial q_J\cdot X) q_\mu \over (-q\cdot X)^{\Delta+1}}= -{2\over \Delta} {\partial_J q_\mu \partial_J q_\nu \over (-q \cdot X)^\Delta} + \makebox{diff} \end{equation} After combining (\ref{eq:diffeo2}) and (\ref{eq:diffeo4}), we find that the conformal wave packet can be written as \begin{equation}\label{eq:spin2confprimnew} h^{\Delta,\ell}_{\mu \nu }= {1\over 2}{\Delta(\Delta-1)\over \Delta+1} {\partial_J q_\mu \partial_J q_\nu \over (-q \cdot X)^\Delta} + \makebox{diff} \end{equation} Note that in two special cases, of $\Delta=0$ and $\Delta=1$, the wave functions (\ref{eq:spin2confprimnew}) represent diffeomorphisms. Pasterski and Shao \cite{Pasterski:2017kqt} showed that for a generic $\Delta$, the wave functions (\ref{eq:spin2confprimnew}) are normalizable only if $\Delta=1+i\lambda$, i.e.\ when the fields belong to the principal continuous series. The amplitudes involving gravitons of the principal series have been discussed in \cite{Stieberger:2018edy} and their conformally soft limit of $\Delta=1$ in \cite{Adamo:2019ipt,Puhm:2019zbl}. In the next section, we focus on $\Delta=0$, which is another case of pure diffeomorphism. The connection to Mellin-transformed plane waves is established in the following way. The Mellin transform of the plane wave (\ref{planewave}) is \begin{equation}\label{confprimMellin} G^{\Delta,\ell}_{\mu \nu} (X^\mu, z, \bar{z})\equiv \partial_J q_\mu \partial_J q_\nu \int _0^\infty d\omega \ \omega^{\Delta-1} e^{\mp i \omega q \cdot X -\epsilon \omega\ .} \end{equation} The conformal wave function (\ref{eq:spin2confprimnew}) can be written as\footnote{We skip some irrelevant $i^\Delta$ factors.} \begin{equation}\label{confprimexpr3} h^{\Delta,\ell}_{\mu \nu }= f(\Delta)G^{\Delta,\ell}_{\mu \nu} +\makebox{diff} \end{equation} where \begin{equation}\label{gdef}f(\Delta)= {1\over 2}{\Delta(\Delta-1) \over \Gamma(\Delta+2)} \end{equation} In the next section, we will discuss the shadow transforms of amplitudes involving $\Delta=0$ gravitons,\footnote{Actually, $\Delta=0$ modes are pure diffeomorphisms, so it would be more appropriate to call them ``Goldstone'' modes instead of gravitons.} which should correspond to the insertions of the energy-momentum tensor. Note that the respective Mellin transforms are accompanied by the normalization factors $f(\Delta)$ that vanish in the $\Delta=0$ limit, therefore in order to obtain finite results, the amplitudes must be singular. Indeed, finite OPE coefficients will be extrated from such singular limits. \section{OPE of the energy-momentum tensor with primary fields} We wish to discuss two statements. The first statement is that, as anticipated in \cite{Kapec:2016jld,Cheung:2016iub}, the CCFT energy-momentum tensor $T(z)$ is given by a shadow transform \cite{Osborn:2012vt} of the operator ${\cal G}_{\Delta=0}(z,\bar{z})$ associated to the $\Delta=0$ limit $(h=-1,\bar h=1)$ of the quasi-primary graviton wave packet (\ref{eq:spin2confprim}) with helicity $\ell={-}2$, hence associated to a non-trivial effect of a pure diffeomorphism, see Eq.(\ref{eq:spin2confprimnew}). More precisely, \begin{equation}\label{eq:shadow} T(z)={3!\over 2\pi} \int d^2 z'{1\over (z'-z)^{4}} \, {\cal G}_{\Delta=0}(z',\bar{z}') \end{equation} The second statement is that the gauge boson operators ${\cal O}(z,\bar{z})$ associated to quasi-primary spin one wave functions transform as conformal primaries under ${\cal C S}^2$ diffeomorphisms. This is equivalent to the OPE \begin{equation} \label{opeto} T(z){\cal O}(w,\bar w)={h\over (z-w)^2}{\cal O}(w,\bar w)+{1\over z-w}\partial_w{\cal O}(w,\bar w)+\dots \ , \end{equation} where $h$ is the chiral weight of ${\cal O} $. In this section, we prove the second statement, assuming that the first one is true. To that end, we will be considering tree-level Einstein-Yang-Mills amplitudes involving one graviton and an arbitrary number $N$ of gauge bosons. In Ref.\cite{Stieberger:2016lng} it was shown that such amplitudes can be expressed as linear combinations of pure Yang-Mills amplitudes involving $N{+}1$ gauge bosons, but our discussion will not rely on this relation. We will proceed in the following steps. We will start from the Mellin transformation converting the standard amplitude into a correlator of the graviton operator ${\cal G}_\Delta(z',\bar{z}')$ with $N$ gauge boson operators ${\cal O}$ inserted at arbitrary points $z_n$. Next, we will convert ${\cal G}_\Delta$ into its shadow $\widetilde{\cal G}_\Delta(z,\bar{z})$ and extract collinear singularities in the limit of $z$ coinciding with one of $z_n$. After taking the $\Delta=0$ limit, we will extract the OPE coefficients. The CCFT correlator of $N$ gauge bosons and one helicity $\ell=-2$ graviton is given by \begin{eqnarray}\label{eq:graviton-2amp} \Big\langle \prod_{n=1}^N{\cal O}_{\ell_n}(z_n,\bar{z}_n){\cal G}_\Delta(z',\bar{z}')\Big\rangle&=&\Big( \prod_{n=1}^N \int d \omega_n \ \omega_n^{\Delta_n-1} \Big) \ f(\Delta)\int d\omega'\, \omega'^{\Delta-1} \delta^{(4)}\big(\sum_{n=1}^N \omega_n q_n+\omega' q'\big)\nonumber\\[1mm] \label{eq:graviton-2amp} &&~~~~~\times {\cal M}_{\ell_1\dots \ell_N, \ell=-2}(\omega_n, z_n, \bar{z}_n; \omega', z',\bar{z}') \end{eqnarray} where ${\cal M}_{\ell_1\dots \ell_N, \ell=-2}$ is the Feynman's matrix element for the scattering of $N$ gauge bosons with helicities $\ell_n$ and one helicity $\ell=-2$ graviton. We omit gauge indices and gauge operator normalization factors because they are not relevant to our discussion, and stick to one partial amplitude corresponding say to the canonical ordering inside the Chan-Paton trace factor. Recall that the dimensions of gauge boson operators are fixed to $\Delta_n=1+i\lambda_n$. Next, we take the shadow transform. Since we are interested in the $\Delta=0$ limit and $f(\Delta)$ is already of order $\Delta$, we can evaluate this transform as if $\Delta$ were vanishing:\footnote{The shadow formula valid for arbitrary $(h,\bar h)$ can be found in Ref.\cite{Osborn:2012vt}.} \begin{equation}\label{eq:shadow-2amp} \Big\langle \prod_{n=1}^N{\cal O}_{\ell_n}(z_n,\bar{z}_n)\widetilde{\cal G}_\Delta(z,\bar{z})\Big\rangle = {3!\over 2\pi}\int d^2 z' {1\over (z-z')^4} \Big\langle \prod_{n=1}^N{\cal O}_{\ell_n}(z_n,\bar{z}_n){\cal G}_\Delta(z',\bar{z}')\Big\rangle \end{equation} Since our goal is to extract the OPE, we are interested in the pole behavior of the above expression in the limit when $z$ approaches one of other points, say $z \to z_N$. A short reflection reveals that poles will appear in the integration region where $z'\to z_N$. Looking back at Eq.(\ref{eq:graviton-2amp}), we see that this is the collinear limit of ${\cal M}_{\ell_1\dots \ell_N, \ell=-2}(p_n,p')$ when the graviton's four-momentum $p'=\omega'q'$ becomes parallel to the momentum $p_N=\omega_Nq_N$ of the $N$th gauge boson. The matrix element ${\cal M}$ is singular in this limit in a rather peculiar way. The pole terms $(\bar{z}'-\bar{z}_N)^{-1}$ are always accompanied by factors $(z'-z_N)$ so they are singular only if $z$ and $\bar z$ are considered as independent variables, otherwise it is just a phase ambiguity reflecting an azimuthal asymmetry \cite{Bern:1998xc}. This singularity is important for the shadow transform (\ref{eq:shadow-2amp}). It can be extracted \cite{btf} from the Feynman diagrams in which the graviton is radiated away by the $N$th gauge boson. One finds \begin{eqnarray} {\cal M}(1,2,\dots,N^-\!,\,p'^{--})\label{ampcol1}&=& {z'-z_N\over \bar{z}'-\bar{z}_N} { \omega_{P} \over \omega'} {\cal M}(1,2, \dots, P^-)+\dots\ ,\\ {\cal M}(1,2,\dots,N^+\!,\,p'^{--})\label{ampcol2}&=& {z'-z_N\over \bar{z}'-\bar{z}_N} { \omega_N^2 \over \omega'\omega_P} {\cal M}(1,2, \dots, P^+)+\dots\ , \end{eqnarray} where we omitted non-singular terms. We use the notation of Ref.\cite{tt}, with $\pm$ superscripts referring to particle helicities. Here, $P$ is the combined momentum of the collinear pair: \begin{equation} \label{psum}P=p_N+p'=\omega_Nq_N+\omega'q'=\omega_Pq_P\ ,\end{equation} with \begin{equation}\label{psum1}\omega_P=\omega_N+\omega'\, \qquad q_P=q_N=q'~~(z_P=z_N=z'~,\bar{z}_P=\bar{z}_N=\bar{z}')\ .\end{equation} We begin with the case of $\ell_N=-1$, with the collinear limit given in (\ref{ampcol1}). After inserting it into Eqs.(\ref{eq:graviton-2amp},\ref{eq:shadow-2amp}), we obtain \begin{eqnarray} \Big\langle \prod_{n=1}^{N-1}&&\!\!\!\!\!{\cal O}_{\ell_n}(z_n,\bar{z}_n) {\cal O}_{-1}(z_N,\bar{z}_N)\widetilde{\cal G}_\Delta(z,\bar{z})\Big\rangle= \Big( \prod_{n=1}^{N-1} \int d \omega_n \omega_n^{\Delta_n-1} \Big)\times \nonumber\\&& {f(\Delta)\over 2\pi}\int d\omega_N\, \omega_N^{\Delta_N-1}\int d\omega'\, \omega'^{\Delta-2}\, \omega_P\int d^2 z' {3!\over (z-z')^4}\,{z'_N\over \bar{z}'_N}\,\times\nonumber\\ &&~~~~\delta^{(4)}\big(\sum_{n=1}^{N-1} \omega_n q_n+\omega_Pq_P\big) {\cal M}(1,2, \dots, P^-)\ , \label{inte1} \end{eqnarray} where $z'_N\equiv z'-z_N$ and $\bar{z}'_N\equiv\bar{z}'-\bar{z}_N$. We integrate by parts over $z'$ two times: \begin{equation}\label{inte2}\int d^2 z' {3!\over (z-z')^4}{z'_N\over \bar{z}'_N}\longrightarrow \int d^2 z' {1\over (z-z')^2} \bigg[ \partial^2_{z'}\Big({z'_N\over \bar{z}'_N} \Big)+ 2 \partial_{z'} \Big({z'_N\over \bar{z}'_N} \Big)\partial_{z'}+\Big( {z'_N\over \bar{z}'_N}\Big)\partial^2_{z'} \bigg]. \end{equation} The first term yields \begin{equation}\label{inte3} \partial^2_{z'}\Big({z'_N\over \bar{z}'_N} \Big)=2\pi\delta^{(2)}(z'-z_N)\ \end{equation} and the integral becomes localized at $z'=z$, giving rise to a double pole of the correlator (\ref{inte1}) at $z=z_N$. In the second term, with \begin{equation}\label{inte4}\partial_{z'}\Big({z'_N\over \bar{z}'_N}\Big)={1\over \bar{z}'_N}\end{equation} we integrate by parts one more time: \begin{equation}\label{inte5}\int {d^2 z' \over (z-z')^2}{2\over \bar{z}'_N}\partial_{z'}\longrightarrow -\int d^2 z' \bigg[{4\pi\over z-z'}\delta^{(2)}(z'-z_N) \partial_{z'}+{2\over \bar{z}'_N(z-z')}\partial_{z'}^2\bigg] .\end{equation} Here, the first term gives rise to a single pole, while the second term, although it is logarithmically divergent at $z=z_N$, does not contribute any poles. Actually, the third term in (\ref{inte2}) contains a similar logarithmic divergence. These two logarithmic terms disappear, however, in the $\Delta= 0$ limit because they contain $\partial_{z'}^2$ acting on the remaining part of the integrand. As explained below, each $\partial_{z'}$ derivative brings one power of $\omega'$, therefore the corresponding $\omega'$ integrals are finite. In the $\Delta=0$ limit, they are suppressed by {$f(\Delta)$} normalization factor (\ref{gdef}) which is of order ${\cal O}(\Delta)$. In Eq.(\ref{inte5}), the derivative $\partial_{z'}$ on the right hand side acts on the remaining part of the integrand, that is the momentum-conserving delta function and the matrix element ${\cal M}$, c.f.\ Eq.(\ref{inte1}). Both these functions depend on $p'=\omega'q'(z')$ through the combination $P=p'+p_N$, see Eqs.(\ref{psum},\ref{psum1}). For any such function \begin{equation}\label{eq:colspin3} \partial_{z'}= {\omega'\over \omega_P} \partial_{z_P} \end{equation} when, as in our case, the derivative is evaluated at $q'=q_P$.\footnote{Actually, ${\cal M}$ depends on the momentum spinor $\lambda_P$. Nevertheless, since this amplitude is extracted by factorizing on the gauge boson pole in the $(p_N,p')$ channel, c.f.\ Eqs.(\ref{ampcol1},\ref{ampcol2}), the dependence on $\lambda_P$ is reduced to a simple polarization-dependent factor, while the other factor depends on vector $P$. After checking these factors, one finds that Eq.(\ref {eq:colspin3}) remains valid.} After putting this altogether, we find that after the shadow transform, Eq.(\ref{inte1}) yields \begin{eqnarray} \Big\langle \prod_{n=1}^{N-1}&&\!\!\!\!\!{\cal O}_{\ell_n}(z_n,\bar{z}_n) {\cal O}_{-1}(z_N,\bar{z}_N)\widetilde{\cal G}_\Delta(z,\bar{z})\Big\rangle= \Big( \prod_{n=1}^{N-1} \int d \omega_n \omega_n^{\Delta_n-1} \Big)\times ~~\label{intf1} \\ f(\Delta)\bigg[&&\!\!\!\!{1\over (z-z_N)^2}\int d\omega_N\, \omega_N^{\Delta_N-1}\int d\omega'\, \omega'^{\Delta-2}\, \omega_P\,\delta^{(4)}\big(\sum_{n=1}^{N-1} \omega_n q_n+\omega_Pq_P\big) {\cal M}(1,2, \dots, P^-)\nonumber\\ -&&\!\!\!\!{2\over z-z_N}\int d\omega_N\, \omega_N^{\Delta_N-1}\int d\omega'\, \omega'^{\Delta-1}\, \partial_{z_P}\Big\{\delta^{(4)}\big(\sum_{n=1}^{N-1} \omega_n q_n+\omega_Pq_P\big) {\cal M}(1,2, \dots, P^-)\Big\}\bigg] \nonumber \end{eqnarray} Now we can change the energy integration variables from $(\omega_N,\omega')$ to $(\omega_P=\omega_N{+}\omega',\omega')$: \begin{equation}\label{changei} \int_0^\infty d \omega_N\int_0^\infty d \omega'\cdots ~\longrightarrow\int_0^\infty d \omega_P\int_0^{\omega_P}d \omega'\cdots \end{equation} and integrate over graviton's energy $\omega'$, with the result \begin{eqnarray} \Big\langle \prod_{n=1}^{N-1}{\cal O}_{\ell_n}(z_n,\bar{z}_n)&&\!\!\!\! {\cal O}_{-1}(z_N,\bar{z}_N)\widetilde{\cal G}_\Delta(z,\bar{z})\Big\rangle= \Big( \prod_{n=1}^{N-1} \int d \omega_n \omega_n^{\Delta_n-1} \Big)\int d\omega_P\omega_P^{\Delta_N+\Delta-1}\times \nonumber\\ f(\Delta)\bigg[&&\!\!\!\!{B(\Delta_N,\Delta-1)\over (z-z_N)^2}\delta^{(4)}\big(\sum_{n=1}^{N-1} \omega_n q_n+\omega_Pq_P\big) {\cal M}(1,2, \dots, P^-)~~\label{intf2} \\ \,\,-&&\!\!\!2\,{B(\Delta_N,\Delta)\over z-z_N}\, \partial_{z_P}\Big\{\delta^{(4)}\big(\sum_{n=1}^{N-1} \omega_n q_n+\omega_Pq_P\big) {\cal M}(1,2, \dots, P^-)\Big\}\bigg], \nonumber \end{eqnarray} where $B$ denotes Euler's beta function. At this point, in order to turn the shadow operator $\widetilde{{\cal G}}_\Delta(z,\bar{z})$ into the energy-momentum tensor $T(z)$, we take the $\Delta=0$ limit. With the factor $f(\Delta)$ given in Eq.(\ref{gdef}), \begin{equation} f(\Delta)B(\Delta_N,\Delta-1)\to {\Delta_N-1\over 2}\ ,\qquad f(\Delta)B(\Delta_N,\Delta)\to -{1\over 2}\label{flimit}\ .\end{equation} Note that on the r.h.s.\ of Eq.(\ref{intf2}), the energy of the $N$th gauge boson is $\omega_P$ and its momentum is $P=\omega_Pq_P$, with $q_P=q_N$. Furthermore, the amplitude and its derivative are evaluated at $z_P=z_N$. As a result, \begin{eqnarray} \Big\langle \prod_{n=1}^{N-1}{\cal O}_{\ell_n}(z_n,\bar{z}_n)&&\!\!\!\! {\cal O}_{-1}(z_N,\bar{z}_N)T(z)\Big\rangle= \Big( \prod_{n=1}^{N} \int d \omega_n \omega_n^{\Delta_n-1} \Big)\times \nonumber\\ \bigg[&&\!\!\!\!{h_N\over (z-z_N)^2}\delta^{(4)}\big(\sum_{n=1}^{N} \omega_n q_n\big) {\cal M}(1,2, \dots, N^-)~~\label{intf3} \\ \,\,+&&\!\!\!{1\over z-z_N} \partial_{z_N}\Big\{\delta^{(4)}\big(\sum_{n=1}^{N} \omega_n q_n\big) {\cal M}(1,2, \dots, N^-)\Big\}\bigg], \nonumber \end{eqnarray} where we used the fact that for $\ell_N=-1$, $h_N=(\Delta_N-1)/2$. The OPE (\ref{opeto}) follows from the $z\to z_N$ singularities of the energy-momentum tensor correlator (\ref{intf3}). A similar proof can be carried out in the case of $\ell_N=+1~ [h_N=(\Delta_N+1)/2]$, by using the collinear limit (\ref{ampcol2}). \section{Conclusions} The change of basis from plane waves to conformal wave packets, accomplished by using Mellin transformations, converts Yang-Mills amplitudes into celestial amplitudes. The basic idea of CCFT holography is to regard these amplitudes as the correlation functions of the operators associated to external particles. By construction, these operators must transform as quasi-primaries under the (global) $SL(2,\mathbb{C})$ inherited from four-dimensional Lorentz symmetry. It is by no means obvious that these operators transform as Virasoro primaries because ${\cal C S}^2$ diffeomorphism are generated by {\em a priori\/} unknown CCFT energy-momentum tensor $T(z)$. In this work, guided by Refs.\cite{Kapec:2016jld,Cheung:2016iub}, we assumed that $T(z)$ is given by the shadow of the $\Delta=0$ graviton operator representing pure (large) diffeomorphisms. We showed that under this assumption, the operators representing gauge bosons do indeed transform as Virasoro primaries. As mentioned before, the assumed form of $T(z)$ was mainly based on the arguments involving soft theorems, in the framework of quantum field theory formulated in curvilinear coordinates in which ${\cal C S}^2$ diffeomorphisms appear as a part of larger BMS symmetry. It would be very enlightening to discuss this symmetry in a purely CCFT setup, by studying the OPE of $TT$ products. This OPE has already been discussed in the context of double-soft limits in Ref.\cite{Distler:2018rwu}. In our approach, it should emerge from the collinear limit of two shadow operators. Unfortunately, unlike in the case of a single shadow, understanding the collinear behaviour of Einstein-Yang-Mills amplitudes is not sufficient for extracting the collinear singularities of shadow products. We hope to address this issue in the future. \vskip 1mm \leftline{\noindent{\bf Acknowledgments}} \vskip 1mm \noindent We are grateful to Wei Fan for collaborating at an early stage of this work and for checking some computations. We are also grateful to Ignatios Antoniadis for asking all the right questions. T.R.T.\ thanks Zygmunt Lalak and the Institute of Theoretical Physics of the University of Warsaw for their kind hospitality. This material is based in part upon work supported by the National Science Foundation under Grant Number PHY--1913328. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.
\section{Introduction} Over the recent years, there has been a growing demand to be able to record and search human communications in a machine readable format. There has been significant advances in automatic speech recognition due to the availability of large-scale datasets~\cite{panayotov2015librispeech,barker2018fifth} and the accessibility of deep learning frameworks~\cite{Abadi16,paszke2017automatic,Vedaldi15}, but to give the transcript more meaning beyond just a sequence of words, the information on ‘who spoke when' is crucial. Speaker diarisation, the task of breaking up multi-speaker audio into single speaker segments, has been an active field of study over the years. Speaker diarisastion can mostly be addressed as a single-modality problem where only the audio is used, but there are also a number of papers that have used additional modalities such as video. Previous works on speaker diarisation, both audio and audio-visual, can be divided into two strands. The first is based on speaker modelling (SM) which uses the assumption that each individual has different voice characteristics. Traditionally, speaker models are constructed with Gaussian mixture models (GMMs) and i-vectors~\cite{dehak2011front,cumani2013probabilistic,matvejka2011full}, but more recently deep learning has been proven effective for speaker modelling~\cite{variani2014deep,lei2014novel,ghalehjegh2015deep,snyder2017deep,snyder2018x}. In many systems, the models are often pre-trained for the target speakers~\cite{hung2008towards,biagetti2016robust} and are not applicable to unknown participants. Other algorithms are capable of adapting to unseen speakers by using generic models and clustering~\cite{friedland2012icsi,sell2018diarization}. There are also a number of works in the audio-visual domain that are based on feature clustering~\cite{friedland2009multi,sarafianos2016audio}. The second strand uses a technique referred to as sound source localisation (SSL), which is claimed to demonstrate better performance compared to the SM-based approaches according to a recent study~\cite{rozgic2010multimodal}, particularly with powerful beamforming methods such as SRP-PHAT~\cite{dibiase2000high}. However, SSL-based methods are only effective when the location of speakers are either fixed or known. Therefore SSL has been used as parts of audio-visual methods, where the location of the identities can be tracked using the visual information~\cite{schmalenstroeer2009fusing}. This approach is dependent on the ability to effectively track the participants. A recent paper~\cite{cabanas2018multimodal} combines SSL with a visual analysis module that measures motion and lip movements, which is relevant to our work. A number of works have combined SM and SSL approaches using independent models for each type of observation, then fused these information with a probabilistic framework based on the Viterbi algorithm~\cite{schmalenstroeer2009fusing} or with Bayesian filtering~\cite{rozgic2010multimodal}. In this paper, we present an audio-visual speaker diarisation system based on self-enrollment of speaker models that is able to handle movements and occlusions. We first use a state-of-the-art deep audio-visual synchronisation network to detect speaking segments from each participant when the mouth motion is clearly visible. This information is used to enroll speaker models for each participant, which can then determine who is speaking even when the speaker is occluded. By generating speaker models for each participant, we are able to reformulate the task from an unsupervised clustering problem into a supervised classification problem, where the probability of a speech segment belonging to every participant can be estimated. In contrast to the previous works that compute likelihoods for each type of observation before the multi-modal fusion, the audio-visual synchronisation is used in the self-enrollment process. Finally, when multi-channel microphone is available, beamforming is employed to estimate the location of the sound source, then the spatial cues from both modalities are used to further improve the system's performance. The effectiveness of the method is demonstrated on the internal dataset of real-world meetings and the public AMI corpus. This paper is organised as follows. In Section~\ref{subsec:baseline}, we first describe the audio-only baseline system based on state-of-the-art methods for speech enhancement, activity detection and speaker diarisation. Section~\ref{subsec:multimodal} introduces the proposed audio-visual system. Finally, Section~\ref{sec:exp} describes the datasets and the experiments in which we demonstrate the effectiveness of our method on the public AMI dataset. \section{System description} \label{sec:system} \subsection{Audio-only baseline} \label{subsec:baseline} The baseline system provided for the second DIHARD challenge is used as our audio-only baseline. The system takes key components from the top-scoring systems in the first DIHARD challenge and shows state-of-the-art performance on audio-only diarisation. \subsubsection{Speech enhancement} The speech enhancement is based on the system used by USTC-iFLYTEK in their submission to the first DIHARD challenge~\cite{sun2018speaker}. The system uses Long short-term memory (LSTM) based speech denoising model trained on simulated training data. It has demonstrated significant improvements in deep learning-based single-channel speech enhancement over the state-of-the-art, and the authors have shown its effectiveness for diarisation with a second-place result in the first DIHARD challenge. \subsubsection{Speech activity detection} The speech activity detection baseline uses WebRTC~\cite{johnston2012webrtc} operating on enhanced audio processed by the speech enhancement baseline. \subsubsection{Speaker embeddings and diarisation} \label{subsec:baseline_dia} The diarisation system is based on the JHU Sys4 used in their winning entry to DIHARD I, with the exception that it omits the Variational-Bayes refinement step. Speech is segmented into 1.5 second windows with 0.75 second hops, 24 MFCCs are extracted every 10ms, and a 256-dimensional x-vector is extracted for each segment. The extracted vectors are scored with PLDA (trained with segments labelled only for one speaker) and clustered with AHC (average score combination at merges). The x-vector extractor and PLDA parameters were trained on the VoxCeleb~\cite{Nagrani17} and VoxCeleb2~\cite{Chung18a} datasets with data augmentation (additive noise), while the whitening transformation was learned from the DIHARD I development set~\cite{sell2018diarization}. We use the pre-trained model released by the organisers of the DIHARD challenge. The system is not designed to handle overlapped speech, and additional speakers are counted as missed speech in evaluation. \subsection{Multi-modal diarisation} \label{subsec:multimodal} \begin{figure}[!b] \centering \includegraphics[width=1\linewidth]{figures/AVSD2.pdf} \caption{Pipeline overview.} \label{fig:pipeline} \end{figure} The audio processing part of the audio-visual system shares most of the baseline methods described above: the speech enhancement and speech activity detection modules are identical to that in the baseline system, and for experiments on the AMI corpus, we also use the pre-trained x-vector model used by the JHU system to extract speaker embeddings. Three modes of information are used to determine the current speaker in the video. The pipeline is summarised in Figure~\ref{fig:pipeline} and described in the following paragraphs. \subsubsection{Audio-to-video correlation} \label{subsec:avcorr} Cross-modal embeddings of the audio and the mouth motion are used to represent the respective signals. The strategy to train this joint embedding is described in~\cite{chung2018perfect}, but we give a brief overview here. The network consists of two streams: the audio stream that encodes Mel-frequency cepstral coefficients (MFCC) inputs into 512-dimensional vectors; and the video stream that encodes cropped face images also into 512-dimensional vectors. The network is trained as a multi-way matching task between one video clip and $N$ audio clips. Euclidean distances between the audio and video features are computed, resulting $N$ distances. The network is trained with a cross-entropy loss on the inverse of this distance after passing through a softmax layer, so that the similarity between matching pairs is greater than non-matching pairs. The cosine distance between the two embeddings is used to measure correspondence between the two inputs. Therefore, we expect small distance between the features if the face image corresponds to the current speaker and in-sync and large distance otherwise. Since the video is from a single continuous source, we assume that the AV offset is fixed throughout the session. The embedding distance is smoothed over time using a median filter in order to eliminate outliers. \subsubsection{Speaker verification} \label{subsec:sr} We develop speaker models for each individual (identified in Sec.~\ref{subsec:facerec}) so that the active speaker can be determined even when audio-visual synchronisation cannot be established due to occlusion. The audio-visual pipeline (Sec.~\ref{subsec:avcorr}) is run over the whole video in advance, in order to determine $N$ most confident speaking segments (each of 1.5 seconds) for each identity. In our case we use $N$=10, and if there are fewer than $N$ confident segments above a AV correlation threshold, we only use the segments whose correlation is above the threshold. These are used to enroll the speaker models. For the experiments on the AMI dataset, we use the x-vector network (described in Sec.~\ref{subsec:baseline_dia}) to extract speaker embeddings, so that the results can be compared like-for-like to the baseline. For the experiments on the internal meeting dataset, we use a deeper ResNet-50 model~\cite{He16} also trained on the same data as the baseline. The deeper model is used here since its features generalise better to this more challenging dataset compared to the shallower x-vector model. At test time, speaker embeddings are extracted by computing features over 1.5-second window, moving 0.75 seconds at a time, in line with the baseline system. By comparing the embeddings at each timestep to the enrolled speaker models, the likelihood of the speech segment belonging to any individual can be estimated. Even without any visual information at inference time, this now becomes a supervised classification problem, which is typically more robust compared to unsupervised clustering. \subsubsection{Sound source localisation} \label{subsec:amb} Besides the speaker embeddings, the direction of the sound source can provide useful cues on who is speaking. Recordings from the 4-channel microphone from the GoPro camera can be converted to Ambisonics B-Format using the GoPro Fusion Studio software. By solving the B-format representations for azimuth $\theta$ and elevation $\phi$, the direction of the audio source can be estimated for each audio sample. The direction for every video frame is determined by generating a histogram of all $\theta$ values over a $\pm0.5$ second period with bin size of $\ang{10}$. For the AMI videos, the Time Delay of Arrival (TDOA) information is calculated using the BeamformIt~\cite{anguera2007acoustic} package. As with the internal dataset, the direction of arrival is also computed with a histogram of $\theta$ values over a $\pm0.5$ second period. However, only 4 bins of $\ang{90}$ is used since the video is split over 4 cameras and the exact geometry between them is unknown. The likelihood of the audio belonging to any person at a given time correlates to the angle between the estimated audio source and the face detection in the video for the identity in question. \subsection{Multi-modal fusion} \label{subsec:fusion} Each of the three modalities (AV correlation, speaker models, direction of audio) give confidence scores for each speaker and timestep. These scores are combined into a single confidence score for every speaker and timestep using a simple weighted fusion as stated below, where $C_{sm}$ is the confidence score from the speaker model, $C_{avc}$ is the score from the AV correspondence and $\phi$, $\theta$ are the directions of the face and the estimated DoA of audio, respectively. When the identity is not visible on the camera, the second and third terms are put to zero. \begin{equation} C_{overall} = C_{sm} + \alpha * C_{avc} + \beta * cosine(\phi - \theta) \end{equation} \subsection{Implementation details} \subsubsection{Face detection and tracking} \label{subsec:facetrack} A CNN face detector based on Single Shot MultiBox Detector (SSD)~\cite{Liu16} is used to detect face appearances on every frame of the video. This detector allows faces to be tracked across wide range of poses and lighting conditions. A position-based face tracker is used to group individual face detections into face tracks. \subsubsection{Face recognition} \label{subsec:facerec} The method requires face images for each participant so that they can be identified and tracked regardless of their position in the room. This can be from user input or from their profile images. The face images for all participants are supplied to the VGGFace2~\cite{cao2017vggface2} network, and their embeddings are stored. For each face track detected (Sec.~\ref{subsec:facetrack}), face embeddings are extracted using the VGGFace2 network and compared to each of the $N$ stored embeddings, so that they can be classified into one of $N$ identities. We apply the constraint that co-occurring face tracks at any point in time cannot be of the same identity. \begin{table*}[!ht] \vspace{-15pt} \footnotesize \begin{center} \begin{tabular}{ |l|l|l| |r|r|r|r| |r|r|r|r| } \hline Method & Dataset & Input & \multicolumn{4}{c||}{System VAD} & \multicolumn{4}{c|}{Reference VAD} \\ \hline \multicolumn{3}{|c||}{Measure} & MS & FA & SPKE & DER & MS & FA & SPKE & DER \\ \hline JHU Baseline~\cite{sell2018diarization} & {\bf ES All} & 1ch & 10.5 & 6.6 & 12.8 & 30.0 & 5.6 & 0.0 & 12.2 & 17.8 \\ \hline {\bf Ours (SM)} & {\bf ES All} & 1ch+V & 10.5 & 6.6 & 6.7 & 23.8 & 5.6 & 0.0 & 7.9 & 13.5 \\ \hline {\bf Ours (SM+AVC)} & {\bf ES All} & 1ch+V & 10.5 & 6.6 & 4.0 & 21.1 & 5.6 & 0.0 & 4.8 & 10.4 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf ES All} & 8ch+V & 10.5 & 6.6 & {\bf 2.8} & {\bf 19.9} & 5.6 & 0.0 & {\bf 3.6} & {\bf 9.2} \\ \hline \hline Cabanas et al.~\cite{cabanas2018multimodal} & {\bf ES WB} & 8ch+V & - & - & - & 27.2 & - & - & - & - \\ \hline {\bf Ours (SM+AVC)} & {\bf ES WB} & 1ch+V & 11.4 & 7.1 & 4.9 & 23.3 & 6.1 & 0.0 & 5.9 & 12.0 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf ES WB} & 8ch+V & 11.4 & 7.1 & {\bf 3.8} & {\bf 22.3} & 6.1 & 0.0 & {\bf 4.9} & {\bf 10.9} \\ \hline \hline Cabanas et al.~\cite{cabanas2018multimodal} & {\bf ES NWB} & 8ch+V & - & - & - & 20.6 & - & - & - & - \\ \hline {\bf Ours (SM+AVC)} & {\bf ES NWB} & 1ch+V & 9.5 & 5.7 & 2.7 & 17.8 & 5.1 & 0.0 & 3.3 & 8.4 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf ES NWB} & 8ch+V & 9.5 & 5.7 & {\bf 1.4} & {\bf 16.6} & 5.1 & 0.0 & {\bf 1.9} & {\bf 7.0} \\ \hline \hline JHU Baseline~\cite{sell2018diarization} & {\bf IS All} & 1ch & 11.2 & 4.0 & 10.2 & 25.4 & 6.5 & 0.0 & 11.2 & 17.7 \\ \hline {\bf Ours (SM)} & {\bf IS All} & 1ch+V & 11.2 & 4.0 & 7.6 & 22.9 & 6.5 & 0.0 & 8.8 & 15.3 \\ \hline {\bf Ours (SM+AVC)} & {\bf IS All} & 1ch+V & 11.2 & 4.0 & 6.2 & 21.3 & 6.5 & 0.0 & 7.1 & 13.6 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf IS All} & 8ch+V & 11.2 & 4.0 & {\bf 4.9} & {\bf 20.0} & 6.5 & 0.0 & {\bf 5.8} & {\bf 12.3} \\ \hline \hline Cabanas et al.~\cite{cabanas2018multimodal} & {\bf IS WB} & 8ch+V & - & - & - & 32.3 & - & - & - & - \\ \hline {\bf Ours (SM+AVC)} & {\bf IS WB} & 1ch+V & 13.3 & 5.1 & 7.7 & 26.1 &7.9 & 0.0 & 8.9 & 16.9 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf IS WB} & 8ch+V & 13.3 & 5.1 & {\bf 6.5} & {\bf 24.8} &7.9 & 0.0 & {\bf 7.8} & {\bf 15.7} \\ \hline \hline Cabanas et al.~\cite{cabanas2018multimodal} & {\bf IS NWB} & 8ch+V & - & - & - & 21.7 & - & - & - & - \\ \hline {\bf Ours (SM+AVC)} & {\bf IS NWB} & 1ch+V & 9.3 & 2.8 & 4.8 & 16.8 & 5.3 & 0.0 & 5.4 & 10.6 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf IS NWB} & 8ch+V & 9.3 & 2.8 & {\bf 3.4} & {\bf 15.5} & 5.3 & 0.0 & {\bf 4.0} & {\bf 9.3} \\ \hline \hline JHU Baseline~\cite{sell2018diarization} & {\bf Internal} & 1ch & 1.8 & 4.5 & 72.2 &78.6 & 0.0 & 0.0 & 73.3 & 73.3 \\ \hline {\bf Ours (SM)} & {\bf Internal} & 1ch+V & 1.8 & 4.5 & 24.8 & 31.1 & 0.0 & 0.0 & 25.6 & 25.6 \\ \hline {\bf Ours (SM+AVC)} & {\bf Internal} & 1ch+V & 1.8 & 4.5 & 18.7 & 25.0 & 0.0 & 0.0 & 19.4 & 19.4 \\ \hline {\bf Ours (SM+AVC+SSL)} & {\bf Internal} & 8ch+V & 1.8 & 4.5 & {\bf 13.1} & {\bf 19.4} & 0.0 & 0.0 & {\bf 13.7} & {\bf 13.7} \\ \hline \end{tabular} \end{center} \normalsize \caption{Diarisation results (lower is better). The results are on the AMI dataset except for the last four rows. {\bf WB}: Whiteboard; {\bf NWB}: No whiteboard; {\bf $X$ch+V}: $X$ channel audio + video; {\bf SM}: Speaker Modelling; {\bf AVC}: Audio Visual Correspondence; {\bf SSL}: Sound Source Localisation; {\bf MS}: Missed Speech; {\bf FA}: False Alarm; {\bf SPKE}: Speaker Error; {\bf DER}: Diarisation Error Rate.} \label{tab:ami_results} \vspace{-5pt} \end{table*} \section{Experiments} \label{sec:exp} The proposed method is evaluated on two independent datasets: our internal dataset of meetings recorded with 360$^{\circ}$ camera, and the publicly available AMI meeting corpus. Each will be described in the following paragraphs. \subsection{Internal meeting dataset} \label{subsec:internaldata} The internal meeting dataset consists of audio-visual recording of regular meetings in which no particular instructions are given to the participants with regard to the recording of the video. The meetings form parts of daily discussions from the workspace of the authors and are not set up in any way with the diarisation task in mind. A large proportion of the dataset consists of very short utterances with frequent speaker changes, providing an extremely challenging condition. The video is recorded using a GoPro Fusion camera, which captures $\ang{360}$ videos of the meeting with two fish-eye lenses. The videos are stitched together into a single surround-view video of 5228x2624 resolution at 25 frames per second. The audio is recorded using a 4-channel microphone at 48 kHz. A still image from the dataset is shown in Figure~\ref{fig:internaldata}. The dataset contains approximately 3 hours of validation set and 40 minutes of carefully annotated test set. The test video contains 9 speakers. In the case of overlapped speech, we only annotated the ID of main (loudest) speaker. The embedding extractor and the AV synchronisation network are trained on external datasets, and the validation set is only used for tuning the AHC threshold in the baseline system and the fusion weights in the proposed system. \begin{figure}[!t] \centering \includegraphics[width=1\linewidth]{figures/data1.jpg} \caption{Still image from the internal meeting dataset. } \label{fig:internaldata} \end{figure} \begin{figure}[t] \centering \includegraphics[width=0.49\linewidth]{figures/ami1.png} \includegraphics[width=0.49\linewidth]{figures/ami2.png} \caption{Still images from the AMI corpus. } \label{fig:ami_room} \end{figure} \subsection{AMI corpus} \label{subsec:ami} The AMI corpus consists of 100 hours of video recorded across a number of locations and has been used by many previous works on audio-only and audio-visual diarisation. Of the 100 hours of video, we evaluate on meetings in ES (Edinburgh) and IS (Idiap) categories, which contain approximately 30 and 17 hours of video respectively. On the IS videos, {\tt IS1002a}, {\tt IS1003b}, {\tt IS1005d}, {\tt IS1007d} were not used in the experiments due to partially missing data. The image quality is relatively low, with the video resolution of 288x352 pixels. The audio is recorded from an 8-element circular equi-spaced microphone array with a diameter of 20cm. However, we only use one microphone from the array in most of our experiments. The video is recorded with 4 cameras providing close-up views of each of the meeting's participants, and unlike the internal dataset (Sec.~\ref{subsec:internaldata}), the images are not stitched together. The ES videos is used as the validation set for tuning the thresholds. \subsection{Evaluation metric} We use Diarisation Error Rate (DER) as our performance metric. The DER can be decomposed into three components: missed speech (MS, speaker in reference, but not in hypothesis), false alarm (FA, speaker in hypothesis, but not in reference) and speaker error (SPKE, speaker ID is assigned to the wrong speaker). The tool used for evaluating the system is the one developed for the RT Diarization evaluations by NIST~\cite{istrate2005nist}, and includes acceptance margin of 250 ms to compensate for human errors in reference annotation. \subsection{Results} Results on the AMI corpus~\cite{carletta2005ami} are given in Table~\ref{tab:ami_results}. The numbers for meetings where the whiteboard is used are provided separately, so that the results can be compared to~\cite{sell2018diarization}. Missed speech and false alarm rates are the same across different models for each dataset since we use the same VAD system in all of our experiments. Therefore the speaker error rate (SPKE) is the only metric affected by the diarisation system. Our speaker model only system (SM) uses the visual information only to find out when to enroll the speaker models, and during inference only uses the audio. Since the audio processing pipeline and the embedding extractor are common across our system and the JHU-based baseline, the performance gain arises from changing a clustering problem into a classification problem. This alone results in 48\% and 26\% relative improvement in speaker error on the ES and IS sets, respectively. It is also clear from the results that the addition of the AV correspondence (AVC) and sound source localisation (SSL) at inference time both provide boost to the performance. The contributions of these modalities to overall relative performance are 20-40\% and 19-39\% respectively depending on the test set. Note that our results exceed the recent audio-visual method of~\cite{cabanas2018multimodal} across all test conditions by a significant margin, whilst using the same input modalities. \cite{friedland2010dialocalization} also reports competitive results on a subset of the IS videos (SPKE of 7.3\%, DER of 19.5\% using 4 cameras and 8 microphones), however the results cannot be compared directly to our work since some of the test videos are no longer available at the time of writing this paper. The speaker error rates are markedly worse on the internal meeting dataset, presumably due to the more challenging nature of the dataset and the larger number of speakers. From the results in Table~\ref{tab:ami_results}, it can be seen that the baseline system does not generalise to this dataset, but the proposed multi-modal systems perform relatively well on this ‘in the wild' data. \section{Conclusion} In this paper, we have introduced a multi-modal system which takes advantage of audio-visual correspondence to enroll speaker models. We have shown that speaker modelling with audio-visual enrollment have significant advantages over clustering methods typically used for diarisation. Areas for further research include learnable methods for multimodal fusion, improvements to the speech activity detection (SAD) modules and the combination of audio-visual diarisation and audio-visual speech separation for meeting transcription and for handling overlapped speech. \vspace{10pt} \noindent\textbf{Acknowledgment.} We would like to thank Chiheon Ham, Han-Gyu Kim, Jaesung Huh, Minjae Lee, Minsub Yim, Soyeon Choe and Soonik Kim for helpful comments and discussion. \clearpage \bibliographystyle{IEEEtran}
\section{Introduction} Difference equation or discrete dynamical system is a diverse field which impact almost every branch of pure and applied mathematics. Lately, there has been great interest in the study of solving difference equations and systems of difference equations, see [\ref{Yazlik2013}-\ref{Akrour2019}]. In these studies, the authors deal with the closed-form, stability,periodicity, boundeness and asymptotically behavior of solutions of nonlinear difference equations and systems of difference equations. There are many recent investigations and interest in the field which difference equations have been studied by several authors, as in the examples given below: Tollu et al. [\ref{Tollu2014}] considered the following four Riccati difference equation \begin{equation} x_{n+1}=\frac{1+x_{n}}{x_{n}},\ \ y_{n+1}=\frac{1-y_{n}}{y_{n}}\text{, \ u_{n+1}=\frac{1}{u_{n}+1},\ \ v_{n+1}=\frac{1}{v_{n}-1}\text{,} \label{eu:fourequ} \end{equation in which the initial conditions are real numbers. They derived the formulae for the solutions of equations (\ref{eu:fourequ}) with their solutions are associated to Fibonacci numbers. Also, they in [\ref{Tollu2014a}] studied the systems of difference equation \begin{equation*} x_{n+1}=\frac{1+p_{n}}{q_{n}},\ \ y_{n+1}=\frac{1+r_{n}}{s_{n}}\text{, \ n\in \mathbb{N} _{0}\text{,} \end{equation* where each of the sequences $p_{n}$, $q_{n}$, $r_{n}$ and $s_{n}$ is some of the sequences $x_{n}$ or $y_{n}$ by their own. They solved fourteen systems out of sixteen possible systems. In particularly, the representation formulae of solutions of twelve systems were stated via Fibonacci numbers. In [\ref{Matsunaga2018}], Matsunaga and Suzuki studied the following system of rational difference equation \begin{equation} x_{n+1}=\frac{ay_{n}+b}{cy_{n}+d}\text{, \ }y_{n+1}=\frac{ax_{n-1}+b} cx_{n}+d}\text{, \ }n=0,1,...\text{,} \label{equ:sdllh} \end{equation where the parameters $a$, $b$, $c$, $d$ and the initial values $x_{0}$, y_{0}$ are real numbers. They obtained the explicit solutions of system (\re {equ:sdllh}) which are generalized Fibonacci sequence. In [\ref{Ocalan2019}], \"{O}calan and Duman considered the following nonlinear recursive difference equatio \begin{equation} x_{n+1}=\frac{x_{n-1}}{x_{n}},\ n=0,1,...\text{,} \label{equ:okuhj} \end{equation with any nonzero initial values $x_{-1}$ and $x_{0}$. Then, they extended their all results to solutions of the following nonlinear recursive equation \begin{equation} x_{n+1}=\left( \frac{x_{n-1}}{x_{n}}\right) ^{p},\ p>0\text{ and }n=0,1,.. \text{,} \label{equ:uhygtf} \end{equation with any nonzero initial values $x_{-1}$ and $x_{0}$. Hence, in this study, we consider the following systems of difference equation \begin{equation} x_{n+1}=\frac{1}{y_{n}\left( x_{n-1}+1\right) +1},\ \ y_{n+1}=\frac{1} x_{n}\left( y_{n-1}+1\right) +1},\text{ \ }n=0,1,...\text{,} \label{equ:oooooooooooooojk} \end{equation \begin{equation} x_{n+1}=\frac{-1}{y_{n}\left( x_{n-1}-1\right) +1},\ \ y_{n+1}=\frac{-1} x_{n}\left( y_{n-1}-1\right) +1},\text{ \ }n=0,1,...\text{,} \label{equ:waszxb} \end{equation such that their solutions are associated with Tribonacci numbers. Our aim in this study is to determine some relationships both between Tribonacci numbers and and solutions of the aforementioned systems of difference equations and between the tribonacci constant and the equilibrium points of these systems of difference equations. \section{Preliminaries} \subsection{Linearized stability} Let us introduce the discrete dynamical system \begin{eqnarray} x_{n+1} &=&f_{1}\left( x_{n},y_{n}\right) \text{,} \label{equ:tttttt} \\ y_{n+1} &=&f_{2}\left( x_{n},y_{n}\right) \text{,} \notag \end{eqnarray $n\in \mathbb{N} $, where $f_{1}:I_{1}\times I_{2}\rightarrow I_{1}$and $f_{2}:I_{1}\times I_{2}\rightarrow I_{2}$\ are continuously differentiable functions and I_{1} $, $I_{2}$ are some intervals of real numbers. Also, a solution \{x_{n},y_{n}\}_{n=-k}^{\infty }$ of system (\ref{equ:tttttt}) is uniquely determined by initial values $\left( x_{0},y_{0}\right) \in I_{1}\times I_{2} $. \begin{definition} An equilibrium point of system (\ref{equ:tttttt}) is a point $\left( \overline{x},\overline{y}\right) $ that satisfie \begin{eqnarray*} \overline{x} &=&f_{1}\left( \overline{x},\overline{y}\right) \text{,} \\ \overline{y} &=&f_{2}\left( \overline{x},\overline{y}\right) \text{.} \end{eqnarray*} \end{definition} Together with system (\ref{equ:tttttt}), if we consider the associated vector ma \begin{equation*} K=\left( f_{1},x_{n},f_{2},y_{n}\right) \text{,} \end{equation* then the point $\left( \overline{x},\overline{y}\right) $ is also called a fixed point of the vector map $K$. \begin{definition} Let $\left( \overline{x},\overline{y}\right) $ be an equilibrium point of the map $K$ where $f_{1}$,and $f_{2}$ are continuously differentiable functions at $\left( \overline{x},\overline{y}\right) $. The linearized system of system (\ref{equ:tttttt}) about the equilibrium point $\left( \overline{x},\overline{y}\right) $ i \begin{equation} X_{n+1}=K\left( X_{n}\right) =BX_{n}\text{,} \label{equ:iiiiiiiiii} \end{equation wher \begin{equation*} X_{n}=\left( x_{n},y_{n}\right) ^{T} \end{equation* and $B$ is a Jacobian matrix of system (\ref{equ:tttttt}) about the equilibrium point $\left( \overline{x},\overline{y}\right) $. \end{definition} The linearized system, associated to system (\ref{equ:tttttt}), about the equilibrium point $\left( \overline{x},\overline{y}\right) $ is given b \begin{equation*} \left( \begin{array}{c} x_{n+1} \\ y_{n+1 \end{array \right) =\left( \begin{array}{cc} \frac{\partial f_{1}}{\partial x_{n}}\left( \overline{x},\overline{y}\right) & \frac{\partial f_{1}}{\partial y_{n}}\left( \overline{x},\overline{y \right) \\ \frac{\partial f_{2}}{\partial x_{n}}\left( \overline{x},\overline{y}\right) & \frac{\partial f_{2}}{\partial y_{n}}\left( \overline{x},\overline{y \right \end{array \right) \left( \begin{array}{c} x_{n} \\ y_{n \end{array \right) \text{.} \end{equation*} \begin{definition} Let $\left( \overline{x},\overline{y}\right) $ be an equilibrium point of system (\ref{equ:tttttt}). \begin{description} \item[(a)] An equilibrium point $\left( \overline{x},\overline{y}\right) $ is called stable if, for every $\varepsilon >0$; there exists $\delta >0$ such that for every initial value $\left( x_{0},y_{0}\right) \in I_{1}\times I_{2}$, wit \begin{equation*} \left\vert x_{0}-\overline{x}\right\vert <\delta ,\text{ }\left\vert y_{0} \overline{y}\right\vert <\delta \text{,} \end{equation* implying $\left\vert x_{n}-\overline{x}\right\vert <\varepsilon $, \left\vert y_{n}-\overline{y}\right\vert <\varepsilon $, for $n\in \mathbb{N} $. \item[(b)] If an equilibrium point $\left( \overline{x},\overline{y}\right) $ of system (\ref{equ:tttttt}) is called unstable if it is not stable. \item[(c)] An equilibrium point $\left( \overline{x},\overline{y}\right) $ of system (\ref{equ:tttttt})\ is called locally asymptotically stable if, it is stable, and if in addition there exists $\gamma >0$ such tha \begin{equation*} \left\vert x_{0}-\overline{x}\right\vert <\gamma ,\text{ }\left\vert y_{0} \overline{y}\right\vert <\gamma \text{,} \end{equation* and $\left( x_{n},y_{n}\right) \rightarrow \left( \overline{x},\overline{y \right) $ as $n\rightarrow \infty $. \item[(d)] An equilibrium point $\left( \overline{x},\overline{y}\right) $ of system (\ref{equ:tttttt})\ is called a global attractor if $\left( x_{n},y_{n}\right) \rightarrow \left( \overline{x},\overline{y}\right) $ as n\rightarrow \infty $. \item[(e)] An equilibrium point $\left( \overline{x},\overline{y}\right) $ of system (\ref{equ:tttttt})\ is called globally asymptotically stable if it is stable, and a global attractor. \end{description} \end{definition} \begin{theorem}[The Linearized Stability Theorem] \label{theorem:ertgbns} Assume tha \begin{equation*} X_{n+1}=K\left( X_{n}\right) ,n=0,1,..., \end{equation* be a systemdifference equations such that $\overline{X}$ is a fixed point of $F$. \begin{description} \item[(a)] If all eigenvalues of the Jacobian matrix $B$ about $\overline{X}$ lie inside the open unit disk $\left\vert \lambda \right\vert <1$, that is, if all of them have absolute value less than one, then $\overline{X}$\ is locally asymptotically stable. \item[(b)] If at least one of them has a modulus greater than one, then \overline{X}$\ is unstable. \end{description} \end{theorem} \subsection{Tribonacci numbers} Now, we give information about Tribonacci numbers that we afterwards need in the paper. The Tribonacci sequence $\left\{ T_{n}\right\} _{n=0}^{\infty }$ is defined by the third-order recurrence relation \begin{equation} T_{n+3}=T_{n+2}+T_{n+1}+T_{n}\text{,} \label{equ:opopopop} \end{equation with initial conditions $T_{0}=0$, $T_{1}=1$, $T_{2}=1$. Also, it can be extended the Tribonacci sequence backward (negative subscripts) a \begin{equation} T_{-n}=T_{-n+3}-T_{-n+2}-T_{-n+1}\text{.} \label{equ:otuotu} \end{equation It can be clearly obtained that the characteristic equation of (\re {equ:opopopop}) has the for \begin{equation} x^{3}-x^{2}-x-1=0 \label{equ:eeeeeeeeee} \end{equation such that the root \begin{eqnarray*} \alpha &=&\frac{1+\sqrt[3]{19+3\sqrt{33}}+\sqrt[3]{19-3\sqrt{33}}}{3} \\ \beta &=&\frac{1+\omega \sqrt[3]{19+3\sqrt{33}}+\omega ^{2}\sqrt[3]{19- \sqrt{33}}}{3} \\ \gamma &=&\frac{1+\omega ^{2}\sqrt[3]{19+3\sqrt{33}}+\omega \sqrt[3]{19- \sqrt{33}}}{3} \end{eqnarray* where $\alpha $ is called Tribonacci constant an \begin{equation*} \omega =\frac{-1+i\sqrt{3}}{2}=\exp \left( 2\pi i/3\right) \end{equation* is a primitive cube root of unity. Therefore, Tribonacci sequence can be expressed using Binet formul \begin{equation*} T_{n}=\frac{\alpha ^{n+1}}{\left( \alpha -\beta \right) \left( \alpha -\gamma \right) }+\frac{\beta ^{n+1}}{\left( \beta -\alpha \right) \left( \beta -\gamma \right) }+\frac{\gamma ^{n+1}}{\left( \gamma -\alpha \right) \left( \gamma -\beta \right) }\text{.} \end{equation*} Furthermore, there exist the following limi \begin{equation} \lim_{n\rightarrow \infty }\frac{T_{n+r}}{T_{n}}=\alpha ^{r}\text{,} \label{lim:wwswws} \end{equation where $r\in \mathbb{Z} $ and $T_{n}$ is the $n$th Tribonacci number. \section{Main Results} In this section, we introduce our results. \subsection{The System (\protect\ref{equ:oooooooooooooojk})} In this subsection, we present our main results related to the system (\re {equ:oooooooooooooojk}). Our aim is to investigate the general solution in exact form of system (\ref{equ:oooooooooooooojk}).and the asymptotic behavior of solutions of system (\ref{equ:oooooooooooooojk}). \begin{theorem} \label{theorem:resxbnr}Let $\left \{ x_{n},y_{n}\right \} _{n=-1}^{\infty }$ be a solution system (\ref{equ:oooooooooooooojk}). Then, for $n=0,1,2,...$, the form of solutions $\left \{ x_{n},y_{n}\right \} _{n=-1}^{\infty }$ is given b \begin{eqnarray*} x_{2n-1} &=&\frac{T_{2n-2}x_{-1}y_{0}+\left( T_{2n}-T_{2n-1}\right) y_{0}+T_{2n-1}}{T_{2n-1}x_{-1}y_{0}+\left( T_{2n-2}+T_{2n-1}\right) y_{0}+T_{2n}}\text{,} \\ x_{2n} &=&\frac{T_{2n-1}y_{-1}x_{0}+\left( T_{2n+1}-T_{2n}\right) x_{0}+T_{2n}}{T_{2n}y_{-1}x_{0}+\left( T_{2n-1}+T_{2n}\right) x_{0}+T_{2n+1} \text{,} \\ y_{2n-1} &=&\frac{T_{2n-2}y_{-1}x_{0}+\left( T_{2n}-T_{2n-1}\right) x_{0}+T_{2n-1}}{T_{2n-1}y_{-1}x_{0}+\left( T_{2n-2}+T_{2n-1}\right) x_{0}+T_{2n}}\text{,} \\ y_{2n} &=&\frac{T_{2n-1}x_{-1}y_{0}+\left( T_{2n+1}-T_{2n}\right) y_{0}+T_{2n}}{T_{2n}x_{-1}y_{0}+\left( T_{2n-1}+T_{2n}\right) y_{0}+T_{2n+1} \text{,} \end{eqnarray* where $T_{n}$ is the $n$th Tribonacci number and the initial conditions x_{-1}$, $y_{-1}$, $x_{0}$, $y_{0}\in \mathbb{R} -F$, with $F$ is the forbidden set of system (\ref{equ:oooooooooooooojk}) given b \begin{equation*} F=\dbigcup \limits_{n=-1}^{\infty }\left \{ \left( x_{-1},y_{-1},x_{0},y_{0}\right) :A_{n}=0\text{, }B_{n}=0\text{, }C_{n}= \text{, }D_{n}=0\right \} \end{equation* wher \begin{eqnarray*} A_{n} &=&T_{2n-1}x_{-1}y_{0}+\left( T_{2n-2}+T_{2n-1}\right) y_{0}+T_{2n \text{,} \\ B_{n} &=&T_{2n}y_{-1}x_{0}+\left( T_{2n-1}+T_{2n}\right) x_{0}+T_{2n+1}\text ,} \\ C_{n} &=&T_{2n-1}y_{-1}x_{0}+\left( T_{2n-2}+T_{2n-1}\right) x_{0}+T_{2n \text{,} \\ D_{n} &=&T_{2n}x_{-1}y_{0}+\left( T_{2n-1}+T_{2n}\right) y_{0}+T_{2n+1}\text .} \end{eqnarray*} \end{theorem} \textbf{Proof.} We use the induction on $k$. For $k=0$, the result holds. Suppose that $k>0$ and that our assumption holds for $k-1$. That is \begin{eqnarray*} x_{2k-3} &=&\frac{T_{2k-4}x_{-1}y_{0}+\left( T_{2k-2}-T_{2k-3}\right) y_{0}+T_{2k-3}}{T_{2k-3}x_{-1}y_{0}+\left( T_{2k-4}+T_{2k-3}\right) y_{0}+T_{2k-2}}\text{,} \\ x_{k-2} &=&\frac{T_{2k-3}y_{-1}x_{0}+\left( T_{2k-1}-T_{2k-2}\right) x_{0}+T_{2k-2}}{T_{2k-2}y_{-1}x_{0}+\left( T_{2k-3}+T_{2k-2}\right) x_{0}+T_{2k-1}}\text{,} \\ y_{2k-3} &=&\frac{T_{2k-4}y_{-1}x_{0}+\left( T_{2k-2}-T_{2k-3}\right) x_{0}+T_{2k-3}}{T_{2k-3}y_{-1}x_{0}+\left( T_{2k-4}+T_{2k-3}\right) x_{0}+T_{2k-2}}\text{,} \\ y_{2k-2} &=&\frac{T_{2k-3}x_{-1}y_{0}+\left( T_{2k-1}-T_{2k-2}\right) y_{0}+T_{2k-2}}{T_{2k-2}x_{-1}y_{0}+\left( T_{2k-3}+T_{2k-2}\right) y_{0}+T_{2k-1}}\text{.} \end{eqnarray* From system (\ref{equ:oooooooooooooojk}) and (\ref{equ:opopopop}), it follows tha \begin{eqnarray*} x_{2k-1} &=&\frac{1}{y_{2k-2}\left( x_{2k-3}+1\right) +1} \\ &=&\frac{1}{\frac{T_{2k-3}x_{-1}y_{0}+\left( T_{2k-1}-T_{2k-2}\right) y_{0}+T_{2k-2}}{T_{2k-2}x_{-1}y_{0}+\left( T_{2k-3}+T_{2k-2}\right) y_{0}+T_{2k-1}}\left( \frac{T_{2k-4}x_{-1}y_{0}+\left( T_{2k-2}-T_{2k-3}\right) y_{0}+T_{2k-3}}{T_{2k-3}x_{-1}y_{0}+\left( T_{2k-4}+T_{2k-3}\right) y_{0}+T_{2k-2}}+1\right) +1} \\ &=&\frac{T_{2k-2}x_{-1}y_{0}+\left( T_{2k-3}+T_{2k-2}\right) y_{0}+T_{2k-1}} \left( T_{2k-4}+T_{2k-3}+T_{2k-2}\right) x_{-1}y_{0}+\left( T_{2k-2}+T_{2k-1}\right) y_{0}+T_{2k-3}+T_{2k-2}+T_{2k-1}}\text{.} \end{eqnarray* Therefore, we hav \begin{equation*} x_{2k-1}=\frac{T_{2k-2}x_{-1}y_{0}+\left( T_{2k}-T_{2k-1}\right) y_{0}+T_{2k-1}}{T_{2k-1}x_{-1}y_{0}+\left( T_{2k-2}+T_{2k-1}\right) y_{0}+T_{2k}}\text{.} \end{equation* And also, it follows tha \begin{eqnarray*} y_{2k-1} &=&\frac{1}{x_{2k-2}\left( y_{2k-3}+1\right) +1} \\ &=&\frac{1}{\frac{T_{2k-3}y_{-1}x_{0}+\left( T_{2k-1}-T_{2k-2}\right) x_{0}+T_{2k-2}}{T_{2k-2}y_{-1}x_{0}+\left( T_{2k-3}+T_{2k-2}\right) x_{0}+T_{2k-1}}\left( \frac{T_{2k-4}y_{-1}x_{0}+\left( T_{2k-2}-T_{2k-3}\right) x_{0}+T_{2k-3}}{T_{2k-3}y_{-1}x_{0}+\left( T_{2k-4}+T_{2k-3}\right) x_{0}+T_{2k-2}}+1\right) +1} \\ &=&\frac{T_{2k-2}y_{-1}x_{0}+\left( T_{2k-3}+T_{2k-2}\right) x_{0}+T_{2k-1}} \left( T_{2k-4}+T_{2k-3}+T_{2k-2}\right) y_{-1}x_{0}+\left( T_{2k-2}+T_{2k-1}\right) x_{0}+T_{2k-3}+T_{2k-2}+T_{2k-1}}\text{.} \end{eqnarray* So, we obtai \begin{equation*} y_{2k-1}=\frac{T_{2k-2}y_{-1}x_{0}+\left( T_{2k}-T_{2k-1}\right) x_{0}+T_{2k-1}}{T_{2k-1}y_{-1}x_{0}+\left( T_{2k-2}+T_{2k-1}\right) x_{0}+T_{2k}}\text{.} \end{equation* Similarly, from system (\ref{equ:oooooooooooooojk}) and (\ref{equ:opopopop ), it follows tha \begin{eqnarray*} x_{2k} &=&\frac{1}{y_{2k-1}\left( x_{2k-2}+1\right) +1} \\ &=&\frac{1}{\frac{T_{2k-2}y_{-1}x_{0}+\left( T_{2k}-T_{2k-1}\right) x_{0}+T_{2k-1}}{T_{2k-1}y_{-1}x_{0}+\left( T_{2k-2}+T_{2k-1}\right) x_{0}+T_{2k}}\left( \frac{T_{2k-3}y_{-1}x_{0}+\left( T_{2k-1}-T_{2k-2}\right) x_{0}+T_{2k-2}}{T_{2k-2}y_{-1}x_{0}+\left( T_{2k-3}+T_{2k-2}\right) x_{0}+T_{2k-1}}+1\right) +1} \\ &=&\frac{T_{2k-1}y_{-1}x_{0}+\left( T_{2k-2}+T_{2k-1}\right) x_{0}+T_{2k}} \left( T_{2k-3}+T_{2k-2}+T_{2k-1}\right) y_{-1}x_{0}+\left( T_{2k-1}+T_{2k}\right) x_{0}+T_{2k-2}+T_{2k-1}+T_{2k}}\text{.} \end{eqnarray* Thus, we ge \begin{equation*} x_{2k}=\frac{T_{2k-1}y_{-1}x_{0}+\left( T_{2k-2}+T_{2k-1}\right) x_{0}+T_{2k }{T_{2k}y_{-1}x_{0}+\left( T_{2k-1}+T_{2k}\right) x_{0}+T_{2k+1}}\text{.} \end{equation* And also, it follows tha \begin{eqnarray*} y_{2k} &=&\frac{1}{x_{2k-1}\left( y_{2k-2}+1\right) +1} \\ &=&\frac{1}{\frac{T_{2k-2}x_{-1}y_{0}+\left( T_{2k}-T_{2k-1}\right) y_{0}+T_{2k-1}}{T_{2k-1}x_{-1}y_{0}+\left( T_{2k-2}+T_{2k-1}\right) y_{0}+T_{2k}}\left( \frac{T_{2k-3}x_{-1}y_{0}+\left( T_{2k-1}-T_{2k-2}\right) y_{0}+T_{2k-2}}{T_{2k-2}x_{-1}y_{0}+\left( T_{2k-3}+T_{2k-2}\right) y_{0}+T_{2k-1}}+1\right) +1} \\ &=&\frac{T_{2k-1}x_{-1}y_{0}+\left( T_{2k-2}+T_{2k-1}\right) y_{0}+T_{2k}} \left( T_{2k-3}+T_{2k-2}+T_{2k-1}\right) x_{-1}y_{0}+\left( T_{2k-1}+T_{2k}\right) y_{0}+T_{2k-2}+T_{2k-1}+T_{2k}}\text{.} \end{eqnarray* Herefrom, we hav \begin{equation*} y_{2k}=\frac{T_{2k-1}x_{-1}y_{0}+\left( T_{2k-2}+T_{2k-1}\right) y_{0}+T_{2k }{T_{2k}x_{-1}y_{0}+\left( T_{2k-1}+T_{2k}\right) y_{0}+T_{2k+1}}\text{.} \end{equation*} \begin{theorem} \label{theorem:qqasefrtv}The system (\ref{equ:oooooooooooooojk}) has unique positive equilibrium point $\left( \overline{x},\overline{y}\right) =\left( a,a\right) $ and $\left( a,a\right) $ is locally asymptotically stable. \end{theorem} \textbf{Proof.} Clearly, equilibrium point of system (\re {equ:oooooooooooooojk}) is the real roots of the equation \begin{equation} \overline{x}=\frac{1}{\overline{x}\left( \overline{y}+1\right) +1}\text{, \ \overline{y}=\frac{1}{\overline{y}\left( \overline{x}+1\right) +1}\text{.} \label{equ:yykjhgf} \end{equation In (\ref{equ:yykjhgf}), after some operations, we obtai \begin{equation*} \overline{x}=\overline{y}\text{.} \end{equation* As a result, we obtain the following equatio \begin{equation} \overline{x}^{3}+\overline{x}^{2}+\overline{x}-1=0\text{.} \label{equ:kkmnbrq} \end{equation Then, the roots of the cubic equation (\ref{equ:kkmnbrq}) are given b \begin{eqnarray*} a &=&\frac{-1+\sqrt[3]{3\sqrt{33}+17}-\sqrt[3]{3\sqrt{33}-17}}{3}\text{,} \\ b &=&\frac{-1+\omega \sqrt[3]{3\sqrt{33}+17}-\omega ^{2}\sqrt[3]{3\sqrt{33 -17}}{3}\text{,} \\ c &=&\frac{-1+\omega ^{2}\sqrt[3]{3\sqrt{33}+17}-\omega \sqrt[3]{3\sqrt{33 -17}}{3}\text{,} \end{eqnarray* wher \begin{equation*} \omega =\frac{-1+i\sqrt{3}}{2}=\exp \left( 2\pi i/3\right) \end{equation* is a primitive cube root of unity.\ So, the root $a$ is only real number. Therefore, the unique positive equilibrium point of system (\re {equ:oooooooooooooojk}) is $\left( \overline{x},\overline{y}\right) =\left( a,a\right) $. Now, we show that the unique positive equilibrium point of system (\re {equ:oooooooooooooojk}) is locally asymptotically stable. Let $I$ and $J$ are some intervals of real numbers.and consider the function \begin{equation*} f:I^{2}\times J^{2}\rightarrow I\text{ and }g:I^{2}\times J^{2}\rightarrow J \end{equation* defined b \begin{equation*} f\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) =\frac{1}{y_{n}\left( x_{n-1}+1\right) +1},\ g\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) =\frac{1} x_{n}\left( y_{n-1}+1\right) +1}\text{.} \end{equation*} We consider the following transformation to build corresponding linearized form of system (\ref{equ:oooooooooooooojk} \begin{equation*} \left( x_{n},x_{n-1},y_{n},y_{n-1}\right) \rightarrow \left( f,f_{1},g,g_{1}\right) \text{,} \end{equation* wher \begin{eqnarray*} f\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&\frac{1}{y_{n}\left( x_{n-1}+1\right) +1}\text{,} \\ f_{1}\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&x_{n}\text{,} \\ g\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&\frac{1}{x_{n}\left( y_{n-1}+1\right) +1}\text{,} \\ g_{1}\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&y_{n}\text{.} \end{eqnarray*} Then, the linearized system of system (\ref{equ:oooooooooooooojk}) about the equilibrium point $\left( a,a\right) $ under the above transformation is given a \begin{equation*} X_{n+1}=BX_{n}\text{,} \end{equation* where $X_{n}=\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) ^{T}$ and $B$ is a Jacobian matrix of system (\ref{equ:oooooooooooooojk}) about the equilibrium point $\left( a,a\right) $ and given b \begin{eqnarray*} B &=&\left( \begin{array}{cccc} 0 & \frac{-a}{\left( a\left( a+1\right) +1\right) ^{2}} & \frac{-\left( 1+a\right) }{\left( a\left( a+1\right) +1\right) ^{2}} & 0 \\ 1 & 0 & 0 & 0 \\ \frac{-\left( 1+a\right) }{\left( a\left( a+1\right) +1\right) ^{2}} & 0 & 0 & \frac{-a}{\left( a\left( a+1\right) +1\right) ^{2}} \\ 0 & 0 & 1 & \end{array \right) \\ &=&\left( \begin{array}{cccc} 0 & -a^{3} & a-1 & 0 \\ 1 & 0 & 0 & 0 \\ a-1 & 0 & 0 & -a^{3} \\ 0 & 0 & 1 & \end{array \right) \text{.} \end{eqnarray* Thus, we obtain the characteristic equation of the Jacobian matrix $B$ a \begin{equation*} \left( a^{3}+\lambda ^{2}\right) ^{2}-\left( a-1\right) ^{2}\lambda ^{2}= \text{,} \end{equation* o \begin{equation*} \left( \lambda ^{2}+\left( a-1\right) \lambda +a^{3}\right) \left( \lambda ^{2}-\left( a-1\right) \lambda +a^{3}\right) =0\text{.} \end{equation* Hence, it is clearly seen that numericall \begin{equation*} \left \vert \lambda _{1}\right \vert =\left \vert \lambda _{2}\right \vert =\left \vert \lambda _{3}\right \vert =\left \vert \lambda _{4}\right \vert =0.40089<1\text{.} \end{equation* Consequently, the equilibrium point $\left( a,a\right) $ is locally asymptotically stable. So, this completes the proof. \begin{theorem} The equilibrium point of system (\ref{equ:oooooooooooooojk}) is globally asymptotically stable. \end{theorem} \textbf{Proof.} Let $\left \{ x_{n},y_{n}\right \} _{n\geq -1}$ be a solution system (\ref{equ:oooooooooooooojk}). By Theorem (\re {theorem:qqasefrtv}), we need only to prove that the equilibrium point \left( a,a\right) $ is global attractor, that i \begin{equation*} \lim_{n\rightarrow \infty }\left( x_{n},y_{n}\right) =\left( a,a\right) \text{.} \end{equation* From Theorem (\ref{theorem:resxbnr}), (\ref{equ:eeeeeeeeee}) and (\re {lim:wwswws}), it follows tha \begin{eqnarray*} \lim_{n\rightarrow \infty }x_{2n-1} &=&\lim_{n\rightarrow \infty }\frac T_{2n-2}x_{-1}y_{0}+\left( T_{2n}-T_{2n-1}\right) y_{0}+T_{2n-1}} T_{2n-1}x_{-1}y_{0}+\left( T_{2n-2}+T_{2n-1}\right) y_{0}+T_{2n}} \\ &=&\lim_{n\rightarrow \infty }\frac{T_{2n-2}\left( x_{-1}y_{0}+\left( \frac T_{2n}}{T_{2n-2}}-\frac{T_{2n-1}}{T_{2n-2}}\right) y_{0}+\frac{T_{2n-1}} T_{2n-2}}\right) }{T_{2n-1}\left( x_{-1}y_{0}+\left( \frac{T_{2n-2}}{T_{2n-1 }+1\right) y_{0}+\frac{T_{2n}}{T_{2n-1}}\right) } \\ &=&\left( \frac{x_{-1}y_{0}+\left( \alpha ^{2}-\alpha \right) y_{0}+\alpha } x_{-1}y_{0}+\left( \frac{1}{\alpha }+1\right) y_{0}+\alpha }\right) \lim_{n\rightarrow \infty }\frac{T_{2n-2}}{T_{2n-1}} \\ &=&\lim_{n\rightarrow \infty }\frac{T_{2n-2}}{T_{2n-1}} \\ &=&\frac{1}{\alpha } \\ &=&a, \end{eqnarray* an \begin{eqnarray*} \lim_{n\rightarrow \infty }x_{2n} &=&\lim_{n\rightarrow \infty }\frac T_{2n-1}y_{-1}x_{0}+\left( T_{2n+1}-T_{2n}\right) x_{0}+T_{2n}} T_{2n}y_{-1}x_{0}+\left( T_{2n-1}+T_{2n}\right) x_{0}+T_{2n+1}} \\ &=&\lim_{n\rightarrow \infty }\frac{T_{2n-1}\left( y_{-1}x_{0}+\left( \frac T_{2n+1}}{T_{2n-1}}-\frac{T_{2n}}{T_{2n-1}}\right) x_{0}+\frac{T_{2n}} T_{2n-1}}\right) }{T_{2n}\left( y_{-1}x_{0}+\left( \frac{T_{2n-1}}{T_{2n} +1\right) x_{0}+\frac{T_{2n+1}}{T_{2n}}\right) } \\ &=&\left( \frac{y_{-1}x_{0}+\left( \alpha ^{2}-\alpha \right) x_{0}+\alpha } y_{-1}x_{0}+\left( \frac{1}{\alpha }+1\right) x_{0}+\alpha }\right) \lim_{n\rightarrow \infty }\frac{T_{2n-1}}{T_{2n}} \\ &=&\lim_{n\rightarrow \infty }\frac{T_{2n-1}}{T_{2n}} \\ &=&\frac{1}{\alpha } \\ &=&a\text{.} \end{eqnarray* Then, we hav \begin{equation*} \lim_{n\rightarrow \infty }x_{n}=a\text{.} \end{equation* Similarly, we obtai \begin{equation*} \lim_{n\rightarrow \infty }y_{n}=a\text{.} \end{equation* Therefore, we ge \begin{equation*} \lim_{n\rightarrow \infty }\left( x_{n},y_{n}\right) =\left( a,a\right) \text{.} \end{equation* The proof is completed. \subsection{The System (\protect\ref{equ:waszxb})} In this subsection, we introduce our main results related to the system (\re {equ:waszxb}). Our aim is to investigate the general solution in explicit form of system (\ref{equ:waszxb}).and the asymptotic behavior of solutions of system (\ref{equ:waszxb}). \begin{theorem} \label{theorem:kmuyhn}Let $\left \{ x_{n},y_{n}\right \} _{n=-1}^{\infty }$ be a solution system (\ref{equ:waszxb}). Then, for $n=0,1,2,...$, the form of solutions $\left \{ x_{n},y_{n}\right \} _{n=-1}^{\infty }$ is given b \begin{eqnarray*} x_{2n-1} &=&\frac{-\left( T_{2n-2}x_{-1}y_{0}+\left( T_{2n-1}-T_{2n}\right) y_{0}+T_{2n-1}\right) }{T_{2n-1}x_{-1}y_{0}-\left( T_{2n-2}+T_{2n-1}\right) y_{0}+T_{2n}}\text{,} \\ x_{2n} &=&\frac{-\left( T_{2n-1}y_{-1}x_{0}+\left( T_{2n}-T_{2n+1}\right) x_{0}+T_{2n}\right) }{T_{2n}y_{-1}x_{0}-\left( T_{2n-1}+T_{2n}\right) x_{0}+T_{2n+1}}\text{,} \\ y_{2n-1} &=&\frac{-\left( T_{2n-2}y_{-1}x_{0}+\left( T_{2n-1}-T_{2n}\right) x_{0}+T_{2n-1}\right) }{T_{2n-1}y_{-1}x_{0}-\left( T_{2n-2}+T_{2n-1}\right) x_{0}+T_{2n}}\text{,} \\ y_{2n-1} &=&\frac{-\left( T_{2n-1}x_{-1}y_{0}+\left( T_{2n}-T_{2n+1}\right) y_{0}+T_{2n}\right) }{T_{2n}x_{-1}y_{0}-\left( T_{2n-1}+T_{2n}\right) y_{0}+T_{2n+1}} \end{eqnarray* where initial conditions $x_{-1}$, $y_{-1}$, $x_{0}$, $y_{0}\in \mathbb{R} -F$, with $F$ is the forbidden set of system (\ref{equ:waszxb}) given b \begin{equation*} F=\dbigcup \limits_{n=-1}^{\infty }\left \{ \left( x_{-1},y_{-1},x_{0},y_{0}\right) :A_{n}=0\text{, }B_{n}=0\text{, }C_{n}= \text{, }D_{n}=0\right \} \end{equation* wher \begin{eqnarray*} A_{n} &=&T_{2n-1}x_{-1}y_{0}-\left( T_{2n-2}+T_{2n-1}\right) y_{0}+T_{2n \text{,} \\ B_{n} &=&T_{2n}y_{-1}x_{0}-\left( T_{2n-1}+T_{2n}\right) x_{0}+T_{2n+1}\text ,} \\ C_{n} &=&T_{2n-1}y_{-1}x_{0}-\left( T_{2n-2}+T_{2n-1}\right) x_{0}+T_{2n \text{,} \\ D_{n} &=&T_{2n}x_{-1}y_{0}-\left( T_{2n-1}+T_{2n}\right) y_{0}+T_{2n+1}\text .} \end{eqnarray*} \end{theorem} \textbf{Proof.} Consider system (\ref{equ:waszxb}) by taking $n=0,1,2,...$ as follows \begin{equation*} \begin{array}{cccc} n=0 & \Rightarrow & x_{1}=\frac{-1}{x_{-1}y_{0}-y_{0}+1}\text{,} & y_{1} \frac{-1}{y_{-1}x_{0}-x_{0}+1}\text{,} \\ n=1 & \Rightarrow & x_{2}=\frac{-\left( y_{-1}x_{0}-x_{0}+1\right) } y_{-1}x_{0}-2x_{0}+2}\text{,} & y_{2}=\frac{-\left( x_{-1}y_{0}-y_{0}+1\right) }{x_{-1}y_{0}-2y_{0}+2}\text{,} \\ n=2 & \Rightarrow & x_{3}=\frac{-\left( x_{-1}y_{0}-2y_{0}+2\right) } 2x_{-1}y_{0}-3y_{0}+4}\text{,} & y_{3}=\frac{-\left( y_{-1}x_{0}-2x_{0}+2\right) }{2y_{-1}x_{0}-3x_{0}+4}\text{,} \\ n=3 & \Rightarrow & x_{4}=\frac{-\left( 2y_{-1}x_{0}-3x_{0}+4\right) } 4y_{-1}x_{0}-6x_{0}+7}\text{,} & y_{4}=\frac{-\left( 2x_{-1}y_{0}-3y_{0}+4\right) }{4x_{-1}y_{0}-6y_{0}+7}\text{,} \\ n=4 & \Rightarrow & x_{5}=\frac{-\left( 4x_{-1}y_{0}-y_{0}+7\right) } 7x_{-1}y_{0}-11y_{0}+13}\text{,} & y_{5}=\frac{-\left( 4y_{-1}x_{0}-6x_{0}+7\right) }{7y_{-1}x_{0}-11x_{0}+13}\text{,} \\ n=5 & \Rightarrow & x_{6}=\frac{-\left( 7y_{-1}x_{0}-11x_{0}+13\right) } 13y_{-1}x_{0}-20x_{0}+24}\text{,} & x_{6}=\frac{-\left( 7x_{-1}y_{0}-11y_{0}+13\right) }{13x_{-1}y_{0}-20y_{0}+24}\text{,} \\ & \vdots & & \end{array \end{equation* If we keep on this process and also regard (\ref{equ:opopopop}), then the result directly follows from a simple induction. \begin{theorem} \label{theorem:ewqdaxzvsftsd}The system (\ref{equ:waszxb}) has unique negative equilibrium point $\left( \overline{x},\overline{y}\right) =\left( d,d\right) $ and $\left( d,d\right) $ is locally asymptotically stable. \end{theorem} \textbf{Proof.} Clearly, equilibrium point of system (\ref{equ:waszxb}) is the real roots of the equation \begin{equation} \overline{x}=\frac{-1}{\overline{x}\left( \overline{y}-1\right) +1}\text{, \ }\overline{y}=\frac{-1}{\overline{y}\left( \overline{x}-1\right) +1}\text{.} \label{equ:pppppppppppppl} \end{equation In (\ref{equ:pppppppppppppl}), after some operations, we ge \begin{equation*} \overline{x}=\overline{y}\text{.} \end{equation* As a result, we obtain the following equatio \begin{equation} \overline{x}^{3}-\overline{x}^{2}+\overline{x}+1=0\text{.} \label{equ:ipolk} \end{equation Then, the roots of the cubic equation (\ref{equ:ipolk}) are given b \begin{eqnarray*} d &=&\frac{1+\sqrt[3]{3\sqrt{33}-17}-\sqrt[3]{3\sqrt{33}+17}}{3}\text{,} \\ e &=&\frac{1+\omega \sqrt[3]{3\sqrt{33}-17}-\omega ^{2}\sqrt[3]{3\sqrt{33}+1 }}{3}\text{,} \\ f &=&\frac{1+\omega ^{2}\sqrt[3]{3\sqrt{33}-17}-\omega \sqrt[3]{3\sqrt{33}+1 }}{3}\text{,} \end{eqnarray* wher \begin{equation*} \omega =\frac{-1+i\sqrt{3}}{2}=\exp \left( 2\pi i/3\right) \end{equation* is a primitive cube root of unity.\ So, the root $d$ is only real number. Therefore, the unique negative equilibrium point of system (\ref{equ:waszxb ) is $\left( \overline{x},\overline{y}\right) =\left( d,d\right) $. Now, we show that the unique negative equilibrium point of system (\re {equ:waszxb}) is locally asymptotically stable. Let $I$ and $J$ are some intervals of real numbers.and consider the functions \begin{equation*} f:I^{2}\times J^{2}\rightarrow I\text{ and }g:I^{2}\times J^{2}\rightarrow J \end{equation* defined b \begin{equation*} f\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) =\frac{-1}{y_{n}\left( x_{n-1}-1\right) +1},\ g\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) =\frac{-1} x_{n}\left( y_{n-1}-1\right) +1}\text{.} \end{equation* We consider the following transformation to build corresponding linearized form of system (\ref{equ:waszxb} \begin{equation*} \left( x_{n},x_{n-1},y_{n},y_{n-1}\right) \rightarrow \left( f,f_{1},g,g_{1}\right) \text{,} \end{equation* wher \begin{eqnarray*} f\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&\frac{-1}{y_{n}\left( x_{n-1}-1\right) +1}\text{,} \\ f_{1}\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&x_{n}\text{,} \\ g\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&\frac{-1}{x_{n}\left( y_{n-1}-1\right) +1}\text{,} \\ g_{1}\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) &=&y_{n}\text{.} \end{eqnarray*} The linearized system of system (\ref{equ:waszxb}) about the equilibrium point $\left( d,d\right) $ under the above transformation is given a \begin{equation*} X_{n+1}=BX_{n}\text{,} \end{equation* where $X_{n}=\left( x_{n},x_{n-1},y_{n},y_{n-1}\right) ^{T}$ and $B$ is a Jacobian matrix of system (\ref{equ:waszxb}) about the equilibrium point \left( d,d\right) $ and given b \begin{eqnarray*} B &=&\left( \begin{array}{cccc} 0 & \frac{d}{\left( d\left( d-1\right) +1\right) ^{2}} & \frac{d-1}{\left( d\left( d-1\right) +1\right) ^{2}} & 0 \\ 1 & 0 & 0 & 0 \\ \frac{d-1}{\left( d\left( d-1\right) +1\right) ^{2}} & 0 & 0 & \frac{d} \left( d\left( d-1\right) +1\right) ^{2}} \\ 0 & 0 & 1 & \end{array \right) \\ &=&\left( \begin{array}{cccc} 0 & d^{3} & -\left( 1+d\right) & 0 \\ 1 & 0 & 0 & 0 \\ -\left( 1+d\right) & 0 & 0 & d^{3} \\ 0 & 0 & 1 & \end{array \right) \text{.} \end{eqnarray* Thus, we obtain the characteristic equation of the Jacobian matrix $B$ a \begin{equation*} \left( d^{3}-\lambda ^{2}\right) ^{2}-\left( 1+d\right) ^{2}\lambda ^{2}= \text{,} \end{equation* o \begin{equation*} \left( \lambda ^{2}-\left( 1+d\right) \lambda -d^{3}\right) \left( \lambda ^{2}+\left( 1+d\right) \lambda -d^{3}\right) =0\text{.} \end{equation* Hence, it is clearly seen that numericall \begin{equation*} \left \vert \lambda _{1}\right \vert =\left \vert \lambda _{2}\right \vert =\left \vert \lambda _{3}\right \vert =\left \vert \lambda _{4}\right \vert =0.40089<1\text{.} \end{equation* Consequently, the equilibrium point $\left( d,d\right) $ is locally asymptotically stable. \begin{theorem} The equilibrium point of system (\ref{equ:waszxb}) is globally asymptotically stable. \end{theorem} \textbf{Proof.} Let $\left\{ x_{n},y_{n}\right\} _{n\geq -1}$ be a solution system (\ref{equ:waszxb}). By Theorem (\ref{theorem:ewqdaxzvsftsd}), we need only to prove that the equilibrium point $\left( d,d\right) $ is global attractor, that i \begin{equation*} \lim_{n\rightarrow \infty }\left( x_{n},y_{n}\right) =\left( d,d\right) \text{.} \end{equation* From Theorem (\ref{theorem:kmuyhn}), (\ref{equ:eeeeeeeeee}) and (\re {lim:wwswws}), it follows tha \begin{eqnarray*} \lim_{n\rightarrow \infty }x_{2n-1} &=&\lim_{n\rightarrow \infty }\frac -\left( T_{2n-2}x_{-1}y_{0}+\left( T_{2n-1}-T_{2n}\right) y_{0}+T_{2n-1}\right) }{T_{2n-1}x_{-1}y_{0}-\left( T_{2n-2}+T_{2n-1}\right) y_{0}+T_{2n}} \\ &=&\lim_{n\rightarrow \infty }\frac{-T_{2n-2}\left( x_{-1}y_{0}+\left( \frac T_{2n-1}}{T_{2n-2}}-\frac{T_{2n}}{T_{2n-2}}\right) y_{0}+\frac{T_{2n-1}} T_{2n-2}}\right) }{T_{2n-1}\left( x_{-1}y_{0}-\left( \frac{T_{2n-2}}{T_{2n-1 }+1\right) y_{0}+\frac{T_{2n}}{T_{2n-1}}\right) } \\ &=&\left( \frac{x_{-1}y_{0}+\left( \alpha -\alpha ^{2}\right) y_{0}+\alpha } x_{-1}y_{0}-\left( \frac{1}{\alpha }+1\right) y_{0}+\alpha }\right) \lim_{n\rightarrow \infty }\frac{-T_{2n-2}}{T_{2n-1}} \\ &=&\lim_{n\rightarrow \infty }\frac{-T_{2n-2}}{T_{2n-1}} \\ &=&-\frac{1}{\alpha } \\ &=&d, \end{eqnarray* an \begin{eqnarray*} \lim_{n\rightarrow \infty }x_{2n} &=&\lim_{n\rightarrow \infty }\frac -\left( T_{2n-1}y_{-1}x_{0}+\left( T_{2n}-T_{2n+1}\right) x_{0}+T_{2n}\right) }{T_{2n}y_{-1}x_{0}-\left( T_{2n-1}+T_{2n}\right) x_{0}+T_{2n+1}} \\ &=&\lim_{n\rightarrow \infty }\frac{-T_{2n-1}\left( y_{-1}x_{0}+\left( \frac T_{2n}}{T_{2n-1}}-\frac{T_{2n+1}}{T_{2n-1}}\right) x_{0}+\frac{T_{2n}} T_{2n-1}}\right) }{T_{2n}\left( y_{-1}x_{0}-\left( \frac{T_{2n-1}}{T_{2n} +1\right) x_{0}+\frac{T_{2n+1}}{T_{2n}}\right) } \\ &=&\left( \frac{y_{-1}x_{0}+\left( \alpha -\alpha ^{2}\right) x_{0}+\alpha } y_{-1}x_{0}-\left( \frac{1}{\alpha }+1\right) x_{0}+\alpha }\right) \lim_{n\rightarrow \infty }\frac{-T_{2n-1}}{T_{2n}} \\ &=&\lim_{n\rightarrow \infty }\frac{-T_{2n-1}}{T_{2n}} \\ &=&-\frac{1}{\alpha } \\ &=&d\text{.} \end{eqnarray* Then, we hav \begin{equation*} \lim_{n\rightarrow \infty }x_{n}=d\text{.} \end{equation* Similarly, we obtai \begin{equation*} \lim_{n\rightarrow \infty }y_{n}=d\text{.} \end{equation* Therefore, we ge \begin{equation*} \lim_{n\rightarrow \infty }\left( x_{n},y_{n}\right) =\left( d,d\right) \text{,} \end{equation* which completes the proof.
\section{Introduction} Young stellar objects (YSOs) flux variability is commonly detected in the optical and in the infrared. For the young stellar cluster NGC 2264 there are several observational studies that clearly show variability for a large fraction of the observed objects; in the optical with the CoRoT Space Telescope (Alencar et al. 2010, Cody et al. 2014, Stauffer et al. 2015,2016) and in the infrared with the Spitzer Space Telescope (Morales-Calder\'on et al. 2011,Cody et al. 2014, Stauffer et al. 2015,2016). Stauffer et al. (2016) focus on a sample of stellar stochastic lightcurves that can be explained with changes on $\dot{M}$ that leads to a variable dust heating of the material rotating around the object. Some of the objects show the IR and optical lightcurves resembling each other, suggesting that the physical mechanism responsible for their shape is the same. In NGC 2264, Alencar et al. (2010) use CoRoT lightcurves to search for a subsample with a periodic signal that can be explained with occultations by an inner warp as AA Tau (Bouvier et al. 1999). They conclude that at least $\sim 30$ to $40\%$ of YSOs with inner dusty disks present this kind of behavior. In the Orion Nebula Cluster, Morales-Calder\'on et al. (2011) present Spitzer lightcurves at $3.6$ and $4.5\mu$m of 41 objects that show flux drops with duration of one to a few days that can be interpreted with material crossing the line of sight. From this set, they extract one third with a detected periodic dip, pointing out that structures moving at a keplerian angular velocity are obvious features shaping the lightcurves. For this same region, Rice et al. (2015) confirm that 73 out of a sample of 1203 objects present AA Tau-type periodic lightcurves. Bouvier et al. (1999) suggest that such structures can be associated with the accretion of material along the stellar magnetic field lines, where the magnetic dipolar axis is inclined with respect to the disk rotational axis. The magneto-hydrodynamical (MHD) simulations of this system configuration by Romanova et al. (2013) show besides the magnetospheric streams an uniformly rotating bending wave located between the location of the streams and the outer vertical resonance. Both components can shadow the star when the system is seen at high inclination, thus becoming a physical mechanism to explain the lightcurves shape. Theoretical analysis of the MHD equations by Terquem $\&$ Papaloizou (2000)also arrives to the conclusion that a shadowing warp is formed. Inner disk structure can explain azimuthal surface brightness asymetry in the object TW Hya that moves at a constant angular velocity consistent with shadowing material rotating at a keplerian velocity associated to a radius around $1$AU (Debes et al. 2017). Also inhomogeneities very close to the star are responsible for the shape of the optical and IR lightcurves in the young low-mass star ISO-Oph-50 (Scholz et al. 2015). From the observations of the IC 348 cluster Flaherty et al. (2012) point out 3 low luminosity objects (LRLL 58,67,1679) with non-periodic lightcurves in the near-IR that can be interpreted with dust that moves along the stellar magnetic field lines. From this, we can conclude that the material distributed asymmetrically in the innermost region of the disk is relevant to explain the variability of the lightcurves either in the optical or in the IR, as can be seen from the aforementioned observational studies and on the theoretical works that sustain this information. In this work on the interpretation of the variability of the lightcurves we point out for each object the importance of the disk flux compared with the wall flux and the amplitude for the azimuthal contribution of the former. This allows to qualitatively characterize the innermost disk structure that we cannot resolve with current instrumentation. This characterization is important because there are many observed planets located very close to the star and their evolution towards this location strongly depends on the physical conditions of the disk inner part in the initial stage of the system life. McGinnis et al. (2015) studied the photometric variability of young stellar objects in the star forming region NGC 2264. They present CoRoT lightcurves for 33 objects showing AA Tau-type behavior: the optical lightcurve can be described with periodical stellar occultations due to an optically thick warp. From this set, McGinnis et al. (2015) present simultaneous observations of 29 stars in the optical and the infrared using the CoRoT and the Spitzer Space Telescope. A comparison between the lightcurves at both wavelength ranges show different behaviors. In this study, we will focus on the 4 objects that present AA Tau-like modulation in the IR and in the optical which closely follows each other, meaning that the mechanisms that are generating the variability in the optical and in the IR are related. The objects are: Mon-660, Mon-811, Mon-1140 and Mon-1308. The aim of this work is to consistently reproduce the observed amplitude of the CoRoT magnitude $\Delta [CoRoT]$, along with the observed amplitudes in the IR: $\Delta [3.6]$ and $\Delta [4.5]$. The material that it is occulting the star and which is responsible for the changes in $[CoRoT]$ is the one that is producing the excess in the IR range, thus responsible for changes at $[3.6]$ and $[4.5]$microns. A parametric study about the effect of a dust distribution around a star in optical and IR lightcurves was previously done by Kesseli et al. (2016). They used a Monte Carlo radiation transfer code described in Whitney et al. (2013) that includes heating by stellar radiation and by accretion. Besides the dust emission, Kesseli et al. include hotspots at different latitudes to produce different amounts of magnitude variability due to stellar rotation. Their models qualitatively reproduce the periodic dippers analysed in McGinnis et al. (2015) using a disk warp that changes in radius and in azimuthal angle (see Eq. 8 in Whitney et al. 2013) in a way similar to the 2D warp shape used in Bouvier et al. (1999) for the interpretation of the optical lightcurve of AA Tau. Our idea is to follow the same analysis but applied to specific objects. In Section~2 we present the description of the modeling, followed in Section~3 by the results of the lightcurves modeling for the set of 4 YSOs, Section~4 contains the discussion and finally Section~5 gives the conclusions. \section{Modeling} \label{Modeling} \subsection{Main aspects of the modeling} \label{Aspects} The disk surrounding the star has two main components: an optically thick vertical wall and an asymmetrical emitting structure beyond this location. These two components merge to form the warp (see Figure~1 for a sketch of the system). \begin{figure} \centering \includegraphics[width=\hsize]{sketch_system2.eps} \caption{Sketch of the system modeled. The inclined straight lines represent two lines of sight with the same inclination crossing different sections of the system. The left line contributes to emission of the wall and the right line contributes to emission of the disk. In this case, all the stellar surface is occulted. } \label{sketch} \end{figure} The optically thick vertical wall is located at the Keplerian radius, $R_{K}$, which is consistent with the observed period of the lightcurve. We assume that the main mechanism shaping the wall is magnetospheric accretion at the magnetospheric radius ($R_{mag}$) such that $R_{K}\sim R_{mag}$. Thus, it is reasonable to assume the presence of a wall, and, as a zero order approach, we consider a stationary disk configuration which it is perturbed to form the vertical wall. At the wall location, we expect a highly dynamical environment due to the MHD interaction between the disk and the stellar magnetosphere such that the stationary disk configuration is not reasonable. In the context of this work, this configuration is used to give characteristic values to the density and the vertical distribution of grain sizes. These values are required to get the wall temperature ($T_{wall}$) but it mainly depends on the distance to the star, thus, the values taken do not significantly change the modeled wall emission. In Figure~2 we present $T_{wall}$ in terms of height for the stellar objects Mon-660, Mon-811 and Mon-1308. We do not include the plot for Mon-1140 because this object has not a dusty wall (see Section~3.3 for details). We expect in reality that the material distribution in this region is much more complex than the toy model used here as it is shown in the analysis of the young low-mass star ISO-Oph-50, where the modeling by Scholz et al. (2015) requires inhomogeneties in the inner disk that can be the result of a turbulent environment. In any case, we also think that an optically thick structure is responsible for the main features of the lightcurves analyzed in this paper. \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{Twall_Mon.ps} \caption{The wall temperature ($T_{wall}$ in Kelvin) at the vertical wall as a function of height ($z$ in stellar radius) for Mon-660, Mon-811 and Mon-1308} \label{Twall-Mon} \end{figure} There is dust inside the magnetosphere when the sublimation radius $R_{sub}<R_{mag}$. Due to the stellar magnetic field lines, this dust is not located in a stationary disk, thus it is not easily characterized. In terms of the modeling, the emission coming from the material (gas plus dust) inside the magnetosphere and from the outer disk is set by the flux required to explain the observed IR flux and the amount of variability in the Spitzer lightcurves. Emission from gas inside the sublimation radius is suggested in the interferometric observations of Herbig Ae stars MWC 275 and AB Aur (Tannirkulam et al. 2008). In order to explain the observations, the flux should account for 40-60$\%$ of the total K-band emission. Akeson et al. (2005) found the same result for the T Tauri star RY Tau. However, McClure et al. (2013) conclude from the fitting of NIR emission of a sample of T Tauri stars that there is not evidence of emission from optically thick gas inside the sublimation radius. In order to confirm the existence or not of dust inside the magnetosphere we calculate $R_{sub}$ as in Nagel et al. (2013) assuming that the large grains are located in the disk midplane. In the boundary between the dusty and dust-free disk, there is a large opacity change such that it is formed an optically thick structure. The temperature of this structure ($T_{wall}$) is calculated starting from the stellar radius and increasing the value up to the radius where $T_{wall}=T_{sub}$. The radius where this condition is fulfilled is $R_{sub}$. $T_{wall}$ is calculated with the analytical expression given in Nagel et al. (2013). $T_{sub}$ is a function of gas density and it is taken for different grain species from Table 3 in Pollack et al. (1994). The gas density is taken assuming as typical the density of a stationary configuration for a settled disk. The density structure is taken using the codes in D'Alessio et al. (1998). The dust is distributed in the disk using two grain size distributions: one for large grains close to the midplane and another for small grains in the upper layers. The transition between these two distributions is modeled as in D'Alessio et al. (2006). As we fully explain in Section~2.3, the height of the vertical wall is fixed by estimating the amount of occultation required to explain the CoRoT lightcurves. Physically this is possible because the highly dynamical interaction in this region allows to move the large grains located in the midplane layer in the stable state (turning off the magnetic stellar field) towards larger heights. Also note that this is in accord with the interpretation of the observations of Mon-660 by Schneider et al. (2018), where in order to interpret some optical spectra, an optically thick wall is required that produces complete occultation of a fraction of the stellar surface $f_{C}$, an optically thin wall that extinct another fraction of this surface $f_{B}$ and finally an unocculted fraction $f_{A}$: $f_{A}+f_{B}+f_{C}=1$. Besides, Schneider et al.'s (2018) model also requires an increment on the abundance of dust grains in the optically thin layer that can be obtained with the dust that arrives due to the hydrodynamical perturbation. For Mon-660, Schneider et al. (2018) estimate the gas density in the extincted region, which is above the optically thick wall. They use an analysis of the Na and K optical doublets to derive an absorbing column density for these species, which corresponds to a hydrogen density equal to $2\times 10^{19}cm^{-2}$. The disk warp is located at $0.1$AU and they assume a radial thickness along the line of sight of the same magnitude, ending with a volumetric density $n_{H}\sim 10^{7}cm^{-3}$, in terms of mass, $\rho_{extinc}=1.67\times 10^{-17}gcm^{-3}$. This density is responsible to extinct the fraction $f_{B}$ of the stellar surface. If we run models using this value for the density in a layer above the optically thick wall then we conclude that the contribution to the IR flux can be neglected. Thus, we do not include this optically thin component in our modeling of the IR lightcurves. The grain size distribution ($n(a)$) is taken from citet{mathis} as typical for the ISM, which is extensively used in protoplanetary disks; $n(a)\sim a^{-3.5}$. The size range for the small grains located in the upper layers of the wall is: $a_{min}=0.005\mu$m and $a_{max}=0.25\mu$m. For the larger grains located close to the midplane, $a_{min}=0.005\mu$m and $a_{max}=1$mm. The dust mass fractions compared to the gaseous mass are $\zeta_{sil}=0.004$ and $\zeta_{grap}=0.0025$ for the silicate and the graphite components, respectively. The MHD simulations by Kulkarni \& Romanova (2013) show that the perturbation on the disk is not only located close to $R_{mag}$ but can move further out on the disk. The structure of this region is highly complex but for the sake of the simple modeling presented here, this outer zone contributes with an asymmetrical flux parameterized as in Section~2.2. The MHD simulations of a tilted stellar magnetic field interacting with a disk of Romanova et al. (2013) focus on the formation of waves in the disk. They conclude that a bending wave (out-of-plane modes) is formed between the corotational resonance (located at the corotational radius $R_{cr}$) and the outer vertical resonance located at $R_{ovr}=4^{1/3}R_{cr}$. In our case, $R_{cr}=R_{k}=R_{mag}$ such that the bending wave is the structure responsible for the emission of the outer component of the warp. We estimate its emission as the missing contribution required to explain the Spitzer lightcurves (see Section~2.2). This whole structure corotates with the magnetosphere such that it is relevant to explain the periodic lightcurves. \subsection{Emitted flux} \label{sec:flux} The flux observed is modeled using \begin{equation} F=F_{wall}+F_{disk}+f_{A}F_{\star}, \end{equation} where $F_{wall}$ is the flux coming from the wall, $F_{disk}$ is the flux coming from the region beyond the wall and $F_{\star}$ is the flux coming from the unocculted star. The emission from the optically thick wall comes from its atmosphere, and the radiation is extincted with the material between this location and the observer. Each layer of the atmosphere (located at an optical depth $\tau$) is emitting as a blackbody at a temperature given as in D'Alessio et al. (2005), \begin{equation} T_{wall}^{4}=\alpha {F_{0}\over 4\sigma}(C_{1}'+C_{2}'e^{-q\tau}+ C_{3}'e^{-\beta q\tau}), \end{equation} where $\alpha=1-w$, $w$ is the mean albedo to the stellar radiation, $\beta=(3\alpha)^{1/2}$, $F_{0}=L_{\star}/4\pi R_{wall}^2$ is the stellar flux that heats the wall at the radius $R_{wall}$, and $\sigma$ is the Steffan-Boltzmann constant. $C_{1}'$, $C_{2}'$,$C_{3}'$,$q$ and $w$ depend on the mean Planck opacities (absorption and scattering) one set of them calculated using the typical wavelength range of the stellar radiation and the other set calculated using the typical wavelength range of the disk radiation. The scattering of stellar radiation is assumed isotropic. Thus, the total wall flux at each frequency ($\nu$) is calculated as an integral over the solid angle $\Omega$ subtended by the wall and over the optical depth $\tau$, \begin{equation} F_{wall}=\int_{0}^{\tau_{wall}} \nu B_{\nu}(T_{wall})e^{-\tau}d\tau d\Omega. \end{equation} The emission comes from the wall atmosphere which is defined with the optical depth $\tau$, where $\tau=0$ in the surface of the wall and increases towards larger radius until $\tau=\tau_{wall}=1.5$. The emitted flux coming from the disk in the IR ($3.6$ or $4.5$) is parameterized as \begin{equation} F_{disk}=<F_{disk}>(1-\delta|cos(2\pi (\phi-\phi_{0})/2)|) \end{equation} which is consistent with the warp shape described in equation~6, where $\phi_{0}$ is the phase with the lowest flux contribution. Because the behavior at $3.6\mu$m and $4.5\mu$m is analogous, we focus on $4.5\mu$m when referring to IR emission, such that the aim is to explain the $4.5\mu$m Spitzer lightcurve. Physically, this corresponds to a structure that moves with the same periodicity of the wall. $\phi$ corresponds to the phase of the lightcurves, $\delta$ is a free parameter fitted to explain the amplitude of the observed $[4.5]$ ($\Delta[4.5]$) and $<F_{disk}>$ is the mean disk flux required to be consistent with the mean flux extracted from the IR lightcurves ($<F_{obs}>$), this value is fixed using the following equation \begin{equation} <F_{obs}>=<F_{disk}>+<F_{wall}> \label{eq:Fdisk} \end{equation} where $<F_{wall}>$ is the mean value of the IR emission coming from the wall. The $\delta$ value parametrizes the azimuthal variation of $F_{disk}$. We associate this variation to the hydrodynamical waves formed by the interaction between the stellar magnetic field and the disk. If $\delta$ increases then the effective area of the wave that it is facing the observer increases as does the flux emitted by the structure. \subsection{Warp geometry} \label{sec:warp} The optically thick part of the warp is required to block some of the stellar radiation. This structure is asymmetric with a height given by $h_{warp}$. The axisymmetric part of the structure consists of a wall with height $h_{min}$. The values for $h_{warp}$ are taken from the warp model of Bouvier et al. (1999) and used by Fonseca et al. (2014) for Mon-660, \begin{equation} h_{warp}=h_{warp,max}|cos({{\pi(\phi-\phi_{0})}\over {2\phi_{c}}})|+h_{min}, \,\,\,\,\,\,\,\,\,\,\,\,|\phi-\phi_{0}|<\phi_{c}, \label{eq:hwarp} \end{equation} \begin{equation} h_{warp}=h_{min}, \,\,\,\,\,\,\,\,\,\,\,\,|\phi-\phi_{0}|>\phi_{c}, \end{equation} where we include the axisymmetric section. We checked that the height $h_{min}$ is not eclipsing any section of the star in order to be consistent with the models in McGinnis et al. (2015). This height also satisfies $h_{min}/R\sim 0.1$ which is a typical value for thin protoplanetary disks. Note that $h_{warp,max}+h_{min}$ is the largest warp height in the models by McGinnis et al. (2015). When the maximum height of the warp, $h_{warp,max}+h_{min}$, is along the line of sight then the optical lightcurve reaches the largest magnitude (lowest flux). For a given inclination $i$, one can find the value for $h_{warp,max}$ which it is necessary to explain the observed ($\Delta [CoRoT]$). $h_{warp}$ is increased by 0.05 steps in order to find $h_{warp,max}$. For all the objects, the couples are given in the Appendix~A1. \subsection{Modeling ingredients} We use the flux calculated as described in Section~2.2 to estimate $[CoRoT]$ and $[4.5]$. We arbitrarily set the lowest magnitude as zero for both wavelengths. Thus, $\Delta [CoRoT]$ and $\Delta [4.5]$ are calculated with respect to this point. For each pair ($h_{warp,max}$,$i$), we have two remaining free parameters that can be varied in order to explain the magnitude variability in the IR, i.e. $\Delta [4.5]$. The parameter $\delta$ (see Section~2.2) is the one used to fit $\Delta [4.5]$. Note that a larger value of $\delta$ implies a larger value for $\Delta [4.5]$, thus, we increase(decrease) the value until the observed $\Delta [4.5]$ is reached. This process can be done for each object and for each pair ($h_{warp,max}$,$i$) to find a fit. In Section~3, we present the plot for the case $i=77^\circ$, and in Table~2 we show the value of $\delta$ obtained for each pair ($h_{warp,max}$,$i$). This table shows the degeneracy of the modeling and because the physical processes shaping the disk are not fully known, we cannot favor one solution over another. Our aim is to find the order of magnitude of $\delta$ such that we can conclude something about the degree of asymmetry of the inner disk. In order to break the degeneracy, detailed MHD simulations including radiative transfer should be done and compared with resolved observations of the inner part of the disk to extract a value for $\delta$. and relate it to the actual disk height. Note that observationally $i$ can be fixed such that the modeling can be restricted to such a case. The parameter $\phi_{c}$ determines the azimuthal range where $h_{warp}=h_{min}$, such that it is related to the shape of the CoRoT lightcurve. A range of $\phi_{c}$ are given by McGinnis et al. (2015) in the modeling of the lightcurves of the systems analyzed here. The value used here is within this range and fixed to the value $\phi_{c}=180$deg. A study changing this parameter is worth when the goal is to explain the details of the lightcurves. The pursuit of this requires a full understandings of all the physical processes involved based on a complete sample of hydrodynamical simulations that requires a gigantic amount of computational resources which is not what we are trying in this work. \section{Lightcurve modeling} \label{results} \subsection{Modeling of Mon-660} \label{Mon-660} This object was previously known as V354 Mon. Fonseca et al. (2014) interpreted its CoRoT lightcurve as due to occultations by an optically thick warp with a sinusoidal shape as the model Bouvier et al. (1999) used for the interpretation of the lightcurve of AA Tau. Observations in 2008 and 2011 are consistent with a stellar rotational period of $P_{rot}=5.25$days. The keplerian radius consistent with this period is $R_{k}=7.64R_{\star}$. Note that an explanation for the timescale of the variability requires that the material responsible for it should be located around this location. Remember that a bending wave located between $R_{k}=R_{cr}$ and $R_{ovr}$ moves with this periodicity, thus, it can be responsible for the stellar occultation and IR emission. The stellar parameters are given in Table~1. The minimum sublimation radius is $R_{sub,min}=7.70R_{\star}$ using $\dot{M}=3\times 10^{-9}M_{\odot}yr^{-1}$. This value corresponds to the mean of $log(\dot{M})$ taken from Venuti et al. (2014). Note that $R_{sub,min}$ is slighly larger than $R_{k}$, because of the uncertainties we assume that the dusty wall is located at $R_{k}$. As mentioned in Section~2.3, Table~A1 present the set of pairs ($i$,$h_{max}$) explaining the observed $\Delta [CoRoT]\sim 0.8$. The value of $\delta$ that allows to explain the observed $\Delta [4.5]\sim 0.3$mag (McGinnis et al. 2015) for each pair and the mean observed flux at $4.5\mu$m ($<F_{obs}>$) are given in Table~2. The observed values for $\Delta [4.5]$ and $\Delta [CoRoT]$ are the maxima. In figure~3 we present the modeled and observed lightcurves for $i=77^\circ$ with $H_{min}=0.7R_{\star}$. We calculate a mean of the lightcurves, adding all the photometric cycles, such that all the observed points are used. We give the standard deviation $\sigma$ as a measure of the dispersion of the data, which is simply an effect of the variability of the lightcurves with respect to the mean curve. As a reference for the maximum amplitude observed, we plot the $+1\sigma$ lightcurves and fit their amplitudes. The flux contributions from each component are presented in Figure~4. In the optical, the contribution from the wall and from the disk can be neglected, thus it is not showed. \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{LC_Mon660_i77.ps} \caption{Modeled optical and $4.5\mu$m lightcurves for Mon-660 at $i=77^{\circ}$. The modeled CoRoT lightcurve is represented by filled circles, and the modeled Spitzer photometric magnitudes at $4.5\mu$m is plotted as solid squares. For comparison the observed $+1\sigma$ CoRoT (points) and the $+1\sigma$ Spitzer $4.5\mu$m (asterixs) lightcurves are presented. We use all the cycles presented in McGinnis et al. (2015) to calculate the observed curves. At the upper left corner, we show the value for the mean standard deviation for the CoRoT and Spitzer data. } \label{lc-Mon660} \end{figure} \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{Fluxes_Mon660_i77.ps} \caption{Flux contributions in the optical and the IR for Mon-660 at $i=77^{\circ}$. The modeled CoRoT and $4.5\mu$m fluxes coming from the star are represented as filled squares and filled circles, respectively. The $4.5\mu$m fluxes coming from the wall and the disk are plotted with solid triangles and asterixs, respectively. The light asterixs represent the total modeled flux. } \label{Fluxes-Mon660} \end{figure} \begin{table} \caption{Stellar parameters} \label{table:parameters} \centering \begin{tabular}{c c c c} \hline\hline Object & $R_{\star}(R_{\odot})$ & $M_{\star}(M_{\odot})$ & $T_{\star}(K)$ \\ \hline Mon-660 & 1.86 & 1.4 & 4574 \\ Mon-811 & 1.97 & 0.91 & 4196 \\ Mon-1140 & 1.67 & 1.31 & 4578 \\ Mon-1308 & 1.59 & 0.63 & 3909 \\ \hline \end{tabular} \tablefoot{The first column shows the object name. The second column corresponds to the stellar radius. The third column is the stellar mass. The fourth column is the stellar effective temperature.} \end{table} \subsection{Modeling of Mon-811} \label{Mon-811} From observations in 2011, $P_{rot}=7.88$days. The keplerian radius consistent with this period is $R_{k}=8.19R_{\star}$. The stellar parameters are given in Table~1. The minimum sublimation radius is $R_{sub,min}=6.19R_{\star}$ using $\dot{M}=3\times 10^{-9}M_{\odot}yr^{-1}$. This value corresponds to the mean of $log(\dot{M})$ taken from Venuti et al. (2014). As mentioned in Section~2.3, Table~A1 present the set of pairs ($i$,$h_{max}$) explaining the observed $\Delta [CoRoT]=0.5$. The value of $\delta$ that allows to explain the observed $\Delta [4.5]\sim 0.2$mag (McGinnis et al. 2015) for each pair and $<F_{obs}>$ are given in Table~2. In figure~5 we present the modeled and observed lightcurves for $i=77^\circ$ with $H_{min}=0.8R_{\star}$. The flux contributions from each component are presented in Figure~6. \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{LC_Mon811_i77.ps} \caption{Modeled optical and IR lightcurves for Mon-811 at $i=77^{\circ}$. The symbols definitions are the same as in Figure~3.} \label{lc-Mon811} \end{figure} \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{Fluxes_Mon811_i77.ps} \caption{Flux contributions in the optical and the IR for Mon-811 at $i=77^{\circ}$. The symbols definitions are the same as in Figure~4.} \label{Fluxes-Mon811} \end{figure} \begin{table} \caption{Parameters in the models} \label{table:param-model} \centering \begin{tabular}{c c c c c c c} \hline\hline Object & $\dot{M}(M_{\odot}yr^{-1})$ & $R_{sub,min}(R_{\star})$ & $R_{k}(R_{\star})$ & $<F_{obs}>(erg\,cm^{-2}\,s^{-1})$ & $i(deg)$ & $\delta$ \\ \hline Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 71 & 0.15 \\ Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 72 & 0.15 \\ Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 73 & 0.17 \\ Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 74 & 0.15 \\ Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 75 & 0.14 \\ Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 76 & 0.15 \\ Mon-660 & $3\times 10^{-9}$ & $7.7$ & $7.64$ & $9.51\times 10^{-12}$ & 77 & 0.16 \\ \hline Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 67 & 0.03 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 68 & 0.02 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 69 & 0.0 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 70 & 0.0 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 71 & 0.02 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 72 & 0.03 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 73 & 0.03 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 74 & 0.03 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 75 & 0.01 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 76 & 0.02 \\ Mon-811 & $3\times 10^{-9}$ & $6.19$ & $8.19$ & $8.65\times 10^{-12}$ & 77 & 0.05 \\ \hline Mon-1140 & $7.76\times 10^{-9}$ & $7.93$ & $6.75$ & $3.76\times 10^{-12}$ & 73-77 & 0.01 \\ \hline Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 69 & 0.2 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 70 & 0.25 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 71 & 0.4 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 72 & 0.45 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 73 & 0.35 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 74 & 0.38 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 75 & 0.4 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 76 & 0.4 \\ Mon-1308 & $8.51\times 10^{-9}$ & $5.45$ & $7.81$ & $2.77\times 10^{-12}$ & 77 & 0.56 \\ \hline \end{tabular} \tablefoot{The first column shows the object name. The second column corresponds to the mass accretion rate. The third column is the minimum sublimation radius. The forth column is the keplerian radius. The fifth column is the observed flux at $4.5\mu$m. The sixth column corresponds to the inclination. The seventh column is the $\delta$ parameter (see text for details).} \end{table} \subsection{Modeling of Mon-1140} \label{Mon-1140} From observations in 2008 and 2011, $P_{rot}=3.87$ and $3.9$days, respectively. The keplerian radius consistent with the latter period is $R_{k}=6.75R_{\star}$. The stellar parameters are given in Table~1. The minimum sublimation radius is $R_{sub,min}=7.93R_{\star}$ using $\dot{M}=7.76\times 10^{-9}M_{\odot}yr^{-1}$. The value for $\dot{M}$ is taken from Venuti et al. (2014). They present two different estimates of $\dot{M}$ and we decided to take the value with the lowest $R_{sub,min}$. However, even in this case $R_{sub,min}> R_{k}$ and we can conclude that there is not dust at $R_{k}=R_{mag}$, such that there is not a wall formed by magnetospheric streams. For this object, the bending wave and/or material above it is responsible for the stellar occultation. Noteworthy, the value for $<F_{disk}>$ calculated using equation~4 is a few times smaller than required to explain the observed $\Delta [4.5]$. Thus, for this object the IR lightcurves are interpreted only using the emission coming from the disk, such that instead of equation~4, we use $<F_{obs}>=<F_{disk}>$. The value of $\delta$ that allows to explain the observed $\Delta [4.5]\sim 0.1$mag (McGinnis et al. 2015) and $<F_{obs}>$ are given in Table~2. In Figure~7 we present the modeled and observed $[4.5]$ lightcurves. For the modeling of this object, a change in $i$ means that the physical configuration required to get $F_{disk}$ changes. The analysis of this changing disk configuration is not pursued in this work. The optical lightcurves presented correspond to a vertical wall located at $R_{sub,min}$ with the height given by $h_{warp}R_{sub,min}/R_{k}$. The geometrical characterization of the bending wave is not the aim of this work. The flux contributions from each component are presented in Figure~8. \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{LC_Mon1140_i77.ps} \caption{Modeled optical and IR lightcurves for Mon-1140. The symbols definitions are the same as in Figure~3.} \label{lc-Mon1140} \end{figure} \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{Fluxes_Mon1140_i77.ps} \caption{Flux contributions in the optical and the IR for Mon-1140. The symbols definitions are the same as in Figure~4.} \label{Fluxes-Mon1140} \end{figure} \subsection{Modeling of Mon-1308} \label{Mon-1308} From observations in 2008 and 2011, $P_{rot}=6.45$ and $6.68$days. The keplerian radius consistent with this period is $R_{k}=7.81R_{\star}$. The stellar parameters are given in Table~1. The minimum sublimation radius is $R_{sub,min}=5.45R_{\star}$ using $\dot{M}=8.51\times 10^{-9}M_{\odot}yr^{-1}$. The value for $\dot{M}$ is taken from Venuti et al. (2014). As mentioned in Section~2.3, Table~A1 present the set of pairs ($i$,$h_{max}$) explaining the observed $\Delta [CoRoT]=0.4$. The value of $\delta$ that allows to explain the observed $\Delta [4.5]\sim 0.4$mag (McGinnis et al. 2015) for each pair and $<F_{obs}>$ are given in Table~2. In Figure~9 we present the modeled and observed lightcurves for $i=77^\circ$ with $H_{min}=0.8R_{\star}$. The flux contributions from each component are presented in Figure~10. \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{LC_Mon1308_i77.ps} \caption{Modeled optical and IR lightcurves for Mon-1308 at $i=77^{\circ}$. The symbols definitions are the same as in Figure~3.} \label{lc-Mon1308} \end{figure} \begin{figure} \centering \includegraphics[angle=-90,width=\hsize]{Fluxes_Mon1308_i77.ps} \caption{Flux contributions in the optical and the IR for Mon-1308 at $i=77^{\circ}$. The symbols definitions are the same as in Figure~4.} \label{Fluxes-Mon1308} \end{figure} \section{Discussion} \label{discussion} The Spitzer lightcurves for the objects Mon-660, Mon-811, and Mon-1308 can be explained using the emission coming from the star, the vertical wall and the asymmetrical emission associated to a disk behind the wall. The wall is located at the keplerian radius consistent with the period of the lightcurves. The asymmetry of this structure is the result of the interaction between a stellar magnetic field with a tilted dipolar axis and the disk. For Mon-1140, at the location of the wall, the stellar heating sublimates the dust such that the IR lightcurves are explained only with the stellar and the disk emission. The CoRoT lightcurves for Mon-660, Mon-811, and Mon-1308 are interpreted with occultation for a vertical wall, however, for Mon-1140 there is not a wall such that the occulting structure should lie in the asymmetrical disk. The MHD simulations in Romanova et al. (2013) suggest that vertical perturbations in the disk can be responsible for the stellar shadowing. The real fact is that dust should be moved upwards in order to periodically block a section of the stellar surface. Romanova et al. (2013) describe the resulting configuration for the interaction between the stellar magnetosphere and the disk as a bending wave that is located between the corotation radius ($R_{cr}$) and the location for the outer vertical resonance ($R_{ovr}=4^{1/3}R_{cr}$). Note that for rapidly rotating stars, $R_{cr}=R_{mag}$ is close to the rotational equilibrium state, which is a state commonly reached by accreting magnetized stars (Long et al. 2005). In our case, $R_{k}=R_{mag}$ such that $R_{k}=R_{cr}$. The wave located in this radial range moves at the stellar period such that any section of it can be responsible of the stellar occultations required to explain the CoRoT lightcurves. Because the emission of such structure is beyond the scope of this paper, we simply quantify its emission as the missing contribution required to explain the Spitzer lightcurves (see Section~2.2). The value for $\delta$ required to explain the Spitzer lightcurves is the largest for the systems with the largest $\Delta[4.5]$: $\Delta[4.5]=0.3$ for Mon-660 and $\Delta[4.5]=0.4$ for Mon-1308. This means that a larger asymmetry in the flux (and accordingly in the disk configuration) is required to interpret this kind of systems. For the systems with the lowest $\Delta[4.5]$ ($\Delta[4.5]=0.2$ for Mon-811 and $\Delta[4.5]=0.1$ for Mon-1140), the value for $\delta$ required is the lowest, with values down to $\delta=0.01$. For this case, the disk does not show a large asymmetry, in other words, the vertical size of the wave is not large. The vertical size of the actual structures in the disk, $h_{disk}$, is directly related to the emitting area so that a larger $h_{disk}$ corresponds to a larger observed flux. Radiative MHD simulations are required to connect $\delta$ with $h_{disk}$. However an estimate of this relation can be done assuming two facts: 1) ${\delta F_{disk}\over F_{wall}}$ is the emission associated to the structure above the disk in units of $F_{wall}$ and 2) the wall emission is proportional to $h_{warp,max}$ such that the disk emission is proportional to the disk surface height $h_{disk}$. Using these assumptions, $h_{disk}={\delta F_{disk}\over F_{wall}}\times h_{warp,max}$. This can be applied to the 3 systems with a dusty wall, resulting in $h_{disk}=(0.46,0.05,0.12)R_{\star}$ for Mon-660, 811 and 1308, respectively. These values can be compared to the model FW$\mu 1.5$ in Romanova et al. (2013), where the largest amplitude for the warp is $0.57R_{\star}$. For Mon-660, these values are comparable but for Mon-811 and Mon-1308, $h_{disk}$ is lower. This means that for the last two cases, the interaction of the dipolar stellar magnetic field with the disk is weaker. Radiative MHD simulations are required to test these estimates using more detailed physical input. For Mon-1140 it is satisfied $R_{sub,min}> R_{k}$, such that there is not dust at $R_{k}$. This means that all the lightcurves interpretation is based on the bending wave. A value of $\delta=0.01$ for this system means that $F_{disk}$ should change only $1\%$ in order to explain the flux variability. \section{Conclusions} \label{conclusions} Our main conclusion is that an optically thick wall at the keplerian radius associated to the periodicity of the observed lightcurve and an asymmetric disk are able to consistently explain the CoRoT and the Spitzer lightcurves of the NGC 2264 dippers Mon-660, Mon-811, Mon-1140 and Mon-1308. The stellar occultation by the wall or the asymmetrical structure in the disk is responsible for the modulation of the optical lightcurve and the emission from the partially occulted star, and the optically thick warp can explain the IR lightcurve. A more detailed analysis of the effects of the distribution of material in the warp on the modeling will require to run hydrodynamical simulations to get the distribution of gas and dust in the 3-D structure. However, the simple structure considered here is enough to justify the basic picture to explain the lightcurves. \begin{acknowledgements} E.N. appreciate the support from the Institut de Plan\'etologie et d'Astrophysique de Grenoble (Universit\'e Grenoble Alpes) during a sabbatical stay where most of the work has been done. This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 742095; {\it SPIDI}: Star-Planets-Inner Disk-Interactions) \end{acknowledgements}
\section{Introduction} Sensor measurements are often incomplete, noisy, and replete with outliers arising due to malfunctions or intermittent errors. Imputation of the missing entries and removal/segregation of the outliers is a critical first step that must be carried out prior to any data analytics. Examples of applications that benefit from such a pre-processing step include estimation/prediction of city-wide road traffic, regional air quality, electricity consumption in power distribution networks and foreground-background separation in videos. For most of these applications, the measurements can be arranged in form of a matrix, some of whose entries may be missing or contaminated with outliers. Pertinent approaches model the measurements as arising from a low-dimensional subspace whose recovery allows us to reject the noise and outliers, and impute the missing entries \cite{candes2009exact,balzano2010online,babacan-11,giampouras2017online,candes2011robust,ding2011bayesian}. \par Many real-world applications, including the aforementioned ones, involve time-varying data that arrives in a sequential manner and must be processed as such. As a result, the data matrices arising in such applications comprise of low-dimensional subspaces that evolve over time. While the classical matrix completion or robust principal component analysis (RPCA) approaches are still applicable to each snapshot of the data, the performance can generally be improved by exploiting the temporal correlations present in the measurements \cite{liu2013tensor,balzano2010online,electrictydata,grasta,roseta}. State-of-the-art approaches for processing time-varying subspaces can mostly be classified into approaches based on tensor completion \cite{liu2013tensor} and regularized matrix completion \cite{NIPS2016_6160}. A common feature of these techniques is their static perspective and the resulting focus on batch processing. In contrast however, the data streaming from the sensors may be inherently dynamic, arising from subspaces that evolve over time. Theoretical guarantees for the dynamic setting have been studied in \cite{XuDevenportNIPS}. Different from these approaches and closer to the classical time-series modeling, an online forecasting matrix completion approach was proposed in \cite{electrictydata} where the underlying subspace was assumed to follow a linear state-space model and must be learned in an online fashion. Approaches based on matrix completion often involve a number of tuning parameters that must be correctly set in order to avoid over-fitting. However determining these parameters via cross-validation is quite challenging with time-series data, especially in the online setting \cite{electrictydata}. Alternatively, probabilistic learning algorithms have been proposed for the static matrix completion, and are generally free of tuning parameters. Such approaches entail constructing generative models that are not only capable of modeling the data but are also simple enough to allow low-complexity updates. \par This work considers the first low-rank robust subspace filtering approach for online matrix imputation and prediction. Different from the existing matrix and tensor completion formulations, we consider low-rank matrices whose underlying subspace evolves according to a state-space model. As incomplete columns of the data matrix arrive sequentially over time, the low rank components as well as the state-space model are learned in an online fashion using the variational Bayes formalism. In particular, component distributions are chosen to allow automatic relevance determination (ARD) and unlike the matrix or tensor completion works, the algorithm parameters such as rank, noise powers, and state noise powers need not be specified or tuned. A low-complexity forward-backward algorithm is also proposed that allows the updates to be carried out efficiently. Enhancements to the proposed algorithm, capable of learning time-varying state-transition matrices, operating with a fixed lag, and robust to outliers, are also detailed. Our approach is general and we demonstrate its efficacy on various settings. In particular, we discuss the traffic estimation problem in detail and show that the variational Bayesian approach can be used to impute road traffic densities in an online fashion and from only a few observations. As the proposed models are generative, the resulting traffic density predictions can also be used to obtain accurate expected time-of-arrival (ETA) estimates. Additionally, the applicability of the proposed algorithm on the electricity load estimation and prediction problem is also shown. The superior performance of our algorithm vis-a-vis other state of the art subspace tracking and online matrix factorisation algorithms may be attributed to the proposed state space model as well as the flexibility in the data modeling provided by the variational Bayesian approach. In summary, the contributions of the present work are as follows: \begin{enumerate} \item We present the variational Bayesian subspace filtering (VBSF) algorithm and demonstrate its ability to perform data modeling, imputation and temporal prediction in an online setting wherein the key algorithmic parameters are automatically tuned. \item Robust version of the VBSF algorithm is also proposed for outlier removal and data cleansing. \item Finally, we report a comprehensive comparison of our algorithm with various relevant (offline) matrix completion as well as online subspace estimation and tracking techniques, e.g, GROUSE \cite{balzano2010online}, Low Rank Tensor Completion (LRTC) \cite{liu2013tensor}, GRASTA \cite{grasta}, ROSETA \cite{roseta}, OP-RPCA \cite{oprca} and Online Forecasting Matrix Factorisation (OFMF) \cite{paperarnew} over real-world traffic speed data as well as the electricity load data. \end{enumerate} \subsection {Related work} Variational Bayesian approaches for matrix completion and robust principal component analysis are well known \cite{babacan-11,Parker-14, Parker-14-2,Wipf-16,yang2018fast,asif2016matrix,luttinen2013fast,giampouras2017online,ma2015variational}. One of the first works considered the measured matrix to be expressible as a product of low-rank matrices, associated with appropriate ARD priors \cite{babacan-11} while faster algorithms for similar settings were proposed in \cite{Parker-14, Parker-14-2}. More recently, other approaches towards modeling the measured matrices have also been proposed \cite{Wipf-16}, \cite {yang2018fast}. Moreover, variational Bayesian approaches have also been applied to road traffic estimation; see e.g. \cite{asif2016matrix}. However, these approaches do not explicitly model the evolution of the underlying subspace. Likewise, none of the existing variational Bayesian approaches for low rank matrix completion model the evolution of the subspace \cite{babacan-11,ma2015variational,yang2018fast}. In contrast to these, the state-space modeling in our work is inspired from \cite{luttinen2013fast}, where the low-complexity updates were first proposed in the context of linear dynamical models. The VBSF algorithm in the current work extends and generalizes that in \cite{luttinen2013fast} to incorporate low-rank structure and outliers. On a related note, temporal evolution of the additive noise is modeled in \cite{giampouras2017online} using a forgetting factor. Different from \cite{giampouras2017online} however, we use a state-space model to capture the evolution of the underlying subspace. An online Bayesian matrix factorization model is also proposed in \cite{oprca} wherein the time-stamps are directly incorporated as features. In contrast, the present model is more specific and suited to a slowly time-varying system. \par Several non-Bayesian algorithms have been proposed to address the online subspace estimation problem from incomplete observations\cite{balzano2010online,grasta,oprca,roseta}. GROUSE \cite{balzano2010online} is one of the early approaches that uses an update on the Grassmannian manifold to estimate the subspace. The robust variant of GROUSE, namely GRASTA , handles outliers by by incorporating the $l_1$ norm cost function\cite{grasta}. OP-RPCA\cite{oprca} is a robust subspace estimation technique that uses alternating minimization to compute the outliers and the underlying subspace. A number of online subspace tracking algorithms, such as ROSETA \cite{roseta}, have since been proposed. The proposed approach is compared with some of these algorithms in Sec. \ref{results}. \subsection{Applications:} \subsubsection{Traffic Estimation and Prediction} Traffic estimation and prediction are the central components of any urban traffic congestion management system \cite{survey_paper}. With the advent of smartphones, public transportation services as well as private on-demand transportation companies are increasingly relying on the availability of real-time traffic maps for resource allocation and logistics \cite{res_allocation}. Such providers rely on probe vehicles --- GPS enabled and possibly crowd-sourced agents that upload speed measurements and corresponding location tags at sporadic times. Since traffic densities are inferred from speed measurements, they are often ridden with outliers, e.g., corresponding to random velocity changes unrelated to traffic. The traffic estimation problem entails estimating traffic densities at locations and times where no measurements are available. Finally, prediction of traffic in the near future is necessary to calculate ETA, fastest route, and other related quality of service metrics for road users. The future traffic prediction problem becomes particularly challenging in regions with diverse modes of transport, such as in India, where ETA calculations must account for the multimodal nature of traffic \cite{mohan2013moving,goel2016access}. For instance the ETA calculations for buses should not only use traffic data meant for cars.A class of pertinent approaches have sought to visualize the traffic data as an incomplete matrix or tensor, and exploited this correlation to fill-in the missing entries \cite{qu2009ppca,qu2008bpca,tan2016short,asif2016matrix}. Complementary to these approaches, time-series modeling focuses on learning the temporal dynamics of traffic and generate predictions in an online manner \cite{guo2014adaptive}. While recent variants have incorporated spatial correlations as well, these techniques are generally unable to handle missing data or outliers. Finally, \cite{paperarnew} presents the online forecasting matrix factorisation algorithm on the time series data that also handles the missing data scenario. \subsubsection{Electricity Load Estimation and Prediction} Similar to the traffic data, the electricity load data also exhibits the spatial and temporal structure that can be exploited to impute the missing data while simultaneously removing the noisy outliers. Due to the environmental disturbance, communication error or sensor fault, it is inevitable that load data may be lost during the collection process \cite{zhang2018short}. This paper is organized as follows. Sec. \ref{vbsf} presents the online variational Bayesian subspace filtering method for traffic estimation and prediction. Sec. III presents the online robust variational Bayesian subspace filtering method for traffic estimation and prediction in case of outliers. Results and findings for traffic prediction and electricity load prediction are discussed in Sec. \ref{results} followed by conclusion in Sec. \ref{conclusion}. \section{Results} \label{results} We now detail the simulation results that evaluate the performance of the proposed VBSF method on variety of datasets to solve the: \begin{enumerate} \item Traffic Estimation and Prediction Problem \item Electricity Load Estimation and Prediction Problem \end{enumerate} \subsection{Datasets} \begin{figure} \centering \includegraphics[width=0.7\linewidth]{map2.PNG} \caption{Region where traffic data is collected} \label{gmap} \end{figure} \begin{figure} \centering \includegraphics[width=0.7\linewidth]{map1.png} \caption{Map with red as missing and blue as known traffic entries} \label{gmap2} \end{figure} \begin{itemize} \item Traffic: for traffic estimation and prediction, we use the partial road network of the city of New Delhi with an area of 200 square kms consisting of $m=519$ edges (shown in Fig. \ref{gmap}). The road network can be modeled using a directed graph where each edge represents a road segment and nodes represent intersections. We collect the traffic data in the form of average speed of vehicles on a particular segment using the Google map APIs for nearly 3 months across 519 edges. Taking advantage of the slow varying nature of the speed in the network edges, we sample the traffic data at the rate of one sample every $t_s =15$ minutes. Note that our algorithm is agnostic of the sampling rate and would work for higher sampling rates as well. Unlike the complete data available from the API, real-world data may have missing entries. For instance, over the smaller area shown in Fig. \ref{gmap2}, speed measurements may be available on the blue edges but not on the red ones. Finally, we evaluate our algorithm for the twin tasks of real time traffic estimation as well as future traffic prediction. We further evaluate our algorithm for robust traffic estimation , i.e., when we the traffic data is corrupted by outliers. \item Electricity: similar to the traffic estimation and prediction task, we evaluate the VBSF algorithm on the electricity dataset \cite{electrictydata}, also used in \cite{paperarnew} to evaluate the online matrix factorisation method. The data contains the hourly power consumption of 370 consumers, sampled every 15 min. The data is recorded from Jan. 1, 2012 to Jan. 1, 2015. Finally, we compare the VBSF method with various methods including the ones proposed and compared in \cite{paperarnew}. \end{itemize} In order to evaluate the VBSF algorithm, an incomplete data set is created by randomly sampling a fraction $p$ of the measurements. In our evaluations we consider three different cases with 75\%, 50\%, and 25\% of missing data. We select previous $h$ = 30 time intervals for traffic and, the previous $h$ = 40 time intervals for electricity dataset. We compare our algorithm with other methods that potentially solve the current traffic estimation problem in the missing data scenario. The algorithms are \begin{itemize} \item Low rank tensor completion (LRTC) \cite{liu2013tensor}. \item Grassmannian Rank-One Update Subspace Estimation (GROUSE) \cite{balzano2010online}. \item Historic mean, which is simply the mean of edge speed values at a given time instance calculated using the historic data. \end{itemize} For the robust VBSF, we compare our algorithm with corresponding robust matrix completion frameworks. \begin{itemize} \item Robust PCA via Outlier Pursuit (OP-RPCA) \cite{oprca}. \item Robust Online Subspace Estimation and Tracking Algorithm (ROSETA) \cite{roseta}. \item Grassmannian Robust Adaptive Subspace Tracking Algorithm (GRASTA) \cite{grasta}. \end{itemize} Further, for the electricity load prediction problem, we compare our algorithm with the results of \cite{paperarnew} and the Collaborative Kalman Filter (CKF) \cite{paperarnew}. \subsection{Traffic Estimation and Prediction Problem} \subsubsection{Performance Index} To measure the effectiveness of our algorithm and for the comparison with other relevant algorithms, we use mean relative error (MRE) as the performance index for the traffic data. For any time instance $\tau$, the MRE denoted by $\text{MRE}_\tau$ is defined as: \begin{equation} \text{MRE}_\tau= \frac{1}{z}\sum_{k=1}^z \frac {\parallel \hat{\mathbf{y}}_{\tau,k}-\mathbf{y}_{\tau,k}\parallel_{2}}{\parallel \mathbf{y}_{\tau,k}\parallel_2}. \end{equation} where $\mathbf{y}_{\tau,k}$ and $\hat{\mathbf{y}}_{\tau,k}$ are the ground truth and estimated data for $k^{th}$ day and $\tau^{th}$ time instance. Since the value for the known data (sampled entries) may be modified post estimation, we compute the MRE over the whole column for a given time instance. For calculating the overall accuracy of prediction for a day, we calculate MRE averged over $z$ days. The value of $z$ is taken as 50 for weekdays and 10 for the weekends. \begin{figure*}[ht] \centering \includegraphics[width=1\linewidth]{figure2.pdf} \caption{Estimation of traffic data for different percentage of missing entries}{(a) Actual Traffic data , (b) Traffic data with 25\% entries, (c) Estimated Traffic with 25\% known data, (d) Residual error for estimation with 25\% data , (e) Traffic data with 50\% entries , (f) Estimated Traffic with 50\% known data, (g) Residual error for estimation with 50\% data, (h) Traffic data with 75\% entries , (i) Estimated Traffic with 75\% known data, \\(j) Residual error for estimation with 75\% data } \label{fig:fplot} \end{figure*} \subsubsection{Online Real Time Traffic Estimation} We now discuss simulation results for the current traffic estimation based on the current and past missing data using the VBSF algorithm. For a typical day, Fig. \ref{fig:fplot}a shows the heatmap of the actual traffic data. The $x$-axis of each heatmap represents time instances while the $y$-axis represents the edges. Each pixel of a heatmap indicates the speed, where higher speed is represented by a lighter colour. Figures \ref{fig:fplot}b, \ref{fig:fplot}e and \ref{fig:fplot}h are heatmaps with missing entries of varying degrees. The corresponding completed matrices using VBSF algorithm are shown in Figs. \ref{fig:fplot}c, \ref{fig:fplot}f, and \ref{fig:fplot}i. Since the proposed VBSF is an online method that completes one column at a time given the incomplete data from previous columns, the corresponding heatmaps are also generated in an online fashion. In other words, in spirit of the online methodology, window of $h+1$ incomplete columns are used to complete the last column followed by moving the window by one column. Finally, all the completed columns form a matrix represented in these heatmaps. Unsurprisingly, the heatmaps show that the performance of VBSF improves as the size of missing data decreases. \par The MRE values for real time traffic estimation using VBSF for weekends is shown in Fig. \ref{fig:fig4}a and for weekdays in Fig. \ref{fig:fig4}b. It is observed that the prediction error is higher during the peak traffic time (in the evening) vis-a-vis non-peak time intervals. This may be due to a greater variance in traffic during the peak time intervals. However, the difference between the MRE values for 50\% and 25\% missing data case is only about 0.15 in the worst case. Equivalently, the average error of estimation of speed is only around 2 km/hr during the peak-time when the average speed is 15 km/hr even with 75\% missing data. Similarly, for non-peak hours, even though the observed speed are higher (around 30-40 km/hr), the MRE values for $p=50\%$ and $p=25\%$ is around 0.1, which in other words indicate an average error of 3-4 km/hr in the estimation of speed. \par The performance of the proposed VBSF algorithm is compared with that of (LRTC) \cite{liu2013tensor}, (GROUSE) \cite{balzano2010online}, and the historic mean. We used a grid search based approach for rank initialization in GROUSE and choose the rank that gives the least error. Table \ref{tab1:table1} presents the overall results. Further, Figs. \ref{fig:fig5}a and \ref{fig:fig5}b show the comparison of our algorithm for different percentage of missing traffic data. It is observed that for low missing rate of traffic data (25\%), the LRTC (low rank tensor completion) \cite{liu2013tensor} and VBSF obtain similar performance. But as the missing data increases, VBSF outperforms the LRTC method. Also, for all the cases, VBSF performs better than GROUSE. This difference in performance can be attributed to the fact that the VBSF framework captures the temporal dependencies as well as the latent factors in the traffic matrix better than other methods. In terms of running time, VBSF is faster than LRTC and is comparable to GROUSE as shown in Table \ref{tab1:table12}. \begin{table}[ht!] \begin{center} \begin{tabular}{llll} \hline &$p=0.25$ & $p=0.50$ &$p=0.75$\\ &MRE&MRE&MRE\\ \hline VBSF & 0.1439 &0.11277 &0.09336\\ GROUSE & 0.372 & 0.3446& 0.3085\\ LRTC & 0.1921 & 0.1418&0.09578\\ Mean &0.2083&0.2083&0.2083\\ \end{tabular} \end{center} \caption{Performance comparison for real time traffic estimation} \label{tab1:table1} \end{table} \begin{table}[ht!] \begin{center} \begin{tabular}{llll} \hline &$p=0.25$ &$p=0.50$ &$p=0.75$\\ &time($sec$)&time($sec$)&time($sec$)\\ \hline VBSF & 0.7001&0.8685&0.9675\\ GROUSE &0.7935&0.85324&0.923960\\ LRTC &2.92&4.32&6.23\\ \end{tabular} \end{center} \caption{Comparison of running time for different algorithms$^1$} \label{tab1:table12} \end{table} \footnotetext[1]{Experiments are conducted to evaluate average running time per column on Matlab using PC: Intel i5-6200U CPU 2.4 GHz. } \begin{figure*} \centering \begin{subfigure}[b]{1\textwidth} \includegraphics[width=1\linewidth]{figure5.pdf} \end{subfigure}% \begin{subfigure}[b]{1\textwidth} \includegraphics[width=1\linewidth]{figure62.png} \end{subfigure}% \caption{Real time Traffic Estimation and Prediction for different missing entries}{(a) Real time traffic estimation for different missing entries (Weekend), (b) Weekday Prediction 50\% missing entries (Weekday), (c) Weekday Prediction 50\% missing entries, (d) Weekend Prediction 50\% missing entries, (e) Weekday Prediction 75\% missing entries, (f) Overall Prediction} \label{fig:fig4} \end{figure*} \subsubsection{Future Traffic Prediction Problem} We also test the VBSF algorithm for speed prediction during the future time intervals assuming randomly sampled data from the current and previous time intervals. We predict traffic data up to 5 sampling intervals, that is, 15 to 75 minutes in future. We test our algorithm for 50\% and 75\% of the missing entries in the traffic data. The MRE plots for traffic prediction are shown in Figs. \ref{fig:fig4}c, \ref{fig:fig4}d, and \ref{fig:fig4}e. The MRE error difference for 50\% and 75\% missing data is not significant. Similar to observations from the current traffic estimation simulations, it is seen that the error increases from 5:30 to 8:00 pm. As one would expect, the prediction accuracy decreases as we predict further in future. Interestingly, it is observed that the MRE for real-time traffic estimation with 75\% missing entries case and for future prediction with 50\% missing entries are comparable as can be seen in Fig. \ref{fig:fig4}f. \par The performance of the proposed VBSF algorithm is compared with that of LRTC in Table \ref{tab:table2}. The VBSF performs better than the LRTC as shown in Fig. \ref{fig:fig5}c. While predicting the speed for outlier edges (the edges which significantly deviate from their usual speed) VBSF performs better than LRTC as seen in Fig. \ref{fig:fig5}d. \begin{table}[ht!] \begin{center} \begin{tabular}{lll} \hline &$p=0.50$ & $p=0.50$ \\ &$15\, mins $&$30\,mins$\\ \hline VBSF & 0.15362 &0.17434 \\ LRTC & 0.15843 & 0.1812\\ Mean & 0.2082 & 0.2073\\ \end{tabular} \end{center} \caption{Performance comparison for traffic prediction } \label{tab:table2} \end{table} \begin{figure*} \centering \includegraphics[width=1\linewidth]{compare.pdf} \caption{Comparison between VBSF and Low rank Tensor Completion (LRTC) and Matrix Completion Algorithm (GROUSE)}{(a) Real Time Traffic Estimation for 25\% percentage of Missing Data, (b) Real time traffic estimation for 75\% percentage of missing data, (c) Traffic prediction for 50\% of missing data, (d) Traffic prediction for outliers} \label{fig:fig5} \end{figure*} \subsubsection{Robust Traffic Estimation} The GPS data that is collected using probe vehicles may be corrupted by noise and may often contain outliers which need to be removed before further processing is performed. To mitigate the performance degradation due to outliers, we employ the robust variational Bayesian subspace filtering (RVBSF) that models the presence of outliers in the data in the sparse outlier matrix ${\bf E}$ . To test the RVBSF algorithm, on a given day, we randomly sample a certain $p_o$ percentage of the already sampled traffic data $\mathbf{y}_{i,\tau}$ and replace these values with $o_{i,\tau}$ as follows: \begin{equation} \label{outlier} {\bf o}_{i,\tau} = \max \left( {\mathbf{y}}_{i,\tau-1},{\mathbf{y}}_{i,\tau+1} \right) + c \, \mu_t. \end{equation} In other words, the outlier is created by adding a large value $c\,\mu_t$ to the maximum of $\mathbf{y}_{i,\tau-1}$ and $\mathbf{y}_{i,\tau+1}$. Here, $\mu_t$ is the mean of observed entries at time $t$ and c is a scaling parameter. The RVBSF algorithm is then applied to solve the real time traffic estimation problem. The detected artificial outliers are those points residing in the matrix ${\bf E}$. \par \begin{figure*} \centering \includegraphics[width=1\linewidth]{outlier.pdf} \caption{Robust Bayesian subspace filtering for traffic data }{}{(a) Comparison for VBSF and RVBSF with 5\% outliers and $c$ = 0.75, (b) Comparison for VBSF and RVBSF with 2\% outliers and $c$ = 0.75 (c) Comparison of VBSF and RVBSF for $c$ = 1.25, (d) Number of outliers detected for different outlier values} \label{fig:fig6} \end{figure*} The accuracy of outlier detection depends on the outlier value as shown in Fig. \ref{fig:fig6}d. The value of $c$ for simulations is chosen from the set $ [0.75, 1, 1.25, 1.5, 1.75]$. We compare the robust VBSF (termed as RVBSF) with VBSF for two scenarios. First, when no outliers are added (VBSF), second, when outliers are present in the data but only VBSF was used (VBSF\_with\_outliers). Table \ref{tab:table3} summarises the overall performance of the RVBSF algorithm. Understandably, RVBSF improves over VBSF when outliers are present, but is still worse than the MRE of VBSF for the case when no outliers were present. For 25\% missing entries, $p_o=5\%$ and $c=0.75$, the plots in Fig. \ref{fig:fig6}a illustrate the performance of the RVBSF algorithm. Similarly for 75\% of missing entries, $p_o=2\%$ the results are shown in Fig. \ref{fig:fig6}b. When $p_o = 5\%$ and $c= 0.75$, we observe that RVBSF detects outliers reasonably well vis-a-vis VBSF\_with\_outliers. Similar observation holds when outlier values increase as shown in Fig. \ref{fig:fig6}c and Fig. \ref{fig:fig6}d. \par \begin{table}[ht!] \begin{center} \begin{tabular}{llll} \hline &$c=0.75$ & $c=0.75$ & $c=1.5$\\ &$p_o=5$\%& $p_o=2$\% & $p_o=2$\% \\ \hline VBSF & 0.09462 &0.09457 &0.09434\\ VBSF\_outlier & 0.13406 & 0.11643& 0.15318\\ RVBSF & 0.11741 & 0.1127&0.10912\\ \end{tabular} \end{center} \caption{RVBSF: overall performance } \label{tab:table3} \end{table} The performance of the proposed RVBSF algorithm is compared with that of OP-RPCA\cite{oprca} GRASTA\cite{grasta} and ROSETA\cite{roseta} in Table \ref{tab:table4}. The RVBSF algorithm performs better than the subspace estimation and tracking algorithms. The difference in performance may be due to a better modeling of the temporal structure available in the data. \begin{table}[ht!] \begin{center} \begin{tabular}{c c c c} \hline &$c=0.75$ & $c=0.75$ & $c=1.5$\\ &$p_o=5$\%& $p_o=2$\% & $p_o=2$\% \\ \hline OP-RPCA& 0.2594 & 0.2298 & 0.2165 \\ \hline ROSETA& 0.1859 & 0.1819 & 0.1723 \\ \hline GRASTA& 0.1493 & 0.1507 & 0.1492 \\ \hline RVBSF & 0.11741& 0.1127& 0.10912\\ \hline \end{tabular} \end{center} \caption{Performance Comparison for Robust Traffic Estimation } \label{tab:table4} \end{table} A possible limitation of the suggested robust traffic estimation framework is following. While there may be outliers present due to an erroneous speed estimation, there might be cases when the so called outlier value may actually be a real value. The current method may not be able to distinguish between such cases. Hence, a sudden drop in speed along an edge may be treated as an outlier and its possible impact on the traffic of nearby edges be be ignored by the model. \subsection{Electricity Load Prediction} We now discuss the performance of the VBSF algorithm on the electricity load data set \cite{electrictydata}. Note that the electricity load data is also a time series data with the possibility of missing entries as well as temporal correlation between successive columns. \subsubsection{Performance Index} The performance of the VBSF method is compared with that of \cite{paperarnew} using the metrics mean absolute error (MAE) and MRE, defined as: \begin{equation} \text{MAE}= \frac{1}{z}\sum_{k=1}^z \frac {\parallel \hat{\mathbf{y}}_{k}-\mathbf{y}_{k}\parallel_{1}}{l(\mathbf{y}_{k})} \end{equation} \begin{equation} \text{MRE}= \frac{1}{z}\sum_{k=1}^z \frac {\parallel \hat{\mathbf{y}}_{k}-\mathbf{y}_{k}\parallel_{2}}{\parallel \mathbf{y}_{k}\parallel_{2}} \end{equation} where $\mathbf{y}_{k}$ and $\hat{\mathbf{y}}_{k}$ are the ground truth and estimated data for $k^{th}$ column. We run the algorithm online on dates Jan. 1, 2012 to Jan. 1, 2015 resulting into 26,304 columns. In other words, the value of $z$ is 26,304 for our simulations. \subsubsection{Online Electricity Load Estimation and Prediction} We run our algorithm for electricity data estimation and prediction. The results for real-time prediction are noted in table \ref{tab:ele1}. It is noted as the percentage of observed data $p$ increases, the real-time prediction accuracy improves. \begin{table}[ht!] \begin{center} \begin{tabular}{llll} \hline &$p=0.25$\%& $p=0.5$\% & $p=0.75$\% \\ \hline MRE & 0.1789 &0.101 &0.0987\\ MAE(kW) & 96.95 & 66.67& 53.95\\ \end{tabular} \end{center} \caption{Electricity real time load prediction} \label{tab:ele1} \end{table} Further, we predict the one-step ahead electricity load in Fig. \ref{fig:elec}. To analyze the performance of our algorithm we compare our results with OFMF and CKF \cite{paperarnew}. The one-step ahead prediction performance of OFMF and CKF are provided in \cite{paperarnew}. OFMF proposes a autoregressive model based optimization to predict the one-step ahead electricity load. We compare our three cases of $p$ with the results shown in OFMF. It can be seen that our algorithm performs better than the OFMF for electricity load dataset. \begin{figure} \centering \includegraphics[width=0.9\linewidth]{elec_res2.pdf} \caption{One-step ahead electricity prediction} \label{fig:elec} \end{figure} \section{Conclusion} \label{conclusion} This paper considers sequentially arriving multivariate data that resides in a time-varying low-dimensional subspace. The temporal evolution of the underlying low-rank subspace is characterized via a state-space model and low-complexity variational Bayesian subspace filtering algorithms are proposed for matrix completion and outlier removal tasks. Simulation experiments quantify that the suggested model can be deployed to estimate the missing traffic data with a reasonable accuracy even with a fraction of random traffic measurements in the network. A similar result is observed on applying the VBSF algorithm on the twin tasks of imputation and prediction on the electricity data-set. Extensive simulations on both the data sets demonstrate that the suggested model and the accompanying algorithms seem to capture the temporal evolution of the data well as compared to the current state-of-the-art matrix completion and the online subspace estimation algorithms. \section{Variational Bayesian Subspace Filtering} \label{vbsf} We consider a scenario where the data with the missing entries is arriving in a sequential manner. The data can be considered in the form of the matrix $\mathbf{Y} \in \mathbb{R}^{m \times t}$, where $t$ denotes the number of time instances over which measurements are made and $m$ denotes the number of rows of the matrix $\mathbf{Y}$. More generally, $\mathbf{Y}$ is an incomplete and growing matrix whose columns arrive sequentially over time. Specifically, for each column $\mathbf{y}_\tau$ with $1\leq \tau \leq t$, only entries from the index set $\Omega_\tau\subset \{1, \ldots, m\}$ are observed. The algorithms developed here will seek to achieve the following two goals: \begin{itemize} \item \emph{imputation} which yields $\{\hat{y}_{i\tau}\}_{i\notin\Omega_\tau}$ for $1\leq \tau \leq t$, and \item \emph{prediction} which yields $\{\hat{\mathbf{y}}_{t+\tau}\}_{\tau = 1}^{T_p}$ where $T_p$ is the prediction horizon. \end{itemize} The next subsection develops a variational Bayesian algorithm for achieving the aforementioned goals. \begin{figure}[ht!] \centering \includegraphics[width=0.9\linewidth]{YAB.jpg} \caption{Online Variational Bayesian Filtering} \label{fig:matfac} \end{figure} \subsection{Hierarchical Bayesian Model} We begin with detailing a generative model for the matrix $\mathbf{Y}$. The proposed model will not only capture the rank deficient nature of $\mathbf{Y}$ \cite{babacan2012sparse} but also the temporal correlation between successive columns of $\mathbf{Y}$ \cite{asif2013low}. Recall that the standard low-rank parametrization of the full matrix $\mathbf{Y}$ takes the form $\mathbf{Y} = \mathbf{A}\mathbf{B}$ where $\mathbf{A} \in \mathbb{R}^{m \times r}$ and $\mathbf{B} \in \mathbb{R}^{r \times t}$. Classical non-negative matrix completion approaches seek to obtain such a factorization. In such algorithms, the choice of $r$ is critical to avoiding underfitting or overfitting. \par Within the Bayesian setting however, the measurements are modeled as arising from a distribution with unknown hyper-parameters, while various components or parameters are assigned different prior distributions. The Bayesian framework allows the use of ARD, wherein associating appropriate priors to the model parameters leads to pruning of the redundant features \cite{babacan2012sparse}. This work uses pdfs from the exponential family that allow for tractable forms of the posterior pdf but are also flexible enough to adequately model the data. \par Specifically, the entries of $\mathbf{Y}$ are generated as \begin{align} p(y_{i\tau} \mid \mathbf{a}_{i\boldsymbol{\cdot}}, \mathbf{b}_\tau, \beta) &= \mathcal{N}(y_{i\tau} \mid \mathbf{b}_\tau^T\mathbf{a}_{i\boldsymbol{\cdot}}, \beta^{-1}) & i \in \Omega_{\tau} \end{align} for all $\tau \geq 1$, where $\mathbf{A} \in \mathbb{R}^{m \times r}$, $\mathbf{B} \in \mathbb{R}^{r \times t}$, and $\beta \in \mathbb{R}_{++}$ are the (hidden) problem parameters. Unlike the deterministic setting however, the rank hyper-parameter $r$ is not critical to the imputation or prediction accuracy, but is only required to chosen according to computational considerations. The temporal evolution of the entries of $\mathbf{Y}$ is modeled by making the columns of $\mathbf{B}$ adhere to the following first order autoregressive model: \begin{align}\label{ss} p(\mathbf{b}_\tau \mid \mathbf{J}, \mathbf{b}_{\tau-1}) &= \mathcal{N}(\mathbf{b}_{\tau} \mid \mathbf{J}\mathbf{b}_{\tau-1}, \mathbf{I}_r) & 2\leq \tau\leq t \end{align} for $\tau \geq 2$, where $\mathbf{J} \in \mathbb{R}^{r \times r}$ is again a problem parameter. Here, $\mathbf{J}$ captures the temporal structure of the underlying subspace, and is learned from the data itself. The scaling ambiguity present in matrix factorization allows the transition matrix $\mathbf{J}$ to capture both slow and fast variations in $\mathbf{b}_\tau$ without the need to explicitly model the state noise variance. It follows from \eqref{ss} that the conditional pdf of $\mathbf{b}_\tau$ given $\mathbf{J}$ is given by \begin{align} p(\mathbf{B} \mid \mathbf{J}) = \mathcal{N}(\mathbf{b}_1; \boldsymbol{\mu}_1, \boldsymbol{\Lambda}_1 ) \prod_{\tau = 2}^t \mathcal{N}(\mathbf{b}_\tau \mid \mathbf{J}\mathbf{b}_{\tau-1}, \mathbf{I}_r). \end{align} Observe that the model complexity depends on the rank $r$, which is also the number of columns in $\mathbf{A}$ and $\mathbf{J}$. In order to ensure the value of $r$ is learned in a data-driven fashion, the columns of $\mathbf{A}$ and $\mathbf{J}$ are assigned multivariate Gaussian priors with column-specific precisions, i.e., \begin{align} p(\mathbf{A} \mid \boldsymbol{\gamma}) &= \prod_{i=1}^r \mathcal{N}(\mathbf{a}_i \mid 0, \gamma_i^{-1}\mathbf{I}_m) \label{paa}\\ p(\mathbf{J} \mid \boldsymbol{\upsilon}) &= \prod_{i=1}^r \mathcal{N}(\mathbf{j}_i \mid 0, \upsilon_i^{-1}\mathbf{I}_r) \label{pja} \end{align} where the precisions $\boldsymbol{\gamma}$ and $\boldsymbol{\upsilon}$ are problem parameters. It can be seen that if any of $\gamma_i$ or $\upsilon_i$ are large, the corresponding columns will be close to zero and consequently irrelevant. Indeed, the priors in \eqref{paa}-\eqref{pja} aid in automatic relevance determination since the subsequent optimization process may drive some of the precisions to infinity, yielding a low-rank factorization. Finally, the three precision variables are selected to have have non-informative Jeffrey's priors \begin{align} p(\beta) &= \frac{1}{\beta}, & p(\gamma_i) &= \frac{1}{\gamma_i}, & p(\upsilon_i) &= \frac{1}{\upsilon_i} \end{align} for $1\leq i \leq r$. Let $\mathbf{y}_{\Omega}$ denote the collection of measurements $\{y_{i\tau}\}_{i\in\Omega_\tau, \tau = 1}^t$. Collecting the hidden variables into $\mathcal{H} := \{\mathbf{A}, \mathbf{B}, \mathbf{J}, \beta, \boldsymbol{\gamma}, \boldsymbol{\upsilon}\}$, the joint distribution of $\{\mathbf{y}_\Omega, \mathcal{H}\}$ can be written as \begin{align} p(\mathbf{y}_\Omega,\mathcal{H}) &= p(\mathbf{y}_\Omega | \mathbf{A}, \mathbf{B}, \beta)p(\mathbf{A} | \boldsymbol{\gamma})p(\mathbf{B} | \mathbf{J}) p(\mathbf{J} | \boldsymbol{\upsilon})p(\beta)p(\boldsymbol{\upsilon})p(\boldsymbol{\gamma}) \nonumber \\ &=\prod_{\tau=1}^t\prod_{i\in\Omega_\tau} \mathcal{N}(y_{i\tau} \mid \mathbf{b}_\tau^T\mathbf{a}_{i\boldsymbol{\cdot}}, \beta^{-1}) \nonumber\\ &\times \prod_{i=1}^r \left[\mathcal{N}(\mathbf{a}_i \mid 0,\gamma_i^{-1}\mathbf{I}_m) \mathcal{N}(\mathbf{j}_i \mid 0, \upsilon_i^{-1}\mathbf{I}_r)\right] \nonumber \\ &\hspace{-1cm}\times\mathcal{N}(\mathbf{b}_1; \boldsymbol{\mu}_1, \boldsymbol{\Lambda}_1 ) \prod_{\tau = 2}^t \mathcal{N}(\mathbf{b}_\tau \mid \mathbf{J}\mathbf{b}_{\tau-1}, \mathbf{I}_r) \frac{1}{\beta}\prod_{i=1}^r \frac{1}{\gamma_i\upsilon_i} \end{align} The full hierarchical Bayesian model adopted here is summarized in Fig. \ref{fig:mc_algo}(a). \begin{figure}[ht!] \centering \includegraphics[width=0.9\linewidth]{block.pdf} \caption{(a) Hierarchical Bayesian Model for Matrix Completion (b) Robust Hierarchical Bayesian Model for Matrix Completion } \label{fig:mc_algo} \end{figure} \subsection{Variational Bayesian Inference} Having specified the generative model for the data, the goal is to determine the posterior distribution $p(\mathcal{H}|\mathbf{y}_\Omega)$, which would yield the corresponding point estimates and can be used for imputation and prediction tasks. However, exact full Bayesian inference is well-known to be intractable. Instead, we utilize the mean-field approximation, wherein the posterior distribution factorizes as: \begin{align}\label{mf} p(\mathcal{H} \mid \mathbf{y}_\Omega) \approx q(\mathcal{H}) = q_{\mathbf{A}}(\mathbf{A})q_{\mathbf{B}}(\mathbf{B})q_{\mathbf{J}}(\mathbf{J})q_{\boldsymbol{\upsilon}}(\boldsymbol{\upsilon})q_{\beta}(\boldsymbol{\beta})q_{\boldsymbol{\gamma}}(\boldsymbol{\gamma}). \end{align} In other words, the posterior is now restricted to a family of distributions that adhere to \eqref{mf}. The factors $q_\mathbf{A}$, $q_\mathbf{B}$, $q_\mathbf{J}$, $q_\upsilon$, $q_\beta$, and $q_\gamma$ can be determined by minimizing the Kullback--Leibler divergence of $p(\mathcal{H}|\mathbf{y}_\Omega)$ from $q(\mathcal{H})$, usually via an alternating minimization approach \cite{bishop2006pattern}. Indeed, thanks to the choice of conjugate priors for the parameters, it can be shown that the individual factors in \eqref{mf} take the following forms \cite{luttinen2013fast}: \begin{subequations}\label{qs} \begin{align} q_{\mathbf{B}}(\mathbf{B}) &= \mathcal{N}(\vec{\mathbf{B}} \mid \boldsymbol{\mu}^{\mathbf{B}}, \boldsymbol{\Xi}^{\mathbf{B}}) \\ q_{\mathbf{a}_{i\boldsymbol{\cdot}}} &= \mathcal{N}({\mathbf{a}_{i\boldsymbol{\cdot}}} \mid \boldsymbol{\mu}_i^{\mathbf{A}}, \boldsymbol{\Xi}_i^{\mathbf{A}}) \\ q_{\mathbf{j}_{i\boldsymbol{\cdot}}} &= \mathcal{N}({\mathbf{j}_{i\boldsymbol{\cdot}}} \mid \boldsymbol{\mu}_i^{\mathbf{J}}, \boldsymbol{\Xi}_i^{\mathbf{J}}) \\ q_{\beta}(\beta) &= \text{Ga}(\beta; a^\beta, b^\beta) \\ q_{\gamma_i}(\gamma_i) &= \text{Ga}(\gamma_i; a_i^\gamma, b_i^\gamma) \\ q_{\upsilon_i}(\upsilon_i) &= \text{Ga}(\upsilon_i; a_i^\upsilon, b_i^\upsilon) \end{align} \end{subequations} where, $\boldsymbol{\mu}^\mathbf{B} \in \mathbb{R}^{rt}$, $\boldsymbol{\Xi}^{\mathbf{B}} \in \mathbb{R}^{rt \times rt}$, $\boldsymbol{\mu}^\mathbf{A}_i \in \mathbb{R}^r$, $\boldsymbol{\Xi}^\mathbf{A}_i \in \mathbb{R}^{r\times r}$, $\boldsymbol{\mu}^\mathbf{J}_i \in \mathbb{R}^r$, $\boldsymbol{\Xi}^\mathbf{J}_i \in \mathbb{R}^{r\times r}$, and $a^\beta$, $b^\beta$, $a^{\gamma}_i$, $b^{\gamma}_i$, $a^\upsilon_i$, $b^\upsilon_i \in \mathbb{R}_{++}$. Consequently, each iteration of alternating optimization simply involves updating the variables $\{\boldsymbol{\mu}^\mathbf{B}, \boldsymbol{\Xi}^\mathbf{B}, \{\boldsymbol{\mu}^\mathbf{A}_i\}, \{\boldsymbol{\Xi}^\mathbf{A}_i\}, \{\boldsymbol{\mu}^\mathbf{J}_i\}, \{\boldsymbol{\Xi}^\mathbf{J}_i\}$, $a^\beta, b^\beta$, $\{a^{\gamma}_i\}, \{b^{\gamma}_i\}, \{a^\upsilon_i\}, \{b^\upsilon_i\}\}$ in a cyclic manner. In the present case, not all variables need to be updated explicitly and the updates may be written in a compact form. Let us denote $\omega_\tau:=\abs{\Omega_\tau}$ and let $\omega:=\sum_\tau \omega_\tau$ be the total number of observations made. Then, the updates for hyperparameters $\{\boldsymbol{\upsilon},\boldsymbol{\gamma}\}$ take the following form \begin{subequations}\label{upga} \begin{align} \hat{\upsilon}_i &= \frac{m}{\sum_{k=1}^m\left([\boldsymbol{\mu}^\mathbf{J}_k]^2_i + [\boldsymbol{\Xi}^\mathbf{J}_k]_{ii}\right)} \label{10a} \\ \hat{\gamma}_i &= \frac{m}{\sum_{k=1}^m\left([\boldsymbol{\mu}^\mathbf{A}_k]^2_i + [\boldsymbol{\Sigma}^\mathbf{A}_k]_{ii}\right)}.\label{10b} \end{align} \end{subequations} Subsequently, let $\hat{\boldsymbol{\upsilon}}$ and $\hat{\boldsymbol{\gamma}}$ be the vectors that collect $\{\hat{\upsilon}_i\}$ and $\{\hat{\gamma}_i\}$, respectively. Since $\mathbf{b}_{\tau}$ denotes the $\tau$-th column of $\mathbf{B}^T$, its posterior distribution may be written as $q_{\mathbf{b}_\tau}(\mathbf{b}_\tau) = \mathcal{N}(\mathbf{b}_\tau \mid \boldsymbol{\mu}^\mathbf{B}_\tau, \boldsymbol{\Xi}^\mathbf{B}_\tau)$, where $\boldsymbol{\mu}^\mathbf{B}_\tau$ and $\boldsymbol{\Xi}^\mathbf{B}_\tau$ comprise of the corresponding elements of $\boldsymbol{\mu}^\mathbf{B}$ and $\boldsymbol{\Xi}^\mathbf{B}$, respectively. Also define the posterior covariance matrices \begin{align} \label{sigma_up1} \boldsymbol{\Sigma}^{\mathbf{B}}_{\tau,\iota} &:= \boldsymbol{\mu}^\mathbf{B}_\tau(\boldsymbol{\mu}^\mathbf{B}_\iota)^T + \boldsymbol{\Xi}^{\mathbf{B}}_{\tau,\iota} \\ \label{sigma_up2} \boldsymbol{\Sigma}^\mathbf{J}_i &:= \boldsymbol{\mu}^\mathbf{J}_i(\boldsymbol{\mu}^\mathbf{J}_i)^T + \boldsymbol{\Xi}^\mathbf{J}_i \\ \label{sigma_up3} \boldsymbol{\Sigma}^\mathbf{A}_i &:= \boldsymbol{\mu}^\mathbf{A}_i(\boldsymbol{\mu}^\mathbf{A}_i)^T + \boldsymbol{\Xi}^\mathbf{A}_i. \end{align} Therefore, the update for $\hat{\beta}$ becomes \begin{align}\label{be} \hat{\beta} = \frac{\omega}{\sum_{\tau=1}^t\sum_{i\in\Omega_\tau} \left[y_{i\tau}^2 - 2y_{i\tau}(\boldsymbol{\mu}^\mathbf{A}_i)^T\boldsymbol{\mu}^\mathbf{B}_\tau + \tr{\boldsymbol{\Sigma}^\mathbf{A}_{i}\boldsymbol{\Sigma}^{\mathbf{B}}_{\tau,\tau}}\right]}. \end{align} Next, the updates for the factors $\mathbf{J}$ and $\mathbf{A}$ take the following form \begin{subequations}\label{ja} \begin{align} \boldsymbol{\mu}^\mathbf{J}_i &= [\boldsymbol{\Xi}^\mathbf{J}_i\boldsymbol{\Sigma}^{\mathbf{B}}_{\tau,\tau-1}]_{\boldsymbol{\cdot} i} \label{15a}\\ \boldsymbol{\Xi}^\mathbf{J}_i &= \left(\Diag{\hat{\boldsymbol{\upsilon}}} + \sum_{\tau=1}^{t-1}\boldsymbol{\Sigma}^\mathbf{B}_{\tau,\tau-1}\right)^{-1}\label{15b} \\ \boldsymbol{\mu}^\mathbf{A}_i &= \hat{\beta}\boldsymbol{\Xi}^\mathbf{A}_i\sum_{\tau \in\Omega'_i} \boldsymbol{\mu}^\mathbf{B}_\tau y_{i\tau}\label{15c} \\ \boldsymbol{\Xi}^\mathbf{A}_i &= \left(\hat{\gamma}_i\mathbf{I}_{r} + \hat{\beta}\sum_{\tau \in\Omega'_i}\boldsymbol{\Sigma}^\mathbf{B}_{\tau,\tau} \right)^{-1}\label{15d} \end{align} \end{subequations} where $\Omega'_i:=\{\tau \mid i \in \Omega_\tau\}$. Observe from the updates that the rows of $\mathbf{J}$ are independent identically distributed under the mean field approximation. The update for $\boldsymbol{\mu}^\mathbf{B}$ can be written as \begin{align} \boldsymbol{\mu}^\mathbf{B} &= \boldsymbol{\Xi}^\mathbf{B}\begin{bmatrix} \hat{\beta}\sum_{i\in\Omega_1}y_{i1}\boldsymbol{\mu}^\mathbf{A}_i + \boldsymbol{\Lambda}_1^{-1}\boldsymbol{\mu}_1\\ \hat{\beta}\sum_{i\in\Omega_2}y_{i2}\boldsymbol{\mu}^\mathbf{A}_i \\ \vdots\\ \hat{\beta}\sum_{i\in\Omega_t}y_{it}\boldsymbol{\mu}^\mathbf{A}_i \end{bmatrix}\label{mub}. \end{align} Finally, $[\boldsymbol{\Xi}^\mathbf{B}]^{-1}$ a block-tridiagonal matrix. Defining $\hat{\mathbf{J}}:=\Ex{\mathbf{J} \mid \mathbf{y}_\Omega}$ as the matrix whose $i$-row is given by $(\boldsymbol{\mu}^\mathbf{J}_{i})^T$, $\boldsymbol{\Sigma}^\mathbf{A}_{(\tau)} = \sum_{i\in\Omega_\tau'}\boldsymbol{\Sigma}^\mathbf{A}_i$, and $\boldsymbol{\Sigma}^\mathbf{J}:=\sum_{i=1}^r \boldsymbol{\Sigma}^\mathbf{J}_i$, the updates take the form: \begin{align} \left[\boldsymbol{\Xi}^{\mathbf{B}}\right]^{-1} &= \hat{\beta}\Diag{\boldsymbol{\Xi}^\mathbf{A}_{(1)}, \ldots, \boldsymbol{\Xi}^\mathbf{A}_{(t)}} + \nonumber\\ &+ \begin{bmatrix} \boldsymbol{\Lambda}_1^{-1} & -\hat{\mathbf{J}} & \ldots &0\\ -\hat{\mathbf{J}} & \mathbf{I}_r + \boldsymbol{\Sigma}^\mathbf{J} & -\hat{\mathbf{J}} & \ldots \\ \vdots & \vdots &&\vdots \\ \ldots & 0 & -\hat{\mathbf{J}} & \mathbf{I}_r \end{bmatrix}. \label{xib} \end{align} It is remarked that although the $rt \times rt$ matrix $[\boldsymbol{\Xi}^\mathbf{B}]^{-1}$ is block-tridiagonal, the matrix $\boldsymbol{\Xi}^\mathbf{B}$ is dense, and direct inversion would be prohibitively costly. Moreover, the classical Rauch-Tung-Striebel (RTS) smoother cannot be directly applied since evaluating the conditional expectations under $q(\mathbf{B})$ is difficult and not amenable to the Matrix Inversion Lemma \cite{beal2003variational}. Interestingly, observe that the updates in \eqref{be} and \eqref{ja} depend only on diagonal and super-diagonal blocks of $\boldsymbol{\Xi}^\mathbf{B}$, namely $\boldsymbol{\Xi}^\mathbf{B}_{\tau,\tau}$ and $\boldsymbol{\Xi}^\mathbf{B}_{\tau,\tau-1}$, respectively. The next subsection details a low-complexity algorithm for carrying out the updates for these blocks as well as for $\boldsymbol{\mu}^\mathbf{B}$. \subsection{Low-complexity updates via LDL-decomposition} Thanks to the block-tridiagonal structure of $[\boldsymbol{\Xi}^\mathbf{B}]^{-1}$, it is possible to use the LDL decomposition to carry out the updates in an efficient manner. Decomposing $[\boldsymbol{\Xi}^\mathbf{B}]^{-1} = \mathbf{L}\mathbf{D}\mathbf{L}^T$, the key idea is that left multiplication with $\boldsymbol{\Xi}^\mathbf{B}$ is equivalent to left multiplication with $\mathbf{L}^{-T}\mathbf{D}^{-1}\mathbf{L}^{-1}$. Towards this end, we utilize the algorithm from \cite{luttinen2013fast}, that comprises of two phases: the forward pass that carries out the multiplication with $\mathbf{D}^{-1}\mathbf{L}^{-1}$ and the backward pass that implements the multiplication with $\mathbf{L}^{-T}$. Let us define for $2\leq \tau \leq t$, \begin{align} \boldsymbol{\Psi}_\tau &:= \hat{\beta}\sum_{i\in\Omega_\tau}\boldsymbol{\Sigma}^\mathbf{A}_{(i)}+ \mathbf{I}_r + \ind_{\tau\neq t}\sum_{i=1}^r \boldsymbol{\Sigma}^\mathbf{J}_i \\ \mathbf{v}_\tau &:= \hat{\beta}\sum_{i\in\Omega_\tau} y_{i\tau}\boldsymbol{\mu}^\mathbf{A}_i.\label{vbt} \end{align} The forward pass outputs intermediate variables $\breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau}$, $\breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1}$, and $\breve{\boldsymbol{\mu}}_\tau$, that are subsequently used in the backward pass. The updates take the following form: \begin{enumerate} \item Initialize $\hat{\boldsymbol{\Xi}}^{\mathbf{B}}_{1,1} = \boldsymbol{\Lambda}_1$ and $\hat{\boldsymbol{\mu}}^{\mathbf{B}}_1 = \boldsymbol{\mu}_1 + \hat{\beta}\sum_{i\in\Omega_\tau}y_{i\tau}\boldsymbol{\Lambda}_1\boldsymbol{\mu}^\mathbf{A}_i$ \item For $\tau = 1, \ldots, t-1$ \begin{subequations} \label{rts} \begin{align} \hspace{-1cm}\breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1} & = -\hat{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau}\hat{\mathbf{J}} \\ \hspace{-1cm}\breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau+1,\tau+1} &= (\boldsymbol{\Psi}_{\tau+1} - (\breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1})^T\boldsymbol{\Psi}^{\mathbf{B}}_{\tau,\tau+1})^{-1} \\ \breve{\boldsymbol{\mu}}^{\mathbf{B}}_{\tau+1} &= \breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau+1,\tau+1}(\mathbf{v}_{\tau+1} - (\breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1})^T\breve{\boldsymbol{\mu}}^{\mathbf{B}}_{\tau}) \end{align} \item For $\tau = t-1, \ldots, 1$ \begin{align} \hspace{-1cm}\boldsymbol{\Xi}^{\mathbf{B}}_{\tau,\tau+1} &= - \breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1}\boldsymbol{\Xi}^{\mathbf{B}}_{\tau+1,\tau+1} \\ \hspace{-1cm}\boldsymbol{\Xi}^{\mathbf{B}}_{\tau,\tau} &= \breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau} - \hat{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1}(\boldsymbol{\Xi}^{\mathbf{B}}_{\tau,\tau+1})^T \\ \hspace{-1cm}\boldsymbol{\mu}^{\mathbf{B}}_{\tau} &= \breve{\boldsymbol{\mu}}^{\mathbf{B}}_{\tau} - \breve{\boldsymbol{\Xi}}^{\mathbf{B}}_{\tau,\tau+1}\boldsymbol{\mu}^{\mathbf{B}}_{\tau+1} \end{align} \end{subequations} \item Output $\{\boldsymbol{\Xi}^{\mathbf{B}}_{\tau,\tau+1}, \boldsymbol{\Xi}^{\mathbf{B}}_{\tau,\tau}, \boldsymbol{\mu}^{\mathbf{B}}_{\tau}\}_{\tau = 2}^t$ \end{enumerate} Note that while $\boldsymbol{\Xi}^{\mathbf{B}}_{i,j} \neq 0$ for $|i-j| > 1$, these blocks are neither calculated in the forward and backward passes nor required in any of the variational updates. Finally, the predictive distribution $p(y_{i\tau}\mid \mathbf{y}_{\Omega})$ for $\tau \notin \Omega_i$ or $\tau \geq t+1$ is still not tractable in the present case. Instead, we simply use point estimates for estimating the missing entries. Specifically, for $\tau \notin \Omega_i$, the missing entries are imputed as \begin{align} y_{i\tau} = (\boldsymbol{\mu}^\mathbf{B}_\tau)^T\boldsymbol{\mu}^\mathbf{A}_i. \label{pred1} \end{align} Likewise for $\tau \geq t+1$, the prediction becomes \begin{align} y_{i\tau} = (\hat{\mathbf{J}}^{\tau-t}\boldsymbol{\mu}^\mathbf{B}_t)^T\boldsymbol{\mu}^\mathbf{A}_i.\label{pred2} \end{align} It can be seen that as compared to the updates in \eqref{mub}-\eqref{xib} that incur a complexity of $\mathcal{O}(t^3)$, the complexity incurred due to \eqref{rts} is only $\mathcal{O}(t)$. Overall, the different parameters are updated cyclically until convergence for each $t = 1, 2, \ldots$. \subsection{EM Baysian Subspace Filtering} Different from the variational Bayesian framework used here, the EM algorithm treats $\mathcal{H}_h:=\{\mathbf{A}, \mathbf{B}, \mathbf{J}\}$ as hidden variables (with posterior pdf $q_h(\mathcal{H}_h):=q_\mathbf{B}(\mathbf{B})q_\mathbf{A}(\mathbf{A})q_\mathbf{J}(\mathbf{J})$) and uses maximum a posteriori (MAP) estimates for the precision variables $\mathcal{H}_p:=\{\boldsymbol{\upsilon}, \boldsymbol{\gamma}, \beta\}$. Consequently, the EM algorithm for Bayesian subspace tracking starts with an initial estimate $\mathcal{H}_p^{(0)}$ and uses the following updates at iteration $\iota \geq 1$, \begin{itemize} \item \textbf{E-step:} evaluate \begin{align} Q(\mathcal{H}_p,\mathcal{H}_p^{(\iota)}):= \mathbb{E}_{q_h(\mathcal{H}_h)}\left[\log p(\mathbf{y}_\Omega,\mathcal{H}_h,\mathcal{H}_p^{(\iota)})\right] \end{align} \item \textbf{M-step:} maximize \begin{align} \mathcal{H}_p^{(\iota+1)} = \arg\max_{\mathcal{H}_p} Q(\mathcal{H}_p,\mathcal{H}_p^{(\iota)}) \end{align} \end{itemize} Interestingly, the updates resulting from the E-step take the same form as those in \eqref{ja} and \eqref{rts}. On the other hand, the updates obtained from solving the M-step take the slightly different form: \begin{subequations}\label{mstep} \begin{align} \hat{\upsilon}_i &= \frac{m-2}{\sum_{k=1}^m\left([\boldsymbol{\mu}^\mathbf{J}_k]^2_i + [\boldsymbol{\Xi}^\mathbf{J}_k]_{ii}\right)} \\ \hat{\gamma}_i &= \frac{m-2}{\sum_{k=1}^m\left([\boldsymbol{\mu}^\mathbf{A}_k]^2_i + [\boldsymbol{\Sigma}^\mathbf{A}_k]_{ii}\right) }\\ \hat{\beta} &= \frac{\omega-2}{\sum_{\tau=1}^t\sum_{i\in\Omega_\tau} \left[y_{i\tau}^2 - 2y_{i\tau}(\boldsymbol{\mu}^\mathbf{A}_i)^T\boldsymbol{\mu}^\mathbf{B}_\tau + \tr{\boldsymbol{\Sigma}^\mathbf{A}_{i}\boldsymbol{\Sigma}^{\mathbf{B}}_\tau}\right]}. \end{align} \end{subequations} The slight differences arise due to the difference between the mean and mode of the Gamma distribution. Specifically, for $p(x) =$ Ga$(x | a,b)$, it holds that $\Ex{X} = a/b$ while $\max_x \text{Ga}(x | a,b) = \frac{a-1}{b}$. \par \subsubsection{Remarks on the Convergence of VBSF} The VB framework used in the present work is a special case of a more general mean field approximation approach. The convergence of the VB algorithm is well-known; see e.g. \cite{tzikas2008variational}, \cite{sato2001online}. Intuitively, the variational approximation renders the evidence lower bound convex in individual factors, and thus amenable to coordinate ascent iterations. Since the lower bound is also differentiable with respect to each factor, the coordinate ascent iterations converge to a stationary point; see \cite{tseng2001convergence} for a more general result. However, convergence to the global optimum is not guaranteed. \subsection{Fixed-lag tracking} Algorithm \ref{alg:ALGO} can be viewed as an offline algorithm that must be run for every $t$. In practical settings, it may be impractical to remember and process the entire history of measurements at each $t$. Moreover, given data at time $t$, estimates may only be required for entries at time $t-\Delta$ for some $\Delta < h$. Towards this end, we consider a sliding window of measurements. Since $\mathbf{A}_{t}$ and $\mathbf{J}_{t}$ may be seen as transition matrices for the latent states and between latent state and observations, we initialize the next sliding-window with inferred approximate distributions on the transition matrices of the current window. For instance, within the context of traffic density prediction, the inferred approximate distribution for a day may be used as a prior for the coming days. That is, the distributions for $\mathbf{A}, \, \mathbf{B},$ and $\mathbf{J}$ for a day and sliding window can be initialized with the approximate distributions obtained from the previous month's data. \begin{algorithm} Initialize $ \boldsymbol{\gamma},\boldsymbol{\beta},\mathbf{v}$, $sub=1,\, \Omega_\tau, \,\Omega'_i,\boldsymbol{\Xi}^\mathbf{A},\boldsymbol{\mu}^\mathbf{A}, \boldsymbol{\Xi}^\mathbf{B},\boldsymbol{\mu}^\mathbf{B},\boldsymbol{\Xi}^\mathbf{J}_{diag},\boldsymbol{\mu}^\mathbf{J} \boldsymbol{\Lambda}_1,\mu_1, $ $\hat{\mathbf{Y}}=\boldsymbol{\mu}^A(\boldsymbol{\mu}^\mathbf{B})^T$ \While{$Y_{conv}< 10^{-5}$}{ $\mathbf{Y_{old}}= \hat{\mathbf{Y}}$ $\boldsymbol{\Gamma}=diag(\boldsymbol{\gamma})$ \uIf{$sub==1 $} { $\text{Update using} \, \eqref{rts}$ $sub=2$ $ \text{Update using} \, \eqref{10a}, \,\eqref{sigma_up1},\,\eqref{15a},\,\eqref{15b}\,\, \forall \,\, 1\leq i \leq r$ } \ElseIf{$sub==2 $} { $\text{Update using} \, \eqref{sigma_up3},\eqref{15c}, \eqref{15d}, \eqref{10b} \, \, \forall \, 1\leq i \leq m$ $sub=1$ } $\hat{\mathbf{Y}}=\boldsymbol{\mu}^A(\boldsymbol{\mu}^\mathbf{B})^T$ $\text{Update using } \eqref{be}$ $Y_{conv}=\frac{\norm{\mathbf{Y}-\mathbf{Y_{old}}}_F}{\norm{\mathbf{Y_{old}}}_F}$ } \Return($\hat{\mathbf{Y}},\boldsymbol{\Xi}^\mathbf{A},\boldsymbol{\mu}^\mathbf{A}, \boldsymbol{\Xi}^\mathbf{B},\boldsymbol{\mu}^\mathbf{B},\boldsymbol{\Xi}^\mathbf{J}_{diag},\boldsymbol{\mu}^\mathbf{J} $) \caption{Variational Bayesian Subspace Filtering} \label{alg:ALGO} \end{algorithm} \section{Robust Variational Bayesian Subspace Filtering}\label{rvbsf} In this section we consider the robust version of the variational Bayesian subspace filtering problem in Sec. \ref{vbsf}. Within this context, in addition to the missing entries in $\mathbf{Y}$, some entries of $\mathbf{Y}$ are also contaminated with outliers. Unlike the missing entries however, the location of these outliers is not known. These entries arise due to sensor malfunctions, communication errors, and impulse noise. The robust subspace filtering problem is more difficult as the removal of such outliers entails estimating their magnitudes as well as locations. Within the deterministic robust PCA framework, the matrix is modeled as taking the form $\mathbf{Y} = \mathbf{A}\mathbf{B} + \mathbf{E}$ where $\mathbf{A} \in \mathbb{R}^{m \times r}$, $\mathbf{B} \in \mathbb{R}^{r \times t}$ are low-rank matrices as before. Additionally, we also need to estimate the sparse outlier matrix $\mathbf{E} \in \mathbb{R}^{m \times t}$. As before, both $r$ and the level of sparsity in $\mathbf{E}$ are tuning parameters that must generally be carefully selected. Here, we put forth the variational Bayesian subspace filtering algorithm that makes use of ARD priors to prune the redundant features. Consider the measurement matrix $\mathbf{Y}$, whose entries are generated from the following pdf: \begin{align} p(y_{i\tau} \mid \mathbf{a}_{i\boldsymbol{\cdot}}, \mathbf{b}_\tau, e_{i\tau}, \beta) &= \mathcal{N}(y_{i\tau} \mid \mathbf{b}_\tau^T\mathbf{a}_{i\boldsymbol{\cdot}} + e_{i\tau}, \beta^{-1}) & i \in \Omega_\tau \end{align} for all $\tau \geq 1$, and apart from the matrices $\mathbf{A}$ and $\mathbf{B}$ defined earlier, we also have $\{e_{i\tau}\}_{\tau =1, i\in \Omega_\tau}^t$ as the additional (hidden) problem parameter that captures the outliers. The generative models for $\mathbf{A}$ and $\mathbf{B}$ are the same as before, i.e., \begin{subequations}\label{pbaj} \begin{align} p(\mathbf{B} \mid \mathbf{J}) &= \mathcal{N}(\mathbf{b}_1; \boldsymbol{\mu}_1, \boldsymbol{\Lambda}_1 ) \prod_{\tau = 2}^t \mathcal{N}(\mathbf{b}_\tau \mid \mathbf{J}\mathbf{b}_{\tau-1}, \mathbf{I}_r)\label{pb}\\ p(\mathbf{A} \mid \boldsymbol{\gamma}) &= \prod_{i=1}^r \mathcal{N}(\mathbf{a}_i \mid 0, \gamma_i^{-1}\mathbf{I}) \label{pa}\\ p(\mathbf{J} \mid \boldsymbol{\upsilon}) &= \prod_{i=1}^r \mathcal{N}(\mathbf{j}_i \mid 0, \upsilon_i^{-1}\mathbf{I}) \label{pj} \end{align} \end{subequations} for $\tau \geq 2$, and $\boldsymbol{\gamma}$ and $\boldsymbol{\upsilon}$ are problem parameters. Additionally, we also associate an ARD prior to the outliers, i.e., \begin{align} p(e_{i\tau}) &= \mathcal{N}(e_{i\tau} \mid 0, \alpha_{i\tau}^{-1}) & i \in \Omega_\tau \end{align} for $1\leq \tau\leq t$, where the precision $\alpha_{i\tau}$ is a hidden variable, that would be driven to infinity whenever $e_{ij}$ is zero. It is remarked that the prior for $e_{i\tau}$ is only specified for the measurements, i.e., for $i \in \Omega_\tau$ and no predictions are made for the outliers. As before, we associate Jeffery's prior to the precisions $\beta$, $\{\gamma_i\}$, $\{\upsilon_i\}$, and $\{\alpha_{i\tau}\}$. \begin{align} p(\beta) &= \frac{1}{\beta}, & p(\gamma_i) &= \frac{1}{\gamma_i}, & p(\upsilon_i) &= \frac{1}{\upsilon_i}, & p(\alpha_{i\tau}) &= \frac{1}{\alpha_{i\tau}}. \end{align} Let the vectors $\mathbf{e} \in \mathbb{R}^{\omega}$ and $\boldsymbol{\alpha} \in \mathbb{R}^{\omega}$ collect the variables $\{e_{i\tau}\}$ and $\{\alpha_{i\tau}\}$, respectively. Likewise, defining all the hidden variables as $\mathcal{H} := \{\mathbf{A}, \mathbf{B}, \mathbf{J}, \mathbf{e}, \beta, \boldsymbol{\gamma}, \boldsymbol{\upsilon}\}$, the joint distribution of $\{\mathbf{y}_\Omega, \mathcal{H}\}$ can be written as \begin{align} p(\mathbf{y}_\Omega,\mathcal{H}) &\nonumber\\ &\hspace{-1.5cm}= p(\mathbf{y}_\Omega | \mathbf{A}, \mathbf{B}, \beta)p(\mathbf{A} | \boldsymbol{\gamma})p(\mathbf{B} | \mathbf{J}) p(\mathbf{J} | \boldsymbol{\upsilon})p(\mathbf{e} | \boldsymbol{\alpha})p(\beta)p(\boldsymbol{\upsilon})p(\boldsymbol{\gamma}) \nonumber \\ &\hspace{-1cm}=\prod_{\tau=1}^t\prod_{i\in\Omega_\tau} \mathcal{N}(y_{i\tau} \mid \mathbf{b}_\tau^T\mathbf{a}_{i\boldsymbol{\cdot}}, \beta^{-1}) \mathcal{N}(e_{i\tau}\mid 0,\alpha_{i\tau}^{-1})\frac{1}{\alpha_{i\tau}}\nonumber\\ &\times \prod_{i=1}^r \left[\mathcal{N}(\mathbf{a}_i \mid 0,\gamma_i^{-1}\mathbf{I}) \mathcal{N}(\mathbf{j}_i \mid 0, \upsilon_i^{-1}\mathbf{I})\right] \nonumber \\ &\hspace{-1cm}\times\mathcal{N}(\mathbf{b}_1; \boldsymbol{\mu}_1, \boldsymbol{\Lambda}_1 ) \prod_{\tau = 2}^t \mathcal{N}(\mathbf{b}_\tau \mid \mathbf{J}\mathbf{b}_{\tau-1}, \mathbf{I}) \frac{1}{\beta}\prod_{i=1}^r \frac{1}{\gamma_i\upsilon_i}. \end{align} The full hierarchical Bayesian model adopted here is summarized in figure \ref{fig:mc_algo}(b). \subsection{Variational Bayesian Inference}\label{vbi2} Utilizing the mean field approximation, the posterior distribution $p(\mathcal{H} \mid \mathbf{y}_\Omega)$ factorizes as \begin{align}\label{mf2} p(\mathcal{H} \mid \mathbf{y}_\Omega) \approx q(\mathcal{H}) &\nonumber\\ &\hspace{-2cm}= q_{\mathbf{A}}(\mathbf{A})q_{\mathbf{B}}(\mathbf{B})q_{\mathbf{J}}(\mathbf{J})q_{\mathbf{e}}(\mathbf{e})q_{\boldsymbol{\upsilon}}(\boldsymbol{\upsilon})q_{\beta}(\boldsymbol{\beta})q_{\boldsymbol{\gamma}}(\boldsymbol{\gamma}). \end{align} where the individual factors take the same forms as in \eqref{qs}, in addition to \begin{align} q_{\mathbf{e}}(\mathbf{e}) & = \prod_{\tau = 1}^t \prod_{i\in \Omega_\tau} \mathcal{N}(e_{i\tau} | \mu_e^{i\tau}, \Xi_e^{i\tau}). \end{align} As before, the variational inference problem can be solved by updating the variables $\{\boldsymbol{\mu}^\mathbf{B}, \boldsymbol{\Xi}^\mathbf{B}, \{\boldsymbol{\mu}^\mathbf{A}_i\}, \{\boldsymbol{\Xi}^\mathbf{A}_i\}, \{\boldsymbol{\mu}^\mathbf{J}_i\}, \{\boldsymbol{\Xi}^\mathbf{J}_i\}$, $\{\mu_e^{i\tau}\}, \{\Xi_e^{i\tau}\}, a^\beta, b^\beta$, $\{a^{\gamma}_i\}, \{b^{\gamma}_i\}, \{a^\upsilon_i\}, \{b^\upsilon_i\}\}$ in a cyclic manner. However, a more compact form for the updates may be derived as follows. Specifically, the updates for $\{\hat{\upsilon}_i, \hat{\gamma}_i\}$ remain the same as in \eqref{upga}. However, the update for $\hat{\beta}$ takes the form: \begin{align}\label{be2} \hat{\beta} &= \frac{\omega}{\sum_{\tau=1}^t\sum_{i\in\Omega_\tau} \nu_{i\tau}}\\ \shortintertext{where,} \nu_{i\tau} :=& y_{i\tau}^2 - 2(y_{i\tau}-\mu_e^{i\tau})(\boldsymbol{\mu}^\mathbf{A}_i)^T\boldsymbol{\mu}^\mathbf{B}_\tau - 2y_{i\tau}\mu_e^{i\tau} \nonumber\\ &+ (\mu_e^{i\tau})^2 + \Xi_e^{i\tau} + \tr{\boldsymbol{\Sigma}^\mathbf{A}_{i}\boldsymbol{\Sigma}^{\mathbf{B}}_{\tau,\tau}}. \end{align} Further, the parameters $\mu_e^{i\tau}$ and $\Xi_e^{i\tau}$ are updated as \begin{subequations}\label{eup} \begin{align} \Xi_e^{i\tau} &= \frac{1}{\hat{\beta} + (\mu_e^{i\tau})^2 + \Xi_e^{i\tau}} \label{36a}\\ \mu_e^{i\tau} &= \hat{\beta} \Xi_e^{i\tau} (y_{i\tau} - (\boldsymbol{\mu}^\mathbf{A}_i)^T\boldsymbol{\mu}^\mathbf{B}_\tau). \label{36b} \end{align} \end{subequations} Proceeding similarly, the updates for $\{\boldsymbol{\mu}^\mathbf{J}_i\}$, $\{\boldsymbol{\Xi}^\mathbf{J}_i\}$, and $\{\boldsymbol{\Xi}^\mathbf{A}_i\}$ remain the same as in \eqref{ja}, while the updates for $\{\boldsymbol{\mu}^\mathbf{A}_i\}$ become: \begin{align}\label{a2} \boldsymbol{\mu}^\mathbf{A}_i &= \hat{\beta}\boldsymbol{\Xi}^\mathbf{A}_i\sum_{\tau \in\Omega'_i} \boldsymbol{\mu}^\mathbf{B}_\tau (y_{i\tau}-\mu_e^{i\tau}) . \end{align} Finally, the updates for $\boldsymbol{\Xi}^{\mathbf{B}}$ remain the same but the updates of $\boldsymbol{\mu}^\mathbf{B}$ change. Specifically, the low complexity updates via LDL-decomposition remain mostly the same, except for the modified definition of $\mathbf{v}_\tau$ in \eqref{vbt} which now looks like \begin{align} \mathbf{v}_\tau = \hat{\beta} \sum_{i \in \Omega_\tau} (y_{i\tau} - \mu_e^{i\tau}). \end{align} The full robust subspace filtering algorithm is summarized in Algorithm \ref{alg:ALG2}. The predictions for $y_{i\tau}$ for $i\notin \Omega_\tau$ and for $\tau \geq t+1$ are obtained as in \eqref{pred1} and \eqref{pred2}, respectively. \begin{algorithm} Initialize $ \boldsymbol{\alpha},\boldsymbol{\gamma},\boldsymbol{\beta},\mathbf{v}$, $sub=1,\, \Omega_\tau, \,\Omega'_i,\boldsymbol{\Xi}^\mathbf{A},\boldsymbol{\mu}^\mathbf{A}, \boldsymbol{\Xi}^\mathbf{B},\boldsymbol{\mu}^\mathbf{B},\boldsymbol{\Xi}^\mathbf{J}_{diag},\boldsymbol{\mu}^\mathbf{J} \boldsymbol{\Lambda}_1,\mu_1, $ $\hat{\mathbf{Y}}=\boldsymbol{\mu}^\mathbf{A}(\boldsymbol{\mu}^\mathbf{B})^T$ \While{$Y_{conv}< 10^{-5}$}{ $\mathbf{Y_{old}}= \hat{\mathbf{Y}}$ $\boldsymbol{\Gamma}=diag(\boldsymbol{\gamma})$ \uIf{$sub==1 $} { $\text{Update using} \, \eqref{rts}$ $sub=2$ $ \text{Update using} \, \eqref{10a}, \,\eqref{sigma_up1},\,\eqref{15a},\,\eqref{15b}\,\forall \,\, 1\leq i \leq r$ } \ElseIf{$sub==2 $} { $\text{Update using} \, \eqref{sigma_up3},\eqref{15c}, \eqref{15d}, \eqref{10b} \, \,\forall \, 1\leq i \leq m$ $sub=3$ } \Else { $\text{Update using} \, \eqref{36a},\, \eqref{36b} \,\, \forall \,\, 1\leq i \leq m, \,\, \forall \,\, 1\leq \tau \leq t$ $sub=1$ } $\hat{\mathbf{Y}}=\boldsymbol{\mu}^\mathbf{A}(\boldsymbol{\mu}^\mathbf{B})^T$ $\text{Update using} \, \eqref{be2}$ $Y_{conv}=\frac{\norm{\mathbf{Y}-\mathbf{Y_{old}}}_F}{\norm{\mathbf{Y_{old}}}_F}$ } \Return($\hat{\mathbf{Y}},\boldsymbol{\Xi}^\mathbf{A},\boldsymbol{\mu}^\mathbf{A}, \boldsymbol{\Xi}^\mathbf{B},\boldsymbol{\mu}^\mathbf{B},\boldsymbol{\Xi}^\mathbf{J}_{diag},\boldsymbol{\mu}^\mathbf{J} $) \caption{Robust Variational Bayesian Subspace Filtering} \label{alg:ALG2} \end{algorithm}
\section{Introduction} Wrinkling instabilities are well known to occur in thin elastic sheets due to a subtle competition between bending and stretching energetics under a variety of applied boundary conditions~\cite{Audoly2010,Davidovitch2011,Chopin2013}. A particularly interesting example is a thin rectangular elastic sheet which when clamped at its two short ends and stretched, displays periodic wrinkles oriented parallel to the direction of applied tensile strain $\varepsilon$~\cite{Friedl2000}. It has been proposed that hindered Poisson contraction near the clamped edges leads to the formation of wrinkles above a critical value of $\varepsilon = \varepsilon_c$~\cite{Cerda2002}, which eventually extend throughout the whole sheet when $\varepsilon \gg \varepsilon_c$. Subsequent scaling arguments inspired by the classical F\"oppl-von K\'arm\'an (FvK) equations for thin Hookean (i.e. linear elastic) sheets were used to predict the behavior of the observed wrinkle amplitude and wavelength with applied strain~\cite{Cerda2003}. However, this approach has been criticized as introducing an ad hoc geometrical constraint that a transverse strain is eliminated by the formation of wrinkles~\cite{Kim2012}, leading to incorrect conclusions on the growth of the wrinkle amplitude above threshold~\cite{Healey2013}. In fact, the prediction of an unbounded growth of the wrinkles amplitude has been found to be inconsistent with results of simulations with neo-Hookean models~\cite{Zheng2009,Nayyar2011,Kim2012a,Healey2013,Taylor2014}. In these simulations, the wrinkles are found to grow, decay, and finally disappear with increasing strain at large but finite values. Interestingly, the same scaling analysis was found to yield consistent results for the evolution of the wrinkle wavelength with strain~\cite{Cerda2002,Nayyar2011,Kim2012}. More recent simulations~\cite{Li2016,Fu2018} have noted that the neo-Hookean and Mooney-Rivlin models of elastic materials predict wrinkles at higher strains than first reported with the Saint Venant-Kirchhoff model~\cite{Healey2013}, in addition to qualitative differences in the region of parameter space where wrinkles are expected to appear. The situation with respect to experiments and reported observations remains even less clear. Some studies with silicone rubber sheets appear to show wrinkles over a large range of applied strain where simulations find wrinkles to flatten out completely~\cite{Zheng2009}. Experimental errors, material imperfections and orthotropicity have been proposed as explanations for this apparent discrepancy~\cite{Taylor2014,Sipos2016}. In studies with polyethylene sheets, it was found that the observed wrinkles also persist to larger strains compared with finite element simulations implementing hyperelastic constitutive models~\cite{Nayyar2011}. Furthermore, it was shown that these materials are strain rate-dependent and deform plastically as strain is increased~\cite{Nayyar2011}. The far-from-threshold analysis proposed in Ref.~\cite{Cerda2003} has been pursued and developed further in studies that addressed simpler systems, yielding analytic progress and elucidating key aspects of this physical approach \cite{Davidovitch2011,Chopin2015,Paulsen2016,Vella2018b,Davidovitch2019}. Specifically, it was noted that rather than elimination of compressive strain that was invoked in Ref.~\cite{Cerda2002}, wrinkling of thin sheets in the far from threshold regime completely relaxes the in-plane compressive stress in the solid. For the stretching problem addressed here, this implies that the ratio between the wrinkle amplitude and wavelength is determined by the difference between the measured arc-length of the wrinkled width of the sheet and the planar projection of this shape, in a manner that is different from the one obtained in the original version of the far-from-threshold model~\cite{Cerda2003}. However, to our knowledge, an experimental assessment of the relevant assumption underlying a proper implementation of far-from-threshold analysis -- collapse of compressive strain {\emph{versus}} stress -- has not been conducted. Indeed, experimental investigations remain few, and a quantitative agreement between experiments and numerical predictions in case of elastic materials has not been demonstrated in spite of recent efforts to implement more elaborate numerical models that include geometrical nonlinearities, and various nonlinear rate-dependent and rate-independent constitutive laws for stretching and bending deformations~\cite{Nayyar2014,Li2016,Fu2018,Xin2018}. Thus, a combined numerical and experimental investigation of tension-induced wrinkles on simpler materials is highly needed to clarify the nature of the wrinkles and their persistence to higher strains in the case of elastic sheets. Here, we investigate tensional wrinkling patterns by using a highly stretchable latex sheets which are shown to be hyperelastic under the application of a large range of strain. In this case, we show that wrinkles indeed arise and flatten out at finite strains, in apparent contrast with the proposed amplitude growth~\cite{Cerda2003}, but which are also nonetheless quantitatively different from those reported by recent numerical work on nonlinear plate models using Hookean~\cite{Healey2013,Taylor2014} and hyperelastic materials~\cite{Nayyar2011,Li2016,Fu2018,Wang2019}. We observe that the wrinkles in fact persist to far greater strains, and show that the observed evolution is consistent with simulations using the Mooney-Rivlin model after the material parameters are matched appropriately. Thus, we show that the nature of the material nonlinearity affects significantly the region in the parameter space where wrinkling occurs. We then show that the growth and decay of the measured amplitude is inconsistent with the assumption of collapse of transverse strain~\cite{Cerda2002}. Rather, we show it to be consistent with a far-from-threshold approach derived from assuming a collapse of compressive stress. Our experimental and numerical work not only validates this assumption, but also shows its applicability to hyperelastic materials in capturing the growth of the wrinkle amplitude along with its wavelength. \section{Experimental System} \begin{figure} \begin{center} \includegraphics[width = 6.5cm]{Fig1.pdf} \end{center} \caption{Applied stress $T$ normalized by the Young's modulus $Y$ versus measured strain for latex while strain is increased and decreased. The differences are within the experimental error which is of the order of the size of the symbols. The data is well described by the Mooney-Rivlin hyperelastic model for soft elastic solids. The measured $Y = 1$\,MPa. } \label{fig:props} \end{figure} The experimental system consists of a latex sheet with initial length $L_o$, width $W_{\mathrm{o}}$, and thickness $t_o$, mounted horizontally between two rigid parallel clamps which are further attached to translating stages, similar to the one used previously to study the shape and strain experienced by unwrinkled thick elastic sheets~\cite{Chopin2018}. The clamps are moved axially through prescribed separation distances $L$, while maintaining their orientation, resulting in an applied longitudinal strain $\varepsilon = \Delta L/L_o = (L -L_o)/L_o$. Experiments were performed with latex sheets with thicknesses in the 140 to 500 micron range. The sheets are steamed and ironed to remove any creases, and then used over a period of days. In order to obtain consistent results, care has to be taken in preparation of the sheets and in their handling, including storing the sheets in air-tight containers, until they are ready to use. If these precautions are not taken, rubber sheets become somewhat thinner and brittle over longer periods. To characterize the elastic properties of the sheets, complementary measurements were performed by stretching and relaxing sheets of the materials by varying the applied strain $\varepsilon$. The measured nominal stress $T$ scaled by the Young's modulus $Y$, corresponding to the initial slope of the curve, is plotted as a function of $\varepsilon$ in Fig.~\ref{fig:props} over a range of applied strains which is used to investigate wrinkling. The response does not show any significant plasticity, as can be seen from the close overlap of the points corresponding to when the strain is increased and decreased in Fig.~\ref{fig:props}. It can be also observed that the stress-strain curve is nonlinear above $\varepsilon \approx 0.1$ compared to the linear elastic constitutive law used in the Saint Venant-Kirchhoff (SVK) model. Limited experiments were also performed with PDMS sheets, where similar results were observed, but are not reported here for simplicity of presentation. \begin{figure} \begin{center} \includegraphics[width = 8cm]{Fig2.pdf} \end{center} \caption{Wrinkles are formed in the central region of a sheet ($L_o/W_{\mathrm{o}} = 2$ and $t_o/W_{\mathrm{o}} = 1 \times 10^{-3}$) which is clamped at two ends and then stretched uniaxially. The applied strain $\varepsilon = 0$, 0.1, 0.2, 0.32, and 0.46.} \label{fig:ima} \end{figure} The stress response of rubber is typically described with the Mooney-Rivlin (MR) model~\cite{treloar1975physics}. We implement the extension of the sheet with the same dimensions $L_o = 28$\,cm, $W_{\mathrm{o}} = 14$\,cm, and $t_o = 140$\,$\mu$m used in our experiments using the Mooney-Rivlin model in Abaqus. The fitting parameters in the MR model which describes the data are found to be $D_1 = 0$\,Pa corresponding to the volumetric response, $C_{01} = 1.58 \times 10^5$\,Pa, and $C_{10} = 6.21 \times 10^4$\,Pa, the material constants related to the distortional response. The corresponding curve is plotted in Fig.~\ref{fig:props}, and is observed to be in excellent agreement with the data. We also compare the curve with the SVK model, where we assume Young's modulus similar to the initial measured response of latex used, and an ideal incompressible material. However, systematic deviations are observed, confirming that the relevant hyperelastic response over applied strains of interest are indeed given by the MR model. Having established the appropriate hyperelastic model in the sheets used, we next describe the experiments and measurements on wrinkling of the sheet, before comparing with the corresponding simulations. \section{Wrinkling observations} \begin{figure} \begin{center} \includegraphics[width=8cm]{Fig3.pdf} \end{center} \caption{(a) An image of the wrinkled sheet with a crosssection illuminated by a laser sheet. (b) A surface rendering of the scanned sheet with deflection mapped to the color map. The scanned area corresponds to 80\% of the central section of the sheet. (c) The corresponding simulated profile under the same conditions ($L_o/W_{\mathrm{o}} = 2$; $t_o/W_{\mathrm{o}} = 1 \times 10^{-3}$, $\varepsilon = (L - L_o)/W_{\mathrm{o}} = 0.12$). } \label{fig:eg} \end{figure} Figure~\ref{fig:ima} shows a sequence of images of a planar rectangular latex sheet with $L_o = 28.0$\,cm, width $W_{\mathrm{o}} = 14.0$\,cm, and thickness $t_o = 140 \pm 1\,\mu$m as the applied longitudinal strain is increased. We choose the coordinate system ($x,y$) such that $x$ is long axis (along which tension is applied), and the origin ($0,0$) is the center of the rectangular sheet. Here, the sheet is viewed directly from above while being illuminated with a pair of lights to the side, and thus the regions with greater slope appear darker. One observes that wrinkles form at the central regions of the sheet and grow in amplitude before flattening out. Thus, we establish that wrinkles appear as an instability of a planar deformation, after a finite strain is applied, and then indeed disappear when sufficiently large strain is applied. Hence, our experimental results are qualitatively consistent with recent theoretical and simulation work which find that wrinkles only occur over a finite range of applied strains~\cite{Nayyar2011,Healey2013}. However, one can also observe that wrinkles persist to far greater strains than the range 0.1 to 0.23 reported previously with elastic sheets of similar dimensions with a wide range of models~\cite{Nayyar2011,Healey2013,Li2016}. \begin{figure} \begin{center} \includegraphics[width = 6.5cm]{Fig4.pdf} \end{center} \caption{(a) Plots of the measured amplitude profile of the sheet mid-way between the clamps in the experiments. The profiles are shifted up by a factor proportional the applied strain $\varepsilon$ noted on the vertical axis. (b) The corresponding Mooney-Rivlin model profiles obtained with numerical simulations. The wrinkles appear to grow and decay similarly with increasing strain ($L_o/W_{\mathrm{o}} = 2$; $t_o/W_{\mathrm{o}} = 1 \times 10^{-3}$). } \label{fig:profiles} \end{figure} \subsection{Laser scanned wrinkle profiles} To observe the growth and decay of the wrinkles with strain more quantitatively, we use laser profilometry~\cite{Blair2005}. In this technique, a thin vertical light sheet is used to illuminate the elastic sheet perpendicular to its surface, and the resulting illuminated intersection is imaged from an angle. A sample image is shown in Fig.~\ref{fig:eg}(a). The deflection of the illuminated sheet from a straight line is obtained using standard image processing, and after appropriate calibration, the amplitude of deflection of the sheet is detected to within a few microns, well within the thickness of the sheet. A rendering of the scan of the wrinkled sheet, performed at $0.01L_o$ intervals along the length of the sheet, is shown in Fig.~\ref{fig:eg}(b). The deflection amplitude is mapped to the color bar, which is between $\pm 3.5 \times 10^{-3} W_{\mathrm{o}}$, or about $\pm 2.5t_o$. Here, the central 80\% of the sheet is scanned because the flat areas near the bounded edges are not obtained as accurately due to eclipsing by the clamping armature. We plot the deflection amplitude of the sheet across the width of the sheet midway between the clamped edges in Fig.~\ref{fig:profiles}(a) to further illustrate the development of the wrinkles with quantitative measurements. Here, we have plotted each profile shifted up by a factor proportional to the applied strain $\varepsilon$ as noted on the left axis. As $\varepsilon$ is increased, we observe that the wrinkles increase rapidly in amplitude, before decreasing more slowly to essentially zero at the greatest strains applied, confirming the trends shown in the images in Fig.~\ref{fig:ima}. Thus, we clearly demonstrate that a cleanly prepared planar sheet wrinkles at finite applied strain, and then flatten out as applied strain is increased further. \subsection{Numerical Simulations with Mooney-Rivlin Model} We now discuss the results of the simulations performed with the MR model with parameters matched to capture the stress-strain response discussed in the previous section. Figure~\ref{fig:eg}(c) shows an example of the simulated sheet surface corresponding to the example shown in Fig.~\ref{fig:eg}(b). We observe that wrinkles obtained in the simulations appear similar and are localized in the center of the sheet as in the experiments. To compare the overall development over the range of applied strains with the experiments, we also plot the profiles across the midpoint between the clamps in the simulations in Fig.~\ref{fig:profiles}(b). There it can be noted that the profiles are antisymmetric in both the experiments as well as the simulations. We also observe that the overall development and relaxation of the wrinkles appear to be similar as a function of strain. We next make quantitative comparisons between the wrinkle amplitude and wavelength observed in experiments and simulations. \subsection{Amplitude Growth Comparisons} \begin{figure} \begin{center} \includegraphics[width = 6.5cm]{Fig5.pdf} \end{center} \caption (a) The measured amplitude versus applied strain compared with amplitudes determined using simulations of the MR model ($L_o/W_{\mathrm{o}} = 2$ and $t_o/W_{\mathrm{o}} = 10^{-3}$.) The shaded area corresponds to the experimental error. The experimental data is in agreement with MR simulations. The neo-Hookean model simulations by Nayyar, {\it et al.}~\cite{Nayyar2011} (line) are also shown for reference. (b) Measured wavelengths with $L_o/W_{\mathrm{o}} = 2$ and $t_o/W_{\mathrm{o}} = 10^{-3}$ as a function strain compared with Eq.~\ref{eq:CM-wave} and simulations with the MR model. } \label{fig:strain} \end{figure} We obtain the maximum wrinkle amplitude $A$ in each profile shown in Fig.~\ref{fig:profiles}(a) in case of the experiments, and Fig.~\ref{fig:profiles}(b) in case of the simulations. The measured values of $A$ are normalized by the thickness of the sheet $t_o$ and plotted as a function of applied strain in Fig.~\ref{fig:strain}(a). The errors due to the material variation in the sheet thickness and the calibration of the profiles are shown by the shaded areas. The experiments and our simulations with the MR model are in good overall agreement, not only for the peak amplitude and the strain at which it is reached, but also for the range over which the wrinkle amplitudes decay to zero. This agreement, along with overall trends in the surface profiles shown in Fig.~\ref{fig:eg} and Fig.~\ref{fig:profiles} show that the MR model is an excellent descriptor of the elastic response of latex sheets, and specifically the wrinkle patterns in them. We also compare the observed amplitude against the simulations reported by Nayyar, {\it et al.}~\cite{Nayyar2011} using the neo-Hookean (NH) hyperelastic model for perspective. We observe that while the experimental data is overall consistent with the increase and then decrease observed in these simulations, the measured amplitude extends over a significantly higher strain~$\varepsilon$ besides being systematically greater. Li and Healey~\cite{Li2016} and Fu, {\it et al.}~\cite{Fu2018} have also reported simulation results using the Mooney-Rivlin model with a sheet with similar dimensions where the maximal strain at which wrinkles disappear was around 0.3, notably smaller than the experimentally observed value, and our own simulations. This can occur because the material constants used in those simulations may be different, even if the sheet dimensions used are the same. Thus, it appears that the persistence of wrinkles to higher strains is strongly affected by material nonlinearities~\cite{Fu2018}. Interestingly, the SVK plate model which implements a Hookean thin plate model using a geometric exact stretching energy and FvK-like bending energy is also able to capture qualitatively the disappearance of the wrinkles at large strain~\cite{Healey2013}, but at much lower strains. Thus, nonlinearities stemming from the strain-displacement relation have to be included to quantitatively model the tensional wrinkles in hyperelastic sheets. \subsection{Aspect Ratio dependence} \begin{figure} \begin{center} \includegraphics[width = 6.5cm]{Fig6.pdf} \end{center} \caption{The maximum amplitude versus strain for various $L_o/W_{\mathrm{o}}$ (a) and $W_o/t_o$ (b) when $t_o/W_{\mathrm{o}} = 1 \times 10^{-3}$.} \label{fig:max} \end{figure} According to Li and Healey's analysis of the FvK equations~\cite{Li2016}, the wrinkling instability can occur even below $L_o/W_{\mathrm{o}} = 1.5$ for $t_o/W_{\mathrm{o}} = 10^{-3}$ at sufficiently large $\varepsilon$ as well as for arbitrarily large $L_o/W_{\mathrm{o}}$. However, their analysis of the NH, SVK and MR models find only an ``island" in the parameters space where wrinkling occurs over the range $1.5 \lesssim L_o/W_{\mathrm{o}} \lesssim 2.6$ in case of the NH and MR models, and slightly higher values for SVK model. In order to elucidate this issue, we performed further experiments and simulations with ratios $L_o/W_{\mathrm{o}} = 1.5, 1.8, 2, 2.5, 3.0$, and 3.5, while holding $W_{\mathrm{o}}$ and $t_o$ at constant values. The maximum observed amplitude max($A$) normalized by the sheet thickness is plotted in Fig.~\ref{fig:max}(a). No wrinkles are observed in case of $L_o/W_{\mathrm{o}} = 1.5$ in our experiments and simulations with MR model. Further, we also compare the measured occurrence of wrinkling with sheets with various thickness-to-width ratio ($t_o/W_{\mathrm{o}}$), for $L_o/W_{\mathrm{o}} = 2$. We observe that the wrinkles occur over a similar range of parameters in our experiments and MR simulations, and the wrinkle amplitudes are also consistent within experimental errors. Comparing our results with previous reports, we note that wrinkling is observed in the case of $L_o/W_{\mathrm{o}} = 3$, at which value no wrinkles are predicted according to the analysis of Li and Healey~\cite{Li2016}. In comparing with the NH simulations by Nayyar, {\it et al.}~\cite{Nayyar2011}, a slightly higher cutoff is observed in $L_o/W_{\mathrm{o}}$, below which wrinkles are not observed. But, a similar upper cutoff is observed in $L_o/W_{\mathrm{o}}$ above which wrinkles are not observed. Thus, we find that while the qualitative trends in terms of an increase and decrease of wrinkling amplitude occurs in our experiments and various elastic models used in the simulations reported previously~\cite{Nayyar2011,Li2016,Fu2018}, quantitative differences exist depending on the nature of the hyperelastic model chosen. \section{Far-from-threshold Analysis} \subsection{The Cerda-Mahadevan model} In 2003, Cerda \& Mahadevan (CM) proposed to study the wrinkle pattern in this system, and specifically the apparent reduction of the characteristic wavelength upon increasing the tensile load, by focusing on the system far from the instability threshold of the planar state. The rationale of this proposal was motivated by combining two observations: First, considering the planar state of a stretched Hookean sheet with Poisson ratio $\nu>0$, it is known that imposing tensile strain $\varepsilon$ induces a proportional amount of transverse compressive strain $\nu \varepsilon$. Second, planar sheets buckle when subjected to compressive strain that exceeds a threshold value $\varepsilon_c$, which vanishes with the sheet's thickness or more precisely, $\varepsilon_c(t_o/W_{\mathrm{o}}) \to 0$ as $t_o/W_{\mathrm{o}} \to 0$. Rather than focusing on the near-threshold regime ($\varepsilon \gtrsim \varepsilon_c$), which is the realm of classical pattern formation theory, CM proposed that observed wrinkle patterns in sufficiently thin sheets may be understood by studying a Hookean far-from-threshold regime: \begin{equation} \varepsilon_c \ll \varepsilon \ll 1 \, . \label{eq:FT-regime} \end{equation} In this regime, wrinkles are fully developed and affect the stress field in the sheet non-perturbatively, which means that one can no longer approximate it through the stress of the planar state which is unwrinkled. On the other hand, since for sufficiently thin sheets the threshold value $\varepsilon_c$ becomes arbitrarily small, far-from-threshold conditions may be realized even for $\varepsilon \ll 1$. This observation allows a quantitative study of this wrinkling phenomenon with linear (Hookean) elasticity and thereby FvK equations, for which the only source of nonlinearity is the geometric dependence of in-plane strain on out-of-plane deformations. The original CM model yielded two primary predictions, for the characteristic wavelength of wrinkles $\lambda$, and their amplitude $A$. According to their model, the wavelength is given by: \begin{equation} \text{wavelength (CM):} \ \ \ \lambda = \frac{\sqrt{2 \pi L_o t_o}}{ [3(1 - \nu^2)\varepsilon]^{1/4}}\,. \label{eq:CM-wave} \end{equation} Importantly, this prediction for the wavelength $\lambda$ stems from analysis of periodic solutions to the FvK equations, and does not depend on the actual value of the amplitude $A$ of wrinkles (the only assumption made is that the wrinkled shape is of small slope, namely $A/\lambda \ll 1$). Regarding the amplitude, the model predicts: \begin{equation} \text{amplitude (CM):} \ \ \ A \sim \lambda \sqrt{\nu \varepsilon} \ . \label{eq:CM-amplitude} \end{equation} In order to understand the rationale underlying Eq.~(\ref{eq:CM-amplitude}), let us consider the wrinkle profile away from the clamped edges ({\emph{e.g.}} the center of the sheet) and denote by $W_{\mathrm{act}}$ the {\emph{actual}} arc-length of the sheet in the transverse ($\hat{y}$) direction, and by $W_{\mathrm{proj}}$ the {\emph{projected}} width of the wrinkled sheet onto the plane. Assuming, $W_{\mathrm{act}} - W_{\mathrm{proj}} \ll W_{\mathrm{proj}}$, we have the purely geometric relation: \begin{equation} A \approx C \lambda \Phi \ \ , \ \ \Phi^2 \equiv {\frac{W_{\mathrm{act}}-W_{\mathrm{proj}}}{W_{\mathrm{proj}}}} \ , \label{eq:amp-geo} \end{equation} where $\Phi^2$ is the length (per wrinkle) that is ``wasted" by the undulations of the shape, and $C$ is a numerical constant that depends on the actual wrinkled shape. For instance, if the shape is a sinusoidal undulation $\zeta(y) = A \cos(2\pi y/\lambda)$, one obtains $C = 1/\pi$. The assumption underlying Eq.~(\ref{eq:CM-amplitude}) is that in the far-from-threshold regime: {\emph{(a)}} the compressive (transverse) strain vanishes, hence $W_{\mathrm{act}} = W_{\mathrm{o}}$, where $W_{\mathrm{o}}$ is the original width of the sheet in the undeformed state, and {\emph{(b)}} the planar projection of the stretched sheet continues to contract in width, even after the formation of wrinkles, according to the Hookean Poisson relation: $W_{\mathrm{proj}} \approx W_{\mathrm{o}} (1-\nu\varepsilon)$. \subsection{The wavelength} We tested the proposed scaling for the wavelength against our experimental data. The wavelength of the observed wrinkles was obtained by measuring the distance between neighboring central peaks in Fig.~\ref{fig:profiles}(a). In Fig.~\ref{fig:strain}(b), the wavelength $\lambda/W_{\mathrm{o}}$ normalized by the initial width of the sheet corresponding to the experiments and the MR model simulations are plotted as a function of applied tensile strain $\varepsilon$. The data from our experiments and simulations are observed to collapse reasonably well with no fit parameters. Further, the overall decreasing trend with strain can be described by Eq.~\ref{eq:CM-wave} after multiplying by a factor 0.8 to the data and using $\nu = 0.5$ corresponding to a perfectly incompressible material. In examining the trends, it should be noted that the proposed scaling for the wavelength was derived assuming $\varepsilon \gg \varepsilon_c$. Consequently, discrepancy should be expected near threshold, and is indeed observed. Thus, we conclude that for the range of parameters addressed by our experiments and simulations the overall decrease in wavelength is captured reasonably well by the CM model. This conclusion is also similar to that reached by Nayyar, \textit{et al.}~\cite{Nayyar2011} based on simulations with NH model. Although the data in Fig.~\ref{fig:strain}(b) provides support to the prediction~Eq.\,(\ref{eq:CM-wave}), even for values of the applied strain that are beyond the asymptotic range~Eq.\,(\ref{eq:FT-regime}) assumed by the CM model, we note that in Fig.~\ref{fig:strain}(b) the normalized wavelength $\lambda_o/W_{\mathrm{o}}$ is in the interval $(0.9,0.17)$, and it is not obvious that this data is sufficient to confirm the validity of the scaling law~Eq.(\ref{eq:CM-wave}), ({\emph{i.e.}} in the relevant asymptotic limit $\varepsilon \ll 1$. More generally, Eq.~(\ref{eq:CM-wave}) is a particular example of a broader scaling law, $\lambda \sim (B/K_{\rm eff})^{1/4}$, which was proposed already in Ref.~\cite{Cerda2003} and expanded in Ref.~\cite{Paulsen2016}, whereby the wrinkle wavelength derives from a balance between the bending modulus $B$ of the solid sheet and an effective stiffness $K_{\rm eff}$. The effective stiffness may originate from a real substrate attached to the sheet ({\emph{e.g.}} a liquid bath or a compliant solid foundation), a global curvature that may be imposed on the sheet, or a tension $T$ exerted along wrinkles. In the latter case, the effective stiffness is $T/\ell^2$, where $\ell$ is a characteristic scale in the non-oscillatory direction over which the wrinkle amplitude varies. In our case, there is no actual substrate nor global curvature (since the wrinkled sheet remains close to the original plane), and Eq.~(\ref{eq:CM-wave}) follows immediately if one assumes that the characteristic longitudinal scale $\ell \sim L_o$. We note that the data plotted in Fig.~\ref{fig:strain}(b) may be actually consistent with $\ell \sim L_o^{\alpha} W_{\mathrm{o}}^{1-\alpha}$, with $\alpha \neq 0$. In order to test the dependence of the longitudinal scale $\ell$ on the aspect ratio $L_o/W_{\mathrm{o}}$ one would have to perform experiments and/or simulations on a broad range of $L_o/W_{\mathrm{o}}$, which is beyond the scope of the current work. \begin{figure*} \begin{center} \includegraphics[width=13cm]{Fig7.pdf} \end{center} \caption{(a) The actual width $W_{\mathrm{act}}$ (at the center of the sheet, $x=0$), extracted from simulations, plotted as a function of the applied tensile load, $\varepsilon$ ($L_o/W_{\mathrm{o}} = 2$). It can be observed that $W_{\mathrm{act}}$ decreases consistent with $W_{\mathrm{act}} = W_{\mathrm{o}} (1-\nu \varepsilon)$, indicating that the collapse of compressive stress (rather than compressive strain) characterizes both the planar state (Poisson effect) as well as the fully developed, far-from-threshold, wrinkled state of the sheet. Nonlinear elastic effects -- similar in nature to those observed in the stress-strain response shown in Fig.~\ref{fig:props} -- lead to deviations at $\varepsilon > 0$. (b) The average difference $\Phi^2$ between the actual arc-length $W_{\mathrm{act}}$ and its planar projection $W_{\mathrm{proj}}$ (plotted at the center of the sheet, $x=0$) increases and then decreases as the wrinkles exhibits a non-monotonic dependence on the applied tensile load $\varepsilon$, as wrinkles appear and then disappear with increasing $\varepsilon$. (c) The normalized amplitude $A/t_o$ {\emph{versus}} $\Phi \lambda/t_o$ for $L/W =2$ plotted over the whole range of the applied tensile load $\varepsilon$, when the measured strain is greater than experimental errors. The arrows indicate the trajectory of the points as $\varepsilon$ is increased. (d) Amplitude for large strain $\varepsilon > 0$ and various $L_o/W_{\mathrm{o}}$ for $\varepsilon > 0.15$.} \label{fig:wrinkle} \end{figure*} \subsection{The amplitude} In contrast to the prediction of the CM model for the wavelength, Eq.~(\ref{eq:CM-wave}), whose consistency with experimental data and simulations has been noted already \cite{Nayyar2011}, the model prediction for the wrinkle amplitude, Eq.~(\ref{eq:CM-amplitude}), appears to be inconsistent with observations. Notably, Eqs.~(\ref{eq:CM-wave},\ref{eq:CM-amplitude}) predict that for a given sheet ({\emph{i.e.}} fixed values of $t_o,W_{\mathrm{o}},L_o$) the amplitude scales as $\sim \varepsilon^{1/4}$ upon increasing the tensile load. However, experiments and simulations exhibit the opposite trend, whereby the amplitude starts to decrease already at rather small values of $\varepsilon$. Furthermore, the very reasoning underlying the transition from the geometric relation, Eq.~(\ref{eq:amp-geo}), to Eq.~(\ref{eq:CM-amplitude}), is unclear. While the planar state exhibits transverse compressive stress ($\sigma_{yy} <0$) at some zones close to the clamped edges, a compressive transverse strain $\varepsilon_{yy} \approx -\nu \varepsilon$ is necessary to eliminate any compressive stress in the bulk, and thereby the elastic energy that would stem from such a nonzero stress component. In fact, this is the precise logic underlying ``Poisson effect." An ``inextensibility" condition assumed in the CM model to characterize the far-from-threshold behavior ($\varepsilon_{yy}=0 \Rightarrow W_{\mathrm{act}}=W_{\mathrm{o}}$) would therefore give rise to finite transverse compression in the bulk of the sheet ($\sigma_{yy} \approx -\nu Y \varepsilon$), which would entail an elastic energy that is even higher than the energy of the planar state. The experimental and numerical observations, along with the conceptual difficulty in Eq.~(\ref{eq:CM-amplitude}), led workers in this field \cite{Nayyar2011,Healey2013} to attribute the wrinkling instability in this system to effects of non-Hookean elasticity. A deeper perspective on the wrinkle amplitude requires us to address first the basic principles of the mechanics in the far-from-threshold regime Eq.\,(\ref{eq:FT-regime}). While the nontrivial effect of clamping the short edges is crucial for understanding the origin of compression and wrinkling in our problem, there exist other set-ups that exhibit a similar type of tension-induced wrinkling, but are amenable to analytic solution due to their inherent axial symmetry. A notable example is the Lam\'e set-up of an annular sheet that exhibits radial wrinkles when subjected to distinct tensile loads at its inner and outer radii~\cite{Davidovitch2011}. Studies of the far-from-threshold mechanics in this and other systems \cite{Chopin2015,Vella2018b,Davidovitch2019} revealed three important principles: {\emph{(a)}} It is the transverse stress ({\emph{i.e.}} stress component in the direction of wrinkly undulations) rather than strain, whose ``collapse" is enabled by the formation of wrinkles. {\emph{(b)}} The collapse of compressive stress requires a specific displacement of material lines, which is obtained by solving the corresponding tension field theory equations~\cite{Stein1961,Pipkin1986,Steigman1990}. In problems of axial symmetry~\cite{Davidovitch2011,Vella2018b,Davidovitch2019}, this implies a certain dependence of the radial displacement ($u_r(r)$) on the exerted tensile load imposed on the sheet ({\emph{e.g.}} Eqs.~13,17 in Ref.~\cite{Davidovitch2011}). {\emph{(c)}} Conditions {\emph{(a,b)}} underlie a ``slaving condition", which connects the amplitude-wavelength ratio to the excess length that must be ``wasted" by the wrinkling undulations, to enable the desired collapse of the compressive stress. In axisymmetric set-ups, this excess length was called a ``confinement function," $\Phi^2(r) = u_r(r)/r$ ({\emph{e.g.}} Eqs.~14,15 in Ref.~\cite{Davidovitch2011} and Eq.~2 in~\cite{Paulsen2016}). Although the complexity of our problem does not allow for analytic solution of tension field theory, we recognize Eq.~(\ref{eq:amp-geo}) as the amplitude-wavelength slaving condition, whose satisfaction guarantees the collapse of compressive stress in the wrinkled zone -- item {\emph{(c)}} in the above list. The collapse of compressive stress, corresponding to item {\emph{(a)}} in the above list, implies that the actual arc-length, $W_{\mathrm{act}}$, retains its value in the analogous planar state ($W_{\mathrm{act}} = (1-\nu \varepsilon)$, which is needed to eliminate transverse compression in the presence of tensile strain $\varepsilon$. Finally, a ``confinement function", $\Phi^2(x) = (W_{\mathrm{act}} - W_{\mathrm{proj}})/W_{\mathrm{proj}} $, which is the analog of $\Phi^2(r) = u_r/r$ for problems of axial symmetry (and whose $x$-dependence is omitted in Eq.~(\ref{eq:amp-geo}) for simplicity), derives from a suitable solution of the equations of tension field theory -- item {\emph{(b)}} in the above list. The differences between this implementation of far-from-threshold theory and the assumptions made in the original CM model \cite{Cerda2003} are summarized in Table 1. \begin{table}[ht] \begin{center} \label{tab:table1} \begin{tabular}{|c|c|c|} \hline \hline \textbf{} & \textbf{Current version} & \textbf{Original CM model}\\ \hline $W_{\mathrm{act}}$ & $W_{\mathrm{o}} (1-\nu \varepsilon)$ & $W_{\mathrm{o}}$ \\ \hline $W_{\mathrm{proj}}$ & tension field theory & $W_{\mathrm{o}} (1-\nu \varepsilon)$ \\ \hline \end{tabular} \end{center} \caption{Implementation of the ``slaving condition," Eq.~(\ref{eq:amp-geo}).} \end{table} In order to test our proposed revision of the CM model, namely Eq.~(\ref{eq:amp-geo}) with $W_{\mathrm{act}},W_{\mathrm{proj}}$ in Table I, we first extract from our simulations the actual width $W_{\mathrm{act}}$ of the wrinkled sheet at increasing values of the applied tensile load $\varepsilon$. The plot, Fig.~\ref{fig:wrinkle}(a), for $L_o/W_{\mathrm{o}} = 2$, shows that the decrease of $W_{\mathrm{act}}$ is given by $W_{\mathrm{act}} = W_{\mathrm{o}} (1-\nu \varepsilon)$ as wrinkles develop for $\varepsilon <0.1$. At greater $\varepsilon$, nonlinear effects become important leading to deviations from the linear decrease, complementary to the nonlinear stress-strain response in Fig.~\ref{fig:props}. This decrease implies the absence of transverse compressive stress ($\sigma_{yy} = 0$) and the consequent presence of transverse compressive strain, even beyond the Hookean regime of small strains. Next, we plot in Fig.~\ref{fig:wrinkle}(b) the evolution of $\Phi^2$ as a function of the applied tensile load $\varepsilon$ measured across the central width of the sheet, i.e. $x=0$. Below the threshold $\varepsilon_c$ for wrinkling instability, the projected and actual width are trivially equal, such that $\Phi^2 = 0$. For $\varepsilon > \varepsilon_c$, we observe that $\Phi^2$ increases and then decreases, eventually becoming zero beyond a finite value of $\varepsilon$ (above which wrinkles vanish and the planar state become stable again). The important lesson to draw from this figure is that the actual behavior of $\Phi^2$, which derives from a solution of tension field theory, is dramatically different, being an order of magnitude smaller, from the one assumed by the original CM model ($\Phi^2 \approx \nu \varepsilon$) \cite{Cerda2003}. Specifically, the confinement $\Phi^2$ exhibits a non-monotonic dependence on $\varepsilon$ even for rather small values of $\varepsilon$, at which the mechanics is still well approximated by Hookean mechanics (see Fig.~\ref{fig:strain}.) In Fig.~\ref{fig:wrinkle}(c), we plot the measured amplitude $A$ {\emph{versus}} the measured values of $\lambda \Phi$, for $L_o/W_{\mathrm{o}} =2$. It should be noted that $A/t_o$ increases first as $\varepsilon$ is increased, and then decreases after reaching a maximum value with the large strain data appears in the bottom left corner, close to the origin as indicated by the arrows. We find that the experimental data and the MR model simulations match well, and both agree with the geometric relation, Eq.~(\ref{eq:amp-geo}) with a single numerical constant $C =1$, even at large strains. In Fig.~\ref{fig:wrinkle}(d), we show the same analysis with three different aspect ratios in the experiments (markers) and corresponding MR model simulations (dashed curves) that span the range over which wrinkles are observed. The collapse of the data is remarkable considering the relatively small amplitudes of the wrinkles which are here of order of the thickness of the sheet. The somewhat systematic shift of the experimental data points to the right relative to the numerical curves can be attributed to the fact that there is higher cumulative error which occurs in obtaining $\Phi$ from the experimental data compared with $A$. The theoretical prediction of Eq.~(\ref{eq:amp-geo}) with best-fit fixed value of the constant $C =1$ corresponding to the highest applied strains shown by the solid line. The systematic deviations observed between the data points and solid line indicates that the wrinkle profile slightly varies upon increasing the applied tensile load, affecting a weak $\varepsilon$-dependence (namely $C \rightarrow C(\varepsilon)$) in Eq.~(\ref{eq:amp-geo}). \section{Conclusions} We have demonstrated with experiments that a sufficiently thin elastic sheet wrinkles when stretched over a finite range of strains. We provided clear evidence that the wrinkle amplitude first grows upon increasing applied strain, but then decreases as the strain is continued to be increased. By using simulations of the MR model, we showed that all the trends observed in the experiments are observed with this model within experimental error, once the material parameters are appropriately calibrated. The wrinkles are observed at higher strains in comparison with SVK and NH models. While non-Hookean mechanics is needed to explain certain aspects of the wrinkle pattern, most notably the persistence of wrinkles to applied strain $\varepsilon \approx 0.4$, the basic aspects of the phenomenon are describable by far-from-threshold analysis, which employs the asymptotic vanishing of the instability threshold with the sheet's thickness ($\varepsilon_c \to 0$), and addresses the asymptotic regime Eq.\,(\ref{eq:FT-regime}) through Hookean elasticity. This approach was pioneered by the original CM model \cite{Cerda2003}, which yields a powerful prediction for the wavelength $\lambda$, but the ``inextensibility" assumption ({\emph{i.e.}} vanishing transverse compressive strain, $\varepsilon_{yy} =0$) that underlies the model prediction of wrinkle amplitude that increases with tensile load is revoked by an opposite trend observed in experiments and simulations. We showed that this assumption must be replaced by the collapse of transverse compressive stress ($\sigma_{yy} =0 \Rightarrow \varepsilon_{yy} =-\nu\varepsilon$), such that the amplitude-to-wavelength ratio is determined by a ``confinement function", $\Phi^2(x)$, whose dependence on the applied tensile load $\varepsilon$ is determined by a corresponding solution of tension field theory. In set-ups of high degree of symmetry, analytic solutions of tension field theory have been found and were shown to provide a basis for a far-from-threshold analysis of wrinkle patterns \cite{Davidovitch2011,Chopin2015,Vella2018b,Davidovitch2019}. In the current set-up, despite the deceptive simplicity of the wrinkle pattern, the boundary conditions implied by combining clamping (at the short edges) and free boundaries (the long edges), require one to obtain a numerical solution of the tension field theory; our experiments and simulations show that such a solution results in a nontrivial confinement function $\Phi^2(x)$, whose evaluation at $x=0$ is shown in Fig.~\ref{fig:wrinkle}(b). We hope that our findings will motivate a systematic effort to develop far-from-threshold analysis in non-symmetric set-ups and beyond the Hookean asymptotic regime given by Eq.\,(\ref{eq:FT-regime}). \vspace{2cm} \begin{acknowledgments} We thank Jose Bico for illuminating conversations. This work was supported by the National Science Foundation under grants DMR 1508186 (A.P. and A.K.) and DMR 1822439 (M.X. and B.D.). Simulations were performed by using the UMass cluster at the Massachusetts Green High Performance Computing Center. \end{acknowledgments}
\section{Introduction} Hidden symmetries of dynamics play a crucial role for the study of diverse physical systems that can be relativistic or not, with or without gravity, classical or quantum \cite{Cariglia:2014ysa}. Particularly useful for black hole physics is the hidden symmetry of the {\em principal Killing--Yano tensor} \cite{Frolov:2017kze}. Such a tensor not only generates other explicit and hidden symmetries, it also determines the algebraic type of the solution, and allows for a separation of variables when studying physical field equations in black hole spacetimes. The Golden Era of field equation separability in Kerr geometry spanned the late '60s and '70s. During this period, separable solutions were found for particles following geodesic motion, test scalar and spinor fields, as well as massless vector (spin 1) and tensor (spin 2) fields \cite{Carter:1968cmp, Carter:1968rr, Unruh:1973, Chandrasekhar:1976, Teukolsky:1972, Teukolsky:1973}. Much later, after the generalization of Kerr geometry to higher dimensions by Myers and Perry \cite{MyersPerry:1986}, a flurry of papers extended the results for geodesic motion \cite{Page:2006ka}, and test scalar \cite{Frolov:2007cb} and spinor \cite{OotaYasui:2008} fields to arbitrary dimensions---all thanks to the principal tensor. However, the appropriate separation scheme for vector and tensor in dimensions $D>4$ remained elusive. A breakthrough on this front came in 2017 when Lunin demonstrated the separability of Maxwell's equations in Myers--Perry-(A)dS geometry \cite{Gibbons:2004uw}. Lunin's approach was novel in that it provided a separable ansatz for the vector potential rather than the field strength, a method that had previously seen success in $D=4$ dimensions \cite{Teukolsky:1972, Teukolsky:1973}. In 2018, Frolov, Krtous, and Kubiznak showed that Lunin's ansatz can be written in a covariant form, in terms of the principal tensor \cite{Frolov:2018pys, Krtous:2018bvk}, allowing them to extend Lunin's result to general (possibly off-shell) Kerr--NUT--AdS spacetimes \cite{Chen:2006xh}. The separation of massive vector (\emph{Proca}) field perturbations in these spacetimes (an achievement previously absent even for the four-dimensional Kerr geometry) followed shortly after that \cite{Frolov:2018ezx}, see also \cite{Dolan:2018dqv, Frolov:2018eza,Dolan:2019hcw}. The separability of the vector field hinges on the existence of the principal tensor. Such a tensor: i) determines the canonical (preferred) coordinates in which the separation occurs, ii) generates the towers of explicit and hidden symmetries linked to the `symmetry operators' of the separated vector equation, and iii) explicitly enters the separation ansatz for the vector potential $\tens{P}$. Namely, this ansatz can be written in the following covariant form: \be\label{LFKK} P^a=B^{ab}\nabla_b Z\,, \ee where the tensor $\tens{B}$ is determined by the principal tensor $\tens{h}$ and the metric $\tens{g}$ according to \be\label{Btens} B^{ab}(g_{bc}+i\mu h_{bc})=\delta^a_c\,, \ee with $\mu$ a `separation constant'. The solution for the scalar functions $Z$ is then sought in a standard multiplicative separable form. In what follows, we shall refer to the ansatz \eqref{LFKK} with $\tens{B}$ given by \eqref{Btens} as the {\em Lunin--Frolov--Krtous--Kubiznak (LFKK) ansatz}. Remarkably, the LFKK ansatz works equally well for both massless and massive vector perturbations. It is also valid in \emph{any} dimension, even or odd, as discussed in Appendix \ref{appendix}. However striking the above results are, they have one serious drawback: the existence of the principal tensor is largely limited to vacuum black hole spacetimes. In fact, the conditions for its existence are so strong that they uniquely determine a (rather restricted though physically interesting) class of admissible spacetimes---the off shell Kerr--NUT--AdS metrics \cite{Krtous:2008tb}. For this reason various generalizations of the notion of hidden symmetries, that would allow for more general spacetimes while preserving integrability features of the symmetry, were sought. One such generalization, that of the Killing--Yano tensor with torsion \cite{yano1953curvature, Rietdijk:1995ye, Kubiznak:2009qi}, turns out to be quite fruitful. Such a symmetry exists in a number of supergravity and string theory spacetimes, where the torsion can be naturally identified with a defining 3-form of the theory. Although less restrictive, the principal tensor with torsion still implies the essential integrability features of its torsion-less cousin and underlies separability of Hamilton--Jacobi, Klein--Gordon, and torsion-modified Dirac equations on the black hole background. With this in mind a natural question arises: is the vector field separability described above limited to the vacuum spacetimes? It is the purpose of the present paper to show that it is not so. To this end, we concentrate on a prototype non-vacuum black hole spacetime known to admit the principal tensor with torsion \cite{Kubiznak:2009qi}, the Chong--Cveti\v{c}--L\"u--Pope black hole \cite{Chong:2005hr} of $D=5$ minimal gauged supergravity. We show that the LFKK ansatz can be used for separability of the (properly torsion modified) vector equation in this background. Our result shows that, despite the presence of torsion considerably weakening the structure, the principal tensor with torsion remains a powerful tool for separability. At the same time it means that the applicability of the LFKK ansatz goes far beyond the original setup in which it was first considered. Our paper is organized as follows. In Sec. \ref{KYTT}, we review the torsion generalization of Killing--Yano tensors and introduce the principal tensor with torsion. Sec.~\ref{BH} is devoted to the Chong--Cveti\v{c}--L\"u--Pope black hole of the $D=5$ minimal gauged supergravity and its basic characteristics. The novel contribution of the paper comes in Sec.~\ref{Sep} where the torsion modified massive vector (Troca) equation is introduced and shown to separate using the LFKK separability ansatz. We conclude in Sec.~\ref{summary}. Appendix~\ref{appendix} gathers the results on separability of the vector equations in the off-shell Kerr--NUT--AdS spacetimes---the results in odd dimensions are presented for the first time and allow us to compare the five-dimensional vacuum result to the supergravity case studied in the main text. \section{Killing--Yano tensors with torsion}\label{KYTT} Let us start by briefly recapitulating a `torsion generalization' of Killing--Yano tensors which has applications for a variety of supergravity black hole solutions. In what follows we assume that the torsion is completely antisymmetric and described by a 3-form $\tens{T}$, with the standard torsion tensor given by $T^{d}_{ab}=T_{abc}g^{cd}$, where $\tens{g}$ is the metric. The torsion connection $\tens{\nabla}^T$ acting on a vector field $\ts{X}$ is defined as \be\label{j1-m} \nabla^T_{\!a} X^b = \nabla_{\!a} X^b + \frac{1}{2}\,T_{ac}^b X^c\,, \ee where $\tens{\nabla}$ is the Levi-Civita (torsion-free) connection. The connection ${\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T$ satisfies the metricity condition, ${\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \tens{g}=0$, and has the same geodesics as ${\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T$. It induces a connection acting on forms. Namely, let $\tens{\omega}$ be a $p$-form, then \be\label{j5-m} {\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T_{\!\ts{X}} \tens{\omega}={\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T_{\!\ts{X}} \tens{\omega} -\frac{1}{2} \bigl(\ts{X}\cdot\tens{T}\bigr)\underset{1}{\wedge} \tens{\omega}\,, \ee where we have used a notation of contracted wedge product introduced in \cite{Houri:2010qc}, defined for a $p$-form $\tens{\alpha}$ and $q$-form $\tens{\beta}$ as \begin{eqnarray}\label{ContrProd} (\alpha\underset{m}{\wedge}\beta)_{a_1\dots a_{p{-}m}b_1\dots b_{q{-}m}}&&\nonumber\\ =\frac{(p+q-2m)!}{(p\!-\!m)!(q\!-\!m)!}&&\! \alpha_{c_1\dots c_m[a_1\dots a_{p{-}m}}\beta^{c_1\dots c_m}{}_{b_1\dots b_{q{-}m}]}.\quad\ \end{eqnarray} Equipped with this, one can define the following two operations: \begin{align} \tens{d}^T \tens{\omega}&\equiv {\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \wedge \tens{\omega}=\tens{d\omega}-\tens{T}\underset{1}{\wedge}\tens{\omega}\,, \label{j6-m}\\ {\tens{\delta}}} % coderivativ %:ex: \coder \ts{f^T \tens{\omega}&\equiv-{\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T\cdot\tens{\omega}={\tens{\delta}}} % coderivativ %:ex: \coder \ts{f\tens{\omega}-\frac{1}{2}\,\tens{T}\underset{2}{\wedge} \tens{\omega}\,.\label{j7-m} \end{align} Note that in particular we have ${\tens{\delta}}} % coderivativ %:ex: \coder \ts{f^T \tens{T}={\tens{\delta}}} % coderivativ %:ex: \coder \ts{f \tens{T}$. A {\em conformal Killing--Yano tensor with torsion} $\tens{k}$ is a $p$-form which for any vector field $\tens{X}$ satisfies the following equation \cite{yano1953curvature, Rietdijk:1995ye, Kubiznak:2009qi}: \be\label{generalizedCKY} \nabla^T_X \tens{k}-\frac{1}{p+1}\tens{X}\cdot \tens{d}^T \tens{k}+\frac{1}{D-p+1} \tens{X} \wedge \tens{\delta}^T \tens{k}=0\,, \ee where $D$ stands for the total number of spacetime dimensions. In analogy with the Killing--Yano tensors defined with respect to the Levi-Civita connection, a conformal Killing--Yano tensor with torsion $\tens{f}$ obeying $\tens{\delta}^T \tens{f}=0$ is called a {\em Killing--Yano tensor with torsion}, and a conformal Killing--Yano tensor with torsion $\tens{h}$ obeying $\tens{d}^T \tens{h}=0$ is a {\em closed conformal Killing--Yano tensor with torsion}. Despite the presence of torsion, the conformal Killing--Yano tensors with torsion possess many remarkable properties. The following three are especially important for `generating other symmetries' and separability of test field equations (see \cite{Kubiznak:2009qi,Houri:2010fr} for the proof and other properties): \begin{enumerate} \item The Hodge star $\tens{*}$ maps conformal Killing--Yano with torsion $p$-forms to conformal Killing--Yano with torsion $(D-p)$-forms. In particular, the Hodge star of a closed conformal Killing--Yano with torsion $p$-form is a Killing--Yano with torsion $(D-p)$-form and vice versa. \item Closed conformal Killing--Yano tensors with torsion form a (graded) algebra with respect to a wedge product. Namely, let $\tens{h}_1$ and $\tens{h}_2$ be a closed conformal Killing--Yano tensor with torsion $p$-form and $q$-form, respectively, then $\tens{h}_3=\tens{h}_1 \wedge \tens{h}_2$ is a closed conformal Killing--Yano with torsion $(p+q)$-form. \item Let $\tens{h}$ and $\tens{k}$ be two (conformal) Killing--Yano tensors with torsion of rank $p$. Then \be K_{ab}=h_{(a |c_1\ldots c_{p-1}|}k_{b)}{}^{c_1\ldots c_{p-1}} \ee is a (conformal) Killing tensor of rank 2. \end{enumerate} In what follows, we shall concentrate on a {\em principal tensor} with torsion, $\tens{h}$, which is a non-degenerate closed conformal Killing--Yano with torsion 2-form. It obeys \be\label{principal} \nabla^T_X \tens{h}=\tens{X} \wedge \tens{\xi}\,,\quad \tens{\xi}=-\frac{1}{D-p+1} {\delta}^T \tens{h}\,. \ee The condition of non-degeneracy means that $\tens{h}$ has the maximal possible (matrix) rank and possesses the maximal number of functionally independent eigenvalues. Starting from one such tensor, one can generate (via the three properties above) the towers of Killing tensors, and (closed conformal) Killing--Yano tensors with torsion. In their turn, such symmetries can typically be associated with symmetry operators for a given field operator. For example, Killing tensors give rise to operators commuting with the scalar wave operator, and (closed conformal) Killing--Yano tensors with torsion to operators commuting with the torsion Dirac operator. When a full set of mutually commuting operators can be found, one can typically separate the corresponding field equation. It is in this respect the principal tensor underlies separability of various field equations. The existence of the principal tensor imposes severe restrictions on the spacetime. In the torsion-less case, such restrictions uniquely determine the Kerr--NUT--AdS class of black hole spacetimes \cite{Krtous:2008tb} (see also \cite{Frolov:2017whj}). Although no full classification is available for spacetimes with torsion, nor is it clear if such spacetimes have to admit any isometries \cite{Houri:2012eq}, several explicit examples of supergravity solutions with a principal tensor where the torsion is naturally identified with a 3-form field strength of the theory are known. Among them, perhaps the most `beautiful' are the $D$-dimensional Kerr--Sen spacetimes \cite{Houri:2010fr} and black holes of $D=5$ minimal gauged supergravity \cite{Kubiznak:2009qi}. In this paper we concentrate on the latter, very `clean' solution without scalar fields, known as the Chong--Cveti{\v c}--L{\" u}--Pope black hole \cite{Chong:2005hr}. It is known that for such a solution the principal tensor guarantees integrability of the geodesic motion \cite{Davis:2005ys}, as well as separability of scalar \cite{Davis:2005ys} and modified Dirac \cite{Davis:2005ys, Wu:2009cn, Wu:2009ug} equations. Our aim is to show that it also guarantees the separability of properly torsion modified (massive) vector field equations. \section{Black hole of minimal gauged supergravity}\label{BH} The bosonic sector of $D=5$ minimal gauged supergravity is governed by the Lagrangian \be\label{L} \pounds=\tens{*}(R+\Lambda)-\frac{1}{2}\tens{F}\wedge \tens{*F}\!+ \frac{1}{3\sqrt{3}}\,\tens{F} \wedge \tens{F}\wedge \tens{A}\,, \ee where $\Lambda$ is the cosmological constant. This yields the following set of Maxwell and Einstein equations: \begin{eqnarray} \tens{dF}=0\,,\quad \tens{d* F}-\frac{1}{\sqrt{3}}\,\tens{F}\wedge\tens{F}\!&=&\!0\,,\quad \label{F}\label{Maxwell}\\ R_{ab}-\frac{1}{2}\Bigl(F_{ac}F_b^{\ c}-\frac{1}{6}\,g_{ab}F^2\Bigr)+\frac{1}{3}\Lambda g_{ab}\!&=&\!0\,. \label{Einstein} \end{eqnarray} In this case the torsion can be identified with the Maxwell field strength according to \cite{Kubiznak:2009qi} \be\label{TF} \tens{T}=-\frac{1}{\sqrt{3}}\, \tens{*F}\,. \ee Having done so, the Maxwell equations can be written as \be \tens{\delta}^T\tens{T}=0\,, \quad \tens{d}^T\tens{T}=0\,. \ee In other words, the torsion $\tens{T}$ is `$T$-harmonic'. Here, the first equality follows from the fact that ${\tens{\delta}}} % coderivativ %:ex: \coder \ts{f^T \tens{T}={\tens{\delta}}} % coderivativ %:ex: \coder \ts{f \tens{T}$, while the second is related to the special property in five dimensions (with Lorentzian signature), \be \tens{d}^T \tens{\omega}=\tens{d\omega}+(\tens{*T})\wedge (\tens{*\omega})\,, \ee valid for any 3-form $\tens{\omega}$. The principal tensor equation \eqref{principal} can now explicitly be written as \begin{eqnarray}\label{PCKY2} \nabla_c h_{ab}&=&2g_{c[a}\xi_{b]}+\frac{1}{\sqrt{3}}\,(*F)_{cd[a}h^d_{\ \,b]}\,,\nonumber\\ \xi^a&=&\frac{1}{4} \nabla_b h^{ba}-\frac{1}{2\sqrt{3}}(*F)^{abc} h_{bc}\,. \end{eqnarray} A general doubly spinning charged black hole solution in this theory has been constructed by Chong, Cveti\v{c}, L\"u, and Pope \cite{Chong:2005hr}. It can be written in a symmetric Wick-rotated form, c.f. \cite{Kubiznak:2009qi}: \begin{eqnarray} \tens{g}\!&=&\!\sum_{\mu=1,2}\bigl(\tens{\omega}^{\mu}\tens{\omega}^{\mu}+ \tens{\tilde \omega}^{\mu}\tens{\tilde\omega}^{\mu}\bigr) +\tens{\omega}^{0}\tens{\omega}^{0}\,,\label{can_odd}\\ \tens{A}\!&=&\!\sqrt{3}c(\tens{A}_1+\tens{A}_2)\,,\label{A} \end{eqnarray} where \begin{eqnarray}\label{omega} \tens{\omega}^{1} \!&=&\sqrt{\frac{U_1}{X_1}}\,\tens{d}x_1\,,\quad \tens{\tilde \omega}^{1}=\sqrt{\frac{X_1}{U_1}}(\tens{d}\psi_0+x_2^2\tens{d}\psi_1)\,,\nonumber\\ \tens{\omega}^{2} \!&=&\!\sqrt{\frac{U_2}{X_2}}\,\tens{d}x_2\,,\quad \tens{\tilde \omega}^{2}=\sqrt{\frac{X_2}{U_2}}(\tens{d}\psi_0+x_1^2\tens{d}\psi_1)\,,\nonumber\\ \tens{\omega}^{0}\!&=&\!\frac{ic}{x_1x_2}\!\Bigl[\tens{d}\psi_0\!+\!(x_1^2\!+\!x_2^2)\tens{d}\psi_1\!+\!x_1^2x_2^2\tens{d}\psi_2\! -\!x_2^2\tens{A}_1\!-\!x_1^2\tens{A}_2\Bigr]\,,\nonumber\\ \tens{A}_1\!&=&\!-\frac{e_1}{U_1}(\tens{d}\psi_0+x_2^2\tens{d}\psi_2)\,,\quad \tens{A}_2=-\frac{e_2}{U_2}(\tens{d}\psi_0+x_1^2\tens{d}\psi_1)\,,\nonumber\\ U_1&=&x_2^2-x_1^2=-U_2\,. \end{eqnarray} The solution is stationary and axisymmetric, corresponding to three Killing vectors ${\tens{\partial}}_{\psi_0}, {\tens{\partial}}_{\psi_1}, {\tens{\partial}}_{\psi_2}$, and possesses two non-trivial coordinates $x_1$ and $x_2$. Here we choose $x_2>x_1>0$ and note that the metric written in this form has $\det {g}<0$. We have also used a `symmetric gauge' for the $U(1)$ potential; the electric charge of the Maxwell field $\ts{F}=\ts{dA}$ depends on a difference $(e_1-e_2)$. In order to satisfy the Einstein--Maxwell equations, the metric functions take the following form: \begin{eqnarray} X_1&=&A+Cx_1^2-\frac{\Lambda}{12}x_1^4+\frac{c^2(1+e_1)^2}{x_1^2}\,,\nonumber\\ X_2&=&B+Cx_2^2-\frac{\Lambda}{12}x_2^4+\frac{c^2(1+e_2)^2}{x_2^2}\,\label{XY}, \end{eqnarray} where of the four free parameters $A,B,C, c$ only three are physical (one can be scaled away) and are related to the mass and two rotations. As per usual, the separability property shown below does not need the special form \eqref{XY} and occurs ``off-shell'', for arbitrary functions \be X_1=X_1(x_1)\,,\quad X_2=X_2(x_2)\,. \ee As shown in \cite{Kubiznak:2009qi}, the spacetime admits a principal tensor with torsion, which takes the form \be \ts{h}=\sum_{\mu=1,2} x_\mu \tens{\omega}^{\mu}\wedge \tens{\tilde \omega}^{\mu}\,. \ee Interestingly, the torsion \eqref{TF} in Chong--Cveti{\v c}--L{\"u}--Pope spacetimes is very special as it satisfies the following conditions: \be (*F)_{d[ab}h^d_{\ \,c]}=0\,,\quad (*F)_{abc} h^{bc}=0\,. \ee This implies that the tensor is not only $\tens{d}^T$-closed (as it must be), but it is also $\tens{d}$-closed and obeys: \be \tens{d}^T\tens{h}=\tens{dh}=0\,,\quad \tens{\xi}=-\frac{1}{4}\tens{\delta}^T \tens{h}=-\frac{1}{4}\tens{\delta} \tens{h}={\tens{\partial}}_{\psi_0}\,. \ee Therefore it can be locally written in terms of a potential \be \tens{h}=\tens{db}\,,\quad \tens{b}=-\frac{1}{2}\Bigl[(x_1^2+x_2^2)\tens{d}\psi_0+x_1^2x_2^2 \tens{d}\psi_1\Bigr]\,. \ee Using the properties of closed conformal Killing--Yano tensors with torsion, the principal tensor generates a Killing--Yano with torsion 3-form $\tens{*h}$, and a rank-2 Killing tensor \be\label{KT} K_{ab}=(*h)_{acd}(*h)_b^{\ cd}=h_{ac}h_b^{\ c}-\frac{1}{2}g_{ab}h^2\,. \ee Such symmetries are responsible for separability of the Hamilton--Jacobi, Klein--Gordon, and torsion-modified Dirac equations in these spacetimes. \section{Separability of vector perturbations}\label{Sep} \subsection{Troca equation} Let us now proceed and consider a test massive vector field \tens{\ensuremath{P}} on the above background. It is reasonable to expect that, similar to the Dirac case \cite{Kubiznak:2009qi,Houri:2010qc}, the corresponding Proca equation will pick up the due torsion generalization. In what follows we shall argue that the natural sourceless massive vector equation to consider is \be \label{eq:troca} {\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T \cdot \tens{\ensuremath{\mathcal{F}}} - m^2\tens{P} = 0\,, \ee where $m$ is the mass of the field, and the field strength $\tens\ensuremath{\mathcal{F}}$ is defined via the torsion exterior derivative, \be \tens\ensuremath{\mathcal{F}} \equiv \tens{d}^T\!\tens{P}=\div\tens{P} - \tens{P}\cdot \tens T\,. \ee Being a torsion generalization of the Proca equation, we shall refer to the equation \eqref{eq:troca} as a `{\em Troca equation}'. It implies the `Lorenz condition' \be\label{eq:Lorenz} {\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T \cdot \tens{P}=0\,. \ee To motivate the above form of the Troca equation, we demand that it is linear in $\tens{P}$, reduces to the Proca equation in the absence of torsion, and would obey the current conservation in the presence of sources. We have three natural candidates for generalizing the `Maxwell operator' ${\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T\cdot \tens{dP}$, namely: \be \tens{O}_1={\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T \cdot \tens{d}^T\!\tens{P}\,,\quad \tens{O}_2={\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \cdot \tens{d}\!\tens{P}\,,\quad \tens{O}_3={\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \cdot \tens{d}^T\!\tens{P}\,. \ee However, the last two do not obey the current conservation equation. Indeed, due to ${\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \cdot ({\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \cdot \ )\neq 0$, we have ${\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T\cdot \tens{O}_2={\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T^T \cdot \tens{O}_2\neq 0$, and similarly for $\tens{O}_3$. So we are left with $\tens{O}_1$ which, when extended to the massive case, yields the Troca equation \eqref{eq:troca}. Let us also note that the choice of operator $\tens{O}_1$ is `consistent' with the Maxwell equation for the background Maxwell field. Namely, due to the identity \be \tens{X}\cdot \tens{*\omega}=\tens{*}(\tens{\omega}\wedge \tens{X})\,, \ee valid for any vector $\tens{X}$ and any $p$-form $\tens{\omega}$, the field equations \eqref{Maxwell} can be written as \begin{eqnarray} 0&=&\tens{d* F}-\frac{1}{\sqrt{3}}\,\tens{F}\wedge\tens{F}=\tens{d*dA}-\tens{d}\Bigl(\frac{1}{\sqrt{3}}\tens{F}\wedge \tens{A}\Bigr)\nonumber\\ &=&\tens{d*dA}+\tens{d*}\Bigl(\tens{A}\cdot \frac{1}{\sqrt{3}}\tens{*F}\Bigr)\nonumber\\ &=&\tens{d*}\tens{d}^T\tens{A}\,. \end{eqnarray} That is, identifying $\tens{A}$ with the Proca field in the test field approximation \be {\tens{\nabla}}} % covariant derivative %:ex: \covd \ts{T\cdot \tens{d}^T\tens{P}=0\,, \ee which is the massless Troca equation \eqref{eq:troca} (upon treating the torsion as an independent field). \subsection{Separability} Having identified the Troca equation \eqref{eq:troca}, let us now find its general solution in the supergravity background \eqref{can_odd}. To this purpose we employ the LFKK ansatz: \be\label{LFKK2} P^a=B^{ab}\nabla_b Z\,,\quad B^{ab}(g_{bc}+i\mu h_{bc})=\delta^a_c\,, \ee and seek the solution in a separated form \begin{equation}\label{separ} Z = {\underset{\nu = 1,2}{\prod}} R_{\nu} \left( x_{\nu} \right) \exp \Bigl[i \overset{2}{\underset{j = 0}{\sum}} L_{j} \psi_{j} \Bigr]\,, \end{equation} where $\{\mu, L_0, L_1, L_2\}$ are four `separation constants'. As in the case without torsion, it is useful to start with the Lorenz condition \eqref{eq:Lorenz}. We find \be\label{eq: ODEs for mode functions} \nabla_a P^a= Z\sum_{\nu=1,2}\frac{1}{U_{\nu}}\frac{\mathcal{D}_{\nu}R_{\nu}}{q_{\nu} R_{\nu}}\,, \ee where the differential operator $\mathcal{D}_{\nu}$ is given by \begin{eqnarray}\label{Operator Sugra} \mathcal{D}_{\nu} &=& \dfrac{q_{\nu}}{x_{\nu}}\partial_{\nu}\left( \frac{X_{\nu} x_{\nu}}{q_{\nu}}\partial_{\nu} \right) - \frac{1}{X_{\nu}} \Bigl(\overset{2}{\underset{j=0}{\sum}} (-x_{\nu}^2)^{1-j}{L}_{j\nu}\Bigr)^{\!2} \nonumber \\ &&+ \frac{ 2 \mu }{q_{\nu}}\ \overset{2}{\underset{j=0}{\sum}} (-\mu^2)^{j-1}{L}_{j\nu} + \frac{L_2^2 q_{\nu}}{c^2 x_{\nu}^2 }\,, \end{eqnarray} and we have defined \be q_\nu=1-\mu^2 x_\nu^2\,, \quad {L}_{j\nu} = L_{j}(1+\delta_{j2}e_{\nu})\,, \ee the latter definition being essentially the only difference when compared to the five-dimensional torsion-less case, c.f. \eqref{eq: Operator odd D}. In order to impose the Lorenz condition, we could now follow the procedure developed in \cite{Frolov:2018ezx}. Instead, let us proceed in a slightly different way, by using the following `{separability lemma}' \cite{Frolov:2007cb}:\\ {\bf Lemma.} {\em The most general solution of \be \sum_{\nu=1}^n \frac{f_\nu(x_\nu)}{U_\nu}=0\,\quad \mbox{where}\quad U_{\nu} = \overset{n}{\underset{\mu \neq \nu}{\underset{\mu = 1}{\prod}}} \left( x_{\mu}^2 - x_{\nu}^2 \right)\,, \ee is given by \be\label{sepfnu} f_\nu=\sum_{j=0}^{n-2} C_j(-x_\nu^2)^{n-2-j}\,, \ee where $C_j$ are arbitrary constants.} Thus, demanding $\nabla_a P^a=0$, using the expression \eqref{eq: ODEs for mode functions}, and the above lemma for $n=2$ and $f_\nu=\mathcal{D}_{\nu}R_{\nu}/(q_{\nu} R_{\nu})$, yields the separated equations \be\label{eq: separation equations0} \mathcal{D}_{\nu}R_{\nu}=q_{\nu}f_\nu R_{\nu}\,, \ee where $f_\nu$ is given by \eqref{sepfnu}, that is, $f_\nu=C_0$. With this at hand, let us now turn to the Troca equation \eqref{eq:troca}. Using the ansatz \eqref{LFKK2} and the Lorenz condition \eqref{eq:Lorenz}, the L.H.S. of the Troca equation takes the following form: \begin{equation} \nabla_b \ensuremath{\mathcal{F}}^{ba} - m^2 \ensuremath{P}^a = B^{ab} \nabla_{b} J\,, \end{equation} where the `current' $J$ is, similar to the Kerr--NUT--AdS case~\cite{Frolov:2018ezx}, given by \begin{equation} J = \Box Z - 2 i \mu \xi_{a} B^{ab} \partial_{b}Z - m^2 Z\,, \end{equation} or more explicitly, \begin{equation}\label{eq: current J} J = Z \sum_{\nu=1,2}\frac{1}{U_{\nu}R_{\nu}}\Bigl[ \mathcal{D}_{\nu} - m^2 \left( -x_{\nu}^2 \right) \Bigr]R_{\nu}\,. \end{equation} Using the separation equations \eqref{eq: separation equations0} and the lemma again, we find \be J=-Z(\mu^2 C_0-m^2)\sum_{\nu=1,2}\frac{x_\nu^2}{U_\nu}=Z(\mu^2 C_0-m^2)\,. \ee In order for this to vanish, we require \be C_0=\frac{m^2}{\mu^2}\,. \ee Of course, in the case of massless vectors, we can set $m=0$. To summarize, we have shown the separation of variables for the Troca equation \eqref{eq:troca} in the Chong--Cveti\v{c}--L\"u--Pope black hole spacetime. The solution can be found in the form of the LFKK ansatz \eqref{LFKK2}, where the scalar function $Z$ is written in the multiplicative separated form \eqref{separ}, and the modes $R_\nu$ satisfy the ordinary differential equations \eqref{eq: separation equations0} with $f_\nu=C_0=m^2/\mu^2$. The obtained solution is general in that it depends on four independent separation constants $\{\mu, L_0, L_1, L_2\}$. It remains to be seen if, similar to the Kerr--NUT--AdS case \cite{Dolan:2018dqv}, all polarizations (four in the case of massive field and three for $m=0$) are captured by our solution. \section{Conclusions}\label{summary} The principal tensor is a very powerful object. It uniquely characterizes the class of vacuum black hole spacetimes (known as the Kerr--NUT--AdS metrics), and it generates towers of explicit and hidden symmetries. In turn, such symmetries underlie separability of the Hamilton--Jacobi, Klein--Gordon, Dirac, and as only recently shown also Maxwell and Proca equations in these spacetimes. The key to separating the vector equations is not to concentrate on the field strength (as previously thought) but rather employ a new LFKK separability ansatz \eqref{LFKK} and \eqref{Btens} for the vector potential itself. In this paper we have shown that the applicability of the LFKK ansatz goes far beyond the realm previously expected. Namely, we have demonstrated the separability of the vector field equation in the background of the Chong--Cveti\v{c}--L\"u--Pope black hole of minimal gauged supergravity. Such a black hole no longer possesses a principal tensor. However, upon identifying the Maxwell 3-form of the theory with torsion, a weaker structure, the principal tensor with torsion, \emph{is} present. Remarkably, such a structure enters the LFKK ansatz in precisely the same way as the standard (vacuum) principal tensor and allows one to separate the naturally torsion modified vector (Troca) field equations: `{\em principal tensor strikes again'}. This result opens future horizons for applicability of both the LFKK ansatz and the torsion modified principal tensor. It is an interesting open question to see where the principal tensor is going to strike next. \section*{Acknowledgements} \label{sc:acknowledgements} We would like to thank Ma{\"i}t{\'e} Dupuis and Lenka Bojdova for organizing the PSI Winter School where this project was mostly completed and the PSI program for facilitating this research. The work was supported in part by the Natural Sciences and Engineering Research Council of Canada. Research at Perimeter Institute is supported in part by the Government of Canada through the Department of Innovation, Science and Economic Development Canada and by the Province of Ontario through the Ministry of Economic Development, Job Creation and Trade. R.G.S thanks IFT-UNESP/ICTP-SAIFR and CNPq for partial financial support. L.T. acknowledges support by the Studienstiftung des Deutschen Volkes.
\section{Introduction} Calculating the global minimum (maximum) of a multi-variable function is in general arduous, especially when the number of variables and constraint conditions grows and the objective function is highly non-linear. The problem is in the NP-hard complexity class since it is complicated even to verify whether a given solution is the optimal one. As a branch of the optimization problem, the logistic network design problem (NDP) covers a massive set of decision-making problems for management issue~\cite{ballou}, e.g., where to place facilities and how to assign customers minimizing the total cost, or how to redistribute driving paths of vehicles to reduce traffic jams. There is an endless list of classical algorithms for optimization problems, e.g., branch and bound, context partition and dynamical programming, metaheuristic algorithm based on a single solution such as hill-climbing, simulated annealing~\cite{sa}, and tabu search~\cite{tabu1,tabu2}, or intelligent optimization by genetic algorithms~\cite{ga}, ant colony optimization~\cite{aco1,aco2}, and artificial neural networks~\cite{ann}. This algorithm has been applied to study NDP and provided some preliminary results~\cite{prelim1,prelim2,prelim3,prelim4}. However, these algorithms' mathematical principles for finding global minima are not systematically established and, in most cases, it requires experience adjusting parameters. This raises the demand for developing an interpretable algorithm for solving logistic NDPs efficiently. Quantum annealing is an optimization technique especially suitable for satisfiability problems, which makes use of quantum tunneling of potential barriers to enhance the performance of the classical algorithm~\cite{annealing1,annealing2}. The ground state codifying the solution of the problem is attained expectedly employing a shorter annealing time than the classical algorithm and afterward decoded to achieve the optimal solution with respect to the objective function~\cite{nielsenchuang}. Current D-Wave cloud quantum annealer comprises 2048 qubits distributed in a hardware architecture according to the Chimera graph. The constraints imposed by the architecture generally allow for codifying only relatively small problems, which can be enhanced when combined with classical algorithms. Additionally, this quantum device is affected by thermal fluctuations, decoherence, and I/O errors, which reduces the signal-to-noise ratio and consequently prolongs the computation time due to the extra sampling required for canceling the noise (otherwise, the accuracy of the solution would be affected). Nonetheless, quantum annealers have proven their capability to codify hard problems in different fields, such as condensed matter physics~\cite{cmp-spinglass-theory,cmp-manufactured,cmp-traverse,cmp-disordered,cmp-experiment}, engineering~\cite{volkswagen}, cryptography~\cite{FengHu,FengHu2}, biology~\cite{bio} and finance~\cite{quantfin1,quantfin2,quantfin3}, among others. This shows that current quantum annealing technology, although incoherent and still far from reaching useful quantum advantage, is ready to implement relevant small-scale optimization problems. In this Article, we experimentally address a set of paradigmatic logistic NDPs employing a hybrid classical-quantum annealing algorithm, showing a remarkable accuracy (less than 1\% error) despite the device incoherence and better performance in the number of iterations with respect to the classical one (about one-tenth, when classical annealing algorithm can reach global minimum with adequate hyperparameters). Inspired in Ref.~\cite{CSA}, we propose an alternative approach, which we call {\it combined quantum annealing algorithm}, that makes use of two layers with feedback-control interaction between them. The approach is tested in $12$ paradigmatic logistic NDPs employing both the simulator and the D-Wave cloud quantum annealer, achieving the aforementioned remarkable results when compared with the classical ones. This supports the extended idea that a hybrid quantum-classical algorithm will allow us to enlarge the class of solvable problems with quantum computers (quantum annealers), accelerating the development of quantum information processing tasks in quantum technologies. This manuscript is organized as follows: in Sec.~\ref{sec:model}, we formulate the logistic NDP as a constrained $0-1$ programming problem, which will afterwards allow us to map it into D-Wave's Chimera architecture. In Sec.~\ref{sec:CQSA}, we introduce the fundamental elements of quantum annealing and of the combined quantum annealing algorithm. Afterwards, in Sec.~\ref{sec:exp}, we experimentally tests the optimization of logistic NDPs by comparing the results against the best known classical ones, as well as those given by a classical algorithm for finding global minimum. Finally, in Sec.~\ref{sec:discussion}, the results are analyzed and possible alternative software and hardware approaches for further enhancement are discussed. The conclusions are finally listed in Sec.~\ref{sec:conclusion}. \section{Logistic Model\label{sec:model}} Although a logistic NDP could be described in an abstract framework, we choose the customer-facility picture because it is illustrative. Let us assume that there are at most $m$ sites for potential facilities and $n$ customers to be allocated. The indices $J=\{1,2,\cdots,m\}$ and $I=\{1,2,\cdots,n\}$ denote the set of potential location sites and the set of customers, respectively. It costs $f_j$ to build a facility with production capacity $v_j$ placed at site $j \in J$. When a customer $i\in I$ with product demand $d_i$ is served by facility $j$, the transportation process brings $c_{ij}$ to the cost. One has to find a way to allocate customers with a minimum total cost that ensures all customers are served, and none of the facilities is overflowed. To formulate the model, one has to minimize the following cost function \begin{equation} \label{eq:cost-function} \text{cost}(x_j,y_{ij})=\sum_j f_jx_j+\sum_i\sum_j c_{ij}y_{ij}, \end{equation} where $x_j$ and $y_{ij}$ are binary variables that represent the allocation configuration. A facility is built at site $j$ when $x_j=1$, and obviously, customers can only be served from sites with facilities. Accordingly, $y_{ij}=1$ means customer $i$ is assigned to the facility in site $j$, and other facilities are no longer available for this customer. These constraints can be expressed as \begin{equation} \label{eq:equ} \sum_j y_{ij}=1,\ \forall i\in I, \end{equation} \begin{equation} \label{eq:inequ} \sum_i d_iy_{ij}<v_j,\ \forall j\in J, \end{equation} \begin{equation} \label{eq:legit-position} y_{ij}\leq x_j,\ \forall i\in I,\ \forall j\in J. \end{equation} Minimizing the cost function under the constraints above is proven to be an NP-hard problem, i.e., obtaining its global minimum value is computationally challenging and highly time-consuming. Additionally, it is also hard to verify if a given network is the solution that minimizes the cost function. These features lead to the demand for specific algorithms that accelerate the searching process and enhance the solution's quality. \section{Combined Quantum Annealing Algorithm\label{sec:CQSA}} The solution of satisfiability problems can be codified in the ground state of a problem spin Hamiltonian $H_\text{pro}$ \cite{FGGS00}. Quantum annealing is a quantum algorithm based on the adiabatic theorem \cite{AE99}, which ensures that if we start in the ground state of a known Hamiltonian $H_0$, by slowly modifying a parameter $t$ transforming $H_0$ into $H_\text{pro}$, the system remains in its ground state, providing us with the solution for the satisfiability problem. For example, in a spin-$1/2$ annealer, the total Hamiltonian is split into a tunneling Hamiltonian and a problem Hamiltonian, which codifies the solution for the problem, \begin{equation*} H=\left(1-\frac{t}{t_f}\right)\sum_i \hat{\sigma}^x_i+\frac{t}{t_f}\left(\sum_i h_i\hat{\sigma}^z_i+\sum_{i>j}J_{ij}\hat{\sigma}^z_i\hat{\sigma}^z_j\right). \end{equation*} The system is supposed to be in the ground state of the problem Hamiltonian when $t=t_f$. If we introduce the qubit operator $\hat{x}$ with eigenvalues $0$ and $1$, such that $\hat{x}|0\rangle=|0\rangle$ and $\hat{x}|1\rangle|1\rangle$, respectively, {\it quadric unconstrained binary optimization} (QUBO) problem can be mapped to a spin-1/2 quantum annealing problem by $\hat{x}=(1+\hat{\sigma}^z)/2$. Looking at the cost function given by Eq.~\eqref{eq:cost-function}, we understand that it cannot be directly optimized by quantum annealing since there are constraints. The cost function and all constraints are linear, so they are all relatively easy to be converted to a QUBO formulation. For example, Eq.~\eqref{eq:legit-position} can be satisfied by introducing penalty terms in the form $\alpha(x_j-y_{ij}-z_{ij})^2$, where $z_{ij}$ are auxiliary binary variables. One can verify that the penalty is unavoidable only when $x_j=0$ and $y_{ij}=1$. With an effective QUBO formulation satisfying Eq.~\eqref{eq:equ} and Eq.~\eqref{eq:inequ}, we propose a hybrid quantum-classical algorithm inspired in Ref.~\cite{CSA} for obtaining the global (or quasi-global) minimum. We apply a combined quantum annealing algorithm comprising two layers, namely, the outer and the inner layers. In the former, a simulated annealing algorithm performs the optimization for facilities' locations while, in the latter, the quantum annealing process runs. In the outer layer, a list with elements $x_j$, sorted by index $j$ in ascending order, denotes the neighboring configuration of facilities, while a neighboring function operates on the list to generate a new configuration in three ways: (\romannumeral1) pick a $x_j$ with value $1$, and set it to $0$, which means a facility is randomly closed; (\romannumeral2) pick a $x_j$ with value $0$, and set it to $1$, which means a facility is randomly built on a site; (\romannumeral3) swap the values of $x_{j}$ and $x_{k}$, if their values are different, which means a facility moves to another site. Dice will be rolled to decide which operation is carried out by the neighboring function on the list, while all the operations should be allowed, e.g., when all facilities are open, operation (\romannumeral2) is no longer available. \begin{figure} \includegraphics[scale=0.5]{scheme.pdf} \caption{\label{fig:scheme} A scheme of how binary variables and constraint conditions are encoded by logical and ancilla qubits. Here, we represent a simple NDP problem comprising $3$ facilities and $5$ customers, as an illustrative example, while different colors and thicknesses classify the couplers according to their properties.} \end{figure} In the inner layer, we perform quantum annealing to minimize $\sum_i\sum_j c_{ij}y_{ij}$ under constraint given by Eq.~\eqref{eq:equ}, Eq.~\eqref{eq:inequ}, and Eq.~\eqref{eq:legit-position}. As we mentioned before, the latest quantum annealer is designed to solve QUBO problems, i.e. to minimize the objective function $\text{obj}(\bf{x})=\bf{x}^{\text{T}}Q\bf{x}$, that $Q$ is the QUBO matrix and $\bf{x}$ is the binary vector. We map binary variables $y_{ij}$ to qubit $q_{(i,j)}$, and allowed $j$ are the sites on which facilities are built. In order to introduce the constraint given by Eq.~\eqref{eq:equ}, we employ weighted penalty functions, with a reasonable $\lambda_i$, yielding an effective unconstrained Hamiltonian for customer $i$, e.g. $\lambda_i(\sum_j q_{(i,j)}-1)^2$, which guarantees that customer $i$ is associated only to one facility. Accordingly, Eq.~\eqref{eq:inequ} may also be written as ${\mu_j(\sum_i d_i q_{(i,j)}+\langle\bf{2},\bf{a}_j\rangle}-v_j)^2$ for facility $j$, with slack variables encoded by ancilla qubits. Here, $\langle\bf{2},\bf{a}_j\rangle$ denotes the binary expansion $\sum_{l=0}^k 2^la_{(l,j)}$, which implies that the number of ancilla qubits required to introduce the constraint is $k_j=\lceil\log_2 v_j\rceil$. One can verify that any violation of Eq.~\eqref{eq:equ} and~\eqref{eq:inequ} introduce extra squared cost, being scaled by $\lambda_i$ and $\mu_i$. For example, if customer $i$ is not assigned to any facility, i.e., $\sum_j q_{(i,j)}=0$, the violation of Eq.~\eqref{eq:equ} punishes a cost of $\lambda_i$, which should be larger than the profit from saving the transportation cost $c_{ij}$. The problem Hamiltonian is hence given by \begin{eqnarray} \label{eq:problem} H_P&=&\sum_i\sum_j c_{ij}q_{(i,j)}+\sum_i{\lambda_i\Big(\sum_j q_{(i,j)}-1\Big)^2} \nonumber\\ &+&\sum_j{\mu_j \Big(\sum_i d_i q_{(i,j)}+\langle\bf{2},\bf{a}_j\rangle}-v_j \Big)^2, \end{eqnarray} which could be mapped to a solvable spin-$1/2$ Hamiltonian for the annealer. The ground state of the problem Hamiltonian is supposed to be the configuration that minimize the classical objective function with reasonable penalty coupling strengths $\lambda_i$ and $\mu_j$. This combined quantum annealing algorithm works as follows: (\romannumeral1) Set the optimal cost to infinity and generate an initial configuration as the optimal configuration of facilities. Schedule the annealing process, i.e., the cooling rate, initial temperature, final temperature, etc. (\romannumeral2) Flip the values of variables $x_j$ in list by neighboring function and obtain a new configuration $\tilde{x}_j$. (\romannumeral3) Perform the quantum annealing process according to the neighboring configuration, decode the state of qubits to $\tilde{y}_{ij}$, and calculate value of the cost function $\text{cost}(\tilde{x}_j,\tilde{y}_{ij})$. (\romannumeral4) Apply Metropolis algorithm such that, if $\text{cost}(x_j,y_{ij})>\text{cost}(\tilde{x}_j,\tilde{y}_{ij})$, we accept the new configuration and value as the optimal ones and go for next step. Otherwise, randomize $\rho\in(0,1)$, if $\rho<\exp(-(\text{cost}(\tilde{x}_j,\tilde{y}_{ij})-\text{cost}(x_j,y_{ij}))/T)$, we also accept them and continue. We go for the next step without operations if the new configuration and value are denied. (\romannumeral5) Increase the iteration index by one and check if it meets the upper limit. Once it is larger than the maximum iteration number, we adjust the annealing temperature according to the schedule, reset the iteration index, and go on for the next step. Otherwise, return to step (\romannumeral2). (\romannumeral6) Output the optimal solution if the current temperature is not higher than the target temperature. Otherwise, return to step (\romannumeral2). Thus, if all parameters in the outer and inner layers were correct and the quantum annealer was noiseless, the places for building facilities, the allocation of customers, and the optimized total cost would be obtained by this combined annealing algorithm. In any case, error correction can be applied to provide a quasi-optimal solution, which is a relevant advantage since we are employing a noisy and incoherent quantum annealer. \section{Experiments\label{sec:exp}} We choose the same twelve problems tested by Ref.~\cite{CSA}, which are open-source NDP test problems from OR-Library~\cite{OR-Library}. The optimal solution is given by the author using \textit{Lindo} software. We encoded $m\times n$ logical qubits by $q_{(i,j)}$ and $\sum k_j$ ancilla qubits by $a_{(l,j)}$ for NDP problem with $m$ potential sites for building facilities with capacities $v_j$ and $n$ customers to be served. The connectivity of these qubits is high, with a number of couplers approximately given by \begin{equation} \frac{(m-1)mn}{2}+\frac{(n-1)nm}{2}+\sum_j\frac{(k_j-1)kn}{2}+\sum_j nk_jm, \end{equation} where terms denote the numbers of couplers between logical qubits given by Eq.~\eqref{eq:equ}, Eq.~\eqref{eq:inequ}, couplers between ancilla qubits and couplers that link an ancilla qubit to a logical qubit (see Fig.~\ref{fig:scheme}), respectively. The minimal number of qubits for solving this problem is $n\times m+k\times m$, if the structure of the quantum device is exactly the same as we showed in Fig.~\ref{fig:scheme}. Notice that this number could substantially grow if qubits are connected differently from the problem's connectivity graph since additional ancillary qubits are required to implement minor embedding. The smallest problem for testing requires 1056 qubits with 40320 couplers, which cannot be directly implemented in the 2048-qubit D-Wave quantum annealer due to its limited connectivity (6016 couplers). The open-source software \textit{qbsolv} developed by D-Wave \cite{qbsolv} allows for splitting a large QUBO problem into smaller embeddable sub-problems, which can subsequently be solved in either a local simulator with tabu algorithm or the real quantum annealer under authorized license. The QUBO problem is submitted to a server for queueing, and the result is retrieved after the annealing is performed. Although the computing time in a real annealer is negligible, one trial of solving a large QUBO matrix could be very time-consuming (about 15 minutes for a $900\times900$ QUBO matrix) due to the queuing time. We also emphasize that $x_j$ vanishes since we employ a hybrid algorithm instead of a standard approach. In the inner layer where quantum annealing performs, we solve a subproblem as follows: how customers should be assigned according to a given facility configuration? Some variables $y_{ij}$ are constantly zero if there is no facility built at site $x_j$. In our practice, these variables are already removed in each quantum annealing process, making embedding or solving by \textit{qbsolv} easier and more efficient. Thus, in each iteration that generates a new facility configuration, the number of logical qubits required is $\tilde{m}\times n$ with a maximum of $m\times n$, where $\tilde{m}$ denotes the number of facilities being built. The initial temperature of simulated annealing is set to be 10000, which is scaled to a reasonable value considering the deviation between the new and old value of the cost function. For simplicity, we choose $\alpha=0.5$ as cooling rate and the schedule as scale cooling. The maximum iteration number is $m$, and the target temperature is 1. To obtain the optimal solution according to a given configuration of facilities, the penalty strength should be sufficiently strong, i.e., it should ensure that the problem Hamiltonian's ground state satisfies all constraint conditions. Hence, if the quantum annealer were noiseless, the parameters would follow $\lambda_j\gg\mu_i\gg c_{ij}$, which ensures that every customer is assigned to only one facility, none of the facility is overflowed, and the configuration corresponds to the minimum total cost. However, in practice, the quantum device is affected by thermal fluctuation, inaccuracy of magnetic field tunneling, and energy excitation by nonadiabatic effects. Thus the result in general satisfies the constraints, but the solution is not optimal. Consequently, the penalty strength is set slightly larger than $c_{ij}$ for the possibility of obtaining an optimal solution. Although sometimes constraints are also not fulfilled due to the noise, this could be corrected by repeating the quantum annealing process until every constraint is satisfied. After studying the dataset, the penalty strength $\lambda_i$ are set to be $\min_j(c_{ij})$, while $\mu_i$ are almost negligible considering the demand and capacities. \begin{table} \begin{ruledtabular} \begin{tabular}{cccccc} Problem&Size&Lindo&SA&QA\\ \hline cap71&$16\times50$&932615.7500&1460909.750&933172.1000\\ cap72&$16\times50$&977799.4000&1395389.538&977988.1000\\ cap73&$16\times50$&1010641.450&1585875.550&1010641.450\\ cap74&$16\times50$&1034976.975&1390963.787&1034976.975\\ cap101&$25\times50$&796648.4400&1182235.563&797656.2875\\ cap102&$25\times50$&854704.2000&1282306.175&854952.5125\\ cap103&$25\times50$&893782.1125&1395701.200&894872.1125\\ cap104&$25\times50$&928941.7500&1458550.450&928941.7500\\ cap131&$50\times50$&793439.5620&1167543.950&796066.6500\\ cap132&$50\times50$&851495.3250&1132436.300&852291.9375\\ cap133&$50\times50$&893076.7120&1126423.238&893521.4125\\ cap134&$50\times50$&928941.7500&1321380.713&928941.7500\\ \end{tabular} \end{ruledtabular} \caption{\label{table:result}The combined quantum annealing algorithm is tested by 12 NDP problems from OR-Library while the results are listed under QA. The optimal solutions are compared with the global optimal solutions from \textit{Lindo} given by the author of Ref.~\cite{CSA} and classical simulated annealing algorithm with the same annealing schedules and iteration numbers denoted by SA. In our experiments, the combined quantum annealing algorithm outperforms simulated annealing as a well-known metaheuristic algorithm massively under the same iteration numbers.} \end{table} The results are presented in Table.~\ref{table:result}, while the hyper-parameters for simulated annealing algorithm are the same as those in outer layer of our quantum-classical hybrid algorithm. For a fair comparison, we take $m$ iterations in each cooling step (the simulated annealing algorithm is discussed in Appendix.~\ref{app:SA}). Consequently, both simulated annealing and combined quantum annealing algorithms take $m\times\lceil\log_{0.5}1e-4\rceil=14m$ runs for Metropolis acceptance criterion. Results presented here are not deliberately selected via several trials, which means one can obtain different results fluctuating with a small range. We also show how these two algorithms work for different logistic NDPs by depicting the evolution of optimal costs by iteration steps in Fig.~\ref{fig:result} (a-c). We notice that results given by the classical algorithm are still far from optimal with the same iterations. To obtain a global minimum (or near), one should evaluate about $10m$ new configurations in each cooling step instead of $m$, with no guarantee of success because the classical algorithm highly depends on others' choice hyperparameters. \begin{figure*} \includegraphics[scale=0.45]{qa_result.pdf} \caption{\label{fig:result}(a-c) Optimal costs versus iteration numbers, with different problem sizes. Different problems with the same size are in the same color. The evolutions of the combined annealing algorithm and simulated annealing algorithm are plotted by lines and dotted lines, with ground energies by dashed lines for comparison. (d,e) Facility configuration at each cooling step and the allocation of customers of Problem cap71 shown in Table.~\ref{table:result}, with a minimum cost of 933172.1000. A block in warm/cold color denotes $x_j,y_{ij}=1$ or $0$.} \end{figure*} \section{Discussion\label{sec:discussion}} Let us analyze the experimental results for improving our understanding of the protocol before any further discussion about how to enhance its performance. As we mentioned above, solving a $900\times900$ QUBO matrix by \textit{qbsolv} takes about 15 minutes, summing up to approximately 56 hours for Problem cap71 (even more for larger problems). This would be solved in case of having local access to the quantum device and, of course, if the QPU would have more qubits and better/customized connectivity for directly running quantum annealing instead of employing \textit{qbsolv}. We highlight that, even though our quantum device is noisy and incoherent, one can still find a result with a remarkable deviation smaller than 0.5\% when compared against the global optimal result obtained from the exhaustive search. We run the quantum annealing process with a large sampling number, selecting the configuration with minimum energy among all samples, even if this configuration might not appear that frequently due to energy fluctuations during the non-adiabatic process. Once the optimal configuration for facilities is obtained, the optimal solution can be checked/refined by repeatedly running the quantum annealing process to check if a customer allocation with a lower cost can be attained. The reason is that the search space by exhaustive searching for a QUBO matrix encoded in $n\times m$ logical qubits and $k\times m$ ancilla qubits is $2^{(n+k)m}$, but the search subspace is dramatically reduced once the quantum annealer excludes most of the states with higher energy. In this way, the quantum annealing algorithm works for searching a global minimum even in noisy intermediate-scale quantum devices. The price to pay is a more extensive sampling in the quantum annealing process. Now, we evaluate several improvements to make the algorithm more efficient. From the perspective of algorithm, the outer layer applies a classical simulated annealing algorithm which theoretically obtains global minimum with adequate annealing parameters. As we mentioned before, the inappropriate annealing schedule will stuck the algorithm to a local minimum and we should find the initial temperature for simulated annealing. The total number of iterations to guarantee a global minimum is enormous which is proved by Ref.~\cite{hajek}, while the transition probability from state $i$ to state $j$ is denoted by $P_{ij}=G_{ij}A_{ij}$. The acceptance probability follows the Metropolis acceptance criterion that $A_{ij}=\exp(-(E_j-E_i)/T)$ when $E_j>E_i$, otherwise $A_{ij}=1$. We assume that the generation probability is symmetric $G_{ij}=G_{ji}$ and the Markov chain of a given temperature is acyclic and irreducible, then the system follows a Maxwell-Boltzmann distribution that \begin{equation} \label{eq:distribution} \pi_i=\frac{|N(i)|\exp(-E_i/T)}{\sum_j |N(j)|\exp(-E_j/T)}, \end{equation} where $N(i)$ and $N(j)$ denote the sets of neighbours of state $i$ and $j$, respectively, and generation probability $P_{ij}$ is distributed uniformly among neighbours of state $i$ (i.e., $G_{ij}=1/|N(i)|$ if $j\in N(i)$). Accordingly, the acceptance probability $\chi(T)$ and an iteration algorithm to obtain the proper annealing schedule are provided and proved in Ref.~\cite{walid}. In this way, we could analyze the dataset and find optimal parameters for the outer layer algorithm before solving the NDP problem with combined quantum annealing algorithm. In the inner layer, quantum annealing for a large QUBO matrix cannot be implemented directly which requires \textit{qbsolv} for generating subproblems. However, the partition algorithm in the main loop of \textit{qbsolv} sometimes leads to local minimum that requires better method for splitting the matrix. Alternative algorithms could be introduced, e.g. embedding larger subproblems which exploit the resources provided by the quantum annealer~\cite{improving-qbsolv} or emphasizing the importance of mitigating the embedding cost~\cite{hua}. Meanwhile, the quantum annealing algorithm in the inner layer is affected by the penalty strength, while these parameters are very tricky to be decided. One should scale them according to the dataset and the noise of the hardware, for obtaining an acceptable solution that satisfies all constraint conditions. We notice that the optimized penalty strength for a QUBO problem could be given with the combination of machine learning algorithm, e.g., gradient descent as the most trivial idea, by quantum annealing with variant parameter vectors $\bm{\lambda}$ and $\bm{\mu}$ and stop at an optimal solution. As briefly analyzed in Sec.~\ref{sec:CQSA}, the minimization of cost function~\eqref{eq:cost-function} under constraint conditions \eqref{eq:equ},~\eqref{eq:inequ}, and~\eqref{eq:legit-position} can be encoded in QUBO formulation. Specifically, Eq.~\eqref{eq:legit-position} can be implemented in a similar way as penalty terms by using auxiliary qubits $b_{(i,j)}$, for ensuring that customers are not assigned to sites without facility. Thus, one can solve the NDP by standard approach, performing quantum annealing of the problem Hamiltonian, which reads as \begin{eqnarray} \label{eq:direct} H_P&=&\sum_jf_j\tilde{q}_{(j)}+\sum_i\sum_j c_{ij}q_{(i,j)}+\sum_i{\lambda_i\Big(\sum_j q_{(i,j)}-1\Big)^2} \nonumber\\ &+&\sum_j{\mu_j \Big(\sum_i d_i q_{(i,j)}+\langle\bf{2},\bf{a}_j\rangle}-v_j \Big)^2 \nonumber\\ &+& \sum_j\alpha_j\Big(\tilde{q}_{(j)}-\sum_jq_{(i,j)}-\sum_jb_{(i,j)}\Big)^2. \end{eqnarray} Here $\tilde{q}_{(j)}$ denote the configurations of facilities at site $x_j$. The penalty scaled by $\alpha_j$ is only activated when $\tilde{q}_{(j)}=0$ and $\sum_jq_{(i,j)}\geq1$, i.e., customers are assigned to sites where no facility is built. The standard approach requires additional auxiliary qubits of $m\times n$ and enormous couplers for implementing the $\tilde{q}_{(j)}q_{(i,j)}$, $\tilde{q}_{(j)}b_{(i,j)}$, and $q_{(i,j)}b_{(i,j)}$ interaction, which is too complicated for minor embedding, which aims at find an effective Hamiltonian with the same low-energy subspace of Eq.~\eqref{eq:direct}. Meanwhile, diadiabatic effect can cause energy excitation during the annealing process, resulting in failure of preparing the ground state of the effective Hamiltonian. In this way, one may obtain quasi-optimal solutions or even solutions that violate the constraint conditions, if the energy gaps between low-energy states are not sufficiently large. This requires a systematic study of optimizing the quantum annealing of the problem Hamiltonian~\eqref{eq:direct} and its effective Hamiltonian for minor embedding, e.g., the customized annealing schedules and embedding algorithms, which goes beyond the scope of this work. Although we have compared the outcome of the hybrid algorithm with the global optimal result, a comparison of the performance between our hybrid classical-quantum algorithm and the standard classical approach~\eqref{eq:direct} would be relevant for a future research. We will undoubtedly consider this issue as a key milestone for a future followup project. On the hardware side, the priority is to own a D-Wave quantum annealer instead of using a cloud quantum annealer, considering that the inner annealing time does not contribute a lot to the whole computation time. An advance could be controlling the quantum annealing process in the inner layer. Generally, the Hamiltonian of a quantum annealer $H=A(t)H_T+B(t)H_P$ is constrained by boundary conditions that $A(0)=1$, $A(t_f)=0$, $B(0)=0$ and $B(t_f)=1$, to start with initial tunneling Hamiltonian and result in the ground state (or low-energy state) of the final problem Hamiltonian. A customized quantum annealing process might shorten the annealing time while reducing the energy excitation to generate a better solution within less time. This annealing protocol could be given by control theory or other optimal methods, e.g., shortcut to adiabaticity in spin system~\cite{sta-spin-yu,sta-spin-zhang,sta-takahashi,sta-mori}, that controls the preparation and evolution of qubits in the quantum annealer. Quality of the solutions could also be improved by quantum annealer with more qubits, larger connectivity, and less noise, which will be released by D-Wave in mid-2020 named Pegasus~\cite{pegasus}. Alternative hardware will be coherent quantum annealer, which is still far from the practical application but could be built with current technologies while providing preliminary results~\cite{coherentDWave,LechnerSciAdv,Lechner}. \section{Conclusion\label{sec:conclusion}} We proposed a combined quantum annealing algorithm inspired in Ref.~\cite{CSA} to solve logistic network design problems, but which can also be applied to a large variety of optimization problems. The algorithm is tested with 12 NDP problems, and the results are in very good agreement with the already-known best solutions given by \textit{Lindo}. This research is another convincing evidence for the feasibility of applying quantum annealing for optimization problems, even when the quantum devices are limited by the number of qubits, the connectivity, and the noise. \section{Acknowledgments} We acknowledge funding from projects QMiCS (820505) and OpenSuperQ (820363) of the EU Flagship on Quantum Technologies, Spanish Government PGC2018-095113-B-I00 (MCIU/ AEI/FEDER, UE), PID2019-104002GB-C21, PID2019-104002GB-C22 (MCIU/AEI/FEDER, UE), Basque Government IT986-16, NSFC (Grant No. 12075145), Shanghai Municipal Science and Technology Commission (Grant No. 2019SHZDZX01-ZX04, 18010500400, and 18ZR1415500), and the Shanghai Program for Eastern Scholar, as well as the and EU FET Open Grant Quromorphic. This work is supported by the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research (ASCR) quantum algorithm teams program, under field work proposal number ERKJ333.
\section{Introduction}\label{sec:intro} Quantum electrodynamics (QED) predicts effective nonlinear interactions of electromagnetic fields mediated by quantum fluctuations of electrons and positrons \cite{Euler:1935zz,Heisenberg:1935qt,Weisskopf,Schwinger:1951nm}. The coupling of the electromagnetic field to a virtual electron-positron loop is mediated by the elementary charge $e$. In the low energy limit, i.e., for photon energies $\omega\ll m_e c^2$, where $m_e$ is the electron mass, these effective interactions are governed by the Heisenberg-Euler effective Lagrangian \cite{Heisenberg:1935qt}. For field strengths much smaller than the critical electric and magnetic fields, $E_\text{cr}=m_e^2c^3/(e\hbar)\simeq 1.3 \times 10^{18}\,\frac{\rm V}{\rm m}$ and $B_\text{cr}=E_\text{cr}/c \simeq 4.4 \times 10^{9}\,{\rm T}$, respectively, the leading effective interaction amounts to a four-field interaction \cite{Euler:1935zz}. Higher-order interactions are parametrically suppressed with additional powers of $E/E_\text{cr}$ and $B/B_\text{cr}$, where $E$ ($B$) denotes the applied electric (magnetic) field. These dimensionless ratios are much smaller than one for all present and near-future macroscopic electromagnetic fields available in the laboratory. Correspondingly, a restriction to the leading interaction term is typically sufficient in studies of prospective signatures of QED vacuum nonlinearities with laboratory electromagnetic fields and optical to x-ray photon energies for probing. As the fine-structure constant fulfills $\alpha=e^2/(4\pi\hbar \, c)\simeq1/137\ll1$, we can moreover limit our considerations to the one-loop level; cf., e.g., Ref.~\cite{Gies:2016yaa}. For reviews, see Refs.~\cite{Dittrich:1985yb,Dittrich:2000zu,Marklund:2008gj,Heinzl:2008an,DiPiazza:2011tq,Dunne:2012vv,Battesti:2012hf,King:2015tba,Karbstein:2016hlj,Inada:2017lop}. The collision of x-ray photons and a high-intensity laser field constitutes one of the most prospective scenarios towards the first experimental verification of QED vacuum nonlinearities in macroscopic electromagnetic fields in the laboratory. The dominant signal in the x-ray domain arises from the quasi-elastic interaction of the incident x-ray photons with the oscillation period-averaged intensity profile of the high-intensity laser; cf. Ref.~\cite{Karbstein:2016lby} for a detailed discussion. On the theoretical side, it is conveniently analyzed on the basis of the photon polarization tensor evaluated in the high-intensity laser field, mediating between an incident and outgoing photon line. Upon identification of the incident photon line with the incident x-ray photons, we obtain a photon current, whose leading contribution is quadratic in the high-intensity laser field and linear in the x-ray field. This current sources x-ray energy signal photons whose propagation and polarization properties are governed by the effective interaction of the colliding photon fields. The original theoretical proposal to perform such an experiment \cite{Heinzl:2006xc} exclusively focused on the effect of polarization flipping induced by a birefringence phenomenon of the quantum vacuum subjected to a macroscopic electromagnetic field; cf. also Refs.~\cite{Dinu:2013gaa,Schlenvoigt:2016} for more detailed analyses of the effect. Vacuum birefringence \cite{Toll:1952,Baier,BialynickaBirula:1970vy,Adler:1971wn} is already actively searched for in experiments using macroscopic magnetic fields to drive the effect and continuous wave laser for probing \cite{Cadene:2013bva,DellaValle:2015xxa,Fan:2017fnd}; see Ref.~\cite{Battesti:2018bgc} for a recent review. As the birefringence signal is inversely proportional to the wavelength of the probe and directly proportional to the number of photons available for probing, employing an x-ray probe seems a very promising alternative route to verify the effect in experiment. In the meantime, it has been demonstrated \cite{Karbstein:2015xra,Karbstein:2016lby,Karbstein:2018omb} that the scattering of signal photons outside the forward cone of the x-ray beam can be used to significantly increase the signal-to-background ratio. In principle, even the scattering phenomenon alone constitutes a signature of quantum vacuum nonlinearity. The main idea is to make use of the different decay behavior of the photons constituting the driving x-ray beam and the signal photons as a function of the polar angle measured with respect to the beam axis of the x-ray beam. While the former is determined by the focusing optics, the latter is controlled by the details of the scattering process, most specifically the transverse profile of the high-intensity beam in the interaction region. The interaction region is the space-time volume where both pulses overlap, and ideally reach their peak field amplitudes. Generically, the weaker the x-ray beam is focused relative to the high-intensity laser beam and thus the wider its waist, the more pronounced is the difference in the decay behavior \cite{Karbstein:2018omb}. This can be intuitively understood by the fact that the weaker a beam is focused, the smaller its angular divergence. On the other hand, the smaller the scatterer, the wider the angular divergence of the scattering signal. Performing such an experiment at the European XFEL \cite{XFEL} amounts to a central science goal of the HIBEF consortium \cite{HIBEF}, and is also targeted at SACLA \cite{Inada:2017lop} as well as SEL \cite{Shen:2018}. Employing this scattering phenomenon might be essential for measuring the effect of vacuum birefringence at an XFEL equipped with a petawatt-class high-intensity laser and state-of-the-art high-purity x-ray polarimetry \cite{Marx:2011,Marx:2013xwa}. So far, all available studies of the effect have modeled the high-intensity laser pump as fundamental paraxial Gaussian beam. However, the details of the scattering process may depend sensitively on the precise spatio-temporal structure of the pump field, and in particular on its transverse intensity profile in the interaction region. The present article is devoted to a first exploratory study of the fate of the scattering signal under deformations of the transverse focus profile of the pump. To this end, we focus on the head-on collision of a weakly focused XFEL probe pulse with a tightly focused high-intensity laser pump pulse. More specifically, throughout this article we assume the waist of the x-ray probe to be wider than that of the pump, thereby ensuring that the x-ray probe photons illuminate -- and thus probe -- the full transverse pump profile. While the former is modeled as linearly polarized plane wave supplemented with a finite pulse duration as in \cite{Karbstein:2015xra}, the latter is described as pulsed paraxial Laguerre-Gaussian (LG) beam of arbitrary mode composition \cite{Siegman,SalehTeich}, allowing us to consider generic rotationally symmetric beam profiles spanned by the LG basis. The high-intensity laser field enters the calculation via the photon polarization tensor, which has been evaluated in the background of a pulsed LG beam in Ref.~\cite{Karbstein:2017jgh} based on a locally constant field approximation of the Heisenberg-Euler effective Lagrangian. Our article is organized as follows: In Sec.~\ref{sec:theory} we recall our theoretical treatment of the effect based on the approach adopted to the study of the vacuum birefringence signal induced by a fundamental paraxial Gaussian laser pulse in Ref.~\cite{Karbstein:2015xra}. Our main focus is on the generalization of the results of Ref.~\cite{Karbstein:2015xra} to paraxial LG laser pulses of arbitrary mode composition, while -- at the same time -- keeping the resulting expressions as simple as possible. In order to achieve this, we make use of several well-justified analytical approximations. Thereafter, in Sec.~\ref{sec:results} we study the impact of differently shaped high-intensity laser pulse profiles on the scattering of the signal photons. Finally, we end with Conclusions and an Outlook in Sec.~\ref{sec:concls} \section{Theoretical Setting}\label{sec:theory} In the Heaviside-Lorentz System with units $c=\hbar=1$, the leading effective interaction between slowly varying electromagnetic fields induced by QED vacuum fluctuations is given by \cite{Euler:1935zz,Heisenberg:1935qt} \begin{equation} {\cal L}_\text{HE}^{1\text{-loop}}\simeq\frac{m_e^4}{(8\pi)^2}\frac{1}{90}\Bigl(\frac{e}{m_e^2}\Bigr)^4\Bigl[4(F_{\mu\nu}F^{\mu\nu})^2+7(F_{\mu\nu} {}^\star\!F^{\mu\nu})^2\Bigr] , \label{eq:Lag} \end{equation} with field strength $F^{\mu\nu}=\partial^\mu A^\nu-\partial^\nu A^\mu$ and dual field strength tensor ${}^\star\!F^{\mu\nu}=\frac{1}{2}\epsilon^{\mu\nu\alpha\beta}F_{\alpha\beta}$, respectively; our metric convention is $g_{\mu \nu}=\mathrm{diag}(-1,+1,+1,+1)$. Slowly varying fields vary on scales much larger than the reduced Compton wavelength (time) $\lambdabar_{\rm C}=\hbar/m_e\approx3.86 \cdot 10^{-13}\,{\rm m}$ ($\tau_{\rm C}=\lambdabar_{\rm C}/c\approx1.29 \cdot 10^{-21}\,{\rm s}$) of the electron. The associated photon polarization tensor follows straightforwardly as \cite{Karbstein:2015cpa} \begin{equation} \Pi^{\mu\nu}(-k',k)=\frac{\delta^2\int{\rm d}^4x\,{\cal L}^{1\text{-loop}}_\text{HE}}{\delta A_\mu(-k') \delta A_\nu(k)} \,. \label{eq:Pi} \end{equation} It is linear in $\alpha$, quadratic in the slowly varying electromagnetic field and mediates between incident $k^\mu=(k^0,\vec{k})$ and outgoing $k'^\mu=(k'^0,\vec{k}')$ photon momenta, fulfilling $\{k^0,k'^0,|\vec{k}|,|\vec{k}'|\}\ll m_e$. Our conventions are such that both arguments of $\Pi^{\mu\nu}(.,.)$ are ingoing, resulting in the minus sign in the first argument of the polarization tensor in \Eqref{eq:Pi}. Upon identification of this electromagnetic field with the field of a pulsed paraxial Laguerre-Gaussian laser beam of arbitrary mode composition, the photon polarization tensor encodes the vacuum-fluctuation-mediated impact of this background field on probe photon propagation. In principle, higher order contributions in the background field (fine structure constant) could be systematically accounted for by extending the perturbative weak field (loop) expansion in \Eqref{eq:Lag}. On the other hand, going beyond the restrictions of slowly varying fields and low energy photons, would eventually require an explicit calculation of the photon polarization tensor at arbitrary momentum transfer through the electron-positron loop in the specific inhomogeneous background field. For explicit expressions of the photon polarization tensor in linearly (circularly) polarized paraxial Laguerre- and Hermite Gaussian beams obtained along the above lines, cf. Ref.~\cite{Karbstein:2017jgh} (\cite{Karbstein:2017uzq}). Generic paraxial solutions of the wave equation in vacuum describing focused beams which feature a rotational symmetry around the beam axis can be represented as a superposition of Laguerre-Gaussian modes LG$_{l,p}$ labeled by two integer indices $l$ and $p$ \cite{Siegman,SalehTeich}. They provide a convenient means to analytically model the electromagnetic fields of a focused high-intensity laser beam. For a laser beam propagating in $\hat{\vec{e}}_{\rm z}$ direction, the directions of the associated electric and magnetic fields can be parameterized by a single angle $\phi$, and are given by $\hat{\vec{e}}_{E}=(\cos\phi,\sin\phi,0)$ and $\hat{\vec{e}}_{B}=\hat{\vec{e}}_{E}|_{\phi\to\phi+\frac{\pi}{2}}$. Without loss of generality, we assume the beam to be focused at $\vec{x}=0$. Linearly polarized beams fulfill $\phi=\text{const}.$ and are characterized by a single field profile $E(x)$, such that their electric and magnetic fields are given by $\vec{E}(x)=E(x)\hat{\vec{e}}_E$ and $\vec{B}(x)=E(x)\hat{\vec{e}}_B$, respectively. In cylindrical coordinates ($r,\varphi,{\rm z}$), the latter is given by \begin{equation} E(x)=\sum_{l,p}{\mathfrak E}_{l,p} \,{\rm e}^{-(\frac{{\rm z}-t}{\tau/2})^2}\biggl(\frac{\sqrt{2}r}{w({\rm z})}\biggr)^{|l|} L^{|l|}_p\Bigl(\bigl(\tfrac{\sqrt{2}r}{w({\rm z})}\bigr)^2\Bigr)\,\frac{w_0}{w({\rm z})}\,{\rm e}^{-(\frac{r}{w({\rm z})})^2}\, \cos\bigl(\Phi_{l,p}(x)+\varphi_{l,p}\bigr)\,, \label{eq:E} \end{equation} with \begin{equation} \Phi_{l,p}(x)=\Omega({\rm z}-t)+\frac{\rm z}{{\rm z}_R} \Bigl(\frac{r}{w({\rm z})}\Bigr)^2-(|l|+2p+1)\arctan\Bigl(\frac{\rm z}{{\rm z}_R}\Bigr)-l\varphi\,. \label{eq:Phi} \end{equation} The radial focus profile is $E(r):=E(x)|_{{\rm z}=t=0}$. Here, $\Omega$ is the oscillation frequency of the beam, $w_0$ its waist and ${\rm z}_R=\frac{\pi w_0^2}{\lambda}$ its Rayleigh range; $w({\rm z})=w_0\sqrt{1+(\frac{\rm z}{{\rm z}_R})^2}$. The sums over $l$ and $p$ run over all modes constituting the beam. The peak field amplitude of a given mode ($l,p$) is ${\mathfrak E}_{l,p}$, and $\varphi_{l,p}$ denote mode specific phase factors. To describe high-intensity laser pulses of finite energy, we have moreover supplemented the paraxial beam solution by a Gaussian temporal pulse profile of duration $\tau$, ensuring that it reaches its maximum in the beam focus at $t={\rm z}=0$. This {\it ad hoc} modification gives rise to violations of Maxwell's equations in vacuum of ${\cal O}(\frac{1}{\tau\Omega})$, and hence should yield reliable results for $\tau\Omega\gg1$ \cite{Karbstein:2015cpa,Karbstein:2017jgh}. The latter criterion is typically met for state-of-the-art high-intensity laser pulses. On the other hand, the paraxial approximation neglects terms of ${\cal O}(\theta)$, where $\theta\simeq\frac{w_0}{{\rm z}_R}$ is the radial beam divergence in the far-field. Correspondingly, the photon polarization tensor in this field configuration constitutes the central input for the present study. More specifically, throughout this article we only account for the quasi-elastic contribution to the photon polarization tensor characterized by $k'^0\approx k^0$, and neglect manifestly inelastic contributions, which depend on the oscillation frequency $\Omega$ of the high-intensity laser. The latter are characterized by a finite energy transfer of the order of $2\Omega$, such that $k'^0\approx k^0\pm2\Omega$, corresponding to the absorption/release of two high-intensity laser photons by the x-ray probe. These inelastic contributions are substantially suppressed as compared to the elastic one for the x-ray photon scattering scenario discussed here; cf. also Refs.~\cite{Karbstein:2015xra,Karbstein:2016lby}. To keep this article self-contained, we reproduce the result \cite{Karbstein:2017jgh} for the photon polarization tensor in a linearly polarized pulsed LG beam here. Taking into account the quasi-elastic contribution only, it can be represented as \begin{equation} \Pi^{\rho\sigma}(-k',k) = \frac{\alpha}{\pi}\frac{1}{45} \Bigl[ 4\,(k'\hat F)^\rho (k\hat F)^\sigma + 7\,(k'\,{}^\star\!\hat F)^\rho (k\,{}^\star\!\hat F)^\sigma \Bigr]\Pi(k-k') \,, \label{eq:Piexpl} \end{equation} with \begin{align} \Pi(k-k') = &\sum_{l,p}\sum_{l',p'}\frac{e{\mathfrak E}_{l,p}}{m_e^2}\frac{e{\mathfrak E}_{l',p'}}{m_e^2}\,(2{\rm z}_R \, \pi w_0^2)\, \frac{\tau}{2}\sqrt{\frac{\pi}{2}}\,{\rm e}^{-\frac{1}{8}(\frac{\tau}{2})^2(k^0-k'^0)^2} \nonumber\\ &\times\frac{1}{16}\sum_{j=0}^p\sum_{j'=0}^{p'}\frac{(-\sqrt{2})^{|l|+|l'|}}{ j!j'!}\binom{p+|l|}{p-j}\binom{p'+|l'|}{p'-j'} \nonumber\\ &\times\sum_{\ell=\pm}{\rm e}^{ i \ell(\varphi_{l,p}-\varphi_{l',p'})} \bigl[1+{\rm sign}\bigl(\ell(N-N')\bigr)\partial_{h_{\rm z}}\bigr]^{|N-N'|}\, \partial_c^{j+j'} \nonumber\\ &\quad\times \bigl( i \partial_{h_{\rm x}}+{\rm sign}(l\ell)\partial_{h_{\rm y}}\bigr)^{|l|}\bigl( i \partial_{h_{\rm x}}-{\rm sign}(l'\ell)\partial_{h_{\rm y}}\bigr)^{|l'|} \nonumber\\ &\quad\times \frac{1}{c}F_{|N-N'|+|l|+|l'|}\bigl(h_{\rm z}-{\rm z}_R[(k-k')\hat\kappa],\tfrac{[w_0(\vec{k}_\perp-\vec{k}_\perp')+\vec{h}_\perp]^2}{8c}\bigr) \Big|_{c=1,\,\vec{h}=0}\,, \end{align} reflecting the fact that the leading contribution of the polarization tensor considered here is quadratic in the background field. To keep this expression compact, we made use of the shorthand notations $\hat{\kappa}^\mu=(1,\hat{\vec{e}}_{\rm z})$, $\vec{k}_\perp=\vec{k}-(\vec{k}\cdot\hat{\vec{e}}_{\rm z})\hat{\vec{e}}_{\rm z}$, $N=|l|+2p$ and the following definition \begin{align} F_\Lambda\bigl(a,b\bigr):&=\int_{-\infty}^\infty\frac{\rm dz}{{\rm z}_R}\, \Bigl(\frac{w_0}{w({\rm z})}\Bigr)^\Lambda \,{\rm e}^{- i a\frac{\rm z}{{\rm z}_R}-b\,(\frac{w({\rm z})}{w_0})^2} \nonumber\\ &= \delta_{0,\Lambda}\sqrt{\frac{\pi}{b}}\,{\rm e}^{-\frac{1}{b}(\frac{a}{2})^2-b} + (1-\delta_{0,\Lambda}) \frac{\sqrt{\pi}}{\Gamma(\frac{\Lambda}{2})}\int_0^\infty\frac{{\rm d}s}{s}\,\frac{s^{\frac{\Lambda}{2}}}{\sqrt{s+b}}\,{\rm e}^{-\frac{1}{s+b}(\frac{a}{2})^2-(s+b)} \,. \label{eq:F} \end{align} The representation in the lower line is particularly convenient when aiming at a numeric evaluation of the function. For real-valued arguments $a$ and $b$ it is manifestly real-valued and does not exhibit an oscillatory behavior. The four-vectors spanning tensor structure in \Eqref{eq:Piexpl} can be expressed as \cite{Karbstein:2015cpa} \begin{align} (k\hat F)^{\mu}&=(k\hat\kappa)\hat{e}^\mu_E-(k \hat{e}_E)\hat\kappa^\mu\,, \nonumber\\ (k\,{}^\star\!\hat F)^{\mu}&=(k\hat\kappa)\hat{e}^\mu_B-(k \hat{e}_B)\hat\kappa^\mu\,, \end{align} where $\hat{e}_E^\mu=(0,\hat{\vec{e}}_E)$ and $\hat{e}_B^\mu=(0,\hat{\vec{e}}_B)$. Note that as $\lim_{\tau\to\infty}\frac{\tau}{2}\sqrt{\frac{\pi}{2}}\,{\rm e}^{-\frac{1}{8}(\frac{\tau}{2})^2(k^0-k'^0)^2} = 2\pi\,\delta(k^0-k'^0)$, in the limit of an infinitely long pulse duration $\tau$ we recover a strictly elastic contribution. Furthermore, note that the electric peak field strength of a given mode can be straightforwardly related to the energy put into that mode as \cite{Karbstein:2017jgh} \begin{equation} {\mathfrak E}_{l,p}^2\simeq 8\sqrt{\frac{2}{\pi}}\frac{p!}{(p+|l|)!}\frac{W_{l,p}}{\pi w_0^2\tau}\,. \label{eq:Equad} \end{equation} The total laser pulse energy is given by \begin{equation} W=\sum_{l,p}W_{l,p}\,. \label{eq:W} \end{equation} For convenience, we also make use of the definition \begin{equation} E_0^2\simeq 8\sqrt{\frac{2}{\pi}}\frac{W}{\pi w_0^2\tau}\,, \end{equation} corresponding to the peak field strength squared, or equivalently peak intensity, of a fundamental Gaussian pulse of energy $W$. As in Ref.~\cite{Karbstein:2015xra}, we assume the incident x-ray probe to be linearly polarized and in the interaction volume to be described by \begin{equation} A_\nu(x)=\frac{1}{2}\frac{\cal E}{\omega}\epsilon_{\nu}(\hat{k}){\rm e}^{ i \omega(\hat{k}x+t_0)-(\frac{\hat{k}x+t_0}{T/2})^2} . \label{eq:xray} \end{equation} Here, ${\cal E}$ is the peak electric field amplitude, $T$ the pulse duration and $\omega$ the oscillation frequency. The pulse is propagating in direction $\hat{\vec{k}}$ (the associated four-vector is $\hat{k}^\mu=(1,\hat{\vec{k}})$) and its polarization vector is $\epsilon_{\nu}(\hat{k})=(0,\vec{\epsilon}\,(\hat{k}))$. Finally, $t_0$ accounts for a finite temporal offset; i.e., the peak field is reached at $t=\hat{\vec{k}}\cdot\vec{x}+t_0$. Equation~\eqref{eq:xray} fulfills Maxwell's equations in vacuum up to corrections of ${\cal O}(\frac{1}{T\omega})$ and thus constitutes a viable approximation for pulse durations fulfilling $T\omega\gg1$. In this limit, the peak field amplitude can be related to the probe mean intensity $\langle I\rangle$ as ${\cal E}=\sqrt{2\langle I\rangle}$, The mean intensity can be expressed as $\langle I\rangle=J\omega$ in terms of the probe photon current density $J=\sqrt{\frac{8}{\pi}}\frac{N_{\rm in}}{\sigma T}$, which measures the number $N_{\rm in}$ of x-ray photons available for probing per transverse area $\sigma$ and time interval $T$. Formally, the field~\eqref{eq:xray} only depends on the longitudinal coordinate and is infinitely extended in the transverse directions. On the other hand, the studied signal of quantum vacuum nonlinearity is only induced in the overlap region of both the x-ray and the high-intensity laser fields and its amplitude scales quadratic with the high-intensity field strength. Hence, to a quite good approximation this field can nevertheless be considered as mimicking the field of a weakly focused fundamental-mode Gaussian x-ray probe field in the vicinity of its beam focus: the important criterion is that the waist $w_{\rm probe}$ is much wider than the focal spot of the high-intensity laser field. The effective interaction of the x-ray probe~\eqref{eq:xray} with the strong electromagnetic field of the high-intensity laser pulse accounted for in the photon polarization tensor~\eqref{eq:Piexpl} gives rise to a signal photon current \begin{equation} j^\mu(x')=\int\frac{{\rm d}^4x}{(2\pi)^4}\,\Pi^{\mu\nu}(x',x)A_\nu(x)\,. \label{eq:j_pos} \end{equation} Taking into account the explicit form of the probe field given in \Eqref{eq:xray}, in momentum space the latter can be expressed as \begin{equation} j^\mu(k')=\sqrt{\frac{J}{2\omega}}\,{\cal M}^{\mu\nu}(-k',k)\epsilon_{\nu}(\hat{k})\,, \label{eq:j_mom} \end{equation} where we defined \cite{Karbstein:2015xra} \begin{equation} {\cal M}^{\mu\nu}(-k',k)=\sqrt{\pi}\,\frac{T}{2}\,{\rm e}^{-(\frac{2t_0}{T})^2}\int\frac{{\rm d}\tilde\omega}{2\pi}\,{\rm e}^{-\frac{1}{4}(\frac{T}{2})^2(\tilde\omega-\omega)^2+it_0\tilde\omega}\,\Pi^{\mu\nu}(-k',\tilde\omega\hat{k})\,. \label{eq:M} \end{equation} Subsequently we will also make use of the following definition, \begin{equation} {\cal M}(k-k')=\sqrt{\pi}\,\frac{T}{2}\,{\rm e}^{-(\frac{2t_0}{T})^2}\int\frac{{\rm d}\tilde\omega}{2\pi}\,{\rm e}^{-\frac{1}{4}(\frac{T}{2})^2(\tilde\omega-\omega)^2+it_0\tilde\omega}\,\frac{\tilde\omega}{\omega}\Pi(\tilde\omega\hat{k}-k')\,. \label{eq:Ms} \end{equation} For completeness, note that these quantities fulfill $\lim_{T\to\infty}{\cal M}^{\mu\nu}(-k',k)={\rm e}^{ i t_0\omega}\,\Pi^{\mu\nu}(-k',k)$ and analogously $\lim_{T\to\infty}{\cal M}(k-k')={\rm e}^{ i t_0\omega}\,\Pi(k-k')$ with $k^\mu=\omega\hat{k}^\mu$. The amplitude for the emission of a signal photon of four-momentum $k'^\mu=\omega'(1,\hat{\vec{k}}')$ and polarization vector $\epsilon_\mu^{(p)}(\hat{k}')$ is given by ${\cal S}_{(p)}(k')=\frac{\epsilon_\mu^{*(p)}(\hat{k}')}{\sqrt{2\omega'}}j^\mu(k')$, wherefrom the associated differential signal photon number far outside the interaction region follows as ${\rm d}^3N^{(p)}=\frac{{\rm d}^3k'}{(2\pi)^3}\bigl|{\cal S}_{(p)}(k')\bigr|^2$ \cite{Karbstein:2014fva}. In turn, we obtain \begin{equation} {\rm d}^3N^{(p)}=\frac{{\rm d}^3k'}{(2\pi)^3}\biggl|\frac{\epsilon_\mu^{*(p)}(\hat{k}')}{\sqrt{2\omega'}} {\cal M}^{\mu\nu}(-k',k) \frac{\epsilon_{\nu}(\hat{k})}{\sqrt{2\omega}}\biggr|^2 J\,. \label{eq:dNp} \end{equation} As we primarily aim at studying the effect of the transverse high-intensity laser profile in the focus on the signal, in the present article we exclusively limit ourselves to counter-propagating beams, i.e., the special case of $\hat{\vec{k}}^\mu=(1,-\hat{\vec{e}}_{\rm z})$. Moreover, we assume a linearly polarized x-ray probe and without loss of generality choose it to be polarized in $\rm x$ direction, i.e., $\epsilon_\nu(\hat{k})=(0,\hat{\vec{e}}_{\rm x})$. On the other hand, the signal photons can in principle be emitted in arbitrary directions. We parameterize their emission directions in spherical coordinates as $\hat{\vec{k}}'=(\cos\varphi'\sin\vartheta',\sin\varphi'\sin\vartheta',-\cos\vartheta')$ and their polarization vectors as ${\epsilon}^{(p)}_\mu(\hat{k})=(0,\sin\beta'\,\hat{\vec{k}}'|_{\vartheta=\frac{\pi}{2},\varphi'\to\varphi'+\frac{\pi}{2}}-\cos\beta'\,\hat{\vec{k}}'|_{\vartheta'\to\vartheta'+\frac{\pi}{2}})$ by means of the additional angle parameter $\beta'$. For this choice, \Eqref{eq:dNp} can be represented as \begin{align} {\rm d}^3N^{(p)} =\ &\frac{{\rm d}^3k'}{(2\pi)^3}\Bigl(\frac{1}{90}\frac{\alpha}{\pi}\Bigr)^2 \omega'\omega\, (1+\cos\vartheta')^2 \bigl[11\cos(\varphi'-\beta')-3\cos(\varphi'-\beta'-2\phi)\bigr]^2 \nonumber\\ &\times\bigl|{\cal M}(k-k')\bigr|^2 J\,. \label{eq:dNpexpl} \end{align} Note, that the entire polarization dependence of both the x-ray probe (controlled by $\phi$) and the signal photons ($\beta'$) is encoded in the last term in the first line of \Eqref{eq:dNpexpl}. As the high-intensity laser pulse is characterized by frequencies much smaller than the x-ray frequency, it can only weakly impact the kinematics of x-ray photons. Correspondingly, the signal photons are mainly emitted in the forward direction of the x-ray probe and decay rapidly with the polar angle $\vartheta'\ll1$ \cite{Karbstein:2015xra,Karbstein:2016lby}. \subsection{ Generic rotationally symmetric high-intensity pumps} The total number of signal photons ${\rm d}^3N^{\rm tot}(k')=\sum_{p}{\rm d}^3N^{(p)}(k')$ attainable in a polarization insensitive measurement is obtained by summing \Eqref{eq:dNpexpl} over two orthogonal signal photon polarizations, differing by an angle of $\frac{\pi}{2}$ in the parameter $\beta'$. On the other hand, the effect of vacuum birefringence manifests itself in polarization-flipped signal photons ${\rm d}^3N^{\perp}(k')$. The latter are characterized by the condition $\vec{\epsilon}(\hat{k})\cdot\vec{\epsilon}^{\,(p)}(\hat{k}' )=0$, which is enforced by choosing $\beta'=-\arctan(\cos\vartheta'\cot\varphi')$. For $\vartheta'\ll1$, this simplifies to $\beta'\simeq(\varphi'\ {\rm mod}\ \pi)-\frac{\pi}{2}$. In turn, from \Eqref{eq:dNpexpl} we obtain \begin{align} \left\{\begin{array}{c} {\rm d}^3N^{\rm tot} \\ {\rm d}^3N^{\perp} \end{array}\right\} \simeq\ \frac{{\rm d}^3k'}{(2\pi)^3}\Bigl(\frac{1}{45}\frac{\alpha}{\pi}\Bigr)^2 \omega'\omega \left\{\begin{array}{c} 130-66\cos(2\phi) \\ 9\sin^2(2\phi) \end{array}\right\}\bigl|{\cal M}(k-k')\bigr|^2 J\,. \label{eq:dNtotperp} \end{align} Obviously, the induced signal photon numbers ${\rm d}^3N^{\rm tot}$ and ${\rm d}^3N^{\perp}$ become maximum for different choices of the angle $\phi$. While ${\rm d}^3N^{\rm tot}$ is maximized for an angle of $\phi=(\frac{\pi}{2}\ {\rm mod}\ \pi)$ between the polarization vectors of the counter-propagating electromagnetic beams, the optimal choice for ${\rm d}^3N^\perp$ is $\phi=(\frac{\pi}{4}\ {\rm mod}\ \frac{\pi}{2})$. Keeping all other parameters fixed, the corresponding maximum numbers fulfill $N^{\rm tot}_{\rm max}/N^\perp_{\rm max}=196/9\approx21.8$. The integration over $\tilde\omega$ can be performed explicitly, such that the expression in the modulus in \Eqref{eq:dNtotperp} can be written as \begin{align} {\cal M}(k-k') =\ &\pi\alpha\,\frac{2{\rm z}_R}{m_e^3\omega}\frac{\frac{T}{2}}{\sqrt{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}}\,\Bigl(\omega+\frac{\tfrac{1}{2}(\tfrac{\tau}{2})^2\delta\omega+2( i t_0+2{\rm z}_R\partial_{h_{\rm z}})}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\Bigr) \nonumber\\ &\times{\rm e}^{-\frac{\frac{1}{2}(\frac{\tau}{2})^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}[(\frac{T}{2})^2(\frac{\delta\omega}{2})^2- i t_0\delta\omega]}\, {\rm e}^{\frac{(2{\rm z}_R)^2-t_0^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}-(\frac{2t_0}{T})^2+ i t_0\omega} \nonumber\\ &\times\sum_{l,p}\sum_{l',p'} \,\sqrt{\frac{W_{l,p}}{m_e}\frac{W_{l',p'}}{m_e}}\sum_{j=0}^p\sum_{j'=0}^{p'}\frac{(-\sqrt{2})^{|l|+|l'|}}{ j!j'!} \nonumber\\ &\times \,\frac{\sqrt{(p+|l|)!p!(p'+|l'|)!p'!}}{(p-j)!(|l|+j)!(p'-j')!(|l'|+j')!}\, \partial_c^{j+j'} \nonumber\\ &\times\sum_{\ell=\pm}{\rm e}^{ i \ell(\varphi_{l,p}-\varphi_{l',p'})} \bigl[1+{\rm sign}\bigl(\ell(N-N')\bigr)\partial_{h_{\rm z}}\bigr]^{|N-N'|} \nonumber\\ &\quad\times \bigl( i \partial_{h_{\rm x}}+{\rm sign}(l\ell)\partial_{h_{\rm y}}\bigr)^{|l|}\bigl( i \partial_{h_{\rm x}}-{\rm sign}(l'\ell)\partial_{h_{\rm y}}\bigr)^{|l'|} \nonumber\\ &\quad\times \frac{1}{c}F_{|N-N'|+|l|+|l'|}\bigl(\bar{a},\bar{b}\bigr) \bigg|_{c=1,\,\vec{h}=0}, \label{eq:intdomegatilde} \end{align} with \begin{align} \bar{a}&=h_{\rm z}+2{\rm z}_R\Bigl[\frac{1+\hat{k}_{\rm z}'}{2}(\omega+\delta\omega)-\frac{(\frac{T}{2})^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\delta\omega+\frac{2 i t_0}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\Bigr]\,, \nonumber\\ \bar{b}&=\frac{[\vec{h}_\perp-w_0(\omega+\delta\omega)\hat{\vec{k}}_\perp']^2}{8c}+\frac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\,, \label{eq:bara+barb} \end{align} and $\omega'=\omega+\delta\omega$. The Gaussian term $\sim{\rm e}^{-\#\delta\omega^2}$ in the second line of \Eqref{eq:intdomegatilde} ensures that the signal photon energy is peaked at $\omega'=\omega$ and falls off rapidly towards smaller and larger energies. The associated $1/{\rm e}$ half width is $\delta\omega=2\sqrt{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}/\sqrt{\frac{1}{2}(\frac{\tau}{2})^2(\frac{T}{2})^2}$. To arrive at the expression in \Eqref{eq:intdomegatilde} we made use of the representation of $F_\Lambda(.,.)$ in the first line of \Eqref{eq:F}: performing the integration over $\tilde\omega$, the result can again be expressed in terms of $F_\Lambda(.,.)$ with shifted arguments. Equations~\eqref{eq:dNtotperp}-\eqref{eq:bara+barb} constitute our most general results. \subsection{Analytical insights for high-intensity pumps with $l=0$}\label{subsec:approx} In the remainder of this article we exclusively focus on the special case of pump fields spanned by LG$_{0,p}$ modes only, i.e., consider the sector characterized by $l=l'=0$. This amounts to the sector of light without orbital angular momentum \cite{Allen:1992zz}. Besides we consider only optimal collisions with vanishing temporal offset, i.e., set $t_0=0$. In this case, \Eqref{eq:intdomegatilde} simplifies significantly and features only parameter differentiations for $c$ and $h_{\rm z}$, allowing us to set $\vec{h}_\perp=0$ from the outset. Additional simplifications are possible in the parameter regime where $\bar a$ is small. From the representation of $F_\Lambda(.,.)$ given in the second line of \Eqref{eq:F} we infer that the precise criterion is $(\frac{\bar a}{2})^2/{\bar b}\ll1$. Taking the above $1/{\rm e}$ half width as a measure of the typical spread of $\delta\omega$, this can be translated to the physical conditions \begin{equation} \{\vartheta',\tau\omega\vartheta'^2,T/\tau\}\ll1 \quad \text{and} \quad \frac{\tau}{2{\rm z}_R}\lesssim{\cal O}(1) \,. \label{eq:approxconds} \end{equation} For completeness, note that the conditions~\eqref{eq:approxconds} ensure $(\frac{\bar a}{2})^2/{\bar b}\ll1$ for all polar angle $0\leq\vartheta'\ll1$. Requiring this criterion to be met only for angles $\vartheta'_0\leq\vartheta'\ll1$ beyond a certain minimum value $\vartheta'_0$, less restrictive conditions can be derived along the same lines. Accounting only for the leading order terms, in this parameter regime the quantities defined in \Eqref{eq:bara+barb} simplify significantly and read \begin{align} \bar{a}\simeq h_{\rm z}\,, \quad \bar{b}\simeq\frac{(w_0\omega\vartheta')^2}{8c}+\frac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\,. \label{eq:barabarbsimp} \end{align} Moreover, the terms in the round brackets in the first line of \Eqref{eq:intdomegatilde} become $\simeq\omega$. As will be shown in Sec.~\ref{sec:results} below, the above assumptions are fully compatible with typical XFEL and high-intensity laser parameters. Under the above assumptions, \Eqref{eq:intdomegatilde} can be expressed as \begin{align} {\cal M}(k-k')\simeq\ &2\pi\alpha\,\frac{2{\rm z}_R}{m_e^3}\frac{\frac{T}{2}}{\sqrt{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}}\, {\rm e}^{-\frac{\frac{1}{2}(\frac{\tau}{2})^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}(\frac{T}{2})^2(\frac{\delta\omega}{2})^2}\, {\rm e}^{\frac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}}\, \sum_{p,p'} {\cal I}_{p,p'}\,, \label{eq:intdomegatilde0} \end{align} where we introduced the shorthand notation \begin{align} {\cal I}_{p,p'}=\ &\sqrt{\frac{W_{0,p}}{m_e}\frac{W_{0,p'}}{m_e}}\,\cos(\varphi_{0,p}-\varphi_{0,p'}) \nonumber\\ &\times\sum_{j=0}^p\sum_{j'=0}^{p'} \binom{p}{j}\binom{p'}{j'}\frac{\partial_c^{j+j'}}{ j!j'!} \frac{1}{c}F_{2|p-p'|}\Bigl(0,\tfrac{(w_0\omega\vartheta')^2}{8c}+\tfrac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\Bigr) \bigg|_{c=1}. \label{eq:Ipp'} \end{align} Note, that \Eqref{eq:Ipp'} depends on the polar angle $\vartheta'$ only via the combination $w_0\omega\vartheta'$. In the considered limit, the function $F_{\Lambda}(.,.)$ introduced in \Eqref{eq:F} has the following representation in terms of standard functions and the error function ${\rm erf}(.)$, \begin{align} F_{2n}\bigl(0,b\bigr)= \delta_{0,n}\sqrt{\frac{\pi}{b}}\,{\rm e}^{-b} + (1-\delta_{0,n}) \frac{\pi}{(n-1)!}\,(-\partial_u)^{n-1}\frac{1}{\sqrt{u}}\,{\rm e}^{b(u-1)}\bigl[1-{\rm erf}(\sqrt{bu})\bigr]\bigg|_{u=1} \,, \label{eq:F0} \end{align} where $n=|p-p'|\in\mathbb{N}_0$; cf. formula 3.362.2 of \cite{Gradshteyn}. In a next step we aim at integrating the differential numbers~\eqref{eq:dNtotperp} over the signal photon energy $\omega'$ and the azimuthal angle $\varphi'$. Within the accuracy of the above approximations, we have $\omega'{\rm d}^3k'\simeq \omega^3\vartheta'{\rm d}\vartheta'{\rm d}\omega'{\rm d}\varphi'$, and the limits of the Gaussian integration over the signal photon energy $\omega'$, or equivalently $\delta\omega$, can be formally extended to $\pm\infty$, allowing for a straightforward analytical integration. Besides, the rotational symmetry of the considered head-on collision scenario around the common beam axis of the driving fields renders the integration over $\varphi'$ trivial. The result for the differential numbers of signal photons is \begin{align} \left\{\begin{array}{c} {\rm d}N^{\rm tot} \\ {\rm d}N^{\perp} \end{array}\right\} \simeq\ &\vartheta'{\rm d}\vartheta'\Bigl(\alpha\frac{\omega}{m_e}\Bigr)^4\frac{T}{\tau}\Bigl(\frac{1}{45\pi}\frac{2{\rm z}_R}{m_e}\Bigr)^2 \left\{\begin{array}{c} 130-66\cos(2\phi) \nonumber\\ 9\sin^2(2\phi) \end{array}\right\} \\ &\times\frac{2\sqrt{\pi}}{\sqrt{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}}\, \, {\rm e}^{\frac{2(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}}\, \Bigl|\sum_{p,p'} {\cal I}_{p,p'}\Bigr|^2 J\,. \label{eq:dNtotperp_dcostheta} \end{align} Aiming at the explicit evaluation of this expression, it is convenient to decompose the sums over $p$ and $p'$ in \Eqref{eq:dNtotperp_dcostheta} into diagonal and off-diagonal parts as \begin{equation} \sum_{p=0}^{\cal N}\sum_{p'=0}^{\cal N} {\cal I}_{p,p'} = \sum_{p=0}^{\cal N} {\cal I}_{p,p} + 2\sum_{p=0}^{\cal N}\sum_{p'=0}^{p-1} {\cal I}_{p,p'}\,. \end{equation} On the other hand, the far-field angular decay of a fundamental-mode Gaussian probe of waist $w_{\rm probe}$ encompassing $N_{\rm in}$ photons is given by \begin{equation} \frac{{\rm d}N_{\rm in}}{{\rm d}\vartheta'\vartheta'}\simeq N_{\rm in}(w_{\rm probe}\omega)^2\,{\rm e}^{-\frac{1}{2}(w_{\rm probe}\omega\vartheta')^2}\,. \label{eq:dNin} \end{equation} \section{Exemplary results}\label{sec:results} Subsequently, we aim at studying the effect of different transverse profiles of the high-intensity laser on the scattering signal. To this end, we briefly focus on Gaussian laser fields prepared in a pure LG mode with $l=0$, and on the class of flattened Gaussian beams introduced in Ref.~\cite{Gori:1994}, which closely resemble super-Gaussian laser fields \cite{Palma:1994}. In our explicit examples, we stick to the experimentally realistic parameters adopted in Ref.~\cite{Karbstein:2015xra} for the study of vacuum birefringence in the collision of an XFEL probe pulse with a fundamental-mode (${\rm LG}_{0,0}$) Gaussian high-intensity pump. To be specific, we assume the XFEL to deliver pulses of duration $T=10\,{\rm fs}\simeq15.20\,{\rm eV}^{-1}$, comprising $N_{\rm in}=10^{12}$ photons at an energy of $\omega=12914\,{\rm eV}$. The polarization purity of x-ray photons of this energy can be measured to the level of ${\cal P}=5.7\times10^{-10}$ \cite{Marx:2011,Marx:2013xwa}. For the parameters of the counter-propagating high-intensity laser field we assume a pulse energy of $W=30\,{\rm J}\simeq1.87\times10^{20}\,{\rm eV}$, a pulse duration of $\tau=30\,{\rm fs}\simeq45.60\,{\rm eV}^{-1}$ and a wavelength of $\lambda=800\,{\rm nm}\simeq4.06\,{\rm eV}^{-1}$, representing a typical state-of-the-art high-intensity laser system of the petawatt class. As a realistic estimate for the beam waist of the fundamental mode we choose $w_0=1000\,{\rm nm}\simeq5.07\,{\rm eV}^{-1}$. The corresponding Rayleigh range is ${\rm z}_R\simeq19.89\,{\rm eV}^{-1}$. The radius of the probe $w_\text{probe}$ determining the transverse area $\sigma=\pi w_\text{probe}^2$ is assumed to be given by $w_\text{probe}=3w_0$. For these parameters we have $\tau\omega\simeq 5.89\times10^{5}$, such that the criterion $\{\vartheta',\tau\omega\vartheta'^2\}\ll1$ adopted in the derivation of the compact approximate expression for the differential signal photon number~\eqref{eq:dNtotperp_dcostheta} translates into the constraint $\vartheta'\ll0.001\,{\rm rad}$. Because of $T/\tau=\frac{1}{3}$ and $\frac{\tau}{2{\rm z}_R}\simeq1.15$, the additional criteria are also well met, justifying the use of the approximate expressions in the exemplary studies presented below. As a further indication of the applicability of the approximate expressions in the considered parameter regime, see the good agreement of the results of a direct numerical evaluation of Eqs.~\eqref{eq:dNtotperp}-\eqref{eq:bara+barb} and the analytical approximation~\eqref{eq:dNtotperp_dcostheta} highlighted in Fig.~\ref{fig:LG} for the case of an ${\rm LG}_{1,0}$ pump. Apart from this, all the results presented in the remainder of this article are based on the approximate expression~\eqref{eq:dNtotperp_dcostheta} for the differential number of attainable signal photons detailed in Sec.~\ref{subsec:approx}. \subsection{Pure Laguerre-Gaussian modes}\label{subsec:LG} For the special case of the high-intensity laser field corresponding to a pure LG{$_{0,p}$} mode, characterized by $l=0$ and a fixed value of $p\in\mathbb{N}_0$, we have \begin{align} \sum_{p,p'}{\cal I}_{p,p'}\to{\cal I}_{p,p}=\ &\frac{W_{0,p}}{m_e}\sum_{j=0}^p\sum_{j'=0}^{p} \binom{p}{j}\binom{p}{j'}\frac{\partial_c^{j+j'}}{ j!j'!} \nonumber\\ &\times \frac{\sqrt{\pi}}{c}\,\Bigl(\frac{(w_0\omega\vartheta')^2}{8c}+\frac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\Bigr)^{-\frac{1}{2}}\,{\rm e}^{-\frac{(w_0\omega\vartheta')^2}{8c}-\frac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}} \bigg|_{c=1}, \label{eq:Ipp} \end{align} with $W_{0,p}=W$. Upon insertion of this expression into \Eqref{eq:dNtotperp_dcostheta}, it is straightforward to determine the differential number of x-ray signal photons arising from the effective interaction of the x-ray probe with the counter-propagating LG high-intensity laser pulse. \begin{figure}[h] \centering \includegraphics[width=0.67\columnwidth]{combiplot_LG} \caption{Far-field angular decay of the signal~\eqref{eq:dNtotperp_dcostheta} as a function of the polar angle $\vartheta'$ measured from the forward beam axis of the probe for different transverse pump profiles. Here, we consider the pump to be prepared in a pure LG mode; see the inset for the radial intensity profiles in the focus. For comparison, in gray we also highlight the angular decay~\eqref{eq:dNin} of a fundamental Gaussian probe of waist $w_{\rm probe}=3w_0$; $w_0$ is the waist of the fundamental pump mode ${\rm LG}_{0,0}$. The plot is for $\omega=12914\,{\rm eV}$, $\lambda=800\,{\rm nm}$, $w_0=1000\,{\rm nm}$, $T=10\,{\rm fs}$ and $\tau=30\,{\rm fs}$. This plot also highlights the quality of our analytical approximation~\eqref{eq:dNtotperp_dcostheta}: the data points marked by crosses follow from a direct numerical evaluation of Eqs.~\eqref{eq:dNtotperp}-\eqref{eq:bara+barb} for the ${\rm LG}_{1,0}$ scenario. They are in good agreement with the red dashed line obtained from \Eqref{eq:dNtotperp_dcostheta}. } \label{fig:LG} \end{figure} Figure~\ref{fig:LG} depicts the far-field angular decay of the signal photons~\eqref{eq:dNtotperp_dcostheta} as a function of the polar angle $\vartheta'$ for both the fundamental Gaussian mode ${\rm LG}_{0,0}$ studied already in detail in Ref.~\cite{Karbstein:2015xra} and the ${\rm LG}_{1,0}$ mode. As our focus is on normalized quantities, -- apart from the special case of $\sin(2\phi)=0$ -- the results for $N^{\rm tot}$ and $N^\perp$ are described by the same curves. When giving explicit numeric results for the signal photon number $N^{\rm tot}$ ($N^\perp$) in the remainder of this article, we stick to the optimal choice of the angle $\phi=\frac{\pi}{2}$ ($\phi=\frac{\pi}{4}$) maximizing the signal. For small angles $\vartheta'$ the signal photons induced by the ${\rm LG}_{1,0}$ high-intensity laser mode decay faster than those associated with the ${\rm LG}_{0 ,0}$ mode. While the ${\rm LG}_{0,0}$ signal is monotonically decreasing to zero for larger $\vartheta'$, the ${\rm LG}_{1,0}$ signal exhibits an additional peak in the vicinity of $\vartheta'\approx70\,\mu{\rm rad}$. The integrated total numbers of signal photons are $N^{\rm tot}\simeq23.77$ ($N^{\rm tot}\simeq11.57$) per shot for the case of the ${\rm LG}_{0,0}$ (${\rm LG}_{1,0}$) pump. These numbers have to be compared with the huge number $N_{\rm in}\simeq10^{12}$ probe photons of the same energy, traversing the interaction region essentially unaltered and constituting the background from which the elastic signal is to be discriminated. On the other hand, the number of signal photons contained within a ring around the beam axis delimited by $\vartheta'_{\rm min}=50\,\mu{\rm rad}$ and $\vartheta'_{\rm max}=100\,\mu{\rm rad}$ -- i.e., the angular interval where the side peak in the ${\rm LG}_{1,0}$ signal is located -- is $N^{\rm tot}_\circ\simeq1.31$ ($N^{\rm tot}_\circ\simeq4.50$), which is to be compared with the negligible number of probe photons $N_{{\rm in},\circ}\simeq1.14\times10^{-9}$ contained in the same angular interval. For the perpendicularly polarized signal photons, the criterion for the principle possibility of their measurement with a polarimeter of polarization purity $\cal P$ is ${\rm d}N^\perp\geq{\cal P}{\rm d}N_{\rm in}$. We call signal photons meeting this criterion {\it discernible}. This criterion is fulfilled for signal photons scattered outside $\vartheta'_==22.36\,\mu{\rm rad}$ ($\vartheta'_==24.38\,\mu{\rm rad}$) for the ${\rm LG}_{0,0}$ (${\rm LG}_{1,0}$) pump. The corresponding number of discernible signal photons per shot is $N^\perp_{\rm dis}\simeq0.61$ ($N^\perp_{\rm dis}\simeq0.34$). Generically, we observe that the differential numbers of x-ray signal photons~\eqref{eq:dNtotperp_dcostheta} attainable in the head-on collision with a pure ${\rm LG}_{p,0}$ high-intensity pump exhibits $p$ side peaks at finite values of $\vartheta'$. Next-to-leading side peaks tend to be shifted to larger values of $\vartheta'$ and/or contain lower numbers of signal photons. They might, however, be employed to induce interference phenomena in the all-optical parameter regime, reminiscent of those discussed for multi-beam configurations in Refs.~\cite{Hatsagortsyan:2011,King:2013am}. Also note, that the fact that Eqs.~\eqref{eq:Ipp'}, \eqref{eq:dNtotperp_dcostheta} and \eqref{eq:dNin} depend on $\vartheta'$ only via the combination $w_0\omega\vartheta'$ implies that -- keeping all the other parameters fixed --- the results for the normalized angular decay of the signal and probe photons depicted in Fig.~\ref{fig:LG} can straightforwardly be rescaled to another x-ray photon energy $\omega^\ast$ as $\vartheta'\to\frac{\omega}{\omega^\ast}\vartheta'$. The same is true for Figs.~\ref{fig:FGB} and \ref{fig:FGBGauss} discussed below. \subsection{Flattened Gaussian beams}\label{subsec:FGB} The class of flattened Gaussian beams (FGBs) encompasses infinitely many representatives, which are labeled by a positive integer $\cal N$ and defined via the focus profile \cite{Gori:1994} \begin{equation} E_{\cal N}(r)=E_{0,{\cal N}}\,{\rm e}^{-(\frac{r}{w_0})^2}\sum_{k=0}^{\cal N}\frac{1}{k!}\Bigl(\frac{r}{w_0}\Bigr)^{2k} \,, \label{eq:EN} \end{equation} where $E_{0,{\cal N}}$ denotes the peak field amplitude. Equation~\eqref{eq:EN} contains the fundamental Gaussian beam (${\cal N}=0$), and approaches a constant transverse field in the limit of ${\cal N}\to\infty$. Generically speaking, the larger $\cal N$, the larger the effective waist $w_{\cal N}$ of the beam and the wider the flattened, plateau-like region about ${\rm z}=0$; cf. Fig.~\ref{fig:FGB} for a graphical illustration. An alternative representation of \Eqref{eq:EN} is \cite{Gori:1994} \begin{equation} E_{\cal N}(r)=E_{0,{\cal N}}\,{\rm e}^{-(\frac{r}{w_0})^2}\sum_{p=0}^{\cal N} (-1)^p c_p L_p^0\Bigl(\bigl(\tfrac{\sqrt{2}r}{w_0}\bigr)^2\Bigr) , \label{eq:E_G} \end{equation} with coefficients \begin{equation} c_p:=\sum_{k=p}^{\cal N}\binom{k}{p}\frac{1}{2^k}>0\,. \end{equation} Equation~\eqref{eq:E_G} allows for the straightforward implementation of a flattened Gaussian high-intensity laser pulse of order $\cal N$ in the x-ray photon scattering scenario discussed above. From the comparison of \Eqref{eq:E} specialized to $l=0$ and \Eqref{eq:E_G} we infer the following mapping \begin{align} \mathfrak{E}_{0,p}\ \leftrightarrow\ E_{0,{\cal N}} c_p \quad\text{and}\quad \varphi_{0,p}\ \leftrightarrow\ p\pi\,, \label{eq:subs} \end{align} for $0\leq p\leq{\cal N}$ and $\mathfrak{E}_{0,p}=0$ for $p>{\cal N}$. With the help of Eqs.~\eqref{eq:Equad} and \eqref{eq:W}, the peak field amplitude in \Eqref{eq:E_G} can then be expressed as \begin{equation} E_{0,{\cal N}}^2\simeq 8\sqrt{\frac{2}{\pi}}\frac{W}{\pi w_0^2\tau}\frac{1}{C^2_{\cal N}}\,,\quad\text{with}\quad C^2_{\cal N}:=\sum_{p=0}^{\cal N}c_p^2=\sum_{k=0}^{\cal N}\sum_{l=0}^{\cal N}\binom{k+l}{k} \frac{1}{2^{k+l}}\,. \label{eq:E0quad} \end{equation} From \Eqref{eq:E0quad} we can infer that the effective waist of the flattened Gaussian beam of order $\cal N$ is proportional to $C_{\cal N}$, prompting us to define $w_{\cal N}=w_0C_{\cal N}$. In turn, the energy put into the contributing Laguerre-Gaussian modes $(0,p)$ with $p\in\{0,\ldots{\cal N}\}$ is given by \begin{equation} W_{0,p} \simeq \frac{c_p^2}{C^2_{\cal N}} W . \label{eq:W0p} \end{equation} Upon plugging Eqs.~\eqref{eq:subs} and \eqref{eq:W0p} into \Eqref{eq:Ipp'}, resulting in \begin{align} \sum_{p,p'}{\cal I}_{p,p'}\to\ &\frac{W}{m_e}\sum_{p=0}^{\cal N}\sum_{p'=0}^{\cal N}\frac{c_pc_{p'}}{C^2_{\cal N}}\,(-1)^{p-p'} \nonumber\\ &\times\sum_{j=0}^p\sum_{j'=0}^{p'} \binom{p}{j}\binom{p'}{j'}\frac{\partial_c^{j+j'}}{ j!j'!} \frac{1}{c}F_{2|p-p'|}\Bigl(0,\tfrac{(w_0\omega\vartheta')^2}{8c}+\tfrac{(2{\rm z}_R)^2}{(\frac{T}{2})^2+\frac{1}{2}(\frac{\tau}{2})^2}\Bigr) \bigg|_{c=1}, \label{eq:Ipp'FGB} \end{align} we can analyze the differential numbers~\eqref{eq:dNtotperp_dcostheta} of x-ray photons scattered at a focused high-intensity pulse of flattened Gaussian transverse profile. In Fig.~\ref{fig:FGB} we focus on the far-field angular decay of the x-ray signal photons induced in the head-on collision of the x-ray probe with flattened high-intensity Gaussian pumps of different orders $\cal N$. We limit ourselves to ${\cal N}\leq4$, implying that the considered flattened Gaussian focus profiles are -- to a good approximation -- uniformly illuminated by the x-ray probe of waist $w_{\rm probe}=3w_0$; see the inset in Fig.~\ref{fig:FGB}. \begin{figure}[h] \centering \includegraphics[width=0.67\columnwidth]{combiplot_FGB} \caption{Far-field angular decay of the signal~\eqref{eq:dNtotperp_dcostheta} and probe~\eqref{eq:dNin} (gray) for different transverse pump profiles. For the high-intensity pump we consider different order $\cal N$ flattened Gaussian beams~\eqref{eq:EN} of the same pulse energy; see the inset for the radial intensity profiles in the focus. The plot is for $\omega=12914\,{\rm eV}$, $w_{\rm probe}=3w_0$, $\lambda=800\,{\rm nm}$, $w_0=1000\,{\rm nm}$, $T=10\,{\rm fs}$ and $\tau=30\,{\rm fs}$.} \label{fig:FGB} \end{figure} The general trend is as follows: the wider the pump, i.e., the larger $\cal N$, the narrower the scattering signal. At the same time, both the integrated total numbers of signal photons $N^{\rm tot}$ and the numbers of discernible polarization-flipped signal photons $N^\perp_{\rm dis}$ diminish with $\cal N$: \begin{center} \begin{tabular}{c||c|c|c|c|c|} ${\cal N}$ & $0$ & $1$ & $2$ & $3$ & $4$ \\ \hline \hline $N^{\rm tot}$ & $\ 23.77\ $ & $\ 12.68\ $ & $\ 8.51\ $ & $\ 6.37\ $ & $\ 5.09\ $ \\ \hline $N^\perp_{\rm dis}$ & $0.61$ & $0.17$ & $0.05$ & $0.01$ & $0.005 $ \\ \hline \end{tabular} \end{center} This is a direct consequence of the fact that the peak field decreases with increasing $\cal N$. Finally, in Fig.~\ref{fig:FGBGauss} we compare our FGB results for the representative orders ${\cal N}\in\{1,2\}$ with the analogous results obtained for Gaussian pump fields of rescaled width $w_0\to w_{\cal N}$. \begin{figure}[h] \centering \includegraphics[width=0.67\columnwidth]{combiplot_FGBGauss} \caption{Far-field angular decay of the signal~\eqref{eq:dNtotperp_dcostheta} and probe~\eqref{eq:dNin} (gray) for different transverse pump profiles. Here, we compare the angular decay of the signal for flattened Gaussian pumps~\eqref{eq:EN} of order ${\cal N}\in\{1,2\}$ (dashed lines) with the analogous results for a fundamental Gaussian pump with rescaled waist $w_0\to w_{\cal N}$ (solid lines); see the inset for the respective focus profiles. The plot is for $\omega=12914\,{\rm eV}$, $w_{\rm probe}=3w_0$, $\lambda=800\,{\rm nm}$, $w_0=1000\,{\rm nm}$, $T=10\,{\rm fs}$ and $\tau=30\,{\rm fs}$.} \label{fig:FGBGauss} \end{figure} This is of special interest as it allows for an assessment of the role of the details of the transverse focus profile of the pump on the angular decay of the signal photons. Figure~\ref{fig:FGBGauss} shows that the angular decay of the scattering signal associated with an FGB profile of order $\cal N$ is slightly less pronounced than that for the corresponding rescaled Gaussian pump. This indicates that the steepness of the transverse focus profile of the pump impacts the angular decay of the signal: a steepening of the pump profile while keeping its peak field and pulse energy fixed seems to result in a less pronounced angular fall-off. The signal photon numbers associated with the rescaled Gaussian pump highlighted in Fig.~\ref{fig:FGBGauss} are $N^{\rm tot}\simeq10.23$ ($N^{\rm tot}\simeq6.26$), $N_{{\rm dis}}^\perp\simeq0.11$ ($N_{{\rm dis}}^\perp\simeq0.02$) for ${\cal N}=1$ (${\cal N}=2$). These values are of the same order, but somewhat smaller than the corresponding FGB results given above. Correspondingly, our results indicate that for pumps featuring transverse focus profiles of similar characteristics (same pulse energy and peak field, similar waist spot size, monotonic fall-off with $r$) the scattering phenomenon of signal photons outside the forward cone of the probe is not very sensitive to the details of the pump's transverse focus profile. This is reassuring for the perspectives of searching this effect in experiment: as to date the precise intensity distribution of focused high-intensity laser pulses amount to critical unknowns, the stability of the scattering phenomenon under deformations of the pulse profile is of central importance for the feasibility of such an experiment with state-of-the-art technology. On the other hand, our present analysis shows that a quantitative precision study of QED vacuum fluctuation mediated x-ray photon scattering at a focused high-intensity laser pulse invitably requires knowledge about the particular focus profile available in experiment. \section{Conclusions and Outlook}\label{sec:concls} In this article we generalized Ref.~\cite{Karbstein:2015xra} studying vacuum birefringence in the head-on collision of a weakly focused x-ray probe with a tightly focused high-intensity pump, described as fundamental paraxial Gaussian mode, to paraxial Laguerre-Gaussian beams of arbitrary mode composition. In this context, we explicitly showed that the total number of signal photons attainable in a polarization insensitive measurement is maximized for a different choice of the polarization vectors of the colliding beams than the number of polarization flipped signal photons constituting the vacuum birefringence signal. Resorting to a few well-justified approximations, we were able to provide simple analytical estimates for the differential numbers of signal photons as a function of the polar angle $\vartheta'$ measured from the forward beam axis of the x-ray probe. Finally, we discussed some exemplary results and emphasized the differences from the sceanario with a fundamental Gaussian pump. More specifically, we focused on pump fields corresponding to a pure Laguerre-Gaussian mode and to the class of flattened Gaussian beams~\cite{Gori:1994}. From the comparison of the far-field angular decay of the signal photons induced by a flattened Gaussian pump and a fundamental Gaussian pump of similar waist size in the focus we inferred that -- keeping the pulse energy and the peak field the same -- the scattering signal is not very sensitive to the details of the pump's transverse focusing profile. The formulas presented in the present article allow for the study of vacuum-fluctuation-mediated x-ray photon scattering at head-on colliding, rotationally symmetric paraxial high-intensity laser pulses of arbitrary transverse focus profiles. By construction they are limited to the parameter regime where $w_{\rm probe}\gtrsim w_0$. Their generalization to finite collision angles as well as elliptical focus profiles of the pump is straightforward. We are confident that our results will stimulated further investigations of the fate of the x-ray scattering signal under deformations of the driving laser pulses in the interaction volume. Interesting directions would be the study of similar effects in high-intensity laser pulse collisions in the all-optical regime, and explicitly accounting for the transverse profile of the x-ray probe. \acknowledgments This work has been funded by the Deutsche Forschungsgemeinschaft (DFG) under Grant No. 416607684 within the Research Unit FOR2783/1 (FK) and is supported by Russian Science Foundation grant RSCF 17-72-20013 (EM).
\section{Introduction} The formation of Andreev bound states (ABS) \cite{Andreev1964,Kulik1970,Beenakker1991,Fukuyama1992,Beenakker1992} in long SNS junctions\cite{Griffin1971,Josephson1974,Blonder1982,deGennes1999} has been approached by analytical tools such as the Bogoliubov--de Gennes equations \cite{Furusaki1991,Hurd1994,Richter2002}, the Andreev approximation\cite{Affleck2000,Nazarov2009,Beenakker2013}, as well as various other approaches \cite{MartinRodero1994,LevyYeyati1995,Fazio1995,Cuevas1996,Caux2002,Bauer2007,Perfetto2009,Meng2009}. However, taking into account a finite amount of backscattering at the leads in such junctions has so far only been possible using numerical tools (see, e.g., Ref.~[\onlinecite{Bena2012}]). For instance there is no analytical description of the bell-shaped dependence of the ABS in long junctions on gate-voltage, neither of their non-linear dependence on the phase\cite{Bena2012,Pillet2010,Dirks2011}. Here we provide the first fully analytical tool that can take into account the normal scattering at the leads in long junctions (in the limit of energies much smaller than the superconducting gap). When there is no normal scattering at the leads, the physics of the ABS in this limit is described by the Andreev approximation \cite{Affleck2000,Nazarov2009,Beenakker2013}, yielding a linear dependence of the ABS energies on the phase; in this limit their energies are independent of the chemical potential. In the opposite limit, when the normal scattering at the leads is very large, we recover the particle-in-the-box limit, i.e., the normal region is completely isolated and the energies of the bound states correspond to the quantized levels of a finite-size system; the energies of these states depend linearly on the gate voltage and are independent of the SC phase difference. For the intermediate regime, in which the normal scattering is finite, we show that the energies of the ABS lie between the two limits and we obtain a closed-form expression for these energies by expanding around the particle-in-the box limit. This expression allows to extract information for example about the periodicity and the amplitude of the ABS oscillations with the chemical potential, the amplitude of the ABS oscillations with the phase, and the width of the ABS levels as a function of the scattering strength; such information will be useful in order to analyze experimental observations of the ABS in long imperfect SNS junctions, once such observations become available. We will first show that we can model an imperfect NS junction by considering an ``Andreev'' type impurity: a delta-function localized potential that scatters an electron into a hole with opposite spin. This equivalence is demonstrated using the scattering formalism: we find that there are regimes of parameters in which the values of the reflection and Andreev reflection coefficients in the NS junction can be the same as those generated by an ``Andreev'' impurity. In this regime an ``Andreev'' impurity can thus be a good model for an NS junction characterized by both Andreev reflection and a finite amount of normal scattering. Our formalism cannot describe the ideal NS junctions, a finite amount of normal scattering at the leads is automatically included. \begin{figure}[ht!] \centering \includegraphics[width=0.92\columnwidth]{SNSasAndreevImpurities.pdf} \caption{Schematics of the equivalence between `Andreev' impurities and NS junctions.} \label{fig:SNSasAndreevImpurities} \end{figure} However, the point of this work is not to model a sole NS junction, for which many alternative analytical works exist, but to model an imperfect SNS junction, or equivalently, two imperfect SN junctions situated at a finite and large distance from each other, for which it is to our knowledge impossible to obtain fully analytically the form of the local density of states or the energy dependence of the ABS. We thus model the SNS junction by considering two ``Andreev'' impurities situated at a given distance, as illustrated in Fig.~\ref{fig:SNSasAndreevImpurities}. We use the $T$-matrix formalism which provides an exact solution for the two-impurity problem. The resulting Green's function in the region between the two impurities corresponds to that of a normal region in an SNS junction, and thus it allows us to describe the formation of ABS. We calculate the resulting dependence of the ABS energies on various parameters such as the gate voltage, the phase difference between the two SCs and the normal scattering at the leads, and we show that it is consistent with previous findings (see, for instance, the results obtained by numerical diagonalization in Ref.~[\onlinecite{Bena2012}]). In Sec.~II we provide the equivalence conditions between the NS junction and the ``Andreev'' impurity. In Sec.~III we give the $T$-matrix formalism necessary to compute the Green's function and subsequently the local density of states (LDOS) in the presence of two impurities. We present our results in Sec.~IV, leaving the conclusions to Sec.~V. \section{Scattering formalism and conditions of equivalence between the NS junction and the ``Andreev'' impurity} For an NS junction the BTK theory\cite{Blonder1982} indicates that the reflection and Andreev reflection coefficients, resulting from injecting an electron from the normal side of the junction (see Fig. \ref{fig:NSjunctionSchematic} for the schematics of the junction), are given by \begin{figure}[t!] \centering \includegraphics[width=8cm,trim={2cm 0cm 2cm 0cm},clip]{NSjunctionSchematic.pdf} \caption{Schematics of an NS junction where we consider $E$ to be inferior to the SC gap, i.e., the transmission coefficients $t,t_A=0$.} \label{fig:NSjunctionSchematic} \end{figure} \begin{align} |r_A|^2 &= \frac{\Delta^2}{E^2+(\Delta^2-E^2)(1+2 Z^2)^2}, \\ |r|^2 &= 1-|r_A|^2, \end{align} where $\Delta$ is the SC gap, $Z$ is the dimensionless barrier strength introducing a finite amount of normal reflection at the interface. We will focus only on energies much smaller than the gap, thus we have \begin{align} \label{eq:ZparameterNSjunction} |r_A|^2 &= \frac{1}{(1+2 Z^2)^2},\\ |r|^2 &= 1-|r_A|^2. \end{align} For $Z=0$ we have a perfect Andreev junction, i.e., $r_A=1$, while for $Z\gg1$ we have a bad junction with a lot of normal reflection. \begin{figure}[ht!] \centering \includegraphics[width=7cm,trim={6cm 4cm 6cm 2cm},clip]{AndreevImpurity.pdf} \caption{Schematics of an ``Andreev'' impurity with the incoming, reflected and transmitted plane waves.} \label{fig:AndreevImpurity} \end{figure} In order to verify the equivalence between an ``Andreev'' impurity and an NS junction we will calculate the reflection and transmission coefficients, as well as the Andreev reflection and transmission for the ``Andreev'' impurity, and check in which regime they correspond to the traditional BTK values mentioned above. Thus, for a delta-function Andreev impurity (see Fig. \ref{fig:AndreevImpurity}) we write down the Schr\"odinger equation \begin{equation} -\frac{\hbar^2}{2 m} \frac{d^2 \psi}{d x^2}(x)+V_{\mathrm{imp}}(x) \psi(x)=E \psi(x), \label{eq:SchroedingerEq} \end{equation} where $\psi(x)=\left( \psi_e(x), \psi_h(x)\right)^{\T}$ is a two-component wave function with the upper and lower components standing for the electron and hole wave functions, respectively. We assume a quadratic dispersion with $m$ denoting the quasiparticle mass. Hence, the impurity potential is a $2 \times 2$ matrix in the electron-hole space, and can be written as \begin{align} V_{\mathrm{imp}}(x)= V \delta(x) \equiv \begin{pmatrix} V_N & V_A \\ V^*_A & -V_N \end{pmatrix} \delta(x). \label{eq:AndreevImpPotential} \end{align} In the most general case a normal reflection component $V_N \neq 0$ should be present, however, we have shown that it hinders the equivalence, and therefore, hereinafter we will set $V_N=0$. Note that this does not imply that in the equivalent SN junction there is no normal scattering, in fact $V_A$ alone is generating both an Andreev and a normal component in the equivalence. For $x \neq 0$ the solution of Eq.~(\ref{eq:SchroedingerEq}) is just a linear combination of two-component vectors multiplied by right-moving and left-moving plane waves, $e^{i k x}$ and $e ^{-i k x}$, correspondingly, where the wavevector $k \equiv \sqrt{2m E}/\hbar$. The most general solution in the presence of the impurity is \begin{align} \psi_L(x)=A_r e^{i k x}+A_l e^{-i k x},\; x<0, \\ \psi_R(x)=B_r e^{i k x}+B_l e^{-i k x},\; x>0. \end{align} We focus on the simple case of an injected electron incoming on the barrier from the left, thus $A_r=(1,0)^{\T}$, and no injected electron or hole from the right, i.e., $B_l=(0,0)^{\T}$. Hence $A_l=(r, r_A)^{\T}$, where $r$ is the regular reflection coefficient, and $r_A$ is the Andreev reflection coefficient. Moreover, $B_r=(t,t_A)^{\T}$ with $t$ being regular transmission and $t_A$ Andreev transmission. By assuming that the wave function $\psi(x) = \psi_L(x)\Theta(-x)+\psi_R(x)\Theta(x)$ is continuous at $x=0$, we obtain $1+r=t$, $r_A=t_A$. We then write down the continuity equation for the derivative of the wave function. The delta-function potential gives rise to a discontinuity at the origin, proportional to the value of the impurity potential, in occurence here: \begin{align} -\frac{\hbar^2}{2m}[\psi'_R(0)-\psi'_L(0)]+V \psi(0)=0, \end{align} which yields \begin{align} -\frac{\hbar^2}{2m} i k (-A_r+A_l+B_r-B_l)+V (A_r+A_l) = 0. \end{align} We note that the solution to this problem is energy-dependent, but since we are interested in energies very close to the Fermi level, we can take $k$ to be constant $k=k_F$, and we denote $\alpha \equiv \frac{\hbar^2k_F^2}{m}$. The above equations yield \begin{align} r &= -\frac{|V_A|^2}{\alpha^2+|V_A|^2}, \\ \label{eq:rA} r_A &= -i \frac{\alpha V_A^*}{\alpha^2+|V_A|^2}. \end{align} In Fig.~\ref{fig:reflection_coeff} we plot $|r|^2+|r_A|^2$ and $|r_A|/|r|$ as a function of $V_A$, while setting $\alpha=1$. This shows that for large enough Andreev potentials the impurity models the NS junction asymptotically well, i.e., $|r|^2+|r_A|^2 \approx 1$. On the other hand, we see that with increasing $V_A$ the ratio between the Andreev and the regular reflection is decreasing, e.g., for $V_A=3.5$ for which $|r|^2+|r_A|^2 \approx 0.92$, we barely have $|r_A|/|r| \approx0.3$. This corresponds to a value of $Z\approx 1$ for the NS junction (see Eq.~(\ref{eq:ZparameterNSjunction})). While the corresponding junction is definitely far from perfect Andreev reflection it can still support Andreev bound states, and we describe their behavior in Sec.~IV. This situation describes probably quite accurately the realistic parameters for many experimental NS interfaces. \begin{figure}[ht!] \centering \includegraphics[width=0.7\columnwidth]{test1.pdf} \caption{In dotted red the ratio $|r_A|/|r|$ and in blue $|r|^2+|r_A|^2$ as a function of $V_A$ (in units of $\alpha$).} \label{fig:reflection_coeff} \end{figure} \section{\boldmath{$T$}-matrix formalism} In order to take into account the cumulated effect of all-order impurity scattering processes, we employ the $T$-matrix formalism. We start with the case of a single impurity. Denoting the momentum-space Hamiltonian of a given system $\mathcal{H}_k$, we define the unperturbed Matsubara Green's function (GF) as: $G_0\left(k,i\omega_n\right) = \left[i\omega_n - \mathcal{H}_{k}\right]^{-1}$, where $\omega_n$ denote the Matsubara frequencies. In the presence of an impurity, the Green's function is modified to: \begin{align} \label{eq:green_perturbed} G\left( k_1 ,k_2,i\omega_n \right) &= G_0\left(k_1,i\omega_n\right) \delta_{k_1,k_2} \\ &+G_0\left(k_1,i\omega_n\right) T\left(k_1,k_2,i\omega_n\right) G_0\left(k_2,i\omega_n\right), \nonumber \end{align} where the $T$-matrix $T\left(k_1,k_2,i\omega_n\right)$ embodies impurity scattering processes \cite{Balatsky2006, Mahan2000}. For a delta-function impurity $V_{\mathrm{imp}}\left(x\right) = V \delta \left(x\right)$, the form of the $T$-matrix in 1D is momentum independent and is given by \cite{Balatsky2006, Ziegler1996, Salkola1996, Bena2008}: \begin{equation} \label{eq:T_matrix1D} T\left(i\omega_n\right) = \left[\mathbb{I} - V \cdot \int \frac{dk}{2 \pi} G_0\left(k,i\omega_n\right)\right]^{-1} \cdot V. \end{equation} To compute physical quantities such as, e.g., the local density of states, in what follows we use the retarded GF $\mathcal{G}(k_1, k_2, E)$ obtained by the analytical continuation of the Matsubara GF $G(k_1, k_2, i\omega_n)$ (i.e., by setting $i\omega_n \rightarrow E + i\delta$, with $\delta \rightarrow 0^+$). The real space equivalents of Eqs.~(\ref{eq:green_perturbed}) and ~(\ref{eq:T_matrix1D}) can be written as \begin{align*} \mathcal{G}(x,x',E) = \mathcal{G}_0(x- x',E)+\mathcal{G}_0(x,E)T(E)\mathcal{G}_0(-x',E) \end{align*} and \begin{align*} T(E) &= \left[\mathbb{I} - V \cdot \mathcal{G}_0(x=0,E) \right]^{-1} \cdot V, \end{align*} respectively, where $\mathcal{G}_0(x=0,E)$ is equivalent to integrating the Green's function over all momenta (cf. Eq.~(\ref{eq:T_matrix1D})). In the presence of two delta-function impurities with amplitudes $V_i$, localized at $x = X_i$, $i \in \{1,2\}$, i.e., \begin{align} V_{\mathrm{imp}}\left(x\right) = V_1 \delta \left(x-X_1\right) + V_2 \delta \left(x-X_2\right), \label{eq:twoAndreevImpPotentials} \end{align} the full $T$-matrix can be found from the following equation using the unperturbed retarded Green's function real-space form \cite{Choi2004,Choi2005}: \begin{align} T_{ij} = V_i \delta_{ij} \negthickspace + \negthickspace V_i \mathcal{G}_0(X_i\negthickspace-\negthickspace X_1)T_{1j} \negthickspace +\negthickspace V_i \mathcal{G}_0(X_i\negthickspace-\negthickspace X_2)T_{2j}, \label{eq:T_matrix_2imp} \end{align} where $i,j \in \{1,2\}$. For brevity we omit energy-dependence in all functions. Solving the system of four equations in Eq.~(\ref{eq:T_matrix_2imp}), we get: \begin{align} \nonumber T_{11} &= \left[\mathbb{I}\negthickspace -\negthickspace V_1 \mathcal{G}_0(0) \negthickspace-\negthickspace V_1 \mathcal{G}_0(X_1-X_2) T^{(0)}_2 \mathcal{G}_0(X_2-X_1) \right]^{-1}\negthickspace V_1, \\ \nonumber T_{12} &= T^{(0)}_1 \mathcal{G}_0(X_1-X_2) T_{22}, \\ \nonumber T_{21} &= T^{(0)}_2 \mathcal{G}_0(X_2-X_1) T_{11}, \\ \nonumber T_{22} &= \left[\mathbb{I}\negthickspace -\negthickspace V_2 \mathcal{G}_0(0)\negthickspace -\negthickspace V_2 \mathcal{G}_0(X_2-X_1)T^{(0)}_1 \mathcal{G}_0(X_1-X_2) \right]^{-1}\negthickspace V_2, \end{align} where we defined $T^{(0)}_i \equiv \left[\mathbb{I} - V_i \mathcal{G}_0(0)\right]^{-1} V_i$. The poles of the $T$-matrix $||T_{ij}||$ yield the energies of the bound states in the system. Furthermore, we can also express the full perturbed Green's function in terms of the $T$-matrix elements: \begin{align} \mathcal{G}(x,x') = \mathcal{G}_0(x\negthickspace-\negthickspace x') \negthickspace+\negthickspace \sum\limits_{ij}\mathcal{G}_0(x\negthickspace-\negthickspace X_i)T_{ij}\mathcal{G}_0(X_j\negthickspace-\negthickspace x'). \label{eq:perturbed_GF_2imp} \end{align} The correction to the local density of states due to the impurities can be expressed as \begin{align} \Delta\rho(x) = -\frac{1}{\pi}\im \tr \sum\limits_{ij}\mathcal{G}_0(x\negthickspace-\negthickspace X_i)T_{ij}\mathcal{G}_0(X_j\negthickspace-\negthickspace x')\Bigg|_{x'=x}. \label{eq:LDOS} \end{align} \section{Results} The normal part of the junction is described using a simple lattice Hamiltonian $ \mathcal{H}_{k} = \xi_k \tau_z, $ where $\tau_z$ is the Pauli matrix acting in the particle-hole subspace, $\xi_k \equiv \mu - 2t \cos k a$, where $a$ is the lattice constant, $t$ denotes the hopping parameter and $\mu$ is the chemical potential. The retarded Green's function in real space is computed as the Fourier transform of its momentum-space representation, and is given by \begin{align} \mathcal{G}_0(E,x) = \begin{pmatrix} \mathcal{G}_{11}(E,x) & 0 \\ 0 & \mathcal{G}_{22}(E,x)\end{pmatrix}, \end{align} where \begin{align} \label{eq:G11}&\mathcal{G}_{11}(E,x) = \\ \nonumber &- \frac{\left[\left(E_t-\mu_t +i\delta\right) - \sgn(E_t-\mu_t)\sqrt{\left(E_t-\mu_t +i\delta \right)^2 \negthickspace-\negthickspace 4}\right]^{\frac{|x|}{a}}}{at \cdot \sgn(E_t-\mu_t) \cdot 2^{\frac{|x|}{a}} \cdot\sqrt{\left(E_t-\mu_t +i\delta \right)^2 -4}}\\ \label{eq:G22}&\mathcal{G}_{22}(E,x) = \\ \nonumber &+ \frac{\left[\left( E_t+\mu_t +i\delta\right) - \sgn(E_t+\mu_t)\sqrt{\left(E_t+\mu_t +i\delta \right)^2-4}\right]^{\frac{|x|}{a}}}{at \cdot \sgn(E_t+\mu_t)\cdot 2^{\frac{|x|}{a}} \cdot \sqrt{\left(E_t+\mu_t +i\delta \right)^2-4}} \end{align} if $E^2+\mu^2 \neq 0$, and \begin{align} \label{eq:G11x0} \mathcal{G}_{11}(E,x) &= -\frac{i}{2 a t} e^{+i\frac{\pi|x|}{2a}},\\ \label{eq:G22x0} \mathcal{G}_{22}(E,x) &= -\frac{i}{2 a t} e^{-i\frac{\pi|x|}{2a}}, \end{align} for $E_t^2+\mu_t^2 = 0$. The expressions in Eqs.~(\ref{eq:G11x0}) and (\ref{eq:G22x0}) are obtained directly from the integral defining the Fourier transform of the momentum-space Green's function. In other words, we first set in the integrand $E_t = \mu_t = 0$ and then we perform the integral over momenta to obtain the real-space formulae. We expressed the energy and the chemical potential in terms of the hopping amplitude, i.e., $E_t \equiv E / t$ and $\mu_t = \mu / t$. The positive infinitesimal shift of energy, $+i\delta$, $\delta \to +0$, corresponds to an inverse quasiparticle lifetime and is generally related to the width of the energy levels. Note that since the expressions above are obtained within the lattice model, the results are valid only for $x = n a$, where $n \in \mathbb{Z}$. The results that we present in this section are evaluated using this full tight-binding model. However, in order to test the validity of our approximations, we establish also a correspondence between the continuum model (used in Sec.~II to make the connection between an NS junction and an ``Andreev impurity'') and the lattice model. We thus expand $\xi_k$ in a quadratic form: \begin{align} \nonumber \xi_k &= \mu -2t \cos k a \approx t a^2 k^2 + \mu - 2t = \frac{\hbar^2 k^2}{2m} - \frac{\hbar^2 k_F^2}{2m} . \end{align} This allows us to extract: \begin{align} \nonumber t &= \frac{\hbar^2}{2ma^2},\; \alpha \equiv \frac{\hbar^2 k_F^2}{m} = 2(2t-\mu ). \end{align} In what follows we use values of the chemical potential around $\mu=1.5$ so that $\alpha\approx 1$. We also set by default the hopping parameter $t=1$, therefore, making $\mu_t$ and $E_t$ equivalent to $\mu$ and $E$, respectively. The broadening is hereinafter set to $\delta = 0.001$. To model the SNS junction we introduce two Andreev impurities, as in Eq.~(\ref{eq:AndreevImpPotential}). In order to take into account the phase difference between the superconductors we replace $V_A \to V_A e^{ \pm i\varphi}$ for one of the impurities, choosing the signs differently for the $12$ and $21$ components, to preserve the Hermitian character of the Hamiltonian. Using the notations from Eq.~(\ref{eq:twoAndreevImpPotentials}), we can thus write: \begin{align} V_1 = \begin{pmatrix} 0 & V_A \\ V_A & 0 \end{pmatrix} \; \text{and} \; V_2 = \begin{pmatrix} 0 & V_A e^{-i\varphi} \\ V_A e^{+i\varphi} & 0 \end{pmatrix}. \end{align} Note that since we assume that the energy is much smaller than the SC gap our results apply to the long SNS junction limit. As mentioned in Sec.~II we focus on some intermediate value of $V_A \approx 3.5$ corresponding to a ratio of Andreev and regular reflection of $0.3$, and we study the formation of Andreev bound states using the formalism described in Sec.~III, the $T$-matrix for two delta-function impurities. This yields an exact formula for the perturbed Green's function of the system (see Eq.~(\ref{eq:perturbed_GF_2imp})), which allows to extract the local density of states (see Eq.~(\ref{eq:LDOS}))\footnote{Extra insight and a more detailed analysis of this exact result in the limit of the continuum model is provided in the Appendix}. We first plot the latter in Fig.~\ref{fig:LDOS} as a function of energy and position, for a fixed value of the chemical potential. Note the formation of bound states in the region between the two impurities, i.e., for $x \in \left[0,\,200 \right]$. \begin{figure}[t!] \hspace{-0.5cm} \includegraphics[width=6cm]{test01.pdf} \vspace{-0.5cm} \caption{The LDOS of an SNS junction as a function of the coordinate $x$ and the energy $E$ on the horizontal and vertical axes, respectively. Two Andreev impurities are localized at $x=0$ and $x=200$. ABS form in the normal region. The length of the normal region is $L=200$, the chemical potential is taken to be $\mu=1.5$, $V_A=3.5$ and the phase difference $\varphi=0$.} \label{fig:LDOS} \end{figure} In order to compare the behavior of these bound states with that of previously studied ABS \cite{Bena2012,Pillet2010,Dirks2011}, we focus on a given position and we plot in Fig.~\ref{fig:chemical_potential} the dependence of the LDOS as of function of energy and chemical potential. In the plots we choose to average the LDOS over a few sites (i.e., 6 sites) to avoid any fluctuation effects due to the short wavelength oscillations visible in Fig.~\ref{fig:LDOS}. Indeed, we recover the oscillatory bell-shaped dependence of the ABS energy on the chemical potential (see, e.g., Figs.~4a and 4d in Ref.~[\onlinecite{Bena2012}]). \begin{figure}[ht!] \hspace{-0.5cm} \includegraphics[width=10cm]{fig6.pdf} \vspace{-0.5cm} \caption{LDOS averaged over 6 sites $x \in \left[90,\,95\right]$, plotted as a function of the chemical potential on the horizontal axis and energy on the vertical axis. We set $L=200$, $V_A=3.5$ and $\mu$ varies between $1.46$ and $1.54$, so that $\alpha\approx 1$ does not vary with $\mu$. The phase difference is set to $\varphi=0$. The perfect Andreev limit is denoted by the red dashed lines while the particle-in-the-box by the blue dotted lines.} \label{fig:chemical_potential} \end{figure} \begin{figure}[ht!] \hspace{-0.5cm} \includegraphics[width=10cm]{fig7.pdf} \vspace{-0.5cm} \caption{LDOS averaged over 6 sites $x \in \left[90,\,95\right]$, plotted as a function of the phase difference $\varphi$ on the horizontal axis and energy on the vertical axis. We set $L=200$, $V_A=3.5$ and $\mu=1.5$. The perfect Andreev limit is denoted by the red dashed lines while the particle-in-the-box by the blue dotted lines.} \label{fig:phase} \end{figure} Furthermore, in Fig.~\ref{fig:phase} we plot the dependence of the LDOS as a function of energy and the phase difference between the two SCs, for a fixed chemical potential. We note that the amplitude of the phase oscillations, while not very large, is still significant, marking the presence of nonzero Andreev reflection and of the corresponding phase coherence. In order to understand this observed dependence of the ABS energies on the phase and chemical potential we remind the reader that the focus of our work is the study of long SNS junctions in the \textit{imperfect} long junction limit. Also we focus on the limit of small energies with respect to the gap, $E \ll \Delta$. In what follows we write down the solutions for the two extreme limits characterizing this junction, that have both been studied previously in the literature. First, for the long perfect SNS junctions (no normal backscattering at the leads), the corresponding results are described by the Andreev approximation. In this limit the energies of the ABS are linear with the phase and independent of chemical potential, and they are given by \begin{equation} E_n^{\pm A}=\pm \frac{\hbar p_F}{2 m L} [\phi-(2n+1)\pi], \; n \in \mathbb{N}, \end{equation} To the other extreme, in the limit of zero Andreev scattering and infinite normal scattering at the leads our setup is equivalent to the particle-in-a-box problem, which for quadratically-dispersed quasiparticles has the following well-known solution: \begin{equation} E_n^{\pm B} = \pm \left[\frac{\hbar^2 \pi^2 n^2}{2 m L^2} - \frac{p_F^2}{2 m} \right], \; n \in \mathbb{N}, \end{equation} independent of phase, and linear with the chemical potential. To make the correspondence with the lattice-model results we choose $m=0.5$, and we express $p_F$ in terms of the chemical potential $\mu$, using the previously introduced definition of $\alpha \equiv p_F^2/m = 2(2t-\mu)$. Since we have taken $t=1$ we need to set $p_F = \sqrt{2-\mu}$. Thus we can rewrite \begin{align} E_n^{\pm A} &= \pm \frac{1}{\sqrt{2} L}\left[\phi-(2n+1)\pi\right], \; n \in \mathbb{N}, \\ \label{eq:boxenergiesmu} E_n^{\pm B} &= \pm \left[\frac{\pi^2 t n^2}{L^2} - 2t + \mu \right], \; n \in \mathbb{N}, \end{align} where $t=1$ and $L$ is expressed in units of the lattice constant $a$. The corresponding limits for the bound states in the junction are depicted in Figs.~\ref{fig:chemical_potential} and \ref{fig:phase} by the dashed red lines (Andreev limit) and the dotted blue lines (particle-in-a-box limit). Note that our results interpolate between the two regimes; our approach is unique in the sense that it is the only analytical approach to capture this transition between a long SNS junction with perfect contacts and a perfectly isolated system. Moreover, as we will show in what follows, by expanding about the particle-in-the-box limit, we can obtain a fully closed form for the ABS dependence of energy depicted in Figs.~\ref{fig:chemical_potential} and \ref{fig:phase}, valid for all the values of the chemical potential with the exception of a countable set of points. We also plot the dependence of the ABS on chemical potential and phase difference for parameter values that take us closer to the two ideal limits, for example we take a smaller $|r_A|/|r|$ (for example, take $V_A = 10$) such that we recover a junction very close to the particle-in-the-box scenario (see Fig.~\ref{fig:LDOSimperfect1}). \begin{figure}[ht!] \centering \includegraphics[width=9cm]{fig8.pdf} \vspace{-1cm} \caption{LDOS averaged over 6 sites $x \in \left[90,\,95\right]$, plotted as a function of energy (vertical axis) and on the horizontal axis the chemical potential (left panel) and the SC phase difference (right panel). Here we set $L=200$, $V_A = 10$. In the left panel we fix $\varphi=0$, whereas in the right panel $\mu=1.5$. The perfect Andreev limit is denoted by the dashed red lines while the particle-in-the-box by the dotted blue lines.} \label{fig:LDOSimperfect1} \end{figure} Note that in this limit the Andreev reflection goes to zero and the bell-shaped oscillations transform into almost fully-linear crossings (reflecting the linear energy dependence of the bound states in a quantum dot on gate voltage, corresponding to Eq.~(\ref{eq:boxenergiesmu}) and denoted in blue). Moreover, the dependence of the ABS energy on the SC phase difference becomes almost insignificant, as expected. On the other hand, we focus on smaller $V_A$ values (for instance, $V_A=1$), artificially increasing $|r_A|/|r|$, however the results we obtain are no longer physical and consistent with the NS junction since $|r_A|^2+|r|^2 \ll 1$ (see Fig.~\ref{fig:LDOSimperfect2}). Nevertheless, the main features of the ABS are generally preserved, and we see that we get closer to the Andreev limit denoted in red. \begin{figure}[ht!] \centering \hspace{-0.5cm} \includegraphics[width=9cm]{fig9.pdf} \vspace{-1cm} \caption{LDOS averaged over 6 sites $x \in \left[90,\,95\right]$, plotted as a function of energy (vertical axis) and on the horizontal axis the chemical potential (left panel) and the SC phase difference (right panel). Here we set $V_A = 1$. The other parameters are the same as in Fig.~\ref{fig:LDOSimperfect1}. The perfect Andreev limit is denoted by the red dashed lines while the particle-in-the-box by the blue dotted lines.} \label{fig:LDOSimperfect2} \end{figure} Moreover, we can obtain a fully closed form for the ABS energy levels if we employ the continuum model introduced in Sec.~II, namely we consider a system with quadratic dispersion (see the Appendix) and expand around the particle-in-the-box-limit. The zeroth order contribution to the ABS level is thus given by Eq.~(\ref{eq:boxenergiesmu}). Subsequently we calculate the first-order correction to this solution in terms of the small dimensionless parameter $(p_F/m V_A)^2$: \begin{align} \label{eq:correction}\delta E_n^{\pm B} &= \mp \frac{2\pi^2 n^2}{i p_F^3 L^3} \left(\frac{p_F}{m V_A}\right)^2 \sqrt{2 - \frac{\pi^2n^2}{p_F^2 L^2}}\\ \nonumber & \times\frac{1+(-1)^n \cos\varphi\, \exp\left(ip_F L \sqrt{2 - \frac{\pi^2n^2}{p_F^2 L^2}}\right) }{1-\exp\left(2ip_F L \sqrt{2 - \frac{\pi^2n^2}{p_F^2 L^2}}\right)} \frac{p_F^2}{2m}. \end{align} We are leaving the technical details of the derivation to the Appendix. This correction to the particle-in-a-box energies has both real and imaginary parts. The real part is responsible for the energy shifts, whereas the imaginary part embodies the energy level broadening. Eq.~(\ref{eq:correction}) where we set $p_F = \sqrt{2-\mu}$ allows us to plot the energies $E_n^{\pm B} + \delta E_n^{\pm B}$ as a function of the chemical potential $\mu$ (see Fig.~\ref{fig:ABSenergiesanalyt}). There is a very good agreement between these closed-form analytical results for the continuum model and those presented in Fig.~\ref{fig:chemical_potential} corresponding to a direct evaluation of the T-matrix and the corresponding LDOS for a full tight-binding model. Note that our perturbative treatment within the continuum model does not work for values of the chemical potential close to the singularities in Eq.~(\ref{eq:correction}), which constitute a countable set of points. \begin{figure} \centering \includegraphics[width=1.2\columnwidth]{fig10.pdf} \caption{Energies of the ABS within the continuum model plotted as a function of the chemical potential. The vertical green lines mark the values of the chemical potential at which the analytical perturbative approach becomes invalid due to singularities in Eq.~(\ref{eq:correction}). Here, exactly as in Fig.~\ref{fig:chemical_potential}, we have set $V_A = 3.5$, $\varphi=0$ and $L=200$. Additionally, we have fixed $m=0.5$. The perfect Andreev limit is denoted by the red dashed lines while the particle-in-the-box by the blue dotted lines.} \label{fig:ABSenergiesanalyt} \end{figure} A subsequent simplification of Eq.~(\ref{eq:correction}) allows us to extract some other important information about the ABS level behavior. First, we recall that our approach is valid at small energies, $\delta E^{\pm B}_n/\mu \ll 1$. Hence we can take $\frac{\pi^2 n^2}{p_F^2 L^2} \approx 1$, and $\sqrt{2 - \frac{\pi^2n^2}{p_F^2 L^2}} \approx 1$ in Eq.~(\ref{eq:correction}). Thus, we can extract the periodicity of the Andreev levels to be $\delta p_F \cdot L\approx 2\pi$ and consequently $|\delta \mu| = \frac{4\pi}{L} \sqrt{2-\mu}$. For the values considered here ($L=200$, $\mu\approx 1.5$) we see that this corresponds to $\delta \mu=0.045$, which is observed in both Fig.~\ref{fig:chemical_potential} and Fig.~\ref{fig:ABSenergiesanalyt}. On the other hand, the singularities in Eq.~(\ref{eq:correction}) are governed by $2 \delta p_F L\approx 2\pi$, yielding $|\delta \mu|=0.022$ corresponding to the spacing between the green vertical lines in Fig.~\ref{fig:ABSenergiesanalyt}. Moreover, Eq.~(\ref{eq:correction}) allows us to see that the amplitude of the phase oscillations, i.e., the coefficient of the $\cos(\varphi)$ term, is proportional to $(p_F/m V_A)^2$. Indeed, this goes to zero when there is no Andreev reflection $V_A\rightarrow \infty$, and increases with reducing $V_A$. Eqs.~(\ref{eq:ZparameterNSjunction}) and (\ref{eq:rA}) allow to make a direct correspondence between the amplitude of these oscillations and the dimensionless barrier strength $Z$, namely, it is decreasing roughly as $1/Z^4$. Furthermore, the width of the ABS levels can also be extracted from the imaginary part of Eq.~(\ref{eq:correction}), and is thus equal to $\frac{1}{p_F L} \left(\frac{p_F}{m V_A}\right)^2\approx 0.001$ for $V_A=3.5$, consistent with Figs.~\ref{fig:chemical_potential} and \ref{fig:phase}. Note that with decreasing $V_A$ these estimates become inaccurate and the higher order terms become important (see Appendix A), for example, for $V_A=3.5$ the next order correction which we neglect here is of the order of $\approx 16\%$. Note that the broadening of the ABS levels is governed by two physical phenomena. The first is the finite quasiparticle lifetime, which is quite large in regular systems making the levels very sharp. We introduce by hand an artificial broadening, described by the imaginary contribution $i \delta$, with $\delta=0.001$, into the energy in the Green's functions. It is proportional to the inverse quasiparticle lifetime and it is the main factor of level broadening in regular systems. However, in a setup consisting of a central region coupled to the leads, there is a second physical factor responsible for the level broadening, originating from the coupling to the leads. When the coupling to the leads is purely Andreev-like, the width of the ABS is not affected by its size, see Fig.~7 in Ref.~[\onlinecite{Bena2012}]. However, when there is also a normal coupling we expect that the ABS level width is going to be affected by this normal coupling, same as the quantum dot levels becoming wider when the dot is better coupled to the leads; in the perfect coupling limit such levels can become very wide, while in the bad coupling limit the levels are very sharp (see for example Figs.~4a and 4b in Ref.~[\onlinecite{Bena2012}] for details). In our model, it is the parameter $V_A$ that determines the barrier height and thus the coupling to the SC leads. Therefore, we expect that if the coupling is very small, i.e., $V_A \to \infty$, then the energy level broadening is controlled solely by $\delta$ and we obtain the `particle in a box solutions'. Indeed, this is exactly what happens (see Eq.~(A13-A15) in Appendix A), and in this limit the levels are very sharp. On the other hand, when $V_A$ is small we have an additional broadening due to the normal coupling to the leads and this is indeed what we observe. We should note that no alternative simple expression for our Eq.~(\ref{eq:correction}) providing a closed form for the energies of the ABS levels as a function of phase difference and chemical potential, has ever been derived for long SNS junctions with imperfect contacts. This demonstrates the strength of our approach to obtain analytical insight into problems for which there is no other analytical alternative. \section{Conclusions} We have shown that by introducing two ``Andreev'' impurities into a normal metal and by employing the $T$-matrix formalism, we can model a long imperfect SNS junction and the formation of Andreev bound states. Most importantly, we have obtained analytical expressions of the local density of states, as well as of the energies of the ABS on different parameters of the system, including the chemical potential and the phase difference between the SCs. In our model the Andreev to normal scattering ratio can be controlled by varying the Andreev impurity potential amplitude. We show that our method interpolates between the Andreev limit corresponding to a perfect long SNS junction for which the energies of the ABS are independent of chemical potential and linear with phase, and the particle-in-the-box limit in which the energy levels are independent of phase and linear with chemical potential. One of the most spectacular results recovered by this technique is a closed-form expression of the energies of the ABS levels, as well as of their widths, obtained by a first-order expansion around the particle-in-the-box limit, as a function of the chemical potential, the SC phase difference, and the interface barrier strength, till now only possible by non-analytical tools such as numerical tight-binding exact diagonalization. This makes our method a unique analytical tool to understand and characterize ABS. Moreover, our technique can be easily generalized to other more complex setups, for example, systems with asymmetric leads, or in which the spin of the electrons also plays a role. We have checked for example that in our formalism the Zeeman field only splits the energies of the ABS levels, consistent with an intuitive understanding. However, more complex factors such as Rashba spin-orbit coupling would require a modification of the equations of motion, and of all the conditions for the equivalence with the Andreev impurity; if successful, such an analysis will be addressed in a separate work. Our approach thus provides an easily accessible non-numerical tool to describe the formation of ABS in long SNS junctions. While at present ABS have been directly observed only in short junctions---quantum-dot-type setups for which only a few states can be observed inside the SC gap---we can expect that longer and cleaner wires will also be realized in the future, for which models such as the one presented here will be necessary in order to investigate the underlying physics. Already some progress has been made in this direction\cite{Beenakker2013}, and some experimental setups in which a short but non-zero length plays a role have been examined\cite{Tosi2019}. In order to make contact with such experiments our approach may eventually need to be extended to include other factors, such as the presence of interactions and the spin-splitting of the levels. \begin{acknowledgments} V.K. would like to acknowledge the ERC Starting Grant No. 679722 and the Roland Gustafsson foundation for theoretical physics. \end{acknowledgments}
\section{Introduction} The explosion of mobile data and the ever-increasing demand for higher data rates have continuously driven the advancement of wireless communication technologies in the past decade, such as polar code, massive multiple-input multiple-output (MIMO) and millimeter wave (mmWave) communications, among others. Moreover, a 1000-fold increment in network capacity with ubiquitous connectivity and low latency is envisioned for the forthcoming fifth-generation (5G) wireless network \cite{5g}. Meanwhile, the energy efficiency of future wireless networks is expected to be improved by several orders of magnitude so as to maintain the power consumption at increasingly higher data rates. Although massive MIMO and mmWave, seen as the key enablers for 5G, are expected to achieve dramatic spectral efficiency improvements, the deployment of large-scale antenna arrays usually results in high implementation cost and increased power consumption \cite{mimoover}. In addition, combining mmWave with massive MIMO for further performance improvements generally requires more sophisticated signal processing as well as more costly and energy-consuming hardware. Hence, finding green and sustainable solutions to enhance wireless network performance for higher data rates and efficiency still remains crucial. Recently, intelligent reflecting surface (IRS) or its various equivalents have been proposed as a promising new solution to achieve the above goals \cite{qqmag, qqtwc,qqicassp, debtwc, mmwre,debtwc2,irsstatscsi,renzomag}. Specifically, IRS is a reconfigurable planar array comprising a vast number of passive reflecting elements, each of which is able to independently induce a phase shift and/or an attenuation to the incident signal and thereby collaboratively alter the reflected signal propagation to achieve desired channel responses in wireless communications. By properly adjusting the phase shifts and attenuations of the IRS's elements, their reflected signals can be combined with those from other paths constructively at the receiver to enhance the received signal power and/or destructively to suppress the co-channel interference, both leading to improved wireless link performance \cite{qqmag}. Hence, different from the conventional half-duplex amplify-and-forward (AF) relay, IRS achieves high beamforming gains by intelligent reflection in a \emph{full-duplex} manner, without consuming any energy or requiring additional time/frequency resource for signal re-generation and re-transmission. Although passive reflect-array antennas have been widely applied in radar and satellite communication systems, their applications in mobile wireless communications are rather limited. This is because traditional passive arrays only allow for fixed phase-shift patterns once fabricated and are thus unable to adapt to the dynamic wireless channel induced by user mobility. Fortunately, the advances in radio frequency (RF) micro electromechanical systems (MEMS) and metamaterial (e.g., metasurface) have made it feasible to reconfigure the phase shifts in real time \cite{metasur}, thus greatly enhancing the functionality and applicability of IRS for wireless communications. Existing works on IRS \cite{qqtwc,qqicassp, debtwc,mmwre,irssw} mainly assume perfect channel state information (CSI) at the base station (BS)/IRS, based on which the design parameters are optimized to enhance the system performance. In \cite{debtwc2} and \cite{irsstatscsi}, only statistical CSI is required for the design problem since large-scale antenna array systems are deployed and therefore deterministic equivalent results by exploiting the large system limit can be obtained. On the other hand, for IRS-aided wireless systems where knowledge of instantaneous CSI is required, there are in general two approaches for the channel acquisition, depending on whether the IRS elements are equipped with receiving RF chains \cite{qqmag}. For the first approach where IRS elements are capable of both sensing and reflecting, conventional channel estimation methods can be readily applied. Specifically, channels between the IRS and the BS/users can be estimated by leveraging channel reciprocity and time division duplexing (TDD). However, equipping the IRS elements with (receive) RF chains generally results in higher implementation cost and energy consumption. In contrast, for the second approach where no sensors are installed on the IRS (i.e., the IRS elements are purely passive), it is impossible to explicitly obtain the individual channels of the BS-IRS and IRS-user links. One possible method for this (more challenging) case presented in \cite{qqmag} is to bypass the channel estimation and design the passive beamforming coefficients directly based on the feedback from the BSs/users (e.g., using codebook-based passive beamforming), which, unfortunately, can be time-consuming due to practically vast number of IRS elements and the potentially large codebook size required to achieve reasonably good beamforming performance. In general, there has been very limited work on how to design an efficient channel estimation strategy specifically catered to the IRS-based passive array systems. Moreover, it is worth noting that prior works on IRS-aided wireless systems \cite{qqtwc,qqicassp, debtwc,debtwc2,mmwre,irsstatscsi} have mainly considered frequency-flat (non-selective) fading channels for narrowband communications, where the IRS reflection coefficients are designed to align the phase of the BS-IRS-user reflected link with that of the BS-user direct link for constructive superposition. However, when frequency-selective channels are considered, the IRS reflection coefficients need to cater to all signal paths at different delays, for which the underlying optimization problem is thus more challenging to solve. Notwithstanding, the design of IRS passive array coefficients over frequency-selective fading channels for broadband communications has not been addressed yet, to the authors' best knowledge. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth, keepaspectratio]{IRS_diag_su.eps} \DeclareGraphicsExtensions. \caption{An IRS-enhanced wireless system.} \label{fig:irs} \vspace{-6mm} \end{figure} Motivated by the above challenges, in this paper, we investigate an IRS-aided orthogonal frequency division multiplexing (OFDM)-based wireless system over frequency-selective channels, as shown in Fig. \ref{fig:irs}. We consider point-to-point communication between a BS and a single user in the vicinity of an IRS, where the IRS and the user are both far away from the BS (e.g., in a cell-edge user scenario). Our considered scenario corresponds to practical multiuser wireless systems based on either time division multiple access (TDMA) or orthogonal frequency division multiple access (OFDMA) with a given set of OFDM subcarriers (SCs) assigned to the user of interest. As the IRS is usually equipped with a large number of reflecting elements, how to jointly design their reflection coefficients (i.e., phase shifts and amplitude attenuations) so as to achieve the optimal constructive superposition of the signals reflected by the IRS and those from other paths at the receiver is crucial to maximizing the link achievable rate. However, this is a non-trivial problem to solve under our considered setup due to the following reasons. First, the BS-IRS-user channels for all the IRS elements need to be estimated for designing their reflection coefficients, for which the required channel training overhead is proportional to the number of IRS reflecting elements, thus may be prohibitive or even unaffordable in practice. Second, under the frequency-selective channel with multiple paths, the reflection coefficients of the IRS need to cater to the channel gains and delays of all paths to the receiver, including both the reflected paths by the IRS and the remaining non-reflected paths directly from the transmitter. Finally, the achievable rate for the user is determined by both the IRS reflection coefficients and the transmit power allocation over OFDM SCs, which are intricately coupled and thus need to be jointly optimized. In general, the size of the joint optimization problem increases with the number of IRS elements and/or OFDM SCs. In this paper, we tackle the aforementioned challenges via novel protocol and algorithm designs. The main contributions of this paper are summarized as follows: \begin{itemize} \item First, we propose a novel design by dividing the IRS elements into groups, where each group consists of adjacent elements that are assumed to share a common reflection coefficient. Hence, only the combined channel of each group needs to be estimated. Based on this grouping method, a practical transmission protocol with pilot training is further proposed, where the combined channel associated with each group is estimated sequentially by turning on only the IRS elements of the corresponding IRS group while the other elements are set to be off. Note that compared to the straightforward approach of estimating the channel of each of the IRS's elements and jointly designing their reflection coefficients, grouping of the IRS elements exploits the channel correlation among adjacent IRS elements and significantly reduces the required training overhead as well as the IRS coefficient design complexity. It is also worth noting that the proposed channel estimation does not require any receive RF chains or sensors to be installed on the IRS, thus featuring low implementation cost and energy consumption. \item Next, based on the proposed IRS elements grouping and transmission protocol, we formulate a new optimization problem aiming to maximize the achievable rate by jointly optimizing the power allocation at the transmitter and the passive array coefficients at the IRS with the estimated channels. However, the formulated problem is non-convex and thus difficult to solve optimally. This motivates us to propose an iterative algorithm that alternately optimizes the power allocation and passive array coefficients, which is guaranteed to converge to at least a locally optimal solution. Moreover, we devise a customized initialization method for the iterative algorithm, by considering the IRS coefficient design that maximizes the overall channel power between the BS and the user. \item Finally, we evaluate the performance of our proposed designs via numerical results. It is shown that the proposed joint power allocation and IRS coefficient designs generally achieve improved rate performance compared to systems without using IRS or with random IRS reflection coefficients, for both cases of perfect and estimated CSI. Moreover, it is shown that the proposed initialization scheme is already able to achieve comparable performance to that of the iterative algorithm, thus is suitable for low-complexity implementation in practice. Furthermore, by comparing the performance of the proposed grouping with different group size and at high or low signal-to-noise ratio (SNR) values, it is unveiled that there generally exists an optimal group size that maximizes the achievable rate considerably, with a given channel coherence time, by optimally striking the balance between minimizing the training overhead and maximizing the IRS passive beamforming flexibility. \end{itemize} The rest of this paper is organized as follows. Section \ref{sec:sysmodel} presents the system model of the IRS-enhanced OFDM communication and illustrates the proposed IRS elements grouping. Section \ref{sec:ce} proposes a practical transmission protocol with channel estimation based on the proposed grouping scheme. Given grouping and channel estimates, Section \ref{sec:pfsol} formulates the joint optimization problem of the OFDM power allocation and IRS reflection coefficients to maximize the achievable rate, and proposes an iterative algorithm to obtain a suboptimal solution for it. Section \ref{sec:sim} presents numerical results to evaluate the performance of the proposed protocol and designs. Finally, Section \ref{sec:con} concludes the paper. \emph{Notation:} For ease of reference, Table \ref{table:not} summarizes the main variables which will be used throughout this paper. Furthermore, vectors and matrices are denoted by bold-face lower-case and upper-case letters, respectively. Sets are designated by upper-case calligraphic letters. $[\boldsymbol{x}]_{a:b}$ denotes the subvector that contains the $a$-th to $b$-th elements of $\boldsymbol{x}$. $\Re({\cdot})$, $\Im({\cdot})$, $(\cdot)^*$ and $\arg(\cdot)$ denote the real part, imaginary part, conjugate, and angle of a complex number, respectively. For a matrix $\boldsymbol{M}$ of arbitrary size, $\boldsymbol{M}^H$ denotes the conjugate transpose, and $\boldsymbol{M}_{i,j}$ denotes the entry in the $i$-th row and $j$-th column. $\mathrm{Tr}(\cdot)$ denotes the matrix trace. $\boldsymbol{F}_N$ and $\boldsymbol{F}_N^H$ refer to the $N\times N$ discrete Fourier transform (DFT) and inverse DFT (IDFT) matrices, respectively. $\boldsymbol{0}_{a \times b}$ denotes an all-zero matrix of size $a\times b$, $\boldsymbol{1}_{a \times b}$ denotes an all-one matrix of size $a\times b$, $\boldsymbol{I}_M$ denotes the identity matrix of size $M\times M$, and $\boldsymbol{e}_m$ denotes the $m$-th column of $\boldsymbol{I}_M$. $\mathrm{diag}(\boldsymbol{x})$ denotes a square diagonal matrix with the elements of $\boldsymbol{x}$ on the main diagonal, whereas $\mathrm{Diag}(\boldsymbol{X})$ denotes a column vector formed by the main diagonals of $\boldsymbol{X}$. $\|\cdot\|$ denotes the $l_2$ norm and $\left\|\cdot\right\|_F$ denotes the Frobenius norm. $\otimes$ denotes the Kronecker product and $*$ denotes the linear convolution. The distribution of a circularly symmetric complex Gaussian (CSCG) random variable with mean $\mu$ and variance $\sigma^2$ is denoted by $\mathcal{CN}(\mu,\sigma^2)$; and $\sim$ stands for ``distributed as". $\mathbb{C}^{x\times y}$ denotes the space of $x\times y$ complex matrices. $\mathbb{R}$ denotes the space of real numbers. $\max(x,y)$ denotes the maximum between two real numbers $x$ and $y$. ${\mathbb E}\left\{ \cdot \right\}$ stands for the expectation operation and $\mathcal{O}(\cdot)$ stands for the standard big-O notation. \begin{table}[t] \centering \caption{List of Main Variables and Their Physical Meanings} \begin{tabular}{ | l | l |} \hline $\boldsymbol{h}_d$ & BS-user (direct) channel \\ $\boldsymbol{h}_r$ & BS-IRS-user (reflected) channel \\ $\tilde{\boldsymbol{h}}$ & Overall impulse response for combined BS-user and BS-IRS-user channels\\ $\boldsymbol{v}$ & Overall frequency response for combined BS-user and BS-IRS-user channels\\ $\boldsymbol{h}_m$ & BS-IRS channel for the $m$-th IRS element \\ $\boldsymbol{g}_m$ & IRS-user channel for the $m$-th IRS element \\ $\boldsymbol{\nu}_m$ & BS-IRS and IRS-user composite channel for the $m$-th IRS element\\ $\boldsymbol{\nu}'_k$ & BS-IRS and IRS-user composite channel for the $k$-th IRS group\\ $\boldsymbol{V}$ & BS-IRS and IRS-user composite channel for all IRS elements \\ $\boldsymbol{V}'$ & BS-IRS and IRS-user composite channel for all IRS groups \\ $\boldsymbol{\phi}$ & IRS reflection coefficients\\ $\bar{\boldsymbol{\phi}}$ & IRS group reflection coefficients\\ \hline \end{tabular} \label{table:not} \end{table} \section{System Model and IRS Elements Grouping Design} \label{sec:sysmodel} We consider a single-user OFDM-based wireless system, wherein an IRS is employed to enhance the communication between a BS and a user, as illustrated in Fig. \ref{fig:irs}. For the purpose of exposition, we assume that the BS and the user are both equipped with a single antenna. The IRS is assumed to comprise $M$ passive reflecting units, denoted by the set $\mathcal{M}=\{1,\dotsc, M\}$, and is connected to a controller, which adjusts the IRS pattern for desired signal reflection. Without loss of generality, we focus on uplink communication from the user to the BS in this paper, where pilot symbols are sent from the user and reflected by the IRS, based on which the BS estimates all the involved channels, computes the optimal design parameters, and then informs the IRS via a separate wireless control link (details to be given in Section \ref{sec:ce}). For downlink communication, by assuming channel reciprocity and leveraging TDD, the design parameters can be similarly optimized at the BS based on the channel information obtained during the uplink training. It is further assumed that the signals that are reflected by the IRS more than once have negligible power due to severe path loss and thus are ignored. We consider a quasi-static block fading channel model for all channels involved and focus on one particular fading block where the channels remain approximately constant. Similar to conventional OFDM-based systems, the total bandwidth of the system is equally divided into $N$ orthogonal SCs, denoted by the set $\mathcal{N}=\{0,\dotsc,N-1\}$. Moreover, let $\boldsymbol{p}=[p_0,\dotsc,p_{N-1}]^T\in\mathbb{R}^{N\times 1}$, where each $p_n\geq 0$ denotes the power allocated to the $n$-th SC at the BS. Assume the total transmission power available at the BS is $P$. Thus, the power allocation should satisfy $\sum_{n=0}^{N-1} p_n\leq P$. Let $\boldsymbol{h}_{d}=[\bar{h}_{0},\dotsc,\bar{h}_{L-1},\boldsymbol{0}_{1\times\left(N-L\right)}]^T\in\mathbb{C}^{N\times 1}$ denote the zero-padded $L$-tap baseband equivalent multipath channel for the BS-user direct link. Moreover, there exists an $L_0$-tap baseband equivalent multipath channel for the BS-IRS-user link, through which the signals transmitted by the user are reflected by the IRS before arriving at the BS. Specifically, let $\boldsymbol{h}_m\in\mathbb{C}^{L_1\times 1}$ denote the $L_1$-tap baseband equivalent BS-IRS channel for the $m$-th reflecting element at the IRS, $m\in\mathcal{M}$. Similarly, let $\boldsymbol{g}_m\in\mathbb{C}^{L_2\times 1}$ denote the $L_2$-tap baseband equivalent channel of the IRS-user link for the $m$-th reflecting element, $m\in\mathcal{M}$. At the IRS, each element re-scatters the received signals with an independent reflection coefficient. Specifically, let $\boldsymbol{\phi}=[\phi_1, \dotsc, \phi_M]^T\in\mathbb{C}^{M\times 1}$ denote the IRS reflection coefficients, where each $\phi_m=\beta_m e^{j\theta_m}$ comprises an amplitude coefficient $\beta_m\in[0,1]$ and a phase shift $\theta_m\in[-\pi,\pi)$, i.e., $|\phi_m|\leq 1$. The composite BS-IRS-user channel for the $m$-th reflecting element is thus the concatenation of the BS-IRS channel, IRS reflection, and IRS-user channel, which is given by $\boldsymbol{h}_m*\phi_m*\boldsymbol{g}_m=\phi_m\boldsymbol{h}_m*\boldsymbol{g}_m\in\mathbb{C}^{L_0\times 1}$, where $L_0=L_1+L_2-1$. For ease of exposition, define $\boldsymbol{V}=[\boldsymbol{\nu}_1,\dotsc,\boldsymbol{\nu}_M]\in\mathbb{C}^{N\times M}$ as the zero-padded concatenated BS-IRS and IRS-user channels, where each $\boldsymbol{\nu}_m\triangleq[(\boldsymbol{h}_m*\boldsymbol{g}_m)^T,\boldsymbol{0}_{1\times(N-L_0)}]^T\in\mathbb{C}^{N\times 1}$. The composite BS-IRS-user channel for all IRS reflecting elements, denoted by $\boldsymbol{h}_r\in\mathbb{C}^{N\times 1}$, can thus be expressed as \begin{equation}\label{eqn:hr1} \boldsymbol{h}_r=\boldsymbol{V}\boldsymbol{\phi}. \end{equation} Hence, the superposed channel impulse response (CIR) between the BS and the user by combining the BS-user (direct) channel and the BS-IRS-user (IRS-reflected) channel is given by \begin{equation}\label{eqn:hall} \tilde{\boldsymbol{h}}=\boldsymbol{h}_{d}+\boldsymbol{h}_{r}. \end{equation} Assume OFDM modulation at the BS with a cyclic prefix (CP) of length $N_{\mathrm{CP}}$, with $N_{\mathrm{CP}}\geq\max(L, L_0)$. The channel frequency response (CFR) $\boldsymbol{v}=[v_{0},\dotsc,v_{N-1}]^T\in\mathbb{C}^{N\times 1}$ of the CIR $\tilde{\boldsymbol{h}}$ is thus given by \begin{align} \boldsymbol{v}=\boldsymbol{F}_N\tilde{\boldsymbol{h}}.\label{eqn:vall} \end{align} It is worth noting that with given $\boldsymbol{\phi}$, knowledge of $\boldsymbol{\nu}_m$ suffices to characterize the BS-IRS-user composite channel for the $m$-th reflecting element, thus explicit knowledge of the individual channels $\boldsymbol{g}_m$ and $\boldsymbol{h}_m$ are not required. Hence, the overall CFR can be rewritten as $\boldsymbol{v}=\boldsymbol{F}_N\tilde{\boldsymbol{h}}=\boldsymbol{F}_N\left(\boldsymbol{h}_{d}+\boldsymbol{V}\boldsymbol{\phi}\right)$, and the CFR at each $n$-th SC is given by \begin{equation}\label{eqn:vn} v_n=\boldsymbol{f}_n^H\boldsymbol{h}_{d}+\boldsymbol{f}_n^H\boldsymbol{V}\boldsymbol{\phi}, \quad n\in\mathcal{N}, \end{equation} where $\boldsymbol{f}_n^H$ denotes the $n$-th row of the DFT matrix $\boldsymbol{F}_N$. Therefore, the maximum achievable rate in bits per second per Hertz (bps/Hz) is given by \begin{align} r(\boldsymbol{p},\boldsymbol{\phi})\!=\!\frac{1}{N\!+\!N_{\mathrm{CP}}}\!\sum_{n=0}^{N-1}\! \log_2\!\left(\!1\!+\!\frac{|\boldsymbol{f}_n^H\boldsymbol{h}_{d}\!+\!\boldsymbol{f}_n^H\boldsymbol{V}\boldsymbol{\phi}|^2p_n}{\Gamma\sigma^2} \!\right)\!,\label{eqn:rk} \end{align} where $\Gamma\geq 1$ is the gap from channel capacity owing to a practical modulation and coding scheme (MCS); the receiver noise at each SC is modelled as an independent CSCG random variable with mean zero and variance $\sigma^2$. Note that (\ref{eqn:rk}) represents the theoretical upper-bound of the achievable rate of the considered OFDM system, which is difficult to be achieved in practice. This is because to perform OFDM coherent detection at the receiver as well as to design the transmit power allocation and IRS reflection coefficients, accurate knowledge of the CSI (i.e., $\boldsymbol{h}_d$ and $\boldsymbol{V}$) is required, which needs to be acquired at the cost of channel training and feedback overhead. Moreover, note that the dimension of the composite channel $\boldsymbol{V}$ grows linearly with the number of IRS reflecting elements, $M$, which can be very large in practice (e.g., current metasurfaces are typically equipped with more than tens and up to thousands of elements \cite{metasurcell}). The number of involved channel coefficients therein is therefore much larger than that for conventional OFDM systems without the IRS, which leads to increased overhead and higher complexity for channel training and estimation to obtain all of them. \begin{figure}[t] \centering \includegraphics[width=0.5\linewidth, keepaspectratio]{IRS_grouping.eps} \DeclareGraphicsExtensions. \caption{Illustration of the IRS reflect array and proposed elements grouping.} \label{fig:irsgroup} \vspace{-6mm} \end{figure} To address the aforementioned issues, in this paper, we propose an \emph{IRS elements grouping} method to reduce the training overhead and estimation complexity. Specifically, note that since the IRS elements are usually tightly packed \cite{metasurcell}, the channels for \emph{adjacent} elements are practically \emph{correlated}. Therefore, we propose to group the adjacent IRS elements that form a small block, as illustrated in Fig. \ref{fig:irsgroup}, based on which we estimate the combined channel of each group and consider a common reflection coefficient in the same group. Let $K$ denote the number of groups, with $1\leq K\leq M$. Without loss of generality, we assume equal size (number of IRS elements) of each group, which is given by $B=M/K$.\footnote{Without loss of generality, we assume that $B$ is an integer.} We further define the \emph{grouping ratio} as $\rho=1/B=K/M$, where $0<\rho\leq 1$; thus, a smaller grouping ratio implies more elements in each group. For illustration, we consider a rectangular-shaped IRS as shown in Fig. \ref{fig:irsgroup} with $\rho=1/4$, where there are $M_x$ and $M_y$ elements in each row and column, respectively. We further assume rectangular-shaped groups with $B_x$ and $B_y$ elements in each row and column, respectively, with $1\leq B_x\leq M_x$ and $1\leq B_y\leq M_y$. Therefore, the number of groups $K$ as well as the grouping ratio $\rho$ can be adjusted by varying $B_x$ and $B_y$. For ease of exposition, given any grouping, we assume the indices of IRS reflecting elements within each group are continuous, namely, the $\left((k-1)B+1\right)$-th to the $\left(kB\right)$-th elements belong to the $k$-th group, as illustrated in Fig. \ref{fig:irsgroup}. By considering a common reflection coefficient to the elements of each group, the IRS reflection coefficients can be re-expressed as \begin{align} \boldsymbol{\phi}=\bar{\boldsymbol{\phi}}\otimes {\bf 1}_{B\times 1}, \end{align} where $\bar{\boldsymbol{\phi}}=[\bar{\phi}_1,\cdots, \bar{\phi}_K]^T\in\mathbb{C}^{K\times 1}$ represents the IRS \emph{group} reflection coefficients, with $\bar{\phi}_k$ denoting the common reflection coefficient for the $k$-th group. With grouping, the concatenation of the BS-IRS channel, IRS reflection, and IRS-user channel in (\ref{eqn:hr1}) can be rewritten as \begin{align} \boldsymbol{h}_r =[{\boldsymbol{\nu}}_1,\dotsc,{\boldsymbol{\nu}}_M]\bar{\boldsymbol{\phi}}\otimes {\bf 1}_{B\times 1}=[\boldsymbol{\nu}'_1,\dotsc,\boldsymbol{\nu}'_K]\bar{\boldsymbol{\phi}}=\boldsymbol{V}'\bar{\boldsymbol{\phi}}, \end{align} where $\boldsymbol{\nu}'_k=\sum_{b=1}^{B} {\boldsymbol{\nu}}_{b+(k-1)\times B}$ denotes the combined composite reflecting channel associated with the $k$-th IRS group, $k\in\mathcal{K}$, with $\mathcal{K}=\{1,\dotsc,K\}$, and $\boldsymbol{V}'\triangleq[\boldsymbol{\nu}'_1,\dotsc,\boldsymbol{\nu}'_K]\in\mathbb{C}^{N\times K}$ denotes the group composite channel matrix. It is worth noting that with our proposed grouping method, the size of the composite channel matrix associated with the IRS reflected link that needs to be estimated, $\boldsymbol{V}'$, is given by $N\times K$, which is generally smaller than that of the entire composite channel $\boldsymbol{V}$, $N\times M$, due to $K\leq M$. The maximum achievable rate based on the proposed IRS elements grouping is then given by \begin{align} r(\boldsymbol{p},\bar{\boldsymbol{\phi}})\!=\!\frac{1}{N\!+\!N_{\mathrm{CP}}}\!\sum_{n=0}^{N-1}\! \log_2\!\left(\!1\!+\!\frac{|\boldsymbol{f}_n^H\boldsymbol{h}_{d}\!+\!\boldsymbol{f}_n^H\boldsymbol{V}'\bar{\boldsymbol{\phi}}|^2p_n}{\Gamma\sigma^2} \!\right)\!,\label{eqn:rk2} \end{align} which is equivalent to (\ref{eqn:rk}) if $K=M$. Based on our proposed grouping method, we further propose a practical transmission protocol to approach the theoretical maximum achievable rate shown in (\ref{eqn:rk2}) in the next section. \section{Transmission Protocol with IRS Elements Grouping} \label{sec:ce} In this section, we propose a practical transmission protocol based on the proposed grouping method, as illustrated in Fig. \ref{fig:Preamble}. Specifically, each channel coherence block consists of three transmission phases, with $T_c$ denoting the channel coherence time normalized to number of OFDM symbol durations. In the first phase, $K+1$ pilot symbols are transmitted from the user and reflected by the IRS, based on which the BS estimates the channel for both the BS-user direct link (i.e., $\boldsymbol{h}_d$) and the BS-IRS-user reflected link (i.e., $\boldsymbol{V}'$) for each IRS elements group. Then, based on the estimated channels, the BS computes the optimal transmit power allocation (i.e., $\boldsymbol{p}$) and IRS group reflection coefficients (i.e., $\bar{\boldsymbol{\phi}}$) that maximize the achievable rate, and feeds back $\boldsymbol{p}$ and $\bar{\boldsymbol{\phi}}$ to the user and the IRS controller, respectively. Finally, data transmission proceeds in the third phase based on the optimized $\boldsymbol{p}$ and $\bar{\boldsymbol{\phi}}$ and the estimated channels. In the following, we elaborate the three transmission phases in detail. \begin{figure}[!t] \centering \includegraphics[width=0.9\linewidth,keepaspectratio]{Preamble.eps} \caption{Illustration of the proposed protocol with IRS elements grouping.} \label{fig:Preamble} \vspace{-6mm} \end{figure} \subsection{Pilot Transmission and Channel Estimation} Recall that the combined composite BS-IRS and IRS-user channel matrix $\boldsymbol{V}'\in\mathbb{C}^{N\times K}$ comprises all the reflecting channels associated with the respective IRS elements groups, which superpose with each other in the resultant BS-IRS-user link as $\boldsymbol{h}_r=\boldsymbol{V}'\bar{\boldsymbol{\phi}}$. To resolve their individual channels, we perform channel training based on the on/off state control of the IRS reflecting elements, which requires $T_p=K+1$ OFDM symbol durations as shown in Fig. \ref{fig:Preamble}. Specifically, let $\boldsymbol{x}_p\in\mathbb{C}^{N\times 1}$ denote the pilot signal sent at every symbol duration in the first phase, and $\boldsymbol{X}_p=\mathrm{diag}(\boldsymbol{x}_p)$. In the first symbol duration, all the IRS reflecting elements are switched off, i.e., $\bar{\boldsymbol{\phi}}={\bf 0}_{K\times 1}$. The equivalent baseband received signal in the frequency domain after CP removal is then given by \begin{align}\label{direct_pilot} \boldsymbol{s}_0 = \boldsymbol{X}_p\boldsymbol{F}_N\boldsymbol{h}_d +\boldsymbol{n}_0, \end{align} where $\boldsymbol{n}_0$ denotes the receiver noise with each element modelled by an independent CSCG random variable with mean zero and variance $\sigma^2$. Then, at the $(k+1)$-th pilot symbol, $k\in\mathcal{K}$, only the elements in the $k$-th group are switched on for full-reflection, while the remaining elements in other groups are switched off, i.e., $\bar{\boldsymbol{\phi}}=\boldsymbol{e}_k$, $k\in\mathcal{K}$. The equivalent baseband received signal in the frequency domain after CP removal is therefore given by \begin{align}\label{IRS_pilot} \boldsymbol{s}_k = \boldsymbol{X}_p\boldsymbol{F}_N(\boldsymbol{h}_d +\boldsymbol{\nu}'_k) +\boldsymbol{n}_k, \quad\quad k\in\mathcal{K}, \end{align} where $\boldsymbol{n}_k$ denotes the receiver noise at the ($k+1$)-th pilot symbol duration, with $\boldsymbol{n}_k\!\sim\!\mathcal{CN}\left(0,\sigma^2\boldsymbol{I}_N\right)$. Then, based on (\ref{direct_pilot}) and (\ref{IRS_pilot}), the BS-user channel and the composite reflecting channel can be obtained at the receiver by employing the least square (LS) estimation, which are expressed as \cite{lsest,lsest2} \begin{align} \hat{\boldsymbol{h}}_d &=\left[\left[\frac{1}{N}\boldsymbol{F}^H_N \boldsymbol{X}_p^{-1} \boldsymbol{s}_0\right]^T_{1:L},\; \boldsymbol{0}_{1\times (N-L)}\right]^T=\left[\left[\frac{1}{N}\boldsymbol{F}^H_N \boldsymbol{X}_p^{-1} \left(\boldsymbol{X}_p\boldsymbol{F}_N\boldsymbol{h}_d +\boldsymbol{n}_0\right) \right]^T_{1:L},\; \boldsymbol{0}_{1\times (N-L)}\right]^T\notag\\ &={\boldsymbol{h}}_d+\breve{\boldsymbol{n}}_0 ,\label{direct_est}\\ \hat{\boldsymbol{\nu}}'_k &=\left[\left[\frac{1}{N}\boldsymbol{F}^H_N \boldsymbol{X}_p^{-1} \boldsymbol{s}_k-\hat{\boldsymbol{h}}_d\right]^T_{1:L_0},\; \boldsymbol{0}_{1\times (N-L_0)}\right]^T\notag\\ &=\left[\left[\frac{1}{N}\boldsymbol{F}^H_N \boldsymbol{X}_p^{-1} \left( \boldsymbol{X}_p\boldsymbol{F}_N(\boldsymbol{h}_d +\boldsymbol{\nu}'_k) +\boldsymbol{n}_k \right)-{\boldsymbol{h}}_d-\breve{\boldsymbol{n}}_0\right]^T_{1:L_0},\; \boldsymbol{0}_{1\times (N-L_0)}\right]^T\notag\\ &={\boldsymbol{\nu}}'_k +\breve{\boldsymbol{n}}_k-\breve{\boldsymbol{n}}_0 , \quad k\in\mathcal{K},\label{reflect_est} \end{align} where $\breve{\boldsymbol{n}}_0=\left[\left[\frac{1}{N}\boldsymbol{F}^H_N \boldsymbol{X}_p^{-1} \boldsymbol{n}_0 \right]^T_{1:L},\; \boldsymbol{0}_{1\times (N-L)}\right]^T$ and $\breve{\boldsymbol{n}}_k=\left[\left[\frac{1}{N}\boldsymbol{F}^H_N \boldsymbol{X}_p^{-1} \boldsymbol{n}_k \right]^T_{1:L_0},\; \boldsymbol{0}_{1\times (N-L_0)}\right]^T$ for $k\in\mathcal{K}$.\footnote{We may need to assume that $L\le L_0$ for (\ref{reflect_est}) to avoid improper truncation of ${\boldsymbol{h}}_d$. This is highly likely in practice, since the signal path of the BS-IRS-user reflected channel is typically longer than the BS-user direct channel.} Moreover, based on (\ref{direct_est}) and (\ref{reflect_est}), the average mean square error (MSE) of channel estimation on each SC can be derived as \begin{align} \varepsilon &=\frac{1}{N} \cdot {\mathbb E}\left\{ \left\| \boldsymbol{h}_d +{\boldsymbol{V}}'{\bar{\boldsymbol{\phi}}}-\hat{\boldsymbol{h}}_d -\hat{\boldsymbol{V}}' {\bar{\boldsymbol{\phi}}} \right\|^{2} \right\}\nonumber\\ &=\frac{1}{N} \cdot {\mathbb E}\left\{ \left\| \breve{\boldsymbol{n}}_0 +\left[\breve{\boldsymbol{n}}_1-\breve{\boldsymbol{n}}_0,\ldots, \breve{\boldsymbol{n}}_K-\breve{\boldsymbol{n}}_0 \right] {\bar{\boldsymbol{\phi}}} \right\|^{2} \right\}\nonumber\\ &\le \frac{\sigma^2(K+1)L+\sigma^2KL_0 }{P_{t}},\label{MSE} \end{align} where $P_t$ denotes the total transmit power during channel training. It can be observed from \eqref{MSE} that the MSE is inversely proportional to the training SNR and proportional to the number of groups $K$, i.e., we can reduce the channel estimation error by increasing the transmit power during the training phase and/or the group size (i.e., smaller $K$). Meanwhile, it is worth noting that, with the proposed IRS elements grouping, the pilot training period $T_p$ is reduced to $K+1$ OFDM symbols as compared to $M+1$ without the grouping, if $K<M$.\footnote{It is worth pointing out that during the preparation of this work, we became aware of a related work \cite{Mishra2019Channel} on the channel estimation for IRS-enhanced systems, which independently proposed a sequential channel estimation method under the frequency-flat channel that requires $M+1$ pilot symbols in the training phase. This method can be considered as a special case of our proposed scheme without the grouping.} \subsection{Processing and Feedback} In the second phase, based on the estimated CSI $\hat{\boldsymbol{h}}_d$ and $\hat{\boldsymbol{V}}'$ at the BS, the transmit power allocation and IRS group reflection coefficients are optimized at the BS to maximize the achievable rate, which is given by \begin{align} r(\boldsymbol{p},\bar{\boldsymbol{\phi}}|\hat{\boldsymbol{h}}_d, \hat{\boldsymbol{V}}')=\left(1-\frac{T_{\mathrm{p}}+\tau_{D}}{T_{c}}\right)\frac{1}{N+N_{\mathrm{CP}}} \sum_{n=0}^{N-1}\log_2 \left(1+\frac{\left|\boldsymbol{f}_n^H \hat{\boldsymbol{h}}_d+\boldsymbol{f}_n^H \hat{\boldsymbol{V}}'{\bar{\boldsymbol{\phi}}} \right|^2 p_n }{\Gamma\sigma^2}\right),\label{eqn:r2} \end{align} where $\tau_D$ denotes the processing and feedback delay. For simplicity, we ignore the estimation error during parameter optimization, while the effect of estimation error will be taken into account in the simulations. Let $\boldsymbol{p}^{\star}$ and $\bar{\boldsymbol{\phi}}^{\star}$ denote the set of optimal transmit power allocation and IRS reflection coefficients, respectively. The details on how to obtain $\boldsymbol{p}^{\star}$ and $\bar{\boldsymbol{\phi}}^{\star}$ will be presented in Section \ref{sec:pfsol}. Afterwards, the BS feeds back $\boldsymbol{p}^{\star}$ to the user and $\bar{\boldsymbol{\phi}}^{\star}$ to the IRS controller, respectively. \subsection{Data Transmission} Finally, with the optimized transmit power allocation $\boldsymbol{p}^{\star}$ available at both the BS and the user as well as the optimized IRS group reflection coefficients $\bar{\boldsymbol{\phi}}^{\star}$ available at the BS and the IRS, all IRS elements are switched on and data transmission proceeds with the optimized design parameters. Note that due to the presence of channel estimation error, which can be viewed equivalently as additional interference at the receiver, the achievable rate for actual data transmission will be lower than that obtained in \eqref{eqn:r2}. Furthermore, it is worth noting that there exists a fundamental \emph{trade-off} between the training overhead versus the IRS reflection coefficient design flexibility. Specifically, as the number of groups $K$ and consequently the grouping ratio $\rho$ decreases, the estimation error decreases while the effective data transmission time increases, while the reduced number of elements in $\bar{\boldsymbol{\phi}}$ leads to less flexibility in the IRS reflection coefficient design and thereby potentially smaller achievable rate in the data transmission phase. Nevertheless, as the channel correlation among the IRS elements in the same group becomes stronger, it is anticipated that such design flexibility loss will be compensated by the saved data transmission time. Moreover, the optimal grouping ratio is also dependent on the channel coherence time. A comprehensive illustration of this trade-off will be given later in Section \ref{sec:sim} via numerical results. \section{Achievable Rate Maximization via Joint Power Allocation and Reflection Coefficient Optimization} \label{sec:pfsol} \subsection{Problem Formulation} Based on the transmission protocol proposed in Section \ref{sec:ce} as well as given IRS elements grouping $K$ and channel estimates $\hat{\boldsymbol{h}}_d$ and $\hat{\boldsymbol{V}}'$, we aim to maximize the achievable rate shown in (\ref{eqn:r2}) by jointly optimizing the transmit power allocation and the IRS reflection coefficients. Therefore, we formulate the following optimization problem (by omitting the constant terms in (\ref{eqn:r2}) for brevity) \begin{align} \mathrm{(P1)}:\mathop{\mathtt{maximize~~}}_{\boldsymbol{p},\bar{\boldsymbol{\phi}}~} &~~\sum_{n=0}^{N-1} \log_2\left(1\!+\!\frac{\left|\boldsymbol{f}_n^H\hat{\boldsymbol{h}}_{d}\!+\!\boldsymbol{f}_n^H\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}\right|^2p_n}{\Gamma\sigma^2} \right) \nonumber\\ \mathtt{subject\; to} &~~\sum_{n=0}^{N-1} p_{n}\leq P, \label{eqn:const1}\\ &~~p_n \geq0, \quad \forall n \in \mathcal{N}, \label{eqn:const2}\\ &~~|\bar{\phi}_k|\leq 1, \quad \forall k\in \mathcal{K}.\label{eqn:const3} \end{align} Problem (P1) is a non-convex optimization problem. Particularly, it can be shown that the objective function of (P1) is non-concave over $\bar{\boldsymbol{\phi}}$; moreover, the variables $\bar{\boldsymbol{\phi}}$ and $\boldsymbol{p}$ are coupled in the objective function, which makes their joint optimization difficult. To overcome the above challenges, in the following, we propose an alternating optimization algorithm to find an approximate solution to (P1), by iteratively optimizing one of $\boldsymbol{p}$ and $\bar{\boldsymbol{\phi}}$ with the other fixed at each time. In addition, we devise a customized method to obtain an initial solution of $\bar{\boldsymbol{\phi}}$, denoted by $\bar{\boldsymbol{\phi}}_0$, as the starting point of the proposed alternating optimization algorithm. \subsection{Power Allocation Optimization Given IRS Coefficients} \label{sec:pa} Note that given a set of IRS coefficients $\bar{\boldsymbol{\phi}}$ with the CSI estimates, the CFR can be estimated as $\hat{\boldsymbol{v}}=\boldsymbol{F}_N\left(\hat{\boldsymbol{h}}_d+\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}\right)$. The optimal BS transmit power allocation $\boldsymbol{p}$ is thus given by the well-known water-filling (WF) solution \cite{goldsmith}, i.e., \begin{equation}\label{eqn:p1} p_n=\left(\frac{1}{c_u}-\frac{1}{c_n}\right)^+,\quad\forall n\in\mathcal{N}, \end{equation} where $\left(x\right)^+\triangleq\max\left(0,x\right)$, $c_n=|\hat{v}_n|^2/(\Gamma\sigma^2)$ is the effective channel-to-noise power ratio (CNR) for SC $n$, and $c_u$ is the cut-off CNR that satisfies \begin{align} \sum_{n=0}^{N-1} \left(\frac{1}{c_u}-\frac{1}{c_n}\right)^+=P.\label{eqn:p2} \end{align} \subsection{IRS Coefficient Optimization Given Power Allocation} Given power allocation, Problem (P1) is simplified as \begin{align} \mathrm{(P1.1)}:\mathop{\mathtt{maximize~~}}_{\bar{\boldsymbol{\phi}}~} &~\sum_{n=0}^{N-1} \log_2\left(\!1\!+\!\frac{|\boldsymbol{f}_n^H\hat{\boldsymbol{h}}_{d}\!+\!\boldsymbol{f}_n^H\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}|^2p_n}{\Gamma\sigma^2} \!\right) \nonumber\\ \mathtt{subject\; to} &~~|\bar{\phi}_k|\leq 1, \quad \forall k\in \mathcal{K}. \end{align} It can be shown that (P1.1) is a non-convex optimization problem. In the following, we adopt the successive convex approximation (SCA) technique \cite{sca} to obtain a locally optimal solution to (P1.1). First, by introducing a set of auxiliary variables $y_n$'s, $a_n$'s, and $b_n$'s, we transform (P1.1) into the following equivalent problem \begin{align} \mathrm{(P1.1')}:\mathop{\mathtt{maximize~~}}_{\bar{\boldsymbol{\phi}},\{\!y_n\!\},\{\!a_n\!\},\{\!b_n\!\}} &~\sum_{n=0}^{N-1} \log_2\left(1+\frac{y_np_n}{\Gamma\sigma^2} \right) \nonumber\\ \mathtt{subject\; to} &~|\bar{\phi}_k|\leq 1, \quad \forall k\in \mathcal{K},\label{eqn:phim}\\ &~a_n\!=\!\Re\{\boldsymbol{f}_n^H\hat{\boldsymbol{h}}_{d}\!+\!\boldsymbol{f}_n^H\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}\},\;\forall n\!\in\!\mathcal{N},\label{eqn:an}\\ &~b_n\!=\!\Im\{\boldsymbol{f}_n^H\hat{\boldsymbol{h}}_{d}\!+\!\boldsymbol{f}_n^H\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}\},\;\forall n\!\in\!\mathcal{N},\label{eqn:bn}\\ &~y_n\leq a_n^2+b_n^2, \quad\forall n\in\mathcal{N}.\label{eqn:const4} \end{align} Define $\tilde{f}_n(a_n,b_n)\triangleq a_n^2+b_n^2$, which is a convex and differentiable function over $a_n$ and $b_n$. Thus, given any $\tilde{a}_n$ and $\tilde{b}_n$, the first-order approximation of $\tilde{f}_n(a_n,b_n)$ at the point $(\tilde{a}_n,\tilde{b}_n)$ serves as a lower bound to it, i.e., \begin{align} \tilde{f}_n(a_n,b_n)\geq\tilde{a}_n^2+\tilde{b}_n^2+2\tilde{a}_n(a_n-\tilde{a}_n)+2\tilde{b}_n(b_n-\tilde{b}_n)\triangleq f_n(a_n,b_n), \end{align} where equality holds if and only if $\tilde{a}_n=a_n$ and $\tilde{b}_n=b_n$. Note that $f_n(a_n,b_n)$ is an affine function over $a_n$ and $b_n$, which also has the same gradient over $a_n$ and $b_n$ as $\tilde{f}_n(a_n,b_n)$ at the point $(\tilde{a}_n,\tilde{b}_n)$. Next, we consider the following optimization problem \begin{align} \mathrm{(P1.2)}:\mathop{\mathtt{maximize~~}}_{\bar{\boldsymbol{\phi}},\{\!y_n\!\}\!,\{\!a_n\!\}\!,\{\!b_n\!\}\!~} &~\sum_{n=0}^{N-1} \log_2\left(1+\frac{y_np_n}{\Gamma\sigma^2} \right) \nonumber\\ \mathtt{subject\; to} &~(\ref{eqn:phim}),(\ref{eqn:an}),(\ref{eqn:bn})\nonumber\\ &~y_n\leq f_n(a_n,b_n),\quad\forall n\in\mathcal{N}.\label{eqn:const7} \end{align} Problem (P1.2) is a convex optimization problem, which can be solved efficiently via existing software, e.g., CVX \cite{cvx}. The computation complexity for solving (P1.2) can be obtained by considering the complexity analysis of the interior-point method. Specifically, (P1.2) involves $K$ second-order cone (SOC) constraints of size 2, $4N$ linear inequality constraints ($2N$ linear equality constraints) of size $2K+1$, and $N$ linear inequality constraints of size $3$, with a total number of $2K+3N$ optimization variables. The total complexity for solving (P1.2) is thus given by $\sqrt{4N(2K+1)+3N+2K}(2K+3N)(4N(2K+1)^3+27N+(2K+3N)(4N(2K+1)^2+9N)+4K+(2K+3N)^2)$ \cite{complexity}, i.e., $\mathcal{O}(K^{4.5}N^{3.5})$. Therefore, an approximate solution to (P1.1$'$) and thus (P1.1) can be obtained by successively updating $\{\tilde{a}_n\}$ and $\{\tilde{b}_n\}$ based on the optimal solution to (P1.2), which is summarized in Algorithm 1. It can be shown that monotonic convergence of Algorithm 1 is guaranteed, and the obtained solution is a locally optimal solution to (P1.1) \cite{sca}. \begin{algorithm}[!t] \DontPrintSemicolon \caption{IRS Coefficient Optimization Given Power Allocation via SCA} \KwIn{$\hat{\boldsymbol{h}}_d$, $\hat{\boldsymbol{V}}'$, $\boldsymbol{p}$, $\Gamma$, $\sigma^2$, $N$, $K$, $\tilde{\boldsymbol{\phi}}$.} \KwOut{$\bar{\boldsymbol{\phi}}$.} Set $\tilde{a}_n=\Re\{\boldsymbol{f}_n^H\hat{\boldsymbol{h}}_{d}\!+\!\boldsymbol{f}_n^H\hat{\boldsymbol{V}}'\tilde{\boldsymbol{\phi}}\}$, $\tilde{b}_n=\Im\{\boldsymbol{f}_n^H\hat{\boldsymbol{h}}_{d}\!+\!\boldsymbol{f}_n^H\hat{\boldsymbol{V}}'\tilde{\boldsymbol{\phi}}\}$, $\forall n\in\mathcal{N}$. \Repeat{\upshape the objective value of (P1.1) with the obtained $\bar{\boldsymbol{\phi}}$ reaches convergence.} {Find the optimal solution of $\{a_n\}$, $\{b_n\}$, and $\bar{\boldsymbol{\phi}}$ to (P1.2) via CVX with given $\{\tilde{a}_n\}$, $\{\tilde{b}_n\}$, and $\boldsymbol{p}$. $\tilde{a}_n=a_n$, $\tilde{b}_n=b_n$, $\forall n\in\mathcal{N}$.} \end{algorithm} To summarize, the overall iterative algorithm to solve (P1) is given in Algorithm~2. It is worth noting that starting from an initial point denoted by $\bar{\boldsymbol{\phi}}_0$, the initial value $\tilde{\boldsymbol{\phi}}$ for Algorithm~1 in each iteration of Algorithm~2 is set as the obtained $\bar{\boldsymbol{\phi}}$ in the previous iteration. It can be shown that the objective value of (P1) is non-decreasing over each iteration of Algorithm~2, which is also upper-bounded by a finite value. Therefore, Algorithm~2 is guaranteed to converge. Moreover, the obtained solution to (P1) can be shown to be at least a locally optimal solution based on \cite{conv}. Note that the performance of Algorithm~2 is critically dependent on the choice of the initial IRS reflection coefficients $\bar{\boldsymbol{\phi}}_0$. In the following subsection, we propose a customized method for finding $\bar{\boldsymbol{\phi}}_0$ efficiently. \begin{algorithm}[!t] \DontPrintSemicolon \caption{Alternating Optimization for Solving (P1)} \KwIn{$\hat{\boldsymbol{h}}_d$, $\hat{\boldsymbol{V}}'$, $P$, $\Gamma$, $\sigma^2$, $N$, $K$, $\bar{\boldsymbol{\phi}}=\bar{\boldsymbol{\phi}}_0$.} \KwOut{$\boldsymbol{p}^{\star}$, $\bar{\boldsymbol{\phi}}^{\star}$.} \Repeat{\upshape the objective value of (P1) with the obtained $\boldsymbol{p}$ and $\bar{\boldsymbol{\phi}}$ reaches convergence.} {Fixing the IRS coefficients $\bar{\boldsymbol{\phi}}$, find the WF power allocation $\boldsymbol{p}$ according to (\ref{eqn:vn}), (\ref{eqn:p1}), and (\ref{eqn:p2}). Fixing the power allocation $\boldsymbol{p}$, given initial $\tilde{\boldsymbol{\phi}}=\bar{\boldsymbol{\phi}}$, update the IRS coefficients $\bar{\boldsymbol{\phi}}$ via Algorithm 1.} $\boldsymbol{p}^{\star}=\boldsymbol{p}$, $\bar{\boldsymbol{\phi}}^{\star}=\bar{\boldsymbol{\phi}}$. \end{algorithm} \subsection{Initialization Method} \label{sec:init} Note that the IRS is able to increase the link rate mainly due to the increased effective channel power between the BS and the user, by creating an additional strong CIR via the BS-IRS-user channel that can constructively combine with that of the BS-user direct channel. Motivated by this, we propose to design the initial value of $\bar{\boldsymbol{\phi}}$, i.e., $\bar{\boldsymbol{\phi}}_0$, by maximizing the effective channel power from the BS to the user, which is given by $\left\|\hat{\boldsymbol{h}}_d+\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}\right\|^2$. Therefore, we formulate the following optimization problem \begin{align} \mathrm{(P2)}:~\mathop{\mathtt{maximize~~}}_{\bar{\boldsymbol{\phi}}~} &~\left\|\hat{\boldsymbol{h}}_d+\hat{\boldsymbol{V}}'\bar{\boldsymbol{\phi}}\right\|^2 \nonumber\\ \mathtt{subject\; to} &~~|\bar{\phi}_k|^2\leq 1, \quad \forall k\in\mathcal{K}.\label{eqn:const5} \end{align} Note that Problem (P2) is a non-convex quadratically constrained quadratic problem (QCQP), for which we apply the semidefinite relaxation (SDR) \cite{sdr} technique to obtain an approximate solution for it, as follows. Define $\boldsymbol{A}\triangleq\left(\hat{\boldsymbol{V}}'\right)^H\hat{\boldsymbol{V}}'$ and $\boldsymbol{u}\triangleq\left(\hat{\boldsymbol{V}}'\right)^H\hat{\boldsymbol{h}}_d$, Problem (P2) is thus equivalent to \begin{align} ~\mathop{\mathtt{maximize~~}}_{\bar{\boldsymbol{\phi}}~} &~\bar{\boldsymbol{\phi}}^H\boldsymbol{A}\bar{\boldsymbol{\phi}}+\bar{\boldsymbol{\phi}}^H\boldsymbol{u}+\boldsymbol{u}^H\bar{\boldsymbol{\phi}} \\ \mathtt{subject\; to}&~~|\bar{\phi}_k|^2\leq 1, \quad \forall k\in\mathcal{K}. \end{align} Note that $\bar{\boldsymbol{\phi}}^H\boldsymbol{A}\bar{\boldsymbol{\phi}}=\mathrm{Tr}\left(\bar{\boldsymbol{\phi}}^H\boldsymbol{A}\bar{\boldsymbol{\phi}}\right)=\mathrm{Tr}\left(\bar{\boldsymbol{\phi}}\bar{\boldsymbol{\phi}}^H\boldsymbol{A}\right)$; similarly, $\bar{\boldsymbol{\phi}}^H\boldsymbol{u}=\mathrm{Tr}\left(\boldsymbol{u}\bar{\boldsymbol{\phi}}^H\right)$ and $\boldsymbol{u}^H\bar{\boldsymbol{\phi}}=\mathrm{Tr}\left(\bar{\boldsymbol{\phi}}\boldsymbol{u}^H\right)$ hold. By defining $\boldsymbol{w}=[\bar{\boldsymbol{\phi}},\boldsymbol{u}]^T$ and $\boldsymbol{W}=\boldsymbol{w}\boldsymbol{w}^H$, we transform (P2) into the following problem \begin{align} \mathrm{(P2-SDR)}:~\mathop{\mathtt{maximize~~}}_{\boldsymbol{W}~} ~&~\mathrm{Tr}\left(\boldsymbol{W}\boldsymbol{M}\right)\nonumber\\ \mathtt{subject\; to}~ &~\boldsymbol{W}_{k,k}\leq1, \quad \forall k\in\mathcal{K},\\ &~\boldsymbol{W}_{k,k}=|u_{k-K}|, \quad \forall k\!-\!K\!\in\!\mathcal{K},\\ &~\boldsymbol{W}\succeq\boldsymbol{0},\label{eqn:const7} \end{align} where $\boldsymbol{M}=[\boldsymbol{A},\boldsymbol{I}_K; \boldsymbol{I}_K,\boldsymbol{0}_{K\times K}]$, and the constraint in (\ref{eqn:const7}) ensures $\boldsymbol{W}$ is positive semidefinite. Note that (P2) can be shown to be equivalent to (P2-SDR) with the additional constraint of $\mathrm{rank}(\boldsymbol{W})=1$. Problem (P2-SDR) is a convex semidefinite program (SDP), which can be solved efficiently via existing software, e.g., CVX \cite{cvx}, with a complexity of $\mathcal{O}(K^{4.5})$ \cite{sdr}. Let $\boldsymbol{W}^{\star}$ denote the optimal solution to (P2-SDR). If $\mathrm{rank}\left(\boldsymbol{W}^{\star}\right)\!=\!1$, the relaxation from (P2) to (P2-SDR) is tight and the optimal $\bar{\boldsymbol{\phi}}$ to Problem (P2) can be obtained as $\bar{\boldsymbol{\phi}}^{\star}\!=\!\boldsymbol{U}\mathrm{Diag}\left(\boldsymbol{\Lambda}^{\frac{1}{2}}\right)$, where $\boldsymbol{U}\boldsymbol{\Lambda}\boldsymbol{U}^H$ is the eigenvalue decomposition (EVD) of the upper left $K\!\times\! K$ submatrix of $\boldsymbol{W}^{\star}$, denoted by $\boldsymbol{W}_s^{\star}$. On the other hand, if $\mathrm{rank}\left(\boldsymbol{W}^{\star}\right)\!>\!1$, the optimal objective value of Problem (P2-SDR) serves as an upper bound to that of Problem (P2) and additional processing is required to construct a rank-one solution according to $\boldsymbol{W}^{\star}$. In particular, we consider a customized Gaussian randomization method \cite{sdrrand} to find an approximate solution to Problem (P2). To enhance the performance of the proposed algorithm, a number (denoted by $Q$) of $\hat{\boldsymbol{\phi}}$'s are generated based on $\boldsymbol{W}^{\star}$, from which the one that yields the largest objective value of Problem (P2) is selected. The overall algorithm for solving (P2) is summarized in Algorithm 3, where the output $\bar{\boldsymbol{\phi}}$ of Algorithm 3 is then set as the initial $\bar{\boldsymbol{\phi}}_0$ for Algorithm 2. \begin{algorithm}[t] \caption{Algorithm for Solving (P2)} \KwIn{$\hat{\boldsymbol{h}}_d$, $\hat{\boldsymbol{V}}'$, $K$, $Q$.} \KwOut{$\bar{\boldsymbol{\phi}}$.} Solve (P2-SDR) via CVX and obtain the optimal solution $\boldsymbol{W}^{\star}$. Obtain the submatrix $\boldsymbol{W}_s^{\star}$ by $[\boldsymbol{W}_s^{\star}]_{i,j}=[\boldsymbol{W}^{\star}]_{i,j}$, $i\in\mathcal{K}$, $j\in\mathcal{K}$. Compute the EVD of $\boldsymbol{W}_s^{\star}$ by $\boldsymbol{W}_s^{\star}=\boldsymbol{U}\boldsymbol{\Lambda}\boldsymbol{U}^H$. \eIf{$\mathrm{rank}\left(\boldsymbol{W}^{\star}\right)=1$} {$\bar{\boldsymbol{\phi}}=\boldsymbol{U}\mathrm{Diag}\left(\boldsymbol{\Lambda}^{\frac{1}{2}}\right)$. } { \For{$q=1$ \KwTo $Q$}{ Generate $\tilde{\boldsymbol{r}}^{(q)}\sim\mathcal{CN}\left(\boldsymbol{0},\boldsymbol{I}_{K}\right)$. Obtain $\hat{\boldsymbol{\phi}}^{(q)}=e^{j\arg\left(\boldsymbol{U}\boldsymbol{\Lambda}^{\frac{1}{2}}\tilde{\boldsymbol{r}}^{(q)}\right)}$. Compute the corresponding channel power $P_h^{(q)}=\left\|\hat{\boldsymbol{h}}_d+\hat{\boldsymbol{V}}'\hat{\boldsymbol{\phi}}^{(q)}\right\|^2 $. } $q^{\star}=\argmax{q=1,\dotsc,Q} P_h^{(q)}$, $\bar{\boldsymbol{\phi}}=\hat{\boldsymbol{\phi}}^{(q^{\star})}$. } \end{algorithm} Note that the complexity for solving the SDP in (P2-SDR) could be practically high for large $K$. To reduce the complexity of the initialization method, we further propose a low-complexity suboptimal method to solve (P2), which is based on successive alignment (SA) of the reflection coefficients. Specifically, starting from a set of initial reflection coefficients with random phase and unit amplitude, the phase of one reflecting element is optimized at a time with all the other reflection coefficients being fixed, and the reflection coefficients of all reflecting elements are updated sequentially in one iteration. The optimal reflection coefficient at the $i$-th reflecting element with $\{\bar{\phi}_k\}_{k\in\mathcal{K},k\neq i}$ being fixed can be obtained as \begin{align} \bar{\phi}_i^{\star}=e^{-j\arg\left\{\left(\boldsymbol{h}_d^H+\sum_{k\neq i,k\in\mathcal{K}}\boldsymbol{\nu}'^H_k\bar{\phi}_k^*\right)\boldsymbol{\nu}'_i\right\}},\quad i\in\mathcal{K}. \end{align} The complexity for updating all reflection coefficients in one iteration is given by $\mathcal{O}(KN)$. Let $I_{SA}$ denote the number of iterations that the SA is performed before proceeding to the alternating optimization in Algorithm 2, the total complexity for this initialization method is thus $\mathcal{O}(I_{SA}KN)$. It is observed that the SA initialization is able to obtain similar performance with the SDR initialization, yet with generally much lower complexity, as will be shown in Section \ref{sec:sim}. \section{Numerical Results} \label{sec:sim} In this section, we evaluate the performance of our proposed protocol and algorithm designs via numerical results, for both downlink and uplink communications. We consider an OFDM system with $N=64$ SCs. For the BS-user direct link, we consider a Rayleigh fading channel with a maximum delay spread of $L=16$ taps, where each tap coefficient is modeled as a zero-mean CSCG random variable with a uniform power delay profile. For the BS-IRS-user composite link, note that the deployment location of the IRS can be chosen to favor line-of-sight (LoS) transmission between the IRS and the BS/user. Hence, we model the BS-IRS channel with a maximum delay spread of $L_1=4$ taps and the IRS-user channel with $L_2=13$ taps (e.g., a rich-scattering indoor environment), with the first tap of each channel being the LoS signal path and the remaining taps characterizing the non-LoS (NLoS) paths. The CP length is thus set as $N_{\mathrm{CP}}=16$. The NLoS channel taps are modeled by Rayleigh fading similar to the BS-user direct link. Let $\zeta_{BI}$ and $\zeta_{Iu}$ denote the power ratio of the LoS component to the NLoS component for the BS-IRS and IRS-user channels, respectively. Hence, $\zeta_{BI}\rightarrow\infty$ indicates an LoS channel while $\zeta_{BI}\rightarrow 0$ indicates a Rayleigh fading channel, similarly for $\zeta_{Iu}$. For illustration, we set $\zeta_{BI}=3$ dB and $\zeta_{Iu}=-20$ dB. For the LoS path, as the IRS array size is practically much smaller than the distance between the IRS and the BS/user (typical metasurface cell dimension is around $5$ mm \cite{metasur,metasurcell} while typical link distance is in the range of tens to hundreds of meters), the channel gains for all elements of the IRS are approximately the same while their phases are correlated depending on the physical layout. For ease of exposition, we assume the IRS is placed along the $x-y$ plane and perpendicular to the ground ($x-z$ plane). The rays arriving at the IRS are assumed to be parallel for all elements, with a common angle of arrival (AoA) composed of an elevation angle of $\psi_e$ and an azimuth angle of $\psi_a$. In the following results with varying $M$, we fix $M_x=5$ and increase $M_y$ linearly with $M$, unless otherwise stated. Let $(m_x,m_y)$ denote the location of an IRS element, with $1\leq m_x\leq M_x$ and $1\leq m_y \leq M_y$. Let $\omega(m_x,m_y)$ denote the phase offset of the IRS-user link at $(m_x,m_y)$ with respect to that at $(1,1)$, thus we have $\omega(m_x,m_y)=\frac{2\pi}{\lambda}((m_x-1)d\sin\psi_e\sin\psi_a+(m_y-1)d\cos\psi_e))$, where $d=0.01$ m denotes the IRS elements separation and $\lambda=0.0857$ m denotes the carrier wavelength (corresponding to a 3.5 GHz carrier frequency). The phase offset for the LoS path of the BS-IRS link can be obtained similarly. As a result, the phase difference of the LoS paths for all IRS elements in the BS-IRS link and IRS-user link are fixed. The average channel power of the direct link is given by $P_d=\mathbb{E}[\|\boldsymbol{h}_d\|^2]$, and that of the reflected link at each reflecting element is given by $P_{r,m}=\mathbb{E}[\|\boldsymbol{\nu}_m\|^2]$, $\forall m\in\mathcal{M}$. For convenience, we normalize the direct link power as $P_d=1$, and the direct link (reference) SNR is thus given by $\gamma_d=P/(N\sigma^2)$. Let $\alpha=P_{r,m}/P_d$ denote the average power ratio of the reflected channel at one reflecting element to the direct link. Hence, $\alpha\rightarrow 0$ indicates that the user is located sufficiently far from the IRS, thus its channel with the BS is dominated by the BS-user direct link; while on the other hand, $\alpha\gg 0$ indicates that the user is located in close vicinity of the IRS. The SNR gap is set as $\Gamma=8.8$ dB \cite{snrgap}, and the number of randomizations in Algorithm 3 is chosen as $Q=50$. All the results are averaged over 100 independent channel realizations. \subsection{Performance of Proposed Algorithms with Perfect CSI} In this subsection, we evaluate the performance of the proposed algorithms in Section \ref{sec:pfsol}. For the purpose of exposition, we assume perfect CSI is available without any grouping (i.e., $K=M$), and ignore any overhead pertaining to channel estimation in this part. The achievable rate in this subsection is thus computed using (\ref{eqn:rk}). For comparison, we consider the following benchmark schemes: \begin{enumerate} \item \textbf{Iterative (amplitude=1)}: In this scheme, we force the amplitudes of the obtained reflection coefficients to unity at the end of Algorithm 2, and then obtain the corresponding WF transmit power allocation and achievable rate. \item \textbf{Channel Power Maximization (CPM)}: In this scheme, we adopt the IRS coefficients as $\bar{\boldsymbol{\phi}}_0$ obtained via the initialization methods based on the CPM proposed in Section \ref{sec:init}, and the WF transmit power allocation based on $\bar{\boldsymbol{\phi}}_0$. \item \textbf{Random Phase}: We assume each IRS coefficient has a random phase independently and uniformly distributed in $[0,2\pi]$ and the maximum amplitude, based on which we obtain the WF transmit power allocation. \item \textbf{Without IRS}: We consider the WF transmit power allocation and achievable rate based on the BS-user direct link only. \end{enumerate} \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth, keepaspectratio]{init_new} \vspace{-3mm} \caption{Convergence behavior of Algorithm 2.} \label{fig:ini_comp} \vspace{-7mm} \end{figure} First, we evaluate the convergence behavior of Algorithm 2. The number of reflecting elements is set as $M=20$, and the power ratio of the reflected link at one reflecting element to the direct link is set as $\alpha=0.05$. For comparison with the CPM-based initialization methods proposed in Section \ref{sec:init}, we consider a benchmark initialization method with random phases. Fig. \ref{fig:ini_comp} shows the achievable rate over iterations at $\gamma_d=5$ dB for a random channel realization. Monotonic convergence is observed for all initialization methods, which is consistent with our discussions in Section \ref{sec:pfsol}. Moreover, it is observed that the SA-based CPM initialization method with $I_{SA}=1$ has similar performance and convergence rate compared to that of the SDR-based CPM initialization counterpart (i.e., $41$ versus $42$ iterations), yet at a much lower complexity. Meanwhile, setting a slightly higher iteration number for the SA-based initialization method, e.g., $I_{SA}=10$, improves the initial achievable rate and the convergence rate (i.e., $9$ iterations). Furthermore, all the proposed CPM-based methods converge much faster compared to the random phase method (i.e., $102$ iterations), while all methods finally achieve the same converged achievable rate (i.e., $1.3685$ bps/Hz). This thus validates the efficiency of the proposed CPM-based initialization methods. Hence, in the following, we adopt the SA-based method with $I_{SA}=10$ for the proposed CPM initialization and iterative method. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth, keepaspectratio]{snr_new} \vspace{-3mm} \caption{Achievable rate versus SNR.} \label{fig:su_snr} \vspace{-7mm} \end{figure} Fig. \ref{fig:su_snr} shows the performance of the iterative algorithm and the benchmark schemes at different SNR values, with $M\!=\!20$ and $\alpha\!=\!0.1$. It is observed that all the four schemes with IRS outperform the scheme without IRS, owing to the IRS-enhanced average channel power between the BS and the user. Moreover, the proposed iterative algorithm and CPM-based initialization scheme both achieve significantly improved achievable rates over the random phase scheme, since the direct channel and the reflecting channel are superposed more constructively via careful design of the IRS reflection coefficients. Meanwhile, it is observed that the reflection coefficients of the proposed alternating optimization method always have unit amplitudes at convergence, and therefore the two iterative methods have identical results. This further lowers the implementation complexity as the dedicated controller for amplitude variation of the reflection coefficients is not required and the IRS practically acts as phase shifters, while the relaxation on the amplitude simplifies the optimization design. Furthermore, it is also observed that the performance of the proposed CPM-based initialization scheme is very close to that of the iterative algorithm. Therefore, this scheme is suitable for practical implementation with lower complexity. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth, keepaspectratio]{m_new} \vspace{-3mm} \caption{Achievable rate versus number of reflecting elements.} \label{fig:su_m} \vspace{-7mm} \end{figure} Fig. \ref{fig:su_m} compares the performance of the iterative algorithm and the benchmark schemes versus $M$, where we set $\gamma_d=5$ dB and $\alpha=0.1$. It is observed that the achievable rates for both the proposed iterative algorithm and initialization scheme increase with $M$, owing to the passive beamforming gain harvested by properly designing the IRS reflection coefficients according to the CSI; while on the other hand, the achievable rate for the random phase scheme has a slower growth rate with $M$. Moreover, it is observed that the performance gain of the proposed schemes over the scheme without IRS or with random phase becomes more pronounced as $M$ increases. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth, keepaspectratio]{alpha_new} \vspace{-3mm} \caption{Achievable rate versus reflected to direct link power ratio.} \label{fig:su_ratio} \vspace{-7mm} \end{figure} Fig. \ref{fig:su_ratio} shows the performance of the iterative algorithm and the benchmark schemes versus the reflected to direct link power ratio $\alpha$ with $M=20$ and $\gamma_d=5$ dB. As $\alpha$ increases, this corresponds to a practical scenario where the user maintains a fixed distance with the BS (e.g., on a circle centered at the BS), and gradually moves towards the IRS. It is observed that when $\alpha$ is very small, all the schemes yield similar performance since the user is far away from the IRS, whose effect is thus negligible. In contrast, as $\alpha$ increases, the performance gains of the proposed iterative algorithm and CPM-based initialization method over the benchmark schemes increase drastically, due to the increased dominance of the IRS reflected link over the direct link. Moreover, it is observed that all the schemes with IRS achieve significantly improved performance compared to that without IRS when $\alpha$ is large. This indicates that even though the user is located far away from the BS in the cell-edge scenario, a nearby IRS is effective in enhancing the link rate. \subsection{Performance of Proposed Algorithms with Imperfect Channel Estimation} In this subsection, we examine the performance of the proposed protocol, and evaluate the impact of IRS grouping ratio and imperfect channel estimation to the proposed algorithms. Note that it has been shown in the previous subsection that, compared with the iterative algorithm, the proposed CPM-based initialization method incurs only marginal performance loss, yet with much lower complexity. Thus, we consider only the proposed CPM-based initialization method for practical implementation in this subsection. Also note that the plots of the achievable rate in this subsection take into account the performance loss due to training overhead and estimation error. For the purpose of drawing essential insights, we ignore the delay time due to processing and feedback (i.e., $\tau_{D}=0$), as the channel training overhead $T_p$ as well as the channel coherence time $T_c$ is generally much larger than $\tau_D$. For illustration, the number of reflecting elements is set as $M=100$ with $M_x=M_y=10$, and the reflected-to-direct link power ratio is set as $\alpha=0.1$. The grouping of IRS reflecting elements at different IRS grouping ratio is given in Table \ref{table:irs_group}. Zadoff-Chu (ZC) sequence \cite{zachu} is employed as the pilot sequence with $P_t=20P$. The other parameters are the same with the previous subsection. \begin{table}[t] \centering \caption{Grouping of IRS elements} \begin{tabular}{ | c | c | c | c | c | c | c|} \hline $\rho$ & $1/100$ & $1/50$ & $1/25$ & $1/10$ & $1/4$ & $1$ \\ \hline $K$ & $1$ & $2$ & $4$ & $10$ & $25$ & $100$\\ \hline $B_x\times B_y$&$10\times 10$ & $5\times 10$ & $5\times 5$ & $2\times 5$ & $2\times 2$ & $1\times 1$\\ \hline \end{tabular} \label{table:irs_group} \end{table} \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth]{20P_CE} \vspace{-3mm} \caption{Achievable rate versus direct link SNR with perfect versus estimated CSI.} \label{fig:impact_CE} \vspace{-7mm} \end{figure} We first evaluate the impact of imperfect channel estimation on the performance of the proposed CPM-based method versus the direct link SNR $\gamma_d$ in Fig. \ref{fig:impact_CE}. Two different IRS grouping ratios are compared, with perfect CSI versus with estimated CSI. The channel coherence time is set as $T_c=900$. It is observed that the proposed CPM-based method with $\rho=1$ is more sensitive to channel estimation error, especially at low-to-medium SNR regimes. As the SNR increases, the proposed channel estimation becomes more accurate and the performance gap between the achievable rate with estimated CSI and that with perfect CSI decreases at $\rho=1$. On the other hand, it is observed that at lower grouping ratio, e.g., $\rho=1/25$, the proposed CPM-based method employing the proposed channel estimation method has a much smaller performance gap with that using perfect CSI at both high and low SNR regimes. This is because with grouping, more IRS elements are switched on each time during the channel estimation, resulting in a higher receive SNR and therefore more accurate channel estimation, as observed from \eqref{MSE}. In the following, we evaluate the performance of the proposed grouping with imperfect CSI in both high-SNR and low-SNR regimes. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth]{20P_20dB_grouping_ratio} \vspace{-3mm} \caption{Achievable rate versus IRS grouping ratio at $\gamma_d=20$ dB (high-SNR regime).} \label{fig:res1} \vspace{-7mm} \end{figure} Fig. \ref{fig:res1} evaluates the effect of grouping size (or equivalently, the IRS grouping ratio) on the achievable rate at direct link SNR $\gamma_d=20$ dB (i.e., the high-SNR regime). Note that at low grouping ratio, the number of groups $K$ is small while each group consists of a large number of IRS passive array elements sharing a common reflection coefficient, and therefore only a small overhead for channel estimation is required. As the grouping ratio increases, $K$ also increases and thus results in a larger overhead. However, due to the increased degrees of freedom for IRS coefficient design at higher grouping ratio, the reflection coefficients combine the multiple paths of the reflected link as well as the direct link more effectively, leading to a higher achievable rate in the data transmission phase. Hence, it is observed that the achievable rate in general first increases then decreases with the grouping ratio. This is because the performance improvement by higher grouping ratio is overwhelmed by the increased training overhead, especially when the latter occupies a substantial amount of time during one coherence block. In contrast, for a relatively large channel coherence time (e.g., $T_c=2100$), the training overhead constitutes an insignificant part of the coherence time and the achievable rate keeps increasing with the grouping ratio. Therefore, for practical implementation, the optimal grouping ratio critically depends on the channel coherence time. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth]{20P_0dB_grouping_ratio} \vspace{-3mm} \caption{Achievable rate versus IRS grouping ratio at $\gamma_d=0$ dB (low-SNR regime).} \label{fig:res2} \vspace{-7mm} \end{figure} Fig. \ref{fig:res2} shows the effect of the IRS grouping ratio on the achievable rate at direct link SNR $\gamma_d=0$ dB (i.e., low-SNR regime), where a different trend is observed compared to Fig. \ref{fig:res1} in the high-SNR regime. Specifically, for all values of the channel coherence time, the achievable rate first increases and then decreases, for which the reasons are explained as follows. First, the CSI obtained at low SNR is not accurate, and therefore leads to a greater performance loss at both low and high grouping ratios as the design variables are optimized based on the estimated CSI. Meanwhile, at low grouping ratio and low SNR, increasing the grouping ratio leads to higher diversity for the IRS beamforming and thus improved achievable rates. However, at large grouping ratio (e.g., $\rho=1$), the achievable rate gain by higher passive beamforming diversity is overwhelmed by the increased channel estimation error and overhead, resulting in a sharp rate decrease for all coherence time. \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth]{20P_20dB_coh_comp} \vspace{-3mm} \caption{Achievable rate versus coherence time at $\gamma_d=20$ dB (high-SNR regime).} \label{fig:coh_comp1} \vspace{-7mm} \end{figure} \begin{figure}[t] \centering \includegraphics[width=0.6\linewidth]{20P_0dB_coh_comp} \vspace{-3mm} \caption{Achievable rate versus coherence time at $\gamma_d=0$ dB (low-SNR regime).} \label{fig:coh_comp2} \vspace{-7mm} \end{figure} Fig. \ref{fig:coh_comp1} further evaluates the achievable rate performance versus the channel coherence time under different grouping ratios at direct link SNR $\gamma_d=20$ dB for the proposed CPM-based method. It is observed that for the proposed protocol, the length of the coherence time is critical to the optimal IRS grouping ratio with the highest achievable rate. As the coherence time increases, the achievable rate for every IRS grouping ratio increases, while the increment for higher grouping ratio is more prominent. In other words, the optimal IRS grouping ratio increases with the coherence time, as the loss due to longer training overhead can be fully compensated by the increased effectiveness of the IRS reflection coefficients in combining the multiple paths coherently. In contrast, Fig. \ref{fig:coh_comp2} shows the achievable rate performance versus channel coherence time at direct link SNR $\gamma_d=0$ dB. Note that at such low SNR, it is more desirable to divide the IRS elements into groups, as the performance improvement by increasing the number of groups to enjoy higher beamforming gain is limited and overwhelmed by the increased overhead and channel estimation error. The benchmark scheme with random phase is also included for comparison, which only needs to estimate the combined link $\tilde{\boldsymbol{h}}$ and feed back the transmit power allocation, thus incurring a much shorter training overhead. Nevertheless, it is observed from Fig. \ref{fig:coh_comp1} and Fig. \ref{fig:coh_comp2} that the performance of the proposed algorithm with proper grouping always outperforms the random phase scheme regardless of the SNR regimes, even at extremely small coherence time. \section{Conclusion} \label{sec:con} In this paper, we proposed a novel approach to enhance the achievable rate of an OFDM system by utilizing the IRS. We devised a practical transmission protocol by flexibly grouping the IRS elements and estimating the combined channel for each group, where data transmission proceeds by considering a common IRS reflection coefficient for each group. Under the proposed protocol with any given grouping, we formulated the joint optimization problem of the transmit power allocation and IRS reflection coefficients based on the estimated channels. By leveraging optimization techniques, we proposed computationally efficient methods to find high-quality suboptimal solutions for the formulated problem. Numerical results showed the effectiveness of IRS in boosting the achievable rate of a cell-edge user aided by the IRS. The proposed initialization method was also shown to achieve very close rate performance compared to the proposed iterative method, but with much lower complexity for implementation. Finally, the proposed protocol was shown to outperform the straightforward counterpart without IRS elements grouping in terms of achievable rate under various practical setups. There are a number of promising directions worthy of investigation in future works. For example, we consider the joint transmit power and IRS coefficients optimization with given grouping and training overhead in this work, while the grouping strategy as well as the training sequence can also be optimized to maximize the achievable rate. More advanced pilot design specifically catered to IRS-aided systems can also be investigated. Moreover, this paper considers a single-user system, while it is interesting to extend the results to more general setups such as multiuser OFDMA systems with joint multiuser resource allocation. \bibliographystyle{IEEEtran}
\section{Introduction} \vspace{-3mm} An ultra-deep, high-resolution millimeter-wave survey over half the sky would answer many outstanding questions in both fundamental physics and astrophysics. This survey would be both an order of magnitude deeper and of higher-resolution (about $0.5~\mu$K-arcmin and 15 arcseconds at 150 GHz) than currently funded surveys. Two critical advances uniquely enabled by this survey are mapping over half the sky:~i)~the distribution of all matter on small scales using the gravitational lensing of the cosmic microwave background (CMB), and~ii)~the distribution of gas density and gas pressure on small scales in and around dark matter halos using the thermal and kinetic Sunyaev-Zel'dovich effects (tSZ and kSZ). The combination of high-resolution and multiple frequency bands in the range of 30 to 350 GHz allows for critical separation of foregrounds from the CMB. That plus the depth of the survey allows one to cross critical thresholds in fundamental physics:~i.)~ruling out or detecting any new, light, thermal particles, which could potentially be the dark matter, and~ii)~testing a wide class of multi-field models that could explain an epoch of inflation in the early Universe. CMB-HD would also open a new window on planetary studies and the transient sky. A summary of the primary science questions motivating the CMB-HD survey are given below and discussed in more detail in the accompanying science white paper~\cite{Sehgal2019}. \vspace{-6mm} \begin{item} \item $\bullet$ What is the distribution of matter on small scales? \item $\bullet$ What are the particle properties of dark matter? \item $\bullet$ How did gas evolve in and around dark matter halos? \item $\bullet$ How did galaxies form? \item $\bullet$ Do new light particles exist that were in equilibrium with known particles in the early Universe? \item $\bullet$ Do primordial gravitational waves exist from an epoch of inflation? \item $\bullet$ If inflation happened, did it arise from multiple or a single new field? \item $\bullet$ What is the census of bodies in the outer Solar System? \item $\bullet$ Do Oort clouds exist around other stars? \item $\bullet$ What is the physics behind the various bright transient phenomena in the sky? \end{item} \vspace{-4mm} \section{Key Science Goals and Objectives} \vspace{-4mm} \subsection{Fundamental Physics of the Universe} \vspace{-2mm} There are fundamental questions about our Universe that beg answers. One such question is what is the nature of dark matter -- the invisible glue that is holding galaxies together, including our own. It may be that dark matter only interacts gravitationally with the known particles, and in that case, astronomical observations may be the only pathway to understanding its properties. Another question is whether we have a complete inventory of the light particles that were in equilibrium with the known particles in the early Universe. Answering this question definitively is uniquely within reach of CMB-HD, and would probe physics right up to the Big Bang. A final question is what is the origin of the Universe and all the `stuff' in it? Did it start with a period of exponential inflationary expansion, and if so, how did that arise? Addressing these questions are key science goals of CMB-HD. Table~\ref{tab:goals} lists the approaches to addressing these questions, along with the science targets CMB-HD can achieve. Below we explain each method and target in more detail.\\ \begin{table*}[t!] \centering \caption[Key Science]{Summary of CMB-HD key science goals in fundamental physics} \small \vspace{0.5mm} \begin{tabular}{ l c r } \hline \hline Science & Parameter & Sensitivity\\ & & \\ \hline Dark Matter & S/N:~~Significance in Differentiating FDM/WDM from CDM\textsuperscript{a} & S/N = 8 \\ New Light Species & $N_{\rm{eff}}$:~~Effective Number of Relativistic Species\textsuperscript{b} & $\sigma(N_{\rm{eff}}) = 0.014$ \\ Inflation & $f_{\rm{NL}}$:~~Primordial Non-Gaussianity\textsuperscript{c} & $\sigma(f_{\rm{NL}}) = 0.26$ \\ Inflation & $A_{\rm{lens}}$:~~Residual Lensing B-modes\textsuperscript{d} & $A_{\rm{lens}}=0.1$ \\ \hline \hline \end{tabular} \begin{tablenotes} \item \textsuperscript{a} Significance with which fuzzy/warm dark matter (FDM/WDM) models that can explain observational puzzles of small-scale structure, can be distinguished from cold dark matter. \item \textsuperscript{b} {{Probing well below the critical threshold of $\sigma({N_{\rm{eff}}}) = 0.027$ would rule out or detect {\it{any}} new, light ($< 0.1$ eV) particle species in thermal equilibrium with standard model particles in the early Universe.}} \item \textsuperscript{c} {{Achieving $\sigma(f_{\rm{NL}}) < 1$ can distinguish between single and multi-field inflation models.}} \item \textsuperscript{d} {{Removing lensing B-modes is critical to detecting primordial gravitational waves from inflation; for example, $A_{\rm{lens}}\leq 0.1$ is necessary to achieve $\sigma(r)=5\times 10^{-4}$ from a ground-based experiment.}} \end{tablenotes} \label{tab:goals} \vspace{-3mm} \end{table*} \vspace{0mm} \noindent {\bf{Dark Matter:}} Astronomical observations have provided compelling evidence for non-baryonic dark matter~\cite{Zwicky1937,Rubin1970,Ostriker1974,Fabricant1980,Bahcall1995,Clowe2006,Planck2018}. However, we have not been able to create or detect dark matter in manmade experiments to probe its properties directly. If dark matter only interacts with the known standard-model Universe gravitationally, then it makes sense to explore the gravitational direction further to understand it. An observational puzzle seems to exist regarding the distribution of matter on small-scales (scales below 10 kpc and masses below $10^9 M_{\odot}$ today); there seems to be less structure than the standard cold collisionless model of dark matter (CDM) would predict. This may provide clues to the particle nature of dark matter, and, in fact, many well-motivated models of dark matter can explain this deviation from CDM~\cite{Colin2000,Bode2001,Boehm:2001hm,Boehm:2004th,Viel2005,Turner1983,Press1990,Sin1994,Hu2000,Goodman2000,Peebles_2000,Amendola2006,Schive2014,Marsh2016,Carlson1992,Spergel2000,Vogelsberger2012,Dvorkin:2013cea,Fry2015,Elbert2015,Kaplinghat2016,Kamada2017,Gluscevic2018,Boddy2018a,Li2018,Boddy2018b,Tulin2018,Khoury2016,Vogelsberger2016,Cyr-Racine:2013ab,Cyr-Racine:2015ihg,Schewtschenko:2014fca,Krall:2017xcw,Xu:2018efh}. However, measurements of the small-scale matter distribution do not conclusively indicate a deviation from the CDM prediction. This is because such measurements often infer the matter distribution through baryonic tracers~\cite{Koposov2015,Drlica-Wagner2015,Menci2017,Mesinger2005,deSouza2013,Moore1999,Johnston2016,Carlberg2009,Erkal2015,Bovy2014,Cen1994,Hernquist1996,Croft1999,Hui1999,Viel2013,Baur2016,Irsic2017}, and such tracers may not reliably map the dark matter~\cite{Sawala2016,Oman2015,Hui2017}. Gravitational lensing offers a powerful way to map the dark matter directly. While strong gravitational lensing is a promising method to find low-mass dark-matter halos~\cite{Dalal2002,Koopmans_2005,Vegetti:2009aa,Vegetti_2010_1,Vegetti_2010_2,Vegetti2012,Hezaveh:2012ai,Vegetti2014,Hezaveh2016a,Ritondale:2018cvp}, it does face the challenge of separating the complex and often unknown structure of the background source from the sought-after substructure signal; using strong lensing to measure the matter power spectrum, faces a similar challenge~\cite{Hezaveh2016b,Daylan:2017kfh,Bayer:2018vhy,DiazRivero2018,Chatterjee2018,Cyr-Racine:2018htu,Brennan2018,Rivero:2018bcd}. A method that can evade this challenge is to {\it{measure the small-scale matter power spectrum from weak gravitational lensing using the CMB as a backlight}}~\cite{Nguyen2019}. The CMB serves as a perfect backlight because i)~it has a known redshift, ii)~is behind every object, and iii)~is a known pure gradient on the small-scales of interest. Thus this method can provide a powerful complementary probe of dark-matter physics~\cite{Nguyen2019}. We show in Figure~\ref{fig:dm} how one can distinguish between CDM and a model of dark matter that suppresses structure on small scales, by measuring the small-scale gravitational lensing of the CMB~\cite{Nguyen2019}. Table~\ref{tab:goals} indicates that one can distinguish between these two models at the $8\sigma$ level. Newer lensing reconstruction techniques can potentially improve these constraints further~\cite{Horowitz2019,Hadzhiyska2019}. Extragalactic foregrounds are the main source of systematic effect in this measurement, and we discuss paths to mitigate this in~\cite{Nguyen2019, Sehgal2019} and in Section~\ref{sec:measureReq} below. Baryonic processes can also move around the dark matter and change the shape of the small-scale matter power spectrum; however, they likely affect the shape of the spectrum in a way that differs from alternate dark matter models~\cite{Nguyen2019,vanDaalen2011,Brooks2013,Brooks2014,Natarajan2014,Schneider2018}. Comparing the matter power spectrum of multiple hydrodynamic simulations, each with different baryonic prescriptions, suggests there may be a finite set of ways that baryons can change the shape of the spectrum, characterized by just a few free parameters~\cite{Schneider2018}. Given that, one can use the shape of the power spectrum to distinguish between dark matter models and baryonic effects. In any case, {\it{{\underline{this measurement would be a clean measurement of the matter power}}\\{\underline{spectrum on these scales, free of baryonic tracers.}}}} It would greatly limit the allowed models of dark matter and baryonic physics, shedding light on dark-matter properties and galaxy evolution. \\ \begin{SCfigure}[1.4][t] \centering \includegraphics[width=0.49\textwidth, height=6.2cm]{dm2.png} \caption{CMB lensing power spectrum for an $m \sim 10^{-22}$ eV FDM model and a CDM model. The error bars correspond to observations with $0.5 \mu$K-arcmin CMB noise in temperature and 15 arcsecond resolution over $50\%$ of the sky. Reionization kSZ has also been included as a foreground here. {\bf{Given these errors, one can distinguish between CDM and a suppression of structure below $10^9 M_{\odot}$ with a significance of about $8\sigma$.}} } \label{fig:dm} \vspace{-6mm} \end{SCfigure} \vspace{-2mm} \noindent {\bf{New Light Species:}} The light from the CMB still has more to tell us about the inventory of particles that existed in the Universe right back to the Big Bang. This is because any light particles (with masses less than 0.1 eV) that were in thermal equilibrium with the known standard-model particles, at any time in the early Universe, would have left an imprint on the CMB. Even one new species of particle as described above, would change the effective number of light particles, $N_{\rm{eff}}$, by as much as $\sigma({N_{\rm{eff}}}) = 0.027$ away from the standard model value (assuming no significant dilution by new states beyond the standard model particle content)~\cite{CMBS4SB}. If these light particles interact only very weakly, we may never see them in laboratory experiments, and astronomical measurements may provide the only avenue for their detection. This is particularly important because many dark matter models predict new light thermal particles~\cite{Baumann:2016wac,Green:2017ybv}, and recent short-baseline neutrino experiments have found puzzling results possibly suggesting new neutrino species~\cite{Gariazzo2013,Gonzalez-Garcia2019}. {\it{\underline{In Table~\ref{tab:goals}, we show that CMB-HD can achieve $\sigma({N_{\rm{eff}}}) = 0.014$, which would cross the critical}\\{\underline{threshold of 0.027. This would potentially rule out or find evidence for new light thermal particles}}\\{\underline{with $95\%$ confidence level.}}}} We note that delensing the CMB spectra can modestly improve the $N_{\rm{eff}}$ constraints beyond this~\cite{Baumann:2015rya,Green:2016cjr}, and including the effect of Rayleigh scattering can potentially have a significant impact (e.g.~25\% improvement with the inclusion of the 280/350 GHz frequency channels)~\cite{Lewis2013,Alipour:2014dza}. By combining the CMB-HD primordial CMB measurements with the CMB-HD measurement of the small-scale matter power spectrum discussed above, we can also potentially gain a factor of two improvement on $\sigma({N_{\rm{eff}}})$, subject to improvements in modelling the nonlinear matter power up to $k\sim0.4~h$Mpc$^{-1}$~\cite{Baumann2018}. Removal of foregrounds is important for achieving these constraints, and we discuss paths to do so in~\cite{Sehgal2019} and in Section~\ref{sec:measureReq} below; we note here that the high-angular resolution and multiple frequency channels of CMB-HD, spanning 30 to 350 GHz, help make the necessary foreground cleaning possible. The combination of above improvements to the nominal forecast in Table~\ref{tab:goals}, could potentially rule out or find evidence for new light thermal particles at the $99\%$ confidence level.\\ \noindent {\bf{Inflation:}} A fundamental question is what happened right at the Big Bang, and how did the structure we see (galaxies, planets, us) arise out of the homogeneous soup of the newborn Universe. Inflation is one compelling idea in which the Universe underwent a period of superluminal expansion a fraction of a second after the Big Bang; this expansion stretched out microscopic quantum fluctuations and froze them into the fabric of spacetime as macroscopic density fluctuations, seeding the structure we see today. However, we have no direct evidence that inflation actually occurred. One prediction of inflation is that fluctuations of the quantum particle carrying gravity created gravitational waves that later got imprinted in the CMB. We can detect this imprint by looking for a well-defined signal in the polarized CMB light, in particular in the large-scale CMB B-mode fluctuations. The amplitude of this primordial B-mode fluctuation is given by the parameter $r$, and a number of well-motivated models predict $r \sim 3 \times 10^{-3}$; thus $\sigma(r)<5 \times 10^{-4}$ has become a desired target to definitively rule them out~\cite{CMBS4SB}. However, to reach this target using a ground-based experiment requires removing the CMB B-mode fluctuations from gravitational lensing. In particular, for this $\sigma(r)$ target, one must remove 90\% of the lensing B-mode power, leaving only 10\% remaining. {\it{\underline{Table~\ref{tab:goals} shows that CMB-HD is easily able to reach this $A_{\rm{lens}}=0.1$ target.}}} In addition, inflation predicts the primoridal CMB has small non-Gaussian fluctuations that can be characterized by a parameter called $f_{\rm{NL}}$~\cite{Meerburg2019}. Reaching a target of $\sigma(f_{\rm{NL}}) < 1$ would rule out a wide class of multi-field inflation models, shedding light on how inflation happened~\cite{Alvarez:2014vva,Smith2018,Munchmeyer2018,Deutsch2018,Contreras2019,Cayuso2018}. By combining the kSZ signal from CMB-HD, which is discussed in more detail in Section~\ref{sec:astro}, with an overlapping galaxy survey such as LSST, {\it{\underline{Table~\ref{tab:goals} shows that one can cross this critical threshold,}\\{\underline{achieving $\sigma(f_{\rm{NL}}) = 0.26$.}}}} This cross-correlation could also resolve the physical nature of several statistical anomalies in the primary CMB~\cite{Cayuso2019} that may suggest new physics during inflation (see Ref.~\cite{Schwarz2015} for a review), and provide constraints on the state of the Universe before inflation~\cite{Zhang2015}. \vspace{-3mm} \subsection{Astrophysics}\label{sec:astro} \vspace{-2mm} \noindent {\bf{Evolution of Gas:}} A fundamental question in astrophysics is: how did galaxies form? A critical advance in answering this question would be measuring the density, pressure, temperature, and velocity of the gas in and around dark matter halos out to $z\sim 2$ and with masses below $10^{12}$ M$_\odot$. This is because the gas in these halos reflects the impact of feedback processes and mergers, and it serves as a reservoir enabling star formation. However, to date we have not had such measurements over a statistically significant sample. CMB-HD would open this new window by measuring the tSZ and kSZ effects with high-resolution and low-noise over half the sky (for a recent SZ review see~\cite{Mroczkowski2019}). The tSZ signal is a measure of the thermal pressure of ionized gas in and around dark matter halos~\cite{Sunyaev1970}. The kSZ signal measures the gas momentum density~\cite{Sunyaev1972}. The combination of both tSZ and kSZ measurements, with low-noise and high-resolution across CMB-HD frequencies, would {\it{\underline{allow CMB-HD to}\\{\underline{separately measure the gas density, pressure, temperature, and velocity profiles of the gas, as a}}\\{\underline{function of halo mass and redshift}}}}~\cite{Knox2004,Sehgal2005,Battaglia2017}. As seen in Figure~\ref{fig:SZ}, this would probe thermal, non-thermal, and non-equilibrium processes associated with cosmic accretion, merger dynamics, and energy feedback from stars and supermassive black holes, and their impact on the gas~\cite{Nagai2011,Nelson2014b,Lau2015,Avestruz2015,Basu2016}. Measuring the tSZ effect is also an effective way to {\it{find}} new galaxy clusters and groups, as has been well-demonstrated over the past decade~\cite{Marriage2011,Vanderlinde2010,Planck2014}. Millimeter-wave SZ measurements have an advantage over X-ray measurements in probing gas physics because the SZ signals are proportional to the gas density (not density squared) and the brightness of the signals are redshift independent; this makes SZ measurements a powerful probe of the gas in the outskirts of galaxy clusters, and in low-mass and high-redshift halos. CMB-HD will push halo-finding to lower masses and higher redshifts, allowing direct imaging of systems where X-ray observations would require prohibitively long integration times. {\it{\underline{By stacking the tSZ-detected halos, CMB-HD enables probing the}\\{\underline{gas physics in and around halos out to $z\sim 2$ and with masses below $10^{12}$ M$_\odot$.}}}} The circumgalactic reservoirs of $10^{12}$ M$_\odot$ (Milky-Way-mass) halos are predicted by multiple simulations, such as EAGLE and Illustris-TNG, to be intimately linked to the appearance of, and activity within, the galaxy~\cite{schaye2015,nelson2018a,davies2019,pillepich2018}. These and other simulations find that galactic star-formation rates, colors, and morphologies are inextricably linked not only to the mass in the circumgalactic medium, but also to the location of baryons ejected beyond $R_{200,c}$, which can be uniquely constrained by CMB-HD. Thus the science gain of such measurements is a more complete understanding of galaxy cluster astrophysics, the physics of the intergalactic and circumgalactic medium, and galaxy evolution.\\ \begin{figure}[t!] \centering \vspace{-5mm} \includegraphics[width=0.8\textwidth,height=7cm]{Omega500_y_135_v1_1_wbar-final.pdf} \vspace{-6mm} \caption{SZ signals of a merging galaxy cluster extracted from the {\it Omega500} cosmological hydrodynamical simulation \cite{Nelson2014a}; for comparison some X-ray quantities are shown. Here is the tSZ signal (top-left), kSZ signal (top-middle), projected mass-weighted temperature (top-right), X-ray surface brightness (bottom-left), electron opacity (bottom-middle), and projected X-ray temperature (bottom-right). {\bf{The combination of tSZ and kSZ measurements from CMB-HD allows one to separate the pressure, density, temperature, and velocity profiles of the gas}}~\cite{Knox2004,Sehgal2005,Battaglia2017}.} \label{fig:SZ} \vspace{-4mm} \end{figure} \vspace{-1mm} \noindent {\bf{Planetary Studies:}} The complete inventory of planets, dwarf planets, and asteroids in our own Solar System remains an open question. CMB-HD can open a new discovery space in our outer Solar System by detecting undiscovered Solar System bodies via their thermal flux and parallactic motion~\cite{Cowan2016}. Objects close to the Sun are normally detected via optical observations, which are sensitive to the bodies' reflected light from the Sun. However, objects also have internal heat that is emitted at millimeter wavelengths. Since the flux from reflected light falls faster with distance than directly sourced emission, CMB-HD has an advantage over optical surveys in finding objects in the far Solar System~\cite{Baxter2018a}. In particular, {\it{\underline{CMB-HD could detect dwarf-size planets hundreds of}\\{\underline{AU from the Sun, and Earth-sized planets thousands of AU from the Sun.}}}} In combination with optical measurements, CMB-HD would allow large population studies of the sizes and albedos of these objects~\cite{Gerdes:2017}. In addition, whether our Solar System, and exo-solar systems in general, possess an Oort cloud is still unknown. {\it{\underline{The low-noise and high-resolution of CMB-HD would enable}\\{\underline{the detection of exo-Oort clouds around other stars, opening a new window on planetary studies.}}}}\\ \noindent {\bf{Transient Sky:}} CMB-HD will survey half the sky with roughly daily cadence. The daily maps will have a noise sensitivity of about 1 mJy. Thus CMB-HD will have excellent sensitivity to bright time-variable and transient sources in the sky~\cite{Holder2019}. For example, CMB-HD will detect of order 100 on-axis long gamma-ray bursts (LGRBs)~\cite{Metzger2015}. These LGRBs often are bright in the millimeter weeks before they peak in the radio, and the additional frequency coverage can help characterize their shock behavior~\cite{Laskar2018}. Blazars, jet-dominated active galactic nuclei, are bright in the millimeter and vary significantly at about 100 GHz on week timescales~\cite{Chen2013,Madejski2016,Blandford2018}. Novae, repeating thermonuclear explosions of accreting white dwarfs, are also millimeter-bright, with expected rates of about ten per year in our Galaxy. CMB-HD will provide unique insight into the geometry of blazars and novae by providing polarization flux and variability information for these systems~\cite{Abdo2010,Young2010}. In addition, some neutron star mergers may be seen and localized first in the millimeter band~\cite{Fong2015}. The CMB-HD survey would thus provide useful follow-up of LIGO/Virgo triggers, and could provide blind detections of these events~\cite{Holder2019}. {\it{\underline{The intent of the CMB-HD project is to provide to the}}\\{\underline{astronomy community weekly maps of the CMB-HD survey footprint, filtered to keep only small}}\\{\underline{scales, and with a reference map subtracted to make variability apparent.}}} \vspace{-3mm} \section{Technical Overview: Measurement Requirements}\label{sec:measureReq} \vspace{-3mm} The measurement requirements are driven by the dark matter and new light species science targets, since those targets set the most stringent requirements. All the other science targets benefit from and prefer these same measurement requirements, since there are no science targets that pull the requirements in opposing directions. This results in a fortunate confluence between the science targets presented above and the measurement requirements that can achieve them. \\ \vspace{-2mm} \noindent {\bf{Sky Area:}} Both the dark matter and new light species science targets prefer the widest sky area achievable from the ground, given fixed observing time~\cite{Sehgal2019,CMBS4SB}. For the dark matter science case, the inclusion of the kSZ foregrounds is what makes wider sky areas preferable over smaller ones~\cite{Sehgal2019}. In addition, the non-Gaussianity inflation science target, searches for planets and dwarf planets, and probing the transient sky all benefit from the largest sky areas possible. In practice, this is about {\it{\underline{50\% of the sky}}}, achievable from the demonstrated site of the Atacama Desert in Chile. \\ \vspace{-1mm} \noindent {\bf{Resolution:}} The resolution is set by the dark matter science target of measuring the matter power spectrum on comoving scales of $k\sim10 h$Mpc$^{-1}$ (these scales collapsed to form masses below $10^9 M_\odot$ today). Since CMB lensing is most sensitive to structures at $z\sim 2$ (comoving distance away of 5000 Mpc), we need to measure a maximum angular scale of $\ell \sim k X \sim 35,000$. {\it{\underline{This gives a required resolution of about 15 arcseconds at 150 GHz}}} ($\ell = \pi$/radians), translating to a 30-meter telescope. In addition, foreground cleaning will be essential, and the most dominant foreground will be extragalactic star-forming galaxies, i.e.~the Cosmic Infrared Background (CIB). Figure~\ref{fig:foregrounds} shows that removing the sources detected at $3\sigma$ at 280 GHz with a 30-meter dish (flux cut of about 0.2 mJy~\cite{Lagache2018}) from the 150 GHz maps (flux cut of 0.04 mJy~\cite{Sehgal2010}) lowers the CIB power at 150 GHz to below $0.5 \mu$K-arcmin. A resolution of 15 arcsecond is also needed to measure the profiles of the gas in halos and to separate extragalactic radio and star-forming galaxies from the gas signal. To obtain a census of objects in the outer Solar System, we note that the parallactic motion of objects 10,000 AU away from the Sun is about 40 arcseconds in a year, also requiring this minimum resolution to detect the motion across a few resolution elements. \\ \begin{SCfigure}[1.4][t] \centering \includegraphics[width=0.55\textwidth,height=6.5cm]{foregrounds.png} \caption{Shown are the CMB temperature power spectrum (black solid) and relevant foregrounds at 150 GHz. The foregrounds are the kSZ effect from the epoch of reionization (orange), reionization kSZ plus the late-time kSZ effect (green), and the CIB (after removing sources above a flux of 0.04 mJy). The CIB flux cut, enabled by frequency channels between 100 and 350 GHz and the 30-meter dish, brings the CIB to the level of 0.5~$\mu$K-arcmin (dashed red) on small scales.} \label{fig:foregrounds} \vspace{-5mm} \end{SCfigure} \vspace{-8mm} \noindent {\bf{Sensitivity:}} The sensitivity is driven by the dark matter science target. In order to measure at the $5\sigma$-level a deviation from the CDM-only prediction of the matter power spectrum that matches claimed observations of suppressed structure, and conservatively assuming one cannot remove any of the kSZ foregrounds shown in Figure~\ref{fig:foregrounds}, requires keeping the noise subdominant to the kSZ foregrounds out to $\ell \sim 25,000$. {\it{\underline{This requires 0.5~$\mu$K-arcmin noise in temperature (0.7~$\mu$K-arcmin in}}\\{\underline{polarization) in a combined 90/150 GHz channel.}}} Assuming removal of the late-time kSZ component with an overlapping galaxy survey like LSST, an $8\sigma$ deviation from the CDM-only prediction can be seen (see Table~\ref{tab:goals} and Figure~\ref{fig:dm}). Conveniently, this sensitivity level also allows one to cross critical thresholds, achieving $\sigma({N_{\rm{eff}}}) = 0.014$ and $\sigma(f_{\rm{NL}}) = 0.26$, as well as to delens 50\% of the sky to $A_{\rm{lens}}=0.1$, a level necessary for reaching $\sigma(r)<5 \times 10^{-4}$ from a ground-based experiment. \\ \vspace{-2mm} \noindent {\bf{Largest Angular Scale:}} By the time CMB-HD has first light, data from the Simons Observatory (SO)~\cite{SO2019}, which will have first light in 2021, will already exist and be public. SO will measure temperature and E-mode maps over half the sky to the sample variance limit in the multipole range of 30 to 3000 for temperature and 30 to 2000 for E-modes. SO will also measure these scales at six different frequencies spanning 30 to 280 GHz. Thus there is no need for CMB-HD to reimage these modes. Therefore the largest angular scale CMB-HD needs to measure is driven by measuring B-modes, and in particular being able to remove lensing B-modes to the level of $A_{\rm{lens}}=0.1$. {\it{\underline{This requires the largest scale CMB-HD needs to image to be about 10 arcminutes ($\ell \sim 1000)$}}}. \\ \vspace{-2mm} \noindent {\bf{Frequency Coverage:}} The frequency coverage is driven by needing most of the sensitivity in the frequency window that is most free from extragalactic foregrounds, namely 90 to 150 GHz. Modern detectors can observe at two frequencies simultaneously~\cite{Henderson2016,Benson2014,OBrient2013}, so we assume we can split closely spaced frequency bands, further helping to remove frequency-dependent foregrounds. We also require frequency coverage at 30/40 GHz to remove emission from radio galaxies and at 220/280 GHz to remove emission from dusty galaxies and to cover the null frequency of the tSZ signal (at 220 GHz). Foreground optimization studies done for SO have found optimal ratios of noise levels given their six frequency channels, which if extrapolated to {\it{\underline{CMB-HD would require}}\\ {\underline{noise levels in temperature maps of 6.5/3.4, 0.73/0.79, and 2/4.6 $\mu$K-arcmin for the 30/40, 90/150,}}\\ {\underline{and 220/280 GHz channels respectively.}}} In addition, we require a 280/350 GHz channel in order to better exploit the Rayleigh scattering effect for improving the $N_{\rm{eff}}$ constraint~\cite{Lewis2013,Alipour:2014dza}, and in order to remove the main foreground (the CIB). To clean the CIB to the level shown in Figure~\ref{fig:foregrounds} by removing $3\sigma$ sources {\it{\underline{requires a 280/350 GHz channel with about 3.25~$\mu$K-arcmin combined noise}}}. \vspace{-4mm} \section{Technical Overview: Instrument Requirements} \vspace{-3mm} Given the measurement requirements above needed to achieve the science targets, the following instrument specifications below are required. \\ \vspace{-3mm} \noindent {\bf{Site:}} The required sky area and sensitivity make {\it{\underline{Cerro Toco in the Atacama Desert the best site for}\\{\underline{CMB-HD}}}}. An instrument at this site can observe the required 50\% of the sky; in contrast, an instrument at the South Pole can see a maximum of 6\% of the sky. The sensitivity requirement of 0.5~$\mu$K-arcmin also requires locating CMB-HD at a high, dry site with low precipitable water vapor to minimize the total number of detectors needed. No site within the U.S. has a suitable atmosphere. While a higher site than Cerro Toco, such as Cerro Chajnantor in the Atacama Desert, might reduce the detector count further, that may not outweigh the increased cost of the higher site.\\ \vspace{-3mm} \noindent {\bf{Detectors:}} To reach the required sensitivity levels of 6.5/3.4, 0.73/0.79, and 2/4.6 $\mu$K-arcmin for the 30/40, 90/150, and 220/280 GHz channels respectively, requires scaling down the SO goal noise levels by a factor of 8~\cite{SO2019}. SO, which is at the same site as CMB-HD, requires 30,000 detectors to achieve its sensitivity levels~\cite{SO2019}. Since the noise level scales as sqrt$(N_{\rm{det}})$, {\it{\underline{CMB-HD}\\{\underline{requires 1.9 million detectors to reach a factor of 8 lower noise than SO across all frequencies. An}\\{\underline{extra 280/350 GHz channel with 3.25~$\mu$K-arcmin noise increases the detector count to 2.4~million.}}}}} \\This assumes a 5-year survey and 20\% observing efficiency, as also assumed by SO.\\ \vspace{-3mm} \noindent {\bf{Telescope Dish Size:}} To achieve the required resolution of 15 arcseconds at about 100 GHz requires {\it{\underline{a telescope dish size of about 30-meters}}}. The foreground cleaning discussed above also necessitates a 30-meter dish for the frequencies above 100 GHz, out to at least 350 GHz. \vspace{-5mm} \section{Technical Overview: Instrument Design} \vspace{-3mm} \subsection{Baseline Instrument} \vspace{-2mm} The CMB-HD telescope cameras will hold 600,000 pixels. Each pixel will have two frequency bands and two polarizations for a total of 2.4~million detectors. We assume in the baseline design horn-fed TES detectors, however, MKIDS may also be a viable detector technology, which could reduce the cost significantly. There will be four frequency band pairs:~30/40, 90/150, 220/280, 280/350 GHz. The distribution of detectors per frequency for the first three band pairs will follow the ratios adopted by SO, and achieve the noise levels given above. For systematic control, the baseline design is an off-axis telescope. We use a crossed Dragone design because it has a larger field-of-view (fov) than Gregorian or Cassegrain telescopes. Although the crossed Dragone design has a far larger secondary mirror, as shown in Figure~\ref{fig:optics}, with the use of correcting cold optics extremely large fovs are possible. Simple calculations indicate that with efficient focal plane use ($>50$\%) it could be possible to fit all the detectors in one telescope. However, given the number of receivers required, the baseline design consists of two telescopes. For a baseline receiver we adopt a design similar to that for CCAT-prime and SO. Multiple sets of cold silicon lenses re-image the telescope focal plane while adding a 1K lyot stop, baffles for control of stray light, and cold blocking and bandpass filters. For SO and CCAT-prime these are housed in a single cryostat. However, for a telescope the size CMB-HD it makes sense to group them into a number of cryostats; a single cryostat many meters across is hard to build and impractical to transport and maintain. In addition, recent advances in low loss silicon~\cite{Chesmore2018} could allow a warm first lens, and in that case the packing density of tubes could become far greater~\cite{Niemack2016}, allowing for smaller cheaper cryostats. \begin{figure} \centering \includegraphics[width=0.95\textwidth]{optics.png} \vspace{-7mm} \caption{A possible design for the optics would be a crossed Dragone design similar to that chosen for SO and CCAT-prime. Although challenging to build, a 30-meter version of this particular design offers a diffraction limited field of view out to $r=0.8$~degrees at 150~GHz at the secondary focus, and, with correcting optics such as those shown on the right, diffraction limited beams can be achieved out past a radius of 2.68 degrees at 150~GHz and even further at lower frequencies. These particular designs are limited by the largest silicon optics currently available (45~cm) and could be grouped together in multiple cryostats in order to ensure less down time and greater flexibility.} \label{fig:optics} \vspace{-3mm} \end{figure} \subsection{Cost Estimates and Technology Drivers} \vspace{-2mm} The CMB-HD instrument and site cost is shown in Table~\ref{tab:cost} with 2019 estimates. Most of the cost is in fabricating the detectors. For detector cost comparison, CMB-HD will have a factor of 4.8 more detectors than the proposed CMB-S4 experiment (2400k for \$960 million versus 500k for \$200 million). However, there are two avenues that could potentially reduce this cost. One is that over the next several years, as upcoming experiments such as SO require tens of thousands of detectors, the mass production of detectors may drop the cost. The other is that MKIDS, a detector technology alternate to TES devices, are currently being tested on-sky at millimeter wavelengths~\cite{Austermann2018}. If MKID detector technology matches in practice to its promise, then the detector cost may drop by a factor of a few. Two 30-meter off-axis, crossed Dragone telescopes are costed at \$400 million. {\it{\underline{The unprecedented sensitivity and resolution of CMB-HD opens up vast uncharted territory in the}}\\ {\underline{millimeter-wave sky, and is a clear leap beyond currently funded ground-based CMB experiments.}}} \vspace{-4mm} \section{Data Analysis and Products} \vspace{-3mm} A major effort of the collaboration team will be the creation of data analysis software pipelines as well as simulations to verify these pipelines. The core project deliverables, after a modest proprietary period, will be well-characterized maps at each frequency from which the broader science community can derive a range of science results. Other project deliverables will be the power spectra, covariance matrices, likelihood functions, and Monte Carlo simulation sets. The project also intends to provide the astronomy community with weekly maps of the CMB-HD survey footprint, filtered to keep only small scales, and with a reference map subtracted to make variability apparent. \vspace{-5mm} \begin{table*}[b] \vspace{-5mm} \centering \begin{tabular}{| l r |} \hline \$960 million & 2.4 million detectors (600k pixels) and their readout \\ \$400 million & Two 30-meter off-axis crossed Dragone telescopes \\ \$100 million & Project management \\ \$~50 million & Cerro Toco site in the Atacama Desert \\ \hline \$1.51 billion & Total cost\\ \hline \end{tabular} \vspace{-2mm} \caption{Cost of CMB-HD Instrumentation and Construction} \label{tab:cost} \vspace{-5mm} \end{table*} \newpage \vspace{-4mm} \section{CMB-HD Project} \vspace{-4mm} \begin{center} \linespread{0.9} \noindent \large{{\it{{Vision statement: One day, we will know how the Universe began, what is in it, and where it is going.}}}} \end{center} \vspace{-3mm} \begin{center} \linespread{0.9} \noindent \large{{\it{{Mission statement: To further humanity's understanding of the Universe. To build a culture of caring, connection, responsibility, and trust within the project team. To share the excitement of science with the public.}}}} \end{center} \vspace{-8mm} \subsection{Project Philosophy} \vspace{-2mm} With endeavors as ambitious as CMB-HD, which can be a source of national pride and which can radically alter our understanding of the Universe and our place within it, it is important to articulate the founding intention and develop the project in alignment with that. As stated in the vision statement above, the aspirational goal of the CMB-HD project is to answer questions asked by every human, namely: ``What is the Universe we live in, how did it start, and how will it progress?'' To accomplish this, the CMB-HD project's mission is to further our knowledge of the Universe on many fronts. In addition, the process of getting there is just as important. The CMB-HD philiosophy is that engaged teams are more productive and creative, and that engaged teams are created when leaders have fostered a culture of caring, connection, responsibility, and trust. This philosophy will drive the collaboration structure and all project interactions. The CMB-HD team also recognizes that thirst for knowledge about our Universe is universal, and that it is a privilege to be on the front lines of exploration. Therefore, part of the mission of the CMB-HD project is to communicate and share the excitement of scientific discovery with the broader public. \vspace{-4mm} \subsection{Organization, Partnerships, and Current Status} \vspace{-2mm} The CMB-HD collaboration was recently formed and is open to the entire U.S. science community. International partners are welcome. We recognize the CMB-S4 Membership Policy and the Simons Observatory Publication Policy as good starting documents to build from (both of which were co-drafted by the CMB-HD primary contact). We will draft the governance policy in full transparency and consultation with the CMB-HD collaboration, building on the CMB-community-led work that informed the CMB-S4 Governance Policy, and being open to aspects that can be improved. \vspace{-5mm} \section{Synergies with Other Millimeter-Wave Proposals} \vspace{-4mm} We recognize that there exists common ground with both the CMB-S4 and AtLAST project proposals~\cite{CMBS4SB, Bertoldi2018}, and potential synergistic opportunities. {\it{\underline{We also note that CMB-HD can achieve many}}\\ {\underline{of the science goals of the original CCAT 25-meter proposal~\cite{CCAT}, which was highly ranked in the}}\\ {\underline{Astro2010 Decadal}}} but not pursued. Although CMB-HD does not extend as high as CCAT into the submillimter, with 350 GHz being the highest channel, CMB-HD's much higher sensitivity as compared to CCAT uniquely enables the science described above. \vspace{-6mm} \section{Summary} \vspace{-3mm} CMB-HD is an ambitious leap beyond previous and upcoming ground-based millimeter-wave experiments. It will allow us to cross critical measurement thresholds and definitively answer pressing questions in astrophysics and fundamental physics of the Universe. The CMB-HD project also recognizes the productivity benefit of an engaged collaboration, and is committed to fostering a culture that enables this. The CMB-HD survey will be made publicly available, and the project will prioritize usability and accessibility of the data by the broader scientific community. \clearpage \section*{Affiliations} \noindent $^{1}$ Flatiron Institute \\ $^{2}$ École Normale Supérieure, Paris, France \\ $^{3}$ University of Bonn \\ $^{4}$ The University of Texas at Austin \\ $^{5}$ Arizona State University \\ $^{6}$ University of Louvain, Belgium \\ $^{7}$ University of Namur, Belgium \\ $^{8}$ Harvard University \\ $^{9}$ University of New Mexico \\ $^{10}$ Max Planck Institute for Astrophysics \\ $^{11}$ University of Pennsylvania \\ $^{12}$ NASA/Goddard Space Flight Center\\ $^{13}$ Lawrence Berkeley National Laboratory \\ $^{14}$ University of California, San Diego \\ $^{15}$ Stony Brook University \\ $^{16}$ Pennsylvania State University \\ $^{17}$ University of Illinois at Urbana-Champaign \\ $^{18}$ Columbia University \\ $^{19}$ York University \\ $^{20}$ Perimeter Institute \\ $^{21}$ UK Astronomy Technology Centre \\ $^{22}$ University of Cambridge \\ $^{23}$ Southern Methodist University \\ $^{24}$ European Southern Observatory \\ $^{25}$ Yale University \\ $^{26}$ Cambridge University \\ $^{27}$ University of California, Berkeley \\ $^{28}$ Cornell University \\ $^{29}$ University of Colorado \\ $^{30}$ University of Southern California \\ $^{31}$ Brookhaven National Laboratory \\ $^{32}$ Canadian Institute for Theoretical Astrophysics \newpage \bibliographystyle{unsrturltrunc6}
\section{Introduction} This work deals with linear ill-posed equations $Au=y$ with $A:X\rightarrow Y$ acting between a Banach space $X$ and a Hilbert space $Y$, for which solutions with specific properties (such as positivity) are sought. In this respect, we consider iterative regularization methods of the following type \begin{equation}\label{method0} u_{k+1}\in \mbox{arg}\min_u\left\{\frac{1}{2}\|Au-y\|^2+cd(u,u_{k})-\frac{1}{2}\|Au-Au_{k}\|^2\right\},\,\,\, k\in\mathbb N, \end{equation} where $d=D_f$ denotes the Bregman distance \cite{Bregman} associated with a convex functional $f:X\rightarrow\mathbb{R}\cup\{+\infty\}$ which is nonnegative and $c$ is some positive number. The term $d(u,u_{k})$ acts as a penalty enforcing the desired features for the solutions. \noindent Note that we can rewrite \eqref{method0} as \begin{equation}\label{method0a} u_{k+1}\in \mbox{arg}\min_u\left\{\langle Au-y,Au_{k}-y\rangle +cd(u,u_{k}) \right\}, \end{equation} which shows that the scheme can be obtained also by linearizing the quadratic data-fitting term $\displaystyle{\frac{1}{2}\|Au-y\|^2}$ at the current iterate $u_k$. This class of methods incorporates several procedures that have been proposed so far in the literature. For instance, the classical case when $f$ is quadratic in Hilbert spaces reduces to the Landweber method, as emphasized by \cite{DDD} and as investigated for nonlinear operator equations by means of surrogate functionals in \cite{RamTes}, see also the discussion in \cite{Scherzer}. The case of quadratic $f$ in reflexive Banach spaces has been studied by \cite{SchSchLou}. The setting when $f$ is the total variation functional smoothed by a quadratic has been analyzed by \cite{BacBur}, requiring fine analysis tools due to the bounded variation function space context. The case of $\ell^1$-penalties has been treated in \cite{Yin_etal, Cai_etal}, resulting in the so-called linearized Bregman algorithm. In all those cases however, some quadratic term had to be part of $f$ to guarantee even well-definedness of the iterates and subsequently convergence. \noindent We are interested here in the Shannon entropy setting without any quadratic term, i.e. $$ f(u) = \int_\Omega u(t) \ln u(t) ~dt. $$ We mention that one can alternatively consider a linear shift to $$ \tilde f(u) = \int_\Omega u(t) \ln u(t) - u(t) +1 ~dt, $$ which is a nonnegative functional inducing the same Bregman distance. \noindent This raises challenges to analyze the problem in the $L^1$ setting without quadratic terms in the functional, but provides a simple closed iterative method with preserving the sign of the starting point (function) along the iterations. The latter formulation involves entropic projections, as one can see in the following section. Moreover, we shall also be interested in the solution of inverse problems with unknowns being probability densities, i.e. we minimize on the domain of $f$ subject to the constraint \begin{equation} \int_\Omega u(t)~dt = 1, \end{equation} which again results in a simple closed iterative form. The advantages of using Bregman projections for solving variational problems with unknown probability densities have been exploited by several authors before, e.g. in optimal transport (cf. \cite{benamou,peyre}). \noindent In order to write both problems in a closed form, we will use the equivalent formulation \begin{equation}\label{method0b} u_{k+1}\in \mbox{arg}\min_{u}\left\{\langle Au-y,Au_{k}-y\rangle +cd(u,u_{k}) +\chi_m(u)\right\},\,\,\,m\in\{0,1\}, \end{equation} where $\chi_0 \equiv 0$ denotes the original problem without integral constraint, and $$ \chi_1(u) = \left\{ \begin{array}{ll} 0 & \mbox{if~} \int_\Omega u(t)~dt =1,\\ + \infty &\mbox{else},\end{array}\right. $$ is employed for enforcing probability densities. The minimization is taken here over the domain of the entropy functional. One finds the above entropy based algorithm in the finite dimensional optimization literature, as well as in the machine learning one, under quite different names. One could mention the mirror descent type algorithms for function minimization introduced in \cite{NemYud} and the Bregman-distance version with emphasis on entropy in \cite{BecTeb}, and the exponentiated gradient descent method for linear predictions - see \cite{KivWar}. The work \cite{Ius} investigated three versions of the so-called approximate (linearized) proximal point methods for optimization in combination with line search strategies. The reader is referred to Sections 6.6 - 6.9 in \cite{cen_zen} for other iterative optimization methods employing the Shannon entropy. The main contribution of our work is the convergence of the iterates \eqref{method0b} to a solution of the equation $Au=y$ even in an infinite dimensional setting of such a nonquadratic penalty version, by stating also error estimates in the sense of a distance between the solution and the iterates, as opposed to the classical situation encountered in optimization, where the error for the objective function values is highlighted. This manuscript is organized as follows. Section 2 provides the necessary background on entropy functionals, as well as on well-definedness of the proposed iterative procedure. Section 3 analyzes (weak) convergence of the method when both a priori and a posteriori stopping rules are considered, while Section 4 deals with error estimates only for the former rule. Section 5 explores a version of the entropic Landweber method for nonquadratic data fidelity terms. The theoretical results are tested in Section 6 on several integral equation examples, in comparison with the Expectation-Maximization algorithm and the projected Landweber method - see \cite{cla_kal_res} for an overview on regularization methods for nonnegative solutions of ill-posed equations. \section{Preliminaries} In the following we collect some basic results and assumptions needed for the analysis below. We start with properties of the entropy and then proceed to the operator $A$. \subsection{Entropy and Entropic Projection} Let $\Omega $ be an open and bounded subset of ${\mathbb{R}}^d$. \textit{The negative of the Boltzmann-Shannon entropy} is the function $f:L^1(\Omega)\rightarrow (-\infty,+\infty]$, given by\footnote{We use the convention $0\ln 0=0$.} \begin{equation}\label{entropy} f(u)=\left\{ \begin{array}{ll} {\int_{\Omega} u(t)\ln u(t)\,dt} & \mbox{if $u\geq 0$ a.e. and $u\ln u\in {{L}}^1(\Omega)$}, \\ & \\ {+\infty} & \mbox{otherwise.} \end{array} \right. \end{equation} Here and in what follows ${{L}}_+^p(\Omega)$, $p\in [1,\infty]$, stands for the set $\{u\in {{L}}^p(\Omega): u(t)\geq 0\,\,\,\mbox {a.e.}\}$, while $\|\cdot\|_p$ denotes, as usual, the norm of the space $L^p(\Omega)$. The Kullback-Leibler functional or the Bregman distance with respect to the Bolzmann-Shannon entropy can be defined as $d:{\mbox{dom}\, f}\times {\mbox{dom}\, f}\rightarrow [0,+\infty]$ by \begin{equation}\label{bd} d(v,u)=f(v)-f(u)-f^{\prime}(u,v-u) \end{equation} where $f^{\prime}(u,\cdot)$ is the directional derivative at $u$. Here $ \mbox{dom}\,f=\{u\in {{L}}^1(\Omega): f(u)<\infty\}$ denotes the domain of $f$. One can also write \begin{equation}\label{kl} d(v,u)=\int_\Omega \left [v(t)\ln\frac{v(t)}{u(t)}-v(t)+u(t) \right]dt \end{equation} if $d(v,u)$ is finite, as one can see below. Some properties of the entropy functionals $f$ and $d$ are recalled below (see, e.g., \cite{Res05, ResAnd07}).\smallskip \begin{lem}\label{entropy_propr} The function defined by (\ref{entropy}) has the following properties:\smallskip \begin{enumerate}[(i)] \item The domain of the function $f$ is strictly included in ${{L}}_+^1(\Omega)$. \item The interior of the domain of the function $f$ is empty. \item The set $\partial f(u)$ is nonempty if and only if $u$ belongs to $L_+^{\infty}(\Omega)$ and is bounded away from zero. Moreover, $\partial f(u)=\{1+\ln u\}$. \item The directional derivative of the function $f$ is given by \[ f^{\prime}(u,v)=\int_{\Omega} v(t)[1+\ln u(t)]\,dt, \] whenever it is finite. \item For any $u,v\in {\mbox{dom}\, f}$, one has \begin{equation}\label{inequality} \|u-v\|_1^2\leq \left(\frac{2}{3}\|v\|_1+\frac{4}{3}\|u\|_1\right)d(v,u). \end{equation} \end{enumerate} \end{lem} Based on Lemma \ref{entropy_propr} (iii) we define in the following \begin{equation}\label{partialdom} {\mbox{dom}\,\partial f}=\{u\in L^1(\Omega): u\,\mbox{bounded and bounded away from zero} \,\,a.e.\}. \end{equation} \begin{lem}\label{kl_propr} The statements below hold true: \begin{enumerate}[(i)] \item The function $(v,u)\mapsto d(v,u)$ is convex; \item The function $d(\cdot,u^*)$ is lower semicontinuous with respect to the weak topology of $L^1(\Omega)$, whenever $u^*\in {\mbox{dom}\, f}$; \item For any $C>0$ and any nonnegative $u\in L^1(\Omega)$, the following sets are weakly compact in $L^1(\Omega)$: \[ \{x\in L^1(\Omega):d(x,u)\leq C\}. \] \item The set $\partial d(\cdot,u^*)(u)$ is nonempty for $u^*\in {\mbox{dom}\, f}$ if and only if $u$ belongs to $L_+^{\infty}(\Omega)$ and is bounded away from zero. Moreover, $\partial d(\cdot,u^*)(u)=\{\ln u-\ln u^*\}$. \end{enumerate} \end{lem} \noindent Denote \[ \langle u,v \rangle=\int_\Omega u(t)v(t)\,dt, \] for $u,v\in L^1(\Omega)$, when the integral exists. A key observation for obtaining well-definedness of the iterative scheme as well as an explicit form for the iterates is the following result on the entropic projection. \begin{pro} \label{explicitprop} Let $\ell \in L^\infty(\Omega)$ and $v \in$ dom $\partial f$. Then the problem \begin{equation} \langle \ell, u \rangle + d(u,v) + \chi_m(u) \rightarrow \min_{u \in {\mbox{dom}\, f} } \end{equation} has a unique solution in the cases $m=0$ and $m=1$, respectively, given by \begin{equation} u_m = c_m v e^{-\ell}, \qquad c_j = \left\{ \begin{array}{ll} 1 & \mbox{if~} m=0, \\ \frac{1}{\int_\Omega v e^{-\ell}~dt }& \mbox{if~} m=1, \end{array}\right. \end{equation} which satisfies $u_m \in$ dom $\partial f$. \end{pro} \par{\bf Proof:} \ignorespaces We simply rewrite the functional as \begin{align*} \langle \ell, u \rangle + d(u,v) + \chi_m(u) &= \int_\Omega \left[ u(t) \ln \frac{u(t)}{v(t)} -u(t) + v(t) + u(t) \ell(t)\right]~dt + \chi_m(u) \\ &= \int_\Omega \left[ u(t) \ln \frac{u(t)}{u_m(t)} -u(t) +v(t) + u(t) \ln c_m \right]~dt + \chi_m(u)\\ &=d(u,u_m) + \ln c_m \left( \int_\Omega u(t) ~dt - 1\right) + \chi_m(u) + C_m, \end{align*} where $C_m=\ln c_m-\int_\Omega u_m(t)~dt$ is a constant independent of $u$. It is straightforward to notice that $$ \ln c_m \left( \int_\Omega u(t) ~dt - 1\right) + \chi_m(u) = \chi_m(u). $$ Hence, the problem is equivalent to minimizing $d(u,u_m) + \chi_m(u)$. Since both terms are nonnegative and vanish for $u=u_m$, we see that $u_m$ is indeed a minimizer in ${\mbox{dom}\,f}$. Strict convexity of $d$ implies the uniqueness and since $u_m$ is the product of $v$ with a function strictly bounded away from zero it also satisfies $u_m\in$ dom $\partial f$. \endproof \subsection{Forward operators and entropy} In this paper we always assume that $A:L^1(\Omega)\rightarrow Y$ is a linear and bounded operator with $Y$ being a Hilbert space. In addition to the norm boundedness of $A$, we assume a continuity property in terms of the Bregman distance. More precisely we assume that \begin{equation} \label{condition} \|Au-Av\| \leq \gamma \sqrt{d(u,v)} \end{equation} holds on dom$(f+\chi_m)$ in the respective cases $m=0$ or $m=1$ for some positive number $\gamma$. It is easy to see that the latter is already implied by the boundedness of $A$ in case $m=1$: \begin{lem}\label{continuity} Let $A$ be as above with $\Vert A \Vert$ denoting its operator norm, let $u,v \in $ dom$(f+\chi_1)$, and $v \in $dom $\partial f$. Then \eqref{condition} is satisfied with $\gamma = \sqrt{2} \Vert A \Vert$. \end{lem} \par{\bf Proof:} \ignorespaces By the boundedness of $A$ we have $$ \Vert A u - Av \Vert^2 \leq \Vert A \Vert^2 ~\Vert u - v \Vert_{L^1(\Omega)}^2. $$ Lemma \ref{entropy_propr} (v) further implies $$ \Vert A u - Av \Vert^2 \leq \Vert A \Vert^2~ 2 d(u,v), $$ which yields the assertion. \endproof \medskip \noindent We define the nonlinear functional \begin{equation}\label{distance} D(u,v)=cd(u,v)-\frac{1}{2}\|Au-Av\|^2, \end{equation} which will be useful for the further analysis. Note that $D(u,v)\geq 0$ for $u,v \in $ dom$(f+\chi_1)$, and $v \in $dom $\partial f$, whenever $c\geq \frac{\gamma^2}{2}$ (cf. Lemma \ref{continuity}). In case $m=0,$ we restrict the analysis to the class of operators $A$ for which $D(u,v)\geq 0$ for $u \in $ dom$f$ and $v \in $dom $\partial f$. \section{Convergence of the Entropic Landweber Method}\label{sec:convergence} In the following we consider the iterative method defined by \eqref{method0b}, where $d$ is the Kullback-Leibler divergence given by \eqref{kl}. Noticing that $A^*$ maps to $L^\infty(\Omega)$, we can equivalently rewrite the minimization in \eqref{method0b} in the form of Proposition \ref{explicitprop}, which implies the following result. \begin{pro} \label{definedness} Let $u_0 \in$ dom $\partial f$. Then there exists a unique minimizer in \eqref{method0b} for any $k \geq 0$, given by ($\lambda = \frac{1}c$) \begin{equation}\label{entropic} u_{k+1}= u_{k} c_{k}^m e^{\lambda A^*(y-Au_{k})}, \qquad c_{k}^m = \left\{ \begin{array}{ll} 1 & \mbox{if~} m=0, \\ \frac{1}{\int_\Omega u_{k} e^{\lambda A^*(y-Au_{k})}~dt }& \mbox{if~} m=1, \end{array}\right. \end{equation} which further satisfies $u_{k+1} \in$ dom $\partial f$. \end{pro} Note that, from pointwise manipulation of \eqref{entropic} we rigorously obtain the first-order optimality condition for the variational problem in each step, i.e., \begin{equation} \label{optimalitycondition} \ln u_{k+1}= \ln u_{k} + \ln c_k^m+ \lambda A^*(y-Au_{k}) , \end{equation} where $\ln c_k^0=0$ and $\ln c_k^1$ is to be interpreted as a Lagrange multiplier for the integral constraint. In the latter case, this constant term is orthogonal to all functions of the form $w-v$, where $\chi_1(w)=\chi_1(v) = 0$. Since most estimates below for iterates will be based on taking duality products of \eqref{optimalitycondition} with such functions, they can be carried out in the same way for $m=0$ and $m=1$. The analysis of the above method ressembles the one for proximal point methods, which is apparent from rewriting \eqref{method0b} as \begin{equation} u_{k+1}\in \mbox{arg}\min_u\left\{\frac{1}{2}\|Au-y\|^2 + \chi_m(u) + D(u,u_{k}) \right\}. \end{equation} However, the quantity $D$ is neither a metric distance nor necessarily a Bregman distance of a convex function, rather a weighted difference of Bregman distances. This and the involved Kullback-Leibler divergence in an infinite dimensional setting require thus a careful investigation. We choose $u_0\in\mbox{dom}\,\partial f$ such that $\xi_0:=1+\ln u_0\in \mathcal{R}(A^*)$, that is $\xi_0=\lambda A^*w_0$ for some $w_0\in Y$, and denote \begin{equation}\label{v} v_k=w_0+\sum_{j=0}^{k-1}(y-Au_j) \end{equation} for $k\geq 1$. Then \eqref{optimalitycondition} can be expressed as $\displaystyle{\xi_k=\xi_{k-1}+\ln c_{k-1}^m+\lambda A^*(y-Au_{k-1})}$ which implies \begin{equation}\label{ve} \xi_k=\xi_0+\sum_{j=0}^{k-1}\ln c_{j}^m+\lambda A^*\left(\sum_{j=0}^{k-1}(y-Au_j)\right)= \sum_{j=0}^{k-1}\ln c_{j}^m+\lambda A^*v_k. \end{equation} We show next that the entropic Landweber method converges in the exact data case. \begin{pro} \label{conv_exact} Let $A:L^1(\Omega)\rightarrow Y$ be a bounded linear operator which satisfies \eqref{condition} and such that the operator equation $Au=y$ has a positive solution $z$ verifying $\chi_m(z) = 0$ if $m=1$. Let $u_0\in \mbox{dom}\,\partial f$ be an arbitrary starting element such that $1+\ln u_0\in \mathcal{R}(A^*)$. Moreover, let $\chi_m(u_0) = 0$ if $m=1$. Then the following statements are true: \begin{enumerate}[(i)] \item The residual $\|Au_k-y\|$ decreases monotonically. \item The term $D(z,u_k)$ decreases monotonically. \item The sequences $\{u_k\}_{k\in\mathbb{N}}$ generated by the iterative method \eqref{entropic} converge weakly on subsequences in $L^1(\Omega)$ to solutions of the equation $Au=y$, with $\chi_m(u) = 0$ if $m=1$. \end{enumerate} \par{\bf Proof:} \ignorespaces We will use the proximal point method techniques in order to prove the statements, by taking care of the fact that $D$ is a nonnegative functional satisfying $D(u,u)=0$ for any $u$ in this function's domain. (i) We have for all $k\in \mathbb{N}$, \[ \frac{1}{2}\|Au_{k+1}-y\|^2+D(u_{k+1},u_k)\leq \frac{1}{2}\|Au_{k}-y\|^2, \] which implies that the sequence $\{\|Au_k-y\|\}$ is nonincreasing, since $D(u_{k+1},u_k)\geq 0$. (ii) Consider first the case $m=0$. Let $z$ verify $Az=y$ and denote $$a=D(z,u_{k+1})+D(u_{k+1},u_k)-D(z,u_k), \,\,\,\,\,\,\xi_k=1+\ln u_k\in \partial f(u_k).$$ By using \eqref{optimalitycondition}, one has for all $k\in\mathbb{N}$: \begin{eqnarray*} a &=& cd(z,u_{k+1})-\frac{1}{2}\|Au_{k+1}-y\|^2+cd(u_{k+1},u_k)-\frac{1}{2}\|Au_{k+1}-Au_k\|^2\\ && - cd(z,u_{k})+\frac{1}{2}\|Au_{k}-y\|^2\\ &=& \langle A^*(Au_k-y), z-u_{k+1}\rangle+\langle Au_{k+1}-y,Au_k-Au_{k+1}\rangle\\ &=& \langle Au_k-y, y-Au_{k+1}\rangle+\langle Au_{k+1}-y,Au_k-Au_{k+1}\rangle\\ &=&-\|y-Au_{k+1}\|^2\leq 0. \end{eqnarray*} This implies the typical inequality for a proximal-like method: \begin{equation}\label{ineq} \frac{1}{2}\|Au_{k+1}-y\|^2+D(z,u_{k+1})+D(u_{k+1},u_k)\leq D(z,u_k) \end{equation} which yields the conclusion. (iii) Let $m=0$. Inequality \eqref{ineq} leads to \begin{equation}\label{bound} \sum_{j=0}^{k}\frac{1}{2}\|Au_{j+1}-y\|^2+D(z,u_{k+1})+\sum_{j=0}^{k}D(u_{j+1},u_j)\leq D(z,u_0), \end{equation} which yields \begin{equation}\label{mon} \frac{k+1}{2}\|Au_{k+1}-y\|^2\leq \sum_{j=0}^{k}\frac{1}{2}\|Au_{j+1}-y\|^2, \end{equation} since the sequence $\{\|Au_k-y\|^2\}_{k\in\mathbb N}$ is monotone. We show now that $\{f(u_k)\}_{k\in\mathbb N}$ is bounded. To this end, due to nonnegativity of $D(z,u_k)$, $k\in\mathbb N$, and to \eqref{ve}, one has \begin{eqnarray*} cf(u_k)+\frac{1}{2}\|Au_{k} -y\|^2&\leq & cf(z)+c\langle \xi_k, u_k-z\rangle = cf(z)+\langle w_0+\sum_{j=0}^{k-1}(y-Au_j), Au_k-y\rangle\\ &\leq& cf(z)+ \|w_0\| \|Au_k-y\|+ \sum_{j=0}^{k-1}\frac{1}{2}\|y-Au_j\|^2+\frac{k}{2} \|Au_k-y\|^2. \end{eqnarray*} The right hand side is bounded by \eqref{bound} and \eqref{mon}, thus ensuring boundedness of $\{f(u_k)\}_{k\in\mathbb N}$. Consequently, there exists a subsequence $\{u_l\}_{l\in\mathbb{N}}$ in $\mbox{dom}\,\partial f$ which is $L^1$-weakly convergent to some $u\in {\mbox{dom}\, f}$, cf. Lemma \ref{kl_propr}. Then one has $Au_l\rightarrow Au$ weakly in $Y$ and moreover $Au_l\rightarrow y$ in the $Y$-norm since \[ \frac{1}{2}\|Au_{k+1}-y\|^2\leq D(z,u_k)-D(z,u_{k+1})\to 0 \] due to inequality \eqref{ineq} and to monotonicity of $\{D(z,u_k)\}_{k\in\mathbb N}$. Hence, $u$ satisfies $Au=y$. The proof of the statements above for the case $m=1$ is similar, the main difference being the optimality condition \eqref{optimalitycondition} with $c_k^m$ satisfying $c(\xi_k-\xi_{k+1})=A^*(Au_k-y)+c\ln c_k^m$. In more detail, the term $\langle c\ln c_k^m,z-u_{k+1}\rangle$ vanishes when evaluating $a$ and does not influence further calculations, while other terms containing $c_k^m$ behave similarly in the remaining argumentation. \endproof \end{pro} Let us consider now the iterative method based on the noisy data, that is \begin{equation}\label{method0b_noisy} u_{k+1}\in \mbox{arg}\min_u\left\{\langle Au-y^{\delta},Au_{k}-y^{\delta}\rangle +cd(u,u_{k}) +\chi_m(u)\right\}. \end{equation} We propose first a discrepancy principle for stopping the algorithm in this case. Before detailing how it works, denote \begin{equation}\label{v_noisy} v_k=w_0+\sum_{j=0}^{k-1}(y^{\delta}-Au_j) \end{equation} for $k\geq 1$. Then the optimality condition for \eqref{method0b_noisy} yields \begin{equation}\label{ve_noisy} \xi_k=\xi_0+\sum_{j=0}^{k-1}\ln c_{j}^m+\lambda A^*(\sum_{j=0}^{k-1}(y^{\delta}-Au_j))=\sum_{j=0}^{k-1}\ln c_{j}^m+\lambda A^*v_k. \end{equation} \begin{pro}\label{conv_noisy} Assume that $A:L^1(\Omega)\rightarrow Y$ is a bounded linear operator which satisfies \eqref{condition} and such that the operator equation $Au=y$ has a positive solution $z$ verifying $\chi_m(z) = 0$ if $m=1$. Let $y^{\delta}\in Y$ be noisy data satisfying $\|y-y^{\delta}\|\leq \delta$, for some noise level $\delta$. Let $u_0\in \mbox{dom}\,\partial f$ be an arbitrary starting element with the properties $1+\ln u_0\in \mathcal{R} (A^*)$ and $\chi_m(u_0) = 0$ if $m=1$. Then \begin{enumerate}[(i)] \item The residual $\|Au_k-y^{\delta}\|$ decreasesmonotonically and the following inequalities hold \begin{equation}\label{ineq11} \frac{1}{2}\|y^{\delta}-Au_{k+1}\|^2+D(z,u_{k+1})+D(u_{k+1},u_k)\leq \frac{\delta^2}{2}+D(z,u_k),\,\,\,k\in \mathbb{N}, \end{equation} \begin{equation}\label{ineq12} \|y^{\delta}-Au_{k}\|^2\leq \delta^2+\frac{2D(z,u_0)}{k},\,\,\, k\geq 1. \end{equation} \noindent \item The term $D(z,u_k)$ decreases as long as $\|y^{\delta}-Au_{k}\|^2>\delta^2.$ \item The index $k_*(\delta)$ defined by \begin{equation}\label{aposteriori} k_*(\delta)=\min\{k\in\mathbb{N}: \|Au_k-y^\delta\|<\sqrt{\tau}\delta\},\,\,\,\tau>1. \end{equation} is finite. \item There exists a weakly convergent subsequence of $\{u_{k_*(\delta)}\}_\delta$ in $L^1(\Omega)$. If $\{{k_*(\delta})\}_\delta$ is unbounded, then each limit point is a solution of $Au=f$. \end{enumerate} \par{\bf Proof:} \ignorespaces We consider only the case $m=0$, since for $m=1$ one can use similar arguments, as explained in the previous proof. \noindent First part of (i) follows by the definition of the iterative procedure. For proving the remaining inequalities in (i), and (ii), we consider as in the previous proof \begin{eqnarray*} a &=& cd(z,u_{k+1})-\frac{1}{2}\|Au_{k+1}-y\|^2+cd(u_{k+1},u_k)-\frac{1}{2}\|Au_{k+1}-Au_k\|^2\\ & & - cd(z,u_{k})+\frac{1}{2}\|Au_{k}-y\|^2\\ &=& c\langle \xi_k-\xi_{k+1},z-u_{k+1}\rangle+\langle Au_{k+1}-y,Au_k-Au_{k+1}\rangle\\ &=& \langle Au_k-y^{\delta}, y-Au_{k+1}\rangle+\langle Au_{k+1}-y,Au_k-Au_{k+1}\rangle\\ &=& \langle y- Au_{k+1}, Au_{k+1}-y^{\delta}\rangle =-\|y^{\delta}-Au_{k+1}\|^2+ \langle y- y^{\delta}, Au_{k+1}-y^{\delta}\rangle\\ &\leq& -\|y^{\delta}-Au_{k+1}\|^2+\frac{\delta^2}{2}+\frac{1}{2}\|y^{\delta}-Au_{k+1}\|^2\\ &=& -\frac{1}{2}\|y^{\delta}-Au_{k+1}\|^2+\frac{\delta^2}{2}. \end{eqnarray*} Inequality \eqref{ineq12} can be obtained by writing \eqref{ineq11} for $k=0,...,n-1$ und calculating the telescope sum: \begin{equation*} \frac{n \|y^{\delta}-Au_{n}\|^2}{2}\leq\frac{1}{2} \sum_{k=0}^{n-1} \|y^{\delta}-Au_{k+1}\|^2+D(z,u_n)\leq D(z,u_0)+\frac{\delta^2n}{2}. \end{equation*} Moreover, (ii) follows from \eqref{ineq11} by neglecting $D(u_{k+1},u_k)$. \noindent(iii) follows from \eqref{ineq12} and the definition of $k_*(\delta)$: \begin{equation}\label{bound_noisy} \frac{k_*(\delta)\tau\delta^2}{2}\leq \frac{1}{2} \sum_{k=0}^{k_*(\delta)-1} \|y^{\delta}-Au_{k}\|^2+D(z,u_{k_*(\delta)})\leq D(z,u_0)+\frac{\delta^2k_*(\delta)}{2}, \end{equation} which implies \begin{equation}\label{index} k_*(\delta)\leq\frac{2D(z,u_0)}{(\tau-1)\delta^2}. \end{equation} \noindent (iv) can be shown similarly to Proposition \ref{conv_exact} (iii). Due to nonnegativity of $D(z,u_k)$ for any $k\in\mathbb N$ and to \eqref{ve_noisy}, one has \begin{eqnarray*} cf(u_k)+\frac{1}{2}\|Au_{k} -y\|^2&\leq & cf(z)+c\langle \xi_k, u_k-z\rangle\\ &=& cf(z)+\langle w_0+\sum_{j=0}^{k-1}(y^{\delta}-Au_j), Au_k-y\rangle\\ &\leq& cf(z)+ \|w_0\| \|Au_k-y\|+ \sum_{j=0}^{k-1}\|y^{\delta}-Au_j\|\| Au_k-y\|\\ &\leq& cf(z)+ \|w_0\| \|Au_k-y^{\delta}\|+ \delta \|w_0\|+\delta \sum_{j=0}^{k-1}\|y^{\delta}-Au_j\|\\ &+&\sum_{j=0}^{k-1}\|y^{\delta}-Au_j\|\| Au_k-y^{\delta}\|\\ &\leq& cf(z)+ \|w_0\| \|Au_k-y^{\delta}\|+ \delta \|w_0\| +\sum_{j=0}^{k-1}\frac{1}{2}\|y-Au_j\|^2+ \frac{k\delta^2}{2}\\ &+& \sum_{j=0}^{k-1}\frac{1}{2}\|y-Au_j\|^2+\frac{k}{2} \|Au_k-y^{\delta}\|^2. \end{eqnarray*} The right hand side written for $k=k_*(\delta)$ is bounded by \eqref{bound_noisy}, \eqref{aposteriori}, the monotonicity of the residual and by \eqref{index}, thus ensuring boundedness of $\{f(u_{k_*(\delta)}\}_{\delta>0}$ for $\delta$ small enough. The conclusion follows then as in the proof of Proposition \ref{conv_exact} (iii). \endproof \end{pro} A convergence result can be established also in case of an a priori stopping rule with $k_*(\delta)\sim\frac{1}{\delta}$ by following the lines of Proposition \ref{conv_noisy} (iv). \begin{pro} Assume that $A:L^1(\Omega)\rightarrow Y$ is a bounded linear operator which satisfies \eqref{condition} and such that the operator equation $Au=y$ has a positive solution $z$ verifying $\chi_m(z) = 0$ if $m=1$. Let $y^{\delta}\in Y$ be noisy data satisfying $\|y-y^{\delta}\|\leq \delta$, for some noise level $\delta$. Let $u_0\in \mbox{dom}\,\partial f$ be an arbitrary starting element with the properties $1+\ln u_0\in \mathcal{R} (A^*)$ and $\chi_m(u_0) = 0$ if $m=1$. Let the stopping index $k_*(\delta)$ be chosen of order $1/{\delta}$. Then $\{f(u_{k_*(\delta)})\}_{\delta}$ is bounded and hence, as $\delta \rightarrow 0$, there exists a weakly convergent subsequence $\{u_{k(\delta_n)}\}_n$ in $L^1(\Omega)$ whose limit is a solution of $Au =y$. Moreover, if the solution of the equation is unique, then $\{u_{k_*(\delta)}\}_{\delta>0}$ converges weakly to the solution as ${\delta\rightarrow 0}$. \end{pro} \section{Error estimates} In this section we derive error estimates under a specific source condition (on a solution) for the entropy type penalty. We proceed first with the case of exact data on the right-hand side of the operator equation and then with the noisy data case, by employing an a priori rule for stopping the algorithm. \subsection{Exact data case} \begin{pro}\label{pro:exact_data} Assume that $A:L^1(\Omega)\rightarrow Y$ is a bounded linear operator which satisfies \eqref{condition} and such that the operator equation $Au=y$ has a positive solution $z$ verifying $\chi_m(z) = 0$ if $m=1$. Let $u_0\in \mbox{dom}\,\partial f$ be an arbitrary starting element with the properties $1+\ln u_0\in \mathcal{R} (A^*)$ and $\chi_m(u_0) = 0$ if $m=1$. Additionally, let the following source condition hold: \begin{equation}\label{sc} 1+\ln z\in \mathcal{R}(A^*). \end{equation} Then one has \begin{equation}\label{estimate} d(z,u_k)=O(1/k). \end{equation} Moreover, $\|u_k-z\|_1=O(1/\sqrt{k})$ if $m=1$. \par{\bf Proof:} \ignorespaces We consider only the case $m=0$ (similar arguments for the other case). First, we symmetrize $D$ by considering $D^s(x,y)=D(x,y)+D(y,x)$. Let $\xi=1+\ln z=\lambda A^*v$ for some $v\in Y$. One can use similar techniques as in \cite{BurResHe} for deriving the announced error estimates, by carefully dealing with the setting of the $D$ distance penalty. Based on \eqref{v}, one has \begin{eqnarray*} D^s(u_k,z)&=&c\langle \xi_k-\xi,u_k-z\rangle-\|Au_k-Az\|^2\\ &=&\langle A^*v_k-A^*v,u_k-z\rangle-\|Au_k-y\|^2\\ &=&\langle v_k-v,Au_k-y\rangle-\|Au_k-y\|^2\\ &=&\langle v_k-v,v_k-v_{k+1}\rangle-\|Au_k-y\|^2\\ &=&\frac{1}{2}\| v_k-v\|^2-\frac{1}{2}\| v_{k+1}-v\|^2+\frac{1}{2}\| v_{k+1}-v_k\|^2-\|Au_k-y\|^2\\ &=&\frac{1}{2}\| v_k-v\|^2-\frac{1}{2}\| v_{k+1}-v\|^2-\frac{1}{2}\|Au_k-y\|^2. \end{eqnarray*} By writing the last inequality also for $k-1, k-2,...,1$, by summing up and by combining with monotonicity of $\{D(z,u_k)\}$, one obtains $$kD(z,u_k)\leq \sum_{j=1}^{k}D(z,u_j)\leq \sum_{j=1}^{k}D^s(u_j,z)\leq \frac{1}{2}\| v_1-v\|^2-\frac{1}{2}\| v_{k+1}-v\|^2-\frac{1}{2}\sum_{j=1}^k\|Au_j-y\|^2$$ and thus, due to \eqref{mon}, $$d(z,u_k)\leq \frac{\lambda}{2k}\| v_1-v\|^2$$ holds. The announced convergence rate in the $L^1$-norm holds in case $m=1$ by Lemma \ref{entropy_propr} (v). \endproof \end{pro} \subsection{Noisy data case} \begin{pro} Assume that $A:L^1(\Omega)\rightarrow Y$ is a bounded linear operator which satisfies \eqref{condition} and such that the operator equation $Au=y$ has a positive solution $z$ verifying $\chi_m(z) = 0$ if $m=1$. Let $u_0\in \mbox{dom}\,\partial f$ be an arbitrary starting element with the properties $1+\ln u_0\in \mathcal{R} (A^*)$ and $\chi_m(u_0) = 0$ if $m=1$. Let $y^{\delta}\in Y$ be noisy data satisfying $\|y-y^{\delta}\|\leq \delta$, for some noise level $\delta$. Let the stopping index $k_*(\delta)$ be chosen of order $1/\delta$. and let the source condition \eqref{sc} hold. Then one has \begin{equation}\label{estimate_noisy} d(z,u_{k_*(\delta)})=O(\delta). \end{equation} Moreover, $\|u_{k_*(\delta)}-z\|_1=O(\sqrt{\delta})$ if $m=1$. \par{\bf Proof:} \ignorespaces Note that $c\xi-A^*Az=A^*q$ for $q=v-A^*z$. With this notation, one can show the following estimate as in Theorem 4.3 in \cite{BurResHe}: $$D(z,u_k)\leq \frac{\|q\|^2}{2k}+\delta\|q\|+\delta^2k, \,\,\,\forall k\in\mathbb N.$$ Then one has \begin{eqnarray*} cd(z,u_k)\leq \frac{\|q\|^2}{2k}+\delta\|q\|+\delta^2k+\frac{\|Au_k-y\|^2}{2}\leq \frac{\|q\|^2}{2k}+\delta\|q\|+\delta^2k+\|Au_k-y^{\delta}\|^2+\delta^2 \end{eqnarray*} which yields \eqref{estimate_noisy} when written for $k=k_*(\delta)$, due to \eqref{ineq12}. \endproof\smallskip \noindent Establishing convergence rates by means of a discrepancy rule remains an open issue. \end{pro} \section{General data fidelities} Before we conclude with numerical examples, we want to emphasize that Problem \eqref{method0} can easily be generalised to \begin{align} u_{k + 1} \in \arg\min_u \left\{ F_{y^\delta}(Au) + c d(u, u_k) - g(u, u_k)) + \chi_m(u) \right\} \, .\label{eq:methodgen} \end{align} Here $F_{y^\delta}:Y \rightarrow [0, +\infty)$ is a more general data fidelity term that is assumed to be convex and Fr\'{e}chet-differentiable and $g: L^1(\Omega) \times L^1(\Omega) \rightarrow [0,+\infty)$ is the Bregman distance with respect to the function $F_{y^\delta}$, i.e. \begin{align*} g(u, v) := F_{y^\delta}(Au) - F_{y^\delta}(Av) - \langle A^\ast F_{y^\delta}^\prime(Av), u - v \rangle \, . \end{align*} Note that \eqref{eq:methodgen} is an instance of the Bregman proximal method \cite{CensorZenios92,Gutman}. The update for \eqref{eq:methodgen} can be written, in analogy to \eqref{entropic}, as \begin{align} u_{k + 1}^m = u_k^m c_k^m e^{-\lambda A^\ast F_{y^\delta}^\prime(Au_k)} \, ,\label{eq:genentropic} \end{align} for $\lambda = 1/c$ and $m \in \{0, 1\}$. We want to emphasise that a more general data fidelity term that satisfies the assumptions mentioned above together with \begin{align} c d(u, v) - g(u, v) \geq 0 \, ,\label{eq:gensmoothness} \end{align} for all $u, v \in dom \, f$, is no restriction in terms of Fej\'{e}r-monotonicity. In analogy to \cite[Lemma 6.11]{BenningBurger18} we can conclude \begin{align*} D(z, u_{k + 1}) \leq D(z, u_k) \end{align*} for all $k < k_\ast(\delta)$, with $k_\ast(\delta)$ chosen according to a modified version of \eqref{aposteriori} that reads as \begin{align} k_*(\delta)=\min\{k\in\mathbb{N}: F_{y^\delta}(Au_k) < \delta \} \, .\label{eq:modaposteriori} \end{align} However, we can also derive a monotonicity result for $d$ directly. First of all we observe that \eqref{eq:gensmoothness} implies \begin{align*} -\langle A^\ast F_{y^\delta}^\prime(Au_k), u_{k + 1} - u_k \rangle - c d(u_{k + 1}, u_k) \leq F_{y^\delta}(Au_k) - F_{y^\delta}(Au_{k + 1}) \, . \end{align*} Inserting \eqref{eq:genentropic} into the inequality above then yields \begin{align*} c \langle \ln u_{k + 1} - \ln u_k, u_{k + 1} - u_k \rangle - c d(u_{k + 1}, u_k) \leq F_{y^\delta}(Au_k) - F_{y^\delta}(Au_{k + 1}) + c \langle \ln c_k^m, u_{k + 1} - u_k \rangle \, . \end{align*} As mentioned earlier in Section \ref{sec:convergence}, we either have $\ln(c_k^m) = 0$ for $m = 0$, or orthogonality of $\ln(c_k^m)$ to all functions of the form $w - v$ with $\chi_m(w) = \chi_m(v) = 0$ for $m = 1$. Since $d(u_{k + 1}, u_k) + d(u_k, u_{k + 1}) = \langle \ln u_{k + 1} - \ln u_k, u_{k + 1} - u_k \rangle$, we therefore estimate \begin{align*} c d(u_k, u_{k + 1}) \leq F_{y^\delta}(Au_k) - F_{y^\delta}(Au_{k + 1}) \, . \end{align*} With the three-point identity we then observe \begin{align*} d(z, u_{k + 1}) - d(z, u_k) {} = {} &- \langle \ln u_{k + 1} - \ln u_k, z - u_{k + 1} \rangle - d(u_{k + 1}, u_k) \\ {} = {} &- \langle \ln u_{k + 1} - \ln u_k, z - u_k \rangle + \langle \ln u_{k + 1} - \ln u_k, u_{k + 1} - u_k \rangle \\ &- d(u_{k + 1}, u_k) \\ {} = {} &- \langle \ln u_{k + 1} - \ln(u_k), z - u_k \rangle + d(u_k, u_{k + 1}) \\ {} = {} &\langle \lambda A^\ast F_{y^\delta}^\prime(Au_k), z - u_k \rangle + d(u_k, u_{k + 1}) \\ {} \leq {} &\lambda \left( F_{y^\delta}(Az) - F_{y^\delta}(Au_k) \right) + d(u_k, u_{k + 1}) \\ {} \leq {} & \lambda \left( F_{y^\delta}(Az) - F_{y^\delta}(Au_{k + 1}) \right) \, . \end{align*} Together with \eqref{eq:modaposteriori} we can then conclude \begin{align*} d(z, u_{k + 1}) < d(z, u_k) \end{align*} for $k < k^\ast(\delta)$. \section{Example Problems} We finally discuss several types of problems that satisfy the conditions used in the analysis and present numerical illustrations for some of these situations. \subsection{Integral Equations} Let $\Omega \subset I\!\!R^d$ and $\tilde \Omega \subset I\!\!R^{\tilde d}$ be open and bounded sets and let $k \in L^\infty(\tilde \Omega \times \Omega)$. Then the integral operator \begin{equation} A: L^1(\Omega) \rightarrow L^2(\tilde \Omega) , \qquad u \mapsto \int_\Omega k(\cdot,y) u(y) ~dy \end{equation} is a well-defined and bounded linear operator. Thus, the convergence analysis is applicable due to Lemma \ref{continuity}. We mention that in the case of $k$ being a nonnegative function, and hence $A$ and $A^*$ preserving nonnegativity, standard schemes preserving nonnegativity are available. In particular for $k$ including negative entries, the entropic Landweber scheme offers a straightforward alternative, since it does not depend on the positivity preservation of $A$ respectively its adjoint. For comparison we consider the EM-Algorithm $$ u_{k+1} = \frac{u_k}{A^* 1} A^* \left( \frac{y}{Au_k} \right)$$ and the projected Landweber iteration $$ u_{k+1} = \left( u_k - \tau A^*(Au_k -y) \right)_+. $$ \noindent We implement the forward operator by discretization of $u$ on a uniform grid and a trapezoidal rule for integration. We use the following examples of kernels and initial values, all on $\Omega = (0,1)$, the first two being standard test examples used in the literature on maximum entropy methods (cf. \cite{amato}) \begin{enumerate} \item Kernel $k_1(x,y)=e^{xy}$, exact solution $z_1(x)=e^{-\frac{x^2}{2\sigma^2}}$ \item Kernel $k_2(x,y)=3e^{-\frac{(x-y)^2}{0.04}}$, exact solution $$z_2(x)=1-0.9 e^{-\frac{(x-0.1)^2}{2\sigma^2}}-0.3 e^{-\frac{(x-0.3)^2}{2\sigma^2}} -0.5 e^{-\frac{(x-0.5)^2}{2\sigma^2}}-0.2 e^{-\frac{(x-0.7)^2}{2\sigma^2}}-0.7 e^{-\frac{(x-0.9)^2}{2\sigma^2}}.$$ \item Kernel $k_3(x,y)=1$ if $x\geq y$ and $k_3(x,y) = 0$ else, exact solution $z_3(x)=e^{-\frac{x^2}{2\sigma^2}}$ . \end{enumerate} In all examples, we have chosen $\sigma^2 =0.01$ and a constant intial value $u^0$. In order to illustrate the behaviour of the iteration methods we plot the the error $\Vert u^k - z \Vert_{L^1}$ vs. the iteration number $k$ in Figure \ref{resultsfigure}. We observe that the entropic projection is at least competitive to the other schemes in all examples, it outperforms the EM and projection method in the first example, which is a combination of severe ill-posedness with an exact solution having many entries close to zero (which is a particularly difficult case for the EM algorithm). In the second case, again severely ill-posed, the projected Landweber iteration performs better, mainly due to the strong initial decrease when the solution is positive and no projection is applied. \begin{figure} \centering \includegraphics[width=.48\textwidth]{kernel1} \includegraphics[width=.48\textwidth]{kernel2} \includegraphics[width=.48\textwidth]{kernel3} \caption{Results of the three test cases, $L^1$ error plotted vs. iteration number. \label{resultsfigure} } \end{figure} The third case corresponding to numerical differentiation, i.e. a very mildly ill-posed problem, is characterized by fast convergence of the schemes, but again the projection method converges significantly slower. For comparison we also include the stochastic version of the entropic projection method, with only one equation used in each iteration step, hence a highly efficient computation. That is, the operator $A$ is divided in $M$ blocks $A=(A_1,A_2,\ldots,A_M)^T$, and the data $y$ are partitioned in the same way: $y=(y_1,y_2,\ldots,y_M)$. With $J(k)$ a discrete uniform random variable in $\{1,\ldots,M\}$, we compute the iterates $$ u_{k+1}= u_{k} c_{k}^m e^{\lambda M A_{J(k)}^*(y_{J(k)}-A_{J(k)} u_{k})},\,\,\,k\in\mathbb N.$$ The initial convergence curve is similar to the other method, with much lower computational effort, then the asymptotic convergence close to the exact solution becomes significantly slower. Hence, it might be very attractive to use the stochastic version at least for the first phase of the reconstruction. \begin{figure}[t] \begin{center} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_ground_truth1.eps} \caption{$z_1$} \label{subfig:sampling_gt1} \end{subfigure} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_ground_truth2.eps} \caption{$z_2$} \label{subfig:sampling_gt2} \end{subfigure} \end{center} \caption{The two ground truth functions $z_1$ and $z_2$ as defined in Section \ref{sec:discrete}. Note that $z_1$ by construction satisfies \eqref{sc} while $z_2$ does not satisfy \eqref{sc}.} \label{fig:sampling_ground_truth} \end{figure} \subsection{Discrete sampling of continuous probability densities}\label{sec:discrete} Suppose that our forward operator is the Fourier integral of a real-valued function evaluated at discrete samples $\xi_1, \ldots, \xi_n$ on a compact domain $\Omega \subset I\!\!R^d$, i.e. \begin{align*} A : L^1(\Omega) \rightarrow \mathbb C^n \, , \qquad u \mapsto \left((2 \pi)^{-\frac{d}{2}} \int_{\Omega} u(x) \, e^{-i x \cdot \xi_j} \, dx \,\right)_{1\leq j\leq n} . \end{align*} Then the adjoint operator $A^\ast$ that satisfies $\sum_{j = 1}^n (Au)_j \overline{v_j} = \int_{\Omega} u(x) \overline{(A^\ast v)(x)} dx = \int_{\Omega} u(x) (A^\ast v)(x) dx$ is given as \begin{align*} A^\ast : \mathbb C^n \rightarrow L^\infty(\Omega) \, , \qquad v \mapsto \text{Re}\left( (2 \pi)^{-\frac{d}{2}} \sum_{j = 1}^n v_j \, e^{i x \cdot \xi_j} \right) \, , \end{align*} where $\text{Re}$ denotes the real part of a complex function. For this choice of $A$ the iterates of \eqref{method0b} read \begin{align*} u_{k + 1}(x) = c_k^m u_k(x) e^{\lambda \text{Re}\left( (2 \pi)^{-\frac{d}{2}} \sum_{j = 1}^n \left( y_j - (2 \pi)^{-\frac{d}{2}} \int_{\Omega} u_k(t) e^{-i t \cdot \xi_j} \, dt \right) \, e^{i x \cdot \xi_j} \right) } \, , \end{align*} where $c_k^m$ is defined as in \eqref{entropic}. Note that this update can also be written as \begin{align*} u_k(x) &= c_{k - 1}^m \dots c_0^m u_0(x) e^{\lambda \text{Re}\left( (2 \pi)^{-\frac{d}{2}} \sum_{j = 1}^n \left( k \, y_j - \tilde{y}_{j k} \right) \, e^{i x \cdot \xi_j} \right) } \, , \intertext{for} \tilde{y}_{j k} &:= (2 \pi)^{-\frac{d}{2}} \sum_{l = 0}^{k - 1} \int_{\Omega} u_l(t) e^{-i t \cdot \xi_j} \, dt \, . \end{align*} Due to $\tilde{y}_{j (k + 1)} = \tilde{y}_{j k} + (2 \pi)^{-\frac{d}{2}} \int_{I\!\!R^d} u_k(t) e^{-i t \cdot \xi_j} \, dt$, this formulation has the advantage that the numerical costs for evaluating the integrals remains constant. \begin{figure}[t] \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_sc_nonoise.eps} \caption{$u^{k^\ast}$} \label{subfig:results_gt1_1} \end{subfigure} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_sc_nonoise_energy.eps} \caption{Energy decrease of objective} \label{subfig:results_gt1_2} \end{subfigure}\\ \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_sc_noise.eps} \caption{$u^{k^\ast}$} \label{subfig:results_gt1_3} \end{subfigure} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_sc_noise_energy.eps} \caption{Energy decrease of objective} \label{subfig:results_gt1_4} \end{subfigure} \caption{Results of algorithm \eqref{method0b} for data measurements of the form \eqref{eq:measurements} based on the underlying function $z_1$ as visualised in Figure \ref{subfig:sampling_gt1}. Figure \ref{subfig:results_gt1_1} shows the ground truth function $z_1$ and $u^{k^\ast}$ under the assumption of $\sigma = 0$ in \eqref{eq:measurements} , whereas Figure \ref{subfig:results_gt1_2} visualises the monotonic energy decrease over the course of the iterations. Figure \ref{subfig:results_gt1_3} and Figure \ref{subfig:results_gt1_4} show the same results under the assumption of $\sigma = 1/50$ in \eqref{eq:measurements}.} \label{fig:sampling_results1} \end{figure} In the following we consider a one-dimensional setting ($d = 1$) with $\Omega = [-a, a]$ for $a = 10$, where we measure $n = 16$ samples $\{ y_j \}_{j = 1}^n$ of the Fourier integral for coordinates $\xi_j = (2 \pi (j - 1))/n$, $j = 1, \ldots, n$. We assume that these measurements are of the form \begin{align} y_j = \frac{1}{\sqrt{2 \pi}} \int_{-10}^{10} z(t) \, e^{- i t \xi_j} \, dt + n_j \, ,\label{eq:measurements} \end{align} for a function $z \in L^1([-10, 10])$ and where $n_j \in \mathcal{N}(0, \sigma^2)$ are normal-distributed random variables with mean zero and variance $\sigma^2$, for all $j \in \{1, \ldots, n\}$. We consider numerical experiments for two choices of $z$. The first choice is the following Gau\ss ian-mixture model, \begin{align*} \tilde{z}(x) := \sum_{l = 1}^3 c_l \, g(x, \mu_l, \sigma_l) \, , \end{align*} that is constructed as a linear combination of three normalised Gau\ss ians, i.e. \begin{align*} g(x, \mu, \sigma) := \frac{1}{\sqrt{2 \pi \sigma^2}} e^{- \frac{(x - \mu)^2}{2 \sigma^2}} \, . \end{align*} \begin{figure}[t] \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_nosc_nonoise.eps} \caption{$u^{k^\ast}$} \label{subfig:results_gt2_1} \end{subfigure} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_nosc_nonoise_energy.eps} \caption{Energy decrease of objective} \label{subfig:results_gt2_2} \end{subfigure}\\ \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_nosc_noise.eps} \caption{$u^{k^\ast}$} \label{subfig:results_gt2_3} \end{subfigure} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_nosc_noise_energy.eps} \caption{Energy decrease of objective} \label{subfig:results_gt2_4} \end{subfigure} \caption{Results of algorithm \eqref{method0b} for data measurements of the form \eqref{eq:measurements} based on the underlying function $z_2$ as visualised in Figure \ref{subfig:sampling_gt2}. Figure \ref{subfig:results_gt2_1} shows the ground truth function $z_2$ and $u^{k^\ast}$ under the assumption of $\sigma = 0$ in \eqref{eq:measurements} , whereas Figure \ref{subfig:results_gt2_2} visualises the monotonic energy decrease over the course of the iterations. Figure \ref{subfig:results_gt2_3} and Figure \ref{subfig:results_gt2_4} show the same results under the assumption of $\sigma = 1/500$ in \eqref{eq:measurements}.} \label{fig:sampling_results2} \end{figure} Note that $\tilde{z}$ does not satisfy the source condition \eqref{sc}, which is why we design a second function \begin{align*} z(x) := c \, \text{Re}\left( \frac{1}{\sqrt{2}} \sum_{j = 1}^n \left( \int_{\Omega} \tilde{z}(t) \, e^{-i t \xi_j} \, dt \right) e^{i x \xi_j} \right) \, , \end{align*} where $c$ is chosen to ensure $\int_{-10}^{10} z(x) \, dx = 1$, which by construction satisfies \eqref{sc}. We design two functions $z_1$ and $z_2$; $z_1$ is defined as $z_1 := z$ for $\tilde z$ with means $\mu_1 = 0, \mu_2 = -1$ and $\mu_3 = 1/2$, standard deviations $\sigma_1 = 1, \sigma_2 = 1/10$ and $\sigma_3 = 1/4$, and coefficients $c_1 = 1/10, c_2 = 3/5$ and $c_3 = 3/10$. The function $z_2 := \tilde z$ has the same means and standard deviations as $\tilde z$ in the previous example, but coefficients $c_1 = 1/10, c_2 = 2/5$ and $c_3 = 1/2$ instead. Both functions are visualised in Figure \ref{fig:sampling_ground_truth}. Subsequently we create data samples via \eqref{eq:measurements} with noise levels $\sigma = 0$ and $\sigma = 1/500$ for $z_1$, respectively $\sigma = 0$ and $\sigma = 1/50$ for $z_2$. \begin{figure}[t] \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_l1_difference_z1.eps} \caption{} \label{subfig:l1_difference_z1} \end{subfigure} \begin{subfigure}[b]{0.49\textwidth} \centering \includegraphics[width=\textwidth]{sampling_example_l1_difference_z2.eps} \caption{} \label{subfig:l1_difference_z2} \end{subfigure} \caption{The $L^1$-norm of the difference of the iterates $u^k$ and $z_1$ (Fig. \ref{subfig:l1_difference_z1}) and $z_2$, respectively (Fig. \ref{subfig:l1_difference_z2}), for the case of exact data ($\sigma = 0$). } \label{fig:sampling_l1norm} \end{figure} In the following we run the entropic projection method \eqref{entropic} for $j = 1$, $\tau = 9/(10 \sqrt{2 \pi})$ and with the initial function \begin{align*} u_0(x) := \frac{1}{20} \begin{cases} 1 & x \in [-10, 10] \\ 0 & \text{else} \end{cases} \, , \end{align*} either until the discrepancy principle \eqref{aposteriori} is violated (for $\tau = 1$) or until we reach a certain maximum number of iterations. We first investigate the algorithm for the function $z_1$ as seen in Figure \ref{subfig:sampling_gt1}, for perfect data ($\sigma = 0$) and for noisy data $\sigma = 1/500$. For perfect data we run the algorithm for 201 iterations and observe that we are converging towards $z_1$ as can be seen in Figure \ref{subfig:results_gt1_1} as well as in Figure \ref{subfig:l1_difference_z1}, which is a numerical confirmation of Proposition \ref{pro:exact_data}. For the non-trivial noise-level $\sigma = 1/500$ the algorithm stops after 65 iterations according to the discrepancy principle (Figure \ref{subfig:results_gt1_3}). To conclude, we run the same numerical experiments for $z_2$ as shown in Figure \ref{subfig:sampling_gt2}. As we mentioned earlier, \eqref{sc} is violated and even for perfect data (i.e. $\sigma = 0$) we cannot expect the results of Proposition \ref{pro:exact_data} to hold true. It can be seen in Figure \ref{subfig:results_gt2_1} that $u^k$ does not seem to converge towards $z_2$ despite a decrease of the objective to values in the order of $10^{-5}$. In fact, if we compare the $L^1$-norm of the difference $u^k - z_2$, we also see in Figure \ref{subfig:l1_difference_z2} that $u^k$ does not seem to converge towards $z_2$. For noisy data with $\sigma = 1/500$ the discrepancy principle is violated after 46 iterations, with its result being visualised in Figure \ref{subfig:results_gt2_3}. \subsection{Initial Densities for Stochastic Differential Equations} An interesting problem in several applications, e.g. in data assimilation scenarios (cf. e.g \cite{Hairer}), is the reconstruction of the initial density for a system evolving via stochastic differential equations with drift $b$ and volatility $a$. The density evolves via the Fokker-Planck equation (cf. \cite{gardiner}) \begin{equation} \partial_t \rho(x,t) + \nabla \dot (\rho(x,t) b(x,t)) = \frac{1}2 {\Delta}^{\delta}( a(x,t)^2 \rho(x,t)) \end{equation} in $\Omega \times (0,T)$ with no-flux boundary conditions. Under appropriate smoothness conditions on $a$ and $b$ as well as positivity of $a$ is is well-known that the Fokker-Planck equation has a unique nonnegative solution $ \rho \in C(0,T;L^1(\Omega))$ for nonnegative initial values $u \in L^1(\Omega)$ such that $\int_\Omega u \ln u ~dx < \infty$. In problems related to reconstructing $u$ it is hence rather natural to use methods penalizing its entropy. The forward operator $A$ maps the initial density to indirect measurements of the density $\rho$ over time, e.g. moments or local integrals. Parametrizing the measurements by values $\sigma$ in a bounded set $\sigma$ we obtain \begin{equation} A: L^1(\Omega) \rightarrow L^2((0,T) \times \Sigma ) , \qquad u \mapsto \int_\Omega k(\sigma,y) \rho(y,t)~dy . \end{equation} It is well-known that Fokker-Planck equations satisfy an $L^1$-contractivity property on the domain of the entropy functional (cf. \cite{Karlsen}) i.e. for $\rho_i$ denoting the solution with initial value \begin{equation} \Vert \rho_1(t) - \rho_2(t) \Vert_{L^1} \leq \Vert u_1 - u_2 \Vert \end{equation} for almost all $t \in (0,T)$. Thus, the map $u \mapsto \rho$ is Lipschitz continuous with unit modulus when considered as a map into $L^\infty(0,T;L^1(\Omega))$ on the domain of the entropy. Hence, if $k \in L^\infty(\Sigma \times \Omega)$ we can easily verify that the operator $A$ satisfies \eqref{condition}. We finally mention that in the case of stationary coefficients $a$ and $b$, the Fokker-Planck equation has a unique stationary solution $\rho_\infty$ among nonnegative functions with unit mass (cf. \cite{droniou}), to which it converges with exponential speed in the relative entropy (cf. \cite{Arnold1,Arnold}), i.e. the Bregman distance related to the entropy functional. Hence, it is natural to use $\rho_\infty$ as an initial value for the reconstruction of $u$, since we may expect them to be close in particular in the relative entropy. \section{Conclusions and remarks} In this study we have investigated a multiplicative entropic type method for ill-posed equations, which preserves nonnegativity of the iterates. Historically, the underlying strategy has spreading roots in the inverse problems literature: Landweber iterates, surrogate functionals and linearized Bregman, to quote a few approaches. In parallel, this has been treated in different contexts in finite dimensional optimization, e.g., as a mirror descent or as a steepest descent (linearized proximal) algorithm with generalized distances, or in machine learning - as an exponentiated gradient descent algorithm for online prediction via linear models. The closed form algorithm is shown to converge weakly in $L^1$ to a solution of the ill-posed problem and convergence rates are obtained by means of the Kullback-Leibler (KL) distance. All the results are quite naturally established when imposing "mean one" restriction to the unknown, while the case without restrictions relies on a norm combined with KL distance based Lipschitz condition, in which case operators satisfying it remain to be found. Methods of this type involving other interesting fidelity terms, nonlinear operators and eventually stochastic versions and line search strategies might be considered in more detail for future research. \section{Acknowledgements} Martin Burger acknowledges support from European Union’s Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie grant agreement No 777826 (NoMADS). Martin Benning acknowledges support from the Leverhulme Trust Early Career Fellowship ECF-2016-611 'Learning from mistakes: a supervised feedback-loop for imaging applications'.
\section*{References}} \let\emph\relax \DeclareTextFontCommand{\emph}{\bfseries\em} \usepackage{secdot} \sectiondot{section} \sectiondot{subsection} \usepackage{mdframed} \usepackage{lipsum} \usepackage{amsthm} \mdfsetup{linewidth=0.6pt} \theoremstyle{definition} \newmdtheoremenv{definition}{Definition} \theoremstyle{theorem} \newmdtheoremenv{proposition}{Proposition} \newtcolorbox[auto counter]{algorithmbox}[2][]{ breakable, before skip=20pt plus 2pt,after skip=20pt plus 2pt, colback=green!5, colframe=green!35!black, title={\bf Algorithm \thetcbcounter : #2}, #1 } \def\mathrel{\stackrel{\rm c.d.f.}=}{\mathrel{\stackrel{\rm c.d.f.}=}} \def\mathrel{\stackrel{\rm c.d.f.}\coloneqq}{\mathrel{\stackrel{\rm c.d.f.}\coloneqq}} \newcommand{\mathbb{R}}{\mathbb{R}} \newcommand{\mathbb{E}}{\mathbb{E}} \newcommand{\mathcal{T}}{\mathcal{T}} \newcommand{\mathbb{T}}{\mathbb{T}} \newcommand{\mathcal{A}}{\mathcal{A}} \newcommand{\mathcal{S}}{\mathcal{S}} \newcommand{\mathcal{P}}{\mathcal{P}} \newcommand{\varepsilon}{\varepsilon} \newcommand{\operatorname{const}}{\operatorname{const}} \newcommand{\operatorname{Loss}}{\operatorname{Loss}} \newcommand{\operatorname{done}}{\operatorname{done}} \newcommand{\operatorname{old}}{\operatorname{old}} \newcommand{\mathop{argmax}}{\mathop{argmax}} \newcommand{\mathop{argmin}}{\mathop{argmin}} \newcommand{\operatorname{KL}}{\operatorname{KL}} \interfootnotelinepenalty=10000 \begin{document} \thispagestyle{empty} \begin{center} \includegraphics[width=8cm, height=4cm]{msu.pdf} \end{center} \begin{center} Moscow State University\\ \vspace{0.1 cm} Faculty of Computational Mathematics and Cybernetics\\ \vspace{0.1 cm} Department of Mathematical Methods of Forecasting \vspace{3cm} {\bf\LARGE Modern Deep Reinforcement Learning Algorithms}\\ \vspace{0.5cm} \vspace{0.5cm} {\bf Written by:}\\ Sergey Ivanov \\ \texttt{<EMAIL>} \vspace{0.5cm} {\bf Scientific advisor:}\\ Alexander D'yakonov \\ \texttt{<EMAIL>} \end{center} \vspace{11cm} \centerline {Moscow, 2019} \newpage \tableofcontents \newpage \begin{abstract} Recent advances in Reinforcement Learning, grounded on combining classical theoretical results with Deep Learning paradigm, led to breakthroughs in many artificial intelligence tasks and gave birth to Deep Reinforcement Learning (DRL) as a field of research. In this work latest DRL algorithms are reviewed with a focus on their theoretical justification, practical limitations and observed empirical properties. \end{abstract} \mathversion{bold} \newpage \section{Introduction} During the last several years Deep Reinforcement Learning proved to be a fruitful approach to many artificial intelligence tasks of diverse domains. Breakthrough achievements include reaching human-level performance in such complex games as Go \citep{silver2017mastering}, multiplayer Dota \citep{OpenAI_dota} and real-time strategy StarCraft II \citep{alphastarblog}. The generality of DRL framework allows its application in both discrete and continuous domains to solve tasks in robotics and simulated environments \citep{lillicrap2015continuous}. Reinforcement Learning (RL) is usually viewed as general formalization of decision-making task and is deeply connected to dynamic programming, optimal control and game theory. \citep{sutton2018reinforcement} Yet its problem setting makes almost no assumptions about world model or its structure and usually supposes that environment is given to agent in a form of black-box. This allows to apply RL practically in all settings and forces designed algorithms to be adaptive to many kinds of challenges. Latest RL algorithms are usually reported to be transferable from one task to another with no task-specific changes and little to no hyperparameters tuning. As an object of desire is a strategy, i.~e.~ a function mapping agent's observations to possible actions, reinforcement learning is considered to be a subfiled of machine learning. But instead of learning from data, as it is established in classical supervised and unsupervised learning problems, the agent learns from experience of interacting with environment. Being more "natural" model of learning, this setting causes new challenges, peculiar only to reinforcement learning, such as necessity of exploration integration and the problem of delayed and sparse rewards. The full setup and essential notation are introduced in section \ref{RLproblem}. Classical Reinforcement Learning research in the last third of previous century developed an extensive theoretical core for modern algorithms to ground on. Several algorithms are known ever since and are able to solve small-scale problems when either environment states can be enumerated (and stored in the memory) or optimal policy can be searched in the space of linear or quadratic functions of state representation features. Although these restrictions are extremely limiting, foundations of classical RL theory underlie modern approaches. These theoretical fundamentals are discussed in sections \ref{TD} and \ref{pgt}--\ref{reinforce_section}. Combining this framework with Deep Learning \citep{goodfellow2016deep} was popularized by Deep Q-Learning algorithm, introduced in \citep{mnih2013playing}, which was able to play any of 57 Atari console games without tweaking network architecture or algorithm hyperparameters. This novel approach was extensively researched and significantly improved in the following years. The principles of value-based direction in deep reinforcement learning are presented in section \ref{valuebasedDRL}. One of the key ideas in the recent value-based DRL research is distributional approach, proposed in \citep{bellemare2017distributional}. Further extending classical theoretical foundations and coming with practical DRL algorithms, it gave birth to distributional reinforcement learning paradigm, which potential is now being actively investigated. Its ideas are described in section \ref{distributionalRL}. Second main direction of DRL research is policy gradient methods, which attempt to directly optimize the objective function, explicitly present in the problem setup. Their application to neural networks involve a series of particular obstacles, which requested specialized optimization techniques. Today they represent a competitive and scalable approach in deep reinforcement learning due to their enormous parallelization potential and continuous domain applicability. Policy gradient methods are discussed in section \ref{policygradient}. Despite the wide range of successes, current state-of-art DRL methods still face a number of significant drawbacks. As training of neural networks requires huge amounts of data, DRL demonstrates unsatisfying results in settings where data generation is expensive. Even in cases where interaction is nearly free (e.~g. in simulated environments), DRL algorithms tend to require excessive amounts of iterations, which raise their computational and wall-clock time cost. Furthermore, DRL suffers from random initialization and hyperparameters sensitivity, and its optimization process is known to be uncomfortably unstable \citep{irpan2018deep}. Especially embarrassing consequence of these DRL features turned out to be low reproducibility of empirical observations from different research groups \citep{henderson2018deep}. In section \ref{experiments}, we attempt to launch state-of-art DRL algorithms on several standard testbed environments and discuss practical nuances of their application. \newpage \section{Reinforcement Learning problem setup}\label{RLproblem} \subsection{Assumptions of RL setting} Informally, the process of sequential decision-making proceeds as follows. The \emph{agent} is provided with some initial observation of environment and is required to choose some action from the given set of possibilities. The \emph{environment} responds by transitioning to another state and generating a \emph{reward signal} (scalar number), which is considered to be a ground-truth estimation of agent's performance. The process continues repeatedly with agent making choices of actions from observations and environment responding with next states and reward signals. The only goal of agent is to maximize the cumulative reward. This description of learning process model already introduces several key assumptions. Firstly, the time space is considered to be discrete, as agent interacts with environment sequentially. Secondly, it is assumed that provided environment incorporates some reward function as supervised indicator of success. This is an embodiment of the \emph{reward hypothesis}, also referred to as \emph{Reinforcement Learning hypothesis}: \begin{proposition} \textbf{(Reward Hypothesis)} \citep{sutton2018reinforcement}\\ <<All of what we mean by goals and purposes can be well thought of as maximization of the expected value of the cumulative sum of a received scalar signal (reward).>> \end{proposition} Exploitation of this hypothesis draws a line between reinforcement learning and classical machine learning settings, supervised and unsupervised learning. Unlike unsupervised learning, RL assumes supervision, which, similar to labels in data for supervised learning, has a stochastic nature and represents a key source of knowledge. At the same time, no data or <<right answer>> is provided to training procedure, which distinguishes RL from standard supervised learning. Moreover, RL is the only machine learning task providing explicit objective function (cumulative reward signal) to maximize, while in supervised and unsupervised setting optimized loss function is usually constructed by engineer and is not <<included>> in data. The fact that reward signal is incorporated in the environment is considered to be one of the weakest points of RL paradigm, as for many real-life human goals introduction of this scalar reward signal is at the very least unobvious. For practical applications it is also natural to assume that agent's observations can be represented by some feature vectors, i.~e. elements of $\mathbb{R}^d$. The set of possible actions in most practical applications is usually uncomplicated and is either discrete (number of possible actions is finite) or can be represented as subset of $\mathbb{R}^m$ (almost always $[-1, 1]^m$ or can be reduced to this case)\footnote{this set is considered to be permanent for all states of environment without any loss of generality as if agent chooses invalid action the world may remain in the same state with zero or negative reward signal or stochastically select some valid action for him.}. RL algorithms are usually restricted to these two cases, but the mix of two (agent is required to choose both discrete and continuous quantities) can also be considered. The final assumption of RL paradigm is a \emph{Markovian property}: \begin{proposition} \textbf{(Markovian property)} \\ Transitions depend solely on previous state and the last chosen action and are independent of all previous interaction history. \end{proposition} Although this assumption may seem overly strong, it actually formalizes the fact that the world modeled by considered environment obeys some general laws. Giving that the agent knows the current state of the world and the laws, it is assumed that it is able to predict the consequences of his actions up to the internal stochasticity of these laws. In practice, both laws and complete state representation is unavailable to agent, which limits its forecasting capability. In the sequel we will work within the setting with one more assumption of \emph{full observability}. This simplification supposes that agent can observe complete world state, while in many real-life tasks only a part of observations is actually available. This restriction of RL theory can be removed by considering \emph{Partially observable Markov Decision Processes (PoMDP)}, which basically forces learning algorithms to have some kind of memory mechanism to store previously received observations. Further on we will stick to fully observable case. \subsection{Environment model} Though the definition of \emph{Markov Decision Process (MDP)} varies from source to source, its essential meaning remains the same. The definition below utilizes several simplifications without loss of generality.\footnote{the reward function is often introduced as stochastic and dependent on action $a$, i.~e.~ $R(r \mid s, a) \colon \mathcal{S} \times \mathcal{A} \to \mathcal{P}(\mathbb{R})$, while instead of fixed $s_0$ a distribution over $\mathcal{S}$ is given. Both extensions can be taken into account in terms of presented definition by extending the state space and incorporating all the uncertainty into transition probability $\mathbb{T}$.} \begin{definition} \emph{Markov Decision Process} (MDP) is a tuple $(\mathcal{S}, \mathcal{A}, \mathbb{T}, r, s_0)$, where: \begin{itemize} \item $\mathcal{S} \subseteq \mathbb{R}^d$ --- arbitrary set, called the \emph{state space}. \item $\mathcal{A}$ --- a set, called the \emph{action space}, either \begin{itemize} \item \emph{discrete}: $|\mathcal{A}| < +\infty$, or \item \emph{continuous domain}: $\mathcal{A} = [-1, 1]^m$. \end{itemize} \item $\mathbb{T}$ --- \emph{transition probability} $p(s' \mid s, a)$, where $s, s' \in \mathcal{S}, a \in \mathcal{A}$. \item $r: \mathcal{S} \to \mathbb{R}$ --- \emph{reward function}. \item $s_0 \in \mathcal{S}$ --- starting state. \end{itemize} \end{definition} It is important to notice that in the most general case the only things available for RL algorithm beforehand are $d$ (dimension of state space) and action space $\mathcal{A}$. The only possible way of collecting more information for agent is to interact with provided environment and observe $s_0$. It is obvious that the first choice of action $a_0$ will be probably random. While the environment responds by sampling $s_1 \sim p(s_1 \mid s_0, a_0)$, this distribution, defined in $\mathbb{T}$ and considered to be a part of MDP, may be unavailable to agent's learning procedure. What agent does observe is $s_1$ and reward signal $r_1 \coloneqq r(s_1)$ and it is the key information gathered by agent from interaction experience. \begin{definition} The tuple $\left( s_t, a_t, r_{t+1}, s_{t+1} \right)$ is called \emph{transition}. Several sequential transitions are usually referred to as \emph{roll-out}. Full track of observed quantities $$s_0, a_0, r_1, s_1, a_1, r_2, s_2, a_2, r_3, s_3, a_3 \dots$$ is called a \emph{trajectory}. \end{definition} In general case, the trajectory is infinite which means that the interaction process is neverending. However, in most practical cases the \emph{episodic property} holds, which basically means that the interaction will eventually come to some sort of an end\footnote{natural examples include the end of the game or agent's failure/success in completing some task.}. Formally, it can be simulated by the environment stucking in the last state with zero probability of transitioning to any other state and zero reward signal. Then it is convenient to reset the environment back to $s_0$ to initiate new interaction. One such interaction cycle from $s_0$ till reset, spawning one trajectory of some finite length $T$, is called an \emph{episode}. Without loss of generality, it can be considered that there exists a set of \emph{terminal states} $\mathcal{S}^+$, which mark the ends of interactions. By convention, transitions $(s_t, a_t, r_{t+1}, s_{t+1})$ are accompanied with binary flag $\operatorname{done}_{t+1} \in \{0, 1\}$, whether $s_{t+1}$ belongs to $\mathcal{S}^+$. As timestep $t$ at which the transition was gathered is usually of no importance, transitions are often denoted as $(s, a, r', s', \operatorname{done})$ with primes marking the <<next timestep>>. Note that the length of episode $T$ may vary between different interactions, but the episodic property holds if interaction is guaranteed to end after some finite time $T^{\max}$. If this is not the case, the task is called \emph{continuing}. \subsection{Objective} In reinforcement learning, the agent's goal is to maximize a cumulative reward. In episodic case, this reward can be expressed as a summation of all received reward signals during one episode and is called \emph{the return}: \begin{equation}\label{return} R \coloneqq \sum_{t=1}^T r_t \end{equation} Note that this quantity is formally a random variable, which depends on agent's choices and the outcomes of environment transitions. As this stochasticity is an inevitable part of interaction process, the underlying distribution from which $r_t$ is sampled must be properly introduced to set rigorously the task of return maximization. \begin{definition} Agent's algorithm for choosing $a$ by given current state $s$, which in general can be viewed as distribution $\pi(a \mid s)$ on domain $\mathcal{A}$, is called a \emph{policy} (strategy). \end{definition} \emph{Deterministic policy}, when the policy is represented by deterministic function $\pi \colon \mathcal{S} \to \mathcal{A}$, can be viewed as a particular case of \emph{stochastic policy} with degenerated policy $\pi(a \mid s)$, when agent's output is still a distribution with zero probability to choose an action other than $\pi(s)$. In both cases it is considered that agent sends to environment a sample $a \sim \pi(a \mid s)$. Note that given some policy $\pi(a \mid s)$ and transition probabilities $\mathbb{T}$, the complete interaction process becomes defined from probabilistic point of view: \begin{definition} For given MDP and policy $\pi$, the probability of observing $$s_0, a_0, s_1, a_1, s_2, a_2 \dots$$ is called \emph{trajectory distribution} and is denoted as $\mathcal{T}_{\pi}$: $$\mathcal{T}_{\pi} \coloneqq \prod_{t=0} p(s_{t+1} \mid s_t, a_t)\pi(a_t \mid s_t)$$ \end{definition} It is always substantial to keep track of what policy was used to collect certain transitions (roll-outs and episodes) during the learning procedure, as they are essentially samples from corresponding trajectory distribution. If the policy is modified in any way, the trajectory distribution changes either. Now when a policy induces a trajectory distribution, it is possible to formulate a task of \emph{expected reward} maximization: $$\mathbb{E}_{\mathcal{T}_{\pi}} \sum_{t=1}^T r_t \to \max_{\pi}$$ To ensure the finiteness of this expectation and avoid the case when agent is allowed to gather infinite reward, limit on absolute value of $r_t$ can be assumed: $$|r_t| \le R^{\max}$$ Together with the limit on episode length $T^{\max}$ this restriction guarantees finiteness of optimal (maximal) expected reward. To extend this intuition to continuing tasks, the reward for each next interaction step is multiplied on some discount coefficient $\gamma \in [0,1)$, which is often introduced as part of MDP. This corresponds to the logic that with probability $1 - \gamma$ agent <<dies>> and does not gain any additional reward, which models the paradigm <<better now than later>>. In practice, this discount factor is set very close to 1. \begin{definition} For given MDP and policy $\pi$ the \emph{discounted expected reward} is defined as $$J(\pi) \coloneqq \mathbb{E}_{\mathcal{T}_{\pi}} \sum_{t=0} \gamma^t r_{t+1}$$ \end{definition} Reinforcement learning task is to find an \emph{optimal policy} $\pi^*$, which maximizes the discounted expected reward: \begin{equation}\label{RLgoal} J(\pi) \to \max_{\pi} \end{equation} \subsection{Value functions} Solving reinforcement learning task (\ref{RLgoal}) usually leads to a policy, that maximizes the expected reward not only for starting state $s_0$, but for any state $s \in \mathcal{S}$. This follows from the Markov property: the reward which is yet to be collected from some step $t$ does not depend on previous history and for agent staying at state $s$ the task of behaving optimal is equivalent to maximization of expected reward with current state $s$ as a starting state. This is the particular reason why many reinforcement learning algorithms do not seek only optimal policy, but additional information about usefulness of each state. \begin{definition} For given MDP and policy $\pi$ the \emph{value function under policy $\pi$} is defined as $$V^\pi(s) \coloneqq \mathbb{E}_{\mathcal{T}_{\pi} \mid s_0 = s} \sum_{t=0} \gamma^t r_{t+1}$$ \end{definition} This value function estimates how good it is for agent utilizing strategy $\pi$ to visit state $s$ and generalizes the notion of discounted expected reward $J(\pi)$ that corresponds to $V^{\pi}(s_0)$. As value function can be induced by any policy, value function $V^{\pi^*}(s)$ under optimal policy $\pi^*$ can also be considered. By convention\footnote{though optimal policy may not be unique, the value functions under any optimal policy that behaves optimally from any given state (not only $s_0$) coincide. Yet, optimal policy may not know optimal behaviour for some states if it knows how to avoid them with probability 1.}, it is denoted as $V^*(s)$ and is called an \emph{optimal value function}. Obtaining optimal value function $V^*(s)$ doesn't provide enough information to reconstruct some optimal policy $\pi^*$ due to unknown world dynamics, i.~e. transition probabilities. In other words, being blind to what state $s$ may be the environment's response on certain action in a given state makes knowing optimal value function unhelpful. This intuition suggests to introduce a similar notion comprising more information: \begin{definition} For given MDP and policy $\pi$ the \emph{quality function (Q-function) under policy $\pi$} is defined as $$Q^\pi(s, a) \coloneqq \mathbb{E}_{\mathcal{T}_{\pi} \mid s_0 = s, a_0 = a} \sum_{t=0} \gamma^t r_{t+1}$$ \end{definition} It directly follows from the definitions that these two functions are deeply interconnected: \begin{equation}\label{QV} Q^\pi(s, a) = \mathbb{E}_{s' \sim p(s' \mid s, a)} \left[ r(s') + \gamma V^\pi(s') \right] \end{equation} \begin{equation}\label{VQ} V^\pi(s) = \mathbb{E}_{a \sim \pi(a \mid s)} Q^\pi(s, a) \end{equation} The notion of \emph{optimal Q-function} $Q^{*}(s, a)$ can be introduced analogically. But, unlike value function, obtaining $Q^{*}(s, a)$ actually means solving a reinforcement learning task: indeed, \begin{proposition}\label{piQ} If $Q^*(s, a)$ is a quality function under some optimal policy, then $$\pi^*(s) = \mathop{argmax}_a Q^*(s, a)$$ is an optimal policy. \end{proposition} This result implies that instead of searching for optimal policy $\pi^*$, an agent can search for optimal Q-function and derive the policy from it. \begin{proposition} For any MDP existence of optimal policy leads to existence of deterministic optimal policy. \end{proposition} \subsection{Classes of algorithms} Reinforcement learning algorithms are presented in a form of computational procedures specifying a strategy of collecting interaction experience and obtaining a policy with as higher $J(\pi)$ as possible. They rarely include a stopping criterion like in classic optimization methods as the stochasticity of given setting prevents any reasonable verification of optimality; usually the number of iterations to perform is determined by the amount of computational resources. All reinforcement learning algorithms can be roughly divided into four\footnote{in many sources evolutionary algorithms are bypassed in discussion as they do not utilize the structure of RL task in any way.} classes: \begin{itemize} \item \emph{meta-heuristics}: this class of algorithms treats the task as black-box optimization with zeroth-order oracle. They usually generate a set of policies $\pi_1 \dots \pi_P$ and launch several episodes of interaction for each to determine best and worst policies according to average return. After that they try to construct more optimal policies using evolutionary or advanced random search techniques \citep{salimans2017evolution}. \item \emph{policy gradient}: these algorithms directly optimize (\ref{RLgoal}), trying to obtain $\pi^*$ and no additional information about MDP, using approximate estimations of gradient with respect to policy parameters. They consider RL task as an optimization with stochastic first-order oracle and make use of interaction structure to lower the variance of gradient estimations. They will be discussed in sec. \ref{policygradient}. \item \emph{value-based} algorithms construct optimal policy implicitly by gaining an approximation of optimal Q-function $Q^*(s, a)$ using dynamic programming. In DRL, Q-function is represented with neural network and an approximate dynamic programming is performed using reduction to supervised learning. This framework will be discussed in sec. \ref{valuebasedDRL} and \ref{distributionalRL}. \item \emph{model-based} algorithms exploit learned or given world dynamics, i.~e.~ distributions $p(s' \mid s, a)$ from $\mathbb{T}$. The class of algorithms to work with when the model is explicitly provided is represented by such algorithms as Monte-Carlo Tree Search; if not, it is possible to imitate the world dynamics by learning the outputs of black box from interaction experience \citep{kaiser2019model}. \end{itemize} \subsection{Measurements of performance} Achieved performance (\emph{score}) from the point of average cumulative reward is not the only one measure of RL algorithm quality. When speaking of real-life robots, the required number of simulated episodes is always the biggest concern. It is usually measured in terms of interaction steps (where step is one transition performed by environment) and is referred to as \emph{sample efficiency}. When the simulation is more or less cheap, RL algorithms can be viewed as a special kind of optimization procedures. In this case, the final performance of the found policy is opposed to required computational resources, measured by \emph{wall-clock time}. In most cases RL algorithms can be expected to find better policy after more iterations, but the amount of these iterations tend to be unjustified. The ratio between amount of interactions and required wall-clock time for one update of policy varies significantly for different algorithms. It is well-known that model-based algorithms tend to have the greatest sample-efficiency at the cost of expensive update iterations, while evolutionary algorithms require excessive amounts of interactions while providing massive resources for parallelization and reduction of wall-clock time. Value-based and policy gradient algorithms, which will be the focus of our further discussion, are known to lie somewhere in between. \newpage \section{Value-based algorithms}\label{valuebasedDRL} \subsection{Temporal Difference learning}\label{TD} In this section we consider temporal difference learning algorithm \citep[Chapter~6]{sutton2018reinforcement}, which is a classical Reinforcement Learning method in the base of modern value-based approach in DRL. The first idea behind this algorithm is to search for optimal Q-function $Q^*(s, a)$ by solving a system of recursive equations which can be derived by recalling interconnection between Q-function and value function (\ref{QV}): \begin{align*} Q^\pi(s, a) &= \mathbb{E}_{s' \sim p(s' \mid s, a)} \left[ r(s') + \gamma V^\pi(s') \right] = \\ = \{ \text{using (\ref{VQ})} \} &= \mathbb{E}_{s' \sim p(s' \mid s, a)} \left[ r(s') + \gamma \mathbb{E}_{a' \sim \pi(a' \mid s')} Q^\pi(s', a') \right] \end{align*} This equation, named \emph{Bellman equation}, remains true for value functions under any policies including optimal policy $\pi^*$: \begin{equation}\label{QQ} Q^*(s, a) = \mathbb{E}_{s' \sim p(s' \mid s, a)} \left[ r(s') + \gamma \mathbb{E}_{a' \sim \pi(a' \mid s')} Q^*(s', a') \right] \end{equation} Recalling proposition \ref{piQ}, optimal (deterministic) policy can be represented as $\pi^*(s) = \mathop{argmax}\limits_a \allowbreak Q^*(s, a)$. Substituting this for $\pi^*(s)$ in (\ref{QQ}), we obtain fundamental \emph{Bellman optimality equation}: \begin{proposition} \textbf{(Bellman optimality equation)} \begin{equation}\label{Bellman} Q^*(s, a) = \mathbb{E}_{s' \sim p(s' \mid s, a)} \left[ r(s') + \gamma \max_{a'} Q^*(s', a') \right] \end{equation} \end{proposition} The straightforward utilization of this result is as follows. Consider the \emph{tabular case}, when both state space $\mathcal{S}$ and action space $\mathcal{A}$ are finite (and small enough to be listed in computer memory). Let us also assume for now that transition probabilities are available to training procedure. Then $Q^*(s, a): \mathcal{S} \times \mathcal{A} \to \mathbb{R}$ can be represented as a finite table with $|\mathcal{S}| |\mathcal{A}|$ numbers. In this case (\ref{Bellman}) just gives a set of $|\mathcal{S}| |\mathcal{A}|$ equations for this table to satisfy. Addressing the values of the table as unknown variables, this system of equations can be solved using basic \emph{point iteration} method: let $Q^*_0(s, a)$ be initial arbitrary values of table (with the only exception that for terminal states $s \in \mathcal{S}^+$, if any, $Q^*_0(s, a) = 0$ for all actions $a$). On each iteration $t$ the table is updated by substituting current values of the table to the right side of equation until the process converges: \begin{equation}\label{bellmanupdate} Q^*_{t+1}(s, a) = \mathbb{E}_{s' \sim p(s' \mid s, a)} \left[ r(s') + \gamma \max_{a'} Q^*_{t}(s', a') \right] \end{equation} This straightforward approach of learning the optimal Q-function, named \emph{Q-learning}, has been extensively studied in classical Reinforcement Learning. One of the central results is presented in the following convergence theorem: \begin{proposition}\label{BasicQlearningConvergence} Let by $\mathcal{B}$ denote an operator $(\mathcal{S} \times \mathcal{A} \to \mathbb{R}) \to (\mathcal{S} \times \mathcal{A} \to \mathbb{R})$, updating $Q^*_t$ as in (\ref{bellmanupdate}): $$Q^*_{t+1} = \mathcal{B}Q^*_t$$ for all state-action pairs $s, a$. Then $\mathcal{B}$ is a \emph{contraction mapping}, i.~.e. for any two tables $Q_1, Q_2 \in (\mathcal{S} \times \mathcal{A} \to \mathbb{R})$ $$\|\mathcal{B}Q_1 - \mathcal{B}Q_2\|_{\infty} \le \gamma \|Q_1 - Q_2\|_{\infty}$$ Therefore, there is a unique fixed point of the system of equations (\ref{bellmanupdate}) and the point iteration method converges to it. \end{proposition} The contraction mapping property is actually of high importance. It demonstrates that the point iteration algorithm converges with exponential speed and requires small amount of iterations. As the true $Q^*$ is a fixed point of (\ref{Bellman}), the algorithm is guaranteed to yield a correct answer. The trick is that each iteration demands full pass across all state-action pairs and exact computation of expectations over transition probabilities. In general case, these expectations can't be explicitly computed. Instead, agent is restricted to samples from transition probabilities gained during some interaction experience. \emph{Temporal Difference} (TD)\footnote{also known as TD(0) due to theoretical generalizations} algorithm proposes to collect this data using $\pi_t = \mathop{argmax}\limits_a Q_t^*(s, a) \approx \pi^*$ and after each gathered transition $(s_t, a_t, r_{t+1}, s_{t+1})$ update only one cell of the table: \begin{equation}\label{Qlearningupdate} Q^*_{t+1}(s, a) = \begin{cases} (1 - \alpha_t)Q^*_{t}(s, a) + \alpha_t\left[ r_{t+1} + \gamma \max\limits_{a'} Q^*_{t}(s_{t+1}, a') \right] \quad &\text{if\,} s = s_t, a = a_t \\ Q^*_t(s, a) \quad &\text{else} \end{cases} \end{equation} where $\alpha_t \in (0, 1)$ plays the role of exponential smoothing parameter for estimating expectation $\mathbb{E}_{s' \sim p(s' \mid s_t, a_t)} ( \cdot )$ from samples. Two key ideas are introduced in the update formula (\ref{Qlearningupdate}): exponential smoothing instead of exact expectation computation and cell by cell updates instead of updating full table at once. Both are required to settle Q-learning algorithm for online application. As the set $\mathcal{S}^+$ of terminal states in online setting is usually unknown beforehand, a slight modification of update (\ref{Qlearningupdate}) is used. If observed next state $s'$ turns out to be terminal (recall the convention to denote this by flag $\operatorname{done}$), its value function is known to be equal to zero: $$V^*(s') = \max\limits_{a'} Q^*(s', a') = 0$$ This knowledge is embedded in the update rule (\ref{Qlearningupdate}) by multiplying $\max\limits_{a'} Q^*_{t}(s_{t+1}, a')$ on $(1 - \operatorname{done}_{t+1})$. For the sake of shortness, this factor is often omitted but should be always present in implementations. Second important note about formula (\ref{Qlearningupdate}) is that it can be rewritten in the following equivalent way: \begin{equation}\label{Qlearningupdate2} Q^*_{t+1}(s, a) = \begin{cases} Q^*_{t}(s, a) + \alpha_t\left[ r_{t+1} + \gamma \max\limits_{a'} Q^*_{t}(s_{t+1}, a') - Q^*_{t}(s, a) \right] \quad &\text{if\,} s = s_t, a = a_t \\ Q^*_t(s, a) \quad &\text{else} \end{cases} \end{equation} The expression in the brackets, referred to as \emph{temporal difference}, represents a difference between Q-value $Q^*_{t}(s, a)$ and its one-step approximation $r_{t+1} + \gamma \max\limits_{a'} Q^*_{t}(s_{t+1}, a')$, which must be zero in expectation for true optimal Q-function. The idea of exponential smoothing allows us to formulate first practical algorithm which can work in the tabular case with unknown world dynamics: \begin{algorithmbox}[label = TDalgorithm]{Temporal Difference algorithm} \textbf{Hyperparameters:} $\alpha_t \in (0, 1)$ \vspace{0.3cm} Initialize $Q^*(s, a)$ arbitrary \\ \textbf{On each interaction step:} \begin{enumerate} \item select $a = \mathop{argmax}\limits_a Q^*(s, a)$ \item observe transition $(s, a, r', s', \operatorname{done})$ \item update table: $$Q^*(s, a) \gets Q^*(s, a) + \alpha_t\left[ r' + (1 - \operatorname{done})\gamma \max_{a'} Q^*(s', a') - Q^*(s, a)\right]$$ \end{enumerate} \end{algorithmbox} It turns out that under several assumptions on state visitation during interaction process this procedure holds similar properties in terms of convergence guarantees, which are stated by the following theorem: \begin{proposition}\label{TDconvergence} \citep{watkins1992q} Let's define $$e_t(s, a) = \begin{cases} \alpha_t \quad (s, a) \, \text{is updated on step } t \\ 0 \quad \text{otherwise} \end{cases}$$ Then if for every state-action pair $(s, a)$ $$\sum_t^{+\infty} e_t(s, a) = \infty \quad \sum_t^{+\infty} e_t(s, a)^2 < \infty$$ the algorithm \ref{TDalgorithm} converges to optimal $Q^*$ with probability 1. \end{proposition} This theorem states that basic policy iteration method can be actually applied online in the way proposed by TD algorithm, but demands <<enough exploration>> from the strategy of interacting with MDP during training. Satisfying this demand remains a unique and common problem of reinforcement learning. The widespread kludge is \emph{$\varepsilon$-greedy strategy} which basically suggests to choose random action instead of $a = \mathop{argmax}\limits_a Q^*(s, a)$ with probability $\varepsilon_t$. The probability $\varepsilon_t$ is usually set close to 1 during first interaction iterations and scheduled to decrease to a constant close to 0. This heuristic makes agent visit all states with non-zero probabilities independent of what current approximation $Q^*(s, a)$ suggests. The main practical issue with Temporal Difference algorithm is that it requires table $Q^*(s,a)$ to be explicitly stored in memory, which is impossible for MDP with high state space complexity. This limitation substantially restricted its applicability until its combination with deep neural network was proposed. \subsection{Deep Q-learning (DQN)}\label{DQN} Utilization of neural nets to model either a policy or a Q-function frees from constructing task-specific features and opens possibilities of applying RL algorithms to complex tasks, e.~g. tasks with images as input. Video games are classical example of such tasks where raw pixels of screen are provided as state representation and, correspondingly, as input to either policy or Q-function. Main idea of Deep Q-learning \cite{mnih2013playing} is to adapt Temporal Difference algorithm so that update formula (\ref{Qlearningupdate2}) would be equivalent to gradient descent step for training a neural network to solve a certain regression task. Indeed, it can be noticed that the exponential smoothing parameter $\alpha_t$ resembles learning rate of first-order gradient optimization procedures, while the exploration conditions from theorem \ref{TDconvergence} look identical to restrictions on learning rate of stochastic gradient descent. The key hint is that (\ref{Qlearningupdate2}) is actually a gradient descent step in the parameter space of the table functions family: $$Q^*(s, a, \theta) = \theta^{s, a}$$ where all $\theta^{s, a}$ form a vector of parameters $\theta \in \mathbb{R}^{|\mathcal{S}| |\mathcal{A}|}$. To unravel this fact, it is convenient to introduce some notation from regression tasks. First, let's denote by $y$ the \emph{target} of our regression task, i.~e. the quantity that our model is trying to predict: \begin{equation}\label{target} y(s, a) \coloneqq r(s') + \gamma \max\limits_{a'} Q^*(s', a', \theta) \end{equation} where $s'$ is a sample from $p(s' \mid s, a)$ and $s, a$ is input data. In this notation (\ref{Qlearningupdate2}) is equivalent to: $$\theta_{t+1} = \theta_t + \alpha_t\left[ y(s, a) - Q^*(s, a, \theta_t) \right]e^{s, a}$$ where we multiplied scalar value $\alpha_t\left[ y(s, a) - Q^*(s, a, \theta_t) \right]$ on the following vector $e^{s, a}$ \begin{equation*} e^{s, a}_{i, j} \coloneqq \begin{cases} 1 \qquad (i, j) = (s, a) \\ 0 \qquad (i, j) \ne (s, a) \end{cases} \end{equation*} to formulate an update of only one component of $\theta$ in a vector form. By this we transitioned to update in parameter space using $Q^*(s, a, \theta) = \theta^{s, a}$. Remark that for table functions family the derivative of $Q^*(s, a, \theta)$ by $\theta$ for given input $s, a$ is its one-hot encoding, i.~e. exactly $e^{s, a}$: \begin{equation}\label{tableQfuncgrad} \frac{\partial Q^* (s, a, \theta)}{\partial \theta} = e^{s, a} \end{equation} The statement now is that this formula is a gradient descent update for regression with input $s, a$, target $y(s, a)$ and MSE loss function: \begin{equation}\label{mse} \operatorname{Loss}(y(s, a), Q^*(s, a, \theta_t)) = \left( Q^*(s, a, \theta_t) - y(s, a) \right) ^2 \end{equation} Indeed: \begin{align*} \theta_{t+1} &= \theta_t + \alpha_t\left[ y(s, a) - Q^*(s, a, \theta_t) \right]e^{s, a} = \\ \{ \text{(\ref{mse})} \} &= \theta_t - \alpha_t \frac{\partial \operatorname{Loss}(y, Q^*(s, a, \theta_t))}{\partial Q^*} e^{s, a} \\ \{ \text{(\ref{tableQfuncgrad})} \} &= \theta_t - \alpha_t \frac{\partial \operatorname{Loss}(y, Q^*(s, a, \theta_t))}{\partial Q^*} \frac{\partial Q^* (s, a, \theta_t)}{\partial \theta} = \\ \{ \text{chain rule} \}&= \theta_t - \alpha_t \frac{\partial \operatorname{Loss}(y, Q^*(s, a, \theta_t))}{\partial \theta} \end{align*} The obtained result is evidently a gradient descent step formula to minimize MSE loss function with target (\ref{target}): \begin{equation}\label{DQNupdate} \theta_{t+1} = \theta_t - \alpha_t \frac{\partial \operatorname{Loss}(y, Q^*(s, a, \theta_t))}{\partial \theta} \end{equation} It is important that dependence of $y$ from $\theta$ is ignored during gradient computation (otherwise the chain rule application with $y$ being dependent on $\theta$ is incorrect). On each step of temporal difference algorithm new target $y$ is constructed using current Q-function approximation, and a new regression task with this target is set. For this fixed target one MSE optimization step is done according to (\ref{DQNupdate}), and on the next step a new regression task is defined. Though during each step the target is considered to represent some ground truth like it is in supervised learning, here it provides a direction of optimization and because of this reason is sometimes called a \emph{guess}. Notice that representation (\ref{DQNupdate}) is equivalent to standard TD update (\ref{Qlearningupdate2}) with all theoretical results remaining while the parametric family $Q(s, a, \theta)$ is a table functions family. At the same time, (\ref{DQNupdate}) can be formally applied to any parametric function family including neural networks. It must be taken into account that this transition is not rigorous and all theoretical guarantees provided by theorem \ref{TDconvergence} are lost at this moment. Further on we assume that optimal Q-function is approximated with neural network $Q^*_{\theta}(s, a)$ with parameters $\theta$. Note that for discrete action space case this network may take only $s$ as input and output $|\mathcal{A}|$ numbers representing $Q^*_{\theta}(s, a_1) \dots Q^*_{\theta}(s, a_{|\mathcal{A}|})$, which allows to find an optimal action in a given state $s$ with a single forward pass through the net. Therefore target $y$ for given transition $(s, a, r', s', \operatorname{done})$ can be computed with one forward pass and optimization step can be performed in one more forward\footnote{in implementations it is possible to combine $s$ and $s'$ in one batch and perform these two forward passes <<at once>>.} and one backward pass. Small issue with this straightforward approach is that, of course, it is impractical to train neural networks with batches of size 1. In \citep{mnih2013playing} it is proposed to use \emph{experience replay} to store all collected transitions $(s, a, r', s', \operatorname{done})$ as data samples and on each iteration sample a batch of standard for neural networks training size. As usual, the loss function is assumed to be an average of losses for each transition from the batch. This utilization of previously experienced transitions is legit because TD algorithm is known to be an \emph{off-policy} algorithm, which means it can work with arbitrary transitions gathered by any agent's interaction experience. One more important benefit from experience replay is \emph{sample decorrelation} as consecutive transitions from interaction are often similar to each other since agent usually locates at the particular part of MDP. Though empirical results of described algorithm turned out to be promising, the behaviour of $Q^*_{\theta}$ values indicated the instability of learning process. Reconstruction of target after each optimization step led to so-called \emph{compound error} when approximation error propagated from the close-to-terminal states to the starting in avalanche manner and could lead to guess being $10^6$ and more times bigger than the true $Q^*$ value. To address this problem, \citep{mnih2013playing} introduced a kludge known as \emph{target network}, which basic idea is to solve fixed regression problem for $K > 1$ steps, i.~.e. recompute target every $K$-th step instead of each. To avoid target recomputation for the whole experience replay, the copy of neural network $Q^*_{\theta}$ is stored, called the target network. Its architecture is the same while weights $\theta^{-}$ are a copy of $Q^*_{\theta}$ from the moment of last target recomputation\footnote{alternative, but more computationally expensive option, is to update target network weights on each step using exponential smoothing} and its main purpose is to generate targets $y$ for given current batch. Combining all things together and adding $\varepsilon$-greedy strategy to facilitate exploration, we obtain classic DQN algorithm: \begin{algorithmbox}[label = DQNalgorithm]{Deep Q-learning (DQN)} \textbf{Hyperparameters:} $B$ --- batch size, $K$ --- target network update frequency, $\varepsilon(t) \in (0, 1]$ --- greedy exploration parameter, $Q^*_\theta$ --- neural network, SGD optimizer. \vspace{0.3cm} Initialize weights of $\theta$ arbitrary \\ Initialize $\theta^- \gets \theta$ \\ \textbf{On each interaction step:} \begin{enumerate} \item select $a$ randomly with probability $\varepsilon(t)$, else $a = \mathop{argmax}\limits_a Q^*_\theta(s, a)$ \item observe transition $(s, a, r', s', \operatorname{done})$ \item add observed transition to experience replay \item sample batch of size $B$ from experience replay \item for each transition $T$ from the batch compute target: $$y(T) = r(s') + \gamma \max\limits_{a'} Q^*(s', a', \theta^-)$$ \item compute loss: $$\operatorname{Loss} = \frac{1}{B}\sum_T \left( Q^*(s, a, \theta) - y(T) \right) ^2$$ \item make a step of gradient descent using $\frac{\partial \operatorname{Loss} }{\partial \theta}$ \item if $t \mod K = 0$: $\theta^- \gets \theta$ \end{enumerate} \end{algorithmbox} \subsection{Double DQN}\label{DDQN} Although target network successfully prevented $Q^*_\theta$ from unbounded growth and empirically stabilized learning process, the values of $Q^*_\theta$ on many domains were evident to tend to overestimation. The problem is presumed to reside in max operation in target construction formula (\ref{target}): $$y = r(s') + \gamma \max\limits_{a'} Q^*(s', a', \theta^-)$$ During this estimation $\max$ shifts Q-value estimation towards either to those actions that led to high reward due to luck or to the actions with overestimating approximation error. The solution proposed in \citep{van2016deep} is based on idea of separating \emph{action selection} and \emph{action evaluation} to carry out each of these operations using its own approximation of $Q^*$: \begin{align*} \max\limits_{a'} Q^*(s', a', \theta^-) = Q^*(s', \mathop{argmax}\limits_{a'} Q^*(s', a', \theta^-), \theta^-) \approx \\ \approx Q^*(s', \mathop{argmax}\limits_{a'} Q^*(s', a', \theta^-_1), \theta^-_2) \end{align*} The simplest, but expensive, implementation of this idea is to run two independent DQN (<<Twin DQN>>) algorithms and use the twin network to evaluate actions: $$y_1 = r(s') + \gamma Q_1^*(s', \mathop{argmax}\limits_{a'} Q_2^*(s', a', \theta^-_2), \theta^-_1)$$ $$y_2 = r(s') + \gamma Q_2^*(s', \mathop{argmax}\limits_{a'} Q_1^*(s', a', \theta^-_1), \theta^-_2)$$ Intuitively, each Q-function here may prefer lucky or overestimated actions, but the other Q-function judges them according to its own luck and approximation error, which may be as underestimating as overestimating. Ideally these two DQNs should not share interaction experience to achieve that, which makes such algorithm twice as expensive both in terms of computational cost and sample efficiency. Double DQN \citep{van2016deep} is more compromised option which suggests to use current weights of network $\theta$ for action selection and target network weights $\theta^-$ for action evaluation, assuming that when the target network update frequency $K$ is big enough these two networks are sufficiently different: $$y = r(s') + \gamma Q^*(s', \mathop{argmax}\limits_{a'} Q^*(s', a', \theta), \theta^-)$$ \subsection{Dueling DQN}\label{DueDQN} Another issue with DQN algorithm \ref{DQNalgorithm} emerges when a huge part of considered MDP consists of states of low optimal value $V^*(s)$, which is an often case. The problem is that when the agent visits unpromising state instead of lowering its value $V^*(s)$ it remembers only low pay-off for performing some action $a$ in it by updating $Q^*(s, a)$. This leads to regular returns to this state during future interactions until all actions prove to be unpromising and all $Q^*(s, a)$ are updated. The problem gets worse when the cardinality of action space is high or there are many similar actions in action space. One benefit of deep reinforcement learning is that we are able to facilitate generalization across actions by specifying the architecture of neural network. To do so, we need to encourage the learning of $V^*(s)$ from updates of $Q^*(s, a)$. The idea of \emph{dueling architecture} \citep{wang2015dueling} is to incorporate approximation of $V^*(s)$ explicitly in computational graph. For that purpose we need the definition of advantage function: \begin{definition} For given MDP and policy $\pi$ the \emph{advantage function under policy $\pi$} is defined as \begin{equation}\label{advantage} A^\pi(s, a) \coloneqq Q^\pi(s, a) - V^\pi(s) \end{equation} \end{definition} Advantage function is evidently interconnected with Q-function and value function and actually shows the relative advantage of selecting action $a$ comparing to average performance of the policy. If for some state $A^\pi(s, a) > 0$, then modifying $\pi$ to select $a$ more often in this particular state will lead to better policy as its average return will become bigger than initial $V^\pi(s)$. This follows from the following property of arbitrary advantage function: \begin{align}\label{advantagerestriction} \begin{split} \mathbb{E}_{a \sim \pi(a \mid s)}A^\pi(s, a) &= \mathbb{E}_{a \sim \pi(a \mid s)} \left[ Q^\pi(s, a) - V^\pi(s) \right] = \\ &= \mathbb{E}_{a \sim \pi(a \mid s)} Q^\pi(s, a) - V^\pi(s) = \\ \{ \text{using (\ref{VQ})} \}&= V^\pi(s) - V^\pi(s) = 0 \end{split} \end{align} Definition of optimal advantage function $A^*(s, a)$ is analogous and allows us to reformulate $Q^*(s, a)$ in terms of $V^*(s)$ and $A^*(s, a)$: \begin{equation}\label{naivedueling} Q^*(s, a) = V^*(s) + A^*(s, a) \end{equation} Straightforward utilization of this decomposition is following: after several feature extracting layers the network is joined with two heads, one outputting single scalar $V^*(s)$ and one outputting $|\mathcal{A}|$ numbers $A^*(s, a)$ like it was done in DQN for Q-function. After that this scalar value estimation is added to all components of $A^*(s, a)$ in order to obtain $Q^*(s, a)$ according to (\ref{naivedueling}). The problem with this naive approach is that due to (\ref{advantagerestriction}) advantage function can not be arbitrary and must hold the property (\ref{advantagerestriction}) for $Q^*(s, a)$ to be identifiable. This restriction (\ref{advantagerestriction}) on advantage function can be simplified for the case when optimal policy is induced by optimal Q-function: \begin{align*} \begin{split} 0 &= \mathbb{E}_{a \sim \pi^*(a \mid s)} Q^*(s, a) - V^*(s) = \\ &= Q^*(s, \mathop{argmax}_a Q^*(s, a)) - V^*(s) = \\ &= \max_a Q^*(s, a) - V^*(s) = \\ &= \max_a \left[ Q^*(s, a) - V^*(s)\right] = \\ &= \max_a A^*(s, a) \end{split} \end{align*} This condition can be easily satisfied in computational graph by subtracting $\max\limits_a A^*(s, a)$ from advantage head. This will be equivalent to the following formula of dueling DQN: \begin{equation}\label{dueling} Q^*(s, a) = V^*(s) + A^*(s, a) - \max_a A^*(s, a) \end{equation} The interesting nuance of this improvement is that after evaluation on Atari-57 authors discovered that substituting max operation in (\ref{dueling}) with averaging across actions led to better results (while usage of unidentifiable formula (\ref{naivedueling}) led to poor performance). Although gradients can be backpropagated through both operation and formula (\ref{dueling}) seems theoretically justified, in practical implementations averaging instead of maximum is widespread. \subsection{Noisy DQN}\label{NoisyDQN} By default, DQN algorithm does not concern the exploration problem and is always augmented with $\varepsilon$-greedy strategy to force agent to discover new states. This baseline exploration strategy suffers from being extremely hyperparameter-sensitive as early decrease of $\varepsilon(t)$ to close to zero values may lead to stucking in local optima, when agent is unable to explore new options due to imperfect $Q^*$, while high values of $\varepsilon(t)$ force agent to behave randomly for excessive amount of episodes, which slows down learning. In other words, $\varepsilon$-greedy strategy transfers responsibility to solve \emph{exploration-exploitation} trade-off on engineer. The key reason why $\varepsilon$-greedy exploration strategy is relatively primitive is that exploration priority does not depend on current state. Intuitively, the choice whether to exploit knowledge by selecting approximately optimal action or to explore MDP by selecting some other depends on how explored the current state $s$ is. Discovering a new part of state space after any amount of interaction probably indicates that random actions are good to try there, while close-to-initial states will probably be sufficiently explored after several first episodes. In $\varepsilon$-greedy strategy agent selects action using deterministic $Q^*(s, a, \theta)$ and only afterwards injects state-independent noise in a form of $\varepsilon(t)$ probability of choosing random action. \emph{Noisy networks} \citep{fortunato2017noisy} were proposed as a simple extension of DQN to provide state-dependent and parameter-free exploration by injecting noise of trainable volume to all (or most\footnote{usually it is not injected in very first layers responsible for feature extraction like convolutional layers in networks for images as input.}) nodes in computational graph. Let a linear layer with $m$ inputs and $n$ outputs in q-network perform the following computation: $$y(x) = Wx + b$$ where $x \in \mathbb{R}^m$ is input, $W \in \mathbb{R}^{n \times m}$ --- weights matrix, $b \in \mathbb{R}^m$ --- bias. In noisy layers it is proposed to substitute deterministic parameters with samples from $\mathcal{N}(\mu, \sigma)$ where $\mu, \sigma$ are trained with gradient descent\footnote{using standard reparametrization trick}. On the forward pass through the noisy layer we sample $\varepsilon_W \sim \mathcal{N}(0, I_{nm \times nm}), \varepsilon_b \sim \mathcal{N}(0, I_{n \times n})$ and then compute \begin{align*} W &= (\mu_W + \sigma_W \odot \varepsilon_W)\\ b &= (\mu_b + \sigma_b \odot \varepsilon_b)\\ y(x) &= Wx + b \end{align*} where $\odot$ denotes element-wise multiplication, $\mu_W, \sigma_W \in \mathbb{R}^{n \times m}, \mu_b, \sigma_b \in \mathbb{R}^n$ --- trainable parameters of the layer. Note that the number of parameters for such layers is doubled comparing to ordinary layers. As the output of q-network now becomes a random variable, loss value becomes a random variable too. Like in similar models for supervised learning, on each step an expectation of loss function over noise is minimized: $$\mathbb{E}_\varepsilon \operatorname{Loss}(\theta, \varepsilon) \to \min_\theta$$ The gradient in this setting can be estimated using Monte-Carlo: $$\nabla_\theta \mathbb{E}_\varepsilon \operatorname{Loss}(\theta, \varepsilon) = \mathbb{E}_\varepsilon \nabla_\theta \operatorname{Loss}(\theta, \varepsilon) \approx \nabla_\theta \operatorname{Loss}(\theta, \varepsilon) \quad \varepsilon \sim \mathcal{N}(0, I)$$ It can be seen that amount of noise actually inflicting output of network may vary for different inputs, i.~e. for different states. There are no guarantees that this amount will reduce as the interaction proceeds; the behaviour of average magnitude of noise injected in the network with time is reported to be extremely sensitive to initialization of $\sigma_W, \sigma_b$ and vary from MDP to MDP. One technical issue with noisy layers is that on each pass an excessive amount (by the number of network parameters) of noise samples is required. This may substantially reduce computational efficiency of forward pass through the network. For optimization purposes it is proposed to obtain noise for weights matrices in the following way: sample just $n + m$ noise samples $\varepsilon^1_W \sim \mathcal{N}(0, I_{m \times m}), \varepsilon^2_W \sim \mathcal{N}(0, I_{n \times n})$ and acquire matrix noise in a factorized form: $$\varepsilon_W = f(\varepsilon^1_W) f(\varepsilon^2_W)^T$$ where $f$ is a scaling function, e.~g. $f(x) = \operatorname{sign}(x)\sqrt{|x|}$. The benefit of this procedure is that it requires $m + n$ samples instead of $mn$, but sacrifices the interlayer independence of noise. \subsection{Prioritized experience replay}\label{PER} In DQN each batch of transitions is sampled from experience replay using uniform distribution, treating collected data as equally prioritized. In such scheme states for each update come from the same distribution as they come from interaction experience (except that they become decorellated), which agrees with TD algorithm as the basement of DQN. Intuitively observed transitions vary in their importance. At the beginning of training most guesses tend to be more or less random as they rely on arbitrarily initialized $Q^*_\theta$ and the only source of trusted information are transitions with non-zero received reward, especially near terminal states where $V^*_\theta(s')$ is known to be equal to 0. In the midway of training, most of experience replay is filled with the memory of interaction within well-learned part of MDP while the most crucial information is contained in transitions where agent explored new promising areas and gained novel reward yet to be propagated through Bellman equation. All these significant transitions are drowned in collected data and rarely appear in sampled batches. The central idea of prioritized experience replay \citep{schaul2015prioritized} is that priority of some transition $T = (s, a, r', s', \operatorname{done})$ is proportional to temporal difference: \begin{equation}\label{priority} \rho(T) \coloneqq y(T) - Q^*(s, a, \theta) = \sqrt{\operatorname{Loss}(y(T), Q^*(s, a, \theta))} \end{equation} Using these priorities as proxy of transition importances, sampling from experience replay proceeds using following probabilities: $$\mathcal{P}(T) \propto \rho(T)^\alpha$$ where hyperparameter $\alpha \in \mathbb{R}^+$ controls the degree to which the sampling weights are sparsified: the case $\alpha = 0$ corresponds to uniform sampling distribution while $\alpha = +\infty$ is equivalent to greedy sampling of transitions with highest priority. The problem with (\ref{priority}) claim is that each transition's priority changes after each network update. As it is impractical to recalculate loss for the whole data after each step, some simplifications must be put up with. The straightforward option is to update priority only for sampled transitions in the current batch. New transitions can be added to experience replay with highest priority, i.~e. $\max\limits_{T} \rho(T)$\footnote{which can be computed online with $\mathcal{O}(1)$ complexity}. Second debatable issue of prioritized replay is that it actually substitutes loss function of DQN updates, which assumed uniform sampling of visited states to ensure they come from state visitation distribution: $$\mathbb{E}_{T \sim \operatorname{Uniform}} \operatorname{Loss}(T) \to \min_\theta$$ While it is not clear what distribution is better to sample from to ensure exploration restrictions of theorem \ref{TDconvergence}, prioritized experienced replay changes this distribution in uncontrollable way. Despite its fruitfulness at the beginning and midway of training process, this distribution shift may destabilize learning close to the end and make algorithm stuck with locally optimal policy. Since formally this issue is about estimating an expectation over one probability with preference to sample from another one, the standard technique called \emph{importance sampling} can be used as countermeasure: \begin{align*} \mathbb{E}_{T \sim \operatorname{Uniform}} \operatorname{Loss}(T) &= \sum_{i=0}^M \frac{1}{M} \operatorname{Loss}(T_i) = \\ &= \sum_{i=0}^M \mathcal{P}(T_i) \frac{1}{M\mathcal{P}(T_i)} \operatorname{Loss}(T_i) = \\ &= \mathbb{E}_{T \sim \mathcal{P}(T)} \frac{1}{M\mathcal{P}(T)} \operatorname{Loss}(T) \end{align*} where $M$ is a number of transitions stored in experience replay memory. Importance sampling implies that we can avoid distribution shift that introduces undesired bias by making smaller gradient updates for significant transitions which now appear in the batches with higher frequency. The price for bias elimination is that importance sampling weights lower prioritization effect by slowing down learning of highlighted new information. This duality resembles trade-off between bias and variance, but important moment here is that distribution shift does not cause any seeming issues at the beginning of training when agent behaves close to random and do not produce valid state visitation distribution anyway. The idea proposed in \citep{schaul2015prioritized} based on this intuition is to anneal the importance sampling weights so they correct bias properly only towards the end of training procedure. $$ \operatorname{Loss}^{\operatorname{prioritizedER}} = \mathbb{E}_{T \sim \mathcal{P}(T)} \left( \frac{1}{B\mathcal{P}(T)} \right)^{\beta(t)} \operatorname{Loss}(T) $$ where $\beta(t) \in [0, 1]$ and approaches 1\footnote{often it is initialized by a constant close to 0 and is linearly increased until it reaches 1} as more interaction steps are executed. If $\beta(t)$ is set to 0, no bias correction is held, while $\beta(t) = 1$ corresponds to unbiased loss function, i.~e. equivalent to sampling from uniform distribution. The most significant and obvious drawback of prioritized experience replay approach is that it introduces additional hyperparameters. Although $\alpha$ represents one number, algorithm's behaviour may turn out to be sensitive to its choosing, and $\beta(t)$ must be designed by engineer as some scheduled motion from something near 0 to 1, and its well-turned selection may require inaccessible knowledge about how many steps it will take for algorithm to <<warm up>>. \subsection{Multi-step DQN}\label{NstepDQN} One more widespread modification of Q-learning in RL community is substituting one-step approximation present in Bellman optimality equation (\ref{Bellman}) with $N$-step: \begin{proposition} \textbf{($N$-step Bellman optimality equation)} \begin{equation}\label{NstepBellman} Q^*(s_0, a_0) = \mathbb{E}_{\mathcal{T}_{\pi^*} \mid s_0, a_0} \left[ \sum_{t=1}^N \gamma^{t-1}r(s_t) + \gamma^N \max_{a_N} Q^*(s_N, a_N) \right] \end{equation} \end{proposition} Indeed, definition of $Q^*(s, a)$ consists of average return and can be viewed as making $T^{\max}$ steps from state $s_0$ after selecting action $a_0$, while vanilla Bellman optimality equation represents $Q^*(s, a)$ as reward from one next step in the environment and estimation of the rest of trajectory reward recursively. $N$-step Bellman equation (\ref{NstepBellman}) generalizes these two opposites. All the same reasoning as for DQN can be applied to $N$-step Bellman equation to obtain $N$-step DQN algorithm, which only modification appears in target computation: \begin{equation}\label{Nsteptarget} y(s_0, a_0) = \sum_{t=1}^N \gamma^{t-1}r(s_t) + \gamma^N \max_{a_N} Q^*(s_N, a_N, \theta) \end{equation} To perform this computation, we are required to obtain for given state $s$ and $a$ not only one next step, but $N$ steps. To do so, instead of transitions $N$-step roll-outs are stored, which can be done by precomputing following tuples: $$T = \left( s, \, a, \, \sum_{n=1}^N \gamma^{n-1}r^{(n)}, \, s^{(N)}, \, \operatorname{done} \right)$$ where $r^{(n)}$ is the reward received in $n$ steps after visitation of considered state $s$, $s^{(N)}$ is state visited in $N$ steps, and $\operatorname{done}$ is a flag whether the episode ended during $N$-step roll-out\footnote{all $N$-step roll-outs must be considered including those terminated at $k$-th step for $k < N$.}. All other aspects of algorithm remain the same in practical implementations, and the case $N = 1$ corresponds to standard DQN. The goal of using $N > 1$ is to accelerate propagation of reward from terminal states backwards through visited states to $s_0$ as less update steps will be required to take into account freshly observed reward and optimize behaviour at the beginning of episodes. The price is that formula (\ref{Nsteptarget}) includes an important trick: to calculate such target, for second (and following) step action $a'$ must be sampled from $\pi^*$ for Bellman equation (\ref{NstepBellman}) to remain true. In other words, application of $N$-step Q-learning is theoretically improper when behaviour policy differs from $\pi^*$. Note that we do not face this problem in the case $N = 1$ in which we are required to sample only from transition probability $p(s' \mid s, a)$ for given state-action pair $s, a$. Even considering $\pi^* \approx \mathop{argmax}\limits_a Q^*(s, a, \theta)$, where $Q^*$ is our current approximation of $\pi^*$, makes $N$-step DQN an \emph{on-policy} algorithm when for every state-action pair $s, a$ it is preferable to sample target using the closest approximation of $\pi^*$ available. This questions usage of experience replay or at the very least encourages to limit its capacity to store only $M^{\max}$ newest transitions with $M^{\max}$ being relatively not very big. To see the negative effect of $N$-step DQN, consider the following toy example. Suppose agent makes a mistake on the second step after $s$ and ends episode with huge negative reward. Then in the case $N > 2$ each time the roll-out starting with this $s$ is sampled in the batch, the value of $Q^*(s, a, \theta)$ will be updated with this received negative reward even if $Q^*(s', \cdot, \theta)$ already learned not to repeat this mistake again. Yet empirical results in many domains demonstrate that raising $N$ from 1 to 2-3 may result in substantial acceleration of training and positively affect the final performance. On the contrary, the theoretical groundlessness of this approach explains its negative effects when $N$ is set too big. \newpage \section{Distributional approach for value-based methods}\label{distributionalRL} \subsection{Theoretical foundations} The setting of RL task inherently carries internal stochasticity of which agent has no substantial control. Sometimes intelligent behaviour implies taking risks with severe chance of low episode return. All this information resides in the distribution of return $R$ (\ref{return}) as random variable. While value-based methods aim at learning expectation of this random variable as it is the quantity we actually care about, in distributional approach \citep{bellemare2017distributional} it is proposed to learn the whole distribution of returns. It further extends the information gathered by algorithm about MDP towards model-based case in which the whole MDP is imitated by learning both reward function $r(s)$ and transitions $\mathbb{T}$, but still restricts itself only to reward and doesn't intend to learn world model. In this section we discuss some theoretical extensions of temporal difference ideas in the case when expectations on both sides of Bellman equation (\ref{QQ}) and Bellman optimality equation (\ref{Bellman}) are taken away. The central object of study in Q-learning was Q-function, which for given state and action returns the expectation of reward. To rewrite Bellman equation not in terms of expectations, but in terms of the whole distributions, we require a corresponding notation. \begin{definition} For given MDP and policy $\pi$ the \emph{value distribution of policy $\pi$} is a random variable defined as $$Z^\pi(s, a) \coloneqq \sum_{t=0} \gamma^t r_{t+1} \, \mathrel{\Big|} \, s_0 = s, a_0 = a $$ \end{definition} Note that $Z^\pi$ just represents a random variable which is taken expectation of in definition of $Q$-function: $$Q^\pi(s, a) = \mathbb{E}_{\mathcal{T}_\pi} Z^\pi(s, a)$$ Using this definition of value distribution, Bellman equation can be rewritten to extend the recursive connection between adjacent states from expectations of returns to the whole distributions of returns: \begin{proposition} \textbf{(Distributional Bellman Equation)} \citep{bellemare2017distributional} \begin{equation}\label{distributionalBellman} Z^\pi(s, a) \mathrel{\stackrel{\rm c.d.f.}=} r(s') + \gamma Z^\pi(s', a') \, \mathrel{\big|} \, s' \sim p(s' \mid s, a), a' \sim \pi(a' \mid s') \end{equation} \end{proposition} Here we used some auxiliary notation: by $\mathrel{\stackrel{\rm c.d.f.}=}$ we mean that cumulative distribution functions of two random variables to the right and left are equal almost everywhere. Such equations are called \emph{recursive distributional equations} and are well-known in theoretical probability theory\footnote{to get familiar with this notion, consider this basic example: $$X_1 \mathrel{\stackrel{\rm c.d.f.}=} \frac{X_2}{\sqrt{2}} + \frac{X_3}{\sqrt{2}}$$ where $X_1, X_2, X_3$ are random variables coming from $\mathcal{N}(0, \sigma^2)$.}. By using $\mid$ we describe a sampling procedure for the random variable to the right side of equation: for given $s, a$ next state $s'$ is sampled from transition probability, then $a'$ is sampled from given policy, then random variable $Z^\pi(s', a')$ is sampled to calculate a resulting sample $r(s') + \gamma Z^\pi(s', a')$. While the space of Q-functions $Q^\pi(s, a) \in \mathcal{S} \times \mathcal{A} \to \mathbb{R}$ is finite, the space of value distributions is a space of mappings from state-action pair to continuous distributions: $$Z^\pi(s, a) \in \mathcal{S} \times \mathcal{A} \to \mathcal{P}(\mathbb{R})$$ and it is important to notice that even in the table-case when state and action spaces are finite, the space of value distributions is essentially infinite. Crucial moment for us will be that convergence properties now depend on chosen metric\footnote{in finite spaces it is true that convergence in one metric guarantees convergence to the same point for any other metric.}. The choice of metric in $\mathcal{S} \times \mathcal{A} \to \mathcal{P}(\mathbb{R})$ represents the same issue as in the space of continuous random variables $\mathcal{P}(\mathbb{R})$: if we choose a metric in the latter, we can construct one in the former: \begin{proposition}\label{constructmetric} If $d(X, Y)$ is a metric in the space $\mathcal{P}(\mathbb{R})$, then $$\overline{d}(Z_1, Z_2) \coloneqq \sup_{s \in \mathcal{S}, a \in \mathcal{A}} d(Z_1(s, a), Z_2(s, a))$$ is a metric in the space $\mathcal{S} \times \mathcal{A} \to \mathcal{P}(\mathbb{R})$. \end{proposition} The particularly interesting for us example of metric in $\mathcal{P}(\mathbb{R})$ will be Wasserstein metric, which concerns only random variables with bounded moments, so we will additionally assume that for all state-action pairs $s, a$ $$\mathbb{E} Z^\pi(s, a)^p \le +\infty$$ are finite for $p \ge 1$. \begin{proposition} For $1 \le p \le +\infty$ for two random variables $X, Y$ on continuous domain with $p$-th bounded moments and cumulative distribution functions $F_X$ and $F_Y$ correspondingly a \emph{Wasserstein distance} $$W_p(X, Y) \coloneqq \left( \int\limits_0^1 \left| F_X^{-1}(\omega) - F_Y^{-1}(\omega) \right| ^p d\omega \right)^{\frac{1}{p}}$$ $$W_\infty(X, Y) \coloneqq \sup_{\omega \in [0,1]} \left| F_X^{-1}(\omega) - F_Y^{-1}(\omega) \right| $$ is a metric in the space of random variables with $p$-th bounded moments. \end{proposition} Thus we can conclude from proposition \ref{constructmetric} that maximal form of Wasserstein metric \begin{equation}\label{maximalWasserstein} \overline{W}_p(Z_1, Z_2) = \sup_{s \in \mathcal{S}, a \in \mathcal{A}} W_p(Z_1(s, a), Z_2(s, a)) \end{equation} is a metric in the space of value distributions. We now concern convergence properties of point iteration method to solve (\ref{distributionalBellman}) in order to obtain $Z^\pi$ for given policy $\pi$, i.~e. solve the task of \emph{policy evaluation}. For that purpose we initialize $Z_0^\pi(s, a)$ arbitrarily\footnote{here we consider value distributions from theoretical point of view, assuming that we are able to explicitly store a table of $|\mathcal{S}| |\mathcal{A}|$ continuous distributions without any approximations.} and perform the following updates for all state-action pairs $s, a$: \begin{equation}\label{distrpolicyevalupdate} Z^\pi_{t+1}(s, a) \mathrel{\stackrel{\rm c.d.f.}\coloneqq} r(s') + \gamma Z^\pi_t(s', a') \end{equation} Here we assume that we are able to compute the distribution of random variable on the right side knowing $\pi$, all transition probabilities $\mathbb{T}$, the distribution of $Z^\pi_t$ and reward function. The question whether the sequence $\{Z^\pi_t\}$ converges to $Z^\pi$ can be given a detailed answer: \begin{proposition}\label{DistributionalPolicyEvaluationConvergence} \citep{bellemare2017distributional} Denote by $\mathcal{B}$ the following operator $\left( \mathcal{S} \times \mathcal{A} \to \mathcal{P}(\mathbb{R}) \right) \to \left( \mathcal{S} \times \mathcal{A} \to \mathcal{P}(\mathbb{R}) \right)$, updating $Z^\pi_t$ as in (\ref{distrpolicyevalupdate}): $$Z^\pi_{t+1} = \mathcal{B}Z^\pi_t$$ for all state-action pairs $s, a$. Then $\mathcal{B}$ is a contraction mapping in $\overline{W}_p$ (\ref{maximalWasserstein}) for $1 \le p \le +\infty$, i.e. for any two value distributions $Z_1, Z_2$ $$\overline{W}_p(\mathcal{B} Z_1, \mathcal{B} Z_2) \le \gamma \overline{W}_p(Z_1, Z_2)$$ Hence there is a unique fixed point of system of equations (\ref{distributionalBellman}) and the point iteration method converges to it. \end{proposition} One more curious theoretical result is that $\mathcal{B}$ is in general not a contraction mapping for such distances as Kullback-Leibler divergence, Total Variation distance and Kolmogorov distance\footnote{one more metric for which the contraction property was shown is Cramer metric: $$l_2(X, Y) = \left(\int\limits_\mathbb{R} \left(F_X(\omega) - F_Y(\omega) \right)^2 d\omega \right)^{\frac{1}{2}}$$ where $F_X, F_Y$ are c.d.f. of random variables $X, Y$ correspondingly.}. It shows that metric selection indeed influences convergence rate. Similar to traditional value functions, we can define \emph{optimal value distribution} $Z^*(s, a)$. Substituting\footnote{to perform this step validly, a clarification concerning $\mathop{argmax}$ operator definition must be given. The choice of action $a$ returned by this operator in the cases when several actions lead to the same maximal average returns must not depend on $Z$, as this choice affects higher moments of resulted distribution. To overcome this issue, for example, in the case of finite action space all actions can be enumerated and the optimal action with the lowest index is returned by operator.} $\pi^*(s) = \mathop{argmax}\limits_a \mathbb{E}_{\mathcal{T}_{\pi^*}} Z^*(s, a)$ into (\ref{distributionalBellman}), we obtain distributional Bellman optimality equation: \begin{proposition} \textbf{(Distributional Bellman optimality equation)} \begin{equation}\label{optdistributionalBellman} Z^*(s, a) \mathrel{\stackrel{\rm c.d.f.}=} r(s') + \gamma Z^*(s', \mathop{argmax}\limits_{a'} \mathbb{E}_{\mathcal{T}_{\pi^*}} Z^*(s', a')) \, \mathrel{\big|} \, s' \sim p(s' \mid s, a) \end{equation} \end{proposition} Now we concern the same question whether the point iteration method of solving (\ref{optdistributionalBellman}) leads to solution $Z^*$ and whether it is a contraction mapping for some metric. The answer turns out to be negative. \begin{proposition}\label{divergence} \citep{bellemare2017distributional} Point iteration for solving (\ref{optdistributionalBellman}) may diverge. \end{proposition} Level of impact of this result is not completely clear. Point iteration for (\ref{optdistributionalBellman}) preserves means of distributions, i.~e. it will eventually converge to $Q^*(s, a)$ with all theoretical guarantees from classical Q-learning. The reason behind divergence theorems hides in the rest of distributions like other moments and situations when equivalent (in terms of average return) actions may lead to different higher moments. \subsection{Categorical DQN}\label{CategoricalDQN} There are obvious obstacles for practical application of distributional Q-learning following from complication of working with arbitrary continuous distributions. Usually we are restricted to approximations inside some family of parametric distributions, so we have to perform a projection step on each iteration. Second matter in combining distributional Q-learning with deep neural networks is to take into account that only samples from $p(s' \mid s, a)$ are available for each update. To provide a distributional analog of temporal difference algorithm \ref{Qlearningupdate2}, some analog of exponential smoothing for distributional setting must be proposed. Categorical DQN \citep{bellemare2017distributional} (also referred as c51) provides straightforward design of practical distributional algorithm. While DQN was a resemblance of temporal difference algorithm, Categorical DQN attempts to follow the logic of DQN. The concept is as following. The neural network with parameters $\theta$ in this setting takes as input $s \in \mathcal{S}$ and for each action $a$ outputs parameters $\zeta_\theta(s, a)$ of distributions of random variable $Z^*_\theta(s, a)$. As in DQN, experience replay can be used to collect observed transitions and sample a batch for each update step. For each transition $T = (s, a, r', s', \operatorname{done})$ in the batch a guess is computed: \begin{equation}\label{distributionaltarget} y(T) \mathrel{\stackrel{\rm c.d.f.}\coloneqq} r' + (1 - \operatorname{done})\gamma Z^*_\theta \left( s', \mathop{argmax}_{a'} \mathbb{E} Z^*_\theta(s', a') \right) \end{equation} Note that expectation of $Z^*_\theta(s', a')$ is computed explicitly using the form of chosen parametric family of distributions and outputted parameters $\zeta_\theta(s', a')$, as is the distribution of random variable $r' + (1 - \operatorname{done})\gamma Z^*_\theta(s', a')$. In other words, in this setting guess $y(T)$ is also a continuous random variable, distribution of which can be constructed only approximately. As both target and model output are distributions, it is reasonable to design loss function in a form of some divergence $\mathcal{D}$ between $y(T)$ and $Z^*_\theta(s, a)$: \begin{equation}\label{distributionalloss} \operatorname{Loss}(\theta) = \mathbb{E}_T \mathcal{D} \left( y(T) \parallel Z^*_\theta(s, a) \right) \end{equation} $$\theta_{t+1} = \theta_t - \alpha \frac{\partial \operatorname{Loss}(\theta_t)}{\partial \theta}$$ The particular choice of this divergence must be made with concern that $y(T)$ is a <<sample>> from a full one-step approximation of $Z^*_\theta$ which includes transition probabilities: \begin{equation}\label{yfull} y^{\operatorname{full}}(s, a) \mathrel{\stackrel{\rm c.d.f.}\coloneqq} \sum_{s' \in \mathcal{S}} p(s' \mid s, a)y(s, a, r(s'), s', \operatorname{done}(s')) \end{equation} This form is precisely the right side of distributional Bellman optimality equation as we just incorporated intermediate sampling of $s'$ into the value of random variable. In other words, if transition probabilities $\mathbb{T}$ were known, the update could be made using distribution of $y^{\operatorname{full}}$ as a target. $$\operatorname{Loss}^{\operatorname{full}}(\theta) = \mathbb{E}_{s, a} \mathcal{D}(y^{\operatorname{full}}(s, a) \parallel Z^*_\theta(s, a))$$ This motivates to choose $\operatorname{KL}(y(T) \parallel Z^*_\theta(s,a))$ (specifically with this order of arguments) as $\mathcal{D}$ to exploit the following property (we denote by $p_X$ a p.d.f. pf random variable $X$): \begin{align*} \nabla_\theta \mathbb{E}_T \operatorname{KL}(y^{\operatorname{full}}(s, a) \parallel Z^*_\theta(s, a)) &= \nabla_\theta \left[ \mathbb{E}_T \int_\mathbb{R} -p_{y^{\operatorname{full}}(s, a)}(\omega) \log p_{Z^*_\theta(s, a))}(\omega) d\omega + \operatorname{const} (\theta) \right] = \\ \{ \text{using (\ref{yfull})} \}&= \nabla_\theta \mathbb{E}_T \int_\mathbb{R} \mathbb{E}_{s' \sim p(s' \mid s, a)}-p_{y(T)}(\omega) \log p_{Z^*_\theta(s, a))}(\omega) d\omega = \\ \{ \text{taking expectation out} \} &= \nabla_\theta \mathbb{E}_T \mathbb{E}_{s' \sim p(s' \mid s, a)} \int_\mathbb{R} -p_{y(T)}(\omega) \log p_{Z^*_\theta(s, a))}(\omega) d\omega = \\ &= \nabla_\theta \mathbb{E}_T \mathbb{E}_{s' \sim p(s' \mid s, a)} \operatorname{KL} \left( y(T) \parallel Z^*_\theta(s, a) \right) \end{align*} This property basically states that gradient of loss function (\ref{distributionalloss}) with $\operatorname{KL}$ as $\mathcal{D}$ is an unbiased (Monte-Carlo) estimation of gradient of $\operatorname{KL}$-divergence for <<full>> distribution (\ref{yfull}), which resembles the employment of exponential smoothing in temporal difference learning. For many other divergences, including Wasserstein metric, same statement is not true, so their utilization in described online setting will lead to biased gradients and all theory-grounded intuition that algorithm moves in the right direction becomes distinctively lost. Moreover, $\operatorname{KL}$-divergence is known to be one of the easiest divergences to work with due to its nice smoothness properties and wide prevalence in many deep learning pipelines. Described above motivation to choose $\operatorname{KL}$-divergence as an actual objective for minimization is contradictory. Theoretical analysis of distributional Q-learning, specifically theorem \ref{DistributionalPolicyEvaluationConvergence}, though concerning policy evaluation other than optimal $Z^*$ search, explicitly hints that the process converges exponentially fast for Wasserstein metric, while even for precisely made updates in terms of $\operatorname{KL}$-divergence we are not guaranteed to get any closer to true solution. More <<practical>> defect of $\operatorname{KL}$-divergence is that it demands two comparable distributions to share the same domain. This means that by choosing $\operatorname{KL}$-divergence we pledge to guarantee that $y(T)$ and $Z^*_\theta(s, a)$ in (\ref{distributionalloss}) have coinciding support. This emerging restriction seems limiting even beforehand as for episodic MDP value distribution in terminal states is obviously degenerated (their support consists of one point ${r(s)}$ which is given all probability mass) which means that our value distribution approximation is basically ensured to never be precise. In Categorical DQN, as follows from the name, the family of distributions is chosen to be categorical on the fixed support $\{z_0, z_1 \dots z_{A-1}\}$ where $A$ is number of \emph{atoms}. As no prior information about MDP is given, the basic choice of this support is uniform grid from some $V_{\min} \in \mathbb{R}$ to $V^{\max} \in \mathbb{R}$: $$z_i = V_{\min} + \frac{i}{A - 1}(V_{\max} - V_{\min}), \quad i \in {0, 1, \dots A - 1}$$ These bounds, though, must be chosen carefully as they implicitly assume $$V_{\min} \le Z^*(s, a) \le V_{\max}$$ and if these inequalities are not tight, the approximation will obviously become poor. Therefore the neural network outputs $A$ numbers, summing into 1, to represent arbitrary distribution on this support: $$\zeta_i(s, a, \theta) \coloneqq \mathcal{P}(Z^*_\theta(s, a) = z_i)$$ Within this family of distributions, computation of expectation, greedy action selection and $KL$-divergence is trivial. One problem hides in target formula (\ref{distributionaltarget}): while we can compute distribution $y(T)$, its support may in general differ from $\{z_0 \dots z_{A-1}\}$. To avoid the issue of disjoint supports, a \emph{projection step} must be done to find the closest to target distribution within the chosen family\footnote{to project a categorical distribution with support $\{v_0, v_1 \dots v_{A-1}\}$ on categorical distributions with support $\{z_0, z_1 \dots z_{A-1}\}$ one can just find for each $v_i$ the closest two atoms $z_j \le v_i \le z_{j+1}$ and split all probability mass for $v_i$ between $z_j$ and $z_{j+1}$ proportional to closeness. If $v_i < z_0$, then all its probability mass is given to $z_0$, same with upper bound.}. Therefore the resulting target used in the loss function is \begin{equation*} y(T) \mathrel{\stackrel{\rm c.d.f.}\coloneqq} \Pi_C \left[ r' + (1 - \operatorname{done})\gamma Z^*_\theta \left( s', \mathop{argmax}_{a'} \mathbb{E} Z^*_\theta(s', a') \right) \right] \end{equation*} where $\Pi_C$ is projection operator. The resulting practical algorithm, named c51 after categorical distributions with $A = 51$ atoms, inherits ideas of experience replay, $\varepsilon$-greedy exploration and target network from DQN. Empirically, though, usage of target network remains an open question as the chosen family of distributions restricts value approximation from unbounded growth by <<clipping>> predictions at $z_{A - 1}$ and $z_0$, yet it is still considered slightly improving performance. \begin{algorithmbox}[label = c51algorithm]{Categorical DQN (c51)} \textbf{Hyperparameters:} $B$ --- batch size, $V_{\max}, V_{\min}, A$ --- parameters of support, $K$ --- target network update frequency, $\varepsilon(t) \in (0, 1]$ --- greedy exploration parameter, $\zeta^*$ --- neural network, SGD optimizer. \vspace{0.3cm} Initialize weights $\theta$ of neural net $\zeta^*$ arbitrary \\ Initialize $\theta^- \gets \theta$ \\ Precompute support grid $z_i = V_{\min} + \frac{i}{A - 1}(V_{\max} - V_{\min})$ \\ \textbf{On each interaction step:} \begin{enumerate} \item select $a$ randomly with probability $\varepsilon(t)$, else $a = \mathop{argmax}\limits_a \sum_{i} z_i\zeta^*_i(s, a, \theta)$ \item observe transition $(s, a, r', s', \operatorname{done})$ \item add observed transition to experience replay \item sample batch of size $B$ from experience replay \item for each transition $T$ from the batch compute target: $$\mathcal{P}(y(T) = r' + \gamma z_i) = \zeta^*_i\left( s', \mathop{argmax}_{a'} \sum_{i} z_i \zeta^*_i(s', a', \theta^-), \theta^- \right) $$ \item project $y(T)$ on support $\{ z_0, z_1 \dots z_{A-1} \}$ \item compute loss: $$\operatorname{Loss} = \frac{1}{B}\sum_T \operatorname{KL}(y(T) \parallel Z^*(s, a, \theta))$$ \item make a step of gradient descent using $\frac{\partial \operatorname{Loss} }{\partial \theta}$ \item if $t \mod K = 0$: $\theta^- \gets \theta$ \end{enumerate} \end{algorithmbox} \subsection{Quantile Regression DQN (QR-DQN)}\label{QRDQN} Categorical DQN discovered a gap between theory and practice as $\operatorname{KL}$-divergence, used in practical algorithm, is theoretically unjustified. Theorem \ref{DistributionalPolicyEvaluationConvergence} hints that the true divergence we should care about is actually Wasserstein metric, but it remained unclear how it could be optimized using only samples from transition probabilities $\mathbb{T}$. In \citep{dabney2018distributional} it was discovered that selecting another family of distributions to approximate $Z^*_\theta(s, a)$ will reduce Wasserstein minimization task to the search for quantiles of specific distributions. The latter can be done in online setting using \emph{quantile regression} technique. This led to alternative distributional Q-learning algorithm named Quantile Regression DQN (QR-DQN). The basic idea is to <<swap>> fixed support and learned probabilities of Categorical DQN. We will now consider the family with fixed probabilities for $A$-atomed categorical distribution with arbitrary support $\{ \zeta^*_0(s, a, \theta), \zeta^*_1(s, a, \theta), \dots , \zeta^*_{A - 1}(s, a, \theta)\}$. Again, we will assume all probabilities to be equal given the absence of any prior knowledge; namely, our distribution family is now $$Z^*_\theta(s, a) \sim \operatorname{Uniform}\left( \zeta^*_0(s, a, \theta), \dots , \zeta^*_{A - 1}(s, a, \theta) \right)$$ In this setting neural network outputs $A$ arbitrary real numbers that represent the support of uniform categorical distribution\footnote{Note that target distribution is now guaranteed to remain within this distribution family as multiplying on $\gamma$ just shrinks the support and adding $r'$ just shifts it. We assume that if some atoms of the support coincide, the distribution is still $A$-atomed categorical; for example, for degenerated distribution (like in the case of terminal states) $\zeta^*_0(s, a, \theta) = \zeta^*_1(s, a, \theta) = \dots = \zeta^*_{A - 1}(s, a, \theta)$. This shows that projection step heuristic is not needed for this particular choice of distribution family.}, where $A$ is the number of atoms and the only hyperparameter to select. For table-case setting, on each step of point iteration we desire to update the cell for given state-action pair $s, a$ with full distribution of random variable to the right side of (\ref{optdistributionalBellman}). If we are limited to store only $A$ atoms of the support, the true distribution must be projected on the space of $A$-atomed categorical distributions. Consider now this task of projecting some given random variable with c.d.f. $F(\omega)$ in terms of Wasserstein distance. Specifically, we will be interested in minimizing $\mathcal{W}_1$-distance for $p = 1$ as the theorem \ref{DistributionalPolicyEvaluationConvergence} states the contraction property for all $1 \le p \le +\infty$ and we are free to choose any: \begin{equation}\label{Wassersteinminimization} \int_0^1 \left| F^{-1}(\omega) - U^{-1}_{z_0, z_1 \dots z_{A-1}}(\omega) \right| d\omega \to \min_{z_0, z_1 \dots z_{A-1}} \end{equation} where $U_{z_0, z_1 \dots z_{A-1}}$ is c.d.f. for uniform categorical distribution on given support. Its inverse, also known as \emph{quantile function}, has a following simple form: $$U^{-1}_{z_0, z_1 \dots z_{A-1}}(\omega) = \begin{cases} z_0 \quad &0 \le \omega < \frac{1}{A} \\ z_1 \quad &\frac{1}{A} \le \omega < \frac{2}{A} \\ \vdots \\ z_{A - 1} \quad &\frac{A - 1}{A} \le \omega < 1 \end{cases}$$ Substituting this into (\ref{Wassersteinminimization}) \begin{equation*} \sum_{i = 0}^{A - 1} \int_{\frac{i}{A}}^{\frac{i + 1}{A}} \left| F^{-1}(\omega) - z_i \right| d\omega \to \min_{z_0, z_1 \dots z_{A-1}} \end{equation*} splits the optimization of Wasserstein into $A$ independent tasks that can be solved separately: \begin{equation}\label{w1minim} \int_{\frac{i}{A}}^{\frac{i + 1}{A}} \left| F^{-1}(\omega) - z_i \right| d\omega \to \min_{z_i} \end{equation} \begin{proposition}\label{quantilesisdesire} \citep{dabney2018distributional} Let's denote $$\tau_i \coloneqq \frac{\frac{i}{A} + \frac{i + 1}{A}}{2}$$ Then every solution for (\ref{w1minim}) satisfies $F(z_i) = \tau_i$, i.~e. it is $\tau_i$-th quantile of c.~d.~f. $F$. \end{proposition} The result \ref{quantilesisdesire} states that we require only $A$ specific quantiles of random variable to the right side of Bellman equation\footnote{It can be proved that for table-case policy evaluation algorithm which stores in each cell not expectations of reward (as in Q-learning) but $A$ quantiles updated according to distributional Bellman equation (\ref{distributionalBellman}) using theorem \ref{quantilesisdesire} converges to quantiles of $Z^*(s, a)$ in Wasserstein metric for $1 \le p \le +\infty$ and its update operator is a contraction mapping in $\mathcal{W}_{\infty}$.}. Hence the last thing to do to design a practical algorithm is to develop a procedure of unbiased estimation of quantiles for the random variable on the right side of distribution Bellman optimality equation (\ref{optdistributionalBellman}). Quantile regression is the standard technique to estimate the quantiles of \emph{empirical distribution} (i.~.e. distribution that is represented by finite amount of i.~i.~d. samples from it). Recall from machine learning that the constant solution optimizing l1-loss is median, i.~.e. $\frac{1}{2}$-th quantile. This fact can be generalized to arbitrary quantiles: \begin{proposition} \textbf{(Quantile Regression)} \citep{koenker1978regression} Let's define loss as $$\operatorname{Loss}(c, X) = \begin{cases} \tau (c - X) \quad &c \ge X \\ (1 - \tau) (X - c) \quad &c < X \\ \end{cases}$$ Then solution for \begin{equation}\label{QR} \mathbb{E}_X \operatorname{Loss}(c, X) \to \min_{c \in \mathbb{R}} \end{equation} is $\tau$-th quantile of distribution of $X$. \end{proposition} As usual in the case of neural networks, it is impractical to optimize (\ref{QR}) until convergence on each iteration for each of $A$ desired quantiles $\tau_i$. Instead just one step of gradient optimization is made and the outputs of neural network $\zeta^*_i(s, a, \theta)$, which play the role of $c$ in formula (\ref{QR}), are moved towards the quantile estimation via backpropagation. In other words, (\ref{QR}) sets a loss function for network outputs; the losses for different quantiles are summed up. The resulting loss is \begin{equation}\label{QRloss} \operatorname{Loss}^{\operatorname{QR}}(s, a, \theta) = \sum_{i=0}^{A - 1} \mathbb{E}_{s' \sim p(s' \mid s, a)} \mathbb{E}_{y \sim y(T)} \left( \tau - \mathbb{I}[\zeta^*_i(s, a, \theta) < y] \right) \left( \zeta^*_i(s, a, \theta) - y \right) \end{equation} where $\mathbb{I}$ denotes an indicator function. The expectation over $y \sim y(T)$ for given transition can be computed in closed form: indeed, $y(T)$ is also an $A$-atomed categorical distribution with support $\{r' + \gamma \zeta_0^*(s', a'), \dots, r' + \gamma \zeta_{A - 1}^*(s', a')\}$, where $$a' = \mathop{argmax}\limits_{a'} \mathbb{E} Z^*(s', a', \theta) = \mathop{argmax}\limits_{a'} \frac{1}{A}\sum_i \zeta_i^*(s', a', \theta)$$ and expectation over transition probabilities, as always, is estimated using Monte-Carlo by sampling transitions from experience replay. \begin{algorithmbox}[label = QRDQNalgorithm]{Quantile Regression DQN (QR-DQN)} \textbf{Hyperparameters:} $B$ --- batch size, $A$ --- number of atoms, $K$ --- target network update frequency, $\varepsilon(t) \in (0, 1]$ --- greedy exploration parameter, $\zeta^*$ --- neural network, SGD optimizer. \vspace{0.3cm} Initialize weights $\theta$ of neural net $\zeta^*$ arbitrary \\ Initialize $\theta^- \gets \theta$ \\ Precompute mid-quantiles $\tau_i = \frac{\frac{i}{A} + \frac{i+1}{A}}{2}$ \\ \textbf{On each interaction step:} \begin{enumerate} \item select $a$ randomly with probability $\varepsilon(t)$, else $a = \mathop{argmax}\limits_a \frac{1}{A}\sum_{i} \zeta^*_i(s, a, \theta)$ \item observe transition $(s, a, r', s', \operatorname{done})$ \item add observed transition to experience replay \item sample batch of size $B$ from experience replay \item for each transition $T$ from the batch compute the support of target distribution: $$y(T)_j = r' + \gamma \zeta^*_j\left( s', \mathop{argmax}_{a'} \frac{1}{A}\sum_{i} \zeta^*_i(s', a', \theta^-), \theta^- \right) $$ \item compute loss: $$\operatorname{Loss} = \frac{1}{BA}\sum_T \sum_i \sum_j \left( \tau_i - \mathbb{I}[\zeta^*_i(s, a, \theta) < y(T)_j] \right) \left( \zeta^*_i(s, a, \theta) - y(T)_j \right)$$ \item make a step of gradient descent using $\frac{\partial \operatorname{Loss} }{\partial \theta}$ \item if $t \mod K = 0$: $\theta^- \gets \theta$ \end{enumerate} \end{algorithmbox} \subsection{Rainbow DQN}\label{rainbow} Success of Deep Q-learning encouraged a full-scale research of value-based deep reinforcement learning by studying various drawbacks of DQN and developing auxiliary extensions. In many articles some extensions from previous research were already considered and embedded in compared algorithms during empirical studies. In Rainbow DQN \citep{hessel2018rainbow}, seven Q-learning-based ideas are united in one procedure with ablation studies held whether all these incorporated extensions are essentially necessary for resulted RL algorithm: \begin{itemize} \item DQN (sec. \ref{DQN}) \item Double DQN (sec. \ref{DDQN}) \item Dueling DQN (sec. \ref{DueDQN}) \item Noisy DQN (sec. \ref{NoisyDQN}) \item Prioritized Experience Replay (sec. \ref{PER}) \item Multi-step DQN (sec. \ref{NstepDQN}) \item Categorical\footnote{Quantile Regression can be considered instead} DQN (sec. \ref{CategoricalDQN}) \end{itemize} There is little ambiguity on how these ideas can be combined; we will discuss several non-straightforward circumstances and provide the full algorithm description after. To apply prioritized experience replay in distributional setting, the measure of transition importance must be provided. The main idea is inherited from ordinary DQN where priority is just loss for this transition: $$\rho(T) \coloneqq \operatorname{Loss}(y(T), Z^*(s, a, \theta)) = \operatorname{KL}(y(T) \parallel Z^*(s, a, \theta))$$ To combine noisy networks with double DQN heuristic, it is proposed to resample noise on each forward pass through the network and through its copy for target computation. This decision implies that action selection, action evaluation and network utilization are independent and stochastic (for exploration cultivation) steps. The one snagging combination here is categorical DQN and dueling DQN. To merge these ideas, we need to model advantage $A^*(s, a, \theta)$ in distributional setting. In Rainbow this is done straightforwardly: the network has two heads, value stream $v(s, \theta)$ outputting $A$ real values and advantage stream $a(s, a, \theta)$ outputting $A \times |\mathcal{A}|$ real values. Then these streams are integrated using the same formula (\ref{dueling}) with the only exception being softmax applied across atoms dimension to guarantee that output is categorical distribution: \begin{equation}\label{rainbowdueling} \zeta^*_i(s, a, \theta) \propto \operatorname{exp} \left( v(s, \theta)_i + a(s, a, \theta)_i - \frac{1}{|\mathcal{A}|}\sum_a a(s, a, \theta)_i \right) \end{equation} Combining lack of intuition behind this integration formula with usage of mean instead of theoretically justified max makes this element of Rainbow the most questionable. During the ablation studies it was discovered that dueling architecture is the only component that can be removed without noticeable loss of performance. All other ingredients are believed to be crucial for resulting algorithm as they address different problems. \begin{algorithmbox}[label = rainbowalg]{Rainbow DQN} \textbf{Hyperparameters:} $B$ --- batch size, $V_{\max}, V_{\min}, A$ --- parameters of support, $K$ --- target network update frequency, $N$ --- multi-step size, $\alpha$ --- degree of prioritized experience replay, $\beta(t)$ --- importance sampling bias correction for prioritized experience replay, $\zeta^*$ --- neural network, SGD optimizer. \vspace{0.3cm} Initialize weights $\theta$ of neural net $\zeta^*$ arbitrary \\ Initialize $\theta^- \gets \theta$ \\ Precompute support grid $z_i = V_{\min} + \frac{i}{A - 1}(V_{\max} - V_{\min})$ \\ \textbf{On each interaction step:} \begin{enumerate} \item select $a = \mathop{argmax}\limits_a \sum_{i} z_i\zeta^*_i(s, a, \theta, \varepsilon), \varepsilon \sim \mathcal{N}(0, I)$ \item observe transition $(s, a, r', s', \operatorname{done})$ \item construct $N$-step transition $T = \left( s, a, \sum_{n=0}^N \gamma^n r^{(n+1)}, s^{(N)}, \operatorname{done} \right)$ and add it to experience replay with priority $\max_T \rho(T)$ \item sample batch of size $B$ from experience replay using probabilities $\mathcal{P}(T) \propto \rho(T)^\alpha$ \item compute weights for the batch (where $M$ is the size of experience replay memory) $$w(T) = \left( \frac{1}{M\mathcal{P}(T)} \right)^{\beta(t)}$$ \item for each transition $T = (s, a, \bar{r}, \bar{s}, \operatorname{done} )$ from the batch compute target (detached from computational graph to prevent backpropagation): $$\varepsilon_1, \varepsilon_2 \sim \mathcal{N}(0, I)$$ $$\mathcal{P}(y(T) = \bar{r} + \gamma^N z_i) = \zeta^*_i\left( \bar{s}, \mathop{argmax}_{\bar{a}} \sum_{i} z_i \zeta^*_i(\bar{s}, \bar{a}, \theta, \varepsilon_1), \theta^-, \varepsilon_2 \right)$$ \item project $y(T)$ on support $\{ z_0, z_1 \dots z_{A-1} \}$ \item update transition priorities $$\rho(T) \gets \operatorname{KL}(y(T) \parallel Z^*(s, a, \theta, \varepsilon)), \varepsilon \sim \mathcal{N}(0, I)$$ \item compute loss: $$\operatorname{Loss} = \frac{1}{B}\sum_T w(T) \rho(T) $$ \item make a step of gradient descent using $\frac{\partial \operatorname{Loss} }{\partial \theta}$ \item if $t \mod K = 0$: $\theta^- \gets \theta$ \end{enumerate} \end{algorithmbox} \newpage \section{Policy Gradient algorithms}\label{policygradient} \subsection{Policy Gradient theorem}\label{pgt} Alternative approach to solving RL task is direct optimization of objective \begin{equation}\label{policygradientgoal} J(\theta) = \mathbb{E}_{\mathcal{T} \sim \pi_\theta} \sum_{t=1} \gamma^{t-1}r_t \to \max_{\theta} \end{equation}as a function of $\theta$. Policy gradient methods provide a framework how to construct an efficient optimization procedure based on stochastic first-order optimization within RL setting. We will assume that $\pi_\theta(a \mid s)$ is a stochastic policy parameterized with $\theta \in \Theta$. It turns out, that if $\pi$ is differentiable by $\theta$, then so is our goal (\ref{policygradientgoal}). We now proceed to discuss the technique of derivative calculation which is based on employment of \emph{log-derivative trick}: \begin{proposition} For arbitrary distribution $\pi(a)$ parameterized by $\theta$: \begin{equation}\label{logderivative} \nabla_\theta \pi(a) = \pi(a) \nabla_\theta \log \pi(a) \end{equation} \end{proposition} In most general form, this trick allows us to derive the gradient of expectation of an arbitrary function $f(a, \theta): \mathcal{A} \times \Theta \to \mathbb{R}$, differentiable by $\theta$, with respect to some distribution $\pi_\theta(a)$, also parameterized by $\theta$: \begin{align*} \nabla_\theta \mathbb{E}_{a \sim \pi_\theta(a)} f(a, \theta) &= \nabla_\theta \int_{\mathcal{A}} \pi_\theta(a) f(a, \theta) da = \\ &= \int_{\mathcal{A}} \nabla_\theta \left[ \pi_\theta(a) f(a, \theta) \right] da = \\ \{ \text{product rule} \}&= \int_{\mathcal{A}} \left[ \nabla_\theta \pi_\theta(a) f(a, \theta) + \pi_\theta(a) \nabla_\theta f(a, \theta) \right] da = \\ &= \int_{\mathcal{A}} \nabla_\theta \pi_\theta(a) f(a, \theta) da + \mathbb{E}_{\pi_\theta(a)} \nabla_\theta f(a, \theta) = \\ \{ \text{log-derivative trick (\ref{logderivative})} \}&= \int_{\mathcal{A}} \pi_\theta(a) \nabla_\theta \log \pi_\theta(a) f(a, \theta) da + \mathbb{E}_{\pi_\theta(a)} \nabla_\theta f(a, \theta) = \\ &= \mathbb{E}_{\pi_\theta(a)} \nabla_\theta \log \pi_\theta(a) f(a, \theta) + \mathbb{E}_{\pi_\theta(a)} \nabla_\theta f(a, \theta) \end{align*} This technique can be applied sequentially (to expectations over $\pi_\theta(a_0 \mid s_0)$, $\pi_\theta(a_1 \mid s_1)$ and so on) to obtain the gradient $\nabla_\theta J(\theta)$. \begin{proposition} \textbf{(Policy Gradient Theorem)} \citep{sutton2000policy} For any MDP and differentiable policy $\pi_\theta$ the gradient of objective (\ref{policygradientgoal}) is \begin{equation}\label{gradient} \nabla_{\theta} J(\theta) = \mathbb{E}_{\mathcal{T} \sim \pi_\theta} \sum_{t=0} \gamma^t \nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t) Q^\pi(s_t, a_t) \end{equation} \end{proposition} For future references, we require another form of formula (\ref{gradient}), which provides another point of view. For this purpose, let us define a discounted state visitation frequency: \begin{definition}\label{dsvf} For given MDP and given policy $\pi$ its \emph{discounted state visitation frequency} is defined by $$d_\pi(s) \coloneqq (1 - \gamma)\sum_{t = 0} \gamma^t \mathcal{P}(s_t = s)$$ where $s_t$ are taken from trajectories $\mathcal{T}$ sampled using given policy $\pi$. \end{definition} Discounted state visitation frequencies, if normalized, represent a marginalized probability for agent to land in a given state $s$\footnote{the $\gamma^t$ weighting in this definition is often introduced to incorporate the same reduction of contribution of later states in the whole gradient according to (\ref{gradient}). Similar notation is sometimes used for state visitation frequency without discount.}. It is rarely attempted to be learned, but it assists theoretical study by allowing us to rewrite expectations over trajectories with separated intrinsic and extrinsic randomness of the decision making process: \begin{equation}\label{gradientalt} \nabla_{\theta} J(\theta) = \mathbb{E}_{s \sim d_\pi(s)} \mathbb{E}_{a \sim \pi(a \mid s)}\nabla_{\theta} \log \pi_{\theta}(a \mid s) Q^\pi(s, a) \end{equation} This form is equivalent to (\ref{gradient}) as sampling a trajectory and going through all visited states with weights $\gamma^t$ induces the same distribution as defined in $d_\pi(s)$. Now, although we acquired an explicit form of objective's gradient, we are able to compute it only approximately, using Monte-Carlo estimation for expectations via sampling one or several trajectories. Second form of gradient (\ref{gradientalt}) reveals that it is possible to use roll-outs of trajectories without waiting for episode ending, as the states for the roll-outs come from the same distribution as they would for complete episode trajectories\footnote{in practice and in most policy gradients algorithms, sampling roll-outs never include $\gamma^t$ weights, which formally corresponds to estimating gradient using incorrect equation (<<approximation>>): $$\nabla_{\theta} J(\theta) \approx \mathbb{E}_{\mathcal{T} \sim \pi_\theta} \sum_{t=0} \nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t) Q^\pi(s_t, a_t)$$ which differs from the correct version (\ref{gradient}) in ignoring $\gamma^t$ multiplier. On the one hand, it equalizes the contribution of different terms and agrees with intuition, but on the other hand such gradient estimation does not imply optimization of any reasonable objective and breaks the idea of straightforward gradient ascent \citep{nota2019policy}. }. The essential thing is that exactly the policy $\pi(\theta)$ must be used for sampling to obtain unbiased Monte-Carlo estimation (otherwise state visitation frequency $d_\pi(s)$ is different). These features are commonly underlined by notation $\mathbb{E}_\pi$, which is a shorter form of $\mathbb{E}_{s \sim d_\pi(s)} \mathbb{E}_{a \sim \pi(a \mid s)}$. When convenient, we will use it to reduce the gradient to a shorter form: \begin{equation}\label{gradientshort} \nabla_{\theta} J(\theta) = \mathbb{E}_{\pi(\theta)}\nabla_{\theta} \log \pi_{\theta}(a \mid s) Q^\pi(s, a) \end{equation} Second important thing worth mentioning is that $Q^\pi(s, a)$ is essentially present in the gradient. Remark that it is never available to the algorithm and must also be somehow estimated. \subsection{REINFORCE}\label{reinforce_section} REINFORCE \citep{williams1992simple} provides a straightforward approach to approximately calculate the gradient (\ref{gradient}) in episodic case using Monte-Carlo estimation: $N$ games are played and Q-function under policy $\pi$ is approximated with corresponding return: $$Q^\pi(s, a) = \mathbb{E}_{\mathcal{T} \sim \pi_\theta \mid s, a} R(\mathcal{T}) \approx R(\mathcal{T}), \quad \mathcal{T} \sim \pi_\theta \mid s, a$$ The resulting formula is therefore the following: \begin{equation}\label{reinforce} \nabla_{\theta} J(\theta) \approx \frac{1}{N}\sum_{\mathcal{T}}^N \sum_{t=0} \left[ \gamma^t \nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t) \left( \sum_{t' = t} \gamma^{t' - t}r_{t' + 1}\right) \right] \end{equation} This estimation is unbiased as both approximation of $Q^\pi$ and approximation of expectation over trajectories are done using Monte-Carlo. Given that estimation of gradient is unbiased, stochastic gradient ascent or more advanced stochastic optimization techniques are known to converge to local optimum. From theoretical point of view REINFORCE can be applied straightforwardly for any parametric family $\pi_{\theta}(a \mid s)$ including neural networks. Yet the enormous time required for convergence and the problem of stucking in local optimums make this naive approach completely impractical. The main source of problems is believed to be the \emph{high variance} of gradient estimation (\ref{reinforce}), as the convergence rate of stochastic gradient descent directly depends on the variance of gradient estimation. The standard technique of variance reduction is an introduction of \emph{baseline}. The idea is to add some term that will not affect the expectation, but may affect the variance. One such baseline can be derived using following reasoning: for any distribution it is true that $\int\limits_\mathcal{A} \pi_\theta(a \mid s) da = 1$. Taking the gradient $\nabla_\theta$ from both sides, we obtain: \begin{align*} 0 &= \int_\mathcal{A} \nabla_\theta \pi_\theta(a \mid s) da = \\ \{\text{log-derivative trick (\ref{logderivative})}\} &= \int_\mathcal{A} \pi_\theta(a \mid s) \nabla_\theta \log \pi_\theta(a \mid s) da = \\ & = \mathbb{E}_{\pi_\theta(a \mid s)} \nabla_\theta \log \pi_\theta(a \mid s) \end{align*} Multiplying this expression on some constant, we can scale this baseline: $$\mathbb{E}_{\pi_\theta(a \mid s)} \operatorname{const}(a) \nabla_\theta \log \pi_\theta(a \mid s) = 0$$ Notice that the constant here must be independent of $a$, but may depend on $s$. Application of this technique to our case provides the following result\footnote{this result can be generalized by introducing different baselines for estimation of different components of $\nabla_\theta J(\theta)$.}: \begin{proposition} For any arbitrary function $b(s) \colon \mathcal{S} \to \mathbb{R}$, called \emph{baseline}: $$\nabla_{\theta} J(\theta) = \mathbb{E}_{\mathcal{T} \sim \pi_\theta} \sum_{t=0} \gamma^t \nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t) \left( Q^\pi(s_t, a_t) - b(s_t) \right)$$ \end{proposition} Selection of the baseline is up to us as long as it does not depend on actions $a_t$. The intent is to choose it in a way that minimizes the variance. It is believed that high variance of (\ref{reinforce}) originates from multiplication of $Q^\pi(s, a)$, which may have arbitrary scale (e.~.g. in a range $[100, 200]$) while $\nabla_\theta \log \pi_\theta(a_t \mid s_t)$ naturally has varying signs\footnote{this follows, for example, from baseline derivation.}. To reduce the variance, the baseline must be chosen so that absolute values of expression inside the expectation are shifted towards zero. Wherein the optimal baseline is provided by the following theorem: \begin{proposition} The solution for $$\mathbb{V}_{\mathcal{T} \sim \pi_\theta} \sum_{t=0} \gamma^t \nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t) \left( Q^\pi(s_t, a_t) - b(s_t) \right) \to \min_{b(s)}$$ is given by \begin{equation}\label{optimalbaseline} b(s) = \frac{\mathbb{E}_{a \sim \pi_\theta(a \mid s)} \gamma^t \|\nabla_{\theta} \log \pi_{\theta}(a \mid s)\|_2^2 Q^\pi(s, a)}{\mathbb{E}_{a \sim \pi_\theta(a \mid s)} \|\nabla_{\theta} \log \pi_{\theta}(a \mid s)\|_2^2} \end{equation} \end{proposition} As can be seen, optimal baseline calculation involves expectations which again can only be computed (in most cases) using Monte-Carlo (both for numerator and denominator). For that purpose, for every visited state $s$ estimations of $Q^\pi(s, a)$ are needed for all (or some) actions $a$, as otherwise estimation of baseline will coincide with estimation of $Q^\pi(s, a)$ and collapse gradient to zero. Practical utilization of result (\ref{optimalbaseline}) is to consider a constant baseline independent of $s$ with similar optimal form: $$b = \frac{\mathbb{E}_{\mathcal{T} \sim \pi_\theta} \sum_{t = 0} \gamma^t \|\nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t)\|_2^2 Q^\pi(s_t, a_t)}{\mathbb{E}_{\mathcal{T} \sim \pi_\theta} \sum_{t = 0} \|\nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t)\|_2^2}$$ Utilization of some kind of baseline, not necessarily optimal, is known to significantly reduce the variance of gradient estimation and is an essential part of any policy gradient method. The final step to make this family of algorithms applicable when using deep neural networks is to reduce variance of $Q^\pi$ estimation by employing RL task structure like it was done in value-based methods. \subsection{Advantage Actor-Critic (A2C)}\label{A2C} Suppose that in optimal baseline formula (\ref{optimalbaseline}) it happens that $\|\nabla_{\theta} \log \pi_{\theta}(a \mid s)\|_2^2 = \operatorname{const}(a)$. Though in reality this is actually not true, under this circumstance the optimal baseline formula significantly reduces and unravels a close-to-optimal but simple form of baseline: $$b(s) = \gamma^t \mathbb{E}_{a \sim \pi_\theta(a \mid s)} Q^\pi(s, a) = \gamma^t V^{\pi}(s)$$ Substituting this baseline into gradient formula (\ref{gradientshort}) and recalling the definition of advantage function (\ref{advantage}), the gradient can now be rewritten as follows: \begin{equation}\label{ACgradient} \nabla_{\theta} J(\theta) = \mathbb{E}_{\pi(\theta)} \nabla_{\theta} \log \pi_{\theta}(a \mid s) A^\pi(s, a) \end{equation} This representation of gradient is used as the basement for most policy gradient algorithms as it offers lower variance while selecting the baseline expressed in terms of value functions which can be efficiently learned similar to how it was done in value-based methods. Such algorithms are usually named Actor-Critic as they consist of two neural networks: $\pi_\theta(a \mid s)$, representing a policy, called an \emph{actor}, and $V^\pi_\phi(s)$ with parameters $\phi$, approximately estimating actor's performance, called a \emph{critic}. Note that the choice of value function to learn can be arbitrary; it is possible to learn $Q^\pi$ or $A^\pi$ instead, as all of them are deeply interconnected. Value function $V^\pi$ is chosen as the simplest one since it depends only on state and thus is hoped to be easier to learn. Having a critic $V^\pi_\phi(s)$, Q-function can be approximated in a following way: $$Q^\pi(s, a) \approx r' + \gamma V^\pi(s') \approx r' + \gamma V^\pi_\phi(s')$$ First approximation is done using Monte-Carlo, while second approximation inevitably introduces bias. Important thing to notice is that at this moment our gradient estimation stops being unbiased and all theoretical guarantees of converging are once again lost. Advantage function therefore can be obtained according to the definition: \begin{equation}\label{onestepadvantage} A^\pi(s, a) = Q^\pi(s, a) - V^\pi(s) \approx r' + \gamma V^\pi_\phi(s') - V^\pi_\phi(s) \end{equation} Note that biased estimation of baseline doesn't make gradient estimation biased by itself, as baseline can be an arbitrary function of state. All bias introduction happens inside the approximation of $Q^\pi$. It is possible to use critic only for baseline, which allows complete avoidance of bias, but then the only way to estimate $Q^\pi$ is via playing several games and using corresponding returns, which suffers from higher variance and low sample efficiency. The logic behind training procedure for the critic is taken from value-based methods: for given policy $\pi$ its value function can be obtained using point iteration for solving $$V^\pi(s) = \mathbb{E}_{a \sim \pi(a \mid s)}\mathbb{E}_{s' \sim p(s' \mid s, a)} \left[r' + \gamma V^\pi(s') \right]$$ Similar to DQN, on each update a target is computed using current approximation $$y = r' + \gamma V^\pi_\phi(s')$$ and then MSE is minimized to move values of $V^\pi_\phi(s)$ towards the guess. Notice that to compute the target for critic we require samples from the policy $\pi$ which is being evaluated. Although actor evolves throughout optimization process, we assume that one update of policy $\pi$ does not lead to significant change of true $V^\pi$ and thus our critic, which approximates value function for older version of policy, is close enough to construct the target. But if samples from, for example, old policy are used to compute the guess, the step of critic update will correspond to learning the value function for old policy other than current. Essentially, this means that both actor and critic training procedures require samples from current policy $\pi$, making Actor-Critic algorithm \emph{on-policy} by design. Consequently, samples that were collected on previous update iterations become useless and can be forgotten. This is the key reason why policy gradient algorithms are usually less sample-efficient than value-based. Now as we have an approximation of value function, advantage estimation can be done using one-step transitions (\ref{onestepadvantage}). As the procedure of training an actor, i.~.e. gradient estimation (\ref{ACgradient}), also does not demand sampling the whole trajectory, each update now requires only a small roll-out to be sampled. The amount of transitions in the roll-out corresponds to the size of mini-batch. The problem with roll-outs is that the data is obviously not i.~i.~d., which is crucial for training networks. In value-based methods, this problem was solved with experience replay, but in policy gradient algorithms it is essential to collect samples from scratch after each update of the networks parameters. The practical solution for simulated environments is to launch several instances of environment (for example, on different cores of multiprocessor) in parallel threads and have several parallel interactions. After several steps in each environment, the batch for update is collected by uniting transitions from all instances and one synchronous\footnote{there is also an asynchronous modification of advantage actor critic algorithm (A3C) which accelerates the training process by storing a copy of network for each thread and performing weights synchronization from time to time.} update of networks parameters $\theta$ and $\phi$ is performed. One more optimization that can be done is to partially share weights of networks $\theta$ and $\phi$. It is justified as first layers of both networks correspond to basic features extraction and these features are likely to be the same for optimal policy and value function. While it reduces the number of training parameters almost twice, it might destabilize learning process as the scales of gradient (\ref{ACgradient}) and gradient of critic's MSE loss may be significantly different, so they should be balanced with additional hyperparameter. \begin{algorithmbox}[label = A2Calgorithm]{Advantage Actor-Critic (A2C)} \textbf{Hyperparameters:} $B$ --- batch size, $V^*_\phi$ --- critic neural network, $\pi_\theta$ --- actor neural network, $\alpha$ --- critic loss scaling, SGD optimizer. \vspace{0.3cm} Initialize weights $\theta, \phi$ arbitrary \\ \textbf{On each step:} \begin{enumerate} \item obtain a roll-out of size $B$ using policy $\pi(\theta)$ \item for each transition $T$ from the roll-out compute advantage estimation: $$A^\pi(T) = r' + \gamma V^\pi_\phi(s') - V^\pi_\phi$$ \item compute target (detached from computational graph to prevent backpropagation): $$y(T) = r' + \gamma V^\pi_\phi(s')$$ \item compute critic loss: $$\operatorname{Loss} = \frac{1}{B}\sum_T \left( y(T) - V^\pi_\phi \right) ^2$$ \item compute critic gradients: $$\nabla^{\operatorname{critic}} = \frac{\partial \operatorname{Loss}}{\partial \phi}$$ \item compute actor gradient: $$\nabla^{\operatorname{actor}} = \frac{1}{B}\sum_T \nabla_\theta \log \pi_\theta(a \mid s)A^\pi(T)$$ \item make a step of gradient descent using $\nabla^{\operatorname{actor}} + \alpha \nabla^{\operatorname{critic}}$ \end{enumerate} \end{algorithmbox} \subsection{Generalized Advantage Estimation (GAE)}\label{GAE} There is a design dilemma in Advantage Actor Critic algorithm concerning the choice whether to use the critic to estimate $Q^\pi(s, a)$ and introduce bias into gradient estimation or to restrict critic employment only for baseline and cause higher variance with necessity of playing the whole episodes for each update step. Actually, the range of possibilities is wider. Since Actor-Critic is an on-policy algorithm by design, we are free to use $N$-step approximations instead of one-step: using $$Q^\pi(s, a) \approx \sum_{n = 0}^{N - 1} \gamma^n r^{(n + 1)} + \gamma^N V^\pi \left( s^{(N)} \right)$$ we can define $N$-step advantage estimator as $$A^\pi_{(N)}(s, a) \coloneqq \sum_{n = 0}^{N - 1} \gamma^n r^{(n + 1)} + \gamma^N V^\pi_\phi \left( s^{(N)} \right) - V^\pi_\phi(s)$$ For $N = 1$ this estimation corresponds to Actor-Critic one-step estimation with high bias and low variance. For $N = \infty$ it yields the estimator with critic used only for baseline with no bias and high variance. Intermediate values correspond to something in between. Note that to use $N$-step advantage estimation we have to perform $N$ steps of interaction after given state-action pair. Usually finding a good value for $N$ as hyperparameter is difficult as its <<optimal>> value may float throughout the learning process. In Generalized Advantage Estimation (GAE) \citep{schulman2015high} it is proposed to construct an ensemble out of different $N$-step advantage estimators using exponential smoothing with some hyperparameter $\lambda$: \begin{equation}\label{GAEadest} A^\pi_{\operatorname{GAE}}(s, a) \coloneqq (1 - \lambda) \left( A^\pi_{(1)}(s, a) + \lambda A^\pi_{(2)}(s, a) + \lambda^2 A^\pi_{(3)}(s, a) + \dots \right) \end{equation} Here the parameter $\lambda \in [0, 1]$ allows smooth control over bias-variance trade-off: $\lambda = 0$ corresponds to Actor-Critic with higher bias and lower variance while $\lambda \to 1$ corresponds to REINFORCE with no bias and high variance. But unlike $N$ as hyperparameter, it uses mix of different estimators in intermediate case. GAE proved to be a convenient way how more information can be obtained from collected roll-out in practice. Instead of waiting for episode termination to compute (\ref{GAEadest}) we may use <<truncated>> GAE which ensembles only those $N$-step advantage estimators that are available: \begin{equation*} A^\pi_{\operatorname{trunc. GAE}}(s, a) \coloneqq \frac{ A^\pi_{(1)}(s, a) + \lambda A^\pi_{(2)}(s, a) + \lambda^2 A^\pi_{(3)}(s, a) + \dots + \lambda^{N - 1} A^\pi_{(N)}(s, a)}{1 + \lambda + \lambda^2 + \dots + \lambda^{N - 1}} \end{equation*} Note that the amount $N$ of available estimators may be different for different transitions from roll-out: if we performed $K$ steps of interaction in some instance of environment starting from some state-action pair $s, a$, we can use $N = K$ step estimators; for next state-action pair $s', a'$ we have only $N = K - 1$ transitions and so on, while the last state-action pair $s^{N - 1}, a^{N - 1}$ can be estimated only using $A^\pi_{(1)}$ as only $N = 1$ following transition is available. Although different transitions are estimated with different precision (leading to different bias and variance), this approach allows to use all available information for each transition and utilize multi-step approximations without dropping last transitions of roll-outs used only for target computation. \subsection{Natural Policy Gradient (NPG)}\label{NPG} In this section we discuss the motivation and basic principles behind the idea of natural gradient descent, which we will require for future references. The standard gradient descent optimization method is known to be extremely sensitive to the choice of parametrization. Suppose we attempt to solve the following optimization task: $$f(q) \to \min_q$$ where $q$ is a distribution and $F$ is arbitrary differentiable function. We often restrict $q$ to some parametric family and optimize similar objective, but with respect to some vector of parameters $\theta$ as unknown variable: $$f(q_\theta) \to \min_{\theta}$$ Classic example of such problem is maximum likelihood task when we try to fit the parameters of our model to some observed data. The problem is that when using standard gradient descent both the convergence rate and overall performance of optimization method substantially depend on the choice of parametrization $q_\theta$. The problem holds even if we fix specific distribution family as many distribution families allow different parametrizations. To see why gradient descent is parametrization-sensitive, consider the model which is used at some current point $\theta_k$ to determine the direction of next optimization step: $$\begin{cases} f(q_{\theta_k}) + \langle \nabla_\theta f(q_{\theta_k}), \delta \theta \rangle \to \min\limits_{\delta \theta} \\ \|\delta \theta\|_2^2 < \alpha_k \end{cases}$$ where $\alpha_k$ is learning rate at step $k$. Being first-order method, gradient descent constructs a <<model>> which approximates $F$ locally around $\theta_k$ using first-order Taylor expansion and employs standard Euclidean metric to determine a region of trust for this model. Then this surrogate task is solved analytically to obtain well-known update formula: $$\delta \theta \propto -\nabla_\theta f(q_{\theta_k})$$ The issue arises from reliance on Eucliden metric in the space of parameters. In most parametrizations, small changes in parameters space do not guarantee small change in distribution space and vice versa: some small changes in distribution may demand big steps in parameters space\footnote{classic example is that $\mathcal{N}(0, 100)$ is similar to $\mathcal{N}(1, 100)$ while $\mathcal{N}(0, 0.1)$ is completely different from $\mathcal{N}(1, 0.1)$, although Euclidean distance in parameter space is the same for both pairs.}. Natural gradient proposes to use another metric, which achieves invariance to parametrization of distribution $q$ using the properties of Fisher matrix: \begin{definition} For distribution $q_\theta$ \emph{Fisher matrix} $F_q(\theta)$ is defined as $$F_q(\theta) \coloneqq \mathbb{E}_{x \sim q} \nabla_\theta \log q_\theta(x) (\nabla_\theta \log q_\theta(x))^T$$ \end{definition} Note that Fisher matrix depends on parametrization. Yet for any parametrization it is guaranteed to be positive semi-definite by definition. Moreover, it induces a so-called \emph{Riemannian metric}\footnote{in Euclidean space the general form of scalar product is $\langle x, y \rangle \coloneqq x^TGy$, where $G$ is fixed positive semi-definite matrix. The metric induced by this scalar product is correspondingly $d(x, y)^2 \coloneqq (y - x)^T G (y - x)$. The difference in Riemannian space is that $G$, called \emph{metric tensor}, depends on $x$, so the relative distance may vary for different points. It is used to describe the distances between points on manifolds and holds important properties which Fisher matrix inherits as metric tensor for distribution space.} in the space of parameters: $$d(\theta_1, \theta_2)^2 \coloneqq (\theta_2 - \theta_1)^T F_q(\theta_1) (\theta_2 - \theta_1)$$ In natural gradient descent it is proposed to use this metric instead of Euclidean: $$\begin{cases} f(q_{\theta_k}) + \langle \nabla_\theta f(q_{\theta_k}), \delta \theta \rangle \to \min\limits_{\delta \theta} \\ \delta \theta^T F_q(\theta_k) \delta \theta < \alpha_k \end{cases}$$ This surrogate task can be solved analytically to obtain the following optimization direction: \begin{equation}\label{naturalgradient} \delta \theta \propto -F_q(\theta_k)^{-1} \nabla_\theta f(q_{\theta_k}) \end{equation} The direction of gradient descent is corrected by Fisher matrix which concerns the scale across different axes. This direction, specified by $F_q(\theta_k)^{-1} \nabla_\theta f(q_{\theta_k})$, is called \emph{natural gradient}. Let's discuss why this new metric really provides us invariance to distribution parametrization. We already obtained natural gradient for $q$ being parameterized by $\theta$ (\ref{naturalgradient}). Assume that we have another parametrization $q_\nu$. These new parameters $\nu$ are somehow related to $\theta$; we suppose there is some functional dependency $\theta(\nu)$, which we assume to be differentiable with jacobian $J$. In this notation: \begin{equation}\label{jacobian} \delta \theta = J \delta \nu \text{,} \qquad J_{ij} \coloneqq \frac{\partial \theta_i}{\partial \nu_j} \end{equation} The central property of Fisher matrix, which provides the desired invariance, is the following: \begin{proposition} If $\theta = \theta(\nu)$ with jacobian $J$, then reparametrization formula for Fisher matrix is \begin{equation}\label{Fisherreparam} F_q(\nu) = J^T F_q(\theta) J \end{equation} \end{proposition} Now it can be derived that natural gradient for parametrization with $\nu$ is the same as for $\theta$. If we want to calculate natural gradient in terms of $\nu$, then our step is, according to (\ref{jacobian}): \begin{align*} \delta \theta = J \delta \nu &= \\ \{ \text{natural gradient in terms of $\nu$} \} & \propto J F_q(\nu_k)^{-1} \nabla_\nu f(q_{\nu_k}) = \\ \{ \text{Fisher matrix reparametrization (\ref{Fisherreparam})} \} &= J\left( J^TF_q(\theta_k)J \right) ^{-1} \nabla_\nu f(q_{\nu_k}) \\ \{ \text{chain rule} \} &= J\left( J^TF_q(\theta_k)J \right) ^{-1} \nabla_\nu \theta(\nu_k)^T \nabla_\theta f(q_{\theta_k}) = \\ &= JJ^{-1}F_q(\theta_k)^{-1}J^{-T} J^T \nabla_\theta f(q_{\theta_k}) = \\ &= F_q(\theta_k)^{-1} \nabla_\theta f(q_{\theta_k}) \end{align*} which can be seen to be the same as in (\ref{naturalgradient}). Application of natural gradient descent in DRL setting is complicated in practice. Theoretically, the only change that must be done is scaling of gradient using inverse Fisher matrix (\ref{naturalgradient}). Yet, Fisher matrix requires $n^2$ memory and $\mathcal{O}(n^3)$ computational costs for inversion where $n$ is the number of parameters. For neural networks this causes the same complications as the application of second-order optimization methods. K-FAC optimization method \citep{martens2015optimizing} provides a specific approximation form of Fisher matrix for neural networks with linear layers which can be efficiently computed, stored and inverted. Usage of K-FAC approximation allows to compute natural gradient directly using (\ref{naturalgradient}). \subsection{Trust-Region Policy Optimization (TRPO)} The main drawback of Actor-Critic algorithm is believed to be the abandonment of experience that was used for previous updates. As the number of updates required is usually huge, this is considered to be a substantial loss of information. Yet, it is not clear how this information can be effectively used for newer updates. Suppose we want to make an update of $\pi(\theta)$, but using samples collected by some $\pi^{\operatorname{old}}$. The straightforward approach is importance sampling technique, which naive application to gradient formula (\ref{ACgradient}) yields the following result: $$ \nabla_{\theta} J(\theta) = \mathbb{E}_{\mathcal{T} \sim \pi^{\operatorname{old}}} \frac{\mathcal{P}(\mathcal{T} \mid \pi(\theta))}{\mathcal{P}(\mathcal{T} \mid \pi^{\operatorname{old}})} \sum_{t=0} \nabla_{\theta} \log \pi_{\theta}(a_t \mid s_t) A^\pi(s_t, a_t) $$ The emerged importance sampling weight is actually computable as transition probabilities cross out: $$\frac{\mathcal{P}(\mathcal{T} \mid \pi(\theta))}{\mathcal{P}(\mathcal{T} \mid \pi^{\operatorname{old}})} = \frac{\prod_{t=1} \pi_\theta(a_t \mid s_t)}{\prod_{t=1} \pi^{\operatorname{old}}(a_t \mid s_t)}$$ The problem with this coefficient is that it tends either to be exponentially small or to explode. Even with some heuristic normalization of coefficients the batch gradient would become dominated by one or several transitions and destabilize the training procedure by introducing even more variance. Notice that application of importance sampling to another representation of gradient (\ref{gradientshort}) yields seemingly different result: \begin{equation}\label{policygradientISalt} \nabla_{\theta} J(\theta) = \mathbb{E}_{\pi^{\operatorname{old}}} \frac{d_{\pi(\theta)}(s)}{d_{\pi^{\operatorname{old}}}(s)} \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)} \nabla_{\theta} \log \pi_{\theta}(a \mid s) A^\pi(s, a) \end{equation} Here we avoided common for the whole trajectories importance sampling weights by using the definition of state visitation frequencies. But this result is even less practical as these frequencies are unknown to us. The first key idea behind the theory concerning this problem is that may be these importance sampling coefficients behave more stable if the policies $\pi^{\operatorname{old}}$ and $\pi(\theta)$ are in some terms <<close>>. Intuitively, in this case $\frac{d_{\pi(\theta)}(s)}{d_{\pi^{\operatorname{old}}}(s)}$ of formula (\ref{policygradientISalt}) is close to 1 as state visitation frequencies are similar, and the remained importance sampling coefficient becomes acceptable in practice. And if some two policies are similar, their values of our objective (\ref{RLgoal}) are probably close too. \allowdisplaybreaks For any two policies, $\pi$ and $\pi^{\operatorname{old}}$: \begin{align*} J(\pi) - J(\pi^{\operatorname{old}}) &= \mathbb{E}_{\mathcal{T} \sim \pi} \sum_{t=0} \gamma^t r(s_t) - J(\pi^{\operatorname{old}}) = \\ &= \mathbb{E}_{\mathcal{T} \sim \pi} \sum_{t=0} \gamma^t r(s_t) - V^{\pi^{\operatorname{old}}}(s_0) = \\ &= \mathbb{E}_{\mathcal{T} \sim \pi} \left[\sum_{t=0} \gamma^t r(s_t) - V^{\pi^{\operatorname{old}}}(s_0) \right] = \\ \{ \text{trick $\textstyle \sum_{t = 0}^\infty \left( a_{t+1} - a_t \right) = -a_0$\footnotemark} \} &= \mathbb{E}_{\mathcal{T} \sim \pi} \left[\sum_{t=0} \gamma^t r(s_t) + \sum_{t=0} \left[ \gamma^{t+1} V^{\pi^{\operatorname{old}}}(s_{t+1}) - \gamma^t V^{\pi^{\operatorname{old}}}(s_t) \right] \right] = \\ \{ \text{regroup} \} &= \mathbb{E}_{\mathcal{T} \sim \pi} \sum_{t=0} \gamma^t \left( r(s_t) + \gamma V^{\pi^{\operatorname{old}}}(s_{t+1}) - V^{\pi^{\operatorname{old}}}(s_t) \right) = \\ \{ \text{by definition (\ref{QV})} \} &= \mathbb{E}_{\mathcal{T} \sim \pi} \sum_{t=0} \gamma^t \left( Q^{\pi^{\operatorname{old}}}(s_t, a_t) - V^{\pi^{\operatorname{old}}}(s_t) \right) \\ \{ \text{by definition (\ref{advantage})} \} &= \mathbb{E}_{\mathcal{T} \sim \pi} \sum_{t=0} \gamma^t A^{\pi^{\operatorname{old}}}(s_t, a_t) \end{align*} \footnotetext{and if MDP is episodic, for terminal states $V^{\pi^{\operatorname{old}}}(s_T) = 0$ by definition.} The result obtained above is often referred to as \emph{relative policy performance identity} and is actually very interesting: it states that we can substitute reward with advantage function of arbitrary policy and that will shift the objective by the constant. Using the discounted state visitation frequencies definition \ref{dsvf}, relative policy performance identity can be rewritten as \begin{equation*} J(\pi) - J(\pi^{\operatorname{old}}) = \frac{1}{1 - \gamma}\mathbb{E}_{s \sim d_\pi(s)} \mathbb{E}_{a \sim \pi(a \mid s)} A^{\pi^{\operatorname{old}}}(s, a) \end{equation*} Now assume we want to optimize parameters $\theta$ of policy $\pi$ while using data collected by $\pi^{\operatorname{old}}$: applying importance sampling in the same manner: \begin{equation*} J(\pi_\theta) - J(\pi^{\operatorname{old}}) = \frac{1}{1 - \gamma}\mathbb{E}_{s \sim d_{\pi^{\operatorname{old}}}(s)} \frac{d_{\pi_\theta}(s)}{d_{\pi^{\operatorname{old}}}(s)} \mathbb{E}_{a \sim \pi^{\operatorname{old}}(a \mid s)} \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)} A^{\pi^{\operatorname{old}}}(s, a) \end{equation*} As we have in mind the idea of $\pi^{\operatorname{old}}$ being close to $\pi_\theta$, the question is how well this identity can be approximated if we assume $d_{\pi_\theta}(s) = d_{\pi^{\operatorname{old}}}(s)$. Under this assumption: \begin{equation*} J(\pi_\theta) - J(\pi^{\operatorname{old}}) \approx L_{\pi^{\operatorname{old}}}(\theta) \coloneqq \frac{1}{1 - \gamma}\mathbb{E}_{s \sim d_{\pi^{\operatorname{old}}}(s)} \mathbb{E}_{a \sim \pi^{\operatorname{old}}(a \mid s)} \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)} A^{\pi^{\operatorname{old}}}(s, a) \end{equation*} The point is that interaction using $\pi^{\operatorname{old}}$ corresponds to sampling from the expectations presented in $L_{\pi^{\operatorname{old}}}(\theta)$: $$L_{\pi^{\operatorname{old}}}(\theta) = \mathbb{E}_{\pi^{\operatorname{old}}} \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)} A^{\pi^{\operatorname{old}}}(s, a)$$ The approximation quality of $L_{\pi^{\operatorname{old}}}(\theta)$ can be described by the following theorem: \begin{proposition}\label{Lapproximationestimation}\citep{schulman2015trust} \begin{equation*} \left| J(\pi_\theta) - J(\pi^{\operatorname{old}}) - L_{\pi^{\operatorname{old}}}(\theta) \right| \le C \max_s \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s] \end{equation*} where $C$ is some constant and $\operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s]$ is a shorten notation for $\operatorname{KL}(\pi^{\operatorname{old}}(a \mid s) \parallel \pi_\theta(a \mid s))$. \end{proposition} There is an important corollary of proposition \ref{Lapproximationestimation}: $$J(\pi_\theta) - J(\pi^{\operatorname{old}}) \ge L_{\pi^{\operatorname{old}}}(\theta) - C \max_s \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s]$$ which not only states that expression on the right side represents a \emph{lower bound}, but also that the optimization procedure \begin{equation}\label{lowerbound} \theta_{k+1} = \mathop{argmax}_{\theta} \left[ L_{\pi_{\theta_k}}(\theta) - C \max_s \operatorname{KL}(\pi_{\theta_k} \parallel \pi_\theta)[s] \right] \end{equation} will yield a policy with guaranteed monotonic improvement\footnote{the maximum of lower bound is non-negative as its value for $\theta = \theta_k$ equals zero, which causes $J(\pi_{k+1}) - J(\pi_k) \ge 0$.}. In practice there are several obstacles which preserve us from obtaining such procedure. First of all, our advantage function estimation is never precise. Secondly, it is hard to estimate precise value of constant $C$. One last obstacle is that it is not clear how to calculate $\operatorname{KL}$-divergence in its maximal form (with $\max$ taken across all states). In Trust-Region policy optimization \citep{schulman2015trust} the idea of practical algorithm, approximating procedure (\ref{lowerbound}), is analyzed. To address the last issue, the naive approximation is proposed to substitute $\max$ with averaging across states\footnote{the distribution from which the states come is set to be $d_{\pi^{\operatorname{old}}}(s)$ for convenience as this is the distribution from which they come in $L_{\pi^{\operatorname{old}}}(\theta)$.}: $$\max_s \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s] \approx \mathbb{E}_{s \sim d_{\pi^{\operatorname{old}}}(s)} \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s]$$ The second step of TRPO is to rewrite the task of unconstrained minimization (\ref{lowerbound}) in equivalent constrained (<<trust-region>>) form\footnote{the unconstrained objective is Lagrange function for constrained form.} to incorporate the unknown constant $C$ into learning rate: \begin{equation}\label{trustregion} \begin{cases} L_{\pi^{\operatorname{old}}}(\theta) \to \max\limits_\theta \\ \mathbb{E}_{s \sim d(s \mid \pi^{\operatorname{old}})} \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s] < C \end{cases} \end{equation} Note that this rewrites an update iteration in terms of optimization methods: while $L_{\pi^{\operatorname{old}}}(\theta)$ is an approximation of true objective $J(\pi_\theta) - J(\pi^{\operatorname{old}})$, the constraint sets the region of trust to the surrogate. Remark that constraint is actually a divergence in policy space, i.~e. it is very similar to a metric in the space of distributions while the surrogate is a function of the policy and depends on parameters $\theta$ only through $\pi_\theta$. To solve the constrained problem (\ref{trustregion}), the technique from convex optimization is used. Assume that $\pi^{\operatorname{old}}$ is a current policy and we want to update its parameters $\theta_k$. Then the objective of (\ref{trustregion}) is modeled using first-order Taylor expansion around $\theta_k$ while constraint is modeled using second-order \footnote{as first-order term is zero.} Taylor approximation: $$\begin{cases} L_{\pi^{\operatorname{old}}}(\theta_k + \delta \theta) \approx \langle \nabla_\theta \left. L_{\pi^{\operatorname{old}}}(\theta) \right|_{\theta_k} , \delta \theta \rangle \to \max\limits_{\delta \theta} \\ \mathbb{E}_{s \sim d(s \mid \pi^{\operatorname{old}})} \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_{\theta_k + \delta \theta}) \approx \frac{1}{2}\mathbb{E}_{s \sim d(s \mid \pi^{\operatorname{old}})} \delta \theta^T \left. \nabla_\theta^2 \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta) \right|_{\theta_k} \delta \theta < C \end{cases} $$ It turns out, that this model is equivalent to natural policy gradient, discussed in sec. \ref{NPG}: \begin{proposition} $$\left. \nabla_\theta^2 \operatorname{KL}(\pi_\theta \parallel \pi^{\operatorname{old}})[s] \right|_{\theta_k} = F_{\pi(a \mid s)}(\theta)$$ \end{proposition} so $\operatorname{KL}$-divergence constraint can be approximated with metric induced by Fisher matrix. Moreover, the gradient of surrogate function is \begin{align*} \left. \nabla_\theta L_{\pi^{\operatorname{old}}}(\theta) \right|_{\theta_k} &= \mathbb{E}_{\pi^{\operatorname{old}}} \frac{\left. \nabla_\theta \pi_\theta(a \mid s) \right|_{\theta_k}}{\pi^{\operatorname{old}}(a \mid s)} A^{\pi^{\operatorname{old}}}(s, a) = \\ \\ \{ \pi^{\operatorname{old}} = \pi_{\theta_k} \} &= \mathbb{E}_{\pi^{\operatorname{old}}} \nabla_\theta \log \pi_{\theta_k}(a \mid s) A^{\pi^{\operatorname{old}}}(s, a) \end{align*} which is exactly an Actor-Critic gradient. Therefore the formula of update step is given by $$\delta \theta \propto -F_\pi(\theta)^{-1} \nabla_\theta L_{\pi^{\operatorname{old}}}(\theta)$$ where $\nabla_\theta L_{\pi^{\operatorname{old}}}(\theta)$ coincides with standard policy gradient, and $F_\pi(\theta)$ is hessian of $\operatorname{KL}$-divergence: $$F_\pi(\theta) \coloneqq \mathbb{E}_{s \sim d_{\pi^{\operatorname{old}}}(s)} \left. \nabla_\theta^2 \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta) \right|_{\theta_k}$$ In practical implementations $\operatorname{KL}$-divergence can be Monte-Carlo estimated using collected roll-out. The size of roll-out must be significantly bigger than in Actor-Critic to achieve sufficient precision of hessian estimation. Then to obtain a direction of optimization step the following system of linear equations $$F_\pi(\theta) \delta \theta = -\nabla_\theta L_{\pi^{\operatorname{old}}}(\theta)$$ is solved using a \emph{conjugate gradients} method which is able to work with Hessian-vector multiplication procedure instead of requiring to calculate $F_\pi(\theta)$ explicitly. TRPO also accompanies the update step with a \emph{line-search} procedure which dynamically adjusts step length using standard backtracking heuristic. As TRPO intuitively seeks for policy improvement on each step, the idea is to check whether the lower bound (\ref{lowerbound}) is positive after the biggest step allowed according to $\operatorname{KL}$-constraint and reduce the step size until it becomes positive. Unlike Actor-Critic, TRPO performs extremely expensive complicated update steps but requires relatively small number of iterations in return. Of course, due to many approximations done, the overall procedure is only a resemblance of theoretically-justified iterations (\ref{lowerbound}) providing improvement guarantees. \subsection{Proximal Policy Optimization (PPO)}\label{PPO} Proximal Policy Optimization \citep{schulman2017proximal} proposes alternative heuristic way of performing lower bound (\ref{lowerbound}) optimization which demonstrated encouraging empirical results. PPO still substitutes $\max\limits_s \operatorname{KL}$ on average, but leaves the surrogate in unconstrained form, suggesting to treat unknown constant $C$ as a hyperparameter: \begin{equation}\label{lowerboundunconstrained} \mathbb{E}_{\pi^{\operatorname{old}}} \left[ \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)} A^{\pi^{\operatorname{old}}}(s, a) - C \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s] \right] \to \max_\theta \end{equation} The naive idea would be to straightforwardly optimize (\ref{lowerboundunconstrained}) as it is equivalent to solving the constraint trust-region task (\ref{trustregion}). To avoid Hessian-involved computations, one possible option is just to perform one step of first-order gradient optimization of (\ref{lowerboundunconstrained}). Such algorithm was empirically discovered to perform poorly as importance sampling coefficients $\frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)}$ tend to unbounded growth. In PPO it is proposed to cope with this problem in a simple old-fashioned way: by clipping. Let's denote by $$r(\theta) \coloneqq \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)}$$ an importance sampling weight and by $$r^{\operatorname{clip}}(\theta) \coloneqq \mathop{clip}(r(\theta), 1 - \epsilon, 1 + \epsilon)$$ its clipped version where $\epsilon \in (0, 1)$ is a hyperparameter. Then the clipped version of lower bound is: \begin{equation}\label{PPOlowerbound} \mathbb{E}_{\pi^{\operatorname{old}}} \left[ \min \left( r(\theta) A^{\pi^{\operatorname{old}}}(s, a), r^{\operatorname{clip}}(\theta) A^{\pi^{\operatorname{old}}}(s, a)\right) - C \operatorname{KL}(\pi^{\operatorname{old}} \parallel \pi_\theta)[s] \right] \to \max_\theta \end{equation} Here the minimum operation is introduced to guarantee that the surrogate objective remains a lower bound. Thus the clipping at $1 + \epsilon$ may occur only in the case if advantage is positive while clipping at $1 - \epsilon$ may occur if advantage is negative. In both cases, clipping represents a penalty for importance sampling weight $r(\theta)$ being too far from 1. The overall procedure suggested by PPO to optimize the <<stabilized>> version of lower bound (\ref{PPOlowerbound}) is the following. A roll-out is collected using current policy $\pi^{\operatorname{old}}$ with some parameters $\theta$. Then the batches of typical size (as for Actor-Critic methods) are sampled from collected roll-out and several steps of SGD optimization of (\ref{PPOlowerbound}) proceed with respect to policy parameters $\theta$. During this process the policy $\pi^{\operatorname{old}}$ is considered to be fixed and new interaction steps are not performed, while in implementations there is no need to store old weights $\theta_k$ since everything required from $\pi^{\operatorname{old}}$ is to collect transitions and remember the probabilities $\pi^{\operatorname{old}}(a \mid s)$. The idea is that during these several steps we may use transitions from the collected roll-out several times. Similar alternative is to perform several epochs of training by passing through roll-out several times, as it is often done in deep learning. Interesting fact discovered by the authors of PPO during ablation studies is that removing $\operatorname{KL}$-penalty term doesn't affect the overall empirical performance. That is why in many implementations PPO does not include $\operatorname{KL}$-term at all, making the final surrogate objective have a following form: \begin{equation}\label{PPOobjective} \mathbb{E}_{\pi^{\operatorname{old}}} \min \left( r(\theta) A^{\pi^{\operatorname{old}}}(s, a), r^{\operatorname{clip}}(\theta) A^{\pi^{\operatorname{old}}}(s, a)\right) \to \max_\theta \end{equation} Note that in this form the surrogate is not generally a lower bound and <<improvement guarantees>> intuition is lost. \begin{algorithmbox}[label = PPOalgorithm]{Proximal Policy Optimization (PPO)} \textbf{Hyperparameters:} $B$ --- batch size, $R$ --- rollout size, $\operatorname{n\_epochs}$ --- number of epochs, $\varepsilon$ --- clipping parameter, $V^*_\phi$ --- critic neural network, $\pi_\theta$ --- actor neural network, $\alpha$ --- critic loss scaling, SGD optimizer. \vspace{0.3cm} Initialize weights $\theta, \phi$ arbitrary \\ \textbf{On each step:} \begin{enumerate} \item obtain a roll-out of size $R$ using policy $\pi(\theta)$, storing action probabilities as $\pi^{\operatorname{old}}(a \mid s)$. \item for each transition $T$ from the roll-out compute advantage estimation (detached from computational graph to prevent backpropagation): $$A^\pi(T) = r' + \gamma V^\pi_\phi(s') - V^\pi_\phi$$ \item perform $\operatorname{n\_epochs}$ passes through roll-out using batches of size $B$; \textbf{for each batch:} \begin{itemize} \item compute critic target (detached from computational graph to prevent backpropagation): $$y(T) = r' + \gamma V^\pi_\phi(s')$$ \item compute critic loss: $$\operatorname{Loss} = \frac{1}{B}\sum_T \left( y(T) - V^\pi_\phi \right) ^2$$ \item compute critic gradients: $$\nabla^{\operatorname{critic}} = \frac{\partial \operatorname{Loss}}{\partial \phi}$$ \item compute importance sampling weights: $$r_\theta(T) = \frac{\pi_\theta(a \mid s)}{\pi^{\operatorname{old}}(a \mid s)}$$ \item compute clipped importance sampling weights: $$r_\theta^{\operatorname{clip}}(T) = \mathop{clip}(r_\theta(T), 1 - \epsilon, 1 + \epsilon)$$ \item compute actor gradient: $$\nabla^{\operatorname{actor}} = \frac{1}{B}\sum_T \nabla_\theta \min \left( r_\theta(T)A^\pi(T), r_\theta^{\operatorname{clip}}(T)A^\pi(T) \right)$$ \item make a step of gradient descent using $\nabla^{\operatorname{actor}} + \alpha \nabla^{\operatorname{critic}}$ \end{itemize} \end{enumerate} \end{algorithmbox} \newpage \section{Experiments}\label{experiments} \subsection{Setup} We performed our experiments using custom implementation of discussed algorithms attempting to incorporate best features from different official and unofficial sources and unifying all algorithms in a single library interface. The full code is available at \href{https://github.com/FortsAndMills/Learning-Reinforcement-Learning/tree/master/LRL}{our github}. While custom implementation might not be the most efficient, it hinted us several ambiguities in algorithms which are resolved differently in different sources. We describe these nuances and the choices made for our experiments in appendix \ref{implemdetails}. For each environment we launch several algorithms to train the network with the same architecture with the only exception being the head which is specified by the algorithm (see table \ref{headstable}). \begin{table}[h] \setlength\extrarowheight{2pt} \centering \begin{tabular}{|c|c|} \hline DQN & Linear transformation to $|\mathcal{A}|$ arbitrary real values \\\hline \multirow{3}{*}{Dueling} & First head: linear transformation to $|\mathcal{A}|$ arbitrary real values \\ & Second head: linear transformations to an arbitrary scalar \\ & Aggregated using dueling architecture formula (\ref{dueling}) \\\hline Categorical & $|\mathcal{A}|$ linear transformations with softmax to $A$ values \\\hline \multirow{3}{*}{Dueling Categorical} & First head: linear transformation to $|\mathcal{A}|$ arbitrary real values \\ & Second head: $|\mathcal{A}|$ linear transformations to $A$ arbitrary real values \\ & Aggregated using dueling architecture formula (\ref{rainbowdueling}) \\\hline Quantile & $|\mathcal{A}|$ linear transformations to $A$ arbitrary real values \\\hline \multirow{3}{*}{Dueling Quantile} & First head: linear transformation to $|\mathcal{A}|$ arbitrary real values \\ & Second head: $|\mathcal{A}|$ linear transformations to $A$ arbitrary real values \\ & Aggregated using dueling architecture formula (\ref{rainbowdueling}) without softmax \\\hline \multirow{2}{*}{A2C / PPO} & Actor head: linear transformation with softmax to $|\mathcal{A}|$ values \\ & Critic head: linear transformation to scalar value \\\hline \end{tabular} \caption{Heads used for different algorithms. Here $|\mathcal{A}|$ is the number of actions and $A$ is the chosen number of atoms.} \label{headstable} \end{table} For noisy networks all fully-connected layers in the feature extractor and in the head are substituted with noisy layers, doubling the number of their trained parameters. Both usage of noisy layers and the choice of the head influences the total number of parameters trained by the algorithm. As practical tuning of hyperparameters is computationally consuming activity, we set all hyperparameters to their recommended values while trying to share the values of common hyperparameters among algorithms without affecting overall performance. We choose to give each algorithm same amount of interaction steps to provide the fair comparison of their sample efficiency. Thus the wall-clock time, number of episodes played and the number of network parameters updates varies for different algorithms. \subsection{Cartpole} Cartpole from OpenAI Gym \citep{brockman2016openai} is considered to be one of the simplest environments for DRL algorithms testing. The state is described with 4 real numbers while action space is two-dimensional discrete. The environment rewards agent with +1 each tick until the episode ends. Poor action choices lead to early termination. The game is considered solved if agent holds for 200 ticks, therefore 200 is maximum reward in this environment. In our first experiment we launch algorithms for 10\,000 interaction steps to train a neural network on the Cartpole environment. The network consists of two fully-connected hidden layers with 128 neurons and an algorithm-specific head. We used ReLU for activations. The results of a single launch are provided\footnote{we didn't tune hyperparameters for each of the algorithms, so the configurations used might not be optimal.} in table \ref{cartpoleresults}. \begin{table}[h] \setlength\extrarowheight{2pt} \centering \begin{tabular}{lrrr} \toprule {} & Reached 200 & Average reward & Average FPS \\ \midrule Double DQN & 23.0 & 126.17 & 95.78 \\ Dueling Double DQN & 27.0 & 121.78 & 62.65 \\ DQN & 33.0 & 116.27 & 101.53 \\ Categorical DQN & 28.0 & 110.87 & 74.95 \\ Prioritized Double DQN & 37.0 & 110.52 & 85.58 \\ Categorical Prioritized Double DQN & 46.0 & 104.86 & 66.00 \\ Quantile Prioritized Double DQN & 42.0 & 100.76 & 68.62 \\ Categorical DQN with target network & 44.0 & 96.08 & 73.92 \\ Quantile Double DQN & 54.0 & 93.14 & 75.40 \\ Quantile DQN & 70.0 & 88.12 & 77.93 \\ Categorical Double DQN & 42.0 & 81.25 & 70.90 \\ Noisy Quantile Prioritized Dueling DQN & 86.0 & 74.13 & 21.41 \\ Twin DQN & 57.0 & 71.14 & 52.51 \\ Noisy Double DQN & 67.0 & 71.06 & 31.81 \\ Noisy Prioritized Double DQN & 94.0 & 67.34 & 30.72 \\ Quantile Regression Rainbow & 106.0 & 67.11 & 21.54 \\ Rainbow & 91.0 & 64.01 & 20.35 \\ Noisy Quantile Prioritized Double DQN & 127.0 & 63.01 & 28.27 \\ Noisy Categorical Prioritized Double DQN & 63.0 & 62.04 & 27.81 \\ PPO with GAE & 144.0 & 53.06 & 390.53 \\ Noisy Prioritized Dueling Double DQN & 180.0 & 47.52 & 22.56 \\ PPO & 184.0 & 45.19 & 412.88 \\ Noisy Categorical Prioritized Dueling Double DQN & 428.0 & 22.09 & 20.63 \\ A2C & - & 12.30 & 1048.64 \\ A2C with GAE & - & 11.50 & 978.00 \\ \bottomrule \end{tabular} \caption{Results on Cartpole for different algorithms: number of episode when the highest score of 200 was reached, average reward across all played episodes and average number of frames processed in a second (FPS).} \label{cartpoleresults} \end{table} \subsection{Pong} We used Atari Pong environment from OpenAI Gym \citep{brockman2016openai} as our main testbed to study the behaviour of the following algorithms: \begin{itemize} \item DQN --- Deep Q-learning (sec. \ref{DQN}) \item c51 --- Categorical DQN (sec. \ref{CategoricalDQN}) \item QR-DQN --- Quantile Regression DQN (sec. \ref{QRDQN}) \item Rainbow (sec. \ref{rainbow}) \item A2C --- Advantage Actor Critic (sec. \ref{A2C}) extended with GAE (sec. \ref{GAE}) \item PPO --- Proximal Policy Optimization (sec. \ref{PPO}) extended with GAE (sec. \ref{GAE}) \end{itemize} In Pong, each episode is split into rounds. Each round ends with player either winning or loosing. The episode ends when the player wins or looses 21 rounds. The reward is given after each round and is +1 for winning and -1 for loosing. Therefore the maximum total reward is 21 and the minimum is -21. Note that the flag $\operatorname{done}$ indicating episode ending is not provided to the agent after each round but only at the end of full game (consisting of 21-41 rounds). The standard preprocessing for Atari games proposed in DQN \citep{mnih2013playing} was applied to the environment (see table \ref{preprocessingtable}). Thus, state space is represented by $(84, 84)$ grayscale pixels input (1 channel with domain $[0, 255]$). Action space is discrete with $|\mathcal{A}| = 6$ actions. \begin{table}[h] \setlength\extrarowheight{2pt} \centering \begin{tabularx}{0.85\textwidth}{|c|C|} \hline NoopResetEnv & Do nothing first 30 frames of games to imitate the pause between game start and real player reaction. \\\hline MaxAndSkipEnv & Each interaction steps takes 4 frames of the game to allow less frequent switch of action. Max is taken over 4 passed frames to obtain an observation. \\\hline FireResetEnv & Presses <<Fire>> button at first frame to launch the game, otherwise screen remains frozen. \\\hline WarpFrame & Turns observation to grayscale image of size 84x84. \\\hline \end{tabularx} \caption{Atari Pong preprocessing} \label{preprocessingtable} \end{table} \begin{figure}[h] \centering \includegraphics[width=0.9\textwidth]{PongCNN.pdf} \caption{Network used for Atari Pong. All activation functions are ReLU. For Rainbow the fully-connected layer and all dense layers in the algorithm-specific head are substituted with noisy layers.} \label{PongCNN} \end{figure} All algorithms were given 1\,000\,000 interaction steps to train the network with the same feature extractor presented on fig.~\ref{PongCNN}. The number of trained parameters is presented in table \ref{numofparameterstable}. All used hyperparameters are listed in table \ref{hyperparameterstable} in appendix \ref{HP}. \begin{table}[h] \setlength\extrarowheight{2pt} \centering \begin{tabularx}{0.5\textwidth}{|c|C|} \hline Algorithm & Number of trained parameters \\\hline DQN & 1\,681\,062 \\\hline c51 & 1\,834\,962 \\\hline QR-DQN & 1\,834\,962 \\\hline Rainbow & 3\,650\,410 \\\hline A2C & 1\,681\,575 \\\hline PPO & 1\,681\,575 \\\hline \end{tabularx} \caption{Number of trained parameters in Pong experiment.} \label{numofparameterstable} \end{table} \subsection{Interaction-training trade-off in value-based algorithms} There is a common belief that policy gradient algorithms are much faster in terms of computational costs while value-based algorithms are preferable when simulation is expensive because of their sample efficiency. This follows from the nature of algorithms, as the fraction <<observations per network updates>> is extremely different for these two families: indeed, in DQN it is often assumed to perform one network update after each new transitions, while A2C collects about 32-40 observations for only one update. That makes the number of network updates performed during 1M steps interaction process substantially different and is the main reason of policy gradients speed rate. Also policy gradient algorithms use several threads for parallel simulations (8 in our experiments) while value-based algorithms are formally single-threaded. Yet they can also enjoy multi-threaded interaction, in the simplest form by playing 1 step in all instances of environment and then performing $L$ steps of network optimization \citep{horgan2018distributed}. For consistency with single-threaded case it is reasonable to set the value of $L$ to be equal to the number of threads to maintain the same fraction <<observations per network updates>>. However it has been reported that lowering value of $L$ in two or four times can positively affect wall-clock time with some loss of sample efficiency, while raising batch size may mitigate this downgrade. The overall impact of such acceleration of value-based algorithms on performance properties is not well studied and may alter their behaviour. In our experiments on Pong it became evident that value-based algorithms perform extensive amount of redundant network optimization steps, absorbing knowledge faster than novel information from new transitions comes in. This reasoning in particular follows from the success of PPO on Pong task which performs more than 10 times less network updates. \begin{table}[h] \setlength\extrarowheight{2pt} \centering \begin{tabularx}{0.75\textwidth}{c|C|C|} & Vanilla algorithm & Accelerated version \\\hline Threads & 1 & 8 \\ Batch size & 32 & 128 \\ $L$ & 1 & 2 \\ \hline \hline Interactions per update & 1 & 4 \end{tabularx} \caption{Setup for value-based acceleration experiment} \label{ITtrade-off} \end{table} We compared two versions of value-based algorithms: \emph{vanilla version}, which is single-threaded with standard batch size (32) and $L = 1$ meaning that each observed transition is followed with one network optimization step, and \emph{accelerated version}, where 1 interaction step is performed in 8 parallel instances of environment and $L$ is set to be 2 instead of 8 which raises the fraction <<observations per training step>> in four times. To compensate this change we raised batch size in four times. \begin{table}[h] \setlength\extrarowheight{2pt} \centering \begin{tabular}{|c|c|c|c|c|} \hline & \multicolumn{2}{c|}{Interactions per update} & \multicolumn{2}{c|}{Average transitions per second} \\ Algorithm & vanilla & accelerated & vanilla & accelerated \\ \hline DQN & 1 & 4 & 55.74 & 168.43 \\\hline c51 & 1 & 4 & 44.08 & 148.76 \\\hline QR-DQN & 1 & 4 & 47.46 & 155.97 \\\hline Rainbow & 1 & 4 & 19.30 & 70.22 \\\hline A2C & \multicolumn{2}{c|}{40} & \multicolumn{2}{c|}{656.25} \\\hline PPO & \multicolumn{2}{c|}{10.33} & \multicolumn{2}{c|}{327.13} \\\hline \end{tabular} \caption{Computational efficiency of vanilla and accelerated versions.} \label{accelerationtable} \end{table} \begin{figure}[h] \centering \includegraphics[width=\textwidth]{AcceleratingResults.pdf} \caption{Training curves of vanilla and accelerated version of value-based algorithms on 1M steps of Pong. Although accelerated versions perform network updates four times less frequent, the performance degradation is not observed.} \label{AcceleratingResults} \end{figure} \begin{figure}[h] \centering \includegraphics[width=\textwidth]{AcceleratingClockResults.pdf} \caption{Training curves of vanilla and accelerated version of value-based algorithms on 1M steps of Pong from wall-clock time.} \label{AcceleratingClockResults} \end{figure} As expected, average speed of algorithms increases in approximately 3.5 times (see table \ref{accelerationtable}). We provide training curves with respect to 1M performed interaction steps on fig. \ref{AcceleratingResults} and with respect to wall-clock time on fig. \ref{AcceleratingClockResults}. The only vanilla algorithm that achieved better final score comparing to its accelerated rival is QR-DQN, while other three algorithms demonstrated both acceleration and performance improvement. The latter is probably caused by randomness as relaunch of algorithms within the same setting and hyperparameters can be strongly influenced by random seed. It can be assumed that fraction <<observations per updates>> is an important hyperparameter of value-based algorithms which can control the trade-off between wall-clock time and sample efficiency. From our results it follows that low fraction leads to excessive network updates and may slow down learning in several times. Yet this hyperparameter can barely be tuned universally for all kinds of tasks opposed to many other hyperparameters that usually have their recommended default values. We stick further to the accelerated version and use its results in final comparisons. \subsection{Results} We compare the results of launch of six algorithms on Pong from two perspectives: sample efficiency (fig. \ref{Results}) and wall-clock time (fig. \ref{ClockResults}). We do not compare final performance of these algorithms as all six algorithms are capable to reach near-maximum final score on Pong given more iterations, while results after 1M iterations on a single launch significantly depend on chance. \begin{figure}[h] \centering \includegraphics[width=\textwidth]{Results.pdf} \caption{Training curves of all algorithms on 1M steps of Pong.} \label{Results} \end{figure} \begin{figure}[h] \centering \includegraphics[width=\textwidth]{ClockResults.pdf} \caption{Training curves of all algorithms on 1M steps of Pong from wall-clock time.} \label{ClockResults} \end{figure} All algorithms start with a warm-up session during which they try to explore the environment and learn first dependencies how the result of random behaviour can be surpassed. Epsilon-greedy with tuned parameters provides sufficient amount of exploration for DQN, c51 and QR-DQN whithout slowing down further learning while hyperparameter-free noisy networks are the main reason why Rainbow has substantially longer warm-up. Policy gradient algorithms incorporate exploration strategy in stochasticity of learned policy but underutilization of observed samples leads to almost 1M-frames warm-up for A2C. It can be observed that PPO successfully mitigates this problem by reusing samples thrice. Nevertheless, both PPO and A2C solve Pong relatively quickly after the warm-up stage is over. Value-based algorithm proved to be more computationally costly. QR-DQN and categorical DQN introduce more complicated loss computation, yet their slowdown compared to standard DQN is moderate. On the contrary, Rainbow is substantially slower mainly because of noise generation involvement. Furthermore, combination of noisy networks and prioritized replay results in even less stable training process. We provide loss curves for all six algorithms and statistics for noise magnitude and prioritized replay for Rainbow in appendix \ref{TrainingstatsPong}; some additional visualizations of trained algorithms playing episodes of Pong are presented in appendix \ref{playingPong}. \newpage \section{Discussion} We have concerned two main directions of universal model-free RL algorithm design and attempted to recreate several state-of-art pipelines. While the extensions of DQN are reasonable solutions of evident DQN problems, their effect is not clearly seen on simple tasks like Pong\footnote{although it takes several hours to train, Pong is considered to be the easiest of 57 Atari games and one of the most basic testbeds for RL algorithms.}. Current state-of-art in single-threaded value-based approach, Rainbow DQN, is full of <<glue and tape>> decisions that might be not the most effective way of training process stabilization. Distributional value-based approach is one of the cheapest in terms of resources extensions of vanilla DQN algorithm. Although it is reported to provide substantial performance improvement in empirical experiments, the reason behind this result remains unclear as expectation of return is the key quantity for agent's decision making while the rest of learned distribution does not affect his choices. One hypothesis to explain this phenomenon is that attempting to capture wider range of dependencies inside given MDP may provide auxiliary helping tasks to the algorithm, leading to better learning of expectation. Intuitively it seems that more reasonable switch of DQN to distributional setting would be learning the Bayesian uncertainty of expectation of return given observed data, but scalable practical algorithms within this orthogonal paradigm are yet to be created. Policy gradient algorithms are aimed at direct optimization of objective and currently beat value-based approach in terms of computational costs. They tend to have less hyperparameters but are extremely sensitive to the choice of optimizer parameters and especially learning rate. We have affirmed the effectiveness of state-of-art algorithm PPO, which succeeded to solve Pong within an hour without hyperparameter tuning. Though on the one hand this algorithm was derived from TRPO theory, it essentially deviates from it and substitutes trust region updates with heuristic clipping. It can be observed in our results that PPO provides better gradients to the same network than DQN-based algorithms despite the absence of experience replay. While it is fair to assume that forgetting experienced transitions leads to information loss, it is also true that most observations stored in replay memory are already learned or contain no useful information. The latter makes most transitions in the sampled mini-batches insignificant, and, while prioritized replay attacks this issue, it might still be the case that current experience replay management techniques are imperfect. There are still a lot of deviations of empirical results from theoretical perspectives. It is yet unclear which techniques are of the highest potential and what explanation lies behind many heuristic elements composing current state-of-art results. Possibly essential elements of modeling human-like reinforcement learning are yet to be unraveled as active research in this area promises substantial acceleration, generalization and stabilization of DRL algorithms. \newpage
\section{Introduction} From the early years of computer vision research, many researchers realized that prior knowledge could help in different tasks ranging from low-level to high-level image understanding. For example, knowledge about the shape of an object can act as a strong prior in segmentation tasks \cite{zheng2015scene}, or knowledge about the most probable action given a subject and the object can aid in action recognition tasks \cite{gupta2009observing,summers2012using}. In this recent era of data-driven techniques, most of this knowledge is hoped to be learned from training data. While this is a promising approach, annotated data can be scarce in certain situations, and many domains have a vast amount of knowledge curated in form of text (structured or unstructured) that can be utilized in such cases. Utilization of background knowledge in data-scarce situations is one of the reasons that necessitate the development of approaches that can utilize such knowledge (from structured or unstructured text) and reason on that knowledge. Additionally, the lack of reasoning and inference capabilities (such as counterfactual, causal queries) of deep learning systems recently started to resurface in various forums \cite{hudson2018gqa}\footnote{Michael Jordan's views to IEEE Spectrum (\url{bit.ly/2GNejBx}).}. \begin{figure}[!htb] \centering \includegraphics[width=0.49\textwidth]{survey_figures/vaquois_ijcai19.png} \caption{The diagram shows the information hierarchy for images and the knowledge associated with each level of information. } \label{fig:hierarchy} \end{figure} Motivated by these challenges, our goal in this paper is to present a survey of recent works (including a few of our works) in image understanding where knowledge and reasoning plays an important role. While discussing these interesting applications, we introduce corresponding reasoning mechanisms, knowledge sources, and argue the rationale behind their choice. \textit{Lastly, we discuss different mechanisms that integrate external knowledge sources directly with deep neural networks.} To understand what knowledge is meaningful in images, we can look at the different types of knowledge that relate to different levels of the semantic hierarchy induced by a natural image. Natural images are compositional. A natural image is composed of objects, and regions. Each object is composed of parts that could be objects themselves and regions can be composed of semantically meaningful sub-regions. This compositionality induces a natural hierarchy from pixels to objects (and higher level concepts). We show a diagram representing the information hierarchy induced by a natural image in Figure \ref{fig:hierarchy}. Different types of knowledge might be relevant in the context of low-level information (objects and their parts) to higher-level semantics (abstract concepts, actions). Essentially, in this survey, we will study how knowledge and reasoning are applicable to these following levels of semantics: i) objects, regions and their attributes, ii) object-object or object-region interactions, relations and actions; iii) high-level commonsense knowledge (about events, activities). In this work, we revolve the stories around different image applications ranging from object classification to question answering. As each new reasoning engine and knowledge source is encountered, we introduce them in individual separately marked ($\blacktriangleright$) paragraphs. We provide brief critique as to why the chosen mechanisms were appropriate for the corresponding application. We discuss different ways to integrate knowledge in the deep learning era. The final section then summarizes the reasoning mechanisms. We conclude by shedding light on how the research in high-level reasoning and utilization of commonsense knowledge in Computer Vision can progress. \section{Use of Knowledge in Computer Vision} Here we describe applications that utilized relevant background knowledge beyond annotated data. Applications are categorized according to the levels of hierarchy in Fig.~ \ref{fig:hierarchy}. \subsection{Knowledge about Objects, Regions, Actions} \subsubsection{Image Classification} Various groups of researchers demonstrated the use of knowledge bases (generic and application-specific) in object, scene and action recognition; or to reason about their properties. \paragraph{$\blacktriangleright$ Markov Logic Network.} MLN (\cite{richardson2006markov}) is a popular framework that uses weighted First Order Logical formulas to encode an undirected grounded probabilistic graphical model. Unlike PSL, the MLN is targeted to use the full expressiveness of First Order Logic and induce uncertainty in reasoning by modeling it using a graphical model. Formally, an MLN $L$ is a set of pairs $\langle F,w \rangle$, where $F$ is a first order formula and $w$ is either a real number or a symbol $\alpha$ denoting hard weight. Together with a finite set of constants $C$, a Markov Network $M_{L,C}$ is defined where: i) $M_{L,C}$ contains one binary node for each grounding of each predicate appearing in $L$; ii) $M_{L,C}$ contains one feature for each grounding of each formula $F_i$ in $L$. The feature value is 1 if ground formula is true otherwise 0. The probability distribution over possible worlds is given by: \begin{equation*} P(X=x) = \frac{1}{Z} \exp (\sum_{i} w_i n_i(x)) = \frac{1}{Z} \prod_{i} \phi_i(x_{i}) ^{n_i(x)}, \end{equation*} where $n_i(x)$ is the number of true groundings of the formula $F_i$ in the world $x$. The MLN inference is equivalent to finding the maximum probable world according to the above formula. Weights are learnt using maximum likelihood methods. Authors in \cite{conf/eccv/ZhuFF14} successfully used Markov Logic Network (MLN) in the context of reasoning about object affordances in images. An example of affordance is \textit{fruit is edible}. Authors collect such assertions from textual cues and image sources, and complete the knowledge base using weighted rules in MLN. Example of collected assertions are \textit{basketball is rollable and round, apple is rollable, edible and a fruit, pear is edible and a fruit} etc. The weights of the grounded rules are learnt by maximizing the pseudo-likelihood given the evidence collected from textual and image sources. Few such weighted rules are: \begin{equation*} \small \begin{aligned} 0.82~\text{hasVisualAttr}(x, Saddle) &\implies \text{hasAffordance}(x, SitOn). \\ 0.75~\text{hasVisualAttr}(x, Pedal) &\implies \text{hasAffordance}(x, Lift).\\ \text{isA}(x, Animal) &\land \text{locate}(x, Below). \end{aligned} \end{equation*} This knowledge base encoded in MLN is used to infer the affordance relationships given the detected objects (and their confidence scores) in an image. Besides performing well over pure SVM-based methods, authors also observe that the knowledge-based approach is more robust against removal of visual attributes. \paragraph{Appropriateness.} For modeling object affordances, the authors in \cite{conf/eccv/ZhuFF14} faced the following challenges: i) uncertainty to account for noise and practical variability (if a \textit{pedal} is dis-functional, it cannot be \textit{lifted}); ii) expressive beyond IF-THEN horn-clauses, iii) relational knowledge. Encoding relational knowledge and modeling uncertainty warranted the use of a probabilistic logical mechanisms. As Probabilistic Soft Logic (PSL) can not express beyond horn clauses, and Problog solvers are comparatively slow - MLN was a logical choice for this application. Authors in \cite{serafini2016logic} proposes Logic Tensor Network (LTN) that combines logical symbolism and automatic learning capabilities of neural network. For object-type classification and PartOf relation detection on \textsc{Pascal-Part-Dataset}, LTNs with prior knowledge is shown to improve over Fast-RCNN. This work has started off many contributions in the area of neuro-symbolic reasoning such as DeepProbLog \cite{manhaeve2018deepproblog}, end-to-end neural networks using prolog \cite{NIPS2017_6969}. \paragraph{$\blacktriangleright$ Logic Tensor Network.} In LTN, soft logic is used to represent each concept as a predicate, for example $apple(x)$ represents \textit{apple}. The first-order formula $\forall x\text{ } apple(x) \land red(x) \rightarrow sweet(x)$ represents that \textit{all red apples are sweet}. Here, the truth values of each ground predicates are between 0 to 1, and truth values of conjunctive or disjunctive formulas are computed using combinations functions such as Lukasiewicz's T-norm. To combine this idea of soft logic with end-to-end learning, each concept or predicate is represented by a neural network and objects are represented by points in a vector space. The neural network for ``apple'' takes a point in the feature space and outputs its confidence about the input being a member of the ``apple'' concept. The weights in the neural networks are optimized to abide by rules such as $\forall x\text{ } apple(x) \land red(x) \rightarrow sweet(x)$. These symbolic rules are added as constraints in the final optimization function. The authors in \cite{le2013exploiting} uses the commonsense knowledge encoded in ConceptNet to enhance the language model and apply this knowledge to two recognition scenarios: action recognition and object prediction. The authors also carried out a detailed study of how different language models (window-based model topic model, distributional memory) are compatible with the knowledge represented in images. For action recognition, authors detect the human, the object and scenes from static images, and then predict the most likely verb using the language model. They use object-scene, verb-scene and verb-object dependencies learnt from the language models to predict the final action in the scene. Examples of relations extracted from ConceptNet are: \texttt{Oil-Located near-Car, Horse-Related to-Zebra}. The conditional probabilities are computed using the frequency counts of these relations. To jointly predict the action i.e. $\langle subject, verb, object \rangle$ triplet the from object, the scene probability and the conditional probabilities from language model, an energy based model is used that jointly reasons on the image (observed variable), object, verb and the scene. \paragraph{$\blacktriangleright$ ConceptNet.} Some well-known large-scale commonsense knowledge bases about the natural domain are ConceptNet, (\cite{havasi2007conceptnet}), WordNet (\cite{Miller:1995:WLD:219717.219748}), YAGO (\cite{Suchanek:2007:YCS:1242572.1242667}) and Cyc (\cite{Lenat:1995:CLI:219717.219745}). Among these, ConceptNet is a semi-curated multilingual Knowledge Graph, that encodes commonsense knowledge about the world and is built primarily to assist systems that attempts to understand natural language text. The nodes (called concepts) in the graph are words or short phrases written in natural language. The nodes are connected by edges which are labeled with meaningful relations, such as $\langle reptile, IsA, animal \rangle$, $\langle reptile, HasProperty, cold blood \rangle$. Each edge has an associated confidence score. Being semi-curated, ConceptNet has the advantage of having a large coverage yet less noise. \paragraph{$\blacktriangleright$ Probabilistic Soft Logic.} Similar to MLN, PSL (\cite{bach2017hinge}) uses a set of weighted First Order Logical rules of the form $w_j: \lor_{i \in I_j^{+}} y_i \leftarrow \land_{i \in I_j^{-}} y_i$, where each $y_i$ and its negation is a literal. The set of grounded rules is used to declare a Markov Random Field, where the confidence scores of the literal is treated a continuous valued random variable. Specifically, a PSL rule-base is used declare Hinge-Loss MRF, which is defined as follows: Let $\bm{y}$ and $\bm{x}$ be two vectors of $n$ and ${n'}$ random variables respectively, over $D =[0,1]^{n+{n'}}$. Let $\tilde{D} \subset D$, which satisfies a set of inequality constraints over the random variables. A \textit{Hinge-Loss MRF} $\mathbb{P}$ is a probability density over $D$, defined as: if $(\bm{y},\bm{x}) \notin \tilde{D}$, then $\mathbb{P}(\bm{y}|\bm{x})=0$; if $(\bm{y},\bm{x}) \in \tilde{D}$, then: $ \mathbb{P}(\bm{y}|\bm{x}) = \frac{1}{Z(\bm{w})} exp(-f_{\bm{w}}(\bm{y},\bm{x})) $. Using PSL, the hinge-loss energy function $f_{\bm{w}}(\bm{y})$ is defined as: \begin{equation*} \sum\limits_{C_j \in \bm{C}} w_j\text{ }max\big\{ 1- \sum_{i \in I_j^{+}} V(y_i) - \sum_{i \in I_j^{-}} (1- V(y_i)),0\big\}, \end{equation*} where $max\big\{ 1- \sum_{i \in I_j^{+}} V(y_i) - \sum_{i \in I_j^{-}} (1- V(y_i)),0\big\}$ is distance to satisfaction of a grounded rule $C_j$. MPE inference in HL-MRFs is equivalent to finding a feasible minimizer for the convex energy function, and in PSL it is equivalent to $\argmin_{\bm{y}\in [0,1]^n} f_{\bm{w}}(\bm{y})$. To learn the parameters $\bm{w}$ of an HL-MRF from the training data, maximum likelihood estimation (and its alternatives) is used. \subsubsection{Actions and Activities} Authors in \cite{london2013collective} uses PSL to detect collective activities (i.e. activity of a group of people) such as \textit{crossing, queuing, waiting} and \textit{dancing} in videos. This task is treated as a high-level vision task, whereby detection modules are employed to extract information from the frames of the videos and such information (class labels and confidence scores of predicates) is input to the joint PSL model for reasoning. To obtain frame-level and person-level activity beliefs, human figures are represented using HOG features and Action Context (AC) descriptors. Then an SVM is used to obtain activity beliefs using these AC descriptors. Next, a collection of PSL rules is used to declare the ground HL-MRF to perform global reasoning about collective activities: { \begin{equation*} \begin{aligned} \textsc{LOCAL}(B, a) &\implies \textsc{DOING}(B, a). \\ \textsc{FRAME(B, F)} \land \textsc{FRAMELBL(F, a}) &\implies \textsc{DOING(B, a)}. \end{aligned} \end{equation*} } The intuitions behind the two rules are: Rule R1 corresponds to beliefs about local predictions using HOG features, and R2 expresses the belief that if many actors in the current frame are doing a particular action, then perhaps everyone is doing that action. To implement this, a \textit{FrameLbl} predicate for each frame is computed by accumulating and normalizing the \textit{Local} activity beliefs for all actors in the frame. Similarly, there are other rules that captures the intuition about these activities. Using PSL inference, final confidence scores are obtained for each collective activity, and authors observe that using PSL over baseline HOG features achieves significant increase ($10\%$) in accuracy. \paragraph{Appropriateness.} To model group activities, the authors in \cite{london2013collective} faced the following challenges: i) uncertainty to account for noise in real-world data and noisy predictions form machine learning models; ii) a fast scalable mechanism to predict activity classes. In the presence of large annotated data, deep learning models are the de facto standards for any kind of classification. However, smaller datasets and the requirement of interpretability warranted a logical reasoning language. Requirement of robustness to noise and scalability warranted the use of PSL, as its underlying optimization problem is convex and its found to be faster. \paragraph{Infrequently Used Logical Languages.} The reasoning mechanisms discussed in this survey are chosen based on the following considerations: i) plausible inference, ii) learning capability, iii) expressiveness, and iv) speed of inference \cite{Davis:2015:CRC:2817191.2701413}. Several other logical languages have factored in useful aspects such as uncertainty, spatio-temporal reasoning etc. Qualitative Spatial Reasoning \cite{Randell92aspatial} languages and description logic \cite{baader2003description} are noteworthy among them for image understanding. A popular representation formalism in QSR is Region Connection Calculus (RCC) introduced in \cite{Randell92aspatial}. The RCC-8 is a subset of the original RCC. It consists of the eight base relations: disconnected (DC), externally connected (EC), partial overlap (PO), equal (EQ), tangential proper-part (TPP), non-tangential proper-part (NTTP), tangential proper-part inverse (TPP$^{-1}$), and non-tangential properpart inverse (NTPP$^{-1}$). Extensions of RCC-8 is used to successfully reason about visuo-spatial dynamics, and (eye-tracking based) visual perception of the moving image in cognitive film studies (\cite{suchan2016geometry}). \textbf{Description Logics} (\cite{baader2003description}) model relationships between entities in a particular domain. In DL, three kind of entities are considered, concepts, roles and individual names. Concepts represent classes (or sets) of individuals, roles represent binary relations between individuals and individual names represent individuals (instances of the class) in the domain. Fuzzy DLs extend the model theoretic semantics of classical DLs to fuzzy sets. In \cite{dasiopoulou2009applying}, Fuzzy DL is used to reason and check consistency on object-level and scene-level classification systems. \begin{figure*}[!htpb] \centering \subfloat{\includegraphics[width =0.3\textwidth, height=0.2\textheight]{survey_figures/fvqa1.png}} \subfloat{\includegraphics[width =0.3\textwidth, height=0.2\textheight]{survey_figures/knowledge_vqa1.png}} \subfloat{\includegraphics[width=0.35\textwidth, height=0.2\textheight]{survey_figures/knowledge2.png}} \caption{(a) Example of questions that require explicit external knowledge \cite{wang2017fvqa}, (b) Example where knowledge helps \cite{wu2016ask}. (c) Ways to integrate background knowledge: i) Pre-process knowledge and augment input \cite{aditya2018spatial}; ii) Incorporate knowledge as embeddings \cite{wu2017visual}; iii) Post-processing using explicit reasoning mechanism \cite{aditya2018vqa}; iv) Using knowledge graph to influence NN architecture \cite{marino2017more}.} \label{fig:fvqa} \end{figure*} \subsection{High-level Common-sense Knowledge} Several researchers employed commonsense knowledge to enrich high-level understanding tasks such as visual question answering, zero-shot object detection, relationship detection. Answering questions beyond scene information, detecting objects in data-scarce or partial observable situation are natural candidates for employing reasoning with knowledge. \paragraph{$\blacktriangleright$ Graph-Gated Neural Network (GGNN).} Given a graph of $N$ nodes, at each time-step GGNN produces some output for each node $o_1,o_2,...o_N$ or global output $o_G$. The propagation model is similar to an LSTM. For each node $v$ in the graph, there is a corresponding hidden state $h_v^{(t)}$ at every step $t$. At $t=0$, they are initialized with initial state $x_v$, for example for a graph of object-object interactions, it is initialized as one bit activation representing whether an object is present in an image. Next, the structure of the graph is used (encoded in adjacency matrix $A$) along with the gated update module to update hidden states. The following equations summarize the update for each timesteps: \begin{equation*} \begin{aligned} h_v^{(1)} &= [x_v^{T},0]^T. \\ a_v^{(t)} &= A_v^{T}[h_1^{(t-1)},\ldots,h_N^{(t-1)}]^T + b.\\ z_v^{t} &= \sigma(W^za_v^{(t)} + U^zh_v^{(t-1)}). \\ r_v^{t} &= \sigma(W^ra_v^{(t)} + U^rh_v^{(t-1)}). \\ \tilde{h_v^{t}} &= tanh(Wa_v^{(t)} + U(r_v^{t} \odot h_v^{(t-1)})). \\ h_v^{(t)} &= (1-z_v^{t}) \odot h_v^{(t-1)} + z_v^t \odot \tilde{h_v^{t}}, \end{aligned} \end{equation*} where $h_v^{t}$ is the hidden state of node $v$ at timestep $t$ and $x_v$ is the initial specific annotation. After $T$ timesteps, node-level outputs can be computed as: $o_v = g(h_v^{T}, x_v)$. \subsubsection{Image Classification} Authors in \cite{marino2017more} employed the structured prior knowledge of similar objects and their relationships to improve end-to-end object classification task. Authors utilize the notion that humans can understand a definition of an object written in text and leverage such understanding to identify objects in an image. The authors introduce Graph Search Neural Network to utilize a knowledge graph about objects to aid in (zero-shot) object detection. This network uses image features to efficiently annotate the graph, select a relevant subset of the input graph and predict outputs on nodes representing visual concepts. GSNN learns a propagation model which reasons about different types of relationships and concepts to produce outputs on the nodes which are then used for image classification. The knowledge graph is created from Visual Genome by considering object-object and object-attribute relationships. For GSNN, the authors propose that rather than performing recurrent updates over entire graph like GGNN, only a few initial nodes are chosen and nodes are expanded if they are useful for the final output. For example, initial nodes are chosen based on the confidence from an object detector (using a threshold). Next, the neighbors are added to the active set. After each propagation step, for every node in our current graph, authors predict an importance score using the importance network: $i_v^{t} = g_i(h_v, x_v)$. This importance network is also learnt. Based on the score, only top $P$ scoring non-expanded nodes are selected and added to the active set. The structure (nodes and edges) of the GSNN can be initialized according to ConceptNet or other knowledge graphs, thereby directly incorporating external knowledge. As GSNN can be trained in an end-to-end manner, this approach provides distinct advantages over sequential architectures. On Visual Genome multi-label classification, the authors achieve significant accuracy over a VGG-baseline using combined knowledge from visual genome and WordNet. \paragraph{Appropriateness.} Authors in \cite{marino2017more} utilizes GSNN purely for knowledge integration purpose, i.e. to enhance an object classifier by using ontological knowledge about objects. An alternative would be use object classifier first and then use PSL or MLN to reason i.e. refine the final output - this method however cannot backpropagate the errors to the classifier. \subsubsection{Knowledge in Question-Answering} Authors in \cite{wang2017fvqa,shahMYP19} observed that popular datasets do not emphasize on questions that require access to external knowledge. The authors \cite{wang2017fvqa} proposed a new dataset named Fact-based VQA (or FVQA) where all questions require access to external (factual or commonsense) knowledge that is absent in the input image and the question. A popular example from their dataset is presented in Figure \ref{fig:fvqa}. The questions are generated using common-sense facts about visual knowledge which is extracted from ConceptNet, DBPedia, WebChild. In the proposed approach, structured predicates are predicted using LSTM from the question. For the question \textit{Which animal in the image is able to climb trees}, the generated query example is $\{?X, ?Y\} = Query("Img1", "CapableOf", "Object")$. Then a set of object detector, scene detectors and attribute classifiers are used to extract objects, scenes and attributes from the image. This query is fired against the knowledge base of RDF triplets, and the answers are matched against the information extracted from the image. Authors in \cite{wu2016ask} use knowledge in web-sources to answer visual questions. They propose to use fixed-length vector representations of external textual description paragraphs about objects present in the image in an end-to-end fashion. For example, for an image about a dog, a Multi-label CNN classifier is used to extract top 5 attributes, which are then used to form a SPARQL query against DBPedia to extract the definition paragraph about relevant objects. The Doc2vec representation of this paragraph is then used to initialize the hidden state at the initial time-step of the LSTM that ultimately processes the question-words in their end-to-end question-answering architecture. The example of an image, question and relevant external knowledge is provided in the Fig.~\ref{fig:fvqa}. On Toronto Coco-QA dataset, the authors achieve a sharp $11\%$ increase in accuracy after using knowledge sources. \paragraph{Visual Relationship Detection.} Knowledge distillation has been effective in integrating external knowledge (rules, additional supervision etc.) in natural language processing applications. Authors in \cite{yu2017_vrd_knowledge_distillation} incorporate subject-object correlations from ConceptNet using knowledge distillation. Authors use linguistic knowledge from ConceptNet to predict conditional probabilities ($P(pred|subj,obj)$) to detect visual relationships from image. \cite{aditya2018spatial} uses knowledge distillation to integrate additional supervision about objects to answer questions. \paragraph{Knowledge in Image Retrieval.} Authors in \cite{de2015applying} observed the semantic gap between high-level natural language query and low-level sensor data (images), and proposed to bridge the gap using rules and knowledge graph such as ConceptNet. They proposed a semantic search engine, where the dependency graph of a query is enhanced using hand-written rules and ConceptNet to match scene elements. The enhanced graph is used rank and retrieve images. \section{Discussion: Knowledge Integration in the Deep Learning Era} In this era where differentiable neural modules are dominating the state-of-the-art, a natural question arises as to how to integrate external knowledge with deep neural networks. The machine learning community (\cite{wulfmeier2016incorporating}) have explored this in terms of constraining the search space of an optimization (or machine learning) algorithm. Four ways are adopted to use prior domain knowledge: 1) preparing training examples; 2) initiating the hypothesis or hypothesis space; 3) altering the search objective; and 4) augmenting search process. Along similar lines, we discuss four primary ways (shown in Fig.~\ref{fig:fvqa}(c)) to integrate knowledge into deep neural networks: i) pre-process domain knowledge and augment training samples, ii) vectorize parts of knowledge base and input to intermediate layers, iii) inspire neural network architecture from an underlying knowledge graph, iv) post-process and reason with external knowledge. For each type, we provide a few recent works that have shown success along the line of increased accuracy or interpretability. Pre-processing knowledge and using it as input to starting or intermediate layers is a popular intuitive way of integrating knowledge. For example, authors in \cite{wu2016ask} have vectorized relevant external textual documents and used the knowledge to answer knowledge-based visual questions. Similarly, other authors have used similar techniques in deep reinforcement learning. However, additional fact-based knowledge can be noisy and may bias the learning procedure. The knowledge distillation framework is effective for learning to balance between ground-truth annotations and external knowledge. \paragraph{$\blacktriangleright$ Relational Reasoning Layer.} Authors in \cite{santoro2017simple} defined a relational reasoning layer that can be used as a module in an end-to-end deep neural network and trained using traditional gradient descent optimization methods. This module takes as input a set of objects, learns the relationship between each pair of objects, and infer a joint probability based on these relationships (with or without the context of a condition such as a question). Mathematically, the layer (without the appended condition vector) can be expressed as: $ RN(O) = f_\phi \Big(\sum_{i,j} g_\theta(o_i,o_j)\Big), $ where $O$ denote the list of input objects $o_1,\ldots, o_n$. In this work, the relation between a pair of objects (i.e. $g_\theta$) and the final function over this collection of relationships i.e. $f_\phi$ are modeled using multilayer perceptrons and are learnt using gradient descent. \paragraph{$\blacktriangleright$ Knowledge Distillation.} is a generic framework (\cite{hinton14071698}) where there are two networks, namely the teacher and the student network. There are two traditional settings, i) teacher with additional computing layers, ii) teacher with additional knowledge. In the first setting, the teacher network is a much deeper (and/or wider) network with more layers. The teacher is trained using ground-truth supervision where in the last layer \texttt{softmax} is applied with a higher temperature (ensuring smoothness of values, while keeping the relative order). The student network, is a smaller network that aims to compress the knowledge learnt by the teacher network by emulating the teacher's predictions. In the second setting popularized in natural language processing and computer vision, the teacher network is a similar-sized network which has access to external knowledge, so that it learns both from ground-truth supervision and the external knowledge. The student network, in turn, learns from ground-truth data and teacher's soft prediction vector. The student network's loss is weighted according to an imitation parameter that signifies how much the student can trust the teacher's predictions over groundtruth. Often question-answering datasets (CLEVR \cite{johnson2017clevr}, Sort-of-Clver, Visual Genome \cite{krishnavisualgenome}) have additional annotations such as properties, labels and bounding box information of the objects, and the spatial relations among the objects. Authors in \cite{aditya2018spatial} utilized this \textit{knowledge} in a framework that also considers the non-availability of such information during inference time. As \textit{preprocessing}, the authors use PSL engine to reason with the structured source of knowledge about objects and their spatial relations, and the question, and construct a pre-processed attention mask for training image-question pairs. For an image-question pair, this attention mask blocks out the objects (and regions) not referred to in the question. As \textit{reasoning mechanism}, authors use the combination of knowledge distillation and relational reasoning \cite{santoro2017simple} which achieves a $13\%$ increase in accuracy over the baseline. Relational Reasoning mechanism is also used for visual reasoning in \cite{santoro2017simple}, VQA in \cite{Cadene_2019_CVPR}, temporal reasoning in \cite{Zhou_2018_ECCV}. \paragraph{Appropriateness.} Authors in \cite{aditya2018spatial,santoro2017simple} used relational reasoning for image question answering. They model relationships as functions between objects and use these functions together to answer questions about an image. Despite several efforts of creating scene graphs \cite{johnsoncvpr2015,aditya2017image}, defining a closed set of complete relationships between objects is nontrivial. Hence modeling the relationships as functions is equally acceptable practice. Modeling the reasoning as a function on these triplets is similar to that of PSL, MLN. But learning objects, relationships and the function together is why the relational reasoning layer is a popular choice. Though, semantics associated with this function ($f_\phi$) is hardly understood, which makes it a cautionary tale for out-of-the-box reasoning alternative. Reasoning with outputs from deep neural networks and utilizing structured knowledge predicates is another natural alternative. As most off-the-shelf reasoning engines suffer because of issues of scalability, and uncertaintly modeling; authors in \cite{aditya2018answering,aditya2018vqa} develop a PSL engine that achieves fast inference on weighted rules with open-ended structured predicates and applied it to solve image puzzles and visual question-answering. For both tasks, authors use ConceptNet and pre-learnt word2vec embeddings as knowledge sources. In the image puzzle solving, the task is to find a common meaningful concept among multiple images. Authors use an off-the-shelf image classifier algorithm to predict concepts (or objects) present in each image; followed by a set of simple propositional rules in PSL such as $w_{ij}: s_i \rightarrow t_j$, where $s_i$ is a predicted class, $t_j$ is a target concept from ConceptNet vocabulary. The weight of the rule $w_{ij}$ is computed by considering the (ConceptNet-based) similarity of the predicted class ($s_i$) and the target concept ($t_j$), and the popularity of the predicted class in ConceptNet. Reasoning with the rules of this form, authors predict the most probable set of targets from a larger vocabulary given class-predictions (and their scores). Using a similar rule-base, authors then jointly predict the most probable common targets for all images, which provides the final ranking of concepts. Additionally for the VQA task in \cite{aditya2018vqa}, authors first obtain textual information from images using dense captioning methods. Then they parse the question and the captions using a rule-based semantic parser to create semantic graphs; and use these two knowledge structures in the reasoning engine to answer the question. To understand open-ended relations, ConceptNet and word2vec is used. The solution is shown to increase accuracy over state-of-the-art for "what" and "which" questions. The reasoning engine can be used to predict structured predicates as evidence along-with the answer, aiding in increased interpretability of the system. Another important contribution is to utilize the nodes and connections of publicly available knowledge-graphs (such as ConceptNet) to build a Neural Network. As explained before, authors in \cite{marino2017more} have used this technique for a more robust image classification. Authors have improved upon GGNN to propose Graph-search Neural Network that lazily expands the nodes when they are encountered during training. However, the approach is only shown to works on sub-graphs of a large knowledge graph, and does not have explicit consideration for handling incompleteness in the graph. \section{Summary and Future Works} In this paper we have discussed several reasoning mechanisms such as PSL, MLN, LTN, relational reasoning layers and their use in various image understanding applications. Here we give a quick summary of our assessment of these reasoning mechanisms. Early researchers in AI realized the importance of knowledge representation and reasoning and also realized that classical logics (such as first-order logic) may not be suitable for reasoning in where one may have to retract an earlier conclusion, when presented with new knowledge. This led to the development of various non-monotonic logics such as Answer Set Programming (ASP). Recent extensions of it, such as P-log, Problog \cite{DeRaedt:2007:PPP:1625275.1625673} and LP-MLN \cite{lee2017computing} allow expression of probabilistic uncertainty, weights and contradictory information to various degrees. There are also recent works that extend Inductive Logic Programming techniques to learn ASP rules and also to learn weights. However, like MLN, which can be thought of as extension of first order logic, ASP has high computational complexity, even when the set of ground atoms are finite. PSL, uses a restricted syntax for its rules (thus is less expressive than the others), does not have non-monotonic features, requires its ground atoms to have continuous truth values and uses characterizations of logical operations so that its space of interpretations with nonzero density forms a convex polytope. This makes inference in PSL a convex optimization problem in continuous space, increasing efficiency of inference. Many description logics are decidable fragments of first-order logic (FOL) with focus on reasoning concepts, roles and individuals, and their relationships. Relational reasoning layers (in the deep learning framework), on the other hand, lose expressiveness as it is hard to comprehend what rules are being learnt. An important need for building real-world AI applications, is to support counterfactual and causal queries. Reasoning mechanisms such as MLN and ProbLog can take cues from P-log (lite) to accommodate such reasoning. For human beings, image understanding is a cognitive process that identifies concepts from previous encounters or knowledge. The process goes beyond data-driven pattern matching processes, and delves into the long-standing quest on integrating bottom-up signal processing with top-down knowledge retrieval and reasoning. In this work, we discussed various types of reasoning mechanisms used by researchers in computer vision to aid a variety of image understanding tasks, ranging from segmentation to QA. To conclude, we suggest the following further research pathways to address the observed limitations: i) speeding up of inference (in MLN, ProbLog, etc. and integrating rule-learning (such as in ILP) will accelerate adoption in vision, ii) scalable reasoning on large common-sense knowledge graphs; iii) probabilistic logical mechanisms supporting counterfactual, causal and arithmetic queries, enhancing possibilities for higher-level reasoning on real-world datasets. \section*{Acknowledgements} The support of the National Science Foundation under the Robust Intelligence Program (1816039 and 1750082), research gifts from Verisk AI, and support from Adobe Research (for the first author) are gratefully acknowledged. \bibliographystyle{plain}
\section{Introduction} Understanding how quantum systems conduct energy is currently at the centre of investigation in different branches of physics. Recent advances in the manipulation of nanoscale systems~\cite{jukka2009} have given a new boost to theoretical investigations in that direction; nevertheless how energy and most intriguingly heat propagates through a medium has always been at the centre of theoretical debate. A better understanding of the energy exchange mechanism is also crucial to design devices which can act as (local) refrigerators~\cite{mikko2018}, energy harvesters~\cite{jaliel2019} or can be used as a heat valve~\cite{jukka2018}. The study of energy currents at nanoscale also helps in the characterization of certain physical effects such as Seebeck effect~\cite{svilans2018,clemens2019}, violation of the Wiedemann-Franz law~\cite{bivas2017} and rectification of currents which are useful in applications at nanoscales~\cite{giazotto2015}. Another interesting problem is understanding the connection between the diffusion properties in a closed system and its conduction properties when it is connected to external leads (open system)~\cite{dhar2018, dhar2019}. This question also arises in the case of transport in classical systems~\cite{li2003} because it is known that the transport properties are modified by the nature of the scattering and the type of reservoirs chosen. The Landauer-B\"uttiker formula for the particle current through a noninteracting system is a milestone in transport theory~\cite{landauer1957,buttiker1986}. It was readily extended to the case of interacting systems by Meir and Wingreen~\cite{Meir1992,Jauho1994} giving the possibility of studying the effects of interactions on the transport properties of many-body quantum systems. It relates the current to the spectral features of the system, therefore giving a microscopic picture of the mesoscopic transport properties. Specifically, in the original work the transport features of the single-impurity Anderson model (SIAM) are linked to the spectral function of the system coupled to the leads in both the Coulomb blockade and Kondo regimes. The Meir-Wingreen expression, which holds in the stationary state, has also been extended to transient times allowing us to study transport in driven systems~\cite{riku2013, Haugbook, stefleebook, riku2016,riku2018}. The energy current is defined as the variation of the Hamiltonian of the lead; in this case one obtains an expression analogous to the Meir-Wingreen one for particle current, which holds for both interacting and non-interacting systems provided that the leads are assumed to be non-interacting. In the case of transport through an interacting central region, these expressions correctly capture the many-body interactions through the transmission function or alternatively through the spectral density of the central correlated region~\cite{wang2014}. A strictly related issue is the definition of heat current, namely the contribution to energy current which is irreversibly dissipated into the lead and that is consistent with the laws of thermodynamics. The bone of contention is the coupling energy term which needs to be assigned either to the system, or to the terminal, or be split among the two~\cite{esposito2015,misha2014,misha2016,misha2018, eich2014, eich2016, lopez2015}. The debate about the definition of heat current, although interesting and very important, goes beyond the purpose of this work. \\ In our work, we are interested in the energy variation of the central correlated region due to the reservoirs and we study the difference of this quantities with the energy variation of the reservoirs itself. We use the the non-equilibrium Green's function formalism which naturally allows us to account for both many-body interactions and coupling to external reservoirs through the self-energy functional. We show that the two energy variation need not to be equal (and opposite in sign) as it is for particle currents; we discuss this discrepancy by looking at a specific example: the single-impurity Anderson model. \section{Non-equilibrium Green's function approach} We consider a correlated central region where particles can interact through a two-body potential connected to $N$ leads where particles are assumed to be non-interacting. This is the only assumption we make and it is the same needed to derive the Meir-Wingreen expression (and its time dependent version). A schematic representation of the system we consider is shown in Fig.~\ref{fig:sys} panel $ a)$. The Hamiltonian of the total system is given by $\hat{H}(z) = \hat{H}_C(z) + \sum_{\alpha=1}^{N} \hat{H}_{\alpha}(z) + \sum_{\alpha=1}^{N}\hat{V}_{C}^{(\alpha)}(z)$, where $z$ is a generic complex time variable on the Keldysh contour $\gamma$~\cite{Haugbook, stefleebook,bonitzbook,Keldysh1965} (Fig.~\ref{fig:sys} panel $ b )$). In the central region the Hamiltonian reads $\hat{H}_C(z) = \int d \bold{x}_1\; \hat{\psi}^\dagger (1) h(1) \hat{\psi} (1)+\frac{1}{2}\int d \bold{x}_1 d1' \;\hat{\psi}^\dagger (1) \hat{\psi}^\dagger (1') v(1, 1') \hat{\psi} (1') \hat{\psi} (1)\nonumber$. \\ \begin{figure}[t] \begin{center} \includegraphics[width=.5\textwidth]{fig1.pdf} \caption{ (Color online) a) Schematic representation of a central system coupled with $N$ leads each characterized by its own chemical potential $\mu_\alpha$ and inverse temperature $\beta_\alpha$. Particle (green arrows) and energy (red arrows) currents flow across the central region due to the biased leads. b) The Keldysh-Schwinger contour $\gamma$. The arrows show the time ordering of the arguments along the complex contour. } \label{fig:sys} \end{center} \end{figure} The indices $1= (\bold{x}_1, z_1)$, $1'= (\bold{x}_1', z_1')$ are collective indices for the position-spin coordinate $\bold{x}= (\bold{r},\sigma) $ and complex time $z$, $h(1)$ the single particle Hamiltonian in the central region and $v(1,2)= \delta_\gamma(z_1-z_2) v(\bold{x}_1,z_1; \bold{x}_2, z_2)$ a generic two-body interaction. $\hat{H}_\alpha (z)= \int d \bold{x}_1 \hat{\psi}^\dagger_\alpha (1) h_\alpha(1)\hat{\psi}_\alpha (1)$ describes particles in the region of the $\alpha$-th lead with $h_\alpha(1)$ the single particle Hamiltonian. The Hamiltonian accounting for the coupling between the interacting region and the leads is chosen to be tunnel-like and given by $\hat{V}_{C}^{(\alpha)}(z) = \int d \bold{x}_1 \left( \hat{\psi}^\dagger (1) T_{\alpha}(1) \hat{\psi}_\alpha (1)+ \text{h.c.}\right)$, where $T(1)$ are the tunneling energies between particles in the interacting region and those in the $\alpha$-th lead. The key object in the NEGF framework is the single-particle Green's function (SPGF) $ G(1,1') = -i \left\langle \mathcal{T}_\gamma \hat{\psi}(1) \hat{\psi}^\dagger(1') \right\rangle_0$ with $\mathcal{T}_\gamma$ the time-ordering operator over the Keldysh contour $\gamma$ and $\left\langle \dots \right\rangle_0$ the average over the initial many-body state. The knowledge of $G$ gives access to all single particle quantities (e.g. density, momentum distribution, density-of-states). For an interacting system the SPGF can be found by solving either the Kadanoff-Baym equations~\cite{stefleebook,bonitzbook,robert2009,robert2016}, the Dyson equation~\cite{logullo2016,talarico2019}, or other equivalent techniques~\cite{spicka1986,bonitz2012,eckstein2014,daniel2018}. A crucial point is the choice of a self-energy, which is typically a functional of the SPGF itself. The reason to introduce the self-energy is to truncate the hierarchy of equations which couples the equation-of-motion for the SPGF to those of higher-order Green's functions~\cite{stefleebook}. Henceforth, we shall assume that a self-energy, accounting for both the many-body interactions and the coupling to the leads, has been chosen and that a solution for the SPGF has been found. Under these assumptions we shall compute the energy variation in the interacting region in a way which is consistent with the approximations embodied in the chosen self-energy. \section{Energy variation in the central region} We start considering the rate of variation of the energy in the central (interacting) region $d\langle \hat{H}_{C}(t) \rangle/ dt = i \langle [\hat{H} (z),\hat{H}_C (z)] \rangle_{z=t} + \partial\langle\hat{H}_C(z) \rangle/\partial z|_{z=t}\equiv\mathcal{J}(t)+P(t)$ where we defined the energy current $\mathcal J(t)$ and the power $P(t)$ due to external drive; in the following we will disregard this last term as it is not relevant for the purposes of our discussion. By computing the commutator of $\hat H_C(z)$ with the total Hamiltonian~(see Appendix \ref{app:energy} for details), we obtain an expression in terms of $G_{C \alpha}(1,1') = -i \langle \mathcal{T}_\gamma \hat{\psi} (1) \hat{\psi}_\alpha^\dagger ( 1') \rangle$ and $G^{(2)}_{CCC \alpha} (1,2;3,4) = (-i)^2 \langle \mathcal{T}_\gamma \hat{\psi}( 1) \hat{\psi} ( 2) \hat{\psi}_\alpha^\dagger (4) \hat{\psi}^\dagger (3) \rangle$.\\ This expression can be manipulated by means of the S-matrix expansion in the interaction picture with respect to $\hat H_C(t)+\sum\limits_\alpha\hat H_\alpha(t)$ to obtain $\mathcal{J}(t)=\sum\limits_\alpha\mathcal{J}_C^{(\alpha)}(t)$~(see Appendix \ref{app:mixed} for details) with: \begin{align} \label{eq:ecurrent2} &\mathcal{J}_C^{(\alpha)}(t)=2 \text{Re} \left\{ \int d \bold{x}_1 d \bar{1} d \bar{2}\; H(1,\bar{1}) G ( \bar{1}, \bar{2} ) \Sigma_{ \alpha} (\bar{2},\bar{1}^+) \right\}_{z_1=t} \end{align} where $H(1,1')= \left[ h(1)\delta(1,1')+ \Sigma (1,1') \right]$ and $1^+=(\bold{x}_1, z_1^+)$, with $z_1^+$ a time infinitesimally later than $z_1$ on the Keldysh-contour.\\ Eq.~ \eqref{eq:ecurrent2} expresses the variation of the energy in the interacting region as sum of different contributions each coming from the individual leads. The single contribution from the lead $\alpha$ is in turn made of two terms; the first one is similar to the expression of the particles' current due to the $\alpha$-th lead: $\mathcal{I}_C^{(\alpha)}(t)= 2 \text{Re} \left\{ \int d \bold{x}_1 d \bar{1} d \bar{2}\; G ( \bar{1}, \bar{2} ) \Sigma_{ \alpha} (\bar{2},\bar{1}^+)\right\}_{z_1=t} $, with the significant difference that it contains the single-particle Hamiltonian $h(1)$ and it accounts for the energy carried by the flowing particles; the effect of the interactions is present only in the SPGF $G$ through a change in the density of states of the particles in the central region. This term is analogous to the energy variation of the lead where the single particle Hamiltonian of the central region is replaced by the single particle Hamiltonian of the $\alpha$-th lead. The second term contains the many-body self-energy explicitly and therefore accounts for the transport of the particle-particle interaction energy; it can be seen as a mechanism of energy redistribution in the central region due to particle-particle scattering: non-interacting electrons coming from the leads scatter in the central region releasing part of their energy before tunneling into a new non-interacting state of another lead. \section{Inter-leads coupling} \label{sec:leads} The expression in Eq.~\eqref{eq:ecurrent2} has to be compared with the Meir-Wingreen like expression $J_\alpha(t)=i\langle[\hat H(z),\hat H_\alpha(z)]\rangle_{z=t}$, that describes the energy variation of the lead $\alpha$ due to the coupling with the central correlated region. For the particle currents, it is true that the current into the lead is equal and opposite to the charge variation in the central system due to that lead, namely $\mathcal{I}_\alpha=-\mathcal{I}_C^{(\alpha)}$. Here we defined the current in the $\alpha$ lead as $\mathcal{I}_\alpha=i\langle[\hat H(z),\hat N_\alpha(z)]\rangle_{z=t}$ and the currents into the central region due to the lead $\alpha$ as $\sum\limits_\alpha \mathcal{I}_C^{(\alpha)}=i\langle[\hat H(z),\hat N_C(z)]\rangle_{z=t}$. This relations translates into formal mathematical expression the intuitive concept of the locality of the number operator. Basically, they state that particles flowing out of a lead necessarily enter the central region causing an equally and opposite variation. In analogy with the particle current we would expect that the following relation for the energy current $\mathcal{J}_\alpha(t)=-\mathcal{J}_C^{(\alpha)}(t)$ should always be true as well. However, as we prove in the following, this is not always the case. It is sufficient to look at the time derivative $d \langle \hat{V}_{C}^{(\alpha)}(t) \rangle/dt$ of the coupling Hamiltonian between the terminal $\alpha$ and the central region. It is easy to prove~(see Appendix \ref{app:coupling} for details) that \begin{equation} \label{eq:ccurrent} \frac{d}{dt} \langle \hat{V}_{C}^{(\alpha)}(t) \rangle = -\mathcal{J}_\alpha(t)-\mathcal{J}_C^{(\alpha)}(t)-\Delta \mathcal{J}_{\alpha}(t)+ \frac{\partial}{\partial t}\langle\hat{V}_{C}^{(\alpha)}(t) \rangle, \end{equation} where $\Delta J_{\alpha}(t)= \sum\limits_{\beta\neq \alpha}\int d \bold{x}_1 T_\beta(1)G_{\beta\alpha}(1;1^+) T_\alpha^*(1)$ and $G_{\beta \alpha}(1,1') = -i \langle \mathcal{T}_\gamma \hat{\psi}_\beta (1) \hat{\psi}_\alpha^\dagger ( 1') \rangle$ is the lead $\beta$- lead $\alpha$ Green's function. It has been shown~\cite{misha2016} that the DC component of $\frac{d}{dt} \langle \hat{V}_{C}^{(\alpha)}(t) \rangle=0$ and therefore $\mathcal{J}_\alpha(t)=-\mathcal{J}_C^{(\alpha)}(t)-\Delta \mathcal{J}_{\alpha}(t)$. Therefore, we have shown that a variation of the energy of the lead is not necessarily accompanied by an equal and opposite change in the energy of the central region as in the case for the particle variation. The difference between the two is given by the term $\Delta \mathcal{J}_\alpha(t)$ which arises from the direct propagation of particles from any other lead $\beta(\ne\alpha)$ and the lead $\alpha$ via virtual scattering through the central region. This interpretation is supported by the physical meaning of $G_{\beta \alpha}(1,1')= \int d \bar{1}d \bar{2}\;g_{\beta} (1 ;\bar{1}) T_\beta^*(\bar{1}) G (\bar{1};\bar{2}) T_\alpha(\bar{2}) g_{\alpha} (\bar{2} ;1')$~(see Appendix \ref{app:coupling} for details): it represents the propagation of a particle from one lead to another through the central region. The expression $\Sigma_{\beta\alpha}(1;1')=T_\beta^*(1) G (1;1') T_\alpha(1')$ is also called the inbedding self-energy~\cite{stefleebook} and accounts for the back-action of the central region onto the leads. This term is usually either negligible or zero altogether. In the weak coupling limit this term is vanishingly small due to the fact that it is of fourth order in the coupling between the central region and the leads. Moreover it also vanishes when the two integrals in the expression for $G_{\beta\alpha}(1;1')$ have different spatial supports, namely when $T_\alpha(1)$ and $T_{\beta}(1')$ for $\alpha\neq\beta$ are non-zero on different spatial regions and therefore their product vanishes. Nonetheless, it is possible to envisage situations in which this term gives a non-vanishing contribution: short quantum wires (mean free path comparable with the size of the wire), more than one lead coupled to the same spatial region or spatially extended coupling between the leads and the central region. As a consequence, the energy variation of the lead is not only related to the one of the central region, as one would expect, but also accounts for contribution coming from the direct exchange of energy with other leads. Therefore, as one can easily deduce, it is crucial to consider this term in situations where one wants to infer the thermal transport properties of a system (the central region) by measuring the properties of the reservoirs (e.g. particle distribution, temperatures). \section{SIAM in the Kondo regime} In order to show the consequences of the results presented so far we look at the energy-transport in the single-impurity Anderson model~\cite{anderson,glazman2001} described by the Hamiltonian $\hat{H} = \varepsilon \sum_\sigma \hat{d}_\sigma^\dagger \hat{d}_\sigma + U \hat{d}_\uparrow^\dagger \hat{d}_\uparrow \hat{d}_\downarrow^\dagger \hat{d}_\downarrow +\sum_{\alpha, k \sigma} (\varepsilon_ {\alpha k \sigma} + \mu_\alpha) \hat{c}_{\alpha k \sigma}^\dagger \hat{c}_{\alpha k \sigma} \nonumber-g \sum_{\alpha, k \sigma} ( \hat{c}_{\alpha k \sigma} \hat{d}_{\sigma}^\dagger + h.c. )$. Here, $\hat{d}_{\sigma}^\dagger\left(\hat{d}_{\sigma}\right)$ corresponds to creation (annihilation) of electron on the impurity level with spin $\sigma$, $\varepsilon$ denotes the single-particle energies, and $U$ is the electronic charging energy. The operator $\hat{c}_{\alpha k \sigma}^\dagger\left(\hat{c}_{\alpha k \sigma}\right)$ creates (annihilates) electron with state $k$ and spin $\sigma$ in the lead $\alpha=L,R$ with chemical potential $\mu_\alpha$. Finally, $g$ denotes the tunneling amplitude between the terminal and the impurity level. In the wide-band limit approximation we are left with a frequency-independent coupling $\Gamma = |g|^2$. In what follow we consider unbiased voltage ($\mu=\mu_L=\mu_R=0 $), a finite and symmetric thermal bias $T_L = T+ \Delta T/2$, $T_R = T- \Delta T/2$, with $T=(T_L +T_R)/2 = 0.125$ and $\Delta T=T_L -T_R = 0.15$ and we study the dynamical quantities as function of the impurity level position $\varepsilon$. We present our results as a function of the shifted single-particle energies or gate-voltage $v_g = \varepsilon + U/2$, such that the particle-hole symmetric point $\varepsilon=-U/2$ correspond to $v_g=0$. \\ Under certain conditions the SIAM may reveal Kondo effects characterized by the formation of a correlated asymmetric resonance in the spectral structure of the system \cite{haldane, glazman2001}. The conditions to attain such regime are a large charging energy and tunnel coupling at low temperature, $U \gg \Gamma \gg T$ and $T \ll T_K $. The expression for the threshold temperature or Kondo temperature is given by $T_K = \frac{1}{2} \sqrt{ \Gamma U} exp \left( \pi \frac{(v_g^2 - U^2/4)}{\Gamma U} \right) $ \cite{hewson} and is strictly valid in the Kondo regime where $-U/2+ \Gamma/2 <v_g< U/2- \Gamma/2$. \begin{figure}[t] \begin{center} \includegraphics[width=.5\textwidth]{fig2.pdf} \caption{Characterization of the Kondo regime. $a)$ Density plot in the strong coupling regime $\Gamma=1.3$ and different interactions strength $U=0,2,4$ of the non-equilibrium spectral function $ \mathcal{A}(\omega)$ in the gate-voltage/frequency plane $v_g- \omega$. The white dashed lines represent the range of gate-voltage where the Kondo correlations are expected $-U/2+ \Gamma/2 <v_g< U/2- \Gamma/2$ for the respective interactions strength. $b)$ Corresponding non-equilibrium spectral function at the particle-hole symmetric point $v_g=0$ , $\varepsilon=- U/2$ for the different interactions considered. It is possible to appreciate how the shape of spectral function changes as the Kondo regime is reached $U/\Gamma \gg 1$. $c)$ Kondo temperature $T_K$ as a function of $v_g$ in the range of gate-voltage where Kondo correlations occur for the charging energy $U=4$. The red solid line represents the value of the "average" temperature of the leads $T=(T_L +T_R)/2 = 0.125$ . } \label{fig:kondo} \end{center} \end{figure} The interactions in the correlated impurity are treated in the self-consistent $GW$ approximation (see Appendix \ref{app:gw} for details), which on the one hand is guaranteed to satisfy macroscopic conservation laws \cite{stefleebook}, and on the other hand allows us to explore certain features of the Kondo regime \cite{rubio2008}. We solve the Dyson equation numerically using the method described in Ref.~\cite{logullo2016,talarico2019}. We checked that the obtained expression for the total current through the interaction region $\mathcal{J}(t)$ in Eq.~\eqref{eq:ecurrent2} is consistent with the derivative of the total energy in the corresponding region $d \mathcal{E}(t)/dt$ where $\mathcal{E}(t) =\langle \hat{H}_C (t) \rangle = \left[ i \int d \bold{x}_1 d 2 \;\biggl[ h(1) \delta(1,2) +\frac{1}{2}\Sigma(1,2) \biggr] G (2,1^+)\right]$. We find, within numerical errors, a remarkable agreement between these two quantities at any time of the dynamics and for any set of the parameters considered (Appendix \ref{app:gw}). This demonstrates that the approximations done on the two-particle Green's function, while working out an expression for $\mathcal{J}(t)$, are indeed consistent with those used to solve the Dyson equation for the single-particle Green's function and embodied into the chosen self-energy. \begin{figure*}[t] \begin{center} \includegraphics[width=1.0\textwidth]{fig3.pdf} \caption{Particle and Energy currents. $(a)-(b)$ comparison of the steady state particle currents flowing through the central region due to the left lead $\underset{t\rightarrow\infty}{\lim}\; \mathcal{I}_C^{(L)}(t)$ (markers) and the reverse current that runs into the same lead $-\mathcal{I}_L^{(S)}$ (solid lines) in the weak coupling $\Gamma= 0.04$ $(a)$ and in the strong coupling regimes $\Gamma= 1.3$ $(b)$ at the charging energy $U$ as indicated in the legend. $(c)-(d)$ parallel between the steady state energy currents across the interacting system from the left lead $\bar{\mathcal{J}}_C^{(L)}$ (markers) and the opposite of the energy current flowing into the respective lead $-\bar{\mathcal{J}}_L^{(S)}$ (solid lines) at the same couplings and charging energies as in the case of particle currents. $(e)-(f)$ comparison between (minus) the sum of the two steady state energy currents $-(\bar{\mathcal{J}}_L^{(S)}+\bar{\mathcal{J}}_C^{(L)} )$ (markers) and the term $\underset{t\rightarrow\infty}{\lim}\; \Delta\mathcal{J}_L(t)$ (solid lines) in the region of parameters as specified before. All the quantities are normalized by their respective $\Gamma$. The shade areas in the figures correspond to the gate-potential range of the Kondo regime $-U/2+ \Gamma/2 <v_g< U/2- \Gamma/2$ for the related couplings and charging energies. } \label{fig:compw} \end{center} \end{figure*} Before moving to the systematic study of the currents, we first characterize the regimes of parameters where the Kondo effects may occur. Fig.~\ref{fig:kondo} panel $ a)$ shows a map in the gate-voltage/frequency plane of the non-equilibrium spectral function of the system $ \mathcal{A}(\omega) = i [G^R(\omega) -G^A (\omega)]$ obtained from the solution of the Dyson equation in a strong coupling regime with the leads $\Gamma=1.3$ and for different charging energies $U=0,2,4$. As the interaction increases, one can identify a range in the gate-voltage where the spectral function is centered at the chemical-potential of the leads, that correspond exactly to the range where Kondo correlations are expected $-U/2+ \Gamma/2 <v_g< U/2- \Gamma/2$ (white dashed lines). Fig.~\ref{fig:kondo} panel $ b)$ shows instead how the Kondo correlations reshape the spectral function at the charge degeneracy point $v_g=0$. Going from zero to large interactions, the Lorentzian shape is lost to leave a more asymmetric and pinned structure.\\ Fig.~\ref{fig:kondo} panel $ c)$ shows the Kondo temperature $T_K$ for the charging energy $U=4$ as a function of $v_g$ in the range of gate-voltage where Kondo correlations take place. As we can see the average temperature $T$ (red solid line) lies slightly above the Kondo temperature $T_K$ in a region close to the degeneracy point $v_g=0$. Nonetheless, the spectral function is still pinned at the chemical potential of the leads in the whole interval and its shape is very different from a Lorentzian, a clear signature of the Kondo regime. This may be explained from the highly out-of-equilibrium scenario ($T \sim \Delta T$) that we consider; it is quite reasonable that the system does not equilibrate to the average temperature $T$ of the leads and instead reaches a lower temperature that allows the Kondo correlations to persist. \section{Particle and energy currents} We now look at the steady-state properties of the time-dependent expressions for the particle and energy currents, namely the limit $t \to \infty$. In the case of two symmetrically coupled terminals the particle current is given by the Meir-Wingreen formula $\underset{t\rightarrow \infty}{\lim}\mathcal{I}_\alpha(t)\equiv\mathcal{I}_\alpha^{(S)} = \int d \omega \Gamma (\omega) [f_\alpha (\omega) - f_{\bar{\alpha}} (\omega) ] \mathcal{A}(\omega)$. Here $\Gamma (\omega)= \Gamma_L (\omega) \Gamma_R (\omega)/[\Gamma_L (\omega)+\Gamma_R (\omega)] $, $\bar{\alpha} \ne \alpha $, $f_\alpha (\omega)= (1+ e^{\beta_\alpha(\omega - \mu_\alpha)})^{-1}$ is the Fermi-Dirac distribution function for electrons in the lead $\alpha$ and $ \mathcal{A}(\omega)$ is the non-equilibrium spectral function of the central region. For the energy current we compare $\bar{\mathcal{J}}_C^{(L)}\equiv\underset{t\rightarrow \infty}{\lim}\mathcal{J}_C^{(L)}(t)$ with $\underset{t\rightarrow \infty}{\lim}\mathcal{J}_L(t)\equiv\mathcal{J}_L^{(S)} = \int d \omega \;\omega \Gamma (\omega) [f_\alpha (\omega) - f_{\bar{\alpha}} (\omega) ] \mathcal{A}(\omega)$. The latest expression is the energy counterpart of the Meir-Wingreen formula for the particle current and properly describes how the energy runs across the non-interacting leads. It is widely used to characterize thermoelectric properties of correlated materials in linear response ~\cite{kim2002,lei2002,costi2010}. Fig.~\ref{fig:compw} shows the agreement between the particle current in the central region due to the left lead $\mathcal{I}_C^{(L)}(t), (t \Gamma\gg 1)$ and the opposite of the current that flows into the same lead $-\mathcal{I}^{(S)}_L$ for both weak coupling $\Gamma \ll \Delta T$ panel $a)$ and strong coupling $\Gamma \gg \Delta T$ panel $b)$, for different values of the interaction strength $U$. The two currents are actually equal and opposite regardless the regime consider and for any range of parameters chosen as one would expected. We observe that for positive gate voltages particles flow from the central region to the left lead $\left(\mathcal{I}_C^{(L)}(t)=-\mathcal{I}^{(S)}_L<0\right)$ because the position of the spectral function of the system lies above the chemical potential of the lead ($\mu_L=0$). The opposite situation is realized for negative gate potentials where particles flow from the left lead to the central region $\left(\mathcal{I}_C^{(L)}(t)=-\mathcal{I}^{(S)}_L>0\right)$. In the weak-coupling case, panel Fig.~\ref{fig:compw} $a)$, the particle current is fully specified by the window function of the leads $\mathcal{I}_L \sim \Delta f (v_g)=f_L(v_g)-f_R(v_g)$. This may be understood from the shape of the spectral function that, although being a Lorentzian function, is much sharper and narrow than the energy window of the leads ($\Gamma \ll \Delta T$) and it can be approximated with $\mathcal{A}(\omega) \sim \delta(\omega - v_g)$. This picture is slightly different when the interaction is present since, in this case, the overall effect is to broaden the spectral function that cannot anymore be treated as a delta function. Nonetheless, the physical scenario is qualitatively the same and only quantitatively different. The strong-coupling case, Fig.~\ref{fig:compw} $b)$, does not present significant differences outside of the Kondo region. When the system enters the Kondo regime (green and gray shaded areas) the behavior of the current is drastically different from the window function $\Delta f(\omega)$ reflecting the change in the shape of the spectral function in this regime. \\ In contrast to the particle current, a perfect agreement between the energy current across the interacting region due to the left reservoir $\bar{\mathcal{J}}_C^{(L)}$ and the opposite current in the same lead $-\mathcal{J}_{L}^{(S)}$ is found only in the weak-coupling scenario as shown in Fig.~\ref{fig:compw} panel $c)$. At strong coupling we observe a qualitatively different behavior and not only a merely quantitative deviation between this two expressions, Fig.~\ref{fig:compw} panel $d)$, as it was for the particle currents. Interactions are not responsible for it as the effect is present, and actually more pronounced, in the non-interacting case $(U=0)$. The maximum difference between the two currents is at particle-hole symmetric point $(v_g=0)$ where $\bar{\mathcal{J}}_C^{(L)}$ is zero and $\mathcal{J}_{L}^{(S)}$ has its maximum. This can be explained with the following argument: the central region is at resonance, it is completely transparent and all the energy flows from one lead to the other without affecting the energy of the central region. The presence of Kondo correlations manifest themselves as a plateau in the energy currents in the range of gate-voltage where they are predicted, namely for $-U/2+ \Gamma/2 <v_g< U/2- \Gamma/2$. These regions are shown in Fig.\ref{fig:compw} as green and gray shaded areas and they corresponds to the regions in which the spectral function is pinned at the chemical potential of the leads, as shown by the horizontal solid lines in Fig.\ref{fig:kondo} panel a). One interesting observation is that the extension of the plateaux of the lead energy current overestimates this regions, whereas the one in the energy variation of the central region shows a better agreement. As we noticed above the pinning of the spectral function is an hallmark of the emergence of the Kondo bound state and it can be probed through transport experiments~\cite{martin2018}. In these experiments properties of the central region are inferred from measurements onto the leads. We have just shown that in the determination of the extent of the Kondo regime in gate voltage, it might be beneficial to consider this extra term to get a more precise estimation of the Kondo region for single level quantum dots in the strong coupling regime. Interestingly, in the case of a thermal bias in the leads the plateau induced by the Kondo cloud appears in the energy current, whereas in the case of small bias voltage it appears in the particle current as shown in Ref.~\cite{talarico2019}. In general interactions increase the change of energy in the central region with respect to the non-interacting case. Nevertheless, there is a reduction between the energy current in the left lead $\mathcal{J}^{(S)}_L$ and the energy change in the central interacting region predicted by Eq.~\ref{eq:ecurrent2}. \section{Virtual processes} In Sec.\ref{sec:leads} we have shown that the energy variation of one lead and the lead's contribution to the variation of the the energy of the central region differ by $\Delta J_{\alpha}(t)$. This term has been shown to arise from the direct coupling of the lead to all other leads via second order processes through the central region. Moreover, we observe that in the strong coupling regime of the SIAM the two currents are indeed different and that, this effect does not come from the strong correlations present in this regime, but actually it is more pronounced in the non-interacting case. If we compute the term $-\mathcal{J}_L^{(S)}-\mathcal{J}_C^{(L)}$ and compare it with $\Delta\mathcal{J}_L$ computed separately we obtain a perfect agreement as shown in Fig.~\ref{fig:compw} $e)-f)$ for both weak and strong coupling respectively. Recently, this term has been shown~\cite{josefsson2019} to be useful in computing the energy variation in the lead, that has been also measured in a setup analogous to the one we have considered. It is worth to notice that, whenever the interaction is present, the energy rate contribution $\mathcal{J}_C^{(L)}(t)$ is never zero when the density of states of the dot is in the energy window of the leads. Thus, the presence of the interaction redistributes the energy inside the dot and forbids from a perfect transparency as the one observed in the non-interacting case. \\ The lead-lead coupling has been already discussed in ~\cite{wang2012,wang2014} with the remarkable difference that there a lead-lead interaction was present from the beginning in the Hamiltonian of the system. Moreover, the effect of such coupling on the energy transfer and its microscopic mechanism has not been discussed. As a concluding remark, we would like to highlight the importance and the implications of the term $\Delta\mathcal{J}_{\alpha}$ whenever it is not vanishing. When probing the conduction properties, either electrical or thermal, measurements are performed on the leads. In the case of particle currents the rate of change of particles in the lead equals the change of particles in the central region due to the lead itself. Therefore, measure of the charge current {\it into} the lead is equivalent to measure the change in the particle currents in the central region. Hence it is meaningful to infer the electrical conductivity of the central region from the measured current in the leads. Nevertheless, when it comes to compute the thermal conductivity of the system in the central correlated region $\kappa = \frac{\partial \dot{\mathcal{Q}}_{L}}{\partial \Delta T}\mid_{\mathcal{I}_L^{(S)}=0}$, with the heat current given by $ \dot {\mathcal{Q}}_{L}=(\mathcal{J}_{L}^{(S)}-\mu_L \mathcal{I}_L^{(S)})$, one has to take extra care on what is the actual interpretation of what it is computed. Indeed, according to Eq.\ref{eq:ccurrent}, at stationarity and in the absence of external drive, one has $ \kappa = -\frac{\partial }{\partial \Delta T} \left(\bar{\mathcal{J}}_{C}^{(L)}-\mu_L\mathcal{I}_C^{L} +\Delta \mathcal{J}_{L} \right)\mid_{\mathcal{I}_C^{(L)}=0}$, where we replace $\mathcal{I}_L^{(S)}\rightarrow -\mathcal{I}_C^{(L)}=-\underset{t\rightarrow \infty}{\lim}\mathcal{I}_C^{(L)}(t)$. The last equation shows that to compute the thermal conductance of the central region, the lead-lead term $\Delta\mathcal{J}_L$ needs to be considered. The term, as we discussed, accounts for the energy transfer through the contacts or terminals, thus in the strong coupling or for spatially extended couplings, what it is actually computed is the interface thermal conductance between tow leads, as if the two were directly coupled via a renormalized tunneling. We conclude that in the case of strong coupling and/or when the coupling of the leads are spatially extended, the usual definition of thermal conductance can be misleading as a figure of merit for the thermal properties of the central region. This is in contrast with the electrical conductance which is, instead, always consistent with the rate of change of the particle currents in the middle region. As a concluding remark, we would like to comment on the possibility to define, by analogy with the lead, the heat rate $\dot{\mathcal{Q}}_{C}^{(L)}=\bar{\mathcal{J}}_{C}^{(L)}-\mu_L\mathcal{I}_C^{L}$, namely the heat flowing from the central region to the left lead. However, this definition is in contrast with the thermodynamic formulation of heat as we will show in a forthcoming work. \section{Conclusions} We have shown that the energy variation of an interacting system coupled to $N$ leads is equal to the sum of different contributions each related with the energy flowing from/to the individual leads. Each term is in turn made of two further contributions, a first one accounting for the energy transport due to the flow of particles, and a second one accounting for the particle-particle scattering which redistribute the energy in the interacting region. This expression has been compared to the energy variation into the corresponding lead and we have found that the two are not always equal and opposite in sign as it is in the case of particle current. The difference between these two currents is due to the direct exchange of energy among two of the leads and the microscopic mechanism behind it is the coupling of these leads through virtual processes involving the central interacting region. \begin{acknowledgments} NLG akcnowledges P. Erdeman, and M. V. Moskalets and P. Burset Atienza for insightful comments on the expression for the energy current. The authors acknowledge financial support from the Academy of Finland Center of Excellence program (Project no. 312058) and the Academy of Finland (Project no. 287750). NLG acknowledges financial support from the Turku Collegium for Science and Medicine (TCSM). Numerical simulations were performed exploiting the Finnish CSC facilities under the Project no. 2000962 ("Thermoelectric effects in nanoscale devices"). \end{acknowledgments}
\section{Numerical Results} \author{ \IEEEauthorblockN{Qi Yu\IEEEauthorrefmark{1}\IEEEauthorrefmark{2}, Wei Dai\IEEEauthorrefmark{2}, Zoran Cvetkovi\'c\IEEEauthorrefmark{3}, Jubo Zhu\IEEEauthorrefmark{1}}\\ \IEEEauthorblockA{\IEEEauthorrefmark{1}College of Liberal Arts and Sciences, National University of Defense Technology, Changsha, China}\\ \IEEEauthorblockA{\IEEEauthorrefmark{2}Department of Electrical and Electronic Engineering, Imperial College London, UK}\\ \IEEEauthorblockA{\IEEEauthorrefmark{3}Department of Informatics, King’s College London, UK} \thanks{This work is supported by the National Key Research and Development Program of China 2017YFB0502703, the National Natural Science Foundation of China under Grant 61671015, China Scholarship Council and Royal Society International Exchanges 2017 Cost Share (with China). The conference version of this paper was presented at the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brighton, UK, May 2019.} \thanks{The authors also thank suggestions at ICASSP 2019 on structured total least squares given by Prof. Yoram Bresler from University of Illinois Urbana-Champaign and Dr. Konstantin Usevich from French National Center for Scientific Research. } } \title{Dictionary Learning with BLOTLESS Update} \maketitle \begin{abstract} Algorithms for learning a dictionary \textcolor{black}{to sparsely represent a given dataset} typically alternate between sparse coding and dictionary update stages. Methods for dictionary update aim to minimise expansion error by updating dictionary vectors and expansion coefficients given patterns of non-zero coefficients obtained in the sparse coding stage. We propose a block total least squares (BLOTLESS) algorithm for dictionary update. BLOTLESS updates a block of dictionary elements and the corresponding sparse coefficients simultaneously. In the error free case, three necessary conditions for exact recovery are identified. Lower bounds on the number of training data are established so that the necessary conditions hold with high probability. Numerical simulations show that the bounds approximate well the number of training data needed for exact dictionary recovery. Numerical experiments further demonstrate several benefits of dictionary learning with BLOTLESS update compared with state-of-the-art algorithms especially when the amount of training data is small. \end{abstract} \section{Introduction \label{sec:Intro}} Sparse signal representation has found a wide range of applications, including image denoising \cite{elad2006image,liu2017weighted}, image in-painting\cite{elad2006image}, image deconvolution \cite{bronstein2005blind}, image super-resolution \cite{yang2010image,dai2017sparse}, etc. The key idea behind the concept of sparse representation is that natural signals tend to have sparse representations under certain bases/dictionaries. Hence, finding a dictionary under which a given data set can be represented in a sparse manner, has become a very active area of research. Although numerous analytical dictionaries exist, including Fourier basis\cite{Cvetkovic2000On}, discrete cosine transform (DCT) dictionaries, wavelets\cite{Cvetkovic1995Discrete}, curvelets \cite{candes2000curvelets}, etc., the need to adapt to properties of specific data sets has long been driving research efforts towards the development of efficient algorithms for dictionary learning \cite{olshausen1996emergence,aharon2006k}. More formally, dictionary learning is the problem of finding a dictionary $\bm{D}\in \mathbb{R}^{m\times l}$ of $l$ vectors in $\mathbb{R}^{m}$ such that the $n$ training samples in $\bm{Y}\in \mathbb{R}^{m\times n}$ can be written as $\bm{Y}=\bm{D}\bm{X}$, where the coefficient matrix $\bm{X}\in \mathbb{R}^{l\times n}$ is sparse. Of particular interest is overcomplete dictionary learning where the number of dictionary items is larger than the data dimension, i.e., $l>m$, and the number of the training samples is typically much larger than the size of the dictionary, $n \gg l$. Dictionary learning is a nonconvex bilinear inverse problem, very challenging to solve in general. The bilinear dictionary learning problem is typically approached by alternating between two stages: sparse coding and dictionary update \cite{olshausen1996emergence, aharon2006k, engan1999method, kreutz2003dictionary, dai2012simultaneous, tosic2011dictionary}. In the sparse coding stage, the goal is to find sparse representations $\bm{X}$ of training samples $\bm{Y}$ for a given dictionary $\bm{D}$. For that purpose, scores of algorithms have been developed. They can be divided into two main categories. The first category consists of greedy algorithms, including orthogonal matching pursuit (OMP) \cite{tropp2007signal}, regularized orthogonal matching pursuit (ROMP) \cite{needell2009uniform}, subspace pursuit (SP) \cite{dai2009subspace}, etc. In the second category, sparse coding is formulated as a convex optimization problem where $\ell_1$-norm is used to promote sparsity \cite{chen2001atomic}, and then optimization techniques, e.g. the fast iterative shrinkage-thresholding algorithm (FISTA) \cite{beck2009fast}, can be applied. Reviews of sparse recovery algorithms can be found in \cite{tropp2010computational}. The goal of the dictionary update is to refine the dictionary so that the training samples $\bm{Y}$ have more accurate sparse representations given indices of non-zero coefficients obtained in the sparse coding stage. In the probabilistic framework, one may apply either maximum likelihood (ML) estimator \cite{olshausen1996emergence} or maximum a posteriori (MAP) estimator \cite{kreutz2003dictionary}, and then solve them by using gradient decent procedures. In the context of ML formulation \cite{olshausen1996emergence}, Engan {\sl et al.\ } \cite{engan1999method} proposed the method of optimal directions (MOD) where the sparse coefficients $\bm{X}$ are fixed and the dictionary update problem is cast as a least squares problem which can be solved efficiently; modifications of MOD were subsequently proposed in \cite{aase2001optimized,skretting2001sparse,engan2007family}. Recently an alternative approach for dictionary update has become popular, where both the dictionary and the sparse coefficients are updated \emph{simultaneously} with a given sparsity pattern. The representative algorithms include the famous K-SVD algorithm \cite{aharon2006k,smith2013improving} and SimCO \cite{dai2012simultaneous}. The crux of K-SVD \cite{aharon2006k} algorithm is to update dictionary items and their corresponding sparse coefficients simultaneously, sequentially one by one. K-SVD was subsequently extended to allow simultaneous update of multiple dictionary elements and corresponding coefficients \cite{smith2013improving}. SimCO \cite{dai2012simultaneous}, of which K-SVD is a special case, goes further and updates the whole dictionary and sparse coefficients simultaneously. The main idea of SimCO is that given a sparsity pattern, the sparse coefficients can be viewed as a function of the dictionary. As a result, the dictionary update becomes a nonconvex optimisation problem with respect to the dictionary. The optimisation is then preformed using the gradient descent method combined with a heuristic sub-routine designed to deal with singular points which can prevent from the convergence to the global minimum\cite{dai2012simultaneous}. Due to the non-convexity of dictionary learning problem, it is challenging to understand under which conditions exact dictionary recovery is possible and which method is optimal in achieving that. Following early efforts on theoretical analysis of exact dictionary recovery \cite{aharon2006uniqueness,hillar2015can,remi2010dictionary,geng2014local,schnass2015local,schnass2014ident,schnass2016conv}, more recently, Spielman et. al. \cite{spielman2012exact} studied dictionary learning problem with complete dictionaries where the dictionary can be presented as a square matrix. By solving a certain sequence of linear programs, they showed that one can recover a complete dictionary $\bm{D}$ from $\bm{Y} = \bm{D}\bm{X}$ when $\bm{X}$ is a sparse random matrix with $O(\sqrt{m})$ nonzeros per column. In \cite{agarwal2014learning,agarwal2013exact,arora2014new,arora2015simple}, the authors propose algorithms which combine clustering, spectral initialization, and local refinement to recover overcomplete and incoherent dictionaries. Again these algorithms succeed when $\bm{X}$ has $O(\sqrt{m})$ nonzeros per column. The work in \cite{barak2015dictionary} provides a polynomial-time algorithm that recovers a large class of over-complete dictionaries when $\bm{X}$ has $O(m^{1-\delta})$ nonzeros per column for any constant $\delta \in (0,1)$. However, the proposed algorithm runs in super-polynomial time when the sparsity level goes up to $O(m)$. Similarly, in \cite{arora2014more} the authors proposed a super-polynomial time algorithm that guarantees recovery with close to $O(m)$ nonzeros per column. Sun et al. \cite{sun2017complete,sun2017complete2}, on the other hand, proposed a polynomial-time algorithm that provably recovers complete dictionary $\bm{D}$ when $\bm{X}$ has $O(m)$ nonzeros per column and the size of training samples is $O(m^2\log(m))$. This paper addresses the dictionary update problem, where both the dictionary and the sparse coefficients are updated, for a given sparsity pattern. Whilst it is a sub-problem of the overall dictionary learning, it is nevertheless an important step towards solving the overall problem, and its bilinear nature makes it nonconvex and hence very challenging to solve. Our main contributions are as follows. \begin{itemize}[itemindent=2em,leftmargin=0pt] \item BLOTLESS simultaneously updates a block of dictionary items and the corresponding sparse coefficients. Inspired by ideas presented in \cite{ling2018self,gribonval2012blind}, in BLOTLESS the bilinear nonconvex block update problem is transformed into a linear least squares problem, which can be solved efficiently. \item For the error-free case, when the sparsity pattern is known exactly, three necessary conditions for unique recovery are identified, expressed in terms of lower bounds on the number of training data. Numerical simulations show that the theoretical bounds well approximate the empirical number of training data needed for exact dictionary recovery. In particular, we show that the number of training samples needed is $O(m)$ for complete dictionary update. \item BLOTLESS is numerically demonstrated robust to errors in the assumed sparsity pattern. When embedded into the overall dictionary learning process, it leads to faster convergence rate and less training samples needed compared to state-of-the-art algorithms including MOD, K-SVD and SimCO. \end{itemize} Our work is inspired by a recent work \cite{ling2018self} where bilinear inverse problems are formulated as linear inverse problems. The main difference is that our theoretical analysis and algorithm designs in Sections \ref{sec:ExactUpdate} and \ref{sec:Update-Uncertainty} are specifically tailored to the generic dictionary update problem while the focus of \cite{ling2018self} is self-calibration which can be viewed as dictionary learning with only diagonal dictionaries. Parts of the results in this paper were presented in the conference paper \cite{Qi2019}. In this journal paper, we refine the bounds in Section \ref{sec:ExactUpdate} and provide detailed proofs, add two total least squares algorithms in Section \ref{sec:Update-Uncertainty}, and include more simulation results in Section \ref{sec:Simulation} to support the design of the algorithm. This paper is organized as follows. Section \ref{sec:Background} briefly reviews dictionary learning and update methods. Section \ref{sec:ExactUpdate} discusses an ideal case where exact dictionary recovery is possible, for which a least squares method is developed and analysed. In Section \ref{sec:Update-Uncertainty}, the general case of dictionary update is discussed, and the least squares method is extended to total least squares methods, leading to BLOTLESS. Results of extensive simulations are presented in Section \ref{sec:Simulation} and conclusions are drawn in Section \ref{sec:Conclusion}. \subsection{Notation} In this paper, $\| \cdot \|_2$ denotes the $\ell_2$ norm and $\| \cdot \|_F$ stands for the Frobenius norm. For a positive integer $n$, define $[n]=\{1,2,\cdots,n\}$. For a matrix $\bm{M}$, $\bm{M}_{i,:}$ and $\bm{M}_{:,j}$ denote the $i$-th row and the $j$-th column of $\bm{M}$ respectively. Consider the sparse coefficient matrix $\bm{X}$. Let $\Omega$ be the support set of $\bm{X}$, i.e., the index set that containing indices of all nonzero entries in $\bm{X}$. Let $\Omega_i$ be the support set of the row vector $\bm{X}_{i,:}$. Then $\bm{X}_{i,\Omega_i}$ is the row vector obtained by keeping the nonzero entries of $\bm{X}_{i,:}$ and removing all its zero entries. Symbols $\bm{I}$, $\bm{1}$, and $\bm{0}$ denote the \textcolor{black}{identity matrix}, the vector of which all the entries are 1, and the vector with all zero entries, respectively. For a given set $\Omega_i \subset [n]$, $\Omega_i^c$ denotes its complement in $[n]$. \section{Dictionary Learning: The Background \label{sec:Background}} Dictionary learning is the process of finding a dictionary which sparsely represents given training samples. Let $\bm{Y}\in \mathbb{R}^{m\times n}$ be the training sample matrix, where $m$ is the dimension of training sample vectors and $n$ is the number of training samples. The overall dictionary learning problem is often formulated as: \begin{equation} \min_{\bm{D},\bm{X}}\|\bm{Y} - \bm{D}\bm{X}\|^{2}_{F}, \; {\rm s.t.}\; \|\bm{X}_{:,j}\|_{0} \le k,\; \forall j\in [n], \label{First_DL_model} \end{equation} where $\bm{D}\in \mathbb{R}^{m\times l}$ is the dictionary, $\bm{X}\in \mathbb{R}^{l\times n}$ is the sparse coefficient matrix, the $\ell_0$ pseudo-norm $\|\cdot\|_0$ gives the number of non-zero elements, also known as sparsity level, and $k < l$ is the upper bound of the sparsity level. Dictionary learning algorithms typically iterate between two stages: sparse coding and dictionary update. The goal of sparsity coding is to find a sparse coefficient matrix $\bm{X}$ for a given dictionary $\bm{D}$. One way to achieve this is to solve the problem \begin{equation} \min_{\bm{X}_{:,j}} \|\bm{Y}_{:,j}-\bm{D}\bm{X}_{:,j}\|_2,\; {\rm s.t.}\; \|\bm{X}_{:,j}\|_{0}\le k,\; \forall j\in [n], \end{equation} using greedy algorithms, for example OMP \cite{tropp2007signal} or SP \cite{dai2009subspace}. In the dictionary update stage, the goal is to refine the dictionary with either fixed sparse coefficients or a fixed sparse pattern, i.e. fixed locations of non-zero coefficients. The famous MOD method \cite{engan1999method} falls into the first category. With fixed sparse coefficients, dictionary update is simply a least squares problem \begin{equation*} \min_{\bm{D}} \|\bm{Y}-\bm{D}\bm{X}\|^2_{F}. \end{equation*} A more popular and advantageous approach is to simultaneously update the dictionary and nonzero sparse coefficients by fixing only the sparsity pattern. With this idea, dictionary update is then formulated as \cite{aharon2006k,dai2012simultaneous,smith2013improving} \begin{equation} \min_{\bm{D},\bm{X}} \|\bm{Y} - \bm{D}\bm{X}\|^2_{F},\ \text{s.t.}\ \mathcal{P}_{\Omega^c}(\bm{X}) = \bm{0} \label{eq:DictUpdate} \end{equation} where $\mathcal{P}_{\Omega^c}( \bm{X})$ gives the vector formed by the entries of $\bm{X}$ indexed by $\Omega^c$. However, problem \eqref{eq:DictUpdate} is bilinear, nonconvex, and challenging to solve. Among many methods for solving \eqref{eq:DictUpdate}, we here briefly review K-SVD \cite{aharon2006k} and SimCO \cite{dai2012simultaneous}. K-SVD algorithm successively updates individual dictionary items $\bm{D}_{:,i}$ and the corresponding sparse coefficients $\bm{X}_{i,:}$ whilst keeping all other dictionary items and coefficients fixed: \begin{equation} \min_{\bm{D}_{:,i}, \; \bm{X}_{i,:}} \; \| \left( \bm{Y} - \bm{D}_{:,\{i\}^c} \bm{X}_{\{i\}^c,:}\right)_{:,\Omega_i} - \bm{D}_{:,i} \bm{X}_{i,\Omega_i}\|^{2}_{F}. \end{equation} The optimal solution can be obtained by taking the largest left and right singular vectors of the matrix $\left( \bm{Y} - \bm{D}_{:,\{i\}^c} \bm{X}_{\{i\}^c,:}\right)_{:,\Omega_i}$. The idea of SimCO is to formulate the dictionary update problem in \eqref{eq:DictUpdate} as a nonconvex optimisation problem with respect to the overall dictionary, that is \begin{equation} \begin{aligned} \min_{\bm{D}} \;\; \underbrace{\min_{\bm{X}:\; \mathcal{P}_{\Omega^c}(\bm{X}) = \bm{0}} \; \|\bm{Y} - \bm{D}\bm{X}\|^2_{F}}_{f(\bm{D})}. \end{aligned} \end{equation} and then solve it using gradient descent of $\bm{D}$. This leads to an update of all dictionary items and sparse coefficients simultaneously. K-SVD can be viewed as a special case of SimCO where the objective function reads \begin{equation*} \begin{aligned} \min_{\bm{D_{:,i}}} \;\; \min_{\bm{X_{i,:}}:\; \mathcal{P}_{\Omega_i^c}(\bm{X}_{i,:}) = \bm{0}} \; \|\bm{Y} - \bm{D}\bm{X}\|^2_{F}. \end{aligned} \end{equation*} The focus of this paper is a novel solution to Problem (\ref{eq:DictUpdate}). \section{Exact Dictionary Recovery \label{sec:ExactUpdate} } This section focuses on an ideal case that the dictionary can be exactly recovered. We assume that the training samples in $\bm{Y}$ are generated from $\bm{Y}=\bm{D}_0\bm{X}_0$ where $\bm{D}_0$ is a tall or square matrix ($m\geq l$) and the sparsity pattern of $\bm{X}_0$ is given. For compositional convenience, we focus on the case where $\bm{D}_0$ is a square matrix, $\bm{D}_0 \in \mathbb{R}^{m\times m}$, as the same analysis is valid for a tall dictionary where $m > l$. With given sparsity pattern denoted by $\Omega$, the dictionary update problem can be formulated as a bilinear inverse problem in which the goal is to find $\bm{D}$ and $\bm{X}$ such that \begin{equation} \bm{Y} = \bm{D}\bm{X} \;\; \rm{and} \;\; \mathcal{P}_{\Omega^c}(\mathbf{X}) = \mathbf{0}. \label{eq:bilinear} \end{equation} The constraint $\bm{Y} = \bm{D}\bm{X}$ is nonconvex. Generally speaking, it is challenging to solve (\ref{eq:bilinear}) and there are no guarantees for the global optimality of the solution. \subsubsection{Least Squares Solver} Suppose that the unknown dictionary matrix $\bm{D}$ is invertible. The nonconvex problem in (\ref{eq:bilinear}) can be translated into a convex problem by using a strategy similar to that explored in \cite{ling2018self}. Define $\bm{H}=\bm{D}^{-1}$. Then $\bm{H}\bm{Y} = \bm{X}$. The goal is now to find $\bm{H}$ and $\bm{X}$ such that \begin{equation} \bm{H}\bm{Y} = \bm{X} \;\; \rm{and} \;\; \mathcal{P}_{\Omega^c}(\mathbf{X}) = \mathbf{0}~, \label{eq:linear} \end{equation} or equivalently, \begin{equation} \left[\bm{Y}^{T},-\bm{I}_{n\times n}\right]\left[\begin{array}{c} \bm{H}^{T}\\ \bm{X}^{T} \end{array}\right]=\bm{0}_{n\times m}\;\;{\rm and}\;\;\mathcal{P}_{\Omega^{c}}(\bm{X})=\bm{0}, \label{eq:lestsquare} \end{equation} where the subscripts are used to indicate matrix dimensions. In this manner the original bilinear problem (\ref{eq:bilinear}) is cast as an equivalent linear least squares problem. However, the formulation in (\ref{eq:lestsquare}) admits trivial solution $\bm{H}=\bm{0}$ and $\bm{X}=\bm{0}$. In fact, (\ref{eq:lestsquare}) admits at least $m$ linearly independent solutions. \begin{prop} \label{pro:m-solutions} There are at least $m$ linear independent solutions to the least squares problem in (\ref{eq:lestsquare}). \end{prop} \begin{proof} This proposition is proved by construction. Let $\bm{H}_0 = \bm{D}_0^{-1}$. Define matrix $\bm{Z}_{i} \in \mathbb{R}^{\left(m+n\right)\times m}$ by keeping the $i$-th column of the matrix $\left[\bm{H}_{0},\bm{X}_{0}\right]^{T}$ and setting all other columns to zero, that is, $\left(\bm{Z}_{i}\right)_{:,i} = \left[ (\bm{H}_0)_{i,:} , (\bm{X}_0)_{i,:} \right]^{T}$ and $\left(\bm{Z}_{i}\right)_{:,j} = \bm{0}$ for all $j\ne i$. From the fact that $(\bm{H}_0)_{i,:} \bm{Y} = (\bm{X}_0)_{i,:}$, it is straightforward to verify that $\bm{Z}_i$, $i\in \left[ m \right]$, is a solution of (\ref{eq:lestsquare}). The solutions $\bm{Z}_i$, $i\in \left[ m \right]$, are linearly independent. This can be easily verified by observing that the positions of nonzero elements in $\bm{Z}_i$ and $\bm{Z}_j$, $i \ne j$, are different. \end{proof} \subsubsection{Necessary Conditions for Unique Recovery \label{subsub:NecessaryConditionUniqueRecovery} } We now consider the uniqueness of the solution in more detail and derive necessary conditions for unique recovery. Two ambiguities can be identified in the dictionary update problem in (\ref{eq:lestsquare}). The first is permutation ambiguity. Let $\Omega_i$ and $\Omega_j$ be the support sets (the index set containing indices corresponding to nonzero entries) of the $i$-th and $j$-th row of $\bm{X}_0$. If $\Omega_i=\Omega_j$, then the tuple $(\bm{D}_0 \bm{P}_{i\Leftrightarrow j }, \bm{P}_{i\Leftrightarrow j } \bm{X}_0)$ is a valid solution of (\ref{eq:bilinear}), where $\bm{P}_{i\Leftrightarrow j }$ denotes the permutation matrix generated by permuting the $i$-th and $j$-th row of the identity matrix. On the other hand, there is no permutation ambiguity if $\Omega_i \ne \Omega_j$ for all $i \ne j$. In practice, the given sparsity pattern is typically diverse enough to avoid permutation ambiguity. The second is the scaling ambiguity which cannot be avoided. Let $\bm{S}$ be a diagonal matrix with nonzero diagonal elements. It is clear that the tuple $(\bm{D}_0 \bm{S}, \bm{S}^{-1} \bm{X}_0)$ is also a valid solution of (\ref{eq:bilinear}). All solutions of the form $(\bm{D}_0 \bm{S}, \bm{S}^{-1} \bm{X}_0)$ form an equivalent class. The scaling ambiguity can be addressed by ntroducing additional constraints. One option used in \cite{ling2018self} is that the sum of the elements in each row of $\bm{H}$ is one, i.e., $\sum_j \bm{H}_{i,j}=1, \forall i $. With these constraints, one has \begin{equation} \bm{H}[\bm{Y},\bm{1}_{m\times 1}] = [\bm{X}, \bm{1}_{m \times 1}] \;\; \rm{and} \;\; \mathcal{P}_{\Omega^c}(\mathbf{X}) = \mathbf{0}. \label{eq:LeastSquare-Scaling} \end{equation} Henceforth, we define unique recovery as unique up to the scaling ambiguity. \begin{defn}[Unique Recovery] \label{def:UniqueRec} The dictionary update problem (\ref{eq:bilinear}) is said to admit a unique solution if all solutions are of the form $\bm{D} = \bm{D}_0\bm{S}$ and $\bm{X} = \bm{S}^{-1}\bm{X}_0$ for some diagonal matrix $\bm{S}$ with nonzero diagonal elements. \end{defn} In the following, we identified three necessary conditions for unique recovery. \begin{prop}\label{pro:NecessaryBd} Assume that $\bm{D}_0$ is square and invertible. If the problem (\ref{eq:bilinear}) has unique solution, then it holds that \begin{enumerate} \item \label{cond:1} $n \geq n_0 = m+\frac{| \Omega |}{m}-1$. \item \label{cond:2} For all $i\in [m]$, the support set of the $i$-th row of $\bm{X}_0$, denoted by $\Omega_i$, satisfies $|\Omega_i^c | \ge m-1$. \item \label{cond:3} For all $i\in [m]$ and all $i^{\prime} \ne i$, $\exists j \in \left[ n \right] $ such that $(\bm{X}_0)_{i,j} = 0$ and $(\bm{X}_0)_{i^{\prime},j}\neq 0$. \end{enumerate} \end{prop} \begin{proof} Necessary condition \ref{cond:1} is proved by using the fact that the solution of (\ref{eq:LeastSquare-Scaling}) is unique only if the number of equations is larger or equal than the number of unknown variables. The number of unknown variables in (\ref{eq:LeastSquare-Scaling}) is $(n+m)m$ while the number of equations in (\ref{eq:LeastSquare-Scaling}) is $(n+1)m + (nm-|\Omega|)$. Elementary calculations lead to the bound $n_0$. The proof of the other two necessary conditions is based on the fact that \begin{equation*} (\bm{H}_0)_{i,:}\bm{Y} = (\bm{X}_0)_{i,:}, \end{equation*} where $\bm{H}_0 = \bm{D}_0^{-1}$. To simplify the notations, we omit the subscript 0 from $\bm{H}_0$, $\bm{D}_0$ and $\bm{X}_0$ in the rest of this proof. Divide the sample matrix $\bm{Y}$ into two sub-matrices $\bm{Y}_{:,\Omega_i}$ and $\bm{Y}_{:,\Omega_i^c}$. Then it holds that \begin{equation*} \bm{H}_{i,:}\bm{Y}_{:,\Omega_i^{c}} = \bm{0}^{T},~{\rm and}~\bm{H}_{i,:}\bm{Y}_{:,j}\ne 0~\forall j\in \Omega_i. \label{null} \end{equation*} ($\bm{H}_{i,:}^T$ is in the null space of $\bm{Y}_{:,\Omega_i^{c}}$.) Hence $\bm{H}_{i,:}$ is unique (up to a scaling factor) if and only if ${\rm span}(\bm{Y}_{:,\Omega_i^{c}})$ has dimension $m-1$. In this case, ${\rm span}(\bm{H}_{i,:}^T)$ is the null space of both ${\rm span}(\bm{Y}_{:,\Omega_i^{c}})$ and ${\rm span}(\bm{D}_{:,\{i\}^c})$. It is concluded that $\bm{H}_{i,:}$ is unique if and only if ${\rm span} ( \bm{Y}_{:,\Omega^{c}_{i}} ) = {\rm span} ( \bm{D}_{ :,\left\{ i \right\} ^{c} } ) $. Necessary condition \ref{cond:2} follows directly from that ${\rm rank} ( \bm{Y}_{:,\Omega^{c}_{i}} ) = m-1$. To prove the last necessary condition, note first that the fact that ${\rm span} ( \bm{Y}_{:,\Omega^{c}_{i}} ) = {\rm span} ( \bm{D}_{ :,\left\{ i \right\} ^{c} } ) $ implies that each column of $ \bm{D}_{ :,\left\{ i \right\} ^{c} } $ participates in generating some columns of $\bm{Y}_{:,\Omega^{c}_{i}}$. That is, $\forall i^{\prime}\ne i$, $\bm{D}_{:,i^{\prime}}$ participates in generating $\bm{Y}_{:,j}$ for some $j \notin \Omega^{c}_{i}$. Necessary condition \ref{cond:3} is therefore proved. Note that condition \ref{cond:3} is not sufficient. It does not prevent the following rank deficient case: there exist $i_1^{\prime},i_2^{\prime}\in \left\{i\right\}^c$ such that both $ \bm{D}_{ :,i_1^{\prime} } $ and $ \bm{D}_{ :,i_2^{\prime} } $ only participate in generating a single sample in $\bm{Y}_{:,j}$ for some $j\in\Omega_i^{c}$. \end{proof} \subsubsection{Discussions on the Number of Samples \label{subsub:NumberOfSamples}} We now study the number of samples $n$ needed to ensure that the necessary conditions for unique recovery, as specified in Proposition \ref{pro:NecessaryBd}, hold with high probability. To that end we use the following probabilistic model: entries of $\bm{D}_0\in \mathbb{R}^{m \times m}$ are independently generated from the Gaussian distribution $\mathcal{N}(0,\frac{1}{m})$, and entries of $\bm{X}_0 \in \mathbb{R}^{m \times n}$ are independently generated from the Bernoulli-Gaussian distribution $BG(\theta)$ with $\theta \in [0,1]$, where Bernoulli-Gaussian distribution is defined as follows. \begin{defn}\label{def:BernGaussDict} A random variable $X$ is Bernoulli-Gaussian distributed $X\sim BG(\theta)$ with $\theta \in \left[0,1\right]$, if $X = W\cdot C$, where random variables $W$ and $C$ are independent, $W$ is Bernoulli distributed with parameter $\theta$, and $C\sim \mathcal{N}(0,1)$. \end{defn} \begin{rem} The Gaussian distribution is not essential. It can be replaced by any continuous distribution. \end{rem} \begin{prop}[Number of Samples]\label{prop:NumOfSamples} Suppose that $\bm{Y} = \bm{D}_0 \bm{X}_0$ where $\bm{D}_0$ and $\bm{X}_0$ are generated according to the above probability model. Given a constant $\epsilon\in (0,1)$, the $i$-th necessary condition in Proposition \ref{pro:NecessaryBd} holds with probability at least $1-\epsilon$, if $n \ge n_i$, where \begin{align*} n_1 & = \frac{m-1}{1-\theta}\left[1-\frac{\ln\epsilon}{4m\left(m-1\right)\left(1-\theta\right)}\right.\\ & \quad\left.+\sqrt{\left(1-\frac{\ln\epsilon}{4m\left(m-1\right)\left(1-\theta\right)}\right)^{2}-1}\right]. \end{align*} \begin{align*} n_2 & =\frac{m-1}{1-\theta}\left[1-\frac{\ln\epsilon-\ln m}{4\left(m-1\right)\left(1-\theta\right)}\right.\\ & \quad\left.+\sqrt{\left(1-\frac{\ln\epsilon-\ln m}{4\left(m-1\right)\left(1-\theta\right)}\right)^{2}-1}\right]. \end{align*} and \begin{equation*} n_{3}=\frac{\ln\epsilon-\ln m-\ln\left(m-1\right)}{\ln\left(1-\theta\left(1-\theta\right)\right)}. \end{equation*} Furthermore, it holds that $n_1 \le n_2$. If $n \ge \max(n_2,n_3)$, then all three necessary conditions in Proposition \ref{pro:NecessaryBd} hold. \end{prop} \begin{proof} See Appendix A. \end{proof} \begin{rem} We have the following observations. \begin{itemize} \item With fixed $\epsilon$ and $\theta$, $n_1$ and $n_2$ scale linearly with $m$ while $n_3$ is proportional to $\ln m$. \item With fixed $m$ and $\theta$, $n_1$, $n_2$, and $n_3$ increase proportionally to $-\ln \epsilon$. \item With fixed $m$ and $\epsilon$, when $\theta$ increases from 0 to 1, $n_1$ and $n_2$ increase, while $n_3$ first decreases and then increases. This matches the intuition that when $\theta$ is too small, we need more samples to have enough information to recover the dictionary. On the other hand, when $\theta$ is too large, more samples are needed to generate the orthogonal space of each $\bm{H}^{T}_{i,:}$. This is verified by simulations in Section \ref{sec:Simulation}. \end{itemize} \end{rem} The bound $\max(n_2,n_3)$ provides a good estimate of the number of samples needed for unique recovery. By set theory, if event $A$ is a necessary condition for $B$, then $B$ implies $A$, or equivalently, $B \subseteq A$ and $\Pr(B)\le \Pr(A)$. In Proposition \ref{prop:NumOfSamples}, the quantity $1-\epsilon$ is a lower bound for $\Pr(A)$, where these necessary conditions hold. But unfortunately it is neither lower nor upper bound for $\Pr(B)$, where the dictionary can be uniquely recovered. Nevertheless, our simulations show that $\max(n_2,n_3)$ is a good approximation to the number of samples needed to recover the dictionary uniquely with probability more than $1-\epsilon$. In an asymptotic regime, the bounds can be simplified. \begin{cor}[Asymptotic Bounds]\label{cor:AsymptBd} Consider the same settings as in Proposition \ref{prop:NumOfSamples}. For a given $\theta \in (0,1)$, let $m, n\rightarrow \infty$ with $\frac{n}{m} \rightarrow \bar{n} \in \mathbb{R}^{+}$. If $\bar{n}>\frac{1}{1-\theta}$, then all three necessary conditions in Proposition \ref{pro:NecessaryBd} holds with a probability arbitrary close to 1. \end{cor} This corollary follows from elementary calculations and the fact that $\ln(m)/m \rightarrow 0$ when $m \rightarrow \infty$. \section{Dictionary Update with Uncertainty \label{sec:Update-Uncertainty}} While Section \ref{sec:ExactUpdate} studies the ideal case, this section focuses on the general case using the insight from Section \ref{sec:ExactUpdate}. In practice, there may be noise in the training samples $\bm{Y}$, and there may be errors in the assumed sparsity pattern. The exact equality in (\ref{eq:bilinear}) may not hold any longer. Following the idea in Section \ref{sec:ExactUpdate}, total least squares methods are applied to handle the uncertainties. The techniques for non-overcomplete and overcomplete dictionaries are developed in Sections \ref{sub:uncertainty-non-overcomplete} and \ref{sub:uncertainty-overcomplete-dictionary} respectively. \subsection{Non-overcomplete Dictionary Update \label{sub:uncertainty-non-overcomplete}} In the case $m \ge l$, let $\bm{H}=\bm{D}^{\dagger}$ be the pseudo-inverse of $\bm{D}$ and assume that $\bm{H}\bm{D}=\bm{I}_{l \times l}$. Due to the uncertainty, Equation \eqref{eq:LeastSquare-Scaling} becomes approximate, that is, \begin{equation} \bm{H} [\bm{Y}, \bm{1}] \approx [\bm{X},\bm{1}] \;\; {\rm and} \;\; \mathcal{P}_{\Omega^c} ( \bm{X} ) \approx \bm{0}. \label{eq:linear_approx} \end{equation} Total least squares is a technique to solve a least squares problem in the form $ \bm{A}\bm{X} \approx \bm{B}$ where errors in both observations $\bm{B}$ and regression models $\bm{A}$ are considered\cite{markovsky2007overview,Rhode2014A}. It targets at minimising the total errors via \begin{equation} \underset{\tilde{\bm{A}},\tilde{\bm{B}},\bm{X}}{\min} \; \Vert [ \bm{A}-\tilde{\bm{A}}, \bm{B}-\tilde{\bm{B}} ] \Vert_{F}^{2}, \; {\rm subject\;to} \; \tilde{\bm{A}}\bm{X}=\tilde{\bm{B}}. \label{eq:TLS-original} \end{equation} The constraint set above is nonconvex and hence \eqref{eq:TLS-original} is a nonconvex optimisation problem. Nevertheless, its global optimal solution can be obtained by using the singular value decomposition (SVD). Set $\bm{Z}=[ \bm{X}^T, -\bm{I} ]^T$. Observe that the constraint in \eqref{eq:TLS-original} implies that $[ \tilde{\bm{A}}, \tilde{\bm{B}} ] \bm{Z} = \bm{0}$. The optimal $\bm{Z}$ can be obtained from the smallest right singular vectors of the matrix $[ \bm{A},\bm{B} ]$, and the optimal $[ \tilde{\bm{A}}, \tilde{\bm{B}} ]$ is a best lower-rank approximation of the matrix $[ \bm{A},\bm{B} ]$. The difficulty in applying total least squares directly is due to the additional constraint $\mathcal{P}_{\Omega^c} ( \mathbf{X} ) \approx \mathbf{0}$ in \eqref{eq:linear_approx}. Below we present three possible solutions, where the last one IterTLS excels and is adopted. \subsubsection{Structured Total Least Squares (STLS) \label{subsub:STLS}} Consider having uncertainties in both $\bm{Y}$ and the sparsity pattern. Based on \eqref{eq:linear_approx}, a straightforward total least squares formulation is \begin{align} \min_{\tilde{\bm{Y}},\tilde{\bm{X}},\bm{H}}\; & \frac{1}{2} \Vert \bm{Y}-\tilde{\bm{Y}} \Vert_{F}^{2} + \frac{1}{2} \Vert \mathcal{P}_{\Omega^{c}}\left(\tilde{\bm{X}}\right) \Vert_{2}^{2} \label{eq:sTLS-original}, \\ {\rm s.t.}\; & \bm{H} [\tilde{\bm{Y}},\bm{1} ]= [\tilde{\bm{X}},\bm{1} ]. \nonumber \end{align} To solve the above nonconvex optimisation problem, we follow the approach in \cite{lemmerling2003efficient}. It involves an iterative process where each iteration solves an approximated quadratic optimisation problem which admits a closed-form optimal solution. At each iteration, denote the initial estimate of $(\tilde{\bm{Y}},\tilde{\bm{X}},\bm{H} )$ by $(\hat{\bm{Y}}, \hat{\bm{X}}, \hat{\bm{H}})$. Note that the constraint set in \eqref{eq:sTLS-original} can be written as $\mathcal{L} (\tilde{\bm{Y}},\tilde{\bm{X}},\bm{H} ) = \bm{0}$ where \[ \mathcal{L} (\tilde{\bm{Y}},\tilde{\bm{X}},\bm{H} ) :=\bm{H} [\tilde{\bm{Y}},\bm{1}] - [\tilde{\bm{X}},\bm{1}]. \] We consider the first order Taylor approximation of $\mathcal{L} (\tilde{\bm{Y}},\tilde{\bm{X}},\bm{H} )$ at given $(\hat{\bm{Y}}, \hat{\bm{X}}, \hat{\bm{H}})$, which reads \[ \mathcal{L} ( \tilde{\bm{Y}}, \tilde{\bm{X}}, \bm{H} ) = \mathcal{L} ( \hat{\bm{Y}}, \hat{\bm{X}}, \hat{\bm{H}} ) + \bm{J} ( \bm{z}-\hat{\bm{z}} ), \] where $\bm{z}:=[{\rm vect}(\tilde{\bm{Y}})^{T}, {\rm vect}(\tilde{\bm{X}})^{T}, {\rm vect}(\bm{H})^{T}]^{T}$, $\hat{\bm{z}}:=[ {\rm vect}(\hat{\bm{Y}})^{T}, {\rm vect}(\hat{\bm{X}})^{T}, {\rm vect}(\hat{\bm{H}})^{T}]^{T}$, and $\bm{J}$ is the corresponding Jacobian matrix. With this approximation, the nonconvex optimisation problem in \eqref{eq:sTLS-original} becomes a quadratic optimisation problem with equality constraints \begin{align} \underset{\tilde{\bm{Y}}, \tilde{\bm{X}}, \bm{H}}{\min} \; & \frac{1}{2} \Vert \bm{Y}-\tilde{\bm{Y}}\Vert_{F}^{2} + \frac{1}{2}\Vert \mathcal{P}_{\Omega^{c}} (\tilde{\bm{X}})\Vert_{2}^{2} \label{eq:STLS-approx},\\ {\rm s.t.}\; & \mathcal{L} ( \hat{\bm{Y}}, \hat{\bm{X}}, \hat{\bm{H}} ) + \bm{J} ( \bm{z} - \hat{\bm{z}} ) = \bm{0}. \nonumber \end{align} This is a quadratic optimisation problem with linear equality constraints, and admits a closed-form solution by a direct application of KKT conditions \cite{Fletcher2013}. The STLS approach has two issues. The first issue is its very high computational cost. The quadratic optimisation problem \eqref{eq:STLS-approx} involves $mn+ln+lm$ unknowns and $l(n+1)$ equation constraints. Its closed-form solution involves a matrix of size $(n(m+2l)+l(m+1))\times (n(m+2l)+l(m+1))$. We have obtained the closed-form of the Jacobian matrix $\bm{J}$, implemented a conjugate gradient algorithm to use the structures in \eqref{eq:STLS-approx} for a speed-up (details are omitted here). However, simulations in Section \ref{sub:TestTLS} show that the computation speed is still too slow for practical problems. The second issue is the inferior performance compared to other TLS methods in Sections \ref{subsub:ParTLS} and \ref{subsub:ProjectedTLS}. This is because Taylor approximation of the constraint is used in STLS, while other TLS methods below incorporate the constraints directly without Taylor approximation. \subsubsection{Parallel Total Least Squares (ParTLS) \label{subsub:ParTLS}} The key idea of ParTLS is to decouple the problem \eqref{eq:linear_approx} into $l$ sub-problems that can be solved in parallel: \begin{equation*} \bm{H}_{i,:} [\bm{Y},\bm{1}]\approx [\bm{X}_{i,:},1] \;{\rm and} \; \bm{X}_{i,\Omega_i^c} \approx \bm{0}, \forall i\in [l]. \end{equation*} It is straightforward to verify that this is equivalent to \begin{equation} \label{eq:decomposition} \underbrace{\left[\begin{array}{cc} \bm{Y}^{T} & -\bm{P}_{\Omega_{i}}\\ \bm{1} & \bm{0} \end{array}\right]}_{\bm{A}_{i}} \underbrace{\left[\begin{array}{c} \bm{H}_{i,:}^{T}\\ \bm{X}_{i,\Omega_{i}}^{T} \end{array}\right]}_{\bm{z}_{i}} \approx \underbrace{\left[\begin{array}{c} \bm{0}\\ 1 \end{array}\right]}_{\bm{b}} , \; \forall i\in\left[l\right], \end{equation} where $\bm{P}_{\Omega_i}\in \mathbb{R}^{n \times |\Omega_i|}$ is the projection matrix obtained by keeping the columns of the identity matrix indexed by $\Omega_i$ and removing all other columns. Sub-problems (\ref{eq:decomposition}) can be solved by directly applying the TLS formulation \eqref{eq:TLS-original}. Note that $[\tilde{\bm{A}}_{i}, -\tilde{\bm{b}}] [\bm{z}_{i}^{T},1]^{T} = \bm{0}$. The vector $[\bm{z}_{i}^{T},1]^T$ can be computed as a scaled version of the least right singular vector of the matrix $[\bm{A}_{i}, -\bm{b}]$. Then $\bm{H}_{i,:}$ and $\bm{X}_{i,\Omega_i}$ can be obtained from $\bm{z}_i$. ParTLS enjoys the following advantages. 1) Its global optimality is guaranteed for the ideal case of no data noise or sparsity pattern errors. It is straightforward to see that in the ideal case the ParTLS solutions satisfy \eqref{eq:LeastSquare-Scaling}. 2) It is computationally efficient. The sub-problems (\ref{eq:decomposition}) are of small size and can be solved in parallel. However, ParTLS also has its own issue --- certain structures in the problem are not enforced. For different sub-problem $i\in [l]$, the `denoised' $\bm{Y}$, denoted by $\tilde{\bm{Y}}_i$ can be different. \subsubsection{Iterative Total Least Squares (IterTLS) \label{subsub:ProjectedTLS}} IterTLS is an iterative algorithm such that in each iteration a total least squares problem is formulated based on the estimate from the previous iteration. It starts with an initial estimate obtained by solving the ideal case equation \eqref{eq:LeastSquare-Scaling}. In each iteration, let $\hat{\bm{X}}$ be an estimate of $\bm{X}$ from either initialisation or the previous iteration. We formulate the following total least squares problem \begin{equation}\label{eq:suboptimalTLS} \min_{\tilde{\bm{Y}},\tilde{\bm{X}},\bm{H}} \; \left\Vert [\bm{Y}^{T}-\tilde{\bm{Y}}^{T} , \hat{\bm{X}}^{T}-\tilde{\bm{X}}^{T} ] \right\Vert _{F}^{2} \; {\rm s.t.} \; \tilde{\bm{Y}}^{T} \bm{H}^{T} = \tilde{\bm{X}}^{T}, \end{equation} which has the identical form as \eqref{eq:TLS-original}. Note that the constraint $\mathcal{P}_{\Omega^c}(\bm{X}) \approx \bm{0}$ in \eqref{eq:linear_approx} is implicitly imposed as $\mathcal{P}_{\Omega^c}(\hat{\bm{X}})=\bm{0}$. The problem \eqref{eq:suboptimalTLS} can be optimally solved by using the SVD \begin{equation*} \left[\bm{Y}^{T},\hat{\bm{X}}^{T}\right] = \left[\bm{U}_{Y},\bm{U}_{X}\right] \left[\begin{array}{cc} \bm{\Sigma}_{Y} & \bm{0}\\ \bm{0} & \bm{\Sigma}_{X} \end{array}\right] \left[\begin{array}{cc} \bm{V}_{YY} & \bm{V}_{YX}\\ \bm{V}_{XY} & \bm{V}_{XX} \end{array}\right]^{T}. \end{equation*} The optimal solution is given by $\tilde{\bm{Y}}^{T} = \bm{U}_{Y} \bm{\Sigma}_{Y} \bm{V}_{YY}^{T}$ and $\tilde{\bm{X}}^{T} = \bm{U}_{Y} \bm{\Sigma}_{Y} \bm{V}_{XY}^{T}$. To prepare the next iteration, one obtains an updated estimate $\hat{\bm{X}}^{\prime}$ by applying a simple projection operator to $\tilde{\bm{X}}$: $\mathcal{P}_{\Omega}(\hat{\bm{X}}^{\prime})=\mathcal{P}_{\Omega}(\tilde{\bm{X}})$ and $\mathcal{P}_{\Omega^{c}}(\hat{\bm{X}}^{\prime})=\bm{0}$. With this new estimate $\hat{\bm{X}}^{\prime}$, one can proceed with the next iteration until convergence. \subsection{Update Overcomplete Dictionary \label{sub:uncertainty-overcomplete-dictionary}} The difficulty of overcomplete dictionary update comes from the fact that for an overcomplete dictionary $\bm{D}_0$, $\bm{D}_0^{\dagger} \bm{D}_0 \ne \bm{I}$ in general, where $\bm{D}_0^{\dagger}$ is the pseudo-inverse of $\bm{D}_{0}$. Therefore, the above least squares or total least squares approaches cannot be directly applied. To address this issue, a straightforward approach is to divide the whole dictionary into a set of sub-dictionaries each of which is either complete or undercomplete, and then update these sub-dictionaries one-by-one whilst fixing all other sub-dictionaries and the corresponding coefficients. More explicitly, given estimated $\bm{D}$ and $\bm{X}$, consider updating $\bm{D}_{:,\mathcal{T}}$, the submatrix of $\bm{D}$ consisting of columns indexed by $\mathcal{T}$, and $\bm{X}_{\mathcal{T,:}}$, the submatrix of $\bm{X}$ consisting of rows indexed by $\mathcal{T}$. Then, consider the residual matrix \begin{equation} \bm{Y}_r = \bm{Y}-\bm{D}_{:,\mathcal{T}^c} \bm{X}_{\mathcal{T}^c,:}, \end{equation} and apply the method in Section \ref{subsub:ProjectedTLS} to solve the problem $\bm{Y}_r \approx \bm{D}_{:,\mathcal{T}} \bm{X}_{\mathcal{T},:}$. Then repeat this step for all sub-dictionaries. As the dictionary is updated block by block, we refer to our algorithm as BLOck Total LEast SquareS (BLOTLESS). \section{Numerical Test \label{sec:Simulation}} Parts of the numerical tests are based on synthetic data. The training samples $\bm{Y}=\bm{D}_0 \bm{X}_0$ are generated according to the probability model specified in Section \ref{subsub:NumberOfSamples}. When the dictionary recovery is not exact, the performance criterion is the difference between the ground-truth dictionary $\bm{D}_0$ and the estimated dictionary $\hat{\bm{D}}$. In particular, the estimation error is defined as \begin{equation} R_{\rm err} = \frac{1}{l}\sum_{p=1}^{l} \left(1-| \bm{\hat{d}}_{p}^{T} \bm{d}_{0_{j_{p}}} |\right), \label{eq:Dictionary_error} \end{equation} where $\bm{\hat{d}}_{p}$ is the $p$-th item in the estimated dictionary, $\bm{d}_{0_{j_{p}}}$ is the $j_p$-th item in the ground-truth dictionary, $j_p = \arg \max_{j\in \mathcal{J}_p} \{|\bm{\hat{d}}_{p}^{T}\bm{d}_{0_j}|\}$ and $\mathcal{J}_p = [l] \setminus \{j_1,j_2,\cdots,j_{p-1}\}$. The items in both dictionaries are normalised to have unit $\ell_2$-norm. Numerical tests based on real data are presented in Section \ref{subsub:RealData} for image denoising. The performance metric is the Peak Signal-to-Noise-Ratio (PSNR) of the denoised images. \subsection{Simulations for Exact Dictionary Recovery} In this section we evaluate numerically bounds in Proposition \ref{prop:NumOfSamples}. All the results presented here are based on 100 random and independent trials. For theoretical performance prediction, we compute $n_2$, $n_3$, and $\max(n_2,n_3)$ using $\epsilon=0.01$. In the numerical simulations, we vary $n$ and find its critical value $n_{\rm sim}$ under which exact recovery happens with an empirical probability at most 99\% and above which exact recovery happens with an empirical probability at least 99\%. \begin{figure}[h] \centering \subfigure[$\theta=0.1$, $\max(n_2,n_3)=121$]{ \label{fig:probability:4} \includegraphics[width=0.23\textwidth]{Fig//prob_30_3}} \subfigure[$\theta=0.2$, $\max(n_2,n_3)=65$]{ \label{fig:probability:6} \includegraphics[width=0.23\textwidth]{Fig//prob_30_6}} \subfigure[$\theta=0.3$, $\max(n_2,n_3)=64$]{ \label{fig:probability:10} \includegraphics[width=0.23\textwidth]{Fig//prob_30_9}} \subfigure[$\theta=0.4$, $\max(n_2,n_3)=78$]{ \label{fig:probability:12} \includegraphics[width=0.23\textwidth]{Fig//prob_30_12}} \caption{Probability of exact recovery against the number of training samples for $m=30$. } \label{fig:probability} \end{figure} \begin{figure}[h] \centering \subfigure[$m=15$]{ \label{fig:sim:1} \includegraphics[width=0.23\textwidth]{Fig//bound_15_diff_k}} \centering \subfigure[$m=20$]{ \label{fig:sim:2} \includegraphics[width=0.23\textwidth]{Fig//bound_20_diff_k}} \subfigure[$m=25$]{ \label{fig:sim:3} \includegraphics[width=0.23\textwidth]{Fig//bound_25_diff_k}} \subfigure[$m=30$]{ \label{fig:sim:4} \includegraphics[width=0.23\textwidth]{Fig//bound_30_diff_k}} \caption{Normalised number of training samples $n/m$ for at least 99\% probability of exact recovery versus $m$. } \label{v_shape} \end{figure} We start with the relation between the number of training samples $n$ and the sparsity ratio $\theta$ for a given $m$. In Figure \ref{fig:probability}, we fix $m=30$, vary $\theta$, and study the probability of exact recovery against the number of training samples. Results in Figure \ref{fig:probability} show that the theoretical prediction $\max(n_2,n_3)$ is quite close to the critical $n_{\rm{sim}}$ obtained by simulations. One can also observe that the needed number of training samples first decreases and then increases as $\theta$ increases, which is also predicted by the theoretical bounds. A larger scale numerical test is done in Figure \ref{v_shape}, where four sub-figures correspond to four different values of $m$. Once again, simulations demonstrate these bounds in Proposition \ref{prop:NumOfSamples} match the simulations very well. \begin{figure}[h] \centering \includegraphics[width=0.36\textwidth]{Fig//m_logm_compare} \caption{Required $n$ for exact recovery versus $m$ with a given $\theta = 0.2$.} \label{sampling_order} \end{figure} Let us consider the required $n$ for exact recovery as a function of $m$ by fixing $\theta = 0.2$. Simulation results are depicted in Figure \ref{sampling_order}. When $n_3 \ge n_2$, $n_{\rm sim}$ behaves as $\ln m$. Otherwise, $n_{\rm sim}$ behaves as $m$. This is consistent with Proposition \ref{prop:NumOfSamples}. \begin{figure}[h] \centering \includegraphics[width=0.4\textwidth]{Fig//t_bound} \caption{Asymptotic bounds in Corollary \ref{cor:AsymptBd} compared with empirical results for finite $m$. } \label{t_bound} \end{figure} Finally, we numerically study the accuracy of the asymptotic results in Corollary \ref{cor:AsymptBd}. We draw normalised number of training samples $n/m$ for exact recovery as a function of sparsity ratio $\theta$ for different values of $m$, including $m=16,\;32,\;64$. Simulation results in Figure \ref{t_bound} show a trend that is consistent with the asymptotic results in Corollary \ref{cor:AsymptBd}. \subsection{Total Least Squares Methods \label{sub:TestTLS}} The three total least squares methods introduced in Section \ref{sec:Update-Uncertainty} are compared, henceforth denoted by BLOTLESS-STLS, BLOTLESS-ParTLS and BLOTLESS-IterTLS respectively, by being embedded in the dictionary learning process. Random dictionaries are used as the initial starting point of dictionary learning. OMP is used for sparse coding. \begin{figure}[h] \centering \subfigure[$m=l=64$, $\theta=5/64$, $n=400$]{ \label{fig:complete-d} \includegraphics[width=0.23\textwidth]{Fig//BLOTLESS_diffUP_compare_Square}} \hspace{0.025cm} \subfigure[$m=64$, $l=128$, $\theta=5/128$, $n=800$]{ \label{fig:overcomplete-d} \includegraphics[width=0.23\textwidth]{Fig//BLOTLESS_diffUP_compare_NonSquare}} \caption{Performance comparison of different total least squares methods when used in the overall dictionary learning process. Results are averages of 50 independent trials.} \label{fig:comp_STLS_proj} \end{figure} \begin{table}[h] \centering \caption{Runtime (seconds per iteration of the dictionary learning process) comparison for different total least squares methods: $m=l=64$, $\theta = 5/64$, and number of iterations $n_{\rm it} =50$. Results are averages of 50 independent trials using Matlab 2018b on a MacBook Pro with 16GB RAM and 2.3 GHz Intel Core i5 processor.} \label{tab:Run_time} \begin{tabular}{c|c|c|c|c} \hline & $n=200$ &$n=300$ & $n=400$ & $n=500$\\ \hline STLS & 621.6544 & 836.3027 & 1098.5955 & 1265.1895 \\ \hline ParTLS & 9.2544 & 18.1191 & 25.3678 & 31.0551 \\ \hline IterTLS & 6.3446 & 8.5157 & 10.9026 & 13.8056\\ \hline \end{tabular} \end{table} Fig. \ref{fig:comp_STLS_proj} compares the dictionary learning errors \eqref{eq:Dictionary_error} for both complete and over-complete dictionaries. BLOTLESS-IterTLS converges the fastest and has the smallest error floor. Then a runtime comparison is given in Table \ref{tab:Run_time}. BLOTLESS-IterTLS clearly outperforms the other two methods. It is therefore used as the default dictionary update method in later simulations. \subsection{Robustness to Errors in Sparsity Pattern} \begin{figure}[h] \centering \includegraphics[width=0.36\textwidth]{Fig//BLOTLESS_compare_SPerror} \caption{Performance comparison of different update algorithm when different sparse pattern mismatch is applied. $m=l=64$, $\theta=5/64$, $n=500$. Results are averages of 100 independent trials.} \label{fig:Sp_micmatch2} \end{figure} Simulations are next designed to evaluate the robustness of different dictionary update algorithms to errors in sparsity pattern. Towards that end, a fraction $r$ of indices in the true support are randomly chosen to be replaced with the same number of randomly chosen indices not in the true support set. This erroneous sparsity pattern is then fed into different dictionary update algorithms. The numerical results in Fig. \ref{fig:Sp_micmatch2} demonstrate the robustness of BLOTLESS (with IterTLS). \subsection{Dictionary Learning with BLOTLESS Update} This subsection compares dictionary learning performance for different dictionary update methods. The sparse coding algorithm is OMP. IterTLS in Section \ref{subsub:ProjectedTLS} is used for BLOTLESS. Results for synthetic data are presented in Section \ref{subsub:SyntheticData} while Section \ref{subsub:RealData} focuses on image denoising using real data. \subsubsection{Synthetic Data \label{subsub:SyntheticData}} \begin{figure}[h] \centering \subfigure[$m=l=64$, $n=400$, $\theta=5/64$.]{ \label{fig:3} \includegraphics[width=0.23\textwidth]{./Fig/compare_diff_measurement_repeat6464}} \hspace{0.025cm} \subfigure[$m=64$, $l=128$, $n=600$, $\theta=5/128$.]{ \label{fig:4} \includegraphics[width=0.23\textwidth]{./Fig/compare_diff_measurement_repeat64128}} \subfigure[$m=l=64$, $\theta=5/64$, $n_{\rm it}=150$.]{ \label{fig:5} \includegraphics[width=0.23\textwidth]{./Fig/stable_diff_measurement_repeat6464}} \hspace{0.025cm} \subfigure[$m=64$, $l=128$, $\theta=5/128$, $n_{\rm it}=150$.]{ \label{fig:7} \includegraphics[width=0.23\textwidth]{./Fig/stable_diff_measurement_repeat64128}} \caption{Comparison of dictionary update methods for the noise free case. Results are averages of 100 trials.} \label{fig:DL_noisefree} \end{figure} \begin{figure}[h] \centering \subfigure[$m=l=64$, $n=500$, $\theta=5/64$.]{ \label{fig:9} \includegraphics[width=0.23\textwidth]{./Fig/comp_dic_64_64_5_500_15dB}} \hspace{0.025cm} \subfigure[$m=64$, $l=128$, $n=700$, $\theta=5/128$.]{ \label{fig:10} \includegraphics[width=0.23\textwidth]{./Fig/comp_dic_64_128_5_700_15dB}} \subfigure[$m=l=64$, $\theta=5/64$, $n_{\rm it}=150$.]{ \label{fig:8} \includegraphics[width=0.23\textwidth]{./Fig/noisy_64_64_5_15dB}} \hspace{0.025cm} \subfigure[$m=64$, $l=128$, $\theta=5/128$, $n_{\rm it}=150$.]{ \label{fig:11} \includegraphics[width=0.23\textwidth]{./Fig/noisy_64_128_5_15dB}} \caption{Comparison of dictionary update methods for the noisy case: SNR is 15dB. Results are averages of 100 trials. $n_{\rm it}$ denoes the number of iterations.} \label{fig:DL_noisy} \end{figure} Fig. \ref{fig:DL_noisefree} and \ref{fig:DL_noisy} compare the performance of dictionary learning using different dictionary update algorithms. Fig. \ref{fig:DL_noisefree} focus on the noise free case where $\bm{Y}=\bm{D}_0 \bm{X}_0$ and Fig. \ref{fig:DL_noisy} concerns with the noisy case where $\bm{Y}=\bm{D}_0 \bm{X}_0 + \bm{W}$ where $\bm{W}$ is the additive Gaussian noise matrix with i.i.d. entries and the signal-to-noise ratio (SNR) is set to 15dB. Both figures include the cases of complete and over-complete dictionaries. The results presented in Fig. \ref{fig:DL_noisefree} and \ref{fig:DL_noisy} clearly indicate that dictionary learning based on BLOTLESS converges much faster and needs at least $1/3$ less training samples than other benchmark dictionary update methods. \begin{figure}[h] \centering \includegraphics[width=0.36\textwidth]{./Fig/dic_rec_tsls_square_64_5_diff_blocksize} \caption{Dictionary learning via BLOTLESS with different block sizes: $m =l = 64$, $n=200$, $\theta=5/64$.} \label{diff_block_size} \end{figure} In BLOTLESS update, blocks of the dictionary (sub-dictionaries) are updated sequentially. Fig. \ref{diff_block_size} compares the performance with different block sizes. Note that when each block contains only one dictionary item, the dictionary update problem is the same as that in K-SVD. Hence the performance of K-SVD is added in Fig. \ref{diff_block_size}. Simulations suggest that the larger the dictionary blocks are, the faster the convergence is and the better performance is. The performance of BLOTLESS with block size one is slightly better than that of K-SVD. This is because the TLS step in IterTLS does not enforce the sparsity pattern and hence better accommodates errors in the estimated sparsity pattern. \subsubsection{Real Data \label{subsub:RealData}} We use the Olivetti Research Laboratory (ORL) face database \cite{samaria1994parameterisation} for dictionary learning and then use the learned dictionary for image denoising. For dictionary learning, according to the simulation results in Section \ref{subsub:SyntheticData}, $n=500$ samples of size $8\times 8$ patches from face images \textcolor{black}{are enough} for training a dictionary via BLOTLESS. The parameters used in dictionary learning are $m=64$, $l=128$, $\theta=10/128$, and $n_{\rm it}=20$. After learning a dictionary, image denoising \cite{elad2006image} is performed using test images from the same dataset. The denoising results are shown in Table \ref{tab:denoise_comp}, where four test images are used. In all these four tests, the BLOTLESS method outperforms all other algorithms, which is consistent with these simulations in \ref{subsub:SyntheticData}. \begin{table*}[h] \centering \fontsize{6.5}{8}\selectfont \caption{Denoising comparison using different learnt dictionaries, where the denoised PSNR (dB) are computed and shown in table.} \label{tab:denoise_comp} \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|c|c|c|} \hline Original Image& \multicolumn{3}{c|}{\tabincell{c}{\includegraphics[scale=0.55]{./Fig/test_face1}} }&\multicolumn{3}{c|}{\tabincell{c}{\includegraphics[scale=0.55]{./Fig/test_face2}}}&\multicolumn{3}{c|}{\tabincell{c}{\includegraphics[scale=0.55]{./Fig/test_face3}}}&\multicolumn{3}{c|}{\tabincell{c}{ \includegraphics[scale=0.55]{./Fig/test_face4}}}\cr\cline{1-13} Noisy Image&{\tabincell{c}{28.13 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig10}}}&{\tabincell{c}{22.11 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig20}}}&{\tabincell{c}{18.59 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig30}}}&{\tabincell{c}{28.13 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig10}}}&{\tabincell{c}{22.11 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig20}}}&{\tabincell{c}{18.59 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig30}}}&{\tabincell{c}{28.13 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig10}}}&{\tabincell{c}{22.11 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig20}}}&{\tabincell{c}{18.59 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig30}}}&{\tabincell{c}{28.13 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig10}}}&{\tabincell{c}{22.11 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig20}}}&{\tabincell{c}{18.59 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig30}}}\cr \hline \hline MOD&{\tabincell{c}{33.00 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig10_mod}}}&{\tabincell{c}{29.24 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig20_mod}}}&{\tabincell{c}{27.22 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig30_mod}}}&{\tabincell{c}{32.68 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig10_mod}}}&{\tabincell{c}{28.84 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig20_mod}}}&{\tabincell{c}{26.82 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig30_mod}}}&{\tabincell{c}{31.95 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig10_mod}}}&{\tabincell{c}{27.43 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig20_mod}}}&{\tabincell{c}{25.76 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig30_mod}}}&{\tabincell{c}{32.13 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig10_mod}}}&{\tabincell{c}{28.23 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig20_mod}}}&{\tabincell{c}{26.26 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig30_mod}}}\cr\hline K-SVD&{\tabincell{c}{32.50 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig10_ksvd}}}&{\tabincell{c}{28.72 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig20_ksvd}}}&{\tabincell{c}{26.79 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig30_ksvd}}}&{\tabincell{c}{32.03 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig10_ksvd}}}&{\tabincell{c}{28.26 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig20_ksvd}}}&{\tabincell{c}{26.35 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig30_ksvd}}}&{\tabincell{c}{31.49 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig10_ksvd}}}&{\tabincell{c}{27.43 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig20_ksvd}}}&{\tabincell{c}{25.31 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig30_ksvd}}}&{\tabincell{c}{31.58 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig10_ksvd}}}&{\tabincell{c}{27.74 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig20_ksvd}}}&{\tabincell{c}{25.81 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig30_ksvd}}}\cr\hline SimCO&{\tabincell{c}{33.43 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig10_simco}}}&{\tabincell{c}{29.78 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig20_simco}}}&{\tabincell{c}{27.81 dB\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig30_simco}}}&{\tabincell{c}{33.58 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig10_simco}}}&{\tabincell{c}{30.11 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig20_simco}}}&{\tabincell{c}{28.04 dB\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig30_simco}}}&{\tabincell{c}{32.18 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig10_simco}}}&{\tabincell{c}{28.51 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig20_simco}}}&{\tabincell{c}{26.47 dB\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig30_simco}}}&{\tabincell{c}{32.65 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig10_simco}}}&{\tabincell{c}{29.18 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig20_simco}}}&{\tabincell{c}{27.27 dB\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig30_simco}}}\cr\hline BLOTLESS&{\tabincell{c}{\textbf{33.67 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig10_blotless}}}&{\tabincell{c}{\textbf{29.90 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig20_blotless}}}&{\tabincell{c}{\textbf{27.95 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face1_sig30_blotless}}}&{\tabincell{c}{\textbf{33.91 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig10_blotless}}}&{\tabincell{c}{\textbf{30.33 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig20_blotless}}}&{\tabincell{c}{\textbf{28.20 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face2_sig30_blotless}}}&{\tabincell{c}{\textbf{32.38 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig10_blotless}}}&{\tabincell{c}{\textbf{28.67 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig20_blotless}}}&{\tabincell{c}{\textbf{26.66 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face3_sig30_blotless}}}&{\tabincell{c}{\textbf{32.88 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig10_blotless}}}&{\tabincell{c}{\textbf{29.38 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig20_blotless}}}&{\tabincell{c}{\textbf{27.45 dB}\\ \includegraphics[scale=0.3]{./Fig/test_face4_sig30_blotless}}}\cr\hline \end{tabular} \end{table*} \section{Conclusion \label{sec:Conclusion}} This paper proposed a BLOTLESS algorithm for dictionary update. It divides the dictionary into sub-dictionaries, each of which is non-overcomplete. Then BLOTLESS updates a sub-dictionary and the corresponding sparse coefficients using least sqaures or total least squares approaches. Necessary conditions for unique recovery are identified and they hold with high probability when the number of training samples is larger than the derived bounds in Proposition \ref{prop:NumOfSamples}. Simulations show that these bounds match the simulations well, and that BLOTLESS outperforms other benchmark algorithms. \textcolor{black}{One future direction} is to find sufficient bounds for unique recovery and their comparisons to the necessary bounds.
\section{Introduction and preliminary} The Takagi function is probably the easiest example of a continuous nowhere derivable function. Less known than Weierstrass function, it was introduced in 1903 by T. Takagi (see \cite{Takagi}) and ever since it has caught the interest of mathematicians. For an extensive information about this function, see the surveys \cite{AK} and \cite{Lagarias}. The Takagi function, $T:\mathbb{R}\to \mathbb{R}$, is usually defined as \begin{equation*} T(x)=\sum_{n=0}^{\infty}\frac{1}{2^n}\phi (2^nx) \end{equation*} where $\phi (x)=\text{dist}(x,\mathbb{Z})$, the distance from $x$ to the nearest integer. If $D$ denote the set of all dyadic real numbers and we decompose it as an increasing union of sets \begin{equation*} D_n=\bigg\{ \frac{k}{2^{n-1}}:k\in \mathbf{Z}\bigg\}, \quad n=1,2,\dotsc \end{equation*} then we may also define the Takagi function as: \begin{equation} T(x)=\sum_{k=1}^{\infty} g_k(x)=\lim_n G_n(x), \quad(x\in\mathbb{R}),\label{eq:1} \end{equation} where $g_k(x)=\min (|x-y|:\, y\in D_k)$ is the distance of the point $x$ to the closed set $D_k$, and $G_n=g_1+\dots +g_n$. Now we will introduce some non smooth definitions and results. As a general reference for these concepts you may use \cite{F} or \cite{RW}. For an upper semicontinuous function $f:\mathbb{R}\longrightarrow \mathbb{R}$ and a point $x\in \mathbb{R}$, we define the Fréchet superdifferential of $f$ at $x$, $\partial^+ f(x)$, as the set of $\xi\in \mathbb{R}$ that satisfy \begin{equation*} \limsup_{h\to 0}\frac{f(x+h)-f(x)- \xi h}{|h|}\leq 0. \end{equation*} The function $f$ is said superdifferentible at $x$ if $\partial^{+}f(x)\neq \varnothing$. In a similar way, for a lower semicontinuous function $f:\mathbb{R}\longrightarrow \mathbb{R}$ and a point $x\in \mathbb{R}$, the Fréchet subdifferential of $f$ at $x$, $\partial f(x)$, is defined as the set of $\xi\in\mathbb{R} $ that satisfy \begin{equation*} \liminf_{h\to 0}\frac{f(x+h)-f(x)- \xi h}{|h|}\geq 0. \end{equation*} If $\partial f(x)\neq \varnothing$, then $f$ is said subdifferentiable at $x$. It is immediate that $\partial^{+} f (x) = -\partial(-f )(x)$. A continuous function $f$ is derivable at $x$ if and only if both $\partial f (x)$ and $\partial^{+} f (x)$ are nonempty. In this case, $\partial f (x)=\partial^{+} f(x) = \{f'(x)\}$. Next proposition characterizes the superdifferential of an upper semicontinuous function $f:\mathbb{R}\longrightarrow \mathbb{R}$ at a point $x$ in terms of the Dini derivatives: \begin{equation*} \begin{gathered}[t] d_{-}f(x)=\liminf_{h\uparrow 0}\frac{f(x+h)-f(x)}{h}\\ D^{+}{f}(x)=\limsup_{h\downarrow 0}\frac{f(x+h)-f(x)}{h}. \end{gathered} \end{equation*} \begin{prop} \label{sec:introduction-3} An upper semicontinuous function $f:\mathbb{R}\longrightarrow \mathbb{R}$ is superdifferentiable at a point $x$ if, and only if, \begin{equation*} D^+f(x)\leq d_-f(x)\quad\text{ and}\quad \left[D^+f(x), \,d_-f(x)\right]\cap \mathbb{R}\neq\varnothing. \end{equation*} In this case, $\partial^+ f(x)=[D^+f(x), \,d_-f(x)]\cap \mathbb{R}$. \end{prop} \section{Main Theorem} \label{sec:main-theorem} Gora and Stern, see \cite{GS}, showed that $T$ has empty Fréchet subdifferential at every $x\not\in D$, meanwhile its subdifferential is $\mathbb{R}$ at every $x\in D$. In this section we are going to characterize the superdifferential of $T$. If $x\not\in D$, for all $n$ there exist $x_n,y_n\in D_n$ such that $x\in (x_n,y_n)$ and $(x_n,y_n)\cap D_n=\varnothing$. We denote $c_n=\frac12\left(x_n+y_n\right)$. It is obvious that $c_n\in D_{n+1}$. Moreover, if $x>c_n$ then $c_n=x_{n+1}$, meanwhile $c_n=y_{n+1}$ otherwise. On the other hand, for $k< n$ we have that either $(x_n,y_n)\subset (x_k,c_k)\subset(x_k,y_k)$ or $(x_n,y_n)\subset (c_k,y_k)\subset(x_k,y_k)$. \begin{prop}\label{sec:introduction-1} If $x\not\in D$ then \begin{equation*} \begin{aligned} d_-T(x)& \leq \liminf_n G'_{n}(x)+1, & \\ \ D^+T(x) & \geq \limsup_n G'_{n}(x)-1.& \end{aligned} \end{equation*} \end{prop} \begin{proof} Let $x_n, y_n, c_n$ be as before. The sequences $(x_n)_n$ and $(y_n)_n$ converge to $x$. For every $n$ let $x'_n=2x_n-x$. As $g_k$ is an even periodic function of period $2^{-k+1}$, we have that $g_k(x'_k)=g_k(x)$ for all $k\geq n-1$ and therefore \begin{equation}\label{eq:3} T(x'_n)-T(x)=\sum_{k<n-1} \left(g_k(x'_n)-g(x)\right) \end{equation} for all $n$. If $x_{n-1}<x_n$ then $c_{n-1}=x_n$ and $y_{n-1}=y_n$ and therefore $g'_{n-1}(x)=-1$. Moreover, as $x'_n\in \left(x_{n-1},x_n\right)\subset \left(x_{n-1},y_{n-1}\right)$, then either $ x'_n,x\in (x_k,c_k) $ or $x'_n,x\in (c_k,y_k)$ for every $k<n-1$, therefore \begin{equation*} g_k(x'_n)-g_k(x)=g'_k(x)(x'_n-x) \end{equation*} for all $k<n-1$ and thus \begin{equation} \label{eq:13} \frac{T(x'_n)-T(x)}{x'_{n}-x} =G'_{n-2}(x) =G'_{n-1}(x)+1. \end{equation} If $x_{m}<x_{m+1}=\dotsb=x_{n-1}=x_{n}$ for some $m<n-1$, then $x'_{m+1}=\dotsb=x'_{n-1}=x'_{n}$. Hence, by \eqref{eq:13}, \begin{equation} \label{eq:5} \frac{T(x'_n)-T(x)}{x'_{n}-x}= \frac{T(x'_{m+1})-T(x)}{x'_{m+1}-x} =G'_{m}(x)+1 <G'_{n-1}(x)+1 \end{equation} since $g'_k(x)=1$ for $k=m+1,\dots, n-1$. It follows from \eqref{eq:13} and \eqref{eq:5} that \begin{equation}\label{eq:8} d_-T(x) \leq \liminf_{n} \frac{T(x'_{n})-T(x)}{x'_{n}-x} \leq \liminf_n G'_{n}(x)+1. \end{equation} As $T$ is an even function \begin{equation} \begin{aligned} D^+T(x)=& \limsup_{h\downarrow 0} \frac{T(x+h)-T(x)}{h} \\ = &\limsup_{h\uparrow 0} \frac{T(-x+h)-T(-x)}{-h} \\ =&-\liminf_{h\uparrow 0} \frac{T(-x+h)-T(-x)}{h}=-d_-T(-x) \end{aligned}\label{eq:4} \end{equation} and therefore \begin{align*} D^+T(x)= &-d_-T(-x)\geq - \liminf_n G'_{n}(-x)-1 \\ = &\limsup_n G'_{n}(x)-1 \end{align*} because the functions $G_n$ are even also. \end{proof} \begin{cor} \label{sec:introduction-2} Let $x\not\in D$ be. If one of two limits, $\limsup_n G'_{n}(x)$ or $\liminf_n G'_{n}(x)$, is infinite or both limits are finite and \begin{equation*} \limsup_n G'_n(x)- \liminf_n G'_n(x)> 2 \end{equation*} then $\partial^+T(x)=\varnothing$. \end{cor} \begin{proof} It is immediate from Proposition \ref{sec:introduction-3} that $\partial^+T(x)=\varnothing$ provided that either $\limsup_n G'_{n}(x)=+\infty$ or $\liminf_n G'_{n}(x)=-\infty$. If both limits are finite and $\limsup_n G'_n(x)- \liminf_n G'_n(x)> 2$ then \begin{equation*} D^+T(x)-d_-T(x)\geq \limsup_n G'_n(x)- \liminf_n G'_n(x)-2>0 \end{equation*} and therefore, by Proposition \ref{sec:introduction-3} again, $\partial^+T(x)=\varnothing$. \end{proof} Now we are going to study the situation when both $\limsup_n G'_{n}(x)$ and $\liminf_n G'_{n}(x)$ are finite and \begin{equation}\label{eq:7} \limsup_n G'_n(x)- \liminf_n G'_n(x)\leq 2. \end{equation} In this case, as $|g'_k(x)|=1$ for all $k$, the sequence $(G'_n(x))_n$ does not converge in $\mathbb{R}$ and $\limsup_n G'_n(x)- \liminf_n G'_n(x)\geq 1$ and, as both limits are integer numbers, this difference can only take the values 1 and 2. \begin{lemma} \label{sec:main-theorem-2} Let $x\in\mathbb{R}$ be. If $x=k+\sum_{n=1}^\infty a_n2^{-n}$ for some $k\in \mathbb{Z}$ and $a_n\in\{0,1\}$, $n=1,2,\dotsc$ then \begin{equation*} g_n(x)= \frac{a_{n}}{2^{n}}+\left(1-2a_{n}\right)\sum_{k\geq n+1}\frac{a_k}{2^k} \end{equation*} for all $n=1,2,\dotsc$. \end{lemma} \begin{proof} Observe that \begin{equation*} \begin{split} g_n(x)= &\left\{ \begin{aligned} & \sum_{k=n+1}^\infty \frac{a_k}{2^k},\qquad & \text{ if $a_{n}=0$,} \\ &\frac1{2^{n}}- \sum_{k=n+1}^\infty \frac{a_k}{2^k}, & \text{ if $a_{n}=1$}; \end{aligned} \right. \\[1em] \end{split} \end{equation*} \end{proof} Note that if $x\not \in D$ then $g'_n(x)=1$ if and only if $a_{n}=0$. In consequence, if $x\not\in D$, $g'_{n}(x)=1-2a_{n}$. \begin{lemma} \label{sec:main-theorem-3} If $x\in\mathbb{R}$ then \begin{equation} \label{eq:17} g_n(x)+g_{n+1}(x)\leq \frac1{2^{n}} \end{equation} for all $n$. Moreover, for $x\not\in D$, $g_n(x)+g_{n+1}(x)=2^{-n}$ if and only if $g'_{n}(x)\neq g'_{n+1}(x)$. \end{lemma} \begin{proof} With the notations of Lemma \ref{sec:main-theorem-2}, \begin{multline}\label{eq:15} g_n(x)+g_{n+1}(x)= \\ =\frac{a_{n}}{2^{n}}+\left(1-2a_{n}\right)\sum_{k\geq n+1}\frac{a_k}{2^k}+ \frac{a_{n+1}}{2^{n+1}}+\left(1-2a_{n+1}\right)\sum_{k\geq n+2}\frac{a_k}{2^k} \\ = \frac1{2^{n}}\left(a_{n}+a_{n+1}- a_{n}a_{n+1}\right) - 2\left(a_{n}+a_{n+1}-1\right)\sum_{k\geq n+2}\frac{a_k}{2^k}. \end{multline} If $a_{n}+a_{n+1}=0$ then $a_n=a_{n+1}=0$ and therefore \begin{equation*} g_n(x)+g_{n+1}(x)=2\sum_{k\geq n+2}\frac{a_k}{2^k} \leq 2 \sum_{k\geq n+2}\frac{1}{2^k}= \frac1{2^{n}} \end{equation*} with strict inequality if $x\not\in D$. If $a_{n}+a_{n+1}\geq 1$ then $a_{n}+a_{n+1}- a_{n}a_{n+1}=1$ and \eqref{eq:17} is an immediate consequence of \eqref{eq:15}. Moreover, if $x\not\in D$, the equality holds if and only if $a_{n}+a_{n+1}-1=0$. But $a_{n}+a_{n+1}-1=0$ if and only if $a_{n}\neq a_{n+1}$. \end{proof} \begin{prop} \label{sec:main-theorem-1} Let $x\not\in D$ be. If $\liminf_n G'_n(x)$ and $\limsup_n G'_n(x)$ are finite and \begin{equation*} \limsup_n G'_n(x)-\liminf_n G'_n(x)\in \{1,2\} \end{equation*} then there exists $m\geq 1$ such that $a_{m+2i}+a_{m+2i+1}=1$ for all $i\geq 0$ and \begin{equation} \label{eq:10} d_-T(x) = \liminf_n G'_{n}(x)+1 \end{equation} and \begin{equation} \label{eq:11} D^+T(x) = \limsup_n G'_{n}(x)-1. \end{equation} \end{prop} \begin{proof} Let $S=\limsup_n G'_n(x)$ and $I= \liminf_n G'_n(x)$ be. There exists an integer $m> 0$ such that $I\leq G'_n(x)\leq S$ for all $n\geq m-1$. We can assume, without loss of generality, that $G'_{m}(x)=I$. This implies in particular that $G'_{m-1}(x)=I+1$ and therefore that $|G'_{n}(x)-G'_{m-1}(x)|\leq 1$ for all $n\geq m$ . As $g'_{j}(x)+g'_{j+1}(x)$ is an even integer for al $j\geq 0$, then \begin{equation}\label{eq:12} G'_{m+2i+1}(x)-G'_{m-1}(x)= \sum_{j=1}^{i} \left( g'_{m+2j}(x)+g'_{m+2j+1}(x)\right)=0 \end{equation} for all $i\geq 0$. In particular \begin{multline} \label{eq:9} g'_{m+2i+1}(x)+g'_{m+2i}(x) \\ = G'_{m+2i+1}(x)-G'_{m-1}(x)-\left(G'_{m+2i-1}(x)-G'_{m-1}(x) \right)=0 \end{multline} for all $i\geq 0$. By Lemma \ref{sec:main-theorem-3} \begin{equation}\label{eq:18} g_{m+2i+1}(x)+g_{m+2i}(x)=\frac1{2^{m+2i}}, \end{equation} for all $i\geq 0$, and thus, again by Lemma \ref{sec:main-theorem-3}, \begin{equation*} g_{m+2i+1}(x)+g_{m+2i}(x)- \left(g_{m+2i+1}(x')+g_{m+2i}(x')\right)\geq 0. \end{equation*} for all $x'\in \mathbb{R}$. This implies that \begin{multline}\label{eq:20} \sum_{j\geq m+2p}\left(g_j(x)-g_j(x')\right) \\ = \sum_{i\geq p} \left[g_{m+2i+1}(x)+g_{m+2i}(x)- \left(g_{m+2i+1}(x')+g_{m+2i}(x')\right) \right] \geq 0 \end{multline} for all $p\geq 0$. Let $x_n, y_n, c_n$ be as before. If $x'\in (x_{m},x)$ then there exists $n>m$ such that $x_{n-1}< x'\leq x_n$. This implies that $x_n=c_{n-1}$ and thus $g'_{n-1}(x)=-1$ and $G'_{n-2}(x)=G'_{n-1}(x)+1\geq I+1$. Therefore \begin{align}\label{eq:19} \frac{T(x')-T(x)}{x'-x} = &G'_{n-2}(x) +\frac1{x'-x}\,\sum_{j\geq n-1}\left(g_j(x')-g_j(x)\right) \notag \\ \geq & I+1 +\frac{1}{x-x'}\,\sum_{j\geq n-1}\left(g_j(x)-g_j(x')\right). \end{align} If $n=m+2p+1$ for some $p\geq 0$ then, by \eqref{eq:20}, \begin{equation*} \frac{T(x')-T(x)}{x'-x} \geq I+1. \end{equation*} If $n=m+2p$ for some $p> 0$ then, by \eqref{eq:12}, $G'_{n-2}(x)=I+2$, and as \begin{equation*} \left|g_{n-1}(x')-g_{n-1}(x)\right|\leq |x'-x| \end{equation*} then \begin{multline*} \frac{T(x')-T(x)}{x'-x} =G'_{n-2}(x) +\frac1{x'-x}\,\sum_{j\geq n-1}\left(g_j(x')-g_j(x)\right) \\ =I+2+\frac{g_{n-1}(x')-g_{n-1}(x)}{x'-x} +\frac1{x'-x}\,\sum_{j\geq n}\left(g_j(x')-g_j(x)\right) \\ \geq I+1 \end{multline*} by \eqref{eq:20}. In both cases, by applying Proposition \ref{sec:introduction-1}, we obtain \eqref{eq:10}. Relation \eqref{eq:11} follows from the equality $D^+T(x)=-d_-T(-x)$. \end{proof} \begin{thm} \label{sec:main-theorem-4} Let $x \in \mathbb{R}$ be, $x=k+\sum_{n=1}^\infty a_n2^{-n}$ for some $k\in \mathbb{Z}$, with $a_n\in\{0,1\}$, $n=1,2,\dotsc$. \begin{enumerate} \item \label{item:1} If $x\in D$ then $\partial^+T(x)=\varnothing$. \item \label{item:2} If $x\not\in D$ and there exists $m\in \mathbb{Z}$, $m\geq 1$, such that $a_{n}+a_{n+1}=1$ for all $n\geq m$, then \begin{equation*} \partial^+T(x)=\left\{ \begin{aligned} & m-1- 2\sum_{j=1}^{m-1} a_j+\,[0,\,1\,]\quad & \text{ if $a_{m}=0$,} \\[.5em] & m-1- 2\sum_{j=1}^{m-1} a_j+\,[\,-1,\,0\,] &\text{ if $a_{m}=1$.} \end{aligned} \right. \end{equation*} \item \label{item:3} If $x\not\in D$ does not satisfy (\ref{item:2}) but there exists $m\geq 1$, such that $a_{m+2i}+a_{m+2i+1}=1$ for all $i\geq 0$, then \begin{equation*} \partial^+T(x)=\left\{m-1- 2\sum_{j=1}^{m-1} a_j, \right\} \end{equation*} \item If $x\not\in D$ and does not verify (\ref{item:2}) and (\ref{item:3}) then $\partial^+T(x)=\varnothing$. \end{enumerate} \end{thm} \begin{proof} If $x\in D_{n}$ then for all integer $p\geq n+1$ \begin{equation*} T\left(x+\frac1{2^{p}}\right)-T(x)= \sum_{j=1}^{p} g'_{j}(x)\frac1{2^{p}} = \left(\sum_{j=1}^{n} g'_{j}(x)+ (p-n)\right)\,\frac1{2^{p}} \end{equation*} and therefore \begin{equation*} D^{+}T(x)\geq \limsup_{p}\frac{T(x+2^{-p})-T(x)}{2^{-p}}=+\infty. \end{equation*} It follows from \ref{sec:introduction-3} that $\partial^{+}T(x)=\varnothing$. If $x\not\in D$ and there exists $m\in \mathbb{Z}$, $m\geq 1$, such that $a_{n}+a_{n+1}=1$ for all $n\geq m$, then $g'_{n}(x)+g'_{n+1}(x)=0$ for all $n\geq m$ and therefore \begin{equation*} G'_{m+2i+1}(x)=G'_{m-1}(x)+\sum_{j=0}^{i} \left(g'_{m+2j}(x)+g'_{m+2j+1}(x)\right) = G'_{m-1}(x) \end{equation*} and \begin{equation*} \begin{split} G'_{m+2i}(x)= &G'_{m}(x)+\sum_{j=1}^{i} \left(g'_{m+2j-1}(x)+g'_{m+2j}(x)\right) \\= &G'_{m}(x)=G'_{m-1}(x)+g'_{m}(x) \end{split} \end{equation*} for all $i\geq 1$. If $a_{m}=0$ then $g'_{m}(x)=1$ and \begin{equation*} \liminf_{n} G'_{n}(x)= G'_{m-1}(x), \quad \limsup_{n} G'_{n}(x)=G'_{m-1}(x)+1. \end{equation*} Hence, by Proposition \ref{sec:main-theorem-1} and Proposition \ref{sec:introduction-3}, \begin{equation*} \partial^{+}T(x)=G'_{m-1}(x)+[0,1]=\sum_{j=1}^{m-1}(1-2a_{j})+[0,1]. \end{equation*} Alternatively, if $a_{m}=1$ then $g'_{m}(x)=-1$ and \begin{equation*} \liminf_{n} G'_{n}(x)= G'_{m-1}(x)-1, \quad \limsup_{n} G'_{n}(x)=G'_{m-1}(x) \end{equation*} and, by Propositions \ref{sec:main-theorem-1} and \ref{sec:introduction-3}, \begin{equation*} \partial^{+}T(x)=G'_{m-1}(x)+[-1,0]=\sum_{j=1}^{m-1}(1-2a_{j})+[-1,0]. \end{equation*} In order to see (\ref{item:3}): if $x$ satisfies $g'_{m+2i}(x)+g'_{m+2i+1}(x)=0$ for all $i\geq 0$, then \begin{equation*} G'_{m+2n-1}(x)=G'_{m-1}(x)+\sum_{i=0}^{n} \left(g'_{m+2i}(x)+g'_{m+2i+1}(x)\right)=G'_{m-1}(x) \end{equation*} and \begin{equation*} G'_{m+2n}(x)=G'_{m+2n-1}(x)+g'_{m+2n}(x)=G'_{m-1}(x)+g'_{m+2n}(x). \end{equation*} for all $n\geq 1$. On the other hand $\liminf_{n}g'_{m+2n}(x)=-1$ and $\limsup_{n}g'_{m+2n}(x)=1$ since $x$ does not satisfy (\ref{item:2}). Therefore \begin{equation*} \begin{gathered} \liminf_{n} G'_{n}(x)=G'_{m-1}(x)-1\\ \limsup_{n} G'_{n}(x)=G'_{m-1}(x)+1 \end{gathered} \end{equation*} It follows from Propositions \ref{sec:introduction-3} and \ref{sec:introduction-1} that $\partial^{+}T(x)=\{G'_{m-1}(x)\}$. Finally, if $x\not\in D$ does not verify (\ref{item:2}) and (\ref{item:3}) the result follows from Proposition \ref{sec:main-theorem-1} and Corollary \ref{sec:introduction-2}. \end{proof} \begin{rmk} The set $A$ of points that satisfy condition $(2)$ is a countable dense subset of $\mathbb{R}$ \end{rmk} \begin{proof} $A$ is clearly countable, since it is the set of points where a function on $\mathbb{R}$ is superdifferentiable, with superdifferential not a singleton. However, directly, it is not difficult to see that \begin{equation*} A=\bigcup_{m=1}^{\infty}\left(\frac43\,\frac1{2^{m}}+D_{m}\right) \end{equation*} which give us the result. \end{proof} In order to study the set of points where the Takagi function is superdifferentiable, we will take advantage of the following result, due to Kahane, (see \cite{K} and \cite{AK}), which describes the set $\mathcal{M}$ where the Takagi function attains its maximum value, which is $\frac{2}{3}$. \begin{thm}\label{Kahane} $\mathcal{M}$ is a set of Hausdorff dimension $\frac{1}{2}$, and consists of all the points $x$ with binary expansion satisfying $a_{2n-1}+a_{2n}=1$ for every $n\geq 1$. \end{thm} From Theorem \ref{sec:main-theorem-4} we deduce that $\partial ^+T(x)\neq \varnothing$ if and only if $x$ satisfies either condition $(2)$ or $(3)$; in other words, if and only if there exists $m\geq 1$, such that $a_{m+2i}+a_{m+2i+1}=1$ for every $i\geq 0$. With the aim of studying these points we introduce the following notations: \begin{equation*} \hat{x}_m=\sum_{j=1}^{m-1}\frac{a_j}{2^j}, \quad \tilde{x}_m=\sum_{j=m}^{\infty}\frac{a_j}{2^j},\quad \widehat{T}=\sum_{j=1}^{m-1}g_j, \quad \widetilde{T}=\sum_{j=m}^{\infty}g_j \end{equation*} and \begin{equation*} c_x=m-1- 2\sum_{j=1}^{m-1} a_j. \end{equation*} We have the following result. \begin{cor} The set $\mathcal{A}$ of points $x$ satisfying $\partial ^+T(x)\neq \varnothing$ is an uncountable Lebesgue null set with Hausdorff dimension $\frac{1}{2}$. Moreover, for every $x\in \mathcal{A}$, the function $T(y)-c_x(y-x)$ attains a local maximum at $x$. \end{cor} \begin{proof} For the first part it is enough to observe that we can write \begin{align*} \mathcal{A}=& \bigcup_{m=1}^{\infty}\Bigl\{ x: a_{m+2i}+a_{m+2i+1}=1 \ \text{for all} \ i\geq 0 \Bigr\} \\= & \bigcup_{m=1}^{\infty}\Bigl( D_{m}+\frac{1}{2^{m-1}} \mathcal{M} \Bigr) \end{align*} and then apply Theorem \ref{Kahane}. For the second part, if $x\in A$ then $x=\hat{x}_m+\frac{1}{2^{m-1}}z$ with $\hat{x}_m\in D_{m}$ and $z\in \mathcal{M}$. Observe that, as $\widetilde{T}$ is $2^{-(m-1)}$-periodic, \begin{align*} \widetilde{T}(x)=&\widetilde{T}\left(\frac{1}{2^{m-1}}z\right)=\sum_{j=m-1}^{\infty}\frac{1}{2^j}\phi (2^{j-m+1}z) \\= & \sum_{k=0}^{\infty}\frac{1}{2^{k+m-1}}\phi (2^kz)= \frac{1}{2^{m-1}}T(z). \end{align*} Similarly, for every $y$, \begin{equation*} \widetilde{T}(y)=\frac{1}{2^{m-1}}T(z_y) \end{equation*} where $z_y=2^{m-1}\tilde{y}_m$. Hence $\widetilde{T}(x)\geq \widetilde{T}(y)$ for every $y$, which implies \begin{equation*} T(x)=\widehat{T}(x)+\widetilde{T}(x)\geq \widehat{T}(x)+\widetilde{T}(y)=\widehat{T}(y)-c_x(y-x)+\widetilde{T}(y) \end{equation*} for $y$ near to $x$ since $\widehat{T}$ is linear near $x$, with $\widehat{T}'(x)=c_x$. \end{proof} Next corollary, whose proof is immediate, allows us to characterize the local maxima of $T$. Of course this result is well known, see \cite{AK} or \cite{K} for instance. \begin{cor} The Takagi function has a local maximum at $x$ if and only if $x\in \mathcal{A}$ and $c_x=0$. \end{cor} \begin{cor} The Takagi function has empty superdifferential and subdifferential almost everywhere. \end{cor} \bigskip
\section{Introduction}\label{sec:intro} This paper is concerned with $p$-adic Diophantine approximation on manifolds, specifically with multiplicative Diophantine approximation and a Diophantine dichotomy in the $p$-adic setting. In an earlier paper \cite{DGpart1}, we introduced a new $p$-adic Diophantine exponent and answered questions of Kleinbock and Kleinbock-Tomanov concerning $p$-adic Diophantine approximation on affine subspaces. The Diophantine exponent we introduced is better suited to homogeneous dynamics. In this paper, we continue our study by establishing multiplicative versions of our results and also establishing a Diophantine dichotomy for $p$-adic analytic manifolds. For $\mathbf{q} = (q_1, \dots, q_n) \in \mathbb{Z}^n$ and $q_0 \in \mathbb{Z}$, set $\tilde{\mathbf{q}} := (q_0, q_1, \dots, q_n)$. Following Kleinbock and Tomanov, \cite{KT}, we define the Diophantine exponent $w(\mathbf{y})$ of $\mathbf{y} \in \mathbb{Q}_p^{n}$ to be the supremum of $v > 0$ such that there are infinitely many $\tilde{\mathbf{q}} \in \mathbb{Z}^n$ satisfying \begin{equation}\label{def:exp} |q_0 + \mathbf{q}\cdot \mathbf{y}_p \leq \|\tilde{\mathbf{q}}\|_\infty^{-v}. \end{equation} In view of Dirichlet's theorem (\cite{KT} \S 11.2), $w(\mathbf{y}) \geq n+1$ for every $\mathbf{y} \in \mathbb{Q}_p^{n},$ with equality for Haar almost every $\mathbf{y}$ by the Borel-Cantelli lemma. We will also need the following definition from \cite{DGpart1}. \begin{definition}{\textbf{v-$\mathbb{Z}[1/p]$ approximable vectors:}} $\mathbf{y}\in\mathbb{Q}_p^n$ is $v-\mathbb{Z}[1/p]$-approximable if there exist $\tilde{\mathbf{q}}$ with unbounded $||\mathbf{q}||_p||\tilde{\mathbf{q}}||_\infty$ such that \begin{equation}\label{Z_S} |\mathbf{q}.\mathbf{y}+q_0|_p<\frac{1}{(||\mathbf{q}||_p||\tilde{\mathbf{q}}||_\infty)^v||\tilde{\mathbf{q}}||_\infty}, \end{equation} where we recall that $\tilde{\mathbf{q}}=(q_0,\mathbf{q})\in\mathbb{Z}[1/p]^{n+1}$.\end{definition} \noindent We will denote $v-\mathbb{Z}[1/p]$-approximable points by $\mathcal{W}_v^{p}$ and also define \begin{equation}\label{def:papp} w_{p}(\mathbf{y}):=\sup\{v \text{ appearing in } (\ref{Z_S}) \}. \end{equation} By Proposition $3.1$ from \cite{DGpart1}, we have that for any $\mathbf{y}\in\mathbb{Q}_p^n$ we have \begin{equation}\label{relation} w_{p}(\mathbf{y})=w(\mathbf{y})+1. \end{equation} In \cite{DGpart1}, we studied the exponents $w_p$ and $w$ in detail and proved an inheritance result for the exponent $w$ when restricted to submanifolds. This result was proved using the dynamical technique of Kleinbock and Margulis, and the exponent $w_p$ played a key role.\\ In \cite{Kleinbock-dichotomy}, D. Kleinbock established a remarkable \emph{dichotomy} with regards to certain Diophantine properties. In particular, he proved that for connected, analytic manifolds, having one not very well approximable point implies that almost every point is not very well approximable. Our first result addresses this in the $p$-adic context. \begin{theorem}\label{theorem-dicho} Suppose $\mathcal{M}$ is an analytic manifold of $\mathbb{Q}_p^n$. Let $v\geq n+1$ and suppose $w(\mathbf{y}_0)\leq v$ for some $\mathbf{y}_0\in\mathcal{M}$ then for almost every $\mathbf{y}$ around a neighbourhood of $\mathbf{y}_0$, $w(\mathbf{y})\leq v$. \end{theorem} We now turn our attention to multiplicative Diophantine approximation, see \cite{Bugeaud} for a survey of this topic which has several parallels with, as well as striking differences from, Diophantine approximation with the usual norm. For $\mathbf{q} = (q_1, \dots, q_n) \in \mathbb{Z}^n$ and $q_0 \in \mathbb{Z}$, set $\tilde{\mathbf{q}} := (q_0, q_1, \dots, q_n)$. We define $$\vert q\vert_{+}= \left\{\begin{array}{ll} ~ \vert q\vert_\infty &\text{ if } q\neq 0 \\ \\ ~1&~ \text{otherwise} \end{array}\right .$$ for $q\in\mathcal{D}$. For $q\in\mathbb{Z}$ this definition matches with the classical one. Further define $$\Pi_{+}(\tilde{\mathbf{q}})=\prod_{i=0,\cdots,n} \vert q_i\vert_{+}.$$ Say that $\mathbf{y} \in \mathbb{Q}^{n}_p$ is very well multiplicatively approximable (VWMA) if, for some $\varepsilon > 0$ there are infinitely many solutions $\tilde{\mathbf{q}} = (q_0, q_1, \dots, q_n) \in \mathbb{Z}^{n+1}$ to \begin{equation} |q_0 + \mathbf{q}\cdot \mathbf{y}|_p \leq \Pi_{+}(\tilde{\mathbf{q}})^{-(1+\varepsilon)}. \end{equation} Following Kleinbock \cite{Kleinbock-exponent}, we say that a differentiable map $f : U \to \mathbb{Q}^{n}_{p}$, where $U$ is an open subset of $\mathbb{Q}^{d}_{p}$, is nondegenerate in an affine subspace $\mathcal{L}$ of $\mathbb{Q}^{n}_p$ at $x \in U$ if $f(U) \subset \mathcal{L}$ and the span of all the partial derivatives of $f$ at $x$ up to some order coincides with the linear part of $\mathcal{L}$. If $\mathcal{M}$ is a $d$-dimensional submanifold of $\mathcal{L}$, we will say that $\mathcal{M}$ is nondegenerate in $\mathcal{L}$ at $y \in \mathcal{M}$ if there exists a diffeomorphism $f$ between an open subset $U$ of $\mathbb{Q}^{d}_{p}$ and a neighbourhood of $y$ in $\mathcal{M}$ is nondegenerate in $\mathcal{L}$ at $f^{-1}(y)$. We also denote the Haar measure on $\mathbb{Q}_p^d$ by $\lambda$. Finally, we will say that $f:U\to \mathcal{L}$ (resp., $\mathcal{M} \subset \mathcal{L}$) is nondegenerate in $\mathcal{L}$ if it is nondegenerate in $\mathcal{L}$ at $\lambda$-a.e. point of $U$ (resp., of $\mathcal{M}$, in the sense of the smooth measure class on $\mathcal{M}$). \noindent A manifold is called strongly extremal if almost every point with respect to the Lebesgue measure is not very well multiplicatively approximable. Our second result resolves the conjecture by Kleinbock and Tomanov in \cite{KT} in the multiplicative case. \begin{theorem}\label{thm:mult} Let $\mathcal{L}$ be an affine subspace of $\mathbb{Q}_p^n$ and let $\mathbf{f} : \mathbb{Q}_p^d\mapsto \mathcal{L}$ be a $C^k$ map which is nondegenerate in $\mathcal{L}$ at $\lambda$ a.e. point. Suppose that the volume measure $\lambda$ on $\mathcal{L}$ is strongly extremal, then so is $\mathbf{f}_*\lambda$. \end{theorem} Our third result shows a dichotomy for the multiplicative case as follows. \begin{theorem} For any analytic manifold of $\mathbb{Q}_p^n$ if one point is not very well multiplicatively approximable then the set of not very well multiplicatively approximable points has positive measure. \end{theorem} The approach used in this paper uses homogeneous dynamics as introduced by Kleinbock and Margulis in their important paper \cite{KM}. Diophantine approximation on affine subspaces has seen several developments recently, we refer the reader to \cite{BBDD, Kleinbock-extremal, Kleinbock-exponent, G1, G-thesis, G-div, G-mult, G-monat, GM, GG} and \cite{G-handbook} for a survey. Likewise, Diophantine approximation on manifolds in the $p$-adic setting has been studied in \cite{KT} and subsequently in \cite{BK, MoS1, MoS2, DG, DGpart1}. \section{Quantitative nondivergence} We will use quantitative nondivergence estimates for certain flows on homogeneous spaces. This estimate has its origin in the influential work of Kleinbock and Margulis \cite{KM}. We refer the reader to the recent survey \cite{BKsurvey} for instances of the ubiquity of quantitative nondivergence. In the context of the present paper, the most relevant developments are an $S$-adic version of quantitative nondivergence developed by Kleinbock and Tomanov \cite{KT} and an improved estimate, crucial to Diophantine applications, developed by Kleinbock in \cite{Kleinbock-exponent}. A $p$-adic version of this estimate was used in our earlier work \cite{DGpart1} and will also play a central role in the present paper. We recall some notation and definitions and state Theorem 5.3 from \cite{DGpart1}, a $p$-adic version of D. Kleinbock's improved quantitative nondivergence theorem from \cite{Kleinbock-exponent}. This theorem more or less follows from \cite{Kleinbock-exponent} by adapting the necessary changes from \cite{KT}. For completeness, a proof is provided in \cite{DGpart1}. We need some definitions and notation and follow \cite{KT} in our exposition. A metric space $X$ is called \emph{Besicovitch} \cite{KT} if there exists a constant $N_X$ such that the following holds: for any bounded subset $A$ of $X$ and for any family $\mathcal{B}$ of nonempty open balls in $X$ such that $$ \forall x \in A \text{ is a center of some ball of } B,$$ there is a finite or countable subfamily $\{B_i\}$ of $B$ with $$ 1_A \leq \sum_{i}1_{B_i} \leq N_X. $$ \noindent We now define $D$-Federer measures following \cite{KLW}. Let $\mu$ be a Radon measure on $X$, and $U$ an open subset of $X$ with $\mu(U) > 0$. We say that $\mu$ is $D$-Federer on $U$ if $$ \sup_{\substack{x \in \operatorname{supp} \mu, r > 0\\ B(x, 3r) \subset U}} \frac{\mu(B(x, 3r))}{\mu(x,r)} < D.$$ Finally, we say that $\mu$ as above is Federer if for $\mu$-a.e. $x \in X$ there exists a neighbourhood $U$ of $x$ and $D > 0$ such that $\mu$ is $D$-Federer on $U$. We refer the reader to \cite{KLW, KT} for examples of Federer measures.\\ Following, \cite{Kleinbock-exponent}, for a subset $M$ of $\mathbb{Q}_{p}^n$, define its affine span $\langle M\rangle_a$ to be the intersection of all affine subspaces of $\mathbb{Q}_{p}^n$ containing $M$. Let $X$ be a metric space, $\mu$ a Borel measure on $X$, $\mathcal{L}$ an affine subspace of $\mathbb{Q}_{p}^n$ and $f$ a map from $X$ into $\mathcal{L}$. Say that $(f, \mu)$ is nonplanar in $\mathcal{L}$ if $$\mathcal{L} = \langle f (B \cap \operatorname{supp} \mu)\rangle_a \forall \text{ nonempty open } B \text{ with } \mu(B) > 0.$$ For a subset $U$ of $X$ and $C, \alpha > 0$, say that a Borel measurable function $f : U \to \mathbb{Q}_p$ is $(C, \alpha)$-good on $U$ with respect to $\mu$ if for any open ball $B \subset U$ centered in $\operatorname{supp} \mu$ and $\varepsilon > 0$ one has \begin{equation}\label{gooddef} \mu \left(\{ x \in B \big| |f(x)| < \varepsilon \} \right) \leq C\left(\displaystyle \frac{\varepsilon}{\sup_{x \in B}|f(x)|}\right)^{\alpha}|B|. \end{equation} Where $\|f\|_{\mu, B} = \sup \{c : \mu(\{x \in B : |f(x)| > c\}) > 0\}$.\\ Let $S = \{\infty, p\}$, $\mathbb{Q}_S:= \mathbb{Q}_p \times \mathbb{R}$, $\mathcal{D} := \mathbb{Z}[1/p]$ and $$ \mathcal{P}(\mathcal{D}, m):= \text{ the set of all nonzero primitive submodules of } \mathcal{D}^{m}.$$ A vector $ \mathbf{x}$ of $\mathbb{Q}^{m}_S$ will be denoted as $\mathbf{x} = (x^{(\infty)}, x^{(p)})$, where $x^{(v)} = (x^{(v)}_1, . . . , x^{(v)}_m) \in \mathbb{Q}_v^m$. The norm $\|\mathbf{x}\|$ and the content $c(\mathbf{x})$ of $\mathbf{x}$ are defined to be the maximum (resp., the product) of all the numbers $\|(x^{(v)})\|_v$. For a discrete $\mathcal{D}$-submodule $\Lambda$ of $\mathbb{Q}^{m}_S$, we set $$\delta(\Lambda):= \min\{c(\mathbf{x}) : \mathbf{x} \in \Lambda\backslash \{0\}\},$$ The covolume, cov() of a lattice used below is defined as in \S 8.3 of \cite{KT}. We recall Theorem $5.3$ from \cite{DGpart1}. \begin{theorem}\label{QND2} Let $X$ be a be a Besicovitch metric space, $\mu$ a uniformly Federer measure on $X$, and let $S$ be as above. For $m\in \mathbb{N}$, let a ball $B = B(x_0,r_0)\subset X$ and a continuous map $h:\tilde B \to \operatorname{GL}(m,\mathbb{Q}_S)$ be given, where $\tilde B$ stands for $B(x_0,3^mr_0)$. Now suppose that for some $C,\alpha > 0$ and $0 < \rho < 1$ one has {\label{rm1}\rm(i)} for every $\,\Delta\in \mathcal P(\mathcal{D},m)$, the function $\operatorname{cov}\big(h(\cdot)\Delta\big)$ is $(C,\alpha)$ good \ on $\tilde B$ with respect to $\mu$; {\label{rm2}\rm(ii)} for every $\,\Delta\in \mathcal P(\mathcal{D},m)$, $\sup_{x\in B\cap \operatorname{supp}\mu}\operatorname{cov}\big(h(x)\Delta\big) \ge \rho^{rk(\Delta)}$. Then for any positive $ \varepsilon\le \rho$ one has $$ \mu\left(\big\{x\in B\bigm| \delta \big(h(x)\mathcal{D}^m\big) < \varepsilon \big\}\right)\le mC \big(N_{X}D_{\mu}^2\big)^m \left(\frac\varepsilon \rho \right)^\alpha \mu(B)\ $$ \end{theorem} \section{Dichotomy: Proof of Theorem \ref{theorem-dicho}}\label{aevsno} In this section, we address $p$-adic versions of D. Kleinbock's paper \cite{Kleinbock-dichotomy} where he proved that analytic manifolds possess a remarkable dichotomy with regard to certain Diophantine properties, see also \cite{CaoYu} and \cite{Mosh}. We begin with \begin{lemma}\label{minkowski} For any $\Delta\in \mathcal{P}(\mathcal{D}, n+1)$ and $g\in \operatorname{GL}(n+1, \mathbb{Q}_S)$ we have $$ \delta(g\mathcal{D}^{n+1})\leq \operatorname{cov}(g\Delta)^{\frac{1}{rk(\Delta)}}.$$ \end{lemma} \begin{proof} Note that $g\Delta$ is a lattice in $\mathbb{Q}_S g\Delta$. Set $j = \operatorname{rank}(\Delta)$. Now consider the ball \begin{align*} D&=D_\infty\times D_p\\ &=\left\{ x^{(\infty)}\in\mathbb{R}^{n+1}\left| ||x^{(\infty)}||_\infty\leq (\operatorname{cov}(g\Delta))^{\frac{1}{j}}\right.\right\}\times \left\{ x^{(p)}\in\mathbb{Q}_p^{n+1}\left| \begin{aligned} &|x^{(p)}_1|_p\leq 1\\ &|x^{(p)}_2|_p\leq 1\\ &\vdots \\ &|x^{(p)}_{n+1}|_p\leq 1 \end{aligned}\right.\ \right \}. \end{align*} Denote $ D\cap \mathbb{Q}_Sg\Delta=D_1$, a ball in $\mathbb{Q}_Sg\Delta$. The normalized Haar measure on $\mathbb{Q}_S\Delta_1$ where $\Delta_1=g\Delta$ is defined as $\lambda_S(D_1)=\mu_S(\pi^{\text{-}1}(D_1))$ where $\mu_S$ is the Haar measure on $\mathbb{Q}_S^j$ and $\pi:\mathbb{Q}_S^j\mapsto\mathbb{Q}_S\Delta_1=\mathbb{Q}_Sv_1+\cdots+\mathbb{Q}_Sv_j$ and $v_1,v_2,\cdots,v_j$ are taken such that $v_1^{\infty},\cdots,v_j^{\infty}$ form an orthonormal basis of $(\mathbb{Q}_S\Delta_1)_\infty$ and $(\mathbb{Q}_S\Delta_1)_p\cap \mathbb{Z}_p^{n+1}=\mathbb{Z}_pv_1^{(p)}+\cdots+\mathbb{Z}_pv_j^{(p)}$. So $$ \lambda_S(D_1)\geq 2^j \operatorname{cov}(g\Delta).$$ Hence by Minkowski's theorem there exists $g\gamma\in g\Delta$ i.e. $\gamma\in\mathcal{D}^{n+1}$ such that $$\begin{aligned}& \Vert (g\gamma)^{(\infty)}\Vert_\infty \leq cov(g\Delta)^{\frac{1}{j}}\\ &\Vert (g\gamma)^{(p)}\Vert_p\leq 1. \end{aligned} $$ Therefore $c(g\gamma)\leq \operatorname{cov}(g\Delta)^{\frac{1}{rk(\Delta)}}\implies \delta(g\mathcal{D}^{n+1})\leq \operatorname{cov}(g\Delta)^{\frac{1}{rk(\Delta)}}. $ \end{proof} \begin{proposition} Let $U$ be an open subset of $\mathbb{Q}_p^d$ and let $\mathcal{F}$ be a finite-dimensional space of analytic $\mathbb{Q}_p$ valued functions on $U$. Then for any $\mathbf{x}\in U$ there exists $C,\alpha>0$ and a neighbourhood $W$ of $\mathbf{x}$ such that every element of $\mathcal{F}$ is $(C, \alpha)$-good on $W$. \end{proposition} \begin{proof} Without loss of generality we may assume that $\mathcal{F}$ contains constant functions. Let $1,f_1,\cdots,f_n$ be a basis of $\mathcal{F}$. Then $\mathbf{f}=(f_1,f_2,\cdots,f_n)$ is nonplanar (cf. \cite{KT}). For analytic functions nondegeneracy is equivalent to nonplanarity. Therefore, the conclusion follows from Proposition 4.2 of \cite{KT}. \end{proof} The Corollary below now follows from the expression of $\operatorname{cov}(g_tu_\mathbf{f}(\mathbf{x})\Delta)$ in (6.12) from \cite{DGpart1} as a maximum of norms of linear combinations of $f_i$'s. \begin{corollary}\label{good_neighbourhood} Let $U$ be an open subset of $\mathbb{Q}_p^d$, and let $\mathbf{f}: U\mapsto \mathbb{Q}_p^n$ be an analytic map. Then for any $\mathbf{x}_0\in U$ there exists $C, \alpha>0$ and a neighbourhood $W$ of $\mathbf{x}_0$ contained in $U$ such that for any $\Delta\in\mathcal{P}(\mathcal{D},n+1)$ and $t\in N$ the functions $\mathbf{x}\mapsto \operatorname{cov}(g_tu_{\mathbf{f}(\mathbf{x})}\Delta)$ are $(C,\alpha)$-good on $W$. \end{corollary} Define $$\gamma(\mathbf{y}):=\sup\{c\geq 0\left | \delta(g_tu_{\mathbf{y}}\mathcal{D}^{n+1})\leq p^{-ct} \text{ for infinitely many } t\in\mathbb{N} \right \}$$ for $\mathbf{y}\in \mathbb{Q}_p^n$. From Proposition 4.1 and Lemma 6.1 of \cite{DGpart1} we can conclude that \begin{equation}\label{gamma_w} w_{p}(\mathbf{y})=\frac {n(1+\gamma(\mathbf{y}))+\gamma(\mathbf{y})}{1-(n+1)\gamma(\mathbf{y})}. \end{equation} We are now ready for \begin{theorem}\label{gamma} Suppose $\mathbf{f}:U \mapsto \mathbb{Q}_p^n $ is an analytic map and $U$ is an open subset of $\mathbb{Q}_p^d$. Denote by $\lambda$ the Haar measure on $\mathbb{Q}_p^d$. Let $\gamma\geq0$ and $\mathbf{x}_0\in U$ be such that $\gamma(f(\mathbf{x}_0))\leq \gamma$, then $\lambda$-almost every $\mathbf{x}$ in a neighbourhood of $\mathbf{x}_0$, we have $\gamma(\mathbf{f}(\mathbf{x}))\leq \gamma$. \end{theorem} \begin{proof} Let $\gamma\geq 0$ and $\mathbf{x}_0 \in U$ be such that $\gamma(\mathbf{f}(\mathbf{x}_0))\leq \gamma$. We consider the sets $U_1:=\left\{\mathbf{x}\in U ~| ~\gamma(\mathbf{f}(\mathbf{x}))\leq \gamma\}\right.$ and $$ U_2:= \{ \mathbf{x}\in U~|~ \mu(B\setminus U_1)=0 \text{ for some neighbourhood } B \text{ of } \mathbf{x}\}.$$ We claim that $U_2=\bar U_1\cap U$. So if $\mathbf{x}_0\in U_1,$ then $\mathbf{x}_0\in U_2,$ which implies that $U_2$ is a nonempty open set and the conclusion of the theorem follows.\\ \noindent Now take a point $\mathbf{x}_1\in \bar U_1\cap U$ and a ball $B$ of $\mathbf{x}_1$ such that $\tilde{B} :=3^{d-1}B$ is inside a neighbourhood appearing in Corollary \ref{good_neighbourhood}. We want to apply Theorem \ref{QND2} to the function $\mathbf{x}\mapsto g_tu_{\mathbf{f}(\mathbf{x})}$. The first condition (\rm{i}) of the Theorem is satisfied by Corollary \ref{good_neighbourhood}. Since $\mathbf{x}\in \bar U_1,$ there exists $\mathbf{x}'\in B\cap U_1$ and this implies that $\gamma(\mathbf{f}(\mathbf{x}'))\leq \gamma,$ which in turn implies that $$\forall \gamma'>\gamma, ~ \delta(g_tu_{\mathbf{f}(\mathbf{x}')}\mathcal{D}^{n+1})\geq p^{-\gamma't} \text{ for all but finitely many } t\in\mathbb{N}.$$ Now applying Lemma \ref{minkowski} we have that $$\operatorname{cov}(g_tu_{\mathbf{f}(\mathbf{x}')}\Delta)^{\frac{1}{rk(\Delta)}}\geq p^{-\gamma't}$$ for all $\Delta\in\mathcal{P}(\mathcal{D}, n+1)$ and for all but finitely many $t\in \mathbb{N}$. Hence condition (\rm{ii}) of the Theorem is satisfied. Taking $\varepsilon=p^{-\gamma''t}$ where $\gamma''>\gamma'$ and applying Theorem \ref{QND2} we have $$ \lambda\left\{\mathbf{x}\in B~| ~ \delta(g_tu_{\mathbf{f}(\mathbf{x})}\mathcal{D}^{n+1})< p^{-\gamma''t}\right\}\leq C'\left(\frac{p^{-\gamma''t}}{p^{-\gamma't}}\right)^\alpha\mu(B).$$ By the Borel-Cantelli lemma we immediately have that for $\mu$-a.e $\mathbf{x}\in B$ we have that $$ \delta(g_tu_{\mathbf{f}(\mathbf{x})}\mathcal{D}^{n+1})\leq p^{-\gamma''t}$$ for infinitely many $t\in\mathbb{N}$. Hence by definition for $\lambda$-a.e $\mathbf{x}\in B$, $\gamma(\mathbf{f}(\mathbf{x}))\leq \gamma$ as $\gamma'', \gamma'$ were taken arbitrary close to $\gamma$. This implies $\mathbf{x}_1\in U_2$ giving $\bar U_1\cap U\subset U_2$ and clearly $U_2\subset \bar U_1$. \end{proof} Now from formula \ref{gamma_w} we can conclude the following: \begin{corollary} Suppose $\mathbf{f}:U \mapsto \mathbb{Q}_p^n $ is an analytic map and $U$ is an open subset of $\mathbb{Q}_p^d$. Let $v\geq n$ and $\mathbf{x}_0\in U$ be such that $w_{p}(f(\mathbf{x}_0))\leq v$ then for $\lambda$-almost every $\mathbf{x}$ in a neighbourhood of $\mathbf{x}_0$ we have $w_{p}(\mathbf{f}(\mathbf{x}))\leq v$. \end{corollary} Since one can parametrize analytic manifolds by images of open neighbourhoods under analytic functions, we have the following Theorems. \begin{theorem} Suppose $\mathcal{M}$ is an analytic manifold of $\mathbb{Q}_p^n$. Let $v\geq n$ and suppose $w_{p}(\mathbf{y}_0)\leq v$ for some $\mathbf{y}\in\mathcal{M}$ then for almost every $\mathbf{y}$ in a neighbourhood of $\mathbf{y}_0$, $ w_{p}(\mathbf{y})\leq v$. \end{theorem} Therefore by Proposition 3.1 from \cite{DGpart1}, see (\ref{relation}) we also have, \begin{theorem} Suppose $\mathcal{M}$ is an analytic manifold of $\mathbb{Q}_p^n$. Let $v\geq n+1$ and suppose $w(\mathbf{y}_0)\leq v$ for some $\mathbf{y}_0\in\mathcal{M}$ then for almost every $\mathbf{y}$ in a neighbourhood of $\mathbf{y}_0$, $\omega(\mathbf{y})\leq v$. \end{theorem} So if one point in an analytic $p$-adic manifold is not very well approximable, then the set of not very well approximable points has positive measure. Note that this phenomenon was already clear from Theorem 6.2 of \cite{DGpart1} for the manifolds which were nondegenerate inside some affine subspace. In fact, in that case the set of not VWA would have measure full by existence of one not VWA vector. The theorems above constitute $p$-adic analogues of Theorem $1.4$ (a) of \cite{Kleinbock-dichotomy}. We have not pursued part (b) of the Theorem in loc. cit. which has to do with singular vectors. \section{Multiplicative Diophantine approximation}\label{multi} The multiplicative analogues of Sprind\v{z}huk's conjectures were formulated by Baker and settled by Kleinbock and Margulis in \cite{KM}. In \cite{Kleinbock-extremal}, D. Kleinbock proves his results for affine subspaces and their nondegenerate manifolds also in the multiplicative context. The setup is more subtle but the dynamical approach is powerful enough to deal with this, one replaces the one-parameter diagonal action with a multiparameter action. In \cite{G-mult}, the second named author proved a multiplicative version of a Khintchine type theorems for hyperplanes. Further in \cite{KT}, the authors established the $S$-adic Baker-Sprind\v{z}huk conjectures, namely they also considered the multiplicative case. In \S 6.3 of \cite{Kleinbock-exponent}, D. Kleinbock refers to the possibility of proving his improved exponent results also for subspaces, some of this was accomplished in \cite{Zhang1}. \subsection{A Dynamical correspondence for $p$-adic VWMA vectors} In this section we define $g_{\mathbf{t}}\in \operatorname{GL}_{n+1}(\mathbb{Q}_p\times\mathbb{R})$ such that $$g_{\mathbf{t}}^p:=\operatorname{diag}(p^{-t}, 1,\cdots,1) \text{ and } g_{\mathbf{t}}^\infty:=\operatorname{diag}(p^{-t_0}, p^{-t_1},\cdots,p^{-t_n})$$ where $\mathbf{t}=(t_0,\cdots,t_n)$ and $t :=\sum_{i=0}^n t_i$. \begin{lemma}\label{dani_vwma} A vector $\mathbf{y}\in\mathbb{Q}_p^n$ is very well multiplicatively approximable if and only if there exist unbounded $t>0$ with $\mathbf{t}\in\mathbb{Z}_+^{n+1} $ such that $$\delta(g_{\mathbf{t}}u_{\mathbf{y}}\mathcal{D}^{n+1})\leq p^{-\gamma t}$$ for some $0<\gamma<\frac{1}{n+1}$. \end{lemma} \begin{proof} Suppose $\delta(g_{\mathbf{t}}u_{\mathbf{y}}\mathcal{D}^{n+1})\leq p^{-\gamma t}$, this implies that for unbounded $t>0$ and $\tilde\mathbf{q}=(q_0,\mathbf{q})\in\mathcal{D}^{n+1}$, we have that \begin{equation}\label{hyp} \max(p^t\vert q_0+\mathbf{q}\cdot{\mathbf{y}}\vert_p,\Vert\mathbf{q}\Vert_p)\max_{i=0,\cdots,n} (p^{-t_i}\vert q_i\vert_\infty)\leq p^{-\gamma t}, \end{equation} which implies that \begin{equation} \max(p^t\big\vert \Vert\mathbf{q}\Vert_p q_0+\Vert\mathbf{q}\Vert_p\mathbf{q}\cdot{\mathbf{y}}\big\vert_p\Vert\mathbf{q}\Vert_p,\Vert\mathbf{q}\Vert_p)\max_{i=0,\cdots,n} (p^{-t_i}\vert q_i\vert_\infty)\leq p^{-\gamma t}. \end{equation} This implies that \begin{equation}\label{condition} \max(p^t\vert q'_0+\mathbf{q}'\cdot{\mathbf{y}}\vert_p\max_{i=0,\cdots,n} (p^{-t_i}\vert q'_i\vert_\infty),\max_{i=0,\cdots,n} (p^{-t_i}\vert q'_i\vert_\infty))\leq p^{-\gamma t} \end{equation} where $\tilde \mathbf{q}'=\Vert\mathbf{q}\Vert_p\tilde{\mathbf{q}}$. Since $\gamma>0$ we have $\mathbf{q}\neq 0$. Hence for $i=1,\cdots,n$ we have $\vert q'_i\vert_p=\frac{\vert q_i\vert_p}{\Vert\mathbf{q}\Vert_p}\leq 1$ giving $q'_i\in\mathbb{Z}$ for such $i$. There exists $1\leq k\leq n+1$ such that $\#\{i~|~ t_i\geq \gamma t\}=k $, possibly considering a subsequence of $\mathbf{t}$. From $\max_{i=0,\cdots,n}(p^{-t_i}\vert q'_i\vert_\infty)\leq p^{-\gamma t}$ we have that $$\vert q'_i\vert_\infty\leq p^{-\gamma t+t_i} \text{ and } 1\leq p^{-\gamma t+t_i}$$ for $k$ no of $i$. Otherwise we have $\vert q'_i\vert_\infty\leq p^{-\gamma t+t_i}<1$. Therefore \begin{equation}\label{condition2} \begin{aligned}\Pi_{+}(\tilde \mathbf{q}')\leq &\prod_{i \text{ s.t } t_i\geq \gamma t} \vert q'_i\vert_{+}\\ & \leq p^{-k\gamma t+\sum_{i \text{ s.t } t_i\geq \gamma t} t_i}\\ &\leq p^{(1-k\gamma)t}. \end{aligned}\end{equation} Again possibly taking a subsequence, there exists $1\leq m\leq n+1$ such that $\#\{i~|~ q'_i\neq 0\}=m$. By the definition $q'_i \neq 0$ implies $\vert q_i\vert_{+}=\vert q_i\vert_{\infty}$. Now by (\ref{condition}) we have that $$\vert q'_0+\mathbf{q}'\cdot\mathbf{y}\vert_p \vert q'_i\vert_{\infty}\leq \frac{p^{-\gamma t}}{p^{t-t_i}}.$$ Multiplying over all those $i$ such that $q'_i\neq 0$, $$\begin{aligned} \vert q'_0+\mathbf{q}'\cdot \mathbf{y}\vert_p^m\cdot \Pi_{+}(\tilde{\mathbf{q}}')&\leq \frac{p^{-m\gamma t}}{p^{mt-\sum_{i \text{ s.t }q'_i\neq 0}t_i}}\\ & \leq \frac{p^{-m\gamma t}}{p^{mt}}\cdot p^t\\ &\leq p^{-(m\gamma+m-1)t}. \end{aligned}$$ Now from (\ref{condition2}) it follows that $$ \begin{aligned} \vert q'_0+\mathbf{q}'\cdot\mathbf{y}\vert_p^m&\leq \Pi_{+}(\tilde{\mathbf{q}}')^{-(\frac{\gamma m+m-1}{1-k\gamma}+1)}\\ & \leq \Pi_{+}(\tilde{\mathbf{q}}')^{-\frac{m\gamma +m-k\gamma}{1-k\gamma}}. \end{aligned}$$ Hence we have that $$\vert q'_0+\mathbf{q}'\cdot\mathbf{y}\vert_p\leq \Pi_{+}(\tilde{\mathbf{q}}')^{-\frac{(m\gamma +m-k\gamma)}{m(1-k\gamma)}}.$$ Since $\gamma<\frac{1}{n+1}<\frac{1}{k}$ we have $$\frac{(m\gamma +m-k\gamma)}{m(1-k\gamma)}-1=\frac{\gamma(m-k+mk)}{m(1-k\gamma)}=\varepsilon>0.$$ We now claim that the $\Pi_{+}(\tilde{\mathbf{q}}')$ appearing here are unbounded. Note that $ \vert q_0+\mathbf{q}\cdot \mathbf{y}\vert_p^m\cdot \Pi_{+}(\tilde{\mathbf{q}})\to 0$ due to the existence of unbounded many $t>0$. The same reason also gives $$1<\vert q_0\vert_p\vert q_0\vert_\infty\leq \max (p^{-\gamma t}, \Vert\mathbf{q}\Vert_p\vert q_0\vert_\infty\Vert\mathbf{y}\Vert_p)$$ which implies that $$1\leq \Vert \mathbf{q}\Vert_p\vert q_0\vert_{\infty}\Vert\mathbf{y}\Vert_p $$ if $q_0$ is nonzero, which says that $\vert q'_0\vert_{+}\geq c$ where $c>0$ depends only on $\mathbf{y}$. We denote $q_i=p^{l_i}z_i\in\mathcal{D}$ where $z_i$ are integers without any $p$ factor. Then $$\vert q'_i\vert_{+}= \left\{\begin{array}{ll} \vert q_i\vert_{\infty}\Vert\mathbf{q}\Vert_p &\text{ if } q_i\neq 0\\ \\ 1 &\text{otherwise}. \end{array}\right.$$ Suppose $\Pi_{+}(\tilde{\mathbf{q}}')\leq M$ for some $M>0$, i.e. $\prod_{i=0,\cdots,n} (\vert q'_i\vert_{+})\leq M$ which in turn implies that $$ \vert q'_0\vert_{+}\prod_{\{i>1~|~q_i\neq 0\}}\vert z_i\vert_\infty\leq M.$$ Here we are using that if $\Vert \mathbf{q}\Vert_p=p^l$ then $-l_i\leq l$ for $i>1$. Since $\vert q'_0\vert_{+}$ is bounded below by positive, there are finitely many options for the integers $z_i$ occuring in $q_i$ for $i>1$. Hence we have that $$ \vert q'_0\vert_{+}\prod_{\{i>1~|~q_i\neq 0\}}(p^{l_i}\Vert\mathbf{q}\Vert_p)\leq M' $$ for some $M'>0$. The above inequality gives \begin{equation}\label{eqn1} \vert q'_0\vert_{+}\prod_{\{i>1~|~q_i\neq 0\}} p^{l+l_i}\leq M'.\end{equation} Hence we have $\vert q'_0\vert_{+}\leq M'$ and arguing as in (\ref{condition}) we may conclude that $$\vert z_0\vert_\infty=\vert q'_0\vert_{\infty}\vert q'_0\vert_p\leq \max (1, M'\Vert \mathbf{y}\Vert_p),$$ has only finitely many options. Now from (\ref{eqn1}) $$ c\leq\prod_{\{i~|~q_i\neq 0\}} p^{l+l_i} \leq M'.$$\noindent Thus we now have $-\alpha\leq\sum_{\{i~|~q_i\neq 0\}} l_i+ml\leq \alpha$ for some $\alpha>0$. Since $c\leq \vert q_0\vert _{+}\leq M'$ which gives $-\beta\leq (l_0+l)\leq \beta$ for some $\beta>0$. Hence for $i>1$ and $q_i\neq 0$ we have $0\leq l_i+l\leq \alpha'$ for some $\alpha'>0$. But then only way $ \vert q_0+\mathbf{q}\cdot \mathbf{y}\vert_p^m\cdot \Pi_{+}(\tilde{\mathbf{q}})$ can go to $0$ is if there exists some $\tilde\mathbf{q}(\neq 0 )\in \mathbb{Z}^{n+1}$ such that $q_0+\mathbf{q}\cdot\mathbf{y}=0$. \noindent In that case $\mathbf{y}$ is very well multiplicatively approximable. So if $\mathbf{y}$ is not such then $\Pi_{+}(\tilde{\mathbf{q}}')$ has to be unbounded and satisfies $$ \vert q'_0+\mathbf{q}'\cdot\mathbf{y}\vert_p\leq \Pi_{+}(\tilde{\mathbf{q}}')^{-(1+\varepsilon)} $$ where $\tilde{\mathbf{q}}'=(q'_0,\mathbf{q}')\in\mathbb{Z}[1/p]\times\mathbb{Z}^n$. Another crucial observation now is that $\vert q'_0\vert_p$ is bounded above by a constant depending on $\mathbf{y}$. So in case $q'_0\notin \mathbb{Z}$ we can write $$ \big\vert \vert q'_0\vert_p\cdot (q_0'+\mathbf{q}'\cdot\mathbf{y})\big\vert_p\vert q'_0\vert_p\leq \Pi_{+}(\tilde{\mathbf{q}}')^{-(1+\varepsilon)}. $$ Now taking $\tilde {\mathbf{q}}''=\vert q_0\vert_p\tilde{\mathbf{q}}'$ and using the upper bound on $\vert q_0\vert_p$ enables us to conclude $$ \vert q''_0+\mathbf{q}''\cdot\mathbf{y}\vert_p\leq \Pi_{+}(\tilde{\mathbf{q}}'')^{-(1+\varepsilon')} $$ for infinitely many $\tilde{\mathbf{q}}''\in \mathbb{Z}^{n+1}$ with $\varepsilon'<\varepsilon$. Therefore $\mathbf{y}$ is very well multiplicatively approximable.\\ We now prove the converse. Suppose we have that \begin{equation}\label{vwma} \vert q_0+\mathbf{q}\cdot\mathbf{y}\vert_p\leq \Pi_{+}(\tilde{\mathbf{q}})^{-(1+\varepsilon)} \end{equation} for infinitely many $\tilde{\mathbf{q}}\in \mathbb{Z}^{n+1}$. Then choose $t_i>0$ such that $\vert q_i\vert_{+}=\Pi_{+}(\tilde{\mathbf{q}})^{-\frac{\varepsilon}{n+1}} p^{t_i}$. Multiplying these we get $p^t=\Pi_{+}(\tilde{\mathbf{q}})^{(1+\varepsilon)}$ which guarantees $t$ to be unbounded. The choice of $t_i$ gives the following condition $$ p^{-t_i}\vert q_i\vert_\infty\leq p^{-t_i}\vert q_i\vert_{+}\leq \Pi_{+}(\tilde{\mathbf{q}})^{-\frac{\varepsilon}{n+1}}=p^{-\gamma t} ~~\forall ~i=0,\cdots,n$$ where $\gamma=\frac{\varepsilon}{(n+1)(1+\varepsilon)}$. Hence $\Vert g_{\mathbf{t}}^\infty u_{\mathbf{y}}^\infty\tilde{\mathbf{q}}\Vert_\infty\leq p^{-\gamma t}.$ On the other hand, $$\vert p^{-t}(q_0+\mathbf{q}\cdot\mathbf{y})\vert_p=p^t\vert q_0+\mathbf{q}\cdot\mathbf{y}\vert_p\leq p^t\cdot\frac{1}{p^t}=1,$$ due to (\ref{vwma}). Therefore we have $c(g_{\mathbf{t}}u_{\mathbf{y}}\tilde{\mathbf{q}})\leq p^{-\gamma t}$. Now taking $[\mathbf{t}]$ consisting of integer factors and observing that the ratio of $\delta (g_{[\mathbf{t}]}u_{\mathbf{y}}\mathcal{D}^{n+1})$ and $\delta (g_{\mathbf{t}}u_{\mathbf{y}}\mathcal{D}^{n+1})$ is bounded by uniform factor. Hence reducing $\gamma$ a bit we can conclude the lemma. \end{proof} Note that one direction $(\Longrightarrow)$ of the last lemma was already observed by Kleinbock and Tomanov in \cite{KT} with a slight variation. The main content of the previous lemma is that we can come back from dynamics to number theory using the reverse direction, which was earlier not known to the best of our knowledge. \begin{theorem} For any analytic manifold of $\mathbb{Q}_p^n$ if one point is not very well multiplicatively approximable then almost every point in a neighbourhood of that point is not very well multiplicatively approximable. \end{theorem} \begin{proof} Following the proof of Theorem \ref{gamma} and considering $$U_1:=\left\{\mathbf{x}\in U~\Bigg | ~\begin{aligned}&\text{ for any } 0<\gamma<\frac{1}{n+1} ,~ \delta(g_{\mathbf{t}}u_{\mathbf{y}}\mathcal{D}^{n+1})> p^{-\gamma t} \\ &\text{ for all but finitely many } \mathbf{t}\in\mathbb{Z}_+^{n+1}\end{aligned}\right\}$$ one can show that $U_1$ has positive measure if nonempty. Then the using the above Lemma \ref{dani_vwma} one can conclude that if one point is not very well multiplicatively approximable then $U_1\neq\emptyset$, hence of positive measure. And then again using Lemma \ref{dani_vwma}, the conclusion follows. \end{proof} We now turn to the proof of Theorem \ref{thm:mult}. Note that by repeating the argument as in Proposition $6.1$ of \cite{DGpart1}, it can be proved that: \begin{proposition}\label{prop_m1} Take $\mathcal{R}=\mathbb{Q}_p\times \mathbb{R}$. Let $X$ be a Besicovitch metric space and $\mu$ be a uniformly Federer measure on $X$. Denote $\tilde B:=B(x,3^{n+1}r)$. Suppose we are given a continuous function $\mathbf{f} : X\mapsto \mathbb{Q}_{p}^{n}$ and $C,\alpha >0$ with the following properties\\ {\label{b11}\rm{(i)}}~$x\mapsto \operatorname{cov}(g_{\mathbf{t}} u_{\mathbf{f}(x)}\Delta) $is $(C,\alpha)$ good with respect to $\mu\text{ in }\tilde B ~\forall ~\Delta \in \mathcal P(\mathcal D,n+1),$\\ {\label{b123}\rm{(ii)}} for any $d>0 $ there exists $T=T(d) >0$ such that for any $\mathbf{t}\in\mathbb{Z}_+^{n+1}$ with $t\geq T$ and any $\Delta \in \mathcal P(\mathcal D,n+1)$ one has \begin{equation} \sup_{x\in B\cap \operatorname{supp}\mu}\operatorname{cov} (g_{\mathbf{t}}u_{\mathbf{f}(x)}\Delta)\geq p^{-(\operatorname{rank}\Delta)dt}. \end{equation} Then $\mu$ a.e every $x$, $\mathbf{f}(x)$ is not VWMA. \end{proposition} Note that condition $\rm{(ii)}$ in the above Lemma is actually necessary. If $\rm{(ii)}$ does not hold then there exists unbounded $t$ with $\mathbf{t}\in\mathbb{Z}_+^{n+1} $ such that $$\delta(g_{\mathbf{t}}u_{\mathbf{f}(x)}\mathcal{D}^{n+1})\leq p^{-dt}$$ for some $0<d<\frac{1}{n+1}$ for all $x\in B\cap\operatorname{supp}\mu$. Now from the above lemma we have that $\mathbf{f}(x)\in\mathcal{WM}_{\frac{md+m-kd}{m(1-kd)}}$ for some $1\leq m,k\leq n+1$. Since $\frac{md+m-kd}{m(1-kd)}>\frac{1}{1-d}>1$ we have that $\mathbf{f}(B\cap\operatorname{supp}\mu)\subset \mathcal{WM}_{\frac{1}{1-d}}$ i.e $\mathbf{f}(x)$ is VWMA for all $x\in B\cap\operatorname{supp}\mu$. \noindent Also condition $\rm{(ii)}$ in the above proposition is same as \begin{equation}\label{covolume1m}\begin{aligned} & \text{ for any } d>0~ \exists ~T=T(d) >0 \text{ such that for any } \mathbf{t}\in\mathbb{Z}_+^{n+1} \text{ with } t\geq T \\& \forall~j=1,\cdots, n \text{ and } \forall~\mathbf{w}\in \bigwedge^{j}\mathcal{D}^{n+1},\text{ one has } \\& \max\bigg( p^{t}\Vert R\mathbf{c}(\mathbf{w}) \Vert_{p},\Vert \pi(\mathbf{w})\Vert_{p}\bigg)\max_I{p^{-t_{I}}\Vert w_I\Vert_\infty}\geq p^{-jdt}, \end{aligned} \end{equation} which is independent of $\mathbf{f}$ but depends on the affine subspace in which manifold is nondegenerate. \noindent Combining all these previous observations and repeating the same arguments as in section $\S 7$ of \cite{DGpart1}, we have the following. \begin{theorem} Let $\mu$ be a Federer measure on a Besicovitch metric space $X, \mathcal{L}$ an affine subspace of $\mathbb{Q}_p^n$, and let $\mathbf{f} : X\to \mathcal{L}$ be a continuous map such that $(\mathbf{f}, \mu)$ is good and nonplanar. Then the following are equivalent: \\ \rm{(i)} \begin{equation} \big\{x~\in\operatorname{supp}\mu ~| \mathbf{f}(x) \text{ is not VWMA }\big\} \text{ is nonempty}. \end{equation} \noindent\rm{(ii)}\begin{equation} ~~~ \mathbf{f}(x) \text{ is not VWMA for } \mu\text{ a.e } x. \end{equation} \rm{(iii)}\begin{equation} \text{ Condition } (\ref{covolume1m}) \text{ holds .} \end{equation} \end{theorem} Theorem \ref{thm:mult} now follows as a corollary using Theorem $4.3$ of \cite{KT}.
\section{Topological Phases and Packing Valleys} Ref.\ \cite{dfamilyp} showed that, for families of hard anisotropic shapes at infinite pressure, continuous deformations of particle shape result in continuous changes in putative densest packings. It was also shown that non-analytic behavior in curves, surfaces, or hypersurfaces $\phi_d(\alpha_i)$ of maximal packing density $\phi_d$ as a function of particle shape $\alpha_i$ occur if and only if there is a change in the point-set topology of contacts between particles in the dense packing structure; Fig.\ \ref{protected_phase} illustrates this point. We argue that, generically, this leads to distinct thermodynamic phases away from infinite pressure. Since pressure is defined in units of $k_{B}T$, we can think of the infinite pressure limit as a sort of zero temperature limit of the system, which may be a more useful way to think about these hard particle systems in reference to other works involving topological order. We make our argument using the framework of digital alchemy \cite{digitalalchemy}. Digital alchemy extends the traditional thermodynamic ensemble for particle self-assembly through consideration of thermodynamically conjugate variables (termed ``alchemical potentials'' $\mu$) coupled to changes in particle attributes. Here, we consider changes in particle shape as the alchemical variable for the packings in \cite{dfamilyp} and the relevant alchemical potential is given by \begin{equation} \label{alch_pot} \mu_\alpha = \frac{1}{N} \frac{\partial F}{\partial \alpha}\; , \end{equation} where $N$ is the number of particles in the system, $F$ is the free energy and $\alpha$ is a shape parameter. To understand the phase behavior of dense suspensions of anisotropic colloids away from infinite pressure, it is convenient to study the alchemical potential in the vicinity of the intersection of two packing curves, where there is a change in the topology of particle contacts ($\alpha_\vee,\phi_\vee$ in Fig.\ \ref{protected_phase}). There, we can Taylor expand Eq.\ \eqref{alch_pot} for some $\phi < \phi_\vee$, as detailed in the Supplementary Material, to give $\mu_\alpha$ to leading order in the dimensionless pressure $P^*$ \begin{equation} \label{muapprox} \mu_\alpha \approx \pm \frac{1}{2\beta} \left|\frac{\partial\phi_d}{\partial\alpha}\right| \left(\frac{P^*(\phi_d)}{\phi_d^2}+\frac{P^*(\phi_\vee)}{\phi_\vee^2} \right) \; , \end{equation} where $\beta$ is inverse temperature, $\phi_d$ is maximal packing density, and the overall sign is determined by whether we carry out the expansion for $\alpha$ greater or less than $\alpha_\vee$. $P^*(\phi_\vee)$ diverges by definition as it represents the infinite pressure surface of maximal packing density; this means that $\mu_\alpha$ diverges near $\phi_\vee$, with a sign that changes across $\alpha_\vee$. Since $\mu_\alpha$ is a first derivative of the free energy $F$, this divergence in $\mu_\alpha$ indicates a discontinuity in $F$, which in turn indicates a thermodynamic phase transition. This transition exists solely because of the non-analytic behavior of the dense packing surface, which reflects the topology of contacts among densely packed particles. Next we consider what happens below maximum packing density. We consider packings $\lambda_i$ where $i \in \{A,B\}$; $\lambda_A$ and $\lambda_B$ are on either side of the phase transition shown schematically in Fig.\ \ref{protected_phase}. To distinguish between these packings we construct an order parameter that takes advantage of the way $\lambda_A$ and $\lambda_B$ are defined topologically. Ref. \cite{dfamilyp} defines each packing according to the types of contacts (face-face, face-vertex, face-edge, vertex-vertex, vertex-edge and edge-edge) shared between adjacent particles. These contacts map to a set of intersection equations that mathematically describe each contact by relating particle shape parameters to the geometry of the unit cell of the packing described by vectors for the lattice and particle(s) within the unit cell. Each packing $\lambda_i$ has $K_i$ unique (meaning unshared with the other packing) intersection inequalities $\bigl|C_{i,k}\bigr| \geq 0$ (where $k = 1, 2, \ldots, K_i$) that define the packing. When the shape parameters and unit cell geometry correspond to densest packing, all the $C_{i,k}=0$. If the geometry of the unit cell does not correspond to the densest packing, then some $\bigl|C_{i,k}\bigr| \geq 0$. Changes in unit cell geometry (while particle shape is fixed) effectively provide a means of measuring changes to particle contact; at lower packing densities, then, the saturation or near-saturation of the intersection inequalities (i.e. all $C_{i,k} \approx 0$) would imply that particle contacts have (through thermal fluctuation) remained approximately equal to the particle contacts at infinite pressure, preserving unit cell geometry and topological order. We now define an order parameter of the form $\theta_{ij}$ where $i$ represents a stable or metastable thermodynamic phase that is putatively isostructural with $\lambda_i$ \footnote{Note that if subsequent evaluation of the order parameter indicates the state is not isostructural with $\lambda_i$ it implies those structures are thermodynamically unstable} and $j$ is the packing type of the set of intersection equations against which the state will be evaluated. For example, $\theta_{AA}$ is defined as the evaluation of a packing type $\lambda_A$ in its own intersection equations (those of $\lambda_A$), and it evaluates to unity. Conversely, $\theta_{AB}$ (pertaining to the same packing type $\lambda_A$ evaluated in the intersection equations of $\lambda_{B}$) evaluates to zero. First, we describe the variables that we will use to construct $\theta_{ij}$. The packing ${\lambda_i}$ is a function of particle shape $\alpha$ and packing density $\phi \leq \phi_d$ by definition. We define $\xi_{ij}$ (a function of particle shape $\alpha$ and packing density $\phi$) to reflect the evaluation of packing $\lambda_i$ in the intersection equations of packing type $\lambda_j$ as \begin{equation} \label{OP_thermal} \xi_{ij}(\phi, \alpha) = e^{-\frac{1}{K_j}{\sum\limits_{k=1}^{K_j}\bigl|{C_{j,k}(\lambda_{i}(\phi,\alpha))}\bigr|}}. \end{equation} When $\phi = \phi_d$, $\xi_{ij}$ describes the satisfaction of $\lambda_j$'s intersection equations by $\lambda_i$ at its maximum packing density, lying on its putative densest packing surface. We thus denote this special case by \begin{equation} \xi^\text{ideal}_{ij} = \xi_{ij}(\phi_{d}, \alpha). \end{equation} To construct a generalized order parameter for a set of two adjacent packings $\lambda_A$ and $\lambda_B$, we may then compute four quantities ($\xi_{AA},\xi_{AB},\xi_{BA},\xi_{BB}$, which consider all four evaluation types in $i \in \{A,B\}$ and $j \in \{A,B\}$), which we use to build vectors that represent coordinates in the $[\xi_{iA},\xi_{iB}]$ plane \begin{equation} \label{ivecs} \bold{D_{A}} = \bigg [\xi_{AA}, \xi_{AB} \bigg ] \;\:,\:\;\bold{D_{B}} = \bigg [\xi_{BA}, \xi_{BB} \bigg ]. \end{equation} Similarly, we construct vectors to represent the maximum density packings \begin{equation} \label{ideal_vecs} \bold{D^\textbf{ideal}_\textbf{A}} = \bigg [\xi^\text{ideal}_{AA}, \xi^\text{ideal}_{AB} \bigg ] \;\:,\:\; \bold{D^\textbf{ideal}_\textbf{B}} = \bigg [\xi^\text{ideal}_{BA}, \xi^\text{ideal}_{BB} \bigg ]. \end{equation} The distance between the ideal structures in the $[\xi_{iA},\xi_{iB}]$ plane is \begin{equation} \label{ideal_dist} \bold{D^\textbf{ideal}_\textbf{AB}} = \sqrt{(\bold{D^\textbf{ideal}_{A}}-\bold{D^\textbf{ideal}_{B}}) \cdot (\bold{D^\textbf{ideal}_{A}}-\bold{D^\textbf{ideal}_{B}})}. \end{equation} Finally, we define $\theta_{ij}$ to distinguish the topology of the two packings, making a generalized expression for any packing type $\lambda_i$ evaluated in the intersection equations of a packing type $\lambda_j$ \begin{equation} \label{OP_ij} \theta_{ij} = 1 - \frac{\sqrt{(\bold{D_{i}}-\bold{D^\textbf{ideal}_{j}}) \cdot (\bold{D_{i}}-\bold{D^\textbf{ideal}_{j}})}}{\bold{D^\textbf{ideal}_\textbf{AB}}}. \end{equation} The evaluation of Eq.\ \eqref{OP_ij} on an example system (described below) is shown in Fig.\ \ref{52_58_all_parts_new_version}(b), where both $\theta_{AA}$ and $\theta_{BA}$ are plotted, showing that when $\lambda_A$ is evaluated in the intersection equations of $\lambda_A$, the order parameter is unity. When $\lambda_B$ is evaluated in the intersection equations of $\lambda_A$, the order parameter is zero. For concreteness, we considered packings in the two-parameter family of triangle invariant polyhedral shapes, $\Delta_{323}$, reported in Ref.\ \cite{dfamilyp}. This family of shapes includes three Platonic solids (tetrahedron, octahedron, cube) and truncations thereof. Those authors showed the existence of 75 topologically distinct two-particle dense packings of polyhedra in this family. As one example, we studied the boundary between phases labelled `52' and `58' in Ref.\ \cite{dfamilyp}, which we refer to hereafter as $\lambda_{A}$ and $\lambda_{B}$, respectively (the difference in topology of these packings is shown in Fig.\ \ref{shapes5258}). We studied a range of constituent particles with shape variables $\alpha_a=(2.80,2.88)$ and $\alpha_c=1.52$. We set one $\alpha$ to be constant and moved along the axis of the other $\alpha$. We initialized systems of 1024 identical particles with shape variables $( \alpha_a, \alpha_c )$ (denoted by $(u,v)$ in the notation of Ref. [10]) in both $\lambda_{A}$ and $\lambda_{B}$ at various densities. Particle positions and orientations are well defined for initialization in Ref. [10]. We sampled systems in the isochoric ensemble using the hard particle Monte Carlo (HPMC) \cite{Anderson2015a} extension of the simulation toolkit HOOMD-blue \cite{hoomdblue, Glaser2015}. Although the volume remained fixed, box shear and aspect ratio moves were allowed, and move sizes were tuned such that acceptance ratios were approximately 0.3. We calculated pressure during these simulations via the scaled distribution function \cite{hexatic}, whose measurement is implemented in HPMC \cite{hpmcplug}. Ensemble averages were taken over five replicates and five snapshots per replicate simulation, where each simulation snapshot is separated by $1.0 \times 10^{6}$ MC timesteps, well beyond the calculated autocorrelation time of the system pressure. For each data point, we constructed a system in the ideal putative densest packing structure and then expanded this structure to the target packing density. Free energies were computed via the Frenkel-Ladd \cite{frenkelladd,amirtetphdiag} method. The Einstein crystals for these simulations were the same packings described above, with an expansion performed down to the desired packing density achieved at the beginning of the simulation. An external force field $\Lambda$ tethered particles to their crystal sites with a spring constant of $k = \exp(25)$ which has units of $k_{B}T$. We fixed length units by taking particles to have unit volume. Every $1.4 \times 10^5$ timesteps, $k$ was decreased until it was eventually 0; each time $k$ was changed, move sizes were tuned, $1.0 \times 10^5$ timesteps were run for equilibration and the lattice energy was calculated in the remaining $4.0 \times 10^4$ timesteps. \begin{figure} \includegraphics[width=8.5cm]{shapes5258} \caption{Example dense packing structures (where packing $\lambda_A$ is blue and packing $\lambda_B$ is green) of anisotropic shapes, including ``exploded'' views that show the location and orientation of neighboring particles, and densely packed units. \label{shapes5258} } \end{figure} \begin{figure*} \includegraphics[width=18cm]{52_58_all_parts_new_version} \caption{Panel (a) shows the curves of maximal packing density at $\phi_\vee$, outlining the two protected packing regions, where packing $\lambda_A$ is blue and packing $\lambda_B$ is green. Lower curves indicate computed free energies at three packing densities (0.85, 0.80, 0.75). Darker shaded colors indicate protected regions, while lighter shaded colors indicate free energy preferred regions of the ($\alpha$, $\phi$) phase diagram. The gray region is a region where the preferred phase is unknown. Panels (b, d, f) indicate topological order evaluated using the intersection equations for $\lambda_A$ and panels (c, e, g) indicate the same using the intersection equations for $\lambda_B$. The dotted black line roughly demarcates boundaries between thermodynamically preferred packings as a function of packing density, and is meant to guide the eye. \label{52_58_all_parts_new_version} } \end{figure*} Fig.\ \ref{52_58_all_parts_new_version}(a) shows the curves of maximal packing density $\phi_d$ for each packing type, indicating the protected regions in darker shading under them. Below that are curves of free energy as a function of both packing and shape at various packing densities $\phi$ well below the maximum packing density $\phi_d$. The plots of free energy show that even at densities well below this value two phases persist up to some crossing. The location of this crossing at densities below $\phi_\vee$ need not be at $\alpha_\vee$, and we find that it does deviate from $\alpha_\vee$ at lower packing density. The free energy preferred regions are colored in lighter shades of the protected regions and to verify that the existence of the two phases at finite pressure arises from the topology of particle packing, we compute the relevant order parameters from Eq.\ \eqref{OP_ij} for each structure. This calculation is performed by extracting the unit cells of the thermalized packings of $\lambda_A$ and $\lambda_B$ at a packing density $\phi_d$. The unit cell extraction technique is outlined in the Supplemental Material. We found that at densities well below $\phi_\vee$, phases identified by the free energy calculation correspond to phases that differ in the topology of particle contacts measured through the order parameters $\theta_{ij}$. In Fig.\ \ref{52_58_all_parts_new_version}(b,d,f) we evaluated the order parameter $\theta_{iA}$ on structures $\lambda_{i}$ where $i \in \{A,B\}$ and found that over a range of packing densities, $\theta_{iA}$ evaluates to near unity on $\lambda_{A}$ and vanishes on $\lambda_{B}$. Conversely, in Fig.\ \ref{52_58_all_parts_new_version}(c,e,g) we evaluated the order parameter $\theta_{iB}$ on $\lambda_{A}$ and $\lambda_{B}$ and found that over a range of packing densities, $\theta_{iB}$ evaluates to near unity on $\lambda_{B}$ and vanishes on $\lambda_{A}$. These results indicate that the phases can be identified by the topology of the related putative densest packings, and possess residual topological order, or order that matches the order of a topological state at a packing density where topological protection has not been proven to exist. The residual topological order we observe in Fig.\ \ref{52_58_all_parts_new_version} suggests that crystal structures present in densely packed colloidal suspensions maintain a topologically consistent set of contacts between particles at densities where other competing contact topologies could exist, but are unlikely to do so due to the existence of a more thermodynamically favorable topological state. A second system (also in the densest packing landscape) was picked arbitrarily for evaluation in order to reinforce the results shown here; the similar results for that system can be found in the Supplementary Material. The topologically distinct phases of dense suspensions of anisotropic colloids that we find here are dissimilar to topological phases in quantum matter in almost all respects, except in their stability against perturbations. For instance, whereas the topological entropy of ground-state degeneracy that arises from entanglement is important in quantum systems \cite{topologicalentropy}, in our systems, instead, shape entropy \cite{entint} quantifies ground state degeneracy. Moreover, whereas the geometric topology that underlies topological order in quantum systems allows a considerable mathematical apparatus to be brought to bear in understanding those states, the point-set topology that underlies the classical, topological order we identify here is more limited. Nevertheless, despite the rudimentary form of the topological order reported here, colloidal systems remain robust against perturbation, since they persist even at lower packing densities where topological protection is no longer required. This robust persistence would be a key desirable feature for applications in regimes away from the infinite pressure limit. Moreover, because the form of topological order is more rudimentary, previous work \cite{dfamilyp} demonstrating that topological features (such as particle contact types between faces, edges and vertices) generically distinguish phases of densely packed colloids suggests that this form of topological order is widespread in colloidal systems \cite{dijkstranonconvex,escobedo,dijkstrasuperballs,trunctet,dijkstratcube}. To leverage this topological order in experiment we note that though our order parameters are based on contact types that nominally arise at infinite pressure, we showed that topological order persists at finite pressure. This finding is potentially useful in constructing plasmonic materials that have robust response in the presence of thermal fluctuations, changes in particle shape \cite{epp} or the behavior of stabilizing ligands \cite{Waltmann2017,Waltmann2018}. It is known that the plasmonic response of systems of anisotropic nanoparticles depends strongly on the type of contacts between nanoparticles \cite{taoetal}. We find that the topology of contacts between anisotropic nanoparticles is stable over a broad range of packing densities. When situated in the context of the zoo of distinct sets of contact types that has been shown to exist \cite{dfamilyp} in families of anisotropic nanoparticles and the variety of synthesis techniques that can readily produce such particles in the laboratory \cite{skrabalak,geissleryang,huang2012facedependent,liao2013polyhedralgold}, our work points to potential avenues for creating nanomaterials with a diversity of robust forms of plasmonic response. \section{Acknowledgments} Research for this publication was conducted with Government support under contract FA9550-11-C-0028 and awarded by the Department of Defense, Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowship, 32 CFR 168a, awarded to W.E.Z. E.G.T acknowledges support from the National Science Foundation Graduate Research Fellowship Grant DGE 1256260 and a Blue Waters Graduate Fellowship. This research is part of the Blue Waters sustained petascale computing project, which is supported by the National Science Foundation (awards OCI-0725070 and ACI-1238993) and the state of Illinois. Blue Waters is a joint effort of the University of Illinois at Urbana-Champaign and its National Center for Supercomputing Applications. This work was partially supported by a Simons Investigator award from the Simons Foundation to Sharon Glotzer. Computational resources and services supported by Advanced Research Computing at the University of Michigan, Ann Arbor. We thank D. Klotsa and E. R. Chen for access to data pertinent to this study and helpful discussion of that data. We also thank J. Dshemuchadse and B. VanSaders for helpful discussions and software contributions.
\section{Introduction} Although Standard Model (SM) has got tremendous success in describing various phenomena at the elementary particle level, but SM failed to account for two major experimental results, one related to the existence of dark matter (DM) \cite{Bertone:2004pz} in the universe and the other related to neutrino oscillation phenomena that require neutrinos to be massive and significant mixings among different flavors of neutrinos. To accommodate neutrino masses and a viable dark matter candidate something beyond SM is necessary. One such example is minimal extension of SM gauge group with extra $U(1)_{X}$ gauge symmetry. Additional symmetries \cite{symmetry} either global or gauged are imposed which play the role in guaranteeing the stability of dark matter candidate. There are several $U(1)_{X}$ gauge extended models with minimal extension to the SM \cite{Langacker:2008yv,u2,Ma:2006km}. An important feature of these models is that in comparison to SM there is one extra neutral gauge boson. In general there could be mixing of the extra gauge boson $X$ with the SM $Z$ boson, which results in the modification of neutral current phenomena. The $Z$ pole data could be affected indirectly through such mixing and could shift the measured $Z$ mass and its coupling to SM fermions. But nice agreement of the mass and coupling with SM predictions constrains such mixing to be lower than 1$\%$ \cite{mix}. On the other hand, in cosmology to explain the rotational curves of the heavy massive body inside the galaxies, one need to propose the presence of dark matter \cite{Zwicky:1933gu,wmap}. Dark matter relic density has been constrained from PLANCK experiment \cite{Aghanim:2018eyx}. \begin{equation} \Omega_{DM} h^2=0.1200\pm0.0012 \end{equation} where $\Omega_{DM}$ is the density parameter for dark matter and $h=H_{0}/$(100 km $s^{-1}$ Mp$c^{-1}$. Recently CMS and ATLAS \cite{Aaboud:2017yvp,Aaboud:2017buh,cms} Collaborations at LHC have obtained stringent bound on the mass and gauge coupling associated with the extra $U(1)$ gauge boson. In the light of recent neutrino oscillation phenomena \cite{Gonzalez-Garcia:2015qrr,Ahn:2006zza}, there is a proposition of presence of sterile neutrino apart from three active neutrinos. There are recent indications in the Fermilab experiment \cite{Adamson:2017zcg} about some nonzero mixing among active and sterile neutrinos with sterile neutrino mass in the eV scale \cite{fermi}. In connection with these observational results, we have considered here an $U(1)$ gauge extended model \cite{Adhikari:2015woo}, which contains dark matter fields and also can accommodate active-sterile neutrino masses and mixing. In this model right handed Majorana fermion is found to be suitable candidate for dark matter as discussed later. There are some studies on the constraints on model parameters of $U(1)$ gauge extended models based on collider phenomenology and cosmological constraints \cite{okada}. However, in this work we have shown in detail the allowed region in the dark matter mass $m_\psi$ and extra $U(1)$ gauge boson mass $M_X$ plane. For that we have considered PLANCK constraint on dark matter relic abundance. Besides, we consider constraints coming from active and sterile neutrino masses and their mixing, to find the allowed region. In the model considered here, the presence of appropriate active and sterile neutrino mass and their mixing requires the presence of appropriate range of mixing (angle $\theta $) of dark matter with another right handed Majorana fermion and their mass gap $\Delta$ as discussed later. In any extra $U(1)$ gauge model, the Majorana fermion (which is dark matter in our case) can be annihilated to SM fermion and antifermions through $X$ boson as mediator. However, in our work, due to active sterile mixing resulting in the nonzero value of $\theta$, the co-annihilation of dark matter with other Majorana fermion is also present. So the observed dark matter relic density will depend on both annihilation and co-annihilation of dark matter in general in our work. With LHC constraint along with relic abundance constraint and constraint on $\Delta$ and $\theta$ (from neutrino oscillation data) we have also studied the possibility of lower bounds on mass of $X$ boson and the dark matter mass and the corresponding $U(1)$ gauge coupling $g_X$. Particularly the allowed region is more for higher values of $M_X$ and $m_\psi$. It is found that the allowed regions does not significantly vary with $\Delta$ values but more sensitive to the variations of $\theta$ - the mixing of the dark matter with other heavy right handed Majorana field considered in the model. All these analysis has been done considering $Z-X$ mixing to be zero at the tree level. Later on we have shown that higher order corrections of this $Z-X$ mixing remains very small of the order of $10^{-5}$ and has been neglected. In section II, we have discussed the salient features of a model which is $U(1)$ extension of the SM gauge group and the model can successfully explain active and sterile neutrino mass and mixing and also there is scope of dark matter. We have discussed the interaction of right-handed Majorana field in the mass basis with extra gauge boson which will be useful for calculation of cross section for annihilation and co-annihilation of dark matter. In section III, using the experimental data on the active and sterile neutrino mass and their mixing, we have obtained the allowed region of the mass difference parameter $\Delta$ of dark matter with the next heavier right-handed Majorana fermion and their mixing angle $\theta$. In section IV, dark matter relic density has been studied, taking into account annihilation as well as co-annihilation of dark matter with next heavier right-handed Majorana fermion going into final states of SM fermion antifermion pair. In section V in finding allowed model parameters, we have considered certain allowed values of $\Delta$ and $\theta$ as obtained in section III from active and sterile neutrino mass and mixing. We have obtained the allowed parameter space for dark matter mass $m_{\psi}$, $X$ boson mass $M_{X}$ based on constraints coming from LHC and relic abundance and also neutrino oscillation mass and mixing constraint corresponding to various $\Delta$ and $\theta$ values. In section VI we have discussed possible modification of $Z-X$ mixing after including higher order correction. In section VII we have concluded about our work. \section{The Model} Here we have considered a model \cite{Adhikari:2015woo} which is an $U(1)$ extension of SM, in which neutrino masses have been studied extensively and the mass of neutrinos has been connected to dark matter which is stabilized by a residual $Z_2$ symmetry of the spontaneously broken $U(1)$ gauge symmetry. The model has only one electro-weak symmetry breaking doublet $\phi^{(+,0)}$ from which tree level masses to quarks are obtained. Charged lepton masses are generated at one loop level with dark matter as mediator. The three active and one sterile neutrino masses as well as mixing between active-sterile neutrinos have been generated through one-loop. The model contains two heavy right handed fermion triplet $\Sigma^{(+,0,-)}_{1R,2R}$ and three neutral singlet fermions $N_R, S_{1R}, S_{2R}$. These have been chosen so as to cancel all anomalies with each other. $U(1)_X$ gauge symmetry is spontaneously broken by singlet scalar $\chi_{1,2}^0$ and residual $Z_2$ symmetry is obtained. The other scalars are added to obtain masses for all fermions. There are two scalar doublets $\eta_{1,2}$ - one couple to $S_{1R}$ and other to two $\Sigma$'s. \begin{table}[htb] \begin{center} \begin{tabular}{| m{3cm} |m{2.5cm} |m{1cm}|} \hline particle & $U(1)_{X}$ & $Z_2$ \\ \hline \hline $(u,d)_L$& $n_{1}$ & + \\ $u_R$ & $\frac{1}{4}(7n_{1}-3n_{4})$ & + \\ $d_R$ & $\frac{1}{4}(n_{1}+3n_{4})$ & + \\ \hline $(\nu,l)_L$ & $n_{4}$ &+ \\ $l_R$ & $\frac{1}{4}(-9n_{1}+5n_{4})$ & + \\ \hline $\Sigma^{(+,0,-)}_{1R,2R}$ & $\frac{3}{8}(3n_{1}+n_{4})$& -- \\ \hline $N_{R}$ & $-\frac{3}{4}(3n_{1}+n_{4})$ & + \\ \hline $S_{1R}$ & $\frac{1}{8}(3n_{1}+n_{4})$ & -- \\ $S_{2R}$ & $\frac{5}{8}(3n_{1}+n_{4})$ & -- \\ \hline \end{tabular} \label{Table1} \end{center} \caption{Fermion fields in the model } \end{table} \begin{table}[htb] \begin{center} \begin{tabular}{| m{3cm} |m{2.5cm} |m{1cm}|} \hline particle & $U(1)_{X}$ & $Z_2$ \\ \hline \hline $\phi^{(+,0)}$ & $\frac{3}{4}(n_{1}-n_{4})$& + \\ \hline $\eta^{(+,0)}_1$ & $\frac{1}{8}(3n_{1}-7n_{4})$& -- \\ $\eta^{(+,0)}_2$ & $\frac{1}{8}(9n_{1}-5n_{4})$ & -- \\ \hline $\chi^0_1$ & $\frac{1}{4}(3n_{1}+n_{4})$ & + \\ $\chi^0_2$ & $\frac{3}{4}(3n_{1}+n_{4})$& + \\ \hline $\chi^0_3$ & $\frac{1}{8}(3n_{1}+n_{4})$& -- \\ $\chi_4^+$ & $\frac{3}{8}(n_{1}-5n_{4})$ & -- \\ $\xi^{(++,+,0)}$ & $\frac{1}{8}(9n_{1}-13n_{4})$ & -- \\ \hline \end{tabular} \label{Table2} \end{center} \caption{Scalar fields in the model.} \end{table} The fermionic and the scalar particles of the model are given in Tables I and II, respectively. Although there are several $U(1)$ charges corresponding to different fields but using the anomaly cancellation equations all of them can be expressed in terms of the other two $U(1)$ charges $n_{1}$ and $n_{4}$, corresponding to quark doublet and lepton doublet respectively. Under $Z_{2}$ symmetry, odd and even fields are specified in the last column of the above tables. The relevant Yukawa Lagrangian part of the model is: \begin{align*} L\supset h_{ij}^{\Sigma}\Sigma_{iR}\Sigma_{jR}\bar{\chi_2^0} + h_{12}^{S}S_{1R}S_{2R}\bar{\chi_2^0} +h_{11}^{S} S_{1R}S_{1R}\bar{\chi_1^0}+h_{23}^{N} N_RS_{2R}\chi_3^0 +h_{ij}^{\eta_{2}}\bar{\Sigma_{jR}^0}\nu_i\eta_2^0 + h_{i1}^{\eta_1}\bar{S_{1R}}\nu_i\eta_1^0 \\ +h_{ij}^{\eta_{2}} l_{iL}\Sigma_{jR}\eta_{2}^{+} + h_{ij}^{\xi} l_{iR}\Sigma_{jR}\xi^+ + h_{i1}^{\eta_1}l_{iL}S_{1R}\eta_1^+ + h_{i2}^{\chi} l_{iR}S_{2R}\chi_4^+ \end{align*} The first six terms are relevant for masses of Majorana fermions (shown in Table 1) and also these terms are relevant for active-sterile mixing of neutrinos at one-loop level as discussed later. Last four Yukawa interactions are relevant for charged lepton mass generation and have not been discussed here. $\chi_{1,2}^0$ which breaks $U(1)_X$ gauge symmetry spontaneously, give masses to $\Sigma^{(+,0,-)}_{1R,2R}$ and $ S_{1R}, S_{2R}$ through interaction as shown in first three terms above and so these scalars have even $Z_2$ parity. Also from these interactions, $U(1)_X$ charge of $\chi_{1,2}^0$ is specified by the corresponding $U(1)_X$ charge of triplet and singlet fermions as shown in the Table. The active neutrinos get masses at one loop level, through interactions shown in fifth and sixth terms in above interactions Lagrangian \cite{Adhikari:2015woo}. From $U(1)_X$ charges of the active neutrinos $\nu_i $ and the $ S_{1R}, S_{2R}$ fermions it follows that the scalar fields in fifth and sixth terms is different from $\chi_{1,2}^0$. They do not have non-zero vacuum expectation value ({\it vev}). So $\eta_{1,2}^0$ is considered an odd under $Z_2$. The SM fields are even under $Z_2$. So from fifth and sixth terms in above interactions, it follows that $\Sigma^{(+,0,-)}_{1R,2R}$ and $ S_{1R}, S_{2R}$ are odd under $Z_2$. Interestingly, this oddness is decided by the $U(1)_X$ charge as discussed. Thus these fermions could play the role of dark matter. From the required interactions for one loop fermion masses for sterile neutrinos $N_R$ and charged leptons, the $Z_2$ parity of other nonstandard model fields are decided \cite{Adhikari:2015woo}. $N_R$ is the singlet neutrino which is massless at tree level. Mixing of $N_R$ with active neutrinos as shown later in Fig. 1 and also the mass of $N_R$ at one loop level are obtained through interactions of $N_R$ with $S_{2R}$ and a scalar field $\chi_3$. Here also scalar field different from $\chi_{1,2}$ is required because of the $U(1)_X$ charges of the fermions in this interaction and $\chi_3$ which does not have non-zero {\it vev} is required to be odd under $Z_2$. Then $N_R$ is required to be even under $Z_2$ and and for that it is suitable for consideration as light sterile neutrino. The neutral scalars, odd under $Z_2$, in their mass basis have components which are in general, not electroweak singlets and as such they are not good dark matter candidate. This is because they will have too large cross section for their direct detection in underground experiments because of their interactions with $Z$ boson. $\Sigma_{1R,2R}^0$ as dark matter has been discussed in \cite{ma1} and they do not play role in active-sterile neutrino mixing. However, $S_{1R,2R}$ could play the role of dark matter and also lead to active and sterile neutrino mixing as mediator at one loop and has been considered as possible dark matter candidate in our work. We discuss in short the generation of mass of extra gauge boson $X$ and its mixing with SM neutral gauge boson $Z$. Let the vevs of various neutral scalars fields be $\langle\phi^0\rangle=v_{1}$ and $\langle\chi_{1,2}^0\rangle=u_{1,2}$, then the mass-squared elements, that determines mass for $Z$ and $X$, are given as, \begin{align} M_{ZZ}^2=&\frac{1}{2}g_{Z}^2\left(v_{1}^2\right)\\ M_{ZX}^2=&M_{XZ}^2=\frac{3}{8}g_{Z}g_{X}\left(n_{1}-n_{4}\right)v_{1}^2\\ M_{XX}^2=&\frac{1}{2}g_{X}^2\left(3n_{1}+n_{4}\right)^{2}\left(u_{1}^2+9u_{2}^2\right)+\frac{9}{8}g_{X}^2\left(n_{1}-n_{4}\right)^2v_{1}^2 \end{align} Although in general, there is $Z-X $ mixing but it is expected to be very small so that electroweak precision measurements could be satisfied. The condition for no $Z-X$ mixing between neutral electroweak gauge boson and the extra $U(1)_{X}$ gauge boson is obtained for $M_{ZX}^2=0$ which gives $n_{1}=n_{4}$. With this zero mixing consideration, the mass of the extra $U(1)_{X}$ gauge boson is \begin{align} M_{XX}^2=\frac{1}{2}g_{X}^2(4n_{1})^2\left(u_{1}^2+9u_{2}^2\right) \label{massxboson} \end{align} Later on, we consider this zero mixing condition in dark matter relic density calculation. Since the dark matter is Majorana in nature, its vector coupling with $X$ boson is zero and it has only non-zero axial-vector coupling with $X$. The vector coupling $g_{fv}$ and axial-vector coupling $g_{fa}$ of the SM fermion fields with an extra gauge boson are given in Table III. These couplings are related to the chiral couplings \cite{Langacker:2008yv} as follows: \begin{equation} g_{f(v,a)}=\frac{1}{2}\left[\epsilon_{L}(f)\pm\epsilon_{R}(f)\right] \label{22} \end{equation} \begin{table}[h!] \centering \begin{tabular}{|| c |c |c||} \hline & $g_{fv}/g_X$ &$ g_{fa}/g_X$ \\ [1.5ex] \hline\hline \textit{l=e},$\mu,\tau$ & $\frac{9}{8}(n_4-n_1)$ & $\frac{1}{8}(n_4-9n_1)$ \\ [1.5ex] \ $\nu_l$ & $\frac{n_4}{2}$& $-\frac{n_4}{2}$\\[1.5ex] \textit{U} & $\frac{1}{8}(11n_1-n_4)$ & $\frac{3}{8}(n_1-n_4)$ \\[1.5ex] \textit{D} & $\frac{1}{8}(5n_1+3n_4)$& $\frac{3}{9}(n_4-n_1)$ \\[1.5ex] \hline\hline \end{tabular} \label{Table3} \caption{Couplings of SM fermions with extra gauge boson X in terms of $U(1)$ charges $n_{1}$ and $n_{4}$. $U$ and $D$ are up and down type quarks respectively} \end{table} \noindent where the chiral couplings $\epsilon_{L,R}(f) $ are $g_{X}$ times $U(1)_{X}$ charges corresponding to left- and right-handed chiral fields as shown in Table III. Let the mass eigenstates of the four Majorana fermions $S_{1R}, S_{2R},\Sigma_{1R}^{0}, \Sigma_{2R}^{0}$ be $\psi_{k}$ with mass $m_{\psi_{k}}$. The interaction basis $\psi_{j}^{'T}=[S_{1R}, S_{2R},\Sigma_{1R}^{0}, \Sigma_{2R}^{0}]$ could be written in terms of this mass basis $\psi_{k}$ as : \begin{equation} \psi_{j}^{'}=\sum_{k}z_{jk}\psi_{k} \end{equation} with $j,k=1,..4$ where $\Sigma_{1R}^{0}$ and $\Sigma_{2R}^{0}$ are $SU(2)_{L}$ triplets and $S_{1R}$ and $S_{2R}$ are singlets. One of the lightest among $\psi_{k}$ say, $\psi_{1}$ is a dark matter candidate in this model, which we assume that it mainly contains $S_{1R}$ and $S_{2R}$. We consider $\psi_2$ as the next to lightest among these four mass eigenstates and the masses $m_{\psi_1}$ and $m_{\psi_2}$ are not far apart. In considering interactions of extra gauge boson X with $S_{1R}$ and $S_{2R}$ in the mass basis of $\psi_{k}$, we are considering for simplicity that $z_{ij}$ mixing matrix elements has non-zero 1-2 block with mixing angle $\theta$ which is decoupled from 3-4 block. Then the interaction can be written as, \begin{eqnarray} \sum_{i,j}\bar{S_{iR}}\gamma_{\mu}(g_{ij}\gamma^{5})S_{jR}X_{\mu}&=&(g_{S_{1R}a}\cos^{2}{\theta}+g_{S_{2R}a}\sin^{2}{\theta})\bar{\psi_{{1}}}\gamma_{\mu}\gamma^{5}\psi_{{1}}X_{\mu}\nonumber\\ &&+(g_{S_{1R}a}\sin^{2}{\theta}+g_{S_{2R}a}\cos^{2}{\theta})\bar{\psi_{{2}}}\gamma_{\mu}\gamma^{5}\psi_{{2}}X_{\mu} \nonumber\\ &&+ \frac{1}{2}\sin{2\theta}(g_{S_{1R}a}-g_{S_{2R}a})\bar{\psi_{{1}}}\gamma_{\mu}\gamma^{5}\psi_{{2}}X_{\mu} \nonumber\\ &&+\frac{1}{2}\sin{2\theta}(g_{S_{1R}a}-g_{S_{2R}a})\bar{\psi_{{2}}}\gamma_{\mu}\gamma^{5}\psi_{{1}}X_{\mu} \label{12} \end{eqnarray} where $i,j=1,2$, $g_{S_{1R}a}=5/8(3n_1+n_4)g_{X}$ and $g_{S_{2R}a}=1/8(3n_1+n_4)g_{X}$. Here $g_X$ is the gauge coupling for extra gauge boson and subscript $a$ denotes that these are axial-vector couplings. The interactions shown in terms of mass basis will be useful in section IV in our calculation of cross section of annihilation and co-annihilation of dark matter. \section{Active and sterile neutrino mass and mixing} There are eight real scalar fields, spanning $\sqrt{2}Re(\eta_{1,2}^{0})$, $ \sqrt{2}Im(\eta_{1,2}^{0})$, $\sqrt{2}Re(\chi_{3}^{0})$, $\sqrt{2}Im(\chi_{3}^{0})$, $\sqrt{2}Re(\xi^{0})$, $\sqrt{2}Im(\xi_{0})$ with mass eigenstate as $\zeta_{l}$ with mass $m_{l}$. These fields are present in one loop diagram giving radiative masses to active and sterile neutrinos. For details about the one loop diagrams giving masses to active and sterile neutrinos, we refer readers to Ref. \cite{Adhikari:2015woo}. However, we have shown the one loop diagram in Fig. \ref{s1s2mixing} gives rise to active and sterile neutrino mixing. Apart from three light active neutrinos, $N_R$ plays the role of fourth neutrino as sterile in this model as mentioned earlier. The masses of active and sterile neutrinos are given as \begin{align} {({\cal M}_\nu)^{(2)}_{ij}} = { h_{i1}^{\eta_{2}} h_{j1}^{\eta_{2}} \over 16 \pi^2} \sum_{k} (z_{3k})^2 m_{\psi_k} \;A_{1} + { h_{i2}^{\eta_{2}} h_{j2}^{\eta_{2}} \over 16 \pi^2} \sum_k (z_{4k})^2 m_{\psi_k}\;A_{2} \label{activea1} \end{align} where $A_{1}=\sum_l [(y^R_{2l})^2 F(x_{lk}) - (y^I_{2l})^2 F(x_{lk})] $ and $A_{2}=\sum_l [(y^R_{2l})^2 F(x_{lk}) - (y^I_{2l})^2 F(x_{lk})]$\\ $\Sigma^0_{1R} = \sum_k z_{3k} \psi_k$, $\Sigma^0_{2R} = \sum_k z_{4k} \psi_k$, $\sqrt{2} Re(\eta_2^0) = \sum_l y^R_{2l} \zeta_l$, $\sqrt{2} Im(\eta_2^0) = \sum_l y^I_{2l} \zeta_l$, with $\sum_k (z_{3k})^2 = \sum_k (z_{4k})^2 = \sum_l (y^R_{2l})^2 = \sum_l (y^I_{2l})^2 = 1$, and $x_{lk} = m_l^2/m_{\psi_k}^2$ and $F(x_{lk})=x_{lk}\ln{x_{lk}}/(x_{lk}-1)$. Equation (\ref{activea1}) is the contribution to the active neutrino masses from $\Sigma_{1R}$ and $\Sigma_{2R}$. Let $\bar{S}_{1R} \nu_i \eta_1^0$ coupling be $ h_{i1}^{\eta_{1}}$, then the contribution to ${\cal M}_\nu$ is given by \begin{equation} ({\cal M}_\nu)_{ij} = { h_{i1}^{\eta_{1}} h_{j1}^{\eta_{1}} \over 16 \pi^2} \sum_k (z_{1k})^2 m_{\psi_k}\;A \label{activemass} \end{equation} where $A=\sum_l [(y^R_{1l})^2 F(x_{lk}) - (y^I_{1l})^2 F(x_{lk})],$ and $S_{1R} = \sum_k z_{1k} \psi_k$, $\sqrt{2} Re(\eta_1^0) = \sum_l y^R_{1l} \zeta_l$, $\sqrt{2} Im(\eta_1^0) = \sum_l y^I_{1l} \zeta_l$, with $\sum_k (z_{1k})^2 = \sum_l (y^R_{1l})^2 = \sum_l (y^I_{1l})^2 = 1$. We have assumed that the first contribution to active neutrino mass shown in Eq. (\ref{activea1}) is somewhat lesser than the second contribution shown in Eq. (\ref{activemass}) which gives masses to heavier neutrinos and the combination gives rise to appropriate mixing among different active neutrinos. We have considered only the mass scale for active neutrinos in our work and will be concerned with only Eq. (\ref{activemass}). Let $S_{2R} N_R \chi_3^0$ coupling be $h_{23}^{N}$, then the mass of sterile neutrino is given as \begin{equation} m_{NN} = { h_{23}^{N} h_{23}^{N} \over 16 \pi^2} \sum_k (z_{2k})^2 m_{\psi_k} \;B \label{sterilemass} \end{equation} where $B=\sum_l [(y^R_{3l})^2 F(x_{lk}) - (y^I_{3l})^2 F(x_{lk})]$ and $S_{2R} = \sum_k z_{2k} \psi_k$, $\sqrt{2} Re(\chi_3^0) = \sum_l y^R_{3l} \zeta_l$, $\sqrt{2} Im(\chi_3^0) = \sum_l y^I_{3l} \zeta_l$, with $\sum_k (z_{2k})^2 = \sum_l (y^R_{3l})^2 = \sum_l (y^I_{3l})^2 = 1$. \\ \begin{figure}[h] \includegraphics[scale=0.5]{active-sterile.pdf} \caption{One-loop active-sterile neutrino mixing \cite{Adhikari:2015woo}.} \label{s1s2mixing} \end{figure} The active-sterile neutrino mixing is possible because of interaction $h_{12}^{S}S_{1R}S_{2R}\bar{\chi_2^0}$ as shown in Fig. 1 and non-diagonal mass matrix elements related to mixing in active sterile neutrino mass matrix is given as \begin{equation} m_{\nu N} = {h_{i1}^{\eta_{1}} (h_{23}^{N}) \over 16 \pi^2} \sum_k z_{1k} z_{2k}\;m_{\psi_k}\;C \label{mixingmass} \end{equation} where $ C=\sum_l [y_{1L}^R y_{3l}^R F(x_{lk}) - y^I_{1l} y^I_{3l} F(x_{lk}]$ and $\sum_k z_{1k} z_{2k} = \sum _l y^R_{1l} y^R_{3l} = \sum_l y^I_{1l} y^I_{3l} = 0$.\\ $A,B$ and $C$ are loop factors corresponding to the one loop diagrams that gives masses and mixing of neutrinos. Based on recent global fit \cite{gfit} of neutrino oscillation experiment with sterile neutrino in 3+1 scheme, the best fit values are: $\Delta m_{41}^2=1.3 \; \mbox{eV}^2, \; |U_{e4}|=0.1$ and $|U_{\mu 4}|\lesssim 10^{-2} $. Also taking into account the cosmological constraint on sum of three active neutrino masses \cite{Vagnozzi:2018jhn,Choudhury:2018byy} we consider active neutrino masses, sterile neutrino mass and active-sterile mixing as \begin{equation} \left({\cal M}_{\nu } \right)_{ij}\sim 0.1\mbox{eV},\;\; \; {\cal M}_{NN} \sim 1.14\mbox{eV},\;\;\;{\cal M}_{\nu N} \sim 0.114 \mbox{eV} \label{bestfitvalue} \end{equation} The product of the mixing matrix element and $m_{\psi_k}$ which are present in Eqs. (\ref{activemass}), (\ref{sterilemass}) and (\ref{mixingmass}) can be rewritten in terms of the mixing angle $\theta$ and the mass gap parameter $\Delta = (m_{\psi_{2}}-m_{\psi_{1}})/m_{\psi_{1}}$ after we consider $z_{11}=\cos\theta$, $z_{12}=-\sin\theta$, $z_{21}=\sin\theta$ and $z_{22}=\cos\theta$. Following these we can write \begin{align} \sum_{k}z_{1k} \; z_{2k}\; m_{\psi_{k}}= \frac{ \Delta\; m_{\psi_{1}}\;\sin2\theta}{2} \nonumber \\ \sum_{k}\left( z_{2k}\right)^{2}\; m_{\psi_{k}}= m_{\psi_{1}}\left(1+ \Delta \;\cos^{2}\theta\right) \nonumber \\ \sum_{k}\left( z_{1k}\right)^{2}\; m_{\psi_{k}}= m_{\psi_{1}}\left(1+ \Delta \;\sin^{2}\theta\right). \label{zangle} \end{align} Using eqs. \eqref{bestfitvalue} and \eqref{zangle} for active neutrino mass scale and the mixing of sterile neutrino $U_{e4}$ we can write equation (\ref{activemass}), (\ref{sterilemass}) and (\ref{mixingmass}) in terms of $\Delta$ and $\theta$ parameters and can be written as \begin{equation} { h_{11}^{\eta_{1}} h_{11}^{\eta_{1}} \over 16 \pi^2}\; m_{\psi_{1}}\left(1+ \Delta \;\sin^{2}\theta\right)\;A \approx 0.1 \label{activemass2} \end{equation} \begin{equation} { h_{23}^{N} h_{23}^{N} \over 16 \pi^2}\; m_{\psi_{1}}\left(1+ \Delta \;\cos^{2}\theta\right)\;B \approx 1.14 \label{sterilemass2} \end{equation} \begin{equation} { h_{11}^{\eta_{1}} h_{23}^N\over 16 \pi^2}\; m_{\psi_{1}}\left(\frac{(\Delta \;\sin{2\theta}}{2}\right)\;C \approx 0.1 \label{mixingmass2} \end{equation} \begin{figure}[h] \centering \includegraphics[scale=0.8]{eqloop.jpg} \caption{Allowed region of $\Delta$ and $\theta$ (in radian) from active-sterile neutrino masses and mixing.} \label{figthetadel2} \end{figure} If we consider $ \sum z^2 m_{\psi_k}$ of equation \eqref{zangle} of the order of 1 TeV and couplings $h \sim 0.1$ then from equations (\ref{activemass2}), (\ref{sterilemass2}) and (\ref{mixingmass2}), it is found that $A$, $B$ and $C$ are in the range of $10^{-8}$ to $10^{-9}$. However, considering the variation of two couplings $ h_{11}^{\eta_{1}}$ and $h_{23}^N$ in the range of 0.05 to 1 and $A$, $B$ and $C$ in the range of $10^{-9}$ to $10^{-6}$ in equations (\ref{activemass2}), (\ref{sterilemass2}) and (\ref{mixingmass2}) we obtain allowed region of $\theta $ and $\Delta$ as shown in the Fig. \ref{figthetadel2}. In Fig. \ref{figthetadel2} we have considered two different conditions among $A$, $B$ and $C$ : 1) $A=B=C$ and 2) $C$ $<$ $A$, $B$. The condition 1) gives the allowed almost semicircle outer line whereas condition 2) gives region inside covered by that almost semicircle line. One may note here that $A$ and $B$ as mentioned just after equation (10) and (11) are very similar in nature with sum over the product of the mixing matrix elements of $y$ are 1 for both A and B, whereas for $C$ as mentioned just after equation (12) due to orthogonality condition the sum over the product of the mixing matrix elements of $y$ vanishes. Due to this difference, $C$ is expected to be lesser than both $A$ and $B$. In that sense we should consider the proper allowed region of $\Delta$ and $\theta$ as that given by the region inside the almost semicircle line in Fig. \ref{figthetadel2} and $\Delta \geq 1$ is found to be preferred. For active and sterile neutrino mixing, one important conclusion follows from both Fig. 1 and \ref{figthetadel2} is that there is necessarily non-zero mixing $\theta$ between $S_{1R}$ and $S_{2R}$ as otherwise there will be zero contribution from Fig. 1. Fig. \ref{figthetadel2} however, shows apart from non-zero mixing, the simultaneous constraint on both $\theta$ and $\Delta$. These imply that apart from annihilation of two dark matter fields ($\psi_1$) into SM fermion and antifermion pair, there is co-annihilation of dark matter field $\psi_1$ with other next heavier Majorana field $\psi_2$ through the interactions mentioned in equation \eqref{12}. \section{Dark Matter ($ \psi_1 $) relic density } Relic density is obtained from the Boltzmann equation \cite{Beltran:2008xg} governing the evolution of number density of the DM with the thermally averaged cross section for the process $\psi_{1}\psi_{1}\rightarrow f\bar{f}$. The Boltzmann equation is written as: \begin{equation} \dot{n_{\psi_1}}+3Hn_{\psi_1}=<\sigma v>((n_{\psi_1}^{eqb})^2-n_{\psi_1}^2) \end{equation} where $n_{\psi_1}$ is the number density and $n_{\psi_1}^{eqb}$ is thermal equilibrium number density of the DM particle. $H$ is Hubble expansion rate of the universe and $\langle\sigma v\rangle$ is the thermally averaged cross section for the process $\psi_{1}\psi_{1}\rightarrow f\bar{f}$ and is given by \cite{Gondolo:1990dk} \begin{equation} <\sigma v>=\frac{1}{8m_{\psi_1}^4T K_2^2(m/T)}\int_{4m_{\psi_1}^2}^{\infty} \sigma(s-4m_{\psi_1}^2) \sqrt{s}K_{1}(\sqrt{s}/T)ds \end{equation} where $K_{1} , K_{2}$ are modified Bessel functions of first and second kind respectively. Here $s$ is the centre of mass energy squared. The thermally averaged cross section can be expanded in powers of relative velocity of two dark matter particle to be scattered and is written as $ <\sigma v> = a +b v^2$. Numerical solution of the above Boltzmann equation gives \cite{Kolb:1990vq} \begin{equation} \Omega_{\psi_1} h^2\approx\frac{1.04\times10^9 x_{f}}{M_{pl}\sqrt{g_{*}}(a+3b/x_{f})} \label{omegaold} \end{equation} where $x_{f}=m_{\psi_1}/T_{f}$ , $T_{f}$ is the freeze-out temperature, $g_{*}$ is the number of relativistic degrees of freedom at the time of freeze out. $x_{f}$ can be find out from \begin{equation} x_{f}=\ln\frac{0.038 \; M_{Pl}\; m_{\psi_1}<\sigma v>}{g_{*}^{1/2}x_{f}^{1/2}}. \label{xfold} \end{equation} We assume $\psi_1$ to be lighter than $\psi_2$ and it plays the role of dark matter. The lighter $\psi_{{1}}$ will be pair annihilated to SM fermions and anti-fermions through the extra gauge boson mediator but not $Z$ boson as we are considering $Z-X$ mixing to be zero. This pair annihilation has been considered above. However, it could also co-annihilate with $\psi_{{2}}$. Both annihilation and co-annihilation cross sections could control the relic abundance of the dark matter $\psi_1$ \cite{Griest,Cannoni:2015wba}. To take into account co-annihilation we discuss the necessary modifications in the Boltzmann equation below. If the mass difference between $\psi_{{1}}$ and $\psi_{{2}}$ is very large, $\psi_{{2}}$ will be out of thermal equilibrium much earlier than $\psi_{{1}}$ and the co-annihilation will not play significant role in the evolution of the number density of $\psi_{{1}}$. However, we consider the case where the mass difference may not to be too large. In that case, we consider the annihilation as well as co-annihilation channel in the coupled Boltzmann equation to find out the evolution of the number density of $\psi_{{1}}$ and hence find the relic density of dark matter. Using the formalism of Ref.\cite{Griest} we can reduce the system of $2$ Boltzmann equations governing number densities $n_1$ and $n_2$ of $\psi_{{1}}$ and $\psi_{{2}}$ respectively into one Boltzmann equation which governs the evolution of $n=n_1+n_2$ in the early universe as given below: \begin{equation} \dot{n}=-3Hn-\sum_{i,j=1}^{2}<\sigma_{ij} v>((n_{i}n_{j}-n_{i}^{eq}n_{j}^{eq}) \end{equation} where $<\sigma_{ij} v>$ is the thermally averaged scattering cross section for the process $\psi_{i}\psi_{j}\rightarrow f \bar{f}$. This equation can be further simplified as \begin{equation} \dot{n}=-3Hn-\sum_{i,j=1}^{2}<\sigma_{eff} v>((n^{2}-(n^{eq})^{2}) \end{equation} where $\sigma_{eff}$ is given as \begin{equation} \sigma_{eff}\approx\sum_{i,j=1}^{2}\sigma_{ij}\frac{g_{i}g_{j}}{g_{eff}^2}(1+\Delta_{i})^{3/2}(1+\Delta_{j})^{3/2}\exp^{-x(\Delta_{i}+\Delta_{j})}. \label{sigeff} \end{equation} Here $x=m_{\psi_1}/T$ and $\Delta_{i}=\frac{m_{\psi_{i}}-m_{\psi_{1}}}{m_{\psi_{1}}}$ . Then $\Delta_1=0$ by definition. Later on, $\Delta_2 $ is written as $\Delta$. $g_{i}$ is the internal degrees of freedom of the interacting particles and $g_{eff}$ is defined as \begin{equation} g_{eff}=\sum_{i=1}^{2}g_{i}(1+\Delta_{i}){3/2}\exp^{-x\Delta_{i}} \end{equation} For comparison with the general WIMP formulas, we have Taylor expanded the thermally averaged cross-sections: \begin{align} <\sigma_{ij} v>=a_{ij}+b_{ij}v^{2} \,\,\, ; \,\,\, <\sigma_{eff} v>=a_{eff}+b_{eff}v^{2} \label{sigma} \end{align} where $a_{eff}$ and $b_{eff}$ are given by \begin{equation} a_{eff}\approx\sum_{i,j=1}^{2}a_{ij}\frac{g_{i}g_{j}}{g_{eff}^2}(1+\Delta_{i})^{3/2}(1+\Delta_{j})^{3/2}\exp^{-x(\Delta_{i}+\Delta_{j})}. \label{aeff} \end{equation} \begin{equation} b_{eff}\approx\sum_{i,j=1}^{2}b_{ij}\frac{g_{i}g_{j}}{g_{eff}^2}(1+\Delta_{i})^{3/2}(1+\Delta_{j})^{3/2}\exp^{-x(\Delta_{i}+\Delta_{j})}. \label{beff} \end{equation} The phase space integration part for all the process of $\psi_{i}\psi_{j}\rightarrow f\bar{f}$ are almost same for cross section calculation and the difference in the cross sections are mainly due to the strength of couplings $g_{ij}$ in which both the indices $i,j$ runs from 1 to 2. Because of this we can write \begin{equation} \frac{\sigma_{11}}{|g_{11}|^{2}}\approx \frac{\sigma_{12}}{|g_{12}|^{2}}\approx \frac{\sigma_{21}}{|g_{21}|^{2}}\approx \frac{\sigma_{22}}{|g_{22}|^{2}} \end{equation} Using this approximation $\sigma_{eff}$ in equation (\ref{sigeff}) can be written in terms of $\sigma_{11}$ as \begin{equation} \sigma_{eff}=\frac{g_{i}g_{j}}{g_{eff}^{2}}\left[1+2 \; r_{12}\frac{g_{12}^{2}}{g_{11}^{2}}+r_{22}\frac{g_{22}^{2}}{g_{11}^{2}} \right]\sigma_{11} \label{sigeff2} \end{equation} Here $r_{12}=(1+\Delta)^{3/2}e^{-x\Delta}\; , r_{22}=(1+\Delta)^{3}e^{-2x\Delta}\;\mbox{and}\;\Delta=(m_{\psi_{2}}-m_{\psi_{1}})/m_{\psi_{1}}$ and $\sigma_{11}$ is annihilation cross section of $\psi_1\psi_1\rightarrow f\bar{f}$ and $<\sigma_{11} v>$ can be Taylor expanded in the form of $a_{11}+b_{11}v^{2}$. For Majorana fermions $g_{i}=g_{j}=2\;\mbox{(internal degrees of freedom)}$ and from equation \eqref{12} the couplings involved in these annihilation and co-annihilation channels are; \begin{align} g_{11}&=g_{S_{1R}a}\cos^2\theta +g_{S_{2R}a}\sin^2\theta\nonumber\\ g_{22}&=g_{S_{2R}a}\cos^2\theta +g_{S_{1R}a}\sin^2\theta\nonumber\\ g_{12}&=g_{21}=\frac{1}{2}\sin2\theta(g_{S_{1R}a}-g_{S_{2R}a}) \label{coupling} \end{align} In presence of co-annihilation of dark matter $\psi_1$ with $\psi_2$ equation \eqref{omegaold} and \eqref{xfold} will be modified as; \begin{equation} \Omega_{\psi_1} h^2\approx\frac{1.04\times10^9 x_{f}}{M_{pl}\sqrt{g_{*}}(a_{11}I_{a}+3b_{11}I_{b}/x_{f})} \label{omegaf} \end{equation} where \begin{equation} I_{a}=\frac{x_{f}}{a_{11}}\int_{x_{f}}^{\infty}x^{-2}a_{eff}dx \quad\text{and}\quad I_{b}=\frac{2x_{f}^{2}}{b_{11}}\int_{x_{f}}^{\infty}x^{-3}b_{eff}dx \end{equation} and $x_f$ can be obtained from \begin{equation} x_{f}=\ln\frac{0.038M_{Pl}m_{\psi_{1}}<\sigma_{eff} v>}{g_{*}^{1/2}x_{f}^{1/2}}. \end{equation} Following \cite{Berlin:2014tja} the annihilation cross section of Majorana fermion to SM $f\bar{f}$ through s-channel mediated by X boson is given as , \begin{align} &\sigma_{11} = \frac{n_{c}}{12 \pi s \left[\left(s-M_{X}^2\right)^2+M_{X}^{2}\Gamma_{X}^{2}\right]}\sum_{f}\sqrt{\frac{1-4m_{f}^{2}/s}{1-4m_{\psi_{1}}^{2}/s}} \bigg[ g_{fa}^{2}g_{11}^{2}\left(4m_{\psi_{1}}^{2}\left[m_{f}^{2}\bigg(7-\frac{6s}{M_{X}^{2}}+\frac{3s^2}{M_{X}^{4}}\right)-s\right] \nonumber \\&+s(s-4m_f^{2})\bigg)+g_{fv}^{2}g_{11}^{2}(s+2m_{f}^{2})(s-4m_{\psi_{1}}^{2}) \bigg] \label{23} \end{align} where $n_{c}= 3$ when $f$ stands for quarks and $n_{c}= 1$ when $f$ stands for leptons and $s\approx 4m_{\psi_1}^{2}+ m_{\psi_1}^{2}v^{2} $. In above equation $\Gamma_{X}=\Gamma_{X_1}+\Gamma_{X_2}$, is the total decay width of extra gauge boson $X$ where $\Gamma_{X_1}$ is the decay width of extra gauge boson $X$ to SM fermion anti-fermion pair and $\Gamma_{X_{2}}$ is the decay width of extra gauge boson decaying to $\psi_{i}\psi_{j}$ Majorana fermions. \begin{eqnarray} &&\Gamma_{X_1}\equiv\sum_{f}\Gamma (X\rightarrow f\bar{f})=\sum_{f}\frac{n_{c}M_{X}}{12\pi S}\sqrt{1-\frac{4m_{f}^2}{M_{X}^2}}\left[g_{fa}^2\left(1-\frac{4m_{f}^2}{M_{X}^2}\right)+g_{fv}^2\left(1-2\frac{m_{f}^2}{M_{X}^2}\right)\right]\nonumber\\ &&\Gamma_{X_2}=\sum_{i,j}\Gamma (X\rightarrow \psi_{i}\bar{\psi_{j}})=\sum_{i,j}\frac{M_{X}g_{ij}^2}{12\pi S}\left[1-\frac{4m_{\psi_i}m_{\psi_j}}{M_{X}^2}\right]^{3/2} \end{eqnarray} where S = 1 (2) for (in)distinguishable final state particles. In the notation of equation \eqref{sigma}, $<\sigma_{11} v> =a_{11}+b_{11}v^2$ , where \begin{eqnarray} && a_{11}=\frac{n_{c} \, g_{fa}^{2} \, m_{f}^{2} \, g_{11}^2 \, m_{\psi_{1}}}{24\pi\left[(M_{X}^{2}-4m_{\psi_{1}}^{2})^{2}+M_{X}^{2}\Gamma_{X}^{2}\right]}\sqrt{1-\frac{m_{f}^{2}}{m_{\psi_{1}}^{2}}}\left(12-96\frac{m_{\psi_{1}}^{2}}{M_{X}^{2}}+192\frac{m_{\psi_{1}}^{4}}{M_{X}^{4}}\right), \nonumber \\ && b_{11}=a_{11}\left[-\frac{1}{4}+\frac{m_{f}^{2}}{8(m_{\psi_{1}}^{2}-m_{f}^{2})}-\frac{M_{X}^4-16M_{X}^2m_{\psi_{1}}^2+48m_{\psi_{1}}^4}{4((M_{X}^2-4m_{\psi_{1}}^2)^2+M_{X}^2\Gamma_{X}^2)}\right. \nonumber\\ &&\left. +\frac{\left(-4+2\frac{g_{fv}^{2}}{g_{fa}^2}+4\frac{m_{\psi_{1}}^2}{m_{f}^2}+4\frac{g_{fv}^{2}m_{\psi_{1}}^2}{g_{fa}^2m_{f}^2}-24\frac{m_{\psi_{1}}^2}{M_{X}^2}+96\frac{m_{\psi_{1}}^4}{M_{X}^4}\right)}{\left(12-96\frac{m_{\psi_{1}}^2}{M_{X}^2}+192\frac{m_{\psi_{1}}^4}{M_{X}^4}\right)}\right]. \end{eqnarray} Mass $M_{X}$ of the extra gauge boson in above expressions is given by equation \eqref{massxboson} and $g_{11}$ corresponds to axial-vector coupling as follows from equations \eqref{coupling} and \eqref{12}. \section{Allowed region of dark matter mass, $X$ boson mass and its gauge coupling} Large Hadron Collider (LHC) operating at $\sqrt{s}=13 \; \mbox{TeV}$, have searched for new phenomena \cite{Aaboud:2017yvp,Aaboud:2017buh,cms} which are resonant as well as non-resonant and in which the final state is dilepton/dijet. This is a robust test for all theories beyond the SM. ATLAS at LHC has obtained allowed region of coupling $g_X$ of quarks and leptons with extra gauge boson mass $M_X$ in Fig. (4) of \cite{Aaboud:2017yvp} and Fig. (5a) of \cite{Aaboud:2017buh} at $95\%$ confidence level. However, these two Fig.s in reference \cite{Aaboud:2017yvp} and \cite{Aaboud:2017buh} do not differ too much. We have considered the allowed region of $g_X$ and $M_X$ in Fig. (5a) of ref \cite{Aaboud:2017buh} in our numerical analysis. $g_X$ coupling in our paper is related to coupling $\gamma^{'}$ of this Fig. as $g_X\approx0.463 \gamma^{'} $. For our numerical analysis $U(1)$ charges are fixed by considering $n_1=n_4= 1/\sqrt{2}$ (normalizing $n_1^2+n_4^2=1$) which satisfies zero mixing condition of extra gauge boson $X$ with SM $Z$ boson. We have considered two values of $\Delta \; \mbox{as} \; 1 \; \mbox{and} \;2$ and also different values of $\theta \; \mbox{as} \; 0.4 \;, \;\pi/4 \; \mbox{and}~ 1.2$ as allowed by Fig. \ref{figthetadel2}. In later part we have used the symbol $m_\psi$ for the dark matter mass $m_{\psi_1}$. In Fig. \ref{noco} we first show the allowed region in $M_X - m_{\psi}$ plane for only annihilation channel ($\psi_{1}\psi_{1} \rightarrow f\bar{f}$) but no co-annihilation of dark matter fermion. As discussed earlier this will not in general correspond to active and sterile neutrino mixing in the model considered \begin{figure}[!h] \begin{center} \begin{tabular}{c c} \includegraphics[width=7.5cm,height=5.5cm]{noconolhc.jpg}& \includegraphics[width=7.5cm,height=5.5cm]{nocolhc.jpg}\\ (a) & (b) \\ \end{tabular} \end{center} \caption{Allowed green region in the $M_{X}$ and $m_{\psi}$ plane for no co-annihilation channel satisfies PLANCK relic density bound $\Omega h^{2}\in(0.1188,0.1212)$. The Fig. (a) and Fig. (b) corresponds to no LHC constraints and LHC constraints on $M_{X}$ and $g_{X}$ respectively.} \label{noco} \end{figure} by us because of no co-annihilation channel. For comparing the allowed region with and without LHC constraint as shown in Fig. \ref{noco} we have considered the variation of $g_{X}$ over the range (0.005-0.7), $m_{\psi}$ up to 2.5 TeV and $M_{X}$ up to 5 TeV, as this is the range considered by LHC. The other two parameters $\theta$ and $\Delta$ are zero as this Fig. is only for annihilation case. In plotting the Fig. \ref{noco}(a) we have considered only the constraint coming from relic abundance on dark matter from PLANCK 2018 $\Omega h^2\in(0.1188,0.1212)$\cite{Aghanim:2018eyx}. But in Fig. \ref{noco}(b) we have also considered the constraint on $g_X$ and $M_X$ given by ATLAS collaboration \cite{Aaboud:2017yvp,Aaboud:2017buh} at LHC. Comparing Fig. \ref{noco} (a) and (b) one can see that LHC constraint significantly reduces the allowed region of dark matter mass for lower values of $M_X < 4000$ GeV and for further lower $M_X$ the allowed range of dark matter mass $m_{\psi}$ is further constrained with respect to no LHC constraint in Fig. \ref{noco}(a). For $M_X$ lesser than about 1600 GeV and $m_\psi$ lesser than about 700 GeV it is difficult to get any allowed region. In Fig. \ref{cofig1} apart from considering constraint coming from relic abundance on dark matter from Planck 2018, we have also considered co-annihilation channel along with annihilation channel for the dark matter as required for satisfying active and sterile neutrino masses and mixing. As discussed in section III the preferred allowed region of $\Delta$ and $\theta$ are shown in Fig. \ref{figthetadel2} inside the almost semicircular line. We consider in Fig. \ref{cofig1} different values of $\Delta$ and $\theta$ based on Fig. \ref{figthetadel2}. But no LHC constraint has been imposed. One can see after including co-annihilation channel for all cases in Fig. \ref{cofig1} there is significant constraint on allowed \begin{figure}[h] \begin{center} \begin{tabular}{c c} \includegraphics[width=7cm,height=4.5cm]{conolhctheta07del1.jpg}& \includegraphics[width=7cm,height=4.5cm]{conolhctheta07del2.jpg}\\ (a) & (b)\\ \includegraphics[width=7cm,height=4.5cm]{conolhctheta04del2.jpg}& \includegraphics[width=7cm,height=4.5cm]{conolhctheta12del2.jpg}\\ (c) & (d) \end{tabular} \end{center} \caption{Allowed green region in the $M_{X}$ and $m_{\psi}$ plane for co-annihilation channels with different choices of $\Delta =2$, $\theta =0.4,~\pi/4$, 1.2 and $\Delta =1$, $\theta =\pi/4$ (in radian). The allowed region satisfies PLANCK relic density bound $\Omega h^{2}\in(0.1188,0.1212)$ .} \label{cofig1} \end{figure} dark matter mass for any $M_X$ value in comparison to Fig. \ref{noco}(a) with no co-annihilation for which $\theta=0$. Significant change has come mainly due to non-zero $\theta$ value considered in Fig. \ref{cofig1} as the coupling $g_{ij}$ of $\psi_i \psi_j X$ as shown in equation \eqref{12} and (31) changes with the change in $\theta$ values. As for example, for $\theta=0$, $g_{12}$ is zero. The 2nd term (related to the process $\chi_1 \chi_2 \rightarrow f \bar{f} $) in $\sigma_{eff}$ in equation \eqref{sigeff2} is zero for $\theta=0$ whereas this is non-zero for non-zero $\theta$ value. $\Delta$ plays the role of more suppression of the effect of this process on $\sigma_{eff}$ for its' higher values. The third term (related to the process $\chi_2 \chi_2 \rightarrow f \bar{f}$) in $\sigma_{eff}$ is more exponentially suppressed than the 2nd term for higher $\Delta$ values. So if $\Delta$ values are increased further than those considered in Fig. 4, there will be further lesser effect from 2nd and 3rd term in $\sigma_{eff}$. For smaller $\Delta$ values much lesser than 1 there would have been more effect from the 2nd and 3rd term in $\sigma_{eff}$ in equation \eqref{sigeff2} due to co-annihilation. One may note however, that active and sterile neutrino mixing constrains both $\Delta$ and $\theta$ simultaneously as shown in Fig. 2 and for $\Delta $ less than about 1, there is no allowed $\theta$ value for co-annihilation to occur. In Fig. \ref{cofig1} (a) and (b) we have chosen $\Delta=2,\; \theta=\pi/4$ and $\Delta=1,\; \theta=\pi/4$ respectively to see how much the allowed region in $M_X - m_{\psi}$ plane changes due to this variation of $\Delta$ for same $\theta $ value. In fact, one can see that the change is insignificant as both the Fig.s are almost same. However, it is also expected that there will be change in $\sigma_{eff}$ to some extent for variations in $m_{\psi_1}$ values also as follows from \eqref{sigeff2} but this is subject to details of the Boltzman equations and the corresponding freeze-out temperature $T$ . In Fig. \ref{cofig1} (c) and (d) we have changed $\theta$ values to $0.4$ and $1.2$ respectively with $\Delta$ fixed at 2. Comparing Fig. \ref{cofig1} (b), (c) and (d), it is found that the allowed region changes significantly with such variations of $\theta $ value. \begin{figure}[h!] \centering \begin{tabular}{c c} \includegraphics[width=7cm,height=5cm]{colhctheta07del1.jpg}& \includegraphics[width=7cm,height=5cm]{colhctheta07del2.jpg}\\ (a) & (b)\\ \includegraphics[width=7cm,height=5cm]{colhctheta04del2.jpg}& \includegraphics[width=7cm,height=5cm]{colhctheta12del2.jpg}\\ (c) & (d)\\ \end{tabular} \caption{Allowed green region in the $M_{X}$ and $m_{\psi}$ plane for co-annihilation channels with different choices of $\Delta= 2,$ $\theta = 0.4,~\pi/4,$ 1.2 and $\Delta= 1$, $\theta = \pi/4$ (in radian). The allowed region satisfies LHC bound and PLANCK relic density bound $\Omega h^{2}\in(0.1188,~0.1212)$ .} \label{cofig2} \end{figure} For freeze-out temperature $T \sim m_{\psi}$ one can see from equation \eqref{sigeff2} and \eqref{coupling} and \eqref{12} that $\sigma_{eff}$ increase with increase in $\theta$ values and the constraint on relic density in equation \eqref{omegaf} reduces the allowed parameter space of dark matter mass for any $M_X$ value further with increase in $\theta$ values. In Fig. \ref{cofig1} (c) the chosen $\theta$ value is relatively smaller and the allowed region of $M_X$ and $m_\psi$ is more than those in (b) and (d). Fig. \ref{cofig2} is like previous Fig. \ref{cofig1} but with LHC constraint on $M_X$ and $g_X$ imposed. Because of that, the allowed region for lower $M_X$ is very much reduced while for higher $M_X$ above 4000 GeV there is more allowed region. This feature is similar to Fig. \ref{noco} (b). Like Fig. \ref{cofig1} (a) and (b), the allowed region is almost same in Fig. \ref{cofig2} (a) and (b). This shows that for $\Delta \geq 1$ with same value of $\theta$ there is insignificant change in the allowed region for the same reason as discussed in the context of previous figure. With the variation of $\theta$ again the similar feature appears like previous figure - namely for higher $\theta $ value there is lesser allowed region. In Fig. \ref{cofig2} (c) the chosen $\theta$ value is relatively smaller and the allowed region of $M_X$ and $m_{\psi}$ is more than those in (b) and (d). Due to LHC constraint in Fig. \ref{cofig2}, for different cases there are different lower bounds on $M_X$ and $m_{\psi}$ depending on different set of values of $\Delta$ and $\theta$. This feature is similar to Fig. \ref{noco} (b). For higher $\theta$ value the lower bound values for both these parameters increases to some extent with lesser allowed region. As for example, in Fig. \ref{cofig2} (d) the lower bound on $M_X$ and $m_{\psi}$ is at about 2000 GeV and 900 GeV respectively which is relatively higher than those in Fig. \ref{cofig2} (c). \begin{table}[h!] \centering \begin{tabular}{| >{\centering\arraybackslash}m{0.5in} | >{\centering\arraybackslash}m{0.5in} | >{\centering\arraybackslash}m{0.5in} | >{\centering\arraybackslash}m{0.7in} | >{\centering\arraybackslash}m{0.7in} | >{\centering\arraybackslash}m{1.2in} | >{\centering\arraybackslash}m{1in} |} \hline $\Delta $ &$ \theta$ & $g_{X}$ & $M_{X}$(GeV)& $m_{\psi}$(GeV)& $\sqrt{u_{1}^{2}+9u_{2}^{2}}$(TeV) & $ u_{1}=u_{2}$(TeV)\\ \hline {2} & 0.4 & 0.021 & 1702& 850&40.523& 12.814 \\ & $\pi/4$ & 0.035 & 1910 & 960 &27.285&8.628 \\ & 1.2 & 0.025 & 1970 & 990 &39.40&12.45 \\ \hline {1} & $\pi/4$ & 0.035 & 1910 & 960 &27.285&8.628 \\ \hline \hline \multicolumn{2}{|c|}{No Co-annihilation}& 0.015 & 1645 & 825 &54.833 &17.33 \\ \hline \end{tabular} \caption{Lower values of $M_{X}$ and $m_{\psi}$ and corresponding $g_{X}$ and $vev$s.} \label{lasttable} \end{table} Based on Fig. \ref{noco} (b) and Fig. \ref{cofig2} we have shown the lower values of $M_X$ and $m_{\psi}$ in the Table \ref{lasttable}. The $g_X$ value as mentioned in the table has been taken from the data file corresponding to the lower values of $M_X$ and $m_\psi$ related to these Fig.s. The {\it vev} of $\chi_1$ and $\chi_2$ fields have been evaluated using the tree level relationship of the model as given in Eq. \ref{massxboson} to get an understanding of the possible scale of extra $U(1)$ spontaneous symmetry breaking. For co-annihilation channel the {\it vev} of $\chi_1$ and $\chi_2$ field (assuming them to be equal) are around 10 TeV whereas for no co-annihilation channel it is around 17 TeV. \section{Higher order effect on $Z-X$ mixing} Now we address the question of $Z-X$ mixing due to higher order corrections coming from one-loop Feynman diagrams as shown in fig \ref{zxloop}. The contribution from the fermions in the loop is proportional to axial-vector coupling only and as such for our choices of $n_1 = n_4$ (corresponding to tree-level zero $Z-X$ mixing) the axial-vector coupling vanishes for quarks as shown in table III giving zero contribution to $M_{ZX}^2$ due to quarks in the loop. The dark fermion is not possible in the loop diagram as there is no coupling of $Z$ with dark fermion due to zero $Z-X$ mixing considered at the tree level. One loop correction to $M_{ZX}^2$ will have main contribution coming from $\tau$ lepton in the loop because of non-zero axial coupling for our choice of $n_1 = n_4$. The general expression for one loop correction to $M_{ZX}^2$ can be written as \begin{eqnarray} \delta M_{ZX}^2\approx -\frac{1}{4\pi^2}\sum_{f}\;c_{A}\; g_{Z}\;g_{f_a}\;{m_{f}}^2 \left(-\frac{1}{\epsilon} + \gamma_{e}-\log(4 \pi)+\log\frac{{m_f}^2}{\mu^2}\right) \end{eqnarray} \begin{figure}[htb] \includegraphics[scale=0.8]{loop.pdf} \caption{One-loop Feynman diagram contributing to $Z-X$ mixing} \label{zxloop} \end{figure} Here $g_Z$ is the SM neutral coupling constant and $c_{A}$ is the coefficient depending on the particular SM fermion coupling with $Z$ boson, and $g_{f_a}$ is the axial-vector coupling of SM fermions with $X$ boson as given in table III. For completeness we give the result for one loop correction to $M_{XX}^2$. As we do not know its tree level value from the model this correction will not be used in our numerical computation of mixing. Main contribution to it will be coming from dark fermion $\psi_1$ and $\psi_2$ and also from top quark as fermion in the loop and the one loop correction to $ M_{XX}^2$ due to dark matters are given by \begin{eqnarray} \delta M_{XX}^2(\psi_1)\approx-\frac{M_{XX}^2}{12\pi^2}\left(\frac{g_{11}^2}{4}-\frac{3 {m_{\psi_1}}^2}{8 M_{XX}^2}\right)\left(\frac{1}{\epsilon} - \gamma_{e}+\log(4 \pi)-\log\frac{{m_{\psi_1}}^2}{\mu^2}\right) \label{loopX1} \end{eqnarray} Contribution to $\delta M_{XX}^2$ due to $\psi_2$ in the fermionic loop will have similar expression like above with the replacement of $g_{11}$ by $g_{22}$ and $m_{\psi_1}$ by $m_{\psi_2}$. One loop correction to $ M_{XX}^2$ due to top quark and other fermions are given by \begin{eqnarray} \delta M_{XX}^2({\footnotesize SM fermion})&\approx & -\frac{N_c\;M_{XX}^2}{12\pi^2}\sum_{f}\left(\frac{(g_{f_v}^2+g_{f_a}^2)}{4}-\frac{3 {m_{f}}^2}{8 M_{XX}^2}\right)\nonumber \\ && \times \left(\frac{1}{\epsilon} - \gamma_{e}+\log(4 \pi)-\log\frac{{m_f}^2}{\mu^2}\right) \label{loopXf} \end{eqnarray} in which $g_{f_v}$ and $g_{f_a}$ are given explicitly in terms of $n_1, n_4$ and $g_{X}$ in table III and $N_c=3$ for quarks and $N_C=1$ for leptons as well as for dark fermions. We have followed $\overline{MS}$ scheme for numerical evaluation of $Z-X$ mixing. The corresponding mixing angle $\theta_{ZX}$ is given by \begin{eqnarray} \tan{2\theta_{ZX}}=\frac{2\left(M_{ZX}+\delta M_{ZX}\right)}{M_{XX}-M_{ZZ}} \end{eqnarray} In $M_{ZX}$ the one loop correction is included for numerical evaluation. As an example to find a possible value of mixing we have considered $g_{X}=0.035,~ M_{XX}=1910~\mbox{GeV}, ~m_{\psi}=960~\mbox{GeV}$ as one set of values from Table \ref{lasttable} for lowest possible values of $M_X$ and $m_{\psi}$ for which mixing could be little bit larger and have used $M_{ZZ}$ as the experimentally measured value of $Z$ boson as $91.18~\mbox{(GeV)}$. For such choices we find $\theta_{ZX} = 6\times10^{-5}$, which is quite a small number and much lesser than the possible experimental bound \cite{mix} of about $10^{-2}$ and one may consider this mixing to be almost zero with $n_1=n_4$ even after higher order correction. \section{Conclusion} Apart from Planck data constraint on relic abundance and LHC constraint on an extra $U(1)$ gauge boson mass and its gauge coupling, we have taken into account the possible constraints coming from active, sterile neutrino masses and their mixing from different oscillation experiments to find the allowed region in $M_X$ and $m_\psi$ plane. In the extra $U(1)$ gauge model considered by us, the oscillations constraints - particularly active-sterile mixing have led to the requirement of non-zero mixing $\theta$ between dark matter $\psi_1$ with the other heavy right handed Majorana fermion $\psi_2$. This has led to the consideration of co-annihilation channel for the dark matter. Also the oscillation data constrains the allowed region of $\theta$ and $\Delta$ as shown in Fig. \ref{figthetadel2}. The allowed region in $M_X$ and $m_{\psi}$ plane is found to be reduced for co-annihilation channel with respect to no co-annihilation channel. Particularly the allowed region with co-annihilation channel is sensitive to $\theta$ value as shown in section V and for higher $\theta$ values with same $\Delta$ value there is lesser allowed region in the $M_X$ and $m_\psi$ plane. The other important thing is that particularly with LHC constraint, in general there is some kind of lower bound on both $M_X$ and $m_{\psi}$ as shown in Fig. \ref{noco} (b) and Fig. \ref{cofig2} in section V. Using the corresponding $g_X$ value from table \ref{lasttable} as followed from our numerical analysis for such lower values of $M_X$ and $m_{\psi}$ and using the tree level relationship of the model as given in Eq. \ref{massxboson} which connects $vev$s of $\chi_1$ and $\chi_2$ with mass of extra gauge boson $M_X$, we get an understanding of the possible scale of extra $U(1)$ spontaneous symmetry breaking as shown in Table \ref{lasttable}. However, for higher values of $M_X$ such specific conclusion is difficult to obtain because of multiple possible values of $M_X$, $m_{\psi}$ and $g_X$ in the allowed region. The numerical analysis has been done considering zero $Z-X$ mixing at the tree level with $n_1=n_4$ which alter insignificantly even after including higher order corrections and satisfies various phenomenological low energy constraints. With the improvement on the constraint on extra $U(1)$ gauge boson mass and its gauge coupling from LHC experiments, the allowed region in $M_X$ and $m_\psi$ plane could be further reduced and the lower bounds on $M_X$ and $m_\psi$ could be further higher. {\bf ACKNOWLEDGMENTS} I. A. B would like to thank Department of Science and Technology (DST), Govt. of India for financial support through Inspire Fellowship (DST/INSPIRE Fellowship/2014/IF140038). The authors would like to thank Sushant G. Ghosh for providing HPC facilities and Puneet Sharma for helpful computational understandings. \newpage
\section{Introduction} The Fredrickson-Andersen $k$-spin facilitated model (FA$k$f) was introduced in physics \cite{FA} in order to study the liquid-glass transition, and it is a part of a family of interacting particle systems called Kinetically Constrained Models (KCM). One may also see them as the stochastic counterpart of a well known family of cellular automata called Bootstrap Percolation (BP); and the Fredrickson-Andersen $k$-spin facilitated model is the KCM corresponding to the $k$-neighbors bootstrap percolation. Both bootstrap percolation and the kinetically constrained models have been studied extensively in homogeneous environment, and in particular on the lattice $\mathbb{Z}^d$ (see, e.g., \cite{vanEnter87, AL, CerfManzo, Holroyd, BBDCM_SharpThresholdZd, BDCMS_universality2d, CMRT_kcmzoo, MT_towards_universality,MMT_universality2d}). Some results are known for the bootstrap percolation in random environments (e.g., \cite{JLTV_BPonER, BP_BPonRandomRegular, Janson_RandomRegular, BGCSP_BPonGW, Shapira_BPonGW, GravnerMcDonald_polluted, GravnerHolroyd_polluted}). However, kinetically constrained models in random environments have only been considered very recently in the mathematical literature \cite{Shapira_RandomConstraint}. We will focus on the $2$-neighbors model on the polluted lattice, introduced in \cite{GravnerMcDonald_polluted} for $\mathbb{Z}^{2}$ and recently analyzed on $\mathbb{Z}^{3}$ \cite{GravnerHolroyd_polluted,GravnerHolroydSivakoff_polluted3d}. We study the divergence of time scales in this model for the stationary settings. \section{Model, notation and main result} We consider the random environment giving each $x\in\mathbb{Z}^{d}$ a quenched variable \[\omega_{x}\in\left\{ \text{susceptible, immune}\right\}. \] These variables are chosen in the beginning according to a measure $\nu$, which is the product of $i.i.d.$ Bernoulli random variables where $\nu(\omega_x = \text{immune}) = \pi$ and $\nu(\omega_x = \text{susceptible}) = 1-\pi$ for some fixed $\pi\in\left(0,1\right)$. Once the environment is fixed, the stochastic dynamics will take place on the subset of susceptible sites, $\mathcal{S}\subset \mathbb{Z}^d$. Susceptible sites with have one of two states: infected or healthy. The stochastic dynamics is defined over configurations $\Omega=\{i,h\}^\mathcal{S},$ where $i$ corresponds to an infected site, and $h$ corresponds to a healthy site. We will denote such configurations by $\eta\in\Omega.$ We may wish to specify the state after changing the configuration on a set of sites $X$. For $a \in \{i,h\}$, and $\eta\in \Omega$, let $\eta^{X\leftarrow a}$ denote the configuration which agrees with $\eta$ on all sites in $\mathcal{S} \setminus X$ and equals $a$ on every site in $X$. For brevity, when $X$ is a single site $x$ we let $\eta^{x\leftarrow a} = \eta ^{X\leftarrow a}.$ We let $\eta^x$ denote the configuration that agrees with $\eta$ on $\mathcal{S}\setminus \{x\}$ and differs from $\eta$ at $x$. For a function $f:\Omega\rightarrow\mathbb{R}$, $\nabla_{x}f(\eta)=f\left(\eta^{x}\right)-f\left(\eta\right)$. The FA dynamics will be chosen to be reversible with respect to a product measure $\mu$, giving each site probability $q$ to be infected and $1-q$ to be healthy for a small parameter $q\in (0,1)$. We will often take the expectation of function with respect to a single site $x$, which we dente by \[ \mu_{x}(f)=qf\left(\eta^{x\leftarrow{i}}\right)+\left(1-q\right)f\left(\eta^{x\leftarrow{h}}\right). \] In order to define the FA dynamics we need to define the constraints for $x\in \mathcal{S}$: \begin{equation} c_{x}(\eta)=\begin{cases} 1 & x\text{ has at least }2\text{ susceptible infected neighbors}\\ 0 & \text{otherwise} \end{cases}.\label{eq:constraints} \end{equation} The dynamics will then follow the following rules \textendash{} each site rings at rate $1$. If the constraint is satisfied (i.e. $c_{x}=1$) we toss a coin (independently of everything) that gives $i$ with probability $q$ and $h$ with probability $1-q$. Then set the state of $x$ to the result of the coin toss. This could be equivalently described \cite{Liggett} by the generator of the Markov semi-group defined by \[ \mathcal{L}f(\eta)=\sum_{x\in\mathcal{S}}c_{x}(\eta)\mu_{x}f, \] where $f:\Omega\rightarrow\mathbb{R}$ is a local function, i.e. depends on the state of finitely many sites. The Dirichlet form corresponding to $\mathcal{L}$ is \[ \mathcal{D} f = -\mu(f \mathcal{L} f) = -\int f(\eta) \mathcal{L} f(\eta) d\mu(\eta) = q(1-q)\int \sum_{x\in \mathcal{S}} c_x(\eta) (\nabla_x f(\eta)) ^2 d\mu(\eta). \] Probabilities and expected values with respect to this process starting at some initial state $\eta$ will be denoted by $\mathbb{P}_{\eta}$ and $\mathbb{E}_{\eta}$, and when starting from equilibrium by $\mathbb{P}_{\mu}$ and $\mathbb{E}_{\mu}$. Though not mentioned explicitly in the notation, these measures depend on the quenched variables, $\omega$, which describe the disorder. Bootstrap percolation is deterministic in discrete time. At each step $t$, sites that satisfy the constraint ($c_{x}(\eta_t)=1$) get infected, and remain so forever. Sites that would never be infected under the bootstrap percolation dynamics will never change their state under the corresponding KCM dynamics with the same starting configuration. \begin{rem} The terminology and notation used by the KCM community is not the same as that of the BP community, e.g., ``occupied'' and ``empty'' have an inverse meaning, as well as the labels 0 and 1. Here we chose to use the more neutral terminology ``infected'' and ``healthy'', hoping it will be equally confusing for readers of all backgrounds. \end{rem} As $q\rightarrow 0$, more and more sites are healthy, the constraint is more difficult to satisfy, and the dynamics slows down. In order to quantify this slowing down we should study typical time scales of the system. One option is studying the spectral gap of the generator (e.g. \cite{CMRT_kcmzoo}), which gives a lot of information on many time scales of the system, and in particular the loss of correlation. In disordered systems, however, the spectral gap tends to focus on ``bad'' parts of the environment, giving an overly pessimistic estimation which does not describe actual time scales of the system \cite{Shapira_RandomConstraint}. One is then tempted to try to hide these bad regions, e.g., by removing them from the graph and replace them with entirely healthy boundary conditions. This choice should give, in a sense, a dynamics which is the slowest possible (as more sites will not satisfy the constraints in this setting); and for the other bound we may take entirely infected boundary conditions (possibly increasing the number of sites which satisfy the constraints). Unfortunately, KCMs are not attractive, and a monotone coupling of the dynamics with hidden parts and the original one is not possible. In fact, the only information we can gain from such a coupling is the finite speed of propagation of information \textendash{} if we are interested in the process until time $t$, we may change the environment at distances greater than $100t$ without effecting the dynamics near the origin (see, e.g., \cite[section 3.3]{Martinelli_SaintFlourNotes}). In the analysis of the FA$1$f model on polluted $\mathbb{Z}^{2}$ this coupling indeed allows us to hide bad areas \cite[section 3.6]{Shapira_thesis}. However, for the FA$2$f model this is impossible \textendash{} at distances of the time scales we are considering, the system is not ergodic, even for entirely infected boundary conditions. For example, in the case of $\mathbb{Z}^{2}$, at distance of order $\pi^{-4}$ from the origin we will find four corners of a rectangle that are all immune. If in the initial configuration all sites in this rectangle are healthy, none could ever be infected, and we cannot hope for correlations to be lost. We will see in \thmref{z2} that the typical time scale for the evolution of the system is much longer than $\pi^{-4}$, so we will not be able to use an argument based on the finite speed of propagation. The way we approach this problem is by studying the infection time of the origin. Unlike the spectral gap, this is a concrete observable, so it will be affected by far away regions only to the extent that the observed dynamics depends on them in practice. Moreover, the reversibility of the process gives tools that allows us to study the Poisson problem related to this time. We therefore define the main quantity of this paper \[ \tau_{0}=\inf\left\{ t\,|\,\eta_{0}(t)=i\right\} . \] In the two dimensional case, \cite{GravnerMcDonald_polluted} show that when $q$ is small and $\pi<cq^{2}$ the probability that the origin is eventually infected is big, but when $\pi>Cq^{2}$ it is small. We will thus concentrate on the case $\pi<cq^{2}$, taking some margins that will simplify the analysis. \begin{thm} \label{thm:z2}Consider the FA2f model on $\mathbb{Z}^{2}$ with $\pi<q^{2+\varepsilon}$. Then for all $\varepsilon>0$, with $\nu$-probability at least $1-5q^{\varepsilon/6}$, $\omega$ is such that \begin{equation*} \mathbb{P}_{\mu}\left(\tau_{0}>e^{-q^{-1-\varepsilon}}\right) \le 3q^{\varepsilon/12}. \end{equation*} Moreover, in the other direction, uniformly in $\omega$, there exitst $C$ such that \begin{equation*} \mathbb{P}_{\mu}\left(\tau_{0}<e^{-Cq^{-1}}\right) \xrightarrow{q\rightarrow0} 0 \end{equation*} \end{thm} For polluted environments in $\mathbb{Z}^3$, it is shown in \cite{GravnerHolroyd_polluted} that for $\pi$ small enough (but not going to $0$ with $q$) the BP infects the origin with high probability even when $q$ tends to $0$. \begin{thm}\label{thm:z3} Consider the FA2f model on polluted $\mathbb{Z}^{3}$. For all $\varepsilon>0$, with $\nu$-probability that tends to $1$ as $\pi\rightarrow 0$ uniformly in $q$, $\omega$ is such that \begin{align*} \mathbb{P}_{\mu}\left(\tau_{0}>e^{-q^{-1-\varepsilon}}\right) &= o(1) \end{align*} In the other direction, uniformly in $\omega$, there exitst $C$ such that \[ \mathbb{P}_{\mu}\left(\tau_{0}<e^{-Cq^{-1/2}}\right)\xrightarrow{q\rightarrow0}0 \] \end{thm} \begin{rem} The exponents in the upper and lower bounds of the theorem above do not match. The reason is that the proof of upper bound uses an infection mechanism that takes place in a two dimensional surface, and indeed the power $q^{-1}$ fits the scaling of the two dimensional FA model. We conjecture, however, that in the true dynamics infection would be able to propagate in three directions, giving $q^{-1/2}$ as in the lower bound (perhaps up to logarithmic corrections). \end{rem} \begin{rem} We mention for comparison the scaling of $\tau_{0}$ in the homogeneous (non-polluted) model. In $\mathbb{Z}^{2}$ it scales (up to log corrections) as $e^{1/q}$, and in $\mathbb{Z}^{3}$ as $e^{1/\sqrt{q}}$. \end{rem} \section{Preparation} In order to prove the upper bounds we fix some high probability event $E$, and show that the process cannot spend a lot of time in $E$ before hitting $\left\{ \eta_{0}=0\right\} $. Since $E$ has high probability, the process spends a lot of time in $E$ and therefore $\tau_0$ cannot be too big. This entire section will assume the pollution, $\omega$, to be fixed. Fix an event $E\subseteq\Omega$ and $t>0$. We will define the time spent in $E$ by time $t$ as \begin{equation} T_{t}^{E}=\int_{0}^{t}\mathds{1}_{E}\left(\eta\left(s\right)\right)\text{d}s.\label{eq:timespentinE} \end{equation} With some abuse of notation we will also considered its averaged version \begin{equation} T_{t}^{E}\left(\eta\right)=\mathbb{E}_{\eta}\left[T_{t}^{E}\right]\label{eq:timespent_averaged} \end{equation} where we recall that $\mathbb{E}_\eta[\cdot]$ is the expectation over the stochastic process starting from the configuration $\eta$. For some event $A\subseteq \Omega$, $\tau_A$ denote the hitting time for this event. \begin{defn} \label{def:timeinEbeforeA}Let $E,A\subseteq\Omega$ be two events. The time spent in $E$ before hitting $A$ is \[ T_{A}^{E}=T_{\tau_{A}}^{E}. \] \end{defn} Also for $T_{A}^{E}$ we define \begin{equation} T_{A}^{E}\left(\eta\right)=\mathbb{E}_{\eta}\left[T_{A}^{E}\right].\label{eq:timeinEbeforeA_averaged} \end{equation} Recall that $\mathcal{L}$ is the generator of the Markov process. The function, $T_A^E$, solves the Poisson problem (see, e.g., \cite[equation (7.2.45)]{BovierDenHollander}) \begin{equation} \begin{array}{cccc} \mathcal{L}T_{A}^{E}\left(\eta\right) & = & -\mathds{1}_{E}\left(\eta\right) & \quad\eta\notin A,\\ T_{A}^{E}\left(\eta\right) & = & 0 & \quad\eta\in A. \end{array}\label{eq:poissonproblem_EbeforeA} \end{equation} Multiplying both sides by $T_{A}^{E}$ and integrating with respect to $\mu$ gives \begin{cor} \label{cor:dirichletequalsexpectation_EbeforeA}$\mu\left(T_{A}^{E}\mathds{1}_{E}\right)=\mathcal{D}\left(T_{A}^{E}\right).$ \end{cor} We will use this formula in order to bound $\mu\left(T_{A}^{E}\mathds{1}_{E}\right)$. \begin{lem} \label{lem:path_to_time}Fix $E,A\subseteq\Omega$, $N,D,V\in\mathbb{N}$. Assume that for every $\eta\in E$ there exists a sequence $\eta_{0},\dots,\eta_{N}$ of configurations and a sequence of sites $x_{0},\dots x_{N-1}$ such that \begin{enumerate} \item $\eta_{0}=\eta$, \item $\eta_{N}\in A$, \item $\eta_{i+1}=\eta_{i}^{x_{i}}$ or $\eta_{i+1}=\eta_{i}$, \item $c_{x_{i}}(\eta_{i})=1$, \item for all $i\le N$, $\eta_{i}$ differs from $\eta$ on a set $X$ whose size is at most $D$, and $X$ is contained in a set $Y(x_i)$, depending only on $x_i$, whose size is at most $V$. \end{enumerate} Then $\mu\left(T_{A}^{E}\mathds{1}_{E}\right)\le N^{2}\binom{V}{D}2^{D}q^{-D-1}$. \end{lem} \begin{proof} Consider $\eta\in E$. By (2), $T_{A}^{E}\left(\eta_{N}\right)=0$, thus, denoting $\nabla_{i}T_{A}^{E}=T_{A}^{E}\left(\eta_{i+1}\right)-T_{A}^{E}\left(\eta_{i}\right)$ \[ T_{A}^{E}\left(\eta\right)=\sum_{i=0}^{N-1}c_{x_{i}}\left(\eta_{i}\right)\nabla_{i}T_{A}^{E}. \] Note that $\nabla_{i}T_{A}^{E}$ is either $\nabla_{x_{i}}T_{A}^{E}\left(\eta_{i}\right)$ or $0$ (since we allow empty moves). We can then write \begin{align*} \mu\left(T_{A}^{E}\mathds{1}_{E}\right)^{2} & \le\mu\left(\left(T_{A}^{E}\mathds{1}_{E}\right)^{2}\right)=\sum_{\eta\in E}\mu\left(\eta\right)\left(\sum_{i=0}^{N-1}c_{x_{i}}\left(\eta_{i}\right)\nabla_{i}T_{A}^{E}\right)^{2}\\ & \le\sum_{\eta\in E}\mu\left(\eta\right)\,N\sum_{i=0}^{N-1}c_{x_{i}}\left(\eta_{i}\right)\,\left(\nabla_{i}T_{A}^{E}\right)^{2}\\ & \le\sum_{\eta\in E}\sum_{i=0}^{N-1}\sum_{\eta^{\prime}}\sum_{x}\,\mathds{1}_{\eta^{\prime}=\eta_{i}}\mathds{1}_{x=x_{i}}\frac{\mu\left(\eta\right)}{\mu\left(\eta^{\prime}\right)}\mu\left(\eta^{\prime}\right)\,Nc_{x}\left(\eta^{\prime}\right)\,\left(\nabla_{x}T_{A}^{E}\left(\eta^{\prime}\right)\right)^{2}\\ & \le Nq^{-D}\sum_{\eta^{\prime}}\sum_{x}\sum_{\eta\in E}\sum_{i=0}^{N-1}\,\mathds{1}_{\eta^{\prime}=\eta_{i}}\mathds{1}_{x=x_{i}}\mu\left(\eta^{\prime}\right)\,c_{x}\left(\eta^{\prime}\right)\,\left(\nabla_{x}T_{A}^{E}\left(\eta^{\prime}\right)\right)^{2}\\ & \le N^{2}\binom{V}{D}2^{D}q^{-D}\sum_{\eta^{\prime}}\sum_{x}\mu\left(\eta^{\prime}\right)\,c_{x}\left(\eta^{\prime}\right)\,\left(\nabla_{x}T_{A}^{E}\left(\eta^{\prime}\right)\right)^{2}\\ & \le N^{2}\binom{V}{D}2^{D}q^{-D-1}\mathcal{D}T_{A}^{E}=N^{2}\binom{V}{D}2^{D}q^{-D-1}\mu\left(T_{A}^{E}\mathds{1}_{E}\right), \end{align*} where the last equality is due to \corref{dirichletequalsexpectation_EbeforeA}. \end{proof} \begin{prop}\label{prop:yoyoma} Under the hypotheses of \lemref{path_to_time} \[ \mathbb{P}_{\mu}\left(\tau_{A}>N^{2}\binom{V}{D}2^{D}q^{-D-2}\right)\le2q+\delta+\sqrt{\delta}, \] where $\delta=1-\mu\left(E\right)$. \end{prop} \begin{proof} Let $t=\left(1-\sqrt{\delta}\right)N^{2}\binom{V}{D}2^{D}q^{-D-2}$. By \lemref{path_to_time} and the Markov inequality \[ \mathbb{P}_{\mu}\left(T_{A}^{E}\mathds{1}_{E}\left(\eta\left(0\right)\right)\ge t\right)\le2q. \] Since $\mu\left(E\right)=1-\delta$, \begin{align*} \mathbb{P}_{\mu}\left(T_{A}^{E}\ge t\right) & =\mathbb{P}_{\mu}\left(T_{A}^{E}\ge t\text{ and }\eta\left(0\right)\in E\right)+\mathbb{P}_{\mu}\left(T_{A}^{E}\ge t\text{ and }\eta\left(0\right)\notin E\right)\\ & \le2q+\delta. \end{align*} On the other hand, for all $s>0$ \[ \mathbb{E}_{\mu}\left(T_{s}^{E}\right)=s\mu\left(E\right)=\left(1-\delta\right)s, \] and since $T_{s}^{E}\le s$ we can again apply Markov's inequality (for the positive variable $s-T_{s}^{E}$), obtaining \[ \mathbb{P}_{\mu}\left(T_{s}^{E}\le\left(1-\sqrt{\delta}\right)s\right)\le\sqrt{\delta}. \] In particular, chosing $s=N^{2}\binom{V}{D}2^{D}q^{-D-2}$ yields \begin{align*} \mathbb{P}_{\mu}\left(\tau_{A}\ge s\right) & \le\mathbb{P}_{\mu}\left(T_{\tau_{A}}^{E}\ge T_{s}^{E}\right)\le\mathbb{P}_{\mu}\left(T_{\tau_{A}}^{E}\ge t\right)+\mathbb{P}_{\mu}\left(T_{s}^{E}\le t\right)\\ & \le2q+\delta+\sqrt{\delta}. \end{align*} \end{proof} The lower bound can be obtained by comparison to the associated bootstrap percolation (see also \cite{CMRT_kcmzoo}). \begin{defn} $\tau_{0}^{\text{BP}}$ is the $\mu$-random variable describing the infection time of the origin for bootstrap percolation. \end{defn} \begin{lem} \label{lem:upperbound_bp}Fix $t>0$, $\delta>0$, and assume $\mu\left(\tau_{0}^{\text{BP}}<100t\right)<\delta$. Then $\mathbb{P}_{\mu}\left(\tau_{0}<t\right)<\delta+e^{-t}$. \end{lem} \begin{proof} By the finite speed of propagation property (see, e.g., \cite[section 3.3]{Martinelli_SaintFlourNotes}), setting $X = {x : \norm{x}_1 \ge 100t}$, we may couple the dynamics starting at a configuration $\eta$ with the dynamics starting at the configuration $\eta^{X\leftarrow h}$, such that with probability at least $1-e^{-t}$ the state of the origin in both dynamics is equal up to time $t$. By the definition of the bootstrap percolation, if $\tau_0^{\text{BP}}\ge 100t$, than the dynamics starting from the state $\eta^{X\leftarrow h}$ could never infect the origin. Therefore, the dynamics starting at $\eta$ could infect the origin with probability at most $e^{-t}$. This concludes the proof. \end{proof} \section{KCM on polluted $\protect\mathbb{Z}^{2}$} The upper bound for $\tau_0$ is given by \lemref{upperbound_bp} and the estimates of $\tau_{0}^{\text{BP}}$ in \cite{AL} for the non-polluted case (i.e., when all sites are susceptible), together with the observation that by adding immune sites $\tau_{0}^{\text{BP}}$ could only increase. For the lower bound, we start by fixing two scales: \begin{align} L & =q^{-1-\varepsilon/3},\label{eq:fa2polluted_Landl}\\ l & =q^{-L-1}.\nonumber \end{align} \begin{defn} A square (that is, a subset of $\mathbb{Z}^{2}$ of the form $x+\left[L\right]^{2}$) is \textit{good} if all its sites are susceptible and each row and column contain at least one infected site. \end{defn} \begin{claim} \label{claim:fa2polluted_goodprob}For $q$ small enough $\nu\otimes\mu\,\left(\left[L\right]^{2}\text{ is good}\right)\ge1-2q^{\varepsilon/3}$. \end{claim} \begin{proof} The probability that one of the sites of $\left[L\right]^{2}$ is immune is at most $L^{2}\pi$, which is bounded by $q^{-2-2\varepsilon/3}\,q^{2+\varepsilon}=q^{\varepsilon/3}$. The probability that one of the line or columns of $\left[L\right]^{2}$ is entirely healthy is at most $2L\left(1-q\right)^{L}$, which is asymptotically equivalent to $2q^{-1-\varepsilon/3}e^{-q^{-\varepsilon/3}}$. This bound tends to $0$ much faster than $q^{\varepsilon/3}$, and the union bound given the proof of the claim. \end{proof} We will consider the coarse grained lattice, i.e., the boxes of the form $L\hat{x} + [L]^2$ for $\hat{x}\in \mathbb{Z}^2$. The boxes of this lattice do not overlap, thus they are good or not good independently. That is, the notion of a good box defines a Bernoulli percolation process on the coarse grained lattice. Together with results from percolation theory (e.g. \cite[Theorem 1.33]{DCT_PercolationShaprness,Grimmett}) this implies the following corollary. \begin{cor} \label{cor:fa2polluted_infinitegood}The $\nu\otimes\mu$-probability that the origin belongs to an infinite cluster of good boxes is at least $1-16q^{\varepsilon/3}$. \end{cor} \begin{defn} Consider a path of good boxes on the course-grained lattice. We say that the path is \textit{super-good} if one of its boxes contains an infected line. \end{defn} \begin{claim} \label{claim:fa2polluted_supergoodifgood}Fix a self avoiding path of boxes whose length is $l$. Then \[ \nu\otimes\mu\left(\text{path is super-good }|\text{ path is good}\right)\ge1-e^{-1/q}. \] \end{claim} \begin{proof} Since the events $\left\{ \text{the path is good}\right\} $ and $\left\{ \text{one of the boxes contains an infected line}\right\} $ are both increasing we can use the FKG inequality \cite{Grimmett}, and bound this probability by the probability that a length $l$ path of boxes (not necessarily good) does not contain an infected line. This conclude the proof, since \[ \left(1-q^{L}\right)^{lL}\le e^{-q^{L}\,q^{-L-1}}. \] \end{proof} \begin{claim} \label{claim:fa2polluted_probofsg}For $q$ small enough $\nu\otimes\mu\left(0\text{ belongs to a super-good path of length }l\right)\ge1-25q^{\varepsilon/3}$. \end{claim} \begin{proof} By \corref{fa2polluted_infinitegood} the origin belongs to an infinite cluster of good boxes with probability greater than $1-16q^{\varepsilon/3}$. In particular, it is contained in a self-avoiding path of length $l$. Then we use \claimref{fa2polluted_supergoodifgood} and the union bound to conclude the proof. \end{proof} \begin{defn} $p_{\text{SG}}\left(\omega\right)$ is the $\mu$-probability that the origin is contained in a super-good path of length $l$. \end{defn} \begin{defn} We say that $\omega$ is \textit{low pollution} if $p_{\text{SG}}\left(\omega\right)>1-5q^{\varepsilon/6}$. \end{defn} \begin{claim} \label{claim:fa2polluted_proboflowpollution}$\nu\left(\text{low pollution}\right)\ge1-5q^{\varepsilon/6}$. \end{claim} \begin{proof} By \claimref{fa2polluted_probofsg}, $\nu\left(p_{\text{SG}}\right)\ge1-25q^{\varepsilon/3}$. Since $p_{\text{SG}}\le1$, Markov inequality will give the result. \end{proof} From now on we think of a fixed $\omega$. Let \begin{align*} E & =\left\{ 0\text{ belongs to a super-good path of length }l\right\} ,\\ A & =\left\{ \eta_{0}=0\right\} . \end{align*} \begin{prop} \label{prop:z2path} $E,A$ satisfy the assumptions of \lemref{path_to_time} with $N=4L^{2}l,D=3L,V=3L^{2}$. \end{prop} \begin{proof} The path is constructed by propagating an infected column (or row), as illustrated in Figures \ref{fig:propagationgacol}, \ref{fig:rotatingcol}, and \ref{fig:z2path}. Figure \ref{fig:propagationgacol} shows how an infected column could propagate to the right in a good box. Since the path may have corners, we will occasionaly need to rotate the infected column and create an infected row, as explained in Figure \ref{fig:rotatingcol}. Finally, using these two basic moves, we may take the column or row that was initially infected by the assumption that the path is super-good, and then move it along the path until the origin is infected. This is illustrated in Figure \ref{fig:z2path}. \end{proof} \begin{figure} \begin{tikzpicture}[scale=0.3, every node/.style={scale=0.6}] \def18{0} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (3.5,2.5) to (5,2.5); \def18{5.5} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+1.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (9,2.5) to (10.5,2.5); \def18{11} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+1.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (14.5,2.5) to (16,2.5); \def18{16.5} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \foreach \y in {1,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+1.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (20,2.5) to (21.5,2.5); \def18{22} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw (18+0.5,-13+4.5) node[black] {$i$}; \foreach \y in {0,...,4}{ \draw (18+1.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (25.5,2.5) to (27,2.5); \def18{27.5} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw (18+0.5,-13+4.5) node[black] {$i$}; \foreach \y in {0,...,4}{ \draw (18+1.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+2.5,-13+\y+0.5) node[black] {$i$}; } \draw[->] (31,2.5) to (32.5,2.5); \def18{33} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(3,5); \draw (18+0.5,-13+4.5) node[black] {$i$}; \foreach \y in {0,...,4}{ \draw (18+2.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \end{tikzpicture} \caption{\label{fig:propagationgacol}Illustration of the proof of \propref{z2path}. We see here how an infected column could propagate in a good box. $i$ stands for infected sites. Other sites could be either infected or healthy, according to their initial state.} \end{figure} \begin{figure} \begin{tikzpicture}[scale=0.3, every node/.style={scale=0.6}] \def18{0} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+4.5) node[black] {$i$}; \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw[->] (6,2.5) to (8,2.5); \def18{9} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+1.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+2.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+3.5,-13+4.5) node[black] {$i$}; \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw[->] (15,2.5) to (17,2.5); \def18{18} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+2.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+1.5,-13+4.5) node[black] {$i$}; \draw (18+3.5,-13+4.5) node[black] {$i$}; \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw[->] (24,2.5) to (26,2.5); \def18{27} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+4.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+4.5) node[black] {$i$}; \draw (18+2.5,-13+4.5) node[black] {$i$}; \draw (18+3.5,-13+4.5) node[black] {$i$}; \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (33,2.5) to (35,2.5); \def18{36} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \y in {0,...,4}{ \draw (18+3.5,-13+\y+0.5) node[black] {$i$}; } \draw (18+1.5,-13+4.5) node[black] {$i$}; \draw (18+2.5,-13+4.5) node[black] {$i$}; \draw (18+4.5,-13+4.5) node[black] {$i$}; \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw[->] (42,2.5) to (44,2.5); \def18{0} \def-13{-7} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \x in {1,...,4}{ \draw (18+\x+0.5,-13+4.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw[->] (6,-4.5) to (8,-4.5); \def18{9} \def-13{-7} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {0,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \x in {1,...,4}{ \draw (18+\x+0.5,-13+0.5) node[black] {$i$}; } \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+4.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw[->] (15,-4.5) to (17,-4.5); \def18{18} \def-13{-7} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \y in {1,...,4}{ \draw (18+0.5,-13+\y+0.5) node[black] {$i$}; } \foreach \x in {1,...,4}{ \draw (18+\x+0.5,-13+1.5) node[black] {$i$}; } \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+4.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \draw[->] (24,-4.5) to (26,-4.5); \def18{27} \def-13{-7} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \foreach \x in {0,...,4}{ \draw (18+\x+0.5,-13+4.5) node[black] {$i$}; } \draw (18+3.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+2.5) node[black] {$i$}; \draw (18+1.5,-13+1.5) node[black] {$i$}; \draw (18+4.5,-13+3.5) node[black] {$i$}; \end{tikzpicture} \caption{\label{fig:rotatingcol}Illustration of the proof of \propref{z2path}. We see here how to rotate an empty column in a good box.} \end{figure} \begin{figure} \begin{tikzpicture}[scale=0.3, every node/.style={scale=0.5}] \def18{0} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \foreach \x in {0,...,4}{ \draw (18+\x+0.5,-13+0.5) node[black] {$i$}; } \draw (18+2.5,-13+1.5) node[black] {$i$}; \draw (18+4.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+3.5) node[black] {$i$}; \draw (18+1.5,-13+4.5) node[black] {$i$}; \draw (18+2.5,-13+5.5) node[black] {$i$}; \draw (18+0.5,-13+6.5) node[black] {$i$}; \draw (18+1.5,-13+7.5) node[black] {$i$}; \draw (18+4.5,-13+8.5) node[black] {$i$}; \draw (18+3.5,-13+9.5) node[black] {$i$}; \draw (18+5.5,-13+8.5) node[black] {$i$}; \draw (18+6.5,-13+6.5) node[black] {$i$}; \draw (18+7.5,-13+7.5) node[black] {$i$}; \draw (18+8.5,-13+5.5) node[black] {$i$}; \draw (18+9.5,-13+9.5) node[black] {$i$}; \draw[->] (11,5) to (13,5); \def18{14} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw (18+0.5,-13+0.5) node[black] {$i$}; \foreach \x in {0,...,4}{ \draw (18+\x+0.5,-13+1.5) node[black] {$i$}; } \draw (18+4.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+3.5) node[black] {$i$}; \draw (18+1.5,-13+4.5) node[black] {$i$}; \draw (18+2.5,-13+5.5) node[black] {$i$}; \draw (18+0.5,-13+6.5) node[black] {$i$}; \draw (18+1.5,-13+7.5) node[black] {$i$}; \draw (18+4.5,-13+8.5) node[black] {$i$}; \draw (18+3.5,-13+9.5) node[black] {$i$}; \draw (18+5.5,-13+8.5) node[black] {$i$}; \draw (18+6.5,-13+6.5) node[black] {$i$}; \draw (18+7.5,-13+7.5) node[black] {$i$}; \draw (18+8.5,-13+5.5) node[black] {$i$}; \draw (18+9.5,-13+9.5) node[black] {$i$}; \draw[->] (25,5) to (27,5); \def18{28} \def-13{0} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw (18+0.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+1.5) node[black] {$i$}; \draw (18+4.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+3.5) node[black] {$i$}; \draw (18+1.5,-13+4.5) node[black] {$i$}; \foreach \x in {0,...,4}{ \draw (18+\x+0.5,-13+5.5) node[black] {$i$}; } \draw (18+0.5,-13+6.5) node[black] {$i$}; \draw (18+1.5,-13+7.5) node[black] {$i$}; \draw (18+4.5,-13+8.5) node[black] {$i$}; \draw (18+3.5,-13+9.5) node[black] {$i$}; \draw (18+5.5,-13+8.5) node[black] {$i$}; \draw (18+6.5,-13+6.5) node[black] {$i$}; \draw (18+7.5,-13+7.5) node[black] {$i$}; \draw (18+8.5,-13+5.5) node[black] {$i$}; \draw (18+9.5,-13+9.5) node[black] {$i$}; \draw[->] (39,5) to (41,5); \def18{4} \def-13{-13} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw (18+0.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+1.5) node[black] {$i$}; \draw (18+4.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+3.5) node[black] {$i$}; \draw (18+1.5,-13+4.5) node[black] {$i$}; \foreach \y in {0,...,4}{ \draw (18+4.5,-13+\y+5.5) node[black] {$i$}; } \draw (18+2.5,-13+5.5) node[black] {$i$}; \draw (18+0.5,-13+6.5) node[black] {$i$}; \draw (18+1.5,-13+7.5) node[black] {$i$}; \draw (18+3.5,-13+9.5) node[black] {$i$}; \draw (18+5.5,-13+8.5) node[black] {$i$}; \draw (18+6.5,-13+6.5) node[black] {$i$}; \draw (18+7.5,-13+7.5) node[black] {$i$}; \draw (18+8.5,-13+5.5) node[black] {$i$}; \draw (18+9.5,-13+9.5) node[black] {$i$}; \draw[->] (15,-8) to (17,-8); \def18{18} \def-13{-13} \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=5, black, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,0) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (0,5) grid +(5,5); \draw[step=1, gray, very thin,xshift=18 cm, yshift=-13 cm] (5,5) grid +(5,5); \draw (18+0.5,-13+0.5) node[black] {$i$}; \draw (18+2.5,-13+1.5) node[black] {$i$}; \draw (18+4.5,-13+2.5) node[black] {$i$}; \draw (18+3.5,-13+3.5) node[black] {$i$}; \draw (18+1.5,-13+4.5) node[black] {$i$}; \draw (18+2.5,-13+5.5) node[black] {$i$}; \draw (18+0.5,-13+6.5) node[black] {$i$}; \draw (18+1.5,-13+7.5) node[black] {$i$}; \draw (18+3.5,-13+9.5) node[black] {$i$}; \draw (18+4.5,-13+8.5) node[black] {$i$}; \draw (18+5.5,-13+8.5) node[black] {$i$}; \draw (18+6.5,-13+6.5) node[black] {$i$}; \draw (18+7.5,-13+7.5) node[black] {$i$}; \draw (18+8.5,-13+5.5) node[black] {$i$}; \foreach \y in {0,...,4}{ \draw (18+9.5,-13+\y+5.5) node[black] {$i$}; } \end{tikzpicture} \caption{\label{fig:z2path}Illustration of the proof of \propref{z2path}. We see here how to propagate infection through a good path.} \end{figure} This concludes the proof of the upper bound of $\tau_0$. For $q$ small enough $N^{2}\binom{V}{D}2^{D}q^{-D-2}\le e^{-q^{-1-\varepsilon}}$, and by \propref{yoyoma} \[ \mathbb{P}_{\mu}\left(\tau_{A}>e^{-q^{-1-\varepsilon}}\right)\le2q+p_{\text{SG}}\left(\omega\right)+\sqrt{p_{\text{SG}}\left(\omega\right)}. \] In particular, if $\omega$ is low pollution $\mathbb{P}_{\mu}\left(\tau_{A}>e^{-q^{-1-\varepsilon}}\right)\le3q^{\varepsilon/12}$. \section{KCM on polluted $\mathbb{Z}^{3}$} The upper bound, just as the two dimensional case, is given by \lemref{upperbound_bp} and the results of \cite{CerfManzo}. For the lower bound, we will use the ideas of \cite{GravnerHolroyd_polluted} in order to construct a path that empties the origin and satisfies the hypotheses of \lemref{path_to_time}. In contrast to the infection mechanism in the bootstrap percolation (\cite{GravnerHolroyd_polluted}), we will need a finer path, that not only allows us to empty the origin, but also keeps the configuration close to the original one in order to avoid large energy barrier and entropic price. A move is denote by a pair $(x,a)$ where $x\in \mathcal{S}$ and $a\in \{i,h\}$. A move is legal in $\eta$ if $c_x(\eta) = 1$. A finite sequence of moves is given by $\Gamma = (x_i,a_i)_{i=1}^k$. Starting from the configuration $\eta$, we let $\Gamma_i(\eta)$ denote the configuration obtained by applying the first $i$ moves in $\Gamma$. The sequence $\Gamma$ is legal with respect to the initial configuration $\eta$ if each move from $\Gamma_i(\eta)$ to $\Gamma_{i+1}(\eta)$ is legal. We let $\Gamma(\eta)$ denote the configuration obtained by applying the entire sequence of moves in $\Gamma$ starting from $\eta$. Note that if the change from $\eta$ to $\eta'$ is a legal move, then the change from $\eta'$ to $\eta$ is also a legal move. Similarly, if $\Gamma$ is a legal sequence starting from $\eta$ and ending at $\eta'$ then the reverse of $\Gamma$, denoted $rev(\Gamma)$, is a legal sequence starting from $\eta'$ and ending at $\eta.$ We denote the concatenation of two sequences, $\Gamma$ and $\Gamma'$ by $\Gamma + \Gamma'$. If $\Gamma$ is a legal sequence of moves from $\eta$ to $\eta'$, and $\Gamma'$ is a legal sequence of moves from $\eta'$ to $\eta''$ then $\Gamma + \Gamma'$ is legal sequence of moves from $\eta$ to $\eta''$. \begin{lem}\label{backandforth} Let $\Gamma$ denote a sequence of legal moves that starts at $\eta$ and ends at $\eta'$. For any set of susceptible sites $X$, Let $\Gamma^{X}$ denote the same set of moves as $\Gamma$ except that any move that would cure a site in $X$ is ignored. Then $\Gamma^X$ is also a legal set of moves that start at $\eta$ and ends at $\eta'' = \Gamma^X_k(\eta)$ where for all $i\leq k$ the only difference between $\Gamma_i(\eta)$ and $\Gamma^X_i(\eta)$ lies on the set $X$. \end{lem} \begin{proof} This is a consequence of the fact that more infected sites can only help the constraints to be satisfied. Let $Y_i$ denote the subset of $X$ that is infected for some $j\leq i$ in $\Gamma_i(\eta)$. For each $i$, $\Gamma^X_i(\eta) = (\Gamma_i(\eta))^{Y_i\leftarrow i}$, thus the infected sites in $\Gamma_i(\eta)$ are a subset of the infected sites in $\Gamma_i^X(\eta)$. Thus moves in $\Gamma^X$ are legal if they are legal in $\Gamma.$ Finally $\eta'' = (\eta')^{Y_k\leftarrow i} \in (\eta')^{(X)}$ and thus the last line in the lemma holds. \end{proof} We repeat the definitions from \cite{GravnerHolroyd_polluted} of the objects necessary for our work. Note that some of the details in the definitions are slightly modified to fit within the framework of our proof. For $k\in \mathbb{Z}$ we let $\Lambda_k$ denote $\mathbb{Z}^{2} \times \{k\}$ and refer to this as the $k$th layer of $\mathbb{Z}^3.$ We let $e_1$, $e_2,$ and $e_3$ denote the unit vectors in each of the cardinal directions. The \emph{standard brick} is a the collection of sites $[0,4L)\times[0,16L)\times[0,32L).$ The \emph{base} of the standard brick is the bottom half $[0,4L)\times [0,16L) \times [0,16L).$ The \emph{top} of the standard brick is the remaining half of the brick. The \emph{sections} of the standard brick are the sets $[0,4L)\times [0,16L) \times [4jL, 4(j+1)L)$ for $0\leq j \leq 7$. The \emph{tip} of the standard brick is the set $[0,4L) \times [0,4L), \times [16L,32L)$, and has the same dimensions as a section, though a different orientation. The \emph{anchor} of the standard brick is the site $(4L,16L,0)$ and the \emph{flag} is the site $(0,0,32L).$ Note that the standard brick contains neither its anchor nor flag, though the flag is on the boundary of the tip and the anchor is corner opposite to the flag on the boundary of the brick. A proto-brick, $\hat{B},$ is the set of vertices $[0,4L) \times [0,4L) \times [0,2L)$ that lies in a different $\mathbb{Z}^3$ from the standard brick. For each $\hat{x}=(\hat{x}_1,\hat{x}_2,\hat{x}_3)\in \hat{B}$ define $cell(x) = (x_1,4x_2,16x_3) + \{0\}\times [0,4) \times [0,16).$ The standard brick is connected to the proto-brick by $$B = \bigcup_{\hat{x}\in \hat{B}} cell(\hat{x}).$$ A vertex is susceptible if every site in the corresponding cell is susceptible. \begin{defn} Let $\hat{B}$ be a proto-brick with corresponding brick $B$ in standard position. The brick $B$ is good if there exists a set $\hat{S}\subseteq \hat{B}$ with the following properties \begin{enumerate} \item All vertices in the following set are susceptible: $$ \sigma(\hat{S}):= \{ \hat{x}, \hat{x}+ \hat{e}_3, \hat{x}-\hat{e}_1-\hat{e}_2+\hat{e}_3: \hat{x}\in \hat{S}\}\cap \hat{B};$$ \item for all $\hat{x} \in \hat{S}$, except for $\hat{x}$ in the bottom layer of $\hat{B},$ satisfies either $$ \hat{x} - \hat{e}_3 \in \hat{S}, \text{ or }$$ $$\hat{x} +\hat{e}_1+\hat{e}_2 -\hat{e}_3 \in \hat{S};$$ \item $\hat{S}\subseteq \{ \hat{x}: 3L < \hat{x}_1 + \hat{x}_2 + \hat{x}_3 < 4L\};$ \item for $0\leq k \leq 2L-1$, $\hat{S}\cap \Lambda_k$ is an oriented path from $\{\hat{x}_1=0\}$ to $\{\hat{x}_2=0\}$ with steps $\hat{e}_1$ or $-\hat{e}_2$ where no three consecutive steps are the same; \item The site $(L+1, 4L+4, 16L)S$ is contained in $S$, where $$S = \bigcup_{\hat{x}\in \hat{S}} cell(\hat{x}).$$ \item for $0\leq k < 32L-1$, there is an infected site in $S\cap\Lambda_k + e_3.$ \end{enumerate} \end{defn} The first five conditions for a good brick depend only on the initial random set $\mathcal{S}$. The last condition also depends on the configuration on $\mathcal{S}$. The set $S$ is called the sail of $B$. The set $$\bar{S} = S \cup \{S+ e_3\} \cap B$$ is called the thick sail of $B$. For a fixed $\hat{x}\in \hat{B}$ and some value $0\leq j \leq 15$ we call the set $(x_1,x_2,x_3) + \{0\} \times [0,4) \times \{j\}$ the $j$th \emph{unit} of $cell(\hat{x})$. Similarly, for fixed $0 \leq j \leq 3$, the set $(x_1,x_2,x_3) + \{0\}\times \{j\} \times [0,16)$ is called a \emph{strip}. A cell consists of 16 units or 4 strips. The set $B_i = \Lambda_i \cap B$ is the $i$th \emph{layer} of $B$. The sites in a unit of a cell all lie on the same layer, whereas the sites of a strip in a cell lie across 16 different layers. If each of the units in a layer is the 15th unit in a cell, we say the layer is a \emph{transition} layer. Otherwise it is an internal layer. Note the only sites in $\bar{S}\backslash S$ are (possibly) those that lie directly above a transition layer. We denote the layers of a sail as the sets $S_i = \Lambda_i \cap S.$ If $S_i$ is in an internal layer, then $S_{i+1} = S_i + e_3$. The layer $S_i$ is an oriented path of units with subsequent units differing by either $e_1$ or $-4e_2$. The path has two types of corner units: an exterior corner unit reached by $e_1$ from the previous unit and followed by $-4e_2$ to the next unit, and an interior corner unit reached by $-4e_2$ and followed by $e_1$. For $i< 32L-1$, if $S_i$ is a transition layer then for every $u \in S_i$ either $u+e_3 \in S_{i+1}$ or $u+e_3-e_1-4e_2 \in S_{i+1}.$ A general brick, $B$, is given by an anchor and flag in $\mathbb{Z}^3$ that differ by $(d_1,d_2,d_3)$ given by some rearrangement of the vector $(4L,16L,32L)$. The base, top, sections, layers, and tip of a general brick is the reorientation of the those of the standard brick to fit with the new choice of anchor and flag. The definitions of sails, units, strips, etc. are also all modified according to the new orientation. In \cite{GravnerHolroyd_polluted} they essentially show that a good sail can become completely infected under the bootstrap percolation dynamics if the bottom layer is completely infected. We need a refinement of this result, as we do not wish to infect everything, but instead we wish to move the infection from some set to another in $\mathbb{Z}^3$ whilst not increasing the number of infected sites of the configurations restricted to a finite domain by too much. The following series of lemmas will show how to propagate infection from certain sets of sites in the base of $B$ to any collection of sites in the tip of $B$. \begin{lem}\label{linebyline} Let $\eta$ be an initial configuration on the brick $B$. Suppose $B$ is good with respect to $\eta$ and let $S$ denote the sail of $B$. Fix $i$ and consider the configuration $\eta' = \eta^{S_i \leftarrow i }$. Then there exists a sequence of legal moves from $\eta'$ to $\eta''$ of length at most $CL$ where every site in $S_{i+1}$ becomes infected in $\eta''$, and $\eta''$ agrees with $\eta$ outside of $S_{i+1}$ and possibly a set of sites consisting of at most 2 boundary sites in $S_i$ and 16 sites in $S_i+e_3$ that lie on the boundary of $B$. \end{lem} \begin{proof} Without loss of generality assume $B$ is the standard brick. By property $5$ of a good brick there exists some infected site in $S_{i}+e_3$. We proceed unit by unit. Suppose $u$ is a unit in $S_{i} + e_3$ that contains an infected site, $z$. First we may cure $z-e_3\in S_i.$ Then we may infected a site in $S_i+e_3$ connected to the already emptied sites of $S_i+e_3$ and cure the corresponding site in $S_i$ below the newly emptied site. The set $S_i + e_3$ is connected so we may proceed until every site in $S_i + e_3$ is infected and all but one site in each of the boundary units of $S_i$ are healthy. If $S_i$ is an internal layer then $S_{i+1} = S_i + e_3$ and we are done. Otherwise suppose $S_i$ is a transition layer and let $P_0 = S_i + e_3$ be viewed as a path of units. For $l\geq 0$ we proceed inductively. Suppose $P_l$ is a path of infected units consisting of steps $e_1$ and $-4e_2$ such that for every $u\in P_l$, either $u\in S_{i+1}$ or $u-e_1-4e_2\in S_{i+1}$. If $P_l$ contains $S_{i+1}$ then it differs from $S{i+1}$ by at most four boundary units and we are done. Otherwise there exists some non-boundary external corner unit $u \in P_l$ such that $u\notin S_{i+1}$ and $u-e_1-4e_2 \in P_l$. Since $u$ is an external corner unit, $u-e_1$ and $u-4e_2\in P_l$. Thus we infected every site in $u-e_1-4e_2$ and cure $u$. This creates a new path of units $P_{l+1}$ that satisfies either $u'\in S_{i+1}$ or $u'-e_1-4e_2 \in S_{i+1}$ for every $u'\in P_{l+1}.$ Continue until no external corner units exists. This final path of infected units will contain all of $S_{i+1}$ plus at most 4 boundary units of $S_{i} +e_3$. \end{proof} The following lemma generalizes the statement of Lemma \ref{linebyline}. \begin{lem}\label{separator} Let $\eta$ be an initial configuration on the brick $B$. Suppose $B$ is good with respect to $\eta$ and let $S$ denote the sail of $B$. Let $V$ be a set of sites restricted to a single section in the base of $B$, such that $V$ separates $B$ into two connected components $B^-$ and $B^+$, where $B^+$ is the part containing the top of $B$. Let $X_1 = V\cap \bar{S}$ and $X_2$ be any subset of $B^+\cap\bar{S}$. There is a sequence of legal moves of length $O(L^2)$, starting from $\eta^{X_1\leftarrow i}$ and ending at $\eta^{ X_1\cup X_2 \leftarrow i }$, where at any time in the sequence the configuration differs from $\eta$ on a set of at most $|X_1| + |X_2| + O(L)$ sites. \end{lem} \begin{proof} Without loss of generality assume $B$ is the standard brick. Any results here apply by changing the orientation of the moves. Since $V$ is a separating set for $B$, The paths (of units), $S_j$ and $S_j+e_3$, are partitioned in to connected collections of sites are either entirely in $B^+$ or $B^-$. Let $i$ denote the lowest layer in $B$ that contains a site in $V\cap \bar{S}$. No site in $S_i$ is in $B^+$, otherwise $V$ would not separate $B$. Thus each $x\in S_i$ is either in $V$ or $B^-$. Consider the initial configuration $\eta'=\eta^{S_i\leftarrow i}$ obtained by infecting every site in $S_i$ from $\eta$. By Lemma \ref{linebyline} there exists a sequence of legal moves starting from $\eta'$ that infects every site in $S_{i+1}$ while leaving healthy all but 20 sites in $S_i$ and $S_{i} + e_3$. Repeat this process, infecting subsequent lines, except for the boundary points. Any time a site in $X_2$ is to become healthy, leave it infected. Eventually every site in $X_2$ will become infected as this process will at some point infect every site in $S$ that lies above $S_i$, which includes all of $S\cap B^+$. Infecting each subsequent line and curing the previous takes at most $CL$ steps and leaves behind at most 20 infected sites on each line that are not necessarily in $X_2$. There are at most $32L$ layers that need to be infected in $\bar{S}\cap B$ before every site in $X_2$ has been infected. The most number of infected sites in this process is $|\eta| + |S_i| + |X_2| + O( L).$ Let $\Gamma'$ denote this sequence of legal moves that starts at $\eta'$ and ends with $X_2$ completely infected. The number of moves in $\Gamma'$ is at most $O(L^2)$. Each step in $\Gamma'$ consists of curing or infecting a site $x$, or leaving it unchanged. Now consider the related censored sequence of moves, $\Gamma$, starting from $\eta'=\eta^{X_1\leftarrow i}$ defined as follows. Suppose $x$ is the site to be updated in $\Gamma'$ at time $t$. If $x\in B^-$ or $x\in X_1$ then do nothing in $\Gamma$ at time $t$. Otherwise act in the same way as $\Gamma'$. We claim that for each $t$ the set of infected sites in $\Gamma'_t(\eta')\cap B^+$ is the same as the set of infected sites in $\Gamma_t(\eta^{S_i\leftarrow i})\cap B^+.$ Suppose for $t\geq 0$ the claim is true up to time $t$, and the move at time $t$ is at a site $z_t\in \bar{S}$. In $\Gamma'_{t}(\eta')$, $z_t$ is a legal move, so there exists at least $2$ neighbors of $z_t$ that are in $\bar{S}$. Those neighbors are either in $B^+$ or $X_1$. If they are in $B^+$, then by the claim they must be in $\Gamma_t(\eta)$ and thus infected. Otherwise they are in $X_1$ in which case they also must be infected in $\Gamma_t(\eta).$ In either case the move at $z_t$ is legal and therefore $\Gamma_{t+1}(\eta)(z_t) = \Gamma'_{t+1}(\eta')(z_t)$, and the claim remains true for $t+1$. Thus every move in $\Gamma$ is legal. Moreover, $X_2\subseteq B^+$ and thus $X_2$ is infected in $\Gamma_t(\eta^{X_1\leftarrow i})$ when it is infected in $\Gamma'_t(\eta').$ The configuration $\Gamma_t(\eta)$ differs from $\eta$ on a set of size at most $|X_1|+ |X_2| + O(L)$ and the length of $\Gamma$ equals the length of $\Gamma'$. Once $X_2$ is completely infected, reverse the sequence of moves, except anytime a site in $X_1$ or $X_2$ is to be cured, ignore that move, thus leaving that site infected. The resulting configuration will have sites that are infected only if they are either in $X_1$ or $X_2$ or were infected in $\eta.$ The full sequence will take at most twice the number of steps in $\Gamma$, $O( L^2)$. \end{proof} The following corollary shows how to cure a collection of infected sites that lie further up the sail. \begin{cor}\label{mrclean} Let $B$ be a good brick with sail $S$ for a configuration $\eta$ on $B$. Let $V$ be a set of sites that separates $B$ into two connected components $B^+$ and $B^-$. Let $X_2$ be a set in $B^+\cap \bar{S}$ and let $X_1 = V \cap \bar{S}$. There exists a sequence of moves of length at most $CL^2$ that begins at $\eta^{X_1\cup X_2\leftarrow i}$ and ends at $\eta^{X_1 \leftarrow i}$ where each configuration in the sequence differs from $\eta$ on a set of size at most $ |X_1| + |X_2| + O(L).$ \end{cor} \begin{proof} By Lemma \ref{separator}, there is a sequence of moves that starting from $\eta^{X_1\leftarrow i}$ and ending at $\eta^{X_1\cup X_2 \leftarrow i}.$ Apply the reverse of this sequence. \end{proof} Starting from a brick $B$ with some layer in the base of the sail completely infected, we will show how to propagate this infection to a translation of $B$, while curing most of the infected sites in the original brick $B$. A brick, $B$, \emph{points} to another brick, $B'$, if the tip of $B$ coincides exactly with one of the four sections in the base of $B'$. This is denoted by $B \triangleright_k B'$ where $k$ is the corresponding section in $B'$ which coincides with the tip of $B$. \begin{lem}\label{sail_intersect} Let $B$ be a good brick that points to a good brick $B'$, with sails $S$ and $S'$ respectively. Then $|S\cap S'| = O(L)$. \end{lem} \begin{proof} Assume without loss of generality the cells of $B$ have orientation given by $(1,4,16)$ while the cells of $B'$ have orientation $(16,1,4)$. Fix a layer in $B_i \subset B$ in the tip of $B$. By definition $X_i = B_i \cap S$ is a path of units, denote $\{u_i\}$ with steps $u_{i+1}-u_i \in \{e_1,4e_2\}$ such that at most three consecutive steps are equal. Similarly the set $X'_i = S' \cap B_i$ is a path of strips $\{s_i\}$. Without loss of generality, the step $s_{i+1}-s_i \in \{e_2,16e_1,e_2+16e_1\}$ with at most three consecutive steps of type $e_2$. Let us consider the $e_1$ coordinates of $\{u_i\}$ and $\{s_i\}$. Every four steps the $e_1$ coordinate of $\{u_i\}$ grows by at most 3 while the $e_1$ coordinates of $\{s_i\}$ grows by at least $16$. Thus, the size of the intersection of $X_i$ and $X'_i$ is $O(1)$ and therefore the size of intersection of $S$ and $S'$ is $O(L)$. \end{proof} The next lemma is an extension of Lemma \ref{separator} which allows us to pass infection from the base of one brick to the tip of the next while staying within an $O(L)$ Hamming distance from the original configuration. \begin{lem} \label{passiton} Let $\eta$ be a configuration on $B\cup B'$ such that $B$ and $B'$ are good bricks with respect to $\eta$ such that $B$ points to $B'$ with corresponding oriented sails $S$ and $S'$. Let $V$ be a separating set in a section of the base of $B$, and $X_1 = V\cap \bar{S}$. For any subset of sites $X'$ in the tip of $B'\cap \bar{S}'$, there exists a sequence of $O(L^2)$ moves starting from $\eta^{X_1\leftarrow i}$ and ending at $\eta^{X_1 \cup X'\leftarrow i}$ while each configuration in the sequence differs from $\eta$ on a set of size at most $|X_1| + |X_2| + |X'|+O(L)$. \end{lem} \begin{proof} Let $X_2 = S\cap \bar{S}'$. From Lemma \ref{separator} there exists a sequence of length at most $O(L^2)$ of moves $\Gamma$ starting at $\eta^{X_1\leftarrow i}$ and ending at $\eta^{X_1\cup X_2 \leftarrow i}$ such that the number of infected sites at any step in the sequence is at most $|I(\eta)| +|X_1| + |X_2|+O(L)$. By Lemma \ref{sail_intersect}, the size of $S\cap S'$ is at most $O(L)$, and the size of $X_2$ is at most double the size of $S\cap S'$. Moreover, $S$ is a separating set for $B'$ and thus, again by Lemma \ref{separator}, there exists a sequence of moves, $\Gamma'$ starting from $\eta^{X_1\cup X_2\leftarrow i}$ that ends in $\eta^{X_1\cup X_2\cup X'\leftarrow i}$ within Hamming distance $|X_1| + |X_2| + |X'| + O(L)$ if $\eta$. Finally, the sequence $rev(\Gamma)$ is a legal sequence of moves starting from $\eta^{X_1\cup X_2\cup X'\leftarrow i}$ and ending at $\eta^{X_1\cup X' \leftarrow i}$ since $\eta^{X_1\cup X_2\leftarrow i}$ agrees with $\eta^{X_1\cup X_2\cup X'\leftarrow i}$ on $B$ and the moves of $\Gamma$ are contained entirely in $B$. The sequence of moves $\Gamma + \Gamma' + rev(\Gamma)$ satisfies conditions of the lemma and has The length of these three sequence is at most $O(L^2)$. \end{proof} We specify a sequence of bricks $\mathcal{B} = \{B^i\}_{i=0}^3$. \begin{itemize} \item $B^0 = \left( (0,0,0); (4L,16L,32L) \right)$, \item $B^1 = \left( (-12L,16L,32L); (20L,12L,16L) \right)$, \item $B^2 = \left((20L,0,16L);(4L,32L,20L)\right)$, \item $B^3 = \left((4L,16L,4L);(8L,32L,36L)\right)$. \end{itemize} Similarly define the sequence $\mathcal{B}'= \{{A}^i\}_{i=0}^3$ as: \begin{itemize} \item $A^0 = B^0$, \item $A^1 = B^1$, \item $A^2 = \left( (4L,0L,16L);(20L,32L,20L)\right)$, \item $A^3 = \left((16L,16L,4L);(20L,32L,36L) \right)$. \end{itemize} The sequences satisfy $$B^0\triangleright_3 B^1\triangleright_3 B^2 \triangleright_3 B^3$$ and $$A^0\triangleright_3 A^1\triangleright_3 A^2 \triangleright_3 A^3.$$ and both $B^3$ and $A^3$ are translations of $B^0 = A^0$ See Fig. \ref{bricktranslate}. \begin{figure}\label{bricktranslate} \includegraphics[scale=.5]{prop2.pdf} \caption{$B^0= A^0$ is the left turquoise brick, $B^1$ and $A^1$ are represented by the pink brick, $B^2$ and $A^2$ are both represented by the orange brick (with different sail orientations), and $B^3$ and $A^3$ are the turquoise translations to the right of $B^0$. The red outlines are where the tip of a brick coincides with the base othe another brick.} \end{figure} Note that $B^2$ and $A^2$ share the same set of sites but have flipped orientations. Both $\mathcal{B}$ and $\mathcal{B}'$ are called translation sequences. Given certain conditions on the bricks in $\mathcal{B}$ or $\mathcal{B}'$, certain infected sites in $B$ can propagate to infected sites in $B^3$ or $A^3$. We also define another sequence of bricks called a cleaning sequence, denoted $\mathcal{C} = \{C^i\}_{i=0}^7$. This sequence of bricks is used to return the sites in $\mathcal{B}$ or $\mathcal{B}'$ outside $B^3$ or $A^3$ to some original state. We will not specify the cleaning sequence as it is not unique. Figure \ref{fig:cleaning} gives and example. \begin{figure}\label{fig:cleaning} \includegraphics[scale=.5]{clean2.pdf} \caption{A sequence of eight bricks $\{C^i\}$, that facilitate cleaning outside $A^3$ or $B^3$. The tips of $B^3$ and $A^3$ point to the bottom section and $3$rd section, respectively, of $C^0$. Starting from $B^3$ this example satisfies, $B^3 \triangleright_0 C^0\triangleright_0 C^1\triangleright_0 C^2\triangleright_3 C^3\triangleright_3 C^4 \triangleright_2 C^5 \triangleright_3 C^6\triangleright_0 C^7 \triangleright_0 B^0.$ The colors correspond to orientation. Some unused sections of bricks were removed or made transparent to show hidden bricks. Intersections of tips with sections in the base of subsequent bricks are highlighted in red.} \end{figure} Our goal will be to show that we can infect sites in either $B^3$ or $A^3$ given a specific infected set of sites $X$ in section $3$ of $B = B^0 = A^0$ and conditions on the bricks $B^i$ or $A^i$ for $i=0,1,2,3$. Moreover, once we have spread the infected set of sites from $B$ to either $B^3$ or $A^3$ we can return the configuration outside of $B^3$ or $A^3$ back to its original state but with the sites at $X$ no longer infected. \begin{lem} \label{allinfamily} Let $\eta$ be a configuration on the sites of the bricks in $\mathcal{B}\cup \mathcal{C}.$ Let the bricks in $\mathcal{B}$ and $\mathcal{C}$ be good and have sails pointing in the appropriate direction, denoted by $S^i$ and $R^i,$ respectively, for the sails of the corresponding brick in $\mathcal{B}$ or $\mathcal{C}$. Let $V$ be some a separating set in section 3 of $B^0$ and $X = V\cap \bar{S}^0$. Let $X' = S^2 \cap \bar{S}^3$. There exists a sequence of legal moves, $\Gamma$, starting from $\eta^{X\leftarrow i}$ and ending at $\eta^{X' \leftarrow i}$. The length of $\Gamma$ is at most $O(L^2)$ and each configuration in the sequence differs from $\eta$ on a set of size $O(L).$ A similar statement holds for $\mathcal{B}'$. \end{lem} \begin{proof} This is simply an extension of Lemma \ref{passiton}. For $i=0,1,2$ each of the sails, $S^i$, are separating sets in the section 3 of the subsequent brick $B^{i+1}$. For $i=0,1,2$, let $X^i = S^i\cap \bar{S}^{i+1}$ and $\Gamma^i$ be a sequence of legal moves from $\eta^{X^i\leftarrow i}$ that ends at $\eta^{X^i\cup X^{i+1} \leftarrow i}.$ Then $\Gamma^0 + \Gamma^1 + \Gamma^2$ is a legal sequence of moves starting from $\eta^{X^0\leftarrow i}$ that ends at $\eta^{X^0\cup X^1\cup X^2 \cup X^3 \leftarrow i}.$ The reverse of $\Gamma^0+\Gamma^1$ is legal starting from this configuration, ending at $\eta^{X^0 \cup X^3 \leftarrow i}$. Repeat a similar argument through the bricks $\mathcal{C}$. For $i=0,\cdots ,6$, let $Y^i = R^i \cap \bar{R}^{i+1}$ and let $Y^7=R^7 \cap S^0$. There is a legal sequence starting from $\eta^{X^0\cup X^3 \leftarrow i}$ that ends at $\eta^{X^0\cup X^3\cup Y^7 \leftarrow i}$. The sail $R^7$ is a separating set that lies in section 0 of $B^0$. By Corollary \ref{mrclean}, there exists a sequence of legal moves restricted to the sites in $B^0$ that begins at $\eta^{X^0 \cup X^3 \cup Y^7 \leftarrow i}$ and ends at $\eta^{X^3\cup Y^7 \leftarrow i}.$ The reverse of the sequence that infected $Y^7$ from $X^3$ can now be applied to $\eta^{X^3 \cup Y^7 \leftarrow i}$ to end at the desire configuration $\eta^{X^3 \leftarrow i}$. The same argument applies to $\mathcal{B}'$, using the same set $\mathcal{C}.$ Altogether the translation of infection to $\eta^{X^3\leftarrow i}$ took at most $O(L^2)$ where each step in the configuration differed from $\eta$ on a set of size $O(L)$. \end{proof} Analogous to the two-dimensional case, we define good paths of bricks and super-good paths of bricks along which infections will propagate. \begin{defn} Fix a configuration $\eta$. Consider a possible bi-infinite sequence in $\mathbb{Z}^3$, denoted by $\cdots z_{-1}, z_0, z_1,\cdots$. We say that this sequence defines a \emph{good path of bricks} if the following hold: \begin{enumerate} \item $z_i + B$ is good, \item for all $C\in \mathcal{C},$ $z_i + C$ is good \item one of the two following conditions hold: \begin{itemize} \item either $z_{i+1} + B = z_i + B^3$ and $z_i + B^j$ are good for $j=0,1,2,3.$ \item or $z_{i+1} +B = z_i + A^3$ and $z_i + A^j$ are good for $j = 0,1,2,3.$ \end{itemize} \end{enumerate} \end{defn} \begin{defn} Fix a configuration $\eta$ and a good path of bricks $z_{-l}, \cdots z_0$. We say this path is \emph{super-good} if for some $i$, the brick $z_i + B$ has a sail whose bottom layer is completely infected. \end{defn} \begin{prop}\label{prop:origin_infected} Fix a configuration $\eta$. Let $z_{-l} \cdots z_0 = -(L+1,4L+4,16L)$, be a super good path. Then there exists a sequence legal moves $\Gamma$ of length $N = O(L^2l)$ such that \begin{enumerate} \item $\Gamma^{N}(\eta)(0) = 0$, i.e. the origin is infected the final configuration, \item for all $i\le N$, $\Gamma^i(\eta)$ differs from $\eta$ on a set of size is at most $O(L)$, \item for all $i\leq N$, $\Gamma^i(\eta)$ agrees with $\eta$ on all sites outside $x_i + [O(L)]^2$, where $x_i$ is the location of the $i$th move. \end{enumerate} \end{prop} \begin{proof} This follows from Lemma \ref{allinfamily} by propagating the empty line guaranteed by the path being super-good. \end{proof} Similar to the two-dimensional case, we need to define the scaling. Let $L = 2\log(1/q)/q$, $l = q^{-L-1}$. We also define the following events: \begin{itemize} \item $E := \{$ there exists super-good path $z_{-l}\cdots z_0 = -(L+1,4L+4,16L)\}$ \item $A := \{ \eta(0) = 0\}$. \end{itemize} All that remains to properly define the event $E$ in the case of polluted $\mathbb{Z}^3$, and show that it has high probability. \begin{lem}\label{goodpathprob} The probability that there exists a bi-infinite good path containing $z_0 = -(L+1,4L+4, 16L)$ tends to 1 as $(\pi,q)\to (0,0).$ \end{lem} \begin{proof} The probability for a fixed brick to be good tends to 1 as $(\pi,q)\to (0,0).$ Properties 1-5 in the definition of a good brick a satisfied with high probability according to \cite[Proposition 6]{GravnerHolroyd_polluted} while the last property holds with high probability through an argument similar to that found in the proof of Claim \ref{claim:fa2polluted_goodprob}. Construct the lattice of bricks that are translates of $z_0 + B$. Two bricks, $z+B$ and $z'+B$, will be connected by an edge if $z,z'$ is a good path of bricks of size two. This induces an directed edge-percolation process on a two dimensional lattice. This process has finite range dependencies, thus by LSS \cite{LSS} and the fact that oriented percolation contains an infinite cluster when the percolation parameter is large enough, there exists a bi-infinite good path containing $z_0$ with probability that tends to $1$ as $(\pi,q)\to (0,0)$. \end{proof} \begin{lem} \label{soop_is_on} The probability that there exists a super-good path of length $l$ ending at $z_0 = -(L+1,4L+4,16L)$ tends to $1$ as $(\pi,q)\to(0,0)$. \end{lem} \begin{proof} This follows the same argument as in the proof of Claim \ref{claim:fa2polluted_supergoodifgood}. \end{proof} The proof of Theorem \ref{thm:z3} is direct application of Proposition \ref{prop:yoyoma}, Lemma \ref{soop_is_on}, and Proposition \ref{allinfamily}. \section{Questions} \begin{itemize} \item Match the upper and lower bound in Theorem \ref{thm:z3}. \item Can the methods of \cite{GravnerHolroydSivakoff_polluted3d} be used in order to analyze the FA$3$f model on polluted $\mathbb{Z}^3$? More generally, what can we say about the Fredrickson-Andersen model with general threshold in general dimension? \item The methods introduced above are rather soft, in the sense that they only require some high probability event from which a path that empties the origin could be constructed. It is therefore plausible that they could be applied for models in which other, stronger techniques, fail, e.g., KCMs on finite graphs (whose dynamics is not ergodic). \item Can we analyze other time scales of the system, and in particular the typical time scale in which time correlation of local funtcions is lost (see, e.g., \cite[section 3.6]{Shapira_thesis})? \end{itemize} \section*{Acknowledgements} We would like to Cristina Toninelli for intoducting us to this problem and to each other, as well as for the useful discussion. \bibliographystyle{plain}
\section{Introduction} The development of the automotive landscape in the coming years will be significantly influenced by the global political and economic conditions. The idea of sustainability against the background of dwindling and rapidly increasing supplies of fossil fuels will also be consolidated on a global scale \cite{hannon2016integrated}. The desire to own a car will be significantly reduced in developed countries in favor of integrated mobility solutions \cite{litman2017autonomous}. \textcolor{black}{Subsequently, there is going to be a lasting change in the transportation technologies used for commuting and logistics. The electrification of vehicles, as well as the use of alternative fuels, will lead to an increase in the number of charging stations and bring extremely high diversity in vehicular technology \cite{zhang2018vehicular}. In the process, as shown in Figure \ref{fig.1}, semi- and fully-autonomous vehicle are expected to grow gradually and vehicular communications aspects like accessibility, timeliness, and flexibility will continue to improve in coming decades.} Therefore, we anticipate that the next evolutionary step in vehicular communications is going to be the Internet of autonomous vehicles (IoAV). Air traffic is often used in the context of autonomous connected vehicles, in which - apart from takeoff and landing - the autopilot takes over the control. However, there are several differences between road traffic and air traffic (including the type of transport), which does not make a transfer between the systems meaningful and feasible. One of the key differences is the application of rules and the type of control. In areas where aircraft meet each other aircrafts - especially near runway- everything is determined by strict rules. Compared to air traffic, road traffic is more of a self-organized chaotic system and arranged principally by flexible rules \cite{litman2017autonomous}. \textcolor{black}{Moreover, despite carefully regulating the traffic laws, many random unanticipated situations cannot be defined as a clear rule.} Participation on the road requires constant caution and mutual consideration in a variety of circumstance. Thus, one of the central tasks of a driver for safe participation in road traffic is the assessment of the behavior of other road users. This assessment includes communicating with the drivers and road users through actions and signs \cite{zhang2018vehicular}. In other words, besides the \emph{official} rules, there is a set of informal rules that control traffic. From a systemic point of view, it is immediately obvious that observance of informal rules, communication between road users, and behavioral prediction of drivers are important to support the flow of traffic and to minimize the number of accidents on the road \cite{joy2018internet}. \textcolor{black}{The concepts of autonomous vehicles was introduced in the late 20th century. At that time, the misconduct of motorists was identified as the main cause of the accident.} The fact that infrastructure and vehicle design are also decisive factors in the number and severity of the accident, was not seriously considered. Later on, the idea of a machine-based substitution of the human driver was surfaced which led to technologies like cruise control and self-driving vehicles. Today, the developments in embedded systems and wireless communications have changed the requirements and the industry giants are competing to claim the top spot in autonomous vehicle technology. \textcolor{black}{Millions of dollars are being invested to improve different aspects of autonomous vehicles. Intel, Verizon and Samsung are some of the leading investors with projects like INRIX, Telogis, and Joynet, respectively \cite{hannon2016integrated}. These project cover a wide range of aspect including predictive traffic information, Cloud-based GPS tracking and efficient 3D mapping.} Although the upsurge in data rate requirements has paved the way to the Internet of vehicles (IoV), the autonomous part of IoV is still not fully explored \cite{gupta2018authorization}. \textcolor{black}{The future vehicles will be a formidable sensor platform and they will absorb information not only from the environment but also from other vehicles (drivers). Subsequently, this large amount of information will be fed to the infrastructure. A comparison of IoV and IoAV is provided in Table \ref{tab_1}.} Adopting a different approach from existing works, where technical prototypes, literary metaphors, and pictorial imaginations are clashed but never synchronized, the fundamental objective of this paper is to provide a functional ecosystem for the legacy and autonomous vehicles. More specifically, we aim to create a layered transport communication fabric capable of safe navigation and efficient traffic management while quickly driving people to their destinations. \textcolor{black}{We will also identify the key features of this ecosystem and see how IoAV can provide performance improvements through the layered architecture. Finally, we discuss the simulation results for performance evaluation of IoAV and discuss the socio-technological challenges for future research.} \begin{table}[] \centering \caption{\textcolor{black}{Classification of different attributes of IoV and IoAV.}} \label{tab_1} \textcolor{black}{\begin{tabular}{|p{3cm}|p{5cm}|p{5cm}|} \hline \textbf{Classification} & \textbf{IoV} & \textbf{IoAV} \\ \hline \textbf{Tracking Behavior} & Little support for tracking behavior of drivers and passengers & Behavior monitoring of person, things or data through space and time \\ \hline \textbf{Situation Awareness} & Conventional approaches to situational awareness using GPS and cameras & Real-time awareness of physical environment through sensor, automotive radars, and cooperative communication \\ \hline \textbf{Data Flow} & Limited, due to specific type of data from vehicles & Large, due to connectivity of large number of vehicles and devices \\ \hline \textbf{Decision Analytics} & High dependence on humans for analyzing data and making decision & Assisting human through data visualization and deep analysis \\ \hline \textbf{Process Optimization} & Low optimization due to less control of the transportation system & High optimization due to automated control of self-contained closed system \\ \hline \textbf{Resource Consumption} & High, due to lack of data and information regarding vehicles & Low, due to availability of information and efficient utilization of resources across network \\ \hline \end{tabular}} \end{table} The rest of this paper is organized as follows. In Section II, we discuss the state-of-the-art of IoV. Section III provides the key features and enabling technologies for IoAV while Section IV discusses the architecture of IoAV. Numerical results and their discussion is provided in Section V. Section VI explains some socio-technical challenges of IoAV. Finally, the paper is concluded in Section VII. \begin{figure*}[!htp] \centering \includegraphics[trim={0 0cm 0 0cm},clip,scale=.9]{Figures/Block_1.pdf} \caption{\textcolor{black}{Prospective time-line of evolution of autonomous vehicles.}} \label{fig.1} \end{figure*} \section{State-of-the-Art of IoV} In this section, we discuss the broader concept of IoV and provide some recent studies to highlight the deficiencies of existing IoV model. \subsection{Introduction to IoV} Prior to starting a discussion on IoAV, it is worthwhile to describe the broader concept of IoV and highlight its existing deficiencies. There is less doubt that vehicular technology is witnessing a rapid transformation; much similar to the one observed in the domain of sensor networks which ultimately shaped the concept of the Internet of things (IoT). However, unlike IoT, where passive computing devices form a network of intelligent sensors accessible through the Internet, the IoV involves much more mobility and human interventions \cite{7892008}. \textcolor{black}{Human safety and comfort are the indispensable factors in the design of IoV as compared to conventional IoT.} Moreover, there are different levels of communications in IoV including intra-vehicular communications, inter-vehicular or vehicle-to-vehicle (V2V) communications, and vehicle-to-infrastructure (V2I) communications \cite{7892008}. The heterogeneity of communication at different levels is accompanied by the issues of scalability and expanded coverage area for communication. In order to ensure efficient use of resources, vehicles are grouped into clusters with respect to the quality of the wireless channel, and geographical location or mobility of vehicles. These clusters are called the vehicular clouds \cite{gupta2018authorization}, wherein, the data within a vehicular cloud is shared, processed, and frequently uploaded to the Internet cloud for classification of routes and minimizing road accidents. \subsection{Recent Advances in IoV} \textcolor{black}{Recent studies on IoV take into account different aspects ranging from social networking, to load balancing and security.} An overview of communications technologies for vehicles and taxonomy for IoV was discussed in \cite{fangchun2014overview}. Alam \emph{et al}. in \cite{alam2015toward} provided a review of social IoV networks and discussed different social vehicular applications like ``Road Speak'', ``Social Drive'', and ``Road Sense''. These applications help vehicles on the road to recommend chat groups of similar interest and to exchange road conditions and driving experiences in real-time. They also proposed a message exchange structure using SAE J2735. A content dissemination strategy for cooperative vehicular networks was proposed in \cite{7277118}. The key aim of this study was to minimize the load on cellular traffic using ad-hoc based V2V and Wi-Fi-based V2I communications. To improve the energy efficiency of vehicles, a coalition game was formulated in \cite{kumar2016energy} for a vehicular cloud environment. For each vehicle in the game, the authors proposed demand-supply based payoff mechanism to maximize the efficiency. More recently, the authors of \cite{hagenauer2017vehicular} proposed a micro cloud of vehicles to maintain reliable connectivity between vehicles and infrastructure. In view of the aggregation functionality of the cluster head, the authors showed the need for such a micro cloud. From the security and privacy standpoint, Joy \emph{et al}. in \cite{joy2018internet} discussed various security and privacy challenges for IoV. They also presented different approaches like crowdsourced authentication and haystack privacy for ensuring safe and secure communication in IoV. Using the studies of V2I and V2V communication modes, a predictive strategy for fog nodes was proposed by the Zhang \emph{et al}. in \cite{zhang2017mobile}. In a similar fashion, the authors of \cite{8318667} propose an offloading scheme for real-time management of fog-based IoV traffic. However, it was not clarified how to utilize vehicles beyond the range of fog nodes to offload load for traffic management servers. \textcolor{black}{We have observed that recent studies on IoV aim to address issues related to social networking, smart cities, and dissemination/ offloading of content. Very few studies have made an attempt to address the shortcomings of IoV to accommodate autonomous vehicles in the presence of legacy vehicles.} Moreover, since the legacy vehicles are most likely to coexist with the autonomous vehicles in coming decades \cite{litman2017autonomous}, the simplistic design of IoV is expected to under-perform in managing the scale and complexity of communication \cite{gupta2018authorization}. Thus, due to different attributes of legacy and autonomous vehicles, there is a need of infrastructure that is flexible enough to support both types of vehicles while simultaneously making the way for a smooth transition to fully autonomous transportation. \section{Features and Enabling Technologies of IoAV} \textcolor{black}{In this section, we describe the salient features of IoAV and discuss some key enabling technologies for practical realization of IoAV.} \subsection{Salient Features of IoAV} In the following, we define the essential features of IoAV to enable the convergence of legacy and autonomous vehicles and to pave the way for a fully autonomous transportation system. \subsubsection{Organization} One of the fundamental characteristics of IoAV is management and organization. Here, the intent is to free the human cognition from the perplexing details of vehicle maintenance and operations and to provide a communications platform that performs at peak 24/7. The IoAV would enable vehicles to adjust their operations in the face of software failures, change in communication components, and varying environmental conditions. The IoAV would also help vehicles in monitoring their own use and update softwares when needed. Especially, if the IoAV detects any malicious activity from a vehicle, it should have the capability to isolate it from the network and find a suitable alternative for passengers in the minimum amount of time. \subsubsection{Configuration} The optimal configuration is an important feature of the autonomous system \cite{litman2017autonomous}. For the IoAV, configuring a complex and large-scale system can be error-prone and time-consuming. \textcolor{black}{Thus, the communication system must be able to configure itself in accordance with the high-level policies that clearly specify what is desired by traffic control authorities. It is evident that the IoAV will have to accommodate several third-party components.} Therefore, much like a new cell is seamlessly included in the body, a self-configuring IoAV architecture would be able to integrate these third-party components. \subsubsection{Optimization} Tuning the performance of a complex system like IoAV may have an unexpected effect on the behavior of the entire system. \textcolor{black}{Just like a brain optimizes its performance through learning, the IoAV would be able to use a variety of contextual factors, given in Table \ref{tab_2}, to optimize the performance of applications. This new found intelligence would allow the system to recognize the tradeoff between two performance influencing factors.} For example, the system would be able to decide whether to assign downlink resources to an autonomous vehicle that is far away from the roadside unit or to serve two nearby autonomous vehicles using the same amount of transmit power. The IoAV would learn to make appropriate choices by monitoring, experimenting and tuning its own parameters. \subsubsection{Protection} This feature of self-protection in IoAV mainly deals with minimizing the effect of cascading failures and provide security against any malicious attacks. The IoAV would be self-sufficient in terms of identifying, localizing and defending both hardware and software against potential attacks. The IoAV can also use previous sensor data and monitor the behavior of autonomous vehicles and, subsequently, anticipate problems to avoid system failures. In case of a failure, the system must be capable to mitigate the effect of cascading failures -- thus avoiding the downfall of the entire vehicular network. \begin{table} \centering \caption{Classification of different contextual factors.} \label{tab_2} \begin{tabular}{|p{1.5cm}|p{2cm}|p{8cm}|} \hline \textbf{Contextual Factors} & \textbf{Property} & \textbf{Examples} \\ \hline \multirow{3}{*}{Technical} & System & Load migration ability and security of system \\ \cline{2-3} & Network & Signal-to-noise ratio (SNR) and channel availability \\ \cline{2-3} & Vehicle & Power usage and processing capabilities of vehicle \\ \hline \multirow{2}{*}{Usage} & Goal & Either enjoyment, exchange of information, or emergency broadcasting \\ \cline{2-3} & Attention & Background (in the form of voice) or foreground (in the form of live video) \\ \hline \multirow{2}{*}{Social} & Preferences & Preferences of users in terms of preferred application \\ \cline{2-3} & Consumption & Alone or in the form of a group \\ \hline \multirow{2}{*}{Economic} & Cost & Transmission and reception costs \\ \cline{2-3} & Subscription & Either service already subscribed/ registered \\ \hline \multirow{3}{*}{Temporal} & Time of Day & Services available during a specific period of the day \\ \cline{2-3} & Duration & Duration for which a service is available \\ \cline{2-3} & Frequency of Use & Based on how frequently users prefer a particular application \\ \hline \multirow{2}{*}{Physical} & Velocity & Speed at which the vehicle is moving \\ \cline{2-3} & Mobility Pattern & Urban, sub-urban or highway \\ \hline \end{tabular} \end{table} \subsection{Key Enabling Technologies} \textcolor{black}{Tried and tested approaches may not be enough to implement different features of IoAV. However, the remarkable amount of innovation seen in sensor technologies and cloud computing along with some recent developments on the wireless physical layer can provide means to realize the complete benefits of IoAV \cite{jameelinterference}. Motivated by this, the following sub-section provides details of some prospective enabling technologies for IoAV:} \subsubsection{Intelligent Sensing} Quite often, it can be observed that the focus of vehicular sensor network is mainly on a single type of sensor network. However, for IoAV, we envision that there would be a need for smart sensor technology consisting of the following three types of sensors: \begin{enumerate} \item Detection Sensors \item Ambient Sensors \item Backscatter Sensor Tags \end{enumerate} As illustrated in Figure \ref{fig.2}, detection sensors can be mounted in autonomous vehicles to identify different features of the environment and to monitor in-vehicle conditions. Ambient sensors can be part of the environment that can transfer data of legacy and autonomous vehicles to traffic management authorities \cite{litman2017autonomous}. Finally, backscatter sensors can embed connectivity in everyday objects. This can be useful for vehicles to get a collective perception of the outside environment. It can also help in detecting the vitals of the passengers. \begin{figure*}[!htp] \centering \includegraphics[trim={0 0cm 0 0cm},clip,scale=.9]{Figures/Block_2.pdf} \caption{\textcolor{black}{Intelligent sensing technology stabilizing the movement of autonomous vehicle in closed spaces. These sensors allow vehicles to navigate by collecting information like speed/ position calculation, battery-life of electric vehicles, and temperature inside/ outside the vehicle. They are also helpful in building a collective perception of the environment by gathering, processing and alayzing real-time information.}} \label{fig.2} \end{figure*} \subsubsection{Cloud Computing} \textcolor{black}{Cloud computing has revolutionized the way we access data on the Internet by virtualizing resources that can be accessed as a service \cite{joy2018internet}.} For IoAV, the concepts of \emph{distribution of integrated resources} and \emph{integration of distributed resources} are expected to be very important. This would also enable encapsulation of distributed resources in the cloud. \textcolor{black}{Recent studies have also indicated the utility of vehicular fog nodes. Vehicular fog nodes use fog computing mechanism to gather and process data from nearby vehicles. Using the croudsourced data over IoAV, autonomous vehicles can perform real-time analytics and optimize the performance of network instead of forwarding all the data to cloud.} \subsubsection{Vehicular Big Data} Big data can be used to extract the information behind the collected data from sensors, vehicles and other controlling agents in vehicular networks \cite{zhang2018vehicular}. Besides four \emph{Vs} of Big Data (i.e., Volume, Velocity, Variety, and Veracity), we propose that vehicular Big Data needs to add three additional \emph{Vs}. These \emph{Vs} are Viability (i.e., the collected information should be viable and valuable), Visibility (i.e., the analysis should be able to reveal invisible information from the data), and Validity (i.e., the duration for which information is considered to be valid). It is worth noting that the first four \emph{Vs} of vehicular Big Data indicate the appearance of data while the last three \emph{Vs} would represent the significance of data. \subsubsection{\textcolor{black}{Security Techniques}} \textcolor{black}{Security in vehicular networks is of critical importance as it can be exploited by malicious users to create chaos \cite{zhang2018vehicular}. This issue becomes more complex when there are both legacy and autonomous on the road. To simplify this complexity, physical layer security (PLS) has recently emerged as a complementary solution for conventional cryptographic techniques. Studies have shown that PLS can improve the secrecy performance and friendly jamming techniques can be employed by source, destination or a helper vehicle \cite{jameelinterference}. It is also important to prevent vehicles from broadcasting forged data. Blockchain-based reputation systems, in this regard, can be very helpful to construct a trust model for IoAV. This can be done by implementing efficient certificates and developing a transparent revocation policy.} \subsubsection{MmWave Vehicular Communications} The vehicular Big Data and Cloud computing are dependent on the reception of data from sensors and vehicles. Therefore, it is imperative to have Gbps communication links for IoAV using millimeter wave (mmWave). Not only mmWave can be employed for V2V communication, but it can also be used for V2I and intra-vehicle communications. Vehicles can share the raw sensing data from the neighboring vehicles using mmWave V2V links. \textcolor{black}{Other road safety applications can involve mmWave V2I links to gather the sensed data from vehicles and forwarded it to the cloud. Using the high data rate mmWave links, the autonomous vehicles can download real-time maps and live images of the streets.} \textcolor{black}{Several important bands can be used for mmWave-enabled IoAV including some 5G bands (like 28 GHz and 38 GHz) and unlicensed bands (like 60 GHz). As a sub-part of IoAV, automotive radar bands at 24 GH and 76 GHz can also be used for localization of mmWave-based autonomous vehicles.} \section{Architecture of IoAV} As with any emerging technology, communication services and systems of IoAV will be characterized by the convergence, assimilation, and integration of different paradigms of communications. \textcolor{black}{In this section, we adopt a bottom-up approach and provide a bird's eye view of the proposed architecture of IoAV. Unlike the architectures proposed for IoV, we find it meritorious to divide IoAV into three layers, i.e., Physical Layer, Virtual Layer, and Management Layer. As illustrated in Figure \ref{fig.3}, each layer has a key contribution in enabling IoAV services while simultaneously allowing construction of a platform for the real-time exchange of information. The physical layer technologies ensure sustainable, low-latency, and high data rate communication for the virtual layer which provides a flexible mechanism to manage resources under the higher-level policies outlined at the management layer. These layers are expected to make IoAV the admixture of both durability and interoperability, diversity and profundity, and most importantly, reliability and flexibility.} The following sub-sections entail a detailed description and contribution of each layer: \begin{figure*}[!htp] \centering \includegraphics[trim={0 0cm 0 0cm},clip,scale=.4]{Figures/Block_3.pdf} \caption{Three layers of IoAV. The physical layer is responsible for providing reliable and low-latency broadband services to the vehicles on the road. Virtual layer performs network functions like firewall, message routing, and online traffic controlling. Management layer is tasked to monitor the quality of services while ensuring fair execution of applications and security of information.} \label{fig.3} \end{figure*} \subsection{Physical Layer} The rapid growth of multimedia services and low-latency communication is influencing the design of future wireless networks. In this regard, quasi- and non-orthogonal multiple access techniques are the two main contenders to meet the future demands of spectrally efficient vehicular communications \cite{li20145g}. Cooperative jamming techniques for vehicular networks have also proven to be very effective for providing protection against eavesdropping attacks. Incentivized cooperation among vehicles can further improve the performance of IoAV without compromising the resources of any individual vehicle. For data rate hungry applications, mmWave communications at 28, 38, and 60 GHz can be exploited to increase the network capacity up to 10 times \cite{li20145g}. Beam tracking and beam alignment technologies using massive multiple-input-multiple-output (MIMO) technology can ensure sensing and detection of autonomous/ legacy vehicles. Wireless power transmission techniques are being developed for charging vehicles in the parking and for cooperative V2V charging of nearby electric vehicles. Above all, the green communications techniques like simultaneous wireless information and power transfer (SWIPT) have the potential to charge small sensors along the road or a highway, thus, paving the way for battery-less charging of sensors \cite{jameelinterference}. \subsection{Virtual Layer} This layer is implemented on top of general purpose hardware that provides a framework for virtualizing the network services. In this way, simple service compositions can be interconnected to create more complex services. Edge and fog computing paradigms can assist virtualization of resources by providing distributed storage and computing infrastructure. Elasticity would be one of the key factors influencing the performance of IoAV. Elasticity techniques studied for centralized Cloud data centers may not be enough for efficiently managing the complex and large-scale communication environment caused by the coexistence of legacy and autonomous vehicles. At peak traffic hours, the demanding infrastructure of IoAV would require end-to-end elasticity, both horizontally and vertically. Along these lines, the virtual layer would enable strong coordination among edge and the Cloud. Given that the Cloud already knows the elasticity demands from the edge, it can provide resources to the vehicles in a more efficient manner. Thus, the virtual layer would have dual responsibilities, i.e., to guarantee elasticity across layers, and to ensure end-to-end elasticity across subsystems like legacy/ autonomous vehicles, network function (edge/ fog systems), and Cloud data centers. \subsection{Management Layer} The management layer is the top layer for managing multiple heterogeneous, adaptive, and geo-distributed resources. Besides having the infrastructure- and contextual-awareness \cite{zhang2018vehicular}, efficient utilization of these resources would ensure smooth operation of different computing infrastructure. Especially in the case of autonomous vehicles, this management layer needs to designed to execute continuum set of applications, to expose different view of infrastructure, and to manage Cloud and edge/fog resources. Fair execution of different applications is another task of the management layer by allowing distributed resources to announce availability; an essential to maintain end-to-end elasticity. Issues related to monitoring, accountability, and security (that arise from data distribution, mobility/ interaction of vehicles, multi-tenancy of infrastructure) would also be ensured by the management layer. Stakeholders including transportation control authorities, Internet service providers, and automotive industries would have accessibility to different levels of information. Thus, the management layer would be extremely helpful in creating a disseminated trustworthy communication ecosystem. Finally, the dispersed nature of IoAV would also enable dynamic pricing mechanism through the efficient management of resources. This would help in developing efficient and reliable business models for encouraging and supporting autonomous vehicles. \textcolor{black}{\section{Performance Evaluation} This section presents a case study of multi-vehicle offloading scenario to validate the performance of IoAV architecture. Vehicles may be required to transfer the large-volume of data for real-time applications like augmented reality/ virtual reality. Thus, we consider the setup where multiple legacy and autonomous vehicles try to offload their data via wireless access to the resource-rich cloud. \subsection{Experimental Setup} We consider a single-lane highway scenario having both autonomous and legacy vehicles at a uniform distance under Saleh-Valenzuela channel model. \textcolor{black}{We deploy 10 vehicles on the road including 5 autonomous vehicles and 5 legacy vehicles, wherein, each vehicle has 100 MB data to upload to the cloud.} The experimental setup involves the following three cases: \begin{itemize} \item \emph{Case 1:} This case corresponds to the IoAV architecture where mmWave-based massive MIMO architecture is considered to be equipped with 128 antennas and 500 MHz bandwidth. Resource allocation is performed based on the vehicle type. Since autonomous vehicles require permanent connectivity to the Internet, they are considered to use orthogonal multiple access (OMA), whereas, the legacy vehicles use NOMA. \item \emph{Case 2:} This case is similar to \emph{Case 1}, however, here we consider that both the legacy and autonomous vehicles use orthogonal time-frequency resources. In other words, vehicles in the same beam are considered to use the same orthogonal resources and OMA is performed for all the interfering vehicles. \item \emph{Case 3:} In this case, we consider that each MIMO beam only supports a single vehicle and that both types of vehicles use OMA. This also means that the number of RF beams is equal to the number of vehicles in the network. \end{itemize} \subsection{Performance Evaluation} We consider two performance metrics for offloading the data to the cloud, i.e., transmission time and energy which is consumed during offloading the data. As shown in Figure \ref{fig.res}(a), we have plotted transmission time as a function of signal-to-noise ratio (SNR). It can be seen that the average transmission delay decreases for the \emph{Case 1}, \emph{Case 2}, and \emph{Case 3}. \textcolor{black}{However, \emph{Case 1} significantly outperforms \emph{Case 2} and \emph{Case 3} in terms of offloading delay.} For SNR of just 10 dB, the transmission time reduces 30 sec due to higher data rates of IoAV for offloading the data. To further highlight the utility of IoAV, Figure \ref{fig.res}(b) shows consumed energy against the increasing values of SNR. Note that the energy consumption is lowest for \emph{Case 1}, whereas, it is highest for \emph{Case 3}. The difference in consumed energy between \emph{Case 1} and \emph{Case 3} increases with the increase in SNR which indicates the effectiveness of IoAV at higher values of SNR.} \begin{figure*}[!htp] \centering \begin{tabular}{c} \includegraphics[trim={0 0cm 0 0cm},clip,scale=.4]{Figures/fig11.eps} \\ (a) \\ \includegraphics[trim={0 0cm 0 0cm},clip,scale=.4]{Figures/fig22.eps} \\ (b) \end{tabular} \caption{\textcolor{black}{Performance of IoAV architecture (a) Transmission time (b) Energy against SNR.}} \label{fig.res} \end{figure*} \section{\textcolor{black}{Social and Technical Challenges of IoAV}} Due to the involvement of both legacy and autonomous vehicles, the challenges of IoAV range from social to technical domains. In the following, we will describe these challenges in detail. \subsection{Social Challenges} Technical progress is rapidly altering the social risk constellation. In many cases, the improvement in technology has raised the level of security and correspondingly shown positive results such as longer life expectancy, and greater prosperity. However, the technical innovation, inevitably, often leads to unintended and unforeseen consequences giving birth to new types of social dilemmas. Therefore, we now enumerate a few social challenges that need to be explored further to gain maximum benefit of IoAV: \begin{itemize} \item The dispersion of resources also means dispersion of responsibility. In a technology involving legacy and autonomous vehicles, the system errors cannot be ruled out which can lead to accidents involving property damage or personal injury. Therefore, a clear legal and financial model is required to assign responsibilities to different stakeholders of the IoAV. \item With the inclusion of a mixed legacy and autonomously systems, the interaction of users with vehicles would completely change. Thus, there will be a need for redefining the boundaries of public and private information. These boundaries can, either positively or negatively, impact the decision-making process of the IoAV in the long run. \item Closely related to the success of IoAV is modeling the user behaviors of legacy vehicle drivers in the presence of autonomous vehicles. The question is: what qualities do people attribute to autonomous vehicles? Are they valued less competent compared to human drivers, or are they considered to be perfectly functioning vending machines? One of the aims of an introductory IoAV strategy must be painting a realistic picture of autonomous vehicles in the consciousness of all road users. \item As mentioned above, incentivized cooperation among vehicles can further improve the performance of IoAV. However, the formulation of incentive-based mechanisms in IoAV is a social research challenge. The vehicles may not be willing to share resources like exchanging energy or forwarding data. Efficient incentive (monetary or resource-based) techniques using the behavioral models of drivers can motivate the public to participate in V2V cooperation in IoAV. \end{itemize} \subsection{Technical Challenges} Technical issues in IoAV may stem from the hardware impairments, incapability of existing cellular networks, and lack of energy management solutions. A brief description of these challenges is provided as follows: \begin{itemize} \item Hardware impairments have always been a weak spot of wireless devices. \textcolor{black}{This weakness can become a breaking point for mmWave-enabled IoAV. Due to the involvement of multi-tenant third-party components, inexpensive and un-optimized mmWave communication equipment can hamper the realization of a fully functional IoAV.} In the worst case, it can further deteriorate the performance of network leading to traffic accidents and associated damage to the living things. \item The existing cellular infrastructure lacks many features that are necessary to implement large-scale IoAV. Although some connectivity arrangements using cellular networks are possible for legacy vehicles, the data rates and latency requirements of autonomous vehicles are very stringent. Moreover, the co-existence of both autonomous and legacy vehicles would require extensive use of machine learning algorithms; something which existing infrastructure is not capable to handle on a large-scale. \item Most of the components of IoAV will consist of resource-constrained devices, therefore, the lack of suitable energy management techniques can impede the realization of IoAV. It is expected that the future devices (including sensors and backscatter tags) would have large battery-life. \textcolor{black}{Moreover, aside from its obvious benefits, fog computing may result in rapid depletion of batteries of electric vehicles. The vehicular fog nodes are expected to consume more energy as compared to conventional vehicles. Thus, managing real-time information exchange over fog vehicular nodes would be an important yet challenging issue for the IoAV.} \item The IoAV will provide services like logistics, intelligent transportation, and vehicle sharing. These services will rely on a range of application requiring low data rates and non-real-time to the more demanding ones having high-speed real-time communications requirements. Therefore, one of the major research challenges for the IoAV would be designing efficient and intelligent routing management techniques \cite{zhang2018vehicular}. We also anticipate that the success of the IoAV will be dependent on smooth interoperability of contemporary and forthcoming mobility management techniques with an aim to achieve a higher number of connected vehicles. \end{itemize} \section{Conclusion} The autonomous vehicles are expected to bring radical changes in mobility patterns of the people. However, the current state of technology may not be completely sufficient in realizing the aspiration of seamlessly connected vehicles. We have shown that simply connecting all the vehicles to the Internet is not the solution and, therefore, it is necessary to avoid the pitfalls associated with connecting legacy and autonomous vehicles. In this regard, we have identified deficiencies in the existing IoV model and proposed the IoAV architecture which incorporates both legacy and autonomous vehicles. We have also highlighted the key features, applications, and enabling technologies for IoAV. \textcolor{black}{The initial results on the architecture of IoAV show how the interplay of these enabling technologies would provide performance improvement.} In the end, numerous socio-technical research challenges have also been identified that merit further investigation. \section*{Acknowledgment} \ifCLASSOPTIONcaptionsoff \newpage \fi \bibliographystyle{IEEEtran}
\section*{ACKNOWLEDGMENTS} \bibliographystyle{ieeetr} \section{COUPLING TERMS for DEAD-ZONE FREE and GUIDED OBSTACLE AVOIDANCE} \label{sec:coupling_terms} The proposed hierarchical framework to learn and produce generalisable obstacle avoidance behaviours regardless of the scenario comprises three layers. The \ac{DMP}-based action level is formalised as a composition of two coupling terms which (i)~generate robust obstacle avoidance behaviours, and (ii)~guide these in a particular direction of the task space. The parametrisation needs of these terms allow for regulating their actuation scope via reasoning at the decision level. \subsection{Inherently Robust Obstacle Avoidance} \label{sec:ct_avoiding} Current coupling terms for obstacle avoidance in the literature suffer from dead-zones, i.e. a heading range towards the obstacle for which the system becomes incoherently less reactive. Ideally, the expected behaviour of those terms would be to become more reactive as (i)~the heading of the system is more aligned towards an obstacle, and (ii)~the system-obstacle distance is smaller. Bearing these conditions in mind, the coupling term in \eref{eq:oa_main}-\eref{eq:oa_original} is reformulated as: \begin{align} C_{\mbox{\tiny OA}}(\boldsymbol{\cdot}) = \mathbf{R} \; \mathbf{\dot{x}} \; \alpha\sign(\theta)\exp\!\left(\!\!-\frac{\theta^2}{\psi^2} \!\right)\exp \!\left(\!-\kappa \thinspace d^2 \right)\!, \label{eq:oa_complete} \end{align} where ${\alpha\sign(\theta)\exp\!\left(\!-{\theta^2}/{\psi^2}\right)\!}$ addresses the first issue by shaping the absolute change of steering angle as a zero-mean Gaussian-bell function, and ${\exp\!\left(\!-\kappa \, d^2 \right)}\!$ tackles the second requirement by regulating the coupling term effect according to a parameter~$k$ and the system-obstacle distance~$d$. \fref{fig:oa} highlights the increase in robustness of the formulated coupling term~\eref{eq:oa_complete} in contrast to the original term~\eref{eq:oa_main}-\eref{eq:oa_original}. While the original coupling term (black curves) produces low reactivity for narrow headings towards an obstacle, the dead-zone free proposal (red curves) reacts the most (see \fref{fig:oa_comparison}). This reformulation has a significant impact in the task space, where~\eref{eq:oa_complete} succeeds on a scenario where~\eref{eq:oa_main}-\eref{eq:oa_original} fails to generate an obstacle avoidance behaviour which does not collide with the point-mass obstacle (see \fref{fig:oa_example}). \begin{figure}[t] \centering \subfloat[]{\includegraphics[height=1.66cm]{./Figures/oa_comparison.pdf} \label{fig:oa_comparison}} \subfloat[]{\includegraphics[height=1.66cm]{./Figures/oa_example.pdf} \label{fig:oa_example}} \caption{Dead-zone issue in the original~\eref{eq:oa_main}-\eref{eq:oa_original} (black) and proposed~\eref{eq:oa_complete} (red) coupling terms. (a)~\eref{eq:oa_complete} reacts for narrow headings towards the obstacle. (b)~\eref{eq:oa_main}-\eref{eq:oa_original} fails where~\eref{eq:oa_complete} smoothly circumvents the point-mass obstacle (grey circle).} \label{fig:oa} \end{figure} \subsection{Guiding the Obstacle Avoidance Reactivity} \label{sec:ct_guiding} \begin{figure}[b!] \vspace{-0.2cm} \centering \subfloat[]{\includegraphics[height=2cm]{./Figures/rs_one_obs_rot_thick.pdf} \label{fig:rs_one_obs}} \subfloat[]{\includegraphics[height=2cm]{./Figures/rs_two_obs_rot_thick.pdf} \label{fig:rs_two_obs}} \caption{Route selection for obstacle avoidance in (a)~single and (b)~multi-object setups. Reactive avoidance (blue), one-time decision (red), two-times decision (green).} \label{fig:direction_guidance} \end{figure} The velocity vector $\mathbf{\dot{x}}$ of a point-mass system also represents the system's orientation. Consequently, $\mathbf{\dot{x}}$ plays a critical role in determining both the actuation $\textsc{P}$-plane and the direction of turning~$\dot{\theta}$. Overall, the behaviour encapsulated in~\eref{eq:oa_complete} consists of turning to the opposite direction where the obstacle is with respect to the system's heading or velocity vector $\mathbf{\dot{x}}$. Although this reactive motion might be the safest behaviour in front of an obstacle, there are many situations where guiding the system towards a particular route might be of interest, such as in constrained environments or when aiming for a trajectory providing a minimum cost. Given the influence of the system's heading $\mathbf{\dot{x}}$ on the overall obstacle avoidance reaction, it is natural to modulate $\mathbf{\dot{x}}$ to guide the reactivity of~\eref{eq:oa_complete} through a preferred route. Within the \ac{DMP} motion descriptor, this can be formulated through a coupling term that creates an attractive forcing term to reduce the heading error $\hat{\theta}$ between the current $\mathbf{\dot{x}}$ and a desired $\mathbf{\dot{x}}_d$ system's direction as: \begin{align} C_{\mbox{\tiny HG}}(\boldsymbol{\cdot}) = \mathbf{R}^\prime \; \mathbf{\dot{x}} \; \alpha \; \hat{\theta} \; \exp \! \left(1 + \kappa \thinspace d^2 \right) \label{eq:oa_rs} \end{align} where ${\mathbf{R}^\prime \in \mathrm{SO}(3)}$ is a $\pi/2$ rotation matrix around the vector ${\mathbf{r}^\prime = \mathbf{\dot{x}} \times \mathbf{\dot{x}}_d}$, and the term ${\alpha\exp\!\left(1 + \kappa \thinspace d^2 \right)}$ ensures that \eref{eq:oa_complete} and \eref{eq:oa_rs} act in counterphase when parameterised for the same $\alpha$~and~$\kappa$. This is, \eref{eq:oa_rs} uniquely modifies the system's heading when not in proximity to obstacles, where \eref{eq:oa_complete} takes over the control to ensure the system's safety. \subsection{Coupling Terms Composition} \label{sec:ct_composition} \fref{fig:direction_guidance} depicts the significance of using~\eref{eq:oa_complete} in conjunction with~\eref{eq:oa_rs} to perform route selection of obstacle avoidance. This is formalised within the \ac{DMP} in \eref{eq:dmp_1}-\eref{eq:dmp_2} as the composition of coupling terms ${C(\boldsymbol{\cdot}) = \sum_i C_{\mbox{\tiny OA}}^{\,i}(\boldsymbol{\cdot}) + C_{\mbox{\tiny HG}}^{\,i}(\boldsymbol{\cdot})}$, where $C_{\mbox{\tiny OA}}^{\,i}(\boldsymbol{\cdot})$ and $C_{\mbox{\tiny HG}}^{\,i}(\boldsymbol{\cdot})$ generate the corresponding forcing terms with respect to the $i^{th}$ obstacle in the scenario. This composition allows, in a single-obstacle scenario (see \fref{fig:rs_one_obs}), to guide the reactive behaviour (blue trajectory) in a different direction (red trajectory) by temporarily defining the initial desired heading towards the upper part of the task space. The same applies to multi-obstacle environments (see \fref{fig:rs_two_obs}), where the system's heading can be modified at multiple decision points to obtain a preferred route (green trajectory). In both scenarios, the actuation scope of the coupling term for guiding the system was set manually for illustration purposes. Alternatively, these decision points could be defined by a task-dependant module. \subsection{Proof of Lyapunov's Stability} \label{sec:ct_proof} The addition of coupling terms can imperil the inherent stability properties of \acp{DMP}~\cite{ijspeert2013dynamical}. Authors in~\cite{rai2014learning} proved with Lyapunov's theory that the overall dynamical system remains stable when the coupling terms generate a forcing term orthogonal to the system's velocity vector. The coupling terms formulated in \eref{eq:oa_complete} and \eref{eq:oa_rs} satisfy this condition, therefore proving the global stability of the proposed action level. \section{RELATED WORK} \label{sec:background} This paper proposes a reactive approach that endows a system with the ability to modulate its policy to avoid unexpected obstacles. The selected strategy uses \acp{DMP} for encoding any desired policy and defining an obstacle avoidance behaviour as a coupling term. This section introduces \acp{DMP} and coupling terms for obstacle avoidance as they constitute the fundamentals of this work. \subsection{Dynamic Movement Primitives} \label{sec:background_dmp} \Acp{DMP} are a versatile framework that encode primitive motions or policies as nonlinear functions called forcing terms~\cite{ijspeert2013dynamical}. The \acp{DMP} equations define the system's state transition, which can be converted into actuator commands by means of inverse kinematics and inverse dynamics. For a one-\ac{DoF} system, the system's state transition is described by the following set of nonlinear differential equations, known as the transformation system: \begin{align} \tau \dot{z} &= \alpha_x (\beta_x (g_{x} - x) - z) + f(\boldsymbol{\cdot}) + C(\boldsymbol{\cdot}), \label{eq:dmp_1} \\ \tau \dot{x} &= z, \label{eq:dmp_2} \end{align} where $\tau$ is a scaling factor for time, $x$ is the system's position, $z$ and $\dot{z}$ respectively are the scaled velocity and acceleration, $\alpha_x$ and $\beta_x$ are constants defining the attraction dynamics towards the model's attractor $g_{x}$, and $f(\boldsymbol{\cdot})$ and $C(\boldsymbol{\cdot})$ are the forcing and coupling term, respectively. The forces generated by the forcing and coupling terms define the transient behaviour of the transformation system. It is common to model the forcing term $f(\boldsymbol{\cdot})$ as a weighted linear combination of nonlinear \acp{RBF}. The evaluation of $f(\boldsymbol{\cdot})$ at phase ${k \in \mathbf{k}}$ is defined as: \begin{align} f(k) &= \frac{\sum_{i=1}^N w_i\Psi_i(k)}{\sum^N_{i=1} \Psi_i(k)} \; k, \label{eq:dmp_rbf} \end{align} \vspace{-0.4cm} \begin{align} \Psi_i(k) &= \exp\mathopen{}\left(-h_i(k-c_i)^2 \right)\mathclose{}, \label{eq:dmp_rbf_def} \end{align} where $c_i$ and $h_i > 0$ are the centres and widths, respectively, of the $i \in [1, \; N]$ \acp{RBF}, which are weighted by $w_i$ and distributed along the trajectory. The weights can be initialised via imitation learning and used to reproduce the motion with some generalisation capabilities to changes in start and goal positions. The duration of the motion can be adjusted by the scaling factor $\tau$, which modifies the canonical system defining the transient behaviour of the phase variable $k$ as: \begin{align} \tau \dot{k} = -\alpha_k k, \label{eq:canonicalsystem} \end{align} where the initial value of the motion's phase $\mathbf{k}(0) = 1$ and $\alpha_k$ is a positive constant. A common strategy to extend the spatial generalisation capabilities of \acp{DMP} is to reference them in a local frame, whose pose in the space is task-dependent~\cite{ijspeert2013dynamical,rai2017learning}. In this work's context, the unit vectors of the local frame are defined as follows: the x-axis points from the start position towards the goal position, the z-axis points upwards and is orthogonal to the local x-axis, and the y-axis is orthogonal to both local x-axis and z-axis following the right-hand convention. A robot with multiple \acp{DoF} uses a transformation system for each \ac{DoF}, but they all share the same canonical system. \subsection{Coupling Terms for Obstacle Avoidance} \begin{figure}[b!] \vspace{-0.2cm} \centering \subfloat[]{\includegraphics[clip,trim={2.65cm 0.6cm 0.8cm 0},width=4.5cm]{./Figures/oa_sketch_with_plane.pdf} \label{fig:oa_scheme}} \hspace{-1cm} \subfloat[]{\includegraphics[height=2.8cm]{./Figures/oa_original.pdf} \label{fig:oa_original}} \caption{Original coupling terms for obstacle avoidance~\cite{hoffmann2009biologically}. (a)~Heading angle $\theta$ according to velocity vector $\mathbf{\dot{x}}$ and the relative obstacle-system position in $\textsc{P}$-plane. (b)~Change of steering angle $\dot{\theta}$ subject to heading angle $\theta$ as defined by~\eref{eq:oa_original}.} \label{fig:oa_overall_original} \end{figure} Early coupling terms for obstacle avoidance were formulated as repulsive potential fields~\cite{park2008movement,khansari2012dynamical}. Potential fields suffer from local minima and can be computationally expensive to calculate on the fly. Alternatively, some coupling terms analytically formalise the influence of an obstacle on the system's behaviour~\cite{hoffmann2009biologically}. As depicted in \fref{fig:oa_scheme}, a point-mass system with position~${\mathbf{x}\in\mathbb{R}^3}$ and velocity~${\mathbf{\dot{x}} \in \mathbb{R}^3}$ has a heading~${\theta \in \mathrm{SO}(2)}$ towards a point-mass obstacle. To avoid a collision, the coupling term generates a repulsive force: \begin{align} C(\boldsymbol{\cdot}) = \mathbf{R} \; \mathbf{\dot{x}} \; \dot{\theta}, \label{eq:oa_main} \end{align} where ${\mathbf{R} \in \mathrm{SO}(3)}$ is a $\pi/2$ rotation matrix around the vector ${\mathbf{r} = (\mathbf{x}_{obstacle} - \mathbf{x}) \times \mathbf{\dot{x}}}$. The respective obstacle-system position ${\mathbf{x}_{obstacle} - \mathbf{x}}$ and the system's velocity $\mathbf{\dot{x}}$ define the plane $\textsc{P} \in \mathbb{R}^2$ where the system is desired to steer away from the obstacle with a turning velocity $\dot{\theta}$ defined as: \begin{align} \dot{\theta} = \gamma \; \theta \exp \!\left(-\beta \; |\theta| \right)\!, \label{eq:oa_original} \end{align} where $\gamma$ and $\beta$ respectively scale and shape the mapping ${\theta \rightarrow \dot{\theta}}$ defined in \eref{eq:oa_original} and represented in \fref{fig:oa_original}. Building on \eref{eq:oa_main}-\eref{eq:oa_original}, human demonstrations were used to retrieve the required parameters to circumvent two non-point obstacles, particularly a sphere and a cylinder~\cite{rai2014learning}. More recently, coupling terms were formulated as independent \acp{NN} modelling the desired obstacle avoidance behaviour for a sphere, a cylinder and a cube~\cite{rai2017learning}. These methods do not provide any strategy to avoid obstacles not observed in training time, and they rely on markers identifying an obstacle's boundaries. Their evaluations are conducted either in simulation or in single-obstacle scenarios. Hence, their performance in realistic scenarios is yet to be tested. \subsection{Discussion and Contribution} \label{sec:background_discussion} State-of-the-art on coupling terms modelling obstacle avoidance behaviours suffers from four major limitations. First, as illustrated in \fref{fig:oa}, the analytical term \eref{eq:oa_main}-\eref{eq:oa_original} has a dead-zone where the system becomes less reactive as the heading towards the obstacle narrows, thus compromising the method's reliability. Second, there is no strategy to guide the behaviour's reactivity towards a preferred route to circumnavigate an obstacle. For example, in the scenario depicted in \fref{fig:intro}, there is no constraint on the reactive behaviour preventing the system from hitting the table. Third, when attempting to deal with non-point obstacles, their performance drastically decreases for novel scenarios due to the absence of global features identifying the obstacle geometry during the learning process. Fourth, these works learn the coupling terms from demonstration, which can be time-consuming and prone to measurement noise. All these issues are jointly addressed within the proposed hierarchical framework, which hybridises the versatility of \acp{DMP} and the strengths of learning techniques. Specifically, in \sref{sec:coupling_terms}, \eref{eq:oa_main}-\eref{eq:oa_original} is reformulated at the action level as a conjunction of coupling terms whose obstacle avoidance behaviour is dead-zone free and can be guided. Then, in \sref{sec:geometry}, the formalised action level is exploited to learn via exploration of the parameter space how to regulate the behaviour subject to both the end-effector's and obstacle's geometric properties. This work considers a unified system-obstacle low-dimensional geometric descriptors identifying the relevant features to the action level, thus allowing for enhanced generalisation even in novel real-world scenarios. \section{EXPERIMENTAL EVALUATION} \label{sec:results} The proposed framework has been evaluated in simulated environments and on a physical system. This section first explains the training of the \ac{RC} model via exploration of the parameter space. Thereafter, it reports the performance and generalisation capabilities of the proposed approach in familiar and novel obstacle avoidance settings. Finally, this section details the deployment of the proposed framework on an anthropomorphic Franka Emika Panda arm engaged in a start-to-goal policy in the presence of unplanned obstacles. An extended illustration of the experimental evaluation is documented in: \mbox{\url{https://youtu.be/lym5cCbjI3k}}, and the corresponding source code can be found in: \mbox{\url{https://github.com/ericpairet/ral_2019}}. \subsection{Training the \ac{RC}-based Learning Module} \label{sec:results_training} \begin{table}[b] \vspace{-0.2cm} \centering \begin{tabular}{lcccccc} \toprule & \multicolumn{2}{c}{$\text{NMSE}(Y_1)$} & \multicolumn{2}{c}{$\text{NMSE}(Y_2)$} & \multicolumn{2}{c}{$\text{NMSE}(Y_3)$} \\ \cmidrule(lr){2-3} \cmidrule(lr){4-5} \cmidrule(lr){6-7} & train & test & train & test & train & test \\ \cmidrule{2-7} \ac{RC}($\boldsymbol{\lambda}^{\prime}$) & 0.539 & 0.543 & 0.802 & 0.802 & 0.893 & 0.897 \\ \ac{RC}($\boldsymbol{\lambda}^{\prime}$, $\Delta$) & 0.251 & 0.253 & 0.244 & 0.243 & 1.6e-4 & 1.7e-4 \\ \bottomrule \end{tabular} \caption{Prediction error on every single target of the two modelled \ac{RC} architectures for the training and test datasets.} \label{tab:nn_training} \end{table} This work has designed a \ac{RC}-based learning module to regulate the action level according to a unified obstacle-system descriptor $\boldsymbol{\lambda}^{\prime}$ and a possible clearance constraint $\Delta$. The unconstrained model is denoted as \ac{RC}($\boldsymbol{\lambda}^{\prime}$), while the constrained model is referred to as \ac{RC}($\boldsymbol{\lambda}^{\prime},\Delta$). The training of these models is conducted leveraging the knowledge of the action level to create a synthetic dataset via exploration of the parameter space. This is, given different obstacle avoidance scenarios, training explores the parameters ${\{\alpha, \psi, \kappa\}}$ of the coupling term~\eref{eq:oa_complete} generating a collision-free trajectory. Bearing in mind that the learning module uniquely regulates the action level along its plane of actuation, $100$ synthetic scenarios were created to simulate possible intersections between a unified system-obstacle ellipsoid approximation and the actuation plane $\textsc{P} \in \mathbb{R}^2$. This resulted in $100$ ellipses parameterised with semi-axis values ${\boldsymbol{\lambda}^{\prime}=(\lambda_{1}^{\prime}, \lambda_{2}^{\prime})}$ uniformly sampled in the range $2.5$ to $25$cm. Each of these sections was placed in the middle of a one-metre length start-goal baseline. For each scenario, a set of trajectories were generated using \eref{eq:oa_complete} with a ${50\times50\times50}$ grid of the parameters ${\{\alpha, \psi, \kappa\}}$. Only those input-target ${\{(\lambda_{1}^{\prime}, \lambda_{2}^{\prime}),(\alpha, \psi, \kappa)\}}$ pairs involving a collision-free trajectory were integrated into the dataset along with the resulting clearance. The \ac{RC} architectures were trained using a $70\%$ of the synthetic dataset. Each \ac{NN} was trained independently using the Levenberg-Marquardt algorithm with a random initialisation of the weights and biases. The remaining $30\%$ of the dataset was used to test the performance of the trained \ac{RC} models. Since the aim of a \ac{RC} model is to reduce the prediction error on every single target~\cite{spyromitros2016multi}, each model $Y_i$ was validated by computing the \ac{NMSE} on the training and testing sets. As shown in \tref{tab:nn_training}, the parameter prediction error of the models reduces significantly when considering the clearance in the input vector $\mathbf{h}$. This is because the clearance allows differentiating the influence of the targets among all possible collision-free trajectories. It is worth noting that the performance of the \ac{RC} does not deteriorate when being evaluated on the test set \subsection{Experiments on Familiar Scenarios} The performance of both \ac{RC}($\boldsymbol{\lambda}^{\prime}$) and \ac{RC}($\boldsymbol{\lambda}^{\prime},\Delta$) models in the $\textsc{P}$-plane space was evaluated for the same obstacle geometries as in the training dataset, i.e. $100$ ellipses. For the \ac{RC}($\boldsymbol{\lambda}^{\prime},\Delta$) model, the considered constraints on the clearance were $\Delta=\{0.05, 0.1, 0.15, 0.2, 0.25\}$ metres. All six models were evaluated with and without scaling the trajectory duration $\tau$ according to its estimated length as explained in \sref{sec:geometry_route_goal_convergence}. Overall, this led to the testing of the \ac{RC} architecture under $12$ different settings. Performance in the $\textsc{P}$-plane space was evaluated for the metrics (i)~number of collisions, (ii)~minimum distance to an obstacle (clearance), and (iii)~distance to goal (convergence). The obtained results over the $1{,}200$ scenarios are illustrated in~\fref{fig:results_similar}. \fref{fig:results_similar_clearance} and \fref{fig:results_similar_convergence} respectively represent the clearance to the obstacle and convergence to the goal for the $1{,}200$ scenarios evaluated across the $12$ settings of the \ac{RC} architecture. Overall, constraining the model with a desired clearance leads to more bounded behaviours. However, as the clearance constraint increases, the convergence rapidly deteriorates for those models not scaling the trajectory duration (red boxes). Instead, when scaling the time (black boxes), the convergence is at most of $3$cm for the most constrained model \ac{RC}($\boldsymbol{\lambda}^{\prime},0.25$). This fact highlights the importance of scaling the time when larger trajectories are required. Indifferently from the model setup, none of the $1{,}200$ conducted tests resulted with a trajectory colliding with an obstacle. The remainder of the experimental evaluation is conducted with the \ac{RC}($\boldsymbol{\lambda}^{\prime},0.15$) model and scaling the trajectory duration according to its estimated length. \begin{figure}[t] \vspace{-0.3cm} \centering \subfloat[]{\includegraphics[height=5cm]{./Figures/results_similar_clearance.pdf} \label{fig:results_similar_clearance}} \subfloat[]{\includegraphics[height=5cm]{./Figures/results_similar_convergence.pdf} \label{fig:results_similar_convergence}} \caption{(a)~Clearance and (b)~convergence of the avoidance behaviours generated in familiar scenarios, when scaling the trajectory duration (black plots) and when not (red plots).} \label{fig:results_similar} \vspace{-0.3cm} \end{figure} \subsection{Experiments on Novel Scenarios} \label{sec:results_unseen} Given the variety of obstacle avoidance scenarios that a system may face in the real-world, the proposed \ac{RC}($\boldsymbol{\lambda}^{\prime},0.15$) model was evaluated for its performance and generalisation capabilities on scenarios not seen during the training process. Notably, the approach was tested for its suitability to deal with \ac{3D} obstacles via the extraction of relevant unified low-dimensional geometrical features laying on the $\textsc{P}$-plane as described in \sref{sec:geometry_sq}. Novel \ac{3D} scenarios were created by sampling the location and dilated geometry of the obstacle randomly. The obstacle was arbitrarily located along the x-axis between the start and goal configurations preserving $5$cm of margin, and around the baseline between $\minus0.4$ and $0.4$m along both the y-axis and z-axis. The unified system-obstacle ellipsoid approximation had random width, height and length within the spectrum $5$ to $50$cm, leading to representative candidates of possible object geometries in real-world environments. This spectrum corresponds to semi-axis values $\lambda_1$, $\lambda_2$ and $\lambda_3$ laying in the range $2.5$ to $25$cm. These boundaries also ensured that none of the extracted low-dimensional features $\boldsymbol{\lambda}^{\prime}$ would result beyond the limits for which the \ac{RC} model was trained for. A $1{,}000$ novel \ac{3D} scenarios were created for the different start-to-goal baselines of $0.5$, $1.0$, $1.5$ and $2.0$m along the x-axis of the local frame, adding up to a total of $4{,}000$ evaluations. The semi-axis $\lambda_1$ was limited to a maximum of $20$cm for the baseline of $0.5$m to be consistent with the $5$cm margin across experiments. All environments required the action level to modulate a start-to-goal policy to avoid collision and preserve the desired clearance. Out of the $4{,}000$ tests, $1{,}296$ environments already had the baseline in collision with the obstacle. The performance of \ac{RC}($\boldsymbol{\lambda}^{\prime},0.15$) on the unseen settings was evaluated for the metrics (i)~number of collisions, (ii)~clearance to an obstacle, and (iii)~convergence to goal. \tref{tab:results_unseen_metrics} summarises the extracted metrics across the evaluation, and \fref{fig:results_unseen} depicts the performance of the proposal on some novel single and multi-obstacle settings. \begin{table}[t] \centering \begin{tabular}{lccccc} \toprule & \multicolumn{2}{c}{Clearance to} & \multicolumn{2}{c}{Convergence} & $n^\circ$ of \\ & \multicolumn{2}{c}{obstacle [m]} & \multicolumn{2}{c}{to goal [m]} & collisions \\ \cmidrule(lr){2-3} \cmidrule(lr){4-5} & mean & min & mean & max & \\ \cmidrule{2-6} Goal at $0.5$m & 0.144 & -5.01e-4 & 4.41e-4 & 0.017 & 2 \\ Goal at $1.0$m & 0.184 & 0.060 & 4.23e-4 & 0.017 & 0 \\ Goal at $1.5$m & 0.196 & 0.068 & 5.22e-4 & 0.023 & 0 \\ Goal at $2.0$m & 0.202 & 0.076 & 6.49e-4 & 0.027 & 0 \\ \bottomrule \end{tabular} \caption{Clearance, convergence and number of collisions of the trained \ac{RC}($\boldsymbol{\lambda}^{\prime},0.15$) model for $4{,}000$ novel settings.} \label{tab:results_unseen_metrics} \vspace{-0.2cm} \end{table} \begin{figure}[b] \vspace{-0.2cm} \centering \subfloat[]{\includegraphics[height=2.88cm]{./Figures/results_unseen_2.pdf} \label{fig:results_unseen_4}} \subfloat[]{\includegraphics[height=2.88cm]{./Figures/results_unseen_multi.pdf} \label{fig:results_unseen_multi}} \caption{Generalisation capabilities of the trained \ac{RC}($\boldsymbol{\lambda}^{\prime},0.15$) model in novel settings. Parameters $\boldsymbol{\lambda}^{\prime}$ are extracted from the relevant section (red ellipse) where the coupling term acts.} \label{fig:results_unseen} \end{figure} Results in \tref{tab:results_unseen_metrics} reflect the performance of the designed \ac{RC}($\boldsymbol{\lambda}^{\prime},0.15$) model when dealing with \ac{3D} scenarios via their section on the $\textsc{P}$-plane. The overall success rate is of $99.95\%$ on novel scenarios while providing, in average, a clearance similar to the requested one of $0.15$m and a close convergence to the goal. This implies an enhancement of $31.75$ times over the success rate reported on known objects in~\cite{rai2017learning}. However, the performance of the approach is slightly compromised in some scenarios, obtaining clearances of $6$cm and convergences up to $2.7$cm. The proposed approach could not cope uniquely with two scenarios out of $4{,}000$, where the generated trajectory penetrated $0.501$mm an obstacle of $40$cm along the x-axis and $50$cm along the y-axis and z-axis placed in the middle of a $0.5$m long baseline. Albeit these extreme scenarios for which more data could be provided at training time, the proposed approach has proved to generalise not only to different object sizes and locations, but also to different start-to-goal baselines. Further experimentation also showed the suitability of the framework to deal with multi-obstacle scenarios (see~\fref{fig:results_unseen_multi}). Since the action level is referenced in a local frame (see~\sref{sec:background_dmp}), the performance of the framework does not deteriorate regardless of the local frame's pose in the task space. Within the local frame, the outstanding generalisation capabilities are mainly due to regulating action according to the relative system-obstacle state defining the $\textsc{P}$-plane, and extracting relevant system-obstacle low-dimensional geometrical descriptors. \subsection{Experiments on a Robotic Platform} \begin{figure*}[t] \centering \subfloat[]{\includegraphics[height=4cm]{Figures/franka_perception.pdf}\label{fig:franka_perception}} \qquad \subfloat[]{\includegraphics[height=4cm]{Figures/franka_exp_multi.pdf}\label{fig:franka_exp_multi}} \qquad \subfloat[]{\includegraphics[height=4cm]{Figures/franka_exp_irregular.pdf}\label{fig:franka_exp_irregular}} \caption{Panda arm engaged in a start-to-goal policy (blue trajectories) while modulating its behaviour (red trajectories). (a)~Environment perception with unified low-dimensional encoding of the system's and obstacle's geometry (rose ellipsoids). Proposed hierarchical framework dealing with (b)~multiple obstacles in a cluttered environment, and (c)~an irregular obstacle.} \label{fig:franka_experiments} \end{figure*} \begin{table}[b] \vspace{-0.3cm} \centering \begin{tabular}{ccccc} \toprule & & \multirow{2}{*}{\shortstack{Clearance to \\ obstacle [m]}} & \multirow{2}{*}{\shortstack{Convergence \\ to goal [m]}} & \multirow{2}{*}{\shortstack{$n^\circ$ collisions $\&$ \\ $\Delta < 0.15$m}} \\ & & & & \\ \cmidrule{3-5} regular & pp. & fail & fail & 1 $\&$ 1 \\ (Fig.~\ref{fig:intro}) & mod. & 0.168 & 9.58e-3 & 0 $\&$ 0 \\ \cmidrule{2-5} irregular & pp.& fail & fail & 1 $\&$ 1 \\ (Fig.~\ref{fig:franka_exp_irregular}) & mod. & 0.163 & 4.17e-3 & 0 $\&$ 0 \\ \cmidrule{2-5} multi-obs & pp. & fail & fail & 2 $\&$ 5 \\ (Fig.~\ref{fig:franka_exp_multi}) & mod. & 0.172 & 1.29e-2 & 0 $\&$ 0 \\ \bottomrule \end{tabular} \caption{Clearance, convergence, number of collisions and unsatisfied clearances for the pre-planned (pp.) and modulated (mod.) start-to-goal policies on the real robot.} \label{tab:franka_metrics} \end{table} The proposed hierarchical framework for obstacle avoidance has been deployed on an anthropomorphic 7-\ac{DoF} Franka Emika Panda arm operated with \acs{OROCOS}~\cite{bruyninckx2001open}. The \ac{DMP}-encoded system's transient behaviour is converted to joint configurations using a Cartesian inverse dynamic controller with null space optimisation. The environment is partially observed with a depth camera ASUS Xtion previously calibrated with Aruco markers~\cite{garrido2014automatic}. The acquired point cloud is processed applying standard filtering techniques to segment the clusters describing obstacles and the table. The partial observation of each obstacle is dilated to also account for the system's geometry (see \sref{sec:geometry_unified}). The location of the table is used to constrain the reactive behaviour along the upper part of the task space (see \sref{sec:geometry_route_selection}). As in~\cite{rai2014learning,rai2017learning}, the test-bed consisted of obstacles interrupting a straight trajectory underlying a start-to-goal policy. However, differently than~\cite{rai2014learning,rai2017learning}, the assortment of considered obstacles had not been seen before. This included, but was not limited to, regular objects, such as the cardboard box in \fref{fig:intro}, irregular objects, such as the pile of plastic bottles in \fref{fig:franka_exp_irregular}, and also aleatory combinations of them, such as the cluttered environment with six obstacles in \fref{fig:franka_perception} and \fref{fig:franka_exp_multi}. As summarised in \tref{tab:franka_metrics}, the robot engaged in the pre-planned policy (blue trajectories) would impact with the obstacles. Instead, endowing the robot with the ability to modulate such policy, allows the system to successfully circumvent all obstacles with the desired $0.15$m clearance while converging to the goal (red trajectories). The presented results demonstrate that the proposed hierarchical framework which (i)~extracts relevant geometric descriptors, (ii)~uses them in the designed \ac{RC}-based learning module to (iii)~regulate the \ac{DMP}-based action level, endows a system with the ability to modulate its behaviour in settings never seen before, while stably converging to the goal. \section{INTRODUCTION} \label{sec:introduction} Robust reactive behaviours are essential to ensure the safety of robots operating in unstructured environments. For instance, the on-going pick-and-place policy of a robotic system sorting and storing items in a home environment might be interrupted by the sudden appearance of an obstacle in the middle of a pre-planned trajectory. In this scenario, the robot must be able to modulate its behaviour online to succeed in its task while providing some safety guarantees. Given the expertise of humans in dealing with these conditions, it is natural to adopt human behaviour for robotic control. Human behavioural studies of obstacle avoidance and route selection~\cite{fajen2003behavioral} have shown that the dynamics of perception and action consist of (i)~identifying the informational variables useful to guide behaviour and to regulate action, and (ii)~interacting with the environment using a particular set of dynamic behaviours. One possible policy descriptor allowing for this hierarchical control are \acfp{DMP}~\cite{ijspeert2013dynamical}. \Acp{DMP} are differential equations encoding kinematic control policies towards a goal attractor. Their transient behaviour can be shaped via a non-linear forcing term, which can be initialised via imitation learning and used to reproduce an observed motion while generalising to different start and goal locations, as well as task durations. A key feature of \acp{DMP} is that they allow for online modulation via coupling term functions that create a forcing term. Coupling terms have been exploited for many applications, such as avoidance of joint and workspace limits~\cite{gams2009line}, force control for environment interaction~\cite{gams2014coupling,sutanto2018learning}, dual-arm manipulation~\cite{gams2014coupling,pairet2018learning} and reactive obstacle avoidance~\cite{park2008movement,khansari2012dynamical,hoffmann2009biologically,rai2014learning,rai2017learning}. This work focuses on the latter challenge, which historically has been approached using potential fields~\cite{park2008movement,khansari2012dynamical}, analytical~\cite{hoffmann2009biologically} and learning methods~\cite{rai2014learning,rai2017learning} (see \sref{sec:background}). As further discussed in \sref{sec:background_discussion}, analytical formulations become less reactive for imminent collisions (dead-zone problem). Moreover, these approaches do not provide any guidance to the reactive behaviour, thus limiting their applicability to free-floating obstacles. Additionally, analytical formulations uniquely deal with point-mass obstacles and systems. In an attempt to address this latter issue, recent proposals learn coupling terms for a small set of obstacle geometries described by an array of markers on their surface~\cite{rai2014learning,rai2017learning}, but they fail to generalise actions to novel obstacles. These works are notable in learning the coupling terms from human demonstration. Nonetheless, providing a rich set of demonstrations involving various obstacles geometries can be time-consuming and prone to measurement noise. \begin{figure}[t!] \centering \includegraphics[width=8.5cm]{./Figures/franka_exp_regular.png} \caption{Proposed hierarchical framework for learning and producing generalisable obstacle avoidance behaviours. Pre-planned start-go-goal (blue) and modulated policy (red).} \label{fig:intro} \end{figure} This paper presents the hybrid \ac{DMP}-learning-based obstacle avoidance framework schematised in \fref{fig:intro}. The proposed approach addresses the limitations of the precedent works with a layered perception-decision-action analysis~\cite{fajen2003behavioral}. The main contributions at the action level (see \sref{sec:coupling_terms}) are (i)~reformulating the coupling terms to provide dead-zone free behaviours, and (ii)~guiding the obstacle avoidance reactivity to satisfy task-dependant constraints, while the main contributions at the perception-decision level (see \sref{sec:geometry}) are (iii)~regulating action according to the extracted unified system-obstacle low-dimensional geometric descriptor, and (iv)~learning to regulate the action level via exploration of the parameter space. The experimental evaluation reported in \sref{sec:results} demonstrates that the overall proposed approach generalises obstacle avoidance behaviours to novel scenarios, even when those involve multiple obstacles, or are uniquely described by partial visual-depth observations. \section{FINAL REMARKS} \label{sec:conclusions} This paper has presented a biologically-inspired hierarchical framework which safely modulates an on-going policy to avoid obstacles. The proposed approach follows a multi-layered perception-decision-action analysis which (i)~extracts unified system-obstacle low-dimensional geometric descriptors, then (ii)~exploits them to rapidly reason about the environment with a combination of heuristics and learning techniques, and finally (iii)~guides and regulates the obstacle avoidance behaviour with a conjunction of coupling terms modulating a \ac{DMP}-encoded policy. Experimentation conducted in synthetic environments highlights this method's generalisation capabilities to confront novel scenarios at the same time of ensuring the convergence of the system to the goal. Additionally, real-world trials on an anthropomorphic manipulator demonstrated the framework's suitability to successfully modulate a policy in the presence of multiple novel obstacles described by partial visual-depth observations, while satisfying a user-defined clearance constraint. The proposed framework is not restricted to the presented experimental evaluation nor platform. Any robotic system following a \ac{DMP}-encoded policy can benefit from this work to safely modulate its behaviour in the presence of unexpected obstacles. Similarly to~\cite{park2008movement}, collisions of the links can also be considered by finding the closest geometric section on the robot to the obstacle, and then modulating the kinematic null-space movement with the proposed approach. An interesting venue for future work is to modulate the system's orientation policy to overcome an obstacle, which, for instance, might have a significant impact on a manipulator carrying a large bulk. Another interesting extension of this work is learning route selection priorities in cluttered environments, so systems can autonomously reason about the most convenient direction to avoid an obstacle. \section{LEARNING OBSTACLE AVOIDANCE \\ for NON-POINT OBJECTS} \label{sec:geometry} \section{LEARNING OBSTACLE AVOIDANCE \\ for NON-POINT OBJECTS} \label{sec:geometry} The set of coupling terms formalised in the previous section efficiently generates guided collision-free trajectories for point-mass objects, i.e. obstacles and systems. Nonetheless, objects in real-world scenarios present different shapes and sizes. This section details the encoding of objects as low-dimensional geometric descriptors, which allows for (i)~the design of a learning module that regulates the action level to generalise over different obstacle geometries while considering the system's geometry, and (ii)~the use of heuristics to rapidly perform route selection in constrained environments. \subsection{Superquadrics as Geometric Approximates} \label{sec:geometry_sq} Objects obstructing the execution of a policy might present different shapes and dimensions. This geometric diversity complicates the design of an intelligent module able to generalise obstacle avoidance behaviours across geometries~\cite{rai2017learning}. This work considers global features to approximate the geometric properties of an object. One possible encoding strategy are superquadrics~\cite{barr1981superquadrics}, which have been used, among others, to ease the computation of system-obstacle distances~\cite{perdereau2002real}, and to generate repulsive potential fields~\cite{khatib1986real}. Alternatively to these task space applications, this work is interested in the low-dimensional parametric encoding of such geometric approximate, which is defined as: \begin{align} \!\!\!\!\!F(x,y,z,\boldsymbol{\lambda})\!: \left( \left( \frac{x}{\lambda_1} \right)^{\frac{2}{\lambda_5}} \!\! + \left( \frac{y}{\lambda_2} \right)^{\frac{2}{\lambda_5}}\right)^{\frac{\lambda_5}{\lambda_4}} \!\! + \left( \frac{z}{\lambda_3} \right)^{\frac{2}{\lambda_4}}\!\!\!, \label{eq:sq} \end{align} where $F(\boldsymbol{\cdot})$ defines whether a given 3D point ${(x, y, z)}$ lies inside (${F<1}$), outside (${F>1}$), or on the surface (${F=1}$) of a superquadric described by ${\boldsymbol{\lambda} = [\lambda_1, ..., \lambda_5]}$. In particular, ${(\lambda_1, \lambda_2, \lambda_3)}$ set the superquadric semi-axes lengths, and ${(\lambda_4, \lambda_5)}$ parameters define the superquadric shape. The parameter vector ${\boldsymbol{\lambda}}$ can be estimated from a discrete representation of the obstacle's surface by minimisation of: \begin{align} \min_{\boldsymbol{\lambda}} \sum_{i=1}^{N} \left(\sqrt{\lambda_1 \lambda_2 \lambda_3} \left(F(x_i,y_i,z_i,\boldsymbol{\lambda}) - 1 \right) \right)\!, \label{eq:sq_min} \end{align} where ${\sqrt{\lambda_1 \lambda_2 \lambda_3}}$ penalises the fitting of large superquadrics. \subsection{Unified Low-dimensional Geometric Descriptors} \label{sec:geometry_unified} \begin{figure}[b!] \vspace{-0.2cm} \centering \includegraphics[width=8.5cm]{./Figures/ga_complete.pdf} \subfloat{\label{fig:ga_complete_a}} \subfloat{\label{fig:ga_complete_b}} \subfloat{\label{fig:ga_complete_c}} \subfloat{\label{fig:ga_complete_d}} \caption{Extraction of unified low-dimensional descriptors accounting for the (a)~end-effector's and (b)~obstacle's geometry. (c)~Ellipsoid (rose) fitting the dilated obstacle cloud. (d)~Relevant descriptor $\boldsymbol{\lambda}^{\prime}$ along the $\textsc{P}$-plane (red ellipse).} \label{fig:ga_complete} \end{figure} The process in \eref{eq:sq}-\eref{eq:sq_min} provides a geometrical descriptor~${\boldsymbol{\lambda}}$ from a discrete representation of an object. However, it is of interest to obtain a descriptor accounting for both the system's and obstacle's geometry. \fref{fig:ga_complete} schematises the extraction of a unified obstacle-system low-dimensional geometric descriptor. An approximate of the system's geometry (see blue prism in \fref{fig:ga_complete_a}) is used to dilate~\cite{lozano1990spatial,huber2019avoidance} the obstacle's discrete representation (see \fref{fig:ga_complete_b}). The dilated obstacle representation is then encoded using \eref{eq:sq_min} while imposing ${\lambda_4 = \lambda_5 = 1}$, i.e. restricting the superquadric to shape as an ellipsoid. \fref{fig:ga_complete_c} portrays the significance on the descriptor's difference when considering the raw obstacle representation (blue ellipsoid) and its dilated version (rose ellipsoid). Interestingly, ellipsoids hold the property that any random projection or section of these results in an ellipse, providing a strategy to extract the unified obstacle-system's geometric features relevant to the obstacle avoidance coupling term. This is, the $\textsc{P}$-plane defined by the respective obstacle-system position ${\mathbf{x}_{obstacle} - \mathbf{x}}$ and the system's heading $\mathbf{\dot{x}}$, intersects the unified geometric approximation. Thus, the descriptor ${\boldsymbol{\lambda}}$ can be further reduced to ${\boldsymbol{\lambda}^{\prime} =(\lambda_{1}^{\prime}, \lambda_{2}^{\prime})\in \mathbb{R}^2}$ such that ${\boldsymbol{\lambda}^{\prime} = g(\boldsymbol{\lambda})}$ where ${g(\boldsymbol{\cdot})\!:\mathbb{R}^5\rightarrow\mathbb{R}^2}$ maps an arbitrary vector onto the $\textsc{P}$-plane. The resulting low-dimensional descriptor is an ellipse laying on the $\textsc{P}$-plane with semi-axis lengths $\boldsymbol{\lambda}^{\prime}$ (see \fref{fig:ga_complete_d}). \subsection{Geometry-conditioned Parameter Regressor} \label{sec:geometry_rc} Leveraging the unified low-dimensional descriptor $\boldsymbol{\lambda}^{\prime}$ from \sref{sec:geometry_unified}, this section proposes a method to learn the correspondence between $\boldsymbol{\lambda}^{\prime}$ and the non-independent parameters ${(\alpha, \psi, \kappa)}$ of the coupling term, subject to a user-defined clearance~$\Delta$, i.e. the minimum distance between the end-effector and the obstacle. This \acl{MTR} problem is formulated as a \ac{RC}~\cite{spyromitros2016multi}, which defines an ordered chain ${U=(Y_1, Y_2, Y_3)}$ of single target regressions. This is, given an input vector ${\mathbf{h}=\{\boldsymbol{\lambda}^{\prime},\Delta\}}$, the proposed \ac{RC}-based learning module is composed of three models: ${Y_1\!: \mathbf{h} \rightarrow \kappa}$ adjusts the actuation span of the coupling term, ${Y_2\!: (\mathbf{h}, \kappa) \rightarrow \psi}$ regulates the relevance of the relative system-obstacle heading, and finally ${Y_3\!: (\mathbf{h}, \kappa, \psi) \rightarrow \alpha}$ tunes the strength of the behaviour. Each regressor $Y_i$ is modelled as a \ac{NN} which provides a powerful strategy to learn and represent approximations to non-linear mappings, and is suitable for reactive decisions due to its rapid response. Considering the relevance of the input features, each \ac{NN} regressor is arranged with four layers; the hidden layers are hyperbolic tangent sigmoid units, and the output layer is a log-sigmoid to avoid negative settings of the targets. It should be noted that the regulation of the action level formalised in \sref{sec:coupling_terms} is conducted along the $\textsc{P}$-plane. As explained previously in \sref{sec:geometry_sq}, this sub-space contains all essential information to circumnavigate an obstacle and is efficiently defined using the relative system-obstacle state. Namely, changes in the obstacle avoidance scene such as different start and goal positions, obstacle location and geometries do not alter the encoding of the problem in the $\textsc{P}$-plane. Therefore, the prediction capabilities of the designed \ac{RC}-based learning module extend to a wide range of setups, including in the presence of multiple obstacles in the scene. \subsection{Route Selection via Heuristic Cost Rings} \label{sec:geometry_route_selection} Real-world environments and physical systems constrain the amount of feasible reactive behaviours. Exhaustively evaluating all possible directions in $\mathrm{SO}(3)$ which satisfy these additional constraints can slow the decision response. To ease the reasoning complexity of the route selection problem, this work proposes a twofold heuristic analysis called cost rings which (i)~considers an orthographic projection of the obstacle onto the ${\textsc{YZ}\text{-plane} \in \mathbb{R}^2}$ of the local frame, i.e. confining the direction space ${\boldsymbol{\omega}\in\mathrm{SO}(2)}$, to then efficiently (ii)~find the obstacle avoidance direction ${\omega_d}$ minimising a metric ${\eta(\boldsymbol{\omega})}$. The resulting direction ${\omega_d}$ is used with the coupling terms composition formulated in~\sref{sec:ct_composition} to guide the obstacle avoidance behaviour towards ${\omega_d}$. The advantage of route selection via heuristic cost rings is exemplified in \fref{fig:cost_rings}, where the path cost ${\eta(\boldsymbol{\omega})}$ is determined according to three metrics: (i)~the physical constraints imposed by the table ${\eta_{table}(\boldsymbol{\omega})}$, (ii)~the length of the trajectory ${\eta_{length}(\boldsymbol{\omega})}$, and (iii)~the robot's workspace limit ${\eta_{limits}(\boldsymbol{\omega})}$, such that $\omega_d$ can be found by minimisation of: \begin{equation} \min_{\boldsymbol{\omega}} \eta_{table}(\boldsymbol{\omega}) + \eta_{length}(\boldsymbol{\omega}) + \eta_{limits}(\boldsymbol{\omega}), \end{equation} where ${\eta_{table}(\boldsymbol{\omega}) = 1}$ if the end-effector would collide with the table and $0$ otherwise, ${\eta_{length}(\boldsymbol{\omega}) \in [0,1]}$ is the normalised trajectory length, and ${\eta_{limits}(\boldsymbol{\omega})=1}$ if the end-effector would move outside of its workspace and $0$ otherwise. \fref{fig:cost_rings_heuristics} illustrates these estimated costs rings and the resulting direction ${\omega_d \in \boldsymbol{\omega}}$ (magenta) with minimum cost. As depicted in \fref{fig:cost_rings_workspace}, using this reasoning to initially guide the behaviour enables the system to avoid the obstacle in the direction with lowest cost (red), whereas the non-guided reactive behaviour leads with collision with the table (blue). \begin{figure}[t!] \centering \subfloat[]{\includegraphics[clip,trim={0cm 0cm 0cm 0},width=3.8cm]{./Figures/cost_rings_heuristics.pdf} \label{fig:cost_rings_heuristics}} \quad \subfloat[]{\includegraphics[clip,trim={0cm -0.15cm 0cm 0},width=4cm]{./Figures/cost_rings_workspace.pdf} \label{fig:cost_rings_workspace}} \caption{Route selection via heuristic rings. (a)~Cost evaluation on the local $\textsc{YZ}$-plane to penalise workspace limits, long trajectories, and collisions with the table. Overall best direction is marked in magenta. (b)~A reactive behaviour (blue) would lead the system colliding with the table, whereas the guided behaviour (red) generates the route with lowest cost.} \label{fig:cost_rings} \vspace{-0.3cm} \end{figure} \subsection{Convergence to Goal} \label{sec:geometry_route_goal_convergence} The required path $\hat{\pi}$ to avoid obstacles may be longer than the pre-planned trajectory ${\pi}$, thus needing more time to finalise the encoded task. This fact is especially critical when dealing with non-point objects as failing to account for this can imperil convergence to the desired goal~\cite{rai2017learning}. To address this issue, this work regulates the \ac{DMP} duration by scaling ${\tau = length(\mathbf{\hat{\pi}}) / length(\mathbf{\pi})}$, i.e. an approximate of the increase of trajectory length. Here, ${length(\mathbf{\hat{\pi}})}$ is estimated with linear interpolation of the finite sequence of $\mathbb{R}^3$ points ${\{\mathbf{x}_s, \mathbf{x}_p^1, ..., \mathbf{x}_p^N, \mathbf{g}_{x}\}}$, where ${\mathbf{x}_s}$ and ${\mathbf{g}_{x}}$ are the start and goal positions, and ${\mathbf{x}_p^i}$ is the extreme point of the ellipse encoding the ${i \in [1, \; N]}$ dilated obstacle's geometry along its $\textsc{P}$-plane.
\section{Introduction} In this paper we are interested in finding new K\"ahler-Einstein metrics on certain Fano manifolds. Whether or not a manifold \(X\) admits such a metric is characterized by the algebreo-geometric notion of \(K\)-stability, see \cite{CDS12}, \cite{CDS13}. An equivariant version of \(K\)-stability has been used in the spherical \cite{del2016}, and complexity-one \(T\)-variety \cite{ilten2015} settings to obtain an effective K\"ahler-Einstein criterion. Generally, with group actions of complexity greater than one, \(K\)-stability is a difficult condition to check. Another approach is to apply the sufficient criterion of Tian, \cite{Tian87}. In \cite{Su13} it was shown that Tian's criterion reduces to a related problem on the torus quotient if the original variety admits enough additional symmetries. In the present paper the examples we consider are \textit{general arrangement varieties}, that is they are \(T\)-varieties where the torus quotient is a projective space and the critical values of the quotient map form a general arrangement of hyperplanes in that projective space. Smooth projective general arrangement varieties of complexity and Picard rank \(2\) were classified according to their Cox ring in \cite{hausen2018torus}. Following the methods of \cite{Su13}, we find three new examples of K\"ahler-Einstein metrics on some symmetric complexity two general arrangement varieties. The first examples we are interested in are some hypersurfaces of bidegree \((\alpha,\beta)\). Consider the following varieties \[ X_{\alpha,\beta}^{2n-1} := V \left( \sum_{i=0}^n x_i^\alpha y_i^\beta \right) \subseteq \mathbb{P}^n \times \mathbb{P}^n \] Let \(d = \gcd(\alpha,\beta)\) and \(a= \alpha/d, \ b = \beta/d\). There is an effective \(n\)-torus action prescribed by weights \((0|bI_n|0|-aI_n)\) on the homogeneous coordinates \((x,y)\). Note, as an aside, that \(X^{2n-1}_{1,1}\) is a flag manifold of type \((1,n-1)\), which is known to admit a K\"ahler-Einstein metric as a homogeneous manifold, see remarks immediately preceeeding \cite[Theorem 3]{Matsushima} for example. By adjunction \(X^{2n-1}_{\alpha,\beta}\) is Fano iff \(\alpha,\beta < n+1\). When \(\alpha = 1\) then \(X^{2n-1}_{\alpha,\beta}\) is smooth. Our first result is the following: \begin{theorem}\label{thm:KE1} \(X_{1,2}^5\) and \( X_{1,3}^5\) admit \(T\)-invariant K\"ahler-Einstein metrics. \end{theorem} Note that \(X_{1,2}^5, X_{1,3}^5\ \) appear in the classification of \cite{hausen2018torus} as varieties \(4E, 4F\) respectively. Secondly we consider a blowup of an even dimensional quadric hypersurface. Consider the following representation: \begin{align*} Q^{2n} &:= V \left( \sum_{i=0}^{n} x_{2i}x_{2i+1} \right) \subset \mathbb{P}^{2n+1} \\ \end{align*} There is a \(T = (\mathbb{C}^*)^{n+1}\)-action, given by specifying \(\deg x_{2i} = e_{i+1}, \ \deg x_{2i+1} = -e_{i+1}\) for \(i=0,\dots,n\). This action is not effective, but we may quotient by the global stabilizer to obtain an effective action of the torus \(T' = T/(\pm \text{Id})\). Let \(Z_i = V(x_{2i},x_{2i+1}) \subset Q^{2n}\) for \(i = 0,\dots, n\). Let \(W^{2n}\) be the variety obtained by iteratively blowing up the strict transforms of these varieties: \[ W^{2n} := \Bl_{\tilde{Z}_n} \Bl_{\tilde{Z}_{n-1}} \dots \Bl_{\tilde{Z}_2} \Bl_{Z_1} Q^{2n} \] In Section \ref{subsec:wonderful} we show that \(W^{2n}\) is Fano. Our second result is the following: \begin{theorem}\label{thm:KE2} \(W^6\) admits a \(T'\)-invariant K\"ahler-Einstein metric. \end{theorem} We will use the following theorem of Tian, involving an invariant \(\alpha_{G}(X)\), the alpha invariant of a Fano manifold \(X\). \begin{ttheorem}\label{thm:tcrit} Let \(X\) be a Fano manifold and \(G \subset \Aut(X)\) reductive group of symmetries. If \[ \alpha_{G} (X) > \frac{\dim(X)}{\dim(X) + 1} \] Then \(X\) admits a \(G\)-invariant K\"ahler-Einstein metric. \end{ttheorem} In the case where \(G\) is finite, the alpha invariant coincides with the \textit{global log canonical threshold} of \(X\), denoted \(\glct_G(X)\). A proof of this fact can be found in Demailley's appendix of \cite{cheltsov08}. Suppose now \(X\) admits an effective action of an algebraic torus \(T = (\mathbb{C}^*)^m \subset \Aut(X)\). Let \(K \cong (S^1)^n\) be the maximal compact subtorus in \(T\). Given a finite subgroup \(H\) of the normalizer \(\mathcal{N}_{\Aut(X)}(T)\), we have an induced \(H\)-action on the character lattice \(M\) of \(T\). Following \cite{batyrev99}, \(X\) is said to be symmetric with respect to the \(T\)-action if there exists such an \(H\) which fixes only the identity of \(M\). Since \(H\) normalizes \(T\) then they generate a subgroup \(H T \subset \Aut(X)\). As \(H\) and \(T\) have trivial intersection this is a semidirect product of \(H\) and \(T\). It can be shown that \(HT\) is the complexification of its maximal compact subgroup \(HK\). Minor adjustments to Demailly's proof give us that \( \glct_{HT}(X) = \alpha_{HT}(X) \) here also. Let \(X\) be a symmetric \(T\)-variety. There is a universal quotient \(\pi:X \dashrightarrow Y\) by the torus action, the Chow quotient, first introduced by Kapranov \cite{kapranov1993}. Since \(H\) is in the normalizer of \(T\) then its action descends to \(Y\). In the setting of this paper we assume that \(\pi\) is surjective. For any prime divisor \(Z\) on \(Y\) the generic stabilizer on a component of \(\pi^{-1}(Z)\) is a finite abelian group. The maximal order across these components is denoted \(m_Z\). We then obtain a boundary divisor for \(\pi\) given by: \begin{equation} \label{boundary} B := \sum_Z \frac{m_Z-1}{m_Z} \cdot Z \end{equation} We call the pair \((Y,B)\) the Chow quotient pair of the \(T\)-variety \(X\). S{\"u}{\ss}, \cite{Su13}, showed that the global log canonical threshold of \(X\) with respect to \(HT\) coincides with that of the pair \((Y,B)\) with respect to \(H\): \begin{theorem}[S{\"u}{\ss}, {\cite[Theorem 1.2]{Su13}}]\label{thm:SU} Let \(X\) be a symmetric log terminal Fano \(T\)-variety. Then \[ \glct_{HT}(X) = \min \{1, \glct_H(Y,B) \}. \] \end{theorem} To prove Theorems \ref{thm:KE1}, \ref{thm:KE2} we would like to apply Theorem~\ref{thm:SU} and then Tian's criterion. We begin by calculating Chow quotients. The GIT quotients of \(X\) by \(T\) form a finite inverse system, and the inverse limit of this system contains a distinguished component, known as the \textit{limit quotient} of \(X\). In \cite{baker2012} it was shown that this limit quotient and the Chow quotient coincide. For the varieties \(X_{\alpha,\beta}^{2n-1}\) we use the Kempf-Ness theorem to calculate GIT quotients. The inverse system is simple enough in this case to then deduce the Chow quotient pair. For \(\gamma \in \mathbb{Q}\) define the \(\mathbb{Q}\)-divisor \(B_\gamma := \gamma \sum_i H_i\), where \(H_1,\dots,H_n\) are the coordinate hyperplanes of \(\mathbb{P}^{n-1}\) and \(H_0\) is the hyperplane \(V( \sum_{i=1}^n z_i)\). In Section~\ref{subsec:hypersurfaces} we will prove the following: \begin{lemma}\label{lem:1.4} The Chow quotient pair of \(X_{\alpha,\beta}^{2n-1}\) by \(T\) is \((\mathbb{P}^{n-1},B_\gamma)\) with \(\gamma = \max \left(\frac{a-1}{a}, \frac{b - 1}{b} \right)\). \end{lemma} By \cite[Proposition 2.6]{suess18-2} this allows us to calculate, as an additional application, the homeomorphism class of the quotient space \(X_{\alpha,\beta}^n/T\). For the proof of the following corollary see Section~\ref{subsec:hypersurfaces}. \begin{corollary}\label{cor:topquot} Let \(K\) be the maximal compact torus of \(T\). There is a homeomorphism: \[ X_{\alpha,\beta}^{2n-1}/K \cong S^{n-1} \ast \mathbb{P}^{n-1}. \] Where the later is the topological join of the \((n-1)\)-sphere and complex projective \((n-1)\)-space. \end{corollary} In particular, this shows that the \(K\)-orbit space of the flag manifolds \(F(1,n-1,\mathbb{C}^n) = X_{1,1}^{2n-1}\) is of this form. Consider the variety \(W^{2n}\). Using results of \cite{kirwan} we may obtain the Chow quotient of \(W^{2n}\) from that of \(Q^{2n}\). In Section \ref{subsec:wonderful} we prove the following: \begin{lemma}\label{lem:1.6} The Chow quotient pair of \(W^{2n}\) by its \(T'\)-action is \((\mathbb{P}^{n-1},B_{\nicefrac{1}{2}})\). \end{lemma} Note there is a natural \(S_{n+1}\)-action on \(X^{2n-1}_{\alpha,\beta}\) permuting the indices of variables. Additionally, by results of \cite{li06}, the \(S_{n+1}\)-action on \(Q^{2n}\) permuting the \(Z_i\) induces an action on \(W^{2n}\). These actions descend to the \(S_{n+1}\)-action on \(\mathbb{P}^{n-1}\) permuting the hyperplanes \(H_i\). We are now in a situation where we may be able to apply Theorem~\ref{thm:SU}. For \(n=3\) we are able to provide the following lower bound on the global log canonical threshold of the pair \((\mathbb{P}^2,B_\gamma)\), by considering degenerations under a \(\mathbb{C}^*\)-action. \begin{lemma}\label{lem:alph} Consider a log pair \((\mathbb{P}^2,B_\gamma)\), where \(B_\gamma = \gamma \sum_i H_i\). We then have: \[ \glct_{S_4}(\mathbb{P}^2, B_\gamma) \ge \begin{cases} \frac{1}{3-4 \gamma} & \text{for } \gamma \le \frac{1}{2};\\ \frac{2(1-\gamma)}{3-4\gamma}, & \text{for } \frac{1}{2} \le \gamma \le \frac{3}{4};\\ \infty, & \text{for } \gamma \ge \frac{3}{4}. \end{cases} \] \end{lemma} \subsection*{Acknowledgement} This work was partially supported by the grant 346300 for IMPAN from the Simons Foundation and the matching 2015-2019 Polish MNiSW fund. I would also like to thank my supervisor Hendrik S{\"u}{\ss} for many useful conversations while this paper was in preparation. \section{Preliminaries} \subsection{Chow and GIT quotients} \ Here we recall the definition of GIT, Chow, and limit quotients of a projective variety by a reductive algebraic group \(G\). We also explain how, when \(G\) is a torus, they may be explicitely calculated via the Kempf-Ness theorem. \subsubsection{GIT quotients} Recall the basic setup of Mumford's geometric invariant theory, which provides a method for finding geometric quotients on open subsets of a scheme \(X\) when the acting algebraic group \(G\) is reductive. A good reference for the material here is \cite{mumford1994}. In \cite{mumford1994} Mumford introduced the notion of a good categorical quotient, which can be shown to be unique if it exists. \begin{definition} A surjective \(G\)-equivariant morphism \(\pi : X \to Y\) is a good categorical quotient if the following hold: \begin{enumerate} \item We have \(\mathcal{O}_Y = (\pi_* \mathcal{O}_X)^G\); \item if \(V\) is a closed \(G\)-invariant subset of \(X\) then \(\pi(V)\) is closed; \item if \(V,W\) are closed \(G\)-invariant subsets of \(X\) and \(V \cap W = \emptyset\) then we have \(\pi(V) \cap \pi(W) = \emptyset\). \end{enumerate} \end{definition} Good quotients do not always exist for a given scheme \(X\), but we might hope that there exists some dense open subset of \(X\) which does admit a good quotient. Consider the affine case, where \(X = \spec A\). For \(G\) reductive then it can be shown that \(X \sslash G : = \spec A^G\) is a good categorical quotient. The same ansatz works in the projective case once we make a choice of a lift of the action to the ring of sections of a given ample line bundle. This choice is known as a linearization of the group action. \begin{definition} Let \(X\) be a projective scheme together with an action \( \lambda : G \times X \to X\) of a reductive algebraic group \(G\). Let \(L\) be a line bundle on \(X\). A linearization of the action \(\lambda\) on \(L\) is an action \(\tilde{\lambda}\) on \(L\) such that: \begin{itemize} \item The projection \(\pi\) is \(G\)-equivariant, \(\pi \circ \tilde{\lambda} = \lambda \circ \pi \) \item For \(g \in G\) and \(x \in X\), the induced map \(L_x \mapsto L_{g \cdot x}\) is linear. \end{itemize} \end{definition} Note a linearization to \(L\) naturally induces linearizations to \(L^\vee\) and \(L^{\otimes r}\) for \(r \in \mathbb{N}\). \begin{example} A linearization of the trivial bundle on a projective variety \(X\) must be of the form: \[ g \cdot (x,z) = (g \cdot x, \chi(g,x)z), \] for some \(\chi \in H^0(G \times X, \mathcal{O}_{G \times X}^*) \cong H^0(G, \mathcal{O}_G^*) = \mathfrak{X}(G).\) \end{example} The above example tells us that any two linearizations \(\lambda_1,\lambda_2\) of an action to the same line bundle differ by multiplication by some character \(\chi\) of \(G\): fiberwise we have \(\tilde{\lambda}_1 = \chi(g,x) \tilde{\lambda}_2\). A linearization \(u\) of a group action \(G\) on \(X\) to \(L\) induces an action of \(G\) on the ring of sections \(R(X,L) := \bigoplus_{j \ge 0} H^0(X,L^{\otimes j}) \). Consider the scheme \(X \sslash_u G := \proj R(X,L)^G\). Note we have a birational map from \(X\) to \(X \sslash_u G\), defined precisely at those \(x \in X\) such that there exists some \(m> 0 \) and \(s \in R(X,L)^G_m\) such that \(s(x) \neq 0\). Such a \(x\) are said to be semi-stable. If in addition \(G \cdot x\) is closed and the stabilizer \(G_x\) is of dimension zero, the point \(x\) is said to be stable. The sets of semi-stable and stable points will be denoted by \(X^{ss}(u)\) and \(X^{s}(u)\) respectively. \begin{construction}[{\cite[Chapter 1, Section 4]{mumford1994}}] The canonical morphism \(X^{ss}(u) \to X\sslash_u G := \proj R(X,L)^G \) is a good categorical quotient. \end{construction} \subsubsection{Chow and limit quotients} Recall the definition of the Chow quotient, as introduced in \cite{kapranov1993}. If \(G\) is any connected linear algebraic group and \(X\) is a projective \(G\)-variety, then orbit closures of points are generically of the same dimension and degree, and so define points in the corresponding Chow variety. The Chow quotient of the \(G\)-action on \(X\) is the closure of this set of points. We now recall the definition of the limit quotient, from \cite{mumford1994}. The limit quotient is discussed in detail in \cite{baker2012}. Let \(G\) be a reductive algebraic group, and \(X\) a projective \(G\)-variety. Suppose there are finitely many sets of semi-stable points \(X_1,\dots,X_r\) arising from \(G\)-linearized ample line bundles on \(X\). Whenever \(X_i \subseteq X_j\) holds, there is a dominant projective morphism \(X_i \sslash G \to X_j \sslash G\) which turns the set of GIT quotients into an inverse system. The associated inverse limit \(Y\) admits a canonical morphism \(\bigcap_{i=1}^r X_i \to Y\). The closure of the image of this morphism is the limit quotient. When \(G\) is an algebraic torus there are indeed finitely many semi-stable loci. Moreover, by \cite[Corollary 2.7]{baker2012}, we may calculate the limit quotient by taking the inverse limit of the subsystem obtained by only considering linearizations of powers of one fixed ample line bundle \(L\). In \cite[Proposition 2.5]{baker2012} it is shown that the Chow quotient and limit quotient coincide when \(G\) is an algebraic torus. \subsubsection{Kempf-Ness approach to GIT quotients} One approach to calculating GIT quotients is via the Kempf-Ness theorem. Let \(X \subseteq \mathbb{P}^N\) be a nonsingular complex projective variety and let \(G\) be reductive algebraic group acting effectively on \(\mathbb{P}^N\), restricting to an action on \(X\). Let \(K\) be the maximal compact subgroup in \(G\), with Lie algebra \(\mathfrak{k}\). The action of \(G\) is given by a representation \(\rho: G \to \text{GL}(N+1)\), and by choosing appropriate coordinates we may assume \(K\) maps to \(U(N+1)\) and so preserves the Fubini-Study form. It can be checked that a moment map \(\mu: X \to \mathfrak{k}^*\) is given by: \begin{equation}\label{eq:mu} \mu([x]) \cdot a := \frac{x^t \rho_*(a) x}{ |x|^2}, \end{equation} where \(x\) is any representative of \([x] \in X \subseteq \mathbb{P}^N\). Note we are now in the situation of the previous subsection, with \(L = \mathcal{O}_X(1)\) under the embedding \(X \subseteq \mathbb{P}^N\). This moment map is unique up to translations in \(\mathfrak{k}^*\). A different choice of linearization in this setting corresponds to multiplying \(\rho\) by some character \(\chi \in \mathfrak{X}(G)\). Since \(\chi(K)\) is compact it sits inside \(S^1 \subset \mathbb{C}^*\), and hence we do not need to change coordinates when considering the effect on the moment map. When we plug this into (\ref{eq:mu}) we see that we have translated the moment map by \(\chi \in \mathfrak{X}(G) \otimes \mathbb{R} \cong \mathfrak{k}^*\). Moreover, taking the \(r\)th power of \(L\) corresponds to scaling the moment map by a factor of \(r\). This gives a correspondence between rational elements \(\chi \in \mathfrak{X}(G) \otimes \mathbb{Q} \subset \mathfrak{k}^*\) and linearizations of powers of \(L\). \begin{example} Suppose \(G = T\) is an algebraic torus with character and cocharacter lattices \(M,N\) respectively. Then \(\rho\) is a diagonal matrix of characters \(u_0,\dots,u_{N}\) and we obtain: \[ \mu([x]) = \frac{\sum_{j=0}^N |x_i|^2 u_i}{|x|^2} \in M. \] Then, by Atiyah, \cite{atiyah1982convexity}, and Guillemin-Sternberg, \cite{guillemin1982convexity}, the image of \(\mu\) is a convex polytope \(P \subset M\). \end{example} We will make use of the following theorem of Kempf and Ness. A proof is given in \cite[Chapter 8]{mumford1994}. See also the original work \cite{kempf1979}. \begin{theorem}[{\cite[Theorem 8.3]{kempf1979}}]\label{thm:KN} Let \(X \subseteq \mathbb{P}^N\) be a nonsingular complex projective variety and let \(G\) be reductive algebraic group acting effectively on \(\mathbb{P}^N\), restricting to an action on \(X\). Consider a linearization of some power of \(L\) corresponding to a rational element \(u \in \mathfrak{k}^*\). \begin{enumerate} \item \(X^{ss}(u) = \{ x \in X | \overline{Gx} \cap \mu^{-1}(u) \neq \emptyset \} \). \\ \item The inclusion of \(\mu^{-1}(u)\) into \(X^{ss}(u)\) induces a homeomorphism \[ \mu^{-1}(u)/K \to X\sslash_u G, \] where \(\mu^{-1}(u)/K\) is endowed with the quotient topology induced from the classical (closed submanifold topology) on \(\mu^{-1}(u)\), and \(X \sslash_u G\) is endowed with its classical (complex manifold) topology \end{enumerate} \end{theorem} We can use Theorem~\ref{thm:KN} to calculate GIT quotients by inspection. To be explicit, suppose \(\mu^{-1}(u)/K\) has the structure of a complex projective variety and \(q: X^{ss}(u) \to \mu^{-1}(u)/K\) is a \(G\)-invariant morphism which restricts to the topological quotient map on the moment fibre, such that \(q_* \mathcal{O}_X^G = \mathcal{O}_Y\). The following fact is probably well known, but we prove it here for the reader's convenience. \begin{lemma}\label{lem:catquot} The morphism \(q\) is a good categorical quotient and hence is isomorphic to the GIT quotient map \(X \to X\sslash_u G\). \end{lemma} \begin{proof} It is enough to show that \(q\) sends closed \(G\)-invariant subsets to closed subsets, and disjoint pairs of closed invariant subsets to disjoint pairs of closed subsets. Firstly suppose that \(V\) is a \(G\)-invariant Zariski-closed subset of \(X\). Then \(q(V) = q(V \cap \mu^{-1}(u))\), and \(V \cap \mu^{-1}(u)\) is \(K\)-invariant and closed in the classical topology of \(\mu^{-1}(u)\). This implies that \(q(V)\) is closed in the classical topology on \(\mu^{-1}(u)/K \simeq X\sslash_u G\). But \(q(V)\) is constructable, as the image of a Zariski-closed subset of \(X\), and so we may conclude that \(q(V)\) is Zariski-closed in \(\mu^{-1}(u)/K \simeq X\sslash_u G\). Now suppose \(V,W\) are \(G\)-invariant and Zariski-closed in \(X\), with \(x \in V\) and \(y \in W\) such that \(q(x) = q(y)\). By \ref{thm:KN} we may take \({x'} \in \overline{Gx} \cap \mu^{-1}(u), \ {y'} \in \overline{Gy} \cap \mu^{-1}(u)\) such that \(q({x'}) = q({y'})\). These two points lie in the same \(K\)-orbit. By the \(G\)-invariance of \(V,W\) we have \(V \cap W \neq \emptyset\). \end{proof} \subsection{Log canonical thresholds} \ Here we recall the definition of the global log canonical threshold of a log pair, which features in Theorem~\ref{thm:SU} and Lemma~\ref{lem:alph}. A log pair \((Y,D)\) consists of a normal variety \(Y\) and a \(\mathbb{Q}\)-divisor \(D\), where the coefficients of the irreducible components of \(D\) lie in \([0,1]\). The canonical divisor of such a pair is \(K_Y+D\). A pair \((Y,D)\) is called smooth if \(Y\) is smooth and \(D\) is a simple normal crossings divisor. A log resolution of a log pair \((Y,D)\) is a birational map \(\pi: \tilde{Y} \to Y\) such that \((\tilde{Y},\varphi^*D)\) is smooth. \begin{definition} Suppose \(\pi: \tilde{Y} \to Y\) is a log resolution of a pair \((Y,D)\). Write \(D = \sum a_i D_i\) for prime \(D_i\) and rational \(a_i\). Then: \[ \pi^*(K_Y+ D) - K_{\tilde{Y}}\sim_{\mathbb{Q}} \sum_i a_i \tilde{D_i} + \sum_j b_j E_j, \] where \(\tilde{D_i}\) is the proper transform of \(D_i\) and the \(E_j\) are the \(\pi\)-exceptional divisors. We say \((Y,D)\) is log canonical at \(P \in Y\) if we have \(a_i \le 1 \) for \(P \in D_i\), and \(b_j \le 1\) for \(E_j\) such that \(\pi(E_j) = P\). This condition is independent of the choice of resolution. If \((Y,D)\) is log canonical at all \(P \in Y\) then we say \((Y,D)\) is (globally) log canonical. \end{definition} \begin{example} \label{examplelct} Consider the pair \(Y = \mathbb{P}^2\) and \(D = \sum a_i L_i\) where \(L_i\) are all lines through a point \(P \in Y\). Blowing up at \(P\) we obtain the following: \[ \pi^*(K_Y+D) - K_{\tilde{Y}} \sim_{\mathbb{Q}} (\deg D - 1) E + \sum a_i \tilde{L}_i, \] where \(E\) is the exceptional divisor of the blow-up. Therefore \((Y,D)\) is log-canonical whenever we have \(\deg D \le 2\) and all \(a_i \le 1\). \end{example} Recall the following consequence of the main theorem of \cite{demailly2001}, as stated in the proof of \cite[Lemma 5.1]{cheltsov08}. This allows us to degenerate a pair under a \(\mathbb{C}^*\)-action if we want to show it is log canonical. \begin{proposition} \label{degenpair} Let \((Y,D)\) be a log pair. Suppose \(\{ D_t | t \in \mathbb{C}\}\) is a family of \(\mathbb{Q}\)-divisors such that \(D_t \sim_\mathbb{Q} D\), \(D_1 = D\), and for \(t \neq 0\) there exists \(\phi_t \in \Aut(X)\) such that \(D_t = \phi_t(D)\). Then \((Y,D)\) is log canonical if \((Y,D_0)\) is. \end{proposition} Now we recall the definition of the global log canonical threshold of a pair, as given in \cite{suess18-2}. \begin{definition} The global \(G\)-equivariant log canonical threshold of a log pair \((Y,B)\) is defined to be \[ \glct_{G}(Y,B) := \sup \{ \lambda | (Y,B+ \lambda D) \text{ log canonical } \forall D \in | -K_X - B |_{\mathbb{Q}}^G \}. \] When \(B\) is trivial we will suppress it in our notation, writing \(\glct_G(X)\) for the \(G\)-equivariant log canonical threshold of a normal variety \(X\). \end{definition} In Demailly's appendix of \cite{cheltsov08} it is shown that \(\glct_{G}(X) = \alpha_G(X)\) for \(G \subseteq \Aut(X)\) a finite subgroup. The same proof may be easily extended to our setting, where \(G\) is the semidirect product of a torus \(T\) and a finite subgroup \(H\) of the normalizer of \(T\) in \(\Aut(X)\). We outline one way of doing this in the following lemma. \begin{lemma} Suppose that \(X\) is a \(T\)-variety and \(H\) is a finite subgroup of the normalizer \( \mathcal{N}_{\Aut(X)}(T)\). Then \(\glct_{HT}(X) = \alpha_{HT}(X)\). \end{lemma} \begin{proof} One may define the log canonical threshold of a linear system \(|\Sigma| \subset |mL|\) for any line bundle \(L\) on \(X\), see remarks succeeding \cite[Definition A.2]{cheltsov08}. Note, by definition, if \(D \in |\Sigma|\) then \(\lct(\frac{1}{m} D) \le \lct( \frac{1}{m} |\Sigma|)\) with equality when \(\Sigma\) is one-dimensional. As stated in \cite[(A.1)]{cheltsov08} we have: \[ \alpha_{HT}(L) = \inf_{m \in \mathbb{Z}_{>0}} \inf_{\substack{|\Sigma| \subset |mL| \\ |\Sigma| \text{ is } HT-\text{invariant}}} \lct ( \frac{1}{m} |\Sigma|. ) \] Clearly we have the inequality: \[ \alpha_{HT}(L) \le \inf_{m \in \mathbb{Z}_{>0}} \inf_{D \in |mL|^{HT}} \lct (\frac{1}{m} D). \] Now suppose \(|\Sigma| \subset |mL|\) is a \(HT\)-invariant linear system. Take \(D \in |\Sigma|\). We may repeatedly degenerate \(D\) along \(\mathbb{C}^*\)-actions to obtain \(D' \in |mL|^{T}\), with \(\lct(\frac{1}{m}D') \le \lct(\frac{1}{m}D) \le \lct( \frac{1}{m}|\Sigma|)\) by Proposition~\ref{degenpair}. Let \(r = |H|\). Since \(H\) normalizes \(T\), we may take \(D'':= \sum_{h \in H} h \cdot D'\), and then: \[ \lct(\frac{1}{m r }D'') \le \lct( \frac{1}{mr} | r\Sigma|) = \lct( \frac{1}{m}|\Sigma|). \] Then we have: \[ \alpha_{HT}(L) = \inf_{m \in \mathbb{Z}_{>0}} \inf_{D \in |mL|^{HT}} \lct (\frac{1}{m} D). \] In particular when \(L = -K_X\) the left hand side is equal to \(\glct_{HT}(X)\). \end{proof} \section{Examples} \subsection{Bidegree $(\alpha,\beta)$ hypersurfaces $X_{\alpha,\beta}^{2n-1}$} \label{subsec:hypersurfaces} \ \\ Recall the setup mentioned briefly in the introduction. Fix natural numbers \(n,\alpha,\beta>0\), and consider: \[ X = X_{\alpha,\beta}^{2n-1} := V \left( \sum_{i=0}^n x_i^\alpha y_i^\beta \right) \subseteq \mathbb{P}^n \times \mathbb{P}^n. \] Let \(a = \alpha/d, b = \beta/d\), where \(d = \text{gcd}(\alpha,\beta)\) and let \(T\) be the \(n\)-torus acting with weights \((0|b I_n|0|-a I_n)\). Let \(K\) denote the maximal compact torus in \(T\). First we calculate our GIT and Chow quotients, proving Lemma~\ref{lem:1.4}. Let \(L\) be the restriction of \( \mathcal{O}(1,1)\) to \(X\). Using (\ref{eq:mu}) we can explicitely give a moment map for the torus action: \[ ([x],[y]) \mapsto \frac{ \sum |x_iy_j|^2( b e_i - a e_j)}{\sum |x_iy_j|^2}. \] Where we take \(e_0 := 0\). The moment image polytope \(P\) is the convex hull of the vectors \(\{ b e_i - a e_j \}_{i,j}\). Consider a boundary point \(u \in \partial P\). In this case we show that the moment fibre of \(u\) is contained in one \(T\)-orbit, and so the GIT quotient is just contraction to a point. The key observation here is the following: \begin{lemma}\label{lem:X} Suppose \(\mu([x],[y]) = \mu([x'],[y'])\) and for each \(j\) we have \[ x_jy_j = {x'}_j{y'}_j = 0. \] Then for each \(j\) we have \(x_i=0 \iff {x'}_i = 0\) and \(y_i = 0 \iff {y'}_i = 0 \). \end{lemma} \begin{proof} Suppose first \(i>0\). We have: \[ A \sum_{j=0}^n |x_iy_j|^2 - B\sum_{j=0}^n |x_jy_i|^2 = C \sum_{j=0}^n |{x'}_i{y'}_j|^2 - D \sum_{j=0}^n |{x'}_j{y'}_i|^2. \] For positive constants \(A,B,C,D\). The conclusion follows by considering signs. Suppose now \(i =0\). By applying the affine linear functional \(l(w) := w \cdot \left( \sum e_j \right) - (b-a)\) to \(\mu(x,y) = \mu(x',y')\) we obtain: \[ E \sum_{j=1}^n |x_jy_0|^2 - F \sum_{j=0}^n |x_0y_j|^2 = G \sum_{j=1}^n |{x'}_j{y'}_0|^2 - H \sum_{j=0}^n |{x'_0}{y'_j}|^2. \] For positive constants \(E,F,G,H\). Again by signs we obtain the result. \end{proof} \begin{lemma} \label{lem:3.2} For \(u \in \partial P\) the moment fibre \(\mu^{-1}(u)\) is contained in one \(T\)-orbit. \end{lemma} \begin{proof} Suppose \(\mu([x],[y]) = \mu([{x'}],[{y'}]) \in \partial P\). Since \( (\beta - \alpha)e_i \in P^\circ\) then \(x_iy_i = {x'}_i{y'}_i = 0\) for each \(i>0\). By the defining equation of \(X\) then also \(x_0y_0 = x_0y_0 = 0\). Applying Lemma~\ref{lem:X} we are done. \end{proof} Now consider moment fibres of points in the interior of \(P\). We calculate the associated GIT quotient by selecting an appropriate rational map, as in Lemma~\ref{lem:catquot}. \begin{lemma} \label{lem:3.3} For \(u \in P^\circ\) the topological quotient \(\mu^{-1}(u) \to \mu^{-1}(u)/K \) is: \[ \mu^{-1}(u) \to \mathbb{P}^{n-1}; \ \ ([x],[y]) \mapsto (x_1^a y_1^b: \dots : x_n^a y_n^b ). \] \end{lemma} \begin{proof} The map is clearly \(K\)-invariant. If \((x,y), ({x'},{y'}) \in \mu^{-1}(u)\) Then for any representatives \(x,y,{x'},{y'}\) we have: \[ (x_1^a y_1^b: \dots : x_n^a y_n^b) = ({x'_1}^a {y'_1}^b: \dots : {x'_n}^a {y'_n}^b). \] Fix a representative \(x\) of \([x]\). Pick a representative \(y\) of \([y]\) such that \(|x||y| = 1\). For any representatives \({x'},{y'}\) of \([x'],[y']\) respectively, there is \(\lambda \in \mathbb{C}^*\) such that \( x_i^a y_i^b = \lambda {{x'_i}}^a {{y'_i}}^b\) for \(i>0\). Now, by Lemma~\ref{lem:X} we may pick a representative \({x'}\) such that \(x_0 = {{x'_0}}\). Pick a representative \({y'}\) such that \(\lambda = 1\). \footnote{Note that rescaling our chosen \({y'}\) by an element of \(S^1\) does not change anything here.} By the defining equation of \(X\) then \(x_0^\alpha y_0^\beta = {x'_0}^\alpha {y_0'}^\beta \). Applying Lemma~\ref{lem:X} we have \(\nu \in \mathbb{C}^*\) such that \(y_0 = \nu{y'_0}\). As \(x_0 = {x'_0}\) then \(\nu \in S^1\), and we may rescale \({y'}\) by \(1/\nu\) so that \({y'_0} = y_0\). \\ \\ If \(x_iy_i = 0\) then by Lemma~\ref{lem:X} we can pick \(t \in \mathbb{C}^*\) such that \(x_i = t^\beta x_i', \ y_i = t^{-\alpha} x_i'\). Suppose now \(x_iy_i \neq 0\). Then \(x_i,y_i,{x'_i},{y'_i} \neq 0\). Pick \(t\) such that \(t^a = {y'_i}/y_i\). Now \(x_i^a = t^{a b} {x'_i}^a\). Hence there exists some \(a\)th root of unity, say \(\xi\), such that \(x_i = \xi t^b {x'_i}\). Since \(a,b\) are coprime we may pick another \(a\)th root of unity \(\gamma\) such that \(\gamma^b = \xi\). Picking \(s\) such that \(s^d = \gamma t\) we obtain \(x_i = s^\beta {x'}_i\) and \(y_i = s^{-\alpha} {y'_i}\). We then have \[ ([x],[y]) \in T \cdot ([x'],[y']) \ \cap \ \mu^{-1}(u) = S \cdot ([x'],[y']). \] Thus we have described a closed map with fibres precisely the \(S\)-orbits of \(\mu^{-1}(u)\). This must be the topological quotient of the \(S\)-action. \end{proof} By Lemma~\ref{lem:catquot}, we see for any \(u \in P^\circ\) the GIT quotient, according to the associated linearization of \(L\), is given by: \[ ([x],[y]) \mapsto (x_1^a y_1^b: \dots : x_n^a y_n^b). \] By Lemma~\ref{lem:catquot} this implies the Chow quotient is given by the same formula. We may now calculate the boundary divisor of this quotient, completing the proof of Lemma~\ref{lem:1.4}. \begin{proof}[Proof of Lemma~\ref{lem:1.4}] From the above discussion we know the Chow quotient map is given by: \[ X \to \mathbb{P}^{n-1}; \ \ ([x],[y]) \mapsto (x_1^a y_1^b: \dots : x_n^a y_n^b ). \] Suppose that \(Z\) is a prime divisor on the quotient, and \(D\) is a component of \(q^{-1}(Z)\). If \(D\) intersects the open set where \(x_i,y_i \neq 0\), then \(t_i^a = t_i^b = 1\) for any \(t\) in the generic stabilizer of \(D\). As \(a,b\) are coprime this would imply \(t_i = 1\). Suppose \(D\) is a component of \(q^{-1}(Z)\) for some \(Z\) not of the form \(H_j\). Then for each \(i\), \(D\) intersects the open set where \(x_i,y_i \neq 0\), so \(D\) has trivial generic stabilizer. Now consider the prime divisor \(H_j\) on the quotient, for some fixed \(j\). The irreducible components of \(q^{-1}(H_i)\) are given by the homogeneous ideals \((x_j^a)\), \((y_j^b)\). The generic stabilizer of the first is a cyclic group of order \(a\), generated by the element \(t \in T\) with \(t_i = 1\) for \(i \neq j\) and \(t_j\) a primitive \(a\)th root of unity. By symmetry the generic stabilizer of the second is a cyclic group of order \(b\). This gives the required boundary divisor. \end{proof} \begin{proof}[Proof of Corollary~\ref{cor:topquot}] By Lemma~\ref{lem:3.2} and Lemma~\ref{lem:3.3} we see that the \(T\)-action on \(X^{2n-1}_{\alpha,\beta}\) has almost trivial variation of GIT, as defined in \cite[Definition 2.7]{suess18-2}, with \(Y = \mathbb{P}^{n-1}\). The result follows by \cite[Proposition 2.9]{suess18-2}. \end{proof} \subsection{Wonderful compactification of the quadric $W$} \label{subsec:wonderful} In this section we construct a wonderful compactification of an arrangement on an even dimensional quadric. We show that this compactification is Fano and we calculate the Chow quotient pair with respect to an induced torus action. First recall the notion of wonderful compactifications of arrangements of subvarieties, as introduced in \cite{li06}. \begin{definition} Let \(X\) be a nonsingular algebraic variety. An arrangement of subvarieties of \(X\) is a finite collection \(\mathcal{S}\) of subvarieties closed under pairwise scheme-theoretic intersection. A building set of \(\mathcal{S}\) is a subset \(\mathcal{G} \subset \mathcal{S}\) such that for any \(S \in \mathcal{S} \backslash \mathcal{G}\) the minimal elements of \(\{G \in \mathcal{G} | G \supset S\}\) intersect transversally and the intersection is \(S\). We will say that \(\mathcal{S}\) is built by \(\mathcal{G}\) if \(\mathcal{G}\) is a building set for \(\mathcal{S}\). \end{definition} We will use the following result: \begin{theorem}[{\cite[Theorem 1.3]{li06}}] \label{thm:wonderful} Let \(X\) be a nonsingular projective variety, and \(V_1,\dots,V_k\) a collection of subvarieties such any non-empty subset of \(\{V_1,\dots, V_k\}\) forms a building set for an arrangement of subvarieties. Consider the iterated blowup: \[ W := \Bl_{\tilde{V}_k} \Bl_{\tilde{V}_{k-1}} \dots \Bl_{\tilde{V}_2} \Bl_{V_1} X. \] Then: \begin{itemize} \item each blowup is along a nonsingular variety; \item \(W\) is isomorphic to the blowup along the ideal \(I_1 I_2 \cdots I_k\), where \(I_i\) is the homogeneous ideal corresponding to \(V_i\) for each \(i\). \end{itemize} \end{theorem} Following \cite{li06}, we will call \(W\) the wonderful compactification of the arrangement built by \(V_1,\dots,V_k\). Note that the composition of blowups \(\pi: W \to X\) is independent of the ordering of the \(V_i\). We now turn to our particular example mentioned in the introduction. Let \(W\) be the wonderful compactification of the arrangement of subvarieties of \(Q\) built by \(Z_0,\dots,Z_n\), where \(Z_i := V(x_{2i},x_{2i+1}) \subseteq Q\). We have the following: \begin{lemma} \(W\) is Fano. \end{lemma} \begin{proof} By adjunction it is enough to show that \(-K_B - W\) is ample, where \(B\) is the wonderful compactification of the arrangement of subvarieties of \(\mathbb{P}^{2n+1}\) built by \(V_0,\dots,V_n\), where \(V_i := V(x_{2i},x_{2i+1}) \subseteq \mathbb{P}^{2n+1}\). For each \(i\) pick \(\sigma_i \in S_n\) such that \(\sigma_i(1) = i\). Each \(\sigma_i\) corresponds to a sequence of blowups whose composition is independent of \(i\), as in Theorem~\ref{thm:wonderful}. Denote by \( \psi_i: \Bl_{V_i} \mathbb{P}^{2n+1} \to \mathbb{P}^{2n+1}\) the first blowup of this sequence, and \(\pi_i: B \to \Bl_{V_i}\) the composition of the remaining blowups, so that the wonderful compactification is given by the composition \(\pi_i \circ \psi_i\). Denote the exceptional divisor of \(\psi_i\) by \(E_i\). Consider the divisor \(D_i := \psi_i^* \mathcal{O}(1) - E_i\) on \(\Bl_{V_i} \mathbb{P}^{2n+1}\). Note that \(D_i\) is nef, since for any curve \(C\) in \(\Bl_{V_i} \mathbb{P}^{2n+1}\) we may pick a hyperplane \(H \subset \mathbb{P}^{2n+1} \) such that \(C \not\subset \tilde{H}\) but \(Z_i \subset \tilde{H}\), whereupon \((\pi^* \mathcal{O}(1) - E_i) \cdot C = \tilde{H} \cdot C \ge 0\). Now \[ -K_B - W \sim \sum_{i=0}^{n} \pi_i^* D_i + (\pi_0 \circ \psi_0)^* \mathcal{O}(n). \] The divisors \((\pi \circ \psi)^* \mathcal{O}(1), \ \pi_0^* D_0, \dots, \pi_{n-1}^* D_{n} \) form a basis of the Picard group of \(W\). Therefore they span a full dimensional subcone of the nef cone of \(B\). Now \(-K_B - W\) is on the interior of this cone, and so is ample. \end{proof} By construction there is a natural morphism \(\pi: W \to Q\) which is a composition of blowups, each centered at a smooth subvariety by Theorem~\ref{thm:wonderful}. Fix the line bundle \(L = \mathcal{O}(1)_{|Q} \) on \(Q\). Recall that there is an \(n\)-torus \(T\) acting on \(Q\) prescribed by \(\deg x_{2i} = e_{i+1}, \deg x_{2i+1} = -e_{i+1}\). This torus action may be extended to \(W\). These torus actions are not effective, but we may quotient by the global stabilizer, a cyclic group of order two generated by \(-\text{Id} = (-1,\dots,-1) \in T\), to obtain the action of an effective torus \(T'\) on \(Q\) and \(W\). Quotienting does not affect the calculation of GIT quotients. In \cite{suess18-2} the GIT quotients \(q: Q \to Q \sslash T'\) were determined. They are either trivial contractions to a point, or of the following form: \begin{equation} \label{blowupquot} Q \to \mathbb{P}^{n-1}; \ \ [x] \mapsto (x_1x_2:\dots :x_{2n-1}x_{2n}). \end{equation} The Chow quotient is also then given by (\ref{blowupquot}). Following \cite{kirwan}, there is an ample line bundle \(\tilde{L}\) on \(W\) such that any linearization of \(\tilde{L}\) is a lift of a linearization of \(L\). Moreover, given a linearization, it can be shown that \(W^{ss} \subset \pi^{-1}(X^{ss})\). By \cite[Lemma 3.11]{kirwan} the GIT quotients of \(W\) given by a linearization of \(\tilde{L}\) are precisely the restrictions of compositions \(q \circ \pi\), where \(q\) is the GIT quotient map for \(Q\) given by the corresponding linearization of \(L\). We can conclude that the Chow quotient is the restriction of a composition of the blowup map \(\pi\) followed by the map (\ref{blowupquot}). We now calculate the boundary divisor of this quotient, proving Lemma~\ref{lem:1.6}: \begin{proof}[Proof of Lemma~\ref{lem:1.6}] Recall the definition of the boundary divisor in the Chow quotient pair, see (\ref{boundary}). From the formula (\ref{blowupquot}) it is easy to calculate that the boundary divisor of the Chow quotient pair of \(Q\) is trivial. Therefore the only chance for \(m_Z >1\) occurs at the exceptional loci of blowups. If we construct \(W\) with the following sequence of blowups \[ W = \Bl_{\tilde{Z}_{n}} \dots \Bl_{\tilde{Z}_1} \Bl_{Z_0} Q. \] The exceptional divisor of the composition of blowup maps is of the form \(E_{n-1} + \dots + E_0\), where \(E_i\) is the exceptional divisor of the \((i+1)\)th blowup in the sequence. By symmetry it is enough to calculate the generic stabilizer of \(E_0\). Consider \(\Bl_{Z_0}Q\), realized as a subvariety of \(Q \times \mathbb{P}^1 \), given by the additional equation \(vx_0 - ux_1\), where \(u,v\) are the homogeneous variables in the second factor. There is an induced \(T\)-action on \(\Bl_{Z_0}\), under which the equation \(vx_0 - ux_1\) must be homogeneous with respect to the induced grading of the character lattice of \(T\). This implies that \(\deg u = \deg v + 2e_1\), and we see that the generic stabilizer of the \(T' = T/ \langle \pm \text{Id} \rangle \)-action on the exceptional divisor must be a cyclic group of order \(2\), generated by the element \((-1,1,\dots,1) + \langle \pm \text{Id} \rangle\). \end{proof} \section{Threshold Bounds and new K\"ahler-Einstein metrics} Let \(Y = \mathbb{P}^2\) with projective coordinates \(x_1,x_2,x_3\) and consider the boundary divisor \(B_\gamma := \gamma \sum_{i=0}^3 H_i\), where \(H_1,H_2,H_3\) are the coordinate hyperplanes, and \(H_0 = V (\sum_i x_i) \). Consider the subgroup \(G \cong S_4\) of \(\text{Aut}(Y)\) permuting the hyperplanes \(H_0,\dots,H_3\). First we prove Lemma~\ref{lem:alph}: \begin{proof}[Proof of Lemma~\ref{lem:alph}] \ To show \(\glct_{G}(Y,B_\gamma) \ge \lambda\) it is sufficient to show that \(B_\gamma+\lambda D\) is log canonical for any \( D \in |-K_Y - B_\gamma|_{\mathbb{Q}}^G\). Fix such a \(D\) and take \(P \in Y\). At most two of the \(H_i\) pass through \(P\), so without loss of generality suppose \(H_0,H_3\) do not. Modify \(B_\gamma+\lambda D\) by removing any components supported at \(H_0,H_3\), to obtain a divisor \(D'\). Note \(B_\gamma+\lambda D\) is log canonical at \(P\) if \(D'\) is globally log canonical. Note also that although \(D'\) may not be \(G\)-invariant, it is still invariant under the involution \(\sigma \) swapping \(x_1\) and \(x_2\). Finally note \(D' \ge \gamma H_1 + \gamma H_2\). Consider the \(\mathbb{C}^*\)-action \(t \cdot [x_1:x_2:x_3] = [ t x_1: t x_2 : x_3]\). By \ref{degenpair}, \(D'\) is log canonical if \(D_0' := \lim_{t \to 0} \left( t \cdot D' \right) \) is log canonical. This \(\mathbb{C}^*\)-action commutes with \(\sigma \), and so \(D_0'\) is invariant under \(\sigma\). Moreover is is clear that each component of \(D_0'\) must be a line through the point \([0,0,1]\). By \(\sigma\)-invariance \(D_0'\) must be of the form: \[ D_0' = \gamma (H_1+H_2) + a V (x_1+x_2) + b V(x_1-x_2) + \sum_i c_i (L_i + \sigma L_i), \] where \(a + b + \sum_i 2 c_i \le 2 \gamma + 3\lambda - 4 \gamma \lambda\). This is a divisor of the form described in Example \ref{examplelct}. It is therefore log canonical if the following inequalities hold: \begin{align*} 2\gamma + 3 \lambda - 4\gamma \lambda &< 2; \\ 3\gamma - 4\gamma \lambda &\le 1. \end{align*} Basic manipulation of inequalities gives our bounds on the global threshold. \end{proof} \begin{proof}[Proof of Theorems \ref{thm:KE1} and \ref{thm:KE2}] If \(X\) is \(X_{1,2}^5\) or \(W^6\) then \(X\) has Chow quotient \((\mathbb{P}^2,B_{1/2})\), and applying Theorem~\ref{thm:SU} and Lemma~\ref{lem:alph} we see that \(\alpha_{S_4}(X) \ge 1\). By Tian's criterion then \(X\) admits an invariant K\"ahler-Einstein metric. Similarly the Chow quotient of \(X_{1,3}^5\) is \((\mathbb{P}^2,B_{2/3})\), and we see \(\alpha_{S_4}(X_{1,3}^5) \ge 2\), so \(X_{1,3}^5\) is also K\"ahler-Einstein. \end{proof}
\section{0pt}{14pt plus 4pt minus 2pt}{6pt plus 2pt minus 2pt} \titlespacing\subsection{0pt}{12pt plus 4pt minus 2pt}{4pt plus 2pt minus 2pt} \titlespacing\subsubsection{0pt}{8pt plus 4pt minus 2pt}{4pt plus 2pt minus 2pt} \titlespacing\paragraph{0pt}{6pt plus 4pt minus 2pt}{6pt plus 2pt minus 2pt} \renewcommand{\baselinestretch}{1.0} \title{Trajectory of Alternating Direction Method of Multipliers \\ and Adaptive Acceleration} \author{Clarice Poon\thanks{Department of Mathematics, University of Bath, Bath, UK. E-mail: \texttt{<EMAIL>} } \and Jingwei Liang\thanks{DAMTP, University of Cambridge, Cambridge, UK. E-mail: \texttt{<EMAIL>} }} \date{} \begin{document} \setlength{\abovedisplayskip}{5pt} \setlength{\belowdisplayskip}{3pt} \maketitle \begin{abstract} The alternating direction method of multipliers (ADMM) is one of the most widely used first-order optimisation methods in the literature owing to its simplicity, flexibility and efficiency. Over the years, numerous efforts are made to improve the performance of the method, such as the inertial technique. By studying the geometric properties of ADMM, we discuss the limitations of current inertial accelerated ADMM and then present and analyze an adaptive acceleration scheme for the method. Numerical experiments on problems arising from image processing, statistics and machine learning demonstrate the advantages of the proposed acceleration approach. \end{abstract} \section{Introduction} \label{sec:introduction} Consider the following constrained and composite optimisation problem \beq\label{eq:problem-admm}\tag{$\calP_{\mathrm{ADMM}}$} \min_{x \in \bbR^n , y\in \bbR^m } ~ R(x) + J(y) \quad \textrm{such~that} \quad Ax + By = b , \eeq where the following basic assumptions are imposed \begin{enumerate}[leftmargin=4em,label= ({${\bcA}$\textbf{.\arabic{*}})},ref= ${\bcA}$\textbf{.\arabic{*}}] \item \label{ADMM:RJ} $R\in \lsc\pa{\bbR^n}$ and $J \in \lsc\pa{\bbR^m}$ are proper convex and lower semi-continuous functions. \item \label{ADMM:AB} $A : \bbR^n \to \bbR^p $ and $B : \bbR^m \to \bbR^p$ are {injective} linear operators \item \label{ADMM:minimizers} $\ri\pa{\dom(R) \cap \dom(J)} \neq \emptyset$, and the set of minimizers is non-empty. \end{enumerate} Over the past years, problem \eqref{eq:problem-admm} has attracted a great deal of interests as it covers many important problems arising from data science, machine learning, statistics, inverse problems and imaging science, etc.; See Section \ref{sec:experiment} for examples. In the literature, different numerical schemes are proposed to handle the problem, among them the alternating direction method of multipliers (ADMM) is the most prevailing one. Earlier works of ADMM include \cite{glowinski1975approximation,gabay1975dual,gabay1983chapter,eckstein1992douglas}, and recently it has gained increasing popularity, in part due to \cite{boyd2011distributed}. To derive ADMM, first consider the augmented Lagrangian associated to \eqref{eq:problem-admm} which reads \[ \calL(x,y; \psi) \eqdef R(x) + J(y) + \iprod{\psi}{Ax+By-b} + \sfrac{\gamma}{2}\norm{Ax+By-b}^2 , \] where $\gamma>0$ and $\psi \in \bbR^p$ is the Lagrangian multiplier. To find a saddle-point of $\calL(x,y; \psi) $, ADMM applies the following iteration \beq\label{eq:admm \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \tfrac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \tfrac{\gamma}{2} \norm{A\xk+By-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \psik &= \psikm + \gamma\pa{A\xk + B\yk - b} . \end{aligned} \eeq By defining a new point $\zk \eqdef \psikm + \gamma A\xk$, we can rewrite ADMM iteration \eqref{eq:admm} into the following form \beq\label{eq:admm2} \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \sfrac{\gamma}{2} \norm{Ax - \tfrac{1}{\gamma} \pa{ \zkm - 2\psikm } }^2 , \\ \zk &= \psikm + \gamma A\xk , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{By + \tfrac{1}{\gamma} \pa{ \zk - \gamma b } }^2 , \\ \psik &= \zk + \gamma\pa{B\yk - b} . \end{aligned} \eeq For the rest of the paper, we shall focus on the above four-point formulation of ADMM. In the literature, it is well known that ADMM is equivalent to applying Douglas--Rachford splitting \cite{douglas1956numerical} to the dual problem of \eqref{eq:problem-admm} \cite{gabay1983chapter} which reads \beq\label{eq:problem-admm-dual}\tag{$\calD_{\mathrm{ADMM}}$} \max_{\psi\in\bbR^p } - \Pa{R^*(-A^T \psi) + J^*(-B^T \psi) + \iprod{\psi}{b} } , \eeq where $R^*(v) \eqdef \sup_{x\in\bbR^n} ~ \pa{ \iprod{x}{v} - R(x) } $ is the Fenchel conjugate, or simply conjugate, of $R$. The corresponding iteration of Douglas--Rachford splitting reads \[ \begin{aligned} \uk &= \argmin_{u\in\bbR^p}~ \gamma R^*(-A^T u) + \sfrac{1}{2} \norm{u - (2\psikm - \zkm)}^2 , \\ \zk &= \zkm + \uk - \psikm , \\ \psik &= \argmin_{\psi\in\bbR^p}~ \gamma J^*(-B^T \psi) + \iprod{\psi}{\gamma b} + \sfrac{1}{2} \norm{\psi - \zk}^2 , \end{aligned} \] where $\zk$ is exactly the same one of \eqref{eq:admm2}. The above iteration can be written as the fixed-point iteration of $\zk$, that is \beq\label{eq:fp-dr} \zk = \fDR (\zkm) , \eeq with $\fDR$ being the fixed-point operator. We refer to Appendix \ref{P-sec:tra-admm} for the expression of $\fDR$ and more discussions between the equivalence between ADMM and Douglas--Rachford splitting. Based on such an equivalence, the convergence property of ADMM has been well studied in the literature, we refer to \cite{he20121,eckstein2012augmented,deng2016global,hong2017linear} and the references therein. In \cite{bauschke2014local}, $\uk, \psik$ are called the ``\emph{shadow sequences}'' of Douglas--Rachford splitting, in this paper, following the terminology, we shall call $\xk, \yk$ of \eqref{eq:admm} the shadow sequences of ADMM. \subsection{Contributions} The contribution of our paper is threefold. First, for the sequence $\seq{\zk}$ of \eqref{eq:admm2}, we show that it has two different types of trajectory: \begin{itemize}[leftmargin=2em] \item When both $R, J$ are non-smooth functions, under the assumption that they are partly smooth (see Definition \ref{dfn:psf}), we show that the eventual trajectory of $\seq{\zk}$ is approximately a spiral which can be characterized precisely if $R, J$ are moreover locally polyhedral around the solution. \item When at least one of $R, J$ is smooth, we show that depends on the choice of $\gamma$, the eventual trajectory of $\seq{\zk}$ can be either straight line or spiral. \end{itemize} Second, based on trajectory of $\seq{\zk}$, we discuss the limitations of the current combination of ADMM and inertial acceleration technique. In Section \ref{sec:fail-inertial}, we distinguish the situations where inertial acceleration will work and when it fails. More precisely, we find that inertial technique will work if the trajectory of $\seq{\zk}$ is or close to a straight line, and will fail if the trajectory is a spiral. Our core contribution is an adaptive acceleration for ADMM, which is inspired by the trajectory of ADMM and dubbed ``A$\!^3$DMM''. The limitation of inertial technique, particularly its failure, implies that the right acceleration scheme should be able to follow the trajectory of the iterates. In Section \ref{sec:ada-admm}, we propose an adaptive extrapolation scheme for accelerating ADMM which is able to following the trajectory of the generated sequence. Our proposed A$\!^3$DMM belongs to the realm of extrapolation method, and provides an alternative geometrical interpretation for polynomial extrapolation methods such as Minimal Polynomial Extrapolation (MPE) \cite{cabay1976polynomial} and Reduced Rank Extrapolation (RRE) \cite{eddy1979extrapolating,mevsina1977convergence}. \subsection{Related works} Over the past decades, owing to the tremendous success of inertial acceleration \cite{nesterov83,fista2009}, the inertial technique has been widely adapted to accelerate other first-order algorithms. In terms of ADMM, related work can be found in \cite{pejcic2016accelerated,kadkhodaie2015accelerated,pmlrv80franca18a}, either from proximal point algorithm perspective or continuous dynamical system. However, to ensure that inertial acceleration works, stronger assumptions are imposed on $R, J$ in \eqref{eq:problem-admm}, such as smooth differentiability or strong convexity. When it comes to general non-smooth problems, these works may fail to provide acceleration. {Recently in \cite{franca2018dynamical}, an $O(1/k^{2})$ convergence rate is established for ADMM using Nesterov acceleration, however the result holds only for the continuous dynamical system while the discrete-time optimization scheme remains unavailable.} For more generic acceleration techniques, there are extensive works in numerical analysis on the topic of convergence acceleration for sequences. The goal of convergence acceleration is, given an arbitrary sequence $\seq{\zk}\subset\RR^n$ with limit $\zsol$, finding a transformation $\Ee_k : \{z_{k-j}\}_{j=1}^q\to \zbark \in \RR^n$ such that $\zbark$ converges faster to $\zsol$. In general, the process by which $\{\zk\}$ is generated is unknown, $q$ is chosen to be a small integer, and $\zbark$ is referred to as the extrapolation of $\zk$. Some of the best known examples include Richardson's extrapolation \cite{richardson1927viii}, the $\Delta^2$-process of Aitken \cite{aitken1927xxv} and Shank's algorithm \cite{shanks1955non}. We refer to \cite{brezinski2001convergence,brezinski2013extrapolation,sidi2003practical} and references therein for a detailed historical perspective on the development of these techniques. Much of the works on the extrapolation of vector sequences was initiated by Wynn \cite{wynn1962acceleration} who generalized the work of Shank to vector sequences. In the appendix, the formulation of some of these methods are provided. In particular, minimal polynomial extrapolation (MPE) \cite{cabay1976polynomial} and Reduced Rank Extrapolation (RRE) \cite{eddy1979extrapolating,mevsina1977convergence} (which is also a variant of Anderson acceleration developed independently in \cite{Anderson}), which are particularly relevant to this present work (see Section \ref{sec:acc-gua} for brief discussion). More recently, there has been a series of work on a regularized version of RRE stemming from \cite{scieur2016regularized}. We remark however that the regularisation parameter in these works rely on a grid search based on objective function, their applicability to the general ADMM setting is unclear. \paragraph{Notations} Denote $\bbR^n$ a $n$-dimensional Euclidean space equipped with scalar inner product $\iprod{\cdot}{\cdot}$ and norm $\norm{\cdot}$. $\Id$ denotes the identity operator on $\bbR^n$. $\lsc(\bbR^n)$ denotes the class of proper convex and lower-semicontinuous functions on $\bbR^n$. For a nonempty convex set $S \subset \bbR^n$, denote $\ri(S)$ its relative interior, $\LinHull(S)$ the smallest subspace parallel to $S$ and $\PT{S}$ the projection operator onto $S$. The sub-differential of a function $R \in \lsc(\bbR^n)$ is a set-valued mapping defined by $\partial R (x) \eqdef \Ba{ g\in\bbR^n | R(x') \geq R(x) + \iprod{g}{x'-x} , \forall x' \in \bbR^n }$. The spectral radius of a matrix $M$ is denoted by $\rho(M)$. \paragraph{Organization} The rest of paper is organized as following: in Section \ref{sec:trajectory-admm} we study the trajectory of ADMM for the sequence $\seq{\zk}$. The limitation of the inertial technique is discussed in Section \ref{sec:fail-inertial}. Then in Section \ref{sec:ada-admm}, we propose the adaptive acceleration scheme for ADMM followed by detailed discussions provided in Section \ref{sec:discussion}. Numerical experiments from machine learning and imaging are provided in Section \ref{sec:experiment}. In the appendix, we first provide extra discussions on why inertial fails, and then the proofs of main propositions. \section{Trajectory of ADMM} \label{sec:trajectory-admm} In this section, we discuss the trajectory of the sequence $\seq{\zk}$ generated by ADMM based on the concept ``partial smoothness'' which was first introduced in \cite{LewisPartlySmooth}. \subsection{Partial smoothness} The difficulty of analyzing the trajectory, or in general the behaviors (\eg convergence rate), of ADMM is that the iteration of the method is non-linear. We need a proper tool of (locally) linearize the iteration of ADMM, and partial smoothness provides a powerful framework to achieve the goal. Let $\calM \subset \bbR^n$ be a $C^2$-smooth Riemannian manifold, denote $\tanSp{\calM}{x}$ the tangent space of $\calM$ at a point $x \in \calM$. \begin{definition}[{Partly smooth function \cite{LewisPartlySmooth}}]\label{dfn:psf} A function $R \in \lsc(\bbR^n)$ is partly smooth at $\xbar$ relative to a set $\calM_{\xbar}$ if $\partial R(\xbar) \neq \emptyset$ and $\calM_{\xbar}$ is a $C^2$ manifold around $\xbar$, and moreover \begin{itemize}[label={}, leftmargin=2.5cm \item[\bf Smoothness] \label{PS:C2} $R$ restricted to $\calM_{\xbar}$ is $C^2$ around $\xbar$. \item[\bf Sharpness] \label{PS:Sharp} The tangent space $\tanSp{\calM_{\xbar}}{\xbar} = \LinHull\pa{\partial R(\xbar)}^\bot$. \item[\bf Continuity] \label{PS:DiffCont} The set-valued mapping $\partial R$ is continuous at $x$ relative to $\calM_{\xbar}$. \end{itemize} \end{definition} {\noindent}The class of partly smooth functions at $\xbar$ relative to $\calM_{\xbar}$ is denoted as $\PSF{\xbar}{\calM_{\xbar}}$. Popular examples of partly smooth functions can be found in \cite[Chapter 5]{liang2016thesis}. Loosely speaking, a partly smooth function behaves \emph{smoothly} along $\calM_{\xbar}$, and \emph{sharply} normal to it. The essence of partial smoothness is that the behaviour of the function and of its minimizers depend essentially on its restriction to this manifold, hence providing the possibilities to study the trajectory of sequences. \subsection{Trajectory of sequence $\zk$}\label{subsec:tra-admm} Next we discuss the trajectory of ADMM in terms of $\seq{\zk}$. The iteration of ADMM is non-linear in general owing to the non-linearity of the proximity mappings. However, when $R, J$ are partly smooth, the local $C^2$-smoothness allows us to linearize the proximity mappings, hence the ADMM iteration. In turn, this allows us to study the trajectory of sequence generated by the method. We denote $(\xsol, \ysol, \psisol)$ a saddle-point of $\calL(x,y; \psi)$ and let $\zsol = \psisol + \gamma A\xsol$. Denote $\vk \eqdef \zk-\zkm$ and let $\theta_k \eqdef \arccos\Pa{ \frac{\iprod{\vk}{\vkm}}{\norm{\vk}\norm{\vkm}} }$ be the angle between $\vk, \vkm$. We shall use $\seq{\theta_{k}}$ to characterize the trajectory of $\seq{\zk}$. Given a saddle point $(\xsol, \ysol, \psisol)$, the corresponding KKT condition entails $- A^T \psisol \in {\partial R(\xsol)} $ and $- B^T \psisol \in {\partial J(\ysol)} $, below we impose that \beq\label{eq:ndc-admm}\tag{$\textrm{ND}$} - A^T \psisol \in \ri\Pa{\partial R(\xsol)} \qandq - B^T \psisol \in \ri\Pa{\partial J(\ysol)} . \eeq \subsubsection{Both {$R, J$} are non-smooth} Let $\MmRx, \MmJy$ be two smooth manifolds around $\xsol, \ysol$ respectively, and suppose $R \in \PSF{\xsol}{\MmRx}, J \in \PSF{\ysol}{\MmJy}$ are partly smooth. Denote $T_{\xsol}^R, T_{\ysol}^J$ the tangent spaces of $\MmRx, \MmJy$ at $\xsol, \ysol$, respectively. Let $A_{R} \eqdef A \circ \PTR{\xsol}, B_J \eqdef B \circ \PTJ{\ysol}$ and $T_{A_R}, T_{B_J}$ be the range of $A_R, B_J$ respectively. Denote $(\alpha_j)_{j=1,..., \min\ba{\dim(T_{A_R}), \dim(T_{B_J})}}$ the principal angles (see Definition \ref{def:principal_angle}) between $T_{A_R}, T_{B_J}$, and let $\alpha_F, \alpha'$ be the smallest and 2nd smallest of all non-zero~$\alpha_j$. \begin{theorem}\label{prop:trajectory-admm For problem \eqref{eq:problem-admm} and ADMM iteration \eqref{eq:admm2}, assume that conditions \iref{ADMM:RJ}-\iref{ADMM:minimizers} are true, then $(\xk,\yk,\psik)$ converges to a saddle point $(\xsol, \ysol, \psisol)$ of $\calL(x,y; \psi)$. Suppose that $R \in \PSF{\xsol}{\MmRx}, J \in \PSF{\ysol}{\MmJy}$ and condition \eqref{eq:ndc-admm} holds, then \begin{enumerate}[label={\rm (\roman{*})}, leftmargin=3em] \item There exists a matrix $\mADMM$ such that $\vk = \mADMM \vkm + o(\norm{\vkm})$ holds for all $k$ large enough. \item If moreover, $R, J$ are locally polyhedral around $\xsol, \ysol$, then $\vk = \mADMM \vkm$ with $\mADMM$ being normal and having eigenvalues of the form $\cos(\alpha_j) e^{\pm \mathrm{i} \alpha_j}$, and $\cos(\theta_k) = \cos(\alpha_F) + O(\eta^{2k})$ with $\eta = \cos(\alpha')/\cos(\alpha_F)$. \end{enumerate} \end{theorem} \begin{remark} The result indicates that, when both $R, J$ are locally polyhedral, the trajectory of $\seq{\zk}$ is a spiral. For the case $R,J$ being general partly smooth functions, though we cannot prove, numerical evidence shows that the trajectory of $\seq{\zk}$ could be either straight line or spiral; See Section \ref{sec:experiment} for evidences. \end{remark} \subsubsection{$R$ or/and $J$ is smooth} Now consider the case that at least one function out of $R, J$ is smooth. For simplicity, consider that $R$ is smooth and $J$ remains non-smooth. We have the following result. \begin{proposition}\label{prop:trajectory-admm-real} For problem \eqref{eq:problem-admm} and ADMM iteration \eqref{eq:admm2}, assume that conditions \iref{ADMM:RJ}-\iref{ADMM:minimizers} are true, then $(\xk,\yk,\psik)$ converges to a saddle point $(\xsol, \ysol, \psisol)$ of $\calL(x,y; \psi)$. Suppose $R$ is locally $C^2$ around $\xsol$, $J \in \PSF{\ysol}{\MmJy}$ is partly smooth and condition \eqref{eq:ndc-admm} holds for $J$, then Theorem \ref{prop:trajectory-admm}(i) holds for all $k$ large enough. {If moreover, $A$ is full rank square matrix, then all the eigenvalues of $\mADMM$ are real for $\gamma > \norm{(A^T A)^{-\frac{1}{2}} {\nabla^2 R(\xsol)} (A^T A)^{-\frac{1}{2}}}$.} \end{proposition} \begin{remark} When the spectrum of $M$ is real, numerical evidence shows that the eventual trajectory of $\seq{\zk}$ is a straight line, which is different from the case where both functions are non-smooth. If moreover $o(\norm{\vkm})$ vanishes fast enough, we can prove that $\theta_k \to 0$. It should be emphasized that the trajectory of $\seq{\zk}$ is determined by the property of the \emph{leading eigenvalue} of $\mADMM$. Therefore, for $\gamma \leq \norm{(A^T A)^{-\frac{1}{2}} {\nabla^2 R(\xsol)} (A^T A)^{-\frac{1}{2}}}$, though $\mADMM$ will have complex eigenvalues, the leading one is not necessarily to be complex. As a result, the trajectory of $\seq{\zk}$ could be either spiral (complex leading eigenvalue) or straight line (real leading eigenvalue). \end{remark} In Figure \ref{fig:trajectory-admm}, we present two examples of the trajectory of ADMM. Subfigure (a) shows a spiral trajectory in $\bbR^2$ which is obtained from solving a polyhedral feasibility problem; See Section \ref{subsec:feas}. For this case, both $R$ and $J$ are indicator functions of affine subspaces. For subfigure (b), we use ADMM to solve a toy LASSO problem in $\bbR^3$ with $\gamma$ chosen such that the eventual trajectory of $\seq{\zk}$ is straight line. \begin{figure}[!ht] \centering \subfloat[Spiral trajectory]{ \includegraphics[width=0.31\linewidth]{figure/trajectory-ADMM-example1.pdf} } {\hspace{2pt}} \subfloat[Eventual straight line trajectory]{ \includegraphics[width=0.3\linewidth]{figure/trajectory-ADMM-example2.pdf} } {\hspace{2pt}} \subfloat[Trajectory of shadow sequences]{ \includegraphics[width=0.31\linewidth]{figure/trajectory-shadow-sequence-ADMM.pdf} } \\ \caption{Two different trajectories of ADMM and trajectory of shadow sequences.} \label{fig:trajectory-admm} \end{figure} \begin{remark}[Trajectory of shadow sequences $\xk, \yk$] We conclude this section by remarking the trajectories of the shadows sequences $\xk, \yk$, which are more complicated than that of $\zk$. The trajectories of $\xk, \yk$ depend on both the trajectory of $\zk$ and the properties of the functions $R, J$. For example, for the feasibility problem of Section \ref{subsec:feas}, the trajectory of $\zk$ is a spiral, see Figure \ref{fig:trajectory-admm} (a) and (c). The trajectory of $\yk$ is the projection of the trajectory of $\zk$ onto subspace $T_{1}$, which means that $\yk$ is swinging around $\ysol$ along $T_{1}$. Similar trajectory for $\xk$; see Figure \ref{fig:trajectory-admm} (c). The trajectories of $\xk$ and/or $\yk$ can also be spirals when $R$ and/or $J$ are smooth and the trajectory of $\zk$ is spiral. When the trajectory of $\zk$ is a straight-line, so are the trajectories of $\xk, \yk$. \end{remark} \section{The failure of inertial acceleration} \label{sec:fail-inertial} In this section, we use the LASSO and feasibility problems as examples to demonstrate the effects of applying inertial technique to ADMM, especially when it fails. One simple approach to combine inertial technique and ADMM is via the equivalence between ADMM and Douglas--Rachford splitting method. Applying the inertial scheme of \cite[Chapter 4]{liang2016thesis} to the Douglas--Rachford iteration \eqref{eq:fp-dr}, we obtain the following inertial scheme \[ \begin{aligned} \zbark &= \zk + \ak (\zk - \zkm) , \\ \zkp &= \fDR(\zbark) . \end{aligned} \] The above scheme can be reformulated as an instance of inertial Proximal Point Algorithm, guaranteed to be convergent for $\ak < \frac{1}{3}$ \cite{alvarez2001inertial}; We refer to \cite{pejcic2016accelerated} or \cite[Chapter 4.3]{liang2016thesis} for more details. Adapting the above scheme to ADMM we obtain the following inertial ADMM (iADMM) \beq\label{eq:iadmm} \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \sfrac{\gamma}{2} \norm{Ax - \tfrac{1}{\gamma} \pa{ \zbarkm - 2\psikm } }^2 , \\ \zk &= \psikm + \gamma A\xk , \\ \zbark &= \zk + \ak (\zk - \zkm) , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{By + \tfrac{1}{\gamma} \pa{ \zbark - \gamma b } }^2 , \\ \psik &= \zbark + \gamma\pa{B\yk - b} , \end{aligned} \eeq which considers only the momentum of $\seq{\zk}$ without any stronger assumptions on $R,J$. To our knowledge, there is no acceleration guarantee for \eqref{eq:iadmm}. \begin{remark} $~$ \begin{itemize} \item In the inertial scheme \eqref{eq:iadmm}, we can also consider momentum of more than two points, that is using more points than $\zk,\zkm$ to update $\zbark$. For example, the following three-point momentum can be considered \[ \zbark = \zk + \ak (\zk - \zkm) + \bk (\zkm - \zkmm) . \] We shall use the feasibility problem to demonstrate the benefits of the above approach. \item In literature, besides \eqref{eq:iadmm}, other combinations of inertial technique and ADMM are also proposed, see for instance \cite{pejcic2016accelerated,kadkhodaie2015accelerated}. To ensure acceleration guarantees, stronger assumption needs to be imposed, such as Lipschitz smoothness and strong convexity. \end{itemize} \end{remark} \begin{figure}[!ht] \centering \subfloat[$\gamma = \frac{\norm{K}^{2}}{10}: \cos(\theta_k)$]{ \includegraphics[width=0.325\linewidth]{figure/failure-iADMM-l1-lr-tk.pdf} } \hspace{8pt} \subfloat[$\gamma = \frac{\norm{K}^{2}}{10}: \norm{\zk-\zsol}$]{ \includegraphics[width=0.325\linewidth]{figure/failure-iADMM-l1-lr.pdf} } \\ \subfloat[$\gamma = \norm{K}^2+0.1: \cos(\theta_k)$]{ \includegraphics[width=0.325\linewidth]{figure/success-iADMM-l1-lr-tk.pdf} } \hspace{8pt} \subfloat[$\gamma = \norm{K}^2+0.1: \norm{\zk-\zsol}$]{ \includegraphics[width=0.325\linewidth]{figure/success-iADMM-l1-lr.pdf} } \\ \caption{Trajectory of sequence $\seq{\zk}$ and performance of inertial on ADMM. (a) $\cos(\theta_k)$ for $\gamma=\frac{\norm{K}^{2}}{10}$; (b) failure of inertial ADMM on spiral trajectory; (c) $\cos(\theta_k)$ for $\gamma=\norm{K}^2+0.1$; (d) success of inertial ADMM on straight line trajectory.} \label{fig:tra-iadmm} \end{figure} \subsection{LASSO problem} The formulation of LASSO in the form of \eqref{eq:problem-admm} reads \beq\label{eq:lasso} \begin{aligned} \min_{x, y \in \bbR^n} ~ \mu \norm{x}_1 + \sfrac{1}{2} \norm{Ky - f}^2 \quad\textrm{such~that}\quad x - y = 0 , \end{aligned} \eeq where $K \in \bbR^{m\times n} ,~ m < n$ is a random Gaussian matrix. Since $\frac{1}{2} \norm{K y - f}^2$ is quadratic, owing to Proposition \ref{prop:trajectory-admm-real}, the eventual trajectory of $\seq{\zk}$ is a straight line if $\gamma > \norm{K}^2$, and a spiral for some $\gamma \leq \norm{K}^2$. Therefore, we consider two different choices of $\gamma$ which are $\gamma=\frac{\norm{K}^{2}}{10}$ and $\gamma = \norm{K}^2 + 0.1$, and for each $\gamma$, four different choices of $\ak$ are considered \[ \ak \equiv 0.3 ,\quad \ak \equiv 0.7 \qandq \ak = \tfrac{k-1}{k+3} . \] The 3rd choice of $\ak$ corresponds to FISTA \cite{chambolle2015convergence}. For the numerical example, we consider $K \in \bbR^{640\times 2048}$ and $\mu = 1$, $f$ is the measurement of an $128$-sparse signal. The results are shown in Figure \ref{fig:tra-iadmm}, \begin{itemize}[leftmargin=2em] \item Case $\gamma=\frac{\norm{K}^{2}}{10}$: the value of $\cos(\theta_k)$ is plotted in Figure \ref{fig:tra-iadmm}(a), from which we can observed that $\theta_k$ eventually is changing in an interval which implies that the leading eigenvalue of $\mADMM$ is complex, and the trajectory of $\zk$ is a spiral. The inertial scheme works only for $\ak\equiv 0.3$, which is due to that fact that the trajectory of $\seq{\zk}$ is a spiral for $\gamma=\frac{\norm{K}^{2}}{10}$. As a result, the direction $\zk-\zkm$ is not pointing towards $\zsol$, hence unable to provide satisfactory acceleration. \item Case $\gamma=\norm{K}^2+0.1$: For this case, the leading eigenvalue of $\mADMM$ is real, hence the trajectory of $\zk$ is straight line. From $k=1000$, the increasing of $\cos(\theta_k)$ is due to machine errors. All choices of $\ak$ work since $\seq{\zk}$ eventually forms a straight line. Among these four choices of $\ak$, $\ak\equiv 0.7$ is the fastest, while $\ak=\frac{k-1}{k+3}$ eventually is the slowest. \end{itemize} It should be noted that, though ADMM is faster for $\gamma=\frac{\norm{K}^{2}}{10}$ than $\gamma = \norm{K}^2+0.1$, our main focus here is to demonstrate how the trajectory of $\seq{\zk}$ affects the outcome of inertial acceleration. The above comparisons, particularly for $\gamma=\frac{\norm{K}^{2}}{10}$ imply that the trajectory of the sequence $\seq{\zk}$ is crucial for the acceleration outcome of the inertial scheme. Since the trajectories of ADMM depends on the properties of $R, J$ and choice of $\gamma$, this implies that the right scheme that can achieve uniform acceleration despite $R,J$ and $\gamma$ should be able to adapt itself to the trajectory of the method. \subsection{Feasibility problem}\label{subsec:feas} For the LASSO problem, though $\ak = 0.7, \frac{k-1}{k+2}$ fail to provide acceleration for $\gamma = \frac{\norm{K}^{2}}{10}$, $\ak = 0.3$ is marginally faster than the standard ADMM. Below we consider a feasibility problem to demonstrate that \eqref{eq:iadmm} will fail to provide acceleration as long as $\ak > 0$. \begin{figure}[!ht] \centering \subfloat[$\norm{\zk-\zsol}$]{ \includegraphics[width=0.35\linewidth]{figure/ADMM-feasibility-dk.pdf} } {\hspace{2pt}} \subfloat[Trajectory of $\zk$]{ \includegraphics[width=0.37\linewidth]{figure/ADMM-feasibility-trajectory.pdf} } \\ \caption{Performance of different schemes and trajectory of $\zk$ for ADMM applying to feasibility problem.} \label{fig:fail-iadmm-feasibility} \end{figure} Let $T_1, T_2$ be two subspaces of $\bbR^2$ such that $T_1 \cap T_2 = \ba{0}$, and consider the following problem \beq\label{eq:feasibility} \textrm{find} ~~ x \in \bbR^2 ~\enskip \textrm{such that} \enskip x \in \T_1 \cap T_2 , \eeq which is finding the common point of $T_1$ and $T_2$. The problem can be written as \[ \min_{x \in \bbR^n , y\in \bbR^m } ~ R(x) + J(y) \quad \textrm{such~that} \quad x - y = 0 , \] where $R(x), J(y)$ are the indicator functions of $T_1, T_2$, respectively. Specify \eqref{eq:iadmm} to this case we obtain the following iteration \[ \begin{aligned} \xkp&= \proj_{T_1} \Pa{ \pa{ \zbark - 2\psik } / \gamma } , \\ \zkp &= \psik + \gamma \xkp , \\ \zbarkp &= \zkp + \ak (\zkp - \zk) , \\ \ykp &= \proj_{T_2} \pa{ \zbarkp / \gamma } , \\ \psikp &= \zbarkp - \gamma \ykp . \end{aligned} \] To demonstrate the failure of inertial ADMM, besides the standard ADMM, the following schemes are considered \[ \begin{aligned} \textrm{iADMM}&: \zbark = \zk + 0.1(\zk-\zkm) , \\ \textrm{iADMM}&: \zbark = \zk + 0.3(\zk-\zkm) , \\ \textrm{iADMM}&: \zbark = \zk + 0.4(\zk-\zkm) - 0.2(\zkm - \zkmm) . \end{aligned} \] The performance of the four schemes in terms of $\norm{\zk-\zsol}$ is provided in Figure \ref{fig:fail-iadmm-feasibility} (a). It can be observed that for the inertial schemes with $\ak = 0.1, 0.3$, they are both slower than the standard ADMM, while the last scheme is faster than all the others. Such a difference is due to the fact that the trajectory of $\seq{\zk}$ of ADMM is a spiral, see Figure \ref{fig:fail-iadmm-feasibility} (b) the black dot line. As a result, the direction $\zk - \zkm$ is not pointing towards $\zsol$, making the inertial step useless. For the last inertial scheme, since the coefficient of $\zkm - \zkmm$ is negative, the direction $0.4(\zk-\zkm) - 0.2(\zkm - \zkmm)$ points towards $\zsol$, hence providing acceleration. In Section \ref{sec:failure-inertial}, substantial discussions on why inertial ADMM fails, when the trajectory of $\zk$ is spiral, are provided. Especially for the case when both functions in \eqref{eq:problem-admm} are (locally) polyhedral around the solution, \eg the feasibility problem discussed above. \section{A$\!^3$DMM: adaptive acceleration for ADMM} \label{sec:ada-admm} The previous section shows the trajectory of $\seq{\zk}$ eventually settles onto a regular path \ie either straight line or spiral. In this section, we exploit this regularity to design adaptive acceleration for ADMM, which is called ``A$\!^3$DMM''; See Algorithm \ref{alg:a3dmm}. The update of $\zbark$ in \eqref{eq:iadmm} can be viewed as a special case of the following extrapolation \beq\label{eq:zbarkp-E} \zbark = \calE(\zk, \zkm, \dotsm, z_{k-q}), \eeq for the choice of $q=1$. The idea is: given $\{z_{k-j}\}_{j=0}^{q+1}$, define $v_j\eqdef z_j - z_{j-1}$ and predict the future iterates by considering how the past directions $v_{k-1},\ldots, v_{k-q}$ approximate the latest direction $\vk$. In particular, define $V_{k-1} \eqdef \begin{bmatrix} v_{k-1} , \dotsm , v_{k-q} \end{bmatrix} \in \bbR^{n \times q}$, and let $c_k\eqdef \argmin_{c\in \RR^q}\norm{V_{k-1} c - v_k}^2 = \norm{ \sum_{j=1}^q c_j v_{k-j} - v_k}^2$. The idea is then that $V_k c_k \approx v_{k+1}$ and so, $\bar z_{k,1} \eqdef z_k + V_k c \approx z_{k+1}$. By iterating this $s$ times, we obtain $\bar z_{k,s}\approx z_{k+s}$. More precisely, given $c \in \bbR^{q}$, define the mapping $H$ by $ H(c) = \left[ \begin{array}{c|c} c_{1:q-1} & \Id_{q-1} \\ c_{q} & 0_{1,q-1} \end{array} \right] \in \bbR^{q \times q} $. Let $C_k = H(c_k)$, note that $V_{k} = V_{k-1} C_k$. Define $\bar V_{k,0} \eqdef V_k$ and for $s \geq 1$, define \[ \bar{V}_{k,s} \eqdef \bar{V}_{k,s-1} C_k \eqdef V_{k} C_k^s , \] where $C_k^s$ is the power of $C_k$. Let $(C)_{(:, 1)}$ be the first column of matrix $C$, then \beq\label{eq:zk_s} \begin{aligned} \zbar_{k,s} = \zk + \msum_{i=1}^{s} (\bar{V}_{k,i})_{(:, 1)} = \zk + \msum_{i=1}^{s} V_{k} (C_{k}^{i})_{(:, 1)} &= \zk + V_{k} \bPa{ \msum_{i=1}^{s} C_{k}^i }_{(:, 1)} , \end{aligned} \eeq which is the desired trajectory following extrapolation scheme. Define the extrapolation parameterized by $s, q$ as \[ \calE_{s, q}(\zk, \dotsm, z_{k-q-1}) \eqdef V_{k} \bPa{ \msum_{i=1}^{s} C_{k}^i }_{(:, 1)} , \] we obtain the following trajectory following adaptive acceleration for ADMM. \begin{center} \begin{minipage}{0.995\linewidth} \begin{algorithm}[H] \caption{A$\!^3$DMM - Adaptive Acceleration for ADMM} \label{alg:a3dmm} {\noindent{\bf{Initial}}}: Let $s\geq1, q \geq 1$ be integers and $\bar{q} = q + 1$. Let $\zbar_0 = z_0 \in \bbR^p$ and $V_{0} = 0 \in \bbR^{p \times q}$. \\ {\noindent{\bf{Repeat}}}: \begin{itemize}[leftmargin=2em] \item For $k \geq 1$: \vspace{-11pt} \beq\label{eq:a3dmm} \begin{aligned} \yk &= \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{By + \tfrac{1}{\gamma} \pa{ \zbarkm - \gamma b } }^2 , \\ \psik &= \zbarkm + \gamma\pa{B\yk - b} , \\ \xk &= \argmin_{x\in\bbR^n }~ R(x) + \sfrac{\gamma}{2} \norm{Ax - \tfrac{1}{\gamma} \pa{ \zbarkm - 2\psik } }^2 , \\ \zk &= \psik + \gamma A\xk , \\ \vk &= \zk - \zkm \qandq V_{k} = [\vk, V_{k-1}(:, 1:q-1)] . \end{aligned} \eeq \item \textrm{If $\textrm{mod}(k, \bar{q})=0$: } \textrm{Compute $C_k$ as described above, if $\rho(C_k)<1$:} $$\zbark = \zk + \ak \calE_{s, q}(\zk, \dotsm, z_{k-q-1}).$$ \item \textrm{If $\textrm{mod}(k, \bar{q})\neq0$: } $ \zbark = \zk $. \end{itemize} {\noindent{\bf{Until}}}: $\norm{\vk} \leq \tol$. \end{algorithm} \end{minipage} \end{center} \begin{remark} $~$ \begin{itemize}[leftmargin=2em, topsep=-4pt, itemsep=2pt] \item When $\textrm{mod}(k, \bar{q})\neq0$, one can also consider $\zbark = \zk + \ak(\zk-\zkm)$ with properly chosen $\ak$. In stead of $\bar{q} = q + 1$, one can also consider $\bar{q} = q + i$ with $i\in\bbN_{+}$. \item A$\!^3$DMM carries out $\bar{q}$ standard ADMM iterations to set up the extrapolation step $\calE_{s, q}$. As $\calE_{s, q}$ contains the sum of the powers of $C_k$, it is guaranteed to be convergent when $\rho(C_k) < 1$. Therefore, we only apply $\calE_{s, q}$ when the spectral radius $\rho(C_k) < 1$ is true. In this case, there is a closed form expression for $\calE_{s, q}$ when $s=+\infty$; See Eq. \eqref{eq:lp-mpe}. \item The purpose of adding $\ak$ in front of $\calE_{s, q}(\zk, \dotsm, z_{k-q-1})$ is so that we can control the value of $\ak$ to ensure the convergence of the algorithm; See below the discussion. \end{itemize} \end{remark} In Algorithm \ref{alg:a3dmm}, we change the order of updates so that the extrapolation step only needs to be carried out on $\zk$. This is due to the fact, the update of $\yk$ only depends on $\zk$, and such an arrangement requires the minimal computational overhead. Under such setting, the extra memory cost is $pq$ for the storage of $V_{k}$. The extra computational cost of A$^{3}$DMM is very small, which is about $n q^{2}$ for computing the pseudo-inverse of $V_{k}$. Moreover, the value of $q$ usually is taken very small, \eg $q \leq 10$, therefore the total overheads of A$\!^3$DMM is rather limited. \subsection{Convergence of A$\!^3$DMM} To discuss the convergence of A$\!^3$DMM, we shall treat the algorithm as a perturbation of the original ADMM. If the perturbation error is absolutely summable, then we obtain the convergence of A$\!^3$DMM. More precisely, let $\varepsilon_k \in \bbR^n$ whose value takes \[ \varepsilon_k = \left\{ \begin{aligned} 0 &: \mathrm{mod}(k, \bar{q}) \neq 0 \enskip\textrm{or}\enskip \mathrm{mod}(k, \bar{q}) = 0 ~~\&~~ \rho(C_k)\geq1, \\ \ak\calE_{s, q}(\zk, \dotsm, z_{k-q-1}) &: \mathrm{mod}(k, \bar{q}) = 0 \enskip\&\enskip \rho(C_k) < 1 . \end{aligned} \right. \] Suppose the fixed-point formulation of ADMM can be written as $\zk = \calF (\zkm)$ for some $\calF$ (see Section \ref{P-sec:tra-admm} of the appendix for details). Then Algorithm \ref{alg:a3dmm} can be written as \beq\label{eq:perturbation-km} \zk = \calF(\zkm + \varepsilon_{k-1}) . \eeq Owing to \eqref{eq:perturbation-km}, we can obtain the following convergence for Algorithm \ref{alg:a3dmm} which is based on the classic convergence result of inexact \KM fixed-point iteration \cite[Proposition 5.34]{bauschke2011convex}. \begin{proposition}\label{prop:convergence-lp} For problem \eqref{eq:problem-admm} and Algorithm \ref{alg:a3dmm}, suppose that the conditions \iref{ADMM:RJ}-\iref{ADMM:minimizers} are true. If moreover, $\sum_{k} \norm{\varepsilon_k} < \pinf$, $\zk \to \zsol \in \fix(\calF) \eqdef \ba{z \in \bbR^p: z = \calF(z)}$ and $(\xk,\yk,\psik)$ converges to $(\xsol, \ysol, \psisol)$ which is a saddle point of $\calL(x, y; \psi)$. \end{proposition} \paragraph{On-line updating rule} The summability condition $\sum_{k} \norm{\varepsilon_k} < \pinf$ in general cannot be guaranteed. However, it can be enforced by a simple online updating rule. Let $a \in [0, 1]$ and $ b, \delta > 0$, then $\ak$ can be determined by $\ak = \min\Ba{ a, {b}/\pa{ k^{1+\delta} \norm{ \zk-\zkm } } }$. \paragraph{Inexact A$\!^3$DMM} Observe that in A$\!^3$DMM, when $A, B$ are non-trivial, in general there are no closed form solutions for $\xk$ and $\yk$. Take $\xk$ for example, suppose it is computed approximately, then in $\zk$ there will be another approximation error $\varepsilon_k'$, and consequently \[ \zk = \calF(\zkm + \varepsilon_{k-1} + \gamma \varepsilon_{k-1}') . \] If there holds $\sum_{k} \norm{\varepsilon_{k-1}'} < \pinf$, Proposition \ref{prop:convergence-lp} remains true for the above perturbation form. \subsection{Acceleration guarantee for A$\!^3$DMM}\label{sec:acc-gua} We have so far alluded to the idea that the extrapolated point $\bar z_{k,s}$ defined in \eqref{eq:zk_s} (which depends only on $\{z_{k-j}\}_{j=0}^q$) is an approximation to $z_{k+s}$. In this section, we make precise this statement. \paragraph{Relationship to MPE and RRE} We first show that $\bar z_{k,\infty}$ is (almost) equivalent to MPE. Recall that given a square matrix $C$, if its Neumann series is convergent, then there holds $(\Id-C)^{-1} = \sum_{i=0}^{\pinf} C^i$. For the summation of the power of $C_{k}$ in \eqref{eq:zk_s}, when $s=\pinf$, we have \[ \msum_{i=1}^{\pinf} C_{k}^i = C_{k} \msum_{i=0}^{\pinf} C_{k}^i = C_{k} (\Id - C_{k})^{-1} = (\Id - C_{k})^{-1} - \Id . \] Back to \eqref{eq:zk_s}, then we get \beq\label{eq:lp-mpe} \begin{aligned} \zbar_{k,\infty} &\eqdef \zk + V_{k} \Pa{ (\Id - C_{k})^{-1} - \Id }_{(:, 1)} = \zk - \vk + V_{k} \Pa{ (\Id - C_{k})^{-1} }_{(:, 1)} \\ &= \zkm + V_{k} \Pa{ (\Id - C_{k})^{-1} }_{(:, 1)} = \sfrac{1}{1- \sum_{i=1}^s c_{k,i}} \Pa{ z_k - \msum_{j=1}^{q-1} c_{k,j} z_{k-j}} , \end{aligned} \eeq which turns out to be MPE, with the slight difference of taking the weighted sum of $\ba{z_j}_{j=k-q+1}^k$ as opposed to the weighted sum of $\ba{z_j}_{j=k-q}^{k-1}$ {(See appendix for more details of MPE)}. Note that if the coefficients $c$ is computed in the following way: $b\in\argmin_{a\in\RR^{q+1}, \sum_j a_j =1}\norm{ \sum_{j=0}^{q} a_j v_{k-j} }$ and $b_0 \neq 0$ and define $c_j\eqdef - b_j/b_0$ for $j=1,\ldots, q$. Then, $$ \Pa{ 1-\msum_{i=1}^{q} c_i }^{-1} =\sfrac{b_0}{ b_0 + \sum_{j=1}^{q} b_j} = b_0, $$ and $\zbar_{k,\infty} = \sum_{j=0}^{q-1} b_j z_{k-j}$ is precisely the RRE update (again with the slight difference of summing over iterates shifted by one iteration). \paragraph{Acceleration guarantee for A$\!^3$DMM} Let $\seq{\zk}$ be a sequence in $\bbR^n$ and let $\vk \eqdef \zk-\zkm$. Assume that $v_k = M v_{k-1} $ for some $M \in \bbR^{n \times n}$. Denote $\lambda(M)$ the spectrum of $M$. The following proposition provides control on the extrapolation error for $\bar z_{k,s}$ from \eqref{eq:zk_s}. \begin{proposition}\label{prop:extrap-error} Define the coefficient fitting error by $\epsilon_k \eqdef \min_{c\in \RR^q} \norm{V_{k-1} c - v_{k}}$. \begin{enumerate}[label={\rm (\roman{*})}, leftmargin=2em] \ite For $s\in \NN$, we have \begin{equation}\label{eq:err-finite} \norm{\zbar_{k,s} - \zsol} \leq \norm{z_{k+s} - \zsol} + B_s \epsilon_k , \end{equation} where $B_s \eqdef \sum_{\ell=1}^s \norm{M^\ell} \abs{ \sum_{i=0}^{s-\ell} (C_k^i)_{(1,1)}}$. If $\rho(M)<1$ and $\rho(C_k)<1$, then $\sum_i c_{k,i}\neq 1$ and $B_s$ is uniformly bounded in $s$. For $s=+\infty$, $B_\infty\eqdef \abs{1-\sum_i c_{k,i}}^{-1} \sum_{\ell=1}^\infty \norm{M}^\ell $ \ite Suppose that $M$ is diagonalizable. Let $(\lambda_j)_j$ denote its distinct eigenvalues ordered such that $\abs{\lambda_j}\geq \abs{\lambda_{j+1}}$ and $\abs{\lambda_1}= \rho(M)<1$. Suppose that $\abs{\lambda_{q}}>\abs{\lambda_{q+1}}$. \begin{itemize}[leftmargin=2.25em] \item Asymptotic bound (fixed $q$ and as $k\to +\infty$): $\epsilon_k =\Oo\pa{\abs{\lambda_{q+1}}^k}$. \item Non-asymptotic bound (fixed $q$ and $k$): Suppose that $\lambda(M)$ is real-valued and contained in the interval $[\alpha,\beta]$ with $-1<\alpha<\beta<1$. Then, \begin{equation}\label{eq:opt-err} \qfrac{\epsilon_k}{1-\sum_i c_{k,i}} \leq K \beta^{k-q} \Pa{\tfrac{\sqrt{\eta}-1}{\sqrt{\eta}+1}}^q \end{equation} where $K\eqdef {2 \norm{z_0-\zsol}}\norm{(\Id-M)^{\frac12}}$ and $\eta = \frac{1-\alpha}{1-\beta}$. \end{itemize} \end{enumerate} \end{proposition} \begin{remark}$~$ \begin{itemize}[leftmargin=2em] \item From Theorem \ref{prop:trajectory-admm}(ii), when $R$ and $J$ are both polyhedral, we have a perfect local linearisation with the corresponding linearisation matrix being normal and hence, the conditions of Proposition \ref{prop:extrap-error} holds for all $k$ large enough. The first bound (i) shows that the extrapolated point $\zbar_{k,s}$ moves along the true trajectory as $s$ increases, up to the fitting error $\epsilon_k$. Although $\zbar_{k,\infty}$ is essentially an MPE update which is known to satisfy error bound \eqref{eq:opt-err} (see \cite{sidi2017vector}), this proposition offers a further interpretation of these extrapolation methods in terms of following the ``sequence trajectory'', and combined with our local analysis of ADMM, provides justification of these methods for the acceleration of non-smooth optimisation problems. \item Proposition \ref{prop:extrap-error} (ii) shows that extrapolation improves the convergence rate from $\Oo(\abs{\lambda_1}^k)$ to $\Oo(\abs{\lambda_{q+1}}^k)$, and the non-asymptotic bound shows that the improvement of extrapolation is optimal in the sense of Nesterov \cite{nesterov83}. Recalling the form of the eigenvalues of $M$ from Theorem \ref{prop:trajectory-admm}, in the case of two non-smooth polyhedral terms, we must have $\abs{\lambda_{2j-1}} = \abs{\lambda_{2j}} > \abs{\lambda_{2j+1}}$ for all $j\geq 1$. Hence, no acceleration can be guaranteed or observed when $q=1$, while the choice of $q=2$ provides guaranteed acceleration. \end{itemize} \end{remark} \section{Discussions} \label{sec:discussion} In this section, two variants of ADMM, including the relaxed ADMM and symmetric ADMM which updates $\psi$ twice every iteration, are discussed. An extension of A$^3$DMM Algorithm \ref{alg:a3dmm} to these variants is provided at the end of the section. \subsection{Variants of ADMM} \paragraph{Relaxed ADMM} In the literature, a popular variant of ADMM is the \emph{relaxed ADMM} which takes the following iteration procedure: \beq\label{eq:admm_relax} \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \tfrac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \xbark &= \phi A\xk - (1-\phi)(B\ykm-b) , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \tfrac{\gamma}{2} \norm{\xbark+By-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \psik &= \psikm + \gamma\pa{\xbark + B\yk - b} , \end{aligned} \eeq where $\phi \in [0, 2]$ is the relaxation parameter. The above iteration is called \emph{over-relaxed} ADMM for $\phi \in ]1, 2]$. In its dual form, the relaxed ADMM is equivalent to the \emph{relaxed} Douglas--Rachford splitting applied to solve \eqref{eq:problem-admm-dual}, see Section \ref{subsec:admm-dr}. The convergence of \eqref{eq:admm_relax} can be guaranteed for $\phi \in ]0, 2[$ \cite{bauschke2011convex}. Similar to \eqref{eq:admm2}, define $\zk \eqdef \psikm + \gamma \xbark$, we can rewrite the relaxed ADMM into the following form \beq\label{eq:admm_relax2} \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \sfrac{\gamma}{2} \norm{Ax - \tfrac{1}{\gamma} \pa{ \zkm - 2\psikm } }^2 , \\ \zk &= \psikm + \gamma \Pa{ \phi A\xk - (1-\phi)(B\ykm-b) } , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{By + \tfrac{1}{\gamma} \pa{ \zk - \gamma b } }^2 , \\ \psik &= \zk + \gamma\pa{B\yk - b} . \end{aligned} \eeq We can easily adapt the result of the previous sections to the relaxed ADMM via $\zk$. \begin{remark} Similar to inertial acceleration, the performance of relaxation also depends on the trajectory of the sequence of $\zk$. For example, when both $R, J$ are (locally) polyhedral around $\xsol, \ysol$, the (eventual) trajectory of $\zk$ is spiral, according to \cite{Bauschke14} the (eventual) optimal relaxation parameter $\phi$ is $1$, that is no relaxation provides the best performance. \end{remark} \paragraph{Symmetric ADMM} As aforementioned, the ADMM iteration \eqref{eq:admm} is equivalent to applying Douglas--Rachford splitting to the dual problem \eqref{eq:problem-admm-dual} \cite{gabay1983chapter}. It is also pointed out in \cite{gabay1983chapter} that, if the Peaceman--Rachford splitting method \cite{peaceman1955numerical} is applied to solve \eqref{eq:problem-admm-dual}, then it leads to the following iteration in the primal form \beq\label{eq:admm_symmetric} \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \tfrac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \psikmh &= \psikm + \gamma\pa{A\xk + B\ykm - b} , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \tfrac{\gamma}{2} \norm{A\xk+By-b + \tfrac{1}{\gamma}\psikmh }^2 , \\ \psik &= \psikmh + \gamma \pa{A\xk + B\yk - b} , \end{aligned} \eeq which is also called \emph{symmetric ADMM}. A brief derivation is provided in Section \ref{subsec:admm-pr}, and we refer to \cite{gabay1983chapter,he2014strictly} and the references therein for more detailed discussions. In general, the conditions needed for the convergence of \eqref{eq:admm_symmetric} is stronger than the standard ADMM \eqref{eq:admm}, which is due to the fact that stronger conditions are needed to guarantee the convergence of Peaceman--Rachford splitting method \cite{gabay1983chapter}. However, when \eqref{eq:admm_symmetric} converges, it tends to provide faster performance than \eqref{eq:admm}. Similar to \eqref{eq:admm2}, if we define $\zk = \psik - \gamma B\yk + \gamma b = \psikmh + \gamma A\xk$, then \eqref{eq:admm_symmetric} is equivalent to \beq\label{eq:admm_symmetric2} \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \tfrac{\gamma}{2} \norm{Ax + \tfrac{1}{\gamma}(2\psikm - \zkm) }^2 , \\ \zk &= \psikm + \gamma\pa{2A\xk + B\ykm - b} , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \tfrac{\gamma}{2} \norm{By + \tfrac{1}{\gamma}(\zk - \gamma b) }^2 , \\ \psik &= \zk + \gamma \pa{B\yk - b} , \end{aligned} \eeq which can be written as the fixed-point iteration in terms of $\zk$, see Section \ref{subsec:admm-pr}. Suppose the iteration is convergent, then following the analysis of Section \ref{sec:trajectory-admm}, we can obtain the trajectory property of symmetric ADMM in terms of the fixed-point sequence $\zk$. \subsection{An extension of A$^3$DMM}\label{subsec:implementation} From the above discussions, we have that relaxed ADMM \eqref{eq:admm_relax2} and symmetric ADMM \eqref{eq:admm_symmetric2} only differ from the standard ADMM on the update of $\zk$. As a result of these similarities, we can easily extend the A$^{3}$DMM Algorithm \ref{alg:a3dmm} to these variants. Let \[ \zk = \calZ(\gamma, \phi; \xk, \ykm, \psikm) \] represent the way of updating $\zk$ in \eqref{eq:admm2}, \eqref{eq:admm_relax2} and \eqref{eq:admm_symmetric2}. By replacing \eqref{eq:a3dmm} in Algorithm \ref{alg:a3dmm} with the following equations \beq\label{eq:a3dmm_extension} \begin{aligned} \yk &= \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{By + \tfrac{1}{\gamma} \pa{ \zbarkm - \gamma b } }^2 , \\ \psik &= \zbarkm + \gamma\pa{B\yk - b} , \\ \xk &= \argmin_{x\in\bbR^n }~ R(x) + \sfrac{\gamma}{2} \norm{Ax - \tfrac{1}{\gamma} \pa{ \zbarkm - 2\psik } }^2 , \\ \zk &= \calZ(\gamma, \phi; \xk, \ykm, \psikm) , \\ \vk &= \zk - \zkm \qandq V_{k} = [\vk, V_{k-1}(:, 1:q-1)] , \end{aligned} \eeq we obtain the extension of A$^3$DMM to the variants of ADMM. \section{Numerical experiments} \label{sec:experiment} We present numerical experiments on affine constrained minimisation (\eg Basis Pursuit), LASSO, quadratic programming and image processing problems to demonstrate the performance of A$^3$DMM. In the numerical comparison below, we mainly compare with the original ADMM and its inertial version \eqref{eq:iadmm} with fixed $\ak\equiv0.3$. For the proposed A$\!^3$DMM, two settings are considered: $(q, s) = (6, 100)$ and $(q, s) = (6, +\infty)$. MATLAB source codes for reproducing the results can be found at: \texttt{https://github.com/jliang993/A3DMM}. \subsection{Affine constrained minimisation} Consider the following constrained problem \beq\label{eq:bp} \min_{x \in \bbR^{n} } ~ R(x) \quad \textrm{such~that} \quad Kx = f . \eeq Denote the set $\Omega \eqdef \ba{ x \in \bbR^{n} : K x = f}$, and $\iota_{\Omega}$ its indicator function. Then \eqref{eq:bp} can be written as \beq\label{eq:bp2} \begin{aligned} \min_{x, y \in \bbR^{n} } ~ R(x) + \iota_{\Omega}(y) \quad \textrm{such~that} \quad x - y = 0 , \end{aligned} \eeq which is special case of \eqref{eq:problem-admm} with $A=\Id, B=-\Id$ and $b=0$. Here $K$ is generated from the standard Gaussian ensemble, and the following three choices of $R$ are considered: \begin{itemize}[leftmargin=2.5cm \item[{\bf $\ell_{1}$-norm}] $(m, n)=(512, 2048)$, solution $\xsol$ is $128$-sparse; \item[{\bf $\ell_{1,2}$-norm}] $(m, n)=(512, 2048)$, solution $\xsol$ has $32$ non-zero blocks of size $4$; \item[{\bf Nuclear norm}] $(m, n)=(1448, 4096)$, solution $\xsol$ has rank of $4$. \end{itemize} The property of $\seq{\theta_k}$ is shown in Figure \ref{fig:cmp-bp} (a)-(c). Note that the indicator function $\iota_{\Omega}(y)$ in \eqref{eq:bp2} is polyhedral since $\Omega$ is an affine subspace, \begin{itemize}[leftmargin=2em] \item As $\ell_{1}$-norm is polyhedral, we have in Figure \ref{fig:cmp-bp}(a) that $\theta_{k}$ is converging to a constant which complies with Theorem \ref{prop:trajectory-admm}(ii). \item Since $\ell_{1,2}$-norm and nuclear norm are no longer polyhedral functions, we have that $\theta_k$ eventually oscillates in a range, meaning that the trajectory of $\seq{\zk}$ is an elliptical spiral. \end{itemize} Comparisons of the four schemes are shown below in Figure \ref{fig:cmp-bp} (d)-(f): \begin{itemize}[leftmargin=2em] \item Since both functions in \eqref{eq:bp2} are non-smooth, the eventual trajectory of $\seq{\zk}$ for ADMM is spiral. Inertial ADMM fails to provide acceleration locally. \item A$\!^3$DMM is faster than both ADMM and inertial ADMM. For the two different settings of A$\!^3$DMM, their performances are very close. \end{itemize} \begin{figure}[!ht] \centering \subfloat[$\ell_{1}$-norm]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-bp-theta-l1-bp.pdf} } \hspace{2pt} \subfloat[$\ell_{1,2}$-norm]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-bp-theta-l12-bp.pdf} } \hspace{2pt} \subfloat[Nuclear norm]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-bp-theta-lnuclear-bp.pdf} } \\ \subfloat[$\ell_{1}$-norm]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-bp-dk-l1-bp.pdf} } \hspace{2pt} \subfloat[$\ell_{1,2}$-norm]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-bp-dk-l12-bp.pdf} } \hspace{2pt} \subfloat[Nuclear norm]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-bp-dk-lnuclear-bp.pdf} } \\ \caption{Performance comparisons and $\seq{\theta_k}$ of ADMM for affine constrained problem.} \label{fig:cmp-bp} \end{figure} \subsection{LASSO} We consider again the LASSO problem \eqref{eq:lasso} with three datasets from LIBSVM\footnote{\url{https://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/}}. The numerical experiments are provided below in Figure \ref{fig:cmp-lasso}. It can be observed that the proposed A$\!^3$DMM is significantly faster than the other schemes, especially for $s = +\infty$. Between ADMM and inertial ADMM, different from the previous example, the inertial technique can provided consistent acceleration for all three examples. \begin{figure}[!ht] \centering \subfloat[\texttt{covtype}: $1-\cos(\theta_k)$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-lasso-covtype-tk.pdf} } \hspace{2pt} \subfloat[\texttt{ijcnn1}: $1-\cos(\theta_k)$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-lasso-ijcnn1-tk.pdf} } \hspace{2pt} \subfloat[\texttt{phishing}: $1-\cos(\theta_k)$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-lasso-phishing-tk.pdf} } \\ \centering \subfloat[\texttt{covtype}: $\norm{\xk-\xsol}$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-lasso-covtype.pdf} } \hspace{2pt} \subfloat[\texttt{ijcnn1}: $\norm{\xk-\xsol}$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-lasso-ijcnn1.pdf} } \hspace{2pt} \subfloat[\texttt{phishing}: $\norm{\xk-\xsol}$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-lasso-phishing.pdf} } \\ \caption{Performance comparisons for LASSO problem.} \label{fig:cmp-lasso} \end{figure} \subsection{Quadratic programming} Consider the following quadratic optimisation problem \beq\label{eq:qp} \begin{aligned} \min_{x \in \bbR^n} &\quad \sfrac{1}{2} x^T Q x + \iprod{q}{x} , \\ \textrm{such~that} &\quad x_{i} \in [\ell_{i}, r_{i}] ,~~~ i = 1, ..., n . \end{aligned} \eeq Define the constraint set $\Omega = \ba{x \in \bbR^n: x_{i} \in [\ell_{i}, r_{i}] ,~~~ i = 1, ..., n}$, then \eqref{eq:qp} can be written as \[ \begin{aligned} \min_{x, y \in \bbR^n} \quad \sfrac{1}{2} x^T Q x + \iprod{q}{x} + \iota_{\Omega}(y) \quad \textrm{such~that} \quad x - y = 0 , \end{aligned} \] which is special case of \eqref{eq:problem-admm} with $A=\Id, B=-\Id$ and $b=0$. The angle $\theta_k$ of ADMM and the performances of the four schemes are provided in Figure \eqref{fig:cmp-qp}, from which we observed that \begin{itemize}[leftmargin=2em] \item The angle $\theta_{k}$ is decreasing to $0$ at the beginning and then starts to increasing for $k \geq 2\times 10^4$. This is mainly due to the fact that for $k \geq 2\times 10^4$, the effects of machine error is becoming increasingly larger. \item Consistent with the previous observations, the proposed A$\!^3$DMM schemes provides the best performance. \end{itemize} \begin{figure}[!ht] \centering \subfloat[Angle $\theta_k$]{ \includegraphics[width=0.325\linewidth]{./figure/exp/admm-qp-thetak.pdf} } \hspace{2ex} \subfloat[Comparison of $\norm{\xk-\xsol}$]{ \includegraphics[width=0.325\linewidth]{./figure/exp/admm-qp-dk} } \\ \caption{Performance comparisons and $\seq{\theta_k}$ of ADMM for quadratic programming.} \label{fig:cmp-qp} \end{figure} \subsection{Total variation based image inpainting} Here consider a total variation (TV) based image inpainting problem. Let $u \in \bbR^{n \times n}$ be an image and $\calS \in \bbR^{n \times n}$ be a Bernoulli matrix, the observation of $u$ under $\calS$ is $f = \proj_{\calS}(u)$. The TV based image inpainting can be formulated as \beq\label{eq:inp} \min_{x\in\bbR^{n\times n}} ~ \norm{\nabla x}_{1} \quad \textrm{such~that} \quad \proj_{\calS}(x) = f . \eeq Define $\Omega \eqdef \ba{x \in \bbR^{n\times n} : \proj_{\calS}(x) = f }$, then \eqref{eq:inp} becomes \beq\label{eq:inp-xy} \min_{x\in\bbR^{n\times n}, y\in\bbR^{2n\times n}} ~ \norm{y}_{1} + \iota_{\Omega}(x) \quad \textrm{such~that} \quad \nabla x - y = 0 , \eeq which is special case of \eqref{eq:problem-admm} with $A=\nabla, B=-\Id$ and $b=0$. For the update of $\xk$, we have from \eqref{eq:admm2} that \[ \xk = \argmin_{x\in\bbR^{n\times n} }~ \iota_{\Omega}(x) + \sfrac{\gamma}{2} \norm{\nabla x - \tfrac{1}{\gamma} \pa{ \zbarkm - 2\psikm } }^2 , \] which does not admit closed form solution. In the implementation, finite-step FISTA is applied to roughly solve the above problem. In the experiment, the \texttt{cameraman} image is used, and $50\%$ of the pixels is removed randomly. The angle $\theta_k$ of ADMM and the comparisons of the four schemes are provided in Figure \ref{fig:cmp-inp}: \begin{itemize}[leftmargin=2em] \item Though both functions in \eqref{eq:inp-xy} are polyhedral, since the subproblem of $\xk$ is solved approximately, the eventual angle actually is oscillating instead of being a constant. \item Inertial ADMM again is slower than the original ADMM as the trajectory of ADMM is a spiral. \item For the two A$\!^3$DMM schemes, their performances are close as previous examples. \item For PSNR the image quality assessment, Figure \ref{fig:cmp-inp}(c) implies that A$\!^3$DMM is also the best. \end{itemize} We also compare the visual quality of the images obtained by the four schemes for the $30$'th iteration, which is shown below in Figure \ref{fig:cmp-keq8}. It can be observed that the image quality (2nd row of Figure \ref{fig:cmp-keq8}) is much better than the 1st row of ADMM and inertial ADMM. \begin{figure}[!ht] \centering \subfloat[Angle $\seq{\theta_k}$ of ADMM]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-inp-thetak-cameraman.pdf} } \subfloat[Comparison of $\norm{\xk-\xsol}$]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-inp-dk-cameraman.pdf} } \subfloat[PSNR value]{ \includegraphics[width=0.3\linewidth]{./figure/exp/admm-inp-psnr-cameraman.pdf} } \\ \caption{Property of $\seq{\theta_k}$, performance comparison and image quality of ADMM for TV based image inpainting.} \label{fig:cmp-inp} \end{figure} \begin{figure}[!ht] \centering \subfloat[Original image]{ \includegraphics[width=0.31\linewidth]{./figure/exp/cameraman-original-img.pdf} } \hspace{2pt} \subfloat[Observed image]{ \includegraphics[width=0.31\linewidth]{./figure/exp/cameraman-corrupted-img.pdf} } \hspace{2pt} \subfloat[ADMM, PSNR = 26.6935]{ \includegraphics[width=0.31\linewidth]{./figure/exp/step-30-ADMM.pdf} } \\ \subfloat[Inertial ADMM, PSNR = 26.3203]{ \includegraphics[width=0.31\linewidth]{./figure/exp/step-30-iADMM.pdf} } \hspace{2pt} \subfloat[A$\!^3$DMM $s = 100$, PSNR = 27.1668]{ \includegraphics[width=0.31\linewidth]{./figure/exp/step-30-sADMM.pdf} } \hspace{2pt} \subfloat[A$\!^3$DMM $s = \pinf$, PSNR = 27.1667]{ \includegraphics[width=0.31\linewidth]{./figure/exp/step-30-infADMM.pdf} } \\ \caption{Comparison of image quality at the $30$'th iteration of ADMM, inertial ADMM and A$\!^3$DMM with two different prediction steps.} \label{fig:cmp-keq8} \end{figure} \section{Conclusions} In this article, by analyzing the trajectory of the fixed point sequences associated to ADMM and extrapolating along the trajectory, we provide an alternative derivation of these methods. Furthermore, our local linear analysis allows for the application of previous results on extrapolation methods, and hence provides guaranteed (local) acceleration. Extension of the proposed framework to general first-order methods is ongoing. \section*{Acknowledgements} We would like to thank Arieh Iserles for pointing out the connection between trajectory following adaptive acceleration and vector extrapolation. We also like to thank the reviewers whose comments helped to improve the paper. Jingwei Liang was partly supported by Leverhulme trust, Newton trust, the EPSRC centre ``EP/N014588/1'' and the Cantab Capital Institute for the Mathematics of Information (CCIMI). \small \bibliographystyle{plain} \section{The failure of inertial acceleration continue}\label{sec:failure-inertial} In this part, to support the discussion of Section \ref{sec:fail-inertial}, we provide extra discussion on why inertial acceleration, in particular Nesterov/FISTA, will fail when the (leading) eigenvalue of $M$ is complex. Let $M \in \bbR^{n\times n}$ be a square matrix and consider the following linear equation \beq\label{eq:its-M} \zkp = M \zk . \eeq According to \cite{polyak1987introduction}, \eqref{eq:its-M} is linearly convergent when the spectral radius of $M$ is strictly smaller than $1$, \ie $\rho(M) < 1$. For simplicity, consider the inertial version of \eqref{eq:its-M} with fixed inertial parameter $\ak \equiv a \in [0, 1]$, we get \beq\label{eq:its-iM} \begin{aligned} \yk &= \zk + a(\zk - \zkm) \\ \zkp &= M \yk . \end{aligned} \eeq The above scheme corresponds to the local linearization of the inertial ADMM \eqref{eq:iadmm} without the small $o$-term. Define the augmented variable $\wk = \begin{pmatrix} \zk \\ \zkm \end{pmatrix}$ and block matrix $\tM \eqdef \begin{bmatrix} (1+a) M & - a M \\ \Id & 0 \end{bmatrix}$, then \eqref{eq:its-iM} can be written as \beq\label{eq:its-tM} \wkp = \tM \wk . \eeq To guarantee the convergence of \eqref{eq:its-tM}, we require the spectral radius satisfying $\rho(\tM) < 1$. Therefore, in the following, motivated by \cite{polyak1987introduction,liang2016thesis,liang2017activity}, we discuss the property of the spectral radius $\rho(\tM)$ and the conditions such that $\rho(\tM)<1$. Let $\eta, \rho$ be the leading eigenvalues of $M$ and $\tM$, respectively. According to \cite[Proposition 4.6]{liang2017activity}, we have the following lemma regarding the relation between $\eta$ and $\rho$. \begin{lemma}[{\cite[Proposition 4.6]{liang2017activity}}] Suppose $\begin{pmatrix} r_1 \\ r_2 \end{pmatrix}$ is the eigenvector of $\tM$ corresponding to eigenvalue $\rho$, then it must satisfy $r_1 = \rho r_2$. Moreover, $r_2$ is an eigenvector of $M$ associated to eigenvalue $\eta$, where $\eta$ and $\rho$ satisfy the relation \beq\label{eq:eigenvalue-relation-2} \rho^2 - (1+a)\eta \rho + a\eta = 0 . \eeq \end{lemma} The relation \eqref{eq:eigenvalue-relation-2} is a simple quadratic equation of $\rho$, we have \beq\label{eq:root-rho} \rho = \sfrac{ (1+a)\eta + \sqrt{(1+a)^2\eta^2 - 4a\eta} }{ 2 } . \eeq The value of $\abs{\rho}$ depends on $a$ and $\eta$, and the discussion splits into two scenarios: $\eta$ is real and $\eta$ is complex. \subsection{Real $\eta$} When $\eta$ is real valued, the property of $\rho$ is well studied, we refer to \cite{liang2017activity} and references therein for detailed discussions. Basically, we have that \[ \abs{\rho} = \left\{ \begin{aligned} (1+a)^2\eta^2 \geq 4a\eta &: \textrm{$\rho$ is real, $\abs{\rho}< 1$ holds for any $a\in [0, 1]$} , \\ (1+a)^2\eta^2 < 4a\eta &: \textrm{$\rho$ is complex, $\abs{\rho} = \sqrt{a\eta} < 1$ holds for any $a\in [0, 1]$.} \end{aligned} \right. \] The above result can be summarized below. \begin{lemma}[{\cite[Proposition 4.6]{liang2017activity}}]\label{lem:eta-real} Given any $a \in [0, 1]$, we have $\abs{\rho} < 1$ as long as $0 \leq \eta < 1$. \end{lemma} To demonstrate the above result, we consider fixing $\eta$ and varying $a \in [0, 1]$. Two choices of $\eta$ are considered $\eta = 0.9, 0.98$, the value of $\abs{\rho}$ is plotted in Figure \ref{fig:rho} in black line. It can be observed that $\abs{\rho}$ is strictly smaller than one for both choices of $\eta$. Note that $\abs{\rho}$ reaches a minimal value for some $a$, we refer to \cite{liang2017activity} for detailed discussion on this. \begin{figure}[!ht] \centering \subfloat[$\abs{\eta} = 0.9$]{ \includegraphics[width=0.4\linewidth]{figure/spectral-radius-tM-090.pdf} } {\hspace{8pt}} \subfloat[$\abs{\eta} = 0.98$]{ \includegraphics[width=0.4\linewidth]{figure/spectral-radius-tM-098.pdf} } \\ \caption{The value of $\abs{\rho}$ under fixed $\abs{\eta}$ and $a \in [0, 1]$.} \label{fig:rho} \end{figure} \renewcommand{\e}{\mathrm{e}} \renewcommand{\i}{\mathrm{i}} \subsection{Complex $\eta$} When $\eta$ is complex, it can be written as $\eta = \abs{\eta} \e^{\i \alpha}$ where $\alpha$ is the argument of $\eta$. The dependence of $\abs{\rho}$ on $a$ and $\eta$ becomes much more complicated, below we briefly demonstrate where the difficulties arise and provide numerical proof for the properties of $\abs{\rho}$. \paragraph{General form $\eta = \abs{\eta}e^{\i\alpha}$} For this case, we have \[ \begin{aligned} \rho = \sfrac{ (1+a)\eta + \sqrt{(1+a)^2\eta^2 - 4a\eta} }{ 2 } &= \sfrac{ (1+a)\abs{\eta} \e^{\i \alpha} + \ssqrt{ (1+a)^2\abs{\eta}^2 \e^{\i 2\alpha} - 4a\abs{\eta}\e^{\i \alpha} } }{ 2 } . \end{aligned} \] Suppose $(x+\i y)^2 = (1+a)^2\abs{\eta}^2 \e^{\i 2\alpha} - 4a\abs{\eta} \e^{\i \alpha}$, we get \[ \begin{aligned} x^2 - y^2 &= (1+a)^2\abs{\eta}^2 \cos\pa{2\alpha} - 4a\abs{\eta}\cos(\alpha) \\ x y &= \sfrac{ (1+a)^2\abs{\eta}^2 \sin\pa{2\alpha} - 4a\abs{\eta}\sin(\alpha) }{ 2 } , \end{aligned} \] which can be simplified to a equation of $x$ \[ x^4 - \Pa{(1+a)^2\abs{\eta}^2 \cos\pa{2\alpha} - 4a\abs{\eta}\cos(\alpha)} x^2 - \sfrac{ ( (1+a)^2\abs{\eta}^2 \sin\pa{2\alpha} - 4a\abs{\eta}\sin(\alpha) )^2 }{ 4 } = 0 . \] Solving the above equation, we get \[ \begin{aligned} x &= \BPa{ \tfrac{ \pa{(1+a)^2\abs{\eta}^2 \cos\pa{2\alpha} - 4a\abs{\eta}\cos(\alpha)} + \ssqrt{ \pa{(1+a)^2\abs{\eta}^2 \cos\pa{2\alpha} - 4a\abs{\eta}\cos(\alpha)}^2 + \pa{ (1+a)^2\abs{\eta}^2 \sin\pa{2\alpha} - 4a\abs{\eta}\sin(\alpha) }^2 }}{2} }^{1/2} , \\ y &= \sfrac{ (1+a)^2\abs{\eta}^2 \sin\pa{2\alpha} - 4a\abs{\eta}\sin(\alpha) }{ 2 x } , \end{aligned} \] here we only take the positive root $x$. Back to the expression of $\rho$, we get \[ \begin{aligned} \rho = \sfrac{ (1+a)\abs{\eta} \e^{\i \alpha} + (x + \i y ) }{ 2 } = \sfrac{ \pa{ (1+a)\abs{\eta}\cos(\alpha) + x } + \i \pa{ (1+a)\abs{\eta}\sin(\alpha) + y } }{2} . \end{aligned} \] Given the complicated form of $x$, the analysis of $\abs{\rho}$ becomes rather difficult. Therefore, below we discuss the property of $\abs{\rho}$ through numerical verification. Similar to the real $\eta$ case, $\abs{\eta} = 0.9, 0.98$ are considered. Denote $\alpha$ the argument of $\eta$, then we have $\eta = \abs{\eta} \mathrm{e}^{\mathrm{i} \alpha}$. In total, six choices of $\alpha$ are considered: $\alpha \in \ba{\frac{\pi}{4}, \frac{\pi}{8}, \frac{\pi}{16}, \frac{\pi}{32}, \frac{\pi}{64}, \frac{\pi}{128}}$. The value of $\abs{\rho}$ are shown in Figure \ref{fig:rho}. Taking Figure \ref{fig:rho} (a) for example, we have the following observations: \begin{itemize}[leftmargin=2em] \item For all choices of $\alpha$ except $\alpha = \frac{\pi}{128}$, there exists an $a_{\alpha} < 1$ such that $\abs{\rho} \geq 1$ for $a \in [a_{\alpha}, 1]$. \item The larger the value of $\alpha$, the smaller the value of $a_{\alpha}$, see the green line in both figures. \end{itemize} From the above discussion, we can conclude that \begin{itemize}[leftmargin=2em] \item The inertial scheme is robust when all the eigenvalues of $M$ are real, and we can afford the inertial parameter up to $1$ which includes the FISTA \cite{fista2009} schemes as $\ak \to 1$, same for the Nesterov's accelerated gradient descent. \item When $M$ has complex eigenvalue(s), which is not necessary to the leading eigenvalue, the largest value of $a$ can be allowed is smaller than $1$ and FISTA/Nesterov's scheme will fail. \end{itemize} To complete the discussion, we consider the values of $\abs{\rho}$ under $\alpha \in [0, \pi/2]$ and $a \in [0, 1]$. The results are shown below in Figure \ref{fig:rho_alpha_a}. Again $\abs{\eta} = 0.9, 0.98$ are considered. The horizontal axis is for $\alpha$ while the vertical is for $a$, each point inside the square stands for the value of $\abs{\rho}$ with colorbar provided. In each figure: \begin{itemize}[leftmargin=2em] \item The {\em red} line stands for $\abs{\rho}=1$. Therefore, only for the area below the red line we have $\abs{\rho} < 1$. Given any $\alpha \in [0, \pi/2]$, the larger the value of $\alpha$, the smaller range of choice of $a$ such that $\abs{\rho} < 1$. This coincides with the observations from Figure \ref{fig:rho}. \item The {\em magenta} line stands for $\abs{\rho}=\abs{\eta}$. Only the small area below the magenta line has $\abs{\rho} < \abs{\eta}$, meaning that acceleration can be obtained. As a result, given $\eta = \abs{\eta} \e^{\i\alpha}$, when $\alpha$ is large enough, such as about $\pi/8$ for $\abs{\eta}=0.9$, inertial will fail to provide acceleration. \end{itemize} \begin{figure}[!ht] \centering \subfloat[$\abs{\eta} = 0.9$]{ \includegraphics[width=0.475\linewidth]{figure/spectral-rho-a-alpha-090.pdf} } {\hspace{2pt}} \subfloat[$\abs{\eta} = 0.98$]{ \includegraphics[width=0.475\linewidth]{figure/spectral-rho-a-alpha-098.pdf} } \\ \caption{The value of $\abs{\rho}$ under fixed $\eta$ and $a \in [0, 1]$.} \label{fig:rho_alpha_a} \end{figure} It should be noted that, for the above discussion, we consider the case that the leading eigenvalue is {\em complex}, while the rest of the eigenvalues are {\em real}. For the case leading eigenvalue is {\em real} while the rest are {\em complex}, then the spectral radius of $\tM$ will be determined by the non-leading complex eigenvalues when the inertial parameter $a$ is large enough. Consequently, the FISTA inertial parameter rule still can not be applied, unless the magnitude of the leading eigenvalue is small enough; See Figure \ref{fig:rho_alpha_a} (a). \begin{figure}[!ht] \centering \subfloat[$\alpha \in \ba{\frac{\pi}{4}, \frac{\pi}{8}, \frac{\pi}{16}, \frac{\pi}{32}, \frac{\pi}{64}, \frac{\pi}{128}}$]{ \includegraphics[width=0.35\linewidth]{figure/spectral-radius-tM-A.pdf} } {\hspace{16pt}} \subfloat[{$\alpha \in [0, \frac{\pi}{2}]$}]{ \includegraphics[width=0.525\linewidth]{figure/spectral-rho-a-alpha-B.pdf} } \\ \caption{The value of $\abs{\rho}$ when $\eta = \cos(\alpha)\e^{\i \alpha}$ and $a \in [0, 1]$.} \label{fig:rho_special} \end{figure} \paragraph{Special case $\eta = \cos{\alpha}e^{\i\alpha}$} Now we consider a special case where $\eta = \cos(\alpha) e^{\i\alpha}, \alpha \in [0, \pi/2]$ which corresponds to the case $R, J$ in \eqref{eq:problem-admm} are locally polyhedral around $\xsol, \ysol$. Similar to above, six choices of $\alpha$ are considered: $\alpha \in \ba{\frac{\pi}{4}, \frac{\pi}{8}, \frac{\pi}{16}, \frac{\pi}{32}, \frac{\pi}{64}, \frac{\pi}{128}}$. The value of $\abs{\rho}$ is shown below in Figure \ref{fig:rho_special} (a). It can be observed that, for each $\alpha$, the value of $\abs{\rho}$ is monotonically increasing as the value of $a$ increases, which means {\em inertial slows down the speed of convergence}. In Figure \ref{fig:rho_special} (b), we consider the value of $\abs{\rho}$ under $\alpha \in [0, \pi/2]$ and $a \in [0, 1]$. We have \begin{itemize}[leftmargin=2em] \item Similar to Figure \ref{fig:rho_alpha_a}, the {\em red} line stands for $\abs{\rho}=1$. For each $\alpha$, $\abs{\rho} < 1$ for all the choices of $a$ under the red line. \item The {\em magenta} line stands for $\abs{\rho}=\abs{\eta}$. It can be observed that, except for $\alpha = 0$ where $\abs{\rho} = 1$ holds for all $a\in [0, 1]$, $\abs{\rho} = 1$ holds only for $a=0$ when $\alpha \in ]0, \pi/2]$. \end{itemize} Therefore, we can conclude that when $R, J$ are locally polyhedral around the solution $\xsol, \ysol$, inertial scheme will not provide any acceleration. \section{Preparatory materials}\label{sec:pre} \subsection{Polynomial extrapolation} Minimal polynomial extrapolation (MPE) \cite{cabay1976polynomial}: Given $\{z_{k-j}\}_{j=0}^{q+1}$, let $\{v_{k-j}\}_{j=0}^q$ be the difference vectors, where $v_j \eqdef z_j - z_{j-1}$. Define $V_{k} = \begin{bmatrix} v_k&\cdots & v_{k-q} \end{bmatrix}$. \begin{enumerate}[leftmargin=2em] \item Let $\{c_j\}_{j=1}^q\in \argmin_{c\in \RR^q} \norm{V_{k-1} c - v_k}$, define $c_0\eqdef 1$ and $\gamma_i = c_i/\sum_{i=0}^q c_i$ for $i=0,\ldots, q$. \item The extrapolated point is then defined to be ${\zbar_{k}} \eqdef \sum_{i=0}^q \gamma_i z_{k-i-1}$. \end{enumerate} Reduced rank extrapolation (RRE) \cite{eddy1979extrapolating,mevsina1977convergence} is obtained by replacing the first step by $$\{\gamma_j\}_{j=0}^q\in \argmin_{\gamma\in\RR^{q+1}} \norm{V_k \gamma} \text{ subject to } \msum_i \gamma_i =1.$$ The motivation for the use of such methods for the acceleration of fixed point sequences $x_{k+1} = \Ff(\zk)$ come from considering the spectral properties of the linearization around the limit point. In particular, if $\zsol$ is the limit point and $\zkp -\zsol = T(\zk - \zsol)$ where $T\in \RR^{d\times d}$ and $q$ is the order of the minimal polynomial of $T$ with respect to $z_{k-q-1} - \zsol$ (i.e. $q$ is the monic polynomial of least degree such that $P(T)(z_{k-q-1} -\zsol) = 0$), then one can show that ${\zbar_{k}} = \zsol$. We refer to \cite{sidi1986acceleration,sidi1998upper,sidi2017vector} for details on these methods and their acceleration guarantees. \subsection{Angle between subspaces} \label{P-sec:angles} Let $T_1, T_2$ be two subspaces, and without the loss of generality, assume $$1\leq p\eqdef\dim(T_1) \leq q\eqdef\dim(T_2) \leq n-1.$$ \begin{definition}[Principal angles] \label{def:principal_angle} The principal angles $\theta_k \in [0,\frac{\pi}{2}]$, $k=1,\ldots,p$ between subspaces $T_1$ and $T_2$ are defined by, with $u_0 = v_0 \eqdef 0$, and \begin{align*} \cos(\theta_k) \eqdef \iprod{u_k}{v_k} = \max \iprod{u}{v} ~~~\mathrm{s.t.}~~~ & u \in T_1, v \in T_2, \norm{u}=1, \norm{v}=1, \\ &\iprod{u}{u_i}=\iprod{v}{v_i}=0, ~ i=0,\dotsm,k-1 . \end{align*} The principal angles $\theta_k$ are unique and satisfy $0 \leq \theta_1 \leq \theta_2 \leq \dotsm \leq \theta_p \leq \pi/2$. \end{definition} \begin{definition}[Friedrichs angle]\label{def:friedrichs-angle} The Friedrichs angle $\theta_{F} \in ]0,\frac{\pi}{2}]$ between $T_1$ and $T_2$ is \begin{equation*} \cos\Pa{ \theta_F(T_1,T_2) } \eqdef \max \iprod{u}{v} ~~~\mathrm{s.t.}~~~ u \in T_1 \cap (T_1 \cap T_2)^\perp, \norm{u}=1 ,~ v \in T_2 \cap (T_1 \cap T_2)^\perp, \norm{v}=1 . \end{equation*} \end{definition} The following lemma shows the relation between the Friedrichs and principal angles, whose proof can be found in \cite[Proposition~3.3]{Bauschke14}. \begin{lemma}[Principal angles and Friedrichs angle] \label{lem:fapa} The Friedrichs angle is exactly $\theta_{d+1}$ where $d \eqdef \dim(T_1 \cap T_2)$. Moreover, $\theta_{F}(T_1,T_2) > 0$. \end{lemma} \subsection{Riemannian Geometry} \label{subsec:riemgeom} Let $\calM$ be a $C^2$-smooth embedded submanifold of $\bbR^n$ around a point $x$. With some abuse of terminology, we shall state $C^2$-manifold instead of $C^2$-smooth embedded submanifold of $\bbR^n$. The natural embedding of a submanifold $\calM$ into $\bbR^n$ permits to define a Riemannian structure and to introduce geodesics on $\calM$, and we simply say $\calM$ is a Riemannian manifold. We denote respectively $\tanSp{\Mm}{x}$ and $\normSp{\Mm}{x}$ the tangent and normal space of $\Mm$ at point near $x$ in $\calM$. \paragraph{Exponential map} Geodesics generalize the concept of straight lines in $\bbR^n$, preserving the zero acceleration characteristic, to manifolds. Roughly speaking, a geodesic is locally the shortest path between two points on $\calM$. We denote by $\mathfrak{g}(t;x, h)$ the value at $t \in \bbR$ of the geodesic starting at $\mathfrak{g}(0;x,h) = x \in \calM$ with velocity $\dot{\mathfrak{g}}(t;x, h) = \sfrac{d\mathfrak{g}}{dt}(t;x,h) = h \in \tanSp{\Mm}{x}$ (which is uniquely defined). For every $h \in \tanSp{\calM}{x}$, there exists an interval $I$ around $0$ and a unique geodesic $\mathfrak{g}(t;x, h): I \to \calM$ such that $\mathfrak{g}(0; x, h) = x$ and $\dot{\mathfrak{g}}(0;x, h) = h$. The mapping \[ \Exp_x : \tanSp{\calM}{x} \to \calM ,~~ h\mapsto \Exp_{x}(h) = \mathfrak{g}(1;x, h) , \] is called \emph{Exponential map}. Given $x, x' \in \calM$, the direction $h \in \tanSp{\calM}{x}$ we are interested in is such that \[ \Exp_x(h) = x' = \mathfrak{g}(1;x, h) . \] \paragraph{Parallel translation} Given two points $x, x' \in \calM$, let $\tanSp{\calM}{x}, \tanSp{\calM}{x'}$ be their corresponding tangent spaces. Define \[ \tau : \tanSp{\calM}{x} \to \tanSp{\calM}{x'} , \] the parallel translation along the unique geodesic joining $x$ to $x'$, which is isomorphism and isometry w.r.t. the Riemannian metric. \paragraph{Riemannian gradient and Hessian} For a vector $v \in \normSp{\calM}{x}$, the Weingarten map of $\calM$ at $x$ is the operator $\Wgtmap{x}\pa{\cdot, v}: \tanSp{\calM}{x} \to \tanSp{\calM}{x}$ defined by \[ \Wgtmap{x}\pa{\cdot, v} = - \PT{\tanSp{\calM}{x}} \mathrm{d} V[h] , \] where $V$ is any local extension of $v$ to a normal vector field on $\calM$. The definition is independent of the choice of the extension $V$, and $\Wgtmap{x}(\cdot, v)$ is a symmetric linear operator which is closely tied to the second fundamental form of $\calM$, see \cite[Proposition II.2.1]{chavel2006riemannian}. Let $G$ be a real-valued function which is $C^2$ along the $\calM$ around $x$. The covariant gradient of $G$ at $x' \in \calM$ is the vector $\nabla_{\calM} G(x') \in \tanSp{\calM}{x'}$ defined by \[ \iprod{\nabla_{\calM} G(x')}{h} = \sfrac{d}{dt} G\Pa{\PT{\calM}(x'+th)}\big|_{t=0} ,~~ \forall h \in \tanSp{\calM}{x'}, \] where $\PT{\calM}$ is the projection operator onto $\calM$. The covariant Hessian of $G$ at $x'$ is the symmetric linear mapping $\nabla^2_{\calM} G(x')$ from $\tanSp{\calM}{x'}$ to itself which is defined as \beq\label{eq:rh} \iprod{\nabla^2_{\calM} G(x') h}{h} = \sfrac{d^2}{dt^2} G\Pa{\PT{\calM}(x'+th)}\big|_{t=0} ,~~ \forall h \in \tanSp{\calM}{x'} . \eeq This definition agrees with the usual definition using geodesics or connections \cite{miller2005newton}. Now assume that $\calM$ is a Riemannian embedded submanifold of $\bbR^{n}$, and that a function $G$ has a $C^2$-smooth restriction on $\calM$. This can be characterized by the existence of a $C^2$-smooth extension (representative) of $G$, \ie a $C^2$-smooth function $\widetilde{G}$ on $\bbR^{n}$ such that $\widetilde{G}$ agrees with $G$ on $\calM$. Thus, the Riemannian gradient $\nabla_{\calM}G(x')$ is also given by \beq\label{eq:RieGradient} \nabla_{\calM} G(x') = \PT{\tanSp{\calM}{x'}} \nabla \widetilde{G}(x') , \eeq and $\forall h \in \tanSp{\calM}{x'}$, the Riemannian Hessian reads \beq\label{eq:RieHessian} \begin{aligned} \nabla^2_{\calM} G(x') h &= \PT{\tanSp{\calM}{x'}} \mathrm{d} (\nabla_{\calM} G)(x')[h] = \PT{\tanSp{\calM}{x'}} \mathrm{d} \Pa{ x' \mapsto \PT{\tanSp{\calM}{x'}} \nabla_{\calM} \widetilde{G} }[h] \\ &= \PT{\tanSp{\calM}{x'}} \nabla^2 \widetilde{G}(x') h + \Wgtmap{x'}\Pa{h, \PT{\normSp{\calM}{x'}}\nabla \widetilde{G}(x')} , \end{aligned} \eeq where the last equality comes from \cite[Theorem~1]{absil2013extrinsic}. When $\calM$ is an affine or linear subspace of $\bbR^{n}$, then obviously $\calM = x + \tanSp{\calM}{x}$, and $\Wgtmap{x'}\pa{h, \PT{\normSp{\calM}{x'}} \nabla \widetilde{G}(x')} = 0$, hence \eqref{eq:RieHessian} reduces to \[ \nabla^2_{\calM} G(x') = \PT{\tanSp{\calM}{x'}} \nabla^2 \widetilde{G}(x') \PT{\tanSp{\calM}{x'}} . \] See \cite{lee2003smooth,chavel2006riemannian} for more materials on differential and Riemannian manifolds. \subsection{Preparatory lemmas} The following lemmas characterize the parallel translation and the Riemannian Hessian of nearby points in $\calM$. \begin{lemma}[{\cite[Lemma 5.1]{liang2014local}}]\label{lem:proj-M} Let $\calM$ be a $C^2$-smooth manifold around $x$. Then for any $x' \in \calM \cap \calN$, where $\calN$ is a neighborhood of $x$, the projection operator $\proj_{\calM}(x')$ is uniquely valued and $C^1$ around $x$, and thus \[ x' - x = \proj_{\tanSp{\calM}{x}}(x'-x) + o\pa{\norm{x'-x}} . \] If moreover $\calM = x + \tanSp{\calM}{x}$ is an affine subspace, then $x' - x = \proj_{\tanSp{\calM}{x}}(x'-x)$. \end{lemma} \begin{lemma}[{\cite[Lemma B.1]{liang2017activity}}]\label{lem:parallel-translation} Let $x \in \calM$, and $\xk$ a sequence converging to $x$ in $\calM$. Denote $\tau_k : \tanSp{\calM}{\xk} \to \tanSp{\calM}{x}$ be the parallel translation along the unique geodesic joining $x$ to $\xk$. Then, for any bounded vector $u \in \bbR^n$, we have \[ \pa{\tau_k \proj_{\tanSp{\calM}{\xk}} - \proj_{\tanSp{\calM}{x}}}u = o(\norm{u}) . \] \end{lemma} The Riemannian gradient and Hessian of partly smooth functions are covered by the lemma below. \begin{lemma}[{\cite[Lemma B.2]{liang2017activity}}]\label{lem:taylor-expn} Let $x, x'$ be two close points in $\calM$, denote $\tau : \tanSp{\calM}{x'} \to \tanSp{\calM}{x}$ the parallel translation along the unique geodesic joining $x$ to $x'$. The Riemannian Taylor expansion of $R \in C^2(\calM)$ around $x$ reads, \beq\label{eq:taylor-expn} \tau \nabla_{\calM} R(x') = \nabla_{\calM} R(x) + \nabla^2_{\calM} R(x)\proj_{\tanSp{\calM}{x}}(x'-x) + o(\norm{x'-x}) . \eeq \end{lemma} \begin{lemma}[Riemannian gradient and Hessian]\label{def:riemannian-gradhess} If $R \in \PSF{x}{\calM_x}$, then for any point $x' \in \calM_x$ near $x$ \[ \nabla_{\calM_x} R(x') = \proj_{T_{x'}}\pa{\partial R(x')} , \] and this does not depend on the smooth representation of $R$ on $\calM_x$. In turn, for all $h \in T_{x'}$, let $\widetilde{R}$ be a smooth representative of $R$ on $\calM_x$, \[ \nabla^2_{\calM_x} R(x')h = \proj_{T_{x'}} \nabla^2 \widetilde{R}(x')h + \Wgtmap{x'}\Pa{h, \proj_{T_{x'}^\perp}\nabla \widetilde{R}(x')} , \] where $\Wgtmap{x}\pa{\cdot, \cdot}: T_x \times T_x^\perp \to T_x$ is the Weingarten map of $\calM_x$ at $x$. \end{lemma} \subsection{Linearization of proximal mapping} In this part, we present one fundamental result led by partial smoothness, the linearization of proximal mapping. We first discuss the property of the Riemannian Hessian of a partly smooth function. Let $R \in \lsc(\bbR^n)$ be partly smooth at $\xbar$ relative to $\calM_{\xbar}$ and $\ubar \in \partial R(\xbar)$, define the following smooth perturbation of $R$ \[ \barR(x) \eqdef R(x) - \iprod{x}{\ubar} , \] whose Riemannian Hessian at $\xbar$ reads $H_{\barR} \eqdef \proj_{T_{\xbar}} \nabla^2_{\calM_{\xbar}} \barR \pa{\xbar} \proj_{T_{\xbar}} $. \begin{lemma}[{\cite[Lemma 4.2]{liang2017activity}}]\label{lem:riemhesspsd} Let $R \in \lsc(\bbR^n)$ be partly smooth at $\xbar$ relative to $\calM_{\xbar}$, then $H_{\barR}$ is symmetric positive semi-definite if either of the following is true: \begin{itemize}[leftmargin=2em] \item $\ubar \in \ri(\partial R(\xbar))$ is non-degenerate. \item $\calM_{\xbar}$ is an affine subspace. \end{itemize} In turn, $\Id + H_{\barR}$ is invertible and $\pa{\Id + H_{\barR}}^{-1}$ is symmetric positive definite with all eigenvalues in~$]0,1]$. \end{lemma} One consequence of Lemma \ref{lem:riemhesspsd} is that, we can linearize the generalized proximal mapping. For the sake of generality, let $\gamma > 0$, $R \in \lsc(\bbR^n)$ and $A \in \bbR^{p \times n}$, define the following generalized proximal mapping \[ \prox_{\gamma R}^{A}(\cdot) \eqdef \argmin_{x\in \bbR^n} \gamma R(x) + \sfrac{1}{2} \norm{Ax - \cdot}^2 . \] Clearly, $\prox_{\gamma R}^{A}$ is a single-valued mapping when $A$ has full column rank. Denote $A_{T_{\xbar}} \eqdef A \circ \PT{T_{\xbar}}$, it is immediate that $A_{T_{\xbar}}^TA_{T_{\xbar}}$ is positive semidefinite and invertible along $T_{\xbar}$. In the following we denote $\pa{A_{T_{\xbar}}^TA_{T_{\xbar}}}^{-1}$ the inverse along $T_{\xbar}$ Denote $$ M_{\barR} = A_{T_{\xbar}} \pa{ \Id + (A_{T_{\xbar}}^T A_{T_{\xbar}})^{-1} H_{\barR} }^{-1} (A_{T_{\xbar}}^T A_{T_{\xbar}})^{-1} A_{T_{\xbar}}^T . $$ \begin{lemma}\label{lem:lin-generalised-ppa} Let function $R \in \lsc(\bbR^n)$ be partly smooth at the point $\xbar$ relative to the manifold $\calM_{\xbar}$ and $\ubar \in \ri \pa{\partial R(\xbar)}$. Suppose that there exists $\gamma > 0$, full column rank $A \in \bbR^{p\times n}$ and $\wbar \in \bbR^p$ such that $\xbar = \prox_{\gamma R}^{A}(\wbar)$ and $\ubar = - A^T (A\xbar - \wbar)/\gamma$. Let $\seq{\wk}$ be a sequence such that $\wk \to \wbar$ and $\xk = \prox_{\gamma R}^{A}(\wk) \to \xbar$, then for all $k$ large enough, there hold $\xk \in \calM_{\xbar}$ and \beq\label{eq:lin-generalised-ppa} A_{T_{\xbar}} (\xk-\xkm) = M_{\barR} \pa{\wk - \wkm} + o(\norm{\wk-\wkm}) . \eeq \end{lemma} \begin{remark} When $A = \Id$, then $\prox_{\gamma R}^{A}$ reduces to the standard proximal mapping, and \eqref{eq:lin-generalised-ppa} simplifies to \[ \xk-\xkm = \PT{T_{\xbar}} \Pa{\Id + H_{\barR}}^{-1} \PT{T_{\xbar}} \pa{\wk - \wkm} + o(\norm{\wk-\wkm}) . \] In \cite{liang2016thesis} and references therein, to study the local linear convergence of first-order methods, linearization with respect to the limiting points is provided, that is \[ \xk-\xbar = \PT{T_{\xbar}} \Pa{\Id + H_{\barR}}^{-1} \PT{T_{\xbar}} \pa{\wk - \wbar} + o(\norm{\wk-\wbar}) . \] \end{remark} \begin{proof} Since $R$ is proper convex and lower semi-continuous, we have $R(\xk) \to R(\xbar)$ and $\partial R(\xk) \ni \uk = - A^T (A\xk - \wk)/\gamma \to \ubar \in \ri \pa{\partial R(\xbar)}$, hence $\dist\pa{\uk, \partial R(\xbar)} \to 0$. As a result, we have $\xk \in \calM_{\xbar}$ owing to \cite[Theorem~5.3]{hare2004identifying} and $\uk \in \ri\pa{\partial R(\xk)}$ owing to \cite{vaiter2018model} for all $k$ large enough. Denote $T_{\xk}, T_{\xkm}$ the tangent spaces of $\calM_{\xbar}$ at $\xk$ and $\xkm$. Denote $\tau_{k} : T_{\xk} \to T_{\xkm}$ the parallel translation along the unique geodesic on $\calM_{\xbar}$ joining $\xk$ to $\xkm$. From the definition of $\xk$, let $\hk = \gamma \uk$, we get \[ \hk \eqdef - A^T\pa{ A\xk - \wk } \in \gamma \partial R(\xk) \qandq \hkm \eqdef - A^T\pa{ A\xkm - \wkm } \in \gamma \partial R(\xkm) . \] Projecting onto corresponding tangent spaces, applying Lemma \ref{def:riemannian-gradhess} and the parallel translation $\tau_{k}$ leads to \[ \begin{aligned} \gamma \tau_{k} \nabla_{\calM_{\xbar}} R(\xk) &= \tau_{k} \PT{T_{\xk}} \pa{ \hk } = \PT{T_{\xkm}} \pa{ \hk } + \Pa{\tau_{k} \PT{T_{\xk}} - \PT{T_{\xkm}}} \pa{ \hk } , \\ \gamma \nabla_{\calM_{\xbar}} R(\xkm) &= \PT{T_{\xkm}} \pa{ \hkm } . \end{aligned} \] The difference of the above two equalities yields \beq\label{eq:wk-xk} \begin{aligned} \gamma \tau_{k} \nabla_{\calM_{\xbar}} R(\xk) - \gamma \nabla_{\calM_{\xbar}} R(\xkm) - \Pa{\tau_{k} \PT{T_{\xk}} - \PT{T_{\xkm}}} \pa{ \hkm } &= \PT{T_{\xkm}} \pa{ \hk - \hkm } + \Pa{\tau_{k} \PT{T_{\xk}} - \PT{T_{\xkm}}} \pa{ \hk - \hkm } . \end{aligned} \eeq Owing to the monotonicity of subdifferential, \ie $\iprod{\hk-\hkm}{\xk-\xkm} \geq 0$, we get \[ \iprod{A^TA(\xk-\xkm)}{\xk-\xkm} \leq \iprod{A^T(\wk-\wkm)}{\xk-\xkm} \leq \norm{A}\norm{\wk-\wkm}\norm{\xk-\xkm} . \] Since $A$ has full column rank, $A^TA$ is symmetric positive definite, and there exists $\kappa > 0$ such that $\kappa \norm{\xk-\xkm}^2 \leq \iprod{A^TA(\xk-\xkm)}{\xk-\xkm}$. Back to the above inequality, we get $\norm{\xk-\xkm} \leq \frac{\norm{A}}{\kappa} \norm{\wk-\wkm}$. Therefore for $\norm{\hk-\hkm}$, we get \[ \begin{aligned} \norm{\hk - \hkm} =\norm{ A^T\pa{ A\xk - \wk } - A^T\pa{ A\xkm - \wkm } } \leq \norm{A}^2 \norm{\xk-\xkm} + \norm{A}\norm{\wk-\wkm} &\leq \Pa{ \sfrac{\norm{A}^3}{\kappa} + \norm{A}} \norm{\wk - \wkm} . \end{aligned} \] As a result, owing to Lemma \ref{lem:parallel-translation}, we have for the term $\pa{\tau_{k} \PT{T_{\xk}} - \PT{T_{\xkm}}} \pa{ \hk - \hkm }$ in \eqref{eq:wk-xk} that \[ \Pa{\tau_{k} \PT{T_{\xk}} - \PT{T_{\xkm}}} \pa{ \hk - \hkm } \\ = o(\norm{ \hk-\hkm } ) = o(\norm{ \wk-\wkm } ) . \] Define $\barR_{k-1}(x) \eqdef \gamma R(x) - \iprod{x}{\hkm} $ and $H_{\barR, k-1} \eqdef \PT{T_{\xkm}} \nabla_{\calM_{\xbar}}^2 \barR_{k-1}(\xkm) \PT{T_{\xkm}}$, then with Lemma \ref{lem:taylor-expn} the Riemannian Taylor expansion, we have for the first line of \eqref{eq:wk-xk} \beq\label{eq:rie-hess-xk} \begin{aligned} \gamma \tau_{k} \nabla_{\calM_{\xbar}} R(\xk) - \gamma \nabla_{\calM_{\xbar}} R(\xkm) - \Pa{\tau_{k} \PT{T_{\xk}} - \PT{T_{\xkm}}} \pa{\hkm} &= \tau_{k} \Pa{\gamma \nabla_{\calM_{\xbar}} R(\xk) - \PT{T_{\xk}} \pa{\hkm}} - \Pa{ \gamma \nabla_{\calM_{\xbar}} R(\xkm) - \PT{T_{\xkm}} \pa{\hkm} } \\ &= \tau_{k} \nabla_{\calM_{\xbar}} \barR_{k-1} (\xk) - \nabla_{\calM_{\xbar}} \barR_{k-1} (\xkm) \\ &= H_{\barR, k-1} (\xk-\xkm) + o(\norm{\xk-\xkm}) \\ &= H_{\barR, k-1} (\xk-\xkm) + o(\norm{\wk-\wkm}) . \end{aligned} \eeq Back to \eqref{eq:wk-xk}, we get \beq\label{eq:wk-xk-2} \begin{aligned} H_{\barR, k-1} (\xk-\xkm) &= \PT{T_{\xkm}} \pa{ \hk - \hkm } + o(\norm{\wk-\wkm}) . \end{aligned} \eeq Define $ \barR(x) \eqdef \gamma R(x) - \iprod{x}{ \bar{h} } $ and $H_{\barR} = \PT{T_{\xbar}} \nabla^2_{\calM_{\xbar}} \barR\pa{\xbar} \PT{T_{\xbar}}$, then from \eqref{eq:wk-xk-2} that \beq\label{eq:xk-xkm-HbarR} \begin{aligned} H_{\barR} (\xk-\xkm) + \Pa{ H_{\barR, k-1} - H_{\barR} } (\xk-\xkm) &= \PT{T_{\xbar}} \pa{ \hk - \hkm } + \Pa{ \PT{T_{\xkm}} - \PT{T_{\xbar}} } \pa{ \hk - \hkm } + o(\norm{\wk-\wkm}) . \end{aligned} \eeq Owing to continuity, we have $H_{\barR, k-1} \to H_{\barR}$ and $\PT{T_{\xkm}} \to \PT{T_{\xbar}}$, \[ \begin{gathered} \lim_{k\to\pinf} \tfrac{ \norm{ \pa{ H_{\barR, k-1} - H_{\barR} } (\xk-\xkm) } }{ \norm{\xk-\xkm} } \leq \lim_{k\to\pinf} \tfrac{ \norm{ H_{\barR, k-1} - H_{\barR} } \norm{ \xk-\xkm } }{ \norm{\xk-\xkm} } = \lim_{k\to\pinf} \norm{ H_{\barR, k-1} - H_{\barR} } = 0 , \\ \lim_{k\to\pinf} \tfrac{ \norm{ \pa{ \PT{T_{\xkm}} - \PT{T_{\xbar}} } \pa{\wk - \wkm} } }{ \norm{\wk-\wkm} } \leq \lim_{k\to\pinf} \tfrac{ \norm{ \PT{T_{\xkm}} - \PT{T_{\xbar}} } \norm{ \wk-\wkm } }{ \norm{\wk-\wkm} } = \lim_{k\to\pinf} \norm{ \PT{T_{\xkm}} - \PT{T_{\xbar}} } = 0 , \end{gathered} \] and $\lim_{k\to\pinf} \tfrac{ \norm{ \pa{ \PT{T_{\xkm}} - \PT{T_{\xbar}}} \pa{\xk - \xkm} } }{ \norm{\xk-\xkm} } = 0$. Combining this with the definition of $\uk$, the fact that $\xk-\xkm = \PT{T_{\xbar}}(\xk-\xkm) + o(\norm{\xk-\xkm})$ from Lemma \ref{lem:proj-M}, and denoting $A_{T_{\xbar}} = A \circ \PT{T_{\xbar}}$, equation \eqref{eq:xk-xkm-HbarR} can be written as \beq\label{eq:aaa} \begin{aligned} H_{\barR} (\xk-\xkm) = \PT{T_{\xbar}} \pa{ \uk - \ukm } + o(\norm{\wk-\wkm}) &= - \PT{T_{\xbar}} \pa{ A^T\pa{ A\xk - \wk } - A^T\pa{ A\xkm - \wkm } } + o(\norm{\wk-\wkm}) \\ &= - \PT{T_{\xbar}} A^T A \pa{ \xk - \xkm } + \PT{T_{\xbar}} A^T \pa{ \wk - \wkm } + o(\norm{\wk-\wkm}) \\ &= - A_{T_{\xbar}}^T A_{T_{\xbar}} \pa{ \xk - \xkm } + A_{T_{\xbar}}^T \pa{ \wk - \wkm } + o(\norm{\wk-\wkm}) . \end{aligned} \eeq Since $A$ has full rank, so is $A_{T_{\xbar}}$. Hence $A_{T_{\xbar}}^TA_{T_{\xbar}}$ is invertible along $T_{\xbar}$ and from above we have \[ \begin{aligned} \Pa{ \Id + (A_{T_{\xbar}}^T A_{T_{\xbar}})^{-1} H_{\barR} } (\xk-\xkm) &= (A_{T_{\xbar}}^T A_{T_{\xbar}})^{-1} A_{T_{\xbar}}^T \pa{\wk-\wkm} + o(\norm{\wk-\wkm}) . \end{aligned} \] Denote $M_{\barR} = A_{T_{\xbar}} \pa{ \Id + (A_{T_{\xbar}}^T A_{T_{\xbar}})^{-1} H_{\barR} }^{-1} (A_{T_{\xbar}}^T A_{T_{\xbar}})^{-1} A_{T_{\xbar}}^T$, then \beq\label{eq:xkxkm-MbarR-wkwkm} \begin{aligned} A_{T_{\xbar}} (\xk-\xkm) &= M_{\barR} \pa{\wk-\wkm} + o(\norm{\wk-\wkm}) , \end{aligned} \eeq which concludes the proof. \qedhere \end{proof} \section{Trajectory of ADMM} \label{P-sec:tra-admm} We first provide the fixed-point characterization of ADMM based on the equivalence between ADMM and Douglas--Rachford \cite{douglas1956numerical} and Peaceman--Rachford splitting \cite{peaceman1955numerical} methods, and then present the proofs for the trajectory of ADMM. \subsection{Fixed-point characterization and convergence of ADMM} \label{sec:admm-dr-pr} The dual problem of \eqref{eq:problem-admm} reads \beqn\tag{$\calD_{\mathrm{ADMM}}$ \max_{\psi\in\bbR^p } - \Pa{R^*(-A^T \psi) + J^*(-B^T \psi) + \iprod{\psi}{b} } , \eeqn where $R^*(v) \eqdef \sup_{x\in\bbR^n} ~ \pa{ \iprod{x}{v} - R(x) }$ is called the Fenchel conjugate, or simply conjugate, of $R$. \subsubsection{Relaxed ADMM and Douglas--Rachford splitting}\label{subsec:admm-dr} It is well-known that ADMM is equivalent to applying Douglas--Rachford splitting \cite{douglas1956numerical} to the dual problem \eqref{eq:problem-admm-dual}. Below we first recall the equivalence between ADMM and Douglas--Rachford which was first established in \cite{gabay1983chapter}, and then use the convergence of Douglas--Rachford splitting which is well established in the literature \cite{bauschke2011convex} to conclude the convergence of ADMM. For the sake of generality, we consider the following so called \emph{relaxed ADMM} \[ \begin{aligned} \xk &= \argmin_{x\in\bbR^n }~ R(x) + \tfrac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \xbark &= \phi A\xk - (1-\phi)(B\ykm-b) , \\ \yk &= \argmin_{y\in\bbR^m }~ J(y) + \tfrac{\gamma}{2} \norm{\xbark+By-b + \tfrac{1}{\gamma}\psikm }^2 , \\ \psik &= \psikm + \gamma\pa{\xbark + B\yk - b} , \end{aligned} \] where $\phi \in [0, 2]$ is the relaxation parameter. When $\phi = 1$, the relaxed ADMM recovers the standard ADMM \eqref{eq:admm2}. Below show demonstrate that the relaxed ADMM is equivalent to the relaxed Douglas--Rachford applying to solve \eqref{eq:problem-admm-dual}. \begin{itemize}[leftmargin=2em] \item Define $\zk = \psik - \gamma (B\yk - b)$, we have \[ \begin{aligned} \zk = \psik - \gamma B\yk + \gamma b = \psikm + \gamma \xbark &= \phi \psikm + \phi \gamma A\xk + (1-\phi) \psikm - (1-\phi) \gamma (B\ykm-b) \\ &= (1-\phi)\zkm + \phi(\psikm + \gamma A\xk) \\ &= (1-\phi)\zkm + \phi(\zkm + \uk - \psikm) . \end{aligned} \] When $\phi = 1$, we have $\zk = \psikm + \gamma A\xk$. \item For the update of $\xk$, denote $\uk = \psikm + \gamma (A\xk + B\ykm - b)$. Since $A$ has full column rank, we have $\xk$ is the unique minimiser of $R(x) + \frac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2$. Let $R^*$ be the conjugate of $R$, then owing to duality, we get \[ \begin{aligned} \xk = \argmin_{x\in\bbR^n }~ R(x) + \sfrac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2 \Longleftrightarrow\enskip & 0 \in \partial R(\xk) + \gamma A^T\Pa{ A\xk + B\ykm - b + \tfrac{1}{\gamma}\psikm } \\ \enskip\Longleftrightarrow\enskip & - A^T \uk \in \partial R(\xk) \\ \enskip\Longleftrightarrow\enskip & \xk \in \partial R^*( - A^T \uk ) \\ \enskip\Longleftrightarrow\enskip & \uk - \gamma A \xk \in \uk + \gamma \partial (R^* \circ - A^T )( \uk ) \\ \enskip\Longleftrightarrow\enskip & \uk = \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} ( \uk - \gamma A \xk ) \\ \enskip\Longleftrightarrow\enskip & \uk = \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} ( 2\psikm - \zkm ) . \end{aligned} \] \item For the update of $\yk$, the full column rank of $B$ also ensures that $\yk$ is the unique minimiser of $J(y) + \sfrac{\gamma}{2} \norm{\xbark+By-b + \frac{1}{\gamma}\psikm }^2$. Since $\psik = \psikm + \gamma \pa{\xbark+B\yk - b}$, then \[ \begin{aligned} \yk = \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{\xbark+By-b + \tfrac{1}{\gamma}\psikm }^2 \Longleftrightarrow\enskip & 0 \in \partial J(\yk) + \gamma B^T\Pa{ \xbark + B\yk - b + \tfrac{1}{\gamma}\psikm } \\ \enskip\Longleftrightarrow\enskip & - B^T \psik \in \partial J(\yk) \\ \enskip\Longleftrightarrow\enskip & \yk \in \partial J^*(- B^T \psik) \\ \enskip\Longleftrightarrow\enskip & \psik - \gamma B \yk \in \psik + \gamma \partial (J^* \circ - B^T) (\psik) \\ \enskip\Longleftrightarrow\enskip & \psik = \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\psik - \gamma B \yk) \\ \enskip\Longleftrightarrow\enskip & \psik = \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\zk - \gamma b) . \end{aligned} \] \item Combining all the relations we get \beq\label{eq:dr-on-dual} \begin{aligned} \uk &= \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} ( 2\psikm - \zkm ) , \\ \zk &= (1-\phi)\zkm + \phi(\zkm + \uk - \psikm) , \\ \psik &= \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\zk - \gamma b ) , \end{aligned} \eeq which is exactly the iteration of Douglas--Rachford splitting applied to solve the dual problem \eqref{eq:problem-admm-dual} with . \end{itemize} Define the following operator \[ \fDR = \sfrac{1}{2} \Id + \sfrac{1}{2} \bPa{ 2 \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} - \Id } \bPa{ 2\Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} - \Id } , \] then \eqref{eq:dr-on-dual} can be written as the fixed-point iteration in terms of $\zk$, that is \[ \zk = \fDR(\zkm) . \] It should be noted that for $\zk$ we have $\zk = \psik - \gamma B\yk + \gamma b = \psikm + \gamma A \xk$ which is the same as in \eqref{eq:admm2}. Owing to \cite{bauschke2011convex}, we have that $\fDR$ is firmly non-expansive with the set of fixed-points $\fix(\fDR)$ being non-empty, and there exists a fixed-point $\zsol \in \fix(\fDR)$ such that $\zk \to \zsol$ which concludes the convergence of $\seq{\zk}$. Then we have $\uk, \psik$ converging to $\psisol = \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\zsol - \gamma b )$ which is a dual solution of the problem \eqref{eq:problem-admm-dual}. The convergence of the primal ADMM sequences $\seq{\xk}$ and $\seq{\yk}$ follows immediately. Owing to the above equivalence between ADMM and Douglas--Rachford splitting, we get the following relations \beq\label{eq:relations} \begin{aligned} \norm{\zk - \zkm} &\leq \norm{\zkm - \zkmm} , \\ \norm{\psik - \psikm} &\leq \norm{\zk - \zkm} \leq \norm{\zkm - \zkmm} , \\ \norm{\uk-\ukm} &\leq \norm{2\psikm - \zkm - 2\psikmm + \zkmm} \leq 3\norm{\zkm-\zkmm} , \\ \gamma\norm{A\xk - A\xkm} &\leq \norm{\zk-\zkm} + \norm{\psikm-\psikmm} \leq 2\norm{\zkm-\zkmm} , \\ \gamma\norm{B\yk - B\ykm} &\leq \norm{\zk-\zkm} + \norm{\psik-\psikm} \leq 2 \norm{\zkm-\zkmm} , \end{aligned} \eeq which are needed in the proofs below. \subsubsection{Symmetric ADMM and Peaceman--Rachford splitting}\label{subsec:admm-pr} Below we present a short discussion on the relation between the symmetric ADMM and Peaceman--Rachford splitting method, which was first established in \cite{gabay1983chapter}. \begin{itemize}[leftmargin=2em] \item For the update of $\xk$, let $\uk = \psikmh = \psikm + \gamma (A\xk + B\ykm - b)$ and $\zk = \psik - \gamma B\yk + \gamma b$. As $A$ has full column rank, $\xk$ is the unique minimiser of $R(x) + \frac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2$. Then owing to duality, \[ \begin{aligned} \xk = \argmin_{x\in\bbR^n }~ R(x) + \tfrac{\gamma}{2} \norm{Ax+B\ykm-b + \tfrac{1}{\gamma}\psikm }^2 \enskip\Longleftrightarrow\enskip & - A^T \uk \in \partial R(\xk) \\ \enskip\Longleftrightarrow\enskip & \xk \in \partial R^*( - A^T \uk ) \\ \enskip\Longleftrightarrow\enskip & \uk = \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} ( \uk - \gamma A \xk ) \\ \enskip\Longleftrightarrow\enskip & \uk = \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} ( 2\psikm - \zkm ) . \end{aligned} \] \item For $\yk$, the full column rank of $B$ ensures the uniqueness of $\yk$. Since $\psik = \psikmh + \gamma \pa{A\xk+B\yk - b}$, then \[ \begin{aligned} \yk = \argmin_{y\in\bbR^m }~ J(y) + \sfrac{\gamma}{2} \norm{A\xk+By-b + \tfrac{1}{\gamma}\psikmh }^2 \enskip\Longleftrightarrow\enskip & - B^T \psik \in \partial J(\yk) \\ \enskip\Longleftrightarrow\enskip & \yk \in \partial J^*(- B^T \psik) \\ \enskip\Longleftrightarrow\enskip & \psik = \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\psik - \gamma B \yk) \\ \enskip\Longleftrightarrow\enskip & \psik = \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\zk - \gamma b) . \end{aligned} \] \item For $\zk$, since $\uk = \psikmh$, \[ \begin{aligned} \zk = \psik - \gamma B\yk + \gamma b = \uk + \gamma A\xk = 2\uk - \psikm - \gamma(B\ykm - b) = \zkm + 2(\uk - \psikm) . \end{aligned} \] Combining the above relations we get \beq\label{eq:pd-on-dual} \begin{aligned} \uk &= \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} ( 2\psikm - \zkm ) , \\ \zk &= \zkm + 2(\uk - \psikm) , \\ \psik &= \Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} (\zk - \gamma b ) , \end{aligned} \eeq which is the iteration of Peaceman--Rachford splitting when applied to solve \eqref{eq:problem-admm-dual}. \end{itemize} Define the following operator \[ \fPR = \Pa{ 2 \Pa{ \Id + \gamma \partial (R^* \circ - A^T ) }^{-1} - \Id } \bPa{ 2\Pa{\Id + \gamma \partial (J^* \circ - B^T)}^{-1} - \Id } , \] then \eqref{eq:pd-on-dual} can be written as the fixed-point iteration in terms of $\zk$, that is \[ \zk = \fPR(\zkm) . \] It should be noted that for $\zk$ we have $\zk = \psik - \gamma B\yk + \gamma b = \psikm + \gamma A \xk$ which is the same as in \eqref{eq:admm_symmetric2}. Different to the case of Douglas--Rachford, the operator $\fPR$ is only non-expansive \cite{bauschke2011convex}, hence the conditions for $\zk$ to be convergent is stronger than that of $\fDR$. However, when it converges, it tends to be faster than Douglas--Rachford splitting \cite{gabay1983chapter}. \subsection{Trajectory of ADMM: both $R, J$ are non-smooth} Given a saddle point $(\xsol, \ysol, \psisol)$ of $\calL(x,y; \psi)$, the first-order optimality condition entails $- A^T \psisol \in {\partial R(\xsol)} $ and $- B^T \psisol \in {\partial J(\ysol)} $. Below we impose a stronger condition \beq\label{eq:ndc-admm}\tag{$\textrm{ND}$} - A^T \psisol \in \ri\Pa{\partial R(\xsol)} \qandq - B^T \psisol \in \ri\Pa{\partial J(\ysol)} . \eeq Suppose $R \in \PSF{\xsol}{\MmRx}, J \in \PSF{\ysol}{\MmJy}$ are partly smooth, denote $T_{\xsol}^R, T_{\ysol}^J$ the tangent spaces of $\MmRx, \MmJy$ at $\xsol, \ysol$, respectively. Define the following smooth perturbation of $R, J$, \beq\label{eq:barR-barJ-admm} \barR(x) \eqdef \sfrac{1}{\gamma} \Pa{ R(x) - \iprod{x}{-A^T \psisol } } ,~~~ \barJ(y) \eqdef \sfrac{1}{\gamma} \Pa{ J(y) - \iprod{w}{-B^T \psisol} } , \eeq their Riemannian Hessian $H_{\barR} \eqdef \PR \nabla^2_{\MmRx} \barR\pa{\xsol} \PR, ~ H_{\barJ} \eqdef \PJ \nabla^2_{\MmJy} \barJ\pa{\ysol} \PJ$ and \beq\label{eq:BarBarQ} \begin{gathered} M_{\barR} \eqdef A_{R} \Pa{ \Id+(A_{R}^TA_{R})^{-1} {H_{\barR}} }^{-1} (A_{R}^TA_{R})^{-1} A_{R}^{T} , \\ M_{\barJ} \eqdef B_{J} \Pa{ \Id+(B_{J}^TB_{J})^{-1} {H_{\barJ}} }^{-1} (B_{J}^TB_{J})^{-1} B_{J}^{T} , \end{gathered} \eeq where $A_{R} \eqdef A \circ \PTR{\xsol}, B_J \eqdef B \circ \PTJ{\ysol}$. Finally, define \beq\label{eq:mtx-M-admm} \mADMM \eqdef \sfrac12\Id + \sfrac12\pa{2M_{\barR}-\Id}\pa{2 M_{\barJ} - \Id} . \eeq \begin{proof}[Proof of Theorem \ref{prop:trajectory-admm}] The proof of Theorem \ref{prop:trajectory-admm} is split into several steps: finite manifold identification of ADMM, local linearization based on partial smoothness, spectral properties of the linearized matrix, and the trajectory of $\seq{\zk}$. Let $(\xsol, \ysol, \psisol)$ be a saddle-point of $\calL(x,y; \psi)$. \paragraph{1. Finite manifold identification of ADMM} The finite manifold identification of ADMM is already discussed in \cite{liang2017localDR}, below we present a short discussion for the sake of self-consistency. At convergence of ADMM, owing to \eqref{eq:admm2} we have \[ \begin{aligned} A^T \psisol &= \gamma A^T\Pa{ A\xsol - \tfrac{1}{\gamma } \pa{ \zsol - 2\psisol } } \qandq B^T \psisol &= \gamma B^T\Pa{ B\ysol - \tfrac{1}{\gamma } \pa{ \zsol - \gamma b } } . \end{aligned} \] From the update of $\xk, \yk$ in \eqref{eq:admm2}, we have the following monotone inclusions \beqn \begin{aligned} - \gamma A^T\Pa{ A\xk - \tfrac{1}{\gamma } \pa{ \zkm - 2\psikm } } &\in \partial R(\xk) &\!\!\textrm{and}\!\!&& - \gamma B^T\Pa{ B\yk - \tfrac{1}{\gamma } \pa{ \zk - \gamma b } } &\in \partial J(\yk) , \\ - \gamma A^T\Pa{ A\xsol - \tfrac{1}{\gamma } \pa{ \zsol - 2\psisol } } &\in \partial R(\xsol) &\!\!\textrm{and}\!\!&& - \gamma B^T\Pa{ B\ysol - \tfrac{1}{\gamma } \pa{ \zsol - \gamma b } } &\in \partial J(\ysol) . \end{aligned} \eeqn Since $A$ is bounded, it then follows that \[ \begin{aligned} \dist\Pa{-A^T\psisol, \partial R(\xk)} &\leq \gamma \norm{ A^T\Pa{ A\xk - \tfrac{1}{\gamma } \pa{ \zkm - 2\psikm } } - A^T\Pa{ A\xsol - \tfrac{1}{\gamma } \pa{ \zsol - 2\psisol } } } \\ &\leq \gamma \norm{A}\norm{ A(\xk-\xsol) - \tfrac{1}{\gamma }(\zkm-\zsol) + \tfrac{2}{\gamma } (\psikm -\psisol) } \\ &\leq \gamma \norm{A}\Pa{ \norm{A}\norm{\xk-\xsol} + \tfrac{1}{\gamma }\norm{\zkm-\zsol} + \tfrac{2}{\gamma } \norm{\psikm -\psisol} } \to 0 . \end{aligned} \] and similarly \[ \dist\Pa{-B^T\psisol, \partial J(\yk)} \leq \gamma \norm{B}\Pa{ \norm{B}\norm{\yk-\ysol} + \tfrac{1}{\gamma }\norm{\zk-\zsol} } \to 0 . \] Since $R\in \lsc\pa{\bbR^n}$ and $J \in \lsc\pa{\bbR^m}$, then by the sub-differentially continuous property of them we have $R(\xk) \to R(\xsol)$ and $J(\yk) \to J(\ysol)$. Hence the conditions of \cite[Theorem~5.3]{hare2004identifying} are fulfilled for $R$ and $J$, and there exists $K$ large enough such that for all $k \geq K$, there holds \[ (\xk, \yk) \in \MmRx \times \MmJy , \] which is the finite manifold identification. \paragraph{2. linearization of ADMM} For convenience, denote $\beta = 1/\gamma$. For the update of $\yk$, define $\wk = - \beta \pa{ \zk - \gamma b }$, we have from \eqref{eq:admm2} that \[ \yk = \argmin_{y\in\bbR^m }~ \beta J(y) + \sfrac{1}{2} \norm{By - \wk }^2 . \] Owing to the optimality condition of a saddle point, define $ \barJ(y) \eqdef { \beta J(y) - \iprod{y}{ - \beta B^T \psisol } }$ and its Riemannian Hessian $H_{\barJ} = \PTJ{\ysol} \nabla^2_{\MmJy} \barJ \pa{\ysol} \PTJ{\ysol}$. For $B$, define $B_J = B \circ \PTJ{\ysol}$, and $ M_{\barJ} = B_{J} \pa{\Id + (B_{J}^TB_{J})^{-1}H_{\barJ} }^{-1} (B_{J}^TB_{J})^{-1} B_{J}^T $. Then owing to Lemma \ref{lem:lin-generalised-ppa}, we get \beq\label{eq:ukp-usol-admm} \begin{aligned} B_J (\yk-\ykm) &= M_{\barJ} (\wk - \wkm) + o(\norm{\wk-\wkm}) \\ &= - \beta M_{\barJ} (\zk - \zkm) + o(\norm{\zk-\zkm}) . \end{aligned} \eeq Now consider $\xk$ and let $\wk = \beta \pa{ \zkm - 2\psikm }$, we get from \eqref{eq:admm2} that \[ \xk = \argmin_{x\in\bbR^n }~ \beta R(x) + \sfrac{1}{2} \norm{Ax - \wk }^2 . \] Define $ \barR(x) \eqdef \beta R(x) - \iprod{x}{ - \beta A^T\psisol } $ and its Riemannian Hessian $H_{\barR} = \PTR{\xsol} \nabla^2_{\MmRx} \barR\pa{\xsol} \PTR{\xsol}$. Denote $A_{R} = A \circ \PTR{\xsol}$, and $ M_{\barR} = A_{R} \pa{ \Id + (A_{R}^T A_{R})^{-1} H_{\barR} }^{-1} (A_{R}^T A_{R})^{-1} A_{R}^T $. Note from \eqref{eq:admm2} that $\psikm - \psikmm = \zkm - \zkmm + \gamma B (\ykm - \ykmm)$, then \[ \begin{aligned} \wk - \wkm &= \beta (\zkm-\zkmm) - 2\beta (\psikm-\psikmm) \\ &= - \beta (\zkm-\zkmm) - 2\beta \gamma B (\ykm-\ykmm) \\ &= - \beta (\zkm-\zkmm) - 2 B_{J} (\ykm-\ykmm) + o(\norm{\ykm-\ykmm}) , \end{aligned} \] where $\ykm-\ykmm = \PTR{\xsol}(\ykm-\ykmm) + o( \norm{\ykm-\ykmm} )$ from Lemma \ref{lem:proj-M} is applied. From \eqref{eq:relations}, we have $o(\norm{\ykm-\ykmm}) = o(\norm{\zkm-\zkmm})$ and $o(\norm{\wkm-\wkmm}) = o(\norm{\zkm-\zkmm})$, then applying Lemma \ref{lem:lin-generalised-ppa} yields, \beq\label{eq:xkzk-admm} \begin{aligned} A_{R} (\xk-\xkm) &= M_{\barR} (\wk - \wkm) + o(\norm{\wk-\wkm}) \\ &= - \beta M_{\barR} \pa{\zkm-\zkmm} + 2 M_{\barR} B_{J} \pa{\ykm-\ykmm} + o(\norm{ \zkm-\zkmm } ) \\ &= - \beta M_{\barR} \pa{\zkm-\zkmm} + 2 \beta M_{\barR} M_{\barJ} (\zkm - \zkmm) + o(\norm{ \zkm-\zkmm } ) . \end{aligned} \eeq Finally, from \eqref{eq:admm2}, \eqref{eq:ukp-usol-admm} and \eqref{eq:xkzk-admm}, we have that \[ \begin{aligned} \zk - \zkm &= \Pa{ \zkm + \gamma\pa{A\xk + B\ykm - b} } - \Pa{ \zkmm + \gamma\pa{A\xkm + B\ykmm - b} } \\ &= (\zkm-\zkmm) + \gamma A(\xk-\xkm) + \gamma B (\ykm-\ykmm) \\ &= (\zkm-\zkmm) + \gamma A_{R}(\xk-\xkm) + \gamma B_J (\ykm-\ykmm) + o(\norm{ \zkm-\zkmm } ) \\ &= (\zkm-\zkmm) - M_{\barR} \pa{\zkm-\zkmm} + 2 M_{\barR} M_{\barJ} (\zkm-\zkmm) + M_{\barJ} (\zkm-\zkmm) + o(\norm{\zkm-\zkmm} ) \\ &= \Pa{ \Id + 2M_{\barR}M_{\barJ} - M_{\barR} - M_{\barJ} } (\zkm-\zkmm) + o(\norm{ \zkm-\zkmm } ) , \end{aligned} \] which is the desired linearization of ADMM. \paragraph{3. Spectral properties of $\mADMM$} Consider first the case where both $R, J$ are general partly smooth functions, under which we can shown the non-expansiveness of $\mADMM$. For $M_{\barR}$, since $A$ is injective, so is $A_{R}$, then $A_{R}^TA_{R}$ is {symmetric positive definite}. Therefore, we have the following similarity result for $M_{\barR}$, \beq\label{eq:BarU-sim} \begin{aligned} M_{\barR} &= A_{R} \bPa{ (A_{R}^T A_{R})^{-\frac{1}{2}} \Pa{\Id + (A_{R}^T A_{R})^{-\frac{1}{2}} {H_{\barR}} (A_{R}^T A_{R})^{-\frac{1}{2}} } (A_{R}^T A_{R})^{\frac{1}{2}} }^{-1} (A_{R}^T A_{R})^{-1}A_{R}^T \\ &= A_{R} (A_{R}^T A_{R})^{-\frac{1}{2}} \Pa{\Id + (A_{R}^T A_{R})^{-\frac{1}{2}} {H_{\barR}} (A_{R}^T A_{R})^{-\frac{1}{2}} }^{-1} (A_{R}^T A_{R})^{\frac{1}{2}} (A_{R}^T A_{R})^{-1}A_{R}^T \\ &= A_{R} (A_{R}^T A_{R})^{-\frac{1}{2}} \Pa{\Id + (A_{R}^T A_{R})^{-\frac{1}{2}} {H_{\barR}} (A_{R}^T A_{R})^{-\frac{1}{2}} }^{-1} (A_{R}^T A_{R})^{-\frac{1}{2}} A_{R}^T . \end{aligned} \eeq Since $(A_{R}^T A_{R})^{-\frac{1}{2}} {H_{\barR}} (A_{R}^T A_{R})^{-\frac{1}{2}}$ is symmetric positive definite, hence maximal monotone, then the matrix $$\pa{\Id + (A_{R}^T A_{R})^{-\frac{1}{2}} {H_{\barR}} (A_{R}^T A_{R})^{-\frac{1}{2}} }^{-1}$$ is firmly non-expansive. Let $A_{R} = USV^T$ be the SVD of $A_R$, then we have \[ \begin{aligned} \norm{A_{R} (A_{R}^T A_{R})^{-\frac{1}{2}}} = \norm{USV^T (VSU^T USV^T)^{-\frac{1}{2}}} = \norm{USV^T (VS^2V^T)^{-\frac{1}{2}}} = \norm{USV^T VS^{-1} V^T} = 1 . \end{aligned} \] Then owing to \cite[Example 4.14]{bauschke2011convex}, $M_{\barR}$ is firmly non-expansive. Similarly, $M_{\barJ}$ is firmly non-expansive, and so is $\mADMM$ \cite[Proposition 4.31]{bauschke2011convex}. Therefore, the power $\mADMM^k$ is convergent. Now suppose that both $R, J$ are locally polyhedral around $(\xsol, \ysol)$, then $M_{\barR}$ and $M_{\barJ}$ become \[ M_{\barR} = A_{R} (A_{R}^T A_{R})^{-1} A_{R}^T \qandq M_{\barJ} = B_{J} (B_{J}^TB_{J})^{-1} B_{J}^T , \] which are projection operators onto the ranges of $A_R$ and $B_J$, respectively. Denote these two subspaces by $T_{A_R}$ and $T_{B_J}$, and correspondingly $\proj_{T_{A_R}} \eqdef A_{R} (A_{R}^T A_{R})^{-1} A_{R}^T$ and $\proj_{T_{B_J}} \eqdef B_{J} (B_{J}^TB_{J})^{-1} B_{J}^T$. Then \[ \mADMM = \proj_{T_{A_R}} \proj_{T_{B_J}} + (\Id - \proj_{T_{A_R}})(\Id - \proj_{T_{B_J}}) . \] Denote the dimension of $T_{A_R}, T_{B_J}$ by $\dim(T_{A_R}) = p, \dim(T_{B_J}) = q$, and the dimension of the intersection $\dim(T_{A_R} \cap T_{B_J}) = d$. Without the loss of generality, we assume that $1 \leq p \leq q \leq n$. Consequently, there are $r=p-d$ principal angles $(\zeta_i)_{i=1,...,r}$ between $T_{A_R}$ and $T_{B_J}$ that are strictly greater than $0$ and smaller than $\pi/2$. Suppose that $\zeta_1\leq \dotsm \leq \zeta_r$. Define the following two diagonal matrices \[ C = \diag\Pa{ \cos(\zeta_1), \dotsm, \cos(\zeta_r) } \qandq S = \diag\Pa{ \sin(\zeta_1), \dotsm, \sin(\zeta_r) } . \] Owing to \cite{bauschke2014rate,demanet2016eventual}, there exists a real orthogonal matrix $U$ such that \[ \mADMM = U \left[ \begin{array}{cc|cc} C^2 & CS & 0 & 0\\ - CS & C^2 & 0 & 0\\ \hline 0 & 0 & 0_{q-p+2d} & 0\\ 0 & 0 & 0 & \Id_{n-p-q} \end{array} \right] U^T , \] which indicates $\mADMM$ is normal and all its eigenvalues are inside unit disc. Let $\mADMMinf = \lim_{k\to+\infty}\mADMM^k$ and $\tmADMM = \mADMM - \mADMMinf$, then we have \beq\label{eq:tmADMM} \tmADMM = U \left[ \begin{array}{cc|c} C^2 & CS & 0 \\ - CS & C^2 & 0 \\ \hline 0 & 0 & 0_{n-2r} \end{array} \right] U^T . \eeq \paragraph{4. Trajectory of ADMM} Owing to the polyhedrality of $R$ and $J$, all the small $o$-terms in the linearization proof vanish and we get directly \beq\label{eq:zkp-zk-poly} \zk - \zkm = \mADMM (\zkm - \zkmm) = \mADMM^k (z_{0} - z_{-1}) . \eeq As $\vk \eqdef \zk-\zkm \to 0$, passing to the limit we get from above \[ 0 = \lim_{k\to+\infty} \mADMM^k v_{0} = \mADMMinf v_{0} , \] which means $v_{0} \in \ker(\mADMM)$ where $\ker(\mADMM)$ denotes the kernel of $\mADMM$. Since $\mADMMinf \mADMM^k = \mADMMinf$, we have $\vk \in \ker(\mADMM)$ holds for any $k\in\bbN$. Then from \eqref{eq:zkp-zk-poly} we have \[ \vk = (\mADMM - \mADMMinf) \vk = \tmADMM \vkm . \] The block diagonal property of \eqref{eq:tmADMM} indicates that there exists an elementary transformation matrix $E$ such that \[ \tmADMM = U E \begin{bmatrix} B_{1} & & &\\ & \ddots & & \\ & & B_{r} &\\ & & & 0_{n-2r}\\ \end{bmatrix} E U^T , \] where for each $i=1,...,r$, we have \[ B_i = \cos(\zeta_i) \begin{bmatrix} \cos(\zeta_i) & \sin(\zeta_i) \\ - \sin(\zeta_i) & \cos(\zeta_i) \end{bmatrix} \] which is rotation matrix scaled by $\cos(\zeta_i)$. It is easy to show that, for each $i=1,...,d$, there holds \[ \lim_{k\to\pinf} B_i^k = 0 , \] since the spectral radius of $B_i$ is $\rho(B_i) = \cos(\zeta_i) < 1$. \vgap Suppose for some $1\leq e < r$, we have \[ \zeta = \zeta_1 = \dotsm = \zeta_e < \zeta_{e+1} \leq \dotsm \leq \zeta_{r} . \] Consider the following decompositions \[ \Gamma_1 = \begin{bmatrix} B_{1} & & &\\ & \ddots & & \\ & & B_{e} &\\ & & & 0_{n-2e} \end{bmatrix} \qandq \Gamma_2 = \begin{bmatrix} B_{1} & & &\\ & \ddots & & \\ & & B_{r} &\\ & & & 0_{n-2r}\\ \end{bmatrix} - \Gamma_1 . \] Denote $\eta = \frac{\cos(\zeta_{e+1})}{\cos(\zeta)}$, it is immediate to see that $\frac{1}{\cos^k(\zeta)} \Gamma_2^k = O( \eta^k ) \to 0$, and for each $i=1,...,e$ \[ \sfrac{1}{\cos(\zeta)} B_i = \begin{bmatrix} \cos(\zeta) & \sin(\zeta) \\ - \sin(\zeta) & \cos(\zeta) \end{bmatrix} \] which is a circular rotation. Therefore, $\frac{1}{\cos(\zeta)} \Gamma_1$ is a rotation with respect to the first $2e$ elements. Denote $\uk = E U^T\vk$, then from $\vk = \tM \vkm = U E (\Gamma_1 + \Gamma_2) E U^T \vk$, we get \[ \uk = (\Gamma_1 + \Gamma_2) \uk = (\Gamma_1 + \Gamma_2)^k u_0 = \Gamma_1^k u_0 + \Gamma_2^k u_0 , \] which is an orthogonal decomposition of $\uk$. Define \[ s_k = \tfrac{1}{\cos^k(\zeta)} \Gamma_1^k u_1 \qandq t_k = \tfrac{1}{\cos^k(\zeta)} \Gamma_2^k u_1 , \] then we have that $\norm{s_{k}} = \norm{s_{k-1}}$ and $\iprod{s_{k}}{s_{k-1}} = \cos(\zeta) \norm{s_k}^2 $, and $t_k = O(\eta^k)$. As a result, for $\cos(\theta_k)$ we have \beq\label{eq:cos-thetak-i} \begin{aligned} \cos(\theta_{k}) = \sfrac{ \iprod{\vk}{\vkm} }{ \norm{\vk} \norm{\vkm} } = \sfrac{ \iprod{\uk}{\ukm} }{ \norm{\uk} \norm{\ukm} } &= \sfrac{\iprod{ s_{k} + t_{k} }{ s_{k-1} + t_{k-1} }}{\norm{ s_{k} + t_{k} }\norm{ s_{k-1} + t_{k-1} }} \\ &= \sfrac{\iprod{ s_{k} }{ s_{k-1} }}{\norm{ s_{k} + t_{k} }\norm{ s_{k-1} + t_{k-1} }} + \sfrac{\iprod{ t_{k} }{ t_{k-1} }}{\norm{ s_{k} + t_{k} }\norm{ s_{k-1} + t_{k-1} }} \\ &= \sfrac{ \norm{s_k}^2\cos(\zeta) }{\norm{ s_k }^2 + \norm{t_k }^2} \cdot \sfrac{\norm{s_k + t_k}}{\norm{ s_{k-1} + t_{k-1} }} + O(\eta^{2k-1}) . \end{aligned} \eeq Using the fact that \[ \sfrac{ \norm{s_k}^2 \cos(\zeta) }{\norm{ s_k }^2 + \norm{t_k }^2} = \cos(\zeta) \Pa{1 - \norm{t_k }^2 + O(\norm{t_k }^4) } = \cos(\zeta) + O(\eta^{2k}) \qandq \sfrac{\norm{s_k+t_k}}{\norm{ s_{k-1} + t_{k-1} }} \to 1 \] we conclude that $\cos(\theta_{k}) \to \cos(\zeta)$. As a matter of fact, we have $\cos(\theta_{k}) - \cos(\zeta) = O(\eta^{2k})$ which shows how fast $\cos(\theta_k)$ converges to $\cos(\zeta)$. \qedhere \end{proof} \subsection{Trajectory of ADMM: $R$ or/and $J$ is smooth} Now we consider the case that at least one function out of $R, J$ is smooth. For simplicity, consider that $R$ is smooth and $J$ remains non-smooth. Assume that $R$ is locally $C^2$-smooth around $\xsol$, the Hessian of $R$ at $\xsol$ reads $\nabla^2 R(\xsol)$ which is positive semi-definite owing to convexity. Define $M_R \eqdef A \Pa{ \Id+ \tfrac{1}{\gamma} (A^TA)^{-1} \nabla^2 R(\xsol) }^{-1} (A^TA)^{-1} A^{T} $, and redefine \beq\label{eq:mtx-dr-Rc2} \mADMM \eqdef \sfrac12\Id + \sfrac12\pa{2M_R-\Id}\pa{2 \MJ - \Id} . \eeq \begin{proof}[{Proof of Proposition \ref{prop:trajectory-admm-real}}] We prove the corollary in two steps. \paragraph{1. Linearization of ADMM} Following the above proof, we have for $\yk$ that \[ B_J (\yk-\ykm) = \beta M_{\barJ} (\zk - \zkm) + o(\norm{\zk-\zkm}) . \] From \eqref{eq:admm2}, for $\xkp$ and $\xk$, since $R$ is globally smooth differentiable \[ - A^T\Pa{ A\xk - \beta \pa{ \zkm - 2\psikm } } \in \beta \nabla R(\xk) \qandq - A^T\Pa{ A\xkm - \beta \pa{ \zkmm - 2\psikmm } } \in \beta \nabla R(\xkm) , \] which leads to, applying the local $C^2$-smoothness of $R$ around $\xsol$ \[ \begin{aligned} &- A^T\Pa{ A\xk - \beta \pa{ \zkm - 2\psikm } } + A^T\Pa{ A\xkm - \beta \pa{ \zkmm - 2\psikmm } } \\ &= \beta \nabla R(\xk) - \beta \nabla R(\xkm) \\ &= \beta \nabla^2 R(\xkm) (\xk-\xkm) + o(\norm{\xk-\xkm}) \\ &= \beta \nabla^2 R(\xsol) (\xk-\xkm) + \beta \Pa{ \nabla^2 R(\xkm) - \nabla^2 R(\xsol) } (\xk-\xkm) + o(\norm{\xk-\xkm}) \\ &= \beta \nabla^2 R(\xsol) (\xk-\xkm) + o(\norm{\zkm-\zkmm}) . \end{aligned} \] Using the fact that $A^TA$ is invertible and rearranging terms, we arrive at \[ \begin{aligned} & \Pa{ \Id + \beta (A^TA)^{-1} \nabla^2 R(\xsol) } (\xk-\xkm) + o(\norm{\zkm-\zkmm}) \\ &= \beta (A^TA)^{-1} A^T \pa{ \zkm - \zkmm } - 2 \beta (A^TA)^{-1} A^T \pa{ \psikm - \psikmm } + o(\norm{\zkm - \zkmm}) \\ &= - \beta (A^TA)^{-1} A^T \pa{ \zkm - \zkmm } + 2 (A^TA)^{-1} A^T B_{J} \pa{ \ykm - \ykmm } + o(\norm{\zkm - \zkmm}) , \end{aligned} \] which further leads to, denote $M_{R} = A \pa{ \Id + (A^T A)^{-1} H_{R} }^{-1} (A^T A)^{-1} A^T$ \[ \begin{aligned} A (\xk-\xkm) &= - \beta M_{R} \pa{ \zkm - \zkmm } + 2 M_{R} B_{J} \pa{ \ykm - \ykmm } + o(\norm{\zkm - \zkmm}) \\ &= - \beta M_{R} \pa{\zkm - \zkmm} + 2 \beta M_{R} M_{\barJ} (\zkm - \zkmm) + o(\norm{ \zkm - \zkmm } ) . \end{aligned} \] Finally, from \eqref{eq:admm2}, we have that \[ \begin{aligned} \zk - \zkm &= \Pa{ \Id + 2M_{R}M_{\barJ} - M_{R} - M_{\barJ} } (\zkm - \zkmm) + o(\norm{ \zkm - \zkmm } ) . \end{aligned} \] \paragraph{2. Trajectory of ADMM} Since $A$ is full rank square matrix and hence invertible, from \eqref{eq:BarU-sim} we have \[ \begin{aligned} M_{R} &= A \pa{ \Id + \tfrac{1}{\gamma} (A^T A)^{-1} \nabla^2 R(\xsol) }^{-1} (A^T A)^{-1} A^T \\ &= A (A^T A)^{-\frac{1}{2}} \bPa{\Id + \tfrac{1}{\gamma} (A^T A)^{-\frac{1}{2}} {\nabla^2 R(\xsol)} (A^T A)^{-\frac{1}{2}} }^{-1} (A^T A)^{-\frac{1}{2}} A^T \\ &\sim \bPa{\Id + \tfrac{1}{\gamma} (A^T A)^{-\frac{1}{2}} {\nabla^2 R(\xsol)} (A^T A)^{-\frac{1}{2}} }^{-1} , \end{aligned} \] where $\Pa{\Id + \tfrac{1}{\gamma} (A^T A)^{-\frac{1}{2}} {\nabla^2 R(\xsol)} (A^T A)^{-\frac{1}{2}} }^{-1}$ is symmetric positive definite. If we choose $\gamma$ such that $$\tfrac{1}{\gamma} \norm{(A^T A)^{-\frac{1}{2}} {\nabla^2 R(\xsol)} (A^T A)^{-\frac{1}{2}}} < 1, $$ then all the eigenvalues of $M_R$ are in $]1/2, 1]$, hence $W_R \eqdef 2 M_R - \Id$ is symmetric positive definite. Therefore, we get \[ \begin{aligned} \sfrac{1}{2}\Id + \sfrac{1}{2} W_R \Pa{2\MJ - \Id} &= W_R^{1/2} \bPa{ \sfrac{1}{2}\Id + \sfrac{1}{2} W_R^{1/2} \Pa{2\MJ - \Id} W_R^{1/2} } W_R^{-1/2} \\ &\sim \sfrac{1}{2}\Id + \sfrac{1}{2} W_R^{1/2} \Pa{2\MJ - \Id} W_R^{1/2} , \end{aligned} \] and $\bmADMM \eqdef \frac{1}{2}\Id + \frac{1}{2} W_R^{1/2} \pa{2\MJ - \Id} W_R^{1/2}$ is symmetric positive semi-definite with all eigenvalues in $[0,1]$. Hence, by similarity, the eigenvalues of $M$ are all real and contained in $[0,1]$.\qedhere \end{proof} \section{Adaptive acceleration for ADMM} \label{sec:proof_a3dmm} \subsection{Convergence of A$\!^3$DMM} \begin{proof}[Proof of Proposition \ref{prop:convergence-lp}] From \eqref{eq:perturbation-km}, we have that \[ \zk = \calF(\zkm + \varepsilon_{k-1}) = \calF(\zkm) + \Pa{ \calF(\zkm + \varepsilon_{k-1}) - \calF(\zkm) } . \] Given any $\zsol \in \fix(\calF)$, since $\calF$ is firmly non-expansive, hence non-expansive, we have \[ \norm{\zk - \zsol} \leq \norm{ \calF(\zkm) - \calF(\zsol)} + \norm{ \calF(\zkm + \varepsilon_k) - \calF(\zkm) } \leq \norm{\zkm - \zsol} + \norm{ \varepsilon_{k-1} } , \] which means that $\seq{\zk}$ is quasi-Fej\'er monotone with respect to $\fix(\calF)$. Then invoke \cite[Proposition 5.34]{bauschke2011convex} we obtain the convergence of the sequence $\seq{\zk}$. \qedhere \end{proof} \subsection{Acceleration guarantee of A$\!^3$DMM} Recall the definition of $V_{k-1}, c_k, C_k$ and $\zbar_{k,s}$ in the beginning of the section. By definition, \begin{equation}\label{eq:linear_rel} V_k = M V_{k-1} . \end{equation} Define $E_{k,j} \eqdef V_k C_k^j - V_{k+1}$ for $j\geq 1$ and \begin{equation}\label{eq:e0} E_{k,0}\eqdef V_{k-1} C_k - V_{k} = \begin{bmatrix} (V_{k-1} c_k - v_{k}) & 0 & \cdots & 0 \end{bmatrix}. \end{equation} We obtain the relation between the extrapolated point $\zbar_{k,s}$ and the $(k+s)$'th point of $\seq{\zk}$ $$ \zbar_{k,s} = z_{k} + \msum_{j=1}^s \pa{v_{j+k} + (E_{k,j})_{(:,1)}} = z_{k+s} + \msum_{j=1}^s (E_{k,j})_{(:,1)} $$ In the following, given a matrix $M$, we let $\rho(M)$ denote the spectral radius of $M$ and $\lambda(M)$ denote its spectrum. \begin{proof}[Proof of Proposition \ref{prop:extrap-error}] We first prove $(i)$ that the extrapolation error is controlled by the coefficients fitting error. Since $k\in \NN$ is fixed, for ease of notation, we also write $E_\ell = E_{k,\ell}$ and $C=C_k$. We first show that for $\ell \in \NN$, we have \begin{equation}\label{eq:En} E_\ell = \msum_{j=1}^\ell M^j E_0 C^{\ell-j}. \end{equation} We prove this by induction. Note that \begin{align*} V_{k} C &\overset{\eqref{eq:linear_rel}}{=}\pa{M V_{k-1}} C \overset{\eqref{eq:e0}}{=} M V_k + M E_0 \overset{\eqref{eq:linear_rel}}{=} V_{k+1} + M E_0. \end{align*} Therefore, $E_1 = M E_0 $ as required. Assume that \eqref{eq:En} is true up to $\ell=m$. Then, \begin{align*} V_k C^{m+1} \overset{\eqref{eq:linear_rel}}{=}\pa{M V_{k-1} } C^{m+1} &\overset{\eqref{eq:e0}}{=} M V_k C^{m} + M E_0C^{m}= M \pa{V_{m+k} + E_{m}} + M E_0C^{m} \\ &\overset{\eqref{eq:linear_rel}}{=} V_{m+2} + M E_{m} + M E_0C^{m} \end{align*} So, plugging in our assumption on $E_m$, we have \begin{align*} E_{m+1} &= M E_{m} + M E_0C^{m} = M E_0C^{m} + M \Pa{ \msum_{j=1}^m M^j E_0 C^{m-j} } = \msum_{j=1}^{m+1} M^{j} E_0 C^{m+1-j}. \end{align*} To bound the extrapolation error, \begin{align*} \msum_{m=1}^s E_m &= \msum_{m=1}^s\pa{ \msum_{j=1}^m M^j E_0 C^{m-j} } = \msum_{\ell=0}^{s-1} \Pa{\msum_{j=1}^{s-\ell} M^j} E_0 C^\ell = \msum_{\ell=1}^{s} M^\ell E_0 \Pa{\msum_{i=0}^{s-\ell} C^i} \end{align*} Therefore, \begin{align*} &\norm{\zbar_{k,s} - \zsol} \leq \norm{z_{k+s} - \zsol} + \msum_{\ell=1}^s \norm{M^\ell} \norm{E_0} \norm{ \msum_{i=0}^{s-\ell} C^i_{(1,1)}}. \end{align*} In the case of $s=+\infty$, we have \begin{align*} &\norm{\zbar_{k,\infty} - \zsol} \leq \msum_{\ell=1}^\infty \norm{M^\ell} \norm{E_0 (\Id - C)^{-1}_{(:,1)}} = \sfrac{\norm{E_0}}{1-\ssum_i c_i}\msum_{\ell=1}^\infty \norm{M^\ell} . \end{align*} The fact that $B_s$ is uniformly bounded in $s$ if $\rho(M)<1$ and $\rho(C)<1$ follows because this implies that $\sum_{\ell=1}^\infty \norm{M^\ell}<\infty$ thanks to the Gelfand formula, and $\sum_{i=0}^\infty C^i = (\Id - C)^{-1}$ and its $(1,1)^{th}$ entry is precisely $\frac{1}{1-\sum_i c_i}$. Since $k\in \NN$ is fixed, for ease of notation, we also write $E_\ell = E_{k,\ell}$ and $C=C_k$. We first show that for $\ell \in \NN$, we have \begin{equation}\label{eq:En} E_\ell = \msum_{j=1}^\ell M^j E_0 C^{\ell-j}. \end{equation} We prove this by induction. Note that \begin{align*} V_{k} C &\overset{\eqref{eq:linear_rel}}{=}\pa{M V_{k-1}} C \overset{\eqref{eq:e0}}{=} M V_k + M E_0 \overset{\eqref{eq:linear_rel}}{=} V_{k+1} + M E_0. \end{align*} Therefore, $E_1 = M E_0 $ as required. Assume that \eqref{eq:En} is true up to $\ell=m$. Then, \begin{align*} V_k C^{m+1} &\overset{\eqref{eq:linear_rel}}{=}\pa{M V_{k-1} } C^{m+1} \\ &\overset{\eqref{eq:e0}}{=} M V_k C^{m} + M E_0C^{m}= M \pa{V_{m+k} + E_{m}} + M E_0C^{m} \\ &\overset{\eqref{eq:linear_rel}}{=} V_{m+2} + M E_{m} + M E_0C^{m} . \end{align*} So, plugging in our assumption on $E_m$, we have \begin{align*} E_{m+1} &= M E_{m} + M E_0C^{m} = M E_0C^{m} + M \Pa{ \msum_{j=1}^m M^j E_0 C^{m-j} } = \msum_{j=1}^{m+1} M^{j} E_0 C^{m+1-j}. \end{align*} To bound the extrapolation error, \begin{align*} \sum_{m=1}^s E_m &= \sum_{m=1}^s\Pa{ \msum_{j=1}^m M^j E_0 C^{m-j} } = \sum_{\ell=0}^{s-1} \Pa{\msum_{j=1}^{s-\ell} M^j} E_0 C^\ell = \sum_{\ell=1}^{s} M^\ell E_0 \Pa{\msum_{i=0}^{s-\ell} C^i} \end{align*} Therefore, \begin{align*} &\norm{\bar z_{k,s} - \zsol} \leq \norm{z_{k+s} - \zsol} + \msum_{\ell=1}^s \norm{M^\ell} \norm{E_0} \norm{ \msum_{i=0}^{s-\ell} C^i_{(1,1)}}. \end{align*} In the case of $s=+\infty$, we have \begin{align*} &\norm{\bar z_{k,\infty} - \zsol} \leq \sum_{\ell=1}^\infty \norm{M^\ell} \norm{E_0 (\Id - C)^{-1}_{(:,1)}} = \mfrac{\norm{E_0}}{1-\ssum_i c_i}\msum_{\ell=1}^\infty \norm{M^\ell} . \end{align*} The fact that $B_s$ is uniformly bounded in $s$ if $\rho(M)<1$ and $\rho(C)<1$ follows because this implies that $\sum_{\ell=1}^\infty \norm{M^\ell}<\infty$ thanks to the Gelfand formula, and $\sum_{i=0}^\infty C^i = (\Id - C)^{-1}$ and its $(1,1)^{th}$ entry is precisely $\frac{1}{1-\sum_i c_i}$. To control the coefficients fitting error $\epsilon_k$, we follow closely the arguments of \cite[Section 6.7]{sidi2017vector}, since this amounts to understanding the behaviour of the coefficients $c_k$, which are precisely the MPE coefficients. Recall our assumption that $M$ is diagonalisable, so $M = U^\top \Sigma U$ where $U$ is an orthogonal matrix and $\Sigma$ is a diagonal matrix with the eigenvalues of $M$ as its diagonal. Then, letting $u_k \eqdef U v_k$, \begin{align*} \epsilon_k &= \min_{c\in \RR^{q}} \norm{\msum_{i=1}^{q} c_i v_{k-i} - v_{k}}\\ &= \min_{c\in \RR^{q}} \norm{\msum_{i=1}^{q} c_i \Sigma^{k-i} u_0 - \Sigma^{k} u_0} = \min_{g\in\calP_q}\norm{ \Sigma^{k-q} g(\Sigma) u_0} \leq \norm{u_0} \min_{g\in \Pp_q}\max_{z\in \lambda(M)} \abs{z}^{k-q} \abs{g(z)} \end{align*} where $\calP_q$ is the set of monic polynomials of degree $q$ and $\lambda(M)$ is the spectrum of $M$. Choosing $g = \prod_{j=1}^{q} (z-\lambda_j)$, we have $g(\lambda_j) = 0$ for $j=1,\ldots,q$, so \begin{equation} \epsilon_k \leq \norm{u_0} \abs{\lambda_{q+1}}^{k-q} \max_{\ell>q}\prod_{j=1}^{q} \abs{\lambda_j-\lambda_\ell}. \end{equation} The claim that $\rho(C_k)<1$ holds since the eigenvalues of $C$ are precisely the roots of the polynomial $Q(z) = z^{k-1} - \sum_{i=1}^{k-1} c_j z^{k-1-i}$, and from \cite{sidi2017vector}, if $\abs{\lambda_{q}}>\abs{\lambda_{q+1}}$, then $Q$ has precisely $q$ roots $r_1,\ldots, r_q$ satisfying $r_j = \lambda_j + \Oo(\abs{\lambda_{q+1}/\lambda_j}^k)$. So, $\abs{r_j}<1$ for all $k$ sufficiently large. To prove the non-asymptotic bounds on $\epsilon_k$, first observe that $z_{k+1} - z_{k} = M(z_k - z_{k-1})$ implies $z_{k+1} - \zsol = M(z_k - z_{*})$ and $z_{k+1} - z_k = (M-\Id)(z_k - \zsol)$. So, letting $\gamma_i = -c_{k,i}/(1-\sum_i c_{k,i})$ for $i=1,\ldots, q$ and $\gamma_0 = 1/(1-\sum_i c_{k,i})$, we have \begin{equation}\label{eq:coefficient_vec} \mfrac{1}{1-\ssum_i c_{k,i}} \Pa{ v_{k} -\msum_{i=1}^{q} c_{k,i} v_{k-i} } = \msum_{i=0}^{q} \gamma_i v_{k-i} = (M-\Id) \msum_{i=0}^{q} \gamma_i( z_{k-i-1} - \zsol). \end{equation} Now, $y\eqdef \sum_{i=0}^{q} \gamma_i z_{k-i-1} $ is precisely the MPE update and norm bounds on this are presented in \cite{sidi2017vector}. For completeness, we reproduce their arguments here: Let $A\eqdef \Id - M$, by our assumption of $\lambda(M) \subset (-1,1)$, we have that $A$ is positive definite. Then, \begin{align*} \norm{A^{1/2}(y - \zsol)}^2 &= \dotp{A (y-\zsol)}{(y-\zsol)} \\ &= - \dotp{\ssum_{i=0}^{q} \gamma_i v_{k-i} }{(y-\zsol) + w} \end{align*} where $w = \sum_{j=1}^{q} a_j v_{k-j}$ with $a\in \RR^{q}$ being arbitrary, since by definition of $\gamma$, $\dotp{\sum_{i=0}^{q} \gamma_i v_{k-i}}{v_\ell}=0$ for all $\ell=k-q,\ldots, k-1$. We can write $$ w = \sum_{j=1}^{q} a_j (M-\Id)(z_{k-j-1}-\zsol) = \sum_{j=1}^{q} a_j (M-\Id)M^{k-j-1}(z_{0}-\zsol) = f(M) (z_0 - \zsol) $$ where $f(z) = z^{k-q-1} (z-1) \sum_{j=1}^{q} a_j z^{q-j}$, and we can write $$ y - \zsol = \sum_{i=0}^{q} \gamma_i M^{k-i-1} (z_0- \zsol) = g(M)(z_0-\zsol) $$ where $g(z) = z^{k-q-1}\sum_{i=0}^{q} \gamma_i z^{q-i}$. Therefore, $f(z) + g(z) = z^{k-1-q} h(z)$, where $h$ is a polynomial of degree $q$ such that $h(1) = 1$. Moreover, since the coefficients $a_j$ are arbitrary, $h$ can be considered as an arbitrary element of $\tilde \Pp_q$, the set of all polynomials of degree $q$ such that $h(1) = 1$. Therefore \begin{align*} \norm{A^{-1/2}(y - \zsol)}^2 &\leq \norm{A^{-1/2}(y - \zsol)} \min_{h\in \tilde \Pp_q}\norm{M^n h(M) (z_0 - \zsol)} \\ &\leq \norm{A^{-1/2}(y - \zsol)} \min_{h\in \tilde \Pp_q}\max_{t\in \lambda(M)}\abs{t^n h(t)} \norm{z_0 - \zsol} \end{align*} In particular, combining this with \eqref{eq:coefficient_vec}, we have $$ \mfrac{\epsilon_k}{\abs{1-\ssum_i c_{k,i}}}\leq \norm{z_0-\zsol} \norm{(\Id-M)^{1/2}} \rho(M)^n \min_{h\in \tilde \Pp_q}\max_{t\in \lambda(M)}\abs{ h(t)} $$ Finally, in our case where $\lambda(M) =[\alpha,\beta]$ with $1>\beta>\alpha >-1$, it is well known that $\min_{h\in \tilde \Pp_q}\max_{t\in \lambda(M)}\abs{ h(t)}$ has an explicit expression (see, for example, \cite{borwein2003monic} or \cite[Section 7.3.1]{sidi2017vector}): $$ \min_{h\in \tilde \Pp_q}\max_{z\in \lambda(M)} \abs{h(z)} \leq \max_{z\in \lambda(M)} \abs{h_*(z)}, $$ where $h_*(z) \eqdef \frac{T_q\pa{\frac{2z-\alpha-\beta}{\beta-\alpha}}}{T_q\pa{\frac{2-\alpha-\beta}{\beta-\alpha}}}$ where $T_q(x)$ is the $q^{th}$ Chebyshev polynomial and it is well known that \begin{equation} \min_{h\in \tilde \Pp_q}\max_{z\in [\alpha,\beta]} \abs{h(z)} \leq 2 \BPa{\sfrac{\sqrt{\eta}-1}{\sqrt{\eta}+1}}^q \end{equation} where $\eta = \frac{1-\alpha}{1-\beta}$. \qedhere \end{proof}
\section{Introduction} The gravitational phenomena can be interpreted as a manifestation of having a curved spacetime and this interpretation is possible thanks to the equivalence principle. The tremendous implication of this assumption is that the gravitational interaction is totally oblivious to the type of matter fields. However, still within the geometrical framework, the curvature is not the unique geometrical object to represent the affine properties of a manifold \cite{schrodinger1985space,Olmo:2011uz,Heisenberg:2018vsk,BeltranJimenez:2019tjy}. In fact, besides the curvature, the other two fundamental objects associated to the connection of a metric space are torsion and non-metricity. In standard General Relativity (GR) \`a la Einstein, both non-metricity and torsion vanish. If we embrace the geometrical character of gravity advocated by the equivalence principle, it is pertinent to explore in which equivalent manners gravity can be geometrized. An equivalent representation of GR arises if one considers a flat spacetime with a metric but asymmetric connection. In this teleparallel description gravity is entirely assigned to torsion. A third equivalent and simpler representation of GR can be constructed on an equally flat spacetime without torsion, in which gravity is this time ascribed to non-metricity. Hence, the same underlying physical theory, GR, can be described by the Einstein-Hilbert action $\int \sqrt{-g}R(g)$, the action of Teleparallel Equivalent of GR $\int \sqrt{-g}T$ \cite{Aldrovandi:2013wha} and Coincident GR $\int \sqrt{-g}Q$ \cite{BeltranJimenez:2017tkd} that rests on a symmetric teleparallel geometry \cite{Nester:1998mp}. The geometrical trinity of GR and its concise manifestation in detail can be found in \cite{BeltranJimenez:2019tjy}. The fundamental basis of these geometrical interpretations offers a promising road for modified gravity. The equivalent descriptions of GR with curvature, torsion and non-metricity represent different alternative starting points to modified gravity theories once the corresponding scalar quantities are for instance promoted to arbitrary functions thereof. Since modified gravity theories based on $f(R)$ \cite{Starobinsky:2007hu,Amendola:2010bk,Capozziello:2011et} and $f(T)$ \cite{Ferraro:2006jd,Ferraro:2011us,Hohmann:2019nat} are widely studied in the literature, we will focus on the less studied case of $f(Q)$ theories, which was introduced for the first time in \cite{BeltranJimenez:2017tkd}. Since at the cosmological background level, models based on $f(Q)$ are indistinguishable from $f(T)$ models, we will pay special attention to the study of perturbations and their distinctive properties in $f(Q)$ theories. Concerning perturbations on top of a FLRW (Friedmann-Lema{\^i}tre-Robertson-Walker) background, models based on $f(T)$ seem to suffer from strong coupling problems because some of the genuine physical degrees of freedom lose their kinetic term at the quadratic order and, consequently, the standard perturbation theory breaks down on these backgrounds \cite{Golovnev:2018wbh}. At this stage, the number and nature of new propagating degrees of freedom in $f(T)$ models on an arbitrary background is still under investigation in the literature, see \cite{Ferraro:2018axk,Ferraro:2018tpu} and related studies \cite{Koivisto:2018loq,Blixt:2018znp,Blixt:2019ene}. In this work, we will investigate whether models of modified gravity based on $f(Q)$ suffer from a similar strong coupling issue or whether it can be avoided for some interesting FLRW backgrounds relevant for dark energy and inflation. Besides the $f(Q)$ models \cite{BeltranJimenez:2017tkd}, a few other classes of modified or extended gravity theories have been considered within the same symmetric teleparallel framework\footnote{Other recent studies into torsion and non-metricity include e.g. \cite{Klemm:2018bil,Rasanen:2018ihz,Shimada:2018lnm,Krssak:2018ywd,Janssen:2018exh,Iosifidis:2018jwu,Penas:2018mnc,Iosifidis:2019jgi,Janssen:2019doc}.}. The so called Newer GR \cite{BeltranJimenez:2017tkd,BeltranJimenez:2018vdo,Hohmann:2018wxu,Soudi:2018dhv} is a five-parameter quadratic extension of the action $\int \sqrt{-g}Q$, which has been also considered in the language of differential forms \cite{Adak:2005cd,Adak:2008gd,Koivisto:2018aip} and extended to arbitrary derivative order by including, in the most general case, ten free functions of the d'Alembertian operator \cite{Conroy:2017yln}. Parity-odd quadratic terms were taken into account in an exhaustive analysis of scale-invariant metric-affine theories \cite{Iosifidis:2018zwo}. Without the restriction to quadratic terms, cosmological solutions based on Noether symmetries were derived for generic first derivative order non-metric actions \cite{Dialektopoulos:2019mtr}. J{\"a}rv {\it et al} introduced a non-minimal coupling of a scalar field to the $Q$-invariant \cite{Jarv:2018bgs}, which then R{\"u}nkla and Vilson generalised by coupling the scalar to the five Newer GR terms \cite{Runkla:2018xrv}. Nonminimal couplings to matter were also considered in extended $f(Q)$ models by Harko {\it et al} \cite{Harko:2018gxr,Lobo:2019xwp}. To probe the potential cosmological viability of these and other classes of models, it is natural to begin by uncovering the propagating degrees of freedom of the prototype $f(Q)$ models in the FLRW background. This paper is structured as follows. After reviewing the theory in Section \ref{theory}, we briefly look at the FLRW background equations in Section \ref{background}. The main analysis of the perturbations and the structure formation is found in Section \ref{perturbations}. To provide a better understanding and a more clear interpretation of the perturbations we discuss the gauge transformation properties of the $Q$-scalar in Section \ref{gauge}. Section \ref{conclusions} presents a concise summary of our findings and points out the direction for further research that needs to be carried in order to fully uncover the cosmological potential of $f(Q)$ gravity. \section{The Theory} \label{theory} We will use the so-called Palatini formalism where the metric and the connection are treated on equal footing so they are independent objects whose relation is only imposed by the field equations. In this framework, our spacetime manifold is endowed with a metric structure determined by the metric $g_{\mu\nu}$, while the affine connection $\Gamma^\alpha{}_{\mu\nu}$ provides the affine structure that stipulates how tensors are transported, thus defining the covariant derivative. In the class of theories under consideration in this work, the fundamental object is the non-metricity tensor defined as $Q_{\alpha\mu\nu}=\nabla_\alpha g_{\mu\nu}$. It manifests the failure of the connection in being metric compatible. From the non-metricity tensor $Q_{\alpha\mu\nu}$, we can derive the disformation \begin{equation} L^\alpha{}_{\mu\nu} = \frac{1}{2}Q^\alpha{}_{\mu\nu} - Q_{(\mu\nu)}{}^\alpha\,, \end{equation} that measures how far from the Levi-Civita connection the symmetric part of the full connection is. It will also be convenient to introduce the non-metricity conjugate defined as \begin{equation} P^\alpha{}_{\mu\nu} = -\frac{1}{2}L^\alpha{}_{\mu\nu} + \frac{1}{4}\left( Q^\alpha - \tilde{Q}^\alpha\right) g_{\mu\nu} - \frac{1}{4}\delta^\alpha_{(\mu}Q_{\nu)}\,, \end{equation} where the two independent traces $Q_\alpha=g^{\mu\nu}Q_{\alpha\mu\nu}$ and $\tilde{Q}_\alpha=g^{\mu\nu}Q_{\mu\alpha\nu}$ of the non-metricity tensor enter. Let us now introduce the non-metricity scalar that will play a central role in this work \begin{equation} Q = -Q_{\alpha\mu\nu}P^{\alpha\mu\nu}\,. \end{equation} One can then see why we call $P^{\alpha\mu\nu}$ the non-metricity conjugate because it satisfies \begin{equation} P^{\alpha\mu\nu}=-\frac12\frac{\partial Q}{\partial Q_{\alpha\mu\nu}}. \end{equation} We can then use the non-metricity scalar to write the action for the theories that we consider as \begin{equation} \label{action} {\mathcal S} = \int {\mathrm{d}}^4 x \sqrt{-g}\left[ {-}\frac{1}{2}f(Q) + {\mathcal L}_M\right]\,, \end{equation} where ${\mathcal L}_M$ stands for the matter Lagrangian. The motivation for the particular choice of the non-metricity scalar and the above action is that GR is reproduced (classically, up to a boundary term) for the choice $f=Q/8\pi G$ \cite{BeltranJimenez:2017tkd}, i.e., for this choice we recover the so-called Symmetric Teleparallel Equivalent of GR. Before proceeding any further, it will be convenient to clarify that the geometrical framework that we use has a flat and torsion-free connection so that it must correspond to a pure coordinate transformation from the trivial connection as explained in \cite{BeltranJimenez:2017tkd}. More explicitly, the connection can be parameterised with a set of functions $\xi^\alpha$ as\footnote{It must be understood in \eqref{Connectionxi} that $\xi^\alpha=\xi^\alpha(x^\mu)$ is an invertible relation and $\frac{\partial x^\alpha}{\partial \xi^\rho}$ is the inverse of the corresponding Jacobian.} \begin{equation} \Gamma^\alpha{}_{\mu\beta}=\frac{\partial x^\alpha}{\partial \xi^\rho}\partial_\mu\partial_\beta\xi^\rho\,. \label{Connectionxi} \end{equation} Therefore, it is always possible to make a coordinate choice so that the connection vanishes (more specifically, any coordinates affinely related to $\xi^\alpha=x^\alpha$.). We call these coordinates the coincident gauge and we will denote quantities evaluated in this gauge with a ring over the corresponding symbol so, by definition $\mathring{\Gamma}^\alpha{}_{\mu\nu}=0$. Thus, in the coincident gauge we will have \begin{equation} \mathring{Q}_{\alpha\mu\nu}=\partial_\alpha g_{\mu\nu}, \end{equation} while in an arbitrary gauge we have \begin{eqnarray} Q_{\alpha\mu\nu}&=&\partial_\alpha g_{\mu\nu}-2\Gamma^\lambda{}_{\alpha(\mu}g_{\nu)\lambda}\nonumber\\ &=&\mathring{Q}_{\alpha\mu\nu}-2\frac{\partial x^\lambda}{\partial \xi^\rho}\partial_\alpha\partial_{(\mu}\xi^\rho g_{\nu)\lambda}. \end{eqnarray} The metric field equations can be written as \begin{eqnarray} &&\frac{2}{\sqrt{-g}}\nabla_\alpha\left(\sqrt{-g}f_QP^\alpha{}_{\mu\nu}\right) + \frac{1}{2}g_{\mu\nu} f \nonumber\\ &&+ f_Q\left( P_{\mu\alpha\beta}Q_{\nu}{}^{\alpha\beta} -2Q_{\alpha\beta\mu}P^{\alpha\beta}{}_\nu\right) = T_{\mu\nu} \,,\label{efe} \end{eqnarray} where $f_{Q}=\partial f/\partial Q$. By raising one index this adopts an even slightly more compact form, \begin{equation} \frac{2}{\sqrt{-g}} \nabla_\alpha\left(\sqrt{-g}f_{Q}P^{\alpha\mu}{}_\nu\right) + \frac{1}{2}\delta^\mu_\nu f + f_{Q} P^{\mu\alpha\beta}Q_{\nu\alpha\beta} = T^{\mu}{}_{\nu} \,.\label{efe2} \end{equation} {The connection equation of motion can be straightforwardly computed by noticing that the variation of the connection with respect to $\xi^\alpha$ is equivalent to performing a diffeomorphism so that $\delta_\xi\Gamma^\alpha{}_{\mu\beta}=-\mathcal{L}_\xi \Gamma^\alpha{}_{\mu\beta}=-\nabla_\mu\nabla_\beta\xi^\alpha$, where we have used that the connection is flat and torsion-free.} Thus, in the absence of hypermomentum the connection field equations read \begin{equation} \nabla_\mu\nabla_\nu \left(\sqrt{-g} f_Q P^{\mu\nu}{}_\alpha\right) = 0\,. \label{cfe} \end{equation} From the metric and the connection equations one can verify that $\mathcal{D}_\mu T^\mu{}_\nu=0$, where $\mathcal{D}_\mu$ is the metric-covariant derivative \cite{BeltranJimenez:2018vdo}, as it should by virtue of diffeomorphism (Diff) invariance. In the most general case with a non-trivial hypermomentum, one would obtain a relation between the divergence of the energy-momentum tensor and the hypermomentum \cite{Harko:2018gxr}. \\ In order to clarify the conservation in the matter sector and the Bianchi identities, let us look at the gauge invariance of the theory. Under a Diff given by $x^\mu\rightarrow x^\mu+\zeta^\mu$, the non-metricity scalar changes as \begin{equation} \label{change} \delta_\zeta Q = \frac{\partial Q}{\partial g_{\mu\nu,\alpha}}\delta_\zeta g_{\mu\nu,\alpha} + \frac{\partial Q}{\partial g_{\mu\nu}}\delta_\zeta g_{\mu\nu} + \frac{\partial Q}{\partial \Gamma^\alpha{}_{\mu\nu}}\delta_\zeta \Gamma^\alpha{}_{\mu\nu}\,. \end{equation} {The first term is \begin{equation} \frac{\partial Q}{\partial g_{\mu\nu,\alpha}}\delta_\zeta g_{\mu\nu,\alpha} = 2P^{\alpha\mu\nu}\mathcal{L}_\zeta \mathring{Q}_{\alpha\mu\nu}\,, \end{equation} where \begin{align} {\mathcal L}_\zeta\mathring{Q}_{\alpha\mu\nu}=&\;\zeta^\rho\partial_\rho\partial_\alpha g_{\mu\nu}+\partial_\alpha\zeta^\rho \partial_\rho g_{\mu\nu}+2\partial_\alpha g_{\rho(\mu}\partial_{\nu)}\zeta^\rho\nonumber\\&+2g_{\rho(\mu}\partial_{\nu)}\partial_\alpha\zeta^\rho\,. \end{align} The last term in (\ref{change}) is \begin{eqnarray} &&\frac{\partial Q}{\partial \Gamma^\alpha{}_{\mu\nu}}\delta_\zeta \Gamma^\alpha{}_{\mu\nu} = \frac{\partial Q}{\partial Q_{\alpha\beta\gamma}}\frac{\partial Q_{\alpha\beta\gamma}}{\partial \Gamma^\kappa{}_{\mu\nu}}\mathcal{L}_\zeta \Gamma^\kappa{}_{\mu\nu} \nonumber\\ &&= -2P^{\alpha\beta\gamma}\left(-2\delta^\mu_\alpha \delta^\nu_{(\beta} g_{\gamma)\lambda}\right) (-\nabla_\mu\nabla_\nu\zeta^\lambda )\nonumber\\ &&= -4P^{\alpha\beta\gamma}g_{\lambda(\beta}\nabla_{\gamma)}\nabla_\alpha\zeta^\lambda\,, \end{eqnarray} It is possible to show that the non-metricity scalar varies under Diff as \begin{equation} \delta_\zeta Q = \frac{\partial Q}{\partial Q_{\alpha\mu\nu}}\mathcal{L}_\zeta Q_{\alpha\mu\nu} + \frac{\partial Q}{\partial g_{\mu\nu}}\mathcal{L}_\zeta g_{\mu\nu} = -{\mathcal L}_\zeta Q\,, \end{equation} and thus the action (\ref{action}) is Diff-invariant. However, when fixed to the coincident gauge, the action no longer remains generally Diff-invariant. One obtains \begin{eqnarray} \delta_\zeta \mathring{{\mathcal S}} &=& -2\int {{\rm d}}^4 x\zeta^\lambda\Big[ \sqrt{-g}\left(\partial_\alpha\partial_\gamma f_Q\right) \mathring{P}^{\alpha\gamma}{}_\lambda \nonumber \\ & + & 2\left(\partial_{(\alpha}f_Q\right)\left( \partial_{\gamma)}\sqrt{-g}\mathring{P}^{\alpha\gamma}{}_\lambda\right)\Big]\,. \end{eqnarray} We have dropped a total derivative and used the identity \begin{equation} \partial_\alpha \partial_\mu (\sqrt{-g}\mathring{P}^{\alpha\mu}{}_\nu)=0\,. \end{equation} Thus, only when $f_{QQ}=0$, the action is in general Diff invariant. However, for a generic $f$ there appears a term which vanishes on-shell as the result of the non-trivial extra set of equations (\ref{cfe}).} \section{Cosmological background evolution} \label{background} As we mentioned above, at the cosmological background level our model based on \eqref{action} does not differ from the $f(T)$ models. It also shares similar cosmological solutions as the vector distortion parametrisation \cite{Jimenez:2015fva,Jimenez:2016opp}. The background evolution and the different self-accelerating solutions were briefly discussed in \cite{BeltranJimenez:2017tkd}. We shall only quickly review the background equations of motion and their defining properties. {We will consider the FLRW metric \begin{equation} \label{flrw} {{\rm d}} s^2=-N^2(t){{\rm d}} t^2+a^2(t){{\rm d}}\vec{x}^2\,, \end{equation} where $N(t)$ and $a(t)$ are the lapse function and the scale factor, respectively. From now on and unless otherwise stated, we will fix the coincident gauge so the connection is trivial. The non-metricity scalar is then $Q=6\frac{H^2}{N^2}$. Since we have used diffeomorphisms to fix the coincident gauge, one could think that we are not allowed to select any particular lapse function. However, the special case of $f(Q)$ theories does allow so because $Q$ retains a residual time-reparameterisation invariance, as already explained in \cite{BeltranJimenez:2017tkd} so we will use this symmetry to set $N=1$.} The cosmological equations of motion are given by \begin{eqnarray}\label{BGeqsfQ} 6f_QH^2-\frac12f&=&\rho \label{eqFrid}, \nonumber\\ \big(12H^2f_{QQ}+f_Q\big)\dot{H}&=&-\frac{1}{2}(\rho+p)\,. \end{eqnarray} The standard matter fields satisfy the continuity equation $\dot{\rho}=-3H(\rho+p)$, that is consistent with the above cosmological equations thanks to the time-reparameterisation invariance aforementioned. These equations are formally the same as those of the $f(T)$ theories so we refer to \cite{Hohmann:2017jao} for an extensive analysis of the background cosmology based on those equations. We will content ourselves with discussing some interesting features of the background cosmology for these theories. There is a particularly interesting class of theories that give a background evolution identical to that of General Relativity. Such a class of models can be easily obtained by imposing $Qf_Q-\frac12f=\frac{Q}{16\pi G}$ whose solution is \begin{equation} f=\frac{1}{8\pi G}\Big(Q+M\sqrt{Q}\Big) \end{equation} with $M$ some mass scale. Of course, $M=0$ corresponds to the GR equivalent, but it is remarkable that there exists a whole class of theories whose background cosmology is the same as in GR for any matter content. The different values of $M$ could only be discriminated by analysing the evolution of the perturbations and this property by itself makes this particular choice of $f(Q)$ an interesting study case since the evolution of the perturbations can be modified while maintaining the background oblivious to such modifications. On the other hand, the STEGR supplemented with a general power-law term, i.e. \begin{equation} f=\frac{1}{8\pi G}\left[Q-6\lambda M^2\left(\frac{Q}{6M^2}\right)^\alpha\right] \end{equation} with $\lambda$ and $\alpha$ dimensionless parameters, gives rise to branches of solutions applicable either to early universe cosmology or to dark energy depending on the value of $\alpha$. For these models, the Friedmann equation modifies into \begin{equation} H^2\left[1+(1-2\alpha)\lambda\left(\frac{H^2}{M^2}\right)^{\alpha-1}\right]=\frac{8\pi G}{3}\rho\,. \end{equation} Again, for $\alpha=1/2$ we recover the aforementioned class of theories with the same background evolution as GR, while $\alpha=1$ is of course degenerate with the STEGR and can be fully absorbed into $G$. It is then apparent from the above modified Friedmann equation that the corrections to the usual GR evolution will appear at low curvatures for $\alpha<1$, while for $\alpha>1$, the corrections will be relevant in the high curvatures regime. Thus, theories with $\alpha>1$ will be relevant for the early universe (with potential applications to inflationary solutions), whereas theories with $\alpha<1$ will give corrections to the late-time cosmology, where they can give rise to dark energy. We would like to bring the equations into an autonomous-like form. In order to do that we introduce the dimensionless variables \begin{equation} x_1=\frac{\rho_m}{Qf_Q}, \quad x_2=\frac{\rho_r}{Qf_Q} \quad \text{and} \quad x_3=\frac{f}{2Qf_Q}\,. \end{equation} We have assumed that the total energy density $\rho$ is comprised by a matter $\rho_m$ and a radiation $\rho_r$ component. In terms of the variables the dynamical system takes the form \begin{eqnarray} &&x_1'=x_1(\epsilon -3)+3x_1^2+4x_1x_2\nonumber\\ &&x_2'=x_2(\epsilon -4)+3x_1x_2+4x_2^2\nonumber\\ &&x_3'=\epsilon(x_3-1)+3x_1x_3+4x_2x_3\,, \end{eqnarray} where $\epsilon=-\dot{H}/H^2$ and prime denotes the derivative with respect to {$\log{a}$. The independent variables can be taken as $\{x_1,x_2,\epsilon\}$. The Friedmann equation \eqref{eqFrid} imposes the constraint equation} \begin{equation} x_1+x_2+x_3=1\,. \end{equation} One can easily solve the system for its critical points. We find the following three critical points of the dynamical system \begin{eqnarray} &&{\rm I}:\quad \; \left( x_1=0, \quad x_2=0, \quad x_3=1\right)\nonumber\\ &&{\rm II}: \;\;\left( x_1=1-\frac13\epsilon, \quad x_2=0, \quad x_3=\frac13\epsilon\right)\nonumber\\ &&{\rm III}: \left( x_1=0, \quad x_2=1-\frac14\epsilon, \quad x_3=\frac14\epsilon\right)\,. \end{eqnarray} We can include small perturbations and consider the following linearised system \begin{equation} \frac{d}{dt} \begin{pmatrix} \delta x_1\\ \delta x_2\\ \delta x_3 \end{pmatrix}=M\begin{pmatrix} \delta x_1\\ \delta x_2\\ \delta x_3 \end{pmatrix} \end{equation} with the matrix $M$ of the dynamical system given by $M=$ \begin{equation} \begin{pmatrix} 6x_1+4x_2+\epsilon-3 & 3x_2 & 3x_3 \\ 4x_1 & 3x_1+8x_2+\epsilon-4 & 4x_3 \\ 0 & 0 & 3x_1+4x_2+\epsilon \end{pmatrix}\,. \end{equation} The stability analysis of the critical points reveals that the first critical point $I$ is a stable attractor, the second one $II$ is a saddle point and the third one $III$ is an unstable repeller. In the following we will study two explicit examples with some interesting properties. \begin{figure*}[ht!] \centering \includegraphics[width=8.9cm]{H2example1.pdf} \includegraphics[width=8.9cm]{H2example2.pdf} \caption{In these figures we show the Hubble function $H^2$ as a function of $\rho$ for the two examples discussed in the main text. We have normalised to the Planck mass and fixed the parameters to $m=0.5M_{\rm Pl}$ in the left panel and $M=10^{-2}M_{\rm Pl}$ in the right panel.} \label{H2examples} \end{figure*} \textbf{Example 1: $8\pi Gf(Q)= Q-\frac{1}{36}(Q/m)^2$}\\ In this case, the Friedmann equation in \eqref{BGeqsfQ} simplifies to \begin{equation} 3H^2\left(1-\frac{H^2}{2m^2}\right)=8\pi G\rho \end{equation} which has two branches of cosmological solutions \begin{equation} H^2_\pm=m^2\left(1\pm\sqrt{1-\frac{16\pi G\rho}{3m^2}}\,\right)\,. \label{eqH2example1} \end{equation} The cosmological background evolution for this example is formally the same as the one obtained in \cite{Jimenez:2016opp} from a completely different framework based on a generalised Weyl geometry with vector distortion giving both non-metricity and torsion, first introduced in \cite{Jimenez:2015fva}. Thus, we will limit ourselves to summarise the main properties of these solutions and we will refer to \cite{Jimenez:2016opp} for a more detailed analysis. The most remarkable feature of this cosmology is the existence of a maximum allowed density in the universe given by $8\pi G\rho_{\rm max}=\frac32 m^2$, which is enforced by the square root in \eqref{eqH2example1}\footnote{The existence of a maximum energy density enforced by some square root structure is the main motivation behind the Born-Infeld-inspired theories of gravity (see \cite{BeltranJimenez:2017doy} and references therein).}. Below the maximum density, we have two branches: $H_-^2$ that approaches the usual GR evolution at low densities and $H_+^2$ that gives an approximate de Sitter universe with $H^2_{\rm dS}\simeq 2m^2$ regardless the value of $\rho$ (see left panel in Fig. \ref{H2examples}). \textbf{Example 2: $8\pi Gf(Q)=Q+M^4/Q$}\\ The Friedmann equation in this case becomes \begin{equation} H^2\left(1-\frac{M^4}{12H^4}\right)=8\pi G\rho \end{equation} that can be solved for $H^2$ as \begin{equation} H^2_\pm=\frac{4\pi G}{3}\rho\left(1\pm\sqrt{1+\frac{3M^4}{64\pi^2 G^2\rho^2}}\right). \end{equation} The negative branch is not physical because it gives $H^2_-<0$, so only the branch $H^2_+$ is physical. As in the previous example, this evolution was also obtained in the framework of generalised Weyl geometries in \cite{Jimenez:2016opp}. The physical branch $H_+^2$ recovers the usual GR Friedmann equation for $\rho\gg M^2 M_{\rm Pl}^2$, while at low densities the Hubble function approaches the constant $H_{\rm dS}^2=\frac{M^2}{2\sqrt{3}}$ corresponding to an asymptotically de Sitter solution, as shown in the right panel of Fig. \ref{H2examples}. This example can thus be relevant for dark energy applications since it allows for solutions that naturally give a transition from a matter dominated universe to an accelerating de Sitter universe. However, as we will show in our analysis of the perturbations in the subsequent sections, this asymptotically de Sitter solutions are prone to strong coupling problems in the scalar sector of the perturbations, thus casting doubts on its phenomenological viability. Since the $f(Q)$ theories share the background equations with the $f(T)$ theories, we will not investigate further the possible background cosmologies and we will now turn to the main focus of this paper, i.e., the evolution of the perturbations. Let us finish this brief discussion of the background cosmological evolution by advancing the existence of strong coupling problems at the perturbative level that may cast serious doubts on the viability of the background cosmologies. \section{Cosmological perturbations} \label{perturbations} For the sake of generality, we will study the evolution of the cosmological perturbations in the presence of a $K$-essence field so our action is \begin{equation} \mathcal{S}_M=\int {{\rm d}}^4x \sqrt{-g}\left(-\frac12 f(Q)+P(X)\right)\,, \end{equation} where $X=-\partial_\mu\chi\partial^\mu\chi$. The background Friedmann equations now read \begin{align} &f+P+12H^2f_Q-2P_X\dot{\bar{\chi}}^2=0\\ & P_X\dot{\bar{\chi}}^2+2\dot{H}\Big(f_Q-12H^2f_{QQ}\Big)=0\,. \end{align} On the other hand, the scalar field equation reads \begin{equation} \frac{{{\rm d}}}{{{\rm d}} t}\left(a^3P_X\,\dot{\bar{\chi}}\right)=0 \end{equation} Since the crucial difference to $f(T)$ theories will arise at the level of perturbations, we will investigate in detail the second order action of cosmological perturbations. For this purpose, we decompose the metric in terms of the irreducible representations of the background $SO(3)$ symmetry expressed in conformal time as follows \cite{Mukhanov:1990me} \begin{align}\label{perturbed_metric} \delta g_{00} &= -2a^2\,\,\phi\,,\nonumber\\ \delta g_{0i} &={\delta g_{i0} = \,a^2\,\left(\partial_i B+B_i\right)\,,}\nonumber\\ \delta g_{ij} &= 2a^2 \left[\,{-}\varphi\delta_{ij} +\left(\partial_i\partial_j-\frac{\delta_{ij}}{3}\partial^k\partial_k\right)E+\partial_{(i}E_{j)}+h_{ij}\right]\,, \end{align} with the scalar perturbations $\phi$, $B$, $\varphi$ and $E$, the vector perturbations $B_i$ and $E_i$ satisfying $\partial^iB_i=0=\partial^iE_i$ and the tensor perturbations $h_{ij}$ with the properties $\partial^ih_{ij}=0=h_i{}^i$. Similarly, we decompose the $K$-essence field into its background contribution and perturbation \begin{equation} \chi(\tau,x,y,z)=\bar{\chi}(\tau)+\delta\chi(t,x,y,z). \end{equation} As usual, the different sectors will decouple thanks to the background symmetries so we can treat them separately. We shall use conformal time, corresponding to the choice of lapse $N=a$ in (\ref{flrw}), by $\tau$. Derivatives with respect to the conformal time will be denoted by primes, and thus the conformal Hubble rate is defined as $\mathcal{H}=a'/a=aH$. A word on the choice of time variable is in order before proceeding. As we have discussed, the background equations retain time re-parameterisation invariance, so the choice of time coordinate is irrelevant there. However, since we are working in the coincident gauge, the perturbations do not enjoy Diffs invariance and the choice of background time coordinate might lead to different results. We have checked that all our conclusions below remain valid regardless the choice of the lapse function. \subsection{Tensor perturbations}\label{tensormodes} We introduce the tensor perturbations as the transverse traceless part of the metric fluctuations that can be decomposed into its two helicity modes $h_{(\lambda)}$. After decomposing the tensor field in Fourier modes with respect to the spatial coordinates and using the background equations of motion, the second order action becomes \begin{equation}\label{action_tensormodes} \mathcal{S}^{(2)}_{\rm tensor} = \frac{1}{2}\sum_\lambda\int {{\rm d}}^3k\,{{\rm d}} \tau\,\,a^2\, f_Q \left[(h'_{(\lambda)})^2-k^2h_{(\lambda)}^2 \right]\,. \end{equation} As it becomes clear from the above expression, the tensor perturbations are massless and have the same propagation speed of gravitational waves as in GR \cite{BeltranJimenez:2017tkd}. {This was to be expected from the form of the action for the theories under consideration because all the modifications to the pure tensor perturbations come from the term $Q_{\alpha\mu\nu} Q^{\alpha\mu\nu}\sim \partial_\alpha h_{ij}\partial^\alpha h^{ij}$. All the other independent scalars constructed out of the non-metricity vanish for the quadratic action. It is clear that tensor perturbations cannot contribute to the vector traces of the non-metricity at first order. The remaining independent scalar is $Q_{\alpha\mu\nu} Q^{\mu\alpha\nu}\sim \partial_{i}h_{jk} \partial^j h^{ik}$ which gives zero in the quadratic action via integration by parts and recalling that the background is homogeneous. Thus, our result is the expected one that the only modification to tensor perturbations is the appearance of the time-depending redressing of the effective Planck mass with $f_Q$. This has some observational consequences because the coupling constant of GWs to matter sources will be $G/f_Q$. As we will see, this is the same effective Newton's constant driving the growth of structures. On the other hand, the modified coupling constant will also affect the cosmological propagation of gravitational waves because the usual Hubble friction term acquires a $f_Q$-dependent correction. More explicitly, the propagation of GWs is governed by the modified equation \begin{equation} h''_{(\lambda)}+2\mathcal{H}\left(1+\frac{{{\rm d}} \log f_Q}{2\mathcal{H}{{\rm d}} \eta}\right) h'_{(\lambda)}+k^2h_{(\lambda)}=0. \end{equation} An immediate consequence is thus a modification on the luminosity-distance as measured from GWs. Due to the additional friction introduced by the time-dependent value of $f_Q$, the amplitude of GWs decays as $\vert h_{(\lambda)}\vert\propto 1/(a\sqrt{f_Q})$ instead of the usual $1/a$ dilution. We can then obtain constraints on $f_Q$ by comparing the luminosity-distance as measured with GWs and the one inferred from observing photons, assuming that their propagation is described by Maxwellian electromagnetism. A perfect candidate for this is the merger of two neutron stars as detected by the LIGO collaboration where the signals in GWs and the electromagnetic counterpart were measured. This modification on the luminosity-distance is formally analogous to what happens in models with extra-dimensions where gravity can leak into the additional dimensions \cite{Deffayet:2007kf}. The effect on the luminosity-distance arising from a time-variation of the effective Planck mass has also been analysed in \cite{Amendola:2017ovw} (see also \cite{Nishizawa:2017nef,Belgacem:2017ihm,Ezquiaga:2018btd} for the effects on the propagation of GWs arising from a modified friction term).} \subsection{Vector perturbations} Naively counted there are four vector modes in $E_i$ and $B_i$. However, one immediate observation is that the fields $B_i$ appear in the second order action as non-dynamical fields and they can be integrated out by means of an algebraic equation. We use their equations of motion in order to remove them from the second order action. Then, the remaining action solely depends on $E_i$. Nevertheless, once the background equations of motion are used, their contributions trivialize in the sense that the entire second order action vanishes. This can also be straightforwardly understood from the field equations directly, which can be written as \begin{eqnarray} k^2f_Q\left(\vec{B}-\vec{E}'\right)&=&0,\\ k^2\left[f_Q\left(\vec{B}-\vec{E}'\right)\right]'&=&0, \label{eq:vecpert} \end{eqnarray} where we have made used of the background equations. We then see that the first equation is not dynamical and simply fixes $\vec{B}$ in terms of $\vec{E}'$. The second equation, being the derivative of the constraint, does not give new information. This means that vector perturbations do not propagate, which coincides with the usual result in GR in the absence of vector sources. However, while in GR this is a consequence of diffeomorphisms invariance and the vector modes can be associated to the Lagrange multipliers of transverse Diffs, in the $f(Q)$ theories, once we fix the coincident gauge as we have done here, there is not, in principle, any symmetry ensuring that the vector perturbations are Lagrange multipliers and, consequently, one might expect that they become dynamical in the full theory. There is in fact a simple argument that clearly shows that at most two vector modes will become dynamical in the full theory, while the other two vector modes will remain non-propagating dof's. The reason is that, in the coincident gauge, the scalar $Q$ reduces to the Ricci scalar deprived of the total derivative. If we perform an ADM splitting where the metric is decomposed into the lapse function $\mathcal{N}$, the shift vector $\mathcal{N}_i$ and the spatial metric $\gamma_{ij}$, the non-metricity scalar $Q$ will only contain time derivatives of $\gamma_{ij}$ (see Appendix \ref{ADM} for more details) so that the $f(Q)$ action in the ADM formalism will have the form \begin{equation} {\mathcal S}_{\rm ADM}=-\frac12\int{{\rm d}}^3x{{\rm d}} t\mathcal{N}\sqrt{-\gamma}f(\dot{\gamma}_{ij},\gamma_{ij},\mathcal{N},\mathcal{N}_i) \label{eq:ADM} \end{equation} where we clearly see the non-dynamical character of the lapse and the shift. This means that only the vector modes contained within $\gamma_{ij}$ can become dynamical, while those contributing to the shift remain non-dynamical at the full non-linear level. Thus, the non-dynamical nature of $\vec{B}$ reflects that the shift is not a propagating dof in the full theory. As for $\vec{E}$, it remains to see if it also corresponds to a non-dynamical field in the full theory. If this was not the case, $\vec{E}$ would represent a mode that becomes strongly coupled in the highly symmetric FLRW background. \subsection{Scalar perturbations} There are four scalar modes $\{B, \phi, \varphi, E\}$ in the metric fluctuations and one in the fluctuation of the matter field $\delta\chi$. However, the two scalar perturbations $B$ and $\phi$ are not dynamical and can be immediately integrated out using their algebraic equations of motion. The non-dynamical nature of these modes can be understood from our previous discussion on the ADM decomposition because $B$ and $\phi$ are just the linearised lapse function and the longitudinal part of the perturbed shift, which are in fact non-dynamical in the full theory. The remaining second order action depends on the scalar perturbations $\{\varphi, E, \delta\chi\}$. Its cumbersome form will not be necessary for us here so we will omit it\footnote{The full Hessian is reported in Eq. (\ref{fullhessian}). We give the corresponding equations of motion in Sec. \ref{Sec:equations}. }. It is interesting however to give the determinant of the corresponding Hessian, which is \begin{equation} \label{hessiandet} \frac{12 k^4 Q^2 f_Q f^2_{QQ}(f_Q+2Qf_{QQ})\epsilon^2}{12 f_Q^2+2Qf_Q f_{QQ}(9-5\epsilon)-Q^2f_{QQ}^2(8-3\epsilon)\epsilon}\,, \end{equation} where we have introduced $\epsilon=1-\mathcal{H}'/\mathcal{H}^2$, which is the usual slow-roll parameter expressed in conformal time (though we do not assume it to be small here). The vanishing of the above expression indicates a degenerate system so that at least one of the remaining three scalar modes becomes non-dynamical. This is of course the case when $f_{QQ}=0$ as it corresponds to GR (we know that there will actually be two more non-dynamical modes in that case owed to Diffs-invariance). Since the determinant is proportional to $k^4$, we also see that the system becomes degenerate for homogeneous perturbations, which is a reflection of the additional time reparameterisation symmetry of the background. Besides these two limiting cases, there is another situation where the Hessian is degenerate, which corresponds to background solutions with $\epsilon=0$. These solutions describe maximally symmetric backgrounds, i.e., Minkowski and (anti-)de Sitter. The Hessian for these backgrounds reduces to the simple form \[ \left( \begin{array}{ccc} 0 &0 &0 \\ 0&-\frac{2k^4 Q f_Q f_{QQ}}{6f_Q+9Qf_{QQ}} &0 \\ 0& 0 & 1 \end{array} \right) \] that clearly shows how one of the scalar modes loses its kinetic term and becomes non-dynamical. Furthermore, it is not difficult to show that, after integrating out this new non-dynamical mode, the equation for the remaining scalar mode of the gravitational sector trivialises so that the full scalar sector disappears (assuming that the matter sector is simply given by an exact cosmological constant). More explicitly, the equations for $\varphi$ and $E$ in the presence of a cosmological constant and after integrating out the non-dynamical modes $\phi$ and $B$ are given by \begin{align} &\frac{k^4 Q f_Q f_{QQ}}{H^2(2f_Q+3 Q f_Q)}\Big(3H E'+k^2 E-3\varphi\Big)=0,\\ &\frac{k^4 Q f_Q f_{QQ}}{H^2(2f_Q+3 Q f_Q)}\Big[E''+18H^3E'+k^2(3H^2-k^2)E\nonumber\\&-9H\varphi'+3(k^2-3H^2)\varphi\Big]=0. \end{align} We can see that $\varphi$ is not-dynamical and can be solved for from the first equation. We can then plug the solution into the second equation and corroborate that it is indeed identically satisfied, thus leaving a trivial scalar sector. The loss of kinetic terms might signal the presence of a strong coupling problem because, as we go arbitrarily close to those maximally symmetric backgrounds, the canonically normalised mode becomes arbitrarily strongly coupled (either to itself or to other modes). It is interesting to notice that these background configurations are in fact the expected solutions in vacuum, since deviations from $\epsilon=0$ will require a non-trivial background profile for the scalar field. For a general FLRW background, however, all three scalar modes propagate. In other words, in the absence of the matter fields, the disappearance of the scalar modes signals towards a potential strong coupling problem. At a more practical level, these findings suggest the existence of a low strong coupling scale, but it remains to compute it explicitly to see if it leaves room for non-trivial phenomenologies since, at the strong coupling scale, the perturbation theory breaks down and we cannot make any reliable statement. Nevertheless, the situation is better than in $f(T)$ theories since there the strong coupling problem appears for general FLRW backgrounds, i.e., regardless the presence or type of matter fields. Here, we encounter this problem only for (anti-)de Sitter/Minkowski backgrounds and the presence of matter fields can crucially help to raise the strong coupling scale. It is interesting to compare our results for the perturbations in $f(Q)$ theories with what happens in single field inflation. Let us recall that the curvature perturbation\footnote{Let us stress that $\mathcal{R}$ denotes the scalar perturbation and not the Ricci scalar. Since this is standard notation and there is no risk of confusion, we prefer to stick to the general notation within the inflationary literature.} $\mathcal{R}$ for a single field inflationary model features the following quadratic action \begin{equation} {\mathcal S}_{\mathcal{R}}= M_{\rm Pl}^2\int{{\rm d}}\tau{{\rm d}}^3x\frac{a^2\epsilon}{c_s^2}\left[\dot{\mathcal{R}}^2-c_s^2\vert \nabla\mathcal{R}\vert^2\right]\,, \end{equation} where $c_s^2$ stands for the propagation speed of the scalar perturbations. In this action we encounter something similar to our $f(Q)$ theories in that the limit $\epsilon\rightarrow 0$ seems to lead to a strong coupling issue because the scalar perturbation loses its kinetic term. This is in fact true. However, in the strict limit $\epsilon=0$, we recover that the matter sector is a cosmological constant and the disappearance of the scalar mode is associated to the fact that a cosmological constant does not fluctuate, so in this particular case there is no onus. The case of the $f(Q)$ theories is more problematic because we have the disappearance of two scalar modes. The disappearance of one of the modes could have been expected on the grounds that the matter sector reduces to a non-fluctuating cosmological constant for $\epsilon=0$. However, we encounter that a second scalar mode also disappears and this mode is expected to be part of the dynamical degrees of freedom of the $f(Q)$ theories so its disappearance in fact signals that it becomes strongly coupled. We will return to this point below where we will relate these evanescent modes around maximally symmetric backgrounds with the appearance of a gauge symmetry. Let us nevertheless finalise this brief comparison with usual inflationary perturbations by saying that very small values of the slow roll parameter can in fact incur strong coupling issues. As a matter of fact, going through a phase where the slow roll parameter decreases for a few e-folds after the CMB scales have exited the horizon and before the end of inflation originates a peak in the power spectrum (that could eventually form primordial black holes). If $\epsilon$ becomes sufficiently small, the peak in the power spectrum can be so large that perturbation theory breaks down. \subsection{Field equations}\label{Sec:equations} In the following we will consider a perfect fluid for the matter field instead of a $K$-essence field and explicitly show the dependence of background variables in the perturbations equations of motion. The perturbed line element will be explicitly given in (\ref{conformal}). It is sometimes convenient to introduce the Bardeen potential $\psi$ with the purely temporal transformation \begin{equation} \psi \rightarrow \psi + \mathcal{H}\zeta^0\,, \label{cgt5} \end{equation} by combining the trace of the shear perturbation $E$ with the $\varphi$ on the spatial diagonal as \begin{equation} \psi = \varphi + \frac{1}{3}\delta^{ij}E_{,ij}\,, \end{equation} so that \begin{align} \frac{{{\rm d}} s^2}{a^2(\tau)} &= -\left( 1+ 2\phi\right){{\rm d}} \tau^2 + 2\left( B_{,i} + B_i\right) {{\rm d}}\tau{{\rm d}} x^i \nonumber \\ &+\Big[ \left( 1-2\psi\right)\delta_{ij}+ 2E_{,ij} + 2E_{(i,j)} + 2h_{ij}\Big]{{\rm d}} x^i{{\rm d}} x^j\,. \label{conformal} \end{align} The matter energy momentum tensor we parameterise in the fluid form, \begin{eqnarray} T^0{}_0 &= & -\rho\lp1+\delta\right)\,, \\ T^0{}_i &= & -\left(\rho+p\right) \left( \partial_iv + V_i\right)\,, \\ T^i{}_0 &= & \left(\rho+p\right)\left[ \partial^i(v-B) + V^i-B^i\right]\,, \\ T^i{}_j & = & \left( p+\delta p\right)\delta^i_j + \partial^i\partial_j\pi-{\footnotesize{\frac{1}{3}}}\delta^i_j\nabla^2\pi + \Pi^i{}_j\,. \end{eqnarray} Here $\rho$ and $p$ are the background energy density and pressure. Denoting $w=p/\rho$, $c_s^2=p'/\rho'$, the continuity and Euler equations are \begin{eqnarray} \delta' = \left( 1+w\right)\left(-k^2v-k^2B+3\varphi'\right) + 3\mathcal{H}\left( w\rho-\frac{\delta p}{\rho}\right), \,\,\,\,\label{eqc0} \\ v' = -\mathcal{H}\left( 1-c_s^2\right) v+ \frac{\delta p}{\rho + p} - \frac{2}{3}\frac{w}{1+w}k^2\pi + \phi\,. \qquad \label{eqci} \end{eqnarray} Similarly, the energy constraint can be expressed in a compact form as \begin{eqnarray} -a^2\delta\rho &=& 6\left( f_{Q} + 12a^{-2}\mathcal{H}^2 f_{QQ}\right)\mathcal{H}\left( \mathcal{H}\phi + \varphi' \right) + 2f_{Q} k^2\psi \nonumber\\ &&- 2\left[ f_{Q} + 3a^{-2}f_{QQ}\left(\mathcal{H}'+\mathcal{H}^2\right)\right]\mathcal{H} k^2B\,. \label{eq00} \end{eqnarray} The velocity propagation can be withdrawn from \begin{eqnarray} &&\frac{1}{2}a^2\left(\rho+p\right) v = \left[ f_{Q} + 3a^{-2}f_{QQ}\left( \mathcal{H}'+\mathcal{H}^2\right)\right]\mathcal{H} \phi \nonumber\\ &&+ 6a^{-2}f_{QQ}\mathcal{H}^2\varphi' - 9a^{-2}f_{QQ}\left(\mathcal{H}'-\mathcal{H}^2\right)\mathcal{H}\varphi \nonumber\\ &&+ f_{Q}\psi'-a^{-2}f_{QQ}\mathcal{H}^2 k^2B\,. \label{eq0i} \end{eqnarray} The pressure equation is a little bit more cumbersome but can be expressed as \begin{widetext} \begin{eqnarray} \frac{1}{2}a^2\delta p & = & \left( f_{Q} + 12a^{-2}f_{QQ} \mathcal{H}^2\right) \left( \mathcal{H}\phi' + \varphi''\right) + \left[ f_{Q}\left( \mathcal{H}'+2\mathcal{H}^2-\frac{1}{3}k^2\right) + 12a^{-2}f_{QQ}\mathcal{H}^2\left( 4\mathcal{H}'-\mathcal{H}^2\right) + 12 a^{-2}\frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau}\mathcal{H}^3\right]\phi \nonumber \\ & + & 2\left[ f_{Q} + 6a^{-2}f_{QQ}\lp3\mathcal{H}'-\mathcal{H}^2\right) + 6a^{-2}\frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau}\mathcal{H}\right]\mathcal{H}\varphi' + \frac{1}{3} f_{Q}k^2\psi \nonumber \\ & - & \frac{1}{3}\left( f_{Q} + 6a^{-2}f_{QQ}\mathcal{H}^2\right) k^2 B' - \frac{1}{3}\left[ 2f_{Q}+3a^{-2}f_{QQ}\left( 5\mathcal{H}-\mathcal{H}^2\right) + 6a^{-2}\frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau}\mathcal{H}\right] \mathcal{H} k^2B\,. \label{eqii} \end{eqnarray} \end{widetext} In the presence of anisotropic stress in $T^i{}_j $, we can similarly follow the shear propagation via the equation \begin{eqnarray} &&p a^2\pi = - 2\Big[ f_{Q} + 6a^{-2}f_{QQ}\left(\mathcal{H}'-\mathcal{H}^2\right)\Big]\mathcal{H} B \nonumber\\ &&+ 2\left[ f_{Q} + 6a^{-2}f_{QQ}\left(\mathcal{H}'-\mathcal{H}^2\right)\right]\mathcal{H} E' \nonumber\\ &&f_{Q}\left(\psi-\phi\right)+ f_{Q} E'' - f_{Q}B' \,. \label{eqij} \end{eqnarray} Last but not least, we also have the contributions coming from the connection field equations. The two independent connection field equations from (\ref{cfe}) are \begin{eqnarray} &-& f_{QQ} \mathcal{H} \left[ 2\mathcal{H} \varphi' + \left( \mathcal{H}' + \mathcal{H}^2\right)\phi + \left( \mathcal{H}'-\mathcal{H}^2\right)\left( \psi - B'\right) \right] \nonumber \\ &-& \Big[ f_{QQ} \left( \mathcal{H}'{}^2 +\mathcal{H} \mathcal{H}'' - 3\mathcal{H}^2 \mathcal{H}' -\frac{1}{3}\mathcal{H}^2 k^2\right) \nonumber \\ &+& \frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau} (\mathcal{H}'-\mathcal{H}^2)\mathcal{H}\Big]B = 0\,, \label{eqc0} \end{eqnarray} and \begin{widetext} \begin{eqnarray} &- &f_{QQ} \left( \mathcal{H}'-3\mathcal{H}^2\right)\mathcal{H}\phi' - \left[ f_{QQ}\left( \mathcal{H}''\mathcal{H} + \mathcal{H}'{}^2 - 9\mathcal{H}' \mathcal{H}^2\right) - \frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau}\left(\mathcal{H}'-3\mathcal{H}^2\right)\mathcal{H}\right] \phi \nonumber \\ +\quad 2f_{QQ}\mathcal{H}^2\varphi'' & + & \left[ f_{QQ} \left( \mathcal{H}'+3\mathcal{H}^2\right) + 2\frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau}\mathcal{H} \right]\mathcal{H}\varphi' -3 \left[ f_{QQ} \left(\mathcal{H}'{}^2+\mathcal{H}''\mathcal{H}-3\mathcal{H}'\mathcal{H}^2\right) + \frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau}\left(\mathcal{H}'-\mathcal{H}^2\right)\mathcal{H}\right]\varphi \nonumber \\ - \quad \frac{1}{3}f_{QQ} \mathcal{H}^2 k^2B' & + & \frac{1}{3}\left[ f_{QQ}\left(\mathcal{H}'-3\mathcal{H}^2\right) - \frac{{{\rm d}} f_{QQ}}{{{\rm d}} \tau} \mathcal{H}\right]\mathcal{H} k^2 B =0\,. \label{eqci} \end{eqnarray} \end{widetext} In terms of the gauge-invariant vector perturbations $\hat{B}^i=(B-E')^i$, the vector equations satisfy \begin{eqnarray} \left(\rho + p\right) V^i &=& \frac{1}{2}k^2 \hat{B}^i\,, \\ p\Pi^i &=& f_{Q}\left( \hat{B}^i{}'+2\mathcal{H} \hat{B}^i{}\right) \nonumber\\ &&+ 6a^{-2}f_{QQ}\mathcal{H}\left(\mathcal{H}'-\mathcal{H}^2\right) \hat{B}^i\,. \end{eqnarray} Equipped with these equations of motion of the perturbations we can derive the effects in the cosmological observables, one of the important ones being the change in the growth of structures. \subsection{Growth of matter perturbations} We have two extra perturbation variables in the metric compared to the usual case. We also have two extra equations. At small scales, we have from (\ref{eqc0}) that\footnote{A similar relation is found for the extra perturbation $\zeta$ in the $f(T)$ models, which however is exact \cite{Golovnev:2018wbh}, whereas the equation (\ref{eqc02}) applies only at the limit $k \gg \mathcal{H}$.} \begin{equation} \label{eqc02} k^2 B = 3\mathcal{H}^{-1}\left[ 2\mathcal{H}\varphi'+\left(\mathcal{H}'+\mathcal{H}^2\right)\phi + \left(\mathcal{H}'-\mathcal{H}^2\right)\psi\right]\,. \end{equation} Let us consider dust, $w=c_s^2=0$. In the quasi-static limit\footnote{Let us stress that the strict quasi-static limit is not well-defined within these theories because, as we have seen and we will discuss in more depth below, the scalar sector becomes strongly coupled around maximally symmetric backgrounds. Since the quasi-static limit essentially amounts to considering a static background, it is likely that the strong coupling scale is reached before the quasi-static regime. The reason to proceed as we do in this section is to give a comparison with the results in $f(T)$ theories and explicitly show that the perturbations evolve differently even though the background evolutions are formally identical in both families of theories. It is important to notice that the quasi-static limit is even more ill-defined in the $f(T)$ theories due to the more severe strong coupling problems of those theories.} (which is just the small scale approximation), the energy constraint (\ref{eq00}) yields the usual Poisson equation with a modulated Newton's constant, \begin{equation} \label{newton} \psi = -\frac{4\pi G\rho \delta}{k^2f_{Q}}\,, \end{equation} where the Newton's constant is explicitly restored ($f_{Q}\rightarrow f_{Q}/8\pi G$). Both the equations of the spatial diagonal (\ref{eqii}) and (\ref{eqij}) both imply at the quasi-static limit that \begin{equation} \phi = \psi\,. \end{equation} The connection equation (\ref{eqc02}) then further simplifies to \begin{equation} \label{betasol} B = \frac{6}{k^2}\left( \varphi' + \frac{\mathcal{H}'}{\mathcal{H}}\phi\right)\,. \end{equation} On the other hand, the continuity equation (\ref{eqc0}) implies for dust that \begin{equation} \delta'' = -k^2\left( v' +B'\right) + 3\varphi''\,, \end{equation} which, by using the Euler equation (\ref{eqci}) and then again (\ref{eqc0}) becomes \begin{equation} \delta'' + \mathcal{H}\delta' + k^2\phi = 3\left( \varphi'' + \mathcal{H}\varphi'\right) -k^2\left( B'+\mathcal{H}'B\right)\,. \end{equation} Consistently with (\ref{newton}) and (\ref{betasol}), the right hand side of this equation can be neglected at the quasi-static limit. We thus end up with the simple evolution equation for the overdensity $\delta$, \begin{equation} \delta'' + \mathcal{H}\delta' = \frac{4\pi G\rho}{f_{Q}} \delta\,, \end{equation} where the modification with respect to the standard equation is that the effective gravitational constant is modulated by the time-dependent background function $f_{Q}$ such that $G\rightarrow G/f_{Q}$. This is essentially the same equation that governs the growth of structures in the quasi-static limit of $f(T)$ cosmology \cite{Golovnev:2018wbh}. \section{Gauge transformations of the perturbations} \label{gauge} In order to appreciate better the involved symmetries, we will consider gauge transformations of the cosmological perturbations in this section. We shall again consider the generally perturbed flat FLRW line element in equation \eqref{perturbed_metric}. We can derive the gauge transformations of the metric potentials under an infinitesimal coordinate change $x^\mu \rightarrow x^\mu + \zeta^\mu$, whose scalar sector is given by $\zeta^0$ and {$\zeta^i=\delta^{ij}\partial_j\zeta$} and vector sector by a transverse $\hat{\zeta}^i$. The result for the vectors is \begin{eqnarray} B^i & \rightarrow & B^i - \hat{\zeta}^i{}'\,,\nonumber \\ E^i & \rightarrow & E^i - \hat{\zeta}^i{}\,, \end{eqnarray} and for the scalars \begin{eqnarray} \phi & \rightarrow & \phi -{\zeta^0}' - \mathcal{H} \zeta^0\,, \label{cgt1} \nonumber\\ B & \rightarrow & B - \zeta' + \zeta^0\,, \nonumber\\ \varphi& \rightarrow & \varphi - \frac{1}{3}k^2\zeta + \mathcal{H}\zeta^0\,, \nonumber\\ E & \rightarrow & E - \zeta\,. \label{gaugetransf} \end{eqnarray} As we have explained in several occasions above, the use of the coincident gauge exhausted the freedom allowed by Diff-invariance. This is crucially different from other Diff-invariant theories (as e.g. GR and many other extensions based on its curvature formulation), but it is somewhat similar to what happens for massive gravity theories where the mass term breaks Diffs invariance and it is not legitimate to fix any of the gravitational potentials (some of which remain non-dynamical like in our case). The analogy with massive gravity also extends to the Diffs-restored versions of the theories. In massive gravity it is possible to resort to the Stueckelberg trick and restore Diff-invariance by the introduction of a set of four compensating fields with appropriate transformation properties (under both Lorentz and diffeomorphisms transformations), while in symmetric teleparallel theories the connection naturally acquires the form of an inertial connection given in terms of compensating Stueckelberg fields, the $\xi's$, and the coincident gauge is nothing but the corresponding unitary gauge. It will be instructive to explicitly see how the form of the inertial connection indeed restores the scalar character of the non-metricity scalar in the cosmological framework. This will also permit us to gain a better understanding of the disappearance of scalar modes around maximally symmetric backgrounds obtained above as a consequence of the emergence of a constrained Diff symmetry for such backgrounds. The non-metricity scalar in the coincident gauge for our perturbed metric at first order is\footnote{We will restore the notation of denoting a quantity in the coincident gauge with a ring over for clarity.} \begin{equation} \label{Qscalar} a^2 \mathring{Q} = 6\mathcal{H}^2 - 2\mathcal{H}\left[ 6\left( \mathcal{H}\phi+\varphi'\right) - k^2B\right]\,, \end{equation} Notice that vector perturbations do not contribute at this order, so we will not consider them for now, but we will come back to them later when discussing the invariance of the field equations. The transformation of the non-metricity perturbation in the coincident gauge can then be easily computed as\footnote{In this section we will use $\Delta_\zeta$ to denote the variation under a Diff, while $\delta$ will be used to denote the first order perturbation of a given quantity.} \begin{eqnarray} \label{changeQ} \Delta_\zeta \delta\mathring{Q}= \frac{2\mathcal{H}}{a^{2}}\Big[ 6\left(\mathcal{H}^2-\mathcal{H}'\right)\zeta^0 +k^2\left(\zeta^0+\zeta'\right) \Big]. \end{eqnarray} As expected, $\mathring{Q}$ does not transform as a scalar but it features an additional term. It is interesting however, that the failure to transform as a scalar is \begin{equation} \Delta_\zeta\delta\mathring{Q}+{\mathcal L}_\zeta\mathring{Q}=2\mathcal{H}\frac{k^2}{a^{2}}\left(\zeta^0+\zeta'\right) \end{equation} which shows three remarkable properties. Firstly, $\mathring{Q}$ does transform as a scalar for {\it large gauge transformations} with zero momentum and this can have interesting consequences for adiabatic modes. Secondly, non-zero momentum gauge transformations still realise a restricted Diff symmetry provided the gauge parameters satisfy $\zeta^0=-\zeta'$. Notice however that this does not mean the existence of a gauge symmetry in the theory. Finally, the Minkowski background with $\mathcal{H}=0$ also makes $\delta\mathring{Q}$ transform as a scalar. This already suggests that Minkowski is a special background as we will confirm in the following. In order to elucidate more clearly the role of the gauge transformations on the dynamics, let us see how the equations for the perturbations behave under Diffs. We do not need the specific form of the equations, but only how they change under a Diffs transformation. As above, we will use a scalar field as a proxy for the matter sector. Since this matter sector is Diff-invariant, its equation of motion will be gauge invariant so we do not need to consider it and we can only focus on the gravitational equations for the perturbations, which correspond to the Diff-breaking sector. These equations change as: \begin{align} \Delta_\zeta\mathcal{E}_\varphi=&-2k^2\bar{Q} f_{QQ}(\zeta^0+\zeta')'+\epsilon k^2\mathcal{H} \bar{Q}f_{QQ}(5\zeta^0+7\zeta')\nonumber\\ &+4k^2\mathcal{H}\bar{Q}^2f_{QQQ}(\epsilon-1)(\zeta^0+\zeta')\,,\nonumber\\ \Delta_\zeta \mathcal{E}_\phi=&k^2\mathcal{H} \bar{Q}f_{QQ}\Big[2(\zeta^0+\zeta')+\epsilon(\zeta^0-\zeta')\Big]\,,\nonumber\\ \Delta_\zeta\mathcal{E}_B=&\frac{1}{3}k^2\bar{Q} f_{QQ}\left[3\epsilon \mathcal{H} \left({\zeta^0}' +k^2\zeta\right)-k^2\left(\zeta^0+\zeta' \right) \right]\,,\nonumber\\ \Delta_\zeta\mathcal{E}_E=&-\frac{4\epsilon}{3} k^4 \mathcal{H}\bar{Q} f_{QQ} \zeta^0\,. \label{eq:DeltaEqscalars} \end{align} From these equations we can see that, as expected, the STEGR where $f(Q)$ is a linear function of $Q$ the equations are gauge invariant. However, we can also see that background solutions with $\epsilon=0$ also have perturbations equations that are invariant under the restricted Diffs with $\zeta^0=-\zeta'$, which is the same subset of Diffs that make $\delta\mathring{Q}$ transform as a scalar. This feature also allows to explain the disappearance of the scalar modes discussed above around maximally symmetric backgrounds. We can now understand that these backgrounds enjoy an additional gauge symmetry so that one scalar perturbation becomes a gauge mode. However, since this symmetry is not in the full theory, we can conclude that it is just an accidental gauge symmetry of those backgrounds. The accidental nature of this symmetry is in fact corroborated by the fact that more general cosmological backgrounds do not have it, which can be easily understood by noticing that there is no relation between $\zeta^0$ and $\zeta$ that make the RHS in (\ref{eq:DeltaEqscalars}) vanish for an arbitrary background. This is precisely the origin of the aforementioned strong coupling problem of the scalar perturbations around maximally symmetric backgrounds. On the other hand, the fact that Minkowski exhibits this enhanced symmetry also explains that the very sub-horizon modes realise the symmetry up to corrections suppressed by $\mathcal{H}^2/k^2$. Let us now turn to the vector sector whose equations we gave in (\ref{eq:vecpert}). From there, it is obvious to see that they do retain the gauge invariance of GR for an arbitrary purely vector Diff. Whether this symmetry is maintained at higher order is not clear. If they do, the non-dynamical nature of the vector modes would extend to the full non-linear order. If a completion of this linear symmetry is not present, then vector modes would exhibit strong coupling problems more severe than those of the scalar perturbations. To end this section, it is instructive to see how the above gauge transformations relate to the choice of connection. At the background order the non-metricity can be written as \begin{equation} \label{bQ} Q_{\alpha\mu\nu} = 2\mathcal{H} \delta^0_\alpha g_{\mu\nu}\,, \quad Q_\alpha = 8\mathcal{H}\delta^0_\alpha\,, \quad \tilde{Q}_\alpha = 2\mathcal{H}\delta^0_\alpha\,, \end{equation} and for its conjugate we obtain \begin{equation} \label{bconjugate} P_{\alpha\mu\nu} = \mathcal{H}\left[ \delta^0_\alpha\delta^i_\mu\delta^j_\nu - \delta_\alpha^i\delta^j_{(\mu}\delta^0_{\nu)}\right] g_{ij}\,. \end{equation} If we transform the connection away from the coincident gauge by the same $\zeta^\mu$ as in \eqref{gaugetransf}, up to the linear order we have $\delta Q_{\alpha\mu\nu} = -2g_{\beta(\mu}\partial_{\nu)}\partial_\alpha\zeta^\beta$ and then, from $Q=-P_{\alpha\mu\nu}Q^{\alpha\mu\nu}$ we obtain, by using (\ref{bconjugate}), that $ \delta Q = -2\mathcal{H}\left( \zeta^0{}_{,ij}+ \zeta_{i,(j0)}\right) g^{ij}$. Thus the variation of $Q$ due to the change of the connection is given by \begin{equation} \delta Q = 2a^{-2}\mathcal{H} k^2\left( \zeta^0 + \zeta'\right), \end{equation} which precisely cancels the non-scalar variation in (\ref{changeQ}) and we obtain $\Delta_\zeta \delta Q=-{\mathcal L}_\zeta Q$, i.e., it does transform as a scalar. Any other contraction of the non-metricity, besides $Q$, will be a scalar too. Let us check for example the term \begin{equation} a^2Q_1 \equiv a^2 Q_{\alpha\mu\nu}Q^{\alpha\mu\nu} = -16\mathcal{H}^2 + 8\mathcal{H}\left( 4\mathcal{H}\phi-\phi'+3\varphi'\right)\,, \end{equation} which under (\ref{gaugetransf}) transforms in the coincident gauge as \begin{equation} \label{transA} Q_1 \rightarrow Q_1 + 8\mathcal{H} a^{-2}\left[ {\zeta^0}{}''+4 \left( \mathcal{H}'-\mathcal{H}^2\right)\zeta^0 - k^2\zeta' \right] \end{equation} In this case we immediately see from (\ref{bQ}) that the accompanying change of the connection away from the coincidence gauge gives \begin{equation} \delta Q_1 = 2Q^{\alpha\mu\nu}2g_{\beta(\mu}\partial_{\nu)}\partial_\alpha\zeta^\beta =-8\mathcal{H} a^{-2}\left( \zeta^0{}'' - k^2\zeta'\right), \end{equation} so the total change given by the sum of the above two contributions (i.e. the change in the coincident gauge plus the change of the connection) is \begin{equation} \Delta_\zeta Q_1=\frac{32}{a^2}\mathcal{H}(\mathcal{H}'-\mathcal{H}^2)\zeta^0 \end{equation} which is nothing but $\Delta_\zeta Q_1=-\zeta_0 \bar{Q}_1'=-{\mathcal L}_\zeta \bar{Q}_1$ as it should for a scalar. It is straightforward to show that any other contraction also transforms as a scalar when the change in the connection is properly taken into account. \section{Conclusions} \label{conclusions} In this work we have studied the cosmological implications of the new type of modified gravity theories that originate from the equivalent formulation of GR based on non-metricity, namely: The Symmetric Teleparallel Equivalent of GR. Models of general functions of the Ricci or torsion scalar have already been extensively studied in the literature. The cosmological realisation of $f(R)$ theories tends to force to remain close to GR, whereas models based on $f(T)$ suffer from strong coupling problems on general FLRW backgrounds. The third equivalent formulation of GR by means of the $Q$-scalar motivates novel ways of modifying gravity, one of such examples being the $f(Q)$ theories. Even if these models are indistinguishable from $f(T)$ theories at the background level, crucial differences arise at the level of cosmological perturbations, which has been the aim of this work. Specially, we have shown that the strong coupling problems possibly encountered in $f(T)$ theories are absent in $f(Q)$ models on general FLRW backgrounds. However, they do appear on maximally symmetric backgrounds such as Minkowski and de Sitter. Although these highly symmetric backgrounds might suffer from such strong coupling problems, they are less severe than the ones exhibited by $f(T)$ theories and, given that less symmetric cosmologies do not suffer from these problems, there can be room for interesting phenomenologies. We have also shown that at the small-scale quasi-static limit the predictions of the $f(Q)$ and the $f(T)$ models coincide, but at larger scales the $f(Q)$ models generically propagate two scalar degrees of freedom that are absent in the case of $f(T)$. These two degrees of freedom are the ones that disappear around maximally symmetric backgrounds and, thus, cause the discussed strong coupling problem. Since the $f(Q)$ theories in the coincident gauge do not have the usual gauge invariance of cosmological perturbations, we have performed a detailed analysis of the behaviour of the equations under Diffs transformation. Since the theory is no longer Diff-invariant, the equations do change under a Diff. Remarkably, we have found that maximally symmetric backgrounds retain a gauge symmetry given by a restricted Diff. These findings allowed us to give a better understanding on the disappearance of degrees of freedom around these backgrounds as a consequence of the appearance of a residual gauge symmetry, which then roots the strong coupling problems. There is an important caveat that has to be taken into account before drawing conclusions about the viability of $f(Q)$ cosmology. Because in this framework the connection is an independent fundamental degree of freedom besides the metric, the space of solutions is richer than in purely metric gravity. In particular, there exists physically inequivalent cosmological solutions that respect the FLRW symmetry at the background level, but whose perturbations may behave differently\footnote{An analogous issue has been recently pointed out concerning the $f(T)$ and other modified teleparallel gravity models. There the number and the nature of the degrees of freedom can depend on the Lorentz frame wherein one chooses to introduce the fluctuations \cite{Golovnev:2018wbh,Koivisto:2018loq}.}. In the case $f(Q)=Q$ the dynamics are frame-independent, but once $f_{QQ}(Q) \neq 0$ an ambiguity arises. Recently, we have put forward the conjecture that in the {\it canonical frame} the energy-momentum of the metric field is vanishing \cite{Jimenez:2019yyx}. This is a covariant criterion that eliminates the ambiguity in the predictions of the modified models. The question arises whether the strong coupling issue on Minkowski and de Sitter backgrounds could be avoided by the more judicious choice of the background solution for the metric and the connection. This calls for reconsideration of the $f(Q)$ cosmology in the canonical frame, a task we plan to undertake in the near future. \\ \acknowledgments JBJ acknowledges support from the {\it Atracci\'on del Talento Cient\'ifico en Salamanca} programme and the MINECO's projects FIS2014-52837-P and FIS2016-78859-P (AEI/FEDER). LH is supported by funding from the European Research Council (ERC) under the European Unions Horizon 2020 research and innovation programme grant agreement No 801781 and by the Swiss National Science Foundation grant 179740. TK acknowledges support from the Estonian Research Council grant PRG356 ``Gauge Gravity'' and the European Regional Development Fund through the Center of Excellence TK133 ``The Dark Side of the Universe''. This research is based upon work from COST Action CA15117 CANTATA, supported by the European Cooperation in Science and Technology.
\section{Introduction} Suppose that $M$ is a $4$-manifold with a Lorentz metric $g_M$ and an electromagnetic gauge field, i.e.~a $1$-form $A\in\Omega^1(M)$. The original Kaluza--Klein ansatz \cite{Kal}, \cite{Kle} is to consider the $5$-manifold $Y=M\times S^1$ and combine $g_M$ and $A$ to a Lorentz metric $g_Y$ on $Y$ which is invariant under the circle action. The $5$-dimensional vacuum Einstein field equations for $g_Y$ (i.e.~vanishing of the Ricci tensor) then imply the $4$-dimensional Einstein field equations for $g_M$ with electromagnetic source and the Maxwell equation for $A$. Let $(X,g_X)$ be a smooth, closed, oriented, Riemannian $4$-manifold. We choose a $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ on $X$ with associated spinor bundle $S_X^c$ and determinant line bundle $L$. Locally the spinor bundle $S_X^c$ is a tensor product of a standard spinor bundle and a square root $L^{\scriptscriptstyle\frac{1}{2}}$, i.e.~a twisted spinor bundle. Since $X$ is not necessarily spin, the standard spinor bundle and the square root may not exist globally on $X$. However, $\mathrm{Spin}^c$-structures always exist on closed, oriented $4$-manifolds. The Seiberg--Witten equations \cite{SW1}, \cite {SW2}, \cite{W} are partial differential equations for a pair $(A,\phi)$, consisting of a Hermitian connection $A$ on $L$ and a positive Weyl spinor $\phi\in\Gamma(S_X^{c+})$. These equations can be used to define the Seiberg--Witten invariants of $X$, which have numerous applications to the differential geometry, symplectic geometry and topology of $4$-manifolds. Let $\pi\colon Y\rightarrow X$ be the principal circle bundle with Euler class $e$. We consider two cases: \begin{itemize} \item If $X$ is non-spin, we choose $e=c_1(L)$ and a connection $A$ on $L$. We also set $m=-\frac{1}{2}$. \item If $X$ is spin, let $L^{\scriptscriptstyle\frac{1}{2}}$ be the square root of $L$ determined by a spin structure. We then choose $e=c_1(L^{\scriptscriptstyle \frac{1}{2}})$ and a connection $A$ on $L^{\scriptscriptstyle\frac{1}{2}}$, which induces a connection $A'$ on $L$. We set $m=-1$. \end{itemize} For this choice of Euler class $e$ the $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ on $X$ lifts to a canonical {\em spin} structure $\mathfrak{s}_Y$ on $Y$. For the associated spinor bundles, every spinor $\phi\in\Gamma(S_X^c)$ has a canonical lift to an untwisted spinor $\psi=Q(\phi)\in\Gamma(S_Y)$. We can think of the connection $A$ as a $\mathrm{U}(1)$-connection $A\in\Omega^1(Y,i\mathbb{R})$ on the principal bundle $Y$ and define the Kaluza--Klein metric \begin{equation*} g_Y=\pi^*g_X-A\otimes A \end{equation*} on $Y$. \begin{thm}\label{thm:main thm n=1} We consider the Seiberg--Witten equations on $X$: \begin{align*} D_A^X\phi&=0\\ F_A^+&=\sigma(\phi,\phi). \end{align*} Let $\phi\in \Gamma(S_X^{c+})$ be a positive Weyl spinor on $X$ and $\psi =Q(\phi)\in \Gamma(S_Y)$ the lift to $Y$. If $(A,\phi)$ (in the non-spin case) or $(A',\phi)$ (in the spin case) is a solution to the Seiberg--Witten equations, then \begin{equation}\label{eqn:DY eqn n=1} D^Y\psi=-\frac{1}{16m}|\psi|^2\psi+m\psi. \end{equation} Here $D^Y$ is the Dirac operator on $S_Y$ for the Riemannian metric $g_Y$. If $\phi$ does not vanish identically on $X$, then also the converse follows in both cases, i.e.~if equation \eqref{eqn:DY eqn n=1} holds, then $(A,\phi)$ or $(A',\phi)$, respectively, is a solution to the Seiberg--Witten equations. \end{thm} Theorem \ref{thm:main thm n=1} is a special case of the more general Theorem \ref{thm:main thm all n}. \begin{rem} Solutions $(A,\phi)$ to the Seiberg--Witten equations with $\phi$ not identically zero are called irreducible. The statement of the theorem implies that irreducible solutions of the Seiberg--Witten equations on $X$ are equivalent to solutions of equation \eqref{eqn:DY eqn n=1} on the Kaluza--Klein circle bundle $Y$. Reducible solutions $(A,0)$ to the Seiberg--Witten equations are given by connections $A$ so that \begin{equation*} F_A^+=0. \end{equation*} The trivial spinor $\psi\equiv 0$ is of course a solution to equation \eqref{eqn:DY eqn n=1}, without a condition on $A$. \end{rem} The pullback of a $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ to a spin structure $\mathfrak{s}_Y$ on the circle bundle $Y\rightarrow X$ defined by $\mathfrak{s}_X^c$ has been discussed in \cite{Mor}. The proof of Theorem \ref{thm:main thm n=1} and Theorem \ref{thm:main thm all n} depends on a calculation in \cite{AB} of the Dirac operator $D^Y$ on lifted spinors $\psi=Q(\phi)$, see Corollary \ref{cor:formula Dirac DY spin and non-spin}. The implication in the case $\phi\not\equiv 0$ from equation \eqref{eqn:DY eqn n=1} to the Seiberg--Witten equations follows from a theorem in \cite{Baer} on the zero set of harmonic spinors for generalized Dirac operators. Both Seiberg--Witten equations on $X$ combine to a single equation on $Y$, because the Dirac operator $D^Y$ maps the lift of a positive Weyl spinor to the lift of a mixed spinor. Similarly the map (with Clifford multiplication in the second entry) \begin{align*} f\colon\Gamma(S_X^{c+})&\longrightarrow \Gamma(S_X^{c-})\oplus \Gamma(S_X^{c+})\\ \phi&\longmapsto \left(D_A^X\phi,(F_A^+-\sigma(\phi,\phi))\cdot\phi\right), \end{align*} has mixed image. Equation \eqref{eqn:DY eqn n=1} is a lift of the equation $f(\phi)=0$. Note that the quadratic non-linearity $\sigma(\phi,\phi)$ in the Seiberg--Witten equations becomes the non-linearity $|\psi|^2$. \begin{rem} The Seiberg--Witten equations on $X$ are equations for the pair $(A,\phi)$ and the Riemannian metric $g_X$ is usually considered a parameter. The lifted equation \eqref{eqn:DY eqn n=1} on $Y$ is an equation for the spinor $\psi$. The connection $A$ has been absorbed into the parameter $g_Y$. (For a given metric $g_X$, the Kaluza--Klein construction is an embedding of the space of connections on $Y$ into the space of Riemannian metrics on $Y$, because a connection $1$-form is determined by an Ehresmann connection, which in the Kaluza--Klein case is given by the orthogonal complement of the tangent space to the circle fibres.) \end{rem} Recall that the Seiberg--Witten equations are gauge invariant: Every smooth function $h\colon X\rightarrow S^1$ defines a gauge transformation (bundle automorphism) \begin{align*} u_h\colon Y&\longrightarrow Y\\ y&\longmapsto y\cdot h(\pi(y)). \end{align*} Writing \begin{equation*} d\theta_h=\pi^*h^*d\theta=\pi^*(h^{-1}\cdot dh)\in\Omega^1(Y,\mathbb{R}) \end{equation*} with the standard volume form $d\theta$ on $S^1$, the action of gauge transformations on connections $A\in\Omega^1(Y,i\mathbb{R})$ is given by \begin{equation*} u_h^*A=A+id\theta_h. \end{equation*} The Seiberg--Witten equations are invariant under the following gauge transformations\footnote{The action of $h^{-1}$ on $\phi$ but $h^2$ on $A$ can be explained by the formula $S_X^c=S_X\otimes L^{\frac{1}{2}}$ with the spinor bundle $S_X$ of a spin structure, that exists at least locally.} for any smooth function $h\colon X\rightarrow S^1$: \begin{align*} A&\mapsto A^h=u_{h^2}^*A=A+id\theta_{h^2}\\ \phi&\mapsto\phi^h=h^{-1}\cdot \phi. \end{align*} Gauge transformations act as diffeomorphisms on the space of Riemannian metrics on $Y$ and map Kaluza--Klein metrics to Kaluza--Klein metrics: The metric $g_Y$ changes to \begin{equation*} g_Y^h=u_{h^2}^*g_Y=\pi^*g_X-A^h\otimes A^h. \end{equation*} For a suitable identification of the spinor bundle $S_Y$ the Dirac operator changes to $D^{Yh}$ and the spinor to $\psi^h\in \Gamma(S_Y)$. Gauge invariance of the Seiberg--Witten equations means that if $(A,\phi)$ is a solution to the equations, then $(A^h,\phi^h)$ is also a solution. Theorem \ref{thm:main thm n=1} implies that $\psi^h$ is a solution to equation \eqref{eqn:DY eqn n=1} if $D^Y$ is replaced by $D^{Yh}$. \begin{rem} The invariance of the Seiberg--Witten equations under charge conjugation is discussed in Section \ref{subsect:charge conjugation}. \end{rem} \begin{rem} Equation \eqref{eqn:DY eqn n=1} makes sense for spinors $\psi\in\Gamma(S_Y)$ on any spin Riemannian $5$-manifold $(Y,g_Y)$. Solutions of an equation of type \begin{equation*} D^Y\psi=-\lambda|\psi|^2\psi+m\psi, \end{equation*} with constants $\lambda,m\in\mathbb{R}$, on a Riemannian spin manifold $(Y,g_Y)$ arise as critical points of the functional (see \cite{I}) \begin{equation*} S[\psi]=\int_Y\mathcal{L}[\psi]\,\mathrm{dvol}_{g_Y} \end{equation*} for the quartic Lagrangian \begin{equation*} \mathcal{L}[\psi]=\langle \psi,D^Y\psi\rangle -m|\psi|^2+\frac{1}{2}\lambda|\psi|^4. \end{equation*} This Lagrangian is related to the four-fermion interaction studied in the $2$-dimensional Gross--Neveu model \cite{GN}. \end{rem} In Section \ref{sect:Sasaki} we consider the special case where $(X,g_X)$ is a K\"ahler--Einstein surface. There are canonical $\mathrm{Spin}^c$-structures on $X$ with determinant line bundles $K$ and $K^{-1}$, defined by the complex structure $J$. The (perturbed) Seiberg--Witten equations for both $\mathrm{Spin}^c$-structures have canonical solutions $(A_0,\phi_0)$ with $|\phi_0|\equiv\mathrm{const}$. We show that $(Y,g_Y)$ (for a suitably rescaled length of the $S^1$-fibres) is a Sasaki $\eta$-Einstein manifold and the spinors $\phi_0$ lift to eigenspinors $\psi$ of the Dirac operator $D^Y$. In the special case that the Einstein constant of $g_X$ is equal to $6$, the manifold $(Y,g_Y)$ is Sasaki--Einstein and the spinors $\psi$ are Killing spinors. \begin{rem} Other generalizations of the Seiberg--Witten equations to $5$-manifolds can be found in \cite{DB}, \cite {KLW}, \cite{Pan}. \end{rem} \begin{conv} In the following all manifolds are smooth, connected and oriented. \end{conv} \section{Kaluza--Klein circle bundles}\label{sect:kk circle bundles} Let $(X^4,g_X)$ be a closed, oriented, Riemannian $4$-manifold and \begin{equation*} \pi\colon Y^5\longrightarrow X^4 \end{equation*} the oriented $S^1$-bundle with Euler class $e\in H^2(X;\mathbb{Z})$. The bundle $Y$ is a principal bundle with group action $Y\times S^1\rightarrow Y$. We denote by $K$ the vector field on $Y$ along the fibres, given by the infinitesimal action of a fixed element in the Lie algebra $\mathfrak{u}(1)$ of $S^1$, normalized such that the flow of $K$ has period $2\pi$. The manifold $X$ can be considered as the quotient $Y/S^1$ under the free circle action. We define a Riemannian metric $g_Y$ on $Y$ with the following Kaluza--Klein ansatz \cite{Bour}: Let $A\in\Omega^1(Y,i\mathbb{R})$ be a $\mathrm{U}(1)$-connection on the principal bundle $Y\rightarrow X$. Then $A$ is invariant under the circle action, \begin{equation*} L_KA=0 \end{equation*} and can be normalized such that \begin{equation*} A(K)\equiv i. \end{equation*} The curvature $2$-form $F_A\in \Omega^2(X,i\mathbb{R})$ satisfies \begin{equation*} \pi^*F_A=dA. \end{equation*} \begin{defn} The Riemannian metric \begin{equation*} g_Y=\pi^*g_X-A\otimes A \end{equation*} is called the Kaluza--Klein metric on $Y$. \end{defn} The metric $g_Y$ has the following properties: \begin{itemize} \item The horizontal bundle $H=\mathrm{ker}\,A$ is orthogonal to the circle fibres. \item $g_Y|_H=\pi^*g_X$. \item $g_Y(K,K)=1$, i.e.~the circle fibres have length $2\pi$. \item $K$ is a Killing vector field for $g_Y$, i.e.~$L_Kg_Y=0$. \end{itemize} The Kaluza--Klein metric $g_Y$ on $Y$ is completely characterized by these properties. Let $L\rightarrow X$ be the complex line bundle with $c_1(L)=e$. We can define $L$ as the complex line bundle associated to $Y$ via the standard representation of $S^1$ on $\mathbb{C}$. Then $L$ has a Hermitian metric and $Y$ can be thought of as the unit circle bundle in $L$. The connection $A$ on $Y$ induces a connection (covariant derivative) on $L$, also denoted by $A$. \begin{lem}\label{lem:tautological triv pi*L} The pullback $\pi^*L\rightarrow Y$ is a trivial complex line bundle which has a preferred, tautological trivialization. \end{lem} \begin{proof} The pullback $\pi^*Y$ is a principal $S^1$-bundle over $Y$ with total space given by \begin{equation*} \pi^*Y=\{(y,z)\in Y\times Y\mid \pi(y)=\pi(z)\} \end{equation*} and projection onto the first factor. A tautological section is \begin{align*} Y&\longrightarrow \pi^*Y\\ y&\longmapsto (y,y), \end{align*} which yields the trivialization \begin{align*} Y\times S^1&\longrightarrow \pi^*Y\\ (y,e^{it})&\longmapsto (y,ye^{it}) \end{align*} of $\pi^*Y$ and thus of $\pi^*L$. \end{proof} \begin{rem} The trivial principal bundle $\mathrm{pr}\colon Y\times S^1\rightarrow Y$ has a canonical flat $\mathrm{U}(1)$-connection $A_0$, so that the horizontal subspaces are tangent to the $Y$-fibres. This induces a canonical flat connection $A_0$ on $\pi^*L=\underline{\mathbb{C}}$. With respect to the tautological trivialization, a section $\sigma\colon Y\rightarrow \pi^*L$ is given by a smooth map $f\colon Y\rightarrow\mathbb{C}$ and \begin{equation*} \nabla^Y_{A_0}\sigma=df. \end{equation*} \end{rem} Lemma \ref{lem:tautological triv pi*L} implies that the pullback $\pi^*L^{\otimes n}$ for every $n\in\mathbb{Z}$ has a tautological trivialization. The bundles $L^{\otimes n}$ are the only complex line bundles on $X$ (up to isomorphism) whose pullback to $Y$ is trivial: \begin{lem}\label{lem:only bundles trivial lift Ln} The kernel of \begin{equation*} \pi^*\colon H^2(X;\mathbb{Z})\longrightarrow H^2(Y;\mathbb{Z}) \end{equation*} is $\mathbb{Z}e$. \end{lem} \begin{proof} This is a consequence of the following part of the Gysin sequence: \begin{equation*} H^0(X;\mathbb{Z})\stackrel{\cup e}{\longrightarrow}H^2(X;\mathbb{Z})\stackrel{\pi^*}{\longrightarrow} H^2(Y;\mathbb{Z}). \end{equation*} \end{proof} \begin{rem}\label{rem:pi* connections on C and Ln} The connection $A$ on $L$ induces a connection $A^{\otimes n}$ on $L^{\otimes n}$ and under the identification $\pi^*L^{\otimes n}=\underline{\mathbb{C}}$ the canonical flat connection $A_0$ is defined on $\pi^*L^{\otimes n}$. There is a canonical pullback on sections \begin{equation*} \pi^*\colon\Gamma(X,L^{\otimes n})\longrightarrow \Gamma(Y,\underline{\mathbb{C}}). \end{equation*} The connections $A^{\otimes n}$ and $A_0$ are related via $\pi^*$ and $\pi_*\colon TY\rightarrow TX$ (the relation involves a sign, cf.~\cite[Lemma 3.2]{Mor}). \end{rem} \section{Spin and $\mathrm{Spin}^c$-structures on manifolds} We collect some general background on spin and $\mathrm{Spin}^c$-structures (more details can be found, for example, in \cite{F}, \cite{LM}, \cite{Morgan}). Let $n\geq 3$ and $(M,g_M)$ be an oriented Riemannian manifold of dimension $n$. \subsection{Spin structures} For $n\geq 3$ the Lie group $\mathrm{SO}(n)$ has fundamental group $\mathbb{Z}_2$. The simply connected covering $\mathrm{Spin}(n)$ is a Lie group and the $2$-to-$1$ covering \begin{equation*} \lambda\colon\mathrm{Spin}(n)\longrightarrow\mathrm{SO}(n) \end{equation*} is a Lie group homomorphism. The kernel of $\lambda$ is $\mathbb{Z}_2\cong\{\pm 1\}$ and we can write \begin{equation*} \mathrm{Spin}(n)/\mathbb{Z}_2\cong\mathrm{SO}(n). \end{equation*} With respect to the Riemannian metric $g_M$ the set of oriented orthonormal frames in $TM$ forms a principal bundle $P_{\mathrm{SO}}(M)$ over $M$ with action \begin{equation*} P_{\mathrm{SO}}(M)\times\mathrm{SO}(n)\longrightarrow P_{\mathrm{SO}}(M). \end{equation*} A spin structure on $M$ is a principal bundle \begin{equation*} P_{\mathrm{Spin}}(M)\times\mathrm{Spin}(n)\longrightarrow P_{\mathrm{Spin}}(M) \end{equation*} over $M$ together with a smooth map $\mathfrak{s}\colon P_{\mathrm{Spin}}(M)\rightarrow P_{\mathrm{SO}}(M)$, so that the actions of $\mathrm{Spin}(n)$ and $\mathrm{SO}(n)$, the homomorphism $\lambda$ and the projections to $M$ are all compatible. A spin structure on $M$ exists if and only if \begin{equation*} w_2(M)=0, \end{equation*} where $w_2(M)=w_2(TM)\in H^2(M;\mathbb{Z}_2)$ is the second Stiefel-Whitney class of $TM$. Locally (e.g.~over open balls in $M$) spin structures always exist. Globally this may not be the case (if $TM$ is a non-trivial vector bundle). The (Dirac) spinor representation $\kappa_n$ is a special unitary representation of the Lie group $\mathrm{Spin}(n)$ on a complex vector space $\Delta_n$. Together with the principal bundle $P_{\mathrm{Spin}}(M)$ of a spin structure $\mathfrak{s}$ we get an associated complex vector bundle $S_M$, called the (Dirac) spinor bundle. There is a Clifford multiplication \begin{align*} TM\times S_M&\longrightarrow S_M\\ (V,\psi)&\longmapsto \gamma(V)\psi=V\cdot\psi, \end{align*} which extends to all differential forms on $M$. The Levi--Civita connection of the Riemannian metric $g_M$ defines a principal connection on $P_{\mathrm{Spin}}(M)$, because $\lambda_*\colon\mathfrak{spin}(n)\cong\mathfrak{so}(n)$, and a covariant derivative $\nabla^M$ on $S_M$. The covariant derivative together with the Clifford multiplication define the Dirac operator \begin{equation*} D^M\colon \Gamma(S_M)\longrightarrow \Gamma(S_M), \end{equation*} a first order linear differential operator. \subsection{$\mathrm{Spin}^c$-structures} We define \begin{equation*} \mathrm{Spin}^c(n)=(\mathrm{Spin}(n)\times \mathrm{U}(1))/\mathbb{Z}_2, \end{equation*} where the non-trivial element in $\mathbb{Z}_2$ acts as $(-1,-1)$. There are Lie group homomorphisms \begin{align*} \rho\colon\mathrm{Spin}^c(n)&\longrightarrow \mathrm{SO}(n)\\ [A,z]&\longmapsto \lambda(A) \end{align*} and \begin{align*} \chi\colon\mathrm{Spin}^c(n)&\longrightarrow \mathrm{U}(1)\\ [A,z]&\longmapsto z^2. \end{align*} A $\mathrm{Spin}^c$-structure on $M$ is a principal bundle \begin{equation*} P_{\mathrm{Spin}^c}(M)\times\mathrm{Spin}^c(n)\longrightarrow P_{\mathrm{Spin}^c}(M) \end{equation*} over $M$ together with a smooth map $\mathfrak{s}^c\colon P_{\mathrm{Spin}^c}(M)\rightarrow P_{\mathrm{SO}}(M)$, so that the actions of $\mathrm{Spin}^c(n)$ and $\mathrm{SO}(n)$, the homomorphism $\rho$ and the projections to $M$ are all compatible. For a $\mathrm{Spin}^c$-structure $\mathfrak{s}^c$ the representation $\chi$ defines a complex line bundle $L$ on $M$, called the characteristic line bundle or (in dimension $n=4$) the determinant line bundle\footnote{In the case $n=4$ the complex line bundle $L$ is the determinant of the Weyl spinor bundles.} of the $\mathrm{Spin}^c$-structure. We have \begin{equation*} w_2(M)\equiv c_1(L)\bmod 2. \end{equation*} Suppose that $\mathfrak{s}^c$ is a $\mathrm{Spin}^c$-structure. We can twist $\mathfrak{s}^c$ with a principal $\mathrm{U}(1)$-bundle $E$ to get a $\mathrm{Spin}^c$-structure $\mathfrak{s}^c\otimes E$. Every other $\mathrm{Spin}^c$-structure ${\mathfrak{s}^c}'$ can be obtained in this way (up to isomorphism) from $\mathfrak{s}^c$ with a unique $E$. The characteristic line bundles are related by $L'\cong L\otimes E^{\otimes 2}$, where $E$ is thought of as a complex line bundle. The spinor representation $\kappa_n$ of $\mathrm{Spin}(n)$ together with the standard representation of $\mathrm{U}(1)$ define the unitary (Dirac) spinor representation $\kappa_n^c$ of $\mathrm{Spin}^c(n)$ on the complex vector space $\Delta_n$. The $\mathrm{Spin}^c$-structure $\mathfrak{s}^c$ then yields an associated complex spinor bundle $S_M^c$ with a Clifford multiplication. The Levi--Civita connection of the Riemannian metric $g_M$ together with the choice of a Hermitian connection $A$ on $L$ define a covariant derivative $\nabla^M_A$ on $S_M^c$. The covariant derivative together with the Clifford multiplication define the Dirac operator \begin{equation*} D_A^M\colon \Gamma(S_M^c)\longrightarrow \Gamma(S_M^c). \end{equation*} A fundamental fact is the following: \begin{prop} Every oriented $4$-manifold $M$ admits a $\mathrm{Spin}^c$-structure. \end{prop} A proof can be found, e.g.~in \cite{GS} or \cite{Morgan}. \subsection{Relation between spin and $\mathrm{Spin}^c$-structures} \begin{prop}\label{prop:from spin to spinc} Let $\mathfrak{s}$ be a spin structure on $M$. Then $\mathfrak{s}$ determines a canonical $\mathrm{Spin}^c$-structure $\mathfrak{s}_0^c$ on $M$ with trivial characteristic line bundle. \end{prop} \begin{proof} We consider the homomorphism \begin{align*} \mu\colon \mathrm{Spin}(n)&\longrightarrow \mathrm{Spin}^c(n)\\ A&\longmapsto [A,1]. \end{align*} The associated fibre bundle \begin{equation*} P_{\mathrm{Spin}^c}(M)=P_{\mathrm{Spin}}(M)\times_\mu \mathrm{Spin}^c(n) \end{equation*} defines a $\mathrm{Spin}^c$-structure $\mathfrak{s}_0^c$. Since the composition $\chi\circ\mu$ is the trivial homomorphism to $\mathrm{U}(1)$, the characteristic line bundle of $\mathfrak{s}_0^c$ is trivial. \end{proof} \begin{rem} Let $\mathfrak{s}$ be a spin structure and $\mathfrak{s}_0^c$ the associated $\mathrm{Spin}^c$-structure with trivial characteristic line bundle. Every other $\mathrm{Spin}^c$-structure $\mathfrak{s}^c$ with characteristic line bundle $L$ is of the form $\mathfrak{s}^c\cong \mathfrak{s}_0^c\otimes E$ for a unique complex line bundle $E$, hence $L\cong E^{\otimes 2}$. The spin structure $\mathfrak{s}$ thus defines via $\mathfrak{s}_0^c$ a unique square root $E=L^{\scriptscriptstyle\frac{1}{2}}$ for the characteristic line bundle of every $\mathrm{Spin}^c$-structure $\mathfrak{s}^c$, so that $\mathfrak{s}^c\cong \mathfrak{s}_0^c\otimes L^{\scriptscriptstyle\frac{1}{2}}$. \end{rem} Conversely, we have: \begin{prop}\label{prop:from spinc to spin} Let $\mathfrak{s}^c$ be $\mathrm{Spin}^c$-structure on $M$ with trivial characteristic line bundle $L$. Then $\mathfrak{s}^c$ induces a (possibly not canonical) spin structure $\mathfrak{s}$ on $M$. \end{prop} \begin{proof}[Proof (Sketch)] The first Chern class $c_1(L)$ is the obstruction that the $\mathrm{Spin}^c$-structure lifts to a spin structure under the homomorphism $\mu$. A lift exists if and only if $c_1(L)=0$, i.e.~if $L$ is trivial. Such a lift can be constructed from a trivialization of $L$ over $M$. \end{proof} \subsection{Classification of spin and $\mathrm{Spin}^c$-structures} If $M$ is a spin manifold, then after choosing a reference spin structure, the set of all spin structures up to equivalence is bijective to $H^1(M;\mathbb{Z}_2)$. Suppose that $M$ admits a $\mathrm{Spin}^c$-structure. After choosing a reference $\mathrm{Spin}^c$-structure $\mathfrak{s}^c$, every other $\mathrm{Spin}^c$-structure can be obtained as $\mathfrak{s}^c\otimes E$ with a unique $\mathrm{U}(1)$-bundle $E$. Hence the set of all $\mathrm{Spin}^c$-structures up to equivalence is bijective to $H^2(M;\mathbb{Z})$. The classification of spin and $\mathrm{Spin}^c$-structures are related: Suppose that $\mathfrak{s}^c$ induces a spin structure, i.e.~$c_1(L)=0$. Then ${\mathfrak{s}^c}'=\mathfrak{s}^c\otimes E$ induces a spin structure if and only if $2c_1(E)=0$. Consider the following part \begin{equation*} H^1(M;\mathbb{Z})\stackrel{\bmod 2}{\longrightarrow}H^1(M;\mathbb{Z}_2)\stackrel{\beta}{\longrightarrow} H^2(M;\mathbb{Z})\stackrel{\cdot 2}{\longrightarrow}H^2(M;\mathbb{Z}) \end{equation*} of the Bockstein sequence for \begin{equation*} 0\longrightarrow\mathbb{Z}\stackrel{\cdot 2}{\longrightarrow}\mathbb{Z}\stackrel{\bmod 2}{\longrightarrow}\mathbb{Z}_2\longrightarrow 0. \end{equation*} It follows that $2c_1(E)=0$ if and only if $c_1(E)$ is in the image of the injection \begin{equation*} \beta\colon H^1(M;\mathbb{Z}_2)/(H^1(M;\mathbb{Z})\bmod 2)\hookrightarrow H^2(M;\mathbb{Z}). \end{equation*} The group $H^1(M;\mathbb{Z}_2)$ describes the set of spin structures and the group $H^1(M;\mathbb{Z})$ the set of different trivializations of a trivial complex line bundle. This shows that the non-uniqueness in Proposition \ref{prop:from spinc to spin} is related to the existence of different trivializations of the trivial characteristic line bundle $L$. \section{Spin and $\mathrm{Spin}^c$-structures on Kaluza--Klein circle bundles}\label{sect:spin spinc kk bundles} We continue with the setup from Section \ref{sect:kk circle bundles}. General arguments in \cite{AB}, \cite{Bor}, \cite{Mor} show (see also \cite{Amm}, \cite{Roo}, \cite{Sati}): \begin{prop}\label{prop:lift spin and spinc on kk bundles} Let $Y^5\rightarrow X^4$ be the principal circle bundle with Euler class $e$ and Kaluza--Klein metric. \begin{enumerate} \item Every spin structure $\mathfrak{s}_X$ on $X$ lifts canonically to a spin structure $\mathfrak{s}_Y$ on $Y$. \item Every $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ on $X$ lifts canonically to a $\mathrm{Spin}^c$-structure $\mathfrak{s}_Y^c$ on $Y$. The characteristic line bundle of $\mathfrak{s}_Y^c$ is the pullback of the characteristic line bundle of $\mathfrak{s}_X^c$. \end{enumerate} \end{prop} We are interested in the situation where the Euler class $e$ is determined by the characteristic line bundle of a $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ on $X$: \begin{prop}[cf.~\cite{Mor}]\label{prop:lift spins to spin kk} Let $\mathfrak{s}_X^c$ be a $\mathrm{Spin}^c$-structure on $X$ with characteristic line bundle $L$ and $Y\rightarrow X$ the principal circle bundle with Euler class $e=c_1(L)$. Let $\mathfrak{s}_Y^c$ be the canonical lift of $\mathfrak{s}_X^c$. The characteristic line bundle $\pi^*L$ of $\mathfrak{s}_Y^c$ has a tautological trivialization, hence $\mathfrak{s}_Y^c$ defines a canonical spin structure $\mathfrak{s}_Y$ on $Y$. The $\mathrm{Spin}^c$-structures $\mathfrak{s}_X^c\otimes L^{\otimes n}$, for $n\in\mathbb{Z}$, all lift to the same spin structure $\mathfrak{s}_Y$. \end{prop} \begin{proof} This follows from Lemma \ref{lem:tautological triv pi*L}, Lemma \ref{lem:only bundles trivial lift Ln}, Proposition \ref{prop:from spinc to spin} and Proposition \ref{prop:lift spin and spinc on kk bundles}. \end{proof} \begin{rem}[see \cite{MHDiss}] For an arbitrary circle bundle $Y\rightarrow X$ with Euler class $e$, the Whitney sum formula applied to the decomposition $TY=\pi^*TX\oplus\underline{\mathbb{R}}$, where $\underline{\mathbb{R}}$ is the trivial vertical line bundle, shows that \begin{equation*} w_2(Y)=\pi^*w_2(X). \end{equation*} The $\mathbb{Z}_2$-Gysin sequence implies that the kernel of $\pi^*$ on $H^2(X;\mathbb{Z}_2)$ is equal to $\{0,e\bmod 2\}$. In our case \begin{equation*} e=c_1(L)\equiv w_2(X)\bmod 2, \end{equation*} hence $Y$ is spin. Proposition \ref{prop:lift spins to spin kk} defines an explicit spin structure $\mathfrak{s}_Y$ on $Y$. \end{rem} \begin{rem}\label{rem:subtlety spin spinc lifts} Note the following subtlety: Suppose that $X$ is spin with spin structure $\mathfrak{s}_X$ and $\mathfrak{s}_X^c$ is a $\mathrm{Spin}^c$-structure on $X$ with characteristic line bundle $L$. There is a unique square root $L^{\scriptscriptstyle\frac{1}{2}}$, so that \begin{equation*} \mathfrak{s}_X^c\cong \mathfrak{s}_{0X}^c\otimes L^{\frac{1}{2}}. \end{equation*} Let $Y\rightarrow X$ be the circle bundle with Euler class $e=c_1(L)$. Then we can lift $\mathfrak{s}_X$ to a spin structure $\mathfrak{s}_Y$ and $\mathfrak{s}_X^c$ to a spin structure $\mathfrak{s}'_Y$ on $Y$. However, it is not always true that $\mathfrak{s}_Y$ and $\mathfrak{s}'_Y$ are the same spin structure. One reason is that the bundle $L^{\scriptscriptstyle\frac{1}{2}}$ lifts to the trivial complex line bundle on $Y$ if and only if \begin{equation*} L^{\frac{1}{2}}\cong L^{\otimes l} \end{equation*} for some $l\in\mathbb{Z}$, i.e.~$c_1(L^{\scriptscriptstyle\frac{1}{2}})$ has to have odd torsion, \begin{equation*} (2l-1)c_1(L^{\frac{1}{2}})=0. \end{equation*} Even then a trivialization of $\pi^*L^{\scriptscriptstyle\frac{1}{2}}$ may not be canonical. Another reason is that the lifts of both $\mathfrak{s}_{0X}^c$ and $\mathfrak{s}_X^c$ have trivial determinant line bundles on $Y$, but these bundles are trivialized differently: $\mathfrak{s}_Y$ is obtained by pulling back the trivial determinant line bundle of the spin structure $\mathfrak{s}_X$ on $X$ whereas $\mathfrak{s}'_Y$ is obtained by pulling back the determinant line bundle $L$ of $\mathfrak{s}_X^c$, which becomes trivial on $Y$ and is then trivialized tautologically. \end{rem} This problem is related to the question whether the spin structure $\mathfrak{s}_Y'$ is projectable or not. \subsection{Projectable and non-projectable spin structures} Suppose that $\mathfrak{s}_Y$ is an arbitrary spin structure on $Y$. We want to discuss whether it descends to a spin structure on $X$. This depends on whether the $S^1$-action on $P_{\mathrm{SO}}(Y)$ lifts to $P_{\mathrm{Spin}}(Y)$ (cf.~\cite{AH}, \cite{Bor}): We denote the isometric action of $S^1$ on $Y$ by \begin{align*} \Phi\colon Y\times S^1&\longrightarrow Y\\ (y,e^{it})&\mapsto ye^{it}. \end{align*} The induced action of $S^1$ on $P_{\mathrm{SO}}(Y)$ defines a smooth family of diffeomorphisms \begin{equation*} \alpha\colon P_{\mathrm{SO}}(Y)\times [0,2\pi]\longrightarrow P_{\mathrm{SO}}(Y) \end{equation*} that lifts to a smooth family of diffeomorphisms \begin{equation*} \tilde{\alpha}\colon P_{\mathrm{Spin}}(Y)\times [0,2\pi]\longrightarrow P_{\mathrm{Spin}}(Y) \end{equation*} because the manifold $P_{\mathrm{Spin}}(Y)$ is a double covering of $P_{\mathrm{SO}}(Y)$. We have $\alpha_0=\mathrm{Id}$ and specify the lift $\tilde{\alpha}$ uniquely by $\tilde{\alpha}_0=\mathrm{Id}$. Since $\alpha_{2\pi}=\mathrm{Id}$ and the bundles are connected manifolds there are two possibilities: \begin{itemize} \item $\tilde{\alpha}_{2\pi}=\mathrm{Id}$: the $S^1$-action then lifts to $P_{\mathrm{Spin}}(Y)$ and the spin structure $\mathfrak{s}_Y$ is called projectable (or even). It descends to a spin structure $\mathfrak{s}_X$ on $X$. The lift of $\mathfrak{s}_X$ as a spin structure is $\mathfrak{s}_Y$. \item $\tilde{\alpha}_{2\pi}$ is multiplication with $-1\in\mathrm{Spin}(5)$ in each fibre: the $S^1$-action then does not lift to $P_{\mathrm{Spin}}(Y)$ and the spin structure $\mathfrak{s}_Y$ is called non-projectable (odd). It does not descend to a spin structure on $X$. \end{itemize} \begin{rem}\label{rem:new action Phi hat} Note that in both cases the (non-free) action \begin{align*} \hat{\Phi}\colon Y\times S^1 &\longrightarrow Y\\ (y,e^{it})&\longmapsto ye^{2it} \end{align*} does lift to $P_{\mathrm{Spin}}(Y)$. \end{rem} \begin{rem} In the situation of Remark \ref{rem:subtlety spin spinc lifts} the spin structure $\mathfrak{s}_Y$ is projectable, but $\mathfrak{s}'_Y$ may be non-projectable. \end{rem} \begin{ex}[cf.~\cite{Sati}] We consider the manifold $S^1$ with the $S^1$-action \begin{align*} \Phi\colon S^1\times S^1&\longrightarrow S^1\\ (z,e^{it})&\longmapsto ze^{it}. \end{align*} There are two spin structures on $S^1$ corresponding to $H^1(S^1;\mathbb{Z}_2)=\mathbb{Z}_2$: We have $\mathrm{SO}(1)=\{1\}$ and \begin{equation*} \mathrm{Spin}(1)=\mathbb{Z}_2=\{\pm 1\}\subset \mathrm{Cl}(1)=\mathbb{R}1\oplus\mathbb{R}i=\mathbb{C} \end{equation*} (the spin group in dimension $1$ is not connected). The frame bundle $\mathrm{SO}(S^1)=S^1\times \{1\}$ is trivialized by the unit tangent vector $K$. A spin structure on $S^1$ is a double covering \begin{equation*} \mathfrak{s}\colon \mathrm{Spin}(S^1)\longrightarrow S^1\times \{1\}. \end{equation*} There are two cases: \begin{itemize} \item The trivial covering $\mathrm{Spin}(S^1)=S^1\times \mathbb{Z}_2$. The action $\Phi$ lifts to an action on $\mathrm{Spin}(S^1)$. \item The non-trivial covering: The action $\Phi$ does not lift. \end{itemize} The non-trivial covering is distinguished by the fact that it extends to a spin structure on $D^2$: note that $\mathrm{Spin}(2)\rightarrow \mathrm{SO}(2)$ is the non-trivial double covering. The unique spin structure on $D^2$ is the trivial one: \begin{equation*} \mathrm{Spin}(D^2)=D^2\times \mathrm{Spin}(2)\longrightarrow D^2\times \mathrm{SO}(2)=\mathrm{SO}(D^2). \end{equation*} On the boundary $S^1$ the vector field $K$ and an outward normal define an embedding \begin{equation*} \mathrm{SO}(S^1)\subset \mathrm{SO}(D^2)|_{S^1}, \end{equation*} and the preimage in $\mathrm{Spin}(D^2)|_{S^1}$ defines a spin structure on $S^1$. This is the non-trivial spin structure. \end{ex} \begin{rem}[cf.~\cite{Sati}] For the circle bundle $Y^5\rightarrow X^4$ let $Z^6$ be the associated unit disk bundle, so that $Y^5=\partial Z^6$: \begin{itemize} \item projectable spin structures on $Y$ restrict to the trivial spin structure on the $S^1$-fibres. They are pullbacks of spin structures on $X$, but do not extend to $Z$. \item non-projectable spin structures on $Y$ restrict to the non-trivial spin structure on the $S^1$-fibres. They do not descend to $X$, but they are the restriction of spin structures on $Z$. \end{itemize} \end{rem} To circumvent the discussion of non-projectable spin structures we use the following refinement of Proposition \ref{prop:lift spins to spin kk}. \begin{thm}[Construction of the circle bundle $Y\rightarrow X$]\label{thm:main construction Y from X spinc} Let $\mathfrak{s}_X^c$ be a $\mathrm{Spin}^c$-structure on $X$ with determinant line bundle $L$. \begin{itemize} \item If $X$ is non-spin, let $\pi\colon Y\rightarrow X$ the principal circle bundle with Euler class $e=c_1(L)$ and Kaluza--Klein metric. Then the $\mathrm{Spin}^c$-structures \begin{equation*} \mathfrak{s}_X^c\otimes L^{\otimes n},\quad\text{for $n\in\mathbb{Z}$}, \end{equation*} with determinant line bundle \begin{equation*} L^{\otimes (2n+1)}=L^{\otimes 2q},\quad q=n+\frac{1}{2}, \end{equation*} all lift canonically to the same spin structure $\mathfrak{s}_Y$ on $Y$. The spin structure $\mathfrak{s}_Y$ is non-projectable. \item If $X$ is spin and $\mathfrak{s}_X$ a spin structure, let $L^{\scriptscriptstyle\frac{1}{2}}$ the square root of $L$ determined by $\mathfrak{s}_X$. Let $\pi\colon Y\rightarrow X$ be the principal circle bundle with Euler class $e=c_1(L^{\scriptscriptstyle\frac{1}{2}})$ and Kaluza--Klein metric. Then $\mathfrak{s}_X$ lifts to a spin structure $\mathfrak{s}_Y$. The $\mathrm{Spin}^c$-structures \begin{equation*} \mathfrak{s}_X^c\otimes L^{\frac{1}{2}\otimes n},\quad\text{for $n\in\mathbb{Z}$}, \end{equation*} with determinant line bundle \begin{equation*} L^{\otimes (n+1)}=L^{\otimes q},\quad q=n+1, \end{equation*} all lift canonically to the same spin structure $\mathfrak{s}_Y$ on $Y$. The spin structure $\mathfrak{s}_Y$ projects to $\mathfrak{s}_X$. \end{itemize} \end{thm} \begin{rem} In the first case the $S^1$-action on $Y$ lifts to the $\mathrm{Spin}^c$-structure $\mathfrak{s}_Y^c$. The number $q\in\mathbb{Z}+\frac{1}{2}$ (if $X$ non-spin) and $q\in\mathbb{Z}$ (if $X$ spin) can be thought of as the $\mathrm{U}(1)$-charge of the $\mathrm{Spin}^c$-structure (cf.~\cite{W}). \end{rem} \begin{rem} In the case that $X$ is spin the circle bundle $Y$ is a $2$-fold covering of the circle bundle with Euler class $c_1(L)$. \end{rem} \section{Spinors on Kaluza--Klein circle bundles}\label{sect:spinors KK} Let $(X^4,g_X)$ be a closed, oriented, Riemannian $4$-manifold with $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ and $Y\rightarrow X$ the principal circle bundle with Kaluza--Klein metric $g_Y$ and canonically induced spin structure $\mathfrak{s}_Y$ given by Theorem \ref{thm:main construction Y from X spinc}. The Dirac spinor representation spaces $\Delta_4$ and $\Delta_5$ are both isomorphic to $\mathbb{C}^4$ and we get the Dirac spinor bundles \begin{align*} S_X^c&=P_{\mathrm{Spin}^c}(X)\times_{\kappa_4^c}\mathbb{C}^4\\ S_Y&=P_{\mathrm{Spin}}(Y)\times_{\kappa_5}\mathbb{C}^4. \end{align*} If $X$ is spin with spin structure $\mathfrak{s}_X$, there is also the spinor bundle \begin{equation*} S_X=P_{\mathrm{Spin}}(X)\times_{\kappa_4}\mathbb{C}^4. \end{equation*} Since the spinor representations are unitary, the spinor bundles carry Hermitian bundle metrics. The representation of $\mathrm{Spin}^c(4)$ on $\mathbb{C}^4$ preserves a splitting $\mathbb{C}^4=\mathbb{C}^2\oplus\mathbb{C}^2$, hence we get a decomposition \begin{equation*} S_X^c=S_X^{c+}\oplus S_X^{c-} \end{equation*} into positive and negative (Weyl) spinor bundles of complex rank $2$. Clifford multiplication with a tangent vector in $TX$ maps $S_X^{c\pm}$ to $S_X^{c\mp}$. There is a similar decomposition in the case of a spin structure $\mathfrak{s}_X$. The covariant derivative $\nabla^X_A$ preserves the subbundles $S_X^{c\pm}$, hence the Dirac operator maps \begin{equation*} D_A^X\colon\Gamma(S_X^{c\pm})\longrightarrow\Gamma(S_X^{c\mp}). \end{equation*} The construction of the lift $\mathfrak{s}_Y$ implies that we can identify (see \cite{Mor}) \begin{equation*} S_Y\cong\pi^*S_X^c \end{equation*} and thus lift spinors from $X$ to $Y$: \begin{align*} \pi^*\colon \Gamma(S_X^c)&\longrightarrow \Gamma(S_Y)\\ \phi&\longmapsto \pi^*\phi. \end{align*} Let $\mathrm{dvol}_{g_X}$ denote the canonical volume form of the oriented, Riemannian $4$-manifold $(X,g_X)$. \begin{lem}\label{lem:relation Clifford 4 and 5d} Clifford multiplication on the spinor bundles is related by \begin{align*} V^*\cdot\pi^*\phi&=\pi^*(V\cdot\phi)\\ K\cdot\pi^*\phi&=\pi^*(i\mathrm{dvol}_{g_X}\cdot \phi), \end{align*} for all $\phi\in\Gamma(S_X^c)$, where $V^*\in TY$ is the horizontal lift (with respect to the metric $g_Y$) of a tangent vector $V\in TX$ and $K$ is the vertical unit vector field along the $S^1$-fibres. \end{lem} \begin{rem} Note that Clifford multiplication satisfies \begin{align*} \mathrm{dvol}_{g_X}\cdot V\cdot \phi&=-V\cdot\mathrm{dvol}_{g_X}\cdot\phi\\ \mathrm{dvol}_{g_X}\cdot\mathrm{dvol}_{g_X}\cdot \phi&= \phi,\quad\forall V\in TX,\phi\in \Gamma(S_X^c). \end{align*} \end{rem} We want to determine the image of $\pi^*$ in $\Gamma(S_Y)$, i.e.~the spinors on $Y$ that come from spinors on $X$. We distinguish between the cases that $X$ is spin or non-spin (we follow the exposition in \cite{AB}; see also \cite{AmmDiss}, \cite{Amm}, \cite{Roo}). \subsection{$X$ is spin} The spin structure $\mathfrak{s}_Y$ is projectable, hence \begin{align*} \Phi\colon Y\times S^1 &\longrightarrow Y\\ (y,e^{it})&\longmapsto ye^{it} \end{align*} lifts to an action on $P_{\mathrm{Spin}}(Y)$ and defines an action \begin{equation*} \kappa\colon S_Y\times S^1\longrightarrow S_Y, \end{equation*} which induces a representation of $S^1$ on $L^2(S_Y)$. The vector field given by the infinitesimal action of $\Phi$ is $K$ and we can define a Lie derivative on spinors $\psi\in \Gamma(S_Y)$ by \begin{equation*} (L_K\psi)_y=\left.\frac{d}{dt}\right|_{t=0}\kappa(\psi_{ye^{it}},e^{-it})\quad\forall y\in Y, \end{equation*} which corresponds to the differential of the representation of $S^1$ on $L^2(S_Y)$. It follows that there is a decomposition \begin{equation*} L^2(S_Y)=\bigoplus_{k\in\mathbb{Z}}V_k, \end{equation*} where $V_k\subset L^2(S_Y)$ is the eigenspace of $L_K$ for the eigenvalue $ik$. A spinor $\psi\in \Gamma(S_Y)$ is an element of $V_k$, i.e.~ \begin{equation*} L_K\psi=ik\psi, \end{equation*} if and only if \begin{equation*} \kappa(\psi_y,e^{it})=e^{ik}\psi_{ye^{it}}\quad\forall y\in Y, t\in\mathbb{R}. \end{equation*} Note that \begin{equation*} S_X\cong S_X^c\otimes L^{-\frac{1}{2}}. \end{equation*} A construction in \cite{AB} shows: \begin{prop}\label{prop:isom Q spin} Suppose that $X$ is spin and the circle bundle $Y\rightarrow X$ chosen as in Theorem \ref{thm:main construction Y from X spinc}. Let $n\in\mathbb{Z}$ and $q=n+1$. Then there exists a canonical bundle map \begin{equation*} \Pi_{-q}\colon S_Y\longrightarrow S_X^c\otimes L^{\frac{1}{2}\otimes n} \end{equation*} that covers the projection $\pi\colon Y\rightarrow X$ and is fibrewise an isomorphism. It induces an isomorphism of Hilbert spaces \begin{equation*} Q_{-q}\colon L^2(S_X^c\otimes L^{\frac{1}{2}\otimes n})\longrightarrow V_{-q}\subset L^2(S_Y), \end{equation*} so that the following diagram commutes for each spinor $\phi\in\Gamma(S_X^c\otimes L^{\otimes \frac{1}{2}n})$: \begin{equation*} \begin{tikzcd} Y\ar[r, "Q_{-q}(\phi)"]\ar[d, "\pi"] & S_Y\ar[d, "\Pi_{-q}"]\\ X\ar[r, "\phi"]& S_X^c\otimes L^{\otimes \frac{1}{2}n} \end{tikzcd} \end{equation*} The map $Q_{-q}$ commutes with Clifford multiplication: \begin{equation*} Q_{-q}(V\cdot\phi)=V^*\cdot Q_{-q}(\phi), \quad \forall \phi\in\Gamma(S_X^c\otimes L^{\frac{1}{2}\otimes n})\, \end{equation*} for all $V\in \mathfrak{X}(X)$ with horizontal lift $V^*\in\mathfrak{X}(Y)$. \end{prop} In particular, there are isomorphisms \begin{equation*} Q_0\colon L^2(S_X)\longrightarrow V_0\subset L^2(S_Y). \end{equation*} and \begin{equation*} Q_{-1}\colon L^2(S_X^c)\longrightarrow V_{-1}\subset L^2(S_Y). \end{equation*} It follows that a spinor $\phi\in\Gamma(S_X)$ lifts to a spinor $\psi=\pi^*\phi\in\Gamma(S_Y)$ with \begin{equation*} L_K\psi=0 \end{equation*} and a spinor $\phi\in\Gamma(S_X^c)$ lifts to a spinor $\psi=\pi^*\phi\in\Gamma(S_Y)$ with \begin{equation*} L_K\psi=-i\psi. \end{equation*} \subsection{$X$ is non-spin} The spin structure $\mathfrak{s}_Y$ is non-projectable. In this case the action $S^1$-action on $Y$ only lifts to a family of diffeomorphisms $\tilde{\alpha}_t$ on $P_{\mathrm{Spin}}(Y)$ and thus to a family of maps \begin{equation*} \tilde{\kappa}\colon S_Y\times [0,2\pi]\longrightarrow S_Y \end{equation*} with \begin{align*} \tilde{\kappa}_0&=\mathrm{Id}_{S_Y}\\ \tilde{\kappa}_{2\pi}&=-\mathrm{Id}_{S_Y}. \end{align*} We can still define a Lie derivative on spinors $\psi\in \Gamma(S_Y)$ by \begin{equation*} (L_K\psi)_y=\left.\frac{d}{dt}\right|_{t=0}\tilde{\kappa}(\psi_{ye^{it}},-t)\quad\forall y\in Y. \end{equation*} According to Remark \ref{rem:new action Phi hat} the operator $L_{2K}$ comes from a representation of $S^1$ on $L^2(S_Y)$, but $L_K$ does not, hence the eigenvalues of $L_{2K}$ must be odd, i.e.~ \begin{equation*} L^2(S_Y)=\bigoplus_{k\in\mathbb{Z}}V_{k+\frac{1}{2}}, \end{equation*} where $V_{k+\frac{1}{2}}$ is the eigenspace of $L_K$ with eigenvalue $i(k+\frac{1}{2})$. \begin{prop}\label{prop:isom Q non-spin} Suppose that $X$ is non-spin and the circle bundle $Y\rightarrow X$ chosen as in Theorem \ref{thm:main construction Y from X spinc}. Let $n\in\mathbb{Z}$ and $q=n+\frac{1}{2}$. Then there exists a canonical bundle map \begin{equation*} \Pi_{-q}\colon S_Y\longrightarrow S_X^c\otimes L^{\otimes n} \end{equation*} that covers the projection $\pi\colon Y\rightarrow X$ and is fibrewise an isomorphism. It induces an isomorphism of Hilbert spaces \begin{equation*} Q_{-q}\colon L^2(S_X^c\otimes L^{\otimes n})\longrightarrow V_{-q}\subset L^2(S_Y), \end{equation*} so that the following diagram commutes for each spinor $\phi\in\Gamma(S_X^c\otimes L^{\otimes n})$: \begin{equation*} \begin{tikzcd} Y\ar[r, "Q_{-q}(\phi)"]\ar[d, "\pi"] & S_Y\ar[d, "\Pi_{-q}"]\\ X\ar[r, "\phi"]& S_X^c\otimes L^{\otimes n} \end{tikzcd} \end{equation*} The map $Q_{-q}$ commutes with Clifford multiplication: \begin{equation*} Q_{-q}(V\cdot\phi)=V^*\cdot Q_{-q}(\phi), \quad \forall \phi\in\Gamma(S_X^c\otimes L^{\otimes n}), \end{equation*} for all $V\in \mathfrak{X}(X)$ with horizontal lift $V^*\in\mathfrak{X}(Y)$. \end{prop} In particular, there is an isomorphism \begin{equation*} Q_{-\frac{1}{2}}\colon L^2(S_X^c)\longrightarrow V_{-\frac{1}{2}}\subset L^2(S_Y). \end{equation*} It follows that a spinor $\phi\in\Gamma(S_X^c)$ lifts to a spinor $\psi=\pi^*\phi\in\Gamma(S_Y)$ with \begin{equation*} L_K\psi=-\tfrac{1}{2}i\psi. \end{equation*} \begin{rem} Note that by Theorem \ref{thm:main construction Y from X spinc} in the non-spin case the $\mathrm{Spin}^c$-structures \begin{equation*} \mathfrak{s}_X^c\otimes L^{\otimes n},\quad\text{for $n\in\mathbb{Z}$}, \end{equation*} all lift canonically to the same spin structure $\mathfrak{s}_Y$ on $Y$ and in the spin case the $\mathrm{Spin}^c$-structures \begin{equation*} \mathfrak{s}_X^c\otimes L^{\frac{1}{2}\otimes n},\quad\text{for $n\in\mathbb{Z}$}, \end{equation*} also lift to the same spin structure $\mathfrak{s}_Y$. The construction of the isomorphism $Q_{-q}$ shows that spinors from the associated spinor bundles on $X$ lift to spinors in $\Gamma(S_Y)$ which can be distinguished by their eigenvalues under the Lie derivative $L_K$. \end{rem} \begin{rem} The decomposition \begin{equation*} S_X^c=S_X^{c+}\oplus S_X^{c-} \end{equation*} into positive and negative Weyl spinor bundles extends to all twisted spinor bundles $S_X^c\otimes L^{\otimes n}$ (in the non-spin case) and $S_X^c\otimes L^{\scriptscriptstyle\frac{1}{2}\otimes n}$ (in the spin case). Via $Q_{-q}$ we get corresponding decompositions \begin{equation*} V_{-q}=V_{-q}^+\oplus V_{-q}^- \end{equation*} of spinors in $\Gamma(S_Y)$. \end{rem} \begin{rem}\label{rem:choice of compatible Hermitian bundle metrics} We can choose the Hermitian bundle metrics on the spinor bundles $S_X^c\otimes L^{\otimes n}$, $S_X^c\otimes L^{\scriptscriptstyle\frac{1}{2}\otimes n}$ and $S_Y$ such that the bundle maps $\Pi_{-q}$ in Propositions \ref{prop:isom Q non-spin} and \ref{prop:isom Q spin} are isometries on each fibre. This choice is compatible with the relation between Clifford multiplication given by Lemma \ref{lem:relation Clifford 4 and 5d}. For spinors $\phi$ and $\psi=Q_{-q}(\phi)$, this implies \begin{equation*} |\psi|^2=|\phi|^2\circ\pi. \end{equation*} \end{rem} \section{Dirac operators} Let $(X^4,g_X)$ be a closed, oriented, Riemannian $4$-manifold with $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ and $Y\rightarrow X$ the principal circle bundle given by Theorem \ref{thm:main construction Y from X spinc}. \subsection{Clifford identities} We collect some identities involving Clifford multiplication. Let $\mathrm{dvol}_{g_X}$ denote the volume form of the oriented, Riemannian $4$-manifold $(X,g_X)$ and $\Omega^2_\pm(X,\mathbb{C})$ the self-dual and anti-self-dual $2$-forms on $X$, satisfying \begin{equation*} *\omega_\pm=\pm\omega_\pm,\quad\forall \omega_\pm\in \Omega^2_\pm(X), \end{equation*} where $*$ is the Hodge star operator. \begin{lem}\label{lem:clifford identities} The following identities for Clifford multiplication $\gamma$ hold: \begin{enumerate} \item For $\omega_\pm\in\Omega^2_\pm(X,\mathbb{C})$ we have \begin{equation*} \mathrm{dvol}_{g_X}\cdot\omega_\pm=\mp\omega_\pm \end{equation*} and \begin{equation*} \gamma(\omega_\pm) \in \mathrm{End}_{0}(S_X^{c\pm}), \end{equation*} where $\mathrm{End}_{0}(S_X^{c\pm})$ denotes the trace-free endomorphisms of $S_X^{c\pm}$. In particular, \begin{equation*} \gamma(\omega_-)\equiv 0\quad\text{on $S_X^{c+}$}. \end{equation*} \item For $\phi_\pm\in S_X^{c\pm}$ we have \begin{equation*} \mathrm{dvol}_{g_X}\cdot\phi_\pm=\mp \phi_\pm. \end{equation*} \item For $\phi\in S_X^c$ and $\psi=\pi^*\phi\in S_Y$ we have \begin{equation*} K\cdot\psi = \pi^*(i\mathrm{dvol}_{g_X}\cdot\phi). \end{equation*} \end{enumerate} \end{lem} \begin{proof} Identities (a) and (b) can be found references on Seiberg--Witten theory, e.g.~\cite{Morgan}. Identity (c) follows from Definition \ref{lem:relation Clifford 4 and 5d}. \end{proof} This implies: \begin{prop}\label{prop:clifford identities S+} Let $\phi\in \Gamma(S_X^{c+})$ be a positive Weyl spinor, $\psi=\pi^*\phi$ and $\omega\in \Omega^2(X,\mathbb{C})$ with self-dual part $\omega_+$. Then \begin{align*} K\cdot\psi&=-i\psi\\ K\cdot\pi^*\omega\cdot\psi&=-i\pi^*(\omega_+\cdot\phi). \end{align*} \end{prop} We now discuss the relation between the Dirac operators on $X$ and $Y$. \subsection{$X$ is spin} We choose a Hermitian connection $A$ on the square root $L^{\scriptscriptstyle\frac{1}{2}}$. The spinor bundle $S_X^c\otimes L^{\scriptscriptstyle \frac{1}{2}\otimes n}$ has determinant line bundle $L^{\scriptscriptstyle \otimes (n+1)}$. Let $A_n$ be the Hermitian connection on $L^{\scriptscriptstyle \otimes (n+1)}$ induced from the connection $A$. Together with $g_X$ this defines for all $n\in\mathbb{Z}$ the Dirac operator \begin{equation*} D_{A_n}^X\colon \Gamma(S_X^{c\pm}\otimes L^{\frac{1}{2}\otimes n})\longrightarrow \Gamma(S_X^{c\mp}\otimes L^{\frac{1}{2}\otimes n}). \end{equation*} The connection $A$ and Riemannian metric $g_X$ define the Kaluza--Klein metric $g_Y$ on $Y$, that yields the Dirac operator \begin{equation*} D^Y\colon \Gamma(S_Y)\longrightarrow \Gamma(S_Y). \end{equation*} The curvature $F_A\in\Omega^2(X,i\mathbb{R})$ satisfies \begin{equation*} \pi^*F_A=dA. \end{equation*} According to Proposition \ref{prop:isom Q spin} there is an isometry \begin{equation*} Q=Q_{-q}\colon L^2(S_X^c\otimes L^{\frac{1}{2}\otimes n})\longrightarrow V_{-q}\subset L^2(S_Y). \end{equation*} \begin{lem}\label{lem:AB calculation Dirac operator} The covariant derivatives on the spinor bundles $S_X^c\otimes L^{\frac{1}{2}\otimes n}$ and $S_Y$ are related by: \begin{align*} \nabla^Y_{V^*}Q(\phi)&=Q(\nabla_{A_nV}^X\phi)-\frac{1}{4}i\gamma(K)\gamma(\pi^*(i_VF_A))Q(\phi)\\ \nabla^Y_KQ(\phi)&=L_KQ(\phi)-\frac{1}{4}i\gamma(\pi^*F_A)Q(\phi), \end{align*} where $V\in TX$ with horizontal lift $V^*\in TY$. This implies for the Dirac operator $D^Y$ the formula \begin{equation*} D^YQ(\phi)=Q(D_{A_n}^X\phi)+\gamma(K)L_KQ(\phi)+\frac{1}{4}i\gamma(K)\gamma(\pi^*F_A)Q(\phi). \end{equation*} \end{lem} This is Lemma 4.3 and 4.4 in \cite{AB}. The claim for the Dirac operator follows from the formula \begin{equation*} \sum_{l=1}^4\gamma(e_l)\gamma(i_{e_l}F_A)=2\gamma(F_A), \end{equation*} where $\{e_l\}_{l=1}^4$ is a local orthonormal frame on $X$. \begin{rem} The same formula for the covariant derivative on $S_Y$ in the case of $q=\frac{1}{2}$ (in our case $X$ non-spin) has been proved in \cite[Proposition 3.2]{Mor}. For the calculations it is helpful to think of $S_Y$ as the spinor bundle of a $\mathrm{Spin}^c$-structure with canonically trivialized characteristic line bundle $\pi^*L^{\scriptscriptstyle \otimes (n+1)}=\underline{\mathbb{C}}$ and canonical flat connection $A_0$ on $\underline{\mathbb{C}}$. The calculation of $\nabla^Y$ then uses the formula for the $\mathrm{Spin}^c$-covariant derivative. The proofs in \cite{AB} and \cite{Mor} show that the connection $\nabla_{A_n}^X$ in the formula for $\nabla^Y_{V^*}Q(\phi)$ results from the relation between $A_0$ and $A_n$ (cf.~Remark \ref{rem:pi* connections on C and Ln}) and the curvature terms involving $i_VF_A$ and $F_A$ result from O'Neill formulae \cite{ON} for $\nabla^Y_{V^*}e_l^*$ and $\nabla^Y_{K}e_l^*$ for the Kaluza--Klein metric $g_Y$, where $\{e_l^*\}_{l=1}^4$ is the horizontally lifted frame. \end{rem} Recall that spinors $\psi\in V_{-q}$ satisfy \begin{equation*} L_K\psi=-qi\psi. \end{equation*} This implies (for the second statement we use Proposition \ref{prop:clifford identities S+}): \begin{prop}\label{prop:formula Dirac DY spin An} Set $q=n+1$. The restriction \begin{equation*} D^Y\colon V_{-q} \longrightarrow V_{-q} \end{equation*} is given by \begin{equation*} D^Y=Q\circ D_{A_n}^X\circ Q^{-1}-i\gamma(K)\left(q-\frac{1}{4}\gamma(\pi^*F_A)\right). \end{equation*} Using \begin{equation*} F_{A_n}=2qF_A, \end{equation*} the restriction \begin{equation*} D^Y\colon V_{-q}^+ \longrightarrow V_{-q} \end{equation*} for all $n\neq -1$ is given by \begin{equation*} D^Y=Q\circ \left(D_{A_n}^X-q+\frac{1}{8q}\gamma(F_{A_n}^+)\right)\circ Q^{-1}. \end{equation*} \end{prop} \subsection{$X$ is non-spin} We choose a Hermitian connection $A$ on the determinant line bundle $L$. The spinor bundle $S_X^c\otimes L^{\otimes n}$ has determinant line bundle $L^{\scriptscriptstyle \otimes (2n+1)}$. Let $A_n$ be the Hermitian connection on $L^{\scriptscriptstyle \otimes (2n+1)}$ induced from the connection $A$. Together with $g_X$ this defines for all $n\in\mathbb{Z}$ the Dirac operator \begin{equation*} D_{A_n}^X\colon \Gamma(S_X^{c\pm}\otimes L^{\otimes n})\longrightarrow \Gamma(S_X^{c\mp}\otimes L^{\otimes n}). \end{equation*} The connection $A$ and Riemannian metric $g_X$ define the Kaluza--Klein metric $g_Y$ on $Y$, that yields the Dirac operator \begin{equation*} D^Y\colon \Gamma(S_Y)\longrightarrow \Gamma(S_Y). \end{equation*} According to Proposition \ref{prop:isom Q non-spin} there is an isometry \begin{equation*} Q=Q_{-q}\colon L^2(S_X^c\otimes L^{\otimes n})\longrightarrow V_{-q}\subset L^2(S_Y). \end{equation*} Spinors $\psi\in V_{-q}$ satisfy \begin{equation*} L_K\psi=-qi\psi. \end{equation*} Lemma \ref{lem:AB calculation Dirac operator} again shows: \begin{prop}\label{prop:formula Dirac DY non-spin An} Set $q=n+\frac{1}{2}$. With $F_{A_n}=2qF_A$, the restriction \begin{equation*} D^Y\colon V_{-q}^+ \longrightarrow V_{-q} \end{equation*} is given by \begin{equation*} D^Y=Q\circ \left(D_{A_n}^X-q+\frac{1}{8q}\gamma(F_{A_n}^+)\right)\circ Q^{-1}. \end{equation*} \end{prop} \subsection{Formula for $D^Y$ for both $X$ spin and non-spin} \begin{cor}\label{cor:formula Dirac DY spin and non-spin} We combine the formulae in Propositions \ref{prop:formula Dirac DY non-spin An} and \ref{prop:formula Dirac DY spin An} by setting in both cases $m=-q\neq 0$. Then the Dirac operator \begin{equation*} D^Y\colon V_{-q}^+ \longrightarrow V_{-q} \end{equation*} is given by \begin{equation*} D^Y=Q\circ \left(D_{A_n}^X+m-\frac{1}{8m}\gamma(F_{A_n}^+)\right)\circ Q^{-1}. \end{equation*} \end{cor} \begin{rem} The reason for introducing $m$ follows from Corollary \ref{cor:main cor all n all r} and Remark \ref{rem:GN}. \end{rem} \begin{rem}\label{rem:Dirac operator DY DXA positive negative spinors} The Dirac operator $D_{A_n}^X$ maps positive spinors to negative spinors, whereas the constant term $m\cdot\mathrm{Id}$ and $\gamma(F_{A_n}^+)$ map positive spinors to positive spinors. This means that the Dirac operator $D^Y$ in general maps the lift of a positive spinor to the lift of a mixed spinor (Clifford multiplication with horizontal vectors in $TY$ interchanges lifts of positive and negative Weyl spinors, but the Clifford action of the vertical vector $K$, which acts as the volume form $\mathrm{dvol}_{g_X}$ on $X$, preserves the type of Weyl spinors). An equation of the form \begin{equation*} D^Y\psi_1=\psi_2, \end{equation*} where both $\psi_1$ and $\psi_2$ are lifts of positive spinors $\phi_1$ and $\phi_2$, therefore implies via the isomorphism $Q$ two equations: \begin{align*} D_{A_n}^X\phi_1&=0\\ \left(m-\frac{1}{8m}\gamma(F_{A_n}^+)\right)\phi_1&=\phi_2. \end{align*} \end{rem} \section{Lift of the Seiberg--Witten equations} \subsection{The Seiberg--Witten equations} Let $(X^4,g_X)$ be a closed, oriented, Riemannian $4$-manifold with a $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ and determinant line bundle $L$. We consider in this subsection a spinor $\phi\in\Gamma(S_X^{c+})$ and a Hermitian connection $A$ on $L$. The Seiberg--Witten equations \cite{W} for $(A,\phi)$ are \begin{align*} D_A^X\phi&=0\\ F_A^+&=\sigma(\phi,\phi). \end{align*} We follow the notation in \cite{Ko}. Here $\sigma(\phi,\phi)$ is the self-dual $2$-form in $\Omega^2_+(X,i\mathbb{R})$ which under the fibrewise isomorphism \begin{equation}\label{eqn:isom Omega2+ EndSX+} \gamma\colon \Omega^2_+(X,\mathbb{C})\longrightarrow \mathrm{End}_{0}(S_X^{c+}) \end{equation} corresponds to the trace-free endomorphism \begin{equation*} \gamma(\sigma(\phi,\phi))=(\phi\otimes \phi^\dagger)_0=\phi\otimes \phi^\dagger-\frac{1}{2}\mathrm{Tr}(\phi\otimes \phi^\dagger)\mathrm{Id}. \end{equation*} Using an explicit representation of the spinor space $\Delta_4$ as a module over the Clifford algebra $\mathbb{C}\mathrm{l}(4)$ it can be shown \cite{Morgan} that $\gamma$ maps the real forms $\Omega^2_+(X,\mathbb{R})$ isomorphically onto the skew-Hermitian trace-free endomorphisms of $S_X^{+c}$. The imaginary valued forms $\Omega^2_+(X,i\mathbb{R})$ thus map isomorphically onto the Hermitian trace-free endomorphisms of $S_X^{+c}$. Hence $\sigma(\phi,\phi)$ is indeed a form in $\Omega^2_+(X,i\mathbb{R})$. We also get: \begin{lem}\label{lem:gamma(tau) kernel} Let $p\in X$, $\tau_p\in i\Lambda^2_+T_p^*X$ and $\phi_p\in S_{Xp}^{c+}$. Then the following holds: \begin{equation*} \gamma(\tau_p)\phi_p=0 \Leftrightarrow \tau_p=0\text{ or }\phi_p=0. \end{equation*} \end{lem} \begin{proof} This follows from the formula \begin{equation*} \gamma(\tau_p)\gamma(\tau_p)\phi_p=2|\tau_p|^2\phi_p, \end{equation*} that holds for all $\tau_p,\phi_p$ as in the statement of the lemma. \end{proof} \begin{lem}\label{lem:sigma(phi,phi)phi} For $\phi\in \Gamma(S_X^{c+})$ we have \begin{equation*} \gamma(\sigma(\phi,\phi))\phi=\tfrac{1}{2}|\phi|^2\phi. \end{equation*} \end{lem} \begin{proof} With respect to a local orthonormal frame for $S_X^{c+}$ we can write (see \cite{Ko}) \begin{equation*} \phi=\left(\begin{array}{c} \alpha \\ \beta \end{array}\right)\in \mathbb{C}^2,\quad \gamma(\sigma(\phi,\phi))=\left(\begin{array}{cc} \tfrac{1}{2}(|\alpha|^2-|\beta|^2) & \alpha\bar{\beta} \\ \bar{\alpha}\beta & \tfrac{1}{2}(|\beta|^2-|\alpha|^2) \end{array}\right), \end{equation*} hence the action of $\sigma(\phi,\phi)$ on $\phi$ is given by \begin{align*} \gamma(\sigma(\phi,\phi))\phi&=\left(\begin{array}{cc} \tfrac{1}{2}(|\alpha|^2-|\beta|^2) & \alpha\bar{\beta} \\ \bar{\alpha}\beta & \tfrac{1}{2}(|\beta|^2-|\alpha|^2) \end{array}\right)\left(\begin{array}{c} \alpha \\ \beta \end{array}\right)\\ &=\tfrac{1}{2}(|\alpha|^2+|\beta|^2)\left(\begin{array}{c} \alpha \\ \beta \end{array}\right). \end{align*} \end{proof} One often considers the more general Seiberg--Witten equations \begin{align*} D_A^X\phi&=0\\ F_A^+&=\sigma(\phi,\phi)+\mu, \end{align*} where $\mu\in \Omega^2_+(X,i\mathbb{R})$ is an arbitrary perturbation. \begin{prop}\label{prop:equiv SW multiplied phi} If $(A,\phi)$ satisfy \begin{equation}\label{eqn:SW FA omega} F_A^+=\sigma(\phi,\phi)+\mu, \end{equation} then \begin{equation}\label{eqn:SW FA omega applied phi} \gamma(F_A^+)\phi=\left(\tfrac{1}{2}|\phi|^2+\gamma(\mu)\right)\phi. \end{equation} Conversely suppose that $(A,\phi)$ satisfy equation \eqref{eqn:SW FA omega applied phi} and \begin{equation*} D_A^X\phi=0. \end{equation*} If $\phi$ does not vanish identically on $X$, then $(A,\phi)$ satisfy equation \eqref{eqn:SW FA omega}. \end{prop} \begin{proof} The first claim is immediate by Lemma \ref{lem:sigma(phi,phi)phi}. For the converse, equation \eqref{eqn:SW FA omega applied phi} implies \begin{equation*} \gamma(F_A^+-\sigma(\phi,\phi)-\mu)\phi=0. \end{equation*} Lemma \ref{lem:gamma(tau) kernel} implies that equation \eqref{eqn:SW FA omega} holds in all points $p\in X$ where $\phi_p$ is non-zero. Suppose that $F_A^+-\sigma(\phi,\phi)-\mu$ is non-zero in some point $p\in X$. Then by continuity it is non-zero also in a small open neighbourhood $U$ of $p$. Hence $\phi$ has to vanish on $U$. Since by assumption $\phi$ does not vanish identically on $X$ and $D_A^X\phi=0$, this contradicts a theorem in \cite{Baer} that the zero set of a harmonic spinor $\phi$ of a generalized Dirac operator is a countably $2$-rectifiable set in $X$ and thus has Hausdorff dimension at most $2$. Therefore equation \eqref{eqn:SW FA omega} holds in all points of $X$. \end{proof} \subsection{Main theorem} We can now state our main theorem. We first summarize the constructions in previous sections in the following definition. \begin{defn}\label{defn:main thm constructions} Let $(X^4,g_X)$ be a closed, oriented, Riemannian $4$-manifold and $\mathfrak{s}^c_X$ a $\mathrm{Spin}^c$-structure on $X$ with determinant line bundle $L$. We make the following definitions depending on whether $X$ is non-spin or spin: \begin{enumerate} \item The principal circle bundle $\pi\colon Y\rightarrow X$ with Euler class $e$ and a Hermitian connection $A$ given by Table \ref{table:circle bundle Y over X} (if $X$ is spin, $L^{\scriptscriptstyle\frac{1}{2}}$ is determined by the choice of a spin structure $\mathfrak{s}_X$). \begin{table}[h] \renewcommand{\arraystretch}{1.5} \begin{tabular}{lcc} $X$ & Euler class $e$ of $Y$ & connection $A$ on \\ \hline non-spin & $c_1(L)$ & $L$ \\ \hline spin & $c_1(L^{\scriptscriptstyle\frac{1}{2}})$ & $L^{\scriptscriptstyle\frac{1}{2}}$ \\ \hline \end{tabular} \caption{Circle bundle $\pi\colon Y\rightarrow X$} \label{table:circle bundle Y over X} \end{table} \item The Kaluza--Klein metric \begin{equation*} g_Y=\pi^*g_X-A\otimes A \end{equation*} on $Y$. \item The $\mathrm{Spin}^c$-structures $\mathfrak{s}_{Xn}^c$ on $X$ given by Table \ref{table:Spinc structures}, which all lift to the same spin structure $\mathfrak{s}_Y$ on $Y$, and the corresponding spinor bundles $S^c_{Xn}$ and $S_Y$. \begin{table}[h] \renewcommand{\arraystretch}{1.5} \begin{tabular}{lcccc} $X$ & charge $q$ & $\mathrm{Spin}^c$-structure $\mathfrak{s}_{Xn}^c$ & det.~line bundle $L_n$ & $n$ \\ \hline non-spin & $n+\frac{1}{2}$ & $\mathfrak{s}_X^c\otimes L^{\otimes n}$ & $L^{\otimes (2n+1)}=L^{\otimes 2q}$ & $n\in \mathbb{Z}$ \\ \hline spin & $n+1$ & $\mathfrak{s}_X^c\otimes L^{\frac{1}{2}\otimes n}$ & $L^{\otimes (n+1)}=L^{\otimes q}$ & $n\in\mathbb{Z}\setminus\{-1\}$ \\ \hline \end{tabular} \caption{$\mathrm{Spin}^c$-structures on $X$} \label{table:Spinc structures} \end{table} \item For a positive Weyl spinor $\phi\in\Gamma(S^{c+}_{Xn})$ the lift $\psi=Q(\phi)\in\Gamma(S_Y)$. \item The Hermitian connection $A_n$ on the complex line bundle $L_n$ determined by $A$. \item Set $m=-q$. \end{enumerate} \end{defn} \begin{thm}\label{thm:main thm all n} Let $(X^4,g_X)$ be a closed, oriented, Riemannian $4$-manifold and $\mathfrak{s}^c_X$ a $\mathrm{Spin}^c$-structure on $X$ with determinant line bundle $L$. With the notations from Definition \ref{defn:main thm constructions} let $\pi\colon Y\rightarrow X$ be the principal circle bundle with Euler class $e$, $\phi\in\Gamma(S^{c+}_{Xn})$ a positive Weyl spinor with lift $\psi=Q(\phi)\in\Gamma(S_Y)$ and $A_n$ the Hermitian connection on $L_n$ determined by a Hermitian connection $A$. If $(A_n,\phi)$ satisfy the Seiberg--Witten equations \begin{equation}\label{eqn:main thm SW eqns} \begin{split} D_{A_n}^X\phi&=0\\ F_{A_n}^+&=\sigma(\phi,\phi)+\mu \end{split} \end{equation} with perturbation $\mu\in\Omega^2_+(X,i\mathbb{R})$, then $\psi$ satisfies \begin{equation}\label{eqn:DY equivalent SW eqns} D^Y\psi=-\frac{1}{16m}|\psi|^2\psi+m\psi-\frac{1}{8m}\gamma(\pi^*\mu)\psi. \end{equation} Conversely, if this equation holds and $\psi$ does not vanish identically on $Y$, then $(A_n,\phi)$ satisfy the Seiberg--Witten equations. \end{thm} \begin{proof} The proof follows from Theorem \ref{thm:main construction Y from X spinc}, Propositions \ref{prop:isom Q spin} and \ref{prop:isom Q non-spin}, Remark \ref{rem:choice of compatible Hermitian bundle metrics}, Corollary \ref{cor:formula Dirac DY spin and non-spin}, Remark \ref{rem:Dirac operator DY DXA positive negative spinors} and Proposition \ref{prop:equiv SW multiplied phi}. \end{proof} \begin{rem} Theorem \ref{thm:main thm n=1} is the special case of Theorem \ref{thm:main thm all n} for $n=1$ and $\mu=0$. \end{rem} \begin{rem} If $X$ is spin, we exclude $n=-1$ which corresponds to the case where $S_X^c\otimes L^{\scriptscriptstyle-\frac{1}{2}}=S_X$ is the spinor bundle of the spin structure with trivial determinant line bundle and $A_{-1}$ is the trivial connection, independent of $A$. In this situation the curvature $F_A$ cannot be recovered from the curvature $F_{A_{-1}}=0$. Theorem \ref{thm:main thm all n} remains valid in the case that $X$ is spin and $S_X^c=S_X$ if $L^{\scriptscriptstyle\frac{1}{2}}$ is the trivial complex line bundle, $Y=X\times S^1$ and $A$ an arbitrary Hermitian connection on $L^{\scriptscriptstyle\frac{1}{2}}$. \end{rem} \subsection{Kaluza--Klein metrics with varying length of circle fibres} The Kaluza--Klein metric can be generalized as follows: Let $r\colon X\rightarrow \mathbb{R}$ be a smooth positive function on $X$ and $\hat{r}=r\circ\pi$. Then \begin{equation*} g_Y=\pi^*g_X-\hat{r}^2A\otimes A \end{equation*} is again a Riemannian metric on $Y$. The only difference to the original metric is that \begin{equation*} g_Y(K,K)=\hat{r}^2, \end{equation*} i.e.~the circle fibres over a point $x\in X$ have length $2\pi r(x)$. In the physics literature $r$ is written as $r=e^{\varphi}$ and the scalar field $\varphi\colon X\rightarrow \mathbb{R}$ is sometimes called the dilaton. The vector field $\frac{1}{\hat{r}}K$ has unit length, hence the relation in Lemma \ref{lem:relation Clifford 4 and 5d} between Clifford multiplication on the spinor bundles is given by \begin{align*} V^*\cdot\pi^*\phi&=\pi^*(V\cdot\phi)\\ \tfrac{1}{\hat{r}}K\cdot\pi^*\phi&=\pi^*(i\mathrm{dvol}_{g_X}\cdot \phi), \end{align*} under the identification \begin{align*} \pi^*\colon \Gamma(S_X^c)&\longrightarrow \Gamma(S_Y)\\ \phi&\longmapsto \pi^*\phi. \end{align*} The formulae in Proposition \ref{prop:clifford identities S+} change accordingly to \begin{align*} \tfrac{1}{\hat{r}}K\cdot\psi&=-i\psi\\ \tfrac{1}{\hat{r}}K\cdot\pi^*\omega\cdot\psi&=-i\pi^*(\omega_+\cdot\phi). \end{align*} The formula in Corollary \ref{cor:formula Dirac DY spin and non-spin} for the Dirac operator $D^Y$ then becomes (see \cite{AB} for the case of constant $r$ and \cite{Amm} for the general case) \begin{align*} D^Y&=Q\circ D_{A_n}^X\circ Q^{-1}-i\gamma\left(\tfrac{1}{\hat{r}}K\right)\left(\tfrac{1}{\hat{r}}q-\tfrac{1}{4}\hat{r}\gamma(\pi^*F_A)\right)\\ &=Q\circ \left(D_{A_n}^X-\frac{1}{\hat{r}}q+\frac{1}{8q}\hat{r}\gamma(F_{A_n}^+)\right)\circ Q^{-1}, \end{align*} with $q$ as before. We then get: \begin{cor}\label{cor:main cor all n all r} Consider the Kaluza--Klein metric \begin{equation*} g_Y=\pi^*g_X-\hat{r}^2A\otimes A \end{equation*} with a smooth positive function $r\colon X\rightarrow \mathbb{R}$ and $\hat{r}=r\circ\pi$. Define a function $m_r\colon Y\rightarrow\mathbb{R}$ by $m_r=-\frac{q}{\hat{r}}$, where \begin{itemize} \item $q=n+\frac{1}{2}$ (if $X$ is non-spin), and \item $q=n+1$ (if $X$ is spin) \end{itemize} is defined as before. Then $m_r$ is nowhere zero on $X$ (since $q\neq 0$) and the statements in Theorem \ref{thm:main thm all n} and equation \eqref{eqn:DY equivalent SW eqns} hold with $m=m_r$: \begin{equation}\label{eqn:DY equivalent SW eqns gen r} D^Y\psi=-\frac{1}{16m}|\psi|^2\psi+m\psi-\frac{1}{8m}\gamma(\pi^*\mu)\psi. \end{equation} \end{cor} \begin{rem}\label{rem:GN} Suppose that $\mu=0$ and the circle radius $r$ is constant. Then equation \eqref{eqn:DY equivalent SW eqns gen r} \begin{equation*} D^Y\psi=-\frac{1}{16m}|\psi|^2\psi+m\psi \end{equation*} is the field equation of a $5$-dimensional Gross--Neveu model \cite{GN} (in Euclidean signature) with mass $m$ and coupling constant $g^2=\frac{1}{16m}$, given by the Lagrangian \begin{equation}\label{eqn:GN Lagrangian} \mathcal{L}[\psi]=\langle \psi,D^Y\psi\rangle -m|\psi|^2+\frac{1}{32m}|\psi|^4, \end{equation} where $\langle\cdot\,,\cdot\rangle$ is the Hermitian bundle metric on $S_Y$. Note that $m<0$ and $g^2<0$ if $q>0$. (The spinor $\phi$ on $X$ has charge $q$ and mass zero and the spinor $\psi$ on $Y$ has mass $m=-\frac{q}{r}$ and charge zero. If $r\ll |q|$, then the absolute value $|m|$ of the mass of $\psi$ is large and if $r\gg |q|$, then $|m|$ is small. The interaction described by the term $\frac{1}{32m}|\psi|^4$ behaves in the opposite way.) \end{rem} \begin{rem}\label{rem:Ricci calc} Suppose that $r>0$ is constant and \begin{equation*} g_Y=\pi^*g_X-r^2A\otimes A \end{equation*} the Kaluza--Klein metric. Then the circle fibres of $\pi\colon Y\rightarrow X$ are totally geodesic. For the curvature $2$-form $F_A\in\Omega^2(X,i\mathbb{R})$ and vectors $V,W\in T_pX$ define \begin{align*} g_X(i_VF_A,i_WF_A)&=\sum_{j=1}^4\tfrac{1}{i}F_A(V,e_j)\tfrac{1}{i}F_A(W,e_j)\\ |F_A|^2&=\sum_{i<j}(\tfrac{1}{i}F_A(e_i,e_j))^2=\frac{1}{2}\sum_{i=1}^4g_X(i_{e_i}F_A,i_{e_i}F_A), \end{align*} where $\{e_i\}_{i=1}^4$ is an orthonormal frame in $T_pX$. The Ricci curvature of $g_Y$ then satisfies (see \cite[Chapter 9]{Besse}) \begin{align*} \mathrm{Ric}_{g_Y}(\tfrac{1}{r}K,\tfrac{1}{r}K)&=\frac{1}{2}r^2|F_A|^2\\ \mathrm{Ric}_{g_Y}(V^*,W^*)&=\mathrm{Ric}_{g_X}(V,W)-\frac{1}{2}r^2g_X(i_VF_A,i_WF_A),\quad\forall V,W\in TX. \end{align*} If $F_A$ is coclosed and thus harmonic, we have in addition \begin{equation*} \mathrm{Ric}_{g_Y}(\tfrac{1}{r}K,V^*)=0\quad\forall V\in TX. \end{equation*} \end{rem} \section{Charge conjugation}\label{subsect:charge conjugation} Charge conjugation is an involution on the set of $\mathrm{Spin}^c$-structures on $X$ \begin{equation*} \mathfrak{s}_X^c\longmapsto \bar{\mathfrak{s}}_X^c \end{equation*} that acts on the determinant line bundles as \begin{equation*} L\longmapsto \bar{L}=L^{-1}. \end{equation*} There is an induced complex anti-linear bundle automorphism \begin{align*} S_X^{c\pm}&\longrightarrow \bar{S}_X^{c\pm}\\ \phi&\longmapsto \bar{\phi} \end{align*} and a complex anti-linear isomorphism on the space of sections \begin{equation*} \Gamma(S_X^{c\pm})\longrightarrow \Gamma(\bar{S}_X^{c\pm}). \end{equation*} Clifford multiplication with a real tangent vector $V\in TX$ is related by \begin{equation*} V\cdot\bar{\phi}=\overline{(V\cdot\phi)},\quad iV\cdot\bar{\phi}=-\overline{(iV\cdot\phi)}. \end{equation*} We also get a mapping between Hermitian connections on $L$ and $L^{-1}$ \begin{equation*} A\longmapsto \bar{A} \end{equation*} with \begin{equation*} F_A=-F_{\bar{A}}\in\Omega^2(X,i\mathbb{R}). \end{equation*} The Seiberg--Witten equations are invariant under charge conjugation, i.e.~if $(A,\phi)$ is a solution to the Seiberg--Witten equations for a $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ with parameters $(g_X,\mu)$, then $(\bar{A},\bar{\phi})$ is a solution to the Seiberg--Witten equations for $\bar{\mathfrak{s}}_X^c$ with parameters $(g_X,\bar{\mu})$, where \begin{equation*} \bar{\mu}=-\mu. \end{equation*} In the situation of Theorem \ref{thm:main thm all n} let $\bar{Y}\rightarrow X$ be the principal circle bundle with Euler class $\bar{e}=-e$. Then $\bar{Y}$ is diffeomorphic to $Y$, but the $S^1$-action is reversed: \begin{align*} Y\times S^1&\longrightarrow Y\\ (y,e^{it})&\longmapsto ye^{-it}. \end{align*} This implies for the vector field generating the $S^1$-action \begin{equation}\label{eqn:barK K} \bar{K}=-K. \end{equation} The connection $\bar{A}$, considered as a $1$-form $\bar{A}\in\Omega^1(Y,i\mathbb{R})$, is given by \begin{equation*} \bar{A}=-A. \end{equation*} In particular, $\bar{A}$ defines the same Kaluza--Klein metric $g_Y$ on $Y$ as $A$. The $\mathrm{Spin}^c$-structure $\bar{\mathfrak{s}}_X^c$ lifts to a spin structure $\mathfrak{s}_{\bar{Y}}$ on $Y$ with spinor bundle $S_{\bar{Y}}$. We can identify \begin{equation*} S_{\bar{Y}}= \pi^*\bar{S}_X^c. \end{equation*} For a spinor $\phi\in \Gamma(S_X^c)$ let \begin{align*} \psi&=\pi^*\phi\in \Gamma(S_Y)\\ \bar{\psi}&=\pi^*\bar{\phi}\in \Gamma(S_{\bar{Y}}) \end{align*} be the lifts. Then Lemma \ref{lem:relation Clifford 4 and 5d} and equation \eqref{eqn:barK K} show that \begin{equation*} W\cdot \bar{\psi}=\overline{W\cdot \psi}\quad \forall W\in TY. \end{equation*} Hence there is complex anti-linear isomorphism of Clifford modules \begin{align*} S_Y&\longrightarrow S_{\bar{Y}}\\ \psi&\longmapsto \bar{\psi}. \end{align*} The Kaluza--Klein metric $g_{\bar{Y}}=g_Y$ on $Y$ yields a Dirac operator \begin{equation*} D^{\bar{Y}}\colon\Gamma(S_{\bar{Y}})\longrightarrow \Gamma(S_{\bar{Y}}). \end{equation*} The $\mathrm{Spin}^c$-structures \begin{equation*} \bar{\mathfrak{s}}_X^c\otimes L^{\otimes (-n)},\quad\text{for $n\in\mathbb{Z}$}\quad\text{(if $X$ is non-spin)}, \end{equation*} and \begin{equation*} \bar{\mathfrak{s}}_X^c\otimes L^{\frac{1}{2}\otimes (-n)},\quad\text{for $n\in\mathbb{Z}\setminus\{-1\}$}\quad\text{(if $X$ is spin)}, \end{equation*} all lift to the same spin structure $\mathfrak{s}_{\bar{Y}}$ on $Y$ with spinor bundle $S_{\bar{Y}}$. Define \begin{equation*} \bar{q}=-q,\quad \bar{m}=-m. \end{equation*} \begin{cor} Consider the spinor bundles $S_Y$ and $S_{\bar{Y}}$ on $Y$. In the situation of Theorem \ref{thm:main thm all n} let $(A_n,\phi)$ be a solution to the Seiberg--Witten equations and $\psi=Q(\phi)\in\Gamma(S_Y)$ the associated solution of \begin{equation*} D^Y\psi=-\frac{1}{16m}|\psi|^2\psi+m\psi-\frac{1}{8m}\gamma(\pi^*\mu)\psi. \end{equation*} Then $\bar{\psi}=Q(\bar{\phi})\in\Gamma(S_{\bar{Y}})$ is a solution of \begin{equation*} D^{\bar Y}\bar{\psi}=-\frac{1}{16\bar{m}}|\bar{\psi}|^2\bar{\psi}+\bar{m}\bar{\psi}-\frac{1}{8m}\gamma(\pi^*\bar{\mu})\bar{\psi}. \end{equation*} \end{cor} \section{K\"ahler--Einstein $4$-manifolds and eigenspinors on Sasaki $5$-manifolds}\label{sect:Sasaki} Spinors $\psi=Q(\phi)$ of constant length are an interesting case of equation \eqref{eqn:DY equivalent SW eqns gen r} (e.g.~for perturbation $\mu=0$): \begin{align*} |\psi|^2&\equiv a^2,\quad\text{with $a>0$}\\ D^Y\psi&=\left(-\frac{1}{16m}a^2+m\right)\psi. \end{align*} Hence $\psi$ is an eigenspinor of $D^Y$. \begin{rem} In the special case that $a=4|m|$, the spinor $\psi$ is harmonic, $D^Y\psi=0$. The points $x=\pm 4|m|$ are the non-zero extrema of the potential \begin{equation*} V(x)=-mx^2+\frac{1}{32m}x^4 \end{equation*} appearing in the Gross--Neveu Lagrangian \eqref{eqn:GN Lagrangian} (which are minima for $m>0$ and maxima for $m<0$). \end{rem} Suppose that $\phi\in \Gamma(S_X^{c+})$ is an arbitrary spinor and $\psi=Q(\phi)$. Then $|\psi|\equiv a$ is equivalent to $|\phi|\equiv a$. Positive Weyl spinors $\phi$ of constant length are related to almost complex structures on $X$: Suppose that $J$ is a $g_X$-compatible almost complex structure on $X$, so that \begin{equation*} g_X(JV,JW)=g_X(V,W)\quad\forall V,W\in TX. \end{equation*} Then there exists a canonical $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\mathrm{can}}^c$ on $X$ with spinor bundles \begin{align*} S_{X\mathrm{can}}^{c+}&=\Lambda^{0,0}\oplus \Lambda^{0,2}\\ S_{X\mathrm{can}}^{c-}&=\Lambda^{0,1}. \end{align*} We can write $S_{X\text{can}}^{c+}=\underline{\mathbb{C}}\oplus K^{-1}$, where the canonical and anti-canonical line bundles are \begin{equation*} K=\Lambda^{2,0},\quad K^{-1}=\Lambda^{0,2}. \end{equation*} The determinant line bundle of $\mathfrak{s}_{X\mathrm{can}}^c$ is \begin{equation*} L=K^{-1}. \end{equation*} The spinor $\phi=(1,0)\in S_{X\mathrm{can}}^{c+}$ has constant length $|\phi|\equiv 1$. Conversely, every $\mathrm{Spin}^c$-structure $\mathfrak{s}_X^c$ with a positive spinor $\phi$ of constant length $1$ arises in this way for a $g_X$-orthogonal almost complex structure $J$ (see \cite{KM}, \cite{GS}). \begin{lem} Let $J$ be a $g_X$-compatible almost complex structure on $X$. The $\mathrm{Spin}^c$-structures $\mathfrak{s}_{X\text{can}}^c$ and $\mathfrak{s}_{X\mathrm{can}}^c\otimes K$ have positive Weyl spinor bundles \begin{align*} S_{X\mathrm{can}}^{c+}&=\underline{\mathbb{C}}\oplus K^{-1}\\ S_{X\mathrm{can}}^{c+}\otimes K&=K\oplus\underline{\mathbb{C}} \end{align*} with determinant line bundles $K^{-1}$ and $K$, respectively. The $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\mathrm{can}}^c\otimes K$ is the charge conjugate of $\mathfrak{s}_{X\text{can}}^c$, \begin{equation*} S_{X\mathrm{can}}^{c}\otimes K=\bar{S}_{X\mathrm{can}}^{c}. \end{equation*} \end{lem} We consider the particular case \cite{W}, \cite{Don}, \cite{Morgan} where $(X,J,\omega,g_X)$ is a K\"ahler surface with integrable complex structure $J$, K\"ahler form $\omega$ and compatible Riemannian metric $g_X$. The Levi--Civita connection of $g_X$ defines Hermitian connections $A_{\mathrm{can}}$ on $K$ and $A_{\mathrm{can}}^{-1}$ on $K^{-1}$. \begin{lem}\label{lem:KE sol SW} Let $(X,J,\omega,g_X)$ be a K\"ahler--Einstein surface with Einstein constant $\lambda$, i.e.~ \begin{equation*} \mathrm{Ric}_{g_X}=\lambda g_X. \end{equation*} We consider the Seiberg--Witten equations \begin{equation}\label{eqn:KE SW eqns pertub} \begin{split} D_{A}^X\phi&=0\\ F_{A}^+&=\sigma(\phi,\phi)+it\omega \end{split} \end{equation} with perturbation $\mu=it\omega$, where $t\in\mathbb{R}$. \begin{enumerate} \item For the $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\text{can}}^c$, the connection $A_0=A_{\mathrm{can}}^{-1}$ on $K^{-1}$ and the spinor \begin{equation*} \phi_0=(2\sqrt{-\lambda-t},0)\in \Gamma(\underline{\mathbb{C}}\oplus K^{-1}) \end{equation*} are a solution to the perturbed Seiberg--Witten equations \eqref{eqn:KE SW eqns pertub} for all $t<-\lambda$. We have \begin{equation*} \gamma(\mu)\phi_0=2t\phi_0. \end{equation*} \item For the $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\text{can}}^c\otimes K$, the connection $A_0=A_{\mathrm{can}}$ on $K$ and the spinor \begin{equation*} \phi_0=(0,2\sqrt{-\lambda+t})\in \Gamma(K\oplus\underline{\mathbb{C}}) \end{equation*} are a solution to the perturbed Seiberg--Witten equations \eqref{eqn:KE SW eqns pertub} for all $t>\lambda$. We have \begin{equation*} \gamma(\mu)\phi_0=-2t\phi_0. \end{equation*} \end{enumerate} \end{lem} \begin{proof} We first consider the case with $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\text{can}}^c$. For a general K\"ahler surface, the Dirac operator on $\Gamma(S_{X\text{can}}^{c+})$ associated to the connection $A_0=A_{\mathrm{can}}^{-1}$ on $K^{-1}$ is \begin{equation*} D_{A_0}^X(\alpha,\beta)=\sqrt{2}(\bar{\partial}\alpha+\bar{\partial}^*\beta)\quad\forall (\alpha,\beta)\in \Gamma(\underline{\mathbb{C}}\oplus K^{-1}). \end{equation*} For a spinor $\phi=(\alpha,0)$ we have \begin{equation*} \gamma(\sigma(\phi,\phi))=\frac{1}{2}|\alpha|^2\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right). \end{equation*} The symplectic form $\omega\in \Omega^2_+(X)$ acts as \begin{equation*} \gamma(i\omega)=2\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right). \end{equation*} If $(X,J,\omega,g_X)$ is K\"ahler--Einstein with Einstein constant $\lambda$, then $iF_{A_0}=iF_{A_0}^+=\lambda\omega$ for the connection $A_0=A_{\mathrm{can}}^{-1}$ on $K^{-1}$ and \begin{equation*} \gamma(F_{A_0}^+)=-2\lambda\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right). \end{equation*} If $\alpha\in\mathbb{R}$ is a constant, the first equation in \eqref{eqn:KE SW eqns pertub} is satisfied and the second equation reduces to \begin{equation*} -2\lambda=\frac{1}{2}\alpha^2+2t. \end{equation*} This implies the claim in the first case. For $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\text{can}}^c\otimes K$ and spinor $\phi=(0,\alpha)$ we have \begin{align*} \gamma(\sigma(\phi,\phi))&=\frac{1}{2}|\alpha|^2\left(\begin{array}{cc} -1 & 0 \\ 0 & 1 \end{array}\right)\\ \gamma(i\omega)&=2\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right)\\ \gamma(F_{A_0}^+)&=2\lambda\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right), \end{align*} where $iF_{A_0}=iF_{A_0}^+=-\lambda\omega$ for the connection $A_0=A_{\mathrm{can}}$ on $K$. If $\alpha\in\mathbb{R}$ is a constant, the first equation in \eqref{eqn:KE SW eqns pertub} is satisfied and the second equation reduces to \begin{equation*} 2\lambda=-\frac{1}{2}\alpha^2+2t. \end{equation*} This implies the claim in the second case. \end{proof} \begin{lem}\label{lem:KE circle bundle Sasaki} Suppose that $(X,J,\omega,g_X)$ is a K\"ahler--Einstein surface with Einstein constant $\lambda\neq 0$. Let $\pi\colon Y\rightarrow X$ be the principal circle bundle with Euler class $e$, constant radius $r$ and connection $A$ chosen as in Table \ref{table:circle bundle Y over X KE}. \begin{table}[h] \renewcommand{\arraystretch}{1.5} \begin{tabular}{lccc} $X$ & Euler class $e$ of $Y$ & radius $r$ & $A$ \\ \hline non-spin & $c_1(K^{-1})$ & $\frac{2}{|\lambda|}$ & $A_{\mathrm{can}}^{-1}$ \\ \hline spin & $c_1(K^{-\scriptscriptstyle\frac{1}{2}})$ & $\frac{4}{|\lambda|}$ & $\frac{1}{2}A_{\mathrm{can}}^{-1}$\\ \hline \end{tabular} \caption{Circle bundle $\pi\colon Y\rightarrow X$} \label{table:circle bundle Y over X KE} \end{table} Define a $1$-form $\eta\in\Omega^1(Y)$ and vertical vector field $\xi\in\mathfrak{X}(Y)$ by \begin{align*} \eta&=\frac{2}{\lambda}iA_{\mathrm{can}}^{-1}\\ \eta(\xi)&\equiv 1 \end{align*} and let $g_Y$ be the Kaluza--Klein metric on $Y$. Then \begin{align*} g_Y&=\pi^*g_X+\eta\otimes\eta\\ d\eta&=2\pi^*\omega\\ \mathrm{Ric}_{g_Y}&=(\lambda-2)g_Y+(6-\lambda)\eta\otimes \eta\\ \mathrm{scal}_{g_Y}&=4(\lambda-1), \end{align*} hence $(\eta,\xi,\pi^*J,g_Y)$ is a Sasaki $\eta$-Einstein structure on $Y$ with contact form $\eta$ and Reeb vector field $\xi$. \end{lem} \begin{proof} See \cite{BGM}, \cite{FOW} for the definition of Sasaki $\eta$-Einstein structures. Note that in both the non-spin and spin case \begin{equation*} \eta=\pm irA, \end{equation*} depending on whether the sign of $\lambda$ is $\pm$. The formula for the Ricci curvature follows from Remark \ref{rem:Ricci calc}, because $\omega$ is harmonic, \begin{align*} \omega(V,W)&=g_X(JV,W)\quad\forall V,W\in TX\\ |\omega|^2&=2, \end{align*} hence for $A=A_{\mathrm{can}}^{-1}$ \begin{align*} |F_A|^2&=2\lambda^2\\ g_X(i_VF_A,i_WF_A)&=\lambda^2g_X(V,W). \end{align*} \end{proof} \begin{rem}\label{rem:Sasaki-Einstein} Suppose that the Einstein constant $\lambda$ is positive and $g_X$ normalized such that $\lambda=6$. Then $g_Y$ is a Sasaki--Einstein metric with \begin{equation*} \mathrm{Ric}_{g_Y}=4g_Y. \end{equation*} \end{rem} \begin{thm} Suppose that $(X,J,\omega,g_X)$ is a K\"ahler--Einstein surface with Einstein constant $\lambda\neq 0$. Consider the principal circle bundle $\pi\colon Y\rightarrow X$ with Sasaki $\eta$-Einstein structure given by Lemma \ref{lem:KE circle bundle Sasaki} and the $\mathrm{Spin}^c$-structures $\mathfrak{s}_{X\text{can}}^c$ and $\mathfrak{s}_{X\text{can}}^c\otimes K$ on $X$ together with the solutions $(A_0,\phi_0)$ of the Seiberg--Witten equations with perturbation $it\omega$ (for a suitable $t\in\mathbb{R}$), given by Lemma \ref{lem:KE sol SW}. Let $\mathfrak{s}_Y$ be the lifted spin structure. For the $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\text{can}}^c$ we have $m=-\frac{1}{4}|\lambda|$ and the lifted spinor $\psi=Q(\phi_0)\in \Gamma(S_Y)$ satisfies \begin{align*} |\psi|^2&\equiv 4(-\lambda-t)\\ D^Y\psi&=\begin{cases} \left(1-\frac{1}{4}|\lambda|\right)\psi & \text{if } \lambda<0 \\ \left(-1-\frac{1}{4}\lambda \right)\psi & \text{if } \lambda>0\end{cases} \end{align*} For the $\mathrm{Spin}^c$-structure $\mathfrak{s}_{X\text{can}}^c\otimes K$ we have $m=\frac{1}{4}|\lambda|$ and the lifted spinor $\psi=Q(\phi_0)\in \Gamma(S_Y)$ satisfies \begin{align*} |\psi|^2&\equiv 4(-\lambda+t)\\ D^Y\psi&=\begin{cases} \left(-1+\frac{1}{4}|\lambda|\right)\psi & \text{if } \lambda<0 \\ \left(1+\frac{1}{4}\lambda \right)\psi & \text{if } \lambda>0\end{cases} \end{align*} If $\lambda<0$ and $g_X$ normalized such that $\lambda =-4$, both lifted spinors $\psi$ are harmonic. \end{thm} \begin{rem} Suppose that $\lambda>1$. Then the scalar curvature \begin{equation*} \mathrm{scal}_{g_Y}=4(\lambda-1) \end{equation*} of $(Y,g_Y)$ is positive and the lifted spinors $\psi\in\Gamma(S_Y)$ are eigenspinors of the Dirac operator $D^Y$ with eigenvalue \begin{equation*} \nu_{\pm}=\pm\left(1+\frac{1}{4}\lambda\right). \end{equation*} According to a theorem of Friedrich \cite{F_EW} the eigenvalues $\nu_{\pm}$ have to satisfy \begin{equation*} \nu_{\pm}^2\geq \frac{\dim Y}{4(\dim Y-1)}\mathrm{scal}_{g_Y} \end{equation*} i.e. \begin{equation*} \left(1+\frac{1}{4}\lambda\right)^2-\frac{5}{4}(\lambda-1)\geq 0. \end{equation*} This inequality holds, because \begin{equation*} \left(1+\frac{1}{4}\lambda\right)^2-\frac{5}{4}(\lambda-1)=\frac{1}{16}(\lambda-6)^2. \end{equation*} Equality holds if and only if $\lambda=6$, i.e.~$(Y,g_Y)$ is a Sasaki--Einstein manifold by Remark \ref{rem:Sasaki-Einstein}. In this case the eigenvalues are $\nu_{\pm}=\pm\frac{5}{2}$ and $\psi$ are Killing spinors, \begin{equation*} \nabla^Y_V\psi=\mp\frac{1}{2}V\cdot \psi\quad\forall V\in TY. \end{equation*} The existence of two linearly independent Killing spinors with Killing constant $\mp\frac{1}{2}$ on Sasaki--Einstein manifolds is well-known \cite{FK}, \cite{Baer_KS}. \end{rem} \bibliographystyle{amsplain}
\section{Introduction} \IEEEPARstart{H}{uman} action recognition has many useful applications such as human computer interaction, smart video surveillance, sports and health care. These applications are one of motivations behind much research work devoted to this area in the last few years. However, even with a large number of research papers found in the literature, many challenging problems, such as different viewpoints, visual appearances, human body sizes, lighting conditions, and speeds of action execution, still affect the performance of these algorithms. Further problems include partial occlusion of the human subjects by other objects in the scene and self-occlusion of human subjects themselves. Among the human action recognition papers presented in the literature, some of the early techniques focus on using conventional RGB videos~\cite{bobick2001, dollar2005, blank2005, ke2007, laptev2008, liu2008, bregonzio2009, liu2009}. While these video-based techniques gave promising results, their recognition accuracy is still relatively low, even when the scene is free of clutter. The Kinect camera introduced by Microsoft in 2001 was an attempt to broaden the 3D gaming experience of the Xbox 360's audience. However, as the Kinect camera can capture real-time RGB and depth videos, and there is a publicly available toolkit for computing the human skeleton model from each frame of a depth video, many research papers on 3D human action recognition using the Kinect camera have emerged. One advantage of using depth videos than the conventional RGB videos is that it is easier to segment the foreground human subject even when the scene is cluttered. As depth videos do not have colour information, the colour of the clothes worn by the human subject has no effect on the segmentation process. This allows action recognition researchers to focus their effort more on getting robust feature descriptors to describe the actions rather than on low level segmentation. Numerous representative methods for 3D action analysis using depth videos include~\cite{Li2010, Yang2012, Oreifej2013, Rahmani2014, Rahmani2016, Rahmani2016CVPR}. These methods employ advanced machine learning techniques for which good results have been reported. Of course, depth images are also vulnerable to noise due to various factors~\cite{Mallick-et-al-Sensor14}. Thus, using depth images does not always guarantee good action recognition performance~\cite{Li2010}. The algorithm used for computing the 3D joint positions of the human skeletal model by the Kinect toolkit is based on the human skeleton tracking framework (OpenNI) of~\citet{Shotton2011}. In addition to the availability of the real-time depth video stream, this tracking framework also opens up the research area of skeleton-based human action recognition~\cite{Vemulapalli2014, amir2016, Vemulapalli2016, Kes2017, Ke2017, Rahmanids2017}. Human action recognition methods using the Kinect data can be classified into two categories, based on how the feature descriptors are extracted to represent the human actions. The first category is handcrafted features. Action recognition methods using handcrafted features require two complex hand-design stages, namely \textit{feature extraction} and \textit{feature representation}, to build the final descriptor. Both the feature extraction stage and feature representation stage differ from one method to another. The feature extraction stage may involve computing the depth (and/or colour) gradients, histogram, and other more complex transformations of the video data. The feature representation stage may involve simple concatenation of the feature components extracted from the previous stage, a more complex fusion step of these feature components, or even using a machine learning technique, to get the final feature descriptor. These methods usually involve a number of operations that require researchers to carry out careful feature engineering and tuning. Kinect-based human action recognition algorithms using handcrafted features reported in the literature include ~\cite{Li2010, Shotton2011, Yang2012, Oreifej2013, Rahmani2014, Rahmani2016, Vemulapalli2014, Vemulapalli2016, piotr2016, jingtian2018tip}. The second category is deep learning features. With the huge advance in neural network research in the last decade, deep neural networks have been used to extract high-level features from video sequences for many different applications, including 3D human action analysis. Deep learning methods reduce the need for feature engineering; however, they require a huge amount of labelled training data, which may not be available, and a long time to train. For small human action recognition datasets, deep learning methods may not give the best performance. Recent Kinect-based human action recognition algorithms are:~\cite{amir2016, Rahmani2016CVPR, Rahmanids2017, Rahmani2015, Kes2017, Ke2017, stgcn2018aaai, shuai2018, chaolong2018, hongsong2017, yansong2018, jun2017, zhiwu2017, inwoong2017, chenyang2018, hongsong2018, jun2018tpami, amor2018cvpr, nenggan2018aaai}. \smallskip \noindent \textbf{Research contributions.} Although both handcrafted and deep learning features have been used in human action recognition, to the best of our knowledge, a thorough comparison of recent action recognition methods for these two categories is not found in the literature. Our contributions in this paper are twofold: \begin{itemize} \item We evaluate the performance of 10 recent state-of-art human action recognition algorithms, with specific focus on comparing the effectiveness of using handcrafted features versus deep learning features and skeleton-based features versus depth-based features. We believe that there is a lack of such a comparison in the literature on human action recognition. \item Furthermore, we evaluate the cross-view versus cross-subject performance of these algorithms and, for the multiview datasets, the impact of the camera view for both small and large datasets on human action recognition with respect to whether the features being used are depth-based, skeleton-based, or depth+skeleton-based. To the best of our knowledge, such evaluation has not been performed before. \end{itemize} The paper is organized as follows. Section~\ref{sec:related_work} gives a brief review on recent human action recognition techniques. Section~\ref{sec:algorithms} covers the details of the 10 algorithms being compared in this paper. In Section~\ref{sec:experiments}, we describe our experimental setting and the benchmark datasets. Sections~\ref{sec:results} and \ref{sec:discussion} summarize our experimental results, comparison, and discussions. The last section concludes the paper. \section{Related Work} \label{sec:related_work} \begin{table*}[t!] \caption{Ten state-of-the-art action recognition methods evaluated in this paper.} \begin{center} \resizebox{\textwidth}{!}{\begin{tabular}{| l | l | l | l | l |} \hline Algorithms & Year & Short descriptions & Kinect data used & Feature dimension\\ \hline \hline HON4D (Oreifej \& Liu)~\cite{Oreifej2013} & CVPR 2013 & handcrafted (global descriptor) & depth & $[17880, 151200]$\\ \hline HDG (Rahmani et al.)~\cite{Rahmani2014} & WACV 2014 & handcrafted (local + global descriptor) & depth+skeleton & $[1662, 1819]$\\ \hline LARP-SO (Vemulapalli \& Chellappa)~\cite{Vemulapalli2016} & CVPR 2016 & handcrafted (Lie Group) & skeleton & $3 \times 3 \times$ \#frames\\ \hline HOPC (Rahmani et al.)~\cite{Rahmani2016} & TPAMI 2016 & handcrafted (local descriptor) & depth $\to$ pointcloud & depending on \#STKs$^\dagger$ \\ \hline SCK+DCK (Koniusz et al.)~\cite{piotr2016} & ECCV 2016 & handcrafted (tensor representations) & skeleton & $\sim$ 40k \\ \hline \hline P-LSTM (Shahroudy et al.)~\cite{amir2016} & CVPR 2016 & deep learning (LSTM) & skeleton & \#joints ${\times 3 \times 8}^\ddagger$\\ \hline HPM+TM (Rahmani \& Mian)~\cite{Rahmani2016CVPR} & CVPR 2016 & deep learning (CNN) & depth & 4096\\ \hline Clips+CNN+MTLN (Ke et al.)~\cite{Ke2017} & CVPR 2017 & deep learning (pre-trained VGG19, MTLN) & skeleton & 7168 \\ \hline IndRNN (Li et al.)~\cite{shuai2018} & CVPR 2018 & deep learning (independently RNN) & skeleton & 512 \\ \hline ST-GCN (Yan et al.)~\cite{stgcn2018aaai} & AAAI 2018 & deep learning (Graph ConvNet) & skeleton & 256 \\ \hline \end{tabular}} \label{algorithms} \end{center} \vspace{-1ex} $^\dagger$STK stands for \textit{spatio-temporal keypoint}.\quad $^\ddagger$The P-LSTM features include 8 video segments, each of which is composed of a number of 3D joints. \end{table*} Action recognition methods can be classified into three categories based on the type of input data: colour-based~\cite{bobick2001, blank2005, dollar2005, fishkin2005, hodges2007,ke2007, liu2008, laptev2008, liu2009, bregonzio2009, buettner2009, Sung2011, Sung2012, Koppula2013,saurabh2014, hakan2016, amir2016pami, christoph2017, amlan2017, anoop2017, anoop2017cvpr, amir2017, joao2017, christoph2016cvpr, jianfang2018}, depth-based~\cite{Li2010, Yang2012,jiang2012, Oreifej2013, luxia2013, Rahmani2014, RahmaniHOPC2014, RahmaniLLC2014, yang2014, pichao2015,Rahmani2015, pichao2016, RahmaniPRL2016, Rahmani2016, Rahmani2016CVPR, amir2016pami, chenyang2017, Rahmanids2017, jianfang2018, zhiyuan2017, jingtian2018tip}, and skeleton-based~\cite{Shotton2011, Xia2012, Vemulapalli2014, Yong2015, vivek2015, wentao2016, jun2016, piotr2016, Vemulapalli2016, Amor2016, amir2016, Rahmanids2017, Ke2017, Kes2017, jianfang2018, hongsong2017, hongsong2018, chenyang2018, inwoong2017, zhiwu2017, jun2017, yansong2018, chaolong2018, jun2018tpami, amor2018cvpr, nenggan2018aaai, nour2018tip, jingtian2018tip, chenyang2019cvpr, maosen2019cvpr, lei2019cvpr1, lei2019cvpr2}. In this section, we will focus on reviewing recent methods using the last two types of features. \vspace{0.05cm} \noindent{\bf Depth-based action recognition.} Action recognition from depth videos ~\cite{Li2010, Yang2012,jiang2012, Oreifej2013,luxia2013, yang2014, RahmaniHOPC2014,RahmaniLLC2014, Rahmani2016,RahmaniPRL2016} has become more popular because of the availability of real-time cost-effective sensors. Most existing depth-based action recognition methods use global features such as space-time volume and silhouette information. For example, \citet{Oreifej2013}~captured the discriminative features by projecting the 4D surface normals obtained from the depth sequence onto a 4D regular space to build the \textit{Histogram of Oriented 4D Normals} (HON4D). \citet{yang2014} extended HON4D by concatenating local neighbouring hypersurface normals from the depth video to jointly characterize local shape and motion information. More precisely, they introduced an adaptive spatio-temporal pyramid to subdivide the depth video into a set of space-time cells for more discriminative features. \citet{luxia2013} proposed to filter out the noise from the depth sensor so as to get more reliable spatio-temporal interest points for action recognition. Although these methods have achieved impressive performance for frontal action recognition, they are sensitive to changes of viewpoint. One way to alleviate this viewpoint issue is to directly process the pointclouds, as reported in the paper by \citet{Rahmani2016}. Apart from the methods mentioned above which use handcrafted features, the use of deep learning features~\cite{pichao2015, Rahmani2015, pichao2016,amir2016pami, Rahmani2016CVPR, Rahmanids2017, chenyang2017, zhiyuan2017} in human action recognition is on the rise. For example, \citet{pichao2015} used a \textit{Hierarchical Depth Motion Maps} (HDMMs) to extract the body shape and motion information and then trained a 3-channel deep \textit{Convolutional Neural Network} (CNN) on the HDMMs for human action recognition. In the following years, \citet{Rahmani2016CVPR} proposed to train a single \textit{Human Pose Model} (HPM) from real motion capture data to transfer the human pose from different unknown views to a view-invariant feature space, and \citet{chenyang2017} used a multi-stream deep neural networks to jointly learn the semantic relations among action attributes. \vspace{0.05cm} \noindent{\bf Skeleton-based action recognition.} Existing skeleton-based action recognition methods can be grouped into two categories: joint-based methods and body part based methods. Joint-based methods model the positions and motion of the joints (either individual or a combination) using the coordinates of the joints extracted by the OpenNI tracking framework. For instance, a reference joint may be used and the coordinates of other joints are defined relative to the reference joint~\cite{Yang2012, Vemulapalli2014, Ke2017, Kes2017}, or the joint orientations may be computed relative to a fixed coordinate system and used to represent the human pose~\cite{Xia2012}, \emph{etc}\onedot} \def\vs{\emph{vs}\onedot For the body part based methods, the human body parts are used to model the human's articulated system. These body parts are usually modelled as rigid cylinders connected by joints. Information such as joint angles~\cite{Vemulapalli2016}, temporal evolution of body parts~\cite{Amor2016, amir2016,piotr2016, stgcn2018aaai}, and 3D relative geometric relationships between rigid body parts~\cite{Vemulapalli2014, Vemulapalli2016, stgcn2018aaai} has all been used to represent the human pose for action recognition. The method proposed by~\citet{Vemulapalli2014} falls into the body part based category. They represent the relative geometry between a pair of body parts, which may or may not be directly connected by a joint, as a point in $SE(3)$. Thus, a human skeleton is a point of the Lie group $SE(3) \times \cdots \times SE(3)$ where each action corresponds to a unique evolution of such a point in time. The approach of~\citet{Kes2017} relies on both body parts and body joints. The human skeleton model was divided into 5 body parts. A specific joint was selected for each body part as the reference joint and the coordinates of other joints were expressed as vectors relative to that reference joint. Various distance measures were computed from these vectors to yield a feature vector for each video frame. The features vectors from all video frames were finally appended together and scaled to form a handcrafted greyscale image descriptor fed into a CNN. Somewhat related approach \cite{pk_bmvc18} uses kernels formed over body joints to obtain feature maps fed into a CNN for simultaneous action recognition and domain adaptation. Recent human action recognition papers favour deep learning techniques to perform human action recognition. Apart from the CNN-based approaches~\cite{Kes2017,pk_bmvc18}, \textit{Recurrent Neural Networks} (RNNs) have also been popular~\cite{Yong2015, vivek2015, amir2016, wentao2016, jun2016, shuai2018, zhiyuan2017, hongsong2018, nenggan2018aaai}. Since \textit{Long Short-term Memory} (LSTM)~\cite{sepp1997} can model temporal dependencies as RNNs and even capture the co-occurrences of human joints, LSTM networks have also been a popular choice in human action recognition~\cite{jun2017, inwoong2017, amor2018cvpr, jun2018tpami, chenyang2019cvpr}. For instance, \citet{wentao2016} presented an end-to-end deep LSTM network with a \textit{dropout} step, \citet{amir2016} proposed a \textit{Part-aware Long Short-term Memory} (P-LSTM) network to learn the long-term patterns of the 3D trajectories for each grouped body part, and \citet{jun2018tpami} introduced the use of \textit{trust gates} in their spatio-temporal LSTM architecture. \vspace{0.05cm} \noindent{\bf Action recognition via a combination of skeleton and depth features.} Combining skeleton and depth features together helps overcome situations when there are interactions between human subject and other objects or when the actions have very similar motion trajectories. Various action recognition algorithms~\cite{Rahmani2014, amir2016pami, Rahmanids2017, nour2018tip} that use both depth and skeleton features for robust human action recognition have been reported in recent years. For example, \citet{Rahmani2014}~proposed to combine 4 types of local features extracted from both depth images and 3D joint positions to deal with local occlusions and to increase the recognition accuracy. We refer to their method as \textit{HDG} from hereon. Another example is the approach of \citet{amir2016pami} where \textit{Local Occupancy Patterns} (LOP), HON4D, and skeleton-based features are combined with hierarchical mixed norms which regularize the weights in each modality group of each body part. Recently, \citet{Rahmanids2017} used an end-to-end deep learning model to learn the body part representation from both skeletal and depth images. To improve the performance of the model, they adopted a bilinear compact pooling~\cite{yang2016cbp} layer for the generated depth and skeletal features. \citet{nour2018tip}, on the other hand, proposed to use canonical correlation analysis to maximize the correlation of features extracted from different sensors. The features investigated in their paper include bag of angles extracted from skeleton data, depth motion map from depth video, and optical flow from RGB video. The subspace shared by all the features was learned and average pooling was used to get the final feature descriptor. \section{Analyzed and Evaluated Algorithms} \label{sec:algorithms} We chose ten action recognition algorithms shown in Table~\ref{algorithms} for our comparison and evaluation as they are recent action recognition methods (from 2013 onward) and they use skeleton-based, depth-based, handcrafted, and/or deep learning features. The technical details of these algorithms are summarized below. \vspace{0.05cm} \noindent{\bf HON4D}. \citet{Oreifej2013} presented a global feature descriptor that captures the geometry and motion of human action in the 4D space of spatial coordinates, depth and time. To form the HON4D descriptor, the space was quantized using a 600-cell polychoron with 120 vertices. The vectors stretching from the origin to these vertices were used as projection axes to obtain the distribution of normals for each video sequence. To improve the classification performance, random perturbations were added to those projectors. The dimensions of HON4D features (Table~\ref{algorithms}) vary across different datasets. \vspace{0.05cm} \noindent{\bf HDG}. In this algorithm~\cite{Rahmani2014}, each depth sequence was firstly divided into small subvolumes; the histograms of depth and depth derivatives were computed for each subvolume. For each skeleton sequence, the torso joint was used as a stable reference joint for computing the histograms of joint position differences. In addition, the variations of each joint movement volume were incorporated into the global feature vector to form spatio-temporal joint features. Two \textit{Random Decision Forests} (RDFs) were trained in this algorithm, one for feature pruning and one for classification. More details about feature dimensions of HDG and the feature pruning applied by us will be given in Section~\ref{sec:HDG-pruning}. \vspace{0.05cm} \noindent{\bf HOPC}. Approach~\cite{Rahmani2016} models depth images as 3D pointclouds. The authors used two types of support volume, namely, so-called spatial support volume and spatio-temporal support volume. The HOPC descriptor was extracted from the pointcloud falling inside the support volume around each point, which may be classified as a \textit{spatio-temporal Keypoint} (STK) if the eigenvalue ratios of the pointcloud around it are larger than some predefined threshold. For each STK, the algorithm further projected eigenvectors onto the axes of the 20 vertices of a regular dodecahedron. The final HOPC descriptor for each STK is a concatenation of 3 small histograms, each of which captures the distribution of an eigenvector of the pointcloud within the support volume. \vspace{0.05cm} \noindent{\bf LARP-SO}. \citet{Vemulapalli2016} extended their earlier work \cite{Vemulapalli2014} by the use of Lie Algebra Relative Pairs via $SO(3)$ for action recognition. We follow the convention adopted in~\cite{Rahmanids2017} and name this algorithm as LARP-SO. In this algorithm, the rolling map, which describes how a Riemannian manifold rolls over another one along a smooth rolling curve, was used for 3D action recognition. Each skeleton sequence was firstly represented by the relative 3D rotations between various human body parts, and each action was then modelled as a curve in the Lie Group. Since it is difficult to perform the classification of action curves in a non-Euclidean space, the curves were unwrapped by the logarithm map at a single point while a rolling map was used to reduce distortions. The \textit{Fourier Temporal Pyramid} (FTP) representation~\cite{jiang2012} was used in the algorithm to make the descriptor more robust to noise and less sensitive to temporal misalignments. \vspace{0.05cm} \noindent{\bf SCK+DCK}. \citet{piotr2016} used tensor representations to capture the higher-order relationships between 3D human body joints for action recognition. They applied two different RBF kernels which they referred to as \textit{Sequence Compatibility Kernel} (SCK) and \textit{Dynamics Compatibility Kernel} (DCK). The former kernel captures the spatio-temporal compatibility of joints while the latter models the action dynamics of a sequence. An SVM was then trained on linearized feature maps of such kernels for action classification. \vspace{0.05cm} \noindent{\bf HPM+TM}. Approach~\cite{Rahmani2016CVPR} employs a dictionary containing representative human poses from a motion capture database. A deep CNN architecture which is a modification of~\cite{saurabh2014} was then used to train a view-invariant human pose model. Real depth sequences were passed to the learned model frame-by-frame to extract high-level view-invariant features. Similarly to the LARP-SO algorithm above, the FTP was used to capture the temporal structure of the action videos. The final descriptor for each video sequence is a collection of the Fourier coefficients from all the segments. \vspace{0.05cm} \noindent{\bf P-LSTM}. Approach~\cite{amir2016} proceeds by transforming 3D coordinates of the body joints from the camera coordinate system to the body coordinate system with the origin set at the spine. The 3D coordinates of all other body joints were then scaled based on the distance between the `hip centre' joint and the `spine' joint. A P-LSTM model was built by splitting the memory cells from the LSTM model into body part based sub-cells. For each video sequence, the pre-processed human joints were grouped into 5 parts (torso, two hands, and two legs) and the video was divided into 8 equal-sized video segments. Then, for a randomly selected frame per video segment, 3D coordinates of the joints inside each grouped part were concatenated and passed as input to the P-LSTM network to learn common temporal patterns of the parts and combine them into a global representation. \vspace{0.05cm} \noindent{\bf Clips+CNN+MTLN}. \citet{Ke2017} presented a skeletal representation referred to as \textit{clips}. The method proceeds by transforming the Cartesian coordinates of human joints (per skeleton sequence) into the cylindrical coordinates to generate 3 clips, with each clip corresponding to one channel of the cylindrical coordinates. To encode the temporal information for the whole video sequence, four stable joints (left shoulder, right shoulder, left hip and right hip) were selected as reference joints to produce 4 coordinate frames. The pre-trained VGG19 network~\cite{karen2015} was used as a feature extractor to learn the long-term spatio-temporal features from intermediate images formed from the 4 coordinate frames. Moreover, approach \cite{Ke2017} also employs the \textit{Multi-task Learning Network} (MTLN) proposed by~\cite{ml1997} to incorporate the spatial structural information from the CNN features. \vspace{0.05cm} \noindent{\bf IndRNN}. \citet{shuai2018} proposed a new RNN method, an Independently Recurrent Neural Network, for which neurons per layer are independent of each other but they are reused across layers. Finally, multiple IndRNNs were stacked to build a deeper network than the traditional RNN. \vspace{0.05cm} \noindent{\bf ST-GCN}. The spatio-temporal graph representation for skeleton sequences proposed by \citet{stgcn2018aaai} is an extension of {\em Graph Convolutional Networks} (GCN) \cite{joan2014,defferrard2016, thomas2017} tailored to perform human action recognition. Firstly, the spatio-temporal graph is constructed by inserting edges between neighbouring body joints (nodes) of the human body skeleton as well as along the temporal direction. Subsequently, GCN and a classifier are applied to infer dependencies in the graphs (a single graph corresponds to a single action sequence) and perform classification. \section{Experimental Setting} \label{sec:experiments} To perform experiments, we obtained off-the-shelf codes for HON4D~\cite{Oreifej2013}, HOPC~\cite{Rahmani2016}, LARP-SO~\cite{Vemulapalli2016}, HPM+TM~\cite{Rahmani2016CVPR}, IndRNN~\cite{shuai2018} and ST-GCN~\cite{stgcn2018aaai} from the respective authors' websites. For SCK+DCK~\cite{piotr2016}, HDG~\cite{Rahmani2014}, P-LSTM~\cite{amir2016} and Clips+CNN+MTLN~\cite{Ke2017}, we used our own Matlab implementations given that codes for these methods are not publicly available. Moreover, we employed ten variants of the HDG~\cite{Rahmani2014} representation so as to evaluate the performance with respect to different combinations of its individual descriptor types. We also implemented the traditional RNN and LSTM as baseline methods, and added four variants of P-LSTM to evaluate the impact of using different numbers of video segments for skeletal representation as well as different numbers of hidden neurons. \subsection{Benchmark Datasets} Listed in Table \ref{datasets} are six benchmark datasets used in our evaluation, each of which is detailed below. \begin{table*}[t!] \caption{Six publicly available benchmark datasets used in our experiments for 3D action recognition.} \begin{center} \resizebox{\textwidth}{!}{\begin{tabular}{| l | c | c | c | c | c | l | c | c |} \hline Datasets & Year & Classes & Subjects & \#Views & \#videos & Sensor & Modalities & \#joints \\ \hline \hline MSRAction3D~\cite{Li2010} & 2010 & 20 & 10 & 1 & 567 & Kinect v1 & Depth + 3DJoints & 20\\ \hline 3D Action Pairs~\cite{Oreifej2013} & 2013 & 12 & 10 & 1 & 360 & Kinect v1 & RGB + Depth + 3DJoints & 20\\ \hline CAD-60~\cite{Sung2011} & 2011 & 14 & 4 & -- & 68 & Kinect v1 & RGB + Depth + 3DJoints & 15\\ \hline UWA3D Activity Dataset~\cite{RahmaniHOPC2014} & 2014 & 30 & 10 & 1 & 701 & Kinect v1 & RGB + Depth + 3DJoints & 15\\ \hline UWA3D Multiview Activity II~\cite{Rahmani2016} & 2015 & 30 & 9 & 4 & 1070 & Kinect v1 & RGB + Depth + 3DJoints & 15\\ \hline NTU RGB+D Dataset~\cite{amir2016} & 2016 & 60 & 40 & 80 & 56880 & Kinect v2 & RGB + Depth + IR + 3DJoints & 25\\ \hline \end{tabular}} \label{datasets} \end{center} \vspace{-1ex} {\footnotesize{(The number of views is not stated in the CAD-60 dataset.)}} \end{table*} \vspace{0.05cm} \noindent{{\bf MSRAction3D}}~\cite{Li2010} is one of the earliest action datasets captured with the Kinect depth camera. It contains 20 human sport-related activities such as {\it jogging}, {\it golf swing} and {\it side boxing}. Each action in this dataset was performed 2 or 3 times by 10 people. This dataset is challenging because of high inter-action similarities. \vspace{0.05cm} \noindent{{\bf 3D Action Pairs}}~\cite{Oreifej2013} contains 6 selected pairs of actions that have very similar motion trajectories, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, {\it put on a hat} and {\it take off a hat}; {\it pick up a box} and {\it put down a box}; {\it stick a poster} and {\it remove a poster}. Each action was performed 3 times by 10 people. There are two challenging aspects of this dataset: (i)~the actions in each pair have similar motion trajectories; (ii)~the object that is interacted by the subject in each video is only present in the RGB-D data but not the skeleton data. \vspace{0.05cm} \noindent{{\bf Cornell Activity Dataset} (CAD)}~\cite{Sung2011} comprises two sub-datasets, CAD-60 and CAD-120. Both sub-datasets contain RGB-D and tracked skeleton video sequences of human activities captured by a Kinect sensor. In this paper, only CAD-60 was used in the experiments. Fig.~\ref{cad60examples} illustrates depth images from the CAD-60 dataset and demonstrates that this dataset exhibits high levels of noise in its depth videos. \begin{figure}[t!] \centering \begin{subfigure}{0.3\columnwidth} \includegraphics[width=\linewidth]{cadexp1.pdf} \caption{talking (phone)} \label{fig:1} \end{subfigure}\hfil \begin{subfigure}{0.3\columnwidth} \includegraphics[width=\linewidth]{cadexp2.pdf} \caption{writing} \label{fig:2} \end{subfigure}\hfil \begin{subfigure}{0.3\columnwidth} \includegraphics[width=\linewidth]{cadexp3.pdf} \caption{brushing teeth} \label{fig:3} \end{subfigure} \medskip \begin{subfigure}{0.3\columnwidth} \includegraphics[width=\linewidth]{cadexp4.pdf} \caption{talking (couch)} \label{fig:4} \end{subfigure}\hfil \begin{subfigure}{0.3\columnwidth} \includegraphics[width=\linewidth]{cadexp5.pdf} \caption{relaxing (couch)} \label{fig:5} \end{subfigure}\hfil \begin{subfigure}{0.3\columnwidth} \includegraphics[width=\linewidth]{cadexp6.pdf} \caption{cooking (stirring)} \label{fig:6} \end{subfigure} \caption{Sample depth images from the CAD-60 dataset.} \label{cad60examples} \end{figure} \vspace{0.05cm} \noindent{{\bf UWA3D Activity Dataset}}~\cite{RahmaniHOPC2014} contains 30 actions performed by 10 people of various height at different speeds in cluttered scenes. This dataset has high between-class similarity and contains frequent self-occlusions. \begin{figure}[t!] \centering \includegraphics[width=\linewidth]{uwa3d_data.pdf} \caption{(a) A perspective view of the camera setup in the UWA3D Multiview Activity II dataset. The views $V_1$, $V_2$ and $V_3$ are at the same height. (b) and (c) show the top and side views of the setup. The angles between $V_1$ and $V_2$, between $V_1$ and $V_3$, and between $V_1$ and $V_4$ are all approximately 50 degrees~\cite{RahmaniHOPC2014}. (d) An example video frame of the depth and skeleton data for the {\it bending} action.} \label{uwa3d_sample} \end{figure} \vspace{0.05cm} \noindent{{\bf UWA3D Multiview Activity II}}~\cite{Rahmani2016} contains 30 actions performed by 9 people in a cluttered environment. In this dataset, the Kinect camera was moved to different positions to capture the actions from 4 different views (see Fig.~\ref{uwa3d_sample}(a)-(c)): front view ($V_1$), left view ($V_2$), right view ($V_3$), and top view ($V_4$). This dataset is therefore more challenging than the previous four datasets. Fig.~\ref{uwa3d_sample}(d) shows sample video frames from this dataset. \vspace{0.05cm} \noindent{{\bf NTU RGB+D Dataset}}~\cite{amir2016} is so far the largest Kinect-based action dataset which contains 56,880 video sequences and over 4 million frames. There are 60 action classes performed by 40 subjects captured from 80 views with 3 Kinect v.2 cameras. This dataset has variable sequence lengths for different sequences and exhibits high intra-class variations. \vspace{0.05cm} \noindent{{\bf Dataset usage.}} Below we detail how the above six datasets were used in our experiments. The MSRAction3D, 3D Action Pairs, CAD-60 and UWA3D Activity datasets were used for cross-subject (single-view) experiments. For every dataset, we used half of the subjects' data for training and the remaining half for testing. We tested all the possible combinations of subjects for the training and testing splits to obtain the average recognition accuracy of each algorithm. For example, for 10 subjects in the MSRAction3D dataset, $\binom{10}{5}=252$ experiments were carried out. The UWA3D Multiview Activity II dataset was used for cross-view experiments, with two views of the samples being used for training and the remaining views for testing. There were 12 different view combinations in the experiments. The NTU RGB+D dataset was used in both cross-subject and cross-view experiments. Despite indications that this dataset has 80 views of human action recognition, the data samples were grouped according to three camera sets. For cross-view action recognition, we used the video sequences captured by two cameras as our training data and the remaining sequences for testing. A total of 3 different camera combinations were experimented with. \subsection{Evaluation Settings} Below we detail the experimental settings of the algorithms. \vspace{0.05cm} \noindent{{\bf HON4D}}. According to~\cite{Oreifej2013}, HON4D has the frame size of $320 \times 240$ and each video is divided into $4 \!\times\! 3 \!\times\! 3$ (${\text {width}} \!\times\! {\text {height}} \!\times\! {\text {\#frames}}$) spatio-temporal cells. In our evaluations, we used these same settings for all the datasets. \vspace{0.05cm} \noindent{{\bf HOPC}}. \citet{Rahmani2016} used different spatial and temporal scales for different datasets. In this paper, a constant temporal scale and spatial scale were used for all the datasets. For the MSRAction3D and 3D Action Pairs datasets, the temporal and spatial scales were set to 2 and 19, respectively. For the remaining datasets, we used 2 for the temporal scale and 140 as the spatial scale. Moreover, we divided each depth video into $6 \!\times\! 5 \!\times\! 3$ spatio-temporal cells (along the $X$, $Y$ and {\it time} axes) to extract features. \vspace{0.05cm} \noindent{{\bf LARP-SO}}. The desired number of frames~\cite{Vemulapalli2016} used for computing skeletal representation varies depending on the datasets used in the experiments. The desired frame numbers for the UWA3D Activity, UWA3D Multiview Activity II, and NTU RGB+D datasets were all set to 100. For the MSRAction3D, 3D Action Pairs datasets, and CAD-60, they were set to 76, 111, and 1,000, respectively. \vspace{0.05cm} \noindent{{\bf SCK+DCK}}. We followed the experimental settings described in~\cite{piotr2016,piotr2019} for all the datasets and we used authors' newest model which aggregates over subsequences (not just sequences). For SCK, we normalized all human body joints with respect to the hip joints across frames as well as the lengths of all body parts. For DCK, we used the unnormalized body joints, and assumed that the displacements of body joint coordinates across frames captured their temporal evolution. \vspace{0.05cm} \noindent{{\bf HDG}}. According to~\cite{Rahmani2014}), the number of used subvolumes has no significant effect to the discriminative features, we divided each video sequence into $10 \!\times\! 10 \!\times\! 5$ subvolumes (along $X$, $Y$ and {\it time}) for computing the histograms of depth as well as the depth gradients. For the joint movement volume features, each joint volume was divided into $1 \!\times\! 1 \!\times\! 5$ cells (along $X$, $Y$ and {\it time}). There are four individual feature representations encapsulated by HDG: \renewcommand{\labelenumi}{(\roman{enumi})} \begin{enumerate}[leftmargin=0.8cm] \item histogram of depth ({{\tt hod}}), \item histogram of depth gradients ({{\tt hodg}}), \item joint position differences ({{\tt jpd}}), \item joint movement volume features ({{\tt jmv}}). \end{enumerate} We follow \cite{lei2017} and evaluate the performance of the 10 variants of HDG in our experiments. \vspace{0.05cm} \noindent{{\bf HPM+TM}}. We followed~\cite{Rahmani2016CVPR} and set the number of Fourier Pyramid levels to 3 and the number of low frequency Fourier coefficients to 4 for all datasets. We used the human pose model trained by~\citet{Rahmani2016CVPR} to extract view-invariant features from each depth sequence. We also compared the recognition accuracies of this algorithm given Average Pooling (AP) versus Temporal Modelling (TM) used for extraction of CNN features. \vspace{0.05cm} \noindent{{\bf P-LSTM}}. We applied the same normalization preprocessing step as in~\cite{amir2016} for the skeletal representation. In our experiments, the number of video segments and the number of hidden neurons for 1-layer RNN, 2-layer RNN, 1-layer LSTM, 2-layer LSTM, 1-layer P-LSTM and 2-layer P-LSTM were all set to 8 and 50, respectively. We also evaluated the performance of different numbers of video segments and different numbers of hidden neurons in P-LSTM. The learning rate and the number of epochs in our experiments were set to 0.01 and 300, respectively. \vspace{0.05cm} \noindent{{\bf Clips+CNN+MTLN}}. The learning rate was set to 0.001 and the batch size was set to 100 for MTLN. We selected four different experimental settings from \cite{Ke2017} to compare the performance of recognition: Frames+CNN, Clips+CNN+Pooling, Clips+CNN+Concatenation, and Clips+CNN+MTLN. \vspace{0.05cm} \noindent{{\bf IndRNN}}. We used the Adam optimizer with the initial learning rate $2 \times 10^{-4}$ and applied the decay by 10 once the evaluation accuracy did not increase. For cross-subject and cross-view experiments, the dropout rates were set to 0.25 and 0.1, respectively. \vspace{0.05cm} \noindent{{\bf ST-GCN}}. For the convolution operations, we used the optimal partition strategy according to the ablation study in~\cite{stgcn2018aaai}. As different datasets have different numbers of body joints (see Table~\ref{datasets}), we reconstructed the spatio-temporal skeleton graphs. For NTU RGB+D dataset, we used the same experimental settings as described in~\cite{stgcn2018aaai} (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, we work with up to two human subjects per sequence). For the remaining 5 datasets, we used a different setting as only one performing subject was present per video. Moreover, we performed extra experiments for IndRNN and ST-GCN: instead of using 3D skeleton sequences as inputs, we used {{\tt jpd}} features which redefine the 3D skeleton joint positions by translating them to be centred at the torso (or `spine') joint. \subsection{Evaluation Measure} The recognition accuracy $A_c$ of an algorithm for any given action class $c$ is defined as the proportion of correct class $c$ labels returned by the algorithm: \begin{equation} A_c=\text{\#correct\_class\_$c$\_labels}\, \left/ \,\text{\#actual\_class\_$c$\_labels}\right.. \label{eq:accuracy} \end{equation} \newcommand{{N_{\text{trees}}}}{{N_{\text{trees}}}} To show the recognition accuracies of an algorithm for all the action classes, a confusion matrix is often used. The overall performance of an algorithm on a given dataset is evaluated using the average recognition accuracy $\bar{A}$ defined as: $\bar{A}=\frac{1}{C}\sum_{c=1}^{C}{A_c}$, where $C$ is the total number of action classes in a given dataset. To show the overall performance of each algorithm on $M$ datasets, we first rank the performance of each algorithm from 1 to 5 (a lower rank value represents a better performance) based on the recognition accuracy so each algorithm has its own rank value $r_i$ given the $i$\textsuperscript{th} dataset. We then compute the Average Rank (AVRank) as follows: \begin{equation} \text{AVRank}=\frac{1}{M}{\textstyle\sum}_{i=1}^{M}{r_i}. \label{eq:rank} \end{equation} \subsection{Optimisation of Hyperparameters for HDG} \label{sec:HDG-pruning} There are 3 hyperparameters in the HDG algorithm. The first hyperparameter is the number of subvolumes, which we set to the same value as in~\cite{Rahmani2014}. The second and third hyperparameters, which are the number of trees ${N_{\text{trees}}}$ used in training and the threshold $\theta$ used in feature pruning, were optimised during our experiments (Table~\ref{tab:HDG-pruned}). As the length of the combined features in the HDG algorithm is large (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, the length of the HDG-all features for the MSRAction3D dataset is 13,250), we trained one RDF to select the feature components that have high importance values. This helped to increase the processing speed without compromising the recognition accuracy. We evaluated the effect of hyperparameters ${N_{\text{trees}}}$ and $\theta$ on the HDG algorithm for different combinations of individual HDG features using the MSRAction3D dataset (for single-view) and the UWA3D Multiview Activity II dataset (for cross-view). Table~\ref{tab:HDG-pruned} shows the optimal values for ${N_{\text{trees}}}$ and $\theta$ obtained from the grid search. The corresponding dimensions of different HDG combined features before and after pruning are also indicated. Compared to other individual features of HDG, {{\tt jpd}} and {{\tt jmv}} are small-sized features, thus when used alone in both datasets, their dimensions are not reduced by much during feature pruning. However, when either or both of them are combined with other individual features in cross-view action recognition, their importance values are significantly higher. This allows a large reduction in feature dimension after pruning (see the last 4 rows of the table). Our experiments in the next section also confirm that skeleton-based features deal better with the view-invariance than depth-based features. The optimal values of ${N_{\text{trees}}}$ and $\theta$ shown in Table~\ref{tab:HDG-pruned} were used to prune the HDG features for all datasets. As different datasets have different numbers of body joints (see Table~\ref{datasets}), the dimensions of these HDG features after pruning across datasets are not the same. \begin{table*}[tbp!] \caption{Optimal hyperparameter values and feature dimensions before and after pruning for the HDG combined features.} \label{tab:HDG-pruned} \begin{center} \resizebox{\textwidth}{!}{\begin{tabular}{ |l||r|S[table-format=2.2]|c|r||r| S[table-format=2.2]|c|r|} \hline Combination & \multicolumn{4}{c||}{MSRAction3D} & \multicolumn{4}{c|}{UWA3D Multiview Activity II} \\ \cline{2-9} of individual & dimensions & {\text{~~optimal $\theta$~~}} & optimal ${N_{\text{trees}}}$ & dimensions & dimensions & {\text{~~optimal $\theta$~~}} & optimal ${N_{\text{trees}}}$ & dimensions \\ features & before pruning & {\text{$\times 10^{-3}$}} & & after pruning & before pruning & {\text{$\times 10^{-3}$}} & & after pruning \\ \hline\hline HDG-{{\tt hod}} & 2,500 & 1.5 & 100 & 1,442 & 2,500 & 2.7 & 60 & 1,231 \\ HDG-{{\tt hodg}} & 10,000 & 20.9 & 200 & 550 & 10,000 & 2.4 & 60 & 3,891 \\ HDG-{{\tt jpd}} & 150 & 11.5 & 80 & 148 & 150 & 48.1 & 120 & 142 \\ HDG-{{\tt jmv}} & 600 & 3.4 & 140 & 571 & 450 & 3.1 & 60 & 449 \\ HDG-{{\tt hod}}+{{\tt hodg}} & 12,500 & 17.0 & 180 & 786 & 12,500 & 4.7 & 140 & 3,987 \\ HDG-{{\tt jpd}}+{{\tt jmv}} & 750 & 2.0 & 80 & 690 & 600 & 6.8 & 100 & 581 \\ HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jpd}} & 12,650 & 8.2 & 160 & 2,221 & 12,650 & 29.4 & 80 & 239 \\ HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jmv}} & 13,100 & 7.4 & 180 & 2,189 & 12,950 & 25.0 & 100 & 135 \\ HDG-{{\tt hodg}}+{{\tt jpd}}+{{\tt jmv}} & 10,750 & 8.3 & 180 & 1,711 & 10,600 & 15.2 & 140 & 456 \\ HDG-all features & 13,250 & 13.3 & 120 & 1,013 & 13,100 & 19.0 & 100 & 300 \\ \hline \end{tabular}} \end{center} \end{table*} \section{Experimental Results} \label{sec:results} \subsection{MSRAction3D, 3D Action Pairs, CAD-60, and UWA3D Activity Datasets} \begin{table*}[t!] \caption{Comparison of average cross-subject action recognition accuracies (percentage) for the four single-view datasets (\emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, $M=4$ in Eq.~\eqref{eq:rank}). Each block of rows shows the performance of one method and its variants. The best algorithm for each dataset is highlighted in bold. The last column of the table shows the average rank of the best performing algorithm in each block. The final rank values are computed using Eq.~\eqref{eq:rank}, where top performing methods have smaller rank values. Other poorer performing methods in the same block are not considered for their rank values, so their final ranks are marked as `--'.} \begin{center} \resizebox{\textwidth}{!}{\begin{tabular}{ c | l | c | c | c | c | c |} \cline{1-7} \multicolumn{1}{c|}{~} & {\bf Method} & {\bf MSRAction3D} & {\bf 3D Action Pairs} & {\bf CAD-60} & {\bf UWA3D Activity} & {\bf AVRank}\\ \hline \multirow{16}{*}{\parbox{1.0cm}{Hand-crafted features}} & HON4D~\cite{Oreifej2013} (Depth) & 82.15 & {\bf 96.00} & 72.70 & 48.89 & 3.25\\ \cline{2-7} & HOPC~\cite{Rahmani2016} (Depth) & 85.49 & 92.44 & 47.55 & 60.58 & 3.25\\ \cline{2-7} & LARP-SO-logarithm map \cite{Vemulapalli2016} (Skel.) & 88.69 & 92.96 & 69.12 & 51.96 & -- \\ & LARP-SO-unwrapping while rolling \cite{Vemulapalli2016} (Skel.) & 88.47 & 94.09 & 69.12 & 53.05 & -- \\ & LARP-SO-FTP \cite{Vemulapalli2016} (Skel.) & 89.40 & 94.67 & 76.96 & 50.41 & 2.50\\ \cline{2-7} & HDG-{{\tt hod}}~\cite{lei2017} (Depth) & 66.22 & 81.20 & 26.47 & 44.35 & --\\ & HDG-{{\tt hodg}}~\cite{lei2017} (Depth) & 70.34 & 90.98 & 50.98 & 54.23 & --\\ & HDG-{{\tt jpd}}~\cite{lei2017} (Skel.) & 55.54 & 53.78 & 46.08 & 40.88 & -- \\ & HDG-{{\tt jmv}}~\cite{lei2017} (Skel.) & 62.40 & 84.87 & 41.18 & 51.02 & --\\ & HDG-{{\tt hod}}+{{\tt hodg}}~\cite{lei2017} (Depth) & 71.81 & 90.96 & 51.96 & 55.17 & --\\ & HDG-{{\tt jpd}}+{{\tt jmv}}~\cite{lei2017} (Skel.) & 65.57 & 84.93 & 49.02 & 55.57 & --\\ & HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jpd}}~\cite{lei2017} (Depth + Skel.) & 72.06 & 90.72 & 51.47 & 56.41 & --\\ & HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jmv}}~\cite{lei2017} (Depth + Skel.) & 75.41 & 92.27 & 49.51 & 58.80 & --\\ & HDG-{{\tt hodg}}+{{\tt jpd}}+{{\tt jmv}}~\cite{lei2017} (Depth + Skel.) & 75.00 & 92.28 & 52.94 & 59.82 & --\\ & HDG-all features~\cite{lei2017} (Depth + Skel.) & 75.45 & 92.13 & 51.96 & 60.33 & 4.00\\ \cline{2-7} & SCK+DCK~\cite{piotr2016} (Skel.) & {\bf 89.47} & {\bf 96.00} & {\bf 89.22} & {\bf 61.52} & 1.00 \\ \hline \multirow{26}{*}{\parbox{1.0cm}{Deep learning features}} & Frames+CNN~\cite{Ke2017} (Skel.) & 60.73 & 73.71 & 58.82 & 46.47 & -- \\ & Clips+CNN+Pooling~\cite{Ke2017} (Skel.) & 67.64 & 74.86 & 58.82 & 46.47 & -- \\ & Clips+CNN+Concatenation~\cite{Ke2017} (Skel.) & 71.27 & 78.29 & 61.76 & 53.85 & -- \\ & Clips+CNN+MTLN~\cite{Ke2017} (Skel.) & 73.82 & 79.43 & 67.65 & 54.81 & 2.25 \\ \cline{2-7} & HPM+AP~\cite{Rahmani2016CVPR} (Depth) & 56.73 & 56.11 & 44.12 & 42.32 & -- \\ & HPM+TM~\cite{Rahmani2016CVPR} (Depth) & 72.00 & {\bf 98.33} & 44.12 & 54.78 & 2.50\\ \cline{2-7} & 1-layer RNN~\cite{amir2016} (Skel.) & 18.02 & 32.76 & 54.90 & 14.27 & --\\ & 2-layer RNN~\cite{amir2016} (Skel.) & 27.80 & 56.13 & 54.91 & 35.36 & --\\ & 1-layer LSTM~\cite{amir2016} (Skel.) & 62.26 & 67.14 & 61.77 & 50.81 & --\\ & 2-layer LSTM~\cite{amir2016} (Skel.) & 65.33 & 73.72 & 63.24 & 46.78 & --\\ & 1-layer P-LSTM~\cite{amir2016} (Skel.) & 70.50 & 70.86 & 61.76 & {\bf 55.16} & --\\ & 2-layer P-LSTM~\cite{amir2016} (Skel.) & 69.35 & 72.00 & 67.65 & 50.81 & 2.75\\ & \textbf{Our implementation with modified hyperparam. values:} & & & & & \\ & 1-layer LSTM (8 segments, 100 hidden neurons) (Skel.) & 64.75 & 73.14 & 58.82 & 52.58 & --\\ & 2-layer P-LSTM (10 segments, 50 hidden neurons) (Skel.) & 66.09 & 75.43 & 67.65 & 50.00 & -- \\ & 2-layer P-LSTM (10 segments, 100 hidden neurons) (Skel.) & 67.43 & 71.43 & 54.41 & 50.32 & -- \\ & 2-layer P-LSTM (20 segments, 50 hidden neurons) (Skel.) & 73.18 & 71.43 & 52.94 & 49.68 & -- \\ & 2-layer P-LSTM (20 segments, 100 hidden neurons) (Skel.) & 70.50 & 71.43 & 58.82 & 53.55 & -- \\ \cline{2-7} & IndRNN (4 layers)~\cite{shuai2018} (Skel.) & 71.50 & 90.05 & 51.72 & 44.63 & -- \\ & IndRNN (6 layers)~\cite{shuai2018} (Skel.) & 72.91 & 89.53 & 57.03 & 42.66 & -- \\ & \textbf{Our improved results:} & & & & & \\ & IndRNN (4 layers, with {{\tt jpd}}) (Skel.) & 76.34 & 82.66 & {\bf 84.69} & 52.09 & -- \\ & IndRNN (6 layers, with{{\tt jpd}}) (Skel.) & {\bf 77.47} & 86.88 & 80.16 & 51.34 & 2.00\\ \cline{2-7} & ST-GCN$^*$~\cite{stgcn2018aaai} (Skel.) & 27.64 (69.09) & 20.00 (77.14) & 23.53 (70.59) & 22.12 (45.83) & --\\ & \textbf{Our improved results:} & & & & & \\ & ST-GCN$^*$ (with {{\tt jpd}}) (Skel.) & 18.18 (64.00) & 54.16 (96.57) & 26.47 (67.65) & 36.54 (70.51) & 4.75\\ \hline \end{tabular}} \label{evaluationresults} \end{center} \vspace{-1ex} {\textsuperscript{*}\footnotesize{For ST-GCN, the numbers inside the parentheses denote the top-5 accuracy.}} \end{table*} Table~\ref{evaluationresults} summarizes the results for the single-view action recognition on these datasets. The algorithms with the highest recognition accuracy for the handcrafted feature and deep learning feature categories are highlighted in bold. Among the methods that use handcrafted features, SCK+DCK outperformed all other methods on all the datasets. The use of RBF kernels to capture higher-order statistics of the data and complexity of action dynamics demonstrates its effectiveness for action recognition. For the 3D Action Pairs and UWA3D Activity datasets, HON4D and HOPC are, respectively, the second top performers. The poorer performance of HDG was due to noise in the depth sequences which affected the HDG-{{\tt hod}} and HDG-{{\tt hodg}} features, even though the human subjects were successfully segmented. In general, HDG-{{\tt hodg}} outperformed HDG-{{\tt hod}}, and HDG-{{\tt jmv}} outperformed HDG-{{\tt jpd}}. We also found that concatenating more individual features in HDG (see Table~\ref{evaluationresults}, row HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jpd}} to row HDG-all features) helped improve action recognition. We note that our results for HDG are different from those reported in~\cite{Rahmani2014} because we used \mbox{$1\!\times\!1\!\times\!5=5$} cells~\cite{lei2017} instead of $2\!\times\!2\!\times\!5=20$ cells to store the joint motion features. For deep learning methods, the 1-layer P-LSTM method (8 video segments, 50 hidden neurons) outperformed others on the UWA3D Activity dataset. In general, a 1-layer LSTM with more hidden neurons performed better than a 1-layer LSTM with fewer neurons, and P-LSTM performed better than the traditional LSTM and RNN (see the last column in Table~\ref{evaluationresults}). The 2-layer P-LSTM (20 video segments, 50 hidden neurons) achieved the best recognition accuracy on the MSRAction3D dataset and HPM+TM outperformed on the 3D Action Pairs dataset. Comparing the last 5 rows of Table~\ref{evaluationresults} for different variants of 2-layer P-LSTM shows that having more video segments and/or hidden neurons does not guarantee better performance. The reasons are: (i)~more video segments have less averaging effect and so it is likely that noisy video frames with unreliable skeletal information would be used for feature representation; (ii)~having too many hidden neurons would cause overfitting in the training process. Using the {{\tt jpd}} features instead of the raw 3D joint coordinates boosts the recognition accuracies for both IndRNN and ST-GCN on almost all the datasets. For the CAD-60 and MSRAction3D datasets, the 4-layer IndRNN and 6-layer IndRNN using {{\tt jpd}} features are the top two performers. Compared to using the raw 3D joint coordinates, the improvement due to the use of {{\tt jpd}} is 4.56\% for IndRNN (6 layers) on the MSRAction3D dataset and 32.97\% for IndRNN (4 layers) on the CAD-60 dataset. The last column of Table~\ref{evaluationresults} computed using Eq.~\eqref{eq:rank} shows that SCK+DCK obtains average rank 1 score, followed closely by the 6-layer IndRNN with {{\tt jpd}} with average rank 2 score. The ST-GCN method uses a more complex architecture having 9 layers of spatio-temporal graph convolutional operators, which require a large dataset for training. As all the datasets in Table~\ref{evaluationresults} are quite small, its poor performance (average rank 4.75 score) is not unexpected. \subsection{NTU RGB+D Dataset} Table~\ref{nturesults}~summarizes the evaluation results for cross-subject and cross-view action recognition on the NTU RGB+D dataset, where methods are grouped into the handcrafted feature and deep learning feature categories. Top performing methods are highlighted in bold. Among the methods using handcrafted features, SCK+DCK performed the best for both cross-subject action recognition and cross-view action recognition. Similarly to results on the four datasets shown in Table~\ref{evaluationresults}, combining more individual features in HDG resulted in higher recognition accuracy for both the cross-subject and cross-view action recognition. Among deep learning methods, ST-GCN and the 6-layer IndRNN combined with the {{\tt jpd}} features outperformed other deep learning methods in both cross-subject and cross-view action recognition. In particular, with {{\tt jpd}}, ST-GCN became the top performer (achieving 83.36\%) for cross-subject action recognition and IndRNN (6 layers) achieved the highest accuracy (89.0\%) for cross-view action recognition. Compared to using the raw 3D skeleton joint coordinates, using the {{\tt jpd}} features helps improve the recognition accuracies of both IndRNN and ST-GCN. For example, with {{\tt jpd}} features, both the top-1 and top-5 accuracies of ST-GCN increased by 1.79\% and 0.61\% in the cross-subject experiment. For the other deep learning methods, the recognition accuracies of 2-layer RNN, 2-layer LSTM and 2-layer P-LSTM are higher than those of 1-layer RNN, 1-layer LSTM and 1-layer P-LSTM. Similar to the results in Table~\ref{evaluationresults}, P-LSTM performed better than the traditional LSTM and RNN. HPM+AP and HPM+TM, on the other hand, did not perform so well. The reason is that both of these methods were trained given only 339 representative human poses from a human pose dictionary whereas the 60 action classes of NTU RGB+D dataset include many more human poses of higher complexity. \begin{table}[t!] \caption{Comparison of average recognition accuracies (percentage) for both cross-subject and cross-view action recognition on the NTU RGB+D Dataset.} \begin{center} \resizebox{0.48\textwidth}{!}{\begin{tabular}{ c | l | c | c |} \cline{1-4} \multicolumn{1}{c|}{~} & {\bf Method} & {\bf Cross-subject} & {\bf Cross-view} \\ \hline \multirow{14}{*}{\parbox{1.0cm}{Hand-crafted features}} & HON4D~\cite{Oreifej2013} (Depth) & 30.6 & 7.3\\ \cline{2-4} & HOPC~\cite{Rahmani2016} (Depth) & 40.3 & 30.6\\ \cline{2-4} & LARP-SO-FTP~\cite{Vemulapalli2016} (Skel.) & 52.1 & 53.4\\ \cline{2-4} & HDG-{{\tt hod}}~\cite{lei2017} (Depth) & 20.1 & 13.5\\ & HDG-{{\tt hodg}}~\cite{lei2017} (Depth) & 23.0 & 25.2\\ & HDG-{{\tt jpd}}~\cite{lei2017} (Skel.) & 27.8 & 35.9\\ & HDG-{{\tt jmv}}~\cite{lei2017} (Skel.) & 38.1 & 50.0\\ & HDG-{{\tt hod}}+{{\tt hodg}}~\cite{lei2017} (Depth) & 24.6 & 26.5\\ & HDG-{{\tt jpd}}+{{\tt jmv}}~\cite{lei2017} (Skel.) & 39.7 & 51.9\\ & HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jpd}}~\cite{lei2017} (Depth + Skel.) & 29.4 & 38.8\\ & HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jmv}}~\cite{lei2017} (Depth + Skel.) & 39.0 & 57.0\\ & HDG-{{\tt hodg}}+{{\tt jpd}}+{{\tt jmv}}~\cite{lei2017} (Depth + Skel.) & 41.2 & 57.2\\ & HDG-all features~\cite{lei2017} (Depth + Skel.) & 43.3 & 58.2\\ \cline{2-4} & SCK+DCK~\cite{piotr2016} (Skel.) & {\bf 72.8} & {\bf 74.1}\\ \hline \multirow{22}{*}{\parbox{1.0cm}{Deep learning features}} & Frames+CNN~\cite{Ke2017} (Skel.) & 75.7 & 79.6\\ & Clips+CNN+Concatenation~\cite{Ke2017} (Skel.) & 77.1 & 81.1\\ & Clips+CNN+Pooling~\cite{Ke2017} (Skel.) & 76.4 & 80.5\\ & Clips+CNN+MTLN~\cite{Ke2017} (Skel.) & 79.6 & 84.8\\ & ${\text{Clips+CNN+MTLN}^\ddagger}$~\cite{Ke2017} (Skel.) & 79.54 & 84.70\\ \cline{2-4} & HPM+AP~\cite{Rahmani2016} (Depth) & 40.2 & 42.2 \\ & HPM+TM~\cite{Rahmani2016} (Depth) & 50.1 & 53.4 \\ \cline{2-4} & 1-layer RNN~\cite{amir2016} (Skel.) & 56.0 & 60.2\\ & 2-layer RNN~\cite{amir2016} (Skel.) & 56.3 & 64.1\\ & 1-layer LSTM~\cite{amir2016} (Skel.) & 59.1 & 66.8\\ & 2-layer LSTM~\cite{amir2016} (Skel.) & 60.7 & 67.3\\ & 1-layer P-LSTM~\cite{amir2016} (Skel.) & 62.1 & 69.4\\ & 2-layer P-LSTM~\cite{amir2016} (Skel.) & 62.9 & 70.3\\ & ${\text{2-layer P-LSTM}^\ddagger}$~\cite{amir2016} (Skel.) & 63.02 & 70.39\\ \cline{2-4} & IndRNN (4 layers)~\cite{shuai2018} (Skel.) & 78.6 & 83.8 \\ & IndRNN (6 layers)~\cite{shuai2018} (Skel.) & 81.8 & 88.0 \\ & \textbf{Our improved results:} & & \\ & IndRNN (4 layers, with {{\tt jpd}})(Skel.) & 79.5 & 84.5 \\ & IndRNN (6 layers, with {{\tt jpd}})(Skel.) & 83.0 & {\bf 89.0} \\ \cline{2-4} & ST-GCN$^*$~\cite{stgcn2018aaai} (Skel.) & 81.57 (96.85) & 88.76 (98.83) \\ & \textbf{Our improved results:} & & \\ & ST-GCN$^*$ (with {{\tt jpd}}) (Skel.) & {\bf 83.36} (97.46) & 88.84 (98.87) \\ \hline \end{tabular}} \label{nturesults} \end{center} \vspace{-1ex} \textsuperscript{$\ddagger$}\footnotesize{Our implementations for reproducing original authors' experiment results.} \\ \textsuperscript{$^*$}\footnotesize{For ST-GCN, the numbers inside the parentheses denote the top-5 accuracy.} \end{table} \subsection{UWA3D Multiview Activity II Dataset} The ten algorithms were compared on the UWA3D Multiview Activity II dataset using cross-view action recognition. Table~\ref{uwa3dmresults}~summarizes the results. The top 2 action recognition algorithms are highlighted in bold in each column for the handcrafted feature and deep learning feature categories. For the methods using handcrafted features, the HDG-all features performed the best for cross-view action recognition (the last column in Table~\ref{uwa3dmresults}) followed by other HDG variants that use skeletons and depth. Among skeleton-only methods, HDG-{{\tt jpd}}+{{\tt jmv}} was the second best performer followed by SCK+DCK, HDG-{{\tt jmv}}, and LARP-SO-FTP, which all performed better than depth-based features such as HON4D, HDG-{{\tt hod}}, HDG-{{\tt hodg}} and HDG-{{\tt hod}}+{{\tt hodg}}. According to the table, using one or both skeleton-based features (HDG-{{\tt jpd}} and/or HDG-{{\tt jmv}}) in HDG improved its results. For deep learning methods, HPM+TM and HPM+AP achieved the highest results. Although Clips+CNN+MTLN performed better than other `Clips' variants, it did not perform as good as HPM+TM and HPM+AP, due to the limited number of video samples in the dataset. P-LSTM performed better than the traditional LSTM and RNN. We noticed that stacking more layers for IndRNN or using {{\tt jpd}} features for both IndRNN and ST-GCN did not help increase the recognition accuracy. This is due to the lack of representative training videos (compared to the results on the NTU RGB+D dataset in cross-view action recognition). \begin{table*}[t!] \begin{center} \caption{Comparison of average recognition accuracies (percentage) for cross-view action recognition on the UWA3D Multiview Activity II dataset.} \resizebox{\textwidth}{!}{\begin{tabular}{ c | l | c c c c c c c c c c c c c |} \cline{1-15} \multicolumn{1}{c|}{~} & Training view & \multicolumn{2}{c}{$V_1$ \& $V_2$} & \multicolumn{2}{c}{$V_1$ \& $V_3$} & \multicolumn{2}{c}{$V_1$ \& $V_4$} & \multicolumn{2}{c}{$V_2$ \& $V_3$} & \multicolumn{2}{c}{$V_2$ \& $V_4$} & \multicolumn{2}{c}{$V_3$ \& $V_4$} & Average\\ \cline{2-14} \multicolumn{1}{c|}{~} & Testing view & $V_3$ & $V_4$ & $V_2$ & $V_4$ & $V_2$ & $V_3$ & $V_1$ & $V_4$ & $V_1$ & $V_3$ & $V_1$ & $V_2$ & {}\\ \hline \multirow{18}{*}{\parbox{1.0cm}{Hand-crafted features}} & HON4D~\cite{Oreifej2013} (Depth) & 31.1 & 23.0 & 21.9 & 10.0 & 36.6 & 32.6 & 47.0 & 22.7 & 36.6 & 16.5 & 41.4 & 26.8 & 28.9\\ \cline{2-15} & HOPC~\cite{Rahmani2016} (Depth) & 25.7 & 20.6 & 16.2 & 12.0 & 21.1 & 29.5 & 38.3 & 13.9 & 29.7 & 7.8 & 41.3 & 18.4 & 22.9\\ & ${\text{Holistic HOPC}^*}$ ~\cite{Rahmani2016} (Depth) & 32.3 & 25.2 & 27.4 & 17.0 & 38.6 & 38.8 & 42.9 & 25.9 & 36.1 & 27.0 & 42.2 & 28.5 & 31.8\\ & ${\text{Local HOPC+STK-D}^*}$ ~\cite{Rahmani2016} (Depth) & 52.7 & 51.8 & {\bf 59.0} & {\bf 57.5} & 42.8 & 44.2 & 58.1 & 38.4 & 63.2 & 43.8 & 66.3 & 48.0 & 52.2\\ \cline{2-15} & ${\text{LARP-SO-logarithm map}}$ \cite{Vemulapalli2016} (Skel.) & 48.2 & 47.4 & 45.5 & 44.9 & 46.3 & 52.7 & 62.2 & 46.3 & 57.7 & 45.8 & 61.3 & 40.3 & 49.9\\ & ${\text{LARP-SO-unwrapping while rolling}}$ \cite{Vemulapalli2016} (Skel.) & 50.4 & 45.7 & 44.0 & 44.5 & 40.8 & 49.6 & 57.4 & 44.4 & 57.6 & 47.4 & 59.2 & 40.8 & 48.5\\ & ${\text{LARP-SO-FTP}}$ \cite{Vemulapalli2016} (Skel.) &54.9 & 55.9 &50.0 &54.9& 48.1 & 56.0 & 66.5 & {\bf 57.2} & 62.5 & 54.0 & 68.9 & 43.6 & 56.0\\ \cline{2-15} & HDG-{{\tt hod}}~\cite{lei2017} (Depth) & 22.5 & 17.4 & 12.5 & 10.0 & 19.6 & 20.4 & 26.7 & 13.0 & 18.7 & 10.0 & 27.9 & 17.2 & 18.0\\ & HDG-{{\tt hodg}}~\cite{lei2017} (Depth) & 26.9 & 34.2 & 20.3 & 18.6 & 34.7 & 26.7 & 41.0 & 29.2 & 29.4 & 11.8 & 40.7 & 28.8 & 28.5\\ & HDG-{{\tt jpd}}~\cite{lei2017} (Skel.) & 36.3 & 32.4 & 31.8 & 35.5 & 34.4 & 38.4 & 44.2 & 30.0 & 44.5 & 33.7 & 44.4 & 34.0 & 36.6\\ & HDG-{{\tt jmv}}~\cite{lei2017} (Skel.) & 57.2 & 59.3 & {\bf 59.3} & 54.3 & 56.8 & 50.6 & 63.4 & 52.4 & 65.7 & 53.7 & 67.7& 56.9 & 58.1\\ & {HDG-{{\tt hod}}+{{\tt hodg}}}~\cite{lei2017} (Depth) & 26.6 & 33.6 & 17.9 & 19.3 & 34.4 & 26.2 & 40.5 & 27.6 & 28.6 & 11.6 & 38.4 & 29.0 & 27.8\\ & {HDG-{{\tt jpd}}+{{\tt jmv}}}~\cite{lei2017} (Skel.) & {\bf 61.0} & 61.8 & {\bf 59.3} & 56.0 & 60.0 & 57.4 & 68.8 & 54.2 & {\bf 71.1} & {\bf 57.2} & 69.7 & 59.0 & {\bf 61.3}\\ & {HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jpd}}}~\cite{lei2017} (Depth + Skel.) & 31.0 & 43.5 & 25.7 & 21.4 & 45.9 & 31.1 & 53.2 & 35.7 & 38.0 & 11.6 & 49.7 & 38.3 & 35.4\\ & {HDG-{{\tt hod}}+{{\tt hodg}}+{{\tt jmv}}}~\cite{lei2017} (Depth + Skel.) & 59.0 & {\bf 62.2} & 58.1 & 52.0 & 62.5 & 57.1 & 66.0 & 54.2 & 67.7 & 52.7 & 70.3 & {\bf 61.1} & 60.2\\ & {HDG-{{\tt hodg}}+{{\tt jpd}}+{{\tt jmv}}}~\cite{lei2017} (Depth + Skel.) & 58.2 & 61.8 & 54.8 & 47.6 & {\bf 63.5} & {\bf 58.7} & {\bf 69.0} & 52.3 & 64.9 & 47.1 & 67.2 & 59.4 & 58.7\\ & {HDG-all features}~\cite{lei2017} (Depth + Skel.) & {\bf 60.9} & {\bf 64.3} & 57.9 & 54.6 & {\bf 62.6} & {\bf 59.2} & 68.9 & 55.8 & 69.8 & {\bf 55.2} & {\bf 71.8} & {\bf 62.6} & {\bf 61.9}\\ \cline{2-15} & SCK+DCK~\cite{piotr2016} (Skel.) & 56.0 & 61.8 & 50.0 & {\bf 61.8} & 54.1 & 56.7 & {\bf 71.4} & {\bf 56.9} & {\bf 72.9} & 49.6 & {\bf 71.7} & 44.0 & 58.9 \\ \hline \multirow{22}{*}{\parbox{1.0cm}{Deep learning features}} & {Frames+CNN}~\cite{Ke2017} (Skel.) & 30.4 & 29.8 & 27.8 & 23.8 & 31.7 & 27.2 & 39.2 & 27.8 & 31.4 & 23.2 & 38.8 & 28.6 & 30.0\\ & {Clips+CNN+Pooling}~\cite{Ke2017} (Skel.) & 31.6 & 33.3 & 30.6 & 27.8 & 35.3 & 29.6 & 44.3 & 31.3 & 35.3 & 23.2 & 43.1 & 31.0 & 33.0\\ & {Clips+CNN+Concatenation}~\cite{Ke2017} (Skel.) & 33.2 & 36.9 & 32.5 & 29.8 & 36.9 & 31.2 & 46.3 & 31.0 & 39.2 & 23.6 & 45.5 & 31.7 & 34.8 \\ & {Clips+CNN+MTLN}~\cite{Ke2017} (Skel.) & 36.4 & 38.9 & 34.1 & 30.6 & 37.7 & 33.2 & 46.7 & 31.3 & 38.8 & 25.6 & 49.8 & 33.7 & 36.4 \\ \cline{2-15} & {HPM+AP}~\cite{Rahmani2016CVPR} (Depth) & {\bf 68.3} & 51.7 & {\bf 60.2} & {\bf 62.2} & 38.7 & {\bf 50.0} & {\bf 58.7} & 37.8 & {\bf 70.6} & {\bf 61.6} & {\bf 74.0} & {\bf 55.6} & {\bf 57.5}\\ & {HPM+TM}~\cite{Rahmani2016CVPR} (Depth) & {\bf 81.7} & {\bf 76.4} & {\bf 74.1} & {\bf 78.7} & {\bf 57.9} & {\bf 69.4} & {\bf 75.8} & {\bf 62.9} & {\bf 81.4} & {\bf 79.9} & {\bf 83.3} & {\bf 73.7} & {\bf 74.6}\\ \cline{2-15} & {1-layer RNN}~\cite{amir2016} (Skel.) & 11.4 & 11.1 & 10.0 & 14.9 & 11.9 & 13.3 & 11.1 & 15.2 & 10.3 & 12.2 & 9.8 & 12.4 & 12.0\\ & {2-layer RNN}~\cite{amir2016} (Skel.) & 23.4 & 21.6 & 27.3 & 22.7 & 26.3 & 20.3 & 21.7 & 19.5 & 20.7 & 24.8 & 27.0 & 21.5 & 23.1\\ & {1-layer LSTM}~\cite{amir2016} (Skel.) & 28.9 & 12.8 & 19.2 & 15.5 & 20.0 & 33.1 & 48.2 & 16.5 & 43.3 & 15.5 & 38.7 & 16.4 & 25.7\\ & {2-layer LSTM}~\cite{amir2016} (Skel.) & 29.7 & 16.3 & 20.4 & 12.8 & 26.8 & 30.5 & 53.0 & 11.0 & 37.0 & 17.1 & 47.4 & 20.0 & 26.8\\ & {1-layer P-LSTM}~\cite{amir2016} (Skel.) & 26.8 & 23.5 & 22.4 & 22.7 & 24.4 & 31.3 & 49.6 & 20.3 & 38.3 & 19.5 & 45.9 & 17.6 & 28.5\\ & {2-layer P-LSTM}~\cite{amir2016} (Skel.) & 30.1 & 24.7 & 25.2 & 21.5 & 24.4 & 37.4 & 51.0 & 22.7 & 43.1 & 21.1 & 47.8 & 17.2 & 30.5\\ & \textbf{Our implementation with modified hyperparam. values:} & & & & & & & & & & & & &\\ & {2-layer P-LSTM} (10 segments, 50 hidden neurons) (Skel.) & 23.5 & 24.3 & 22.4 & 25.5 & 25.6 & 30.9 & 48.6 & 21.1 & 41.5 & 19.5 & 43.9 & 15.6 & 28.5\\ & {2-layer P-LSTM} (10 segments, 100 hidden neurons) (Skel.) & 21.1 & 22.7 & 24.8 & 21.1 & 22.4 & 33.7 & 47.8 & 21.1 & 45.1 & 22.0 & 49.4 & 17.6 & 29.1\\ & {2-layer P-LSTM} (20 segments, 50 hidden neurons) (Skel.) & 25.2 & 18.3 & 24.8 & 21.5 & 26.4 & 30.5 & 49.0 & 19.1 & 41.5 & 24.4 & 43.5 & 14.8 & 28.3\\ & {2-layer P-LSTM} (20 segments, 100 hidden neurons) (Skel.) & 27.6 & 24.3 & 24.8 & 21.9 & 28.4 & 32.9 & 44.3 & 24.3 & 44.3 & 20.3 & 45.9 & 15.6 & 29.6\\ \cline{2-15} & {IndRNN (4 layers)}~\cite{shuai2018} (Skel.) & 34.3 & {\bf 53.8} & 35.2 & 42.5 & {\bf 39.1} & 38.9 & 49.2 & {\bf 42.5} & 46.0 & 27.1 & 48.6 & 30.9 & 40.7\\ & {IndRNN (6 layers)}~\cite{shuai2018} (Skel.) & 30.7 & 47.2 & 32.2 & 36.0 & 38.8 & 35.4 & 44.5 & 37.9 & 40.6 & 23.9 & 39.2 & 25.2 & 36.0\\ & {IndRNN (4 layers, with {{\tt jpd}})} (Skel.) & 33.5 & 40.2 & 26.9 & 40.9 & 30.4 & 41.1 & 50.7 & 36.7 & 46.1 & 24.6 & 49.0 & 23.0 & 36.9\\ & {IndRNN (6 layers, with {{\tt jpd}})} (Skel.) & 29.4 & 36.3 & 23.9 & 38.2 & 26.0 & 36.8 & 45.4 & 33.0 & 41.2 & 20.5 & 44.7 & 18.6 & 32.8\\ \cline{2-15} & ST-GCN~\cite{stgcn2018aaai} (Skel.) & 36.4 & 26.2 & 20.6 & 30.2 & 33.7 & 22.4 & 43.1 & 26.6 & 16.9 & 12.8 & 26.3 & 36.5 & 27.6 \\ & ST-GCN (with {{\tt jpd}}) (Skel.) & 29.6 & 21.8 & 15.5 & 19.1 & 17.1 & 18.8 & 35.3 & 14.3 & 31.0 & 14.8 & 13.3 & 15.5 & 20.5 \\ \hline \end{tabular}} \label{uwa3dmresults} \end{center} \vspace{-1ex} {\textsuperscript{*}\footnotesize{This result is obtained from \cite{Rahmani2016} for comparison.}} \end{table*} \begin{figure}[t!] \centering \includegraphics[width=\linewidth,viewport=20 0 650 615, clip=true]{uwamultiview_v3v4v1.pdf} \caption{Confusion matrix for HDG-all features on the UWA3D Multiview Activity II dataset when $V_3$ and $V_4$ were used for training and $V_1$ was used for testing. For each action class along the diagonal, the darker is the colour, the higher is the recognition accuracy.} \label{uwamultiviewv3v4v1} \end{figure} Fig.~\ref{uwamultiviewv3v4v1} shows a confusion matrix for the HDG-all representation on the UWA3D Multiview Activity II dataset when $V_3$ and $V_4$ views were used for training and $V_1$ was used for testing. According the figure, the algorithm was confused by a few actions which have similar motion trajectories. For example, {\it one hand waving} is similar to {\it two hand waving} and {\it two hand punching}; {\it walking} is very similar to {\it irregular walking}; {\it bending} and {\it putting down} have very similar appearance; {\it sneezing} and {\it coughing} are very similar actions. \section{Discussions} \label{sec:discussion} \subsection{Single-view versus cross-view} Table~\ref{overallresults} summarizes the performance of each algorithm for both single-view action recognition and cross-view action recognition. One can observe from the table that some algorithms such as HON4D, LARP-SO-FTP, Clips+CNN+MTLN, P-LSTM, and SCK+DCK performed better for single-view action recognition but performed slightly worse in cross-view action recognition. For cross-subject action recognition, SCK+DCK outperformed all other algorithms; for cross-view action recognition, HDG-all, SCK+DCK and our improved IndRNN with {{\tt jpd}} features all performed well (having the same average rank values). Fig.~\ref{new_comparison} summarizes the average accuracy of all the algorithms grouped under the handcrafted and deep learning feature categories. On average, we found that the recognition accuracy for cross-view action recognition is lower than cross-subject action recognition using handcrafted features, with the poorest performance from depth-based features. Combining both depth- and skeleton-based features together helps improve cross-view action recognition and gives a similar performance for cross-subject action recognition. Overall, the performance on cross-view recognition is lower than cross-subject recognition, except for the deep learning depth-based feature methods. It should be noted that there are only two methods (HPM+AP and HPM+TM) falling into this category and they performed well on the UWA3D Multiview Activity II dataset and reasonably well on the NTU RGB+D dataset. \begin{figure}[t!] \centering \includegraphics[width=\linewidth]{Picture1.pdf} \\ \footnotesize{~~~~~(a) \hspace{3cm} ~~~~~(b)} \caption{The average recognition accuracy (in percentage) of methods using handcrafted and deep learning features for cross-subject and cross-view recognition. Numbers of methods using handcrafted (i)~depth-based features: 7; (ii)~skeleton-based features: 7; (iii)~depth+skeleton-based features: 4. Numbers of methods using deep learning (i)~depth-based features: 2; (ii)~skeleton-based features: 20; (iii)~depth+skeleton-based features: 0 (see Tables~\ref{evaluationresults}--\ref{uwa3dmresults}). } \label{new_comparison} \end{figure} \begin{table}[t!] \caption{The average recognition accuracies / [AVRank] of all the ten algorithms for both cross-subject and cross-view action recognition.} \begin{center} \resizebox{0.48\textwidth}{!}{\begin{tabular}{| l | c | c |} \hline Algorithms & ${\text {Cross-subject}^{\dagger}}$ & ${\text {Cross-view}^{\ddagger}}$ \\ \hline \hline HON4D~\cite{Oreifej2013} (Depth) & 52.8 / [3.6] & 18.1 / [5.0]\\ \hline HDG-all~\cite{lei2017} (Depth + Skel.) & 56.6 / [3.8] & 60.1 / {\bf [1.5]}\\ \hline HOPC~\cite{Rahmani2016} (Depth) & 55.9 / [3.4] & 41.4 / [4.0]\\ \hline LARP-SO-FTP~\cite{Vemulapalli2016} (Skel.) & 65.0 / [2.4] & 54.7 / [3.0]\\ \hline SCK+DCK~\cite{piotr2016} (Skel.) & 78.7 / {\bf [1.0]} & 66.5 / {\bf [1.5]} \\ \hline \hline HPM+TM~\cite{Rahmani2016CVPR} (Depth) & 58.7 / [3.0] & 64.0 / [3.0]\\ \hline Clips+CNN+MTLN~\cite{Ke2017} (Skel.) & 74.3 / [2.4] & 60.6 / [3.0]\\ \hline P-LSTM~\cite{amir2016} (Skel.) & 64.0 / [3.0] & 50.4 / [4.0]\\ \hline IndRNN~\cite{shuai2018}(Skel.) & 72.6 / [2.4] & 62.1 / [2.0]\\ IndRNN~with {{\tt jpd}} (Skel.) & 77.6 / {\bf [2.0]} & 60.8 / {\bf [1.5]} \\ \hline ST-GCN~\cite{stgcn2018aaai}(Skel.) & 52.4 / [4.2] & 58.2 / [3.5]\\ ST-GCN~with {{\tt jpd}} (Skel.) & 57.7 / [4.0] & 54.7 / [3.0]\\ \hline \end{tabular}} \label{overallresults} \end{center} \vspace{-1ex} {\textsuperscript{$\dagger$}\footnotesize{For cross-subject action recognition, the performance of each algorithm is computed by averaging all the recognition accuracies / rank values on the MSRAction3D, 3D Action Pairs, CAD-60, UWA3D Activity and NTU RGB+D datasets.} \quad {\textsuperscript{$\ddagger$}\footnotesize{For cross-view action recognition, they are computed over the UWA3D Multiview Activity II and NTU RGB+D datasets.}} }\\ \end{table} \begin{figure*}[t!] \centering \begin{subfigure}{0.32\textwidth} \includegraphics[width=\linewidth]{depthplot.pdf} \caption{Depth-based features} \label{fig_d} \end{subfigure}\hfil \begin{subfigure}{0.32\textwidth} \includegraphics[width=\linewidth]{skeletonplot.pdf} \caption{Skeleton-based features} \label{fig_s} \end{subfigure}\hfil \begin{subfigure}{0.32\textwidth} \includegraphics[width=\linewidth]{depthskeletonplot.pdf} \caption{Depth+Skeleton-based features} \label{fig_ds} \end{subfigure} \caption{Scatter plots showing the performance of cross-view action recognition on the UWA3D Multiview Activity II dataset. The blue dots and red crosses, respectively, represent methods using handcrafted features and deep learning features. On the horizontal axis of each plot, we use the notation $V_iV_j$-$V_k$ to denote views $i$ and $j$ being used for training and view $k$ being used for testing.} \label{scatterplot} \end{figure*} \renewcommand{\V}[3]{\mbox{$V_#1V_#2$-$V_#3$}} \subsection{Influence of camera views in cross-view evaluation} To analyze the influence of using different combinations of camera views in training and testing, we classified all the algorithms in Table~\ref{uwa3dmresults} into 3 feature types: depth-based, skeleton-based, and depth+skeleton-based representations. Scatter plots showing the performance of all the algorithms on these three feature types are given in Fig.~\ref{scatterplot}, where the blue dots and red crosses denote, respectively, algorithms using handcrafted features and deep learning features. According to plots in Fig.~\ref{scatterplot} the recognition accuracy was high when the left view $V_2$ and right view $V_3$ were used for training and front view $V_1$ for testing (see axis tick mark \V{2}{3}{1}). This is obvious as the viewing angle of the front view $V_1$ is between $V_2$ and $V_3$, as shown in Fig.~\ref{uwa3d_sample}. However, it is surprising that the recognition accuracy was even slightly higher for \V{2}{4}{1} and \V{3}{4}{1} (see Figs.~\ref{scatterplot}(b) and~\ref{scatterplot}(c)). One can also notice that for depth-based methods which use handcrafted features, the recognition accuracy dropped the most when the left view $V_2$ and top view $V_4$ were used for training, and the right view $V_3$ was used for testing. The main reason for this behavior is that the visual appearances of an action in $V_2$ and $V_3$ are different, and it is very difficult to find the same view-invariant features from these views. Other combinations of views, such as \V{1}{3}{4}, \V{1}{3}{2}, and \V{1}{2}{4}, also led to a lower performance (see the distribution of the blue dots in Fig.~\ref{scatterplot}(a)). \subsection{Depth-based features versus skeleton-based features} \label{sec:depth_vs_skeleton} \vspace{0.05cm} \noindent{\bf Cross-subject action recognition.} It seems that for the cross-subject action recognition, skeleton-based features outperformed depth-based features for both the handcrafted and deep learning feature categories (Fig.~\ref{new_comparison}(a)). However, it is surprising that adding the depth-based features to skeleton-based features actually led to a slight decrease in the action recognition accuracy. The main reason is the background clutter and noise (for instance, see Fig.~\ref{cad60examples}) in the depth sequences, making the depth-based features less representative for robust action recognition. On the other hand, some skeleton-based algorithms such as LARP-SO-FTP and its variants performed well in human action recognition because they only extracted reliable features from those human body joints which have high confidence values. The only exception is the HOPC algorithm which uses depth-based features and which performed better than skeleton-based features such as HDG-{{\tt jpd}}+{{\tt jmv}} in the cross-subject action recognition (see the average performance in the last column of Table~\ref{evaluationresults}). One must note that the HOPC algorithm is different from other depth-based algorithms as it treats the depth images as a 3D pointcloud. Such an approach allows the HOPC algorithm to estimate the orientations of the local surface patches on the body of the human subject to more robustly deal with viewpoint changes. \vspace{0.05cm} \noindent{\bf Cross-view action recognition.} In Fig.~\ref{scatterplot}(b), for the cross-view action recognition, methods using handcrafted features (blue dots) performed better than those using deep learning features (red crosses) for skeleton-based features. For depth-based features (Fig.~\ref{scatterplot}(a)), no clear conclusion can be drawn for the handcrafted versus deep learning features. Comparing the handcrafted features (blue dots) in both Figs.~\ref{scatterplot}(a) and~\ref{scatterplot}(b), we can see that algorithms using skeleton-based features produced better results than depth-based features. This is evident from Fig.~\ref{scatterplot}(b) as the blue dots are well above the red crosses, whereas in Fig.~\ref{scatterplot}(a) the blue dots are more spread out and they occupy mainly the lower region of the plot. Our pruning process of the HDG algorithm also proved that skeleton-based features are more robust than the depth-based algorithms in the cross-view action recognition. For the plot in Fig.~\ref{scatterplot}(c), the algorithms in our experiments did not use deep learning to compute depth+skeleton features, thus no comparison on the performance between using handcrafted and deep learning features is possible. \subsection{Handcrafted features versus deep learning features} As expected, our experiments confirm that deep learning methods (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, Clips+CNN+MTLN, IndRNN, and ST-GCN) performed better on large datasets such as the NTU RGB+D dataset, which has more than 56,000 video sequences, but achieved a lower recognition accuracy on the other smaller datasets. The main reason for this behavior is the reliance of deep learning methods on large amount of data for training to avoid overfitting (in contrast to handcrafted methods). However, most existing action datasets have small numbers of performing subjects and action classes, and very few camera views due to high cost of collecting/annotating data. We also found that the performance of most handcrafted methods is highly dependent on the datasets. For example, HON4D and HOPC performed better only on some specific datasets, such as MSRAction3D and 3D Action Pairs, but achieved lower performance on the NTU RGB+D dataset. This means that features that have been handcrafted to work on one dataset may not be transferable to another dataset. Moreover, as handcrafted methods prevent overfitting well, they may lack the capacity to learn from big data. With larger benchmark datasets becoming available to the research community, future research trend is more likely to shift to using deep learning features with efforts being put into tuning their hyperparameters. \subsection{`Quo Vadis, action recognition?'} Based on the methods evaluated in this paper, we see the following trends in human action recognition. Handcrafted features progressed from global descriptors (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, HON4D in 2013) to local descriptors (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, HOPC in 2016) and combinations of global and local feature representation (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, HDG in 2014). More recent works focus on designing robust 3D human joint-based representations (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, LARP-SO-FTP and SCK+DCK in 2016). Moreover, researchers have adopted features extracted from skeleton sequences as they are easier to process and analyze than depth videos. We also note that deep learning representations are evolving from basic neural networks (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, traditional RNN and LSTM) to adapted and/or dedicated networks that rely on a pre-trained network (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, HPM+AP, HPM+TM, and Clips+CNN+MTLN). Researchers also modify basic neural network models to improve their learning capability for action recognition (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, P-LSTM and IndRNN). Recently, new models such as ST-GCN were devised to robustly model the human actions in large datasets. Given the surge of large datasets and powerful GPU machines, the newest methods learn representations in an end-to-end manner. \section{Conclusion} \label{sec:conclusion} We have presented, analyzed and compared ten state-of-the-art algorithms in 3D action recognition on six benchmark datasets. These algorithms cover the use of handcrafted and deep learning features computed from depth and skeleton video sequences. We believe that our comparison results will be useful for future researchers interested in designing robust representations for recognizing human actions from videos captured by the Kinect camera and/or similar action sequence capturing sensors. In our study, we found that skeleton-based features are more robust than depth-based features for both cross-subject action recognition and cross-view action recognition. Handcrafted features performed better than deep learning features given smaller datasets. However, deep learning methods achieved very good results if trained on large datasets. While accuracy as high as 90\% has been achieved by some algorithms on cross-subject action recognition, the average accuracy on cross-view action recognition is much lower. From our literature review and comprehensive experiments, we see that many research papers on human action recognition have already attempted to tackle the challenging issues mentioned in the introduction of the paper. Examples include using a skeleton model or treating depth maps as 3D pointcloud to overcome the changes of viewpoint; using Fourier temporal pyramid or dynamic time warping to deal with different speeds of execution of actions; using depth videos to overcome changes in lighting conditions and eliminate visual appearances that may be irrelevant to the actions performed. While these papers all report promising action recognition results, new and more robust action recognition algorithms are still required, given that there is a pressing demand for using these algorithms in real and new environments. \section*{Acknowledgments} We would like to thank the authors of HON4D~\cite{Oreifej2013}, HOPC~\cite{Rahmani2016}, LARP-SO~\cite{Vemulapalli2016}, HPM+TM~\cite{Rahmani2016CVPR}, IndRNN~\cite{shuai2018} and ST-GCN~\cite{stgcn2018aaai} for making their codes publicly available. We thank the ROSE Lab of Nanyang Technological University (NTU), Singapore, for making the NTU RGB+D dataset freely accessible. We would like to thank Data61/CSIRO for providing the computing cluster for running our experiments. \scriptsize { \bibliographystyle{IEEEtranN}
\section{Introduction} Open world tasks often involve sequential plans. The individual steps in the sequence are usually quite independent from each other, hence can be solved through a number of different methods, such as motion planning approaches for reaching, grasping, picking and placing, or through the use of end-to-end neural network based controllers for a similar variety of tasks. In many practical applications, we wish to combine such a diversity of controllers. This requires them to share a common domain representation. For instance the problem of assembly can be represented as motion planning a mechanical part in proximity to an assembly and subsequently the use of a variety of wiggle policies to fit together the parts. Alternatively, an end-to-end policy can be warm-started by using samples from the motion planner, which informs how to bring the two pieces together and the alignment sub-policy needed, as in \cite{thomas2018learning}. The resulting policy is {\textit{robust}} in the sense that the task of bringing together the assembly can be achieved from a large set of initial conditions and perturbations. A hybrid hierarchical control strategy, in this sense, allows for different capabilities to be independently learned and composed into a task solution with multiple sequential steps. We propose a method that allows for these individual steps to consist of commonly used motion planning techniques as well as deep neural network based policies that are represented very differently from their sampling based motion planning counterparts. We rely on these controllers to have a dynamic model of the active part of their state space, and a sense of how close they are to completing the overall task. This allows the options based controller to predict the future using any of the available methods and then determine which one would bring the world state to one closest to achieving the desired solution - in the spirit of model based planning. \begin{figure}[ht] \centering \subfigure[Gear Assembly]{\includegraphics[width=0.24\linewidth]{images/robot_assembly.eps}\label{fig:robot_assembly}} \hspace{0.02\linewidth} \subfigure[Option 4 of inserting a gear on a peg]{\includegraphics[width=0.73\linewidth]{images/123h.eps}\label{fig:gear_peg}} \caption{The gear assembly problem executed by the robot. The execution of option 4, (Section.\ref{sec:prob}) is shown on the right.} \end{figure} Modern Deep Reinforcement Learning (DRL) approaches focus on generating small policies that solve individual problems (pick up/grasp/push) \cite{klissarov2017learnings}, or longer range end to end solutions illustrated in modern games. Typically, in order to provide a good initialization for the optimization algorithm, expert demonstrations are provided either through human demonstration \cite{Argall2009} or through the use of a motion planner as an initial approximation to the solution \cite{thomas2018learning}. In problems that allow for a simulator to be used as part of the inference and learning procedure, DNN \& tree based approaches have shown great promise in solving Chess, Go, Poker. To extend these methods to more general domains, a world dynamics model is required to approximate the environment as in \cite{ha2018world}. DynoPlan aims at extending the options framework in the following ways: \begin{itemize}[noitemsep,nolistsep] \item We learn a dynamics model $s_{t+1} \sim \mathcal{D}(s_t, a_t)$ for each option that predicts the next state of the world given the current action; and \item We learn a goal heuristic $\mathcal{G}(s_t)$ that gives a distribution as an estimate of how close the state is to completing the task, based on the demonstrations. \end{itemize} This allows for the higher level controller to perform reasoning about sequentially applying controllers in overlapping initiation sets for completing a task. We aim to show that we can use off-the-shelf model-based controllers in parts of the state space, where their performance is already optimized, and model-free methods for states without correspondingly robust or easily scripted solutions, combining these two categories of controllers into a hybrid solution. \section{Related Work} Our method sits between learning policies over options as in \cite{barto2003recent}; and computing solutions using learning from demonstration such as through inverse reinforcement learning \cite{arora2018survey}. Reinforcement Learning is intrinsically based on the forward search of good states through experience. The update of the quality of an action at a particular state is performed by the iterative application of the Bellman equation. Performing updates in a model-free method must overcome the problems of sparse reward and credit assignment. Introducing a learned model that summarizes the dynamics of the problem can alleviate some scaling issues as in \cite{ha2018world}. However, searching for a general world model remains hard and we are not aware of methods that can achieve the desired performance levels in physical real world tasks. Such problems usually exhibit a hierarchical sequential structure - e.g. the \textit{waking up routine} is a sequence of actions, some of which are conditioned on the previous state of the system. The options framework provides a formal way to work with hierarchically structured sequences of decisions made by a set of RL controllers. An option consists of a policy $\pi_\omega(a_t|s_t)$, an initiation set $\mathcal{I}$ and termination criteria $\beta_\omega(s_t)$ - probability of terminating the option or reaching the terminal state for the option. A policy over options $\pi_\Omega(\omega_t|s_t)$ is available to select the next option when the previous one terminates as shown by \cite{sutton1999between, precup2000eligibility}. Temporal abstractions have been extensively researched by \cite{ iba1989heuristic, sutton1999between}. The hierarchical structure helps to simplify the control, allows an observer to disambiguate the state of the agent, and encapsulates a control policy and termination of the policy within a subset of the state space of the problem. This split in the state space allows us to verify the individual controller within the domain of operation - \cite{andonov2015controller}, deliberate the cost of an option and increase the interpretability - \cite{harb2018waiting}. Our method borrows this view of temporally abstracting trajectories and extends it by enforcing a dynamics model for each of the options allowing out agent to incorporate hindsight in its actions. To expedite the learning process, we can provide example solution trajectories by demonstrating solutions to the problem. This can be used to learn safe policies \cite{huang2018learning}. Alternatively, it can be used to calculate the relative value of each state by Inverse Reinforcement Learning \cite{arora2018survey}. For instance, we can expect that agents would be approximately rational in achieving their goal, allowing \cite{baker2009action} to infer them. Exploring the space of options may force us to consider ones that are unsafe for the agent. \cite{brown2019risk} rephrases the active inverse reinforcement learning to optimize the agents policy in a risk-aware method. Our work partitions the space of operation of each option, allowing that area to inherit the safety constraints that come associated with the corresponding policy. \section{Problem Definition} \label{sec:def} We assume there exists an already learned set of options $\mathcal{O}=\{o_1, o_2, ..., o_N\}$ and a set of tasks $\mathcal{K}= \{K_1, K_2, \dots, K_L\}$. Each option $o_\omega$ is independently defined by a policy $\pi_\omega(s) \rightarrow a$, $s \in \mathcal{S}_\omega$, $a \in \mathcal{A}_\omega$, an initiation set $\mathcal{I}_\omega, \mathcal{I}_\omega \subseteq \mathcal{S}_\omega$ where the policy can be started, and a termination criteria $\beta_\omega$. We extend the options formulation by introducing a forward dynamics model $s_{t+1} \sim \mathcal{D}_\omega(s_t)$, which is a stochastic mapping, and a goal metric $g \sim \mathcal{G}_{K_j}(s_t), 0 \leq g \leq 1$, that estimates the progress of the state $s_t$ with respect to the desired world configuration. We aim for $\mathcal{G}_{K_j}$ to change monotonically through the demonstrated trajectories. The state space of different options $\mathcal{S} = \{\mathcal{S}_1, \mathcal{S}_2, .., \mathcal{S}_N\}$ can be different, as long as there exists a direct or learnable mapping between $\mathcal{S}_i$ and $\mathcal{S}_j$ for some part of the space. We aim to answer the question whether we can construct a hybrid hierarchical policy $\pi_\Omega(\omega_t |s_t)$ that can plan the next option $o_{\omega_t}$ that needs to be executed to bring the current state $s_t$ to some desired $s_{final}$ by using the forward dynamics model $\mathcal{D}_\omega$ in an $n$-step MPC look-ahead using a goal metric $\mathcal{G}_K$ that evaluates how close $s_{t+n}$ is to $s_{final}$. \section{Method} At a particular point $s_t$ when $o_\omega$ is active, we can compute how successful is following the policy given these conditions up to a particular time horizon. The action given by the policy is $a_t=\pi_\omega(s_t)$, and following the dynamics model we can write that $s_{t+1}=\mathcal{D}_\omega(s_t, a_t)=\mathcal{D}_\omega(s_t, \pi_\omega(s_t))$. As the dynamics model is conditioned on the policy, we can simplify the notation to $s_{t+1}=\mathcal{D}_\omega(s_t)$. Chaining it for n steps in the future we obtain \( s_{t+n}=\mathcal{D}_\omega \circ \mathcal{D}_\omega \circ \dots \circ \mathcal{D}_\omega(s_t) =\mathcal{D}^n_{\omega}(s_t) \). Thus, a policy over policies can sequentially optimize \vspace{-0.4em} \begin{align} \pi_\Omega(\omega_t|s_t)=\argmax _\omega \left(\mathbb{E}\left[\bm{1}_{\mathcal{I}_\omega} (s_t) \cdot \mathcal{G} \circ \mathcal{D}^n_\omega (s_t) \right] \right) \end{align} After choosing and evaluating the optimal $\pi_\Omega$ with respect the above criterion, another controller can be selected until the goal is reached. \section{Experimental Setup} \label{sec:prob} We perform two sets of experiments to showcase the capability of using the structured hierarchical policy by performing MPC future predictions at each step on a simulated MDP problem and on a gear assembly task on the PR2 robot. \textbf{Simulated MDP}~~ In the first we use the standard 19-state random walk task as defined in \cite{harutyunyan2018learning} and seen on Figure.~\ref{fig:mdp_problem}. The goal of the agent is to reach past the $19^{th}$ state and obtain the $+1$ reward. The action space of the agent is to go ``left'' or ``right''. There also exist 5 options defined as in Section.~\ref{sec:def}, with the following policies: (1-3) policies that go ``right'' with a different termination probabilities $\beta = \{0.9, 0.5, 0.2\}$; (4) random action; (5) policy with action to go ``'left'' with $\beta=0.5$. We assume that there exists a noisy dynamics model $\mathcal{D}_\omega$ and the goal evaluation model $\mathcal{G}_{MDP}$, obtained from demonstrations, that have probability of mispredicting the current state or its value of $0.2$. \textbf{Gear Assembly}~~ In this task the PR2 robot needs to assemble a part of the Siemens Challenge\footnote{ The challenge can be seen https://new.siemens.com/us/en/company/fairs-events/robot-learning.html }, which involves grasping a compound gear from a table, and placing it on a peg module held in the other hand of the robot. A human operator can come in proximity to the robot, interfering with the policy plan. We have received expert demonstrations of the task being performed, as well as access to a set of option that \textbf{(1)} picks the gear from the table; \textbf{(2)} quickly moves the left PR2 arm in proximity to the other arm; \textbf{(3)} cautiously navigates the left PR2 arm to the other avoiding proximity with humans; \textbf{(4)} inserts the gear on the peg module. Policy (2) relies exclusively on path planning techniques, (4) is fully neural networks learned and (1, 3) are a mixture between a neural recognition module recognizing termination criteria and motion planning for the policy. The options share a common state space of the robots' joint angles. The initiation set of all policies is $\mathcal{R}^{12}$. The terminal criteria $\beta$ for $o_{1,2}$ is inversely proportional to the closeness to a human to the robot; for $o_{2-4}$ is the proximity to a desired offset from the other robot hand. The dynamics model for each option is independent and is represented either as part of the motion planner, or similarly to the goal estimator - a neural networks working on the joint angle states of both arms of the robot. In cases of options with overlapping initiation sets (i.e. options 1, 2, 3 all work within $\mathcal{R}^{12}$), we can softly partition the space of expected operation by fitting a Gaussian Mixture Model $\mathcal{F}_M$ on the trajectories of the demonstrations, where $s, s \sim \mathcal{F}_M$ is a sample state from the trajectory. $\mathcal{F}$ is a set of $M$ Gaussian Mixtures $\mathcal{F} = \{N_i(\mu_i, \Sigma_i) |_{i=1..M}\}$, and $J_k$ is a subset of $\mathcal{F}_M$, where samples from $J_k$ correspond to samples from trajectory of option $k, 1 \le k \le N$. We can thus assess the likelihood of a particular option working in a state $s \sim \pi_j$ by evaluating \( \mathcal{L}(s| \pi_j, \mathcal{F}_M)= \max_p \left[p(s|\mu_i, \Sigma_i) \right]_{\mu_i, \Sigma_i \in J}~ (5), \label{eq:parition} \) This gives us the safety region, in which we expect the policy to work. By using the overlap between these regions, we can move the state of the system in a way that reaches the desired demonstrated configuration. \section{Results} We aim to demonstrate the viability of using the options dynamics as a method for choosing a satisfactory policy. The dynamics can be learned independently of the task, and can be used to solve a downstream task. \textbf{Simulated MDP}~~ The target solution shows the feasibility and compares the possible solutions by using different options. In Figure.~\ref{fig:mdp_solution}, we can see that we reach the optimal state in just 4 planning steps, where each planning step is a rollout of an option. We can see the predicted state under the specified time horizon using different options. This naturally suggests the use of the policy $\pi_1$ that outperforms the alternatives ($\pi_1$ reaches state 6, $\pi_2$ - state 4, $\pi_2$ - state 3, $\pi_3$ - state 1, $\pi_4$ - state 1, $\pi_5$ - state 0). Even though the predicted state differs from the true rollout of the policy, it allows the hierarchical controller to use the one, which would progress the state the furthest. The execution of some options (i.e. option 5 in planning steps 1, 2, 3) reverts the state of the world to a less desirable one. By using the forward dynamics, we can avoid sampling these undesirable options. \begin{figure}[ht] \centering \subfigure[MDP Problem]{\includegraphics[width=0.3\linewidth]{images/MDP_setup_short.eps}\label{fig:mdp_problem}} \hspace{0.02\linewidth} \subfigure[MDP Solution]{\includegraphics[width=0.47\linewidth]{images/mdp_results}\label{fig:mdp_solution}} \caption{(a) The 19-state MDP problem. The action space of the MDP is to move ``left'' or ``right''. The goal of the MDP problem is to reach past state 19 and obtain the +1 reward, which is equivalent to a termination state 20. (b) MDP solution. At timestep 0, a rollout of the 5 options is performed with the dynamics model. The expected resulting state is marked as blue vertical bars. The best performing option is used within the environment to obtain the next state - the red line at state 5 and planning step 1. This process is iterated until a desired state is reached.} \end{figure} \begin{figure}[ht] \centering \subfigure[Goal Heuristic]{\includegraphics[width=0.35\linewidth]{images/goal_heuristic} \label{fig:heuristics}} \hspace{0.04\linewidth} \subfigure[t-SNE visuazlization of the controllers states.]{\includegraphics[width=0.37\linewidth]{images/controllers_split_ann}\label{fig:tsne}} \caption{(a) The learned heuristics about how close the current state is to the demonstrated goal state. (b) t-SNE plot of the controllers state during a set of trajectories. \textit{Magenta} - $o_1$ for grasping the object, \textit{Green} - $o_2$ and $o_3$ for navigating to the assembly with and without a human intervention and \textit{Blue} - $o_4$ for inserting the gear onto the peg. The shaded regions illustrate the regions of control for the different policies.} \label{fig:gears_assembly_results} \end{figure} \textbf{Gear Assembly}~~ We obtained 10 demonstrations of the task being performed. In Figure.~\ref{fig:heuristics}, we show the performance of the goal estimator network on an independent trial. We can observe that the state goal metric estimator closely tracks the expected ground truth values along the trajectory. This provides reasonable feedback that can be used by $\pi_\Omega$ to choose an appropriate next policy. Similarly, in Figure.~\ref{fig:tsne} we show the t-SNE of the trials of the robot trajectories that have no interruptions and some in which a human enters the scene and interferes with the motion of robot, forcing a change of policy to occur. We see that there is natural split in the states in which different options have been activated. We can notice that the overlap of the region of activation for the different policies allows the robot to grasp, navigate to, and insert the gear into the assembly by following these basins of the policies initiation. By following Eq.\ref{eq:parition} we can therefore create state space envelope of action of each option. The corresponding part of the state space, conditioned on the executed option, can have the safety constraints enforced by the underlying control method for the option. \section{Conclusion} We present DynoPlan - a hybrid hierarchical controller where by extending the options framework, we can rephrase the learning of a top level controller to an MPC planning solution. By unrolling the future states of each option, where each can be assessed on the contribution of furthering the agents intent based on the goal heuristic, we can choose the one best satisfying the problem requirements. This method of action selection allows to combine motion planning with neural network control policies in a single system, whilst retaining the completeness and performance guarantees of the work space of the associated options. \section{-5pt}{5pt plus 4pt minus 2pt}{-2pt plus 2pt minus 2pt} \input{content/1-intro.tex} \input{content/2-related.tex} \input{content/3-method.tex} \input{content/4-results.tex} \input{content/5-concl.tex}
\section{Introduction} The discovery of correlated insulating phases and superconductivity in magic angle twisted bilayer graphene (TBLG) \cite{Cao2018tbg1,Cao2018tbg2,Yankowitz2019,Kerelsky2018,Cao2019strangeM,Lu2019Efetov,Jiang2019} and related heterostructures has triggered an explosion of interest in this phenomenon. An ocean of ink has been spilled trying to explain this phase diagram - see e.g. \cite{po18prx,xu18prl, model5, gonzalez19prl,xie18ax, sherkunov18prb, isobe18prx, kennes18prb, LN, Kang2018prx,Zou2018prb,Yuan2018prb,Koshino2018prx,Wu2018,Lian2018twisted,Wu2019_phonon_linearT,Fu2018MAS,Lin2018KL,Classen2019,Peltonen2018,Wu2019Identification,Wolf2019electrically,Liu2019} for a representative but not exhaustive list. Most of these works have adopted the premise that the insulating phase, arising from electron correlation effects in the flatband TBLG, is `primary' and the superconducting phase descends from the insulator (a natural assumption given the original experimental data \cite{Cao2018tbg1, Cao2018tbg2}, where superconductivity arose only at particular fillings close to an insulating phase). More recent experimental data \cite{Lu2019Efetov}, however, has revealed superconductivity over a much broader range of dopings (with many more insulating states at commensurate fillings), and suggests a different perspective, where the superconductivity is `primary' and the system is superconducting at generic fillings, but where the superconductivity is `interrupted' by an insulating phase at commensurate fillings. In this work we introduce and study a simple model realizing superconductivity at generic fillings, interrupted by insulating states at commensurate fillings. Crucially, while the insulating states arise due to electron-electron interactions, the model is agnostic as to the pairing mechanism, which could be e.g. electron-phonon in origin \cite{Wu2018,Lian2018twisted,Peltonen2018,Wu2019Identification}. The model is highly simplified and does not pretend to be a detailed microscopic description of TBLG. However, we believe that it captures the key physics of the competition between the superconducting and insulating states in this system. Moreover the model is simple, well motivated, and exhibits a rich phase diagram, including several sharply distinct insulating phases, and as such should provide an interesting point of departure for future theoretical and experimental investigations of the observed TBLG phase diagram. The model consists of a network of locally superconducting puddles connected by quantum wires. Such a model does not depend on the pairing mechanism at play - the basic assumption is simply that {\it local} superconducting fluctuations generically arise, for whatever reason, and we now wish to determine if the {\it global} phase structure is that of a superconductor (generic fillings) or an insulator (commensurate fillings). This depends on whether the quantum wires are able to efficiently mediate Josephson couplings between the puddles, which in turn depends on whether the wires are themselves in a metallic phase, and on whether Cooper pair tunneling between puddles and wires is a relevant perturbation. We address these questions using a Luttinger liquid approach, whereby intrawire interactions are treated non-perturbatively, but interwire and wire-puddle couplings are treated in a perturbative fashion. The system is assumed clean, although as we will subsequently argue, the results are expected to be robust to weak disorder. The resulting system is shown to have a rich phase diagram, with superconductivity at generic fillings, and multiple potential interaction-driven insulating phases at commensurate fillings. The magnetic field response of these insulating phases is discussed, and it is demonstrated that some at least are suppressed by Zeeman field, consistent with experimental observations \cite{Cao2018tbg1,Cao2018tbg2}. The tantalizing similarity between our theoretically obtained `phase diagram' and the TBLG experimental observations should be taken seriously, and we believe that, in spite of the manifest simplicity of our model, our work may have captured some essential minimal aspects of the physics underlying the recent TBLG experimental observations. A `coupled wire network' (see \cite{Meng2019}, and the references therein) of this sort was first proposed as an effective theory for twisted bilayer graphene in \cite{Efimkin2018}. The logic was that regions with locally AB registry would be gapped by an external electric field, but gapless modes would arise at the domain walls between locally AB and locally BA regions. These domain walls would intersect at regions of locally AA registry, which would also be gapless. A detailed microscopic model of this sort gives rise to a {\it triangular} lattice of quantum wires supporting {\it helical} modes. In this work, however, we simplify further to a {\it square} lattice of quantum wires hosting `ordinary' (not helical) Luttinger liquids, with no valley degeneracy. We believe this simplified model captures the key physics of the competition between superconductivity and insulating behavior, and as we will argue, we do not believe the differences in microscopic details to be important for this key physics. We note also that while the competition between superconductivity and insulating states in wire models has previously been discussed in \cite{Wu2019coupled-wire}, in this prior work the superconducting and insulating states both arise from electron-electron interactions within or between the quantum wires. In contrast, in our work the superconducting state can have a completely separate origin, and need not arise from the same mechanism as the insulating state with which it competes. Technically, this distinction is implemented by our placing locally superconducting puddles at the wire intersections. Since it is difficult to envision generic superconductivity arising from electron-electron interactions because of its fundamental repulsive nature, the flexibility of our model allowing superconducting and insulating states to arise from distinct mechanisms, if necessary, is a key feature of our theory. The rest of this paper is organized as follows: We first introduce the interacting network model. Then, standard bosonization and weak coupling analysis are applied. We discuss all the possible phases and construct phase diagrams. We then discuss the implications for TBLG and potential generalizations, and conclude. \begin{figure}[t!] \includegraphics[width=0.35\textwidth]{Network_SC_LL2.eps} \caption{The setup of the hybrid network system. Black and blue lines indicate horizontal and vertical 1D quantum wires; yellow dots are the isolated superconducting puddles. (a) The network consists of horizontal and vertical quantum wires that intersect at the positions of the superconducting puddles. (b) Zoom-in at an intersection. All the interwire (red arrows) and puddle-wire couplings (green arrows) are treated perturbatively. We perform Luttinger liquid analysis in this regime.} \label{Fig:SC_LL} \end{figure} \section{Model} We consider a network consisting of zero-dimensional superconducting puddles and one-dimensional (1D) crossed quantum wires. As illustrated in Fig.~\ref{Fig:SC_LL}, the quantum wire arrays form a square superlattice with a lattice constant $d$, and the superconducting puddles are located at the superlattice points (wire intersections). In the absence of any coupling, the phases of the superconducting puddles are random. Meanwhile, the couplings at the wire intersections enable interaction-driven phases including two-dimensional (2D) superconductivity. This network model can be analyzed via standard bosonization analysis for 1D fermions \cite{Shankar_Book,Giamarchi_Book} in the weak wire-puddle and wire-wire couplings limit. The network model in Fig.~\ref{Fig:SC_LL} can be decomposed to three parts: 1D quantum wires ($H^{(\text{1D})}$), superconducting puddles ($H^{(\text{SC})}$), and couplings at the wire intersections ($H^{(\text{X})}$). First, the quantum wire Hamiltonian is $H^{(\text{1D})}=\sum_{n_x}H^{(\text{1D})}_{y;n_x}+\sum_{n_y}H^{(\text{1D})}_{x;n_y}$ where $H^{(\text{1D})}_{y;n_x}$ ($H^{(\text{1D})}_{x;n_y}$) describes a vertical (horizontal) quantum wire located at $x=n_x d$ ($y=n_yd$) and $n_x$ ($n_y$) is an integer. We consider a single-channel spin$-\frac{1}{2}$ fermion for each 1D quantum wire. For simplicity, we assume that all the 1D systems are identical and with periodic boundary conditions. The predictions of this work will remain valid even away from this special limit. The kinetic part of the Hamiltonian is given by \begin{align}\label{Eq:H_1D:H_0} H_0=\sum_{\sigma=\uparrow,\downarrow}\int\limits_xv_F\left[R^{\dagger}_{\sigma}\left(-i\partial_xR_{\sigma}\right)-L^{\dagger}_{\sigma}\left(-i\partial_xL_{\sigma}\right)\right], \end{align} where $v_F$ is the Fermi velocity, $\sigma$ is the spin index, and $R_{\sigma}$ ($L_{\sigma}$) is the right (left) moving chiral fermion. The interactions of interest are enumerated based on symmetry and relevance in renormalization group (RG) analysis. These are forward-scattering Luttinger liquid interactions and backscattering interactions. The former can be included nonperturbatively in the standard bosonization treatment \cite{Giamarchi_Book,Shankar_Book}. Here, we only list the leading relevant backscattering interactions as follows \cite{Giamarchi_Book}: \begin{subequations}\label{Eq:H_1D:int} \begin{align} \label{Eq:H_U}H_{U}=&U\int\limits_x:\left[e^{i\left(4k_{F}-Q\right)x}L^{\dagger}_{\uparrow}R_{\uparrow}L^{\dagger}_{\downarrow}R_{\downarrow}+\text{H.c.}\right]:,\\ \label{Eq:H_V}H_{V}=&V\int\limits_x:\left[L^{\dagger}_{\uparrow}R_{\uparrow}R^{\dagger}_{\downarrow}L_{\downarrow}+\text{H.c.}\right]:, \end{align} \end{subequations} where $k_F$ is the Fermi wavevector, $Q$ is the wavevector commensurate to the superlattice, and $:\mathcal{O}:$ denotes the normal ordering of $\mathcal{O}$. $H_U$ corresponds to a umklapp interaction of the charge mode, and $H_V$ is a conventional backscatering of the spin mode. In this work, we assume the spin sector is gapped by this backscattering in the absence of an external magnetic field. In addition to the intrawire interactions in quantum wires, one can apply an external Zeeman field to spin-polarize the system. The primary effect of the external magnetic field can be captured by the fermi wavevector mismatch between different spin species, $|k_{F\uparrow}-k_{F\downarrow}|=\delta k_F\propto B$ ($B$ the strength of the Zeeman field). This generally suppresses the spin gap; the charge commensuration is less sensitive to the Zeeman field unless the 1D band curvature becomes important. Now, we discuss the zero-dimensional superconducting puddle. $H^{(\text{SC})}=\sum_{n_x,n_y}H^{(\text{SC})}_{n_x,n_y}$, where $H^{(\text{SC})}_{n_x,n_y}$ is a local superconducting puddle at $(x,y)=(n_xd,n_yd)$. For each $n_x$ and $n_y$, \begin{align}\label{Eq:H_SC} H^{\text{(SC)}}_{n_x,n_y}=\sum_{j}E_j\left(d^{\dagger}_{j\uparrow}d_{j\uparrow}+d^{\dagger}_{j\downarrow}d_{j\downarrow}\right)-G\sum_{j,j'}d^{\dagger}_{j\uparrow}d^{\dagger}_{j\downarrow}d_{j'\downarrow}d_{j'\uparrow}, \end{align} where $E_j$ is the energy of level $j$ and $G>0$ is the interaction coupling constant. We consider local mean-field s-wave superconducting order of the puddle which requires two assumptions \cite{Spivak2008,Nandkishore2013}: (a) The local temperature is lower than the critical temperature, and (b) the size of the puddle is larger than the coherence length. We further assume that the local order parameter is $\Delta_{n_x,n_y}=-G\sum_j\langle d_{j\uparrow}d_{j\downarrow} \rangle_{n_x,n_y}=|\Delta|e^{i\Phi_{n_x,n_y}}$, where $|\Delta|$ is a constant amplitude and $\Phi_{n_x,n_y}$ is the position-dependent phase. A uniform superconductivity is established if the system develops \textit{global} phase rigidity, but not if the phase on each puddle can be freely varied. Last, we discuss all possible perturbations (allowed by symmetry and based on relevance in RG analysis) at the wire intersections (superlattice points). There are two types of couplings: wire-puddle couplings $H^{(\text{X})}_{\text{wp}}$ and wire-wire couplings $H^{(\text{X})}_{\text{ww}}$. Since each puddle forms a superconducting gap, the primary wire-puddle coupling is the Cooper pair hopping. Such a process at each $n_x$ and $n_y$ is given by \begin{align}\label{Eq:H_X:wp} H^{\text{(X)}}_{\text{wp}}=\left[J_xd^{\dagger}_{0\downarrow}d^{\dagger}_{0\uparrow}\mathcal{C}_{x}+J_yd^{\dagger}_{0\downarrow}d^{\dagger}_{0\uparrow}\mathcal{C}_{y}+\text{H.c.} \right], \end{align} where $J_x$ and $J_y$ are the Cooper pair hopping strengths, $d_{0\sigma}$ is the puddle electron with spin $\sigma$ at the Fermi energy, and $\mathcal{C}_x$ ($\mathcal{C}_y$) is the spin-singlet Cooper pair operator of the horizontal (vertical) quantum wire. The explicit expression for the Cooper pair hopping is given by $\mathcal{C}_{x,y}=\left[L_{\downarrow}R_{\uparrow}-L_{\uparrow}R_{\downarrow}\right]_{x,y}$. Other wire-puddle interactions are irrelevant and thereby ignored in this work. There are three primary processes that couple horizontal and vertical quantum wires at the wire intersections: single electron tunnelings ($H_e$), charge-density-wave interactions ($H_C$), and Cooper pair hoppings ($H_{2e}$). For each $(n_x,n_y)$, the wire-wire coupling Hamiltonian is $H^{\text{(X)}}_{\text{ww}}=H_{e}+H_{\text{C}}+H_{2e}$, where \begin{subequations}\label{Eq:H_X:ww} \begin{align} H_{e}=&t_e\sum_{\sigma}\left[\left(R^{\dagger}_{\sigma}+L^{\dagger}_{\sigma}\right)_y\left(R_{\sigma}+L_{\sigma}\right)_x+\text{H.c.}\right],\\ H_{C}=&t_u\sum_{\sigma,\sigma'}\!:\!\left(L^{\dagger}_{\sigma}R_{\sigma}+R^{\dagger}_{\sigma}L_{\sigma}\right)_y\!\left(L^{\dagger}_{\sigma'}R_{\sigma'}+R^{\dagger}_{\sigma'}L_{\sigma'}\right)_x\!:,\\ H_{2e}=&t_{2e}\left[\left(R^{\dagger}_{\uparrow}L^{\dagger}_{\downarrow}-R_{\downarrow}^{\dagger}L^{\dagger}_{\uparrow}\right)_y\left(L_{\downarrow}R_{\uparrow}-L_{\uparrow}R_{\downarrow}\right)_x+\text{H.c.}\right]. \end{align} \end{subequations} The phases of the network model depend on the above junction perturbations. We turn to analyze the perturbations and construct the phase diagram next. \section{Analysis} The network model can be studied analytically in the weak wire-puddle and wire-wire coupling limit, with intra-wire interactions being treated non-perturbatively. The analysis in this section is strictly valid when $L\gg d \gg \alpha$, where $L$ is the system size, $d$ is the superlattice constant, and $\alpha$ is the microscopic scale, which in turn requires the twist angle to be small. We first review the properties of the quantum wires in the standard bosonization approach. Then, the wire-puddle and wire-wire couplings are treated as perturbations. We further assume that the amplitude of the local superconducting order parameter in a puddle cannot be suppressed but the phase can be modified. Using these approximations, we can classify the phases in our interacting network model. Our objective here is to capture the effects of commensuration and external Zeeman fields. The main results are summarized in Table~\ref{Table:phases} and Fig.~\ref{Fig:PD}. \subsection{Quantum wires as Luttinger liquids}\label{Sec:1Dwire} Each quantum wire can be described by a spinful Luttinger liquid. With the standard bosonziation \cite{Shankar_Book,Giamarchi_Book}, the charge and the spin collective modes are decoupled. The 1D Hamiltonian $H_0+H_U+H_V$ [given by Eqs.~(\ref{Eq:H_1D:H_0}) and (\ref{Eq:H_1D:int})] becomes $H_{c}+H_{s}$, where \begin{align} \nonumber H_{c}=&\frac{v_c}{2\pi}\int\limits_x\left[K_c\left(\partial_x\phi_c\right)^2+\frac{1}{K_c}\left(\partial_x\theta_c\right)^2\right]\\ \label{Eq:H_c}&+\frac{U}{2\pi^2\alpha^2}\int\limits_x\cos\left[2\sqrt{2}\theta_c+\left(4k_{F}-Q\right)x\right],\\ \nonumber H_{s}=&\frac{v_s}{2\pi}\int\limits_x\left[K_s\left(\partial_x\phi_s\right)^2+\frac{1}{K_s}\left(\partial_x\theta_s\right)^2\right]\\ \label{Eq:H_s}&+\frac{V}{2\pi^2\alpha^2}\int\limits_x\cos\left[2\sqrt{2}\theta_s\right]. \end{align} In the above expressions, $\theta_c$ ($\theta_s$) is the `phonon-like' boson field of the charge (spin) collective mode, $\phi_c$ ($\phi_s$) is the `phase' field of the charge (spin) collective mode, $v_c$ ($v_s$) is the velocity of the charge (spin) mode, $K_c$ ($K_s$) is the charge (spin) Luttinger liquid parameter, and $\alpha$ is the microscopic ultraviolet length scale. The bosonization convention is summarized in Appendix~\ref{App:Bosonization}. In the absence of Luttinger liquid interactions, $v_c=v_s=v_F$ and $K_c=K_s=1$. $K_c<1$ ($K_c>1$) for repulsive (attractive) charge interactions. We consider general cases where $K_c$ and $K_s$ can be tuned arbitrarily. The results for specific microscopic models can be extracted from our analysis. Note that we are assuming short-range electron-electron interactions in our bosonization calculations, which is a standard approximation for generic Luttinger liquid theories. This can be justified by assuming that some screening of Coulomb interaction necessarily happens in TBLG because of the presence of metallic gates in the system. Actually, our theory should apply for long-range Coulomb interactions also with the modification that the Luttinger exponents become effective scale-dependent exponents falling off extremely slowly, slower than any power laws, at long distances. The charge sector will remain gapless as long as $|4k_{F}-Q|>\delta Q_c$ \cite{PokrovskyTalapov} ($\delta Q_c$ is the critical threshold). In this puddle-wire network model, the commensuration wavevector $Q=0,\pm 2\pi/d$ where $d$ is the superlattice constant. With commensuration ($|4k_{F}-Q|<\delta Q_c$), the perturbative RG flows \cite{Giamarchi_Book} are \begin{align} \label{Eq:SG_RG_U}\frac{dy_U}{dl}=&\left(2-2K_c\right)y_U,\\ \label{Eq:SG_RG_K}\frac{d K_c}{dl}=&-\frac{1}{2}y_U^2K_c^2, \end{align} where $y_U=U/(\pi v_c)$. For $K_c<1$, $H_U$ at commensuration is relevant. For $K_c>1$, $H_U$ is irrelevant for infinitesimal $|U|$. Since the Eqs.~(\ref{Eq:SG_RG_U}) and (\ref{Eq:SG_RG_K}) form hyperbolic trajectories, $|y_U|$ can still flow up (implying a formation of a charge gap) when $|y_U|$ is above the threshold value (separatrix). Meanwhile, $H_V$ given by the cosine term in Eq.~(\ref{Eq:H_s}) is a regular backscattering contribution. With $K_s<1$ or a sufficiently large $|V|$, the spin sector $H_{s}$ becomes fully gapped at zero temperature. This is the same RG flow as that in the charge sector with commensuration. In addition, the phase field of spin, $\phi_s$, will be completely disordered. In this work, we will largely focus on the network built by spin-gapped quantum wires. We thus see that commensuration \textit{naturally} has the effect of gapping out the quantum wires connecting superconducting puddles. When said wires are gapped, they cannot mediate a long range Josephson coupling between puddles (the Josephson coupling will decay exponentially with distance \cite{Nandkishore2013}). As a result, the system cannot be a global superconductor (at least at experimental temperatures), and moreover, being everywhere gapped, will exhibit insulating behavior. This gives a natural mechanism for insulating phases to emerge at commensuration - [Fig. 2(b)]. We now discuss the effect of an external magnetic field (Zeeman field). For simplicity, we consider a field applied {\it in plane} which will not couple to the orbital degree of freedom, but will enter only through the Zeeman coupling. As discussed in the previous section, the Fermi points of different spin species shift in the opposite way. The cosine term in Eq.~(\ref{Eq:H_s}) becomes $\cos\left[2\sqrt{2}\theta_s+2\left(k_{F\uparrow}-k_{F\downarrow}\right)x\right]$. The spin sector will now remain gapless for a sufficiently large $|k_{F\uparrow}-k_{F\downarrow}|$. With linear dispersion, the shifts of the Fermi points do not affect $k_{F\uparrow}+k_{F\downarrow}$, so the charge sector remains the same as in the absence of a magnetic field. With a finite curvature in the 1D band, the charge sector at the commensurate filling can also become gapless. To understand the implications for the global phase, however, we must also analyze the effect of interwire and wire-puddle couplings. \subsection{Couplings at intersections}\label{Sec:X_RG} Here, we discuss the roles of wire-puddle and interwire perturbations at the wire intersections given by Eqs.~(\ref{Eq:H_X:wp}) and (\ref{Eq:H_X:ww}). To simplify the perturbative analysis, we consider \textit{static} superconducting puddles. Under such an approximation, we can derive perturbative RG flows for all the perturbations at the intersections. The wire-puddle coupling is dictated by hopping of Cooper pairs. Under the static assumption, we can replace $d^{\dagger}_{0\downarrow}d^{\dagger}_{0\uparrow}$ at $(n_x,n_y)$ by its expectation value $\langle d_{0\downarrow}^{\dagger}d_{0\uparrow}^{\dagger} \rangle_{n_x,n_y}$ in Eq.~(\ref{Eq:H_X:wp}). The spin-singlet Cooper pair operator ($\mathcal{C}$) in a quantum wire is bosonized to \begin{align} \mathcal{C} =&\frac{1}{\pi\alpha}\hat{U}_{\downarrow}\hat{U}_{\uparrow}e^{i\sqrt{2}\phi_c}\cos\left(\sqrt{2}\theta_s \right), \end{align} where $\hat{U}_{\sigma}$ is the Klein factor of an electron carrying spin $\sigma$. With perturbative analysis in bosonization, the wire-puddle Cooper pair hopping gives an RG flow as follows \begin{align}\label{Eq:RG:J_xy} \frac{d J_{x,y}}{dl}=&\left(1-\frac{1}{2K_c}-\frac{K_s}{2}\right)J_{x,y}. \end{align} The wire-puddle coupling $J_{x,y}$ becomes relevant when $1/K_c+K_s<2$. In order for the system to develop global superconductivity, we need $J_{x,y}$ to be relevant. For spin-gapped quantum wires, we take $K_s\rightarrow 0$ and treat $\cos\left(\sqrt{2}\theta_s\right)$ as a constant. The corresponding RG flow suggests that Cooper pair hopping becomes relevant when $K_c>1/2$. This means that the pairing at the wire intersection survives even for repulsively interacting spin-gapped quantum wires ($1/2<K_c<1$). Meanwhile, the Cooper pair hopping is suppressed parametrically for $V>0$ because the expectation value of $\cos\left(\sqrt{2}\theta_s\right)$ is small \cite{fn1}. We note that $J_{x,y}$ is always irrelevant for charge-gapped quantum wire (equivalently to $K_c\rightarrow 0$) as the $\phi_c$ term becomes completely disordered. The interwire couplings [given by Eq.~(\ref{Eq:H_X:ww})] can also be studied via standard perturbative RG methods and bosonization. The bosonized expressions are summarized in Appendix~\ref{App:RG_flow:imp}. We write down the leading order RG flows as follows: \begin{align} \frac{dt_e}{dl}=&\left[1-\frac{1}{4}\left(K_c+\frac{1}{K_c}\right)-\frac{1}{4}\left(K_s+\frac{1}{K_s}\right)\right]t_e,\\ \frac{dt_u}{dl}=&\left(1-K_c-K_s\right)t_u,\\ \frac{dt_{2e}}{dl}=&\left(1-\frac{1}{K_c}-K_s\right)t_{2e}. \end{align} $t_e$ is the single electron tunneling and is at most marginal when $K_c=K_s=1$. In the presence of Luttinger interactions ($K_c\neq 1$ and/or $K_s\neq 1$), we can just ignore single electron tunnelings for small $|t_e|$ since this operator is irrelevant. Meanwhile $t_u$ is the density-density backscattering at the intersection which is relevant for $K_c+K_s<1$. When $t_u$ becomes relevant, the systems develop `clogged junctions' \cite{Chou2019}, inducing a globally insulating phase. Finally, $t_{2e}$ describes the Cooper pair hoppings among two intersecting quantum wires. Such a process becomes relevant when $1/K_c+K_s<1$. We note that both $K_c$ and $K_s$ are unaffected by the perturbations at the intersections since we have taken the limit $d\gg \alpha$. For the spin-gapped quantum wires, the RG flows can be obtained by setting $K_s\rightarrow 0$. In this case, $t_e$ and $t_{2e}$ are always irrelevant due to completely disordered $\phi_s$. Based on the perturbative RG, $t_u$ becomes relevant when $K_c<1$. However, the $t_u$ interaction with $V>0$ is parametrically suppressed \cite{fn1}, same as the suppression in the wire-puddle Cooper pair hopping. Similar analysis for charge-gapped quantum wires can be done by setting $K_c\rightarrow 0$. The properties of these wire-puddle and interwire interactions dominate the network phases. In particular, the effective Josephson coupling determines if the system can form uniform 2D superconductivity. There are other interaction-driven phases from this network model. We will turn to construct the phase diagrams next. \subsection{Phase diagram}\label{Sec:PD} \begin{table*}[] \begin{tabular}{c||c|c||c|c|c} Phase & 1D C-gap & 1D S-gap & X pairing & X C-gap & X S-gap\\ \hline\hline SC/SC$^*$ & $\mathsf{x}$ & - & $\checkmark$ & $\mathsf{x}$ & - \\ \hline Fully Gapped & $\checkmark$ & $\checkmark$ & $\mathsf{x}$ & $\checkmark$ & $\checkmark$\\ \hline C-Clogged & $\mathsf{x}$ & $\checkmark$ & $\mathsf{x}$ & $\checkmark$ & $\checkmark$\\ \hline S-Clogged & $\checkmark$ & $\mathsf{x}$ & $\mathsf{x}$ & $\checkmark$ & $\checkmark$\\ \hline Metal (M) & $\mathsf{x}$ &$\mathsf{x}$ & $\mathsf{x}$ & $\mathsf{x}$ & $\mathsf{x}$\\ \hline S-LL & $\checkmark$ & $\mathsf{x}$ & $\mathsf{x}$ & $\checkmark$ & $\mathsf{x}$ \end{tabular} \caption{Possible network phases and the corresponding properties. 1D C-gap (S-gap) indicates the gap in the charge (spin) sector of 1D quantum wires; X pairing means a finite Cooper pairing tunneling at the intersection, characterized by a relevant $J_{x,y}$; X C-gap (S-gap) corresponds to a local charge (spin) gap at the intersection. SC/SC$^*$ corresponds to a 2D superconducting phase; Fully gapped indicates an insulator with all the gapped wires and the gapped intersections; C-Clogged (S-Clogged) corresponds to an insulator with gapless charge (spin) 1D wires but with gapped intersections; Metal (M) indicates a metallic state; S-LL is a phase with 1D spin Luttinger liquids. These phases are discussed in the main text.} \label{Table:phases} \end{table*} In this network model, the zero temperature phases can be built based on the properties of the 1D quantum wires and the wire intersections. In the absence of any coupling, the system is just a collection of decoupled quantum wires and isolated superconducting puddles. We assume that the superconducting puddles have random phases in this case, corresponding to no global superconductivity. We now discuss whether phase rigidity and global superconductivity should develop given the couplings at the wire intersections and the quantum wire properties. To realize a uniform superconductivity in the network model, the global phase coherence among the superconducting puddles is required. The charge conduction of the quantum wires is crucial as the superconducting puddles can interact by transferring Cooper pairs via the 1D quantum wires. Therefore, a 2D superconducting state requires two conditions, gapless charge modes in the 1D quantum wires and relevant wire-puddle couplings ($J_{x,y}$) at wire intersections. Based on the perturbative RG analysis in the previous subsection, we can identify the regime that hosts uniform 2D superconductivity at zero temperature. Interestingly, the 2D superconductivity may survive repulsive interactions for spin-gapped quantum wires. There are five additional possible phases in this interacting network model, besides the 2D superconductor, and four of these are charge insulators - the fully gapped insulators, clogged insulators \cite{Chou2019}, and spin Luttinger liquid. The properties of the phases are summarized in Table~\ref{Table:phases}. A fully gapped insulator requires both charge and spin gaps in the 1D quantum wire. This requires repulsive interactions ($K_c, K_s <1$) at weak backscattering, plus commensuration. Concomitantly, in this phase the Cooper pair hoppings at the wire intersections will be suppressed since $\phi_c$ becomes completely disordered. A clogged insulator in contrast contains gapless charge and/or spin modes in the quantum wires. At the wire intersections, both charge and spin modes are gapped by the `clogging' phenomenon discussed in \cite{Chou2019}. In Table~\ref{Table:phases}, we use C-Clogged and S-Clogged to distinguish the 1D gapless charge mode and spin mode respectively. These clogged phases can arise only for sufficiently strong intrawire repulsions, but can arise even away from commensuration. The clogged phases, like the fully gapped phase, are insulators for both charge and spin. Meanwhile, the spin Luttinger liquid phase is an insulator for charge, but a conductor for spin, and can only arise in the presence of commensuration {\it and} Zeeman field (or alternatively, with commensuration and interactions that are repulsive in the charge sector but \textit{weakly} attractive in the spin sector). Finally, in the presence of Zeeman field (or with \textit{weak} attractions that are attractive in the spin sector, $K_s >1$), there can arise a metallic phase which is a conductor for both charge and spin. \begin{figure}[t!] \includegraphics[width=0.45\textwidth]{Phase_diagram_v2.eps} \caption{Zero temperature phase diagrams of the network model. The right column is near commensuration, the left column is away from commensuration. The properties of the phases are discussed and summarized in Table~\ref{Table:phases}. We present the phase diagrams with the 1D quantum wire properties. The spin gapped cases, (a) and (b), can be viewed as the absence of a Zeeman field. $\delta Q$ is the incommensuration measure in the charge umklapp interaction given by Eq.~(\ref{Eq:H_U}). For spin gapless cases, (c)-(f), we discuss $K_s<1$ [(c) and (d)] and $K_s>1$ [(e) and (f)] separately. We assume $0<K_s<2$ in this work. } \label{Fig:PD} \end{figure} We first focus on the network made by spin-gapped quantum wires. For a generic incommensurate filling [see Fig.~\ref{Fig:PD}(a)], the system is generically a superconductor, but can become a clogged insulator for sufficiently strong repulsive interactions. The superconducting state competes with the clogged state for $1/2<K_c<1$. We note that both the $t_u$ interaction and the wire-puddle Cooper pair tunneling are parametrically suppressed (but nonzero) for repulsive spin-gap interactions ($V>0$) \cite{fn1}. The clogged state dominates for $K_c<1/2$. With attractive interactions ($K_c>1$), the network model develops a 2D superconducting phase. When the 1D spin gapped quantum wires are at commensurate electron fillings [see Fig.~\ref{Fig:PD}~(b)], the charge sector becomes gapped for $K_c<1$ or for sufficiently large $|U|$ \cite{Giamarchi_Book}. The fully gapped regime comes from the RG analysis in Eqs.~(\ref{Eq:SG_RG_U}) and (\ref{Eq:SG_RG_K}). As shown in Fig.~\ref{Fig:PD}(b), the superconducting regime is largely suppressed comparing with Fig.~\ref{Fig:PD}~(a). Combining Figs.~\ref{Fig:PD}(a) and \ref{Fig:PD}(b), we can identify a sizable range of states that experience superconductor-insulator transition tuned by the filling of the 1D quantum wires. This feature is reminiscent of the experimental observation of the superconductor-insulator transitions in \cite{Lu2019Efetov}. We will discuss the potential relations in the next section. Now, we discuss the spin gapless quantum wires which can be viewed as the original spin gap wires in the presence of Zeeman fields. For a generic incommensurate filling [see Fig.~\ref{Fig:PD}(c) and \ref{Fig:PD}(e)], there are three possible phases: metallic phase, superconducting phase, and clogged insulators (S-Clogged). In this case, the 2D superconductivity takes place when $K_c>1/(2-K_s)$. For $K_s<1$, the clogged insulators appear for sufficiently strong charge repulsive interactions $K_c<1-K_s$. At the commensurate fillings [see Fig.~\ref{Fig:PD}(d) and \ref{Fig:PD}(f)], a charge gap is formed in each spin-gapless quantum wire for $K_c<1$ or for sufficiently large $|U|$ \cite{Giamarchi_Book}. In the absence of other perturbations, the network phase is a collection of decoupled spin Luttinger liquids. A clogged insulator also arises for $K_c<1-K_s$, similar to the cases with incommensurate fillings. For $K_s>1$, there exists a region such that neither the charge gap nor the Cooper pair hopping is formed. Therefore, we predict a metallic phase between the spin Luttinger liquid phase and the 2D superconductivity. The clogged states do not arise for $K_S>1$. \section{Correlated insulator phenomenology}\label{Sec:CI_Ph} We first focus on the spin-gapped quantum wire network without commensurate fillings [Fig.~\ref{Fig:PD}(a)], which we believe to be the `generic' scenario. The 2D superconductivity appears generically for interacting quantum wires with attractive charge-charge interactions. More interestingly, the 2D superconductivity can even coexist with a repulsively interacting network for some parameter regions (SC$^*$ in Table.~\ref{Table:phases} and Fig.~\ref{Fig:PD}) \cite{fn3}. The establishment of the coherent superconducting phase is due to the virtual Cooper pair exchange among superconducting puddles via charge conducting quantum wires. Formally, one can derive an effective action of the coupling between superconducting puddles by integrating over the electronic degrees of freedom. In what follows, we summarize the main results and relegate the derivations to Appendix~\ref{App:EJC}. The effective Josephson coupling depends on the property of the quantum wire network and is temperature dependent. The transition temperature ($T_c$) of this 2D superconductivity is determined by the nearest-neighbor effective Josephson couplings at $T_c$. For $T\ll T_c$, two distant superconducting puddles (separated by $r$) interact in a power law manner, $r^{\frac{1}{K_c}-1}$ for $K_c<1$ (repulsive interacting wires). For $K_c>1$ (attractive interacting wires), we have infinite range interactions such that the system should be well described by an infinite range mean field theory. In this regime, we do not expect finite range perturbations or spatial inhomogeneity (e.g., disorder) to have any significant impact. For a spin gapped quantum wire network at commensurate fillings [Fig.~\ref{Fig:PD}(b)], fully gapped insulating states arise for repulsive interactions ($K_c<1$) or for a large $|U|$. The presence of charge gap blocks Cooper pair hopping between superconducting puddles. As a result, uniform 2D superconductivity is not expected owing to the incoherent phases among the puddles. The commensuration condition corresponds to filling factor $\nu=\pm 1/2$ ($\nu = \pm 2$ in the terminology of \cite{Lu2019Efetov}) in the moir\'e mini band. To see this, note that if the only gapless states are on the domain walls, then $2k_F$ for the domain walls must be proportional to density (Luttinger's theorem). When the conduction (valence) band is completely full (empty) then $2k_F$ must equal a reciprocal lattice vector. Ergo, when the conduction (valence) band is half full, then $2k_F$ must equal half a reciprocal lattice vector, such that the umklapp process is commensurate. Meanwhile, at charge neutrality $\nu=0$, we have $k_F = 0$ by particle hole symmetry, which also corresponds to a commensurate filling. Such a filling-driven superconductor-insulator transition in the network model is reminiscent of that in the magic-angle twisted bilayer graphenes \cite{Cao2018tbg2,Yankowitz2019,Lu2019Efetov}. In particular, series of insulating states were observed at commensurate fillings, and the system stayed superconducting for generic fillings \cite{Lu2019Efetov}. Our theory provides a natural explanation for this observation. Now, we discuss the effect of in-plane magnetic field (Zeeman field) on the spin-gapped quantum wire network. Generically, the spin gap is sensitive to the applied Zeeman field as we have discussed in Sec.~\ref{Sec:1Dwire}. The Zeeman field induces spin imbalance, $k_{F\uparrow}\neq k_{F\downarrow}$, such that the spin backscattering given by Eq.~(\ref{Eq:H_V}) becomes irrelevant \cite{fn2}. At commensurate fillings, the insulating regions in the phase diagram of the spin-gapped quantum wires (the absence of a Zeeman field) are thereby replaced by the spin Luttinger liquids or the clogged insulators [Fig.~\ref{Fig:PD} (d) and (f)]. We expect this effect to take place even if the superconducting puddles survive the applied magnetic field. A sufficiently strong Zeeman field may also suppress the charge gap due to finite 1D band curvature. We note that a Zeeman field driven instability of the correlated insulator is also observed in TBLG experiments \cite{Cao2018tbg1,Cao2018tbg2,Yankowitz2019,Lu2019Efetov}. All the possible phases (ignoring suppression of superconducting puddles by Zeeman field) are summarized in Fig.~\ref{Fig:PD}(c)-(f). \section{Discussion} In this work, we present a minimal network model that we believe captures a key aspect of the competition between superconductivity and insulating phases in TBLG. The model consists of quantum wires and superconducting puddles (see Fig.~\ref{Fig:SC_LL}). Within the standard weak coupling analysis, we demonstrate commensuration-driven superconductor-insulator transitions and Zeeman field suppression of the insulating states. Both features are reminiscent of the phenomenology in the magic-angle twisted bilayer graphene. We also construct the full phase diagram of this minimal model, which contains multiple competing correlated insulating phases. We now discuss how our minimal model relates to actual TBLG. As has been discussed \cite{Efimkin2018} and shown \cite{Yoo2019_reconstruction,Huang2018Helical_TBLGexp,Xu2019_GiantOscillation} in the literature, it is natural to expect the experimental systems with small twist angles to be almost everywhere gapped, with gapless states arising only at domain walls between regions with locally AB and locally BA registry, and at the vertices where such domain walls intersect, which will have locally AA registry. Systems at the first magic angle also share the above discussed properties except that the local AA registries contain considerable electronic states \cite{Yoo2019_reconstruction}. Thus, a `coupled wire' network with `puddles' at the vertices should be a good description for TBLG. {\it However}, there are some differences in microscopic details. For starters, the wire network appropriate for TBLG would consist of a {\it triangular} lattice of quantum wires, with six wire segments connecting to each vertex, whereas we have simplified to a {\it square} lattice of quantum wires, with four wire segments connecting to every vertex. We do not believe that this detail will qualitatively affect the competition between superconducting and insulating phases. It will however complicate the analysis, and may affect some details regarding exactly where the phase transitions lie - we defer considerations of this more complicated lattice geometry to future work. Additionally, in physical TBLG, the quantum wires are {\it valley degenerate}, and contain {\it helical} domain walls, with the two valleys supporting domain walls with opposite helicity. In this work, we have ignored the valley degree of freedom altogether, and have modeled the quantum wires as ordinary (not helical) Luttinger liquids. We do not believe that ignoring the helical nature of the domain walls changes anything important since the `umklapp' interaction involving scattering two electrons from one valley to another conserves crystal momentum, modulo reciprocal lattice vectors of the moir\'e superlattice, and is thus allowed. The insulating phases in our analysis arise from the umklapp interaction. It is however possible, perhaps even likely, that taking valley degeneracy into account may lead to the emergence of still more potential insulating phases, including analogs of spin and valley polarized `quantum Hall ferromagnet' phases. Such physics is presumably crucial to the emergence of insulating phases at fillings $\nu = \pm1, \pm3$ in the terminology of \cite{Lu2019Efetov} (without taking valley physics into account, our analysis only predicts insulating phases as $\nu = 0, \pm2$). Exploration of the interplay of spin-valley degeneracy and polarization with the physics we have discussed herein would be a particularly interesting topic for future work. It would also be interesting to better understand the effect of the substrate, which has been ignored in the present analysis. Another essential simplification employed in this work is that we have assumed the locally superconducting puddles to involve {\it s-wave} pairing. If the local pairing symmetry was anything other than s-wave, then there would be scope for frustration in the Josephson couplings, and a more detailed analysis akin to \cite{Spivak2008,Moore2004} would be required. Conceivably, one could then obtain some kind of `pseudogap' phase whereby Josephson couplings between puddles were strong, but the system was prevented from establishing global phase coherence by frustration in the couplings. Since the nature of the pairing symmetry in TBLG is still not clear, we have steered clear of such an analysis at present, but it would be an interesting question to revisit in the future, once a consensus emerges as to the pairing symmetry in the system. In addition, we have approximated by treating the system as {\it clean}, whereas in reality the experimental system is known to be disordered. We do not expect weak disorder to qualitatively affect our results. The insulating phases, being gapped either in the wires or at the junctions, will be robust to disorder, whereas our superconducting phase is governed by long range Josephson couplings, and should thus also be robust as long as the disorder is weak. The effect of strong disorder is a more interesting problem, which could be studied in the spirit of Ref.~\cite{Lobos2012} (although, the TBLG samples of experimental interest being very clean with very high mobilties, the strong disorder limit may be of little practical relevance). Strong impurity backscattering will create a `bottleneck' for the charge transport in the associated wire segment. A uniform 2D superconductivity can still arise as long as such bottleneck segments do not percolate the entire system. Another relevant form of disorder is the twisted angle fluctuation \cite{Beechem2014rotational,Yankowitz2019} which results in a modulation of the superlattice spacing $d$. Since the effective nearest-neighbor Josephson coupling depends on $d$, we expect phase separation of the superconducting domains and the normal state domains at some intermediate finite temperatures. Nevertheless, global superconductivity will persist as long as superconducting domains percolate. Last, we have assumed that disorder is not strong enough for localization physics to become important. If it does, then that opens a whole new direction for exploration \cite{NS2017}. We defer a more detailed exploration of strong disorder physics to future work. Finally, we discuss the possible role of the `magic angle' twist in our theory. In fact, we believe the magic angle concept is \textit{not} essential to the experimentally observed TBLG phenomenology and all that is necessary is a twist angle small enough to substantially enhance interaction and correlation effects through the flatband moir\'e superlattice physics. In our theory, the small twist angle leads to the creation of the superconducting puddles by strongly enhancing the applicable pairing interaction-- for electron-phonon interaction mediated TBLG superconductivity, for example, this is demonstrated explicitly in Refs. \cite{Wu2018,Lian2018twisted,Wu2019_phonon_linearT}. For larger twist angles, the superconducting puddles would not form and our model for competing superconducting and insulating phases would not apply. Another aspect where the magic angle concept may apply is through the Luttinger parameters, which may all be close to unity (non-interacting limit) far away from the magic angle, whence the relevant cosine terms may be rendered only weakly relevant, thus becoming unimportant on experimental length scales. Our network model and the derived consequences, e.g. the competing quantum phases, while depending quantitatively on the precise value of the twist angle, are not crucially dependent on the twist angle being the exact magic angle. We simply need a twist angle small enough to enhance interaction effects sufficiently to lead to superconducting puddles and strongly relevant Luttinger parameters. To conclude: we have provided a simple model which we believe captures the key physics of the competition between superconductivity and insulating behavior in twisted bilayer graphene. Crucially, the model is agnostic as to the origin of pairing, which need not come from electron-electron interactions, but nonetheless gives rise to a phase diagram with superconductivity at `generic' filings interrupted by correlation driven insulating phases near commensuration. It must be noted that there are multiple counts on which our toy model is {\it not} a faithful description of TBLG. As such, it is not intended to be the last word on the description of the system. Nevertheless, we believe that it {\it does} capture the essential physics, particularly with regard to the effects of commensuration and Zeeman field, and as such may be a fruitful point of departure for future investigations. In particular, our analysis provides a natural way to incorporate the intuition of `superconductor as primary phase, interrupted by insulator at commensurate fillings,' which is suggested by the data of \cite{Lu2019Efetov}, and if this turns out to be the correct perspective on the problem, then the framework we have herein introduced may prove to be a natural point of departure for theoretical descriptions. Finally, of course, the model we have introduced is interesting in its own right, exhibiting a rich phase diagram, and is therefore also itself worthy of experimental investigation. \section*{Acknowledgments} We thank Matthew Foster, Andrew Potter, Fengcheng Wu, and Rui-Xing Zhang for useful discussions. Y.-Z.C. thanks Leo Radzihovsky and Tzu-Chi Hsieh for collaborating on related projects in which some of the insights are invaluable. Research was sponsored by the Army Research Office and was accomplished under Grant Number W911NF-17-1-0482 (Y.-Z.C., Y.-P.L., and R.M.N.), by a Simons Investigator award from the Simons Foundation to Leo Radzihovsky (Y.-Z.C.), and the Laboratory for Physical Sciences and Microsoft (S.D.S.). S.D.S. and R.M.N. would like to acknowledge the hospitality of the KITP, where this work was conceived during a visit to the program `Correlations in Moir\'e flat bands,' and also the Aspen Center for Physics, where the paper was completed during a visit to the program `Moiré Materials: Strong Correlations in Synthetic Superlattices.’ The KITP is supported in part by the National Science Foundation under Grant No. NSF PHY-1748958. The Aspen Center for Physics is supported by National Science Foundation grant PHY-1607611. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.
\section*{\normalsize{Waveguide design for MIR SFWM}} \label{sec:prequantum} Spontaneous four-wave mixing, where two pump photons are scattered to higher and lower frequencies, conserves energy and momentum. For efficient SFWM, the phase-matching condition must be satisfied. The total wave-vector mismatch, $\Delta k = \Delta k_\textrm{lin} - 2\gamma P,$ must be zero. Here, $P$ is the peak pump power in the waveguide, and $\gamma = \text k_{0}n_{2}/\text A_\text{eff}$ is the waveguide nonlinear parameter, with $n_2$ and $A_\text{eff}$ the nonlinear refractive index and effective modal area\cite{rukhlenko2012effective}, respectively. For frequencies near the pump, $\Delta k_\textrm{lin} = -\beta_{2}\,\Delta\omega^2,$ where $\beta_2 = \text{d}^2k/\text{d}\omega^2$ is the waveguide group-velocity dispersion (GVD), and $\Delta\omega$ is the pump-photon angular frequency detuning. For efficient four-wave mixing, $\beta_{2}\leq 0$, i.e. the GVD must be anomalous or zero. We designed the waveguide shown in Fig.~\ref{fig:prequantum}a ($510\times340~\xspace\ensuremath{\text{nm}}\xspace^2$ cross-section, $15^{\circ}$ side-wall angle) based on the variations of $\beta_2$ and $A_\mathrm{eff}$ with waveguide width shown in Fig.~\ref{fig:prequantum}c, at $\lambda=2.071~\xspace\ensuremath{\upmu\text{m}}\xspace$. The highly confined fundamental mode is shown in Fig.~\ref{fig:prequantum}b. To confirm the phase matching of our source, and estimate its bandwidth, we measure classical stimulated four-wave mixing\cite{liu2010mid, liscidini2013stimulated}. Figure~\ref{fig:prequantum}f shows a spectral map of the pump and stimulated emission, for various seed laser wavelengths. We observe phase-matched four-wave mixing over at least $60~\xspace\ensuremath{\text{nm}}\xspace$, limited by grating coupler transmission, implying a very wide SFWM spectrum (Fig.~\ref{fig:prequantum}e). All previous measurements of silicon's 2.1-\ensuremath{\upmu\text{m}}\xspace optical nonlinearity have been in bulk samples: here we confirm that the high nonlinear figure of merit measured in bulk also exists in nanoscale silicon waveguides. We use self-phase modulation and the Gerchberg-Saxton optical phase-retrieval method to estimate the waveguide nonlinearity\cite{sinclair2019temperature}; our results are summarised in Fig.~\ref{fig:prequantum}d with methods detailed in Supplementary Section~S2. We find an effective waveguide nonlinearity of $\gamma = 203\pm 26~\text{W}^{-1}\text{m}^{-1}$ ($n_2 = 15.3\pm 1.9\times 10^{-18}~\text{m}^2\,\text{W}^{-1}$ in bulk) and waveguide nonlinear absorption coefficient $\xspace\ensuremath{\alpha_\mathrm{TPA}}\xspace = 24.4\pm 3.3~\text{W}^{-1}\text{m}^{-1}$ ($\xspace\ensuremath{\beta_\mathrm{TPA}}\xspace=0.557\pm 0.07~\text{cm}\cdot\text{GW}^{-1}$ in bulk). Here, $\alpha_\text{TPA} = \partial\alpha/\partial P$ and $\beta_\text{TPA} = \partial\alpha/\partial I$, where $\alpha$ is the waveguide loss coefficient, and the intensity $I=P/A_\mathrm{eff}$ for a waveguided power $P$ with calculated $A_\mathrm{eff} = 0.228~\xspace\ensuremath{\upmu\text{m}}\xspace^2$. Our measurements on waveguides are in agreement with those in bulk\cite{wang2013multi, bristow2007two} (see Fig.~\ref{fig:motivation}). \new{ With the resonant $n_2$ enhancement, less pump is required for the same SFWM rate, and so less TPA ultimately results (see Supplementary Fig. S2). This is in addition to the modest reduction in \xspace\ensuremath{\beta_\mathrm{TPA}}\xspace which we observe.} \section*{\normalsize{Observation of correlated photon pairs}}\label{sec:photons} For a bright source of quantum-correlated photon pairs, we use SFWM. We start with a picosecond-pulsed pump laser, centred at $2.0715~\xspace\ensuremath{\upmu\text{m}}\xspace$, which we filter to a width of $1.0~\xspace\ensuremath{\text{nm}}\xspace$ using a double-pass grating monochromator. Controlling polarisation, we inject this pump into the fundamental TE mode of the waveguide with a vertical grating coupler (VGC; $-7.3$ dB transmission). The waveguide, shown in Fig.~\ref{fig:photonpairs}a, is wrapped into a 7.2-mm square spiral (3.2 dB/cm propagation loss) with 10-\ensuremath{\upmu\text{m}}\xspace minimum radius Euler bends\cite{cherchi2013dramatic}. Signal and idler photons are emitted in the same spatial mode, coupled off-chip, and separated probabilistically by a 1:1 fibre beam splitter. Both channels are tightly filtered with back-to-back free-space grating monochromators ($\sim$4.5 dB insertion loss per monochromator) to achieve the required $>100~\text{dB}$ pump rejection\cite{Piekarek:17, Savanier:16}. The signal and idler filters are $1.0$-nm wide, and separated from the pump by $\pm~1.46$~THz ($20.8$~nm). The experimental scheme is shown in Fig.~\ref{fig:photonpairs}b. To detect single photons from SFWM, sensitive detectors are necessary. Superconducting nanowire single photon detectors (SNSPD) have unrivalled timing jitter, dark count rates (DCR), and system detection efficiency (SDE), and have shown sensitivity up to $5~\xspace\ensuremath{\upmu\text{m}}\xspace$\cite{marsili2012efficient}. We incorporate superconducting nanowires into a dielectric stack optimised for absorption into the nanowire cavity at $\lambda=2.1~\xspace\ensuremath{\upmu\text{m}}\xspace$. The SNSPDs were fabricated from a 4-nm thick niobium nitride film, deposited using magnetron sputtering, and patterned using electron-beam lithography into a meander of 100-nm-wide superconducting wire. The nanowires are fibre coupled with anti-reflection coated SM2000 fibre. A second SM2000-fibre span connects these detectors to our optical apparatus ($\sim30~\text{m}$; 1.49~dB and 1.63~dB loss per channel, for detectors $A$ and $B$ respectively). Operating at 780~mK, we find that the SDE of the two detectors plateaus with bias currents around $8~\upmu\text{A}$, with peak SDE values of $44\pm 10\%$ and $48\pm 10\%$, for detectors $A$ and $B$, respectively. In the following experiments, we operate with detector bias currents of $7.9~\upmu\text{A}$ and $8.1~\upmu\text{A}$. We measure a timing jitter of $216~\text{ps}$ (full width at half maximum) from photon cross-correlation. The dark count rate and efficiency as a function of bias at $\lambda=2.071~\xspace\ensuremath{\upmu\text{m}}\xspace$ is shown in Figs.~\ref{fig:photonpairs}c and \ref{fig:photonpairs}d. We use an attenuated tuneable laser to measure the SDE as a function of wavelength, and plot the results in Fig.~\ref{fig:photonpairs}e. Photon pairs are detected in coincidence, with detector output pulses time correlated using standard coincidence counting logic. We observe a characteristic peak at zero relative delay from photons produced in the same SFWM event. A representative histogram is shown in Fig.~\ref{fig:photonpairs}f. We varied the launched optical power, fit each time correlation histogram with a Gaussian function, and integrated over 3 standard deviations (389~ps). These data are plotted in Fig.~\ref{fig:photonpairs}g. At low pump powers, we estimate an on-chip per-pulse generation efficiency of $11~\mathrm{MHz}/\mathrm{W}^2$, for watts of peak power, which at the repetition rate of our laser gives a generation probability of $0.28/\mathrm{W}^2$ (peak). These estimated on-chip rates naturally exclude loss (see Methods). We measure a maximum net coincidence rate of $112\pm 3~\text{Hz}$, with peak coincidence to accidental ratio (CAR) of $25.7\pm1.1$, at a coincidence rate of $1.1~\text{Hz}$. We define $\mathrm{CAR}=(X_\mathrm{raw}-X_\mathrm{acc})/X_\mathrm{acc}$, where $X_\mathrm{raw}$ is the integrated coincidence count in the histogram central peak, and $X_\mathrm{acc}$ is the average integrated coincidence count in the side (accidental) peaks (see Supplementary Section~S4 and Fig.~S4 for singles rates). Dark counts limit the maximum CAR $\propto\eta/\mathrm{DCR}$, so higher system transmission ($\eta$) and lower DCR will offer further improvements to the CAR. On a longer 17.5-mm waveguide, we measured a peak net coincidence rate of $224~\text{Hz}$ (Supplementary Fig.~S2c). Due to the simple separation of the signal and idler with a beam splitter, the actual pair-production rates are $4\times$ the measured net rates. Thus, we observe true rates of $448~\text{Hz}$ and $896~\text{Hz}$ for the two waveguides, respectively (see Supplementary Section~S4). \begin{figure*}[ht!] \centering \includegraphics[scale = 1]{./img/fig_4_v17.pdf} \caption{ Experimental measurement of on-chip quantum interference: \textbf{a}, Dark-field optical micrograph of the time-reversed Hong-Ou-Mandel experiment. Multimode interference coupler (MMI), waveguides (7.4-mm, WGs), thermo-optic phase modulator (TOPM), directional coupler (DC), asymmetric Mach-Zehnder interferometer (AMZI), wirebond (WB). Scale bar 50 \ensuremath{\upmu\text{m}}\xspace. \textbf{b}, Experimental scheme. A pump laser is polarisation controlled (PC), filtered with a double-pass monochromator, and coupled into the waveguide circuit, with a monitor photodiode (PD) at the input tap (9:1). A controller provides DC-voltage control of the on-chip quantum state. The signal and idler photons are demultiplexed, filtered and then detected with superconducting nanowire detectors (SNSPD) and a time interval analyser (TIA). \textbf{c}, Quantum and classical interference fringes with varying on-chip phase $\phi$, with fitted accidental-subtracted (net) visibility $V = 0.993\pm0.017$. } \label{fig:quantuminterference} \end{figure*} \section*{\normalsize{On-chip quantum interference}} The indistinguishability of generated photons, confirmed by high-visibility quantum interference between them, is an essential platform resource. The Hong-Ou-Mandel (HOM) effect causes two indistinguishable single photons to strictly bunch at the outputs of a balanced beam splitter\cite{hong1987measurement}. Here, we demonstrate on-chip quantum interference using a time-reversed HOM experiment\cite{silverstone2014chip}, with experimental setup and waveguide circuit shown in Figs. \ref{fig:quantuminterference}a and \ref{fig:quantuminterference}b. After filtering the pump as before, we couple it onto the chip through a VGC. We set the on-chip peak pump power to $0.32~\text{W}$, corresponding to a CAR of $19.3$ and $\sim0.03$ pairs per pulse. The pump field is equally split between the two photon-pair sources, with a balanced $1\times2$ multimode interference (MMI) coupler. Both 7.39-mm sources are coherently pumped and the relative phase $\phi$ between the two arms is varied with a thermo-optic phase modulator (see Supplementary Section~S1 for details of integrated optics). The biphoton state then interferes on a balanced directional coupler ($R = 0.49 \pm 0.02$). Coherent pumping of both sources produces SFWM photon pairs in superposition, and the quantum state at the directional coupler output is \begin{equation} \label{eq:fringe} \begin{split} \ket{\psi} \mkern5mu = \mkern5mu & \frac{\sin\phi}{\sqrt{2}}\big(\ket{0_s0_i}_A\ket{1_s1_i}_B - \ket{1_s1_i}_A\ket{0_s0_i}_B\big)\\ +\mkern5mu &\frac{\cos\phi}{\sqrt{2}}\big(\ket{1_s0_i}_A\ket{0_s1_i}_B + \ket{0_s1_i}_A\ket{1_s0_i}_B\big), \end{split} \end{equation} with signal and idler frequency ($s,i$) and spatial modes ($A,B$) in subscript (see Supplementary Section~S5 for more details). SFWM photons are then frequency demultiplexed on-chip with asymmetric Mach-Zehnder interferometers. Off chip, we reject the pump laser, and use coincidence detection to estimate $|\bra{1_s0_i}_A\bra{0_s1_i}_B\ket{\psi}|^2$.% We observe characteristic half-period interference fringes in the coincidences\cite{silverstone2014chip, matthews2009manipulation}, as the on-chip phase $\phi$ is varied, consistent with Eq.~\ref{eq:fringe} (see Fig.~\ref{fig:quantuminterference}c). This quantum interference has a net visibility of $V = 0.993 \pm 0.017$ (with $0.862\pm0.014$ raw). We calculate the visibility as $V = (X_\mathrm{max} - X_\mathrm{min})/(X_\mathrm{max} + X_\mathrm{min})$, where $X_\mathrm{max}$ and $X_\mathrm{min}$ are the maximum and minimum coincidence count rates of the sinusoidal fit. This compares favourably to performance at 1.55\xspace\ensuremath{\upmu\text{m}}\xspace on chip\cite{silverstone2014chip, he2015ultracompact, preble2015chip, jin2014chip}, and at 2.1\xspace\ensuremath{\upmu\text{m}}\xspace in bulk \cite{prabhakar2020two}. We observe coincidence rates of up to $5.5\pm 0.2~\text{Hz}$ at the interference peak. Simultaneously measuring all four chip outputs would double the observed rate. For perfect interference, the raw visibility is limited to $V \leq \mathrm{CAR}/(2 + \mathrm{CAR}) = 0.91$. \section*{\normalsize{Discussion and conclusions}} Despite operating in the 2-\ensuremath{\upmu\text{m}}\xspace band, we see from Fig.~\ref{fig:prequantum}d that two-photon absorption remains, albeit reduced from its strength at $1.55~\xspace\ensuremath{\upmu\text{m}}\xspace$. This is to be expected at room temperature and at $\lambda=2.07~\xspace\ensuremath{\upmu\text{m}}\xspace$, as silicon's indirect band gap gives a TPA cut-off around $2.21~\xspace\ensuremath{\upmu\text{m}}\xspace$ (Fig.~\ref{fig:motivation}). Our waveguided estimates of both nonlinear absorption and refraction are in broad agreement with literature values for bulk silicon\cite{wang2013multi, bristow2007two}. At low temperatures, a blue-shift in the band edge causes a blue-shift in the TPA cut-off\cite{cardona2004temperature}, to 2.15\xspace\ensuremath{\upmu\text{m}}\xspace. Future room-temperature experiments will benefit from 2.2-\ensuremath{\upmu\text{m}}\xspace laser development (e.g. semiconductor disk lasers\cite{kaspar2013recent}), while experiments integrating SNSPDs on-chip or in-package will benefit from this low-temperature shift of the TPA cut off. Black-body radiation from our room-temperature apparatus was a source of noise in our measurements. As seen in Figs.~\ref{fig:photonpairs}c and \ref{fig:photonpairs}d, the `dark' count rate, collected with the lights and laser turned off, plateaus, rather than growing exponentially with bias, because environmental black-body photons nonetheless illuminate the detectors (see Supplementary Figs.~S3a,b). Black-body noise would be suppressed by a cold filter. Both CAR and raw fringe visibility would benefit from such a filter. In demonstrating a bright source of photon pairs, efficient single-photon detectors, and high-visibility quantum interference, we have provided all the necessary ingredients for a dense, manufacturable, and high-performance platform for applied quantum optics. The mid-infrared presents a new approach to scalable optical quantum information processing in silicon. \section*{\normalsize{Acknowledgements}} We thank D. Bonneau, A. McMillan, B.D.J. Sayers, B. Kuyken, M. Nedeljkovic, K. Erotokritou, G. Taylor, and R.H. Hadfield for their valuable inputs throughout the long gestation of this work, and are grateful to L. Kling, and G.D. Marshall for their advice and support. The chip reported here was fabricated as part of the CORNERSTONE project, and we are especially grateful to C. Littlejohns for his efforts therein. \section*{\normalsize{Disclosures}} The authors declare no conflicts of interest. \section*{\normalsize{Data Availability}} Data and computer code that support the findings of this study are available at the University of Bristol's data repository, data.bris . Other information is available from the authors upon reasonable request. \begin{footnotesize}
\section{Introduction} \subsection{General setup and aim of the paper} The recovery of an unknown physical quantity from indirect measurements is the main goal of an inverse problem. It is often convenient to consider both the unknown quantity $x$ and the measured data $y$ in a continous setting. This allows for studying, for instance, inverse problems modeled by partial differential equations (PDE) \cite{2017-isakov,2017-hasanov} and, more generally, infinite-dimensional inverse problems where the measurement operator, or forward map, is a function between Banach spaces $F\colon X\to Y$ \cite{2011-kirsch}. The inverse problem consists in the reconstruction of $x$ from the knowledge of the measurements $F(x)$. Several possibly nonlinear inverse problems fit into this framework, including electrical impedance tomography (EIT) \cite{calderon1980,eit-1999,2012-mueller-siltanen}, photoacoustic tomography \cite{Wang1458,2015-kuchment-kunyansky} (and many other hybrid imaging problems \cite{alberti-capdeboscq-2018}), travel time tomography \cite{2019-stefanov}, and inverse scattering \cite{2013-colton-kress}. However, in practice we only have access to a finite-dimensional approximation $Q(F(x))$ of the data, for some finite-rank operator $Q\colon Y\to Y$. It is then critical, in view of the applications, to study how the reconstruction depends on this approximation. The aim of this paper is to provide explicit guarantees for exact recovery for general inverse problems with finite measurements. As we show in this work, this issue is strictly related with that of stability, which we now discuss. \subsection{Stability of inverse problems and previous work.} The main motivation of this work comes from some nonlinear inverse problems for PDE, such as Calder\'on's problem for EIT, where the unknown is a conductivity distribution that has to be recovered from boundary voltage and current patterns. This is a severely ill-posed problem, where a small error in the data propagates exponentially to the reconstruction \cite{mandache2001}. In other words, the continuous dependence of the conductivity on the boundary data, also known as stability estimate, is of logarithmic type \cite{alessandrini1988}, and this explains the typical low spatial resolution in the reconstruction. In the case of general nonlinear inverse problems, such as EIT or inverse scattering, it turns out that a possible way to obtain a stronger stability of Lipschitz type is to assume that the unknown belongs to a known finite-dimensional subspace $W$ of the original space $X$. This has been shown for a number of inverse problems for elliptic PDE \cite{alessandrini1996,2005-alessandrini-vessella,bacchelli2006,beretta2008,2011-beretta-francini,beretta2013,bourgeois2013,beretta2014,beretta2014b,beretta2015,gaburro2015,beretta2016b,beretta2017,alessandrini2017, alessandrini2017u,Harrach2019b,alessandrini2018,beretta2019}. The main drawback of these results is that, even though the unknown is a finite-dimensional object, infinitely many measurements are still needed. For instance, in the case of EIT, an infinite number of boundary current and voltage data are required to recover a conductivity in a known finite-dimensional space. A uniqueness result from a finite number of boundary measurements -- as well as a Lipschitz stability estimate and a reconstruction scheme -- was recently obtained by the authors for the Gel'fand-Calder\'on problem for the Schr\"odinger equation and for EIT under rather general finite-dimensionality assumptions on the unknown \cite{alberti2018}. Afterwards, Lipschitz stability from a finite number of measurements was derived by Harrach for the complete electrode model in EIT \cite{Harrach_2019} (based on the local problem studied in \cite{Lechleiter_2008}), as well as by R\"uland-Sincich for the fractional Calder\'on problem \cite{ruland2018}. The linearized EIT problem was previously addressed in \cite{alberti2017infinite} using compressed sensing. Many related works, mainly for the inverse scattering problem, consider a periodic, polygonal or polyhedral structure in the unknown \cite{friedman1989,cheng2003,alessandrini2005b,bao2011,hu2016,blaasten2016,blaasten2017,liu2017}. Though the above results constitute a clear improvement showing that a finite number of measurements is enough, they still leave many unanswered questions. In our previous result \cite{alberti2018}, the (finite number of) boundary measurements depend on the unknown conductivity, which is clearly impractical. This assumption was then removed in \cite{Harrach_2019}, though the result is not constructive (the number of measurements is not explicitly given), and the approach is restricted to finite-dimensional subspaces $W$ of piecewise analytic conductivities. The other results either work under very restrictive assumptions on the unknown, or they do not provide criteria to choose the measurements depending on the a priori assumptions. \subsection{Main contributions of this paper} In this work, we present a general framework to solve infinite-dimensional inverse problems when only a finite number of measurements is available.\footnote{After the first version of this preprint was published, several works on this topic have appeared \cite{harrach-2019,alberti2020calderon,alberti2020inverse}.} In Section~\ref{sec:lip} we prove a Lipschitz stability estimate for inverse problems with finite measurements. We also give an explicit criterion to choose the type and number of measurements depending on the a priori assumptions on the unknown, namely on the space $W$. The result is obtained with functional analytic techniques and it takes inspiration from the general Lipschitz stability results of \cite{bacchelli2006, bourgeois2013} as well as from the already mentioned works on EIT \cite{alberti2018,Harrach_2019}. In Section~\ref{sec:rec} we derive a globally convergent reconstruction algorithm for the inverse problem by combining the Lipschitz stability obtained in the previous section with the results of \cite{dehoop2012} (summarized in Appendix~\ref{sec:app}), which guarantee local convergence for the associated Landweber iteration. We show how a good initial guess can be recovered by constructing a lattice in the (finite-dimensional) unknown space. In Section~\ref{sec:exa}, we apply the abstract results to three inverse problems, EIT, inverse scattering and quantitative photoacoustic tomography. For EIT, we show a Lipschitz stability estimate from a finite number of measurements independent of the unknown, under the assumption that a Lipschitz stability estimate holds in the case of full measurements. Thus, this covers a large class of finite-dimensional spaces of conductivities. Moreover, an explicit criterion is given in order to choose the number of measurements. In particular, we consider the special case of conductivities on the unit disk: assuming that a Lipschitz stability estimate for the full Neumann-to-Dirichlet map holds with a constant $C$, we show that Lipschitz stability also holds with only a finite number of trigonometric current patterns proportional to $C^2$. Finally, in Section~\ref{sec:conclusions} we provide some concluding remarks and discuss future research directions. \subsection{Connections with machine learning} In recent years, {\it machine learning} has arisen as a data-driven alternative to classical inversion methods, and has shown tremendous improvements in dealing with the ill-posedness of several inverse problems \cite{arridge2019,Lucas18,McCann17,2020-willet-etal}. The results presented in this paper may be used in connection with machine learning techniques in several ways. \begin{itemize} \item Our main stability result holds under the assumption that the unknown belongs (or is close) to a known finite-dimensional subspace $W$ of a Banach space. In case this subspace is not known, it could be estimated by using, for instance, dictionary learning techniques \cite{mairal2011task}. \item The main stability estimate of this work shows the Lipschitz continuity of an inverse mapping. This property allows the inverse to be approximated with neural networks \cite{yarotsky2017error}, even when $W$ is not known. The explicit discretisation that we use in the stability result would help in designing the architecture of such a network. \item The iterative reconstruction algorithm presented in Section~\ref{sec:rec} can be \textit{unrolled} and seen as a neural network as in \cite{adler2017solving,adler2018learned}. Also in this context the subspace $W$ can be learned, namely the projection operator $P_W$ can be replaced by weights of a deep network. \end{itemize} \section{Lipschitz stability estimate}\label{sec:lip} \subsection{Abstract inverse problem} Let $X$ and $Y$ be Banach spaces with norms $\| \cdot \|_X$ and $\| \cdot \|_Y$. We denote the space of continuous linear operators from $X$ to $Y$ by $\mathcal{L}_c(X,Y)$. Let $A \subseteq X$ be an open set and $F \colon A \to Y$ be a map of class $C^1$. In other words, $F$ is Fréchet differentiable at every $x \in A$, namely there exists $F'(x) \in \mathcal{L}_c(X,Y)$ such that \[ \lim_{h \to 0}\frac{\|F(x+h)-F(x)-F'(x) h\|_Y}{\|h\|_X}=0, \] and $F'$ is continuous. We shall refer to $F$ as the forward map. The focus of this work is the following inverse problem: given $F(x)$, recover $x$. Very often, even if the map $F$ is injective, its inverse $F^{-1}$ is not continuous, and so the inverse problem is ill-posed. \subsection{Lipschitz stability with infinite-dimensional measurements} We are interested in a Lipschitz stability estimate for this general inverse problem. One way to obtain it, without imposing strong assumptions on the map $F$, is to assume that the unknown $x$ belongs to a finite-dimensional subset $W$ of $X$. We recall here a general result obtained in \cite[Proposition 5]{bacchelli2006} and \cite[Theorem 1]{bourgeois2013} in a similar setting. \begin{theorem}\label{theo:lip} Let $X$ and $Y$ be Banach spaces. Let $A \subseteq X$ be an open subset, $W \subseteq X$ be a finite-dimensional subspace and $K \subseteq W \cap A$ be a compact and convex subset. Let $F \in C^1(A,Y)$ be such that $F|_{W \cap A}$ and $F'(x)|_{W}$, $x \in W \cap A$, are injective. Then there exists a constant $C> 0$ such that \begin{equation}\label{est:lipinf} \|x_1-x_2\|_X \leq C \| F(x_1)-F(x_2)\|_Y,\qquad x_1,x_2 \in K. \end{equation} \end{theorem} The constant $C$ can be explicitly estimated in terms of the lower bound of the Fréchet derivative and the moduli of continuity of $(F|_{K})^{-1}$ and $F'$, as done in \cite{bacchelli2006}, or with ad-hoc techniques depending on the specific problem as in \cite{rondi2006}. In general, for ill-posed problems, $C\to +\infty$ as $\dim W\to+\infty$ (which is consistent with the results of \cite{1980-seidman}), and so this approach works well for low-dimensional spaces $W$ only. Estimate \eqref{est:lipinf} shows that even a severely ill-posed problem becomes stable under the above finite dimensionality assumptions. Nevertheless, this is still unsatisfactory because we are recovering a finite-dimensional quantity $x$ from infinite-dimensional (and so, infinitely many scalar) measurements $F(x)$. \subsection{Lipschitz stability with finitely many measurements} Instead of measuring the infinite-dimensional data $F(x)$, we now suppose to have the measurements \[ Q_N F(x) \] for $N\in\mathbb{N}$ large enough (depending explicitly on $K$ and $C$, as we will see), where $Q_N\colon Y\to Y$ are (finite-rank) bounded operators approximating the identity $I_Y$ as $N\to +\infty$. The precise characterization of the convergence $Q_N\to I_Y$ is as follows. \begin{hypothesis}\label{hyp} Let $W$ be a subspace of $X$ and $K \subseteq W \cap A$. For $N\in\mathbb{N}$, let $Q_N\colon Y\to Y$ be bounded linear maps. We assume that there exists a subspace $\tilde Y$ of $Y$ such that \begin{enumerate}[(a)] \item\label{ass:a} for every $\xi\in K$ \[ \ran \bigl(F'(\xi)|_W\bigr)\subseteq \tilde Y \] (if $F$ is linear, this is equivalent to requiring $\ran F|_W\subseteq\tilde Y$); \item\label{ass:b} $\norm{Q_N}_{Y\to Y}\le D$ for every $N\in\mathbb{N}$, for some $D\ge 1$; \item\label{ass:c} and, as $N\to +\infty$, \[ Q_N|_{\tilde Y}\to I_{\tilde Y} \] with respect to the strong operator topology. \end{enumerate} \end{hypothesis} \begin{remark*} Several works study inverse problems with finitely-many measurements in the Bayesian approach to discretisation errors \cite{kaipio-somersalo-2007,lassas-etal-2009,stuart-etal-2012,kekkonen-etal-2014}, but they only consider asymptotic estimates (as $N$ goes to infinity) and are mostly for linear problems. The framework considered here is similar to that of multilevel regularization methods, where discretization in the image space is used as a regularizer \cite{scherzer_book}. More precisely, it is possible to interpret this hypothesis as a smoothing property (cfr.\ the regularization theory by discretization \cite[Sections~4.3 and 5.1]{scherzer_book}). \end{remark*} Let us now list some important examples of operators $Q_N$. These are applied to realistic scenarios in Section~\ref{sec:exa}. \smallskip Any family of bounded operators $Q_N$ such that $Q_N\to I_Y$ strongly may be considered (in particular, we do not require convergence with respect to the operator norm). In the next example, we discuss how this situation can arise in practice. \begin{example}[Projections onto finite-dimensional subspaces]\label{ex:hil} Let the data space $Y$ be an infinite-dimensional separable Hilbert space and $\{e_j\}_{j\in\mathbb{N}}$ be an orthonormal basis (ONB) of $Y$. Then $Q_N \colon Y \to Y$ can be taken as the projection onto the space generated by the first $N$ elements of the basis, i.e.\ $Q_N y = \sum_{j=1}^N \langle y,e_j\rangle e_j$. More generally, assume that $Y$ has the following multi-resolution structure. Let $\{G_N\}_{N\in\mathbb{N}}$ be a family of subspaces of $Y$ satisfying: \begin{enumerate} \item each $G_N \subseteq Y$ is a finite-dimensional subspace; \item $G_N \subseteq G_{N+1}$ for every $N \in \mathbb{N}$; \item and the spaces are exhaustive, i.e. $\overline{\bigcup_{N\in \mathbb{N}}G_N} = Y$. \end{enumerate} Let $P_N\colon Y\to Y$ be the orthogonal projection onto $G_N$. We have that $P^*_N = P_N$ and if $G_N = {\rm span}\{g_1,\dots,g_{d_N}\}$, where $d_N = \dim G_N$, the measurements \[ \langle F(x),g_k\rangle, \quad k = 1,\ldots, d_N, \] determine the Galerkin projection $P_N F(x)$. Thus this represents a model for a finite number of measurements from the full data $F(x)$. In this case we can choose $Q_N = P_N$. For example, the projections $Q_N$ may represent a low-pass filter in frequency (modelling sensors up to a certain bandwidth) or in wavelet scale. \end{example} Next, we consider a particular case of multi-resolution structure in reproducing kernel Hilbert spaces, in order to view the projected measurements $Q_NF(x)$ as a finite pointwise sampling of the full measurements $F(x)$. \begin{example}[Finite sampling in reproducing kernel Hilbert spaces]\label{ex:rkhs} Let $Y$ be a reproducing kernel Hilbert space (RKHS) of continuous functions on a separable topological space $\mathcal{A}$ \cite{1950-Aronszajn} (for instance, $Y$ can be a sufficiently smooth Sobolev space, possibly on a manifold \cite{devito-2020}, which is a common setup in inverse problems). Roughly speaking, this means that the evaluation functionals $f\mapsto f(a)$ are continuous for every $a\in \mathcal{A}$, so that by the Riesz representation theorem we can write the reproducing property \[ f(a)=\langle f,k_a\rangle_Y,\qquad f\in Y,\,a\in\mathcal{A}, \] for a suitable $k_a\in Y$. The kernel of the RKHS is then \[ k\colon\mathcal{A}\times\mathcal{A}\to\mathbb{C},\qquad k(a,b)=\langle k_b,k_a\rangle_Y. \] Let $\{a_j:j\in\mathbb{N}\}$ be a dense set of $\mathcal{A}$ (assume that $a_j\neq a_k$ if $j\neq k$): its existence follows from the separability of $\mathcal{A}$. Set \[ G_N =\operatorname{span}\{k_{a_j}:j=1,\dots,N\},\qquad N\in\mathbb{N}. \] Let us now verify that the conditions of Example~\ref{ex:hil} are satisfied. By construction, $G_N$ is a finite-dimensional subspace of $Y$ and $G_N\subseteq G_{N+1}$ for every $N\in\mathbb{N}$. It remains to show that $\overline{\bigcup_{N\in \mathbb{N}}G_N} = Y$. Take $f\in Y$ such that $\langle f,g\rangle_Y = 0$ for every $g\in \bigcup_{N\in \mathbb{N}}G_N$. Then \[ f(a_j)=\langle f,k_{a_j}\rangle =0,\qquad j\in\mathbb{N}, \] and so $f=0$ because it is continuous and $\{a_j:j\in\mathbb{N}\}$ is dense in $\mathcal{A}$. The claim is proved. As in Example~\ref{ex:hil}, we can let $Q_N\colon Y\to Y$ be the projection onto $G_N$. Since \[ \langle Q_N f,k_{a_j}\rangle=\langle f,k_{a_j}\rangle =f(a_j) ,\qquad j=1,\dots,N, \] the pointwise values $f(a_j)$ for $j=1,\dots,N$ allows us to recover $Q_N f$. Furthermore, since $G_N$ is finite-dimensional, there exists $C_N>0$ such that \begin{equation}\label{eq:stable_sampling} \|Q_N f\|_Y \le C_N \|\bigl(f(a_1),\dots,f(a_N)\bigr)\|_2,\qquad f\in Y. \end{equation} In other words, the reconstruction of $Q_N f$ from the sampled values of $f$ is stable. \end{example} Let us now consider a third example that is adapted to inverse boundary value problems, in which the measurements themselves are operators. In this case, the maps $Q_N$ do not converge strongly to the identity on the whole $Y$. \begin{example}[Projections with operator-valued measurements]\label{ex:gal} Let $Y = \mathcal{L}_c (Y^1,Y^2)$ be the space of bounded linear operators from $Y^1$ to $Y^2$, where $Y^1$ and $Y^2$ are Banach spaces. Let $P^k_N \colon Y^k \to Y^k$ be bounded maps such that $P^{2}_N \to I_{Y^k}$ and $(P^{1}_N)^* \to I_{Y^k}$ strongly as $N\to +\infty$ (for instance, when $Y^k$ is a Hilbert space, $P^k_N$ may be chosen as the projection onto the $N$-th subspace of an exhaustive chain, as in Example~\ref{ex:hil}). Let us now take $\tilde Y=\{T\in Y:\text{$T$ is compact}\}$ and assume that \begin{equation}\label{eq:compact} F'(\xi)\tau \colon Y^1\to Y^2\;\; \text{is compact for every $\xi \in K, \tau \in W$,} \end{equation} which is satisfied in many cases of interest. It is worth observing that this condition is implied by \begin{equation*}\label{eq:compact2} F(x_1)-F(x_2)\;\; \text{is compact for every $x_1,x_2 \in A$,} \end{equation*} since $ F'(\xi)\tau=\lim_{h \to 0} \frac{F(\xi +h\tau) -F(\xi)}{h} $ is the operator-norm limit of compact operators, and so it is compact. Let $Q_N \colon Y \to Y$ be the maps defined by \[ Q_N (y) = P^2_N y P^1_N,\qquad y \in Y. \] Even if $Q_N \not\to I_Y$ strongly, let us show that Hypothesis~\ref{hyp} is satisfied. Condition \ref{ass:a} follows immediately from \eqref{eq:compact}. By the uniform boundedness principle the operators $P^k_N$ are uniformly bounded, and so \ref{ass:b} is satisfied with $D=\sup_N \|P^1_N\|_{Y^1\to Y^1}\|P^2_N\|_{Y^2\to Y^2}$. It remains to verify \ref{ass:c}. For $T \in\tilde Y$ we have \begin{equation}\label{eq:RN} \begin{split} \| T-Q_N T \|_Y &= \| T - P^2_N T+ P^2_N T- P^2_N T P^1_N \|_Y \\ & \leq \|(I_{Y^2}-P_N^2)T\|_Y + \|P^2_NT(I_{Y^1}-P_N^1)\|_Y\\ & \leq \|(I_{Y^2}-P_N^2)T\|_Y + \|P^2_N\|_{Y^2\to Y^2}\|T(I_{Y^1}-P_N^1)\|_Y. \end{split} \end{equation} Since $P_N^{2} \to I_{Y^2}$ and $(P_N^{1})^* \to I_{Y^1}$ strongly, and $T \colon Y^1 \to Y^2$ is compact, by a standard result in functional analysis (see Lemma~\ref{lem:comp} below) we have that the right hand side converges to $0$ as $N\to +\infty$, and \ref{ass:c} follows. \end{example} Our main result states that it is indeed possible to obtain Lipschitz stability from a finite number of measurements, obtained by composing $Q_N$ with the full measurements, at the price of a slightly larger Lipschitz constant. In particular, we also obtain a uniqueness result with finite measurements. \begin{theorem}\label{theo:main} Let $X$ and $Y$ be Banach spaces. Let $A \subseteq X$ be an open subset, $W\subseteq X$ be a subspace and $K \subseteq W\cap A$ be a compact and convex subset. Let $F \in C^1(A,Y)$ be a Lipschitz map satisfying the Lipschitz stability estimate \[ \|x_1-x_2\|_X \leq C \| F(x_1)-F(x_2)\|_Y, \qquad x_1,x_2 \in K, \] for some $C\ge 1$. Let $Q_N\colon Y\to Y$ be bounded linear maps for $N\in\mathbb{N}$ satisfying Hypothesis~\ref{hyp}. \begin{enumerate}[(i)] \item \label{cond:fin} If $W$ is finite-dimensional, then \[ \lim_{N \to +\infty}s_N = 0,\qquad s_N = \sup_{\xi \in K}\|(I_Y-Q_N) F'(\xi)\|_{W \to Y}. \] \item\label{cond:sn} If $s_N \leq \frac{1}{2C}$, then for every $x_1,x_2\in A$ \begin{equation}\label{eq:lip2C} \|x_1-x_2\|_X \leq 2 C \| Q_N(F(x_1))-Q_N(F(x_2))\|_Y + 3\, CDL (d(x_1,K)+d(x_2,K)), \end{equation} where $L\ge 1$ is the Lipschitz constant of $F$. \end{enumerate} \end{theorem} \begin{remark}\label{rem:1} Even though \ref{cond:fin} and \ref{cond:sn} combined clearly imply that there exists $N\in\mathbb{N}$ for which \eqref{eq:lip2C} holds true, we decided to separate the two conditions since in many cases it is possible to show directly $s_N \leq \frac{1}{2C}$, and this allows to derive explicit bounds on $N$ (as in Section \ref{sub:eit}). More precisely, the inequality \begin{equation}\label{cond:sn2} \sup_{\xi \in K}\|(I_Y-Q_N) F'(\xi)\|_{W \to Y} \leq \frac{1}{2C} \end{equation} gives an explicit relation between the number of measurements/discretization parameter $N$, the space $W$ and the Lipschitz stability constant $C$ of the full-mea\-su\-re\-ment case. It is worth observing that this condition may be seen as a nonlinear version of the \textit{stable sampling rate} and the \textit{balancing property}, which were introduced in the context of generalized sampling and compressed sensing for infinite-dimensional linear problems \cite{AH-2012,AHP-2013,AH,2017-adcock-hansen-poon-roman}. \end{remark} \begin{remark}\label{rem:2} When the mismodeling errors $d(x_i,K)$ are zero, estimate \eqref{eq:lip2C} is exactly a Lipschitz stability estimate. Otherwise, it is natural to have an error term depending on the distance to $K$. We want to underline that, in our framework, this error term is amplified by the Lipschitz constant $C$, which may be very large for severely ill-posed problems. This is due to the linearization techniques in our proof and it might be a price to pay to obtain a general result such as Theorem~\ref{theo:main}. However, in \cite{alberti2018,alberti2020calderon} we were able to obtain sharper estimates with respect to the mismodeling error for Calder\'on's inverse conductivity problem, thanks to specific nonlinear inversion methods. \end{remark} Combining Theorems \ref{theo:lip} and \ref{theo:main} we obtain the following corollary for the cases discussed in Examples~\ref{ex:hil} and \ref{ex:gal}. \begin{corollary} \label{cor:main} Let $X$ and $Y$ be Banach spaces. Let $A \subseteq X$ be an open subset, $W$ be a finite-dimensional subspace of $X$ and $K$ be a compact and convex subset of $W \cap A$. Let $F \in C^1(A,Y)$ be such that $F|_{W \cap A}$ and $F'(x)|_{W}$, $x \in W \cap A$, are injective. Let $Q_N\colon Y\to Y$ be bounded linear maps for $N\in\mathbb{N}$. Assume one of the following: \begin{enumerate}[(a)] \item \label{cond:yhil} $Q_N\to I_Y$ strongly as $N\to +\infty$ (as, e.g., in Example \ref{ex:hil}); \item \label{cond:ylin} $Y = \mathcal{L}_c (Y^1,Y^2)$, with $Y^1$ and $Y^2$ Banach spaces, $Q_N$ is given as in Example~\ref{ex:gal}, and $F'(\xi)\tau \colon Y^1\to Y^2$ is compact for every $\xi \in A$ and $\tau \in W$. \end{enumerate} Then there exist $N \in \mathbb{N}$ and $C>0$ such that \begin{equation} \|x_1-x_2\|_X \leq C \| Q_N(F(x_1))-Q_N(F(x_2))\|_Y, \qquad x_1,x_2 \in K. \end{equation} \end{corollary} This corollary shows that in the rather common cases discussed in Examples~\ref{ex:hil} and \ref{ex:gal}, under basically the same conditions of Theorem \ref{theo:lip} we obtain Lipschitz stability from a finite number of measurements. Let us now prove the main result. \begin{proof}[Proof of Theorem \ref{theo:main}] We prove the two parts of the statement separately. \textit{Proof of \ref{cond:fin}.} Let $K' = K \times (W \cap S(0,1))$, where $S(0,1)$ is the unit sphere in $X$ centered in $0$, and \[ g \colon K' \to Y, \quad g(\zeta) = F'(\xi)\tau,\quad \zeta = (\xi,\tau). \] We first show that $g$ is continuous. Given a converging sequence $\zeta_n= (\xi_n,\tau_n) \to \zeta = (\xi,\tau)$ in $K'$, we have \begin{align*} \|g(\zeta_n)-g(\zeta)\|_Y &= \|F'(\xi_n)\tau_n - F'(\xi)\tau\|_Y\\ &\leq \|(F'(\xi_n) - F'(\xi))\tau_n\|_Y + \|F'(\xi)(\tau_n-\tau)\|_Y\\ &\leq \|F'(\xi_n) - F'(\xi)\|_{X \to Y}\|\tau_n\|_X + \|F'(\xi)\|_{X\to Y} \|\tau_n-\tau\|_X. \end{align*} Using the fact that $F \in C^1(A,Y)$, $\|\tau_n\|_X = 1$ and $\|\tau_n-\tau\|_X \to 0$ we have that $\|g(\zeta_n)-g(\zeta)\|_Y \to 0$, and so $g$ is continuous. Set $R_N=I_Y-Q_N$. Thus the map \[ K' \ni (\xi,\tau) \mapsto \|R_N F'(\xi)\tau\| = \|R_N g(\zeta)\|\in [0,+\infty) \] is continuous on the compact set $K'$, so there exists $\zeta_N \in K'$ such that \[ s_N = \sup_{\xi \in K}\|R_N F'(\xi)\|_{W \to Y} =\sup_{\zeta \in K'} \|R_N g(\zeta)\|_Y = \|R_N g(\zeta_N)\|_Y. \] Let $(s_{N_j})_j$ be a subsequence of $(s_N)_N$: by a classical result in general topology, it is enough to show that $(s_{N_j})_j$ has a subsequence converging to $0$. The set $K'$ is compact, and so $\zeta_{N_j} \to \zeta_*$ in $K'$ for a subsequence (with an abuse of notation, we do not specify the second subsequence), so \begin{align*} \|R_{N_j} g(\zeta_{N_j})\|_Y &\leq \|R_{N_j} (g(\zeta_{N_j})-g(\zeta_*))\|_Y + \|R_{N_j} g(\zeta_*)\|_Y\\ &\leq \|R_{N_j} \|_{\tilde Y \to Y} \|g(\zeta_{N_j})-g(\zeta_*)\|_Y+\|R_{N_j} g(\zeta_*)\|_Y, \end{align*} where we have used Hypothesis~\ref{hyp}\ref{ass:a}. Since $\|Q_{N_j}\|_{\tilde Y \to Y} \leq D$ by Hypothesis~\ref{hyp}\ref{ass:b}, we have $\|R_{N_j} \|_{\tilde Y \to Y} \leq D+1$. Moreover, $\|g(\zeta_{N_j})-g(\zeta_*)\|_Y \to 0$ as $j \to +\infty$ since $g$ is continuous. Finally, $\|R_{N_j} g(\zeta_*)\|_Y \to 0$ as $j \to +\infty$ by Hypothesis~\ref{hyp}\ref{ass:c}. This shows that $s_{N_j}\to 0$ as $j \to +\infty$, as desired. \textit{Proof of \ref{cond:sn}.} Let $N$ be such that $s_N\le \frac{1}{2C}$. Take $x_1,x_2\in A$ and let $x_1^K,x_2^K\in K$ be such that \begin{equation}\label{eq:distance} d(x_j,K)=\|x_j-x_j^K\|_X,\qquad j=1,2. \end{equation} (The existence of these points is guaranteed by the compactness of $K$.) By the Lipschitz stability estimate of $F$ we have \begin{equation}\label{pf:ineq} \begin{split} \|x_1^K-x_2^K\|_X &\leq C \|F(x_1^K)-F(x_2^K)\|_Y \\ &\leq C\| Q_N(F(x_1^K)-F(x_2^K))\|_Y+C \|R_N(F(x_1^K)-F(x_2^K))\|_Y. \end{split} \end{equation} Consider now $f \colon A \to Y$, $f(x) = R_N F(x)$. Then it is easy to verify that its Fréchet derivative satisfies $f'(x) = R_N F'(x)$, because $R_N$ is linear. Then, by the mean value theorem for Gateaux differentiable functions between Banach spaces (see \cite[Theorem 1.8]{ambrosetti1995} for instance) and since $K$ is convex, there exists $\xi \in K$ such that \[ \frac{\|R_N(F(x_1^K)-F(x_2^K))\|_Y}{\|x_1^K-x_2^K\|_X}\leq \frac{\|R_N F'(\xi)(x_1^K-x_2^K) \|_Y}{\|x_1^K-x_2^K\|_X}\leq s_N \leq \frac{1}{2C}. \] Plugging this estimate into inequality \eqref{pf:ineq} yields \[ \begin{split} \|x_1^K-x_2^K\|_X &\leq 2 C\| Q_N(F(x_1^K)-F(x_2^K))\|_Y\\ &\leq 2C\|Q_N(F(x_1)-F(x_2))\|_Y + 2C\|Q_N(F(x_1)-F(x_1^K))\|_Y \\ &\quad + 2C\|Q_N(F(x_2)-F(x_2^K))\|_Y \\ &\leq 2C\|Q_N(F(x_1)-F(x_2))\|_Y +2CDL (\|x_1-x_1^K\|_X+\|x_2-x_2^K\|_X) , \end{split} \] because $\|Q_N\|_{Y\to Y} \leq D$ and $L$ is the Lipschitz constant of $F$. As a consequence, thanks to \eqref{eq:distance} we readily obtain \[ \begin{split} \|x_1-x_2\|_X &\leq\|x_1^K-x_2^K\|_X + \|x_1-x_1^K\|_X+\|x_2-x_2^K\|_X\\ &\leq 2C\|Q_N(F(x_1)-F(x_2))\|_Y +(2CDL+1) (d(x_1,K)+d(x_2,K)). \end{split} \] This immediately gives the desired Lipschitz stability estimate \eqref{eq:lip2C}. \end{proof} We finish this section with a technical lemma used in Example~\ref{ex:gal}. \begin{lemma}\label{lem:comp} Let $Y^1$ and $Y^2$ be two Banach spaces, $T \colon Y^1 \to Y^2$ be a compact operator and $S^k_N \colon Y^k \to Y^k$, $k=1,2$, be such that $S^{2}_N \to 0$ and $(S^1_N)^* \to 0$ strongly as $N \to +\infty$. Then \begin{enumerate}[(i)] \item \label{conv:1} $\|S^2_N T\|_{\mathcal{L}_c(Y^1,Y^2)} \to 0$ as $N \to +\infty$, \item \label{conv:2} $\|T S^1_N\|_{\mathcal{L}_c(Y^1,Y^2)}\to 0$ as $N \to +\infty$. \end{enumerate} \end{lemma} \begin{proof} We start from \ref{conv:1}. Assume by contradiction that $\|S^2_N T\|_{\mathcal{L}_c(Y^1,Y^2)} \not\to 0$. Then there exists $\varepsilon > 0$ such that, for a subsequence, we have \[ \sup_{\|x\|_{Y^1} = 1} \|S^2_N T x \|_{Y^2} > \varepsilon, \qquad N \in \mathbb{N}. \] Thus, for each $N\in \mathbb{N}$ there exists $x_N\in Y^1$ such that $\|x_N\|_{Y^1} = 1$ and $\|S^2_N T x_N\|_{Y^2} > \varepsilon$. Since $\{x_N\}_{N \in \mathbb{N}}$ is bounded and $T$ is compact, there exists $y \in Y^2$ such that, for a subsequence, $T x_{N} \to y$ as $N \to +\infty$. Since $S^2_N y' \to 0$ for every $y' \in Y^2$ we have \[ \sup_{N \in \mathbb{N}}\|S^2_N y'\|_{Y^2}<+\infty, \qquad y' \in Y^2, \] and by the uniform boundedness principle we obtain \[ \sup_{N \in \mathbb{N}} \|S^2_N\|_{\mathcal{L}_c(Y^2,Y^2)} \leq C, \] for some $C > 0$. Thus \begin{align*} \varepsilon &< \|S^2_{N} T x_{N}\|_{Y^2}\\ &\leq \| S^2_{N} y\|_{Y^2} + \|S^2_{N} (Tx_{N} - y)\|_{Y^2}\\ &\leq \| S^2_{N} y\|_{Y^2} + C\|Tx_{N} - y\|_{Y^2} \end{align*} which is a contradiction, since the last term goes to zero as $N \to +\infty$. The proof of \ref{conv:2} follows from \ref{conv:1} using the fact that \[ \|TS^1_N\|_{\mathcal{L}_c(Y^1,Y^2)} = \| (S^1_N)^* T^*\|_{\mathcal{L}_c(Y^2,Y^1)}, \] the compactness of $T^*$ and that $(S^1_N)^* \to 0$ strongly. \end{proof} \section{Reconstruction algorithm}\label{sec:rec} The Lipschitz stability estimates presented in Theorem~\ref{theo:main} and Corollary~\ref{cor:main} can be used to design a reconstruction algorithm. We slightly strengthen the assumptions of Theorem \ref{theo:main} (regarding the regularity of $F$ and the map $Q$), and let \begin{itemize} \item $X$ and $Y$ be Banach spaces; \item $A\subseteq X$ be an open set; \item $W\subseteq X$ be a finite-dimensional subspace; \item $F\in C^{1}(A,Y)$ be such that $F|_{W\cap A}$ and $(F|_{W\cap A})'$ are Lipschitz continuous; \item $Q\colon Y\to Y$ be a continuous finite-rank operator; \item $K\subseteq W\cap A$ be a compact set; \item and $C>0$ be a positive constant such that \begin{equation}\label{eq:rec_stab} \|x_1-x_2\|_X \leq 2 C \| Q(F(x_1))-Q(F(x_2))\|_Y, \qquad x_1,x_2 \in W\cap A. \end{equation} \end{itemize} Let $x^\dag\in K$ be the unknown signal and $y=Q(F(x^\dag))\in Y$ denote the corresponding measurements. We now derive a global reconstruction algorithm which allows for the recovery of $x^\dag$ from the knowledge of $y$. We assume here, for simplicity, that we have noiseless data at our disposal. However, we expect the extension to the noisy case to be possible by using the results of \cite{2021-mittal-giri}. \subsection{Local reconstruction}\label{sub:local} We first discuss how to reconstruct $x^\dag$ by means of an iterative method \cite{dehoop2012,dehoop2015} (see Appendix~\ref{sec:app}), provided that a good approximation $x_0$ of $x^\dag$ is known. The domain $W$ and the range of $Q$ are finite dimensional, and so they are isomorphic to finite-dimensional euclidean spaces. In particular, without loss of generality, we can assume that $X$ and $Y$ are Hilbert spaces. We wish to apply Proposition~\ref{prop:land} to $Q\circ F|_{W\cap A}$ and $K$: let $\rho,\mu,c\in (0,1)$ be given as in the statement of Proposition~\ref{prop:land}. Let $x_0\in B_X(x^\dag,\rho)\cap K$ be the initial guess of the Landweber iteration with stepsize $\mu$ \begin{equation*} x_{k+1}=x_{k}-\mu (F|_{W\cap A})'(x_{k})^{*}Q^*\left(Q(F(x_{k}))-y\right),\qquad k\in\mathbb{N}, \end{equation*} related to the minimization of \begin{equation*} \min_{x\in W\cap A} \norm{Q(F(x))-y}_Y^2. \end{equation*} By Proposition~\ref{prop:land}, $x_k\to x^\dag$. More precisely, the convergence rate is given by \[ \norm{x_k-x^\dag}_X\le \rho c^k,\qquad k\in\mathbb{N}. \] In view of the multi-level scheme of \cite{dehoop2015}, with Lipschitz stability constants $C_\alpha$ depending on each level $\alpha \in \mathbb{N}$, it is interesting to note that in this case the projection $Q_N$ would also depend on $\alpha$ through condition \eqref{cond:sn2}. Thus, the number $N = N_\alpha$ of measurements would grow at each iteration depending on the Lipschitz constant $C_\alpha$. \subsection{Getting the initial guess $x_0$} Let us now discuss how to find the initial guess $x_0$ for the Landweber iteration, namely an approximation of $x^\dag$ so that $\|x_0-x^\dag\|_X<\rho$. The forward map $F$ is Lipschitz continuous on $K$ by assumption, and so there exists $L>0$ such that \begin{equation}\label{eq:forward} \norm{F(x_1)-F(x_2)}_Y\le L\norm{x_1-x_2}_X,\qquad x_1,x_2\in K. \end{equation} Since $K$ is compact, we can find a finite lattice $\{x^{(i)}:i\in I\}\subseteq K$ such that \begin{equation}\label{eq:lattice} K\subseteq\bigcup_{i\in I} B_X\left(x^{(i)},\frac{\rho}{2L C\|Q\|_{Y\to Y}}\right), \end{equation} where $\rho>0$ is given by Proposition~\ref{prop:land} and $C$ is given by \eqref{eq:rec_stab}. \begin{lemma} Under the above assumptions, we have: \begin{enumerate}[(a)] \item\label{lattice1} there exists $i\in I$ such that \begin{equation}\label{eq:i} \bigl\lVert Q(F(x^\dag))-Q(F(x^{(i)}))\bigr\rVert_Y < \frac{\rho}{2C}; \end{equation} \item\label{lattice2} if \eqref{eq:i} holds true for some $i\in I$, then \[ \|x^{(i)}-x^\dag\|_X<\rho. \] \end{enumerate} \end{lemma} \begin{proof} \textit{Proof of \ref{lattice1}.} By \eqref{eq:lattice} there exists $i\in I$ such that $\norm{x^\dag-x^{(i)}}_X<\frac{\rho}{2L C\|Q\|_{Y\to Y}}$. Thus, \eqref{eq:i} is an immediate consequence of \eqref{eq:forward}. \textit{Proof of \ref{lattice2}.} By \eqref{eq:rec_stab} we have \begin{equation*} \|x^{(i)}-x^\dag\|_X \leq 2 C \| Q(F(x^{(i)}))-Q(F(x^\dag))\|_Y<\rho.\qedhere \end{equation*} \end{proof} Thanks to this lemma, it is enough to let the initial guess $x_0$ be chosen as one of the elements of the lattice $\{x^{(i)}\}_{i\in I}$ for which \eqref{eq:i} is satisfied. Indeed, one such element exists by part \ref{lattice1} and, by part \ref{lattice2}, we have the desired approximation \[ \|x_0-x^\dag\|_X<\rho. \] It is worth observing that this method requires the ``physical'' measurements $Q(F(x^\dag))$ and to compute $Q(F(x^{(i)}))$ for $i\in I$ ``offline'', which can be done in parallel. \subsection{Global reconstruction} These two steps may be combined to obtain a global reconstruction algorithm; see Algorithm~\ref{alg:rec}. \begin{algorithm} \caption{Reconstruction of $x^\dag$ from $Q(F(x^\dag))$} \label{alg:rec} \begin{algorithmic}[1] \STATE Input $X$, $Y$, $W$, $K$, $Q$, $F$, $Q(F(x^\dag))$, $L$, $\rho$, $\mu$, $C$ and $M$. \STATE Equip $W$ and $Q(Y)$ with equivalent euclidean scalar products. \STATE Find a finite lattice $\{x^{(i)}:i\in I\}\subseteq K$ so that \eqref{eq:lattice} is satisfied. \FOR {$i\in I$} \STATE Compute $Q(F(x^{(i)}))$. \IF{\eqref{eq:i} is satisfied} \STATE Set $x_0=x^{(i)}$. \STATE Exit \textbf{for}. \ENDIF \ENDFOR \FOR {$k=0,\ldots,M$} \STATE Set $x_{k+1}=x_{k}-\mu (F|_{W\cap A})'(x_{k})^{*}Q^*\left(Q(F(x_{k}))-y\right)$. \STATE Check the stopping criterion. \ENDFOR \STATE Output $x_{k+1}$. \end{algorithmic} \end{algorithm} \section{Examples}\label{sec:exa} In this section we show how Theorem \ref{theo:main} and Corollary \ref{cor:main} can be used to derive Lipschitz stability estimates for several inverse problems with a finite number of measurements. \subsection{Electrical impedance tomography}\label{sub:eit} Consider a bounded Lipschitz domain $\Omega \subseteq \mathbb{R}^d$, with $d\ge 2$, equipped with an electrical conductivity $\sigma \in L_+^{\infty}(\Omega)$, where \[ L_+^{\infty}(\Omega):=\{f\in L^\infty(\Omega):f \ge \lambda \text{ a.e.\ in $\Omega$, for some $\lambda>0$}\}. \] The corresponding Neumann-to-Dirichlet (ND) or current-to-voltage map is the operator $\mathcal{N}_{\sigma}\colon L_\diamond^{2}(\partial \Omega) \to L_\diamond^{2}(\partial \Omega)$, defined by \begin{equation} \mathcal{N}_{\sigma}(g) = u^g_\sigma|_{\partial \Omega}, \end{equation} where $L^{2}_\diamond(\partial \Omega) = \{ f \in L^2(\partial \Omega) : \int_{\partial \Omega} f\, ds = 0\}$ and $u^g_\sigma$ is the unique $H^1(\Omega)$-weak solution of the Neumann problem for the conductivity equation \begin{equation}\label{schr} \left\{ \begin{array}{ll} -\nabla \cdot (\sigma \nabla u^g_\sigma) = 0 \quad &\text{in } \Omega,\\ \sigma \displaystyle \frac{\partial u^g_\sigma}{\partial \nu} =g \quad &\text{on } \partial \Omega, \end{array} \right. \end{equation} where $\nu$ is the unit outward normal to $\partial \Omega$, satisfying the normalization condition $$\int_{\partial \Omega} u^g_\sigma\, ds = 0. $$ The following inverse boundary value problem arises from this framework, see \cite{calderon1980,2002-borcea,2009-uhlmann} and references therein. \vspace*{.2cm} {\bf Inverse conductivity problem.} Given $\mathcal{N}_{\sigma}$, find $\sigma$ in $\Omega$. \vspace*{.2cm} It is well known that the knowledge of $\mathcal{N}_\sigma$ determines $\sigma$ uniquely if $d=2$ \cite{Nachman1996,astala2006} or if $\sigma$ is smooth enough \cite{Sylvester1987,haberman2015,caro2016}. The inverse problem is severely ill-posed, and only logarithmic stability holds true \cite{alessandrini1988,mandache2001,clop2010,caro2013}. In recent years several Lipschitz stability estimates have been obtained for this inverse problem under certain a priori-assumption on $\sigma$, such as for $\sigma$ piecewise constant \cite{2005-alessandrini-vessella}, piecewise linear \cite{alessandrini2017} or for $\sigma$ belonging to a finite-dimensional subspace of piecewise analytic functions \cite{Harrach_2019} (see \cite{gaburro2015,alessandrini2017u} for the anisotropic case). In all these cases, the conductivity is always assumed to lie in a certain finite-dimensional subspace $W$ of $L^\infty(\Omega)$, but the full boundary measurements are required, i.e.\ all possible combination of current/voltage data (see formula \eqref{eq:lip_eit_full} below). We now show how to derive the same estimates with finitely many measurements by applying the results of Section~\ref{sec:lip}. Further, the reconstruction algorithm of Section~\ref{sec:rec} may be used to recover the unknown conductivity. We now fix the main ingredients of the construction. Let \begin{itemize} \item $X=L^\infty(\Omega)$; \item $Y=\mathcal{L}_c(L_\diamond^{2}(\partial \Omega),L_\diamond^{2}(\partial \Omega))$; \item $A=L^\infty_+(\Omega)$; \item $F(\sigma)=\mathcal{N}_\sigma$, for $\sigma\in L^\infty_+(\Omega)$; \item $W$ be a finite-dimensional subspace of $L^\infty(\Omega)$ such that \begin{equation}\label{eq:lip_eit_full} \norm{\sigma_1-\sigma_2}_\infty \le C \norm{\mathcal{N}_{\sigma_1}-\mathcal{N}_{\sigma_2}}_{L_\diamond^{2}(\partial \Omega)\to L_\diamond^{2}(\partial \Omega)},\qquad \sigma_1,\sigma_2\in K, \end{equation} for some $C>0$, where $K=W\cap L^\infty_\lambda(\Omega)$ and \[ L^\infty_\lambda(\Omega)=\{f\in L^\infty_+(\Omega):\lambda^{-1}\le f\le\lambda\text{ a.e.\ in $\Omega$}\} \] for some $\lambda>0$ fixed a priori; \item $P_N\colon L_\diamond^{2}(\partial \Omega)\to L_\diamond^{2}(\partial \Omega)$ be bounded linear maps, $N\in \mathbb{N}$, such that $P_N=P_N^*$ and $P_N\to I_{L_\diamond^{2}(\partial \Omega)}$ strongly as $N\to+\infty$ (as, e.g., in Example~\ref{ex:hil}); \item and $Q_N y = P_NyP_N$ for $y\in Y$, as in Example~\ref{ex:gal}. \end{itemize} Under these assumptions, we have the following Lipschitz stability estimate with a finite number of measurements. This result extends \cite{Harrach_2019} to any subspace $W$ yielding \eqref{eq:lip_eit_full} and, in addition, it provides a constructive way to determine the parameter $N$. \begin{theorem}\label{thm:eit} Under the above assumptions, there exists $N \in \mathbb{N}$ such that \begin{equation}\label{eq:lip_eit} \norm{\sigma_1-\sigma_2}_\infty \le 2C\, \norm{P_N\mathcal{N}_{\sigma_1}P_N-P_N\mathcal{N}_{\sigma_2}P_N}_{L_\diamond^{2}(\partial \Omega)\to L_\diamond^{2}(\partial \Omega)},\qquad \sigma_1,\sigma_2\in K, \end{equation} where $C$ is given in \eqref{eq:lip_eit_full}. The parameter $N$ can be chosen such that \begin{equation}\label{eq:eit_NC} \norm{J(I_{L^2_\diamond(\partial\Omega)}-P_N)}_{L^2_\diamond(\partial\Omega)\to H^{-\frac12}_\diamond(\partial\Omega)}\le\frac{c(\Omega,\lambda)p}{C}, \end{equation} where $c(\Omega,\lambda)$ is a constant depending only on $\Omega$ and $\lambda$, $J\colon L^2_\diamond(\partial\Omega)\to H^{-\frac12}_\diamond(\partial\Omega)$ is the canonical immersion, $H^{-1/2}_\diamond(\partial \Omega) = \{ f \in H^{-1/2}(\partial \Omega) : \int_{\partial \Omega} f\, ds = 0\}$, and $p=\sup_{N} \norm{P_N}_{L_\diamond^{2}(\partial \Omega)\to L_\diamond^{2}(\partial \Omega)}$. \end{theorem} \begin{remark}\label{rem:finite} It is worth analyzing the right hand side of \eqref{eq:lip_eit} in order to understand why it represents a finite number of measurements if the maps $P_N$ are properly chosen. Let $\{e_n\}_{n\in\mathbb{N}}$ be an ONB of $L_\diamond^{2}(\partial \Omega)$ and let $P_N$ be the orthogonal projection onto $\operatorname{span}\{e_1,\dots,e_N\}$ (similarly, we could also consider projections onto the $N$-th subspace of an exhaustive chain, as in Example~\ref{ex:hil}). In this case, we clearly have $p=1$, $P_N=P_N^*$ and that $P_N\to I_{L_\diamond^{2}(\partial \Omega)}$ strongly as $N\to+\infty$. Writing $g=\sum_{m=1}^{+\infty} g_m e_m$, we have \begin{equation}\label{eq:spectral} P_N \mathcal{N}_\sigma P_N g = \sum_{n=1}^N \langle \mathcal{N}_\sigma P_N g,e_n\rangle_{L_\diamond^{2}(\partial \Omega)} e_n = \sum_{m,n=1}^N \langle \mathcal{N}_\sigma e_m,e_n\rangle_{L_\diamond^{2}(\partial \Omega)} g_m e_n. \end{equation} Let $M_\sigma\in\mathbb{R}^{N\times N}$ be the matrix defined by $(M_\sigma)_{m,n}=\langle \mathcal{N}_\sigma e_m,e_n\rangle_{L_\diamond^{2}(\partial \Omega)}$: observe that this can be obtained by applying only the $N$ currents $e_1,\dots,e_N$ and measuring the corresponding voltages only up to frequency/scale $N$. By \eqref{eq:spectral}, estimate \eqref{eq:lip_eit} becomes \begin{equation*} \norm{\sigma_1-\sigma_2}_\infty \le 2C\, \norm{M_{\sigma_1}-M_{\sigma_2}}_{2},\qquad \sigma_1,\sigma_2\in K, \end{equation*} where $\norm{M}_2$ denotes the spectral norm of the matrix $M\in\mathbb{R}^{N\times N}$. In other words, we have a Lipschitz stability estimates with $N^2$ scalar measurements. \end{remark} Let us now comment on how large the parameter $N$ has to be chosen. \begin{remark} The parameter $N$ is given explicitly as a function of $C$ and $p$ in \eqref{eq:eit_NC}, up to a constant depending only on $\Omega$ and $\lambda$. Further, upper bounds on $C$ in \eqref{eq:lip_eit_full} depending on the dimension of $W$ are known in some particular cases, and so it is possible to give the number of measurements $N$ as a function of $\dim W$. For example, with piecewise constant conductivities, we have that $C$ depends exponentially on $\dim W$ \cite{rondi2006}. Note that the norm $\norm{J(I_{L^2_\diamond(\partial\Omega)}-P_N)}_{L^2_\diamond(\partial\Omega)\to H^{-1/2}_\diamond(\partial\Omega)}$ depends exclusively on the domain $\Omega$, and can be explicitly estimated in some particular cases. In the following example, we consider the case when $\Omega$ is the unit ball in two dimensions and $P_N$ is the low-pass filter up to the frequency $N$. \end{remark} \begin{example} Take $d=2$ and $\Omega=B(0,1)$. Parametrizing the boundary $\partial\Omega$ with the arc-length parameter $\theta$, for $s\in\{-\frac12,0\}$, using Fourier series we can write \[ H^s_\diamond(\partial\Omega)=\Bigl\{\theta\in [0,2\pi)\mapsto g (\theta)=\sum_{n=1}^{+\infty} a_n \cos(n\theta)+b_n\sin(n\theta):\norm{g}_{H^s_\diamond(\partial\Omega)}<+\infty\Bigr\} \] where the norm is given by $ \norm{g}_{H^s_\diamond(\partial\Omega)}^2=\sum_{n=1}^{+\infty} n^{2s} (a_n^2+b_n^2). $ Define the projections $P_N\colon L^2_\diamond(\partial\Omega)\to L^2_\diamond(\partial\Omega)$ as \[ (P_N g)(\theta)=\sum_{n=1}^{N} a_n \cos(n\theta)+b_n\sin(n\theta). \] We clearly have that $P_N\to I_{L^2_\diamond(\partial\Omega)}$ strongly and that $\norm{P_N}_{L^2_\diamond(\partial\Omega)\to L^2_\diamond(\partial\Omega)}=1$ for every $N$, so that $p=1$. This is substantially in the same framework described in Remark~\ref{rem:finite}, the only difference being that the elements of the basis are considered in pairs. Thus, the measures here corresponds to $2N$ sinusoidal input currents and the related voltages measured up to frequency $N$. Thanks to the Nyquist-Shannon sampling theorem, the voltages may be measured only at a finite number of locations on $\partial\Omega$. Observing that $(I_{L^2_\diamond(\partial\Omega)}-P_N)g=\sum_{n=N+1}^{+\infty} a_n \cos(n\cdot)+b_n\sin(n\cdot)$, we readily derive \[ \norm{J(I_{L^2_\diamond(\partial\Omega)}-P_N)}^2_{L^2_\diamond(\partial\Omega)\to H^{-\frac12}_\diamond(\partial\Omega)} = \sup_{\norm{g}_{L^2_\diamond(\partial\Omega)}=1} \sum_{n=N+1}^{+\infty} \frac{a_n^2+b_n^2}{n}\le \frac{1}{N+1}. \] This implies that the parameter $N$ (corresponding to $2N$ input currents) in order to have Lipschitz stability needs to satisfy \[ N \ge c(\Omega,\lambda) C^2, \] and is therefore quadratic in the Lipschitz constant $C$. If $C$ depends exponentially on $\dim W$, this gives an exponential dependence of $N$ on $\dim W$. It is worth observing that for the Gel'fand-Calder\'on problem for the Schr\"odinger equation, one has a polynomial dependence if complex geometrical optics solutions (depending on the unknown) are used \cite{alberti2018}. \end{example} Let us now prove Theorem~\ref{thm:eit}. \begin{proof} In the proof, the symbol $a\lesssim b$ will denote $a\le c\, b$, for some positive constant $c$ depending only on $\Omega$ and $\lambda$. By using the variational formulation of \eqref{schr}, it is easy to see \cite{Lechleiter_2008} that $\mathcal{N} \colon L^\infty_+(\Omega)\to \mathcal{L}_c(L_\diamond^{2}(\partial \Omega),L_\diamond^{2}(\partial \Omega))$ is Fr\'echet differentiable and that its Fr\'echet derivative in $\sigma\in L^\infty_+(\Omega)$ in the direction $\tau\in L^\infty(\Omega)$ is given by \[ \langle (\mathcal{N}_\sigma'\tau)g,h\rangle_{L_\diamond^{2}(\partial \Omega)} = \int_\Omega \tau \nabla u^g_\sigma\cdot \nabla u^h_\sigma\,dx,\qquad g,h\in L_\diamond^{2}(\partial \Omega). \] Therefore, using the well-posedness of \eqref{schr}, namely $\norm{\nabla u^g_\sigma}_{L^2(\Omega)}\lesssim \|J g\|_{H_\diamond^{-1/2}(\partial \Omega)}$, for $\tau\in L^\infty(\Omega)$ such that $\norm{\tau}_\infty\le 1$ we have \begin{equation*} \begin{split} \norm{(\mathcal{N}_\sigma'\tau)g}_{L_\diamond^{2}(\partial \Omega)}&=\sup_{\substack{h\in L_\diamond^{2}(\partial \Omega)\\ \|h\|_{L_\diamond^{2}(\partial \Omega)}=1}} |\langle (\mathcal{N}_\sigma'\tau)g,h\rangle_{L_\diamond^{2}(\partial \Omega)} |\\ &=\sup_{\|h\|_{L_\diamond^{2}(\partial \Omega)}=1} \left| \int_\Omega \tau \nabla u^g_\sigma\cdot \nabla u^h_\sigma\,dx \right|\\ &\le \sup_{\|h\|_{L_\diamond^{2}(\partial \Omega)}=1} \norm{\nabla u^g_\sigma}_{L^{2}(\Omega)} \norm{\nabla u^h_\sigma}_{L^{2}(\Omega)} \\ &\lesssim \|Jg\|_{H_\diamond^{-1/2}(\partial \Omega)}. \end{split} \end{equation*} In particular, for $g\in L_\diamond^{2}(\partial \Omega)$ with $\norm{g}_{L_\diamond^{2}(\partial \Omega)}=1$ we have \begin{equation}\label{eq:step1} \norm{(\mathcal{N}_\sigma'\tau)(I-P_N) g}_{L_\diamond^{2}(\partial \Omega)}\lesssim \|J(I-P_N) g\|_{H_\diamond^{-1/2}(\partial \Omega)}\le \delta_N, \end{equation} where $\delta_N=\norm{J(I-P_N)}_{L^2_\diamond(\partial\Omega)\to H^{-\frac12}_\diamond(\partial\Omega)}$ and $I=I_{L^2_\diamond(\partial\Omega)}$. Arguing in a similar way, using that $I-P_N$ is self-adjoint we obtain \begin{equation}\label{eq:step2} \norm{(I-P_N)(\mathcal{N}_\sigma'\tau) g}_{L_\diamond^{2}(\partial \Omega)}\lesssim \sup_{\|h\|_{L_\diamond^{2}(\partial \Omega)}=1} \|J(I-P_N) h\|_{H_\diamond^{-1/2}(\partial \Omega)} =\delta_N. \end{equation} Recall the definition $s_N = \sup_{\xi \in K}\|R_N F'(\xi)\|_{W \to Y}$, where $R_N=I_Y-Q_N$. Arguing as in \eqref{eq:RN}, and using \eqref{eq:step1} and \eqref{eq:step2}, for $\xi\in K$ and $\tau\in W$ with $\norm{\tau}_{L^\infty(\Omega)}\le 1$ we have \[ \begin{split} \|R_N \mathcal{N}_\xi'\tau\|_{Y}&=\sup_{\norm{g}_{L^2_\diamond(\partial\Omega)}=1} \|(R_N \mathcal{N}_\xi'\tau)g\|_{L^2_\diamond(\partial\Omega)} \\ &\le \sup_{\norm{g}_{L^2_\diamond(\partial\Omega)}=1} \|(I-P_N)(\mathcal{N}_\xi'\tau)g\|_{L^2_\diamond(\partial\Omega)} + p \|(\mathcal{N}_\xi'\tau)(I-P_N)g\|_{L_\diamond^{2}(\partial \Omega)}\\ &\lesssim p\,\delta_N. \end{split} \] In particular, $s_N\lesssim p\,\delta_N$. Now recall that $\delta_N=\norm{J(I-P_N)}_{L^2_\diamond(\partial\Omega)\to H^{-\frac12}_\diamond(\partial\Omega)}$. By the Kondrachov embedding theorem, the operator $J$ is compact and so, by Lemma~\ref{lem:comp}, we have $\delta_N\to 0$. Thus, the conclusion immediately follows from Theorem~\ref{theo:main}, part \ref{cond:sn}. \end{proof} \subsubsection*{Dirichlet-to-Neumann map} The model based on the ND map is arguably more realistic in view of the applications \cite{eit-1999}. However, an alternative model for EIT considers boundary data modeled by the Dirichlet-to-Neumann (DN) map, namely the operator \begin{equation*} \Lambda_\sigma \colon H^{1/2}(\partial \Omega) \to H^{-1/2}(\partial \Omega),\qquad \Lambda_\sigma(f) = \sigma \left.\frac{\partial u^f_\sigma}{\partial \nu}\right|_{\partial \Omega}, \end{equation*} where $u^f_\sigma\in H^1(\Omega)$ is the unique solution of the Dirichlet problem for the conductivity equation \begin{equation*} \left\{ \begin{array}{ll} -\nabla \cdot (\sigma \nabla u^f_\sigma) = 0 \quad &\text{in } \Omega,\\ u^f_\sigma =f \quad &\text{on } \partial \Omega. \end{array} \right. \end{equation*} Most Lipschitz stability estimates for the inverse conductivity problem have been obtained for the DN map, i.e.\ they are of the form \begin{equation*} \|\sigma_1-\sigma_2\|_{L^\infty(\Omega)}\leq C \|\Lambda_{\sigma_1}-\Lambda_{\sigma_2}\|_{H^{1/2}(\partial \Omega) \to H^{-1/2}(\partial \Omega)}, \end{equation*} for $\sigma_1,\sigma_2$ belonging to a known finite-dimensional subspace of $L^{\infty}(\Omega)$.\smallskip Here we briefly sketch two possible approaches to extend Theorem~\ref{thm:eit} to this setting. \begin{enumerate} \item Given a Lipschitz stability estimate for the DN map, one can easily obtain the same stability (up to a slightly different constant) for the ND map. The only difference lies in the use of an integration by part (Alessadrini's identity) for the ND map instead of the usual one for the DN map. In this case, Theorem~\ref{thm:eit} applies directly. \item It is also possible to avoid changing the boundary operator, and to obtain stability with a discretization of the DN map, as a consequence of Theorem~\ref{theo:main}. The compactness of the Frech\'et derivative, required to fit in the framework discussed in Example~\ref{ex:gal}, follows by the fact that $\Lambda_{\sigma_1}-\Lambda_{\sigma_2}$ is analytic smoothing \cite{mandache2001}, provided that $\sigma_1$ and $\sigma_2$ coincide in a neighborhood of the boundary. \end{enumerate} \subsection{Inverse scattering problem} We now discuss the inverse medium problem in scattering theory \cite{2013-colton-kress}. The physical model here is \[ \left\{\begin{array}{ll}\Delta u+k^{2} n(x) u=0 \quad &\text { in } \mathbb{R}^{3}, \\ {u=u^{i}+u^{s}} &\text { in } \mathbb{R}^{3}, \end{array}\right. \] augmented with the Sommerfeld radiation condition \[ \lim _{R \rightarrow+\infty} \int_{\partial B_{R}}\left|\frac{\partial u^{s}(y) }{ \partial r}-\mathrm{i} k u^{s}(y)\right|^{2}ds(y)=0, \] where $r=|y|$, $k>0$ is the wavenumber, $n\in L^\infty(\mathbb{R}^3;\mathbb{C})$ is the complex refractive index of the medium such that $\mathrm{Im}(n)\ge 0$ in $\mathbb{R}^3$ and ${\rm supp} (1-n)\subseteq B$ for some open ball $B$ and $u^i$ is the incident field satisfying \[ \Delta u^i+k^{2} u^i=0 \quad \text { in } \mathbb{R}^{3}. \] The far-field, or scattering amplitude, is given by \begin{equation*} u_n^{\infty}(\hat{x})=\frac{1}{4 \pi} \int_{\partial B_{R}}\left(u^{s}(y) \frac{\partial e^{-i k \hat{x} \cdot y}}{\partial r}-\frac{\partial u^{s}}{\partial r}(y) e^{-i k \hat{x} \cdot y}\right) ds(y), \quad \hat{x} \in S^{2}, \end{equation*} where $S^2$ is the unit sphere in $\mathbb{R}^3$ and $R>0$ is large enough so that $\overline B \subseteq B_R$. Choosing incoming waves $u^{i}(x)=e^{\mathrm{i} k x \cdot d}$ for $d\in S^2$, let $u^\infty_n(\cdot,d)$ denote the corresponding far-field measurements, so that $u_n^\infty\in L^2(S^2\times S^2)$. The following inverse problem arises from this framework. \vspace*{.2cm} {\bf Fixed frequency inverse scattering problem.} Given $u^\infty_{n}\in L^2(S^2\times S^2)$ at fixed $k>0$, find $n$ in $B$. \vspace*{.2cm} As in the Calder\'on's problem, the stability of this inverse problem is only logarithmic in the general case \cite{1990-stefanov}, but Lipschitz estimates may be derived under a priori assumptions on $n$, and the theory developed in this paper may be applied. We now set the various objects introduced in Section~\ref{sec:lip} (following \cite{bourgeois2013}). Let \begin{itemize} \item $X=L^\infty(B;\mathbb{C})$; \item $Y=L^2(S^2\times S^2)$; \item $A=L^\infty_+(B)=\{f\in L^\infty(B;\mathbb{C}):\mathrm{Im} (n)\ge \lambda\text{ in $B$ for some $\lambda>0$}\}$; \item $F(n)=u_n^\infty$ be the far-field pattern associated to the refractive index $n$ extended by $1$ to the whole $\mathbb{R}^3$; \item $W$ be a finite-dimensional subspace of $L^\infty(B;\mathbb{C})$ and $K$ be a convex and compact subset of $W\cap A$; \item and $Q_N\colon L^2(S^2\times S^2)\to L^2(S^2\times S^2)$ be bounded linear maps, $N\in \mathbb{N}$, such that $Q_N=Q_N^*$ and $Q_N\to I_{L^2(S^2\times S^2)}$ strongly as $N\to+\infty$. \end{itemize} By using Theorem~\ref{theo:lip}, it was proven in \cite{bourgeois2013} that the inverse problem of recovering a refractive index $n$ in $K$ from its far-field pattern $u^\infty_n$ is Lipschitz stable, namely there exists $C>0$ such that \[ \left\|n_{1}-n_{2}\right\|_{L^{\infty}(B)} \leqslant C\left\|u_{n_1}^{\infty}-u_{n_2}^{\infty}\right\|_{L^{2}\left(S^{2} \times S^{2}\right)},\qquad n_1,n_2 \in K. \] This estimate still requires the knowledge of the full measurements $u^\infty_{n_i}$ in $L^2(S^2\times S^2)$. By applying Theorem~\ref{theo:main} (or directly Corollary~\ref{cor:main}), we can establish the following result. \begin{theorem}\label{thm:scattering} Under the above assumptions, there exists $N\in\mathbb{N}$ (given explicitly by \eqref{cond:sn2}) such that \begin{equation*} \left\|n_{1}-n_{2}\right\|_{L^{\infty}(B)} \leqslant 2C\left\|Q_N(u_{n_1}^{\infty})-Q_N(u_{n_2}^{\infty})\right\|_{L^{2}\left(S^{2} \times S^{2}\right)},\qquad n_1,n_2 \in K. \end{equation*} \end{theorem} Let us now show why $Q_N(u_{n_i}^{\infty})$ may be seen as finite measures. Let the maps $Q_N$ be chosen as projections onto the vector spaces generated by the first elements of an ONB of $L^2(S^2\times S^2)$, as in Example~\ref{ex:hil}. More precisely, in this case we can consider the ONB of $L^2(S^2\times S^2)$ given by the tensor products of the spherical harmonics, namely \[ \bigl\{ (\hat x,d) \mapsto Y^m_l(\hat x) \,Y^{m'}_{l'}(d): l,l'\in \mathbb{N},\, |m|\le l,\, |m'|\le l'\bigr\}, \] and let $Q_N$ be the projections onto \[ \operatorname{span} \bigl\{ (\hat x,d) \mapsto Y^m_l(\hat x) \,Y^{m'}_{l'}(d): 0\le l,l'\le N,\, |m|\le l,\, |m'|\le l'\bigr\}. \] The measurements $Q_N(u^\infty)$ are now low-frequency projections of the full far-field pattern $u^\infty$. With this choice of the maps $Q_N$, it is also possible to apply the reconstruction algorithm discussed in Section~\ref{sec:rec}, which allows for the recovery of $n$ from the measurements $Q_N(u^\infty_n)$. Furthermore, let us show how to obtain a Lipschitz stability estimate with only a finite number of directions $d$ and with measurements of the corresponding far-field patterns taken only at a finite number of locations $\hat x$ on $S^2$. \begin{theorem}\label{cor:scattering} Assume that the hypotheses of Theorem~\ref{thm:scattering} hold true. Let \[ \{\hat x_i:i\in\mathbb{N}\}\subseteq S^2,\qquad \{d_j:j\in\mathbb{N}\}\subseteq S^2, \] be two dense subsets of $S^2$ (possibly identical). There exist $N\in\mathbb{N}$ and a constant $C'>0$ such that \begin{equation*} \left\|n_{1}-n_{2}\right\|_{L^{\infty}(B)} \leqslant C'\left\|\bigl(u_{n_1}^{\infty}(\hat x_i,d_j)-u_{n_2}^{\infty}(\hat x_i,d_j)\bigr)_{i,j=1}^N\right\|_2,\qquad n_1,n_2 \in K. \end{equation*} \end{theorem} \begin{proof} We first observe that the far-field patterns are analytic functions of $\hat x$ and $d$ \cite{2011-kirsch}, and so taking pointwise evaluations is meaningful. We consider the Sobolev space $H^3(S^2\times S^2)$ \cite{2013-brauchart-etal,2020-barcelo-etal,devito-2020,li2015sampling}. Since $\dim(S^2\times S^2)=4$ and $3>\frac{4}{2}$, $H^3(S^2\times S^2)$ is continuously embedded into $C(S^2\times S^2)$, and so it is a reproducing kernel Hilbert space consisting of continuous functions. As in Example~\ref{ex:rkhs}, define \[ G_N =\operatorname{span}\{k_{(\hat x_i,d_j)}:i,j=1,\dots,N\}\subseteq H^3(S^2\times S^2), \] and let $Q_N\colon H^3(S^2\times S^2)\to H^3(S^2\times S^2)$ be the projection onto $G_N$. Arguing as in the derivation of Theorem~\ref{thm:scattering} (with $Y=H^3(S^2\times S^2)$, since $u^\infty_{n_l}\in H^3(S^2\times S^2)$), there exists $N\in\mathbb{N}$ such that \[ \left\|n_{1}-n_{2}\right\|_{L^{\infty}(B)} \le 2C\left\|Q_N(u_{n_1}^{\infty})-Q_N(u_{n_2}^{\infty})\right\|_{H^{3}\left(S^{2} \times S^{2}\right)},\qquad n_1,n_2 \in K. \] Thus, in view of \eqref{eq:stable_sampling} we obtain \[ \left\|n_{1}-n_{2}\right\|_{L^{\infty}(B)} \le C'\left\|\bigl(u_{n_1}^{\infty}(\hat x_i,d_j)-u_{n_2}^{\infty}(\hat x_i,d_j)\bigr)_{i,j=1}^N\right\|_2,\qquad n_1,n_2 \in K, \] for some $C'>0$, as desired. \end{proof} \subsection{Quantitative photoacoustic tomography (QPAT)} Let $\Omega\subseteq\mathbb{R}^d$ be a bounded domain of class $C^{1,\alpha}$ for some $\alpha\in (0,1)$ and $\mu\in L^\infty(\Omega)$ be a nonnegative function representing the optical absorption of the medium. Photoacoustic tomography (PAT) is a hybrid modality based on coupling optical and ultrasonic waves \cite{Wang1458}: a laser pulse illuminates the biological tissue under consideration, whose thermal expansion creates a ultrasonic wave that can be measured outside the medium. In the first step of photoacoustic tomography \cite{2015-kuchment-kunyansky,alberti-capdeboscq-2018}, by solving a linear (and stable) inverse source problem for the wave equation, we measure the internal optical energy \[ \mu(x) u(x),\qquad \text{a.e. }x\in \Omega, \] where the light intensity $u\in H^1(\Omega)$ solves \begin{equation}\label{eq:light} \left\{\begin{array}{ll} -\Delta u+\mu u=0 &\text{in $\Omega$,}\\ u=\varphi &\text{on $\partial\Omega$,} \end{array} \right. \end{equation} for a fixed known illumination $\varphi\in C^{1,\alpha}(\overline\Omega)$ such that $\min\varphi>0$. We have considered the diffusion approximation for light propagation with constant diffusion term. More involved models, involving a non-constant leading order term \cite{BAL-UHLMANN-2010,BAL-REN-2011} or the use of the more accurate transport equation \cite{2010-bal-jollivet-jugnon}, would complicate the analysis, but the type of results obtained would be similar: we have decided to discuss the simplest model in order to highlight the impact of the results of this paper. The second step of PAT, called quantitative, consists in the reconstruction of $\mu$ from the knowledge of the internal energy. \vspace*{.2cm} {\bf Inverse problem of QPAT.} Given $\mu u$ in $\Omega$, find $\mu$ in $\Omega$. \vspace*{.2cm} We now set the various objects introduced in Section~\ref{sec:lip}. Let \begin{itemize} \item $X=W$ be a finite-dimensional subspace of $L^\infty(\Omega)$; \item $Y=L^2(\Omega)$; \item $A=\{f\in X:\lambda^{-1}<\mu< \lambda\text{ in $\Omega$ for some $\lambda>0$}\}$; \item $F(\mu)=\mu u$, where $u\in H^1(\Omega)$ is the unique weak solution of \eqref{eq:light}; \item $K=\{f\in X:\Lambda^{-1}\le\mu\le \Lambda\text{ in $\Omega$}\}$ for some fixed $\Lambda>0$; \item and $Q_N\colon L^2(\Omega)\to L^2(\Omega)$ be bounded linear maps, $N\in \mathbb{N}$, such that $Q_N=Q_N^*$ and $Q_N\to I_{L^2(\Omega)}$ strongly as $N\to+\infty$. \end{itemize} Several Lipschitz stability estimates have been derived for PAT \cite{BAL-UHLMANN-2010,BAL-REN-2011,KS-IP-12}. For completeness, we provide a proof in the setting considered here. \begin{proposition}\label{prop:pat} There exists a constant $C>0$ depending only on $\Omega$, $W$, $\Lambda$ and $\varphi$ such that \begin{equation*} \|\mu_1-\mu_2\|_\infty\le C \|\mu_1 u_1- \mu_2 u_2\|_2,\qquad \mu_1,\mu_2\in K, \end{equation*} where $u_i\in H^1(\Omega)$ is the solution to \eqref{eq:light} with coefficient $\mu=\mu_i$. \end{proposition} \begin{remark*} As it will be clear from the proof, the dependence of $C$ on $W$ appears only to replace the $L^2$ norm of $\mu_1-\mu_2$ on the left hand side by the more natural $L^\infty$ norm. This dependence may be dropped if higher order Sobolev (or H\"older) norms are used \cite{BAL-UHLMANN-2010,BAL-REN-2011}. \end{remark*} \begin{proof} Let us denote the unique solution to \eqref{eq:light} by $u(\mu)$, so that $F(\mu)=\mu\, u(\mu)$. In the proof, by an abuse of notation, several different positive constants depending only on $\Omega$, $W$, $\Lambda$ and $\varphi$ will be denoted by the same letter $C$. We claim that there exists $C>0$ such that \begin{equation}\label{eq:claim} u(\mu) \ge C\quad\text{in}\;\Omega,\qquad \mu \in K. \end{equation} Take $\mu \in K$. By classical elliptic regularity theory (see, e.g., \cite[Theorem~8.29]{GILBARG-2001}) we have that $u(\mu)\in C^1(\overline\Omega)$ and \begin{equation}\label{eq:regularity} \|u(\mu)\|_{C^1(\overline\Omega)} \le C. \end{equation} As a consequence, since $\varphi$ is positive, there exists $\Omega'\Subset\Omega$ such that \begin{equation}\label{eq:nearboundary} u(\mu)\ge \frac{\min\varphi}{2}\quad\text{in}\;\Omega\setminus\Omega'. \end{equation} By the strong maximum principle (see, e.g., \cite[Theorem~8.19]{GILBARG-2001} applied to $-u(\mu)$) we have $u(\mu)>0$ in $\Omega$. Thus, the Harnack inequality (\cite[Theorem~8.20]{GILBARG-2001}) yields \begin{equation}\label{eq:interior} u(\mu)\ge C\quad\text{in}\;\Omega'. \end{equation} Finally, combining \eqref{eq:nearboundary} and \eqref{eq:interior} we obtain \eqref{eq:claim}. In view of \eqref{eq:light} we have that \begin{equation*} \left\{\begin{array}{ll} -\Delta (u(\mu_1)-u(\mu_2))=F(\mu_2)-F(\mu_1) &\text{in $\Omega$,}\\ u(\mu_1)-u(\mu_2)=0 &\text{on $\partial\Omega$.} \end{array} \right. \end{equation*} Thus, standard energy estimates for the Poisson equation give \begin{equation}\label{eq:poisson} \|u(\mu_1)-u(\mu_2)\|_2\le C \|F(\mu_1)-F(\mu_2)\|_2,\qquad \mu_1,\mu_2\in K. \end{equation} Let us now show the Lipschitz stability estimate of the statement. Using the identity \[ \mu_1-\mu_2=\frac{F(\mu_1)-F(\mu_2)}{u(\mu_1)} +F(\mu_2)\frac{u(\mu_2)-u(\mu_1)}{u(\mu_1)u(\mu_2)},\qquad\mu_1,\mu_2\in K, \] thanks to \eqref{eq:claim}, \eqref{eq:regularity} and \eqref{eq:poisson} we readily derive for $\mu_1,\mu_2\in K$ \begin{equation*} \begin{split} \norm{\mu_1-\mu_2}_2&\le \frac{\|F(\mu_1)-F(\mu_2)\|_2}{\inf u(\mu_1)} +\norm{F(\mu_2)}_\infty \frac{\|u(\mu_1)-u(\mu_2)\|_2}{\inf u(\mu_1)\,\inf u(\mu_2)}\\ &\le C \|F(\mu_1)-F(\mu_2)\|_2. \end{split} \end{equation*} Finally, the $L^2$ norm of $\mu_1-\mu_2$ may be replaced by the $L^\infty$ norm because the space $W$ is finite dimensional and all norms are equivalent. \end{proof} Note that the map $F$ is certainly Fr\'echet differentiable because it is in fact analytic (the map $\mu\in A\mapsto u(\mu)\in Y$ is analytic). Therefore, it is possible to apply Theorem~\ref{theo:main} to this inverse problem and obtain a Lipschitz stability estimate with finite-dimensional measurements. \begin{theorem} Under the above assumptions, there exists $N\in\mathbb{N}$ (given explicitly by \eqref{cond:sn2}) such that \begin{equation} \|\mu_1-\mu_2\|_\infty\le 2C \|Q_N(\mu_1 u_1)-Q_N(\mu_2 u_2)\|_2,\qquad \mu_1,\mu_2\in K, \end{equation} where $u_i\in H^1(\Omega)$ is the solution to \eqref{eq:light} with coefficient $\mu=\mu_i$. \end{theorem} As in the previous examples, the projections $Q_N$ may be chosen as low-pass filters. The reconstruction algorithm discussed in Section~\ref{sec:rec} may be used to recover the unknown $\mu$ from finite measurements. We considered PAT as a key example, but the analysis presented here may be easily generalized to several other hybrid imaging inverse problems with internal data \cite{B-IO-12,alberti-capdeboscq-2018}, such as thermo-acoustic tomography, dynamic elastography and acousto-electric tomography. \section{Conclusion}\label{sec:conclusions} In this paper, we have discussed a general framework to derive Lipschitz stability estimates for nonlinear inverse problems with finite measurements, under the assumption that the unknown belongs to a finite-dimensional space. A global reconstruction algorithm was also derived, based on a nonlinear Landweber iteration. We then applied the general theory to Calder\'on's inverse problem for EIT, to inverse scattering and to quantitative photoacoustic tomography. Let us discuss a few research directions motivated by the findings of this work. \begin{itemize} \item The assumption of the finite dimensionality of $W$ is not needed in Theorem~\ref{theo:main}, part \ref{cond:sn}. Thus, it would be interesting to investigate whether the condition $s_N\le \frac{1}{2C}$ may be derived in some cases with the only compactness assumption on $K$. The latter could follow from a more general argument based on compact embeddings. \item The theory of compressed sensing (CS) allows for the recovery of sparse signals from a number of (linear) measurements that is proportional to the sparsity (up to log factors), under suitable incoherence assumptions. The classical theory, working for a unitary forward map $F$, was recently extended to arbitrary linear maps with bounded inverse \cite{alberti2017infinite}. It would be interesting to apply CS to the general nonlinear setup presented in this paper by using the results of \cite{grasmair-etal-2011,grasmair-etal-2011b}. \item The numerical implementation of the reconstruction algorithm constructed in Section~\ref{sec:rec} would allow for testing its efficiency and applicability. \item In this work, we have limited ourselves to considering three nonlinear inverse problems as proofs of concept, but it would be interesting to apply the theory to other examples, for instance where the unknown is supposed to have a particular shape (e.g.\ a polygon) with unknown location \cite{beretta2015,beretta2019} or for inverse problems with fractional operators \cite{ruland2018,cekic2018calder}. \item In Theorem~\ref{theo:main}, the dependence on the mismodeling error in the stability estimate is not sharp, as discussed in Remark~\ref{rem:2}. A very challenging question is then to improve upon this dependence, without losing the generality of our approach. \end{itemize} \bibliographystyle{abbrvurl}
\section{Introduction} \label{introduction} A {\em M\"obius structure} $M$ on a set $X$ is a class of M\"obius equivalent semi-metrics on $X$, where two semi-metrics are equivalent if and only if they have the same cross-ratios on every 4-tuple of points in $X$. A M\"obius structure usually lives on the boundary at infinity of a hyperbolic space. The {\em inverse problem} of M\"obius geometry asks to describe M\"obius structures which are induced by hyperbolic spaces. We are interested in the inverse problem for M\"obius structures on the circle $X=S^1$. A natural condition for a such structure $M$ is formulated in \cite{Bu18} as {\em monotonicity axiom} (M) given a 4-tuple $q=(x,y,z,u)\in X^4$ such that the pairs $(x,y)$, $(z,u)$ separate each other, we have $$|xy|\cdot|zu|>\max\{|xz|\cdot|yu|,|xu|\cdot|yz|\}$$ for some and hence any semi-metric from $M$. If we take one of the points of $q=(x,y,z,u)$, for example $u$, as infinitely remote for a semi-metric $|\cdot,\cdot|_u\in M$, then mononicity axiom tells us that $$|xy|_u>\max\{|xz|_u,|yz|_u\},$$ where $z$ is between $x$, $y$ on $X_u=X\setminus\{u\}=\mathbb{R}$. In particular, if a segment $xz\subset X_u$ is contained in a segment $xy\subset X_u$, then $|xz|_u<|xy|_u$. Surprisingly, exactly this condition defines {\em self-contracted} curves in metric spaces. Self-contracted curves usually appear as gradient curves of convex functions, and they play an important role in a number of questions. Basic problem for a self-contrated curve is to establish its rectifiability, see \cite{DDDL}, \cite{DDDR}, \cite{DLS}, \cite{LOZ}, \cite{Le}, \cite{Ohta}, \cite{ST}, \cite{Zo18}. We consider the set $\operatorname{Hm}$ of unordered harmonic pairs of unordered pairs of points in $X$ as a required filling of a M\"obius structure $M$ in the inverse problem of M\"obius geometry. Axiom~(M) allows to uniquely define a line $\operatorname{h}_a\subset\operatorname{Hm}$ as the family of harmonic 4-tuples with a common axis, which is a pair of distinct points $a=(x,y)$ on $X$. Every harmonic pair $q=(a,b)\in\operatorname{Hm}$ has two axes. Thus moving along of a line, we have a possibility to change the axis of the line at any moment and move along the line determined by the other axis. This leads to the notion of zig-zag path. A {\em zig-zag} path, or zz-path, $S\subset\operatorname{Hm}$ is defined as finite sequence of segments $\sigma_i$ on lines in $\operatorname{Hm}$, where consecutive segments $\sigma_i$, $\sigma_{i+1}$ have a common end $q=\sigma_i\cap\sigma_{i+1}\in\operatorname{Hm}$ with axes determined by $\sigma_i$, $\sigma_{i+1}$. We define a distance $\delta$ on $\operatorname{Hm}$ as $$\delta(q,q')=\inf_S|S|,$$ where the infimum is taken over all zz-paths $S\subset\operatorname{Hm}$ from $q$ to $q'$, and $|S|$ is the length of $S$ defined as the sum of the lengths of its sides. Its turns out that $\delta$ is finite and satisfies all the triangle axioms except maybe the positivity one. We replace axiom~(M) by a slightly stonger axiom~(M($\alpha$)). (M($\alpha$)) Fix $0<\alpha<1$. Given a 4-tuple $q=(x,y,z,u)\in X^4$ such that the pairs $(x,y)$, $(z,u)$ separate each other, we have $$|xy|\cdot|zu|\ge\max\{|xz|\cdot|yu|+\alpha|xu|\cdot|yz|,\alpha|xz|\cdot|yu|+|xu|\cdot|yz|\}$$ for some and hence any semi-metric from $M$. This is a M\"obius invariant version of the SRA-free condition introduced by Zolotov in \cite{Zo18}. Now, our main result is as follows. \begin{thm}\label{thm:main} Let $M$ be a ptolemaic M\"obius structure of the circle $X$ which satisfies axiom~(M($\alpha$)) for some $0<\alpha<1$, such that the $M$-topology is the topology of $S^1$. Then the distance $\delta$ on $\operatorname{Hm}$ is nondegenerate, $\delta(q,q')\neq 0$ if and only if $q\neq q'$, the $\delta$-metric topology on $\operatorname{Hm}$ coincides with one induced from $X^4$, and the metric space $(\operatorname{Hm},\delta)$ is complete. In particual, $(\operatorname{Hm},\delta)$ is a proper geodesic metric space. \end{thm} \section{M\"obius structures} \label{sect:moebius_structures} \subsection{Basic notions} \label{subsect:basics} Let $X$ be a set. A 4-tuple $q=(x,y,z,u)\in X^4$ is said to be {\em admissible} if no entry occurs three or four times in $q$. A 4-tuple $q$ is {\em nondegenerate}, if all its entries are pairwise distinct. Let $\mathcal{P}_4=\mathcal{P}_4(X)$ be the set of all ordered admissible 4-tuples of $X$, $\operatorname{reg}\mathcal{P}_4\subset\mathcal{P}_4$ the set of nondegenerate 4-tuples. A function $d:X^2\to\widehat\mathbb{R}=\mathbb{R}\cup\{\infty\}$ is said to be a {\em semi-metric}, if it is symmetric, $d(x,y)=d(y,x)$ for each $x$, $y\in X$, positive outside the diagonal, vanishes on the diagonal and there is at most one infinitely remote point $\omega\in X$ for $d$, i.e. such that $d(x,\omega)=\infty$ for some $x\in X\setminus\{\omega\}$. Moreover, we require that if $\omega\in X$ is such a point, then $d(x,\omega)=\infty$ for all $x\in X$, $x\neq\omega$. A metric is a semi-metric that satisfies the triangle inequality. A {\em M\"obius structure} $M$ on $X$ is a class of M\"obius equivalent semi-metrics on $X$, where two semi-metrics are equivalent if and only if they have the same cross-ratios on every $q\in\operatorname{reg}\mathcal{P}_4$. Given $\omega\in X$, there is a semi-metric $d_\omega\in M$ with infinitely remote point $\omega$. It can be obtained from any semi-metric $d\in M$ for which $\omega$ is not infinitely remote by a {\em metric inversion}, \begin{equation}\label{eq:metric_inversion} d_\omega(x,y)=\frac{d(x,y)}{d(x,\omega)d(y,\omega)}. \end{equation} Such a semi-metric is unique up to a homothety, see \cite{FS13}, and we use notation $|xy|_\omega=d_\omega(x,y)$ for the distance between $x$, $y\in X$ in that semi-metric. We also use notation $X_\omega=X\setminus\{\omega\}$. Every M\"obius structure $M$ on $X$ determines the $M$-{\em topology} whose subbase is given by all open balls centered at finite points of all semi-metrics from $M$ having infinitely remote points. \begin{exa}\label{exa:canonical_moebius_circle} Our basic example is the {\em canonical} M\"obius structure $M_0$ on the circle $X=S^1$. We think of $S^1$ as the unit circle in the plane, $S^1=\set{(x,y)\in\mathbb{R}^2}{$x^2+y^2=1$}$. For $\omega=(0,1)\in X$ the stereographic projection $X_\omega\to\mathbb{R}$ identifies $X_\omega$ with real numbers $\mathbb{R}$. We let $d_\omega$ be the standard metric on $\mathbb{R}$, that is, $d_\omega(x,y)=|x-y|$ for any $x,y\in\mathbb{R}$. This generates a M\"obius structure on $X$ which is called {\em canonical}. The basic feature of the canonical M\"obius structure on $X=S^1$ is that for any 4-tuple $(\sigma,x,y,z)\subset X$ with the cyclic order $\sigma xyz$ we have $d_\sigma(x,y)+d_\sigma(y,z)=d_\sigma(x,z)$. \end{exa} \subsection{Harmonic pairs} \label{subsect:harm_pairs} From now on, we assume that $X$ is the circle, $X=S^1$. It is convenient to use unordered pairs $(x,y)\sim(y,x)$ of distinct points on $X$, and we denote their set by $\operatorname{aY}=S^1\times S^1\setminus\Delta/\sim$, where $\Delta=\set{(x,x)}{$x\in S^1$}$ is the diagonal. A pair $q=(a,b)\in\operatorname{aY}\times\operatorname{aY}$ is harmonic if \begin{equation}\label{eq:harmonic} |xz|\cdot|yu|=|xu|\cdot|yz| \end{equation} for some and hence any semi-metric of the M\"obius structure, where $a=(x,y)$, $b=(z,u)$. The pair $a$ is called the {\em left} axis of $q$, while $b$ the {\em right} axis. We denote by $\operatorname{Harm}$ the set of harmonic pairs, $\operatorname{Harm}\subset\operatorname{aY}\times\operatorname{aY}$, of the given M\"obius structure. There is a canonical involution $j:\operatorname{Harm}\to\operatorname{Harm}$ without fixed points given by $j(a,b)=(b,a)$. Note that $j$ permutes left and right axes. The quotient space we denote by $\operatorname{Hm}:=\operatorname{Harm}/j$. In other words, $\operatorname{Hm}$ is the set of unordered harmonic pairs of unordered pairs of points in $X$. \subsection{Axioms} \label{subsect:axioms} We list a set of axioms for a M\"obius structure $M$ on the circle $X=S^1$. \begin{itemize} \item [(T)] Topology: $M$-topology on $X$ is that of $S^1$. \item[(M($\alpha$))] Monotonicity: Fix $0<\alpha<1$. Given a 4-tuple $q=(x,y,z,u)\in X^4$ such that the pairs $(x,y)$, $(z,u)$ separate each other, we have $$|xy|\cdot|zu|\ge\max\{|xz|\cdot|yu|+\alpha|xu|\cdot|yz|,\alpha|xz|\cdot|yu|+|xu|\cdot|yz|\}$$ for some and hence any semi-metric from $M$. \item[(P)] Ptolemy: for every 4-tuple $q=(x,y,z,u)\in X^4$ we have $$|xy|\cdot|zu|\le |xz|\cdot|yu|+|xu|\cdot|yz|$$ for some and hence any semi-metric from $M$. \end{itemize} A M\"obius structure $M$ on the circle $X$ that satisfies axioms T, M($\alpha$), P is said to be {\em strictly monotone}. \begin{rem}\label{rem:zolotov} Axiom~M($\alpha$) is motivated by the work \cite{Zo18} of V.~Zolotov. \end{rem} \begin{rem}\label{rem:axiom_Q} Axiom~P is satisfied, for example, for the M\"obius structure on the boundary at infinity of any $\operatorname{CAT}(-1)$ space, see \cite{FS12}. \end{rem} \begin{rem}\label{rem:canonical_axioms} The canonical M\"obius structure $M_0$ on $X=S^1$ clearly satisfies Axioms~T, M($\alpha$), P. \end{rem} We derive some immediate corollaries from the axioms. It follows from P that any semi-metric from $M$ with an infinitely remote point is a metric, i.e. it satisfies the triange inequality. \begin{cor}\label{cor:completeness} For every $\omega\in X$ the metric space $X_\omega$ is complete. \end{cor} \begin{proof} By Axiom~(T), $X_\omega$ is homeomorphic to $\mathbb{R}$. Since $\omega$ is infinitely remote, the space $X_\omega$ is unbounded in the respective metric. These two properties together easily imply that $X_\omega$ is complete. \end{proof} A choice of $\omega\in X$ uniquely determines the interval $xy\subset X_\omega$ for any distinct $x$, $y\in X$ different from $\omega$ as the arc in $X$ with the end points $x$, $y$ that does not contain $\omega$. As an useful implication of Axiom~M($\alpha$) we have \begin{cor}\label{cor:interval_monotone} Axiom M($\alpha$) implies the following. Assume for a nondegenerate 4-tuple $q=(x,y,z,u)\in\operatorname{reg}\mathcal{P}_4$ the interval $xz\subset X_u$ is contained in $xy$, $xz\subset xy\subset X_u$. Then $|xz|_u<|xy|_u$. That is, $X_u$ is self-contraced for any $u\in X$. \end{cor} \begin{proof} By the assumption, the pairs $(x,y)$, $(z,u)$ separate each other. Hence, by Axiom~M($\alpha$) we have $|xz|_u|<|xy|_u$. \end{proof} \begin{cor}\label{cor:harm_separate} For any harmonic pair $((x,y),(z,u))\in\operatorname{Harm}$ the pairs $(x,y)$, $(z,u)\in\operatorname{aY}$ separate each other. \end{cor} \begin{proof} In the metric from $M$ with infinitely remote point $u$ we have $|xz|_u=|zy|_u$. By Corollary~\ref{cor:interval_monotone}, $z$ lies between $x$, $y$ on the line $X_u$. Hence, the pairs $(x,y)$, $(z,u)$ separate each other. \end{proof} \section{Lines and zigzag paths} \label{sect:lines_zzpath} Here we briefly recall definitions and some properties of lines and zigzag paths from \cite{Bu18}. \subsection{Lines} \label{subsect:lines} \begin{lem}\label{lem:project_point_line} Given $a\in\operatorname{aY}$ and $x\in X$, $x\notin a$, there is a uniquely determined $y\in X$ such that the pair $(a,b)$ is harmonic, $(a,b)\in\operatorname{Hm}$, where $b=(x,y)$. \end{lem} \begin{proof} Let $a=(z,u)$. We take a metric from $M$ with infinitely remote point $u$. The distance function $y\mapsto|zy|_u$ is continuous on $X_u$ (see \cite[Lemma~4.1]{Bu17}), thus there is $y\in X_u$ with $|xz|_u=|zy|_u$. Hence the pair $(a,b)$, where $b=(x,y)$ is harmonic. By Corollary~\ref{cor:interval_monotone}, the point $y$ is uniquely determined. \end{proof} We denote by $\rho_a(x)=y$ the point $y$ from Lemma~\ref{lem:project_point_line}. The {\em line} with axis $a\in\operatorname{aY}$ is defined as the set $\operatorname{h}_a\subset\operatorname{Hm}$ which consists of all pairs $q=(a,b)$ with $b=(x,\rho_a(x))$ where $x$ run over an arc in $X$ determined by $a$. This is well defined because $\rho_a:X\to X$ is involutive, $\rho_a^2=\operatorname{id}$ (we extend $\rho_a$ to $a=(z,u)$ by $\rho_a(z)=z$, $\rho_a(u)=u$). In this case, we use notation $x_a:=b$ and say that $x_a\in\operatorname{h}_a$ is the projection of $x$ to the line $\operatorname{h}_a$. For more about lines see \cite{Bu18}. In particual, every line is homeomorphic to the real line $\mathbb{R}$, different points on a line are in {\em strong causal relation}, that is, either of them lies on an open arc in $X$ determined by the other one, and vice versa, given $b$, $b'\in\operatorname{aY}$ in strong causal relation, there exists a unique line $\operatorname{h}_a$ through $b$, $b'$, see \cite[Lemma~3.2, Lemma~4.2]{Bu18}. In this case, the pair $a\in\operatorname{aY}$ (or the line $\operatorname{h}_a$) is called the {\em common perpendicular} to $b$, $b'$. The {\em segment} $qq'$ of a line $\operatorname{h}_a$ with $q=(a,b)$, $q'=(a,b')\in\operatorname{h}_a$ is defined as the union of $q$, $q'$ and all $q''=(a,b'')\in\operatorname{h}_a$ such that $b''$ separates $b$, $b'$. The last means that $b$ and $b'$ lie on different open arcs in $X$ determined by $b''$. The points $q$, $q'$ are the {\em ends} of $qq'$. The segment $qq'\subset\operatorname{h}_a$ is homeomorphic to the standard segment $[0,1]$. \subsection{Distance between harmonic pairs with common axis} \label{subsect:distance_harmonic_pairs} Given two harmonic pairs $q$, $q'\in\operatorname{Hm}$ with a common axis, say $q=(a,b)$ and $q'=(a,b')$, we define {\em the distance} $|qq'|$ between them as \begin{equation}\label{eq:distance} |qq'|=\left|\ln\frac{|xz'|\cdot|yz|}{|xz|\cdot|yz'|}\right| \end{equation} for some and hence any semi-metric on $X$ from $M$, where $a=(x,y)$, $b=(z,u)$, $b'=(z',u')\in\operatorname{aY}$. One easily checks that every line $\operatorname{h}_a\subset\operatorname{Hm}$ with this distance is isometric to the real line $\mathbb{R}$ with the standard distance. \subsection{Width of a strip} \label{subsect:width_strip} We say that a 4-tuple $p=(a,b)\in X^4$ with $a=(x,y)$, $b=(u,z)$ is a {\em strip} if $a$, $b$ are in the strong causal relation and the pairs $(x,z)$, $(u,y)$ separate each other. Note that $p'=(b,c)\in X^4$ with $b=(x,u)$, $c=(y,z)$ is also a strip based on the same 4-tuple $(x,y,u,z)\in X^4$. Since the pairs $a$, $b$ are in the strong causal relation, there is uniquely determined common perpendicular $s=(v,w)$ to $a$, $b$. We assume that $w$ lies on the arc in $X$ determined by $b$ which does not contain $a$. We denote $g=|vx|_w$, $h=|vu|_w$. Then $|vy|_w=g$, $|vz|_w=h$ because $s$ is the common perpendicular to $a$, $b$, and $h>g$ by mononicity and the choice of the infinitely remote point $w$. We use notation $p=(a,b,s)$ for a strip with common perpendicular $s$. Note that $s$ is uniquely determined by $(a,b)$, and we add $s$ to fix notation. A strip $p=(a,b,s)$ is said to be {\em narrow} if $|xu|_w$, $|yz|_w\le g=|vx|_w=|vy|_w$. We define the width of the strip $p$ as the length $l=\operatorname{width}(p)$ of the segment $x_su_s=y_sz_s\subset\operatorname{h}_s$ on the line $\operatorname{h}_s$. \begin{lem}\label{lem:width_strip_above} For any strip $p=(a,b,s)$ we have $$\operatorname{width}(p)\le 2\sqrt{\frac{|xu||yz|}{|xy||zu|}},$$ where $a=(x,y)$, $b=(u,z)$. \end{lem} \begin{lem}\label{lem:width_strip_below} Let $p=(a,b,s)$ be a strip with $a=(x,y)$, $b=(u,z)$, $s=(v,w)$. Then for the width $l=\operatorname{width}(p)$ of $p$ we have $$2\sinh(l/2)\ge\alpha(1+\alpha)\sqrt{\frac{|xu||yz|}{|xy||uz|}}$$ and $$|xu|_w,|yz|_w\le\frac{e^l-1}{\alpha(1+\alpha)}|xy|_w,\quad \alpha\le\frac{|xu|_w}{|yz|_w}\le\frac{1}{\alpha},$$ where $\alpha$ is the constant from Axiom M($\alpha$). \end{lem} \begin{proof}[Proof of Lemmas~\ref{lem:width_strip_above} and \ref{lem:width_strip_below}] In the metric $|\ |_w$ on $X_w$ with infinitely remote point $w$ we have $|xu|_w$, $|yz|_w\ge h-g$ and also $|xy|_w\le 2g$, $|uz|_w\le 2h$ by the triange inequality. Thus $$\frac{|xu|_w|yz|_w}{|xy|_w|uz|_w}\ge\frac{(h-g)^2}{4gh}=\sinh^2(l/2)\ge (l/2)^2,$$ where $l=\operatorname{width}(p)$, because $e^l=h/g$, see Eq.~(\ref{eq:distance}). This proves Lemma~\ref{lem:width_strip_above}. The pairs $(v,z)$ and $(w,y)$ separate each other. Thus by Axiom M($\alpha$) we have $$|vz||wy|\ge\max\{|yz||vw|+\alpha|zw||vy|,\alpha|yz||vw|+|zw||vy|\}$$ in any semi-metric of the M\"obius structure M. Taking the metric with infinitely remote point $w$, we obtain \begin{equation}\label{eq:axiom_estimate} h\ge\max\{|yz|_w+\alpha g,\alpha|yz|_w+g\}. \end{equation} The inequality (\ref{eq:axiom_estimate}) implies $\alpha|yz|_w\le h-g$. Similarly $\alpha|ux|_w\le h-g$. Again, by Axiom~M($\alpha$), $|xy|_w\ge|xv|_w+\alpha|vy|_w=(1+\alpha)g$ and similarly $|uz|_w\ge(1+\alpha)h$. Thus $$\frac{|yz||xu|}{|xy||uz|}\le\frac{(h-g)^2}{\alpha^2(1+\alpha)^2gh}.$$ Since $e^l=h/g$, this gives $$4(\sinh l/2)^2\ge\alpha^2(1+\alpha)^2\frac{|yz||xu|}{|xy||uz|},$$ hence the first estimate of Lemma~\ref{lem:width_strip_below}. Estimates above also give $|ux|_w\le\frac{1}{\alpha}(h-g)=\frac{e^l-1}{\alpha}g=\frac{e^l-1}{\alpha(1+\alpha)}|xy|_w$ and similarly $|yz|_w\le\frac{e^l-1}{\alpha(1+\alpha)}|xy|_w$. Using the inequalities $|yz|_w$, $|xu|_w\ge h-g$ together with the previous estimates from above, we obtain the second estimate of Lemma~\ref{lem:width_strip_below}. \end{proof} \subsection{Zigzag paths} \label{subsect:zigzag_paths} Every harmonic pair $q=(a,b)\in\operatorname{Hm}$ has two axes. Thus moving along of a line, we have a possibility to change the axis of the line at any moment and move along the line determined by the other axis. This leads to the notion of zig-zag path. A {\em zig-zag} path, or zz-path, $S\subset\operatorname{Hm}$ is defined as finite (maybe empty) sequence of segments $\sigma_i$ in $\operatorname{Hm}$, where consecutive segments $\sigma_i$, $\sigma_{i+1}$ have a common end $q=\sigma_i\cap\sigma_{i+1}\in\operatorname{Hm}$ with axes determined by $\sigma_i$, $\sigma_{i+1}$. Segments $\sigma_i$ are also called {\em sides} of $S$, while a {\em vertex} of $S$ is an end of a side. Given $q$, $q'\in\operatorname{Hm}$, there is a zz-path $S$ in $\operatorname{Hm}$ with at most five sides that connects $q$ and $q'$ (see \cite[Lemma~3.3]{Bu18}). \section{Metric on $\operatorname{Hm}$} \label{sect:metric} \subsection{Distance $\delta$ on $\operatorname{Hm}$} \label{subsect:dist_de} Let $S=\{\sigma_i\}$ be a zz-path in $\operatorname{Hm}$. We define the length of $S$ as the sum $|S|=\sum_i|\sigma_i|$ of the length of its sides. Now, we define a distance $\delta$ on $\operatorname{Hm}$ by $$\delta(q,q')=\inf_S|S|,$$ where the infimum is taken over all zz-paths $S\subset\operatorname{Hm}$ from $q$ to $q'$. One easily sees that $\delta$ is a finite pseudometric on $\operatorname{Hm}$, see \cite[Proposition~6.2]{Bu18}. Now, we show that $\delta$ is a metric. \begin{lem}\label{lem:ratio_distortion} Fix a harmonic $q\in\operatorname{Hm}$, $q=(a,s)$ with $a=(x,y)$, $s=(v,w)\in\operatorname{aY}$. Let $p'=(a',b',s')$ be a strip with $a'=(x',y')$, $b'=(u',z')$, $s'=(v',w')$ such that $w$ lies on the arc in $X$ determined by $b'$ that contains $w'$. Then $$\alpha\beta\le\frac{|x'u'|_w}{|y'z'|_w}\le\frac{1}{\alpha\beta}$$ for some $\beta=\beta(p',w)<1$. If, in addition $a'$, $b'\in U_\varepsilon(a)$, $s'\in V_\varepsilon(s)$ for a sufficiently small $\varepsilon$, $0<\varepsilon<1/8$, where $U_\varepsilon(a)=\set{(x',y')\in\operatorname{aY}}{$|xx'|_w<\varepsilon,\ |yy'|_w<\varepsilon$}$, $V_\varepsilon(s)=\set{(v',w')\in\operatorname{aY}}{$|vv'|_x<\varepsilon,\ |ww'|_x<\varepsilon$}$, then $\beta\ge 1-8\varepsilon$. In this case, $$2\sinh(l'/2)\ge c\max\{|x'u'|_w,|y'z'|_w\}$$ with $c=\frac{\alpha(1+\alpha)\sqrt{\alpha}}{2}\sqrt{1-8\varepsilon}$, where $l'=\operatorname{width}(p')$. \end{lem} \begin{proof} Using the metric inversion (\ref{eq:metric_inversion}), we have $$|x'u'|_w=\frac{|x'u'|_{w'}}{|x'w|_{w'}|u'w|_{w'}}\quad\textrm{and}\quad |y'z'|_w=\frac{|y'z'|_{w'}}{|y'w|_{w'}|z'w|_{w'}}.$$ Thus $$\frac{|x'u'|_w}{|y'z'|_w}=\gamma\frac{|x'u'|_{w'}}{|y'z'|_{w'}},$$ where $$\gamma=\frac{|y'w|_{w'}|z'w|_{w'}}{|x'w|_{w'}|u'w|_{w'}}.$$ By Lemma~\ref{lem:width_strip_below} \begin{equation}\label{eq:distor_estimate} 2\sinh(l'/2)\ge\alpha(1+\alpha)\sqrt{\frac{|x'u'||y'z'|}{|x'y'||u'z'|}}\quad\textrm{and}\quad \alpha\le\frac{|x'u'|_{w'}}{|y'z'|_{w'}}\le\frac{1}{\alpha}. \end{equation} Using that $|xw|_{w'}=1/|xw'|_w$, we obtain $$\gamma=\frac{|x'w'|_w|u'w'|_w}{|y'w'|_w|z'w'|_w}.$$ If $w'=w$ then $\gamma =1$. Otherwise, consider two cases: (1) $w$ lies on the arc in $X$ between $w'$ and $z'$ that does not contain $y'$. In this case $u'w'\subset x'w'$, $y'w'\subset z'w'$, $x'w'\subset y'w'$ in $X_w$. Thus $|u'w'|_w<|x'w'|_w$, $|y'w'|_w<|z'w'|_w$, $|x'w'|_w<|y'w'|_w$ and hence $$\gamma\le\frac{|x'w'|_w^2}{|y'w'|_w^2}<1.$$ In this case, we put $\beta=\gamma$ and obtain $$\alpha\beta\le\frac{|x'u'|_w}{|y'z'|_w}\le\frac{1}{\alpha\beta}$$ because $\gamma<1/\gamma$. (2) $w$ lies on the arc in $X$ between $w'$ and $u'$ that does not contain $x'$. In this case $x'w'\subset u'w'$, $z'w'\subset y'w'$, $z'w'\subset x'w'$ in $X_w$. Thus $|u'w'|_w>|x'w'|_w$, $|z'w'|_w<|y'w'|_w$, $|x'w'|_w>|y'w'|_w$ and hence $$\gamma\ge\frac{|x'w'|_w^2}{|y'w'|_w^2}>1.$$ In this case, we put $\beta=1/\gamma$ and obtain $$\alpha\beta\le\frac{|x'u'|_w}{|y'z'|_w}\le\frac{1}{\alpha\beta}$$ because $\gamma>1/\gamma$. Finally, the condition $s'\in V_\varepsilon(s)$ implies that $|w'w|_x<\varepsilon$ and hence $|w'x|_w>1/\varepsilon$ by the metric inversion (\ref{eq:metric_inversion}). We put $t:=|w'x|_w$. The condition $a'$, $b'\in U_\varepsilon(a)$ implies $$t-\varepsilon\le |w'x'|_w, |w'u'|_w\le t+\varepsilon$$ and $$|w'y|_w-\varepsilon\le|w'y'|_w,|w'z'|_w\le |w'y|_w+\varepsilon,$$ by the triange inequality. We can assume without loss of generality that $|xy|_w=1$. Since $w'$ lies on the arc in $X$ determined by $a$ that contains $w$, we have $t-1\le|w'y|_w\le t+1$ and hence $t-1-\varepsilon\le|w'y'|_w\le t+1+\varepsilon$. Using that $t>1/\varepsilon$ we obtain $$\gamma\ge\frac{(t-\varepsilon)^2}{(t+1+\varepsilon)^2}\ge\frac{(1-\varepsilon^2)^2}{(1+\varepsilon+\varepsilon^2)^2}\ge (1-2\varepsilon)^2\ge 1-8\varepsilon$$ and similarly $$\gamma\le\frac{(t+\varepsilon)^2}{(t-1-\varepsilon)^2}\le\frac{(1+\varepsilon^2)^2}{(1-\varepsilon-\varepsilon^2)^2}\le (1+2\varepsilon)^2\le 1+8\varepsilon.$$ For the first case, $\beta=\gamma$, we take the first estimate above and obtain $\beta\ge 1-8\varepsilon$. For the second case, $\beta=1/\gamma$, we take the second estimate above and obtain $\beta\ge 1/(1+8\varepsilon)\ge 1-8\varepsilon$. The condition $a'$, $b'\in U_\varepsilon(a)$ also implies $|x'y'|_w$, $|u'z'|_w\le 1+2\varepsilon$. Using (\ref{eq:distor_estimate}), we obtain $$2\sinh(l'/2)\ge c\max\{|x'u'|_w,|y'z'|_w\}$$ with $c=\frac{\alpha(1+\alpha)\sqrt{\alpha}}{2}\sqrt{1-8\varepsilon}$. \end{proof} \begin{lem}\label{lem:zz_path_length_below} Given $\varepsilon$, $0<\varepsilon\le1/16$, there is $t=t(\varepsilon)>0$ such that for every zz-path $S$ in $\operatorname{Hm}$ with $|S|<t$ and the initial vertex $q=q_1=(a,s)$, $a=(x,y)$, $s=(v,w)\in\operatorname{aY}$, the vertices $q_i=(a_i,s_i)$, $i\ge 1$, of $S$ lie in $U_\varepsilon(a)\times V_\varepsilon(s)$, where $U_\varepsilon(a)=\set{(x',y')\in\operatorname{aY}}{$|xx'|_w<\varepsilon, |yy'|_w<\varepsilon$}$, $V_\varepsilon(s)=\set{(v',w')\in\operatorname{aY}}{$|vv'|_x<\varepsilon, |ww'|_x<\varepsilon$}$, and $$|q_iq_{i+1}|\ge c\max\{|x_ix_{i+1}|_w,|y_iy_{i+1}|_w\}$$ for every odd $i\ge 1$, where $a_i=(x_i,y_i)\in\operatorname{aY}$, $$|q_iq_{i+1}|\ge c\max\{|v_iv_{i+1}|_x,|w_iw_{i+1}|_x\}$$ for every even $i\ge 2$, where $s_i=(v_i,w_i)\in\operatorname{aY}$, and some constant $c=c(\alpha)>0$. \end{lem} \begin{proof} We put $c=\frac{\alpha(1+\alpha)\sqrt{\alpha}}{16}$ and take $t>0$ such that $\sinh(t/2)\le c\varepsilon$. Denote $s_i=(v_i,w_i)\in\operatorname{aY}$, $i\ge 1$, $s_1=s$. Assume without loss of generality that the first side $\sigma_1=q_1q_2$ of $S$ lies on the line $\operatorname{h}_{s_1}$. Then we have $s_{i+1}=s_i$ for odd $i$, and $a_{i+1}=a_i$ for even $i$. We argue by induction on the number $n$ of sides of $S$. The base of the induction: $n=1$. We have $q_1=q=(a,s)$ with $a=(x,y)$, $s=(v,w)\in\operatorname{aY}$, $q_2=(a_2,s)$ with $a_2=(x_2,y_2)$, and $s$ is the common perpendicular to the strip $p_1=(a,a_2)$. The width of $p_1$ equals the length $l_1$ of the side $q_1q_2$, $|q_1q_2|=l_1=\operatorname{width}(p_1)$. We assume that $w$ lies on the arc in $X$ determined by $a_2$ that does not contain $a$, and that $p_1$ is narrow, that is, $|xx_2|_w$, $|yy_2|_w\le |vx|_w=|vy|_w$, see sect.~\ref{subsect:width_strip}. Note that $|vx_2|_w\ge|vx|_w+\alpha|xx_2|_w$ by Axion~M($\alpha$). Thus $e^{l_1}=|vx_2|_w/|vx|_w\ge 1+\alpha(|xx_2|_w/|vx|_w)$. Hence if $l_1\le\ln(1+\alpha)$, then $|xx_2|_w\le|vx|_w$ and similarly $|yy_2|_w\le|vy|_w$, i.e., $p_1$ is narrow. By Lemma~\ref{lem:width_strip_below} we have $$2\sinh(l_1/2)\ge\alpha(1+\alpha)\sqrt{\frac{|xx_2||yy_2|}{|xy||x_2y_2|}}$$ and $$\alpha\le\frac{|xx_2|_w}{|yy_2|_w}\le\frac{1}{\alpha}.$$ Taking the normalization $|xy|_w=1$ for the metric of $X_w$, we obtain $|x_2y_2|_w\le 1+|xx_2|_w+|yy_2|_w\le 1+2|vx|_w\le 2$ by the triange inequality. Hence $2\sinh(l_1/2)\ge\frac{\alpha(1+\alpha)\sqrt{\alpha}}{2}|xx_2|_w$. We see that $$\max\{|xx_2|_w,|yy_2|_w\}\le\frac{4}{\alpha(1+\alpha)\sqrt{\alpha}}\sinh(l_1/2)\le\varepsilon/4$$ for $|S|=l_1<t$. Thus $q_i$ lies in $U_{\varepsilon/2}(a)\times\{s\}\subset U_{\varepsilon/2}(a)\times V_{\varepsilon/2}(s)$ for $i=1,2$, and $$l_1=|q_1q_2|\ge c\max\{|x_1x_2|_w,|y_1y_2|_w\},$$ because $t\le 1/64$ by our assumptions $c\le 1/8$, $\varepsilon\le 1/16$, and thus $l\ge\sinh(l/2)$ for $l\le t$. Assume the lemma is proved for all $n<k$, and consider a zz-path $S$ with $k$ sides and $|S|<t$. By the inductive assumption, $q_i\in U_{\varepsilon/2}(a)\times V_{\varepsilon/2}(s)$ for $i=1,\dots,k$. We have to show that the inclusion above holds also for $i=k+1$, and assuming that $k$ is odd, that $$|q_kq_{k+1}|\ge c\max\{|x_kx_{k+1}|_w,|y_ky_{k+1}|_w\}.$$ Let $p_k=(q_k,q_{k+1})$ be the $k$th strip with the common perpendicular $s_k=(v_k,w_k)$. The condition $q_k\in U_{\varepsilon/2}(a)\times U_{\varepsilon/2}(s)$ means that $a_k\in U_{\varepsilon/2}(a)$ and $s_k\in V_{\varepsilon/2}(s)$. Consider a parameterization $q_k(\tau)$, $0\le\tau\le 1$, of the segment $q_kq_{k+1}\subset\operatorname{h}_{s_k}$ with $q_k(0)=q_k$, $q_k(1)=q_{k+1}$. Then $q_k(\tau)=(a_k(\tau),s_k)$ and the map $\tau\mapsto a_k(\tau)\in\operatorname{aY}$ is continuous. The assumption $q_{k+1}\not\in U_{\varepsilon/2}(a)\times U_{\varepsilon/2}(s)$ would imply that there is $\tau'\in (0,1]$ with $\max\{|x_kx_k(\tau')|_w,|y_ky_k(\tau')|_w\}=\varepsilon/2$, where $a_k(\tau)=(x_k(\tau),y_k(\tau))$. Since still $q_k(\tau')\in U_\varepsilon(a)\times V_\varepsilon(s)$, we can apply Lemma~\ref{lem:ratio_distortion} to conclude that $$\alpha\beta\le\frac{|x_kx_k(\tau')|_w}{|y_ky_k(\tau')|_w}\le\frac{1}{\alpha\beta}$$ with $1>\beta\ge\sqrt{1-8\varepsilon}\ge 1/2$, and $$\sinh(|q_kq_k(\tau')|/2)\ge \frac{\alpha(1+\alpha)\sqrt{\alpha}}{8}\max\{|x_kx_k(\tau')|_w,|y_ky_k(\tau')|_w\}.$$ Using that $|q_kq_k(\tau')|\le|S|<t$, we see that $$\max\{|x_kx_k(\tau')|_w,|y_ky_k(\tau')|_w\}\le\frac{1}{2c}\sinh(|S|/2)<\varepsilon/2$$ in contradiction with the assumption. Thus $q_{k+1}\in U_{\varepsilon/2}(a)\times V_{\varepsilon/2}(s)$. Applying Lemma~\ref{lem:ratio_distortion}, we obtain $$|q_kq_{k+1}|\ge c\max\{|x_kx_{k+1}|_w,|y_ky_{k+1}|_w\}.$$ Arguments for even $k$ are similar with replacing $a\leftrightarrow s$ in Lemma~\ref{lem:ratio_distortion}. \end{proof} \begin{pro}\label{pro:nondegenerate_delta_distance} The distance $\delta$ on $\operatorname{Hm}$ is nondegenerate, if $\delta(q,q')=0$, then $q=q'$ for any $q$, $q'\in\operatorname{Hm}$. \end{pro} \begin{proof} Assume that $\delta(q,q')=0$ for some $q$, $q'\in\operatorname{Hm}$. It means that for every $k\in\mathbb{N}$ there is a zz-path $S=S(k)$ between $q$, $q'$ with $|S|<1/k$. Let $q=(a,s)$, where $a=(x,y)$, $s=(v,w)$. We fix a sufficiently small $\varepsilon$, $0<\varepsilon<1/16$, and take $t=t(\varepsilon)>0$ as in Lemma~\ref{lem:zz_path_length_below}. Then for every $k\in\mathbb{N}$, $k\ge 1/t$, the zz-path $S(k)$ satisfies the conclusion of Lemma~\ref{lem:zz_path_length_below}. In particular, all vertices $q_i(k)$ of $S(k)$ lie in $U_\varepsilon(a)\times V_\varepsilon(s)$. Thus $q'=q$ because $\varepsilon$ is taken arbitrarily. \end{proof} \subsection{Completeness of the distance $\delta$} \label{subsect:completeness} \begin{lem}\label{lem:prescribed_parabolic_shift} Given a harmonic 4-tuple $q=(a,s)$ with $a=(x,y)$, $s=(v,w)$, and $v'$ lying on the open arc $d$ in $X$ determined by $a$ that does not contain $w$, there is a harmonic $q'=(a',s')$ with $s'=(v',w)$, which is connected with $q$ by a zz-path $S$ with at most 3 sides. Moreover, if $s'\in V_\varepsilon(s)$ for a sufficiently small $\varepsilon>0$, then $|S|<\gamma$ with $\gamma=\gamma(\varepsilon)\to 0$ as $\varepsilon\to 0$, where $V_\varepsilon(s)=\set{(v',w')\in\operatorname{aY}}{$|vv'|_x<\varepsilon, |ww'|_x<\varepsilon$}$. \end{lem} \begin{proof} We construct a zz-path $S=\{\sigma_i\}$, $i=1,2,3$, as follows. We define $\sigma_1=ss_1\subset\operatorname{h}_a$ with $s_1=(v_1,w_1)$ so that $v'_a\in\sigma_1$ (for the notation $v'_a$ see sect.~\ref{subsect:lines}). Moreover, we can assume that $v'_a\in\operatorname{int}\sigma_1$ unless $v'=v$, in which case $s_1:=s$, and the construction of $S$ is finished with $\sigma_1=\sigma_2=\sigma_3=q$ degenerated. Then $\sigma_1$ is the segment on the line $\operatorname{h}_a$ between $q$ and $q_1\in\operatorname{Hm}$, $q_1=(a,s_1)$. By construction, the pairs $s_1$, $s'$ are in the strong causal relation and thus there is a (unique!) common perpendicular $a_1=(x_1,y_1)$ to them. We assume that $v_1$ lies on the arc $d$ in $X$, and $x_1$ lies on the arc in $X$ determined by $s$ that contains $x$. Next, we define $\sigma_2:=aa_1\subset\operatorname{h}_{s_1}$ as the segment between $q_1$ and $q_2=(a_1,s_1)$, and finally, we define $\sigma_3\subset\operatorname{h}_{a_1}$ as the segment $\sigma_3=(v_1)_{a_1}v'_{a_1}=(w_1)_{a_1}w_{a_1}$ between $q_2$ and $q_3=(a_1,s')=q'$. In particular, $a'=a_1$. Thus the segment $\sigma_1\subset\operatorname{h}_a$ uniquely determines our zz-path $S=\sigma_1\sigma_2\sigma_3$ connecting $q$ and $q'$. To prove the last assertion of the lemma we parametrize the line $\operatorname{h}_a\subset\operatorname{Hm}$, $h_a=\operatorname{h}_a(\tau)$, $\tau\in\mathbb{R}$, so that $\operatorname{h}_a(0)=q$, $\operatorname{h}_a(+\infty)=x$, $\operatorname{h}_a(-\infty)=y$, and $|\operatorname{h}_a(\tau)\operatorname{h}_a(\tau')|=|\tau-\tau'|$. The problem with the zz-path $S$ is that there is no constructive way to find the common perpendicular to given lines. We avoid this problem by defining a map $f:R_+^2\to d$ as follows. For $\tau\in\mathbb{R}$ we take the point $\operatorname{h}_a(\tau)=:(a,s_1)$ on the line $\operatorname{h}_a$. Next, we move along the line $\operatorname{h}_{s_1}$ by the distance $t\ge 0$ in the direction $v_1\in d$, where $s_1=(v_1,w_1)$. This gives us the point $(a_1,s_1)$ on the line $\operatorname{h}_{s_1}$. Finally, we move along the line $\operatorname{h}_{a_1}$ until we reach $(v',w)\in\operatorname{h}_{a_1}$ for some $v'\in d$. Then we define $f(\tau,t):=v'$. By the construction, $a_1\subset\overline d$ (the closure of the arc $d$ in $X$), thus the projection $w_{a_1}\in\operatorname{h}_{a_1}$ is well defined, hence the map $f$ is well defined. Note that $f(0,t)=v=f(\tau,0)$ for each $\tau\in\mathbb{R}$, $t\ge 0$, and that $f(\tau,t)\neq v$ for any $\tau\neq 0$, $t>0$, because otherwise we would have two different common perpendiculars to the distinct lines $\operatorname{h}_s$, $\operatorname{h}_{s_1}$. The map $f$ is continuous which follows from uniqueness in Lemma~\ref{lem:project_point_line}. For $\gamma>0$ we define $v_\gamma^\pm=f(\pm\gamma,\gamma)$, $\varepsilon_\gamma=\min\{|vv_\gamma^\pm|_x\}$. Since the set $$A_\gamma=\set{(\tau,t)}{$-\gamma\le\tau\le\gamma,\ 0\le t\le\gamma $}\subset\mathbb{R}_+^2$$ is connected, for every $0\le\varepsilon\le\varepsilon_\gamma$, $(v',w)\in V_\varepsilon(s)$, there is $(\tau,t)\in A_\gamma$ such that $f(\tau,t)=v'$. Now for any $0\le\varepsilon\le\varepsilon_1$ and $(v',w)\in V_\varepsilon(s)$ we take the minimal $\gamma=\gamma(\varepsilon)$ such that $f(\tau,t)=v'$ for $(\tau,t)\in A_\gamma$. We have $|\sigma_1|$, $|\sigma_2|\le\gamma$, and clearly, $\gamma(\varepsilon)\to 0$ as $\varepsilon\to 0$. Using Lemma~\ref{lem:width_strip_above}, we find $|\sigma_3|\le 2\sqrt{\frac{|v_1v'||ww_1|}{|v_1w_1||v'w|}}$, where $v'=f(\tau,t)$. Assuming that $\tau>0$, we normalize the metric of $X_x$ by the condition $|vw|_x=1$ (in the case $\tau<0$ we take $X_y$ instead of $X_x$). Then $|v_1w_1|_x, |v'w|_x\ge|vw|_x=1$. By Lemma~\ref{lem:width_strip_below} $$|vv_1|_x,|ww_1|_x\le\frac{e^\gamma-1}{\alpha(1+\alpha)}|vw|_x=\frac{e^\gamma-1}{\alpha(1+\alpha)}.$$ By mononicity, $|v'v_1|_x\le|vv_1|_x$. Thus $|\sigma_3|\le\frac{2(e^\gamma-1)}{\alpha(1+\alpha)}\le c\gamma$ for some constant $c=c(\alpha)>0$ as $\varepsilon\to 0$. Hence $S=|\sigma_1|+|\sigma_2|+|\sigma_3|\le (2+c)\gamma$, which completes the proof. \end{proof} \begin{pro}\label{pro:de_metric_topology} The $\delta$-metric topology on $\operatorname{Hm}$ coincides with that induced from $X^4$. \end{pro} \begin{proof} Let $\tau$ be the topology on $\operatorname{Hm}$ induced from $X^4$, $\tau_\delta$ the $\delta$-metric topology. It follows from Lemma~\ref{lem:zz_path_length_below} that every $\tau$-open neighborhood $U_\varepsilon(a)\times V_\varepsilon(s)$ of $q=(a,s)\in\operatorname{Hm}$ contains a $\delta$-metric ball $B_t(q)$ centered at $q$, where $t=t(\varepsilon)$. Hence, $\tau$ is not finer than $\tau_\delta$, i.e., every $\tau$-open set in $\operatorname{Hm}$ is $\tau_\delta$-open. Conversely, given a $\delta$-metric ball $B_t(q)$ of radius $t>0$ centered at $q=(a,s)\in\operatorname{Hm}$ we find a sufficiently small $\varepsilon>0$ such that every point $q'\in U_\varepsilon(a)\times V_\varepsilon(s)$, $q'=(a',s')$, is connected with $q$ by a zz-path of length $<t$. We find a short zz-path $S$ between $q$ and $q'$ as follows. First, we take $q_1=(a_1,s_1)\in\operatorname{Hm}$ with $s_1=(v',w)\in V_\varepsilon(s)$, where $s=(v,w)$, $s'=(v',w')$, and connect $q$ with $q_1$ by a zz-path $S_1$ as in Lemma~\ref{lem:prescribed_parabolic_shift} with $|S_1|<\gamma_1(\varepsilon)$. Applying the same construction, we find a zz-path $S_2$ between $q_1$ and $q_2=(a_2,s')$ with $|S_2|<\gamma_2(\varepsilon)$. Then $s'$ is the common perpendicular to $a'$, $a_2$, and we connect $q_2$ with $q'$ along $\operatorname{h}_{s'}$. Recalling the construction of Lemma~\ref{lem:prescribed_parabolic_shift}, we see that the width of the strip between $a$ and $a_1$ is at most $\gamma_1(\varepsilon)$, and the width of the strip between $a_1$ and $a_2$ is at most $\gamma_2(\varepsilon)$. Combining with Lemma~\ref{lem:width_strip_below}, this allows to conclude that $a_2\in U_{\gamma_3(\varepsilon)}(a)$ for some $\gamma_3(\varepsilon)$ with $\gamma_3(\varepsilon)\to 0$ as $\varepsilon\to 0$. By Lemma~\ref{lem:width_strip_above}, we find that $|q_2q'|\le\gamma_4(\varepsilon)$ with $\gamma_4(\varepsilon)\to 0$ as $\varepsilon\to 0$. It follows that $\delta(q,q')\le\gamma(\varepsilon)$ for some $\gamma(\varepsilon)$ with $\gamma(\varepsilon)\to 0$ as $\varepsilon\to 0$. Taking $\varepsilon>0$ sufficiently small, we find that any $q'\in U_\varepsilon(a)\times V_\varepsilon(s)$ lies in $B_t(q)$. Hence $\tau=\tau_\delta$. \end{proof} \begin{pro}\label{pro:complete_de_distance} The distance $\delta$ on $\operatorname{Hm}$ is complete. \end{pro} \begin{proof} Let $\{q_i\}\in\operatorname{Hm}$ be a Cauchy sequence with respect to the metric $\delta$. For a given $t>0$ we have $\delta(q_i,q_j)<t$ for all sufficiently large $i$, $j$. By approximation, we find for each $i$, $j$ a zz-path $S_{ij}$ between $q_i$, $q_j$ with $|S_{ij}|\le 2\delta(q_i,q_j)$. Then for all sufficiently large $i$, $j$ we have $\delta(q_i,q_j)<t/2$ and thus $|S_{ij}|<t$. Now, fix $\varepsilon>0$, $\varepsilon\le 1/16$, and apply Lemma~\ref{lem:zz_path_length_below} to the zz-paths $S_{ij}$ for a fixed $i$ and all sufficiently large $j$. Then $q_j\in U_\varepsilon(a_i)\times V_\varepsilon(s_i)$, where $q_i=(a_i,s_i)$. Moreover, the estimates of Lemma~\ref{lem:zz_path_length_below} (and the triange inequality) imply that the sequences $x_j$, $y_j\in X_w$, $v_j$, $w_j\in X_x$ are Cauchy with respect to the metrics $X_w$, $X_x$, where $a_j=(x_j,y_j)$, $s_j=(v_j,w_j)$. By Corollary~\ref{cor:completeness}, there are limits $x=\lim x_j$, $y=\lim y_j$, $v=\lim v_j$, $w=\lim w_j$, and the 4-tuple $q=(x,y,v,w)$ is harmonic. By Proposition~\ref{pro:de_metric_topology}, $\delta(q,q_j)\to 0$. \end{proof} \begin{proof}[Proof of Theorem~\ref{thm:main}] It follows from Propositions~\ref{pro:nondegenerate_delta_distance}, \ref{pro:de_metric_topology} and \ref{pro:complete_de_distance} that the distance $\delta$ on $\operatorname{Hm}$ is nondegenerate, that the $\delta$-metric topology coincides with that induced from $X^4$, in particual, the metric space $(\operatorname{Hm},\delta)$ is locally compact, and that $(\operatorname{Hm},\delta)$ is complete. By definition, $(\operatorname{Hm},\delta)$ is a length space. By Hopf-Rinov theorem, $(\operatorname{Hm},\delta)$ is proper, that is, closed balls are compact. A standard argument shows that $(\operatorname{Hm},\delta)$ is geodesic, i.e., for any two points $p$, $q$ with $\delta(p,q)<\infty$ there is a geodesic $pq$ between them. \end{proof}
\section{Introduction} Collective behaviors are omnipresent in natural systems. They exist in diverse systems such as animal flocking, microbial colony formation and synchronization, traffic jamming, and social segregation in human populations \cite{BalleriniPNAS,JacobAP,FlynnPRE,DaninoNature,SchellingJMS}. Many of these systems span a hierarchy of scales and complexity, but the collective behavior at larger scales can often be understood without knowledge of many details at smaller scales \cite{NoorbakhshPRE,SchellersheimWIR,QutubEMBM,SouthernPBMB}. This coarse-grained approach is often used to describe communities where a directed signal travels from agent to agent to serve a function, which permits connections to reaction-diffusion systems of excitable media \cite{LilienkampPRL}. Directed signal propagation in multicellular communities is an important and commonly observed phenomenon. In the nervous system, a neuron passes an electrochemical signal to another neuron directly through a synapse. In a biofilm of {\it Bacillus subtilis} bacteria, the interior cells transmit an electrochemical wave to the periphery to mediate the metabolic activity \cite{PrindleNature,LiuNature}. In pancreatic islets, gap junction coupling mediates electrical communication between cells \cite{BenningerBioPhysJ}. The social amoebae {\it Dictyostelium discoideum} communicate via the signaling molecule cyclic adenosine monophosphate (cAMP) to coordinate aggregation \cite{NoorbakhshPRE}. Heterogeneity in these communities may pose a challenge to directed wave propagation. The stochastic expression of genes leads to non-uniform protein distributions in cells. As a result, cells have heterogeneous responses to the wave propagation, and obstacles are naturally generated. For example, in the biofilm, a fraction of cells do not participate in the signal transmission, which can cause propagation failure \cite{JosephCellSystem, zhai2019statistics}. In cardiac cells, cell death can result in large patches of non-conductive tissue \cite{BubChaos, KinoshitaPRE}, which are related to heart disease such as fibrosis and ischemia \cite{BubChaos, UzzamanCR}. Heterogeneities play an important role in deciding the wave pattern and result in a variety of wave behaviors, including wave death and spirals \cite{KinoshitaPRE}. However, the impact of heterogeneity on wave propagation is still not fully understood. The influence of heterogeneity on wave propagation has been investigated experimentally using cell monolayers \cite{BubPRL} and patterned chemical systems \cite{SteinbockScience, TinsleyPCCP, TothPRE}, and theoretically using the FitzHugh-Nagumo model and cellular automata models \cite{BubChaos}. When the length scales of the heterogeneities in the medium are close to the length scales associated with the propagating front, propagating waves can develop breaks, which can either block wave propagation or cause spiraling \cite{BubChaos}. There are several mechanisms to explain the formation of spirals. For example the heterogeneity of the reaction field can stochastically generate unidirectional sites, which can induce spirals \cite{KinoshitaPRE}. Spiral waves can also form as a result of an interaction between chemical waves \cite{GesteiraPD,AlievCSF}: when a chemical wave comes close to another wave from the back, part of the wave vanishes because of the refractory region of the preceding wave, and as a result spiral cores are formed. Spiral waves can be either beneficial or detrimental to function. For example, spiral reentry of the action potential can induce heart failure \cite{PertsovCirR, ZimikArXiv}, whereas a spiral pattern formed on the nest of honeybees is an effective protection mechanism \cite{KastbergerPO}. Therefore it is important to understand the formation of spiral waves in order to better understand community-level function in living systems. Here we focus on excitable wave propagation in a two-dimensional heterogeneous community. We use a minimal FitzHugh-Nagumo-type model to describe the excitability of cells and introduce heterogeneity in the model parameters. Our model predicts three dynamic regimes (directed propagation, wave death, and spiraling), and we demonstrate how these regimes depend on the heterogeneity. We then introduce spatial correlations in the heterogeneity, which naturally arise due to lineage-based inheritance and cell-to-cell interactions \cite{zhai2019statistics}. Intuitively, one expects correlations to cause channeling and therefore promote directed propagation, and we indeed find this result in particular parameter regimes. However, we also find in other parameter regimes that correlations promote the emergence of spiral waves, a surprising feature that we explain by distinguishing between two different spiraling mechanisms. Finally, we characterize the dependence of the spiral period on the degree of heterogeneity in the system using percolation theory. Our results suggest that the spatial structure of cell-to-cell heterogeneity can have important consequences for signal propagation in cellular communities. \section{Materials and methods} We construct an integrated model combining the FitzHugh-Nagumo (FN) model \cite{FitzHugh,Nagumo} and spatial heterogeneity. We use the FN model to describe the excitation of a single cell, which is coupled to its four neighbors in a square lattice. Heterogeneities are introduced by randomly assigning each cell to be ``on'' or ``off'' which determines its parameter values (Fig.\ \ref{Fig1}), as described below. \subsection{Excitable wave model} Hodgkin and Huxley proposed the first quantitative mathematical model to describe action potential propagation through very careful experimentation on the squid giant axon \cite{HodgkinJP}. Modifying the Hodgkin and Huxley model for excitable media, FitzHugh and Nagumo established a partial differential equation model of two variables \cite{FitzHugh,Nagumo}. The FN model is a simplified variant of the Hodgkin and Huxley model, which traces the fast-slow dynamics of an excitable system \cite{OsmanISRN}. We use a minimal FitHugh-Nagumo-type model \cite{Tuckwell} to describef excitable wave propagation in a two-dimensional heterogeneous community. This minimal model is \begin{align} \label{rd1} &\frac{du_i}{dt}=\epsilon [u_i^2 (1-u_i) -w_i]+ \sum_{j\in {\cal N}(i)} (u_j-u_i),\\ \label{rd2} &\frac{dw_i}{dt}=\frac{1}{\tau} u_i, \end{align} where $i$ indexes the cells, and ${\cal N}(i)$ denotes the neighbors of cell $i$. The fast activator variable $u$ and the slow inhibitor variable $w$ are known as the excitable and recovery variable, respectively. The variables $u$ and $v$ are also referred to as the propagator and controller variables, respectively. The parameters in this reaction-diffusion system are the excitation strength $\epsilon$, which when sufficiently high supports pulse-coupled wave propagation \cite{Mirollo}, and the recovery time $\tau$, which sets the pulse duration of the signal and thus governs the dynamics. The second term in Eq.\ \ref{rd1} is a discretized Laplacian term to account for the cell-cell communication. The minimalistic nature of this model promotes the interpretation of dynamics for single cells in excitable media. \begin{figure} \center{\includegraphics[width=0.5\textwidth] {fig1} } \caption{Excitable wave propagation model in a two-dimensional heterogenous medium. (A) We evolve the dynamics on a $100\times100$ square lattice. A wave is triggered by the central 5 by 5 cells and propagates outward to the edges (cyan). (B) To introduce the heterogeneity, each cell is randomly assigned to be ``on'' (small $\tau$) or ``off'' (large $\tau$).} \label{Fig1} \end{figure} In all dynamical simulations, cells in the center are initialized with $u = 1$ to trigger the excitable wave; all other cells are initialized with $w = 0$ (Fig.\ \ref{Fig1}A). We use a square lattice of $100\times100$ cells with absorbing boundaries on four sides. To evolve the dynamics, we discretize the FN model in time using the fourth-order Runge-Kutta method with time step $\Delta t$ = 0.02. \subsection{Introduction of heterogeneity} We start with a homogeneous community (all cells have the same parameter values), and set the parameters in the following way to support directed propagation. The excitation strength $\epsilon$ must be larger than 1 because otherwise diffusion outpaces excitation and washes away the signal; therefore we set $\epsilon=10$ \cite{JosephCellSystem}. This places the model in a diffusion-limited regime, which is consistent with signaling in the biofilms of {\it Bacillus subtilis} \cite{PrindleNature}. We find that the recovery time $\tau$ needs to be sufficiently large ($\tau > 7$) because otherwise the excitation is too short-lived to trigger its neighbors with $\epsilon=10$. To introduce heterogeneity, we must choose (i) the parameter to which heterogeneity will be introduced, and (ii) the distribution from which the parameter values will be drawn. For the parameter, we choose $\tau$ (we find that choosing $\epsilon$ has little effect and the wave always propagates). For the distribution, we use binary heterogeneity for simplicity, where each cell has probability $\phi$ to be on with $\tau_{\rm on}>7$, and probability $1-\phi$ to be off with $\tau_{\rm off}=5$. In Appendix A, we compare binary heterogeneity to the continuous alternatives of log-normal and log-uniform heterogeneity. We find that all three choices lead to similar results, and therefore we focus only on binary heterogeneity in what follows. \subsection{Spatial correlations} We introduce radially directed spatial correlations governed by an order parameter $\rho$ \cite{zhai2019statistics}. With $\rho=0$, the on-cells are randomly distributed in the excitable medium. With $\rho=1$, radii of perfectly correlated on or off-cells extend from the center to the periphery of the excitable medium. To achieve a given level of correlation, we perform the following procedure. First, we randomly assign the cells in the central 6 by 6 grid to be on with probability $\phi$, and off otherwise. Then, for each cell with unassigned neighbors (in random order), we choose a neighbor at random. With probability $\rho$ we assign the neighbor to the same on/off state as the original cell. Otherwise, we assign the on/off state from the binary distribution. We repeat these steps until all cells are assigned. \section{Results} \subsection{Heterogeneity produces three dynamic regimes} \begin{figure} \center{\includegraphics[width=0.5\textwidth] {fig2} } \caption{Examples of the three dynamic regimes. Brightness is proportional to signal strength $u$, showing wavefront (cyan, $u\to1$) and refractory wave back (black, $u < 0$). (A) Wave death: signal dies at $t=18$ before reaching any edge. (B) Radial propagation: wave propagates to edge and is absorbed at boundaries. (C) Spiral: wave spins back on itself and persists indefinitely; white arrow indicates spiral head.} \label{Fig2} \end{figure} First we focus on uncorrelated heterogeneity ($\rho=0$). As we vary the fraction of on-cells $\phi$ and their response timescale $\tau_{\rm on}$, we find three dynamic regimes, which we denote wave death, radial propagation, and spiral (Fig.\ \ref{Fig2}). Wave death means that the wave dies ($u\to0$) before reaching any edge (Fig.\ \ref{Fig2}A). Radial propagation means that the wave propagates from the center to the edge (Fig.\ \ref{Fig2}B). Spiral means that the wave forms a spiral pattern and can survive indefinitely (Fig.\ \ref{Fig2}C). We distinguish between radial propagation and spiral using the following criterion: if each cell undergoes at most one excitation we define the dynamics as radial propagation; otherwise we define the dynamics as spiral. \begin{figure*} \center{\includegraphics[width=0.8\textwidth] {fig3} } \caption{Correlated heterogeneity can either suppress or promote spiral waves. (A) With no correlation ($\rho=0$, left), on-cells are randomly distributed in the medium. Radial correlation ($\rho=0.75$, right) produces channels of on-cells. (B) Correlation suppresses spiraling at large $\tau_{\rm on}$ (top red regime) but promotes spiraling at small $\tau_{\rm on}$ (bottom red regime). We refer to these subregimes as secondary spirals and breakup spirals, respectively. Phase diagrams in B contain 20 trials; spiral phase means that a spiral was observed in at least one trial, and otherwise we label with wave death or radial propagation, whichever is more frequent. Labels C-F in B correspond to the dynamics shown in panels C-F. White arrows in C-F indicate spiral head.} \label{Fig3} \end{figure*} For $\rho=0$ (Fig.\ \ref{Fig3}A, left), the phase diagram of these dynamic regimes in the space of $\phi$ and $\tau_{\rm on}$ is shown in Fig.\ \ref{Fig3}B (left). We see that for sufficiently small $\phi$, there are not enough on-cells to support the excitable wave; the wave cannot transmit to the edge, resulting in wave death (blue). In contrast, for intermediate and large $\phi$ there are enough on-cells to support the wave, and we have mostly radial propagation (green). However, for a specific range of $\phi$ and when $\tau_{\rm on}$ is sufficiently large, the wave becomes long-lived, and we see that this gives rise to spiraling (red). \subsection{Spatial correlation can either suppress or promote spiraling} Next, we investigate the effects of spatially correlated heterogeneity ($\rho >0$). Correlation can occur, for example, if excitation properties are inherited from cell to cell as the cells grow radially outward to form the community \cite{zhai2019statistics}. Intuitively, we would expect that because high radial correlation creates channels of on-cells (Fig.\ \ref{Fig3}A, right), it should promote radial propagation and suppress spiraling. However, we find that it can either suppress or promote spiraling depending on the parameter regime. Specifically, as seen in Fig.\ \ref{Fig3}B, the top portion of the red spiral regime in the phase diagram shrinks compared to the $\rho=0$ case, as expected, whereas the bottom portion of the red spiral regime expands. The latter is a surprising feature because one expects channeling to be beneficial to radial propagation and thus detrimental to spiraling. Because of the different responses to correlated heterogeneity, we hypothesize that spirals in the top and bottom portions of the spiral regime are formed by different mechanisms. To investigate this hypothesis, we focus on specific examples within these regimes (see the labels C-F in Fig.\ \ref{Fig3}B, which correspond to Fig.\ \ref{Fig3}C-F). In the top regime, when the heterogeneity is uncorrelated, we see in Fig.\ \ref{Fig3}C that some cells remain on after the wave has passed. These cells then trigger secondary excitations that become spirals. We therefore refer to these spirals as secondary spirals. When the heterogeneity is correlated, we see in Fig.\ \ref{Fig3}E that these secondary spirals are suppressed by the channeling effect, and the wave propagates radially via the channels. In the bottom regime, when the heterogeneity is uncorrelated, we see in Fig.\ \ref{Fig3}D that the wave propagates radially. However, when the heterogeneity is correlated, we see in Fig.\ \ref{Fig3}F that spirals form. The formation mechanism is different here than it is for the secondary spirals. Here, when the wavefront confronts a barrier of off-cells between channels, the wavefront breaks. Broken pieces of the wavefront then become spirals. We therefore refer to these spirals as breakup spirals. Because the channeling is what causes the breakup, breakup spirals are enhanced by correlated heterogeneity, in contrast to secondary spirals. We can now understand why secondary spirals form at large $\tau_{\rm on}$, whereas breakup spirals form at small $\tau_{\rm on}$ (Fig.\ \ref{Fig3}B). $\tau_{\rm on}$ sets the timescale for the excitation, including the refractory period. For a secondary spiral to form, large $\tau_{\rm on}$ is necessary because this allows some of the on-cells---specifically, those that are surrounded by other on-cells---to remain excited long after the wave has passed. In contrast, for a breakup spiral to form, small $\tau_{\rm on}$ is necessary because this means that the cells near the broken piece have already completed their refractory period. They are able to become excited again, which allows propagation of the breakup spiral. \subsection{Dependence of spiral period on anchor size} Our investigation of specific examples in Fig.\ \ref{Fig3}C-F suggests that when spirals form, they circulate around clusters of off-cells in the medium, which we refer to as anchors. This raises the question of how the properties of the anchors influence the characteristics of spiraling, e.g.\ the spiral period. To address this question, we first consider a simplified example shown in Fig.\ \ref{Fig4}A. In this example, a circular off-cell anchor with diameter $d$ is surrounded by on-cells. The two central columns of cells above the anchor are initiated with $u=1$ to trigger the wave, and $w=0.2$ (a refractory state) to prevent wave propagation to the right, respectively. As a result, a spiral forms that travels around the anchor in a counter-clockwise direction (Fig.\ \ref{Fig4}B). \begin{figure} \center{\includegraphics[width=0.5\textwidth] {fig4} } \caption{Simplified example to investigate spiral period. (A) A circular off-cell anchor (black) with diameter $d$ is surrounded by on-cells (white). Cells are initialized to trigger a counter-clockwise spiral, shown in B. (C) Period $T$ as a function of $d$ with various values of $\tau$.} \label{Fig4} \end{figure} In a homogeneous medium, the speed of a wave propagating according to Eqs.\ \ref{rd1} and \ref{rd2} is known \cite{Tuckwell} in the limit of $\tau\to\infty$ to be $v = \sqrt{\epsilon/2}$. Because the distance that the spiral travels around the anchor is $\pi d$, the period of rotation is $T = \pi d/v$, or \begin{equation} \label{T} T=\frac{\pi d}{\sqrt{\epsilon/2}}. \end{equation} Fig.\ \ref{Fig4}C shows a test of this prediction in our simple example. We see that the measured period agrees well with the predicted period, and that the agreement improves as $\tau$ increases, as expected. Furthermore, we see a deviation from the prediction for small $d$ when $\tau$ is large, which can be understood as follows. When the anchor size is small enough that the period is less than the recovery time $\tau$, the wavefront is disrupted by the previous wave back, and the period is increased. Specifically, this condition will occur when the predicted period in Eq.\ \ref{T} is larger than $\tau$, which sets a value of $d > \tau\sqrt{\epsilon/2}/\pi$ below which the prediction should fail. For example, with $\tau = 42$ and $\epsilon = 10$, we expect a deviation below $d \approx 30$, which is consistent with Fig.\ \ref{Fig4}C (red curve). \subsection{Dependence of spiral period on heterogeneity} In the heterogeneous system, the anchors consist of the naturally occurring clusters of off-cells. The spatial statistics of these clusters are described by percolation theory \cite{Stauffer}. Therefore, the goal of this section is to use percolation theory to investigate how the heterogeneity parameters $\phi$ and $\rho$ affect the spatial structure of the community and in turn, the spiral dynamics. Intuitively we expect that at any $\rho$, the spiral period is a monotonically decreasing function of $\phi$ because the off-cell clusters shrink with $\phi$. To make this expectation quantitative, we turn to percolation theory. Two-dimensional percolation theory on a square lattice applies when $\rho = 0$ and predicts a critical threshold $\phi_c \approx 0.59$, above which there exists a giant on-cell cluster spanning the medium. We expect this regime to be dominated by radial propagation. Conversely, below a complementary threshold of $\phi = 1-\phi_c \equiv p_c \approx 0.41$, there exists a giant off-cell cluster. We expect this regime to be dominated by wave death. Indeed, we see in Fig.\ \ref{Fig3}B (left) that, roughly speaking, radial propagation occurs for $\phi > \phi_c$, wave death occurs for $\phi < p_c$, and spirals occur within $p_c < \phi < \phi_c$. These regimes are rough because percolation theory accounts for the static structure of the lattice but not the excitable dynamics. Near either percolation threshold, percolation theory provides scaling relations for the cluster properties. Therefore, we use percolation theory to understand how the anchor size scales with $\phi$. Specifically, above $p_c$, the mean off-cell cluster size scales as \cite{Stauffer} \begin{equation} n_{\rm off} \sim (\phi- p_c)^{-\gamma} \end{equation} where $\gamma=43/18\approx 2.39$. We confirm this scaling with progressively larger lattice sizes in the inset of Fig.\ \ref{Fig5}A. We see that the mean anchor size is indeed a decreasing function of $\phi$. \begin{figure*} \center{\includegraphics[width=1.0\textwidth] {fig5} } \caption{Dependence of spiral period on heterogeneity parameters with predictions from percolation theory. (A-D) Uncorrelated heterogeneity ($\rho=0$). A shows period $T$ vs.\ fraction of on-cells $\phi$ predicted by two-dimensional percolation theory and computed from simulations. Prediction succeeds qualitatively but fails quantitively as described in text and illustrated in B-D. Inset confirms scaling prediction of percolation theory for various $N\times N$ system sizes. B-D show examples (labeled in A) of spiral dynamics (cyan, trace of spiral head) and anchoring cluster(s) of off-cells (in D there are many clusters, distinguished by color). (E-G) Strongly correlated heterogeneity ($\rho = 0.95$). E is as in A but with one-dimensional percolation theory to describe quasi-one-dimensional clusters. Prediction succeeds at large $\phi$. F and G are as in B-D. In A-D, $\tau_{\rm on} = 240$; in E-F, $\tau_{\rm on} = 9$. In A and E, period is calculated as average time between excitations ($u > 0.6$) from cases out of 1000 trials where spiraling occurred; error bars are standard error.} \label{Fig5} \end{figure*} The period should depend on the circumference of the off-cell cluster being circulated. To the extent that the fractal dimension \cite{Stauffer} of the off-cell cluster is near two (at $\phi = p_c$ it is $91/48\approx 1.90$), the mean circumference should be roughly $\pi\sqrt{n_{\rm off}}$. Therefore, following Eq.\ \ref{T}, we predict that the spiral period should be \begin{equation} T=\frac{\pi \sqrt{n_{\rm off}}}{\sqrt{\epsilon/2} }. \end{equation} This prediction is shown in Fig. \ref{Fig5}A (cyan dashed line), where we measure $n_{\rm off}$ from the lattices. Above $\phi = p_c$ we see the power-law decay from percolation theory, while below $\phi = p_c$ the divergence of $n_{\rm off}$ and thus $T$ is prevented by the finite size of the lattice. We then compare this prediction to the dynamic simulation results by plotting the average spiral period (cyan data points in Fig. \ref{Fig5}A). We see for both the prediction and the simulation results that $T$ decreases with $\phi$ as expected, but that otherwise the agreement is poor. To understand the deviation between the prediction and the simulations, we investigate the dynamics of individual spirals at various values of $\phi$. When $\phi< p_c$ (Fig. \ref{Fig5}B), the giant off-cell cluster spans the whole system. In contrast, the spiral typically circulates only a small part of the cluster. Therefore the observed period is less than predicted, as seen in Fig.\ \ref{Fig5}A. When $\phi \approx p_c$ (Fig. \ref{Fig5}C), the spiral typically circulates the bulk of a single off-cell cluster. The spiral avoids the fractal ``arms'' of the cluster, but the cluster is also not maximally dense. These two effects compensate, such that the predicted and observed periods generally agree. When $\phi > p_c$ (Fig. \ref{Fig5}D), the mean off-cell cluster size is small, but the spiral typically circulates multiple nearby clusters. Therefore the observed period is greater than predicted, as seen in Fig.\ \ref{Fig5}A. Thus, we conclude that with uncorrelated heterogeneity ($\rho = 0$), percolation theory provides qualitative intuition for the dependence of the spiral period on the on-cell fraction, but not quantitative predictions due to the fact that it cannot capture the details of the propagation dynamics. What about highly correlated heterogeneity, when $\rho$ is large? Standard percolation theory assumes $\rho = 0$ and therefore does not apply for general $\rho$. However, when $\rho$ is very large ($\rho\to1$), the off-cell clusters become highly distended in the radial direction due to the correlation. Therefore, they become quasi-one-dimensional, and we may expect that tools from one-dimensional percolation theory \cite{Stauffer} could provide a predictive understanding. Indeed, if we consider any radius of the system as a one-dimensional lattice, we can calculate, for a randomly chosen off-cell in that lattice, the mean length of the chain of off-cells of which it is a member. The result, derived in Appendix B, is \begin{equation} \label{n1D} n_{\rm off}^{\rm 1D} = \frac{2}{(1-\rho)}\frac{1}{\phi}-1, \end{equation} The circumference of the chain (ignoring the ends) is twice this length, such that a spiral circulating with speed $\sqrt{\epsilon/2}$ should have a period \begin{equation} \label{T1D} T = \frac{2}{\sqrt{\epsilon/2}}\left[\frac{2}{(1-\rho)}\frac{1}{\phi}-1\right]. \end{equation} When $\phi$ is small, there are many off-cells in the system. Chains of off-cells from neighboring radii will fall next to each other, and the quasi-one-dimensional nature of the clusters will be lost. Therefore, we expect Eq.\ \ref{T1D} to fail for small $\phi$. On the other hand, for large $\phi$, chains of off-cells will be rare, and we expect Eq.\ \ref{T1D} to hold. The prediction in Eq.\ \ref{T1D} is compared with simulations in Fig.\ \ref{Fig5}E for $\rho = 0.95$. As expected, we see that the prediction fails at small $\phi$ but succeeds at large $\phi$. Indeed, as seen in Fig.\ \ref{Fig5}F, at small $\phi$, chains of off-cells from neighboring radii fall next to each other, and the clusters are no longer quasi-one-dimensional. In contrast, as seen in Fig.\ \ref{Fig5}G, at large $\phi$, the clusters quasi-one-dimensional and well separated, and the spiral generally circulates one of the clusters. \section{Discussion} We have developed a model that describes wave propagation in a spatially correlated heterogeneous medium. Despite the minimal nature of the model, and the idealization of cells as squares on a regular lattice, our model supports multiple dynamic regimes including wave death, radial propagation, and spiraling. We have discovered that spirals arise via two distinct mechanisms---secondary triggers and wavefront breakup---and that spatial correlations in the heterogeneity suppress the former and promote the latter, in two distinct regimes within parameter space. Furthermore, we have shown using percolation theory that the structural properties of the heterogeneity influence the dynamic properties of spiraling (the period), and that the predictive power of percolation theory is best when the spatial correlation is strong. Taken together, our results suggest that the spatial structure of cell-to-cell heterogeneity can have important consequences for directed signal propagation in cellular communities. The minimal nature of the model facilitates its application as a phenomenological description of experiments on signaling in cellular communities. Because there are only two parameters describing the dynamics (the time scale and the excitation strength), and two parameters describing the heterogeneity (the fraction and spatial correlation of on-cells), these parameters could be easily calibrated to experimental observations. Because the parameters and variables are dimensionless, the cell length scale and signal time scale would set the units of length and time, and then other observables such as the wavelength and fraction of signaling cells could calibrate other parameters to the point where predictions could be made and tested with no further free parameters \cite{JosephCellSystem}. Our work could also provide insights on how one might engineer heterogeneous media to produce spiral waves. First, the excitability threshold must be low; in this work we set it to zero (in the typical FN there is an additional threshold parameter in Eq.\ \ref{rd1}). Second, an intermediate degree of heterogeneity is required, with not too many or too few excitable cells (Fig.\ \ref{Fig3}B), which could be controlled by genetic engineering \cite{JosephCellSystem} or different fractions of a multi-species cell mixture. Third, either a large or a small excitation timescale is required depending on the degree of spatial correlation (Fig.\ \ref{Fig3}B). The excitation timescale could be changed by mutation \cite{JosephCellSystem}, and the spatial correlation could be controlled by modulating the degree of cell redistribution in a microfludic device or by using strains with differential growth rates. Our model has limitations, and several extensions are natural. Although we check that our results are insensitive to the heterogeneity distribution (Appendix A), we only add heterogeneity to one parameter (the timescale). It may be more realistic to add heterogeneity to all parameters \cite{potter2016communication}, including the excitation strength and, if included, the excitation threshold. Moreover, we assume that cells exist on a regular square lattice and that heterogeneity is only correlated in the radial direction. It may be more realistic to add disorder to either the lattice structure, cell size \cite{JosephCellSystem}, or spatial direction of the heterogeneity \cite{zhai2019statistics}. It will be interesting to see how our model can be generalized, as well as how it can be used to understand or engineer experimental systems in future work.
\section{Introduction} In recent years there has been a growing interest in `multilayer networks' as a model for large real-world structures~\cite{Multilayer}. Attention is focused on properties of a multilayer network that arise from interactions between the layers. In the language of graph theory, we can treat a multilayer network as a collection of graphs, all sharing a common vertex set. The simplest case is a \emph{double graph} $G=(V,E_1,E_2)$ formed by superposing two graphs $G_1=(V,E_1)$ and $G_2=(V,E_2)$ over the same vertex set. We refer to $E_1$ as the set of red edges and $E_2$ as the set of blue edges. We are particularly interested in the random double graph $G(n,p_1,p_2)$ in which $G_1$ and $G_2$ are independent binomial (or Erd\H os-R\'enyi) random graphs on $[n]$, with edge probabilities $p_1$ and~$p_2$, respectively. Thus a red edge is present between a given pair of vertices with probability~$p_1$, independently of all the other potential red and blue edges, and similarly for the blue edges. The most intensively studied phenomenon in the theory of random graphs is the emergence and growth of a `giant component' in a binomial random graph as the edge probability increases~\cite[Chap.~5]{tombstone}. A \emph{giant component} is a connected component that contains a constant fraction of the vertices, which appears at a certain critical edge probability, specifically $p=1/n$. For $p=c/n$ with $c>1$, there is a unique giant component: all other connected components have size $O(\log n)$ with high probability\footnote{A property holds whp if the probability of it occurring tends to~1 as $n$ tends to infinity.} (whp). When $c<1$ there is no giant component. This phase transition phenomenon is now understood in great detail~\cite{giant}. A natural extension of this line of work to double graphs is the following. A joint component is a maximal set of vertices that supports both a red and a blue spanning tree. (Note that the joint components form a partition of the vertex set of a double graph.) We ask whether the largest joint component --- the potential \emph{giant} joint component --- undergoes a phase transition and, if so, what is the nature of the transition. Note that the giant joint component is not simply the intersection of the red and blue giant components considered in isolation, though it is contained in the intersection. The question of the existence of a giant joint component in a double graph was examined, in a slightly disguised form, by Buldyrev, Parshani, Paul, Stanley and Havlin \cite{BPPSH10}. The relevant scaling to use is $p_1=\la_1/n$ and $p_2=\la_2/n$, for constants $\la_1,\la_2$. Buldyrev et al.\ provided a heuristic argument that the giant joint component appears at certain critical values of the pair $(\la_1,\la_2)$, and confirmed this predicted behaviour experimentally. Independently, Molloy \cite{MR3252926} provided a rigorous proof for the size of the giant joint component in the special case when $\la_1=\la_2$, and stated what should be the generalisation to unequal edge densities and even to graphs formed from three or more distinguished edge sets. Both the heuristic and rigorous results approach the giant joint component from above, by repeatedly stripping vertices that cannot be contained in it. In this paper we take a very different approach to analysing the joint components of the double graph $G(n,\la_1/n,\la_2/n)$. We show that for any $\lambda_1,\lambda_2\in \mathbb{R}$ whp any non-trivial joint component\footnote{A trivial joint component has size 1} contains exactly two vertices or a linear fraction of the vertices. In addition, whp there can be at most one joint component of linear size, which we call the giant joint component, or the \emph{joint-giant} for short. We establish the size of the joint-giant as a function of $\la_1,\la_2$. Interestingly, whereas the phase transition of a classical binomial random graph is second order, the phase transition in a double graph turns out to be first order. Thus, if we plot the size of the largest component (scaled by $1/n$) in a binomial graph $G(n,\la/n)$ as a function of~$\la$, the resulting curve is continuous; the phase transition is marked only by a discontinuity of the derivative at $\la=1$. In contrast, for a double graph, the plot of the size of largest joint component is discontinuous at pairs $(\la_1,\la_2)$ lying on a curve~$C$ to be defined presently. For example, as noted by Molloy, there is a critical value $\la^*=2.4554+$ such that when $\la_1=\la_2<\la^*$ there is no joint-giant, and when $\la_1=\la_2>\la^*$ there is a joint-giant of linear size. In fact, when $\lambda_1=\lambda_2$ is just above $\lambda^*$ the joint-giant contains about $0.5117\,n$ vertices. The curve $C$ defining the phase transition as a function of $\la_1$ and $\la_2$ is plotted in Figure~\ref{fig:phasediag}. Above the curve, there is a unique joint-giant of linear size; below, the largest joint component has size at most~2, whp. These analytical results are consistent with numerical findings reported by Buldyrev et al.~\cite{BPPSH10} and, of course, with the analytic result of Molloy~\cite{MR3252926}. \begin{figure}[h] \begin{center} \includegraphics[width=5cm]{phasediagram.pdf} \end{center} \caption{The phase transition threshold plotted as a function of $\la_1$ and $\la_2$. This is the curve $C$ from Theorem~\ref{thm:main}.} \label{fig:phasediag} \end{figure} A superficially similar percolation model is jigsaw percolation introduced by Brummitt, Chatterjee, Dey and Sivakoff \cite{MR3349000}. This model is also defined on a double graph; however, in this case a bottom-up approach is used. Initially every vertex is in its own part and in every step of the process two parts are merged if there is a red and a blue edge between them. Several papers have been devoted to investigating when the process percolates, i.e., when every vertex is contained in the same part by the end of the process. So far the combination of various deterministic graphs with a binomial random graph \cite{MR3349000,GravnerSivakoff17} and the combination of two binomial random graphs \cite{BollobasRiordanSlivkenSmith17, CKM18} has been studied. In addition, extensions to multi-coloured random graphs \cite{CG17} and random hypergraphs \cite{BCKK17} exist. As hinted at earlier, one approach to locating the joint-giant is to repeatedly remove the vertices found in any small red and blue component of the graph. Molloy \cite{MR3252926} analysed this process in order to establish the size of the joint-giant. Our method differs as we relate the size of the joint-giant in the double graph $G(n,\la_1,\la_2)$ to a bicoloured branching process, where every particle in the process has $\Po(\la_1)$ red offspring and independently $\Po(\la_2)$ blue offspring. A joint-giant exists precisely when there is a positive probability that such a branching process contains an infinite red-blue binary tree, i.e., one in which every particle has one red offspring and one blue offspring. In a sense, what we do is the opposite of the earlier approach, in that we are exploring the joint-giant from within. We feel that this approach gives additional insight into the phase transition phenomenon. The two approaches mirror earlier work on the $k$-core of a random graph, with Pittel, Spencer and Wormald~\cite{MR1385386} approaching the $k$-core from above, and Riordan~\cite{MR2376426} from below. Denote the coloured rooted unlabelled tree created by the above branching process by $\Xl{\porig}$ and the associated probability distribution by $\Prli{\porig}$. In order to state our result, we need to make some preliminary observations about $\Xl{\porig}$. The root of the tree is $v_0$. When we say that a particle $x$ of the branching process has a certain property, we mean that the process consisting of~$x$ (as the new root) and its descendants has the property. A binary red-blue tree of height~$d$ is a perfect binary tree of height~$d$, where every internal vertex has a red and a blue offspring. Let $\br_d$ be the event that $\Xl{\porig}$ contains a binary red-blue tree of height~$d$ with $v_0$ as the root, and let $\br=\lim_{d\to\infty}\br_d$ be the event that $\Xl{\porig}$ contains an infinite binary red-blue tree with root $v_0$. Then $\Prl{\porig}{\br_0}=1$. Also, each particle in the first generation of $\Xl{\porig}$ has property $\br_d$ with probability $\Prl{\porig}{\br_d}$. As these events are independent for different particles, the number of red and blue offspring in the first generation with property~$\br_d$ has a Poisson distribution with mean $\la_1\Prl{\porig}{\br_d}$ and $\la_2\Prl{\porig}{\br_d}$ respectively. Thus, $\Prl{\porig}{\br_{d+1}}=\Ppo{\Po(\la_1\Prl{\porig}{\br_d})>0}\Ppo{\Po(\la_2\Prl{\porig}{\br_d})>0}$. Since $\Ppo{\Po(\la x) >0}$ is a continuous, increasing function of $x$ on $[0,1]$, it follows (e.g., from Kleene's fixed point theorem) that $\Prl{\porig}{\br}=\lim_{d\to\infty}\Prl{\porig}{\br_d}$ is given by the maximum solution $\alpha$ to the equation $$\alpha=\Ppo{\Po(\la_1 \alpha) >0}\Ppo{\Po(\la_2 \alpha) >0}.$$ (Maximality comes from $\Prl{\porig}{\br_0}=1$.) We denote this solution by $\beta(\la_1,\la_2)$. Let $C=\partial\{(\la_1,\la_2) \mid \beta(\la_1,\la_2)=0\}$ be the boundary of the zero-set of~$\beta$. The main result of the paper is the following: \begin{theorem}\label{thm:main} For $(\porig)\in (\mathbb{R}^+)^2\setminus C$ the number of vertices in the largest joint component of $G(n,\la_1/n, \la_2/n)$ is $\beta(\la_1,\la_2)n+o_p(n)$ as $n\to\infty$. When $\beta(\la_1,\la_2)>0$, this giant joint component is unique. \end{theorem} In addition, we show that \whp\ any non-trivial joint component of sublinear size contains exactly two vertices, i.e.\ it is a pair of vertices connected by a red and a blue edge. \begin{theorem}\label{thm:aux} For $(\porig)\in (\mathbb{R}^+)^2$ we have that in $G(n,\la_1/n, \la_2/n)$ \whp\ no joint component of size~$k$ exists for any $2<k=o(n)$. \end{theorem} \subsection{Proof outline} Our proof is based on a method introduced by Riordan~\cite{MR2376426} in order to determine the size of the $k$-core of a graph. The key idea is to define a pair of events, which depend only on the close neighbourhood of a vertex in the double graph, more precisely on vertices which are at distance $o(\log{n})$. The distance of two vertices in the double graph is defined as the distance in the graph $G(V,E_1\cup E_2)$. In addition, \whp\ every vertex for which the first event holds is contained in the joint-giant; however, \whp\ none of the vertices for which the second event fails is found in the joint-giant, allowing us to establish a lower and an upper bound on the set of vertices in the joint-giant. The result follows if the probabilities of the two events are close enough. Local properties are chosen because there is an effective coupling between the random double graph in the close neighbourhood of a vertex and the branching process described above, allowing us to transfer results from the branching process to the random graph. For the upper bound we will choose the event that either the neighbourhood of~$v$ contains a short cycle, including the red-blue cycle of length two, or $\br_s$ holds for some appropriately chosen~$s$. We show that any vertex, which does not have either of these properties is outside of any non-trivial joint component (Claim~\ref{clm:gianthasB}). An upper bound on the size of the joint-giant follows by providing an estimate on the expected number of these vertices and the second moment method. The lower bound requires significantly more attention. In this case we define the event $\ca$, which is essentially a robust version of $\br_s$. We show that \whp\ many vertices have property $\ca$ and in addition every vertex with property $\ca$ is the root of a red-blue binary tree of depth~$s$, where every leaf has property $\ca$ within the remainder of the graph (Lemma~\ref{lem:size}). Now consider the graph spanned by the vertices found in the union of these trees. When applied to the $k$-core this roughly translates into taking the union of $k$-regular trees of depth~$s$ where every leaf is also the root of a $k$-regular tree of depth~$s$ in the remaining graph. This already identifies almost every vertex within the $k$-core. However the situation is not as straightforward for joint-connectivity as even though every vertex is contained in a red and a blue connected subgraph of size at least $s$, there is no guarantee that the set contains a red and a blue spanning tree. While small components may appear in the random graph, the previously described set (spanned by trees rooted at vertices with property~$\ca$), due to its special structure, avoids this obstacle, and thus any component within it must have size at least $n^{3/5}$ (Proposition~\ref{prop:size2}). We complete the proof of Theorem~\ref{thm:main} with a sprinkling argument to show that the graph spanned by this subset is connected in both the red and the blue graph. Theorem~\ref{thm:aux} follows from a simple first moment argument. \subsection{Organisation of the paper} For a double graph $G$ on $n$ vertices let $U'(G)$ be the maximal subset of vertices of $G$ such that in the subgraph spanned by $U'$, denoted by $G[U']$, every vertex is found in both a red and a blue connected subgraph of size at least $n^{3/5}$. Note that $U'(G)$ is closed under union and thus well defined. The key result for showing the lower bound on the size of the joint-giant is the following. \begin{proposition}\label{prop:size2} For every $(\phigh)\in (\mathbb{R}^+)^2\setminus C$ we have $$|U'(G(n,\la_1/n,\la_2/n))|\ge \beta(\phigh)n+o_p(n).$$ \end{proposition} Note that it is enough to consider $(\phigh)\in (\mathbb{R}^+)^2\setminus C$ with $\beta(\phigh)>0$ as otherwise the trivial lower bound $0$ already implies the statement. Sections \ref{sec:branching} and \ref{sec:bptographs} are devoted to proving this result for such a fixed pair $(\phigh)$. Once this has been achieved, Theorems \ref{thm:main} and~\ref{thm:aux} follow swiftly in Section~\ref{sec:proofs}. \section{A branching process}\label{sec:branching} In this section we analyse $X_{\phigh}$. This will form an idealised model of the local structure of a random double graph. The model is adequate, since the random graph is locally tree-like. In analysing the branching process we rely heavily on ideas introduced by Riordan~\cite{MR2376426}. Later, in Section~\ref{sec:bptographs} we create a bridge from the branching process to random graphs. First we need to show that the function $\beta$ is well behaved. \begin{lemma}\label{lem:cts} The function $\beta$ is continuous in $(\mathbb{R}^+)^2\setminus C$. \end{lemma} \begin{proof} Define $h(\beta)=h_{\la_1,\la_2}(\beta)=(1-e^{-\la_1\beta})(1-e^{-\la_2\beta})-\beta$. Recall that $\beta(\la_1,\la_2)$ is defined to be the maximum root $\beta$ of $h_{\la_1,\la_2}(\beta)=0$. Clearly, $\beta=0$ is one root. We are interested in identifying any non-zero roots. Note that, since $h(\beta)<0$ for all $\beta\geq1$, there are no roots with $\beta\ge 1$. Differentiating twice, we obtain $$ h''_{\la_1,\la_2}(\beta)=e^{-(\la_1+\la_2)\beta}\big[(\la_1+\la_2)^2-\la_1^2e^{\la_2\beta}-\la_2^2e^{\la_1\beta}\big], $$ which is positive up to a certain value of $\beta$ and then negative. Coupled with $h(0)=0$ and $h'(0)=-1<0$, this implies that $h$ has at most two strictly positive roots. (Figure~\ref{fig:subandsuper} may assist in visualising the function $h(\beta)$.) Note that $h$ when considered as a function of $\la_1,\la_2,\beta$ is continuous in each of its variables, implying that any discontinuity is caused by the appearance of the first strictly positive root completing the proof. \end{proof} \begin{figure}[h] \begin{minipage}{0.49\textwidth} \centering \includegraphics[width=6cm]{subcrit.pdf} \end{minipage} \begin{minipage}{0.49\textwidth} \centering \includegraphics[width=6cm]{supercrit.pdf} \end{minipage} \caption{The function $h(\beta)$ in the subcritical (left) and supercritical (right) regimes.} \label{fig:subandsuper} \end{figure} Figure~\ref{fig:subandsuper} shows two plots of the function $h$ from the proof of Lemma~\ref{lem:cts}. In the first, $\la_1=\la_2=2.4$ and there are no strictly positive roots, while in the second, $\la_1=\la_2=2.5$ and there are two, the maximum possible. Between these two situations there is a critical value $\la^*$ such that setting $\la_1=\la_2=\la^*$ yields one positive root $\beta^*$. Thus Figure~\ref{fig:subandsuper} provides an informal pictorial explanation of the first order phase transition: at $\la^*$ the maximum root jumps from 0 to~$\beta^*$. The behaviour of the function is similar when $\la_1\neq \la_2$. For the rest of the section we assume that $(\phigh)\in (\mathbb{R}^+)^2\setminus C$ with $\beta(\phigh)>0$. \begin{lemma}\label{lem:epsexist} Suppose $(\phigh)\in (\mathbb{R}^+)^2\setminus C$ with $\beta(\phigh)>0$. For $i=1,2$ the following holds: $\la_i\Ppo{\Po(\la_{3-i} \beta(\phigh))>0}>1$. \end{lemma} \begin{proof} Without loss of generality let $i=1$. Assume for contradiction that \begin{equation}\label{eq:contr} \la_1 \Ppo{\Po(\la_{2} \beta(\phigh))>0}=\la_1 \left(1-\exp(-\la_{2} \beta(\phigh))\right)\le 1. \end{equation} Note that $\la_1\neq 0$ as $\la_1=0$ would imply $\beta(\phigh)=0$. By the definition of $\beta(\phigh)$ we have \begin{align*} \beta(\phigh)&=\Ppo{\Po(\la_1 \beta(\phigh)) >0}\Ppo{\Po(\la_2 \beta(\phigh)) >0}\\ &=(1-\exp(-\la_1 \beta(\phigh)))(1-\exp(-\la_2 \beta(\phigh)))\\ &\stackrel{\eqref{eq:contr}}{\le} \frac{1-\exp(-\la_1 \beta(\phigh))}{\la_1}, \end{align*} or equivalently $$\exp(-\la_1 \beta(\phigh))\le 1-\la_1 \beta(\phigh).$$ Now this inequality holds only if $\la_1 \beta(\phigh)=0$ leading to a contradiction, as neither $\la_1$ nor $\beta(\phigh)$ is equal to 0. \end{proof} By Lemma~\ref{lem:epsexist} and since $x<e^{x-1}$ holds when $x>1$ we have, $$ \exp\left(\la_i \Ppo{\Po(\la_{3-i} \beta(\phigh))>0}\right)>e\la_i \Ppo{\Po(\la_{3-i} \beta(\phigh))>0}, $$ for $i=1,2$. By continuity, there exists $\eps_0>0$ such that \begin{equation}\label{eq:epssmall} \exp\left(\la_i \Ppo{\Po(\la_{3-i} (\beta(\phigh)-\eps))>0}\right)>e\la_i \Ppo{\Po(\la_{3-i} \beta(\phigh))>0}, \end{equation} for $i=1,2$ and all $\eps\in(0,\eps_0]$. Fix such an $\eps_0$ and an $\eps<\eps_0$. Lemma~\ref{lem:cts} implies that there exists a $\delta>0$ such that \begin{equation}\label{eq:deltaspec} \beta(\plow)>\beta(\phigh)-\eps \end{equation} and $\beta$ is continuous in the closed ball of radius $\delta$ centred at $(\phigh)$, implying that for $i=1,2$ when $\xi \upto \delta$ we have $$(\la_i-\xi) \beta(\pmed)\rightarrow (\la_i-\delta) \beta(\plow)<\la_i\beta(\plow).$$ Therefore there exists a $\xi\in(0,\delta)$ satisfying the following inequality for $i=1,2$ \begin{equation}\label{eq:xi} \la_i \beta(\plow)>(\la_i-\xi) \beta(\pmed). \end{equation} Fix such a $\delta$ and $\xi$. At this point we have fixed a number of parameters, which we collect together here for future reference: \begin{itemize} \item $\la_1,\la_2>0$ satisfy $\beta(\phigh)>0$; \item $\eps_0>0$ is such that inequality \eqref{eq:epssmall} holds for all $\eps\in(0,\eps_0]$; \item an $\eps\in(0,\eps_0]$; \item $\delta>0$ satisfies inequality \eqref{eq:deltaspec}, and also that $\beta$ is continuous in the ball of radius $\delta$ centred at $(\phigh)$; \item $\xi\in(0,\delta)$ satisfies inequality \eqref{eq:xi}. \end{itemize} \emph{These settings will remain in force until the end of Section~\ref{sec:bptographs}.} Initially we will work on the branching process and then integrate these results into the random graph model. If $\ev_1$, $\ev_2$ are properties of the branching process, with $\ev_1$ depending only on the first $d$ generations, where the choice of $d$ will be implicit given the event $\ev_1$, let $\ev_1\of\ev_2$ denote the event that $\ev_1$ holds if we delete all particles in generation $d$ of the branching process that do not have property $\ev_2$. For example, with $\br_1$ the property of having at least one red and blue offspring, as above, $\br_1\of\br_1=\br_2$, the property of having a red and a blue offspring each with at least one red and one blue offspring. Let $\rb_k$ be the event that $\br_k$ holds in a {\em robust} manner, meaning that $\br_k$ holds even after any particle in generation $k$ is deleted. Since $\br=\br_k\of\br$, the event $\rb_k\of\br$ is the event that $\br$ holds even after deleting an arbitrary particle in generation $k$ and all of its descendants. \begin{lemma}\label{l1} We have \[ \Prl{\plow}{\rb_k\of\br}\upto \beta(\plow)=\Prl{\plow}{\br} \] as $k\to\infty$. \end{lemma} \begin{proof} Fix $0<\phi<1$. Note that $\Xl{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}$ can be obtained by constructing $\Xl{\plow}$, and then deleting each edge (of the rooted tree) independently with probability $\phi$, and taking for $\Xl{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}$ the set of particles still connected to the root. To obtain an upper bound on the probability that $\br$ holds for $\Xl{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}$, we use the above coupling and condition on $\Xl{\plow}$. If $\br$ does not hold for $\Xl{\plow}$, it certainly does not hold for $\Xl{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}$. Furthermore, if $\br\setminus (\rb_k\of\br)$ holds for $\Xl{\plow}$, then there is a particle $v$ in generation $k$ such that if $v$ is deleted, then $\br$ no longer holds. The probability that $v$ is not deleted when passing to $X_{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}$ is $(1-\phi)^k$. The events $\overline\br$, $\rb_k\of\br$ and $\br\setminus (\rb_k\of\br)$ exhaust the sample space, and hence \[ \Prl{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}{\br} \le \Prl{\plow}{\rb_k\of\br}+(1-\phi)^{k}. \] Since $\rb_k\of\br\subset \rb_{k+1}\of\br$, the sequence $\Prl{\plow}{\rb_k\of\br}$ is increasing. Taking the limit of the inequality above, \[ \beta\bb{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)} = \Prl{(1-\phi)(\la_1-\delta),(1-\phi)(\la_2-\delta)}{\br} \le \lim_{k\to\infty} \Prl{\plow}{\rb_k\of\br}. \] Letting $\phi\to 0$, the lemma follows. \end{proof} It will often be convenient to {\em mark} some subset of the particles in generation $d$. If $\ev$ is an event depending on the first $d$ generations, then we write $\ev\of M$ for the event that $\ev$ holds after deleting all unmarked particles in generation $d$. We write $\Pr^{\alpha}_{\porig}[\ev\of M]$ for the probability that $\ev\of M$ holds when, given $\Xl{\porig}$, we mark the particles in generation $d$ independently with probability $\alpha$. We suppress $d$ from the notation, since it will be clear from the event $\ev$. Let \[ r(\porig,d,\alpha) = \Pr^{\alpha}_{\porig}[\rb_{d}\of M]. \] \begin{lemma}\label{l2} There exists a positive integer $d$ such that \begin{equation*} r\bb{\pmed,d,\beta(\plow)} > \beta(\plow). \end{equation*} \end{lemma} \begin{proof} Let $X'$ be a branching process where the root vertex has $\Po(\delta-\xi)$ red and $\Po(\delta-\xi)$ blue offspring, and the descendants of these offspring are as in $\Xl{\plow}$. Then the branching process $Y$ created by merging an independent copy of $\Xl{\plow}$ and $X'$ at the root provides a lower coupling on $X_{\pmed}$, implying $r\bb{\pmed,d,\beta(\plow)}$ is at least the probability that $\rb_d\of \br$ holds in $Y$. When $\rb_1\of \br$ holds in $X'$ then $\rb_d\of \br$ holds as well. Now $\rb_1\of \br$ holds in $X'$ if the root of $X'$ has at least two red and two blue offspring, each having property $\br$. Since each offspring of the root has $\br$ with probability $\alpha=\beta(\plow)$, $X'$ has property $\rb_1\of \br$ with probability $\zeta=\Ppo{\Po((\delta-\xi)\alpha)\ge 2}^2>0$. On the other hand $\Xl{\plow}$ has $\rb_d\of\br$ with probability $\Prl{\plow}{\rb_d\of\br}$. Therefore the probability that $Y$ has $\rb_d\of \br$ is at least $$ r_d=1- (1-\zeta)\bb{1-\Prl{\plow}{\rb_d\of\br}}.$$ By Lemma~\ref{l1}, as $d\to\infty$ we have $\Prl{\plow}{\rb_d\of\br}\to \beta(\plow)=\alpha>0$, so $$ r_d\to 1-(1-\zeta)(1-\alpha)>\alpha,$$ and there is a $d$ with $r_d\ge \alpha$, completing the proof. \end{proof} \emph{We fix the value of $d$, which satisfies Lemma~\ref{l2}, until the end of Section~\ref{sec:bptographs}.} As the random graph model contains only a finite number of vertices, there is no equivalent for the event $\br$. In order to circumvent this we introduce an event $\el$, which depends only on the first $L$ generations of the branching process, such that conditional on $\el$ the probability that $\br$ holds is close to one. For a non-negative integer $k$ let $X[k]$ denote the first $k$ generations of the branching process~$X$. \begin{lemma}\label{lem:inprob} There exists a positive integer $L$ and an event $\el$ depending only on the first $L$ generations of the branching process satisfying \begin{equation*} \Prl{\pmed}{\el} > \beta(\plow), \end{equation*} and if $\el$ holds then \begin{equation*} \Pr^{\beta(\pmed)}_{\pmed}\left[\br_L\of M \mid X[L]\right] \ge 1-4^{-3d}. \end{equation*} \end{lemma} In the second condition (and again below) we are conditioning on the first $L$ generations of~$X$. An equivalent way of stating the second condition is, for all $\omega\in\el$, with $\Pr_{\pmed}[\omega]>0$, we have $$\Pr^{\beta(\pmed)}_{\pmed}\left[X\in \br_L\of M \mid X[L]=\omega[L]\right] \ge 1-4^{-3d}.$$ \begin{proof}[Proof of Lemma \ref{lem:inprob}] By monotonicity we have $\Prl{\pmed}{\br} >\beta(\plow).$ Set $$\eta=\min\big\{\Prl{\pmed}{\br}-\beta(\plow),4^{-3d}\big\}>0.$$ As $\br$ is measurable, there is an integer $L\ge d$ and an event $\el_1$ depending only on the first $L$ generations of the branching process such that $\Prl{\pmed}{\br\diff \el_1}\le \eta^2/2$, where $\diff$ denotes symmetric difference. Writing $1_\ev$ for the indicator function of an event $\ev$ we have \begin{equation}\label{ebd} \eta^2/2 \ge \Prl{\pmed}{\br^\cc \cap \el_1} = \Es{\pmed}\big[ 1_{\el_1} \Prl{\pmed}{\br^\cc \mid X[L]}\big], \end{equation} where $\Es{\pmed}$ is the expectation corresponding to $\Prli{\pmed}$. Set \begin{align*} \el &= \el_1 \cap \Bigl\{\Prl{\pmed}{\br \mid X[L]} \ge 1-\eta \Bigr\}\\ &= \el_1 \cap \Bigl\{\omega\Bigm|\Prl{\pmed}{X\in\br \mid X[L]=\omega[L]} \ge 1-\eta \Bigr\}, \end{align*} and note that the event $\el$ depends only on the first $L$ generations of $X$. Since $$\Pr_{\pmed}\left[\br \mid X[L]\right]= \Pr^{\beta(\pmed)}_{\pmed}\left[\br_L\of M \mid X[L]\right] $$ the second inequality in the statement of the lemma holds and thus we only need to verify the first inequality. If $\el_1\setminus \el$ holds then $\Prl{\pmed}{\br^{\cc} \mid X[L]} \ge \eta$ leading to $$\Es{\pmed}\big[ 1_{\el_1} \Prl{\pmed}{\br^\cc \mid X[L]}\big]\ge \eta \Prl{\pmed}{\el_1\setminus \el}.$$ Together with \eqref{ebd}, this implies $\Prl{\pmed}{\el_1\setminus\el}\leq\eta/2$ and hence \begin{align*} \Prl{\pmed}{\el} &\ge \Prl{\pmed}{\el_1}-\eta/2 \ge \Prl{\pmed}{\br}-\Prl{\pmed}{\br\diff \el_1}-\eta/2\\ &\ge\Prl{\pmed}{\br}-\eta^2/2-\eta/2 \ge \beta(\plow), \end{align*} completing the proof. \end{proof} Fix an integer $L$ and an event $\el$ which satisfies the previous lemma. Let $\ca_0=\el$, and for $t\ge 1$ set $\ca_t=\rb_d\of\ca_{t-1}$. Thus, $\ca_t$ is a `recursively robust' version of the event $\br_{dt}\of\el$, which depends on the first $dt+L$ generations of the branching process. \begin{lemma}\label{lem:branchprob} For any $t\ge 0$, \begin{equation*} \Prl{\pmed}{\ca_t}> \beta(\plow) \end{equation*} and if $\ca_t$ holds, we have \begin{equation*} \Pr^{\beta(\pmed)}_{\pmed}\left[\br_{dt+L} \of M \mid X[dt+L]\right] \ge 1-4^{-(2^t+2)d}. \end{equation*} \end{lemma} \begin{proof} The proof is by induction on $t$. The statement holds for $t=0$ by Lemma~\ref{lem:inprob}. As the descendants of different particles in generation $d$ of the branching process are independent we have $$\Prl{\pmed}{\ca_t} = r\bb{\pmed,d,\Prl{\pmed}{\ca_{t-1}}}.$$ By the induction hypothesis we have $\Prl{\pmed}{\ca_{t-1}}> \beta(\plow)$ and the first statement follows from Lemma~\ref{l2}, as the function $r$ is monotone increasing in its last parameter. Now assume that if $\ca_{t-1}$ holds we have $$\Pr^{\beta(\pmed)}_{\pmed}\left[\br_{d(t-1)+L} \of M \mid X[d(t-1)+L]\right] \ge 1-4^{-(2^{t-1}+2)d}.$$ Condition on $X[dt+L]$ and assume that $\ca_t$ holds. Since $\ca_t=\rb_d\of\ca_{t-1}$, there is a smallest set $Y$ of particles in generation $d$ such that $\ca_{t-1}$ holds for each $y\in Y$, and $\rb_d\of M$ holds if we mark only the particles in $Y$. Since any tree witnessing $\rb_d$ contains a subtree witnessing $\rb_d$ in which each particle has at most two red and two blue offspring, we have $|Y|\le 4^d$. Mark each particle in generation $dt+L$ independently with probability $\beta(\pmed)$, and let $Y'$ be the set of particles $y\in Y$ for which $\br_{d(t-1)+L}\of M$ holds. By the induction hypothesis and because the descendants of different particles in generation $d$ of the branching process are independent, each $y\in Y$ is included in $Y'$ independently with probability at least $1-4^{-(2^{t-1}+2)d}$. Thus \[ \Pr(|Y\setminus Y'|\ge 2) \le \binom{|Y|}{2} \left(4^{-(2^{t-1}+2)d}\right)^2 \le 4^{2d}4^{-(2^t+4)d} = 4^{-(2^t+2)d}. \] By the definition of $\rb_d$, $\br_d$ holds whenever $|Y\setminus Y'|\le 1$ and we only keep the particles in $Y'$ in generation $d$. But then $\br_d\of\br_{d(t-1)+L}\of M=\br_{dt+L}\of M$ holds, proving the second statement. \end{proof} Let $T=T(n)$ satisfy $T=o(\log n)$ and $T/\log\log n\to \infty$ and set $s=1+dT+L$. Set $\ca= \br_1\of \ca_T$ and note that this event depends only on the first $s=1+dT+L$ generations of the branching process. The property $\ca$ plays a crucial role in identifying the vertices in the joint-giant. Our results from this section imply that \begin{align} \Prl{\phigh}{\ca} &=\Ppo{\Po\left(\la_1\Prl{\phigh}{\ca_T}\right)>0}\Ppo{\Po\left(\la_2\Prl{\phigh}{\ca_T}\right)>0}\nonumber\\ &\stackrel{\mathclap{\mathrm{Lem. \ref{lem:branchprob}}}}{\ge}\>\>\, \Ppo{\Po\left((\la_1-\delta)\beta(\plow)\right)>0} \Ppo{\Po\left((\la_2-\delta)\beta(\plow)\right)>0}\nonumber\\ &=\beta(\plow).\label{eq:alower} \end{align} We will need an additional property of the branching process in order to deduce that the vertices with property $\ca$ actually form a joint component. The exact relation between the property and connectivity is not obvious and will be clarified later. Let $\mathcal{J}$ be the event that the root of the branching process has a blue offspring with property $\br_s$ and it does not have a red offspring that has a blue offspring with property~$\ca$. \begin{lemma}\label{lem:brancomp} We have $$ \Prl{\phigh}{\mathcal{J}}\le \big(\Ppo{\Po(\la_2 \beta(\phigh))>0}+o(1)\big)\exp\big(-\la_1\Ppo{\Po(\la_2 \beta(\plow))>0}\big).$$ \end{lemma} \begin{proof} Let $\mathcal{J}_1$ be the event that the root of the branching process has a blue offspring with property $\br_s$ and $\mathcal{J}_2$ be the event that it does not have a red offspring that has a blue offspring with property~$\ca$. Since $s\rightarrow \infty$ we have $\Prl{\phigh}{\br_s}=\Prl{\phigh}{\br}+o(1)=\beta(\phigh)+o(1)$. Therefore \begin{equation*} \Prl{\phigh}{\mathcal{J}_1}=\Ppo{\Po(\la_2 \beta(\phigh))>0}+o(1) \end{equation*} and \begin{align*} \Prl{\phigh}{\mathcal{J}_2} &=\Pr\big[\Po\big(\la_1\Ppo{\Po(\la_2 \Prl{\phigh}{\ca})>0}\big)=0\big]\nonumber\\ &\stackrel{\eqref{eq:alower}}{\le}\exp\left(-\la_1\Ppo{\Po(\la_2 \beta(\plow))>0}\right). \end{align*} The result follows as the events $\mathcal{J}_1$ and $\mathcal{J}_2$ are independent. \end{proof} The final result we need for the branching process is that it is unlikely to become large quickly. \begin{lemma}\label{lem:small} For any positive integer $s=o(\log {n})$ we have \begin{equation*} \Pr_{\phigh}\left[|X[2s]|\ge n^{1/15}\right] = o(n^{-1}). \end{equation*} \end{lemma} \begin{proof} Let $\la=\la_1+\la_2$ and note that Lemma \ref{lem:epsexist} implies $\la>2$. Denote by $N_t$ the number of particles in generation $t$ of the branching process~$X$. The sum of Poisson random variables is Poisson, and hence $N_{t+1}$, conditioned on $N_t$, is distributed as $\Po(N_t\la)$. We claim that \begin{equation}\label{eq:Ntinduct} \Pr[N_{t+1}>2 N_t\lambda+2\log_2 n]\leq4n^{-2}. \end{equation} Then, except with probability $o(n^{-1})$, the inequality $N_{t+1}\leq2\lambda N_t+2\log_2 n$ holds for all $0\leq t\leq 2s$. In that case, by induction on $t$ and noting $N_0=1$, we have $N_t\leq (t+1)(2\la)^t\log_2 n$ for all $0\leq t\leq 2s$. The result follows (with any positive constant replacing $1/15$). We establish inequality~\eqref{eq:Ntinduct} by direct calculation. Let $k_0=\lceil 2N_t\la\rceil$. Then \begin{align*} \Pr[N_{t+1}>2N_t\lambda+2\log_2 n]&\leq \sum_{k=k_0+\lceil 2\log_2 n\rceil -2}^\infty\frac{(N_t\la)^ke^{-N_t\la}}{k!}\\ &\leq\sum_{k'=\lceil 2\log_2 n\rceil -2}^\infty\frac{(N_t\la)^{k_0+k'}e^{-N_t\la}}{k_0!\,k_0^{k'}}\\ &\leq\frac{(N_t\la)^{k_0}e^{-N_t\lambda}}{k_0!}\sum_{k'=\lceil 2\log_2 n\rceil -2}^\infty 2^{-k'}\\ &\leq 8n^{-2}, \end{align*} completing the proof. \end{proof} \section{From the branching process to random graphs}\label{sec:bptographs} Consider the random double graph $\tG=\tG(n,4s,\phigh)$, whose distribution is that of $G(n,\la_1/n,\la_2/n)$ conditioned on the absence of any red-blue cycles of length at most $4s$, which includes the absence of any red-blue cycle of length 2, i.e., the girth of the merged edge set is larger than $4s$. Set $s=1+dT+L$ as in the previous section and recall that $s\to\infty$ and $s=o(\log{n})$. Transferring from $G$ to $\tG$ has only a minor effect on the probability of local properties, as sparse binomial random graphs are locally tree-like, and this also holds for the binomial double graph, when it is created from two sparse binomial random graphs. Roughly speaking this means that when exposing the edges in $\tG$ the probability that the next edge exposed is present should be close to the probability that the edge is present in $G(n,\la_1/n,\la_2/n)$, as long as the number of exposed edges remains small. We prove this result in the following lemma. \begin{lemma}\label{l_small} Let $M_1$, $F_1$ be disjoint sets of possible edges over $V$ and $M_2$, $F_2$ be disjoint sets of possible edges over $V$, with $|F_1|,|F_2|\le n^{2/3}$ such that $F_1\cup F_2$ contains no cycle of length at most $4s$. Let $j\in\{1,2\}$ and $e=\{w_1,w_2\}\not\in F_j\cup M_j$. Then for large enough $n$ we have $$ \Ppo{e\in E_j(\tG) \mid F_1\subseteq E_1(\tG) \subseteq M_1^\cc, F_2\subseteq E_2(\tG) \subseteq M_2^\cc}\le \la_j/n.$$ If in addition $\{w_2\}$ is disjoint from any edge in $F_1\cup F_2$ then $$(1-n^{-1/4})\la_j/n \le \Ppo{e\in E_j(\tG) \mid F_1\subseteq E_1(\tG) \subseteq M_1^\cc, F_2\subseteq E_2(\tG) \subseteq M_2^\cc}.$$ \end{lemma} \begin{proof} Without loss of generality assume $j=1$. Let $G=G(n,\la_1/n,\la_2/n)$. Let $\mathcal{F}$ denote the event $F_1\subseteq E_1(G) \subseteq M_1^\cc, F_2\subseteq E_2(G) \subseteq M_2^\cc$. In addition let $\cD$ be the event that no cycle of length at most $4s$ is found in $G$. Clearly $$\Ppo{e\in E_1(\tG) \mid F_1\subseteq E_1(\tG) \subseteq M_1^\cc, F_2\subseteq E_2(\tG) \subseteq M_2^\cc}=\Ppo{e\in E_1(G) \mid \cD,\mathcal{F}}.$$ Note that, conditional on $\mathcal{F}$, for $i=1,2$ the edges in $E_i(G)$ except those in $F_i$ and $M_i$ appear independently not only of the other edges in $E_i$, but also of the edges in $E_{3-i}$. Since the event $e\in E_1(G)$ is increasing and the event $\cD$ is decreasing we have, by Harris's Lemma (\cite{MR0115221}), $$\Ppo{e\in E_1(G) \mid \cD,\mathcal{F}}=\frac{\Ppo{e\in E_1(G),\cD\mid \mathcal{F}}}{\Ppo{ \cD \mid\mathcal{F}}}\le \frac{\Ppo{e\in E_1(G)\mid \mathcal{F}}\Ppo{\cD\mid \mathcal{F}}}{\Ppo{ \cD \mid\mathcal{F}}}=\frac{\la_1}{n},$$ proving the upper bound. Now for the lower bound. Let $\mathcal{P}$ be the event that there is no red-blue path between $w_1$ and $w_2$ in $G$, with length between 1 and $4s-1$. Note that conditional on $\cD,\mathcal{P},\mathcal{F}$ the edge $e$ is present in $E_1$ with probability $\la_1/n$. Therefore \begin{align*} \Ppo{e\in E_1(G) \mid \cD,\mathcal{F}}&\ge \Ppo{e\in E_1(G) ,\mathcal{P} \mid \cD,\mathcal{F}}\\ &= \Ppo{e\in E_1(G) \mid \cD,\mathcal{P},\mathcal{F}}\Ppo{\mathcal{P}\mid \cD,\mathcal{F}}\\ &=\frac{\la_1}{n}\Ppo{\mathcal{P}\mid \cD,\mathcal{F}}. \end{align*} All that remains to show is that $\Ppo{\mathcal{P}\mid \cD,\mathcal{F}}\ge (1-n^{-1/4})$. Note that both the event $\mathcal{P}$ and $\cD$ are decreasing, therefore Harris's Lemma implies $\Ppo{\mathcal{P}\mid \cD,\mathcal{F}}\ge \Ppo{\mathcal{P}\mid \mathcal{F}}$. Now consider a path of length between 1 and $4s-1$ between $w_1$ and $w_2$. Any such path must contain a subpath, where none of the edges is contained in $F_1$ or $F_2$. In addition, for one of these subpaths, the first vertex of this subpath is $w_2$, while the last vertex of this subpath must be in the set $W$, which consists of the vertex $w_1$ and the set of endpoints of the edges in $F_1\cup F_2$. Since none of the edges in the subpath is contained in $F_1$ or $F_2$, it is the case that each red-blue edge appears independently with probability at most $(\la_1+\la_2)/n$. Now for $\mathcal{P}$ to fail one such subpath must be present, but the probability of this event is at most \[ \sum_{\ell=1}^{4s-1} |W| n^{\ell-1}\left(\frac{\la_1+\la_2}{n}\right)^{\ell} \le \frac{5n^{2/3}}{n} \sum_{\ell=1}^{4s-1} (\la_1+\la_2)^\ell \le 5n^{-1/3}O(1)^{o(\log n)} \le n^{-1/4} \] if $n$ is large enough. Hence, the probability that such a subpath is present is at most $n^{-1/4}$, and so is the probability that $\mathcal{P}$ fails, completing the proof. \end{proof} Let $\tG_v[t]$ be the subgraph of $\tG$ formed by the vertices within distance $t$ of $v$, noting that for $t\le 2s$ this graph is by definition a tree. For an event $\mathcal{E}$ of the branching process, which depends only on the first $t\le 2s$ generations we say that a vertex $v\in V(\tG)$ has property $\mathcal{E}$ if $\tG_v[t]$ has property $\mathcal{E}$, when viewed as a branching process rooted at $v$. In order to couple $\tG_v[t]$ to a branching process we will use the following exploration process. Let $W$ be a set of vertices in $\tG$ and $t\le 2s$. We explore the neighbourhood of the vertices $W$ until depth $t$ in the following manner. Initially we set every vertex in $W$ `active' and all other vertices `untested'. We perform the following for each vertex $w\in W$ one after the other. In each step we pick an `active' vertex $u$ closest to $w$, and expose one by one the edges between $u$ and the 'untested' vertices. The newly discovered neighbours of $u$ are set as `active', while the state of $u$ is changed to 'tested'. We abandon the exploration process associated to a given $w$ if there are no active vertices at distance less than $t$ from $w$ or we reach $n^{1/15}$ vertices. We refer to this as running the exploration process on $W$ until depth $t$. Note that, we are essentially performing a breadth-first search starting at each $w\in W$, excluding the vertices in $W$ and the previously discovered vertices at every stage of the exploration process. This exploration process creates a forest, where each tree within the forest contains exactly one vertex from $W$. Denote by $T_w$ the graph discovered during the exploration process associated to $w$. (If the exploration is abandoned, $T_w$ is whatever has been discovered at the point of abandonment.) \begin{lemma}\label{lem:coupling} Let $W\subseteq V(\tG)$ such that $|W|\le n^{3/5}$ and $t\le 2s$. Run the exploration process on $W$ until depth $t$. Then for any $w\in W$ we may couple each $T_w$ to agree with $X_{\phigh}[t]$ with probability $1-o(1)$. \end{lemma} \begin{proof} Note that at the end of each step of the exploration process there are no edges incident to `untested' vertices. Therefore, when selecting an active vertex $u$, by Lemma~\ref{l_small}, as long as we have reached at most $n^{2/3}$ vertices, conditional on everything so far each red edge is present with probability $(1+O(n^{-1/4}))\la_1/n$, while each blue edge is present with probability $(1+O(n^{-1/4}))\la_2/n$. As the number of untested vertices is $n-O(n^{2/3})$, we may couple the number of new red and blue neighbours of $u$ found with a Poisson distribution with mean $\la_1$ and $\la_2$ respectively so that the two numbers agree with probability $1-O(n^{-1/4})$. By Lemma~\ref{lem:small} \whp, $\Xl{\phigh}[2s]$ contains at most $n^{1/15}$ particles, implying that \whp\ the exploration process for each $w$ also contains at most $n^{1/15}$ vertices and the result follows. \end{proof} For a double graph $G$ on $n$ vertices let $U(G)$ be the maximal subset of vertices of $G$ such that in the subgraph spanned by $U$ every vertex is found in both a red and a blue tadpole graph (a tadpole graph is a cycle and a path joined at a vertex, in our case the path may be empty). Note that $U(G)$ is well defined and unique as it can be created by repeatedly removing any vertex which is not contained in both a red and blue tadpole within the graph spanned by the remaining vartices. In the following lemma we show that \whp\ the number of vertices with property $\ca$ is large and every vertex with property $\ca$ is contained in $U(\tG)$. \begin{lemma}\label{lem:size} The number of vertices of $\tG$ with property $\ca$ is \whp\ at least $\beta(\plow)n$. In addition \whp\ every vertex with property $\ca$ is in $U(\tG)$. \end{lemma} \begin{proof} Let $v$ be a vertex of $\tG$, and run the exploration process on $\{v\}$ until distance $2s$. Lemma~\ref{lem:coupling} implies that $\tG_v[2s]$ and $\Xl{\phigh}[2s]$ can be coupled as to agree in the natural sense \whp. Therefore $v$ has property $\ca$ with probability $\Prl{\phigh}{\ca}+o(1)$. Write $A$ for the set of vertices with property $\ca$. Clearly $\Exp{|A|}=\Prl{\phigh}{\ca}n+o(n)$. By Lemma~\ref{l_small} the probability that two vertices are within distance $2s$ is at most $$\sum_{i=1}^{2s}n^{i-1}\left(\frac{\la_1}{n}+\frac{\la_2}{n}\right)^{i}=o(1),$$ implying $\Var(|A|)=o(n^2).$ Hence (by Chebyshev's inequality) and \eqref{eq:alower}, $|A|/n$ converges in probability to $$ \Prl{\phigh}{\ca}\ge\beta(\plow). $$ All that is left to show is that \whp\ every vertex with property $\ca$ is in $U$. Condition on $v$ having property $\ca$. Let $u_1,\ldots,u_k$ be all the offspring of~$v$ with property $\ca_T$. Since $v$ has property~$\ca$ we know that $k\geq2$ and that there is at least one red offspring and one blue offspring within $u_1,\ldots,u_k$. We do not commit ourselves to a particular choice of red or blue offspring at this stage, as we need some flexibility later. Similarly as before run the exploration process on $\{v\}$ until depth $2s$. Note that by Lemma~\ref{lem:small} the exploration process is abandoned with probability $o(n^{-1})$ and this bound also holds when conditioning on $v$ having property $\ca$ as this event has probability $\Theta(1)$. Choose any offspring $u_i$ and let $S_i$ be the set of vertices in generation $s-1$ in the subtree rooted at~$u_i$. We now examine the vertices $w\in S_i$ one by one and mark each of these vertices if it has property $\ca$ in the tree $\tG_v[2s]$ rooted at $v$. By Lemma~\ref{lem:coupling} we can couple $\tG_v[2s]$ to the branching process $\Xl{\phigh}[2s]$ with probability $1-o(1)$. Note that conditioning on $v$ having property $\ca$ affects only the first $s$ generations of the branching process. Therefore the subtree rooted at $w$ can be coupled to the branching process $\Xl{\phigh}[s]$ with probability $1-o(1)$. Hence the probability that we mark $w$ is at least $\Prl{\phigh}{\ca}-o(1)$. Note that $\Prl{\phigh}{\ca_T}$ is bounded away from $\Prl{\pmed}{\ca_T}$ and thus \begin{align*} \Prl{\phigh}{\ca}-o(1) &=\Ppo{\Po\left(\la_1\Prl{\phigh}{\ca_T}\right)>0}\Ppo{\Po\left(\la_2\Prl{\phigh}{\ca_T}\right)>0}-o(1)\\ &\ge\Ppo{\Po\left(\la_1\Prl{\pmed}{\ca_T}\right)>0}\Ppo{\Po\left(\la_2\Prl{\pmed}{\ca_T}\right)>0}\\ &\stackrel{\mathclap{\mathrm{Lem. \ref{lem:branchprob}}}}{\ge}\>\>\, \Ppo{\Po\left(\la_1\beta(\plow)\right)>0}\Ppo{\Po\left(\la_2\beta(\plow)\right)>0}\\ &\stackrel{\eqref{eq:xi}}{\ge} \Ppo{\Po\left((\la_1-\xi)\beta(\pmed)\right)>0}\Ppo{\Po\left((\la_2-\xi)\beta(\pmed)\right)>0}\\ &=\beta(\pmed). \end{align*} In summary we can view each $w\in S_i$ as marked independently with probability (at least) $\beta(\pmed)$. Now, in the tree $\tG_v[s]$ rooted at $v$, every offspring $u_i$ has property $\ca_T$, and every vertex at depth $dT+L$ starting from $u_i$ has property $\ca$ with probability at least $\beta(\pmed)$. Since $T/\log\log n\to \infty$, we have $4^{-(2^T+2)d}\le n^{-3}$ if $n$ is large enough. Hence, from Lemma~\ref{lem:branchprob}, with probability $1-o(n^{-1})$ all of the vertices $u_1,\ldots,u_k$ have property $\br_{dT+L} \of \ca$. Note that the failure probability is small enough that this situation holds whp uniformly over vertices $v$ satisfying~$\ca$. Suppose that this is the case. Then, certainly, $v$ has property $\br_{1+dT+L} \of \ca$. More than that, the fact that $v$ has property $\br_{1+dT+L} \of \ca$ is witnessed by any choice of a red offspring~$u_i$ and blue offspring~$u_j$. For each $i,j\in[k]$ with $u_i$ red and $u_j$ blue, choose a minimal subtree of~$\tG$ containing $u_i$ and $u_j$ witnessing that $v$ has property $\br_{1+dT+L} \of \ca$. (A minimal subtree is a balanced binary red-blue tree of depth $1+dT+L$.) Let the collection of all such subtrees, ranging over feasible $i,j\in[k]$, be denoted~$\cT_v$. Note that if $\tau\in\cT_v$ is any such subtree, then each leaf of $\tau$ has property~$\ca$ (in the graph $\tG$ excluding the vertices of $\tau$). Let $U^\circ=\bigcup_v \bigcup_{\tau\in\cT_v}V(\tau)$, where the first union is over all vertices~$v$ with property $\ca$. With probability $1-n\,o(n^{-1})=1-o(1)$, we have that $|\cT_v|>0$ for every vertex $v$ with property~$\ca$. It follows that all vertices with property $\ca$ are contained in $U^\circ$. On the other hand, it is not too difficult to see that $U^\circ\subseteq U(\tG)$. Take any vertex $u\in U^\circ$. By definition of $U^\circ$ we must have $u\in V(\tau)$ for some $\tau\in\cT_v$. Trace a red path in $\tau$ from~$u$ to a leaf~$w$ of~$\tau$. Now pick a suitable tree from $\cT_w$ (i.e., one that shares only vertex $w$ with~$\tau$) and trace a red path in it from $w$ to a leaf~$w'$. Note that we have included sufficiently many trees in $\cT_w$ that we can avoid using the parent of~$w$. Then repeat, tracing a red path from~$w'$, etc. This process will terminate when the path intersects itself, at which point we have a red tadpole. Clearly, the same construction works for blue tadpoles. \end{proof} Lemma~\ref{lem:size} implies that \whp\ $A$, the set of vertices with property $\ca$, is a subset of~$U(\tG)$. Next we will show that $U(\tG)\subseteq B_{s}$, where $B_{s}$ is the set of vertices with property $\br_s$. \begin{claim}\label{clm:UinB} For every $v\in U(\tG)$ we have that $v$ has property $\br_s$. \end{claim} \begin{proof} We will show that that $v$ has property $\br_s$ already within the subgraph of $\tG$ spanned by $U(\tG)$. Every vertex $v$ in $U(\tG)$ lies within a red tadpole; choose a tadpole for each~$v$ and form the union of tadpoles over all vertices $v\in U(\tG)$. The resulting graph has the property that each of its connected components has at least one cycle. We can therefore choose a red subgraph $(U(\tG),F_r)$ of $\tG$ such that every connected component of $(U(\tG),F_r)$ is unicyclic. Orient the edges in each cycle of $(U(\tG),F_r)$ consistently, and orient all other other edges towards the unique cycle in their component. Repeat the process to obtain a blue subgraph $(U(\tG),F_b)$ together with an orientation. Let $v$ be any vertex in $U(\tG)$. There is a unique oriented red edge $(v,u_r)$ leaving $v$ and a unique oriented blue edge $(v,u_b)$ leaving $v$. Make $u_r$ and $u_b$ the offspring of $v$. There are unique red and blue oriented edges leaving $u_r$ and $u_b$, so the process can be repeated. The choice of orientations for the edges of $(U(\tG),F_r)$ and $(U(\tG),F_b)$ ensures that the process never gets stuck. In addition up to depth $s$, no cycles are created, as the girth of $\tG$ is at least $4s$. Thus there is a complete red-blue binary tree of depth $s$ rooted at~$v$, witnessing the fact that $v$ has property~$\br_s$. \end{proof} In order to prove Proposition~\ref{prop:size2} we need to show that every red component and every blue component within $U(\tG)$ has size at least $n^{3/5}$. Consider a red component within $U(\tG)$. Any such component must contain a connected unicyclic spanning subgraph. In addition every vertex within the component must have a blue neighbour in~$U(\tG)$, and no vertex in the component may have a red neighbour outside of $U(\tG)$ that has a blue neighbour in~$U(\tG)$. The condition of being a component of $U(\tG)$, being a global one, is difficult to deal with. Therefore we look first at an event that is closely related, but which refers only to local conditions. For $W\subset V$ let $\mathcal{C}_r(W)$ be the event that \begin{itemize} \item $W$ contains a red connected unicyclic spanning subgraph; \item every vertex in $W$ has a blue neighbour in $B_s$; \item no vertex in $W$ has a red neighbour in $V\setminus W$ with a blue neighbour in $A$. \end{itemize} The event $\mathcal{C}_b(W)$ is defined analogously for blue components, i.e., the two colours are swapped. Set $\mathcal{C}$ as the event that there exists $W\subseteq V$ with $T\le |W|\le n^{3/5}$ such that either $\mathcal{C}_r(W)$ or $\mathcal{C}_b(W)$ holds. Intuitively, $\mathcal C$ is a necessary local condition for connected components of intermediate size $T\le k\le n^{3/5}$ to exist. We show in the next lemma that $\mathcal C$ is a low probability event. After that, we just need to relate the local event to the global one that is of actual interest. \begin{lemma}\label{lem:nosmallcomp} Whp the event $\mathcal{C}$ fails to hold in $\tG=\tG(n,\la_1,\la_2)$. \end{lemma} \begin{proof} We will examine the probability of the events in the definition of $\mathcal{C}_r(W)$ one by one when $W$ contains $k$~vertices. Denote by $\mathcal{U}_r(W)$ the event that $W$ contains a red connected unicyclic spanning subgraph. The number of connected unicyclic graphs on $k$ vertices is at most $k^k$, as there are $k^{k-2}$ ways to select a spanning tree on $k$~vertices and fewer than $k^2$ ways to select an additional edge. Therefore by Lemma~\ref{l_small} the probability that $\mathcal{U}_r(W)$ holds is at most $$\Ppo{\mathcal{U}_r(W)}\leq k^k \left(\frac{\la_1}{n}\right)^k.$$ Note that until this point we have only exposed red edges in~$W$. Denote by $\tG_w'[s+2]$ the subtree of $\tG_w[s+2]$ created by removing every red neighbour of $w$ within $W$ and any descendents these vertices might have. Recall that $\mathcal{J}$ is the event that the root of the branching process has a blue offspring with property $\br_s$ and it does not have a red offspring that has a blue offspring with property~$\ca$. Therefore the event that $w$ has a blue neighbour in $B_s$ and $w$ does not have a red neighbour in $V\setminus W$ with a blue neighbour in $A$ is equivalent to the event that $\mathcal{J}$ holds for $\tG_w'[s+2]$. Now run the exploration process on $W$ until depth $s+2$. Recall that $T_w$ is the tree discovered from vertex~$w$, and since the exploration process doesn't explore any edge between the initially active vertices we have that $T_w\subseteq \tG_w'[s+2]$. Then the event $\tG_w'[s+2]$ has property $\mathcal{J}$ is contained in the union of events $T_w$ has property $\mathcal{J}$ and the event $T_w\neq \tG_w'[s+2]$. Now $T_w\neq \tG_w'[s+2]$ can occur in two different ways, either $T_w$ was abandoned or there is an unexposed edge adjacent to a tested vertex in $T_w$ other than the red edges between $w$ and $W\setminus \{w\}$. Denote by $\mathcal{J}_w$ the union of the event that $T_w$ has property $\mathcal{J}$ and the event that $T_w$ was abandoned. In addition let $\mathcal{K}_w'$ be the event that there is an unexposed edge adjacent to a tested vertex in $T_w$ other than the red edges between $w$ and $W\setminus \{w\}$. The discussion so far is summarised in the following inclusion: \begin{equation}\label{eq:Crbound'} \mathcal{C}_r(W)\subseteq \mathcal{U}_r(W)\cap \bigcap_{w\in W}\big(\mathcal{J}_w\cup \mathcal{K}'_w\big). \end{equation} Recall that in the exploration process we expose every edge between the currently selected active vertex and all untested vertices. Therefore any unexposed edge adjacent to a tested vertex in $T_w$ must be between $T_w$ and $T_{w'}$ for some $w'\in W \setminus\{w\}$. Consider an auxiliary graph $H$ with vertex set $W$, where two vertices are connected if there is an edge between the corresponding exploration processes other than a red edge connecting the roots. Note that the edges we consider between $T_w$ and $T_{w'}$ are either not present or have not been exposed. Therefore by Lemma~\ref{l_small} the probability that there is an edge between $T_w$ and $T_{w'}$ is at most $n^{2/15}(\la_1/n+\la_2/n)\le n^{-4/5}$. Therefore $G(W,n^{-4/5})$ provides an upper coupling on $H$ independently of the result of the exploration processes. For some $W'\subseteq W$ denote by $\mathcal{K}(W')$ the event that in $G(W,n^{-4/5})$ the set of vertices with positive degree corresponds to $W'$. Therefore \begin{equation}\label{eq:Crbound} \bigcap_{w\in W}\big(\mathcal{J}_w\cup \mathcal{K}'_w\big)\subseteq\bigcup_{W'\subseteq W}\left[\mathcal{K}(W')\cap \bigcap_{w\in W\setminus W'}\mathcal{J}_w\right]. \end{equation} Note that $\mathcal{K}(W')$ is independent of $\bigcap_{w\in W\setminus W'}\mathcal{J}_w$ implying $$\Ppo{\mathcal{K}(W')\cap \bigcap_{w\in W\setminus W'}\mathcal{J}_w} =\Ppo{\mathcal{K}(W')}\Ppo{\bigcap_{w\in W\setminus W'}\mathcal{J}_w}.$$ Now $\mathcal{K}(W')$ is contained in the event that $G(W',n^{-4/5})$ contains at least $|W'|/2$ edges which has probability at most $$\Ppo{\mathcal{K}(W')}\le\binom{|W'|^2/2}{|W'|/2}\left(n^{-4/5}\right)^{|W'|/2}\le \Big(e|W'|n^{-4/5}\Big)^{|W'|/2}\le n^{-|W'|/12}.$$ In addition Lemma~\ref{lem:brancomp}, Lemma~\ref{lem:small} and Lemma~\ref{lem:coupling} imply $$\Ppo{\bigcap_{w\in W\setminus W'}\mathcal{J}_w}=\Big(\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\big(-\la_1\Ppo{\Po(\la_2 \beta(\plow))>0}\big)+o(1)\Big)^{|W\setminus W'|}.$$ Therefore \begin{align} &\Ppo{\bigcup_{W'\subseteq W}\left(\mathcal{K}(W')\cap \bigcap_{w\in W\setminus W'}\mathcal{J}_w\right)}\notag\\ &\le \sum_{\ell=0}^{k}\binom{k}{\ell}n^{-\ell/12}\Big(\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\big(-\la_1\Ppo{\Po(\la_2 \beta(\plow)>0}\big)+o(1)\Big)^{k-\ell}\notag\\ &= \Big(\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\big(-\la_1\Ppo{\Po(\la_2 \beta(\plow)>0}\big)+o(1)+n^{-1/12}\Big)^k\notag\\ &=\Big(\Ppo{\Po(\la_2 \beta(\phigh)>0}\exp\left(-\la_1\Ppo{\Po(\la_2 \beta(\plow))>0}\right)+o(1)\Big)^k,\label{eq:long} \end{align} where in the penultimate equality we used the binomial theorem and in the last equality we use $n^{-1/12}=o(1)$. Putting together \eqref{eq:Crbound'}, \eqref{eq:Crbound}, and \eqref{eq:long}, and recalling that the event $\mathcal{U}_r(W)$ is independent of the other events, \begin{align} &\sum_{\substack{W\subseteq V\\T\le |W|\le n^{3/5}}}\Ppo{\mathcal{C}_r(W)}\nonumber\\ &\le \sum_{k=T}^{n^{3/5}} \binom{n}{k} k^k\left(\frac{\la_1}{n}\right)^{k} \Big(\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\left(-\la_1\Ppo{\Po(\la_2 \beta(\plow))>0}\right)+o(1)\Big)^k\nonumber\\ &\le \sum_{k=T}^{n^{3/5}} \Big(e\la_1\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\left(-\la_1\Ppo{\Po(\la_2 \beta(\plow))>0}\right)+o(1)\Big)^k\nonumber\\ &\le \sum_{k=T}^{n^{3/5}} \Big(e\la_1\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\left(-\la_1\Ppo{\Po(\la_2 (\beta(\phigh)-\eps))>0}\right)+o(1)\Big)^k \label{eq:probofC} \end{align} where the last inequality follows from \eqref{eq:deltaspec}. By \eqref{eq:epssmall} we have $$e\la_1\Ppo{\Po(\la_2 \beta(\phigh))>0}\exp\left(-\la_1\Ppo{\Po(\la_2 (\beta(\phigh)-\eps))>0}\right)<1,$$ and thus \eqref{eq:probofC} is $o(1)$ when $n$ is large enough. A similar bound holds for the sum of $\Ppo{\mathcal{C}_b(W)}$. Since $$ \mathcal{C}=\bigcup_{\substack{W\subseteq V\\T\le |W|\le n^{3/5}}}\!\!\mathcal{C}_r(W)\cup\mathcal{C}_b(W) $$ the result follows. \end{proof} Now we have everything needed to prove Proposition~\ref{prop:size2}. \begin{proof}[Proof of Proposition~\ref{prop:size2}] Note that the event $|U'(G)|\ge x$ is monotone increasing for any $x\ge 0$. Since not having a cycle of length at most $4s$ is a decreasing event, by Harris's Lemma we have $$\Ppo{|U'(\tG(n,\la_1/n,\la_2/n))|\ge x}\le \Ppo{|U'(G(n,\la_1/n,\la_2/n))|\ge x}.$$ Next we will compare the sets $U(\tG)$ and~$U'(\tG)$. For $W\subset V$ let $\mathcal{C}_r'(W)$ be the event that \begin{itemize} \item $W$ contains a red connected unicyclic spanning subgraph; \item every vertex in $W$ has a blue neighbour in $U(\tG)$; \item no vertex in $W$ has a red neighbour in $V\setminus W$ with a blue neighbour in $U(\tG)$. \end{itemize} (This is the global version of the event analysed in Lemma~\ref{lem:nosmallcomp}.) In addition let $\mathcal{C}_b'(W)$ be the analogous events for blue components, i.e., the two colours are swapped. Let $\mathcal{C}'$ be the event that there exists $W\subseteq U(\tG)$ with $T\le |W| \le n^{3/5}$ such that either $\mathcal{C}_r'(W)$ or $\mathcal{C}_b'(W)$ holds. Noting that every component in $U(\tG)$ has size at least~$T$, event $\overline{\mathcal{C}'}$ implies $U'(\tG)\supseteq U(\tG)$. By Lemma~\ref{lem:size} and Claim~\ref{clm:UinB}, \whp, $A\subseteq U(\tG)\subseteq B_s$. These inclusions imply $\mathcal{C}_r'(W)\subseteq \mathcal{C}_r(W)$ and $\mathcal{C}_b'(W)\subseteq \mathcal{C}_b(W)$, which in turn imply $\mathcal{C}'\subseteq \mathcal{C}$. By Lemma~\ref{lem:nosmallcomp}, $\overline{\mathcal{C}}$ holds \whp, and hence $\overline{\mathcal{C}'}$ also holds \whp. Lemma~\ref{lem:size} states that \whp\ $|U(\tG)|\ge \beta(\plow)n$, from which $$|U'(G)|\ge |U(G)|\ge\beta(\plow)n \stackrel{\eqref{eq:deltaspec}}{\ge} \beta(\phigh)n-\eps n,$$ \whp, and the result follows as this inequality holds for arbitrary $0<\eps<\eps_0$. \end{proof} \section{Proofs of Theorem~\ref{thm:main} and \ref{thm:aux}}\label{sec:proofs} Let $G_v[t]$ be the subgraph of $G$ formed by vertices at distance at most $t$ from $v$. \begin{claim}\label{clm:gianthasB} If $v$ is in a joint component of size larger than one then for every $t>0$ either $G_v[t]$ contains a cycle, or $G_v[t]$ is a tree and $G_v[t]$ has property $\br_t$ when viewed as a branching process rooted at $v$. \end{claim} \begin{proof} Let $J$ be the subgraph of $G$ spanned by the joint component of $v$. The result follows if we can show that if $J_v[t]$ is a tree then $J_v[t]$ has property $\br_t$, when viewed as a branching process rooted at $v$. We will give a procedure for marking vertices in the tree $J_v[t]$ that terminates with a complete red-blue binary subtree in $J_v[t]$ of depth $t$ being marked. This subtree is a witness to $v$ having property $\br_t$. First mark $v$. Since $J$ is connected in the red graph, there must be a red path from $v$ to some leaf of $J_v[t]$. Let the first vertex on this path be $u_r$. Similarly, let $u_b$ be the first vertex in some blue path from $v$ to a leaf of $J_v[t]$. Mark $u_r$ and $u_b$. By construction, there is a red path from $u_r$ to a leaf of $J_v[t]$ lying completely in the subtree of $J_v[t]$ rooted at~$u_r$. Also, since $J$ is connected in the blue graph, there must also be a blue path from $u_r$ to a leaf of $J_v[t]$, and this path necessarily lies within the subtree of $J_v[t]$ rooted at~$u_r$. A similar argument applies to the vertex~$u_b$. The situation at $u_r$ and $u_b$ replicates the situation that existed at the root $v$ of $J_v[t]$, so we can continue the marking process until we reach the leaves. The result is a witness to~$v$ having property $\br_t$. \end{proof} \begin{proof}[Proof of Theorem~\ref{thm:main}] For the lower bound our aim is to show that for every $\eps>0$ \whp\ the size of the joint-giant is at least $\beta(\porig)n-2\eps n$. If $\beta(\porig)=0$ there is nothing to prove. Recall that $\beta(\la_1,\la_2)$ is continuous, therefore for every $\eps>0$ there exists a $\delta$ such that $\beta(\la_1-\delta,\la_2-\delta)>\beta(\la_1,\la_2)-\eps$ and $\beta(\la_1-\delta,\la_2-\delta)\in \mathbb{R}^2\setminus C$. We will expose the edges of $G(n,\la_1/n,\la_2/n)$ in two rounds. First we expose the edges of $G(n,(\la_1-\delta)/n,(\la_2-\delta)/n)$ and then merge this graph with a copy of $G(n,\delta/n,\delta/n)$, which provides a lower coupling for $G(n,\la_1/n,\la_2/n)$. Expose all the edges in $G(n,(\la_1-\delta)/n,(\la_2-\delta)/n)$. Applying Proposition~\ref{prop:size2} to $G(n,(\la_1-\delta)/n,(\la_2-\delta)/n)$ we have \whp\ that $$|U'(G(n,(\la_1-\delta)/n,(\la_2-\delta)/n))|\ge \beta(\la_1-\delta,\la_2-\delta)n-o(n)\ge (\beta(\porig)-2\eps)n,$$ for large enough $n$. Recall that every red component in $U'(G(n,(\la_1-\delta)/n,(\la_2-\delta)/n))$ has size at least $n^{3/5}$ and note that there are at most $n$ such components. Therefore the probability that there exists a pair of red components in $U'(G(n,(\la_1-\delta)/n,(\la_2-\delta)/n))$ with no red edge between these components in $G(n,\delta/n,\delta/n)$ is at most $$ n^{2}(1-\delta/n)^{n^{6/5}}\le n^2 \exp\left(-\delta n^{1/5}\right)=o(1).$$ An analogous proof for the blue graph completes the proof of the lower bound. Now for the upper bound. Let $s\to \infty$ satisfy $s=o(\log{n})$. Claim~\ref{clm:gianthasB} implies that if $v$ is in a linear sized joint component then either $G_v[s]$ contains a cycle, which occurs with probability at most $$\sum_{\ell=2}^{2s} n^{\ell-1}\left(\frac{\la_1+\la_2}{n}\right)^{\ell}= o(1)$$ or $G_v[s]$ is cycle-free and when viewed as a branching process rooted at $v$ it has property $\br_s$, which occurs with probability at most $\beta(\porig)+o(1)$. Write $N$ for the number of vertices satisfying one of these two conditions. Then $\Exp{N}=\beta(\porig)n+o(n)$. Recall that the probability that a pair of vertices are within distance $2s$ is $o(1)$, implying that $\mathrm{Var}(N)=o(n^2)$, and thus by Chebyshev's inequality the number of such vertices is concentrated around its expectation providing the upper bound. We have just proven that \whp\ the number of vertices in the joint-giant matches the number of vertices in components of linear size up to an additive term of $o(n)$, implying that there is a unique linear sized joint component. \end{proof} \begin{proof}[Proof of Theorem~\ref{thm:aux}] Note that any joint component must contain both a red and a blue spanning tree. The probability that there exists a component of size between $3$ and $\eps n$ is at most \begin{align*} \sum_{k=3}^{\eps n} \binom{n}{k}k^{2k-4} \left(\frac{\la_1}{n}\right)^{k-1} \left(\frac{\la_2}{n}\right)^{k-1} & \le \sum_{k=3}^{\eps n} \frac{n^2}{\la_1\la_2 k^4}\left(\frac{en}{k}\right)^k k^{2k}\left(\frac{\la_1}{n}\right)^k \left(\frac{\la_2}{n}\right)^k\\ &= \sum_{k=3}^{\eps n} \frac{n^2}{\la_1\la_2 k^4}\left(\frac{e\la_1 \la_2 k}{n}\right)^k=o(1) \end{align*} when $\eps< (e \la_1\la_2)^{-1}$. \end{proof} \section*{Acknowledgement} We thank an anonymous referee for carefully reading the manuscript and suggesting improvements. \bibliographystyle{plain}
\section{Introduction} \label{sec:intro} Type~Ia supernovae (SNe~Ia) are some of the most important events in astrophysics.\footnote{See reviews by \citet{yun00}, \citet{hil13}, \citet{mao14}, \citet{mag17}, and \citet{sei17}.} They are the basis for the Nobel Prize-winning measurement of cosmological acceleration \citep{rie98,per99}. They are also the origin of most of the iron and some of the elements adjacent in atomic number to iron (Fe-peak elements) in the Galaxy \citep{nom84a}. Despite their importance, there remain outstanding questions about the physics of the explosions and the nature of their progenitors. They result from the explosions of carbon/oxygen white dwarfs \citep[WDs;][]{arn69} in binary systems, but the details of the burning and even the numbers of WDs involved are hotly debated. Resolving these questions might provide a physical basis for the use of SNe~Ia as standardizable candles \citep{phi93}, thus justifying their widespread use as cosmological tools. Models of SNe~Ia have been developed over the past five decades. The first models supposed that a WD grew in mass by the accretion of hydrogen from a red giant companion \citep{whe73}. When the WD neared the Chandrasekhar mass ($M_{\rm Ch}$), its core reached sufficiently high temperature and density to ignite carbon. \citet{nom84b} first calculated the nucleosynthesis of SNe~Ia exploding with a mass near $M_{\rm Ch}$. They found that the rate of carbon burning strongly affected the elements produced. If the WD {\it detonated} supersonically, i.e., on a timescale faster than the dynamical time, it produced Fe-group elements but almost no Si. In order to explain the Si present in the spectra of SNe~Ia, \citeauthor{nom84b}\ invoked {\it deflagration}, whereby a carbon-burning flame consumes the WD subsonically, i.e., more slowly than the dynamical time. A hybrid of deflagration and detonation \citep{kho91,iwa99} can achieve the appropriate balance of Si-group and Fe-group elements. In this model, an initial deflagration gives way to a detonation. The model is called ``delayed detonation'' or ``deflagration-to-detonation transition'' (DDT)\@. The deflagration burns material at high density, but it also allows the WD to expand and become less dense before the detonation consumes the remainder of the carbon. The details of the nucleosynthesis depend heavily on the structure of the progenitor WD and the physics of the carbon ignition \citep[e.g.,][]{leu18,byr19}, as well as the implementation of the hydrodynamics and the dimensionality of the simulation code \citep[e.g.,][]{mae10,sei13a}. The near-$M_{\rm Ch}$ model has confronted some obstacles. For example, there are very few observed WDs with masses approaching $M_{\rm Ch}$ \citep{gia12,kle13}, which would be the progenitors for near-$M_{\rm Ch}$ SNe~Ia.\footnote{However, at least one candidate progenitor for a future near-$M_{\rm Ch}$ SN~Ia has been discovered \citep{tan14}.} Stable accretion to build up a WD to $M_{\rm Ch}$ imposes very fine requirements on the accretion rate \citep{she07}. Furthermore, a sufficient number of WDs accreting to produce the SN~Ia rate is disfavored by X-ray observations of nearby early-type galaxies \citep{gil10}. Finally, there is a lack of companion stars associated with SN~Ia remnants as would be expected in this scenario \citep[e.g.,][]{sch12}. One possible solution to these problems is the detonation of a sub-$M_{\rm Ch}$ WD\@. Sub-$M_{\rm Ch}$ WDs are numerous enough to explain SN~Ia rates, and their range of masses can explain the range of SN~Ia luminosities \citep{she17}. In addition to the mass of the exploding WD, another outstanding question is the evolutionary path that leads to the explosion. The progenitor systems are generally grouped into ``single-degenerate'' and ``double-degenerate'' binaries involving one or more CO WDs. Both types are possible for near-$M_{\rm Ch}$ and sub-$M_{\rm Ch}$ models. The types of explosion can be classified as follows: \begin{enumerate} \item The original single-degenerate, near-$M_{\rm Ch}$ model invoked accretion of hydrogen, usually from a red giant, onto a CO WD until it reached $M_{\rm Ch}$ \citep[e.g.,][]{whe73}. More recent models \citep{yoo03,bro16} examined the transfer of helium rather than hydrogen. In this case, the He burns into C and O until the WD nears $M_{\rm Ch}$. \vspace{-2mm} \item The double-degenerate, $M_{\rm Ch}$ model supposes that two WDs that are individually below $M_{\rm Ch}$ merge slowly \citep{web84}. If the merged remnant exceeds $M_{\rm Ch}$, it will explode. This channel is now disfavored because it is expected to result in accretion-induced collapse into a neutron star \citep{sai85,sai04,tim94,she12}. \vspace{-2mm} \item The single-degenerate, sub-$M_{\rm Ch}$ model is similar to case 1. The difference is that sub-$M_{\rm Ch}$ WDs can explode if they accrete He slowly enough to accumulate a critical amount before it ignites. The eventual He ignition could be strong enough to shock the inner CO WD to thermonuclear densities and temperatures \citep{nom82,woo86}. \vspace{-2mm} \item Double-degenerate, sub-$M_{\rm Ch}$ explosions are similar to case 2. The difference is in the end phase of the merger. If He is transferred from the surface of one WD to the other, it could ignite, leading to a detonation \citep{gui10,pak13,she14,tow19}, similar to case 3. In this case, the secondary WD would survive and fly away at its final orbital velocity of thousands of km~s$^{-1}$ \citep{she18b}. Alternatively, a violent merger could directly ignite the carbon without the need for He ignition \citep{pak12}. \end{enumerate} \noindent In a variation on case 2, \citet{van10} proposed that two WDs can merge smoothly, but compressional heating from the resulting accretion disk can ignite the carbon, even if the final mass does not exceed $M_{\rm Ch}$. There is also a separate case of failed explosions in which the WD does not completely disrupt. The idea of a failed explosion is motivated by the existence of Type~Iax SNe, a class of sub-luminous SN \citep{fol13}. \citet{kro15} conjectured that Type~Iax SNe are weak deflagrations that do not disrupt the WD and that leave behind a remnant. In this scenario, the partially exploded WD would become unbound from its companion. Thus, some hypervelocity WDs might be associated with Type~Iax SNe \citep{ven17,rad18a,rad18b,rad19} rather than the sub-$M_{\rm Ch}$, double-degenerate scenario \citep[case 4 above;][]{she18b}. Type~Iax SNe likely have a limited effect on galactic chemical evolution because they probably do not eject much mass. Various individual SNe~Ia support nearly all classes of explosion. For example, ultraviolet pulses have been interpreted as the interaction of the SN shock with a red giant companion in SN~2012cg \citep[][rebutted by \citealt{sha18}]{marion16}, SN~2017cbv \citep{hos17}, and iPTF15atg \citep{cao15}, which was a peculiar explosion similar to SN~2002es \citep{gan12,whi15}. The first two discoveries support the single-degenerate, near-$M_{\rm Ch}$ model. However, H$\alpha$ emission is expected in late-time spectroscopy of SNe~Ia arising from a H-rich donor. With a few exceptions \citep[i.a.,][]{ham03,kol19}, H$\alpha$ is rarely found in late-time nebular spectra of SNe~Ia \citep{mag16,sha18,tuc19}. Furthermore, \citet{li11} and \citet{blo12} concluded that SN~2011fe did not have a red giant companion. Likewise, the light curve and spectrum of SN~1999by match a sub-$M_{\rm Ch}$ detonation but not a $M_{\rm Ch}$ DDT \citep{blo18}. For similar reasons, the peculiar SN ZTF18aaqeasu seems to have been a double detonation of a sub-$M_{\rm Ch}$ WD \citep{de19}. Furthermore, hydrodynamical models of observed SN~Ia light curves show that at least some progenitors must be below $M_{\rm Ch}$ \citep{gol18}, but with a WD mass function that peaks toward $M_{\rm Ch}$ \citep{sca14}. It is important to note that these studies are not necessarily discordant because SNe~Ia could explode through multiple channels \citep[e.g.][]{man06}. Nonetheless, the purpose of our study is to identify the {\it dominant} channel of SNe~Ia in dwarf galaxies. Nucleosynthesis predictions exist for most of these classes of models. While the nucleosynthesis distinction between single- and double-degenerate models may not be large enough to distinguish with current observational data, the mass of the exploding WD has a large effect on the production of certain elements, such as Mn and Ni \citep[e.g.,][]{sei13b}. Therefore, one way to address the nature of SNe~Ia is to measure elemental abundances in SNe~Ia, their remnants, the gas that they pollute, and the stars that form from that polluted gas. It is difficult to measure elemental abundances in the spectra of SNe~Ia because the material is optically thick and possibly highly inhomogeneous \citep{pos14}. Although it is possible to measure the abundances of some elements in SN~Ia remnants \citep[e.g.,][]{bad06,bor10,bor13,lop15,gre17,mar17}, that technique is limited to a small number of very recent explosions, and it is limited to the few elements that can be observed with X-ray spectroscopy. One of the more interesting cases is the SN~Ia remnant 3C~397, which shows enhancements of Fe-peak elements \citep{yam15,dav17}, suggesting that the progenitor was a near-$M_{\rm Ch}$ WD\@. An alternative method of quantifying SN~Ia nucleosynthesis is galactic archaeology. SNe~Ia that exploded long ago left a chemical imprint on the surrounding gas and stars. We can compare the amounts of key elements, like Mn, Fe, and Ni, in those stars to different classes of SN~Ia models. The Milky Way (MW) is the site of most galactic archaeological studies of SN physics. It is also common to compare theoretical predictions of certain models to the abundances a single star: the Sun \citep[e.g.,][]{mae10,sei13b} Dwarf galaxies provide an attractive alternative to the MW for studying SNe~Ia. Dwarf galaxies have simple star formation histories (SFHs), which makes their chemical evolution simple to interpret. The ratio of $\alpha$ elements (O, Mg, Si, and others) to Fe declines steeply with increasing metallicity in dwarf galaxies \citep{she01,ven04,kir11b}, which is the signature of a transition from core collapse supernovae (CCSNe) to SNe~Ia \citep[e.g.,][]{gil91}. As we will show in Section~\ref{sec:trends}, most of the stars in dwarf galaxies were enriched predominantly by SNe~Ia rather than CCSNe. Furthermore, the dwarf galaxies have low metallicity (${\rm [Fe/H]} \lesssim -1$). As a result, any extra neutrons in the nucleosynthesis can be attributed to the explosive events and simmering rather than metallicity (see Section~\ref{sec:theoryyields}). We present a galactic archaeological approach to identifying the nature of SNe~Ia in dwarf galaxies. We use our published catalogs of abundances of Mg, Si, Ca, and Fe \citep{kir10} as well as Cr, Co, and Ni \citep[][see Section~\ref{sec:msmts}]{kir18}. We fit a simple bi-linear model to the evolution of each element, from which we deduced the CCSN yield (Section~\ref{sec:trends}). Then, we subtract the CCSN yield to isolate the SN~Ia yield, which we compare to different classes of SN~Ia models (Section~\ref{sec:constraints}). Section~\ref{sec:discussion} discusses our conclusions in the context of the broader literature of galactic archaeological studies of SNe~Ia, and Section~\ref{sec:summary} summarizes the paper. \section{Measurements of Iron-peak Abundances in Dwarf Galaxies} \label{sec:msmts} \citet{kir10} presented a catalog of Mg, Si, Ca, Ti, and Fe abundances for 2961 red giants in eight dwarf spheroidal (dSph) satellites of the MW\@. \citet{kir18} measured Cr, Co, and Ni abundances for \ndsph\ of these stars. For the current study, we used a subset of these catalogs to draw inferences about the progenitors of SNe~Ia. Here, we give a short recounting of the measurements, which \citet{kir10,kir18} described in detail. The abundances in the catalog come from spectra obtained with DEIMOS \citep{fab03} on the Keck~II telescope. The spectral range was approximately 6300--9100~\AA, and the spectral resolution was $\Delta\lambda \sim 1.2$~\AA\ (FWHM)\@. The measurements were obtained with spectral synthesis. The syntheses themselves were computed with MOOG \citep{sne73} under the approximation of local thermodynamic equilibrium (LTE). As described by \citet{kir18}, we used the solar abundances of \citet{asp09} except for Mg and Fe. Instead, we used $12 + \log [n({\rm Mg})/n({\rm H})] = 7.58$ and $12 + \log [n({\rm Fe})/n({\rm H})] = 7.52$. We compare these observed abundances to theoretical predictions of the explosions of SNe~Ia in Section~\ref{sec:theoryyields}. Therefore, it is important to attempt to place the observed abundances on an absolute scale as closely as possible. To this end, \citet{kir18} experimented with non-LTE (NLTE) corrections to the abundances. However, they found that attempts at NLTE corrections actually resulted in decreased abundance accuracy. The accuracy was assessed by computing the dispersion of Cr and Co abundances within individual globular clusters, which are not expected to show any such dispersion. Careful attempts to apply NLTE corrections increased the dispersion from the LTE abundances. This outcome likely reflects the method in which the atmospheric parameters were determined because the NLTE corrections usually decrease this dispersion \citep{ber10,berces10}. Therefore, we used LTE abundances in this work. \citet{kir18} used the globular cluster diagnostic to quantify the systematic error in the abundances, which includes some of the error imposed by assuming LTE\@. These errors are folded into the present work. Our catalog contains only measurements with estimated uncertainties less than 0.3~dex. The stars in the catalog pass galaxy membership cuts, described by \citet{kir18}, on the basis of surface gravity (inferred from the strength of the Na~{\sc i} 8190 doublet) and radial velocity. In addition to these previous membership criteria, we applied a membership criterion based on {\it Gaia} proper motions \citep{gaiadr2}. First, we cross-matched our catalog with {\it Gaia}. Then, we calculated the mean proper motion in R.A.\ and decl.\ weighted by the inverse square of the uncertainties. Finally, we excluded stars that were more than 3$\sigma$ discrepant from this mean value. This procedure excluded between one and five stars for each dSph except Fornax, for which 22 stars were excluded. We restricted our analysis to seven dSphs. In order of decreasing stellar mass, they are Fornax, Leo~I, Sculptor, Leo~II, Draco, Sextans, and Ursa Minor. We reserve discussion of Fornax and Leo~I until Section~\ref{sec:discussion} because they show qualitatively different evolution of Fe-peak elements from the other five dSphs. As a result, the chemical evolution model we present in Section~\ref{sec:model} is too simple to capture their abundance distributions. Although Canes Venatici~I was part of the \citet{kir10,kir18} catalogs, we do not discuss it at all because its sample size is too small to draw meaningful conclusions. \section{Trends of Iron-peak Abundances in Dwarf Galaxies} \label{sec:trends} \subsection{A Simple Model of Chemical Evolution} \label{sec:model} \begin{figure} \centering \includegraphics[width=\linewidth]{f1.eps} \caption{Mg, Si, Ca, Cr, Co, and Ni abundance ratios, with respect to Fe, as observed in Sculptor (black points). A simple model (Equation~\ref{eq:fit}, red lines) was fit to the abundances. The [Mg/Fe] ratio was used to estimate the fraction of Fe ($f_{\rm Ia}$, top panel) that originated in SNe~Ia. Section~\ref{sec:obsyields} describes a method for isolating the yield ratios (e.g., ${\rm [Ni/Fe]}_{\rm Ia}$) for SNe~Ia, which are shown as green curves. Shaded bands represent the 68\% confidence intervals. Upper limits represent 95\% confidence in cases where the lower bounds of the yields were not well constrained. The dashed blue curves show the metallicity-dependent, initial mass function-averaged yields predicted for CCSNe \citep{nom06}. The dashed green line in the Mg panel shows the yield we assumed for SNe~Ia.\label{fig:scl}} \end{figure} \begin{figure} \centering \includegraphics[width=\linewidth]{f2.eps} \caption{Same as Figure~\ref{fig:scl} but for Leo~II\@.\label{fig:leoii}} \end{figure} \begin{figure} \centering \includegraphics[width=\linewidth]{f3.eps} \caption{Same as Figure~\ref{fig:scl} but for Draco\@.\label{fig:dra}} \end{figure} \begin{figure} \centering \includegraphics[width=\linewidth]{f4.eps} \caption{Same as Figure~\ref{fig:scl} but for Sextans\@.\label{fig:sex}} \end{figure} \begin{figure} \centering \includegraphics[width=\linewidth]{f5.eps} \caption{Same as Figure~\ref{fig:scl} but for Ursa Minor\@.\label{fig:umi}} \end{figure} The chemical evolution of a galaxy is often expressed as [X/Fe]\footnote{We use ``bracket notation'': ${\rm [X/Fe]} = \log \frac{n({\rm X})/n({\rm Fe})}{n_{\sun}({\rm X})/n_{\sun}({\rm Fe})}$ where $n$ is atomic number density in the star's atmosphere and $n_{\sun}$ is the number density in the Sun's atmosphere.} versus [Fe/H], where [X/Fe] is the ratio between the abundance of an element X and the abundance of Fe. The iron abundance, [Fe/H], is a proxy for the total abundance of all metals. The expected first-order behavior of [X/Fe] is constant at low metallicity but sloped---either positively or negatively---above some threshold value of [Fe/H] \citep{whe89,gil91}. This expectation is based on the assumption that CCSNe are the only nucleosynthetic sources active at early times. (However, there may be some prompt SNe~Ia that violate this assumption, as discussed by \citealt{man06}.) Under the approximation (addressed in Section~\ref{sec:ccyields}) that the CCSN yields are independent of metallicity, [X/Fe] will be constant as [Fe/H] increases up to a certain threshold metallicity, called ${\rm [Fe/H]}_{\rm Ia}$. After a delay time, corresponding to ${\rm [Fe/H]}_{\rm Ia}$, SNe~Ia begin to explode. They produce elements in a ratio [X/Fe] that may differ from CCSNe. As a result, [X/Fe] can begin to change as a function of metallicity at ${\rm [Fe/H]} > {\rm [Fe/H]}_{\rm Ia}$. The slope will be negative if SNe~Ia produce a smaller ratio of [X/Fe] than CCSNe. Figures~\ref{fig:scl} through \ref{fig:umi} show the evolution of several abundance ratios, [X/Fe], as a function of [Fe/H] for five of the dSphs in our sample. The elements (X) are the $\alpha$ elements Mg, Si, and Ca, and the Fe-peak elements Cr, Co, and Ni. The behavior of [X/Fe] follows the approximate pattern described above. For example, [Ca/Fe] in Sculptor (central panel in Figure~\ref{fig:scl}) is flat until ${\rm [Fe/H]} \approx -2.4$ and then declines nearly linearly with increasing [Fe/H]\@. We modeled this behavior as a constant ${\rm [X/Fe]}_{\rm CC}$ until ${\rm [Fe/H]}_{\rm Ia}$ followed by a sloped line thereafter. The value of ${\rm [X/Fe]}_{\rm CC}$ is the result of all of the products of early explosions, including the CCSN yields summed over the initial mass function (IMF) and any prompt SNe~Ia. Instead of parameterizing the line by a slope and intercept, we used an angle ($\theta$) and a perpendicular offset ($b_{\perp}$). This allowed us to use a uniform prior on $\theta$, which avoids the preference for shallow slopes when using a uniform prior on the slope \citep[see][]{hog10}. \begin{equation} {\rm [X/Fe]}= \begin{cases} {\rm [X/Fe]}_{\rm CC} & \text{if } {\rm [Fe/H]} \le {\rm [Fe/H]}_{\rm Ia} \\ {\rm [Fe/H]}\,\tan \theta + \frac{b_{\perp}}{\cos \theta} & \text{if } {\rm [Fe/H]} > {\rm [Fe/H]}_{\rm Ia} \end{cases} \label{eq:fit} \end{equation} \noindent Enforcing continuity of [X/Fe] at ${\rm [Fe/H]}_{\rm Ia}$ gives the following equation for $b_{\perp}$ in terms of ${\rm [X/Fe]}_{\rm CC}$, ${\rm [Fe/H]}_{\rm Ia}$, and $\theta$: \begin{equation} b_{\perp} = {\rm [X/Fe]}_{\rm CC} \cos \theta - {\rm [Fe/H]}_{\rm Ia} \sin \theta \label{eq:bperp} \end{equation} We fit the chemical evolution in each dSph with Equation~\ref{eq:fit} using maximum likelihood. There are 13 free parameters for each dSph: ${\rm [Fe/H]}_{\rm Ia}$ and one pair of $\theta$ and $b_{\perp}$ for each of the six [X/Fe] ratios. Following \citet{hog10}, the likelihood function is given by the following equations. For a star identified by index $i$ with ${\rm [Fe/H]}_i \le {\rm [Fe/H]}_{\rm Ia}$, the likelihood is relatively simple: \begin{equation} L_i = \frac{1}{\sqrt{2 \pi} \delta {\rm [X/Fe]}_i} \exp \left(-\frac{\left({\rm [X/Fe]}_i - {\rm [X/Fe]}_{\rm CC}\right)^2}{2\,\delta {\rm [X/Fe]}_i^2}\right) \label{eq:Llo} \end{equation} \noindent where $\delta {\rm [X/Fe]}_i$ represents the measurement uncertainty for star $i$. For a star with ${\rm [Fe/H]}_i > {\rm [Fe/H]}_{\rm Ia}$, the likelihood is \begin{eqnarray} L_i &=& \frac{1}{\sqrt{2 \pi} \Sigma_i} \exp \left(-\frac{\Delta_i^2}{2\Sigma_i^2}\right) \label{eq:Lhi} \\ \Delta_i &=& {\rm [X/Fe]}_i \cos \theta - {\rm [Fe/H]}_i \sin \theta - b_{\perp} \label{eq:delta} \\ \Sigma_i^2 &=& \delta {\rm [X/Fe]}_i^2 \cos^2 \theta + \delta {\rm [Fe/H]}_i^2 \sin^2 \theta \label{eq:sigma} \end{eqnarray} We imposed a prior on ${\rm [Mg/Fe]}_{\rm CC}$. The purpose of the prior was to ensure that the description of chemical evolution conforms to CCSN yields for Mg. We used predicted yields averaged over the \citet{sal55} IMF from \citet[][indicated by a subscripted ``N06'']{nom06}. The mathematical form of the prior is \begin{equation} P = \frac{1}{\sqrt{2 \pi} \sigma_{\rm Mg}} \exp \left(-\frac{\left({\rm [Mg/Fe]}_{\rm N06}-{\rm [Mg/Fe]}_{\rm CC}\right)^2}{2\sigma_{\rm Mg}^2}\right) \label{eq:mgprior} \end{equation} \noindent The prior, $P$, is multiplied into the likelihood, $L = \prod_i L_i$. The value of $\sigma_{\rm Mg}$ sets the strength of the prior. Smaller values lead to a stronger prior, forcing better agreement with the predicted yields. We chose $\sigma_{\rm Mg} = 0.01$, which we consider to be a strong prior (see Section~\ref{sec:ccyields} and Figure~\ref{fig:IIcompare}). The fitting method was Markov chain Monte Carlo (MCMC)\@. For computational expediency, we maximized $\ln L$ rather than $L$. The chain had $3.3 \times 10^5$ links. The first $3 \times 10^4$ links (commonly called ``burn-in'') were discarded. We imposed uniform priors on all free parameters ($\theta$ and $b_{\perp}$ for each element, as well as ${\rm [Fe/H]}_{\rm Ia}$). We imposed an additional prior on a value called ${\rm (X/Fe)}_{\rm Ia}$, described in Section~\ref{sec:obsyields}. The initial value of ${\rm [Fe/H]}_{\rm Ia}$ was $-2.0$, which is approximately the value at which [$\alpha$/Fe] begins to decline in most of the dSphs in our sample. The initial values of $\theta$ and $b_{\perp}$ for each element were given by a simple linear fit to the trend of [X/Fe] versus [Fe/H] for ${\rm [Fe/H]} > -2.1$. The proposal density for successive links in the chain was based on the Metropolis algorithm. The typical perturbation of ${\rm [Fe/H]}_{\rm Ia}$ and $b_{\perp}$ was 0.02~dex, and the typical perturbation of $\theta$ was $0.2^{\circ}$. The MCMC sampled the posterior distribution of these parameters. We quote the median (50$^{\rm th}$ percentile) value for each quantity. The asymmetric error bars are 68\% confidence intervals around the median. \begin{deluxetable*}{lccccc} \tablewidth{0pt} \tablecolumns{6} \tablecaption{Observationally Inferred Yields\label{tab:yields_obs}} \tablehead{\colhead{Parameter} & \colhead{Scl } & \colhead{LeoII} & \colhead{Dra } & \colhead{Sex } & \colhead{UMi }} \startdata ${\rm [Fe/H]}_{\rm Ia}$ & $-2.12_{-0.06}^{+0.01}$ & $-1.70_{-0.01}^{+0.00}$ & $-2.36_{-0.06}^{+0.03}$ & $-2.36_{-0.03}^{+0.01}$ & $-2.42_{-0.01}^{+0.00}$ \\ $\theta({\rm Mg})$ & $-42.9_{-0.6}^{+0.4}$ & $-70.4_{-1.4}^{+0.8}$ & $-52.3_{-1.6}^{+0.7}$ & $-63.1_{-1.7}^{+1.1}$ & $-48.9_{-1.7}^{+0.9}$ \\ $b_{\perp}({\rm Mg})$ & $-0.97_{-0.02}^{+0.01}$ & $-1.40_{-0.03}^{+0.02}$ & $-1.45_{-0.05}^{+0.02}$ & $-1.75_{-0.04}^{+0.02}$ & $-1.41_{-0.06}^{+0.03}$ \\ ${\rm [Mg/Fe]}_{\rm CC}$ & $+0.56 \pm 0.01$ & $+0.56 \pm 0.01$ & $+0.55 \pm 0.01$ & $+0.55 \pm 0.01$ & $+0.55 \pm 0.01$ \\ $\theta({\rm Si})$ & $-42.4_{-0.6}^{+0.4}$ & $-63.6_{-1.1}^{+0.6}$ & $-50.0_{-1.1}^{+0.6}$ & $-59.7_{-1.6}^{+0.8}$ & $-43.4_{-1.2}^{+0.7}$ \\ $b_{\perp}({\rm Si})$ & $-0.97 \pm 0.01$ & $-1.37_{-0.02}^{+0.01}$ & $-1.33_{-0.03}^{+0.02}$ & $-1.56_{-0.03}^{+0.02}$ & $-1.15_{-0.04}^{+0.02}$ \\ ${\rm [Si/Fe]}_{\rm CC}$ & $+0.54 \pm 0.02$ & $+0.29 \pm 0.04$ & $+0.60 \pm 0.04$ & $+0.68_{-0.07}^{+0.08}$ & $+0.62 \pm 0.03$ \\ ${\rm [Si/Fe]}_{\rm Ia}$ & $<-0.86$ & $-0.50_{-0.33}^{+0.18}$ & $<-0.57$ & $<-0.52$ & $-0.60_{-0.42}^{+0.24}$ \\ $\theta({\rm Ca})$ & $-30.1_{-0.9}^{+0.5}$ & $-48.5_{-1.7}^{+1.0}$ & $-30.2_{-1.8}^{+0.9}$ & $-35.4_{-3.3}^{+2.0}$ & $-37.5_{-2.0}^{+1.0}$ \\ $b_{\perp}({\rm Ca})$ & $-0.69_{-0.02}^{+0.01}$ & $-1.20_{-0.03}^{+0.02}$ & $-0.94_{-0.05}^{+0.03}$ & $-1.10_{-0.09}^{+0.05}$ & $-1.18_{-0.06}^{+0.03}$ \\ ${\rm [Ca/Fe]}_{\rm CC}$ & $+0.37 \pm 0.02$ & $+0.07 \pm 0.03$ & $+0.20 \pm 0.04$ & $+0.17_{-0.06}^{+0.07}$ & $+0.30 \pm 0.03$ \\ ${\rm [Ca/Fe]}_{\rm Ia}$ & $-0.17_{-0.05}^{+0.04}$ & $-0.24_{-0.07}^{+0.06}$ & $-0.24 \pm 0.07$ & $-0.22_{-0.09}^{+0.08}$ & $-0.43_{-0.20}^{+0.14}$ \\ $\theta({\rm Cr})$ & $ -2.9_{-1.9}^{+1.0}$ & $+48.1_{-4.2}^{+1.8}$ & $-16.9_{-4.3}^{+1.8}$ & $-29.0_{-8.1}^{+3.6}$ & $-43.0_{-1.5}^{+0.9}$ \\ $b_{\perp}({\rm Cr})$ & $-0.11_{-0.05}^{+0.03}$ & $+1.26_{-0.07}^{+0.03}$ & $-0.44_{-0.14}^{+0.06}$ & $-0.87_{-0.21}^{+0.11}$ & $-1.35_{-0.04}^{+0.02}$ \\ ${\rm [Cr/Fe]}_{\rm CC}$ & $-0.07_{-0.05}^{+0.04}$ & $-0.05 \pm 0.06$ & $+0.15 \pm 0.06$ & $-0.01_{-0.13}^{+0.18}$ & $+0.31 \pm 0.05$ \\ ${\rm [Cr/Fe]}_{\rm Ia}$ & $-0.02 \pm 0.03$ & $+0.36_{-0.05}^{+0.06}$ & $+0.09_{-0.09}^{+0.08}$ & $+0.00_{-0.14}^{+0.10}$ & $-0.75_{-0.37}^{+0.23}$ \\ $\theta({\rm Co})$ & $-41.2_{-0.7}^{+0.4}$ & $-64.0_{-1.1}^{+0.7}$ & $-48.0_{-1.4}^{+0.9}$ & $-59.1_{-2.1}^{+1.2}$ & $-46.1_{-1.7}^{+0.8}$ \\ $b_{\perp}({\rm Co})$ & $-1.13_{-0.02}^{+0.01}$ & $-1.41_{-0.02}^{+0.01}$ & $-1.43_{-0.04}^{+0.02}$ & $-1.72_{-0.04}^{+0.02}$ & $-1.36_{-0.05}^{+0.02}$ \\ ${\rm [Co/Fe]}_{\rm CC}$ & $+0.26 \pm 0.04$ & $+0.20 \pm 0.05$ & $+0.32 \pm 0.06$ & $+0.31 \pm 0.12$ & $+0.44 \pm 0.06$ \\ ${\rm [Co/Fe]}_{\rm Ia}$ & $-1.06_{-0.40}^{+0.25}$ & $-0.58_{-0.32}^{+0.20}$ & $-0.81_{-0.37}^{+0.24}$ & $<-0.60$ & $<-0.47$ \\ $\theta({\rm Ni})$ & $-13.8_{-0.7}^{+0.4}$ & $-24.1_{-4.4}^{+2.4}$ & $-25.0_{-1.8}^{+0.8}$ & $-32.4_{-2.5}^{+1.3}$ & $-32.6_{-1.1}^{+0.6}$ \\ $b_{\perp}({\rm Ni})$ & $-0.55_{-0.02}^{+0.01}$ & $-0.73_{-0.10}^{+0.06}$ & $-1.01_{-0.05}^{+0.02}$ & $-1.20_{-0.06}^{+0.03}$ & $-1.27_{-0.03}^{+0.02}$ \\ ${\rm [Ni/Fe]}_{\rm CC}$ & $-0.07 \pm 0.01$ & $-0.10_{-0.03}^{+0.04}$ & $-0.08 \pm 0.02$ & $-0.04_{-0.04}^{+0.05}$ & $-0.01 \pm 0.02$ \\ ${\rm [Ni/Fe]}_{\rm Ia}$ & $-0.26_{-0.02}^{+0.01}$ & $-0.13_{-0.04}^{+0.03}$ & $-0.43_{-0.05}^{+0.04}$ & $-0.44_{-0.06}^{+0.05}$ & $-0.68_{-0.09}^{+0.07}$ \\ \enddata \tablecomments{All values of $\theta$ are given in degrees. All other values are dex relative to the Sun. The values of ${\rm [X/Fe]}_{\rm Ia}$ are evaluated at ${\rm [Fe/H]} = -1.5$. Errors represent the 68\% confidence intervals. Asymmetric errors are quoted where the upper and lower errors differ. In cases where ${\rm (X/Fe)}_{\rm Ia}$ was consistent with zero, upper limits on ${\rm [X/Fe]}_{\rm Ia}$ represent 95\% confidence.} \end{deluxetable*} The best-fit models are shown as red lines in Figures~\ref{fig:scl} through \ref{fig:umi}. The pink regions show the 68\% confidence intervals. Table~\ref{tab:yields_obs} provides the 13 best-fit parameters for each dSph. It also provides the derived quantities ${\rm [X/Fe]}_{\rm Ia}$ and ${\rm [X/Fe]}_{\rm CC}$, which are described in Sections~\ref{sec:obsyields} and \ref{sec:ccyields}. \subsection{Observationally Inferred Yields of SNe Ia} \label{sec:obsyields} The amount of an element in a star is a combination of the various nucleosynthetic sources that contributed to its birth cloud. These sources include SNe, winds from intermediate- and low-mass stars, and even neutron star mergers. The major contributors to the elements considered in this work (Mg, Si, Ca, Cr, Fe, Co, and Ni) are CCSNe and SNe~Ia. The amount of an element X in a star can be represented as a sum of the contribution from both types of SN: \begin{equation} {\rm X}_* = {\rm X}_{\rm CC} + {\rm X}_{\rm Ia} \label{eq:x} \end{equation} \noindent We have implicitly assumed that element X has a negligible contribution from sources other than SNe and that the abundance of element X has not changed since the star's birth. We can represent the ratio of two elements in the star as a ratio of their contributions from both types of SNe. Iron is typically used as the comparison element. Bracket notation is not used in the following equations because the element ratios, e.g., (X/Fe), are linear, not logarithmic: \begin{equation} \left( \frac{{\rm X}}{{\rm Fe}} \right)_* = \frac{{\rm X}_{\rm CC} + {\rm X}_{\rm Ia}}{{\rm Fe}_{\rm CC} + {\rm Fe}_{\rm Ia}} \label{eq:xfe} \end{equation} We now define a ratio, $R$, of the amount of iron that comes from SNe~Ia compared to the amount that comes from CCSNe. \begin{equation} R \equiv \frac{{\rm Fe}_{\rm Ia}}{{\rm Fe}_{\rm CC}} \label{eq:rdef} \end{equation} \noindent Equation~\ref{eq:xfe} can be expressed in terms of $R$ by dividing the numerator and denominator on the right side by ${\rm Fe}_{\rm CC}$: \begin{eqnarray} \left( \frac{{\rm X}}{{\rm Fe}} \right)_* &=& \frac{({\rm X/Fe})_{\rm CC} + {\rm X}_{\rm Ia}/{\rm Fe}_{\rm CC}}{1 + R} \\ &=& \frac{({\rm X/Fe})_{\rm CC} + R({\rm X/Fe})_{\rm Ia}}{1 + R} \label{eq:xfer} \end{eqnarray} \noindent Equation~\ref{eq:xfer} can then be solved for $R$: \begin{equation} R = \frac{({\rm X/Fe})_{\rm CC} - ({\rm X/Fe})_*}{({\rm X/Fe})_* - ({\rm X/Fe})_{\rm Ia}} \label{eq:r} \end{equation} \noindent Alternatively, Equation~\ref{eq:xfer} can be solved for $({\rm X/Fe})_{\rm Ia}$: \begin{equation} \left( \frac{{\rm X}}{{\rm Fe}} \right)_{\rm Ia} = \frac{R+1}{R}\left( \frac{{\rm X}}{{\rm Fe}} \right)_* - \frac{1}{R}\left( \frac{{\rm X}}{{\rm Fe}} \right)_{\rm CC} \label{eq:xfeia} \end{equation} As an aside, we can also write expressions for the fractions of iron that came from SNe~Ia ($f_{\rm Ia}$) or CCSNe ($f_{\rm CC}$): \begin{eqnarray} f_{\rm Ia} &\equiv& \frac{{\rm Fe}_{\rm Ia}}{{\rm Fe}_{\rm CC} + {\rm Fe}_{\rm Ia}} = \frac{R}{R+1} \nonumber \\ &=& \frac{({\rm X/Fe})_{\rm CC} - ({\rm X/Fe})_*}{({\rm X/Fe})_{\rm CC} - ({\rm X/Fe})_{\rm Ia}} \label{eq:fIa} \\ f_{\rm CC} &\equiv& \frac{{\rm Fe}_{\rm CC}}{{\rm Fe}_{\rm CC} + {\rm Fe}_{\rm Ia}} = \frac{1}{R+1} \nonumber \\ &=& \frac{({\rm X/Fe})_* - ({\rm X/Fe})_{\rm Ia}}{({\rm X/Fe})_{\rm CC} - ({\rm X/Fe})_{\rm Ia}} \label{eq:fCC} \end{eqnarray} The ratio $R$ is defined only in terms of iron. Thus, Equation~\ref{eq:r} can be used to determine $R$ using one element, ${\rm X}_1$. The resulting value of $R$ is general for any other element, ${\rm X}_2$, as long as both ${\rm X}_1$ and ${\rm X}_2$ can be considered to come exclusively from SNe. Once $R$ is known, Equation~\ref{eq:xfeia} can be used to infer the SN~Ia yield for the ratio $({\rm X}/{\rm Fe})_{\rm Ia}$ for any element X\@. The ideal element ${\rm X}_1$ for solving Equation~\ref{eq:r} is one that has well-known yields from both CCSNe and SNe~Ia and is also measured in our spectroscopic sample. Magnesium is the element that best satisfies these criteria; it is synthesized almost exclusively in CCSNe. Nearly all models of SNe~Ia agree that virtually no Mg is produced. The ratio $R$ can be calculated from $({\rm X/Fe})_{\rm CC}$, $({\rm X/Fe})_{\rm Ia}$, and $({\rm X/Fe})_*$. We treated the first two quantities as constants, but $({\rm X/Fe})_*$ varies from star to star. In other words, $R$ is a function of time. As in Section~\ref{sec:trends}, we used [Fe/H] as a proxy for time because time is not directly observable. In principle, $R$ could be calculated for individual stars. However, this measurement would be noisy. In some cases, it could even lead to negative (unphysical) values for $R$. Therefore, we used the bi-linear chemical evolution model (Equation~\ref{eq:fit}) to average over the noise of individual measurements. The model fits directly gave ${\rm [X/Fe]}_{\rm CC}$ and ${\rm [X/Fe]}_*$ but not ${\rm [X/Fe]}_{\rm Ia}$. In the case of Mg, we adopted a value of ${\rm [Mg/Fe]}_{\rm Ia} = -1.5$. For reference, Table~\ref{tab:yields_theory} provides [Mg/Fe] predictions from a variety of SN~Ia models. The precise value is not particularly important because the ${\rm (Mg/Fe)}_{\rm Ia}$ ratio in linear units is very close to zero. We have confirmed that changing the value of ${\rm [Mg/Fe]}_{\rm Ia}$ to $-1.0$ or $-2.5$ does not qualitatively alter our inferences of ${\rm [X/Fe]}_{\rm Ia}$. We even tried ${\rm [Mg/Fe]}_{\rm Ia} = -0.3$, which is the highest predicted value for the most extreme SN~Ia model in Table~\ref{tab:yields_theory}. In this case, some of our lowest inferences of ${\rm [X/Fe]}_{\rm Ia}$, including ${\rm [Si/Fe]}_{\rm Ia}$, ${\rm [Ca/Fe]}_{\rm Ia}$, and ${\rm [Co/Fe]}_{\rm Ia}$, increased noticeably. Importantly, ${\rm [Ni/Fe]}_{\rm Ia}$, which is the ratio that most directly affects our conclusions about SNe~Ia (Section~\ref{sec:Iacompare}), barely changed. Therefore, our results do not depend much on the exact value of ${\rm [Mg/Fe]}_{\rm Ia}$. With ${\rm [Mg/Fe]}_{\rm Ia}$ in hand, we had all of the variables required to solve for $R$ as a function of [Fe/H]\@. The top panels of Figures~\ref{fig:scl} to \ref{fig:umi} show $f_{\rm Ia} = R/(R+1)$ for each of the dSphs in our sample. The values of $f_{\rm Ia}$ were calculated at each step in the MCMC chain that evaluated the parameters of the chemical evolution model. The widths of the $f_{\rm Ia}$ bands in the figures enclose 68\% of the successful MCMC trials. Once $f_{\rm Ia}$ (or alternatively, $R$) was known as a function of [Fe/H] for each dSph, Equation~\ref{eq:xfeia} gave the empirical SN~Ia yield for an arbitrary element X\@. We already assumed a value of ${\rm [Mg/Fe]}_{\rm Ia}$ to calculate $f_{\rm Ia}$. Therefore, it would not have made sense to use Equation~\ref{eq:xfeia} for Mg. On the other hand, we could infer the SN~Ia yields of [Si/Fe], [Ca/Fe], [Cr/Fe], [Co/Fe], and [Ni/Fe]. We did so by evaluating Equation~\ref{eq:xfeia} during the MCMC fitting that determined the parameters of the chemical evolution model. Negative values of ${\rm (X/Fe)}_{\rm Ia}$ are not physical. Therefore, we imposed a prior in the computation of the likelihood function to enforce non-negativity. If an iteration in the MCMC chain yielded one or more negative values of ${\rm (X/Fe)}_{\rm Ia}$, then the likelihood $L$ was made to be zero. Figures~\ref{fig:scl} to \ref{fig:umi} show in green bands the inferred yield ratios as a function of [Fe/H] for each of the dSphs in our sample. The widths of the bands reflect the 68\% confidence intervals. Table~\ref{tab:yields_obs} gives ${\rm [X/Fe]}_{\rm Ia}$ for each dSph at a reference metallicity of ${\rm [Fe/H]} = -1.5$. In some cases, the posterior distributions of ${\rm (X/Fe)}_{\rm Ia}$ are peaked toward zero, i.e., ${\rm [X/Fe]}_{\rm Ia}$ approaches $-\infty$. These cases can be interpreted as upper limits. All upper limits are quoted at the 95\% confidence level, i.e., the value below which 95\% of the MCMC iterations are found. \begin{figure*} \centering \includegraphics[width=\linewidth]{f6.eps} \caption{SN~Ia yields at ${\rm [Fe/H]} = -1.5$ inferred from observations of dSph stars (rainbow colors) compared to theoretically predicted yields for various models (described in Table~\ref{tab:models}). The dSphs are ordered from most massive (Sculptor) to least massive (Ursa Minor). For the theoretical yields, shades of red indicate yields at solar metallicity, whereas shades of blue indicate a metallicity of $10^{-1.5}~Z_{\sun}$. Lighter shading indicates fewer ignition sites (S13 and F14), lower initial density (L18), or lower-mass WDs (L19, S18, and B19). Dotted lines represent special cases: WDD2 or W7 (L18), ${\rm C/O} = 30/70$ (S18), or $\xi_{\rm CO} = 0.0$ (B19). Leftward-pointing arrows for the theoretical yields indicate yield ratios below the left limit of the plot.\label{fig:Iacompare}} \end{figure*} Figure~\ref{fig:Iacompare} shows the inferred SN~Ia yield ratios at ${\rm [Fe/H]} = -1.5$ for the five dSphs. The inferences for ${\rm [Si/Fe]}_{\rm Ia}$, ${\rm [Ca/Fe]}_{\rm Ia}$, and ${\rm [Co/Fe]}_{\rm Ia}$ are consistent within $2\sigma$ for all of the dSphs. The formal error bars on ${\rm [Cr/Fe]}_{\rm Ia}$ and ${\rm [Ni/Fe]}_{\rm Ia}$ are very small for four of the dSphs, which makes their differences appear especially significant. However, we show in Section~\ref{sec:constraints} that the differences do not complicate our conclusion about the progenitor masses of SNe~Ia. Ursa Minor's error bars on ${\rm [X/Fe]}_{\rm Ia}$ are larger than those of the other dSphs. The size of the error bar results from subtracting a large number from a large number to produce a small number. The fractional error bar (as presented in logarithmic space) is large for this operation. Interestingly, ${\rm [Ni/Fe]}_{\rm Ia}$ seems to have a significant range among the five dSphs. We constrained ${\rm [Si/Fe]}_{\rm Ia}$ to be a small value. The most constraining upper limit, provided by Sculptor, is ${\rm [Si/Fe]}_{\rm Ia} < \sifeiaulimscl$. It may seem odd that we conclude that SNe~Ia make little Si because they are classified by the presence of Si absorption in their spectra. However, not much Si production is required to induce deep Si absorption features in SNe~Ia spectra. For example, \citet{hac13} modeled the light curves of the WDD3 and W7 explosion models of \citet{iwa99}. Both models predict Si and Fe production at approximately one third the solar ratio (${\rm [Si/Fe]} = -0.5$). This is more than sufficient to produce theoretical spectra that closely resemble observed spectra of SNe~Ia. \subsection{Comparison to Theoretical Yields of CCSNe} \label{sec:ccyields} \begin{figure*} \centering \includegraphics[width=\linewidth]{f7.eps} \caption{CCSN yields inferred from observations of dSph stars compared to theoretically predicted yields (\citealt{nom06}, dashed blue line, and \citealt{heg10}, dashed brown line).\label{fig:IIcompare}} \end{figure*} It is instructive to compare the observationally inferred CCSN yields with theoretical predictions from simulations of CCSNe. Figures~\ref{fig:scl}--\ref{fig:umi} show the metallicity-dependent predicted CCSN yields of \citet{nom06} as blue dashed lines. The very slight dependence on metallicity over the metallicity range of our sample justifies our approximation that the CCSN yields are independent of metallicity. Figure~\ref{fig:IIcompare} compares the CCSN yields inferred from dSphs with the predictions of \citet{nom06} and \citet{heg10}. Both studies used one-dimensional hydrodynamical codes, but the explosion initiation was different. \citet{nom06} injected thermal energy (a ``thermal bomb''), whereas \citet{heg10} used a piston (momentum injection). In the case of \citeauthor{nom06}, we used the zero-metallicity SN (not hypernova) yields averaged over the Salpeter IMF\@. \citet{heg10} presented only zero-metallicity yields, but they varied many parameters in the simulations. We used their ``standard'' explosion model, in which a piston at the base of the oxygen shell initiated the explosion. Mixing followed the ``standard'' prescription, and the explosion energy was $1.2 \times 10^{51}$~erg. We averaged the yields over a Salpeter IMF in the range 10--100~$M_{\sun}$. The inferred yields generally agree with the predictions. The left panel of Figure~\ref{fig:IIcompare} shows that the ${\rm [Mg/Fe]}_{\rm CC}$ inferences fall exactly on the predictions of \citet{nom06}, but we effectively forced this agreement by imposing a strong prior on ${\rm [Mg/Fe]}_{\rm CC}$ (Equation~\ref{eq:mgprior}). The discrepancy between the two theoretical predictions of ${\rm [Mg/Fe]}_{\rm CC}$ raises the question whether our choice of prior \citep{nom06} affects our conclusions. To address this question, we re-evaluated all of the results of this study using a different prior. First, we note that the observed [Mg/Fe] ratios in the stars reach as high as ${\rm [Mg/Fe]}_{\rm N06}$. Therefore, it would not make sense to consider a lower value of ${\rm [Mg/Fe]}_{\rm CC}$. Instead, we considered ${\rm [Mg/Fe]}_{\rm CC} = +0.8$, roughly in line with \citeposs{heg10} prediction. While the value of ${\rm [Fe/H]}_{\rm Ia}$ did tend to decrease when assuming a larger prior on ${\rm [Mg/Fe]}_{\rm CC}$, the conclusions we draw in Section~\ref{sec:constraints} did not change. In particular, the results shown in Figure~\ref{fig:Iacompare} shifted by the size of the error bars or less. Therefore, our conclusions on the progenitors of SNe~Ia are mostly insensitive to reasonable choices of the ${\rm [Mg/Fe]}_{\rm CC}$ prior. For most galaxies, the inferences for ${\rm [Si/Fe]}_{\rm CC}$ agree well with both sets of yields, whereas the inferences for ${\rm [Ca/Fe]}_{\rm CC}$ scatter around \citeauthor{nom06}'s predictions, and the inferences for ${\rm [Cr/Fe]}_{\rm CC}$ scatter on either side of both sets of predictions. Leo~II is an outlier in ${\rm [Si/Fe]}_{\rm CC}$ and ${\rm [Ca/Fe]}_{\rm CC}$. It is possible that our bi-linear model is not as well suited to Leo~II's more extended SFH compared to the other dSphs. The inferences for ${\rm [Co/Fe]}_{\rm CC}$ exceed the predictions of both \citeauthor{nom06}\ and \citeauthor{heg10}\ by several tenths of a dex. This discrepancy could indicate that CCSNe are more neutron-rich than the simulations assumed, or it could indicate that we have not properly accounted for NLTE corrections for the Co abundance measurements \citep[see][]{kir18}. Interestingly, the inferences for ${\rm [Ni/Fe]}_{\rm CC}$ agree well with those of \citeauthor{heg10}\ but less well with those of \citeauthor{nom06} \subsection{Discussion of the Model} \label{sec:modeldiscussion} The ``kinked line'' description of chemical evolution in Section~\ref{sec:model} is simplistic. First, the chemical evolution depends sensitively on the star formation rate (SFR)\@. Any increase in SFR, such as a revived burst of star formation, will be accompanied by an increase in the ratio of CCSNe to SNe~Ia, which will bring [X/Fe] closer to the CCSN value. Therefore, the details of the shape---including deviations from a straight line---of [X/Fe] versus [Fe/H] can be predicted only if the SFH is known. Second, the model assumes that SNe~Ia have an appreciable delay time. However, empirically derived delay time distributions indicate that the minimum delay is much less than 420~Myr and possibly as small as 40~Myr \citep{mao12,mao17}. As a result, the period of chemical evolution corresponding to CCSN-only nucleosynthesis may be so short as to be irrelevant. In this case, any changes in the slope of [X/Fe] with [Fe/H] do not indicate the onset of SNe~Ia but rather a change in the SFR\@. Third, both CCSN and SN~Ia yields for some elements depend on the progenitor's metallicity \citep{woo95,nom06,pie17}. As a result, [X/Fe] may not be constant at low [Fe/H], even if there is a period of chemical evolution from CCSNe only. (However, the yields predicted by \citealt{nom06}\ have a negligible dependence on metallicity over the metallicity range of our sample, as discussed in Section~\ref{sec:ccyields}.) Fourth, the yield of a stellar population depends on the stellar IMF\@. Consequently, [X/Fe] depends not only on SFR but also on the IMF\@. Finally, the SN~Ia yields could change with time. For example, if SNe~Ia explode at masses below $M_{\rm Ch}$, the typical mass of exploding WDs could decrease over time as WDs of lower mass begin to appear \citep[e.g.,][]{she17}. Despite its simplicity, the ``kinked line'' model of chemical evolution still provides a good estimate of the ratio of CCSNe to SNe~Ia, provided that the galaxy's gas is well mixed at all times. \citet{kir11b} and \citet{esc18} showed that this assumption is reasonable for ancient dwarf galaxies (smaller than Fornax) by demonstrating that [$\alpha$/Fe] has little dispersion at a given [Fe/H]\@. As long as [Fe/H] can be used as a proxy for time, then the small dispersion in [$\alpha$/Fe] indicates that the mixing timescale is shorter than the star formation timescale. As a result, none of the shortcomings of the ``kinked line'' model enumerated in the previous paragraph leads to any ambiguity in interpreting [X/Fe] as a linear combination of CCSNe and SNe~Ia. We do need to assume that the elements considered here originate exclusively in CCSNe and SNe~Ia, which we believe to be a good assumption. \subsection{Comparison to Prior Work} \label{sec:priorwork} In nearly all of the cases studied here, the elemental ratios decline with increasing metallicity. This behavior indicates that Fe-peak elements are produced more slowly relative to Fe as the dwarf galaxies evolve. Previous studies have noted the same pattern in other dwarf galaxies. For example, \citet{coh10} demonstrated with high-resolution spectra that [Co/Fe] and [Ni/Fe] decline with increasing [Fe/H] in Ursa Minor. On the other hand, they found the two lowest-metallicity stars in their sample had [Cr/Fe] ratios significantly lower than the other stars. Although these two stars are in our sample, the signal-to-noise ratio of the DEIMOS spectra is not sufficient to measure any Fe-peak abundance other than Ni. The trend of [Cr/Fe] for the stars with $-2.5 < {\rm [Fe/H]} < -1.5$ is approximately flat in both samples. The decline of [Co/Fe] and [Ni/Fe] with increasing [Fe/H] has also been noted in more massive galaxies, such as Fornax \citep{let10,lem14} and Sagittarius \citep{sbo07,has17}. After NLTE corrections, \citet{ber10} and \citet{berces10} also measured near-solar ratios of [Cr/Fe] and declining [Co/Fe] with increasing metallicity in the metal-poor Galactic halo. Although the Large Magellanic Cloud does not seem to display these decreasing iron-peak-to-iron ratios, the ratios are sub-solar \citep{pom08}. This behavior is not limited to Co and Ni. Even Zn ($Z=30$, not measurable in our spectra) shows a downward trend of [Zn/Fe] with increasing [Fe/H] in Sculptor and other Local Group dwarf galaxies \citep{sku17}. Taken as a whole, the [Co/Fe] and [Ni/Fe] ratios of the MW's dwarf galaxies seem to follow the same pattern as [$\alpha$/Fe]. The ratios are lower than in the MW at the same metallicity, and they decline with metallicity in nearly all cases. The interpretation in the context of the above description of chemical evolution is that dwarf galaxies experienced a larger ratio of SNeIa:CCSNe than the components of the MW at comparable metallicity (the MW halo for smaller dwarf galaxies and the MW disks for the Magellanic Clouds). Furthermore, the average SN~Ia in dwarf galaxies produces stable Co and Ni in a lower proportion relative to Fe than the average CCSN\@. \section{Constraints on SNe Ia} \label{sec:constraints} The [$\alpha$/Fe] ratios in dwarf galaxies indicate that their chemical evolution is dominated by SNe~Ia at late times. This conclusion can be drawn from the low values of [O/Fe] and [Mg/Fe], among other ratios, found in the stars with higher metallicities in the dwarf galaxies \citep{she01,she03,ven04,kir11b}. The dominance of SNe~Ia makes dwarf galaxies among the best places to study the effect of SNe~Ia on chemical evolution. However, many dSphs, including the five main galaxies in this paper, have short SFHs. As a result, an individual dSph with a specific SFH may not sample all varieties of SNe~Ia, some of which could have delay times exceeding several Gyr. In Section~\ref{sec:obsyields}, we used the [Mg/Fe] ratio to estimate the amount of Fe that comes from CCSNe versus SNe~Ia in each star. We subtracted the CCSN contribution from the observed abundance ratio of each Fe-peak element to estimate the ratio from SNe~Ia only. We now compare these observationally inferred SN~Ia yields to theoretical predictions of SN~Ia yields. \subsection{Theoretical Yields of SNe Ia} \label{sec:theoryyields} \defcitealias{sei13a}{S13} \defcitealias{fin14}{F14} \defcitealias{leu18}{L18} \defcitealias{leu19}{L19} \defcitealias{she18}{S18} \defcitealias{bra19}{B19} \begin{deluxetable*}{lll} \tablewidth{0pt} \tablecolumns{3} \tablecaption{Type Ia Supernova Models\label{tab:models}} \tablehead{\colhead{Model} & \colhead{Authors} & \colhead{Description}} \startdata DDT(\citetalias{sei13a}) & \citet{sei13a} & $M_{\rm Ch}$, 3D, DDT, multiple ignition sites \\ def(\citetalias{fin14}) & \citet{fin14} & $M_{\rm Ch}$, 3D, pure deflagration, multiple ignition sites \\ DDT(\citetalias{leu18}) & \citet{leu18} & $M_{\rm Ch}$, 2D, DDT, varying initial central density \\ def(\citetalias{leu18}) & \citet{leu18} & $M_{\rm Ch}$, 2D, pure deflagration, varying initial central density \\ sub(\citetalias{leu19}) & \citet{leu19} & sub-$M_{\rm Ch}$, 2D, double detonation with He shell \\ sub(\citetalias{she18}) & \citet{she18} & sub-$M_{\rm Ch}$, 1D, detonation of bare CO WD, two choices of C/O mass ratio \\ sub(\citetalias{bra19}) & \citet{bra19} & sub-$M_{\rm Ch}$, 1D, detonation of bare CO WD, two choices of ${}^{12}{\rm C} + {}^{16}{\rm O}$ reaction rate \\ \enddata \end{deluxetable*} Several nucleosynthetic predictions have been published in the last several years for different types of SN~Ia explosions. We considered six recent studies that sampled a variety of explosion types. Table~\ref{tab:models} summarizes the salient features of the explosion simulations, which we describe in more detail below. The table assigns abbreviations to the studies: deflagration-to-detonation transition (``DDT''), pure deflagration (``def''), and sub-Chandrasekhar detonations (``sub''). The code in parentheses refers to the first author and year of publication. \citet[][\citetalias{leu18}]{leu18} simulated both DDTs and pure deflagrations. Each of the models varied some parameters that affected the nucleosynthesis. We considered a subset of those models, focusing on the models that their authors considered ``standard'' or ``benchmark'' models. Table~\ref{tab:yields_theory} gives the [Si/Fe], [Ca/Fe], [Cr/Fe], [Co/Fe], and [Ni/Fe] yield predictions from each those models. Figure~\ref{fig:Iacompare} also represents the theoretical yields as vertical lines. \vspace{4mm} {\bf DDT:} We chose two sets of near-$M_{\rm Ch}$ DDT models. Multi-dimensional simulations are particularly important for deflagrations, where the burning front is highly textured. Therefore, we considered only multi-dimensional deflagration simulations. (However, \citealt{kat19} cautioned that all multi-dimensional SN~Ia simulations to date probably have not resolved the initiation of detonation.) \citet[][\citetalias{sei13a}]{sei13a} computed 3D models with multiple off-center ignition sites in CO WDs with a central density of $\rho_c = 2.9 \times 10^9$~g~cm$^{-3}$. The model names specify the number of ignition sites. For example, N100 \citep[the original model of][]{rop12} has 100 ignition sites. Most models assume that the WD is 47.5\% ${}^{12}$C, 50\% ${}^{16}$O, and 2.5\% ${}^{22}$Ne by mass. The amount of ${}^{22}$Ne corresponds to the amount expected in a WD after the evolution of a solar-metallicity star. \citetalias{sei13a} also considered lower metallicity versions of the N100 model, which we used in our work. They also constructed models of low density, high density, and a compact configuration of ignition sites, but we did not consider them. We also considered the DDT models of \citetalias{leu18}. In contrast to the \citetalias{sei13a} models, the \citetalias{leu18} models were computed in 2D, and the detonation began at a single point in the center of the WD\@. \citetalias{leu18} simulated a variety of central densities. We considered the models at $\rho_c = \{1,3,5\} \times 10^9$~g~cm$^{-3}$. They used the same initial composition as \citetalias{sei13a}. They also treated metallicity in the way described above, but they considered a range of metallicity for most of their models. Finally, \citetalias{leu18} updated ``WDD2,'' the classic DDT model of \citet{iwa99}, with modern electron capture rates. We also considered that updated model. \vspace{4mm} {\bf Pure deflagrations:} Our comparison set also includes two sets of pure deflagrations of near-$M_{\rm Ch}$ WDs. These models are often considered to represent Type~Iax SNe \citep[e.g.,][]{kro15}. As a result, the simulated properties, like the light curve, spectrum, and nucleosynthesis yields, may not be applicable to ``normal'' SNe~Ia. \citet[][\citetalias{fin14}]{fin14} based their 3D simulations of pure deflagrations closely on the DDT models of \citetalias{sei13a}. The \citetalias{fin14} models also presumed between 1 and 1600 off-center sites of ignition, but they did not transition to detonations. They considered only solar metallicity. \citetalias{leu18} also computed pure deflagrations in addition to their DDT models. The deflagration and DDT models were exploded with the same initial values of central density and metallicity. As they did with the WDD2 model, \citetalias{leu18} also updated the pure-deflagration ``W7'' model of \citet{iwa99}. We included that model in our comparison set. W7 is the only deflagration model considered here that is computed at a variety of non-solar metallicities. \vspace{4mm} {\bf Sub-$M_{\rm Ch}$:} We also compared our inferred yields against three sets of sub-$M_{\rm Ch}$ detonations. \citet[][\citetalias{leu19}]{leu19} used the same 2D code as their earlier work. They exploded the simulated WDs using double detonation. The WDs were equal parts C and O by mass. The first detonation started in a He shell on the surface. They simulated various He shell masses ($M_{\rm He}$). The He detonation shocked the interior C and O, which caused a second detonation. They considered WD masses in the range $0.90$ to $1.20~M_{\sun}$. All models were computed at solar metallicity except the $1.10~M_{\sun}$ (``benchmark'') model, which was also computed at metallicities ranging from $0.1$ to $5Z_{\sun}$. Metallicity was approximated by the amount of ${}^{22}$Ne present. \citet[][\citetalias{she18}]{she18} simulated 1D, spherically symmetric detonations of bare CO WDs. The detonations began at the centers of the WDs. They explored the effect of the C/O ratio on the nucleosynthesis by simulating both ${\rm C/O} = 50/50$ and $30/70$, which is more representative of the ratio expected in actual WDs. They considered masses from $0.8$ to $1.1~M_{\sun}$ and metallicities from $0$ to $2Z_{\sun}$. \citet[][\citetalias{bra19}]{bra19} also conducted 1D simulations of detonations that began at the centers of sub-$M_{\rm Ch}$ WDs.\footnote{\citetalias{bra19} also simulated DDT explosions, but we did not consider them because we only considered multi-dimensional simulations of deflagrations.} They treated composition and metallicity in the same manner as \citetalias{leu19}. They also explored the effect of reducing the reaction rate of ${}^{12}{\rm C} + {}^{16}{\rm O}$ by a factor of 10. The models with the reduced reaction rate are represented by $\xi_{\rm CO} = 0.9$ in Table~\ref{tab:yields_theory}. The models with the ``standard'' reaction rate have $\xi_{\rm CO} = 0.0$. \vspace{4mm} We first discuss differences between the models before comparing the observations to theoretical predictions. First, the metallicity of the WD influences the yields, sometimes by a large amount. \citet{tim03} studied how the ${}^{22}$Ne content, which depends directly on initial metallicity, affects neutronization in the WD core. \citet{pir08} and \citet{cha08} further studied pre-explosion ``simmering,'' or convective burning in the core prior to explosion, in near-$M_{\rm Ch}$ SN~Ia progenitors. The effect of simmering is to increase the neutron excess. In effect, it makes the initial metallicity of a $M_{\rm Ch}$ SN~Ia irrelevant below a threshold metallicity. The threshold metallicity imposed by simmering has variously been estimated to be $2/3~Z_{\sun}$ \citep{pir08} or $1/3~Z_{\sun}$ \citep{mar16}. Both of these values are much larger than the most metal-rich stars in our sample. The $M_{\rm Ch}$ DDT models computed at sub-solar metallicity in Table~\ref{tab:models} do not include simmering. Therefore, it is better to compare our observationally inferred yields to the solar-metallicity DDT models. From here on, we disregard the DDT models at sub-solar metallicity. The pure deflagration models are available only at solar metallicity, and the sub-$M_{\rm Ch}$ models are not subject to simmering. Where possible, we show sub-$M_{\rm Ch}$ models interpolated to a metallicity of $Z = 10^{-1.5}~Z_{\sun}$ so that it is easier to compare with the observationally inferred yields (Section~\ref{sec:Iacompare}), which we tabulate at ${\rm [Fe/H]} = -1.5$. However, some models are available only at solar metallicity. The second column in Table~\ref{tab:yields_theory} specifies the metallicity at which the theoretical yields are given. Figure~\ref{fig:Iacompare} represents solar-metallicity models in shades of red. Models interpolated to a metallicity of $Z = 10^{-1.5}~Z_{\sun}$ are shown in shades of blue. The effect of metallicity is especially apparent in the [Co/Fe] and [Ni/Fe] sub-$M_{\rm Ch}$ yields of \citetalias{leu19}. The yields of the $1.10~M_{\sun}$ model reflect a metallicity of $Z = 10^{-1.5}~Z_{\sun}$, but modeled WDs of higher and lower masses have solar metallicity. The solar-metallicity models show a smooth gradient in yields, but the low-metallicity model is offset to lower abundance ratios. This offset results from the neutron enhancement of higher-metallicity models. The extra neutrons allow the creation of neutron-rich species, like ${}^{58}{\rm Ni}$. The choice of ignition parameters also influences the yields \citep[see the discussion by][]{fis15}. In $M_{\rm Ch}$ models, a larger number of ignition sites translates to greater pre-expansion of the WD\@. The resulting lower density leads to synthesis of more intermediate-mass elements, like Si, and fewer Fe-group isotopes, such as ${}^{56}$Ni, which decays to ${}^{56}$Fe, and ${}^{58}$Ni, which is stable. Therefore, a greater number of ignition sites---especially off-center ignitions---leads to higher [Si/Fe] yields and lower [Ni/Fe] yields. The most notable feature that distinguishes the yields of different classes of SNe~Ia is the difference in the [Ni/Fe] ratio between near-$M_{\rm Ch}$ and sub-$M_{\rm Ch}$ explosions. Higher-mass WDs have higher densities, which permit more complete burning in nuclear statistical equilibrium, including electron captures that increase the neutron density. A high neutron density favors the creation of Fe-peak elements over intermediate-mass elements. Even within the sub-$M_{\rm Ch}$ simulations, WDs of higher mass (represented by darker shades in Figure~\ref{fig:Iacompare}) produce lower [Si/Fe], [Ca/Fe], and [Cr/Fe] ratios and higher [Co/Fe] and [Ni/Fe] ratios. The only simulations that predict ${\rm [Ni/Fe]} < -0.01$ are sub-$M_{\rm Ch}$ models. Furthermore, all of the metal-poor sub-$M_{\rm Ch}$ simulations predict ${\rm [Ni/Fe]} \le -0.30$. \subsection{Comparison of Observationally Inferred Yields to Theoretical Yields} \label{sec:Iacompare} The preceding discussion suggests that ${\rm [Ni/Fe]}_{\rm Ia}$ is a potential indicator of whether SNe~Ia result from the explosions of near-$M_{\rm Ch}$ or sub-$M_{\rm Ch}$ WDs. The observationally inferred yields for different dSphs range from ${\rm [Ni/Fe]}_{\rm Ia} = \nifeiamin_{-\nifeiaminerrlo}^{+\nifeiaminerrhi}$ (\nifeiamindsph) to $\nifeiamax_{-\nifeiamaxerrlo}^{+\nifeiamaxerrhi}$ (\nifeiamaxdsph). The inferred [Ni/Fe] yields are best explained by sub-$M_{\rm Ch}$ detonations. The [Ni/Fe] yields are not compatible with $M_{\rm Ch}$ DDTs or pure deflagarations. Under the assumption that Type~Iax SNe are pure deflagrations, our results indicate that Type~Iax SNe are not a major contributor to galactic chemical evolution. Other element ratios do not distinguish between near-$M_{\rm Ch}$ or sub-$M_{\rm Ch}$ SNe~Ia as well as [Ni/Fe]. Nonetheless, the inferred yields for all elements and for all dSphs are compatible with sub-$M_{\rm Ch}$ explosions. As discussed in Section~\ref{sec:theoryyields}, the WD mass influences the yield ratios. The observationally inferred ${\rm [Ni/Fe]}_{\rm Ia}$ yields best match some of the more massive sub-$M_{\rm Ch}$ WDs, specifically the \citetalias{she18} and \citetalias{leu19} models with masses of 1.00--1.10~$M_{\sun}$. \citet{mcw18} pointed out that [Si/Fe] is a strong indicator of WD mass. Our estimates of ${\rm [Si/Fe]}_{\rm Ia}$ match the \citetalias{she18} and \citetalias{bra19} models of WDs from $1.00~M_{\sun}$ to slightly larger than $1.15~M_{\sun}$. WDs of this mass are heavily outnumbered by lower-mass WDs in old populations. However, the inferred yields reflect the stellar population of the dSphs at the time of star formation, not the present time. With the exception of Leo~II, the galaxies in this study formed the majority of their stars in 1--2~Gyr \citep{kir11b,wei14}. The lifetime of a 1.7~$M_{\sun}$ star is about 1~Gyr \citep{pad93}, and such a star would make a WD of 0.59~$M_{\sun}$ \citep{kal08}. Therefore, there would be plenty of low-mass WDs during the active lifetime of the dSphs. However, the WDs must be given time to explode in order to relate this discussion to SNe~Ia. \citet{she17} modeled SNe~Ia as prompt double detonations of WD binaries. In that scenario, 90\% of SNe~Ia arise from WDs of $>1~M_{\sun}$ in stellar populations with ages ranging from 0.3 to 1.0~Gyr. The percentage drops to 50\% in stellar populations with ages in the range 1--3~Gyr, which is the time frame in which many dSphs formed most of their stars \citep{wei14}. \begin{figure*} \centering \includegraphics[width=0.51\linewidth]{f8.eps} \caption{Metallicity dependence of observationally inferred (green) and theoretical (shades of blue) [Ni/Fe] yields for sub-$M_{\rm Ch}$ SNe~Ia. The blue numbers indicate the WD mass in $M_{\sun}$. Both panels show the same data, but the theoretical predictions are suppressed in the left panel for clarity. The line style for each theoretical prediction reflects the study from which it came, and the shading indicates the initial WD mass, consistent with Figure~\ref{fig:Iacompare}.\label{fig:nife_metallicity}} \end{figure*} The WD metallicity also has an effect on yield ratios (also discussed in Section~\ref{sec:theoryyields}). We inferred SN~Ia yields as a function of metallicity. Figure~\ref{fig:nife_metallicity} compares our inferences to the theoretical predictions. In general, [Ni/Fe] is predicted to increase with [Fe/H], but we inferred that the yield decreases with metallicity. However, the predicted metallicity dependence at ${\rm [Fe/H]} < -1$ is very weak for WDs with masses greater than $1~M_{\sun}$. In fact, we might expect ${\rm [Ni/Fe]}_{\rm Ia}$ to decrease with metallicity because the average mass of the exploding WDs decreases over time \citep{she17}. As a result, ${\rm [Ni/Fe]}_{\rm Ia}$ could reflect the yields of lower-mass WDs as the galaxy ages and becomes more metal-rich. This hypothesis could be tested by convolving the exploding WD mass function expected for a given age with the predicted SN~Ia yields. We save this analysis for the future. \citetalias{she18} and \citetalias{bra19} considered two variables that affected the SN~Ia yields. \citetalias{she18} used two different C/O ratios, and \citetalias{bra19} reduced the ${}^{12}{\rm C} + {}^{16}{\rm O}$ reaction rate by a factor of 10. (\citetalias{she18} also experimented with the reaction rate, but we present only their results using the ``standard'' rate.) In most cases, these choices result in differences of Fe-peak abundance ratios on the order of $\lesssim 0.1$~dex. In fact, \citetalias{bra19} specifically pointed out that abundance ratios are less sensitive than absolute abundances to the reaction rate. Therefore, the C/O ratio and the ${\rm C}+{\rm O}$ reaction rate do not affect our conclusion about the dominant role of sub-$M_{\rm Ch}$ SNe~Ia in dSphs. Our conclusions are valid only for SNe~Ia that occurred during the time in which the dSphs were forming stars. The dSphs in our sample formed the middle two thirds of their stars in durations ranging from 1~Gyr in Sculptor to 5~Gyr in Leo~II \citep{wei14}. Some population synthesis models predict that single-degenerate, $M_{\rm Ch}$ SNe~Ia can be delayed by 0.6--1.9~Gyr \citep{rui09,rui11,yun10}. However, all of these long-delayed models fall short of explaining the cosmological rate of SNe~Ia by at least two orders of magnitudes \citep{nel13}. Therefore, our measurements are likely sensitive to the ``standard'' models of SNe~Ia that have shorter delays \citep[i.e., those reviewed by][]{mao14}. Even those models fall short of the observed rate of SNe~Ia, but the discrepancy is less than for the long-delayed models. Regardless, it is important to note that our measurements are not sensitive to SNe~Ia that are delayed by more than the peak of star formation in the dSphs. One example of such a model is one that takes into account the effects of low metallicity on the accretion rate and winds from accreting WDs \citep{kob09}. We discuss this model further at the end of Section~\ref{sec:discussion}. \section{Discussion} \label{sec:discussion} We have used a galactic archaeological approach to inferring the explosion mechanism of SNe~Ia. We concluded that the abundances---specifically [Ni/Fe]---in ancient dSphs are most consistent with sub-$M_{\rm Ch}$ explosions. Our approach assumed that the galaxies were well-mixed at all times and that the IMF did not change. We made no assumptions about the form of the IMF\@. We also did not presuppose any theoretical SN yield for any abundance ratio except for [Mg/Fe]. Ours is not the first galactic archaeological study to address the nature of SNe~Ia. Most of the previous studies focused on Mn because it is particularly sensitive to the mass and metallicity of the exploding WD \citep{sei13b}. In fact, we will present our own Mn abundance measurements in the near future. \citet{nor12} measured Mn abundances in four dSphs. They measured sub-solar abundances of [Mn/Fe] in all four dSphs, and they also found a trend with [Fe/H]\@. They concluded that metallicity-dependent yields are the best explanation for their observations. However, they did not have the benefit of the sizable menu of theoretical yields available today. As a result, they did not consider the mass of the exploding WD\@. \citet{per10} discovered a new kind of explosion they called ``Ca-rich SNe'' because of their high Ca/O nebular line ratios. Their existence in the luminosity gap between novae and SNe led \citet{kas12} to call them ``Ca-rich gap transients.'' Our observations show that [Ca/Fe] declines more slowly than [Si/Fe] in dwarf galaxies. As a result, we also find that ${\rm [Ca/Fe]}_{\rm Ia}$ is significantly higher than ${\rm [Si/Fe]}_{\rm Ia}$. One interpretation is that SNe~Ia produce a higher ratio of [Ca/Fe] than [Si/Fe]. In fact, this is the behavior predicted by the sub-$M_{\rm Ch}$ models of \citetalias{she18} and \citetalias{bra19}. An alternative explanation is that there is a second class of delayed explosions, i.e., Ca-rich transients. While our results do not require an additional nucleosynthetic source beyond CCSNe and SNe~Ia, we cannot rule out that Ca-rich gap transients contribute to the chemical evolution of dSphs. So far, we have discounted Type~Iax SNe. \citet{kob15} and \citet{ces17} both explored the effect of Type Iax SNe on the chemical evolution of dSphs. They used measurements of $\alpha$ and Fe-peak elements from \citet{ven12}, \citet{nor12}, \citet{ura15}, and others. With the benefit of a one-zone chemical evolution model, \citeauthor{kob15}\ concluded that a mixture of Type Iax and sub-$M_{\rm Ch}$ explosions best explains the evolution of [Mn/Fe]. \citeauthor{ces17}\ abandoned the assumption of well-mixed gas. Instead, they introduced stochasticity into their models as a way to approximate the spread of [Mn/Fe] at a given [Fe/H]\@. They interpreted the observations of Ursa Minor as having a spread consistent with their model, which invokes multiple sub-classes of SN~Ia\@. On the other hand, \citet{mcw18} presented a different interpretation of the evolution of Fe-peak elements, including [Ni/Fe], in Ursa Minor at fixed [Fe/H]\@. They relied on \citeposs{coh10}\ high-resolution spectroscopic measurements of 10 stars. In contrast to \citet{ces17}, they did not find evidence for a spread in [Mn/Fe]. However, COS~171, the star with the highest metallicity in the sample, has very low [Mn/Fe] and [Ni/Fe] ratios. The unusual abundances of this star are reminiscent of Car~612 in the Carina dSph \citep{ven12}. \citeauthor{mcw18}\ concluded that COS~171 was the result of the explosion of a $0.95~M_{\sun}$ WD\@. This interpretation for the abundances of one star matches our interpretation for the abundances of the ensemble of stars in several dSphs. In other words, COS~171 is not the result of a rare type of SN~Ia\@. Instead, sub-$M_{\rm Ch}$ explosions are typical in dSphs. Our conclusion is somewhat compatible with abundances of cold gas at high redshift. \citet{lu96} and \citet{coo15} measured Ni abundances in damped Ly$\alpha$ (DLA) systems to be in the range $-0.4 \lesssim {\rm [Ni/Fe]} \lesssim -0.1$.\footnote{However, \citet{pro02} measured $-0.2 \lesssim {\rm [Ni/Fe]} \lesssim +0.2$. The Ni absorption lines measured in DLAs are very weak, which leads to large uncertainties in the [Ni/Fe] ratios. Furthermore, both \citet{lu96} and \citet{pro02} mentioned that the oscillator strengths of the Ni transitions are not well known.} The DLAs studied were all metal-poor ($-2.4 \le {\rm [Fe/H]} \le -0.8$). The agreement is notable because we used a galactic archaeological technique at $z=0$, but the DLA study was conducted at redshifts as high as $z=3$. These abundances possibly suggest that nucleosynthesis and chemical evolution are similar across small, metal-poor galaxies. Our findings regarding dwarf galaxies may not be extensible to more massive galaxies, like the MW\@. The [Ni/Fe] trend in the MW is somewhat complex \citep[e.g.,][]{ven04,ben14,has17,lom19}. In the low-metallicity (${\rm [Fe/H]} \lesssim -1$) halo, the average value of [Ni/Fe] is about $-0.1$. At ${\rm [Fe/H]} > -1$, the dispersion in [Ni/Fe] suddenly decreases, and the mean value is 0.0 until ${\rm [Fe/H]} \approx 0.0$. (See Figure~\ref{fig:nife_feh}.) At super-solar metallicities, [Ni/Fe] smoothly increases with [Fe/H]\@. One interpretation of this behavior is that the MW halo is composed of dSphs with chemical evolution similar to Sagittarius \citep[e.g.,][]{has17} and those studied in this work. As a result, their nucleosynthesis matches our interpretation, including the dominance of sub-$M_{\rm Ch}$ SNe~Ia. However, the MW disk has a different type of stellar population. In fact, \citet{sei13b} previously argued that [Mn/Fe] abundances in the MW disk are too high to be explained by sub-$M_{\rm Ch}$ SNe~Ia. Perhaps the SNe~Ia that exploded in the MW disk were of a different class than those that exploded in the halo. \citet{con14} found that giant elliptical galaxies with lower velocity dispersion (i.e., those with lower [$\alpha$/Fe]) have lower integrated-light abundances of [Ni/Fe]. This finding corroborates the idea that galaxies with more SNe~Ia have lower [Ni/Fe] ratios. One interpretation of this result is that SNe~Ia are exploding below $M_{\rm Ch}$ even in giant elliptical galaxies. However, the [Ni/Fe] ratios found in those galaxies are much larger than those found in this work for dwarf galaxies. Furthermore, \citeauthor{con14}\ found a weaker decrease in [Mn/Fe] with decreasing velocity dispersion. Therefore, the interpretation of the integrated-light Fe-peak abundances for giant galaxies is not as straightforward as for the dwarf galaxies. At even higher mass scales, Fe-peak abundances may be measured in the intracluster gas in galaxy clusters with X-ray spectroscopy. \citet{mer16a,mer16b} measured the abundances of elements including Mn, Fe, and Ni in dozens of galaxy clusters. They concluded that the super-solar values of [Mn/Fe] and [Ni/Fe] precluded a significant contribution of sub-$M_{\rm Ch}$ SNe~Ia. Likewise, the \citet{hit17} measured the abundances of Fe-peak elements from X-ray spectra of the hot intracluster gas in the Perseus galaxy cluster. They found solar ratios of [Mn/Fe] and [Ni/Fe]. Similar to \citet{mer16b}, they concluded that the dominant source of Fe-peak elements in the cluster is either near-$M_{\rm Ch}$ SNe~Ia or a roughly equal mixture of near-$M_{\rm Ch}$ and sub-$M_{\rm Ch}$ SNe~Ia. Bulk outflows from galaxies enriched the hot intracluster gas whereas stars formed from the cold interstellar gas that did not escape the galaxy. Therefore, it may not be advisable to compare galaxy cluster gas abundances to stellar abundances. Regardless, the X-ray measurements from galaxy clusters potentially corroborate a scenario in which the dominant mode of SNe~Ia transitions from sub-$M_{\rm Ch}$ at low galaxy mass (or low metallicity) to near-$M_{\rm Ch}$ at higher galaxy mass. \citet{kob98,kob15} and \citet{kob09} predicted that the rates and explosion mechanisms of SNe~Ia depend on metallicity. Specifically, winds from WDs are more intense at higher metallicity. Winds allow the mass accretion rate to proceed slowly enough to be stable \citep{hac96}. Therefore, metallicities of ${\rm [Fe/H]} \gtrsim -1.1$ could permit a single-degenerate WD to grow to $M_{\rm Ch}$ via mass accretion from a red giant companion. It is possible that the dominant SN~Ia mechanism transitions from sub-$M_{\rm Ch}$ (or even Type Iax, as suggested by \citealt{kob15}) at low metallicities to near-$M_{\rm Ch}$ at high metallicities. The observations of Fe-peak abundances in some dwarf galaxies and in large galaxies, like the MW, are consistent with this paradigm. \begin{figure} \centering \includegraphics[width=0.8\linewidth]{f9.eps} \caption{Evolution of [Ni/Fe] with [Fe/H] in three dSphs. Only stars with uncertainties less than 0.2~dex are shown. The [Ni/Fe] evolution in the Milky Way \citep{ben14} is shown in gray diamonds.\label{fig:nife_feh}} \end{figure} An alternative hypothesis is that the dominant class of SN~Ia depends not on metallicity but on SFH\@. Figure~\ref{fig:nife_feh} shows the [Ni/Fe] evolution in Sculptor, Leo~I, and Fornax. We have not included Leo~I or Fornax in our discussion until now because they do not conform well to our simple bi-linear model of chemical evolution (Section~\ref{sec:model}). The average metallicities of Leo~I and Fornax are higher than that of Sculptor, but their metallicity ranges overlap. It is very interesting that Leo~I has higher values of [Ni/Fe] than Sculptor {\it at the same metallicity}. It seems that metallicity is not the only variable that controls [Ni/Fe]. Even more importantly, abundance ratios above ${\rm [Ni/Fe]} \sim +0.1$ cannot be explained by any of the sub-$M_{\rm Ch}$ models listed in Table~\ref{tab:yields_theory}. \citet{wei14} measured the SFH of Sculptor to be exclusively ancient. The SFHs of Leo~I and Fornax are extended. Both formed stars steadily for nearly the entire age of the universe. Even so, both galaxies show decreasing [$\alpha$/Fe] with increasing [Fe/H] \citep{let10,kir11b,lem14}, which is evidence for increasing enrichment by SNe~Ia. Therefore, the enhanced, rising trends of [Ni/Fe] for Leo~I and Fornax cannot be explained by a high ratio of CCSNe to SNe~Ia. Instead, it could be that a different, more delayed class of SN~Ia dominates the [Ni/Fe] evolution in Leo~I and Fornax, whereas the SNe~Ia in Sculptor are more prompt. \citet{kob09} presented a scenario where single-degenerate, $M_{\rm Ch}$ SNe~Ia (i.e., those that produce ${\rm [Ni/Fe]} > 0$) explode later than double-degenerate SNe~Ia (i.e., those that produce ${\rm [Ni/Fe]} < 0$). It is possible that the [Ni/Fe] evolution in Leo~I and Fornax is evidence of a transition from double-degenerate, sub-$M_{\rm Ch}$ to single-degenerate, near-$M_{\rm Ch}$ SNe~Ia. \section{Summary} \label{sec:summary} We have used our previously published catalogs of $\alpha$ and Fe-peak abundances in dSphs \citep{kir10,kir18} to infer properties of SNe~Ia in dwarf galaxies. We used the evolution of [Mg/Fe] to quantify the fraction ($f_{\rm Ia}$) of Fe produced in SNe~Ia. We applied this ratio to the observed evolution of other element ratios, including [Ni/Fe], to infer the yields of SNe~Ia, e.g., ${\rm [Ni/Fe]}_{\rm Ia}$. In the dSphs with short SFHs, the observationally inferred yields of ${\rm [Si/Fe]}_{\rm Ia}$, ${\rm [Ca/Fe]}_{\rm Ia}$, ${\rm [Co/Fe]}_{\rm Ia}$, and ${\rm [Ni/Fe]}_{\rm Ia}$ are sub-solar, whereas ${\rm [Cr/Fe]}_{\rm Ia}$ is approximately solar. These yields are consistent with the detonations of $\sim 1.0~M_{\sun}$ WDs. However, the ${\rm [Ni/Fe]}_{\rm Ia}$ yields are inconsistent with the explosions of near-$M_{\rm Ch}$ WDs. Two dSphs with more extended SFHs (Fornax and Leo~I) contain stars with enhanced [Ni/Fe] that cannot be explained by sub-$M_{\rm Ch}$ SNe~Ia. We concluded that the dominant explosion mechanism of SNe~Ia that occurred before the end of star formation in short-lived dwarf galaxies is the detonation of a sub-$M_{\rm Ch}$ WD\@. This conclusion cannot necessarily be generalized to the total population of SNe~Ia. Specifically, the evolution of [Ni/Fe] in the MW disk and in dSphs with extended SFHs is different from that in ancient dSphs. We did not observe a strong evolution of SN~Ia yields with metallicity, but theoretical models do not predict a strong metallicity dependence at ${\rm [Fe/H]} < -1$, which includes the vast majority of stars in our sample. The weak metallicity dependence we did observe might instead confirm the prediction that lower-mass, sub-$M_{\rm Ch}$ WDs explode at later times \citep{she17}. We also observed a marked difference in the [Ni/Fe] evolution between galaxies with different SFHs. Specifically, [Ni/Fe] is sub-solar in ancient galaxies, but [Ni/Fe] is higher and increases with [Fe/H] in galaxies that formed stars for several Gyr. The differences could reflect a shift in the dominant type of SN~Ia (double-degenerate to single-degenerate and sub-$M_{\rm Ch}$ to $M_{\rm Ch}$) for galaxies with more extended SFHs. In the future, we will measure Mn, which is perhaps the element most sensitive to the mass and metallicity of the exploding WD\@. The evolution of [Mn/Fe] will be a powerful check on our conclusions, which were based mostly on [Ni/Fe]. Our dataset also has several other possible uses, such as constructing models of chemical evolution that account for a range of WD masses (see Section~\ref{sec:Iacompare}). The data might also be useful in deducing the SN~Ia delay time distribution. \acknowledgments We thank Marten van Kerkwijk, Julianne Dalcanton, Ivo Seitenzahl, Robert Fisher, Ken'ichi Nomoto, Mansi Kasliwal, Alex Ji, and Norbert Werner for insightful conversations. We also thank the anonymous referee for a helpful report. This material is based upon work supported by the National Science Foundation under grant No.\ AST-1614081. E.N.K. gratefully acknowledges support from a Cottrell Scholar award administered by the Research Corporation for Science Advancement as well as funding from generous donors to the California Institute of Technology. We are grateful to the many people who have worked to make the Keck Telescope and its instruments a reality and to operate and maintain the Keck Observatory. The authors wish to extend special thanks to those of Hawaiian ancestry on whose sacred mountain we are privileged to be guests. Without their generous hospitality, none of the observations presented herein would have been possible. We express our deep gratitude to the staff at academic and telescope facilities whose labor maintains spaces for scientific inquiry. \facility{Keck:II (DEIMOS)} \software{MOOG \citep{sne73,sne12}}
\section{Introduction} Sulphur is one of the most abundant elements in the Universe \citep[S/H$\sim$1.3$\times$10$^{-5}$ in the solar photosphere, ][]{Asplund2005} and plays a crucial role in biological systems on Earth. Surprisingly, sulphuretted molecules are not as abundant as expected in the interstellar medium. A few sulphur compounds have been detected in diffuse clouds demonstrating that the sulphur abundance in these low density regions is close to the cosmic value \citep{Neufeld2015}. A moderate sulphur depletion (a factor of four) is estimated in the external layers of the photodissociation region (PDR) in the Horsehead nebula \citep{Goicoechea2006}. In cold molecular clouds, a large depletion of sulphur is usually considered to reproduce the observations \citep[see for instance][]{Tieftrunk1994, Vastel2018}. The depletion of sulphur is observed not only in cold pre-stellar cores, but also in hot cores/corinos \citep{Wakelam2004}. One would expect that most of the sulphur is locked in the icy grain mantles in dense cores but we should see almost all sulphur return to the gas phase in hot cores and strong shocks. However, even in the well-known Orion$-$KL hot core where the icy grain mantles are expected to evaporate releasing the molecules to the gas phase, one needs to assume a sulphur depletion of a factor of approximately ten to reproduce the observations \citep{Esplugues2014, Crockett2014}. Because of the high hydrogen abundances and the mobility of hydrogen in the ice matrix, sulphur atoms impinging on interstellar ice mantles are expected to form H$_2$S preferentially. However, there are only upper limits of the solid H$_2$S abundance (e.g. \citealp{JimenezEscobar2011}). \cite{Oba2018} show that, at high densities, chemical desorption is likely to exceed photodesorption, thus becoming an efficient way of removing H$_2$S from the surface of grains. Thus far, OCS is the only S-bearing molecule unambiguously detected in interstellar ice because of its large band strength in the infrared \citep{Geballe1985,Palumbo1995}; tentatively, SO$_2$ has also been detected \citep{Boogert1997}. The bulk of the S-budget might be locked in atomic sulphur in the gas phase and/or in S-polymers in the solid phase, which are not easily observable \citep{JimenezEscobar2014,Wakelam2004}. The recent detection of the doubly-sulphuretted species S$_2$H in the Horsehead nebula adds important information as well as new questions to the overall complex sulphur chemistry problem, possibly supporting the scenario of an important role of surface chemistry in the formation of the gaseous sulphuretted compounds \citep{Fuente2017}. Observations of the comet 67P with Rosetta showed that H$_2$S and atomic S are the most important S-bearing species in cometary ices, with an abundance of 0.015~\% relative to water \citep{Calmonte2016, Bockelee2017}. Only a few PDRs have been investigated in detail taking advantage of their proximity and favourable edge-on geometry: NGC 7023 \citep{Fuente1993, Fuente1996b, Fuente2000}, the Orion Bar \citep{Cuadrado2015, Cuadrado2017, Goicoechea2016,Goicoechea2017}, Mon R2 \citep{Ginard2012,Trevino2014,Trevino2016,Pilleri2012,Pilleri2013,Pilleri2014}, and the Horsehead nebula. Here we investigate the sulphur chemistry in the Horsehead nebula. At a distance of 400 pc, the Horsehead is a PDR viewed nearly edge-on and illuminated by the O9.5V star $\sigma$Ori at a projected distance of $\sim$3.5 pc. The intensity of the incident far ultra-violet (FUV) radiation field is $\chi$=60 \citep{Pety2005} relative to the interstellar radiation field in Draine units \citep{Draine1978}. This PDR presents a differentiated chemistry from others associated with warmer regions such as the Orion Bar, NGC 7023, and Mon R2. One main difference is that the dust temperature is around $\sim$20-30 K in the PDR \citep{Goicoechea2009}, meaning it is below or close to the sublimation temperature of many species, allowing a rich surface chemistry on the irradiated surfaces as has been demonstrated by recent observational and theoretical studies \citep{Guzman2011,Guzman2013}. A first analysis of the sulphur chemistry was carried out by Goicoechea et al. (2006) who derived a gas-phase sulphur abundance of S/H=(3.5$\pm$1.5)$\times$10$^{-6}$ in the low extinction PDR on the basis of single-dish and interferometric observations of the CS and HCS$^+$ millimeter lines. The Horsehead Wide-band High-resolution Iram-30m Surveys at two positions with Emir Receivers (WHISPER) project is a complete unbiased line survey of the 3, 2, and 1 mm bands using the Institut de Radioastronomie Millim\'etrique (IRAM) 30m telescope. WHISPER has provided valuable hints regarding the chemistry of this region. The detection of the molecular ion CF$^+$ towards the HCO peak is well understood in terms of gas-phase photochemistry \citep{Guzman2012}. Photo-destruction of large polyatomic molecules or small grains into smaller hydrocarbon precursors is invoked to explain the extraordinarily high abundance of small hydrocarbons, such as {C$_2$H}, {C$_3$H$_2$}, {C$_3$H,}~and C$_3$H$^+$~\citep{Pety2012,Guzman2015}. The detection of several complex organic molecules (COMs) towards the warm ($T_\mathrm{kin}\sim60$ K) PDR was unexpected. In fact, the chemical complexity reached in the Horsehead is surprisingly high, with COMs of up to seven atoms: HCOOH, H$_2$CCO, CH$_3$CHO,~and {CH$_3$CCH}~\citep{Guzman2014}. Current pure gas-phase models cannot reproduce the inferred {H$_2$CO}, {CH$_3$OH,} and COMs abundances in the Horsehead PDR~\citep{Guzman2011,Guzman2013}, which supports the theory of a grain surface origin for these molecules. \citet{LeGal2017} were able to reproduce the observed COMs abundances using a chemical model with grain surface chemistry and proposed that chemical desorption, instead of photodesorption, was most likely the dominant process to release COMs to the gas phase. However, the efficiency of chemical desorption seems to be extremely dependent on the species involved and the chemical composition of the icy mantle \citep{Minissale2016,Oba2018}. {CH$_3$CN} and {CH$_3$NC}, key species for the formation of prebiotic molecules, seem to have a very specific formation pathway in this PDR~\citep{Gratier2013}. In this paper we use the data of the Horsehead WHISPER project to investigate the chemistry of S-bearing species in this prototypical nebula. \section{Observations and data reduction}\label{sec:Sample} The data used in this work are taken from the Horsehead WHISPER (Wide-band High-resolution Iram-30m Surveys at two positions with Emir Receivers, PI: J. Pety) project. The Horsehead WHISPER project is a complete unbiased line survey of the 3, 2, and 1 mm bands using the IRAM 30m telescope. Two positions were observed within this survey: i) the PDR position, where HCO emission peaks (RA=5$^{\rm h}$40$^{\rm m}$53$^{\rm s}$.936, Dec=02$^\circ$28$'$00$''$, J2000) at the UV-illuminated surface of the Horsehead nebula \citep[][hereafter, PDR]{Gerin2009}, and ii) the core, where DCO$^+$ peaks (RA=5$^{\rm h}$40$^{\rm m}$55$^{\rm s}$.61, Dec=02$^\circ$27$'$38$''$, J2000), which corresponds to a cold \citep[$T_{k}\sim10 -20~K$, ][]{Pety2007} and UV-shielded condensation located less than 40$''$ away from the PDR edge (hereafter, core). During the observations we used the position-switching procedure with the reference position located at an offset ($-$100$''$,0) relative to RA: 05$^{\rm h}$40$^{\rm m}$54$^{\rm s}$.27 Dec: $-$02$^\circ$28$'$00$''$.0. In order to avoid relative calibration errors we integrated towards the HCO peak and the DCO$^+$ peak alternatively, changing from one position to the other every 15 minutes. Line intensities are given in main brightness temperature (T$\rm _{MB}$) and the frequency resolution in our survey is 49 kHz. The uncertainties in T$\rm _{MB}$ due to calibration errors are $\sim$10\%. In Fig. \ref{Fig:Map}, we show the integrated intensity maps of the $^{34}$SO 2$_3$$\rightarrow$1$_2$, CCS 8$_7$$\rightarrow$7$_6$ H$_2$S 1$_{1,0}$$\rightarrow$1$_{0,1}$, and CS 2$\rightarrow$1 lines as observed with the IRAM 30m telescope. These maps were observed in previous projects by our team. The two targeted positions within WHISPER, PDR and core, are marked with filled squares and the 3mm and 2mm beam of the 30m telescope are also shown. The H$_2$S 1$_{1,0}$$\rightarrow$1$_{0,1}$ line has been presented in \cite{Fuente2017}. The other lines were observed in November and December 2017 under good winter weather conditions (2 mm of precipitable water vapour) using the Eight MIxer Receiver (EMIR) sideband-separation receivers. The position-switching, on-the-fly observing mode was used, with off-position offsets ($\delta$RA, $\delta$Dec) = $(-100'',0'')$, that is, into the HII region. We observed along and perpendicular to the direction of the exciting star in zigzags, covering an area of $200''\times200''$. The maps were processed with the Grenoble Image and Line Data Analysis System (GILDAS\footnote{See \texttt{http://www.iram.fr/IRAMFR/GILDAS} for more information about the GILDAS softwares.}) software \citep{Pety2005}. The data were first calibrated to the $\rm T_{a}^{*}$ scale using the chopper-wheel method~\citep{Penzias1973}, and then converted into main-beam temperatures ($\rm T_{mb}$) using the forward and main-beam efficiencies of the telescope. The resulting spectra were then baseline-corrected and gridded through convolution with a Gaussian to obtain the maps. Beam sizes are roughly in the range 12$\arcsec$ to 25$\arcsec$, depending on the exact frequency of each transition, more precisely, HPBW($\rm \arcsec$) = 2460/$\rm \nu$(GHz)\footnote{See \texttt{http://www.iram.es/IRAMES/telescope/telescope \linebreak Summary/telescope\_summary.html.}}. \section{Molecular inventory}\label{Sec:results} Taking the high sensitivity WHISPER survey as the observational basis, we have systematically searched for all the S-bearing species included in the Cologne Database for Molecular Spectroscopy (CDMS) catalogue. A complete list of intensities for the detected lines is provided in Table~\ref{Tab:lineFluxes}. Figure~\ref{Fig:allDetections} depicts the spectra of the detected transitions grouped by species. For the detected species, we have carried out a multi-transitional study that includes lines of different isotopologues, to determine accurate molecular abundances (Tables~\ref{Tab:rotational_diagrams}, and \ref{Tab:RADEX_CD}). In the case of non-detections, an upper limit to the fractional abundance is given. The list of non-detected species is shown in Table~\ref{Tab:CD_UL}. A detailed description of the methods used to derive molecular abundances can be found in Sects. \ref{Sec:rot_diag} and \ref{Sec:RADEX_models}. The list of S-bearing species detected in the Horsehead includes CS, SO, SO$\rm _{2}$, OCS, H$\rm _{2}$CS (both ortho- and para-), HDCS, C$\rm _{2}$S, HCS$\rm ^{+}$, SO$\rm ^{+}$, H$_2$S, S$_2$H, NS, and NS$^+$. The detections of H$_2$S and S$_2$H were previously reported by \citet{Fuente2017}. It is important to note that this list constitutes the most complete inventory of S-bearing species in a PDR thus far. We have not detected DCS$^+$ and CCCS towards any of the observed positions, and we provide upper limits for the fractional abundance of these molecules. The detection of NS$^+$ reported here is worth noticing as the first detection of NS$^+$ in a PDR. NS$^+$ was recently identified by \citet{Cernicharo2018} in a variety of dark clouds, with a NS/$\rm NS^{+}$$\sim$ 30$-$50. However, a NS/$\rm NS^{+}$$>$ 3000 was measured in the Orion KL hot core \citep{Cernicharo2018}. We have detected two NS$^+$ lines, J=2$\rightarrow$1 at 110198.5 MHz and J=3$\rightarrow$2 at 150295.6 MHz, with a signal-to-noise ratio (S/N) $>$4 towards the PDR position. Only the line at 110198.5 MHz has been detected towards the core (see Fig. \ref{Fig:NSplus_spec}). We present also the first detection of SO$\rm ^+$ in a low-UV PDR ($\chi$$<$500). Detected earlier by \citet{Turner1992}, SO$^+$ has been detected in variety of regions, which include massive star formation regions, shocked regions, and translucent clouds \citep{Turner1992,Turner1994,Turner1996}. Although widely detected, a high abundance of SO$^+$ relative to SO, X(SO$^+$)/X(SO)$>$100, seems to be related to photon-dominated chemistry and was proposed by \citet{Sternberg1995} as a tracer of UV illuminated regions. These high SO$^+$ abundances have been previously measured in the PDRs associated to NGC 7023 \citep{Fuente2003}, the Orion Bar \citep{Fuente2003, Goicoechea2017}, and Monoceros R 2 \citep{Ginard2012}, but this ion has not been detected in a low-UV PDR such as the Horsehead thus far. \begin{figure}[] \begin{center} \includegraphics[scale=0.25,trim = 0mm 0mm 0mm 0mm,clip]{NSplus_21_PDR.pdf} \includegraphics[scale=0.25,trim = 0mm 0mm 0mm 0mm,clip]{NSplus_32_PDR.pdf}\\ \includegraphics[scale=0.25,trim = 0mm 0mm 0mm 0mm,clip]{NSplus_21_Core.pdf} \includegraphics[scale=0.25,trim = 0mm 0mm 0mm 0mm,clip]{NSplus_32_Core.pdf} \caption{Spectra of NS$\rm ^{+}$ in the PDR and the core. The red line shows the Gaussian fit to the observed line profile.} \label{Fig:NSplus_spec} \end{center} \end{figure} \begin{table*}[] \caption{Rotational temperatures, column densities, and abundances derived from rotational diagrams for S-bearing species in the Horsehead nebula.} \label{Tab:rotational_diagrams} \centering \begin{tabular}{l | lcc | lcc} \hline \hline & \multicolumn{3}{c}{PDR} & \multicolumn{3}{|c}{Core} \\ \hline Species & $\rm T_{rot}$ & N(X) & Abundance & $\rm T_{rot}$ & N(X) & Abundance \\ & (K) & ($\rm cm^{-2}$) & $\rm {N(X)} \over {N(H)+2N(H_{2})} $ & (K) & ($\rm cm^{-2}$) & $\rm {N(X)} \over {N(H)+2N(H_{2})} $ \\ \hline CS$\rm ^{*}$ & 6.3 & (3.0$\rm \pm$0.6)$\rm \times 10^{13}$ & (8.0$\rm \pm$2.0)$\rm \times 10^{-10}$ & 5.9 & (5.3$\rm \pm$1.0)$\rm \times 10^{13}$ & (9.0$\rm \pm$2.0)$\rm \times 10^{-10}$ \\ SO$\rm ^{*}$ & 11.6 & (3.2$\rm \pm$0.3)$\rm \times 10^{13}$ & (8.4$\rm \pm$0.8)$\rm \times 10^{-10}$ & 8.2 & (5.0$\rm \pm$0.5)$\rm \times 10^{13}$ & (8.6$\rm \pm$0.9)$\rm \times 10^{-10}$ \\ p-$\rm H_{2}CS$ & 4.2 & (5.0$\rm \pm$3.0)$\rm \times 10^{11}$ & (1.3$\rm \pm$0.8)$\rm \times 10^{-11}$ & 8.6 & (9.0$\rm \pm$1.0)$\rm \times 10^{11}$ & (1.6$\rm \pm$0.2)$\rm \times 10^{-11}$ \\ o-$\rm H_{2}CS$ & 8.8 & (9.0$\rm \pm$3.0)$\rm \times 10^{11}$ & (2.4$\rm \pm$0.8)$\rm \times 10^{-11}$ & 8.2 & (2.5$\rm \pm$0.8)$\rm \times 10^{12}$ & (4.3$\rm \pm$1.4)$\rm \times 10^{-11}$\\ SO$\rm _{2}$ & 6.5 & (3.0$\rm \pm$0.6)$\rm \times 10^{12}$ & (8.0$\rm \pm$1.6)$\rm \times 10^{-11}$ & 6.9 & (2.9$\rm \pm$0.6)$\rm \times 10^{12}$ & (5.0$\rm \pm$1.0)$\rm \times 10^{-11}$ \\ CCS & 10.3 & (3.0$\rm \pm1.0$)$\rm \times 10^{11}$ & (8.0$\rm \pm$2.6)$\rm \times 10^{-12}$ & 8.1 & (1.5$\rm \pm$0.7)$\rm \times 10^{12}$ & (2.6$\rm \pm$1.2)$\rm \times 10^{-11}$\\ HCS$\rm ^{+}$ & 11.6 & (5.0$\rm \pm$0.6)$\rm \times 10^{11}$ & (1.3$\rm \pm$0.2)$\rm \times 10^{-11}$ & 10$\rm ^{**}$ & 6$\rm \times 10^{11}$ & 1.0$\rm \times 10^{-11}$ \\ SO$\rm ^{+}$ & 11 & (6.3$\rm \pm$1.8)$\rm \times 10^{11}$ & (1.7$\rm \pm$0.5)$\rm \times 10^{-11}$ & 9 & (4.5$\rm \pm$0.5)$\rm \times 10^{11}$ & (7.8$\rm \pm0.9)$$\rm \times 10^{-12}$\\ HDCS & 10$\rm ^{**}$ & (6$\rm \pm$1)$\rm \times 10^{11}$ & (2$\rm \pm$0.4)$\rm \times 10^{-11}$ & 10$\rm ^{**}$ & (1$\rm \pm$0.2)$\rm \times 10^{12}$ & (2$\rm \pm$0.4)$\rm \times 10^{-11}$ \\ NS & 10$\rm ^{**}$ & (4$\rm \pm$0.8)$\rm \times 10^{12}$ & (1$\rm \pm$0.2)$\rm \times 10^{-10}$ & 10$\rm ^{**}$ & (3$\rm \pm$0.6)$\rm \times 10^{12}$ & (5$\rm \pm$1)$\rm \times 10^{-11}$ \\ NS$^+$ & 10$\rm ^{**}$ & (1$\rm \pm$0.2)$\rm \times 10^{11}$ & (3$\rm \pm$0.6)$\rm \times 10^{-12}$ & 10$\rm ^{**}$ & (6$\rm \pm$1)$\rm \times 10^{10}$ & (1$\rm \pm$0.2)$\rm \times 10^{-12}$ \\ DCS$^+$ & 10$\rm ^{**}$ & $<$1.0$\times$10$^{11}$ & $<$3$\times$10$^{-12}$ & 10$\rm ^{**}$ & $<$1.0$\times$10$^{11}$ & $<$2$\times$10$^{-12}$ \\ CCCS & 10$\rm ^{**}$ & $<$3.2$\times$10$^{11}$ & $<$8$\times$10$^{-12}$ & 10$\rm ^{**}$ & $<$3.2$\times$10$^{11}$ & $<$5$\times$10$^{-12}$ \\ \hline \hline \end{tabular} \tablefoot{Abundances are computed assuming $\rm N(H_{2}) = 1.9 \times 10^{22}~cm^{-2}$ towards the PDR and $\rm N(H_{2}) = 2.9 \times 10^{22}~cm^{-2}$ towards the core from \cite{Gerin2009}. ($\rm ^{*}$): computed including opacity effects. ($\rm ^{**}$): since only one transition was detected, we assumed $\rm T_{rot}=10~K$ and fitted the column density to match the observed $\rm T_{MB}$ assuming LTE. } \end{table*} \begin{table} \caption{Collisional partners and collisional excitation rates for the different species modelled with LVG.} \label{Tab:coll_partners_and_rates} \centering \begin{tabular}{ll} \hline \hline Species & Collisional excitation rates \\ \hline CS & \cite{Denis-Alpizar2013} \\ SO & \cite{Lique2006B} \\ SO$\rm _{2}$ & \cite{Green1995} \\ OCS & \cite{Green1978} \\ H$\rm _2$CS & \cite{Wiesenfeld2013}\\ HCS$\rm ^+$ & \cite{Flower1999}$\rm ^*$\\ \hline \end{tabular} \tablefoot{ ($\rm ^*$): Adapted from HCO$\rm ^+$ collisional rates.} \end{table} \begin{table*} \caption{Upper limits to the column density and abundance of undetected species.} \label{Tab:CD_UL} \begin{center} \begin{tabular}{lrrrrlll} \hline \hline Molecule & \multicolumn{1}{c}{Freq} & \multicolumn{1}{c}{rms$^1$} & \multicolumn{1}{c}{N$_X^2$ } & \multicolumn{3}{c}{Abundances wrt H$_2$} & \multicolumn{1}{c}{Ref} \\ & \multicolumn{1}{c}{(GHz)} & \multicolumn{1}{c}{(mK)} & \multicolumn{1}{c}{(cm$^{-2}$)} & \multicolumn{1}{c}{Horsehead} & \multicolumn{1}{c}{Dark clouds } & \multicolumn{1}{c}{Hot cores} & \multicolumn{1}{c}{} \\ \hline S$_2$H$_2$ & 139.885 & 9 & $<$8.5$\times$10$^{11}$ & $<$4.5$\times$10$^{-11}$ & & & \\ HSO & 158.391 & 30 & $<$1.5$\times$10$^{12}$ & $<$7.9$\times$10$^{-11}$ & & & \\ HCS & 161.128 & 30 & $<$3.0$\times$10$^{13}$ & $<$1.6$\times$10$^{-9}$ & $\sim$1$-$5$\times$10$^{-10}$ & & \citet{Agundez2018} \\ HSC & 81.200 & 17 & $<$7.5$\times$10$^{11}$ & $<$3.9$\times$10$^{-11}$ & $\sim$6$\times$10$^{-12}$ & & \citet{Agundez2018} \\ HCCS & 88.023 & 4 & $<$3.6$\times$10$^{11}$ & $<$1.9$\times$10$^{-11}$ & & & \\ NCS & 91.501 & 4 & $<$7.0$\times$10$^{11}$ & $<$3.7$\times$10$^{-11}$ & & & \\ HNCS & 82.102 & 8 & $<$4.2$\times$10$^{11}$ & $<$2.2$\times$10$^{-11}$ & $\sim$4$\times$10$^{-12}$ & $\sim$8$\times$10$^{-12}$ & \citet{Adande2010} \\ HSCN & 92.230 & 5 & $<$4.0$\times$10$^{11}$ & $<$2.1$\times$10$^{-11}$ & $\sim$3.5$\times$10$^{-12}$ & $\sim$2$\times$10$^{-12}$ & \citet{Adande2010} \\ HCNS & 86.118 & 8 & $<$8.0$\times$10$^{10}$ & $<$4.2$\times$10$^{-12}$ & & & \\ HSNC & 87.900 & 3 & $<$8.0$\times$10$^{10}$ & $<$4.2$\times$10$^{-12}$ & & & \\ H$_2$C$_3$S & 85.728 & 8 & $<$8.0$\times$10$^{12}$ & $<$4.2$\times$10$^{-10}$ & & &\\ CH$_3$SH & 99.185 & 7 & $<$1.2$\times$10$^{13}$ & $<$6.3$\times$10$^{-10}$ & & $\sim$4$\times$10$^{-9}$ & \citet{Majumdar2016} \\ CS$^+$ & 103.933 & 7 & $<$1.5$\times$10$^{12}$ & $<$7.9$\times$10$^{-11}$ & & & \\ HSCO$^+$ & 90.183 & 4 & $<$3.5$\times$10$^{11}$ & $<$1.8$\times$10$^{-11}$ & & & \\ HOCS$^+$ & 91.624 & 4 & $<$3.5$\times$10$^{11}$ & $<$1.8$\times$10$^{-11}$ & & & \\ HOSO$^+$ & 88.452 & 4 & $<$4.5$\times$10$^{11}$ & $<$1.8$\times$10$^{-11}$ & & & \\ \hline \hline \end{tabular} \end{center} \noindent \tablefoot{ (1) The rms has been calculated for a channel width of $\approx$0.33 km s$^{-1}$. The obtained rms is similar in the two surveyed positions. (2) 3$\sigma$ upper limits assuming LTE, T$_{rot}$ = 10 K, and a linewidth of 0.6 km s$^{-1}$. Abundances in the Horsehead were derived assuming N(H$\rm _2$) = 1.9$\rm \times ~10^{22}~cm^{-2}$}. \end{table*} \begin{table*}[] \caption{Mean values for kinetic temperatures, gas densities, column densities, and molecular abundances from RADEX models explored with MCMC.} \tiny \label{Tab:RADEX_CD} \centering \begin{tabular}{l | cccc | cccc} \hline \hline & \multicolumn{4}{c}{PDR} & \multicolumn{4}{|c}{Core} \\ \hline Species & $\rm T_{K} $ & n$\rm _{H_{2}}$ &N(X) & Abundance & $\rm T_{K} $ & n$\rm _{H_{2}}$ &N(X) & Abundance\\ & (K) & ($\rm cm^{-3}$) & ($\rm cm^{-2}$) & $\rm {N(X)} \over {N(H)+2N(H_{2})} $ & (K) & ($\rm cm^{-3}$) & ($\rm cm^{-2}$) & $\rm {N(X)} \over {N(H)+2N(H_{2})} $ \\ \hline CS & 58$\rm \pm$10 & (5.3$\rm \pm$1.7)$\rm \times 10^{4}$ & (1.7$\rm \pm$0.4)$\rm \times 10^{13}$ & (4.5$\rm \pm$1.1)$\rm \times 10^{-10}$ & 27$\rm \pm$6 & (9.5$\rm \pm$3.2)$\rm \times 10^{4}$ & (3.9$\rm \pm$0.7)$\rm \times 10^{13}$ & (6.7$\rm \pm$1.2)$\rm \times 10^{-10}$ \\ SO & 44$\rm \pm$12 & (6.9$\rm \pm$2.2)$\rm \times 10^{4}$ & (1.5$\rm \pm$0.2)$\rm \times 10^{13}$ & (3.9$\rm \pm$0.5)$\rm \times 10^{-10}$ & 15$\rm \pm$3 & (2.1$\rm \pm$0.7)$\rm \times 10^{5}$ & (3.0$\rm \pm$0.4)$\rm \times 10^{13}$ & (5.2$\rm \pm$0.7)$\rm \times 10^{-10}$ \\ SO$\rm_{2}$ & 58$\rm \pm$10 & (7.0$\rm \pm$2.3)$\rm \times 10^{4}$ & (4.4$\rm \pm$0.8)$\rm \times 10^{12}$ & (1.2$\rm \pm$0.2)$\rm \times 10^{-10}$ & 25$\rm \pm$8 & (1.1$\rm \pm$0.4)$\rm \times 10^{5}$ & (4.3$\rm \pm$0.7)$\rm \times 10^{12}$ & (7.4$\rm \pm$1.2)$\rm \times 10^{-11}$ \\ OCS & 61$\rm \pm$10 & (7.5$\rm \pm$3.7)$\rm \times 10^{4}$ & (1.9$\rm \pm$0.3)$\rm \times 10^{12}$ & (5.0$\rm \pm$0.8)$\rm \times 10^{-11}$ & 24$\rm \pm$6 & (1.0$\rm \pm$0.5)$\rm \times 10^{5}$ & (3.0$\rm \pm$0.5)$\rm \times 10^{12}$ & (5.2$\rm \pm$0.9)$\rm \times 10^{-11}$ \\ o-H$\rm _{2}$CS & 59$\rm \pm$10 & (5.0$\rm \pm$1.7)$\rm \times 10^{4}$ & (9.0$\rm \pm$1.0)$\rm \times 10^{11}$ & (2.4$\rm \pm$0.3)$\rm \times 10^{-11}$ & 18$\rm \pm$6 & (9.1$\rm \pm$3.4)$\rm \times 10^{4}$ & (2.4$\rm \pm$0.3)$\rm \times 10^{12}$ & (4.1$\rm \pm$0.5)$\rm \times 10^{-11}$ \\ p-H$\rm _{2}$CS & -- & -- & -- & -- & 22$\rm \pm$6 & (9.0$\rm \pm$3.4)$\rm \times 10^{4}$ & (9.0$\rm \pm$2.0)$\rm \times 10^{11}$ & (1.6$\rm \pm$0.4)$\rm \times 10^{-11}$ \\ HCS$\rm ^{+}$ & 54$\rm \pm$10 & (3.0$\rm \pm$0.8)$\rm \times 10^{4}$ & (4.1$\rm \pm$0.8)$\rm \times 10^{11}$ & (1.1$\rm \pm$0.2)$\rm \times 10^{-11}$ & -- & -- & -- & --\\ \hline \end{tabular} \tablefoot{Abundances are computed assuming $\rm N(H_{2}) = 1.9 \times 10^{22}~cm^{-2}$ in the PDR and $\rm N(H_{2}) = 2.9 \times 10^{22}~cm^{-2}$ \citep{Gerin2009}.} \end{table*} \section{Rotational diagrams}\label{Sec:rot_diag} We have used the rotational diagram technique to derive rotational temperatures, $\rm T_{rot}$, and beam-averaged column densities, N(X). The results are summarized in Table~\ref{Tab:rotational_diagrams}. This method assumes that the population of the molecular energy levels can be characterized by a single temperature, T$_{\rm rot}$, and that this temperature is uniform along the line of sight. Given the large beam sizes in our observations ($\sim$12$\arcsec$ at 200 GHz to $\sim$25$\arcsec$ at 100 GHz), the assumption of a single T$_{\rm rot}$ for each molecule and position is an over-simplification, yet a valid starting point for our analysis. We also assume that the emission from the different species is filling the beam. While this is most likely the case for many species (see Fig. \ref{Fig:Map}), it might bias our results in some cases. In its simplest formulation, assuming optically thin emission and the Rayleigh-Jeans limit, the rotation temperature and molecular column density can be derived from the equations \begin{equation} ln\left({N_{up}}\over{g_{up}}\right) = ln\left({N_{tot}}\over{Q_{rot}}\right) - \frac{E_{up}}{kT_{rot}} \end{equation} \begin{equation} {\rm N}_{up} (cm^{-2})= 1.94 \times 10^3 \nu^2 (GHz) {\rm W} / {\rm A_{ul}} (s^{-1}) ,\end{equation} where $W$ is the velocity-integrated line area in units of ${\rm K~km s}^{-1}$. We assume that the emission is extended compared with the beam size, that is, there is beam filling factor of 1, and consider only S/N (Area)$\rm >$5 detections to compute rotational diagrams. The assumption of optically thin emission cannot be applied to the abundant species CS and SO. In these cases, we use the expression \begin{equation}\label{Eq:rot_diag_opacity} ln\left({N_{up}^{obs}}\over{g_{up}}\right) = ln\left({N_{tot}^{obs}}\over{Q_{rot}}\right) - \frac{E_{up}}{kT_{rot}} - ln(C_{\tau}) ,\end{equation} with \begin{equation} C_{\tau}=\frac{\tau}{1-e^{-\tau}} \end{equation} being the optical depth correction factor \citep{Goldsmith1999}. Line opacities, $\tau$, are derived for each individual line assuming $^{12}$C/$^{13}$C=60 and $^{32}$S/$^{34}$S=22.5 \citep{Wilson1994}. For a few species, we detected only one transition and we need to assume a certain T$_{\rm rot}$ to estimate column densities. Based on the results of the rotational diagrams of molecules with similar dipole moments \citep[Table \ref{Tab:rotational_diagrams} and ][]{Fuente2017, Goicoechea2006}, we assume T$_{\rm rot}$=10 K in these cases. The same rotational temperature is used to calculate the 3$\sigma$ column density upper limits shown in Table~\ref{Tab:CD_UL}. \section{RADEX models}\label{Sec:RADEX_models} We used the molecular excitation code RADEX \citep{vanDerTak2007} to get a more detailed description of the physical conditions and molecular abundances at the two positions observed. RADEX is a non-Local Thermodynamic Equilibrium (LTE) molecular excitation and local radiative transfer code that provides line intensities of molecular species for a given combination of $T_{k}$, $n_{H_2}$ , and $N(X)$. We used a Monte Carlo Markov chain (MCMC) methodology to explore the parameter space using a Bayesian inference approach. Specifically, we used the \textit{emcee} \citep{Foreman2012} implementation of the Affine Invariant MCMC Ensemble sampler methods by \cite{Goodman2010}. When several isotopologues of the same species were detected, as is the case for CS and SO, all the isotopologues were modelled simultaneously assuming the isotopic ratios $\rm ^{13}C/^{12}C=60$ and $\rm ^{34}S/^{32}S=22.5$. Based on our previous knowledge of the region and previous studies by the WHISPER team \citep{Gratier2013}, we decided to assume a Gaussian prior for the kinetic temperature, with mean value and standard deviation $\rm T_{k}=60\pm10$ K in the PDR and $\rm T_{k}=25\pm10$ K in the core, and a log-normal prior for the gas density with mean value and standard deviation $\rm log_{10}(n_{H_{2}} [cm^{-3}])=4.8\pm 0.2$ in the PDR and $\rm log_{10}(n_{H_{2}} [cm^{-3}])=5.0\pm 0.2$ in the core. We assumed a flat prior for column densities between 10$\rm ^{9}~cm^{-2}$ and 10$\rm ^{15}~cm^{-2}$. An overview of the collisional partners and collisional excitation rates used for the different species modelled is shown in Table \ref{Tab:coll_partners_and_rates}. For SO transitions, collisional rates are available either in the range 10 to 50 K \citep{Lique2006B} or 60 to 300 K \citep{Lique2006A}. For our simulations, we used the low temperature collisional rates from \cite{Lique2006B}. Histograms and density plots showing the results of the MCMC analysis are depicted in Fig. \ref{Fig:MCMC_LVG}. The kinetic temperatures and column densities thus derived are summarized in Table \ref{Tab:RADEX_CD}. Kinetic temperatures derived from RADEX are systematically higher than those derived from rotational diagrams, which is consistent with sub-thermal excitation. For most molecules, column densities derived from rotational diagrams and RADEX give compatible results, within uncertainties. However, some prominent exceptions are observed. In the PDR, beam-averaged column densities of CS and SO derived from rotational diagrams are two times larger than values derived using RADEX. In the core, the SO abundance derived from rotational diagrams is two times larger than the abundance obtained from RADEX. Since RADEX models take into account non-LTE effects, we consider results from RADEX models to be better constrained than those coming from rotational diagrams, and we adopt them in the following discussion. We note that, because of the effects of high optical depth, column densities derived using LTE should be lower than those obtained using RADEX. However, we have corrected LTE values for opacity effects (see Eq. \ref{Eq:rot_diag_opacity}). The opacity has been derived from the ratio of the integrated intensity of the main isotopologue over the less abundant one, assuming that $T_{ex}$ is the same for all the isotopologues. An overestimation of the opacity would lead to an error in the column density calculation. In addition, the assumption of the same rotation temperature for all transitions used in LTE is not always accurate. In any case, the differences between LTE and RADEX models are within the uncertainties inherent to this kind of calculation. \begin{figure}[] \begin{center} \includegraphics[scale=0.5,trim = 0mm 0mm 0mm 0mm,clip]{Ab_ratio.pdf} \caption{Ratio between the abundance in the PDR/core position for each species.} \label{Fig:Abundance_ratio} \end{center} \end{figure} \section{Molecular abundances} To derive the abundances shown in Tables \ref{Tab:rotational_diagrams} and \ref{Tab:RADEX_CD} we have assumed $\rm N(H_{2}) = 1.9 \times 10^{22}~cm^{-2}$ at PDR and $\rm N(H_{2}) = 2.9 \times 10^{22}~cm^{-2}$ at the core \citep{Gerin2009}, and N(H) = 0 at both positions, meaning that gas is mostly molecular. Given the large beam sizes implied, we consider that this is a valid assumption for the PDR. The $\rm N(H_{2})$ values were derived using a beam of 12$\arcsec$. Following our assumption that the emission is extended and uniform, they should be the same with a larger beam of 25$\arcsec$. We assume this hypothesis to be coherent with our previous studies \citep{Gerin2009b, Pety2012, Guzman2014}. Our first result is that the fractional abundances and molecular abundance ratios estimated towards the two surveyed positions agree within a factor of approximately three. This gentle gradient is likely due to the limited angular resolution of our observations, which do not resolve the thin outer layers of the PDR. In fact, using interferometric observations, \cite{Goicoechea2006} derived CS abundances towards the outer PDR layers that are approximately five times larger than those presented in this study. Moreover, the line of sight towards the core also intersects the PDR layer in the cloud surface, which makes the detection of chemical gradients more difficult. A factor of two to three, however, can be significant given the high S/N ratio in our spectra and the peculiar observational strategy of WHISPER, which avoids calibration and pointing errors. The C- bearing species C$_2$S and o-H$\rm _{2}$CS present fractional abundances a factor of $>$ two higher in the core than towards the PDR (see Fig~\ref{Fig:Abundance_ratio}). In contrast, the O-bearing molecules SO, SO$\rm _{2}$ , and OCS present similar abundances towards both positions. The same is true for the HCS$^+$. Other species, S$_2$H, SO$^+$, NS, and the recently discovered ion NS$^+$, are more abundant towards the PDR than towards the core. This work identifies NS and NS$^+$ as new PDR-like species. We have unsuccessfully searched for the following sulphuretted compounds: CS$^+$, HCS, HSC, HCCS, NCS, HNCS, HSCN, HCNS, HSNC, HSOC$^+$, HOCS$^+$, H$_2$C$_3$S, and CH$_3$SH. Some of them, HCS, HSC, HNCS, HSCN, and CH$_3$SH, were previously detected in the interstellar medium. The radicals HCS and HSC were recently detected towards the dark cloud L483, with abundances of a few 10$^{-10}$ and various 10$^{-12}$ respectively \citep{Agundez2018}. HNCS and HSCN were detected in the envelope of Sgr B2 and towards TMC~1 \citep{Adande2010}. The organic sulphur compound CH$_3$SH has been detected in hot cores (Sgr B2: \citealp{Linke1979}, G327.3-0.6: \citealp{Gibb2000}; Orion: \citealp{Kolesnikova2014}). \citet{Majumdar2016} determined a CH$_3$SH abundance of a few 10$^{-9}$ towards the hot corino IRAS16293$-$2422. The upper limits obtained towards the Horesehead are not good enough to tightly constrain the abundance of these rare species. We have detected the deuterated sulphur compound HDCS towards the PDR and core positions. This compound was detected by \citet{Marcelino2005} towards the dark cores Barnard 1b and TMC1, with HDCS/H$_2$CS$\sim$0.3, fully consistent with the values derived towards the Horsehead. However, we have not detected DCS$^+$ with an upper limit to the DCS$^+$/HCS$^+$ ratio of DCS$^+$/HCS$^+$$<$0.2. \citet{Fuente2016} detected DCS$^+$ for the first time towards the dark core Barnard 1b with DCS$^+$/HCS$^+$$\sim$0.2. The non-detection of DCS$^+$ in the core position is roughly consistent with the DCS$^+$/HCS$^+$ ratio measured in Barnard 1b. \section{Discussion} We present the abundances of 13 S-bearing species (CS, SO, SO$\rm _{2}$, OCS, H$\rm _{2}$CS -- both ortho and para -- HDCS, C$\rm _{2}$S, HCS$\rm ^{+}$, SO$\rm ^{+}$, H$_2$S, S$_2$H, NS, and NS$^+$) towards the PDR and core positions in the Horsehead nebula. In particular, we highlight the first detection of NS$^+$ in a PDR environment, and of SO$\rm ^{+}$ in the Horsehead. In the following we discuss the chemistry of these ions and compare the abundances measured towards the Horsehead with those found in other prototypical regions. \subsection{NS$^+$ and SO$^+$} The chemistry of NS and NS$^+$ is still poorly understood. \cite{Cernicharo2018} explored the main formation mechanisms for these species and their relative importance under typical physical conditions in dark clouds. We show in Fig.~\ref{Fig:NS+} the formation channels relevant for a PDR environment like that of the Horsehead nebula, where the S$^+$ + NH reaction as well as the charge exchange reactions of NS with C$^+$and S$^+$ become formation processes of NS$^+$, as C$^+$ and S$^+$ are the major carbon and sulfur components. Alternatively, the destruction channel of NS by atomic carbon stressed in \cite{Cernicharo2018} becomes less critical than in dense cloud conditions. The NS$^+$ ion is thought to be formed through the reactions \begin{gather} {\rm N} + {\rm SH}^+ \rightarrow {\rm NS}^+ + {\rm H} \\ {\rm N} + {\rm SO}^+ \rightarrow {\rm NS}^+ + {\rm O} \\ {\rm S}^+ + {\rm NH} \rightarrow {\rm NS}^+ + {\rm H} \\ {\rm H_{2}S}^+ + {\rm N} \rightarrow {\rm NS}^+ + {\rm H_{2.}} \end{gather} \begin{figure}[!t] \begin{center} \includegraphics[trim = 20mm 30mm 0mm 0mm, clip, scale=0.35]{NS_route.pdf}\\ \caption{Gas phase formation and destruction routes of NS$^+$.} \label{Fig:NS+} \end{center} \end{figure} These reactions are favoured in UV-illuminated regions. In fact, the ions S$^+$, SH$^+$, and SO$^+$ are thought to be major gas-phase sulphur reservoirs in the external layers of the dense, high-UV PDRs formed in massive star-forming regions (see e.g. \citealp{Sternberg1995}). The enhanced abundance of SO$^+$ in PDRs has been observationally confirmed by single-dish observations towards prototypical PDRs such as NGC 7023, the Orion Bar, and Mon R2 \citep{Fuente2003,Ginard2012}. The ion SO$^+$ is primarily formed through the reaction \begin{equation} \rm S^+ + OH \rightarrow SO^+ + H \end{equation} and is mainly destroyed by dissociative recombination. The radical OH is the product of the endothermic reaction \begin{equation} \rm O + H_2 \rightarrow OH + H ~( \Delta E/k \sim 3000~K) \end{equation} and its abundance, and consequently that of SO$^+$, is very sensitive to the gas kinetic temperatures. We have detected for the first time SO$^+$ towards the Horsehead, with N(SO$^+$)/N(SO)$\sim$0.01$-$0.04, where gas kinetic temperatures achieves values of $\sim$100$-$300~K in the most external layers \citep{Habart2005}. This value is only a few times lower than that measured towards the high-UV and denser PDRs Mon R2 and the Orion Bar \citep{Fuente2003, Ginard2012} where the gas kinetic energy might be as high as $\sim$1000~K. The ion SO$^+$ has been detected with a lower N(SO$^+$)/N(SO) ratio towards the core position, consistent with the presence of a UV-illuminated surface intersecting our line of sight. The ion SH$^+$ is only expected to be detectable in warm regions where the endothermic reaction \begin{equation} \rm S^+ + H_2 \rightarrow SH^+ + H ~(\Delta E/k \sim 9860~K) \end{equation} can proceed \citep{Zanchet2019}. Interestingly, this reaction becomes exothermic when H$_2$ molecules are in the $v$=2 or higher vibrational levels \citep{Zanchet2013}. The detection of the SH$^+$ emission lines in the high-mass star-forming region W3~IRS5 \citep{Benz2010} or the Orion Bar \citep{Nagy2013, Muller2014} is interpreted in terms of the reactions of S$^+$ with vibrationally excited H$_2$ molecules \citep{Zanchet2019}. High angular resolution Atacama Large Millimeter Array (ALMA) images of SH$^+$ and SO$^+$ in the Orion Bar confirm this interpretation \citep{Goicoechea2017}. In these images, the SH$\rm ^{+}$ emission comes only from a thin layer, which is spatially coincident with the H$\rm _{2}$ v=1-0 S(1) emission layer, while SO$\rm ^{+}$ extends deeper into the cloud. The ion SH$^+$ has also been detected in low density environments. In particular, SH$^+$ has been detected in absorption towards Sgr B2 \citep{Menten2011} and in diffuse clouds was observed toward several Galactic sight lines by \cite{Godard2012}, who showed that turbulent dissipation and shocks provide the required energy to form SH$^+$ in these very low density clouds. To our knowledge, SH$\rm ^{+}$ has not been detected in the Horsehead. This is not surprising since this ion is hardly formed in this nebula. In PDRs, H$\rm _2$($v$=2) and higher vibrational levels are mostly populated by FUV pumping. Since the FUV flux in the Horsehead is not strong, the layer where H$\rm _2$($v$=2) is excited is most likely very narrow, thus strongly diluted to be detected with single-dish telescopes. Other routes to the formation of NS$^+$ involve the ionic species H$_2$S$^+$ and S$^+$. Because of its low ionization potential, sulfur is expected to be ionized up to A$\rm _{v}$ $\rm \sim$ 7 mag (see e.g. \citealp{LeGal2017}) and is a plausible precursor of NS$^+$. The abundance of the ion H$_2$S$^+$, formed by the reaction S + H$_3^+$, might be important in deeper layers of the molecular cloud depending on the cosmic ray ionization rate \citep{Sternberg1995}. Within this scenario, NS$^+$ could be considered as a PDR tracer. This ion has been widely detected in the interstellar medium \citep{Cernicharo2018}. One possibility is that NS$^+$ emission is coming from the UV-illuminated external layers of the cloud. To check this hypothesis, in Fig.~\ref{Fig:corrNS+} we represent the NS$^+$ abundance as a function of the total H$_2$ column density for all the reported NS$^+$ detections thus far. The NS$^+$ abundance is anti-correlated with N(H$_2$), as expected if the NS$^+$ emission is coming mainly from the cloud surface. The chemistry of NS is poorly understood as well. This compound is detected in very different environments such as dark clouds and hot cores \citep{Fuente2016,Cernicharo2018} as well as towards the Orion Bar \citep{Leurini2006}. Moreover, NS has been detected in comets with an abundance of 0.006-0.12~\% relative to water \citep{Calmonte2016}. Ice evaporation might the origin of NS in hot cores \citep{Vidal2017, Viti2004}. Other desorption mechanisms (photodesorption, cosmic-rays, grain sputtering) might release some NS molecules to the gas phase even in cold environments. We recall that \cite{Fuente2017} also proposed that these desorption processes would release H$\rm_{2}$S and S$\rm_{2}$H molecules from the grain surfaces, boosting their abundances in gas phase. \begin{figure}[!h] \begin{center} \includegraphics[scale=0.6]{fig_nsplus.pdf}\\ \caption{Abundances of NS$^+$ as a function of N(H$_2$). Black points corresponds to the detections reported by \citet{Cernicharo2018}. Red points corresponds to the core and PDR positions in the Horsehead. The black solid line depicts a linear fit to the data.} \label{Fig:corrNS+} \end{center} \end{figure} \begin{table*}[] \caption{Comparison of fractional abundances with observational templates.} \label{Tab:Comps} \centering \begin{tabular}{l | c | c | c | c } \hline \hline & \multicolumn{1}{c}{HH-PDR} & \multicolumn{1}{|c}{TMC 1-CP} & \multicolumn{1}{|c}{Orion KL} & \multicolumn{1}{|c}{Comets (\% wrt H$_2$O)} \\ \hline CS & (4.5$\rm \pm$1.1)$\rm \times 10^{-10}$ & 1.4$\rm \times 10^{-9}$ & 7.0$\rm \times 10^{-8}$ & 0.02$-$0.2 \\ SO & (3.9$\rm \pm$0.5)$\rm \times 10^{-10}$ & 7.5$\rm \times 10^{-10}$ & 8.0$\rm \times 10^{-8}$ & 0.04$-$0.3 \\ o-$\rm H_{2}CS$ & (2.4$\rm \pm$0.3)$\rm \times 10^{-11}$ & 3.0$\rm \times 10^{-10}$ & 5.6$\rm \times 10^{-9}$ & 0.009$-$0.09 \\ OCS & (5.0$\rm \pm$0.8)$\rm \times 10^{-11}$ & 1.1$\rm \times 10^{-9}$ & 5.0$\rm \times 10^{-8}$ & 0.03$-$0.4 \\ CCS & (8.0$\rm \pm$2.6)$\rm \times 10^{-12}$ & 3.5$\rm \times 10^{-9}$ & 8.0$\rm \times 10^{-11}$ & \\ SO$\rm _{2}$ & (1.2$\rm \pm$0.2)$\rm \times 10^{-10}$ & 1.5$\rm \times 10^{-10}$ & 1.9$\rm \times 10^{-7}$ & 0.2 \\ SO$\rm ^{+}$ & (1.7$\rm \pm$0.5)$\rm \times 10^{-11}$ & & & \\ HCS$^+$ & (1.1$\rm \pm$0.2)$\rm \times 10^{-11}$ & 1.5$\rm \times 10^{-10}$ & & \\ NS & (1.0$\rm \pm$0.2)$\rm \times 10^{-10}$ & 4.0$\rm \times 10^{-10}$ & 3.4$\rm \times 10^{-9}$ & 0.006$-$0.012 \\ NS$^+$ & (3.0$\rm \pm$0.6)$\rm \times 10^{-12}$ & 2.4$\rm \times 10^{-12}$ & & \\ H$_2$S & (3.1$\rm \pm$0.5)$\rm \times 10^{-10}$ & $<$2.5$\rm \times 10^{-10}$ & 1.5 $\rm \times 10^{-6}$ & 0.13$-$1.5 \\ S$_2$H & (8.7$\rm \pm$3.1)$\rm \times 10^{-11}$ & & & \\ \hline sulphur budget & $\sim$1.5$\times$10$^{-9}$ & $\sim$8$\times$10$^{-9}$ & 1.9$\times$10$^{-6}$ & 4$\times$10$^{-6}$ (n(H$_2$O)/n$_H$=2.7$\times$10$^{-4}$)\\ \hline \hline \end{tabular} \noindent \tablefoot{Refs: TMC1: \citet{Agundez2013, Cernicharo2018} and references therein; Orion-KL: \citet{Tercero2010, Esplugues2014, Crockett2014}; Comets: \citet{Calmonte2016, Bockelee2017}.} \end{table*} \subsection{Sulphur budget in the Horsehead} The main reservoir of sulphur in gas phase is still debated. In dark cores, only about 0.05\% is locked in the S-bearing molecules detected at millimeter wavelengths (see the fractional abundances derived for S-bearing species towards the dark cloud TMC1-CP in Table~\ref{Tab:Comps}). Unfortunately, most of the plausible major sulphur reservoirs such as S, HS, and S$_2$ are either not observable or very difficult to observe at millimeter wavelengths and one needs to trust to chemical models to estimate the exact amount of sulphur in the gas phase. It is widely accepted that most of the sulphur is locked in icy grain mantles. This is corroborated by the observations of S-bearing species in comets. In a recent compilation, \citet{Bockelee2017} estimated that the S/O elemental ratio in the comet ice is about 1.5 \%, which is consistent within a factor of approximately four with the solar value, H$_2$S being the main sulphur reservoir. Hot cores are compact warm regions where the icy mantles evaporate releasing the sulphur budget to the gas. Orion KL is the best-studied hot core, with full spectral surveys at millimeter and submillimeter wavelengths. In Table~\ref{Tab:Comps}, we show the abundances of sulphur species that have been derived in this prototypical hot core. Gas phase H$_2$S is the main sulphur reservoir in this hot core and the elemental gas-phase sulphur abundance is $\sim$1.6$\times$10$^{-6}$ \citep{Crockett2014}. \cite{Fuente2019} obtained a similar value for the sulphur gas phase abundance of $\sim$10$^{-6}$ in the edges of the TMC1 molecular cloud. Based on the WHISPER survey, we have determined a significant inventory of sulphur species and their abundances in the Horsehead PDR. Only one H$_2$S line has been observed and the estimated value of the H$_2$S abundance ($\sim$0.3$-$5$\times$10$^{-9}$) is hence uncertain. It seems clear, however, that the abundance of gaseous H$_2$S is far from that observed in Orion-KL. One possibility is that a large fraction of H$_2$S remains in the solid state. This is expected since the dust temperature in this PDR is around $\sim$20-30 K in the PDR \citep{Goicoechea2009}, which is below the sublimation temperature of H$_2$S, $\sim$80~K \citep{JimenezEscobar2011}. The detections of SO$^+$ and NS$^+$ suggest that a significant fraction of sulphur is in the form of S$^+$ in the outer layers of this cloud. Sulphur chemistry is still poorly known, and especially surface chemistry reactions need further understanding. \cite{Oba2018} demonstrated that chemical desorption is an efficient mechanism for sulphur-bearing-molecule formation at least in some cases, such as H$_2$S. Given the high fraction of sulphur present in a solid state ($\sim$90$\%$), their work highlights the importance of chemical desorption for understanding the abundances of the different molecular species in the gaseous phase. Although it has been widely debated what the main sulphur reservoirs in the interstellar medium are, little information is available about the sulphur chemistry in PDRs thus far. Our study shows that CS, SO, and H$_2$S are the most abundant observable S-bearing molecules in the Horsehead PDR, with similar abundances within one order of magnitude. The total abundance of S atoms locked in these three species is $\sim$ a few 10$^{-9}$, only $\sim$0.1\% of the total number of atoms. Therefore, they do not constitute the main sulphur reservoir. An important fraction of sulphur atoms might be forming icy mantles in these low-UV irradiated regions. Dust grain temperatures in this low-UV PDR are $\sim$20-30~K, lower than the evaporation temperature of H$_2$S, the main sulphur reservoir in solid state. In the gas phase, S and S$^+$ are expected to be the main sulphur reservoirs \citep{LeGal2017,Goicoechea2006}. Unfortunately the observation of these species is not easy in the (sub-)millimeter wavelength range. Although weak and difficult to interpret, the detection of a sulphur recombination line by \citet{Roshi2014} in NGC~2024 provides evidence for large abundances of S and S$^+$ in the gas phase. \section{Conclusions}\label{ref:SumConc} Photodissociation regions constitute the transition between diffuse clouds, in which sulphur is mainly in the gaseous phase, and cold cores where S-bearing molecules are heavily depleted; therefore they are essential regions to understand sulphur chemistry. Here we present a complete inventory of S-bearing molecules and their abundances in the Horsehead nebula based on the WHISPER survey. Two positions are targeted in this survey, one coincident with a dense core and the other at the PDR-line species peak (PDR). The detections towards the PDR are especially interesting since this is the most complete observational study of S-bearing species in a PDR thus far. We have detected 13 S-bearing species (CS, SO, SO$\rm _{2}$, OCS, H$\rm _{2}$CS -- both ortho and para -- HDCS, C$\rm _{2}$S, HCS$\rm ^{+}$, SO$\rm ^{+}$, H$_2$S, S$_2$H, NS, and NS$^+$) towards the PDR and core positions in the Horsehead nebula. Two prominent results of this study are the detection of SO$^+$ and NS$^+$ for the first time in a PDR. Comparing the core and PDR positions, we find a differentiated chemical behaviour between C-S and O-S bearing species. The C-S bearing species C$_2$S and o-H$\rm _{2}$CS present fractional abundances a factor of $>$ two higher in the core than in the PDR. In contrast, the O-S bearing molecules SO, SO$_2$ , and OCS present similar abundances towards both positions. The same is true for the HCS$^+$. A few molecules are more abundant towards the PDR than towards the core: S$_2$H, SO$^+$, NS, and NS$^+$. \cite{Fuente2017} proposed S$\rm _2$H to be a good tracer of low-UV PDRs, where an active grain surface chemistry and gaseous photo-chemistry coexist. We are aware that, with our limited angular resolution, it is doubtful to conclude that NS$^+$ is mainly coming from the PDR. Yet NS$^+$ behaves like other S-bearing molecules that have been interpreted as UV tracers, such as SO$^+$ and S$\rm _2$H. Therefore it is worth investigating the link between the enhanced UV-field in PDRs and NS$^ +$ abundances. \acknowledgements We thank the Spanish MINECO for funding support from AYA2016-75066-C2-1/2-P, AYA2017-85111-P and ERC under ERC-2013-SyG, G. A. 610256 NANOCOSMOS. JRG thanks the Spanish MCIU for funding support under grant AYA2017-85111-P. This work was supported by the Programme National $``$Physique et Chimie du Milieu Interstellaire$''$ (PCMI) of CNRS/INSU with INC/INP co-funded by CEA and CNES. \bibliographystyle{aa}
\section*{References}
\section{Introduction} \label{sec:intro} Assembly line balancing is well established in industrial engineering and much research effort has been devoted over the years to analyzing one of the so-called simple assembly line balancing problems SALPB-1, which involves minimizing the required number of work stations for a given cycle time. The purpose of the present paper is to propose a generalization of the SALPB-1 model that allows for the potential division of certain of the given tasks at the cost of additional processing time. This is an extension of the traditionally-held assumption that the total work needed for each product unit has been partitioned into economically indivisible tasks. This extension arises from practical experience in industry where it is sometimes possible to divide particular tasks in limited ways. Despite the time penalties incurred, task division may lead to a reduction in the minimum number of stations. Deciding which allowable tasks to divide creates a new assembly line balancing problem, which is here. The paced manufacturing assembly line for the mass production of standardized automobiles was first introduced by Ranson Eli Olds in 1901 in his Olds Motor Vehicle Company \citep{womack-jones-roos-1991}. By 1913, Henry Ford had significantly improved the assembly line concept and nowadays, the first assembly line for building cars is attributed to him. It was designed to be an efficient, highly productive way of manufacturing discrete commodities. These days, the basic assembly line is used to produce large volumes of a wide variety of standardized or customized assembled products, including not only vehicles, but also many home appliances and electronic goods. As observed by \citet{baybars-1986}, \citet{scholl-1998} and many others, the management of assembly lines is a significant short-to-medium term challenge in manufacturing planning. Following the notation and terminology of \citet{scholl-boysen-fliedner-2009}, the line consists of a set of $m$ (work) \emph{stations} arranged in a linear fashion, with stations connected by a mechanical material handling device. The basic movement of material through an assembly line begins with the workpieces necessary to begin the creation of each unit of a single product being fed consecutively to the first station. The work necessary to complete each unit of the product is divided into a set of \emph{tasks} $V = \{1,\dots,n\}$, each of which must be assigned to a station. Once a partially assembled product enters an activated station, an assigned (nonempty) set of tasks is performed on it and it is then fed to the next activated station. The time required to complete each task $j \in V$ is termed its (positive, integral) \emph{processing time} and is denoted by $t_j$, $j = 1,\dots,n$. The set of tasks assigned to a station $k$ comprises its \emph{station load}, and is denoted by $S_k$. The total time required to process all the tasks assigned to each station $k = 1,\dots,m$; is termed its \emph{station time}, and is denoted by $t(S_k)$. The common time available to complete all the assigned tasks in sequence at each station is termed the \emph{cycle time}, and is denoted by $c$. Note that the station time must not exceed the cycle time at each station, i.e., $t(S_k)\leqslant c$, $k=1,\dots,m$. If $t(S_k) < c$, then station $k$ has \emph{idle time} of $(c - t(S_k))$ time units in each cycle. There are sequences of tasks that must be followed in the assembly of any product and these are represented in a \emph{precedence graph} $G = (V, A, t)$, that has a set of arcs $A$, each representing the necessary precedence relations $(i,j)$ between different tasks $i, j \in V$. That is, task $i$ must be completed before task $j$ is commenced. $G$ is acyclic, with $V$ numbered topologically and $t:V \rightarrow \mathbb{N}$, where $t(j) = t_j$, $j = 1,\dots,n$. For each task $j \in V$, its set of direct predecessors is defined as $P_j = \{i \in V\>|\> (i, j) \in A\}$ and its set of direct successors is defined as $F_j = \{i \in V\>|\> (j, i)\in A\}$. To account for indirect precedence relationships, the set of all predecessors $P^*_j = \{i \in V\>|\>\text{a path of arcs from $i$ to $j$ exists in $G$}\}$ and the set of all successors $F^*_j = \{i \in V\>|\>\text{a path of arcs from $j$ to $i$ exists in $G$}\}$, respectively, are also defined. The assembly line balancing problem (ALBP) involves assigning the tasks needed to produce each unit of a product among the work stations along the manufacturing line in order to optimize some given system performance measure of the line. The idea of line balancing was first introduced by \citet{bryton-1954} in his thesis as a medium term planning challenge. The first published quantitative study was reported by \citet{salveson-1955} who formulated the problem as a linear program and was the first to introduce the phrase the \textit{Assembly Line Balancing Problem}. \citet{gutjahr-nemhauser-1964} showed that the ALBP falls into the class of $\mathcal{NP}$-hard combinatorial optimization problems. Furthermore, practical ALBP instances can be extremely large, with thousands of tasks. Thus, planners often have to examine a huge number of alternative balancing plans to deal with uncertain model mix information and technological and logistical constraints. For these reasons, heuristic methods have become popular techniques for solving the ALBP. However, with the emergence of Lagrangian relaxation and column generation, integer programming techniques are now capable of solving many practical ALBP instances. We focus on such approaches in the present paper. Most types of assembly line balancing problems are based on a set of limiting assumptions. \citet{baybars-1986} specified the following assumptions for the well-known simplified version of the ALBP, the Simple Assembly Line Balancing Problem (SALBP): \begin{enumerate}[label=A\arabic*),ref=A\arabic* \item\label{type-all} all input parameters are known with certainty; \item\label{type-split} no task can be divided among two or more stations; \item tasks cannot be processed in arbitrary sequences due to technological precedence requirements; \item each task must be processed; \item all stations under consideration are identically equipped and staffed to process any task; \item task processing times are independent of the station at which they are processed and of the preceding tasks; \item any task can be processed at any station; \item the line is serial, with no parallelism nor side feeds; \item the line is designed for the mass production of one model of a single product; \item\label{type-c} either the cycle time $c$, is given and fixed, or \item\label{type-m} the number of workstations $m$, is given and fixed. \end{enumerate} The most popular variants of the SALBP considered in the literature arise from assumptions \ref{type-c} and \ref{type-m} above and are: \begin{itemize} \item The Simple Assembly Line Balancing Problem-1 (SALBP-1): Given the cycle time $c$, minimize $m$, the number of stations. \item The Simple Assembly Line Balancing Problem-2 (SALBP-2): Given $m$, the number of stations, minimize $c$, the cycle time. \end{itemize} \citet{wee-magazine-1982} showed that SALBP-1 is an $\mathcal{NP}$-hard problem. Most of the above assumptions \ref{type-all}--\ref{type-m}, have been relaxed or somehow modified by various model extensions appearing in the literature. The present paper addresses the SALBP-1 variation arising when only Assumption \ref{type-split} above is relaxed to a limited extent, i.e., some tasks may potentially be divided among more than one station in particular ways at the additional cost of time penalties. The \emph{Branch and Bound} technique has been widely used to solve SALBP-1 instances optimally. \citet{scholl-klein-1999} presented a comparison, with computational results, between approaches that use branch and bound and various other strategies to solve the SALBP-1. The SALBP-1, without the precedence constraints, can be seen as an instance of the \emph{Bin Packing Problem}, where a set of tasks (objects) has to be allocated (packed) in stations (bins) with identical finite cycle time. The solution of such an instance of the Bin Packing problem is used in many branch and bound based algorithms as a lower bound for the optimal solution of the SALBP-1, as in FABLE \citep{johnson1988optimally}, SALOME \citep{scholl-klein-1997} and BB\&R \citep{sewell-jacobson-2012}. Exact methods for the SALBP-1 have evolved over the years with the development of computer technology and modern algorithmic techniques. The FABLE algorithm, presented by \citet{johnson1988optimally}, uses a set of lower bounds, including a solution of the Bin Packing Problem, and a series of rules of domination to discard partial solutions dominated by solutions previously explored. \citet{nourie1991finding} presented a tree structure used in their OptPack algorithm to eliminate previously exploited solutions more efficiently than the domination rules used in FABLE. \citet{hoffmann1992eureka} introduced a hybrid system, called Eureka, which uses Branch and Bound to find an optimal solution within a previously defined time limit. If this solution is not found, a heuristic is used to find an approximate solution. Hoffmann also observed that some instances could be resolved more quickly if processed in the opposite direction of the precedence graph. He proposed using half the time limit computing in one direction and the other half in the opposite direction. \citet{scholl-klein-1997} presented the SALOME algorithm, which combined the best features of the FABLE and Eureka algorithms. In 1999 \citet{scholl-klein-1999} improved SALOME by adding a tree-based domination rule developed by \citet{nourie1991finding} for the OptPack algorithm. According to \citet{sewell-jacobson-2012}, SALOME was the best algorithm to solve SALBP-1 optimally. However, in the same article they proposed a new hybrid algorithm called BB\&R (Branch, Bound and Remember) to solve SALBP-1 optimally, with reported computational results superior to those obtained with the SALOME algorithm. The BB\&R algorithm combines a number of previously successful SALBP-1strategies including branch and bound, dynamic programming and domination rules, as reported by several authors (\cite{hoffmann1992eureka, nourie1991finding,scholl-becker-2006,scholl-klein-1997}, and others). The remainder of the paper is organized as follows. Section \ref{sec:tdalbp} introduces a generalization of the SALBP-1 problem that allows for the limited division of certain tasks with time penalties. An optimization model for the new problem is formulated in Section \ref{sec:model-tdalbp}. In Section \ref{sec:algor} the BB\&R algorithm is detailed, as well as the necessary changes in its structure to allow the search of optimal solutions for instances of the new problem. Computational results obtained by applying the adapted algorithm to instances derived from classical SALBP-1 instances of the literature are reported in Section \ref{sec:results}. Finally, a conclusion with some proposals for future research are given in Section \ref{sec:conclusions}. \section{The Task Division Assembly Line Balancing Problem ({\small TDALBP})} \label{sec:tdalbp} It is traditionally assumed in assembly line balancing that the total work needed for each unit of any product has been partitioned into economically indivisible tasks, so that further division would create unnecessary subtasks and an unproductive increase in total work content. Thus, as stated in Assumption \ref{type-split} in Section \ref{sec:intro}, each required task is indivisible, in the sense that it must be performed at a single station. In practice in industry, however, this is not always so. Changes in technology, product design, manufacturing processes and job design may create opportunities to make beneficial changes to the way in which the total work content is partitioned into tasks. This may mean that some of the so-called indivisible tasks become potentially divisible in the sense that they can be profitably divided further into subtasks that are assigned to different stations. This may be especially the case when there is a time-oriented objective, such as in the SALBP-1, and there is significant variance among task processing times with some of them equal to, or close to, the cycle time. When some of the tasks with relatively longer processing times involve simple operations such as: boring, drilling, or tightening bolts or screws, part of the task might be usefully delayed to a later station. For example, suppose a task consists of tightening many bolts and this task has one of the longer processing times among all tasks. Suppose that only two bolts need to be tightened to hold two workpieces safely in place and the rest of the bolts can be tightened at a later station, without access problems caused by the completion of intermediate tasks. In such a case, the minimal number of required stations may possibly be reduced when a task like this can be divided in such way, even when the division induces additional time penalty costs. This will be illustrated in a numerical example given later. Including the possibility of such task division leads to a new assembly line balancing problem that we denote by TDALBP (Task Division Assembly Line Balancing Problem). This concept has been discussed in qualitative ways by a number of authors (c.f., for example, \citet{chase-jacobs-2013}). But, as far as we are aware, apart from a brief introduction to the problem by \citet{grzecha-foulds-2015b}, the issue has not been discussed in the open literature in a quantitative manner. It is the purpose of the present paper to attempt to fill this gap in the literature by discussing a rigorous version of the problem, formulating a binary integer programming model of it, proposing solution methods and reporting computational experience. The TDALBP is a generalization of the SALBP-1 with Assumption \ref{type-split} above relaxed to a limited, specific extent in the sense that a given subset of tasks can potentially be divided in some particular, known ways. Instead of confining each such task to be processed at exactly one station, it can potentially be divided by assigning each its consequent subtasks to different stations, with the sum of the processing times of the subtasks equal to the processing time of the original task. Any such division may causes additional time penalties to be incurred at any station to which a subtask is assigned. We formulate the TDALBP in a manner similar to how the ASALBP (alternative subgraphs assembly line balancing problem) was formulated by \citet{scholl-boysen-fliedner-2009}. The ASALBP extends the SALBP by relaxing the additional tacit assumption that all tasks are processed in a predetermined mode and no processing alternatives exist. Instead, the authors assume that alternatives exist for parts of the production process. Each such part is called a variable subprocess which results in alternative (disjunctive) subgraphs in the precedence graph of which exactly one has to be chosen for each part. In our formulation of the TDALBP we also assume that processing alternatives exist, but only for a given subset of potentially divisible tasks. The node representing each potentially divisible task in the precedence graph is expanded to a set of additional nodes (each with the same precedence relations as the original node) where each new node represents a possible subtask created by dividing the original task. It is theoretically possible to consider the TDALBP as a special case of the ASALBP in which each potentially divisible task is considered to be a variable subprocess and each feasible combination of its subtasks is represented by an alternative subgraph. In this way, any TDALBP instance can be solved by any ASALBP method, such as those proposed by \citet{capacho-pastor-dolgui-guschinskaya-2009} and \citet{scholl-boysen-fliedner-2009}. The difficulty is that in the TDALBP, each potentially divisible task may possibly be divided into many subtasks. Furthermore, feasible subtask combinations do not correspond to only partitions of the processing time, as illustrated in the following example. These factors may lead in practice to an unmanageable number of ASALBP subgraphs. \begin{example} \label{ex:1} Suppose a certain TDALBP instance has a particular potentially divisible task with processing time 6. The task can be divided into subtasks with the following processing times: \{6\}, \{5, 1\}, \{4, 2\}, \{4, 1, 1\}, \{3, 3\}, \{3, 2, 1\}, \{3, 1, 1, 1\}, \{2, 1, 1, 1, 1\} and \{1, 1, 1, 1, 1, 1\}. Note that choosing the first ``subtask'' option reflects the decision to not divide the task. Exactly one of these combinations must be chosen. If the task is actually divided into two or more subtasks, its subtasks are all assigned to different stations. In such a case, the processing of each subtask incurs a station-independent time penalty (to be introduced later.) \end{example} Thus, if no restrictions are placed on the division process, it is clear that the number of division options grows exponentially with the number of given subtasks. This leads to a huge number of ASALBP alternative subgraphs for all but trivial TDALBP instances. For this reason, we prefer to construct a dedicated TDALBP model that contains only the set of given task division combination options themselves, whose cardinality grows in $\mathcal{O}(1)$. Identifying optimal combinations is left to solution algorithms for the model. We now propose a version of the TDALBP that allows for just a single combination of subtasks for each potentially divisible task to be chosen. This leads to the TDALBP optimization model given in the next section. The node representing each potentially divisible task in $V$, is expanded to include a new set of nodes in $G$ that represent all subtasks that could be created if the task is divided. Each new node is allocated the same precedence relations as the original node. The following notation is introduced to make the presentation more rigorous. Let: \begin{description}[align=right,labelwidth=!,leftmargin=4.3cm,labelsep=.15cm] \item [$D$ :] the set of potentially divisible tasks $(D \subseteq V, D \neq \emptyset)$; \item [$I$ :] the set of indivisible tasks $(I \subseteq V, n \in I, V = D \cup I, D \cap I = \emptyset)$; \item [$r_j$ :] the number of processing times for which task $j$ can be processed, $\forall\> j \in V$ ($r_j$ is set as unity, $\forall\> j \in I$); \item [$t_j^q$ :] the (positive, integral) $q^\text{th}$ processing time available for task $j$, $\forall\> j \in V,\> q = 1,\dots,r_j$; \item [$T_j = \langle t_j^q\>|\>q = 1,\dots,r_j\rangle$ :] the (nonincreasing) sequence of given processing times for which task $j \in V$ can be processed, where $t_j^1 = t_j$, the original processing time of the task $j$ and thus $t_j^p \geqslant t_j^q$ whenever $p < q$, for $1\leqslant p, q \leqslant r_j$ ($T_j$ contains only the single entry $t_j^1$, $\forall\> j \in I$); \item [$f_j^q :$] the (strictly positive) time penalty incurred if task $j$ is processed for $t_j^q$ time units, $\forall\> j\in V$, $q = 1,\dots,r_j$ ($f_j^1$ is set as zero for each original task $j$, $\forall\> j \in V$). \end{description} With only a slight abuse of terminology, from now on, we use the terms tasks and nodes interchangeably. It is assumed that the terminal node $n$, is the only one in $G$ without successors. If this does not occur naturally in $G$, a dummy last node with zero processing time is introduced. It is also assumed that task $n$ is indivisible. To enable certain possibly useful subtask combinations of each potentially divisible task $j \in D$ to be considered, repetitions of subtask processing times $t_j^q$, for certain values of $q$, $2 \leqslant q \leqslant r_j$, may appear in $T_j$, allowing $j$ to be divided into subtasks with equal processing times. However, it is assumed that such subtasks must still be processed at separate stations. For instance, if $t_j = 6$, it may be useful to divide j into two subtasks to be processed at different stations, each with given processing time of 3 units. There is no time penalty if task $j$ is not divided and which is why $f_j^1$ is defined as zero. If potentially divisible task $j$ is divided, and this results in a subtask with a given processing time of $t_j^q$ being activated at any station, the final processing time of the subtask is set to $(t_j^q + f_ j^q)$, $\forall \> j\in D, q = 1,\dots,r_j$. Note that all $f_j^q$ values are station-independent. Furthermore, it is assumed that there are no precedence relations between subtasks of the same potentially divisible task. The TDALBP consists of activating a subset of subtasks for each potentially divisible task $j \in D$, by assigning them to stations (where the task $j$ itself is considered a subtask) with the following characteristics: \begin{itemize} \item the activated subtasks all satisfy the precedence relations involving task $j$, \item the sum of the given processing times of the activated subtasks equals the given processing time $t_j$, of task $j$, \item the total processing time of each activated divided subtask is the sum of its given processing and penalty times, and \item each activated divided subtask of task $j$ must be processed at a distinct station, $\forall\> j \in D$. \end{itemize} The subtasks of each potentially divisible task that are not activated and their incident arcs in $G$ are ignored. The objective of the TDALBP is to identify the optimal set of subtasks of all potentially divisible tasks so that all activated tasks (the indivisible tasks and the subtasks of potentially divisible tasks) can be assigned to the minimal possible number of stations while taking account their final processing times, the given precedence constraints and the cycle time. Some observations on conditions for well-formulated TDALBP instances are in order. If the given processing time of any task exceeds the cycle time, it must be divisible as a necessary condition for the existence of a feasible solution. As described in the next section, there is a standard approach to establishing the set of assignable stations to which any task can be assigned. If the number of subtasks in a particular subtask combination of a potentially divisible task $j$, exceeds the number of potentially assignable stations, the combination can be discarded. To illustrate this point, consider Example \ref{ex:1}, given earlier. One of the subtask combinations is $\{1, 1, 1, 1, 1, 1\}$. If there are at most five stations to which the parent potentially divisible task can be assigned, this combination (which requires six distinct stations) can be discarded. Also, any subtask of a potentially divisible task $j$ with a given processing time that renders it impossible to be part of a subtask combination whose given processing times sum to $t_j$ can also be discarded. Furthermore, as all the time penalties $t_j^q$, $j\in D$, $q=2,\dots,r_j$, are assumed to be strictly positive, there is no advantage in dividing a potentially divisible task $j$, into a combination of subtasks that contains a subtask with given processing time $(t_j^q - 1)$, for some $2 \leqslant q \leqslant r_j$. Thus, it is assumed henceforth that the given processing times for all subtasks (apart from task $j$ itself) $t_j^q$, are such that $1 \leqslant t_j^q \leqslant (t_j - 2)$; $j \in D, q = 2,\dots,r_j$. A numerical example of the TDALBP is provided as Example \ref{ex:2} below. In the next Section we formulate a mathematical model of the TDALBP. \begin{example} \label{ex:2} A TDALBP instance is given in Figure \ref{fig:2} and Table \ref{tab:1}. The potentially divisible tasks: $D=\{2, 3, 9, 13, 14, 18\}$, are depicted by round nodes and the set of indivisible tasks: $V\backslash D=\{1, 4, 5, 6, 7, 8, 10, 11, 12, 15, 16, 17, 19,\allowbreak 20, 21, 22, 23\}$, are depicted by square nodes in Figure \ref{fig:1}. The original given task processing times are shown above the nodes. All feasible subtasks and their given processing and penalty times for the potentially divisible tasks are shown in Table \ref{tab:1}. \begin{figure}[htbp] \caption{The precedence graph of the numerical example.} \label{fig:1} \centering \begin{tikzpicture}[ ->,>=stealth auto,node distance=2.0cm,thick, every node/.style={rectangle,draw, fill=red!10, inner sep=0pt, align=center, minimum size=8mm, font=\sffamily\bfseries\normalsize}, scale=.70, transform shape ] \node (n1) [label={[label distance=-5pt]90:$5$}] {$1$}; \node (n2) [circle,fill=green!10,below of=n1,label={[label distance=-5pt]90:$6$}] {$2$}; \node (n3) [circle,fill=green!10,right of=n1,label={[label distance=-5pt]90:$7$}] {$3$}; \node (n4) [right of=n2,label={[label distance=-5pt]90:$2$}] {$4$}; \node (n5) [right of=n3,yshift=-1.1cm,label={[label distance=-5pt]90:$5$}] {$5$}; \node (n7) [right of=n5,label={[label distance=-5pt]90:$1$}] {$7$}; \node (n6) [above of=n7,yshift=.8cm,label={[label distance=-5pt]90:$3$}] {$6$}; \node (n8) [below of=n7,label={[label distance=-5pt]90:8}] {$8$}; \node (n9) [circle,fill=green!10,right of=n6,yshift=1cm,label={[label distance=-5pt]90:$8$}] {$9$}; \node (n10) [below of=n9,label={[label distance=-5pt]90:$6$}] {$10$}; \node (n11) [right of=n7,label={[label distance=-5pt]90:$4$}] {$11$}; \node (n12) [right of=n8,label={[label distance=-5pt]90:$2$}] {$12$}; \node (n13) [circle,fill=green!10,right of=n9,label={[label distance=-5pt]90:$5$}] {$13$}; \node (n14) [circle,fill=green!10,right of=n10,label={[label distance=-5pt]90:$8$}] {$14$}; \node (n15) [right of=n11,label={[label distance=-5pt]90:$2$}] {$15$}; \node (n16) [right of=n12,label={[label distance=-5pt]90:$3$}] {$16$}; \node (n17) [right of=n13,yshift=-1cm,label={[label distance=-5pt]90:$1$}] {$17$}; \node (n18) [circle,fill=green!10,right of=n15,yshift=-1cm,label={[label distance=-5pt]90:$8$}] {$18$}; \node (n19) [right of=n13,xshift=2cm,yshift=-.3cm,label={[label distance=-5pt]90:$3$}] {$19$}; \node (n20) [right of=n14,xshift=2cm,yshift=+.3cm,label={[label distance=-5pt]90:$3$}] {$20$}; \node (n21) [right of=n15,xshift=2cm,yshift=-.3cm,label={[label distance=-5pt]90:$2$}] {$21$}; \node (n22) [right of=n16,xshift=2cm,yshift=+.3cm,label={[label distance=-5pt]90:$2$}] {$22$}; \node (n23) [right of=n20,yshift=-1.3cm,label={[label distance=-5pt]90:$6$}] {$23$}; \path (n1) edge (n3) (n2) edge (n4) (n3) edge [bend left=10] (n5) (n4) edge [bend right=10] (n5) (n5) edge [bend left=10] (n6) (n5) edge (n7) (n5) edge [bend right=10] (n8) (n6) edge [bend left=10] (n9) (n6) edge [bend right=10] (n10) (n7) edge (n11) (n8) edge (n12) (n9) edge (n13) (n10) edge (n14) (n11) edge (n15) (n12) edge (n16) (n13) edge [bend left=10] (n17) (n14) edge [bend right=10] (n17) (n15) edge [bend left=10] (n18) (n16) edge [bend right=10] (n18) (n17) edge [bend left=10] (n19) (n17) edge [bend right=10] (n20) (n18) edge [bend left=10] (n21) (n18) edge [bend right=10] (n22) (n19) edge [bend left=10] (n23) (n20) edge [bend left=10] (n23) (n21) edge [bend right=10] (n23) (n22) edge [bend right=10] (n23); \end{tikzpicture} \end{figure} \begin{table}[htbp] \centering \caption{Input data for the TDALBP instance shown in Figure \ref{fig:1}.} \label{tab:1} \begin{tabular}{cccccccccccc} \hline $j$ & $t_j^1$ & $t_j^2$ & $t_j^3$ & $t_j^1 + f_j^1$ & $t_j^2 + f_j^2$ & $t_j^3 + f_j^3$ & $f_j^1$ & $f_j^2$ & $f_j^3$ & $E_j$ & $F_j$\\ \hline 2 & 6 & 3 & 3 & 6 & 4 & 4 & 0 & 1 & 1 & 2 & 3\\ 3 & 7 & 4 & 3 & 7 & 5 & 4 & 0 & 1 & 1 & 1 & 3\\ 9 & 8 & 6 & 2 & 8 & 7 & 3 & 0 & 1 & 1 & 4 & 10\\ 13 & 5 & 3 & 2 & 5 & 4 & 3 & 0 & 1 & 1 & 5 & 11\\ 14 & 8 & 5 & 3 & 8 & 6 & 4 & 0 & 1 & 1 & 4 & 10\\ 18 & 8 & 6 & 2 & 8 & 7 & 3 & 0 & 1 & 1 & 5 & 11\\ \hline \end{tabular} \end{table} As can be seen in the table, each potentially divisible task $j$, has $r_j = 3$ processing options: $T_j = \langle t_j^1, t_j^2, t_j^3\rangle$. Note that two subtasks of one potentially divisible task have the same given processing times ($t_2^2 = t_2^3 = 3$). In this example, all time penalties are equal to unity. Figure \ref{fig:2} displays the expanded version of $G$ that includes all of the possible subtasks and their final processing times. To make the graph transformation process clear, the task indices have not been renumbered topologically. \begin{figure}[htbp] \caption{The expanded version of the precedence graph of the numerical example.} \label{fig:2} \centering \begin{tikzpicture}[ ->,>=stealth auto,node distance=2.0cm,thick, every node/.style={rectangle,draw, fill=red!10, inner sep=0pt, align=center, minimum size=8mm, font=\sffamily\bfseries\normalsize}, scale=.6, transform shape ] \node (n1) [label={[label distance=-5pt]90:$5$},label={[label distance=2pt,blue!80!black]-90:$S_2$}] {$1$}; \node (n3-2) [circle,fill=green!10,right of=n1,label={[label distance=-5pt]90:$5$}] {$3^2$}; \node (n3-1) [circle,fill=green!10,above of=n3-2,yshift=-.5cm,label={[label distance=-5pt]90:$7$}] {$3^1$}; \node (n3-3) [circle,fill=green!10,below of=n3-2,yshift=.5cm,label={[label distance=-5pt]90:$4$}] {$3^3$}; \node (n2-1) [circle,fill=green!10,below left of=n3-3,xshift=-.6cm,label={[label distance=-5pt]90:$6$},label={[label distance=1pt,blue!80!black]30:$S_1$}] {$2^1$}; \node (n2-2) [circle,fill=green!10,below of=n2-1,yshift=.5cm,label={[label distance=-5pt]90:$4$}] {$2^2$}; \node (n2-3) [circle,fill=green!10,below of=n2-2,yshift=.5cm,label={[label distance=-5pt]90:$4$}] {$2^3$}; \node (n4) [right of=n2-2,label={[label distance=-5pt]90:$2$}] {$4$}; \node (n5) [right of=n3-3,yshift=-1.5cm,label={[label distance=-5pt]85:$5$},label={[label distance=3pt,blue!80!black]180:$S_3$}] {$5$}; \node (n7) [right of=n5,label={[label distance=-5pt]90:$1$}] {$7$}; \node (n6) [above of=n7,yshift=5.5cm,label={[label distance=-5pt]90:$3$},label={[label distance=2pt,blue!80!black]180:$S_4$}] {$6$}; \node (n8) [below of=n7,label={[label distance=-5pt]90:$8$},label={[label distance=-4pt,blue!80!black]235:$S_5$}] {$8$}; \node (n9-2) [circle,fill=green!10,right of=n6,label={[label distance=-5pt]90:$7$}] {$9^2$}; \node (n9-1) [circle,fill=green!10,above of=n9-2,yshift=-.5cm,label={[label distance=-5pt]90:$8$}] {$9^1$}; \node (n9-3) [circle,fill=green!10,below of=n9-2,yshift=.5cm,label={[label distance=-5pt]90:$3$},label={[label distance=-3pt,blue!80!black]235:$S_6$}] {$9^3$}; \node (n10) [below of=n9-3,yshift=-1cm,label={[label distance=-5pt]90:$6$},label={[label distance=-4pt,blue!80!black]235:$S_7$}] {$10$}; \node (n14-2) [circle,fill=green!10,right of=n10,label={[label distance=-5pt]90:$6$}] {$14^2$}; \node (n14-1) [circle,fill=green!10,above of=n14-2,yshift=-.5cm,label={[label distance=-5pt]90:$8$},label={[label distance=-4pt,blue!80!black]135:$S_8$}] {$14^1$}; \node (n14-3) [circle,fill=green!10,below of=n14-2,yshift=.5cm,label={[label distance=-5pt]90:$4$}] {$14^3$}; \node (n11) [right of=n7,label={[label distance=-5pt]90:$4$}] {$11$}; \node (n12) [right of=n8,label={[label distance=-5pt]90:$2$}] {$12$}; \node (n13-1) [circle,fill=green!10,right of=n9-1,label={[label distance=-5pt]90:$5$}] {$13^1$}; \node (n13-2) [circle,fill=green!10,right of=n9-2,label={[label distance=-5pt]90:$4$}] {$13^2$}; \node (n13-3) [circle,fill=green!10,right of=n9-3,label={[label distance=-5pt]90:$3$}] {$13^3$}; \node (n15) [right of=n11,label={[label distance=-5pt]90:$2$}] {$15$}; \node (n16) [right of=n12,label={[label distance=-5pt]90:$3$}] {$16$}; \node (n17) [right of=n13-3,yshift=-1cm,label={[xshift=2pt,label distance=-5pt]87:$1$}] {$17$}; \node (n18-2) [circle,fill=green!10,right of=n15,label={[label distance=-5pt]90:$7$}] {$18^2$}; \node (n18-1) [circle,fill=green!10,above of=n18-2,label={[label distance=-5pt]90:$8$},label={[label distance=-4pt,blue!80!black]60:$S_{10}$}] {$18^1$}; \node (n18-3) [circle,fill=green!10,below of=n18-2,label={[label distance=-5pt]90:$3$}] {$18^3$}; \node (n19) [right of=n17,yshift=1cm,label={[label distance=-3pt]90:$3$},label={[label distance=-5pt,blue!80!black]50:$S_9$}] {$19$}; \node (n20) [right of=n17,yshift=-1cm,label={[label distance=-5pt]90:$3$}] {$20$}; \node (n21) [right of=n18-2,yshift=1cm,label={[label distance=-5pt]90:$2$}] {$21$}; \node (n22) [right of=n18-2,yshift=-1cm,label={[label distance=-5pt]90:$2$}] {$22$}; \node (n23) [right of=n20,yshift=-1.5cm,label={[xshift=2pt,label distance=-5pt]87:$6$},label={[label distance=9pt,blue!80!black]180:$S_{11}$}] {$23$}; \path (n1) edge [bend left=10] (n3-1) (n1) edge (n3-2) (n1) edge [bend right=10] (n3-3) (n2-1) edge [bend left=10] (n4) (n2-2) edge (n4) (n2-3) edge [bend right=10] (n4) (n3-1) edge [bend left=10] (n5) (n3-2) edge [bend left=10] (n5) (n3-3) edge [bend left=10] (n5) (n4) edge [bend right=10] (n5) (n5) edge [bend left=10] (n6) (n5) edge (n7) (n5) edge [bend right=10] (n8) (n6) edge [bend left=10] (n9-1) (n6) edge (n9-2) (n6) edge [bend right=10] (n9-3) (n6) edge [bend right=10] (n10) (n7) edge (n11) (n8) edge (n12) (n9-1) edge (n13-1) (n9-1) edge [bend right=10] (n13-2) (n9-1) edge [bend right=10] (n13-3) (n9-2) edge [bend left=10] (n13-1) (n9-2) edge (n13-2) (n9-2) edge [bend right=10] (n13-3) (n9-3) edge [bend left=10] (n13-1) (n9-3) edge [bend left=10] (n13-2) (n9-3) edge (n13-3) (n10) edge [bend left=10] (n14-1) (n10) edge (n14-2) (n10) edge [bend right=10](n14-3) (n11) edge (n15) (n12) edge (n16) (n13-1) edge [bend left=10] (n17) (n13-2) edge [bend left=10] (n17) (n13-3) edge [bend left=10] (n17) (n14-1) edge [bend right=10] (n17) (n14-2) edge [bend right=10] (n17) (n14-3) edge [bend right=10] (n17) (n15) edge [bend left=10] (n18-1) (n15) edge (n18-2) (n15) edge [bend right=10] (n18-3) (n16) edge [bend right=10] (n18-1) (n16) edge [bend right=10] (n18-2) (n16) edge (n18-3) (n17) edge [bend left=10] (n19) (n17) edge [bend right=10] (n20) (n18-1) edge [bend left=10] (n21) (n18-1) edge [bend right=10] (n22) (n18-2) edge [bend left=10] (n21) (n18-2) edge [bend right=10] (n22) (n18-3) edge [bend left=10] (n21) (n18-3) edge [bend right=10] (n22) (n19) edge [bend left=10] (n23) (n20) edge [bend left=10] (n23) (n21) edge [bend right=10] (n23) (n22) edge [bend right=10] (n23); \begin{scope}[on background layer] \fill[blue!20,rounded corners=4mm] ([xshift=-2mm,yshift=2mm]n2-1.north west) -- ([xshift=+2mm,yshift=2mm]n2-1.north east) -- ([xshift=+2mm,yshift=2mm]n4.north east) -- ([xshift=+2mm,yshift=-2mm]n4.south east) -- ([xshift=-2mm,yshift=-2mm]n4.south west) -- ([xshift=-2mm,yshift=2mm]n4.west) -- ([xshift=2mm,yshift=-2mm]n2-1.south east) -- ([xshift=-2mm,yshift=-2mm]n2-1.south west) -- cycle ([xshift=-2mm,yshift=2mm]n1.north west) -- ([xshift=+2mm,yshift=2mm]n3-2.north east) -- ([xshift=+2mm,yshift=-2mm]n3-2.south east) -- ([xshift=-2mm,yshift=-2mm]n1.south west) -- cycle ([xshift=-2mm,yshift=2mm]n3-3.north west) -- ([xshift=+2mm,yshift=2mm]n3-3.north east) -- ([xshift=+2mm,yshift=2mm]n5.north east) -- ([xshift=+2mm,yshift=-2mm]n5.south east) -- ([xshift=-2mm,yshift=-2mm]n5.south west) -- ([xshift=-2mm,yshift=2mm]n5.west) -- ([xshift=2mm,yshift=-2mm]n3-3.south east) -- ([xshift=-2mm,yshift=-2mm]n3-3.south west) -- cycle ([xshift=-2mm,yshift=2mm]n6.north west) -- ([xshift=+2mm,yshift=2mm]n9-2.north east) -- ([xshift=+2mm,yshift=-2mm]n9-2.south east) -- ([xshift=-2mm,yshift=-2mm]n6.south west) -- cycle ([xshift=-2mm,yshift=2mm]n8.north west) -- ([xshift=+2mm,yshift=2mm]n12.north east) -- ([xshift=+2mm,yshift=-2mm]n12.south east) -- ([xshift=-2mm,yshift=-2mm]n8.south west) -- cycle ([xshift=-2mm,yshift=2mm]n7.north west) -- ([xshift=-1mm,yshift=-7mm]n9-3.south) -- ([xshift=-2mm,yshift=-1mm]n9-3.south west) -- ([xshift=-3mm,yshift=2mm]n9-3.north west) -- ([xshift=2mm,yshift=1mm]n9-3.north) -- ([xshift=-1mm,yshift=-2mm]n13-1.south west) -- ([xshift=-3mm,yshift=2mm]n13-1.north west) -- ([xshift=3mm,yshift=2mm]n13-1.north east) -- ([xshift=2mm,yshift=-2mm]n13-1.south east) -- ([xshift=-2mm,yshift=-2mm]n13-1.south) -- ([xshift=4mm,yshift=1mm]n9-3.north) -- ([xshift=3mm,yshift=-2mm]n9-3.south east) -- ([xshift=-1mm,yshift=6mm]n7.north) -- ([xshift=2mm,yshift=2mm]n7.north east) -- ([xshift=2mm,yshift=-2mm]n7.south east) -- ([xshift=-2mm,yshift=-2mm]n7.south west) -- cycle ([xshift=-2mm,yshift=2mm]n10.north west) -- ([xshift=2mm,yshift=2mm]n10.north east) -- ([xshift=2mm,yshift=-2mm]n10.south east) -- ([yshift=-2mm]n10.south west) -- ([xshift=-5mm]n11.west) -- ([xshift=-5mm,yshift=-3mm]n11.south west) -- ([yshift=-5mm]n11.south east) -- ([xshift=-2mm]n16.north west) -- ([xshift=2mm,yshift=2mm]n16.north west) -- ([xshift=2mm,yshift=2mm]n16.north east) -- ([xshift=2mm,yshift=-2mm]n16.south east) -- ([xshift=-2mm,yshift=-2mm]n16.south west) -- ([xshift=-2mm]n16.west) -- ([yshift=-8mm]n11.south east) -- ([xshift=-5mm,yshift=-5mm]n11.south west) -- ([xshift=-7mm]n11.west) -- ([xshift=-2mm,yshift=-2mm]n10.south west) -- cycle ([xshift=-2mm,yshift=2mm]n14-1.north west) -- ([xshift=+2mm,yshift=3mm]n17.north east) -- ([xshift=+2mm,yshift=-2mm]n17.south east) -- ([xshift=-2mm,yshift=-3mm]n14-1.south west) -- cycle ([xshift=-2mm,yshift=2mm]n11.north west) -- ([xshift=2mm,yshift=2mm]n11.north) -- ([xshift=-6mm]n14-3.west) -- ([xshift=-1mm,yshift=3mm]n14-3.north west) -- ([xshift=-4mm,yshift=-2mm]n20.south west) -- ([xshift=-2mm,yshift=2mm]n19.north west) -- ([xshift=2mm,yshift=2mm]n19.north east) -- ([xshift=2mm,yshift=-2mm]n20.south east) -- ([xshift=-2mm,yshift=-2mm]n20.south west) -- ([xshift=-1mm,yshift=0mm]n14-3.north west) -- ([xshift=-2mm]n14-3.west) -- ([xshift=1mm,yshift=4mm]n11.north east) -- ([xshift=2mm,yshift=-2mm]n11.south east) -- ([xshift=-2mm,yshift=-2mm]n11.south west) -- cycle ([xshift=-4mm,yshift=1mm]n15.north west) -- ([yshift=1mm]n15.north) -- ([xshift=-2mm,yshift=-2mm]n18-1.west) -- ([xshift=-2mm,yshift=3mm]n18-1.north west) -- ([xshift=+3mm,yshift=2mm]n18-1.north east) -- ([xshift=+2mm,yshift=-2mm]n18-1.south east) -- ([xshift=2mm,yshift=2mm]n15.east) -- ([xshift=2mm,yshift=-2mm]n15.south east) -- ([xshift=-2mm,yshift=-3mm]n15.south west) -- cycle ([xshift=-2mm,yshift=3mm]n21.north west) -- ([xshift=2mm,yshift=1mm]n21.north) -- ([xshift=-3mm,yshift=-3mm]n23.west) -- ([xshift=-2mm,yshift=2mm]n23.north west) -- ([xshift=+2mm,yshift=2mm]n23.north east) -- ([xshift=+3mm,yshift=-1mm]n23.south east) -- ([xshift=1mm,yshift=-5mm]n23.south) -- ([xshift=+2mm,yshift=1mm]n22.east) -- ([xshift=+2mm,yshift=-2mm]n22.south east) -- ([xshift=-2mm,yshift=-2mm]n22.south west) -- cycle ; \end{scope} \end{tikzpicture} \end{figure} This TDALBP can be initially treated as an SALBP-1 instance, with no division permitted and hence with no time penalties. One optimal solution to this instance with a given cycle time of $c = 10$, has station loads: $S_1 = \{1\}$, $S_2 = \{2, 4\}$, $S_3 = \{3\}$, $S_4 = \{5, 6, 7\}$, $S_5 = \{8, 12\}$, $S_6 = \{9\}$, $S_7 = \{10, 11\}$, $S_8 = \{13, 15, 16\}$, $S_9 = \{18, 22\}$, $S_{10} = \{14, 21\}$, $S_{11} = \{17, 19, 20\}$ and $S_{12} = \{23\}$, with a minimal number of stations, $m^* =12$. The obvious question to ask now is, considering the example as a TDALBP, is it possible to improve on this solution by permitting the potential task divisions given in Table \ref{tab:1}, along with their associated time penalties? An optimal solution to this problem, still with $c = 10$, has station loads: $S_1 = \{1, 3^2\}$, $S_2 = \{2, 3^3\}$, $S_3 = \{4, 5, 7\}$, $S_4 = \{6, 9^2\}$, $S_5 = \{8, 12\}$, $S_6 = \{9^3, 11, 16\}$, $S_7 = \{10, 14^3\}$, $S_8 = \{13^2, 14^2\}$, $S_9 = \{15, 18\}$, $S_{10} = \{13^3, 17, 19, 20\}$, $S_{11} = \{21, 22, 23\}$, with a minimal number of stations, $m^* = 11$. (Note that it is feasible to process subtask $14^3$ before subtask $14^2$ as there are no precedence relations between subtasks of the same potentially divisible task.) Furthermore, of the six potentially divisible tasks in $D = \{2, 3, 9, 13, 14, 18\}$, four are actually divided (tasks 3, 9, 13 and 14) and two are not divided (tasks 2 and 18). Despite an additional total time penalty of $f_3^2 + f_3^3 + f_9^2 + f_9^3 + f_{13}^2 + f_{13}^3 + f_{14}^2 + f_{14}^3 = 8$ time units, the minimal number of stations has been reduced by one from the earlier solution to 11. Another optimal solution to this problem, still with the minimal number of stations equal to 11, but with an additional total time penalty of only $f_3^2 + f_3^3 + f_9^2 + f_9^3 = 4$ time units, has station loads: $S_1 = \{2, 4\}$, $S_2 = \{1, 3^2\}$, $S_3 = \{3^3, 5\}$, $S_4 = \{6, 9^2\}$, $S_5 = \{8, 12\}$, $S_6 = \{7,9^3, 13\}$, $S_7 = \{10, 16\}$, $S_8 = \{14, 17\}$, $S_9 = \{11,19, 20\}$, $S_{10} = \{15, 18\}$, $S_{11} = \{21, 22, 23\}$. The sets $S_i$, $i=1,\dots, 11$, relating to this solution, are depicted in Figure \ref{fig:2}. A further optimal solution with the minimal additional total time penalty of 2 ($f_3^2 + f_3^3$) time units, has station loads: $S_1 = \{2, 4\}$, $S_2 = \{1, 3^2\}$, $S_3 = \{3^3, 5,7\}$, $S_4 = \{6,10\}$, $S_5 = \{8\}$, $S_6 = \{9, 12\}$, $S_7 = \{11,15,16\}$, $S_8 = \{18, 22\}$, $S_9 = \{14, 21\}$, $S_{10} = \{13, 17,19\}$, $S_{11} = \{20, 23\}$. \end{example} \section{An optimization model for the TDALBP} \label{sec:model-tdalbp} We now present a relatively compact model of the TDALBP. It is based in part on the previous SALBP-1 models of \citet{patterson-albracht-1975} and of \citet{scholl-1998}; and the ASALBP models of \citet{capacho-pastor-dolgui-guschinskaya-2009} and of \citet{scholl-boysen-fliedner-2009}. As mentioned earlier, task $n$ is assumed indivisible and is to be assumed unique in not having any successor tasks. Each potentially divisible node $j$ is used to generate a node set $D_j = \{j\}\cup\{j^q\>|\>q = 2,\dots,r_j\}$, of the given possible subtasks of task $j$, (including j itself) corresponding to the entries in $T_j$, i.e.: $t_j^q$, $\forall\> j \in D, q = 1,\dots,r_j$. Each node $j \in D$ is replaced by $D_j$ in $G$. Each new node $j^q$, in the expanded version of $G$ is allocated the same precedence relations as those of node $j$, $\forall\> j \in D, q = 2,\dots,r_j$. This is achieved in the following manner. If arc $(h^p, j^q)\in A$ for some $p$, where $1 \leqslant p \leqslant r_h$; and for some $j^q$, where $j \in D$ and $1 \leqslant q \leqslant r_j$; then arcs $(h^p, j^q)$, $\forall\> p = 1,\dots,r_h$; and $q = 1,\dots,r_j$; are added to $A$. If arc $(j^q, i^s)\in A$ for some $j^q$, where $j \in D$ and $1 \leqslant q \leqslant r_j$; and for some $s$, where $1 \leqslant s \leqslant r_i$; then arcs $(j^q, i^s)$, $\forall\> q = 1,\dots,r_j$; and all $s = 1,\dots,r_i$; are added to $A$. Each new node $j^q$ is allocated a revised processing time of $(t_j^q + f_j^q)$. The processing times of all the original nodes in $V$ are unchanged. Thus $V$ is now partitioned into $V = I \cup (\cup_{j\in D} D_j)$ and $n$ is increased to reflect the new total number of nodes. Each indivisible task in $I$ must be assigned to exactly one station. For each potentially divisible node $j\in D$, consider the subtasks in $D_j$, that include task $j$ itself. Either: ($i$) task $j$ alone is activated, undivided and is assigned to a single station where it is processed in its given processing time $t_j$, without time penalty, or ($ii$) one or more subtasks of $D_j$ (excluding task $j$) are activated and assigned to separate stations where each is processed in its given time $t_j^q$, plus a further time penalty, $f_j^q$. The processing times of the activated subtasks must sum to the given processing time $t_j$, of task $j$. All the nodes in the transformed graph are re-indexed topologically. For each potentially divisible node $j$, a record must be kept of its newly-created subtasks nodes in $D_j$, $\forall\> j \in D$. The transformational process is illustrated in Example 2 in Figures \ref{fig:1} and \ref{fig:2}. Strictly speaking, all nodes should be re-indexed topologically in order to use the proposed model in the next section. However, so that the transformation process is clear, topological re-indexing was not carried out, with the labels of the new nodes left in the style $j^q$. In order to make the proposed model as compact as possible, the following notation and terminology are introduced for the expanded graph. For each task $j$ let $E_j$ be the earliest station to which $j$ can be feasibly assigned, given the precedence relations, the given processing times and the cycle time, $\forall\> j \in V$. The usual formula for calculating $E_j$ for the SALBP-1 was first introduced by \citet{patterson-albracht-1975}. Recall that for the TDALBP, the sequence $T_j$, of given processing times of the possible subtasks of each potentially divisible task $j$ is strictly decreasing and thus $t_j^{r_j}$ is minimal among all elements of $T_j$, $\forall\> j \in D$. Using this fact, the following slight modification of the Patterson and Albracht formula can be used to calculate $E_j$ for the ASALBP: \begin{equation}\label{eq:Ej} E_j = \begin{cases} 1, & \text{if }(t_j^{r_j} + \sum_{i \in P^*_j} t_i) = 0,\text{ and}\\ \lceil(t_j^{r_j} + \sum_{i \in P^*_j} t_i) / c\rceil, & \text{otherwise}, \forall\> j \in V. \end{cases} \end{equation} Letting $L_j$ be the latest station to which each task $j$ can be feasibly assigned, given the precedence relations, the given processing times and the cycle time, $\forall\> j \in V$. Then $L_j$ can be calculated analogously as: \begin{equation} L_j = \begin{cases}\label{eq:Fj} m', & \text{if }(t_j^{r_j} + \sum_{i \in F^*_j} t_i) = 0, \text{ and}\\ m' + 1 - \lceil(t_j^{r_j} + \sum_{i \in F^*_j} t_i) \rceil, &\text{otherwise}, \forall\>j \in V, \end{cases} \end{equation} where $m'$ ($ \leqslant n$) is the maximum number of stations necessary to identify a feasible solution. Note that $m'$ is often computed by a heuristic algorithm, but if this is unavailable, $m'$ can be set to be $n$, implying that initially, each task is assigned to its own individual station. Once the parameters defined in \eqref{eq:Ej} and \eqref{eq:Fj} are established, the \textit{station interval} $SI_j = [E_j, F_j]$, can be computed which defines the interval of stations in which task $j$ can be assigned. If task $j$ is indivisible (potentially divisible or a subtask) it must be assigned to exactly (at most one station) in $SI_j$, $\forall\>j \in V$. To further enhance the compactness of the model to be proposed, we introduce the \textit{station interval} $B_k = \{j \in V\>|\> k \in SI_j\}$, for each station $k = 1,\dots,m'$. Use of the $SI_j$ and $B_k$ parameters enable a significant reduction (compared with the traditional models of other SALBP variations) in the number of constraints to be achieved in the proposed model. The model, which is based in part on the ASALBP model of \citet{scholl-boysen-fliedner-2009}, is now introduced. In the description of the model the following indices, parameters and variables are used: \begin{itemize} \item Indices: \begin{description}[align=right,labelwidth=!,leftmargin=2.3cm,labelsep=.3cm] \item [$j\sim\!\!$] for tasks, \item [$k\sim\!\!$] for stations and \item [$q\sim\!\!$] for subtasks and their given processing times. \end{description} \item Parameters: \begin{description}[align=right,labelwidth=!,leftmargin=2.3cm,labelsep=.3cm] \item [$n$ :\!\!] the number of tasks ($\forall\>j = 1,\dots,n$), \item [$m'$ :\!\!] the maximum required number of stations \item [$V$ :\!\!] the set of all tasks ($|V| = n$), \item [$I$ :\!\!] the set of indivisible tasks, \item [$D$ :\!\!] the set of potentially divisible tasks, \item [$D_j$ :\!\!] the set of subtasks (including $j$ itself) into which the potentially divisible task $j$ can be divided ($\forall\>j \in D$), \item [$t_j$ :\!\!] the given processing time (without a time penalty) for task $j$ ($\forall\>j = 1,\dots,n$), \item [$f_j$ :\!\!] the time penalty for processing task $j$ ($\forall\> j = 1,\dots,n$), \item [$P_j\> (F_j)$ :\!\!] the set of immediate predecessors (successors) of task $j$ ($\forall\>j = 1,\dots,n$), \item [$E_j$ :\!\!] the earliest station to which task $j$ can be feasibly assigned ($\forall\>j = 1,\dots,n$), \item [$L_j$ :\!\!] the latest station to which task $j$ can be feasibly assigned ($\forall\>j = 1,\dots,n$), \item [$SI_j = {[}E_j, L_j{]}$ :\!\!] the interval of stations to which task $j$ can be assigned ($\forall\>j = 1,\dots,n$), \item [$B_k$ :\!\!] the set of tasks that can be potentially assigned to station $k$ ($\forall\> k = 1,\dots,m'$). \end{description} \item Decision variables: \begin{description}[align=right,labelwidth=!,leftmargin=2.3cm,labelsep=.3cm] \item [$x_{jk}^q=\!\!$] $\begin{cases} 1,&\text{if subtask $q$ of task $j$ is assigned to station $k$};\\ 0,&\text{otherwise; }\> j = 1,\dots,n;\> q = 1,\dots,r_j;\> \forall\> k \in SI_j. \end{cases}$ \end{description} \end{itemize} The station index to which task $j$ is assigned, if it is assigned at all, must be a member of $SI_j$ and can be computed as $\sum_{q=1}^{r_j}\sum_{k \in SI_j} k{\cdot}x_{jk}^q$, $\forall\>j = 1,\dots,n$. If this expression turns out to be zero for a given set of decision variables $x_{jk}^q$, then task $j$ is unassigned. If a task $j \in I$ (or a subtask $q$ of $j \in D$) is activated at some station $\kappa$, then $x_{j\kappa}^1 = 1$ (or $ x_{j\kappa}^q = 1$). The $\kappa$ index is given by: \begin{align} \kappa = \sum_{k \in SI_j} k{\cdot} x_{jk}^q, \> j = 1, \dots, n \label{eq:index}. \end{align} If $\kappa = 0$, then task $j$ (or subtask $q$ of $j$) has not been activated. Note that only tasks that are members of $B_k$ can be assigned to station $k$, for $k = 1, \dots, m'$. As will be seen in \eqref{eq:tdalbp-1} below, because it is assumed that the terminal node in $G$ has no successors, if $j$ is set to $n$ in the previous expression, the required number of stations can be expressed as a simple weighted sum. Furthermore, only tasks that are members of $B_k$ can be assigned to station $k$, $\forall\>k= 1,\dots,m'$. The proposed model, \eqref{eq:tdalbp-1}--\eqref{eq:tdalbp-10}, which involves only the binary decision variables $x_{jk}^q$, is given next. If task $j$ is indivisible, that is $j\in I$ and $r_j=1$, then $x_{jk}^1$ and $t_j^1$ are denoted simply by $x_{jk}$ and $t_j$, respectively. \begin{alignat}{2} \omit\rlap{\underline{\bf Model TDALBP}:} \nonumber\\[10pt] \omit\rlap{Minimize $\displaystyle\sum_{k\in SI_n}k{\cdot}x_{nk}$,}\label{eq:tdalbp-1}\\ \omit\rlap{subject to}\nonumber\\ \sum_{k\in SI_j} x_{ik} & = 1, &\> & i \in I; \label{eq:tdalbp-2}\\ \sum_{k\in SI_j}\sum_{q\in D_j}t_j^q{\cdot}x_{jk}^q & = t_j^1, & & j\in D;\label{eq:tdalbp-3}\\ \sum_{q\in D_j}x_{jk}^q & \leqslant 1, & & j\in D,\nonumber\\[-15pt] & & & k \in SI_j;\label{eq:tdalbp-4}\\ \sum_{i\in I\cap B_k} t_i{\cdot}x_{ik} + \sum_{j\in D}\sum_{q\in D_j\cap B_k}(t_j^q+f_j^q){\cdot}x_{jk}^q & \leqslant c, & & k=1,\dots,m';\label{eq:tdalbp-5}\\ \sum_{k\in SI_i}k{\cdot}x_{ik} - \sum_{k\in SI_j}k{\cdot}x_{jk} & \leqslant 0, & & i\in I,\nonumber\\[-15pt] & & & j \in I\cap F_i,\nonumber\\ & & & L_i\geqslant E_j;\label{eq:tdalbp-6}\\ \sum_{k\in SI_i}k{\cdot}x_{ik} - \sum_{k\in SI_j}k{\cdot}x_{jk}^q + m'{\cdot}\sum_{k\in SI_j}x_{jk}^q & \leqslant m', & & q \in \mathop{\bigcup}_{j\in D}D_j\cap F_i,\nonumber\\ & & & i\in I,\nonumber\\ & & & L_i\geqslant E_j;\label{eq:tdalbp-7}\\ \sum_{k\in SI_i}k{\cdot}x_{ik}^q - \sum_{k\in SI_j}k{\cdot}x_{jk} + m'{\cdot}\sum_{k\in SI_i}x_{ik}^q & \leqslant m', & & q\in \mathop{\bigcup}_{i\in D}D_i,\nonumber\\ & & & j \in I\cap F_i,\nonumber\\ & & & L_i\geqslant E_j;\label{eq:tdalbp-8}\\ \sum_{k\in SI_{i}}k{\cdot}x_{ik}^{q'} - \sum_{k\in SI_{j}}k{\cdot}x_{jk}^{q''} + m'{\cdot}(\sum_{k\in SI_{i}}x_{ik}^{q'} + \sum_{k\in SI_{j}}x_{jk}^{q''}) & \leqslant 2{\cdot}m', & & q'\in \mathop{\bigcup}_{i\in D}D_{i},\nonumber\\ & & & q'' \in \mathop{\bigcup}_{j\in D}D_{j}\cap F_{i},\nonumber\\ & & & L_{i}\geqslant E_{j};\label{eq:tdalbp-9}\\ x_{jk}^q & \in \{0, 1\}, & & q=1,\dots,r_j,\nonumber\\ & & & j=1,\dots,n,\nonumber\\ & & & k\in SI_j.\label{eq:tdalbp-10} \end{alignat} The objective \eqref{eq:tdalbp-1} involves minimizing the station index of the terminal task $n$, which is equivalent to minimizing the number of stations required. Constraints \eqref{eq:tdalbp-2} ensure that each indivisible task is assigned to exactly one station. Constraints \eqref{eq:tdalbp-3} guarantee that the sum of the given processing times of the activated subtasks of each potentially divisible task equals the processing time of the task. Satisfying constraint \eqref{eq:tdalbp-4} ensures that the activated subtasks of any potentially divisible task are each assigned to a separate station. The cycle time constraints are given in \eqref{eq:tdalbp-5}, where, for each station, the first expression represents the processing times of the indivisible tasks (without time penalties) and the second represents those of the potentially divisible tasks (with time penalties). \eqref{eq:tdalbp-6}--\eqref{eq:tdalbp-9} deal with possible task precedence constraints that may arise from the existence of arc $(i, j) \in A$, depending on the nature of, and relationships between the tasks $i$ and $j$. (Recall that the set of subtasks of any potentially divisible task include the task itself.) When $i$ and $j$ are both indivisible, the precedence constraints are given in \eqref{eq:tdalbp-6}. When $i$ is indivisible but $j$ is a subtask of a potentially divisible task, the precedence constraint arising from $(i, j)$ must hold only if $j$ is activated. That is, when $j$ is assigned to some station, i.e., $\sum_{k \in SI_j} x_{jk}^q = 1$. The corresponding constraints are given in \eqref{eq:tdalbp-7}. When $i$ is a subtask of a potentially divisible task but $j$ is indivisible, the precedence constraint arising from $(i, j)$ must hold only if $i$ is activated. That is, when $i$ is assigned to some station, i.e., $\sum_{k \in SI_i} x_{ik} = 1$. The corresponding constraints are given in \eqref{eq:tdalbp-8}. When both $i$ and $j$ are subtasks of two distinct potentially divisible tasks, the precedence constraint arising from $(i, j)$ must hold only if both $i$ and $j$ are activated. That is, when $i$ and $j$ are both assigned to stations, i.e., $\sum_{k \in SI_i} x_{ik} = \sum_{k \in SI_j} x_{jk}^q = 1$. The corresponding constraints are given in \eqref{eq:tdalbp-9}. Constraints \eqref{eq:tdalbp-10} are the usual binary conditions on the $x_{jk}^q$'s. Compared to the model SBF of \citet{scholl-boysen-fliedner-2009}, the numbers of binary variables are reduced significantly, because SBF includes (up to) $m'{\cdot}(n + |D|)$ assignment variables, while the new model requires (up to) $m'{\cdot}n$ assignment variables. However, SBF and the new model have about the same number of constraints. Using the $\mathcal{O}$-notation, the order of magnitudes are $\mathcal{O}((n + |D|)^2 + m')$ and $\mathcal{O}(|I|{\cdot}|D| + m')$ constraints for SBF and the new model, respectively. Utilizing the relations $m' \leqslant n$, $|I| \leqslant n$ and $|D| \leqslant n$, both models require $\mathcal{O}(n^2)$ variables and constraints. \section{A BB\&R based algorithm for the TDALBP} \label{sec:algor} First, we outline the hybrid branch, bound and remember (BB\&R) algorithm for the SALBP-1, as proposed by \citet{sewell-jacobson-2012}. The basic principle of the algorithm is the enumeration of partial solutions for the SALBP-1. A partial solution is a part of a feasible solution, and may have tasks not yet assigned to the stations. However, the tasks already assigned respect the cycle time and precedence constraint. In the enumeration process, partial solutions are extended by the assignment of free tasks to stations that still have idle time. A partial solution is discarded if it has already been generated before, or if its number of stations is greater than the number of stations of any viable solution, or if it is dominated by another partial solution. This process is repeated for each partial solution until a viable solution is found, that is, until all tasks are assigned to stations (see the following notation). A partial solution is denoted as $\mathcal{E} = (A, U, S_1, \dots, S_m)$, where: \begin{description}[align=right, labelwidth=!, leftmargin=2.4cm,labelsep=.2cm] \setlength\itemsep{1em} \item [$m$ :] number of stations used by $\mathcal{E}$; \item [$S_k$ :] set of tasks assigned to station $k$ in $\mathcal{E}$, $k=1,\dots,m$; \item [$A = \bigcup\limits_{k=1}^m S_k$ :] set of tasks assigned to the $m$ stations; and \item [$U$ :] set of tasks still not assigned to any station. \end{description} The SALBP-1 without the precedence constraints reduces to a Bin Packing Problem, where a set of tasks (items) must be allocated (stored) to stations with identical cycle time (bin size). Thus, a lower bound for the SALBP-1 is obtained by the solution of a such instance of the Bin Packing Problem. \citet{sewell-jacobson-2012} proposed the Bin Packing Algorithm (BPA), which is based on a previous algorithm proposed by \citet{korf-2003}, to obtain a tighter lower bound called BINLB. The BB\&R algorithm also uses the three following standard lower bounds \citep{scholl-klein-1997,scholl-becker-2006}: \begin{align} LB_1 & = \left\lceil\sum\nolimits_{j \in U}\frac{t_j}{c}\right\rceil;\label{eq:LB1BBR}\\ LB_2 & = \left\lceil\sum\nolimits_{j \in U} w_j^1\right\rceil;\\ LB_3 & = \left\lceil\sum\nolimits_{j \in U} w_j^2\right\rceil; \intertext{where} w_j^1 & = \begin{cases} 1, & \text{if } t_j > \frac{c}{2}, \\ \frac{1}{2}, & \text{if } t_j = \frac{c}{2};\\ \end{cases} \intertext{and} w_j^2 & = \begin{cases} 1, & \text{if } t_j > \frac{2{\cdot}c}{3}, \\ \frac{2}{3}, & \text{if } t_j = \frac{2{\cdot}c}{3}, \\ \frac{1}{2}, & \text{if }\ \frac{c}{3} < t_j < \frac{2{\cdot}c}{3}, \\ \frac{1}{3}, & \text{if } t_j = \frac{c}{3}. \end{cases} \end{align} To decrease the number of subproblems that are generated after the branching, \citet{sewell-jacobson-2012} used a heuristic to obtain an upper bound. This heuristic, denoted as MHH (modified Hoffmann heuristic), is a modified version of the well known heuristic proposed by \citet{hoffmann-1963} for the SALBP-1. The BB\&R algorithm uses the function in \eqref{eq:expand} to decide which is the best partial solution to be expanded: \begin{equation} \mathcal{B}(\mathcal{E}) = \mathcal{I}/m - \lambda|U|;\label{eq:expand} \end{equation} where $\mathcal{E} = (A, U, S_1, ..., S_m)$ is a partial solution, $\mathcal{I}$ is the total idle time in all the $m$ stations and $\lambda$ is a balancing factor (\citet{sewell-jacobson-2012} used the value $\lambda = 0.002$ which was determined empirically through preliminary computational tests with a subset of instances). Sewell and Jacobson argue that the term $\mathcal{I}/m$ induces full or nearly full loads. When the other values are equal, $-\lambda|U|$ induces loads that contain fewer tasks, leaving smaller tasks to the end, making it easier to assign these tasks to the stations. The main search strategy used in the BB\&R algorithm is a CBFS search (Cyclic Best-First Search), initially called Distributed Best-First Search by \citet{Kao-2008}, that combines Best-First Search and DFS (Depth First Search). The CBFS starts expanding the best partial solution at level 1 of the search tree, then expands the best partial solution of the level 2, and so on, until the deepest level of the search tree is reached, then it cycles to the level 1 and continues. A minimum priority queue is created for each level of the search tree and is used to select the partial solution to be expanded at the level, using the $\mathcal{B}$ function defined in \eqref{eq:expand} as the selection criteria. The BB\&R algorithm with the CBFS search (BB\&R-CBFS algorithm) is divided into three steps. In step I the MHH is run to find an initial upper bound. In step II BB\&R uses the CBFS search strategy. The objectives of the second stage are to find a solution and prove its optimality, if possible. Some limits are imposed in order to avoid spending large amounts of time and memory trying to find a load for a station. The maximum load generated by a partial solution is limited to $10{,}000$ and the maximum size of each priority queue is set to $300{,}000$. So, the step II proves optimality if none of these limits is exceeded. In step III, which is only executed when step II cannot prove optimality, a BFS (Breadth First Search) strategy is used. The goal of this step is to prove the optimality of the best solution found in the previous steps. We now discuss how parts of the BB\&R-CBFS algorithm were adapted in order to construct a TDALBP algorithm. The new algorithm, denoted here BB\&R-TD, has the same structure as the BB\&R-CBFS algorithm. In fact, the behavior of both algorithms are very similar because most of the techniques used in them are station-oriented and not-task oriented, for example, the branching and the searching strategies. The domination rules used are either station-oriented or can be applied directly to BB\&R-TD without any changes being required. \citet{sewell-jacobson-2012} used the three following domination rules, which can also be used in the BB\&R-TD algorithm. These rule are not memory-based, i.e., a partial solution does not have to be directly compared with a previously processed one. The rules are: ($i$) Maximum Load Rule -- if a partial solution contains a station that does not have a full load then it can be pruned. ($ii$) Extended Jackson's rule -- a task $i$ potentially dominates a task $j$, if there is no precedence relationship between $i$ and $j$, $t_i \geqslant t_j$ and $F^*_i \supseteq F^*_j$. If $t_i = t_j$ and $F^*_i = F^*_j$, then $i$ dominates $j$ when $i < j$. If the task $i$ dominates $j$ and $j$ is assigned to a station $s$, in which the task $i$ can also be assigned (task $i$ has not been assigned to any other station and its assignment does not violate the cycle time), then $i$ must be assigned before $j$. ($iii$) BB\&R rule -- Let $\mathcal{E} = (A, U, S_1, ..., S_m)$ be a partial solution with the $m$ stations with full load, where none of the tasks assigned to the station $ S_m $ have successors. Given an unassigned task that has successors, let $\mathcal{E}'$ be a solution created from $\mathcal{E}$, and $S_{m'}$, with $m' > m$, be the first station that has a task with a successor in $ \mathcal{E}'$. Then the loads at the stations $ S_m $ and $Sm'$ can be exchanged without violating any rule of precedence. Thus, $\mathcal{E}$ can be pruned. The only required changes to the BB\&R algorithm relate to the calculation of bounds on the value of the optimal solution. When task division is allowed, some lower bounds and strategies previously described do not apply directly to the TDALBP. To be valid for the TDALBL, these bounds and strategies must be modified to take into account not only individual subtask processing times but also time penalties. The lower bound $LB_1$ is calculated as specified in \eqref{eq:LB1BBR} and the bounds $LB_2$ and $LB_3$ are now computed as follows: \begin{align} LB_2 &= \left\lceil\sum_{j \in U \cap I} w_j^1 + \sum_{j \in U \cap D}\sum_{q = 2}^{r_j} w_{j^q}^1\right\rceil\\ LB_3 &= \left\lceil\sum_{j \in U \cap I} w_j^2 + \sum_{j \in U \cap D}\sum_{q = 2}^{r_j} w_{j^q}^2\right\rceil \end{align} In the TDALBP the task set $V$ also contains the subtasks of each potentially divisible task and is partitioned into $V = I \cup (\cup_{j\in D} D_j)$. Thus, a partial solution to the BB\&R-TD is expanded to $\mathcal{E} = (A, U, Z, S_1, \dots, S_m)$, where $Z$ contains the number of subtasks, of each task $j\in D$ that was assigned to a station. In the enumeration process, when considering adding a divisible task $j$ to the current partial solution, a check is made to see if any of its subtasks has already been assigned to a station, that is if $Z[j] > 0$. Likewise, when a subtask $i\in D_j$ is processed, wether or not the original task $j$ is not assigned to a station is checked, i.e. if $j \not\in A$. Thus, the penalties need not be considered in the enumeration process. Also, after processing all tasks and arriving at a solution, it can be ensured that one of the two following alternatives occurs, either $(i)$ a potentially divisible task is totally assigned to a station and no one of its subtasks are assigned to stations, or $(ii)$ only the subtasks of a potentially divisible task are assigned to stations. It was also necessary to define a new test to check the optimality of a solution to the TDALBP. Let $S_a = \min\{S_k\mid 1\leqslant k\leqslant m\}$ be the station that has the lowest processing load over all stations, $p(S_k)$ be the sum of tasks penalties in the station $k$ and $T_{oc} =\sum_{1\leqslant k \leqslant m} [c - (t(S_k) - p(S_k))]$ be the sum of the idle time of all stations, neglecting of time penalties. If $T_{oc} < t(S_a)$ then the load of $S_a$ is greater than the sum of the idle time of all other stations. Thus, dividing the tasks in $S_a$, even without time penalty costs, does not help as it would be impossible to assign them to other stations. So, if this test is positive, the process can be terminated. \section{Computational experience} \label{sec:results} In order to evaluate the potential of the TDALBP model, we performed computational experiments based on test instances that were constructed systematically. The instances used in the tests were generated from a set of 269 SALBP-1 instances, based on 25 precedence graphs with 8 to 297 nodes, with different cycle times. The detailed description of this data set is available at \cite{albp-2016}. To generate different types of TDALBP instances, we adapted each SALBP-1 instance, maintaining the same cycle time, tasks and precedence, but introduced the parameters $I$, $D$, $D_j$, $r_j$ and $f_j$ defined earlier and specific values for them. The nodes in the precedence graph associated with each generated instance were renumbered in topological order. Two methods were defined and tested to select the set $D$ and to create the subtasks for each task in it: \begin{description} \item[\bf Method-M:] To select the set $D$ of potentially divisible tasks, we used a simple heuristic that evaluates the median of the task execution times ($X(t_j)$). The tasks that have a processing time greater than the median were selected to construct $D$ and the remaining tasks comprised $I$ (the set of indivisible tasks). $D$ was then partitioned into two subsets, $D_1$ and $D_2$ such that a task $j\in D$ was allocated to $D_1$ if $t_j > \delta{\cdot}X(t_j)$ or was allocated to $D_2$ if $t_j \leqslant \delta{\cdot}X(t_j)$. The values $\delta=1{,}2$ and $\delta = 1{,}5$ were tested. The tasks in $D_1$ were partitioned into two subtasks and those in $D_2$ were partitioned into three subtasks. \item[\bf Method-R:] $30\%$ of the totality of tasks in $V$ were selected, in a random way, to construct the set $D$ of potentially divisible tasks. Each of the tasks $j\in D$ was partitioned into two subtasks with a probability of $60\%$ or into three subtasks, with a probability of $40\%$. \end{description} In both methods the sum of the execution times of the subtasks of a particular task is always equal to that of the original task. An additional cost of one time unit was assigned to each subtask, as a time penalty. \subsection{Results with instances analyzed by Method-M} \label{ssec:results-M} Table \ref{tab:2} displays the results of tests with the model TDALBP model, implemented via the CPLEX package, where the instances were generated by Method-M. A limit of $1{,}800$ seconds of processing time was imposed on each instance. The table shows only the instances where a reduction in the required number of stations was achieved. The table also contains two measures commonly used to evaluate the quality of a feasible solution: Line Efficiency (LE), which is the percentage of utilization of the line; and Line Time (LT), which is the period of time required for each unit of a product to be completed on the assembly line. The following parameters and measurements are presented in Table \ref{tab:2}: $c$ -- cycle time; $n$ -- number of tasks; $m^*$ -- required number of stations; $\text{LE}$ -- line efficiency; $\text{LT}$ -- line time, for the ALBP solution. They are also shown for the TDALBP solution constructed with parameters $\delta=1.2$ and $\delta=1.5$, along with $F$ the total time penalty imposed. The last column, ``Obs.'', indicates whether or not the processing time limit of $1{,}800$ seconds was reached in solving the TDALBP instances (the value 1 indicates that the time limit was reached for both $\delta=1{.}5$ and $\delta=1{.}2$, the value 2 point out that the time limit was reached only for $\delta=1{.}5$ and, similarly, the values 3 refers only to $\delta=1{.}2$). \begin{table}[htbp] \centering\small\setlength{\tabcolsep}{4pt} \caption{Computational results obtained with model TDALBP and Method-M instances.} \label{tab:2} \resizebox{\textwidth}{!}{ \begin{tabular}{>{\scriptsize}rlccccrccrcrccrcrc} \hline & \multicolumn{6}{c}{SALBP-1} & & \multicolumn{4}{c}{TD ($\delta = 1{.}5$)} & & \multicolumn{4}{c}{TD ($\delta = 1{.}2$)}\\ \cline{2-7}\cline{9-12}\cline{14-17} & Graph & $c$ & $n$ & $m^*$ & LE & LT & & $m^*$ & $F$ & $\text{LE}$ & $\text{LT}$ & & $m^*$ & $F$ & $\text{LE}$ & $\text{LT}$ & Obs. \\ \hline 1 & GUNTHER & 41 & 35 & 14 & 84.15 & 539 & & 13 & 9 & 90.62 & 532 & & 13 & 9 & 90.62 & 532 & \\ 2 & SAWYER30 & 30 & 30 & 12 & 90.00 & 353 & & 11 & 3 & 98.18 & 328 & & 11 & 3 & 98.18 & 328 & \\ 3 & WEE-MAG & 56 & 75 & 30 & 89.23 & 1676 & & 28 & 14 & 96.49 & 1568 & & 28 & 26 & 97.26 & 1568 & 1 \\ 4 & WEE-MAG & 54 & 75 & 31 & 89.55 & 1669 & & 30 & 22 & 92.53 & 1615 & & 30 & 25 & 92.53 & 1620 & 1 \\ 5 & WEE-MAG & 45 & 75 & 38 & 87.66 & 1663 & & 35 & 18 & 95.17 & 1573 & & 35 & 21 & 95.17 & 1575 & 1 \\ 6 & WEE-MAG & 43 & 75 & 50 & 69.72 & 2134 & & 39 & 34 & 89.39 & 1669 & & 39 & 28 & 89.39 & 1670 & \\ 7 & WEE-MAG & 42 & 75 & 55 & 64.89 & 2310 & & 41 & 36 & 89.14 & 1716 & & 40 & 32 & 91.13 & 1679 & 2 \\ 8 & WEE-MAG & 41 & 75 & 59 & 61.97 & 2419 & & 42 & 34 & 87.05 & 1719 & & 42 & 38 & 87.05 & 1717 & \\ 9 & WEE-MAG & 35 & 75 & 60 & 71.38 & 2096 & & 45 & 42 & 97.84 & 1575 & & 46 & 35 & 95.28 & 1610 & 1 \\ 10 & WEE-MAG & 36 & 75 & 60 & 69.40 & 2151 & & 44 & 36 & 94.63 & 1584 & & 44 & 44 & 94.63 & 1584 & 1 \\ 11 & WEE-MAG & 37 & 75 & 60 & 67.52 & 2219 & & 43 & 38 & 96.61 & 1589 & & 44 & 43 & 94.72 & 1626 & 1 \\ 12 & WEE-MAG & 38 & 75 & 60 & 65.75 & 2267 & & 43 & 38 & 91.74 & 1631 & & 43 & 39 & 91.74 & 1634 & 1 \\ 13 & WEE-MAG & 39 & 75 & 60 & 64.06 & 2334 & & 42 & 38 & 91.51 & 1634 & & 42 & 36 & 91.51 & 1638 & \\ 14 & WEE-MAG & 40 & 75 & 60 & 62.46 & 2381 & & 42 & 38 & 89.23 & 1678 & & 42 & 38 & 89.23 & 1677 & \\ 15 & WEE-MAG & 33 & 75 & 61 & 74.47 & 2008 & & 57 & 40 & 81.82 & 1875 & & 57 & 30 & 81.29 & 1876 & 3 \\ 16 & WEE-MAG & 34 & 75 & 61 & 72.28 & 2073 & & 53 & 34 & 85.07 & 1796 & & 53 & 48 & 85.85 & 1800 & \\ 17 & WARNECKE & 58 & 58 & 29 & 92.03 & 1679 & & --- & --- & --- & --- & & 28 & 27 & 96.98 & 1618 & 3 \\ 18 & WARNECKE & 54 & 58 & 31 & 92.47 & 1672 & & --- & --- & --- & --- & & 30 & 30 & 97.41 & 1618 & 3 \\ \hline \end{tabular} } \end{table} Despite the simplicity Method-M being used to select the potentially divisible tasks, the results show the potential of task division in optimizing the performance of an assembly line balancing system. The value chosen for the parameter $\delta$ directly influences the final results, changing the way that tasks are subdivided. With $\delta=1{.}5$, a reduction in the number of stations was achieved in 16 of the 269 instances generated. With $\delta=1{.}2$, in addition to these 16 instances, a reduction in the number of stations was achieved in two further instances. However, there are variations in the total amount of time penalty incurred, line efficiency, line time and even in the number of stations in the TDALBP solutions, both for better for worse. This can be seen on lines 7, 9 and 11 of the table. Note that in these three cases the execution time limit has been reached and a better solution may exist for those instances. \subsection{Results with instances analyzed by Method-R} We ran both the CPLEX package and the BB\&R-TD algorithm on each of the 269 TDALBP instances generated using Method-R, with a time limit of $3{,}600$ seconds for each. It was possible to identify 37 instances having a lesser number of required stations than for the SALBP-1 solutions. On the other hand, for a further set of 31 instances the processing time limit was reached without an improvement of the SALBP-1 solution, and in the remaining 201 instances the optimal solutions turned out to have the same value as that for the SALBP-1 solutions. Method-R was then used to generate two new versions of each of these 37 successful instances, with different sets $D$ of divisible tasks. Table \ref{tab:resultsRandom} shows only the best results obtained. The first block of columns of the table, labeled ``SALBP-1'', describe the instance precedence graph, the cycle time and the required number of stations for the SALBP-1 instance. The next two blocks provide information concerning the execution of the CPLEX package and the BB\&R-TD algorithm, respectively, for each TDALB instance. In each block, the columns describe, in sequence, the required number of stations, the total time penalty imposed, the line efficiency, the line time and the time spent by the method to find the TDALBP solution. The column labeled ``Obs.'' lists indices of some comments about the best solutions found by the CPLEX package and the BB\&R-TD algorithm. All the results were obtained within the processing time limit of $3{,}600 seconds$. The meaning of each number is (1) both solutions are optimal and were obtained from the same version of the instance; (2) both solutions are optimal, but were obtained from different versions of the instance; (3) both solutions were obtained from the same version of the instance, but only the BB\&R-TD solution is optimal; (4) the solutions were obtained from different versions of the instance and only the BB\&R-TD solution is optimal; (5) the solutions were obtained from different versions of the instance and only the CPLEX solution is optimal; and (6) the solutions were obtained from different versions of the instance but neither of them is optimal. The results with Method-R show that for each instance, in at least one of the three versions tested, the best solution found has a reduced number of required stations, compared to the SALBP-1 solution. The solutions of some instances, for example those of indexes 36 and 37, have line efficiency (LE) of less than 90\%. These instances still have the potential for an even greater reduction in the required number of stations, which might be achieved if their currently divisible tasks are divided into even smaller subtasks or if some of their currently indivisible tasks are divided. \begin{table}[!htbp] \centering\small\setlength{\tabcolsep}{4pt} \caption{Computational results obtained with CPLEX and BB\&R-TD algorithm over Method-R instances.} \label{tab:resultsRandom} \resizebox{\textwidth}{!}{% \begin{tabular}{>{\scriptsize}rlrrrrrrrrrrrrrrc} \hline & \multicolumn{3}{c}{SALBP-1} & & \multicolumn{5}{c}{BB\&R-TD} & & \multicolumn{5}{c}{CPLEX} &\\ \cline{2-4}\cline{6-10}\cline{12-16} & Graph & $c$ & $m^*$ & & $m$ & $F$ & LE & LT & CPU & & $m$ & $F$ & LE & LT & CPU & Obs. \\ \hline 1 & BOWMAN8 & 20 & 5 & & 4 & 2 & 96,25 & 78 & 0,54 & & 4 & 2 & 96,25 & 78 & 0,01 & 2 \\ 2 & GUNTHER & 49 & 11 & & 10 & 2 & 98,97 & 489 & 2,71 & & 10 & 2 & 98,98 & 489 & 0,65 & 1 \\ 3 & GUNTHER & 41 & 14 & & 13 & 8 & 92,12 & 498 & 0,56 & & 13 & 8 & 92,12 & 498 & 0,86 & 1 \\ 4 & JAESCHKE & 7 & 7 & & 6 & 3 & 95,24 & 42 & 0,56 & & 6 & 3 & 95,24 & 42 & 0,02 & 1 \\ 5 & LUTZ2 & 11 & 49 & & 48 & 7 & 93,18 & 525 & 397,77 & & 49 & 0 & 90,04 & 518 & 3600,01 & 3 \\ 6 & LUTZ3 & 150 & 12 & & 11 & 2 & 99,76 & 1650 & 1,28 & & 11 & 2 & 99,76 & 1650 & 1,96 & 1 \\ 7 & MERTENS & 8 & 5 & & 4 & 3 & 100 & 32 & 0,56 & & 4 & 3 & 100 & 32 & 0,02 & 1 \\ 8 & SAWYER30 & 30 & 12 & & 11 & 5 & 99,7 & 329 & 0,59 & & 11 & 5 & 99,7 & 329 & 0,52 & 1 \\ 9 & TONGE70 & 293 & 13 & & 12 & 4 & 99,94 & 3516 & 6,41 & & 13 & 12 & 92,47 & 3800 & 3600,01 & 3 \\ 10 & TONGE70 & 220 & 17 & & 16 & 10 & 100 & 3520 & 0,98 & & 16 & 5 & 99,86 & 3520 & 2,81 & 1 \\ 11 & TONGE70 & 207 & 18 & & 17 & 5 & 99,89 & 3518 & 6,63 & & 18 & 2 & 94,26 & 3699 & 3600,02 & 3 \\ 12 & WARNECKE & 62 & 27 & & 26 & 18 & 97,15 & 1610 & 1,43 & & 26 & 26 & 97,64 & 1612 & 721,34 & 2 \\ 13 & WARNECKE & 58 & 29 & & 28 & 21 & 96,61 & 1621 & 4,97 & & 28 & 14 & 96,18 & 1621 & 3600,01 & 4 \\ 14 & WARNECKE & 54 & 31 & & 30 & 23 & 96,98 & 1606 & 2,19 & & 30 & 19 & 96,73 & 1620 & 184,88 & 1 \\ 15 & WEE-MAG & 56 & 30 & & 28 & 39 & 98,09 & 1542 & 1,33 & & 28 & 24 & 97,13 & 1568 & 3600,01 & 3 \\ 16 & WEE-MAG & 52 & 31 & & 30 & 41 & 98,72 & 1552 & 2,53 & & 30 & 21 & 97,44 & 1560 & 1235,61 & 2 \\ 17 & WEE-MAG & 54 & 31 & & 29 & 39 & 98,21 & 1556 & 4,62 & & 29 & 16 & 96,74 & 1565 & 3600,01 & 3 \\ 18 & WEE-MAG & 49 & 32 & & 31 & 18 & 99,87 & 1519 & 1817,82 & & 31 & 6 & 99,08 & 1519 & 2808,84 & 2 \\ 19 & WEE-MAG & 50 & 32 & & 31 & 38 & 99,16 & 1543 & 6,6 & & 31 & 5 & 97,03 & 1542 & 44,2 & 1 \\ 20 & WEE-MAG & 46 & 34 & & 33 & 17 & 99,87 & 1516 & 284,53 & & 34 & 12 & 96,61 & 1563 & 3600,01 & 4 \\ 21 & WEE-MAG & 45 & 38 & & 35 & 50 & 98,35 & 1551 & 14,81 & & 35 & 17 & 96,25 & 1574 & 3600,02 & 4 \\ 22 & WEE-MAG & 43 & 50 & & 37 & 46 & 97,11 & 1570 & 1,05 & & 36 & 39 & 99,35 & 1548 & 1815,74 & 2 \\ 23 & WEE-MAG & 42 & 55 & & 38 & 52 & 97,18 & 1576 & 41,49 & & 38 & 49 & 96,99 & 1596 & 2616,98 & 1 \\ 24 & WEE-MAG & 41 & 59 & & 41 & 51 & 92,21 & 1662 & 1,57 & & 41 & 48 & 92,03 & 1678 & 85,5 & 1 \\ 25 & WEE-MAG & 35 & 60 & & 45 & 50 & 98,35 & 1564 & 2,39 & & 45 & 45 & 98,03 & 1575 & 395,56 & 1 \\ 26 & WEE-MAG & 36 & 60 & & 45 & 44 & 95,25 & 1605 & 3606,32 & & 44 & 42 & 97,29 & 1584 & 3600,01 & 6 \\ 27 & WEE-MAG & 37 & 60 & & 43 & 49 & 97,3 & 1575 & 10,57 & & 43 & 42 & 96,86 & 1591 & 123,87 & 1 \\ 28 & WEE-MAG & 38 & 60 & & 42 & 51 & 97,12 & 1579 & 9,75 & & 42 & 46 & 96,8 & 1593 & 91,54 & 1 \\ 29 & WEE-MAG & 39 & 60 & & 42 & 50 & 94,57 & 1621 & 21,57 & & 42 & 47 & 94,38 & 1638 & 120,93 & 1 \\ 30 & WEE-MAG & 40 & 60 & & 42 & 50 & 92,2 & 1662 & 3608,06 & & 41 & 50 & 94,45 & 1640 & 3368,1 & 1 \\ 31 & WEE-MAG & 32 & 61 & & 52 & 45 & 92,79 & 1653 & 3614,92 & & 52 & 37 & 92,31 & 1661 & 235,01 & 1 \\ 32 & WEE-MAG & 33 & 61 & & 49 & 47 & 95,61 & 1606 & 3611,47 & & 49 & 39 & 95,11 & 1617 & 1542,53 & 5 \\ 33 & WEE-MAG & 34 & 61 & & 46 & 47 & 98,85 & 1557 & 1,3 & & 46 & 39 & 98,34 & 1563 & 3600,01 & 3 \\ 34 & WEE-MAG & 30 & 62 & & 55 & 39 & 93,21 & 1642 & 105,66 & & 54 & 34 & 94,63 & 1618 & 1464,25 & 2 \\ 35 & WEE-MAG & 31 & 62 & & 54 & 34 & 91,58 & 1665 & 3610,7 & & 53 & 37 & 93,49 & 1642 & 1648,76 & 1 \\ 36 & WEE-MAG & 28 & 63 & & 62 & 32 & 88,19 & 1729 & 3614,77 & & 62 & 11 & 86,98 & 1735 & 3600,01 & 6 \\ 37 & WEE-MAG & 29 & 63 & & 59 & 38 & 89,83 & 1703 & 1193,07 & & 59 & 37 & 89,77 & 1709 & 509,63 & 1 \\ \hline \end{tabular} } \end{table} \section{Conclusions and future research} \label{sec:conclusions} This paper presents a new type of assembly line balancing problem with task division, where particular tasks can potentially be divided in a limited way, even if the division induces additional time penalties. It introduced a mathematical model of the problem in order to solve numerical instances with the commercial optimization software CPLEX and a proposed implicit enumeration algorithm based on branch, bound and remember. Preliminary results of an extensive computational study demonstrate that the approach seems promising. Possible directions for future research in order to seek a better trade-off between solution quality and computational time include the adaptation of ASALBP solution methods \citep{scholl-boysen-fliedner-2009} and metaheuristics, such as genetic algorithms and tabu search. \bibliographystyle{apalike}
\section{Introduction} \label{submission} Children are remarkable learners, and thus their inductive biases should interest machine learning researchers. To help learn the meaning of new words efficiently, children use the ``mutual exclusivity'' (ME) bias -- the assumption that once an object has one name, it does not need another \cite{Markman1988} (Figure \ref{fig:me}). In this paper, we examine whether or not vanilla neural networks demonstrate the mutual exclusivity bias, either as a built-in assumption or as a bias that develops through training. Moreover, we examine common benchmarks in machine translation and object recognition to determine whether or not a maximally efficient learner should use mutual exclusivity. \begin{wrapfigure}{R}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{me4.png} \caption{The mutual exclusivity task used in cognitive development research \cite{Markman1988}. Children tend to associate the novel word (``dax'') with the novel object (right).} \label{fig:me} \end{wrapfigure} When children endeavour to learn a new word, they rely on inductive biases to narrow the space of possible meanings. Children learn an average of about 10 new words per day from the age of one until the end of high school \cite{Bloom2000}, a feat that requires managing a tractable set of candidate meanings. A typical word learning scenario has many sources of ambiguity and uncertainty, including ambiguity in the mapping between words and referents. Children hear multiple words and see multiple objects within a single scene, often without clear supervisory signals to indicate which word goes with which object \cite{Smith2008}. The mutual exclusivity assumption helps to resolve ambiguity in how words map to their referents. Markman and Watchel \cite{Markman1988} examined scenarios like Figure \ref{fig:me} that required children to determine the referent of a novel word. For instance, children who know the meaning of ``cup'' are presented with two objects, one which is familiar (a cup) and another which is novel (an unusual object). Given these two objects, children are asked to ``Show me a dax,'' where ``dax'' is a novel nonsense word. Markman and Wachtel found that children tend to pick the novel object rather than the familiar one. Although it is possible that the word ``dax'' could be another word for referring to cups, children predict that the novel word refers to the novel object -- demonstrating a ``mutual exclusivity'' bias that familiar objects do not need another name. This is only a preference; with enough evidence, children must eventually override this bias to learn hierarchical categories: a Dalmatian can be called a ``Dalmatian,'' a ``dog'', or a ``mammal'' \cite{Markman1988,Markman1989}. As an often useful but sometimes misleading cue, the ME bias guides children when learning the words of their native language. It is instructive to compare word learning in children and machines, since word learning is also a widely studied problem in machine learning and artificial intelligence. There has been substantial recent progress in object recognition, much of which is attributed to the success of deep neural networks and the availability of very large datasets \cite{Lecun2015}. But when only one or a few examples of a novel word are available, deep learning algorithms lack human-like sample efficiency and flexibility \cite{Lake2016}. Insights from cognitive science and cognitive development can help bridge this gap, and ME has been suggested as a psychologically-informed assumption relevant to machine learning \cite{LakeLinzenBaroni2019}. In this paper, we examine vanilla, task-general neural networks to understand if they have an ME bias. Moreover, we analyze whether or not ME is a good assumption in lifelong variants of common translation and object recognition tasks. \section{Related work} Children utilize a variety of inductive biases like mutual exclusivity when learning the meaning of words \cite{Bloom2000}. Previous work comparing children and neural networks has focused on the shape bias -- an assumption that objects with the same name tend to have the same shape, as opposed to color or texture \cite{Landau1988}. Children acquire a shape bias over the course of language development \cite{Smith2002}, and neural networks can do so too, as shown in synthetic learning scenarios \cite{Colunga2005,Feinman2018} and large-scale object recognition tasks \cite{Ritter2017} (see also \cite{Id2018} and \cite{Brendel2019} for alternative findings). This bias is related to how quickly children learn the meaning of new words \cite{Smith2002}, and recent findings also show that guiding neural networks towards the shape bias improves their performance \cite{Geirhos2019}. In this work, we take initial steps towards a similar investigation of the ME bias in neural networks. Compared to the shape bias, ME has broader implications for machine learning systems; as we show in our analyses, the bias is relevant beyond object recognition. Closer to the present research, previous cognitive models of word learning have found ways to incorporate the ME bias \cite{Kachergis2012,mcmurray2012word,Frank2009,lambert2005guidelines,zinszer2018bayesian}, although in ways that do not generalize to training deep networks. Other work in natural language processing for cross-situational learning has incorporated ME directly into loss functions \cite{Kadar2015,Lazaridou2016,Gulordava2020} or augmented the final choice function in ways that do not influence the learning/ training process \cite{Gulordava2020,cohn2019lost}. Although related to our aims, it is not straightforward to apply these approaches outside of cross-situational word learning, and the choice methods cannot alone make training/ learning more efficient. Nevertheless, we see these results as important and encouraging, raising the possibility that ME could aid in training vanilla deep learning systems. \begin{figure*}[!btp] \centering \begin{subfigure}{.35\textwidth} \centering \includegraphics[width=\textwidth]{expclass.png} \caption{} \label{fig:expsetup} \end{subfigure}% \begin{subfigure}{.65\textwidth} \centering \includegraphics[width=\textwidth]{transynth.png} \caption{} \label{fig:st1} \end{subfigure} \caption{Evaluating mutual exclusivity in a feedforward (a) and seq2seq (b) neural network. (a) After training on a set of known objects, a novel label (``dax'') is presented as a one-hot input vector. The network maps this vector to a one-hot output vector representing the predicted referent, through an intermediate embedding layer and an optional hidden layer (not shown). A representative output vector produced by a trained network is shown, placing almost all of the probability mass on known outputs. (b) A similar setup for mapping sequences of labels to their referents. During the test phase a novel label ``dax'' is presented and the ME Score at that output position is computed.} \end{figure*} \section{Do neural networks reason by mutual exclusivity?}\label{sec:2} In this section, we investigate whether or not vanilla neural architectures have a mutual exclusivity bias. Paralleling the developmental paradigm \cite{Markman1988}, ME is analyzed by presenting a novel stimulus (``Show me the dax'') and asking models to predict which outputs (meanings) are most likely. The strength of the bias is operationalized as the aggregate probability mass placed on the novel rather than the familiar meanings. Our analyses relate to classic experiments by Marcus on whether neural networks can generalize outside their training space \cite{Marcus1998,Marcus2003}. Marcus showed that a feedforward autoencoder trained on arbitrary binary patterns fails to generalize to an output unit that was never activated during training. Our aim is to study whether standard architectures can recognize and learn a more abstract pattern -- a perfect one-to-one mapping between input symbols and output symbols. Specifically, we are interested in model predictions regarding unseen meanings given a novel input. We also test for ME using modern neural networks in two settings using synthetic data: classification (feedforward classifiers) and translation (sequence-to-sequence models; as reported in Appendix A). \subsection{Classification} \textbf{Synthetic data.} We consider a simple one-to-one mapping task inspired by Markman and Watchel \cite{Markman1988}. Translating this into a synthetic experiment, input units denote words and output units denote objects. Thus, the dataset consists of 100 pairs of input and output patterns, each of which is a one-hot vector of length 100. Each input vector represents a label (e.g., `hat', `cup', `dax') and each output vector represents a possible referent object (meaning). Figure \ref{fig:expsetup} shows the input and output patterns for the `dax' case, and similar patterns are defined for the other 99 input and output symbols. A one-to-one correspondence between each input symbol and each output symbol is generated through a random permutation, and there is no structure to the data beyond the arbitrary one-to-one relationship. Models are trained on 90 name-referent pairs and evaluated on the remaining 10 test pairs. No model can be expected to know the correct meaning of each test name -- there is no way to know from the training data -- but several salient patterns are discoverable. First, there is a precise one-to-one relationship exemplified by the 90 training items; the 10 test items can be reasonably assumed to follow the same one-to-one pattern, especially if the network architecture has exactly 10 unused input symbols and 10 unused output symbols. Second, the perfect one-to-one relationship ensures a perfect ME bias in the structure of the data. Although the learner does not know precisely \emph{which new output symbol} a new input symbol refers to, it should predict that the novel input symbol will correspond to \emph{one of the novel output symbols}. An ideal learner should discover that an output unit with a known label does not need another -- in other words, it should utilize ME to make predictions. \textbf{Mutual exclusivity.} We ask the neural network to “Show me the dax” by activating the “dax” input unit and asking it to select amongst possible referents (similar to Figure \ref{fig:me}). The network produces a probability distribution over candidate referents (see Figure \ref{fig:expsetup}), and can make relative (two object) comparisons by isolating the two relevant scores. To quantify the overall propensity toward ME, we define an “ME score” that measures the aggregate probability assigned to all of the novel output symbols as opposed to familiar outputs, corresponding to better performance on the classic forced choice ME task. Let us denote the training symbol by $\mathcal{Y}$, drawn from the data distribution $(\mathcal{X},\mathcal{Y})\sim\mathcal{D}$ and the held out symbols $\mathcal{Y}'$ drawn from $(\mathcal{X}',\mathcal{Y}')\sim\mathcal{D'}$. The mutual exclusivity score is the sum probability assigned to unseen output symbols $\mathcal{Y}'$ when shown a novel input symbol $x\in\mathcal{X}'$ \begin{equation} \mbox{ME Score } = \frac{1}{|\mathcal{D'}|} \sum_{(x_i,y_i) \in \mathcal{D'}} \sum_{y\in Y'}P(f_{net}(x)=y|x_i), \label{eq:1} \end{equation} averaged over each of the test items. An ideal learner that has discovered the one-to-one relationship in the synthetic data should have a perfect ME score of 1.0. In Figure \ref{fig:expsetup}, the probability assigned to the novel output symbol is $0.01$ and thus the corresponding ME Score is $0.01$. The challenge is to get a high ME score for novel (test) items while also correctly classifying known (training) items. \begin{figure*}[t] \centering \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{vanilla10.png} \caption{} \label{fig:p1} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{wd00110.png} \caption{} \label{fig:p2} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{ent10.png} \caption{} \label{fig:p3} \end{subfigure} \caption{Evaluating mutual exclusivity on synthetic categorization tasks. ME Score (solid blue) and the cross-entropy loss (solid red) are plotted against the epochs of training. The configurations in the settings shown were: (a) Results for a model with an embedding, hidden, and classification layers, (b) Results for a model with embedding and classification layers trained with a weight decay factor of 0.001, and (c) Results for a model with an embedding and classification layer trained with an entropy regularizer. } \label{fig:synth} \end{figure*} \textbf{Neural network architectures.} A wide range of neural architectures are evaluated on the mutual exclusivity test. We use an embedding layer to map the input symbols to vectors of size $20$ or $100$, followed optionally by a hidden layer, and then by a 100-way softmax output layer. The networks are trained with different activation functions (ReLUs \cite{nair2010rectified}, TanH, Sigmoid), optimizers (Adam \cite{Kingma2015}, Momentum, SGD), learning rates ($0.1,0.01,0.001$) and regularizers (weight decay, batch-normalisation \cite{Ioffe2015}, dropout \cite{srivastava2014dropout}, and entropy regularization (see Appendix B.1)). The models are trained to maximize log-likelihood. All together, we evaluated over 400 different models on the synthetic ME task. \begin{wrapfigure}{R}{0.35\textwidth} \centering \includegraphics[width=\textwidth]{models.png} \caption{Ideal and untrained ME scores compared with the ME scores of a few learned models.} \label{fig:p4} \end{wrapfigure} \textbf{Results.} Several representative training runs with different architectures are shown in Figure \ref{fig:synth}. An ideal learner that has discovered the one-to-one pattern should have a mutual exclusivity of 1; for a novel input, the network would assign all the probability mass to the unseen output symbols. In contrast, none of the configurations and architectures tested behave in this way. As training progresses, the mutual exclusivity score (solid blue line; Figure \ref{fig:synth}) tends to fall along with the training loss (red line). In fact, almost all of the networks acquire a strong \emph{anti-mutual exclusivity bias}, transitioning from an initial neutral bias to placing most or all of the probability mass on familiar outputs (seen in Figure \ref{fig:p4}). An exception to this pattern is the entropy regularized model, which maintains a score equivalent to an untrained network. In general, trained models strongly predict that a novel input symbol will correspond to a known rather than unknown output symbol, in contradiction to ME and the organizing structure of the synthetic data. Further informal experiments suggest our results cannot be reduced to simply not enough data: these architectures do not learn this one-to-one regularity regardless of how many input/output symbols are provided in the training set. Even with thousands of training examples demonstrating a one-to-one pattern, the networks do not learn this abstract principle and fail to capture this defining pattern in the data. Other tweaks were tried in an attempt to induce ME, including eliminating the bias units or normalizing the weights, yet we were unable to find an architecture that reliably demonstrated the ME effect. A similar pattern of results was observed in recurrent seq2seq networks for various standard trainind settings (see Appendix A). \subsection{Discussion} The results show that vanilla neural networks and recurrent seq2seq neural networks fail to reason by mutual exclusivity when trained in a variety of typical settings. The models fail to capture the perfect one-to-one mapping (ME bias) seen in the synthetic data, predicting that new symbols map to familiar outputs in a many-to-many fashion. Although our focus is on neural networks, this characteristic is not unique to this model class. We posit it more generally affects any discriminative model class trained to maximize log-likelihood (like multi-class softmax regression, decision trees, etc.). In a trained network, the optimal activation value for an unused output node is zero: for any given training example, increasing value of an unused output simply reduces the available probability mass for the target output. Using other loss functions could result in different outcomes, but we also did not find that weight decay and entropy regularization of reasonable values could fundamentally alter the use of novel outputs. In the next section, we investigate if the lack of ME could hurt performance on common learning tasks such as machine translation and image classification. \section{Should neural networks reason by mutual exclusivity?} Mutual exclusivity has implications for a variety of common learning settings. Mutual exclusivity arises naturally in lifelong learning settings, which more realistically reflect the ``open world'' characteristics of human cognitive development. Unlike epoch-based learning, a lifelong learning agent does not assume a fixed set of concepts and categories. Instead, new concepts can be introduced at any point during learning. An intelligent learner should be sensitive to this possibility, and ME is one means of intelligently reasoning about the meaning of novel stimuli. Children and adults learn in an open world with some probability of encountering a new class at any point, resembling the first epoch of training a neural net only. Moreover, the distribution of categories is neither uniformly distributed nor randomly shuffled \cite{smith2017developmental}. To simulate these characteristics, we construct lifelong learning scenarios using standard benchmarks as described below. \subsection{Machine translation} \begin{figure*}[!bt] \centering \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{envi.png} \label{fig:mt11} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{ende.png} \label{fig:mt12} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{encs.png} \label{fig:mt21} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{vien.png} \label{fig:mt22} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{deen.png} \label{fig:mt31} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth} \centering \includegraphics[width=\textwidth]{csen.png} \label{fig:mt32} \end{subfigure} \caption{Analysis of mutual exclusivity in machine translation datasets. The plots show the conditional probability of encountering a new word in the target sentence, if a new word is present in the source sentence (y-axis; red line). Also plotted is the base rate of encountering a new target word (blue line). These quantities are measured as at different points during training (x-axis). Errors bars are standard deviations.} \label{fig:mt} \end{figure*} In this section, we investigate if mutual exclusivity could be a helpful bias when training machine translation models in a lifelong learning paradigm. From the previous experiments, we know that the type of sequence-to-sequence (seq2seq) models used for translation acquire an anti-ME bias over the course of training (see Appendix A). Would a translation system benefit from assuming that a single word in the source sentence maps to a single word in the target sentence, and vice-versa? This assumption is not always correct since synonymy and polysemy are prevalent in natural languages, and thus the answer to whether or not ME holds is not absolute. Instead, we seek to measure the degree to which this bias holds in lifelong learning on real datasets, and compare this bias to the inductive biases of models trained on these datasets. The data for translation provides an approximately natural distribution over the frequency at which different words are observed (there are words that appear much more frequently than the others). This allows us to use a single pass through the dataset as a proxy for lifelong translation learning. \textbf{Datasets.} We analyze three common datasets for machine translation, each consisting of pairs of sentences in two languages (see Table \ref{tab:mtm}). The vocabularies are truncated based on word frequency in accordance with the standard practices for training neural machine translation models \cite{freitag2014combined, Luong2015, luong2016achieving}. \begin{table} \centering \caption{Datasets used to analyze ME in machine translation.} {\small \begin{tabular}{cccc} Name & Languages & Sentence Pairs & Vocabulary Size \\ \midrule IWSLT'14 \cite{freitag2014combined} & Eng.-Vietnamese & $\sim$133K & 17K(en), 7K(vi) \\ WMT'14 \cite{Luong2015} & Eng.-German & $\sim$4.5M & 50K(en), 50K(de) \\ WMT'15 \cite{luong2016achieving} & Eng.-Czech & $\sim$15.8M & 50K(en), 50K(cs)\\ \bottomrule \end{tabular}} \label{tab:mtm} \end{table} \textbf{Mutual exclusivity.} There are several ways to operationalize mutual exclusivity in a machine translation setting. Mutual exclusivity could be interpreted as whether a new word in the source sentence (``Xylophone'' in English) is likely to be translated to a new word in the target sentence (``Xylophon'' in German), as opposed to a familiar word. Since the word alignments are difficult to determine and not provided with the datasets, we instead measure a reasonable proxy: if a new word is encountered in the source sequence, is a new word also encountered in the target sentence? For a source sentence $S$ and an arbitrary novel word $N_S$, and a target sentence $T$ and a novel word $N_T$, we measure a dataset's ME Score as the conditional probability $P(N_T \in T | N_S \in S )$. A hypothetical translation model could compute whether or not $N_S \in S$ by checking if the present word is absent from the vocabulary-so-far during the training process. Thus this conditional probability is an easily-computable cue for determining whether or not a model should expect a novel output word. For the three datasets, we consider both forward and backward translation to get six scenarios for analysis. The probability $P(N_T \in T | N_S \in S )$ is estimated for a sample of 100 randomly shuffled sequences of the dataset sentence pairs. See Appendix B.3 for details on calculating the base rate $P(N_T \in T)$. \begin{wraptable}{r}{0.6\textwidth} \caption{Number of sentences after which the ME Score $P(N_T \in T | N_S \in S )$ falls below threshold.} {\small \begin{tabular}{ccccccc} \toprule \textbf{Score} & En-Vi & Vi-En & En-De & De-En & En-Cs & Cs-En\\ \midrule 0.9 &0.3K & 2K& 4K&3K & 4K & 3K \\ 0.5 &3K & 40K& 37K& 30K &40K & 30K\\ 0.1 &90K & 120K & 120K & 140K & 130K& 150K\\ \bottomrule \end{tabular}} \label{tab:me_decay} \end{wraptable} \textbf{Results and Discussion.} The measures of conditional probability in the six scenarios are shown in Table \ref{tab:me_decay}. There is a consistent pattern through the trajectory of early learning: the conditional probability $P(N_T \in T | N_S \in S )$ is high initially for thousands of initial sentence presentations, but then wanes as the network encounters more samples from the dataset. For a large part of the initial training, a seq2seq model would benefit from predicting that previously unseen words in the source language are more likely to map to unseen words in the target language. Moreover, this conditional probability is always higher than the base rate of encountering a new word, indicating that conditioning on the novelty of the input provides additional signal for predicting novelty in the output. Nevertheless, even the base rate suggests that a model should expect novel words with some regularity in our settings. This is in stark contrast to the synthetic results showing that seq2seq models quickly acquire an anti-ME assumption (see Appendix A), and their expectation of mapping novel inputs to novel outputs decays rapidly as training progresses (Appendix Figure 8). \subsection{Image classification} Similar to translation, we examine if object classifiers would benefit from reasoning by mutual exclusivity during training processes that mirror lifelong learning. To study this, when selecting an image for training, we sample the class from a power law distribution (see Appendix B.2) such that the model is more likely to see certain classes \cite{smith2017developmental}. Ideally, we would model the probability that an object belongs to a novel class based on its similarity to previous samples seen by the model (e.g., outlier detection). Identifying that an image belongs to a novel class is non-trivial, and instead we calculate the base rate for classifying an image as ``new'' while a learner progresses through the dataset. The set of classes not seen by the model are referred to as ``new'' here. This measure can be seen as a lower bound on the usefulness of ME through the standard training process, since this calculation assumes a blind learner that is unaware of any novelty signal present in the raw image. Additionally, we also train a model using an oracle which tells the model if an input image is from a ``new'' class. Using the signal from the oracle, we implement an ME rule by adding a bias to the ``new'' classes. This setup allows us to understand the utility of the ME bias in the situation where the model is capable of identifying an input as ``new''. \begin{figure} \thisfloatsetup{capbesideposition={right,top},capbesidewidth=0.3\textwidth} \fcapside[\FBwidth] {% \begin{subfloatrow} \ffigbox[0.32\textwidth]{\caption{Omniglot}\label{fig:st11} \centering \includegraphics[width=\linewidth]{omniglot.png}}{} \ffigbox[0.32\textwidth]{\caption{Imagenet}\label{fig:st12} \centering \includegraphics[width=\linewidth]{imagenet.png}}{} \end{subfloatrow} }{\caption {Analysis of mutual exclusivity in classification datasets. The plots show the probability that a new input image belongs to an unseen class $P(N|t)$, as a function of the number of images $t$ seen so far during training (blue). This measure is contrasted with the ME score of a neural network classifier trained through a similar run of the dataset (orange).\label{fig:stump}}} \end{figure} \textbf{Datasets.} This section examines the Omniglot dataset \cite{LakeScience2015} and the ImageNet dataset \cite{deng2009imagenet}. The Omniglot dataset has been widely used to study few-shot learning, consisting of 1623 classes of handwritten characters with 20 images per class. The ImageNet dataset consists of about 1.2 million images from 1000 different classes. \begin{wrapfigure}{R}{0.35\textwidth} \centering \includegraphics[width=\textwidth]{lossplot2.png} \caption{Classification loss for when a ``new'' class is first observed during online learning on Omniglot, for varying values of the oracle ME bias. Error bars are standard deviations.} \label{fig:oracle} \end{wrapfigure} \textbf{Mutual exclusivity.} To measure ME throughout the training process, we examine if an image encountered for the first time while training belongs to a class that has not been seen before. This is operationalized as the probability of encountering an image from a new class $N$ as a function of the number of images seen so far $t$, $P(N|t)$ (see Appendix B.4). This analysis is agnostic to the content of the image and whether or not it is a repeated item; it only matters whether or not the class is novel. As before, the analysis is performed using ten random runs through the dataset. We contrast the statistics of the datasets by comparing them to the ME Score (Equation \ref{eq:1}) of neural network classifiers trained on the datasets. The probability mass assigned to the unseen classes by the network is recorded after each optimizer step, as computed using Equation \ref{eq:1}. \begin{wraptable} {r}{0.55\textwidth} \centering \caption{Number of images after which the ME Score falls below threshold.} {\small \begin{tabular}{ccccc} \toprule \textbf{Score} & Omniglot & Omniglot & Imagenet & Imagenet\\ &&Classifier&&Classifier \\ \midrule 0.2 & 24,304 & 2,144& 1,280 & 2,048\\ 0.1 & 99,248 & 22,912 & 8,448& 3,072\\ 0.05 & 160,608 & 43,328 & 111,872 & 8,960\\ \bottomrule \end{tabular}} \label{tab:me_class} \end{wraptable} For Omniglot, a convolutional neural network was trained on 1623-way classification. The architecture consists of 3 convolutional layers (each consisting of $5\times5$ kernels and $64$ feature maps), a fully connected layer ($576\times 128$) and a softmax classification layer. It was trained with a batch size of 16 using an Adam optimizer and a learning rate of 0.001. For Imagenet, a Resnet18 model \cite{he2016deep} was trained on 1000-way classification with a batch size of 256, using an Adam optimizer and a learning rate of 0.001. If an architecture were capable of reasoning by ME, what would be the expected benefits? To answer this question, we implement an ME rule in the presence of an oracle, adding a constant bias to the logits of the unseen classes whenever the oracle tells the model that the input is ``new''. We compare the classification loss for the instances where a new class is observed. We do this for a range of bias values. The architecture in these experiments consisted of 3 convolutional layers (each consisting of $5\times5$ kernels and $64$ feature maps), a fully connected layer ($576\times 128$) and a softmax classification layer. When an input from an unseen classs was observed, a bias was added to the pre-softmax activations. The results presented are over 10 runs with different initializations. \textbf{Results and Discussion.} The results are summarized in Figure \ref{fig:stump} and Table \ref{tab:me_class}. The probability that a new image belongs to an unseen class $P(N|t)$ is higher than the ME score of the classifier through most of the learning phase. Comparing the statistics of the datasets to the inductive biases in the classifiers, the ME score for the classifiers is substantially lower than the baseline ME measure in the dataset, $P(N|t)$ (Table \ref{tab:me_class}). For instance, the ImageNet classifier drops its ME score below 0.05 after about 8,960 images, while the approximate ME measure for the dataset shows that new classes are encountered at above this rate until at least 111,000 images. These results suggest that neural classifiers, with their bias favoring frequent rather than infrequent outputs for novel stimuli, are not well-suited to lifelong learning challenges where such inferences are critical. Although we examined classifiers trained in an online fashion, we would expect similar results when we train them using replay or epoch-based training setups, where repeated presentation of past examples would only strengthen the anti-ME bias. These classifiers are hurt by their lack of ME and their failure to consider that new stimuli likely map to new classes. To further quantify the benefits of ME, we analyze a model trained with an oracle ME rule (see Figure \ref{fig:oracle}). The ME model has lower loss during online predictions when the added bias is increased to 5 from 0 (a vanilla network). For larger values, we do not observe any additional changes in the observed loss. We notice that the model is assisted by the ME rule. Ideally, a learning algorithm should be capable of leveraging the image content, combined with its own learning maturity, to decide how strongly it should reason by ME. Instead, typical models and training procedures do not provide these capabilities and do not utilize this important inductive bias observed in cognitive development. \vspace{-6pt} \section{General Discussion} \vspace{-6pt} Children use the mutual exclusivity (ME) bias to learn the meaning of new words efficiently, yet vanilla neural nets trained to maximize likelihood learn very differently. Our results show that they lack the ability to reason with ME, including feedforward networks and recurrent seq2seq models with common regularizers. Beyond simply lacking this bias, these networks learn an anti-ME bias, preferring to map novel inputs to familiar and frequent (rather than unfamiliar) output classes. Our results show that these characteristics are poorly matched to more realistic lifelong learning scenarios where new classes can appear at any point, as demonstrated in the experiments presented here. Neural nets may be currently stymied by their lack of ME bias, ignoring a powerful assumption about the structure of learning tasks. ME is relevant elsewhere in machine learning. Recent work has contrasted the ability of humans and neural networks to learn compositional instructions from just one or a few examples, finding that neural networks lack the ability to generalize systematically \cite{LakeBaroni2018,LakeLinzenBaroni2019}. The authors suggest that people rely on ME in these learning situations \cite{LakeLinzenBaroni2019}, and thus few-shot learning approaches could be improved by utilizing this bias as well. In our analyses, we show that NNs tend to learn the opposite bias, preferring to map novel inputs to familiar outputs. More generally, ME might be fruitfully generalized from applying to ``novel versus familiar'' stimuli to instead handling ``rare versus frequent'' stimuli. The utility of reasoning by ME could be extended to early stages of epoch based learning too. For example, during epoch-based learning, neural networks take longer to acquire rare stimuli and patterns of exceptions \cite{McClellandRogers2003}, often mishandling these items for many epochs by mapping them to familiar responses. We posit that the ME assumption will be increasingly important as learners tackle more continual, lifelong, and large-scale learning challenges \cite{Mitchell2018a}. Mutual exclusivity is an open challenge for deep neural networks, but there are promising avenues for progress. The ME bias will not be universally helpful, but it is equally clear that the status quo is sub-optimal: models should not have a strong anti-ME bias regardless of the task and dataset demands. Ideally, a model would decide autonomously how strongly to use ME (or not) based on the demands of the task. For instance, in our synthetic example, an ideal learner would discover the one-to-one correspondence and use this perfect ME bias as a meta-strategy, e.g., \cite{allen2019infinite,snell2017prototypical}. If the dataset has more many-to-one correspondences, it would adopt another meta-strategy. This meta-strategy could even change depending on the stage of learning, yet such an approach is not currently available for training models. For instance, the meta learning model of Santoro et al. \cite{Santoro2016} seems capable of learning an ME bias, although it was not specifically probed in this way. Recent work by Lake \cite{LakeMeta2019} indicates that DNNs can make the ME inference if trained explicitly to do so, showing these abilities are within the repertoire of modern tools. While promising, these recent demonstrations of ME in neural models show ME only when it is built-in or trained explicitly on tasks such as Markman's behavioral ME paradigm. These setups are unsuitable for large-scale learning and there are no compelling demonstrations that these ME results aid downstream learning, as occurs in cognitive development. A general solution would improve zero-shot predictions and the speed of learning after just a few examples, by mitigating the strong bias to familiar responses. In conclusion, vanilla deep neural networks do not naturally reason by mutual exclusivity. Two leading accounts in cognitive development posit ME as either an innate constraint or a bias learned through experience \cite{Lewis2020}, but vanilla DNNs trained with MLE seem inconsistent with both. Designing them to use ME could lead to faster and more flexible learners. There is a compelling case for building models that learn through mutual exclusivity. \section*{Acknowledgements} We are grateful to Marco Baroni, Tal Linzen, Nicholas Tomlin, Emin Orhan, Ethan Perez, and Wai Keen Vong for helpful comments and discussions. Through B. Lake’s position at NYU, this work was partially supported by NSF under the NSF Award 1922658 NRT-HDR: FUTURE Foundations, Translation, and Responsibility for Data Science. \section*{Broader Impact} Our challenge highlights how biases learned by a model fail to align with the structure of the data. A model that successfully reasons with ME, through either prior knowledge or learning via a meta-strategy, would better on tail-end distributions where models map rare examples to frequent ones. By representing the structure of the data more accurately allows for quicker generalization, there is also potential for models to learn a wider range of undesirable biases present in the training data. \bibliographystyle{unsrt}
\section{Introduction and theoretical considerations}\label{AppIntro} We present a preliminary study of the effect of slow rotation on the interference and diffraction patterns generated by a set of electrically small scatterers. Our analysis is two-dimensional; that is, the scatterers geometry and the electromagnetic excitation are invariant along $\unit{z}$ - the medium's rotation axis. The entire structure rotates at a constant angular velocity $\bb{\Omega}=\unit{z}\Omega$ radians/Sec., and it is observed at its rest frame of reference $\mathcal{R}^{\Omega}$. Here and henceforth vectors are written in bold letters, and a hat indicates a unit-vector. In the \emph{rotating} frame of reference $\mathcal{R}^{\Omega}$ the coordinates normal to the rotation axis are denoted by $\bb{\rho}=\unit{x}x+\unit{y}y=\rho\unit{\rho}$. We limit our study to slowly rotating structures, meaning that $\Omega\rho_{\mbox{max}}/c\ll 1$ where ${\mbox{max}}$ is the maximal distance of the system (including possible sources or observation points) from the rotation axis. The system is said to be \emph{stationary} in the special case of $\Omega=0$. In the latter case, the reference frame $\mathcal{R}^\Omega=\mathcal{R}^0$ is inertial. We use the term ``a problem in $\mathcal{R}^{\Omega}$'' to designate the electrodynamic problem of a rigid structure that rotates at an angular velocity $\Omega$, and observed in its \emph{non-inertial} rest frame. A specific case of which, ``a problem in $\mathcal{R}^{0}$'' is the electrodynamic problem of a rigid structure \emph{at rest}, observed in the inertial Lab frame. We always observe the rigid structure in its rest frame of reference. \subsection{Summary of previous results} We assume that the materials in the corresponding stationary system are fully characterized by scalar permittivity $\epsilon(\bb{\rho})$ and permeability $\mu(\bb{\rho})$. The electrodynamics of a slowly rotating medium, as observed in the medium's rest-frame, is governed by the same set of Maxwell equations as for the stationary case except that the constitutive relations are modified to account for the rotation effect \cite{Shiozawa} (a time-harmonic dependence $e^{-i\omega t}$ is assumed and suppressed) \begin{subequations} \begin{eqnarray}\label{Aeq1} \nabla\times\bb{E} &=& i\omega\bb{B},\qquad \nabla\cdot\bb{B}=0\label{Aeq1a}\\ \nabla\times\bb{H} &=& -i\omega\bb{D},\qquad \nabla\cdot\bb{D}=0\label{Aeq1b} \end{eqnarray} \end{subequations} where the rotation is manifested in the constitutive relations \begin{equation}\label{Aeq2} \bb{B}=\mu\bb{H}+c^{-2}\left(\bb{\Omega}\times\bb r\right)\times\bb{E},\quad \bb{D}=\epsilon\bb{E}-c^{-2}\left(\bb{\Omega}\times\bb r\right)\times\bb{H}. \end{equation} In the above, $c$ is the speed of light in vacuum, as observed in $\mathcal{R}^0$ (i.e.~in an inertial frame of reference). Likewise, $\mu=\mu_0\mu_r$, $\epsilon=\epsilon_0\epsilon_r$, and $\mu_r,\epsilon_r$ are the material properties as observed in $\mathcal{R}^0$. A derivation of these constitutive relations directly from a more general form of Maxwell's equations can be found e.g.~in \cite{AndersonRyon} Our starting point is the Green's function theory developed in \cite{BZSG}. It has been shown that in 2D problems the electromagnetic field can be rigorously separated into completely decoupled TE and TM polarizations: \begin{description} \item[TE] This case consists of the fields $H_z,\bb{E}_t=\unit{x}E_x+\unit{y}E_y$ only. These fields can be excited by the transverse electric current $\bb{J}_t$ and/or by the $\unit{z}$-directed magnetic current $J_z^M$. \item[TM] This case consists of the fields $E_z,\bb{H}_t=\unit{x}H_x+\unit{y}H_y$ only. These fields can be excited by the transverse magnetic current $\bb{J}^M_t$ and/or by the $\unit{z}$-directed electric current $J_z$. \end{description} Furthermore, in both polarizations the complete electromagnetic field can be derived from the corresponding $z$-directed field, that satisfies the following transverse PDE \begin{subequations} \begin{equation}\label{Aeq3a} [\nabla_t^2+k_0^2n^2]F_z-2ik_0^2\frac{\Omega}{\omega}\partial_\theta\,F_z=S \end{equation} where $n^2=\epsilon_r\mu_r$. For TE polarization the complete EM field is given by, \begin{equation}\label{Aeq3b} H_z=F_z,\quad i\omega\epsilon\bb{E}_t=\bb{J}_t-\nabla_t\times\unit{z}H_z+i\frac{\omega\Omega}{c^2}\bb{\rho}H_z \end{equation} with the scalar source $S$ \begin{equation}\label{Aeq3c} S=S^{\mbox{\tiny TE}}=-i\omega\epsilon J_z^M-i\frac{\omega\Omega}{c^2}\bb{\rho}\cdot\bb{J}_t-\unit{z}\cdot\nabla_t\times\bb{J}_t \end{equation} For TM polarization \begin{equation}\label{Aeq3d} E_z=F_z,\quad i\omega\mu\bb{H}_t=\bb{J}_t^M+\nabla_t\times\unit{z}E_z-i\frac{\omega\Omega}{c^2}\bb{\rho}E_z \end{equation} with the scalar source \begin{equation}\label{Aeq3e} S=S^{\mbox{\tiny TM}}=-i\omega\mu J_z+i\frac{\omega\Omega}{c^2}\bb{\rho}\cdot\bb{J}_t^M+\unit{z}\cdot\nabla_t\times\bb{J}_t^M \end{equation} \end{subequations} We define now the scalar Green's function $G(\bb{\rho},\bb{\rho'})$ as the impulse response of the PDE in \Eq{Aeq3a}, \begin{equation}\label{Aeq4} [\nabla_t^2+k_0^2n^2]G-2ik_0^2\frac{\Omega}{\omega}\partial_\theta\,G=-\delta(\bb{\rho}-\bb{\rho'})= -\frac{1}{\rho'}\delta(\rho-\rho')\delta(\theta-\theta') \end{equation} Clearly, the response to any excitation can be obtained by a simple spatial convolution of $G$ with the source term $S$. Note, however, that for a thin-wire electric [magnetic] current $\bb{J}=\unit{z}I_z\delta(\bb{\rho}-\bb{\rho'})$ [$\bb{J}^M=\unit{z}I_z^M\delta(\bb{\rho}-\bb{\rho'})$], the excited field is only of the TM [TE] polarization, with the Electric [magnetic] field $E_z=i\omega\mu I_z\,G(\bb{\rho},\bb{\rho'})$ [$H_z=i\omega\epsilon I^M_z\,G(\bb{\rho},\bb{\rho'})$]. It has been shown in \cite{BZSG} that a formally complete and \emph{exact} expression for $G$ is given by \begin{subequations} \begin{equation}\label{Aeq5a} G(\bb{\rho},\bb{\rho'})=\frac{i}{4}\sum_{\ell=-\infty}^\infty J_\ell(k_0 n \gamma_\ell\rho_<)H_\ell^{(1)}(k_0 n \gamma_\ell\rho_>)e^{i\ell(\theta-\theta')} \end{equation} where \begin{equation}\label{Aeq5b} \gamma_\ell=\sqrt{1+2\ell\Omega/(\omega n^2)},\qquad \rho_\gtrless=\substack{\mbox{max} \\ \mbox{min}}(\rho,\rho'). \end{equation} \end{subequations} There are several difficulties with the summation in \Eq{Aeq5a}. First and foremost, recall that $G(\bb{\rho},\bb{\rho'})$ should diverge logarithmically as $\bb{\rho}\rightarrow\bb{\rho'}$ (as any Greens function of a 2D PDE). This singular behavior is not present in each of the summed terms above (unless $\rho=\rho'=0$). Thus, as $\bb{\rho}$ approaches $\bb{\rho'}$ the convergence of the series in \Eq{Aeq5a} becomes extremely poor. The second difficulty stems from the fact that we will be interested in far-field diffraction/interference patterns. This requires the evaluation of $J_\ell,\, H_\ell^{(1)}$ for large argument and order, that is also quite difficult to attain. Finally, while the cylindrical harmonic summation in \Eq{Aeq5a} provides a formally exact Green's function of the rotating medium, the physically meaningful and intuitive entities such as amplitude, phase, optical path, etc..., are completely hidden. In light of these issues, an approximate expression for $G$ has been developed in \cite{BZSG} with the condition $\max(\rho,\rho')\Omega/c\ll1$ that is consistent with the slow rotation assumption, \begin{equation}\label{Aeq6} G(\bb{\rho},\bb{\rho'})\simeqG^{\mbox{\tiny st}}(\bb{\rho},\bb{\rho'})e^{ik_0(\Omega/c)\unit{z}\cdot(\bb{\rho'}\times\bb{\rho})},\quad G^{\mbox{\tiny st}}(\bb{\rho},\bb{\rho'})=\frac{i}{4}H_0^{(1)}(k_0n|\bb{\rho}-\bb{\rho'}|) \end{equation} where $H_0^{(1)}(\cdot)$ is the zeroth-order Hankel function of the first kind. Clearly, $G^{\mbox{\tiny st}}$ is the Green's function of the corresponding \emph{stationary} medium; the homogeneous medium Greens function for a problem in $\mathcal{R}^0$. Note that the singularity of $G$ as $\bb{\rho}\rightarrow\bb{\rho'}$ is fully encapsulated in $G^{\mbox{\tiny st}}$, since the other term is regular in this limit. This is quite expected since both the stationary and rotating medium Green's functions satisfy a PDE that possesses exactly the same form of the higher (second-order) derivatives - see \Eq{Aeq4} - and therefor must have the same singularity; the stationary case is obtained merely by setting $\Omega=0$. Hence, the simplified expression above \emph{correctly reconstructs the near fields}. Despite its simplicity, this expression provides a good approximation for the rotating medium Green's function. A detailed comparison is performed in \cite{BZSG}. We show in the main text that this Green's function also correctly reconstructs the celebrated Sagnac effect that is clearly related to propagating fields. Hence it constitutes in fact a \emph{uniform} approximation of the exact Green's function. \section{Derivation of \Eq{eq13}}\label{eq9der} If we set $\bb{\rho}_0=\bb{0}$ then Eq.~(8) in the main text becomes \begin{equation} n\unit{x}\cdot\unit{\rho}_\mathfrak{M}+\frac{\Omega}{c}\unit{z}\cdot\left(\bb{\rho}_\mathfrak{M}\times\unit{x}\right)=\mathfrak{M}\lambda/d\label{eqR1} \end{equation} where $\unit{\rho}_\mathfrak{M}=\unit{x}\sin\varphi_\mathfrak{M}+\unit{y}\cos\varphi_\mathfrak{M}$ is the unit vector pointing towards the interference $\mathfrak{M}$-th maxima, $\varphi_\mathfrak{M}$ is the value of the angle $\varphi$, as defined in Fig.~2(b) of the main text, that points to that maxima, and $\bb{\rho}_\mathfrak{M}=\rho\unit{\rho}_\mathfrak{M}$. By substituting this back to \Eq{eqR1} we obtain \begin{equation} n\sin\varphi_\mathfrak{M}=\mathfrak{M}\lambda/d+\Omega y/c \label{eqR2} \end{equation} where we used $y=\rho\cos\varphi_\mathfrak{M}$. This is the result shown in the main text. \section{Fields in $\mathcal{R}^\Omega$} Assume a $\unit{z}$-directed electric line source $I_z$ located at $\bb{\rho'}=(\rho',\theta')$ in $\mathcal{R}^\Omega$. It excites only the TM polarization. The corresponding electric and magnetic fields can be obtained from $G$ via \Eqs{Aeq3d}{Aeq3e}, \begin{subequations} \begin{eqnarray} E_z &=& I_z i\omega\mu G(\bb{\rho},\bb{\rho'})\label{Aeq7a}\\ \nonumber\\ H_\rho &=& I_z \frac{k_0 n\rho'\sin(\theta-\theta')}{\abs{\bb{\rho}-\bb{\rho'}}}G^{\mbox{\tiny st}(1)} e^{ik_0(\Omega/c)\unit{z}\cdot(\bb{\rho'}\times\bb{\rho})} \nonumber\\ & & -I_z i\frac{k_0\Omega}{c} \left[\rho-\rho'\cos(\theta-\theta')\right]G(\bb{\rho},\bb{\rho'})\label{Aeq7b}\\ \nonumber\\ H_\theta &=& -I_z\frac{k_0 n[\rho-\rho'\cos(\theta-\theta')]}{\abs{\bb{\rho}-\bb{\rho'}}}G^{\mbox{\tiny st}(1)} e^{ik_0(\Omega/c)\unit{z}\cdot(\bb{\rho'}\times\bb{\rho})}\nonumber\\ & & -I_z i \frac{k_0\Omega}{c}\rho'\sin(\theta-\theta')G(\bb{\rho},\bb{\rho'}) \label{Aeq7c} \end{eqnarray} where for simplicity and convenience, we have used \Eq{eq6} in the derivation of the magnetic field. In the expressions above, $G^{\mbox{\tiny st}(1)}$ is the derivative of $G^{\mbox{\tiny st}}$ with respect to the argument, \begin{equation}\label{Aeq7d} G^{\mbox{\tiny st}(1)}=-\frac{i}{4}H_1^{(1)}(k_0n\abs{\bb{\rho}-\bb{\rho'}}). \end{equation} \end{subequations} Recall that Maxwell equations for a problem in $\mathcal{R}^\Omega$ differ from their form for a problem in $\mathcal{R}^0$ only via the more elaborated form of the constitutive relations, given here in \Eq{Aeq2}. We note that these constitutive relations may hold also for a problem in $\mathcal{R}^0$ with a special type of non-homogeneous Telegen medium \cite{Bian_Book}. The time-averaged power flux and momentum densities associated with the wave \emph{only}, in non-inertial frame or in a general medium with macroscopic constitutive relations of the type dealt with here, are still given by $\bb{S}=\frac{1}{2}\Re(\bb{E}\times\bb{H}^*)$ and by $\bb{S}/c^2$, respectively \cite{AM_Ramos_2015}. The latter is nothing but the Abraham momentum picture \cite{AM_Ramos_2015, AM_Barnett_2010}. We have, \begin{subequations} \begin{eqnarray} S_\theta &=& S_\theta^0 -4P_0\frac{k_0\Omega}{c}[\rho-\rho'\cos(\theta-\theta')]\abs{G^{\mbox{\tiny st}}}^2 \label{Aeq8a}\\ S_\rho &=& S_\rho^0 + 4P_0\frac{k_0\Omega}{c}\rho'\sin(\theta-\theta')\abs{G^{\mbox{\tiny st}}}^2\label{Aeq8b} \end{eqnarray} where $S_\theta^0$ and $S_\rho^0$ are rotation independent terms that provide the $\unit{\theta}$ and $\unit{\rho}$ components of the Poynting vector for a problem in $\mathcal{R}^0$, \begin{eqnarray} S_\theta^0 &=& 4P_0 k_0n\frac{\rho'\sin(\theta-\theta')}{\abs{\bb{\rho}-\bb{\rho'}}}\,\Re\left\{iG^{\mbox{\tiny st}}\left[G^{\mbox{\tiny st}(1)}\right]^*\right\}\label{Aeq8c}\\ S_\rho^0 &=& 4P_0 k_0n\frac{\rho-\rho'\cos(\theta-\theta')}{\abs{\bb{\rho}-\bb{\rho'}}}\,\Re\left\{iG^{\mbox{\tiny st}}\left[G^{\mbox{\tiny st}(1)}\right]^*\right\}\label{Aeq8d} \end{eqnarray} and where \begin{equation}\label{Aeq8e} P_0=\frac{1}{8}\omega\mu\abs{I_z}^2 \end{equation} \end{subequations} is the time-averaged power per unit length radiated by a wire carrying the electric current $I_z$ in a problem in $\mathcal{R}^0$. It follows that low index material can reduce significantly the rotation independent terms $S_\theta^0$ and $S_\rho^0$, but has no effect at all on the rotation-dependent components of $\bb{S}$. The excitation of TE polarization, e.g. by a $\bb{z}$-directed line-source of magnetic current, has a symmetric structure and will not be repeated here. \end{widetext} \end{document}
\section{Introduction}\label{intro} Thanks to the decreasing cost and increasing capacity of storage available at mobile devices, \textit{proactive caching} has received significant attention in recent years as a low-cost and effective solution to keep up with the exponentially growing mobile data traffic\cite{samueljsac,MaddahAliCentralized, MohammadQianDenizITW}. Proactively storing popular contents in cache memories distributed across the network during off-peak traffic periods can greatly reduce both the network congestion and the latency during peak traffic hours. \textit{Coded caching} \cite{MaddahAliCentralized} exploits the broadcast nature of wireless delivery and the contents proactively cached in users' local memories to create multicasting opportunities, even when the users request distinct files, further boosting the benefits of caching. The significant gains of coded caching over traditional uncoded caching schemes have inspired numerous studies, among which \cite{ hassanzadeh2016correlation,qiandeniz2018icc, hassanzadeh2017broadcast, hassanzadeh2017rate, hassanzadeh2016cache, yu2017exact, MohammadDenizerasureTCom, amiri2017gaussian, shirin2016broadcastit, shirin2017broadcastit, Shengerasure2016} are most related to this paper. Most of the literature on coded caching considers independent files in the library. However, in many practical settings, files in a cache library can be highly correlated. For example, if we treat chunks of a video file as distinct files to be cached and delivered, these video chunks are typically correlated. Similarly when delivering software updates, each user may request a different version, or updates for a different subset of software packages, which may lead to correlations among requests. In the file correlation model, used in this paper and introduced in \cite{qiandeniz2018icc}, we assume that any subset of the files in the library exclusively share a common part. We present an example of the considered correlation model for three files in Fig. \ref{fig:correlationmodel}, where the common parts of different subsets of files are shown with different colors. This model is fairly general to capture message correlations on the symbol level modeled by arbitrary joint distributions, as more commonly considered in multi-terminal source coding problems\cite{slepian1973noisycoding}, when it is used in conjunction with the Gray-Wyner network \cite{gray1974source}, which, as described in \cite{hassanzadeh2018rate}, encodes the correlated files into messages with the correlation structure considered in this paper. \begin{figure} \centering \includegraphics[width=0.45\linewidth]{correlationmodel09.png} \caption{An example of $N=3$ correlated files. Each file consists of $4$ different subfiles with different \textit{commonness} levels.} \label{fig:correlationmodel} \end{figure} Delivering correlated contents over an error-free shared link with receiver caches is considered in \cite{hassanzadeh2016correlation, hassanzadeh2017broadcast, hassanzadeh2017rate,qiandeniz2018icc}. In \cite{hassanzadeh2016correlation}, correlations among an arbitrary number of files is exploited by identifying the most representative files, which are then used as references for compressing the remaining files with respect to the representatives. Correlation among two files is fully exploited in \cite{hassanzadeh2017rate}, in which the files are initially compressed using Gray-Wyner source coding, and an optimal caching scheme is derived for the two-receiver network. This scheme is generalized to more files in \cite{hassanzadeh2017broadcast}, which is optimal for large cache sizes. Arbitrary numbers of users and files are considered in \cite{qiandeniz2018icc}, with the file correlation model illustrated in Fig. \ref{fig:correlationmodel}. The works in \cite{MohammadDenizerasureTCom, amiri2017gaussian, shirin2016broadcastit, shirin2017broadcastit, Shengerasure2016} consider a more realistic noisy broadcast channel (BC) model from the server to the user. In \cite{shirin2017broadcastit}, the authors consider a degraded BC and a total memory budget, and optimize the cache assignment to the users depending on their channel capacities. A different perspective is taken in \cite{amiri2017gaussian}, which highlights the benefits of caching and coded delivery in terms of the energy-efficiency in a Gaussian BC. However, neither of these papers consider correlation among files. Following up on \cite{amiri2017gaussian}, in this paper we consider a degraded Gaussian BC model, but rather than independent files, we assume that the files in the library can be arbitrarily correlated as modeled in \cite{qiandeniz2018icc}, and illustrated in Fig. \ref{fig:correlationmodel}. In this model, we have a total of $2^N-1$ subfiles (which can be of size zero), each shared exclusively by a distinct subset of users. We evaluate the performance of this system in terms of the minimum transmission power required to satisfy any demand combination. We derive a lower bound on the transmission power assuming uncoded cache placement, and propose an upper bound, obtained by employing superposition coding and power allocation. For small cache sizes, coded placement and joint encoding scheme is also considered as coded placement is known to better exploit limited cache capacities\cite{ZhiChenXOR} and in asymmetric scenarios \cite{qiandeniz2018tit}. The proposed scheme further exploits the degraded nature of the BC channel by jointly encoding cached contents of the weak users together with the messages targeted at them. This allows the stronger users to receive both the cache contents and the delivered messages of weak users at no additional energy cost. The required transmission power by this scheme meets the derived lower bound that assumes uncoded placement. Through simulations, we show that the proposed correlation-aware joint caching and channel coding scheme reduces the transmission power significantly compared to correlation-ignorant schemes. The paper is organized as follows. Section~\ref{sys} presents the system model and the problem formulation. A lower bound is presented in Section~\ref{sec:main results}. Two centralized caching and delivery schemes are proposed in Sections~\ref{sec:scheme sep} and \ref{sec:scheme joint} based, respectively, on separate and joint cache-channel coding. Numerical results comparing the proposed upper and lower bounds are provided in Section~\ref{sec:numerical}, and the paper is concluded in Section~\ref{sec:conc}. \textit{Notations:} The set of integers $\left\{ i, ..., j \right\}$, where $i \le j$, is denoted by $\left[ i:j \right]$, and for $q\in \mathbbm{R}^+$, the set $[1: \lceil q\rceil]$ is denoted shortly by $[q]$. For sets $\mathcal{A}$ and $\mathcal{B}$, we define $\mathcal{A} \backslash \mathcal{B}\triangleq\{x: x \in \mathcal{A}, x\notin \mathcal{B}\}$, and $\left| \mathcal{A} \right|$ denotes the cardinality of $\mathcal{A}$. $\binom{j}{i}$ represents the binomial coefficient if $j\geq i$; otherwise, $\binom{j}{i}=0$. For event $E$, $\mathbbm{1}\{E\}=1$ if $E$ is true; and $\mathbbm{1}\{E\}=0$, otherwise. \section{System Model}\label{sys} Consider a server that holds a database of $N$ correlated files, denoted by $\mathbf{W}=(W_1, ..., W_N)$, each composed of a group of independent subfiles. File $W_i$, $i\in [N]$, consists of $2^{N-1}$ independent subfiles, i.e., \small \begin{equation} W_i=\{\overline{W}_{\mathcal{S}}: \mathcal{S}\subseteq[N],\;i \in \mathcal{S}\},\notag \end{equation} \normalsize where $\overline{W}_{\mathcal{S}}$ denotes the subfile shared exclusively by the files $\{W_i: i \in \mathcal{S}\}$. For $\mathcal{S}\subseteq [N]$, $|\mathcal{S}|=\ell$, we say that subfile $\overline{W}_{\mathcal{S}}$ has a {\em commonness level of $\ell$}. The subfiles are arranged into $N$ {\em sublibraries}, $L_1,\dots,L_N$, such that $L_\ell$ contains all the subfiles with commonness level of $\ell$, i.e., \small \begin{equation} L_\ell=\{\overline{W}_{\mathcal{S}}:\mathcal{S}\subseteq [N],\; |\mathcal{S}|=\ell\}.\notag \end{equation} \normalsize We assume that all the subfiles with the same commonness level, i.e., in the same sublibrary, have the same length, and let subfile $\overline{W}_{\mathcal{S}}\in L_\ell$ be distributed uniformly over the set $[2^{ nR_\ell }]$, where $R_\ell$ is referred to as the rate of subfile $\overline{W}_{\mathcal{S}}$, and $n$ denotes the transmission blocklength, corresponding to $n$ uses of the BC. Let $\mathbf{R} \triangleq (R_1, \ldots, R_N)$. Therefore, all the files are of the same rate of $R$ bits per channel use, given by \small \begin{equation} R=\sum\limits_{\ell=1}^{N} \binom{N-1}{\ell-1}R_\ell.\notag \end{equation} \normalsize Each user is equipped with a cache of size $nM$ bits, where $M$ is called the {\em normalized cache capacity}. Communication takes place in two phases. During the first phase, referred to as the {\em placement phase}, the user caches are filled by the server without the knowledge of user demands. This phase happens during a period of low traffic, and we assume during that phase the channel is noiseless and there are no rate limitations. We consider {\em centralized} caching; that is, the server has the knowledge of the active users in advance, allowing the cache placement to be conducted in a coordinated fashion. At the beginning of the second phase, referred to as the {\em delivery phase}, user $k\in[K]$ requests file $W_{d_k}$ from the library, with $d_k$ uniformly distributed over $[N]$. Let $\mathbf{d}\triangleq (d_1, ..., d_K)$ denote the demand vector. All the requests are satisfied through a Gaussian BC, characterized by a time-invariant channel vector ${\bf h} =(h_1 ,\dots,h_K)$ and additive white Gaussian noise, where $h_k$ denotes the real channel gain between the server and user $k$. The channel gains are fixed, and are known to all the parties. Without loss of generality, we assume $h_1^2 \leq h_2^2 \leq \cdots \leq h_K^2$, such that the users are ordered from the weakest to the strongest. The $i^\text{th}$ channel output at user $k$ is given by \small \begin{equation}\label{channel} Y_{k,i}=h_k\, X_i+\sigma_{k,i}, \notag \end{equation} \normalsize where $X_i$ and $\sigma_{k,i}\sim \mathcal{N}(0,1)$ denote the channel input and the noise term at user $k$ in the $i^\text{th}$ channel use, respectively, which is independent and identically distributed across time and users. For a total transmit power of $P$, an $(n, \mathbf{R}, M, P)$ code for this system consists of: \begin{itemize} \item \textbf{$K$ caching functions} $f_{k}$, $k \in [K]$, \small \begin{equation} f_{k}: [2^{nR}]^N\times \mathbbm{R}^{K} \rightarrow [2^{nMR}],\notag \end{equation} \normalsize such that user $k$'s cache content is given by $Z_k=f_{k}(\mathbf{W},\mathbf{h})$. Let $\mathbf{Z}\triangleq (Z_1,\dots,Z_K)$. \item A \textbf{delivery function} $g$, \small \begin{equation} g: [ 2^{nR}]^N \times [2^{nMR}] \times \mathbbm{R}^{K} \times [N]^K \rightarrow \mathbbm{R}^{n},\notag \end{equation} \normalsize which, for given cache contents $\mathbf Z$, channel gains $\mathbf{h}$, and demand vector $\bf d$, generates the channel input signal, $X^n(\mathbf{W}, \mathbf Z, \mathbf{d} )=g(\mathbf{W}, \mathbf Z, \mathbf{h}, \mathbf{d})$, transmitted by the server over the Gaussian BC in $n$ channel uses, with $X_i(\mathbf{W}, \mathbf Z, \mathbf{d})$ denoting the $i^\text{th}$ channel input, $i=1, ..., n$. The channel input vector is generated such that its average power over $n$ channel uses is not more than $P$ for any demand vector realization, i.e., \small \begin{equation} P(\mathbf{W}, \mathbf Z, \mathbf{d}) \triangleq \frac{1}{n} \sum\limits_{i=1}^n X^2_i(\mathbf{W}, \mathbf Z, \mathbf{d})\leq P, \quad \forall\, {\bf d}\in [N]^K.\notag \end{equation} \normalsize \item \textbf{$K$ decoding functions} $\phi_k$, $k\in [K]$, \begin{equation} \phi_k: \mathbbm{R}^{n} \times [2^{nMR}]\times \mathbbm{R}^{K} \times [N]^K \rightarrow [2^{nR}],\notag \end{equation} where $\widehat{W}_{d_k}=\phi_k(Y^n(\mathbf{W},\mathbf Z, \mathbf{d}),Z_k,\mathbf{h},\mathbf{d})$, is the reconstruction of $W_{d_k}$ requested by user $k$, and $Y^n(\mathbf{W}, \mathbf Z, \mathbf{d})$ is the channel output at user $k$ for input signal $X^n(\mathbf{W}, \mathbf Z, \mathbf{d})$. \end{itemize} \begin{Definition} A memory-power pair $(M, P)$ is \textit{achievable} for the system described above, if there exists a sequence of $(n, \mathbf{R}, M, P)$ codes such that \small \begin{equation} \lim_{n \rightarrow \infty} \mathbbm{P} \Bigg\{\bigcup\limits_{{\bf d}\in [N]^K } \bigcup\limits_{k =1}^K \Big\{\widehat{W}_{d_k}\neq W_{d_k}\Big\}\Bigg\}=0.\notag \end{equation} \end{Definition} \normalsize For a system with $N$ files and $K$ users, with given channel gains $\mathbf h$, our goal is to characterize the minimum achievable power $P$ as a function of the user cache capacity $M$, i.e., \small \begin{equation} P^*(M)\triangleq \inf\{P: (M, P) \mbox{ is achievable}\}.\notag \end{equation} \normalsize \begin{Remark} In principle different codebooks satisfying different average power constraints can be used for different demand vectors. With the definition above, our goal is to characterize the power constraint that is required to satisfy any demand combination. \end{Remark} We conclude this section with the following proposition, which will be frequently referred to in the remainder of the paper. \begin{proposition}\label{prop:AWGN} \cite{Bergmans1974,bergmans1973degradedBC} In a $K$-user degraded Gaussian BC with \small$h_1^2\leq h_2^2\leq\dots\leq h_K^2$,\normalsize distinct messages at rates $\rho_1,\dots,\rho_K$, can be reliably transmitted to users $1,\dots,K$, respectively, iff \small \begin{equation} \rho_k \leq C\Bigg(\frac{h_k^2P_k}{1+h_k^2\sum\limits_{j=k+1}^{K}P_j}\Bigg),~~~ k =1,\dots,K, \label{eq:codebook} \end{equation} \normalsize where $C(x) \triangleq \frac{1}{2} \log_2(1+x)$. This is achieved by superposition coding with Gaussian codewords of power $P_i$, $i=1, ..., K$, to transmit to user $i$. As a consequence, the minimum total transmit power for reliable communication is given by \small \begin{equation} \sum\limits_{k=1}^K P_k \geq \sum\limits_{k=1}^{K}\left(\frac{2^{2 {\rho}_k}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}2^{2 {\rho}_j}.\label{eq:power} \end{equation} \normalsize \end{proposition} \section{Lower Bound}\label{sec:main results} This section provides a lower bound on the memory-power function, $P^*(M)$ in Theorem ~\ref{lowerbound}, when the placement phase is limited to caching functions that store uncoded contents. We first present a lemma, which will facilitate the proof of Theorem ~\ref{lowerbound}. We denote by $\mathfrak{D}_d$ the set of all demand combinations such that the first $N_e$ users request distinct files, where $N_e \triangleq \min\{N, K\}$. We note that there are a total of $\binom{N}{N_e}N_e!N^{K-N_e}$ such demand combinations, i.e, $|\mathfrak{D}_d|=\binom{N}{N_e}N_e!N^{K-N_e}$, enumerated as $\mathbf{d}_t\triangleq (d^t_1, ..., d^t_K) \in \mathfrak{D}_d$,\; $t\in [\binom{N}{N_e}\,N_e!\,N^{K-N_e}]$. \begin{exmp}\label{exmp1} Consider $N=3$, $K=4$. We have $|\mathfrak{D}_d|=18$ and \small \begin{align}\label{distinctdemand} &\mathbf{d}_1=\{1, 2, 3, 1\}, \mathbf{d}_2=\{1, 2, 3, 2\}, \mathbf{d}_3=\{1, 2, 3, 3\},\nonumber\\ &\mathbf{d}_4=\{1, 3, 2, 1\}, \mathbf{d}_5=\{1, 3, 2, 2\}, \mathbf{d}_6=\{1, 3, 2, 3\},\nonumber\\ &\mathbf{d}_7=\{2, 3, 1, 1\}, \mathbf{d}_8=\{2, 3, 1, 2\}, \mathbf{d}_9=\{2, 3, 1, 3\},\nonumber\\ &\mathbf{d}_{10}=\{3, 2, 1, 1\}, \mathbf{d}_{11}=\{3, 2, 1, 2\}, \mathbf{d}_{12}=\{3, 2, 1, 3\},\nonumber\\ &\mathbf{d}_{13}=\{3, 1, 2, 1\}, \mathbf{d}_{14}=\{3, 1, 2, 2\}, \mathbf{d}_{15}=\{3, 1, 2, 3\},\nonumber\\ &\mathbf{d}_{16}=\{2, 1, 3, 1\}, \mathbf{d}_{17}=\{2, 1, 3, 2\}, \mathbf{d}_{18}=\{2, 1, 3, 3\}. \end{align} \normalsize \end{exmp} \begin{Lemma} There exist random variables $X_{\mathbf{d}_t},$ $Y_{1, \mathbf{d}_t},$ $...,$ $ Y_{N_e, \mathbf{d}_t}$, where for $X_{\mathbf{d}_t}=x$, $x\in \mathbbm{R}$, \begin{equation} Y_{k, \mathbf{d}_t}|x\sim N(h_kx, 1),~~k\in [N_e] \notag \end{equation} and random variables $U_{1, \mathbf{d}_t},$ $...,$ $ U_{N_e-1, \mathbf{d}_t}$, such that \begin{equation} U_{1,\mathbf{d}_t}-\cdots-U_{N_e-1, \mathbf{d}_t}-X_{\mathbf{d}_t}-Y_{N_e, \mathbf{d}_t}-\cdots-Y_{1, \mathbf{d}_t}\notag \end{equation} forms a Markov chain, and \small \begin{align}\label{lemma1} &H(W_{d^t_1})+\epsilon_n\leq \frac{1}{n} I(W_{d^t_1}; Z_1)+I(U_{1, \mathbf{d}_t}; Y_{1, \mathbf{d}_t});\notag\\ &H(W_{d^t_k}|W_{d^t_{k-1}}, ..., W_{d^t_1})+\epsilon_n\leq \frac{1}{n} I(W_{d^t_k}; Z_1, ..., Z_k|W_{d^t_{k-1}}, ..., W_{d^t_1})+I(U_{k,\mathbf{d}_t}; Y_{k,\mathbf{d}_t}|U_{k-1,\mathbf{d}_t}), k\in [2:N_e-1];\notag\\ &H(W_{d^t_{N_e}}|W_{d^t_{N_e-1}}, ..., W_{d^t_1})+\epsilon_n\leq \frac{1}{n} I(W_{d^t_{N_e}}; Z_1, ..., Z_{N_e}|W_{d^t_{N_e-1}}, ..., W_{d^t_1})+I(X_{\mathbf{d}_t}; Y_{N_e, \mathbf{d}_t}|U_{N_e-1, \mathbf{d}_t}), \end{align} \normalsize where $\epsilon_n$ goes to zero as $n \rightarrow \infty$. \begin{proof} The proof is similar to the proof of \cite[Lemma 14]{shirin2017broadcastit}, which we omit here. \end{proof} \end{Lemma} \begin{Theorem}\label{lowerbound} For the caching problem described in Section~\ref{sys} with uncoded cache placement phase, the optimal memory-power function, $P^*(M)$, is lower bounded as \small \begin{align} P^*(M)\geq P_{LB}(M)\triangleq\sum\limits_{k=1}^{\min\{N, K\}}\left(\frac{2^{2\tilde{\rho}_k}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}2^{2\tilde{\rho}_j},\label{pm:2} \end{align} \normalsize \small \begin{align}\label{rstar} \tilde{\rho}_k\triangleq \max\left\{\sum\limits_{\ell=0}^{N-k}\binom{N-k}{\ell}R_{\ell+1}-M, \;0\right\}, \forall\, k \in[K]. \end{align} \normalsize \begin{proof} For any demand vector $\mathbf{d}_t\triangleq (d^t_1, ..., d^t_K) \in \mathfrak{D}_d$, we have $H(W_{d^t_1})=R$, and \small \begin{subequations} \begin{align} H(W_{d^t_k}|W_{d^t_{k-1}}, ..., W_{d^t_1})&=H\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\\ \mathcal{S}\ni d^t_k}}\overline{W}_{\mathcal{S}}|\bigcup\limits_{\substack{\mathcal{S}\subset [N]\\ \{d^t_{k-1}, ..., d^t_1\}\cap\mathcal{S}\neq \emptyset}}\overline{W}_{\mathcal{S}}\right)\label{lemma1:a}\\ &=H\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^t_{k-1}, ..., d^t_1\}\\\mathcal{S}\ni d^t_k}}\overline{W}_{\mathcal{S}}\right)=\sum\limits_{\ell=0}^{N-k}\binom{N-k}{\ell}R_\ell, \qquad k \in[2, ..., N_e],\label{lemma1:c} \end{align} \end{subequations} \normalsize where \eqref{lemma1:a} follows from the fact that $W_i=\bigcup_{\substack{\mathcal{S}\subseteq [N]\\ \mathcal{S} \ni i}}\overline{W}_{\mathcal{S}}$, $\forall i\in [N]$, and \eqref{lemma1:c} follows due to the independence of the subfiles. Similarly, we have \small $I(W_{d^l_1}; Z_1)=I\left(\bigcup\nolimits_{\substack{\mathcal{S}\subseteq [N]\\ \mathcal{S} \ni d^1_k }}\overline{W}_{\mathcal{S}}; Z_1\right)$,\normalsize and \small \begin{subequations} \begin{align} I(W_{d^t_k}; Z_1, ..., Z_k|W_{d^t_{k-1}}, ..., W_{d^t_1}) &=I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\\ \mathcal{S}\ni d^t_k}}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\bigg|\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\\ \{d^t_{k-1}, ..., d^t_1\}\cap\mathcal{S}\neq \emptyset}}\overline{W}_{\mathcal{S}}\right)\label{lemma1:d}\\ &\leq I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^t_{k-1}, ..., d^t_1\}\\\mathcal{S}\ni d^t_k}}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\right),\label{lemma1:e} \end{align} \end{subequations} \normalsize for $k\in [2: N_e]$, where \eqref{lemma1:e} follows due to the independence of the subfiles and uncoded cache placement. Thus, for $n$ sufficiently large, we can rewrite \eqref{lemma1} as \small \begin{align}\label{lemma11} &R\leq \frac{1}{n} I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\\ \mathcal{S}\ni d^1_k}}\overline{W}_{\mathcal{S}}; Z_1\right)+I\left(U_{1, \mathbf{d}_t}; Y_{1, \mathbf{d}_t}\right);\notag\\ &\sum\limits_{\ell=0}^{N-k}\binom{N-k}{l}R_{\ell+1}\leq \frac{1}{n} I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^t_{k-1}, ..., d^t_1\}\\ \mathcal{S}\ni d^t_k }}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\right)+I(U_{k, \mathbf{d}_t}; Y_{k, \mathbf{d}_t}|U_{k-1, \mathbf{d}_t}), k\in [2:N_e-1];\notag\\ &\sum\limits_{l=0}^{N-N_e}\binom{N-N_e}{\ell}R_{\ell+1}\leq \frac{1}{n} I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^t_{N_e-1}, ..., d^t_1\}\\\mathcal{S}\ni d^t_{N_e}}}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_{N_e}\right)+I(X_{\mathbf{d}_t}; Y_{N_e, \mathbf{d}_t}|U_{N_e-1, \mathbf{d}_t}). \end{align} \normalsize For degraded Gaussian BC described in Section~\ref{sys}, we have \cite{bergmans1973degradedBC} \small \begin{align} I(U_{k, \mathbf{d}_t}; Y_{k, \mathbf{d}_t}|U_{k-1, \mathbf{d}_t})\leq \frac{1}{2}\log_{2}\left(1+\frac{h_k^2P_k(\mathbf{d}_t)}{h_k^2\sum\limits_{j=k+1}^{N_e}P_j(\mathbf{d}_t)+1}\right),\notag \end{align} \normalsize for $k=1, ..., N_e$, where we set $U_{0, \mathbf{d}_t}\triangleq 0$ and $U_{N_e, \mathbf{d}_t}\triangleq X_{\mathbf{d}_t}$. Thus, with \eqref{lemma11} and according to Proposition \ref{prop:AWGN}, the required average transmission power to satisfy any demand vector $\mathbf{d}_t \in \mathfrak{D}_d$ is lower bounded by \small \begin{align} P(\mathbf{d}_t) \geq \sum\limits_{k=1}^{N_e}P_k(\mathbf{d}_t)=q(c_1(\mathbf{d}_t), ..., c_{N_e}(\mathbf{d}_t)), \notag \end{align} \normalsize where \small \begin{subequations}\label{lowerP} \begin{align} &q(c_1(\mathbf{d}_t), ..., c_{N_e}(\mathbf{d}_t))\triangleq \sum\limits_{k=1}^{N_e}\left(\frac{2^{2c_k(\mathbf{d}_t)-1}}{h_k^2}\right) \prod\limits_{j=1}^{k-1}2^{2c_j(\mathbf{d}_t)};\label{defi:q}\\ &c_k(\mathbf{d}_t)\triangleq \sum\limits_{\ell=0}^{N-k}\binom{N-k}{\ell}R_{\ell+1}-I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^t_{k-1}, ..., d^t_1\}\\ \mathcal{S}\ni d^t_k }}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\right), k\in[N_e].\label{defi:ck} \end{align} \end{subequations} \normalsize It is proved in \cite[Appendix B]{amiri2017gaussian} that $q(\cdot)$ is a convex function of $\left(C_1(\mathbf{d}_t), ..., C_{N_e}(\mathbf{d}_t)\right)$. Thus, the optimal achievable power is lower bounded by \small \begin{subequations} \begin{align} P^*(M)\geq &\frac{1}{|\mathfrak{D}_d|} \sum\limits_{t=1}^{|\mathfrak{D}_d|} P(\mathbf{d}_t) \geq\frac{1}{|\mathfrak{D}_d|}\sum\limits_{t=1}^{|\mathfrak{D}_d|} q(c_1(\mathbf{d}_t), ..., c_{N_e}(\mathbf{d}_t)) \\\geq &q\left(\frac{1}{|\mathfrak{D}_d|}\sum\limits_{t=1}^{|\mathfrak{D}_d|}c_1(\mathbf{d}_t), ..., \frac{1}{|\mathfrak{D}_d|}\sum\limits_{t=1}^{|\mathfrak{D}_d|}c_{N_e}(\mathbf{d}_t)\right) \geq\sum\limits_{k=1}^{N_e}\left(\frac{2^{2\tilde{\rho}_k}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}2^{2\tilde{\rho}_j},\label{pm:1} \end{align} \end{subequations} \normalsize where we recall that \small\[\tilde{\rho}_k\triangleq \max\left\{\sum\limits_{\ell=0}^{N-k}\binom{N-k}{\ell}R_{\ell+1}-M, 0\right\}. \]\normalsize\eqref{pm:1} follows from the convexity of $q(\cdot)$, and \eqref{pm:1} holds since $\frac{1}{|\mathfrak{D}_d|}\sum\limits_{t=1}^{|\mathfrak{D}_d|}c_k(\mathbf{d}_t)\geq \tilde{\rho}_k$, $\forall k \in [N_e]$, which we will prove in the following. For any $k \in [N_e]$, we divide all the demands $\mathbf{d}_t \in \mathfrak{D}_d$ into $|\mathfrak{D}_d|/k$ disjoint groups, where each group has $k$ demand vectors such that $d^{t_1}_k \in \{d^{t_2}_1, ..., d^{t_2}_{k-1}\}$, and $d^{t_2}_k \in \{d^{t_1}_1, ..., d^{t_1}_{k-1}\}$, if demand vectors $\mathbf{d}_{t_1}$ and $\mathbf{d}_{t_2}$ are in the same group, and $t_1\neq t_2$. In Example \ref{exmp1}, there are $18$ demand vectors in $\mathfrak{D}_d$ listed in \eqref{distinctdemand}. For $k=3$, one partition that meets the above condition is \small \begin{align} &G_1=\{\mathbf{d}_1, \mathbf{d}_4, \mathbf{d}_7\}, G_2=\{\mathbf{d}_2, \mathbf{d}_5, \mathbf{d}_8\}, G_3=\{\mathbf{d}_3, \mathbf{d}_6, \mathbf{d}_9\}, \nonumber\\ &G_4=\{\mathbf{d}_{10}, \mathbf{d}_{13}, \mathbf{d}_{16}\}, G_5=\{\mathbf{d}_{11}, \mathbf{d}_{14}, \mathbf{d}_{17}\}, G_6=\{\mathbf{d}_{12}, \mathbf{d}_{15}, \mathbf{d}_{18}\},\notag \end{align} \normalsize where $G_j$, $j\in [6]$, denotes one group that satisfies $d^{t_1}_3 \in \{d^{t_2}_1, d^{t_2}_{2}\}$, and $d^{t_2}_3 \in \{d^{t_1}_1, d^{t_1}_{2}\}$, $\forall \mathbf{d}_{t_1}, \mathbf{d}_{t_2} \in G_j, t_1\neq t_2$. We denote the index of the $s^\text{th}$ demand vector in the $j^\text{th}$ group by $t_{js}$. Thus, \small \begin{subequations} \begin{align} \frac{1}{|\mathfrak{D}_d|} \sum\limits_{t=1}^{|\mathfrak{D}_d|}I&\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^t_{k-1}, ..., d^t_1\}\\ \mathcal{S}\ni d^t_k }}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\right)= \frac{1}{|\mathfrak{D}_d|} \sum\limits_{j=1}^{|\mathfrak{D}_d|/k}\sum\limits_{s=1}^{k}I\left(\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^{t_{js}}_{k-1}, ..., d^{t_{js}}_1\}\\ \mathcal{S}\ni d^{t_{js}}_k }}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\right)\label{mutual:1}\\ &=\frac{1}{|\mathfrak{D}_d|} \sum\limits_{j=1}^{|\mathfrak{D}_d|/k}I\left(\bigcup\limits_{s\in[k]}\bigcup\limits_{\substack{\mathcal{S}\subseteq [N]\setminus\{d^{t_{js}}_{k-1}, ..., d^{t_{js}}_1\}\\ \mathcal{S}\ni d^{t_{js}}_k }}\overline{W}_{\mathcal{S}}; Z_1, ..., Z_k\right)\label{mutual:2}\\ &\leq \frac{1}{|\mathfrak{D}_d|} \sum\limits_{j=1}^{|\mathfrak{D}_d|/k}\min\left\{H\left(\bigcup\limits_{s\in[k]}\bigcup\limits_{\substack{\mathcal{S}\subset [N]\setminus\{d^{t_{js}}_{k-1}, ..., d^{t_{js}}_1\}\\ d^{t_{js}}_k \in \mathcal{S}}}\overline{W}_{\mathcal{S}}\right), H( Z_1, ..., Z_k) \right\}\label{mutual:3}\\ &=\min\left\{\sum\limits_{\ell=0}^{N-k}\binom{N-k}{\ell}R_{\ell+1}, M \right\},\label{mutual:4} \end{align} \end{subequations} \normalsize where \eqref{mutual:1} is derived by writing the summation with regards to the groups; \eqref{mutual:2} follows the independence of subfiles and the fact that \small \[\bigcap\limits_{s\in[k]}\left(\bigcup\limits_{\substack{\mathcal{S}\subset [N]\setminus\{d^{t_{js}}_{k-1}, ..., d^{t_{js}}_1\}\\ d^{t_{js}}_k \in \mathcal{S}}}\overline{W}_{\mathcal{S}}\right)=\emptyset,\] \normalsize since $d^{t_{js_1}}_k \in \{d^{t_{js_2}}_1, ..., d^{t_{js_2}}_{k-1}\}$, while $d^{t_{js_2}}_k \in \{d^{t_{js_1}}_1, ..., d^{t_{js_1}}_{k-1}\}$, if $s_1 \neq s_2$, $\forall s_1, s_2 \in [k], j\in [|\mathfrak{D}_d|/k]$; \eqref{mutual:3} follows since mutual information is no larger than the entropy of each component. \eqref{mutual:4} follows from the size of the subfiles and the cache capacity. Substituting \eqref{defi:ck} and \eqref{mutual:4} into \eqref{pm:1}, we have proven \eqref{pm:2}. Thus, the proof of Theorem~\ref{lowerbound} is completed. \end{proof} \end{Theorem} \section{Cache-Aided Superposition Coding} \label{sec:scheme sep} We propose a centralized caching and delivery scheme, which employs superposition coding to deliver coded messages over the Gaussian BC \cite{bergmans1973degradedBC,Bergmans1974}, where the coded messages are generated taking into account the correlation among the requested files as well as the channel gains. As in \cite{qiandeniz2018icc,hassanzadeh2017rate,hassanzadeh2017broadcast}, the scheme operates by treating the sublibraries independently during the placement and delivery phases to determine the cache content and messages targeted at each user, which are then jointly delivered over the BC. For clarity, the scheme is first explained on a simple example. \textbf{Example 2.} Consider $K=3$ users with channel gains $h_1^2\leq h_2^2\leq h_3^2$, and a database of $N=3$ files as in Fig.~\ref{fig:correlationmodel} with sublibraries: \begin{itemize} \item $L_1 = \{\overline{W}_{\{1\}}, \overline{W}_{\{2\}},\overline{W}_{\{3\}} \}$, each with rate $R_1$. \item $L_2 = \{\overline{W}_{\{1,2\}}, \overline{W}_{\{2,3\}},\overline{W}_{\{1,3\}} \} $, each with rate $R_2$. \item $L_3 = \{\overline{W}_{\{1,2,3\}}\}$, with rate $R_3$. \end{itemize} Assume that each user has a normalized cache capacity of $M = R_1+R_2+\frac{1}{3}R_3$. $\circ$ \textbf{Placement Phase:} Placement is carried out independently across sublibraries. Assume that each user divides its cache into three portions with normalized capacities $R_1$, $R_2$, and $\frac{1}{3}R_3$, allocated for files from sublibraries $L_1$, $L_2$ and $L_3$, respectively. We remark that this cache capacity allocation is not optimal, and the proposed scheme further optimizes the allocation as described in Sec.~\ref{sec:scheme general}. We use the prefetching policy proposed in~\cite{yu2017exact}, which divides the subfiles in sublibrary $L_\ell$ into three non-overlapping parts, each of size $\frac{1}{3}nR_\ell$ bits. Then, user $k$ caches \begin{align} Z_k=\Big\{\overline{W}_{\{1\}, \{k\}},& \overline{W}_{\{2\}, \{k\}}, \overline{W}_{\{3\}, \{k\}}, \overline{W}_{\{1, 2\}, \{k\}}, \overline{W}_{\{2, 3\}, \{k\}}, \overline{W}_{\{1, 3\}, \{k\}}, \overline{W}_{\{1, 2, 3\}, \{k\}}\Big\}, \notag \end{align} where $\overline{W}_{\mathcal{S}, \{k\}}$ denotes the $k^\text{th}$ part of subfile $\overline{W}_{\mathcal{S}}$ cached at user $k\in [3]$. $\circ$ \textbf{Delivery Phase:} Once the demand vector is revealed, the server computes the messages intended for each user, independently for each sublibrary, and delivers them over the BC via superposition coding with Gaussian codewords. The total transmit power is given in Proposition \ref{prop:AWGN}, which depends on the rate of messages intended for each user. Consider the demand vector $\mathbf{d}=(1, 2, 3)$. User 1, the weakest user, needs subfiles $\{\overline{W}_{\{1\}},\overline{W}_{\{1,2\}},\overline{W}_{\{1,3\}},\overline{W}_{\{1,2,3\}}\}$ to reconstruct $W_1$. User 2 requires the four subfiles corresponding to file $W_2$, but having a better channel than user 1. It can also decode the messages targeted at user 1. Similarly, user 3 can decode the messages indented for both of the weaker users. User messages from each sublibrary are determined as follows. \begin{itemize} \item Sublibrary $L_1$: Based on the demand vector, all subfiles in $L_1$ are required by the users. User 1 needs to receive $\overline{W}_{\{1\}, \{2\}}$ and $\overline{W}_{\{1\}, \{3\}}$, whose targeted message, denoted by $V_{1,\mathbf{d}}(L_1)$, is generated as follows: \begin{align} V_{1,\mathbf{d}}(L_1)= \left\{ \overline{W}_{\{1\}, \{2\}}\oplus\overline{W}_{\{2\}, \{1\}}, \overline{W}_{\{1\}, \{3\}}\oplus\overline{W}_{\{3\}, \{1\}} \right\}. \label{eq:V1 L1} \end{align} Since user 2 is able to decode its required part $\overline{W}_{\{2\}, \{1\}}$ from message $V_{1,\mathbf{d}}(L_1)$, it only needs $\overline{W}_{\{2\}, \{3\}}$, which is recovered through the message \begin{align} V_{2,\mathbf{d}}(L_1)=\left\{\overline{W}_{\{2\}, \{3\}}\oplus\overline{W}_{\{3\}, \{2\}} \right\}.\label{eq:V2 L1} \end{align} User 3 can decode its missing parts from $V_{1,\mathbf{d}}(L_1)$ and $V_{2,\mathbf{d}}(L_1)$, and therefore, $V_{3,\mathbf{d}}(L_1)=\emptyset$. We note that, while the generation of the coded messages for sublibrary $L_1$ follows similarly to generic coded caching models with a shared common link, we assign them to users starting from the one with the worst channel gain, as the stronger users automatically decode messages destined for weaker users. \item Sublibrary $L_2$: Each user requires two subfiles from $L_2$, which can be considered as two separate demands. We can group these demands into two, with only one demand per user in each group, and deliver the demands within each group separately. One possible grouping of $L_2$ could be $\mathfrak{S}_1 = (\{1,2\}, \{1,2\}, \{1,3\})$ and $\mathfrak{S}_2=(\{1,3\}, \{2,3\}, \{2,3\})$, where $\mathfrak{S}_1$ corresponds to users 1, 2 and 3 requesting subfiles $\overline{W}_{\{1,2\}}$, $\overline{W}_{\{1,2\}}$ and $\overline{W}_{\{1,3\}}$, respectively. Then $V_{k,\mathbf{d}}(L_2)=\{v_{k}^1 , v_{k}^2$\}, where $v_{k}^i$ is user $k$'s message corresponding to group $\mathfrak{S}_i$, $i=1,2$. Then, for $\mathfrak{S}_1$ we have \begin{align} &v^1_1= \{\overline{W}_{\{1,2\}, \{2\}}\oplus\overline{W}_{\{1,2\}, \{1\}}, \overline{W}_{\{1,2\}, \{3\}}\oplus\overline{W}_{\{1,3\}, \{1\}}\},\label{eq:V1 L2 a}\\ &v^1_{2}=\left\{\overline{W}_{\{1,3\}, \{2\}}\oplus\overline{W}_{\{1,2\}, \{3\}} \right\},\label{eq:V2 L2 a}\\ & v^1_{3}=\emptyset,\label{eq:V2 L2 c} \end{align} and for $\mathfrak{S}_2$ \begin{align} &v^2_1= \{\overline{W}_{\{1,3\}, \{2\}}\oplus\overline{W}_{\{2,3\}, \{1\}}, \overline{W}_{\{1,3\}, \{3\}}\oplus\overline{W}_{\{2,3\}, \{1\}}\},\label{eq:V1 L2 b}\\ &v^2_{2}=\left\{\overline{W}_{\{2,3\}, \{2\}}\oplus\overline{W}_{\{2,3\}, \{3\}} \right\},\label{eq:V2 L2 b}\\ & v^2_{3}=\emptyset.\label{2eq: V2 L2 b} \end{align} \item Sublibrary $L_3$: All users require $\overline{W}_{\{1,2,3\}}$, and therefore \begin{align} &V_{1,\mathbf{d}}(L_3)= \{\overline{W}_{\{1,2,3\}, \{2\}}\oplus\overline{W}_{\{1,2,3\}, \{1\}}, \overline{W}_{\{1,2,3\}, \{3\}}\oplus\overline{W}_{\{1,2,3\}, \{1\}} \},\label{eq:V1 L3}\\ &V_{2,\mathbf{d}}(L_2)= V_{3,\mathbf{d}}(L_2)=\emptyset. \label{eq:V2 L3} \end{align} \end{itemize} The messages in \eqref{eq:V1 L1}, \eqref{eq:V1 L2 a}, \eqref{eq:V1 L2 b} and \eqref{eq:V1 L3} constitute all the messages targeted for user 1, with total rate $\rho_1=2(R_1+2R_2+R_3)$. Messages \eqref{eq:V2 L1}, \eqref{eq:V2 L2 a} and \eqref{eq:V2 L2 b} are targeted for user 2 with total rate $\rho_2=R_1+2R_2$, and finally, user 3 can successfully recover its requested file from the messages intended for users 1 and 2, i.e., $\rho_3=0$. Based on Proposition~\ref{prop:AWGN}, the target rates can be delivered to the users with superposition coding of Gaussian codewords satisfying \eqref{eq:codebook}, with a minimum power value given in \eqref{eq:power}. \subsection{Proposed Scheme}\label{sec:scheme general} This section presents the proposed centralized caching and delivery scheme, which generalizes Example 2 to an arbitrary number of users, and achieves the transmit power value claimed in Theorem~\ref{thm:ach power}. Similarly to the schemes in \cite{qiandeniz2018icc,hassanzadeh2017rate,hassanzadeh2017broadcast}, the proposed scheme treats the sublibraries independently: 1) the cache capacity is divided among $N$ sublibraries, 2) for each demand realization, the server identifies the messages that need to be delivered to each user, independently across sublibraries, using a modified version of the scheme proposed in \cite{qiandeniz2018icc}, and 3) the server employs superposition coding to reliably communicate coded messages over the Gaussian BC. \subsubsection{\bf Placement Phase}\label{placementphase} Cache contents are identified separately for different sublibraries, each with a different level of commonness. Let $\boldsymbol \pi = (\pi_1,\dots,\pi_N)$ denote the cache allocation vector, where $\pi_\ell\in[0,1]$ denotes the fraction of the normalized cache capacity $M$ allocated to sublibrary $L_\ell$, with $\sum_{\ell=1}^N \pi_\ell=1$. We will later optimize $\boldsymbol \pi$ to minimize the required total power. For a given $\boldsymbol \pi$, placement for sublibrary $L_\ell$ is carried out using the prefetching scheme proposed in~\cite{yu2017exact} as follows. Let \begin{equation}\label{tl} t_\ell\triangleq \frac{K\pi_\ell M}{\binom{N}{\ell}R_\ell}, ~ t_\ell\in[0,K], \end{equation} which is not necessarily an integer. We address this by memory-sharing among neighboring integer points, $t_\ell^A \triangleq \lfloor t_\ell \rfloor$ and $t_\ell^B \triangleq\lfloor t_\ell \rfloor+1$, and divide each subfile $\overline{W}_{\mathcal{S}}\in L_\ell$ into two non-overlapping parts. More specifically, $\overline{W}_{\mathcal{S}}=(\overline{W}^A_{\mathcal{S}}, \overline{W}^B_{\mathcal{S}})$, where $\overline{W}^A_{\mathcal{S}}$ is at rate $(t_\ell^B-t_\ell)R_\ell$, while $\overline{W}^B_{\mathcal{S}}$ is at rate $(t_\ell- t_\ell^A)R_\ell$. The prefetching policy of \cite{yu2017exact} is implemented separately for $\{\overline{W}^A_{\mathcal{S}}: \mathcal{S}\in L_\ell\}$ and $\{\overline{W}^B_{\mathcal{S}}: \mathcal{S}\in L_\ell\}$. Each $\overline{W}^A_{\mathcal{S}}$ is split into $\binom{K}{t_l^A}$ non-overlapping equal-length parts, each of size $n( t_\ell^B-t_\ell)R_\ell/\binom{K}{ t_\ell^A} $ bits. These parts are assigned to sets $\mathcal A \subseteq [K]$ of size $|\mathcal A| = t_\ell^A$. We denote the part assigned to set $\mathcal A$ by $\overline{W}^A_{\mathcal{S}, \mathcal{A}}$; therefore, \begin{equation} \overline{W}^A_{\mathcal{S}}= \{ \overline{W}^A_{\mathcal{S}, \mathcal{A}} :\mathcal{A}\subseteq [K] ,\, |\mathcal{A}|= t_\ell^A \}. \notag \end{equation} Similarly, each $\overline{W}^B_{\mathcal{S}}$ is split into $\binom{K}{t_l^B}$ non-overlapping equal-length parts, which are labeled as \begin{equation} \overline{W}^B_{\mathcal{S}}= \{ \overline{W}^B_{\mathcal{S}, \mathcal{B}} :\mathcal{B}\subseteq [K] ,\, |\mathcal{B}|= t_\ell^B \}. \notag \end{equation} User $k$ caches parts $\overline{W}^A_{\mathcal{S}, \mathcal{A}}$ if $k \in \mathcal{A}$, and parts $\overline{W}^B_{\mathcal{S}, \mathcal{B}}$ if $k \in \mathcal{B}$. With this placement strategy, for each subfile in sublibrary $L_\ell$, $\binom{K-1}{ t_\ell^A-1}$ distinct parts from $\overline{W}^A_{\mathcal{S}}$, and $\binom{K-1}{t_\ell^B-1}$ distinct parts from $\overline{W}^B_{\mathcal{S}}$, are placed in each user's cache, amounting for a total of $nt_\ell R_\ell/K$ bits, which satisfies the capacity constraint of $n\pi_\ell M$ bits. \subsubsection{\bf Delivery Phase}\label{deliveryphase} Delivering a file from a library of correlated files can be considered as a multiple-demand problem \cite{qiandeniz2018icc,hassanzadeh2017rate,hassanzadeh2017broadcast}. For demand vector $\bf d$, user $k$ needs $ \binom{N-1}{\ell-1}$ subfiles from sublibrary $L_\ell$. Since the sublibraries are treated independently, message $V_{k,\mathbf{d}}$, targeted at user $k$, constitutes the messages computed from all the sublibraries, i.e., \begin{equation} V_{k,\mathbf{d}} = \bigcup\limits_{\ell=1}^N V_{k,\mathbf{d}}(L_\ell),\label{eq:messages} \end{equation} where $V_{k,\mathbf{d}}(L_\ell)$ denotes the set of messages from sublibrary $L_\ell$ targeted at user $k$. They are determined using Algorithm~1, which is based on \cite[Algorithms 1, 2]{qiandeniz2018icc}. The main idea is to treat subfiles $\{\overline{W}_{\mathcal S}: d_k \in \mathcal S\}$ that are not cached at user $k$, as different demands. The algorithm operates by partitioning all the requested subfiles from sublibrary $L_\ell$ into groups, such that each user requires at most one subfile in each group; resulting in a single-demand problem. \begin{algorithm}[H]\label{message:1} \caption{Generate messages $\{V_{1,\mathbf{d}}(L_\ell),\dots, V_{K,\mathbf{d}}(L_\ell)\}$} \label{groupingscheme} \begin{algorithmic}[1] \Statex \small \State{$V_{k,\mathbf{d}}(L_\ell) \leftarrow \emptyset$, $\forall k \in \{1,\dots,K\}$} \For{$r =1 ,\dots,\ell$} \State{\small ${\mathcal W}_r= \{\overline{W}_{\mathcal{S}}: |S| = \ell,\; |\mathcal{S}\cap\mathcal{D}|=r \}$} \State{$\mathfrak{S}_1,\dots, \mathfrak{S}_g$ $\leftarrow$ Group (${\mathcal W}_r$, $\mathcal{D}$, $\ell$, $r$)} \For{$i \in \{1 ,\dots,g\}$} \State{$V^A_{1},\dots, V^A_K$ $\leftarrow$ Single-Demand ($A$, ${\mathfrak{S}_i}$, $t_\ell^A$)} \State{$V^B_1,\dots, V^B_K$ $\leftarrow$ Single-Demand ($B$, ${\mathfrak{S}_i}$, $t_\ell^B$)} \State{$V_{k,\mathbf{d}}(L_\ell)\leftarrow V_{k,\mathbf{d}}(L_\ell) \cup \{ V^A_k,V^B_k\}$, $\forall k \in \{1 ,\dots,K\}$} \EndFor \EndFor \end{algorithmic} \end{algorithm} \begin{algorithm} \begin{algorithmic}[1] \Function {Group }{ ${\mathcal W}$, $\mathcal{D}$, $\ell$, $r$}\\ \textbf{Output:} Group demands $\mathfrak{S}_1,\dots, \mathfrak{S}_g$ \small \State{$\mathcal{F} \leftarrow \mathcal{D}$, $\overline{\mathcal{F}}\leftarrow \emptyset$, $\overline{\mathcal{S}}\leftarrow \emptyset$, $g=0$} \While{$\mathcal{W}\neq \emptyset$} \While{$\mathcal{F}\neq \emptyset$} \If{$|\mathcal{F}|\geq r$} \If{$\overline{\mathcal{F}}=\emptyset$} \State{ Randomly pick \footnotesize{$\overline{W}_{\mathcal{S}}\in \mathcal{W}$} such that \footnotesize{$\mathcal{S}\cap{\mathcal{D}} \subseteq\mathcal{F}$}} \State{ $\mathcal{W}\leftarrow \mathcal{W}/\overline{W}_{\mathcal{S}},\quad \mathcal{F} \leftarrow \mathcal{F}\setminus \mathcal{S}$} \For{$d_k \in \mathcal{S}\cap{\mathcal{D}}$} \State{$\mathcal{S}_{k} \leftarrow \mathcal{S}$} \EndFor \Else {\For{$d_k \in \overline{\mathcal{F}}$} \State{$\mathcal{S}_{k} \leftarrow \overline{\mathcal{S}}$} \EndFor} \State{\small $\mathcal{F} \leftarrow \mathcal{F}\setminus \overline{\mathcal{F}},\quad \overline{\mathcal{S}} \leftarrow \emptyset,\quad \overline{\mathcal{F}} \leftarrow \emptyset, $} \EndIf \Else\State{\small Randomly pick $\overline{W}_{\mathcal{S}}\in \mathcal{W}$ such that $\mathcal{F}\subseteq \mathcal{S}$} \For{$d_k \in \mathcal{F}$} \State{$\mathcal{S}_{k} \leftarrow \mathcal{S}$} \EndFor \small \State{$\mathcal{F} \leftarrow \emptyset,\quad \overline{\mathcal{S}} \leftarrow \mathcal{S},\quad \overline{\mathcal{F}} \leftarrow \mathcal{S}\setminus {\mathcal{F}}$} \normalsize \EndIf \EndWhile \State{$g=g+1$} \State{$\mathfrak{S}_g= (\mathcal{S}_{1}, \dots, \mathcal{S}_{K})$} \EndWhile \EndFunction \end{algorithmic} \end{algorithm} \begin{algorithm} \begin{algorithmic}[1] \Function{Single-Demand }{$C$, ${\mathfrak{S}}$, $t$}\\ \textbf{Input:} $\mathfrak{S}=(\mathcal{S}_{1}, \dots, \mathcal{S}_{K})$, $C\equiv \{\overline{W}^C_{\mathcal S,\mathcal C}\}$\\ \textbf{Output:} Coded messages $V_1,\dots,V_K$ \small \State{$\mathcal{K} \leftarrow \{k: \mathcal{S}_{k}\notin \{\mathcal{S}_{1}, ..., \mathcal{S}_{k-1}\}\}$} \For{$k\in \{1,\dots,K\}$} \For{{\footnotesize$\mathcal{U}\subseteq [k+1:K]: |\mathcal{U}|= t, \sum\limits_{j \in \mathcal{K}}\mathbbm{1}\{j \in \mathcal{U}\cup\{k\}\} \geq 1$}} \State{ $ V_k\leftarrow V_k \bigcup\left(\bigoplus\limits_{j\in \mathcal{U}\cup\{k\}} \overline{W}^C_{\mathcal{S}_{j}, \mathcal{U}\cup\{k\}\setminus \{j\}}\right)$} \EndFor \EndFor \EndFunction \end{algorithmic} \end{algorithm} For sublibrary $L_\ell$ messages, $V_{1,\mathbf{d}}(L_\ell),\dots, V_{K,\mathbf{d}}(L_\ell)$, are generated as follows: \begin{itemize} \item[$i)$] Group the requested subfiles: Let $\mathcal{D}\triangleq\{d_1, ..., d_K\}$ denote the set of distinct demands in $\bf d$. The subfiles that need to be delivered to at least $\ell$ users, are given by: \begin{equation}\label{eq:set for empty} \{\overline{W}_{\mathcal{S}}: \mathcal{S} \subseteq\mathcal{D},\, |S| = \ell\}. \end{equation} Since each user can request multiple subfiles from \eqref{eq:set for empty}, they are grouped into multiple (possibly overlapping) sets with minimum cardinality, such that each group represents the demand set of a single-demand network with $K$ users, i.e., each user has a single demand within this group. The grouping process tries to minimize the number of distinct demands within each single-demand network. For sublibrary $L_\ell$, where each subfile is required by $\ell$ distinct users, there are at most $\lceil |\mathcal{D}| /\ell\rceil+1$ subfiles in each group. Note that, the subfiles in \eqref{eq:set for empty} are not the only contents that need to be delivered from sublibrary $L_\ell$. Based on the demand vector, any subfile $\overline{W}_{\mathcal{S}}$ whose index $\mathcal{S}$ includes at least one of the indices in $\mathcal D$, i.e., $\mathcal{S}\cap\mathcal{D}\neq \emptyset$, is required for the lossless reconstruction of the corresponding requested file in $\mathcal{D}$. All such subfiles need to be identified, and grouped in a similar fashion. Subfiles in \eqref{eq:set for empty} correspond to $|\mathcal{S}\cap\mathcal{D}|=\ell$. For $r=1,\dots,\ell$, we define the requested subfiles ${\mathcal W}_r$, as \begin{equation}\label{eq:groups} {\mathcal W}_r \triangleq \{\overline{W}_{\mathcal{S}}: |\mathcal{S}| = \ell,\; |\mathcal{S}\cap\mathcal{D}|=r \}.\notag \end{equation} Then, each set ${\mathcal W}_r$ is grouped using the function GROUP in Algorithm~1, which assigns a demand vector $\mathfrak{S}_i=({\mathcal S}_1,\dots,{\mathcal S}_K)$ to each group, resulting in a single-demand network with $K$ users, where user $k$ requests subfile $\overline{W}_{\mathcal{S}_k}$. \item[$ii)$] Deliver the demands corresponding to each group: The groups formed above are treated independently in the delivery phase. More specifically, for a group with corresponding demand vector $\mathfrak{S}$, function SINGLE-DEMAND in Algorithm~1 identifies messages $V_1,\dots,V_K$ that need to be transmitted so that all the users recover their requested subfiles in $\mathfrak{S}$. These messages are computed using the scheme in \cite{yu2017exact}, and delivered over the degraded BC using the coding scheme in \cite{MohammadDenizerasureTCom}. The channel is taken into account by selecting the {\em weakest} users with distinct demands as {\em leaders}, i.e., the demand of a leader is not requested by any of the weaker users, $ \{k: \mathcal{S}_{k}\notin \{\mathcal{S}_{1}, ..., \mathcal{S}_{k-1}\}\}$, and then greedily broadcasting XORed messages that benefit at least one leader through superposition coding. Note that choosing the weakest user, among users requiring the same subfile $\overline{W}_{\mathcal S}$, as the leader, allows all the stronger users to decode the subfile through successive cancellation decoding. As mentioned previously, the proposed scheme uses memory-sharing to cache and deliver the subfiles in $L_\ell$, for the two parts $\overline{W}_{\mathcal{S}}^A$ and $\overline{W}_{\mathcal{S}}^B$; and therefore, function SINGLE-DEMAND is executed separately for both parts. \end{itemize} Message $V_{k,\mathbf{d}}(L_\ell)$ targeted at user $k$ is the union of all the messages for sublibrary $L_\ell$ computed for each group identified from the subfile sets $\{\mathcal W_1,\dots, \mathcal W_\ell\}$, from which the overall message for user $k$, $V_{k,\mathbf{d}}$, is obtained by \eqref{eq:messages}. For a given demand vector $\bf d$, messages $V_{1,\mathbf d},\dots,V_{K,\mathbf d}$ can be reliably transmitted to users $1,\dots,K$, using a $K$-level Gaussian superposition codebook \cite{Bergmans1974,bergmans1973degradedBC}. The $k^\text{th}$-level codebook consists of $2^{n\rho_{k}}$ codewords, where $\rho_k$ is the total rate of the messages in $V_{k,\mathbf{d}}$. The total required transmit power is given by \eqref{eq:codebook} in Proposition \ref{prop:AWGN}. \subsection{Achievable transmit power} The worst-case transmit power of the scheme described above is presented next. \begin{Theorem}\label{thm:ach power} For the caching problem described in Section~\ref{sys}, the optimal memory-power function, $P^*(M)$, is upper bounded as \small \begin{align} P^*(M)\leq &\min\limits_{ {\boldsymbol \pi} = (\pi_1,\dots,\pi_N)} P_{UB}(M, {\boldsymbol\pi}),\notag\\ &\qquad \mathrm{s.t.~}\quad \sum\limits_{i=1}^N \pi_i\leq 1,\notag\\%\label{constrain}\\ &\qquad\qquad\quad 0\leq \pi_i \leq 1, ~~ i = 1,\dots,N, \notag \end{align} \normalsize where \small \begin{subequations} \begin{align} & P_{UB}(M, {\boldsymbol\pi})\triangleq\sum\limits_{k=1}^{ K}\left(\frac{2^{2\hat{\rho}_k}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}{2^{2\hat{\rho}_j}},\notag \\ &\hat{\rho}_k\triangleq \sum\limits_{\ell=1}^N \sum\limits_{r=\max\{\ell-N+K, 1\}}^{\min\{\ell, K\} }\binom{N-K}{\ell-r}\binom{\min\{N, K\}-1}{r-1}\gamma_{k, \ell, r},\notag\\ & {\gamma}_{k,\ell, r}\triangleq \begin{cases} \Big( \frac{\binom{K-k}{\lfloor t_\ell\rfloor}}{\binom{K}{\lfloor t_\ell \rfloor}}(\lfloor t_\ell \rfloor+1-t) +\frac{\binom{K-k}{\lfloor t_\ell\rfloor+1}}{\binom{K}{\lfloor t_\ell\rfloor+1}}(t-\lfloor t_\ell \rfloor)\Big) R_\ell,\, \mathrm{if}\; k\in[ \lceil\frac{\min\{N, K\}}{r}\rceil +1 ], \\ \qquad\qquad0\qquad\qquad\qquad\quad\qquad\qquad\qquad\quad \mathrm{otherwise} \end{cases}\notag\\ & t_{\ell} \triangleq \frac{K \pi_\ell M}{\binom{N}{\ell}R_\ell}.\notag \end{align} \end{subequations} \normalsize \begin{proof} This transmit power is achieved by the coding scheme outlined in Algorithm~1. A detailed proof is given in Appendix B. \end{proof} \end{Theorem} \section{Coded Placement and Joint Encoding}\label{sec:scheme joint} We propose an alternative joint cache-channel coding scheme, with coded placement which is more effective for small cache sizes. The scheme operates by constructing a multi-level superposition code, based on the demand realization, and piggyback part of the messages targeted at each user on the messages intended for weaker users. The piggyback coding is also employed in \cite{shirin2017broadcastit}, where all the cache capacity allowance is assigned to the weakest user, and in the delivery phase, part of the content required by each user is piggy-backed onto the message sent to the weakest user. We extend this scheme in two ways: the coded placement is implemented instead of uncoded placement, and the piggyback coding is applied to each layer of superposition code instead of just the first layer. Before presenting the general scheme description, we first provide a brief overview of cache-aided superposition coding, and then use an example to illustrate how part of the messages required by a stronger user can be piggy-backed onto the messages targeted at weaker users. \subsection{Preliminaries}\label{sec:superposition} We extend the piggyback coding in \cite{shirin2017broadcastit} to the case when each user has cached contents. In a cache-aided $K$-user degraded Gaussian BC with $h_1^2\leq h_2^2\leq\dots\leq h_K^2$, where message $V_k^r$, with rate $\rho^r_k$, is locally available at user $k\in[K]$, message $V_k^c$, with rate $\rho_k^c$, can be reliably transmitted to user $k$, and message $V_k = (V_k^r, V_k^c) $, with rate $\rho_k =\rho_k^r + \rho_k^c $, can be decoded by users $k+1,\dots,K$, using $K$-level superposition coding as follows: \begin{itemize} \item \textit{Codebook construction}: The $k^\text{th}$ level codebook, denoted by $\mathcal C_k$, consists of $\lfloor 2^{n \rho_k^r}\rfloor \times \lfloor 2^{n \rho_k^c}\rfloor$ codewords of block length $n$, denoted by $x_k^n(v_k^r, v_k^c)$, $v_k^r \in \lfloor 2^{n \rho_k^r}\rfloor$, $v_k^c \in \lfloor 2^{n \rho_k^c}\rfloor$, which are arranged into $\lfloor 2^{n \rho_k^r}\rfloor$ rows and $\lfloor 2^{n \rho_k^c}\rfloor$ columns. The codewords in $\mathcal C_k$ are generated independently and identically distributed (i.i.d.) following $x_{k,i}\sim \mathcal{N}(0,P_k)$, $i\in [n]$. \item \textit{Encoding at server}: For messages $V_1,\dots,V_K$ targeted at the users, the server transmits the superposition of the $K$ codewords $\sum\limits_{k=1}^K x_k^n(V_k^r, V_k^c)$ over the Gaussian BC. \item \textit{Decoding at users}: User $k\in[K]$ receives the channel output \begin{equation} Y^n_{k}=h_k\sum\limits_{k=1}^K x_k^n(V_k^r, V_k^c)+\sigma^n_{k},\notag \end{equation} and based on Proposition~\ref{prop:AWGN}, it can successfully decode messages $V_1, \dots, V_{k-1}$, by using successive decoding if \small \begin{equation}\label{rccondition} \rho_j^r + \rho_j^c \leq C\left(\frac{h_k^2P_j}{1+h_k^2\sum\limits_{j'=k+1}^{K}P_{j'}}\right), ~~~~\forall j\in [k-1]. \end{equation} \normalsize Since user $k$ has access to $V^k_{r}$, it can extract the subcodebook $\Big\{x_k^n(V^r_{k},v^c_{k}): v^c_{k} \in \lfloor2^{n \rho_k^c} \rfloor \Big\}$ from $\mathcal C_k$, and losslessly decode $V^c_{k}$, if \small \begin{equation} \rho_k^c \leq C\left(\frac{h_k^2P_k}{1+h_k^2\sum\limits_{j=k+1}^{K}P_j}\right).\notag \end{equation} \end{itemize} \normalsize If \eqref{rccondition} holds, users $k,\dots K$ can also decode messages $V_1, ..., V_{k-1}$ as they have better channel conditions. However, they do not have access to side information $V_k^c$, so for them to decode $V_k$ successfully, we need \small \begin{align} \rho_k^r + \rho_k^c &\leq C\left(\frac{h_{k+1}^2P_k}{1+h_{k+1}^2\sum\limits_{j=k+1}^{K}P_{j}}\right).\notag \end{align} \normalsize \textbf{Example 3}. Consider the model in Example 2, with the rates of the subfiles in three commonness levels given by $R_3\leq R_2\leq R_1$, and normalized cache capacity of $M = R_3$. \noindent $\circ$ \textbf{Placement Phase:} First, we divide each of the subfiles in $L_1$ and $L_2$ into two parts: \begin{itemize} \item Sublibrary $L_1$: $\overline{W}_{\{i\}}=(\overline{W}^C_{\{i\}}, \overline{W}^U_{\{i\}})$, $i\in [3]$, where $\overline{W}^C_{\{i\}}$ has rate $R_3$ while $\overline{W}^U_{\{i\}}$ has rate $R_1-R_3$. \item Sublibrary $L_2$: $\overline{W}_{\mathcal{S}}=(\overline{W}^C_{\mathcal{S}}, \overline{W}^U_{\mathcal{S}})$, $\overline{W}_{\mathcal{S}}\in L_2$, where $\overline{W}^C_{\mathcal{S}}$ has rate $R_3$ while $\overline{W}^U_{\mathcal{S}}$ has rate $R_1-R_3$. \end{itemize} Then, users 1, 2, and 3 cache coded contents as follows: \small \begin{align} Z_1 &= \overline{W}_{\{123\}}, \notag\\ Z_2 & = \overline{W}^C_{\{12\}}\oplus \overline{W}^C_{\{13\}}\oplus \overline{W}^C_{\{23\}}, \notag\\ Z_3 & = \overline{W}^C_{\{1\}}\oplus \overline{W}^C_{\{2\}}\oplus \overline{W}^C_{\{3\}},\notag \end{align} \normalsize such that the weaker users prefetch a linear combination of the subfiles shared among more files. \noindent $\circ$ \textbf{Delivery Phase:} \begin{itemize} \item Codebook construction: For the demand vector $\mathbf{d}=(1, 2, 3)$, as explained in Section ~\ref{sec:superposition}, to apply piggyback coding, the server generates a 3-level Gaussian superposition codebook as follows: \begin{itemize} \item[-] $\mathcal C_1$ with $\lfloor 2^{nR_3}\rfloor$ rows and $\lfloor2^{n(R_1+2R_2)}\rfloor$ columns, \item[-] $\mathcal C_2$ with $\lfloor 2^{nR_3}\rfloor$ rows and $\lfloor2^{n(R_1+R_2-R_3)}\rfloor$ columns, \item[-] $\mathcal C_3$ with $\lfloor 2^{nR_3}\rfloor$ rows and $\lfloor2^{n(R_1-R_3)}\rfloor$ columns, \end{itemize} which contain i.i.d. codewords of length $n$ generated from zero-mean Gaussian distributions with variances $P_1$, $P_2$, and $P_3$, respectively. \item Encoding at server: The server transmits \small \begin{align} X^n({\mathbf W},{\mathbf d}) = x_1^n(V_{1,\bf d}^r,V_{1,\bf d}^c) + x_2^n(V_{2,\bf d}^r,V_{2,\bf d}^c) + x_3^n(V_{3,\bf d}^r,V_{3,\bf d}^c), \notag \end{align} \normalsize where \small \begin{align} \hspace{0.5cm} & V_{1,\bf d}^r =Z_1, & &V_{1,\bf d}^c = ( \overline{W}_{\{1\}}, \overline{W}_{\{12\}}, \overline{W}_{\{13\}} ), \hspace{2cm} \notag\\ &V_{2,\bf d}^r =Z_2, & &V_{2,\bf d}^c = ( \overline{W}^U_{\{23\}}, \overline{W}_{\{2\}} ), \notag\\ & V_{3,\bf d}^r = 1, & &V_{3,\bf d}^c = \overline{W}^U_{\{3\}} .\notag \end{align} \normalsize \item Decoding at users: \begin{itemize} \item User 1 has the weakest channel gain and needs to receive all the subfiles it has not prefetched, i.e., $\Big\{\overline{W}_{\{1\}}, \overline{W}_{\{12\}},$ $ \overline{W}_{\{13\}}\Big\}$. Using its cached content $\overline{W}_{\{123\}}$, it can extract the subcodebook $\Big\{x_1^n(\overline{W}_{\{123\}} ,\, v^c_{1}):$ $ v^c_{1} \in [ 2^{n(R_1+2R_2)} ] \Big\}$ from $\mathcal C_1$ and losslessly recovers the required parts if \small \begin{equation} R_1+2R_2 \leq C\left(\frac{h_1^2P_1}{1+h_1^2(P_2+P_3)}\right).\label{eq:piggy first} \end{equation} \normalsize \item User 2 requires $\{\overline{W}_{\{2\}}, \overline{W}_{\{12\}}, \overline{W}_{\{23\}}, \overline{W}_{\{123\}} \}$, and if \small \begin{equation}\label{piggyback2} R_1+2R_2+R_3 \leq C\left(\frac{h_2^2P_1}{1+h_2^2(P_2+P_3)}\right), \end{equation} \normalsize it can first decode $\overline{W}_{\{123\}}$, $\overline{W}_{\{12\}}$ and $\overline{W}_{\{13\}}$ from the codebook $x_1^n$, and can retrieve $\overline{W}^C_{\{23\}}$ from its cached contents. It can then decode the remaining parts required to reconstruct file $W_2$, i.e., parts $\overline{W}_{\{2\}}$ and $\overline{W}^U_{\{23\}}$ from $x_2^n$ using its side information $Z_2$ if \small \begin{equation} R_1+R_2-R_3 \leq C\left(\frac{h_2^2P_2}{1+h_2^2\, P_3}\right). \end{equation} \normalsize \item User 3 can decode messages $\{\overline{W}_{\{1\}},\overline{W}_{\{12\}}, \overline{W}_{\{13\}}, \overline{W}_{\{123\}}\}$ from $x_1^n$ if \eqref{piggyback2} is satisfied, since $h_3\geq h_2$, and decode messages $\{\overline{W}_{\{2\}},\overline{W}^U_{\{23\}}, \overline{W}^C_{\{12\}}\oplus \overline{W}^C_{\{13\}}\oplus \overline{W}^C_{\{23\}}\}$ from $x_2^n$, if \small \begin{equation} R_1+R_2 \leq C\left(\frac{h_2^2P_2}{1+h_2^2\, P_3}\right). \end{equation} \normalsize With $\overline{W}_{\{12\}}, \overline{W}_{\{13\}}$, it can decode $\overline{W}^C_{23}$ using the coded side information in its cache. Then, only subfile $\overline{W}_{\{3\}}$ is left for user 3 to fully recover $W_3$. To this end, it can recover $\overline{W}^C_{\{3\}}$ from its cache as it has already decoded $\overline{W}_1^c$ and $\overline{W}_2^c$. Finally, it can decode $\overline{W}^U_{\{3\}}$ from $x_3^n$ if \small \begin{equation} R_1-R_3 \leq C\left( h_3^2P_3\right). \label{eq:piggy last} \end{equation} \normalsize \end{itemize} \end{itemize} The transmission powers $P_1, P_2, P_3$ are chosen to satisfy Eqs~\eqref{eq:piggy first}-\eqref{eq:piggy last}. As it can been seen from the example, the idea is to jointly encode the cached contents of each user together with the message intended for it. This additional message does not interfere with the weak user as it already has it cached, while the stronger users can recover this information without any additional transmission cost. \subsection{Proposed Scheme}\label{subsec:piggy general} We now present the proposed coded caching and joint encoding scheme for a general setting with $N\geq K$, and a normalized cache capacity $M\leq$ $ \min\{$ $R_{N-K+1},$ $\dots,$ $R_N\}$. We will explain later how the scheme can be applied to arbitrary number of users and files. \subsubsection{\bf Placement Phase} Each subfile $\overline{W}_{\mathcal{S}}$, $\mathcal{S}\subseteq [N]$, is divided into two non-overlapping parts, $\overline{W}_{\mathcal{S}}=(\overline{W}^{C}_{\mathcal{S}}, \overline{W}^{U}_{\mathcal{S}})$, where $\overline{W}^{C}_{\mathcal{S}}$ is at rate $M$, and $\overline{W}^{U}_{\mathcal{S}}$ is at rate $R_{|\mathcal{S}|}-M$. User $k\in[K]$ caches a linear combination of all the parts $\overline{W}^C_{\mathcal{S}}$ in sublibrary $L_{N-k+1}$ as \small \begin{equation}\label{cachedop} Z_k=\bigoplus \limits_{ \mathcal S \subseteq [N] :\, |\mathcal S| = N-k+1}\overline{W}^C_{\mathcal{S}}, \end{equation} \normalsize which satisfies the cache capacity constraint $M$. \subsubsection{\bf Delivery Phase} For any demand vector $\mathbf{d}=(d_1, ..., d_K)\in [N]^K$, let $N_e(\mathbf{d})$ denote the number of distinct requests in demand ${\bf d}$, and let $\mathcal U \triangleq \{k_1, ..., k_{N_e(\mathbf{d})}\}$ denote the set of users with the weakest channels that request distinct files such that $|\mathcal U|=N_e(\mathbf{d})$, where $k_1 < \cdots < k_{N_e(\mathbf{d})}$. \begin{itemize} \item Codebook construction: The server constructs a $N_e(\mathbf{d})$-level Gaussian superposition codebook, such that for $i\in [N_e]$, the $i^\text{th}$-level codebook contains $2^{n \rho_i}$ codewords, where $ \rho_i = \sum\limits_{\ell=1}^{N-i+1}\binom{N-i+1}{\ell-1}R_{\ell}$. If $k_i=i$, the codewords are arranged in an array of $2^{nM}$ rows and $2^{n(\rho_i-M)}$ columns; otherwise, i.e., $k_i\neq i$, they are arranged into $1$ row and $2^{n\rho_i}$ columns. For each element of the array we generate an i.i.d. codeword $x_i^n(v_i^r, v_i^c)$, $v_i^r \in[2^{nM}]$ and $v_i^c \in[2^{n(\rho_i-M)}]$ if $k_i=i$; $v_i^r =1$ and $v_i^c \in[2^{n\rho_i}]$ if $k_i\neq i$, with distribution $\mathcal{N}(0,P_i)$. \item Encoding at server: The server transmits codeword $\sum\limits_{i=1}^{N_e(\bf d)} x_i^n(V_{i,\bf d}^r, V_{i,\bf d}^c)$, where, for $i\in[N_e(\bf d)]$, message \small \begin{align}\label{rowmessage} &V_{i,\mathbf{d}}^r=\begin{cases}Z_{k_i}, &\text{if}\quad k_i=i,\\ \emptyset, &\text{if}\quad k_i\neq i, \end{cases} \end{align} \normalsize is targeted at users $k_i+1,\dots,K$, and message \small \begin{align}\label{columnmessage} &V_{i,\mathbf{d}}^c=\begin{cases} \overline{W}^U_{\widetilde{\mathcal S}}\; \bigcup\; \Big\{ \overline{W}_{\mathcal{S}} \in L_{N-i+1}: \mathcal{S}\neq\widetilde{\mathcal S} \Big\}\;\bigcup\; \Big\{ \overline{W}_{\mathcal{S}} \notin L_{N-i+1} : \mathcal{S}\in \mathcal D_{i} \Big\}~&\text{if}\quad k_i=i,\\ \Big\{ \overline{W}_{\mathcal{S}} : \mathcal{S} \in \mathcal D_{i} \Big\}\;~&\text{if}\quad k_i\neq i, \end{cases} \end{align} \normalsize $\text{for any }\widetilde{\mathcal S}$ such that $\overline{W}_{\widetilde{\mathcal S}} \in L_{N-i+1}$, is targeted at users $k_i,\dots,K$, where \small \begin{align} &\mathcal D_i \triangleq \Big\{\mathcal S: \mathcal S \subseteq [N]\setminus\{d_{k_1},\dots,d_{k_{i-1}}\} ,\, d_i \in \mathcal{S} ,\, |\mathcal S| \leq N-i+1\Big\}\notag \end{align} \normalsize is the set of subfiles required to reconstruct file $W_{d_{k_i}}$ requested by user $k_i$, but not common to any of the files requested by the weaker users, i.e., $W_{d_1},\dots, W_{d_{k_{i-1}}}$. Codeword $x_i^n(V_{i,\bf d}^r, V_{i,\bf d}^c)$ is generated with average power $P_i$ such that \small \begin{align} |V_{i,\mathbf{d}}^c|+|V_{i,\mathbf{d}}^r| &\leq C\left(\frac{h_{k_i+1}^2P_i}{1+h_{k_i+1}^2\sum\limits_{j=i+1}^{N_e(\bf d)}P_{j}}\right),\label{eq:cond all}\\ |V_{i,\mathbf{d}}^c| &\leq C\left(\frac{h_{k_i}^2P_i}{1+h_{k_i}^2\sum\limits_{j=i+1}^{N_e(\bf d)}P_j}\right), \label{eq:cond row} \end{align} \normalsize where $|V_{i,\mathbf{d}}^c|$ and $|V_{i,\mathbf{d}}^r|$ denote the rates of $V_{i,\mathbf{d}}^c$ and $V_{i,\mathbf{d}}^r$, respectively. \item Decoding at users: \begin{itemize} \item For $i\in[N_e(\mathbf{d})]$, user $k_i$ decodes all its desired messages in two steps. {\em Step 1}: In the first step, user $k_i$ recovers all the messages $\{ V_{i',\bf d}^r,\, V_{i',\bf d}^c : i'\in [i-1]\}$, which correspond to all the subfiles required to reconstruct files $W_{d_{k_1}},\dots,W_{d_{k_{i-1}}}$, by decoding the first $i-1$ level codewords. This can be done with arbitrarily low error probability since condition \eqref{eq:cond all} is satisfied. {\em Step 2}: We note that $V_{i,\bf d}^r$ is either in user $k_i$'s local cache or is an empty message. Thus, user $k_i$ always has the knowledge of $V_{i,\bf d}^r$, which together with \eqref{eq:cond row} is satisfied, it can allows the user to successfully decode $V_{i,\bf d}^c$. Overall, user $k_i$ recovers the subfiles $\{\overline{W}_{\mathcal{S}}: \mathcal{S}\subseteq [N], \mathcal{S}\cap \{d_1, ..., d_{k-1}\}\neq \emptyset, d_k\in \mathcal{S}\}$ in the first step, and the subfiles $\{\overline{W}_{\mathcal{S}}: \mathcal{S}\subseteq [N]\setminus \{d_1, ..., d_{k-1}\}, d_k\in \mathcal{S}\}$ in the second step, from which it can fully reconstruct $W_{d_k}$. \item If $k \notin \mathcal U$, then user $k$ has requested the same file as a weaker user $k_i \in \mathcal U$, i.e., $k_i\leq k$. Therefore, user $k$ can decode all the messages targeted at user $k_i$, and since \eqref{eq:cond row} is satisfied, user $k$ can also recover $V^r_{i,\bf d}$, from which it can fully reconstruct $W_{d_k}$ . \end{itemize} \end{itemize} \begin{Remark} We consider more files than users, i.e., $N\geq K$, but the analysis for case $N<K$ follows directly. Note that, since each user stores a coded combination of all the subfiles in a sublibrary, with more users than files, i.e., $N<K$, the $K-N$ strongest users would be able to decode all of their required subfiles from the messages targeted at users $1,\dots,N$, rendering the cached contents $Z_{N+1},\dots, Z_{K}$ unutilized. \end{Remark} For any demand vector $\mathbf d$, the total transmit power required by the proposed caching scheme can be upper bounded as in the following theorem. \begin{Theorem}\label{thm:piggy} For the caching problem described in Section~\ref{sys}, with cache capacity \small \[M\leq \min \Big\{ R_{\zeta} ,\dots,\,R_{N} \Big\},\quad \zeta \triangleq \max\{N-K,1\}\] \normalsize an upper bound on the optimal memory-power function, $P^*(M)$, is given by \small \begin{equation} P^*(M)\leq P^{\text{PB}}_{UB}(M)\triangleq \sum\limits_{k=1}^K P_k(M),\notag \end{equation} \normalsize where \small \begin{align} &P_k(M)= \notag\\ &\begin{cases}0, &\mbox{if}~ k\notin [\min\{N, K\}]\\ \max\bigg\{\Big(\frac{2^{2\tilde{\rho}_k} -1}{h^2_k}\Big)\Big(1+ h^2_k \, \sum\limits_{j=k+1}^{K}P_j \Big) ,\Big(\frac{2^{2(\tilde{\rho}_k+M)} -1}{h^2_{k+1}}\Big)\Big(1+ h^2_{k+1} \, \sum\limits_{j=k+1}^{K}P_j \Big) \, \bigg\}, &\mbox{if}~ k\in [\min\{N, K\}], \end{cases}\notag \end{align} \normalsize with $\tilde{\rho}_k$ defined as in \eqref{rstar}. \end{Theorem} \begin{proof} The proof is given in Appendix~\ref{app:piggy}, which is derived by characterizing the transmit power achieved by the caching and delivery scheme described in Section~\ref{subsec:piggy general}. \end{proof} \begin{Remark} We observe that, if \small \begin{equation}\label{optimalcondition} \Big(\frac{2^{2\tilde{\rho}_k} -1}{h^2_k}\Big)\Big(1+ h^2_k \, \sum\limits_{j=k+1}^{K}P_j \Big) \geq \Big(\frac{2^{2(\tilde{\rho}_k+M)} -1}{h^2_{k+1}}\Big)\Big(1+ h^2_{k+1} \, \sum\limits_{j=k+1}^{K}P_j \Big), \qquad\forall k \in [\min\{N, K\}], \end{equation} \normalsize then $P_{UB}^{\text{PB}}(M)=P_{LB}(M)$, i.e., the transmission power required by the coded placement and joint encoding scheme meets the lower bound. However, it does not necessarily mean that the proposed scheme is optimal as the lower bound is derived assuming uncoded placement phase, while the proposed scheme caches contents in a coded manner. Nevertheless, we can conclude that the performance of the proposed scheme is no worse than the optimal scheme with uncoded placement phase. \end{Remark} \section{Numerical results}\label{sec:numerical} We evaluate the performance of the scheme proposed in Sec~\ref{sec:scheme general}, referred to as the {\em correlation-aware} scheme, by comparing its memory-power trade-off with the lower bound presented in Theorem~\ref{lowerbound}, as well as with the trade-off achieved by the scheme proposed in \cite{amiri2017gaussian}, which does not exploit the correlation among files, referred to as the {\em correlation-ignorant} scheme. In the latter scheme, we treat each file as a distinct sequence of bits. We consider a setting with $N=5$ files, $K=5$ users, file rate $R=1$, and cache capacity $M=0.5$. Channel gains are modeled as $1/h_k^2=2-0.2(k-1)$, for $k=1, ..., 5$. We denote by $\alpha_\ell$ the file-length fraction that belongs to sublibrary $L_\ell$, i.e., \small \begin{equation} \alpha_\ell=\binom{N-1}{\ell-1}\frac{R_{\ell}}{R}, \quad \sum\limits_{\ell=1}^N \alpha_\ell=1.\notag \end{equation} \normalsize \begin{figure} \centering \label{fig:1} \includegraphics[width=0.65\linewidth]{5subfilesp.png} \caption{Transmission power vs. common subfile fraction, when the files are composed of private and common-to-all subfiles. The channel gains are given as $1/h_k^2=2-0.2(k-1)$, $k=1, ..., 5$. The correlation-aware scheme corresponds to the superposition coding scheme in Section \ref{sec:scheme general}.}\label{fig:commontoall} \end{figure} \begin{figure} \label{fig:2} \centering \includegraphics[width=0.65\linewidth]{2subfilesp.png} \caption{Transmission power vs. common subfile fraction, when the files are composed of private and common-to-two subfiles. The channel gains are given as $1/h_k^2=2-0.2(k-1)$, $k=1, ..., 5$. The correlation-aware scheme corresponds to the superposition coding scheme in Section \ref{sec:scheme general}.}\label{fig:pairwise} \end{figure} Fig.~\ref{fig:commontoall} displays the memory-power trade-off for a database with files composed of one {\em private} subfile, which is exclusive to that file, and a {\em common-to-all} subfile, which is shared among all the files, i.e., $\alpha_1+\alpha_5=1$, $\alpha_2=\alpha_3=\alpha_4=0$. In Fig.~\ref{fig:pairwise} the trade-off is shown when the files, in addition to private subfiles, have pairwise correlations through {\em common-to-two} subfiles, that is $\alpha_1+\alpha_2=1$, $\alpha_3=\alpha_4=\alpha_5=0$. We plot the minimum transmit power as a function of the common parts of the files for both scenarios, i.e., with respect to $\alpha_5$ and $\alpha_2$, respectively. In both settings the transmission power achieved by the correlation-aware scheme decreases remarkably, as the portion of common subfiles increases, while the performance of the correlation-ignorant scheme does not improve. It is observed that the transmission power drops faster in Fig.~\ref{fig:commontoall} compared to Fig.~\ref{fig:pairwise} for increasing ratio of common subfiles, in both the correlation-aware scheme and the lower bound. This is due to the reduction in the amount of content that needs to be sent over the Gaussian BC for a higher level of correlation among the files. For example, in Fig. \ref{fig:commontoall}, as $\alpha_5$ approaches $1$, all the files become the same, and hence, only a message of rate $R/2$ needs to be multicasted to all the users, whereas in the setting of Fig. \ref{fig:pairwise}, with $\alpha_2=1$, we still have $\binom{N}{2}=10$ distinct subfiles each shared by only two files. It is also observed that the gap between the transmit power upper and lower bounds is smaller in Fig.~\ref{fig:commontoall} compared to Fig.~\ref{fig:pairwise}. \begin{figure} \centering \includegraphics[width=0.75\linewidth]{jointencoding1.png} \caption{Transmission power vs. cache capacity,$1/h_k^2=2-0.2(k-1)$, for $k=1, ..., K$. The portions of subfiles of different correlation level are specified by $\alpha_1=\alpha_5=1/16$, $\alpha_2=\alpha_4=1/4$, and $\alpha_3=3/8$. Correlation-aware superposition coding and piggyback superposition coding correspond to the schemes proposed in Section \ref{sec:scheme general} and Section \ref{subsec:piggy general}, respectively. }\label{fig:jointencoding1} \end{figure} \begin{figure} \centering \includegraphics[width=0.75\linewidth]{jointencoding2.png} \caption{Transmission power vs. cache capacity,$1/h_k^2=2-0.4(k-1)$, for $k=1, ..., K$. The portions of subfiles of different correlation level are specified by $\alpha_1=\alpha_5=1/16$, $\alpha_2=\alpha_4=1/4$, and $\alpha_3=3/8$. Correlation-aware superposition coding and piggyback superposition coding correspond to the schemes proposed in Section \ref{sec:scheme general} and Section \ref{subsec:piggy general}, respectively. }\label{fig:jointencoding2} \end{figure} Next, we consider the same setting with $N=5$, $K=5$, and $R=1$ as before, but let $R_1=R_2=\cdots=R_N$, i.e., each subfile has the same size, which yields $\alpha_1=\alpha_5=1/16$, $\alpha_2=\alpha_4=1/4$, and $\alpha_3=3/8$. In Fig. \ref{fig:jointencoding1}, the channel gains are given as $1/h_k^2=2-0.2(k-1)$, for $k=1, ..., 5$, while in Fig. \ref{fig:jointencoding2}, $1/h_k^2=2-0.4(k-1)$, for $k=1, ..., 5$. We compare the proposed scheme presented in Section \ref{sec:scheme sep}, referred to as \textit{Correlation-Aware Superposition Coding}, the joint encoding scheme with coded placement presented in Section~\ref{sec:scheme joint}, referred to \textit{Correlation-Aware Piggyback Superpostion Coding}, with the correlation ignorant scheme, and the lower bound as well. In both cases, the joint encoding scheme with coded placement can be applied when $M\leq 1/16$. We observe that the correlation-aware schemes significantly outperform the correlation-ignorant scheme in terms of transmission power, and the joint encoding scheme with coded placement further improves the energy efficiency remarkably and achieves approximately the lower bound. However, while in the zoomed-in figure of Fig. \ref{fig:jointencoding2}, the joint scheme meets the lower bound, it can be seen in the zoomed-in figure of Fig. \ref{fig:jointencoding1} that the joint scheme results in a slightly higher transmission power than the lower bound when the cache capacity is larger than a certain value. That is because the channel of a stronger user is not good enough to receive all the contents (which are the cached contents at the weaker user) piggybacked on the message intended for the weaker user without any additional cost, such that \eqref{optimalcondition} is not satisfied. \section{Conclusions}\label{sec:conc} We have investigated caching and delivery of correlated contents over a $K$-user Gaussian BC for users with equal-capacity caches. Correlation among files is captured by the component subfiles shared among different subsets of files. We have first derived a lower bound on the minimum transmission power with which any possible demand combination can be satisfied, assuming uncoded cache placement. We have then presented two upper bounds on the memory-power trade-off with correlation-aware cache-aided coding schemes. The first scheme generates coded packets according to user demands, which are then delivered to users using superposition coding, where each coded packet is targeted at the weakest user demanding it. We have also proposed a coded placement scheme with joint encoding, in which the cache contents and user demands are encoded jointly, such that the weak users can use their cache contents for decoding, while the stronger users can decode both without additional resources. Our numerical results indicate that the proposed coding schemes greatly improve the energy-efficiency of delivery over Gaussian BCs compared to correlation-ignorant schemes. For small cache memory sizes, the joint encoding scheme with coded caching requires a lower transmit power, which meets the lower bound assuming uncoded placement. A tight lower bound without the limitation to uncoded placement is currently under investigation. \appendices \section{Proof of Theorem 2} To prove Theorem 2, we show the required transmission power by the proposed caching and delivery scheme presented in Section~\ref{sec:scheme sep} is upper bounded by $P_{UB}(M, \boldsymbol \pi)$ for any demand combination $\mathbf{d}$, given cache allocation vector $\boldsymbol \pi$. Recall that for a given demand combination $\mathbf{d}=(d_1, ..., d_K)$, $\mathcal{D}=\{d_1, ..., d_K\}$. For $\ell\in [N]$, $r\in [\max\{\ell-N+|\mathcal{D}|, 1\}: \min\{\ell, |\mathcal{D}|\}]$, ${\mathcal W}_r = \{\overline{W}_{\mathcal{S}}: |S| = \ell,\; |\mathcal{S}\cap\mathcal{D}|=r\}$ consists of $\binom{N-|\mathcal{D}|}{\ell-r}\binom{|\mathcal{D}|}{r}$ subfiles. Function GROUP generates $\binom{N-|\mathcal{D}|}{\ell-r}\binom{|\mathcal{D}|-1}{r-1}$ groups based on ${\mathcal W}_r$. For each group $\mathfrak{S}_i=(\mathcal{S}_1, ..., \mathcal{S}_K)$, Algorithm 1 runs function SINGLE-DEMAND twice (code line $6$ to $7$) to generates two set of coded messages $V_1^A$, ..., $V_K^A$ and $V_1^B$, ..., $V_K^B$ corresponding to $\{\overline{W}^A_{\mathcal S, \mathcal A}\}$ and $\{\overline{W}^B_{\mathcal S, \mathcal B}\}$, respectively. We recall that $\mathcal{K}$ is the set of the weakest users with distinct demands according to $\mathfrak{S}_i$, where $\mathcal{K}\triangleq\{k: \mathcal{S}_{k}\notin \{\mathcal{S}_{1}, ..., \mathcal{S}_{k-1}\}\}$ (line $4$ of function SINGLE-DEMAND), and denote by $e_k$ the number of leaders after user $k$, i.e., $e_k\triangleq \sum\limits_{k'=k+1}^K \mathbbm{1}\{k' \in \mathcal{K}\}$. Then for $k\in [K]$, the total size of $V_k^A$ and $V_k^B$ denoted by ${\hat{\gamma}}_{k,\ell, r}(\mathcal{K})$ (normalized by $n$), i.e., ${\hat{\gamma}}_{k,\ell, r}(\mathcal{K})\triangleq |V_k^A|+|V_k^B|$, is given by \small \begin{align}\label{gemma1} {\hat{\gamma}}_{k,\ell, r}(\mathcal{K})=\begin{cases} \frac{\binom{K-k}{t_\ell^A}}{\binom{K}{t_\ell^A}}(t_\ell^B-t_\ell)R_l+\frac{\binom{K-k}{t_\ell^B}}{\binom{K}{t_\ell^B}}(t_\ell-t_\ell^A)R_\ell~~~&\mbox{if}~~ k\in \mathcal{K},\\ \frac{\binom{K-k}{t_\ell^A}-\binom{K-k-e_k}{t_\ell^A}}{\binom{K}{t_\ell^A}}(t_\ell^B-t_\ell)R_\ell+\frac{\binom{K-k}{t_\ell^B}-\binom{K-k-e_k}{t_\ell^B}}{\binom{K}{t_\ell^B}}(t_\ell-t_\ell^A)R_\ell~~~&\mbox{if}~~ k\notin \mathcal{K}. \end{cases} \end{align} \normalsize Thus, the additional power required to send coded messages $V^A_1, ...., V_K^A$, and $V_1^B, ..., V_K^B$, denoted by $\Delta P$, is given as \small \begin{align} &\Delta P ({\hat{\gamma}}_{1,\ell, r}(\mathcal{K}), ..., {\hat{\gamma}}_{K,\ell, r}(\mathcal{K}))\nonumber\\ &\qquad\qquad=\sum\limits_{k=1}^{K}\left(\frac{2^{2(\overline{\rho}_k+{\hat{\gamma}}_{k,\ell, r}(\mathcal{K}))}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}\frac{2^{2(\overline{\rho}_j+{\hat{\gamma}}_{j,\ell, r}(\mathcal{K}))}}{h_j^2}-\sum\limits_{k=1}^{K}\left(\frac{2^{2\overline{\rho}_k}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}\frac{2^{2\overline{\rho}_j}}{h_j^2}, \notag \end{align} \normalsize where $\overline{\rho}_1, ..., \overline{\rho}_1 \in \mathbbm{R}^+$ denote the total rate of all the other coded message required to be sent over the Gaussian BC. Note that \small \begin{align}\label{gemma2} {\hat{\gamma}}_{k,\ell, r}([|\mathcal{K}|])=\begin{cases} \frac{\binom{K-k}{t_\ell^A}}{\binom{K}{t_\ell^A}}(t_\ell^B-t_\ell)R_\ell+\frac{\binom{K-k}{t_\ell^B}}{\binom{K}{t_\ell^B}}(t_\ell-t_\ell^A)R_\ell~~~&\mbox{if}~~ k\in [|\mathcal{K}|],\\ 0~~&\mbox{if}~~ k\notin [|\mathcal{K}|]. \end{cases} \end{align} \normalsize Compare \eqref{gemma1} and \eqref{gemma2}. We have then \small \begin{equation} \sum\limits_{k=1}^K {\hat{\gamma}}_{k,\ell, r}(\mathcal{K})=\sum\limits_{k=1}^K {\hat{\gamma}}_{k,\ell, r}([|\mathcal{K}|])=\frac{\binom{K}{t_\ell^A+1}-\binom{K-|\mathcal{K}|}{t_\ell^A+1}}{\binom{K}{t_\ell^A}}(t_\ell^B-t_\ell)R_\ell+\frac{\binom{K}{t_\ell^B+1}-\binom{K-|\mathcal{K}|}{t_\ell^B+1}}{\binom{K}{t_\ell^B}}(t_\ell-t_\ell^A)R_\ell,\notag \end{equation} \normalsize while ${\hat{\gamma}}_{k,\ell, r}([|\mathcal{K}|]) \geq {\hat{\gamma}}_{k,\ell, r}(\mathcal{K})$ if $k\in [E_d]$; ${\hat{\gamma}}_{k,\ell, r}([|\mathcal{K}|])\leq {\hat{\gamma}}_{k,\ell, r}(\mathcal{K})$ otherwise. It yields \small \begin{equation}\label{plower} \Delta P ({\hat{\gamma}}_{1,\ell, r}(\mathcal{K}), ..., {\hat{\gamma}}_{K,\ell, r}(\mathcal{K})) \leq \Delta P ({\hat{\gamma}}_{1,\ell, r}([|\mathcal{K}|]), ..., {\hat{\gamma}}_{K,\ell, r}([|\mathcal{K}|])) \end{equation} \normalsize Note that each group generated by function GROUP has at most $\lceil |\mathcal{D}|/r \rceil+1$ distinct elements, which corresponds to at most $\lceil |\mathcal{D}|/r \rceil+1$ distinct elements by running function SINGLE-DEMAND, i.e., $|\mathcal{K}|\leq \lceil |\mathcal{D}|/r \rceil+1$. We have then ${\hat{\gamma}}_{k,\ell, r}([\lceil|\mathcal{D}|/r \rceil+1]) \geq {\hat{\gamma}}_{k,\ell, r}(\mathcal{K})$, $\forall k \in [K]$. With \eqref{plower}, \small \begin{equation}\label{plower1} \Delta P ({\hat{\gamma}}_{1,\ell, r}(\mathcal{K}), ..., {\hat{\gamma}}_{K,\ell, r}(\mathcal{K})) \leq \Delta P ({\hat{\gamma}}_{1,\ell, r}([\lceil|\mathcal{D}|/r \rceil+1]), ..., {\hat{\gamma}}_{K,\ell, r}([\lceil|\mathcal{D}|/r \rceil+1])).\nonumber \end{equation} \normalsize Following the same procedure with all the groups, we can lower bound the total transmission power to satisfy demand combination $\mathbf{d}$ as follows \small \begin{align} & P(M, \boldsymbol \pi, \mathcal{D})\leq \sum\limits_{k=1}^{ K}\left(\frac{2^{2\overline{\rho}_k}-1}{h_k^2}\right) \prod\limits_{j=1}^{k-1}{2^{2\overline{\rho}_j}}, \nonumber\\ &\overline{\rho}_k\triangleq \sum\limits_{\ell=1}^N \sum\limits_{r=\max\{\ell-N+|\mathcal{D}|, 1\}}^{\min\{\ell, |\mathcal{D}|\} }\binom{N-|\mathcal{D}|}{\ell-r}\binom{|\mathcal{D}|}{r}\hat{\gamma}_{k, \ell, r}([\lceil|\mathcal{D}|/r \rceil+1]), \nonumber \end{align} \normalsize which by letting $\mathcal{D}=[\min\{N, K\}]$, proves Theorem 2. \section{Proof of Theorem~\ref{thm:piggy}}\label{app:piggy} For a demand vector $\mathbf{d}$, $\forall \mathbf{d}\in [N]^K$, the proposed scheme presented in Section~\ref{subsec:piggy general} constructs a $Ne(\mathbf{d})$-level Gaussain superposition code. We denote the minimum total transmission power required by this scheme to satisfy $\mathbf{d}$ by $P(\mathbf{d}, M)=\sum\limits_{i=1}^{Ne(\mathbf{d})}P_i(\mathbf{d}, M)$, where $P_i(\mathbf{d}, M)$ is the power allocated to generate the $i^{\text{th}}$ level codeword. With \eqref{rowmessage} and \eqref{columnmessage}, we have \small \begin{subequations} \begin{align} |V_{i,\mathbf{d}}^r|=M, |V_{i,\mathbf{d}}^c| =\rho_i-M, ~&\text{if}~k_i=i,\notag\\ |V_{i,\mathbf{d}}^r|=0, |V_{i,\mathbf{d}}^c| =\rho_i, ~&\text{if}~k_i\neq i.\notag \end{align} \end{subequations} \normalsize Thus, according to \eqref{eq:cond all} and \eqref{eq:cond row}, it yields \small \begin{align} P_i(\mathbf{d}, M)=\begin{cases}\max\bigg\{ \, \Big(\frac{2^{2\tilde{\rho}_i} -1}{h^2_i}\Big)\Big(1+ h^2_i \, \sum\limits_{j=i+1}^{K}P_j \Big) ,\;\Big(\frac{2^{2(\tilde{\rho}_i+M)} -1}{h^2_{i+1}}\Big)\Big(1+ h^2_{i+1} \, \sum\limits_{j=i+1}^{K}P_j \Big) \, \bigg\}, ~&\mbox{if}~k_i=i,\\ \Big(\frac{2^{2(\tilde{\rho}_i+M)} -1}{h^2_{i}}\Big)\Big(1+ h^2_{i} \, \sum\limits_{j=i+1}^{K}P_j \Big), ~&\mbox{if}~k_i\neq i, \end{cases}\notag \end{align} \normalsize $\forall i\in [Ne(\mathbf{d})]$. It is straightforward to see that the worst-case demand combination $\mathbf{d}_{\text{worst}}$ that maximizes $P(\mathbf{d}, M)$, i.e., $\mathbf{d}_{\text{worst}}=\argmax\limits_{\mathbf{d}}P(\mathbf{d}, M)$, is such that $Ne(\mathbf{d})=\min\{N, K\}$ and $\mathcal U=[\min\{N, K\}]$, i.e., the weakest $\min\{N, K\}$ users request distinct files. And we have $P(\mathbf{d}_{\text{worst}}, M)=P^{\text{PB}}_{UB}(M)$, which completes the proof of Theorem~\ref{thm:piggy}. \bibliographystyle{IEEEtran}
\section{Introduction} In this article we give a clarification of our current results on non-commutative operator graphs generated by covariant resolutions of identity \cite{amosovmokeev1,amosovmokeev2}. A linear subspace $\mathcal{V}$ in the algebra of all bounded linear operators on the Hilbert space $H$ is called a non-commutative operator graph if $$ A\in\mathcal{V} \Rightarrow A^{*}\in \mathcal{V};\ I \in \mathcal{V}. $$ These objects allow to determine a possibility of zero-error correction for a system of unitary operators representing errors in quantum information transmission (for explicit description of this theory see \cite{Duan,amosovmokeev3}). Basically, we interested only in graphs satisfying the Knill-Laflamme condition \cite{lafl}. It is said that the graph $\mathcal{V}$ satisfies the Knill-Laflamme condition, if there is an orthogonal projection $P_K$ on the subspace $K\subset H$ such that $P_K\mathcal{V}P_K=\mathbb{C}P_K$, the projection $P_K$ is called an anticlique and the subspace $K$ is known as a quantum error correcting code. Some properties and illustrating examples of non-commutative operators graphs could be given in terms of resolutions of identity covariant with respect to an action of locally-compact groups. Studying of non-commutative operator graphs generated by covariant resolution of identity was initiated in \cite{amo}. Let $G$ be a locally compact group and $\mathfrak{B}$ is a sigma-algebra generated by compact subsets of G, then the set of positive operators $\{M(B),B\in \mathfrak{B}\}$ is said to be a resolution of identity if $$ M(\emptyset)=0,\ M(G)=I, $$ $$ M(\cup_j B_j)=\sum_{j}M(B_j),\ B_k\cap B_l=\emptyset\ \textit{for}\ k\neq l,\ B_j\in \mathfrak{B}. $$ Let $(U_g)_{g\in G}$ be a projective unitary representation of $G$. Define the action of this group on operator $A$ as $$ \rho_g(A)=U_gAU_g^{*}. $$ Then $M(B)$ is said to be covariant with respect to this action if $$ \rho_g(M(B))=M(gB). $$ Suppose that a graph $\mathcal{V}$ is generated by $M(B)$ in the following sense $$ \mathcal{V}=\overline{span\{M(B),B\in\mathfrak{B}\}}. $$ Note that if $H$ is finite dimensional there is no need to take a closure in the last equation. \section{Linear structure of $\mathcal{V}$} At first let us define the graph introduced in \cite{amosovmokeev1}. Consider the finite dimensional Hilbert space $H={\mathbb C}^d\otimes {\mathbb C}^d$ and the orthonormal basis $\ket{k}, \ 1 \le k \le d$ in $\mathbb{C}^{d}$. Then, vectors \begin{equation}\label{key} \ket{\psi_ {sn}}=\frac{1}{\sqrt{d}} \sum_{k=1}^{d} e^{\frac{2\pi i s k}{d}}\ket{k\ k-n\ mod\ d}, 1\le s\le d, \end{equation} are known as the generalized Bell states. Let $P_s, \ 1 \le s \le d$ be the projections on the subspaces $$ H_s=span \{ \ket{\psi_{sn}}, \ 1 \le n \le d \}. $$ Define a unitary representation of the circle group $\mathbb {T}=[0,2\pi]$ with the operation $+/mod(2\pi)$ by the formula $$ \varphi \rightarrow U_{\varphi}= \sum_{s=1}^{d}e^{i \varphi s}P_s,\ \varphi \in \mathbb {T}. $$ Also consider a set of projections in $\mathbb{C}^{d}$ of the form \begin{equation}\label{Q} Q_j=\sum \limits _{k=1}^d\ket {j\ j-k\ mod\ d}\bra {j\ j-k\ mod\ d},\ 1\le j\le d. \end{equation} The following corollary defines examples of the graphs mentioned above. {\bf Corollary 1}\cite {amosovmokeev1}. {\it Given $j,\ 1\le j\le d,$ the projection (\ref {Q}) generates the graph $\mathcal{V}_j= span\{ U_\varphi Q_j U_\varphi^{*}, \varphi \in {\mathbb T} \} $ for which the projections $\{P_{s},\ 1 \le s \le d\}$ are anticliques.} Let us consider a set of unitary operators defined as follows \begin{equation}\label{W} W_n=\sum \limits _{l=1}^{d}\sum \limits _{r=1}^{d}\ket {\psi _{l+n\ mod\ d\ r}}\bra {\psi _{lr}},\ 0\le n\le d-1. \end{equation} The unitaries from (\ref {W}) act as permutations on the set of vectors (\ref {key}). Below we clarify a structure of the graphs determined by Corollary 1. {\bf Theorem 1.} {\it All graphs $\mathcal{V}_{j}\equiv \mathcal {V}$ coincide for $1\le j\le d$. Moreover, one can choose (\ref {W}) as generators of $\mathcal V$.} {\bf Proof.} For operators $U_{\varphi}Q_j U_{\varphi}^*$ we have such expansion in basis $\ket{\psi_{kn}}$ $$ U_{\varphi}Q_j U_{\varphi}^*=\sum_{s=1}^{d}\sum_{l=1}^{d}e^{i\varphi(s-l)}P_sQ_jP_l= $$ $$ \sum_{s=1}^{d}\sum_{l=1}^{d}\sum_{r=1}^{d}e^{i\varphi(s-l)}P_s\ket{j\ j-r \ mod\ d}\bra{j\ j-r\ mod\ d}P_l= $$ $$ \sum_{s=1}^{d}\sum_{l=1}^{d}\sum_{r=1}^{d}\sum_{n=1}^{d}\sum_{h=1}^{d}e^{i\varphi(s-l)}\ket{\psi_{sn}}\braket{\psi_{sn}|j\ j-r\ mod\ d}\braket{j\ j-r\ mod\ d|\psi_{lh}}\bra{\psi_{lh}}= $$ $$ \frac{1}{d}\sum_{s=1}^{d}\sum_{l=1}^{d}\sum_{r=1}^{d}\sum_{n=1}^{d}\sum_{h=1}^{d}e^{i\varphi(s-l)}\delta_{nr}\delta_{hr}e^{-\frac{2\pi ij(s-l)}{d}}\ket{\psi_{sn}}\bra{\psi_{lh}}= $$ \begin{equation}\label{result} \frac{1}{d}\sum_{s=1}^{d}\sum_{l=1}^{d}e^{i\varphi(s-l)}e^{-\frac{2\pi ij(s-l)}{d}}\sum_{r=1}^{d}\ket{\psi_{sr}}\bra{\psi_{lr}}=\frac{1}{d}\sum_{n=0}^{d-1}e^{i\left(\varphi-\frac{2\pi j}{d}\right)n} W_{n}, \end{equation} where unitaries $W_n$ are determined by (\ref {W}). To complete the proof we need to show that $W_n\in {\mathcal V}_j$ for all $j,\ 1\le j\le d$. Substituting $\varphi=\varphi _{kj}=\frac {2\pi {(k+j)}}{d}$ into (\ref {result}) we obtain $$ \frac {1}{d}\sum \limits _{n=0}^{d-1}e^{i\frac {2\pi kn}{d}}W_n=U_{\varphi _{kj}}Q_jU_{\varphi _{kj}}^*\in {\mathcal V}_j $$ for all $0\le k\le d-1$. The result follows. $\Box $ \section{Examples for Heisenberg-Weyl Group} Now we want to give an analogous clarification of linear structure for the example of the non-commutative operator graph generated by the same technique implied for the Heisenberg-Weyl group. Unlike the circle group this group is non-commutative. At first we need to introduce the construction from \cite{amosovmokeev2}. Let $\mathfrak {H},\ dim\mathfrak {H}=d$ be a finite-dimensional Hilbert space with the fixed orthogonal basis $\ket {j},\ 0\le j\le d-1$. Unitary operators $S$ and $M$ on $\mathfrak{H}$ given by the formulae $$ S\ket {j}=\ket {j+1\ mod\ d},\ M\ket {j}=e^{\frac {2\pi i}{d}j}\ket {j} $$ define the representation of Heisenberg-Weyl group $G_d$ of rank $d$. Consider $H=\mathfrak{H}\otimes\mathfrak{H}$ with the orthonormal basis $\ket{kj}, 0 \le k,j \le d-1 $. Also consider the orthogonal basis in $H$ consisting of entangled vectors $$ h_k^0=\frac{1}{\sqrt{n}}\sum_{j=0}^{d-1}e^{\frac {2\pi ikj}{d}} \ket{jj}, $$ $$ h_k^j=(I\otimes S^{j} )h_k^{0}. $$ Define subspaces in $H$ spanned by systems of the following entangled vectors $$ H_j = span \{ h_k^j, 0 \le k \le d-1 \}. $$ Let $\pi $ be the map transmitting $S$ and $U$ to unitary operators in $H$ as follows $$ \pi (S)h_k^j=h_{k+1\ mod\ d}^{j}, $$ $$ \pi (M)h_k^j=e^{\frac{2\pi i }{d}k}h_k^{j}. $$ It is shown in \cite {amosovmokeev2} that the map $\pi $ can be extended to a unitary representation of the group $G_d$. Also we need special sums of matrix units $$ y_{ml}=\sum \limits _{k=0}^{d-1}\ket {h_m^k}\bra {h_l^k} $$ and their linear combinations $$ h_0=\sum \limits _{m=0}^{d-1} y_{m m }\equiv I, $$ $$ h_p=\sum \limits _{m=0}^{d-1} y_{m+p \ mod\ d \ m } + y_{m\ m+p \ mod\ d },\ 1\le p \le d-1. $$ Resulting linear structure of the operator graph generated by representation $\pi$ was given in \cite{amosovmokeev2} as follows $\mathcal{V}=span\{h_p, 0\le p \le d-1\}$. Here we give the explicit value for a dimension of this graph. {\bf Theorem 2.} {\it A dimension of the graph is given by the formula \begin{equation}\label{dimm} \begin{cases} & \dim \mathcal{V}=\frac{d-1}{2}+1 \text{ for odd } d \\ & \dim \mathcal{V}=\frac{d}{2}+1\text{ for even } d \end{cases} \end{equation} } {\bf Proof.} Equation $$ h_p=h_{p^{'}} $$ or equivalently $$ \sum \limits _{m=0}^{d-1} y_{m+p \ mod\ d \ m } + \sum \limits _{m=0}^{d-1}y_{m\ m+p \ mod\ d }= \sum \limits_{m^{'}=0}^{d-1} y_{m^{'}+p^{'} \ mod\ d \ m^{'} } + \sum \limits_{m^{'}=0}^{d-1} y_{m^{'}\ m^{'}+p^{'} \ mod\ d } $$ holds true if $$ p'=d-p $$ because a first summand in the left hand side equals to a second summand in the right hand side and vice-versa. Thus, $\dim \mathcal{V}$ expresses by (\ref{dimm}). $\Box$ The next corollary follows from the proof of the theorem. {\bf Corollary 2.} {\it The graph $\mathcal{V}$ has the system of generators \begin{equation*} \begin{cases} & \mathcal{V}=span\{h_p,\ 0\le p\le \frac{d-1}{2}+1\} \text{ for odd } d \\ &\mathcal{V}=span\{h_p,\ 0\le p\le \frac{d}{2}+1\}\text{ for even } d \end{cases} \end{equation*} } \section{Conclusion} We gave a clarification of the examples of the operator graphs given in \cite{amosovmokeev1}. It is shown that all these examples coincide and it is possible to choose unitary generators of a given graph, so we have the same situation as in \cite{amosovmokeev2}. For examples given in \cite{amosovmokeev2} we gave the explicit formula for dimensions of the graphs and specified their linear structure. \section {Acknowledgments} The work is supported by Russian Science Foundation under the grant no. 19-11-00086.
\section{Introduction} In the fields of bio- and cheminformatics, machine learning (ML) algorithms combined with human-engineered molecular descriptors\cite{todeschini, desclist} have shown great potential in tasks of predicting physicochemical properties of molecular compounds. In practice, however, it is often necessary to run a blind scan through a large number of such combinations in order to find the most accurate inference model, which still may not lead to success. Most of the descriptors are task- or domain-specific, which makes their use impossible for more general problems, such as virtual screening, similarity searching, clustering and structure-activity modelling\cite{willett, cereto, mcgregor, li}. For these purposes molecular fingerprints have been developed. Fingerprint is a binary representation of a molecule: its structural or functional features are translated into a string of bits in the way to keep the fingerprint invariant to rotations, translations and property-preserving atomic permutations (see, e.g., extended circular fingerprints\cite{morgan}). Even though molecular fingerprints are known to be helpful to drugs discovery or compounds search among various databases, they may as well be detrimental to materials characterisation and design. Therefore, while both descriptors and fingerprints may be beneficial, they come along with restrictions. In fields like materials science it is common to have datasets with $\ll1000$ samples, which is considered to be too small for a direct deep learning application. Some research groups use neural architectures (NAs) for secondary tasks such as to build novel high-level features as non-linear combinations of molecular descriptors\cite{coley, mayr, ramsundar}. Others use NA to automatically learn features based on 2D/3D images\cite{goh, wallach}, molecular graphs\cite{duvenaud}, SMILES (simplified molecular input line entry system)\cite{bjerrum, hodas, kimber}, N-gram graphs\cite{liu} or a combination of mentioned inputs\cite{paul}, similar to computer vision (CV). Still, none of them intends to design an NA for property prediction on small datasets. There are some works on transfer learning\cite{hutchinson, john, goh}, but the results vary greatly depending on the correlation between the tasks – which is often unknown \textit{a priori}. Moreover, most of the NAs used in the fields of CV or natural language processing (NLP) are trained on big data and impose architectures that do not fit small datasets. Aside from the lack of data, another bottleneck on the way of using NAs in physics and chemistry is the lack of interpretability. A method for explaining neural networks has been recently proposed\cite{hodas}. It consists in training an additional neural network to generate a mask identifying the most important SMILES characters. Despite the respectable coherence in the interpretation of the chemical solubility, the explanation network is entirely correlated to its prediction network, which forces the training phase to be doubled for each dataset. Moreover, even though the explanation network allows to identify the groups having the highest weight in the property prediction, there is no evidence that the original prediction network has also learned the known chemistry concepts in order to make proper characterisation. In this article we propose a method allowing to overpass the issues of data scarcity, descriptors engineering and the prediction interpretation ambiguity at the same time. The algorithm benefits from the natural ability of NAs to learn a suitable and task-specific representation of the data. It designs a simple yet effective NA dedicated to small datasets based on attention mechanism\cite{xu, chan, raffel}. To achieve this, we borrowed the latest techniques from the CV and NLP fields to build an entirely autonomous system – the SMILES-X. To the best of our knowledge, this is the first time in materials science related fields when an NA is specifically designed to manage small datasets, and the first attempt to integrate a NLP-based attention mechanism for predicting physicochemical properties of molecular compounds. This mechanism allows to reduce the number of trainable parameters, and provides the interpretation of the results at no extra cost. The SMILES-X achieves the state-of-the-art results, predicting any physicochemical property given the molecule's SMILES\cite{daylight, blueobelisk} as the sole input. The structure of the article is as follows. First, we describe the entire pipeline of the SMILES-X in Section \ref{sec:pipeline}. The SMILES augmentation and formatting are detailed in subsections \ref{par:augmentation}, \ref{par:tokenisation}, respectively, while the procedures of building the NA frame and its data-specific optimisation are presented in the subsection \ref{par:archsearch}. The subsection \ref{subsec:predictions} is dedicated to the performance of the SMILES-X based on three benchmark datasets for regression tasks from the MoleculeNet\cite{moleculenet}: ESOL\cite{esol}, FreeSolv\cite{freesolv} and Lipophilicity\cite{lipo}. There are three modes of interpretation of the results of the SMILES-X, which are discussed in the subsection \ref{subsec:interpret}. Finally, we conclude and discuss further possible improvements of the SMILES-X, as well as propose more potential target properties to be inferred using the algorithm in Section \ref{sec:conclusion}. \section{The SMILES-X pipeline} \label{sec:pipeline} \begin{figure}[t] \centering \includegraphics[scale = 0.45]{SMILESX_Arch.png} \caption{The SMILES-X pipeline.} \label{fig:fig1} \end{figure} The SMILES-X has been conceived to meet the following requirements: (i) to use the SMILES format as the only representation of a molecular compound; computable characteristics, such as the fingerprints or physical descriptors, are left out. (ii) Remove the SMILES canonicalization\cite{daylight} in order to exploit the full capacity of the molecular compound representation. (iii) The core architecture is simple enough to handle small datasets without sacrificing the prediction accuracy. (iv) Outcomes of the SMILES-X are interpretable. Figure \ref{fig:fig1} is a sketch of the main steps within the SMILES-X pipeline. The primary input is a list of SMILES strings with corresponding property values. Then, a splitting into training, validation and test sets is performed via equiprobable sampling. The subsequent steps are detailed below. \subsection{Augmentation} \label{par:augmentation} It has been shown in CV that data augmentation approaches such as flipping, rotation, scaling, cropping and other image transformations are effective to reduce the error rate on classification tasks and improve generalisation\cite{perez}. Here, we introduce a technique called SMILES augmentation, similar to Bjerrum\cite{bjerrum}. The first step consists in removing canonicalization\cite{daylight} of the SMILES. Canonicalization is the default procedure to standardise the SMILES across the databases, therefore removing it leads to an expanded number of SMILES individual representations. Then, augmentation is done by iterating over the following two steps: (i) Renumber the atoms of a given SMILES by rotation of their index. (ii) For each renumbering, reconstruct grammatically correct SMILES under the condition of conserving the initial molecule's isomerism and prohibiting kekulisation\cite{daylight, blueobelisk}. In the end, one obtains an expanded list of SMILES together with their corresponding property and cardinality $\rm n_{augm}(s_{i})$ (number of augmentations for a SMILES $\rm s_{i}$), if any. Duplicated SMILES are removed. The SMILES augmentation is individually performed after splitting into training, validation and test sets to avoid any information leakage. The procedure is performed using the RDKit library\cite{rdkit}. \subsection{Tokenisation} \label{par:tokenisation} Tokenisation consists in dividing the SMILES into unique tokens, each token being a set of characters. The procedure of SMILES tokenisation is as follows\cite{daylight, blueobelisk}: (i) Aliphatic and aromatic organic atoms (B, C, N, O, S, P, F, Cl, Br, I, b, c, n, o, s, p), bounds, branches and rings (-, =, \#, \$, /, \textbackslash, ., (, ), \%digits, digit) are set as individual tokens. (ii) The characters between squared brackets, that may include inorganic and aromatic organic atoms, isotopes, chirality, hydrogen count, charges or class number, form a single token (brackets included, e.g., [NH4{\small +}]). (iii) Unlike the NLP analysis, the beginning token is not different from the termination one: both of them are represented by a whitespace, which is added at both ends of a tokenized SMILES. This is important to keep its reading direction invariant. Finally, a set of unique tokens is extracted to form the representative chemical vocabulary for a given dataset. To become an interpretable NA input, this vocabulary is then mapped into integers, and is conserved into memory for future usage. \subsection{Architecture search} \label{par:archsearch} \begin{figure}[t] \centering \includegraphics[scale = 0.45]{Skeleton.png} \caption{Fixed skeleton of the neural architecture in the SMILES-X.} \label{fig:skeleton} \end{figure} The neural architecture search has recently reached a new milestone in finding the optimal NA for a given task, by using, e.g., reinforcement learning techniques\cite{nas,enas} or evolutionary algorithms\cite{nasevol}. However, not only these techniques are computationally expensive but also they do not necessarily deal with the recurrent blocks. It has therefore been decided to fix the overall NA geometry (Figure \ref{fig:skeleton}) and search for the best set of the hyperparameters through the Bayesian optimisation\cite{frazier}. As it was mentioned earlier in Section \ref{sec:pipeline}, this geometry is NLP-oriented and treats SMILES strings as sentences in the chemical language; it has low complexity so as to be applicable to small datasets, and its outcomes are interpretable. Inspired by the hierarchical neural architecture\cite{yang}, which allows to get cutting edge results on document classification, we have built the SMILES-X frame based on a four-step formula: \{Embed, Encode, Attend, Predict\}\cite{honnibal}. \begin{enumerate} \item \textbf{Embed} The embedding layer\cite{gal} transforms the tokens, derived from the dataset's vocabulary in form of integers, into dense $\rm n_{embed}$-dimensional float vectors. Unlike arbitrary ordinal numbers, these vectors encapsulate the semantic meaning of tokens and their relations. This operation transforms SMILES into series of $\rm n_{embed} \times 1$ vectors, or $\rm n_{tokens} \times n_{embed}$ tensor, where $\rm n_{tokens}$ corresponds to the number of tokens in a tokenised SMILES string. \item \textbf{Encode} The encoding phase is responsible for modifying the embedding, so that it captures the relationships between tokens in the context of the dataset. It consists of two neural layers: a bidirectional CuDNN long short-term memory (LSTM) layer\cite{lstm1, lstm2} is followed by a time-distributed fully connected one. The former consists of $\rm n_{LSTM}$ LSTM blocks and maps the input SMILES, represented now by a $\rm n_{tokens} \times n_{embed}$ tensor, into a context-aware $\rm n_{tokens} \times n_{LSTM}$ tensor. After training, each row of the tensor represents the meaning of a given token within the context of the rest of the SMILES string containing it. The bidirectionality forces the embedded SMILES to be sequentially passed forwards and backwards, conserving the invariance of their reading direction. The forward and backward encodings of a SMILES are then concatenated, resulting in a $\rm n_{tokens} \times 2n_{LSTM}$ output tensor. The time-distributed dense layer is then applied to each of $\rm n_{tokens}$ tokens. This allows to capture the relationships between tokens in greater detail, or in other words to deepen the LSTM layer (similar to the effect of adding an extra dense layer to a vanilla neural network). Given that the number of hidden units in this layer is $\rm n_{dense}$, the output after encoding is a $\rm n_{\rm tokens} \times n_{dense}$ tensor. It should be noted that we specifically use CuDNN LSTM\cite{cudnn} blocks for efficient optimization and training phases on GPU from NVIDIA Corporation. Without the CuDNN version of LSTM, the speed of training would drop by a factor of $\sim 10$, making the optimisation phase intractable. \item \textbf{Attend} The attention layer detects the salient tokens, compressing tensor $\rm H \in \mathbb{R}^{n_{tokens} \times n_{dense}}$ into an $\rm n_{dense}$ vector c with minimum information loss\cite{raffel}: \begin{flalign} e &= tanh(\rm H \cdot W_{a} + b_{a}) \, , \nonumber \\ \alpha &= \frac{\exp(e)}{\sum_{i=1}^{\rm n_{tokens}} \exp(e_{i})} \, , \nonumber \\ c &= \rm H^{T} \cdot \alpha \, , \label{eq:att} \end{flalign} where $W_{a} \in \mathbb{R}^{\rm n_{dense} \times 1}$ and $b_{a}\in \mathbb{R}^{\rm n_{tokens} \times 1}$ are trainable parameters, $\alpha \in \mathbb{R}^{\rm n_{tokens} \times 1}$ is the attention vector and $c \in \mathbb{R}^{\rm n_{dense} \times 1}$ is the output. Thus, the attention layer performs two important tasks at once: (1) it collapses the representation $\rm H$ of a variable length chain of tokens into a fixed length vector c by applying a weighted sum over the tokens to fit the final property best, with (2) the weights in $\alpha$ which represent the importance of each token towards the final property prediction, bringing to a straightforward interpretation. Therefore, the attention layer has two modes, one returning the output vector c, and the other – the attention vector $\alpha$ (see Section \ref{sec:results}). The two modes are switchable at will without extra computational cost. \item \textbf{Predict} The final NA layer transforms the attention layer output c into a single property value $\rm Prop(s_{i})$ by a simple linear operation: \begin{equation} \rm Prop(s_{i}) = W_{p}^{T} \cdot c + b_{p}\, , \label{eq:poutput} \end{equation} The interpretation from $\alpha$ in Equation~\ref{eq:att} and the prediction are thus linearly connected and are accessible without any additional treatments on the input data or NA, unlike the pipelines in other works\cite{montavon, schutt, hodas}. \end{enumerate} It should be noted that all the above tensors or vectors have one additional dimension, $\rm n_{SMILES}$, omitted for the sake of simplicity. This dimension corresponds to the batch size of a single iteration passed to the network, i.e. the maximum number of SMILES that it processes at once. All of the steps above are implemented in Keras API\cite{keras} and Tensorflow\cite{tensorflow} with GPU support. \section{Results \& discussion} \label{sec:results} To evaluate the regression performance of the SMILES-X, it was chosen to test it on three benchmark physical chemistry datasets issued from the MoleculeNet\cite{moleculenet}. These datasets are considered as small, with less than 5000 compound-property pairs, and therefore present a challenge to machine learning models. The ESOL\cite{esol} dataset contains the logarithmic aqueous solubility (mols/L) for 1128 organic small molecules; the FreeSolv\cite{freesolv} consists of the calculated and experimental hydration free energies (kcal/mol) for 642 small neutral molecules in water; and the Lipophilicity\cite{lipo} stores the experimental data on octanol/water distribution coefficient (logD at pH 7.4) for 4200 compounds. In present report the splitting ratio for training/validation/test is set to 0.8/0.1/0.1. Following the procedure from MoleculeNet\cite{moleculenet}, we performed 8 splits, each time using new seed for the Monte-Carlo sampling. The seeds have been fixed for the sake of reproducibility. We use the averaged RMSE over the 8 test sets as the comparison metric of performance. The optimal model architecture is determined via Bayesian optimisation individually for each split. We used the python library GPyOpt\cite{gpyopt} for this purpose. The search bounds are as follows: ($\rm n_{embed},\ n_{LSTM}, n_{dense}\ and\ n_{SMILES}) \in \{8, 16, 32, 64, 128, 512, 1024\},\ \gamma \in [2; 4]$ with a step of 0.1, where $\gamma$ is related to the optimiser learning rate as $\rm lr \equiv 10^{-\gamma}$, making a total of 50421 configurations. For the Lipophilicity dataset, $\rm n_{SMILES}$ and learning rate are fixed to 1024 and $10^{-3}$, respectively, leaving 343 potential architectures to search among. First, 25 architectures are randomly sampled and trained. Then, a maximum of 25 architectures are proposed via the expected improvement acquisition function\cite{jones}. Each of the architectures are sequentially trained for 30 epochs for ESOL and FreeSolv, and 10 for the Lipophilicity set (these values have been chosen based on the speed/efficiency ratio). The best proposed architecture is finally trained using a standard Adam optimiser\cite{adam} with checkpoint and early stopping. The early stopping is configured to stop the training if the validation loss is not improving for 50 consecutive epochs, and a checkpoint saves the parameters of the model with the minimal validation loss. The maximum number of epochs is set to 300, but because of the early stopping condition this value has never been reached. Depending on whether the SMILES augmentation is requested or not, the code needs from 1 to 4 GPUs running in parallel. \subsection{Predictions} \label{subsec:predictions} \begin{table*} \small \caption{Comparison of physicochemical properties predictions from the SMILES-X (Can, Augm) to the best performances in MoleculeNet\cite{moleculenet} on the ESOL\cite{esol}, FreeSolv\cite{freesolv} and Lipophilicity\cite{lipo} datasets, and to molecular dynamics calculations\cite{freesolv} for the FreeSolv dataset only} \centering \begin{tabular*}{\textwidth}{@{\extracolsep{\fill}}llll} \hline & \multicolumn{3}{c}{Datasets} \\ Method & ESOL & FreeSolv & Lipophilicity \\ \hline MoleculeNet\cite{moleculenet} & $0.58 \pm 0.03$ & $1.15 \pm 0.12$ & $0.65 \pm 0.04$ \\ Molecular dynamics\cite{freesolv} & --- & $1.51 \pm 0.07$ & --- \\ SMILES-X (Can) & $0.70 \pm 0.05$ & $1.14 \pm 0.17$ & $0.68 \pm 0.05$ \\ SMILES-X (Augm) & $\pmb{0.57 \pm 0.07}$ & $\pmb{0.81 \pm 0.22}$ & $\pmb{0.60 \pm 0.04}$ \\ \hline \end{tabular*} \label{tab:results} \end{table*} \begin{figure}[t] \centering \includegraphics[scale=0.55]{numtokens_perSMILES_seed_773630.png} \caption{Number of tokens per SMILES for the datasets ESOL~\cite{esol}, FreeSolv~\cite{freesolv}, and Lipophilicity~\cite{lipo}.} \label{fig:stats} \end{figure} We compare the performance of SMILES-X against the best-to-date results from MoleculeNet\cite{moleculenet}, and for the FreeSolv additionally to the calculations based on the molecular dynamics simulations\cite{freesolv} (Table \ref{tab:results}). The results in MoleculeNet\cite{moleculenet} are reported for the molecular graph-based models that achieved the best results on a given dataset: concretely, a message passing neural network\cite{gilmer} for the ESOL and FreeSolv datasets, and a graph convolutional model\cite{gc} for the Lipophilicity dataset. Bayesian optimisation is also used there for the layers size, batch size and learning rate. We include both the results on canonicalised SMILES (Can) and on SMILES that have been augmented (Augm) (see Section \ref{par:archsearch}). When a SMILES string $\rm s_{i}$ is augmented to $\rm n_{augm}$ strings, its predicted property value is averaged over $\rm n_{augm}$ predictions. Table \ref{tab:results} shows that the SMILES-X reaches the best results for the FreeSolv and Lipophilicity datasets, improving the prediction accuracy by ~30\% and ~9\%, respectively, while having a comparable performance on the ESOL data. It is unclear why our algorithm fails to improve on the ESOL data. We thought that the number of tokens per SMILES may be the culprit. However, Figure \ref{fig:stats} shows that this is not the case. Note that even using the standard canonicalised SMILES strings, the property can be predicted quite well without employing any chemical knowledge (i.e., using no descriptors). Interestingly, machine learning allows to achieve a better accuracy than the molecular dynamics simulations. There are the three main reasons that we think permitted SMILES-X to achieve these results: \begin{enumerate}[i.] \item The success is mainly attributed to the attention layer, that shows similar improvements in document classification tasks\cite{yang}. Comparing our performance to a similar NA without an attention layer\cite{hodas}, we see some 32.5\% improvement on accuracy. \item Bayesian optimisation is a valuable tool that allows to efficiently find the best hyper-parameters in a short time. \item It is obvious that SMILES augmentation shows great improvement (Can versus Augm in Table~\ref{tab:results}), and was necessary to achieve the best current results. Also, one can note that a graph-based NA would not allow such data augmentation. \end{enumerate} \begin{figure}[t] \centering \includegraphics[scale=0.4]{Visualization_FreeSolv_SAMPL_Embedding_seed_17730.png} \caption{Visualisation of a representation of SMILES tokens from the embedding layer for the FreeSolv~\cite{freesolv} dataset.} \label{fig:embedrepr} \end{figure} \subsection{Interpretability} \label{subsec:interpret} \begin{figure}[t] \centering \begin{subfigure}[b]{\columnwidth} \centering \includegraphics[scale=0.25]{Interpretation_1D_FreeSolv_SAMPL_seed_17730.png} \caption{} \label{fig:interpn1d} \end{subfigure} \begin{subfigure}[b]{\columnwidth} \centering \includegraphics[scale=0.3]{Interpretation_2D_FreeSolv_SAMPL_seed_17730.png} \caption{} \label{fig:interpn2d} \end{subfigure} \begin{subfigure}[b]{\columnwidth} \centering \includegraphics[scale=0.24]{Interpretation_temporal_FreeSolv_SAMPL_seed_17730.png} \caption{} \label{fig:interpntemp} \end{subfigure} \caption{Visualisation of the importance of each token within the SMILES towards the final prediction of the property of interest. The illustration is done on the structure Cc1ccc(O)cc1C from the FreeSolv dataset, with hydration free energy as the corresponding property. The 1D (a) and 2D (b) attention maps show the projections of the attention vector $\alpha$ on the SMILES string and molecular graph, respectively. The redder and darker the colour is, the stronger is the attention on a given token. The temporal relative distance $\rm \mathcal{T}_{dist}$ is shown in (c). The closer to zero is the distance value, the closer is the temporary prediction on the SMILES fragment to the whole SMILES prediction.} \label{fig:interpns} \end{figure} As it was mentioned before, one of the great advantages of our method is its interpretability. The Figure 4 shows an example of the trained token embeddings. We used a principal component analysis (PCA\cite{pca1, pca2}) to reduce dimensionality from $\rm n_{embed} = 1024$ down to two, for the purpose of visualisation. The tokens that are not included in the training set, and are therefore randomly assigned, are represented by a cross. One can see that halogens {Br, F, Cl} are located near each other. Other distinguishable sets are, for example, $\rm \left\{ [C@@],[S+2],c,C,[C@] \right\}$ and $\rm \left\{ n,N \right\}$, that have the same valence and bonds type within the group. The model also puts $\rm \left\{ [N+],[O-] \right\}$ close to each other, which reveals their regular coexistence in compounds within the FreeSolv data. Some other tokens placements, however, are not obvious to chemically qualify. In any case, the principle aim of clustering is to smooth out the chemical relations; it serves as a trainable look-up table for the further context-aware processing of tokens. We should not, thus, expect too great a degree of interpretability at this step. Representation of the individual tokens out of their chemical context is not the objective of the SMILES-X. Instead, we are interested in the interpretation of the network property prediction. With the SMILES-X, we are able to visualise the importance of each single token towards the final prediction of the property of interest (Figure 5). There are three ways of visualisation available: (a) a 1D map built from the attention vector $\alpha$ (see Equation \ref{eq:att}) juxtaposed with the SMILES string, (b) a similar 2D version for the molecular graph and (c) temporal relative distance $\rm \mathcal{T}_{dist}$ to the predicted property. For the first two, the redder and darker the colour is the stronger is the attention on a given token. $\rm \mathcal{T}_{dist}(n)$ shows the evolution of the prediction for the SMILES while reading it token by token from left to right. It is inspired by Lanchantin\cite{lanchantin} and defined as: \begin{equation} \rm \mathcal{T}_{dist}(n) = \frac{Prop(n)-Prop(n_{tokens})}{|Prop(n_{tokens})|} \, , \label{eq:tempdist} \end{equation} where Prop(n) is the property predicted value based on the first n tokens of the SMILES for $\rm n \in [1,...,n_{tokens}]$. Note that it converges to the final prediction $\rm Prop(n_{tokens}) \equiv Prop(s_{i})$ (prediction based on the entire SMILES). This also allows to judge as to how much a token influences the property of a compound. In this example, the prediction based on fragment 'Cc1ccc(O' is almost identical to the final prediction on the whole structure. For the compound that we used as an example, the oxygen atom ('O') is considered to be the most influential element of the molecule for the hydration free energy prediction, which reflects chemical reality. \section{Conclusions} \label{sec:conclusion} A new neural architecture for the chemical compounds characterisation, the SMILES-X, has been developed. In this article, we have presented the pipeline and performance of the SMILES-X. We demonstrate its aptitude to provide state-of-the-art results on the inference of several physicochemical properties, concretely the logarithmic aqueous solubility ($\overline{RMSE}_{test} \simeq 0.57 \pm 0.07$ mols/L), hydration free energy ($\overline{RMSE}_{test} \simeq 0.81 \pm 0.22$ kcal/mol) and octanol/water distribution coefficient ($\overline{RMSE}_{test} \simeq 0.60 \pm 0.04$ for LogD at pH 7.4). These results prove that it is now possible to successfully predict a physicochemical property employing no chemical intuition, even with a small dataset at hand. The success of the SMILES-X rides on three key factors: (i) The Embed-Encode-Attend-Predict architecture, that allows to simplify the whole architecture thanks to the attention mechanism (i.e., to have less trainable parameters), and therefore reduces the risk of over-fitting. (ii) The Bayesian optimisation of the neural network's hyper-parameters allows to achieve close-to-optimal representation of the molecular compounds, per task and dataset. (iii) The use of SMILES strings as a sole input representation of chemical compounds allows efficient data augmentation. Thanks to the attention mechanism, the SMILES-X comes with three modes of interpretation of the inference outcomes. This provides the end-user with the insights on which fragments of the chemical structure have the highest (or the lowest) influence on the property of interest. This kind of artificial intuition is a valuable asset not only for the tasks of characterisation and design of novel compounds, but also to re-purpose already-known materials. As for the future improvement on the SMILES-X, we plan to use BERT-like\cite{bert} NA's skeleton for the sake of reducing the accuracy gap existing between the ESOL, FreeSolv and Lipophilicity datasets studied here. The LSTM blocks are known to have memory problems with very distant dependencies within long sentences, and an architecture that is entirely based on the attention mechanism, i.e. free from LSTM blocks, like BERT, may overcome this weakness. Another way to improve the inference accuracy may be via informative sampling\cite{infsampl}. In our forthcoming article we will address the tasks of classification, still using the MoleculeNet's datasets\cite{moleculenet}. That means that the SMILES-X will be modified in order to handle single-to-many, many-to-many and many-to-single classification tasks. \section*{Conflicts of interest} There are no conflicts to declare. \section*{Acknowledgements} The authors gratefully acknowledge the NVIDIA Corporation for the Titan V and Titan Xp GPUs, without which this research would not have been possible. \bibliographystyle{iopart-num}
\section{Introduction}\label{sec:intro} Additive manufacturing (AM) refers to the technologies in which three-dimensional objects are created by adding materials layer-by-layer~\cite{debroy2018additive,frazier2014}. A number of AM processes has been developed over the past few decades. Among them, laser powder bed fusion (L-PBF), a powder-based AM process, has attracted much attention due to its ability to produce fully dense parts with superior mechanical properties. During this process, the material undergoes multiple rapid heating-cooling cycles, leading to complex solidification microstructures with anisotropic properties. Typically, post-processing heat treatments are performed to homogenize and control L-PBF microstructures. However, it is also possible to control the as-deposited microstructure through modulating the manufacturing process parameters, which in turn can reduce the cost and time needed for post-processing and thus facilitate the qualification process \cite{gockel2013understanding}. Therefore, it is essential to develop an understanding of the influence of the process parameters on L-PBF solidification microstructure \cite{debroy2018additive}. Once the solidification microstructure is expressed as a function of process parameters, this knowledge can be used to assist the design of AM materials to obtain desired properties. Numerical modeling of the solidification microstructure has been performed using various methodologies \cite{yu2018phase,nastac1999numerical,xu2018multiscale,zaeem2013modeling,karma2016atomistic,attari2016phase,attari2018interfacial}. A thorough discussion on solidification microstructures and simulation methods can be found in prior works \cite{doi:10.1080/09506608.2018.1537090,zaeem2015advances,zhu2015modeling,boettinger2000solidification,rappaz2000modelling,stefanescu1995methodologies}. A number of simulation methods has been adopted in the literature to investigate the solidification microstructure of AM parts. Korner et al. \cite{korner2014tailoring} studied the equiaxed and columnar grain structures during electron beam melting (EBM) of IN718 using lattice Boltzmann (LB) method and experimental techniques. It was demonstrated that the grain structure can be tailored from columnar to equiaxed using different scanning strategies. Markl et al. \cite{markl2016numerical} developed a model by coupling LB and cellular automata (CA) methods to investigate the evolution of grain structure during EBM of Ti-6Al-4V. The predicted thermal history in LB model was fed into CA model to predict the grain structure. It was demonstrated that at a low power, stray grains were formed due to incomplete melting. Nie et al. \cite{nie2014numerical} predicted solidification microstructure during laser AM of a nickel-based superalloy using a multi-scale modeling approach that couples finite element (FE) method and stochastic analysis. The model was used to investigate the evolution of dendritic structure, niobium (Nb) segregation, and formation and morphology of the Laves phase. It was demonstrated that the morphology of the Laves phase, which is an undesired phase, was influenced by the cooling rate. As the cooling rate increased, the morphology of the Laves phase changed from a coarse and chain-like structure to a fine and discrete structure, which is considered to be less detrimental. Lopez-Botello et al. \cite{lopez2017two} employed a CA-FE model to investigate the grain structure (equiaxed vs. columnar) during L-PBF of aluminum alloys. Recently, the phase field (PF) method has attracted much attention in investigation of solidification microstructure that results during AM processes \cite{ji2018understanding,francois2017modeling,ghosh2018predictive,wang2019investigation}. This approach is promising with the ability to describe complex microstructural evolution without needing to track the moving interface, as opposed to the classical sharp interface models \cite{boettinger2002phase,ode2001recent,echebarria2004quantitative,karma2001phase,kim2004phase,wang1993thermodynamically,steinbach2013solidification}. The PF model, also called `diffuse interface model', assumes the interface between phases to have a finite thickness, in contrast to the sharp interface assumption. The phase field variable in these models is a state variable with values spanning in space and time, and used to describe the relative amount of a phase. It varies smoothly along the interface with each phase having a constant value. For example, in a system with a solid-liquid interface, the phase field variable takes the value of 0 in the solid phase, 1 in the liquid phase, and a value between 0 and 1 in the interface. It has been demonstrated that by weakly coupling PF method with a FE thermal model, quantifiable predictions of the solidification phenomenon during AM can be achieved. Acharya et al. \cite{acharya2017prediction} employed a computational fluid dynamics (CFD) model weakly coupled with a PF model to simulate the microstructure evolution during L-PBF of IN718, which was approximated as a binary alloy. The authors investigated the dendritic structure (size, morphology, and orientation), segregation of Nb, primary dendrite arm spacing (PDAS), and secondary dendrite arm spacing (SDAS). The influence of laser speed on the orientation of dendritic structure was also investigated. Keller et al. \cite{keller2017application} investigated the evolution of cellular/dendritic structure and micro-segregation in IN625 alloy during L-PBF process using multiple computational techniques including DICTRA simulation, Scheil-Gulliver model, PF model, and FE-based thermal model. Micro-segregation of multiple substitutional elements (e.g. Nb, Mo, Fe, Cr) were predicted using DICTRA software and Scheil-Gulliver model. Both approaches showed an increase in Nb, Mo, C and a decrease in Fe and Cr at the growth front of $FCC-\gamma$ cells during solidification. The microsegregation of Nb was further investigated using a PF model with an approximation of IN625 alloy to a binary alloy system with the composition of Ni-4 wt.\% Nb. In that work, the predicted PDAS varied between 0.2 $\mu$m and 1.8 $\mu$m depending on the cooling rate, in the range of $10^4$K/s-$10^6$K/s calculated using a FE model. Ghosh et al. \cite{ghosh2017primary,ghosh2018simulation} employed a weakly coupled FE-PF model to simulate the solidification microstructure of a Ni-5 wt.\% Nb alloy (a binary approximation of IN718 alloy) during the L-PBF process. Varying values of temperature gradient (G: $2.4\times10^7$ K/m-$0.14\times10^7$ K/m) and growth rate (R: 0.01 m/s - 0.3 m/s) were predicted by the FE model and fed into the PF model to investigate the PDAS and Nb enrichment under different conditions. Predicted PDAS ranged from 0.2 $\mu$m to 0.7 $\mu$m as the cooling rate decreased from $10^6$ K/s to $3\times10^5$ K/s. Nb segregation in the interdendritic region was predicted as 16 wt.\%. Similar studies in which the solidification microstructure under AM conditions was simulated using a number of different PF models can be found in the literature \cite{geng2017simulation, ghosh2018simulation, kundin2019microstructure,wang2019investigation}. Note that the aforementioned PF works were based on the equal diffusion potential condition---i.e., the local equilibrium condition. However, during a typical L-PBF process, the system is out-of-equilibrium due to the extremely high solidification growth rates. Therefore, a PF model with the capability of capturing and describing this rapid solidification phenomenon under L-PBF conditions is required. Recently, Steinbach et al. \cite{steinbach2012phase, zhang2012phase} proposed a PF model, namely, the finite interface dissipation model, in which both the equilibrium and strongly non-equilibrium conditions can be described successfully. The novelty of this model is that the rate of transport of the components across phase interfaces can be controlled with a kinetic coefficient, namely, ``interface permeability'', $P^{intf}$. The value of the interface permeability parameter can be chosen (i.e. $P^{intf} \rightarrow 0$) such that the large non-equilibrium case can be modeled. In contrast, when $P^{intf} \rightarrow \infty$, the condition of equal diffusion potential in the conventional models (system with local equilibrium condition) can be recovered. To account for non-equilibrium solidification effects observed during the L-PBF process, the finite interface dissipation PF model is adopted in the present work. Here, it is worth noting that some conventional PF models \cite{kim1999phase} require the solution of additional ancillary equations in order to properly define the structure of the interface, for example, by enforcing the so-called local quasi-equilibrium condition. The finite interface dissipation PF model formulation, on the other hand, eliminates the need of solving these kinds of additional equations, hence the numerical implementation is easier, in principle. It is common practice to describe multi-component alloys using a binary approximation due to the complexity of implementing the PF model for multi-component systems. Although it is a reasonable approach to simulate the microstructure of complex alloys consisting of a number of constituent elements (e.g. Inconel 718 with 15 constituent elements), it involves multiple model assumptions that are not necessarily representative of reality, and hence inevitably include inaccuracy and uncertainty in model predictions. For example, NiNb has been widely used as a binary approximation for Ni-based superalloys such as Inconel 718 \cite{ghosh2017primary,acharya2017prediction} and Inconel 625 \cite{keller2017application}. Although the Nb amount in the binary model material is the same as the amount that exists in the approximated multi-component alloy (e.g. 5 wt.\% Nb in Inconel 718), it is evident that there will be contributions from other constituent elements (e.g., Cr, Fe, Mo, Al) in the formation of microstructure phases in the target multi-component alloy, which might influence the accuracy of the comparison with the binary PF model predictions. In contrast, the present work provides, for the first time, a consistent framework through using a binary Ni-5 wt.\% Nb (Ni-3.2 at.\% Nb) alloy in both PF simulations and validation experiments. We believe that this will serve to reduce the inaccuracy and uncertainty associated with microstructure simulations when a binary approximation is used in simulations while the complex alloy is used in validation experiments. Indeed, recent modeling and experimental efforts on AM have adopted various binary alloy systems (e.g., Ti-Nb \cite{roehling2018rapid}, Al-Cu \cite{mckeown2016time}, Al-Si \cite{mckeown2016time}, Cu-Ni \cite{Perron_2017}) to elucidate the solidification microstructure developed under AM conditions. It is worth noting that the finite interface dissipation PF model adopted in the present work is well suited for describing multi-phase multi-component systems. Very recently, this model was employed in \cite{nomoto1875non} to investigate the solidification microstructure of Fe-Cr-Ni-Mo-C and stainless steels under AM conditions. The authors emphasized the capability of the model in simulating the solidification microstructure for multi-component systems in high temperature gradient and growth rate. The present work differs from the above-mentioned study due to the implementation of a FE-PF weakly coupled framework and rigorous experimental validation, as well as the use of the same material for simulations and experimental validation. The main goal of the present work is to present a consistent framework which can be used to elucidate the influence of AM process parameters on the variations in Ni-Nb solidification microstructures during single-track laser melting. Once the microstructure variations in a simple binary alloy during single-track experiments are well understood, the next step is to employ the presented framework to investigate more complex alloying systems (e.g. Inconel 718) under multi-track multi-layer laser melting conditions. \begin{figure*}[!ht] \centering \includegraphics[width=0.9\textwidth]{images/after_revision/fe_pf_coupling.jpeg} \caption{ The weakly coupling procedure of the thermal model with the PF model is represented. An example of predicted heat affected region of Ni-5\%Nb alloy during L-PBF is presented on the three dimensional thermal model geometry. The temperature gradient $G$ and growth rate $R$ are extracted from the thermal model and fed into the PF model to predict the microstructure at the corresponding location at the melt pool indicated by a small rectangle in the magnified view of the heat affected region.} \label{fig:fe_pf_coupling} \end{figure*} Current PF modeling efforts in the AM literature \cite{kundin2019microstructure,ghosh2018simulation,ghosh2018formation,roehling2018rapid} typically report microstructure predictions (e.g. morphology, size of cellular segregation structure, segregation) as a function of temperature gradient ($G$) and growth rate ($R$). Significant insights on the solidification microstructures under AM conditions have been revealed through these types of investigations. However, it is known that the AM microstructures vary locally within a single melt pool even under constant process parameters as well as from melt pool to melt pool depending on the variation of $G$ and $R$ \cite{debroy2018additive}. Therefore, these types of studies fall short of elucidating the relationship between the process parameters and the microstructure variability. In this regard, solidification maps demonstrating AM solidification microstructure as a function of process parameters (e.g. laser power $P$ and scan speed $\vec{v}$) are essential to understand and control the microstructure variations and variability under AM conditions. In the present work, we developed an integrated modeling framework which weakly couples an FE-based thermal model to a finite interface dissipation PF model to investigate the rapid solidification microstructure during single track laser melting of a binary Ni-3.2 at.\% Nb alloy. First, the thermal history of the material will be predicted through FE simulations which will then be introduced into the PF model to predict the rapid solidification microstructure (e.g. the morphology, size of cellular segregation structure, and Nb segregation) under L-PBF conditions. To reveal the effect of process parameters on microstructure variability, first, a conventional solidification microstructure map expressing the rapid solidification microstructure as a function of $G$ and $R$ is developed. Next, the microstructure predictions in multiple regions across the melt pool for different combinations of laser power, $P$, and laser scanning speed, $\vec{v}$, are shown and compared with the experimental measurements for validation. The paper is structured as follows. In Section \ref{sec:exper}, the experimental methodology is described. Section \ref{sec:models} describes the models and procedures. Section \ref{sec:result} presents the experimental measurements, simulation predictions, and discusses the effect of process parameters on the L-PBF microstructures as well as the effect of permeability on the predicted segregation coefficient. A comparison between the results predicted from the finite interface dissipation PF model with those from a conventional PF model \cite{ghosh2017primary} is also provided in Section \ref{sec:result}. Finally, Section \ref{sec:conc} summarizes and addresses the future directions \section{Experimental Methodology}\label{sec:exper} Gas atomized Ni-3.2 at.\% Nb powder was used to manufacture L-PBF NiNb specimens. Single tracks were printed using a 3D Systems ProX DMP 200 Laser Type (fiber laser with a Gaussian profile $\lambda$ = 1070 nm, and beam size = 100 $\mu$m). The tracks were printed on a Ni-3.2 at.\% Nb base plate. These tracks were 10 mm in length with 1 mm spacing between tracks. Cross-sections of the single tracks were wire-cut using wire electrical discharge machining (EDM), and these specimens were polished down to 0.25 $\mu$m with water-based diamond suspension polishing solutions. Kalling's Solution No. 2 (5 g CuCl2, 100 mL HCl, and 100 mL ethanol) was used to etch the Ni-3.2 at.\% Nb single tracks to obtain optical micrographs. Optical microscopy (OM) was carried out using a Keyence VH-X digital microscope equipped with a VH-Z100 wide range zoom lens. Scanning electron microscopy (SEM) and wavelength dispersive spectroscopy (WDS) were performed with a CAMECA SXFive electron probe microanalyzer equipped with a $LaB_6$ electron source. Backscattered electron (BSE) images of polished single tracks were captured at 15 kV and 30 nA. Quantitative WDS composition maps were obtained at settings of 15 kV, 100 nA, and 110 $\mu$m pixel dwell time with a 0.1 $\mu$m step size. Composition data was extracted from the WDS maps to create line scans for visual aid purposes. BSE images were processed using Image J \textregistered software \cite{ws2012imagej} in order to determine PDAS at different locations along select single tracks. The displayed PDAS values were averaged from 30 measurements at each location. \section{Model Description}\label{sec:models} \subsection{Thermal Model}\label{thermal_model} The thermal history during the L-PBF process can be determined by numerically solving the transient heat transfer equation given by: \begin{equation}\label{eq:heat_transient1} \rho C_p \frac{\partial T}{\partial t} + \nabla(-k\nabla T) = Q \end{equation} where $\rho$ is the density, $C_p$ is the specific heat, $k$ is the thermal conductivity, $T$ is the temperature, $t$ is the time, and $Q$ is the heat source term. This basic form of the heat transfer equation describes the transient evolution of temperature ($T$) and is typically modified to account for additional physical phenomena that serve to increase the accuracy of the predictions. Examples of such phenomena are phase transformation energy contributions and temperature dependent material properties. In the current model we include phenomena and also perform a coordinate transformation: \begin{equation} \frac{\partial T}{\partial t} = \frac{\partial T}{\partial x}\frac{\partial x}{\partial t} + \frac{\partial T}{\partial y}\frac{\partial y}{\partial t} + \frac{\partial T}{\partial z}\frac{\partial z}{\partial t} = \nabla T \cdot \vec{v} \label{eq:transformation} \end{equation} Substituting Equation \ref{eq:transformation} into Equation \ref{eq:heat_transient1} eliminates the transient portion of the governing heat transfer equation and shifts the reference frame from the material substrate to the heat source which is moving at a constant speed $\vec{v}$. \begin{equation} \rho C_p (\nabla T \cdot \vec{v}) + \nabla(-k\nabla T) = Q \label{eq:heat_steady} \end{equation} The effect of this transformation is the conversion of the transient problem to a steady-state problem, which is a much simpler problem that results in several orders of magnitude decrease in simulation time. This simplification in the governing equations opens up the possibility to use a very fine finite element mesh size (2 $\mu$m) in and around the melt pool, which is essential for the accurate prediction of solidification behavior at the solid-liquid interface. A schematic of the finite element domain and the representative heat affected region can be seen in Fig. \ref{fig:fe_pf_coupling}. Boundary conditions for this model can be broken down into three categories: Dirichlet, Symmetry, and Thermal Loads. Boundaries 1, 2, 4, and 5 are Dirichlet boundary conditions with a fixed temperature of $T_0=298 [K]$. A symmetry condition imposed on the centerline of the track (Boundary 3) essentially halves the computational expense of the simulation. The top surface (Boundary 6) contains all of the heat transfer phenomena that contribute to the source term ($Q$) in Equation \ref{eq:heat_steady}. \begin{align} Q &= q_{rad} + q_{conv} + q_{vap} + q_{beam} \label{eq:heat_loads}\\ q_{rad} &= \varepsilon \sigma_B (T_{amb}^4-T^4) \label{eq:radiation}\\ q_{conv} &= h(T_{amb}-T) \label{eq:convection}\\ q_{vap} &= L_v \sum_{i=1}^{n} X_i 44.331 p_{i}(T) \sqrt{\frac{MW_{i}}{T}} \label{eq:vaporization}\\ q_{beam} &= a(T)P\Big[\frac{1}{2\pi\sigma^2}exp\Big(-\frac{(r-r_0)^2}{2\sigma^2}\Big)\Big] \label{eq:beam} \end{align} Equations \ref{eq:radiation}-\ref{eq:beam} describe surface radiation, natural surface convection, vaporization, and deposited beam power, respectively. The radiation, convection, and beam terms are commonly implemented in the finite element modeling of L-PBF. Evaporative energy loss $q_{vap}$ accounts for energy transferred out of the system in the form of mass transfer via hot vapor. The form of this equation is taken from Bolten-Block and Eagar \cite{block1984metal} and modified to include temperature dependent partial pressure relationships for each element. These pressure-temperature relationships are calculated using equations described in \cite{alcock1984vapour}. In general, the parameters in equations \ref{eq:heat_steady}-\ref{eq:beam} can be sorted into temperature dependent and non-temperature dependent properties. Parameters considered to be constant are: ambient temperature ($T_{amb}$), emissivity ($\varepsilon$), Stefan-Boltzmann constant ($\sigma_B$), molecular weights of Ni and Nb ($MW_i$), laser power ($P$), beam standard deviation ($\sigma$), and beam centerpoint ($r_0$). The group of temperature dependent material properties include: partial pressure ($p_i$), density ($\rho$), specific heat ($C_p$), thermal conductivity ($k$), and laser speed ($\vec{v}$), and absorptivity ($a$). Phase dependent values for all of these properties can be found in Table \ref{tab:FE_pars}. The natural convection coefficient ($h$) is calculated internally within COMSOL Multiphysics~\cite{comsol} framework based on the domain geometry and orientation. \begin{table}[!ht] \scriptsize \centering \caption{Thermophysical and processing parameters used in the FE thermal model. All thermophysical property values were calculated using a weighted average of the pure elemental properties of Ni and Nb.} \label{tab:FE_pars} \begin{tabular}{lcc} \toprule \textbf{Phase Properties} & \textbf{Values} & \textbf{Source} \\ \toprule \textbf{Solid} & & \\ $\rho_S$ & 8900 [kg/m$^{3}$] & MSDS \\ $k_S$ & 85 [W/mK] & \cite{gale2003smithells} \\ $Cp_S$ & 550 [J/kgK] & \cite{gale2003smithells} \\ $a_S$ & 0.3 [unitless] & \cite{trapp_situ_2017} \\ \midrule \textbf{Solid} $\leftrightarrow$ \textbf{Liquid} & & \\ $T_m$ & 1703 [K] & MSDS \\ $\Delta T_m$ & 50 [K] & \cite{gale2003smithells} \\ $L_m$ & 2.9(10)$^{5}$ [J/kg] & \cite{chase1998nist} \\ \midrule \textbf{Liquid} & & \\ $\rho_L$ & 8450 [kg/m$^{3}$] & \cite{gale2003smithells} \\ $k_L$ & 120 [W/mK] & \cite{gale2003smithells} \\ $Cp_L$ & 650 [J/kgK] & \cite{gale2003smithells} \\ $a_L$ & 0.3 [unitless] & \cite{trapp_situ_2017} \\ \midrule \textbf{Liquid} $\leftrightarrow$ \textbf{Vapor} & & \\ $T_v$ & 3209 [K] & \cite{chase1998nist} \\ $\Delta T_v$ & 200 [K] & Approx. \\ $L_V$ & 7.1(10)$^{6}$ [J/kg] & \cite{chase1998nist} \\ \midrule \textbf{Vapor} & & \\ $\rho_V$ & Temp. Dep. & \cite{block1984metal} \\ $k_V$ & 1000 [W/mK] & Approx. \\ $Cp_V$ & Temp. Dep. & \cite{chase1998nist} \\ $a_V$ & 0.6 [unitless] & \cite{trapp_situ_2017} \\ $p_i$ & Temp. Dep. & \cite{alcock1984vapour} \\ \toprule \textbf{Constants} & \textbf{Values} & \textbf{Source} \\ \toprule \textbf{Laser} & & \\ $P$ & 70-255 [W] & User \\ $\vec{v}$ & 50-2300 [mm/s] & User \\ $4\sigma$ & 70 [$\mu$m] & Manuf. \\ \midrule \textbf{General} & & \\ $T_{amb}$ & 298 [K] & \\ MW$_{Ni}$ & 58.7 [g/mol] & \\ MW$_{Nb}$ & 92.9 [g/mol] & \\ $\varepsilon$ & 0.7 & \\ \end{tabular} \end{table} The phase-dependent property values in Table \ref{tab:FE_pars} are calculated using an average of the elemental properties for each constituent \cite{gale2003smithells}, weighted by the corresponding atomic percent. This rule-of-mixtures approximation is necessitated by the lack of experimental thermophysical property measurements for this custom NiNb alloy. A weighted average is sufficient in this case because the alloy is a very dilute single-phase solid-solution. In particular, the absorptivity values were chosen to approximate a recent study by Trapp et al. \cite{trapp_situ_2017} which shows experimental evidence for low effective absorptivity of the solid/liquid phases and high effective absorptivity upon vaporization and keyhole formation. Additionally, a powder layer with effective material properties is not directly modeled due to the fact that its primary effect (increased laser absorptivity) is negligible at steady-state conditions when the laser is solely incident upon the solid, liquid and vapor phases. Smooth transitions between the phase-dependent thermophysical property values in Table \ref{tab:FE_pars} are accomplished by averaging the properties of each phase based on their respective fractions during the transformation. Latent heat contributions for melting and vaporization ($L_m$ and $L_v$) are included in the model by adding the appropriate term directly to the heat capacity value during their respective transformations. Details of this effective property approach can be found in \cite{karayagiz2019numerical}. \subsection{Phase Field Model with Finite Interface Dissipation}\label{PFM_sec} The phase field model with finite interface dissipation introduced by Steinbach et al. \cite{steinbach2012phase,zhang2012phase} is adopted in the present work to investigate the rapid solidification process during L-PBF of Ni-3.2 at.\% Nb alloy. The model has been proven to be capable of modeling non-equilibrium solidification behavior. Here, a brief description of the model is presented. Further details on full derivation can be found in the references provided above. The derivation of a typical PF model starts with the description of the free energy functional that may consist of local chemical free energy density, interfacial energy density, elastic energy density, electrochemical energy density depending on the studied problem \cite{moelans2008introduction,hu2001phase,yurkiv2018phase,yi2018strain,attari2019exploration}. In the present work, the free energy functional has contributions from the local chemical free energy density ($f^{chem}$) and from the interfacial energy density ($f^{intf}$): \begin{equation} F^{tot} = \int_{\Omega} \left ( f^{intf} + f^{chem} \right) d\Omega \end{equation} \begin{equation} f^{intf} = \frac{4\sigma_{\alpha\beta}}{\eta} \left \{ -\frac{\eta^2}{\pi^2} \nabla \phi_\alpha \cdot \nabla\phi_\beta + \phi_\alpha \phi_\beta \right \} \end{equation} \begin{equation} f^{chem} = \phi_{\alpha} f_{\alpha} ( c_\alpha ) + \phi_{\beta} f_{\beta} ( c_\beta ) + \lambda \{ c - \left ( \phi_{\alpha} c_{\alpha} + \phi_{\beta} c_{\beta} \right) \} \end{equation} \noindent where $\sigma_{\alpha\beta}$, $\eta$, $\phi_{\alpha/\beta}$, $c_{\alpha/\beta}$, and $c$ are the interfacial energy, the interface width, the phase fractions of $\alpha/\beta$ phases, the phase concentrations of $\alpha/\beta$ phases, and the overall concentration, respectively. The summation of the phase fractions is 1 throughout the system with the relationship of $\phi_{\alpha}+\phi_{\beta}=1$. $\lambda$ is the Lagrange multiplier, which is introduced to assure the solute conservation constraint given by: $c=c_{\alpha}\phi_{\alpha}+c_{\beta}\phi_{\beta}$. $f_{\alpha}$ and $f_{\beta}$ are the free energy densities of the corresponding phases and expressed within the CALPHAD formalism \cite{saunders1998calphad}. At the selected alloy composition of $c_{alloy}=3.2\:(at.\% Nb)$, two phases (liquid and $\gamma$) can be described as: \begin{multline}\label{eqn:gibbs} f_{\alpha}V_m = c_{\alpha}G^{0}_{Nb} + (1-c_{\alpha})G^{0}_{Ni} \\+ RT \left( c_{\alpha}ln(c_{\alpha})+ (1-c_{\alpha})ln(1-c_{\alpha}) \right)\\+c_{\alpha}(1-c_{\alpha})\sum_{i=0}^{n} G_i (2c_{\alpha} - 1)^i \end{multline} \noindent where $V_m$, $R$ and $T$ represent the molar volume, ideal gas constant and temperature, respectively. $G_{Nb}^0$, $G_{Ni}^0$ are reference states of constituent elements. $G_i$ terms are coefficients contributing to excess Gibbs energy. The coefficients for each phase (i.e. $G_{Nb}^0$, $G_{Ni}^0$, and $G_i$) are obtained from \cite{joubert2004assessment}. The evolution equations of the phase concentrations, $c_{\alpha}$ and $c_{\beta}$, are derived through variational principles. The final form of the evolution equations of the phase concentrations: \begin{equation} \phi_{\alpha} \dot{c}_{\alpha} = \nabla(\phi_\alpha D_\alpha \nabla c_\alpha) + P^{intf} \phi_\alpha \phi_\beta \left( \frac{\partial f_\beta}{\partial c_\beta} - \frac{\partial f_\alpha}{\partial c_\alpha} \right) + \phi_\alpha \dot{\phi}_{\alpha} \left( c_\beta - c_\alpha \right) \label{eq:concentration_alp} \end{equation} \begin{equation} \phi_{\beta}\dot{c}_{\beta} = \nabla(\phi_\beta D_\beta \nabla c_\beta) + P^{intf} \phi_\alpha \phi_\beta \left( \frac{\partial f_\alpha}{\partial c_\alpha} - \frac{\partial f_\beta}{\partial c_\beta} \right) + \phi_\beta \dot{\phi}_{\beta} \left( c_\alpha - c_\beta \right) \label{eq:concentration_bet} \end{equation} \noindent where $D_{\alpha}$, $D_{\beta}$ are the chemical diffusivities in the $\alpha$ and $\beta$ phases, respectively, and $P^{intf}$ is the interface permeability defined as: $P^{intf}=\frac{8M}{a\eta}$. Here, $M$ is the atomic mobility and $a$ is the lattice constant. Further information on the physical meaning of the interface permeability, $P^{intf}$, can be found in the referenced papers \cite{steinbach2012phase,zhang2012phase}. Similarly, the evolution equations of the phase fractions, $\phi_{\alpha}$ and $\phi_{\beta}$, are derived through variational principles. The final evolution equation for the phase fraction $\phi_{\alpha}$ is: \begin{equation}\label{eqn:pfm_eqn} \dot{\phi_{\alpha}} = K \left \{ \sigma_{\alpha\beta} [ \nabla^2 \phi_\alpha + \frac{\pi^2}{\eta^2} (\phi_\alpha - \frac{1}{2} ) ] - \frac{\pi^2}{8\eta} \Delta g^{\phi}_{\alpha\beta} \right \} \end{equation} \begin{equation}\label{eq:permeability} K = \frac{8P^{intf}\eta\mu_{\alpha\beta}}{8P^{intf}\eta + \mu_{\alpha\beta} \pi^2 (c_\alpha - c_\beta)^2 } \end{equation} \begin{equation} \Delta g_{\alpha\beta}^{\phi} = f_\alpha - f_\beta + \left (\phi_\alpha \frac{\partial f_\alpha}{c_\alpha} - \phi_\beta \frac{\partial f_\beta}{c_\beta} \right) (c_\beta - c_\alpha) \end{equation} \noindent where, $\mu_{\alpha\beta}$ is the interfacial mobility, $K$ is the kinetic coefficient describing the effect of finite diffusion and redistribution at the interface and $\Delta_{\alpha\beta}^{\phi}$ is the chemical driving force. The evolution equation for $\phi_{\beta}$ can be easily obtained using the relationship: $\phi_{\beta}=1-\phi_{\alpha}$. Therefore, it is not explicitly demonstrated here. In order to model the cellular/dendritic structure, the phase field equation (Eq. \ref{eqn:pfm_eqn}) should be modified properly. Following the simplification suggested in \cite{steinbach2009phase}, the interfacial energy $\sigma_{\alpha\beta}$ and interface mobility $\mu_{\alpha\beta}$ terms are modified to their anisotropic forms as $\sigma_{\alpha\beta}^*(\vec{n})$ and $\mu_{\alpha\beta}^*(\vec{n})$, where $\vec{n}$ is the interface normal vector described as $\vec{n}=|\nabla\phi_\alpha|/\nabla\phi_\alpha$, in which $\alpha$ represents the solid phase. More explicitly, these two terms are described as: $\sigma^{*}_{\alpha\beta} (\vec{n}) = \sigma_{\alpha\beta}(\vec{n}) + \sigma^{''}_{\alpha\beta} (\vec{n})$, $\mu^{*}_{\alpha\beta} (\vec{n}) = \mu_{\alpha\beta} (\vec{n}) + \mu^{''}_{\alpha\beta} (\vec{n})$, where $\sigma^{''}_{\alpha\beta} (\vec{n})$ and $\mu^{''}_{\alpha\beta} (\vec{n})$ are the second derivatives of $\sigma^{''}_{\alpha\beta} (\vec{n})$ and $\mu^{''}_{\alpha\beta} (\vec{n})$ with respect to ($\vec{n}$). For the solid-liquid interface with 4-fold anisotropy, $\sigma_{\alpha\beta} (\vec{n})$ and $\mu_{\alpha\beta} (\vec{n})$ are approximated as: \begin{equation} \sigma_{\alpha\beta} (\vec{n}) = \sigma^{0}_{\alpha\beta} \left (1 - \epsilon [3-4(n_x^4+n_y^4]) ] \right ) \end{equation} \begin{equation} \mu_{\alpha\beta} (\vec{n}) = \mu^{0}_{\alpha\beta} \left (1 - \epsilon [3-4(n_x^4+n_y^4]) ] \right ) \end{equation} \noindent where $\sigma^{0}_{\alpha\beta}$, $\mu^{0}_{\alpha\beta}$ and $\epsilon$ are the interfacial energy coefficient, interface mobility coefficient and anisotropy coefficient, respectively. $n_x$ and $n_y$ represent the $x$ and $y$ components of the norm $\vec{n}$. To account for the varying temperature during solidification process, the frozen temperature approach is employed. It neglects the latent heat release during solidification and assumes a constant temperature gradient G. The temperature field along $y$ axis is calculated as: \begin{equation} T(y) = T_0 + G(y-Rt) \end{equation} \noindent where $T_0$ is the reference temperature, $R$ is the growth rate and $t$ is the time. This approach has been widely adopted in the literature to model directional solidification \cite{echebarria2004quantitative, takaki2014two}. \subsection{Computational Procedures}\label{Computation} \subsubsection{Macroscopic Thermal Model} Numerical simulation of the thermal history during L-PBF was implemented in COMSOL Multiphysics \textregistered~\cite{comsol}. A fine element with the size of (2 $\mu$m) was adopted in and around the melt pool, while relatively coarser elements were utilized at the further locations. The domain size was set to $7mm \times 1.5mm \times 1.5mm$ which is sufficiently large enough to negate boundary effects for any combination of power and speed simulated in this work. Single track laser melting simulations were run at varying laser power ($P$: 70-255 [W]) and laser speed ($\vec{v}$: 50-2300 [mm/s]). The values of $G$ and $R$ parameters were extracted from the these simulations to use as inputs for the PF model as illustrated in Fig. \ref{fig:fe_pf_coupling}. Both $G$ and $R$ are calculated on the trailing half of the melt pool which is the portion subject to solidification as the melt pool travels through the substrate at a constant velocity. As suggested in the frozen temperature approach, G is assumed to be constant in the simulation domain of the PF model and calculated from the partial derivatives of temperature with respect to each Cartesian coordinate with: \begin{equation} G=\sqrt{\Big(\frac{\partial T}{\partial x}\Big)^2+\Big(\frac{\partial T}{\partial y}\Big)^2 + \Big(\frac{\partial T}{\partial z}\Big)^2} \end{equation} The growth rate is geometrically derived as the projection of laser velocity $\vec{v}$ onto the normal vector of the solidification front using the angle ($\theta$) between said vectors \cite{wei_evolution_2015,lienert_fundamentals_2011}: \begin{equation} \label{eq:growth_rate} R = |\vec{v}| \cdot \cos{\theta} \end{equation} \begin{table}[!ht] \scriptsize \centering \caption{Material parameters used in the PF simulations} \label{tab:mat_pars} \begin{tabular}{lr} \toprule Parameters & Values \\ \midrule Grid spacing, $\Delta x$ ($nm$) & 8 \cite{ghosh2017primary} \\ Interface width, $\eta$ ($nm$) & $32$ \cite{ghosh2017primary}\\ Molar volume, $V_m$ ($cm^3/mol$) & 6.59 \cite{campbell2009high}\\ Interface energy, $\sigma_{\alpha\beta}$ ($J/cm^2$) & $1.3\times10^{-5}$ \\ Interface mobility, {$\mu_{\alpha\beta}$} ($cm^3/Js$) & 1 \\ Diffusivity of solid, $D_S$ ($cm^2/s$) & $1.0\times10^{-8}$ \cite{ghosh2017primary} \\ Diffusivity of liquid, $D_L$ ($cm^2/s$) & $3.0\times10^{-5}$ \cite{ghosh2017primary} \\ Interface permeability, $P^{intf}$ ($cm^3/Js$) & 8333 \\ Lattice constant, $a$ ($cm$) & $3.0\times10^{-8}$ \\ Atomic mobility, $M$ ($cm^5/Js$) & $1.0\times10^{-10}$ \\ Anisotropy coefficient, $\epsilon$ & 0.03 \cite{ghosh2017primary}\\ Equilibrium freezing range, $\Delta T$ ($K$) & 14 \cite{joubert2004assessment} \\ Equilibrium segregation coefficient, $ke$ & 0.68 \cite{joubert2004assessment} \\\bottomrule \end{tabular} \end{table} \subsubsection{Finite Interface Dissipation Phase Field Model} The phase-field and concentration evolution equations, \ref{eq:concentration_alp}, \ref{eq:concentration_bet}, \ref{eqn:pfm_eqn} are numerically solved using the finite difference method (forward in time, centered in space). A dynamic time step was adopted in the present work to ensure the numerical stability. The implemented dynamic time step algorithm enforces that the change in the concentration ($c_{\alpha/\beta}$) or phase field variables ($\phi_{\alpha/\beta}$) do not exceed 0.001, which is a conservative value. Here, the change is given by $\dot{z}\times \Delta t$ where $\dot{z}$ is the rate of change in variable $z$ ($z$: $c_{\alpha/\beta}$ or $\phi_{\alpha/\beta}$), and $\Delta t$ is the time step. $\Delta t$ is adjusted at each iteration depending on the value of $\dot{z}$. To prevent instability, a small $\Delta t$ is enforced for large $\dot{z}$, indicating a high driving force. On the other hand, a relatively larger $\Delta t$ is allowed for small $\dot{z}$, which enables faster computation as the driving force decreases. The numerical experiments revealed the maximum time step that ensures numerical stability being approximately $\Delta t=1.4\times10^{-11} s$, if a constant time step is adopted in the simulations. It was found out that, the overall performance of the implemented dynamic time step algorithm is much better since it increases the time step up to an order of magnitude higher than that of the value suggested from numerical experiments, as the driving force to evolve the system decreases. While this helped to accelerate the simulations to some extent, primarily it was achieved by adopting OpenMP parallelization approach. Here, it is worth noting that the phase field model is ill-defined for $\phi_{\alpha/\beta}=0$ and $\phi_{\alpha/\beta}=1$. To handle this, we use a threshold value in the code and check whether the calculated value of $\phi_{\alpha/\beta}$ being above or below the allowed range which is $[0.00001,0.9999]$. If the calculated value is beyond the threshold, it is then reset to the allowed maximum/minimum. To investigate the general features of the microstructure, a 2-dimensional simulation domain with the size of $616\Delta x$ by $4500\Delta y$ is utilized, where the grid spacing $\Delta x=\Delta y=0.008 \mu m$, resulting in a physical size of $\sim5 \mu m$ by $36 \mu m$, while a relatively smaller simulation domain with the size of $800\Delta x$ by $800\Delta y$ is adopted to study the effect of process parameters. No-flux boundary conditions are applied to all boundaries. The initial simulation domain consists of a thin layer of FCC-$\gamma$ solid at the bottom and a thick layer of liquid on the top. Initially, random perturbations are applied to the solid-liquid interface to promote cellular segregation structure. Initial Nb compositions of the solid and liquid are set to $c_s^0=c_s^{eq}=2.2\:(at.\% Nb)$ at ($T=T_0=1695K $) and $c_l^0=c_{alloy}=3.2\:(at.\% Nb)$. The material parameters used in the simulations are listed in Table \ref{tab:mat_pars}. Note that in the present work, the parameters employed in Ghosh et al. \cite{ghosh2017primary} have been adopted as much as possible to be able to compare the results from the finite interface dissipation PF model with those predicted by the conventional PF model as presented in \cite{ghosh2017primary}. Here, it is worth noting that the value of M in the present work is estimated according to $D_{\alpha}=\frac{M R T}{Vm}$ \cite{duong2015integrated}, where $D_\alpha$ refers to $D_S$ or $D_L$. Once the values of the parameters are plugged into this equation, the value of $M$ is found to be within the range of $10^{-12}-10^{-9} [cm^5/Js]$, where the lower and upper limits are determined by $D_S$ and $D_L$, respectively. Considering the given limits, the value of $M$ is set to $1.0 \times 10^{-10} cm^5/Js$ in the present work. The chemical free energies of each phase are expressed within the CALPHAD formalism \cite{saunders1998calphad} as described in Eq. \ref{eqn:gibbs}, using the thermodynamic data given in \cite{joubert2004assessment}. The phase diagram of the binary Ni-Nb alloy created in Thermocalc Software utilizing the data from \cite{joubert2004assessment} can be seen in Fig. \ref{fig:phase_diagram}. The frozen temperature approach as described above is used to model the influence of the temperature. Varying values of temperature gradient, $G$, and growth rate, $R$, obtained from the thermal model, with the order of magnitudes varying from $10^6 K/m$ to $10^8 K/m$, and $10^{-3} m/s$ to $1 m/s$, respectively, are fed into the PF model to investigate the morphology, size of cellular segregation structure, and segregation of the simulated microstructures. \section{Results and Discussion}\label{sec:result} Energy density is often employed as a metric to determine the printability range of L-PBF manufactured components. A number of energy density formulations using different process parameters (e.g., laser power, laser speed, hatch spacing, layer thickness, laser beam diameter) have been defined and adopted in the current literature. A thorough discussion on the success and limitation of the energy density formulations as a design parameter can be found elsewhere \cite{bertoli2017limitations,mahmoudi2018printability}. Keeping those limitations in mind, for simplification we use the linear energy density (LED)-based categorization (e.g. low LED, high LED) while discussing the effect of laser power ($P$) and speed ($\vec{v}$) on the melt pool characteristics (e.g. melt pool size, geometry, temperature gradient, cooling rate) and microstructure (e.g. morphology, size of cellular segregation structure, segregation). LED in this work is calculated by: \begin{equation} LED=\frac{P}{\vec{v}} \end{equation} \subsection{Macrostructure Characterization: Experiments} For the experimental validation, three sets of process parameters are selected. Figure \ref{fig:experiment_melt_pool} shows optical micrographs of transverse cross-sections of single track laser melts using these three parameter sets: (a) $P$: 162 W, $\vec{v}$: 957 mm/s, LED (low): 0.169 J/mm (b) $P$: 96 W, $\vec{v}$: 67 mm/s, LED (medium): 1.43 J/mm (c) $P$: 122 W, $\vec{v}$: 50 mm/s, LED (high): 2.44 J/mm as listed in Table \ref{tab:proc_param}. The optical micrographs demonstrate a variation in the melt pool size and geometry depending on variation in the values of LED. The melt pool widths are measured as $98\pm1 \mu m$ , $288\pm9 \mu m$ , and $354\pm11 \mu m$, while the melt pool depths are measured as $49\pm2 \mu m$, $178\pm6 \mu m$, and $322\pm4 \mu m$, respectively for low, medium and high LED cases as listed in Table \ref{tab:melt_dim}. From left to right in Fig. \ref{fig:experiment_melt_pool}, an increase in both melt pool width and depth is revealed due to the increase in the LED. Note that the experimental uncertainty denotes one standard deviation from the mean. Typically there are three laser heating modes that influence the melt pool geometry: conduction mode, transition keyhole mode, and keyhole (penetration) mode. Conduction mode heating occurs at low LED and is characterized by wide and shallow melt pool shape. Transition keyhole mode occurs at medium LED and results in a melt pool with an aspect ratio (depth/width) of around 1. Keyhole mode heating occurs at high LED and is characterized by deep melt pools with a large aspect ratio typically greater than 1.5 \cite{roehling2018rapid}. The optical micrographs reveal a clear trend from conduction to transition keyhole mode heating as the LED increases from left to right in Fig. \ref{fig:experiment_melt_pool}. Note that, within the range of $P: 70-255$ [W] and $\vec{v}: 50-2300$ [mm/s] used in the present work, conduction mode heating was achieved in the majority of single track experiments. All the successful prints with $P<100$ W or $\vec{v}>957$ mm/s revealed conduction mode heating, while varying heating modes were achieved depending on the combination of $P$ and $\vec{v}$. It is apparent from these results that a variation in process parameters leads to a variation in melt pool characteristics, and in turn the solidification microstructure. \begin{figure*}[!hbt] \centering \includegraphics[width=1\textwidth]{images/after_revision/experiment_melt_pool.jpeg} \caption{Optical micrographs demonstrating transverse cross-sections of melt pool obtained under (a) $P$: 162 W, $\vec{v}$: 957 mm/s, LED (low): 0.169 J/mm (b) $P$: 96 W, $\vec{v}$: 67 mm/s, LED (medium): 1.43 J/mm (c) $P$: 122 W, $\vec{v}$: 50 mm/s, LED (high): 2.44 J/mm. From left, to right a clear transition from conduction mode to keyhole mode is shown.} \label{fig:experiment_melt_pool} \end{figure*} \begin{table}[!ht] \scriptsize \centering \caption{Process Parameters used in the Single-Track Laser Melting Experiments} \label{tab:proc_param} \begin{tabular}{ccc} \toprule Laser Power [W] & Laser Speed [mm/s] & Linear Energy Density [J/mm]\\ \midrule 162 & 957 & 0.169 (low)\\ 96 & 67 & 1.43 (medium) \\ 122 & 50 & 2.44 (high)\\\bottomrule \end{tabular} \end{table} \begin{table}[!ht] \scriptsize \centering \caption{Measurements of the Melt Pool Dimensions under Varying Processing Conditions as listed in Table \ref{tab:proc_param}} \label{tab:melt_dim} \begin{tabular}{ccc} \toprule Melt Pool Width [$\mu m$] & Melt Pool Depth [$\mu m$] & Linear Energy Density [J/mm]\\ \midrule $98\pm1$ & $49\pm2$ & 0.169 (low)\\ $288\pm9$ & $178\pm6$ & 1.43 (medium) \\ $354\pm11$ & $322\pm4$ & 2.44 (high)\\\bottomrule \end{tabular} \end{table} \begin{figure*}[!ht] \centering \includegraphics[width=1.05\textwidth]{images/after_revision/experiment_wds_sem_linescan_v3.jpeg} \caption{The microstructure of the selected rectangular regions in Fig. \ref{fig:experiment_melt_pool} are characterized using SEM (left column), WDS line scans(middle column), and WDS maps (right column). SEM images show cellular and planar morphologies for the corresponding LED conditions in Fig. \ref{fig:experiment_melt_pool}.} \label{fig:experiment_wds_sem} \end{figure*} \subsection{Microstructure Characterization: Experiments} Multiple regions from the melt pools indicated with small rectangles in Fig. \ref{fig:experiment_melt_pool} are selected and characterized using SEM and WDS techniques as shown in Fig. \ref{fig:experiment_wds_sem}. SEM micrographs of the selected regions reveal two types of growth structures: cellular and planar. The SEM micrograph (Fig.~\ref{fig:experiment_wds_sem} (a)) corresponding to the ``Top Right'' position under ``High LED'' (see Fig. \ref{fig:experiment_melt_pool} (c)) presents a cellular structure growing normal to the fusion boundary and antiparallel to the heat flux direction. The appearance of columnar cells indicates the directional growth in a positive temperature gradient \cite{kurz1989fundamentals}. Cells are also visible in the WDS maps of the corresponding region (as shown in Fig. \ref{fig:experiment_wds_sem} (c)) due to composition differences between the cell cores and walls. This variation in the composition is the result of solute rejection by the growing cells. The WDS map indicates that cell walls are Nb-rich while cell cores are Ni-rich. Cell growth rates can vary from below the limit of constitutional supercooling to beyond the limit of absolute stability \cite{kurz1989fundamentals}. It is worth noting that the fusion boundary with Nb depletion in the WDS map (see Fig.~\ref{fig:experiment_wds_sem} (c)) is indicative of the local equilibrium planar structure. The appearance of planar structure near the fusion boundary can be explained due to the presence of extremely low growth rates. Solidification starts near the fusion boundary once the temperature is below the liquidus temperature (1701 K for the alloy composition of 3.2\:(at.\% Nb) used in the present work \cite{joubert2004assessment}). According to the phase diagram \cite{joubert2004assessment}, the equilibrium composition of the solid phase just below the solidus temperature is around 2.2\:(at.\% Nb), which agrees well with the low Nb composition shown in the planar region at the WDS map. This planar structure quickly transitions to a cellular structure as the temperature decreases below the liquidus temperature and the growth rate exceeds the limit of constitutional supercooling. The constitutional supercooling criteria will further be discussed in the following subsections. Cellular segregation structure is also revealed in the SEM micrograph (Fig. \ref{fig:experiment_wds_sem} (d)), and WDS map (Fig. \ref{fig:experiment_wds_sem} (f)) corresponding to the ``Top'' position under ``High LED'' as shown in Fig. \ref{fig:experiment_melt_pool} (c). It is apparent that these images are different from those shown for the ``Top Right'' region of the same melt pool (see Fig. \ref{fig:experiment_melt_pool} (c)), and one can argue whether this structure is cellular or equiaxed dendritic. It is assumed that the tail of the melt pool exhibits a solidification growth rate equal to the laser scan speed (according to Eq. \ref{eq:growth_rate}). We propose that the structure shown at the ``Top'' region under ``High LED'' to be the transverse section of cells growing near the top surface (illustrated as the circular structures in Fig. \ref{fig:cell_illustration} (b)) with a growth rate close to the laser scan speed due to the following reasons. First, the size of the equiaxed dendrites typically are different from each other due to the variation in the nucleation time of each dendrite. However, the similar sizes of the microstructural features that appear in the top region suggests these structures to be cells at steady state condition. Second, according to classical $G$ versus $R$ analysis \cite{kou2003welding}, equiaxed dendrites are formed under low G/R while cells are stable at a higher G/R. Thermal model simulations predicted a higher G/R at the ``Top'' region compared to the ``Top Right'' region ``suggesting'' the structure at the ``Top'' region to be cellular. In the ``Low LED'' case, the SEM micrograph (Fig.~\ref{fig:experiment_wds_sem} (g)) corresponding to the ``Top'' region of the melt pool (see (Fig.~\ref{fig:experiment_melt_pool} (a)) reveals a planar structure with a uniform composition as shown in the corresponding WDS map (Fig.~\ref{fig:experiment_wds_sem} (i)). \begin{figure}[!ht] \centering \includegraphics[width=1\columnwidth]{images/after_revision/Cell_Illistration_2view.jpeg} \caption{The formation of cellular structures is shown in (a) longitudinal section (b) transverse section of melt pool. Depending on the orientation of the cells, two different view of cellular structure (columnar and circular) is observed in the transverse section of melt pool.} \label{fig:cell_illustration} \end{figure} To compare the composition variations in the aforementioned three regions, line scans (the middle column in Fig.~\ref{fig:experiment_wds_sem}) are extracted from the corresponding WDS maps (the right column in Fig.~\ref{fig:experiment_wds_sem}). The corresponding locations of these line scans are indicated with dashed lines in yellow color in the SEM micrographs (the left column in Fig.~\ref{fig:experiment_wds_sem}). For the cellular structures, the maximum segregation is measured to be Ni-5 at.\% Nb based on 40 different line scans obtained from the WDS maps of different regions in a melt pool. This is also clearly visible in the WDS Line Scans . Local composition in the planar melt pool structure displays small fluctuations in the data attributable to noise, however, the maximum composition is shown to be much lower than the value obtained from that of the cellular structure. In each figure, the alloy composition of Ni-3.2 at.\% Nb is shown (with a dashed line in black color ) as a reference. These results indicate that the microstructure varies locally in a single melt pool (e.g. planar vs. cellular in ``High LED'') under constant process parameters as well as from melt pool to melt pool (e.g. planar in ``Low LED'' vs cellular in ``High LED'') depending on the variation in the applied process parameters. \subsection{General Features of the Microstructure} \begin{figure}[ht] \centering \includegraphics[width=0.9\columnwidth]{images/after_revision/typical_micro_with_ABClines.jpeg} \caption{Typical cellular microstructure forms under L-PBF condition. Nb concentration varies along line A (a), B (b), and C (c).} \label{fig:typical_micro} \end{figure} \begin{figure}[ht!] \centering \includegraphics[width=1\columnwidth]{images/after_revision/interface_undercooling_speed.jpeg} \caption{Phase field evolution of the tip velocity and tip undercooling with time.} \label{fig:interf_vel_undercool} \end{figure} Understanding non-planar interfaces (cellular and dendritic) is essential since these segregation structures lead to microsegregation and secondary-phase formation, which affect the mechanical properties and performance of the solidified material. The characteristic features of a typical non-planar interface (cellular) under AM conditions will be discussed in the following paragraphs. Figure \ref{fig:typical_micro} (a) represents a typical cellular microstructure predicted in our simulations with the values of $G=3\times10^6 K/m$ and $R=0.03 m/s$. Note that, these values of $G$ and $R$ and in turn the simulated microstructure correspond to a particular location in the melt pool. Variation in the morphology and size of the microstructural features under varying $G$ and $R$ across the melt pool will be discussed in the Section \ref{sec:Micro_Var}. The simulation domain was initialized with a thin layer of solid $FCC-\gamma$ at the bottom and liquid with the composition of Ni-3.2 at.\% Nb on top. The initial solid-liquid interface is perturbed randomly to promote the growth of the cellular structure. A number of small cells appear at the fluctuated interface and grow into the liquid in the direction of applied temperature gradient. As solidification advances, competitive growth at the cell fronts occurs and only a few of these fronts become primary cells. The primary dendrite arm spacing (PDAS) varies at the initial stages and remains constant once the steady state is reached. At this stage, the cell tips advance at a constant velocity and constant temperature as shown in Fig. \ref{fig:interf_vel_undercool}. Note that the interface velocity reaches the the applied solidification growth rate $R=0.03m/s$ at steady state. Solute microsegregation is a typical phenomenon observed in the rapid solidification process and has significant influence on the mechanical properties of the solidified material. As cells grow, Nb is rejected into the liquid, resulting in Nb enriched intercellular regions as shown in Fig. \ref{fig:typical_micro} (a). The Nb enriched liquid droplets appearing along the cell grooves as solidification advances are also shown in Fig. \ref{fig:typical_micro}. With time, these Nb enriched droplets may transform to secondary phases such as $Ni_3Nb$ if the amount of microsegregation is enough to promote the nucleation and growth of this phase. The Scheil simulations~\cite{keller2017application} indicated that for the selected alloy composition (Ni-3.2 at.\% Nb), at least Ni-7 at.\% Nb is needed for such a transformation to occur. However, the Nb amount in those droplets have not reached the levels needed for the precipitation of the secondary phases. In order to investigate solute segregation, three lines denoted by $A$, $B$, $C$ are selected in Fig. \ref{fig:typical_micro} (a) and the corresponding Nb concentration profiles along the selected lines are presented in Fig. \ref{fig:typical_micro}(b) to \ref{fig:typical_micro}(d). Figure \ref{fig:typical_micro}(b) demonstrates the Nb concentration variations through the core of the cell into the liquid along the growth direction $y$ (line A in Fig. \ref{fig:typical_micro} (a)). The left side of this profile denoted by $c_s^{*}$ corresponds to the concentration in the cell core near the solid-liquid interface (cell tip), while the spike denoted by $c_{max}$ represents the concentration at the liquid side of the interface. Beyond this, the concentration of Nb decreases rapidly and eventually reaches the far-field liquid composition given by $c_0$. In Fig. \ref{fig:typical_micro} (c), the Nb concentration variation is shown along the intercellular region (line B in Fig. \ref{fig:typical_micro} (a)). Nb concentration gradually decreases in the growth direction $y$ along the intercellular region and reaches the far-field liquid concentration of Ni-3.2 at.\% Nb beyond the cell tips. The slope of the linearly decaying part, between $28 \mu m$ and $30 \mu m$, in Fig. \ref{fig:typical_micro}(c) is calculated to be 3.33$\%/\mu$m. An analytical solution to obtain the solute concentration gradient in the intercellular region was reported by \cite{bower1966measurements}. Ignoring the interface curvature effects, the concentration gradient in the above region can be estimated by $dc/dx = G/m$, where $G$ is the applied temperature gradient,$m$ is the liquidus slope. $G$ and $m$ in this work are $3\times10^6K/m$ and $-869 K/\%$, respectively. Substituting the values in the equation, the solute concentration gradient is found to be 3.45$\%/\mu$m, which agrees well with the calculated value. In Fig. \ref{fig:typical_micro}(d), the Nb concentration variation is presented perpendicular to the growth direction (line C in Fig. \ref{fig:typical_micro} (a)). Here, the top and bottom of the U-shaped profile correspond to the Nb concentration in the intercellular regions and the cell cores, respectively. Note that $c_s^{*}$ in Fig. \ref{fig:typical_micro}(b) corresponds to the bottom of the U-shaped profile, representing the concentration at the cell core. It is observed that the concentration at the intercellular region is much higher than the concentration inside the cell cores. This happens due to the fact that the solute is rejected from the growing cells into the liquid and since the growth of cells happens rapidly, there is no time for the solutes to diffuse back and eventually enrichment of Nb occurs. \subsection{Microstructural Variability as a Function of Thermal Parameters ($G$, $R$)}\label{sec:Micro_Var} \begin{figure}[!t] \centering \includegraphics[width=1\columnwidth]{images/after_revision/GV_map_Vcs_Vab_new.jpeg} \caption{The variation in morphology, size of cellular segregation structure , and microsegregation as a function of growth rate and temperature gradient is shown.} \label{fig:GV_map} \end{figure} \begin{figure*}[!hb] \centering \subfloat[]{\includegraphics[width=0.5\textwidth]{images/after_revision/aziz_trapping_revised.jpeg}} \subfloat[]{\includegraphics[width=0.5\textwidth]{images/after_revision/pdas_vs_cooling_with_exp_revised.jpeg}} \caption{The calculated primary dendrite arm spacing (PDAS) reduces as the cooling rate increases.As the solidification growth rate $R$ increases the segregation coefficient increases. } \label{fig:kv_vs_speed} \end{figure*} \begin{figure*}[!ht] \centering \subfloat[]{\includegraphics[width=0.5\textwidth]{images/after_revision/highLED_depth_RG_v2.jpeg}} \subfloat[]{\includegraphics[width=0.5\textwidth]{images/after_revision/lowLED_depth_RG_v2.jpeg}}\\ \caption{The predicted temperature gradient, $G$ and growth rate, $R$ along the centerline of melt pool boundary are shown for varying solidification front depths for two set of process parameters.The melt pool schematics with blue dots demonstrating the representative locations of $G$ and $R$ predictions are also included for each case.} \label{fig:GR_longi} \end{figure*} \begin{figure*}[!ht] \centering \includegraphics[width=0.8\textwidth]{images/after_revision/high_low_LED_depth_cooling_v2.jpeg} \raisebox{0.2cm}{\includegraphics[width=0.8\textwidth]{images/after_revision/meltpool_colorbar.jpeg}} \caption{The predicted cooling rates at varying solidification front depths are shown for two set of process parameters.The oblique view of predicted melt pool geometries along with the locations of highest and lowest cooling rates throughout the centerline of melt pools are also demonstrated. The red arrows located on the front side of the melt pools point the direction of the moving laser heat source for each case.} \label{fig:cooling_vs_depth} \end{figure*} The temperature gradient, $G$, and the solidification growth rate, $R$, are the most significant parameters in determining the solidification microstructure. The ratio of these parameters, $G/R$, determines the morphology of the solidification microstructure (e.g. planar, cellular, columnar dendritic, and equiaxed dendritic), while the product of these parameters $G\times R$, the cooling rate $\dot T$, determines the size of the microstructure (the higher the cooling rate the finer the structure is). \begin{figure*}[ht!] \centering \includegraphics[width=0.85\textwidth]{images/after_revision/MP_bound_GR.png} \caption{Variation in the $G$ and $R$ are shown across the melt pool.} \label{fig:3d_melt_pool} \end{figure*} A solidification morphology selection map for Ni-3.2 at.\% Nb demonstrating the variation in the morphology and size of cellular segregation structure as a function of $G$ and $R$ is illustrated in Fig. \ref{fig:GV_map}. For the selected alloy composition under the L-PBF process with varying $P$ and $\vec{v}$, two types of growth morphologies, planar and cellular, are predicted. As the growth rate increases, a transition from planar to cellular and again to planar morphology is predicted. Typically, the constitutional supercooling criterion~\cite{kurz1989fundamentals} and the absolute stability criterion~\cite{kurz1989fundamentals} are utilized to roughly estimate these limits of growth rates in between which the cellular morphology is stable, given by $V_{cs} < R < V_{ab}$. Here, the lower limit is determined by the constitutional supercooling criterion, $V_{cs}=\frac{G D_L}{\Delta T}$, while the upper limit is approximated by the absolute stability criterion, $V_{ab}=\frac{\Delta T D_L}{ke \Gamma}$, where $\Delta T$, $ke$, $\Gamma$ are the equilibrium freezing range, equilibrium segregation coefficient, and Gibbs-Thomson coefficient, respectively. Beyond these limits, a planar structure becomes stable (either for low growth rates ($R < V_{cs}$) or for extremely high growth rates ($R > V_{ab}$)). The aforementioned solidification limits are determined in two ways: the classical theory (linear solid lines) and PF simulations. The theoretically determined limits are indicated with $V_{cs}^{\star}$ and $V_{ab}^{\star}$, while the limits predicted by PF simulations are indicated with $V_{cs}$ and $V_{ab}$ as shown in Fig. \ref{fig:GV_map}. Note that the boundaries for $V_{cs}$ and $V_{ab}$ are established based on $\approx$ $70$ simulations at different $G$ and $R$ conditions. The predicted growth morphologies (e.g. cellular vs planar) for each $G-R$ combination were marked in the solidification map. The planar/cellular boundary is then roughly determined. A triangular region in the middle of the map is indicated as cellular in both cases. Less than an order of magnitude difference is shown between the lower and upper limits predicted from model and theory especially for high $G$ conditions, while much better agreement is achieved as $G$ decreases. Note that the theory gives a rough estimate of the limits and has some limitations. For example, the constitutional supercooling criterion ignores the effect of surface tension, which is considered in our PF simulations. Also, the absolute stability criterion has other limitations. For instance, it accounts only for the species diffusion in the liquid and thus neglects solid diffusion, which is taken into account in PF predictions. Therefore, we believe that the theoretical predictions are less accurate, especially under rapid solidification conditions. In addition to the type of growth structures (planar and cellular), the presented solidification map in Fig. \ref{fig:GV_map} can be utilized to gain information on the variation in size of cells (PDAS) and microsegregation ($k_v$) as a function of $G$ and $R$. Note that the PDAS predictions reported in the present work are their average values, calculated by dividing the number of cells at the steady state to the width of the simulation domain, similar to those reported in the previous research efforts \cite{ghosh2017primary}. As the cooling rate increases (from the bottom left corner to the top right corner), PDAS is reduced (within $V_{cs}<R<_{Vab}$) and finally the interface re-stabilizes and a segregation-free planar structure is achieved (beyond $R>V_{ab}$). In the majority of current literature, a cellular/dendritic structure with nonuniform properties is predicted/observed as the typical growth structure under AM \cite{ghosh2017primary,acharya2017prediction,kundin2019microstructure}. We emphasize the possibility of a planar structure with uniform properties at high cooling rates ($~10^7-10^8 K/s$). Increasing the cooling rate or growth rate results in a decrease in the calculated $k_v$. Under equilibrium conditions in the selected alloy $k_v$ can be calculated as $k_e=0.68$. Our simulations demonstrated that $k_v=k_e$ with $c_s^0=c_s^{eq}$ is achieved only for the low growth rates, observed near the fusion boundary, and resulted in a planar growth structure as demonstrated in top left image in Fig. \ref{fig:GV_map}. This finding agrees well with the Nb depleted region near the fusion boundary as presented in Fig. \ref{fig:experiment_wds_sem}. Beyond the fusion boundary and through the center line of the track, the growth rate is much higher and the resultant segregation coefficient given by $k_v$ diverges from the equilibrium value and eventually reaches $k_v~=1$, indicating the full solute trapping condition, which takes place during rapid solidification beyond the velocity limit of absolute stability ($R>>V_{ab}$) as displayed in the top right image in Fig. \ref{fig:GV_map}. The inset images in Fig. \ref{fig:GV_map} illustrate the variation in the concentration profile (in mole fraction Nb) and the calculated $k_v$ for the representative microstructure predictions. It is shown that as cooling rate/growth rate increases, the peak of the profile reduces while the concentration at the left and right side of the profile approach and become equal with the value of $c_0$ and $k_v~=1$, indicating solute trapping. It should be noted that the finite interface dissipation PF model utilized is well suited to study the rapid solidification phenomenon such as solute trapping. By adjusting the permeability parameter $P^{intf}$ (Eq.~\ref{eq:permeability}), we can quantify the solute trapping behavior, as well as the non-equilibrium segregation coefficient. The influence of permeability on calculated $kv$ will be shown in Section \ref{effect_of_perm}. \begin{figure*}[!ht] \centering \subfloat[]{\includegraphics[width=0.3\textwidth]{images/after_revision/highLED_melt_pool_cross.jpeg}} \subfloat[]{\includegraphics[width=0.3\textwidth]{images/after_revision/lowLED_melt_pool_cross.jpeg}} \caption{The calculated G and R along the transverse section of the melt pool boundary are shown for two set of process parameters with different linear energy densities (LED).} \label{fig:transverse_melt_pool_GR} \end{figure*} The variation in PDAS and $k_v$ as a function of $G$ and $R$ are further analyzed in Fig. \ref{fig:kv_vs_speed}. As discussed in the above paragraphs, during rapid solidification the system deviates from local equilibrium. To quantify this deviation, the velocity-dependent partition coefficient $k_v$, given by: $k_v(R)=c_s^*/c_{max}$ \cite{danilov2006phase} is plotted against the growth rate as shown in Fig. \ref{fig:kv_vs_speed}(a). The horizontal line in Fig. \ref{fig:kv_vs_speed}(a) represents the equilibrium segregation coefficient of the NiNb alloy. As the solidification growth rate $R$ increases, the calculated segregation coefficient deviates from this value and approaches to 1 beyond the velocity limit of absolute stability indicated with a vertical dashed line in Fig. \ref{fig:kv_vs_speed}(a). Above this limit, the solid-liquid interface restabilizes to a planar interface. Fig. \ref{fig:kv_vs_speed}(b) presents the variation in predicted PDAS with respect to the cooling rate ($G\times R$) along with a fitted line and experimental measurements obtained from the regions with cellular structure as presented in Fig. \ref{fig:mid_led_valid} and \ref{fig:high_led_valid}. The theoretical analysis \cite{hunt1979cellular,kurz1981dendrite} suggests that the PDAS decreases as the cooling rate ($G\times R$) increases. In the present work, the simulation results reveal a clear trend and agree with the theory. A similar trend is also observed for the experimentally measured PDAS excluding the first data point with an average PDAS of $0.26 \mu m$. It is worth mentioning that the first two experimental data points in Fig. \ref{fig:kv_vs_speed}(b) were taken from the same region of a single melt pool (from the top right in high LED melt pool as shown in Fig. \ref{fig:high_led_valid}) with slightly different locations. The FE model predicts similar cooling rates for each location. Therefore, similar PDAS are expected. However, the measured PDAS for these two locations were found to be clearly different (i.e. $\approx 0.26 \mu m$ and $\approx 0.58 \mu m$), contrary to expectations. Among all experimental data points presented in Fig. \ref{fig:kv_vs_speed}(b), these two points are anticipated to show the highest PDAS measurements due to the lowest cooling rates predicted by FE model. The measurement of $0.58 \mu m$ corresponds more closely to our microstructural predictions and expectations based on the predicted $G \times R$ value in the region compared to the value of $0.26 \mu m$, hence the latter is believed to be an outlier. Considering the uncertainties associated with the experiments as well as the model, it is not straightforward to explain the main reason of the outlier. This could be due to the simplified FE model assumptions (e.g. neglecting fluid flow), or uncertainties in the experiments (e.g. the possible local fluctuations in temperature gradient, unknown orientation of grains, etc.). The typical cooling rate under AM ranges from $10^5 K/s$ to $10^8 K/s$ depending on the process parameters and the location in the melt pool. The predicted PDAS varies from $0.58 \mu m$ to $0.2 \mu m$, as the cooling rate increases from $10^5 K/s$ to $3.5\times10^6 K/s$. Above this, a transition from cellular to planar interface is observed. Note that, although both increasing $G$ and $R$ leads to an increase in the cooling rate ($G \times R$), hence smaller PDAS, their effects might be different. For example, at $G=5\times10^5 K/m$ and $R=3\times10^{-1} m/s$ fine cellular structure is observed with the PDAS of $0.3 \mu m$ while a planar structure for $R < V_{cs}$ is observed at $G=1.5\times10^7 K/m$ and $R=1\times10^{-2} m/s$. Although in both cases the cooling rate is calculated as $G \times R=1.5\times10^5 K/s$, two different growth structures are observed. In another example with the condition of $G=5\times10^5 K/m$ and $R=1\times10^{-1} m/s$ results in a PDAS of $0.4 \mu m$, whereas $G=5\times10^6 K/m$ and $R=1\times10^{-2} m/s$ leads to a PDAS of $1 \mu m$. Therefore, one should be careful using PDAS vs. cooling rate information when there are a few orders of magnitude variation in $G$. On the other hand, by keeping the $G$ constant and varying $R$, a consistent correlation between PDAS and cooling rate can be obtained. Note that, Fig. \ref{fig:kv_vs_speed} (b) is created by varying $G$ within the range of $10^6-10^7 K/m$ and $R$ from $R=10^{-2} m/s$ to $R=10^{-1} m/s$. Therefore, the information provided in this plot will be valid only for the given ranges of $G$ and $R$. \subsection{Microstructural Variability as a Function of Process Parameters} Microstructural features vary spatially within a single melt pool as well as from melt pool to melt pool depending on the process parameters applied. It is therefore essential to understand and control these variabilities by tailoring the process parameters so that a final product with desired properties can be achieved. In this subsection, the influence of process parameters on the thermal parameters ($G$, $R$) will be discussed first, followed by a description of the microstructural features as a function of these estimated thermal parameters. \begin{figure}[!htb] \centering \includegraphics[width=1\columnwidth]{images/after_revision/High_LED_Map_v2.jpeg} \caption{Variation in the cellular structure and size at varying cooling rates along the melt pool boundary is shown for high LED condition.} \label{fig:high_led} \end{figure} \begin{figure}[!ht] \centering \includegraphics[width=0.9\columnwidth]{images/after_revision/Low_LED_Map_v2.jpeg} \caption{Variation in the solidification structure and size at varying cooling rates along the melt pool boundary is shown for low LED condition. A transition from cell to plane structure is observed at high cooling rates.} \label{fig:low_led} \end{figure} \subsubsection{Effects of Temperature Gradient, Growth Rate, and Cooling Rate} Single track laser melting simulations were run at varying laser power ($P: 70-255 [W]$) and laser speed ($\vec{v}: 50-2300 [mm/s]$). To investigate spatial variations in the microstructural features, the output $G$ and $R$ were predicted both along the longitudinal section and transverse section of the resultant melt pool. Fig.~\ref{fig:GR_longi} represents an example of output $G$ and $R$ for two sets of $P$ and $\vec{v}$ along the longitudinal section of the melt pool boundary, corresponding to high and low LED cases. The melt pool schematics with blue dots demonstrating the representative locations of $G$ and $R$ predictions along the centerline of melt pool boundary are also included for each case. Depending on the location of the melt pool, the calculated G and R varied within the range of [$3\times10^6 K/m - 5\times10^7 K/m$] and [$3\times10^{-5} m/s - 1 m/s$], respectively. The maximum $R$ is calculated near the top of the melt pool (with a low solidification front depth) while the minimum is found near the bottom of the melt pool (with a high solidification front depth). In contrast, the maximum $G$ is calculated at the bottom of the melt pool as the minimum $G$ is observed at the top. \begin{figure}[!ht] \centering \includegraphics[width=0.8\columnwidth]{images/after_revision/low_led_validation.jpeg} \caption{The predicted growth morphology and size throughout the melt pool are demonstrated along with the experimental measurements. Planar structure is observed throughout the melt pool. ($P$: 162 W, $\vec{v}$: 957 mm/s, LED: 0.169 J/mm)} \label{fig:low_led_valid} \end{figure} Due to the inverse relationship between solidification front depth and $R$, and the proportionality between front depth and $G$, it is not clear from Fig. \ref{fig:GR_longi} how the resultant cooling rate $\dot T = G\times R$ will vary as a function of the depth. In figure \ref{fig:cooling_vs_depth}, the variation of $\dot T$ along with the centerline of melt pool boundary with increasing depth is explicitly shown for the same process parameters as in Fig. \ref{fig:GR_longi}. The oblique view of predicted melt pool geometries along with the locations of highest and lowest cooling rates throughout the centerline of melt pools are also demonstrated. The red arrows located on the front side of the melt pools point the direction of the moving laser heat source for each case. On the left, an example of a high LED case is shown, while on the right a low LED case is presented. In both cases, the cooling rate increases as we move from the bottom to the top along the melt pool boundary. Predicted cooling rate varies as a function of LED. Lower LED tends to show higher rates of cooling. While the maximum predicted cooling rate in the high LED case is around $\dot T=1.5\times10^7K/s$, the maximum rate of cooling for low LED is $\dot T=7\times10^7K/s$. Variations in the cooling rate affect the solidification microstructure, which will be discussed in the following sections. Fig. \ref{fig:3d_melt_pool} presents a top, side (longitudinal), cross-section (transverse), and oblique views of the three dimensional melt pool at $P$:162 [W] and $\vec{v}$: 500 [mm/s], demonstrating the local variation in the $G$ and $R$ throughout the melt pool boundary. The same trend for $G$ and $R$ as presented in Fig. \ref{fig:GR_longi} is shown along the centerline of melt pool boundary in the longitudinal view (as the depth increases along the melt pool boundary, $G$ increases while $R$ decreases). Note that, the longitudinal view in Fig. \ref{fig:3d_melt_pool} provides the predictions of $G$ and $R$ along the entire melt pool boundary (including both centerline and points away from the centerline).It can be inferred that while $R$ shows a clear dependence on both lateral position and depth, $G$ has a strong dependence on depth only. \begin{figure}[!ht] \centering \includegraphics[width=1\columnwidth]{images/after_revision/mid_led_validation_v2.jpeg} \caption{The predicted growth morphology and size throughout the melt pool are demonstrated along with the experimental measurements. Cellular structure is observed throughout the melt pool. ($P$: 96 W, $\vec{v}$: 67 mm/s, LED: 1.43 J/mm)} \label{fig:mid_led_valid} \end{figure} In addition, the local variation in $G$ and $R$ across the melt pool can be seen in the left and right half of the cross-sectional view in Fig. \ref{fig:3d_melt_pool}, respectively. $G$ increases from top ($1.5\times10^6 K/m$) to bottom ($4.8\times10^7 K/m$) across the melt pool with the minimum and the maximum being at the top (left) edge and the bottom of the melt pool, respectively. In contrast, $R$ reduces from the top to the bottom as well as from the interior of the melt pool to the edge of the melt pool. In the present work, an experimental analysis of the microstructure is performed at the transverse cross-sections of the melt pool. Therefore, the $G$ and $R$ data across the transverse cross-section will be utilized for the validation purposes. To predict the spatial variation in the microstructural features across the transverse section, $G$ and $R$ data at corresponding locations are extracted from the associated melt pools (Fig. \ref{fig:transverse_melt_pool_GR}). For the experimental validation, we will be using three different cases: low, medium and high LED. Here, we show the variation in $G$ and $R$ for the low and high LED cases as an example. The $G$ and $R$ data needed for the medium LED case is also extracted from the associated melt pool, but not explicitly shown here. The high LED case results in a larger melt pool size with lower $G$ and $R$ values, when compared to the low LED case as expected. This is due to the fact that as the laser speed $\vec{v}$ increases, the heat accumulated in the laser interaction zone decreases, leading to formation of smaller melt pools. In both cases, $G$ increases from the top to the bottom. While a high degree of variation in $G$ from the top-edge to the top-interior location in the melt pool is observed in the high LED condition, it is almost constant in the low LED condition. In contrast to $G$, $R$ decreases from the top to the bottom and from interior to edge in both cases. Since $R$ is a function of $\vec{v}$, it is reasonable to observe higher cooling rate for higher $\vec{v}$. This is the case with the low LED condition. \begin{figure}[!ht] \centering \includegraphics[width=1\columnwidth]{images/after_revision/high_led_validation_v2.jpeg} \caption{The predicted growth morphology and size throughout the melt pool are demonstrated along with the experimental measurements at the corresponding locations. A transition from a planar to a cellular structure from the bottom to the top of the melt pool is observed. ($P$: 122 W, $\vec{v}$: 50 mm/s, LED: 2.44 J/mm) } \label{fig:high_led_valid} \end{figure} \subsubsection{Morphology and Size} As mentioned previously, the cellular segregation structure and size vary locally within a melt pool as well as from melt pool to melt pool under different processing conditions. To investigate the variation in the microstructure along the longitudinal section of melt pools under different AM conditions, the calculated cooling rates along the melt pool boundaries, as shown in Fig.~\ref{fig:cooling_vs_depth}, are utilized. Fig.~\ref{fig:high_led} demonstrates the variation in the solidification microstructure at different locations of the melt pool boundary under the high LED condition. It is observed that the resultant cooling rates in this case lead to the formation of cellular structure with varying cell sizes (PDAS) along the melt pool boundary. As the cooling rate increases from the bottom to the top of the melt pool, the cells become finer. Here, the predicted cooling rate varied from $2\times10^4 K/s$ to $3.5\times10^6 K/s$ as we go from the bottom to the top of the melt pool, and the predicted PDAS ranged from $0.7 \mu m$ to $0.3 \mu m$, respectively. Fig.~\ref{fig:low_led} demonstrates the variation in the solidification microstructure at different locations of the melt pool boundary under the low LED condition. Here, the predicted cooling rate varied from $1.75\times10^6 K/s$ to $6\times10^7 K/s$ from bottom to top of the melt pool. Near the bottom of the melt pool, a cellular structure is predicted, while a planar structure is observed near the top of the melt pool due to extremely high cooling rates. Note that the transition from cellular to planar structure at high solidification growth rate (hence the cooling rate) is already reported in the literature \cite{ludwig1996morphological}. One can refer to the solidification map in Fig. \ref{fig:GV_map} to gain an understanding of the effect of $G$ and $R$ on such a transition in the growth morphology. Next, the predicted growth morphology and size throughout the transverse section of melt pool are demonstrated along with the experimental measurements for three sets of process parameters as high LED ($P$: 122 W, $\vec{v}$: 50 mm/s, LED: 2.44 J/mm), medium LED ($P$: 96 W, $\vec{v}$: 67 mm/s, LED: 1.43 J/mm), and low LED ($P$: 162 W, $\vec{v}$: 957 mm/s, LED: 0.169 J/mm). Fig. \ref{fig:low_led_valid} demonstrates the predicted and measured microstructure at varying locations along the transverse section of the melt pool for $P$: 162 W, $\vec{v}$: 957 mm/s. The calculated LED is 0.169 J/mm at this condition, which we identify as the low LED case. A conduction mode melt pool with the low depth-to-width aspect ratio is shown in the optical micrograph. The SEM micrographs in Fig. \ref{fig:low_led_valid} present a planar structure. From the thermal model, a very low $R$ with $R < Vcs$ is predicted near the edge of the melt pool, hence a planar structure is expected to form. in the low LED case, the values of $R$ vary within the range of $0.2-0.9 m/s$ (figure~\ref{fig:transverse_melt_pool_GR}), which falls into the region of $R > V_{ab}$. Note that, in experiments solidification always begins with a planar structure at the melt pool boundary ($R < V_{cs}$), which is followed by a transition to cellular ($V_{cs} < R < V_{ab}$) or planar structure ($R > V_{ab}$), depending on the laser processing conditions. Fig. \ref{fig:mid_led_valid} demonstrates the predicted and measured microstructure at varying locations along the transverse section of the melt pool for $P$: 96 W, $\vec{v}$: 67 mm/s. The calculated LED is 1.43 J/mm at this condition, which we call as the medium LED case. A conduction to keyhole transition mode melt pool with the medium depth-to-width aspect ratio is shown in the optical micrograph. The SEM micrographs in Fig. \ref{fig:mid_led_valid} present the microstructure and size at three different locations: bottom (a), top-middle (b), and top-edge (c). All locations show cellular structure with measured PDAS of $0.39\pm0.1 \mu m$, $0.38\pm0.1 \mu m$, and $0.44\pm0.2 \mu m$, and the PF-predicted PDAS of $0.38 \mu m$, $0.32 \mu m$, and $0.42 \mu m$, respectively, indicating very good agreement between the simulation and experimental measurements. The predicted morphologies and PDAS at varying locations, from top to bottom and from top-middle to top-edge, are also presented in Fig. \ref{fig:mid_led_valid}. The results show that the PDAS decreases from the top to the bottom of the melt pool with the maximum and the minimum being $0.46 \mu m$ and $0.38 \mu m$, respectively. In contrast, the PDAS increases from the top-middle to the top-edge region with minimum and maximum being $0.32 \mu m$ and $0.42 \mu m$, respectively. The predictions show that the cooling rate decreases from top-middle to top-edge explaining the increase in PDAS. Fig. \ref{fig:high_led_valid} demonstrates the predicted and measured microstructure at varying locations along the transverse section of the melt pool for $P$: 122 W, $\vec{v}$: 50 mm/s. The calculated LED is 2.44 J/mm at this condition, which we refer to as the high LED case. A keyhole mode melt pool with high depth-to-width aspect ratio is shown in the optical micrography image. The bottom region is exposed to a high $G$ and low $R < Vcs$, and hence corresponds to the planar region as shown in Fig. \ref{fig:GV_map}. On the other hand, the top region shows a relatively lower $G$ and $R$ (between $Vcs$ and $Vab$). Therefore, a cellular structure is stable in this region, as depicted in Fig. \ref{fig:GV_map}. The SEM micrographs in Fig. \ref{fig:high_led_valid} present the microstructure and size at three different locations: the bottom (a), top-middle (b), and top-edge (c). The bottom (a) location shows a planar structure. Similarly, a planar structure is predicted by the PF simulations at the corresponding location. The top-middle location (b) shows a cellular structure with the measured PDAS of $0.43\pm0.2 \mu m$. The PF-predicted PDAS at this location is $0.36 \mu m$. The top-edge (c) shows a long cellular structure which grow from the melt pool boundary to the interior melt pool. The measured PDAS at this location is $0.58\pm0.2 \mu m$ while the PF-predicted PDAS is $0.46 \mu m$. Both the PF-predicted and experimentally measured PDAS increase from the top-middle to the top-edge region similar to the medium LED case as shown in Fig. \ref{fig:mid_led_valid}. Above, we explained the variation in the morphology and size of the microstructural features across the solidified melt pool for different processing conditions. Nb microsegregation is another important phenomenon to discuss. The overall results indicate that as the cooling rate increases, the concentration of Nb in the intercellular region decreases. For example, a reduction in the cooling rate from $7.5\times10^5K/s$ to $1.5\times10^5K/s$ leads to an increase in the predicted amount of Nb in the intercellular region from 4 to 5 (in at.\% Nb). Also, once the growth rate reaches beyond the absolute stability limit, a segregation-free planar structure is formed. Since the growth rate is a strong function of the laser speed, it is assumed to have this type of segregation free structure to be formed under sufficiently high laser speed conditions. \subsection{Effect of Permeability} \label{effect_of_perm} As stated in the previous paragraphs, the interface permeability has a strong influence on the predictions of finite interface dissipation PF model. With a proper selection of interface permeability, it is possible to model either the systems with local equilibrium conditions or highly non-equilibrium conditions. A number of test simulations (1D and 2D) have been run for varying permeability values. \begin{figure}[!ht] \centering \includegraphics[width=0.9\columnwidth]{images/after_revision/effect_of_perm.jpeg} \caption{Comparison between the simulated segregation coefficient $k_{v}$ as a function of the growth rate $R$ in the binary Ni-Nb alloy with different interface permeability $P^{intf}$} \label{fig:effect_of_perm} \end{figure} The results indicated that the value of permeability might affect multiple features of microstructure including growth structure, PDAS, cellular/dendritic shape, microsegregation, and segregation coefficient. As an example, in this section, we investigate the effect of permeability on the segregation coefficient $k_v$. Figure \ref{fig:effect_of_perm} represents the variation in $k_v$ as a function of $R$ for varying permeability values as predicted from the 1D simulations of binary Ni-Nb alloy. Based on the material parameters listed in Table \ref{tab:mat_pars}, the calculated $P^{intf}$ value according to the equation given in Section \ref{PFM_sec} is on the order of $10^4$ $cm^3/Js$. Steinbach et al. \cite{steinbach2012phase} stated that the permeability equation gives the upper limit, above which the model recovers to a conventional model with equal chemical potentials. In contrast, if lower values of permeability are utilized, the effect of solute trapping is enhanced indicated with higher values of $k_v$, which is the result of slower chemical partitioning process due to the low permeability across the solid/liquid interface. This is clearly shown in Fig. \ref{fig:effect_of_perm}. As the permeability decreases the predicted $k_v$ increases. In order to determine the actual value of permeability, the original paper \cite{steinbach2012phase} suggests comparing the calculated $k(v)$ with that measured experimentally. In the present work, since the experimental measurement of $k(v)$ is not available, the value of actual permeability have been determined by comparing other metrics such as PDAS or microsegregation. Here, it is worth mentioning that $k_v$ indeed depends on a combination of interface width and permeability. However, in the present work, the interface width was fixed to that was reported in Ghosh et al. \cite{ghosh2017primary} to be able to make reasonable comparisons of the models. Also note that, although the effect of interface width on $k_v$ was not the scope of the present work, from the test simulations with varying interface widths it was confirmed that the employed value ($\eta=$ $32 nm$) to give the best computational performance as well as the best agreement with the experimentally measured PDAS for the selected permeability value as given in Table \ref{tab:mat_pars}. \subsection{Comparison with Conventional PF Model} As stated already, conventional PF models predicting microstructural features of Ni-Nb alloy under AM conditions are available in the current literature. \begin{figure}[!ht] \centering \includegraphics[width=0.9\columnwidth]{images/after_revision/model_comparisons.jpeg} \caption{ Comparison between the simulated segregation coefficients $k_{v}$ from Ghosh et. al \cite{ghosh2017primary} (conventional PF model) and this work (finite interface dissipation PF model) in the quasi-binary Ni-Nb alloy} \label{fig:model_comparisons} \end{figure} In the present work, the parameters employed in Ghosh et al. \cite{ghosh2017primary} have been adopted as much as possible to be able to compare the results from the present work with those from Ghosh et al. \cite{ghosh2017primary}. In this regard, first the predicted PDAS from each model will be compared. In Fig.~\ref{fig:high_led}, the predicted cooling rate varied from $2\times10^4 K/s$ to $3.5\times10^6 K/s$ as we go from the bottom to the top of the melt pool, and the predicted PDAS ranged from $0.7 \mu m$ to $0.3 \mu m$, respectively. A similar work by Ghosh et al. \cite{ghosh2017primary} predicted the cooling rate to range from $5\times10^4 K/s$ to $3\times10^6 K/s$, and corresponding PDAS to be within the range of $1.6\mu m$-$0.14\mu m$ under similar laser processing parameters ($P=195W$ and $\vec{v}=800mm/s$), using the conventional PF model under the local equilibrium assumption. It is clear that in the work by Ghosh et al. a larger range of PDAS were predicted. This difference can be attributed to multiple factors. First of all, although both studies use the binary Ni-3.2 at.\% Nb as the modeling material, the aforementioned work aimed to approximate the microstructure of Inconel 718, hence adopted the thermodynamic data from a quasi-binary phase diagram of Inconel 718. Based on the utilized phase diagram, the freezing range and equilibrium segregation coefficient were reported as 57 K \cite{nie2014numerical} and 0.48 \cite{nie2014numerical}, respectively in the aforementioned study, whereas these properties in the present work are given as 14 K \cite{saunders1998calphad} and 0.68 \cite{saunders1998calphad}, respectively. It is inevitable that these variations in the material properties will also influence the microstructure predictions. Therefore, this kind of comparison is not helpful to show how the finite interface dissipation model differs from the conventional model. To be able to directly compare the results, each model should adopt the same parameters. Although an apples-to-apples comparison is still not possible due to the model parameters specific to each model (e.g. ``interface mobility'' is only defined in the finite interface dissipation PF mode), by employing the same thermodynamic data and using the same values of common model parameters (e.g diffusivity, anisotropy coefficient, interface width) sufficiently reasonable comparisons can be made. In this regard, 1-dimensional simulations have been run employing the same thermodynamic data (based on the quasi-binary Ni-Nb phase diagram) that is used in \cite{ghosh2017primary}, as well as utilizing the same model parameters as much as possible (as listed in Table \ref{tab:mat_pars}). The finite interface dissipation model enables simulating solidification both under local equilibrium conditions and non-equilibrium conditions, depending on the selected value of permeability. To demonstrate this, two values of permeability (i.e. low vs high) have been determined and the predicted values of $k_{v}$ have been compared. The results demonstrated that when a high value of permeability ($P^{intf}=10,000$ $cm^3/Js$) is used, the finite interface dissipation model recovers the conventional model results indicated with low values of $k_v$. In contrast, when a low value of permeability ($P^{intf}=1,000$ $cm^3/Js$) is used, higher kv values associated with non-equilibrium conditions can be modeled. Prdicting higher $k_v$ at the lower $P^{intf}$ values can be explained due to the fact that a lower $P^{intf}$ value can slow down the chemical partitioning process, hence enhances the effect of solute trapping during rapid solidification. \section{Summary and Conclusion}\label{sec:conc} In the present work, we developed a computational modeling framework by weakly coupling a finite element based thermal model to a non-equilibrium PF model to investigate the rapid solidification microstructure that forms during the single track melting of Ni-3.2 at.\% Nb. Most of the previous literature adopted PF models with the assumption of local equilibrium at the solid-liquid interface. However, this assumption is not valid for rapid solidification processes occuring under L-PBF conditions. In contrast, the present study employs the finite interface dissipation PF model with the ability of describing highly non-equilibrium systems, and is thus well suited to predict the rapid solidification microstructure during the L-PBF process. The present study provides a consistent framework by adopting a binary Ni-3.2 at.\% Nb alloy in both PF model and validation experiments. Note that the finite interface dissipation PF model adopted in the present work is well suited for describing multi-phase and multi-component alloy systems. The main goal of the present work was to elucidate the influence of the process parameters on the variability in solidification microstructure under single-track laser melting conditions. Once the microstructure variability in a simple binary alloy during single-track experiments is well understood, the next step would be employing the present framework to investigate more complex alloy systems (e.g. Inconel 718) under multi-track laser melting conditions. The major findings of the present work can be summarized as follows: 1. The single track laser melting simulations were run at varying laser power ($P: 70-255 [W]$) and laser speed ($\vec{v}: 50-2300 [mm/s]$). A planar to cellular transition was predicted as we go from the melt pool boundary to the interior of majority of the keyhole mode melt pools. A planar interface beyond the limit of absolute stability was observed to be predominant in the conduction mode melt pools with high growth rates. 2. A solidification map of the Ni-Nb alloy under L-PBF conditions (Fig.~\ref{fig:GV_map}) describing the variation in the morpholgy and size of cellular segregation structure as a function of temperature gradient $G$ and growth rate $R$ was presented. The minimum $G$ and $R$ conditions, leading to a segregation-free planar structure (beyond the absolute stability) was shown. Note that a solidification map describing the variation in the morphology (cellular, planar, and mixed) as a function of laser power $P$ and scan speed $\vec{v}$ will be presented in a following work. 3. The typical cooling rate during L-PBF ranged from $~10^5 K/s$ to $~10^8 K/s$ depending on the process parameters and the location in the melt pool. Above $3.5\times10^6 K/s$, a transition from cellular to planar interface was predicted with growth rates beyond $Vab$. 4. The predicted morphology and size of microstructure during the single-track melt pool solidification under varying process conditions were compared against the experimental measurements, and very good agreement was achieved regarding the cell spacing (ranging between ~0.2 and ~0.5 $\mu$m) and the amount of Nb in the intercellular region (from 4-5 at.\% Nb). 5. The effect of permeability on the predicted segregation coefficient ($k_v$) as a function of the growth rate was demonstrated. The results indicated that with the lower values of permeability, higher values of $k_v$ were predicted, indicating enhanced solute trapping effect. 6. The finite interface dissipation PF model results were compared with those predicted from a conventional PF model \cite{ghosh2017primary}. It was shown that with a low value of permeability, the former model recovers to the latter with local equilibrium condition (indicated with low values of $k_v$). On the other hand, employing a higher value of permeability in the former model resulted in a higher $k_v$, associated with non-equilibrium conditions. Finally, we note that the authors have recently developed a 3-dimensional PF model (see Fig. \ref{fig:3d_sim}) and compared the PDAS predicted from 2-dimensional model (2D) with those predicted from 3-dimensional (3D) model. A slight difference (e.g. $0.4 \mu m$ vs $0.46 \mu m$) in the predicted PDAS was shown. A thorough analysis in which a comparison of microstructural features under varying processing conditions predicted using 2D and 3D models will be presented in future work. Furthermore, the incorporation of the Lattice Boltzmann method to the developed PF model is currently being carried out by the authors in order to simulate the growth of cellular segregation structure in the presence of melt convection, which was shown to be an important factor in some literature work \cite{rojas2015phase,takaki2015gpu} . \section*{Acknowledgements} The authors acknowledge the support of NASA through grant NNX15AD71G. The experimental aspect of this work was carried out with support from the Army Research Office (ARO) under Contract No. W911NF-18-1-0278. LJ wishes to acknowledge the support of the National Science Foundation through award NSF-DGE 1545403 (NRT-DESE: Data-Enabled Discovery and Design of Energy Materials). KK and RA also acknowledge the Lawrence Livermore National Laboratory under Collaborative R\&D in Support of LLNL Missions, Task Order No. B623252 and Master Task Agmt. B575363. VA and RA also acknowledge support from NSF through grant No. CMMI-1462255. The FE and PF simulations were carried out at the Texas A\&M Super Computing Center. \FloatBarrier
\section{Methods} \paragraph*{Tensor network ansatz states for VQE.} VQE is a hybrid iterative quantum-classical algorithm used to approximate the ground state of a given Hamiltonian \cite{peruzzo_variational_2014}. It relies on preparing an ansatz state $| \psi(\boldsymbol{\theta}) \rangle$ by applying a sequence of quantum gates $U(\boldsymbol{\theta})$ and sampling the expectation value of a given Hamiltonian relative to this state, followed by a classical optimizer to minimize the energy, $\langle \psi(\boldsymbol{\theta}) | H | \psi(\boldsymbol{\theta}) \rangle$. Within the VQE method, we approach the ground state of a given Hamiltonian using tensor networks ansatz states. We proceed with representing the Hamiltonian as a sum of tensor products of Pauli operators: \begin{equation} \label{eq:pauli_basis1} H = \sum \mathcal{J}_{\alpha_1 \alpha_2 \dots \alpha_n} \sigma_{\alpha_1} \otimes \sigma_{\alpha_2} \otimes \dots \otimes \sigma_{\alpha_n}, \end{equation} where $\alpha_i \in \{0, 1, 2, 3\}$ enumerate the Pauli matrices $\{ \mathds{1}, X, Y, Z\}$. With the decomposition shown in Eq. \ref{eq:pauli_basis1}, individual terms of $\langle \psi(\boldsymbol{\theta})| H | \psi(\boldsymbol{\theta}) \rangle$ can be estimated and variationally minimized elementwise using a classical-to-quantum process. In each iteration one prepares the state $\ket{\psi(\boldsymbol{\theta})}$ and measures each qubit in the local $X, \ Y$, or $Z$ basis, estimates the energy and updates $\boldsymbol{\theta}$. This method can become scalable only if the number of terms in the Hamiltonian is polynomially bounded in the number of spins and the coefficients $\mathcal{J}_{\alpha_1 \alpha_2 \dots \alpha_n}$ are defined up to poly($n$) digits. It is therefore not surprising that the performance of VQE crucially depends on the choice of the ansatz state. A common approach is to use the unitary version of the coupled cluster method, the unitary coupled cluster (UCC) ansatz \cite{shen_quantum_2017,omalley_scalable_2016,hempel_quantum_2018,dumitrescu_cloud_2018}. For interacting spin problems, the (non)unitary coupled cluster ansatz can be composed out of spin-flip operators \cite{mcclean_theory_2016,gotze_heisenberg_2011}. There is no known classical algorithm to efficiently implement this method, even when the series is truncated to low-order terms \cite{taube_new_2006}. In principle, a quantum computer could efficiently prepare this state, truncated up to some $k$-th order using the Suzuki--Trotter decomposition \cite{lanyon_towards_2010}. However, for a system of $n$ qubits it requires $\mathcal{O}(n^k)$ unitary gates, making this technique out of reach for the available quantum computers. Still, even if UCC is truncated to single and double interactions (UCCSD), it requires $9n^2$ operations and necessitates applying some optimization strategy that would remedy this problem \cite{cao_quantum_2018}. Instead, we test a number of shorter ansatz states inspired by tensor network states, namely (i) a rank-one circuit; (ii) a tree tensor network circuit (Fig.~\ref{fig:tree}a); and (iii) a family of checkerboard-shaped circuits (Fig.~\ref{fig:tree}b) with varying depth. \begin{figure} \centering \includegraphics[width=0.8\linewidth]{drawing_2.pdf} \caption{A quantum circuit can be treated as a tensor network state with all bonds having dimension 2. If a bipartition cuts $w$ wires, the total bond dimension is at most $2^w$, while the cut separates at most $w$ ebits of entanglement.} \label{fig:cut} \end{figure} In particular, these states differ in the amount of entanglement they can support. In general, quantum states of $n$ qubits can be represented by $n$-index tensors, while quantum circuits are embodied by tensor networks. Each quantum gate is seen as a vertex, and each string is an index running through $\{ 0, 1 \}$, while the maximum amount of entanglement is determined by the number of strings one needs to cut to separate the subsystems (see Fig.\,\ref{fig:cut}). Each string corresponds to at most one ebit of entanglement. An $n$-qubit state can contain at most $\lfloor n/2 \rfloor$ ebits of entanglement. To formalize the latter, suppose there exists a certain bipartition in the system that brings $n_1$ qubits to the first subsystem and $n_2$ qubits to the second. It is then possible to regroup the tensor state into a $2^{n_1} \times 2^{n_2}$ matrix. The rank of this matrix provides an upper bound to the amount of entanglement across this bipartition: a rank-$k$ state can support at most $\log_2k$ ebits of entanglement, i.e.\,when it is in the maximally entangled state. {\it State preparation.} We first approximate the ground state of a Hamiltonian by rank-one states. One can prepare any unentangled state using $2n$ gates by subsequently applying $R_y$ and $R_z$ rotations to each qubit. This ansatz essentially matches the first order truncation of UCC. \begin{figure} \centering \includegraphics[width=\linewidth]{tree_and_checkerboard_circuit.png} \caption{(a) Tree tensor network state. (b) Checkerboard tensor network state. In both cases, the quantum register is instantiated in the $\ket{0}^{\otimes n}$ state and subject to entangling gates. Black boxes indicate two-qubit gates specified by Eq. \ref{eq:two_qubit_block1} and Fig. \ref{fig:entangler}. Each block is parametrized independently. \add{Here and in all subsequent figures, quantum circuits are to be read left to right}.} \label{fig:tree} \end{figure} Fig.~\ref{fig:tree}a illustrates a circuit implementing a {\it tree tensor network state}. \add{This state is prepared using the two-qubit parametric blocks subsequently described in detail. The preparation procedure is easier to explain when the number of qubits is a power of two. A block first entangles qubits number 1 and $(n/2 + 1)$. Then, in the next layer, two blocks act on qubit pairs $(1, n/4 +1)$ and $(n/2 + 1, n/2 + n/4 + 1)$. Then, for each half of the register, we act in the same way, but now the blocks act on qubit pairs $(1, n/4 +1)$ and $(n/2 + 1, n/2 + n/4 + 1)$. Each half of the register is again divided into two halves. The pattern continues. For systems where the number of qubits is not a power of two, one can do this procedure up until the number of qubits involved is the closest power of two, and then make the last layer of operators incomplete.} Such a structure enables long-range correlations but limits the entanglement entropy that a state bipartition can potentially have: any contiguous region can be isolated by $\mathcal{O}(1)$ cuts. It is easy to contract $\bra{\psi_{tree}} A \ket{\psi_{tree}}$ classically with $A$ being a local observable and $\ket{\psi_{tree}}$ being a tree tensor network state. There is some freedom in choosing the two-qubit blocks that comprise the tree TN. In principle, one can implement any unitary in $SU(4)$ by using three controlled-NOTs and 15 single-qubit rotations \cite{vatan_optimal_2004}. However, throughout this work we used two-qubit gates with fewer parameters $\bm{\tilde{\theta}}$ to simplify the optimization (Fig. \ref{fig:entangler}): \begin{multline} \label{eq:two_qubit_block1} U(\boldsymbol{\tilde{\theta}}) = (R_z(\tilde{\theta}_5) \otimes R_z(\tilde{\theta}_4)) \ \circ \\ \circ R_{zz}(\tilde{\theta}_3) \ \circ \ (R_x(\tilde{\theta}_1) \otimes R_x(\tilde{\theta}_2)), \end{multline} where $R_z (\theta) = e^{i\theta Z/2}$, $\ R_x (\theta) = e^{i\theta X/2}$, and $R_{zz} (\theta) = e^{i\theta Z\otimes Z/2}$. Thus, a complete ansatz would have five free parameters per two-qubit block. \add{In total the tree tensor network ansatz features $n - 1$ blocks, yielding $5n - 5$ independent parameters.} Remarkably, the block shown in Fig. \ref{eq:two_qubit_block1} is inspired by the parametrized Hamiltonian approach \cite{santagati_witnessing_2018} and the unitary operators used in the \add{quantum approximate optimization algotrithm} \add{(}QAOA\add{)} \cite{farhi_quantum_2014}. Of course, the ansatz with such blocks is weaker than it would be if each block implemented the entire $SU(4)$ group. However, such an ansatz would also have some redundancy as the ansatz gates are applied to a fixed $n$-qubit input state $\ket{0}^{\otimes n}$. In a {\it checkerboard tensor network}, the entangling blocks are positioned in a checkerboard pattern as shown in Fig.~\ref{fig:tree}b. In the following, we impose periodic boundary conditions, meaning that the last qubit is linked to the first. For this ansatz, we also use the two-qubit entangling gate shown in Fig. \ref{fig:entangler}. \add{This way, the ansatz has $5 L \lfloor n/ 2 \rfloor$ independent parameters, where $L$ is the number of layers in the circuit.} \begin{figure} \centering \mbox{ \Qcircuit @C=1.0em @R=1.0em { & \gate{e^{-i \tilde{\theta}_1 X}} & \multigate{1}{e^{-i \tilde{\theta}_3 {Z} \otimes {Z}}} & \gate{e^{-i \tilde{\theta}_4 Z}} & \qw \\ & \gate{e^{-i \tilde{\theta}_2 X}} & \ghost{e^{-i \tilde{\theta}_3 Z \otimes Z}} & \gate{e^{-i \tilde{\theta}_5 Z}} & \qw \\ } } \caption{Two-qubit entangler gate used in preparation of the states.} \label{fig:entangler} \end{figure} \begin{figure} \centering \mbox{ \Qcircuit @C=1.0em @R=0.8em { & \ket{0} & & \multigate{3}{U_\mathrm{VQE} (\boldsymbol{\theta})} & \multigate{3}{U_\mathrm{class} (\boldsymbol{\varphi})} & \meter \\ & \ket{0} & & \ghost{U_\mathrm{VQE} (\boldsymbol{\theta})} & \ghost{U_\mathrm{class} (\boldsymbol{\varphi})} & \meter \\ & \vdots & & \ghost{U_\mathrm{VQE} (\boldsymbol{\theta})} & \ghost{U_\mathrm{class} (\boldsymbol{\varphi})} & \vdots \\ & \ket{0} & & \ghost{U_\mathrm{VQE} (\boldsymbol{\theta})} & \ghost{U_\mathrm{class} (\boldsymbol{\varphi})} & \meter \\ } } \caption{Quantum circuit that implements the classifier. The first part prepares the VQE solution, the second one performs the classification. The assigned label is inferred from the measurements in the $Z$ basis. Both $U_{VQE}$ and $U_{class}$ have the checkerboard structure.} \label{fig:classifier_circuit} \end{figure} To isolate a region in a checkerboard tensor network state with $d$ layers, one has to cut at least $\mathcal{O}(d)$ bonds regardless of the region size (if the region is very small, one can also make a ``horizontal cut'' of $\mathcal{O}(L)$ bonds). Therefore, if we set the number of layers to be equal to $\lfloor \log_2 (n) \rfloor$, the upper bound on the entanglement scaling is equal to that in critical one-dimensional systems. To implement any maximally entangled state, that is, a state with the maximum possible amount of ebits, one needs to cut $\lfloor \frac{n}{2} \rfloor$ bonds. \add{If the checkerboard ansatz is made with open boundary conditions, it needs at least $2 \lfloor \frac{n}{2} \rfloor$ gates to saturate entanglement. Periodic boundary conditions make the ansatz more powerful and lower this bound in half, to $ \lfloor \frac{n}{2} \rfloor$ layers.} \paragraph*{Quantum classifier.} Not only can the checkerboard tensor network be used as a VQE ansatz but it also functions as a quantum majority vote classifier. \add{Each data point is a VQE solution: the parameters of the unitary gates are optimized in order to get the minimum energy $\bra{\psi(\boldsymbol{\theta})} H(h) \ket{\psi(\boldsymbol{\theta})}$, where $h$ is a parameter which determines the phase of the model.} Each VQE solution is labeled with ``0'' or ``1'' depending on whether the \add{model parameter} is above or below the phase transition point. We then prepare a circuit made of two parts (Fig. \ref{fig:classifier_circuit}). \add{The first part takes the blank qubit registry $\ket{000...0}$ and prepares the VQE solution in the form of an ansatz state. The second part takes this state as an input and applies a unitary $U_\mathrm{class} (\boldsymbol{\varphi})$.} We \add{then} measure the output of the circuit in the $Z$-basis. Let $q_0$ and $q_1$ be the total number of measurements in which more than half of the qubits are in ``0'' or ``1’’ states respectively. Finally, the classifier returns the predicted probability $p=q_1/(q_0+q_1)$ for the state belonging to the class ``1'' being equal to the probability that the majority of qubits vote ``1'', excluding ties. Fig. \ref{fig:ten-qubit_circ} in the Supplemental material shows the quantum circuit in more detail. Let $\{ (\boldsymbol{\theta}_i, y_i) \}_{i=1}^{N_{train}}$ be the set of training data points and their labels, $y_i \in \{0, 1\}$. Let $p_i \in [0, 1]$ be the label predicted by the neural network. Then the logarithmic loss function is: \begin{equation} \label{eq:logloss} f = -\sum_{i=1}^{N_{train}} \left( y_i \log p_i + (1 - y_i) \log (1 - p_i) \right). \end{equation} To minimize $f$, we used the \add{simultaneous perturbation stochastic approximation (}SPSA\add{)} algorithm \cite{spall_multivariate_1992}. This algorithm estimates the gradient vector by computing a finite difference in random direction, then performs a gradient descent step. We optimized the log loss over 300 epochs, with both finite differences step size and learning rate starting very coarse and decreasing as $1/\sqrt{n_{epoch}}$, where $n_{epoch}$ is the epoch number. \begin{figure} \centering \includegraphics[width=\linewidth]{dE_ising.eps} \caption{\add{Absolute value of the difference in energy between the exact solution and VQE solutions} for the transverse field Ising model. Hollow squares: rank-1 ansatz, hollow circles: tree tensor network, filled markers: checkerboard states ($\bigstar$: 1 layer, $\blacktriangle$: 2 layers, $\bullet$: 3 layers, $\blacklozenge$: 4 layers).} \label{fig:dE_Ising} \end{figure} \paragraph*{Numerical results.} To compare the performance of various VQE ansatz states, \add{we make numerical simulations of the quantum algorithm. In our simulation, the results of the measurements are given without noise and with perfect accuracy.} \add{W}e apply our quantum circuit of $n=10$ qubits to the transverse field Ising model (TFIM), which being exactly solvable \cite{lieb_two_1961,pfeuty_one-dimensional_1970} serves for testing purposes. This model is specified by the Hamiltonian \begin{equation}\label{eq:ising} H_\mathrm{TFIM}=J\sum\limits_{i=1}^n\sigma_i^z\sigma_{i+1}^z+h\sum\limits_{i=1}^n\sigma_i^x, \; J>0, \; h>0, \end{equation} where $\sigma^\alpha_i$ is the Pauli matrix $\alpha$ acting on the $i$th spin, and we impose periodic boundary conditions $\sigma_{n+1}^\alpha=\sigma_1^\alpha$. \begin{figure*} \centering \includegraphics[width=\linewidth]{merged.png} \caption{Left: predicted label of phase II as a function of magnetic field for transverse field Ising model. Right: predicted label of phase II as a function of $J_z$ for the XXZ model. Roman numbers denote the phases I and II of the models.} \label{fig:classification} \end{figure*} The ground state of TFIM is determined by the trade-off between Heisenberg exchange coupling, the first term in Eq. \ref{eq:ising}, favoring collinear orientation of magnetic moments in $z$ direction, and the Zeeman coupling to the transverse magnetic field, the second term. The latter has the tendency to flip the $z$-component, being thus the source of `quantum fluctuations' in the system. In a magnetically ordered state, a strong magnetic field $h\geq J$ destroys magnetic order even at zero temperature. This induces quantum fluctuations resulting in ground state restructuring, which is manifested by non-analiticity in the ground state energy of the quantum Hamiltonian (Eq. \ref{eq:ising}). It is therefore intuitively clear that in the absence of magnetic field, $h=0$, or in the case of high spin polarization, $h=\infty$, the Hamiltonian is dominated by a single interaction, making the ground state disentangled so that even rank-one approximations could provide quantitatively correct results. Meanwhile, this is not the case at criticality, $h=J$, where the competition between the two mechanisms favors the formation of highly entangled ground state. In our numerical implementation, we use Qiskit \cite{aleksandrowicz_qiskit:_2019} to simulate quantum circuits and the \add{limited Broyden–Fletcher–Goldfarb–Shanno method (}L-BFGS-B\add{)} to update the parameters during the classical step of the VQE, while all measurements are assumed ideal. We scan the values of $h$ from $0$ to $2J$. For $h=0$, the optimization process started from a random point, then each additional point started from the previous solution. To eliminate any obviously sub-optimal solutions, we also ran the scanning in the opposite direction and for each value of the field we keep the better result. \add{Without this ``double-sweeping'' procedure, spurious solutions appear in the vicinity of the phase transition: the solution for one phase remains a local optimum for some time after the parameter has moved to the other phase (see the Supplement).} All ansatz states show an increase in error near the phase transition point (Fig.\,\ref{fig:dE_Ising}). With the increasing depth, the checkerboard states show better approximation. It is interesting to point out that the low-depth ansatz states, namely rank-one, tree tensor network and checkerboard states of depth one, all show surprisingly similar results, which is associated with the relative simplicity of the Ising Hamiltonian. To feed the dataset into the classifier we prepare 100 data points using VQE with four-layered checkerboard ansatz states. This data was then shuffled and split into the training set (80\%) and the test set (20\%). Strikingly, the accuracy of the prediction achieves 99\%. The outcome of the quantum classifier is presented in Fig.~\ref{fig:classification} (left). Another exactly solved model which we use to test our classifier is the antiferromagnetic $XXZ$ spin chain with the Hamiltonian: \begin{equation} \label{eq:xxz_heis} H = \sum_{i=1}^n \left[J_\perp\left(\sigma^x_i \sigma^x_{i+1} + \sigma^y_i \sigma^y_{i+1}\right) + J_z \sigma^z_i \sigma^z_{i+1}\right]. \end{equation} From a physical perspective, Eq. \ref{eq:xxz_heis} corresponds to a uniform exchange coupled system with a uniaxial anisotropy specified by $J_z$. At $|J_z| < J_\perp$, this model is in the XY, or planar, phase which is characterized by algebraic decay of equal-time spin-spin correlation functions. In the regime $J_z > J_\perp$ the Hamiltonian corresponds to the antiferromagnetic Ising state. The system undergoes a Berezinsky--Kosterlitz--Thouless type phase transition at $J_z = J_\perp$ is \cite{franchini_introduction_2017}. At the phase transition point, the ground state has the highest nearest-neighbour concurrence and a cusp in nearest-neighbour quantum discord \cite{dillenschneider_quantum_2008}. This model has symmetry with respect to rotations in the $xy$ plane, as well as spin-flip symmetry. This fact allows us to augment the training data. Given a VQE approximation, we can create another, equally good approximation by applying a rotation or spin-flip. The structure of the VQE ansatz is conserved in the sense that the new states are produced by the same quantum circuit with different control parameters (see Supplemental Material for more details). In total, we produce 4000 data points. Despite being more subtle, the phase transition in the XXZ model is also correctly learned by the classifier, yielding correct labels on 94.6 \% of test data (Fig. \ref{fig:classification}, right). In this case, we have added two more layers to the classifier circuit to increase the accuracy. \add{Notably, the plot for the XXZ model looks less uniform than the plot for the Ising model. This is partially connected to the data augmentation procedure described in the Supplement. However, it is unclear why the behavior is abruptly changed at the phase transition point.} \paragraph*{Conclusions \add{and discussion}.} We proposed a method of classifying phases of matter using a quantum machine learning algorithm paired with quantum simulation. In our numerical tests we achieved 99\% accuracy for the transverse field Ising model with a 4-layered classifier and 94\% accuracy for the XXZ model with a 6-layered classifier. The quantum classifier works intrinsically with quantum data, providing advantage over the classical methods based on Monte-Carlo sampling. \add{Manipulating quantum states explicitly on a classical computer would require an exponential amount of memory in the worst case. However, it would be interesting to compare our model with a classical model that would work with efficiently contractible states like matrix product states (MPS) or multiscale entanglement renormalization ansatz (MERA) states \cite{vidal_entanglement_2007}}. \add{It is a nontrivial fact that the Ising model required fewer layers than the XXZ model. In the transverse field Ising model, the magnetization $\sum \langle \sigma_x^{(i)} \rangle$ as a function of magnetic field clearly points at the location of the phase transition points. This implies that the phases of the model are ``easy'' to classify. In the XXZ model, the transition at $J_z=1$ is a transition between a paramagnetic and an antiferromagnetic phase \cite{franchini_introduction_2017}. Neither of these phases shows spontaneous magnetic moment in absence of an external field, making it somewhat harder to discern the two phases. } \add{The number of layers that can be used both for VQE and for the classifier is limited by several factors. Firstly, too long a circuit would be hard to implement in near-term quantum hardware. Second, the runtime of the classical optimization grows with the number of parameters in the cost function, which is $O(nL)$ for the checkerboard ansatz. Finally, McClean et al. pointed out that a long random parametrized quantum circuit can resemble a Haar-random unitary map. Under such conditions, the typical value of the gradient of the cost function decreases exponentially with the number of qubits for any reasonable cost function. This finding is important for the design of any variational quantum algorithms.} The proposed classification technique can be applied to any model that can be expressed as a spin model (e.g. fermion problems can be mapped to spin problems by using Jordan--Wigner transformation or Bravyi--Kitaev transformation). \add{For the reported study, we tested three different ansatz circuits for VQE, but only one of them was used for classification. In principle, one could also try to use the other two ans\"atze for classification. Indeed, the rank-one ansatz would be a simple classifier that only uses local spin measurements. One could also use the tree tensor network, however it would have to be flipped compared to the VQE ansatz: the tree classifier would take $n$ qubits as input, and output only one or two qubits. However, as these two ans\"atze show poorer results for VQE, we do not believe they would admit improved results in their role as classification circuits. For a particular example, a rank-one classifier would work for the transverse field Ising model, because the alignment of spins along the X axis changes across the phase transition, as we mentioned before. For the XXZ model, however, this does not happen, and hence using the rank-one classifier would be pointless. Finally, the tree tensor network can be efficiently contracted on a classical machine, therefore the proposed classifier would not offer any computational advantage if it used the TTN as a classifier.} We simulated quantum machine learning for binary classification. Such a protocol can be extended to more classes. For example, for four classes, we could treat ``0000000000'' as a label of class 1, ``0000011111'' as a label of class 2, ``1111100000'' as that of class 3, and finally ``1111111111'' as that of class 4. Other possibilities would then be labeled according to which of the four strings is closest in terms of Hamming distance. \add{ Since we have VQE solutions as the data points with assigned labels, $\{\ket{\psi(\boldsymbol{\theta}_i)}, y_i\}^{N_{train}}_{i=1}$, we could in principle use the $k$-nearest neighbors method \cite{hastie_friedman_tisbshirani_2017} for classifying a state $\ket{\rho}$. That is, for the simplest case with $k=1$, we would calculate all the $N_{train}$ overlaps $\mathcal{O}_i = |\langle \psi(\boldsymbol{\theta}_i)| \rho \rangle|^2$, find the the state $\ket{\psi(\boldsymbol{\theta}_m)}$ which gives the maximal overlap $\mathcal{O}_m$ and assign the label $y_m$ from the pair $\{\ket{\psi(\boldsymbol{\theta}_m)}, y_m\}$ to the state $\ket{\rho}$. If $\ket{\psi(\boldsymbol{\theta}_i)} = U(\boldsymbol{\theta}_i) \ket{\boldsymbol{0}}$ and $\ket{\rho} = V \ket{\boldsymbol{0}}$, then the overlap $\mathcal{O}_i$ can be calculated with a quantum computer by preparing the state $ V^\dagger U(\boldsymbol{\theta}_i)\ket{\boldsymbol{0}}$ and measuring it in the computational basis. The probability to obtain only zeros in the measurement result will be exactly the overlap $\mathcal{O}_i$. The main drawback of this approach is that in order to classify a state $\ket{\rho}$, one needs to estimate $N_{train}$ overlaps $\mathcal{O}$. In contrast, in the method we propose, once the classifier circuit $U_\mathrm{class}$ is trained, it requires only a single series of measurements to classify an input state. } \begin{acknowledgments} We thank Dmitry Yudin for fruitful discussions and suggestions. A.\,U. acknowledges RFBR project number 19-31-90159. \paragraph*{Numerical Methods.} The quantum circuits designed in the study were simulated using Qiskit \cite{aleksandrowicz_qiskit:_2019}. Figures \ref{fig:dE_Ising}, \ref{fig:classification} were prepared using Matplotlib \cite{hunter_matplotlib:_2007}. The source code for the study is available at \texttt{github.com/Quantum-Machine-Learning-Initiative/\\learning-phases}. \end{acknowledgments}
\section{Proof of Theorem~\ref{theo-UU}} \label{app-uu} \begin{proof} We assume $\Phi$ to be fixed and we prove the property by structural induction over $\vfi$. Boolean operators are omitted. \begin{itemize} \item $\vfi = p$~: if $\calK,x\sat_\varepsilon p$, then either $p$ is a quantified proposition and it belongs to $\dom(\varepsilon)$ and $x$ belongs to $\epsilon(p)$ and thus $v_\varepsilon \sat p^x$ by def.\ of $v_\varepsilon$, or $p$ belongs to $\ell(x)$. In both cases we have $v_\varepsilon \sat \widehat{p}^{x,\dom(\varepsilon)}$. The converse is similar. \item $\vfi=\EX \psi$~: $\calK,x\sat_\varepsilon \EX \psi$ iff there exists $(x,x')\in E$ s.t.\ $\calK,x ' \sat_\varepsilon \psi$, iff (by i.h.) there exists $(x,x')\in E$ s.t.\ $v_\varepsilon \sat \widehat{\psi}^{x',\dom(\varepsilon)}$ which is equivalent to $v_\varepsilon \sat \widehat{\EX \psi}^{x,\dom(\varepsilon)}$. \item $\vfi=\exists p. \psi$. We have $\calK,x\sat_\varepsilon \exists p. \psi$ iff there exists $V'\subseteq V$ s.t.\ $\calK,x \sat_{\varepsilon[p\mapsto V']} \psi$, iff (i.h.) $v_{\varepsilon[p\mapsto V']} \sat \widehat{\psi}^{x,\dom(\varepsilon)\cup\{p\}}$ which is equivalent to $v_{\varepsilon} \sat \exists p^{v_1}\ldots p^{v_n}. \widehat{\psi}^{x,\dom(\varepsilon)\cup\{p\}}$ (by def.\ of $v_\varepsilon$). \item $\vfi=\Ex \psi_1 \Until \psi_2$~: The definition of $\widehat{\vfi}^{x,\dom(\varepsilon)}$ corresponds to a finite unfolding of the expansion law that characterizes the $\EU$\ modality. Assume $\calK,x\sat_\varepsilon \vfi$. There exists a path $\rho \in \Path^\omega_\calK(x)$ and a position $i\geq 0$ s.t.\ $\rho(i) \sat_\varepsilon \psi_2$ and $\rho(k) \sat_\varepsilon \psi_1$ for any $0 \leq k < i$. The finite prefix $x=\rho(0)\cdots\rho(k)$ can be assumed to be simple, and then $k<|V|$. By using i.h., we get $v_\varepsilon \sat \widehat{\psi_2}^{\rho(i),\dom(\varepsilon)}$, and $v_\varepsilon \sat \widehat{\psi_1}^{\rho(k),\dom(\varepsilon)}$ for any $0\leq k <i$. From this point, the reader can easily verify by induction (starting at $i$, down to 0) that $v_\varepsilon\sat\overline{\Ex \psi_1\Until\psi_2}^{\rho(k), dom(\varepsilon), \{\rho(j)|j\leq k\}}$ for all $k\leq i$. This makes $\widehat{\vfi}^{x,\dom(\varepsilon)}$ to be satisfied by $v_\varepsilon$. Conversely, assume $v_\varepsilon \sat \widehat{\vfi}^{x,\dom(\varepsilon)}$. Let us build a finite path $x=x_0, x_1, \cdots x_i$ that satisfies $\psi_1\Until\psi_2$. The first vertex is of course $x$, and we have $v_\varepsilon\sat\overline{\Ex\psi_1\Until\psi_2}^{x, dom(\varepsilon), \{x\}}$. Fix $i$ so that for every $0\leq k\leq i$, $x_k$ is built, $v_\varepsilon\sat\overline{\Ex\psi_1\Until\psi_2}^{x_k, dom(\varepsilon), \{x_j|j\leq k\}}$, $v_\varepsilon\not\sat\widehat{\psi_2}^{x_k, dom(\varepsilon)}$, and $(x_k, x_{k+1})\in E$ when $k<i$. Then, there must be $(x_i, y)\in E$ so that $y\not\in\{x_j|j\leq i\}$, and $v_\varepsilon\sat\overline{\Ex\psi_1\Until\psi_2}^{y, dom(\varepsilon), \{x_j|j\leq i\}\cup\{y\}}$, so we set $x_{i+1}=y$. The sequence eventually stops, because $V$ is finite and the path is simple. If $x_i$ is its last vertex, then we must have $v_\varepsilon\sat\widehat{\psi_2}^{x_i, dom(\varepsilon)}$, and $v_\varepsilon\sat\widehat{\psi_1}^{x_k, dom(\varepsilon)}$ for every $0\leq k<i$. By using i.h., we get $\calK, x\models_\varepsilon\phi$. \item $\vfi=\All \psi_1 \Until \psi_2$~: this case is similar to the previous one, except that we have to consider loops. Assume $\calK,x\sat_\varepsilon \vfi$. Then any path issued from $x$ satisfies $\psi_1 \Until \psi_2$. If $x$ contains a self-loop, then $\psi_2$ has to be satisfied at $x$ (this is ensured by the first case in the def.\ of $\widehat{\vfi}^{x,\dom(\varepsilon)}$). Otherwise we consider all the paths from $x$~: either there is a simple prefix witnessing $\psi_1 \Until \psi_2$, or there is a loop from some point. In the latter case, one of the state in the loop has to verify $\psi_2$. In both cases, the definition of $\widehat{\vfi}^{x,\dom(\varepsilon)}$ gives the result. \end{itemize} \end{proof} \section{Experimental results} \label{app-res} Detailed results for the three examples are presented in this section. In every case, we distinguished the time required to build the \QBF\ formula (the Z3 specification) and the time required to solve it. Times are given in seconds. \subsection{$k$-connectivity} \begin{small} \[ \begin{array}{|l|c|c|c|c|c|} \hline n, m & 3, 2 & 4, 3 & 4, 3 & 5, 4 & 35, 4 \\ \text{formula} & \Psi_2 & \Psi_4 & \Phi_4 & \Psi_5 & \Psi_4\\ \hline \text{\# states} & 18 & 32 & 32 & 50 & 2450 \\ \text{res} & \text{sat} & \text{unsat} & \text{unsat} & \text{unsat} & \text{sat}\\ \hline \hline \multicolumn{6}{|c|}{\text{Reduction}\: \MetUU} \\ \hline \text{Time to build z3 form.\ } & 0.01 & 38.45 & 70.15 & - & - \\ \text{Size of z3 form.\ } & 7682 & 7 922 175 & 29 983 034 & - & - \\ \text{Time to solve z3 form.\ }& 0.04 & 2.38 & 8.61 & - & - \\ \hline \hline \multicolumn{6}{|c|}{\text{Reduction} \: \MetFP} \\ \hline \text{Time to build z3 form.\ } & 0 & 0.03 & 0.07 & 0.09 & 388 \\ \text{Size of z3 form.\ } & 1313 & 9097 & 11234 & 27 416 & 38 675 099 \\ \text{Time to solve z3 form.\ }& 0.03 & 0.06 & - & 0.16 & 132.67 \\ \hline \hline \multicolumn{6}{|c|}{\text{Reduction}\: \MetFPF} \\ \hline \text{Time to build z3 form.\ } & 0.03 & 0.1 & 0.25 & 0.1 & - \\ \text{Size of z3 form.\ } & 3666 & 20 944 & 56196 & 61 519 & - \\ \text{Time to solve z3 form.\ }& 0.12 & 0.28 & - & 57.96 & - \\ \hline \hline \multicolumn{6}{|c|}{\text{Reduction}\: \MetX} \\ \hline \text{Time to build z3 form.\ } & 0.01 & 1 & 0.23 & 1.3 & - \\ \text{Size of z3 form.\ } & 6363 & 31243 & 107120 & 87681 & - \\ \text{Time to solve z3 form.\ }& 40.16 & - & 43.09 & - & - \\ \hline \hline \end{array} \] \end{small} \begin{small} \[ \begin{array}{|l|c|c|c|c|} \hline n, m & 3, 1 & 3, 3 & 9, 2 & 27, 2 \\ \text{formula} & \Psi_2^g & \Psi_3^g & \Psi_3^g & \Psi_3^g \\ \hline \text{\# states} & 18 & 18 & 162 & 1458 \\ \text{res} & \text{unsat} & \text{sat} & \text{unsat} & \text{unsat} \\ \hline \hline \multicolumn{5}{|c|}{\text{Reduction}\: \MetUU} \\ \hline \text{Time to build z3 form.\ } & 1,08 & 9,3 & - & - \\ \text{Size of z3 form.\ } & 1195684 & 8632341 & - & - \\ \text{Time to solve z3 form.\ }& 0,43 & 8,96 & - & - \\ \hline \hline \multicolumn{5}{|c|}{\text{Reduction} \: \MetFP} \\ \hline \text{Time to build z3 form.\ } & 0.02 & 0,04 & 1,94 & 190,94 \\ \text{Size of z3 form.\ } & 13268 & 18337 & 1698025 & 139992889 \\ \text{Time to solve z3 form.\ }& 0,1 & 0,23 & 45,51 & - \\ \hline \hline \multicolumn{5}{|c|}{\text{Reduction}\: \MetFPF} \\ \hline \text{Time to build z3 form.\ } & 0,02& 0.04 & 2.07 & 192 \\ \text{Size of z3 form.\ } & 5180 & 6877 & 551447 & 44643959 \\ \text{Time to solve z3 form.\ }& 0,10 & 35,38 & 180 & - \\ \hline \hline \multicolumn{5}{|c|}{\text{Reduction}\: \MetX} \\ \hline \text{Time to build z3 form.\ } & 0.1 & 0.05 & 0.95 & 195 \\ \text{Size of z3 form.\ } & 6285 & 8331 & 726681 & 59 447 253 \\ \text{Time to solve z3 form.\ }& 0,35 & - & - & - \\ \hline \hline \end{array} \] \end{small} \subsection{Nim game} \begin{small} \[ \begin{array}{|l|c|c|c|c|c|c|c|} \hline & [2,2] & [3,2] & [4,5,2]& [3,4,5] & [2,3,4,4] & [5,4,3,6] & [2,4,8,14] \\ \hline \text{\# states} & 16 & 31 & 280 & 328 & 398 & 1595 & 13556 \\ \text{res} & \text{unsat} & \text{sat} & \text{sat} & \text{sat} & \text{sat} & \text{sat} &\text{unsat} \\ \hline \hline \multicolumn{8}{|c|}{\text{Reduction}\: \MetUU} \\ \hline \text{Time to build z3 form.\ } & 0,00 & 0,00 & 0,09 & 0,31 & 8,99 & - & - \\ \text{Size of z3 form.\ } & 32 & 105 & 90095 & 285505 & 1011324& - & - \\ \text{Time to solve z3 form.\ }& 0,02 & 0,03 & 0,09 & 0,10 & 0,39 & - &- \\ \hline \hline \multicolumn{8}{|c|}{\text{Reduction}\: \MetFP} \\ \hline \text{Time to build z3 form.\ } & 0,00 & 0,00 & 0,00 & 0,00 & 0,00& 0,19 & 0,21 \\ \text{Size of z3 form.\ } & 104 & 216 & 2283 & 2698 & 3225 & 13865 & 125486 \\ \text{Time to solve z3 form.\ }& 0,01 & 0,02 & 0,04 & 0,4 & 0,06 & 0,15 & 62,2 \\ \hline \hline \multicolumn{8}{|c|}{\text{Reduction}\: \MetFPF} \\ \hline \text{Time to build z3 form.\ } & 0,00 & 0,00 & 0,03 & 0,05 & 0,07 & 0,23 & 6,95 \\ \text{Size of z3 form.\ } & 161 & 326 & 3323 & 3926 & 4703 & 19928 &178158 \\ \text{Time to solve z3 form.\ }& 0,02 & 0,03 & 0,12 & 0,10 & 0,18 & 0,18 &26,66 \\ \hline \hline\multicolumn{8}{|c|}{\text{Reduction} \: \MetX} \\ \hline \text{Time to build z3 form.\ } & 0,00 & 0,02 & 0,79 & 1,05 & 1,88 & 24,18 & - \\ \text{Size of z3 form.\ } & 2468 & 9371 & 844412 & 1171832 & 1696982 & 29013387 & - \\ \text{Time to solve z3 form.\ }& 0,05 & 0,12 & 207,6 & 341,6 & 879,8 & - & \\ \hline \multicolumn{8}{|c|}{\text{Reduction}\: \MetX \:\text{with bounded Until}} \\ \hline \text{Bound for Until:} & 10 & 20 & 20 & 20 & 21 & 28 & 43 \\ \text{Time to build z3 form.\ } & 0 & 0,01 & 0,08 & 0,1 & 0,1 & 0,48 & 6,43 \\ \text{Size of z3 form.\ } & 1682 & 6291 & 65712 & 77816 & 97371 & 540997 & 7311052 \\ \text{Time to solve z3 form.\ }& 0,02 & 0,1 & 2,37 & 3,17 & 4,20 & 184,94 & - \\ \hline \hline \end{array} \] \end{small} \subsection{Resources distribution} \begin{small} \[ \begin{array}{|l|c|c|c|c|c|c|} \hline n \times m & 10\times5 & 10\times5 & 10\times5 & 10\times7 & 10\times10 & 10\times10 \\ k,d & 2,8 & 4,4 & 4,6 & 4,5 & 2,3 & 4,7 \\ \hline \text{\# states} & 50 & 50 & 50 & 70 & 100 & 100 \\ \text{res} & \text{sat} & \text{unsat} & \text{sat} & \text{unsat} & \text{unsat} & \text{?} \\ \hline \hline \multicolumn{7}{|c|}{\text{Reduction}\: \MetUU - \MetFP} \\ \hline \text{Time to build z3 form.\ } & 0,03 & 0,08 & 0,07 & 0,10 & 0,13 & 0,22 \\ \text{Size of z3 form.\ } & 112155 & 32357 & 70757 & 74417 & 45905 & 283907 \\ \text{Time to solve z3 form.\ }& 0,08 & 274,00 & 0,06 & - & 0,09 & - \\ \hline \hline \multicolumn{7}{|c|}{\text{Reduction}\: \MetFPF} \\ \hline \text{Time to build z3 form.\ } & 0,05 & 0,08 & 0,10 & 0,10 & 0,17 & 0,19 \\ \text{Size of z3 form.\ } & 14515 & 23213 & 24715 & 44744 & 43510 & 90916 \\ \text{Time to solve z3 form.\ } & 0,06 & 308,48 & 0,09 & - & 0,10 & - \\ \hline \hline\multicolumn{7}{|c|}{\text{Reduction} \: \MetX} \\ \hline \text{Time to build z3 form.\ } & 0,08 & 0,02 & 0,03 & 0,03 & 0,02 & 0,09 \\ \text{Size of z3 form.\ } & 9521 & 7633 & 11133 & 13123 & 7521 & 25733\\ \text{Time to solve z3 form.\ }& 0,05 & 27,16 & 0,02 & 155 & 0,09 & - \\ \hline \hline \end{array} \] \end{small} \section{Conclusion} We have presented several reductions from \QCTL\ model-checking to \QBF. This provides a first tool for \QCTL\ model-checking. Of course, this is an ongoing-work, and many improvements, are possible~: the reduction strategies are still naive and could be significantly improved, and a better understanding of \QBF-solver would also be helpful to produce more efficient formulas (we have not yet tried to normalise formulas in a specific form which is often a crucial aspect in \SAT/\QBF-solving). Still, these first results are rather interesting and encouraging. They show the importance of writing "good" \QCTL\ formulas for which the solver will be able to provide a result (this problem already exists for classical temporal logics, but it is more significant here due to the complexity induced by the quantifications). The examples also show that there is no "one best strategy": it depends on the structure of the considered formula, and then offering several reduction strategies seems to be necessary in a \QBF-based model-checker for \QCTL. Finally this work is also interesting because it could easily be adapted for other logics (like Sabotage logics~\cite{Benthem05}). In the future, we plan to continue to work on reduction strategies, and to use other \QBF-solvers. \section{Definitions} \subsection{Kripke structures} Let $\AP$ be a set of atomic propositions. \begin{definition} A~\emph{Kripke structure} is a tuple $\calK=\tuple{V,E,\ell}$, where $V$~is a finite set of vertices (or states), $E\subseteq V\times V$ is a set of edges (we assume that for any~$v\in V$, there exists $v'\in V$ s.t. $(v,v')\in E$), and $\ell\colon V\to 2^{\AP}$ is a labelling function. \end{definition} An infinite path (also called an execution) in a Kripke structure is an infinite sequence $\rho = x_0 x_1 x_2 \ldots$ such that for any $i$ we have $x_i \in V$ and $(x_i,x_{i+1})\in E$. We~write $\Path^\omega_\calK$ for the set of infinite paths of~$\calK$ and $\Path^\omega_\calK(x)$ for the set of infinite paths issued from $x\in V$. Given such a path $\rho$, we use $\rho_{\leq i}$ to denote the $i$-th prefix $x_0\ldots x_i$, $\rho_{\geq i}$ for the $i$-th suffix $x_i x_{i+1}\ldots$, and $\rho(i)$ for the vertex $x_i$. The size of $\calK$ is $|V|+|E|$. Given a set $P\subseteq \AP$, two Kripke structures $\calK=(V,E,\ell)$ and $\calK'=(V',E',\ell')$ are said $P$-equivalent (denoted by $\calK \equiv_P \calK'$) if $V=V'$, $E=E'$, and for every $x \in V$ we have~: $\ell(x)\cap P = \ell'(x) \cap P$. \subsection{\QCTL} This section is devoted to the definition of the logic \QCTL ,\ which extends the classical branching-time temporal logic \CTL\ with quantifications over atomic propositions. \begin{definition} \label{def-QCTL} The syntax of $\QCTL$ is defined by the following grammar~: \begin{xalignat*}1 \QCTL \ni \phi ,\psi &\coloncolonequals q \mid \neg\phi \mid \phi \ou\psi \mid \Ex \X \phi \mid \Ex \phi \Until \psi \mid \All \phi \Until \psi \mid \exists p.\ \phi \end{xalignat*} where $q$ and~$p$ range over~$\AP$. \end{definition} \QCTL\ formulas are evaluated over states of Kripke structures~: \begin{definition} Let $\calK=\tuple{V,E,\ell}$ be a Kripke structure, and $x \in V$. The semantics of \QCTL\ formulas is defined inductively as follows~: \begin{align*} \calK, x \models & p \text{ iff } p\in \ell(x) \\ \calK, x \models & \neg\phi \text{ iff } \calK, x \not\models \phi \\ \calK, x \models & \phi \ou \psi \text{ iff } \calK, x \models \phi \text{ or } \calK, x \models \psi \\ \noalign{\pagebreak[2]} \calK, x \models & \Ex \X \phi \text{ iff } \exists (x,x') \in E \text{ s.t.\ } \calK, x' \models \phi \\ \calK, x \models & \Ex \phi \Until \psi \text{ iff } \exists \rho \in \Path^\omega_\calK(x), \exists i\geq 0 \text{ s.t.\ } \calK, \rho(i) \models \psi \text{ and } \\ & \qquad \qquad \qquad \qquad \qquad \text{ for any } 0 \leq j <i, \text{ we have } \calK, \rho(j) \models \phi \\ \calK, x \models &\All \phi \Until \psi \text{ iff } \forall \rho \in \Path^\omega_\calK(x), \exists i\geq 0 \text{ s.t.\ } \calK, \rho(i) \models \psi \text{ and } \\ & \qquad \qquad \qquad \qquad\qquad \text{ for any } 0 \leq j <i, \text{ we have } \calK, \rho(j) \models \phi \\ \calK, x \models & \exists p.\ \phi \text{ iff } \exists \calK' \equiv_{\AP\backslash\{p\}} \calK \text{ s.t. } \calK', x \models \phi \end{align*} \end{definition} In~the sequel, we use standard abbreviations such as $\top$, $\bot$, $\et$, $\impl$ and $\equivalent$. We also use the additional (classical) temporal modalities of \CTL~: $\All\X\phi \eqdef \non \Ex \X \non \phi$ , $\Ex\F\phi \eqdef \Ex \top \Until \phi$, $\All\F\phi \eqdef \All \top \Until \phi$, $\Ex \G\phi \eqdef \neg\All \F\neg\phi$, $\All \G\phi \eqdef \neg\Ex \F\neg\phi$, $\Ex \vfi \WUntil \psi \eqdef \non \All \non \psi \Until (\non \psi \et \non \vfi)$ and $\All \vfi \WUntil \psi \eqdef \non \Ex \non \psi \Until (\non \psi \et \non \vfi)$. Moreover, we use the following abbreviations related to quantifiers over atomic propositions~: $\forall p.\ \phi \eqdef \neg\exists p.\ \neg\phi$, and for a set $P = \{p_1,\ldots, p_k\} \subseteq \AP$, we write $\exists P. \phi$ for $\exists p_1. \ldots \exists p_k. \phi$ and $\forall P. \phi$ for $\forall p_1. \ldots \forall p_k. \phi$. The~size of a formula~$\phi\in\QCTL$, denoted $\size\phi$, is defined inductively by~: $\size q = 1$, $\size{ \non \phi} = \size{\exists p.\phi} = \size{\Ex\X \phi} = 1 + \size \phi$, $\size{\phi \ou \psi} = \size{\Ex \phi \Until \psi}= \size{\All \phi \Until \psi}= 1 + \size \phi + \size \psi$. Moreover we use $\HT(\vfi)$ to denote the \emph{temporal height} of $\vfi$, that is the maximal number of nested temporal modalities in $\vfi$. And given a subformula $\psi$ in $\Phi$, the \emph{temporal depth} of $\psi$ in $\Phi$ (denoted $\tdepth_\Phi(\psi)$) is the number of temporal modalities having $\vfi$ in their scope. In the following, we denote by $\SubF(\Phi)$ (resp.\ $\SubTF(\Phi)$) the set of subformulas of $\Phi$ (resp.\ the set of subformulas starting with a temporal modality). Two \QCTL\ formulas $\vfi$ and $\psi$ are said to be \emph{equivalent} (written $\vfi \equiv \psi$) iff for any structure $\calK$, any state $x$, we have $\calK, x \sat \vfi$ iff $\calK, x \sat \psi$. This equivalence is substitutive. \paragraph{Discussion on the semantics.} The semantics we defined is classically called the \emph{structure semantics}~: a formula $\exists p.\phi$ holds true in a Kripke structure $\calK$ iff there exists a $p$-labeling of the structure $\calK$ such that $\phi$ is satisfied. Another well-known semantics coexists in the literature for propositional quantifiers, the \emph{tree semantics}~: $\exists p.\ \phi$ holds true when there exists a $p$-labelling of the \emph{execution tree} (the infinite unfolding) of the Kripke structure under which $\phi$~holds. If, for \CTL, interpreting formulas over the structure or the execution tree is equivalent, this is not the case for \QCTL. Moreover, these two semantics do not have the same algorithmic properties~: if \QCTL\ model-checking and satisfiability are \TOWER-complete for the tree semantics (the algorithms are based on tree automata techniques), \QCTL\ model-checking is \PSPACE-complete for the structure semantics but satisfiability is undecidable. (see~\cite{LM14} for a survey). Nevertheless, in both semantics, \QCTL\ and \QCTLs\ (the extension of \CTLs\ with quantifications) are equally expressive, and are as expressive~\footnote{This requires adequate definitions, since a temporal logic formula may only deal with the reachable part of the model, while \MSO\ has a more \emph{global} point of view.} as the Monadic Second-Order Logic over the finite structure or the infinite trees (depending on the semantics). Note also that any \QCTL\ formula is equivalent to a formula in Prenex normal form (we will use this result in next sections). Finally, there is also the \emph{amorphous semantics}~\cite{Fre01}, where $\exists p.\ \phi$ holds true at a state~$s$ in some Kripke structure~$\calK$ if, and only if, there exists some Kripke structure~$\calK'$ with a state $s'$ such that $s$ and $s'$ are bisimilar, and for which there exists a $p$-labeling making $\phi$ hold true at~$s'$. With these semantics, the logic is insensitive to unwinding, and more generally it is bisimulation-invariant (contrary to the two previous semantics, see below). \subsection{Examples of \QCTL\ formulas} \QCTL\ allows us to express complex properties over Kripke structures~: for example, it is easy to build a characteristic formula (up to isomorphism) of a structure, and one can also reduce model-checking problems for multi-player games to \QCTL\ model-checking~\cite{LaroussinieM15}\ldots Below, we give several examples of counting properties, to illustrate the expressive power of propositional quantifiers. The first one of the formulas below expresses that there exists a unique reachable state verifying $\vfi$, and the second one states that there exists a unique immediate successor satisfying $\vfi$~: \begin{align} \Ex_{=1} \F(\vfi) &\;\eqdef\; \EF (\vfi) \et \forall p. \big(\EF (p\et \vfi) \impl \AG (\vfi \impl p)\big) \label{FuniqF} \\ \Ex_{=1}\X\phi &\;\eqdef\; \Ex\X\phi \et \forall p.\ \big(\All\X(\phi \impl p) \ou \All\X(\phi \impl \non p)\big) \label{FuniqX} \end{align} where we assume that $p$ does not appear in~$\vfi$. Consider the formula~\ref{FuniqF}: if there were two reachable states satisfying $\vfi$, then labelling only one of them with~$p$ would falsify the $\AG$ subformula. For \ref{FuniqX}, the argument is similar. The existence of at least $k$ successors satisfying a given property can be expressed with~: \begin{align} \Ex_{\geq k}\X\phi = & \exists P.\ \Bigl(\ET_{1\leq i\leq k} \Ex\X \bigl(p_i\et \ET_{i'\not= i} \non p_{i'}\bigr) \et \All\X\Bigl(\bigl(\OU_{1\leq i\leq k} p_i\bigr) \impl \phi\Bigr)\Bigr) \end{align} And we can define $\Ex_{=k} \X \phi$ as to $\Ex_{\geq k} \X \phi \:\et\: \non \Ex_{\geq k+1} \X \phi$. Note that these examples show why \QCTL\ formulas are not bisimulation-invariant. When using \QCTL\ to specify properties, one often needs to quantify (existentially or universally) over \emph{one} reachable state we want to mark with a given atomic proposition. To this aim, we add the following abbreviations~: \[ \exists^1p.\vfi \eqdef \exists p. \big( (\Ex_{=1}\F \: p) \et \vfi\big) \quad\quad\quad \forall^1p.\vfi \eqdef \forall p. \big( (\Ex_{=1}\F \: p) \impl \vfi\big) \] \section{Experimental results} \label{sec-experiments} In this section, we consider three examples to illustrate the \QBF-based model-checking approach for \QCTL. We propose these problems because the size of the structures can easily be scaled up, and the properties to be checked are quite different. Note that these properties cannot be expressed with classical temporal logics. We have implemented a prototype to try the different reduction strategies~\footnote{NB: For reductions~\MetFPF\ and~\MetX\ the formula has to be given in Prenex normal form.} . Our tool is available online~\footnote{\url{https://www.irif.fr/~francoisl/qctlmc.html}}~: given a Kripke structure $\calK$ with a state $x$ and a formula $\Phi$, it produces a specification file (corresponding to $\widehat{\Phi}^{x}$) for the SMT-solver Z3~\cite{MouraB08}. The choice of Z3 was motivated by the fact that the generated \QBF\ formulas are not always Prenex, which many \QBF-solvers require, unlike Z3. \subsection{$k$-connectivity} Here, we consider an undirected graph, and we want to check whether there exist (at least) $k$ internally disjoint paths~\footnote{Two paths paths $src \leftrightarrow r_1 \leftrightarrow \ldots \leftrightarrow r_k \leftrightarrow dest$ and $src \leftrightarrow r'_1 \leftrightarrow \ldots \leftrightarrow r'_{k'} \leftrightarrow dest$ are internally disjoint iff $r_i \not= r'_{j}$ for any $1 \leq i \leq k$ and $1 \leq j \leq k'$. And note that with this def., if there is an edge $(x,y)$, there exist $k$ internally disjoint paths from $x$ to $y$ for any $k$.} from a vertex $x$ to some vertex $y$. A classical result in graph theory due to Menger ensures that, given two vertices $x$ and $y$ in a graph $G$, the minimum number of vertices whose deletion makes that there is no more paths between $x$ and $y$ is equal to the maximum number of internally disjoint paths between these two vertices. We can encode these two ideas by the following \QCTL\ formulas (interpreted over $x$)~: \begin{align} \Phi_k \;&\eqdef\; \exists p_1 \ldots \exists p_{k-1} \:\Big( \ET_{1\leq i < k} \EX \big(\Ex (p_i \et \ET_{j\not= i} p_j) \:\Until\: y\big) \;\et\; \EX\: \Ex (\ET_{1\leq i <k} \non p_i) \:\Until\: y \Big) \label{kconF1}\\ \Psi_k \;&\eqdef\; \forall^1 p_1 \ldots \forall^1 p_{k-1} \: \EX \: \Big( \Ex \big( \ET_{1\leq i < k} \non p_i\big) \:\Until\: y\Big) \label{kconF2} \end{align} $\Phi_k$ uses the labelling by the $p_i$'s to mark the internal vertices of $k$ paths between the current position and the vertex $y$. The modality $\EX$ is used to consider only the intermediate states (and not the starting state). The formula $\Psi_k$ proceeds differently~: the idea is to mark exactly $k-1$ states with $p_1,\ldots,p_{k-1}$ and to verify that there still exists at least one path leading to $y$ without going through the states labeled by some $p_i$. By Menger's Theorem, we know that these formulas are equivalent over undirected graphs. We interpret these formulas over Kripke structures $\calS_{n,m}$ with $n\geq m$ (see Figure~\ref{fig-kconnect}) which correspond to two kinds of grid $n\times n$ connected by $m$ edges (these edges are of the form $(q_{i,n},r_{1,i})$ or $(q_{n,i},r_{i,1})$ The initial state is $q_{0,0}$ and when evaluating $\Phi_k$ or $\Psi_k$ we assume the state $r_{n,n}$ to be labeled by $y$. In this context, we clearly have that $\Phi_k$ and $\Psi_k$ hold for true at $q_{0,0}$ iff $k\leq m$. \begin{figure}[h] \centering \begin{tikzpicture}[inner sep=0pt,scale=1.3] \draw (0,2) node[minirond,vert] (q00) {$q_{1,1}$} ; \draw (0.5,2.5) node[minirond,vert] (q01) { $q_{1,2}$} ; \draw (1,3) node[minirond,white] (q02) {\textcolor{black}{$\;\ldots\;$}} ; \draw (1.5,3.5) node[minirond,vert] (q03) {\footnotesize {$\quad\;\;$}} ; \draw (2,4) node[minirond,vert] (q04) {\footnotesize $q_{1,n}$} ; \draw (0.5,1.5) node[minirond,vert] (q10) {\footnotesize $q_{2,1}$} ; \draw (1,2) node[minirond,vert] (q11) {\footnotesize $q_{2,2}$} ; \draw (1.5,2.5) node[minirond,white] (q12) {\textcolor{black}{$\;\ldots\;$}} ; \draw (2,3) node[minirond,vert] (q13) {\footnotesize {$\quad\;\;$}} ; \draw (2.5,3.5) node[minirond,vert] (q14) {\footnotesize $q_{2,n}$} ; \draw (1,1) node[minirond,white] (q20) {\textcolor{black}{$\;\ldots\;$}} ; \draw (1.5,1.5) node[minirond,white] (q21) {\textcolor{black}{$\;\ldots\;$}} ; \draw (2,2) node (q22) { $\;\ldots\;$} ; \draw (2.5,2.5) node[minirond,white] (q23) {\textcolor{black}{$\;\ldots\;$}} ; \draw (3,3) node[minirond,white] (q24) {\textcolor{black}{$\;\ldots\;$}} ; \draw (1.5,0.5) node[minirond,vert] (q30) {\footnotesize $\quad\;\;$} ; \draw (2,1) node[minirond,vert] (q31) {\footnotesize $\quad\;\;$} ; \draw (2.5,1.5) node[minirond,white] (q32) {\textcolor{black}{$\;\ldots\;$}} ; \draw (3,2) node[minirond,vert] (q33) {\footnotesize {$\quad\;\;$}} ; \draw (3.5,2.5) node[minirond,vert] (q34) {\footnotesize $\quad\;\;$} ; \draw (2,0) node[minirond,vert] (q40) {\footnotesize $q_{n,1}$} ; \draw (2.5,.5) node[minirond,vert] (q41) {\footnotesize $q_{n,2}$} ; \draw (3,1) node[minirond,white] (q42) {\textcolor{black}{$\;\ldots\;$}} ; \draw (3.5,1.5) node[minirond,vert] (q43) {\footnotesize {$\quad\;\;$}} ; \draw (4,2) node[minirond,vert] (q44) {\footnotesize $q_{n,n}$} ; \draw[>=latex,<->](q00) -- (q01) ; \draw[>=latex,<->](q01) -- (q02) ; \draw[>=latex,<->](q02) -- (q03) ; \draw[>=latex,<->](q03) -- (q04) ; \draw[>=latex,<->](q10) -- (q11) ; \draw[>=latex,<->](q11) -- (q12) ; \draw[>=latex,<->](q12) -- (q13) ; \draw[>=latex,<->](q13) -- (q14) ; \draw[>=latex,<->](q30) -- (q31) ; \draw[>=latex,<->](q31) -- (q32) ; \draw[>=latex,<->](q32) -- (q33) ; \draw[>=latex,<->](q33) -- (q34) ; \draw[>=latex,<->](q40) -- (q41) ; \draw[>=latex,<->](q41) -- (q42) ; \draw[>=latex,<->](q42) -- (q43) ; \draw[>=latex,<->](q43) -- (q44) ; \draw[>=latex,<->](q00) -- (q10) ; \draw[>=latex,<->](q10) -- (q20) ; \draw[>=latex,<->](q20) -- (q30) ; \draw[>=latex,<->](q30) -- (q40) ; \draw[>=latex,<->](q01) -- (q11) ; \draw[>=latex,<->](q11) -- (q21) ; \draw[>=latex,<->](q21) -- (q31) ; \draw[>=latex,<->](q31) -- (q41) ; \draw[>=latex,<->](q03) -- (q13) ; \draw[>=latex,<->](q13) -- (q23) ; \draw[>=latex,<->](q23) -- (q33) ; \draw[>=latex,<->](q33) -- (q43) ; \draw[>=latex,<->](q04) -- (q14) ; \draw[>=latex,<->](q14) -- (q24) ; \draw[>=latex,<->](q24) -- (q34) ; \draw[>=latex,<->](q34) -- (q44) ; \draw[>=latex,<->,out=73,in=-160] (q00) to (q02); \draw[>=latex,<->,out=75,in=-165] (q00) to (q03); \draw[>=latex,<->,out=85,in=-175] (q00) to (q04); \draw[>=latex,<->,out=-73,in=160] (q00) to (q20); \draw[>=latex,<->,out=-75,in=165] (q00) to (q30); \draw[>=latex,<->,out=-85,in=175] (q00) to (q40); \begin{scope}[shift={(5,0)}] \draw (0,2) node[minirond,vert] (r00) {$r_{1,1}$} ; \draw (0.5,2.5) node[minirond,vert] (r01) { $r_{1,2}$} ; \draw (1,3) node[minirond,white] (r02) {\textcolor{black}{$\;\ldots\;$}} ; \draw (1.5,3.5) node[minirond,vert] (r03) {\footnotesize {$\quad\;\;$}} ; \draw (2,4) node[minirond,vert] (r04) {\footnotesize $r_{1,n}$} ; \draw (0.5,1.5) node[minirond,vert] (r10) {\footnotesize $r_{2,1}$} ; \draw (1,2) node[minirond,vert] (r11) {\footnotesize $r_{2,2}$} ; \draw (1.5,2.5) node[minirond,white] (r12) {\textcolor{black}{$\;\ldots\;$}} ; \draw (2,3) node[minirond,vert] (r13) {\footnotesize {$\quad\;\;$}} ; \draw (2.5,3.5) node[minirond,vert] (r14) {\footnotesize $r_{2,n}$} ; \draw (1,1) node[minirond,white] (r20) {\textcolor{black}{$\;\ldots\;$}} ; \draw (1.5,1.5) node[minirond,white] (r21) {\textcolor{black}{$\;\ldots\;$}} ; \draw (2,2) node (r22) { $\;\ldots\;$} ; \draw (2.5,2.5) node[minirond,white] (r23) {\textcolor{black}{$\;\ldots\;$}} ; \draw (3,3) node[minirond,white] (r24) {\textcolor{black}{$\;\ldots\;$}} ; \draw (1.5,0.5) node[minirond,vert] (r30) {\footnotesize $\quad\;\;$} ; \draw (2,1) node[minirond,vert] (r31) {\footnotesize $\quad\;\;$} ; \draw (2.5,1.5) node[minirond,white] (r32) {\textcolor{black}{$\;\ldots\;$}} ; \draw (3,2) node[minirond,vert] (r33) {\footnotesize {$\quad\;\;$}} ; \draw (3.5,2.5) node[minirond,vert] (r34) {\footnotesize $\quad\;\;$} ; \draw (2,0) node[minirond,vert] (r40) {\footnotesize $r_{n,1}$} ; \draw (2.5,.5) node[minirond,vert] (r41) {\footnotesize $r_{n,2}$} ; \draw (3,1) node[minirond,white] (r42) {\textcolor{black}{$\;\ldots\;$}} ; \draw (3.5,1.5) node[minirond,vert] (r43) {\footnotesize {$\quad\;\;$}} ; \draw (4,2) node[minirond,vert] (r44) {\footnotesize $r_{n,n}$} ; \draw[>=latex,<->](r00) -- (r01) ; \draw[>=latex,<->](r01) -- (r02) ; \draw[>=latex,<->](r02) -- (r03) ; \draw[>=latex,<->](r03) -- (r04) ; \draw[>=latex,<->](r10) -- (r11) ; \draw[>=latex,<->](r11) -- (r12) ; \draw[>=latex,<->](r12) -- (r13) ; \draw[>=latex,<->](r13) -- (r14) ; \draw[>=latex,<->](r30) -- (r31) ; \draw[>=latex,<->](r31) -- (r32) ; \draw[>=latex,<->](r32) -- (r33) ; \draw[>=latex,<->](r33) -- (r34) ; \draw[>=latex,<->](r40) -- (r41) ; \draw[>=latex,<->](r41) -- (r42) ; \draw[>=latex,<->](r42) -- (r43) ; \draw[>=latex,<->](r43) -- (r44) ; \draw[>=latex,<->](r00) -- (r10) ; \draw[>=latex,<->](r10) -- (r20) ; \draw[>=latex,<->](r20) -- (r30) ; \draw[>=latex,<->](r30) -- (r40) ; \draw[>=latex,<->](r01) -- (r11) ; \draw[>=latex,<->](r11) -- (r21) ; \draw[>=latex,<->](r21) -- (r31) ; \draw[>=latex,<->](r31) -- (r41) ; \draw[>=latex,<->](r03) -- (r13) ; \draw[>=latex,<->](r13) -- (r23) ; \draw[>=latex,<->](r23) -- (r33) ; \draw[>=latex,<->](r33) -- (r43) ; \draw[>=latex,<->](r04) -- (r14) ; \draw[>=latex,<->](r14) -- (r24) ; \draw[>=latex,<->](r24) -- (r34) ; \draw[>=latex,<->](r34) -- (r44) ; \draw[>=latex,<->,out=-15,in=105] (r04) to (r44); \draw[>=latex,<->,out=-25,in=115] (r14) to (r44); \draw[>=latex,<->,out=-20,in=120] (r24) to (r44); \draw[>=latex,<->,out=20,in=-100] (r40) to (r44); \draw[>=latex,<->,out=35,in=-110] (r41) to (r44); \draw[>=latex,<->,out=25,in=-115] (r42) to (r44); \end{scope} \draw (4,3.5) node (aux1) {} ; \draw (5,3.5) node (aux1p) {} ; \draw (4,3) node (aux2) {} ; \draw (5,3) node (aux2p) {} ; \draw (4,1) node (aux3) {} ; \draw (5,1) node (aux3p) {} ; \draw[>=latex,<->](aux1) -- (aux1p) ; \draw[>=latex,<->](aux2) -- (aux2p) ; \draw[>=latex,<->](aux3) -- (aux3p) ; \draw (4.5,2.5) node (aux1) {\ldots} ; \draw (4.5,4) node (aux1) {$m$ edges} ; \end{tikzpicture} \caption{Structure $\calS_{n,m}$ for the $k$-connectivity problem.} \label{fig-kconnect} \end{figure} Detailed results are presented in Appendix~\ref{app-res}. The main lessons we can see are~: \begin{itemize} \item Formula $\Phi_k$ is much more difficult to verify~: the number of temporal modalities is probably one explanation. Another one for methods \MetFP\ and \MetFPF (based on the fixed point characterization of $\Until/\WUntil$ modalities) could be an alternation of quantifiers~: in $\Phi_k$, there is an existential quantification over the $p_i$s and the $\EU$s introduce an universal quantification, but it is not the case for $\Psi_k$, where there are only universal quantifications for these reductions. \item The reduction \MetFP\ is the most efficient~: it can be used to verify models with more than two thousands states when $m$ is small. The method \MetFPF\ is also rather efficient, but the flattening seems to be too costly for such a simple formula. \item The reduction \MetUU\ produces very large \QBF\ formulas, but rather simple to check. \end{itemize} We can generalise the problem by verifying that there exist at least $k$ internally disjoint paths between any pair of reachable vertices $x$ and $y$ in a given structure. These previous formulas can be modified as follows~: \begin{align} \Phi^g_k \;&\eqdef\; \forall^1 y \exists p_1 \ldots \exists p_{k-1} \: \AG \Big( \!\!\ET_{1\leq i < k} \!\!\EX \big(\Ex (p_i \et \ET_{j\not= i} p_j) \:\Until\: y\big) \;\et\; \EX\: \Ex (\!\!\ET_{1\leq i <k} \!\!\non p_i) \:\Until\: y \Big) \label{kconGF1} \\ \Psi^g_k \;&\eqdef\; \forall^1 y \forall^1 p_1 \ldots \forall^1 p_{k-1} \AG \Big[ \: \EX \: \Big( \Ex \big( \ET_{1\leq i < k} \non p_i\big) \:\Until\: y\Big)\Big] \label{kconGF2} \end{align} In that case, $\Phi^g_k$ is useless~: too complex to be verified. And the method \MetFP\ is still the most efficient. \subsection{Nim game} Nim game is a turn-based two-players game. A configuration is a set of heaps of objects and a boolean value indicating whose turn it is. At each turn, a player has to choose one non-empty heap and remove at least one object from it. The aim of each player is to remove the last object. Given a configuration $c$ and a Player-$J$ with $J\in\{1,2\}$, we can build a finite Kripke structure $\calS_J$, where $x_c$ is a state corresponding to the configuration $c$ ; and use a \QCTL\ formula $\Phiwin^J$ such that $\calS, x_c \sat \Phiwin^J$ iff Player-$J$ has a wining strategy from $c$. Note that there is a simple and well-known criterion over the numbers of objects in each heap to decide who has a winning strategy, but we consider this problem just because it is interesting to illustrate what kind of problem we can solve with \QCTL. Each configuration corresponds to a state in $\calS_J$. Every move for Player-$\bar{J}$ from a configuration $c$ to a configuration $c'$ provides a transition $(x_c,x_{c'})$ in $\calS_J$. However, a move of Player-$J$ from $c$ to $c'$ is encoded as two transitions $x_c \fleche x_{c,c'} \fleche x_{c'}$ where $x_{c,c'}$ is then an intermediary state we use to encode a strategy for Player-$J$ (marking $x_{c,c'}$ by an atomic proposition will correspond to Player-$J$ choosing $c'$ from $c$). We assume that every state $x_c$ is labeled by $t_1$ if it's Player-$1$'s turn to play at $c$, and by $t_2$ otherwise. Every intermediary state $x_{c,c'}$ is labeled by $\text{int}$. We also label empty configurations by $w_1$ or $w_2$, depending on which player played the last move. Clearly, the size of $\calS$ will depend on the number of objects in each set in the initial configuration. The formula $\Phiwin^J$ depends only on $J$~: \[ \Phiwin^J \;\eqdef\; \exists m. \Big( \AG \big(t_J \:\impl \: \EX m \big) \;\et\; \AF \big(w_J \ou (\text{int} \et \non m)\big)\Big) \] This formula holds true in a state corresponding to some configuration $c$ iff there exists a labelling by $m$ such that every reachable configuration where it's Player-$J$'s turn, has a successor labeled by $m$ (thus a possible choice to do) and every execution from the current state leads to either a winning state for Player-$J$ or a non-selected intermediary state, therefore all outcomes induced by the underlying strategy have to verify $\F w_J$. Note that in this example, the Kripke structure is acyclic (except the self-loops on the ending states). From detailed results in appendix, we can see~: \begin{itemize} \item One can consider structures with more than 10 thousand states. Note that the number of heaps is important for the size of the model, but the maximal length of a game depends on the number of objects (and is rather small in our examples). \item The most efficient method is \MetFPF\ (with \MetFP). \item Method \MetX\ is more efficient when we consider bounded model-checking. Note that in this case, the verification may not be complete~: if the \QBF\ formula is valid, the property is satisfied by the structure, otherwise, no conclusion can be done, except if we can prove that the chosen bound was big enough to be sure that there is no solution. In our case, we can easily compute the maximal bound~: at each turn, a player has to pick at least one object, such a move may give rise to one transition in the model (for the opponent), or two transitions (for the player for whom we look for a strategy). Thus, if there are $n$ objects in the initial configuration, we can choose $\frac{3n}{2}$ for the bound. \end{itemize} \subsection{Resources distribution} \begin{figure}[t] \centering \begin{tikzpicture}[inner sep=0pt,scale=0.8] \draw (0,4) node[minirond,vert] (v00) {\footnotesize $q_{1,1}$} ; \draw (2,4) node[minirond,vert] (v01) {\footnotesize $q_{1,2}$} ; \draw (4,4) node (v02) { $\;\ldots\;$} ; \draw (6,4) node[minirond,vert] (v03) {\footnotesize {$\quad\;\;$}} ; \draw (8,4) node[minirond,vert] (v04) {\footnotesize $q_{1,k}$} ; \draw (0,2.5) node[minirond,vert] (v10) {\footnotesize $q_{2,1}$} ; \draw (2,2.5) node[minirond,vert] (v11) {\footnotesize $q_{2,2}$} ; \draw (4,2.5) node (v12) { $\;\ldots\;$} ; \draw (6,2.5) node[minirond,vert] (v13) {\footnotesize $\quad\;\;$} ; \draw (8,2.5) node[minirond,vert] (v14) {\footnotesize $q_{2,k}$} ; \draw (0,0) node[minirond,vert] (v30) {\footnotesize $q_{n,1}$} ; \draw (2,0) node[minirond,vert] (v31) {\footnotesize $q_{n,2}$} ; \draw (4,0) node (v32) { $\;\ldots\;$} ; \draw (6,0) node[minirond,vert] (v33) {\footnotesize $\quad\;\;$} ; \draw (8,0) node[minirond,vert] (v34) {\footnotesize $q_{n,k}$} ; \draw (0,1.3) node (v20) { $\;\ldots\;$} ; \draw (2,1.3) node (v21) { $\;\ldots\;$} ; \draw (4,1.3) node (v22) { $\;\ldots\;$} ; \draw (6,1.3) node (v23) { $\;\ldots\;$} ; \draw (8,1.3) node (v24) { $\;\ldots\;$} ; \draw[-latex](v00) -- (v01) ; \draw[-latex](v01) -- (v02) ; \draw[-latex](v02) -- (v03) ; \draw[-latex](v03) -- (v04) ; \draw[-latex](v10) -- (v11) ; \draw[-latex](v11) -- (v12) ; \draw[-latex](v12) -- (v13) ; \draw[-latex](v13) -- (v14) ; \draw[-latex](v20) -- (v21) ; \draw[-latex](v21) -- (v22) ; \draw[-latex](v22) -- (v23) ; \draw[-latex](v23) -- (v24) ; \draw[-latex](v30) -- (v31) ; \draw[-latex](v31) -- (v32) ; \draw[-latex](v32) -- (v33) ; \draw[-latex](v33) -- (v34) ; \draw[-latex](v00) -- (v10) ; \draw[-latex](v01) -- (v11) ; \draw[-latex](v03) -- (v13) ; \draw[-latex](v04) -- (v14) ; \draw[-latex](v10) -- (v20) ; \draw[-latex](v11) -- (v21) ; \draw[-latex](v13) -- (v23) ; \draw[-latex](v14) -- (v24) ; \draw[-latex](v20) -- (v30) ; \draw[-latex](v21) -- (v31) ; \draw[-latex](v23) -- (v33) ; \draw[-latex](v24) -- (v34) ; \draw[-latex',out=10,in=170] (v04) to (v00); \draw[-latex',out=10,in=170] (v14) to (v10); \draw[-latex',out=10,in=170] (v24) to (v20); \draw[-latex',out=10,in=170] (v34) to (v30); \draw[-latex',out=-80,in=80] (v30) to (v00); \draw[-latex',out=-80,in=80] (v31) to (v01); \draw[-latex',out=-80,in=80] (v33) to (v03); \draw[-latex',out=-80,in=80] (v34) to (v04); \end{tikzpicture} \vspace{-0.2cm} \caption{Structure $\calK_{n,k}$ for the resources distribution problem.} \label{fig-resources} \end{figure} The last example is as follows~: given a Kripke structure $\calS$ and two integers $k$ and $d$, we aim at choosing at most $k$ states (called targets in the following) such that every reachable state (from the initial one) can reach a target in less than $d$ transitions. This problem can be encoded with the following \QCTL\ formula where $d$ modalities $\EX$ are nested~: \[ \Phires \;\eqdef\; \exists^1 c_1 \ldots \exists^1 c_k \: \AG \Big( (\!\!\OU_{1\leq i \leq k}\!\! c_i) \ou \EX \Big( (\!\!\OU_{1\leq i \leq k}\!\! c_i) \ou \Big( \ldots \ou \EX ( \!\!\OU_{1\leq i \leq k}\!\! c_i) \Big) \Big) \Big) \] For experimental results, we consider the grid $\calK_{n,m}$ described at Figure~\ref{fig-resources}. Note that for this example, reductions~\MetUU\ and \MetFP\ are similar because there is no Until in the formula ($\AG$ is treated as a conjunction). From detailed results in appendix, one can see~: \begin{itemize} \item Only small models have been successfully verified. \item The nesting of $\EX$s operators give an advantage to the reduction based on flattening (\MetX\ and \MetFPF)~: the size of the \QBF\ formula increases more slowly. \item The reduction \MetX\ is the most efficient on this example. Since there is no Until modality (except behind $\AG$ which is treated separately), the difference with \MetFPF\ is due to the encoding of $\exists_1$ operator with a unique bit vector in \MetX, this choice seems to be more efficient in this example. \end{itemize} \section{Introduction} Temporal logics have been introduced in computer science in the late 1970's~\cite{Pnu77}; they~provide a powerful formalism for specifying correctness properties of evolving systems. Various kinds of temporal logics have been defined, with different expressiveness and algorithmic properties. For~instance, the~\emph{Computation Tree Logic}~(\CTL) expresses properties of the computation tree of the system under study (time is branching~: a state may have several successors), and the \emph{Linear-time Temporal Logic}~(\LTL) expresses properties of one execution at a time (a system is viewed as a set of executions). Temporal logics allow \emph{model checking}, i.e.\ the automatic verification that a finite state system satisfies its expected behavioral specifications~\cite{QS82a,CE82}. It is well known that \CTL~model-checking is \PTIME-complete and \LTL~model-checking (based on automata techniques) is \PSPACE-complete. But verification tools exist for both logics and model-checking is now commonly used in the design of critical reactive systems. The main limitation to this approach is the state-explosion problem~: symbolic techniques (for example with BDD), SAT-based approaches, or partial order reductions have been developed and they are impressively successful. The SAT-based model-checking consists in using SAT-solvers in the decision procedures. It was first developed for bounded model-checking (to search for executions whose length is bounded by some integer, satisfying some temporal property) which can be reduced to some satisfiability problem and then can be solved by a SAT-solver~\cite{BiereCCZ99}. SAT approaches have also been extended to unbounded verification and combined with other techniques~\cite{McMillan02}. Many studies have been done in this area, and it is widely considered as an important approach in practice, which complements other symbolic techniques like BDD (see~\cite{BiereCCSZ03} for a survey). In~terms of expressiveness, \CTL\ (or \LTL) still has some limitations~: in~particular, it~lacks the ability of \emph{counting}. For instance, it~cannot express that an event occurs (at~least) at every even position along a path, or that a state has two successors. In~order to cope with this, temporal logics have been extended with \emph{propositional quantifiers}~\cite{sis83}~: those quantifiers allow for adding fresh atomic propositions in the model before evaluating the truth value of a temporal-logic formula. That~a state has at least two successors can then be expressed (in~\emph{quantified \CTL}, hereafter written~\QCTL) by saying that it~is possible to label the model with atomic proposition~$p$ in such a way that there is a successor that is labelled with~$p$ and one that is~not. Different semantics for \QCTL\ have been studied in literature depending on the definition of the labelling~: either it refers to the finite-state model -- it is the \emph{structure} semantics -- or it refers to the execution tree -- it is the \emph{tree semantics}. Both semantics are interesting and have been extensively studied~\cite{Kup95a,Fre01,PBDDC02,Fre03,DLM12,LM14}. While the tree semantics allow us to use the tree automata techniques to get decision procedures (model-checking and satisfiability are \TOWER-complete~\cite{LM14}), the situation is quite different for the structure semantics~: in this framework, model-checking is \PSPACE-complete and satisfiability is undecidable~\cite{Fre01}. In this paper, we focus on the structure semantics, and we propose a model-checking algorithm based on a reduction to \QBF~: given a Kripke structure $\calK$ and a \QCTL\ formula $\Phi$, we show how to build a \QBF\ formula $\widehat{\Phi}^\calK$ which is valid iff $\calK\sat \Phi$. It is natural to use \QBF\ quantifiers to deal with propositional quantifiers of \QCTL. Of course, \QBF-solvers are not as efficient as SAT-solvers, but still much progress has been made (and \QBF-solvers have already been considered for model-checking, as in~\cite{DershowitzHK05}). We propose several reductions depending on the way of dealing with nested temporal modalities, and we have implemented a prototype (based on Z3 SMT-solver~\cite{MouraB08}) to compare these reductions over several examples. As far as we know, it is the first implementation of a model-checker for \QCTL. Here, our first objective is to use the \QBF-solver as a tool to check complex properties over limited size models, and this is therefore different from the classical use of \SAT-based techniques which are precisely applied to solve verification problems for very large systems. The outline of the paper is as follows~: we~begin with setting up the necessary formalism in order to define \QCTL. We~then devote Section~\ref{sec-reduc} to the different reductions to \QBF. Finally, Section~\ref{sec-experiments} contains several practical results and examples. \section{Model-checking QCTL} \label{sec-reduc} Model-checking \QCTL\ is a \PSPACE-complete problem (for detailed results about program complexity and formula complexity, see~\cite{LM14}), and it is \NP-complete for the restricted set of formulas of the form $\exists P.\vfi$, with $P\subseteq \AP$ and $\vfi \in \CTL$\cite{Kup95a}. In this section, we give a reduction from the \QCTL\ model-checking problem to \QBF. In the following, we assume a Kripke structure $\calK=\tuple{V,E,\ell}$, an initial state $x_0 \in V$ and a \QCTL\ formula $\Phi$ to be fixed. Let $V$ be $\{v_1,\ldots,v_n\}$. We also assume w.l.o.g.\ that every quantifier $\exists$ and $\forall$ in $\Phi$ introduces a fresh atomic proposition, and distinct from the propositions used in $\calK$. We use $\AP_Q^\Phi$ to denote the set of quantified atomic propositions in $\Phi$. These assumptions allow us to use an alternative notation for the semantics of $\Phi$-subformulas~: the truth value of $\vfi$ will be defined for a state $x$ in $\calK$ within an \emph{environment} $\varepsilon:\AP_Q^\Phi\mapsto 2^V$, that is a partial mapping associating a subset of vertices to a proposition in $\AP_Q^\Phi$. We use $\calK,x \sat_\varepsilon \vfi$ to denote that $\vfi$ holds at $x$ in $\calK$ within $\varepsilon$. This ensures that the $\calK$'s labelling $\ell$ is not modified when a subformula is evaluated, only $\varepsilon$ is extended with labellings for new quantified propositions. Formally the main changes of the semantics are as follows~: \begin{align*} \calK, x \models_\varepsilon p & \text{ iff } \begin{cases} \top & \text{if}\: (p \in \AP_Q^\Phi \et x \in \varepsilon(p)) \ou (p \not\in \AP_Q^\Phi \et p \in \ell(x)) \\ \bot & \text{otherwise} \end{cases} \\ \calK, x \models_\varepsilon \exists p.\ \phi & \text{ iff } \exists V' \subseteq V \text{ s.t. } \calK, x \models_{\varepsilon[p \mapsto V']} \phi \end{align*} where $\varepsilon[p \mapsto V']$ denotes the mapping which coincides with $\varepsilon$ for every proposition in $AP_Q^\Phi\setminus \{p\}$ and associates $V'$ to $p$. We use this new notation in order to better distinguish initial $\calK$'s propositions and quantified propositions to make proofs simpler. Of course, there is no semantic difference~: $\calK,x \models \Phi$ iff $\calK, x \models_\emptyset \Phi$. \medskip In next sections, we consider general \emph{quantified propositional formulas} (\QBF) of the form~: \[ \QBF \ni \alpha, \beta \coloncolonequals q \mid \alpha \et \beta \mid \alpha \ou \beta \mid \non \alpha \mid \alpha \equivaut \beta \mid \alpha \impl \beta \mid \exists q.\alpha \mid \forall q.\alpha \] The formal semantics of a formula $\alpha$ is defined over a Boolean valuation for free variables in $\alpha$ (\ie\ propositions which are not bounded by a quantifier~\footnote{We assume w.l.o.g.\ that every quantifier $\exists$ and $\forall$ introduces a new proposition.}), and it is defined as usual. A formula is said to be closed when it does not contain free variables. In the following, we use the standard notion of validity for closed \QBF\ formulas. Our aim is then to build a (closed) \QBF\ formula $\widehat{\Phi}^{x_0}$ such that $\widehat{\Phi}^{x_0}$ is valid iff $\Phi$ holds true at $x_0$ in $\calK$. \subsection{Overview} We present several reductions of \QCTL\ model-checking problem to \QBF\ validity problem. Given a $\Phi$-subformula $\vfi$, a vertex $x \in V$, and a subset $P \subseteq AP_Q^\Phi$, we define a \QBF\ formula $\widehat{\vfi}^{x,P}$ whose variables belongs to $\AP_Q^\Phi\times V$ (in the following, we use the notation $p^x$ for $p\in \AP_Q^\Phi$ and $x\in V$). The first two reductions are based on different encodings of temporal modalities, but share a common part given at Table~\ref{reduc-main}. \begin{table} \begin{align*} \widehat{\non \vfi}^{x,P} &\eqdef \non \widehat{\vfi}^{x,P} \quad \quad \widehat{\vfi \ou \psi}^{x,P} \eqdef \widehat{\vfi}^{x,P} \ou \widehat{\psi}^{x,P} \quad \quad \widehat{\EX \vfi}^{x,P} \eqdef \OU_{(x,x') \in E} \widehat{\vfi}^{x',P} \\ \widehat{\exists p. \vfi}^{x,P} &\eqdef \exists p^{v_1} \ldots p^{v_n}. \widehat{\vfi}^{x,P\cup\{p\}} \quad\quad\quad \widehat{p}^{x,P} \eqdef \begin{cases} p^x & \text{if}\: p \in P \\ \top & \text{if}\: p \not\in P \et p \in \ell(x) \\ \bot & \text{otherwise} \\ \end{cases} \\ \end{align*} \caption{Reduction for basic modalities for reductions~\MetUU\ and ~\MetFP} \label{reduc-main} \end{table} \subsubsection{Unfolding characterization of the until operators} First, we can complete previous construction rules of Table~\ref{reduc-main} with those of Table~\ref{compl1} to get the first method (called \MetUU). This is a naive approach consisting in encoding the temporal modalities as unfoldings of the transition relation. Before stating the correctness of the construction, we need to associate a Boolean valuation $v_\varepsilon$ for variables in $\AP_Q^\Phi\times V$ to an environment $\varepsilon$ for $\AP_Q^\Phi$. We define $v_\varepsilon$ as follows~: for any $p\in \AP_Q^\Phi$ and $x \in V$, $v_\varepsilon(p^x) = \top$ iff $x \in \epsilon(p)$. \medskip Now we have the following theorem whose proof is in appendix~\ref{app-uu}~: \begin{theorem} \label{theo-UU} Given a \QCTL\ formula $\Phi$, a Kripke structure $\calK=\tuple{V,E,\ell}$, a state $x \in V$, an environment $\varepsilon : \AP_Q^\Phi \mapsto 2^V$ and a $\Phi$-subformula $\vfi$, if $\widehat{\vfi}^{x,\dom(\varepsilon)}$ is defined inductively w.r.t.\ the rules of Tables~\ref{reduc-main} and~\ref{compl1}, we have: $\calK, x \sat_\varepsilon \vfi \quad\mbox{iff}\quad v_\varepsilon \sat \widehat{\vfi}^{x,\dom(\varepsilon)}$ \end{theorem} \begin{table} \begin{align} \widehat{\Ex \vfi \Until \psi}^{x,P} &\eqdef \overline{\Ex \vfi \Until \psi}^{x,P,\{x\}} \quad \quad \text{with:} \\ \overline{\Ex \vfi \Until \psi}^{x,P,X} &\eqdef \; \widehat{\psi}^{x,P} \ou \Big(\widehat{\vfi}^{x,P} \et \OU_{(x,x')\in E s.t. x'\not\in X} \overline{\Ex \vfi \Until \psi}^{x',P,X\cup\{x'\}} \Big) \\ \widehat{\All \vfi \Until \psi}^{x,P} &\eqdef \overline{\All \vfi \Until \psi}^{x,P,\{x\}} \quad \quad \text{with:} \\ \overline{\All \vfi \Until \psi}^{x,P,X} &\eqdef \; \begin{cases} \widehat{\psi}^{x,P} & \text{if}\: \exists (x,x') \in E \et x'\in X\\ {\displaystyle \widehat{\psi}^{x,P} \ou \Big(\widehat{\vfi}^{x,P} \et \ET_{(x,x')\in E} \overline{\All \vfi \Until \psi}^{x',P,X\cup\{x'\}} \Big)} & \text{otherwise} \\ \end{cases} \end{align} \caption{Reduction for temporal modalities $\EU$ and $\AU$ -- variant \MetUU} \label{compl1} \end{table} It remains to define $\widehat{\Phi}^x$ as $\widehat{\Phi}^{x,\emptyset}$ and we get the reduction~: $\calK, x_0 \sat \Phi$ iff $\widehat{\Phi}^{x_0}$ is valid. The main drawback of this reduction is the size of the \QBF\ formula~: indeed any Until modality may induce a formula whose size is in $O(|V|!)$, and the size of the resulting formula $\widehat{\Phi}^{x_0}$ is then in $O((|\Phi|\cdot|V|!)^{\HT(\Phi)})$. Nevertheless, one can notice that the reduction does not use new quantified propositons to encode the temporal modalities, contrary to other methods we will see later. \subsection{Fixed point characterization of the until operators} Here we present the fixed point method (called \MetFP) for dealing with the modalities $\All\Until$\ and $\Ex\Until$. Let $\phi$ and $\psi$ be two \QCTL-formulas. The idea of the method is to build a \QCTL\ formula that is equivalent to $\Ex\phi\Until\psi$ (or $\All\phi\Until\psi$), using only the modalities $\Ex\X$, $\All\X$ and $\All\G$. We first have the following lemma~: \begin{lemma} \label{lemFP1} For any \QCTL\ formula $\Ex \vfi \Until \psi$, we have~: \[ \Ex \vfi \Until \psi \quad\equiv\quad \forall z. \Big( \AG \big( z \equivalent (\psi \ou (\vfi \et \EX \: z)) \big) \; \impl \; z\Big) \] \end{lemma} \begin{proof} Let $x$ be a state in a Kripke structure $\calK$. Let $\theta$ be the formula $\big(\AG \big( z \equivalent (\psi \ou (\vfi \et \EX \: z)) \big) \; \impl \; z\big)$. \\ Assume $\calK, x \sat \Ex \vfi \Until \psi$. We can use the standard characterization of $\EU$ as fixed point~: $x$ belongs to the least fixed point of the equation $Z \eqdef \psi \ou (\vfi \et \EX \: Z)$ where $\psi$ (resp.\ $\vfi$) is here interpreted as the set of states satisfying $\psi$ (resp.\ $\vfi$). Therefore any $z$-labelling of reachable states from $x$~\footnote{Labelling other states does not matter.} corresponding to a fixed point will have the state $x$ labelled. This is precisely what is specified by the \QCTL\ formula. \\ Now if $\calK, x \sat \theta$ for every $z$-labelling corresponding to a fixed point of the previous equation, this is the case for the $z$-labelling of the states reachable from $x$ and satisfying $\Ex \vfi \Until \psi$, and we deduce $\calK, x \sat \Ex \vfi \Until \psi$. \end{proof} And we have the same result for $\AU$~: \begin{lemma} \label{lemFP2} For any \QCTL\ formula $\All \vfi \Until \psi$, we have~: \[ \All \vfi \Until \psi \quad\equiv\quad \forall z. \Big( \AG \big( z \equivalent (\psi \ou (\vfi \et \AX \: z)) \big) \; \impl \; z\Big) \] \end{lemma} \begin{proof} Similar to the proof of Lemma~\ref{lemFP1} \end{proof} As a direct consequence, we get the following result~: \begin{proposition} \label{prop-qctlres} For any \QCTL\ formula $\Phi$, we can build an equivalent \QCTL\ formula $\FPC(\Phi)$ such that~: (1) $\FPC(\Phi)$ is built up from atomic propositions, Boolean operators, propositional quantifiers and modalities $\EX$ and $\AG$, and (2) the size of $\FPC(\Phi)$ is linear in $|\Phi|$. \end{proposition} Note that the size of $\FPC(\Phi)$ comes from the fact that there is no duplication of subformulas when applying the transformation rules based on equivalences of Lemmas~\ref{lemFP1} and~\ref{lemFP2}. Moreover, the temporal height of $\FPC(\Phi)$ is $\HT(\Phi)+1$. And to translate $\FPC(\Phi)$ into \QBF, it remains to add a single rule~\footnote{For $\AX$ we can either change the rule for $\EX$ with a disjunction, or express it with $\EX$ and $\non$.} to the definitions of Table~\ref{reduc-main} to deal with $\AG$~: \begin{align} \widehat{\AG \vfi}^{x,P} &\eqdef \ET_{(x,y)\in E^*} \widehat{\:\vfi\:}^{\:y,P} \label{rule-ag-fp} \end{align} And we have~: \begin{theorem} Given a \QCTL\ formula $\Phi$, a Kripke structure $\calK=\tuple{V,E,\ell}$, a state $x \in V$ and an environment $\varepsilon : \AP_Q^\Phi \mapsto 2^V$, for any $\Phi$-subformula $\vfi$, if $\widehat{\FPC(\vfi)}^{x,\dom(\varepsilon)}$ is defined inductively w.r.t.\ the rules of Table~\ref{reduc-main} and the rule~\ref{rule-ag-fp}, we have~: \[ \calK, x \sat_\varepsilon \vfi \quad\mbox{iff}\quad v_\varepsilon \sat \widehat{\FPC(\vfi)}^{x,\dom(\varepsilon)} \] \end{theorem} \begin{proof} The proof is a direct consequence of Proposition~\ref{prop-qctlres}. \end{proof} With this approach, the size of $\widehat{\FPC(\Phi)}^{x}$ is in $O((|\Phi|\cdot|\calK|)^{\HT(\Phi)})$. Indeed, an $\EU$ (or $\AU$) modality gives rise to a \QBF\ formula of size $(|V|+|E|)$. The exponential size comes from the potential nesting of temporal modalities~: to avoid it, one could consider the DAG-size of formulas. In the next section, we consider another solution. Note also that the number of propositional variables in the \QBF\ formula is bounded by $|\AP_Q^\Phi|\cdot|V|$. \subsection{Reduction via flat formulas} To avoid the size explosion of $\widehat{\Phi}^x$, one can use an alternative approach for Prenex \QCTL\ formulas. Remember that any \QCTL\ formula can be translated into an equivalent \QCTL\ formula in Prenex normal form whose size is linear in the size of the original formula~\cite{LM14}. In the following, a \CTL\ formula is said to be \emph{basic} when it is of the form $\EX \alpha$, $\Ex \alpha \Until \beta$ or $\All \alpha \Until \beta$ where $\alpha$ and $\beta$ are Boolean combinations of atomic propositions. It is easy to observe that any \CTL\ formula can be translated into a \QCTL\ formula with a temporal height less or equal to 2~: \begin{proposition} \label{prop-ctl-flat} Any \CTL\ formula $\Phi$ is equivalent to some \QCTL\ formula $\Psi$ of the form~: \[ \exists \{\kappa_1\ldots \kappa_m\}. \Big( \Phi_0 \et \ET_{i=1\ldots m} \AG (\kappa_i \Leftrightarrow \theta_i)\Big) \] where $\Phi_0$ is a Boolean combination of basic \CTL\ formulas and every $\theta_i$ is a basic \CTL\ formula (for any $1\leq i \leq m$). Moreover, $|\Psi|$ is in $O(|\Phi|)$. \end{proposition} \begin{proof} Let $S$ be the set of \emph{temporal} subformulas occurring in $\Phi$ at a temporal depth greater or equal to 1. Assume $S \eqdef \{\vfi_1, \ldots, \vfi_m\}$ and let $\{\kappa_1,\ldots,\kappa_m\}$ be $m$ fresh atomic propositions. For any $1\leq i \leq m$, we define $\theta_i$ as $\vfi_i$ where every temporal subformula $\vfi_j$ at temporal depth 1 in $\vfi_i$, is replaced by $\kappa_j$. $\Phi_0$ is defined similarly from $\Phi$. The equivalence $\Phi \equiv \Psi$ can be proven by induction over $|S|$. If $|S|=0$, the formula satisfies the property. Now consider a formula with $|S|=m>0$. Let $\vfi_m \in S$ be a basic \CTL\ formula. Let $\Phi'$ be the following formula~: $\exists \kappa_m.(\Phi[\vfi_m\leftarrow \kappa_m] \et \AG (\kappa_m \equivalent \vfi_m))$, where $\vfi[\alpha\leftarrow \beta]$ is $\vfi$ where every occurrence of $\alpha$ is replaced by $\beta$. Then $\Phi$ and $\Phi'$ are equivalent~: any state reachable from the current state $x$ will be labeled by $\kappa_m$ iff $\vfi_m$ holds true at that state (NB~: the states that are not reachable from $x$ do not matter for the truth value of $\Phi$) and this enforces the equivalence. And then we can apply the induction hypothesis to get~: \begin{align*} \Phi & \equiv \exists \kappa_m.(\Phi[\vfi_m\leftarrow \kappa_m] \et \AG (\kappa_m \equivalent \vfi_m)) \\ & \stackrel{i.h.}{\equiv} \exists\kappa_{m}.\Big[ \Big(\exists \{\kappa_1\ldots \kappa_{m-1}\}. \Big( \Phi_0 \et \ET_{i=1\ldots m-1} \AG (\kappa_i \Leftrightarrow \theta_i) \Big) \Big) \et \AG (\kappa_m \equivalent \vfi_m)\Big] \\ & \equiv \exists \{\kappa_1\ldots \kappa_m\}. \Big( \Phi_0 \et \ET_{i=1\ldots m} \AG (\kappa_i \Leftrightarrow \theta_i) \Big) \end{align*} Note that the last equivalence comes from the fact that no $\kappa_i$ with $i<m$ occurs in $\vfi_m$ and we also have $\theta_m=\vfi_m$. The size of $\Psi$ is linear in $|\Phi|$. \end{proof} In the following, a \QCTL\ formula of the form ${\displaystyle \calQ. \big( \Phi_0 \et \ET_{i=1\ldots m} \AG (\kappa_i \Leftrightarrow \theta_i)\big)}$, where $\calQ$ is a sequence of quantifications, $\Phi_0$ is a Boolean combination of basic \CTL\ formulas, and every $\theta_i$ (for $i=1,\ldots,m$) is a basic \CTL\ formula, is said to be a \emph{flat} formula. As a corollary of previous results, we have~: \begin{proposition} \label{prop-flat} Any \QCTL\ formula $\Phi$ is equivalent to some flat formula whose size is linear in $|\Phi|$. \end{proposition} Given a \QCTL\ formula $\Phi$, we use $\Flat(\Phi)$ to denote the flat formula equivalent to $\Phi$, obtained by first translating $\Phi$ into Prenex normal form, and then transform the \CTL\ subformula as described in Proposition~\ref{prop-ctl-flat}. Applying method \MetFP\ to some flat formula provides a \QBF\ formula of polynomial size since a flat formula has a temporal height less or equal to 2~: \begin{corollary} Given a \QCTL\ formula $\Phi$, a Kripke structure $\calK=\tuple{V,E,\ell}$ and a state $x$, the \QBF\ formula \stackon[-8pt]{$ \FPC(\Flat(\Phi))$}{\vstretch{1.5}{\hstretch{8}{\widehat{\phantom{\;}}}}}$^{x}$ obtained by applying the rules of Table~\ref{reduc-main} and the rule~\ref{rule-ag-fp} is valid iff $\calK, x \sat \Phi$. And the size of $\stackon[-8pt]{$ \FPC(\Flat(\Phi))$}{\vstretch{1.5}{\hstretch{8}{\widehat{\phantom{\;}}}}}^{x}$ is in $O(|V|\cdot(|V|+|E|)\cdot |\Phi|)$. \end{corollary} Therefore this reduction (called~\MetFPF) provides a \PSPACE\ algorithm for \QCTL\ model-checking. But there are two disadvantages of this approach. First, putting the formula into Prenex normal form may increase the number of quantified atomic propositions and the number of alternations (which is \emph{in fine} linear in the number of quantifiers in the original formula)\cite{LM14}. For example, when extracting a quantifier $\forall$ from some $\EX$ modality, we need to introduce two propositions, this can be seen for the formula $\EX (\forall p. (\AX p \ou \AX \non p))$ which is translated as~: \[ \exists z. \forall p. \forall z'. \Big( (\EX (z \et z') \impl \AX(z \impl z')) \et \EX (z \et (\AX p \ou \AX \non p))\Big) \] where the proposition $z$ is used to mark a state, and $z'$ is used to enforce that only at most one successor is labeled by $z$. Of course, these two remarks may have a strong impact on the complexity of the decision procedure. Finally, note also that the resulting \QBF\ formula is not in Prenex normal form. \subsection{Variant of \MetFPF} In the previous reduction, the modalities $\EU$ and $\AU$ may introduce an alternation of quantifiers~: an atomic proposition $\kappa$ is introduced by an existential quantifier, and then an universal quantifier introduces a variable $z$ to encode the fixed point characterisation of $\Until$. We propose another reduction in order to avoid this alternation~: for this, we will use bit vectors (instead of single Boolean values) associated with every state to encode the distance from the current state to a state satisfying the right-hand side of the Until modality. First, we consider a $\QCTL$\ formula $\Phi$ under negation normal form (NNF), where the negation is only applied to atomic propositions. This transformation makes that $\Phi$ is built from temporal modalities in $S_{tmod} = \{\EX, \AX, \EU, \AU, \EW, \AW\}$ We can then reformulate Proposition~\ref{prop-flat} as follows~: \begin{proposition} \label{prop-meth5} Any \QCTL\ formula $\Phi$ is equivalent to some \QCTL\ formula $\Psi$ in NNF of the form~: ${\displaystyle \Psi \eqdef \calQ \: \exists \{\kappa_1\ldots \kappa_m\}. \Big( \Phi_0 \et \ET_{i=1\ldots m} \AG (\kappa_i \impl \theta_i)\Big) }$ where $\calQ$ is a sequence of quantifications, $\Phi_0$ is a \CTL\ formula containing only the temporal modalities $\EX$, $\AX$ or $\AG$ and whose temporal height is less or equal to 1, and every $\theta_i$ is a basic \CTL\ formula (with $1 \leq i \leq m$). Moreover, $|\Psi|$ is in $O(|\Phi|)$. \end{proposition} \begin{proof} Consider w.l.o.g.\ a \QCTL\ formula $\Phi$ in Prenex normal form and NNF. We can define $\Phi_0$ and the basic formulas $\theta_i$s approximately as in Proposition~\ref{prop-ctl-flat}, except that $\Phi_0$ contains only $\EX$, $\AX$ or $\AG$ modalities, and every other modality gives rise to some quantified proposition $\kappa$ and a subformula $\AG(\ldots)$ in the main cunjunction of $\Psi$. Every $\theta_i$ starts with a modality in $S_{tmod}$. Let $\vfi_i$ be the original $\Phi$-subformula associated with $\theta_i$. Note that $\Psi$ is in NNF, and $\kappa_i$ occurs only once in $\Psi$ in the scope of a negation, and it happens in the subformula $\AG(\kappa_i \impl \theta_i)$. We now have to show that $\Phi$ is equivalent to $\Psi$. Consider the formula $\widetilde{\Psi}$ where every $\impl$ is replaced by $\equivaut$~: by following the same arguments of Proposition~\ref{prop-ctl-flat}, we clearly have $\Phi \equiv \widetilde{\Psi}$, and $\widetilde{\Psi} \impl \Psi$. It remains to prove the opposite direction. To prove $\Psi \impl \widetilde{\Psi}$, it is sufficient to show that this is true for the empty $\calQ$ (as equivalence is substitutive). Assume $\calK, x \sat_\varepsilon \Psi$. Then there exists an environment $\varepsilon'$ from $\{\kappa_1,\ldots,\kappa_m\}$ to $2^V$ such that $\calK, x \sat_{\varepsilon\compo\varepsilon'} \Phi_0 \et \ET_i \AG (\kappa_i \impl \theta_i)$. Now we have~: \[ \forall i,\quad \calK, x \sat_{\varepsilon \compo\varepsilon'} \theta_i \quad\impl\quad \calK, x \sat_{\varepsilon'} \vfi_i \quad \mbox{and} \quad \calK, x \sat_{\varepsilon \compo\varepsilon'} \Phi_0 \quad\impl\quad \calK, x \sat_{\varepsilon'} \widetilde{\Phi_0} \] Indeed, assume that it is not true and $\calK, x \sat_{\varepsilon \compo\varepsilon'} \theta_i$ and $\calK, x \not\sat_{\varepsilon'} \vfi_i$. Consider such a formula $\vfi_i$ with the smallest temporal height. The only atomic propositions $\kappa_j$ occurring in $\theta_i$ are then associated with some $\theta_j$ and $\vfi_j$ which verify the property and thus any state satisfying such a $\theta_j$, also satisfies $\vfi_j$. Therefore any state labeled by such a $\kappa_j$ is correctly labeled (and satisfies $\vfi_j$). And the states that are not labeled by $\kappa_j$ cannot make $\theta_i$ to be wrongly evaluated to true (because $\kappa_j$ is not in the scope of a negation). Therefore $\vfi_i$ holds true at $x$. The same holds for $\Phi_0$ and $\widetilde{\Phi_0}$. As a direct consequence, we have $\Psi \impl \widetilde{\Psi}$. \end{proof} From the previous proposition, we derive a new reduction to \QBF\ (called~\MetX). For modalities $\EW$ and $\AW$, we use the same encoding as for method \MetFP, except that we use the corresponding Boolean proposition $\kappa_i$ directly for the greatest fixed point. And for Until-based modalities, corresponding to least fixed points, we will use bit vectors instead of atomic propositions to encode the truth value of $\EU$ or $\AU$~: for a formula $\theta_i=\Ex \vfi \Until \psi$, we will consider a bit vector $\bar{\kappa_i}$ of length $\lceil\log(|V|+1)\rceil$ for every state instead of a single Boolean value $\kappa_i$. The idea is that in a state $x$, the value $\bar{\kappa_i}$ encodes in binary the distance (in terms of number of transitions) from $x$ to a state satisfying $\psi$ along a path satisfying $\vfi$. And for $\theta_i=\All \vfi \Until \psi$, the value $\bar{\kappa_i}$ encodes the maximal distance before a state satisfying $\psi$ (along a path where $\vfi$ is true). In the following, such a $\kappa_i$ associated to a $\theta_i$ based on an Until is called an Until-$\kappa$. Note that given a bit vector $\bar{\kappa_i}$ and an integer value $d$ encoded in binary, we will use $[\bar{\kappa_i}^y=d]$ and $[\bar{\kappa_i}^y<d]$ to denote the corresponding propositional formulas over $\bar{\kappa_i}^y$. \begin{table} \begin{align*} \widehat{\vfi \et \psi}^{x,P} &\eqdef \widehat{\vfi}^{x,P} \et \widehat{\psi}^{x,P} \quad \quad \widehat{\vfi \ou \psi}^{x,P} \eqdef \widehat{\vfi}^{x,P} \ou \widehat{\psi}^{x,P} \quad \quad \widehat{\non p}^{x,P} \eqdef \non \widehat{p}^{x,P} \\ \widehat{\EX \vfi}^{x,P} & \eqdef \OU_{(x,y) \in E} \widehat{\vfi}^{y,P} \quad \quad \widehat{\AX \vfi}^{x,P} \eqdef \ET_{(x,y) \in E} \widehat{\vfi}^{y,P} \quad \quad \widehat{\AG \vfi}^{x,P} \eqdef \ET_{(x,y) \in E^*} \widehat{\vfi}^{y,P} \\ \text{For}\ Q\in\{\exists,\forall\} & \quad \widehat{Q p. \vfi}^{x,P} \eqdef Q p^{v_1} \ldots p^{v_n} \widehat{\vfi}^{x,P\cup\{p\}} \\ \text{For}\ Q\in\{\exists,\forall\} & \quad \widehat{Q \dot{\kappa}_i. \vfi}^{x,P} \eqdef \begin{cases} Q \bar{\kappa_i}^{v_1} \ldots \bar{\kappa_i}^{v_n}. \widehat{\vfi}^{x,P\cup\{\bar{\kappa_i\}}} & \text{if} \ \dot{\kappa}_i \:\text{encodes a least fixed point.} \\ Q \kappa_i^{v_1} \ldots \kappa_i^{v_n}. \widehat{\vfi}^{x,P\cup\{\kappa_i\}} & \text{otherwise} \end{cases} \\ \widehat{p}^{x,P} \eqdef & \begin{cases} p^x & \text{if}\: p \in P\ \text{and}\ p\ \text{is a Boolean var.}\\ [p^x<|V|] & \text{if}\: p \in P\ \text{and}\ p\ \text{is a Bit vect.}\\ \top & \text{if}\: p \not\in P \et p \in \ell(x) \\ \bot & \text{otherwise} \\ \end{cases} \\ \end{align*} \caption{Transformation rules for method~\MetX} \label{meth5} \end{table} The new reduction is based on the rewriting rules of Table~\ref{meth5} for several operators, and we define the reduction for $\AG(\kappa_i \impl \theta_i)$ for $\theta_i=\Ex \vfi \WUntil \psi$ or $\theta_i=\All \vfi \WUntil \psi$ as follows~: \begin{align} \stackon[-8pt]{$\AG (\kappa_i \impl \Ex \vfi \WUntil \psi)$}{\vstretch{1.5}{\hstretch{15}{\widehat{\phantom{\;}}}}}^{\;\;x,P} \eqdef & \ET_{(x,y) \in E^*} \Big( \kappa_i^y \impl \big( \widehat{\psi}^{y,P} \ou (\widehat{\vfi}^{y,P} \et \OU_{(y,y')\in E} \kappa_i^{y'})\big)\Big) \label{eq5EW} \\ \stackon[-8pt]{$\AG (\kappa_i \impl \All \vfi \WUntil \psi)$}{\vstretch{1.5}{\hstretch{15}{\widehat{\phantom{\;}}}}}^{\;\;x,P} \eqdef & \ET_{(x,y) \in E^*} \Big( \kappa_i^y \impl \big( \widehat{\psi}^{y,P} \ou (\widehat{\vfi}^{y,P} \et \ET_{(y,y')\in E} \kappa_i^{y'})\big)\Big) \label{eq5AW} \end{align} And for $\AG(\kappa_i \impl \theta_i)$ with $\theta_i=\Ex \vfi \Until \psi$ or $\theta_i=\All \vfi \Until \psi$, we have~: \begin{align} \stackon[-8pt]{$\AG (\bar{\kappa_i} \impl \Ex \vfi \Until \psi)$}{\vstretch{1.5}{\hstretch{15}{\widehat{\phantom{\;}}}}}^{\;\;x,P} \eqdef & \ET_{(x,y) \in E^*} \Big[ \Big( [\bar{\kappa_i}^y=0] \impl \widehat{\psi}^{y,P} \Big) \nonumber \\ & \et \ET_{1\leq d <|V|} \Big( [\bar{\kappa_i}^y=d] \impl \big( \widehat{\vfi}^{y,P} \et \OU_{(y,y')\in E} [\bar{\kappa_i}^{y'}=d-1]\big)\Big) \Big] \label{eq5EU} \end{align} where $[\bar{\kappa_i}^y=d]$ and $[\bar{\kappa_i}^y<d]$ with a given value $d$ correspond to propositional formulas over $\bar{\kappa_i}^y$. And for $\AG(\kappa_i \impl \theta_i)$ with $\theta_i=\All \vfi \Until \psi$, we have~: \begin{align} \stackon[-8pt]{$\AG (\bar{\kappa_i}\impl \All \vfi \Until \psi)$}{\vstretch{1.5}{\hstretch{15}{\widehat{\phantom{\;}}}}}^{\;\;x,P} \eqdef & \ET_{(x,y) \in E^*} \Big[ \Big( [\bar{\kappa_i}^y=0] \impl \widehat{\psi}^{y,P} \Big) \nonumber \\ & \et \ET_{1\leq d <|V|} \Big( [\bar{\kappa_i}^y=d] \impl \big( \widehat{\vfi}^{y,P} \et \ET_{(y,y')\in E} [\bar{\kappa_i}^{y'}<d]\big)\Big) \Big] \label{eq5AU} \end{align} Note that in the equivalences \ref{eq5EU} and \ref{eq5AU}, we cannot replace the implication by an equivalence~: for a state $y$ s.t.\ $\widehat{\vfi}^{y,P}$, the existence of some successor $y'$ s.t.\ $[\bar{\kappa_i}^{y'}<d]$ is not sufficient to imply $[\bar{\kappa_i}^{y}=d]$. This is why we consider only implications here. Method~\MetX\ is defined from previous rules and we get a Prenex \QBF\ formula~: \begin{corollary} Given a \QCTL\ formula $\Phi$, a Kripke structure $\calK=\tuple{V,E,\ell}$, and a state $x$, the Prenex \QBF\ formula $\widehat{\Flat(\Phi)}^{x}$ obtained by applying the rules of Tables~\ref{meth5} and rules~\ref{eq5EW}, \ref{eq5AW}, \ref{eq5EU}, and \ref{eq5AU} above, is valid iff $\calK, x \sat \Phi$, and $|\widehat{\Flat(\Phi)}^{x}|$ is in $O(|V|\cdot(|V|+|E|)\cdot |\Phi|)$. \end{corollary} This approach allows us to easily adapt the algorithm to bounded model-checking~: instead of considering values from $1$ to $|V|$ for $d$ in the definition of Until modalities, one can restrict the range to a smaller interval, to get a smaller \QBF\ formula to check. Note also that obtaining a Prenex \QBF\ formula is interesting in practice, because many \QBF-solvers require Prenex formulas as inputs. We can also observe that this reduction proceeds a bit like the classical model-checking algorithm for \CTL\ where for deciding $x \sat \Phi$, the truth value of every $\Phi$-subformula is computed in every state of the model. In some case, this may induce additional work compared to methods like \MetFP\ or \MetUU\ (for example to decide whether the initial state satisfies a $\EU$ formula). \subsubsection{Using BitVectors for $\exists^1$ and $\forall^1$.} The quantifiers $\exists^1$ and $\forall^1$ are very useful in many specifications. It can be interesting to develop ad-hoc algorithms in order to improve the generated \QBF\ formulas. For the first methods we described, they are translated into propositional formulas (instead of introducing extra quantified atomic propositions as they are formally defined). Another method consists in using bit vectors as in the treatment of Until modalities described above~: in this case, these quantifiers introduce a unique bit vector of size $\lceil\log(|V|+1)\rceil$ to store the number of the state selected by the quantifier (that is the state which will be labeled by the proposition). This method is interesting, since it reduces the number of quantified propositions, it is integrated in the method~\MetX.
\section{INTRODUCTION} \begin{figure} \centering \includegraphics[width=5cm]{SF_tunneling_3g.png} \caption{Schematic of a spin-filter device. The SFM is sandwiched between two nonmagnetic metallic contacts. As the barrier height for the electrons with different spin directions is different, the spin with the smaller band gap (barrier height) dominates the tunneling current.} \label{fig:SFM} \end{figure} In order to fully utilize the electron spin in spintronic devices, it is necessary to produce highly spin-polarized currents at room temperature.\cite{Wolf2001,Zutic2004} Spin-filter materials (SFMs) are semiconductors with exchange splitting $2\Delta E_{ex}$ between the two spin-channels. When employed as a tunneling barrier as shown in Fig. \ref{fig:SFM}, electrons with one spin direction can tunnel more easily through an SFM barrier to produce a spin-polarized current. Since the tunneling probability depends exponentially on the band gap, even a small exchange splitting can yield a large spin-polarization.\cite{Moodera1988} In addition, because the barrier material itself is spin-polarized, the metallic contacts need not be magnetic. Therefore, when using an antiferromagnetic or compensated ferrimagnetic SFM, the entire device can be free of fringing fields and effectively nonmagnetic. The europium chalcogenides have been shown to produce nearly 100~\% spin-polarized currents when used as tunneling barriers.\cite{Moodera2010,Santos2004} However, their magnetic transition temperatures are below T~=~70~K, making them ineffective for room temperature applications. Thus, it is necessary to find SFMs with high magnetic transition temperatures. Heusler compounds have gained increasing interest as spin-polarized materials, as they span the gauntlet of spin-dependent band structures.\cite{Felser2015,Graf2011,Bainsla2016} However, while a plethora of half-metals and spin-gapless semiconductors have been found both theoretically and experimentally among the Heusler compounds, only a handful of SFMs have been predicted (CrVXAl and CoVXAl, where X = Ti, Zr, Hf) by Galanakis et al.\cite{Galanakis2013,Galanakis2014} and Ti\textsubscript{2}CrSn by Jia. et al.\cite{Jia2014a}.) Among these Heusler SFMs, CrVTiAl is a promising candidate material that could be utilized at room temperature, as it is a fully-compensated ferrimagnet with a predicted $T_C~>~2000$ K.\cite{Galanakis2014, Ozdogan2015} Previous experiments on bulk CrVTiAl have established that $T_C$ is in excess of 400 K and that partially disordered samples show semiconducting behavior with a magnetic moment that is small and nearly temperature independent.\cite{Stephen2016, Venkateswara2017,Stephen2019a} Density functional theory (DFT) studies have revealed that the semiconducting phase of CrVTiAl is stable under Cr-V swapping, but the material becomes metallic under Ti-Al mixing. \cite{Stephen2019a} An outline of this paper is as follows. The introductory section is followed by a discussion of the experimental results in Section II and the computational results in Section III. Section II contains three sub-sections: (A) The measured zero-field conductivity, illustrating two-channel semiconducting behavior in the films; (B) Magnetoresistance up to fields of B~=~35 T, along with fits to a two-channel conduction model and extraction of the mobilities of the two channels; and (C) Hall resistivity and its relationship to a small magnetic moment saturating by B~=~15 T. Section III contains two sub-sections: (A) Densities of states (DOSs) of the three ordered structures generated by permuting the atoms along the (111) body diagonal; and (B) effects of substitutional disorder among the sublattices. Section IV, gives a short summary of our findings \section{EXPERIMENTAL PROCEDURES AND RESULTS} Films of CrVTiAl were grown on Si/SiO\textsubscript{2} substrates using magnetron sputtering and capped with 1 nm of Al. Growth temperatures were in the range 300 to 600~\degree C and films were post-growth annealed in the range 500 to 700~\degree C. Films were typically 30 to 40~nm thick. This paper focuses on measurements of a film grown at 400~\degree C and subsequently annealed to 600~\degree C and 700~\degree C. The three films will be simply denoted as F400, F600 and F700, respectively. Stoichiometry was confirmed to be within 3~\% of the ideal using energy dispersive X-ray spectroscopy. Magnetization measurements were performed in a Quantum Design MPMS-XL magnetometer at temperatures T~=~2 to 400~K and magnetic fields up to B =~5~T. Zero-field resistivity measurements were performed in the magnetometer using a modified transport probe.\cite{Assaf2012} High-field resistivity measurements up to B =~35~T were performed at the National High Magnetic Field Laboratory DC Field Facility. \subsection{Electrical Conductivity} \begin{figure} \includegraphics[width=8cm]{S072117_RT_040119.png} \caption{Zero-field conductivity versus temperature for three different films of CrVTiAl (F400, F600, and F700). The increasing conductivity indicates semiconducting behavior. The points are experimental data and the solid curves are fits to Eq. (2).} \label{fig:RT} \end{figure} Figure \ref{fig:RT} shows the temperature-dependent conductivity $\sigma$(T) for the CrVTiAl thin films (points). $\sigma$(T) is observed to increase linearly for moderate temperatures characteristic of spin-gapless (SGS) behavior, while at higher temperatures it follows an exponential dependence indicative of the presence of a semiconducting gap. Modeling this temperature-dependent $\sigma$(T) provides information about carrier activation energies, which are related to semiconducting band gaps. This, in turn, allows one to infer the nature of the band structure near the Fermi energy, whether it is gapped, gapless or metallic. The measured $\sigma$(T) dependence can be described here by a two-carrier conduction model along the lines of previous studies\cite{Wang2008,Jamer2013,Kharel2015}. The model assumes two parallel conducting channels: one gapped and one gapless. The conductivity in the gapless channel is given by \begin{equation} \sigma_{SGS} = \sigma_0 (1+ 2ln(2)\frac{k_BT}{g} ), \label{eq:SGS_Ch} \end{equation} where $\sigma_{0}$ is the zero-temperature conductivity, $g$ denotes the overlap between the bands in the gapless channel and k$_{B}$ is the Boltzmann constant.\cite{Kharel2015} Combining this in parallel with a conventional semiconducting conduction channel with a thermal activation energy $\Delta E$ gives the temperature-dependent resistivity $\rho$(T) \begin{equation} 1/\rho(T) = \sigma(T) = \sigma_{SGS} + \sigma_{SC} e^{-\Delta E/k_BT}, \end{equation} where $\sigma_{SC}$ is the zero-temperature contribution to the semiconducting component. The solid curves in Fig. \ref{fig:RT} show fits to the model in Eq. (2), giving the following activation energies ($\Delta E$) and band overlaps ($g)$ for the three films. Activation energies are: $\Delta E$~=~104 meV for F400, 114 meV for F600, and 170 meV for F700. Band overlaps are: $g$~=~60 meV for both F400 and F700, and $g$~=~46 meV for F600. The activation energy increases with increased annealing temperature, while $g$ is at a minimum for the F600 film. \subsection{Magnetoresistance} The magnetoresistance (MR) shows four distinct characteristics: (1) two-channel positive MR; (2) a positive weak localization cusp; (3) suppressed MR at low fields and higher temperatures; and (4) the onset of Shubnikov-de Haas quantum oscillations at higher fields. These features are discussed in the following subsections. \begin{figure*}[t] \includegraphics[width=2\columnwidth]{CVTA_MR_040319.png} \caption{Magnetoresistance as a function of applied field for CrVTiAl films (labeled F400, F600, and F700; as described in the text), measured up to $B~=~35$~T at temperatures from T~=~1.5 to 50~K. The solid curves for the as-grown 400~\degree C sample (F400) for T~$\leq$~20~K are fits to Eq. (5). All three samples generally show quadratic-in-B behavior at high temperatures and linear-in-B behavior at low temperatures} \label{fig:MR} \end{figure*} \subsubsection{Two-channel positive MR} Figure \ref{fig:MR} shows the magnetoresistance as a function of magnetic field and temperature. The field dependence has an overall positive MR for different annealing conditions. The MR(B) behavior is illustrated best in the as-grown sample, Fig. \ref{fig:MR}(F400). Here, at higher temperatures the MR is predominantly quadratic-in-B, but as the temperature decreases the MR at high fields becomes linear-in-B. Then at the lowest temperatures, T~<~5~K, there is an inflection point near B~=~10~T. The MR(B) dependence over the entire field range can be modeled as two parallel and independent conduction channels. The field-dependent conductivity associated with the $i$-th channel is given by \begin{equation} \frac{1}{\rho_i(B)} = \sigma_i(B) = \frac{\sigma_{i,0}}{1+\mu_i^2 B^2}, \end{equation} where $\sigma_{i,0}$ is the zero-field conductivity and $\mu_i$ is the carrier mobility for the $i$-th channel. By combining $\rho$(B) for the two channels in parallel, and labeling light and heavy mass channels, denoted as \textit{l} and \textit{h}, respectively, the total $\rho$(B) can be expressed as: \begin{equation} \rho(B) = \frac{(1+ \mu_l^2 B^2)(1+ \mu_h^2 B^2)}{\sigma_{l,0} (1+ \mu_h^2 B^2) + \sigma_{h,0} (1+ \mu_l^2 B^2)}. \end{equation} The magnetoresistance is then given by \begin{equation} MR(B) = \frac{\rho(B)-\rho(0)}{\rho(0)}. \label{eq:mr} \end{equation} The field-dependent magnetoresistance in Fig. \ref{fig:MR}(F400) was fit to Eq. \ref{eq:mr} for the as-grown sample. The solid curves show fits for all of the T~$\leq$~20~K data, which are in good accord with both the low-field and high-field regions. Interestingly, the two-channel model produces a linear-in-B MR at high fields, a feature observed in many other materials. \begin{figure} \includegraphics[width=0.95\columnwidth]{ag400_mu_SdH1p5K_fixed2.png} \caption{(left) Electron mobilities for the light (blue) and heavy (red) carriers derived from the two-carrier magnetoresistance of the as-grown CrVTiAl film. Above T~=~13~K, $\mu_l$ does not contribute significantly to the MR in the measured field region. (right) MR(B) with the high-field linear background removed, showing the onset of Shubnikov de-Haas oscillations.} \label{fig:mu400} \end{figure} Figure \ref{fig:mu400} (left panel) shows the mobilities obtained from the MR curve-fits as a function of temperature for the F400 film. The mobility in both channels decreases with increasing temperature due to increased carrier scattering. At low temperatures the mobilities for the two channels differ by an order of magnitude, where the high-mobility channel has $\mu_h=920$~cm\textsuperscript{2}/Vs and the low-mobility channel has $\mu_l=48$~cm\textsuperscript{2}/Vs at T~=~1.5~K. The ratio of these mobilities is plotted as a function of temperature in the inset of Fig. \ref{fig:mu400}. These mobilities can be related to carrier effective masses within the Drude model by $\mu = e \tau / m^*$, where $\tau$ is the scattering time and $m^*$ is the effective mass.\cite{AshcroftMermin} If $\tau$ is the same for both carriers, the ratio of mobilities will be inversely equal to the ratio of effective masses. This ratio decreases from $\mu_h/\mu_l=19$ at 1.5~K to $\mu_h/\mu_l=7$ at 20~K. \subsubsection{Additional MR features} There are several other interesting features in the MR in addition to the two-carrier resistivity behavior, including a weak localization cusp, suppression of the quadratic MR at high temperatures, and the onset of Shubnikov–de Haas oscillations. These smaller features show both negative as well as positive MR, and occur at various temperature and field ranges. \textit{Weak Localization Cusp} - In the F600 film a sharp MR cusp is observed for B~<~1.5~T and temperatures less than 5~K. This negative MR cusp is characteristic of weak localization (WL) arising from quantum interference of the wave-like nature of the scattering carriers. WL is well-described by the Hikami-Larkin-Nagaoka (HLN) model of quantum coherence and was used to fit the experimental cusp. The inelastic electron-electron and magnetic scattering terms are found to dominate, giving characteristic fields $B_i = 0.26$~T and $B_s = 0.39$~T. These correspond to quantum coherence lengths of $l_i = 44$~nm and $l_s = 35$~nm, respectively. \cite{Hikami1980} This strong electron-electron and magnetic scattering arises from the compensated ferrimagnetism. \textit{Suppression of MR} - At higher temperatures, the dominant positive MR found in all of the films is slightly suppressed by an additional small {\it negative} MR. This suppression is present in all samples above T~=~20~K, and is strongest in the F700 sample, where the suppression begins to appear at T~=~9~K, and extends out to B~=~15~T by T~=~50~K. The suppression by the negative MR at relatively low fields is unusual in that it appears only for \textit{higher} temperatures, rather than at lower temperatures. This suppression is related to the saturating magnetization that is observed in the anomalous Hall effect (AHE). The Hall results shown later in Fig. \ref{fig:hall}(b) exhibit a small change in the Hall conductivity that saturates by B~=~15~T, a field that coincides with the disappearance of the suppression in the MR. This ferrimagnetic component in the magnetic moment would give rise to a negative MR that saturates at higher fields, which is expected and usually observed when carrier scattering decreases as the moments become aligned at high fields. \textit{High-field Oscillations} - All three films in Fig. \ref{fig:MR} show small ripples in the MR at the highest fields and lowest temperatures. This appears to be related to the onset of Shubnikov-de Haas quantum oscillations (right panel, Fig. \ref{fig:mu400}), which are likely to be observed for the relatively high-mobility carriers with $\mu_h=920$~cm\textsuperscript{2}/Vs. The oscillations give a period of $\Delta (1/B) = 0.008~~T^{-1}$ corresponding to a Fermi surface area of $A = 1.3 \times 10^{14} cm^{-2}$. Higher fields will be required to elucidate this further. \begin{figure} \includegraphics[width=0.95\columnwidth]{CrVTA_S072117_AHE_horiz_fixed2.png} \caption{Hall resistivity of CrVTiAl films as a function of field measured at T~=~20~K for F400, F600, and F700. The Hall resistivity consists of (a) a linear-in-B component due to the ordinary Hall effect, plus (b) a small saturating component from the anomalous Hall effect that saturates by B~=~15~T.} \label{fig:hall} \end{figure} \subsection{Hall Effect and Magnetization} Figure \ref{fig:hall} shows the Hall resistivity $\rho_{xy}$(B). We find a linear field dependence that is associated with the ordinary Hall effect (OHE). The slope gives an effective carrier density of $n\sim10^{22}$~cm\textsuperscript{-3}, which, although high for a semiconductor, is comparable to other Heusler compounds. The effective carrier density is seen to vary with annealing by up to a factor of two. In addition to the major linear-in-B OHE, a small saturating component is present. After subtracting a linear component, Fig. \ref{fig:hall}(b) shows a clear saturating anomalous Hall effect (AHE), which is about 10~\% of the overall Hall voltage. This AHE saturation near B~=~15~T is associated with a saturating magnetic moment, consistent with observations from other compensated ferrimagnets.\cite{Nayak2015} However, the high saturation field observed in CrVTiAl is indicative of the presence of exceptionally large magnetic exchange within the material. This saturation field corresponds to the field range of the MR suppression, as noted previously. \begin{figure} \centering \includegraphics[width=8cm]{S072117_MT_all_fixed.png} \caption{Relative change in magnetization of CrVTiAl as a function of temperature for the F400, F600 and F700 films, measured at a field of B~=~0.10~T. A paramagnetic component appears below T~=~50~K, but M(T) increases monotonically up to T~=~400~K. The increasing moment is indicative of a compensated ferrimagnet with T\textsubscript{C}~>~400~K. Note that the Si substrate contributes a negative temperature-independent diamagnetic offset.} \label{fig:mag} \end{figure} Figure \ref{fig:mag} shows how the magnetization M(T) changes as a function of temperature. The values are negative because of the large linear-in-B diamagnetism of the Si substrates. As diamagnetism is temperature-independent, any changes in the magnetization with temperature can be attributed to the films. M(T) is seen to increase monotonically from T~=~50 to 400~K for all three annealing conditions. There are two temperature regions, below and above T~=~50~K. At low temperatures the magnetization decreases as 1/T for increasing temperature until reaching a minimum near T~=~50~K, after which the moment increases monotonically. In compensated ferrimagnets the moment is at a minimum at the compensation point, after which it increases to a maximum before going to zero again at the Curie temperature.\cite{Stinshoff2017} This behavior stems from increased thermal fluctuations with increasing temperature. \section{THEORETICAL MODELING OF ELECTRONIC AND MAGNETIC STRUCTURE} \subsection{Ordered Atomic Arrangements} In order to understand our experimental results, we computed the groundstate electronic and magnetic properties of CrVTiAl alloys. In particular, we performed first-principles calculations on all the unique atomic arrangements of the quaternary Heusler structure as follows. The spacegroup of the quaternary Heusler compounds is F-43m (No. $216$), occupying Wyckoff positions $a$, $b$, $c$, and $d$. For four distinct atomic species X, X$^{\prime}$, Y, and Z arranged on the four Wyckoff sites, 4! permutations can be made. However, this number can be reduced by two constraints. Since the Wyckoff positions lie along the body diagonal of the conventional cubic cell, cyclic permutations must form an equivalence relation between permutations, resulting in six equivalence classes. Furthermore, since spacegroup $216$ belongs to cubic Bravais lattices there is no preferred cardinal direction, forcing XX$^{\prime}$YZ to be equivalent to ZYX$^{\prime}$X. We thus adduce that only three unique arrangements of atoms are possible: XX$^{\prime}$YZ, YXX$^{\prime}$Z, and X$^{\prime}$YXZ. Mapping the atomic species Cr, V, Ti and Al, to X,X$^{\prime}$,Y and Z, we obtained the groundstate electronic and magnetic structures for each of these unique atomic arrangements. We label these arrangements by their electronic phases: SFM, SGS, and metallic, which correspond to the atomic ordering along the (111) body diagonal as Cr-Ti-V-Al, Cr-V-Ti-Al, and Cr-V-Al-Ti, respectively. Electronic structure calculations were performed using the pseudopotential projector augmented-wave (PAW) method implemented in the Vienna {\it ab initio} simulation package (VASP) \cite{Kresse1996,Kresse1993, Kresse1999} with an energy cutoff of 400 eV for the plane-wave basis set. Exchange-correlation effects were treated using the SCAN meta-GGA scheme \cite{JSun2015}, where a 18$\times$18$\times$18 $\Gamma$-centered k-point mesh was used to sample the Brillouin zone. All sites in the unit cell along with its dimensions were relaxed using a conjugate gradient algorithm to minimize energy with an atomic force tolerance of 0.05 eV/ \AA~ and a total energy tolerance of 10$^{-4}$ eV. The computed structural parameters agree with the corresponding experimental values. \cite{Medeiros2014,Medeiros2015} \begin{figure*} \centering \includegraphics[width=2\columnwidth]{DOS.png} \caption{(a)-(c) Site-projected densities of states, and (d)-(f) crystal structures for various arrangements of Cr, V, Ti, and Al. A zoomed-in view of the region around the Fermi level is shown in the center column. Schematic representation of the cubic quasi-antiferromagnetic lattice with a compensating body-center site is shown on the far right.} \label{fig:dos_struct} \end{figure*} Figure \ref{fig:dos_struct} shows the CrVTiAl crystal and its magnetic structure along the corresponding site-projected densities-of-states (DOSs) for the three arrangements considered. Panel (a) shows the DOS for the SFM phase, exhibiting a large 0.551 eV band gap formed in the transition metal bands. Here, the valence band is dominated by V and Ti atomic character and the conduction band by Cr and Ti character. The semiconducting behavior is consistent with previous first-principles studies. The formation of the band gap in the Cr, V, and Ti hybridized band exhibits characteristics of covalent magnetism as explained by Williams {\it et al}.\cite{Williams1981} In the SFM phase (Cr-Ti-V-Al), the opening of the band gap is facilitated by the stabilization of a fully compensated ferrimagnetic order on a tripartite lattice formed by the Cr, V, and Ti sites. \cite{Galanakis2014} The Cr and V atoms form a simple cubic cell in the quaternary Heusler structure, shown in Fig. \ref{fig:dos_struct}(d), with Ti or Al occupying the body-center position. The predicted values of the Cr, V, Ti and Al moments are -3.319, 2.665, 0.669, and 0.004 $\mu_{B}$, respectively. These values agree with previous studies. \cite{Galanakis2014, Stephen2019a} The sum of the V and Ti magnetic moments cancel the Cr spin moment, since the Al atom carries only a negligible moment. References \onlinecite{Ozdogan2013a} and \onlinecite{Skaftouros2013} discuss the zero total spin magnetic moment in the unit cell in terms of the Slater–Pauling rule. In the phase with the arrangement Cr-V-Ti-Al along the body diagonal (Fig. \ref{fig:dos_struct}(e)), the position of Ti and V are swapped with respect to the preceding SFM case, resulting in weaker AFM exchange couplings between the neighboring Cr and Ti atoms. This arrangement yields magnetic moments on Cr, V, Ti and Al of -3.063, 1.905, 1.231, and -0.005 $\mu_{B}$, respectively. The sum of the V and Ti moments still cancels the substantial Cr spin moment, leaving a zero total spin magnetic moment in the unit cell. Due to the weakening of exchange couplings, the majority-spin channel in the DOS is metallic (Fig. \ref{fig:dos_struct}(b)). The minority-spin channel maintains a 0.584 eV band gap, yielding a fully compensated ferrimagnetic spin-gapless semiconductor. In the metallic phase with the atomic arrangement Cr-V-Al-Ti along the body diagonal, antiferromagnetic correlations are further weakened by swapping Cr and Ti, see Fig. \ref{fig:dos_struct}(f). We now find a distinct change in the magnetic moments on Cr, V, Ti and Al with -1.319, 1.800, -0.435, and 0.009 $\mu_{B}$, respectively, leading to a marginal total magnetic moment of 0.3148 $\mu_{B}$ in the unit cell. The corresponding DOS in Fig. \ref{fig:dos_struct}(c) shows the disappearance of the band gap. However, a slight perturbation in the magnetic exchange splittings or atomic hybridizations could open a gap given the minimal DOS weight at the Fermi level in the minority channel. There is a delicate balance between the AFM and FM correlations, which drives the characteristic differences between the SFM, SGS, and metallic phases. In the SFM phase, the two strongest magnetic elements (Cr and V) are placed on the simple cubic lattice, enabling strong AFM coupling. In the SGS and metallic phases, the magnetic atoms are substituted away to the body-center position, weakening the AFM correlations. Moreover, as the stronger magnetic atoms are placed in line with Al, FM double-exchange interactions are enhanced. The interplay of these two opposing interactions is reflected in the electronic structure through the gradual closing of the gap. These theoretical observations, along with the experimental results, show that CrVTiAl forms in the SGS phase, with Cr-V-Ti-Al arranged consecutively along the (111) direction. This structure is the quaternary equivalent of the inverse Heusler XA structure, where the chemical formula X\textsubscript{2}YZ corresponds to X-X-Y-Z along the diagonal. A summary of the lattice, electronic, and magnetic structure along with total energies for each atomic arrangement is given in Table I. \begin{table*}[ht!] \caption{\label{table:ordered_summary}Comparison of various theoretically predicted properties for the three unique atomic arrangements in pristine CrVTiAl. The three structures involve different permutations of the four sublattices along the (111) body-diagonal as discussed in the text.} \begin{ruledtabular} \begin{tabular}{lccc} &Cr-Ti-V-Al & Cr-V-Ti-Al & Cr-V-Al-Ti \\ \hline Electronic Phase & SFM & SGS & Metallic \\ Lattice Parameter (\AA) & 6.185 & 6.163 & 6.083 \\ Relative Energy (eV) & 0.000 & 0.731 & 2.471 \\ Majority Gap (eV) & 0.750 & - & - \\ Minority Gap (eV) & 0.967 & 0.571 & - \\ Valence Band Exchange Splitting (eV) & 0.1986 & 0.2077 & - \\ Electronic Gap (eV) & 0.551 & - & - \\ Cr Moment ($\mu_{B}$) & -3.319 & -3.063 & -1.319 \\ V Moment ($\mu_{B}$) & 2.665 & 1.905 & 1.800 \\ Ti Moment ($\mu_{B}$) & 0.669 & 1.231 & -0.435 \\ Al Moment ($\mu_{B}$) & 0.004 & -0.005 & 0.009 \\ Wigner-Seitz Magnetic Moment ($\mu_{B}$)& 0.0 & 0.0 & 0.3148\\ \end{tabular} \end{ruledtabular} \end{table*} \subsection{Substitutional Disorder} Our theoretical modeling predicts that the SFM phase is energetically more favorable. However, the experimental results indicate the presences of a majority SGS phase in our thin films. To further delineate the stability of the SGS (Cr-V-Ti-Al) electronic and magnetic structure against substitutional disorder, we considered all pairwise mixings and important simultaneous substitutional disorders, see Table \ref{table:disorder} for details. The effects of substitutional disorder were investigated via {\it ab initio} calculations carried out using the all electron, fully charge- and spin-self-consistent Korringa-Kohn-Rostocker coherent-potential-approximation (KKR-CPA) scheme.\cite{Bansil1979a,Bansil1979b,Bansil1981,Bansil1999,Bansil1993} The KKR-CPA approximates the average properties of the disordered system by averaging these properties over a site embedded in a self-consistently determined effective medium. The KKR-CPA goes beyond the simpler virtual crystal approximation (VCA) and average t-matrix approximation (ATA)\cite{Gonis1992}. Moreover, KKR-CPA does not rely on {\it ad hoc} free parameters, and thus provides a more satisfactory treatment of disorder effects. Exchange-correlation effects were treated using the local spin-density approximation, (LSDA)\cite{Perdew1981} where the charge- and spin-densities were converged to $10^{-4}$ Ry. A muffin-tin radius of 2.51 a.u. was used for all 4 atomic species. The experimental value of the lattice constant of 6.136 \AA~was used.\cite{Stephen2016} \begin{figure} \centering \includegraphics[scale=0.23]{DOSkkr.png} \caption{Total densities of states for various structures of CrVTiAl. (a) Fully-ordered structure. SGS behavior of the fully-ordered phase is preserved for the two lowest energy disordered states. (b) Cr-V mixed and (c) V-Ti mixed disordered phases. } \label{fig:doskkr} \end{figure} Table \ref{table:disorder} compares the total energies relative to the SGS groundstate, where the magnetic moments and electronic phases (SGS, semiconducting, or metallic) of the various disordered structures are considered. Overall, most disordered states lie at energies greater than 200 meV and are predicted to be metallic, with the states above 300 meV producing a net total Wigner-Seitz magnetic moment of $0.25-0.50 ~\mu_{B}$. Figure \ref{fig:doskkr} compares the total DOS of the pristine SGS phase (Panel (a))\cite{footnote} to the energetically favorable Cr-V and V-Ti disordered states. Panel (b) shows the persistence of the SGS state, albeit with a reduction in the band gap. The reduction in band gap is a direct result of transforming the SFM phase to the SGS phase under Cr-V swapping, driving the system towards metallicity. Panel (c) shows a similar persistence of the SGS state but with an increased band gap. Swapping V and Ti atoms transforms the SFM phase to the metallic phase, enhancing AFM correlations. Overall, we find the SGS state to be quite robust under substitutional disorder perturbations. In order to connect our result on the SGS phase to the MR(B) measurements in Section II.B, we estimate the relevant effective-mass ratios to provide a baseline. The effective-mass ratio in the SGS phase is calculated using $\left(m^*\right)^{-1}=\frac{1}{\hbar^2}\frac{\partial^2 E(k)}{\partial k^2}$ for k along the high-symmetry directions. We obtain a ratio of 6 - 20, within an energy window of $\pm$ 30 meV about the Fermi level to account for any intrinsic doping of the experimental sample.\cite{AshcroftMermin} The calculated mass ratios fall within the range of measured mobility ratios. A more rigorous modeling of the transport process is, however, required to give obtain deeper insight into the origin of the large observed ratio of carrier mobilities. \begin{table*}[ht!] \caption{\label{table:disorder}Comparison of the theoretically predicted total energies (relative to the SGS ground state), net Wigner-Seitz magnetic moments, and the electronic phases of the various disordered structures of CrVTiAl in the SGS phase. The disordered phases were obtained by exchanging 50~\% of the atoms.} \begin{ruledtabular} \begin{tabular}{cccc} Atomic & Relative & Net Wigner-Seitz & Electronic \\ Substitutions & Energy (meV) & Magnetic Moment ($\mu_B$) & Phase \\ \hline - & 0 & 0.0 & SGS \\ Cr-V & 17.69 & 0.0 & SGS\\ V-Ti & 191.84 & 0.0 & SGS \\ Ti-Al & 208.17 & 0.0 & Metal\\ Cr-V,Ti-Al& 292.52 & 0.0 & Metal\\ V-Al & 383.68 & 0.50 & Metal\\ Cr-Ti & 391.84 & 0.56 & Metal\\ Cr-Al & 393.20 & -0.25 & Metal\\ Cr-V-Ti & 424.50 & 0.46 & Metal\\ \end{tabular} \end{ruledtabular} \end{table*} Notably, our first-principles calculations predict that the SFM phase in which the magnetic atoms are arranged in the order Cr-Ti-V-Al along the (111) body diagonal, is energetically the most favorable phase. However, the experimental results indicate the presence of a majority SGS phase in the thin films. Our first-principles results indicate that the atoms arranged along the body diagonal in the SGS phase will lie in the order Cr-V-Ti-Al. However, to obtain the fully compensated SFM phase, the magnetic atoms must arrange in the order Cr-Ti-V-Al along the body diagonal; the weaker magnetic atom (Ti) would then lie in the center of the $\it{bcc}$ cube that is created by the two strongly-magnetic atoms (Cr and V). With increasing disorder, as the larger moments are placed in the $\it{bcc}$ center, the system transforms into the SGS phase, and with further disorder it transforms into the metallic phase. \section{SUMMARY} In the investigated CrVTiAl films, we have shown the presence of two parallel conducting channels in both $\rho$(T) and MR(B) measurements. The results of $\rho$(T) measurements indicate a two-channel semiconducting SGS character. The gapless channel is found to have a small overlap of $\sim$~0.05~eV, while the gapped channel has an activation energy of $\Delta E$=~0.1~-~0.2~eV. The results of M(B) measurements identify high- and low-mobility carriers having a large mobility ratio varying from $\mu_h/\mu_l$~=~7~to~19 in reasonable accord with our theoretical estimate of the effective mass ratio in the SGS phase. We have investigated the electronic and magnetic structures for a variety of ordered and disordered phases of CrVTiAl alloys using self-consistent first-principles calculations. Our results suggest that in order to successfully design a room temperature spin filter, it will be important to investigate other quaternary compounds to determine which set of atoms will more easily form the desired SFM phase. \section{Acknowledgements} The experimental work was supported by the National Science Foundation grant ECCS-0142738. A portion of this work was performed at the National High Magnetic Field Laboratory, which is supported by the National Science Foundation Cooperative Agreement No. DMR-1644779 and the State of Florida. The theoretical work was supported by the US Department of Energy (DOE), Office of Science, Basic Energy Sciences grant number DE-FG02-07ER46352 (core research), and benefited from Northeastern University's Advanced Scientific Computation Center (ASCC), the NERSC supercomputing center through DOE grant number DE-AC02-05CH11231, and support (testing the efficacy of advanced functionals in complex materials) from the DOE EFRC: Center for Complex Materials from First Principles (CCM), under DOE grant number DE-SC0012575. \onecolumngrid \clearpage \clearpage \bibliographystyle{apsrev4-1}
\section*{Methods} \subsection*{Calibration of the sky signal response} Conversion from the relative frequency response of the MKID to the line-of-sight brightness temperature of the sky ($T_\mathrm{sky}$) is based on a model that uses the atmospheric transmission measured by DESHIMA itself. We conducted fast and wide scans of the telescope elevation (`skydip' observations) 22 times throughout the observing session, with an elevation range of 32$^\circ$--88$^\circ$. The PWV values were typically in the range of 0.4--3.0 mm, with a mean value of 0.9 mm, according to the water vapor radiometers mounted on each telescope of the Atacama Large Millimeter/submillimeter Array (ALMA)\citep{2013A&A...552A.104N}, located in the vicinity of ASTE. We define $x$ as the fractional change in MKID readout resonance frequency $f$, from when the instrument window is facing the blackened absorber on the chopper wheel at ambient temperature $T_\mathrm{amb}$ (Fig. \ref{fig:deshima}a), to when the instrument looks at the sky with a brightness temperature $T_\mathrm{sky}$ thorough the telescope optics: $ x \equiv \{f(T_\mathrm{sky})-f(T_\mathrm{amb} )\}/f(T_\mathrm{amb})$. $T_\mathrm{sky}$ was calculated from \begin{equation} T_\mathrm{sky} = \eta_\mathrm{fwd} (1-\eta_\mathrm{atm}) T_\mathrm{atm} + (1-\eta_\mathrm{fwd}) T_\mathrm{amb}, \end{equation} where $\eta_\mathrm{fwd}=0.93$ is the telescope forward efficiency of ASTE. $\eta_\mathrm{atm}$ is the transmission coefficient of the atmosphere calculated\citep{2001ITAP...49.1683P} from the PWV and telescope elevation, taking into account the frequency response of each channel (Fig. \ref{fig:deshima}i). We have assumed the physical temperature of the atmosphere $T_\mathrm{atm}$ to be equal to the outside ambient temperature $T_\mathrm{amb}$ measured with the weather monitor at the ASTE site. From a least-$\chi^2$ fitting to the square-law $T_\mathrm{sky} \propto x^2$ dependence for an aluminium-based MKID response\cite{E1}, we obtain a calibration model curve as shown in Supplementary Fig. S1b. We perform an iterative estimation of the PWV using all channels of the filterbank with $\eta_\mathrm{atm}$, and from that the PWV, as a single common free parameter. In this way we obtain a calibration model that has a dispersion of $\sim$4\% for all skydip measurements. The error is significantly smaller than the initial model that directly uses the PWV from the ALMA radiometer data (Supplementary Fig. S1a). This calibration model is used for all astronomical measurements reported in this Letter. \subsection*{Beam efficiency} We used Mars with an apparent diameter of 3.99$''$ and a brightness temperature $T_\mathrm{brightness} = 210$ K\cite{Butler2012} to measure the beam pattern and efficiency of the DESHIMA optics coupled with the ASTE 10 m telescope. The data were obtained at 12:48 UTC, 2017 November 15 (daytime in Chile) with a precipitable water vapor (PWV) of 1.8 mm. The intensity was calibrated to antenna temperature $T_\mathrm{a}^\ast$ using a standard chopper wheel method\cite{ToolsOfRadioAstronomy}. The flux-scaling, noise removal and map-making were performed using a data analysis software De:code (DESHIMA Code for data analysis)\cite{decode}. Considering the accuracy in responsivity calibration ($\sim$4\%), chopper wheel calibration together with the uncertainty in $\eta_\mathrm{MB}$ (10--15\%), and the accuracy of the planet model ($\sim$5\%), the absolute flux accuracy is estimated to be 12--17\%. The main beam shape is measured by fitting a 2-dimensional Gaussian to the 350 GHz continuum image on Mars (Supplementary Fig. S2). The source-deconvolved beam size is estimated to be 31.4$''$ $\pm$ 2.8$''$ by 22.8$''$ $\pm$ 3.1$''$ (in full width at half maximum, FWHM) with a position angle of 145.4$^\circ$. We estimate the main-beam efficiency by comparing the peak intensity with what is expected from the model and find $\eta_\mathrm{MB}$ = 0.34 $\pm$ 0.03 at 350 GHz (see Supplementary Note 1 for details). The main beam solid angle $\Omega_\mathrm{MB}$ and main beam efficiency yield an aperture efficiency of $\eta_\mathrm{A}=(\lambda^2/A_\mathrm{p})\cdot(\eta_\mathrm{MB}/\Omega_\mathrm{MB})=0.17$, where $A_\mathrm{p}$ is the physical area of the ASTE primary mirror and $\lambda$ is the wavelength. This value is much lower than previous 350 GHz measurements with a heterodyne receiver on ASTE ($\eta_\mathrm{MB} \sim 0.6$)\cite{Ito:2018bb}, and can be attributed to an offset of the instrument beam of DESHIMA. In a post analysis we have taken the beam pattern from the cryostat, measured in phase and amplitude\cite{E1}, and propagated it using Zemax\cite{Zemax} to estimate the illumination pattern on the surface of the ASTE mirrors. Supplementary Fig. S2c shows the resulting far-field beam pattern, which explains both the oval beam shape and the aperture efficiency of 0.17. \subsection*{Position switching observations} For the single-pointing observations of IRC+10216 and VV~114, we oscillated the pointing of the ASTE telescope between the source position and a position 60$''$ away from the source position in the azimuth direction, with a 2~s duty cycle. We integrated the spectrum of the target source that is contained within a circle of 11$''$ radius (on-source position), which corresponds to an approximate half width at half maximum of the ASTE beam. We regarded the data beyond 27$''$ from the target as off-source positions. The data were continuously recorded during the scans with a sampling rate of 160~Hz.\cite{Rantwijk2016} Because the frequency of the telescope nodding is lower than the typical onset of $1/f$ noise of the detectors\cite{E1} ($\sim$1~Hz, corresponding to an Allan variance time of $\sim$1 s), the time-stream data are calibrated at 10~Hz using a blackened absorber on the rotating chopper wheel placed in front of the receiver (Fig. \ref{fig:deshima}a). We took the difference $T_\mathrm{sky}-T_\mathrm{amb}$ at on- and off-source positions and used the standard chopper wheel calibration method\cite{ToolsOfRadioAstronomy} to correct for atmospheric absorption, and to convert $T_\mathrm{sky}$ to antenna temperature $T_\mathrm{a}^\ast$. Throughout the paper, on-source integration time refers to the total time that DESHIMA was observing the on-source position, excluding overheads for calibration. \subsubsection*{IRC+10216} The broadband spectra of the post-AGB star IRC+10216 were taken on 16--20 November 2017. The PWV measured by ALMA was typically 0.75~mm. The observed data were reduced using De:code\cite{decode}. After the chopper wheel calibration as mentioned above, the strong continuum emission of the target was removed by subtracting the median baseline, which was estimated in the frequency range of $<$340~GHz and $>$360~GHz. The obtained broadband spectrum is shown in Fig.~\ref{fig:NEFD}a. The noise level of each spectral channel is determined by applying an iterative integration method with random sign inversion (the jack-knife method, hereafter. See Supplementary Note 2 for details). Two remarkable peaks are found at $\sim$345~GHz and $\sim$354~GHz, corresponding to CO(3--2) and HCN(4--3) lines. The peak intensities are 94.7~mK and 79.0~mK in $T_\mathrm{a}^\ast$. The integrated intensities of the CO and HCN lines are estimated by integrating over 340--350~GHz and 353--358~GHz, to be 247 and 104~mK~km~s$^{-1}$, respectively. The spectral shape agrees with that expected from a spectral survey observation with the Submillimeter Array\cite{2011ApJS..193...17P}. The integrated intensities of the CO and HCN lines are measured to be 58\% and 31\% of those measured by a previous observation using the Caltech Submillimeter Observatory (CSO) 10~m submillimeter telescope, after correcting for the spectral resolution, the beams size of DESHIMA on ASTE measured on Mars, and the main beam efficiency of $\eta_\mathrm{MB}=0.34$. These intensity ratios indicate that the main beam efficiency of DESHIMA/ASTE should be $\eta_\mathrm{MB}\sim$0.20--0.38, which is consistent with our measurement using Mars, and the Zemax simulation as explained in the `beam efficiency' section. A plot of the signal-to-noise ratio (SNR) of the CO and HCN lines as functions of on-source integration time is presented in Fig. \ref{fig:NEFD}b. The SNR was calculated by dividing the signal by the noise level of that single spectral channel (corresponding to the vertical error bars in the spectrum as shown in Fig.~\ref{fig:NEFD}a but for different integration times.) For calculating the NEFD in Fig. \ref{fig:NEFD}c, we have adopted the HCN line over the CO line, because the HCN line is more concentrated near the target\cite{1992A&A...266..365W, 1994ApJS...95..503W}. The noise level of the HCN channel is estimated to be 1.2~mK after an on-source integration time of 12.6~min, corresponding to a NEFD of 3.2~Jy~beam$^{-1}$~s$^{0.5}$. \subsubsection*{VV~114} The interacting galaxy pair VV~114 has been observed on 16 and 21 November 2017. The typical PWV measured by ALMA were 0.7~mm on the 16th and 0.9~mm on the 21st. The scan pattern and data reduction method were the same as for IRC+10216; the continuum emission was removed by subtracting a median baseline of the spectrum, estimated in the frequency range of $<$335~GHz and $>$345~GHz. The broadband spectrum of VV~114 is shown in Fig.~\ref{fig:concept}b. A significant emission line is detected at 339~GHz, corresponding to the redshifted CO(3--2) spectrum\cite{2008ApJS..178..189W}. The peak intensity of the CO line is 8.9~mK in $T_\mathrm{a}^\ast$ and the integrated intensity is estimated by integrating over 337.9--341.5~GHz to be 12.4~K~km~s$^{-1}$. Adopting the beam size of DESHIMA on ASTE measured on Mars and the main beam efficiency of $\eta_\mathrm{MB}=0.34$, the total flux density of the CO(3--2) emission is estimated to be 2.44$\times10^3$~Jy~km~s$^{-1}$. Regarding the difference in the integrated regions on sky, the estimated flux density is in reasonable agreement with the previous estimate with the JCMT (2956$\pm$133~Jy~km~s$^{-1}$)\cite{2008ApJS..178..189W}. No other line feature is found except for tentative detections near 332~GHz and 343~GHz. The frequencies of these features are consistent with the redshifted frequencies of methanol in transitions of 7(1,6)--6(1,5)E and 4(0,4)--3(-1,3)E, respectively. The noise level of the spectrum is typically 1.0~mK in $T_\mathrm{a}^\ast$ with an integration time of 12.6~min, which is equivalent to a NEFD of 2.5~Jy~beam$^{-1}$~s$^{0.5}$. The deep integration and the simple shape of the spectrum allow us to estimate the NEFD at each channel with the jack-knife method as shown in Fig. \ref{fig:concept}b. We find that the NEFDs of all channels except for some higher frequencies achieve a good agreement with that of the theoretical prediction, as presented in Fig. \ref{fig:NEFD}c. \subsection*{On-the-fly mapping observations} On-the-Fly (OTF) mapping observations toward the Orion KL region and NGC~253 (Fig.~\ref{fig:orion}) were performed with spatial raster scans, in which the DESHIMA/ASTE beam ran linearly across the area of interest at a constant speed. The data taken at each side of the scans were used to subtract the foreground sky emission. Absolute flux calibration was performed with the standard chopper wheel method\cite{ToolsOfRadioAstronomy} at the beginning of each mapping observation. The signal spectra and the noise on each channel map were obtained by aperture photometry on the map, adopting an aperture diameter of 43$''$. \subsubsection*{Orion} DESHIMA observations towards the massive star-forming region around Orion KL were executed on 8--12 November 2017. The area presented in Fig.~\ref{fig:orion}b--d was divided into six sub-regions, which each have a size of 29$'$ by 4$'$. After 28 separate observations of these sub-regions in a total on-source time of 12.5 hours, the data were combined to produce the final map of 29$'$ by 22$'$. After the basic data reduction process described above, we model the common signal across all channels as a superposition of continuum emission from the source and sky foreground emission, and remove the sky contribution based on an inter-channel correlation analysis. We applied a moderate high-pass filter in the image domain in the scanning direction to remove part of the instrument and atmospheric $1/f$ noise, because we did not continuously rotate the chopper during this observation. Finally, we convolved the map with a 43$''$-diameter aperture to obtain the maps of CO, HCN, and HCO$^+$ presented in Fig.~\ref{fig:orion}b--d. The spectrum at the point of Orion KL is displayed in Fig.~\ref{fig:orion}e. \subsubsection*{NGC~253} The OTF spectral map of the nearby barred-spiral galaxy NGC~253, presented in Fig.~\ref{fig:orion}f,g, was taken on 6--7 November 2017. The map size is 4.2$'$ by 4.2$'$. The total on-source time was 1.7~hours. The data were reduced in the same manner as the Orion KL data, except that we used the median value of all channels to subtract the foreground sky emission. No continuum emission was detected from NGC~253, in an analysis similar to that for Orion. The obtained 1$\sigma$ noise is typically $\sim$5.3~mK from 335~GHz to 365~GHz. The map of the 345.53~GHz channel shows a 12.8$\sigma$ detection of CO(3--2) emission from NGC~253, as shown in Fig.~\ref{fig:orion}f where the DESHIMA CO(3--2) map is overlaid on a 2MASS $JHK$ RGB image\cite{2006AJ....131.1163S}. The spectrum at this point, for a 43$''$ aperture, is shown in Fig.~\ref{fig:orion}g. The total integrated intensity of the CO(3--2) emission at the peak position for a 26.7$''$ aperture is estimated to be 138~K~km~s$^{-1}$. This value is consistent with the previous measurement using a heterodyne receiver installed on the CSO 10~m telescope\cite{2004A&A...427...45B}, taking into account the difference in beam size, and the accuracy of the absolute flux calibration. The total integrated intensity of the CO(3--2) spectrum taken with CSO is estimated to be $815.6\pm 163.1$~K~km~$\mathrm{s}^{-1}$\cite{2004A&A...427...45B}. Since the beam size of CSO is 21.9$''$, which is smaller than the DESHIMA beam, it should be corrected for comparison. If we assume that the emission is uniformly distributed over the DESHIMA beam, the total integrated intensity is corrected to be 205~K~km~$\mathrm{s}^{-1}$ for a 21.9$''$ aperture. Adopting a main beam efficiency of 0.34, the total integrated intensity is thus 643~K~km~$\mathrm{s}^{-1}$. This is slightly lower than the CSO value but within the margin of the uncertainty in absolute flux calibration and the distribution of source emission. \subsection*{Sensitivity} The power coupled to the MKID is the sum of the power from the sky and the power from warm spillover. This is given by \begin{equation} \begin{split} P_\mathrm{MKID} &= \{\eta_\mathrm{fwd}(1-\eta_\mathrm{atm})+(1-\eta_\mathrm{fwd})\}\eta_\mathrm{inst}B(F,T_\mathrm{amb})\Delta F,\\ \end{split} \end{equation} where $\eta_\mathrm{fwd}=0.93$ is the forward efficiency of the telescope, i.e. all power coupled to the sky, $\eta_\mathrm{inst}$ is the coupling from the cryostat window to the MKID detector, and $\eta_\mathrm{atm}$ is the atmosphere transmission given by the PWV and elevation. In Fig. \ref{fig:NEFD}c, we have adopted $\eta_\mathrm{inst}=0.02$ for the model bars, based on the laboratory test\cite{E1}. $B(F, T_\mathrm{amb})$ is the single polarization Planck brightness at frequency $F$ and temperature $T_\mathrm{amb}$, taken identical for the ground, cabin and atmosphere. The photon noise limited noise equivalent power ($\mathrm{NEP_\mathrm{ph}}$), at the detector, is given by\cite{E1} \begin{equation} \label{eq:NEPph} \begin{split} \mathrm{NEP_{ph}} &= \sqrt{2P_\mathrm{MKID}(hF+P_\mathrm{MKID}/\Delta F)+4\Delta_\mathrm{Al} P_\mathrm{MKID}/\eta_\mathrm{pb}}. \end{split} \end{equation} Here, $h$ is the Planck constant, $\Delta F$ is the effective bandwidth of the filter channel, $\Delta_\mathrm{Al}=188\ \mathrm{\mu eV}$ is the superconducting gap energy of aluminium, and $\eta_\mathrm{pb}\sim 0.4$ is the pair-breaking efficiency\cite{2014SuScT..27e5012G}. The foreground photon-noise limited noise equivalent flux density ($\mathrm{NEFD_{ph}}$), evaluated on-sky, has to take into account the instrument coupling, aperture efficiency $\eta_\mathrm{A}$, and the physical area of the ASTE telescope $A_\mathrm{p}$, and is given by \begin{equation} \begin{split} \mathrm{NEFD_{ph}} &= \frac{\mathrm{NEP_{ph}}}{\sqrt{2}\eta_\mathrm{pol}\eta_\mathrm{inst}\eta_\mathrm{fwd}\eta_\mathrm{atm}\eta_\mathrm{A}A_\mathrm{p}\Delta F}. \end{split} \end{equation} Here, the factor $\sqrt{2}$ accounts for the NEP being defined for 0.5 s integration time, and $\eta_\mathrm{pol}=0.5$ accounts for the fact that DESHIMA is sensitive to a single linear polarization. \subsection*{Optimum frequency resolution} Here we will show that the signal-to-noise-ratio (SNR) for a single ISS channel matched to the center frequency of an astronomical line is maximum when the channel frequency width $\Delta F_\mathrm{ch}$ is equal to the line width $\Delta F_\mathrm{line}$, under the assumption that the measurement is limited by the foreground/background photon-noise. In the following analysis we adopt a frequency width ratio $r \equiv \Delta F_\mathrm{ch} / \Delta F_\mathrm{line}$, and assume a rectangular frequency profile for both the line and the channel transmission for simplicity. The SNR for $r=1$ after an integration time of $t$ is \begin{equation} \begin{split} \mathrm{SNR} &= \frac{P_\mathrm{line}\sqrt{2t}}{\mathrm{NEP}_\mathrm{ph}}\\ \end{split} \end{equation} Here, $P_\mathrm{line}$ is the total power from the line absorbed by the MKID, and $\mathrm{NEP}_\mathrm{ph}$ is given by equation~\ref{eq:NEPph}. If $r>1$, then $P_\mathrm{line}$ stays constant, but the NEP increases with $\sqrt{r}$ according to equation~\ref{eq:NEPph}, because $P_\mathrm{MKID}\propto r$ and $\Delta F\propto r$. In other words, the MKID receives more sky loading but the signal power from the line stays constant. Therefore the SNR drops. If $r<1$, then $P_\mathrm{line}$ decreases in proportion to $r$ because the channel receives only part of the spectral power of the line. At the same time the NEP decreases but with $\sqrt{r}$, so the net change in SNR is a decrease proportional to $\sqrt{r}$. From these two arguments we can conclude that the SNR for a single channel is maximized for $r=1$. Now, the sensitivity loss for the $r<1$ case can be recovered if one places $1/r$ channels per line, but this would naturally require more detectors to cover a given instantaneous bandwidth. For DESHIMA we have taken a typical velocity width of $\Delta V \sim 600$ km/s for bright SMGs \cite{2013ARA&A..51..105C} to set the frequency resolution to $F/\Delta F = c/\Delta V \sim 500$. If the typical line width of the target population is known a priori, then the spectral resolution of the ISS can be optimized according to the intended applications. \subsection*{Data availability} The datasets generated and analyzed during this study are available from the corresponding author on reasonable request. \subsection*{Code availability} The De:code software is distributed under the MIT license at \url{https://github.com/deshima-dev/decode}. \section{Main beam size and efficiency} \label{SI:efficiency} We measure the main-beam shape and efficiency on a Mars image where Mars cannot be considered as a point source (i.e., $\Omega_\mathrm{source} \ll \Omega_\mathrm{MB}$, where the former and latter are the solid angles of the source and the main beam, respectively). The Mars image is produced by putting time-stream data, which are already flux-calibrated by the standard chopper-wheel method, into 2-dimensional pixels (Supplementary Fig.~\ref{fig:beampattern}a). Then we fit a 2-dimensional Gaussian to this continuum map to measure the intrinsic beam size and amplitude. We obtain a peak antenna temperature of $T_\mathrm{a}^{\ast} = 1.06 \pm 0.1$~K and the half-power beam width (HPBW) of 31.4$''$ $\pm$ 2.8$''$ by 22.8$''$ $\pm$ 3.1$''$ with a position angle of 145 degrees. The beam radial profile is presented in Supplementary Fig.~\ref{fig:beampattern}b. The antenna temperature is related to the main beam efficiency as the equation \begin{equation} T_\mathrm{a}^\ast = \frac{\int_\mathrm{source} P_n(\theta, \phi)\,d\Omega}{\int_{4\pi}P_n(\theta, \phi)d\Omega}T_\mathrm{brightness} = \eta_\mathrm{MB} \frac{\Omega_\mathrm{source}}{\Omega_\mathrm{MB}} T_\mathrm{brightness}\ , \end{equation} where $P_n$ is the power pattern, $\Omega_\mathrm{MB}$ and $\Omega_\mathrm{source}$ are the solid angle of main beam and the source, respectively, and $\eta_\mathrm{MB}$ is the main beam efficiency. The solid angle of an elliptical main beam is expressed as $\Omega_\mathrm{MB} = \frac{\pi \theta_\mathrm{major}\theta_\mathrm{minor}}{4 \ln{2}}$, where $\theta_\mathrm{major}$ and $\theta_\mathrm{minor}$ are the FWHMs of the main beam measured along the major and minor axes, respectively. We regard the brightness distribution of Mars as a disk with a uniform intensity of $T_\mathrm{brightness} = 210$~K and an apparent diameter of 3.99$''$, and obtain $\eta_\mathrm{MB} = 0.34 \pm 0.03$ at 350~GHz. \section{Jack-knife estimation of the noise level}\label{SI:jack-knife} Since each MKID is an independent detector, the noise level of each ISS channel is determined by applying an iterative integration method with random sign inversion (the jack-knife method). In this method we apply the following steps to the time-stream data of each channel, independently. First, we subtract the time-integrated signal of the source from the entire time-stream data. Then we divide this source-subtracted time-stream data into blocks that contain one cycle of the telescope nodding, and randomly invert the sign of the signal cotained in each block. The time-integration of this randomized set of data yields a single estimation of the source-subtracted intensity of each channel. We repeat this process for 100 times, and use the standard deviation as the estimation for the noise level at that channel. The channel-dependent error of the broadband spectra of VV~114 and IRC+10216 as shown in Fig. \ref{fig:concept}b and Fig. \ref{fig:NEFD}a, as well as the NEFDs shown in Fig. \ref{fig:NEFD}c, are determined using this method.
\section{Neural Parametrization} \label{app:nn} \paragraph{(Implementation)} We implemented our neural networks with the C++ API of the Dynet library \cite{dynet}. The continuous relaxation of the parsing algorithm is implemented as a custom computation node. \paragraph{(Training)} All networks are trained with Adam initialized with a learning rate of $0.0001$ and batches of size 64. If the dev score did not improve in the last 5 iterations, we multiply the learning rate by $0.9$ and load the best known model on dev. For the ListOps task, we run a maximum of 100 epochs, with exactly 100 updates per epoch. For NLI and SST tasks, we run a maximum of 200 epochs, with exactly 8500 and 100 updates per epoch, respectively. All MLPs and GCNs have a dropout ratio of $0.2$ except for the ListOps task where there is no dropout. We clip the gradient if its norm exceed $5$. \subsection{ListOps Valency Tagging} \label{app:listops} \paragraph{(Dependency Parser)} Embeddings are of size 100. The BiLSTM is composed of two stacks (i.e. we first run a left-to-right and a right-to-left LSTM, then we concatenate their outputs and finally run a left-to-right and a right-to-left LSTM again) with one single hidden layer of size 100. The initial state of the LSTMs are fixed to zero. The MLPs of the dotted attention have 2 layers of size 100 and a $\mathrm{ReLU}$ activation function \paragraph{(Tagger)} The unique embedding is of size 100. The GCN has a single layer of size 100 and a $\mathrm{ReLU}$ activation. Then, the tagger is composed of a MLP with a layer of size 100 and a $\mathrm{ReLU}$ activation followed by a linear projection into the output space (i.e.\ no bias, no non-linearity). \subsection{Natural Language Inference} \label{app:nn:nli} All activation functions are $\mathrm{ReLU}$. The inter-attention part and the classifier are exactly the same than in the model of \citet{parikh2016decomposable}. \paragraph{(Embeddings)} Word embeddings of size 300 are initialized with Glove and are not updated during training. We initialize 100 unknown word embeddings where each value is sampled from the normal distribution. Unknown words are mapped using a hashing method. \paragraph{(GCN)} The embeddings are first passed through a one layer MLP with an output size of 200. The dotted attention is computed by two MLP with two layers of size 200 each. Function $f()$, $g()$ and $h()$ in the GCN layers are one layer MLPs without activation function. The $\sigma$ activation function of a GCN is $\mathrm{ReLU}$. We use dense connections for the GCN. \subsection{Sentiment Classification} \label{app:nn:sst} \paragraph{(Embeddings)} We use Glove embeddings of size 300. We learn the unknown word embeddings. Then, we compute context sensitive embeddings with a single-stack/single-layer BiLSTM with a hidden-layer of size 100. \paragraph{(GCN)} The dotted attention is computed by two MLP with one layer of size 300 each. There is no distance bias in this model. Function $f()$, $g()$ and $h()$ in the GCN layers are one layer MLPs without activation function. The $\sigma$ activation function of a GCN is $\mathrm{ReLU}$. We do not use dense connections in this model. \paragraph{(Output)} We use a max-pooling operation on the GCN outputs followed by an single-layer MLP of size 300. \section{Illustration of the Continuous Relaxation} \label{app:argmax} Too give an intuition of the continuous relaxation, we plot the $\argmax$ function and the penalized $\argmax$ in Figure~\ref{fig:argmax}. We plot the first output for input $(x_1, x_2, 0)$. \begin{figure*} \centering \subfloat[]{ \includegraphics{fig_opt/argmax.pdf} \label{fig:argmax:a} } \subfloat[]{ \includegraphics{fig_opt/softmax.pdf} \label{fig:argmax:b} } \caption{ \protect\subref{fig:argmax:a} Single output of an $\argmax$ function. The derivative is null almost everywhere, i.e.\ there is no descent direction. \protect\subref{fig:argmax:b} Single output of the differentiable relaxation. The derivatives are non-null. } \label{fig:argmax} \end{figure*} \section{ListOps Training} \label{app:listops:training} We plot tagging accuracy and attachment score with respect to the training epoch in Figure~\ref{fig:listops:training}. On the one hand, we observe that the non-stochastic versions converges way faster in both metrics: we suspect that it develops an alternative protocol to pass information about valencies from LSTM to the GCN. On the other hand, MC sampling may have a better exploration of the search space but it is slower to converge. We stress that training with MC estimation results in the latent tree corresponding (almost) perfectly to the gold grammar. \section{Fast differentiable dynamic program implementation} In order to speed up training, we build a a fast the differentiable dynamic program (DDP) as a custom computational node in Dynet and use it in a static graph. Instead of relying on masking, we add an input the DDP node that contains the sentence size~: therefore, even if the size of the graph is fixed, the cubic-time algorithm is run on the true input length only. Moreover, instead of allocating memory with the standard library functionnality, we use the fast scratch memory allocator of Dynet. \begin{figure*} \centering \subfloat[][Accuracy]{ \input{fig/listops_acc.tex} }% \hfill{}% \subfloat[][Attachment score]{ \input{fig/listops_uas.tex} } \caption{ Accuracy of tagging and attachment score of the latent tree during training. {\bfseries (red solid line)} Non-stochastic training with forward relaxation. {\bfseries (blue dashed line)} MC training with forward relaxation. {\bfseries (black dotted)} Non-stochastic training with backward relaxation. {\bfseries (green dashdotted)} MC with backward relaxation. } \label{fig:listops:training} \end{figure*} \section{Introduction} Discrete structures are ubiquitous in the study of natural languages, for example in morphology, syntax and discourse analysis. In natural language processing, they are often used to inject linguistic prior knowledge into statistical models. For examples, syntactic structures have been shown beneficial in question answering~\cite{cui2005question}, sentiment analysis~\cite{socher2013sst}, machine translation~\cite{bastings2017translation} and relation extraction~\cite{liu2015dependency}, among others. However, linguistic tools producing these structured representations (e.g., syntactic parsers) are not available for many languages and not robust when applied outside of the domain they were trained on ~\cite{petrov2010parsing,foster2011hardtoparse}. Moreover, linguistic structures do not always seem suitable in downstream applications, with simpler alternatives sometimes yielding better performance~\cite{wang2018tree}. Indeed, a parallel line of work focused on inducing task-specific structured representations of language~\cite{naradowsky2012latent,yogatama2016reinforce,kim2017structuredatt,liu2018structuredatt,niculae2018dyncg}. In these approaches, no syntactic or semantic annotation is needed for training: representation is induced from scratch in an end-to-end fashion, in such a way as to benefit a given downstream task. In other words, these approaches provide an inductive bias specifying that (hierarchical) structures are appropriate for representing a natural language, but do not make any further assumptions regarding what the structures represent. Structures induced in this way, though useful for the task, tend not to resemble any accepted syntactic or semantic formalisms~\cite{williams2018latent}. Our approach falls under this category. In our method, projective dependency trees (see Figure~\ref{tab:examples} for examples) are treated as latent variables within a probabilistic model. We rely on differentiable dynamic programming \cite{mensch2018differentiable} which allows for efficient sampling of dependency trees \cite{corro2018differentiable}. Intuitively, sampling a tree involves stochastically perturbing dependency weights and then running a relaxed form of the Eisner dynamic programming algortihm~\cite{eisner1996dep}. A sampled tree (or its continuous relaxation) can then be straightforwardly integrated in a neural sentence encoder for a target task using graph convolutional networks~\cite[GCNs,][]{kipf2016semi}. The entire model, including the parser and GCN parameters, are estimated jointly while minimizing the loss for the target task. What distinguishes us from previous work is that we stochastically sample global structures and do it in a differentiable fashion. For example, the structured attention method \cite{kim2017structuredatt,liu2018structuredatt} does not sample entire trees but rather computes arc marginals, and hence does not faithfully represent higher-order statistics. Much of other previous work relies either on reinforcement learning \cite{yogatama2016reinforce,nangia2018listops,williams2018latent} or does not treat the latent structure as a random variable~\cite{head2018sigpot}. \citet{niculae2018dyncg} marginalizes over latent structures, however, this necessitates strong sparsity assumptions on the posterior distributions which may inject undesirable biases in the model. Overall, differential dynamic programming has not been actively studied in the task-specific tree induction context. Most previous work also focused on constituent trees rather than dependency ones. We study properties of our approach on a synthetic structure induction task and experiment on sentiment classification \cite{socher2013sst} and natural language inference \cite{bowman2015snli}. Our experiments confirm that the structural bias encoded in our approach is beneficial. For example, our approach achieves a 4.9\% improvement on multi-genre natural language inference (MultiNLI) over a structure-agnostic baseline. We show that stochastisticity and higher-order statistics given by the global inference are both important. In ablation experiments, we also observe that forcing the structures to be projective dependency trees rather than permitting any general graphs yields substantial improvements without sacrificing execution time. This confirms that our inductive bias is useful, at least in the context of the considered downstream applications.% \footnote{The Dynet code for differentiable dynamic programming is available at \url{https://github.com/FilippoC/diffdp}.} Our main contributions can be summarized as follows: \begin{enumerate} \vspace{-1ex} \item we show that a latent tree model can be estimated by drawing global approximate samples via Gumbel perturbation and differentiable dynamic programming; \vspace{-1ex} \item we demonstrate that constraining the structures to be projective dependency trees is beneficial; \vspace{-1ex} \item we show the effectiveness of our approach on two standard tasks used in latent structure modelling and on a synthetic dataset. \end{enumerate} \section{Background} In this section, we describe the dependency parsing problem and GCNs which we use to incorporate latent structures into models for downstream tasks. \subsection{Dependency Parsing} Dependency trees represent bi-lexical relations between words. They are commonly represented as directed graphs with vertices and arcs corresponding to words and relations, respectively. Let $x = x_0 \ldots x_n$ be an input sentence with $n$ words where $x_0$ is a special root token. We describe a dependency tree of $x$ with its adjacency matrix ${\bm{T}} \in \{0, 1\}^{n \times n}$ where ${T}_{h, m} = 1$ iff there is a relation from head word $x_h$ to modifier word $x_m$. We write $\mathcal{T}(x)$ to denote the set of trees compatible with sentence $x$. We focus on projective dependency trees. A dependency tree ${\bm{T}}$ is projective iff for every arc ${T}_{h, m} = 1$, there is a path with arcs in ${\bm{T}}$ from $x_h$ to each word $x_i$ such that $h < i < m$ or $m < i < h$. Intuitively, a tree is projective as long as it can be drawn above the words in such way that arcs do not cross each other (see Figure~\ref{tab:examples}). Similarly to phrase-structure trees, projective dependency trees implicitly encode hierarchical decomposition of a sentence into spans (`phrases'). Forcing trees to be projective may be desirable as even flat span structures can be beneficial in applications (e.g., encoding multi-word expressions). Note that actual syntactic trees are also, to a large degree, projective, especially for such morphologically impoverished languages as English. Moreover, restricting the space of the latent structures is important to ease their estimation. For all these reasons, in this work we focus on projective dependency trees. In practice, a dependency parser is given a sentence $x$ and predicts a dependency tree ${\bm{T}} \in \mathcal{T}(x)$ for this input. To this end, the first step is to compute a matrix ${\bm{W}} \in \mathbb{R}^{n \times n}$ that scores each dependency. In this paper, we rely on a deep dotted attention network. Let ${\bm{e}}_0 \ldots {\bm{e}}_n$ be embeddings associated with each word of the sentence.% \footnote{ The embeddings can be context-sensitive, e.g., an RNN state. } We follow \citet{parikh2016decomposable} and compute the score for each head-modifier pair $(x_h,x_m)$ as follows: \begin{align} \label{eq:parse-pred} {W}_{h, m}\! =\! \mathrm{MLP}^{\text{head}}({\bm{e}}_h)\!^\top\! \mathrm{MLP}^{\text{mod}}({\bm{e}}_m\!)\!+\!b_{h{\text -}m}, \end{align} where $\mathrm{MLP}^{\text{head}}$ and $\mathrm{MLP}^{\text{mod}}$ are multilayer perceptrons, and $b_{h{\text -}m}$ is a distance-dependent bias, letting the model encode preference for long or short-distance dependencies. The conditional probability of a tree $p_\theta({\bm{T}} | x)$ is defined by a log-linear model: \begin{align*} p_\theta({\bm{T}} | x) = \frac{\exp(\sum_{h, m} {W}_{h, m} {T}_{h, m})}{\sum_{T' \in \mathcal{T}(x)} \exp(\sum_{h, m} {W}_{h, m} {T}'_{h, m})}. \end{align*} When tree annotation is provided in data ${\mathbb{D}}$, networks parameters $\theta$ are learned by maximizing the log-likelihood of annotated trees \cite{lafferty2001crf}. \begin{comment} When tree annotation is provided in data ${\mathbb{D}}$, networks parameters $\theta$ are learned by minimizing the negated log-likelihood of gold structures: \begin{align} \theta^* = \argmin_\theta -\sum_{\langle x, \hat{{\bm{T}}}^x \rangle \in {\mathbb{D}}} \log p_\theta(\hat{{\bm{T}}}^x | x), \label{eq:crf:obj} \end{align} where the conditional probability of a tree $p_\theta({\bm{T}} | x)$ is defined by a log-linear model: \begin{align*} p_\theta({\bm{T}} | x) = \frac{\exp(\sum_{h, m} {W}_{h, m} {T}_{i, j})}{\sum_{T' \in \mathcal{T}(x)} \exp(\sum_{i, j} {W}_{i, j} {T}'_{i, j})}. \end{align*} \end{comment} The highest scoring dependency tree can be produced by solving the following mathematical program: \begin{align} \bm T = \argmax_{\bm T \in \mathcal{T}(\bm x)} \quad \sum_{h, m} {W}_{h, m} {T}_{h, m}. \label{eq:map} \end{align} If $\mathcal{T}(\bm x)$ is restricted to be the set of projective dependency trees, this can be done efficiently in $O(n^3)$ using the dynamic programming algorithm of \citet{eisner1996dep}. \subsection{Graph Convolutional Networks} Graph Convolutional Networks \cite[GCNs,][]{kipf2016semi,diego2017semantic} compute context-sensitive embeddings with respect to a graph structure. GCNs are composed of several layers where each layer updates vertices representations based on the current representations of their neighbors. In this work, we fed the GCN with word embeddings and a tree sample ${\bm{T}}$. For each word $x_i$, a GCN layer produces a new representation relying both on word embedding of $x_i$ and on embeddings of its heads and modifiers in ${\bm{T}}$. Multiple GCN layers can be stacked on top of each other. Therefore, a vertex representation in a GCN with $k$ layers is influenced by all vertices at a maximum distance of $k$ in the graph. Our GCN is sensitive to arc direction. More formally, let ${\bm{E}}^0 = {\bm{e}}_0 \odot \dots \odot {\bm{e}}_n$, where $\odot$ is the column-wise concatenation operator, be the input matrix with each column corresponding to a word in the sentence. At each GCN layer $t$, we compute: \begin{align*} {\bm{E}}^{t+1} = \sigma \left( f({\bm{E}}^t) + g({\bm{E}}^t) {\bm{T}} + h({\bm{E}}^t) {\bm{T}}^\top \right), \end{align*} where $\sigma$ is an activation function, e.g. $\mathrm{ReLU}$. Functions $f()$, $g()$ and $h()$ are distinct multi-layer perceptrons encoding different types of relationships: self-connection, head and modifier, respectively (hyperparameters are provided in Appendix~\ref{app:nn}). Note that each GCN layer is easily parallelizable on GPU both over vertices and over batches, either with latent or predefined structures. \section{Structured Latent Variable Models} In the previous section, we explained how a dependency tree is produced for a given sentence and how we extract features from this tree with a GCN. In our model, we assume that we do not have access to gold-standard trees and that we want to induce the best structure for the downstream task. To this end, we introduce a probability model where the dependency structure is a latent variable (Section~\ref{sec:bayes}). The distribution over dependency trees must be inferred from the data (Section~\ref{sec:estimation}). This requires marginalization over dependency trees during training, which is intractable due to the large search space.% \footnote{% This marginalization is a sum of the network outputs over all possible projective dependency trees. We cannot rely on the usual dynamic programming approach because we do not make any factorization assumptions in the GCN. } Instead, we rely on Monte-Carlo (MC) estimation. \subsection{Graphical Model} \label{sec:bayes} Let $x$ be the input sentence, $y$ be the output (e.g. sentiment labelling) and $\mathcal{T}(x)$ be the set of latent structures compatible with input $x$. We construct a directed graphical model where $x$ and $y$ are observable variables, i.e.\ their values are known during training. However, we assume that the probability of the output $y$ is conditioned on a latent tree ${\bm{T}} \in \mathcal{T}(x)$, a variable that is not observed during training: it must be inferred from the data. Formally, the model is defined as follows: \begin{align} p_\theta(y | x) &= \mathbb{E}_{p_\theta({\bm{T}} | x)}[ p(y | x, {\bm{T}}) ] \label{eq:latent_model} \\ &= \sum_{{\bm{T}} \in \mathcal{T}(x)} p_\theta({\bm{T}} | x) \times p_\theta(y | x, {\bm{T}}), \nonumber \end{align} where $\theta$ denotes all the parameters of the model. An illustration of the network is given in Figure~\ref{fig:network:sst}. \subsection{Parameter Estimation} \label{sec:estimation} Our probability distributions are parameterized by neural networks. Their parameters $\theta$ are learned via gradient-based optimization to maximize the log-likelihood of (observed) training data. Unfortunately, estimating the log-likelihood of observation requires computing the expectation in Equation~\ref{eq:latent_model}, which involves an intractable sum over all valid dependency trees. Therefore, we propose to optimize a lower bound on the log-likelihood, derived by application of Jensen's inequality which can be efficiently estimated with the Monte-Carlo (MC) method: \begin{align} \log & \; p_{\theta}(y^i | x^i) = \log \mathbb{E}_{{\bm{T}} \sim p_{\theta}({\bm{T}} | x^i)}[ p_{\theta}(y^i | {\bm{T}}, x^i) ] \nonumber \\ &\geq \mathbb{E}_{{\bm{T}} \sim p_{\theta}({\bm{T}} | x^i)}[ \log p_{\theta}(y^i | {\bm{T}}, x^i) ]. \label{eq:bound} \end{align} However, MC estimation introduces a non-differentiable sampling function ${\bm{T}} \sim p_\theta({\bm{T}} | x^i)$ in the gradient path. Score function estimators have been introduced to bypass this issue but suffer from high variance \cite{williams1987reinforce,fu2006gradient,schulman2015gradient}. Instead, we propose to reparametrize the sampling process~\cite{kingma2013vae}, making it independent of the learned parameter $\theta$~: in such case, the sampling function is outside of the gradient path. To this end, we rely on the Perturb-and-MAP framework \cite{papandreou2011perturb}. Specifically, we perturb the potentials (arc weights) with samples from the Gumbel distribution and compute the most probable structure with the perturbed potentials: \begin{align} {G}_{h, m} &\sim \mathcal{G}(0, 1), \\ \widetilde{{\bm{W}}} &= {\bm{W}} + {\bm{G}}, \\ {\bm{T}} &= \argmax_{{\bm{T}} \in \mathcal{T}(x)} \sum_{h, m} {T}_{h, m} \widetilde{{W}}_{h, m}. \label{eq:sampling:argmax} \end{align} Each element of the matrix ${\bm{G}} \in \mathbb{R}^{n \times n}$ contains random samples from the Gumbel distribution% \footnote{That is ${G}_{h, m} = -\log(-\log({U}_{h, m}))$ where ${U}_{h, m}$ is sampled from the uniform distribution on the interval $(0, 1)$.} which is independent from the network parameters $\theta$, hence there is no need to backpropagate through this path in the computation graph. Note that, unlike the Gumbel-Max trick~\cite{maddison2014sampling}, sampling with Perturb-and-MAP is approximate, as the noise is factorizable: we add noise to individual arc weights rather than to scores of entire trees (which would not be tractable). This is the first source of bias in our gradient estimator. The maximization in Equation~\ref{eq:sampling:argmax} can be computed using the algorithm of \citet{eisner1996dep}. We stress that the marginalization in Equation~\ref{eq:latent_model} and MC estimated sum over trees capture high-order statistics, which is fundamentally different from computing edge marginals, i.e.\ structured attention~\cite{kim2017structuredatt}. Unfortunately, the estimated gradient of the reparameterized distribution over parse trees is ill-defined (either undefined or null). We tackle this issue in the following section. \section{Differentiable Dynamic Programming} \label{sect:diff-dp} Neural networks parameters are learned using (variants of) the stochastic gradient descent algorithm. The gradient is computed using the back-propagation algorithm that rely on partial derivative of each atomic operation in the network.% \footnote{% There are some exception where a sub-derivative is enough, for example for the $\mathrm{ReLU}$ non-linearity. } The perturb-and-MAP sampling process relies on the dependency parser (Equation~\ref{eq:sampling:argmax}) which contains ill-defined derivatives. This is due to the usage of constrained $\argmax$ operations \cite{gould2016differentiating,mensch2018differentiable} in the algorithm of \citet{eisner1996dep}. Let $\mathcal{L}$ be the training loss, backpropagation is problematic because of the following operation: \begin{align*} \frac{\partial \mathcal{L}}{\partial \widetilde{{\bm{W}}}} = \frac{\partial \mathcal{L}}{\partial {\bm{T}}} \frac{\partial {\bm{T}}}{\partial \widetilde{{\bm{W}}}} \end{align*} where $\frac{\partial {\bm{T}}}{\partial \widetilde{{\bm{W}}}}$ is the partial derivative with respect to the dependency parser (Equation~\ref{eq:sampling:argmax}) which is null almost everywhere, i.e.\ there is no descent direction information. We follow previous work and use a differentiable dynamic programming surrogate \cite{mensch2018differentiable,corro2018differentiable}. The use of the surrogate is the second source of bias in our gradient estimation. \subsection{Parsing with Dynamic Programming} The projective dependency parser of \citet{eisner1996dep} is a dynamic program that recursively builds a chart of items representing larger and larger spans of the input sentence. Items are of the form $[i, j, d, c]$ where: $0 \leq i \leq j \leq n$ are the boundaries of the span; $d \in \{\rightarrow, \leftarrow\}$ is the direction of the span, i.e.\ a right span $\rightarrow$ (resp. left span $\leftarrow$) means that all the words in the span are descendants of $x_i$ (resp. $x_j$) in the dependency tree; $c \in \{\top, \bot \}$ indicates if the span is complete ($\top$) or incomplete ($\bot$) in its direction. In a complete right span, $x_j$ cannot have any modifiers on its right side. In a complete left span, $x_i$ cannot have any modifier on its left side. A set of deduction rules defines how the items can be deduced from their antecedents. The algorithm consists of two steps. In the first step, items are deduced in a bottom-up fashion and the following information is stored in the chart: the maximum weight that can be obtained by each item and backpointers to the antecedents that lead to this maximum weight (Algorithm~\ref{alg:forward}). In the second step, the backpointers are used to retrieve the items corresponding to the maximum score and values in ${\bm{T}}$ are set accordingly (Algorithm~\ref{alg:backtrack}).% \footnote{% The second step is often optimized to have linear time complexity instead of cubic. Unfortunately, this change is not compatible with the continuous relaxation we propose. } \subsection{Continuous Relaxation} The $\onehotargmax$ operation on line \ref{alg:argmax} in Algorithm~\ref{alg:forward} can be written as follows: \begin{align*} &\argmax_{{\bm{b}} \geq 0} \quad \sum_k {b}_k {s}_k && \text{s.t.} \sum_k {b}_k = 1. \\ \intertext{ It is known that a continuous relaxation of $\argmax$ in the presence of inequality constraints can be obtained by introducing a penalizer that prevents activation of inequalities at the optimal solutions \cite{gould2016differentiating}: } &\argmax_{{\bm{b}} \geq 0} \quad \sum_k {b}_k {s}_k - \Omega({\bm{b}}) && \text{s.t.} \sum_k {b}_k = 1. \end{align*} Several $\Omega$ functions have been studied in the literature for different purposes, including logarithmic and inverse barriers for the interior point method \cite{den1994inverse,potra2000interior} and negative entropy for deterministic annealing \cite{rangarajan2000annealing}. When using negative entropy, i.e.\ $\Omega({\bm{b}}) = \sum_k {b}_k \log {b}_k$, solving the penalized $\onehotargmax$ has a closed form solution that can be computed using the $\mathrm{softmax}$ function \cite{boyd2004convex}, that is: \begin{align*} {b}_k = \frac{\exp({s}_k)}{\sum_{k'} \exp({s}_{k'})}. \end{align*} Therefore, we replace the non-differentiable $\onehotargmax$ operation in Algorithm~\ref{alg:forward} with a softmax in order to build a smooth and fully differentiable surrogate of the parsing algorithm.s \section{Controlled Experiment} \label{sec:exp:listops} We first experiment on a toy task. The task is designed in such a way that there exists a simple projective dependency grammar which turns it into a trivial problem. We can therefore perform thorough analysis of the latent tree induction method. \subsection{Dataset and Task} The ListOps dataset \cite{nangia2018listops} has been built specifically to test structured latent variable models. The task is to compute the result of a mathematical expression written in prefix notation. It has been shown easy for a Tree-LSTM that follows the gold underlying structure but most latent variable models fail to induce it. Unfortunately, the task is not compatible with our neural network because it requires propagation of information from the leafs to the root node, which is not possible for a GCN with a fixed number of layers. Instead, we transform the computation problem into a tagging problem: the task is to tag the valency of operations, i.e.\ the number of operands they have. We transform the original unlabelled binary phrase-structure into a dependency structure by following a simple head-percolation table: the head of a phrase is always the head of its left argument. The resulting dependencies represent two kinds of relation: operand to argument and operand to closing parenthesis (Figure~\ref{fig:listops}). Therefore, this task is trivial for a GCN trained with gold dependencies: it simply needs to count the number of outgoing arcs minus one (for operation nodes). In practice, we observe 100\% tagging accuracy with the gold dependencies. \subsection{Neural Parametrization} We build a simple network where a BiLSTM is followed by deep dotted attention which computes the dependency weights (see Equation~\ref{eq:parse-pred}). In these experiments, unlike Section~\ref{sect:real-experiments}, GCN does not have access to input tokens (or corresponding BiLSTM states): it is fed `unlexicalized' embeddings (i.e.\ the same vector is used as input for every token).% \footnote{% To put it clearly, we have two sets of learned embeddings: a set of lexicalized embeddings used for the input of the BiLSTM and a single unlexicalized embedding used for the input of the GCN. } Therefore, the GCN is forced to rely on tree information alone (see App.~\ref{app:listops} for hyperparameters). There are several ways to train the neural network. First, we test the impact of MC estimation at training. Second, we choose when to use the continuous relaxation. One option is to use a {\it Straight-Through} estimator \cite[ST, ][]{bengio2013estimating,jang2017categorical}: during the forward pass, we use a discrete structure as input of the GCN, but during the backward pass we use the differentiable surrogate to compute the partial derivatives. Another option is to use the differentiable surrogate for both passes ({\it Forward relaxed}). As our goal here is to study induced discrete structures, we do not use relaxations at test time. We compare our model with the non-stochastic version, i.e.\ we set ${\bm{G}} = 0$. \subsection{Results} The attachment scores and the tagging accuracy are provided in Table~\ref{tab:listops}. We draw two conclusions from these results. First, using the ST estimator hurts performance, even though we do not relax at test time. Second, the MC approximations, unlike the non-stochastic model, produces latent structures almost identical to gold trees. The non-stochastic version is however relatively successful in terms of tagging accuracy: we hypothesize that the LSTM model solved the problem and uses trees as messages to communicate solutions. See extra analysis in App.~\ref{app:listops:training}.% \footnote{ This results are not cherry-picked to favor the MC model. We observed a deviation of $\pm0.54\%$ in attachment score for the non-stochastic model, whereas, for MC sampling, all except one achieved an attachment score above $99.7$ (out of 5 runs). } \begin{figure}[t] \centering \input{fig/listops.tex} \caption{ An example from the ListOps dataset. Numbers below operation tokens are valencies. {\bfseries (top)} the original unlabelled phrase-structure. {\bfseries (bottom)} our dependency conversion: each dependency represents either an operand to argument relation or a closing parenthesis relation. } \label{fig:listops} \end{figure} \begin{table}[t] \centering \input{tables/listops.tex} \caption{ ListOps results: tagging accuracy (Acc.) and attachment score for the latent tree grammar (Att.). } \label{tab:listops} \end{table} \begin{table}[t] \centering \input{tables/nli.tex} \caption{ SNLI results and number of network parameters (discarding word embeddings). Stars indicate latent tree models. } \label{tab:snli:results} \end{table} \begin{table*}[] \centering \subfloat[]{ \input{tables/sst.tex} \label{tab:sst:results} } \subfloat[]{ \input{tables/multinli.tex} \label{tab:multinli:results} } \subfloat[]{ \input{tables/multinli_ablation.tex} \label{tab:ablation} } \caption{ {\bfseries \protect\subref{tab:sst:results}} SST results. Stars indicate latent tree models. {\bfseries \protect\subref{tab:multinli:results}} MultiNLI results. Stars indicate latent tree models. {\bfseries \protect\subref{tab:ablation}} Ablation tests on MultiNLI (results on the matched and mismatched development sets). } \end{table*} \section{Real-world Experiments} \label{sect:real-experiments} We evaluate our method on two real-world problems: a sentence comparison task (natural language inference, see Section~\ref{sec:nli}) and a sentence classification problem (sentiment classification, see Section~\ref{sec:st}). Besides using the differentiable dynamic programming method, our approach also differs from previous work in that we use GCNs followed by a pooling operation, whereas most previous work used Tree-LSTMs. Unlike Tree-LSTMs, GCNs are trivial to parallelize over batches on GPU.% \subsection{Natural Language Inference} \label{sec:nli} The Natural Language Inference (NLI) problem is a task developed to test sentence understanding capacity. Given a premise sentence and a hypothesis sentence, the goal is to predict a relation between them: entailment, neutral or contradiction. We evaluate on the Stanford NLI (SNLI) and the Multi-genre NLI (MultiNLI) datasets. Our network is based on the decomposable attention (DA) model of \citet{parikh2016decomposable}. We induce structure of both the premise and the hypothesis (see Equation~\ref{eq:parse-pred} and Figure~\ref{fig:network:snli}). Then, we run a GCN over the tree structures followed by inter-sentence attention. Finally, we apply max-pooling for each sentence and feed both sentence embeddings into a MLP to predict the label. Intuitively, using GCNs yields a form of intra-attention. See the hyper-parameters in Appendix~\ref{app:nn:nli}. \textbf{SNLI:} The dataset contains almost 0.5m training instances extracted from image captions \cite{bowman2015snli}. We report results in Table~\ref{tab:snli:results}. Our model outperforms both no intra-attention and simple intra-attention baselines\footnote{The attention weights are computed in the same way as scores for tree prediction, i.e. using Equation~\ref{eq:parse-pred}.} with 1 layer of GCN ($+0.8$) or two layers ($+1.8$). The improvements with using multiple GCN hops, here and on MultiNLI (Table~\ref{tab:multinli:results}), suggest that higher-order information is beneficial.% \footnote{ In contrast, multiple hops relying on edge marginals was not beneficial~\cite{liu2018structuredatt}, personal communication. } It is hard to compare different tree induction methods as they build on top of different baselines, however, it is clear that our model delivers results comparable with most accurate tree induction methods \cite{kim2017structuredatt,liu2018structuredatt}. The improvements from using latent structure exceed these reported in previous work. \textbf{MultiNLI:} MultiNLI is a broad-coverage NLI corpus \citet{williams2018multinli}: the sentence pairs originate from 5 different genres of written and spoken English. This dataset is particularly interesting because sentences are longer than in SNLI, making it more challenging for baseline models.% \footnote{ The average sentence length in SNLI (resp. MultiNLI) is $11.16$ (resp. $16.79$). There is $21\%$ (resp. $42\%$) of sentence longer than 15 words in SNLI (resp. MultiNLI). } We follow the evaluation setting in \citet{williams2018multinli,williams2018latent}: we include the SNLI training data, use the matched development set for early stopping and evaluate on the matched test set. We use the same network and parameters as for SNLI. We report results in Table~\ref{tab:multinli:results}. The DA baseline (`No Intra Attention') performs slightly better ($+0.6\%$) than the original BiLSTM baseline. Our latent tree model significantly improves over our the baseline, either with a single layer GCN ($+3.4$\%) or with a 2-layer GCN ($+4.9\%$). We observe a larger gap than on SNLI, which is expected given that MultiNLI is more complex. We perform extra ablation tests on MultiNLI in Section~\ref{sec:analysis}. \begin{figure*} \vspace{-1ex} \centering \includegraphics{fig/sample1_opt.pdf} \begin{minipage}[b]{0.4\textwidth} \includegraphics{fig/sample2_opt.pdf} \end{minipage}% \begin{minipage}[b]{0.6\textwidth} \includegraphics{fig/sample3_opt.pdf} \vspace{-1ex} \end{minipage} \caption{ Examples of trees induced on the matched development set of MultiNLI, the model using 2 GCN layers. } \label{tab:examples} \end{figure*} \subsection{Sentiment Classification} \label{sec:st} We experiment on the Stanford Sentiment Classification dataset \cite{socher2013sst}. The original dataset contains predicted constituency structure with manual sentiment labeling for each phrase. By definition, latent tree models cannot use the internal phrase annotation. We follow the setting of \citet{niculae2018dyncg} and compare to them in two set-ups: (1) with syntactic dependency trees predicted by CoreNLP \cite{manning2014corenlp}; (2) with latent dependency trees. Results are reported in Table~\ref{tab:sst:results}. First, we observe that the bag of bigrams baseline of \citet{socher2013sst} achieves results comparable to all structured models. This suggest that the dataset may not be well suited for evaluating structure induction methods. Our latent dependency model slighty improves ($+0.8$) over the CoreNLP baseline. However, we observe that while our baseline is better than the one of \citet{niculae2018dyncg}, their latent tree model slightly outperforms ours ($+0.1$). We hypothesize that graph convolutions may not be optimal for this task. \subsection{Analysis} \label{sec:analysis} \textbf{(Ablations)} In order to test if the tree constraint is important, we do ablations on MultiNLI with two models: one with a latent projective tree variable (i.e. our full model) and one with a latent head selection model that does not impose any constraints on the structure. The estimation approach and the model are identical, except for the lack of the tree constraint (and hence dynamic programming) in the ablated model. We report results on development sets in Table~\ref{tab:ablation}. We observe that the latent tree models outperform the alternatives. Previous work \cite[e.g.,][]{niculae2018dyncg} included comparison with balanced trees, flat trees and left-to-right (or right-to-left) chains. Flat trees are pointless with the GCN + DA combination: the corresponding pooling operation is already done in DA. Though balanced trees are natural with bottom-up computation of TreeLSTMs, for GCNs they would result in embedding essentially random subsets of words. Consequently, we compare only to left-to-right chains of dependencies.\footnote{They are the same as right-to-left ones, as our GCNs treat both directions equivalently.} This approach is substantially less accurate than our methods, especially for out-of-domain (i.e. mismatched) data. \noindent \textbf{(Grammar)} We also investigate the structure of the induced grammar. We report the latent structure of three sentences in Figure~\ref{tab:examples}. We observe that sentences are divided into spans, where each span is represented with a series of left dependencies. Surprisingly, the model chooses to use only left-to-right dependencies. The neural network does not include a RNN layer, so this may suggest that the grammar is trying to reproduce an recurrent model while also segmenting the sentence in phrases. \noindent \textbf{(Speed)} We use a $\mathcal{O}(n^3)$-time parsing algorithm. Nevertheless, our model is efficient: one epoch on SNLI takes 470 seconds, only 140 seconds longer than with the $\mathcal{O}(n^2)$-time latent-head version of our model (roughly equivalent to classic self-attention). The latter model is computed on GPU (Titan X) while ours uses CPU (Xeon E5-2620) for the dynamic program and GPU for running the rest of the network. \section{Related work} Recently, there has been growing interest in providing an inductive bias in neural network by forcing layers to represent tree structures \cite{kim2017structuredatt,maillard2017jointly,choi2018gumbeltree,niculae2018dyncg,williams2018latent,liu2018structuredatt}. \citet{maillard2017jointly} also operates on a chart but, rather than modeling discrete trees, uses a soft-gating approach to mix representations of constituents in each given cell. While these models showed consistent improvement over comparable baselines, they do not seem to explicitly capture syntactic or semantic structures \cite{williams2018latent}. \citet{nangia2018listops} introduced the ListOps task where the latent structure is essential to predict correctly the downstream prediction. Surprisingly, the models of \citet{williams2018latent} and \citet{choi2018gumbeltree} failed. Much recent work in this context relies on latent variables, though we are not aware of any work closely related to ours. Differentiable structured layers in neural networks have been explored for semi-supervised parsing, for example by learning an auxiliary task on unlabelled data \cite{head2018sigpot} or using a variational autoencoder~\cite{corro2018differentiable}. Besides research focused on inducing task-specific structures, another line of work, grammar induction, focused on unsupervised induction of linguistic structures. These methods typically rely on unlabeled texts and are evaluated by comparing the induced structures to actual syntactic annotation \cite{klein2005unsupervised,shen2017jointsyntlex,htut2018replication}. \section{Conclusions} We introduced a novel approach to latent tree learning: a relaxed version of stochastic differentiable dynamic programming which allows for efficient sampling of projective dependency trees and enables end-to-end differentiation. We demonstrate effectiveness of our approach on both synthetic and real tasks. The analyses confirm importance of the tree constraint. Future work will investigate constituency structures and new neural architectures for latent structure incorporation. \section*{Acknowledgments} We thank Maximin Coavoux and Serhii Havrylov for their comments and suggestions. We are grateful to Vlad Niculae for the help with pre-processing the SST data. We also thank the anonymous reviewers for their comments. The project was supported by the Dutch National Science Foundation (NWO VIDI 639.022.518) and European Research Council (ERC Starting Grant BroadSem 678254).
\section{Introduction} The no hair theorem states that black holes are characterized by only their mass, charge and angular momentum, implying that externally the black hole behaves as a point particle. For a long time this point of view has been utilized to derive the spin-independent part of the two-body classical potential for inspiralling black holes~\cite{Donoghue:1993eb,% Donoghue:1994dn,Donoghue:1996mt,% Donoghue:2001qc,BjerrumBohr:2002ks,BjerrumBohr:2002kt,Holstein:2004dn}, from the scattering amplitudes of gravitationally coupled scalars. (See \cite{Cheung:2018wkq, Bern:2019nnu, Foffa:2019yfl, Cristofoli:2019neg} for some recent results, and \cite{Maybee:2019jus} for a more comprehensive review.) Of course {\it any} massive object with spin, viewed from sufficiently long distances, can be effectively treated as a point particle. From the perspective of on-shell scattering amplitudes, the most important first issue is to determine the three-particle amplitude, coupling the massive particles to gravitons, and if it is charged, to photons. A convenient on-shell formalism for describing scattering amplitudes for general mass and spin in four dimensions has recently been given in ~\cite{Arkani-Hamed:2017jhn}. In particular the formalism provides a convenient basis for the cubic couplings of massive spin-$S$ particles with a graviton or photon. While for all massless particles of given helicities, three-particle amplitudes are fixed (up to overall strength) by Poincar\'e symmetry, for massive particles of spin $S$ coupled to gravitons or photons, there are $(2S+1)$ different allowed structures, reflecting all the allowed multipole moments of the particle. Returning to the Kerr black hole, this three-particle amplitude coupling to a graviton should be completely prescribed, and is clearly expected to be ``special'' in some way, so the natural question is: what three-particle amplitude is dictated by the no-hair theorem? From a completely different motivation, ~\cite{Arkani-Hamed:2017jhn} defined a special three-particle amplitude for massive particles of spin $S$ coupled to gravitons and photons, naturally associated ``on-shell'' with a notion of ``minimal coupling'', given by \begin{equation}\label{Minimal} \vcenter{\hbox{\includegraphics[scale=0.35]{3pta}}}\quad= g(xm)^h \frac{\langle \mathbf{1}\mathbf{2}\rangle^{2S}}{m^{2S}} \end{equation} where $h=(1,2)$ and $g=(\frac{\kappa}{2}, \sqrt{2}e)$, for positive photons and gravitons respectively. This coupling was singled out by matching to the (standard, leading) coupling for massless spin $S$ particles in the high energy limit. Indeed for low spins, this coupling reproduces all the classical electric and magnetic moments. We therefore have a three-particle amplitude picked out as being special purely from the on-shell perspective, making the massive particle look as ``elementary'' as possible to the graviton/photon probe by correctly matching the high-energy limit. Meanwhile, we also know that the Kerr black hole must make a very special choice for the three-particle amplitude as well. Remarkably, the minimally coupled amplitudes are indeed precisely the ones enjoyed by Kerr black holes. Following the work of Guevara ~\cite{Guevara:2017csg}, it was shown in \cite{Guevara:2018wpp} and \cite{BH} that the potential for Kerr black holes was indeed reproduced relativistically to all orders in the multipole expansion from minimal coupling. These results establish the equivalence of the minimal coupling in eq.(\ref{Minimal}) and Kerr black holes in the context of classical observables, but {\it why} did this happen? In this note we would like to give a more fundamental understanding of why minimally coupled higher-spin particles at large spin correspond to Kerr black holes. We will do this by relating minimal coupling to some classic features of the Kerr solution. Not long after Kerr wrote down the solution for spinning black holes~\cite{Kerr:1963ud}, Newman and Janis observed that one can ``rederive" the Kerr metric by complexifying the Schwarzschild solution in null polar coordinates and performing a shift~\cite{Newman:1965tw}. The construction was later extended to a derivation of the Kerr-Newman solution from Reissner-Nordstrom~\cite{Adamo:2014baa}. For other solutions derived in a similar fashion, see~\cite{Burinskii:1974zz}. The methods of amplitudes allow us to understand the origin of the complex shift. We will demonstrate that the shift is a consequence of the spin effects generated when one goes from a minimally coupled scalar to a spinning particle. In particular starting with a spin-$S$ particle and taking the classical limit, $S\rightarrow \infty, \hbar \rightarrow 0$ while keeping $\hbar S$ fixed, the minimal coupling exponentiates~\cite{Guevara:2018wpp}. This exponent can be identified as $\frac{q\cdot s}{m}$, where $s^\mu$ is the Pauli-Lubanski pseudovector, $q^\mu$ the massless momentum and $m$ the mass. When applied to the computation of classical observables, such as the change in momentum a probe experiences in a gravitational or electromagnetic field, this exponentiation precisely induces the relevant shift, after Fourier transforming to position space. In other words, the exponentiation incurred going from minimally-coupled scalars to spinning particles, is the momentum space image of the complex shift that relates the Schwarzschild to the Kerr solution. This sharpens the equivalence between black holes and particles. This connection also provides an on-shell realization of the double copy relation for classical solutions. In an earlier work by one of the authors~\cite{Monteiro:2014cda}, it was shown that stationary Kerr-Schild metrics admit a double copy construction. In particular the double and single copy solutions take the form: \begin{equation} g_{\mu\nu}=g^{0}_{\mu\nu}+k_\mu k_\nu \phi(r),\quad A^{\mu a}= c^a k^\mu \phi(r)\,, \end{equation} where $\phi(r)$ is the universal part for the gravity/gauge theory solution and $k_\mu$ a null $(r,\theta)$-dependent vector. Passing from the $\phi(r)$ for Schwarzschild to Kerr, one simply takes a complex shift. On the other hand, as discussed previously, the difference between the three-point amplitude for gravitational and electromagnetic minimal coupling is simply the squaring of the $x$ factor, whilst the spin-dependent part is untouched. The later corresponds to the shifted $\phi(r)$, while the squaring can be identified with the squaring of $k_\nu$. To illustrate this, we compute the impulse for $\sqrt{\rm Kerr}$ and match it to that from the minimally coupled charged spinning particle. One then obtains the gravitational counterpart by squaring all $x$-factors, which simply translate to a factor of two in rapidity. Remarkably this simple factor of two converts the electromagnetic impulse to the gravitational version. \section{Complexifying Schwarzschild and the double copy} An early example of the utility of complexified space-time was the derivation of the Kerr metric from a complex coordinate transformation of the Schwarzschild metric~\cite{Newman:1965tw}. We will make use of the metric in Kerr-Schild form: \begin{equation} g_{\mu\nu}=g^{0}_{\mu\nu}+k_\mu k_\nu \phi \,, \end{equation} where $g^{0}_{\mu\nu}$ is the flat Minkowski metric, and the vector $k_\mu$ is null with respect to both $g^{\mu\nu}$ and $g^{0,\mu\nu}$. In particular, the Schwarzschild solution takes the form \begin{equation} {\rm Schwarzschild}:\quad \phi_{\rm Sch}(r)=\frac{r_0}{r},\quad k^\mu \partial_\mu=\frac{\partial}{\partial t} -\frac{\partial}{\partial r} \end{equation} where $r_0 = 2GM$. For the Kerr solution, one instead has \begin{equation} {\rm Kerr}:\quad \phi_{\rm Kerr}(r)=\frac{r_0r}{r^2+a^2\cos^2\theta},\quad k^\mu\partial_\mu=\frac{\partial}{\partial t} -\frac{\partial}{\partial r} \,. \end{equation} Unlike the Schwarzschild case, for Kerr $(r,\theta)$ are not the usual polar coordinates but are defined by: \begin{eqnarray} x&{=}&(r\sin\phi{+}a\cos\phi)\sin\theta, \;y{=}(a\sin\phi{-}r\cos\phi)\sin\theta\nonumber\\ z&{=}&r\cos\theta\,. \end{eqnarray} In particular, in the Kerr case $r$ is the solution to the equation \[ \frac{x^2+y^2}{r^2 + a^2} + \frac{z^2}{r^2} = 1 \,. \label{eq:spheroids} \] It is remarkable that $\phi_{\rm Kerr}$ can be obtained from $\phi_{\rm Sch}$ by a complex shift, which is as simple as $z \rightarrow z + ia$. To see how this connects the Schwarzschild to the Kerr solution, note that the quantity $r^2 = x^2 + y^2 + z^2$ shifts to $x^2 + y^2 + z^2 - a^2 + 2 i a z = r^2 - a^2 \cos^2 \theta + 2 i a r \cos \theta = (r+ia \cos \theta)^2$, where now $r$ is the solution to equation~\eqref{eq:spheroids}. In short, the replacement $z \rightarrow z + ia$ is equivalent to the replacement $r \rightarrow r + i a \cos \theta$. The action on $\phi(r)$ is \begin{eqnarray} \left.\phi_{\rm Sch}(r)\right|_{r\rightarrow r+ia \cos\theta}=\left.\frac{r_0}{2}\left(\frac{1}{r}+\frac{1}{\bar{r}}\right)\right|_{r\rightarrow r+ia \cos\theta}\nonumber\\ =\frac{r_0r }{r^2+a^2\cos^2\theta}=\phi_{\rm Kerr}(r)\,. \end{eqnarray} Indeed it is straightforward to show that the Riemann tensors of the two solution are related via this complex shift~\cite{Newman:1965tw}. We are unaware of any classical understanding of why this remarkably simple procedure should work; however, we will see that it follows directly from the nature of observables computed from on-shell amplitudes. The Kerr-Schild form of the metric is particularly convenient for revealing double copy relations between classical solutions of the Yang-Mills and Einstein equations. It was previously shown~\cite{Monteiro:2014cda} that for every stationary Kerr-Schild solution to the Einstein equations, i.e. $\partial_0 \phi=\partial_0 k_\mu=0$, one finds a solution to the Yang-Mills equation with \begin{equation} A^{\mu a}= c^a k^\mu \phi(r)\,. \end{equation} For example consider the Schwarzschild case $\phi(r)=\frac{r_0}{r}$. Using the replacement $r_0\rightarrow g c_aT^a$, one finds the static Coulomb potential after a suitable gauge transformation. On the other hand, beginning with the Coulomb charge but performing a complex coordinate shift, one finds the electromagnetic field of a rotating disc with radius $a$~\cite{Monteiro:2014cda}. This Yang-Mills solution is the ``square root" of the Kerr solution, and therefore we call it $\sqrt{\rm Kerr}$. In fact, $\sqrt{\textrm{Kerr}}$ was discussed by Newman and Janis~\cite{Newman:1965tw} as a complex deformation of Coulomb, and also more recently by Lynden-Bell~\cite{LyndenBell:2002dr}. It correspond to the EM field of Kerr-Newman where both $M$ and $S$ are sent to zero while holding $a$ fixed. In the following we will compute the impulse probe particles incur in this background and relate the results to Kerr. \section{From $\sqrt{\rm Kerr}$ to spinning particles} We first study the equivalence between the electromagnetic field of the $\sqrt{\rm Kerr}$ solution with the minimally coupled spinning particle, in the infinite spin limit, by computing the impulse induced on a charged particle. In the process we will identify the Kerr parameter $a$ with $\frac{s}{m}$, where $s$ and $m$ are the absolute value of the spin-vector and mass of the particle, respectively. \subsection{Impulse from $\sqrt{\rm Kerr}$ } Performing the complex shift $z\rightarrow z+ia$ on the Coloumb electric field $E_c$, we obtain a complex quantity, $E_c\rightarrow \mathcal{E}$. The interpretation is simple: $\Re \mathcal{E}$ is the electric field of $\sqrt{\textrm{Kerr}}$, while $\Im \mathcal{E}$ is the magnetic field. Covariantly, the complex shift induces a complex field strength $F^{\mu\nu}$. The Lorentz force on a particle with mass $m$, momentum $p^\mu$ and proper velocity $u^\mu$ moving under the influence of the $\sqrt{\textrm{Kerr}}$ fields is \begin{equation} \frac{dp^\mu}{d\tau} = e \Re \mathcal{F}^{\mu\nu} u_\nu \,, \label{eq:niceLorentz} \end{equation} where $\mathcal{F}^{\mu\nu}=F^{\mu\nu}+i \epsilon^{\mu\nu\rho\sigma}F_{\rho\sigma}/2$. In electrodynamics, the field strength is gauge invariant and observable. However this fact already fails for Yang-Mills theories, and therefore it is desirable to understand these classical solutions from a different, more gauge invariant point of view. To that end we consider the impulse, that is the total change of momentum, from past infinity to future infinity, of a light particle (particle 1) moving in the (very heavy) $\sqrt{\textrm{Kerr}}$ background. The impulse on the particle is computed via: \begin{equation} \Delta p_1^\mu=e_1 {\rm Re} \int^{\infty}_{-\infty}d\tau\;\; \mathcal{F}^{\mu\nu}(x_1) u_{1\nu}\,. \end{equation} This impulse can be computed perturbatively by iterating the Lorentz force. At leading order, the trajectory of particle 1 is simply a straight line, which is also the all-order trajectory of the source---which we take to be particle 2. Thus for both particles we have $x_i(\tau)=b_i+u_i\tau$, where $u_i$ is the proper velocity; while $b_1$ is real and $b_2$ is complex, reflecting the $\sqrt{\rm Kerr}$ nature of particle 2. Without loss of generality we set $b_1=0$, and $b_2={-}b {-} i a$ so that $b_1 {-} b_2 = b {+} i a$. It is convenient to work in Fourier space, with the field strength due to the source written as \begin{align} \mathcal{F}_2^{\mu\nu}(x_1) = \int \! \hat d^4 \bar q \, \mathcal{F}_2^{\mu\nu}(\bar q) \, e^{-i \bar q \cdot x_1}. \end{align} Our notation is that $\bar q$ is a wavenumber (momentum transfer $q$ with a $\hbar$ scaled out), $\hat d \bar q \equiv d \bar q / (2\pi)$ and $\hat \delta(x) = (2\pi) \delta(x)$. One then has: \begin{align} \Delta &p_1^\mu = e_1 \Re\int \! \hat d^4 \bar q \, \mathcal{F}_2^{\mu\nu}(\bar q) u_{1\nu} \, \hat \delta(\bar q \cdot u_1) \nonumber\\ =& e_1 \Re\int \! \hat d^4 \bar q \left( F_2^{\mu\nu}(\bar q) {+} \frac{i}2 \epsilon^{\mu\nu\alpha\beta} F_{2 \alpha\beta}(\bar q) \right) u_{1\nu}\hat \delta(\bar q \cdot u_1). \end{align} We need an expression for the field strength $F$ in Fourier space. Using the Maxwell equation \begin{align} \partial^2 A_2^\mu(x) = e_2 \int d\tau u_2^\mu \delta^4 (x-x_2(\tau)) \,, \end{align} it's easy to see that, to all orders for static $\sqrt{\textrm{Kerr}}$ \!, \begin{align} F_2^{\mu\nu}(\bar q) = i e_2 \, e^{-i \bar q \cdot {(b+ia)}} \hat \delta(\bar q \cdot u_2) \frac{1}{\bar q^2} (\bar q^\mu u_2^\nu - \bar q^\nu u_2^\mu). \end{align} With this information, we obtain our final expression for the impulse in momentum space: \begin{align}\label{eq:FTimpulse} \Delta p_1^\mu =& e_1 e_2 \Re \int \! \hat d^4 \bar q \, \hat \delta(\bar q \cdot u_1) \hat \delta(\bar q \cdot u_2)\frac{e^{-i \bar q \cdot {(b+ia)}}}{\bar q^2} \left( i \bar q^\mu u_1 \cdot u_2 \right.\nonumber\\ &\left.{+}\epsilon^{\mu\nu\alpha\beta} \bar q_\nu u_{1\alpha} u_{2\beta} \right). \end{align} Note that the presence of the Levi-Civita tensor is a reflection of the complexification of the field strength. We will now reproduce the above result from the scattering amplitude involving minimally coupled spinning particles. \subsection{Impulse from $x$} The impulse for scalar particles was computed from amplitudes in~\cite{Kosower:2018adc} via: \begin{align}\label{eq:impulseGeneral} \Delta p_1^\mu =\frac{1}{ 4m_1m_2} \int \hat d^4 &\bar q\;\hat \delta(\bar q\cdot u_1)\hat \delta(\bar q\cdot u_2)e^{{-}i\bar q\cdot b} \times \nonumber \\ &i\bar q^\mu \, \hbar^3 M_4\left(1,2\rightarrow 1',2'\right)|_{\bar q^2\rightarrow 0} \, \end{align} where $M_4$ correspond to a four point amplitude exchanging gravitons or a photons with momentum transfer $q$. As we will see using this prescription we indeed reproduce the correct impulse for the $\sqrt{\rm{Kerr}}$ electromagnetic field in eq.(\ref{eq:FTimpulse}), by the scattering of a scalar particle 1 with the minimally coupled spin-$S$ particle 2, illustrated in fig.\ref{fig1}. \begin{figure} \begin{center} \includegraphics[scale=0.5]{3pt} \caption{The exchange of a photon between a spin-$S$ and a scalar particle. } \label{fig1} \end{center} \end{figure} When dressed with the external polarization tensors, the three-point, minimally-coupled amplitude is given as~\cite{Arkani-Hamed:2017jhn} \begin{equation} h={+}1:\;\; \sqrt{2} ie_2x\frac{\langle \mathbf{2}\mathbf{2}'\rangle^{2S}}{m^{2S{-}1}},\quad h={-}1:\;\; \sqrt{2} ie_2\frac{1}{x}\frac{[\mathbf{2}\mathbf{2}']^{2S}}{m^{2S{-}1}} \,. \end{equation} Since $q$ is small, the spinor $|\mathbf{2}'\rangle$ is only a small boost of the spinor $| \mathbf{2} \rangle$. We may therefore write \[ | \mathbf{2}' \rangle = |\mathbf{2} \rangle + \frac{1}{8} \omega_{\mu\nu} (\sigma^\mu \bar \sigma^\nu - \sigma^\nu \bar \sigma^\mu) |\mathbf{2} \rangle \,, \] where the boost parameters $\omega_{\mu\nu}$ are small. It is easy to compute these boost parameters because \[ p_2'^\mu = (\delta^\mu_\nu + \omega^\mu{}_\nu) p_2^\nu \implies \omega_{\mu\nu} = - \frac{1}{m_2^2} (p_{2\mu} q_\nu - p_{2\nu} q_\mu) \,, \] taking account of the on-shell relation $2p_2\cdot q = q^2 \simeq 0$. We therefore learn that \[ | \mathbf{2}' \rangle = |\mathbf{2} \rangle + \frac1{2m_2} \slashed{q} |\mathbf{2} ]. \] Thus, we have, \[ \frac{1}{m_2} \langle \mathbf{2} \mathbf{2}' \rangle = \mathbb{I} + \frac1{2m_2^2} \hbar \langle \mathbf{2} | \slashed{\bar q} |\mathbf{2} ] =\mathbb{I} + \frac{1}{2S m_2} \bar q \cdot s \, , \] where $s^\mu$ is the Pauli-Lubanski pseudovector associated with a spin $S$ particle: \[ s^\mu = \frac{1}{m_2} S \hbar \langle \mathbf{2} | \sigma^\mu | \mathbf{2}] \,. \] The operators $\mathbb{I}$ and $s^\mu$ are now operators acting on the little group space of particle $2$. In the end, all little group indices will be contracted with appropriate wave functions. We now take the limit $S \rightarrow \infty$ and $\hbar \rightarrow 0$ with $S\hbar$ fixed. The amplitudes become \begin{align} h={\pm}1:&\;\; \lim_{S\to \infty} {i}{e_2}{\sqrt{2}}m\,x^{{\pm}1} \left(\mathbb{I}{\pm} \frac{\bar q \cdot s}{2Sm} \right)^{2S} = {i}{e_2}{\sqrt{2}}m x^{{\pm}1} e^{{\pm}\bar q \cdot a} \label{eq:RootKerrAmplitude} \end{align} where the quantity $a = \frac{s}{m}$ parameterises the spin, but has dimensions of length. Now let's consider the classical limit of the four point amplitude between a charged particle of spin $S$, with $S \rightarrow \infty$, and a scalar particle: \[\label{Factor} M_4\left(1,2{\rightarrow} 1',2'\right)|_{\footnotesize q^2{\rightarrow} 0} =2\frac{e_1e_2 {m_1 m_2}}{2\bar q^2}\left(\frac{x_{11'}}{x_{22'}}e^{{-}\bar q\cdot {a}}{+}\frac{x_{22'}}{x_{11'}}e^{\bar q\cdot {a}}\right) \] Note that it is given by two terms with different helicity configurations. We will see that these terms have a crucial role, allowing us to understand the emergence of the real-part operation in the impulse. The $x$ ratios are little group invariant, and can be shown to be given by: \begin{align} \frac{x_{11'}}{x_{22'}}= e^w, \quad\frac{x_{22'}}{x_{11'}}= e^{-w}\,, \end{align} where $w$ is the rapidity. Thus we have, \begin{eqnarray} M_4\left(1,2{\rightarrow} 1',2'\right)|_{q^2\rightarrow 0}={2}\frac{e_1e_2 {m_1 m_2}}{\hbar^3 \bar q^2}\left(e^w e^{{-}\bar q\cdot {a}}{+}e^{{-}w} e^{\bar q\cdot {a}}\right)\nonumber\\ \end{eqnarray} We now proceed to compute the impulse by inserting this four-point amplitude into the general expression~eq.(\ref{eq:impulseGeneral}): \begin{align}\label{Rapid} \Delta p_1^\mu &=i \frac{e_1 e_2}{2}\int \! \hat d^4\bar q\; \hat \delta(\bar q\cdot u_1)\hat \delta(\bar q\cdot u_2)e^{{-}i\bar q\cdot b} \frac{\bar q^\mu }{\bar q^2}\nonumber\\ &\quad\quad \sum_{\alpha=\pm}e^{\alpha(w{-}\bar q\cdot{a})}\,. \end{align} To proceed, it's helpful to rewrite the impulse as \begin{align} \Delta p_1^\mu &=i \frac{e_1 e_2}{2}\int \! \hat{d}^4\bar q\; \hat{\delta}(\bar q\cdot u_1)\hat{\delta}(\bar q\cdot u_2)e^{{-}i\bar q\cdot b} \frac{\bar q^\mu }{\bar q^2} \nonumber\\ &\left((\cosh w{+}\sinh w) e^{{-}\bar q\cdot\Pi {a}}{+}(\cosh w{-}\sinh w) e^{\bar q\cdot{a}}\right) \end{align} Note that on the support of $ \hat{\delta}(\bar q\cdot u_1)\hat{\delta}(\bar q\cdot u_2)$, the Gram determinant constraint takes the form \begin{align} \epsilon(u_1, u_2, a, \bar q)^2 =-\sinh^2w (a \cdot \bar q)^2 + \mathcal{O}(\bar q^2). \end{align} We may neglect any terms of order $\bar q^2$, because in the Fourier integral such terms lead to a delta function in impact parameter space. Furthermore, using a ``Schouten'' identity we have \begin{align} \bar q_\mu \epsilon(u_1, u_2, a, \bar q) = (a \cdot \bar q)\epsilon_{\mu \nu \alpha \beta} \bar q^\nu u_1^\alpha u_2^\beta \, . \end{align} where $u_1 \cdot \bar q$, $u_2 \cdot \bar q$, $\bar q^2$ are all set to zero. Thus we can identify: \begin{align} \sinh w\, \bar q_\mu = i\epsilon(u_1, u_2, a, \bar q) \frac{1}{a\cdot \bar q} \bar q_\mu = i\epsilon_{\mu\nu\alpha\beta} \bar q^\nu u_1^\alpha u_2^\beta \end{align} With this result, the impulse is then: \begin{align}\label{Impulse1} \Delta p_1^\mu &=\frac{e_1 e_2}{2}\int \! \hat{d}^4\bar q\; \hat{\delta}(\bar q\cdot u_1)\hat{\delta}(\bar q\cdot u_2)\frac{i}{\bar q^2} \nonumber\\ &\left[(\bar q^\mu\cosh w{+}i\epsilon^{\mu\nu\alpha\beta} \bar q_\nu u_{1\alpha} u_{2\beta}) e^{-i\bar q\cdot( b{-}i {a})}\right.\nonumber\\ &\left.{+}(\bar q^\mu\cosh w{-}i\epsilon^{\mu\nu\alpha\beta} \bar q_\nu u_{1\alpha} u_{2\beta}) e^{-i\bar q\cdot( b{+}i {a})}\right]\nonumber\\ &= e_1 e_2\Re\int \! \hat{d}^4\bar q\; \hat{\delta}(\bar q\cdot u_1)\hat{\delta}(\bar q\cdot u_2)\frac{i}{\bar q^2} \nonumber\\ &\left[(\bar q^\mu\cosh w{-}i\epsilon^{\mu\nu\alpha\beta} \bar q_\nu u_{1\alpha} u_{2\beta}) e^{-i\bar q\cdot( b+i {a})}\right] \,. \end{align} As one can see we have recovered eq.(\ref{eq:FTimpulse}): importantly, we identify the shift in Kerr solution explicitly with the exponentiation of $\frac{s}{m}$ for spinning particles in the large spin limit! Evidently the shift $b \rightarrow b + ia$ arises because of the exponential structure of minimally coupled amplitudes, and the Fourier factor $e^{i \bar q \cdot b}$ in expressions for observables in terms of amplitudes. \subsection{Impulse for Kerr black hole } The leading order impulse for a spinning black hole was derived to all orders in spin by Vines~\cite{Vines:2017hyw}. In impact parameter space it takes the form: \begin{align}\label{GraviImpulse} \Delta p_1^\mu &=-2G m_1 m_2 \Re \left[(\cosh 2w\, \eta_{\mu\nu}{+}2 i \cosh w\, \epsilon_{\mu\nu\rho\sigma}u_1^\rho u_2^\sigma)\right.\nonumber\\ &\quad\quad\left.\frac{(b+i\Pi a)^\nu}{\sinh w(b+i\Pi a)^2}\right] \end{align} This result follows straightforwardly from our $\sqrt{\rm Kerr}$ discussion, by simply ``squaring" the $x$-factors in eq.(\ref{Factor}), and replacing ${\sqrt2}e\rightarrow {- \kappa/2}$. The result is just a factor of two for the rapidity factor in eq.(\ref{Rapid}) \begin{align} \Delta p_1^\mu & ={-}i 2\pi G m_1 m_2\int \! \hat{d}^4\bar q\; \hat{\delta}(\bar q\cdot u_1)\hat{\delta}(\bar q\cdot u_2)e^{{-}i\bar q\cdot b} \frac{\bar q^\mu }{\bar q^2} \nonumber\\ &\left((\cosh 2w{+}\sinh 2w) e^{\bar q\cdot{a}}{+}(\cosh 2w{-}\sinh 2w) e^{{-}\bar q\cdot{a}}\right) \end{align} Again, using the identities for $\sinh w$ we derived previously, we can rewrite \begin{equation} \bar q_\mu \sinh 2w=2 \bar q_\mu \cosh w \sinh w = i2\cosh w\,\epsilon_{\mu\nu\alpha\beta} \bar q^\nu u_1^\alpha u_2^\beta \end{equation} and thus \begin{align} \Delta p_1^\mu &= {-}4\pi G m_1 m_2\Re\int \! \hat{d}^4\bar q\; \hat{\delta}(\bar q\cdot u_1)\hat{\delta}(\bar q\cdot u_2)\frac{ie^{{-}i\bar q\cdot( b+i {a})}}{\bar q^2} \nonumber\\ &\quad\quad (\bar q^\mu\cosh 2w{+}i2\cosh w\,\epsilon_{\mu\nu\alpha\beta} \bar q^\nu u_1^\alpha u_2^\beta) \,. \end{align} To compute the Fourier integrals, note that $q \cdot b = q \cdot \Pi b$ on the support of the integral, where $\Pi$ is the projector onto the space orthogonal to $u_1$ and $u_2$. With this replacement, the Fourier integral is straightforward to compute\footnote{For example, see page 33 of~\cite{Kosower:2018adc}}, and the result is \[ \Delta p_1^\mu = {-}\frac{2m_1 m_2 G}{\sinh w}\Re \left[ \frac{\cosh 2w\,b_\perp^\mu{+}i2\cosh w \epsilon^{\mu\nu\alpha\beta} u_{1\alpha} u_{2\beta}b_{\perp\nu}}{b_\perp^2} \right] \,, \label{eq:finalImpulse} \] where $b_\perp=\Pi(b+i a)$, in agreement with eq.(\ref{GraviImpulse}). \vspace{-0.3cm} \vspace{-0.4cm} \section{Discussions and Conclusions} In this paper we demonstrated that the exponentiation induced in taking the large-spin limit of minimally coupled spinning particles, precisely maps to the Newman-Janis complex shift relating the Schwarzschild and Kerr solutions in position space. Note that these are very general features, applying to a wide range of observables (eg the total change in spin of a particle during a scattering event~\cite{angularimpulse}) and in a wide range of theories, including Einstein gravity. Moreover, while we have described the situation in detail at lowest order for the impulse, one can compute the impulse to all orders using scattering amplitudes. The only three point vertex available for particles moving in the static background field is the $\sqrt{\textrm{Kerr}}$ amplitude of equation~\eqref{eq:RootKerrAmplitude}. Thus the replacement must hold to all orders, as well as for its gravitational counterpart. There is still much to learn by studying classical gravity from the point of view of on-shell methods. We need to learn more about amplitudes for particles with large spins in order to understand the dynamics of Kerr black hole scattering (not just probe scattering) in more detail. Moreover, the interplay between the double copy, massive particles, and Einstein gravity needs to be explored in more detail~\cite{henrik}, especially in light of recent difficulties~\cite{Plefka:2019hmz}. It will be interesting to explore the correspondence to other solutions where either complex shifting or double copy relations hold. This includes the shifting relation between Kerr-Newman and Reissner-Nordstrom, as well as the double copy relation between dyons and the Taub-NUT solution~\cite{Luna:2015paa}. We leave this for future work. Finally, in this note we have focused on understanding the three-point couplings of Kerr black holes in the simplest and most physical way, involving the scattering of probe particles in asymptotically Minkowski spacetime. We did not directly consider the on-shell three-particle scattering. Indeed, it is a standard (and important) fact of basic kinematics that the 3-particle amplitude is never ``on-shell'' in asymptotically Minkowski space. Instead the three-particle amplitude makes sense for general complex momenta, and also for real momenta, not in $(3,1)$ but in $(2,2)$ signature. Clearly, the complexification associated with the Kerr solution is begging for a formulation in $(2,2)$ signature, where an even more direct computation of the three-particle amplitude should be possible. Given the important role of $(2,2)$ signature physics in many other aspects of four-dimensional scattering amplitudes, this may well be more generally a fruitful avenue of exploration for future work. \section{Acknowledgements} We thank Andr\'es Luna, Lionel Mason, Ricardo Monteiro and Justin Vines for useful discussions. NAH is supported by DOE grant de-sc0009988, YTH is supported by MoST Grant No. 106-2628-M-002-012-MY3, while DOC is supported by the STFC grant ``Particle Theory at the Higgs Centre''. YTH and DOC would like to thank Simons Foundation for its support for the ``Amplitudes meets cosmology" workshop, during which this work was done. \vspace{-0.4cm} \vspace{-0.3cm} \vskip .3 cm
\section{Appendix A. Derivatives of the action $S_1 $}} Here we present the full expressions for the derivatives of the action in the Abelian theory, evaluated at the saddle point $\bar{x}= x_s^+$. In what follows, we denote $z \equiv \cosh (m)$, $\xi \equiv \lambda \sinh (m)$ and $\Delta \equiv \sqrt{1-\lambda^2 \sinh (m)^2}$. \begin{align*} S_1 (x_s ^+) & = \log \left( \frac{\Delta z + i \lambda \sinh (m)^2 + 1 }{ \left( i + \lambda \right) \left( \lambda z - i \Delta \right) } \right) - i \lambda \log \left( \frac{ - \lambda z + i \Delta }{i + \lambda } \right) , \\ S_1 ^{\prime \prime} (x_s ^+) & = \lambda^2 \left[ 1 + \frac{ z \Delta -1 }{ \xi^2 } \right] , \\ S_1 ^{\prime \prime \prime } (x_s ^+) & = \frac{\lambda \left( 1-i \lambda \right)}{4\sinh (m)^2 \left( \lambda \sinh (m)^2 - i z \Delta - i \right) ^{2}} \left[ 2\xi -6 \xi z \Delta +2\left( 4\xi ^{2}-3\right) \xi \cosh (2m) +8 i \xi ^{2}\sinh ( m)^3 \right.\notag \\ & \left. +2\xi \cosh (3m) \Delta + 7 i \sinh (m) - 8i \xi ^{2} \sinh (2m) \Delta +2i \sinh (2m) \Delta - i \sinh (3m) \right] , \\ S_1 ^{(iv)} (x_s ^+) & = - 6 \lambda^4 + \frac{23 \lambda^2 }{2 \sinh^2 m } - \frac{ \Delta \left( 48 \lambda^2 \sinh (m)^2 - 23 \right) z + 2 \left( 7 \lambda^2 \sinh (m)^2 -4 \right) \cosh ( 2m) + \Delta \cosh (3m) - 16 }{ 4 \sinh^4 m } . \end{align*} The values of the derivatives of $S_1$ when evaluated at $x_s ^{-}$ are immediately obtained through the relations: \begin{equation*} S_1 (x_s^-) = (S_1 (x_s^+))^{\ast} , \quad S_1 ^{\prime \prime} (x_s^-) = (S_1 ^{\prime \prime} (x_s^+))^{\ast} , \quad S_1 ^{\prime \prime \prime } (x_s^-) = - (S_1 ^{\prime \prime \prime} (x_s^+))^{\ast} , \quad S_1 ^{(iv)} (x_s^-) = (S_1 ^{(iv)} (x_s^+))^{\ast} \end{equation*} \hypertarget{app:WLscaling}{\section{Appendix B. Multiple scaling limit of Wilson loops}} The large $N$ limit of Eq. \eqref{eq:WL1} whit $\lambda \equiv \eta/N$ and $f \equiv r/N$ fixed, with $0\le f <1$, is obtained from the contributions of the saddle points: \begin{equation*} \bar{x} = \log \left( \frac{ - \left( \lambda z + L \sin \frac{ \theta}{2} \right) + i \left( f z + L \cos \frac{ \theta }{2} \right) }{ \lambda + i (1-f) } \right) + i 2 \pi k , \quad k \in \mathbb{Z} , \end{equation*} where we defined $L$ and $\theta$ as: \begin{equation*} L \equiv L (\lambda, f) = \sqrt{ 1 + (\lambda^2 + f^2 )^2 \sinh (m)^4 - 2 (\lambda^2 - f^2 ) \sinh(m)^2 } , \quad \sin \theta = \frac{ 2 \lambda f \sinh (m)^2 }{L} , \ \cos \theta = \frac{ 1- (\lambda^2 - f^2) \sinh (m)^2 }{L} . \end{equation*} Those saddle points are in general complex, and there is no critical surface in parameter space signalling a phase transition. The sub-critical phase of the case $r=0$ now corresponds to the system living in the surface in the $(\lambda, f , m)$ space determined by the equation: \begin{equation*} \left( \lambda z + L \sin \frac{ \theta}{2} \right)^2 + \left( f z + L \cos \frac{ \theta }{2} \right)^2 = \lambda^2 + (1-f)^2 , \end{equation*} while the rest of $3d $ parameter space is qualitatively analogous to the super-critical phase of the partition function. \hypertarget{app:derivatives}{\section{Appendix C. Partition function in the \emph{super-critical phase} for $n=2$}} The non-Abelian theory with $n=2$ has four relevant saddle points, obtained from the combinations $(\bar{x}_1, \bar{x}_2)=(x_s ^{\pm} , x_s ^{\pm})$. In the \emph{sub-critical phase}, only $(x_s ^{+}, x_s ^{+})$ contributes, but in the \emph{super-critical phase} all four saddle points are to be taken into account, and the partition function is therefore the sum of four pieces: \begin{equation*} \mathcal{Z}^{U(2)}_{\mathrm{super.}} = \mathcal{Z} (x_s ^{+} , x_s^{+}) + \mathcal{Z} (x_s ^{+} , x_s^{-}) + \mathcal{Z} (x_s ^{-} , x_s^{+}) + \mathcal{Z} (x_s ^{-} , x_s^{-}) . \end{equation*} Taking advantage of the relations of Appendix \hyperlink{app:derivatives}{A}, one immediately finds: \begin{equation*} \mathcal{Z} (x_s ^{+} , x_s^{+}) + \mathcal{Z} (x_s ^{-} , x_s^{-}) = \mathcal{Z}^{U(2)}_{\mathrm{sub.}} + c.c. , \end{equation*} at order $\mathcal{O} (N^{-1})$. The sum of the other two contributions is: \begin{align*} \mathcal{Z} (x_s ^+ , x_s ^- ) + \mathcal{Z} (x_s ^- , x_s ^+ ) & = \frac{\pi e^{- 2 N \Re S_1 (x_s ^+) } }{ 2^{2(N-1)} N^2 } \left\{ \frac{ 2 \Re S_1 ^{\prime \prime} (x_s ^+ ) }{ \lvert S_1 ^{\prime \prime} (x_s ^+) \rvert^{3} } \right. \\ & + \frac{1}{N} \left. \left[ \frac{ \left( \Re S_1^{\prime \prime} (x_s^+) \right)^2 }{ \lvert S_1^{\prime \prime} (x_s^+) \rvert^5 } - \frac{ \Re \left( \left( S_1^{\prime \prime} (x_s ^+) \right)^2 \left( S_1^{(iv)} (x_s^+) \right)^{\ast} \left(5 S_1^{\prime \prime } (x_s ^+) + \left( S_1^{\prime \prime } (x_s ^+ ) \right)^{\ast} \right) \right) }{ 4 \lvert S_1 ^{\prime \prime} (x_s ^+) \rvert^7 } + \right. \right. \\ & + \left. \left. \frac{ 5 \Re \left( \left( S_1 ^{\prime \prime} (x_s ^+ ) \right)^3 \left( \left( S_1 ^{\prime \prime \prime} (x_s ^+ ) \right)^{\ast} \right)^2 \left( 7 S_1 ^{\prime \prime} (x_s ^+ ) + \left( S_1 ^{\prime \prime} (x_s ^+ ) \right)^{\ast} \right) \right) - 6 \lvert S_1 ^{\prime \prime} (x_s ^+ ) \rvert^4 \lvert S_1 ^{\prime \prime \prime} (x_s^+ ) \rvert^2 }{ 12 \lvert S_1 ^{\prime \prime} (x_s ^+ ) \rvert^9 } \right] \right\} . \end{align*} \hypertarget{app:Unc}{\section{Appendix D. Non-Abelian theory: the general case}} The same procedure applied in the text for the case of $U(2)$ yields in principle for any $U(n)$ theory, \textit{i.e.} arbitrary number of colours, as long as $n$ is kept fixed in the large $N$ limit. At finite $N$, one has the determinantal representation: \begin{equation*} \mathcal{Z} ^{U(n)} _N = N! \det_{1 \le j,k \le N } [ Z_{jk} ] = N! \det_{1 \le j,k \le N } \langle W_{j+k-2} \rangle . \end{equation*} Here we compute the large $N$ limit of the partition function \eqref{eq:znc} of the $U(n)$ theory, and the $1/N$ corrections might be obtained in the same fashion as for the $U(2)$ case. The key observation is that, for every $n$, the interaction among eigenvalues is sub-leading as $N \to \infty$, and therefore the set of saddle points of the $U(n)$ theory is given by $n$ copies of the set $\mathscr{S}$ of the Abelian theory. Another simplification arises from the observation that, at leading order in $1/N$, the determinant is linearized: \begin{equation*} \prod_{1 \le j < k \le n} \left( 2 \sinh \frac{ x_j - x_k}{2} \right)^2 = \prod_{1 \le j < k \le n} \frac{ \left( t_j - t_k \right)^2 }{N} + \mathcal{O} (N^{-2}) . \end{equation*} Consequently, at large $N$ the partition function $\mathcal{Z}_N ^{U(n)}$ converges to: \begin{equation*} \label{eq:znc_largeN} \mathcal{Z} ^{U(n)} _{\mathrm{sub.}} = \frac{e^{- n N S_1 (x_s^{+}) } }{2^{n N} N^{\frac{n ^2 }{2}} } \mathcal{Z}_{\mathrm{GUE} } ( S^{\prime \prime} _1 (x_s ^{+}) ) = \frac{ (2 \pi )^{\frac{n}{2} } e^{- n N S_1 (x_s^{+}) } }{ 2^{n N} N^{\frac{n ^2 }{2}} ( S^{\prime \prime} _1 (x_s ^{+}) )^{\frac{n ^2 }{2 }} } G (n+2) , \end{equation*} when $\lambda \sinh (m) <1$, where $\mathcal{Z}_{\mathrm{GUE} }(g)$ denotes the partition function of a Gaussian ensemble with coefficient $g$ in the exponent, and $G(n+2) = \prod_{k=0} ^{n} (k!)$ is the Barnes $G$-function. In the \emph{super-critical phase}, $\mathcal{Z} ^{U(n)} _{\mathrm{super.}}$ is a sum over all possible combinations $(\bar{x}_1, \dots, \bar{x}_{n})= ( x_s ^{\pm}, \dots, x_s ^{\pm})$. It is formally given by: \begin{equation*} \mathcal{Z} ^{U(n)} _{\mathrm{super.}} = \frac{ (2 \pi)^{\frac{n}{2}}}{ 2^{n N } N^{\frac{ n ^2 }{2}} } \sum_{(\bar{x}_1, \dots, \bar{x}_{n} ) \in \mathscr{S} ^{n} } \prod_{j=1} ^{n} \frac{ e^{-N S_1 (\bar{x}_j) } }{ ( S^{\prime \prime} _1 (\bar{x} _j) )^{n - \frac{1 }{2} } } P_{n} \left( S^{\prime \prime} _1 (\bar{x} _1) , \dots, S^{\prime \prime} _1 (\bar{x} _{n} )\right) , \end{equation*} with $P_{n} (s_1, \dots, s_{n})$ a symmetric polynomial of degree $n (n-1)/2$ in $n$ variables, subject to the additional constraint: \begin{equation*} P_{n} (s, \dots, s) = G(n +2) s^{n (n -1) /2 } . \end{equation*} For example, in the $U(3)$ theory it is: \begin{equation*} P_{3} (s_1, s_2, s_3) = 3 \left( s_1 ^2 s_2 + s_1 ^2 s_3 + s_1 s_2^2 +s_1 s_3 ^2 + s_2 ^2 s_3 + s_2 s_3 ^2 - 2 s_1 s_2 s_3 \right) , \end{equation*} and for $U(4)$ it is: \begin{align*} P_{4} (s_1, s_2, s_3, s_4) & = 9 \left\{ 5 s_2 s_3 s_4 \left[ s_2 (s_3 - s_4)^2 + s_2 ^2 (s_3 + s_4) + s_3 s_4 (s_3 + s_4) \right] \right. \\ & + s_1 ^3 \left[ 5 s_2 ^2 (s_3 + s_4) + 5 s_3 s_4 (s_3 + s_4) + s_2 (5 s_3 ^2 - 18 s_3 s_4 + 5 s_4 ^2) \right] \\ & + s_1^2 \left[ 5 s_3 (s_3 - s_4)^2 s_4 + 5 s_2^3 (s_3 + s_4) - 2 s_2 ^2 (5 s_3 ^2 - 2 s_3 s_4 + 5 s_4 ^2) + s_2 (s_3 + s_4) (5 s_3 ^2 - s_3 s_4 + 5 s_4 ^2) \right] \\ & \left. + s_1 \left[ 5 s_3 ^2 s_4 ^2 (s_3 + s_4) + s_2 ^3 (5 s_3 ^2 - 18 s_3 s_4 + 5 s_4 ^2) + s_2^2 (s_3 + s_4) (5 s_3^2 - s_3 s_4 + 5 s_4^2) - 2 s_2 s_3 s_4 (9 s_3^2 - 2 s_3 s_4 + 9 s_4^2) \right] \right\} . \end{align*} The expression may be further simplified, using the fact that every combination $(\bar{x}_1, \dots, \bar{x}_{n})$ with a fixed number $l$ of entries equal to $x_s ^{+}$, and the remaining $n -l$ equal to $x_s ^{-}$, give the same contribution, independently on the position the $x_s ^{\pm}$ appear. We obtain: \begin{equation*} \mathcal{Z} ^{U(n)} _{\mathrm{super.}} = \frac{ (2 \pi)^{\frac{n}{2}}}{ 2^{n N } N^{\frac{ n ^2 }{2}} } \sum_{l=0} ^{n} \frac{ e^{-N l S_1 (x_s ^{+}) - N(n -l) S_1 (x_s ^{-}) } }{ (S_1 ^{\prime \prime} (x_s ^{+}) )^{\left( n - \frac{1}{2}\right) l } (S_1 ^{\prime \prime} (x_s ^{-}) )^{\left( n - \frac{1}{2}\right) (n- l) } } \left( \begin{matrix} n \\ l \end{matrix} \right) P_{n} ( \underbrace{ s , \dots, s }_{ l} , \underbrace{ s^{\ast} , \dots, s ^{\ast} }_{ n - l} ) , \end{equation*} where for shortness we denoted $s \equiv S^{\prime \prime} _1 (x_s ^{+})$ and used $S^{\prime \prime} _1 (x_s ^{-}) = S^{\prime \prime} _1 (x_s ^{+}) ^{\ast} \equiv s^{\ast} $ from Appendix \hyperlink{app:derivatives}{A}.\par To find the free energy, we reason as in \cite{Russo:2016ueu}~for the Abelian case. We write: \begin{align*} \mathcal{Z} ^{U(n)} _{\mathrm{super.}} & \propto \sum_{l=0} ^{n} \exp \left[ -N l S_1 (x_s ^{+}) - N(n -l) S_1 (x_s ^{-}) + \dots \right] \\ & = \exp \left[ -n N \Re \left( S_1 (x_s ^{+}) \right) + \log \left( 1+ \sum_{l=0} ^{n} \cos \left( l N \Im \left( S_1 (x_s ^{+}) \right) \right) \right) + \dots \right] , \end{align*} where the dots contain sub-leading terms at large $N$, and arrive to a closed formula for the free energy in the arbitrary $U(n)$ case: \begin{equation*} \mathcal{F}^{U(n)} = n \mathcal{F} ^{U(1)} . \end{equation*} \hypertarget{app:Rcharge}{\section{Appendix E. General $R$-charges}} The partition function of the $U(1)$ $\mathcal{N} =2$ theory with $N$ chiral multiplets of mass $m$ and $N$ chiral multiplets of mass $-m$ with arbitrary $R$-charge $q$, and coupled to a FI background, is \cite{Jafferis:2010un,Hama:2010av}: \begin{align*} \mathcal{Z}_{Z,q} ^{U(1)} = \int_{- \infty } ^{\infty} dx \exp \big\{ i \eta x & + N \left[ \ell \left( 1 - q + \frac{i (x+m)}{2 \pi} \right) + \ell \left( 1 - q - \frac{i (x+m)}{2 \pi} \right) \right] \\ & \left. + N \left[ \ell \left( 1 - q + \frac{i (x-m)}{2 \pi} \right) + \ell \left( 1 - q - \frac{i (x-m)}{2 \pi} \right) \right] \right\} , \end{align*} where we recall that the theory is put on a three-sphere of radius $1/2 \pi$. Here, $e^{\ell (z)}$ is the double sine function, defined as \cite{Jafferis:2010un}: \begin{equation*} \ell (u) = -u \log \left( 1 - e^{i 2 \pi u} \right) + \frac{i \pi}{2} u^2 + \frac{i}{2 \pi} \mathrm{Li}_2 \left( e^{i 2 \pi u } \right) - \frac{i\pi}{12} , \qquad u \in \mathbb{C} . \end{equation*} This function has logarithmic singularities when $q \in \mathbb{Z}$, or, more in general, when $\Im \left( \widetilde{m} \right) + 2 \pi (1-q) \in 2 \pi \mathbb{Z}$, where $\widetilde{m}$ denotes a complexified mass parameter. Nevertheless, the partition function does not develop singularities, and in fact is holomorphic in $\widetilde{m}$, as the divergences cancel. This can be seen, for instance, from the identity \begin{equation*} \ell \left( 1-q - \frac{ i(x-m)}{2 \pi} \right) \stackrel{\mathrm{reg.}}{=} - \ell \left( 1-q + \frac{ i(x- \widetilde{m})}{2 \pi} \right) , \qquad \widetilde{m} = m - i 4 \pi (1-q) , \end{equation*} where the equality is exact for the infinite product representation of the one-loop determinants and extends to the function $\ell$ through regularization by $\zeta$-function. The derivative of the double sine function satisfies the simple property: \begin{equation*} \frac{ d \ell }{ du} = - \pi u \cot (\pi u ) . \end{equation*} Therefore, in the double scaling large $N$ limit, we arrive to the saddle point equation: \begin{equation} \label{eq:speq} \frac{ \frac{(x+m)}{2 \pi} \sin \left( 2 \pi (1-q) \right) - i (1-q) \sinh (x+m) }{ \cosh (x+m) - \cos \left( 2 \pi (1-q) \right) } + \frac{ \frac{(x-m)}{2 \pi} \sin \left( 2 \pi (1-q) \right) - i (1-q) \sinh (x-m) }{ \cosh (x-m) - \cos \left( 2 \pi (1-q) \right) } = \lambda . \end{equation} It is a simple exercise to see that, setting $q = \frac{1}{2}$, one recovers the saddle points of the $\mathcal{N} =4$ theory \cite{Russo:2016ueu}.~When $q$ is half-integer, the trigonometric functions take simple values and we can solve the saddle point equation exactly, as showed in the main text.\par We found out that, for $q=1$, the action admits no saddle point. Here, we study what happens close to that point, for real $q=1-\varepsilon$. We assume $\varepsilon$ small and approximate the expression at $\mathcal{O} (\varepsilon)$. From \eqref{eq:speq} we get: \begin{equation*} \frac{ \sinh (x) }{ \cosh (x) - \cosh (m) } + i \frac{ x ( \cosh (x) \cosh (m) -1 ) + m \sinh (x) \sinh (m) }{ \left( \cosh (x) - \cosh (m) \right)^2 } = \frac{ i \lambda }{2 \varepsilon} . \end{equation*} The equation is still transcendental, but we can find an approximate solution in the large mass limit: \begin{equation} \label{eq:approxqlargem} \sinh (x) \approx \frac{ \lambda e^{m} }{2 m \varepsilon } \ \Longrightarrow \ x \approx \log \left[ \frac{ \lambda e^{m} }{2 m \varepsilon } \left( 1 + \sqrt{ 1 + \frac{4 m^2 \varepsilon^2 e^{-2m} }{ \lambda^2} } \right) \right] \approx m + \log \frac{ \lambda }{m \varepsilon } . \end{equation} In figure \ref{fig:numericq} we compare this expression at large $m$ with a numerical solution to the saddle point equation. \begin{figure}[bth] \centering \includegraphics[width=0.5\textwidth]{numerical_q1_largeMass_m25_eps001.pdf} \caption{Comparison of the numerical solution of the saddle point equation \eqref{eq:speq} (red dots) and expression \eqref{eq:approxqlargem} (black, dashed line), for $q= 0.99$ and $m=25$.} \label{fig:numericq} \end{figure} \subsection*{Comment on squashed geometry} If the supersymmetric $\mathcal{N} = 2$ theory is put on a squashed three-sphere instead than a round one, the partition function is obtained replacing the double sine functions by their squashed version \cite{Hama:2011ea} \begin{equation*} \ell \left( 1-q + \frac{i \sigma}{2 \pi} \right) \ell \left( 1-q - \frac{i \sigma}{2 \pi} \right) \mapsto \ell_b \left( \frac{1}{2} \left( b + \frac{1}{b} \right) (1-q) + \frac{i \sigma}{2 \pi} \right) \ell_b \left( \frac{1}{2} \left( b + \frac{1}{b} \right) (1-q) - \frac{i \sigma}{2 \pi} \right), \qquad \sigma = x \pm m , \end{equation*} where $b= \sqrt{r_1/r_2}$ is the squashing parameter, and the average radius is $\sqrt{r_1 r_2} = 1/ 2 \pi$. We now take advantage of the remarkable property of the double sine function: \begin{equation*} \exp \left\{ \ell_b \left( \frac{b}{2} + \frac{i \sigma}{2 \pi} \right) \ell_b \left( \frac{b}{2} - \frac{i \sigma}{2 \pi} \right) \right\} = \frac{1}{2 \cosh \left( \frac{ b \sigma }{2} \right) } , \end{equation*} which holds for every real non-negative $b$, and for the round case $b=1$ provides the partition function \eqref{eq:z1}. Therefore, for hypermultiplets with $R$-charge $0<q<1$, we may tune the geometry of the manifold so that $(b+b^{-1})(1-q)=b$, that is we may squash the sphere as \begin{equation*} b = \sqrt{ \frac{ 1-q}{q} } , \end{equation*} and the partition function reads: \begin{equation*} \mathcal{Z} ^{U(1)} _{N, \mathrm{squash}} = \int_{- \infty} ^{\infty} dx \frac{ e^{i \eta x } }{ 2^N \left[ \cosh (bx) + \cosh (bm) \right]^N } . \end{equation*} Notice that this procedure would also affect the one-loop determinant of the vector multiplet, but this is irrelevant in the Abelian theory, being such determinant trivial. Also, we see that the symmetry $q \leftrightarrow 1-q$ at the matrix model level is translated into a symmetry $b \leftrightarrow b^{-1}$ in the geometry. We therefore obtain a simple relation between the partition function of the $\mathcal{N} =2$ theory with arbitrary $R$-charge $0<q<1$ posed on a suitably squashed sphere and the $\mathcal{N} =4$ theory with $R$-charge $q=\frac{1}{2}$ on the round $\mathbb{S}^3$: \begin{equation*} \mathcal{Z} ^{U(1)} _{N, \mathrm{squash}} (m, \eta, q) = \frac{1}{b} \mathcal{Z} ^{U(1)} _{N, \mathrm{round}} \left( b m, \frac{ \eta}{b} , q= \frac{1}{2} \right) , \qquad b= \sqrt{\frac{1-q}{q}} . \end{equation*} As a byproduct, this equivalence holds for the $U(2)$ theory in the large $N$ approximation. In fact, the squashing would modify: \begin{equation*} \left( \sinh \frac{ x_1 - x_2}{2} \right)^2 \mapsto \left( \sinh \frac{ b(x_1 - x_2)}{2} \right) \left( \sinh \frac{ x_1 - x_2}{2 b} \right) , \end{equation*} and, as we have seen, the determinant is linearized at first order in $1/N$, producing cancellation of the $b$-dependence. \end{appendix} \end{document}
\section{Introduction}\label{intro} For a positive integer $n$, the functions $\sigma(n)$ and $\omega(n)$ denote the sum and number of distinct positive prime divisors of $n$ respectively. Such an $n$ is called a perfect number if $\sigma(n)=2n$. These type of numbers have been studied since antiquity and several generalizations of these numbers have appeared over the years (see \cite{mps} and the references therein for some of them). In fact, one of the most outstanding problems in number theory at the moment is to determine whether an odd perfect number exists or not. Let $d$ be a proper divisor of $n$. We call $n$ a near perfect number with redundant divisor $d$ if $\sigma(n)=2n+d$; and a deficient perfect number with deficient divisor $d$ if $\sigma(n)=2n-d$. If $d=1$, then such a deficient perfect number is called an almost perfect number. Several results have been proved about these classes of numbers: for instance, Kishore \cite{kk} proved that if $n$ is an odd almost perfect number then $\omega(n)\geq 6$, Pollack and Shevelev \cite{ps} found upper bounds on the number of near perfect numbers and characterized three different types of such numbers for even values, Ren and Chen \cite{conj} found all near perfect numbers with two distinct prime factors, Tang, and Ren and LI \cite{collo} showed that no odd near perfect number exists with three distinct prime factors and determined all deficient perfect numbers with two distinct prime factors. In a similar vein, Tang and Feng \cite{df} showed that no odd deficient perfect number exists with three distinct prime factors. Recently, Tang, Ma and Feng \cite{colloq} showed that there exists only one odd near perfect number with four distinct prime divisors. The smallest known odd deficient perfect number with four distinct prime factors is $9018009 = 3^2.7^2.11^2.13^2$, and it is the only such number until $2.10^{12}$. In this paper, we extend the work of Tang and Feng \cite{df} and prove the following main result. \begin{thm}\label{th-1} If $n$ is an odd deficient perfect number with four distinct prime factors $p_1, p_2, p_3$ and $p_4$ such that $n=p_1^{a_1}.p_2^{a_2}.p_3^{a_3}.p_4^{a_4}$ with $p_1<p_2<p_3<p_4$ and $a_1,a_2,a_3,a_4 \geq 1$, then \begin{enumerate} \item $p_1=3$, and \item $5\leq p_2 \leq 7$. \end{enumerate} \end{thm} This paper is organized as follows: in Section \ref{proof} we state and prove several lemmas which will be used in proving Theorem \ref{th-1}; finally in Section \ref{open} we state other results that can be obtained by our methods and state a few conjectures. \section{Proof of Theorem \ref{th-1}}\label{proof} We shall prove Theorem \ref{th-1} as a series of lemmas in this section. Before, we state our results, we note the following result from Tang and Feng \cite{df}. \begin{lemma}[Lemma 2.1, \cite{df}]\label{lem-df} Let $n=\prod_{i=1}^kp_i^{a_i}$ be the canonical prime factorization of $n$. If $n$ is an odd deficient perfect number, then all the $a_i$'s are even for all $i$. \end{lemma} Before we proceed with our results, let us fix a few notations. Throughout this paper, unless otherwise mentioned we take $n=p_1^{a_1}.p_2^{a_2}.p_3^{a_3}.p_4^{a_4}$ with $p_1<p_2<p_3<p_4$ distinct odd primes and $a_i$'s to be natural numbers. In light of Lemma \ref{lem-df} all the $a_i$'s are even. If $a$ is any integer relatively prime to $m$ such that $k$ is the smallest positive integer for which $a^k\equiv 1 \pmod m$ then, we say that $k$ is the order of $a$ modulo $m$ and denote it by $\textup{ord}_m(a)$. We also define the following function which we shall use very often in this paper $$f(a_1,a_2,a_3,a_4)=\left(1-\frac{1}{p_1^{a_1+1}}\right)\left(1-\frac{1}{p_2^{a_2+1}}\right)\left(1-\frac{1}{p_3^{a_3+1}}\right)\left(1-\frac{1}{p_4^{a_4+1}}\right).$$ Most of the time, we shall skip specifying the $p_i$'s and the $a_i$'s if they are evident from the context. Assuming that $n$ is an odd deficient perfect number with deficient divisor $d=p_1^{b_1}.p_2^{b_2}.p_3^{b_3}.p_4^{b_4}$, then we have \begin{equation}\label{eq-main} \sigma(p_1^{a_1}.p_2^{a_2}.p_3^{a_3}.p_4^{a_4})=2.p_1^{a_1}.p_2^{a_2}.p_3^{a_3}.p_4^{a_4}-p_1^{b_1}.p_2^{b_2}.p_3^{b_3}.p_4^{b_4}, \end{equation} \noindent where $b_i\leq a_i$. Also write $D=p_1^{a_1-b_1}.p_2^{a_2-b_2}.p_3^{a_3-b_3}.p_4^{a_4-b_4}$. Then we have \begin{equation}\label{eq-3.2} 2=\frac{\sigma(n)}{n}+\frac{d}{n}=\frac{\sigma(n)}{n}+\frac{1}{D}. \end{equation} \noindent An inequality which we will use without commentary in the following is $$\frac{\sigma(n)}{n}<\frac{p_1.p_2.p_3.p_4}{(p_1-1).(p_2-1).(p_3-1).(p_4-1)}.$$ \begin{lemma}\label{p1} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_1=3$. \end{lemma} \begin{proof} If $p_1\geq 5$, then from equation \ref{eq-3.2} we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{5.7.11.13}{4.6.10.12}+\frac{1}{5}<2,$$ which is impossible. So, $p_1=3$. \end{proof} \begin{lemma}\label{p2} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_2\leq 23$. \end{lemma} \begin{proof} If $p_2\geq 29$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.29.31.37}{2.28.30.36}+\frac{1}{3}<2,$$ which is impossible. Hence $p_2\leq 23$. \end{proof} We shall now, look at various cases for $p_2$ in the following series of lemmas. The techniques are always similar, so for the sake of brevity we omit few details, but we will always specify how we can check them. \begin{lemma}\label{p2-1} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_2\neq 23$. \end{lemma} \begin{proof} If $p_2=23$, then using similar methods like before, we can conclude that $p_3\leq 31$. This gives us two choices for $p_3$, namely $29,31$. We shall look into them separately. \textit{Case 1.} $p_3=29$. In this case, we can conclude that $p_4\leq 47$ using similar techniques. Let $D\geq 9$, then we have $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.23.29.31}{2.22.28.30}+\frac{1}{9}<2,$$ which is impossible. So, $D=3$ in this case, which means $a_1-b_1=1$ and $a_i=b_i$, $i=2,3,4$. Thus, \begin{equation}\label{ord-5} \sigma(3^{a_1}.23^{a_2}.29^{a_3}.p_4^{a_4})=5.3^{a_1-1}.23^{a_2}.29^{a_3}.p_4^{a_4}. \end{equation} \noindent We note that $\textup{ord}_5(3)=\textup{ord}_5(23)=\textup{ord}_5(37)=\textup{ord}_5(43)=\textup{ord}_5(47)=4$, $\textup{ord}_5(29)=2$ are all even; but $a_i\equiv 0 \pmod 2$, $i=1,2,3,4$, which means that $5$ does not divide the left hand side of equation \eqref{ord-5}, and this is a contradiction. Further if $p_4=31$, then $\textup{ord}_{31}(3)=30,\textup{ord}_{31}(23)=10,\textup{ord}_{31}(29)=10$ are all even and $a_i\equiv 0 \pmod 2, i=1,2,3,4$, so equation \eqref{ord-5} cannot hold. Again, if $p_4=41$, then $\textup{ord}_{41}(3)=8, \textup{ord}_{41}(23)=10, \textup{ord}_{41}(29)=40$ are all even and again equation \eqref{ord-5} cannot hold. Hence, $p_3\neq 29$. \textit{Case 2.} $p_3=31$. Let $p_4\geq 37$, then we have $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.23.31.37}{2.22.30.36}+\frac{1}{3}<2,$$ which is impossible. So, this case is not possible. Combining the two cases together, we conclude that $p_2\neq 23$ \end{proof} \begin{lemma}\label{p2-2} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_2\neq 19$. \end{lemma} \begin{proof} If $p_2=19$, then like before we can conclude that $p_3\leq 37$. This gives us the choices $23,29,31$ and $37$ for $p_3$. Using the elementary inequality $\dfrac{p}{p-1}>\dfrac{p+l}{p+l-1}$ for positive integers $p$ and $l$ we see that $D\geq 9$ cannot occur in this case, if $D\geq 9$ cannot occur when $p_3=23$. And indeed this is the case, since $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.19.23.29}{2.18.22.28}+\frac{1}{9}<2,$$ is impossible. So, $D=3$ in all these cases, and analogous to equation \eqref{ord-5} we have the following \begin{equation}\label{ord-5-2} \sigma(3^{a_1}.19^{a_2}.p_3^{a_3}.p_4^{a_4})=5.3^{a_1-1}.19^{a_2}.p_3^{a_3}.p_4^{a_4}. \end{equation} Let us use the function $f$ defined earlier; which is this case is $$f(a_1,a_2,a_3,a_4)=\left(1-\frac{1}{3^{a_1+1}}\right)\left(1-\frac{1}{19^{a_2+1}}\right)\left(1-\frac{1}{p_3^{a_3+1}}\right)\left(1-\frac{1}{p_4^{a_4+1}}\right).$$ We also introduce the following function $$g(a_1,a_2,a_3,a_4)=\frac{2^2.5.(p_3-1).(p_4-1)}{19.p_3.p_4}.$$ \noindent From equation \eqref{ord-5-2}, it is clear that in this case $$f(a_1,a_2,a_3,a_4)=g(a_1,a_2,a_3,a_4).$$ If $a_1=2$, then $13$ divides the left hand side of \eqref{ord-5-2}, but it does not divide the right hand side of equation \eqref{ord-5-2}, so this is a contradiction. Similarly, if $a_1=4$, then $11$ divides the left hand side of \eqref{ord-5-2}, but it does not divide the right hand side of equation \eqref{ord-5-2}, so this is a contradiction. So $a_1\geq 6$. \textit{Case 1.} $23 \leq p_2 \leq 37$. We have here, \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{7}}\right)\left(1-\frac{1}{19^3}\right)\left(1-\frac{1}{23^{3}}\right)\left(1-\frac{1}{29^{3}}\right)&\\ =0.999274\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^2.5.36.40}{19.37.41}=0.999202\cdots .$$ Clearly, this is not possible. Since, we want to check only inequalities of the form $f(a_1,a_2,a_3,a_4) \geq Q$ and $g(a_1,a_2,a_3,a_4)\leq R$ and then compare the values of $Q$ and $R$, so we need to only verify for the smallest possible values of $p_i$'s for $f(a_1,a_2,a_3,a_4)$ and the largest possible values of $p_i$'s for $g(a_1,a_2,a_3,a_4)$. So, the above verification need not be done for all sets of possible values of $p_i$'s. This observation will be used later without commentary. \textit{Case 2.} $p_3=41$. If $p_4\geq 43$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.19.41.43}{2.18.40.42}+\frac{1}{3}<2,$$ which is not possible. \textit{Case 3.} $p_3=43$. If $p_4\geq 47$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.19.43.47}{2.18.42.46}+\frac{1}{3}<2,$$ which is not possible. \end{proof} The proof of the following is very similar to Lemma \ref{p2-2}. \begin{lemma}\label{p2-3} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_2\neq 17$. \end{lemma} \begin{proof} If $p_2=17$, then like before we have $p_3\leq 47$, so the choices of $p_3$ are $19,23,29,31,37,41,43$ and $47$. Nothing again the elementary inequality $\dfrac{p}{p-1}>\dfrac{p+l}{p+l-1}$ for positive integers $p$ and $l$ we see that $D\geq 9$ cannot occur in this case, if $D\geq 9$ cannot occur when $p_3=19$. And indeed this is the case, since $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.17.19.23}{2.16.18.22}+\frac{1}{9}<2,$$ is impossible. So, $D=3$ in all these cases, and analogous to equation \eqref{ord-5} we have the following \begin{equation}\label{ord-5-3} \sigma(3^{a_1}.17^{a_2}.p_3^{a_3}.p_4^{a_4})=5.3^{a_1-1}.17^{a_2}.p_3^{a_3}.p_4^{a_4}. \end{equation} Let us use the function $f$ defined earlier; which is this case is $$f(a_1,a_2,a_3,a_4)=\left(1-\frac{1}{3^{a_1+1}}\right)\left(1-\frac{1}{17^{a_2+1}}\right)\left(1-\frac{1}{p_3^{a_3+1}}\right)\left(1-\frac{1}{p_4^{a_4+1}}\right).$$ We also introduce the following function $$g(a_1,a_2,a_3,a_4)=\frac{2^5.5.(p_3-1).(p_4-1)}{3^2.17.p_3.p_4}.$$ \noindent From equation \eqref{ord-5-3}, it is clear that in this case $$f(a_1,a_2,a_3,a_4)=g(a_1,a_2,a_3,a_4).$$ If $a_1=2$, then $13$ divides the left hand side of \eqref{ord-5-3}, but it does not divide the right hand side of equation \eqref{ord-5-3}, so this is a contradiction. Similarly, if $a_1=4$, $11$ divides the left hand side of \eqref{ord-5-3}, but it does not divide the right hand side of equation \eqref{ord-5-3}, so this is a contradiction. So $a_1\geq 6$. \textit{Case 1.} $19\leq p_3\leq 41$. For this case, we have \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{7}}\right)\left(1-\frac{1}{17^3}\right)\left(1-\frac{1}{19^{3}}\right)\left(1-\frac{1}{23^{3}}\right)&\\ =0.999111\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^5.5.40.42}{3^2.17.41.43}=0.996519\cdots .$$ Clearly, this is not possible, so this case cannot occur. \textit{Case 2.} $p_3=43$. If $p_4\geq 53$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.17.43.53}{2.16.42.52}+\frac{1}{3}<2,$$ which is not possible. So, $p_4=47$. However, we have $\textup{ord}_5(3)=\textup{ord}_5(17)=\textup{ord}_5(43)=\textup{ord}_5(47)=4$, hence $5$ cannot divide the left hand side of equation \eqref{ord-5-3}. Hence, this case is not possible. \textit{Case 2.} $p_3=47$. If $p_4\geq 53$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.17.47.53}{2.16.46.52}+\frac{1}{3}<2,$$ which is not possible. So, this case is impossible. Combining the two cases above, we have $p_2\neq 17$. \end{proof} \begin{lemma}\label{p2-4} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_2\neq 13$. \end{lemma} \begin{proof} If $p_2=13$ and $p_3\geq 79$ then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.13.79.83}{2.12.78.82}+\frac{1}{3}<2,$$ which is impossible. So, $p_3\leq 73$. Therefore, the choices of $p_3$ lies in the set $$\{17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71,73\}.$$ Nothing again the elementary inequality $\dfrac{p}{p-1}>\dfrac{p+l}{p+l-1}$ for positive integers $p$ and $l$ we see that $D\geq 9$ cannot occur in this case, if $D\geq 9$ cannot occur when $p_3=17$. And indeed this is the case, since $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.13.17.19}{2.12.18.18}+\frac{1}{9}<2,$$ is impossible. So, $D=3$ in all these cases, and analogous to equation \eqref{ord-5} we have the following \begin{equation}\label{ord-5-4} \sigma(3^{a_1}.13^{a_2}.p_3^{a_3}.p_4^{a_4})=5.3^{a_1-1}.13^{a_2}.p_3^{a_3}.p_4^{a_4}. \end{equation} Let us use the function $f$ defined earlier; which is this case is $$f(a_1,a_2,a_3,a_4)=\left(1-\frac{1}{3^{a_1+1}}\right)\left(1-\frac{1}{13^{a_2+1}}\right)\left(1-\frac{1}{p_3^{a_3+1}}\right)\left(1-\frac{1}{p_4^{a_4+1}}\right).$$ We also introduce the following function $$g(a_1,a_2,a_3,a_4)=\frac{2^3.5.(p_3-1).(p_4-1)}{3.13.p_3.p_4}.$$ \noindent From equation \eqref{ord-5-4}, it is clear that in this case $$f(a_1,a_2,a_3,a_4)=g(a_1,a_2,a_3,a_4).$$ \textit{Case 1.} $17\leq p_3\leq 29$. We note that \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{3}}\right)\left(1-\frac{1}{13^{3}}\right)\left(1-\frac{1}{17^{3}}\right)\left(1-\frac{1}{19^{3}}\right)&\\ =0.962188\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4) \leq \frac{2^3.5.28.30}{3.13.29.31}=0.95833\cdots,$$ which is not possible. So, this case is not possible. \textit{Case 2.} $p_3\geq 31$ If $a_1=2$ and $p_3\geq 31$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{\sigma(3^2).13.31.37}{3^2.12.30.36}+\frac{1}{3}<2,$$ which is not possible. If $a_1=4$, then $11$ divides the left hand side of equation \eqref{ord-5-4}, but not the right hand side. So, this is not possible. Let $a_1\geq 6$. Then we have \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{7}}\right)\left(1-\frac{1}{13^{3}}\right)\left(1-\frac{1}{31^3}\right)\left(1-\frac{1}{37^3}\right)&\\ =0.999035 \cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4) \leq \frac{2^3.5.72.78}{3.13.73.79}=0.998786\cdots ,$$ which is not possible. So, this case is not possible. Combining the two cases above, we conclude that $p_2\neq 13$. \end{proof} \begin{lemma}\label{p2-5} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $p_2\neq 11$. \end{lemma} \begin{proof} If $p_2=11$ and $p_3\geq 199$ then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.11.199.211}{2.10.198.210}+\frac{1}{3}<2,$$ which is impossible. So, $p_3\leq 197$. \textit{Case 1.} $p_3\geq 17$. Nothing again the elementary inequality $\dfrac{p}{p-1}>\dfrac{p+l}{p+l-1}$ for positive integers $p$ and $l$ we see that $D\geq 9$ cannot occur in this case, if $D\geq 9$ cannot occur when $p_3=17$. And indeed this is the case, since $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.11.17.19}{2.10.18.18}+\frac{1}{9}<2,$$ is impossible. So, $D=3$ in all these cases, and analogous to equation \eqref{ord-5} we have the following \begin{equation}\label{ord-5-5} \sigma(3^{a_1}.11^{a_2}.p_3^{a_3}.p_4^{a_4})=5.3^{a_1-1}.11^{a_2}.p_3^{a_3}.p_4^{a_4}. \end{equation} We note here that, if $a_1=2$, then $13$ divides the left hand side of equation \eqref{ord-5-5}, but not the right hand side. So, $a_1\geq 4$. \textit{Subcase 1.1.} $p_3\leq 127$. Let us use the function $f$ defined earlier; which is this case is $$f(a_1,a_2,a_3,a_4)=\left(1-\frac{1}{3^{a_1+1}}\right)\left(1-\frac{1}{11^{a_2+1}}\right)\left(1-\frac{1}{p_3^{a_3+1}}\right)\left(1-\frac{1}{p_4^{a_4+1}}\right).$$ We also introduce the following function $$g(a_1,a_2,a_3,a_4)=\frac{2^2.5^2.(p_3-1).(p_4-1)}{3^2.11.p_3.p_4}.$$ \noindent From equation \eqref{ord-5-5}, it is clear that in this case $$f(a_1,a_2,a_3,a_4)=g(a_1,a_2,a_3,a_4).$$ If $p_3\leq 127$, then we have \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{5}}\right)\left(1-\frac{1}{11^{3}}\right)\left(1-\frac{1}{17^{3}}\right)\left(1-\frac{1}{19^{3}}\right)&\\ =994789\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^2.5^2.126.130}{3^2.11.127.131}=0.994497\cdots ;$$ which are incompatible with each other. Hence, this subcase cannot occur. \textit{Subcase 1.2.} $127\leq p_3\leq 137$. If $a_2=2$, then we find that $19$ divides the left hand side of equation \eqref{ord-5-5}, but not the right hand side. So, $a_2\geq 4$. We have \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{5}}\right)\left(1-\frac{1}{11^{5}}\right)\left(1-\frac{1}{127^{3}}\right)\left(1-\frac{1}{131^{3}}\right)&\\ =0.995878\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^2.5^2.136.138}{3^2.11.137.139}=0.995514\cdots ;$$ which are incompatible with each other. Hence, this case cannot occur. \textit{Subcase 1.3.} $139\leq p_3\leq 181$. If $a_1=4$, then we have $$n=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{\sigma(3^4).11.139.149}{3^4.10.138.148}+\frac{1}{3}<2,$$ which is not possible. So, $a_1\geq 6$ in this case. If $a_2=2$, then we find that $19$ divides the left hand side of equation \eqref{ord-5-5}, but not the right hand side. So, $a_2\geq 4$. We have \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{7}}\right)\left(1-\frac{1}{11^{5}}\right)\left(1-\frac{1}{139^{3}}\right)\left(1-\frac{1}{149^{3}}\right)&\\ =0.999536\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^2.5^2.180.190}{3^2.11.181.191}=0.999261\cdots ;$$ which are incompatible with each other. Hence, this case cannot occur. \textit{Subcase 1.4.} $p_3=191$ or $193$. If $p_4\geq 211$ then we have $$n=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.11.191.211}{2.10.190.210}+\frac{1}{3}<2,$$ which is not possible. So, $p_4\leq 197$. If $a_1=4$, then we have $$n=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{\sigma(3^4).11.191.193}{3^4.10.190.192}+\frac{1}{3}<2,$$ which is not possible. So, $a_1\geq 6$ in this case. If $a_1=6$, then $1093$ divides both sides of equation \eqref{ord-5-5}, which means $p_4=1093$, which is impossible. So, $a_1\geq 8$. If $a_2=2$, then we find that $19$ divides the left hand side of equation \eqref{ord-5-5}, but not the right hand side. So, $a_2\geq 4$. We have \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{9}}\right)\left(1-\frac{1}{11^{5}}\right)\left(1-\frac{1}{191^{3}}\right)\left(1-\frac{1}{193^{3}}\right)&\\ =0.999943\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^2.5^2.192.196}{3^2.11.193.197}=0.999766\cdots ;$$ which are incompatible with each other. Hence, this case cannot occur. \textit{Subcase 1.5.} $p_3=197.$ If $p_4\geq 211$ then we have $$n=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.11.197.211}{2.10.196.210}+\frac{1}{3}<2,$$ which is not possible. So, $p_4=199$. We have $\textup{ord}_3(197)=\textup{ord}_{11}(197)=2$,$\textup{ord}_5(197)=4$ and $\textup{ord}_{199}(197)=198$ are all even. Hence, none of the factors of the left hand side of equation \eqref{ord-5-5} divides $\sigma(197^{a_3})$, which is a contradiction. Combining the five subcases, we conclude that $p_3<17$. \textit{Case 2.} $p_3=13$. Nothing again the elementary inequality $\dfrac{p}{p-1}>\dfrac{p+l}{p+l-1}$ for positive integers $p$ and $l$ we see that $D\geq 13$ cannot occur in this case, if $D\geq 11$ cannot occur when $p_4=17$. And indeed this is the case, since $$2=\frac{\sigma(n)}{n}+\frac{1}{D}<\frac{3.11.13.17}{2.10.11.16}+\frac{1}{11}<2,$$ is impossible. So, $D=3$ or $9$ in all these cases. \textit{Subcase 2.1.} $D=3$. We have the following equation in this case \begin{equation}\label{ord-5-6} \sigma(3^{a_1}.11^{a_2}.13^{a_3}.p_4^{a_4})=5.3^{a_1-1}.11^{a_2}.13^{a_3}.p_4^{a_4}. \end{equation} Let us use the function $f$ defined earlier; which is this case is $$f(a_1,a_2,a_3,a_4)=\left(1-\frac{1}{3^{a_1+1}}\right)\left(1-\frac{1}{11^{a_2+1}}\right)\left(1-\frac{1}{13^{a_3+1}}\right)\left(1-\frac{1}{p_4^{a_4+1}}\right).$$ We also introduce the following function $$g(a_1,a_2,a_3,a_4)=\frac{2^4.5^2.(p_4-1)}{3.11.13.p_4}.$$ From equation \eqref{ord-5-6}, it is clear that $$f(a_1,a_2,a_3,a_4)=g(a_1,a_2,a_3,a_4).$$ Clearly \begin{align*} f(a_1,a_2,a_3,a_4)\geq \left(1-\frac{1}{3^{3}}\right)\left(1-\frac{1}{11^{3}}\right)\left(1-\frac{1}{13^{3}}\right)\left(1-\frac{1}{17^{3}}\right)&\\ =0.961606\cdots , \end{align*} \noindent and $$g(a_1,a_2,a_3,a_4)\leq \frac{2^4.5^2}{3.11.13}=0.932401\cdots ;$$ which are incompatible with each other. Hence, we get a contradiction. \textit{Subcase 2.2.} $D=9$. In this case, if $p_4\geq 19$, then we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{3.11.13.19}{2.10.12.18}+\frac{1}{9}<2,$$ which is not possible. So, $p_4=17$. Observing that, $\textup{ord}_{17}(3)=16=\textup{ord}_{17}(11)$ and $\textup{ord}_{17}(13)=4$, we can conclude that this case cannot occur. Combining the two subcases we conclude that $p_3\neq 13$. Combining the two cases above, we conclude that $p_2\neq 11$. \end{proof} \begin{lemma}\label{p2-f} If $n$ is an odd deficient perfect number of the form in Theorem \ref{th-1}, then $5\leq p_2\leq 7$. \end{lemma} \begin{proof} Collecting Lemmas \ref{p2}, \ref{p2-1}, \ref{p2-2}, \ref{p2-3}, \ref{p2-4} and \ref{p2-5} gives us the result. \end{proof} \begin{proof}[Proof of Theorem \ref{th-1}] The first part is proved in Lemma \ref{p1}, while the second part in proved in Lemma \ref{p2-f}. \end{proof} \section{Other Results and Open Problems}\label{open} Numerical evidence as quoted in Section \ref{intro} encouraged us to make the following conjectures. \begin{conj}\label{conj-1} There is only one odd deficient perfect number with four distinct prime factors. \end{conj} \begin{conj}\label{conj-2} For any positive integer $k\geq3$, there are only finitely many odd deficient perfect numbers with exactly $k$ distinct prime factors. \end{conj} The case $k=3$ in Conjecture \ref{conj-2} corresponds to the main result of Tang and Feng \cite{df}. Theorem \ref{th-1} gives some evidence in support of Conjecture \ref{conj-1} and the case for $k=4$ in Conjecture \ref{conj-2} by eliminating several candidates of primes. The only cases to eliminate now are $p_2=5$ or $7$. We should note that our methods although works for providing bounds in support of Conjecture \ref{conj-2}, however a lot of work is required to give very explicit values of primes. As an example of the type of results we are referring to, we present the following theorem. \begin{thm}\label{th-2} If $n$ is an odd deficient perfect number with five distinct prime factors, $p_1<p_2<p_3<p_4<p_5$ such that $n=p_1^{a_1}.p_2^{a_2}.p_3^{a_3}.p_4^{a_4}.p_5^{a_5}$ with positive integers $a_i$, then $3\leq p_1\leq 5$ \end{thm} \begin{proof} Indeed, if this is the case, then we have $2=\dfrac{\sigma(n)}{n}+\dfrac{d}{n}$ where $d$ is the deficient divisor. Clearly if $p_1\geq 7$, we have $$2=\frac{\sigma(n)}{n}+\frac{d}{n}<\frac{7.11.13.17.19}{6.10.12.16.18}+\frac{1}{7}<2,$$ which is impossible. So, $3\leq p_1\leq 5$. \end{proof} \begin{rem} A case by case analysis of $p_1=3$ and $p_1=5$ in Theorem \ref{th-2}, as we have done in Section \ref{proof} would help in finding bounds for $p_2$, as well as eliminate some of the choices. But, we do not explore this further. It is our belief that some other method must come into place to say something about these type of results. We hope to discuss the cases for $p_2=5,7$ in a subsequent paper. \end{rem} \subsection*{Note Added} The case for $p=7$ is discussed by the second author \cite{def-2}, where he proves that there is only one such deficient perfect number when $7$ divides $n$. \subsection*{Acknowledgements} The second author is supported by the Austrian Science Foundation FWF, START grant Y463.
\section{Introduction} Dark matter is a very old problem. On the experimental side, it is being actively searched for, by direct detection (see, {\it e.g.}, \cite{Censier:2011wd,Gascon:2015caa,Mayet:2016zxu} for reviews), by indirect detection (see, {\it e.g.}, \cite{Cirelli:2012tf,Conrad:2014tla,Gaskins:2016cha} for reviews), and by accelerator production (see, {\it e.g.}, \cite{Kahlhoefer:2017dnp,Felcini:2018osp} for reviews). Many ``little anomalies" are known, from the Fermi excess of GeV gamma rays \cite{TheFermi-LAT:2017vmf} to the PAMELA and AMS-02 overabundance of positrons \cite{Adriani:2008zr,Accardo:2014lma,Aguilar:2014mma}. All of them can however be quite simply accounted for by conventional astrophysical processes and at this stage no clear signal for nonbaryonic dark matter has been unambiguously recorded.\\ On the theoretical side, many hypotheses are being considered. They are actually too numerous to be exhaustively mentioned here (see, {\it e.g.}, \cite{Plehn:2017fdg} for an introductory review). From supersymmetry \cite{Bagnaschi:2015eha} to axions \cite{Klaer:2017ond}, most of them imply some amount of ``new physics". Recent developments even include an impressive list of highly speculative hypotheses.\\ Obviously, estimating the ``exoticity" of a model is quite subjective. In this brief article, we revisit the idea of dark matter made of Planck relics and we argue that this scenario might be much less exotic than most models. The only nonstandard hypothesis is a higher than usual reheating temperature. \section{Trans-Planckian scattering} Most studies considering primordial black holes (PBHs) are relying on production mechanisms that involve the collapse of overdense regions (see, {\it e.g.}, \cite{Carr:1975qj} for an early detailed calculation, \cite{Cline:1996mk,Jedamzik:1999am} for studies of phase transitions, and \cite{Carr:2009jm,Green:2014faa} for reviews). Those scenarios are however very unlikely as the density contrast required to form a PBH is close to 1 whereas the primordial power spectrum measured in the cosmological microwave background (CMB) has a much lower normalization. This bound could have been circumvented by a blue power spectrum as the scales involved in the formation of PBHs are much smaller than those probed by the CMB. The actual spectrum, however, happens to be red ($n_s\approx 0.965$) \cite{Aghanim:2018eyx}, making the production of primordial black holes by ``historical" mechanisms very difficult. Other scenarios like the collapse of cosmic strings were also considered \cite{Hawking:1987bn} but they are also disfavored -- if not ruled out -- by recent measurements. Interesting new ideas are, however, now being considered \cite{Garcia-Bellido:2019vlf,Carr:2019hud}.\\ Nevertheless, there exists a very different way to produce small black holes, namely through the scattering of trans-Planckian particles. As initially argued in \cite{Banks:1999gd}, when the impact parameter is smaller than the Schwarzschild radius (associated with the considered center-of-mass energy of a particle collision), the cross section for the scattering of trans-Planckian particles is dominated by an inelastic process leading to the formation of a single black hole. The key point is that the main features of high-energy scattering above the Planck energy can be studied from semiclassical considerations in general relativity (GR) and are therefore reliable. Basically, at impact parameters greater than the Schwarzschild radius, elastic and inelastic processes (gravitational radiation, bremsstrahlung for charged particles, etc.) are described by solving the classical equations of the low-energy theory with initial conditions described by a pair of shock waves with appropriate quantum numbers. At smaller impact parameters, scattering is dominated by the “resonant” (in a sense different from the classical Breit-Wigner one) production of a black hole with mass equal to the center-of-mass energy. The elastic cross section is suppressed by a Boltzmann factor and the incoming particles never get close enough together to perform a hard QCD scattering. In this limit the eikonal approximation for the initial state becomes valid and is described by a metric containing a pair of Aichelburg-Sexl shock waves with the associated impact parameter. In \cite{Giddings:2001bu}, the study was refined and it was also concluded that the cross section for black hole production should be of the order of $\sigma(s)=F(s)\pi R_S^2(s)$ with $F(s)$ being a factor of order 1, $\sqrt{s}$ the center-of-mass energy, and $R_S$ the Schwarzschild radius. The details obviously depend on the considered quantum gravity theory but the main features are basically model independent.\\ Those ideas were applied to the possible production and observation of microscopic black holes at colliders (see, {\it e.g.}, \cite{Giddings:2001bu,Dimopoulos:2001hw,Barrau:2003tk,Paul:2005wb} for early works) in theories with a low Planck scale -- typically in the TeV range (usually associated with the existence of large extra dimensions \cite{ArkaniHamed:1998rs} or with many new particle species \cite{Dvali:2007hz}). A nice review including astrophysical effects, like those mentioned in \cite{Barrau:2005zb}, can be found in \cite{Kanti:2004nr}. In this article, we do not rely on the existence of extra dimensions and we do not assume a low Planck scale. \section{Stable relics} The Hawking temperature $T_H=1/(8\pi M)$ \cite{Hawking:1974sw} is vanishingly small for astrophysical black holes but becomes significant for very small black holes. The mass loss rate during the evaporation is proportional to $M^{-2}$ and the process is therefore highly explosive. In itself, the evaporation mechanism is well understood from many different perspectives and is very consensual (see, {\it e.g.}, \cite{Lambert:2013uaa} for a simple introduction). Although it has not been observationally confirmed, there are indications that it might have been revealed in analog systems \cite{Steinhauer:2015saa}. \\ The status of the end point of the evaporation process is less clear. Obviously, the semiclassical treatment breaks down in the last stages and the divergence of the temperature together with the appearance of a naked singularity is nonphysical. Many different arguments have been pushed forward in favor of the existence of stable Planck relics at the end of the evaporation process (see \cite{Barrow:1992hq,Zeldovich:1983cr,Aharonov:1987tp,Banks:1992ba,Banks:1992is,Bowick:1988xh,Coleman:1991jf,Lee:1991qs,Gibbons:1987ps,Torii:1993vm,Callan:1988hs,Myers:1988ze,Whitt:1988ax,Alexeyev:2002tg} to mention only a few historical references, among many others). There are excellent arguments from quantum gravity, string gravity or modified gravity theories in favor or remnants. Those are however obviously based on ``new physics". One of the best arguments for Planck relics using only known physics was given by Giddings in \cite{Giddings:1992hh}. Locality, causality and energy conservation considered within the information paradox framework (see, {\it e.g.}, the first sections of \cite{Mathur:2012np} for a precise description) do suggest that the time scale for the final decay of BHs is larger than the age of the Universe.\\ Although no clear consensus exists on the status of BHs at the end of the evaporation process, it is fair to suggest that the existence of relics is somehow simpler from the viewpoint of usual physics. A recent review on the pros and cons of stable remnants can be found in \cite{Chen:2014jwq}. It is concluded that if relics contain a large interior geometry -- which is supported by \cite{Christodoulou:2014yia,Christodoulou:2016tuu} --, they help solve the information loss paradox and the firewall controversy. \section{Reheating scale} The idea that dark matter could be made of Planck relics was first suggested in \cite{MacGibbon:1987my}. This seminal work was, however, focused on PBHs formed by the collapse of overdense regions (or similar mechanisms), which is now believed to be extremely unlikely as previously pointed out. We focus here on the possibility that PBHs are formed by the collision of trans-Plankian particles in the early Universe. This has already been considered in \cite{Saini:2017tsz} and in \cite{Conley:2006jg,Nakama:2018lwy} (see also references therein) for the case with extra dimensions.\\ In this work, we so not assume a lower than usual Planck scale due to extra dimensions. We quite simply consider the standard cosmological scenario in a (3+1)-dimensional spacetime and just take into account the ``tail" of trans-Planckian particles at the reheating time. The key point lies in the fact that the potentially produced relics behave nonrelativistically and are therefore be much less diluted (their energy density scales as $a^{-3}$) than the surrounding radiation (whose energy density scales as $a^{-4}$). Hence, it is possible to reach a density of relics (normalized to the critical density) close to 1, $\Omega_{rel}\equiv\rho_{rel}/\rho_{cr}\approx 1$, with only a tiny fraction of relics at the formation time. The relative ``amplification" of the relics density compared to the radiation density between the reheating and the equilibrium times is given by $T_{RH}/T_{eq}\approx 3\times 10^{27} T_{RH}$ when $T_{RH}$ is given in Planck units. To fix ideas, for a reheating temperature at the GUT scale, a relics fraction of only $10^{-24}$ at the formation time would be enough to nearly close the Universe at the equilibrium time. \\ For a thermal distribution of particles at temperature $T$, the number of particles above $E_{th}>T$ is exponentially suppressed. This is why, even with the amplification factor given above, the scenario presented here requires a reheating temperature not much below the Planck scale. This constitutes, in our view, the only ``nonstandard" input of this model. The Planck experiment final results lead to an upper limit on the tensor-to-scalar ratio of primordial perturbations $r<0.1$ \cite{Akrami:2018odb} which is even tightened to $r<0.064$ by combining the data with the BICEP2/Keck Array BK14 measurements. This is usually interpreted as an upper limit on the energy scale of inflation around the GUT scale (the higher the energy scale, the larger the normalization of tensor modes), which is too low for the process considered here. There are, however, at least two ways to circumvent this bound (we assume for simplicity a sudden reheating). The first one consists in noticing that the upper limit on the energy scale of inflation holds firmly only for rudimentary models. In $k-$inflation \cite{ArmendarizPicon:1999rj}, the relation basically becomes $r=-8C_Sn_t$ (instead of $r=-8n_t$), where $n_t$ is the tensor index and $C_S<1$ is the speed of sound for perturbations. This relaxes the bound. In two-field inflation \cite{Wands:2007bd}, the upper limit is also relaxed to $r=-8n_tsin^2(\theta)$, where $\theta$ accounts for the possible evolution of adiabatic scalar modes on super-Hubble scales. In multifield inflation the relation between $r$ and $n_T$ even becomes an inequality. A second and probably more provocative argument would be the following. Whereas temperature anisotropies originate from usual quantum physics, namely from the quantum fluctuations of the inflaton field, the tensor perturbations leading to B modes in the CMB should come from the quantum fluctuations of the polarization modes of the graviton. In a sense (and although some counterexamples have been constructed but for ``artificial" models), B-modes would be a signature of perturbative quantum gravity (dimensional arguments are given in \cite{Krauss:2014sua}). Quantum gravity is a fascinating area of research but it has still no connection with experiments and assuming gravity not to be quantized is also legitimate, especially when considering how difficult and paradoxical is the quantization of the gravitational field \cite{Oriti:2009zz}. It is therefore meaningful to consider the possibility that {\it no} B mode is produced, even with a very high-energy scale for inflation, just because gravity might not be quantum in nature (this would also raise many consistency questions but is obviously worth being considered, as advocated in \cite{Jacobson:1995ab,Eling:2006aw}). In such a case, the usual upper bound could also be ignored.\\ Obviously, the normalization of the scalar spectrum would also be in tension with such a high scale (violating the slow-roll conditions in the most simple cases). We do {\it not} mean that a higher than usual energy scale for inflation is unavoidable or even favored. We simply state that this is not ruled out by the tensor-to-scalar ratio and might be, in our opinion, less ``exotic" than most assumptions required for usual DM candidates. \section{Dark matter abundance} The threshold energy $E_{t}$ to produce a BH in a head on collision of particles is expected to be of the order of the Planck energy but, depending on the details of the considered model, might be slightly different and we keep it as a free parameter. To estimate the number density of particles above $E_{t}$, one simply needs to integrate the thermal distribution, which leads to $$n_{part}\approx T_{RH}e^{-{E_{t}/T_{RH}}},$$ where we use Planck units (as everywhere in this work except otherwise specified). Obviously, if the reheating temperature is too small when compared to the threshold energy of BH production, the number of PBHs will be exponentially suppressed and the process will be inefficient. The cross section, in principle, depends on the energy of the collision but, as a fist step, can be assumed to be a constant $\sigma_{BH}$ above the threshold. The collision rate is therefore given by $\Gamma=n_{part}\sigma_{BH} v\approx n_{part}\sigma_{BH}$. The energy density of radiation is $$\rho_R=\frac{\pi^2}{30}g_*T^4_{RH},$$ with $g_*$ being the total number of effectively massless degrees of freedom, that is species with masses $m_i\ll T_{RH}$. The Hubble parameter is $$H=1.66g_*^{1/2}T_{RH}^2.$$ If relics are assumed to have a mass $m_{rel}$ (necessarily lower than $E_{th}$), the energy density of relics is given by $$\rho_{rel}\approx\frac{n_{part}m_{rel}\Gamma}{H}\approx\frac{e^{-\frac{2E_t}{T_{RH}}}\sigma_{BH}m_{rel}}{1.66g_*^{1/2}}.$$ The relative density of relics at the formation time is $$\Omega_{rel}^f=\frac{30\sigma_{BH}m_{rel}}{1.66\pi^2g_*^{3/2}}\cdot\frac{e^{-\frac{2E_t}{T_{RH}}}}{T_{RH}^4},$$ leading, in agreement with \cite{Nakama:2018lwy}, to a relative density at the equilibrium time of $$\Omega_{rel}^{eq}=\frac{30\sigma_{BH}m_{rel}}{1.66\pi^2g_*^{3/2}}\cdot\frac{e^{-\frac{2E_t}{T_{RH}}}}{T_{eq}T_{RH}^3}.$$ Let us first assume that the cross section is of order 1 in Planck units $(\sigma \sim A_{Pl})$ above the threshold and that the mass of the relics is also of order 1 in Planck units $(m_{rel}\sim m_{Pl})$. In Fig \ref{Fig1}, the relative abundance of relics at the equilibrium time is plotted at the function of the reheating temperature. Figure \ref{Fig2} is a zoom on the relevant region. For a reheating temperature slightly above $10^{-2}$, one is led to a density of relics that can account for dark matter. \begin{figure} \centering \includegraphics[width=1.1\linewidth]{beta_T_large.png} \caption{Fraction of relics at the equilibrium time as a function of the reheating temperature (in Planck units).} \label{Fig1} \end{figure} \begin{figure} \centering \includegraphics[width=1.1\linewidth]{beta_T_short.png} \caption{Zoom on the fraction of relics at the equilibrium time as a function of the reheating temperature (in Planck units), around the relevant zone.} \label{Fig2} \end{figure} Although the influence is negligible, from now on we use the cross section $\sigma(s)=F(s)\pi R_S^2(s)$, where $R_S=2s$. We set $F=1$ above the threshold, but the dependency being linear it is easy to extrapolate to any reasonable value. In Fig. \ref{Fig3}, we show the influence of the threshold energy. The influence of the threshold energy is -- as expected -- very large. Interestingly, if nonperturbative effects were to lower the threshold by one order of magnitude with respect to the expected value, a reheating temperature around the GUT scale would be enough to produce the required density of remnants. \\ \begin{figure} \centering \includegraphics[width=1.1\linewidth]{beta_ener_elargi_plus.png} \caption{Fraction of relics at the equilibrium time as a function of the energy threshold for different reheating temperatures (in Planck units), from $10^{-3}$ to $2\times 10^2$ from bottom to top.} \label{Fig3} \end{figure} It is worth noticing that in the case with extra dimensions \cite{Nakama:2018lwy}, the ``allowed" parameter space is defined by ensuring that the Hubble rate during inflation $H_i$, together with the maximal temperature are smaller than the D-dimensional Planck scale. Meanwhile $H_i$ must remain much larger than the nucleosynthesis temperature. The formed relics account for dark matter basically between a Hubble rate of $10^{-16}$ (in usual four-dimensional Planck units) for a D-dimensional Planck scale of $10^{-7}$ to a Hubble rate of $10^{-3}$ for a D-dimensional Planck scale equal to $M_{Pl}$. \section{The fine-tuning issue} The model presented here seems to require a high level of fine-tuning. In particular, as the dependency upon the reheating temperature is exponential, varying slightly its value leads to a large variation in the density of relics. One can easily check that $$ \frac{dT_{RH}}{T_{RH}} = \frac{d\Omega^{rel}_{eq}}{\Omega^{rel}_{eq}}\left(\frac{2E_T}{T_{RH}}+3\right)^{-1} \approx \frac{T_{RH}}{2E_T}\frac{d\Omega^{rel}_{eq}}{\Omega^{rel}_{eq}} \sim 10^{-4}, $$ to remain in agreement with data. Unquestionably, the model requires a very high level of fine-tuning. \\ The question of fine-tuning is, however, tricky. It is only well defined relatively to an {\it a priori} specific state. In the cosmological framework, the value $\Omega=1$ is clearly such a special case. As is well known, inflation fixes a vanishing (or nearly so) curvature. Basically, as $(\Omega^{-1}-1)=-\frac{3k}{8\pi \rho a^2}$ with $\rho$ remaining constant and the scale factor increasing by at least 60 e-folds, $\Omega$ is fixed (close) to 1 at the end of inflation. There is obviously nothing magical here as $\Omega$ involves a normalization to the critical density that, itself, depends on the Hubble parameter. Should the content of the Universe be different, we would still have $\Omega=1$, with a different expansion rate. This means that changing the parameters of this model would, in fact, not drive the Universe out of the specific situation $\Omega=1$. In this sense it does {\it not} require fine-tuning. \\ One might argue that if the reheating temperature were different, other parameters of the Universe -- {\it e.g.} the (unnormalized) matter density, the equilibrium time, etc. -- would be different. This is correct. But, in our opinion, this is not a fine-tuning issue. This is just the obvious statement that things could have been different and that changing parameters do, of course, change the final state. This is not problematic as long as the ``lost" state was not a very peculiar one.\\ To summarize, the parameters of the model need to be fine-tuned so that the relic density closes the Universe at the equilibrium time -- which is a contingent fact -- but not to ensure $\Omega=1$ which is indeed the {\it a priori} specific feature. \section{Detectability} Testing this model is challenging. A Planck relic has the weight of a grain of dust and no other interaction than gravity to reveal itself to the outer world. Even though the Planck mass is very small from the gravitational viewpoint, it is very large from the particle physics viewpoint. The number density of relics is therefore extremely small, even if they are to account for all the dark matter. A density of $10^{-18}$ relics par cubic meter -- that is one relic per volume of a million times the one of planet Earth -- is enough to close the Universe. Detection seems hopeless. The cross section (or greybody factor) hopefully does {\it not} tend to 0 for the absorption of fermions in the low-energy limit \cite{MacGibbon:1990zk}. However, even avoiding this catastrophic suppression (which does exist for higher spins), the area involved is of the order of the Planck one, $10^{-66}$cm$^2$, which indeed makes direct detection impossible in practice. \\ We consider here another possibility associated with the coalescences of relics that have occurred during the history of the Universe. Contrarily to what is sometimes done for PBHs we shall not focus on the emission of gravitational waves whose amplitude would be negligible and frequency way too high for any detector. However, something else is also expected to happen in this model. When two remnants merge, a higher-mass black hole is formed and evaporates until it reaches again $m_{rel}\sim m_{Pl}$ assumed to be the minimal one. This should happen preferably via the emission of one (or a few) quantum close to the Planck energy. Each merging should therefore emit about a Planck-energy particle which is, in principle, detectable. This sketch should of course be refined but the hypothesis is realistic enough to investigate whether this path is potentially fruitful.\\ We estimate the merging rate following \cite{Sasaki:2016jop}, which builds on \cite{Nakamura:1997sm}. It is not hard to show that the probability of coalescence in the time interval $(t,t+dt)$ is given by $$ dP= \frac{3}{58} \bigg[ -{\left( \frac{t}{T} \right)}^{3/8} +{\left( \frac{t}{T} \right)}^{3/37} \bigg] \frac{dt}{t}, $$ where $T \equiv {\bar x}^4 \frac{3}{170} {(Gm_{rel})}^{-3}$, $$ {\bar x}={\left( \frac{M_{rel}}{\rho_{rel}(z_{\rm eq})} \right)}^{1/3} =\frac{1}{(1+z_{\rm eq})} {\left( \frac{8\pi G}{3H_0^2} \frac{m_{rel}}{\Omega_{rel}} \right)}^{1/3} $$ being the mean separation of relics at the equilibrium time. In those formulas, we have reinserted the constants to make the use easier. The event rate is then given by $$ n_{merg}= \frac{3H_0^2}{8\pi G} \frac{\Omega_{rel}}{m_{rel}} \frac{dP}{dt}\bigg|_{t_0}. $$ This is of the order of $10^{-45}{\rm m}^{-3}{\rm s}^{-1}$. It is then straightforward to estimate the measured flux on a detector of surface $S_d$ and solid angle acceptance $\Omega_{acc}$, integrated up to a distance $R_{max}$: $$ \Phi_{mes}=\int_{0}^{R_{max}}n_{merg}S_d\frac{\Omega_{acc}}{4\pi}dR. $$ Although it is well known that TeV photons are absorbed by interactions with the infrared background and PeV photons by interactions with the CMB photons, there is no strong absorption to be expected for Planck-energy photons. The wavelength of the background photons that would lead to a center-of-mass energy close to the electron mass is way larger than any expected background. The $R_{max}$ value can therefore be assumed to be much larger than for usual high-energy cosmic-ray estimations. For detectors like Auger \cite{Covault:2019mdm}, the expected flux is too small for a detection. For Euso-like instruments \cite{Inoue:2009zz} -- looking at the atmosphere from the space station -- we are led to an order of magnitude not far from a fraction of an event per year. For speculative ideas about using giant planets as cosmic-ray detectors \cite{Rimmer:2014cia}, we reach a dozen events per year. This is obviously a hard task but, interestingly, the model is clearly not unfalsifiable. \\ Furthermore, the idea that the Hawking radiation due to the formed black holes before they become stable relics might play a role in baryogenesis was considered in \cite{Alexander:2007gj}. The possibility that they might have an effect on the primordial nucleosynthesis should also be considered. In the case considered in this article -- with a true Planck scale at the four-dimensional value --, the relics are so heavy and heir number density so small that it is easy to check that the associated signal would be entirely negligible. \section{Conclusion} The idea that dark matter could be made of Planck relics is not new. Nor is the possibility that black holes could be formed by the scattering of trans-Planckian particles in the early Universe. In this article we have gathered all the ingredients and argued that the resulting model is not (that) exotic. Unquestionably, the very high reheating temperature required raises questions. We have however explained that the upper bounds usually considered can be circumvented. Still, building a consistent cosmological model with such a high scale for inflation is not trivial and should be considered as a challenge.\\ There is no obvious solution to the dark matter problem, which is one of the oldest enigmas of contemporary cosmology. The scenario suggested here is based on a minimum amount of ``new physics", if not only on known physics. It requires a quite unusual cosmological behavior but no new particle physics input is needed. From this point of view, it might be worth being considered seriously.\\ Several developments would be worth being considered: \begin{itemize} \item the possibility that nonthermal processes do happen during the reheating, eventually enhancing the high-energy tail of the distribution should be studied with care. \item the model presented in this article should be investigated in the context of noninflationary bouncing cosmologies, expected to be more favorable to this scenario. \item the experimental possibilities that were outlined should be made more precise thanks to Monte Carlo simulations. \item in addition to the possible detection of extremely high-energy gamma rays, it might be interesting to consider a possible low-energy (in the 100 MeV range) signal due to the disintegration of neutral pions produced by the hadronization of quarks or gluons emitted by the merging of relics. \end{itemize} \section{Acknowledgments} K.M is supported by a grant from the CFM foundation.
\section{Introduction} The fractionalized quasi-particle excitations of topological states of matter have attracted a lot of attention in the recent years. A particulary interesting class of these quasi-particles are so-called non-Abelian anyons. Their remarkable exchange statistics makes them a resource for decoherence-free quantum computing \cite{Kita03} which has further driven the search for physical realizations. Candidate systems are the topologically ordered phases of two-dimensional quantum matter such as the fractional quantum Hall states or $p+\mathrm{i}p$ superconductors where non-Abelian anyons may appear as zero-energy degrees of freedom of gapped excitations in the bulk \cite{MoRe91,ReRe99,ReGr00}. Mathematically, anyons are objects in a braided tensor category. In this description they are characterized by their braiding and fusion properties. These completely determine the physics of a dilute anyon gas and quantum computing operations can be realized based on the braiding of the anyonic quasi-particles \cite{NSSF08}. The fusion rules on the other hand determine the Hilbert space of a many-anyon system as well as the possible local interactions between pairs of anyons \cite{FTLT07}. The presence of the latter lifts the degeneracy of the zero-energy modes and leads to the anomalous collective behaviour of systems with a finite density of anyons, e.g.\ when they condense at the boundaries between phases of different topological order. This can be exploited to stabilize topological quantum memories \cite{Brown.etal16}. The properties of interacting anyons forming a high density condensate on the edge of the topologically ordered phase of a two dimensionsal quantum system have been studied in various effective lattice models \cite{FTLT07,GATH13,Finch.etal14,FiFF14,BrFF16,VeJS17,FiFF18}. Combining numerical methods with insights from exactly solvable models and conformal field theory important insights into the collective behaviour of different types of non-Abelian anyons have been obtained. Unfortunately, these lattice models do not allow to tune the anyon density. To study the transition between the low density phase of 'bare' anyons and the collective state realized at high anyon densities one can follow the approach of \cite{Tsve14a,BoFr18,BoFr18a}: at sufficiently low temperatures the Hamiltonian of an integrable one-dimensional model of fermions carrying $SU(k)$ spin and $U(N_f)$ flavour indices with a particular current-current interaction can be separated into commuting parts describing the fractionalized charge, spin and flavour degrees of freedom separately. Concentrating on the spin sector the elementary excitations are found to be massive solitons forming multiplets in fundamental representations of $SU(k)$ and bound states thereof. Residing on these solitons are $SU(k)_{N_f}$ anyons. Therefore the density of the anyonic degrees of freedom can be controlled together with that of the solitons by the variation of the magnetic fields. This allows, by solving the thermodynamic Bethe ansatz equations for different external fields, to study the condensation of $SU(k)_{N_f}$ anyons in detail. In the present paper we extend this approach to fermions with an $SO(5)$ spin degree of freedom.\footnote{% $SO(5)$ symmetric electron models have been constructed e.g.\ in Refs.~\cite{ScZH98,FrSt01}. In the present paper, however, we do not discuss the origin of this and the additional flavour degrees of freedom but rather concentrate on the possible existence of $SO(5)_{N_f}$ anyons in such models and their signature in the thermodynamical properties.} Specifically we consider a model defined by Hamiltonian densities describing relativistic chiral fermions in external magnetic fields $h_i$ ($i=1,2$) perturbed by an anisotropic spin-spin interaction \begin{align} \begin{split} \label{so5_NfModel} \mathcal{H}& -\mathrm{i}\bar{\psi}_{f}\gamma_\mu \partial^{\mu}\psi_f -\sum_{f=1}^{N_f}h_i\,\bar{\psi}_f\gamma_0H^i_c\psi_f +\mathcal{H}_{\text{int}}\,,\\ \mathcal{H}_{\text{int}}& =\lambda_{\parallel}\sum_{i=1}^{2}(\bar{\psi}_f\gamma_\mu H^{i}_c\psi_f)^2 +\lambda_{\perp}\sum_{\alpha>0}\frac{|\alpha|^2}{2} (\bar{\psi}_f\gamma_\mu E^{\alpha}\psi_f) (\bar{\psi}_{f'}\gamma_\mu E^{-\alpha}\psi_{f'})\,,\\ \end{split} \end{align} where $\psi_{fa}$ are Dirac spinors with $U(N_f)$ `flavour' indices $f,f'=1,\dots,N_f$ and $SO(5)$ `spin' indices $a=1,\dots,5$ (the latter are suppressed in (\ref{so5_NfModel})). $H^i_{c}$ ($i=1,2$) are the generators of the $SO(5)$ Cartan subalgebra while the $SO(5)$ ladder operator for a root $\alpha$ in the Cartan-Weyl basis is denoted by $E^\alpha$. Moreover, the $\gamma_\mu$ ($\mu=1,2$) are Dirac matrices and $\bar{\psi}_f=\gamma_0\psi^\dagger_f$. Similar as in the models for fermions carrying $SU(k)$ spin mentioned above we find that the excitations in the spin sector of (\ref{so5_NfModel}) are massive solitons. Here they form multiplets in the $SO(5)$ vector and spinor representations and, in addition, carry an internal degree of freedom which we identify as non-Abelian $SO(5)_{N_f}$ anyons. The density of solitons can be controlled by the external fields coupling to the $SO(5)$ Cartan generators. For sufficient large magnetic fields solitons form a condensate described by a $U(1)$ Gaussian model. The condensation of the solitons is accompanied by the formation of collective states for the anyon degrees of freedom which are found to be described by generalized parafermionic conformal field theories. We note that this complements previous results obtained for the high density collective states of interacting $SO(5)_2$ anyons in lattice models \cite{FiFF14,FiFF18}. \section{Bethe ansatz for a perturbed $\mathbf{SO(5)_{N_f}}$ WZNW model} \label{sec:SO5_IntFermions} In the models of fermions with $SU(k)$ spin studied previously \cite{Tsve14a,BoFr18,BoFr18a} conformal embedding has been used to isolate the part of the Hamiltonian describing the collective excitations in the spin sector \cite{FrMSbook96}. Here, we rely instead on the spectrum of the model obtained from the exact solution of (\ref{so5_NfModel}): the isotropic model, $\lambda_\parallel=\lambda_\perp$ has been solved using the Bethe ansatz \cite{PoWi83,OgWi86,OgRW87}. In the limit $N_f\to\infty$ the fermionic model is equivalent to the $SO(5)\times SO(5)$ chiral model and its spectrum and magnetic properties have been studied in Ref.~\cite{Naka86}. For generic anisotropic choice of the coupling constants the integrability of the Hamiltonian is based on a deformation of the corresponding factorized scattering matrices \cite{Bazhanov85,Jimb86,Bazhanov87,ReWi87}. The low-energy excitations of (\ref{so5_NfModel}) carry charge, flavour and spin degrees of freedom (cf. \cite{OgRW87} for the isotropic case). Here we are interested solely in the $SO(5)$ spin degrees of freedom. By placing $\mathcal{N}$ fermions into a box of length $L$ with periodic boundary conditions the energy contribution of the spin excitations specified by quantum numbers $N_1,\,N_2$ is \begin{equation} \label{so5_energy} E=\frac{\mathcal{N}}{L}\sum_{\alpha=1}^{N_1}\sum_{\tau=\pm 1}\frac{\tau}{2\mathrm{i}}\ln\left(\frac{\sinh(\frac{\pi}{2p_0}(\lambda^{(1)}_\alpha+\tau/g-N_f\mathrm{i}))}{\sinh(\frac{\pi}{2p_0}(\lambda^{(1)}_\alpha+\tau/g+N_f\mathrm{i}))} \right)+N_1 H_1 +N_2 H_2 -\mathcal{N}\left(H_1+H_2\right)\,, \end{equation} where $g$, $p_0$ are functions of the coupling constants $\lambda_{\parallel}$ and $\lambda_\perp$ in (\ref{so5_NfModel}). $H_1$ and $H_2$ are linear combinations of the magnetic fields introduced above, i.e.\ $H_1\equiv{\alpha}^1\cdot\vec{h}$, $H_2\equiv{\alpha}^2\cdot\vec{h}$ with the simple roots ${\alpha}^j$, $j=1,2$, of $SO(5)$, see Appendix~~\ref{app:SO5}. Also notice that the relativistic invariance of the fermion model is broken by the choice of boundary conditions but will be restored later by considering observables in the scaling limit $L,\mathcal{N}\rightarrow \infty$ and $g\ll 1$ such that the mass of the elementary excitations is small compared to the particle density $\mathcal{N}/L$. The complex parameters $\lambda_\alpha^{(m)}$ with $\alpha=1,\dots,N_m$ ($m=1,2$) appearing in (\ref{so5_energy}) are so called Bethe roots solving the hierachy of Bethe equations (cf. Refs. \cite{Resh85,Naka86} for the isotropic case) \begin{equation} \label{so5_betheeq} \begin{aligned} \prod_{\tau=\pm 1}e_{N_f}(\lambda^{(1)}_\alpha+\tau/g)^{\mathcal{N}/2}&=\prod_{\beta \neq \alpha}^{N_1}e_2(\lambda^ {(1)}_\alpha - \lambda^{(1)}_{\beta})\prod_{\beta=1}^{N_2}e_{-1}(\lambda^{(1)}_\alpha-\lambda^{(2)}_\beta)\,,\quad \alpha=1,\ldots N_1\,,\\ \prod_{\beta=1}^{N_1}e_{1}(\lambda^{(2)}_\alpha-\lambda^{(1)}_\beta)&=\prod_{\beta \neq \alpha}^{N_2}e_1(\lambda^{(2)}_\alpha-\lambda^{(2)}_\beta)\,,\quad \alpha=1,\ldots,N_2\,, \end{aligned} \end{equation} where $e_k(x)=\sinh\left(\frac{\pi}{2p_0}(x+{\mathrm i}k)\right)/\sinh\left(\frac{\pi}{2p_0}(x-{\mathrm i}k)\right)$. Based on equations (\ref{so5_betheeq}), (\ref{so5_energy}) the thermodynamics of the model can be studied provided that the solutions to the Bethe equations describing the eigenstates in the limit $\mathcal{N}\to\infty$ are known. Here we argue that the root configurations corresponding to the ground state and excitations relevant for the low-temperature behavior of (\ref{so5_NfModel}) can be built based on a generalized string hypothesis, see e.g.\ Refs.~\cite{TaSu72,Martins91}: in the thermodynamic limit the Bethe roots $\lambda_\alpha^{(m)}$ are grouped into $j$\textit{-strings} of length $n_j$ and with parity $v_{n_j}\in\{\pm 1\}$ \begin{equation} \label{so5_string} \begin{aligned} \lambda^{(1)}_{j,\alpha,\ell}&=\lambda^{(1)}_{j,\alpha} + i\left(n_j+1-2\ell\right)+\frac{p_0}{2}(1-v^{(1)}_{N_f}v^{(1)}_{n_j}), \quad \quad \ell=1,\dots,n_j\,,\\ \lambda^{(2)}_{j,\alpha,\ell}&=\lambda^{(2)}_{j,\alpha} + \frac{i}{2}\left(n_j+1-2\ell\right)+\frac{p_0}{2}(1-v^{(2)}_{2N_f}v^{(2)}_{n_j}), \quad \quad \ell=1,\dots,n_j \end{aligned} \end{equation} with real centers $\lambda^{(m)}_{j,\alpha} \in \mathbb{R}$. The allowed lengths and parities depend on the parameter $p_0$. To simplify the the discussion below we assume that $p_0=N_f+1/\nu$ with integer $\nu>2$ where only a few string configurations are relevant for the low-temperature thermodynamics \begin{alignat}{3} &n^{(1)}_{j_{2,1}}= {j_{2,1}}\,, \quad &&v^{(1)}_{j_{2,1}}=1\,, \qquad &&1\leq j_{2,1}\leq N_f-1\,,\nonumber\\ &n^{(2)}_{j_{2,2}}= {j_{2,2}}\,, \quad &&v^{(2)}_{j_{2,2}}=1\,, \qquad &&1\leq j_{2,2}\leq 2N_f-1\,,\nonumber\\ &n^{(1)}_{\tilde{j}_{0,1}}=N_f(\nu-1)+1\,, \quad &&v^{(1)}_{\tilde{j}_{0,1}}=(-1)^{\nu}\,, \qquad &&\tilde{j}_{0,1} =N_f\,,\nonumber\\ &n^{(1)}_{j_{0,1}}=N_f\,, \quad &&v^{(1)}_{j_{0,1}}=1\,, \qquad &&j_{0,1}=N_f+1\,,\nonumber\\ &n^{(2)}_{j_{0,2}}=2N_f\,, \quad &&v^{(2)}_{j_{0,2}}=1\,, \qquad &&j_{0,2}=2N_f+1\,,\nonumber \end{alignat} together with the string configuration for even $\nu$ \begin{equation}\nonumber n^{(2)}_{\tilde{j}_{0,2}}=2N_f(\nu/2-1)+1\,, \quad v^{(2)}_{\tilde{j}_{0,2}}=(-1)^{\nu/2}\,, \qquad \tilde{j}_{0,2} =2N_f\,.\nonumber\\ \end{equation} Within the root density approach the Bethe equations are rewritten as coupled integral equations for the densities of these strings \cite{YaYa66b}. For vanishing external fields one finds that the Bethe root configuration corresponding to the lowest energy state is described by finite densities of $j_{0,m}$-strings on the levels $m=1,2$. The elementary excitations above this ground state are of three types: similar as for the discussion of the perturbed ${SU}(3)_{N_f}$ WZNW model the excitations corresponding to holes in the distributions of $j_{0,m}$-strings on level $m=1,2$ are solitons. From their coupling to the fields it is found that they carry quantum numbers of the five-dimensional vector representation of ${SO}(5)$ with Young diagram $[1,0]$ and the four-dimensional spinor representation $[1,1]$, respectively. Hence, we refer to solitons of the first level as $[1,0]$-solitons and to solitons of the second level as $[1,1]$-solitons. The excitations corresponding to $j_{2,m}$-strings are denoted by auxiliary modes, while the contributions of breather excitations are assumed to be negligible for low temperatures. The densities $\rho^{(m)}_j(\lambda)$ of these excitations (and $\rho^{h(m)}_j(\lambda)$ for the corresponding holes) satisfy the integral equations \begin{equation} \label{so5_densities2} \rho^{h(m)}_k(\lambda)=\rho^{(m)}_{0,k}(\lambda)-\sum_{l=1}^{2}\sum_jB^{(m,l)}_{kj}\ast \rho^{(l)}_j \qquad m=1,2\,, \end{equation} see Appendix~\ref{so5_app:onTBA}. As mentioned above relativistic invariance is restored in the scaling limit $g\ll 1$ where the solitons are massive particles with bare densities $\rho^{(m)}_{0,j_{0,m}}$ and bare energies $\epsilon^{(m)}_{0,j_{0,m}}$ \begin{align} \label{so5_baredensity1} \rho^{(m)}_{0,j_{0,m}}(\lambda)\stackrel{g\ll 1}{=}\begin{cases} \frac{2\sqrt{3}M_0}{6}\cosh(\pi \lambda/3) \quad &\text{if }m=1\,,\\ \frac{2M_0}{6}\cosh(\pi \lambda/3) \quad &\text{if }m=2\,, \end{cases} \end{align} \begin{align} \label{so5_energysol1} \epsilon^{(m)}_{0,j_{0,m}}(\lambda)\stackrel{g\ll 1}{=}\begin{cases} 2\sqrt{3}M_0\cosh(\pi \lambda/3)-zH_1-zH_2 \quad &\text{if }m=1\,,\\ 2M_0\cosh(\pi \lambda/3)-\frac{z}{2}H_1-zH_2 \quad &\text{if }m=2\,, \end{cases} \end{align} where $z=(1+N_f\nu)$. The prefactors $2\sqrt{3}M_0$ and $2M_0$ with $M_0\equiv e^{-\pi/{3g}}$ are the masses of the $[1,0]$- and $[1,1]$-solitons, respectively. Furthermore, the corresponding charges can be read off from (\ref{so5_energysol1}): for a general excitation with mass $M$ and bare energy $\epsilon_0(\lambda)$ its charges $(q_1,q_2)$ are defined by \begin{equation} \label{so5_charges} \epsilon_0(\lambda)= M\cosh\left(\frac{\pi\lambda}{3}\right) -z \left(\omega_1 h_1 + \omega_2 h_2\right) =M\cosh\left(\frac{\pi\lambda}{3}\right)-z\left( q_1 H_1 + q_2 H_2\right)\,, \end{equation} where $\omega_1,\,\omega_2$ are the components of a weight in a ${SO}(5)$ representation. Consequently, $[1,0]$-solitons of type $j_{0,1}$ carry the charge $(q_1,q_2)=(1,1)$, while $[1,1]$-solitons of type $j_{0,2}$ carry the charge $(q_1,q_2)=(1/2,1)$. These charges correspond to the highest weight states of the $[1,0]$ (vector) and $[1,1]$ (spinor) representation of ${SO}(5)$. All possible charges of $[1,0]$- and $[1,1]$-solitons are shown in Figure~\ref{fig:so5_weightscharges}. \begin{figure}[t]% \centering \captionsetup[subfigure]{singlelinecheck=on} \subfloat[weights]{{\includegraphics[width=7cm]{Weights} }}% \qquad \subfloat[charges]{{\includegraphics[width=7cm]{Charges} }}% \caption{Relationship between the weights (a) of the $[1,0]$ (Dynkin labels $(1,0)$) and $[1,1]$ (Dynkin labels $(0,1)$) representation of ${SO}(5)$ and the charges (b) determined by (\ref{so5_charges}) with the projection of the magnetic fields $\vec{h}=(h_1,h_2)$ in (\ref{so5_NfModel}) on the directions of the simple roots, $H_1={\alpha^1}\cdot \vec{h}$, $H_2={\alpha^2}\cdot \vec{h}$.}% \label{fig:so5_weightscharges}% \end{figure} Similarly, the bare densities and energies of the $\tilde{j}_{0,m}$-strings are \begin{align} \label{so5_baredensity2} \rho^{(m)}_{0,\tilde{j}_{0,m}}(\lambda)\stackrel{g\ll 1}{=}\begin{cases} \frac{2\sqrt{3}M_0}{6}\cosh(\pi \lambda/3) \quad &\text{if }m=1\,,\\ \frac{2M_0}{6}\cosh(\pi \lambda/3) \quad &\text{if }m=2\,, \end{cases} \end{align} \begin{align} \label{so5_energysol2} \epsilon^{(m)}_{0,\tilde{j}_{0,m}}(\lambda)\stackrel{g\ll 1}{=}\begin{cases} 2\sqrt{3}M_0\cosh(\pi \lambda/3)-zH_2 \quad &\text{if }m=1\,,\\ 2M_0\cosh(\pi \lambda/3)-\frac{z}{2}H_1 \quad &\text{if }m=2\,. \end{cases} \end{align} The corresponding masses of these excitations coincide with the masses of the $[1,0]$- and $[1,1]$-solitons, respectively. However, they couple to these modes in a different way, i.e. $\tilde{j}_{0,1}$-strings carry the charge $(0,1)$ and $\tilde{j}_{0,2}$-strings the charge $(1/2,0)$. Therefore, the excitations of type $\tilde{j}_{0,1}$ and $\tilde{j}_{0,2}$ are descendant states of the highest weight states in the $[1,0]$ and $[1,1]$ representation. From now on excitations of type $\{j_{0,1},\tilde{j}_{0,1}\}$ are labeled as $[1,0]$-solitons while excitations of type $\{j_{0,2},\tilde{j}_{0,2}\}$ are labeled as $[1,1]$-solitons. The masses and ${SO}(5)$ charges of the auxiliary modes vanish, i.e. \ ${\rho}^{(m)}_{0,j_2}(\lambda) = 0 = {\epsilon}^{(m)}_{0,j_2}(\lambda)$. The energy density of a macro-state with densities given by (\ref{so5_densities2}) is \begin{equation} \label{so5_energy3} \Delta\mathcal{E}=\sum_{m=1}^{2}\sum_{j}\int_{-\infty}^{\infty}\text{d}\lambda\,{\epsilon}^{(m)}_{0,j}(\lambda)\rho^{(m)}_{j}(\lambda)\,. \end{equation} Furthermore, it is convenient to define the masses $M^{(m)}_k$ of the different solitons as \begin{equation} \begin{aligned}\nonumber M^{(m)}_{k} &\equiv \begin{cases} 2\sqrt{3}M_{0} & \text{if }m=1,\,k\in\{j_{0,1},\tilde{j}_{0,1}\}\,,\\ 2M_{0} & \text{if }m=2,\,k\in\{j_{0,2},\tilde{j}_{0,2}\} \end{cases}\,.\nonumber \end{aligned} \end{equation} \subsection{Low-temperature thermodynamics} \label{sec:SO5_Thermodynamics} To derive the physical properties of the different quasi-particles appearing in the Bethe ansatz solution of the model (\ref{so5_NfModel}) its low-temperature thermodynamics is studied. The equilibrium state at finite temperature is obtained by minimizing the free energy, $F/N=\mathcal{E}-T\mathcal{S}$, with the combinatorial entropy \cite{YaYa69} \begin{equation} \label{so5_entropy} \mathcal{S}=\sum_{j\geq 1}\int_{-\infty}^{+\infty}\text{d}\lambda\, \left[(\rho_j+\rho^h_j)\ln(\rho_j+\rho^h_j) -\rho_j\ln\rho_j-\rho^h_j\ln\rho^h_j\right]\,. \end{equation} The resulting thermodynamic Bethe ansatz (TBA) equations read \begin{align} \label{so5_dressedeinteq} &T\ln(1+e^{\epsilon^{(m)}_k/T})= \epsilon^{(m)}_{0,k}(\lambda) + \sum_{l=1}^{2}\sum_{j\geq 1} B^{(l,m)}_{jk}\ast T\ln(1+e^{-\epsilon^{(l)}_j/T})\,, \end{align} where the dressed energies $\epsilon^{(m)}_j(\lambda)$ have been introduced through $e^{-\epsilon^{(m)}_j/T}= \rho^{(m)}_j/\rho^{h(m)}_j$. To study the properties of free and interacting solitons it is convenient to rewrite the integral equations of the auxiliary modes: the auxiliary modes become independent of $\lambda$ for temperatures small compared to the soliton gaps, $T \ll \epsilon^{(m)}_{j_{0,m}}(0)$. Similarly, they take constant values for finite values of $\lambda$ in the condensed phases when $T \ll |\epsilon^{(m)}_{j_{0,m}}(0)|$. In these cases the effective equations describing the auxiliary modes are \begin{align} \label{so5_auxequations} \begin{split} \epsilon^{(1)}_{j_{2,1}}=&\delta_{j_{2,1},N_f-1}T\ln\left(1+e^{-\epsilon^{(1)}_{j_{0,1}}/T}\right)^{\frac{1}{2}}+T\ln \left(1+e^{\epsilon^{(1)}_{j_{2,1}-1}/T}\right)^{\frac{1}{2}}\left(1+e^{\epsilon^{(1)}_{j_{2,1}+1}/T}\right)^{\frac{1}{2}}\\ &-T\ln \left(1+e^{-\epsilon^{(2)}_{2j_{2,1}-1}/T}\right)^{\frac{1}{2}}\left(1+e^{-\epsilon^{(2)}_{2j_{2,1}}/T}\right)\left(1+e^{-\epsilon^{(2)}_{2j_{2,1}+1}/T}\right)^{\frac{1}{2}}\,,\\ \epsilon^{(2)}_{j_{2,2}}=&\delta_{j_{2,2},2N_f-1}T\ln\left(1+e^{-\epsilon^{(2)}_{j_{0,2}}/T}\right)^{\frac{1}{2}}+T\ln \left(1+e^{\epsilon^{(2)}_{j_{2,2}-1}/T}\right)^{\frac{1}{2}}\left(1+e^{\epsilon^{(2)}_{j_{2,2}+1}/T}\right)^{\frac{1}{2}}\\ &-T\ln \left(1+e^{-\epsilon^{(1)}_{j_{2,2}/2}/T}\right)^{\frac{1}{2}}\,, \end{split} \end{align} where $\epsilon^{(1)}_0=\epsilon^{(2)}_{0}=-\infty$ and $\epsilon^{(1)}_{j_{2,2}/2}=\infty$ if $j_{2,2}$ is odd. In terms of the dressed energies the free energy per particle is \begin{equation} \label{so5_freeenergy} \begin{aligned} \frac{F}{\mathcal{N}}&\,\,=\,\,-T\sum_{m=1}^{2}\sum_{j \notin\{j_{2,m}\}} \int_{-\infty}^{\infty}\text{d}\lambda\, \rho^{(m)}_{0,j}(\lambda)\ln(1+e^{-\epsilon^{(m)}_{j}(\lambda)/T})\,\\ &\stackrel{g\ll 1}{=}-\frac{T}{6}\sum_{m=1}^{2}\sum_{j \notin\{j_{2,m}\}} M^{(m)}_{j}\int_{-\infty}^{\infty}\text{d}\lambda\, \cosh(\pi\lambda/3)\ln(1+e^{-\epsilon^{(m)}_{j}(\lambda)/T})\,. \end{aligned} \end{equation} Solving the equations (\ref{so5_dressedeinteq}) the spectrum of the model (\ref{so5_NfModel}) for a given temperature $T$ and fields $H_1,\,H_2$ is obtained. From the expressions (\ref{so5_energysol1}) and (\ref{so5_energysol2}) for the bare energies of the elementary excitations the qualitative behavior of these modes at low temperatures can be deduced, see Figure~\ref{so5_fig:phases0} for $T\to0$: \begin{figure}[ht]% \centering \includegraphics[width=0.85\textwidth]{PhaseDiagram_T=0} \caption{Zero temperature phase diagram of the model (\ref{so5_NfModel}: as the fields $H_{1,2}$ are increased solitons carrying quantum numbers of the highest weight states in the $[1,0]$ vector and the $[1,1]$ spinor representation of $SO(5)$ condense (the actual location of the phase boundaries is obtained from the numerical solution of the TBA equations (\ref{so5_dressedeinteq}) for $T=0$ and $p_0=2+1/3$).}% \label{so5_fig:phases0}% \end{figure} as long as $zH_2<\text{min}\left( 2\sqrt{3}M_0-zH_1,\, 2M_0-zH_1/2\right)$ solitons remain gapped. By increasing the field $H_1$ (above $zH_1\geq 2\sqrt{3}M_0-zH_2$) for sufficiently small $H_2$ ($zH_2<(4-2\sqrt{3})M_0$) the gap of the $[1,0]$-solitons closes and they condense into a phase with finite density. In this collective state the degeneracy of the auxiliary modes is lifted while the gap of the $[1,1]$-solitons remains open until $zH_1\gg M_0$, see Figure~\ref{so5_fig:spec1}(a) for the $T=0$ spectrum with $H_2\equiv0$. Similarly, for sufficiently small $H_1$ ($zH_1<4(\sqrt{3}-1)M_0$) increasing the field $H_2$ (above $zH_2\geq 2M_0-zH_1/2$) closes the gap of the $[1,1]$-solitons, while the gap of the $[1,0]$-solitons remains open until $zH_2\gg M_0$, see Figure~\ref{so5_fig:spec1}(b) for the $T=0$ spectrum with $H_1\equiv0$. In Figure~\ref{so5_fig:spec1}(c) we display the spectrum of elementary excitations for a combination of magnetic fields, where the gaps of $[1,0]$- and $[1,1]$-solitons close simultaneously. Notice that the string hypothesis (\ref{so5_string}) does not capture all solitons of the $[1,0]$ and $[1,1]$ multiplet that may occur. However, from the coupling of their charges to the fields the energy gaps of all $[1,0]$- and $[1,1]$-solitons can be predicted in the non-interacting regime, see Figures~\ref{so5_fig:spec1}. In the following we will choose the temperatures to be sufficiently small such that only the solitons with charges corresponding to the highest weight states of the $[1,0]$ and $[1,1]$ multiplet, i.e.\ excitations of type $j_{0,m}$, contribute to the thermodynamics. \begin{figure}[ht]% \centering \captionsetup[subfigure]{singlelinecheck=on} \subfloat[]{{\includegraphics[width=0.5\textwidth]{Spectrum_H2=0} }}% \subfloat[]{{\includegraphics[width=0.5\textwidth]{Spectrum_H1=0} }}% \subfloat[]{{\includegraphics[width=0.5\textwidth]{Spectrum_H2=-0_06+0_21H1} }} \caption{The zero temperature spectrum of elementary excitations (and Fermi energy of solitons in the condensed phases) $\epsilon^{(m)}_j(0)$ obtained from the numerical solution of (\ref{so5_dressedeinteq}) for $p_0=2+1/4$: (a) for $H_2=0$ as a function of the field $H_1$, (b) for $H_1=0$ as function of $H_2$, and (c) for $zH_2/M_0=-0.06+0.21\,zH_1/M_0$ as function of $H_1$. Once the gap of $[1,0]$-solitons in (a) or $[1,1]$-solitons in (b) closes the system forms a collective state of these objects For sufficiently large fields both $[1,0]$- and $[1,1]$-solitons condense as in (c). In these phases the degeneracy of the auxiliary modes is lifted. }% \label{so5_fig:spec1}% \end{figure} \subsection{Non-interacting solitons} For fields $zH_2<\min\left(2\sqrt{3}M_0-zH_1,2M_0-zH_1/2\right)$ temperatures below the gaps of the solitons are considered, i.e.\ $T\ll \min\left(\epsilon^{(1)}_{0,j_{0,1}}(0),\,\epsilon^{(2)}_{0,j_{0,2}}(0)\right)$. Analogously to \cite{Tsve14a,BoFr18,BoFr18a} the nonlinear integral equations (\ref{so5_dressedeinteq}) can be solved iteratively in this regime: the energies $\epsilon^{(m)}_{k}$ of solitons are well described by their first order approximation while those of the auxiliary modes can be replaced by the asymptotic solution for $|\lambda|\rightarrow \infty$, see Table~\ref{table:auxnumsol} for $2\leq N_f\leq 5$. \begin{table}[ht] \centering \bgroup \def1.7{1.5} \begin{tabular}{l | l | l} \toprule $N_f$ & $\left\{\exp\left(-\epsilon^{(1)}_{j_{2,1}}/T\right)\right\}_{j_{2,1}=1}^{N_f-1}$ & $\left\{\exp\left(-\epsilon^{(2)}_{j_{2,2}}/T\right)\right\}_{j_{2,2}=1}^{2N_f-1}$\\[0.2cm] \hline $2$ & $3$ & $\frac{2}{3},\,\frac{4}{5},\,\frac{2}{3}$ \\ $3$ & $\sqrt{3},\,\sqrt{3}$ & $\frac{1}{\sqrt{3}},\,\frac{1}{2},\,\frac{1}{3},\,\frac{1}{2},\,\frac{1}{\sqrt{3}}$ \\ $4$ & $1.34601,\,0.91557,\,1.34601$ & $0.53679,\,0.40477,\,0.24991,\,0.27673,\,0.24991,$ \\ & & $0.40477,\,0.53679$ \\ $5$ & $1.16591,\,0.66818,\,0.66818,\, 1.16591$ & $0.51415,\,0.35935,\,0.21297,\,0.20711,\,0.17157, $ \\ & & $0.20711,\,0.21297,\,0.35935,\,0.51415$ \\ \botrule \end{tabular} \egroup \caption{Asymptotic solution ($|\lambda|\rightarrow \infty$) of auxiliary modes ($\epsilon^{(m)}_{j_{2,m}}/T\equiv \epsilon^{(m)}_{j_{2,m}}(\lambda\rightarrow \infty)/T$) for $2\leq N_f\leq 5$ derived numerically from Eqs.~(\ref{so5_auxequations}) with $\epsilon^{(m)}_{j_{0,m}}/T=\infty$.} \label{table:auxnumsol} \end{table} For the other modes \begin{equation}\nonumber \epsilon^{(m)}_{j}(\lambda)=\epsilon^{(m)}_{0,j}(\lambda)-T\ln Q^{(m)}_j \end{equation} is obtained for $m=1,\,j\in\{j_{0,1},\tilde{j}_{0,1}\}$ and $m=2,\,j\in\{j_{0,2},\tilde{j}_{0,2}\}$ resulting in the free energy \begin{equation} \label{so5_eq:Fideal} \frac{F}{\mathcal{N}}=-\sum_{m=1}^{2}\sum_{j \notin\{j_{2,m}\}}TQ_j^{(m)}\int\frac{\text{d}p}{2\pi}e^{-\epsilon^{(m)}_{0,j}(0)/T-p^2/2M^{(m)}_{j}T}\,, \end{equation} where $Q^{(m)}_{k}$ ($k\neq j_{2,m}$) depends on the asymptotic solution of the auxiliary modes \begin{equation} \label{so5_quantumdimform} Q^{(m)}_k=\prod_{i=1}^{2}\prod_{j_{2,i}}\left(1+e^{-\epsilon^{(i)}_{j_{2,i}}/T}\right)^{-B^{(i,m)}_{j_{2,m}k}(0)}\,. \end{equation} See Table~\ref{table:so5_quantumdims} for explicit values of $Q^{(m)}_{k}$ for $2\leq N_f\leq 5$. \begin{table}[ht] \centering \bgroup \def1.7{1.7} \begin{tabular}{l | c | c} \toprule $N_f$ & $Q^{(1)}$ & $Q^{(2)}$\\[0.1cm] \hline $2$ & $2$ & $\sqrt{5}$ \\ $3$ & $1+\sqrt{3}$ & $1+\sqrt{3}$ \\ $4$ & $2+\sin\left({\frac{3\pi}{14}}\right)$ & $\frac{1}{2\sin\left({\frac{3\pi}{14}}\right)-1}$ \\ $5$ & $1+\sqrt{4+2\sqrt{2}}$ & $\sqrt{2}+\sqrt{2+\sqrt{2}}$ \\ \botrule \end{tabular} \egroup \caption{Quantum dimensions of the internal degrees of freedom of $[1,0]$-solitons ($Q^{(1)}\equiv Q^{(1)}_{j_{0,1}}$) and $[1,1]$-solitons ($Q^{(2)}\equiv Q^{(2)}_{j_{0,2}}$) derived from (\ref{so5_quantumdimform}) using the asymptotic solutions of the auxiliary modes (see Table~\ref{table:auxnumsol}).} \label{table:so5_quantumdims} \end{table} Following \cite{Tsve14a,BoFr18} each of the terms appearing in Eq.~(\ref{so5_eq:Fideal}) is the free energy of an ideal gas of particles with the corresponding mass carrying an internal degree of freedom with possibly non-integer quantum dimension $Q^{(m)}_k$ for the solitons. It is found that solitons of the same multiplet carry the same quantum dimension, i.e. $Q^{(m)}\equiv Q^{(m)}_{j_{0,m}}=Q^{(m)}_{\tilde{j}_{0,m}}$. The densities of the solitons \begin{equation} \label{so5_density} n^{(m)}_{j}=Q^{(m)}\sqrt{\frac{M^{(m)}_{j}T}{2\pi}}e^{-\epsilon^{(m)}_{0,j}(0)/T}\,, \end{equation} derived from the free energy (\ref{so5_eq:Fideal}) for $j\in\{j_{0,m},\tilde{j}_{0,m}\}$, can be controlled by variation of the temperature and the fields. In order to identify the quantum dimensions $Q^{(m)}_k$ with the quantum dimensions of ${SO}(5)_{N_f}$ anyons the topological charges are written in terms of Young diagrams: according to \cite{FrMSbook96} the admissible weights $\Lambda$ of the affine Lie algebra $SO(5)_{N_f}$ have to satisfy \begin{equation} \label{affinecondi} (\Lambda,\theta)\leq N_f\,, \end{equation} where $\theta$ is the highest root. In terms of the Dynkin labels $(m_1,m_2)$, the condition (\ref{affinecondi}) results in \begin{equation} \label{affinecondi2} m_1+m_2\leq N_f\,. \end{equation} Hence, $SO(5)_{N_f}$ anyons may be labeled by Dynkin labels $(m_1,m_2)$ satisfying (\ref{affinecondi2}). Equivalently, they can be expressed using Young diagrams. For $N_f=2$ the admissible topological charges in terms of Young diagrams are \begin{equation}\nonumber [0,0],\,[1,1],\,[1,0],\,[2,1],\,[2,0],\,[2,2]\,. \end{equation} The corresponding fusion rules can be found in \cite{FiFF14} using the identification \begin{equation}\nonumber \psi_1=[0,0],\,\psi_2=[1,1],\,\psi_3=[1,0],\,\psi_4=[2,1],\,\psi_5=[2,0],\,\psi=[2,2]\,. \end{equation} Notice that these fusion rules are consistent with the tensor product reductions of ${SO}(5)$ irreducible representations with reasonable modifications due to the level $N_f=2$ \footnote{An elegant graphical method for deriving tensor product reductions for Lie algebras with rank $r \leq 2$ can be found in \cite{VlRW16}.}. The quantum dimensions extracted from the fusion rules for $N_f=2$ are given by \begin{equation}\nonumber d([0,0])=d([2,2])=1,\,d([1,1])=d([2,0])=2,\,d([1,0])=d([2,1])=\sqrt{5}\,. \end{equation} Therefore, the appearance of the internal degrees of freedom, $Q^{(1)}$ and $Q^{(2)}$, can be interpreted as $[1,1]$ or $[2,0]$ anyons being bound to the $[1,0]$-solitons and $[1,0]$ or $[2,1]$ anyons being bound to the $[1,1]$-solitons. For $N_f>2$ this identification cannot be done, since the fusion rules and quantum dimensions of ${SO}(5)_{N_f>2}$ anyons have not yet been derived. However, following the results from the perturbed ${SU}(3)_{N_f}$ WZNW model it is conjectured that the internal degrees of freedom, $Q^{(1)}$ and $Q^{(2)}$, coincide with the quantum dimensions of $[1,1]$ and $[1,0]$ anyons for arbitrary $N_f\geq 2$, respectively. The densities of $[1,1]$ and $[1,0]$ anyons appearing in the one-dimensional model are determined by the densities of the corresponding solitons (\ref{so5_density}). For fields satisfying \begin{equation}\nonumber zH_1>(4\sqrt{3}-4)M_0-2T\log\left(3^{1/4}\frac{Q^{(1)}}{Q^{(2)}}\right) \end{equation} the dominant contribution to the free energy is that of the $[1,0]$-solitons with $[1,1]$ anyons being bound to them. In the remaining region of non-interacting solitons the $[1,1]$-solitons with $[1,0]$ anyons bound to them are the dominant excitations. \subsection{Condensate of $[1,0]$-solitons} \label{so5_sectionB} For fields $zH_2< (4-2\sqrt{3})M_0,\, zH_1>2\sqrt{3}M_0-zH_2$ and temperatures $T\ll zH_1+zH_2-2\sqrt{3}M_0$ the $[1,0]$-solitons (of type $j_{0,1}$) form a condensate, while the contribution to the free energy of the other quasi-particles can be neglected. Following \cite{KiRe87b} we observe that the dressed energies and densities can be related as \begin{equation} \label{so5_derelations} \begin{aligned} \rho^{(m)}_j(\lambda)&=(-1)^{\delta_{j\in\{j_{2,m}\}}}\frac{1}{2\pi}\frac{\text{d}\epsilon^{(m)}_j(\lambda)}{\text{d}\lambda} f\left(\frac{\epsilon^{(m)}_j(\lambda)}{T}\right),\\ \rho^{h(m)}_j(\lambda)&=(-1)^{\delta_{j\in\{j_{2,m}\}}}\frac{1}{2\pi}\frac{\text{d}\epsilon^{(m)}_j(\lambda)}{\text{d}\lambda} \left(1-f\left(\frac{\epsilon^{(m)}_j(\lambda)}{T}\right)\right)\,, \end{aligned} \end{equation} for $\lambda> \lambda_{\delta}$ with $\exp(\pi\lambda_{\delta}/3)\gg1$, where $f(\epsilon)= (1+e^\epsilon)^{-1}$ is the Fermi function. Inserting this into (\ref{so5_entropy}) we get ($\phi^{(m)}_j=\epsilon^{(m)}_j/T$) \begin{equation} \begin{aligned} \label{so5_entropy2} \mathcal{S}=&-\frac{T}{\pi}\sum_{m,j}(-1)^{\delta_{j\in\{j_{2,m}\}}} \int_{\phi^{(m)}_j(\lambda_{\delta})}^{\phi^{(m)}_j(\infty)}\text{d}\phi^{(m)}_j\, \left[f(\phi^{(m)}_j)\ln f(\phi^{(m)}_j)+(1-f(\phi^{(m)}_j))\ln(1-f(\phi^{(m)}_j))\right]\,\\ &+\sum_{m,j}\mathcal{S}^{(m)}_j(\lambda_{\delta})\, ,\\ \mathcal{S}^{(m)}_j&(\lambda_{\delta})\equiv \int_{-\lambda_{\delta}}^{\lambda_{\delta}}\text{d}\lambda\, \left[(\rho^{(m)}_j+\rho^{h(m)}_j)\ln(\rho^{(m)}_j+\rho^{h(m)}_j)-\rho^{(m)}_j\ln\rho^{(m)}_j-\rho^{h(m)}_j\ln\rho^{h(m)}_j\right]\,. \end{aligned} \end{equation} The integrals over $\phi^{(m)}_j$ can be performed giving \begin{align} \label{so5_entropyassymp} &\mathcal{S}=\sum_{m,j}\mathcal{S}^{(m)}_j(\lambda_{\delta})-\frac{2T}{\pi}\sum_{m,j}(-1)^{\delta_{j\in\{j_{2,m}\}}}[L(f(\phi^{(m)}_j(\infty))-L(f(\phi^{(m)}_j(\lambda_{\delta})))] \end{align} in terms of the Rogers dilogarithm $L(x)$ \begin{equation}\nonumber L(x)=-\frac{1}{2}\int_{0}^{x}\text{d}y\, \left(\frac{\ln y}{1-y}+\frac{\ln (1-y)}{y}\right)\,. \end{equation} For large fields $zH_1\gg 2\sqrt{3}M_0-zH_2$ we have $\log((zH_1+zH_2)/2\sqrt{3}M_0)>\lambda_{\delta}\gg1$. Using Eqs.~(\ref{so5_dressedeinteq}) and (\ref{so5_auxequations}) this implies \begin{equation} \label{so5_ccondition} \begin{aligned} &f(\phi^{(m)}_{j_{0,m}}(\lambda_{\delta}))= \begin{cases} 1 & \text{~for~}m=1\\ 0 & \text{~for~}m=2 \end{cases}\,, f(\phi^{(m)}_{j_{0,m}}(\infty))=0\,,\\ &f(\phi^{(m)}_{\tilde{j}_{0,m}}(\lambda_{\delta}))=0\,, & f(\phi^{(m)}_{\tilde{j}_{0,m}}(\infty))=0\,,\\ &f(\phi^{(m)}_{j_{2,m}}(\lambda_{\delta}))= \begin{cases} 0 & \text{~for~}m=1\\ \left(\frac{\sin\left(\frac{\pi}{2N_f+2}\right)}{\sin\left(\frac{\pi(j_{2,2}+1)}{2N_f+2}\right)}\right)^2 & \text{~for~}m=2 \end{cases}\,. \end{aligned} \end{equation} For the remaining term, $f(\phi^{(m)}_{j_{2,m}}(\infty))$, an analytical expression is not known. However, it can be computed numerically using the results for the asymptotic behavior of the auxiliary modes from Table~\ref{table:auxnumsol}. From (\ref{so5_ccondition}) one can further conclude that the densities for $|\lambda|<\lambda_{\delta}$ are given by \begin{equation}\nonumber \rho^{h(1)}_{j_{0,1}}(\lambda)= \rho^{(2)}_{j_{0,2}}(\lambda)= \rho^{(m)}_{\tilde{j}_{0,m}}(\lambda)= \rho^{(1)}_{j_{2,1}}=0, \quad \rho^{(2)}_{j_{2,2}}(\lambda)=e^{-\epsilon^{(2)}_{j_{2,2}}/T}\, \rho^{h(2)}_{j_{2,2}}(\lambda)\,, \end{equation} where $e^{-\epsilon^{(2)}_{j_{2,2}}/T}=\text{const.}$ for $|\lambda|<\lambda_{\delta}$. Since the integral equations (\ref{so5_densities2}) for $\rho^{h(2)}_{j_{2,2}}$ simplify in this regime to \begin{equation}\nonumber \rho^{h(2)}_{j_{2,2}}= -\sum_{k_{2,2}}B^{(2,2)}_{j_{2,2}k_{2,2}} \ast e^{-\epsilon^{(2)}_{k_{2,2}}/T}\rho^{h(2)}_{k_{2,2}} \qquad \text{for }|\lambda|<\lambda_{\delta}, \end{equation} one can conclude that $\rho^{h(2)}_{j_{2,2}}\rightarrow 0$, $\rho^{(2)}_{j_{2,2}}\rightarrow 0$ such that $\rho^{(2)}_{j_{2,2}}/\rho^{h(2)}_{j_{2,2}}=e^{-\epsilon^{(2)}_{j_{2,2}}/T}=\text{const.}$ Consequently, $\mathcal{S}^{(m)}_j(\lambda_{\delta})=0$ for all $j,m$ is obtained. Using the Rogers dilogarithm identity \begin{equation} \label{dilogidentity} \sum_{k=2}^{n-2} L\left(\frac{\sin^2(\pi/n)}{\sin^2(\pi k/n)}\right) = \frac{\pi^2}{6}\,\frac{2(n-3)}{n} \end{equation} it is found that \begin{equation}\nonumber \sum_{j_{2,2}}L\left(f(\phi^{(2)}_{j_{2,2}}(\lambda_{\delta})) \right)=\frac{\pi^2}{6}\left(\frac{3N_f}{N_f+1}-1 \right)\,. \end{equation} In general Rogers dilogarithm identities giving the relationship between Lie algebras and central charges of parafermion conformal field theories have only been proven for the simply laced case \cite{Nakanishi11}. However, for the non-simply laced Lie algebra ${SO}(5)$ similar relations can be verified numerically \begin{equation} \label{so5_RogerF} \sum_{m=1}^{2}\sum_{j_{2,m}}L\left(f(\phi^{(m)}_{j_{2,m}}(\infty)) \right)=\frac{\pi^2}{6}\left(\frac{10N_f}{N_f+3}-2 \right)\,. \end{equation} Hence, we obtain the following low-temperature behavior of the entropy \begin{equation} \label{so5_Entropy_CFT1} \mathcal{S}=\frac{\pi}{3}\left(\frac{10N_f}{N_f+3}-\frac{3N_f}{N_f+1}\right)T\, \end{equation} which is consistent with a conformal field theory describing the collective modes given by the coset ${SO}(5)_{N_f}/{SO}(3)_{N_f}$ with central charge \begin{equation}\nonumber c=\frac{10N_f}{N_f+3}-\frac{3N_f}{N_f+1}\,. \end{equation} Using the conformal embedding \begin{equation} \label{so5_embedding1} \frac{{SO}(5)_{N_f}}{{SO}(3)_{N_f}}=U(1)+\frac{Z_{SO(5)_{N_f}}}{Z_{SO(3)_{N_f}}}\, \end{equation} where $Z_G$ denotes generalized parafermions given as the quotient $G/U(1)^{\text{rank}(G)}$ involving the group $G$ \cite{Gepner87}, the collective modes can equivalently be described by a product of a free $U(1)$ boson and a parafermion coset $Z_{SO(5)_{N_f}}/Z_{SO(3)_{N_f}}$ contributing $c=1$ and \begin{equation}\nonumber c=\frac{8N_f-6}{N_f+3}-\frac{2N_f-1}{N_f+1}\,, \end{equation} respectively. Notice that the central charge of the coset $Z_{SO(5)_{2}}/Z_{SO(3)_{2}}$ is $c=1$, which is consistent with the results for interacting chains of $[1,1]$ $SO(5)_{2}$ anyons \cite{FiFF14}. Following \cite{BoFr18} the entropy $\mathcal{S} = -\frac{\text{d}}{\text{d}T}\frac{F}{\mathcal{N}}$ is computed numerically to study the transition from free anyons to a condensate of anyons. In the region $2\sqrt{3}M_0-zH_2\lesssim zH_1$ the entropy deviates from the asymptotic expression (\ref{so5_Entropy_CFT1}): in this range of $H_1$ the auxiliary modes of the first level propagate with a velocity (independent of $j_{2,1}$) differing from that of the $[1,0]$-solitons, $v_{[1,0]}$, namely \begin{equation}\nonumber v_{[1,0]}=\left.\frac{\partial_\lambda \epsilon^{(1)}_{j_{0,1}}(\lambda)}{ 2\pi\rho^{(1)}_{j_{0,1}}(\lambda)}\right|_{\Lambda_1},\quad v^{(1)}_{pf} = -\left.\frac{ \partial_\lambda \epsilon^{(1)}_{j_{2,1}}(\lambda) }{2\pi\rho^{h(1)}_{j_{2,1}}(\lambda)}\right|_{\lambda\to\infty}\,, \end{equation} where $\Lambda_1$ denotes the Fermi point of $[1,0]$-solitons defined by $\epsilon^{(1)}_{j_{0,1}}(\pm\Lambda_1)=0$. Also notice that Fermi velocities of the second level do not exist in this regime. As a consequence the bosonic (spinon) and parafermionic degrees of freedom in the first level separate and the low-temperature entropy is \begin{equation} \label{so5_Ent_inter1} \mathcal{S} = \frac{\pi}{3} \left( \frac{1}{v_{[1,0]}} + \frac{1}{v^{(1)}_{pf}}\left(\frac{8N_f-6}{N_f+3}-\frac{2N_f-1}{N_f+1}\right) \right) T\,. \end{equation} This behavior can be explained by the conformal embedding (\ref{so5_embedding1}). Note that both Fermi velocities depend on the field $H_1$ and approach $1$ as $H_1\gtrsim H_{1,\delta}$ such that $\Lambda_1(H_{1,\delta})>\lambda_{\delta}$, see Figure~\ref{so5_fig:entropy2} (a), giving the entropy (\ref{so5_Entropy_CFT1}) of the coset $SO(5)_{N_f}/SO(3)_{N_f}$. In Figure~\ref{so5_fig:entropy2} the computed entropy is shown for $T=0.02\,M_0$ as a function of the field $H_1$ together with the $T\to0$ behavior (\ref{so5_Ent_inter1}) expected from conformal field theory.\footnote{Actually, this behavior can only be seen for temperatures $T<0.02\,M_0$, which was not accessible by available numerical methods. To overcome this problem the entropy for $T=0.02\,M_0$ was computed, while already neglecting the contribution of $\epsilon^{(2)}_{j_{0,2}}$ in the integral equations (\ref{so5_dressedeinteq}).} \begin{figure}[ht] \centering \captionsetup[subfigure]{singlelinecheck=on} \subfloat[]{{\includegraphics[width=7cm]{Fermivelocity_2_3_H2=0.pdf} }}% \qquad \subfloat[]{{\includegraphics[width=7cm]{Entropy_H2=0_2_3.pdf} }}% \caption{(a) Fermi velocities of the $[1,0]$-solitons and first level parafermion modes as a function of the field $zH_1/M_0$ for $p_0=2+1/3$, $H_2\equiv 0$ at zero temperature. For large field, $H_1>H_{1,\delta}$, both Fermi velocities approach $1$ leading to the asymptotic result for the low-temperature entropy (\ref{so5_Entropy_CFT1}). (b) Entropy obtained from numerical solution of the TBA equations (\ref{so5_dressedeinteq}) for $p_0=2+1/3$ and $H_2\equiv 0$ as a function of the field $zH_1/M_0$ for $T=0.02\,M_0$. For fields large compared to the $[1,0]$-soliton mass, $zH_1\gg 2\sqrt{3}\,M_0$, the entropy approaches the expected analytical value (\ref{so5_Entropy_CFT1}) for a field theory with a free bosonic sector and a $Z_{SO(5)_{N_f}}/Z_{SO(3)_{N_f}}$ parafermion sector propagating with velocities $v_{[1,0]}$ and $v^{(1)}_{pf}$, respectively (full red line). For magnetic fields $zH_1<2\sqrt{3}\,M_0$ and temperature $T\ll 2\sqrt{3}\,M_0$ the entropy is that of a dilute gas of non-interacting quasi-particles with degenerate internal degree of freedom due to the anyons.}% \label{so5_fig:entropy2}% \end{figure} \subsection{Condensate of $[1,1]$-solitons} \label{so5_sectionC} For fields $zH_1< (4\sqrt{3}-4)M_0$, $zH_2>2M_0-zH_1/2$ and temperatures $T\ll zH_1/2+zH_2-2M_0$ the $[1,1]$-solitons (of type $j_{0,2}$) form a condensate, while the contribution to the free energy of the other quasi-particles can be neglected. For large fields $zH_2\gg 2M_0-zH_1/2$ such that $\log((zH_1/2+zH_2)/2M_0))>\lambda_{\delta}\gg 1$, Eq.~(\ref{so5_dressedeinteq}) implies \begin{equation} \begin{aligned} \label{so5_ccondition2} &f(\phi^{(m)}_{j_{0,m}}(\lambda_{\delta}))= \begin{cases} 0 & \text{~for~} m=1\\ 1 & \text{~for~} m=2 \end{cases}, & f(\phi^{(m)}_{j_{0,m}}(\infty))=0\,,\\ &f(\phi^{(m)}_{\tilde{j}_{0,m}}(\lambda_{\delta}))=0\,, &f(\phi^{(m)}_{\tilde{j}_{0,m}}(\infty))=0\,,\\ &f(\phi^{(m)}_{j_{2,m}}(\lambda_{\delta}))= \begin{cases} \left(\frac{\sin\left(\frac{\pi}{N_f+2}\right)}{\sin\left(\frac{\pi(j_{2,1}+1)}{N_f+2}\right)}\right)^2 & \text{~for~} m=1\\ 0 & \text{~for~} m=2 \end{cases}\, \end{aligned} \end{equation} together with the numerical expressions for $f(\phi^{(m)}_{j_{2,m}}(\infty))$ obtained from the asymptotic behavior of the auxiliary modes shown in Table~\ref{table:auxnumsol}. The densities for $|\lambda|<\lambda_{\delta}$ following from (\ref{so5_ccondition2}) are \begin{equation}\nonumber \rho^{h(2)}_{j_{0,2}}(\lambda)=\rho^{(1)}_{j_{0,1}}(\lambda)=\rho^{(m)}_{\tilde{j}_{0,m}}(\lambda)=\rho^{(2)}_{j_{2,2}}=0, \quad \rho^{(1)}_{j_{2,1}}(\lambda)=e^{-\epsilon^{(1)}_{j_{2,1}}/T}\rho^{h(1)}_{j_{2,1}}(\lambda)\,, \end{equation} where $e^{-\epsilon^{(1)}_{j_{2,1}}/T}=\text{const.}$ for $|\lambda|<\lambda_{\delta}$. Since the integral equations (\ref{so5_densities2}) for $\rho^{h(1)}_{j_{2,1}}$ simplify in this regime to \begin{equation}\nonumber \rho^{h(1)}_{j_{2,1}}=-\sum_{k_{2,1}}B^{(1,1)}_{j_{2,1}k_{2,1}}\ast e^{-\epsilon^{(1)}_{k_{2,1}}/T}\rho^{h(1)}_{k_{2,1}}\qquad \text{for }|\lambda|<\lambda_{\delta}, \end{equation} one can conclude that $\rho^{h(1)}_{j_{2,1}}\rightarrow 0,$ $\rho^{(1)}_{j_{2,1}}\rightarrow 0$ such that $\rho^{(1)}_{j_{2,1}}/\rho^{h(1)}_{j_{2,1}}=e^{-\epsilon^{(1)}_{j_{2,1}}/T}=\text{const.}$ Consequently, $\mathcal{S}^{(m)}_j(\lambda_{\delta})=0$ for all $j,m$ is obtained. Using the Rogers dilogarithm identity (\ref{dilogidentity}) the relation for $Z_{SU(2)_{N_f}}$ parafermions is found: \begin{equation}\nonumber \sum_{j_{2,1}}L\left(f(\phi^{(1)}_{j_{2,1}}(\lambda_{\delta})) \right)=\frac{\pi^2}{6}\left(\frac{3N_f}{N_f+2}-1 \right)\, \end{equation} Hence, the following low-temperature behavior of the entropy is obtained using (\ref{so5_RogerF}) \begin{equation} \label{so5_Entropy_CFT2} \mathcal{S}=\frac{\pi}{3}\left(\frac{10N_f}{N_f+3}-\frac{3N_f}{N_f+2}\right)T, \end{equation} which is consistent with a conformal field theory describing the collective modes given by the coset $SO(5)_{N_f}/SU(2)_{N_f}$ with central charge \begin{equation}\nonumber c=\frac{10N_f}{N_f+3}-\frac{3N_f}{N_f+2}. \end{equation} Using the conformal embedding \begin{equation} \nonumber \frac{SO(5)_{N_f}}{SU(2)_{N_f}}=U(1)+ \frac{Z_{SO(5)_{N_f}}}{Z_{SU(2)_{N_f}}}, \end{equation} where $Z_{SU(N)_{N_f}}=SU(N)_{N_f}/U(1)^N$ denotes generalized $SU(N)_{N_f}$ parafermions \cite{Gepner87}, the collective modes can equivalently be described by a product of a free $U(1)$ boson and a parafermion coset $Z_{SO(5)_{N_f}}/Z_{SU(2)_{N_f}}$ contributing $c=1$ and \begin{equation}\nonumber c=\frac{8N_f-6}{N_f+3}-\frac{2(N_f-1)}{N_f+2}. \end{equation} Notice that for $N_f=2$ the central charge of the coset $Z_{SO(5)_{N_f}}/Z_{SU(2)_{N_f}}$ is $c=3/2$, which is consistent with the results for interacting chains of $[1,0]$ $SO(5)_{N_f}$ anyons \cite{FiFF18}. Analogously to the regime discussed in Section~\ref{so5_sectionB}, the entropy deviates from the asymptotic expression in the region $ 2M_0-zH_1\lesssim zH_2$, since the auxiliary modes of the second level propagate with a velocity differing from that of the $[1,1]$-solitons, $v_{[1,1]}$, namely \begin{equation}\nonumber v_{[1,1]}=\left.\frac{\partial_\lambda \epsilon^{(2)}_{j_{0,2}}(\lambda)}{ 2\pi\rho^{(2)}_{j_{0,2}}(\lambda)}\right|_{\Lambda_2},\quad v^{(2)}_{pf} = -\left.\frac{ \partial_\lambda \epsilon^{(2)}_{j_{2,2}}(\lambda) }{2\pi\rho^{h(2)}_{j_{2,2}}(\lambda)}\right|_{\lambda\to\infty}\,, \end{equation} where $\Lambda_2$ denotes the Fermi point of $[1,1]$-solitons defined by $\epsilon^{(2)}_{j_{0,2}}(\pm\Lambda_2)=0$. Also notice that Fermi velocities of the first level do not exist in this regime. As a consequence the bosonic (spinon) and parafermionic degrees of freedom in the first level separate and the low-temperature entropy is \begin{equation} \label{so5_Ent_inter2} \mathcal{S} = \frac{\pi}{3} \left( \frac{1}{v_{[1,1]}} + \frac{1}{v^{(2)}_{pf}}\left(\frac{8N_f-6}{N_f+3}-\frac{2(N_f-1)}{N_f+2}\right) \right) T\,. \end{equation} Figure~\ref{so5_fig:entropy1} (a) shows how both Fermi velocities depend on the field $H_2$ and approach $1$ as $H_2\geq H_{2,\delta}$ such that $\Lambda_2(H_{2,\delta})>\lambda_{\delta}$. In Figure ~\ref{so5_fig:entropy1} (b) the computed entropy is shown as a function of the field $H_2$ together with the $T\rightarrow 0$ behavior expected from conformal field theory. \begin{figure}[ht] \centering \captionsetup[subfigure]{singlelinecheck=on} \subfloat[]{{\includegraphics[width=7cm]{Fermivelocity_2_3_H1=0.pdf} }}% \qquad \subfloat[]{{\includegraphics[width=7cm]{Entropy_H1=0_2_3.pdf} }}% \caption{(a) Fermi velocities of the $[1,1]$-solitons and second level parafermion modes as a function of the field $zH_2/M_0$ for $p_0=2+1/3$, $H_1\equiv 0$ at zero temperature. For large fields, $H_2>H_{2,\delta}$, both Fermi velocities approach $1$ leading to the asymptotic result for the low-temperature entropy (\ref{so5_Entropy_CFT2}). (b) Entropy obtained from numerical solution of the TBA equations (\ref{so5_dressedeinteq}) for $p_0=2+1/3$ and $H_1\equiv 0$ as a function of the field $zH_2/M_{0}$ for $T=0.02M_0$. For fields large compared to the $[1,1]$-soliton mass, $zH_2\gg 2M_0$, the entropy approaches the expected analytical value (\ref{so5_Entropy_CFT2}) for a field theory with a free bosonic sector and a $Z_{SO(5)_{N_f}}/Z_{SU(2)_{N_f}}$ parafermion sector propagating with velocities $v_{[1,1]}$ and $v^{(2)}_{pf}$, respectively (full red line). For magnetic fields $zH_2<2M_0$ and temperature $T\ll 2M_0$ the entropy is that of a dilute gas of non-interacting quasi-particles with degenerate internal degree of freedom due to the anyons.}% \label{so5_fig:entropy1}% \end{figure} \subsection{Condensate of $[1,0]$- and $[1,1]$-solitons} \label{so5_sectionD} For fields $H_1,\,H_2$ satisfying $zH_2>\max(2\sqrt{3}M_0-zH_1,\,2M_0-zH_1/2)$ and temperatures $T\ll -\min\left(\epsilon^{(1)}_{0,j_{0,1}}(0),\,\epsilon^{(2)}_{0,j_{0,2}}(0)\right)$ the highest weight $[1,0]$- and $[1,1]$-solitons condense. From Fig.~\ref{so5_fig:spec1}(c) one can further conclude that descendent $[1,0]$- and $[1,1]$-solitons are negligible in this regime of temperatures and magnetic fields. The condensation of highest weight $[1,0]$- and $[1,1]$-solitons results in non-zero Fermi velocities $v_{[1,0]},\,v_{[1,1]},\, v^{(m)}_{pf}$ $(m=1,2)$ for the solitons and the auxiliary modes. For large fields $zH_1\gg M_0,\,zH_2\gg M_{0}$ the following relations are found using (\ref{so5_dressedeinteq}) \begin{equation} \begin{aligned}\nonumber &f(\phi^{(m)}_{j_{0,m}}(\lambda_{\delta}))=1, \quad\qquad\qquad\, f(\phi^{(m)}_{j_{0,m}}(\infty))=0,\\ &f(\phi^{(m)}_{\tilde{j}_{0,m}}(\lambda_{\delta}))=0, \quad\qquad\qquad\, f(\phi^{(m)}_{\tilde{j}_{0,m}}(\infty))=0,\nonumber\\ &f(\phi^{(m)}_{j_{2,m}}(\lambda_{\delta}))=0\nonumber \end{aligned} \end{equation} and therefore \begin{equation}\nonumber \rho^{h(m)}_{j_{0,m}}(\lambda)=\rho^{(m)}_{j_{1,m}}(\lambda)=\rho^{(m)}_{j_{2,m}}=0, \quad \mathrm{for~} |\lambda|<\lambda_{\delta}\,, \end{equation} giving $\mathcal{S}^{(m)}_j(\lambda_{\delta})=0$ for all $j,m$. Using the relation (\ref{so5_RogerF}) the low-temperature behavior of the entropy becomes \begin{equation} \label{so5_entropy_CFT3} \mathcal{S}=\frac{\pi}{3}\frac{10N_f}{N_f+3}T \end{equation} in the phase with finite $[1,0]$- and $[1,1]$-soliton density. The low-energy excitations near the Fermi points $\epsilon^{(m)}_{j_{0,m}}(\pm\Lambda_m)=0$ of the soliton dispersion propagate with velocity $v_{[1,0]}=v_{[1,1]}\rightarrow 1$ for fields $H_m>H_{m,\delta}$ such that $\Lambda_m(H_{m,\delta})>\lambda_{\delta}$. Hence, the conformal field theory describing the collective low-energy modes is the $SO(5)$ WZNW model at level $N_f$ or, by conformal embedding \cite{Gepner87}, a product of two free $U(1)$ bosons and a $SO(5)$ parafermionic coset $SO(5)_{N_f}/U(1)^2$ contributing $c=2$ and \begin{equation} \label{so5_cSU3para} c=\frac{10N_f}{N_f+3}-2=\frac{8N_f-6}{N_f+3}\, \end{equation} to the central charge, respectively. For fields $H_1,\, H_2$ such that $v_{[1,0]}=v_{[1,1]}<1$ and $v^{(1)}_{pf}=v^{(2)}_{pf}<1$ the degeneracy between the solitons and the parafermions is lifted resulting in the low-temperature behavior of the entropy given by \begin{equation}\nonumber \mathcal{S}=\frac{\pi}{3}\left(\frac{2}{v_{[1,0]}}+\frac{1}{v^{(m)}_{pf}}\frac{8N_f-6}{N_f+3} \right)T\,. \end{equation} Additionally, the fields can be chosen such that the remaining degeneracies are lifted, i.e. $v_{[1,0]}<v_{[1,1]}$ and $v^{(1)}_{pf}<v^{(2)}_{pf}$. In this case the entropy becomes \begin{equation} \nonumber \mathcal{S}=\frac{\pi}{3}\left(\frac{1}{v_{[1,0]}}+\frac{1}{v^{(1)}_{pf}}\frac{2(N_f-1)}{N_f+2}+\frac{1}{v_{[1,1]}}+\frac{1}{v^{(2)}_{pf}}\left(\frac{8N_f-6}{N_f+3}-\frac{2(N_f-1)}{N_f+2}\right) \right)T\,, \end{equation} which is consistent with the conformal embedding \begin{equation}\nonumber SO(5)_{N_f}=U(1)+Z_{SU(2)_{N_f}}+U(1)+\frac{Z_{SO(5)_{N_f}}}{Z_{SU(2)_{N_f}}}\, , \end{equation} see Figure~\ref{so5_fig:entropy3} (a) for the Fermi velocities and Figure~\ref{so5_fig:entropy3} (b) for the entropy in this regime. \begin{figure}[ht] \centering \captionsetup[subfigure]{singlelinecheck=on} \subfloat[]{{\includegraphics[width=7cm]{Fermivelocity_2_3_H2=-0_06+0_21H1.pdf} }}% \qquad \subfloat[]{{\includegraphics[width=7cm]{Entropy_H2=-0_06+0_21H1_2_3.pdf} }}% \caption{(a) Fermi velocities as a function of the field $zH_1/M_0$ for $p_0=2+1/3,\,$ $zH_2=-0.06M_0+0.21zH_1$ at zero temperature. For large fields, $H_1>H_{1,\delta}$, all Fermi velocities approach $1$ leading to the asymptotic result for the low-temperature entropy (\ref{so5_entropy_CFT3}). (b) Entropy obtained from numerical solution of the TBA equations (\ref{so5_dressedeinteq}) as a function of the field $zH_2/M_{0}$ for $p_0=2+1/3$, fixed $zH_2=-0.06\,M_0+0.21\,zH_1$ and different temperatures. For fields large compared to the kink mass, $zH_1\gg M_{0}$, the entropy approaches the expected analytical value (\ref{so5_entropy_CFT3}) (full red line). For magnetic fields $zH_1<2(M^{(1)}_{j_{0,1}}-M^{(2)}_{j_{0,2}})$ and temperature $T\ll M_{0}$ the entropy is that of a dilute gas of non-interacting quasi-particles with degenerate internal degree of freedom due to the anyons.}% \label{so5_fig:entropy3}% \end{figure} At last, for Fermi velocities $v_{[1,1]}<v_{[1,0]}$ and $v^{(2)}_{pf}<v^{(1)}_{pf}$ the entropy results in \begin{equation}\nonumber \mathcal{S}=\frac{\pi}{3}\left(\frac{1}{v_{[1,1]}}+\frac{1}{v^{(2)}_{pf}}\frac{2N_f-1}{N_f+1}+\frac{1}{v_{[1,0]}}+\frac{1}{v^{(1)}_{pf}}\left(\frac{8N_f-6}{N_f+3}-\frac{2N_f-1}{N_f+1}\right) \right)T\,, \end{equation} which is consistent with the conformal embedding \begin{equation}\nonumber SO(5)_{N_f}=U(1)+Z_{SO(3)_{N_f}}+U(1)+\frac{Z_{SO(5)_{N_f}}}{Z_{SO(3)_{N_f}}}\,. \end{equation} \newpage \section{Summary and conclusion} \label{sec:SO5_Summary} Our findings are summarized in a phase diagram based on the numerical analysis of the TBA equations (\ref{so5_dressedeinteq}), see Figure~\ref{so5_fig:phasediag}. For sufficiently small fields a dilute gas of anyons with quantum dimension $Q^{(1)}$ or $Q^{(2)}$ is dominating the contribution to the free energy. By varying the magnetic fields the condensation of anyons can be driven into various collective states described by parafermionic cosets: the collective state describing the condensation of $[1,1]$ $SO(5)_{N_f}$ anyons is identified as the $Z_{SO(5)_{N_f}}/Z_{SO(3)_{N_f}}$ parafermion coset, while the condensation of $[1,0]$ $SO(5)_{N_f}$ anyons results in the $Z_{SO(5)_{N_f}}/Z_{SU(2)_{N_f}}$ parafermionic theory. Moreover, the condensation of a mixture of $[1,0]$ and $[1,1]$ anyons is studied resulting in the $Z_{SO(5)_{N_f}}$ parafermion theory describing the collective state. Other theories describing the condensation of $SO(5)_{N_f}$ anyons are based on conformal embeddings, see Figure~\ref{so5_fig:phasediag}. \begin{figure}[ht]\centering \includegraphics[width=0.85\textwidth]{PhaseDiagram_T=0_01_of} \caption{ Contribution of the $SO(5)_{N_f}$ anyons to the low-temperature properties of the model (\ref{so5_NfModel}), see Figure~\ref{so5_fig:phases0} for the phases of the solitonic quasi-partiles: using the criteria described in the main text the parameter regions are identified using analytical arguments for $T\to0$ (the actual location of the boundaries is based on numerical data for $p_0=2+1/3$ and $T=0.035\,M_0$). For small fields (regions $Q^{(1)}$, $Q^{(2)}$) a dilute gas of non-interacting quasi-particles with an internal anyonic (zero-energy) degree of freedom with quantum dimension $Q^{(1)}$ or $Q^{(2)}$ is realized. In the shaded region The degeneracy of the zero modes is lifted by the presence of thermally activated solitons with a small but finite density. All the other phases are labelled by the CFT describing the collective state formed by the condensed degrees of freedom. \label{so5_fig:phasediag}} \end{figure} In summary we can conclude that the effective model describing the $SO(5)$ spin excitations is the $SO(5)_{N_f}$ WZNW model with an anisotropic current-current perturbation. In contrast to the previous application of this approach to $SU(k)_{N_f}$ anyons in \cite{BoFr18,BoFr18a} this was not clear from the beginning, since corresponding non-Abelian bosonization results of free fermions with $SO(5)$ spin and $U(N_f)$ flavour degrees of freedom are missing. \begin{acknowledgments} Funding for this work has been provided by the \emph{School for Contacts in Nanosystems}. Additional support by the research unit \emph{Correlations in Integrable Quantum Many-Body Systems} (FOR2316) is gratefully acknowledged. \end{acknowledgments}
\section{\label{sec:level1}Introduction} Recent technological advances have enabled researchers to engineer low dimensional systems, such as quantum dots, electron gas, carbon nanotubes (CNTs), nanowires, graphene, etc., where the motion of particles is severely restricted in one or more dimensions. These low dimensional systems are associated with interesting thermal transport characteristics, for example, one observes length and temperature dependent thermal conductivity in CNTs \cite{fujii2005measuring} and a divergent thermal conductivity in graphene \cite{balandin2008superior}, which stand in stark contrast (and hence, anomalous) to the Fourier's law of thermal conduction, where $\kappa$, the thermal conductivity, is independent of length: \begin{equation} J = -\kappa{\nabla T}. \end{equation} Here, $J$ is the heat flux, and $T$, the local temperature. In order to explain the anomalous behavior, researchers have probed into the thermal transport characteristics of idealized one-dimensional chains. Over the years, several such chains have been proposed. These may be classified into three different categories based on their thermal transport characteristics -- (i) chains with ballistic thermal conduction as seen in a chain of harmonically coupled oscillators \cite{lepri2003thermal}, (ii) chains displaying anomalous thermal conduction as is observed in a Fermi-Pasta-Ulam (FPU) chain \cite{lepri1997heat}, and (iii) chains where thermal transport characteristics obey Fourier's law as is observed in a $\Phi^4$ chain \cite{chen1996breather} and a Frenkel-Kontorova (FK) model \cite{hu2005heat}. In general, the Hamiltonian of one-dimensional chains may be written as: \begin{equation} H = \sum\limits_{i=1}^{N} \left[\frac{p_i^2}{2m} + V_H(\Delta x_{i-1,i}) + V_A(\Delta x_{i-1,i}) + U(x_i) \right], \label{eq:gen-Hamiltonian} \end{equation} where $p_i$ is the momentum of the $i^{th}$ particle having a mass of $m$, $V_H$ is the harmonic part of the potential that depends on the distance between the two nearby particles $\Delta x_{i-1,i}$, $V_A$ is the anharmonic part of the potential that also depends on $\Delta x_{i-1,i}$ and $U(x_i)$ is the anharmonic tethering part of potential. Depending upon the choice of $V_H(\ldots), V_A (\ldots)$ and $U(\ldots)$, one ends up with different chains. For example, FPU chain is obtained when $V_A(\Delta x_{i-1,i}) = \dfrac{1}{4}c_1 \Delta x_{i-1,i}^4$ and $U(x_i) = 0$, while the $\Phi^4$ chain is obtained when $V_A = 0$ and $U(x_i) = \dfrac{1}{4}c x_i^4$, and with $V_A(\ldots) = 0, U( \ldots) = f(\cos(x_i))$ one obtains FK model. So why do the chains behave differently? The question has baffled researchers for several years. An important breakthrough was made by Casati et al \cite{casati1984one} through their ding-a-ling model, where every alternate particle was attached to its initial position with harmonic spring and the remaining ones were free. It was discovered that a key ingredient for normal thermal conductivity is chaos. However it was later found that although chaos is necessary, it is not sufficient for ensuring that the Fourier's law is obeyed. For example, the FPU-$\beta$ chain {\cite{lepri1997heat}, which is chaotic, has a thermal conductivity that diverges with system size, $L$, in a power law manner -- $\kappa \propto L^{0.3}$. Looking at the specific form of Hamiltonian for the different chains, researchers observed a major difference between the chains -- while the FPU chain is momentum preserving, the other ones ($\Phi^4$, FK and ding-a-ling) are not -- and tried to link the momentum preserving characteristics with anomalous thermal transport behavior. Researchers initially attributed the anomalous thermal transport behavior in the momentum preserving chains to the slow diffusion of energy carried by low-frequency and long-wavelength modes \cite{prosen2000momentum}. These modes act as nearly undamped energy transport channels, and cause long-time correlations within the system. The presence of tethering potential in momentum non-conserving systems disrupts the energy transport of the long-wavelength modes, causing normal thermal transport behavior. However, recent research indicates that not all momentum conserving systems display divergent thermal conductivity \cite{savin2014thermal,giardina2000finite,gendelman2000normal,lee2010momentum,giardiana2005momentum}. For example, Wang et. al. \textcolor{black}{\cite{wang2013validity}} have shown through non-equilibrium molecular dynamics that their one-dimensional chain with asymmetric interparticle interactions has a convergent thermal conductivity in thermodynamic limit. Further, it was found that anomalous thermal conductivity can be obtained in systems without momentum conservation \textcolor{black}{\cite{prosen2000momentum}}. Interestingly, the thermal transport characteristics of the one-dimensional chains are dependent on the nature of coupling. For example, it has been observed that a $\Phi^4$ chain under weakly non-linear tethering potential displays ballistic thermal conduction \cite{xiong2017crossover}. Thus, it is evident that additional hidden attributes are at play in determining if a one-dimensional chain exhibits anomalous thermal transport. The polynomial non-linearity in the Hamiltonian is the result of Taylor series truncation of the complete interaction potential \cite{gendelman2016heat}. While this truncation is a good approximation at low temperatures, it is not very realistic at high temperatures where two particles may come very close or go far from each other. Even at low temperatures the potential fails to account for the finite probability of two particles coming very close to each other. The point mass assumption coupled with low-order non-linear potential allows two particles to cross each other so that they never ``collide''. The situation can be made more realistic by incorporating a high-order non-linear potential in the total Hamiltonian. In this manuscript we consider a $\Phi^4$ chain and relax the assumption of point particles -- two particles are prevented from crossing each other and collide upon coming closer than a threshold distance. This is achieved by modifying the Hamiltonian of $\Phi^4$ chain to include a high-order soft sphere repulsive potential. Specifically, we seek the solutions to the following questions -- (i) what is the effect of collisions on thermal conductivity and heat flux, (ii) do collisions have any bearing on boundary effects in temperature profile, and (iii) how do collisions alter the diffusion of energy. Our results indicate that collisions significantly reduce thermal conductivity and heat flux, and remove boundary effects present in the temperature profile of non-colliding chains. The reason behind significant reduction in heat flux and thermal conductivity may be understood by looking at the dynamics in the Fourier space. Results indicate that energy diffuses from the lowest modes to higher modes faster when collisions are incorporated within the system. This manuscript is organized as follows: the next section details the modification made to the $\Phi^4$ Hamiltonian to obtain the $\Phi^{4C}$ chain, subsequently we highlight the simulation methodology adopted in the present study. Lastly, we present the results and conclusions of our study. \section{The $\Phi^4$ and $\Phi^{4C}$ Chains} A typical $\Phi^4$ chain comprises of $N$ particles, each of mass $m$, arranged on a one-dimensional line and separated by a distance $l_{eq}$. Each particle is connected with its nearest neighbour by means of a harmonic spring and to its initial equilibrium position by a quartic tethering spring. As a result, the harmonic and tethering potentials take the form: $V_H (\Delta x_{i-1,i}) = \dfrac{1}{2} k(x_{i-1}-x_i-l_{eq})^2$ and $U(x_i) = \frac{1}{4}c(x_i - x_{i,0})^4$, respectively. Here, $x_i$ and $x_{i,0}$ are the instantaneous and equilibrium positions of the $i^{th}$ particle, respectively. The boundary conditions may be taken as fixed, wherein a fixed particle of similar characteristics is placed at the either ends, or periodic, wherein the $N^{th}$ particle is connected with the first particle. For a $\Phi^4$ chain with fixed boundaries, and $m = k = l_{eq} = 1.0$, the Hamiltonian becomes: \begin{equation} \begin{array}{rcl} H_{\Phi^4} & = & \sum\limits_{i=1}^{N} \left[\frac{p_i^2}{2} \right] + \sum\limits_{i=1}^{N-1} \left[\frac{1}{2} \left( x_{i} - x_{i-1} - 1.0 \right)^2 \right] \\ & & + \sum\limits_{i=1}^{N} \left[ \frac{c}{4} \left( x_i - x_{i,0} \right) ^ 4 \right] \label{eq:3} \end{array} \end{equation} $\Phi^4$ chains with large anharmonicity ($c=1.0$) have been studied extensively by several researchers \cite{hu2000heat, aoki2000bulk, PhysRevE.93.033308} using deterministic thermostats and have been extended to more than one dimensions \cite{aoki2000non}. The momentum conservation breaks down in presence of tethering potential with momentum dissipating exponentially in time \cite{hu2000heat}. In this large $c$ limit, the heat flux, $J$, in the traditional $\Phi^4$ chain has been found to be inversely proportional to $N: J \sim 1/N$, suggesting that the chain exhibits normal thermal transport characteristics. Extensive numerical simulations, with $k = c = 1$, suggest that the thermal conductivity, $\kappa$, depends on the temperature, $T$, through the relation: $\kappa \approx 1.724/T^{1.382}$ \cite{aoki2000non}. \begin{figure}[h] \centering \includegraphics[scale=0.95]{sspfnew.eps} \caption{Different potential and force functions for a particle located at origin assuming a neighbour particle at +1 units. Dotted line (parallel to $y$ axis) shows $2r$ beyond which, the soft sphere potential becomes insignificant. A:(0.065,0.88) is where net potential deviates from harmonic, B:(0.135,0.868) is where net force deviates from the harmonic force.} \label{fig:fig1} \end{figure} The traditional $\Phi^4$ model treats all particles as point masses and does not prevent two nearby particles from crossing each other. This situation is less realistic considering the fact that two atoms or molecules experience large repulsive forces upon coming very close to each other. In the present manuscript, we propose the $\Phi^{4C}$ chain whose Hamiltonian consists of an extra anharmonic term to take into account soft-sphere like collisions: $V_A( \ldots ) = -a\frac{1}{(x_i - x_{i-1})^6}$. The $\Phi^{4C}$ Hamiltonian reads: \begin{equation} \begin{array}{rcl} H_{\Phi^{4C}} & = & \sum\limits_{i=1}^{N} \left[\frac{p_i^2}{2m} \right]+ \sum\limits_{i=1}^{N-1} \left[\frac{1}{2} \left( x_{i} - x_{i-1} - l_{eq} \right)^2 \right] \\ & & - \sum\limits_{i=1}^{N-1} \left[ \frac {a}{(x_i - x_{i-1})^6} \right] \\ & & + \sum\limits_{i=1}^{N} \left[ \frac{c}{4} \left( x_i - x_{i,0} \right) ^ 4 \right] \end{array} \label{eq:4} \end{equation} $V_A( \ldots )$ ensures that two particles do not cross each other, and instead collide over a brief time period. For the remainder of this manuscript, $c=0.1$ and $a = 5 \times 10^{-10}$. A small value of $c$ ensures that the anharmonic tethering energy is only a fraction of the harmonic spring energy for the majority of simulation time. Our choice of the constant $a$ is governed by: (i) the effective radius of the particles, taken as $r = 0.025$, so that when the distance between two particles is smaller than $2r$, a very large repulsive force is experienced by the particles, and (ii) $V_A \to 0$ when the distance between the two particles is greater than $2r$ so that there is small deviation of the Hamiltonian from the traditional $\Phi^4$ Hamiltonian at these distances. Corresponding to the chosen values of $r$ and $a$, figure \ref{fig:fig1} shows the relative contribution of the soft-sphere potential (force) vis-\'a-vis the harmonic potential (force). As is evident from the figure, beyond a distance of 0.050, the interparticle potential and force are dominated by the harmonic potential and the corresponding force, respectively. We now describe the methodology adopted in the present study. \section{Simulation Methodology} The particles of both $\Phi^4$ and $\Phi^{4C}$ chains are initialized such that their $i^{th}$ particle is located at $x_{i,0} = i-1$. Fixed-fixed boundary conditions are imposed on the chains through two fictitious stationary particles located at $x=-1$ and $x=N$. These boundary particles interact with the remaining particles by means of $V_H(\ldots) + V_A (\ldots)$ as described in the previous section. The initial velocity of each particle is chosen randomly from a uniform distribution between -0.5 to 0.5. A thermal gradient is effected on the system by keeping the first and the last particle of the chain in contact with heat reservoirs maintained at temperatures $T_H$ and $T_C$, respectively, where $T_H > T_C$. A graphical representation of the chains is shown in figure \ref{fig:fig2}. \begin{figure} \center \includegraphics[scale=0.5]{Representation.eps} \caption{Pictorial depiction of the chains with the fixed-fixed boundary condition. Here, $T_H (T_C)$ denotes the hot (cold) thermal reservoir.} \label{fig:fig2} \end{figure} Due to the simplicity and wide adoption in scientific studies, from amongst the different deterministic thermostat algorithms \cite{nose1984unified,martyna1992nose,patra2014deterministic,patra2015deterministic,braga2005configurational} for controlling temperature of the reservoirs, we choose two Nos\'e-Hoover thermostats \cite{hoover1985canonical} -- one for $T_H$ and another for $T_C$. For both the thermostats, the thermostat mass was chosen as unity. The intermediate particles present between the first and the last particle are governed by standard Hamiltonian evolution. Thus, the resulting equations of motion are: \begin{equation} \begin{array}{rcl} \dot{q_i} & = & \frac{\partial{H}}{\partial{p_i}} \\ \dot{p_i} & = & -\frac{\partial{H}}{\partial{q_i}} - \delta_i^H\zeta_H p_1 - \delta_i^C\zeta_C p_N\\ \dot{\zeta_H} & = & \frac{p_1^2}{T_H} - 1\\ \dot{\zeta_C} & = & \frac{p_N^2}{T_C} - 1\\ \text{where :}\\ \delta_i^H & = & 1 \{\text{if } i = 1 \}\\ \delta_i^C & = & 1\{ \text{if } i = N \}\\ \end{array} \label{eq:eq5} \end{equation} These equations of motion are solved using the $4^{th}$ order Runge-Kutta method. For the $\Phi^4$ chain, the incremental time-step, $\Delta t$, is chosen as 0.0005, and the system is allowed to evolve for 1 billion time steps. The first 250 million time steps are for ensuring that steady-state sets in within the chain while the last 750 million time steps are the actual runs from which all time averages are computed. For the $\Phi^{4C}$ chains, owing to the differential equations being stiff, the incremental time-step is halved to $\Delta t = 0.00025$. The $\Phi^{4C}$ equations are solved for 2 billion time steps, of which the first 500 million time steps bring the chain to steady-state conditions and the last 1.5 billion time steps are used for computing time averages. Both $\Phi^4$ and $\Phi^{4C}$ chains with $N= 16, 32, 64, 128, 256, 384$ and $512$ particles have been considered to understand the length scaling behavior of thermal conductivity. Keeping $T_H = 1.10T_M$ and $T_C = 0.90T_M$, we consider four values of $T_M=2.0,1.0,0.50$ and 0.10 for each case to identify the temperature scaling behavior of thermal conductivity. For reasons that will be apparent later, additional simulations have been performed for $\Phi^{4C}$ chains with $N=512$ and $T_M$ varying from 0.1 to 1.0 in increment of 0.05. \subsubsection{Temperature and Thermal Conductivity Computation:} Under the assumption that local thermodynamic equilibrium conditions \cite{patra2014deterministic} prevail within a chain, it is possible to define the different thermodynamic properties for every particle of the chain, including temperature and energy current. Temperature of a particle may be defined in multiple ways -- kinetic, configurational, Rugh's, etc. -- all of which are same under local thermodynamic equilibrium conditions \cite{patra2017nonequilibrium}. Consequently, we choose the simplest way of defining temperature -- the kinetic temperature -- as the temperature of a particle: \begin{equation} k_B T_i = \langle mv_i^2 \rangle, \end{equation} Here, $T_i$ is the kinetic temperature of the $i^{th}$ particle. For the remainder of this study, the Boltzmann constant $k_B$ is set at unity. $\langle \ldots \rangle$ denotes the long time averaged value. Interested readers are referred to the review papers by Powles et. al \cite{powles2005temperatures} and Casas-V\'azquez and Jou \cite{casas2003temperature} for other ways of defining temperature. The instantaneous local heat current at the $i^{th}$ site may be obtained by taking the time derivative of the local energy density, $\epsilon_i$, associated with the $i^{th}$ particle \cite{dhar2008heat}, and can be written as: \begin{equation} \begin{array}{rcl} \dot{\epsilon_i}& = &\frac{\partial\epsilon_i}{\partial t} +\left[ j_{i-1,i} -j_{i,i+1} \right]. \end{array} \label{eq:eq7} \end{equation} Here, $j_{i,j}$ is the energy current flowing from the $i^{th}$ to the $j^{th}$ particle, and is given by: $j_{i,j} = \dfrac{1}{2} \left[ f_{i,j}(v_i+v_j) \right]$. Note that $f_{i,j}$ is the sum of harmonic and anharmonic forces acting on the $j^{th}$ particle due to the $i^{th}$ particle. At steady-state, where the time averaged quantities, $\langle \dot{\epsilon_i} \rangle= \langle \frac{\partial\epsilon_i}{\partial t} \rangle = 0$, equation (\ref{eq:eq7}) simplifies to $\langle j_{i-1,i} \rangle = \langle j_{i,i+1} \rangle$. Further, at steady state since $\langle d V (\Delta x_{i-1,i})/ dt \rangle = 0$, we get \cite{dhar2008heat}: \begin{equation} \begin{array}{rcl} \langle j_{i-1,i} \rangle& = \langle \frac{1}{2}(v_i+v_{i-1})f_{i-1,i} \rangle = \langle v_if_{i-1,i} \rangle. \end{array} \end{equation} The time averaged value of heat flux, $\langle J \rangle$, may now be computed as: \begin{equation} \langle J \rangle = \left\langle\dfrac{\sum\limits_{i=1}^{N} j_{i,i-1}}{N}\right\rangle, \end{equation} from which the thermal conductivity, $\kappa$, emerges as: \begin{equation} \begin{array}{rcl} \kappa & = & \dfrac{\langle J \rangle N}{\Delta T}.\\ \end{array} \label{eq:kappa} \end{equation} Here, $\Delta T / N$ is the temperature gradient with $\Delta T = T_H - T_C = 0.20 T_M$. \subsubsection{\label{sec3.3}Monitoring of Modal Energy:} In order to understand the energy transfer between modes, a separate set of simulations have been performed to monitor the energy of each mode in constant energy ensemble wherein, the equations of motion (\ref{eq:eq5}), simplify to: $\dot{q}_i = \dfrac{\partial H}{\partial p_i}, \dot{p}_i = \dfrac{-\partial H}{\partial q_i}$. Calculation of modal energy requires the knowledge of the modal parameters -- mode shapes, modal frequencies, modal displacements and modal velocities. Neglecting the anharmonic part of the potential, all modal parameters can be obtained by diagonalizing the mass-normalized Hessian matrix, $\mathbf{[M^{-1}K]}$. For a chain comprising $N$ particles, $\mathbf{[K]}$ is a symmetric matrix of dimension $N\times N$, whose elements are: \begin{equation} K_{i,j} = \dfrac{\partial^2 V_H}{\partial x_i \partial x_j} \to K_{i,i} = 2, K_{i,i+1} = K_{i-1,i} = -1. \label{eq:5} \end{equation} All remaining terms are zero. Since, the mass matrix, $\mathbf{[M]}$, is an identity matrix for our case, the diagonalization of $\mathbf{[K]}$ provides the normal modal frequencies, $\omega_i^2, i \in [1,N]$, and the corresponding normal modes, $\vec{\xi}_i,i \in [1,N]$. The instantaneous modal displacement, $\delta_i(t)$, and velocity, $\dot{\delta_i(t)}$, corresponding to the $i^{th}$ mode of vibration may be obtained by projecting the instantaneous displacements and velocities of all $N$ particles onto the $i^{th}$ eigenvector: \begin{equation} \begin{array}{rcl} \delta_i(t) & = & \sum\limits_{j=1}^{N} (x_j(t) - x_j(0))\xi_{ij}, \\ \dot{\delta}_i(t) & = & \sum\limits_{j=1}^{N} \dot{x}_j(t) \xi_{ij}, \\ \end{array} \label{eq:7} \end{equation} Thus, the instantaneous energy of the $i^{th}$ normal mode becomes: \begin{equation} E_i(t) = PE_i(t) + KE_i(t) = \dfrac{1}{2}\omega_i^2 \delta_i^2(t) + \dfrac{1}{2} \dot{\delta}_i^2(t), \label{eq:6} \end{equation} where, $PE_i$ and $KE_i$ are the potential and kinetic energies of the $i^{th}$ mode, and equal $\dfrac{1}{2}\omega_i^2 \delta_i^2(t)$ and $\dfrac{1}{2} \dot{\delta}_i^2(t)$, respectively. The following steps are used for continuously monitoring the modal energy: \begin{enumerate} \item At the beginning of the simulation, the matrix $\mathbf{[K]}$ is obtained using equation (\ref{eq:5}), and its mass-weighted form is diagonalized to obtain $\omega_i , i \in [1,N]$ and $\vec{\xi}_i, i \in [1,N]$. The chains are initialized such that the initial energy is concentrated in the first mode. This is obtained by imparting a velocity to all the particles according to the first eigenvector, $\vec{\xi}_1$: \begin{equation} \begin{array}{rcl} v_i&=&\alpha \xi_{1,i}. \end{array} \end{equation} Here $\alpha$ is a scaling constant taken as 10. \item \label{loop:a} Equations of motion for the chains are solved in a time-incrementing loop: \begin{enumerate} \item Update the position and velocity of all particles as per the equations of motion. \item Compute $\delta_i$ and $\dot{\delta}_i$ using the expressions (\ref{eq:7}). \item Evaluate modal energy of all modes using the expression (\ref{eq:6}). \item Repeat \ref{loop:a} until the required time is reached. \end{enumerate} \end{enumerate} The equations of motion are solved for 200,000 time steps for $\Phi^4$ chains with $\Delta t = 0.0005$, while for $\Phi^{4C}$ chains, the equations of motion are solved for 400,000 time steps with $\Delta t = 0.00025$. Note that neglecting the anharmonic contributions makes $\omega_i , i \in [1,N]$ and $\vec{\xi}_i, i \in [1,N]$ constant throughout the simulations, and hence, need to be evaluated only once. \section{Results:} \subsection{Verification} In order to check the veracity of our simulations, we compare previously reported solutions of $\Phi^4$ chains with those obtained from our code. The test cases correspond to $k=c=1.0$ and $N=512$ particles. The simulation methodology has been kept the same as highlighted before including the boundary conditions. The thermostats were set at three different mean temperatures $T_M = 1.0, 0.5$ and 0.1 with the higher temperature, $T_H$, being $10\%$ more and the lower temperature, $T_C$, being $10\%$ lesser than $T_M$. Theoretically, the conductivity follow $\kappa_{th} = 2.724/T_M^{1.382}$ \cite{aoki2000non}. The values obtained from the simulations have been compared to the theoretical values in table \ref{table1}, and as can be seen, there is a good agreement between $\kappa_{th}$ and $\kappa$. The difference between them at lower temperatures occurs due to the different boundary conditions used. \begin{table} \caption{\label{table1} A $\Phi^4$ chain with $k=1$ and $c=1$ is subjected to thermal conduction as per the methodology highlighted before. Our simulation results for thermal conductivity ($\kappa$) are compared with those obtained by Aoki and Kusnezov \cite{aoki2000non}: $\kappa_{th} = 2.724/T_M^{1.382}$. The difference in the results arise because of different boundary conditions adopted for finding $\kappa_{th}$.} \begin{center} \begin{tabular}{c c c c c} \hline $T_M$ & $\langle J \rangle$ & $J\times N$ & $\kappa$ & $\kappa_{th}$ \\ \hline \hline 1.0 & 0.0011 & 0.570 & 2.849 & 2.724 \\ 0.5 & 0.0013 & 0.647 & 6.470 & 7.100 \\ 0.1 & 0.0023 & 1.574 & 57.870 &65.646 \\ [1ex] \hline \end{tabular} \end{center} \end{table} \subsection{Check for steady-state conditions} In non-equilibrium settings, meaningful time averages can be taken only after a system reaches steady state conditions. As described before, we have assumed that the chains reach steady-state conditions after 250 million time steps. We now check if our assumption is valid. At steady state, the net heat current, $\langle J \rangle$, must equal local heat current flowing between any two adjacent particles i.e. $\langle j_{1,2} \rangle = \ldots = \langle j_{i-1,i} \rangle = \langle j_{i,i+1} \rangle = \ldots = \langle j_{N-1,N} \rangle$. A significant deviation from this condition indicates that the system has not yet reached a steady state. Resetting the parameter $c$ to 0.1 in $\Phi^4$ chains with $N=512$ particles, we compute the following time-averaged quantities for the 750 million actual simulation runs: $(\langle J \rangle, | \langle J \rangle - \min \langle j_{i-1,i} \rangle|, | \langle J \rangle - \max \langle j_{i-1,i} \rangle |)$. The results for $T_M = 1.0, 0.5$ and $0.1$ are: $(0.0221,4.71 \times 10^{-5},5.88 \times 10^{-5}), (0.0237,3.383\times 10^{-5},2.366 \times 10^{-5}),(0.009955,1.4206\times 10^{-5},7.7032\times 10^{-6})$, respectively. The small deviations are indicative of the fact that one can take time averages for the 750 million actual simulation meaningful runs. \subsection{Temperature Profile} \begin{figure} \centering \includegraphics[scale=0.5]{combprofile.eps} \caption{Scaled temperature profile of $\Phi^4$ and $\Phi^{4C}$ chains with N = 512 particles subjected to four different values of $T_M$. Scaling is done such that the scaled values of $T_H $ and $T_C$ are 1.1 and 0.9, respectively. Scaled temperature, $T_{S,i}$, of the remaining particles are interpolated. As can be seen from the figure, $\Phi^4$ particles exhibit larger boundary jumps in the temperature profile than the $\Phi^{4C}$ particles. In absence of these boundary jumps, the $\Phi^{4C}$ chain deviates marginally from a linear profile (green line) even at low $T_M$. On the other hand, in $\Phi^4$ chains, the presence of boundary jumps causes significant deviation from linear temperature profile at low $T_M$. } \label{fig:fig3} \end{figure} Assuming that local thermodynamic equilibrium conditions prevail within the chain under the prescribed temperature gradient, each particle of the chain has a well defined kinetic temperature. In order to make a uniform comparison of temperature profiles, the kinetic temperature of each particle, $T_i$, is normalized with $T_M$: \begin{equation} T_{S,i} = \dfrac{T_i}{T_M} \end{equation} Figure \ref{fig:fig3} depicts the variation of $T_{S,i}$ for the $\Phi^4$ and $\Phi^{4C}$ chains with $N=512$ particles. Introducing soft-sphere collision potential to the $\Phi^4$ chain drastically alters the temperature profile. A typical $\Phi^4$ chain exhibits boundary jumps in temperature profile \cite{aoki2001fermi}, which become more pronounced with decreasing $T_M$. In comparison, due to the soft-sphere collision potential, the boundary jumps are negligible in the $\Phi^{4C}$ chains. The difference between the two chains become markedly noticeable at lower values of $T_M$. We point to the readers that the exact reason for such boundary jumps is yet to be found. The linearity of temperature profile is a key signature of normal thermal transport characteristics \cite{lepri2016thermal}. It has been previously found that the temperature profile (away from the boundary jumps) in $\Phi^4$ chains varies linearly \cite{aoki2000non}. We now compute the deviation from linearity, $d_L$, for both the chains through: \begin{equation} d_L = \sum\limits_{i=1}^{N} \sqrt{\left( T_{S,i} - Y_i \right)^2}, \end{equation} where, $Y_i$ denotes the ordinate of the straight line corresponding to the $i^{th}$ particle. The results of $d_L$ are shown in table \ref{tab:table2} and confirm that, at low $T_M$, the temperature profile in $\Phi^{4C}$ chains is closer to being a straight line than that in $\Phi^4$ chains. Interestingly enough, while the deviation from linearity keeps decreasing with increasing $T_M$ for $\Phi^4$ chains, such a trend remains absent in the $\Phi^{4C}$ chains. The reduction in boundary jumps and deviation from linearity suggests that the $\Phi^{4C}$ chain allows for quicker thermalization and mimics macroscopic behavior better than the standard $\Phi^4$ chain at lower temperatures. \textcolor{blue}{ \begin{table} \caption{A comparison of deviation from linearity, $d_L$, for $N=512$ particles and four values of $T_M$. As is evident, the deviation from linearity is lesser for $\Phi^{4C}$ chains at low $T_M$. } \begin{center} \begin{tabular}{c c c} \hline $T_M$&$\Phi^4$ & $\Phi^{4C}$\\ \hline\hline 2.0&0.1529&0.1951\\ \hline 1.0&0.279&0.1923\\ \hline 0.5&0.603&0.1450\\ \hline 0.1&1.175&0.5060 \\ [1ex] \hline \end{tabular} \end{center} \label{tab:table2} \end{table} } \subsection{Thermal conductivity} \begin{figure} \centering \includegraphics[scale=0.5]{Combcond.eps} \caption{Variation of thermal conductivity, $\kappa$, with $N$ and $T_M$ for $\Phi^4$ and $\Phi^{4C}$ chains. While in the $\Phi^4$ chain, $\kappa$ increases with decreasing temperature owing to harmonic effects being predominant, the behavior of $\Phi^{4C}$ chain is not so straight forward. It first decreases with temperature and then suddenly increases. We attribute this behavior to the increased collisions at higher temperature. Interestingly enough, while for small $T_M$, $\kappa$ of $\Phi^{4C}$ chains is significantly smaller than that of $\Phi^4$ chains, such is not true for $T_M = 2.0$, where, $\kappa$ of $\Phi^{4C}$ chains is larger than $\Phi^4$ chains. } \label{fig:fig4} \end{figure} Thermal conductivity, $\kappa$, of both $\Phi^4$ and $\Phi^{4C}$ chains (shown in solid and dashed lines, respectively) are plotted in figure \ref{fig:fig4} for different values of $T_M$ and $N$. In $\Phi^4$ chains, $\kappa$ decreases with increasing $T_M$ and conforms with previously reported results \cite{PhysRevE.61.3828}. The reason may be attributed to the increased contribution of the anharmonic part of the potential because of the enhanced vibrations of the individual particles at higher temperatures. Consequently, the different modes of vibration interact with each other, and energy is transferred from the lower modes to the higher modes. In contrast, at low $T_M$ where harmonic effects dominate, the temporal evolution of energy in lower modes occurs nearly unimpeded, resulting in near-ballistic thermal conduction (see the solid green line of figure \ref{fig:fig4} ). Like $\Phi^4$ chains, $\Phi^{4C}$ chains satisfy Fourier's law as is evidenced by the plateauing of the graphs with increasing $N$ for a specific value of $T_M$. Further, it is apparent from figure \ref{fig:fig4} that $\kappa$ in $\Phi^{4C}$ chains follows a unique trend with temperatures which is not seen in any other one-dimensional momentum non-conserving chains -- as $T_M$ increases from 0.1 to 0.5, $\kappa$ reduces quickly, however, upon increasing $T_M$ further, $\kappa$ starts to rise. In order to better understand this phenomenon, the variation of $\kappa$ with $T_M$ is plotted in figure \ref{fig:fig5} for $N=512$ particles as $T_M$ is increased from 0.1 to 1.0 in increments of 0.05. It follows from figure \ref{fig:fig5} that beyond the inversion temperature of $T_M \approx 0.55$, $\kappa$ increases. \begin{figure} \centering \includegraphics[scale = 0.5]{Combined.eps} \caption{Variation of total thermal conductivity ($\kappa$), harmonic and anharmonic contributions to $\kappa$ for a $\Phi^{4C}$ chain comprising $N=512$ particles as $T_M$ is increased from 0.1 to 1.0. With increasing $T_M$, the particles tend to vibrate more and collide more frequently. Consequently, the contribution of harmonic part of the potential towards $\kappa$ decreases and the anharmonic contribution of soft-sphere potential starts to increase. Upon crossing the inversion temperature of $T_M \approx 0.55$, the anharmonic contribution overshadows the harmonic contribution.} \label{fig:fig5} \end{figure} The contributions to $\kappa$ may be split into harmonic ($J_H$) and anharmonic ($J_A$) heat currents, which can further be related to the harmonic ($f_{H,i,i-1}$) and anharmonic ($f_{A,i,i-1}$) inter-particle forces: \begin{equation} \begin{array}{rcl} \kappa & = & \dfrac{\langle J_H \rangle N}{\Delta T} + \dfrac{\langle J_A \rangle N}{\Delta T} \\ & = & \dfrac{\langle \sum j_{H,i,i-1} \rangle}{\Delta T} + \dfrac{\langle \sum j_{A,i,i-1} \rangle}{\Delta T} \\ & = & \dfrac{\langle \sum v_i f_{H,i,i-1} \rangle}{\Delta T} + \dfrac{\langle \sum v_i f_{A,i,i-1} \rangle}{\Delta T} \\ \end{array} \end{equation} The anharmonic part of the heat current, $J_A$ has a role to play when two particles ``collide''. It must be noted that since two particles of a $\Phi^{4C}$ chain never actually undergo head-on collisions in presence of soft-sphere potential, we identify a collision event from the trajectory of two particles -- the collision count is incremented by one whenever the relative velocity of the two particles gets reversed as they come within the effective radius, $r$. At higher $T_M$, collisions are more frequent, as can be seen from the secondary $y$ axis of figure \ref{fig:fig5} which plots the number of such collisions occurring per time step. The unique trend of $\kappa$ in $\Phi^{4C}$ chains occurs because $J_A$ increases with increasing frequency of collisions, so much so, that beyond $T_M \approx 0.55$, it overtakes $J_H$. \subsection{Normal Modes} \begin{figure} \centering \includegraphics[scale = 0.5]{Modal16.eps} \caption{Temporal evolution of the first normal modal energy for $\Phi^4$ and $\Phi^{4C}$ chains comprising of $N=16$ particles. The methodology adopted for these simulations is discussed in section \ref{sec3.3}. The system is initialized so that all energy is concentrated in the first mode of vibration. As time progresses, it is evident that the the energy of first mode is distributed to other modes. However, the speed of redistribution is much faster in $\Phi^{4C}$ chains than in the $\Phi^4$ chains because of collisions. Due to the quicker redistribution of modal energy in the $\Phi^{4C}$ chains, the thermal conductivity in $\Phi^{4C}$ chains is much smaller initially.} \label{fig:fig6} \end{figure} It is now well known that high thermal conductivity in one-dimensional chains occurs because of the slow diffusion of energy carried by the low-frequency and long-wavelength modes. In presence of anharmonicity (due to tethering potential in $\Phi^4$ chains and tethering + soft-sphere collision potentials in $\Phi^{4C}$ chains), the lowest modes interact with the higher modes, causing energy transfer from the lowest modes. Thus, in both $\Phi^4$ and $\Phi^{4C}$ chains, one observes finite thermal conductivity. However, the rate of energy transfer from the lowest modes is different for the two chains. From figure \ref{fig:fig4}, it is evident that at low $T_M$, thermal conductivity in $\Phi^{4C}$ chains is significantly smaller than in $\Phi^4$ chains. This suggests that the rate of energy transfer from the lowest modes is significantly faster in $\Phi^{4C}$ chains. In order to justify our statement, we now look into the temporal evolution of normal modal energies of both the chains using the methodology highlighted in section \ref{sec3.3}. Figure \ref{fig:fig6} plots the temporal evolution of the first normal modal energy with $N=16$ particles. It can be observed from the figure that the time averaged energy of the first mode decreases faster in $\Phi^{4C}$ chains than in $\Phi^4$ chains. The strong anharmonicity occurring during collisions causes the energy of the first mode to quickly redistribute itself to higher modes, significantly reducing thermal conductivity. The relationship between thermal conduction and energy redistribution amongst the different modes gets somewhat obscure at high $T_M$. This is evident from the brown curves of figure \ref{fig:fig4}, where it can be seen that at $T_M = 2.0$, $\Phi^{4C}$ chains have a larger thermal conductivity than $\Phi^4$ chains. At higher temperatures, because of increased frequency of collisions, the anharmonic soft-sphere forces contribute more towards heat current than the harmonic ones. Any explanation of this observation in terms of normal modal energy is yet to emerge. \section{Conclusions \& Discussions} The present manuscript relaxes the assumption of point particles prevalent in the study of thermal transport characteristics in one-dimensional $\Phi^4$ chains. Having a finite dimension, the particles of the modified chain, termed as the $\Phi^{4C}$ chain, can now ``collide'' with each other. Collisions have been modeled through an anharmonic soft-sphere potential because of which two particles strongly repel each other upon coming closer than a threshold value. This makes $\Phi^{4C}$ chains a closer one-dimensional approximation to real life systems, such as CNTs and nanowires, than $\Phi^4$ chains. It must be noted that the resulting equations of motion are stiff, necessitating very small time steps for obtaining consistent solutions. Allowing collisions between the particles results in -- (i) a drastic alteration of the temperature profiles, (ii) a significant reduction in thermal conductivity at low temperatures, and (iii) an increase in thermal conductivity beyond the inversion temperature. Like the traditional $\Phi^4$ chain, we observe that the $\Phi^{4C}$ chains obey Fourier's law. Except for this similarity, the thermal transport characteristics of the two chains are vastly different. The first set of differences arises in the temperature profile of the two chains -- the boundary temperature jumps typically present in $\Phi^4$ chains at low temperatures are, for all practical purposes, absent in $\Phi^{4C}$ chains. Further, the deviation from linearity is smaller in the $\Phi^{4C}$ chains at these temperature ranges. These attractive properties along with the ability to better represent real-life one-dimensional systems makes $\Phi^{4C}$ chains more suitable for studying multiscale thermal transport behavior at low temperatures. Perhaps, the most contrasting results arise for thermal conductivity. At low temperatures, where harmonic effects dominate, thermal conductivity of both $\Phi^4$ and $\Phi^{4C}$ chains are high, with $\Phi^4$ chains having a relatively larger thermal conductivity. However, with increasing temperature, while in $\Phi^4$ chains thermal conductivity decreases continuously, thermal conductivity in $\Phi^{4C}$ chains first decreases abruptly and then keeps increasing beyond an inversion temperature. This unique trend of $\Phi^{4C}$ chains is typically absent in other well established momentum non-conserving one-dimensional chains. The reason behind these observations have a well grounded explanation in terms of the energy transported by the normal modes of vibration. Looking at the dynamics in Fourier space, we see that the interaction between the different normal modes is more in $\Phi^{4C}$ chains than in $\Phi^4$ chains because of the collisions between the particles. This results in quicker redistribution of energy from the lowest modes to the higher modes of vibration. At low temperatures, where thermal conductivity is highly dependent on the energy transported by the lowest modes of vibration, a quick redistribution of energy from the lowest modes causes $\Phi^{4C}$ chains to have a reduced thermal conductivity than $\Phi^4$ chains. However, this line of argument cannot explain the rise in thermal conductivity post the inversion temperature. So, what is the underlying cause behind this rise? To answer this question, we split the heat current into two parts, and look explicitly at the contributions arising from the harmonic and anharmonic inter-particle forces. As collisions tend to increase with increasing temperature, the contribution of anharmonic inter-particle forces towards the total heat current exceeds that of harmonic forces resulting in larger thermal conductivity. To conclude, the $\Phi^{4C}$ chains proposed in this work have the features of both momentum non-conserving systems -- such as finite thermal conductivity, satisfying Fourier's law, etc. -- and momentum conserving systems -- such as increase in thermal conductivity upon increasing the temperature -- and may, therefore, become an important tool to study thermal transport in real-life systems. This work sets the stage for studying the effects of including collisions in momentum-conserving nonlinear chains such as an FPU chain. In an FPU chain, where the heat current occurs because of both harmonic and anharmonic inter-particle forces, it will be interesting to see if the additional anharmonicity caused by soft-sphere collisions have any bearing on both modal energy recurrence and anomalous heat transport. \section{Acknowledgment} Support for the research provided in part by Indian Institute of Technology Kharagpur under the grant DNI is gratefully acknowledged. Authors also gratefully acknowledge Prof. Baidurya Bhattacharya of Indian Institute of Technology Kharagpur for providing insightful comments on the manuscript.
\section{Introduction} Spin torque nano oscillators (STNOs) convert magnetization dynamics into electrical rf signals by exploiting fundamental phenomena of spintronics, such as the magnetoresistive effect \cite{Fert1988,Gruenberg1989} and the concept of spin transfer torque \cite{Berger1996,Slonczewski1996}, which allows sustaining their dynamics. Since 2003, the investigation of STNO properties \cite{Kiselev2003} has attracted a huge interest as they have been considered not only as a unique opportunity for studying nonlinear dynamics at the nanoscale, but also as promising candidates for next-generation multifunctional spintronic devices \cite{Locatelli2013}. More recently, STNOs have also been demonstrated to be capable of being key elements in the realization of broadband microwave energy harvesting \cite{Fang2018} or frequency detection \cite{Jenkins2016,Louis2017}, and of reconstructing bio-inspired networks for neuromorphic computing \cite{Torrejon2017,Romera2018}. \\ These possible applications are all strongly linked to the STNO's fundamental property, i.e. its nonlinearity, {which describes a coupling between the oscillator's amplitude and phase{\cite{Kim2008,Slavin2009}}.} It provides the basis to manifold phenomena such as injection locking to an external rf signal \cite{Lebrun2015,Hamadeh2014}, synchronization of multiple STNOs \cite{Kaka2005,Locatelli2015,Lebrun2017} or the spin torque diode effect \cite{Jenkins2016,Tulapurkar2005,Miwa2013,Naganuma2015}. However, nonlinear behaviour also causes the oscillator's poor spectral coherence and leads to a conversion from amplitude to phase noise \cite{Kim2008,Slavin2009,Grimaldi2017}, which limits its amplitude and frequency stability, and therefore its applicability in real practical devices. Noise mechanisms in tunnel- or giant magnetoresistive effect (TMR/GMR resp.) based magnetic sensors, which represent the building block of a STNO, are usually the frequency independent shot (only for TMR) and thermal noise, and low frequency $1/f$-noise, also called flicker noise. In certain cases, Random Telegraph Noise (RTN), arising from the fluctuations between two different energy levels, can also exist. Its sources are mainly of electronic or magnetic origins and equally present in STNOs as well, where it is anticipated that the existence of self sustained nonlinear magnetization dynamics drastically influences the noise characteristics compared to classical magnetic sensors.\\ The STNO's noise distribution for offset frequencies far from the carrier frequency is now reasonably well understood. At room temperature, it has been found that it is mainly attributed to dominant thermal noise in the framework of nonlinearity \cite{Grimaldi2017,Quinsat2010,Slavin2009,Silva2010}. However, the noise at low offset frequencies, which is crucial for most of the targeted applications, remains largely under investigation. The existence of flicker noise at these low frequency offsets is of a general nature, as noise of spectral $1/f^{\beta}$-scaling is present in a wide variety of physical systems, such as stellar emissions, lake turbulences, Nile flooding, and virtually all electronic devices \cite{Rubiola2008}. Initially recognized by Johnson \cite{Johnson1925}, and later investigated in thin films \cite{Bernamont1937}, it has recently attracted attention as the dominant noise source in GMR and TMR sensors \cite{Nowak1999,Arakawa2012,Almeida2006,Feng2012} and their major drawback in terms of performance.\\ In STNOs, the $1/f$ flicker noise at low offset frequencies has so far only been experimentally recognized\cite{Keller2010, Eklund2014,Quinsat2010,Grimaldi2017}. {In Refs. {\cite{Quinsat2010,Grimaldi2017}}, the focus has been on thermal noise at high offset frequencies and an indication of colored $1/f$ noise at lower offsets has been found. Ref. {\cite{Keller2010}} presents a measurement method to access the $1/f$ regime and shows its influence on the frequency spectra. In Ref. {\cite{Eklund2014}}, the study concerns $1/f$ noise in the very specific geometry of nano-contact STNOs. A large influence on multiple present modes, which are particularly avoided within the work presented here, has been found. } {In the present work, we systematically investigate the $1/f$ flicker noise in vortex based STNOs (in the following called STVOs) both experimentally, and theoretically based on the corresponding nonlinear Langevin equations {\cite{Slavin2009}} together with a phenomenological approach. Moreover, we present a thorough study of the important parameters governing this type of noise. } In magnetic sensor applications, the flicker noise, which can not yet be described in its entire universality, is typically described by the empirical Hooge formalism \cite{Hooge1969,Fermon2013}. In this work, we also aim at establishing a connection between a magnetic TMR sensor, a fundamental building block of the STNO, and the latter's intrinsic nonlinearity. We focus our study on vortex based spin torque nano-oscillators (STVOs). The fundamental mode in these devices, the gyrotropic vortex motion \cite{Cowburn1999,Shinjo2000}, is deterministically well understood and can be described by reducing the complex dynamics only to the dynamics of the vortex core (the so-called Thiele formalism \cite{Thiele1973}). Moreover, it is energetically well separated from other modes reducing mode crossing probabilities. STVOs, compared to other STNOs exploiting different magnetic modes (as e.g. a uniform precession or local modes), exhibit large amplitude oscillations with frequencies from $100\,$MHz up to $\sim 1.5\,$GHz, a rather narrow linewidth of $\sim 100\,$kHz, and output powers of up to a few $\upmu$W \cite{Tsunegi2014}. Since magnetic vortex dynamics has in many aspects been considered as a model system for the study of magnetic dynamics \cite{Grimaldi2017}, STVOs are suitable to fundamentally study the noise behaviour of STNOs. {We believe that the general results of this work can be extrapolated to every kind of STNO, as the nonlinear nature and the basic noise generating processes are the same. Thus, the main objective is to establish a connection between flicker noise and the STNO's nonlinearity and to study the STNO's flicker noise in general. Such study has not been performed yet for STNOs, even if this is an important issue for the different types of applications aiming to rely on them. The article is organized in the following way: We first present the basic mechanisms of the fundamental gyrotropic mode in spin torque vortex oscillators (STVOs). We connect the latter with the general nonlinear auto-oscillator theory, which provides a theoretical basement for the description of spin torque nano oscillators (STNOs) in general. From this model, we deduce the STNO's noise behaviour especially including low offset frequency $1/f$ flicker noise processes via a phenomenological approach. In section {\ref{sec:experiment}}, we describe the experiment's details and give basic properties of our samples. In section {\ref{sec:results_noise_STVOs}}, we present experimental data showing the noise characteristics in STVOs and subsequently, in section {\ref{sec:flicker-noise_in_STVOs}}, focus on the low offset frequency regime. We compare and analyze the experimental data regarding the developed model and, in section {\ref{sec:flicker-noise_in_STVOs}}, introduce the formalism of \textsc{Hooge} to discuss the governing parameters of flicker noise in STNOs in general and STVOs in particular. } \section{General Framework of magnetization dynamics and noise in STNOs and STVOs} \label{sec:general_framework} \subsection{Noise properties of the STVO's gyrotropic mode} In laterally confined geometries such as disks, an excitation of the vortex core from its equilibrium position at the center of the circular nano pillar leads to a radial motion in the sub-GHz regime around the equilibrium, i.e. the gyrotropic mode of the vortex core. Assuming the vortex core as a soliton and subsequently applying Thiele's approach \cite{Thiele1973}, this gyrotropic mode is mainly characterized by the vortex core position $\vec{X}(t)$, which is represented by the oscillation's orbit radius $r(t)$, i.e. its normalized value $s(t)=r(t)/R$, and its phase $\phi (t)$. Fig. \ref{fig:Forces} schematically summarizes the forces, which mainly define the gyrotropic motion within the Thiele formalism \cite{Thiele1973,Dussaux2012}: The gyroforce, arising from the vortex non collinear profile, the damping force expressing the magnetic relaxation, the confinement force due to the magnetostatic energy, and the spin transfer force As the injected spin transfer torque overcomes the damping, the vortex core autooscillates on an isoenergetic trajectory (fig. \ref{fig:vortex-motion}). Due to the system's nonlinear nature, it is always pushed onto a stable limit cycle as the oscillation amplitude $a (t) \sim s (t)$ becomes lower than the stable value and is pulled back as it becomes higher. \definecolor{hellblau}{RGB}{48,157,181} \definecolor{orange}{RGB}{228,108,10} \begin{figure}[bth!] \centering \subfloat \label{fig:Forces}] { \includegraphics[width=0.39\columnwidth]{Forces_new.pdf} } \hfill \subfloat \label{fig:noise-types}] { \includegraphics[width=0.44\columnwidth]{noise-types_new_3.pdf} } \caption[]{(a) Schematics of forces acting on the magnetic vortex core: gyroforce (green arrow), confinement force (yellow), spin transfer (purple), and damping force (blue); (b) Noise schematics of vortex motion: amplitude and phase noise \textcolor{hellblau}{$\delta s$} and \textcolor{orange}{$\delta \phi$} resp.} \label{fig:vortex-motion} \end{figure} This limit cycle mechanism also appears in presence of noise, which perturbs the ideal trajectory and is separated into amplitude and phase noise, as depicted in fig. \ref{fig:noise-types}. Noise sources can be manifold and have recently been mainly attributed to thermal origins \cite{Kim2008,Tiberkevich2007,Kudo2009,Georges2009,Quinsat2010,Grimaldi2017}, which furthermore lead to a change in spectral shape and an increase in linewidth of the oscillation \cite{Grimaldi2017}. Moreover, the presence of colored $1/f$ noise has been shown experimentally at offset frequencies close to the carrier \cite{Keller2010, Eklund2014,Quinsat2010,Grimaldi2017}. \subsection{The general nonlinear auto-oscillator theory} \label{subsec:Slavin-theory} We first remind the general nonlinear auto-oscillator theory\cite{Slavin2009,Tiberkevich2007,Slavin2008}, which is a universal theoretical approach for nonlinear oscillators in general and spin torque nano oscillators (STNOs) in particular. For STNOs, this model can be derived from the Landau-Lifshitz-Gilbert-Slonczewski equation and describes the deterministic dynamics of the nonlinear oscillator through the complex oscillation amplitude $c(t)=\sqrt{p(t)}e^{i\phi (t)}$: \begin{align} \frac{dc}{dt} + i\omega(|c|^2)c + \Gamma_+ (|c|^2)c - \Gamma_- (|c|^2)c = f(t) ~~~. \label{eq:Langevin-eq} \end{align} {In this model, the gyrotropic motion of the vortex core (as described above) can be identified through oscillation amplitude $a(t) = \sqrt{p(t)}$ and phase $\phi(t)$ of the complex variable $c(t)$.} $\omega$ hereby denotes the oscillation's angular frequency, $\Gamma_+$ the positive damping rate representing the losses of the system, and $\Gamma_-$ the negative damping rate representing the system's gain. $f(t)$ is a phenomenological term, which allows a description of the system's interaction with the environment. In the case regarded here, that mainly includes different noise-processes, among them thermal and flicker noise, which make equation (\ref{eq:Langevin-eq}) a nonlinear stochastic Langevin equation. \\ Due to the dependence of the damping parameters on the amplitude ($\frac{d\Gamma_-(p)}{d p} < 0$ and $\frac{d\Gamma_+(p)}{d p} > 0$), the oscillation is described by a limit cycle with stable oscillation power $p_0= |c|^2$, which is obtained when the positive and negative damping terms equal: $\Gamma_-(p)=\Gamma_+(p)$. Assuming perturbation $\delta p$ of the stable oscillation power due to noise gives a characteristic damping rate $\Gamma_p = \pi f_p = \left[ \frac{d\Gamma_+}{dp} (p_0) - \frac{d\Gamma_-}{dp} (p_0) \right] p_0$ of small power deviations back to the stable trajectory. The parameter $\nu = N p_0/(\pi f_p)$ with $N=d\omega(p)/dp$ the nonlinear frequency shift coefficient is the normalized dimensionless nonlinear frequency shift and quantifies the coupling between phase and amplitude due to nonlinearity. \subsection{Theoretical description of low offset frequency flicker noise} In the following, we assume a phenomenological ansatz to describe the low offset frequency noise in the framework of the nonlinear autooscillator theory. Its parameters can for STVOs be identified with the deterministic exploitation of the Thiele equation on the spin transfer torque induced gyrotropic motion\cite{Dussaux2012,Grimaldi2017}. {More detailed steps of the following derivation can be found in the supplementary information\cite{supplementary_noise_PRB_2018}.} We define $f_n(t)$, which is the realization of the stochastic $1/f$ noise process, to act independently on amplitude and phase: $g_n(t) = \Re\left[ f_n(t) e^{-i\phi (t)} \right] $ and $h_n(t) = \Im\left[ f_n(t) e^{-i\phi (t)} \right] $. Here, the flicker noise process is assumed to be stationary and so are $g_n$ and $h_n$. Note that the colored $1/f$ noise can be modeled from an ensemble of statistically independent Ornstein-Uhlenbeck processes with varying correlation times\cite{Kaertner1990}. Linearization of eq. (\ref{eq:Langevin-eq}) with the perturbed oscillator power $p=p_0 + \delta p$ and the phase fluctuations $\delta \phi (t)$ gives the coupled differential equations \cite{Slavin2009,Kim2008,Silva2010}: \begin{align*} \frac{d (\delta p)}{dt} + 2\pi f_p \delta p(t) = 2 \sqrt{p_0}~ g_n (t) \\ \frac{d(\delta \phi)}{dt} = \frac{1}{\sqrt{p_0}} ~ h_n(t) - N ~ \delta p (t) ~~~. \end{align*} Solving in the frequency space yields: \begin{align*} \delta p(f) &= \frac{\sqrt{p_0}}{\pi f_p + i\pi f} \cdot g_n (f) \intertext{and} \delta \phi (f) &= \frac{1}{2 \pi i f \sqrt{p_0} } ~ h_n(f) - \frac{N}{2\pi i f} ~ \delta p (f) ~~~. \end{align*} Inserting the experimental $1/f^{\gamma}$-behaviour of the noise spectral density into the autocorrelation's Fourier transform exploiting the Wiener-Khintchine-theorem \begin{align*} S_{f_n}(f) = \int \langle f_n(t)f_n^*(t-t')\rangle \cdot e^{2\pi i f t} dt = \frac{\alpha}{f^{\gamma}} ~~~, \end{align*} \hspace{0.25cm} allows formulating the expression for the PSDs of phase and amplitude noise in the low offset frequency regime. \definecolor{hellblau}{RGB}{48,157,181} \definecolor{orange}{RGB}{228,108,10} Together with the noise PSD resulting from thermal noise processes (as studied in Ref. \cite{Grimaldi2017,Quinsat2010,Slavin2009,Kim2008,Silva2010}), we obtain the total noise PSD expression ${S_{\delta \epsilon}}$ for the normalized amplitude $\epsilon = a/a_0 = s/s_0$ and ${S_{\delta \phi} } $ for the phase respectively: \begin{align} {S_{\delta \epsilon}} &= \frac{\Delta f_0}{\pi} \cdot \frac{1}{f^2 + f_p^2} + \frac{1}{4 p_0 \pi^2 \left( f_p^2 + f^2 \right)} \cdot \frac{\alpha}{f^{\gamma}} \label{eq:all-noise_amp} \\ {S_{\delta \phi} } &= \frac{\Delta f_0}{\pi f^2} + \frac{1}{4 p_0 \pi^2 f^2 } \cdot \frac{\alpha}{f^{\gamma}} + \frac{\nu^2 f_p^2}{f^2} {S_{\delta \epsilon}} ~~~. \label{eq:all-noise_phase} \end{align} The first terms in both equations, proportional to the oscillation linewidth $\Delta f_0$, correspond to thermal origins, whereas all other terms describe the additional PSD due to flicker noise, which is at the center of the present study. Note that the variable $\alpha$ for the amplitude noise is not necessarily equivalent to $\alpha$ in the phase noise equation as different mechanisms might contribute. The flicker noise terms describe the original noise of exponent $\gamma$, which leads to a $1/f^{\gamma}$ slope for the amplitude and a $1/f^{\gamma+2}$ slope for the phase noise. {Equation ({\ref{eq:all-noise_phase}}) clearly shows the nonlinear conversion from amplitude to phase noise. Moreover, we also find an additional}, non-coupled pure phase flicker noise term -- the second term in eq. ({\ref{eq:all-noise_phase}}) --, which also exhibits a $1/f^3$-characteristic. \section{Experiment} \label{sec:experiment} The samples are circular shaped magnetic tunnel junctions {of diameter $2R=375\,$nm}, which consist of a pinned layer made of a conventional synthetic antiferromagnetic stack (SAF), a MgO tunnel barrier and a FeB free layer {exhibiting a magnetic vortex configuration}. The layers are deposited by ultrahigh vacuum (UHV) magnetron sputtering and patterned using e-beam lithography and Ar ion etching. After annealing at $360\,^{\circ}$C for $1\,$h, the resistance-area product is $RA\approx 4\,\Omega\cdot\upmu m^2$. The TMR ratios lie around $100\,$\% at room temperature {with resistance values of $1/G_0=(44-45)\,\Omega$ in the vortex state, slightly dependent on the applied current with negative slope}. The SAF is composed of \selectlanguage{ngerman} PtMn($15$)/""Co$_{71}$Fe$_{29}$($2.5$)/""Ru($0.86$)/""CoFeB($1.6$)/""Co$_{70}$Fe$_{30}$($0.8$) and the total layer stack is SAF/""MgO($1$)/""FeB($4$)/""MgO($1$)/""Ta/Ru, with the nanometer layer thickness in brackets. \selectlanguage{english} The SAF's top magnetic layer exhibits a uniform magnetization in the film plane, which can be slightly tilted by applying an external magnetic field $H_{\perp}$ perpendicular to the latter. {For all the presented measurements, $H_{\perp}$ is chosen to $\mu_0 H_{\perp}=500\,$mT}. This gives an out-of-plane spin polarization of the injected dc current providing the necessary spin transfer torque component to sustain the gyrotropic vortex motion \cite{Dussaux2010}. Increasing the dc current injected through the layer structure leads to a stronger spin transfer torque counteracting the natural damping of the gyrotropic vortex core motion until, at a certain threshold current value $I_{c}$, the damping is overcome and auto-oscillation of the vortex core around the disk-center arises \cite{Dussaux2010} The TMR effect allows the magnetization dynamics to be converted into an electrical rf signal. In the circuit, the dc and rf current parts are separated through a bias tee and the measured rf signal is evaluated as the direct interpretation of the magnetization dynamics. The magnitude of the oscillation's output power $p_0$, its linewidth $\Delta f_0$, and the carrier frequency $f_c$ {(the frequency of the spin torque driven magnetization dynamics)} are obtained from Lorentzian fits of the emission power spectra{, measured by a spectrum analyzer}. Noise data are gathered from single-shot oscilloscope voltage time traces and evaluation via the Hilbert transform method\cite{Bianchini2010,Quinsat2010}. To obtain noise data close to the carrier (down to $1\,$Hz offset), the signal is first down-converted to $(2\pm 1)\,$MHz via frequency mixing with an external source (see Ref. \cite{Keller2010,Eklund2014}).{ This allows to decrease the oscilloscope's sampling rate (from $\sim 5\,$GSa/s down to $\sim 40\,$MSa/s) and to increase the measurement time (from $\sim 8.2\,$ms to $\sim 2.05\,$s) while conserving the signal's noise properties.} High frequency components are filtered by a low pass filter {(bandwidth DC to $22\,$MHz). More details on the noise measurement and data processing are given in the supplementary information\cite{supplementary_noise_PRB_2018}.} The oscillator's nonlinearity parameters (more explicitly described in section \ref{subsec:Slavin-theory}) are determined from the oscilloscope's time space measurements. The damping rate $f_p$ back to the stable oscillation trajectory is estimated by performing an exponential fit to the signal amplitude's autocorrelation\cite{Bianchini2010}. The nonlinearity parameter $\nu$, a measure for the system's nonlinearity, is obtained by comparing the coupling between amplitude and phase noise as elaborated in section \ref{sec:general_framework}. In fig. \ref{fig:basic-properties} we present the evaluated basic parameters of the STVO's oscillation at the chosen experimental conditions. In addition, we fit the data with the expected behaviour of the magnitudes. The evolution of the power and linewidth with the applied current can be fitted from their theoretical description \cite{Slavin2009} $p_0(I)=(I/I_{c}-1)/(I/I_{c}+Q)\cdot p_{max}$ and $\Delta f_0(I)\sim 1/p_0(I)$ respectively, with the oscillation threshold current $I_{c}\approx 3.7\,$mA, and $Q$ and $p_{max}$ the respective fitting parameters. The parameter $Q$ represents the nonlinearity of the damping (cp. Ref. \cite{Slavin2009}). \begin{figure}[bth!] \centering \captionsetup[subfigure]{labelformat=empty} \subfloat{ \hspace{0.5cm} \includegraphics[width=0.68\columnwidth]{f_vsI_colormap_3.pdf} } \newline \subfloat[\label{fig_hysterese:demag_unten}] { \includegraphics[width=0.9\columnwidth]{basic-properties_mit_Fit_4.pdf} } \caption[]{Characteristic oscillation parameters, such as the oscillation frequency $f_c$, output power $p_0$, nonlinear parameter $\nu$, linewidth $\Delta f_0$, and damping rate $f_p$, as a function of the applied current $I_{dc}$ at $\mu_0 H_{\perp}=500\,$mT. } \label{fig:basic-properties} \end{figure} In this work, we restrict the measurements and analysis to the oscillation behaviour in the dc current regime corresponding to the gyrotropic mode. In particular, we avoid any perturbing effects of mode crossing (as in Ref. \cite{Eklund2014}) or more complex dynamical behaviour in the regime of very large excitation. Indeed beyond the stable gyrotropic mode (mode crossing, energy transfer into other subordinate modes), under specific current and field conditions, the occurrence of Random Telegraph Noise (RTN) at characteristic frequencies of up to $10\,$kHz can be observed. However, this is not further investigated here {(and even particularly avoided)}, as the detailed analysis of the noise characteristics in the RTN regime goes beyond the scope of this paper. \section{Results - Noise in STVOs} \label{sec:results_noise_STVOs} A standard visualisation of noise properties is the representation of the power spectral density (PSD), which has the advantage to allow a direct distinction of the underlying noise processes and to classify them by their characteristic inverse power law behaviour $PSD \sim 1/f^{\beta}$. In fig. \ref{fig:noise-curve_with_flicker-coupling}, {we show (among other curves explained later) typical measurement data for the phase noise (black curve) and the amplitude noise PSD (grey curve)} of the studied STVO sample {at an applied current of $I_{dc}=4.6\,$mA}. The noise PSDs are depicted versus the offset $f_{\text{off}}=|f-f_c|$ from the carrier frequency $f_c$ {(frequency of the vortex gyrotropic motion)}. The behaviour is mainly described by the nonlinear nature of the oscillator. For higher offset frequencies ($f_{\text{off}}\gtrsim 10^5\,$Hz in fig. \ref{fig:noise-curve_with_flicker-coupling}), the curve's shape is governed by thermal white gaussian noise processes, thoroughly investigated in Ref. \cite{Quinsat2010} for uniform STNOs (STNOs exploiting the uniform precession of magnetization dynamics) and in Ref. \cite{Grimaldi2017} for STVOs (STNOs exploiting the vortex gyrotropic mode). In this region, {for clarity theoretically represented in fig. {\ref{fig:noise-curve_with_flicker-coupling}}'s inset based on eqs. ({\ref{eq:all-noise_amp}}-{\ref{eq:all-noise_phase}})}, the noise signature behaves linearly below the relaxation rate $f_p$ with exponent $\beta=2$ for the phase and $\beta=0$ for the amplitude noise. The coupling between the amplitude and phase leads to a conversion of amplitude to phase noise and therefore to an increase of the phase noise by $10 \log(1+\nu^2)$. For $f_{\text{off}}\gg f_p$, perturbations are faster than the nonlinear damping response $\tau_p = 1/(2\pi f_p)$, which is usually in the order of a few tens of oscillation periods (depending on the spin torque strength), so that the nonlinearity becomes less significant. The amplitude noise decreases with $1/f^2$ and the phase noise with $1/f^4$ for $f_p \ll f \ll \nu f_p$ and with $1/f^2$ for $f\gg\nu f_p$. At even higher offset frequencies the Johnson-Nyquist noise floor eventually limits the PSDs (not shown in fig. \ref{fig:noise-curve_with_flicker-coupling}). \definecolor{light-gray}{rgb}{0.96,0.96,0.96} For low offset frequencies $f_{\text{off}} \lesssim 10^4\,$Hz, that are in the focus of this work, the PSD spectra exhibit a $1/f^3$- and a $1/f^1$-behaviour for phase and amplitude noise respectively, where $1/f$-flicker-noise is found to be dominant over thermal noise processes. The fits $\sim \alpha_{exp}/f^{\beta}$ on the experimental data in fig. \ref{fig:noise-curve_with_flicker-coupling} (orange curve for phase noise and cyan curve for amplitude noise) illustrate the curves' typical slopes and furthermore give the corresponding experimental noise prefactor $\alpha_{exp}$, later discussed in section \ref{sec:flicker-noise_in_STVOs}.\\ The fundamental origin of flicker noise{, described through the phenomenological parameter $\alpha$ in eqs. ({\ref{eq:all-noise_amp}}-{\ref{eq:all-noise_phase}}),} cannot implicitly be specified as different physical processes are potential origins. This includes intrinsic phenomena such as fluctuations in the magnetic texture\cite{Diao2011,Nowak1999,Arakawa2012}, the impact of defects and/or inhomogeneities in the magnetic layers or the tunnel barrier in particular due to the fabrication process\cite{Eklund2014}. Even external fluctuations of the driving dc current or the applied magnetic field can play a role. \begin{figure}[hbt!] \centering \vspace{-0em} \includegraphics[width=1.02\columnwidth]{noise_with_Flicker-coupling_-4,96kG_5_revised_2.pdf}\llap{\raisebox{1.126\height}{\adjustbox{lap={\width}{0.398cm}}{{\setlength{\fboxsep}{0.3pt}\fcolorbox{black}{light-gray}{\includegraphics[width=0.452\columnwidth ]{inset3.pdf} } } } } } \caption[]{PSD of phase (PN) and amplitude (AN) noise; $\mu_0 H_{\perp}=500\,$mT, $I=4.6\,$mA, as well as theoretical curves based on eqs. (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}) and described in the text. The inset shows an analytical representation (eqs. (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}), but different parameters as for the measurement) of the higher offset frequency noise due to thermal effects. The phase noise of a linear oscillator ($\nu=0$, dashed line) is shown as well as its increase due to nonlinearity.} \label{fig:noise-curve_with_flicker-coupling} \end{figure} Comparing the experimental data depicted in fig. \ref{fig:noise-curve_with_flicker-coupling} with the theoretical equations (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}), we find for the generating noise process $\gamma \approx 1$ and a conversion of $1/f^1$ amplitude into $1/f^3$ phase noise, reflected both in fig. \ref{fig:noise-curve_with_flicker-coupling} (black and grey curve in the low offset frequency regime) as well as in eq. (\ref{eq:all-noise_phase}). Next to the experimental PSDs, fig. \ref{fig:noise-curve_with_flicker-coupling} also displays {theoretical curves excluding one or more terms in equations} (\ref{eq:all-noise_amp}) and (\ref{eq:all-noise_phase}), and described in the following. The preliminarily evaluated experimental values $p_0$, $\nu$, $\Delta f_0$ and $f_p$, presented in fig. \ref{fig:basic-properties}, are fed into the equations. Only considering the thermal linear part of the phase noise PSD ($\nu = 0$, green curve in fig. \ref{fig:noise-curve_with_flicker-coupling}) again emphasizes the noise growth due to nonlinearity $\nu>0$, as this curve is clearly below the experimental one (black in fig. \ref{fig:noise-curve_with_flicker-coupling}). For higher offset frequencies (flicker contribution negligible), theoretical amplitude and phase noise curves (blue dashed and pink dashed respectively) exhibit, as expected, an excellent agreement to the corresponding data (black and grey curves resp.).\\ For lower offset frequencies, from $\sim 10^4\,$Hz on downwards, the so far neglected flicker noise sums to the thermal noise parts and lets the experimental and theoretical curve diverge. The red dot-dashed curve in fig. \ref{fig:noise-curve_with_flicker-coupling} describes the theoretical phase noise PSD including the extra contribution from the conversion of experimental amplitude noise through the coupling term in eq. (\ref{eq:all-noise_phase}) -- thus it only neglects the pure flicker phase noise term (second term in eq. (\ref{eq:all-noise_phase})). Importantly, we note that this curve still clearly remains below the experimental data (black curve in fig. \ref{fig:noise-curve_with_flicker-coupling}) in the range of low offset frequencies, but fits well for higher offsets. \section{Results - Analysis of Flicker Noise regime } \label{sec:flicker-noise_in_STVOs} In fig. \ref{fig:noise-curve_with_flicker-coupling}, we demonstrate that the above described theoretical curves, based on the thermal noise contribution, correspond well to the experimental data at higher frequencies. At lower offset frequencies ($f_{\text{off}} \lesssim 10^4\,$Hz), they clearly differ. To understand this difference, we further evaluate eq. (\ref{eq:all-noise_phase}) { using the low offset amplitude noise to additionally consider amplitude-phase coupling} and to classify the important parameters in the region $f_{\text{off}} \lesssim 10^4\,$Hz. Hence, the violet curve in fig. \ref{fig:noise-curve_with_flicker-coupling} represents the phase noise only including the thermal and the amplitude-converted contribution (similar to the dot-dashed red curve in the high offset frequency regime). The difference between the experimental phase noise PSD (black curve in fig. \ref{fig:noise-curve_with_flicker-coupling}) and the calculated curve (violet) therefore clearly pinpoints the pure phase flicker noise in fig. \ref{fig:noise-curve_with_flicker-coupling}, which is found to be dominant against the other contributions. To further classify the important noise parameters, we concentrate on the pure phase flicker noise in the following.\\ \begin{figure}[hbt!] \centering \vspace{0em} \includegraphics[width=0.87\columnwidth]{prefactors_vs_current_withErrorbars_5.pdf} \caption[]{Evolution with applied current of the prefactors $\alpha_{exp}$ from the $\alpha_{exp}/f^{\beta}$-fits of (i) the experimental phase noise (PN) data (red points) (ii) of the pure flicker PN (difference between black and violet curve in fig. \ref{fig:noise-curve_with_flicker-coupling}), represented by green points, and (iii) of the amplitude noise (AN) data (blue points). } \label{fig:prefactors_vs_current} \end{figure} In fig. \ref{fig:prefactors_vs_current}, we compare the experimental prefactors $\alpha_{exp}$ of the $\alpha_{exp}/f^{\beta}$-fits on the experimental low frequency noise as depicted in fig. \ref{fig:noise-curve_with_flicker-coupling} and plot them as a function of the injected dc current. The green points in fig. \ref{fig:prefactors_vs_current} represent the difference between the experimental data curve (black in fig. \ref{fig:noise-curve_with_flicker-coupling}) and the data curve including thermal noise and nonlinear amplitude noise conversion (violet in fig. \ref{fig:noise-curve_with_flicker-coupling}), notably the pure phase flicker noise. The difference between the two curves (red and green in fig. \ref{fig:prefactors_vs_current}) directly reflects the contribution from the part of the noise which is converted from amplitude to phase. Indeed, this difference is small and therefore emphasizes that the pure flicker PN is dominant for the flicker noise regime. This conclusion is one of the important results of the work. \subsection*{Governing parameters and relation to the Hooge formalism} Another important result is that the flicker noise for both the amplitude (blue points in bottom of fig. \ref{fig:prefactors_vs_current}) and the phase noise (red and green points in fig. \ref{fig:prefactors_vs_current}) is decreasing as the injected dc current is increased. For comparison, this behaviour is different from what is found in conventional TMR sensors \cite{Nowak1999,Herranz2010,Fermon2013}, whose layer structure is very similar to the one of STNOs. For these devices, the low frequency noise behaviour is usually evaluated only by a description based on the phenomenological \textsc{Hooge}-formula \cite{Fermon2013,Hooge1969}: \begin{align} S_P = \frac{\alpha_H P_{dc}}{A\cdot f^{\beta}} ~~~, \label{eq:Hooge-proportionality} \end{align} \hspace{0.25cm} with $P_{dc}$ the circuit's dc power, $A$ the magnetically active surface, that is usually constant in TMR sensors, and $\alpha_H$ the Hooge-parameter. Interestingly, the coefficient $\alpha_H$ is often considered as a kind of quality factor e.g. in magnetic sensor technologies. {It includes the intrinsic origins of the flicker noise due to manifold potential mechanisms already mentioned before.\\ Note that the phenomenological Hooge formula is originally well adapted to semiconductor devices {\cite{VanDerZiel1988,Sangwan2013,Balandin1999}}. There, it describes the $1/f$ noise proportional to the power supplied into the system averaged over the number of carriers. By applying the Hooge model to magnetic sensors, the averaging is indeed realized on the effective magnetic volume that is converted into the active magnetic surface $A$ after proper renormalization in eq. ({\ref{eq:Hooge-proportionality}}). In STVOs, the nonlinear evolution of the active surface $A$ or, more generally, the active magnetic volume has to be especially taken into account}, as usually not the entire device area is active, but only the surface enclosed by the vortex core trajectory contributes to the rf signal (red circle in fig. \ref{fig:vortex-motion}). A particularity of STVOs (and STNOs in general) is that, resulting from the nonlinearities of the different forces acting on the vortex core, $A$ can be controlled through the amplitude of the spin transfer torque. \\ The active surface $A=\pi (R s_0)^2$ can be experimentally determined by measuring the conductivities in the vortex or antiparallel state $G_0(I_{dc})$ and $G_{ap}(I_{dc})$, the TMR value $TMR(I_{dc})$, the corresponding applied field values $h_i$ normalized to the magnetization of the layer $i$, and the effective oscillation voltage $V_{rf}$ \cite{Grimaldi2017}. In the vortex oscillator model system, the oscillation radius can be calculated through: \begin{align*} s_0 =& \frac{2G_0 (1+ G_0 Z_{50\Omega})}{I_{dc}\cdot TMR(I_{dc}) \cdot G_{ap} Z_{50\Omega} \lambda} \\ & \cdot \frac{1}{\sqrt{ (1-h_{free}^2)(1-h_{SAF}^2)}} \cdot V_{rf0} ~~~, \end{align*} \hspace{0.25cm} with $Z_{50\Omega}$ the load, and $\lambda \approx 2/3$ a magnetoresistive factor (proportionality factor for the planar magnetization value relative to the saturation magnetization). Note that the average resistance $1/G_0 =R_0(I_{dc})$ usually decreases for larger currents. The evaluated active surface of the studied STVO as a function of the dc current is shown in fig. \ref{fig:Volume_and_Hooge}, as well as the Hooge-proportionality $P_{dc}/A$, which mainly determines the noise prefactor in eq. (\ref{eq:Hooge-proportionality}). \begin{figure}[hbt!] \centering \vspace{0em} \includegraphics[width=0.86\columnwidth]{Volume_and_Hooge3.pdf}\llap{\raisebox{13.2\height}{\adjustbox{lap={\width}{-5.4cm}}{\fcolorbox{black}{light-gray}{ a) } } } }\llap{\raisebox{6.52\height}{\adjustbox{lap={\width}{-5.4cm}}{\fcolorbox{black}{light-gray}{ b) } } } } \caption[]{Experimental active magnetic surface $A$ (a) and Hooge proportionality $P_{dc}/A$ (b) vs. applied dc current $I_{dc}$. \label{fig:Volume_and_Hooge} \end{figure} We find that the Hooge proportionality $P_{dc}/A$ is first constant and then increases as a function of $I_{dc}$. For lower currents, the evolution of $A$ is in fact compensating the increase. But then in the regime of constant $A$, the quadratic behaviour of $P_{dc}/A$ is similar to what is usually found in magnetic TMR/GMR sensors. Following the Hooge model, a consequence is that also the noise level for higher currents shall increase. As shown in fig. \ref{fig:prefactors_vs_current}, this is contrary to what we find experimentally. Thus, we conclude, that $P_{dc}/A$ alone does not properly describe the flicker noise behaviour of a STVO, as it mainly does in case of magnetic sensors. Indeed, the nonlinear nature of the oscillator, expressed by the equations (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}), has to be taken into account. It obviously dominates over the Hooge-behaviour, which is in fact valid for the static case with no sustained dynamics. In eq. (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}) {we assume the generating noise (which is not deterministically understood so far) to follow Hooge's description in eq. ({\ref{eq:Hooge-proportionality}}) and include it in the parameter $\alpha \sim \alpha_H P_{dc}/A$.} Note that the prefactor $\alpha_H$ for the phase does not necessarily need to be equivalent to the one of the amplitude noise. In fig. \ref{fig_theo_prefactors:prefactors}, we calculate the evolution of the flicker noise prefactor vs. $I_{dc}$ based on the parameters of eq. (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}) taking into account the previously discussed effects. At this stage, we neglect $\alpha_H$ which will be discussed later, and therefore plot $P_{dc}/(4p_0\pi^2 f_p^2 A)$ for the amplitude and $P_{dc}/(4p_0\pi^2 A)$ for the pure phase flicker noise prefactor. The calculated noise prefactors of the pure amplitude and phase flicker noise terms (fig. \ref{fig_theo_prefactors:prefactors}) qualitatively reproduce the trends of the direct measurement, represented in fig. \ref{fig:prefactors_vs_current}. \begin{figure}[hbt!] \centering \vspace{0em} \includegraphics[width=0.86\columnwidth]{theoretical_prefactors_new_new_1.pdf} \caption[]{Calculated pure flicker noise prefactors evaluated through eq. (\ref{eq:all-noise_amp}-\ref{eq:all-noise_phase}) with measured experimental magnitudes without $\alpha_H$. } \label{fig_theo_prefactors:prefactors} \end{figure} In particular, we see that the phase noise curve first decreases, then remains constant over a certain current range until is starts increasing again from $\sim 6.5\,$mA on. This behaviour is associated with the decreasing nonlinearity at higher currents \cite{Grimaldi2017} and a resulting nearly constant oscillation radius $s_0$ and output power $p_0$ in this regime (cp. figs. \ref{fig:Volume_and_Hooge} and \ref{fig:basic-properties}). Therefore, the Hooge-ratio $P_{dc}/A$ also becomes more influential and starts to dominate the noise-behaviour similarly to what is usually found in TMR sensors.\\ The amplitude noise prefactor (fig. \ref{fig_theo_prefactors:prefactors}, blue curve) is slightly decreasing in the range of the experimentally studied injected current, but it has to be remarked that the error bars are large. In general, the flicker contribution of $S_{\delta \epsilon}$ mainly depends on the damping rate $f_p$ back to the limit cycle. The Hooge parameter $\alpha_H$ (not yet considered for the data shown in fig. \ref{fig_theo_prefactors:prefactors}) can be estimated from our results as a proportionality factor between the calculated noise prefactors (shown in fig. \ref{fig_theo_prefactors:prefactors}) and the measured values (shown in fig. \ref{fig:prefactors_vs_current}). We estimate $\alpha_{H,\delta \phi} \approx 10^{3}\,\Omega\,\upmu$m$^2 \Leftrightarrow G_0 \alpha_{H,\delta \phi} \approx 10^1\,\upmu$m$^2$ for the phase and $\alpha_{H,\delta \epsilon} \approx 10^{1}\,\Omega\,\upmu$m$^2\Leftrightarrow G_0 \alpha_{H,\delta \epsilon} \approx 10^{-1}\,\upmu$m$^2$ for the amplitude noise. For comparison, in TMR based sensors the obtained values are typically between $G_0 \alpha_H\approx 10^{-6}\,\upmu$m$^2$ (Ref. \cite{Nowak1999,Gokce2006}) and $10^{-11}\,\upmu$m$^2$ (Ref. \cite{Arakawa2012,Almeida2008,Aliev2007,Scola2007}), measured for voltage fluctuations upon the tunnel junction. In Ref. \cite{Arakawa2012}, $G_0\alpha_H \approx 10^{-11}\,\upmu$m$^2$ is calculated from data on TMR sensor devices with a layer structure similar to ours and resistance-area product $RA$ well below $100\,$k$\Omega\cdot \upmu$m$^2$, where $\alpha_H$ usually becomes stable in terms of $RA$\cite{Fermon2013}. In contrast to the present work, data in Ref. \cite{Arakawa2012} were obtained at low temperature ($T=5\,$K). Thermal noise processes can also be the generator of $1/f$ noise processes (Barkhausen noise), as shown in Ref. \cite{Scola2007}, where a decrease of $\alpha_H$ by about two orders of magnitude at low compared to room temperature was measured. Moreover, we apply up to $\sim 400\,$mV compared to a maximum bias voltage of $\sim 50\,$mV in Ref. \cite{Arakawa2012}. Usually, $\alpha_H$ decreases with higher applied voltages by up to one order of magnitude\cite{Almeida2008,Gokce2006,Aliev2007} due to new conductance channels arising in this range of biases (and the likewise decreasing TMR ratio) \cite{Gokce2006,Aliev2007}. In our devices, this behaviour leads to a suppression of the phase noise increase for higher currents, as present in fig. \ref{fig_theo_prefactors:prefactors}. Finally, the parameter $\alpha_H$ in general depends on the magnetic configuration of the magnetic tunnel junction (in sensors mainly parallel P and antiparallel AP) because of the different nature of tunneling channels. The higher noise level in the AP state can (Ref. \cite{Scola2007}) be mostly explained by a higher contribution to noise from tunneling electrons from the localized bands. Those are more sensitive to charge traps (e.g. magnetic impurities) in the insulator. In the AP state, mainly localized bands contribute to the tunneling compared to mainly delocalized $s$-electrons in the P-state. Therefore, the difference in the Hooge parameter $\alpha_{H,AP}>\alpha_{H,P}$ is usually at least a factor of two \cite{Fermon2013} but more often even one or two orders of magnitude \cite{Herranz2011,Almeida2008,Aliev2007}.\\ As an important result, we state that the system's nonlinear nature strongly governs not only the thermal, but also the flicker noise behaviour. The influence on the statically observed noise proportionality $P_{dc}/A$, which is modelled by the Hooge-formalism, is found to be of minor significance at least until the larger current regime where the nonlinearity decreases and oscillation radius $s_0$ and oscillation output power $p_0$ do not significantly increase anymore. In this regime, the phase noise follows a Hooge-like increase, as we find in the evolution of the calculated parameters. Note however that this trend is found to be much less pronounced in the parameters extracted from the measurements (see fig. \ref{fig:prefactors_vs_current}) due to the evolution of $\alpha_H$ expected in this range of very large applied biases. In fact, the phenomenological parameter $\alpha_H$ describes the noise level and may have contributions from both magnetic and electronic mechanisms (as well as the microstructural quality of the thin films \cite{Eklund2014}) that might differ for amplitude and phase. A comparison with known values in similar TMR devices usually operating at very low voltage bias is not straightforward, because as we show here, all noise mechanisms might act in fundamentally different ways. As we demonstrate, the evolution of the output power $p_0$ and the (correlated) active magnetic surface $A$ are essential for the phase noise. For the amplitude noise, the essential governing parameter is the damping rate $f_p$ back to the limit cycle.\\ \section{Conclusion} We present here a phenomenological theory based on the nonlinear auto-oscillator model in order to describe the noise properties of spin torque nano oscillators in the low offset frequency range. We investigate how the $1/f$ flicker noise, which is the dominant noise source in the low offset frequency regime, is connected with the oscillator's nonlinear dynamics. In addition to the new theoretical description, we also conduct a detailled experimental investigation performed on vortex based spin torque oscillators, and discuss the results based on the theoretical predictions. We measure a $1/f^1$ flicker amplitude noise and its conversion into $1/f^3$ phase noise. Indeed, the phase noise additionally exhibits a pure phase flicker noise contribution, which is found to be dominant. As a consequence, we hence demonstrate that the amplitude-phase-noise coupling is less important in the low offset frequency regime compared to higher frequency offsets. In summary, we find that the flicker noise in spin torque oscillators, particularly in STVOs but extendable to other STNOs, is determined by the system's nonlinear parameters in the highly frequency tunable operation range. We also show that this conclusion becomes less valid in the regime of very large driving force on the vortex core (i.e. large applied current). Moreover, we combine the dynamical equations with the well established Hooge formalism for TMR sensors and emphasize the importance of different parameters on the low offset frequency noise. We believe that our work contributes to the fundamental understanding of the $1/f$ flicker noise in spin torque nano oscillators. As this noise type especially limits the spin torque oscillator's long term stability, we furthermore believe that this work provides a basis to improve the noise characteristics of various applications aiming to rely on STNO devices. \section{Acknowledgment} S.W. acknowledges financial support from Labex FIRST-TF. The work is supported by the ANR SPINNET.
\section{Introduction} \label{sec:intro} Given a set $S$ of $n$ point sites in the plane, what is the best way to connect $S$ into a \emph{geometric network (graph)}? This question has motivated researchers for a long time, going back as far as the 1940s, and beyond~\cite{F40,Ve51}. Numerous possible criteria for a good geometric network have been proposed, perhaps the most basic being the \emph{length}. In 1955, Few~\cite{Fe55} showed that for any set of $n$ points in a unit square, there is a traveling salesman tour of length at most $\sqrt{2n}+7/4$. This was improved to at most $0.984\sqrt{2n}+11$ by Karloff~\cite{Ka89}. Similar bounds also hold for the shortest spanning tree and the shortest rectilinear spanning tree~\cite{CG81,DM18,GP68}. Besides length, two further key factors in the quality of a geometric network are the \emph{vertex dilation} and the \emph{geometric dilation}~\cite{NS07}, both of which measure how closely shortest paths in a network approximate the Euclidean distances between their endpoints. The \emph{dilation} (also called \emph{stretch factor}~\cite{MM17} or \emph{detour}~\cite{AKK+08}) between two points $p$ and $q$ in a geometric graph $G$ is defined as the ratio between the length of a shortest path from $p$ to $q$ and the Euclidean distance $|pq|$. The \emph{dilation} of the graph $G$ is the maximum dilation over all pairs of vertices in $G$. A graph in which the dilation is bounded above by $t \geq 1$ is also called a \emph{$t$-spanner} (or simply a \emph{spanner} if $t$ is a constant). A complete graph in Euclidean space is clearly a $1$-spanner. Therefore, researchers focused on the dilation of graphs with certain additional constraints, for example, noncrossing (\ie, plane) graphs. In 1989, Das and Joseph~\cite{DJ89} identified a large class of plane spanners (characterized by two simple local properties). Bose~\etal\cite{BGS05} gave an algorithm that constructs for any set of planar sites a plane $11$-spanner with bounded degree. On the other hand, Eppstein~\cite{Ep02} analyzed a fractal construction showing that \emph{$\beta$-skeletons}, a natural class of geometric networks, can have arbitrarily large dilation. The study of dilation also raises algorithmic questions. Agarwal~\etal~\cite{AKK+08} described randomized algorithms for computing the dilation of a given path (on $n$ vertices) in $\RR^2$ in $O(n \log n)$ expected time. They also presented randomized algorithms for computing the dilation of a given tree, or cycle, in $\RR^2$ in $O(n\log^2 n)$ expected time. Previously, Narasimhan and Smid~\cite{NS00} showed that an $(1+\eps)$-approximation of the stretch factor of any path, cycle, or tree can be computed in $O(n \log n)$ time. Klein~\etal~\cite{KKNS09} gave randomized algorithms for a path, tree, or cycle in $\RR^2$ to count the number of vertex pairs whose dilation is below a given threshold in $O(n^{3/2+\eps})$ expected time. Cheong~\etal~\cite{CHL08} showed that it is NP-hard to determine the existence of a spanning tree on a planar point set whose dilation is at most a given value. More results on plane spanners can be found in the monograph dedicated to this subject~\cite{NS07} or in several surveys~\cite{Ep00,BS13,MM17}. We investigate a basic question about the dilation of polygonal chains. More precisely, we ask how the dilation between the endpoints of a polygonal chain (which we will call the \emph{stretch factor}, to distinguish it from the more general notion of dilation) is influenced by \emph{fingerprint} properties of the chain, \ie, by properties that are defined on $O(1)$-size subsets of the vertex set. Such fingerprint properties play an important role in geometry, where classic examples include the \emph{Carath\'eodory property}\footnote{Given a finite set $S$ of points in $d$ dimensions, if every $d + 2$ points in $S$ are in convex position, then $S$ is in convex position.}~\cite[Theorem~1.2.3]{Mat02} or the \emph{Helly property}\footnote{Given a finite collection of convex sets in $d$ dimensions, if every $d + 1$ sets have nonempty intersection, then all sets have nonempty intersection.}~\cite[Theorem~1.3.2]{Mat02}. In general, determining the effect of a fingerprint property may prove elusive: given $n$ points in the plane, consider the simple property that every $3$ points determine $3$ distinct distances. It is unknown~\cite[p.~203]{BMP05} whether this property implies that the total number of distinct distances grows superlinearly in $n$. Furthermore, fingerprint properties appear in the general study of \emph{local versus global properties of metric spaces} that is highly relevant to combinatorial approximation algorithms that are based on mathematical programming relaxations~\cite{ALNRRV12}. In the study of dilation, interesting fingerprint properties have also been found. For example, a (continuous) curve $C$ is said to have the \emph{increasing chord property}~\cite{CFG91, LM72} if for any points $a$, $b$, $c$, $d$ that appear on $C$ in this order, we have $|ad| \geq |bc|$. The increasing chord property implies that $C$ has (geometric) dilation at most $2\pi/3$~\cite{Ro94}. A weaker property is the \emph{self-approaching property}: a (continuous) curve $C$ is self-approaching if for any points $a$, $b$, $c$ that appear on $C$ in this order, we have $|ac| \geq |bc|$. Self-approaching curves have dilation at most $5.332$~\cite{IKL99} (see also~\cite{AAI+99}), and they have found interesting applications in the field of graph drawing~\cite{ACG+12,BKL17,NPR16}. We introduce a new natural fingerprint property and see that it can constrain the stretch factor of a polygonal chain, but only in a weaker sense than one may expect; we also provide algorithmic results on this property. Before providing details, we give a few basic definitions. \subparagraph*{Definitions.} A \emph{polygonal chain} $P$ in the Euclidean plane is specified by a sequence of $n$ points $(p_1, p_2, \dots, p_n)$, called its \emph{vertices}. The chain $P$ consists of $n-1$ line segments between consecutive vertices. We say $P$ is \emph{simple} if only consecutive line segments intersect and they only intersect at their endpoints. Given a polygonal chain $P$ in the plane with $n$ vertices and a parameter $c\geq 1$, we call $P$ a \emph{$c$-chain} if for all $1\leq i < j < k\leq n$, we have \begin{equation} \label{eq:c-chain} |p_ip_j|+|p_jp_k| \leq c|p_ip_k|. \end{equation} Observe that the $c$-chain condition is a fingerprint condition that is not really a local dilation condition---it is more a combination between the local chain substructure and the distribution of the points in the subchains. The \emph{stretch factor} $\delta_P$ of $P$ is defined as the dilation between the two end points $p_1$ and $p_n$ of the chain: \[ \delta_P = \frac{\sum_{i = 1}^{n-1} |p_ip_{i+1}|}{|p_1p_n|}. \] Note that this definition is different from the more general notion of dilation (also called \emph{stretch factor}~\cite{MM17}) of a graph which is the maximum dilation over all pairs of vertices. Since there is no ambiguity in this paper, we will just call $\delta_P$ the stretch factor of $P$. For example, the polygonal chain $P=((0,0), (1,0), \dots ,(n,0))$ is a $1$-chain with stretch factor $1$; and $Q=((0,0), (0,1), (1,1), (1,0))$ is a $(\sqrt2+1)$-chain with stretch factor $3$. Without affecting the results, the floor and ceiling functions are omitted in our calculations. For a positive integer $t$, let $[t]=\{1,2,\dots,t\}$. For a point set $S$, let $\conv(S)$ denote the convex hull of $S$. All logarithms are in base 2, unless stated otherwise. \subparagraph*{Our results.} We deduce three upper bounds on the stretch factor of a $c$-chain $P$ with $n$ vertices (Section~\ref{sec:upper}). In particular, we have (i)~$\delta_P \leq c(n-1)^{\log c}$, (ii)~$\delta_P\leq c(n-2)+1$, and (iii)~$\delta_P =O\left(c^2\sqrt{n-1}\right)$. From the other direction, we obtain the following lower bound (Section~\ref{sec:lower}): For every $c\geq 4$, there is a family $\P_c=\{P^k\}_{k\in\NN}$ of simple $c$-chains, so that $P^k$ has $n=4^k+1$ vertices and stretch factor $(n-1)^{\frac{1+\log (c-2) - \log c}{2}}$, where the exponent converges to $1/2$ as $c$ tends to infinity. The lower bound construction does not extend to the case of $1<c<4$, which remains open. Finally, we present two algorithmic results (Section~\ref{sec:algo}): (i)~A randomized algorithm that decides, given a polygonal chain $P$ in $\RR^2$ with $n$ vertices and a threshold $c>1$, whether $P$ is a $c$-chain in $O\left(n^{2.5}\ {\rm polylog}\ n\right)$ expected time and $O(n\log n)$ space. (ii)~As a corollary, there is a randomized algorithm that finds, for a polygonal chain $P$ with $n$ vertices, the minimum $c\geq 1$ for which $P$ is a $c$-chain in $O\left(n^{2.5}\ {\rm polylog}\ n\right)$ expected time and $O(n\log n)$ space. \section{Upper Bounds} \label{sec:upper} At first glance, one might expect the stretch factor of a $c$-chain, for $c\geq 1$, to be bounded by some function of $c$. For example, the stretch factor of a $1$-chain is necessarily $1$. We derive three upper bounds on the stretch factor of a $c$-chain with $n$ vertices in terms of $c$ and $n$ (cf.~Theorems~\ref{thm:log{c}}--\ref{thm:1/2}); see Fig.~\ref{fig:upperbds} for a visual comparison between the bounds. For large $n$, the bound in Theorem~\ref{thm:log{c}} is the best for $1 \leq c \leq 2^{1/2}$, while the bound in Theorem~\ref{thm:1/2} is the best for $c > 2^{1/2}$. In particular, the bound in Theorem~\ref{thm:log{c}} is tight for $c=1$. The bound in Theorem~\ref{thm:linear} is the best for $c\geq 2$ and $n\leq 111c^2$. \begin{figure}[!ht] \centering \includegraphics[width=0.35\textwidth]{upperbds} \caption{The values of $n$ and $c$ for which (i) Theorem~\ref{thm:log{c}}, (ii) Theorem~\ref{thm:linear}, and (iii) Theorem~\ref{thm:1/2} give the current best upper bound.\label{fig:upperbds}} \end{figure} Our first upper bound is obtained by a recursive application of the $c$-chain property. It holds for any positive distance function that may not even satisfy the triangle inequality. \begin{theorem}\label{thm:log{c}} For a $c$-chain $P$ with $n$ vertices, we have $\delta_P \leq c(n-1)^{\log c}$. \end{theorem} \begin{proof} We prove, by induction on $n$, that \begin{equation}\label{eq:logc} \delta_P\leq c^{\left\lceil\log (n-1)\right\rceil}, \end{equation} for every $c$-chain $P$ with $n \geq 2$ vertices. In the base case, $n=2$, we have $\delta_P=1$ and $c^{\left\lceil\log (2-1)\right\rceil}=1$. Now let $n \geq 3$, and assume that (\ref{eq:logc}) holds for every $c$-chain with fewer than $n$ vertices. Let $P = (p_1, \dots, p_n)$ be a $c$-chain with $n$ vertices. Then, applying (\ref{eq:logc}) to the first and second half of $P$, followed by the $c$-chain property for the first, middle, and last vertex of $P$, we get \begin{align*} \sum_{i=1}^{n-1}|p_{i}p_{i+1}| &\leq \sum_{i=1}^{\lceil n/2\rceil-1}|p_{i}p_{i+1}| + \sum_{i=\lceil n/2\rceil}^{n-1} |p_{i}p_{i+1}|\\ &\leq c^{\left\lceil\log (\lceil n/2\rceil-1) \right\rceil} \left( |p_1p_{\lceil n/2\rceil}| + |p_{\lceil n/2\rceil}p_n|\right)\\ &\leq c^{\left\lceil\log (\lceil n/2\rceil-1) \right\rceil}\cdot c|p_1p_n|\\ &\leq c^{\left\lceil\log (n-1)\right\rceil} |p_1p_n|, \end{align*} so (\ref{eq:logc}) holds also for $P$. Consequently, \[ \delta_P \leq c^{\left\lceil\log (n-1)\right\rceil} \leq c^{\log (n-1) +1} =c \cdot c^{\log (n-1)} = c \, (n-1)^{\log{c}}, \] as required. \end{proof} Our second bound interprets the $c$-chain property geometrically and makes use of the fact that $P$ resides in the Euclidean plane. \begin{theorem}\label{thm:linear} For a $c$-chain $P$ with $n$ vertices, we have $\delta_P\leq c(n-2)+1$. \end{theorem} \begin{figure}[htpb] \centering \begin{tikzpicture}[scale=0.45] \draw (5,0) circle [x radius=5, y radius=4]; \draw (0,0) --node[above]{$\frac{c-1}{2}$} (2,0)node[circle, fill, inner sep=1pt, label=below:$p_1$]{} -- node[above]{$1$} (8,0)node[circle, fill, inner sep=1pt, label=below:$p_n$]{} -- node[above]{$\frac{c-1}{2}$} (10,0); \draw[dashed] (2,0) -- node[above]{$\frac{c}{2}$} (5, 4) -- node[above]{$\frac{c}{2}$} (8, 0); \end{tikzpicture} \caption{The entire chain $P$ lies in an ellipse with foci $p_1$ and $p_n$.}\label{fig:ellipse} \end{figure} \begin{proof} Without loss of generality, assume that $|p_1p_n|=1$. Since $P$ is a $c$-chain, for every $1<j<n$, we have $|p_1p_j|+|p_jp_n|\leq c|p_1p_n| = c$. If we fix the points $p_1$ and $p_n$, then every $p_j$ lies in an ellipse $E$ with foci $p_1$ and $p_n$, for $1 < j < n$, see Figure~\ref{fig:ellipse}. The diameter of $E$ is its major axis, whose length is $c$. Since $E$ contains all vertices of the chain $P$, we have $|p_1p_2|, |p_{n-1}p_n|\leq \frac{c+1}{2} \leq c$ and $|p_jp_{j+1}|\leq c$ for all $1<j<n-1$. Therefore the stretch factor of $P$ is bounded above by \begin{align*} \delta_P &= \frac{\sum_{j=1}^{n-1}|p_{j}p_{j+1}|}{|p_1p_n|} = |p_1p_2|+|p_{n-1}p_n|+\sum_{j=2}^{n-2}|p_jp_{j+1}| \\ &\leq \frac{c+1}{2}+\frac{c+1}{2}+c(n-3) = c(n-2)+1, \end{align*} as required. \end{proof} Our third upper bound uses a volume argument to bound the number of long edges in $P$. \begin{theorem}\label{thm:1/2} Let $P=(p_1,\dots, p_n)$ be a $c$-chain, for some constant $c \geq 1$, and let $L=\sum_{i=1}^{n-1}|p_ip_{i+1}|$ be its length. Then $L = O\left(c^2\sqrt{n-1}\right) \, |p_1 p_n|$, hence $\delta_P =O\left(c^2\sqrt{n-1}\right)$. \end{theorem} \begin{proof} We may assume that $p_1 p_n$ is a horizontal segment of unit length. By the argument in the proof of Theorem~\ref{thm:linear}, all points $p_i$ ($i=1,\dots,n$) are contained in an ellipse $E$ with foci $p_1$ and $p_n$, where the major axis of $E$ has length $c$. Let $U$ be the minimal axis-aligned square containing $E$; its side is of length $c$. We set $x=8c^2/\sqrt{n-1}$; and let $L_0$ and $L_1$ be the sum of lengths of all edges in $P$ of length at most $x$ and more than $x$, respectively. By definition, we have $L=L_0+L_1$ and \begin{equation}\label{eq:short} L_0\leq (n-1)x = (n-1)\cdot 8c^2/\sqrt{n-1} = 8c^2\sqrt{n-1}. \end{equation} We shall prove that $L_1\leq 8c^2\sqrt{n-1}$, implying $L\leq 2x(n-1)=O\left(c^2\sqrt{n-1}\right)$. For this, we further classify the edges in $L_1$ according to their lengths: For $\ell=0,1,\dots , \infty$, let \begin{equation}\label{eq:PL1} P_\ell=\left\{p_i: 2^\ell x< |p_ip_{i+1}|\leq 2^{\ell+1}x\right\}. \end{equation} Since all points lie in an ellipse of diameter $c$, we have $|p_ip_{i+1}|\leq c$, for all $i=0,\dots, n-1$. Consequently, $P_\ell=\emptyset$ when $c\leq 2^\ell x$, or equivalently $\log(c/x)\leq \ell$. We use a volume argument to derive an upper bound on the cardinality of $P_\ell$, for $\ell=0,1,\dots , \lfloor\log (c/x)\rfloor$. Assume that $p_i,p_k\in P_\ell$, and w.l.o.g., $i<k$. If $k=i+1$, then by~\eqref{eq:PL1}, $2^\ell x<|p_ip_k|$. Otherwise, \[ 2^\ell x<|p_ip_{i+1}| < |p_ip_{i+1}|+|p_{i+1}p_k| \leq c|p_ip_k|, \text{ or } \frac{2^\ell x}{c} < |p_ip_k|. \] Consequently, the disks of radius \begin{equation}\label{area:Rad} R=\frac{2^\ell x}{2c} = \frac{4\cdot 2^\ell c }{\sqrt{n-1}} \end{equation} centered at the points in $P_{\ell}$ are interior-disjoint. The area of each disk is $\pi R^2$. Since $P_\ell\subset U$, these disks are contained in the $R$-neighborhood $U_R$ of the square $U$, \ie, the Minkowski sum $R+U$. For $\ell \leq \log(c/x)$, we have $2^\ell x\leq c$, hence $R=\frac{2^\ell x}{2c} \leq \frac{c}{2c}=\frac12 \leq \frac{c}{2}$. Then we can bound the area of $U_R$ from above as follows: \begin{equation}\label{area:UR} {\rm area}(U_R) < (c+2R)^2 \leq (2c)^2 =4c^2. \end{equation} Since $U_R$ contains $|P_\ell|$ interior-disjoint disks of radius $R$, we obtain \begin{equation}\label{eq:PL2} |P_\ell| \leq \frac{{\rm area}(U_R)}{\pi R^2} < \frac{4c^2}{\pi R^2} =\frac{16c^4}{\pi 2^{2\ell} x^2}. \end{equation} For every segment $p_{i-1}p_i$ with length more than $x$, we have that $p_i\in P_\ell$, for some $\ell\in \{0,1,\dots , \lfloor\log (c/x)\rfloor\}$. The total length of these segments is \begin{align*} L_1&\leq \sum_{\ell=0}^{\lfloor\log (c/x)\rfloor} |P_\ell| \cdot 2^{\ell+1}x < \sum_{\ell=0}^{\lfloor\log (x/c)\rfloor} \frac{16c^4}{\pi 2^{2\ell} x^2} \cdot 2^{\ell+1}x = \sum_{\ell=0}^{\lfloor\log (x/c)\rfloor} \frac{32 c^4}{\pi 2^\ell x}\\ &< \frac{32 c^4}{\pi x} \sum_{\ell=0}^\infty \frac{1}{2^\ell} = \frac{64 c^4}{\pi x} = \frac{8 c^2}{\pi}\cdot \sqrt{n-1}, \end{align*} as required. Together with \eqref{eq:short}, this yields $ L\leq 8\left(1+c^2/\pi\right)\cdot \sqrt{n-1}$. \end{proof} \section{Lower Bounds} \label{sec:lower} We now present our lower bound construction, showing that the dependence on $n$ for the stretch factor of a $c$-chain cannot be avoided. \begin{theorem}\label{thm:lower-bound} For every constant $c\geq 4$, there is a set $\P_c=\{P^k\}_{k\in\NN}$ of simple $c$-chains, so that $P^k$ has $n=4^k+1$ vertices and stretch factor $(n-1)^{\frac{1+\log (c-2) - \log c}{2}}$. \end{theorem} By Theorem~\ref{thm:1/2}, the stretch factor of a $c$-chain in the plane is $O\left((n-1)^{1/2}\right)$ for every constant $c\geq 1$. Since \[ \lim_{c \to\infty} \frac{1+\log (c-2) - \log c}{2} =\frac12, \] our lower bound construction shows that the limit of the exponent cannot be improved. Indeed, for every $\eps>0$, we can set $c=\frac{2^{2\eps+1}}{2^{2\eps}-1}$, and then the chains above have stretch factor $(n-1)^{\frac{1+\log(c-2)-\log c}{2}}=(n-1)^{1/2-\eps}=\Omega(n^{1/2-\eps})$. We first construct a family $\P_c=\{P^k\}_{k\in\NN}$ of polygonal chains. Then we show, in Lemmata~\ref{lemma:simple} and~\ref{lemma:c-chain}, that every chain in $\P_c$ is simple and indeed a $c$-chain. The theorem follows since the claimed stretch factor is a consequence of the construction. \subparagraph*{Construction of $\P_c$.} The construction here is a generalization of the iterative construction of the \emph{Koch curve}; when $c=6$, the result is the original Ces\`aro fractal (which is a variant of the Koch curve)~\cite{Ces05}. We start with a unit line segment $P^0$, and for $k=0, 1, \dots$, we construct $P^{k+1}$ by replacing each segment in $P^k$ by four segments such that the middle three points achieve a stretch factor of $c_*=\frac{c-2}{2}$ (this choice will be justified in the proof of Lemma~\ref{lemma:c-chain}). Note that $c_*\geq 1$, since $c\geq 4$. We continue with the details. Let $P^0$ be the unit line segment from $(0,0)$ to $(1,0)$; see Figure~\ref{fig:p0p1}\,(left). Given the polygonal chain $P^k$ $(k=0,1,\dots$), we construct $P^{k+1}$ by replacing each segment of $P^k$ by four segments as follows. Consider a segment of $P^k$, and denote its length by $\ell$. Subdivide this segment into three segments of lengths $(\frac{1}{2}-\frac{a}{c_*})\ell$, $\frac{2a}{c_*}\ell$, and $(\frac{1}{2}-\frac{a}{c_*})\ell$, respectively, where $0<a<\frac{c_*}{2}$ is a parameter to be determined later. Replace the middle segment with the top part of an isosceles triangle of side length $a\ell$. The chains $P^0$, $P^1$, $P^2$, and $P^4$ are depicted in Figures~\ref{fig:p0p1} and~\ref{fig:p2p4}. \begin{figure}[htbp!] \centering \begin{tikzpicture}[scale=0.5] \draw (0.000, 0.000)node[circle, fill, inner sep=1pt, label=below:{$(0,0)$}]{} -- node[above]{1} (10.000, 0.000)node[circle, fill, inner sep=1pt, label=below:{$(1,0)$}]{}; \end{tikzpicture} \hspace*{.1mm} \centering \begin{tikzpicture}[scale=0.5] \draw (0.000, 0.000)node[circle, fill, inner sep=1pt, label=below:{$(0,0)$}]{} -- node[above]{$\frac{1}{2}-\frac{a}{c_*}$} (4.545, 0.000) node[circle, fill, inner sep=1pt]{} -- node[left]{$a$}(5.000, 4.523) node[circle, fill, inner sep=1pt]{} -- node[right]{$a$} (5.455, 0.000) node[circle, fill, inner sep=1pt]{} -- node[above]{$\frac{1}{2}-\frac{a}{c_*}$} (10.000, 0.000)node[circle, fill, inner sep=1pt, label=below:{$(1,0)$}]{} ; \draw[dashed] (4.545, 0.000) -- node[above]{$\frac{2a}{c_*}$} (5.455, 0.000); \end{tikzpicture} \caption{The chains $P^0$ (left) and $P^1$ (right).}\label{fig:p0p1} \end{figure} Note that each segment of length $\ell$ in $P^k$ is replaced by four segments of total length $(1+\frac{2a(c_*-1)}{c_*})\ell$. After $k$ iterations, the chain $P^k$ consists of $4^k$ line segments of total length $\left(1+\frac{2a(c_*-1)}{c_*}\right)^k$. By construction, the chain $P^k$ (for $k\geq 1$) consists of four scaled copies of $P^{k-1}$. For $i=1,2,3,4$, let the \emph{$i$th subchain of $P^k$} be the subchain of $P^k$ consisting of $4^{k-1}$ segments starting from the $((i-1)4^{k-1}+1)$th segment. By construction, the $i$th subchain of $P^k$ is similar to the chain $P^{k-1}$, for $i=1,2,3,4$.\footnote{Two geometric shapes are \emph{similar} if one can be obtained from the other by translation, rotation, and scaling; and are \emph{congruent} if one can be obtained from the other by translation and rotation.} The following functions allow us to refer to these subchains formally. For $i=1,2,3,4$, define a function $f^k_i: P^k\to P^k$ as the identity on the $i$th subchain of $P^k$ that sends the remaining part(s) of $P^k$ to the closest endpoint(s) along this subchain. So $f^k_i(P^k)$ is similar to $P^{k-1}$. Let $g_i: \P_c\setminus\{P^0\} \to\P_c$ be a piecewise defined function such that $g_i(C)=\sigma^{-1}\circ f^k_i\circ\sigma(C)$ if $C$ is similar to $P^k$, where $\sigma: C\to P^k$ is a similarity transformation. Applying the function $g_i$ on a chain $P^k$ can be thought of as ``cutting out'' its $i$th subchain. \tikzset{p4/.pic={code={ \draw (0.000, 0.000) -- (0.427, 0.000) -- (0.470, 0.425) -- (0.512, 0.000) -- (0.939, 0.000) -- (0.982, 0.425) -- (0.563, 0.510) -- (0.990, 0.510) -- (1.033, 0.934) -- (1.076, 0.510) -- (1.503, 0.510) -- (1.084, 0.425) -- (1.127, 0.000) -- (1.554, 0.000) -- (1.597, 0.425) -- (1.639, 0.000) -- (2.066, 0.000) -- (2.109, 0.425) -- (1.690, 0.510) -- (2.117, 0.510) -- (2.160, 0.934) -- (1.742, 1.019) -- (1.615, 0.612) -- (1.658, 1.036) -- (1.240, 1.121) -- (1.667, 1.121) -- (1.709, 1.546) -- (1.752, 1.121) -- (2.179, 1.121) -- (2.222, 1.546) -- (1.803, 1.631) -- (2.230, 1.631) -- (2.273, 2.056) -- (2.315, 1.631) -- (2.742, 1.631) -- (2.324, 1.546) -- (2.367, 1.121) -- (2.794, 1.121) -- (2.836, 1.546) -- (2.879, 1.121) -- (3.306, 1.121) -- (2.887, 1.036) -- (2.930, 0.612) -- (2.804, 1.019) -- (2.385, 0.934) -- (2.428, 0.510) -- (2.855, 0.510) -- (2.437, 0.425) -- (2.479, 0.000) -- (2.906, 0.000) -- (2.949, 0.425) -- (2.992, 0.000) -- (3.418, 0.000) -- (3.461, 0.425) -- (3.043, 0.510) -- (3.470, 0.510) -- (3.512, 0.934) -- (3.555, 0.510) -- (3.982, 0.510) -- (3.564, 0.425) -- (3.606, 0.000) -- (4.033, 0.000) -- (4.076, 0.425) -- (4.119, 0.000) -- (4.545, 0.000) -- (4.588, 0.425) -- (4.170, 0.510) -- (4.597, 0.510) -- (4.639, 0.934) -- (4.221, 1.019) -- (4.095, 0.612) -- (4.137, 1.036) -- (3.719, 1.121) -- (4.146, 1.121) -- (4.189, 1.546) -- (4.231, 1.121) -- (4.658, 1.121) -- (4.701, 1.546) -- (4.282, 1.631) -- (4.709, 1.631) -- (4.752, 2.056) -- (4.334, 2.141) -- (4.207, 1.733) -- (4.250, 2.158) -- (3.832, 2.243) -- (3.705, 1.835) -- (4.098, 1.668) -- (3.680, 1.753) -- (3.554, 1.346) -- (3.596, 1.770) -- (3.178, 1.855) -- (3.605, 1.855) -- (3.648, 2.280) -- (3.229, 2.365) -- (3.103, 1.957) -- (3.146, 2.382) -- (2.727, 2.467) -- (3.154, 2.467) -- (3.197, 2.892) -- (3.240, 2.467) -- (3.666, 2.467) -- (3.709, 2.892) -- (3.291, 2.977) -- (3.718, 2.977) -- (3.760, 3.401) -- (3.803, 2.977) -- (4.230, 2.977) -- (3.812, 2.892) -- (3.854, 2.467) -- (4.281, 2.467) -- (4.324, 2.892) -- (4.367, 2.467) -- (4.793, 2.467) -- (4.836, 2.892) -- (4.418, 2.977) -- (4.845, 2.977) -- (4.887, 3.401) -- (4.469, 3.486) -- (4.343, 3.079) -- (4.385, 3.503) -- (3.967, 3.588) -- (4.394, 3.588) -- (4.437, 4.013) -- (4.479, 3.588) -- (4.906, 3.588) -- (4.949, 4.013) -- (4.530, 4.098) -- (4.957, 4.098) -- (5.000, 4.523) -- (5.043, 4.098) -- (5.470, 4.098) -- (5.051, 4.013) -- (5.094, 3.588) -- (5.521, 3.588) -- (5.563, 4.013) -- (5.606, 3.588) -- (6.033, 3.588) -- (5.615, 3.503) -- (5.657, 3.079) -- (5.531, 3.486) -- (5.113, 3.401) -- (5.155, 2.977) -- (5.582, 2.977) -- (5.164, 2.892) -- (5.207, 2.467) -- (5.633, 2.467) -- (5.676, 2.892) -- (5.719, 2.467) -- (6.146, 2.467) -- (6.188, 2.892) -- (5.770, 2.977) -- (6.197, 2.977) -- (6.240, 3.401) -- (6.282, 2.977) -- (6.709, 2.977) -- (6.291, 2.892) -- (6.334, 2.467) -- (6.760, 2.467) -- (6.803, 2.892) -- (6.846, 2.467) -- (7.273, 2.467) -- (6.854, 2.382) -- (6.897, 1.957) -- (6.771, 2.365) -- (6.352, 2.280) -- (6.395, 1.855) -- (6.822, 1.855) -- (6.404, 1.770) -- (6.446, 1.346) -- (6.320, 1.753) -- (5.902, 1.668) -- (6.295, 1.835) -- (6.168, 2.243) -- (5.750, 2.158) -- (5.793, 1.733) -- (5.666, 2.141) -- (5.248, 2.056) -- (5.291, 1.631) -- (5.718, 1.631) -- (5.299, 1.546) -- (5.342, 1.121) -- (5.769, 1.121) -- (5.811, 1.546) -- (5.854, 1.121) -- (6.281, 1.121) -- (5.863, 1.036) -- (5.905, 0.612) -- (5.779, 1.019) -- (5.361, 0.934) -- (5.403, 0.510) -- (5.830, 0.510) -- (5.412, 0.425) -- (5.455, 0.000) -- (5.881, 0.000) -- (5.924, 0.425) -- (5.967, 0.000) -- (6.394, 0.000) -- (6.436, 0.425) -- (6.018, 0.510) -- (6.445, 0.510) -- (6.488, 0.934) -- (6.530, 0.510) -- (6.957, 0.510) -- (6.539, 0.425) -- (6.582, 0.000) -- (7.008, 0.000) -- (7.051, 0.425) -- (7.094, 0.000) -- (7.521, 0.000) -- (7.563, 0.425) -- (7.145, 0.510) -- (7.572, 0.510) -- (7.615, 0.934) -- (7.196, 1.019) -- (7.070, 0.612) -- (7.113, 1.036) -- (6.694, 1.121) -- (7.121, 1.121) -- (7.164, 1.546) -- (7.206, 1.121) -- (7.633, 1.121) -- (7.676, 1.546) -- (7.258, 1.631) -- (7.685, 1.631) -- (7.727, 2.056) -- (7.770, 1.631) -- (8.197, 1.631) -- (7.778, 1.546) -- (7.821, 1.121) -- (8.248, 1.121) -- (8.291, 1.546) -- (8.333, 1.121) -- (8.760, 1.121) -- (8.342, 1.036) -- (8.385, 0.612) -- (8.258, 1.019) -- (7.840, 0.934) -- (7.883, 0.510) -- (8.310, 0.510) -- (7.891, 0.425) -- (7.934, 0.000) -- (8.361, 0.000) -- (8.403, 0.425) -- (8.446, 0.000) -- (8.873, 0.000) -- (8.916, 0.425) -- (8.497, 0.510) -- (8.924, 0.510) -- (8.967, 0.934) -- (9.010, 0.510) -- (9.437, 0.510) -- (9.018, 0.425) -- (9.061, 0.000) -- (9.488, 0.000) -- (9.530, 0.425) -- (9.573, 0.000) -- (10.000, 0.000); }}} \begin{figure}[!ht] \centering \begin{tikzpicture}[scale=0.5] \draw (0.000, 0.000)node[circle, fill, inner sep=1pt]{} -- (2.066, 0.000)node[circle, fill, inner sep=1pt]{} -- (2.273, 2.056)node[circle, fill, inner sep=1pt]{} -- (2.479, 0.000)node[circle, fill, inner sep=1pt]{} -- (4.545, 0.000)node[circle, fill, inner sep=1pt]{} -- (4.752, 2.056)node[circle, fill, inner sep=1pt]{} -- (2.727, 2.467)node[circle, fill, inner sep=1pt]{} -- (4.793, 2.467)node[circle, fill, inner sep=1pt]{} -- (5.000, 4.523)node[circle, fill, inner sep=1pt]{} -- (5.207, 2.467)node[circle, fill, inner sep=1pt]{} -- (7.273, 2.467)node[circle, fill, inner sep=1pt]{} -- (5.248, 2.056)node[circle, fill, inner sep=1pt]{} -- (5.455, 0.000)node[circle, fill, inner sep=1pt]{} -- (7.521, 0.000)node[circle, fill, inner sep=1pt]{} -- (7.727, 2.056)node[circle, fill, inner sep=1pt]{} -- (7.934, 0.000)node[circle, fill, inner sep=1pt]{} -- (10.000, 0.000)node[circle, fill, inner sep=1pt]{}; \end{tikzpicture} \hspace*{.1mm} \begin{tikzpicture} \path (0,0) pic[scale=0.5] {p4}; \end{tikzpicture} \caption{The chains $P^2$ (left) and $P^4$ (right).}\label{fig:p2p4} \end{figure} Clearly, the stretch factor of the chain monotonically increases with the parameter $a$. However, if $a$ is too large, the chain is no longer simple. The following lemma gives a sufficient condition for the constructed chains to avoid self-crossings. \begin{lemma}\label{lemma:simple} For every constant $c\geq 4$, if $a\leq \frac{c-2}{2c}$, then every chain in $\P_c$ is simple. \end{lemma} \begin{proof} Let $T=\conv(P^1)$. Observe that $T$ is an isosceles triangle; see Figure~\ref{fig:bounding-triangle}\,(left). We first show the following: \begin{claim*}If $a\leq \frac{c-2}{2c}$, then $\conv(P^k) = T$ for all $k \geq 1$. \end{claim*} \begin{claimproof} We prove the claim by induction on $k$. It holds for $k=1$ by definition. For the induction step, assume that $k\geq 2$ and that the claim holds for $k-1$. Consider the chain $P^{k}$. Since it contains all the vertices of $P^1$, $T\subset \conv(P^{k})$. So we only need to show that $\conv(P^{k})\subset T$. \begin{figure}[htbp!] \centering \begin{tikzpicture}[scale=0.5] \fill[black!15] (0.000, 0.000) -- (5.000, 4.623) -- (10.000, 0.000) -- cycle; \draw (0.000, 0.000) -- node[above]{$\frac{1}{2}-\frac{a}{c_*}$} (4.545, 0.000) -- node[left]{$a$} (5.000, 4.523) -- node[right]{$a$} (5.455, 0.000) -- node[above]{$\frac{1}{2}-\frac{a}{c_*}$} (10.000, 0.000); \draw[dashed] (4.545, 0.000) -- node[above]{$\frac{2a}{c_*}$} (5.455, 0.000); \end{tikzpicture} \hspace{.1mm} \begin{tikzpicture}[scale=0.5] \fill[black!15] (0.000, 0.000) -- (5.000, 4.623) -- (10.000, 0.000) -- cycle; \fill[black!25] (0.000, 0.000) -- (2.273, 2.056) -- (4.545, 0.000) --cycle; \fill[black!25] (4.545, 0.000) -- (2.727, 2.467) -- (5.000, 4.623) --cycle; \fill[black!25] (5.000, 4.623) -- (7.273, 2.467) -- (5.455, 0.000) --cycle; \fill[black!25] (5.455, 0.000) -- (7.727, 2.056) -- (10.000, 0.000) --cycle; \draw (0.000, 0.000) -- (2.066, 0.000) -- (2.273, 2.056) -- (2.479, 0.000) -- (4.545, 0.000) -- (4.752, 2.056) -- (2.727, 2.467)node[circle, fill, inner sep=1pt, label=above:$p$]{} -- (4.793, 2.467) -- (5.000, 4.523)node[circle, fill, inner sep=1pt, label=above:$t$]{} -- (5.207, 2.467) -- (7.273, 2.467) -- (5.248, 2.056) -- (5.455, 0.000) -- (7.521, 0.000) -- (7.727, 2.056) -- (7.934, 0.000) -- (10.000, 0.000); \node (label1) at (0, 3.5) {\small $a\left(\frac{1}{2}-\frac{a}{c_*}\right)$}; \draw [-latex] (label1.south) to [bend right=20] (2.211, 1.439); \node (label2) at (-0.5, 1) {\small $\left(\frac{1}{2}-\frac{a}{c_*}\right)^2$}; \draw [-latex] (0.8, 1) to [bend left=20] (1.5, 0.1); \end{tikzpicture} \caption{Left: Convex hull $T$ of $P^1$ in light gray; Right: Convex hulls of $g_i(P^2)$, $i=1,2,3,4$, in dark gray, are contained in $T$.} \label{fig:bounding-triangle} \end{figure} By construction, $P^{k}\subset \bigcup_{i=1}^4 \conv(g_i(P^{k}))$; see Figure~\ref{fig:bounding-triangle}\,(right). By the inductive hypothesis, $\conv(g_i(P^{k}))$ is an isosceles triangle similar to $T$, for $i=1,2,3,4$. Since the bases of $\conv(g_1(P^{k}))$ and $\conv(g_4(P^{k}))$ are collinear with the base of $T$ by construction, due to similarity, they are contained in $T$. The base of $\conv(g_2(P^{k}))$ is contained in $T$. In order to show $\conv(g_2(P^{k}))\subset T$, by convexity, it suffices to ensure that its apex $p$ is also in $T$. Note that the coordinates of the top point is $t=\left(1/2, a\sqrt{c_*^2-1}/c_* \right)$, so the supporting line $\ell$ of the left side of $T$ is \begin{align*} y &=\frac{2a\sqrt{c_*^2-1}}{c_*}x, \text{ and} \\ p &=\left(\frac{1}{2}-\frac{a}{2c_*}-\frac{a^2\left(c_*^2-1\right)}{c_*^2}, \left(\frac{a}{2c_*}+\frac{a^2}{c_*^2}\right)\sqrt{c_*^2-1}\right). \end{align*} By the condition of $a\leq \frac{c-2}{2c}=\frac{c_*}{2(c_*+1)}$ in the lemma, $p$ lies on or below $\ell$. Under the same condition, we have $\conv(g_3(P^{k})) \subset T$ by symmetry. Then $P^{k}\subset \bigcup_{i=1}^4 \conv(g_i(P^{k}))\subset T$. Since $T$ is convex, $\conv(P^k)\subset T$. So $\conv(P^k) = T$, as claimed. \end{claimproof} We can now finish the proof of Lemma~\ref{lemma:simple} by induction. Clearly, $P^0$ and $P^1$ are simple. Assume that $k \geq 2$, and $P^{k-1}$ is simple. Consider the chain $P^{k}$. For $i=1,2,3,4$, $g_i(P^{k})$ is similar to $P^{k-1}$, hence simple by the inductive hypothesis. Since $P^{k}=\bigcup_{i=1}^4 g_i(P^{k})$, it is sufficient to show that for all $i,j\in\{1,2,3,4\}$, where $i\neq j$, a segment in $g_i(P^{k})$ does not intersect any segments in $g_j(P^{k})$, unless they are consecutive in $P^{k}$ and they intersect at a common endpoint. This follows from the above claim together with the observation that for $i\neq j$, the intersection $g_i(P^{k})\cap g_j(P^{k})$ is either empty or contains a single vertex which is the common endpoint of two consecutive segments in $P^{k}$. \end{proof} In the remainder of this section, we assume that \begin{equation} a=\frac{c-2}{2c}=\frac{c_*}{2(c_*+1)}. \end{equation} Under this assumption, all segments in $P^1$ have the same length $a$. Therefore, by construction, all segments in $P^k$ have the same length \[ a^k=\left(\frac{c_*}{2(c_*+1)}\right)^k. \] There are $4^k$ segments in $P^k$, with $4^k+1$ vertices, and its stretch factor is \[\delta_{P^k} = 4^k\left(\frac{c_*}{2(c_*+1)}\right)^k=\left(\frac{2c_*}{c_*+1}\right)^k.\] Consequently, $k=\log_4 (n-1) = \frac{\log (n-1)}{2}$, and \[ \delta_{P^k} =\left(\frac{2c_*}{c_*+1}\right)^{\frac{\log (n-1)}{2}} =\left(\frac{2c-4}{c}\right)^{\frac{\log (n-1)}{2}} =(n-1)^{\frac{1+\log (c-2) - \log c}{2}}, \] as claimed. To finish the proof of Theorem~\ref{thm:lower-bound}, it remains to show the constructed polygonal chains are indeed $c$-chains. \begin{lemma}\label{lemma:c-chain} For every constant $c\geq 4$, $\P_c$ is a family of $c$-chains. \end{lemma} We first prove a couple of facts that will be useful in the proof of Lemma~\ref{lemma:c-chain}. We defer an intuitive explanation until after the formal statement of the lemma. \begin{lemma}\label{lemma:technical} Let $k \geq 1$ and let $P^k=(p_1, p_2, \dots, p_n)$, where $n=4^k+1$. Then the following hold: \begin{enumerate}[{\rm(i)}] \item\label{pf:f1} There exists a sequence $(q_1, q_2, \dots, q_m)$ of $m=2\cdot 4^{k-1}$ points in $\RR^2$ such that the chain $R^k=(p_1, q_1, p_2, q_2, \dots, p_m, q_m, p_{m+1})$ is similar to $P^k$. \item\label{pf:f2} For $k\geq 2$, define $g_5: \P_c\setminus\{P^0, P^1\} \to \P_c$ by \[ g_5(P^k) = \left(g_3\circ g_2(P^k)\right) \cup \left(g_4\circ g_2(P^k)\right) \cup \left(g_1\circ g_3(P^k)\right) \cup \left(g_2\circ g_3(P^k)\right). \] Then $g_5(P^k)$ is similar to $P^{k-1}$. \end{enumerate} \end{lemma} Part~(\ref{pf:f1}) of Lemma~\ref{lemma:technical} says that given $P^k$, we can construct a chain $R^k$ similar to $P^k$ by inserting one point between every two consecutive points of the left half of $P^k$, see Figure~\ref{fig:technical}\,(left). Part~(\ref{pf:f2}) says that the ``top'' subchain of $P^k$ that consists of the right half of $g_2(P^k)$ and the left half of $g_3(P^k)$, see Figure~\ref{fig:technical}\,(right), is similar to $P^{k-1}$. \begin{figure}[ht!] \centering \begin{tikzpicture}[scale=0.5] \path (0,0) pic[scale=0.5] {p4}; \draw[red] (0.000, 0.000) -- (0.213, 0.193) -- (0.427, 0.000) -- (0.256, 0.232) -- (0.470, 0.425) -- (0.683, 0.232) -- (0.512, 0.000) -- (0.726, 0.193) -- (0.939, 0.000) -- (0.768, 0.232) -- (0.982, 0.425) -- (0.734, 0.278) -- (0.563, 0.510) -- (0.777, 0.703) -- (0.990, 0.510) -- (0.820, 0.741) -- (1.033, 0.934) -- (1.246, 0.741) -- (1.076, 0.510) -- (1.289, 0.703) -- (1.503, 0.510) -- (1.332, 0.278) -- (1.084, 0.425) -- (1.298, 0.232) -- (1.127, 0.000) -- (1.340, 0.193) -- (1.554, 0.000) -- (1.383, 0.232) -- (1.597, 0.425) -- (1.810, 0.232) -- (1.639, 0.000) -- (1.853, 0.193) -- (2.066, 0.000) -- (1.895, 0.232) -- (2.109, 0.425) -- (1.861, 0.278) -- (1.690, 0.510) -- (1.904, 0.703) -- (2.117, 0.510) -- (1.947, 0.741) -- (2.160, 0.934) -- (1.912, 0.788) -- (1.742, 1.019) -- (1.863, 0.758) -- (1.615, 0.612) -- (1.445, 0.843) -- (1.658, 1.036) -- (1.410, 0.890) -- (1.240, 1.121) -- (1.453, 1.314) -- (1.667, 1.121) -- (1.496, 1.353) -- (1.709, 1.546) -- (1.923, 1.353) -- (1.752, 1.121) -- (1.965, 1.314) -- (2.179, 1.121) -- (2.008, 1.353) -- (2.222, 1.546) -- (1.974, 1.399) -- (1.803, 1.631) -- (2.017, 1.824) -- (2.230, 1.631) -- (2.059, 1.863) -- (2.273, 2.056) -- (2.486, 1.863) -- (2.315, 1.631) -- (2.529, 1.824) -- (2.742, 1.631) -- (2.572, 1.399) -- (2.324, 1.546) -- (2.537, 1.353) -- (2.367, 1.121) -- (2.580, 1.314) -- (2.794, 1.121) -- (2.623, 1.353) -- (2.836, 1.546) -- (3.050, 1.353) -- (2.879, 1.121) -- (3.092, 1.314) -- (3.306, 1.121) -- (3.135, 0.890) -- (2.887, 1.036) -- (3.101, 0.843) -- (2.930, 0.612) -- (2.683, 0.758) -- (2.804, 1.019) -- (2.633, 0.788) -- (2.385, 0.934) -- (2.599, 0.741) -- (2.428, 0.510) -- (2.642, 0.703) -- (2.855, 0.510) -- (2.684, 0.278) -- (2.437, 0.425) -- (2.650, 0.232) -- (2.479, 0.000) -- (2.693, 0.193) -- (2.906, 0.000) -- (2.735, 0.232) -- (2.949, 0.425) -- (3.162, 0.232) -- (2.992, 0.000) -- (3.205, 0.193) -- (3.418, 0.000) -- (3.248, 0.232) -- (3.461, 0.425) -- (3.214, 0.278) -- (3.043, 0.510) -- (3.256, 0.703) -- (3.470, 0.510) -- (3.299, 0.741) -- (3.512, 0.934) -- (3.726, 0.741) -- (3.555, 0.510) -- (3.769, 0.703) -- (3.982, 0.510) -- (3.811, 0.278) -- (3.564, 0.425) -- (3.777, 0.232) -- (3.606, 0.000) -- (3.820, 0.193) -- (4.033, 0.000) -- (3.862, 0.232) -- (4.076, 0.425) -- (4.289, 0.232) -- (4.119, 0.000) -- (4.332, 0.193) -- (4.545, 0.000) -- (4.375, 0.232) -- (4.588, 0.425) -- (4.341, 0.278) -- (4.170, 0.510) -- (4.383, 0.703) -- (4.597, 0.510) -- (4.426, 0.741) -- (4.639, 0.934) -- (4.392, 0.788) -- (4.221, 1.019) -- (4.342, 0.758) -- (4.095, 0.612) -- (3.924, 0.843) -- (4.137, 1.036) -- (3.890, 0.890) -- (3.719, 1.121) -- (3.932, 1.314) -- (4.146, 1.121) -- (3.975, 1.353) -- (4.189, 1.546) -- (4.402, 1.353) -- (4.231, 1.121) -- (4.445, 1.314) -- (4.658, 1.121) -- (4.487, 1.353) -- (4.701, 1.546) -- (4.453, 1.399) -- (4.282, 1.631) -- (4.496, 1.824) -- (4.709, 1.631) -- (4.539, 1.863) -- (4.752, 2.056) -- (4.504, 1.909) -- (4.334, 2.141) -- (4.455, 1.880) -- (4.207, 1.733) -- (4.037, 1.965) -- (4.250, 2.158) -- (4.002, 2.011) -- (3.832, 2.243) -- (3.953, 1.982) -- (3.705, 1.835) -- (3.977, 1.929) -- (4.098, 1.668) -- (3.851, 1.522) -- (3.680, 1.753) -- (3.801, 1.492) -- (3.554, 1.346) -- (3.383, 1.577) -- (3.596, 1.770) -- (3.349, 1.624) -- (3.178, 1.855) -- (3.392, 2.048) -- (3.605, 1.855) -- (3.434, 2.087) -- (3.648, 2.280) -- (3.400, 2.133) -- (3.229, 2.365) -- (3.351, 2.104) -- (3.103, 1.957) -- (2.932, 2.189) -- (3.146, 2.382) -- (2.898, 2.235) -- (2.727, 2.467) -- (2.941, 2.660) -- (3.154, 2.467) -- (2.983, 2.699) -- (3.197, 2.892) -- (3.410, 2.699) -- (3.240, 2.467) -- (3.453, 2.660) -- (3.666, 2.467) -- (3.496, 2.699) -- (3.709, 2.892) -- (3.462, 2.745) -- (3.291, 2.977) -- (3.504, 3.170) -- (3.718, 2.977) -- (3.547, 3.208) -- (3.760, 3.401) -- (3.974, 3.208) -- (3.803, 2.977) -- (4.016, 3.170) -- (4.230, 2.977) -- (4.059, 2.745) -- (3.812, 2.892) -- (4.025, 2.699) -- (3.854, 2.467) -- (4.068, 2.660) -- (4.281, 2.467) -- (4.110, 2.699) -- (4.324, 2.892) -- (4.537, 2.699) -- (4.367, 2.467) -- (4.580, 2.660) -- (4.793, 2.467) -- (4.623, 2.699) -- (4.836, 2.892) -- (4.588, 2.745) -- (4.418, 2.977) -- (4.631, 3.170) -- (4.845, 2.977) -- (4.674, 3.208) -- (4.887, 3.401) -- (4.640, 3.255) -- (4.469, 3.486) -- (4.590, 3.225) -- (4.343, 3.079) -- (4.172, 3.310) -- (4.385, 3.503) -- (4.138, 3.357) -- (3.967, 3.588) -- (4.180, 3.781) -- (4.394, 3.588) -- (4.223, 3.820) -- (4.437, 4.013) -- (4.650, 3.820) -- (4.479, 3.588) -- (4.693, 3.781) -- (4.906, 3.588) -- (4.735, 3.820) -- (4.949, 4.013) -- (4.701, 3.866) -- (4.530, 4.098) -- (4.744, 4.291) -- (4.957, 4.098) -- (4.787, 4.330) -- (5.000, 4.523); \end{tikzpicture} \hspace*{.1mm} \begin{tikzpicture}[scale=0.5] \fill[black!25] (2.727, 2.467) -- (5.000, 4.623) -- (7.273, 2.467) --cycle; \path (0,0) pic[scale=0.5] {p4}; \end{tikzpicture} \caption{Left: Chain $P^k$ with the scaled copy of itself $R^k$ (in red); Right: Chain $P^k$ with its subchain $g_5(P^k)$ marked by its convex hull.}\label{fig:technical} \end{figure} \begin{proof}[Proof of Lemma~\ref{lemma:technical}] For~(\ref{pf:f1}), we review the construction of $P^k$, and show that $R^k$ and $P^k$ can be constructed in a coupled manner. In Figure~\ref{fig:induced-chain}\,(left), consider $P^1=(p_1, p_2, p_3, p_4, p_5)$. Recall that all segments in $P^1$ are of the same length $a=\frac{c_*}{2(c_*+1)}$. The isosceles triangles $\Delta p_1p_2p_3$ and $\Delta p_1p_3p_5$ are similar. Let $\sigma: \Delta p_1p_3p_5 \to \Delta p_1p_2p_3$ be the similarity transformation. Let $q_1=\sigma(p_2)$ and $q_2 = \sigma(p_4)$. By construction, the chain $R^1 = (p_1, q_1, p_2, q_2, p_3)$ is similar to $P^1$. In particular, all of its segments have the same length. So the isosceles triangle $\Delta p_1q_1p_2$ is similar to $\Delta p_1p_3p_5$. Moreover, its base is the segment $p_1p_2$, so $\Delta p_1q_1p_2$ is precisely $\conv(g_1(P^2))$, see Figure~\ref{fig:induced-chain}\,(right). \begin{figure}[!ht] \centering \begin{tikzpicture}[scale=0.5] \draw (0.000, 0.000)node[circle, fill, inner sep=1pt, label=above:$p_1$]{} -- (4.545, 0.000)node[circle, fill, inner sep=1pt, label=85:$p_2$]{} -- (5.000, 4.523)node[circle, fill, inner sep=1pt, label=left:$p_3$]{} -- (5.455, 0.000)node[circle, fill, inner sep=1pt, label=45:$p_4$]{} -- (10.000, 0.000)node[circle, fill, inner sep=1pt, label=93:$p_5$]{}; \draw[red] (0.000, 0.000) -- (2.273, 2.056)node[circle, fill, inner sep=1pt, label=left:$q_1$]{} -- (4.545, 0.000) -- (2.727, 2.467)node[circle, fill, inner sep=1pt, label=above:$q_2$]{} -- (5.000, 4.523); \end{tikzpicture} \hspace*{.1mm} \begin{tikzpicture}[scale=0.5] \draw[red] (0.000, 0.000) -- (2.273, 2.056) -- (4.545, 0.000) -- (2.727, 2.467) -- (5.000, 4.523); \draw (0.000, 0.000)node[circle, fill, inner sep=1pt, label=above:$v_1$]{} -- (2.066, 0.000)node[circle, fill, inner sep=1pt, label=135:$v_2$]{} -- (2.273, 2.056)node[circle, fill, inner sep=1pt, label=left:$v_{3}$]{} -- (2.479, 0.000)node[circle, fill, inner sep=1pt, label=45:$v_{4}$]{} -- (4.545, 0.000)node[circle, fill, inner sep=1pt, label=85:$v_{5}$]{} -- (4.752, 2.056)node[circle, fill, inner sep=1pt, label=225:$v_{6}$]{} -- (2.727, 2.467)node[circle, fill, inner sep=1pt, label=above:$v_{7}$]{} -- (4.793, 2.467)node[circle, fill, inner sep=1pt, label=135:$v_{8}$]{} -- (5.000, 4.523)node[circle, fill, inner sep=1pt, label=left:$v_{9}$]{} -- (5.207, 2.467)node[circle, fill, inner sep=1pt, label=45:$v_{10}$]{} -- (7.273, 2.467)node[circle, fill, inner sep=1pt, label=above:$v_{11}$]{} -- (5.248, 2.056) -- (5.455, 0.000) -- (7.521, 0.000) -- (7.727, 2.056) -- (7.934, 0.000) -- (10.000, 0.000)node[circle, fill, inner sep=1pt, label=93:$v_{17}$]{}; \end{tikzpicture} \caption{Left: the chains $P^1$ and $R^1$ (red); Right: the chains $P^2$ and $R^1$ (red).}\label{fig:induced-chain} \end{figure} Write $P^2=(v_{1}, v_{2}, \dots, v_{17})$, then $v_{3}=q_1$ by the above argument and $v_{7}=q_2$ by symmetry. Now $\Delta v_{1}v_{2}v_{3}$, $\Delta v_{3}v_{4}v_{5}$, $\Delta v_{5}v_{6}v_{7}$, and $\Delta v_{7}v_{8}v_{9}$ are four congruent isosceles triangles, all of which are similar to $\Delta v_{1}v_{9}v_{17}$, since the angles are the same. Repeat the above procedure on each of them to obtain $R^2=(v_{1}, u_1, v_{2}, u_2, \dots, v_{8}, u_8, v_{9})$, which is similar to $P^2$. Continue this construction inductively to get the desired chain $R^k$ for any $k\geq 1$. For~(\ref{pf:f2}), see Figure~\ref{fig:induced-chain}\,(right). By definition, $g_5(P^2)$ is the subchain $(v_{7}, v_{8}, v_{9}, v_{10}, v_{11})$. Observe that the segments $v_{7}v_{8}$ and $v_{10}v_{11}$ are collinear by symmetry. Moreover, they are parallel to $v_{1}v_{17}$ since $\angle v_{7}v_{8}v_{9} = \angle v_{1}v_{5}v_{9}$. So $g_5(P^2)$ is similar to $P^1$; see Figure~\ref{fig:induced-chain}\,(left). Then for $k\geq 2$, $g_5(P^k)$ is the subchain of $P^k$ starting at vertex $v_{7}$, ending at vertex $v_{11}$. By the construction of $P^k$, $g_5(P^k)$ is similar to $P^{k-1}$. \end{proof} \begin{proof}[Proof of Lemma~\ref{lemma:c-chain}] We proceed by induction on $k$ again. The claim is vacuously true for $P^0$. For $P^1$, among all ten choices of $1\leq i<j<k\leq 5$, $\frac{|p_2p_3|+|p_3p_4|}{|p_2p_4|}=c_*=\frac{c-2}{2}<c$ is the largest, and so $P^1$ is also a $c$-chain. Assume that $m\geq 2$ and $P^{m-1}$ is a $c$-chain. We need to show that $P^m$ is also a $c$-chain. Consider a triplet of vertices $\{p_i, p_j, p_k\}\subset P^m$, where $1\leq i< j< k\leq n=4^m+1$. Recall that $P^m$ consists of four copies of the subchain $P^{m-1}$, namely $g_1(P^m)$, $g_2(P^m)$, $g_3(P^m)$, and $g_4(P^m)$, see Figure~\ref{fig:c-chain}\,(left). If $\{p_i, p_j, p_k\}\subset g_l(P^{m})$ for any $l=1,2,3,4$, then by the induction hypothesis, \[ \frac{|p_ip_j|+|p_jp_k|}{|p_ip_k|}\leq c. \] So we may assume that $p_i$ and $p_k$ belong to two different $g_l(P^m)$'s. There are four cases to consider up to symmetry: \begin{enumerate}[{Case} 1.] \item\label{pf:c-chain-case1} $p_i\in g_1(P^m)$ and $p_k\in g_2(P^m)$; \item $p_i\in g_1(P^m)$ and $p_k\in g_3(P^m)$; \item $p_i\in g_1(P^m)$ and $p_k\in g_4(P^m)$; \item\label{pf:c-chain-case4} $p_i\in g_2(P^m)$ and $p_k\in g_3(P^m)$. \end{enumerate} \begin{figure}[htbp!] \centering \begin{tikzpicture}[scale=0.5] \fill[black!25] (0.000, 0.000) -- (2.273, 2.056) -- (4.545, 0.000) --cycle; \fill[black!25] (4.545, 0.000) -- (2.727, 2.467) -- (5.000, 4.623) --cycle; \fill[black!25] (5.000, 4.623) -- (7.273, 2.467) -- (5.455, 0.000) --cycle; \fill[black!25] (5.455, 0.000) -- (7.727, 2.056) -- (10.000, 0.000) --cycle; \draw[dashed] (4.545, 0.000) -- node[below]{$\scriptstyle\frac{1}{c_*+1}$} (5.455, 0.000); \path (0,0) pic[scale=0.5] {p4}; \end{tikzpicture} \hspace*{0.1mm} \begin{tikzpicture}[scale=0.5] \path (0,0) pic[scale=0.5] {p4}; \draw[red] (0.000, 0.000) -- (0.213, 0.193) -- (0.427, 0.000) -- (0.256, 0.232) -- (0.470, 0.425) -- (0.683, 0.232) -- (0.512, 0.000) -- (0.726, 0.193) -- (0.939, 0.000) -- (0.768, 0.232) -- (0.982, 0.425) -- (0.734, 0.278) -- (0.563, 0.510) -- (0.777, 0.703) -- (0.990, 0.510) -- (0.820, 0.741) -- (1.033, 0.934) -- (1.246, 0.741) -- (1.076, 0.510) -- (1.289, 0.703) -- (1.503, 0.510) -- (1.332, 0.278) -- (1.084, 0.425) -- (1.298, 0.232) -- (1.127, 0.000) -- (1.340, 0.193) -- (1.554, 0.000) -- (1.383, 0.232) -- (1.597, 0.425) -- (1.810, 0.232) -- (1.639, 0.000) -- (1.853, 0.193) -- (2.066, 0.000) -- (1.895, 0.232) -- (2.109, 0.425) -- (1.861, 0.278) -- (1.690, 0.510) -- (1.904, 0.703) -- (2.117, 0.510) -- (1.947, 0.741) -- (2.160, 0.934) -- (1.912, 0.788) -- (1.742, 1.019) -- (1.863, 0.758) -- (1.615, 0.612) -- (1.445, 0.843) -- (1.658, 1.036) -- (1.410, 0.890) -- (1.240, 1.121) -- (1.453, 1.314) -- (1.667, 1.121) -- (1.496, 1.353) -- (1.709, 1.546) -- (1.923, 1.353) -- (1.752, 1.121) -- (1.965, 1.314) -- (2.179, 1.121) -- (2.008, 1.353) -- (2.222, 1.546) -- (1.974, 1.399) -- (1.803, 1.631) -- (2.017, 1.824) -- (2.230, 1.631) -- (2.059, 1.863) -- (2.273, 2.056) -- (2.486, 1.863) -- (2.315, 1.631) -- (2.529, 1.824) -- (2.742, 1.631) -- (2.572, 1.399) -- (2.324, 1.546) -- (2.537, 1.353) -- (2.367, 1.121) -- (2.580, 1.314) -- (2.794, 1.121) -- (2.623, 1.353) -- (2.836, 1.546) -- (3.050, 1.353) -- (2.879, 1.121) -- (3.092, 1.314) -- (3.306, 1.121) -- (3.135, 0.890) -- (2.887, 1.036) -- (3.101, 0.843) -- (2.930, 0.612) -- (2.683, 0.758) -- (2.804, 1.019) -- (2.633, 0.788) -- (2.385, 0.934) -- (2.599, 0.741) -- (2.428, 0.510) -- (2.642, 0.703) -- (2.855, 0.510) -- (2.684, 0.278) -- (2.437, 0.425) -- (2.650, 0.232) -- (2.479, 0.000) -- (2.693, 0.193) -- (2.906, 0.000) -- (2.735, 0.232) -- (2.949, 0.425) -- (3.162, 0.232) -- (2.992, 0.000) -- (3.205, 0.193) -- (3.418, 0.000) -- (3.248, 0.232) -- (3.461, 0.425) -- (3.214, 0.278) -- (3.043, 0.510) -- (3.256, 0.703) -- (3.470, 0.510) -- (3.299, 0.741) -- (3.512, 0.934) -- (3.726, 0.741) -- (3.555, 0.510) -- (3.769, 0.703) -- (3.982, 0.510) -- (3.811, 0.278) -- (3.564, 0.425) -- (3.777, 0.232) -- (3.606, 0.000) -- (3.820, 0.193) -- (4.033, 0.000) -- (3.862, 0.232) -- (4.076, 0.425) -- (4.289, 0.232) -- (4.119, 0.000) -- (4.332, 0.193) -- (4.545, 0.000) -- (4.375, 0.232) -- (4.588, 0.425) -- (4.341, 0.278) -- (4.170, 0.510) -- (4.383, 0.703) -- (4.597, 0.510) -- (4.426, 0.741) -- (4.639, 0.934) -- (4.392, 0.788) -- (4.221, 1.019) -- (4.342, 0.758) -- (4.095, 0.612) -- (3.924, 0.843) -- (4.137, 1.036) -- (3.890, 0.890) -- (3.719, 1.121) -- (3.932, 1.314) -- (4.146, 1.121) -- (3.975, 1.353) -- (4.189, 1.546) -- (4.402, 1.353) -- (4.231, 1.121) -- (4.445, 1.314) -- (4.658, 1.121) -- (4.487, 1.353) -- (4.701, 1.546) -- (4.453, 1.399) -- (4.282, 1.631) -- (4.496, 1.824) -- (4.709, 1.631) -- (4.539, 1.863) -- (4.752, 2.056) -- (4.504, 1.909) -- (4.334, 2.141) -- (4.455, 1.880) -- (4.207, 1.733) -- (4.037, 1.965) -- (4.250, 2.158) -- (4.002, 2.011) -- (3.832, 2.243) -- (3.953, 1.982) -- (3.705, 1.835) -- (3.977, 1.929) -- (4.098, 1.668) -- (3.851, 1.522) -- (3.680, 1.753) -- (3.801, 1.492) -- (3.554, 1.346) -- (3.383, 1.577) -- (3.596, 1.770) -- (3.349, 1.624) -- (3.178, 1.855) -- (3.392, 2.048) -- (3.605, 1.855) -- (3.434, 2.087) -- (3.648, 2.280) -- (3.400, 2.133) -- (3.229, 2.365) -- (3.351, 2.104) -- (3.103, 1.957) -- (2.932, 2.189) -- (3.146, 2.382) -- (2.898, 2.235) -- (2.727, 2.467) -- (2.941, 2.660) -- (3.154, 2.467) -- (2.983, 2.699) -- (3.197, 2.892) -- (3.410, 2.699) -- (3.240, 2.467) -- (3.453, 2.660) -- (3.666, 2.467) -- (3.496, 2.699) -- (3.709, 2.892) -- (3.462, 2.745) -- (3.291, 2.977) -- (3.504, 3.170) -- (3.718, 2.977) -- (3.547, 3.208) -- (3.760, 3.401) -- (3.974, 3.208) -- (3.803, 2.977) -- (4.016, 3.170) -- (4.230, 2.977) -- (4.059, 2.745) -- (3.812, 2.892) -- (4.025, 2.699) -- (3.854, 2.467) -- (4.068, 2.660) -- (4.281, 2.467) -- (4.110, 2.699) -- (4.324, 2.892) -- (4.537, 2.699) -- (4.367, 2.467) -- (4.580, 2.660) -- (4.793, 2.467) -- (4.623, 2.699) -- (4.836, 2.892) -- (4.588, 2.745) -- (4.418, 2.977) -- (4.631, 3.170) -- (4.845, 2.977) -- (4.674, 3.208) -- (4.887, 3.401) -- (4.640, 3.255) -- (4.469, 3.486) -- (4.590, 3.225) -- (4.343, 3.079) -- (4.172, 3.310) -- (4.385, 3.503) -- (4.138, 3.357) -- (3.967, 3.588) -- (4.180, 3.781) -- (4.394, 3.588) -- (4.223, 3.820) -- (4.437, 4.013) -- (4.650, 3.820) -- (4.479, 3.588) -- (4.693, 3.781) -- (4.906, 3.588) -- (4.735, 3.820) -- (4.949, 4.013) -- (4.701, 3.866) -- (4.530, 4.098) -- (4.744, 4.291) -- (4.957, 4.098) -- (4.787, 4.330) -- (5.000, 4.523); \node[below, inner sep=2.65mm]{} (5.455, 0.000); \end{tikzpicture} \caption{Left: Chain $P^m$ with its four subchains of type $P^{m-1}$ marked by their convex hulls; Right: Chain $P^m$ with the scaled copy of itself $R^m$ (in red) constructed in Lemma~\ref{lemma:technical}\,(\ref{pf:f1}).}\label{fig:c-chain} \end{figure} By Lemma~\ref{lemma:technical}\,(\ref{pf:f1}), the vertex set of $g_1(P^m)\cup g_2(P^m)$ is contained in the chain $R^m$ shown in Figure~\ref{fig:c-chain}\,(right). If we are in Case~\ref{pf:c-chain-case1}, \ie, $p_i\in g_1(P^{m})$ and $p_k\in g_2(P^{m})$, then $p_i, p_j, p_k$ can be thought of as vertices of $R^m$. The similarity between $R^m$ and $P^m$, maps points $p_i, p_j, p_k$ to suitable points $p_i', p_j', p_k' \in P^m$ such that \[ \frac{|p_i'p_j'|+|p_j'p_k'|}{|p_i'p_k'|} =\frac{|p_ip_j|+|p_jp_k|}{|p_ip_k|}. \] Since $p_i\in g_1(R^{m}) \cup g_2(R^{m})$ while $p_k\in g_3(R^{m}) \cup g_4(R^{m})$, the triplet $(p_i', p_j', p_k')$ does not belong to Case~\ref{pf:c-chain-case1}. In other words, Case~\ref{pf:c-chain-case1} can be represented by other cases. Recall that in Lemma~\ref{lemma:simple}, we showed that $\conv(P^m)$ is an isosceles triangle $T$ of diameter $1$. Observe that if $|p_ip_k|\geq \frac{1}{c_*+1}$, then \[ \frac{|p_ip_j|+|p_jp_k|}{|p_ip_k|}\leq \frac{1+1}{\frac{1}{c_*+1}}= 2c_*+2=c, \] as required. So we may assume that $|p_ip_k|<\frac{1}{c_*+1}$, therefore only Case~\ref{pf:c-chain-case4} remains, \ie, $p_i\in g_2(P^{m})$ and $p_k\in g_3(P^{m})$. \begin{figure}[htbp!] \centering \begin{tikzpicture}[scale=0.5] \fill[black!25] (2.727, 2.467) -- (5.000, 4.623) -- (7.273, 2.467) --cycle; \path (0,0) pic[scale=0.5] {p4}; \node[below, inner sep=2.65mm]{} (5.455, 0.000); \end{tikzpicture} \hspace*{.1mm} \begin{tikzpicture}[scale=0.5] \fill[black!25] (4.545, 0.000) -- (2.727, 2.467) -- (4.752, 2.056)--cycle; \fill[black!25] (5.000, 4.623) -- (7.273, 2.467) -- (5.455, 0.000) --cycle; \draw[red] (4.752, 2.056) -- (4.793, 2.467) -- (5.207, 2.467); \draw[dashed] (4.545, 0.000) -- node[below]{$\scriptstyle\frac{1}{c_*+1}$} (5.455, 0.000); \path (0,0) pic[scale=0.5] {p4}; \end{tikzpicture} \caption{Left: Chain $P^m$ with its subchain $g_5(P^{m})$ marked by its convex hull; Right: The last case where $p_i$ is in the left shaded subchain and $p_k$ is in the right shaded subchain. }\label{fig:c-chain2} \end{figure} By Lemma~\ref{lemma:technical}\,(\ref{pf:f2}), the ``top'' subchain $g_5(P^m)$ of $P^m$ is also similar to $P^{m-1}$, see Figure~\ref{fig:c-chain2}\,(left). If $p_i$ and $p_k$ are both in $g_5(P^{m})$, \ie, $p_i\in \left(g_3\circ g_2(P^m)\right) \cup \left(g_4\circ g_2(P^m)\right)$ and $p_k\in \left(g_1\circ g_3(P^m)\right) \cup \left(g_2\circ g_3(P^m)\right)$, then so is $p_j$. By the induction hypothesis, we have \[ \frac{|p_ip_j|+|p_jp_k|}{|p_ip_k|}\leq c. \] So we may assume that at least one of $p_i$ and $p_k$ is not in $g_5(P^{m})$. Without loss of generality, let $p_i\in g_2(P^{m}) \setminus g_5(P^{m})$. The similarity that maps $P^{m-1}$ to $g_2(P^{m})$ and $g_5(P^{m})$, respectively, have the same scaling factor of $a=\frac{c_*}{2(c_*+1)}$, and they carry the bottom dashed segment in Figure~\ref{fig:c-chain2}\,(right), to the two red segments. \begin{claim*} If $p_i\in g_2(P^{m}) \setminus g_5(P^{m})$ and $p_k\in g_3(P^{m})$, then $|p_ip_k|>\frac{c_*}{2(c_*+1)^2}$. \end{claim*} \begin{claimproof} As noted above, we assume that $p_i$ is in $\conv(g_2(P^{m}) \setminus g_5(P^{m}))= \Delta q_1q_2q_3$ in Figure~\ref{fig:c-chain-case4}. If $p_k\in g_5(P^m) \cap g_3(P^m)=\Delta q_7q_6q_5$, then the configuration is illustrated in Figure~\ref{fig:c-chain-case4}\,(left). Note that $\Delta q_1q_2q_3$ and $\Delta q_7q_6q_5$ are reflections of each other with respect to the bisector of $\angle q_3q_4q_5$. Hence the shortest distance between $\Delta q_1q_2q_3$ and $\Delta q_7q_6q_5$ is $\min\{|q_3q_5|, |q_2q_6|, |q_1q_7|\}$. Since $c_*\geq 1$, we have \[|q_1q_7|>|q_7q_9|=|q_3q_5|=a^{3/2}=\left(\frac{c_*}{2(c_*+1)}\right)^{3/2}\geq \frac{c_*}{2(c_*+1)^2}.\] Further note that $q_2q_4q_6q_8$ is an isosceles trapezoid, so the length of its diagonal is bounded by $|q_2q_6|>|q_2q_4|=\frac{c_*}{2(c_*+1)^2}$. Therefore the claim holds when $p_k\in\Delta q_7q_6q_5$. Otherwise $p_k\in g_3(P^m) \setminus g_5(P^m)=\Delta q_9q_8q_7$: see Figure~\ref{fig:c-chain-case4}\,(right). Note that $\Delta q_1q_2q_3$ and $\Delta q_9q_8q_7$ are reflections of each other with respect to the bisector of $\angle q_4q_5q_6$. So the shortest distance between the shaded triangles is $\min\{|q_3q_7|, |q_2q_8|, |q_1q_9|\}$. However, all three candidates are strictly larger than $|q_4q_6|=\frac{c_*}{2(c_*+1)^2}$. This completes the proof of the claim. \end{claimproof} \begin{figure}[!ht] \centering \begin{tikzpicture}[scale=0.5] \fill[black!25] (4.545, 0.000) -- (2.727, 2.467) -- (4.752, 2.056)--cycle; \fill[black!25] (5.000, 4.623) -- (5.207, 2.467) -- (7.273, 2.467)--cycle; \draw[red] (4.752, 2.056) -- (4.793, 2.467) -- (5.207, 2.467); \draw (0.000, 0.000) -- (2.066, 0.000) -- (2.273, 2.056) -- (2.479, 0.000) -- (4.545, 0.000)node[circle, fill, inner sep=1pt, label=135:$q_1$]{} -- (4.752, 2.056)node[circle, fill, inner sep=1pt, label=225:$q_2$]{} -- (2.727, 2.467)node[circle, fill, inner sep=1pt, label=135:$q_3$]{} -- (4.793, 2.467)node[circle, fill, inner sep=1pt, label=135:$q_4$]{} -- (5.000, 4.523)node[circle, fill, inner sep=1pt, label=above:$q_5$]{} -- (5.207, 2.467)node[circle, fill, inner sep=1pt, label=45:$q_6$]{} -- (7.273, 2.467)node[circle, fill, inner sep=1pt, label=45:$q_7$]{} -- (5.248, 2.056)node[circle, fill, inner sep=1pt, label=-45:$q_8$]{} -- (5.455, 0.000)node[circle, fill, inner sep=1pt, label=45:$q_9$]{} -- (7.521, 0.000) -- (7.727, 2.056) -- (7.934, 0.000) -- (10.000, 0.000); \end{tikzpicture} \hspace*{.1mm} \begin{tikzpicture}[scale=0.5] \fill[black!25] (4.545, 0.000) -- (2.727, 2.467) -- (4.752, 2.056)--cycle; \fill[black!25] (7.273, 2.467) -- (5.248, 2.056) -- (5.455, 0.000)--cycle; \draw[red] (4.752, 2.056) -- (4.793, 2.467) -- (5.207, 2.467); \draw (0.000, 0.000) -- (2.066, 0.000) -- (2.273, 2.056) -- (2.479, 0.000) -- (4.545, 0.000)node[circle, fill, inner sep=1pt, label=135:$q_1$]{} -- (4.752, 2.056)node[circle, fill, inner sep=1pt, label=225:$q_2$]{} -- (2.727, 2.467)node[circle, fill, inner sep=1pt, label=135:$q_3$]{} -- (4.793, 2.467)node[circle, fill, inner sep=1pt, label=135:$q_4$]{} -- (5.000, 4.523)node[circle, fill, inner sep=1pt, label=above:$q_5$]{} -- (5.207, 2.467)node[circle, fill, inner sep=1pt, label=45:$q_6$]{} -- (7.273, 2.467)node[circle, fill, inner sep=1pt, label=45:$q_7$]{} -- (5.248, 2.056)node[circle, fill, inner sep=1pt, label=-45:$q_8$]{} -- (5.455, 0.000)node[circle, fill, inner sep=1pt, label=45:$q_9$]{} -- (7.521, 0.000) -- (7.727, 2.056) -- (7.934, 0.000) -- (10.000, 0.000); \end{tikzpicture} \caption{$p_i\in\Delta q_1q_2q_3$, Left: $p_k\in\Delta q_7q_6q_5$; Right: $p_k\in \Delta q_9q_8q_7$.}\label{fig:c-chain-case4} \end{figure} Now the diameter of $g_2(P^{m}) \cup g_3(P^{m})$ is $a=\frac{c_*}{2(c_*+1)}$ (note that there are three diameter pairs), so \[ \frac{|p_ip_j|+|p_jp_k|}{|p_ip_k|}<\frac{2\cdot \frac{c_*}{2(c_*+1)}}{\frac{c_*}{2(c_*+1)^2}}= 2c_*+2=c, \] as required. This concludes the proof of Lemma~\ref{lemma:c-chain} and Theorem~\ref{thm:lower-bound}. \end{proof} \section{Algorithm for Recognizing $c$-Chains} \label{sec:algo} In this section, we design a randomized Las Vegas algorithm to recognize $c$-chains. More precisely, given a polygonal chain $P=(p_1,\dots, ,p_n)$, and a parameter $c\geq 1$, the algorithm decides whether $P$ is a $c$-chain, in $O\left(n^{2.5}\ {\rm polylog}\ n\right)$ expected time. By definition, $P=(p_1,\dots, p_n)$ is a $c$-chain if $|p_ip_j| + |p_jp_k|\leq c\ |p_ip_k|$ for all $1\leq i<j<k\leq n$; equivalently, $p_j$ lies in the ellipse of major axis $c$ with foci $p_i$ and $p_k$. Consequently, it suffices to test, for every pair $1\leq i<k\leq n$, whether the ellipse of major axis $c|p_ip_k|$ with foci $p_i$ and $p_k$ contains $p_j$, for all $j$, $i<j<k$. For this, we can apply recent results from geometric range searching. \begin{theorem}\label{thm:alg} There is a randomized algorithm that can decide, for a polygonal chain $P=(p_1,\dots , p_n)$ in $\RR^2$ and a threshold $c>1$, whether $P$ is a $c$-chain in $O\left(n^{2.5}\ {\rm polylog}\ n\right)$ expected time and $O(n\log n)$ space. \end{theorem} Agarwal, Matou\v{s}ek and Sharir~\cite[Theorem~1.4]{AMS13} constructed, for a set $S$ of $n$ points in $\RR^2$, a data structure that can answer ellipse range searching queries: it reports the number of points in $S$ that are contained in a query ellipse. In particular, they showed that, for every $\eps>0$, there is a constant $B$ and a data structure with $O(n)$ space, $O\left(n^{1+\eps}\right)$ expected preprocessing time, and $O\left(n^{1/2}\log^B n\right)$ query time. The construction was later simplified by Matou\v{s}ek and Pat\'akov\'a~\cite{MP15}. Using this data structure, we can quickly decide whether a given polygonal chain is a $c$-chain. \begin{proof}[Proof of Theorem~\ref{thm:alg}.] Subdivide the polygonal chain $P=(p_1,\dots , p_n)$ into two subchains of equal or almost equal sizes, $P_1=(p_1,\dots, p_{\lceil n/2\rceil})$ and $P_2=(p_{\lceil n/2\rceil},\dots, p_n)$; and recursively subdivide $P_1$ and $P_2$ until reaching 1-vertex chains. Denote by $T$ the recursion tree. Then, $T$ is a binary tree of depth $\lceil \log n\rceil$. There are at most $2^i$ nodes at level $i$; the nodes at level $i$ correspond to edge-disjoint subchains of $P$, each of which has at most $n/2^i$ edges. Let $W_i$ be the set of subchains on level $i$ of $T$; and let $W=\bigcup_{i\geq 0}W_i$. We have $|W|\leq 2n$. For each polygonal chain $Q\in W$, construct an ellipse range searching data structure $\DS(Q)$ described above~\cite{AMS13} for the vertices of $Q$, with a suitable parameter $\eps>0$. Their overall expected preprocessing time is \[ \sum_{i=0}^{\lceil \log n\rceil} 2^i\cdot O\left( \left(\frac{n}{2^i}\right)^{1+\eps} \right) =O\left(n^{1+\eps}\sum_{i=0}^{\lceil \log n\rceil} \left(\frac{1}{2^i}\right)^{\eps}\right) =O\left(n^{1+\eps}\right), \] their space requirement is $\sum_{i=0}^{\lceil \log n\rceil} 2^i\cdot O\left(n/2^i\right)=O(n\log n)$, and their query time at level $i$ is $O\left(\left(n/2^i\right)^{1/2}\ {\rm polylog}\ \left(n/2^i\right)\right) = O\left(n^{1/2}\ {\rm polylog}\ n\right)$. For each pair of indices $1\leq i<k\leq n$, we do the following. Let $E_{i,k}$ denote the ellipse of major axis $c|p_ip_k|$ with foci $p_i$ and $p_k$. The chain $(p_{i+1},\dots , p_{k-1})$ is subdivided into $O(\log n)$ maximal subchains in $W$, using at most two subchains from each set $W_i$, $i=0,\dots ,\lceil \log n\rceil$. For each of these subchains $Q\in W$, query the data structure $\DS(Q)$ with the ellipse $E_{i,k}$. If all queries are positive (\ie, the count returned is $|Q|$ in \emph{all} queries), then $P$ is a $c$-chain; otherwise there exists $j$, $i<j<k$, such that $p_j\notin E_{i,k}$, hence $|p_ip_j|+|p_jp_k|>c|p_ip_k|$, witnessing that $P$ is not a $c$-chain. The query time over all pairs $1\leq i<k\leq n$ is bounded above by \begin{align*} \binom{n}{2} \sum_{i=0}^{2\lceil \log n\rceil} O\left(\left(n/2^i\right)^{1/2}\ {\rm polylog}\ \left(n/2^i\right)\right) &= \binom{n}{2}\cdot O\left(n^{1/2}\ {\rm polylog}\ n\right)\\ &=O\left(n^{2.5}\ {\rm polylog}\ n\right). \end{align*} This subsumes the expected time needed for constructing the structures $\DS(Q)$, for all $Q\in W$. So the overall running time of the algorithm is $O\left(n^{2.5}\ {\rm polylog}\ n\right)$, as claimed. \end{proof} In the decision algorithm above, only the construction of the data structures $\DS(Q)$, $Q\in W$, uses randomization, which is independent of the value of $c$. The parameter $c$ is used for defining the ellipses $E_{i,k}$, and the queries to the data structures; this part is deterministic. Hence, we can find the optimal value of $c$ by Meggido's parametric search~\cite{Meg83} in the second part of the algorithm. Meggido's technique reduces an optimization problem to a corresponding decision problem at a polylogarithmic factor increase in the running time. An optimization problem is amenable to this technique if the following three conditions are met~\cite{Salowe04}: (1) the objective function is monotone in the given parameter; (2) the decision problem can be solved by evaluating bounded-degree polynomials, and (3) the decision problem admits an efficient parallel algorithm (with polylogarithmic running time using polynomial number of processors). All three conditions hold in our case: The area of each ellipse with foci in $S$ monotonically increases with $c$; the data structure of~\cite{MP15} answers ellipse range counting queries by evaluating polynomials of bounded degree; and the $\binom{n}{2}$ queries can be performed in parallel. Alternatively, Chan's randomized optimization technique~\cite{Chan99} is also applicable. Both techniques yield the following result. \begin{corollary} \label{cor:alg} There is a randomized algorithm that can find, for a polygonal chain $P=(p_1,\dots , p_n)$ in $\RR^2$, the minimum $c\geq 1$ for which $P$ is a $c$-chain in $O\left(n^{2.5}\ {\rm polylog}\ n\right)$ expected time and $O(n\log n)$ space. \end{corollary} We remark that, for $c=1$, the test takes $O(n)$ time: it suffices to check whether points $p_3,\dots, p_n$ lie on the line spanned by $p_1p_2$, in that order. \section{Concluding Remarks} \label{sec:con} We end with some final observations and pointers for further research. \begin{enumerate} \itemsep 1pt \item For $k\geq 1$, let $P^k_* = g_2(P^k)\cup g_3(P^k)$, see Figure~\ref{fig:refined-chain}\,(right). It is easy to see that $P^k_*$ is a $c$-chain with $n=4^k/2+1$ vertices and has stretch factor $\sqrt{c(c-2)/8}(n-1)^{\frac{1+\log(c-2)-\log c}{2}}$. Since $\sqrt{c(c-2)/8}\geq 1$ for $c\geq 4$, this improves the result of Theorem~\ref{thm:lower-bound} by a constant factor. Since this construction does not improve the exponent, and the analysis would be longer (requiring a case analysis without new insights), we omit the details. \begin{figure}[htbp!] \centering \begin{tikzpicture} \path (0,0) pic[scale=0.75] {p4}; \end{tikzpicture} \hspace*{.1mm} \begin{tikzpicture}[scale=0.75] \draw (4.545, 0.000) -- (4.588, 0.425) -- (4.170, 0.510) -- (4.597, 0.510) -- (4.639, 0.934) -- (4.221, 1.019) -- (4.095, 0.612) -- (4.137, 1.036) -- (3.719, 1.121) -- (4.146, 1.121) -- (4.189, 1.546) -- (4.231, 1.121) -- (4.658, 1.121) -- (4.701, 1.546) -- (4.282, 1.631) -- (4.709, 1.631) -- (4.752, 2.056) -- (4.334, 2.141) -- (4.207, 1.733) -- (4.250, 2.158) -- (3.832, 2.243) -- (3.705, 1.835) -- (4.098, 1.668) -- (3.680, 1.753) -- (3.554, 1.346) -- (3.596, 1.770) -- (3.178, 1.855) -- (3.605, 1.855) -- (3.648, 2.280) -- (3.229, 2.365) -- (3.103, 1.957) -- (3.146, 2.382) -- (2.727, 2.467) -- (3.154, 2.467) -- (3.197, 2.892) -- (3.240, 2.467) -- (3.666, 2.467) -- (3.709, 2.892) -- (3.291, 2.977) -- (3.718, 2.977) -- (3.760, 3.401) -- (3.803, 2.977) -- (4.230, 2.977) -- (3.812, 2.892) -- (3.854, 2.467) -- (4.281, 2.467) -- (4.324, 2.892) -- (4.367, 2.467) -- (4.793, 2.467) -- (4.836, 2.892) -- (4.418, 2.977) -- (4.845, 2.977) -- (4.887, 3.401) -- (4.469, 3.486) -- (4.343, 3.079) -- (4.385, 3.503) -- (3.967, 3.588) -- (4.394, 3.588) -- (4.437, 4.013) -- (4.479, 3.588) -- (4.906, 3.588) -- (4.949, 4.013) -- (4.530, 4.098) -- (4.957, 4.098) -- (5.000, 4.523) -- (5.043, 4.098) -- (5.470, 4.098) -- (5.051, 4.013) -- (5.094, 3.588) -- (5.521, 3.588) -- (5.563, 4.013) -- (5.606, 3.588) -- (6.033, 3.588) -- (5.615, 3.503) -- (5.657, 3.079) -- (5.531, 3.486) -- (5.113, 3.401) -- (5.155, 2.977) -- (5.582, 2.977) -- (5.164, 2.892) -- (5.207, 2.467) -- (5.633, 2.467) -- (5.676, 2.892) -- (5.719, 2.467) -- (6.146, 2.467) -- (6.188, 2.892) -- (5.770, 2.977) -- (6.197, 2.977) -- (6.240, 3.401) -- (6.282, 2.977) -- (6.709, 2.977) -- (6.291, 2.892) -- (6.334, 2.467) -- (6.760, 2.467) -- (6.803, 2.892) -- (6.846, 2.467) -- (7.273, 2.467) -- (6.854, 2.382) -- (6.897, 1.957) -- (6.771, 2.365) -- (6.352, 2.280) -- (6.395, 1.855) -- (6.822, 1.855) -- (6.404, 1.770) -- (6.446, 1.346) -- (6.320, 1.753) -- (5.902, 1.668) -- (6.295, 1.835) -- (6.168, 2.243) -- (5.750, 2.158) -- (5.793, 1.733) -- (5.666, 2.141) -- (5.248, 2.056) -- (5.291, 1.631) -- (5.718, 1.631) -- (5.299, 1.546) -- (5.342, 1.121) -- (5.769, 1.121) -- (5.811, 1.546) -- (5.854, 1.121) -- (6.281, 1.121) -- (5.863, 1.036) -- (5.905, 0.612) -- (5.779, 1.019) -- (5.361, 0.934) -- (5.403, 0.510) -- (5.830, 0.510) -- (5.412, 0.425) -- (5.455, 0.000); \end{tikzpicture} \caption{The chains $P^4$ (left) and $P^4_*$ (right).}\label{fig:refined-chain} \end{figure} \item If $c$ is used instead of $c_*=(c-2)/2$ in the lower bound construction, then the condition $c\geq 4$ in Theorem~\ref{thm:lower-bound} can be replaced by $c\geq 1$, and the bound can be improved from $(n-1)^{\frac{1+\log(c-2)-\log c}{2}}$ to $(n-1)^{\frac{1+\log c-\log(c+1)}{2}}$. However, we were unable to prove that the resulting $P^k$'s, $k\in\NN$, are $c$-chains, although a computer program has verified that the first few generations of them are indeed $c$-chains. \item The volume argument in Theorem~\ref{thm:1/2} easily generalizes to higher dimensions. If $P$ be a $c$-chain in $\RR^d$ for fixed $c\geq 1$ and $d\geq 2$, then $\delta_P=O\left(c^2(n-1)^{1-1/d}\right)$. It is interesting to find out whether extra dimension(s) allows one to achieve a larger stretch factor. \item The upper bounds in Theorem~\ref{thm:log{c}}--\ref{thm:1/2} are valid regardless of whether the chain is crossing or not. On the other hand, the lower bound in Theorem~\ref{thm:lower-bound} is given by noncrossing chains. A natural question is whether a sharper upper bound holds if the chains are required to be noncrossing. More specifically, can the exponent of $n$ in the upper bound be reduced to $1/2-\eps$, where $\eps>0$ depends on $c$? \item Our algorithm in Section~\ref{sec:algo} can recognize $c$-chains with $n$ vertices in $O\left(n^{2.5}\ {\rm polylog}\ n\right)$ expected time and $O(n\log n)$ space, using ellipse range searching data structures. It is likely that the running time can be improved in the future, perhaps at the expense of increased space, when suitable time-space trade-offs for semi-algebraic range searching become available. The existence of such data structures is conjectured~\cite{AMS13}, but currently remains open. \end{enumerate} \bibliographystyle{plainurl
\section{Introduction}\label{sec:introduction} In a fundamental theory of quantum gravity, the thermodynamic properties of black holes should emerge from a microscopic statistical description. A major achievement of string theory has been to provide precisely the microstates accounting for the entropy of certain classes of supersymmetric black holes \cite{Strominger:1996sh}. While most of the original work focused on asymptotically flat black holes, in the last few years there has been a lot of progress on black holes in Anti de Sitter (AdS) space and their holographic dual conformal field theories (CFT's), starting with \cite{Benini:2015eyy,Benini:2016rke} (see \cite{Zaffaroni:2019dhb} for a review and a comprehensive list of references). In this paper we will be interested in supersymmetric, asymptotically AdS black holes with non-trivial rotation, where very recent progress has been made in \cite{Cabo-Bizet:2018ehj,Choi:2018hmj,Benini:2018ywd,Honda:2019cio,ArabiArdehali:2019tdm,Choi:2019miv,Kim:2019yrz,Cabo-Bizet:2019osg,Amariti:2019mgp}. The main reason for considering asymptotically AdS spacetimes is that quantum gravity in such spaces can be understood in terms of a dual CFT via the AdS/CFT correspondence, and this makes it in principle possible to provide a complete characterization of the black hole microstates.\footnote{For extremal black holes (irrespective of asymptotics) one can also isolate an AdS$_2$ region by zooming in on the near horizon. Then one can use the AdS$_2$/CFT$_1$ correspondence to formulate the entropy problem at the full quantum level, following Sen's approach~\cite{Sen:2008yk}. However the relevant CFT$_1$ is not known in general. We will comment on the relation of our asymptotically AdS analysis with Sen's approach later on in this section.} Conversely, studying black hole solutions to string theory teaches us about the statistical behavior of interesting ensembles of states in holographic CFT's. For both sides of the correspondence to be under good control, one typically demands some supersymmetry to be preserved. A general feature that has been identified in the last few years is that the Bekenstein-Hawking entropy of BPS black holes in AdS arises from an {\it extremization principle} \cite{Benini:2015eyy,Benini:2016rke,Hosseini:2017mds,Hosseini:2018dob,Choi:2018fdc}. The entropy is indeed the Legendre transform of a rather simple, homogeneous {\it entropy function} of rotational and electric chemical potentials $\omega^i,\varphi^I$, subject to a linear, complex constraint that schematically reads \begin{equation}\label{constraint_intro} \sum_i \omega^i - \sum_I \varphi^I = 2\,\pi\, i\ . \end{equation} Since field theory partition functions are more directly computed as a function of chemical potentials (that is background fields) rather than charges (that is expectation values), it is convenient to recast the problem of the black hole entropy into the one of computing the corresponding entropy function. Of course, this is just a change of statistical ensemble. It is thus interesting to ask what is the physical interpretation of the entropy function, both on the gravity and the field theory side of the holographic correspondence. In the case of rotating black holes, the question is subtle because the saddle point values of both the rotational and electric chemical potentials turn out to be complex, as enforced by the constraint \eqref{constraint_intro}. Although this may not be surprising if one recalls that rotating spacetimes are related to complex saddles of the gravitational path integral \cite{Gibbons:1976ue,Brown:1990fk}, it is not obvious how to read the chemical potentials in \eqref{constraint_intro} from the black hole solution. These issues were solved in \cite{Cabo-Bizet:2018ehj}, where it was found that the entropy function for a class of rotating BPS black holes in AdS$_5$ is the supergravity on-shell action after taking a specific BPS limit, that goes along a supersymmetric trajectory in the space of complexified solutions. Further, the constraint \eqref{constraint_intro} was interpreted as a regularity condition for the Killing spinor of the supersymmetric solution, which is anti-periodic when going around the compactified Euclidean time in the smooth cigar-like geometry.\footnote{The entropy function of non-rotating BPS black holes has been related to the supergravity on-shell action in \cite{Halmagyi:2017hmw,Azzurli:2017kxo,Cabo-Bizet:2017xdr} for AdS$_4$ black holes and in \cite{Suh:2018qyv} for AdS$_6$ black holes.} In this paper, we extend the analysis of \cite{Cabo-Bizet:2018ehj} to other classes of rotating, asymptotically AdS black holes in different dimensions. While the five-dimensional black hole discussed in \cite{Cabo-Bizet:2018ehj} carries two angular momenta and one electric charge (dual to the R-charge of generic four-dimensional $\mathcal{N}=1$ superconformal field theories), here we discuss the case with one angular momentum and multiple electric charges. We also analyze four-, six- and seven-dimensional black holes. The solutions we consider were presented in \cite{Cvetic:2005zi,Chow:2008ip}. In addition to the Bekenstein-Hawking entropy $S$, these carry macroscopic energy $E$, angular momenta $J_i$ and electric charges $Q_I$ (with some of the possible angular momenta or electric charges being set equal in the explicit solutions of \cite{Cvetic:2005zi,Chow:2008ip}). Conjugate to the charges $E,J_i,Q_I$ one has the chemical potentials $\beta,\Omega^i,\Phi^I$, where $\beta$ is the inverse Hawking temperature, $\Omega^i$ are the angular velocities and $\Phi^I$ are the electrostatic potentials of the black hole. The corresponding expressions can be read off from the solution by standard methods \cite{Cvetic:2005zi}. In five and four dimensions, we explicitly evaluate the Euclidean action $I$ of the finite-temperature, non-supersymmetric solution using holographic renormalization, and verify that it satisfies the {\it quantum statistical relation} \begin{equation}\label{QSR_nonsusy} I = \beta E - S - \beta\,\Omega^i J_i - \beta\,\Phi^I Q_I \, . \end{equation} This well-known relation, first proposed for quantum gravity in \cite{Gibbons:1976ue} (see e.g.~\cite{Papadimitriou:2005ii} for a discussion in relation with holography) is expected to hold in full generality, and we assume that it is also satisfied in six and seven dimensions. The quantum statistical relation makes it manifest that the on-shell action has an interpretation as a thermodynamic potential. From a microscopic point of view, the latter corresponds to minus the logarithm of the grand-canonical partition function, while the entropy is the logarithm of the microcanonical partition function. Starting from the non-supersymmetric and non-extremal solution, we want to reach the BPS locus in parameter space, namely the solution that is both supersymmetric and extremal. Motivated by the fact that in the dual field theory one is mostly interested in studying a supersymmetric ensemble of states, we adopt the strategy of~\cite{Cabo-Bizet:2018ehj} and first impose supersymmetry, namely that the supergravity Killing spinor equations are solved. This amounts to precisely one condition on the parameters of the original solution, and it is important to remark that it does not automatically imply vanishing of the temperature.\footnote{For this reason, throughout the paper we will carefully distinguish between supersymmetry and extremality. A quantity evaluated after imposing both supersymmetry and extremality will be called ``BPS'' and denoted by the symbol $\star$ in the formulae. For instance, $S^\star$ is the BPS entropy. } In Lorentzian signature, this supersymmetric solution has causal pathologies unless one also sends the temperature to zero \cite{Cvetic:2005zi}. However, here we are interested in semi-classical saddle points of the Euclidean path integral, and thus allow for more general solutions by complexifying (one of) the remaining parameters. Further, building on ideas of~\cite{Silva:2006xv}, we introduce the variables \begin{equation}\label{smallpots_from_bogpots} \omega^i = \beta\left(\Omega^i-\Omega^{i\,\star}\right)\,,\qquad \varphi^I = \beta\,(\Phi^I - \Phi^{I\star})\,, \end{equation} where $\Omega^{i\,\star}$ and $\Phi^{I\,\star}$ are the (frozen) values taken by $\Omega^i$ and $\Phi^I$ in the BPS solution. The variables \eqref{smallpots_from_bogpots} are the chemical potentials conjugate to the angular momentum and electric charges when one identifies the generator of ``time'' translations with the conserved quantity $ \{\mathcal{Q},\overline{\mathcal{Q}}\}$, where $\mathcal{Q}$ is the supercharge.\footnote{In odd dimensions, there are some subtleties with the regularization of a priori divergent quantities that we will address in Section~\ref{5d_section}.} The asymptotic analysis of the supergravity solution defines the dual superconformal field theory (SCFT) partition function, $Z$. From the previous considerations, one infers the following Hamiltonian representation: \begin{equation}\label{SCFT_Z} Z = {\rm Tr}\big[{\rm e}^{-\beta\{\mathcal{Q},\overline{\mathcal{Q}}\} +\omega^iJ_i + \varphi^I Q_I} \big]\,, \end{equation} where there is no $(-1)^F$ due to anti-periodicity of the supercharge. It was shown in~\cite{Cabo-Bizet:2018ehj} that upon using \eqref{constraint_intro}, $Z$ is proportional to the superconformal index \cite{Romelsberger:2005eg,Kinney:2005ej}. Note that we have an identification between the SCFT chemical potentials appearing in \eqref{SCFT_Z} and the black hole variables \eqref{smallpots_from_bogpots}. For each of the cases that we analyze, we verify that after imposing supersymmetry the variables \eqref{smallpots_from_bogpots} satisfy a linear relation of the type \eqref{constraint_intro}, and are otherwise free. Moreover, the supersymmetric on-shell action $I$ takes the form of a simple function of these variables, that precisely matches the entropy functions proposed in \cite{Hosseini:2017mds,Hosseini:2018dob,Choi:2018fdc}. The supersymmetric form of the quantum statistical relation \eqref{QSR_nonsusy} is \begin{equation} I = - S - \omega^i J_i - \varphi^I \, Q_I \, , \end{equation} and the first law of thermodynamics in the supersymmetric ensemble reads \begin{equation} \mathrm{d} S + \omega^i\, \mathrm{d} J_i + \varphi^I \, \mathrm{d} Q_I = 0\,. \end{equation} The Legendre transform of $I$ (subject to the constraint \eqref{constraint_intro}) is in general a complex quantity, so it cannot be immediately identified with the entropy of the Lorentzian solution. However, demanding reality of the Legendre transform, which amounts to a specific condition on the charges, one finds precisely the Bekenstein-Hawking entropy of the supersymmetric {\it and extremal} black hole~\cite{Cabo-Bizet:2018ehj,Choi:2018hmj}. The saddle point values of the chemical potentials remain complex and match the ones that we obtain from the solution by taking the zero-temperature limit of \eqref{smallpots_from_bogpots}. We thus conclude that the BPS limit of black hole thermodynamics described above gives a derivation of the proposed entropy functions and the related extremization principles, based on black hole thermodynamics and semiclassical Euclidean quantum gravity. This extends the results of \cite{Cabo-Bizet:2018ehj} and shows that the procedure presented there has general validity. It is important to emphasize that the on-shell action entering in the quantum statistical relation is first defined in a regular Euclidean solution where the Wick-rotated time has been compactified and the metric is positive-definite. After the on-shell action has been computed in this way, one can extend its value to a complexified solution by analytic continuation~\cite{Gibbons:1976ue}. As it should be clear from the discussion above, we find that this complexification is crucial for the on-shell action to eventually match the proposed entropy functions. We observe that for the same solutions of \cite{Cvetic:2005zi,Chow:2008ip} studied in this paper, the BPS limit of the quantum statistical relation was also considered in \cite{Choi:2018hmj,Choi:2018fdc}. However our limit is different precisely because it reaches the physical BPS black hole through a complexified family of solutions, specified by supersymmetry. The limit taken in \cite{Choi:2018hmj,Choi:2018fdc} appears similar to the one originally discussed in \cite{Silva:2006xv}, in that it yields real chemical potentials that satisfy just the real part of \eqref{constraint_intro}. Correspondingly, the on-shell action in this limit does not match the entropy functions proposed in \cite{Hosseini:2017mds,Hosseini:2018dob,Choi:2018fdc}. A related comment concerns the connection of our approach with Sen's entropy function formalism, which is based on a near-horizon analysis of extremal black holes (regardless of supersymmetry) \cite{Sen:2007qy,Sen:2008yk}. Sen's formalism leads to real chemical potentials and a real entropy function. Correspondingly, it was shown in~\cite{Dias:2007dj} that this is matched by an extremal limit of black hole thermodynamics where all quantities remain real. As discussed in~\cite[Sect.$\:$3.3]{Cabo-Bizet:2018ehj}, there is in fact a continuous family of extremal limits of black hole thermodynamics, all leading to a meaningful entropy function and an associated constraint between chemical potentials. However only the manifestly supersymmetric limit discussed above leads to the entropy functions proposed in \cite{Hosseini:2017mds,Hosseini:2018dob,Choi:2018fdc}. It would be interesting to investigate further the relation between this supersymmetric limit and Sen's near-horizon approach. The rest of the paper is organized as follows. We start in Section~\ref{5d_section} by studying the five-dimensional solutions and making contact with the results of \cite{Cabo-Bizet:2018ehj}. We continue in Section \ref{4d_section} by analyzing the four-dimensional solutions, while in Section~\ref{6d_section} we turn to six dimensions and in Section~\ref{7d_section} we move to seven dimensions. In each case we start with a brief review of the finite-temperature, non-supersymmetric solution, and then discuss our BPS limit. We conclude in Section~\ref{sec:conclusions}. Appendix~\ref{app:OnShActionsAdS5} and Appendix~\ref{app:OnShActionsAdS4} contain the details on the computation of the on-shell action in five and four dimensions, respectively, while Appendix \ref{app:Leg_transf} describes the Legendre transformation reproducing the Bekenstein-Hawking entropy of the general BPS black hole solutions to five-dimensional Fayet-Iliopoulos gauged supergravity constructed in \cite{Gutowski:2004yv,Kunduri:2006ek}. \section{Rotating AdS$_5$ black holes with multiple electric charges}\label{5d_section} In this section we study the BPS limit of AdS$_5$ black hole thermodynamics. In \cite{Cabo-Bizet:2018ehj} a new BPS limiting procedure was defined and applied to the solution of \cite{Chong:2005hr}, which has two independent angular momenta and ---being constructed within five-dimensional minimal gauged supergravity--- just one electric charge. Here we discuss a different setup, including multiple electric charges. We will focus on solutions to ${\rm U}(1)^3$ Fayet-Iliopoulos gauged supergravity, that is $\mathcal{N}=2$ supergravity coupled to two vector multiplets and with a ${\rm U}(1)$ gauging of the R-symmetry. This theory uplifts to type IIB supergravity on $S^5$, hence the dual SCFT is $\mathcal{N}=4$ SYM or an orbifold thereof. The most general set of black hole conserved charges in the theory is given by the energy, three electric charges and two angular momenta. When imposing supersymmetry and extremality these satisfy two relations, hence the BPS solution carries four independent conserved charges \cite{Kunduri:2006ek}. Here we will discuss a solution where the two angular momenta are set equal while the three electric charges are independent, originally found in \cite{Cvetic:2004ny} and further discussed in \cite{Cvetic:2005zi}. This solution contains the three-parameter BPS black hole of \cite{Gutowski:2004yv}.\footnote{The solution where all the conserved charges are independent was given in \cite{Wu:2011gq}. Solutions with restricted set of independent charges were also found in \cite{Chong:2005da,Chong:2006zx,Mei:2007bn}.} We first check the finite-temperature quantum statistical relation by explicitly computing the Euclidean on-shell action using holographic renormalization. Then we impose supersymmetry and obtain complex chemical potentials satisfying the constraint \eqref{constraint_intro} (with one rotational chemical potential $\omega$). We further find that the supersymmetric on-shell action reproduces the entropy function. Then we show that these properties are preserved in the BPS limit. \subsection{The non-supersymmetric finite-temperature solution}\label{sec:nonsusy_5d_sol} We start by briefly reviewing the non-supersymmetric, finite temperature solution of \cite{Cvetic:2004ny}, mostly following the presentation of \cite{Cvetic:2005zi}. The five-dimensional action is\footnote{In this paper we set to 1 the Newton constant $G$.} \begin{align} \mathcal{S} = \frac{1}{16\pi}\int &\Big[\Big(R + 4 g^2 \sum^3_{I=1} \left(X^I \right)^{-1} - \frac{1}{2} \partial \vec{\phi}^{\,2} \Big)\star1 - \frac{1}{2} \sum_{I=1}^3 \left(X^I\right)^{-2} F^I \wedge \star F^I \nonumber\\[1mm] & \ - \frac{1}{6}\, |\epsilon_{IJK}| \, A^I \wedge F^J \wedge F^K \Big] \,, \label{CGLP_Lagrangian} \end{align} where $A^I$, $I=1,2,3,$ are Abelian gauge fields, with field strength $F^I =\mathrm{d} A^I$, while $\vec{\phi} = \left(\phi_1, \phi_2 \right)$ are real scalar fields and \begin{equation} X^1 = {\rm e}^{- \frac{1}{\sqrt{6}} \phi_1 - \frac{1}{\sqrt{2}} \phi_2} , \qquad X^2 = {\rm e}^{- \frac{1}{\sqrt{6}} \phi_1 + \frac{1}{\sqrt{2}} \phi_2} , \qquad X^3 = {\rm e}^{\frac{2}{\sqrt{6}} \, \phi_1}\,. \end{equation} This theory is a consistent truncation of type IIB supergravity on $S^5$, where the $A^I$ arise as Kaluza-Klein vector fields gauging the ${\rm U}(1)^3\subset{\rm SO}(6)$ isometries of $S^5$ \cite{Cvetic:1999xp}. It is also a consistent truncation of five-dimensional maximal ${\rm SO}(6)$ supergravity. We describe how it fits in the framework of Fayet-Iliopoulos gauged $\mathcal{N}=2$ supergravity in Appendix~\ref{app:OnShActionsAdS5}. The solution is expressed in terms of coordinates $(t,r,\theta,\phi,\psi)$ and uses the following left-invariant 1-forms on a three-sphere $S^3$ parameterized by $(\theta,\phi,\psi)$: \begin{align} \label{Sigma_1_forms} \sigma_1+ i\, \sigma_2 &= {\rm e}^{-i\psi}(\mathrm{d} \theta +i \sin\theta\,\mathrm{d}\phi) \, ,\notag \\ \sigma_3 &= \mathrm{d} \psi + \cos \theta \, \mathrm{d} \phi \, . \end{align} These will make ${\rm SU}(2) \times {\rm U}(1)$ symmetry manifest. The metric, scalar fields and gauge fields read: \begin{align} \label{Metric_CLP} \mathrm{d} s^2_5 &= \left(H_1 H_2 H_3 \right)^{1/3} \!\left[ - \frac{ r^2 \,Y }{f_1} \mathrm{d} t^2 + \frac{r^4 }{Y} \mathrm{d} r^2 + \frac{r^2}{4} \big(\sigma^2_1 + \sigma^2_2 \big) + \frac{f_1}{4 r^4 H_1 H_2 H_3 } \Big(\sigma_3 - \frac{2f_2}{f_1} \mathrm{d} t \Big)^2 \right]\! , \\ X^I &= \frac{ \left(H_1 H_2 H_3 \right)^{1/3}} {H_I} \, ,\label{Scalar_form} \\[1mm] A^I &= A^I_t \, \mathrm{d} t + A^I_\psi \, \sigma_3 \, ,\label{Gauge_Fields} \end{align} where \begin{equation} A^I_t = \frac{2 \, m}{r^2 \, H_I} \, s_I \, c_I + \alpha^I \, ,\label{time_component_A}\ \qquad A^I_\psi = \frac{m \, a}{r^2 \, H_I} \, \left(c_I \, s_J \, s_K - s_I \, c_J \, c_K \right) \, , \end{equation} and the indices $I,J,K$ in $A^I_\psi$ are never equal. Here we introduced the following functions of the radial coordinate $r$: \begin{align}\label{functions_5d} & H_I = 1 + \frac{2 \, m \, s_I^2}{r^2} \, ,\notag \\[1mm] & f_1 = r^6H_1 H_2 H_3 + 2\, m \, a^2 r^2 + 4 \, m^2 a^2 \left[ 2 \left(c_1 c_2 c_3 - s_1 s_2 s_3 \right) s_1 s_2 s_3 - s_1^2 s_2^2 - s_2^2 s_3^2 - s_3^2s_1^2 \right] , \notag \\[1mm] & f_2 = 2 \, m \, a \left(c_1 c_2 c_3 - s_1 s_2 s_3 \right) \, r^2 + 4 \, m^2 a \, s_1 s_2 s_3 \, , \notag \\[1mm] & f_3 = 2 \, m \, a^2 (1+ g^2 r^2) + 4 \, g^2 m^2 a^2 \left[ 2 (c_1 c_2 c_3 - s_1 s_2 s_3 ) s_1 s_2 s_3 - s_1^2 s_2^2 - s_2^2 s_3^2 - s_3^2 s_1^2 \right] , \notag \\[1mm] & Y = f_3 + g^2 r^6 H_1 H_2 H_3 + r^4 - 2 \, m \, r^2 \, , \end{align} and $s_I$, $c_I$ are shorthand notations for: \begin{equation} s_I = \sinh{\delta_I} \, , \qquad c_I = \cosh{\delta_I} \, , \qquad I = 1,2,3 \, . \end{equation} The solution depends on the five parameters $m , \, \delta_1 , \, \delta_2 , \, \delta_3 , \, a$. In the temporal component of the gauge fields we also introduced a constant gauge choice $\alpha^I$, that will be fixed soon. The five parameters should satisfy suitable inequalities, so that the spatial components of the metric are positive for $r>r_+$, where $r_+$ denotes the position of the outer horizon, given by the largest positive root of $Y(r)$. This is a Killing horizon since the Killing vector \begin{equation} \label{Killing_Vector} V = \frac{\partial}{\partial t} + 2 \,\frac{ f_2 (r_+)}{f_1 (r_+)} \, \frac{\partial}{\partial \psi} \, \end{equation} is null at $r=r_+$. To the outer event horizon we can associate the quantities: \begin{align} \label{Entropy_Temperature_Potentials} & S = \frac{\pi^2 }{2} \, \sqrt{f_1 (r_+)} \, , \qquad\, \beta = 4 \, \pi \, r_+ \sqrt{f_1 (r_+)} \left( \frac{\mathrm{d} Y}{\mathrm{d} r} (r_+)\right)^{-1}\, , \notag \\ &\Omega = 2 \,\frac{ f_2 (r_+ ) }{f_1 (r_+ )} \,,\quad \qquad \Phi^I = \frac{2 \, m}{r_+^2 \, H_I(r_+)} \left( s_I \, c_I + \tfrac{1}{2} \, a \, \Omega \left(c_I \, s_J \, s_K - s_I \, c_J \, c_K \right) \right)\,, \end{align} where $S$ is the Bekenstein-Hawking entropy computed as $\frac{1}{4}$ the area of the horizon, $\beta = T^{-1}=\frac{2\pi}{\kappa}$ is the inverse Hawking temperature obtained from the surface gravity $\kappa$, $\Omega$ is the angular velocity relative to a non-rotating frame at infinity as read off from the Killing vector $V$, and $\Phi^I$ are the electrostatic potentials,\footnote{We corrected a minus sign typo in the expression for $\Phi^I$ given in eq.~(3.10) of~\cite{Cvetic:2005zi}, see also~\cite{Choi:2018hmj}.} defined as \begin{equation} \Phi^I=\iota_V A^I|_{r_+} - \iota_V A^I|_\infty\,. \end{equation} Corresponding to the five parameters there are five independent conserved charges. These are the energy $E$ for translations along $\frac{\partial}{\partial t}$, the angular momentum $J$ for rotations along $-\frac{\partial}{\partial\psi}$, and three electric charges $Q_I$. Their values are: \begin{align} \label{nonextremal_charges} E &= E_0 + \frac{1}{4} \, m \, \pi \left(3 + a^2 g^2 + 2 \, s_1^2 + 2 \, s_2^2 + 2 \, s_3^2 \right) \,,\nonumber \\[1mm] J &= \frac{1}{2} \, m \, a \, \pi \, \left(c_1 \, c_2 \, c_3 - s_1 \, s_2 \, s_3 \right) \, ,\nonumber \\[1mm] Q_I &= \frac{1}{2} \, m \, \pi \, s_I \, c_I \, . \end{align} In \cite{Cvetic:2005zi}, the electric charges and the angular momentum above were computed using the boundary integrals\footnote{In the formula for the electric charge, we omitted the contribution from the Chern-Simons term in the action, since this vanishes in the solution of interest (because $F^I\to0$ as $r\to\infty$). This implies that a priori different definitions of the electric charge such as the Maxwell charge, the Page charge, and the charge that arises from integrating the holographic current, actually coincide in the present background. } \begin{align} Q_I &= - \frac{1}{16 \pi} \int_{S^3_{\rm bdry}} { \left(X^I \right)^{-2} \star F^I } \, ,\nonumber\\[1mm] J &= \frac{1}{16 \pi} \int_{S^3_{\rm bdry}} \star\, \mathrm{d} \left(g_{\psi \mu} \mathrm{d} x^\mu\right) \ ,\label{QMaxwell_JKomar} \end{align} while the energy $E$ was obtained by integrating the first law of thermodynamics, \begin{equation}\label{first_law_5d} \mathrm{d} E = T \, \mathrm{d} S + \Omega \, \mathrm{d} J + \Phi^I \, \mathrm{d} Q_I \, . \end{equation} The integration constant $E_0$ was fixed to zero in \cite{Cvetic:2005zi} by requiring that $E$ vanishes in the limiting case $m=0$ where the solution becomes empty AdS$_5$, which is regarded as the vacuum solution (see \cite{Gibbons:2004ai} for more details on this approach to computing the energy). One can also compute the same charges within the framework of holographic renormalization. We do so in Appendix~\ref{app:OnShActionsAdS5}, adopting a minimal subtraction scheme. As expected from the analysis of \cite{Papadimitriou:2005ii}, we find agreement with the expressions above for the angular momentum $J$ and the electric charges $Q_I$. The energy $E$ also agrees, except that the AdS mass $E_0$ now takes the non-vanishing value \begin{equation}\label{eq:E0} E_0 = \frac{3 \, \pi}{32 \, g^2}\,. \end{equation} The on-shell action of this solution does not appear to have been computed in the literature before. We have done so, again using holographic renormalization. The action must be evaluated on a regular Euclidean section of the solution. The Euclideanization is obtained by the Wick rotation $t=-i\tau$, together with the continuation of the parameter $a$ to purely imaginary values. After the action is computed one can take $a$ back to the original real domain, or choose to analytically continue the solution to more general complex values of the parameters \cite{Gibbons:1976ue}. As usual, regularity of the Euclidean section leads to identify the length of the circle parameterized by the Euclidean time $\tau $ with the inverse Hawking temperature, that is $\int \mathrm{d}\tau=\beta$. A further regularity condition is that the contraction of the Killing vector \eqref{Killing_Vector} with the gauge fields vanishes at the horizon, \begin{equation} \label{Regularity_Gauge_Field} \iota_{\, V} \, A^I \rvert_{r = r_+} = 0 \, . \end{equation} This leads us to fix the constant gauge choice $\alpha^I$ introduced in \eqref{time_component_A} as \begin{equation}\label{fix_gauge_5d} \alpha^I = - \Phi^I\ , \end{equation} where $\Phi^I$ is the electrostatic potential \eqref{Entropy_Temperature_Potentials}. We describe the rest of the computation of the on-shell action in Appendix~\ref{app:OnShActionsAdS5} and just provide the final result here: \begin{align} \label{On_Shell_Action} I & = I_0 -\frac{\pi\beta}{12} \Big[ 2 m \left( c_1 s_1 \Phi^1 + c_2 s_2 \Phi^2 + c_3 s_3 \Phi^3 \right) + 4 m^2 g ^2 \left(s_1^2 s_2^2 + s_1^2 s_3^2 + s_2^2 s_3^2 \right) \notag \\[1mm] &\qquad \quad \qquad + 3 m (g ^2 a^2 -1) + 3 g ^2 r_+^4 + 2m\left(2g ^2 r_+^2 - 1 \right)\left(s_1^2 + s_2^2 + s_3^2 \right) \Big] \, , \end{align} where \begin{equation}\label{Casimir_Energy} I_0 = \beta E_0 \end{equation} is the on-shell action of empty AdS$_5$ at temperature $\beta$. One can check that the quantities above satisfy the quantum statistical relation: \begin{equation} \label{Quantum_Statistical_Relation} I = \beta E - S - \beta\,\Omega \, J - \beta\,\Phi^I \, Q_I \, . \end{equation} From a microscopic point of view, this is interpreted as the relation between a grand-canonical partition function $I=-\log Z_{\rm grand}$, seen as a function of the chemical potentials, $I=I(\beta,\Omega,\Phi^I)$, and the microcanonical partition function $S=\log Z_{\rm micro}$, seen as a function of the charges $S=S(E,J,Q_I)$. The charges are obtained by varying $I$ with respect to the chemical potentials as \begin{equation} E = \frac{\partial I}{\partial\beta}\,,\qquad J = -\frac{1}{\beta}\frac{\partial I}{\partial \Omega}\,, \qquad Q_I = -\frac{1}{\beta}\frac{\partial I}{\partial \Phi^I}\,. \end{equation} Let us comment on the contribution $E_0$ to the energy and the corresponding $I_0$ in the on-shell action. These are sensitive to the regularization adopted: had we computed the action using the background subtraction method as done for similar solutions in e.g.\ \cite{Hawking:1998kw,Gibbons:2004ai,Chen:2005zj}, we would have found the same result \eqref{On_Shell_Action}, but with $I_0=0$. Indeed background subtraction regularizes the divergence due to the infinite spacetime volume in a way different from holographic renormalization. It does so by subtracting the action of empty AdS space, with a boundary at large distance $\bar{r}$ matched to the boundary of the black hole solution, and then sends $\bar{r}\to \infty$. In this way the action $I$ is measured relative to the action of the AdS vacuum which results from taking $m=0$. Therefore in this approach $I_0=0$ by construction. The quantum statistical relation is still satisfied, provided one chooses $E_0=0$ for the AdS mass by the same logic. Within the framework of holographic renormalization, one can shift $E_0$ (and $I_0$) to any desidered value by adding a finite, local counterterm to the action. Specifically, by adding to the Lorentzian action the finite boundary term $\frac{\varsigma}{8\pi}\int\mathrm{d}^4x\sqrt{h} R^2$, where $\varsigma$ is a parameter, $h_{ij}$ is the boundary metric and $R$ its Ricci curvature, one obtains the shift $I_0 \to I_0 -9\pi g\beta\varsigma $ and $E_0 \to E_0-9\pi g\varsigma $.\footnote{This counterterm also yields a trivial $-\frac{3\varsigma}{2\pi} \nabla^2 R$ contribution to the trace of the energy-momentum tensor, while the ``minimal subtraction'' scheme that we used to reach \eqref{eq:E0} is characterized by the fact that the trace of the holographic energy-momentum tensor does not contain trivial $\nabla^2 R$ terms.} In fact, the boundary field configuration of the solution we are considering implies that this is the only independent finite term that respects diffeomorphism and gauge invariance. Since it can be shifted by an arbitrary constant via a local counterterm, $E_0$ (and $I_0$) is an ambiguous quantity, which does not have an intrinsic meaning. The AdS/CFT correspondence identifies $E_0$ with the Casimir energy of the dual conformal field theory on $S^3\times \mathbb{R}$, and the same argument leads to conclude that this quantity does not have intrinsic value \cite{Assel:2015nca}. However, the situation changes in the presence of additional symmetries, such as supersymmetry. In a supersymmetric setup the $R^2$ counterterm is not allowed, hence $E_0$ does acquire physical meaning \cite{Assel:2014tba,Assel:2015nca}. In fact, in \cite{Papadimitriou:2017kzw,An:2017ihs} $E_0$ has been interpreted as the consequence of a supercurrent anomaly, which is physical in nature. It may be possible to see this as a mixed anomaly and thus shift it away by adding local counterterms that restore supersymmetry at the expense of breaking part of the diffeomorphisms, along the lines of \cite{Genolini:2016sxe,Genolini:2016ecx,Closset:2019ucb}.\footnote{Similar considerations apply to the on-shell action discussed in \cite{Cabo-Bizet:2018ehj}, which was originally computed in \cite{Chen:2005zj} using the background subtraction method. We have checked that the same expression for the on-shell action is recovered if one uses holographic renormalization, again up to the $E_0$ vacuum energy factor.} The solution admits an extremal limit. This can be seen by considering the function $Y(r)$ in the metric \eqref{Metric_CLP}. Being a cubic polynomial, this can be written as \begin{equation} Y(r) = g^2(r^2 - r_+^2) (r^2 - r_0^2) (r^2 - r_-^2) \,, \end{equation} where the roots $r_+^2 \geq r_0^2 \geq r_-^2$ are related to the parameters of the solution as: \begin{align}\label{rel_roots_params_5d} r_+^2+r_0^2+r_-^2 &= -2m(s_1^2 + s_2^2 + s_3^2) - g^{-2} \ ,\nonumber\\[1mm] r_+^2r_0^2 + r_0^2r_-^2 + r_-^2r_+^2 &= 4m^2(s_1^2s_2^2 + s_2^2s_3^2+s_3^2s_1^2)+2m(a^2-g^{-2}) \ ,\nonumber\\[1mm] r_+^2r_0^2r_-^2 &= -8m^3s_1^2s_2^2s_3^2 -g^{-2} f_3(r=0) \ . \end{align} From \eqref{Entropy_Temperature_Potentials} we observe that the product of the temperature and the entropy is proportional to \begin{equation} T S \,=\, \frac{\pi}{8}\frac{Y'(r_+)}{r_+} \,=\, \frac{\pi g^2}{4}(r_+^2-r_0^2)(r_+^2-r_-^2)\,, \end{equation} hence the limit in which the roots $r_+^2$ and $r_0^2$ coalesce corresponds to the extremality condition $T=0$ (as long as the horizon area remains finite). It is important to notice that this condition does not imply supersymmetry. We turn to supersymmetry next. \subsection{The BPS solution} It was found in \cite{Cvetic:2005zi} that one solution to the supergravity Killing spinor equations exists if the parameters satisfy: \begin{equation} \label{Sub_a_SUSY} a\,g \,=\, \frac{1}{{\rm e}^{\delta_1+\delta_2+\delta_3}} \, . \end{equation} Hence the solution preserves two supercharges. For simplicity, we set $g = 1$ from now on in this section (this can easily be restored by dimensional analysis). We also find it convenient to trade the parameters $\delta_I$ for new parameters $\mu_I$, defined as \begin{equation} \label{delta_into_mu_map} {\rm e}^{4\delta_I} = \frac{\mu_I \left(\mu_J+2 \right) \left(\mu_K+2 \right)}{\left(\mu_I+2 \right) \mu_J \, \mu_K} \,, \end{equation} where the indices $I, J, K$ are never equal. In terms of the $\mu_I$, the supersymmetry condition \eqref{Sub_a_SUSY} reads \begin{equation} a = \left({\frac{\mu_1 \, \mu_2 \, \mu_3}{\left(\mu_1+2 \right) \left(\mu_2 + 2 \right) \left(\mu_3 + 2 \right)}} \right)^{1/4} \, . \end{equation} After this is imposed, closed timelike curves in the solution can be avoided by taking \begin{equation}\label{m_BPS} m = m_\star \equiv \frac{1}{2}\sqrt{\mu_1\mu_2\mu_3(\mu_1+2)(\mu_2+2)(\mu_3+2)} \, , \end{equation} which using \eqref{rel_roots_params_5d} implies that the horizons at $r_+$ and $r_0$ merge, \begin{equation} r_0\to r_\star \leftarrow r_+\ , \end{equation} their common location being given by\footnote{We correct an overall minus sign typo in the corresponding expression given in eq.~(3.74) of~\cite{Cvetic:2005zi}.} \begin{equation} r_\star^2 \equiv \frac{1}{2}\left(\sqrt{\mu_1\mu_2\mu_3(\mu_1+2)(\mu_2+2)(\mu_3+2)} - \mu_1\mu_2 - \mu_2\mu_3 - \mu_3\mu_1 - \mu_1\mu_2\mu_3\right) \, . \end{equation} Therefore the supersymmetry condition \eqref{Sub_a_SUSY} together with the requirement \eqref{m_BPS} of no causal pathologies implies extremality. We call the solution that is both supersymmetric and extremal the {\it BPS black hole} solution. The BPS solution thus obtained was first found in \cite{Gutowski:2004yv}, and depends on the three real parameters $\mu_I$, $I=1,2,3$. Regularity of the metric requires these to satisfy \begin{equation}\label{conditions_mu} \mu_I > 0 \ ,\qquad 4\mu_1\mu_2\mu_3\,(\mu_1+\mu_2+\mu_3+1) > (\mu_1\mu_2 + \mu_2\mu_3 + \mu_3\mu_1)^2\ , \end{equation} which implies $r_\star^2>0$. In our analysis below we will assume that the $\mu_I$ are chosen so that these conditions are satisfied. The BPS value of the Bekenstein-Hawking entropy is~\cite{Gutowski:2004yv}: \begin{equation}\label{BPS_Entropy} S^\star = \frac{\pi ^2}{4} \, \sqrt{4\mu_1 \mu_2 \mu_3 \left(\mu_1 + \mu_2 + \mu_3 +1 \right)- \left(\mu_1 \mu_2 + \mu_2 \mu_3 + \mu_3 \mu_1 \right)^2} \, . \end{equation} In the BPS solution, the chemical potentials take the fixed values \begin{equation} \label{Chemical_Potential_BPS} \Omega^\star = 2 , \qquad \Phi^{I\,\star} = 1 \, , \end{equation} while the inverse temperature diverges, $\beta \to \infty$. The BPS charges are \begin{align}\label{BPS_Charges} E^\star & = E_0 + \frac{\pi}{4} \, \Big(2 \, \mu_1 \, \mu_2 \, \mu_3 + \frac{3}{2} \left(\mu_1 \, \mu_2 + \mu_2 \, \mu_3 + \mu_3 \, \mu_1 \right)+ \mu_1 + \mu_2 + \mu_3 \Big) \, , \notag \\[1mm] J^\star & = \frac{\pi}{8} \left(2 \, \mu_1 \, \mu_2 \, \mu_3 + \mu_1 \, \mu_2 + \mu_2\, \mu_3 + \mu_3 \,\mu_1 \right) \, , \notag \\[1mm] Q_1^\star & = \frac{\pi}{8} \left(2 \, \mu_1 + \mu_1\, \mu_2 + \mu_1\, \mu_3 - \mu_2 \, \mu_3 \right) \, , \end{align} with $Q_2^\star$, $Q_3^\star$ being obtained from $Q_1^\star$ by a cyclic permutation of the indices $1,2,3$. As a consequence of supersymmetry, the charges satisfy the linear relation \begin{equation} \label{Charge_BPS_Relation} H^\star \equiv E^\star - \Omega^\star \, J^\star - \Phi^{I\,\star} \, Q^\star_I = E_0 \, . \end{equation} In addition, the electric charges and angular momentum satisfy the non-linear relation \begin{equation}\label{NonLinearConstraint} Q_1^\star\, Q_2^\star\, Q_3^\star + \frac{\pi}{4}\, J^{\star \,2} = \left( Q_1^\star Q_2^\star+Q_2^\star Q_3^\star+Q_3^\star Q_1^\star - \frac{\pi}{2}J^\star \right)\left( Q_1^\star +Q_2^\star+ Q_3^\star + \frac{\pi}{4} \right), \end{equation} which is related to well-definiteness of the horizon area, that is of the entropy. The BPS entropy can be written as a function of the charges in the suggestive form \cite{Kim:2006he} \begin{equation}\label{BPSentropy} S^\star = 2\pi \sqrt{Q_1^\star Q_2^\star+Q_2^\star Q_3^\star+Q_3^\star Q_1^\star - \frac{\pi}{2} J^\star}\,. \end{equation} \subsection{The BPS limit} Since in the BPS solution the chemical potentials take the fixed values $\Omega= \Omega^\star$, $\Phi^I=\Phi^{I\,\star}$, $\beta^{-1}=0$, one can ask if the BPS black hole satisfies non-trivial thermodynamic relations. In particular, one can ask what is the BPS version of the quantum statistical relation \eqref{Quantum_Statistical_Relation}. In~\cite{Cabo-Bizet:2018ehj} it was shown how to define a BPS limit of black hole thermodynamics that reaches the BPS point along a supersymmetric trajectory in parameter space, and in this sense fully respects supersymmetry. There are in fact many possible limits towards the BPS solution, including the one previously proposed in \cite{Silva:2006xv}. However the limit of~\cite{Cabo-Bizet:2018ehj}, that respects supersymmetry all along the trajectory approaching the BPS locus, yields a result that agrees with dual supersymmetric field theory computations. We thus eliminate the parameter $a$ by imposing the supersymmetry condition \eqref{Sub_a_SUSY} and for the moment do not demand \eqref{m_BPS}, which as we reviewed above would imply extremality. Although for $m\neq m^\star$ the Lorentzian solution has closed timelike curves, we are interested in saddle points of the quantum gravity path integral, and thus allow ourselves to work with a complex section of the solution, to be specified momentarily. The solution now depends on the four parameters $m, \, \mu_1, \, \mu_2, \, \mu_3$. We wish to trade $m$ for the outer horizon position $r_+$ by solving the equation $Y(r_+)=0$ for $m$; this will make it easier to study the limit towards extremality. Since the equation $Y(r_+)=0$ is of third order in $m$, its solution is quite complicated. To circumvent this complication, we first change the radial coordinate $r$ into a new coordinate $R$, such that:\footnote{In terms of the old parameters $\delta_I$, the change of coordinate is expressed as $r^2 = R^2 - 2m \sinh^2\delta_1.$ This implies $r^2H_1= R^2$. The new coordinate $R$ should not be confused with the Ricci scalar.} \begin{equation}\label{Change_r_to_R} r^2 = R^2 + \frac{m}{m_\star} \left(r_\star^2 - \mu_1 \right) \, . \end{equation} Although this breaks the symmetry in $\mu_1,\mu_2,\mu_3$, the latter will be restored in the final results after reaching the BPS point. The position of the outer horizon is now given by the largest root $R_+$ of the equation $Y(R) = 0$. From \eqref{Change_r_to_R} we see that in the new coordinate the BPS horizon is found at \begin{equation} R_\star^2 = \mu_1\ . \end{equation} Now the equation $Y(R_+)=0$ is only quadratic in $m$, and its solution can be written as: \begin{equation} \label{Solution_m} m = \frac{2 m_\star \, R_+^4 (R_+^2 + 1 ) }{R_+^4 \left(2 \mu_1 - \mu_2 - \mu_3 \right) + R_+^2 \left( \mu_1 \mu_2 + \mu_2 \mu_3 + \mu_3 \mu_1 + 2 \mu_1 \right)-\mu_1 \mu_2 \mu_3\mp\! ( R_+^2 - \mu_1 ) \mathcal{R} } , \end{equation} where we introduced the quantity: \begin{equation} \label{Square_root} \mathcal{R} = \sqrt{ R_+^4 (\mu_2 - \mu_3)^2 - 2 \,R_+^2 \mu_2 \, \mu_3 \left(\mu_2 + \mu_3+2 \right)+ \mu_2^2 \, \mu_3^2}\ . \end{equation} Due to the undefined sign of the argument of this square root, the expression for $m$ in \eqref{Solution_m} may be complex. For very large $R_+^2$ we have that $\mathcal{R}$ is real, thus $m$ is real. On the other hand, for $R_+^2$ sufficiently close to $R_\star^2 =\mu_1$, that is sufficiently close to the extremal value, the square root $\mathcal{R}$ is purely imaginary as a consequence of \eqref{conditions_mu}. Therefore close to extremality $m$ takes a complex value. In the strict extremal limit $R_+^2 = R_\star^2$ we have that the factor multiplying $\mathcal{R}$ in \eqref{Solution_m} goes to zero, so although $\mathcal{R}$ is purely immaginary, $m$ becomes real and reaches its BPS value \eqref{m_BPS}. Fixing $a$ as in~\eqref{Sub_a_SUSY} and trading $m$ for $R_+$ as in~\eqref{Solution_m} identifies our family of complexified, supersymmetric solutions. Evaluating the quantities~\eqref{Entropy_Temperature_Potentials} in this family of solutions we obtain quite cumbersome expressions, that we will not display here. Remarkably, we find that the chemical potentials obtained in this way satisfy the constraint: \begin{equation} \label{Constraint_Chemical} \beta\, (1 + \Omega - \Phi^1 - \Phi^2 - \Phi^3 ) = \mp \, 2 \, \pi \, i \, , \end{equation} where the sign choice follows from the one in \eqref{Solution_m}. Although we did not manage to derive \eqref{Constraint_Chemical} in full generality due to the complexity of the expressions for the chemical potentials, we verified it with many numerical checks over a wide range of the parameters as well as in a perturbative expansion near the BPS point. We find that eq.~\eqref{Constraint_Chemical} is satisfied in two slightly different ways, depending on the value of $R_+^2$. As we described above, for sufficiently large $R_+^2$, $m$ is real; however in this case $\beta$ is purely imaginary, so that \eqref{Constraint_Chemical} holds true.\footnote{We recall that $\beta$ is given by the expression in \eqref{Entropy_Temperature_Potentials}, so it is purely imaginary when $f_1$ is negative. We find that this happens precisely in the regime where $m$ is real. In this discussion we are assuming that $R_+^2$ is real.} On the other hand, when $R_+^2$ is close to the extremal value, $m$ is complex, and so are the chemical potentials $\beta,\Omega,\Phi^I$; still \eqref{Constraint_Chemical} is satisfied. In order to make the near-extremal behavior of the different quantities appearing in \eqref{Constraint_Chemical} more explicit, we set $R_+ = R_\star + \epsilon$ and study the limit $\epsilon\to 0$. We perform the computation choosing the upper sign in \eqref{Solution_m} for simplicity. We find that in this limit the ``inverse temperature'' $\beta$ diverges as: \begin{equation} \label{Beta_around_BPS} \beta = \frac{4 \, S^\star + i \, \pi^2 \, \left[2 \, \mu_1^2 - \mu_2 \, \mu_3 + \mu_1 \left(2 + \mu_2 + \mu_3 \right) \right]}{4 \, \pi \, \epsilon\, \sqrt{\mu_1} \left(1 + \mu_1 + \mu_2 + \mu_3 \right)} \, + \, \mathcal{O}(\epsilon^0) \, , \end{equation} where $S^\star$ is the BPS entropy given in \eqref{BPS_Entropy}. Hence $\beta$ is complex at leading order near the BPS point. The same holds for the other chemical potentials, which read \begin{align} \Omega & = \Omega^\star -\frac{ 4 \, S^\star - i \, \pi^2 \left( \mu_1 \mu_2 + \mu_3 \mu_1 -\mu_2 \mu_3 \right) }{S^\star \, \sqrt{\mu_1} \, \left(1+\mu_1 \right) }\,\epsilon + \mathcal{O}(\epsilon^2) \, , \notag \\ \Phi^1 & = \Phi^{1 \, \star} + \frac{ 4 S^\star \left[\mu_1 \mu_2 + \mu_3\mu_1 - \mu_2 \mu_3 \right] - 2i\pi^2 \left[ (1+\mu_1)\mu_1\mu_2\mu_3 -8(S^{\star}/\pi^{2})^2 \right]}{2 \, S^\star \, \mu_1^{5/2} \left( 1+\mu_1 \right) \mu_2 \, \mu_3 }\,\epsilon + \mathcal{O}(\epsilon^2), \end{align} with $\Phi^2,\Phi^3$ being obtained from $\Phi^1$ by a cyclic permutation of the $\mu_I$. It follows that \begin{equation} \label{Potentials_around_BPS} 1 + \Omega - \Phi^1 - \Phi^2 - \Phi^3 = \frac{- 4 \, \mu_1^2 + 2 \, \mu_2 \, \mu_3 - 2 \, \mu_1 \left(2 + \mu_2 + \mu_3 \right) - 8 \, i \, S^\star/\pi^2 }{\mu_1^{3/2} \, \left(1 + \mu_1 \right) } \, \epsilon \, + \, \mathcal{O}(\epsilon^2) \, . \end{equation} Multiplying the complex quantities~\eqref{Beta_around_BPS} and~\eqref{Potentials_around_BPS}, the factors of $\epsilon$ cancel out and one can easily check that the finite result~\eqref{Constraint_Chemical} is obtained. Eq.~\eqref{Constraint_Chemical} was understood in~\cite{Cabo-Bizet:2018ehj} as a regularity condition for the Killing spinor of the supersymmetric solution, ensuring that this is {\it antiperiodic} around the Euclidean time circle of finite length $\beta$ corresponding to the orbit of the Killing generator $V$ of the horizon given in \eqref{Killing_Vector}, when the regular gauge $\iota_V A^I|_{r_+}=0$ is assumed. In fact the only spin structure allowed in the topology of the cigar formed by the radial direction and the orbit of $V$, which shrinks to zero size as $R\to R_+$, is the one of an antiperiodic spinor. We now introduce new chemical potentials $\omega$ and $\varphi^I$ by redefining the previous ones as: \begin{equation} \label{Little_Potentials} \omega = \beta \left(\Omega - \Omega^\star \right) , \qquad \varphi^I = \beta \left(\Phi^I - \Phi^{I\,\star} \right) \, . \end{equation} We also introduce the supersymmetric Hamiltonian \begin{align} H &= E - \Omega^\star J - \Phi^{I\,\star}\,Q_I \nonumber\\[1mm] &= E - 2J - Q_1-Q_2-Q_3\ . \end{align} While $E$ is the charge for translations generated by $\frac{\partial}{\partial t}$, the supersymmetric Hamiltonian $H$ is the charge for translations generated by the Killing vector $K= \frac{\partial}{\partial t}+ \Omega^\star \frac{\partial}{\partial \psi}$ that arises as a bilinear of the Killing spinor, covariantized by the term $\iota_K A^I|_\infty Q_I = - \Phi^{I\,\star}\,Q_I$. This is related to the anticommutator of the supercharges by $\{\mathcal{Q},\overline{\mathcal{Q}}\}= H - E_0$, where $E_0$ is the anomalous term induced by the supercurrent anomaly (in a renormalization scheme that preserves diffeomorphism and gauge invariance) \cite{Papadimitriou:2017kzw,An:2017ihs}. Using the new variables, the quantum statistical relation~\eqref{Quantum_Statistical_Relation} can be expressed as: \begin{align} \label{QSR_manipulating} I & = \beta H - S - \omega\, J - \varphi^I \, Q_I \, . \end{align} We then see that $\omega$ and $\varphi^I$ are the chemical potentials conjugate to $J$ and $Q_I$, respectively, when the time translations are generated by the supersymmetric Hamiltonian $H$. Since in any supersymmetric solution $\{\mathcal{Q},\overline{\mathcal{Q}}\}$ evaluates to zero and thus $H=E_0$, we arrive at the \emph{supersymmetric quantum statistical relation} \begin{equation} \label{QSR_SUSY} I - I_0 = - S - \omega\, J - \varphi^I \, Q_I \, , \end{equation} where we used $I_0=\beta E_0$. The constraint~\eqref{Constraint_Chemical} now reads: \begin{equation} \label{Constraint_Little} \omega - \varphi^1 - \varphi^2 - \varphi^3 = \mp \, 2\, \pi \, i \, . \end{equation} We observe that varying the supersymmetry relation between the charges and subtracting this from the first law \eqref{first_law_5d}, we obtain a supersymmetric form of the first law: \begin{equation} \mathrm{d} S + \omega \, \mathrm{d} J + \varphi^I \, \mathrm{d} Q_I =0 \, . \end{equation} Moreover, plugging the supersymmetric condition~\eqref{Sub_a_SUSY} and the expression~\eqref{Solution_m} for $m$ into the on-shell action~\eqref{On_Shell_Action}, we find that the latter takes the simple form: \begin{equation} \label{On_Shell_Action_With_Potentials} I - I_0 = \pi \,\frac{ \varphi^1 \varphi^2 \varphi^3}{(\omega)^2} \, . \end{equation} Notice that the right hand side of~\eqref{On_Shell_Action_With_Potentials} is independent of $\beta$. \begin{comment} Plugging the complex condition for $m$ given by eq.~\eqref{Solution_m} into the entropy~\eqref{Entropy_Temperature_Potentials} we find that it becomes complex while its BPS value is real. The charges becomes also complex and they assume the following values {\footnotesize \begin{align} \label{Complex_Charges} J & = \frac{\pi R_+^4 R_\star^2 \left( R_+^2 + 1 \right) \left[t_1^2 \left(R_\star^2 \left(t_2^4 + 1 \right) + 2 \right) + 2 \left(R_\star^2+1 \right) t_2^2 \right]}{4 R_\star^2 t_2^2 \left\{R_+^2 \left[R_\star^2 \left(- \mathcal{R} + t_1^4 - 1 \right)+2 \left(t_1^4 + 1\right)\right]+ \mathcal{R} R_\star^4 + R_+^4 \left(R_\star^2+2\right) \left(t_1^4 + 1\right)-2 R_\star^2 \right\} - 4 R_+^4 R_\star^2 \left(R_\star^2+1\right) t_1^2 t_2^4 - 4 R_+^4 \left(R_\star^4+3 R_\star^2+2\right) t_1^2} \notag \\ Q_1 & = \dots \end{align} }} One can check that in the BPS limit $R_+ \to R_\star$ they are real. Computing the energy $E$ we can prove that it is also complex in general and we can verify that $H=E_0$ holds for the complexified family of supersymmetric solutions we have obtained, independently of extremality. \end{comment} The supersymmetric charges $E$, $J$ and $Q_I$ are evaluated by substituting the supersymmetry condition~\eqref{Sub_a_SUSY} and the formula \eqref{Solution_m} for $m$ in \eqref{nonextremal_charges}. We checked that although the expressions thus obtained are generically complex, they satisfy the supersymmetry relation $H=E_0$. In the same way we obtain a generically complex expression for the entropy. The fact that the entropy (that is the area of the horizon) is complex is related to the fact that when continued back to Lorentzian signature, the supersymmetric but non-extremal solution presents a pseudo-horizon rather than a horizon \cite{Cvetic:2005zi}. We can now take the limit to extremality by sending $R_+ \to R_\star$. Doing this, our complexified family of supersymmetric solutions reaches the real, BPS solution of \cite{Gutowski:2004yv}. All the main physical quantities become real; in particular the entropy and the charges take the values \eqref{BPS_Entropy}, \eqref{BPS_Charges}. In the extremal limit $R_+\to R_\star$ the temperature vanishes, therefore $\beta$ diverges; at the same time, $\Omega\to \Omega^\star$, $\Phi^I\to \Phi^{I\,\star}$, in such a way that the chemical potentials $\omega$, $\varphi^I$ defined in \eqref{Little_Potentials} stay finite. We denote the BPS values of the redefined chemical potentials as \begin{equation} \label{BPS_Little_Potentials_Def} \omega^\star = \lim_{R_+ \to R_\star} \omega \, , \qquad \varphi^{I\,\star} = \lim_{R_+ \to R_\star} \varphi^{I} \, . \end{equation} By evaluating these limits we obtain \begin{align} \label{BPS_Little_Potentials} \omega^\star & = \frac{-2\pi}{\mu_1 + \mu_2 + \mu_3 +1 }\bigg[ \frac{ \mu_1 \, \mu_2 + \mu_2\, \mu_3 + \mu_3 \, \mu_1 }{ \sqrt{ 4 \mu_1 \mu_2 \mu_3 \left(\mu_1+\mu_2 + \mu_3 + 1 \right) - (\mu_1\mu_2 +\mu_2 \mu_3 + \mu_3\mu_1)^2 }} \pm i \bigg] , \notag \\[3mm] \varphi^{1\,\star} & = \frac{\pi}{\mu_1+ \mu_2 + \mu_3 + 1 }\bigg[\frac{ \mu_1 ( \mu_2^2 + \mu_3^2) - \mu_2 \, \mu_3(\mu_2+\mu_3+2) }{\sqrt{ 4 \mu_1 \mu_2 \mu_3 \left(\mu_1+\mu_2 + \mu_3 + 1 \right) - (\mu_1\mu_2 +\mu_2 \mu_3 + \mu_3\mu_1)^2 }} \nonumber\\[1mm] &\qquad \qquad \qquad \qquad \quad \pm i \left(\mu_2+ \mu_3 \right) \bigg] \, , \end{align} with the expressions for $\varphi^{2\,\star}$ and $\varphi^{3\,\star}$ being obtained from the one for $\varphi^{1\,\star}$ through straightforward permutations of the indices $1,2,3$. Therefore these chemical potentials remain complex even after the BPS limit is taken.\footnote{Note that the argument of the square roots in \eqref{BPS_Little_Potentials} is positive due to assumption \eqref{conditions_mu}, and proportional to the BPS entropy \eqref{BPS_Entropy}.} We remark that $\omega$ and $\varphi^I$ are not the leading order terms~\eqref{Chemical_Potential_BPS} of the chemical potentials $\Omega$ and $\Phi^I$ in the BPS limit. They are instead the next-to-leading-order terms in the expansion of $\Omega$ and $\Phi^I$ around their BPS value: \begin{equation} \label{Little_Potential_Expansion} \Omega = \Omega^\star + \frac{1}{\beta}\, \omega^\star + \dots \, , \quad \qquad \Phi^I = \Phi^{I\,\star} + \frac{1}{\beta}\, \varphi^{I\,\star} + \dots \, . \end{equation} Since the limit is smooth, these BPS chemical potentials still satisfy the constraint \begin{equation} \label{Constraint_Little_BPS} \omega^\star - \varphi^{1\,\star} - \varphi^{2\,\star} - \varphi^{3\,\star} = \mp \, 2 \, \pi\, i \, , \end{equation} and the on-shell action of the BPS solution reads \begin{equation} \label{On_Shell_Action_With_Potentials_BPS} (I - I_0)^\star= \pi \,\frac{ \varphi^{1\,\star} \varphi^{2\,\star} \varphi^{3\,\star}}{(\omega^\star)^{\, 2}} \, . \end{equation} As argued in~\cite{Cabo-Bizet:2018ehj}, the supersymmetric on-shell action $I-I_0$, seen as a function of the chemical potentials \eqref{Little_Potentials}, should be regarded as minus the logarithm of the supersymmetric grand-canonical partition function in the semi-classical approximation to the quantum gravity path integral. Therefore, its Legendre transform must be the logarithm of the microcanonical partition function, that is the entropy. This gives a physical derivation of the extremization principle proposed in~\cite{Hosseini:2017mds}. The Legendre transformation is not completely straightforward because of the constraint~\eqref{Constraint_Little} between the chemical potentials. It was described in detail in~\cite[Appendix B]{Cabo-Bizet:2018ehj}\footnote{The variables used in~\cite[Appendix B]{Cabo-Bizet:2018ehj} are related to the ones used here as: \begin{equation} \omega_1 = \omega_2 = \frac{\omega}{2} \, , \qquad \Delta_I = - \Phi_I \, , \qquad \mu = - \frac{\pi}{4} \, , \qquad n = \mp 1 \, , \qquad J_1 = J_2 = J \, , \qquad Q_I^\text{there} = - Q_I^{\rm here} \,. \nonumber \end{equation}} and we recall here the main steps. The supersymmetric quantum statistical relation~\eqref{QSR_SUSY} can be written as \begin{equation} \label{QSR_BPS_Lagrange} I - I_0 = - S - \omega \, J - \varphi^{I} \, Q_I - \Lambda \left(\omega - \varphi^{1} - \varphi^{2} - \varphi^{3} \pm \, 2 \, \pi\, i \, \right) \, , \end{equation} where the constraint~\eqref{Constraint_Little} is enforced through a Lagrange multiplier $\Lambda$. Although the constraint is identically satisfied in the supersymmetric solution, at this stage we are not assuming any explicit expression for $\omega,\varphi^I$, since we want to treat them as the basic variables to be varied. Extremizing \eqref{QSR_BPS_Lagrange} with respect to $\Lambda,\omega,\varphi^I$ we retrieve the constraint~\eqref{Constraint_Little}, together with the equations \begin{equation} \label{Conjugated_BPS} - \frac{\partial (I - I_0)}{\partial \omega} = J + \Lambda \, , \qquad - \frac{\partial (I - I_0)}{\partial \varphi^{I}} = Q_I + \Lambda \, , \quad I=1,2,3\,, \end{equation} which state the conjugacy relation between supersymmetric charges and chemical potentials. These five equations can be solved for $\omega,\varphi^I$ and $\Lambda$ in terms of the charges $J,Q_I$ (see \cite{Cabo-Bizet:2018ehj} for the explicit expressions). By substituting the solution in \eqref{QSR_BPS_Lagrange}, one obtains a formula for the entropy $S$ that is a complex function of the charges. Further demanding reality of $S$, as well as of $J,Q_I$, one obtains precisely the non-linear relation \eqref{NonLinearConstraint} between the BPS charges, together with the expression \eqref{BPSentropy} for the Bekenstein-Hawking entropy of the BPS black hole. The reality condition on $S$ may be understood as a well-definiteness condition for the horizon area, and this is what leads to \eqref{NonLinearConstraint} in the extremization procedure. We have verified that this extremization is realized in the black hole solution. In particular, we checked that our BPS chemical potentials \eqref{BPS_Little_Potentials} match the saddle point value of $\omega,\varphi^I$ obtained by solving the extremization equations \eqref{Conjugated_BPS} in terms of the charges $J,Q_I$, demanding reality of the entropy, and substituting the parameterization \eqref{BPS_Charges} of the BPS charges. We also checked that this match still holds true when one compares the supersymmetric but non-extremal values of $\omega,\varphi^I$, even if in this case the entropy and the charges are generically complex. \section{Rotating, electrically charged AdS$_4$ black holes}\label{4d_section} In this section we consider a class of rotating, electrically charged, asymptotically AdS$_4$ black holes with an uplift to M-theory. We show that a limiting procedure analogous to the one discussed in five dimensions leads to complexified chemical potentials satisfying the constraint \eqref{constraint_intro} and to an on-shell action that matches the entropy function recently proposed in~\cite{Choi:2018fdc}. \subsection{The non-supersymmetric, finite temperature solution}\label{sec:nonsusysol_4d} The black hole solution of interest was first constructed in \cite{Chong:2004na} within a consistent truncation of four-dimensional $\mathcal{N}=8$, ${\rm SO}(8)$ gauged supergravity. The truncation is obtained by restricting to the ${\rm U}(1)^4$ Cartan subgroup of ${\rm SO}(8)$ and setting the corresponding four gauge fields pairwise equal. We start with a brief review of the solution, again referring to the presentation of \cite{Cvetic:2005zi}. The action is: \begin{align} \label{Lagrangian_Four_Dim} \mathcal{S} & = \frac{1}{16\pi}\int \Big[\left(R - 2 \, \mathcal{V} \right) \star 1 \, - \frac{1}{2} \, \mathrm{d} \xi \wedge \star\, \mathrm{d} \xi - \frac{1}{2} \, {\rm e}^{2 \xi} \, \mathrm{d} \chi \wedge \star \,\mathrm{d} \chi - \frac{1}{2} \, {\rm e}^{-\xi} \, F_3 \wedge \star F_3 \notag \\ & \qquad\qquad - \frac{1}{2} \, \chi \, F_3 \wedge F_3 - \frac{1}{2 \left(1 + \chi^2 {\rm e}^{2 \xi} \right)} \left( {\rm e}^\xi \, F_{1} \wedge \star F_1 - {\rm e}^{2 \xi} \, \chi \, F_1 \wedge F_1 \right) \Big] \, , \end{align} where $F_1$ and $F_3$ are the field strengths of the Abelian gauge fields $A_1=A_2$ and $A_3=A_4$,\footnote{In this section we use lower indices on the vector fields and the respective chemical \hbox{potentials $\Phi$.}} and $\mathcal{V}$ is the scalar potential for the axion and dilaton scalar fields $\chi,\xi$: \begin{equation} \label{Scalar_Potential_Four_Dim} \mathcal{V} = - \frac{1}{2} \,g^2 \left(4 + 2 \cosh{\xi} + {\rm e}^\xi \chi^2 \right) \, . \end{equation} The solution uses coordinates $(t,r,\theta,\phi)$, where $\theta\in [0,\pi]$, $\phi\sim\phi+2\pi$ parameterize a two-sphere. In a frame that rotates at infinity, the metric reads: \begin{equation} \label{Metric_Four_Dimensional} \mathrm{d} s_4^2 = - \frac{\Delta_r}{W} \left( \mathrm{d} t - \frac{a}{\Xi} \sin^2{\theta} \, \mathrm{d} \phi \right)^2 + W \Big( \frac{\mathrm{d} r^2}{\Delta_r} + \frac{\mathrm{d} \theta^2}{\Delta_\theta} \Big) + \frac{\Delta_\theta \sin^2 \theta}{W} \Big( a \, \mathrm{d} t - \frac{ r_1 r_2 + a^2 }{\Xi} \mathrm{d} \phi \Big)^2 , \end{equation} where \begin{align} \label{Quantites_Four_Dimensional} & r_i = r + 2 \, m \, s_i^2 \, , \notag \\ & \Delta_r = r^2 + a^2 - 2 \, m \, r + g^2 \, r_1 \, r_2 \left(r_1 \, r_2 + a^2 \right) \, , \notag \\ & \Delta_\theta = 1 - a^2 g^2\, \cos^2 \theta \, , \qquad W = r_1 \, r_2 + a^2 \, \cos^2 \theta \, , \qquad \Xi = 1 - a^2 g^2 \, , \end{align} and $s_i = \sinh \delta_i$, $c_i = \cosh \delta_i$, $i=1,2$. The scalar fields are given by \begin{equation} \label{Scalar_Phi_Chi} {\rm e}^{\xi} = 1 + \frac{r_1 \left(r_1 - r_2 \right) }{W} \, , \qquad \chi = \frac{a \left(r_2 - r_1 \right) \cos \theta }{r_1^2 + a^2 \cos^2 \theta } \, , \end{equation} while the gauge fields read \begin{equation} \label{Gauge_Fields_4_dim} A_1 = \frac{2 \sqrt{2} \, m \, s_1 c_1 r_2 }{W}\Big( \mathrm{d} t - \frac{a}{\Xi} \, \sin^2 \theta \, \mathrm{d} \phi \Big) \, , \quad A_3 = \frac{2 \sqrt{2} \, m \, s_2 c_2 r_1 }{W}\Big( \mathrm{d} t - \frac{a}{\Xi} \, \sin^2 \theta \, \mathrm{d} \phi \Big) \, . \end{equation} The solution is thus controlled by four parameters $m,a,\delta_1,\delta_2$. Since it is contained in ${\rm SO}(8)$ gauged supergravity, the solution uplifts to eleven-dimensional supergravity on $S^7$ (see \cite{Chong:2004na} and references therein for the explicit uplift formulae). The dual SCFT$_3$ is then the ABJM theory. The solution has an outer horizon at $r=r_+$, defined as the largest root of $\Delta_r$. This is a Killing horizon, generated by the vector \begin{equation} V = \frac{\partial}{\partial t'} + \Omega \, \frac{\partial}{\partial \phi'} \,, \end{equation} where the coordinates \begin{equation}\label{Change_To_Non_Rotating} \phi' = \phi + a \,g^2\, t\,,\qquad t'=t \end{equation} define a frame that is non-rotating at infinity, and \begin{equation}\label{AngularV_4d} \Omega = \frac{a \left(1 + g^2 \, r_1 \, r_2 \right) }{r_1 \, r_2 + a^2} \end{equation} is the angular velocity of the horizon. The Bekenstein-Hawking entropy, the inverse temperature and the electrostatic potentials of the black hole are given by: \begin{align} \label{Properties_Solution_Four_Dim} &\ \ S = \frac{ \pi \left(r_1 \, r_2 + a^2 \right)}{\Xi} \, , \qquad \beta = 4 \pi \left(r_1 \, r_2 + a^2\right) \left(\frac{\mathrm{d} \Delta_r}{\mathrm{d} r} \right)^{-1}\, , \notag\\[1mm] \Phi_1 &= \Phi_2 = \frac{2 \, m \, s_1 \, c_1 \, r_2}{r_1 \, r_2 + a^2} \, , \qquad \Phi_3 = \Phi_4 = \frac{2 \, m \, s_2 \, c_2 \, r_1}{r_1 \, r_2 + a^2} \, , \end{align} where all the functions of the radial coordinate are evaluated in $r_+$. Here the electrostatic potentials $\Phi_I$, $I=1,\ldots,4$, are obtained from the four vector fields gauging the Cartan subgroup of ${\rm SO}(8)$. Since these are set pairwise equal in the action \eqref{Lagrangian_Four_Dim}, necessarily we have $\Phi_1 = \Phi_2$ and $\Phi_3 = \Phi_4$. The energy (that is the charge associated with translations generated by $\frac{\partial}{\partial t'}$), the angular momentum (that is the charge associated with rotations generated by $-\frac{\partial}{\partial \phi'}$) and the electric charges are: \begin{align} \label{Energy, Angular Momentum, Charges_Four_Dim} & E = \frac{m}{\Xi^2} \left(1 + s_1^2 + s_2^2 \right) \, ,\qquad J = \frac{m \, a}{\Xi^2} \left(1 + s_1^2 + s_2^2 \right) \, , \notag \\[2mm] &\ \quad Q_1 = Q_2 = \frac{m \, s_1 \, c_1 }{2 \, \Xi} \, , \qquad Q_3 = Q_4 = \frac{m \, s_2 \, c_2}{2 \, \Xi} \, . \end{align} The electric charges and the angular momentum were obtained in \cite{Cvetic:2005zi} evaluating the standard Maxwell and Komar asymptotic integrals, respectively, while the energy was computed by integrating the first law of thermodynamics, \begin{equation}\label{first_law_4d} \mathrm{d} E = T \, \mathrm{d} S + \Omega \, \mathrm{d} J + 2 \, \Phi_1 \, \mathrm{d} Q_1 +2\,\Phi_3 \, \mathrm{d} Q_3 \, . \end{equation} In Appendix~\ref{app:OnShActionsAdS4} we check that the same expressions for the charges are obtained using holographic renormalization. We also compute the Euclidean on-shell action $I$ by the same method and find the result: \begin{align} \label{On_Shell_Action_Euclidean_Four_Dim} I & = \frac{\beta}{2(a^2g^2-1)}\, \bigg\{ g^2r_+^3 + 3 \, m \,g^2 r_+^2 \left(s_1^2 + s_2^2 \right) + r_+ \left[a^2g^2 + 2 \, m^2g^2 \left(s_1^4 + 4 s_1^2 s_2^2 + s_2^4 \right) \right] \nonumber\\[1mm] &\quad \qquad\qquad\qquad + m \left(a^2g^2 + 4 \, m^2g^2 s_1^2 s_2^2 -1 \right) (s_1^2+s_2^2) - m \notag \\[1mm] &\quad\qquad\qquad\qquad + \frac{2\,m^2 \left[ c_1^2 s_1^2 \left(2 \, m \, s_2^2 + r_+ \right) + c_2^2 s_2^2 \left(2 \, m \, s_1^2 + r_+ \right)\right]}{ a^2+\left(2 \, m \, s_1^2 + r_+ \right) \left(2 \, m \, s_2^2 + r_+ \right)} \, \bigg\} \, . \end{align} We have explicitly verified that the on-shell action and the quantities \eqref{AngularV_4d}, \eqref{Properties_Solution_Four_Dim}, \eqref{Energy, Angular Momentum, Charges_Four_Dim} satisfy the quantum statistical relation \begin{equation} \label{Quantum_Statistical_Relation_Four_Dimensional} I = \beta E - S - \beta\, \Omega \, J - 2\beta \, \Phi_1 \, Q_1 - 2\beta \, \Phi_3 \, Q_3 \, . \end{equation} \subsection{The BPS solution} We will set $g=1$ from now on. The solution presented above is supersymmetric if\footnote{In \eqref{susy_cond_4d} and \eqref{mstar_4d}, we are using the expressions given in \cite{Chow:2013gba}, which correct typos in the corresponding expressions of \cite{Cvetic:2005zi}.} \begin{equation}\label{susy_cond_4d} a = \frac{2}{{\rm e}^{2 \, \left(\delta_1 + \delta_2 \right)} - 1} \, . \end{equation} In the following we assume this condition and use it to eliminate $a$ from all expressions. We thus have a supersymmetric family of solutions described by the remaining parameters $m,\delta_1,\delta_2$. It was shown in \cite{Cvetic:2005zi} that for real values of these parameters, the equation $\Delta_r(r)=0$ determining the existence of a horizon only has a solution~if \begin{equation}\label{mstar_4d} m^2 = m_\star^2 \equiv \frac{\cosh^2 (\delta_1 + \delta_2 )}{4\, {\rm e}^{\delta_1 + \delta_2} \sinh^3(\delta_1+\delta_2) \, c_1 \, s_1 \, c_2 \, s_2 } \, , \end{equation} in which case there is a regular horizon at \begin{equation}\label{rstar_4d} r=r_\star \equiv \frac{2 \, m_\star \, s_1 \, s_2}{\cosh(\delta_1+\delta_2)} \, . \end{equation} This is a double root of $\Delta_r$, hence the supersymmetric solution becomes extremal and the temperature vanishes. This gives a BPS solution that is regular on and outside the horizon.\footnote{Specializing to $\delta_1=\delta_2$ gives a solution to pure gauged $\mathcal{N}=2$ supergravity in four dimensions, originally discussed in \cite{Kostelecky:1995ei,Caldarelli:1998hg}. We also remark that the BPS black holes we are discussing are different from the rotating solutions with magnetic charge recently found in \cite{Hristov:2018spe}.} The chemical potentials take the BPS values \begin{equation} \label{Chemical_Potential_BPS_Four_Dimensions} \Omega^\star = 1 \,, \qquad \Phi_1^\star = \Phi_3^\star = 1 \, ,\qquad \beta \to \infty \, , \end{equation} while the BPS charges are: \begin{align}\label{BPS_charges_4d} E^\star &= \frac{\left(c_1 \, c_2 - s_1 \, s_2 \right) \sqrt{{\rm e}^{-(\delta_1 + \delta_2)} \left(c_1 \, s_2 + c_2 \, s_1 \right) } } {2 \left(\coth \left( \delta_1 + \delta_2 \right)-2 \right)^2 \sqrt{c_1 \, c_2 \, s_1 \, s_2}} \, ,\nonumber\\[1mm] J^\star &= \frac{c_1 \, c_2 - s_1 \, s_2} {2 \left(\coth (\delta_1 + \delta_2) - 2 \right)^2 \sqrt{{\rm e}^{3 \left(\delta_1 + \delta_2 \right)} \, c_1 \, c_2 \, s_1 \, s_2 \left(c_1 \, s_2 + c_2 \, s_1 \right) }} \, ,\nonumber\\[1mm] Q_1^{\star} &= \frac{\sqrt{c_1 \, c_2 \, s_1 \, s_2 \left({\rm e}^{2 \left(\delta_1 + \delta_2 \right)} - 1 \right) } } {2 \, \sqrt{2} \, c_2 \, s_2 \left({\rm e}^{2 \left(\delta_1 + \delta_2 \right)}-3\right)} \, , \end{align} with $Q_3^\star$ being obtained from $Q_1^\star$ by switching $s_1 \leftrightarrow s_2$ and $c_1 \leftrightarrow c_2$. These satisfy the relation \begin{equation} \label{Charge_BPS_Relation_Four_Dimensions} E^\star - \Omega^\star J^\star - 2 \,\Phi^\star_1 \, Q^\star_1 -2\, \Phi^\star_3 \, Q^\star_3 = 0 \, , \end{equation} that is a consequence of the supersymmetry algebra. The BPS angular momentum and electric charges also satisfy \cite{Choi:2018fdc} \begin{equation}\label{nonlinear_charges_4d} J^\star = (Q_1^\star+Q_3^\star)\big(\sqrt{1+64 Q_1^\star Q_3^\star}-1\big)\,, \end{equation} which are related to the fact the we have imposed \eqref{mstar_4d} on top of the supersymmetry condition \eqref{susy_cond_4d} (having fixed two of the four free parameters of the solution, there cannot be more than two independent charges). The BPS entropy reads \begin{equation} S^\star = \frac{2 \, \pi} {{\rm e}^{2\delta_1 + 2\delta_2 } -3} \, , \end{equation} and can be expressed in terms of the charges as \cite{Choi:2018fdc}: \begin{equation} S^\star = \frac{\pi\,J^\star}{2(Q_1^\star + Q_3^\star)} \,. \end{equation} Note that positivity of the BPS entropy restricts the allowed range of $\delta_1+\delta_2$. \subsection{The BPS limit} Our BPS limit proceeds similarly to the five-dimensional case. We start by imposing the supersymmetry condition \eqref{susy_cond_4d}, while for the moment we do not require \eqref{mstar_4d}. The equation $\Delta_r(r)=0$, with $\Delta_r$ being given in \eqref{Quantites_Four_Dimensional}, can be solved in a more general way than \eqref{mstar_4d}, \eqref{rstar_4d} if we allow for complex values of the parameter $m$. In fact, $\Delta_r(r)=0$ can be seen as an equation for $m$, where the solution depends on $\delta_1,\delta_2$ and on the position of the outer horizon, $r_+$. Since $\Delta_r(r)$ is a quartic polynomial in $m$, the solutions are rather cumbersome. The analysis is simplified if we change the radial coordinate $r$ into a new coordinate $R$, defined as: \begin{equation} \label{Change_r_to_R_Four_Dimensions} r = R - 2 \, m \, s_1^2 \, . \end{equation} The equation for the horizon becomes $\Delta_r(R)=0$, and we denote by $R_+$ the position of the outer horizon. This equation is now only quadratic in $m$, and its solution is: \begin{equation} \label{Solution_m_Four_Dimensional} m = \frac{R_+^2 +1 - \left(1 \pm i \, R_+ \right) \coth \left( \delta_1 + \delta_2 \right)}{R_+ \left(c_1^2 + s_1^2 - c_2^2 - s_2^2 \right)\mp 2 \, i \, s_1 \, c_1} \, , \end{equation} where $R_+$ is treated as a parameter, on the same footing as $\delta_1, \delta_2$. We now plug the expression \eqref{Solution_m_Four_Dimensional} for $m$, together with the supersymmetry conditions \eqref{susy_cond_4d}, into the different quantities summarized in Subsection~\ref{sec:nonsusysol_4d}. After these manipulations, we find that the chemical potentials in~\eqref{Properties_Solution_Four_Dim} satisfy the relation \begin{equation} \label{Constraint_Chemical_Four_Dimensions} \beta (1 + \Omega - \Phi_1 - \Phi_3) = \mp \, 2 \, \pi \, i \, . \end{equation} This is completely analogous to the one found in five dimensions. We thus argue that it has the same interpretation as an anti-periodicity condition for the Killing spinor when this is translated around the Euclidean time circle. Again we can introduce the redefined chemical potentials: \begin{equation} \label{Little_Potentials_Four_Dimensions} \omega = \beta \left(\Omega - \Omega^\star \right) , \qquad \varphi_I = \beta \left(\Phi_I - \Phi_I^\star \right) \,, \end{equation} where the BPS values $\Omega^\star,\Phi_I^\star$ were given in \eqref{Chemical_Potential_BPS_Four_Dimensions}. In terms of these variables, \eqref{Constraint_Chemical_Four_Dimensions} reads: \begin{equation} \label{Constraint_Little_Four_Dimensions} \omega - \varphi_1 - \varphi_3 = \mp \, 2\, \pi \, i \, . \end{equation} We find that the explicit expressions of $\omega,\varphi_I$ are: \begin{align}\label{chem_pot_small_4d} \omega & = \frac{4 \pi}{ \Upsilon} \left[c_1 \left(c_2 - 2 \, s_2 \right) + s_1 (s_2 - 2 \,c_2 ) \right] \left[R_+ (c_1^2 - c_2^2 + s_1^2 - s_2^2 ) \mp 2 \, i \, c_1 \, s_1 \right] \, , \nonumber\\ \varphi_1 & = \varphi_2 = \frac{4 \pi}{ \Upsilon} \left(-c_1^2 + 2 \, c_1 \, s_1 + c_2^2 - s_1^2 + s_2^2\right) \left[R_+ (c_1 \, s_2 + c_2 \, s_1 ) \mp i \, {\rm e}^{-\delta_1 - \delta_2} \right] \, , \nonumber\\ \varphi_3 & = \varphi_4 = \frac{4 \pi}{ \Upsilon} \!\left[R_+ (c_1^2 - c_2^2 + s_1^2 - s_2^2 )\mp 2 i \, c_1 s_1 \right] \left[(c_1 c_2 + s_1 s_2 ) - (1 \mp i \, R_+ ) (c_1 s_2 + c_2 s_1 ) \right] , \end{align} where we introduced: \begin{align} \Upsilon &= 2 \, R_+ \left(c_1 \, s_2 + c_2 \, s_1 \right) \left[R_+ \left(c_1^2 - c_2^2 + s_1^2 - s_2^2 \right) \mp 4 \, i \, c_1 \, s_1 \right] - c_1 \, s_2 + c_2 \, s_1 \notag \\ & \quad -2 \, \sinh \left(3 \delta_1 + \delta_2 \right) + \sinh \left(\delta_1 + 3 \delta_2 \right)+\cosh \left(3 \delta_1 + \delta_2 \right)-\cosh \left(\delta_1 + 3 \delta_2 \right) \, . \end{align} The conserved quantities in~\eqref{Energy, Angular Momentum, Charges_Four_Dim} satisfy \begin{equation} \label{Charge_SUSY_Relation_Four_Dimensions} E - \Omega^\star J - 2 \, \Phi^\star_1 \, Q_1 -2\, \Phi^\star_3 \, Q_3 = 0 \, , \end{equation} which as already remarked is purely a consequence of supersymmetry. At this stage the expressions for the charges, as well as the one for the entropy, are complex. After using \eqref{susy_cond_4d}, \eqref{Change_r_to_R_Four_Dimensions}, the on-shell action~\eqref{On_Shell_Action_Euclidean_Four_Dim} can be written in terms of the chemical potentials $\omega,\varphi_1,\varphi_3$ as: \begin{equation} \label{On_Shell_Action_With_Potentials_Four_Dimensions} I = \frac{1}{2 \, i} \frac{\varphi_1 \, \varphi_3 }{\omega} \, . \end{equation} Notice that this is independent of $\beta$, as also found in the five-dimensional analysis. Using \eqref{Charge_SUSY_Relation_Four_Dimensions}, the quantum statistical relation~\eqref{Quantum_Statistical_Relation_Four_Dimensional} takes the supersymmetric form: \begin{equation} \label{QSR_SUSY_Four_Dimensional} I = - S - \omega\, J - 2 \, \varphi_1 \, Q_1 -2\, \varphi_3 \, Q_3 \, . \end{equation} We can now take the BPS limit by sending $R_+ \to R_ \star$, where $R_\star$ is the map of the BPS horizon position $r_\star$ in \eqref{rstar_4d} under the change of coordinate~\eqref{Change_r_to_R_Four_Dimensions}, that is: \begin{equation} R_\star = 2 \, s_1 \, c_1 \, m_\star \tanh \left(\delta_1 + \delta_2 \right) \, . \end{equation} In this limit, the complex expression for $m$ in~\eqref{Solution_m_Four_Dimensional} becomes real and gives $m \to m_\star$. The original chemical potentials take the values \eqref{Chemical_Potential_BPS_Four_Dimensions}. We define the BPS values of the redefined chemical potentials $\omega$, $\varphi_1$, $\varphi_3$ as \begin{equation} \label{BPS_Little_Potentials_Def_Four_Dimensional} \omega^\star = \lim_{R_+ \to R_\star} \omega \, , \qquad \varphi_I^\star = \lim_{R_+ \to R_\star} \varphi_I \, . \end{equation} By evaluating these quantities from \eqref{chem_pot_small_4d}, we obtain the finite values: \begin{align}\label{BPS_chempot_4d} \omega^\star =\, & -\frac{16 \, \pi}{ \Theta} \left({\rm e}^{2 (\delta_1+\delta_2)}-3\right) \Big[4 \, \left(s_1 \, c_1 + s_2 \, c_2 \right) \sqrt{s_1 \, s_2 \, c_1 \, c_2 \left(s_1 \, c_2 + s_2 \, c_1 \right) {\rm e}^{\delta_1 +\delta_2} } \notag \\[1mm] & \pm 4 \, i \, s_1 \, s_2 \, c_1 \, c_2 \, \left(c_1 \, c_2 + s_1 \, s_2 \right) {\rm e}^{\delta_1+\delta_2} \Big] \, ,\notag \\[2mm] \varphi_1^{\star} = \, & - \frac{16 \, \pi}{ \Theta} \Big\{\sqrt{s_1 \, s_2 \, c_1 \, c_2 \left(s_1 \, c_2 + s_2 \, c_1 \right) {\rm e}^{(\delta_1 + \delta_2)} } \left[({\rm e}^{4 \delta_2}-3) \,{\rm e}^{2 \delta_1} - 4 s_2\, c_2 +2\, {\rm e}^{-2 \delta_1} \right] \notag \\[1mm] & \mp 2 \, i \, s_2 \, c_2 \left[{\rm e}^{2 (\delta_1+\delta_2)} \left(c_1^2 + s_1^2 + 2 s_1 \, c_1 + 2s_2 \, c_2 \right) -c_2^2 - s_2^2 - 4 s_2 \, c_2 \right]\Big\} \, , \end{align} where $\varphi_3^{\star}$ is obtained from $\varphi_1^{\star}$ by switching $\delta_1$ and $\delta_2$, and \begin{align} \Theta= \, & {\rm e}^{2 (\delta_1+\delta_2)} \left({\rm e}^{4 \delta_1}+{\rm e}^{4 \delta_2}-10\right)+6 \, {\rm e}^{4 (\delta_1+\delta_2)}+{\rm e}^{6 (\delta_1+\delta_2)} -2 \left({\rm e}^{-4 \delta_1}+{\rm e}^{-4 \delta_2} \right) \notag \\ & -2 \, \left[4 \left({\rm e}^{4 \delta_1}+{\rm e}^{4 \delta_2 }\right)-7\right]+{\rm e}^{-2 (\delta_1+\delta_2)} \left[5 \left({\rm e}^{4 \delta_1}+{\rm e}^{4 \delta_2}\right)-3\right] \, . \end{align} These formulae show that the chemical potentials $\omega,\varphi_1,\varphi_3$ remain complex even after the BPS limit is taken. Since the limit is smooth, these still satisfy the constraint~\eqref{Constraint_Little_Four_Dimensions}, \begin{equation} \label{Constraint_Little_BPS_Four_Dimensions} \omega^\star - \varphi^\star_1 - \varphi^\star_3 = \mp \, 2 \, i \, \pi \, , \end{equation} the on-shell action at the BPS point reads \begin{equation} \label{On_Shell_Action_BPS_4d} I ^\star= \frac{1}{2 \, i} \frac{\varphi^\star_1 \, \varphi^\star_3}{\omega^\star} \, , \end{equation} and satisfies \begin{equation} \label{QSR_SUSY_Four_Dimensional} I^\star = - S^\star - \omega^\star J^\star - 2 \, \varphi_1^\star \, Q_1^\star -2\, \varphi_3^\star \, Q_3^\star \, . \end{equation} The supersymmetric on-shell action \eqref{On_Shell_Action_With_Potentials_Four_Dimensions} matches the entropy function proposed in \cite{Choi:2018fdc}. It was shown there that the BPS entropy follows from Legendre transforming this entropy function and demanding reality of the Legendre transform. Here we have provided a derivation of the entropy function from imposing supersymmetry in the black hole thermodynamics. The relation with the entropy is clear from \eqref{On_Shell_Action_BPS_4d}. The expressions \eqref{BPS_chempot_4d} for the BPS chemical potentials match the saddle point values obtained from Legendre transforming the entropy function, as it can be checked by plugging the formulae \eqref{BPS_charges_4d} for the BPS charges in the saddles given in \cite{Choi:2018fdc}, and comparing with \eqref{BPS_chempot_4d}. \section{Rotating, electrically charged AdS$_6$ black holes}\label{6d_section} \subsection{Properties of the finite-temperature solution} In this section, we turn to six dimensions, considering the asymptotically AdS$_6$ black hole of~\cite{Chow:2008ip}. This is a solution to the six-dimensional $\mathcal{N} = \left(1, 0 \right)$, ${\rm SU}(2)$ gauged supergravity of~\cite{Romans:1985tw}, which uplifts to massive type IIA supergravity on $S^4/\mathbb{Z}_2$ \cite{Cvetic:1999un}. The black hole has four conserved quantities: the energy $E$, two angular momenta $J_a, J_b$ and one ${\rm U}(1) \subset {\rm SU}(2)$ electric charge $Q$. Because of the two independent angular momenta, the solution looks slightly different in form from the other solutions considered in this paper. However the BPS limit works in the same way as in the other cases, and is in fact very similar to the original one discussed in \cite{Cabo-Bizet:2018ehj}. The solution is specified by four parameters $m, \, a, \, b, \, \delta$ and has an outer horizon at $r = r_+$ defined as the largest root of the blackening function \begin{equation} \mathcal{R}(r) = g^2 \left[ r \left( a^2+r^2 \right) + 2 \, m \, s^2 \right] \left[r \left(b^2+r^2\right)+2\,m\,s^2\right] + \left(a^2+r^2\right) \left(b^2+r^2\right) - 2 \, m \, r \, , \end{equation} where as usual we denote $s = \sinh{\delta}, \, c = \cosh{\delta}$. The entropy and the chemical potentials of the solution are given by \begin{align} \label{Chemical_Potentials_Six} S & = \frac{2 \, \pi^2 \left[ \left(r_+^2 + a^2 \right) \left(r_+^2 + b^2 \right) + 2 \, m \, r_+\, s^2 \right]}{3 \, \Xi_a \, \Xi_b} \, , \notag \\[1mm] \Omega_a & = a \, \frac{ \left(1 + g^2 \, r_+^2 \right) \left(r_+^2 + b^2 \right) + 2 \, m \, g^2 \, r_+ \, s^2}{\left(r_+^2 + a^2 \right) \left(r_+^2 + b^2 \right) + 2 \, m \, r_+ \, s^2} \, , \notag \\[1mm] \Omega_b & = b \, \frac{ \left(1 + g^2 \, r_+^2 \right) \left(r_+^2 + a^2 \right) + 2 \, m \, g^2 \, r_+ \, s^2}{\left(r_+^2 + a^2 \right) \left(r_+^2 + b^2 \right) + 2 \, m \, r_+ \, s^2} \, , \notag \\[1mm] \Phi & = \frac{2 \, m \, r_+ \, s \, c}{\left(r_+^2 + a^2 \right) \left(r_+^2 + b^2 \right) + 2 \, m \, r_+ \, s^2} \,, \notag \\[1mm] \frac{1}{\beta} & = \frac{2 r_+^2 (1 + g^2 r_+^2 ) (2 r_+^2 + a^2 + b^2 ) - (1 - g^2 r_+^2 ) (r_+^2 + a^2 ) (r_+^2 + b^2 ) + 8 m g^2 r_+^3 s^2 - 4 m^2 g^2 s^4}{4 \, \pi \, r_+ \left[\left(r_+^2 + a^2 \right) \left(r_+^2 + b^2 \right) + 2 \, m \, r_+ \, s^2 \right] } \, , \end{align} where $\Xi_a = 1 - a^2 \, g^2$ and $\Xi_b = 1 - b^2 \, g^2$. The energy, the angular momenta and the electric charge read \begin{align} E & = \frac{2 \, \pi \, m}{3 \, \Xi_a \, \Xi_b} \left[\frac{1}{\Xi_a} + \frac{1}{\Xi_b} + s^2 \left(1 + \frac{\Xi_a}{\Xi_b} + \frac{\Xi_b}{\Xi_a} \right) \right], \, \qquad Q = \frac{2 \, \pi \, m \, s \, c}{\Xi_a \, \Xi_b} \,,\notag \\ J_a & = \frac{2 \, \pi \, m \, a}{3 \, \Xi_a^2 \, \Xi_b} \left(1 + \Xi_b \, s^2 \right) , \, \qquad J_b = \frac{2 \, \pi \, m \, b}{3 \, \Xi_a \, \Xi_b^2} \left(1 + \Xi_a \, s^2 \right) \, . \end{align} These satisfy the first law of black hole thermodynamics, \begin{equation} \mathrm{d} E = T \, \mathrm{d} S + \Omega_a \, \mathrm{d} J_a + \Omega_b \, \mathrm{d} J_b + \Phi \, \mathrm{d} Q \, . \end{equation} For the black hole under consideration, the quantum statistical relation reads \begin{equation}\label{QSR_6d} I = \beta \, E - S - \beta \, \Omega_a \, J_a - \beta \, \Omega_b \, J_b - \beta \, \Phi \, Q \,. \end{equation} While in the four- and five-dimensional cases we explicitly verified the validity of the quantum statistical relation by computing the on-shell action, in the present case we assume its validity and use it to obtain an expression for the on-shell action~$I$. We will demonstrate that chemical potentials satisfying the correct complex constraint arise from a suitably complexified family of supersymmetric solutions, and that the expression of $I$ on these solutions is precisely the entropy function given in~\cite{Choi:2018fdc}. \subsection{The BPS solution} For ease of computation we set $g=1$ from now on. As discussed in \cite{Chow:2008ip}, the solution is supersymmetric if \begin{equation} \label{SUSY_6d} {\rm e}^{2 \delta} = 1 + \frac{2}{a + b}\,. \end{equation} We shall always use this condition to eliminate $\delta$ in all the expressions below. We are thus left with the remaining three free parameters $m$, $a$, $b$. The supersymmetric solution is free from closed timelike curves if and only if \begin{equation} m = m_\star = \frac{\left(a + b \right)^2 \left( 1 + a \right) \left(1 + b \right) \left(2 + a + b \right)}{2 \left(1 + a + b \right)} \sqrt{\frac{a \, b}{1 + a + b}} \, . \end{equation} Imposing both this condition and~\eqref{SUSY_6d}, the temperature vanishes and we obtain the BPS solution. The BPS horizon is located at \begin{equation} \label{r_star_six} r_\star = \sqrt{\frac{a \, b}{1 + a + b}} \, . \end{equation} In the BPS solution, the chemical potential take the BPS values \begin{equation} \Omega^\star_a = \Omega^\star_b = 1 \, , \qquad \Phi^\star = 1 \, , \qquad \beta \to \infty \, , \end{equation} while the BPS charges are: \begin{align} E^\star & = -\frac{\pi \, r_\star \left(a+b \right) \left[2 \, a^2 + a \, \left(b-1 \right) + \left(b+1 \right) \left(2 b-3 \right) \right]}{3 \left(a-1 \right)^2 \left(b-1 \right)^2 \left(a+b+1 \right) } \, , \notag \\ J_a^\star & = -\frac{\pi \, r_\star^3 \left(a+b \right) \left( a + 2 \, b + 1 \right)}{3 \, b \left( a-1 \right)^2 \left(b-1 \right)} \, , \notag \\ J_b^\star & = -\frac{\pi \, r_\star^3 \left( a + b \right) \left(2 \, a + b + 1 \right)}{3 \, a \left(a - 1 \right) \left(b - 1 \right)^2} \, , \notag \\ Q^\star & = \frac{\pi \, r_\star \left( a + b \right) }{ \left( a - 1 \right) \left( b - 1 \right) } \, \notag \, . \end{align} The quantity above satisfy the supersymmetry relation \begin{equation} E^\star - \Omega_a^\star \, J_a^\star - \Omega_b^\star \, J_b^\star - \Phi^\star \, Q^\star = 0 \, . \end{equation} The BPS entropy of the BPS black hole solution reads \begin{equation} \label{Entropy_Star_Six} S^\star= \frac{2 \, \pi^2 \, r_\star^2 \, \left(a + b \right)}{3 \left(1 - a \right) \left(1 - b \right) } \, , \end{equation} and satisfies the following two relations, which involve also the BPS charges \cite{Choi:2018fdc} \begin{align} & S^{\star \, 3} - \frac{2 \, \pi^2}{3} S^{\star \, 2} - 12 \, \pi^2 \left(\frac{Q^\star}{3} \right)^2 \, S^\star + \frac{8 \, \pi^4}{3} \, J^\star_a \, J^\star_b = 0 \, , \notag \\ & \frac{Q^\star}{3} S^{\star \, 2} + \frac{2 \, \pi^2}{9} \left(J_a^\star + J_b^\star \right) S^\star - \frac{ 4 \, \pi^2}{3} \left( \frac{Q^\star}{3} \right)^3 = 0 \, . \end{align} These can be used to express the BPS entropy in terms of the charges and to obtain a relation between $J_a^\star, \, J_b^\star \, , Q^\star$, analogously to what happens in the other spacetime dimensions. In the following we assume $0<a <1$, $0<b<1$, which guarantee $r_\star$ to be real and the BPS entropy to be real and positive. \subsection{The BPS limit} As in the previous cases, the complexified family of supersymmetric solutions is obtained by solving the equation $\mathcal{R}(r_+) = 0$ for the parameter $m$, so that this is traded for the position of the outer horizon $r_+$. The equation is already of quadratic order in $m$, therefore we can solve it without changing the radial coordinate. Doing so, we obtain \begin{equation} m = \frac{1}{2} \left(r_+ \mp i \right) \left( a \pm i \, r_+ \right) \left(b \pm i \, r_+ \right) \left( a + b \right) \left( a + b + 2 \right) \, , \end{equation} so that $m$ is complex for real values of $a, b, r_+$. Plugging this expression for $m$ in the chemical potentials~\eqref{Chemical_Potentials_Six}, we find that these satisfy the constraint \begin{equation} \beta \left(1 + \Omega_a + \Omega_b - 3 \, \Phi \right) = \mp 2 \, \pi\, i \, . \end{equation} It follows that the redefined chemical potentials \begin{equation}\label{redef_pot_6d} \omega_a = \beta \left(\Omega_a - \Omega^\star_a \right) \, , \qquad \omega_b = \beta \left(\Omega_b - \Omega^\star_b \right) \, , \qquad \varphi = \beta \left(\Phi - \Phi^\star \right) \, , \end{equation} satisfy \begin{equation} \omega_a + \omega_b - 3 \, \varphi = \mp \, 2 \, \pi \, i \, . \end{equation} The black hole charges satisfy the supersymmetry condition \begin{equation}\label{susycharges_6d} E - \Omega_a^\star \, J_a - \Omega_b^\star \, J_b - \Phi^\star \, Q = 0 \, . \end{equation} Using \eqref{redef_pot_6d}, \eqref{susycharges_6d} in \eqref{QSR_6d}, we obtain the supersymmetric quantum statistical relation \begin{equation} I = - S - \omega_a \, J_a - \omega_b \, J_b - \varphi \, Q \, . \end{equation} Evaluating $I$ from this expression, we find \begin{equation} I = \frac{\pi\,i}{3} \, \frac{\varphi^3}{\omega_a \, \omega_b} \, , \end{equation} which reproduces the entropy function proposed in \cite{Choi:2018fdc}. We now take the extremal limit by sending $r_+\to r_\star$. The chemical potentials take the limiting values \begin{align} \omega_a^\star & = \frac{2 \, i \, \pi \left( a - 1 \right) \left( b + i \, r_\star \right)}{2 \, i \, a \, b \, r_\star^{-1} + a \, b + a + b - 3 \, r_\star^2} \, , \notag \\ \omega_b^\star & = \frac{2 \, i \, \pi \left( b - 1 \right) \left( a + i \, r_\star \right)}{2 \, i \, a \, b \, r_\star^{-1} + a \, b + a + b - 3 \, r_\star^2} \, , \notag \\ \varphi & = \frac{2 \, i \, \pi \left(a + i \, r_\star \right) \left(b+i \, r_\star \right)}{2 \, i \, a \, b \, r_\star^{-1} + a \, b + a + b -3 r_\star^2} \, . \end{align} Since the limit is smooth, these still satisfy the constraint \begin{equation} \omega^\star_a + \omega^\star_b - 3 \, \varphi^\star = \mp 2 \, \pi \, i \, , \end{equation} and the BPS on-shell action is \begin{equation} I^\star = \frac{\pi\, i}{3} \, \frac{(\varphi^\star)^3}{\omega^\star_a \, \omega^\star_b} \, . \end{equation} We obtained in this way a derivation of the BPS AdS$_6$ black hole entropy function. \section{Rotating, electrically charged AdS$_7$ black holes}\label{7d_section} Finally, we discuss asymptotically AdS$_7$ black holes. We consider the seven-dimensional solution originally found in \cite{Chong:2004dy} and further discussed in \cite{Cvetic:2005zi}, and we study its BPS limit. Since this goes through in the same way as in the previous cases, we will keep the presentation short. \subsection{Properties of the finite-temperature solution} The seven-dimensional black hole discussed in \cite{Cvetic:2005zi} is a solution to maximal ${\rm SO}(5)$ gauged supergravity, and uplifts to eleven-dimensional supergravity on $S^4$~\cite{Cvetic:1999xp}. We start with a brief summary of the relevant properties of the finite-temperature solution.\footnote{We correct a few misprints in \cite{Cvetic:2005zi} following \cite{Hosseini:2018dob,Choi:2018hmj}.} This is controlled by four parameters $m$, $a$, $\delta_1$, $\delta_2$ and is given in terms of the following functions: \begin{align} & s_I = \sinh{\delta_I} \, , \quad c_I = \cosh{\delta_I} \, , \quad \Xi_{\pm} = 1 \pm a \, g \, , \quad \Xi = 1 - a^2 \, g^2 \, , \quad \rho = \sqrt{\Xi} \, r \, , \notag \\ & H_I = 1 + \frac{ 2 \, m \, s_I^2}{\rho^4} \, , \quad \alpha_1 = c_1 - \frac{1}{2} \left(1 - \Xi_+^2 \right) \left(c_1 - c_2 \right) \, , \quad \alpha_2 = c_2 + \frac{1}{2} \left(1 - \Xi_+^2 \right) \left(c_1 - c_2 \right) , \notag \\ & \beta_1 = - a \, \alpha_2 \, , \quad \beta_2 = - a \, \alpha_1 \, , \ \end{align} \begin{align} & f_1 (r) = \Xi \rho^6 H_1 H_2 - \frac{4 \Xi_+^2 m^2 a^2 s_1^2 s_2^2}{\rho^4} + \frac{m a^2}{2} \Big[4 \Xi_+^2 + 2 c_1 c_2 (1 - \Xi_+^4 ) + (1 - \Xi_+^2 )^2 (c_1^2 + c_2^2 ) \Big] , \notag \\ & f_2 (r) = - \frac{1}{2} \, g \, \Xi_+ \, \rho^6 H_1 H_2 + \frac{1}{4} m a \left[2 \left(1 + \Xi_+^4 \right) c_1 c_2 + \left(1 - \Xi_+^4 \right) \left(c_1^2 + c_2^2 \right) \right] \, , \notag \\ & Y(r) = g^2 \rho^8 H_1 H_2 + \Xi \rho^6 + \frac{1}{2} m a^2 \left[4 \Xi_+^2 + 2 \left(1 - \Xi_+^4 \right) c_1 c_2 + \left(1 - \Xi_+^2 \right)^2 \left(c_1^2 + c_2^2 \right) \right] \notag \\ & \qquad- \frac{1}{2} m \rho^2 \Big[ 4 \Xi + 2 a^2 g^2 \left(6 + 8 a g + 3 a^2 g^2 \right) c_1 c_2 - a^2 g^2 \left(2 + a g \right) \left(2 + 3 a g \right) \left(c_1^2 +c_2^2 \right) \Big] , \end{align} where $r$ is the radial coordinate. The outer horizon is found at $r = r_+$, defined as the largest root of the equation $Y(r)=0$. The entropy, inverse temperature, angular velocity and electrostatic potentials on the horizon, measured in a non-rotating frame at infinity, read: \begin{align} & S = \frac{\pi ^3 \, \rho ^2 \, \sqrt{f_1} }{4 \, \Xi^3 } \, , \qquad \beta = T^{-1} = 4 \, \pi \, g \, \rho^3 \sqrt{\Xi \, f_1} \, \left(\frac{\mathrm{d} Y}{\mathrm{d} r}\right)^{-1} \, , \notag \\[1mm] & \Omega = - \frac{1}{g} \left(g + \frac{2 \, f_2}{f_1} \, \Xi_- \right) \, , \qquad \Phi_I = \frac{4 m s_I}{\rho^4 \Xi H_I} \left(\alpha_I \Xi_- + \beta_I \frac{2 f_2 \Xi_-}{f_1} \right) \, , \end{align} while the energy, angular momentum and electric charges are: \begin{align} E & = \frac{m \, \pi^2}{32 \, g \, \Xi^4 } \Big[ 12 \Xi_+^2 \left(\Xi_+^2 - 2 \right) - 2 c_1 c_2 a^2 g^2 \left( 21 \Xi^4_+ - 20 \Xi^3_+ - 15 \Xi^2_+ - 10 \Xi_+ - 6 \right) \notag \\ & \qquad \qquad \qquad + \left(c_1^2 + c_2^2 \right) \left(21 \Xi_+^6 - 62 \Xi_+^5 + 40 \Xi_+^4 + 13 \Xi_+^2 - 2 \Xi_+ + 6 \right) \Big] \, , \notag \\ J & = - \frac{m a \pi^2}{16 \, \Xi^4 } \Big[ 4 a g \Xi_+^2 - 2 c_1 c_2 (2 \Xi_+^5 - 3 \Xi^4_+ - 1 ) + a g (c_1^2 + c_2^2 ) (\Xi_+ + 1 ) (2 \Xi^3_+ - 3 \Xi^2_+ - 1 ) \Big] \, , \notag \\ Q_1 \!& = \frac{m \, s_1 \, \pi^2}{8 \, g \, \Xi^3 } \Big[a^2 g^2 c_2 \left(2 \Xi_+ + 1 \right) - c_1 \left(2 \Xi_+^3 - 3 \Xi_+^2 - 1 \right) \Big] \, , \notag \\ Q_2 \!& = \frac{m \, s_2 \, \pi^2}{8 \, g \, \Xi^3 } \Big[a^2 g^2 c_1 \left(2 \Xi_+ + 1 \right) - c_2 \left(2 \Xi_+^3 - 3 \Xi_+^2 - 1 \right) \Big] \, . \end{align} The energy is given in a scheme such that the energy of the vacuum AdS$_7$ solution is $E_0=0$. In a different scheme, the expression above should be regarded as $E-E_0$ (considerations similar to the ones discussed in the five-dimensional case apply here). The quantities above satisfy the first law of black hole thermodynamics, \begin{equation} \mathrm{d} E = T \, \mathrm{d} S + 3 \, \Omega \, \mathrm{d} J + \Phi_1 \, \mathrm{d} Q_1 + \Phi_2 \, \mathrm{d} Q_2 \, . \end{equation} The quantum statistical relation reads: \begin{equation}\label{QSR_7d} I = \beta E - S - 3\beta\, \Omega \, J - \beta \, \Phi_1 \, Q_1 - \beta \, \Phi_2 \, Q_2 \, . \end{equation} As for the six-dimensional case, we will assume this is satisfied without evaluating the on-shell action $I$ independently. For consistency with the assumption made for the vacuum energy, we assume we are working in a scheme where $I_0=\beta E_0 =0$. We now show that the expression of $I$ on the complexified family of solutions coincides with the entropy function of \cite{Hosseini:2018dob}, and that the constraint on the chemical potentials arises in the same way as in the previous sections. \subsection{The BPS solution} We will set $g=1$ from now on. The solution is supersymmetric (preserving two supercharges) if \cite{Cvetic:2005zi} \begin{equation}\label{susycond_7d} a = \frac{2}{3(1- {\rm e}^{\delta_1+\delta_2})} \, . \end{equation} We will always use this relation to eliminate $a$ in the expressions below. The remaining parameters are $m,\delta_1,\delta_2$. For simplicity we will set $\delta_1 =\delta_2\equiv \delta$ (and similarly $c_1=c_2 \equiv c$, $ s_1=s_2\equiv s$), the extension to the case $\delta_1\neq \delta_2$ being straightforward although more involved. We thus have $\Phi_1 =\Phi_2\equiv \Phi$ and $Q_1 =Q_2 \equiv Q$. Closed timelike curves are avoided by taking \begin{equation} m = m_\star = \frac{4 \, {\rm e}^{-3 \delta} \left(c + 2 \, s \right)^3}{729 \, c^2 \, s^6} \, , \end{equation} imposing this in addition to \eqref{susycond_7d} implies vanishing of the temperature and thus leads to the BPS solution. The BPS horizon is located at \begin{equation} \label{r_star_dim} r^2_\star =- \frac{16}{3 \left(2 \, {\rm e}^{2 \delta} - 3 \, {\rm e}^{4 \delta} + 5 \right)} \, , \end{equation} note that, since $r_\star^2$ should be positive, the equation above implies \begin{equation} {\rm e}^{2\delta} > \frac{5}{3} \, . \end{equation} This is a physical condition on the parameter $\delta$ and we shall assume it in the following. The chemical potentials take the BPS values \begin{equation} \Omega^\star = 1 \, , \qquad \Phi^\star = 2 \, , \qquad \beta \to \infty\, . \end{equation} The BPS charges are: \begin{align} E^\star = & \, \frac{16 \, \pi ^2 \left(-21 \, {\rm e}^{4 \delta} + 18 \, {\rm e}^{6 \delta} + 7 \right)}{3 \left(5 - 3 \, {\rm e}^{2 \delta} \right)^4 \left({\rm e}^{2 \delta} + 1 \right)^2} \, , \nonumber\\[1mm] J^\star = & \, \frac{16 \, \pi ^2 \left[ 9 \, {\rm e}^{2 \delta} \left({\rm e}^{2 \delta} + 2 \right) - 23 \right]}{9 \left(5 - 3 \, {\rm e}^{2 \delta} \right)^4 \left({\rm e}^{2 \delta} + 1 \right)^2} \, , \nonumber\\[1mm] Q^\star = & \, -\frac{\pi^2 \, \tanh\delta \, {\rm e}^{-3 \delta}}{\left(c - 4 \, s \right)^3} \, , \end{align} and satisfy the supersymmetry relation \begin{equation} E^\star - 3 \, \Omega^\star J^\star - 2 \, \Phi^\star \, Q^\star = 0 \, . \end{equation} The BPS entropy reads \begin{equation} S^\star = \, \frac{2 \, \pi^3 \sqrt{c + 8 \, s}}{3 \, {\rm e}^{4 \delta} \, \sqrt{3 \, c^3} \left(4 \, s - c \right)^3} \, , \end{equation} and can be written in terms of the charges as \cite{Choi:2018hmj}: \begin{equation} S^\star = 2 \pi \,\sqrt{ \frac{32 \, (Q^\star)^3 - 3 \, \pi^2 \, (J^\star)^2}{32 \, Q^\star- \pi^2 } }\,. \end{equation} \subsection{The BPS limit} In order to study the complexified family of supersymmetric solutions, we solve the equation $Y(r_+) = 0$ for the parameter $m$, thus trading it for the position of the outer horizon $r_+$. This equation is of quadratic order in $m$, therefore it is immediately solved as: \begin{align} \label{m_7_dim} m = & -\frac{c + 2 \, s}{648 \, s^6} \bigg\{\left[3 \, r_+^2 \left(c^2 - 8 \, c \, s + s^2 + 1 \right) + 8 \, {\rm e}^{-2 \delta} \right] \mathcal{R} \notag \\ & \quad + r_+^2 \left(4 \, s - c \right) \left[2 \, r_+^2 \left(7 \left(c^2 + s^2 \right) + 4 \, c \, s - 9 \right) - 2 {\rm e}^{-2 \, \delta} - 18 \right] + 16 \, {\rm e}^{-3 \delta} \bigg\} \, , \end{align} where \begin{equation} \mathcal{R} = \sqrt{4 \, {\rm e}^{-2 \delta} - 2 \, r_+^2 \left[7 \, \left(c^2 + s^2 \right) + 4 \, c \, s - 9 \right] } \, . \end{equation} We now show that this square root is imaginary. Using the expression for $r_\star$ given in~\eqref{r_star_dim}, we can write \begin{equation} \mathcal{R} = \sqrt{4 - \frac{16 \, r_+^2 \left(r_\star^2 - r_\star \, \sqrt{r_\star^2 + 1} + 1 \right)}{r_\star^2}} \, , \end{equation} and using the physical condition $r_+ > r_\star$ it is easy to see that the argument satisfies the inequality \begin{equation} 4 - \frac{16 \, r_+^2 \left(r_\star^2 - r_\star \, \sqrt{r_\star^2 + 1} + 1 \right)}{r_\star^2} < 4 - \frac{8 \, r_+^2}{r_\star^2} < 0\,, \end{equation} showing that the square root is always imaginary. The expression for $m$ given in~\eqref{m_7_dim} is therefore complex. This identifies our complexified family of solutions. Plugging the above expression for $m$ in the chemical potentials, we find that these satisfy the constraint \begin{equation} \beta \left(1 + 3 \, \Omega - 2 \, \Phi \right) = \mp 2 \, \pi \, i \, . \end{equation} Again we can introduce the redefined chemical potentials \begin{equation} \omega = \beta\,(\Omega - \Omega^\star)\, , \qquad \varphi = \beta\,(\Phi - \Phi^\star)\,. \end{equation} We checked that the on-shell action is given in terms of these variables by \begin{equation} I = - \frac{\pi^3}{128} \, \frac{\varphi^4}{\omega^3} \, . \end{equation} The BPS on-shell action and the BPS chemical potentials satisfy the supersymmetric quantum statistical relation \begin{equation} I = - S - 3 \, \omega \, J - 2 \, \varphi \, Q \, . \end{equation} At this point we take the extremal limit by sending $r_+\to r_\star$. The limiting values of the chemical potentials are: \begin{align} \omega^\star & = -\frac{6 \, \pi}{\left(c + 8 \, s \right) \, \Theta}\, \sqrt{2 \left(16 \, c \, s + c^2 + s^2 + 1 \right) } \left(c - 4 \, s \right) \bigg[c \left(\sqrt{3} - \sqrt{-8 \, \tanh\delta - 1} \right) \notag \\ & \qquad + 4 \, s \left(\sqrt{-8 \tanh\delta - 1} +2 \, \sqrt{3} \right) \bigg] \, ,\nonumber \\ \varphi^\star & = - \frac{64 \, \pi} {\Theta \, {\rm e}^{\delta} \sqrt{2 \left(c^2 + 16 \, c \, s + s^2 + 1 \right)}} \left(\sqrt{3} \, {\rm e}^{- \delta} \left(c + 8 \, s \right) + 9 \, c \, s \sqrt{-8 \tanh\delta - 1} \right) \, , \end{align} where we have defined \begin{align} \Theta & = 8 \, c \, s \left(\sqrt{-3 \left(8 \, \tanh\delta + 1 \right)} - 18 \right) + \left(23 \sqrt{-3 \left(8 \, \tanh\delta + 1 \right)}-9\right) \left(c^2 + s^2 \right) \notag \\ & \quad -9 \left(\sqrt{-3 \left(8 \, \tanh\delta + 1 \right)}+1 \right) \, . \end{align} These BPS chemical potentials satisfy the constraint \begin{equation} 3 \, \omega^\star - 2 \, \varphi^\star = \mp \, 2 \, \pi \, i \, , \end{equation} which is completely analogous to what we have found in lower dimensions. In terms of these chemical potentials, the on-shell action reads \begin{equation} I^\star = - \frac{\pi^3}{128} \, \frac{\left(\varphi^\star \right)^4}{\left(\omega^\star \right)^3} \, . \end{equation} This completes our derivation of the BPS entropy function from black hole thermodynamics. \section{Discussion}\label{sec:conclusions} The main result of this paper has been to extend the BPS limit of rotating AdS black hole thermodynamics defined in \cite{Cabo-Bizet:2018ehj} to five-dimensional solutions with more than one electric charge, as well as to other spacetime dimensions. In each case, we have provided a derivation of the extremization principle leading to the Bekenstein-Hawking entropy, by showing that the entropy functions of \cite{Hosseini:2017mds,Hosseini:2018dob,Choi:2018fdc} are the supergravity action $I = I(\omega,\varphi)$ evaluated on a complexified family of supersymmetric solutions, and that the supersymmetric chemical potentials $\omega,\varphi$ indeed satisfy the corresponding extremization equations. The analysis of several examples across different spacetime dimensions demonstrates that this approach is general and should play a role towards understanding the thermodynamics of BPS black holes in AdS. As summarized in Section~\ref{sec:introduction}, the gravitational analysis also defines the microscopic, dual SCFT partition function which should reproduce the entropy function in the large $N$ regime. Progress in this direction has been made recently, and the entropy function for rotating BPS black holes in AdS$_5$ has been obtained from a dual SCFT$_4$ by different methods: from a version of the supersymmetric Casimir energy in \cite{Cabo-Bizet:2018ehj}, from a Cardy-like limit of the superconformal index in \cite{Choi:2018hmj,Honda:2019cio,ArabiArdehali:2019tdm,Kim:2019yrz,Cabo-Bizet:2019osg,Amariti:2019mgp} (see also \cite{Choi:2019miv} for an AdS$_6$/CFT$_5$ study), and from the large $N$ limit of the $\mathcal{N}=4$ SYM index in~\cite{Benini:2018ywd}. The AdS$_4$/CFT$_3$ case is also interesting: the class of black holes studied in this paper uplifts to eleven-dimensional supergravity on $S^7$, hence the dual field theory is the ABJM theory on $S^1\times S^2$, with an anti-periodic supercharge and chemical potentials satisfying the complex constraint. It should thus be possible to retrieve the entropy function by evaluating the partition function \eqref{SCFT_Z} for the ABJM theory at large $N$. On the gravity side, there are some generalizations of our work that it would be interesting to consider. Our analysis of the solutions of \cite{Cvetic:2005zi,Chow:2008ip} strongly indicates that the same BPS limit will work when the most general set of electric charges and angular momenta is turned on in each spacetime dimension, although in many cases the corresponding asymptotically AdS black hole solutions are still to be constructed, and the explicit check may be technically hard to perform. Specifically, in the context of eleven-dimensional supergravity on $S^7$, one could relax the condition of pairwise equal electric charges within the ${\rm U}(1)^4$ consistent truncation of SO(8) maximal supergravity, though the finite-temperature asymptotically AdS$_4$ solution with four independent electric charges in addition to the angular momentum has not been found yet.\footnote{Very recently, the corresponding BPS solution has been constructed in \cite{Hristov:2019mqp}.} In four dimensions, one could also switch on magnetic charges. For type IIB supergravity on $S^5$, one could analyze the solution carrying two independent angular momenta and three independent electric charges given in \cite{Wu:2011gq}. For massive type IIA supergravity on $S^4/\mathbb{Z}_2$, the solution of \cite{Chow:2008ip} discussed here already carries all possible independent electric charges and angular momenta available within known consistent truncations, although one may still search for asymptotically AdS$_6$ black holes carrying a non-vanishing electric charge for the additional ${\rm U}(1)\subset {\rm SU}(2)$ isometry of $S^4$ working directly in ten dimensions (this charge would be dual to a flavor charge of the D4-D8-O8 SCFT$_5$). For eleven-dimensional supergravity on $S^4$, a solution carrying two independent electric charges and three independent angular momenta is likely to exist within the ${\rm U}(1)^2$ truncation of seven-dimensional {\rm SO}(5) maximal supergravity, but has not been found yet. Nevertheless, the known solutions allow to partially relax the condition of equal electric charges and equal angular momenta we imposed: one could take the two electric charges in the solution of \cite{Cvetic:2005zi} to be independent, or consider the solution with equal electric charges but independent angular momenta given in~\cite{Chow:2007ts}. We would like to comment further on five-dimensional black holes, going beyond $S^5$ compactifications of type IIB supergravity. The imprint of $S^5$ in the five-dimensional supergravity considered in this paper is found in the specific number of vector multiplets (three, gauging the ${\rm U}(1)^3\subset{\rm SO}(6)$ isometry group of $S^5$) and in the form of the $C_{IJK}$ tensor controlling the matter couplings (see Appendix \ref{app:OnShActionsAdS5} for details). Multi-charge, supersymmetric AdS$_5$ black holes are known more generally in five-dimensional Fayet-Iliopoulos gauged supergravity with an arbitrary number $n_V$ of vector multiplets and an arbitrary choice of the tensor $C_{IJK}$, $I ,J,K=1,\ldots,n_V+1$ (under the assumption that the scalar manifold is symmetric) \cite{Gutowski:2004yv,Kunduri:2006ek}. The solutions carry angular momenta $J_1^\star,J_2^\star$ and $n_V+1$ electric charges $Q_I^\star$. An entropy function whose Legendre transform should reproduce the Bekenstein-Hawking entropy of these black holes has been conjectured in \cite[Appendix A]{Hosseini:2018dob} and reads \begin{equation}\label{entropyfctSE} I = \frac{\pi}{24}\,\frac{C_{IJK}\varphi^I \varphi^J \varphi^K}{\omega_1\,\omega_2}\,. \end{equation} In Appendix~\ref{app:Leg_transf} we prove that this is indeed true, provided the chemical potentials satisfy the constraint \begin{equation}\label{constraintFIsugra} \omega_1+\omega_2 - 3\bar{X}_I \varphi^{I} = \mp\, 2\pi i\,, \end{equation} and in addition one demands reality of the Legendre transform. Here we give the \hbox{saddle} point expressions for the BPS chemical potentials of the black holes in \cite{Gutowski:2004yv}, which carry one angular momentum $ J_1^\star = J_2^\star$ and $n_V+1$ electric charges $Q_I^\star$. Generalizing our formulae \eqref{BPS_Little_Potentials}, we infer that these BPS chemical potentials read: \begin{align}\label{conjecture} \omega_1^\star = \omega_2^\star \equiv \tfrac{1}{2}\,\omega^\star & = - \frac{\pi}{1+\alpha_1 }\bigg[ \frac{ \alpha_2 }{ \sqrt{ 4 \left(1+\alpha_1 \right)\alpha_3 - \alpha_2^2 }} \pm i \bigg] , \notag \\[3mm] \varphi^{I\,\star} &= \frac{9\pi}{1+\alpha_1 }C^{IJK}q_J\bigg[ \frac{\alpha_2\,\bar X_K - (1+\alpha_1)\,q_K}{\sqrt{ 4 \left(1+\alpha_1 \right)\alpha_3 - \alpha_2^2 }} \pm i \,\bar X_K \bigg] \, , \end{align} where $\bar{X}_K$ are the values taken by the scalar fields in the supersymmetric AdS$_5$ solution, while the real parameters $q_I$, $\alpha_1=\frac{27}{2}C^{IJK}\bar X_I \bar X_J q_K$, $\alpha_2= \frac{27}{2}C^{IJK}\bar X_I q_J q_K$, $\alpha_3=\frac{9}{2}C^{IJK}q_Iq_Jq_K$ control the solution in \cite{Gutowski:2004yv}. In Appendix~\ref{app:Leg_transf} we show that the expressions \eqref{conjecture} are indeed saddles of the extremization problem leading to the black hole entropy. The entropy function \eqref{entropyfctSE} has been reproduced from a dual SCFT$_4$ viewpoint by taking the Cardy-like limit of the superconformal index in \cite{Amariti:2019mgp}. Some of the black hole solutions of \cite{Gutowski:2004yv,Kunduri:2006ek} may uplift to type IIB supergravity on Sasaki-Einstein manifolds and thus have an SCFT$_4$ dual, however the uplift is only known for the case of $S^5$, or in a single-charge limit where the black holes are solutions to minimal gauged supergravity. This is in part due to the fact that a consistent truncation of type IIB supergravity on five-dimensional Sasaki-Einstein manifolds including all Kaluza-Klein vector fields gauging the relevant internal symmetries has not been found to date. For these reasons, the details of the matching with the dual SCFT are not fully under control yet. In addition, the non-extremal solutions which are the starting point of our limiting procedure are only known within the ${\rm U}(1)^3$ theory discussed here. Clearly it would be interesting to construct new asymptotically AdS black holes in five-dimensional supergravity (for instance relaxing the assumption that the scalar manifold is symmetric), study their uplift to type IIB supergravity on different Sasaki-Einstein manifolds, and extend the results of the present paper by investigating their BPS limit. Similar considerations can be made for black holes in spacetime dimension different than five. Although constructing the full asymptotically AdS$_d$ solution would be desiderable, for the purpose of studying the extremization principle it may be sufficient to focus on the simpler near-horizon geometry, upon identifying the near-horizon counterpart of our BPS limit. This approach, once promoted to the full ten- or eleven-dimensional supergravity theory, may also lead to a generalization of the extremization principle of \cite{Gauntlett:2019roi,Hosseini:2019ddy,Kim:2019umc} to the case of rotating horizons with no magnetic charge. In five dimensions, there are also recently found black holes that are just asymptotically {\it locally} AdS$_5$, since the $S^3$ spatial part of the conformal boundary is squashed \cite{Blazquez-Salcedo:2017ghg,Cassani:2018mlh,Bombini:2019jhp}. It has been shown in \cite{Cassani:2018mlh} that the expression of the Bekenstein-Hawking entropy of these black holes in terms of the charges is the same as in the round $S^3$ case, provided one uses the Page electric charges of the solution. Hence the entropy function should also be the same, provided the electric potentials $\varphi^I$ are those conjugate to the Page charges. It would be interesting to show this from the on-shell action by implementing the BPS limit discussed here. \section*{Acknowledgments} We would like to thank Francesco Benini, Nikolay Bobev, Guillaume Bossard and Chiara Toldo for interesting discussions. DC would like to thank Alejandro Cabo-Bizet, Dario Martelli and Sameer Murthy for the collaboration that led to~\cite{Cabo-Bizet:2018ehj} and comments on the manuscript.
\section{Introduction} Perinatal asphyxia---i.e., the inability of a newborn to breath spontaneously after birth---is responsible for one-third of newborn mortalities and disabilities worldwide \cite{who2017}. The high cost and expertise required to use standard medical devices for blood gas analysis makes it extremely challenging to conduct early diagnosis in many parts of the world. In this work, we develop and analyze neural transfer models \cite{bengio2012deep} for predicting perinatal asphyxia based on the infant cry. We ask the question of whether such models could be more accurate and robust than previous approaches that primarily focus on classical machine learning algorithms due to limited data. Clinical research has shown that there exists a significant alteration in the crying patterns of newborns affected by asphyxia \cite{michelsson1977pain}. The unavailability of reasonably-sized clinically-annotated datasets limits progress in developing effective approaches for predicting asphyxia from cry. The Baby Chillanto Infant Cry database \cite{reyes2004system}, based on 69 infants, remains the only known available database for this task. Previous work using this data has mainly focused on classical machine learning methods or very limited capacity feed-forward neural networks \cite{reyes2004system,onu2014harnessing}. We take advantage of freely available large datasets of adult speech to investigate a transfer learning approach to this problem using deep neural networks. In numerous domains (e.g., speech, vision, and text) transfer learning has led to substantial performance improvements by pre-training deep neural networks on some different but related task \cite{howard2018universal,oquab2014learning,karpathy2014large}. In our setting, we seek to transfer models trained on adult speech to improve performance on the relatively small Baby Chillanto Infant Cry dataset. Unlike newborns---whose cry is a direct response to stimuli---adults have voluntary control of their vocal organs and their speech patterns have been influenced, over time, by the environment. We nevertheless explore the hypothesis that there exists some underlying similarity in the mechanism of the vocal tract between adults and infants, and that model parameters learned from adult speech could serve as better initialization (than random) for training models on infant speech. Of course, the choice of source task matters. The task on which the model is pre-trained should capture variations that are relevant to those in the target task. For instance, a model pre-trained on a speaker identification task would likely learn embeddings that identify individuals, whereas a word recognition model would likely discover an embedding space that characterizes the content of utterances. What kind of embedding space would transfer well to diagnosing perinatal asphyxia is not clear a priori. For this reason, we evaluate and compare 3 different (source) tasks on adult speech: speaker identification, gender classification and word recognition.\cut{We also consider tasks that are not necessarily based on human speech, such as environmental sound classification.} We study how different source tasks affect the performance, robustness and nature of the learned representations for detecting perinatal asphyxia. \xhdr{Key results} On the target task of predicting perinatal asphyxia, we find that a classical approach using support vector machines (SVM) represents a hard-to-beat baseline. Of the 3 neural transfer models, one (the word recognition task) surpassed the SVM's performance, achieving the highest unweighted average recall (UAR) of 86.5\%. By observing the response of each model to different degrees and types of noise, and signal loss in time- and frequency-domain, we find that all neural models show better {\em robustness} than the SVM. \begin{figure*}[t] \centering \includegraphics[width=.8\textwidth]{figs/model_diagram.png} \caption{Structure of learning pipeline. Weights of feature extraction stage were pre-loaded during transfer learning.} \label{fig:model_diagram} \end{figure*} \section{Related Work} \label{related_work} \xhdr{Detecting pathologies from infant cry} The physiological interconnectedness of crying and respiration has been long appreciated. Crying presupposes functioning of the respiratory muscles \cite{lagasse2005assessment}. In addition, cry generation and respiration are both coordinated by the same regions of the brain \cite{lester1990colic, zeskind2001analysis}. The study of how pathologies affect infant crying dates back to the 1970s and 1980s with the work of Michelsson et al \cite{michelsson1977pain, michelsson1977sound, michelsson2002cry}. Using spectrographic analysis, it was found that the cries of asphyxiated newborns showed shorter duration, lower amplitude, increased higher fundamental frequency, and significant increase in ``rising'' melody type. \xhdr{The Chillanto Infant Cry database} In 2004, Reyes et al.\@ \cite{reyes2004system} collected the Chillanto Infant Cry database with the objective of applying statistical learning techniques in classifying deafness, asphyxia, pain and other conditions. \cut{Cry recordings from 69 subjects were broken into 1 second segments to form a database of 1,389 examples. }The authors experimented with audio representations as linear predictive coefficients (LPC) and mel-frequency cepstral coefficients (MFCC), training a time delay neural network as the classifier. They achieved a precision and recall of 72.7\% and 68\%. Building on this work, Onu et al.\@ \cite{onu2014harnessing} improved the precision and recall to 73.4\% and 85.3\%, respectively, using support vector machines (SVM). It is worth noting that both works represent an overestimate of performance as authors split train/test set by examples, not by subjects. \xhdr{Weight initialization and neural transfer learning} Modern neural networks often contain millions of parameters, leading to highly non-linear decision surfaces with many local optima. The careful initialization of the weights of these parameters has been a subject of continuous research, with the goal of increasing the probability of reaching a favorable optimum \cite{glorot2010understanding, he2015delving}. Initialization-based transfer learning is based on the idea that instead of hand-designing a choice of random initialization, the weights from a neural network trained on similar data or task could offer better initialization. This pre-training could be done in an unsupervised \cite{erhan2010does} or supervised \cite{yosinski2014transferable, bengio2007greedy} manner. \begin{table}[b] \caption{Source tasks and corresponding datasets used in pre-training neural network. Size: number of audio files.} \label{table:source_task} \centering {\small \begin{tabular}{p{1.5cm}p{4.5cm}p{0.7cm}} \toprule Dataset & Description & Size \\ \midrule VCTK & Speaker Identification. 109 English speakers reading sentences from newspapers. & 44K \\ \midrule SITW & Gender classification. Speech samples from media of 299 speakers. & 2K \\ \midrule Speech commands & Word recognition. Utterances from 1,881 speakers of a set of 30 words. & 65K \\ \bottomrule \end{tabular}} \end{table} \section{Methods} In this section, we describe our approach to designing and evaluating transfer learning models for the detection of perinatal asphyxia in infant cry. We present the source tasks selected along with representative datasets. We further describe pre-processing steps, choice of model architectures as well as analysis of trained models. \subsection{Tasks} \subsubsection{Source tasks} We choose 3 source tasks --- speaker identification, gender classification, word recognition --- \cut{and 3 non-speech source tasks (audio event recognition, environmental sound classification)} with corresponding audio datasets: VCTK \cite{veaux2017}, Speakers in the Wild (SITW) \cite{mitchell2016}, and Speech Commands \cite{warden2018} \cut{AudioSet \cite{gemmeke2017}, and ESC-50 \cite{piczak2015}}. Table \ref{table:source_task} briefly describes the datasets used for each task. \subsubsection{Target task: Perinatal asphyxia detection} Our target task is the detection of perinatal asphyxia from newborn cry. We develop and evaluate our models using the Chillanto Infant Cry Database. The database contains 1,049 recordings of normal infants and 340 cry recordings of infants clinically confirmed to have perinatal asphyxia. Audio recordings were 1-second long audio and sampled at frequencies between 8kHz to 16kHz with 16-bit PCM encoding. \subsection{Pre-processing} All audio samples are pre-processed similarly, to allow for even comparison between source tasks and compatibility with target task. Raw audio recordings are downsampled to 8kHz and converted to mel-frequency cepstral coefficients (MFCC). To do this, spectrograms were computed for overlapping frame sizes of 30 ms with a 10 ms shift, and across 40 mel bands. For each frame, only frequency components between 20 and 4000 Hz are considered. The discrete cosine transform is then applied to the spectrogram output to compute the MFCCs. The resulting coefficients from each frame are stacked in time to form a spatial ($40 \times 101$), 2D representation of the input audio. \subsection{Model Architecture and Transfer Learning} We adopt a residual network (ResNet) \cite{he2016deep} architecture with average pooling, for training. Consider a convolutional layer that learns a mapping function $F(x)$ of the input, parameterized by some weights. A residual block adds a shortcut or skip connection such that the output of the layer is the sum of $F(x)$ and the input $x$, i.e., $y = F(x) + x$. This structure helps control overfitting by allowing the network to learn the identity mapping $y=x$ as necessary and facilitates the training of even deeper networks. ResNets represent an effective architecture for speech, achieving several state-of-the-art results in recent years \cite{tang2018deep}. To assure even comparison across source tasks, and to facilitate transfer learning, we adopt a single network architecture: the {\em res8} as in Tang et al.\@ \cite{tang2018deep}. The model takes as input a 2D MFCC of an audio signal, transforms it through a collection of 6 residual blocks (flanked on either side by a convolutional layer), employs average pooling to extract a fixed dimension embedding, and computes a k-way softmax to predict the classes of interest. Fig \ref{fig:model_diagram} shows the overall structure of our system. Each convolutional layer consists of 45, $3 \times 3$ kernels. We train the {\em res8} on each source task to achieve performance comparable with the state of the art. The learned model weights (except those of the softmax layer) are used as initialization for training the network on the Chillanto dataset. During this post-training, the entire network is tuned. \subsection{Baselines} We implement and compare the performance of our transfer models with 2 baselines. One is a model based on a radial basis function Support Vector Machine (SVM), similar to \cite{onu2014harnessing}. The other is a {\em res8} model whose initial weights are drawn randomly from a uniform Glorot distribution \cite{glorot2010understanding} i.e., according to $U(-k, k)$ where $k = \frac{\sqrt{6}}{n_i + n_o}$, and $n_i$ and $n_o$ are number of units in the input and output layers, respectively. This initialization scheme scales the weights in such a way that they are not too small to diminish or too large to explode through the network's layers during training. \subsection{Analysis} \subsubsection{Performance} We evaluate the performance of our models on the target task by tracking the following metrics: sensitivity (recall on asphyxia class), specificity (recall on normal class), and the unweighted average recall (UAR). We use the UAR on the validation set for choosing best hyperparameter settings. The UAR is a preferred choice over accuracy since the classes in the Chillanto dataset are imbalanced. \subsubsection{Robustness} \xhdr{Noise} We analyze our models for robustness to 4 different noise situations: Gaussian noise $\mathcal{N}(0,0.1)$, sounds of children playing, dogs barking and sirens. In each case, we insert the noise in increasing magnitude to the test data and monitor the impact on classification performance of the model. \xhdr{Audio length} We also evaluate the response of each model to varying lengths of audio, since in the real-world a diagnostic system must be able to work with as much data as is available. To achieve this, we test the models on increasing lengths of the test data, starting from 0.1s to the full 1s segment, in 0.1 increments. \xhdr{Frequency response} The response of the models to variations in frequency domain is important as this could reveal underlying characteristics of the data. We know as well that perinatal asphyxia alters the frequency patterns in cry. To discover what range of frequencies are most sensitive in detecting perinatal asphyxia, we conduct an ablation exercise where features extracted from a different filterbanks in the MFCC are zeroed out. We measure the response of our models by monitoring the drop in performance for the frequency ranges in each mel-filterbank. \begin{figure} \includegraphics[width=0.42\textwidth]{figs/time-dropout.png} \caption{Audio length analysis highlighting the impact of using shorter amounts of input audio on UAR performance.} \label{fig:time_analysis} \end{figure} \begin{figure} \includegraphics[width=0.45\textwidth]{figs/ablation.png} \caption{Frequency response analysis of the relative importance of different Mel filterbanks on UAR performance. Each point represents the performance after removing the corresponding Mel filterbank.} \label{fig:freq_analysis} \end{figure} \subsubsection{MFCC Embeddings} In order to further investigate the nature of the embedding learned by each model, we apply principal component analysis (PCA) to the learned final-layer embeddings for all models \cite{jolliffe2011principal}. By applying PCA, we hope to gain insight on the extent to which the embedding space captures unique information. \begin{table}[th] \caption{Performance -- mean (standard error) - of different models in predicting perinatal asphyxia. \cut The models are Support Vector Machine (SVM), a res8 network trained from random initialization (res8-no-transfer), and res8 networks pretrained on speaker identification (speaker-id-transfer), gender identification (gender-id-transfer), word recognition (word-rec-transfer), audio event recognition (event-rec-transfer) and environmental sound classification (sound-id-transfer) tasks.}} \label{table:performance} \centering {\small \begin{tabular}{lllll} \toprule Model & UAR \% & Sensitivity \% & Specificity \% \\ \midrule SVM & 84.4 (0.4) & 81.6 (0.7) & 87.2 (0.2) \\ no-transfer & 80.0 (2.5) & 71.8 (5.8) & 88.1 (0.8) \\ sc-transfer & \textbf{86.5 (1.1)} & \textbf{84.1 (2.2)} & \textbf{88.9 (0.4)} \\ sitw-transfer & 81.1 (1.7) & 72.7 (3.5) & 89.5 (0.2) \\ vctk-transfer & 80.7 (1.0) & 72.2 (2.1) & 89.1 (0.3) \\ \bottomrule \end{tabular}} \end{table} \begin{figure*}[t] \centering \includegraphics[width=0.8\textwidth]{figs/noise2.png} \caption{Performance of models under different noise conditions. } \label{fig:noise_analysis} \end{figure*} \section{Experiments} \subsection{Training details} There were a total of 1,389 infant cry samples (1,049 normal and 340 asphyxiated) in the Chillanto dataset. The samples were split into training, validation and test sets, with a 60:20:20 ratio, and under the constraint that samples from the same patients were placed in the same set. Each source task was trained, fine-tuning hyperparameters as necessary to obtain performance comparable with the literature. For transfer learning on the target task, models were trained for 50 epochs using stochastic gradient descent with an initial learning rate of 0.001 (decreasing to 0.0001 after 15 epochs), a fixed momentum of 0.9, batch size of 50, and hinge loss function. We used a weighted balanced sampling procedure for mini-batches to account for class imbalance. We also applied data augmentation via random time-shifting of the audio recordings. Both led to up to 7\% better UAR scores when training source and target models. \subsection{Performance on source tasks} Our model architecture achieved accuracies of 94.8\% on word recognition task (Speech Commands), 91.9\% on speaker identification (VCTK) and 90.2\% on gender classification (SITW). These results are comparable to previous work. See \cite{tang2018deep,arik2018neural} for reference \footnote{SITW to our knowledge has not been used for gender classification, even though this data is available}. \cut{ \begin{table}[th] \caption{Source task performance} \label{table:source_task_performance} \centering \begin{tabular}{p{2.cm}p{2.5cm}p{1.5cm}} % \toprule Dataset & Random Baseline (\%) & Test Acc. (\%) \\ \midrule VCTK & 0.9 & 22.9 \\ SITW & 50 & 87.1 \\ Speech Comm. & 8.3 & 94.2 \\ AudioSet & 0.2 & 35.9 \\ ESC-50 & 2 & 76.8 \\ \bottomrule \end{tabular} \end{table} } \subsection{Performance on target task} Table \ref{table:performance} summarizes the performance of all models on the target task. The best performing model was pre-trained on the word recognition task (sc-transfer) and attained a UAR of 86.5\%. This model also achieves the highest sensitivity and specificity 84.1\% and 88.9\% respectively. All other transfer models performed better than {\em no-transfer }, suggesting that transfer learning resulted in better or at least as good an initialization. The SVM was the second best performing model and had the lowest variance among all models in its predictions. \subsection{Robustness Analysis} In most cases, our results suggest that neural models have overall increased robustness. We focused on the top transfer model {\em sc-transfer}, {\em no-transfer} and the SVM. Figure \ref{fig:noise_analysis}, shows the response of the models to different types of noise, revealing that in all but one case the neural models degrade slower than the SVM. Results from Figure \ref{fig:time_analysis} suggest that the neural models are also capable of high UAR scores for short audio lengths, with {\em sc-transfer} maintaining peak performance when evaluated on only half (0.5s) of the test signals. From our analysis of the models' responses to filterbank frequencies (Figure \ref{fig:freq_analysis}), we observe that (i) the performance of all models (unsurprisingly) only drops in the range of the fundamental frequency of infant cries, i.e. up to 500Hz \cite{daga2011acoustical} and (ii) {\em sc-transfer} again is the most resilient model across the frequency spectrum. \subsection{Visualization of embeddings} \label{appendix:pca_analysis} Figure 5 shows cumulative variance explained by the principal components (PC) of the neural model embeddings. Whereas in {\em no-transfer}, the top 2 PCs explain nearly all variance in the data (91\%), in {\em sc-transfer} they represent only 52\%---suggesting that the neural transfer leads to an embedding that is intrinsically higher dimensional and richer than the {\em no-transfer} counterpart. \begin{figure}[t] \label{fig:pca_cum_var} \centering \includegraphics[width=.4\textwidth]{figs/pca_cum_var.png} \caption{Cumulative variance explained by all principal components (left) and the top 2 principal components on the Chillanto test data (right) based on embeddings of {\em no-transfer} model.} \end{figure} \section{Conclusion and Discussion} We compared the performance of a residual neural network (ResNet) pre-trained on several speech tasks in classifying perinatal asphyxia. Among the transfer models, the one based on a word recognition task performed best, suggesting that the variations learned for this task are most analogous and useful to our target task. The support vector machine trained directly on MFCC features proved to be a strong benchmark, and if variance in predictions was of concern, a preferred model. The SVM, however, was clearly less robust to pertubations in time- and frequency-domains than the neural models. This work reinforces the modelling power of deep neural networks. More importantly, it demonstrates the value of a transfer learning approach to the task of predicting perinatal asphyxia from the infant cries---a task of critical relevance for improving the accessibility of pediatric diagnostic tools. \bibliographystyle{IEEEtran}
\section{Introduction} Minimally invasive surgery is characterized by a restricted view of the surgical target. In many such procedures, the only way to observe the surgical field is with endoscopic vision on an external display, which is commonly associated with an impaired depth perception. This situation requires an excellent hand-eye coordination, exceptional skills and dexterity with instruments, which should be trained with surgical simulators before performing it on patients. On such simulators, the photo-realistic fidelity and depth perception is a key feature that can improve the transfer ratio of trainees to real surgeries. However, most virtual or physical simulators lack such properties, due to limited capabilities of modelling realistic textures or by current material that is used for surgical simulation. In our previous work \cite{EngelhardtMICCAI}, a deep learning-based concept to tackle the issue of photo-realism of surgical simulations was presented. The approach was coined \textit{hyperrealism}, which is able to map patterns learned from intraoperative video sequences onto the video stream captured during simulated surgery on anatomical replica. Used within an augmented reality setting, \textit{hyperrealism} is defined as a new augmented reality paradigm on the Reality-Virtuality continuum \cite{milgram_taxonomy_1994}, which is closer to `full reality' in comparison to other concepts where artificial overlays are superimposed on a video frame. In a hyperrealistic surgical training environment, the parts of the simulated environment that look unnatural are replaced by realistic appearances. Parts that already look natural ideally stay the same. It is shown that such an approach greatly improves reproduction of the intraoperative appearance during training and therefore makes minimally-invasive surgical training more realistic. The approach is in principle also employable for enhancing photo-realism of virtual training simulators, as shown by Luengo et al. \cite{Luengo2018SurRealES} who used a deep learning approach that relies on style transfer. Methodologically, our proposed approach is based on so-called unpaired deep image-to-image transformation methods \cite{Zhu2017}. The underlying concept is to use adversarial training of a generator and a discriminator network, and to employ a cycle between the two input domains to generate realistic looking images. The key to the success of such generative adversarial networks (GANs) is the idea of an adversarial loss that forces the generated images to be, in principle, indistinguishable from real images. Such concepts are able to generate realistic representations of phantoms learned from real intraoperative endoscopic sequences \cite{EngelhardtMICCAI}. Conditioned on frames from the surgical training process, the learned models are able to generate impressive results by transforming unrealistic parts of the image (e.g.\ the uniform phantom texture is replaced by the more heterogeneous texture of the tissue). However, the traditional CycleGAN approach \cite{Zhu2017} neither enforces temporal coherence, which was incorporated in our previous contribution \cite{EngelhardtMICCAI}, nor enforces a stereo pair to be consistent. A recent work published at CVPR 2018 \cite{Chen_2018_CVPR} was the first to address stereoscopic neural style transfer. Approaches beforehand only dealt with monocular style transfer. The authors showed that independent application of stylization approaches to left and right views of stereoscopic images does not preserve the original disparity consistency in the final stylization results, which causes 3D fatigue to the viewers on a 3D display \cite{Chen_2018_CVPR}. Chen et al. \cite{Chen_2018_CVPR} incorporated a disparity loss into the style loss function that is employable in virtual scenes with known disparity information. In this contribution, we want to tackle the same issue for physical surgical simulators, i.e.\ generation of more consistent stereo-images without relying on ground truth disparity, which is more complicated to obtain in the medical domain. In order to achieve this, a novel cross-domain conditional GAN is introduced in the following. \begin{figure}[t] \begin{center} \includegraphics[width=\linewidth]{Architecture1.pdf} \end{center} \caption[] { \label{fig:Architecture} Proposed architecture that shows the $X$$\to$$Y$$\to$$X$-cycle for a stereo pair $(x_l,x_r)$. In contrast to classical generators, each generator $G$ and $F$ takes two inputs and generates one output. The second input image, e.g. $y_W$, $x_T$, is taken from the other domain and can be chosen randomly. To enable a better consistency, the output of $G$, which is $y'_l$, is chosen as a second input in the generation cycle of the right image. Discriminators $D_y$ and $D_x$ evaluate real and fake images marked in orange and green. } \end{figure} \section{Methods} Given unpaired training samples in two image domains $X$ and $Y$, the CycleGAN model proposed by Zhu et al.\ \cite{Zhu2017} learns a mapping (generator) $G:X \to Y$ and the reverse mapping $F:Y \to X$. These generators are trained to produce outputs that are indistinguishable from real images in the respective target domains for discriminator networks $D_Y$ and $D_X$. Additionally, the consistency of the cyclic mappings $F(G(x))$ and $G(F(y))$ with the respective inputs $x\in X$ and $y \in Y$ is enforced by using the $L_1$-norm. The proposed method builds upon this idea to learn a style transfer between an image stream from the source domain $X$ of \textit{surgical simulation} to a target domain $Y$ of \textit{intraoperative surgeries} and vice versa in the absence of paired endoscopic image samples. \subsection{Cross Domain Conditional GAN} For our task, the forward generator $G:X \to Y$ of the standard CycleGAN tended to create unrealistic colors and artifacts in the generated intraoperative scenes. To overcome this, we introduce \textit{cross domain conditional GANs}. Traditional \textit{conditional GANs} \cite{Mirza2014} learn a mapping from an observed input domain $X$ and random noise $Z$ to the output domain $Y$, $G : X \times Z \to Y$. Isola et al. \cite{Isola2016} found the additional random noise vector to be ineffective and dropped it from the paired image translation predecessor of the unpaired CycleGAN as well as from the CycleGAN itself (in contrast to the concurrent DualGAN \cite{Yi2017}). We propose to re-introduce an additional input, but to use a sample $y$ from the target domain distribution $p_Y$ instead of random noise to guide the training of the generator $G : X \times Y \to Y$ to realistic coloring and preservation of detail (and analogously $F:Y \times X \to X$). For our stereo image translation task, we use a random sample $y_W \sim p_Y$ for the translation of the left image $x_l$ of the stereo pair and the generated output of the generator $y'_l:=G(x_l,y_W)$ for generating the right image $y'_r:=G(x_r,y'_l)$ to additionally support the generation of consistently colored stereo pairs, see Figure~\ref{fig:Architecture}. \subsection{Network Architectures} The used network architectures of the generators and discriminators are largely the same as in the original CycleGAN approach \cite{Zhu2017}. A TensorFlow implementation provided on GitHub\footnote{https://github.com/LynnHo/CycleGAN-Tensorflow-PyTorch-Simple} was used as the basis and extended. All discriminators take the complete input images, which is different from the $70 \times 70$ PatchGAN approach \cite{Zhu2017}. For the generators, 7 instead of 9 residual blocks are used, because experiments on our data showed better results for this configuration. Moreover, the generators were changed to handle a 6-channel input. \section{Evaluation} A minimally invasive mitral valve repair simulator (MICS MVR surgical simulator, Fehling Instruments GmbH \& Co. KG, Karlstein, Germany) was extended with patient-specific silicone mitral valves. In comparison to other simulators, the valve replica consist of all anatomical parts, i.e. the annulus, the leaflets, the chordae tendineae and the papillary muscles. Details on the valve model production are elaborated on in a previous work \cite{Engelhardt_IJCARS}. An expert segmented pathological mitral valves on the end-systolic time step from echocardiographic data, which are represented as virtual models. From these models, 3D printable molds and suitable prosthetic rings were automatically generated and 3D-printed. Subsequently, 15 silicone valves were manufactured that could be anchored in the simulator onto a custom valve holder. We asked different experts and trainees to perform mitral valve repair techniques (annuloplasty, triangular leaflet resection, neo-chordae implantation) on these valves and recorded the endoscopic video stream \cite{Engelhardt_ICVTS}. \begin{figure}[t] \begin{center} \includegraphics[width=\linewidth]{Example_Real.pdf} \end{center} \caption[] { \label{fig:Real} Mono- and stereoscopic examples from mitral valve repair. The scenes are diverse: with or without prosthetic ring, sutures, instruments and needles, blood etc.} \end{figure} \subsection{Data and Training of Network} In total, approx.\ 240,000 stereo pair frames from the surgical training procedures were captured in full HD resolution or larger, which sums up to 9h of video material. Most of the videos were captured at 25 fps. Due to change in recording equipment, a subset of approx.\ 20,000 stereo frames was acquired at 1 fps. The training data for the network was sampled every 240th frame or every 40th frame, respectively. In total, the network training set consists of 1400 stereo pair frames from the training with the surgical phantom. To avoid overfitting of the model, valve replica shown in videos for network training were not used for network testing. Intraoperatively, more than 620,000 stereo pairs were captured during three minimally invasive mitral valve repair surgeries. The frame rate varied between 60 fps and 25 fps. Scenes where the valve itself was not visible were neglected. For network training, a stereo pair after each 120th or 240th frame was sampled retrospectively from these videos, which sums up to approx.\ 1200 stero pairs for network training. The scenes are highly diverse, as the valve's appearance drastically changes over time (e.g. due to cutting of tissue, implanting sutures and prostheses, fluids such as blood and saline solution), see Fig. \ref{fig:Real}. Furthermore, occlusions or lens fogging often disturbed the recording. Besides the just described stereo data collection, we pre-trained our network on a monoscopic data base. The strength of our proposed method is that, it does not solely rely on a stereo pair as input, but can be also trained un-stereo-paired. The monoscopic data was put together from recordings during four open mitral valve surgeries with a monocular endoscope, in which case fewer lens occlusions and less fogging occurred. For the phantom recordings, half of the frames used for the monoscopic pre-training are also represented in the stereo data set. In total, the source and target domain consisted of approx.\ 1500 single frames each. All monoscopic frames or each left and right image of the pair were randomly cropped and re-scaled to 256 $\times$ 512. Further data augmentation was performed by random horizontal flipping and intensity re-scaling. For all the experiments, the consistency loss was weighted with $\lambda = 20$. The Adam solver with a batch size of 1 and a learning rate of 0.0001 without linear decay to zero was used. Similar to Zhu et al. \cite{Zhu2017}, the objective was divided by 2 while optimizing $D$, which slows down the rate at which $D$ learns relative to $G$. Discriminators are updated using a history of 50 generated images rather than the ones produced by the latest generative networks \cite{Zhu2017}. The CycleGAN network was pre-trained for 40 epochs on the monoscopic data and then trained on the left image of the stereo pair for another 40 epochs. Similarly, our proposed network was trained on 40+40 epochs. For using the proposed network in the monoscopic case, $y_W$ is randomly chosen from the other domain in the $X$$\to$$Y$$\to$$X$ cycle and $x_W$ accordingly in the reverse cycle. \subsection{Evaluation} The most important factors for the proposed application are related to perception. Therefore, we first evaluated whether three domain experts (cardiac surgeons who each at least assisted mitral valve repair surgeries) and three non-experts (medical students) are able to perceive depth on a 3D monitor on interlaced stereo pairs. Secondly, we asked the surgeons how real the generated intraoperative stereo frames appear from their experiences. All answers had to be given on a 5-point Likert Scale, with 5 being the answer with the highest agreement. Related to this, we found it crucial to ask clinical questions to the domain experts in order to show the reliability of the transformation, which is associated with a change in appearance of the scene. Reliability of the transformation requires the scene to not change too drastically, meaning that neither the shape of objects should be altered, nor additional parts should be added or taken away. The surgeons were asked 1) to diagnose the pathology of the presented valve, 2) to name the surgical instrument visible in the scene, and 3) to state which phase of the surgery is presented. We evaluated these questions by extracting 15 random samples from our test set; each sample was shown in interlaced format on a 3D monitor. For each frame, the corresponding result from the original CycleGAN was shown directly afterwards, therefore enabling a direct comparison between our results and the baseline. At the start of the experiments we asked the participants of the study to rate the depth for two realistic stereo frames from the surgical phantom, in the following referred to as \textit{Test1} and \textit{Test2} example. \section{Results} \begin{figure}[t] \begin{center} \includegraphics[width=\linewidth]{Examples1.pdf} \end{center} \caption[] { \label{fig:VSBaseline} Examples from CycleGAN baseline \cite{Zhu2017} and our proposed method. } \end{figure} Example results of our method in comparison to the baseline CycleGAN are provided in Fig. \ref{fig:VSBaseline}. A rough visual analysis shows that the structure of the valves and of the instruments are better preserved in our method. Furthermore, the left and right image of the stereo pair appeared to be very consistent. The same was confirmed by the user study. Fig. \ref{fig:Diagr} illustrates the ratings by the non-experts for depth perception for each of the presented scenes. The median for each participant on our results in comparison to the baseline are $3$ to $2$, $4$ to $3$ and $3$ to $3$, which means that our method was clearly favored over the baseline and that the participants had a three-dimensional impression from the synthesized stereo images. Fig. \ref{fig:Diagr} also shows that depth perception even on real images of the silicone phantom is not assessed as completely perfect (\textit{Test1} and \textit{Test2}). These ratings help to relate the assessment of the generated stereo images to samples taken from the real world. In 39 instances, our method was preferred over the baseline by the participants (10 instances are better by $\Delta2$ and 29 are better by $\Delta1$). In three instances, both methods were assessed as equally good and in three other instances, our method was rated worse in stereo consistency. Considering the evaluation by the expert, a similar picture can be drawn. The respective diagram on assessment of depth perception is provided in Fig. \ref{fig:Diagr}. In 35 instances, our method was preferred over the baseline by the experts (1 instance better by $\Delta3$, 8 instances better by $\Delta2$ and 26 instances better by $\Delta1$). In seven cases, both methods were assessed as equal and in three other instances, our method was assessed as worse in comparison to the baseline. When referring to the realism, our method is also superior, and was conceived as less artifact-prone and more related to an intraoperative scene. Fig. \ref{fig:Diagr} illustrates the ratings by the experts. In 37 cases, our method was preferred over the baseline by the experts (5 instances better by $\Delta3$, 10 instances better by $\Delta2$ and 22 instances better by $\Delta1$). Pathology assessment on the synthesized stereo frames yielded a good result. 37 of 45 correct decisions were made solely by watching the generated stereo pair. Furthermore, in 42 of 45 cases, the correct instrument that is shown in the scene, was named. Please note that in some instances, the instruments are only visible by a small margin on the actual clipped image. Moreover, motion artifacts complicated the assessment in 2 cases (example 13, 14). In 43 of 45 assessments, the right surgical phase has been identified by the participants. \begin{figure}[t] \begin{center} \includegraphics[width=\linewidth]{Diagramm3.pdf} \end{center} \caption[] { \label{fig:Diagr} Expert and non-expert ratings for depth perception and realism. Symbols indicate the rating per participant of the generated samples by cross-domain conditional GAN. Arrows show the difference to CycleGAN \cite{Zhu2017}.} \end{figure} \section{Discussion} To the best of our knowledge, the presented approach is the first to address stereo-endoscopic scene transformation for minimally-invasive surgical training. In this paper, we propose a novel cross domain conditioning GAN, which is superior in synthesizing consistent and more realistic stereo data in comparison to the unpaired CycleGAN approach \cite{Zhu2017}. Due to conditioning on a second image, which is drawn from the target domain (real or generated content), the network is also able to generate images with less artifacts and with more realistic color, heterogeneous textures, specularities and blood. The reliability of the generated samples was indirectly assessed by asking clinically relevant end points considering visible pathology, surgical instrument and surgical phase. We want to especially emphasize that almost all of the questions could be correctly answered with high confidence. In general, we decided against the conduction of a Visual Turing Test, as some shape-related features in the scene (e.g.\ a personalized ring shape instead of a standard commercial ring) would have been easily identified by an expert surgeon. Future work includes usage of the presented approach together with depth sensing technologies which are currently not applicable during surgery due to sterilization restrictions. The acquired depth information can be leveraged as ground truth data for training disparity estimation models from transformed mono- or stereo-endoscopic images.
\section{Introduction} \noindent The 1998 discovery of accelerating cosmic expansion gave rise to a theoretical explanation by a small non-zero cosmological constant(CC). At first the magnitude of the CC seemed exceedingly small when compared with the Planck scale. \bigskip \noindent Five years earlier, 't Hooft \cite{Hooft} had made the stunning suggestion that the number of degrees of freedom for gravity in (3+1) spacetime is the same as the number of degrees of freedom for quantum field theory in (2+1) spacetime. It did not take long \cite{CKN} to try to connect these two observations by pointing out that the usual calculation of the cosmological constant in quantum field theory had not taken account of 't Hooft's drastic reduction in the number of gravitational degrees of freedom. The initial work did not lead to the correct equation of state $\omega=p/\rho$ for the dark energy\cite{Hsu}. This led to an interesting modification \cite{Li,NO2005,NOS2019} which provides the jumping off point here. \bigskip \noindent There are some puzzles remaining in this approach \cite{KimLeeKim} but since it makes dramatic progress towards the magnitude of the CC it is worth asking whether it can gain some traction in handling the equally vexing questions surrounding cyclic cosmology which confronts the Tolman Entropy Conundrum(TEC). This will be discussed in the present paper. \bigskip \noindent As we shall discuss in the next section, the holographic principle dictates that we take care to choose cutoffs such that they do not allow states which lie inside their own Schwarzschild radius. This imposes strong constraints which dramatically modify how we approach calculations in quantum gravity. \section{IR and UV Cutoffs} \noindent The na\"{i}ve estimate of the cosmological constant from quantum field theory (QFT) uses the vacuum energy from the 0-point function and results in \begin{equation} \Lambda_{QFT} \sim \int^{M_{Planck}} d^3k \sqrt{k^2+m^2} \sim M_{Planck}^4 \label{CC} \end{equation} so that, using the reduced Planck mass $M_{Planck} \sim 10^{18}$GeV, one estimates \begin{equation} \Lambda_{QFT} \sim 10^{72} (GeV)^4 \equiv 10^{108} (eV)^4 \label{CC2} \end{equation} to be compared with the observational value \begin{equation} \Lambda_{Obs} \sim 10^{-12} (eV)^4 \label{CC3} \end{equation} displaying the 120 orders of magnitude discrepancy between theory, $\Lambda_{QFT}$, and experiment, $\Lambda_{Obs}$. It is fair to say that before the advent \cite{Hooft} of the holographic principle, this discrepancy was simply described as the largest error in theoretical physics and defied any explanation. Employing the holographic principle, however, the expression in Eq.(\ref{CC}) for $\Lambda_{QFT}$ includes a significant overestimate of the number of degrees of freedom. The point is that the UV cutoff is really much less than $M_{Planck}$. Let us denote this ultraviolet cutoff for gravity by $M_{UV}$ and the infra-red cutoff by $M_{IR} = L_{IR}^{-1}$ where $L_{IR}$ is the size of the system. \bigskip \noindent The UV cutoff in the gravitational sector in Eq.(\ref{CC}) must be reduced to $10^{-30} M_{Planck}$ if the calculation is to be consistent with observation. That such a dramatic reduction is feasible is testament to the power of the holographic principle. \bigskip \noindent According to the holographic principle, the volume $L_{IR}^3$ occupied by the effective field theory describing gravity must satisfy that its entropy is less than that of a black hole of radius $L_{IR}$. This requires the inequality \begin{equation} L_{IR}^3 M_{UV}^3 < L_{IR}^2 M_{Planck}^2 \label{holo1} \end{equation} which implies a scaling law \begin{equation} L_{IR} \propto \left( \frac{1}{M_{UV}^3} \right) \label{scaling} \end{equation} \bigskip \noindent Even Eqs. (\ref{scaling}) is insufficiently strong to avoid disallowed states whose Schwarzschild radius exceeds $L_{IR}$. To see this, consider the effective field theory at a temperature satisfying \begin{equation} M_{IR} \ll T < M_{UV} \label{T} \end{equation} In the volume $L_{IR}^3$ the thermal energy $E$ and entropy $S$ are given by $E=L_{IR}^3 T^4$ and $S=L_{IR}^3 T^3$ respectively. If we saturate the inequality of Eq.(\ref{holo1}) we find a system with Schwarzshild radius $R_S$ given by \begin{equation} R_S = \frac{E}{M_{Planck}^2}= L_{IR} (L_{IR} M_{Planck})^{\frac{2}{3}} \gg L_{IR} \label{Schwarzschild} \end{equation} which confirms that Eq.(\ref{scaling}) is insufficiently strong to exclude states whose Schwarzschild radius exceeds the size of the box. \bigskip \noindent To exclude all states which lie within their Scwarzschild radius requires that one impose the stronger inequality \begin{equation} L_{IR}^3 M_{UV}^4 \leq L_{IR} M_{Planck}^2 \label{holo2} \end{equation} which implies that \begin{equation} L_{IR} \propto \left( \frac{1}{M_{UV}^2} \right) \label{scaling2} \end{equation} which is much stronger than Eq.(\ref{scaling}). When Eq.(\ref{holo2}) is saturated the maximum entropy $S_{max}$ falls short of the black hole entropy $S_{BH}$ by \begin{equation} S_{max} = S_{BH}^{\frac{3}{4}} \label{Smax} \end{equation} The significant difference between $S_{max}$ and $S_{BH}$ resides in states which are not describable by conventional quantum field theory. Therefore, we do not insist on Eq.(\ref{Smax}) but allow $S_{max}=S_{BH}$. \bigskip \noindent However, there remains a fatal flaw in the discussion so far as the alert reader may have noticed. The point it that by using the constraint in Eq.(\ref{scaling2}) the cosmological constant $\Lambda$ develops a dependence on the FLRW scale factor $a(t)$ of the form \begin{equation} \Lambda \propto \left( \frac{1}{a(t)^3} \right) \label{badL} \end{equation} which uses the fact that $L_{IR} \propto a(t)^{\frac{3}{2}}$. \bigskip \noindent But the scaling of Eq.(\ref{badL}) means that the dark energy and matter terms on the right-hand-side of the Friedmann expansion equation behave similarly and that therefore the dark energy has equation of state $\omega_{DE}=p/\rho = 0$ corresponding to pressureless dust rather than $\omega_{DE} < -\frac{1}{3}$ as necessary for accelerated expansion. \bigskip \noindent The holographic approach to dark energy thus appeared doomed until the appearance of paper\cite{Li} which made an interesting proposal of how to proceed more successfully. The idea is to replace the radius of the visible universe by the future event horizon $L_{IR}=R_h$ as the infrared cutoff given by \begin{equation} R_h = a \int_t^{\infty} \frac{dt}{a} = a \int _a^{\infty} \frac{da}{H a^2} \label{Rh} \end{equation} This future event horizon is the boundary of the volume a fixed observer may eventually observe. \bigskip \noindent Writing \begin{equation} \rho_{DE} = 3 c^2 M_{Planck}^2 L_{IR}^{-2} \label{rhoDE} \end{equation} and assuming dominance by dark energy in the Friedmann expansion equation \begin{equation} H^2 = \frac{1}{3 M_{Planck}^2} \rho_{DE} \label{Friedmann} \end{equation} we find that \begin{equation} R_h H = c \label{RhH} \end{equation} and consistency requires with a new normalisation that \begin{equation} \frac{1}{H} = \left( \frac{\alpha}{ca} \right) a^{\frac{1}{c}} \label{1overH} \end{equation} which means that the equation of state $\omega=p/\rho$ satisfies \begin{equation} - 3 (1 + \omega) = -2 (1 - \frac{2}{c}) \end{equation} which means that \begin{equation} \omega = - \frac{1}{3} - \frac{2}{3c} \label{omegaDE} \end{equation} in which $c > 0$. \bigskip \noindent From Eq.(\ref{omegaDE}) we see that $\omega < - \frac{1}{3}$ as required for accelerated expansion and that $\omega = -1$ when $c=1$, corresponding to a cosmological constant. \bigskip \noindent Fits to the observational data tend to favour $c \leq 1$ corresponding to $\omega \leq -1$, although $c > 1, \omega > -1$ cannot yet be excluded. \section{Cosmological Constant} \noindent Observationally the magnitude of the cosmological constant $\Lambda$ is approximately $\Lambda \sim +10^{-12} eV^4$ and its equation of state is $\omega = p/\rho \simeq -1$, quite closely. \bigskip \noindent From the previous section, setting $c = 1$, we have \begin{equation} \Lambda = 3 M_{Planck}^2 R_h^{-2} \label{Lambda2} \end{equation} and using $M_{Planck} = 10^{27}$ eV and $R_h^{-1} = 10^{-33}$ eV this gives immediately a result $\Lambda=+10^{-12} eV^4$, consistent with observation. Compared to Eq.(\ref{CC}) in the Introduction we notice that the holographic principle has decreased the UV cutoff by 30 orders of magnitude and hence the CC, which goes like the UV cutoff to the fourth power, by 120 orders of magnitude. This provides vindication of the radical proposal in \cite{Hooft} about quantum gravity. \bigskip \noindent Let us discuss the equation of state $\omega$ given by Eq.(\ref{omegaDE}) in the precious section. With $c=+1$ we find $\omega=-1$. Consistent with observational data, the parameter may instead be, for example, $c=0.986 < 1$ which corresponds to $\omega=-1.01$ and is characteristic not of a cosmological constant but of phantom dark energy. This small-seeming change drastically changes the fate of the universe. Both $\omega=-1$ exactly and $\omega=-1.01$ will be interesting cases for our ensuing discussion about cyclic cosmology. \section{Cyclic Cosmology} \noindent There is an undeniable attraction to the idea of a cyclic universe which goes an infinite number of times through an \begin{equation} {\rm expansion} \longrightarrow {\rm turnaround} \longrightarrow {\rm contraction} \longrightarrow {\rm bounce} \longrightarrow {\rm expansion} \end{equation} process. In the earliest days of theoretical cosmology most of the leading theorists (De Sitter, Einstein, Friedmann, Lema\^{i}tre, Tolman) at some point favoured such a theory, primarily to avoid the initial singularity present in the Friedmann expansion equation. \bigskip \noindent However, considerations of entropy and the second law of thermodynamics led Tolman\cite{Tolman1,Tolman2} in 1931 to a no-go theorem about cyclic cosmology, often called the TEC(=Tolman Entropy Conundrum). Simply put, if the entropy continuously increases as required by the second law, each cycle becomes larger and longer. Correspondingly, in the past the cycles were smaller and shorter and therefore must have at some finite past time originated from an initial singularity. \bigskip \noindent Entropy of the universe enters our considerations not only because off the TEC but also because of the necessity of exceptionally low entropy at the beginning of the present expansion era. Why should the universe be in such a homogenous uniform state at the start? Cyclic cosmology should address also this second entropy issue which is not explained in, for example, inflationary theory. \bigskip \noindent What we have in mind is an infinitely cyclic theory with an infinite past. The infinite past raises interesting mathematical issues which were addressed in the 2009 preprint\cite{PHFpreprint}. The cyclic model we shall discuss has, at present, an infinite number of universes forming an infiniverse. This will remain the case for the infinite future. What is more subtle is the infinite past where according to \cite{PHFpreprint} there are two possibilities: (A) there was always be an infinite number of universes; (B) by using the set theory idea of {\it absence of precedent} it can begin, an infinite time in the past, with a finite number of universes, possibly only one. \bigskip \noindent Of course, what was unknown to Tolman and to all other theoretical cosmologists until the end of the twentieth century is the dark energy which drives the observed accelerated cosmological expansion. This provides alternatives to prior thinking, providing novel ways to get rid of the entropy of our universe, for example at the turnaround from expansion to contraction. One important issue is to provide observational tests for a given model. In \cite{DEexpt} it was shown, based on conservative and plausible assumptions, that to be sensitive to any effects of dark energy an experiment must be at least the size of a galaxy. It is therefore discomfiting to read a recent paper \cite{ATLASexpt} looking for dark energy at the LHC. Although the LHC is the largest scientific apparatus ever constructed, nevertheless it falls short of the size of the Milky Way by many orders of magnitude. Although \cite{DEexpt} emphasises $\omega < -1$ the argument therein applies equally to $\omega = -1$. \bigskip \noindent The equation of state $\omega = p/\rho$, where $p$ is pressure and $\rho$ is density, plays an important r\"{o}le although not as important as first thought when emphasis was (mis)placed on the phantom possibility $\omega < -1$ which can lead to a big rip\cite{Caldwell}, a little rip \cite{FLS} or one of its variants \cite{FLNOS,FLS2,FL}. As we shall discuss, the proposals for a cyclic cosmology survive in the case of $\omega=-1$ which is the equation of state for the cosmological constant. \bigskip \noindent {\bf Underlying the CBE hypothesis is the idea that as the universe undergoes accelerated expansion, especially faster then exponential as in the Big Rip, it will be torn apart into causally disconnected regions which continue to expand until the turnaround. Almost all of these regions will be empty of matter and contract to a bounce after turnaround. The vanishingly small number of regions containing matter will bounce prematurely and are failed universes. The successful empty universes, of which ours is one, contract, or come back, adiabatically with vanishing entropy until the bounce. The CBE hypothesis is a speculation and has not been justified mathematically.} \bigskip \noindent In the model of \cite{BF} the method of evading the TEC was based on the Come Back Empty (CBE) idea. The CBE hypothesis is that our contracting universe contains no matter, including no black holes, only entropy-free dark matter and hence contract adiabatically with zero entropy. The almost vanishing number of other universes which do contain matter and / or black holes will be failed universes because they will prematurely bounce after the turnaround from expansion to contraction. \bigskip \noindent To discuss cyclicity, the holographic model with $c = 0.986, \omega = -1.01$ from the previous section is closest to the original discussion of \cite{BF}. We first note that the time from the present time $t_0$ to the big rip at $t=t_{rip}$ is\cite{FT} \begin{equation} t_{rip} - t_0 = \left( \frac{11Gy}{-\omega_{DE} - 1} \right) \simeq 1.1 Ty \label{trip} \end{equation} so that to one-digit accuracy we can say $t_{rip} = t_T = 1.0Ty$ where $t_T$ is the time of turnaround from expansion to contraction which is only a fraction of a second before $t_{rip}$. \bigskip \noindent At $t_T$ the universe divides into a very large number $N$ of causally disconnected patches, almost all of which are empty of matter and of black holes. The vanishingly small number of causal patches which do contain quarks and leptons and black holes will necessarily fail to contract all the way to a normal bounce because the matter will proliferate and cause a premature bounce. The successful universes, of which ours is one, can contract to a bounce a fraction of a second before the would-be big bang. \bigskip \noindent The {\it total} entropy of the infiniverse always increases consistent with the second law of thermodynamics, but at turnaround the entropy of {\it our} universe drops very close to zero and remains nearly vanishing until the bounce, thereby explaining why the entropy at the beginning of the next expansion era is very low. \bigskip \noindent With the bounce at time $t=0$, during the expansion phase $0 < t < t_T$ the scale factor $a(t)$ satisfies the Friedmann expansion equation \begin{equation} \left( \frac{\dot{a}(t)}{a(t)} \right)^2 = \frac{8\pi G}{3} \left[ \frac{ (\rho_{\Lambda})_0}{a(t)^{3(\omega_{\Lambda}+1)}} + \frac{(\rho_m)_0}{a(t)^3} + \frac{ (\rho_r)_0}{a(t)^4} - \frac{\rho_{TOT}(t)^2}{\rho_c} \right] \label{unhatFriedmann} \end{equation} \bigskip \noindent After turnaround at $t = t_T$, the scale factor deflates to $\hat{a}(t_T) = f a(t_T)$ where $f < 10^{-28} \propto N^{-\frac{1}{3}}$ and a fraction $(1-f)^3$ of the entropy is jettisoned at turnaround. During the contraction from $t=t_T$ to the bounce at $t=t_B$ the reduced scale factor satisfies a Friedmann contraction formula \begin{equation} \left( \frac{\dot{\hat{a}}(t)}{\hat{a}(t)} \right)^2 = \frac{8\pi G}{3} \left[ \frac{ (\hat{\rho}_{\Lambda})_0}{\hat{a}(t)^{3(\omega_{\Lambda}+1)}} + \frac{ (\hat{\rho}_r)_0}{\hat{a}(t)^4} - \frac{\hat{\rho}_{TOT}(t)^2}{\hat{\rho}_c} \right] \label{hatFriedmann} \end{equation} with \begin{equation} \hat{\rho}_i(t) = \frac{(\rho_i)_0 f^{3(\omega_i+1)}}{\hat{a}(t)^{3(\omega_i+1)}} = \frac{(\hat{\rho}_i)_0}{\hat{a}(t)^{3(\omega_i+1)}} \label{hatrho} \end{equation} and $\hat{\rho}_m = 0$ because of the CBE hypothesis. The CBE assumption was critically examined in \cite{BF2} where it was confirmed that after turnaround the universe contains at most one photon. As the contraction progresses, spatial flatness is rapidly approached as an attractor point of Eq.(\ref{hatFriedmann}). \bigskip \noindent We must comment on the different case $c=+1, \omega=-1$ of the previous section which is the cosmological constant. Note that the discussion of the holographic principle no longer requires a Big Rip. At first sight this is very different because there is no would-be Big Rip. However, it is straightforward to show that a turnaround and bounce can occur in a similar way by employing a right-hand-side to the Friedmann expansion equation containing $\left( \rho_{DE} - \frac{\rho_{DE}^2}{\rho_c} \right)$ as can be justified by higher dimensional brane models {\it e.g.} \cite{Lisa1,Lisa2}. \bigskip \noindent {\bf In the paper \cite{BF} it was assumed that the cosmic expansion was faster than exponential and heading for a would-be Big Rip in order that the required break-up into causally-disconnected regions be sufficient. The new result of the present paper which uses the holographic principle is that the CBE hypothesis in \cite{BF} can be assumed also for an expansion which is exactly exponential, as is the case for a cosmological constant. In one important sense, this is better because it avoids the issues of negative energy densities which can occur in the Big Rip}. \bigskip \noindent An analysis in \cite{BFM} showed that CBE is feasible for any $\omega_{\Lambda} < -2$, which includes all the values of interest, since it allows the number $N$ of causal patches at turnaround be sufficient to satisfy the CBE constraint. Another study \cite{Frampton} showed that scale invariant density perturbations in the radiation field are provided during contraction which re-enter the horizon after the bounce. Finally, the typical time elapse before the turnaround was estimated\cite{Frampton2} by a new matching condition method which reassuringly resulted in a value of $t_T$ consistent with that estimated in Eq.(\ref{trip}) above. \section{Discussion} \noindent As we have seen, the holographic principle strongly modifies previous calculations in quantum gravity made without the benefit of its knowledge. Most striking is the diminution of the magnitude of the cosmological constant by 120 orders of magnitude, thereby ending that mystery. \bigskip \noindent This requires a decrease of 30 orders of magnitude in the UV cutoff $M_{UV}$ for the gravity sector. The IR cutoff scales like $L_{IR} \propto M_{UV}^{-2}$ and the correct proportionality constant involves the future event horizon in order to obtain the correct equation of state $\omega_{DE} \simeq -1$. This choice for the IR cutoff is somewhat counterintuitive because it uses information from the future, or at least assumes that the accelerated expansion will continue. \bigskip \noindent With respect to cyclic cosmology, the holographic dark energy permits an equation of state $\omega = -1$ or slightly more negative {\it e.g.} $\omega = -1.01$. The latter case was emphasised in \cite{BF}. However, the former case can equally underly an infinitely cyclic model by appealing to a brane term in the Friedmann expansion equation. \bigskip \bigskip
\section{Introduction}\label{Introduction} Cyber-physical systems (CPS) arise from the interaction of physical processes, computational resources and communication capabilities. Examples of CPS include transportation systems, medical monitoring, power generation and distribution systems, process control systems, advanced communication systems, etc. \cite{Pasqualetti:2013}. With the extensive applications of CPS, there are higher risks for the systems to suffer attacks from malicious agents. Recently, some works have considered the issue of network-based malicious attacks and detections \cite{Teixeira:2015}, \cite{Fawzi:2014}, \cite{Hoehn:2016} in the context of continuous systems. There are some studies on malicious attacks and detections in the framework of discrete event systems \cite{Thorsley:2006}, \cite{Barbhuiya:2015}, \cite{Fritz:2018}. In \cite{Agarwal:2017} the focus is on fault diagnosis of discrete event systems under attack. In particular, the problem of opacity enforcement by insertion functions under energy constraints has been investigated in \cite{Ji:2018}. The problem of supervisory control of discrete event systems under attack has been considered in \cite{Carvalho:2018}, \cite{Lima:2017}. Mainly inspired by some recent works \cite{Tong:2016}, \cite{Goes:2020}, \cite{Lima:2018}, \cite{Su:2018}, we address {\color{black} the problem of state estimation in the setting of partially-observed discrete event systems subject to cyber attacks}. In this paper, which is {\color{black} an extended} version of \cite{Qi:2018}\footnote{In \cite{Qi:2018} we only provided preliminary ideas by considering a less general problem statement. Furthermore, no algorithm was formally presented therein.}, we consider a plant modeled as a discrete event system {\color{black} with state set $X$}, whose evolution is observed by an operator. The occurrence of a subset of events $E_o$, called \emph{observable events}, can be detected by sensors while all other events, called \emph{silent events}, produce no observation. {\color{black} An evolution of the plant produces an observed word $s \in E_o^*$ which the operator uses to determine the set of \emph{consistent states} $\mathcal{C}(s) \subseteq X$, i.e., the set of states in which the system may be when $s$ has been produced. We assume that an attacker, which has a full knowledge of the plant, may corrupt the sensor readings. This could happen because either the attacker can gain direct control of a sensor or it can corrupt messages between the plant and the operator assuming they are connected through a network. The particular attack model we adopt, among those that have been presented in the literature, is based on the one considered by Meira-G\'{o}es \emph{et al.} \cite{Goes:2020}. In particular, the attacker may insert in the word observed by the operator fake occurrences of \emph{compromised events} or, on the contrary, may erase the occurrence of such events. The attacker aims to mislead the operator. Under attack, an observation $s \in E_o^*$ produced by the plant can be changed into a corrupted observation $s' \in E_o^*$ and as a result the operator computes a state estimate $\mathcal{C}(s') \subseteq X$, which is in general incorrect. The attacker may have arbitrary goals. As an example, it may want to hide the fact that the plant has reached a critical state so that the operator does not activate appropriate protections that are fundamental for the system safeness. In all generality, we formalize a malicious goal by introducing a \emph{misleading relation} $\mathcal{R} \subseteq 2^X \times 2^X$ and we say that an attack is \emph{harmful} if there exists some observation $s$ which can be changed into a corrupted observation $s'$ such that $(\mathcal{C}(s),\mathcal{C}(s')) \in \mathcal{R}$. We also assume that the attacker needs to be stealthy, i.e., the operator should not be able to detect that the plant is under attack. In addition, we consider the possibility that the length of a word inserted by the attacker between the occurrence of two observable events may be $n$-bounded. In this paper, we first show how to construct two particular automata, called \emph{attacker observer} and \emph{operator observer}, which are defined on an augmented \emph{attack alphabet} which includes the observable events of the plant and the events describing the action of the attacker. We derive a formal procedure, based on concurrent composition of these two observers, to design a \emph{{\color{black} supremal} stealthy attack substructure}, which is guaranteed to describe all stealthy attacks. Finally, by inspection of such a structure one can determine a harmful attack, if any exists. } \subsection{Literature review} Our work has been inspired by results presented by several authors. Tong \emph{et al.} \cite{Tong:2016} present a new finite structure called parallel observer, which allows to simultaneously describe the observations of the supervisor and of the attacker. Based on the parallel observer, a maximally permissive supervisor is developed to enforce current-state opacity. Meira-G\'{o}es \emph{et al.} \cite{Goes:2020} propose a novel bipartite transition structure in the framework of discrete event systems, namely, Insertion-Deletion Attack structure, and present a game-like relationship between the supervisor and the environment (the plant and the attacker) {\color{black} to determine if the attacker can} lead the plant to a forbidden state without being detected by the supervisor. Lima \emph{et al.} \cite{Lima:2018} propose a defense policy that prevents cyber attacks at sensor and actuator layer in supervisory control systems. It is assumed that the attacker can alter the observation of events in a set of events $\Sigma_{vs}$, and modify the enabling of events in a set of events $\Sigma_{va}$. The detectable network attack security and undetectable network attack security are introduced to prevent the plant from reaching forbidden states. Su \cite{Su:2018} addresses the problem of attack-with-bounded-sensor-reading-alteration (ABSRA), where the attacker can intercept the sensor readings from the plant and arbitrarily alter them but with an upper bound on the length of the altered observation word. In this way the attacker can cheat the supervisor, which will lead the plant to the undesirable states. The author also develops a supervisor that is robust to ABSRA. {\color{black} We point out that significant differences exist between the problem setting considered in this paper and the problem setting dealt in most of the papers in the literature, including the above mentioned ones. What we propose is a methodology for studying how the possible choices of the attacker can affect the estimate of the operator. On the contrary, previous works on cyber attacks in the DES literature, including {\color{black} \cite{Carvalho:2018,Goes:2020,Lima:2018,Su:2018}}, consider the case of an operator/supervisor: in such a case the goal of the attacker is to {\color{black} beguile} the supervisor so that a specification is violated, i.e., the plant reaches a forbidden state or generates a forbidden evolution. The proposed approach can be applied not only to the case in which an operator-supervisor controls a plant in a closed-loop --- as in the above mentioned papers --- but in more general settings, where the operator may have goals of a different nature. As an example, in our framework one may study how cyber attacks disturb an operator-monitor which takes decisions based on its estimation of the plant state or an operator-diagnoser which aims to detect the occurrence of faults. \emph{Mutatis mutandis}, our approach can also be used for addressing a problem of opacity enforcing: in such a case the operator is an intruder that wants to infer a secret and the attacker is the agent that corrupts the observation to thwart the intruder. } \subsection{Contributions and structure of the paper} {\color{black} This paper contains several original contributions. \begin{itemize} \item The problem of \emph{state estimation under attack} is formalized; \emph{harmful attacks} are characterized in general terms by means of a \emph{misleading relation}. \item The notion of \emph{attack alphabet} is introduced and \emph{attack words} are defined to describe how observations can be corrupted by the attacker. On this alphabet two different observers are constructed: they describe the different state estimates computed by the attacker and by the operator for each corrupted observation. \item A formal procedure to design a \emph{supremal stealthy attack substructure} is presented. This structure, constructed refining the concurrent composition of the two observers, is guaranteed to describe all stealthy attacks. \item The supremal stealthy attack substructure allows one to determine if a harmful attack exists and, if such is the case, to compute it. \end{itemize} The rest of the paper is organized as follows. In Section~\ref{Preliminaries}, we recall the basic notions of finite-state automata and of state estimation via observers.} In Section~\ref{Problemstatement}, the problem statement is given. In Section~\ref{Attackeroperatorobservers}, we develop two observers: attacker observer and operator observer. In Section~\ref{Attackstructure}, we define the unbounded attack structure as the concurrent composition of such observers. Then, we define an automaton that allows us, again via concurrent composition, to define a bounded attack structure, starting from the unbounded one. In Section~\ref{Supremalstealthyattackstructureandfunction}, a way to refine such structures in order to find a supremal stealthy attack substructure is detailed. {\color{black} Such a substructure generates all attack words that are stealthy and that the attacker can keep stealthy regardless of the future evolution of the plant. In Section~\ref{Section7} we discuss how to compute, looking at the supremal stealthy attack substructure, a stealthy attack function that is harmful. This is not always possible and in particular, such a possibility also depends on the particular system evolution. In Section~\ref{Section7} we also discuss how the existence of a harmful attack function can be verified by means of the previous substructure.} Conclusions are finally drawn in Section~\ref{Conclusions} where we also discuss our future lines of research in this framework. \section{Preliminaries}\label{Preliminaries} Given an \emph{alphabet} $E$, let $E^*$ denote the set of all words on the alphabet. Given two words $w_1, w_2 \in E^*$, let $ w_1 w_2$ denote their \emph{concatenation}. Similarly, given two languages $L_1, L_2 \subseteq E^*$, we denote their concatenation $ L_1 L_2$ and when $L_1 = \{w \}$ we also write $ L_1 L_2 = w L_2$. A \emph{deterministic finite-state automaton} (DFA) is a four-tuple $G=(X,E,\delta,x_0)$, where \emph{X} is the set of states, \emph{E} is the set of events (alphabet), $\delta:X\times E\rightarrow X$ is the transition function, and $x_0$ is the initial state. The transition function can be extended to $\delta^*:X\times E^*\rightarrow X$ such that $\delta^* (x,\varepsilon)=x$, and $\delta ^*(x,\sigma e)=\delta(\delta^* (x,\sigma),e)$ for all $x \in X$, $e \in E$ and $\sigma \in E^*$. The \emph{generated language} of \emph{G} is defined as $L(G)=\{\sigma\in E^* \ | \ \delta^* (x_0,\sigma) \text { is defined}\}$. Given two alphabets $E'$ and $E$ with $E' \subseteq E$, the \emph{natural projection} on $E'$, $P_{E'}:E^*\rightarrow {\color{black} (E')^*}$ is defined as \cite{Wonham:1989}: \begin{equation}\label{naturalprojection} P_{E'}(\varepsilon):=\varepsilon \ , \ P_{E'}(\sigma e) := \left\{ \begin{array}{lcl} {P_{E'}(\sigma) e} \ \text{if} \ e \in E', \\ {P_{E'}(\sigma)} \ \text{if} \ e \in E \setminus E'. \end{array} \right. \end{equation} Therefore, given a word $\sigma \in E^*$, its natural projection on $E'$ is obtained by erasing events that do not belong to $E'$. The \emph{concurrent composition} of two languages is defined as $L_1 \parallel L_2=\{\sigma \in E^*\ | \ P_{E_1}(\sigma) \in L_1, P_{E_2}(\sigma) \in L_2\}$, where $E_1$ and $E_2$ are alphabets of $L_1$ and $L_2$, respectively, and $E=E_1 \cup E_2$. The concurrent composition operator can also be defined for DFA. In particular, given two DFA $G'$ and $G''$, their {\em concurrent composition}, denoted as $G=G' \parallel G''$, generates language $L(G)=L(G') \parallel L(G'')$. A \emph{partially-observed deterministic finite-state automaton} is denoted as $G=(X,E,\delta,x_0)$, where $E=E_o\cup E_{uo}$, $E_o$ is the \emph{set of observable events}, and $E_{uo}$ is the \emph{set of unobservable events}. In the following, to keep the notation simple, we denote as $P:E^*\rightarrow E_o^*$ the natural projection on $E_o$. {\color{black} The \emph{inverse projection} $P^{-1}:E_o^* \rightarrow 2^{E^*}$ is defined as $P^{-1}(s)=\{\sigma \in E^*:P(\sigma)=s\}$, where $\sigma \in E^*$, and $s \in E_o^*$.} {\color{black} When a partially-observed DFA generates a word $\sigma \in L(G)$ it produces the observation $s = P(\sigma) \in E_o^*$. However, in general a given observation may be produced by more than one generated word. The \emph{set of words consistent with observation $s$} is defined by $$ \mathcal{S}(s) = P^{-1}(s) \cap L(G) = \{ \sigma \in L(G) \mid P(\sigma) = s \} $$ and denotes the set of words generated by the DFA that produce observation $s$. Correspondingly, the \emph{set of states consistent with observation $s$} is defined by $$ \mathcal{C}(s) = \{ x \in X \mid (\exists \sigma \in \mathcal{S}(s)) \ \delta^*(x_0,\sigma) = x \} $$ and denotes the set of states in which the DFA can be when observation $s$ had been produced. The set $\mathcal{C}(s) \subseteq X $ is also called the \emph{state estimate} corresponding to observation $s \in E_o^*$. The problem of state estimation of a partially-observed DFA $G$ can be solved, in all generality, constructing a new structure called its \emph{observer} (see \cite{Lafortune:2008} for details). Let us first define, for a partially-observed DFA $G$, the \emph{unobservable reach} of a state $x\in X$. This set is denoted by $UR(x)$ and is defined as a set of states $x' \in X$ reached from state $x$ generating an unobservable word $\sigma \in E_{uo}^*$, i.e., $UR(x) =\{x' \ | \ \exists \sigma\in E_{uo}^\ast,\delta^*(x,\sigma)=x'\}$. This definition can be extended to a set of states $B \subseteq 2^X$ as follows: $$UR(B)=\bigcup \limits_{x\in B}UR(x).$$ The \emph{observer} $Obs(G)$ of a partially-observed DFA $G=(X,E,\delta,x_0)$, is a DFA: $$Obs(G) = (B,E_o,{\delta _{obs}},b_0),$$ where the set of states is $B\subseteq 2^X$, the alphabet $E_o$ is the set of observable events of $G$, the transition function $\delta _{obs}: B\times E_o \rightarrow B$ is defined as: $$\delta _{obs}(b,e_o):=\bigcup \limits_{x\in b}UR(\{ x' \mid \delta(x,e_o)=x'\}),$$ and the initial state is $b_0:=UR(x_0)$. As shown in \cite{Lafortune:2008}, given a partially-observed DFA $G$ with observer $Obs(G) = (B,E_o,{\delta _{obs}},b_0)$, for any observation $s \in E_o^*$ produced by $G$ it holds that $\mathcal{C}(s) = \delta _{obs}^*(b_0,s)$. } {\color{black} \section{Problem statement}\label{Problemstatement} In this section we formalize the problem statement considered in this paper. In particular, in Subsection \ref{Attackmodel} we introduce the attack model and an original formalism to represent it. In Subsection \ref{goal} we clarify which are the possible goals of the attacker on which we are focusing in this paper. Finally, in Subsection \ref{proposed_tool} we introduce the tool proposed in this manuscript and explain how it can be useful both to the operator and to the attacker. \subsection{The attack model}\label{Attackmodel} } In this paper we consider a plant modeled by a partially observable DFA with set of observable events $E_o$ and set of unobservable events $E_{uo}$. Referring to Fig.~\ref{fig3}, if $\sigma$ is a {\color{black} word} generated by the plant, the \emph{observed word} is $s=P(\sigma)$. An attacker may corrupt the output signals produced by the plant with the effect of inserting in the observation some events that did not occur, or erasing some events that have occurred. Such a \emph{corrupted observation} is denoted as $s'$ (a sequence of events in $E_o$), and the operator constructs its \emph{state estimation} based on $s'$. In the framework we consider, we assume the operator monitors the plant to estimate {\color{black} its current state}: the objective of the attacker is to corrupt the observation in such a way that a correct estimation is not possible. \begin{figure}[htbp] \centering \includegraphics[width=2.5in]{PlantUnderAttack.png}\\ \caption{A plant $G$ under attack.} \label{fig3} \end{figure} \begin{defin} \rm \cite{Goes:2020} The \emph{set of compromised events} is denoted as ${E_{com}} \subseteq {E_o}$. It includes all the observable events that can be corrupted by the attacker, either inserting them in the operator observation, even if they have not actually occurred, or erasing them in the operator observation.~\hfill $\diamond$ \label{def2} \end{defin} The definition of compromised events was first proposed in \cite{Goes:2020}. However, while in \cite{Goes:2020} the authors assume that all the compromised events can be inserted and erased by the attacker, here we slightly generalize the definition as follows. The set of compromised events that can be inserted in the observer evolution is denoted as $E_{ins}$, and the set of events that can be erased is denoted as $E_{era}$. To keep the presentation general, we assume that $E_{ins}$ and $E_{era}$ are not necessarily disjoint. The relationship among the different subsets of observable events $E_o$ is clarified in Fig.~\ref{fig4}. \begin{figure}[htbp] \centering \includegraphics[width=1.3in]{Eo.png}\\ \caption{The relationship among the subsets of $E_o$.} \label{fig4} \end{figure} We now formally describe the action of the attacker in terms of two new types of events that it can generate. More precisely, even if it is possible to directly define the attacker as a finite-state transducer that ``translates" an {\color{black} observed word} $s$ into a corrupted observation $s'$ (see Fig.~\ref{fig3}), for a reason that will appear clear in the following, we prefer to characterize the attacker's action in terms of a new word defined on a so-called \emph{attack alphabet} $E_a$. \begin{defin} \rm The \emph{attack alphabet} is defined as $E_a=E_o \cup E_+ \cup E_-$, and we assume that $E_o$, ${E_+}$, and ${E_-}$ are disjoint sets. \label{def3} \end{defin} The \emph{set of inserted events} \cite{Goes:2020} is denoted as ${E_+}$, namely $E_+=\{e_+ \mid e \in E_{ins}\}$. The occurrence of an event $e_+ \in E_+$ denotes the fact that the attacker inserts in the operator observation an event $e \in E_{ins}$ that has not occurred in reality. The \emph{set of erased events} \cite{Goes:2020} is denoted as ${E_-}$, namely $E_-=\{e_- \mid e \in E_{era}\}$. The occurrence of an event $e_- \in E_-$ denotes the fact that the attacker erases from the operator's observation event $e \in E_{era}$ generated by plant.~\hfill $\diamond$ Given a bound $n \in \mathbb{N} \cup \{ \infty \}$, let $E^{\leq n}_+=\{w_+ \in E ^*_+ \ \mid \ |w_+| \leq n\}$ denote the set of words on alphabet $E_+$ whose length does not exceed $n$. Note that if $n=\infty$ then $E^{\leq n}_+ = E ^*_+$. \begin{defin} \rm Given a plant $G$ with a set of compromised events $E_{com}=E_{ins} \cup E_{era}$, let $n \in \mathbb{N} \cup \{ \infty \}$ be a bound. An $n$-bounded attacker can be defined by an \emph{attack function} $f_n:P(L(G))\rightarrow E_a^\ast$, where $E_a$ is the attack alphabet (Definition~\ref{def3}), satisfying the following conditions: \label{def4} \end{defin} \begin{enumerate} \item[(a)] $f_n(\varepsilon)\in E_+^{\leq n}$, \item[(b)] $\forall se \in P(L(G))$ with $s \in E_o^*$: \begin{equation}\label{equationb} \left\{ \begin{array}{ll} f_n(se) \in f_n(s)\{e_-,e\}E_+^{\leq n} \text { if } e \in E_{era}, \\ f_n(se) \in f_n(s) \{ e \} E_+^{\leq n} \text{ if } e \in E_o \setminus E_{era}. \end{array} \right. \end{equation} \end{enumerate}~\hfill $\diamond$ In Definition~\ref{def4}, condition (a) means that the attacker can insert a bounded word $w_+ \in E_+^{\leq n}$ at the initial state, before any event generated by the plant is observed. {Condition (b) implies that if an event $e \in E_{era}$ occurs, the attacker can either erase event $e$ or not erase it, and then insert any word $w_+ \in E_+^{\leq n}$. If an event $e \in E_o \backslash E_{era}$ occurs, then the attacker can insert any word $w_+ \in E_+^{\leq n}$ after $e$.} We notice that imposing that the attacker may insert at most $n$ consecutive events between any two observed events, makes sense in practice. Indeed, even if our model is purely logical, a real system can produce in a finite time just a finite number of events. If the attacker could introduce an arbitrarily large number of events between two consecutive observed events, this would lead to an anomalous behavior as observed by the operator. We denote as ${\mathcal F}_n$ the set of attack functions for a given $n\in \mathbb{N} \cup \{\infty\}$. \begin{defin} \rm The language modified by an attack function $f_n$ is called {\em attack language}. It is denoted as $L(f_n,G)$ and is defined as $L(f_n,G)=f_n(P(L(G)))$. A word $w \in L(f_n,G)$ is called an \emph{attack {\color{black} word}}. The set of all the attack languages relative to a given $n\in \mathbb{N} \cup \{\infty\}$, denoted as $L({\mathcal F}_n,G)$, is defined as \begin{equation}\label{attackfunctions} L({\mathcal F}_n,G)=\bigcup_{f_n\in {\mathcal F}_n}L(f_n,G)=\bigcup_{f_n\in {\mathcal F}_n}f_n(P(L(G))). \end{equation}~\hfill $\diamond$ \label{defFn} \end{defin} Given two integer numbers $n$ and $n'$, ${\mathcal F}_n \subseteq {\mathcal F}_{n'}$ if {$n \leq n'$.} Furthermore, ${\mathcal F}_n\subseteq {\mathcal F}_{\infty}$ for all $n<\infty$. \begin{defin} \rm The \emph{reduction projection} $\widehat{P}:E_a^* \rightarrow E_o^*$ is defined as: \label{def5} \end{defin} \begin{equation}\label{reductionprojection} \widehat{P}(\varepsilon):=\varepsilon, \ \widehat{P}(w e_a):=\left\{ \begin{array}{lcl} {\widehat{P}(w)e} \ \text{if} \ e_a \!\in\! E_a \setminus E_-,\\ {\widehat{P}(w)} \ \text{if} \ e_a \!\in\! E_-. \end{array} \right. \end{equation}~\hfill $\diamond$ The internal structure of the attacker is visualized in Fig.~\ref{fig3} as a black box taking an observation $s$ as an input and producing a corrupted observation $s'$ as an output. Such an internal structure is sketched in more detail in Fig.~\ref{fig5}. \begin{figure}[htbp] \centering \includegraphics[width=2.3in]{InternalStructureOfTheAttacker.png}\\ \caption{Internal structure of the attacker with observed word $s \in E_o^*$, attack word $w \in E_a^*$, and corrupted observation $s' \in E_o^*$.} \label{fig5} \end{figure} Here the observed word is $s=P(\sigma)$ (a sequence of events in $E_o$). The attacker corrupts the observation according to the attack function $f_n$, producing $w\in L(f_n,G) \subseteq E_a^*$. Such a sequence is projected via $\widehat P$ on $E_o$, generating a word $s'$. The plant operator constructs its state estimation based on $s'$. {\color{black} \subsection{\color{black} The goal of the attacker}\label{goal} In this subsection we formalize the possible goals of the attacker on which we are focusing in this paper. To this aim we introduce a relation $\mathcal{R} \subseteq 2^X \times 2^X$, called {\em misleading relation}. If $s$ and $s'$ in $E_o^*$ denote, respectively, the generic uncorrupted and corrupted observation of the operator, the goal of the attacker is achieved whenever $$ (\mathcal{C}(s),\mathcal{C}(s'))\in \mathcal{R}, $$ i.e., whenever the pair (set of states consistent with the uncorrupted observation, set of states consistent with the corrupted observation) belongs to $\mathcal{R}$. The following definition formalises this. \begin{defin} \rm Let $G=(X,E,\delta,x_0)$ be a plant with set of observable events $E_o$ and $Obs(G)=(B,E_o,\delta_{obs},b_0)$ its observer. An attack function $f_n$ is {\em harmful} w.r.t. a relation $\mathcal{R} \subseteq 2^X \times 2^X$ if there exists an observation $s \in P(L(G))$ generated by the plant, whose set of consistent states is $\mathcal{C}(s)= \delta_{obs}^*(b_0,s)$, which can be corrupted into a word $s' = \widehat{P}(f_n(s))$ whose corresponding set of consistent states is $\mathcal{C}(s') = \delta_{obs}^*(b_0,s')$, and $(\mathcal{C}(s),\mathcal{C}(s')) \in \mathcal{R}$.~\hfill $\diamond$ \label{def7} \end{defin} Different physical problems can be described in this setting by suitably defining relation $\mathcal{R}$. A significant example is the following one. Assume that a subset of states of the system, $X_{cr} \subseteq X$, is labeled as critical in the sense that when the system is in one of such states, a protective action must be taken to avoid possible damages. The operator is monitoring the system evolution in order to establish when one of such states is reached. Obviously, if the operator does not realize that a critical state has been reached, no action is taken and the system behaviour can be seriously compromised. The effectiveness of an attacker that aims to affect the system observation in order to prevent the operator to realize when a critical state is reached, can be evaluated via the misleading relation defined as $\mathcal{R} = \{ (X',X'') \ | \ X' \cap X_{cr} \neq \emptyset \text { and } X'' \cap X_{cr} = \emptyset \}$. Indeed, the attack is harmful if there exists at least one observation $s$ such that $\mathcal{C}(s) \cap X_{cr} \neq \emptyset$ (meaning that the system may be in a critical state) which can be corrupted to an observation $s'$ with $\mathcal{C}(s') \cap X_{cr} = \emptyset$ (meaning that the operator excludes the system is in a critical state).} {\color{black} While achieving its goal, the attacker wants to remain stealthy, namely it wants to affect the operator observation without being discovered. This can be formalized introducing the notion of stealthy attack function. \begin{defin} \rm Consider a plant $G$. An attack function $f_n$ is said to be \emph{stealthy} if $\widehat{P}(L(f_n,G)) \subseteq P(L(G))$.~\hfill $\diamond$ \label{def6} \end{defin} In words, stealthiness requires that the set of words that an operator observes when the system is under attack is contained in the set of words the operator may observe when no attack occurs. This guarantees that the operator does not realize that the plant is under attack. } {\color{black} \subsection{The proposed approach}\label{proposed_tool} Given a plant $G=(X,E,\delta,x_0)$ with set of observable events $E_o$, and a relation $\mathcal{R} \subseteq 2^X \times 2^X$, the main contribution of this paper consists in providing a tool, called supremal stealthy attack substructure, with the following two main features. First, it allows to establish if {\color{black} an attack} function $f_n$ that is stealthy and harmful w.r.t. $\mathcal{R}$, exists. This is not only useful to the attacker, but also to the operator. Indeed, it allows to establish if the system is robust to attacks in the considered setting. Second, it contains all the possible actions (insert and/or erase observations) that an attacker may implement during the system evolution, while guaranteeing {\color{black} stealthiness}. It also provides the attacker all the information to elaborate a strategy that, depending on the system evolution, may reveal to be harmful. We finally point out that a significant advantage of the proposed approach is that the supremal stealthy attack substructure does not depend on $\mathcal{R}$, so different possible goals of the attacker may be considered using the same tool. } \section{Attacker Observer and Operator Observer}\label{Attackeroperatorobservers} In this section we introduce two special structures, called {\em Attacker Observer} and {\em Operator Observer}, which are fundamental to derive the proposed solution to the above problem. \subsection{Attacker Observer}\label{Attackerobserver} The attacker observer $Obs_{att}(G)$ describes all possible attack words that can be generated by functions in $\mathcal{F}_{\infty}$ and the corresponding sets of consistent states of the system. Since attacks are performed by the attacker, it knows which observations originate from events that have really occurred in the plant ($E_o$), which observations have been erased ($E_-$), and which observations have been inserted ($E_+$). The attacker observer $Obs_{att}(G)$ can be constructed using Algorithm~\ref{alg1}. \begin{algorithm}[htbp] \caption{Construction of the attacker observer $Obs_{att}(G)$} \label{alg1} \begin{algorithmic}[1] \Require An observer $Obs(G) = (B,{E_o},{\delta _{obs}},b_0)$, $E_{ins}$, and $E_{era}$. \Ensure An attacker observer $Obs_{att}(G) = \left(B,E_a,\delta _{att},b_0 \right)$. \State Let ${E_a} := E_o \cup {E_+} \cup {E_-}$; \State Let $\delta_{att}:=\delta_{obs}$; \ForAll{$e\in E_{era}$,} \ForAll{$b\in B$,} \If{$\delta_{att}(b,e)=b',$} \State $\delta_{att}(b,e_-)=b'$; \EndIf \EndFor \EndFor \ForAll{$e\in E_{ins}$,} \ForAll{$b\in B$,} \State $\delta_{att}(b,e_+)=b$; \EndFor \EndFor \end{algorithmic} \end{algorithm} According to Algorithm~\ref{alg1}, the set $E_a$ is initially computed and the transition function of $Obs_{att}(G)$ is initialized at $\delta_{att}=\delta_{obs}$. Indeed, events in $E_o$ are events actually occurring in the plant, thus when such events occur the attacker updates its state estimation according to the transition function of $Obs(G)$. Then, for all $e \in E_{era}$ and for all $b\in B$, whenever $\delta_{att}(b,e)$ is defined, the algorithm imposes $\delta_{att}(b,e_-)=\delta_{att}(b,e)$. Indeed, the attacker knows that $e_-$ corresponds to event $e$ that has been canceled, thus the way it updates its estimation is the same in the case of $e$ and $e_-$. Finally, for all events $e\in E_{ins}$, and for all states $b\in B$, we add self-loops $\delta_{att}(b,e_+)=b$. Indeed, the attacker knows that events in $E_+$ are fake events that have not really occurred in the plant, thus it does not update its estimation based on them. In particular, self-loops correspond to the possibility of inserting an arbitrarily large number of such events, which is consistent with the fact that we are dealing with attack functions in ${\mathcal F}_{\infty}$. \begin{example} \rm Consider a partially-observed plant $G = \left( {X,E,\delta ,{x_0}} \right)$ in Fig.~\ref{fig2}(a), where $E = {E_o} \cup {E_{uo}}$, $E_o=\{a,c,d,g\}$, and $E_{uo} = \left\{ b \right\}$. The corresponding observer of \emph{G} is shown in Fig.~\ref{fig2}(b). Let $E_{ins}=\{c,d\}$, and $E_{era}=\{c,g\}$. The attacker observer constructed using Algorithm~\ref{alg1} is shown in Fig.~\ref{fig7}(a). \label{exa3} \end{example} \begin{figure}[htbp] \centering \subfigure[$G$]{ \includegraphics[width=2.4in]{G.png} } \subfigure[$Obs(G)$]{ \includegraphics[width=2.4in]{Observer.png} } \caption{(a) A partially-observed plant $G$; (b) its observer $Obs(G)$, where $E_o=\{a,c,d,g\}$.} \label{fig2} \end{figure} \label{exa1} \begin{figure}[htbp] \centering \subfigure[$Obs_{att}(G)$]{ \includegraphics[width=2.5in]{AttackerObserver.png} } \subfigure[$Obs_{opr}(G)$]{ \includegraphics[width=3in]{OperatorObserver.png} } \caption{{\color{black} (a) Attacker observer in Example \ref{exa3} and (b) operator observer in Example \ref{exa5} for the plant in Fig.~\ref{fig2}.}} \label{fig7} \end{figure} Since events $c,g \in E_{era}$, and there is a transition labeled $c$ from state $\{1, 2\}$ to state $\{3\}$ in the observer of the plant $Obs(G)$, we add transitions labeled $c$ and $c_-$ from state $\{1, 2\}$ to state $\{3\}$ in the attacker observer. Similar arguments can be used to explain transitions labeled $c$ and $c_-$ from state $\{5\}$ to state $\{6\}$, self-loops labeled $g$ and $g_-$ at state $\{4\}$. Then, since $c$, $d \in E_{ins}$, we add self-loops labeled $c_+$ and $d_+$ at all the states.~\hfill $\diamond$ The following proposition provides a characterization of the {\color{black} attacker observer}. \begin{proposition} \rm Let $G$ be a plant with set of observable events $E_o$ and observer $Obs(G) = (B,{E_o},{\delta _{obs}},b_0)$. {\color{black} Given an attack alphabet $E_a = E_o \cup E_+ \cup E_-$, let} $Obs_{att}(G)$ be the attacker observer constructed using Algorithm~\ref{alg1}. It holds that: \label{prop1} \end{proposition} \begin{enumerate} \item[(a)] $L(Obs_{att}(G))=L({\mathcal F}_{\infty},G)$; \item[(b)] {\color{black} $\forall s \in P(L(G))$, $\forall f_{\infty}\in {\mathcal F}_{\infty}$ with $w=f_\infty(s) \in E_a^*$:} $$\delta_{att}^*(b_0,w)=\delta_{obs}^*(b_0,s).$$ \end{enumerate} \textbf{Proof.} (a) Follows from the construction rules implemented in Algorithm~\ref{alg1}. Indeed, Step~2 implies that $L(Obs_{att}(G))$ contains all words that can be observed if no attack occurs. Steps~3--9 guarantee that all attacks resulting from the cancellation of events in $E_{era}$ are considered. Finally, Steps~10--14 guarantee that all attacks resulting from the insertion of an arbitrarily large number of events in $E_{ins}$ are taken into account. (b) We prove this by induction on the length of $s$. If $s=\varepsilon$, the result follows from the fact that, by definition of attack function, it is $f_{\infty}(\varepsilon)\in E_+^{\leq n} $, and by Steps~10--14, events in $E_+$ lead to self-loops in $Obs_{att}(G)$. Let us now consider a generic word $s \in P(L(G))$ with length greater than one, written as $s=\overline{s} e$, where $\overline{s} \in P(L(G))$ and $e\in E_o$. Assume the result holds for $\overline{s}$. We prove that it also holds for $s=\overline{s} e$ considering the following two possible cases. If $e\in E_{era}$, by the definition of attack function, $w\in \bigcup \limits_{f_\infty \in {\mathcal F}_\infty } f_{\infty}(\overline{s})\{e_-,e\}E_+^{\leq n}$ is true. According to Steps~3--9, events $e$ and $e_-$ are dealt with in the same manner when defining the transition function $\delta_{att}$. Finally, as just pointed out, according to Steps~10--14, events in $E_+$ lead to self-loops in $Obs_{att}(G)$. Finally, if $e\in E_o \setminus E_{era}$, by the definition of attack function, $w \in \bigcup \limits_{f_\infty \in {\mathcal F}_\infty } f_{\infty}(\overline{s}) e E_+^{\leq n}$ is true. Thus the result follows from the fact that, according to Steps~10--14, events in $E_+$ lead to self-loops in $Obs_{att}(G)$ and events in $E_o$ are dealt with in the same manner in $Obs_{att}(G)$ and $Obs(G)$.~\hfill $\Box$ \subsection{Operator Observer}\label{Operatorobserver} The operator observer $Obs_{opr}(G)$ generates two different sets of words. The first set includes all words on $E_a^*$ that may either result from an uncorrupted observation of the plant or from a corrupted observation which keeps the attacker stealthy. The second set of words includes all the previous words continued with a symbol in $E_a$ so that the resulting word is not consistent with an uncorrupted observation. While the words in the first set lead to a set of states that according to the operator are consistent with the perceived observation, those in the second set lead to a dummy state denoted as $b_\emptyset$. The operator observer $Obs_{opr}(G)$ can be constructed using Algorithm~\ref{alg2}, as shown below. \begin{algorithm}[htbp] \caption{Construction of the operator observer $Obs_{opr}(G)$} \label{alg2} \begin{algorithmic}[1] \Require An observer $Obs(G) = (B,{E_o},{\delta _{obs}},b_0)$, $E_{ins}$, and $E_{era}$. \Ensure An operator observer $Obs_{opr}(G) = \left(B_{opr},E_a,\delta_{opr},b_0\right)$. \State Let $B_{opr}:=B \cup {\color{black} \{b_\emptyset\}}$; \State Let $E_a:= E_o \cup E_+ \cup E_-$; \State Let $\delta_{opr}:=\delta_{obs}$; \ForAll{$e\in E_{ins}$,} \ForAll{$b\in B$,} \If{$\delta_{opr}(b,e)=b'$,} \State $\delta_{opr}(b,e_+)=b'$; \EndIf \EndFor \EndFor \ForAll{$e\in E_{era}$,} \ForAll{$b\in B$,} \State $\delta_{opr}(b,e_-)=b$; \EndFor \EndFor \ForAll{$e_a \in E_a$,} \ForAll{$b\in B$,} \If{$\delta_{opr}(b,e_a)$ is not defined,} \State $\delta_{opr}(b,e_a)=b_\emptyset$; \EndIf \EndFor \EndFor \end{algorithmic} \end{algorithm} According to Algorithm~\ref{alg2}, the set of states $B_{opr}=B\cup \{b_{\emptyset}\}$ and the set of events $E_a$ are initially computed. Then, the transition function of $Obs_{opr}(G)$ is initialized at $\delta_{opr}=\delta_{obs}$. Indeed, events in $E_o$ are events actually occurring on the plant; when such events occur, the operator updates its state estimation according to the transition function of $Obs(G)$. Furthermore, for all $e\in E_{ins}$ and for all $b\in B$, we impose $\delta_{opr}(b,e_+)=\delta_{opr}(b,e)$. Indeed, the operator does not distinguish between events in $E_+$ and the corresponding events in $E_{ins}$. For all $e \in E_{era}$ and for all $b\in B$, we add self-loops $\delta_{opr}(b,e_-)=b$. Indeed, events in $E_-$ correspond to no observation by the operator. Finally, for all the events $e_a\in E_a$ that are not enabled at the generic state $b\in B$, let $\delta_{opr}(b,e_a)=b_\emptyset$. As a result, for all $b\in B$ and for all $e_a\in E_a$, function $\delta_{opr}(b,e_a)$ is defined. On the contrary, $\delta_{opr}(b_\emptyset,e_a)$ is undefined for all $e_a\in E_a$. \begin{example} \rm Consider again the plant $G$ in Fig.~\ref{fig2}. Let $E_{ins}=\{c,d\}$ and $E_{era}=\{c,g\}$. The operator observer constructed using Algorithm~\ref{alg2} is visualized in Fig.~\ref{fig7}(b). \label{exa5} \end{example} Since $c,d \in E_{ins}$ and there is a transition labeled $c$ from state $\{1, 2\}$ to state $\{3\}$ in $Obs(G)$, we add transitions labeled $c$ and $c_+$ from state $\{1, 2\}$ to state $\{3\}$ in the operator observer. Similar arguments can be used to explain the transitions labeled $c$ and $c_+$ from state $\{5\}$ to state $\{6\}$, {\color{black} the transitions labeled $d$ and $d_+$ from state $\{7,8\}$ to state $\{8\}$, and the self-loops labeled $d$ and $d_+$ at state $\{8\}$.} Then, since $c$, $g \in E_{era}$, we add self-loops labeled $c_-$ and $g_-$ at all the states. Finally, we add all the missing transitions to the new state $b_\emptyset$, which has no output arc.~\hfill $\diamond$ {\color{black} To better characterize the properties of the operator observer, let us define two sets of words associated to an attack model as described in Subsection~\ref{Attackmodel}. \begin{defin} \rm The \emph{set of stealthy words} on attack alphabet $E_a$ is $$ W_s=\{w \in E_a^* \ | \ \widehat{P}(w) \in P(L(G))\}, $$ while the \emph{set of exposing words} on $E_a$ is $$ W_e = \{ w e_a \in E_a^* \mid w \in W_s, e_a \in E_a, w e_a \not\in W_s \}. $$ ~\hfill $\diamond$ \label{def_stex} \end{defin} In plain words, a stealthy word $w$ produces an observed word $s' = \widehat{P}(w)$ which does not reveal the presence of the attacker because such an observation may have been produced by the plant. An exposing word is a non-stealthy word on $E_a$ whose strict prefixes are all stealthy: hence it reveals the presence of the attacker but only at the last step. } The following proposition provides a characterization of the {\color{black} operator observer}. \begin{proposition} \label{prop2} \rm Let $G$ be a plant with set of observable events $E_o$ and observer $Obs(G) = (B,{E_o},{\delta _{obs}},b_0)$. {\color{black} Given an attack alphabet $E_a = E_o \cup E_+ \cup E_-$ with set of stealthy words $W_s$ and set of exposing words $W_e$ , let} $Obs_{opr}(G)$ be the operator observer constructed by Algorithm~\ref{alg2}. It holds that: \end{proposition} \begin{enumerate} \item[(a)] $L(Obs_{opr}(G)) = {\color{black} W_s \cup W_e}$; \item[(b)] $\forall w \in L(Obs_{opr}(G))$: if $w \in W_s$, then $\delta_{opr}^*(b_0,w)=\delta_{obs}^*(b_0,\widehat{P}(w))$; {\color{black} if $w \in W_e$, then} $\delta_{opr}^*(b_0,w)=b_{\emptyset}$. \end{enumerate} \textbf{Proof.} (a) Follows from Algorithm~\ref{alg2}, and from the definitions of stealthy words, {\color{black} exposing words}, and reduction projection. In more detail, Step~3 guarantees that all uncorrupted words belong to $L(Obs_{opr}(G))$. Steps~4--10 guarantee that, in $Obs_{opr}(G)$, events in $E_+$ lead to the same states of the corresponding events in $E_{ins}$. Steps~11--15 guarantee that, in $Obs_{opr}(G)$, events in $E_-$ lead to self-loops. Finally, Steps~16--22 impose that, if after executing Steps~1--15, a certain event in $E_a$ is not already enabled at a certain state of $Obs_{opr}(G)$, then such an event is enabled at such a state and leads to state $b_{\emptyset}$, where no other event may be executed. (b) We prove this by induction on the length of $w$. If $w=\varepsilon$, the result holds being $\hat P(w)=\varepsilon$. Consider now a word $w \in L(Obs_{opr}(G))$ with length greater than one. Assume $w \in W_s$, and let $w=w'e_a$. Assume that the result holds for a generic $w'\in W_s$. By definition of reduction projection, if $e_a \in E_o \cup E_+$, then $\widehat{P}(w) = \widehat{P}(w')e \in \widehat{P}(w')\{e, \varepsilon\}$; otherwise $\widehat{P}(w) = \widehat{P}(w') \in \widehat{P}(w')\{e, \varepsilon\}$. Thus $\delta_{opr}^*(b_0,w)=\delta_{opr}(\delta_{opr}^*(b_0,w'),e_a)$. Then, $\delta_{obs}^*(b_0,\widehat{P}(w))\!=\!\delta_{obs}(\delta_{obs}^*(b_0$, $\widehat{P}(w')),e)$ if $e_a \in E_o \cup E_+$, and $\delta_{obs}^*(b_0,\widehat{P}(w))=\delta_{obs}(\delta_{obs}^*(b_0,\widehat{P}(w')),\varepsilon)$ if $e_a \in E_-$. According to Algorithm~\ref{alg2} the transition function of $Obs_{opr}(G)$ starting for a generic state $b\in B$ is defined in the same way in case of $e$ and $e_+$ (Steps~6 and 7), while it corresponds to a self-loop in the case of $e_- \in E_-$ (Step~13). As a result, we can conclude that $\delta_{opr}^*(b_0,w)=\delta_{obs}^*(b_0,\widehat{P}(w))$. Finally, the last claim in (b) follows from the fact that, if {\color{black} $w \in W_e$}, according to Algorithm~\ref{alg2}, all the missing transitions end up in the new state $b_\emptyset$, thus $\delta_{opr}^*(b_0,w)=b_{\emptyset}$.~\hfill $\Box$ \section{Unbounded and $n$-bounded attack structures}\label{Attackstructure} In this section we define a particular DFA, called {\em attack structure}, {\color{black} which is defined on alphabet $E_a$ and contains all stealthy and exposing attack words that can be generated by the plant}. Here we distinguish two different cases. In the first case, the attack function belongs to ${\mathcal F}_\infty$. We call {\em unbounded attack structure} the corresponding DFA, denoted as $A_\infty$. In the second case, the attack function belongs to ${\mathcal F}_n$ for a given $n \in \mathbb{N}$. We call {\em $n$-bounded attack structure} the corresponding DFA and denote it as $A_n$. \subsection{Unbounded attack structure}\label{Unboundedattackstructure} Let us first formalize the definition of $A_{\infty}$. \begin{defin} \rm The \emph{unbounded attack structure} $A_\infty=(R,E_a,\delta_a,r_0)$ w.r.t. \emph{G} and $E_{com}$ is defined as $A_\infty= Obs_{att}(G) \parallel Obs_{opr}(G)$.~\hfill $\diamond$ \label{def12} \end{defin} \begin{example} \rm Consider again the plant $G$ in Fig.~\ref{fig2} whose attacker observer and operator observer are visualized in Figs.~\ref{fig7}(a) and (b), respectively. The unbounded attack structure $A_\infty$ built according to Definition~\ref{def12} is shown in Fig.~\ref{fig9} (neglect for the moment the different colours associated with states). \label{exa4} \end{example} \begin{figure}[htbp] \centering \includegraphics[width=3.2in]{A.png}\\ \caption{Unbounded attack structure $A_\infty$ in Example~\ref{exa4}.} \label{fig9} \end{figure} By inspecting the unbounded attack structure $A_\infty$ in Fig.~\ref{fig9}, once event $a$ occurs on the plant, the attacker executes event $a$ on $A_{\infty}$ starting from the initial state $(\{0\},\{0\})$. Thus state $(\{1,2\},\{1,2\})$ is reached. Now, the attacker may wait for a new event occurring on the plant, $a$ or $c$ in this case. Alternatively, the attacker may insert an event $c$ or $d$ in the operator observation, which correspond to execute $c_{+}$ or $d_{+}$, respectively, in $A_{\infty}$. Then, the attacker may erase event $c$ in the operator observation, which corresponds to execute $c_{-}$ in $A_{\infty}$, {\color{black} and so on}. {\color{black} We notice that, any word $w\in E_a^*$ generated by the unbounded attack structure allows us to argue the following three information: (1) which is the observation $s\in E_o^*$ actually produced by the system; (2) how the attacker corrupted it (which events it has inserted and/or erased); (3) which is the word $s'\in E_o^*$ observed by the operator. Consider as an example, the word $w = a c_- a c_+ \in E_a^*$ that leads to state $(\{4\},\{6\})$. This corresponds to the observation $s=a ca $ produced by the system. The attacker erases the observation $c$ after the first $a$ and inserts the dummy observation $c$ after the second $a$, resulting in the word $s'=\widehat P(w)=a a c$ observed by the operator. }~\hfill $\diamond$ {\color{black} The following theorem provides a characterization of the unbounded attack structure}. \begin{theorem} \rm {\color{black} Let $G$ be a plant with set of observable events $E_o$ and observer $Obs(G) = (B,{E_o},{\delta _{obs}},b_0)$. Given attack alphabet $E_a$, with set of stealthy words $W_s$ and set of exposing words $W_e$, let $A_\infty=(R,E_a,\delta _a,r_0)$ be its unbounded attack structure.} It holds that: \label{the1} \end{theorem} \begin{enumerate} \item[(a)] $\color{black} L(A_\infty) = L({\mathcal F}_{\infty},G) \cap \left (W_s \cup W_e \right)$; {\color{black} \item[(b)] $\forall s \in P(L(G))$, $\forall f_{\infty}\in {\mathcal F}_{\infty}$ with $w=f_\infty(s) \in E_a^*$: \begin{enumerate} \item[(i)] if $w \in W_s$ then $\delta_a^*(r_0,w)=(b_a,\overline{b}_a)$ $\Longleftrightarrow$ \\$\delta_{obs}^*(b_0,s)=b_a$, $\delta_{obs}^*(b_0,\widehat{P}(w))=\overline{b}_a$; \item[(ii)] if $w \in W_e$ then $\delta_a^*(r_0,w)=(b_a,b_\emptyset)$ $\Longleftrightarrow$ \\$\delta_{obs}^*(b_0,s)=b_a$, $\delta_{obs}^*(b_0,\widehat{P}(w))$ is not defined. \end{enumerate} } \end{enumerate} \textbf{Proof.} (a) Follows from Propositions~\ref{prop1} and \ref{prop2} and Definition~\ref{def12}. Indeed, by Proposition~\ref{prop1}, it holds that $L(Obs_{att}(G))=L({\mathcal F}_{\infty},G)$ and by Proposition~\ref{prop2}, it holds that {\color{black} $L(Obs_{opr}(G)) = W_s \cup W_e$. Since $A_\infty$ is defined as the concurrent composition of $Obs_{att}(G)$ and $ Obs_{opr}(G)$, having the same alphabet, its language is equal to the intersection of the languages of the two DFA.} (b) We first consider the case: $\color{black} w \in W_s$. {\em (If)} Assume that $\delta_{obs}^*(b_0,s)=b_a$, $\delta_{obs}^*(b_0,\widehat{P}(w))=\overline{b}_a$. By Propositions~\ref{prop1} and \ref{prop2}, it holds that $\delta_{obs}^*(b_0,s)=\delta_{att}^*(b_0,w)$ and $\delta_{obs}^*(b_0,\widehat{P}(w))=\delta_{opr}^*(b_0,w)$, namely, $\delta_{att}^*(b_0,w)=b_a$ and $\delta_{opr}^*(b_0,w)=\overline{b}_a$. Since $A_\infty=Obs_{att}(G) \parallel Obs_{opr}(G)$, by definition of concurrent composition, it is $\delta_a^*(r_0,w)={\color{black} (b_a,\overline{b}_a)}$. {\em (Only if)} Assume that $\delta_a^*(r_0,w)={\color{black} (b_a,\overline{b}_a)}$. Since $A_\infty=Obs_{att}(G) \parallel Obs_{opr}(G)$, by definition of concurrent composition, it holds that $\delta_{att}^*(b_0,w)=b_a$ and $\delta_{opr}^*(b_0,w)=\overline{b}_a$. By Propositions~\ref{prop1} and \ref{prop2}, it is $\delta_{obs}^*(b_0,s)=\delta_{att}^*(b_0,w)$ and $\delta_{obs}^*(b_0,\widehat{P}(w))=\delta_{opr}^*(b_0,w)$, namely, $\delta_{obs}^*(b_0,s)=b_a$ and $\delta_{obs}^*(b_0,\widehat{P}(w))=\overline{b}_a$. {\color{black} Let us finally consider the case $w \in W_e$. The proof follows from the definition of concurrent composition and the fact that a word $w$ in the operator observer yields state $b_\emptyset$ if and only if $\widehat{P}(w) \not\in P(L(G))$, i.e., $\delta_{obs}^*(b_0,\widehat{P}(w))$ is not defined.}~\hfill $\Box$ {\color{black} In plain words, Theorem~\ref{the1} implies that the language of the attack structure contains all words on alphabet $E_a$ that can be generated under attack and that are either stealthy or exposing. In addition the state $(b_a,\overline{b}_a)$ reached in the attack structure by a stealthy word $w=f_{\infty}(s)$ describes the correct observation $b_a=\mathcal{C}(s)$ that would have been computed by the operator without attack and the corrupted observation $\overline{b}_a=\mathcal{C}(s') = \mathcal{C}(\widehat{P}(w))$ due to the attack. An exposing word $w=f_{\infty}(s)$ reaches a state $(b_a,b_\emptyset)$ where $b_a=\mathcal{C}(s)$ is the correct observation that would have been computed by the operator without attack.} \subsection{Bounded attack structure}\label{nboundedattackstructure} The $n$-bounded attack structure $A_n$ that describes attack functions in ${\mathcal F}_n$, can be easily obtained starting from $A_{\infty}$. To this aim, a particular DFA, called \emph{n-bounded attack automaton}, denoted as $G_n$, is introduced. Then $A_n$ is obtained as the concurrent composition of $A_{\infty}$ and $G_n$. \begin{defin}\label{def14} \rm The \emph{n-bounded attack automaton} is a DFA: $G_n=(X,E_a,\delta,0)$, where $X=\{0,1,\ldots, n\}$ ($n \in \mathbb{N}$), and the transition function is defined as follows: \end{defin} \begin{equation} \left\{\begin{array}{lcl} {\forall i \in X, \ \delta(i,e_a):=0} \ \text{if} \ e_a \in E_a \setminus E_+, \\ {\forall X \backslash \{n\}, \ \delta(i,e_a):=i+1} \ \text{if} \ e_a \in E_+. \end{array}\right. \end{equation}~\hfill $\diamond$ Fig.~\ref{fig8} shows the $n$-bounded attack automaton $G_n$. As it can be seen, events in $E_a \setminus E_+$ are enabled at any state. On the contrary, events in $E_+$ are enabled provided that they have not been already executed $n$ times consecutively. \begin{figure}[htbp] \centering \includegraphics[width=3in]{Gn.png}\\ \caption{$n$-bounded attack automaton $G_n$} \label{fig8} \end{figure} \begin{theorem} \rm Let $G$ be a plant with attack alphabet $E_a$ and unbounded attack structure $A_\infty=(R,E_a,\delta _a,r_0)$. Let $A_n= A_\infty \parallel G_n$, where $G_n$ is the $n$-bounded attack automaton. It holds that $L(A_n) =L(A_\infty) \setminus \{w \in L(A_\infty) \ | \ cons_{E_+}(w)>n \}$, where $cons_{E_+}(w)$ denotes the {\color{black} maximum} number of consecutive events in $E_+$ contained in the word $w$. \label{the2} \end{theorem} \textbf{Proof.} Follows from the fact that $A_n$ is defined as $A_n= A_\infty \parallel G_n$ and $G_n$ limits to $n$ the maximum number of consecutive events that the attacker can add to the operator observation.~\hfill $\Box$ \begin{example} \rm Consider the unbounded attack structure $A_{\infty}$ in Example~\ref{exa4}. The $1$-bounded attack automaton $G_1$ and the $1$-bounded attack structure $A_1=A_{\infty} \parallel G_1$ are depicted in Figs.~\ref{fig10} and~\ref{fig11}, respectively. ~\hfill $\diamond$ \label{exa6} \end{example} \begin{figure}[htbp] \centering \includegraphics[width=2in]{G1.png}\\ \caption{$1$-bounded attack automaton $G_1$ in Example~\ref{exa6}.} \label{fig10} \end{figure} \vspace{0.5cm} \begin{figure}[htbp] \centering \includegraphics[width=3.2in]{A1.png}\\ \caption{$1$-bounded attack structure $A_1$ in Example~\ref{exa6}.} \label{fig11} \end{figure} {\color{black} A result equivalent to Theorem~\ref{the1} holds for an $n$-bounded attack structure. } \section{Supremal stealthy attack substructure}\label{Supremalstealthyattackstructureandfunction} In this section we show how an attack structure $A$ (which may either be an unbounded or an $n$-bounded attack structure) should be appropriately trimmed to ensure that all the actions that an attacker may implement (erase or insert events) based on it, guarantee stealthiness. The DFA resulting from the trimming operation is called {\em supremal stealthy attack substructure}. \subsection{Exposing states and stealthy states} Let us first introduce the notion of exposing and stealthy states of an attack structure. \begin{defin} \rm Given an attack structure $A=(R,E_a,$ $\delta_a,r_0)$ we define the set of \emph{exposing states} as $R_e:=\{r=(b_a , \overline{b}_a)\in R \ | \ \overline{b}_a = b_\emptyset\}$ and the set of \emph{stealthy states} as $R_s= R \setminus R_e$.~\hfill $\diamond$ \label{Dexposablestates} \end{defin} An {\color{black} attack word} leading to an exposing state reveals the presence of an attacker to an operator observing the system's evolution. Note, however, that there may exist stealthy states from which an exposing state is necessarily reached following a particular evolution of the plant. \begin{example} \rm Consider the unbounded attack structure $A_{\infty}$ in Fig.~\ref{fig9} already considered in Example~\ref{exa4}. When the stealthy state $(\{6\},\{4\})$ is reached, the plant is in state $\{6\}$. At this point, event $a \in E_o \setminus E_{era}$ may occur in the plant. Since the attacker can not erase event $a$, then the exposing state {\color{black} $(\{7,8\},\{b_\emptyset\})$} is reached. The attacker may try to preempt the occurrence of event $a$ inserting an event in $E_+=\{c_+, d_+\}$. However, from $(\{6\}, \{4\})$ inserting any of these events also yields exposing state $(\{6\},\{b_\emptyset\})$.~\hfill $\diamond$ \label{Exastealthystates} \end{example} \subsection{Supremal stealthy attack substructure} {\color{black} Consider} function $ g: 2^{R_s} \to 2^{R_s}$ defined for all $R' \subseteq R_s$ as follows: \begin{equation} g(R') =g_1(R') \cup g_2(R') \label{eq_f} \end{equation} where \begin{equation} \begin{array}{ll} g_1(R') = \left\{ r \in R' \mid \right. \\ \hspace{1.1cm} \text{\textbf{if}} \qquad e \in E_o \ \text{\textbf{and}} \ {\color{black} \delta_a(r,e) \in R \setminus R'}\\ \hspace{1.1cm} \text{\textbf{then}} \ \left. e \in E_{era} \ \text{\textbf{and}} \ \delta_a(r,e_-) \in R' \right\} . \end{array} \label{eq_f1} \end{equation} and \begin{equation} \begin{array}{ll} g_2(R') = \left\{ r \in R' \setminus g_1(R') \mid \right. \\ \hspace{1.1cm} (\exists w_+ \in E_{+}^*) \ [\delta_a(r,w_+) \in g_1(R') \ \text{\textbf{and}} \\ \hspace{1.1cm} \left. (\forall w \prec w_+) \ \delta_a(r,w) \in R'] \right\}. \end{array} \label{eq_f2} \end{equation} In words, the set $g(R') \subseteq R'$ is the set of states from which a suitable attacker decision can prevent leaving $R'$ and includes states belonging to two different sets: $g_1(R')$ and $g_2(R')$. Set $g_1(R')$ includes the states of $R'$ such that, if there exists an observable event $e$ whose occurrence leads outside $R'$, then the attacker may cancel it to remain in $R'$. Set $g_2(R')$ includes the states of $R'$ that do not belong to $g_1(R')$, from which it is possible to reach a state in $g_1(R')$ inserting a word $w_+$, and all the states visited generating it belong to $R'$. A fixed-point of $g$ is a set $R_{fix} \subseteq R_s$ such that $g(R_{fix}) = R_{fix}$. The following theorem shows that function $g$ in equation~\eqref{eq_f} has a \emph{supremal} (i.e., unique maximal) non-empty fixed point. \begin{theorem}\label{theorem_f} \rm Consider an attack structure $A=(R,E_a,$ $\delta_a,r_0)$ with set of stealthy states $R_s$. Let $g:2^{R_s}\rightarrow 2^{R_s}$ be the function defined for all $R'\subseteq R_s$ as in equation~\eqref{eq_f}. Function $g$ has a non-empty supremal fixed point, denoted in the following as {\color{black} $R_{sf}$}. \end{theorem} \textbf{Proof.} We preliminarily observe that function $g$ is monotone, i.e., by definition for all $R' \subseteq R''$ it holds that $g(R') \subseteq g(R'')$. Thus according to Tarski's fixed-point theorem \cite{Tarski:1955} function $g$ has a \textit{unique maximal fixed-point}, i.e., a \textit{supremal fixed-point}, that we denote as {\color{black} $R_{sf}$} and that can be computed as \begin{equation} {\color{black} R_{sf}} = \bigcap_{k \geq 0} g^k(R_s) \label{eq_maxfp} \end{equation} in at most $|R_s|$ iterations \cite{Kushi:2018}. In addition, one can easily verify that, for all attack structures $A$, the set of states reachable without any attack $$R_0 = \{(b_a , \overline{b}_a)\in R \ | \ b_a = \overline{b}_a \} \subseteq R_s$$ is a fixed-point of $g$ since the occurrence of an event $e \in E_o$ does not lead out of this set: this ensures that ${\color{black} R_{sf}} \supseteq R_0$ is not empty.~\hfill $\Box$ In the following, {\color{black} the supremal fixed-point {\color{black} $R_{sf}$} of function $g$} is called {\em strongly stealthy region}, {\color{black} and it can be computed using eq. \eqref{eq_maxfp}. Set $R_w= R \setminus {\color{black} R_{sf}}$ is called {\em weakly exposing region}.} \begin{example} \rm Consider again the partially-observed plant $G = \left( {X,E,\delta ,{x_0}} \right)$ in Fig.~\ref{fig2}, where $E_o=\{a,c,d,g\}$, $E_{uo} = \left\{ b \right\}$, $E_{ins}=\{c,d \}$, and $E_{era}=\{c,g \}$. The unbounded attack structure $A_\infty$ is shown in Fig.~\ref{fig9}. Here, exposing states are highlighted in gray, while states in $R_w$ that are not exposing are highlighted in yellow. To clarify how non-exposing states are added to $R_w$, let us consider state $(\{6\},\{4\})$. Indeed, there exists a transition labeled $a \in E_o \setminus E_{era}$ that leads from $(\{6\},\{4\})$ to a state in $R_w$ (in such a case the exposing state is {\color{black} $(\{7,8\}, \{b_{\emptyset}\})$}). This is equivalent to say that $(\{6\},\{4\})$ does not belong to $g_1(R \setminus R_w)$. In addition, $(\{6\},\{4\})$ also does not belong to $g_2(R\setminus R_w)$ because from such a state it is not possible to reach a state in $g_1(R\setminus R_w)$ adding a {\color{black} sequence} of events in $E_+$. Hence $(\{6\},\{4\}) \notin g(R \setminus R_w)$.~\hfill $\diamond$ \label{new_example} \end{example} \begin{defin} \rm Consider an attack structure $A=(R,E_a,\delta_a,r_0)$ with set of stealthy states $R_s$. Let $g:2^{R_s}\rightarrow 2^{R_s}$ be the function defined in equation~\eqref{eq_f} and {\color{black} $R_{sf}$} be its supremal fixed point. The DFA $\widehat{A}=(\widehat{R},E_a,\widehat{\delta}_a,r_0)$ called {\em supremal stealthy attack substructure} of $A$, is obtained from $A$ in two steps: {\color{black} (a) Let $A'$ be the automaton obtained removing from $A$ all states in $R \setminus R_{sf}$ and their input and output arcs. (b) Let $\widehat R$ be the set of reachable states in $A'$ and let $\widehat A$ be the automaton obtained from $A'$ removing all states that are not in $\widehat R$ and their input and output arcs.~\hfill $\diamond$ } \label{DefSSAS} \end{defin} {\color{black} In simple words $\widehat{A}=(\widehat{R},E_a,\widehat{\delta}_a,r_0)$ is obtained trimming $A$ first removing all states that are not in $R_{sf}$ and then removing all states that are unreachable from the initial state. } \begin{example} \rm Consider again the partially-observed plant $G = \left( {X,E,\delta ,{x_0}} \right)$ in Fig.~\ref{fig2} and its unbounded attack structure $A_\infty$ in Fig.~\ref{fig9}, as discussed in Example~\ref{new_example}. The corresponding supremal stealthy attack substructure is shown in Fig.~\ref{fig12}. {\color{black} The reason for coloring in green state $(\{5\},\{6\})$ and marking state $(\{6\},\{5\})$ with a double circle will be discussed in the following section.} ~\hfill $\diamond$ \label{new_example2} \end{example} \begin{figure}[htbp] \centering \includegraphics[width=2.5in]{As.png}\\ \caption{Supremal stealthy attack substructure $\widehat{A}_\infty$ in Example~\ref{new_example2}.} \label{fig12} \end{figure} {\color{black} \begin{proposition} \label{PropNew} \rm The language $L(\widehat{A})$ of the supremal stealthy attack substructure is the set of all attack words that are stealthy and can be kept stealthy by a proper action of the attacker, regardless of the future evolution of the plant. \end{proposition} \textbf{Proof.} By definition, a fixed-point of function $g$ is a set of stealthy states of the attack structure that the attacker can make invariant by choosing a suitable action. Correspondingly, the words generated by evolutions that remain within such a set can be kept stealthy by the attacker. The fact that set $L(\widehat{A})$ contains all such words follows from the fact that $\widehat{R}$ is the set of reachable states that belong to the supremal fixed-point of $g$.~\hfill $\Box$ } {\color{black} We conclude this section discussing} the complexity of computing the supremal stealthy attack substructure. Given a plant \emph{G} with set of states \emph{X}, the observer of the plant can be constructed in $2^{|X|}$ steps. The unbounded attack structure is obtained computing $A_\infty=Obs_{att}(G) \parallel Obs_{opr}(G)$, thus $A_\infty$ can be constructed in $2^{|X|} \cdot 2^{|X|}$ steps. Given an integer value $n$, the $n$-bounded attack structure is obtained by computing $A_n=A_\infty \parallel G_n$ where $G_n$ is the $n$-bounded attack automaton. Therefore, $A_n$ can be constructed in $2^{|X|}\cdot 2^{|X|}\cdot(n+1)$ steps. Finally, testing if a state of an $n$-bounded attack structure $r \in g(R \setminus R_w)$ has linear complexity in the size of $A_n$. Therefore, the complexity of constructing $\widehat{A}_n$ is $O(2^{4|X|}\cdot n^2)$. For unbounded attacks the composition with $G_n$ is not needed. In this case the complexity of constructing $\widehat{A}_\infty$ reduces to $O(2^{4|X|})$. \section{Computing stealthy and harmful attack function}\label{Section7} {\color{black} This section consists of three subsections. In Subsection~\ref{Preemptingstates} we show how to identify a subset of states of the supremal stealthy attack substructure, called \emph{preempting states}. In Subsection~\ref{SectionPreemptingAttackFunction} we show how to select a stealthy attack function from the supremal stealthy attack substructure. Finally, in Subsection~\ref{attackerselection} we discuss how the existence of a harmful attack function can be verified by means of the previous substructure. } \subsection{Preempting states}\label{Preemptingstates} In this subsection we define a subset of the states of the supremal stealthy attack substructure, called {\em preempting states}, which are needed to define a procedure to select a stealthy attack function from the supremal stealthy attack substructure. \begin{defin} \rm Consider an attack structure $A=(R,E_a,\delta_a,r_0)$ with supremal stealthy attack substructure $\widehat{A}=(\widehat{R},E_a,\widehat{\delta}_a,r_0)$. The set of \emph{preempting states} of $\widehat{A}$ is $$\begin{array}{ccl} {\color{black} \widehat{R}_p} = & \{ r \in \widehat{R} \ \mid & (\exists e \in E_o) \ {\color{black} \delta_a(r, e) \in R \setminus \widehat{R}} \\ & &\wedge (e \not\in E_{era} \ \vee \ {\color{black} \delta_a(r, e_-) \in R \setminus \widehat{R}} ) \ \}. \\ \end{array} $$ {\color{black} Define $$ \widehat{R}_{np}=\widehat{R} \setminus \widehat{R}_p. $$ } \null \hfill $\diamond$ \label{def18} \end{defin} Recalling the definition of function $g_2$ given in (\ref{eq_f2}), it is straightforward to observe that $ {\color{black} \widehat{R}_p} = g_2(\widehat{R})$. Note that a state $r \in {\color{black} \widehat{R}_p}$ (namely a state of the supremal stealthy attack substructure $\widehat{A}$) is preempting if there exists an observable event $e$ in the original attack structure whose occurrence (even if erased) leads out of $\widehat{R}$ {\color{black} and this may eventually lead to expose the attacker. However, the occurrence of such observable event $e$ can be preempted inserting a suitable sequence of events in $E_+$ so as to reach a non-preempting state}. \begin{example} \rm Consider again the partially-observed plant $G = \left( {X,E,\delta ,{x_0}} \right)$ in Fig.~\ref{fig2}(a) with unbounded attack structure $A_{\infty}$ in Fig.~\ref{fig9} {\color{black} and supremal stealthy attack substructure in Fig.~\ref{fig12}. State $(\{6\},\{5\})$ is a preempting state because from Fig.~\ref{fig9} one can see that the occurrence of event $a$, which cannot be erased, yields exposing state $(\{7,8\},b_\emptyset)$. The preempting state is marked with a double circle in Fig.~\ref{fig12}. Once state $(\{6\},\{5\})$ is reached, event $c_+$ should be inserted to reach a state that is not preempting. }~\hfill $\diamond$ \label{Exapreemptingstates1} \end{example} \subsection{Selection of a stealthy attack function}\label{SectionPreemptingAttackFunction} In this subsection we show how an attacker may determine a stealthy attack function $f^s$ given a supremal stealthy attack substructure. This can be done associating to each possible observation produced by the plant a suitable attack word. The proposed approach is summarized in the following steps. Note that here, given a state $r\in \widehat{R}$, we denote as $\color{black} {\mathcal A}(r) \subseteq E_a$ the set of events enabled at $r$ in $\widehat{A}$. Furthermore, we denote as $\color{black} {\mathcal W}_+(r) \subseteq E_a^*$ the set of words that can be generated in $\widehat{A}$ starting from $r$ and executing a sequence of events $w_+\in E_+^*$ that lead to a non preempting state, namely, \begin{equation} {\mathcal W}_+(r)=\{w_+ \in E_+^{*} \ \mid \ \widehat{\delta}_a^*(r,w_+)=r', \ r' {\color{black} \in \widehat{R}_{np}} \}. \end{equation} \begin{procedure}{\color{black} \rm (Compute a stealthy attack function $f^s$ {\color{black} from a supremal stealthy attack substructure $\widehat{A}=(\widehat{R},E_a,\widehat{\delta}_a,r_0)$})}. \begin{enumerate} \item Let $s=\varepsilon$. \item Select a sequence $w_+\in {\mathcal W}_+(r_0)$. \item Let $f^s(s)=w_+$. \item Let $r=\widehat{\delta}_a^*(r_0,w_+)$. \item Wait for the system to generate a new event $e\in E_o$. \item ${\mathcal E} = \emptyset$. \item If $e \in {\mathcal A}(r)$ then ${\mathcal E} = {\mathcal E} \cup \{ e \}$. \item If $e_- \in {\mathcal A}(r)$ then ${\mathcal E} = {\mathcal E} \cup \{ e_- \}$. \item Select an event $e' \in {\mathcal E}$ and a sequence $w_+\in {\mathcal W}_+(\widehat{\delta}_a(r,e'))$ and let $w=e' w_+$. \item Let $f^s(se)=f^s(s)w$. \item Let $s=se $. \item Let $r=\widehat{\delta}_a^*(r,w)$. \item Goto Step~5. \end{enumerate} \label{proc1} \end{procedure} The above procedure can be explained as follows. If no event occurs in the plant, the attacker can insert a bounded word $w_+ \in E_+^{*}$, provided that the state reached executing $w$ in $\widehat{A}$ is {\color{black} in $\widehat{R}_{np}$}, namely it is not a preempting state. Note that in general the choice of $w_+$ is not unique. Indeed, in Step~2 we select one $w_+$ in the set ${\mathcal W}_+(r_0)$, which in general is not a singleton. In Step~3 we update accordingly function $f^s$, and in Step~4 we compute the new current state of $\widehat{A}$, denoted as $r$. We then wait for the system to generate a new observable event $e$ (Step~5). In this case a new set ${\mathcal E}$ is defined and it is initialized at the empty set. As specified in Steps~7 and 8, such a set may contain the event $e$, if $e$ is enabled at $r$. In addition, it may contain the event $e_-$, if $e_-$ is enabled at $r$. At Step~9 one event $e^{\prime}\in {\mathcal E}$ is selected, as well as one word $w_+\in {\mathcal W}_+(\widehat{\delta}_a(r,e^{\prime}))$. Finally, the corrupted word $w$ is defined as the concatenation of $e^\prime$ and $w_+$. Then, function $f^s$ is updated accordingly (Step~10), as well as the observation $s$ (Step~11) and the current state $r$ of $\widehat{A}$ (Steps~12). The procedure goes ahead (Step~13) when a new observable event is generated, starting again from Step~5. As discussed {\color{black} in the above procedure}, the key feature in selecting a stealthy attack function is that of choosing, from the supremal stealthy attack substructure, attack words that do not end in a preempting state. {\color{black} \begin{propo} \rm Consider a plant $G$ under attack and let $f:P(L(G))\rightarrow E_a^*$ be an attack function. Function $f$ is stealthy if and only if for all $s \in P(L(G))$ the attack word $f(s)$ can be computed by Procedure~\ref{proc1}. \label{PropStealthy} \end{propo} \textbf{Proof.} We denote by $A=(R,E_a,\delta_a,r_0)$ the attack structure of $G$ with set of stealthy states $R_s$. We also denote by $\widehat{A}=(\widehat{R},E_a,\widehat{\delta}_a,r_0)$ the supremal stealthy attack substructure computed by $A$ using Definition~\ref{DefSSAS}. {\em (If)} By construction $ \widehat{R} \subseteq R_s \subseteq R$, i.e., language $L(\widehat{A})$ only contains stealthy words and thus any word computed by Procedure~\ref{proc1} is stealthy. In addition, a word computed by the procedure yields a non-preempting state $r \in \widehat{R}$, i.e., $r \in g_1(\widehat{R})$ using the notation of eq.~(\ref{eq_f1}). This means that for any observable event $e \in E_o$ that the plant can generate after $s$, the procedure will compute a new word $f(se)$ still in $L(\widehat{A})$ and thus function $f$ is stealthy. {\em (Only if)} Assume, that for a given attack function $f$ there exists an observation $s \in P(L(G))$ such that $f(s)$ cannot be computed by Procedure~\ref{proc1}. Two cases are possible. a) If $f(s) \in L(\widehat{A})$, then $f(s)$ yields a preempting state and there exists some observable event $e \in E_o$ such that $f(se) \in L(A) \setminus L(\widehat{A})$, i.e., $f(se)$ yields in $A$ a state not in $\widehat{R}$. b) If $f(s) \in L(A) \setminus L(\widehat{A})$, then $f(s)$ yields in $A$ a state not in $\widehat{R}$. This means that attack function $f$ produces an attack word not in $L(\widehat{A})$ and hence, by Proposition~\ref{PropNew}, it cannot be stealthy.~\hfill $\Box$ } \subsection{{\color{black} Existence of a harmful stealthy attack function w.r.t. a relation $\mathcal{R}$}}\label{attackerselection} {\color{black} In this subsection we characterize those cases in which a stealthy attack function that is harmful w.r.t. certain a relation $\mathcal{R}$ exists.} \begin{propo} \rm Consider a plant $G$ under attack and let $\widehat{A}=(\widehat{R},E_a,\widehat{\delta}_a,r_0)$ be its supremal stealthy attack substructure. {\color{black} Given a misleading relation $\mathcal{R}$, a harmful attack function can be selected iff $\widehat R_{np} \cap \mathcal{R} \neq \emptyset$ where $\widehat R_{np}$ is the subset of non preempting states in $\widehat R$.} \end{propo} \textbf{Proof.} {\color{black} The proof follows from Proposition~\ref{PropStealthy} and Definition~\ref{def7}. Indeed, according to Definition~\ref{def7}, a stealthy attack function $f$ is harmful if there exists a word $s \in P(L(G))$ such that $(\mathcal{C}(s),\mathcal{C} (\widehat{P}(f(s))) \in \mathcal R$, where $\widehat{P}$ is the reduction projection. Now, according to Proposition~\ref{PropStealthy} this is only possible if $f(s)$ can be computed by Procedure~\ref{proc1}: this implies $f(s)$ yields in $\widehat A$ a non preempting state.~\hfill $\Box$} \begin{example} \rm Consider again the partially-observed plant $G = \left( {X,E,\delta ,{x_0}} \right)$ in Fig.~\ref{fig2}(a), where $E_o=\{a,c,d,g\}$ and $E_{uo} = \left\{ b \right\}$. {\color{black} Let $\mathcal{R} = \{ (\{5\}, X ) \ | \ X \subseteq \{6, 7, 8\} \}$.} The supremal stealthy attack substructure $\widehat{A}$ is shown in Fig.~\ref{fig12}. State $(\{5\},\{6\})$, highlighted in green, is a harmful state. When such a state is reached following the attacked observation, the plant is in state $\{5\}$, while the operator thinks {\color{black} it} is in state $\{6\}$. In such a case, the attack is {\color{black} harmful}. In particular, the {\color{black} harmful} attack can be realized by inserting event $c$ ($c_+$ in Fig.~\ref{fig12}) {\color{black} after the plant has produced two $a$'s, so that the correct observation $s= aa$ is corrupted to $s'= aac$}. \label{ExampleNon} \end{example} \section{Conclusions and future work}\label{Conclusions} In this paper we investigate the problem of {\color{black} state estimation under attack}, for partially-observed discrete event systems. In more detail, an operator observes the system evolution with {\color{black} a natural projection}, which {depends} on the sensors available on the system. The operator observation may be corrupted by an attacker. The corruption may be done by erasing some events that have occurred and/or inserting some events that have not actually occurred. It is possible to impose an upper bound on the number $n$ of consecutive observations that can be added by the attacker within the occurrence of two observable events in the plant. We show how to construct a supremal stealthy attack substructure that allows the attacker to realize all the corruptions on the observation that prevents the operator to {\color{black} make the correct state estimation}. The way by which the attacks are generated guarantees that the operator never realizes that someone is corrupting its observation, namely the attacker remains stealthy. Our future lines of research in this framework will follow several directions. On the one hand, we will look for a way to compute the smallest value of the bound $n$ that guarantees the existence of a harmful attack, without having to repeatedly apply the approach for increasing values of $n$. On the other hand, we will try to characterize and solve the same problem using Petri nets to understand if some advantages in terms of computational complexity can be obtained and if efficient solutions can also be computed for unbounded systems. {\color{black} Finally, we plan to discuss how the proposed procedure may also be useful to an operator, in the case the system is not robust to attack, to prevent the occurrence of certain events, via a supervisory control law, in order to enforce robustness with respect to attack. } \bibliographystyle{unsrt}
\section{Introduction} Data compression has played a significant role in engineering for centuries~\cite{wiki:morse_code}. Compression can be either lossless or lossy. Lossless compression allows perfect data reconstruction from compressed bitstreams with the goal of assigning shorter codewords to more ``probable'' codes. Typical examples include Huffman coding~\cite{huffman1952method}, arithmetic coding~\cite{witten1987arithmetic}, and range coding~\cite{martin1979range}. Lossy compression discards ``unimportant'' information of the input data, and the definition of importance is application-dependent. For example, if the data (such as images and videos) are meant to be consumed by the human visual system, importance should be measured in accordance with human perception, discarding features that are perceptually redundant, while keeping those that are most visually noticeable. In lossy compression, one must face the rate-distortion trade-off, where the rate is computed by the entropy of the discrete codes~\cite{Shannon1948} and the distortion is measured by a signal fidelity metric. A prevailing scheme in the context of lossy image compression is transform coding, which consists of three operations - transformation, quantization, and entropy coding. Transforms map an image to a latent code representation, which is better-suited for exploiting aspects of human perception. Early transforms~\cite{ahmed_1974_dct} are linear, invertible, and fixed for all bit rates; errors arise only from quantization. Recent transforms take the form of deep neural networks (DNNs)~\cite{balle2016end}, aiming for nonlinear and more compressible representations. DNN-based transforms are mostly non-invertible, which may, however, encourage discarding perceptually unimportant image features during transformation. This gives us an opportunity to learn different transforms at different bit rates for optimal rate-distortion performance. Entropy coding is responsible for losslessly compressing the quantized codes into bitstreams for storage and transmission. In either lossless or lossy image compression, a discrete probability distribution of the latent codes shared by the encoder and the decoder (\textit{i}.\textit{e}., the entropy model) is essential in determining the compression performance. According to the Shannon's source coding theorem~\cite{Shannon1948}, given a vector of code intensities $\bm y =\{y_0,\ldots,y_M\}$, the optimal code length of $\bm y$ should be $\lceil-\log_{2}P(\bm y)\rceil$, where binary symbols are assumed to construct the codebook. Without further constraints, it is intractable to estimate $P(\bm y)$ in high-dimensional spaces, a problem commonly known as the curse of dimensionality. For this reason, most entropy coding schemes assume $\bm y$ is fully statistically factorized with the same marginal distribution, leading to a code length of $\lceil-\sum_{i=0}^{M}\log_{2}P(y_i)\rceil$. Alternatively, the chain rule in probability theory offers a more accurate approximation \begin{align} P(\bm y) \approx \prod_{i=0}^{M}P(y_i|\mathrm{PTX}(y_i,\bm y)), \end{align} where $\mathrm{PTX}(y_i,\bm y)\subset\lbrace y_0,\ldots, y_{i-1}\rbrace$ represents the partial context of $y_i$ coded before it in $\bm y$. A representative example is the context-based adaptive binary arithmetic coding (CABAC)~\cite{marpe2003context} in H.264/AVC, which considers the two nearest codes as partial context, and obtains noticeable improvements over previous image/video compression standards. As the size of $\mathrm{PTX}(y_i,\bm y)$ becomes large, it is difficult to estimate this conditional probability by constructing histograms. Recent methods such as PixelRNN~\cite{oord2016pixel} and PixelCNN~\cite{oord2016conditional} take advantage of DNNs in modeling long range relations to increase the size of partial context, but are computationally intensive. In this work, we present context-based convolutional networks (CCNs) for effective and efficient entropy modeling. Given $\bm y$, we specify a 3D zigzag coding order such that the most relevant codes of $y_i$ can be included in its context. Parallel computation during entropy encoding is straightforward as the context of each code is known and readily available. However, this is not always the case during entropy decoding. The partial context of $y_i$ should first be decoded sequentially for the estimation of $P(y_i|\mathrm{PTX}(y_i,\bm y))$, which is prohibitively slow. To address this issue, we introduce a 3D code dividing technique, which partitions $\bm y$ into multiple groups in compliance with the proposed coding order. The codes within each group are assumed to be conditionally independent given their respective contexts, and therefore can be decoded in parallel. In the context of CCNs, this amounts to applying properly designed translation-invariant binary masks to convolutional filters. To validate the proposed CCNs, we combine them with arithmetic coding~\cite{witten1987arithmetic} for entropy modeling. For lossless image compression, we convert the input grayscale image to eight binary planes and train a CCN to predict the Bernoulli distribution of $y_i$ by optimizing the entropy loss in information theory~\cite{cover2006elements}. For lossy image compression, we parameterize the categorical distribution of $y_i$ with a discretized mixture of Gaussian (MoG) distributions, whose parameters (\textit{i}.\textit{e}., mixture weights, means, and variances) are estimated by three CCNs. The CCN-based entropy model is jointly optimized with analysis and synthesis transforms (\textit{i}.\textit{e}., mappings between raw pixel space and latent code space) over a database of training images, trading off the rate and the distortion. Experiments on the Kodak and Tecnick datasets show that our methods for lossless and lossy image compression perform favorably against image compression standards and DNN-based methods, especially at low bit rates. \section{Related Work} In this section, we provide a brief overview of entropy models and lossy image compression methods based on DNNs. For traditional image compression techniques, we refer interested readers to~\cite{sudhakar2005image,wallace1992jpeg,skodras2001jpeg}. \subsection{DNN-Based Entropy Modeling} The first and the most important step in entropy modeling is to estimate the probability $P(\bm y)$. For most image compression techniques, $\bm y$ is assumed to be statistically independent, whose entropy can be easily computed through the marginal distributions~\cite{balle2016end,theis2017lossy,agustsson2017soft,rippel2017real}. Arguably speaking, natural images undergoing a highly nonlinear analysis transform still exhibit strong statistical redundancies~\cite{balle2018variational}. This suggests that incorporating context into probability estimation has great potentials in improving the performance of entropy coding. DNN-based context modeling for natural languages and images has attracted considerable attention in the past decade. In natural language processing, recurrent neural networks (RNN)~\cite{mikolov2010recurrent}, and long short-term memory (LSTM)~\cite{sundermeyer2012lstm} are two popular tools to model long-range dependencies. In image processing, PixelRNN~\cite{oord2016pixel} and PixelCNN~\cite{oord2016conditional} are among the first attempts to exploit long-range pixel dependencies for image generation. The above-mentioned methods are computationally inefficient, requiring one forward propagation to generate (or estimate the probability of) a single pixel. To speed up PixelCNN, Reed~\textit{et al}.~\cite{reed2017multi} proposed Multiscale PixelCNN, which is able to sample a twice larger intermediate image conditioning on the initial image. This process may be iterated to generate the final high-resolution result. When viewing Multiscale PixelCNN as an entropy model, we must losslessly compress and send the initial image as side information to the decoder for entropy decoding. Only recently have DNNs for context-based entropy modeling become an active research topic. Ball{\'e} \textit{et al}.~\cite{balle2018variational} introduced a scale prior, which stores a variance parameter for each $y_i$ as side information. Richer side information generally leads to more accurate entropy modeling. However, this type of information should also be quantized, compressed and considered as part of the codes, and it is difficult to trade off the bits saved by the improved entropy model and the bits introduced by storing this side information. Li \textit{et al}.~\cite{li2017learning} extracted a small code block for each $y_i$ as its context, and adopted a simple DNN for entropy modeling. The method suffers from heavy computational complexity similar to PixelRNN~\cite{oord2016pixel}. Li \textit{et al}.~\cite{li2018efficient} and Mentzer \textit{et al}.~\cite{mentzer2018conditional1} implemented parallel entropy encoding with masked DNNs. However, sequential entropy decoding has to be performed due to the context dependence, which remains painfully slow. In contrast, our CCN-based entropy model permits parallel entropy encoding and decoding, making it more attractive for practical applications. \subsection{DNN-Based Lossy Image Compression} A major problem in end-to-end lossy image compression is that the gradients of the quantization function are zeros almost everywhere, making gradient descent-based optimization ineffective. Different strategies have been proposed to alleviate the zero-gradient problem resulting from quantization. From a signal processing perspective, the quantizer can be approximated by additive i.i.d. uniform noise, which has the same width as the quantization bin~\cite{gray1998quantization}. A desired property of this approximation is that the resulting density is a continuous relaxation of the probability mass function of $\bm y$~\cite{balle2016end}. Another line of research introduced continuous functions (without the zero-gradient problem) to approximate the quantization function. The step quantizer is used in the forward pass, while its continuous proxy is used in the backward pass. Toderici \textit{et al}.~\cite{toderici2015variable} learned an RNN to compress small-size images in a progressive manner. They later tested their models on large-size images~\cite{toderici2016full}. Johnston \textit{et al}.~\cite{johnston2017improved} exploited adaptive bit allocations and perceptual losses to boost the compression performance especially in terms of MS-SSIM~\cite{wang2003multiscale}. The joint optimization of rate-distortion performance is another crucial issue in DNN-based image compression. The methods in~\cite{toderici2015variable,toderici2016full,johnston2017improved} treat entropy coding as a post-processing step. Ball{\'e} \textit{et al}.~\cite{balle2016end} explicitly formulated DNN-based image compression under the framework of rate-distortion optimization. Assuming $\bm y$ is statistically factorized, they learned piece-wise linear density functions to compute differential entropy as an approximation to discrete entropy. In a subsequent work~\cite{balle2018variational}, each $y_i$ is assumed to follow zero-mean Gaussian with its own variance separately predicted using side information. Minnen \textit{et al}.~\cite{minnen2018joint} combined the autoregressive and hierarchical priors, leading to improved rate-distortion performance. Theis \textit{et al}.~\cite{theis2017lossy} introduced a continuous upper bound of the discrete entropy with a Gaussian scale mixture. Rippel \textit{et al}.~\cite{rippel2017real} described pyramid-based analysis and synthesis transforms with adaptive code length regularization for real-time image compression. An adversarial loss~\cite{goodfellow2014generative} is incorporated to generate visually realistic results at low bit rates~\cite{rippel2017real}. \section{CCNs for Entropy Modeling} In this section, we present in detail the construction of CCNs for entropy modeling. We work with a fully convolutional network, consisting of $T$ layers of convolutions followed by point-wise nonlinear activation functions, and assume the standard raster coding order (see Fig.~\ref{fig:conv}). In order to perform efficient context-based entropy coding, two assumptions are made on the network architecture: \begin{itemize} \item For a code block $\bm y\in\mathbb{Q}^{M\times H\times W}$, where $M$, $H$, and $W$ denote the dimensions along channel, height, and width directions, respectively, the corresponding output of the $t$-th convolution layer $\bm v^{(t)}$ has a size of ${M\times H\times W\times N_t}$, where $N_t$ denotes the number of feature blocks to represent $\bm y$. \item Let $\mathrm{CTX}( y_i(p,q),\bm y)$ be the set of codes encoded before $y_i(p,q)$ (\textit{i}.\textit{e}., full context), and $\mathrm{SS}( v^{(t)}_{i,j}(p,q))$ be the set of codes in the receptive field of $v^{(t)}_{i,j}(p,q)$ that contributes to its computation (\textit{i}.\textit{e}., support set), respectively. Then, $\mathrm{SS}(v^{(t)}_{i,j}(p,q))\subset \mathrm{CTX}( y_{i}(p,q), \bm y)$. \end{itemize} Assumption I establishes a one-to-many correspondence between the input code block $\bm y$ and the output feature representation $\bm v^{(T)}$. In other words, the feature $ v^{(t)}_{i,j}(p,q)$ in $i$-th channel and $j$-th feature block at spatial location $(p,q)$ is uniquely associated with $y_{i}(p,q)$. Assumption II ensures that the computation of $v^{(t)}_i(p,q)$ depends only on a subset of $\mathrm{CTX}(y_i(p,q),\bm y)$. Together, the two assumptions guarantee the legitimacy of context-based entropy modeling in fully convolutional networks, which can be achieved by placing translation-invariant binary masks to convolution filters. We start with the case of a 2D code block, where $\bm y\in \mathbb{Q}^{H\times W}$, and define masked convolution at the $t$-th layer as \begin{equation} v^{(t)}_i(p,q) = \sum_{j=1}^{N_t} \left( u^{(t)}_j \ast\left( m^{(t)} \odot w^{(t)}_{i,j}\right) \right)(p,q)+b_i^{(t)}, \label{eq:conv2d} \end{equation} { where $\ast$ and $\odot$ denote 2D convolution and Hadamard product, respectively. $\bm w^{(t)}_{ij}$ is a 2D convolution filter, $\bm m^{(t)}$ is the corresponding 2D binary mask, and $b_i^{(t)}$ is the bias. } According to Assumption I, the input $\bm u^{(t)}_i$ and the output $\bm v^{(t)}_i$ are of the same size as $\bm y$. The input code block $\bm y$ corresponds to $\bm u^{(0)}_0$. \begin{figure}[!tbp] \centering \includegraphics[width=0.76\linewidth]{conv.pdf} \caption{Illustration of 2D masked convolution in the input layer of the proposed CCN for entropy modeling. A raster coding order (left to right, top to bottom) and a convolution kernel size of $5\times 5$ are assumed here. The orange and blue dashed regions indicate the full context of the orange and blue codes, respectively. In the right panel, we highlight the support sets of the two codes in corresponding colors, which share the same mask.} \label{fig:conv} \end{figure} \begin{figure*}[!htp] \centering \begin{minipage}{1.0\linewidth} \includegraphics[width=1.0\textwidth]{context} \end{minipage} \begin{minipage}{1.0\linewidth} \begin{minipage}{0.205\linewidth} \centering{\scriptsize{ (a)}} \end{minipage} \begin{minipage}{0.175\linewidth} \centering{\scriptsize{(b)}} \end{minipage} \begin{minipage}{0.21\linewidth} \centering{\scriptsize{(c)}} \end{minipage} \begin{minipage}{0.175\linewidth} \centering{\scriptsize{(d)}} \end{minipage} \begin{minipage}{0.2\linewidth} \centering{\scriptsize{(e)}} \end{minipage} \end{minipage} \caption{Illustration of code dividing techniques in conjunction with different coding orders for a 2D code block. The orange and blue dots represent two neighbouring codes. The gray dots denote codes that have already been encoded, while the white circles represent codes yet to be encoded. (a) Raster coding order adopted in many compression methods. (b) Support sets of the orange and blue codes, respectively. It is clear that the orange code is in the support set of the blue one, and therefore should be decoded first. (c) Code dividing scheme for the raster coding order. By removing the dependencies among codes in each row, the orange and blue codes can be decoded in parallel. However, the orange code is excluded from the support set of the blue one, which may hinder entropy estimation accuracy. (d) Zigzag coding order and its corresponding code dividing scheme. The two codes in the orange squares that are important for the orange code in entropy prediction are retained in its partial context. (e) Support sets of the orange and blue codes in compliance with the zigzag coding order.} \label{fig:context} \end{figure*} \begin{figure*}[!tbp] \centering \begin{minipage}[b]{0.48\textwidth} \includegraphics[width=1.0\linewidth]{figs/schedule.pdf} \centering{\scriptsize{(a)}} \end{minipage} \begin{minipage}[b]{0.48\textwidth} \includegraphics[width=1.0\linewidth]{figs/context_3d.pdf} \centering{\scriptsize{(b)}} \end{minipage} \caption{Illustration of the proposed 3D zigzag coding order and 3D code dividing technique. (a) Each group in the shape of a diagonal plane is highlighted in green. Specifically, $\mathrm{GP}_k(\bm y) =\{y_r(p,q)|r+p+q=k\}$ are encoded earlier than $\mathrm{GP}_{k+1}(\bm y)$. Within $\mathrm{GP}_k(\bm y)$, we first process codes along the line $p+q =k$ by gradually decreasing $p$. We then process codes along the line $p+q=k-1$ with the same order. The procedure continues until we sweep codes along the last line $p+q=\max(k-r,0)$ in $\mathrm{GP}_{k}(\bm y)$. (b) Support set of the orange code with a spatial filter size of $3\times 3$. Zoom in for improved visibility.} \label{fig:3d} \end{figure*} For the input layer of a fully convolutional network, the codes to produce $v^{(0)}_{i}(p,q)$ is $\Omega_{p,q}=\{y(p+\mu,q+\nu)\}$, where $(\mu,\nu)\in\Psi$ is the set of local indices centered at $(0,0)$. We choose \begin{align} \mathrm{SS}(v^{(0)}_{i}(p,q))=\mathrm{CTX}(y(p,q),\Omega_{p,q})\subset \mathrm{CTX}(y(p,q),\bm y), \end{align} which can be achieved by setting \begin{align} m^{(0)}{(\mu,\nu)} = \begin{cases} 1, &\mbox{if } \Omega_{p,q}(\mu,\nu) \in\mathrm{CTX}(y(p,q),\bm y) \\ 0, &\mbox{otherwise}. \end{cases} \label{eq:mask_input} \end{align} Fig.~\ref{fig:conv} illustrates the concepts of full context $\mathrm{CTX}(y(p,q), \bm y)$, support set $\mathrm{SS}(v^{(0)}(p,q))$, and translation-invariant mask $\mathbf m^{(0)}$, respectively. At the $t$-th layer, if we let $\bm m^{(t)} = \bm m^{(0)}$, for a code $y(p+\mu,q+\nu)\in \mathrm{CTX}(y(p,q), \bm y)$, we have \begin{align} \mathrm{SS}(u^{(t)}_j(p+\mu,q+\nu))\subset& \mathrm{CTX}(y(p+\mu,q+\nu),\bm y)\nonumber\\ \subset& \mathrm{CTX}(y(p,q),\bm y), \end{align} where the first line follows by induction and the second line follows from the definition of context. That is, as long as $y(p+\mu,q+\nu)$ is in the context of $y(p,q)$, we are able to compute $v^{(t)}_i{(p,q)}$ from $u^{(t)}_j(p+\mu,q+\nu)$ without violating Assumption II. In addition, $u^{(t)}_j(p,q)$ for $t>0$ is also generated from $\mathrm{CTX}(y{(p,q)},\bm y)$, and can be used to compute $v^{(t)}_i{(p,q)}$. Therefore, we may modify the mask at the $t$-th layer \begin{align} \mathbf{m}^{(t)}{(\mu,\nu)} = \begin{cases} \mathbf{m}^{(0)}(\mu,\nu), &\mbox{if } (\mu,\nu)\ne(0,0)\\ 1, &\mbox{otherwise}. \end{cases} \label{eq:mask_hidden} \end{align} \begin{figure}[!tbp] \centering \begin{minipage}[b]{0.48\linewidth} \includegraphics[width=1.0\textwidth]{figs/k1.pdf} \centering{\scriptsize{(a)}} \end{minipage} \begin{minipage}[b]{0.48\linewidth} \includegraphics[width=1.0\textwidth]{figs/k2.pdf} \centering{\scriptsize{(b)}} \end{minipage} \caption{Illustration of masked codes with $M=6$, $r=2$, and a filter size of $3\times 3$. Blue dots represent codes activated by the mask and red dots indicate the opposite. The only difference lies in the green diagonal plane. (a) Input layer. (b) Hidden layer.} \label{fig:3d_mask} \end{figure} \begin{figure*}[!tbp] \centering \begin{picture}(500,200) \put(0,0){\includegraphics[width=1.0\textwidth]{framework_lossless}} \put (250,90){\scriptsize{(a)}} \put (120,-5){\scriptsize{(b)}} \put (380,-5){\scriptsize{(c)}} \put (30,16){\scriptsize{$\bm{y}$}} \put (118,50){\scriptsize{$P(\bm{y})$}} \put (90,16){\scriptsize{$P(\cdot)$}} \put (260,50){\scriptsize{$\mathrm{GP}_0(\bm y),\ldots, \mathrm{GP}_{k-1}(\bm y)$}} \put (372,50){\scriptsize{$P(\mathrm{GP}_{k}(\bm y))$}} \put (478,50){\scriptsize{$\mathrm{GP}_{k}(\bm y)$}} \put (9,32){\footnotesize{Code Block}} \put (86,32){\footnotesize{CCN}} \put (142,36){\footnotesize{Arithmetic}} \put (146,28){\footnotesize{Encoder}} \put (208,32){\footnotesize{Bitstream}} \put (290,36){\footnotesize{Decoded}} \put (285,28){\footnotesize{Code Block}} \put (356,32){\footnotesize{CCN}} \put (412,36){\footnotesize{Arithmetic}} \put (416,28){\footnotesize{Decoder}} \put (475,36){\footnotesize{Decoded}} \put (470,28){\footnotesize{Code Group}} \put (290,65){\footnotesize{Bitstream}} \end{picture} \caption{\cmt{Proposed lossless image compression method. (a) gives the CCN-based entropy model for lossless image compression. The grayscale image $\bm x$ is first converted to bit-plane representation $\bm y$, which is fed to the network to predict the mean estimates of Bernoulli distributions $P(y_r(p,q)|\mathrm{SS}(v_r(p,q)))$. Each convolution layer is followed by a parametric ReLU nonlinearity, except for the last layer, where a sigmoid function is adopted. From the mean estimates, we find that for most significant bit-planes, our model makes more confident predictions closely approximating local image structures. For the least significant bit-planes, our model is less confident, producing mean estimates close to $0.5$. MConv: masked convolution used in our CCNs with filter size ($S\times S$) and the number of feature blocks (output$\times$input). (b) and (c) show the arithmetic encoding and decoding with the learned CCN, respectively.}} \label{fig:lossless_frame} \end{figure*} \subsection{Proposed Strategies for Parallel Entropy Decoding} With the translation-invariant masks designed in Eqn.~(\ref{eq:mask_input}) and Eqn.~(\ref{eq:mask_hidden}), the proposed CCN can efficiently encode $\bm y$ in parallel. However, it remains difficult to parallelize the computation in entropy decoding. As shown in Fig.~\ref{fig:context} (a) and (b), the two nearby codes in the same row (highlighted in orange and blue, respectively) cannot be decoded simultaneously because the orange code is in the support set (or context) of the blue code given the raster coding order. To speed up entropy decoding, we may further remove dependencies between codes at the risk of model accuracy. Specifically, we partition $\bm y$ into $K$ groups, namely, $\mathrm{GP}_0(\bm y),\ldots, \mathrm{GP}_{K-1}(\bm y)$, and assume the codes within the same group are statistically independent. This results in a partial context $\mathrm{PTX}(y(p,q),\bm y)=\{\mathrm{GP}_0(\bm y),\ldots,\mathrm{GP}_{k-1}(\bm y)\}$ for $y(p,q)\in \mathrm{GP}_{k}(\bm y)$. In other words, all codes in the $k$-th group share the same partial context, and can be decoded in parallel. Note that code dividing schemes are largely constrained by pre-specified coding orders. For example, if we use a raster coding order, it is straightforward to divide $\bm y$ by row. In this case, $y(p,q-1)$ ($p$ and $q$ index vertical and horizontal directions, respectively), which is extremely important in predicting the probability of $y(p,q)$ according to CABAC~\cite{marpe2003context}, has been excluded from its partial context. To make a good trade-off between modeling efficiency and accuracy, we switch to a zigzag coding order as shown in Fig.~\ref{fig:context} (d), where $\mathrm{GP}_k(\bm y)=\{y(p,q)| p+q=k\}$ and $\mathrm{PTX}(y(p,q),\bm y)=\{y(p',q')|p'+q'< k\}$. As such, we retain the most relevant codes in the partial context for better entropy modeling (see Fig.~\ref{fig:lossless_cmp2} for quantitative results). Accordingly, the mask at the $t$-th layer becomes \begin{align} m^{(t)}{(\mu,\nu)} = \begin{cases} m^{(0)}(\mu,\nu), &\mbox{if } \mu+\nu\ne 0\\ 1, &\mbox{otherwise}. \end{cases} \label{eq:mask_hidden_slope} \end{align} Now, we extend our discussion to a 3D code block, where $\bm y\in \mathbb{Q}^{M\times H \times W}$. Fig.~\ref{fig:3d} (a) shows the proposed 3D zigzag coding order and 3D code dividing technique. Specifically, $\bm y$ is divided into $K=M+H+W-2$ groups in the shape of diagonal planes, where the $k$-th group is specified by $\mathrm{GP}_k(\bm y)=\{y_r(p,q)|r+p+q=k\}$. The partial context of $y_r(p,q)\in\mathrm{GP}_k(\bm y)$ is defined as $\mathrm{PTX}(y_r(p,q),\bm y)=\{y_{r'}(p', q')|r'+p'+q'<k\}$. We then write masked convolution in the 3D case as \begin{align} v^{(t)}_{i,r}(p,q) = \sum_{j=1}^{N_t} \sum_{s=1}^{M}\left( u^{(t)}_{j,s} \ast\left( m^{(t)}_{r,s} \odot w^{(t)}_{i,j,r,s}\right) \right)(p,q)+b_{i,r}^{(t)}, \end{align} where $\{i,j\}$ and $\{r,s\}$ are indices for the feature block and the channel, respectively. For the 2D case, each layer shares the same mask ($M=1$). When extending to 3D code blocks, each channel in a layer shares a mask, and there are a total of $M$ 3D masks. For the input layer, the codes to produce $v^{(0)}_{i,r}(p,q)$ is $\Omega_{p,q}=\{y_s{(p+\mu,q+\nu)}\}_{(\mu,\nu)\in\Psi, 0\le s< M}$, based on which we define the mask as \begin{align} m^{(0)}_{r,s}{(\mu,\nu)} = \begin{cases} 1, &\mbox{if } \Omega_{p,q}(\mu,\nu) \in\mathrm{PTX}({y_r(p,q),\bm y})\\ 0, &\mbox{otherwise}. \end{cases} \label{eq:3dmask_input} \end{align} For the $t$-th layer, we modify the mask to include the current diagonal plane \begin{align} m^{(t)}_{r,s}(\mu,\nu) = \begin{cases} m^{(0)}_{r,s}(\mu,\nu), &\mbox{if } s+\mu+\nu\ne r\\ 1, &\mbox{otherwise}, \end{cases} \label{eq:mask_input_3d} \end{align} as shown in Fig.~\ref{fig:3d_mask}. \subsection{Analysis of the Degree of Parallelism}\label{sec:dop} { We analyze the degree of parallelism (DOP) of the proposed CCN, which is defined as the number of operations that can be or are being simultaneously executed by a computer. For entropy encoding, all codes can be estimated in parallel, leading to a DOP of $MHW$. The proposed CCN divides the code block into $K=M+H+W-2$ groups and allows the codes within each group to be processed in parallel. Ideally, the DOP should be the group size (\textit{i.e.}, the number of codes in the group). However, different groups have different sizes in the shape of irregular diagonal planes. Here, the average group size is adopted as a rough indication of DOP, \begin{align} \mathrm{DOP}=\frac{1}{K}\sum_{k=0}^{K-1} Z_k=\frac{MHW}{M+H+W-2}, \end{align} where $Z_k$ denotes the number of codes in the $k$-th group. It is clear that DOP is a function of height, width, and channel of the code block.} \section{CCN-Based Entropy Models for Lossless Image Compression} In this section, we combine our CCN-based entropy model with the arithmetic coding algorithm for lossless image compression. \begin{figure*}[!tbp] \centering \begin{picture}(500,180) \put(0,0){\includegraphics[width=1.0\textwidth]{framework_lossy}} \put (16,100){\scriptsize{$\bm{x}$}} \put (213,146){\scriptsize{$\bm{z}$}} \put (236,120){\scriptsize{$\bm{y}$}} \put (262,86){\scriptsize{$\bm{y}$}} \put (505,85){\scriptsize{$P(\bm{y})$}} \put (187,105){\scriptsize{$P(\bm{y})$}} \put (187,70){\scriptsize{$P(.)$}} \put (236,50){\scriptsize{$\bm{y}$}} \end{picture} \caption{The architecture of the proposed lossy image compression method, which consists of an analysis transform $g_a$, a non-uniform and trainable quantizer $g_d$, a CCN-based entropy model, and a synthesis transform $g_s$. Conv: regular convolution with filter support ($S\times S$) and number of channels (output$\times$input). Down-sampling: implemented jointly with the adjacent convolution (also referred to as stride convolution). DenseBlock: $m$ matches the input channel number of the preceding convolution. $n$ is the channel number in DenseBlock. MConv: masked convolution used in our CCNs with filter size ($S\times S$) and the number of feature blocks (output$\times$input). Note that the number of channels is fixed in MConv, and is determined by that of ${\bm y}$. \cmt{More details about the arithmetic encoding and decoding can be found in Fig.~\ref{fig:lossless_frame}(b)(c).}} \label{fig:lossy_framework} \end{figure*} As a starting point, we binarize the grayscale image $\bm x\in \mathbb{R}^{H\times W}$ to obtain a 3D code block \begin{align} y_{r}(p,q) = \left\lfloor \frac{x(p,q)}{2^{7-r}} \right\rfloor {\rm mod}\ 2, \quad r=0,1,\ldots,7, \end{align} where we index the most significant bit-plane with $r=0$. Our CCN takes $\bm y$ as input and produces a feature block $\bm v$ (the superscript $(T)$ is omitted for notation convenience) of the same size to compute the mean estimates of Bernoulli distributions $P(y_r(p,q)|\mathrm{SS}(v_r(p,q)))$. Fig.~\ref{fig:lossless_frame} shows the network architecture, which has eleven masked convolution layers with parametric ReLU nonlinearities in between. The last convolution responses undergo a sigmoid nonlinearity to constrain their range between $[0,1]$. We make four residual connections as suggested in~\cite{he2016deep} to accelerate training. We will experiment with two hyper-parameters in CCN: the convolution filter size for all layers $S$ and the number of feature blocks in hidden layers $N$. To optimize the network parameters collectively denoted by $\bm \theta$, we adopt the expected code length as the empirical loss \begin{align} \ell(\bm \theta) = \mathbb{E}_{\bm y}&\Big[-\sum_{r,p,q} \big({\mathbbm 1}(y_r(p,q)=1)\log_2( v_{r}(p,q))\nonumber\\ &- \mathbbm{1}(y_r(p,q)=0)\log_2(1- v_{r}(p,q)) \big)\Big], \label{eq:lossless_entropy} \end{align} where $\mathbbm{1}(\cdot)$ is an indicator function and the expectation may be approximated by averaging over a mini-batch of training images. Finally, we implement our own arithmetic coding method with the learned CCN-based entropy model to compress $\bm y$ to bitstreams, and report performance using actual bit rates. \section{CCN-Based Entropy Models for Lossy Image Compression} In lossy image compression, our objective is to minimize a weighted sum of rate and distortion, $\ell_r + \lambda \ell_d$, where $\lambda$ governs the trade-off between the two terms. As illustrated in Fig.~\ref{fig:lossy_framework}, the proposed compression method has four components: an analysis transform $g_a$, a quantizer $g_d$, a CCN-based entropy model, and a synthesis transform $g_s$. The analysis transform $g_a$ takes a color image $\bm x$ as input and produces the latent code representation $\bm z$, which is further quantized to generate the discrete code block $\bm y$. $g_a$ consists of three convolutions, each of which is followed by down-sampling with a factor of two. A dense block~\cite{huang2017densely} comprised of seven convolutions is employed after each down-sampling. After the last dense block, we add another convolution layer with $M$ filters to produce $\bm z$. Empirically, the parameter $M$ sets the upper bound of the bit rate that a general DNN-based compression method can achieve. The parameters of $g_a$ constitute the parameter vector $\bm \phi$ to be optimized. The synthesis transform $g_s$ has a mirror structure of the analysis transform. Particularly, the depth-to-space reshaping~\cite{toderici2016full,shi_2016_real} is adopted to up-sample the feature maps. The last convolution layer with three filters is responsible for producing the compressed image in RGB space. The parameters of $g_s$ constitute the parameter vector $\bm \psi$ to be optimized. For the quantizer $g_d$, we parameterize its quantization centers for the $r$-th channel by $\{\omega_{r,0},\ldots,\omega_{r,L-1}\}$, where $L$ is the number of quantization centers and $\omega_{r,0}\le\ldots\le\omega_{r,L-1}$. The monotonicity of $\bm \omega$ can be enforced by a simple re-parameterization based on cumulative functions. Given a fixed set of $\bm \omega$, we perform quantization by mapping $z_r(p,q)$ to its nearest center that minimizes the quantization error \begin{align} y_r(p,q) = g_d(z_r(p,q))= \argmin_{\{ \omega_{r,l}\}}\Vert z_{r}(p,q) - \omega_{r,l} \Vert^2_2. \label{eq:mapping} \end{align} $g_d$ has zero gradients almost everywhere, which hinders training via back-propagation. Taking inspirations from binarized neural networks~\cite{courbariaux2016binarized,zhou2016dorefa,rastegari2016xnor}, we make use of an identify mapping $\hat{g}_d(y_r(p,q)) = y_r(p,q)$ as a continuous proxy to the step quantization function. During training, we use $g_d$ and $\hat{g}_d$ in the forward and backward passes, respectively. The quantization centers $\bm \omega$ should be optimized by minimizing the mean squared error (MSE), \begin{align} \ell(\bm \omega)=\frac{1}{MHW} \sum_{r,p,q}\Vert z_{r}(p,q)- y_{r}(p,q))\Vert^2_2, \label{eq:loss_quant} \end{align} which is essentially a $k$-means clustering problem, and can be solved efficiently by the Lloyd's algorithm~\cite{lloyd1982least}. Specifically, we initialize $\bm \omega$ using uniform quantization, which appears to work well in all experiments. To make parameter learning of the entire model smoother, we adjust $\bm \omega$ using stochastic gradient descent instead of a closed-form update. Without prior knowledge of the categorical distributions of the quantized codes ${\bm y}$, we choose to work with discretized MoG distributions, whose parameters are predicted by the proposed CCNs. We write the differentiable MoG distribution with $C$ components as \begin{align} y_r(p,q) \sim \sum_{i=0}^{C-1}\pi_i\mathcal{N}(y_r(p,q);\mu_i, \sigma^2_i), \label{eq:mog} \end{align} where $\pi_i$, $\mu_i$ and $\delta^2_i$ are the mixture weight, mean, and variance of the $i$-th component, respectively. Then, {the probability of $y_r(p,q)$ is calculated as the integral over the quantization bin $\Delta$ that the code lies in} \begin{align} P(y_{r}{(p,q)})=\int_{\Delta}\sum_{i=0}^{C-1}\pi_i\mathcal{N}(\xi; \mu_i, \sigma_i^2)d\xi. \label{eq:prob} \end{align} {For example, suppose $y_r(p,q)=\omega_{r,l}$, then $\Delta=[(\omega_{r,l-1}+\omega_{r,l})/2,(\omega_{r,l}+\omega_{r,l+1})/2]$, where we define $\omega_{r,-1} = -\infty$ and $\omega_{r,L} = \infty$, respectively.} Next, we describe the proposed entropy model in lossy image compression, which is comprised of three CCNs with the same structure, as shown in Fig.~\ref{fig:lossy_framework}. Each CCN consists of nine masked convolutions with three residual connections to produce $C$ feature blocks, matching the number of components in MoG. They separately output mixture weights, means and variances to build the discretized MoG distributions. The network parameters of our CCNs constitute the parameter vector $\bm \theta$ to be optimized. \begin{figure}[!tbp] \centering \includegraphics[width=1.0\linewidth]{lossless_cmp} \caption{Bit rates (in terms of bpp) of different DNN-based entropy models for lossless image compression on the Kodak dataset. SIN($M$) refers to a side information network that allocates $M$ output channels to represent side information. The orange and gray bars represent the bit rates resulting from the image and the side information, respectively.} \label{fig:lossless_performance} \end{figure} Finally, we are able to write the empirical rate-distortion objective for the parameters $\{\bm \phi, \bm \psi, \bm \theta\}$ as \begin{align} \ell(\bm \phi, \bm \psi, \bm \theta)= \mathbb{E}_{\bm x}\Bigg[&-\sum_{i} \log_2 P_{y_i}\bigg(g_d\Big(g_a(\bm x;\bm \phi)\Big);\bm\theta\bigg) \nonumber\\ &+ \lambda \ell_d\bigg(g_s\Big(g_d\big(g_a(\bm x;\bm \phi)\big);\bm \psi\Big),\bm x\bigg)\Bigg]. \label{eq:loss} \end{align} $\ell_d$ is the distortion term, which is more preferable to be assessed in perceptual space. In this paper, we optimize and evaluate our lossy image compression methods using the standard MSE and a perceptual metric MS-SSIM~\cite{wang2003multiscale}. Similar to lossless image compression, we combine the optimized entropy model with arithmetic coding and report the actual bit rates. \section{Experiments}\label{sec:exp} In this section, we test the proposed CCN-based entropy models in lossless and lossy image compression by comparing to state-of-the-art image coding standards and recent deep image compression algorithms. We first collect $10,000$ high-quality and high-definition images from Flickr, and down-sample them to further reduce possibly visible artifacts. We crop $1,280,000$ grayscale patches of size $128\times128$ and $640,000$ color patches of size $3\times256\times256$ as the training sets for lossless and lossy image compression, respectively. We test our models on two independent datasets - Kodak and Tecnick~\cite{asuni2013testimages}, which are widely used to benchmark image compression performance. The Caffe implementations along with the pre-trained models are made available at \url{https://github.com/limuhit/CCN}. \subsection{Lossless Image Compression}\label{sec:lossless_exp} We train our CCN-based entropy models using the Adam stochastic optimization package~\cite{kingma2014adam} by minimizing the objective in Eqn.~(\ref{eq:lossless_entropy}). We start with a learning rate of $10^{-4}$, and subsequently lower it by a factor of $10$ when the loss plateaus, until $10^{-6}$. The (actual) bit rate in terms of bits per pixel (bpp) is used to quantify the compression performance, which is defined as the ratio between the total amount of bits used to code the image and the number of pixels in the image. A smaller bpp indicates better performance. For example, an uncompressed grayscale image has eight bpp. We first compare the proposed CCNs with masked convolutional networks (MCNs)~\cite{mentzer2018conditional1,li2018efficient}, Multiscale PixelCNN~\cite{reed2017multi}, and side information networks (SINs) ~\cite{balle2018variational} for entropy modeling. As a special case of CCNs, MCNs specify the raster coding order without using any code dividing technique (see Fig.~\ref{fig:context}). We implement our own version of MCN that inherits the network architecture from CCN with $N=16$ (number of feature blocks) and $S =5$ (filter size). { Multiscale PixelCNN~\cite{reed2017multi} is originally designed for image generation. Here we slightly modify it for entropy modeling. Specifically. we approximate the iterative process of Multiscale PixelCNN with a single network by mapping the initial grayscale image directly to the probability distributions of the original image. The network includes an up-sampling convolution layer followed by five residual blocks. We test various configurations of Multiscale PixelCNN, and choose to down-sample the original image by a factor of 4 as initialization, which delivers the best overall compression performance. } SINs summarize the side information of ${\bm y}$ with a separate DNN, which is beneficial in probability estimation. \cmt{We adopt a DNN-based autoencoder including three stride convolutions and two residual connections to generate the side information}, which is further quantized and compressed with arithmetic coding for performance evaluation. We test five variants of SINs with different amount of side information by changing the number of output channels $M$. All competing models are trained on the same dataset described at the beginning of Section~\ref{sec:exp}. We also introduce a light-weight version of our method, which we name CCN$_\mathrm{light}$, by making the network architecture lighter (with $N=4$ and $S=3$) and by dividing the input image into non-overlapping patches for parallel processing. { We split the image into a total of $R\times R$ smaller patches with the size of $\frac{H}{R}\times\frac{W}{R}$. The DOP now becomes $\frac{MHW}{M+H/R+W/R-2}$, which further speeds up the original CCN by about $R$ times. } \begin{figure}[!tbp] \centering \includegraphics[width=1.0\linewidth]{lossless_cmp3} \caption{Bit rates of CCN in comparison with lossless image compression standards on the Kodak and Tecnick datasets.} \label{fig:lossless_cmp3} \end{figure} \begin{table}[!tbp] \scriptsize \caption{Running time in seconds and model complexity of different DNN-based entropy models on the Kodak dataset} \label{tab:lossless_time} \centering \begin{tabular}{cccccc} \toprule &SIN&MCN&\specialcell{Multiscale \\ PixelCNN}& CCN&$\mbox{CCN}_\mathrm{light}$ \\ \midrule Encoding time& 0.155& 0.323& 0.400 & 0.323 & 0.074 \\ Decoding time& 0.155& 3079.68& 0.400 & 35.28 & 0.984 \\ \specialcell{\# of parameters \\ ($\times 10^6)$}& $6.70$& $3.89$&$3.67$&$3.89$&$0.10$\\ \specialcell{\# of FLOPs \\ ($\times 10^{12})$}& $0.58$& $2.78$&$2.87$&$2.78$&$0.07$\\ \bottomrule \end{tabular} \end{table} Fig.~\ref{fig:lossless_performance} shows the bit rates of the competing methods on the Kodak dataset. The proposed CCN matches the best performing model MCN, which suggests that with the proposed zigzag coding order and code dividing technique, CCN includes the most important codes as the partial context of the current code being processed. The bit rates of SINs come from two parts - the image itself and the side information. It is clear from the figure that increasing the amount of side information leads to bit savings of the image, at the cost of additional bits introduced to code the side information. In general, it is difficult to determine the right amount of side information for optimal compression performance. Multiscale PixelCNN can also be regarded as a special case of SINs, whose side information is a small image without further processing, leading to the worst performance. We also compare CCN with the widely used lossless image compression standards, including TIFF, GIF, PNG, JPEG-LS, JPEG2000-LS, and BPG. All test results are generated by MATLAB2017. From Fig.~\ref{fig:lossless_cmp3}, we find that CCN (along with its light-weight version CCN$_\mathrm{light}$) overwhelms all competing methods on the Kodak/Tecnick dataset, achieving more than $5.9\%/6.2\%$ bit savings compared to the best lossless image compression standard, JPEG2000-LS. \begin{figure}[!tbp] \centering \includegraphics[width=1.0\linewidth]{lossless_cmp2.pdf} \caption{Ablation study of CCN on the Kodak and Tecnick datasets. CCN($N$,$S$) denotes the CCN with $N$ feature blocks and $S\times S$ filter size. CCN$_\mathrm{raster}$ represents the CCN with the raster coding order and the corresponding code dividing technique (see Fig.~\ref{fig:context}).} \label{fig:lossless_cmp2} \end{figure} \begin{figure}[!tbp] \centering \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/1.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/2.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/3.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/4.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/5.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/6.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/7.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \begin{minipage}[t]{0.24\linewidth} \begin{picture}(50,50) \put(4,4){\includegraphics[width=0.92\linewidth]{./dist/8.png}} \put(0,20){\rotatebox{90}{\mtiny{Density}}} \put(30,0){\mtiny{$y$}} \end{picture} \end{minipage} \caption{Visualization of the learned continuous MoG distributions of representative codes before discretization. It is clear that most of them are multimodal, and therefore cannot be well fitted using a single Gaussian.} \label{fig:mog} \end{figure} The running time of the competing DNN-based entropy models is tested on an NVIDIA TITAN Xp machine, whose results on the Kodak dataset are listed in Table~\ref{tab:lossless_time}. For encoding, CCN$_\mathrm{light}$ enjoys the fastest speed, followed by Multiscale PixelCNN and SIN (the best performing variant). Despite similar encoding time, they have substantially different decoding complexities. Multiscale PixelCNN has the fastest decoder, followed by SIN. Due to the sequential decoding nature, MCN is the slowest, taking nearly one hour to decode a grayscale image of size $752\times496$. Our CCN achieves a significant improvement upon MCN with the proposed code dividing technique, while maintaining nearly the same bit rates. Moreover, CCN$_\mathrm{light}$ speeds up CCN more than $30$ times, striking a good balance between model efficiency and model accuracy. \cmt{We also report the model complexity of the competing models in terms of the number of parameters and floating point operations (FLOPs) in Table~\ref{tab:lossless_time}. Except for the CCN$_\mathrm{light}$, all the competing models have comparable complexity.} We conduct thorough ablation experiments to analyze the impact of individual components of CCN to final compression performance. Fig.~\ref{fig:lossless_cmp2} shows the bit rates of CCNs with three different numbers of feature blocks ($N\in\{4,8,16\}$) and two filter sizes ($S\in\{3,5\}$). When the filter size and the network depth are fixed, adding more feature blocks effectively increases model capability and thus boosts the compression performance. Similarly, using a larger filter size with fixed network depth and feature block number increases the partial context, leading to better entropy modeling. Moreover, we replace the proposed zigzag coding order in CCN with the raster coding order, whose model is denoted by CCN$_\mathrm{raster}$. From Fig.~\ref{fig:lossless_cmp2}, we observe that the performance of CCN$_\mathrm{raster}$ drops significantly, only comparable to the CCN with four feature blocks. This verifies the advantages of the proposed coding order. \subsection{Lossy Image Compression} In lossy image compression, the analysis transform $g_a$, the non-uniform quantizer $g_d$, the CCN-based entropy model, and the synthesis transform $g_s$ are jointly optimized for rate-distortion performance. In the early stages of training, the probability $P({\bm y})$ often changes rapidly, which makes it difficult to keep track of, and may cause instability in learning the entropy model. We find that this issue can be alleviated by a simple warmup strategy. Specifically, $g_a$ and $g_s$ are trained using the distortion term $\ell_d$ only for the first epoch. We then fix $g_a$ and train the CCN-based entropy model until it reasonably fits the current distribution of the codes. After that, we end-to-end optimize the entire method for the remaining epochs. We use Adam with a learning rate of $10^{-5}$ and gradually lower it by a factor of $10$, until $10^{-7}$. The number of quantization centers is $L=8$, and the number of Gaussian components in MoG is $C=3$. { Fig.~\ref{fig:mog} shows the learned continuous distributions of representative codes, which are typically multimodal, and therefore cannot be well fitted by unimodal distributions (\textit{e.g.}, Gaussian).} The optimization is performed separately for each $\lambda$ and for each distortion measure. We optimize twelve models for six bit rates and two distortion metrics (MSE and MS-SSIM). MSE is converted to peak signal-to-noise ratio (PSNR) for quantitative analysis. \begin{figure}[!tbp] \centering \includegraphics[width=0.85\linewidth]{cmp_psnr} \caption{Rate-distortion curves of several variants of the proposed lossy image compression method on the Kodak dataset. }\label{fig:cmp} \end{figure} \cmt{ We also evaluate the effect of several components, \textit{i}.\textit{e}., the transforms, entropy model, and joint optimization, of the proposed lossy image compression method. All the variants of our method are optimized for MSE distortion and tested on the Kodak dataset. The compression performance of these methods is shown in Fig.~\ref{fig:cmp}. In terms of the transforms, we replace each dense block of our method with three residual blocks. To keep the same network depth, the first residual block consists of three convolution layers, while the last two residual blocks have two convolution layers. Our method performs better than this variant, especially at higher bit rates. As for the entropy model, we replace the proposed CCN with CCN$_\mathrm{raster}$. Similar to the results in lossless image compression, our method with the zigzag coding order outperforms this variant with the raster coding order. Moreover, we investigate the effect of joint optimization of the transforms and the entropy model. A baseline method is introduced, which first optimizes the transforms for MSE ($\lambda=\infty$), and then trains the CCN-based entropy model by fixing the learned transforms. The baseline method performs worse than the jointly optimized one by 1 dB. Similar trends can be observed for the variants with residual blocks. } \begin{figure}[!tbp] \centering \begin{minipage}[t]{0.45\linewidth} \includegraphics[width=1.0\linewidth]{psnr} \centering{\scriptsize{(a)}} \end{minipage} \begin{minipage}[t]{0.46\linewidth} \includegraphics[width=1.0\linewidth]{ms-ssim} \centering{\scriptsize{(b)}} \end{minipage} \caption{Rate-distortion curves of different compression methods on the Kodak dataset. (a) PSNR. (b) MS-SSIM.} \label{fig:kodak} \end{figure} \begin{figure}[!tbp] \centering \begin{minipage}[t]{0.45\linewidth} \includegraphics[width=1.0\linewidth]{tec_psnr} \centering{\scriptsize{(a)}} \end{minipage} \begin{minipage}[t]{0.46\linewidth} \includegraphics[width=1.0\linewidth]{tec_ms_ssim} \centering{\scriptsize{(b)}} \end{minipage} \caption{Rate-distortion curves of different compression methods on the Tecnick dataset. (a) PSNR. (b) MS-SSIM.} \label{fig:tecnick} \end{figure} \begin{figure*}[!tbp] \centering \begin{minipage}{1.0\linewidth} \includegraphics[width=1.0\linewidth]{kodak_1} \end{minipage} \hfill\vline\hfill \begin{minipage}{1.0\textwidth} \begin{minipage}{0.2\textwidth}\center{\scriptsize{(a)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(b)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(c)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(d)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(e)}}\end{minipage} \end{minipage} \hfill\vline\hfill \vspace{-.3cm} \begin{minipage}{1.0\linewidth} \includegraphics[width=1.0\linewidth]{kodak_2} \end{minipage} \hfill\vline\hfill \begin{minipage}{1.0\textwidth} \begin{minipage}{0.2\textwidth}\center{\scriptsize{(f)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(g)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(h)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(i)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(j)}}\end{minipage} \end{minipage} \caption{Compressed images by different compression methods on the Kodak dataset. The quantitative measures are in the format of ``bpp / PSNR / MS-SSIM''. (a) Uncompressed ``Sailboat'' image. (b) Ball{\'e}17~\cite{balle2016end}. 0.209 / 31.81 / 0.962. (c) Li18~\cite{li2017learning}. 0.244 / 31.97 / 0.966. (d) BPG. 0.220 / 33.19 / 0.963. (e) Ours optimized for MS-SSIM. 0.209 / 31.01 / 0.978. (f) Uncompressed ``Statue'' image. (g) Ball{\'e}17. 0.143 / 29.48 / 0.942. (h) Li18. 0.115 / 29.35 / 0.938. (i) BPG. 0.119 / 29.77 / 0.935. (j) Ours optimized for MS-SSIM. 0.116 / 28.05 / 0.954. }\label{fig:visual_kodak} \end{figure*} We compare our methods with existing image coding standards and recent DNN-based compression models. These include JPEG~\cite{wallace1992jpeg}, JPEG2000~\cite{skodras2001jpeg}, BPG~\cite{bellard2016bpg}, Agustsson17~\cite{agustsson2017soft}, Theis17~\cite{theis2017lossy}, Toderici17~\cite{toderici2016full}, Rippel17~\cite{rippel2017real}, Mentzer18~\cite{mentzer2018conditional1}, Johnston17~\cite{johnston2017improved}, Ball\'{e}17~\cite{balle2016end}, and Li18~\cite{li2017learning}. Both JPEG (with 4:2:0 chroma subsampling) and JPEG2000 are based on the optimized implementations in MATLAB2017. For BPG, we adopt the latest version from its official website with the default setting. When it comes to DNN-based models for lossy image compression, the implementations are generally not available. Therefore, we copy the results from their respective papers. \begin{figure*} \centering \hfill \begin{minipage}{1.0\linewidth} \includegraphics[width=1.0\linewidth]{tec_3} \end{minipage} \hfill\vline\hfill \begin{minipage}{1.0\textwidth} \begin{minipage}{0.2\textwidth}\center{\scriptsize{(a)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(b)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(c)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(d)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(e)}}\end{minipage} \end{minipage} \hfill\vline\hfill \vspace{-.3cm} \begin{minipage}{1.0\linewidth} \includegraphics[width=1.0\linewidth]{tec_4} \end{minipage} \hfill\vline\hfill \begin{minipage}{1.0\textwidth} \begin{minipage}{0.2\textwidth}\center{\scriptsize{(f)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(g)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(h)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(i)}}\end{minipage} \begin{minipage}{0.195\textwidth}\center{\scriptsize{(j)}}\end{minipage} \end{minipage} \caption{Compressed images by different compression methods on the Tecnick dataset. The quantitative measures are in the format of ``bpp / PSNR / MS-SSIM''. (a) Uncompressed ``Bus'' image. (b) JPEG2K. 0.199 / 24.41 / 0.914. (c) Li18~\cite{li2017learning}. 0.224 / 23.41 / 0.908. (d) BPG. 0.208 / 25.36 / 0.928. (e) Ours (MS-SSIM). 0.198 / 23.71 / 0.951. (f) Uncompressed ``Toy train'' image. (g) JPEG2K. 0.201 / 28.29 / 0.917. (h) Li18. 0.189 / 26.83 / 0.899. (i) BPG. 0.210 / 29.25 / 0.933. (j) Ours (MS-SSIM). 0.198 / 28.08 / 0.949.}\label{fig:visual_tec} \end{figure*} Fig.~\ref{fig:kodak} shows the rate-distortion curves on the Kodak dataset. We find that our method optimized for MSE outperforms all competing methods at low bit rates ($<0.5$ bpp), except for BPG. When optimized for MS-SSIM, our method performs on par with Rippel17 and is much better than the rest. Fig.~\ref{fig:tecnick} shows the rate-distortion curves on the Tecnick dataset, where we observe similar trends for both PSNR and MS-SSIM. An interesting observation is that when we continue increasing the bit rate, PSNR/MS-SSIM starts to plateau, which may be due to the limited model capability. Without any constraint on rate ($\lambda = \infty$) and quantization ($L=\infty$), our method optimized for MSE only reaches $38.2$ dB on the Kodak dataset, which can be treated as an empirical upper-bound for our network structure. Preliminary results from~\cite{balle2018variational} indicate that increasing the depth and width of the network leads to performance improvements at high bit rates. We visually compare the compressed images by our method against Ball{\'e}17, Li18, JPEG2K, and BPG. Fig.~\ref{fig:visual_kodak} and Fig.~\ref{fig:visual_tec} show sample compressed results on the Kodak and Tecnick datasets, respectively. JPEG2K and BPG exhibit artifacts (such as blocking, ringing, blurring, and aliasing) that are common to all handcrafted transform coding methods, reflecting the underlying linear basis functions. Ball{\'e}17 is effective at suppressing ringing artifacts at the cost of over-smoothing fine structures. Li18 allocates more bits to preserve large-scale strong edges, while tends to eliminate small-scale localized features (\textit{e}.\textit{g}., edges, contours, and textures). In contrast, our method generates compressed images with more faithful details and less visible distortions. We report the running time of our method at six bit rates on the Kodak dataset using the same machine. It takes $0.024$ second to generate ${\bm y}$ and $0.032$ second to reconstruct the image. The entropy coding time is listed in Table~\ref{tab:time_lossy}, where we see that more time is needed to encode and decode images at higher bit rates. This is because, { in our experiments, we use a larger $M$ at higher bit rates as a way of preserving more perceptually meaningful information. This corresponds to more convolution operations and longer processing time. } With the help of the proposed code dividing technique, our method performs entropy decoding in around one second for images of size $752\times496$. { We also note that the entropy coding time for lossy image compression is much faster than that of lossless image compression for two main reasons. First, in lossless compression, the size of the code block to CCN for entropy coding is $8 \times H \times W$. In lossy compression, the input image is first transformed to the code block with the size of $M\times\left(H/8\right)\times\left(W/8\right)$ ($M\le32$). With a smaller code block size, the lossy CCN is expected to be faster than the lossless CCN. Moreover, $N$ and $S$ also highly affect the speed. For the CCN in lossless compression, we set $N=16$ and $S=5$, whereas for the CCN in lossy compression, we set $N=3$ and $S=5$, leading to the faster speed. } \begin{table} \centering \caption{Running time in seconds of our CCN-based entropy model at six bit rates on the Kodak dataset} \begin{tabular}{ccccccc} \toprule Average bpp&0.100&0.209&0.362&0.512&0.671&0.794\\ \midrule Encoding&0.013&0.025&0.044&0.066&0.085&0.103\\ Decoding&0.116&0.227&0.457&0.735&1.150&1.232\\ \bottomrule \end{tabular} \label{tab:time_lossy} \end{table} \section{Conclusion and Discussion} We have introduced CCNs for context-based entropy modeling. Parallel entropy encoding and decoding are achieved with the proposed coding order and code dividing technique, which can be efficiently implemented using masked convolutions. We tested the CCN-based entropy model (combined with arithmetic coding) in both lossless and lossy image compression. For the lossless case, our method achieves the best compression performance, which we believe arises from the more accurate estimation of the Bernoulli distributions of the binary codes. For the lossy case, our method offers improvements both visually and in terms of rate-distortion performance over image compression standards and recent DNN-based models. The application scope of the proposed CCN is far beyond building the entropy model in image compression. As a general probability model, CCN appears promising for a number of image processing applications. For example, we may use CCN to learn a probability model $P(\bm x)$ for natural images, and use it as a prior in Bayesian inference to solve various vision tasks such as image restoration~\cite{zhang2017beyond,portilla2003image}, image quality assessment~\cite{Wang2006,ma2018}, and image generation\cite{oord2016pixel,chen2018neural}. \section*{Acknowledgment} This work was supported in part by Shenzhen Research Institute of Big Data and Shenzhen Institute of Artificial Intelligence and Robotics for Society. The authors would like to thank the NVIDIA Corporation for donating a TITAN Xp GPU used in this research. \bibliographystyle{IEEEtran}
\section{Introduction} Recently moir\'e superlattices from Van der Waals heterostructures emerge to be a wonderful platform to study strongly correlated physics. These include correlated insulator\cite{cao2018correlated}, superconductivity\cite{cao2018unconventional,yankowitz2019tuning,lu2019superconductors} and anomalous Hall effect\cite{Aaron2019Emergent} in twisted bilayer graphene, spin-polarized correlated insulators\cite{Shen2019Observation, Liu2019Spin,Cao2019Electric} and superconductivity\cite{Shen2019Observation, Liu2019Spin} in twisted bilayer-bilayer graphene. In addition, ABC trilayer graphene aligned with a hexagonal boron nitride (TLG-hBN) has been demonstrated to host gate tunable correlated insulator\cite{chen2018gate}, superconductor\cite{Wang2019Signatures} and Chern insulator\cite{chen2019tunable}. Theoretically it has been shown that both bandwidth and band topology can be tuned by the displacement field in the TLG-hBN system\cite{zhang2019nearly,chittari2019gate}. For one sign of displacement field, the valence bands from the two valleys have non-zero and opposite Chern numbers. Similar narrow Chern bands have also been predicted in twisted bilayer graphene aligned with h-BN\cite{zhang2019twisted,bultinck2019anomalous} and in twisted bilayer-bilayer graphene\cite{zhang2019nearly,chebrolu2019flatbands,choi2019intrinsic,lee2019theory,koshino2019band,liu2019quantum}. These systems therefore may realize interesting "quantum Hall" physics. Indeed, anomalous Hall effect\cite{Aaron2019Emergent} and Chern insulator with $\sigma_{xy}=2\frac{e^2}{h}$\cite{chen2019tunable} have already been reported. In contrast, for the other sign of displacement field in TLG-hBN, the valence band is trivial and there is no obstruction to build lattice models from constructing Wannier orbitals\cite{po2018origin}. Such a spin-valley Hubbard model on triangular lattice is derived in Ref.~\onlinecite{zhang2019bridging}. $\frac{t}{U}$ in this Hubbard model can be tuned by the magnitude of the displacement field. Therefore the trivial side of TLG-hBN offers an amazing platform to study Hubbard model physics\cite{xu2018topological,zhang2019bridging,zhu2018antiferro,jian2018moire,schrade2019spin}, which may be similar to that of the cuprates. The observation of a superconductor in the trivial side\cite{Wang2019Signatures} is encouraging. In cuprates, the pseudogap metal and the strange metal remain as unsolved mystery in addition to the high Tc superconductor. Then a natural question is: can TLG-hBN also host similar "pseudogap metal" and "strange metal" phases? In this article we try to give a postive answer to this question by explicitly constructing several simple "pseudogap metal" ansatz in the spin-valley Hubbard model. A $SU(4)$ Hubbard model on triangular lattice may also be realized in twisted transition metal dichalcogenide(TMD) homobilayer\cite{wu2019topological}. Therefore our discussions can also be relevant to future experiments in twisted TMD bilayers. In cuprates, a sensible theoretical scenario is that the strange metal is associated with a quantum critical point between the pseudogap metal and the conventional Fermi liquid. However, the critical point, even if exists, is covered by the superconducting phase. When the superconductor is suppressed by strong magnetic feild, in the under-doped region experiments observe signatures of small Fermi surfaces through quantum oscillation\cite{sebastian2010metal} and Hall measurement\cite{badoux2016change}. The area of the small Fermi pocket inferred from the experiment is proportional to the doped additional holes instead of all of the electrons. It is still under debate whether this high field "pseudogap metal" is from some density wave orders\cite{harrison2011protected,sebastian2012towards} or is from a symmetric metal like FL* phase\cite{senthil2003fractionalized,sachdev2016novel}. As a matter of principle, density wave order parameter is not necessary to gap out Fermi surface and there should exist symmetry "pseudogap metal" with small Fermi surfaces once fractionalization is allowed. However, we do not know any simple model so far to realize these symmetric metals with small Fermi surfaces. In this paper we will show that spin-valley Hubbard model is very promising in this direction. More specifically, we show that at filling $\nu_T=2-x$, there are naturally symmetric "pseudogap metals" with Hall number $\eta_H=-x$. Depending on the value of inter-valley Hund's coupling, the "pseudogap metal" is either a featureless Fermi liquid or an orthogonal metal\cite{nandkishore2012orthogonal}. We can understand the existence of "pseudogap metals" from two different perspectives. First, with an inter-valley Hund's term, the $U(4)$ symmetry is broken down to $(U(1)\times U(1)_{valley}\times SU(2)_{spin})/Z_2$. Then Lieb-Schultz-Mattis (LSM) constraint allows two distinct symmetric and featurless Fermi liquids with Fermi surface areas $A_{FS}=\frac{2-x}{4}$ or $A_{FS}=-\frac{x}{4}$. In the second perspective, symmetric pseudogap metals can be constructed from doping symmetric Mott insulators. Therefore we turn to study the possible symmetric Mott insulators at $\nu_T=2$. Depending on the value of inter-valley Hund's coupling $J_H$, we find a featureless insulator and two symmetric $Z_2$ spin liquids using $SO(6)$ Schwinger boson or Schwinger fermion parton construction. Then within a $SO(6)$ slave boson parton theory, doping the Mott insulator leads to a featureless Fermi liquid or an orthogonal metal. Both of them have small Fermi surfaces with area equal to $\frac{x}{4}$, resembling experimental results of under-doped cuprates under strong magnetic field. Compared to phenomenology in cuprates, the ansatz we propose here is much simpler: it is a ground state at zero magnetic field without breaking any symmetry. The simplicity of the proposed pseudogap metal may make it much easier to study its evolution towards the large fermi surface Fermi liquid and possible "strange metal" phase sandwiched in the intermediate region. We suggest one possible route through an intermediate "deconfined metal" with an internal $U(1)$ gauge field. It remains a question whether a direct transition is possible or the property of the intermediate phase(or critical region) can mimic that of the strange metal in the cuprates. In this paper we focus on the limit that the anisotropic term breaking SU(4) spin rotation symmetry is small compared to the Heisenberg coupling. If the inter-valley Hund's coupling is large, then the $\nu_T=2$ Mott insulator has $120^\circ$ Neel order \cite{thomson2018triangular} formed by spin one moment. Physics from doping such a spin one Neel order may also be interesting, but is beyond the scope of the current paper. Although most part of the paper is focused on filling close to $\nu_T=2$. We also give a brief discussion on the Mott insulator at $\nu_T=1$. At $\nu_T=1$, we only find two symmetric spin liquids: a $U(1)$ spinon Fermi surface state or a $Z_4$ spin liquid. A plaquette order may be a strong competing candidate. With only nearest neighbor coupling, magnetic order may be suppressed by strong quantum fluctuations. Therefore we expect the $\nu_T=1$ Mott insulator to preserve the approximation $SU(4)$ spin rotation symmetry. Then a charge $4e$ superconductor may emerge from doping such a $SU(4)$ symmetric Mott insulator. It is interesting to study the possibility that the observed superconductor in TLG-hBN\cite{Wang2019Signatures} is a charge $4e$ paired state. \section{Hamiltonian and Symmetry}, A lattice model for TLG-hBN has been derived in Ref.~\onlinecite{zhang2019bridging}. To leading order it is a spin-valley model on triangular lattice: \begin{align} H&=-t \sum_{a}\sum_{\langle ij \rangle}e^{i \varphi^a_{ij}}c^\dagger_{a;i}c_{a;j}+h.c.\notag\\ & + \frac{U}{2}n_i^2+J_H \sum_i \mathbf{S_{+;i}}\cdot \mathbf{S_{-;i}} \end{align} where $a=+,-$ is the valley index. We have suppressed the spin index. $U$ is the Hubbard interaction and $J_H$ is an on-site inter-valley spin-spin coupling. $\varphi^+_{ij}=-\varphi^{-}_{ij}$ provides the valley contrasting staggered flux pattern. At $\varphi^a_{ij}=0$ and $J_H=0$ limit, we have $U(4)$ symmetry. Adding the valley-contrasting flux breaks the symmetry down to $U(2)_+ \times U(2)_-$, which is further broken down to $SU(2)_s\times U(1)_c \times U(1)_v/Z_2$ by the inter-valley spin-spin coupling, where $Z_2$ stands for the common element of $SU(2)_s$, $U(1)_c$ and $U(1)_v$. The Coulomb interaction indicates that $J_H<0$. However, electron phonon coupling from phonon at $K$ and $K'$ can mediate positive $J_H$\cite{dodaro2018phases}. The final sign of $J_H$ is decided by the competition between these two effects. In this paper we will view $J_H$ as a phenomenological parameter to be fit from the experiment. Next we discuss the effective low energy model in the $U>>t$ limit with a restricted Hilbert space. $\nu_T\leq 2$ can be mapped to $\nu_T\geq 2$ by a particle-hole transformation and thus we only focus on $\nu_T\leq 2$. \subsection{Mott Insulator} At integer $\nu_T=1,2$, the charge is localized and the low energy is described by an effective spin model. The dimension of the Hilbert space at each site is $4$ and $6$ (6=4 choose 2) respectively for $\nu_T=1$ and $\nu_T=2$. In the $SU(4)$ symmetric limit, we have \begin{equation} H_S=J \sum_{\langle ij \rangle}\sum_p S^p_i S^p_j \end{equation} with $J=\frac{t^2}{2U}$. $S^p_i$ with $p=1,2,...,15$ is an spin operator on each site. These 15 spin operators can be organized as $S^{\mu \nu}=\tau^\mu \sigma^\nu$ with $\mu,\nu=0,1,2,3$ expect $\mu=\nu=0$. Each of them is a fermion bilinear: \begin{equation} S^{\mu\nu}_i=\sum_{a_1,a_2}\sum_{\sigma_1\sigma_2} c^\dagger_{a_1 \sigma_1;i}\tau^\mu_{a_1 a_2} \sigma^\nu_{\sigma_1,\sigma_2}c_{a_2,\sigma_2;i} \label{eq:spin_operator_definition} \end{equation} Projecting to the four and six dimensional Hilbert space at each site for $\nu_T=1,2$, $S^{\mu\nu}=\tau^\mu \sigma^\nu$ should be viewed as $4\times 4$ and $6 \times 6$ matrices for $\nu_T=1$ and $\nu_T=2$. The spin Hamiltonian has $PSU(4) = SU(4)/Z_4$ symmetry. Here $Z_4$ means the global $U(1)$ transformation $e^{i\frac{2\pi}{4}n}$ with $n$ as an integer. At $\nu_T=2$, each site is in the $6d$-irrep of $SU(4)$, which transforms like $SO(6)$ fundamental under $SU(4)$ ($SO(6)\cong SU(4)/Z_2$). For TLG-hBN system, there is a valley contrasting phase in the hopping term\cite{zhang2019bridging}. Two valleys have opposite staggered flux patterns. This valley dependent flux on the hopping term is inherited in the $t^2/U$ expansion and gives an anisotropy term: \begin{align} H'_S&=J \sum_{\langle ij \rangle}(\cos 2\varphi_{ij}-1)(\tau^x_i \tau^x_j+\tau^y_i \tau^y_j)(1+\vec{\sigma}_i\cdot \vec{\sigma}_j) \notag\\ &+J \sum_{\langle ij \rangle}\sin 2\varphi_{ij}(\tau^x_i \tau^y_j-\tau^y_i \tau^x_j)(1+\vec{\sigma}_i\cdot \vec{\sigma}_j) \end{align} where $\varphi_{ij}$ is the phase in the hopping for the valley $+$ on bond $\langle ij \rangle$ (Correspondingly the valley $-$ has phase $-\varphi_{ij}$ for the hopping on the same bond). The above symmetry breaks the $PSU(4)$ spin rotation down to $SO(3)_+\times SO(3)_-\times U(1)_v$. For $\nu_T=2$ the corresponding spin rotation symmetry can be viewed as $U(1)_v\times SO(4)/Z_2 \cong SO(3)_+\times SO(3)_-\times U(1)_v$, where $SO(4)$ acts on the $4$d space formed by three valley singlet, spin triplet and one valley triplet, spin singlet. For $\nu_T=2$, there is an additional on-site inter-valley spin-spin coupling: \begin{equation} H''_S=J_H\sum_i \vec{S}^+_i \cdot \vec{S}^-_i \end{equation} We define the valley specified spin operator: \begin{equation} \vec{S}^a_i=\frac{1}{2}\sum_{\sigma_1,\sigma_2=\uparrow,\downarrow}c^\dagger_{i;a;\sigma_1} \vec{\sigma}_{\sigma_1 \sigma_2} c_{i;a;\sigma_2} \end{equation} for $a=+,-$. $H''_S$ vanishes for $\nu_T=1$. For $\nu_T=2$, it further breaks the spin rotation symmetry down to $U(1)_{valley}\times SO(3)_{spin}$. \subsection{Finite doping: type I and type II $t-J$ models} In spin $1/2$ Hubbard model, the physics at finite doping away from the Mott insulator is believed to be governed by a $t-J$ model at the $U>>t$ limit. Here we want to show that for the spin-valley Hubbard model, the region $1<\nu_T<2$ has different physics from the traditional $t-J$ model in the region $0<\nu_T<1$. Therefore the four flavor Hubbard model can actually realize two distinct $t-J$ models, which is illustrated in Fig.~\ref{fig:two_t_J}. \begin{figure}[ht] \centering \includegraphics[width=0.45\textwidth]{image/two_t_J.png} \caption{Two distinct $t-J$ models in four-flavor spin-valley Hubbard model. $\nu_T<2$ and $\nu_T>2$ are related by particle-hole transformation. $\nu_T<1$ and $1<\nu_T<2$ realize two essentially different $t-J$ models.} \label{fig:two_t_J} \end{figure} \begin{figure}[ht] \centering \includegraphics[width=0.45\textwidth]{image/singlong_holong_doublon.png} \caption{Label of several different states according to the number of particle $n_i$ at the site. Holon is an empty site. Singlon and doublon are in the fundamental rep and the $SO(6)$ rep of the $SU(4)$ group respectively. The Hilbert space dimensions of the holon, singlon, doublon states are $1$, $3$ and $6$ respectively.} \label{fig:holon_singlon_doublon} \end{figure} \subsubsection{$\nu_T=1-x$: type I $t-J$ model} At filling $\nu_T=1-x$ with $0<x<1$, the low energy is described by a similar $t-J$ model as in the spin $1/2$ case: \begin{equation} H=-t \sum_{\langle ij \rangle} P_1 c^\dagger_i c_j P_1+J \sum_{\langle ij \rangle}S^p_i S^p_j+H'_S \label{eq:conventional_t_J} \end{equation} where $P_1$ is the projection operator which forbids states with $n\geq 2$ on each site. For $\nu_T=1-x$, the on-site inter-valley spin-spin coupling $J_H$ term vanishes in the leading order of $t/U$ because of the restriction of the Hilbert space. It enters in the second order of $t/U$ by changing the spin coupling from $\frac{t^2}{U}$ to $\frac{t^2}{U \pm J_H}$. The change of the spin coupling is $\delta J\sim \frac{J_H}{U} J<<J$ and can be ignored give the estimation that $J_H \sim 0.01 U$\cite{zhang2019bridging}. Therefore there is an approximating $U(2)_+\times U(2)_-$ symmetry at the $U>>t$ limit even if $J_H \neq 0$. In this type I $t-J$ model, each site is either empty or singly occupied, similar to that of hole-doped cuprate\cite{lee2006doping}. For convenience, in this paper we call the empty site as holon and the singly occupied site as singlon (see Fig.~\ref{fig:holon_singlon_doublon}). The Hilbert space dimension of each site is $1+4=5$. The $t-J$ model has unusual property that the singlon density is conserved to be $1-x$ while the holon density is conserved to be $x$. The $t$ term in Eq.~\ref{eq:conventional_t_J} is not a traditional hopping term. Instead, it involves the exchange between a holon at site $i$ with a singlon at site $j$. \begin{figure}[ht] \centering \includegraphics[width=0.45\textwidth]{image/type_I_and_type_II.png} \caption{Illustration of the type I and type II $t-J$ models. In type II model, there are three different spin-spin couplings.} \label{fig:type_I_II_t_J} \end{figure} \subsubsection{$\nu_T=2-x$: type II $t-J$ model} At filling $\nu_T=2-x$ with $0<x<1$, we have either a singlon or a doublon state at each site in the $U>>t$ limit. Thus the Hilbert space dimension at each site is $4+6=10$. In addition, the singlon and the doublon carry different representations of $SU(4)$ spin. Hence there are three different spin couplings (see Fig.~\ref{fig:type_I_II_t_J}). We define $P_s$ and $P_d$ as the projection operators to the singlon and the doublon states respectively. Then it is natural to have spin operators for the singlon and doublon: $S^{\mu\nu}_{i;s}=P_s S^{\mu \nu}_i P_s$ and $S^{\mu\nu}_{i;d}=P_d S^{\mu \nu}_i P_d$. We have the type II $t-J$ model as \begin{align} H&=-t \sum_{\langle ij \rangle} (P_s+P_d) c^\dagger_i c_j (P_s+P_d)+J \sum_{\langle ij \rangle}S^p_{i;s} S^p_{j;s}\notag\\ &+\frac{1}{2} J' \sum_{\langle ij \rangle} (S^p_{i;s} S^p_{j;d}+S^p_{i;d} S^p_{j;s})+J_d\sum_{\langle ij \rangle}S^p_{i;d} S^p_{j;d} \notag\\ &+H'_S+H''_S \label{eq:unconventional_t_J} \end{align} where $J'=\frac{1}{2}J$ and $J_d=J$. In the super-exchange process involving a singlon and a doublon nearby, the only process we should keep is to hop the particle from the singlon to the doublon, which costs energy $2U$ instead of $U$. This is how the two factor $1/2$ arise. Because of the $H''_S$ term, generically we only have $U(2)\times U(1)_{valley}$ spin rotation symmetry. The two $t-J$ models in Eq.~\ref{eq:conventional_t_J} and Eq.~\ref{eq:unconventional_t_J} are apparently quite different. In the type II t-J model, there is no empty site in the Hilbert space. Instead, the singlon and doublon both carry spin. The kinetic term now becomes the exchange of the singlon and doublon. Recently, a similar type II $t-J$ model has been proposed\cite{zhang2019kondo} to describe the nickelate superconductor\cite{li2019superconductivity}. There there is only $SU(2)$ spin rotation symmetry and the singlon and doublon carry $S=1/2$ and $S=1$ respectively. This t-J model can be derived from the $SU(4)$ symmetric $t-J$ model in this paper by adding anisotropic terms. Therefore our analysis in this paper may also provide insights to the solid-state realization of type II $t-J$ model using the two $e_g$ orbitals. In the familiar $t-J$ model, at least for large doping, the most natural ground state is a conventional Fermi liquid. This state can be constructed within the simple slave-boson mean field theory\cite{lee2006doping} which respects the constraint $P_1$. The simple way to understand this Fermi liquid state is that the holons condense and the singlons form Fermi surfaces. This picture can be easily generalized to the case $\nu_T=1-x$ for the spin-valley Hubbard model. However, for $\nu_T=2-x$, neither the singlons nor the doublons can form Fermi surfaces whose area match a conventional Fermi liquid. In this case, description of a conventional Fermi liquid is very hard if we insist to respect the constraint $P_s+P_d$. As we show later, a generalized slave-boson mean field theory naturally predicts pseudogap metals with Fermi surface areas proportional to $x$ instead of $\nu_T$. We can still describe a conventional Fermi liquid phase, but it requires a more exotic parton construction if we want to respect the constraint $P_2$. \section{Symmetry constraint: Luttinger theorem} Before we move to discussions of specific fillings, we give a general symmetry analysis in this section. We will consider LSM type of constraints based on simple Oshikawa-flux threading argument\cite{oshikawa2000topological}. The argument and the constraint works for both integer and incommensurate filling. Besides, the symmetry analysis in this section is independent of models and also applies to the case with topological bands. The symmetries that we consider here are translation, spin rotation, charge conservation and time reversal. Depending on whether we include the inter-valley spin-spin coupling, we consider $U(2)_+\times U(2)_-$ spin rotation symmetry and $U(1)_c \times U(1)_v \times SO(3)_s$ separately. In all cases we assume there is a time reversal symmetry which exchanges the two valleys. \subsection{Symmetry $U(4)$ or $U(2)_+\times U(2)_-$} The constraint is the same for $U(4)$ and $U(2)_+\times U(2)_-$. For simplicity we will only use $U(2)_+\times U(2)_-$. Note that time reversal exchanges two valleys so the density for each flavor is guaranteed to be $\nu=\frac{\nu_T}{4}$. Meanwhile we have $U(1)^4 \subset U(2)_+\times U(2)_-$, which means we have $U(1)$ symmetry for each flavor. Then, we can do flux insertion for one valley-spin species out of four. Using Oshikawa's argument\cite{oshikawa2000topological}, one can reach the conclusion that any symmetric and featureless phase needs to have Fermi surface area $A_{FS}=\nu \mod n=\frac{\nu_T}{4} \mod n$, where $n$ is an integer. For $\nu_T=1,2$, the above constraint means there must be a Fermi surface with area $1/4$ or $1/2$ for each flavor. Therefore symmetric and featureless Mott insulator is not possible for symmetry $U(2)_+\times U(2)_-$. \subsection{Symmetry $(U(1)_c\times U(1)_v \times SU(2)_S))/Z_2$: Two distinct symmetric and featureless states} When there is a non-zero $J_H$, the global symmetry is $(U(1)_c\times U(1)_v \times SU(2)_S))/Z_2$. There is no separate spin rotation symmetry for each valley. Only the total spin rotation is conserved in this case. There are only three independent $U(1)$ global symmetries(corresponding to $N$, $S_z$ and $\tau_z$) that belong to $(U(1)_c\times U(1)_v \times SU(2)_S)/Z_2$ (Recall that there are four $U(1)$ charges in the previous subsection.). Gauging these three $U(1)$ symmetries yields three independent flux insertions. we cannot do flux insertion for each valley-spin species. The best we can do is to include at least two valley-spin species in the flux insertion process in order to respect the global symmetry. Since we still have time reversal and total spin rotation symmetry, the filling per valley per spin is still fixed to be $\nu=\frac{\nu_T}{4}$, $\nu_T$ being the total filling. If the ground state is a symmetric Fermi liquid, the Fermi surface area for every flavor must be equal to each other. Let us perform an adiabatic $U(1)$ flux insertion for both spins of the $+$ valley. The constraint one can get using Oshikawa's argument is $A_{FS,+\uparrow}+A_{FS,+\downarrow} = 2A_{FS}=\nu_{+\uparrow}+\nu_{+\downarrow} (\mod~n)=\frac{\nu_T}{2} (\mod~n) $, where $n$ is an integer. This yields $A_{FS} = \frac{\nu_T}{4} (mod~m)$ or $A_{FS} =( \frac{\nu_T}{4}-\frac{1}{2} )(mod~m)$, where $m$ is an integer. Interestingly, we find that there are two distinct symmetric and featureless Fermi liquids. One of them is connected to the free fermion model while the other one has smaller Fermi surfaces and may be viewed as a "pseudogap metal". The essential point of the argument is that there are only three $U(1)$ charges while there are four flavors. Meanwhile, the symmetry is sufficient to forbid bilinear term with inter-flavor coupling and guarantee four equal Fermi surfaces. The above two conditions can not be satisfied simultaneously in the traditional spin $1/2$ system. This is a special feature of spin-valley model realized in moir\'e superlattices. At $\nu_T=2$, we are allowed to have $A_{FS}=1/2$ or $A_{FS}=0$, which implies the existence of a symmetric and featureless Mott insulator. We need to emphasize that $U(1)_v$ and time reversal symmetry is important to guarantee the existence of the two distinct class. Without time reversal, we can have a "band insulator" at $\nu_T=2$ by polarizing valley. This band insulator can smoothly connect to the conventional Fermi liquid by reducing the $\tau_z$ polarization. Once we have time reversal symmetry, the density of each flavor is fixed to be $1/2$ at $\nu_T=2$. In this case the featureless Mott insulator can not smoothly cross over to the conventional Fermi liquid and can not be described by mean field theory with any order parameter. We will construct both the featureless insulator at $\nu_T=2$ and the featureless pseudogap metal in Section V and Section VII for the spin-valley Hubbard model. The essential physics behind them is \textbf{singlet formation}. At $\nu_T=2$, there are N electrons in the valley $+$ and $N$ electrons in the valley $-$, where $N$ is the number of moir\'e unit cells. These electrons can be gapped out by forming inter-valley singlets. If we further dope electrons or holes with density $x$, these additional doped carriers just form small Fermi surfaces with area $A_{FS}=\frac{x}{4}$ on top of the featureless Mott insulator. Although the picture of the featureless insulator and the featureless pseudogap metal is very simple, they can not be described by the conventional mean field theory with symmetry breaking order parameters. In the cuprate context, symmetric pseudogap metals with small Fermi surfaces have been proposed before\cite{senthil2003fractionalized,sachdev2016novel}. In the so called FL* phase, additional holes form small Fermi surfaces on top of a $Z_2$ spin liquid. The physics behind is still singlet formation: $N$ number of electrons form resonating valence bond (RVB) singlets and the additional holes move on top of the RVB singlets. The difference in our case is that we can have on-site inter-valley singlet and do not need to invoke fractionalization. In this sense, the featureless pseudogap metal we propose here is the simplest version of symmetric pseudogap metal. This simple symmetric pseudogap metal is beyond any conventional mean field theories with symmetry breaking because the singlet formation does not break any symmetry. So how do we describe the singlet formation? It turns out that the singlet formation can be captured in a simple six-flavor slave boson parton mean field theory. We will introduce the parton construction for the $\nu_T=2$ Mott insulator first and then generalize it to the doped case to describe the featureless pseudogap metal. This slave boson parton also allow us to describe another orthogonal pseudogap metal in the $SU(4)$ symmetric limit. \onecolumngrid \begin{table}[H] \centering \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|c|c|c|c|c|} \hline $\tau_x$&$\tau_y$&$\tau_z$ & $\sigma_x$ &$\sigma_y$ &$\sigma_z$ &$\tau_x \sigma_x$ & $\tau_x \sigma_y$ & $\tau_x \sigma_z$&$\tau_y \sigma_x$ & $\tau_y \sigma_y$ & $\tau_y \sigma_z$ &$\tau_z \sigma_x$ & $\tau_z \sigma_y$ & $\tau_z \sigma_z$\\ \hline $S_{32}$&$S_{31}$&$S_{12}$&$S_{64}$& $S_{45}$&$S_{65}$ &$S_{15}$ &$S_{16}$ &$S_{41}$&$S_{52}$ &$S_{62}$ &$S_{24}$ &$S_{53}$ &$S_{63}$ &$S_{34}$\\ \hline \end{tabular} \caption{The correspondence between the generator of the $SO(6)$ and the generators of the $SU(4)$. For example, the $SU(4)$ transformation $U=e^{i \tau_z \frac{\theta}{2}}$ corresponds to a rotation between $\psi_1$ and $\psi_2$ with angle $\theta$.} \label{table:so(6)_generators} \end{table} \twocolumngrid \section{Projective Symmetry Group analysis at $\nu_T=2$} \subsection{Hilbert Space} At $\nu_T=2$, the Hilbert space is six dimensional at each site. There are six bases: $\ket{\alpha}=\sum_{ab} A^\alpha_{ab} c^\dagger_a c^\dagger_b \ket{0}$ with $\alpha=1,2,3,4,5,6$. $A^\alpha$ is a $4\times 4$ anti-symmetric matrix. We define the $SU(4)$ flavor as $1: +\uparrow$, $2: +\downarrow$, $3: -\uparrow$, $4 -\downarrow$. Each basis $\alpha$ is created by an operator $\Psi_\alpha^\dagger$. We can define the following six bases: \begin{align} \psi_1&=\frac{1}{2\sqrt{2}}c^T \tau_z \sigma_y c=\frac{i}{\sqrt{2}}(-\Phi_{12}+\Phi_{34})\notag\\ \psi_2&=\frac{1}{2\sqrt{2}}c^T i \sigma_y c=\frac{1}{\sqrt{2}}(\Phi_{12}+\Phi_{34})\notag\\ \psi_3&=\frac{1}{2\sqrt{2}}c^T \tau_x \sigma_y c=\frac{i}{\sqrt{2}}(-\Phi_{14}+\Phi_{23})\notag\\ \psi_4&=\frac{1}{2\sqrt{2}}c^T i\tau_y \sigma_x c=\frac{1}{\sqrt{2}}(\Phi_{14}+\Phi_{23})\notag\\ \psi_5&=\frac{1}{2\sqrt{2}}c^T i\tau_y \sigma_z c=\frac{1}{\sqrt{2}}(\Phi_{13}-\Phi_{24})\notag\\ \psi_6&=\frac{1}{2\sqrt{2}}c^T \tau_y c=-\frac{i}{\sqrt{2}}(\Phi_{13}+\Phi_{24})\notag\\ \label{eq:SO(6)_rep_obvious_basis} \end{align} where $\Phi_{ab}=\frac{1}{2}(c_ac_b-c_bc_a)$. These six states are organized to have clear physical meaning: the first three are valley triplet and spin singlet while the later three are valley singlet and spin triplet. Let us define $\Psi^T=(\psi_1,\psi_2,\psi_3,\psi_4,\psi_5,\psi_6)$. It can be proved that the transformation is $\Psi'=O \Psi$ under the microscopic $SU(4)$ transformation. $O$ is a $SO(6)$ matrix. There are $15$ generators for the $SO(6)$. We list them in Table.~\ref{table:so(6)_generators}. The physical spin operator $S^{\mu \nu}$ defined in Eq.~\ref{eq:spin_operator_definition} can be written as a $6 \times 6$ matrix in the above basis. It is convenient to express it as $S^{\mu \nu}=\Psi^\dagger A^{\mu \nu} \Psi$. It turns out that the $6 \times 6$ matrix $A^{\mu \nu}$ only has two non-zero matrix elements. More specifically, each spin operator $S^{\mu \nu}$ corresponds to a $(\alpha,\beta)$ pair as listed in Table.~\ref{table:so(6)_generators}. Then $S^{\mu\nu}=S^{\alpha \beta}=2i (\psi^\dagger_{\alpha}\psi_{\beta}-\psi^\dagger_{\beta} \psi_\alpha)$. For example, $\tau^x=2i(\psi^\dagger_3\psi_2-\psi^\dagger_2\psi_3)$. When $H'_S=H''_S=0$, the spin model has $SO(6)/Z_2$ symmetry where $Z_2$ consists of the $6\times 6$ matrix $- I$. When $H'_S\neq 0$, the spin rotation symmetry is $(SO(2)\times SO(4))/Z_2$. The Hilbert space at each site is decomposed to $6 = 2 \bigoplus 4 $. $(\psi_1,\psi_2)$ transforms as $SO(2)$ corresponding to $U(1)_{valley}$. $(\psi_3,\psi_4,\psi_5,\psi_6)$ transforms as $SO(4)$ under $SU(2)_+\times SU(2)_-$. If we further add the on-site inter-valley spin coupling $H''_S$, the spin rotation symmetry is further reduced to $SO(2)\times SO(3)$. The Hilbert space at each site is decomposed to three irreducible representations: $6=1\bigoplus 2 \bigoplus 3$. $\psi_3$ forms a trivial representation. $(\psi_1,\psi_2)$ transforms under $SO(2)$ and $(\psi_4,\psi_5,\psi_6)$ transforms under $SO(3)$ in the same way as a spin-one degree of freedom. For spin rotation symmetry $SO(6)/Z_2$ and $(SO(2)\times SO(4))/Z_2$, there is no symmetric gapped state. For the symmetry $SO(2)\times SO(3)$, a featureless insulator is possible. For example, the state $\prod_i \psi_3^\dagger (i) \ket{0}$ is a featureless Mott insulator. However, we need a large $J_H>0$ to favor this featureless insulating phase. In the trilayer graphene/h-BN system, we expect $|J_H|$ to be smaller or at most comparable with $J$. When $J>>|J_H|$, other phases including magnetic order, valence bond solid (VBS) and spin liquids may be favored. In this paper we try to classify all of possible symmetry spin liquid phases based on PSG analysis. \subsection{Parton Theories at $\nu_T=2$} For $\nu_T=2$, there are three different parton theories which we introduce in this subsection. \subsubsection{Abrikosov Fermion} The first parton theory is the Abrikosov fermion parton which has been widely used in the treatment of spin $1/2$ systems. We introduce fermionic operator $f_{i;a}$ with $a=1,2,3,4$. The constraint is $\sum_a f^\dagger_{i;a}f_{i;a}=2$. There is a $U(1)$ gauge structure. As we will discuss later, the only symmetric spin liquid from the Abrikosov fermion parton is $U(1)$ spin liquid with $4$ Fermi surface, each at filling $1/2$. \subsubsection{Six-flavor Schwinger Boson} Because the Hilbert space at each site is six dimensional and form the fundamental representation of $SO(6)$, we can use a six flavor Schwinger boson parton construction. Basically we identify $\Psi_\alpha$ in Eq.~\ref{eq:SO(6)_rep_obvious_basis} as a bosonic operator $b_{\alpha}$, where $\alpha=1,2,...,6$. Correspondingly the spin operator $S^{\alpha \beta}=2i (b^\dagger_{\alpha} b_{\beta}-b^\dagger_{\beta}b_{\alpha})$. For simplicity, we define a six dimensional spinor $B(\mathbf r)=(b_1(\mathbf r),b_2(\mathbf r),b_3(\mathbf r),b_4 (\mathbf r),b_5 (\mathbf r),b_6(\mathbf r))$. The constraint is $B^\dagger(\mathbf r)B(\mathbf r)=1$ for each site $\mathbf r$. The gauge structure is $U(1)$. We define hopping term $\hat T_{ij}=B^\dagger_i B_j$ and $\hat \Delta_{ij}=\frac{1}{\sqrt{2}}(B_i^T B_j+B_j^T B_i)$. $\hat T^\dagger_{ij}=T_{ji}$. $\hat \Delta^\dagger_{ij}=\frac{1}{\sqrt{2}}(B^{\dagger}_j B^{\dagger T}_i+B_i^\dagger B^{\dagger T}_j)$. Apparently $\hat \Delta_{ij}=\hat \Delta_{ji}$. The Hamiltonian in the $SO(6)$ invariant limit can be written as: \begin{equation} H=4J\sum_{\langle ij \rangle}\hat T_{ij} \hat T_{ji} -4J \sum_{\langle ij \rangle} \hat \Delta^\dagger_{ij} \hat \Delta_{ij} \end{equation} In the Schwinger boson theory, typical mean field ansatz is: \begin{equation} H_M=\sum_{\langle ij \rangle} \left(T^\dagger_{ji} \hat T_{ij}+ \Delta^\dagger_{ji} \hat{\Delta}_{ij} \right) \end{equation} where $T_{ij}$ and $\Delta_{ij}$ are mean field parameters. For Schwinger boson, meaningful ansatz has $\Delta_{ij} \neq 0$, which describes a $Z_2$ spin liquid. \subsubsection{ Six-flavor Schwinger Fermion} Similar to the six flavor Schwinger boson approach, we can also identify each basis $\ket{\alpha}$ in Eq.~\ref{eq:SO(6)_rep_obvious_basis} to be created by a fermionic operator $\Psi_{\alpha}$. Defining $\Psi=(\Psi_1,\Psi_2,\Psi_3,\Psi_4,\Psi_5,\Psi_6)$. The constraint is $\Psi^\dagger(\mathbf r)\Psi(\mathbf r)=1$ for each site $\mathbf r$. The gauge structure is $O(2)=Z_2 \rtimes U(1)$. $Z_2$ corresponds to a charge conjugation $C: \Psi(\mathbf r)\rightarrow \Psi^\dagger(\mathbf r)$. We define hopping term $\hat T_{ij}=\Psi^\dagger_i \Psi_j$ and $\hat \Delta_{ij}=\frac{1}{2}(\Psi_i \Psi_j-\Psi_j\Psi_i)$. $\hat T^\dagger_{ij}=\hat T_{ji}$. $\hat \Delta^\dagger_{ij}=\frac{1}{2}(\Psi^\dagger_j \Psi^\dagger_i-\Psi_i^\dagger \Psi^\dagger_j)$. Apparently $\hat \Delta_{ij}=-\hat \Delta_{ji}$. The $SO(6)$ invarinat Hamiltonian can be written as \begin{align} H&=-4J\sum_{\langle ij \rangle}\hat T_{ij} \hat T_{ji} -4 J \sum_{\langle ij \rangle} \hat \Delta^\dagger_{ij} \hat \Delta_{ij}\notag\\ \end{align} Typical mean field ansatz in the Schwinger fermion approach is: \begin{equation} H_M=\sum_{\langle ij \rangle} \left(T^\dagger_{ji} \hat T_{ij}+ \Delta^\dagger_{ji} \hat{\Delta}_{ij} \right) \end{equation} where $T_{ij}$ and $\Delta_{ij}$ are mean field parameters. For Schwinger fermion parton theory, we can have both $U(1)$ spin liquid with $\Delta_{ij}=0$ and $Z_2$ spin liquid with $\Delta_{ij}\neq 0$. If $\Delta_{ij}$ is chiral, we can also have chiral spin liquid. \subsection{PSG Classification of $U(1)$ Spin Liquids at $\nu_T=2$} We first discuss $U(1)$ spin liquid. There are two different kinds of $U(1)$ spin liquid phases. One is constructed from the Abrikosov fermion and the other one is constructed from the Schwinger fermion. For both Abrikosov fermion and Schwinger fermion, symmetry $U(1)$ spin liquids have the same classification as shown in Appendix.~\ref{appendix: U(1) PSG}. Both zero-flux phase and $\pi$-flux phase are symmetric. However, nearest neighbor and next nearest neighbor hopping in the $\pi$-flux phase are forbidden by the PSG, which is not physical. Therefore we only consider the zero flux phase for both the Abrikosov fermion parton and the Schwinger fermion parton. From Abrikosov fermion, we have a $U(1)$ spin liquid with four Fermi surfaces, each of which is at filling $1/2$. This spin liquid phase can go through a continuous transition to Fermi liquid. Basically one can write the electron operator as $c_{i;a}={e^{i\theta_i} f_{i;a}}$ and let the bosonic rotor go through a continuous superfluid-Mott transition\cite{senthil2008theory}. From the Schwinger fermion, we have a $U(1)$ spin liquid with six Fermi surfaces, each of which is at filling $1/6$. This $U(1)$ spinon fermi surface phase is not connected to the Fermi liquid through direct transition. \subsection{PSG Classification of $Z_2$ Spin Liquids at $\nu_T=2$} We then classify symmetric $Z_2$ spin liquids at $\nu_T=2$. $Z_2$ spin liquid can be constructed from both the Schwinger boson parton and the Schwinger fermion parton. The PSG is the same for both Schwinger boson and Schwinger fermion parton constructions. It is independent of the spin rotation symmetry and therefore is true even the $SO(6)/Z_2$ spin rotation is broken down to $SO(2)\times SO(3)$. PSG classification is the same as the spin $1/2$ Schwinger boson approach, and we can just quote the results of Wang et.al. in Ref.~\onlinecite{wang2006spin}. The PSG is labeled by $(p_1,p_2,p_3)$ where $p_1,p_2,p_3=0,1$. These three integers label the fractionalization of the translation, $\sigma$ and $C_6$: $T_1T_2=T_2 T_1 (-1)^{p_1}$, $\sigma^2=(-1)^{p_2}$ and $C_6^6=(-1)^{p_3}$. For each symmetry operation $X$, the corresponding projective symmetry operation is $G_X X$ where $G_X=e^{i \varphi_X(\mathbf r)}$ is a $U(1)$ gauge transformation. \begin{align} &\varphi_{T_1}(x,y)=0\notag\\ &\varphi_{T_2}(x,y)=p_1 \pi x\notag\\ &\varphi_{\sigma}(x,y)=p_2\frac{\pi}{2}+p_1 \pi xy\notag\\ &\varphi_{C_6}(x,y)=p_3 \frac{\pi}{2}+p_1 \pi(xy+\frac{y(y-1)}{2}) \end{align} where the coordinate of a site is $\mathbf{R}=x \mathbf{a_1}+y \mathbf{a_2}$. The transformation of crystal symmetries can be found in Appendix.~\ref{append:lattice_symmetries}. For both Schwinger boson and Schwinger fermion, there are 8 different $Z_2$ Spin liquids labeled by $(p_1,p_2,p_3)$. However, more constraints need to be added if we require the nearest neighbor pairing to be non-zero. This is a reasonable requirement for a model with dominant nearest-neighbor anti-ferromagnetic coupling. It turns out there are only two $Z_2$ Spin liquids for both fermion and boson parton in the SO(6) symmetric limit. In the following we will introduce the two PSG ansatz for the Schwinger boson and Schwinger fermion respectively. Then we will connect the Schwinger fermion and Schwinger boson approaches and show that they describe the same $Z_2$ spin liquids in terms of $f$ particle and $e$ particle. \subsubsection{$Z_2$ Spin Liquid in Schwinger Fermion Parton} The only $SO(6)$ symmetric pairing is $\Delta(\mathbf R) \sum_a\Psi_a (\mathbf r) \Psi_a(\mathbf r+\mathbf{R})$ where $a=1,...,6$ is the flavor index. For fermion we have $\Delta(\mathbf R)=-\Delta(-\mathbf R)$. We require $\Delta(\mathbf R)\neq 0$ for nearest neighbor $\mathbf R$. First, the reflection $\sigma$ maps $\mathbf R=(1,1)$ to itself. Under the PSG, $\Delta(1,1)\rightarrow \Delta(1,1)e^{i(\varphi_\sigma(0,0)+\varphi_\sigma(1,1))}$. To have $\Delta(1,1)\neq 0$, we need $\varphi_\sigma(0,0)+\varphi_\sigma(1,1))=0\ mod \ 2\pi $. This is equivalent to $p_1=p_2$. Second, $\mathbf{R_2}=(-1,0)$ is related to $\mathbf{R_1}=(1,0)$ by three $C_6$ rotation. Meanwhile we have $\Delta(-1,0)=-\Delta(1,0)$. Therefore we have the following condition: \begin{equation} 3 \varphi_{C_6}(0,0)+\varphi_{C_6}(1,1)+\varphi_{C_6}(0,1)+\varphi_{C_6}(-1,0)= \pi \ mod\ 2\pi \end{equation} which requires $p_3=1-p_1 \ mod\ 2$. Because of the above two constraints, there are only two reasonable symmetric $Z_2$ spin liquids with $SO(6)$ rotation symmetry. They are $(0,0,1)$ and $(1,1,0)$ phase. The first is a zero flux phase while the second is a $\pi$ flux phase. Next we show that $p_1 =1$ forbids nearest neighbor hopping. Consider the hopping $t(\mathbf R)\sum_a \Psi_a^\dagger(\mathbf{r+R})\Psi_a(\mathbf r)$. $\mathbf{R_1}=(0,1)$ and $\mathbf{R_2}=(1,0)$ are related by $\sigma$ or $C_6^2$. To have non-zero nearest neighbor hopping, we need to have: \begin{equation} -\varphi_\sigma(0,1)+\varphi_\sigma(0,0)=-\varphi_{C_6}(1,1)-\varphi_{C_6}(0,1)+2\varphi_{C_6}(0,0) \ mod \ 2\pi \end{equation} which fixes $p_1=0$. As a result, the $\pi$ flux phase needs to have zero nearest neighbor hopping. \subsubsection{$Z_2$ Spin Liquid in Schwinger Boson Parton} For six flavor boson, the pairing is also $\Delta(\mathbf R) \sum_a\Psi_a (\mathbf r) \Psi_a(\mathbf r+\mathbf{R})$ for each bond $\mathbf R$. We have $\Delta(\mathbf R)=\Delta(-\mathbf R)$. Similar to the fermion case, the reflection $\sigma$ fixes $p_1=p_2$. The $C_6^3$ relates $\mathbf{R_1}=(1,0)$ to $\mathbf{R_2}=(-1,0)$ and fixes $p_3=p_1$. There are also two symmetric spin liquids satisfying the constraint: the zero flux phase $(0,0,0)$ and the $\pi$ flux phase $(1,1,1)$. Again the $\pi$ flux phase can not have non-zero nearest neighbor hopping. \subsubsection{Equivalence between Schwinger Boson and Schwinger Fermion Description} We have found two symmetric $Z_2$ spin liquids from both Schwinger boson and Schwinger fermion construction. In this section we show that the Schwinger fermion descriptions are equivalent to the Schwinger boson approach. In the Schwinger boson approach, we have the PSG for the bosonic $e$ particle. In the Schwinger fermion parton theory, we have the PSG for the fermionic $f=e \upsilon $. Here $\upsilon$ denotes the vison or $m$ particle. The PSG of $f$ particle can be derived from the composition of the PSG of the $e$ and $m$ particle (with possible twisting factor)\cite{essin2013classifying,lu2017unification,qi2015detecting}. There is one $e$ particle per unit cell and the vison $\upsilon$ always see the $e$ particle as an effective $\pi$ flux. Thus the vison always has the PSG $T_1 T_2=-T_2 T_1$ and $C_6^6=-1$. It has been shown that $\sigma^2=-1$ is anomalous for the vision when there is a $U(1)$ spin rotation symmetry. Vison must have $\sigma^2=1$ \cite{hermele2016flux} in our problem. For the fractionalization of $X=T_1 T_2 (T_2 T_1)^{-1}, \sigma^2, C_6^6$, the PSG of vison $(-1)^{p^\upsilon_X}$ can be uniquely determined as $P^\upsilon=(-1,0,-1)$. We can then get PSG of $f$ from the PSG of $e$ particle by: $(-1)^{P^f_X}=(-1)^{P^e_X}(-1)^{P^\upsilon_X} (-1)^{\epsilon(X)}$, where $\epsilon(X)=1,-1$ is a twist factor. It has been shown that $\epsilon(T_1 T_2 (T_2 T_1)^{-1})=1$ and $\epsilon(\sigma^2)=\epsilon(C_6^6)=-1$\cite{lu2017unification,qi2015detecting}. We can then map PSG of $e$ particle $P^b=(p^b_1,p^b_2,p^b_3)$ to $P^f=(p^f_1,p^f_2,p^f_3)$ by equation: \begin{equation} p^f_1=p^b_1+1,\ p^f_2=p^b_2+1,\ p^f_3=p^b_3 \end{equation} From the above relation we can see that both Schwinger boson theory and Schwinger fermion theory are describing two symmetric $Z_2$ spin liquids: I. $P^b=(0,0,0)$ and $P^f=(1,1,0)$. II. $P^b=(1,1,1)$ and $P^f=(0,0,1)$. In summary we find two symmetric $Z_2$ spin liquid,shown in Table.~\ref{table:Z2_so_6}. Each of them can be described using either Schwinger boson or Schwinger fermion mean field ansatz. Details about the ansatz and the dispersion can be found in the Appendix.~\ref{append:Z_2_spin_liquid}. \begin{table}[H] \centering \begin{tabular}{c|c|c|c} \hline Phase&PSG& Band Bottom of $e$ \\ \hline Type I $Z_2$ & $P^b=(0,0,0)$, $P^f=(1,1,0)$ & $(0,0)$ \\ \hline Type II $Z_2$ & $P^b=(1,1,1)$, $P^f=(0,0,1)$ & $\pm(\frac{\pi}{6},\frac{\pi}{2\sqrt{3}})$,$\pm(\frac{5\pi}{6},\frac{\pi}{2\sqrt{3}})$ \\ \hline \end{tabular} \caption{Two symmetric $Z_2$ spin liquids. $P^b$ and $P^f$ label symmetric fractionalization for $e$ and $f$ particles. We also list the band bottom of $e$ particle in the Schwinger boson mean field ansatz with only nearest neighbor coupling.} \label{table:Z2_so_6} \end{table} \section{Pseudogap Metals at $\nu_T=2-x$} After discussing the Mott insulator, we turn to possible metallic phases upon doping the Mott insulator. Especially, we show that pseudogap metals with small Fermi surfaces can naturally emerge upon doping the Mott insulator at $\nu_T=2$. The Mott insulating phase at $\nu_T=2$ is sensitive to the on-site inter-valley spin-spin coupling $J_H$. A non-zero $J_H$ split the $SO(6)$ symmetry down to $1\oplus 2 \oplus 3$. When $J_H>0$ and its magnitude is much larger than $J$, it is obvious that the ground state is a featureless Mott insulator with one valley triplet, spin singlet at each site. When $J_H<0$ with a large magnitude, the low energy is dominated by one $SO(3)$ vector at each site. Therefore we have an effective spin-one model on triangular lattice and the ground state is the $120^\circ$ Neel order. For the intermediate region with $J_H=0$, valence bond solid (VBS) or resonant valence bond (RVB) may also be possible. In the remaining part we discuss possible metallic phases upon doping from the featureless Mott insulator and the VBS/RVB phase. Physics of doping the Neel order is very hard and we leave it to future work. \subsection{$J_H>0$: Symmetric and featureless pseudogap Metal} In the simplest case, let us assume $J_H>0$ and is much larger than $J$. In this case the Mott insulator has one inter-valley singlet at each site. When we dope the system to the filling $\nu_T=2-x$, there are $x$ singlons. One natural state is that these singlons move coherently and form four Fermi surfaces, each of which has area $A_{FS}=-\frac{x}{4}$. The remaining particles are still gapped out by singlet formation. Obviously this is a pseudogap metal with only a small Fermi surface. The Hall number is opposite to the free fermion case and is proportional to $x$. This is quite similar to the phenomenology of cuprates when superconductivity is suppressed by strong magnetic field. This pseudogap metal is a symmetric Fermi liquid. Although the picture is very simple, this state is definitely beyond the conventional scenario with density wave order. The existence of this simple example is a proof that electrons can be gapped out from the Fermi sea without invoking any symmetry breaking order. Although we can not describe this featureless pseudogap phase with the conventional mean field theory, we find that the essential physics can be easily captured by a slave boson mean field theory. When we remove one electron from $\nu_T=2$, we remove one doublon and create one singlon, therefore we use the following parton representation: \begin{equation} c_{\alpha}(\mathbf x)=\sum_{\beta \neq \alpha} \Phi_{\alpha \beta}(\mathbf x) f^\dagger_\beta(\mathbf x) \label{eq:six_flavor_parton_electron} \end{equation} where $\alpha,\beta=1,2,3,4$ is the flavor index. $\Phi_{\alpha \beta}(\mathbf{x})=-\Phi_{\beta \alpha}(\mathbf{x})$ is an anti-symmetric slave boson field, which has been used before in Eq.~\ref{eq:SO(6)_rep_obvious_basis}. $f^\dagger_\beta(\mathbf x)$ creates a singlon with flavor $\beta$. The above parton construction has a $U(1)$ redundancy: \begin{equation} \Phi_{\alpha \beta}(\mathbf x)\rightarrow \Phi_{\alpha \beta}(\mathbf x)e^{i\theta(\mathbf x)}\ \ \ f_{\beta}(\mathbf x)\rightarrow f_{\beta}(\mathbf x)e^{i \theta(\mathbf x)} \end{equation} with the constraint $n_f(\mathbf x)+n_b(\mathbf x)=1$. When $J_H=0$, these six $\Phi_{\alpha \beta}$ fields can form a $SO(6)$ vector in the basis defined in Eq.~\ref{eq:SO(6)_rep_obvious_basis}. In the following we use the $SO(6)$ basis $b_a(\mathbf x)$ with $a=1,2,...,6$: \begin{align} b_1&=\frac{i}{\sqrt{2}}(-\Phi_{12}+\Phi_{34})\notag\\ b_2&=\frac{1}{\sqrt{2}}(\Phi_{12}+\Phi_{34})\notag\\ b_3&=\frac{i}{\sqrt{2}}(-\Phi_{14}+\Phi_{23})\notag\\ b_4&=\frac{1}{\sqrt{2}}(\Phi_{14}+\Phi_{23})\notag\\ b_5&=\frac{1}{\sqrt{2}}(\Phi_{13}-\Phi_{24})\notag\\ b_6&=-\frac{i}{\sqrt{2}}(\Phi_{13}+\Phi_{24})\notag\\ \label{eq:SO(6)_slave_boson_basis} \end{align} We can substitute Eq.~\ref{eq:SO(6)_slave_boson_basis} to the $t-J$ model in Eq.~\ref{eq:unconventional_t_J} and decouple it in the form of mean field theory: \begin{align} H_M&=H_b+H_f\notag\\ H_b&=-t_b \sum_{\langle ij \rangle}\sum_a b^\dagger_{a;i} b_{a;j}+h.c.-\mu \sum_i \sum_a b^\dagger_{a;i}b_{a;i}\notag\\ H_f&=-t_f \sum_{\langle ij \rangle}\sum_\alpha f^\dagger_{\alpha;i}f_{\alpha;j}+h.c.-\mu_f \sum_i \sum_\alpha f^\dagger_{\alpha;i}f_{\alpha;i} \label{eq:six_flavor_meanfield} \end{align} When we add a $J_H>0$, the degeneracy of the six flavor bosons is lifted and the one corresponding to the inter-valley singlet is favored. This is $b_3=\frac{i}{\sqrt{2}}(-\Phi_{14}+\Phi_{23})$ defined in Eq.~\ref{eq:SO(6)_slave_boson_basis}. Therefore we consider the ansatz with $\langle b_3(\mathbf x) \rangle \neq 0$. After the condensation of $b$, the internal $U(1)$ gauge field is higgsed and $f$ can be identified as a local hole operator $c^\dagger$. Because the density of fermion $f$ is $n_f=x$. We have four Fermi surfaces with Fermi surface area $A_{FS}=-\frac{x}{4}$. To further prove the phase is a Fermi liquid, we can try to calculate the single Green function. With simple algebras, we can easily get: \begin{align} &G^c_{\alpha_1,\alpha_2}(x,t;y,t')=\langle c^\dagger_{\alpha_1}(x,t) c_{\alpha_2}(y,t') \rangle \notag\\ &= \sum_{\beta_1\neq \alpha_1}\sum_{\beta_2 \neq \alpha_2}\langle \Phi^\dagger_{\alpha_1 \beta_1}(x,t) \Phi_{\alpha_2 \beta_2}(y,t') \rangle \langle f_{\beta_1}(x,t)f^\dagger_{\beta_2}(y,t')\rangle \notag\\ &=\sum_{\beta \neq \alpha_1, \alpha_2} \langle \Phi^\dagger_{\alpha_1 \beta}(x,t) \Phi_{\alpha_2 \beta}(y,t') \rangle G^f_\beta(x,t;y,t') \end{align} Using the fact that $\langle \Phi_{14} \rangle=-\langle \Phi_{23} \rangle=\frac{i}{\sqrt{2}}\langle b_4 \rangle$ while other components of $\Phi_{\alpha \beta}$ is zero, we can easily get \begin{align} G^c_{11}(x,t;y,t')&=\frac{1}{2}|\langle b \rangle|^2 G^f_{44}(x,t;y,t')\notag\\ G^c_{22}(x,t;y,t')&=\frac{1}{2}|\langle b \rangle|^2 G^f_{33}(x,t;y,t')\notag\\ G^c_{33}(x,t;y,t')&=\frac{1}{2}|\langle b \rangle|^2 G^f_{22}(x,t;y,t')\notag\\ G^c_{44}(x,t;y,t')&=\frac{1}{2}|\langle b \rangle|^2 G^f_{11}(x,t;y,t')\notag\\ \end{align} These equations also mean that $f$ operator should be identified as a physical hole operator. In summary, in the limit with a large anti inter-valley Hund's coupling, a natural state in the under-doped regime is a symmetric and featureless Fermi liquid with small Fermi surfaces. Such a state has Hall number $\eta_H=-x$ for $\nu_T=2-x$, in contrast to the free fermion case with $\eta_H=2-x$. This simple state offers a simple example to partially gap out free fermion Fermi surfaces by symmetric singlet formation, instead of the more familiar density wave order. \subsection{$J_H=0$: orthogonal metal with small Fermi surfaces} Next we turn to the case with $J_H=0$. In this $U(4)$ symmetric point, Luttinger theorem requires $A_{FS}=\frac{\nu_T}{4}$ for a symmetric and featureless phase. However, we will argue that an exotic symmetric pseudogap metal may be possible when doping away from the $\nu_T=2$ Mott insulator in the $U>>t$ limit. We will generalize the conventional RVB theory\cite{lee2006doping} to the type II $t-J$ model close to $\nu_T=2$. As in the familiar RVB theory, we assume the undoped state is a $Z_2$ spin liquid. We still use the parton construction in Eq.~\ref{eq:six_flavor_parton_electron}. We have $n_f=x$ and $n_b=1-x$. In the undoped Mott insulator, there are two $Z_2$ spin liquids as we proposed before. For simplicity we just use the zero flux ansatz from the Schwinger boson method. Basically, the schwinger boson $b$ is in a paired superfluid phase. Then we dope the system, $f$ can form four Fermi surfaces with area $A_{FS}=-\frac{x}{4}$ as in the featureless pseudogap metal in the previous subsection. In this mean field ansatz, $\langle b_i b_j\rangle \neq 0$ higgs the internal $U(1)$ gauge field down to $Z_2$. As argued in Ref.~\onlinecite{nandkishore2012orthogonal}, in this case the physical charge is carried by fermion $f$. In another way, we can use Ioffe-Larkin rule for physical resistivity \cite{ioffe1989gapless}: $\rho_c=\rho_b+\rho_f$. Because the boson $b$ is in a paired superfluid phase, $\rho_b=0$, therefore $\rho_c=\rho_f$. We conclude that the transport property of this phase is exactly the same as a Fermi liquid with small Fermi surfaces. Obviously we will also expect Hall number $\eta_H=-x$ as in the featureless pseudogap metal. The thermodynamic property, like specific heat or spin susceptibility should still be the same as the featureless pseudogap metal. Therefore we still view this phase as a "pseudogap metal" because the number of carriers is much smaller than the conventional Fermi liquid. Next we will show that this pseudogap metal is a non-Fermi-liquid (NFL) instead of a Fermi liquid in terms of single electron Green function. Following the same analysis as in the previous subsection, we can get $G^c(x,y;t,t')\propto \langle b^\dagger(x,t)b(y,t') \rangle G^f(x,y;t,t')$, where we have suppressed the flavor index for simplicity. Because the schwinger boson $b$ is in a paired-superfluid phase, single particle green function $\langle b^\dagger(x,t)b(y,t') \rangle$ should be exponential decay. As a result, single green function for the physical electron $G^c(x,y;t,t')$ should also exponential decay. As a consequence, ARPES or STM measurement can not detect any coherent quasi-particle for this pseudogap metal. The charge carrier in this exotic metal is not the physical electron. We will follow the notation of Ref.~\onlinecite{nandkishore2012orthogonal} and dub it as "orthogonal metal". \hfill In summary, we have shown that a featureless pseudogap metal or an orthogonal metal with small Fermi surfaces $A_{FS}=-\frac{x}{4}$ can naturally emerge at filling $\nu_T=2-x$ for large positive $J_H$ or small $J_H$. For a negative and large $J_H$, we know that the $\nu_T=2$ Mott insulator is in the $120^\circ$ Neel order for the low energy spin-one model. Doping such a Neel order may show new metallic or superconducting phase beyond the analysis here, which we leave to future work. \section{Deconfined metal between pseudogap metal and conventional Fermi liquid } At the large $U>>t$ limit, we have argued that a pseudogap metal with small Fermi surfaces is likely at small doping away from $\nu_T=2$. Then a natural question is how this small Fermi surface pseudogap metal evolves to the conventional Fermi liquid with large Fermi surfaces when increasing $\frac{t}{U}$ or the doping $x$. We try to provide one possible scenario in this section. For simplicity we work in the case with $J_H=0$. We have already presented a description of the orthogonal metal with small Fermi surfaces. Next we need to understand how to describe the conventional Fermi liquid with large Fermi surfaces. At large $\frac{t}{U}$, this is a trivial problem. At the large $U>>t$ with large doping $x$, we still expect a conventional Fermi liquid, which can not be simply understood as in the free fermion case because of the constraint $P_2$ in Eq.~\ref{eq:unconventional_t_J}. In the familiar spin $1/2$ case or in the filling $\nu_T=1-x$ of the $U(4)$ model, the constraint in Eq.~\ref{eq:conventional_t_J} can be respected in the slave boson description: $c_\alpha(\mathbf x)=b^\dagger(\mathbf x) f_\alpha(\mathbf x)$. Then the conventional Fermi liquid just corresponds to the ansatz with $\langle b(\mathbf x) \rangle \neq 0 $. In contrast, in the case $\nu_T=2-x$, the Hilbert space consists of singlon and doublon. Neither of them can simply condense without breaking spin rotation symmetry. Meanwhile, the density of singlon is $x$ while the number of doublon is $1-x$. Therefore to have the conventional Fermi liquid with Hall number $\eta_H=2-x$, we need both singlons and doublons to be absorbed to form the large Fermi surface with area $A_{FS}=\frac{2-x}{4}$. In the following we will show that a large Fermi surface state can be generated from "Kondo resonance" similar to heavy fermion systems. To impose the constraint $P_2$ in Eq.~\ref{eq:unconventional_t_J}, we still use the parton construction in Eq.~\ref{eq:six_flavor_parton_electron}. With this parton construction, we can define spin operators for the doublon site using the slave boson $b_a$ (linear transformation of $\Phi_{\alpha \beta}$) and the spin operators for the singlon site using the fermion $f$. The spin operator for the doublon site is \begin{equation} S^{ab}_b(\mathbf x)=2i (b^\dagger_a(\mathbf x)b_b(\mathbf x)-b^\dagger_b(\mathbf x)b_a(\mathbf x)) \end{equation} where $a,b=1,2,...,6$. $S^{ab}$ is the generator of the $SO(6)$ group. It has a one to one correspondence to the $SU(4)$ spin operators as defined in Table.~\ref{table:so(6)_generators}. The spin operator for the singlon site is: \begin{equation} S^{\mu \nu}_f(\mathbf x)= f^\dagger_\alpha \tau^\mu \sigma^\nu f_\beta(\mathbf x) \end{equation} where $\alpha,\beta=1,2,3,4$. $\tau^\mu\sigma^\nu$ with $\mu,\nu=0,x,y,z$ except $\mu=\nu=0$. With this six-flavor slave boson parton construction, the $t$ term in the $t-J$ model defined in Eq.~\ref{eq:unconventional_t_J} looks like an exchange term between the singlon $f$ and the doublon $b$ : $b^\dagger_i b_j f_i f^\dagger_j$. Here we suppressed the flavor index because generically it looks quite complicated and involves many different terms. This term can be decoupled to the mean field ansatz in Eq.~\ref{eq:six_flavor_meanfield}. The $J$ term in this case involves terms like $S_{b;i}S_{b;j}$, $S_{f;i}S_{f;j}$ and $S_{b;i}S_{f;j}$. At small doping $x$, we have $n_b=1-x$ and $n_f=x$. In this case we can view the doublon site as a $SO(6)$ spin and the fermion $f$ couples to the $SO(6)$ moment through the term $S_{b;i}S_{f;j}$, which resembles a kondo coupling in the heavy fermion problem. Then a large Fermi surface may be generated through "Kondo resonance". The essential point of "Kondo resonance" is to absorb the $SO(6)$ spin to form a large Fermi surface with area $A_{FS}=\frac{2-x}{4}$. To do that, we need to split a doublon to two Fermions first. Therefore we do a further parton construction on top of Eq.~\ref{eq:six_flavor_parton_electron}: \begin{equation} \Phi_{\alpha\beta}=\frac{1}{2}(\psi_\alpha(\mathbf x)\psi_\beta(\mathbf x)-\psi_\beta(\mathbf x)\psi_\alpha(\mathbf x)) \end{equation} In another word, the original electron operator is now written: \begin{equation} c_{\alpha}(\mathbf x)=\sum_{\beta \neq \alpha} \psi_{\alpha}(\mathbf x) \psi_{\beta}(\mathbf x) f^\dagger_{\beta}(\mathbf x) \label{eq:three_parton} \end{equation} with the constraint $\frac{1}{2}n_{\psi}(\mathbf x)+n_f(\mathbf x)=1$. Still there is a $U(1)$ gauge redundancy \begin{equation} f_{\alpha}(\mathbf x)\rightarrow f_{\alpha}(\mathbf x)e^{i\varphi(\mathbf x)}\ \ \ \psi_\alpha(\mathbf x)\rightarrow e^{i\frac{1}{2}\varphi(\mathbf x)} \end{equation} So $\psi$ couples to the $U(1)$ gauge field $\mathbf a$ with gauge charge $1/2$. In addition, $\psi$ couples to another $Z_2$ gauge field because $\psi_\alpha(\mathbf x)\rightarrow -\psi_\alpha(\mathbf x)$ also does not change the physical operator. With the parton construction in Eq.~\ref{eq:three_parton}, we can access both the conventional Fermi liquid and the pseudogap metals with small Fermi surfaces. For simplicity, let us assume that the physical gauge field $A$ couples to $f$. It turns out that the conventional Fermi liquid can evove to the pseudogap metal through two continuous transitions with an intermediate "deconfined metal", as is illustrated in Fig.~\ref{DM_phase_diagram}. We have density $n_\psi=2-2x$ and $n_f=x$. The conventional Fermi liquid is described by $\langle \psi^\dagger f \rangle \neq 0$, similar to the "Kondo resonance" in the heavy fermion problems. To get the pseudogap metal, we can just gap out the Fermi surfaces formed by $\psi$ through pairing. The first possibility is a charge $2e$ pairing $\langle \psi \psi \rangle \neq 0$. In the case with $J_H=0$, this pairing term needs to break the $SU(4)$ spin rotation and lives in a manifold generated by $SO(6)$ rotation. If $J_H>0$, we can just make $\psi$ to form the inter-valley, spin singlet pairing which preserves spin rotation symmetry. The pairing term will completely higgs the $U(1)$ gauge field $\mathbf{a}$. However, the $Z_2$ gauge field still survives and decouples with the remaining fermi surfaces formed by $f$. This is actually a FL* phase with Fermi liquid coexisted with $Z_2$ gauge field. To avoid such an exotic state and get the featureless pseudogap metal, we should condense $\langle \psi \psi V\rangle \neq 0$ where $V$ is the vison of the $Z_2$ gauge field. In this way the $Z_2$ gauge field also gets confined and we get exactly the featureless pseudogap metal. In the $SU(4)$ symmetric point, the orthogonal pseudogap metal may be favored. We can reach it through a charge $4e$ $SU(4)$ singlet pairing: $\langle \epsilon_{\alpha \beta \gamma \delta} \psi_\alpha \psi_\beta \psi_\gamma \psi_\delta V\rangle \neq 0$. This pairing higgses the $U(1)$ gauge field $\mathbf{a}$ down to $Z_2$. Therefore the fermi surface from $f$ couples to both $A$ and the $Z_2$ gauge field, which is exactly the property of the orthogonal pseudogap metal described in the previous section. \begin{figure} \centering \includegraphics[width=0.45\textwidth]{image/DM.png} \caption{Evolution from pseudogap metal to the conventional Fermi liquid. The red, blue and black circles denote Fermi surfaces with area $\frac{2-2x}{4}$, $\frac{x}{4}$ and $\frac{2-x}{4}$. The intermediate phase is a "deconfined metal" where the fermi surfaces formed by $\psi$ and $f$ couple to an internal $U(1)$ gauge field $\mathbf a$. We can condense either $\psi \psi V$ or $\psi \psi \psi \psi V$ to get featureless pseudogap metal or orthogonal pseudogap metal, where $V$ is the vison annihilation operator.} \label{DM_phase_diagram} \end{figure} Now we have one theory that the pseudogap metal can evolve to the Fermi liquid through two continuous phase transitions. Next we briefly discuss the property of the intermediate deconfined metal. The low energy physics is governed by the following action: \begin{align} L&=\psi^\dagger (\partial_0-\frac{1}{2}a_0)\psi +f^\dagger (\partial_0-a_0)f \notag\\ &+\frac{\hbar^2}{2m_\psi}\psi^\dagger(-i\vec \partial-\frac{1}{2}\vec a)^2\psi+\frac{\hbar^2}{2m_f}f^\dagger(-i\vec \partial+\vec A-\vec a)^2f \end{align} In gaussian approximation, an Ioffe-Larkin rule can be easily derived as: \begin{equation} \rho_c=\rho_{\psi}+\rho_f \end{equation} where $\rho_\psi$ and $\rho_f$ should be viewed as the resistivity tensor for $\psi$ and $f$. Because of the gauge fluctuation, the quasiparticle picture is known to break down. Transport of such a deconfined metal remains to be an unsolved theoretical problem. We hope that the possible realization of this phase in graphene moir\'e superlattice can provide more information from experiment on this problem. When applying an external magnetic field, we can get an effective action for the internal magnetic flux: \begin{equation} L_{eff}=\chi_\psi |\frac{1}{2}b|^2+\chi_f |b-B|^2 \end{equation} In the saddle point, the internal gauge field flux $\mathbf{b}$ is locked to the external magnetic field: $\mathbf{b}=\alpha \mathbf{B}$ with $\alpha= \frac{4 \chi_f}{\chi_\psi+4\chi_f}$. Here $\chi_{\psi}$ and $\chi_{f}$ are the diamagnetism susceptibility in the gaussian approximation. Generically we expect $\alpha$ is an order one number smaller than one. Using $\chi\sim \frac{1}{m}$ for a Fermi surface, we have $\alpha=\frac{4 m_{\psi}}{4 m_{\psi}+m_f}$. Because of the locking, $\psi$ sees an effective field $\alpha \mathbf{B}$ while $f$ sees an effective field $-(1-\alpha)\mathbf{B}$. Then in principle one should see quantum oscillations corresponding to the Fermi surfaces area for both $\psi$ and $f$ with frequency renormalized by factor $\alpha$ and $1-\alpha$. Next we discuss the Hall number of this deconfined metal. The constraint $\frac{1}{2}n_\psi+n_f=1$ implies that $\mathbf{J}_\psi=\mathbf{J}_f$, where $\mathbf{J}_\psi=\mathbf{J}$ is defined as variation of $\mathbf{a}$ while $\mathbf{J}_f$ is defined as variation of $\mathbf{A}$. In gaussian approximation, we have the result: \begin{align} e_x&=\frac{\alpha B}{n_\psi \frac{1}{2}e}J^\psi_y\notag\\ e_x-E_x&=\frac{1-\alpha}{n_fe}B J^f_y \end{align} where we have used the result $\rho_{xy}=\frac{B}{n Q}$ for a Fermi surface with charge $Q$ and density $n$. Then it is easy to get \begin{equation} E_x=\left( \frac{2\alpha}{n_\psi e}-\frac{1-\alpha}{n_f e} \right) B J_y \end{equation} Therefore the Hall number is \begin{equation} \frac{1}{\eta_H}=(\frac{2\alpha}{n_\psi }-\frac{1-\alpha}{n_f}) \end{equation} or \begin{equation} \eta_H=\left(\frac{\alpha}{1-x}-\frac{1-\alpha}{x}\right)^{-1} \end{equation} Note that generically $\eta_H$ is not related to the density of charge carriers. At the limit $x<<1$ and $\alpha<<1$, we have $\eta_H \approx - \frac{x}{1-\alpha}$. $\eta_H$ diverges when $\alpha$ increases to $1-x$. Therefore the Hall number can be arbitrary inside the deconfined metal, depending on the value of $\alpha$. Once the system is in the FL phase, $\langle \psi^\dagger f \rangle$ locks $\mathbf{a}=2\mathbf{A}$. In this case $\psi$ forms an electron pocket while $f$ can be viewed as a hole pocket. Deep inside the FL phase, the two Fermi surfaces merge together to form a large electron Fermi surface and $\eta_H=2-x$. In the above we have described one scenario for evolution from pseudogap metals to conventional Fermi liquid by increasing doping or bandwidth. In this simple scenario there is an intermediate deconfined metal phase. The physics of the pseudogap metal we described is kind of similar to the "symmetric mass generation" proposed in Ref.~\onlinecite{you2018symmetric} for Dirac fermions. In that simple case Ref.~\onlinecite{you2018symmetric} constructed a deconfined critical point between an insulator and a Dirac semimetal. It is not clear whether a direct transition between the pseudogap metal and the conventional Fermi liquid can exist or not in our case. We hope to study this in future. \section{$U(1)$ Spinon Fermi surface state and $Z_4$ spin liquid at $\nu_T=1$} At $\nu_T=1$, the inter-valley Hund's term $J_H$ vanishes after projection to the Hilbert space without double occupancy. Therefore the spin rotation symmetry is $SU(4)/Z_4$ or $U(1)_{valley}\times SO(3)_+\times SO(3)_-$. We will show that there is no symmetric gapped $Z_2$ spin liquid when spin rotation symmetry is both $SU(4)/Z_4$ and $U(1)_{valley}\times SO(3)_+\times SO(3)_-$. Within the Abrikosov fermion parton construction, the only symmetric spin liquid state is a $U(1)$ spin liquid with spinon fermi surface, which can be reached from the Fermi liquid phase through a continuous transition. A symmetric $Z_4$ spin liquid is also possible but beyond mean field description. \subsection{Absence of Gapped Symmetric $Z_2$ Spin Liquid} There is a general argument to rule out gapped $Z_2$ spin liquid with full spin rotation symmetry. Because there is only one fundamental representation within each unit cell, in a spin rotation invariant $Z_2$ spin liquid, spinon needs to transform as $(\frac{1}{2},0)$ and $(0,\frac{1}{2})$ under $SU(2)_+ \times SU(2)_-$. Basically we have $e_{+\sigma}$ carries valley $+$ and $e_{-\sigma}$ carries valley $-$. A bound state formed by $e_{+\sigma_1}e_{-\sigma_2}$ has dimension $4$ and transforms as $(\frac{1}{2},\frac{1}{2})$ under $SU(2)_+\times SU(2)_-$. Under $2\pi$ rotation of $S_z$ for either valley, it acquires a global $-1$ phase. Therefore the bound state is in the projective representation of $U(1)_{valley}\times SO(3)_+ \times SO(3)_-$. However, in a gapped $Z_2$ spin liquid, $e_+ e_-$ is created by a local operator and should be in a linear representation. The contradiction implies that a gapped symmetric $Z_2$ spin liquid is not possible. \subsection{$U(1)$ Spin Liquid in Abrikosov Fermion Parton Construction} A $U(1)$ spin liquid is possible and can be constructed in the standard Abrikosov fermion parton theory. For the current problem, Schwinger boson parton theory is not very useful because there is no symmetric paired condensation phase of the four-flavor Schwinger bosons. Therefore we restrict to Abrikosov fermion parton theory. At each site, we have $f_{i a}$ in the fundamental representation of $SU(4)$ with the constraint $\sum_a f^\dagger_{ia}f_{ia}=1$. Unlike the spin $1/2$ case, there is only a $U(1)$ gauge redundancy. Apparently there can not be pairing term which preserves the spin rotation symmetry. This is another manifestation that symmetric $Z_2$ spin liquid is not possible. In the following we classify all possible symmetric $U(1)$ spin liquid states. Projective Symmetric Group (PSG) for $U(1)$ spin liquid is classified in Appendix.~\ref{appendix: U(1) PSG}. There are only two possible PSG, which is labeled by the projective translation symmetry: $T_1 T_2=T_2 T_1 e^{i \Phi_T}$. It turns out only $\Phi_T=0$ and $\Phi_T=\pi$ are compatible with the reflection symmetry $\sigma$. Once $\Phi_T$ is fixed, the symmetry realizations of $\sigma$ and $C_6$ are also fixed. Note that $C_6^6$ and $\sigma^2$ are meaningless in a $U(1)$ spin liquid because a global $U(1)$ transformation can always be added in $C_6$ and $\sigma$. For each symmetry operation $X$, the symmetry realization is $e^{i\varphi_X(x,y)}X$. The following is a list of the PSG. \begin{align} &\varphi_{T_1}=0\notag\\ &\varphi_{T_2}=p_1 \pi x \notag\\ &\varphi_{\sigma}=p_1 \pi xy\notag\\ &\varphi_{C_6}=p_1 \pi xy + \frac{1}{2}p_1 \pi y(y-1) \end{align} up to a constant phase. $\Phi_T=p_1 \pi$ with $p_1=0,1$. $p_1=0$ and $p_1=1$ label the zero-flux phase and the $\pi$-flux phase. However, in the $\pi$ flux phase the nearest neighbor hopping and the next nearest neighbor hopping are forbidden. This ansatz is not energetically favorable. Therefore we only consider the zero flux phase. In the zero flux phase, $\varphi_{X}=0$. Therefore all of symmetry operations are realized trivially. The phase is a $U(1)$ spin liquid with four fermi surfaces, each at filling $1/4$. This spin liquid phase can be reached from the Fermi liquid side through a continuous quantum phase transition. In principle a symmetric $Z_4$ spin liquid is also possible. In the Abrikosov fermion description, the fermion can form a charge $4e$ singlet pairing: $\langle \epsilon_{abcd}f_af_bf_cf_d \rangle \neq 0$, resulting in a symmetric $Z_4$ spin liquid. For the spin-valley model at $\nu_T=1$, there is no symmetric featureless Mott insulator and magnetic order may be suppressed because of the frustration of triangular lattice and large quantum fluctuation space. The most likely competing ordered state is a plaquette order with four sites forming a $SU(4)$ singlet. If such a plaquette order is melted, we can get a quantum spin liquid phase. In this case, our PSG analysis suggests a $U(1)$ spin liquid with spinon Fermi surface or a $Z_4$ spin liquid. A superconductor has been reported at small doping away from the $\nu_T=1$ Mott insulator\cite{Wang2019Signatures}. For both the $Z_4$ spin liquid and the plaquette order, the Mott insulator is a $SU(4)$ singlet. Therefore upon doping, the most likely superconductor has charge $4e$ pairing. A charge $4e$ superconductor will be killed by in plane Zeeman field, which is consistent with the experiment\cite{Wang2019Signatures}. In contrast, a conventional charge $2e$ pairing lives on a $SO(4)$ manifold because valley triplet, spin singlet pairing is degenerate with the valley singlet, spin triplet pairing. A zeeman field will select the spin triplet pairing and there is no reason to expect the $T_c$ to be suppressed by Zeeman field. Given the experimental phenomenology and the possible $SU(4)$ symmetric Mott insulator nearby, the possibility that the observed superconductor is charge $4e$ paired should be taken seriously. We leave a detailed analysis of charge $4e$ superconductor to future work. \section{Conclusion} In this paper we study possible interesting phases in a spin-valley Hubbard model on triangular moire superlattice. We show that pseudogap metals with small Fermi surfaces can naturally emerge by doping the $\nu_T=2$ Mott insulator. In the moir\'e materials, it is also easy to study the possible transition between the "pseudogap metals" and the conventional Fermi liquid by tuning either doping or displacement field. We propose one possible route through an intermediate deconfined metallic phase. We also comment on possible spin liquids at $\nu_T=1$ and charge $4e$ superconductor nearby. Our proposals can be easily tested in ABC trilayer graphene aligned with hBN and in twisted transition metal dichalcogenide homobilayers. The existence of two distinct symmetric Fermi liquids from symmetry analysis is also true for the graphene moir\'e systems with topological bands. In future it is interesting to study whether a similar symmetric Fermi liquid with small Fermi surfaces can naturally exist in the topological case. \section{Acknowledgement} We thank T. Senthil for very helpful discussions. This work was supported by US Department of Energy grant DE- SC000873 \bibliographystyle{apsrev4-1}
\section{Convergence Analysis} \label{sec:analysis} In this section, we present theoretical results on the convergence properties of CIVR (Algorithm~\ref{alg:CIVR}) when the composite function~$F$ is smooth. More specifically, we make the following assumptions. \begin{assumption} \label{assumption:Lip} The following conditions hold concerning problems~\eqref{prob:main} and~\eqref{prob:main-finite}: \begin{itemize} \itemsep 0pt \item $f: \R^{p}\rightarrow\R$ is a $C^1$ smooth and $\ell_f$-Lipschitz function and its gradient $f'$ is $L_f$-Lipschitz. \item Each $g_\xi:\R^{d}\rightarrow\R^p$ is a $C^1$ smooth and $\ell_g$-Lipschitz vector mapping and its Jacobian $g_\xi'$ is $L_g$-Lipschtiz. Consequently, $g$ in~\eqref{eqn:simple-notation} is $\ell_g$-Lipschitz and its Jacobian $g'$ is $L_g$-Lipschitz. \item $r:\R^{d}\rightarrow\R\cup\{\infty\}$ is a convex and lower-semicontinuous function. \item The overall objective function $\Phi$ is bounded below, i.e., $\Phi^*=\inf_x\Phi(x)>-\infty$. \end{itemize} \end{assumption} \vspace{0.5ex} \begin{assumption} \label{assumption:variance} For problem~\eqref{prob:main}, we further assume that there exist constants $\sigma_g$ and $\sigma_{g'}$ such that \begin{equation} \E_\xi[\|g_\xi(x) - g(x)\|^2]\leq \sigma_g^2 \, , \qquad \E_\xi[\|g'_\xi(x) - g'(x)\|^2]\leq \sigma_{g'}^2 \, . \end{equation} \end{assumption} As a result of Assumption~\ref{assumption:Lip}, $F(x)=f\bigl(g(x)\bigr)$ is smooth and $F'$ is $L_F$-Lipschitz continuous with \[ L_F = \ell_g^2 L_f + \ell_f L_g \] (see proof in the supplementary materials). For convenience, we also define two constants \begin{equation} \label{defn:G0-sigma0} G_0: = 2\bigl(\ell_g^4 L_f^2 + \ell_f^2 L_g^2\bigr) \, , \qquad \mbox{and}\qquad \sigma_0^2 := 2\bigl(\ell_g^2 L_f^2\sigma_{g}^2 +\ell_f^2\sigma_{g'}^2\bigr)\,. \end{equation} It is important to notice that $G_0=\cO(L_F^2)$, since we will use step size $\eta=\Theta(1/\sqrt{G_0})=\Theta(1/L_F)$. In the next two subsections, we present complexity analysis of CIVR for solving problem~\eqref{prob:main} and~\eqref{prob:main-finite} respectively. Due to the space limitation, all proofs are provided in the supplementary materials. \subsection{The composite expectation case} The following results for solving problem~\eqref{prob:main} are presented with notations defined in~\eqref{eqn:simple-notation}, \eqref{defn:ProxGD} and~\eqref{defn:G0-sigma0}. \begin{theorem} \label{theorem:cvg-general-fixed} Suppose Assumptions~\ref{assumption:Lip} and~\ref{assumption:variance} hold. Given any $\epsilon>0$, we set $T = \lceil 1/\sqrt{\epsilon} \rceil$ and \[ \tau_t=\tau=\lceil 1/\sqrt{\epsilon} \rceil, \quad B_t = B = \lceil \sigma_0^2/\epsilon \rceil, \quad S_t = S = \lceil 1/\sqrt{\epsilon} \rceil, \quad \mbox{for}\quad t=1,\ldots,T. \] Then as long as $\eta\leq\frac{4}{L_F + \sqrt{L_F^2 + 12G_0}}$, the output $\bar{x}$ of Algorithm~\ref{alg:CIVR} satisfies \begin{equation} \label{thm:cvg-general-fixed} \E\bigl[\|\mathcal{G}_\eta(\bar{x})\|^2\bigr] \leq \Bigl(8\bigl(\Phi(x_0^1) - \Phi^*\bigr)\eta^{-1} + 6\Bigr)\cdot\epsilon = \cO(\epsilon). \end{equation} As a result, the sample complexity of obtaining an $\epsilon$-approximate solution is $TB + 2 T\tau S = \cO\bigl(\epsilon^{-3/2}\bigr)$. \end{theorem} Note that in the above scheme, the epoch lengths $\tau_t$ and all the batch sizes $B_t$ and $S_t$ are set to be constant (depending on a pre-fixed $\epsilon$) without regard of~$t$. Intuitively, we do not need as many samples in the early stage of the algorithm as in the later stage. In addition, it will be useful in practice to have a variant of the algorithm that can adaptively choose $\tau_t$, $B_t$ and $S_t$ throughout the epochs without dependence on a pre-fixed precision. This is done in the following theorem. \vspace{0.5ex} \begin{theorem} \label{theorem:cvg-general-adaptive} Suppose Assumptions~\ref{assumption:Lip} and~\ref{assumption:variance} hold. We set $\tau_t = S_t = \lceil at + b\rceil$ and $B_t=\lceil \sigma_0^2(at+b)^2 \rceil$ where $a>0$ and $b\geq0$. Then as long as $\eta\leq\frac{4}{L_F + \sqrt{L_F^2 + 12G_0}}$, we have for any $T\geq 1$, \begin{equation} \label{thm:cvg-general-adaptive} \E\bigl[\|\mathcal{G}_\eta(\bar{x})\|^2\bigr] \leq \frac{2}{aT^2+(a+2b)T}\left(\frac{8\bigl(\Phi(x_0^1) - \Phi^*\bigr)}{\eta} + \frac{6}{a+b}+\frac{6}{a}\ln\left(\frac{aT+b}{a+b}\right)\right) = \cO\Bigl(\frac{\ln T}{T^2}\Bigr). \end{equation} As a result, obtaining an $\epsilon$-approximate solution requires $T = \tilde{\cO}(1/\sqrt{\epsilon})$ epochs and a total sample complexity of $\tilde{\cO}\bigl(\epsilon^{-3/2}\bigr)$, where the $\tilde{\cO}(\cdot)$ notation hides logarithmic factors. \end{theorem} \subsection{The composite finite-sum case} In this section, we consider the composite finite-sum optimization problem~\eqref{prob:main-finite}. In this case, the random variable $\xi$ has a uniform distribution over the finite index set $\{1,...,n\}$. At the beginning of each epoch in Algorithm~\ref{alg:CIVR}, we use the full sample size $\cB_t=\{1,\ldots,n\}$ to compute $y_0^t$ and $z_0^t$. Therefore $B_t=n$ for all $t$ and Equation~\eqref{defn:sarah-1} in Algorithm~\ref{alg:CIVR} becomes \begin{equation} \label{defn:sarah-1-finte} y_0^t= g(x_0^t) = \frac{1}{n}\sum_{j=1}^ng_j(x_0^t) \,, \qquad z_0^t= g'(x_0^t) = \frac{1}{n}\sum_{j=1}^ng'_j(x_0^t) \,. \end{equation} Also in this case, we no longer need Assumption~\ref{assumption:variance}. \begin{theorem} \label{theorem:cvg-finite-fixed} Suppose Assumptions~\ref{assumption:Lip} holds. Let the parameters in Algorithm~\ref{alg:CIVR} be set as $\cB_t=\{1,\ldots,n\}$ and $\tau_t = S_t = \lceil \sqrt{n} \rceil$ for all~$t$. Then as long as $\eta\leq\frac{4}{L_F + \sqrt{L_F^2 + 12G_0}}$, we have for any $T\geq 1$, \begin{equation} \label{thm:cvg-finite-fixed} \E\bigl[\|\mathcal{G}_\eta(\bar{x})\|^2\bigr] \leq \frac{8\bigl(\Phi(x_0^1) - \Phi^*\bigr)}{\eta\sqrt{n}T} = \cO\left(\frac{1}{\sqrt{n}T}\right), \end{equation} As a result, obtaining an $\epsilon$-approximate solution requires $T = \cO\bigl(1/(\sqrt{n}\epsilon)\bigr)$ epochs and a total sample complexity of $TB + 2 T\tau S = \cO\bigl(n+\sqrt{n}\epsilon^{-1}\bigr)$. \end{theorem} Similar to the previous section, we can also choose the epoch lengths and sample sizes adaptively to save the sampling cost in the early stage of the algorithm. However, due to the finite-sum structure of the problem, when the batch size $B_t$ reaches $n$, we will start to take the full batch at the beginning of each epoch to get the exact $g(x_0^t)$ and $g'(x_0^t)$. This leads to the following theorem. \begin{theorem} \label{theorem:cvg-finite-adaptive} Suppose Assumptions~\ref{assumption:Lip} holds. For some positive constants $a>0$ and $0\leq b<\sqrt{n}$, denote $T_0 := \bigl\lceil\frac{\sqrt{n}-b}{a}\bigr\rceil = \cO\bigl(\sqrt{n}\bigr)$. When $t\leq T_0$ we set the parameters to be $\tau_t = S_t = \sqrt{B_t} = \lceil at + b\rceil$; when $t>T_0$, we set $\cB_t=\{1,\ldots,n\}$ and $\tau_t = S_t = \bigl\lceil\sqrt{n}\bigr\rceil$. Then as long as $\eta\leq\frac{4}{L_F + \sqrt{L_F^2 + 12G_0}}$, \vspace{-1ex} \begin{eqnarray} \label{thm:cvg-finite-adaptive} \E\bigl[\|\mathcal{G}_\eta(\bar{x})\|^2\bigr] \leq \begin{cases} \cO\bigl(\frac{\ln T}{T^2}\bigr) &\mbox{ if } T\leq T_0 \, ,\\ \cO\bigl(\frac{\ln n}{\sqrt{n}(T-T_0+1)}\bigr) &\mbox{ if } T>T_0 \, . \end{cases} \end{eqnarray} As a result, the total sample complexity of Algorithm~\ref{alg:CIVR} for obtaining an $\epsilon$-approximate solution is $\tilde{\cO}\bigl(\min\bigl\{\sqrt{n}\epsilon^{-1},\epsilon^{-3/2}\bigr\}\bigr)$, where $\tilde{\cO}(\cdot)$ hides logarithmic factors. \end{theorem} \section{Convergence analysis for composite expectation case} In this section, we focus on convergence analysis of CIVR for solving the stochastic composite optimization problem~\eqref{prob:main}, and prove Theorems~\ref{theorem:cvg-general-fixed} and~\ref{theorem:cvg-general-adaptive}. First, we show that under Assumption~\ref{assumption:Lip}, the composite function $F(x)=f(g(x))$ is smooth and $F'$ has Lipschitz constant $L_f=\ell_g^2 L_f + \ell_f L_g$. \begin{eqnarray*} \left\|F'(x)-F'(y)\right\| &=& \left\| g'(x)^T f'(g(x)) - g'(y)^T f'(g(y))\right\| \\ &=& \left\| g'(x)^T f'(g(x)) - g'(x)^T f'(g(y)) + g'(x)^T f'(g(y)) - g'(y)^T f'(g(y))\right\| \\ &\leq& \left\| g'(x)^T f'(g(x)) - g'(x)^T f'(g(y))\right\| + \left\| g'(x)^T f'(g(y)) - g'(y)^T f'(g(y))\right\| \\ &\leq& \left\| g'(x)\right\| \left\|f'(g(x)) - f'(g(y))\right\| + \left\|f'(g(y))\right\| \left\|g'(x) - g'(y)\right\| \\ &\leq& \left\| g'(x)\right\| \cdot L_f \left\|g(x) - g(y)\right\| + \left\|f'(g(y))\right\| \cdot L_g \left\|x - y\right\| \\ &\leq& \ell_g L_f \ell_g \left\|x - y\right\| + \ell_f L_g \left\|x - y\right\| \\ &=& \bigl(\ell_g^2 L_f + \ell_f L_g \bigr)\|x-y\|, \end{eqnarray*} where we used $\|g'(x)\|\leq \ell_g$ and $\|f'(g(y))\|\leq\ell_f$, which are implied by the Lipschitz conditions on~$g$ and $f$ respectively. Although the incremental estimators used in CIVR are biased, as shown in~\eqref{eqn:biased-estimate}, we can still bound their squared distances from the targets. This is given in the following lemma. \begin{lemma} \label{lemma:sarah-mse} Suppose Assumption~\ref{assumption:Lip} holds. Let $y_i^t$ and $z_i^t$ be constructed according to \eqref{defn:sarah-1} and \eqref{defn:sarah-2} in Algorithm~\ref{alg:CIVR}. For any $t\geq 1$ and $1\leq i\leq \tau_t-1$, we have the following mean squared error (MSE) bounds \begin{equation} \label{lm:sarah-mse-2} \begin{cases} \displaystyle ~\E\left[\|y_i^t-g(x_i^t)\|^2\right] \leq \E\left[\|y_0^t-g(x_0^t)\|^2\right] + \sum_{r=1}^{i}\frac{\ell_g^2}{S_t}\E\left[\|x_r^t-x_{r-1}^t\|^2\right] \, ,\\ \displaystyle ~\E\left[\|z_i^t-g'(x_i^t)\|^2\right] \leq \E\left[\|z_0^t-g'(x_0^k)\|^2\right] + \sum_{r=1}^{i}\frac{L_g^2}{S_t}\E\left[\|x_r^t-x_{r-1}^t\|^2\right] \, . \end{cases} \end{equation} \end{lemma} \begin{proof} We first state a fact that allows us to decompose the MSE into a squared bias term and a variance term, that is, for an arbitrary random vector $\zeta$ and a constant vector $u$, we have \be \label{eqn:mse-decomp} \E[\|\zeta-u\|^2] = \|\E[\zeta]-u\|^2 + \Var(\zeta), \ee where $\Var(\zeta) := \E[\|\zeta-\E[\zeta]\|^2]$. As a result, \beaa \E\left[\|y_i^t-g(x_i^t)\|^2\big|x_i^t\right] = \bigl\|\E[y_i^t|x_i^t]-g(x_i^t)\bigr\|^2 + \Var\bigl(y_i^t|x_i^t\bigr). \eeaa For the bias term, we have $\E[y_i^t|x_i^t]-g(x_i^t) = y_{i-1}^t - g(x_{i-1}^t)$. For the variance term, we have \beaa \Var\bigl(y_i^t|x_i^t\bigr) &=& \Var\biggl(y_{i-1}^t + \frac{1}{S_t}\sum_{\xi \in\cS_i^t}(g_\xi(x_i^t) - g_\xi(x_{i-1}^t)) \;\Big|\; x_i^t\biggr)\\ &=& \frac{1}{S_t}\Var\bigl(g_\xi(x_i^t)-g_\xi(x_{i-1}^t)\;|\,x_i^t\bigr)\\ &\leq& \frac{1}{S_t}\E\bigl[\|g_\xi(x_i^t) - g_\xi(x_{i-1}^t)\|^2|x_i^t\bigr]\\ & \leq & \frac{\ell_g^2}{S_t}\|x_i^t-x_{i-1}^t\|^2, \end{eqnarray*} where the second equality is due to the fact that $y_{i-1}^t$ is a constant conditioning on $x_i^t$ and in the last inequality we used the $\ell_g$-Lipschitz continuity of $g_\xi$. Consequently, \[ \E\left[\|y_i^t-g(x_i^t)\|^2\right] \leq \E\left[\|y_{i-1}^t-g(x_{i-1}^t)\|^2\right] + \frac{\ell_g^2}{S_t} \E\left[\|x_i^t-x_{i-1}^t\|^2\right]. \] Recursively applying the above procedure yields \begin{equation} \label{lm:sarah-mse-3} \E\left[\|y_i^t-g(x_i^t)\|^2\right] \leq \E\left[\|y_0^t-g(x_0^t)\|^2\right] + \sum_{r=1}^i\frac{\ell_g^2}{S_t} \E\left[\|x^t_r-x^t_{r-1}\|^2\right]. \end{equation} Similarly, the bound on $\E\left[\|z_i^t-g'(x_i^t)\|^2\right]$ can be shown by using the $L_g$-Lipschitz continuity of~$g'_\xi$. \end{proof} In Algorithm~\ref{alg:CIVR}, we approximate the gradient of $F(x):=f(g(x))$ by $\tnf(x_i^t)=(z_i^t)^Tf'(y_i^t)$. The next lemma bounds the MSE of this estimator. \begin{lemma}\label{lemma:MSE-grad-expectation} Suppose Assumptions~\ref{assumption:Lip} and~\ref{assumption:variance} hold. Then we have \begin{equation} \label{eqn:mse-F'} \E[\|\tnf(x_i^t) - F'(x_i^t)\|^2] \leq \frac{G_0}{S_t}\sum_{r=1}^i\E[\|x_{r}^t - x_{r-1}^t\|^2] + \frac{\sigma_0^2}{B_t}, \end{equation} where \begin{equation*} G_0: = 2\bigl(\ell_g^4 L_f^2 + \ell_f^2 L_g^2\bigr)\quad \mbox{and}\quad \sigma_0^2 := 2\bigl(\ell_g^2 L_f^2\sigma_{g}^2 + \ell_f^2\sigma_{g'}^2\bigr)\,. \end{equation*} \end{lemma} \begin{proof} Using Assumption~\ref{assumption:Lip}, one immediately gets \begin{eqnarray} & & \E\left[\|\tnf(x_i^t) - F'(x_i^t)\|^2\right] \nonumber \\ & = & \E\left[\|(z_i^t)^Tf'(y_i^t) - (g'(x_i^t))^Tf'(g(x_i^t))\|^2\right] \nonumber \\ & = & \E\left[\|(z_i^t)^Tf'(y_i^t) - (g'(x_i^t))^Tf'(y_i^t) + (g'(x_i^t))^Tf'(y_i^t) - (g'(x_i^t))^Tf'(g(x_i^t))\|^2\right]\nonumber\\ & \leq & 2\E\left[\|(z_i^t)^Tf'(y_i^t) - (g'(x_i^t))^Tf'(y_i^t)\|^2\right] + 2\E\left[\|(g'(x_i^t))^Tf'(y_i^t) - (g'(x_i^t))^Tf'(g(x_i^t))\|^2\right]\nonumber\\ & \leq & 2\ell_f^2\E\left[\|z_i^t-g(x_i^t)\|^2\right] + 2\ell_g^2L_f^2\E\left[\|y_i^t-g'(x_i^t)\|^2\right] . \label{eqn:mse-F} \end{eqnarray} Therefore, by substituting the MSE bounds provided in Lemma \ref{lemma:sarah-mse} into inequality \eqref{eqn:mse-F}, we obtain \begin{eqnarray} \E\left[\|\tnf(x_i^t) - F'(x)\|^2\right] &\leq& \frac{2\bigl(\ell_g^4 L_f^2+\ell_f^2 L_g^2\bigr)}{S_t} \sum_{r=1}^i\E\left[\|x_{r}^t - x_{r-1}^t\|^2\right] \nonumber \\ && + \; 2\ell_g^2 L_f^2 \E\left[\|y_0^t-g(x_0^t)\|^2\right] + 2\ell_f^2 \E\left[\|z_0^t-g'(x_0^k)\|^2\right] . \label{eqn:explicit-ini-variance} \end{eqnarray} Under Assumption~\ref{assumption:variance}, we can bound the MSE of the estimates in~\eqref{defn:sarah-1} as \[ \E\left[\|y_0^t-g(x_0^t)\|^2\right] \leq \frac{\sigma_g^2}{B_t}\,, \qquad \E\left[\|z_0^t-g'(x_0^k)\|^2\right] \leq \frac{\sigma_{g'}^2}{B_t} \,. \] Combining these MSE bounds with~\eqref{eqn:explicit-ini-variance} yields the desired result. \end{proof} For the proximal gradient type of algorithms, no matter deterministic or stochastic, a common metric to quantify the optimality of~$x_i^t$ is the norm of the so-called \emph{proximal gradient mapping} \be \label{defn:Gt} \mathcal{G}_\eta(x_i^t):=\frac{1}{\eta}\bigl(x_i^t-\hat{x}_{i+1}^t\bigr), \ee where $\eta$ is the step size used to produce the update \[ \hat{x}_{i+1}^t=\prox_r^{\eta}\bigl(x_i^t-\eta F'(x_i^t)\bigr). \] Since we use a constant $\eta$ throughout this paper, we will omit the subscript~$\eta$ and use $\mathcal{G}(x)$ to denote the proximal gradient mapping at~$x$. Our goal is to find a point~$x$ with $\E\bigl[\|\mathcal{G}(x)\|^2\bigr]\leq \epsilon$. However, in Algorithm~\ref{alg:CIVR}, we only have the approximate proximal gradient mapping \be \label{defn:tGt} \tcgt:=\frac{1}{\eta}(x_i^t-x_{i+1}^t) \,, \ee where $x_{i+1}^t$ is computed using the estimated gradient $\tnf(x_i^t)$: \[ x_{i+1}^t=\prox_r^{\eta}\bigl(x_i^t-\eta \tnf(x_i^t)\bigr). \] Hence we need to establish the connection between $\cgt$ and $\tcgt$, which is done in the next lemma. \begin{lemma}\label{lemma:grad-mapping-closedness} For the two gradient mappings defined in~\eqref{defn:Gt} and~\eqref{defn:tGt}, we have \begin{equation} \label{eqn:closeness} \E\left[\|\cgt\|^2\right] \leq 2\E\left[\|\tcgt\|^2\right] + 2\E\left[\|\tnf(x_i^t)-F'(x_i^t)\|^2\right]. \end{equation} \end{lemma} \begin{proof} Using the inequality $\|x_i^t-\hat{x}_{i+1}^t\|^2\leq 2\|x_i^t-x_{i+1}^t\|^2 + 2\|x_{i+1}^t-\hat{x}_{i+1}^t\|^2$ and the definitions of $\cgt$ and $\tcgt$, we have \begin{eqnarray*} \E\left[\|\cgt\|^2\right] &\leq& 2\E\left[\|\tcgt\|^2\right] + \frac{2}{\eta^2}\left\|x_{i+1}^t-\hat{x}_{i+1}^t\right\|^2 \\ &=& 2\E\left[\|\tcgt\|^2\right] + \frac{2}{\eta^2}\left\|\prox_r^{\eta}\bigl(x_i^t-\eta F'(x_i^t)\bigr)-\prox_r^{\eta}\bigl(x_i^t-\eta \tnf(x_i^t)\bigr)\right\|^2 \\ &\leq& 2\E\left[\|\tcgt\|^2\right] + \frac{2}{\eta^2}\left\|x_i^t-\eta F'(x_i^t)-\bigl(x_i^t-\eta \tnf(x_i^t)\bigr)\right\|^2 \\ &=& 2\E\left[\|\tcgt\|^2\right] + 2\E\left[\|\tnf(x_i^t)-F'(x_i^t)\|^2\right], \end{eqnarray*} where in the second inequality we used the non-expansive property of proximal mapping \citep[e.g.,][Section~31]{Rockafellar70book}. \end{proof} The next lemma bounds the amount of expected descent per iteration in Algorithm~\ref{alg:CIVR}. \begin{lemma} \label{lemma:descent-general} Let the sequence $\{x_i^t\}$ be generated by Algorithm~\ref{alg:CIVR}. Then for all $t\geq 1$ and $0\leq i\leq \tau_t-1$, we have the following two inequalities \begin{equation} \label{lm:descent-general-1} \E[\Phi(x_{i+1}^t)] ~\leq~ \E[\Phi(x_i^t)] - \left(\frac{\eta}{2} - \frac{L_F\eta^2}{2}\right) \E\left[\|\tcgt\|^2\right] + \frac{\eta}{2}\E[\|\tnf(x_i^t) - F'(x_i^t)\|^2], \end{equation} and \begin{align} \E[\Phi(x_{i+1}^t)] ~\leq~ & \E[\Phi(x_i^t)] - \frac{\eta}{8}\E[\|\cgt\|^2] + \frac{3\eta}{4}\E[\|\tnf(x_i^t) - F'(x_i^t)\|^2] \nonumber \\ & - \left(\frac{1}{4\eta} - \frac{L_F}{2}\right) \E\left[\|x_{i}^t-x_{i+1}^t\|^2\right]. \label{lm:descent-general-2} \end{align} \end{lemma} \begin{proof} By applying the $L_F$-Lipschitz continuity of $F'$ and the optimality of the $\frac{1}{\eta}$-strongly convex subproblem, we have \beaa \Phi(x_{i+1}^t)& = & F(x_{i+1}^t) + r(x_{i+1}^t)\\ & \leq & F(x_i^t) + \langle F'(x_i^t),x_{i+1}^t-x_i^t\rangle + \frac{L_F}{2}\|x_{i+1}^t-x_i^t\|^2 + r(x_{i+1}^t)\\ & = & F(x_i^t) + \langle\tnf(x_i^t),x_{i+1}^t-x_i^t\rangle + \frac{1}{2\eta}\|x_{i+1}^t-x_i^t\|^2 + r(x_{i+1}^t)\\ & & + \langle F'(x_i^t)-\tnf(x_i^t),x_{i+1}^t-x_i^t\rangle- (\frac{1}{2\eta}-\frac{L_F}{2})\|x_{i+1}^t-x_i^t\|^2 \\ & \leq & F(x_i^t) + r(x_i^t) - \frac{1}{2\eta}\|x_{i+1}^t-x_i^t\|^2- (\frac{1}{2\eta}-\frac{L_F}{2})\|x_{i+1}^t-x_i^t\|^2 \\ & & + \frac{\eta}{2}\|\tnf(x_i^t)-F'(x_i^t)\|^2 + \frac{1}{2\eta}\|x_{i+1}^t-x_i^t\|^2\\ & = & \Phi(x_i^t) - (\frac{1}{2\eta}-\frac{L_F}{2})\|x_{i+1}^t-x_i^t\|^2+ \frac{\eta}{2}\|\tnf(x_i^t)-F'(x_i^t)\|^2. \eeaa Taking the expectation on both sides completes the proof of inequality \eqref{lm:descent-general-1}. By inequality \eqref{eqn:closeness}, we know that $$-\frac{\eta}{4}\E[\|\tcgt\|^2]\leq -\frac{\eta}{8}\E[\|\cgt\|^2] + \frac{\eta}{4}\E[\|\tnf(x_i^t)-F'(x_i^t)\|^2].$$ Adding this inequality in to \eqref{lm:descent-general-1} yields \eqref{lm:descent-general-2}. \end{proof} \subsection{Proof of Theorem~\ref{theorem:cvg-general-fixed}} \label{sec:proof-cvg-general-fixed} \begin{proof} Because all $\tau_t$, $B_t$ and $S_t$ are taking their values independent of $t$. We denote $\tau = \tau_t$, $B = B_t$ and $S = S_t$ for all $t$ for clarity. By Lemma \ref{lemma:descent-general}, summing up inequality \eqref{lm:descent-general-2} throughout the $t$-th epoch and applying \eqref{eqn:mse-F'} gives \begin{eqnarray*} \frac{\eta}{8}\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] & \leq & \E[\Phi(x_0^t)] - \E[\Phi(x_{\tau}^t)] - \left(\frac{1}{4\eta} - \frac{L_F}{2}\right)\sum_{r=1}^{\tau}\E[\|x_r^t-x_{r-1}^t\|^2]\\ & & + \frac{3G_0\eta}{4S}\sum_{i=1}^{\tau-1}\sum_{r=1}^{i}\E[\|x_r^t-x_{r-1}^t\|^2] + \frac{3\sigma_0^2\eta}{4B}\tau\\ & \leq & \E[\Phi(x_0^t)] - \E[\Phi(x_{\tau}^t)] - \left(\frac{1}{4\eta} - \frac{L_F}{2}-\tau\frac{3G_0\eta}{4S}\right)\sum_{r=1}^{\tau}\E[\|x_r^t-x_{r-1}^t\|^2] \\ && + \frac{3\sigma_0^2\eta}{4B}\tau, \end{eqnarray*} where the second inequality is due to the fact that \[ \sum_{i=1}^{\tau-1}\sum_{r=1}^{i}\E[\|x_r^t-x_{r-1}^t\|^2]\leq \tau\sum_{r=1}^{\tau}\E[\|x_r^t-x_{r-1}^t\|^2]. \] When we choose the parameters satisfying $\tau\leq S$, then the coefficient $\frac{1}{4\eta} - \frac{L_F}{2}-\tau\frac{3G_0\eta}{4S} \geq \frac{1}{4\eta} - \frac{L_F}{2}-\frac{3G_0\eta}{4}$ which depends only on the parameter $\eta$ and some constant. If we choose the $\eta$ according to the theorem, then $\frac{1}{4\eta} - \frac{L_F}{2}-\frac{3G_0\eta}{4}\geq0$, yielding that \begin{equation} \label{thm:cvg-general-fixed-1} \frac{\eta}{8}\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] ~\leq~ \E[\Phi(x_0^t)] - \E[\Phi(x_{\tau}^t)] + \frac{3\sigma_0^2\eta}{4B}\tau. \end{equation} Summing this up throughout the epochs gives \begin{equation*} \frac{\eta}{8}\sum_{t=1}^T\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] ~\leq~ \E[\Phi(x_0^1)] - \E[\Phi(x_{\tau}^T)] + \frac{3\sigma_0^2\eta}{4B}\tau T \leq \Phi(x_0^1) - \Phi^* + \frac{3\sigma_0^2\eta}{4B}\tau T, \end{equation*} where we have applied the fact that $x_0^t = x_{\tau}^{t-1}$. By the random sampling scheme for output $\bar{x}$, we have \begin{equation} \label{thm:cvg-general-fixed-2} \E[\|\mathcal{G}(\bar{x})\|^2] = \frac{1}{\tau T}\sum_{t=1}^T\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] \leq \frac{8(\Phi(x_0^1) - \Phi^*)}{\tau T\eta} + \frac{6\sigma_0^2}{B}. \end{equation} Substitute the values of $T,\tau$ and $B$ gives \eqref{thm:cvg-general-fixed}. \end{proof} To simplify presentation, we omit $\lceil\cdot\rceil$ on integer parameters in the following discussion. \begin{itemize} \item With $\eta\leq \frac{4}{L_F+\sqrt{L_F^2+12 G_0}}$, and letting $T=1/\sqrt{\epsilon}$, $B=\sigma_0^2/\epsilon$, and $\tau=S=1/\sqrt{\epsilon}$, we have \[ \E[\|\mathcal{G}(\bar{x})\|^2] \leq 8\bigl((\Phi(x_0^1)-\Phi^*)\eta^{-1} + 6 \bigr)\epsilon, \] and the sample complexity is $T(B+2\tau S)=\cO\bigl(\sigma_0^2\epsilon^{-3/2}+\epsilon^{-3/2}\bigr)$, as in our theorem. \item With $\eta\leq\frac{4}{L_F+\sqrt{L_F^2+12 G_0}}$, and letting $T=1/\epsilon$, $B=1+\sigma_0^2/\epsilon$, and $\tau=S=1$, we again obtain \[ \E[\|\mathcal{G}(\bar{x})\|^2] \leq 8\bigl((\Phi(x_0^1)-\Phi^*)\eta^{-1} + 6 \bigr)\epsilon, \] but the sample complexity is $T(B+2\tau S)=\cO\bigl(\sigma_0^2\epsilon^{-2}+\epsilon^{-1}\bigr)$, which is same as in \citet{GhadimiLan2013}. For deterministic optimization with $\sigma_0=0$, this recovers the $\cO(\epsilon^{-1})$ complexity. \end{itemize} \subsection{Proof of Theorem~\ref{theorem:cvg-general-adaptive}} \label{sec:proof-cvg-general-adaptive} \begin{proof} Note that for this set of parameters, we still have the relationship that $\tau_t = S_t$. Therefore, within each epoch, \eqref{thm:cvg-general-fixed-1} is still true with epoch specific $\tau_t$ and $B_t$. Summing this up gives \begin{equation} \label{thm:cvg-general-adptive-0.5} \frac{\eta}{8}\sum_{t=1}^T\sum_{i=0}^{\tau_t-1}\E[\|\cgt\|^2] \leq \Phi(x_0^1) - \Phi^* + \sum_{t=1}^T\frac{3\sigma_0^2\eta}{4B_t}\tau_t. \end{equation} By the random selection rule of $\bar{x}$, we have \begin{equation} \label{thm:cvg-general-adptive-1} \E[\|\mathcal{G}(\bar{x})\|^2] = \frac{1}{\sum_{t=1}^T\tau_t}\sum_{t=1}^T\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] \leq \frac{8(\Phi(x_0^1) - \Phi^*)}{\eta\sum_{t=1}^T\tau_t} + 6\sigma_0^2\cdot\frac{\sum_{t=1}^T\tau_t/B_t}{\sum_{t=1}^T\tau_t}. \end{equation} Note that $\tau_t = \lceil at+b\rceil$ and $B_t = \lceil \sigma_0^2 (at+b)^2\rceil.$ We have $$\sum_{t=1}^T\tau_t \geq \sum_{t=1}^T at+b = \frac{a}{2}T(T+1) + bT = \cO(T^2)$$ and $$\sigma_0^2\sum_{t=1}^T\tau_t/B_t\leq \sum_{t=1}^T \frac{1}{at+b}\leq \frac{1}{a+b} + \int_{1}^{T}\frac{dt}{at+b} = \frac{1}{a+b}+\frac{1}{a}\ln\left(\frac{aT+b}{a+b}\right) = \cO(\ln T).$$ Substituting the above bounds into inequality \eqref{thm:cvg-general-adptive-1} gives \eqref{thm:cvg-general-adaptive}. As a result, the total sample complexity is \[ \sum_{t=1}^T \bigl( B_t + 2 \tau_t S_t \bigr) \leq \sum_{t=1}^T \left(\sigma_0^2 (at+b)^2 + 2(at+b)^2\right) = \cO(\sigma_0^2 T^3 + T^3) \,. \] Setting $T=\tilde{\cO}(\epsilon^{-1/2})$ so that $\E[\|\mathcal{G}\|\bar{x}\|^2]\leq\epsilon$, we get sample complexity $\tilde{\cO}(\sigma_0^2 \epsilon^{-3/2} + \epsilon^{-3/2})$. \end{proof} We can also choose a different set of parameters. With $\eta\leq \frac{4}{L_F+\sqrt{L_F^2+12 G_0}}$, and letting $B=1+\sigma_0^2(at+b)$, and $\tau=S=1$, we also have \[ \E[\|\mathcal{G}(\bar{x})\|^2] \leq \frac{8(\Phi(x_0^1)-\Phi^*)}{\eta T} + \frac{6\ln T}{T} \,, \] but the sample complexity, by setting $T=\tilde{\cO}(\epsilon^{-1})$ so that the above bound is less than~$\epsilon$, is \[ \sum_{t=1}^T \bigl( B_t + 2 \tau_t S_t \bigr) \leq \sum_{t=1}^T \left(\sigma_0^2 (at+b) + 2\right) = \cO(\sigma_0^2 T^2 + T) = \tilde{\cO}(\sigma_0^2 \epsilon^{-2} + \epsilon^{-1}) \,. \] This is more close to the classical results on stochastic optimization. \section{Convergence analysis for composite finite-sum case} In this section, we consider the composite finite-sum problem~\eqref{prob:main-finite} and prove Theorems~\ref{theorem:cvg-finite-fixed} and~\ref{theorem:cvg-finite-adaptive}. In this case, the random variable $\xi$ uniformly takes value from the finite index set $\{1,...,n\}$. At the beginning of each epoch in Algorithm~\ref{alg:CIVR}, we can choose to estimate $g(x_0^t)^t$ and $g'(x_0^t)$ by their exact value rather than the approximate ones constructed by subsampling. Namely, in \eqref{defn:sarah-1} of Algorithm \ref{alg:CIVR}, we choose $\cB_t=\{1,\ldots,n\}$ for all~$t\geq 1$. Therefore, \[ y_0^t= g(x_0^t) = \frac{1}{n}\sum_{j=1}^ng_j(x_0^t), \qquad z_0^t= g'(x_0^t) = \frac{1}{n}\sum_{j=1}^ng'_j(x_0^t) \] and \begin{equation}\label{eqn:zero-ini-variance} \E\left[\|y_0^t-g(x_0^t)\|^2\right] = 0\, , \qquad \E\left[\|z_0^t-g'(x_0^k)\|^2\right] = 0 \,. \end{equation} As a result, the initial variances in Lemma~\ref{lemma:sarah-mse} diminishes and \eqref{lm:sarah-mse-2} reduces to \begin{equation} \label{eqn:sarah-mse-finite-1} \begin{cases} \displaystyle \E[\|y_i^t-g(x_i^t)\|^2] \leq \sum_{r=1}^{i}\frac{\ell_g^2}{S_t}\E[\|x_r^t-x_{r-1}^t\|^2],\\ \displaystyle \E[\|z_i^t-g'(x_i^t)\|^2] \leq \sum_{r=1}^{i}\frac{L_g^2}{S_t}\E[\|x_r^t-x_{r-1}^t\|^2]. \end{cases} \end{equation} In addition, combining~\eqref{eqn:explicit-ini-variance} and~\eqref{eqn:zero-ini-variance}, we have \begin{equation} \label{eqn:mse-F'-finite} \E[\|\tnf(x_i^t) - F'(x)\|^2] \leq \frac{G_0}{S_t}\sum_{r=1}^i\E[\|x_{r}^t - x_{r-1}^t\|^2] . \end{equation} Note that Lemma \ref{lemma:descent-general} is still true. \subsection{Proof of Theorem~\ref{theorem:cvg-finite-fixed}} \begin{proof} The proof follows similar steps as those in the proof of Theorem \ref{theorem:cvg-general-fixed}. So we only note down the significantly different steps here. Specifically, following the proof of Theorem \ref{theorem:cvg-general-fixed} in Section~\ref{sec:proof-cvg-general-fixed}, by applying \eqref{eqn:sarah-mse-finite-1} instead of \eqref{lm:sarah-mse-2}, we get the following result instead of inequality \eqref{thm:cvg-general-fixed-1}, \[ \frac{\eta}{8}\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] \leq \E[\Phi(x_0^t)] - \E[\Phi(x_{\tau}^t)]. \] Summing this up apply the random selection rule of $\bar{x}$ gives \[ \E[\|\mathcal{G}(\bar{x})\|^2] = \frac{1}{\tau T}\sum_{t=1}^T\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] \leq \frac{8(\Phi(x_0^1) - \Phi^*)}{\tau T\eta} = \frac{8(\Phi(x_0^1) - \Phi^*)}{\sqrt{n}T\eta}. \] Therefore, we have to set $T = \cO(\frac{1}{\sqrt{n}\epsilon})$ to get an $\epsilon$-solution. Note that the sample complexity per epoch is $n + \tau_t S_t = 2n$, the total sample complexity will be $\cO(n+\sqrt{n}\epsilon^{-1})$. \end{proof} \subsection{Proof of Theorem~\ref{theorem:cvg-finite-adaptive}} \begin{proof} If $T\leq T_0$, then the result is exactly what we proved from Theorem \ref{theorem:cvg-general-adaptive}. Therefore, the first bound in \eqref{thm:cvg-finite-adaptive} is already guaranteed. If $T>T_0$, when $1\leq t \leq T_0$, then everything still runs identically to that described in Theorem \ref{theorem:cvg-general-adaptive}. Consequently, the following bound is effective \begin{equation} \label{thm:cvg-finite-adaptive-1} \frac{\eta}{8}\sum_{t=1}^{T_0}\sum_{i=0}^{\tau_t-1}\E[\|\cgt\|^2] \leq \Phi(x_0^1) - \E[\Phi(x^{T_0+1}_{0})] + \sum_{t=1}^{T_0}\frac{3\sigma_0^2\eta}{4B_t}\tau_t. \end{equation} When $T_0+1\leq t\leq T$, the following bound becomes effective, \begin{equation*} \frac{\eta}{8}\sum_{t=T_0+1}^T\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] \leq \E[\Phi(x_0^{T_0+1})] - \Phi^*. \end{equation*} Therefore, we have \begin{eqnarray*} \E[\|\mathcal{G}(\bar{x})\|^2] = \frac{1}{\sum_{t=1}^T\tau_t}\sum_{t=1}^T\sum_{i=0}^{\tau-1}\E[\|\cgt\|^2] \leq \frac{8(\Phi(x_0^1) - \Phi^*)}{\eta\sum_{t=1}^T\tau_t} + 6\sigma_0^2\cdot\frac{\sum_{t=1}^{T_0}\tau_t/B_t}{\sum_{t=1}^T\tau_t}. \end{eqnarray*} Note that $$\sum_{t=1}^{T_0}\tau_t/B_t\leq \sum_{t=1}^{T_0} \frac{1}{at+b}\leq\frac{1}{a+b}+\frac{1}{a}\ln\left(\frac{aT_0+b}{a+b}\right) = \cO(\ln n),$$ and $$\sum_{t=1}^T\tau_t \geq (T-T_0)\sqrt{n} + \sum_{t=1}^{T_0} (at+b) = \sqrt{n}(T - T_0) + \frac{a}{2}T^2_0+(\frac{a}{2}+b)T_0 = \cO(\sqrt{n}(T-T_0+1)).$$ With the above two bounds, we have proved the second result in \eqref{thm:cvg-finite-adaptive}. For any $\epsilon>0$, if $\epsilon \geq \cO(1/T_0^2) = \cO(n^{-1}).$ In this case, the algorithm will spend most epochs in the adaptive phase, whose sample complexity is $\tilde{\cO}(\epsilon^{-3/2})$. if $\epsilon=o(n^{-1})$, we need $T>T_0$. By \eqref{thm:cvg-finite-adaptive}, we know $\sqrt{n}(T-T_0+1) = \tilde\cO(\epsilon^{-1})$, this means that the total sample complexity will be $$\sum_{t=1}^T\bigl(B_t+2\tau_t S_t\bigr) \leq 3\sum_{t=1}^{T_0} (at+b+1)^2 + 3(T-T_0)n = \tilde\cO(n^{3/2} + \sqrt{n}\epsilon^{-1}) = \tilde{\cO}(\sqrt{n}\epsilon^{-1}).$$ When $\epsilon\geq\cO(n^{-1})$, we have $\epsilon^{-3/2}\leq \sqrt{n}\epsilon^{-1}$. When $\epsilon = o(n^{-1})$, we have $\epsilon^{-3/2} > \sqrt{n}\epsilon^{-1}$. Combining the two cases together gives the sample complexity of $\tilde{\cO}(\min\{\sqrt{n}\epsilon^{-1},\epsilon^{-3/2}\})$. \end{proof} \section{Convergence analysis under gradient-dominant condition} \subsection{Proof of Theorem~\ref{theorem:cvg-KL-general}} \begin{proof} Note that in this case $\Phi(x) = F(x)$. By \eqref{thm:cvg-general-fixed-2} and \eqref{defn:Grd-domi}, we have \[ \E[F(\bar{x}) - F^*] \leq \nu\E[\|F'(\bar{x})\|^2] \leq \frac{8\nu(F(x_0^1) - F^*)}{\tau T\eta} + \frac{6\nu\sigma_0^2}{B} \] By the selection of $T = \bigl\lceil\frac{16\nu\sqrt{\epsilon}}{\eta}\bigr\rceil$, $\tau=1/\sqrt{\epsilon}$ and $B=1+12\nu\sigma_0^2/\epsilon$, we have \begin{equation}\label{eqn:F-gap-exp-eps} \E[F(\bar{x}) - F^*] \leq \frac{1}{2}(F(x_0^1) - F^*) + \frac{1}{2}\epsilon, \end{equation} which is \eqref{thm:cvg-KL-general-0}. Suppose we periodically restart the Algorithm \ref{alg:CIVR} after every~$T$epochs, and set the outputs to be $\bar{x}^k$, where $k = 1,2,...$ denotes the number of restarts. We use the output of the $k$th period $\bar{x}^k$ as the initial point to start the next period, which produces $\bar{x}^{k+1}$. As a result, the above inequality translates to \[ \E[F(\bar{x}^{k+1}) - F^*] \leq \frac{1}{2}(\E[F(\bar{x}^k)] - F^*) + \frac{1}{2}\epsilon. \] Equivalently, \[ \E[F(\bar{x}^{k}) - F^*]- \epsilon \leq \frac{1}{2}\left(\E[F(\bar{x}^{k-1}) - F^*]- \epsilon\right), \] which leads to \[ \E[F(\bar{x}^{k}) - F^*]\leq \frac{1}{2^k}\left(\E[F(\bar{x}^{0}) - F^*]- \epsilon\right)+ \epsilon. \] Therefore, the expected optimality gap converges linearly to a $\epsilon$-ball around 0. \end{proof} Next we discuss the sample complexity with different parameter settings. \begin{itemize} \item If we choose $\tau=S=1/\sqrt{\epsilon}$, $B_t=12\nu\sigma_0^2/\epsilon$, and $T = \bigl\lceil\frac{16\nu\sqrt{\epsilon}}{\eta}\bigr\rceil$, then the total sample complexity is \[ T(B+2\tau S)\ln\frac{1}{\epsilon} = \frac{16\nu\sqrt{\epsilon}}{\eta}\left(\frac{12\nu\sigma_0^2}{\epsilon} + \frac{1}{\sqrt{\epsilon}}\frac{1}{\sqrt{\epsilon}}\right)\ln\frac{1}{\epsilon} =\cO\left((\nu^2\sigma_0^2\epsilon^{-1/2} + \nu\epsilon^{-1/2})\ln\epsilon^{-1}\right) \] However, the above derivation needs to assume $\frac{16\nu\sqrt{\epsilon}}{\eta}\geq 1$ or at least $\cO(1)$, which means $\epsilon>(\eta/\nu)^2$. If this condition is not satisfied, then we have $T=1$ and the complexity is \[ \cO\bigl((\nu\sigma_0^2\epsilon^{-1} + \epsilon^{-1})\ln\epsilon^{-1}\bigr). \] Notice that the second term does not depend on $\nu$ or the conditions number. \item If we choose $\tau=S=1$, $B_t=1+12\nu\sigma_0^2/\epsilon$, and $T = \bigl\lceil\frac{16\nu}{\eta}\bigr\rceil$, the we also have \[ \E[F(\bar{x}) - F^*] \leq \frac{1}{2}(F(x_0^1) - F^*) + \frac{1}{2}\epsilon,\] and the total sample complexity is \[ T(B+2\tau S)\ln\frac{1}{\epsilon} = \frac{16\nu}{\eta}\left(\frac{12\nu\sigma_0^2}{\epsilon} + 2\right)\ln\frac{1}{\epsilon} =\cO\left(\nu^2\sigma_0^2\epsilon^{-1/2} + \nu\right)\ln\epsilon^{-1} \] Defining the condition number $\kappa=L_F\nu=\cO(\nu/\eta)$, the above complexity becomes \[ T(B+2\tau S)\ln\frac{1}{\epsilon} =\cO\left(\kappa^2\sigma_0^2\epsilon^{-1} + \kappa\right)\ln\epsilon^{-1} \] Thus when $\sigma=0$, we have $\cO\bigl(\kappa\ln\epsilon^{-1}\bigr)$ for deterministic optimization. \end{itemize} \subsection{Proof of Theorem~\ref{theorem:cvg-KL-finite}} The proof is very similar to the previous one. It actually becomes simpler by noticing that in the finite-sum case, the terms involving $\sigma_0^2$ disappear: \[ \E[F(\bar{x}) - F^*] \leq \nu\E[\|F'(\bar{x})\|^2] \leq \frac{8\nu(F(x_0^1) - F^*)}{\tau T\eta}. \] By choosing $T = \bigl\lceil\frac{16\nu}{\eta\sqrt{n}}\bigr\rceil$, $\tau=S=\sqrt{n}$. we again obtain~\eqref{eqn:F-gap-exp-eps}. In this case, we have $B=n$ and \[ T(B+2\tau S)\epsilon^{-1} = \left\lceil\frac{16\nu}{\eta\sqrt{n}}\right\rceil \left(n+2\sqrt{n}\sqrt{n}\right)\ln\epsilon^{-1} =\cO\left(n+\nu\sqrt{n}\right)\ln\epsilon^{-1}. \] \section{Convergence analysis under optimally strong convexity} In order to prove Theorems~\ref{theorem:cvg-O-S-CVX-general} and~\ref{theorem:cvg-O-S-CVX-finite}, we first state Lemma~3 in \cite{xiaozhang2014proxsvrg} in our notations. \begin{lemma}[Lemma 3 in \cite{xiaozhang2014proxsvrg}] \label{lemma:L.Xiao-T.Zhang} Let $\Phi(x) = F(x) + r(x)$, where $F'(x)$ is $L_F$-Lipschitz continuous, and $F(x)$ and $r(x)$ are convex. For any $x\in \mathrm{dom}(r)$, and any $v\in \R^{d}$, define $$x^+ := \mathrm{Prox}_{\eta r(\cdot)}(x-\eta v),\mbox{ } \mathcal{G}:=\frac{1}{\eta}(x-x^+), \mbox{ and } \Delta: = v-F'(x),$$ where $\eta$ is a step size satisfying $0<\eta\leq 1/L_F$. Then for any $y\in\R^{d}$, $$\Phi(y)\geq \Phi(x^+) + \mathcal{G}^T(y-x) + \frac{\eta}{2}\|\mathcal{G}\|^2+ \Delta^T(x^+-y).$$ \end{lemma} \subsection{Proof of Theorem~\ref{theorem:cvg-O-S-CVX-general}} \begin{proof} If we set $x = x_i^t$, $y = x^*$, $v = \tnf(x_i^t)$, $x^+ = x_{i+1}^t$ and $\mathcal{G} = \tcgt$, we get the following useful inequality, \[ \langle\tcgt,x^*-x_i^t\rangle \leq \Phi(x^*) - \Phi(x_{i+1}^t) - \frac{\eta}{2}\|\tcgt\|^2 - \langle F'(x_i^t) - \tnf(x_i^t),x^*-x_{i+1}^t\rangle. \] As a result we have the following inequality, \begin{eqnarray} & & \|x_{i+1}^t-x^*\|^2 \nonumber \\ & = & \|x_i^t - x^*\|^2 + \eta^2\|\tcgt\|^2 +2\eta\langle \tcgt,x^*-x_i^t \rangle \nonumber\\ & \leq & \|x_i^t-x^*\|^2 + \eta^2\|\tcgt\|^2 - 2\eta(\Phi(x_{i+1}^t) - \Phi(x^*)) - \eta^2\|\tcgt\|^2 \nonumber \\ & & - 2\eta\langle F'(x_i^t) - \tnf(x_i^t),x^*-x_{i+1}^t\rangle\nonumber\\ & \leq & \|x_i^t-x^*\|^2 - 2\eta(\Phi(x_{i+1}^t) - \Phi(x^*)) + \frac{2\eta}{\mu}\|F'(x_i^t) - \tnf(x_i^t)\|^2 + \frac{\eta\mu}{2}\|x_{i+1}^t - x^*\|^2\nonumber\\ & \leq & \|x_i^t-x^*\|^2 - \eta(\Phi(x_{i+1}^t) - \Phi(x^*)) + \frac{2\eta}{\mu}\|F'(x_i^t) - \tnf(x_i^t)\|^2. \label{eqn:C-SAGA-result} \end{eqnarray} Note that the inequality \eqref{eqn:C-SAGA-result} is originally obtained in \cite{ZhangXiao2019C-SAGA}. Adding $2\mu\cdot$\eqref{eqn:C-SAGA-result} to \eqref{lm:descent-general-1}, we get \begin{eqnarray} 2\mu\eta\E[\Phi(x_{i+1}^t)-\Phi^*] & \leq & \E[\Phi(x_{i}^t) + 2\mu\|x_{i}^t - x^*\|^2] - \E[\Phi(x_{i+1}^t) + 2\mu\|x_{i+1}^t - x^*\|^2] \nonumber \\ & & -(\frac{1}{2\eta} - \frac{L_F}{2})\E[\|x_{i+1}^t-x_i^t\|^2] + \frac{9}{2}\eta\E[\|\tnf(x_i^t) - F'(x_i^t)\|^2]. \label{eqn:cvg-O-S-CVX-1} \end{eqnarray} By \eqref{eqn:cvg-O-S-CVX-1} and \eqref{eqn:mse-F'}, we have \begin{eqnarray*} 2\mu\eta\sum_{i=0}^{\tau_t-1} \E[\Phi(x_{i+1}^t) - \Phi^*] &\leq& \E[\Phi(x_{\tau_t}^t) + 2\mu\|x_{\tau_t}^t-x^*\|^2] - \E[\Phi(x_{0}^t) + 2\mu\|x_{0}^t-x^*\|^2] \nonumber\\ & & - (\frac{1}{2\eta} - \frac{L_F}{2} - \tau_t\frac{9G_0\eta}{2S_t} )\sum_{r=1}^{\tau_t}\E[\|x_{r}^t-x_{r-1}^t\|^2] + \tau_t\frac{9\sigma_0^2\eta}{2B_t}.\nonumber \end{eqnarray*} According to the selection of $\tau_t,S_t,B_t$ and $\eta$, we know that the coefficient $(\frac{1}{2\eta} - \frac{L_F}{2} - \tau_t\frac{9G_0\eta}{2S_t} )\geq0$. Consequently, \begin{eqnarray*} 2\mu\eta\sum_{i=0}^{\tau_t-1} \E[\Phi(x_{i+1}^t) - \Phi^*] &\leq& \E[\Phi(x_{\tau_t}^t) + 2\mu\|x_{\tau_t}^t-x^*\|^2] - \E[\Phi(x_{0}^t) + 2\mu\|x_{0}^t-x^*\|^2] + \tau_t\frac{9\sigma_0^2\eta}{2B_t}.\nonumber \end{eqnarray*} Summing this up and apply the random selection rule of $\bar{x}$ gives \begin{eqnarray*} \E[\Phi(\bar{x})-\Phi^*] &\leq& \frac{1}{2\mu\eta\tau T}\E[\Phi(x_0^1) - \Phi^* + 2\mu\|x_0^1-x^*\|^2] + \frac{9\sigma_0^2}{4\mu B_t}\nonumber\\ & \leq &\frac{5}{2\mu\eta\tau T}\E[\Phi(x_0^1) - \Phi^*] + \frac{9\sigma_0^2}{4\mu B_t} \,. \nonumber \end{eqnarray*} If we choose $T=\lceil \frac{5\sqrt{\epsilon}}{\mu\eta} \rceil$, $\tau=S=\frac{1}{\sqrt{\epsilon}}$ and $B_t=1+\frac{9\sigma_0^2}{2\mu\epsilon}$, then $\frac{5}{2\mu\eta\tau T}\leq \half$ and we obtain \[ \E[\Phi(\bar{x})-\Phi^*] ~\leq~ \frac{1}{2}\E[\Phi(x_0^1) - \Phi^*] + \frac{1}{2}\epsilon \,. \] This proves the inequality \eqref{thm:cvg-O-S-CVX-general-0}. The rest of the proof will mimic that of Theorem \ref{theorem:cvg-KL-general}. \end{proof} Discussions on sample complexity: \begin{itemize} \item If we choose $\tau=S=1/\sqrt{\epsilon}$, $B_t=1+\frac{9\sigma_0^2}{2\mu\epsilon}$, and $T=\lceil \frac{5\sqrt{\epsilon}}{\mu\eta} \rceil$, then the sample complexity is \[ T(B+2\tau S)\ln\frac{1}{\epsilon} = \frac{5\sqrt{\epsilon}}{\mu\eta}\left(\frac{9\sigma_0^2}{2\mu\epsilon} + \frac{1}{\sqrt{\epsilon}}\frac{1}{\sqrt{\epsilon}}\right)\ln\frac{1}{\epsilon} =\cO\left((\mu^{-2}\sigma_0^2\epsilon^{-1/2} + \mu^{-1}\epsilon^{-1/2})\ln\epsilon^{-1}\right) \,. \] The above derivation needs to assume $\frac{5\sqrt{\epsilon}}{\mu\eta}\geq 1$ or at least $\cO(1)$, which means $\epsilon>(\eta\mu)^2$. If this condition is not satisfied, then we have $T=1$ and the complexity is \[ \cO\bigl((\mu^{-1}\sigma_0^2\epsilon^{-1} + \epsilon^{-1})\ln\epsilon^{-1}\bigr). \] \item If we choose $\tau=S=1$, $B_t=1+\frac{9\sigma_0^2}{\mu\epsilon}$, and $T = \bigl\lceil\frac{5}{\mu\eta}\bigr\rceil$, the we also have \[ \E[F(\bar{x}) - F^*] \leq \frac{1}{2}(F(x_0^1) - F^*) + \frac{1}{2}\epsilon,\] and the total sample complexity is \[ T(B+2\tau S)\ln\frac{1}{\epsilon} = \frac{5}{\mu\eta}\left(\frac{9\sigma_0^2}{\mu\epsilon} + 2\right)\ln\frac{1}{\epsilon} =\cO\left(\mu^{-2}\sigma_0^2\epsilon^{-1} + \mu^{-1}\right)\ln\epsilon^{-1} \] Defining the condition number $\kappa=L_F\nu=\cO(1/(\mu\eta))$, the above complexity becomes \[ T(B+2\tau S)\ln\frac{1}{\epsilon} =\cO\left(\kappa^2\sigma_0^2\epsilon^{-1} + \kappa\right)\ln\epsilon^{-1} \] Thus when $\sigma=0$, we have $\cO\bigl(\kappa\ln\epsilon^{-1}\bigr)$ for deterministic optimization. \end{itemize} \subsection{Proof of Theorem~\ref{theorem:cvg-O-S-CVX-finite}} The proof is very similar to the previous one. It actually becomes simpler by noticing that in the finite-sum case, the terms involving $\sigma_0^2$ disappear. \clearpage \section{Numerical experiments on policy evaluation for MDP} \begin{figure*}[t] \centering \includegraphics[width=0.345\linewidth]{10-grad.eps} \hspace{-0.03\linewidth} \includegraphics[width=0.345\linewidth]{100-grad.eps} \hspace{-0.03\linewidth} \includegraphics[width=0.345\linewidth]{500-grad.eps} \vfill \includegraphics[width=0.345\linewidth]{10-f.eps} \hspace{-0.03\linewidth} \includegraphics[width=0.345\linewidth]{100-f.eps} \hspace{-0.03\linewidth} \includegraphics[width=0.345\linewidth]{500-f.eps} \caption{Experiments on policy evaluation for MDP for cases with $S=10$, $S=100$ and $S=500$.} \label{fig:MDP} \end{figure*} Here we provide additional numerical experiments on the policy evaluation problem for MDP. Let $\cS = \{1,...,S\}$ be the state space of some Markov decision process. Suppose a reward of $R_{i,j}$ is received after transitioning from state~$i$ to state~$j$. Let $P^{\pi}\in\R^{S\times S}$ be the transition probability matrix under some fixed policy~$\pi$. Then the evaluation of the value function $V^\pi:\cS\to\R$ under such policy is equivalent to solving the following Bellman equation: $$V^\pi(i) = \sum_{j=1}^SP^\pi_{i,j}(R_{i,j} + \gamma V^\pi(j)) = \E_{j|i}[R_{i,j} + \gamma V^\pi(j)].$$ Following the suggestion of \cite{dann2014policy, ASC-PG-M.Wang}, we apply the linear function approximation $V^\pi(i) \approx \langle\Psi_i,w^*\rangle$ for a given set of feature vectors $\Psi_i$. and would like to compute the optimal vector $w^*$. This can be formulated as the following problem \bee \label{prob:Bellman} \minimize_{w} ~F(w) \triangleq \sum_{i=1}^S \bigg(\langle\Psi_i,w\rangle - \sum_{j=1}^SP^\pi_{i,j}(R_{i,j} + \gamma \langle\Psi_j,w\rangle)\bigg)^2. \eee Let's denote $$q^\pi_i(w) \triangleq \sum_{j=1}^SP^\pi_{i,j}(R_{i,j} + \gamma \langle\Psi_j,w\rangle) = \E_{j|i}[R_{i,j} + \gamma \langle\Psi_j,w\rangle].$$ Then by defining \[ g(w) = \left[\langle\Psi_1,w\rangle,...,\langle\Psi_S,w\rangle,q^\pi_i(w),...,q^\pi_S(w)\right]^T \] and \[ f(y_1,...,y_S, z_1,...,z_S) = \|y-z\|^2 = \sum_{i=1}^S(y_i-z_i)^2, \] the Least squares problem is transformed into the form of~\eqref{prob:main-finite}. For this problem, we test the SCGD \cite{SCGD-M.Wang}, the ASCGD \cite{SCGD-M.Wang}, the ASC-PG \cite{ASC-PG-M.Wang}, the VRSC-PG \cite{VRSC-PG}, C-SAGA \cite{ZhangXiao2019C-SAGA} and our CIVR algorithms. In Section~\ref{sec:experiments}, we already tested the algorithms under their standard batch sizes, e.g. $\lceil n^{2/3}\rceil$ and $\lceil\sqrt{n}\rceil$. However, small constant batch sizes are often preferred in practice. Therefore, we would like to set the batch size to $s=1$ for all algorithms. For this special case, we denote the CIVR as the CIVR-b1. To balance the sample complexity between the initial full batch sampling and the later subsampling with $s=1$, we set the epoch length for VRSC-PG and CIVR-b1 to be $S$. Note that the last $S$ components of $g$ are all independent expectations, therefore the variance reduction technique of VRSC-PG \cite{VRSC-PG}, C-SAGA \cite{ZhangXiao2019C-SAGA} and CIVR-b1 applied to each of these components. In the experiments, $P^\pi$, $\Phi$ and $R^\pi$ are generated randomly. Similar to the experiments performed in Section~\ref{sec:experiments}, the step sizes are chosen from $\{0.1, 0.05, 0.01, 0.005, 0.001, 0.0005, 0.0001\}$ by experiments for VRSC-PG, C-SAGA as well as for CIVR-b1. For $S=10$, $\eta = 0.1$ works best for both C-SAGA and CIVR-b1, while $\eta = 0.01$ works best for VRSC-PG; For $S=100$, $\eta = 0.001$ works best for both C-SAGA and CIVR-b1, while $\eta = 0.0001$ works best for VRSC-PG. For $S=500$, $\eta = 0.0001$ works best for all three of them. When $S = 10$ and $S=100$, we choose $\alpha_k = 0.01k^{-3/4}$ and $\beta_k = 0.1k^{-1/2}$ for SCGD, $\alpha_k = 0.01k^{-5/7}$ and $\beta_k = 0.1k^{-4/7}$ for ASCGD and $\alpha_k = 0.01k^{-1/2}$ and $\beta_k = 0.1k^{-1}$ for ASC-PG. When $S = 500$, we choose $\alpha_k = 0.0001k^{-3/4}$ and $\beta_k = 0.001k^{-1/2}$ for SCGD while ASCGD and ASC-PG fail to converge under various trials of parameters. The meaning of these step size parameters can be found in \cite{ASC-PG-M.Wang} and \cite{SCGD-M.Wang}. Figure~\ref{fig:MDP} shows three experiments with sizes $S = 10$, $S = 100$ and $S = 500$ respectively. We can see that both C-SAGA and CIVR-b1 preform much better than other algorithms in our setting. CIVR-b1 has more smooth and stable trajectory than C-SAGA. \section{Numerical Experiments} \label{sec:experiments} \begin{figure*}[t] \centering \includegraphics[width=0.325\linewidth]{30-grad.eps} \includegraphics[width=0.325\linewidth]{38-grad.eps} \includegraphics[width=0.325\linewidth]{49-grad.eps}\\[1ex] \vfill \includegraphics[width=0.325\linewidth]{30-f.eps} \includegraphics[width=0.325\linewidth]{38-f.eps} \includegraphics[width=0.325\linewidth]{49-f.eps} \caption{Experiments on the risk-averse portfolio optimization problem.} \label{fig:risk-averse} \end{figure*} In this section, we present numerical experiments for a risk-averse portfolio optimization problem. Suppose there are $d$ assets that one can invest during~$n$ time periods labeled as $\{1,...,n\}$. Let $R_{i,j}$ be the return or payoff per unit of asset~$j$ at time~$i$, and $R_i$ be the vector consists of $R_{i,1},\ldots,R_{i,d}$. Let $x\in\R^d$ be the decision variable, where each component $x_j$ represent the amount of investment or percentage of the total investment allocated to asset~$j$, for $j=1,\ldots,d$. The same allocations or percentages of allocations are repeated over the~$n$ time periods. We would like to maximize the average return over the~$n$ periods, but with a penalty on the variance of the returns across the~$n$ periods (in other words, we would like different periods to have similar returns). This problem can be formulated as a finite-sum version of problem~\eqref{prob:risk-averse}, with a discrete random variable $\xi\!\in\!\{1,\ldots,n\}$ and $h_i(x)\!=\!\langle R_i, x\rangle$ for $i=1,\ldots,n$. The function~$r$ can be chosen as the indicator function of an $\ell_1$ ball, or a soft $\ell_1$ regularization term. We choose the later one in our experiments to obtain a sparse asset allocation. Using the mappings defined in~\eqref{eqn:mean-var-mapping}, it can be further transformed into the composite finite-sum problem~\eqref{prob:main-finite}, hence readily solved by the CIVR method. For comparison, we implement the C-SAGA algorithm \cite{ZhangXiao2019C-SAGA} as a benchmark. As another benchmark, this problem can also be formulated as a two-layer composite finite-sum problem~\eqref{prob:Finite-2-Comp}, which was done in \citep{VRSC-PG} and \citep{SVR-SCGD}. We solve the two-layer formulation by ASC-PG \citep{ASC-PG-M.Wang} and VRSC-PG \citep{VRSC-PG}. Finally, we also implemented CIVR-adp, which is the adaptive sampling variant described in Theorem~\ref{theorem:cvg-finite-adaptive}. We test these algorithms on three real world portfolio datasets, which contain 30, 38 and 49 industrial portfolios respectively, from the Keneth R. French Data Library\footnote{http://mba.tuck.dartmouth.edu/pages/faculty/ken.french/data\_library.html}. For the three datasets, the daily data of the most recent 24452, 10000 and 24400 days are extracted respectively to conduct the experiments. We set the parameter $\lambda = 0.2$ in~\eqref{prob:risk-averse} and use an $\ell_1$ regularization $r(x) = 0.01\|x\|_1$. The experiment results are shown in Figure~\ref{fig:risk-averse}. The curves are averaged over 20 runs and are plotted against the number of samples of the component functions (the horizontal axis). Throughout the experiments, VRSC-PG and C-SAGA algorithms use the batch size $S = \lceil n^{2/3}\rceil$ while CIVR uses the batch size $S = \lceil \sqrt{n}\rceil$, all dictated by their complexity theory. CIVR-adp employs the adaptive batch size $S_t = \bigl\lceil\min\{\sqrt{10t + 1},\sqrt{n}\}\bigr\rceil$ for $t = 1,...,T$. For Industrial-30 dataset, all of VRSC-PG, C-SAGA, CIVR and CIVR-adp use the same step size $\eta = 0.1$. They are chosen from the set $\eta\in\{1, 0.1, 0.01, 0.001, 0.0001\}$ by experiments. And $\eta = 0.1$ works best for all four tested methods simultaneously. Similarly, $\eta = 0.001$ is chosen for the Industrial-38 dataset and $\eta = 0.0001$ is chosen for the Industrial-49 dataset. For ASC-PG, we set its step size parameters $\alpha_k = 0.001/k$ and $\beta_k = 1/k$ \citep[see details in][]{ASC-PG-M.Wang}. They are hand-tuned to ensure ASC-PG converges fast among a range of tested parameters. Overall, CIVR and CIVR-adp outperform other methods. \section{Fast convergence rates under stronger conditions} \label{sec:fast-rates} \vspace{-1ex} In this section we consider two cases where fast linear convergence can be guaranteed for CIVR. \vspace{-1ex} \subsection{Gradient-dominant function} The first case is when $r \equiv 0$ and $F$ is \emph{$\nu$-gradient dominant}, i.e., there is some $\nu>0$ such that \begin{equation} \label{defn:Grd-domi} F(x) - \inf_yF(y)\leq \frac{\nu}{2}\|F'(x)\|^2, \qquad \forall\, x\in\R^d. \end{equation} Note that a $\mu$-strongly convex function is $(1/\mu)$-gradient dominant by this definition. Hence strong convexity is a special case of the gradient dominant condition, which in turn is a special case of the Polyak-{\L}ojasiewicz condition with the {\L}ojasiewicz exponent equal to 2 \citep[see, e.g.,][]{KarimiNutiniSchmidt2016}. In order to solve~\eqref{prob:main} with a pre-fixed precision~$\epsilon$, we use a periodic restart strategy depicted below. \begin{theorem} \label{theorem:cvg-KL-general} Consider~\eqref{prob:main} with $r\equiv 0$. Suppose Assumptions~\ref{assumption:Lip} and~\ref{assumption:variance} hold and~$F$ is $\nu$-gradient dominant. Given any $\epsilon>0$, let $\tau_t = S_t = \bigl\lceil\frac{1}{\sqrt{\epsilon}}\bigr\rceil$, $B_t=\bigl\lceil \frac{12\nu\sigma_0^2}{\epsilon} \bigr \rceil$ and $T = \bigl\lceil\frac{16\nu\sqrt{\epsilon}}{\eta}\bigr\rceil$. Then as long as $\eta\leq\frac{4}{L_F + \sqrt{L_F^2 + 12G_0}}$, \vspace{-1ex} \begin{equation} \label{thm:cvg-KL-general-0} \E\bigl[F(\bar{x}) - F^*\bigr] \leq \frac{1}{2}\bigl(F(x_0^1) - F^*\bigr) + \frac{1}{2}\epsilon. \end{equation} Therefore, we can periodically restart Algorithm~\ref{alg:CIVR} after every~$T$ epochs (using the output of previous period as input to the new period), then $\E[F(\bar{x}) - F^*]$ converges linearly to $\epsilon$ with a factor of $\frac{1}{2}$ per period. As a result, the sample complexity for finding an $\epsilon$-solution is $\cO\bigl(\bigl(\nu\epsilon^{-1}\bigr)\ln \epsilon^{-1}\bigr)$. \end{theorem} The restart strategy also applies to the finite-sum case. \begin{theorem} \label{theorem:cvg-KL-finite} Consider problem~\eqref{prob:main-finite} with $r\equiv 0$. Suppose Assumption~\ref{assumption:Lip} hold and $F$ is $\nu$-gradient dominant. If we set $\tau_t = S_t = \sqrt{B_t} = \lceil\sqrt{n}\rceil$ and $T = \bigl\lceil\frac{16\nu}{\sqrt{n}\eta}\bigr\rceil$, then as long as $\eta\leq\frac{4}{L_F + \sqrt{L_F^2 + 12G_0}}$, \vspace{-1ex} \begin{equation} \label{thm:cvg-KL-finite-0} \E\bigl[F(\bar{x}) - F^*\bigr] \leq \frac{1}{2}\bigl(F(x_0^1) - F^*\bigr)\,. \end{equation} By periodically restart Algorithm~\ref{alg:CIVR} after every~$T$ epochs, $\E[F(\bar{x}) - F^*]$ converges linearly to $0$. As a result, the sample complexity for finding an $\epsilon$-solution is $\cO\bigl(\bigl(n+\frac{\nu\sqrt{n}}{\eta}\bigr)\ln\frac{1}{\epsilon}\bigr)$. \end{theorem} \subsection{Optimally strongly convex function} In this part, we assume a \emph{$\mu$-optimally strongly convex} condition on the function $\Phi(x)=F(x)+r(x)$, i.e., there exists a $\mu>0$ such that \vspace{-0.5ex} \be \label{defn:O-S-CVX} \Phi(x) - \Phi(x^*)\geq \frac{\mu}{2}\|x-x^*\|^2, \qquad \forall x\in\R^d . \ee We have the following two results for solving problems~\eqref{prob:main} and~\eqref{prob:main-finite} respectively. \begin{theorem} \label{theorem:cvg-O-S-CVX-general} Consider problem~\eqref{prob:main}. Suppose Assumptions~\ref{assumption:Lip} and~\ref{assumption:variance} hold and $\Phi$ is $\mu$-optimally strongly convex. We set $\tau_t = S_t = \bigl\lceil \frac{1}{\sqrt{\epsilon}} \bigr\rceil$, $B_t=\bigl\lceil \frac{9\sigma_0^2}{2\mu\epsilon} \bigr\rceil$ and $T = \lceil \frac{5\sqrt{\epsilon}}{\mu\eta} \rceil$. Then if we choose $\eta<\frac{2}{L_F + \sqrt{L_F^2 + 36G_0}}$, \vspace{-1ex} \begin{equation} \label{thm:cvg-O-S-CVX-general-0} \E\bigl[\Phi(\bar{x}) - \Phi^*\bigr] \leq \frac{1}{2}\bigl(\Phi(x_0^1) - \Phi^*\bigr) + \frac{1}{2}\epsilon. \end{equation} By periodically restart Algorithm~\ref{alg:CIVR} after every~$T$ epochs, $\E[\Phi(\bar{x}) - \Phi^*]$ converges linearly to $\epsilon$ As a result, the sample complexity for finding an $\epsilon$-solution is $\cO\bigl(\mu^{-1}\epsilon^{-1}\ln \epsilon^{-1}\bigr)$. \end{theorem} \begin{theorem} \label{theorem:cvg-O-S-CVX-finite} Consider the finite-sum problem~\eqref{prob:main-finite}. Suppose Assumption~\ref{assumption:Lip} hold and $\Phi$ is $\mu$-optimally strongly convex. We set $\tau_t = S_t = \sqrt{B_t} = \lceil\sqrt{n}\rceil$ and $T = \bigl \lceil \frac{5}{\sqrt{n}\mu\eta} \bigr\rceil$. If $\eta<\frac{2}{L_F + \sqrt{L_F^2 + 36G_0}}$, then \vspace{-1ex} \begin{equation} \label{thm:cvg-O-S-CVX-finite-0} \E\bigl[\Phi(\bar{x}) - \Phi^*\bigr] \leq \frac{1}{2}\bigl(\Phi(x_0^1) - \Phi^*\bigr). \end{equation} By periodically restart Algorithm~\ref{alg:CIVR} after every $T$ epochs, $\E[\Phi(\bar{x}) - \Phi^*]$ converges linearly to $0$ with rate $\frac{1}{2}$. Therefore, the sample complexity of finding an $\epsilon$-solution is $\cO\bigl(\bigl(n+\frac{\sqrt{n}}{\mu\eta}\bigr)\ln \frac{1}{\epsilon}\bigr)$. \end{theorem} If we define a condition number $\kappa=L_F/\mu$, then since $\eta=\Theta(1/L_F)$, we have $1/(\mu\eta)=O(\kappa)$ and the above complexities become $\cO\bigl(\bigl(\kappa\epsilon^{-1}\bigr)\ln\epsilon^{-1}\bigr)$ and $\cO\bigl(\bigl(n+\kappa n^{1/2}\bigr)\ln\epsilon^{-1}\bigr)$. \section{Introduction} \label{sec:intro} We consider stochastic composite optimization problems of the form \be \label{prob:main} \minimize_{x\in\R^d} \quad f\bigl(\E_\xi[g_\xi(x)] \bigr) + r(x) \, , \ee where $f:\R^p\to\R$ is a smooth and possibly nonconvex function, $\xi$ is a random variable, each $g_{\xi}:\R^d\to\R^p$ is a smooth vector mapping, and~$r$ is convex and lower-semicontinuous. A special case we will consider separately is when~$\xi$ is a discrete random variable with uniform distribution over $\{1,2,\ldots,n\}$. In this case the problem is equivalent to a deterministic optimization problem \be \label{prob:main-finite} \minimize_{x\in\R^d} \quad f\biggl(\frac{1}{n}\sum_{i=1}^n g_i(x)\biggr) + r(x) \, . \ee The formulations in~\eqref{prob:main} and~\eqref{prob:main-finite} cover a broader range of applications than classical stochastic optimization and empirical risk minimization (ERM) problems where each $g_\xi$ is a scalar function ($p=1$) and~$f$ is the scalar identity map. A well-known example is policy evaluation in reinforcement learning (RL) \citep[e.g.,][]{sutton1998reinforcement}. With linear value function approximation, it can be formulated as \[ \minimize_{x\in\R^d} \quad \bigl\|\E[A]x-\E[b] \bigr\|^2, \] where $A$ and $b$ are random matrix and vector generated by a Markov decision process (MDP) \citep[e.g.,][]{dann2014policy}. Here we have $f(\cdot)=\|\cdot\|^2$, $\xi=(A, b)$ and $g_\xi(x)=Ax-b$. Another interesting application is risk-averse optimization \citep[e.g.,][]{Rockafellar2007CoherentRisk,Ruszczynski2013risk-averse}, which has many applications in RL and financial mathematics. We consider a general formulation of mean-variance trade-off: \begin{equation}\label{prob:risk-averse} \maximize_{x\in\R^d}~~ \left\{\, \E\bigl[h_\xi(x)\bigr]-\lambda\Var\bigl(h_\xi(x)\bigr) ~\equiv~ \E\bigl[h_\xi(x)\bigr] - \lambda \Bigl(\E\bigl[h_\xi^2(x)\bigr] - \E\bigl[h_\xi(x)\bigr]^2\Bigr) \right\}, \end{equation} where each $h_\xi(x):\R^d\to\R$ is a reward function (such as total portfolio return). The goal of problem~\eqref{prob:risk-averse} is to maximize the average reward with a penalty on the variance which captures the potential risk. It can be cast in the form of~\eqref{prob:main} by using the mappings \begin{equation}\label{eqn:mean-var-mapping} g_\xi(x):\R^d\to\R^2= \bigl[ h_\xi(x)~~ h^2_\xi(x) \bigr]^T , \qquad f(y,z):\R^2\to\R = -y + \lambda y^2 - \lambda z \, . \end{equation} Here, the intermediate dimension is very low, i.e., $p=2$. This leads to very little overhead in computation compared with stochastic optimization without composition. Besides these applications, the composition structure in~\eqref{prob:main} and~\eqref{prob:main-finite} are of independent interest for research on stochastic and randomized algorithms. For the ease of notation, we define \begin{equation}\label{eqn:simple-notation} g(x) := \E_\xi[g_\xi(x)], \qquad F(x) := f(g(x)), \qquad \Phi(x) := F(x) + r(x). \end{equation} In addition, let $f'$ and~$F'$ denote the gradients of~$f$ and~$F$ respectively, and $g'_\xi(x)\in\R^{p\times d}$ denote the Jacobian matrix of~$g_\xi$ at~$x$. Then we have \vspace{-1ex} \[ F'(x) = \nabla \Bigl( f\bigl(\E_\xi[g_\xi(x)]\bigr)\Bigr) = \Bigl(\E_\xi[g'_\xi(x)]\Bigr)^T f'\bigl(\E_\xi[g_\xi(x)]\bigr) \,. \] In practice, computing $F'(x)$ exactly can be very costly if not impossible. A common strategy is to use stochastic approximation: we randomly sample a subset $\cS$ of~$\xi$ from its distribution and let \begin{equation}\label{eqn:gg-approx} \tilde{g}(x) = \frac{1}{|\cS|}\sum_{\xi\in\cS}g_\xi(x), \qquad \tilde{g'}(x) = \frac{1}{|\cS|}\sum_{\xi\in\cS}g'_\xi(x). \end{equation} However, $\left(\tilde{g'}(x)\right)^T\!f(\tilde{g}(x))$ is always a \emph{biased} estimate of $F'(x)$ unless one can replace $\tilde{g}(x)$ with the full expectation $\E_\xi[g_\xi(x)]$. This is in great contrast to the classical stochastic optimization problem \begin{equation}\label{prob:exp-non-composite} \minimize_{x\in\R^d} \quad \E_\xi\bigl[g_\xi(x)\bigr] + r(x) \, , \end{equation} where $\tilde{g'}(x)$ in~\eqref{eqn:gg-approx} is always an unbiased gradient estimator for the smooth part $g(x)=\E_\xi\bigl[g_\xi(x)\bigr]$. Using biased gradient estimators can cause various difficulties for constructing and analyzing randomized algorithms, but is often inevitable in dealing with more complex objective functions other than the empirical risk \citep[see, e.g.,][]{Pratik,Smoothing-1,Smoothing-2,Smoothing-3}. As a simplest model, the analysis of randomized algorithms for~\eqref{prob:main} may provide insights for solving more challenging problems. In this paper, we develop an efficient stochastic composite gradient method called CIVR (Composite Incremental Variance Reduction), for solving problems of the forms~\eqref{prob:main} and~\eqref{prob:main-finite}. We measure efficiency by the sample complexity of the individual functions $g_\xi$ and their Jacobian $g'_\xi$, i.e., the total number of times they need to be evaluated at some point, in order to find an $\epsilon$-approximate solution. For nonconvex functions, an $\epsilon$-approximate solution is some random output of the algorithm $\bar{x}\in\R^d$ that satisfies $\E[\|\cG(\bar{x})\|^2]\leq\epsilon$, where $\cG(\bar{x})$ is the \emph{proximal gradient mapping} of the objective function~$\Phi$ at~$\bar{x}$ (see details in Section~\ref{sec:algm}). If $r\equiv 0$, then $\cG(\bar{x})=F'(\bar{x})$ and the criteria for $\epsilon$-approximation becomes $\E[\|F'(\bar{x})\|^2]\leq\epsilon$. If the objective~$\Phi$ is convex, we require $\E[\Phi(\bar{x})-\Phi^\star]\leq\epsilon$ where $\Phi^\star=\inf_{x}\Phi(x)$. For smooth \emph{and} convex functions, these two notions are compatible, meaning that the dependence of the sample complexity on~$\epsilon$ in terms of both notions are of the same order. \begin{table}[t] \caption{Sample complexities of CIVR (Composite Incremental Variance Reduction)} \label{tab:complexities} \centering \begin{tabular}{cccc} \toprule & \multicolumn{3}{c}{Assumptions (common: $f$ and $g_\xi$ Lipschitz and smooth, thus $F$ smooth)} \\ \cmidrule(l){2-4} Problem & $F$ nonconvex & $F$ $\nu$-gradient dominant & $F$ convex, $r$ convex \\ & $r$ convex & $r\equiv 0$ & $\Phi$ $\mu$-optimally strongly convex \\ \midrule \eqref{prob:main} & $\cO\bigl(\epsilon^{-3/2}\bigr)$ & $\cO\left(\bigl(\nu\epsilon^{-1}\bigr)\log\epsilon^{-1}\right)$ & $\cO\left(\bigl(\mu^{-1}\epsilon^{-1}\bigr)\log\epsilon^{-1}\right)$ \\[1ex] \eqref{prob:main-finite} & $\cO\bigl(\min\{\epsilon^{-3/2},\,n^{1/2}\epsilon^{-1}\}\bigr)$ & $\cO\left(\bigl(n+\nu n^{1/2}\bigr)\log\epsilon^{-1}\right)$ & $\cO\left(\bigl(n+\mu^{-1} n^{1/2}\bigr)\log\epsilon^{-1}\right)$ \\ \bottomrule \end{tabular} \end{table} Table~\ref{tab:complexities} summarizes the sample complexities of the CIVR method under different assumptions obtained in this paper. We can define a condition number $\kappa=\cO(\nu)$ for $\nu$-gradient dominant functions and $\kappa=\cO(1/\mu)$ for $\mu$-optimally strongly convex functions, then the complexities become $\cO\bigl(\bigl(\kappa\epsilon^{-1}\bigr)\log\epsilon^{-1}\bigr)$ and $\cO\bigl(\bigl(n+\kappa n^{1/2}\bigr)\log\epsilon^{-1}\bigr)$ for~\eqref{prob:main} and~\eqref{prob:main-finite} respectively. In order to better position our contributions, we next discuss related work and then putting these results into context. \subsection{Related Work} We first discuss the nonconvex stochastic optimization problem~\eqref{prob:exp-non-composite}, which is a special cases of~\eqref{prob:main}. When $r\!\equiv\! 0$ and $g(x)\!=\!\E_\xi[g_\xi(x)]$ is smooth, \citet{GhadimiLan2013} developed a randomized stochastic gradient method with iteration complexity $\cO(\epsilon^{-2})$. \citet{Natasha2NIPS2018} obtained $\cO\bigl(\epsilon^{-1.625}\bigr)$ with additional second-order guarantee. There are also many recent works on solving its finite-sum version \begin{equation}\label{prob:erm-finite-sum} \minimize_{x\in\R^d} \quad \frac{1}{n}\sum_{i=1}^n g_i(x) + r(x), \end{equation} which is a special case of~\eqref{prob:main-finite}. By extending the variance reduction techniques SVRG \citep{johnson2013accelerating,xiaozhang2014proxsvrg} and SAGA \citep{defazio2014saga} to nonconvex optimization, \citet{Allen-ZhuHazan2016} and \citet{Reddi2016SVRGnonconvex,NCVX-SAGA-Smooth,NCVX-SAGA-Nonsmooth} developed randomized algorithms with sample complexity $\cO(n+n^{2/3}\epsilon^{-1})$. Under additional assumptions of gradient dominance or strong convexity, they obtained sample complexity $\cO((n+\kappa n^{2/3})\log\epsilon^{-1})$, where $\kappa$ is a suitable condition number. \citet{Natasha2017ICML} and \citet{LeiJuChenJordan2017} obtained $\cO\bigl(\min\{\epsilon^{-5/3},\,n^{2/3}\epsilon^{-1}\}\bigr)$. Based on a new variance reduction technique called SARAH \citep{SARAH2017ICML}, \citet{SmoothSARAH2019} and \citet{ProxSARAH2019} developed nonconvex extensions to obtain sample complexities $\cO\bigl(\epsilon^{-3/2}\bigr)$ and $\cO\bigl(n+n^{1/2}\epsilon^{-1}\bigr)$ for solving the expectation and finite-sum cases respectively. \citet{SPIDER2018NeurIPS} introduced another variance reduction technique called \textsc{Spider}, which can be viewed as a more general variant of SARAH. They obtained sample complexities $\cO\bigl(\epsilon^{-3/2}\bigr)$ and $\cO\bigl(\min\{\epsilon^{-3/2},\,n^{1/2}\epsilon^{-1}\}\bigr)$ for the two cases respectively, but require small step sizes that are proportional to~$\epsilon$. \citet{SpiderBoost2018} extended \textsc{Spider} to obtain the same complexities with constant step sizes and $\cO\bigl((n+\kappa^2)\log\epsilon^{-1}\bigr)$ under the gradient-dominant condition. In addition, \citet{NestedSVRG2018NeurIPS} obtained similar results using a nested SVRG approach. In addition to the above works on solving special cases of~\eqref{prob:main} and~\eqref{prob:main-finite}, there are also considerable recent works on a more general, two-layer stochastic composite optimization problem \begin{equation}\label{prob:Exp-2-comp} \minimize_{x\in\R^d}\quad \E_\nu\bigl[f_\nu\left(\E_\xi[g_\xi(x)]\right)\bigr] + r(x) \, , \end{equation} where $f_\nu$ is parametrized by another random variables~$\nu$, which is independent of~$\xi$. When $r\equiv 0$, \citet{SCGD-M.Wang} derived algorithms to find an $\epsilon$-approximate solution with sample complexities $\cO(\epsilon^{-4})$, $\cO(\epsilon^{-3.5})$ and $\cO(\epsilon^{-1.25})$ for the smooth nonconvex case, smooth convex case and smooth strongly convex case respectively. For nontrivial convex~$r$, \citet{ASC-PG-M.Wang} obtained improved sample complexity of $\cO(\epsilon^{-2.25})$, $\cO(\epsilon^{-2})$ and $\cO(\epsilon^{-1})$ for the three cases mentioned above respectively. As a special case of~\eqref{prob:Exp-2-comp}, the following finite-sum problem also received significant attention: \begin{equation}\label{prob:Finite-2-Comp} \minimize_{x\in\R^d}\quad \frac{1}{m}\sum_{j=1}^m f_j\biggl(\frac{1}{n}\sum_{i=1}^n g_i(x)\biggr)+r(x)\,. \end{equation} When $r\equiv 0$ and the overall objective function is strongly convex, \citet{SVR-SCGD} derived two algorithms based on the SVRG scheme to attain sample complexities $\cO((m+ n + \kappa^3)\log\epsilon^{-1}))$ and $\cO((m+ n + \kappa^4)\log\epsilon^{-1}))$ respectively, where~$\kappa$ is some suitably defined condition number. \citet{VRSC-PG} also used the SVRG scheme to obtain an $\cO(m+n+(m+n)^{2/3}\epsilon^{-1})$ complexity for the smooth nonconvex case and $\cO((m+ n + \kappa^3)\log\epsilon^{-1}))$ for strongly convex problems with nonsmooth~$r$. More recently, \citet{ZhangXiao2019C-SAGA} proposed a composite randomized incremental gradient method based on the SAGA estimator \cite{defazio2014saga}, which matches the best known $\cO(m+n+(m+n)^{2/3}\epsilon^{-1})$ complexity when~$F$ is smooth and nonconvex, and obtained an improved complexity $\cO\bigl((m+n+\kappa(m+n)^{2/3})\log\epsilon^{-1}\bigr)$ under either gradient dominant or strongly convex assumptions. When applied to the special cases~\eqref{prob:main} and~\eqref{prob:main-finite} we focus on in this paper ($m=1$), these results are strictly worse than ours in Table~\ref{tab:complexities}. \subsection{Contributions and Outline} We develop the CIVR method by extending the variance reduction technique of SARAH \citep{SARAH2017ICML,SmoothSARAH2019,ProxSARAH2019} and \textsc{Spider} \citep{SPIDER2018NeurIPS,SpiderBoost2018} to solve the composite optimization problems~\eqref{prob:main} and~\eqref{prob:main-finite}. The complexities of CIVR in Table~\ref{tab:complexities} match the best results for solving the non-composite problems~\eqref{prob:exp-non-composite} and~\eqref{prob:erm-finite-sum}, despite the additional outer composition and the composite-gradient estimator always being biased. In addition: \begin{itemize} \item It is shown in \citep{SPIDER2018NeurIPS} that the $\cO\bigl(\min\{\epsilon^{-3/2},\,n^{1/2}\epsilon^{-1}\}\bigr)$ complexity is nearly optimal for the non-composite finite-sum optimization problem~\eqref{prob:erm-finite-sum}. Therefore, we do not expect algorithms with better complexity for solving the more general composite finite-sum problem~\eqref{prob:main-finite}. \item Under the assumptions of gradient dominance or strong convexity, the $\cO\bigl(\bigl(n\!+\!\kappa n^{1/2}\bigr)\log\epsilon^{-1}\bigr)$ complexity only appeared for the special case~\eqref{prob:erm-finite-sum} in the recent work~\citep{LiLi2018NeurIPS}. \end{itemize} Our results indicate that the additional smooth composition in~\eqref{prob:main} and~\eqref{prob:main-finite} does not incur higher complexity compared with~\eqref{prob:exp-non-composite} and~\eqref{prob:erm-finite-sum}, despite the difficulty of dealing with biased estimators. We believe these results can also be extended to the two-layer problems~\eqref{prob:Exp-2-comp} and~\eqref{prob:Finite-2-Comp}, by replacing~$n$ with $m+n$ in Table~\ref{tab:complexities}. But the extensions require quite different techniques and we will address them in a separate paper. The rest of this paper is organized as follows. In Section~\ref{sec:algm}, we introduce the CIVR method. In Section~\ref{sec:analysis}, we present convergence results of CIVR for solving the composite optimization problems~\eqref{prob:main} and~\eqref{prob:main-finite} and the required parameter settings. Better complexities of CIVR under the gradient-dominant and optimally strongly convex conditions are given in Section~\ref{sec:fast-rates}. In Section~\ref{sec:experiments}, we present numerical experiments for solving a risk-averse portfolio optimization problem~\eqref{prob:risk-averse} on real-world datasets. \section{The composite incremental variance reduction (CIVR) method} \label{sec:algm} \SetAlgoHangIndent{1.5em} \setlength{\algomargin}{1em} \begin{algorithm2e}[t] \DontPrintSemicolon \caption{Composite Incremental Variance Reduction (CIVR)} \label{alg:CIVR \textbf{input:} initial point $x^1_0$, step size $\eta>0$, number of epochs $T\geq1$, and a set of triples $\{\tau_t, B_t, S_t\}$ for $t=1,\ldots,T$, where $\tau_t$ is the epoch length and $B_t$ and $S_t$ are sample sizes in epoch~$t$. \; \For{$t = 1,...,T$}{ Sample a set $\cB_t$ with size $B_t$ from the distribution of $\xi$, and construct the estimates \\ \vspace{-0.5ex} \begin{equation} \label{defn:sarah-1} y_0^t = \frac{1}{B_t}\sum_{\xi\in\cB_t}g_\xi(x_0^t), \qquad z_0^t = \frac{1}{B_t}\sum_{\xi\in\cB_t}g_\xi'(x_0^t), \qquad \end{equation} Compute $\tnf(x_0^t) = (z_0^t)^Tf'(y_0^t)$ and update: $x_1^t = \prox_r^{\eta}\bigl(x_0^t-\eta \tnf(x_0^t)\bigr)$. \; \vspace{0.5ex} \For{$i = 1,...,\tau_t-1$}{ Sample a set $\cS_i^t$ with size $S_t$ from the distribution of $\xi$, and construct the estimates \\[-2ex] \begin{eqnarray} \label{defn:sarah-2} y_i^t &=& y_{i-1}^t+ \frac{1}{S_t}\sum_{\xi\in\cS_i^t}\left(g_\xi(x_i^t)-g_\xi(x_{i-1}^t)\right), \\[-1ex] z_i^t &=& z_{i-1}^t \, +\, \frac{1}{S_t}\sum_{\xi\in\cS_i^t}\bigl(g'_\xi(x_i^t)-g'_\xi(x_{i-1}^t)\bigr). \end{eqnarray} Compute $\tnf(x_i^t) = (z_i^t)^Tf'(y_i^t)$ and update: $x_{i+1}^t = \prox_r^{\eta}\bigl(x_i^t-\eta \tnf(x_i^t)\bigr)$. \; } Set $x_0^{t+1} = x_{\tau_t}^t$. \; } \vspace{-1ex} \textbf{output:} $\bar{x}$ randomly chosen from $\bigl\{x_i^t\bigr\}_{i=0,...,\tau_t-1}^{t = 1,...,T}$. \; \end{algorithm2e} With the notations in~\eqref{eqn:simple-notation}, we can write the composite stochastic optimization problem~\eqref{prob:main} as \begin{equation}\label{eqn:min-smooth-plus-simple} \minimize_{x\in\R^d}\quad \bigl\{ \Phi(x) = F(x) + r(x) \bigr\} \,, \end{equation} where $F$ is smooth and $r$ is convex. The proximal operator of~$r$ with parameter~$\eta$ is defined as \be \label{defn:prox-operator} \prox^{\eta}_r(x):=\argmin_y \,\Bigl\{r(y) + \frac{1}{2\eta}\|y-x\|^2\Bigr\}. \ee We assume that~$r$ is relatively simple, meaning that its proximal operator has a closed-form solution or can be computed efficiently. The proximal gradient method \citep[e.g.,][]{Nesterov2013composite,Beck2017book} for solving problem~\eqref{eqn:min-smooth-plus-simple} is \begin{equation}\label{eqn:prox-grad-method} x^{t+1} = \prox_r^\eta\bigl(x^t-\eta F'(x^t)\bigr) \,, \end{equation} where $\eta$ is the step size. The \emph{proximal gradient mapping} of $\Phi$ is defined as \be \label{defn:ProxGD} \mathcal{G}_\eta(x) \triangleq \frac{1}{\eta}\Bigl(x - \prox^{\eta}_r\bigl(x-\eta F'(x)\bigr)\Bigr). \ee As a result, the proximal gradient method~\eqref{eqn:prox-grad-method} can be written as $x^{t+1} = x^{t} - \eta\, \mathcal{G}(x^t)$. Notice that when $r\equiv 0$, $\prox_r^\eta(\cdot)$ becomes the identity mapping and we have $\mathcal{G}_\eta(x)\equiv F'(x)$ for any $\eta>0$. Suppose $\bar x$ is generated by a randomized algorithm. We call $\bar x$ an $\epsilon$-stationary point in expectation if \begin{equation}\label{eqn:eps-stationary} \E\bigl[\|\mathcal{G}_\eta(\bar x)\|^2\bigr] \leq \epsilon. \end{equation} (We assume that $\eta$ is a constant that does not depend on~$\epsilon$.) As we mentioned in the introduction, we measure the efficiency of an algorithm by its sample complexity of $g_\xi$ and their Jacobian $g'_\xi$, i.e., the total number of times they need to be evaluated, in order to find a point~$\bar x$ that satisfies~\eqref{eqn:eps-stationary}. Our goal is to develop a randomized algorithm that has low sample complexity. We present in Algorithm~\ref{alg:CIVR} the Composite Incremental Variance Reduction (CIVR) method. This methods employs a two time-scale variance-reduced estimator for both the inner function value of $g(\cdot)=\E_\xi[g_\xi(\cdot)]$ and its Jacobian $g'(\cdot)$. At the beginning of each outer iteration~$t$ (each called an epoch), we construct a relatively accurate estimate $y_0^t$ for $g(x_0^t)$ and $z_0^t$ for $g'(x_0^t)$ respectively, using a relatively large sample size $B_t$. During each inner iteration~$i$ of the $t$th epoch, we construct an estimate $y_i^t$ for $g(x_i^t)$ and $z_i^t$ for $g'(x_i^t)$ respectively, using a smaller sample size $S_t$ \emph{and} incremental corrections from the previous iterations. Note that the epoch length $\tau_t$ and the sample sizes $B_t$ and $S_t$ are all adjustable for each epoch~$t$. Therefore, besides setting a constant set of parameters, we can also adjust them gradually in order to obtain better theoretical properties and practical performance. This variance-reduction technique was first proposed as part of SARAH \cite{SARAH2017ICML} where it is called \emph{recursive} variance reduction. It was also proposed in \citep{SPIDER2018NeurIPS} in the form of a \emph{Stochastic Path-Integrated Differential EstimatoR} (\textsc{Spider}). Here we simply call it \emph{incremental} variance reduction. A distinct feature of this incremental estimator is that the inner-loop estimates $y_i^t$ and $z_i^t$ are biased, i.e., \begin{equation}\label{eqn:biased-estimate} \begin{cases} ~\E[y_i^t|x_i^t] = g(x_i^t) - g(x_{i-1}^t) + y_{i-1}^t \neq g(x_i^t)\,, \\ ~\E[z_i^t|x_i^t] = g'(x_i^t) - g'(x_{i-1}^t) + z_{i-1}^t \neq g'(x_i^t)\,. \end{cases} \end{equation} This is in contrast to two other popular variance-reduction techniques, SVRG \citep{johnson2013accelerating} and SAGA \citep{defazio2014saga}, whose gradient estimators are always unbiased. Note that unbiased estimators for $g(x_i^t)$ and $g'(x_i^t)$ are not essential here, because the composite estimator $\tilde{\nabla}F(x_i^t)=(z_i^t)^T f'(y_i^t)$ is always biased.
\section{Introduction} M81, by virtue of its proximity, 3.6 Mpc \citep{Freedman2001a}, hosts the brightest and best resolved (17.5 pc arcsec$^{-1}$) active nucleus, albeit a very low luminosity one \citep{Petre1993a}. Classified as both Seyfert 1 \citep{Peimbert1981} and Liner \citep{Heckman1980}, the activity manifests as a broad-line region (BLR) centred in an extended region of shocked-ionized gas. Broad emission lines appearing in visible and UV spectra were first described by \citet{Peimbert1981} and \citet{Bruzual1982}. They reasoned that the anomalous H${\alpha}$/H${\beta}$ ratio was the result of photoionization in clouds of high density, ${\sim}$10$^9$ cm$^{-3}$, and consequently, that the BLR in M81 must be very small, ${\le}$ 10$^{-2}$ pc in radius. These ideas were reinforced by \citet{Filippenko1988} and \citet{Ho1996} who estimated a BLR size yet a further order of magnitude smaller. Significantly, neither the broad Balmer emission lines, nor the adjacent continuum are time variable precluding an estimate of the BLR size using reverberation mapping \citep{Peterson2004, Kaspi2005}. Nevertheless, should M81 conform to the BLR size-luminosity relationship established for more luminous reverberating Seyferts, the extraordinarily low luminosity measured for the Seyfert nucleus in M81, corresponding to 1.8 ${\times}$ 10$^{40}$ erg s$^{-1}$ at 5100 \AA, would imply that the BLR should be an order of magnitude smaller still, an implausible 10$^{-4}$ pc in radius, equivalent to about one-tenth of a light-day, comparable to the distance between the Sun and Uranus. This would cause the H${\alpha}$ line width to be far broader than is actually observed, as noted previously by \citet{Laor2003}, indicating that M81 does not, in fact, conform to the BLR size-luminosity correlation established for reverberating AGN. \begin{figure*} \includegraphics[width=\textwidth]{Fig1.pdf} \caption{Visual and UV spectra of M81 as seen through the following gratings: {\sl Top left panel}: G140L. {\sl Top right panel}: G230L. {\sl Lower left panel}: G430L. {\sl Lower right panel}: G750M. The ordinate measures flux in units of erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ whereas the abscissa is in units of {\AA}. } \label{fig:example_figure} \end{figure*} \begin{table*} \centering \caption{M81 STIS Datasets} \begin{tabular}{lccccl} \hline Grating & Spectral Range & Dispersion & Plate Scale & Integration Time & Datasets \\ & \AA & \AA/pix & \arcsec/pix & sec & \\ \hline G750M & 6295-6867 & 0.56 & 0.05078 & 475 ${\times}$ 5 & odk803010 - odk803050 \\ G430L & 2900-5700 & 2.73 & 0.05078 & 368 ${\times}$ 5 & odk803060 - odk803090, odk8030A0 \\ G230L & 1570-3180 & 1.58 & 0.025 & 1035 ${\times}$ 3 & odk802040 - odk802060 \\ G140L & 1150-1730 & 0.6 & 0.0246 & 838 ${\times}$ 6 & odk801010-odk801030, odk802010 - odk802030 \\ G140L & 1150-1730 & 0.6 & 0.0246 &1066 ${\times}$ 6 & odk801040-odk801090 \\ \hline \end{tabular} \end{table*} M81 was one of the first galaxies targeted with the {\it Hubble Space Telescope} ({\it HST}) to yield a black hole (BH) mass, M$_{\bullet}$, using spatially resolved gas kinematics. Those observations suggest M$_{\bullet}$ = 7 ${^{+2}_{-1}}$ ${\times}$ 10$^{7}$ M${_{\sun}}$ \citep{Devereux2003}. Knowing the BH mass provides a way to estimate the size of the BLR by modelling the shape of the H${\alpha}$ emission line. The broad and bright H${\alpha}$ emission line has been observed with unprecedented spectral and spatial resolution using the Space Telescope Imaging Spectrograph (STIS) aboard {\it HST} and modelling the line shape yielded an outer radius for the BLR of ${\sim}$ 1 pc \citep{Devereux2007} independent of whether the BLR gas is distributed in an inclined geometrically thin Keplerian disc or moving radially at the escape velocity. Consequently, M81 occupies a very unusual location in the BLR size-luminosity diagram by virtue of having a disproportionately large BLR for an such an extremely low luminosity active nucleus \citep{Devereux2015}. Such a large size for the BLR could be possible if the gas producing the broad Balmer lines is actually of much lower density than previously believed permitting the central UV--X-ray source to photoionize a single, large H${^+}$ region, rather like that observed around massive stars, planetary nebulae and supernova remnants. Motivation is provided by \cite{Heckman1980} who noted that the [O\,{\sc iii}] line emission is seemingly independent of both the [O\,{\sc i}] and [O\,{\sc ii}] in Liners and Seyferts as if the [O\,{\sc iii}] line emission arises as a separate entity, distinct from the narrow-line region. A low density H${^+}$ region would, of course, be associated with a much higher ionization parameter than envisaged for high density broad-line clouds. Such an H${^+}$ region may even reconcile the emission lines seen in X-rays \citep{Page2003,Young2007} with the same ionized gas seen in UV and visible spectra \citep{Peimbert1981, Bruzual1982, Filippenko1988, Reichert1992, Ho1996}. Ambiguity surrounding the impact of reddening on the broad Balmer emission lines in M81 and the additional uncertainty associated with interpolating the unobservable H ionizing continuum between the UV and X-rays have led to sizable discrepancies between the number of ionizing photons expected to be produced by the central UV--X-ray source and the number required to excite the broad Balmer emission lines \citep{Bruzual1982, Ho1996, Devereux2007}. However, the matter is worth revisiting because \cite{Nemmen2014} have computed the intrinsic ionizing continuum expected for the advection dominated accretion flow (ADAF) that is believed to be at the heart of the Seyfert 1 nucleus in M81. Furthermore, the emergent spectrum has been defined from the visible to the UV with unprecedented spatial resolution as a result of a recent spectroscopic program executed with {\it HST}. Thus, it is timely to re-examine the enigma that M81 presents. To this end, the new Space Telescope Imaging Spectrograph (STIS) observations are described in Section 2. A comparison of emission line measurements with the expectations of various photoionization models are described in Section 3 followed by a discussion and conclusions in Sections 4 and 5, respectively. \section{Observations} Spectroscopic observations of the nucleus of M81 were acquired with STIS aboard {\it HST} at the end of December 2017 during Cycle 25. Spectra were obtained using the 52 arcsec ${\times}$ 0.2 arcsec slit oriented at a position angle of 32{\degr} that is aligned neither with the radio-jet axis \citep{Bietenholz1996, Bietenholz2000} nor the kinematic line of nodes \citep{Devereux2003}. M81 was centred on the aperture using an on-board target acquisition peakup in the F28X50LP visible long-pass filter. The present manuscript will address the subset of PID 15123 observations, summarized in Table 1, that span the visible to the UV at the highest spectral resolution. Several exposures were obtained with each grating. Consecutive exposures were dithered-along-the-slit in multiples of 0.1\arcsec. Since the Space Telescope Science Data Analysis System (STSDAS) routine {\bf sshift} used to align dithered spectral images employs only integer pixel shifts, the shifted images are slightly misaligned by about one tenth of a pixel. The shifted CCD images were median combined, separately for each grating, using the STSDAS routine {\bf ocrreject} which effectively removed cosmic rays. Similarly, the aligned MAMA images were median combined, separately for each grating, using the STSDAS routine {\bf mscombine}. The G140L spectra are unique in that they were obtained using two different integration times. Those images were weighted by exposure time yielding an average 952 s per exposure. Calibrated spectra were extracted from the median combined images, separately for each grating, using the STSDAS routine {\bf x1d} employing a 7 pixel extraction width which includes ${\ge}$ 80\% of the encircled energy for an unresolved point source \citep{Proffitt2010}. Since the width of the slit is 0.2 arcsec the spectra presented in Figure 1 represent an integration over a 0.2 arcsec ${\times}$ 0.35 arcsec box for G750M and G430L with a smaller 0.2 arcsec ${\times}$ 0.175 arcsec box for G230L and G140L. The bright nucleus of M81 is unresolved in the visible and UV with an upper limit on the physical diameter of 0.7 pc for the continuum source \citep{Devereux1997a}. \section{Results} \begin{figure} \includegraphics[width=\columnwidth]{Fig2.pdf} \caption{ Broad H${\alpha}$ emission line in M81. {\sl Top panel}: The observed spectrum is shown in black and a model for the narrow lines and the underlying continuum is shown in red. {\sl Lower panel}: The broad H${\alpha}$ emission line profile after the narrow lines have been subtracted. Dashed vertical red lines identify the central wavelengths of the subtracted lines. } \label{fig:example_figure} \end{figure} \subsection{Measurement of Emission Lines} The central wavelength, flux and full width at half-maximum (FWHM) was measured for the brightest and the least blended of the emission lines, identified in Figure 1, using the STSDAS contributed task {\bf specfit}. Results are listed in Table 2 together with their one sigma measurement uncertainties. The broad H${\alpha}$, and superimposed narrower {[}\ion{N}{ii}{]} emission lines, are illustrated in Figure 2. That the {[}\ion{N}{ii}{]} vacuum wavelength 6549.85 {\AA} and 6585.28 {\AA} emission lines can be clearly seen facilitates their subtraction. Atomic physics sets the wavelength of the fainter {[}\ion{N}{ii}{]} line relative to the brighter one, and constrains the flux to be 1/3 that of the brighter one, and requires that they share the same width. A narrow component of the vacuum wavelength 6564.61 {\AA} H${\alpha}$ emission line can also be seen (Figure 2) and was modelled using the same profile shape as employed for the {[}\ion{N}{ii}{]} emission lines, and scaled so as to not over-subtract the broad component. The velocity measured for the narrow line, -30 ${\pm}$ 11 km/s, is computed using the non-relativistic Doppler equation employing the wavelength difference; observed minus vacuum. The three emission lines H${\beta}$, ${[}\ion{O}{iii}{]}$${\lambda}$${\lambda}$5008, 4960 are well resolved as illustrated in Figure 3. Encouragingly, the reddening insensitive ratio ${[}\ion{O}{iii}{]}$${\lambda}$$5008/{[}\ion{O}{iii}{]}$${\lambda}$4960 = 2.96 ${\pm}$ 0.57 agrees with the theoretical value \citep{Dimitrijevic2007}, albeit with a large measurement uncertainty. Although the narrow component of the H${\beta}$ line can not be uniquely identified in Figure 3, one is presumably present. Consequently, a model was employed using the same shape and velocity as the narrow H${\alpha}$ line, and scaled so as to not over-subtract the broad H${\beta}$ line. The same procedure was adopted to obtain the flux associated with the narrow component of the H${\gamma}$ line. Ratios involving the narrow components of the Balmer lines determined this way are very similar to the corresponding ratios of the respective broad-line components. An alternative scheme whereby the narrow components of H${\beta}$ and H${\gamma}$ are scaled relative to the narrow H${\alpha}$ line in proportion to the ratio expected for a dust-free photoionized gas \citep{Osterbrock1989} results in a very obvious over-subtraction of their respective broad lines, and was therefore not adopted. \begin{table*} \centering \caption{Emission Line Parameters } \begin{threeparttable} \begin{tabular}{|p{2cm}|p{2cm}|p{3cm}|p{2cm}|p{2cm}|} \hline Ion & Wavelength\tnote{\it a,b} & Flux\tnote{\it b} & FWHM\tnote{\it b} & V$_{cen}$\tnote{\it b} \\ & \AA & 10$^{-14}$ erg cm$^{-2}$ s$^{-1}$ & km s$^{-1}$ & km s$^{-1}$ \\ \hline {[}\ion{S}{ii}{]} & 6732.9 ${\pm}$ 0.1 & 6.6 ${\pm}$ 0.4 & 369 ${\pm}$ 26 & 10 ${\pm}$ 2 \\ {[}\ion{S}{ii}{]} & 6718.5 ${\pm}$ 0.2 & 4.0 ${\pm}$ 0.1 & 354 ${\pm}$ 29 & 9 ${\pm}$ 8 \\ {[}\ion{N}{ii}{]} & 6584.9 ${\pm}$ 0.3 & 10.0 ${\pm}$ 0.3 & 300 ${\pm}$ 20 & 20 ${\pm}$ 14 \\ H${\alpha}$ (broad) & 6571 ${\pm}$ 6 & 108 ${\pm}$ 3 & 2185 ${\pm}$ 25 & 192 \\ H${\alpha}$ (narrow) & 6564.0 ${\pm}$ 0.2 & 6.3 ${\pm}$ 0.2 & 300 & -30 ${\pm}$ 11 \\ {[}\ion{N}{ii}{]} & 6549.4 ${\pm}$ 0.7 & 3.3 ${\pm}$ 1.0 & 300 & 33 \\ {[}\ion{O}{i}{]} & 6365.5 ${\pm}$ 0.1 & 5.3 ${\pm}$ 0.2 & 619 ${\pm}$ 10 & -2 ${\pm}$ 4 \\ {[}\ion{O}{iii}{]}\tnote{\it c} & 5011.1 ${\pm}$ 0.4 & 19.3 ${\pm}$ 2.3 & 530 ${\pm}$ 11 & 174 ${\pm}$ 24 \\ {[}\ion{O}{iii}{]}\tnote{\it c} & 4961 ${\pm}$ 1 & 6.5 ${\pm}$ 1 & 596 ${\pm}$ 49 & 66 ${\pm}$ 21 \\ H${\beta}$ (broad) & 4866 ${\pm}$ 3 & 19.1 ${\pm}$ 0.5 & 1350 ${\pm}$ 140 & 208 \\ H${\beta}$ (narrow) & 4863 & 0.8 & 300 & -30 \\ {[}\ion{O}{iii}{]} & 4366 ${\pm}$ 3 & 2.8 ${\pm}$ 1.1 & 1261 ${\pm}$ 763 & 115 ${\pm}$ 371 \\ H${\gamma}$ (broad) & 4345 ${\pm}$ 4 & 5.8 ${\pm}$ 1.1 & 1328 ${\pm}$ 140 & 208 \\ H${\gamma}$ (narrow) & 4342 & 0.3 & 300 & -30 \\ H${\delta}$ (broad) & 4103 ${\pm}$ 1 & 3.5 ${\pm}$ 0.8 & 1100 ${\pm}$ 140 & 219 \\ {[}\ion{S}{ii}{]}\tnote{\it d} & 4073 ${\pm}$ 0.8 & 6.6 ${\pm}$ 0.3 & 962 ${\pm}$ 128 & -39 ${\pm}$ 57 \\ {[}\ion{O}{ii}{]}\tnote{\it d} & 3731 ${\pm}$ 0.3 & 5.3 ${\pm}$ 0.3 & 760 ${\pm}$ 16 & 194 ${\pm}$ 24 \\ \ion{Mg}{ii}\tnote{\it e} & 2798.0 ${\pm}$ 0.5 & 56 ${\pm}$ 1 & 2292 ${\pm}$ 107 & 0 ${\pm}$ 50 \\ Fe? & 2621 & 3.6 ${\pm}$ 0.1 & ... & ... \\ {[}\ion{O}{ii}{]} & 2471.5 ${\pm}$ 0.1 & 2.9 ${\pm}$ 0.1 & 1191 ${\pm}$ 41 & 66 ${\pm}$ 16\\ \ion{C}{ii}{]}\tnote{\it f} & 2328.0 ${\pm}$ 0.3 & 20 ${\pm}$ 1 & 1960 ${\pm}$ 85 & -31 ${\pm}$ 34 \\ \ion{N}{ii}{]} & 2142.8 ${\pm}$ 0.2 & 1.8 ${\pm}$ 0.05 & 1695 ${\pm}$ 79 & -91 ${\pm}$ 34 \\ \ion{C}{iii}{]}\tnote{\it c} & 1908.0 ${\pm}$ 0.4 & 30 ${\pm}$ 1 & 1995 ${\pm}$ 162 & -115 ${\pm}$ 65 \\ {[}\ion{Ne}{iii}{]} & 1814 ${\pm}$ 0.6 & 2.7 ${\pm}$ 0.2 & 3393 ${\pm}$ 223 & -112 ${\pm}$ 100 \\ \ion{N}{iii}{]} & 1751.9 ${\pm}$ 0.4 & 4.2 ${\pm}$ 0.2 & 2435 ${\pm}$ 185 & 70 ${\pm}$ 67 \\ \ion{O}{iii}{]} & 1664.1 ${\pm}$ 0.4 & 2.4 ${\pm}$ 0.3 & 1500 ${\pm}$ 139 & -9 ${\pm}$ 69 \\ \ion{He}{ii}\tnote{\it g} & 1642 ${\pm}$ 2 & 6.4 ${\pm}$ 0.2 & 4296 ${\pm}$ 518 & 310 ${\pm}$ 405 \\ \ion{C}{iv}\tnote{\it e} & 1549.4 ${\pm}$ 0.3 & 24 ${\pm}$ 1 & 4148 ${\pm}$ 135 & 231 ${\pm}$ 52 \\ \ion{N}{iv}{]} & 1486 ${\pm}$ 0.25 & 2.9 ${\pm}$ 0.1 & 2529 ${\pm}$ 160 & -101 ${\pm}$ 48 \\ \ion{Si}{iv}+\ion{O}{iv}{]} & 1400 ${\pm}$ 0.15 & 7.0 ${\pm}$ 0.2 & 4404 ${\pm}$ 74 & 95 ${\pm}$ 32 \\ \hline \end{tabular} \begin{tablenotes}\footnotesize \item[\it a] observed central wavelength \item[\it b] values without uncertainties are fixed quantities. \item[\it c] sum of a logarithmic and a gaussian line profile with the flux apportioned 10:1, respectively. The model created to describe the {[}\ion{O}{iii}{]} ${\lambda}$4364 emission line is noticeably wider and has a different shape than {[}\ion{O}{iii}{]} ${\lambda}$5008. The former is best described by a gaussian whereas the latter is better represented by the sum of logarithmic and gaussian components of different FWHM and central wavelength. \item[\it d] unresolved doublets \item[\it e] uncertain due to self-absorption. \item[\it f] uncertain continuum level. \item[\it g] sum of two gaussians of approximately the same brightness, but different FWHM and central wavelength. \end{tablenotes} \end{threeparttable} \end{table*} \begin{figure} \includegraphics[width=\columnwidth]{Fig3.pdf} \caption{ Broad H${\beta}$ emission line in M81. {\sl Top panel}: The observed spectrum is shown in black and a model for the narrow line H${\beta}$, the {[}\ion{O}{iii}{]} lines, and the underlying continuum is shown in red. {\sl Lower panel}: The broad H${\beta}$ emission line profile after the model lines have been subtracted. } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig4.pdf} \caption{ Broad H${\gamma}$ emission line in M81. {\sl Top panel}: The observed spectrum is shown in black and a model for the narrow H${\gamma}$ line, the {[}\ion{O}{iii}{]} line and underlying continuum is shown in red. {\sl Lower panel}: The broad H${\beta}$ emission line profile after the model lines have been subtracted. } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig5.pdf} \caption{ Comparison of the observed ${[}\ion{O}{iii}{]}$${\lambda}$5008 emission line (purple, dashed) with the model employed for ${[}\ion{O}{iii}{]}$${\lambda}$4364 (black, solid). The latter appears slightly wider in rest-frame velocity space.} \label{fig:example_figure} \end{figure} Figure 4 shows that broad H${\gamma}$ is severely blended with what appears to be a broadened vacuum wavelength 4364.43 {\AA} ${[}\ion{O}{iii}{]}$ emission line. The model that was required to cleanly subtract ${[}\ion{O}{iii}{]}$${\lambda}$4364 from H${\gamma}$ is slightly wider than the observed ${[}\ion{O}{iii}{]}$${\lambda}$5008 profile, as illustrated in Figure 5, although the difference in FWHM is barely significant, 530 ${\pm}$ 11 km s$^{-1}$ for [O\,{\sc iii}]${\lambda}$5008 compared to 1261 ${\pm}$ 763 km s$^{-1}$ for [O\,{\sc iii}]${\lambda}$4364, consistent with prior measurements \citep{Filippenko1988, Ho1996}. The wider ${[}\ion{O}{iii}{]}$${\lambda}$4364 line is plausible given its higher critical density, 3.1 ${\times}$ 10$^7$ cm$^{-3}$, compared to 8.5 ${\times}$ 10$^5$ cm$^{-3}$ for [O\,{\sc iii}]${\lambda}$5008. Critical densities were computed for all the forbidden lines listed in Table 2 using the STSDAS task {\bf ionic} adopting an electron temperature of 2 ${\times}$ 10$^4$ K. A significant correlation, reported previously by \citet{Filippenko1988}, between FWHM and critical density for forbidden and semi-forbidden lines, is illustrated using the new data in Figure 6, supporting their explanation that the marginal difference between the FWHM of the [O\,{\sc iii}] lines is caused by a density gradient. Interestingly, there are many broad forbidden emission lines in the UV, and including them extends the correlation by about three orders of magnitude in critical density. In principle, the ratio ${[}\ion{O}{iii}{]}$(${\lambda}$5008 + ${\lambda}$4960)/${\lambda}$4364, provides a measure of electron temperature in the O$^{++}$ region. More conveniently expressed as 4/3 ${[}\ion{O}{iii}{]}$(${\lambda}$5008/${\lambda}$4364), the ratio has an observed value of 9 ${\pm}$ 3, consistent with prior measurements made with ground based telescopes \citep{Peimbert1981, Filippenko1988, Ho1996}. The extremely low ${[}\ion{O}{iii}{]}$${\lambda}$5008/${\lambda}$4364 ratio measured for the nucleus of M81 implicates collisionally excited ions radiating at or near the critical density for those transitions \citep{Filippenko1988}, or photoionized gas of low metallicity and high ionization parameter \citep[][and references therein]{Binette1996}. Alternatively, gas photoionized by fast shocks \citep{Dopita1995,Morse1996}. \begin{figure} \includegraphics[width=\columnwidth]{Fig6.pdf} \caption{The ordinate depicts the FWHM of the emission line in km s$^{-1}$, whereas the abscissa depicts the critical electron density of the transition in units of electrons/cm$^{3}$. Labelled black dots distinguish bright forbidden and semi-forbidden emission lines, ${\ge}$ 10$^{-13}$ erg cm$^{-2}$ s$^{-1}$, from fainter ones. } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig7.pdf} \caption{(Top panel) Emission line profiles for H${\alpha}$ (red-solid line) smoothed to the resolution of H${\beta}$ (green-dotted line) and H${\gamma}$ (blue-dashed line). The ordinate indicates observed flux in units of erg cm$^{-2}$ s$^{-1}$ {\AA}$^{-1}$. (Lower panel) The ordinate indicates the observed H${\alpha}$/H${\beta}$ flux ratio. The solid horizontal black line represents the ratio 2.7 expected for photoionization.The horizontal dashed line identifies the observed unweighted mean ratio 5.3. Error bars denote flux measurement uncertainties only. The abscissa represents radial velocity in km s$^{-1}$ relative to the rest frame of the broad H${\alpha}$ line (see Section 3.3 for details). } \label{fig:example_figure} \end{figure} Figure 3 illustrates that ${[}\ion{O}{iii}{]}$${\lambda}$5008 is slightly brighter than broad H${\beta}$, but it is also narrower causing the ratio of the flux in the two lines to be 1 ${\pm}$ 0.1, also consistent with prior ground based measurements. The consistency arises because the majority 85 ${\pm}$ 13\% of the ${[}\ion{O}{iii}{]}$${\lambda}$5008 flux measured with terrestrial telescopes originates from the central 0.2 arcsec ${\times}$ 0.35 arcsec region measured with STIS. The reddening insensitive ${[}\ion{O}{iii}{]}$${\lambda}$5008/H${\beta}$ ratio has been interpreted variously. Photoionization models show that it depends on both metallicity and ionization parameter \citep{Ferland1983, Binette1985}. ${[}\ion{O}{iii}{]}$${\lambda}$5008/H${\beta}$ has been used in conjunction with ${[}\ion{O}{iii}{]}$${\lambda}$5008/${\lambda}$4364 to distinguish shocks from their associated H${^+}$ regions \citep{Dopita1995, Dopita1996}. ${[}\ion{O}{iii}{]}$${\lambda}$5008/H${\beta}$ has been used in conjunction with other line ratios to segregate various types of AGN \citep[e.g.][and references therein]{Baldwin1981, Veilleux1987, Kewley2006, Feltre2016}. ${[}\ion{O}{iii}{]}$${\lambda}$5008/H${\beta}$ and ratios of other lines qualifies the active nucleus in M81 to be a Liner according to the diagnostic diagrams of \citet{Kewley2006} and a Seyfert 1.2 according to the scheme of \cite{Whittle1992}. The duplicity surrounding the true nature of the AGN in M81 warrants further investigation. \subsection{Evidence for Shocked Gas} The UV spectra illustrated in Figure 1 reveal a plethora of forbidden and semi-forbidden emission lines, several of which are rarely seen including \ion{Si}{iv}+\ion{O}{iv}{]} ${\lambda}$1400, \ion{O}{iii}{]} ${\lambda}$1664, \ion{N}{iii}{]} ${\lambda}$1751, \ion{Ne}{iii}{]} ${\lambda}$1814, \ion{N}{ii}{]} ${\lambda}$2143, and {[}\ion{O}{ii}{]} ${\lambda}$2470. Additionally, bright but absorbed Ly${\alpha}$ ${\lambda}$1215, \ion{C}{iv} ${\lambda}$1549, \ion{C}{iii}{]} ${\lambda}$1908, \ion{C}{ii}{]} ${\lambda}$2328, and \ion{Mg}{ii} ${\lambda}$2798. Many of these same lines were predicted to be bright in shocked ionized gas by \citet{Shull1979} but it was \cite{Dopita1995,Dopita1996} who illustrated the utility of the {[}\ion{O}{iii}{]}${\lambda}$5008/${\lambda}$4364 versus {[}\ion{O}{iii}{]}${\lambda}$5008/H${\beta}$ diagram in segregating pure shocks from those associated with bright precursor H${^+}$ regions. The observed {[}\ion{O}{iii}{]}${\lambda}$5008/${\lambda}$4364 and {[}\ion{O}{iii}{]} ${\lambda}$5008/H${\beta}$ ratios locate M81 unambiguously in the ``shock only" region of their diagram \citep[][see their Figure 7]{Dopita1995}. The evidence for shocks is discussed further in Section 4. \subsection{A Redshifted BLR?} \citet{Peimbert1981} reported that the broad H${\alpha}$ emission line is redshifted with respect to the narrow component. The broad H${\alpha}$ emission line is essentially rectangular in shape with a wide and flat top that limits the accuracy with which the wavelength of the line centre can be determined (Table 2). However, a residual peak at what appears to be the bisector of the broad H${\alpha}$ emission line is redshifted by 4.2 {\AA} relative to the subtracted narrow component (see Figure 2), in good agreement with a prior report by \citet{Peimbert1981}. The redshift associated with the broad H${\beta}$ and H${\gamma}$ lines is more difficult to discern in the lower resolution G430L spectra, but imposing a redshift of 3 {\AA} on those lines with respect to their vacuum wavelengths resulted in their alignment with each other and H${\alpha}$ (Figure 7). Interestingly, the average doppler shift measured with respect to vacuum wavelength collectively for the {[}\ion{N}{ii}{]} and narrow H${\alpha}$, plus the {[}\ion{S}{ii}{]} and {[}\ion{O}{i}{]} lines flanking the broad H${\alpha}$ line, is 0.0 ${\pm}$ 0.4 {\AA}. This is to be compared with prior observations of the more extended narrow-line region (NLR) which indicated a 1 {\AA} blueshift based on the brighter {[}\ion{N}{ii}{]} line \citep{Devereux2003}. A more complete picture of the emission line kinematics is presented in Figure 8 where the velocity of the line centre, V$_{cen}$, expressed in km s$^{-1}$ and computed using the non-relativistic Doppler equation employing the wavelength difference; observed minus vacuum, is plotted against wavelength for 29 emission lines listed in Table 2 (excluding the one emission line with an uncertain identification at 2621 {\AA}). The figure shows that the emission lines exhibit a wide range in V$_{cen}$, from a blueshift of -58 km s$^{-1}$ to a redshift of 174 km s$^{-1}$, with no dependence on wavelength or line brightness. Emission lines with redshifts similar to the broad Balmer lines include ${[}\ion{O}{iii}{]}$ ${\lambda}$${\lambda}$5008, 4364, the ${[}\ion{O}{ii}{]}$ ${\lambda}$${\lambda}$3727, 3729 blend, \ion{He}{ii} ${\lambda}$1640 and \ion{C}{iv} ${\lambda}$1548, but they can hardly be described as outliers. Collectively, the mean V$_{cen}$ = 58 ${\pm}$ 116 km s$^{-1}$, the dispersion being approximately a factor of two larger than the ${\pm}$ 60 km s$^{-1}$ amplitude measured for the brighter {[}\ion{N}{ii}{]} emission line reported in \cite{Devereux2003}. By comparison, the line-centre velocities and associated dispersion are dwarfed by the much larger FWHM which spans an impressive range from 300 km s$^{-1}$ to 4500 km s$^{-1}$ that is correlated with wavelength in the sense that the broadest lines occur in the UV as illustrated in Figure 9. The broadest emission line is actually a blend of \ion{Si}{iv}+\ion{O}{iv}{]} at 1400 {\AA}, closely followed by \ion{He}{ii} ${\lambda}$1642 and \ion{C}{iv} ${\lambda}$1549. The new observations reveal no compelling evidence for a redshifted BLR because there is no correlation between FWHM and V$_{cen}$ as illustrated in Figure 10. Furthermore, naively identifying the BLR with {\it the region emitting the broadest emission lines} would inevitably include many broad forbidden lines as well. Thus, any model for the BLR in M81 must include an explanation for the broad forbidden lines as well as the broad permitted lines. \begin{figure} \includegraphics[width=\columnwidth]{Fig8.pdf} \caption{The ordinate depicts the velocity of the emission line centre in km s$^{-1}$, whereas the abscissa depicts wavelength in units of Angstroms. Labelled black dots distinguish bright emission lines, ${\ge}$ 10$^{-13}$ erg cm$^{-2}$ s$^{-1}$, from fainter ones. The horizontal solid and dotted lines depict the mean and ${\pm}$ 1 ${\sigma}$ standard deviation for the distribution, respectively. The black dashed line represents the blueshift measured for the larger scale NLR (see Section 3.3 for details). } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig9.pdf} \caption{The ordinate depicts the FWHM of the emission line in km s$^{-1}$, whereas the abscissa depicts wavelength in units of Angstroms. Labelled black dots distinguish bright emission lines, ${\ge}$ 10$^{-13}$ erg cm$^{-2}$ s$^{-1}$, from fainter ones. } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig10.pdf} \caption{The ordinate depicts the FWHM of the emission line in km s$^{-1}$, whereas the abscissa depicts the velocity of the emission line centre in km s$^{-1}$. Labelled black dots distinguish bright emission lines, ${\ge}$ 10$^{-13}$ erg cm$^{-2}$ s$^{-1}$, from fainter ones. } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig11.pdf} \caption{Comparison with previous measurements of emission line flux. The dimensionless ratio, plotted on the ordinate, represents the STIS measurement (this paper) divided by a prior measurement for emission lines in common with \citet{Ho1996}. The abscissa depicts wavelength in units of Angstroms. Red dots and blue dots identify ground based and space based measurements, respectively, occurring in the denominator of the ratio. Bright dots distinguish bright emission lines, ${\ge}$ 10$^{-13}$ erg cm$^{-2}$ s$^{-1}$, from fainter ones. Bright emission lines that may plausibly be brighter than previously observed are labelled.} \label{fig:example_figure} \end{figure} \subsection{Comparison with Previous Measurements} A comprehensive list of emission line measurements for M81 was presented previously by \citet{Ho1996} who, using an independent set of observations, measured fluxes for all of the same lines reported in Table 2 with the exception of \ion{He}{ii} ${\lambda}$1640, \ion{N}{ii}{]} ${\lambda}$2143, and {[}\ion{Ne}{iii}{]} ${\lambda}$1814. An interesting comparison is illustrated in Figure 11, presented as the ratio of the flux reported in Table 2, divided by that of \citet{Ho1996}, and segregated by emission line wavelength. At the longest wavelengths there is a group of bright lines ({[}\ion{N}{ii}{]}, {[}\ion{S}{ii}{]} and narrow H${\alpha}$) for which the ratio is < 1, understandably so, because the STIS observations employed a narrower slit than the ground based observations of \citet{Ho1996} indicating that these narrow emission lines arise from a spatially extended region. More intriguing are the bright lines that are associated with ratios > 1 which includes the broad emission lines of H${\alpha}$, H${\beta}$, and vacuum wavelength \ion{Mg}{ii} ${\lambda}$2798, \ion{C}{ii}{]} ${\lambda}$2328, \ion{C}{iii}{]} ${\lambda}$1908 and \ion{C}{iv} ${\lambda}$1548. The trend is for the ratio to increase towards the UV. However, only \ion{C}{iv} has brightened significantly, by ${\sim}$ 230\%. A detailed comparison of the \ion{C}{iv} emission line with that reported by \citet{Ho1996} is presented in Figure 12 illustrating that the emission line appears to have retained much of its shape by having brightened over a wide range of velocities, but the adjacent continuum has not changed at all, and is the same, to within 10\%, as that measured in a prior {\it HST} image \citep{Devereux1997a}. \begin{figure} \includegraphics[width=\columnwidth]{Fig12.pdf} \caption{Comparison of the C\,{\sc iv} ${\lambda}$1548 emission line profiles measured with the Faint Object Spectrograph in 1993 with the more recent STIS observation in 2017. The ordinate measures flux in units of erg cm$^{-2}$ s$^{-1}$ {\AA}$^{-1}$ whereas the abscissa is in units of km s$^{-1}$ in the rest frame of M81.} \label{fig:example_figure} \end{figure} Independent measurements of the broad H${\alpha}$ emission line flux, based on {\it HST} observations, are in good agreement \citep{Bower1996, Devereux2003, Balmaverde2014}. Additionally, \citet{Filippenko1988} noted that the broad H${\alpha}$ emission line flux has remained constant for the duration of ground based observations spanning several years. The double-peaked profile reported by \citet{Bower1996} was evidently transient having not been seen in any subsequent spectra obtained with {\it HST}. \cite{Filippenko1988} highlighted the similarity between the broad H${\alpha}$ and H${\beta}$ emission line profile shapes whereas \citet{Ho1996} illustrated them to be quite different. The new {\it HST}/STIS observations presented in Figure 7 reveals them to be approximately symmetric when wavelength is converted into rest-frame velocity using the non-relativistic Doppler equation. The ratio of the two lines is computed by first smoothing the broad H${\alpha}$ line to the same velocity resolution as H${\beta}$, and then interpolating the H${\alpha}$ flux to the same velocities at which the H${\beta}$ flux was measured. Consequently, the ratio shares the same velocity resolution as H${\beta}$. The unweighted mean ratio H${\alpha}$/H${\beta}$ = 5.3 ${\pm}$ 1.6 is in good agreement with prior measurements \citep{Peimbert1981, Filippenko1988, Ho1996, Bower1996}. The intrinsic ratio expected for photoionized gas has a value of 2.7 \citep{Osterbrock1989}. By comparison with the much higher observed ratio, one infers a differential extinction between H${\alpha}$ and H${\beta}$ of 0.7 mag. Interestingly, there is some evidence for asymmetric dust extinction {\it internal} to the H$^{+}$ region because the observed ratio systematically exceeds the mean on the blueshifted side, whereas the opposite is true on the redshifted side, with the exception of three points defining a spike at ${\sim}$ 10$^{3}$ km s$^{-1}$ that is difficult to interpret as it coincides with what may be an incompletely subtracted {[}\ion{N}{ii}{]} line. Of higher statistical significance is a dip in the ratio near zero velocity. Collectively, these trends imply that the H$^{+}$ region suffers internal dust extinction that obscures the inner region more than the outer and obscures the blueshifted side more than the redshifted one. \subsection{Absolute Extinction to the Central Continuum Source} Much of what is believed to be understood about the nature of the central UV--X-ray source in M81 was anticipated by \cite{Petre1993a}, including the absence of a geometrically thin accretion disc \citep{Young2018}, consistent with the absence of Compton reflection \citep{Ishisaki1996} and a low accretion rate modulated by an advection dominated accretion flow \citep[ADAF][]{Narayan1994, Narayan1995, Narayan1995a} that is expected to produce a substantial H ionizing continuum \citep{Nemmen2014}\footnotemark \footnotetext{https://figshare.com/articles/Spectral\_models\_for\_low-luminosity\_active\_galactic\_nuclei\_in\_LINERs/4059945}, illustrated in Figure 13 in the context of the observed STIS spectra. \begin{figure} \includegraphics[width=\columnwidth]{Fig13.pdf} \caption{Observed UV--visible continuum of M81 defined by contemporaneous STIS observations with the G750M, G430L, G230L and G140L gratings, depicted by red, blue, indigo and purple dots, respectively. The solid green line represents the incident ADAF continuum of \citet{Nemmen2014}. Units of the ordinate are W/m$^2$ and the abscissa is eV.} \label{fig:example_figure} \end{figure} Starlight causes the observed visible continuum to be brighter than the incident ADAF continuum. Conversely, dust extinction causes the observed UV continuum to be both fainter and redder than the ADAF. Consequently, one can compare the ADAF continuum with the observed line-free visible--UV continuum to learn about dust extinction and the contribution of starlight, both as a function of wavelength, along the line-of-sight to the continuum source. Foreground dust extinction, ${A_\lambda}$ to the UV continuum has been computed for M81 using a method described previously in \cite{Devereux2018} and the result is illustrated in Figure 14. Since starlight obviously dominates the observed continuum longward of 3000 {\AA}, a least squares fit to just the G140L and G230L line-free continua yields, \begin{equation} A_{\lambda} = \frac{(2972 \pm 8)}{\lambda(\textrm\AA)}~~~~\rm{mag} \end{equation} predicting A${_v}$ = 0.7 and E(B-V) = 0.14 yielding the ratio A${_v}$ = 0.7/E(B-V) = 5, similar to Galactic values. A depression in the G230L continuum at ${\sim}$ 5.6 eV (Figure 13) coincides with the wavelength expected for the 2175 {\AA} feature \citep{Cardelli1989} identified in Figure 14. \begin{figure} \includegraphics[width=\columnwidth]{Fig14.pdf} \caption{Rest frame extinction to the emission line-free UV--visible continuum in M81 (light grey line) inferred by comparing contemporaneous STIS observations obtained using the G140L, G230L, G430L and G750M gratings with the intrinsic ADAF continuum of \citet{Nemmen2014}. The ordinate indicates total dust extinction in units of magnitudes and the abscissa indicates wavelength in the rest frame of M81 expressed in units of {\AA}. The black arrow identifies the wavelength expected for the 2175 {\AA} feature. Comparing contemporaneous STIS observations of the H${\alpha}$, H${\beta}$, H${\gamma}$, H${\delta}$ and ${\lambda}$1640 ${\ion{He}{ii}}$ emission lines with the intrinsic emission line fluxes predicted by {\scriptsize XSTAR} defines the extinction to the H${^+}$ region (blue dots, see Table 3). The black curves illustrate the functions described by Equations 1 and 3. } \label{fig:example_figure} \end{figure} \subsection{Photoionization Modelling of the H$^{+}$ region } Integrating the ADAF dominated continuum, illustrated in Figure 13, between 1 and 1000 Ryd leads to a luminosity of 7.14 ${\times}$ 10$^{40}$ erg s$^{-1}$, yielding 6.70 ${\times}$ 10$^{50}$ H ionizing photons s$^{-1}$, effectively alleviating the ionizing deficit for the broad Balmer lines reported previously \citep{Ho1996, Bruzual1982, Devereux2007}. The reason being that the ADAF continuum adopted here is different from the power laws that were employed previously to interpolate the unobservable ionizing continuum. Consequently, a grid of {\scriptsize XSTAR} photoionization models \citep{Kallman2001} has been generated to explore the possibility that the H$^{+}$ region responsible for producing the broad H${\alpha}$ emission line is photoionized by the central UV--X-ray source. The methodology involves using the shape and luminosity of the bright and broad H${\alpha}$ emission line to constrain a unique photoionization model. The utility of this approach has been demonstrated previously \citep{Devereux2018}. The {\scriptsize XSTAR} models invoke a sphere with a covering factor and a filling factor both equal to unity, and an ionization parameter that is factors of 10${^2}$ -- 10${^3}$ higher than considered for dense broad-line clouds by \citet{Ho1996}. The models are neither isobaric nor isothermal and no column density restriction was imposed. Each {\scriptsize XSTAR} model produces a radial distribution for the H${\alpha}$ emissivity that is surprisingly sensitive to the input radial distribution of neutral gas described by a radial particle number density ${\rho}(r)$ and a power law of index $n$, normalized by a number density ${\rho}_o$, at a reference radius $r_o$, so that ${\rho}(r)$=${\rho}_o(r/r_o)^{-n}$, where ${r}$ is the radial distance from the photoionizing source. Such models produce a wide variety of H${\alpha}$ emission line profile shapes given a kinematic description for the H$^{+}$ gas. Radiation pressure is negligible since the active nucleus radiates at 3 x 10${^{-5}}$ of the Eddington luminosity limit \citep{Nemmen2014}. Thus, the dominant force is gravity implying velocity laws of the form ${v(r)}$ = ${\sqrt{ \gamma G M(r)/r}}$, where ${v}$ is velocity, ${\gamma}$ is a constant that depends on geometry, ${G}$ is the gravitational constant, ${M(r)}$ is the mass interior to ${r}$, where ${r}$ is the radial distance of each point from the central supermassive black hole (BH). The radial dependence of the central mass arises because ${M(r)}$ includes both the BH mass ${M_{\bullet}}$, and the surrounding stars ${M_{\star}(r)}$, both of which are specified in \cite{Devereux2003}. The H$^{+}$ gas is unlikely to be rotating in a geometrically thin accretion disc, for which ${\gamma}$ = 1, as there does not appear to be one \citep{Young2018}. Besides, such a disc would produce a double-peaked and possibly asymmetric H${\alpha}$ emission line profile, unless the disc is contrived to be nearly face-on \citep{Chen1989}. Points moving radially at the escape velocity, for which ${\gamma}$ = 2, is equivalent to those same points on randomly oriented circular orbits, except the velocity amplitude will be smaller for the latter by a factor of ${\sqrt{2}}$. Radial motion readily produces symmetric, single-peak, profiles like the observed one, an example of which is illustrated in Figure 15. Although kinematics alone cannot distinguish between various geometries, photoionization modelling provides an important additional geometric constraint in the form of a covering factor for the line-emitting gas. Thus, the best way to explore the geometry of the line-emitting gas is to combine the two methods. \begin{figure} \includegraphics[width=\columnwidth]{Fig15.pdf} \caption{The observed normalized H${\alpha}$ emission line profile is depicted by the red line. The normalized model line, shown in black, corresponds to the location of ${\chi}_{red}^2$ minimum in Figure 17 where ${\xi}$ = 3.25 dex at $r_o$ = 5 ${\times}$ 10$^{-3}$ pc, for n = 0.65. The residual between the observed and model line is represented by the thinner red line. The abscissa indicates rest frame radial velocity of the H${\alpha}$ emission in km s$^{-1}$ (see Section 3.6 for details).} \label{fig:example_figure} \end{figure} In a procedure that amounts to an exploration of parameter space, the observed H${\alpha}$ emission line profile shape is compared with simulated ones generated by a grid of photoionization models defined by three parameters; the ionization parameter ${\xi}$, which together with a number density ${\rho}_o$ defines an inner radius $r_o$, and a power law of index $n$, which describes the degree of central concentration for the spherical ball of gas that is to be photoionized. The reduced chi-squared statistic \begin{equation} {\chi}_{red}^2 = {\sum_j} (O_j - M_j)^2/(\nu \delta^2) \end{equation} is used to compare the observed normalized line profile intensities, ${O_j}$ with the model ones, ${M_j}$. There are 471 degrees of freedom, ${\nu}$, and the uncertainty, ${\delta}$, in the observed normalized line profile intensities is 4\%. The summation was performed over the velocity span of the broad H${\alpha}$ line depicted in Figure 15. The observed profile has a flat top that can be reproduced in the model line profiles by creating a bi-conical-shaped cavity that is expected to be occupied by the jets, evidence for which has been seen in the radio \citep{Marti-Vidal2011} and in the visible \citep{Ricci2015b}. At the expense of one more parameter, a bi-conical cavity is invoked in spherical coordinates by restricting the polar angle, ${\theta}$ such that -0.85${\pi}$/2~${\le}~{\theta}~{\le}~0.85{\pi}$/2 for all azimuthal angles ${\phi}$ so that 0 ${\le}$ ${\phi}$ ${\le}$ 2${\pi}$. This particular opening angle was constrained by an empirical iterative process that minimized ${\chi}_{red}^2$. It is intermediate between that measured for the precessing radio jet by \cite{Marti-Vidal2011} and depicted in the principal component analysis of \citet[][see their Figure 2]{Ricci2015b}. The resulting geometry for the H${\alpha}$ emitting region is illustrated in Figure 16 wherein the azimuthal axis of symmetry is perpendicular to the line-of-sight. Observationally, M81* has what appears to be a one-sided radio jet, the inclination angle of which is undetermined \citep{Marti-Vidal2011,Bietenholz2000, Bietenholz1996}, but it is quite likely to be small as the one-sided nature of the radio-jet has been attributed to Doppler boosting by \cite{Ricci2015b} based on a re-examination of the \cite{SchnorrMueller2011} dataset. More complicated models for the H${\alpha}$ emitting geometry could be contrived, but at the expense of additional free parameters. A merit of the {\scriptsize XSTAR} photoionization models is that the inner and outer radii of the H$^{+}$ region are determined by the Balmer emissivity. Consequently, they do not add to the 4 free parameters already described. \begin{figure} \includegraphics[width=\columnwidth]{Fig16.pdf} \caption{Geometry for the region producing the model H${\alpha}$ emission line profile shown in Figure 15. Dark red dots depict the H${\alpha}$ emissivity. Lighter pink dots illustrate the jet cavity (see Section 3.6 for details). The ordinate and abscissa are in units of pc.} \label{fig:example_figure} \end{figure} The default {\scriptsize XSTAR}\footnotemark \footnotetext{https://heasarc.gsfc.nasa.gov/xstar/docs/html/xstarmanual.html} solar abundance is presumed for H and He. The abundances for other elements are highly uncertain. However, the ${[}\ion{O}{iii}{]}$${\lambda}$5008 emission line is similar in brightness to H${\beta}$ (Figure 3). Prior photoionization models have shown the reddening insensitive ratio ${[}\ion{O}{iii}{]}$5008/H${\beta}$ to be a metallicity indicator when the ionization parameter is held constant \citep{Komossa1997, Binette1985, Ferland1983, Halpern1983}. M81 has much in common with NGC 3998 for which {\scriptsize XSTAR} models indicate that ${[}\ion{O}{iii}{]}$5008/H${\beta}$ = 60 $Z/Z_\odot$ for 10$^{-3}$ ${\le}$ $Z/Z_\odot$ ${\le}$ 10$^{-1}$ \citep{Devereux2018}. Thus, for {\scriptsize XSTAR} to correctly predict the observed reddening insensitive ratio ${[}\ion{O}{iii}{]}$5008/H${\beta}$ = 1 ${\pm}$ 0.1 observed for M81 (Section 3.1) the O abundance has to be 2\% solar (Z${\odot}$). Consequently, a grid of models employed abundances equal to 0.02Z${\odot}$, and, for the purposes of comparison, another grid employed solar abundances. The results for the 0.02Z${\odot}$ grid are presented in Figure 17 in the form of a contour plot that clearly identifies a viable {\scriptsize XSTAR} model of interest defined by the parameters, ${\rho}_o$ = 5.05 dex at r$_o$ = 0.01 pc, where the ionization parameter ${\xi}$ = 2.85 dex, for $n$=0.65. The 1.8 pc diameter determined for the H$^{+}$ region, illustrated in Figure 16, is completely contained within the 0.2 arc sec slit that was employed to observe it. A similar solution, not shown, is obtained for solar abundances, but that model was rejected because it overestimates ${[}\ion{O}{iii}{]}$5008/H${\beta}$ by an order of magnitude. \begin{figure} \includegraphics[width=\columnwidth]{Fig17.pdf} \caption{Photoionization model results as a function of gas density ${\rho}_o$ and index $n$ for a metallicity $Z/Z_\odot$ = 0.02. The ordinate identifies the H density ${\rho}_o$ at a reference radius $r_o$ = 0.01 pc. Lines of constant ${\xi}$ run parallel to the abscissa which identifies the index $n$ of the power law used to describe the radial distribution of neutral H gas to be ionized (see Section 3.5 for details). Contours identify ${\chi}_{red}^2$ representing the goodness of fit between the model H${\alpha}$ emission line profile and the observed one (see Figure 15 and Section 3.6) for M$_{\bullet}$ = 7 ${\times}$ 10${^{7}}$ M${_{\sun}}$. Six contours are plotted. The smallest (white) closed contour represents ${\chi}_{red}^2$ =1.5 and constrains an interesting model with log ${\rho}_o$(cm$^{-3})$ = 5.05, and n = 0.65. The next contour represents ${\chi}_{red}^2$ = 2, and subsequent contours increase in steps of two as indicated by the legend. } \label{fig:example_figure} \end{figure} \begin{table} \centering \caption{Bright H and He recombination lines used to define dust extinction to the H$^{+}$ region} \begin{tabular}{cccc} \hline Line & Observed & {\scriptsize XSTAR} & Extinction \\ & 10$^{38}$ erg s$^{-1}$ & 10$^{38}$ erg s$^{-1}$ & mag \\ (1) & (2) & (3) & (4) \\ \hline H${\alpha}$ & 15.48 & 14.56 & -0.08 \\ H${\beta}$ & 2.59 & 5.45 & 0.8 \\ H${\gamma}$ & 0.85 & 2.39 & 1.12 \\ H${\delta}$ & 0.50 & 0.67 & 0.32 \\ ${\lambda}$1640 ${\ion{He}{ii}}$ & 0.91 & 4.2 & 1.65 \\ \hline \end{tabular} \end{table} Dust extinction to the H$^{+}$ region is determined by comparing the observed H and He recombination line luminosities with those predicted by {\scriptsize XSTAR}. A least squares fit to the extinction reported in Table 3 for the broad H and He emission lines yields \begin{equation} A_{\lambda} = \frac{(2688 \pm 535)}{\lambda(\textrm\AA)}~~~~\rm{mag} \end{equation} The larger uncertainty in the extinction law predicted by the recombination lines (Equation 3), compared to the line-free continuum (Equation 1), reflects the smaller number of points involved in the fit. Collectively, the results presented in Figure 14 show that the foreground extinction to the H$^{+}$ region is, statistically, indistinguishable from that to the ADAF continuum and is in agreement with prior estimates \citep{Peimbert1981, Filippenko1988, Ho1996}. According to this particular {\scriptsize XSTAR} photoionization model, the results depicted in Figure 14 indicate that the H$^{+}$ region is completely unobscured at the wavelength of the H${\alpha}$ line, and most of the ${\sim}$ 0.8 mag of differential extinction between H${\alpha}$ and H${\beta}$ (Table 3) is caused by dust internal to the H$^{+}$ region described previously in Section 3.4. \section{Discussion} The new STIS observations of M81 reaffirm prior spectroscopic measurements including the detection of several broad emission lines spanning the visible to the UV, an anomalous H${\alpha}$/H${\beta}$ ratio, an astonishingly low ${[}\ion{O}{iii}{]}$5008/${[}\ion{O}{iii}{]}$4364 ratio, and a broad H${\alpha}$ emission line that is redshifted relative to the narrow-line region. What STIS has revealed that is new are several previously unreported broad forbidden emission lines in the UV that have extended the correlation between FWHM and critical density by several orders of magnitude (Figure 6), and a broad \ion{C}{iv} ${\lambda}$1548 line that has doubled in brightness (Figure 12). The evidence for a redshifted BLR has diminished (Figure 10), although future sub-arcsecond imaging of the nucleus of M81 will likely reveal emission line images with slightly different centroids depending on wavelength (Figure 8). \begin{figure} \includegraphics[width=\columnwidth]{Fig18.pdf} \caption{Radial distributions for the photoionization model that best reproduces the observed H${\alpha}$ emission line profile shape and luminosity. ${\xi}$ = 3.25 dex at the smallest radius plotted corresponding to 5 ${\times}$ 10$^{-3}$ pc. The ordinate refers to a variety of units whereas the abscissa indicates distance from the BH in pc. {\sl Upper panel}: Ionization fractions of H${^+}$ (pink shading) and all possible ionization stages of O (green shading, O$^+$ is imperceptible). {\sl Lower panel}: Log$_{10}$ of the electron temperature, T$_e$(K) (blue line), electron density, n$_e$ (cm$^{-3}$) (grey line), proton density, n$_p$ (cm$^{-3}$) (black line), the H${\alpha}$ emissivity in arbitrary units (red line) and the ionization parameter ${\xi}$ (yellow line). } \label{fig:example_figure} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{Fig19.pdf} \caption{Radial distributions illustrating the gradient in the gravitational energy density (black solid line) and the negative of the gas pressure gradient (gray dotted line) within the H${^+}$ region. The ordinate refers to units of erg cm${^{-4}}$ whereas the abscissa indicates distance from the BH in cm. The figure shows that the H${^+}$ region is not in hydrostatic equilibrium. } \label{fig:example_figure} \end{figure} Interpreting the shape of the broad H${\alpha}$ emission line in terms of an H$^{+}$ region, photoionized by the ADAF that is believed to power the low-luminosity AGN in M81 \citep{Nemmen2014, Petre1993a}, provides a natural explanation for the size of the region emitting the Balmer lines. Radial distributions are illustrated for several interesting physical parameters in Figure 18. The H$^{+}$ region is ionization bounded with an outer radius of ${\sim}$ 0.9 pc. As the central UV--X-ray source is approached the electron temperature increases to ${\sim}$ 10$^{6}$ K transforming the photoionized gas into a plasma, marked by a sharp decline in the Balmer emissivity at an inner radius of ${\sim}$ 5 ${\times}$ 10$^{-3}$ pc that is approximately coincident with the transition radius ${r_{tr}}$ = 2 ${\times}$ 10$^{-3}$ pc parametrized by \citet{Nemmen2014}. Integrating between the inner and outer radii leads to a H equivalent column density of 3.9 ${\times}$ 10$^{22}$ atoms cm$^{-2}$. Integrating the total mass of H between the inner and outer radii results in 532 M${\odot}$, assuming spherical symmetry. Figure 19 shows that within the H$^{+}$ region, the magnitude of the gradient in the gravitational energy density opposes that of the gas pressure by over one order of magnitude. Consequently, mass inflow is inevitable. Assuming spherical symmetry, the corresponding mass inflow rate can be computed using the equation of continuity. Adopting the same unity filling factor as employed in the photoionization models (Section 3.6), and a free-fall velocity of 7892 km s$^{-1}$ at a radius of 10$^{-2}$ pc where the proton number density is 10${^5}$ cm$^{-3}$, results in $\dot{m}$ = 3 ${\times}$ 10$^{-2}$ M${_{\sun}}$/yr which exceeds, by a factor of 6, the inflow rate required to sustain the ADAF modelled by \cite{Nemmen2014}. The inferred mass inflow rate also exceeds, by a similar factor, that estimated for a much larger region in M81 studied by \cite{SchnorrMueller2011}, $\dot{m}$ also exceeds the minimum expected to power the radio jet \citep{Bietenholz1996}, and the rate estimated for the jet outflow \citep{Nemmen2014}, by three to four orders of magnitude. \cite{Filippenko1988} suggested that the anomalous H${\alpha}$/H${\beta}$ ratio observed for the broad emission lines implies high gas density rather than dust extinction. The {\scriptsize XSTAR} photoionization models do produce an anomalous H${\alpha}$/H${\beta}$ ratio, similar to that observed, if the density within the H$^{+}$ region is ${\sim}$ 10$^{7}$ cm$^{-3}$, but the resulting small size for the emitting region ${\sim}$ 10$^{-2}$ pc, would produce a very broad H${\alpha}$ emission line, incompatible with the observed one. In fact, the shape of the broad H${\alpha}$ emission line is very sensitive to the radial distribution and density of the photoionized gas, as Figure 17 illustrates. For a BH mass of 7 ${\times}$ 10$^{7}$ M${_{\sun}}$, the observed H${\alpha}$ emission line profile shape is consistent with a lower density H$^{+}$ region ${\sim}$ 10$^{4}$ to 10$^{5}$ cm$^{-3}$ (Figure 18), in which case the anomalous H${\alpha}$/H${\beta}$ ratio is attributed to dust extinction (Figure 14). Large micron sized dust grains are expected to survive in the H$^{+}$ region because the central UV--X-ray source is too feeble to sublimate them \citep{Barvainis1987}. Furthermore, the existence of dust is evidenced by the reddening reported in Sections 3.4, 3.5 and 3.6. However, there does appear to be considerably less dust than one would expect from the H column which predicts ${\sim}$ 2.5 mag of visual extinction, far more than is actually observed. Nevertheless, in the context of an inflow, the velocity dependence of the reddening sensibly indicates that the far-side of the H$^{+}$ region is more obscured than the near-side (Figure 7). A wide range of gas density, increasing towards the central BH, is implied by the correlation between FWHM and critical density depicted in Figure 6. The range of densities is much wider than expected to be produced by photoionization of the H gas by the central UV--X-ray source (Figure 18). The forbidden and semi-forbidden lines are also unlikely to be identified with the atmospheres of stars because the density at the penetration depth of the ionizing photons is too low, ${\leq}$ 10$^{8}$ cm$^{-3}$ \citep{Devereux2007}. The relative brightness of the forbidden and semi-forbidden emission lines does resemble that expected from shocks, in particular, the average of the 200 km s$^{-1}$ and 250 km s$^{-1}$ models (s20010 and s25010) in \cite{Dopita1996}. Shocks could produce the correlation illustrated in Figure 6 if the forbidden and semi-forbidden lines are produced by the interaction of the jet with the surrounding medium, the geometry of which is depicted in Figure 16. The conundrum with explaining the ${[}\ion{O}{iii}{]}$ emission lines in the context of photoionization is that the observed ${[}\ion{O}{iii}{]}$${\lambda}$5008 line is as faint as H${\beta}$, which sets a firm upper limit of 2\% solar for the metallicity of the photoionized gas. However, the remaining discrepancy, that the observed ${[}\ion{O}{iii}{]}$${\lambda}$4364 line is too bright, by about a factor of 3, relative to H${\gamma}$ cannot be diminished by further adjusting the metallicity. Thus, the nucleus of M81 has what is known as an ${[}\ion{O}{iii}{]}$${\lambda}$4364 {\it temperature problem} that has afflicted other photoionization models of Liners and Seyfert 2s \citep{Binette1996, Komossa1997, Richardson2014}. Apparently, the resolution of this problem, in M81 at least, is that the ${[}\ion{O}{iii}{]}$ lines, and, presumably, all the other forbidden and semi-forbidden emission lines, are produced by the interaction of the jet with the surrounding gas in agreement with the interpretation of \cite{Dopita2015} who noted the similarity between the emission line spectrum of M81 and NGC 1052; a Liner with a spatially resolved pair of jets. However, the main difference between M81 and NGC 1052 is that the former is much closer. Thus, the {\it HST} observations of M81 probe a much smaller, and unresolved region near the base of its jets, where the gas has been compressed over a much wider range of densities (Figure 6) than imagined by \cite{Dopita2015}. Interaction of the jet with the surrounding medium could also explain the time-variable \ion{C}{iv} ${\lambda}$1548 line emission which has brightened by a factor of 2 over a wide range of radii (Figure 12) even though the adjacent continuum has remained unchanged. However, the jets in NGC 1052 are not a strong source of Balmer emission \citep{Sugai2005, Dopita2015}. Presumably, the same is also true in M81. Consequently, the broad Balmer emission lines are unlikely to be identified with the jets or jet cavity. According to {\scriptsize XSTAR} the central ADAF is expected to progressively ionize O through all of its possible ionization stages as the central UV--X-ray source is approached (Figure 18). Interestingly, emission lines from \ion{O}{vii} and \ion{O}{viii} have been reported by \cite{Page2003} and \cite{Young2007} at about the same brightness as predicted by the 2\% solar metallicity {\scriptsize XSTAR} photoionization model. Thus, the photoionization model presented here for the low-luminosity nucleus of M81 may well reconcile recombination lines seen from the visible to the X-rays with a single photoionized region consisting of low metallicity gas. How did the nucleus of M81 acquire 532 M${\odot}$ of low metallicity gas? The answer may be that a dwarf galaxy fell in. Dwarf galaxies exhibit a fascinating correlation between metallicity and mass in the sense that the lower the mass, the lower the metallicity \citep[][and references therein]{Lee2006}. Observational evidence that our Galaxy has merged with a dwarf has been presented by \citet{Helmi2018}. A similar merger could account for the low metallicity, and low dust content of the gas in the nucleus of M81, as well as its velocity dispersion (Figure 8). \citet{Morse1996} proposed this idea, in a similar context, for other low-luminosity AGN. \section{Conclusion} M81 is classified as both a Seyfert 1 and a Liner because it exhibits emission lines of a variety of widths covering a wide range of ionization potential and critical density. Collectively, the visible--UV spectrum of M81 appears to be composed of at least three separate emission line components that are not kinematically distinct. Firstly, condensations of a wide range in density, 10$^{5}$ to 10$^{11}$ cm$^{-3}$, and low covering factor, to explain the collisionally excited forbidden lines. Secondly, a lower density, 10$^{4}$ to 10$^{5}$ cm$^{-3}$, photoionized region of high covering factor to explain the Balmer lines. Thirdly, an extended source of time-variable \ion{C}{iv} ${\lambda}$1548 emission. These three emission line components are superimposed on a visible--UV continuum that has not varied significantly since the last measurement obtained with ${\it HST}$ 21 years ago. Collectively, these observations can be understood in the context of a jet interacting with an infalling cloud of gas that is photoionized by the central UV--X-ray source. The photoionized region producing the broad Balmer lines is large, ${\sim}$ 1 pc in radius. It consists of ${\sim}$ 500 M${\odot}$ of low metallicity gas that is dynamically unstable, and prone to infall at a rate that is commensurate with that required to power the ADAF for 10$^{5}$ yrs. \section*{Acknowledgements} The author is grateful to the many colleagues that he met during the course of his sabbatical tour of universities in the United States, and the United Kingdom, for their kind hospitality, their curiosity and thought-provoking questions that provided much inspiration for the concurrent production of this manuscript. Special thanks, in particular, go to Dr. Steven Willner who, generous of his time, has graciously waded through and commented on prior less coherent versions of this manuscript that greatly improved its presentation. Special thanks also to ERAU Cyber Intelligence \& Security undergraduate student Jessica Wilson for writing a very useful piece of Python code that greatly accelerated the analysis described herein. STSDAS is a product of the Space Telescope Science Institute, which is operated by AURA for NASA. Based on observations made with the NASA/ESA Hubble Space Telescope, obtained from the data archive at the Space Telescope Science Institute. STScI is operated by the Association of Universities for Research in Astronomy, Inc. under NASA contract NAS 5-26555. \bibliographystyle{mnras}
\section{Introduction} Supersymmetry allows us to exactly capture low-energy behaviors of strongly-coupled and non-perturbative gauge theories by using various non-renormalization theorems and holomorphy \cite{Seiberg:1994bz}. Depending on the number of dynamical quarks, the theory exhibits supersymmetry breaking, confinement, non-abelian Coulomb phases and so on. For a non-abelian Coulomb phase, Seiberg duality \cite{Seiberg:1994pq} claims that the low-energy dynamics is equivalent to a magnetic dual theory with a different gauge group. In this paper, we are interested in s-confinement phases of the 3d $\mathcal{N}=2$ supersymmetric gauge theories. The s-confinement is a confining phase without symmetry breaking at the origin of the moduli space \cite{Seiberg:1994bz, Csaki:1996sm, Csaki:1996zb}. The dual description becomes a non-gauge theory with gauge-singlet chiral superfields. From a viewpoint of the Seiberg duality, s-confinement corresponds to the case with vanishing magnetic gauge groups. After the Seiberg duality was first proposed in a simplest case \cite{Seiberg:1994bz}, many similar dualities were found in 4d \cite{Intriligator:1995id, Intriligator:1995ne, Pouliot:1995zc, Kutasov:1995ve, Kutasov:1995np, Intriligator:1995ax}. However, these dualities are not all generalized to 3d dualities\footnote{For 3d Seiberg dualities, see for example, \cite{Karch:1997ux, Aharony:1997gp, Giveon:2008zn, Niarchos:2008jb, Benini:2011mf, Kapustin:2011vz, Aharony:2013dha, Aharony:2013kma}.}. This is because the 3d theory has a Coulomb moduli space from the vector superfield, which is extremely modified from the classical picture due to quantum and non-perturbative effects. The lack of this understanding makes the construction of the 3d Seiberg duality very difficult. In this paper, we will give a quantum structure of the Coulomb branch of the 3d $\mathcal{N}=2$ exceptional gauge theories, paying attention to the s-confining phases. The corresponding 4d theories were studied in the literature \cite{Ramond:1996ku, Distler:1996ub, Karch:1997jp, Cho:1997am, Grinstein:1998bu, Pouliot:2001iw}. In four dimensional cases, the quantum low-energy phases are classified by the index constraint of the dynamical quarks \cite{Csaki:1996sm, Csaki:1996zb, Grinstein:1997zv, Grinstein:1998bu}. In order to have an s-confinement phase, the moduli fields cannot have any singularity at the origin of the moduli space. In addition, the gauge singlets (confined degrees of freedom) must be constrained by effective superpotentials in order to reduce the number of the independent Higgs branch operators, which results in a certain index constraints on the matter content \begin{align} T_2 (\mathbf{Adj.}) -\sum_i T_2 ( \mathbf{r}_i)=2, \end{align} where $T_2 ( \mathbf{r}_i)$ represents the Dynkin index of the representation $\mathbf{r}_i$ for the dynamical matter. The summation is taken over all the chiral superfields coupled with the vector multiplet. For phases with a quantum deformed moduli space to be possible, r-charges of certain products of the moduli coordinates should be canceled. This is possible only when the matter content satisfies a similar index constraint. \begin{align} T_2 (\mathbf{Adj.}) -\sum_i T_2 ( \mathbf{r}_i)=0, \label{3dscon_ind} \end{align} In three dimensional cases, a similar index constraint was obtained in \cite{Intriligator:2013lca, Witten:1999ds} for Chern-Simons-matter theories by requiring that the Witten index (see \cite{Witten:1982df, Smilga:2013usa}) should be unity. This results in the following index constraint \begin{align} T_2 (\mathbf{Adj.}) -\sum_i T_2 ( \mathbf{r}_i)=|k|, \end{align} where $k$ is a Chern-Simons level. Furthermore, as noticed in \cite{Aharony:1997bx, Csaki:2014cwa, Amariti:2015kha, Nii:2016jzi}, the 3d s-confinement phases are related to the 4d quantum-deformed moduli space via the dimensional reduction procedure. Therefore, it is natural to expect that the 3d s-confinement could appear from the 3d Yang-Mills theories with the index constraint \eqref{3dscon_ind}. As is well known, these index constraints are not sufficient but necessary conditions. Hence, it would be very important to examine whether or not the theories satisfying the index constraint actually exhibit s-confinement. In this paper, we investigate the 3d $\mathcal{N}=2$ exceptional gauge theories with fundamental matters, especially focusing on the s-confinement phases with the constraint \eqref{3dscon_ind}. The 3d $G_2$ case was already studied by the author \cite{Nii:2017npz}. The rest of this paper is organized as follows. In Section 2, we will review the low-energy dynamics of the 3d $\mathcal{N}=2$ $G_2$ gauge theory with fundamental matters, which illustrates how the classical Coulomb branch in the moduli space of vacua is truncated and modified. We discuss what kind of Coulomb branch can remain exactly massless and stable. From Section 3 to Section 5, we will study the 3d $\mathcal{N}=2$ $F_4$, $E_6$ and $E_7$ gauge theories with fundamental matters by focusing on the s-confinement phases. For the $E_6$ case, we can consider ``chiral'' and ``vector-like'' theories by changing the numbers of fundamental and anti-fundamental matters. In Section 6, we summarize these results and discuss future directions. \section{3d $\mathcal{N}=2$ $G_2$ gauge theory} In this section, we briefly review the low-energy dynamics of the 3d $\mathcal{N}=2$ $G_2$ gauge theory with $F$ fundamental matters. This was studied in \cite{Nii:2017npz} whereas the 4d $\mathcal{N}=1$ $G_2$ gauge theory was studied in \cite{Pesando:1995bq, Giddings:1995ns, Pouliot:1995zc, Pouliot:2001iw}. For the analysis of the Higgs branch which is the same as the 4d one, see \cite{Pesando:1995bq, Giddings:1995ns, Pouliot:1995zc, Pouliot:2001iw}. The elementary fields and their quantum numbers are summarized in Table \ref{G2F}. As opposed to the 4d case, the global symmetry of the theory is $SU(F) \times U(1) \times U(1)_R$ since there is no chiral anomaly. \begin{table}[H]\caption{3d $\mathcal{N}=2$ $G_2$ gauge theory with $F$ fundamental matters} \begin{center} \scalebox{1}{ \begin{tabular}{|c||c|c|c|c| } \hline &$F_4$&$SU(F)$&$U(1)$&$U(1)_R$ \\ \hline $Q$&$\mathbf{7}$&${\tiny \yng(1)}$&1&$r$ \\ \hline $M:=QQ$&1&${\tiny \yng(2)}$&2&$2r$ \\ $B:=Q^3$&1&${\tiny \yng(1,1,1)}$&3&$3r$ \\[5pt] $F:=Q^4$&1&${\tiny \yng(1,1,1,1)}$&4&$4r$ \\[7pt] \hline $Z_{SU(2)}$&1&1&$-2F$&$2F-6 -2Fr$ \\ \hline \end{tabular}} \end{center}\label{G2F} \end{table} Classically, there are various Coulomb branches which are accessible by tuning the vacuum expectation values of the adjoint scalar in a $G_2$ vector superfield. These are described by combinations of two monopole operators corresponding to two simple roots in the $G_2$ algebra. Along these Coulomb branches, by dualizing the resulting $U(1)$ vector superfield, we can obtain the Coulomb branch coordinates which are the chiral superfields. In the $G_2$ case, we can see two breaking patterns\footnote{For branching rules appearing in this paper, see for example \cite{Slansky:1981yr, Feger:2012bs}.} where the $SU(2)$ subgroup is unbroken \begin{align} G_2 & \rightarrow su(2) \times u(1) \nonumber \\ \mathbf{7} & \rightarrow \mathbf{2}_{\pm 1} +\mathbf{1}_{\pm 2} +\mathbf{1}_0 \\ \mathbf{14} & \rightarrow \mathbf{3}_0+\mathbf{1}_0+ \mathbf{2}_{\pm 3} +\mathbf{2}_{\pm 1} +\mathbf{1}_{\pm2}, \\ G_2 & \rightarrow su(2) \times u(1) \nonumber \\ \mathbf{7} & \rightarrow \mathbf{2}_{\pm 1}+ \mathbf{3}_{0} \\ \mathbf{14} & \rightarrow \mathbf{3}_{0}+ \mathbf{1}_{0} + \mathbf{1}_{\pm 2}+ \mathbf{4}_{\pm 1}. \end{align} Quantum-mechanically, the first Coulomb branch is not allowed since the low-energy $SU(2)$ gauge theory includes no massless dynamical quark and since its vacuum is unstable due to the Affleck-Harvey-Witten superpotential \cite{Affleck:1982as, Aharony:1997bx, deBoer:1997kr}. Therefore, the first Coulomb branch is removed from the quantum moduli space although it is classically allowed. On the other hand, the second Coulomb branch is quantum-mechanically flat and supersymmetric since the massless component $ \mathbf{3}_{0}$ from the fundamental matter allows a supersymmetric and stable vacuum. As a result, we need to introduce a single coordinate $Z_{SU(2)}$ to parametrize the second Coulomb branch. For a more detailed analysis of the $G_2$ Coulomb branch, see \cite{Nii:2017npz}. From Table \ref{G2F}, we can write down non-singular effective superpotentials for the range $1 \le F \le 4$ as follows \begin{gather} W_{F=1} = \left( \frac{1}{Z_{SU(2)} M} \right)^{\frac{1}{2}},~~~~~ W_{F=2} = \frac{1}{Z_{SU(2)} \det \, M } \\ W_{F=3} = \lambda \left[ Z_{SU(2)}(\det \, M-B^2) -1\right],~~~ W_{F=4} =Z_{SU(2)} \left( -\det \, M +F^2 +BMB \right), \end{gather} where $\lambda$ is a Lagrange multiplier field. For $F=4$ where \eqref{3dscon_ind} is satisfied, the theory is in an s-confinement phase and the low-energy dynamics is described by the gauge singlet chiral superfields $M, B, F$ and $Z_{SU(2)}$. Importantly, the origin of the moduli space is not singular and realizes the confinement without symmetry breaking. The F-flatness condition of $Z_{SU(2)}$ leads to $\det \, M =F^2 +BMB$ which realizes a classical syzygy between the Higgs branch operators \cite{Pouliot:2001iw}. For $F=3$, the low-energy theory is described by $M, B$ and $Z_{SU(2)}$ although these are related by one constraint $Z_{SU(2)}(\det \, M-B^2) =1$. Therefore, the origin of the moduli space is removed. Therefore, the confining phase with $F=3$ is necessarily accompanied by global symmetry breaking. For $F \le 2$, there is no stable SUSY vacuum. In the following sections, we will be interested in the s-confinement phases for other exceptional gauge groups. \section{3d $\mathcal{N}=2$ $F_4$ gauge theory} We start with the s-confinement phase in the 3d $\mathcal{N}=2$ $F_4$ gauge theory with $F$ fundamental matters. The dimension of the fundamental representation is $\mathbf{26}$ whereas the adjoint representation is denoted by $\mathbf{52}$. The Coulomb branch of the 3d $\mathcal{N}=2$ pure $F_4$ SYM theory without a matter was studied in \cite{Davies:2000nw} which focuses on the relation between the 3d and 4d theories. The low-energy dynamics of the 4d $\mathcal{N}=1$ $F_4$ gauge theory with $F$ fundamental matters was studied in \cite{Grinstein:1998bu, Cho:1997am, Pouliot:2001iw}. The Higgs branch in the 3d theory is the same as the 4d one and it is summarized in Table \ref{F4three}. \begin{table}[H]\caption{Fermion zero-modes for the $F_4$ fundamental monopoles} \begin{center} \begin{tabular}{|c||c|c| } \hline &adjoint& fundamental \\ \hline $Y_1$&2&0 \\ $Y_2$&2&0 \\ $Y_3$&2&2 \\ $Y_4$&2&2 \\ \hline $Z_{USp(6)}:=Y_1^2 Y_2^3 Y_3^2 Y_4$&$16$&$6$ \\ \hline \end{tabular} \end{center}\label{zeromodeF4} \end{table} Let us consider the Coulomb branch in the 3d $\mathcal{N}=2$ $F_4$ gauge theory with $F$ fundamental matters. Classically, the dimension of the Coulomb branch is four and described by four (fundamental) monopole operators corresponding to the simple roots in the $F_4$ algebra. However, the most of the classical Coulomb branches are not allowed since the vacuum of the unbroken gauge group is non-perturbatively unstable and non-supersymmetric. Table \ref{zeromodeF4} shows the numbers of the fermion zero-modes for the fundamental monopoles. The zero-modes of the adjoint fermion come from the gaugino field in the vector superfield. Since $Y_1$ and $Y_2$ only have two gaugino zero-modes, these monopoles can create a non-perturbative superpotential \cite{Affleck:1982as} \begin{align} W_{eff}= \frac{1}{Y_1} +\frac{1}{Y_2}. \label{monopoleWF} \end{align} For the pure $F_4$ SYM theory without a matter, the monopole generates a similar potential for $Y_3$ and $Y_4$ as well and lifts all the Coulomb branches. As a result, the 3d $\mathcal{N}=2$ pure $F_4$ SYM theory is not supersymmetric \cite{Davies:2000nw}. For the theory with fundamental matters, it would be natural to think that the Coulomb branch becomes two-dimensional due to \eqref{monopoleWF}. In the following discussion, we show that there are indeed two Coulomb branch operators and discuss their stability. The first Coulomb branch denoted by $Z_{USp(6)}$ corresponds to the gauge symmetry breaking \begin{align} F_4 & \rightarrow usp(6) \times u(1) \\ \mathbf{26} & \rightarrow \mathbf{14}_0 + \mathbf{6}_{\pm 1} \\ \mathbf{52} & \rightarrow \mathbf{21}_0 + \mathbf{14'}_{\pm 1} + \mathbf{1}_{\pm 2} + \mathbf{1}_0 \end{align} where $\mathbf{14}$ is a trace-less anti-symmetric tensor and $\mathbf{21}$ is an adjoint (symmetric) tensor in the unbroken $USp(6)$ subgroup. The Coulomb branch operator $Z_{USp(6)}$ corresponds to the dualized chiral superfield constructed from the low-energy $U(1)$ vector superfield. The components with non-zero $U(1)$ charges are all massive and integrated-out. This leads to the mixed Chern-Simons term between the $U(1)$ gauge and global symmetries \begin{align} k_{eff}^{U(1), Q} =6FQ_{\mathbf{26}} +16 Q_{\lambda}, \end{align} where $Q_{\mathbf{26}}$ is a global charge of the fundamental matters and $Q_{\lambda}$ is a global charge of the gaugino field. This operator can be exactly massless since the low-energy $USp(6)$ gauge theory has massless dynamical matters $\mathbf{14}_0$ and its vacuum is made stable and supersymmetric. The second candidate of the Coulomb branch operators that can survive quantum corrections corresponds to the gauge symmetry breaking \begin{align} F_4 & \rightarrow so(7) \times u(1) \\ \mathbf{26} & \rightarrow \mathbf{7}_0 + \mathbf{1}_{\pm 2} + \mathbf{8}_{\pm 1} + \mathbf{1}_0 \\ \mathbf{52} & \rightarrow \mathbf{21}_0 +\mathbf{1}_0+ \mathbf{7}_{\pm 2} + \mathbf{8}_{\pm 1}. \end{align} We denote this operator as $Z_{SO(7)}$. Along this branch, the fundamental matter reduces to the massless vector representation $\mathbf{7}_0$ which can make the vacuum of the low-energy $SO(7)$ theory stable and supersymmetric. This is possible only for $F \ge 5$ \cite{Nii:2018tnd}. In this paper, we are interested in confinement phases and we will find that the s-confinement occurs in $F=3$. Therefore, we don't consider the $SO(7)$ direction of the Coulomb branch in what follows. The zero-modes for these two monopole operators are listed in Table \ref{zeromodeF4CB}. \begin{table}[H]\caption{Fermion zero-modes of the Coulomb branch operators} \begin{center} \begin{tabular}{|c||c|c| } \hline &adjoint& fundamental \\ \hline $Z_{USp(6)}$&$16$&$6$ \\ $Z_{SO(7)}$&$22$&$10$ \\ \hline \end{tabular} \end{center}\label{zeromodeF4CB} \end{table} The s-confinement phase appears in the 3d $\mathcal{N}=2$ $F_4$ gauge theory with three fundamental matters, where the index constraint \eqref{3dscon_ind} is satisfied. The Higgs branch is studied in four dimensions \cite{Grinstein:1998bu, Cho:1997am, Pouliot:2001iw} and described by six composite operators. From Table \ref{F4three}, we can write down a effective superpotential as follows. \begin{align} W& = Z_{USp(6)} \biggl(N_9^2 +N_5^2N_4^2 +N_5^2 M_2^4 +N_5^2 N_4 M_2^2 +N_5M_2^5 M_3 +N_5 M_2^3N_4M_3 +N_5 M_2N_4^2M_3 \nonumber \\ &\quad + N_4^3N_6 +N_4^3 M_3^2+ N_4^2 M_2^2 N_6 +N_4^2M_2^2 M_3^2 +N_4 M_2^4 N_6 + N_4M_2^4M_3^2 +M_2^6 N_6 +M_2^6M_3^2\biggr) \label{3dF4W} \end{align} The F-flatness condition for $Z_{USp(6)}$ imposes one constraint between the Higgs branch operators and this is consistent with the classical Higgs branch: At a generic point of the Higgs branch, the gauge group is completely higgsed. Therefore, the $2 \times \mathbf{26}$ components of the three fundamental matters are eaten via the Higgs mechanism. The remaining components which explain the classical dimensions of the Higgs branch is $26$-dimensional. The total number of the Higgs branch operators introduced in Table \ref{F4three} is $27$ and the F-flatness condition for $Z_{USp(6)}$ correctly reduces them by one. \begin{table}[H]\caption{3d $\mathcal{N}=2$ $F_4$ gauge theory with $F=3$ fundamental matters} \begin{center} \scalebox{1}{ \begin{tabular}{|c||c|c|c|c| } \hline &$F_4$&$SU(F=3)$&$U(1)$&$U(1)_R$ \\ \hline $Q$&$\mathbf{26}$&${\tiny \yng(1)}$&1&$r$ \\ $\lambda$&$\mathbf{52}$&1&0&$1$ \\ $\eta=\Lambda^b$&1&1&$18$&$6F(r -1) +18=18r$ \\ \hline $M_2:=Q^2$&1&${\tiny \yng(2)}$&2&$2r$ \\ $M_3:=Q^3$&1&${\tiny \yng(3)}$&3&$3r$ \\ $N_{4}:=Q^4$&1&${\tiny \yng(2,2)} = {\tiny \overline{\yng(2)}}$&4&$4r$ \\[5pt] $N_{5}:=Q^5$&1&${\tiny \yng(2,2,1)} = {\tiny \overline{\yng(1)}}$&5&$5r$ \\[5pt] $N_{6}:=Q^6$&1&${\tiny \yng(2,2,2)} =1$&6& $6r$ \\[5pt] $N_{9}:=Q^9$&1&${\tiny \yng(3,3,3)} =1$&9& $9r$ \\[5pt] \hline $Z_{USp(6)}$&1&1&$-6F=-18$& $-6F(r-1) -16=2-18r$ \\ \hline \end{tabular}} \end{center}\label{F4three} \end{table} Let us test the validity of the above s-confinement phase by flowing to the Higgs branch where the low-energy theory becomes a 3d $\mathcal{N}=2$ $Spin(9)$ theory with three vectors and two spinors. This can be achieved by introducing a rank-$1$ vacuum expectation value to $\braket{M_2^{~33}}:=\braket{\delta^{ab}Q_a^{~3}Q_b^{~3}}=v^2$. Along this breaking, the fundamental matter is decomposed as $\mathbf{26} \rightarrow \mathbf{1}+\mathbf{9}+\mathbf{16}$ and a single $\mathbf{16}$ is eaten via the Higgs mechanism. In \cite{Nii:2018wwj}, it was shown that the 3d $\mathcal{N}=2$ $Spin(9)$ theory with three vectors and two spinors exhibits an s-confinement phase with a single Coulomb branch. The Coulomb branch of the low-energy $Spin(9)$ theory has $14$ matter fermion zero-modes from vector and spinor matters. The low-energy Coulomb branch is identified with $Z_{USp(6)}v^4$, where $v^4$ is absorbing four fermion zero-modes. This flow is consistent with our analysis of the $F_4$ s-confinement phase. Next, we consider a different Higgs branch along which the $SO(8)$ gauge symmetry remains unbroken. This can be achieved by introducing a non-zero expectation value to a fundamental matter such that $M_3:=d^{abc}Q_aQ_bQ_c$ is non-zero. The fundamental representation is decomposed as $\mathbf{26} \rightarrow \mathbf{8_v}+\mathbf{8_s} +\mathbf{8_c}+\mathbf{1}+\mathbf{1}$. The low-energy theory becomes a 3d $\mathcal{N}=2$ $Spin(8)$ gauge theory with two vectors, two spinors and two conjugate spinors. This theory was recently studied in \cite{Nii:2018wwj} and its low-energy theory exhibits s-confinement. The Coulomb branch of the $Spin(8)$ theory is one-dimensional and the monopole associated with this operator has $12$ fermion zero-modes from the matter fields. This is consistent with the Coulomb branch for the $F_4$ theory since the two fundamental $\mathbf{26}$ matters (one fundamental matter is eaten via the Higgs mechanism.) have $12$ fermion-zero modes. We can connect the 3d and 4d dynamics by putting the 4d $\mathcal{N}=1$ $F_4$ gauge theory with three fundamental matters on a circle. When the 4d theory is defined in $\mathbb{S}^1 \times \mathbb{R}^3$, there is an additional monopole configuration known as a KK-monopole \cite{Lee:1997vp, Lee:1998vu, Aharony:1997bx, Davies:2000nw}, which is a twisted instanton in $\mathbb{S}^1 \times \mathbb{R}^3$. The KK-monopole generates a non-perturbative superpotential \begin{align} W_{\mathbb{S}^1 \times \mathbb{R}^3} = \eta Z_{USp(6)}, \label{F4WKK} \end{align} where $\eta$ is a dynamical scale of the 4d gauge interaction. By combining the two effective superpotentials \eqref{3dF4W} and \eqref{F4WKK}, and by integrating out the Coulomb branch which is absent in a 4d limit, we can reproduce the 4d quantum-deformed constraint on the moduli space \cite{Cho:1997am, Grinstein:1998bu}. This serves as another test of our analysis. The similar analysis based on the Coulomb branch $Z_{USp(6)}$ is possible for small flavors $F \le 2$. For $F=1$ and $F=2$, we find that the symmetry argument is consistent with the following effective superpotentials \begin{align} W_{F=1} &= \left[ \frac{1}{Z_{USp(6)} (M_2^3+ M_3^2) } \right]^{\frac{1}{5}} \label{WF4f1}\\ W_{F=2} &= \left[ \frac{1}{Z_{USp(6)} (N_4^3 +N_4(M_2^4+M_2M_3^2) +M_2^6+M_2^3M_3^2+M_3^4) } \right]^{\frac{1}{2}}. \label{WF4f2} \end{align} These are runaway superpotentials and we can conclude that there is no stable supersymmetric vacuum for $F=1,2$. \section{3d $\mathcal{N}=2$ $E_6$ gauge theory} Let us move on to the 3d $\mathcal{N}=2$ $E_6$ gauge theory with dynamical matters in (anti-)fundamental representations. Again, we mostly restrict our attention to the s-confinement phase. The corresponding 4d theory was studied in \cite{Cho:1997am, Grinstein:1998bu, Pouliot:2001iw, Ramond:1996ku, Distler:1996ub, Karch:1997jp}. The structure of the Higgs branch is the same as the 4d one. In 4d, there are the three examples which exhibit a quantum-deformed moduli space \cite{Cho:1997am, Grinstein:1998bu} with the index constraint \eqref{3dscon_ind} satisfied. Corresponding to these cases, we will find the s-confinement descriptions of the 3d $E_6$ gauge theories. Since we are studying the 3d theory, there is a Coulomb branch of the adjoint scalar from the vector superfield. When the Coulomb branch operator $Z_{SU(6)}$ obtains a non-zero expectation value, the gauge group is spontaneously broken to \begin{align} E_6 & \rightarrow su(6) \times u(1) \\ \mathbf{27} & \rightarrow \mathbf{15}_0 + \overline{\mathbf{6}}_{\pm 1} \\ \overline{\mathbf{27}} & \rightarrow \overline{\mathbf{15}}_0 + \mathbf{6}_{\pm 1} \\ \mathbf{78} & \rightarrow \mathbf{35}_0 + \mathbf{1}_{0}+\mathbf{1}_{\pm 2} +\mathbf{20}_{\pm 1}. \end{align} This operator was studied also in the 4d $\mathcal{N}=1$ $E_6$ pure SYM theory defined on a circle \cite{Davies:2000nw}. The massless components $\mathbf{15}_0$ and $ \overline{\mathbf{15}}_0$ can make the vacuum of the low-energy $SU(6)$ gauge theory stable and supersymmetric. Therefore, this branch could be quantum-mechanically stable and exactly massless. For a pure $E_6$ SYM theory without a matter, the low-energy $SU(6)$ pure SYM theory generates a runaway potential \cite{Affleck:1982as, Aharony:1997bx} and there is no stable Coulomb brach. The massive components are integrated out and lead to the mixed Chern-Simons terms which give rise to the non-trivial charges of the Coulomb branch operator \cite{Intriligator:2013lca}. The zero-modes of the monopole corresponding to $Z_{SU(6)}$ is summarized in Table \ref{zeromodeE6CB}. Based on this Coulomb brach, we find three examples of s-confinement. \begin{table}[H]\caption{Fermion zero-modes of the $E_6$ Coulomb branch operator $Z_{SU(6)}$} \begin{center} \begin{tabular}{|c||c|c|c| } \hline &adjoint& fundamental & anti-fundamental \\ \hline $Z_{SU(6)}$&$22$&$6$ &$6$ \\ \hline \end{tabular} \end{center}\label{zeromodeE6CB} \end{table} \subsection{$E_6$ with four fundamental matters} The first example is a 3d $\mathcal{N}=2$ $E_6$ gauge theory with four fundamental matters. The quantum numbers of the Higgs and Coulomb branch operators are summarized in Table \ref{E640}. The effective superpotential becomes \begin{align} W_{N_f=4}= Z_{SU(6)} \left[ D^2 +C^4+C^3B^2+C^2B^4+CB^6+B^8 \right], \label{WsupE640} \end{align} which is consistent with all the symmetries. By giving an expectation value to $\braket{B}:=\braket{f_{abc}Q^aQ^b Q^c}=v^3$, the gauge group is higgsed to $F_4$. The matter fields are decomposed into $\mathbf{27} \rightarrow \mathbf{26}+\mathbf{1}$ and a single fundamental matter is eaten via the Higgs mechanism. Hence, the low-energy description becomes a 3d $\mathcal{N}=2$ $F_4$ gauge theory with three fundamental matters, which was studied in the previous section and exhibits an s-confinement phase. In the dual (confining) description, $D$ is identified with $v^3 N_9$ while $C$ is decomposed into $N_6, v N_5$ and $v^2 N_4$. The cubic composite $B$ reduces to $vM_2$ and $M_3$. By inserting them into \eqref{WsupE640}, the $F_4$ superpotential \eqref{3dF4W} is re-derived. The high- and low-energy Coulomb branches are identified as $Z_{SU(6)} v^6 \sim Z_{USp(6)} $. When the 4d $\mathcal{N}=2$ $E_6$ gauge theory is put on a circle, the twisted instanton, which is known also as a KK-monopole, generates a non-perturbative superpotential \begin{align} W= \eta Z_{SU(6)}, \label{WsupKKE6} \end{align} where $\eta$ is a dynamical scale of the 4d gauge interaction. In the 4d limit (de-compactification limit), the Coulomb brach is massive and should be integrated out. By combining \eqref{WsupE640} and \eqref{WsupKKE6}, we can reproduce the 4d quantum-deformed moduli space \cite{Cho:1997am, Grinstein:1998bu}. This is another consistency check of our analysis. We can also study the low-energy dynamics of the 3d $\mathcal{N}=2$ $E_6$ gauge theory with $F <4$ fundamental matters by using the Coulomb branch $Z_{SU(6)}$. For $F=1$ and $F=2$, the Higgs branch is described only by $B=Q^3$. For $F=3$, the Higgs branch is described by $B=Q^3$ and $C=Q^6$. For these cases, the effective superpotentials become \begin{gather} W_{F=1} = \left( \frac{1}{Z_{SU(6)} B^2} \right)^{\frac{1}{8}},~~~~ W_{F=2} = \left( \frac{1}{Z_{SU(6)} B^4} \right)^{\frac{1}{5}} \\ W_{F=3} = \left[ \frac{1}{Z_{SU(6)} (B^6 +B^4 C+C^3)} \right]^{\frac{1}{2}}, \end{gather} which are consistent with all the symmetries. These are also consistent with the $F_4$ superpotentials \eqref{WF4f1} and \eqref{WF4f2} via the deformation of $\braket{B}=v^3$. These superpotentials are runaway and there is no stable supersymmetric vacuum for $1 \le F \le 3$. By introducing the non-perturbative superpotential from the KK-monopole \eqref{WsupKKE6}, which is available for all $F$, and by integrating out the Coulomb branch operator, we can reproduce the 4d effective superpotential for $F \le 4$ \cite{Cho:1997am}. \begin{table}[H]\caption{3d $\mathcal{N}=2$ $E_6$ gauge theory with $4 \, \protect\Young[0]{1}$} \begin{center} \scalebox{1}{ \begin{tabular}{|c||c|c|c|c| } \hline &$E_6$&$SU(4)$&$U(1)$&$U(1)_R$ \\ \hline $Q$&$\mathbf{27}$&${\tiny \yng(1)}$&1&$r$ \\ $\eta=\Lambda^b$&1&1&$6F$&$6F(r-1) +24=24r$ \\ \hline $B:=Q^3$&1&${\tiny \yng(3)}$&3&$3r$ \\ $C:=Q^6$&1&${\tiny \overline{\yng(2)}}$&6&$6r$ \\ $D:=Q^{12}$&1&$1$&12&$12r$ \\ \hline $Z_{SU(6)}$&1&1&$-6F=-24$&$-6F(r-1) -22 =2-24r$ \\ \hline \end{tabular}} \end{center}\label{E640} \end{table} \subsection{$E_6$ with two (anti-)fundamental flavors} In the $E_6$ gauge group, we can freely introduce fundamental and anti-fundamental quarks since there is no chiral and parity gauge anomalies in 4d and 3d, respectively. The next example is a 3d $\mathcal{N}=2$ $E_6$ gauge theory with two fundamental and two anti-fundamental matters, which is a ``vector-like'' theory. The corresponding 4d theory was studied in \cite{Grinstein:1998bu}. The Higgs branch operators are summarized in Table \ref{E622}. The Coulomb branch is described by a single operator $Z_{SU(6)}$. We will not explicitly write down the effective superpotential. In the superpotential, the Coulomb branch operator linearly couples to a homogeneous function of ($Q, \bar{Q})$ with degree $Q^{12} \bar{Q}^{12}$. \begin{table}[H]\caption{3d $\mathcal{N}=2$ $E_6$ gauge theory with $2( \protect\Young[0]{1}+ \overline{\protect\Young[0]{1}})$} \begin{center} \scalebox{1}{ \begin{tabular}{|c||c|c|c|c|c|c| } \hline &$E_6$&$SU(2)$&$SU(2)$&$U(1)$&$U(1)$&$U(1)_R$ \\ \hline $Q$&$\mathbf{27}$&${\tiny \yng(1)}$&1&1&0&$r$ \\ $\bar{Q}$&$\overline{\mathbf{27}}$&1&${\tiny \yng(1)}$&0&1&$\bar{r}$ \\ $\eta=\Lambda^b$&1&1&1&$6F$&$6\bar{F}$&$6F(r-1) +24=24r$ \\ \hline $M_{Q\bar{Q}}:=Q\bar{Q}$&1&${\tiny \yng(1)}$&${\tiny \yng(1)}$&1&1&$r+\bar{r}$ \\ $B:=Q^3$&1&${\tiny \yng(3)}$&1&3&0&$3r$ \\ $\bar{B}:=\bar{Q}^3$&1&1&${\tiny \yng(3)}$&0&3&$3\bar{r}$ \\ $M_{2,2}:=Q^2 \bar{Q}^2$&1&${\tiny \yng(2)}$&${\tiny \yng(2)}$&2&2&$2r+2\bar{r}$ \\ $M_{1,4}:= Q\bar{Q}^4$&1&${\tiny \yng(1)}$&1&1&4&$r+4\bar{r}$\\ $M_{4,1}:=Q^4 \bar{Q}$&1&1&${\tiny \yng(1)}$&4&1&$4r +\bar{r}$ \\ $M_{3,3}:=Q^3 \bar{Q}^3$&1&${\tiny \yng(1)}$&${\tiny \yng(1)}$&3&3&$3r+3\bar{r}$ \\ $M_{4,4}:=Q^4 \bar{Q}^4$&1&1&1&4&4&$4r+4\bar{r}$ \\ $M_{6,6}:=Q^6 \bar{Q}^6$&1&1&1&6&6&$6r+6\bar{r}$\\ \hline $Z_{SU(6)}$&1&1&1&$-12$&$-12$&$2-12r -12 \bar{r}$ \\ \hline \end{tabular}} \end{center}\label{E622} \end{table} We can connect this low-energy dynamcis to the known s-confining phases. First, let us introduce a non-zero vev for $ \braket{M_{Q \bar{Q}}^{~~~22}}=v^2$, which breaks the gauge group into $Spin(10)$. The matter fields are decomposed into \begin{align} \mathbf{27} & \rightarrow \mathbf{16}+\mathbf{10}+\mathbf{1} \\ \overline{\mathbf{27}}& \rightarrow \overline{\mathbf{16}}+\mathbf{10}+\mathbf{1} \end{align} and a single set of a spinor and a conjugate spinor is eaten via the Higgs mechanism. As a result, we can flow to the 3d $\mathcal{N}=2$ $Spin(10)$ gauge theory with four vectors, one spinor and one conjugate spinor. This theory was studied in \cite{Nii:2018wwj} and it was shown that the low-energy dynamics is in s-confinement. The low-energy Coulomb branch operator is identified with $Z_{SU(6)} v^8$. Alternatively, by giving a non-zero vev to $\braket{B}:= \braket{f_{abc}Q^aQ^b Q^c}=v^3$, the low-energy theory becomes a 3d $\mathcal{N}=2$ $F_4$ gauge theory with three fundamental matters, which is again s-confining. The high- and low-energy Coulomb branches are related by $Z_{SU(6)} v^6 \sim Z_{USp(6)}$. This is consistent with our analysis of the Coulomb branches since $v^6$ is absorbing six fermion zero-modes of $Z_{SU(6)}$ and $Z_{SU(6)} v^6 $ has $18$ zero-modes. \subsection{$E_6$ with three fundamental and one anti-fundamental matters} The third example is a 3d $\mathcal{N}=2$ $E_6$ gauge theory with three fundamental matters and a single anti-fundamental matter, which is a ``chiral'' theory. The monopole operator corresponding to $Z_{SU(6)}$ has $18$ fundamental zero-modes and $6$ anti-fundamental zero-modes. The matter fields and the moduli coordinates are summarized in Table \ref{E631}. In the effective superpotential, the Coulomb branch operator $Z_{SU(6)}$ linearly couples to a homogeneous function of ($Q, \bar{Q})$ with degree $Q^{18} \bar{Q}^6$. At a generic point of the Higgs branch, the $E_6$ gauge symmetry could be completely higgsed. Hence, the dimension of the classical Higgs branch is $30$. The total number of the Higgs branch coordinates is $31$ and one constraint must be imposed between them. The F-flatness condition for $Z_{SU(6)}$ correctly reduces them by one. As in the previous subsection, by introducing a vev to $ \braket{M^{~~~31}_{Q \bar{Q}}}=v^2$, we can flow to the 3d $Spin(10)$ theory with four vectors and two spinors. As studied in \cite{Nii:2018wwj}, the low-energy dynamics of the $Spin(10)$ theory exhibits s-confinement. The low-energy Coulomb branch of the $Spin(10)$ theory is identified with $Z_{SU(6)} v^8$. Alternatively, when $B$ obtains a non-zero vev, the theory flows to the 3d $\mathcal{N}=2$ $F_4$ gauge theory with three fundamental matters, which was studied in the previous section and exhibits s-confinement. \begin{table}[H]\caption{3d $\mathcal{N}=2$ $E_6$ gauge theory with $3 \, \protect\Young[0]{1}+ \overline{\protect\Young[0]{1}}$} \begin{center} \scalebox{0.95}{ \begin{tabular}{|c||c|c|c|c|c| } \hline &$E_6$&$SU(3)$&$U(1)$&$U(1)$&$U(1)_R$ \\ \hline $Q$&$\mathbf{27}$&${\tiny \yng(1)}$&1&0&$r$ \\ $\bar{Q}$&$\overline{\mathbf{27}}$&1&0&1&$\bar{r}$ \\ $\eta=\Lambda^b$&1&1&$18$&$6$&$18(r-1)+6(\bar{r}-1) +24=18r + 6 \bar{r}$ \\ \hline $M_{Q \bar{Q}}:=Q \bar{Q}$&1&${\tiny \yng(1)}$&1&1&$r+ \bar{r}$ \\ $B:=Q^3$&1&${\tiny \yng(3)}$&3&0&$3r$ \\ $\bar{B}:= \bar{Q}^3$&1&1&0&3&$3 \bar{r}$ \\ $M_{2,2}:=Q^2 \bar{Q}^2$&1&${\tiny \yng(2)}$&2&2&$2r +2 \bar{r}$ \\ $M_{4,1}:=Q^4 \bar{Q}$&1&${\tiny \yng(2,2)}={\tiny \overline{\yng(2)}}$&4&1&$4r +\bar{r}$ \\ $M_{6,0}:=Q^6$&1&1&6&0&$6r$ \\ $M_{5,2}:=Q^5 \bar{Q}^2$&1&${\tiny \yng(2,2,1)}={\tiny \overline{\yng(1)}}$&5&2&$5r +2\bar{r}$ \\ $M_{9,3}:= Q^9 \bar{Q}^3$&1&1&9&3&$9r +3 \bar{r}$ \\ \hline $Z_{SU(6)}$&1&1&$-18$&$-6$&$-18(r-1)-6(\bar{r}-1) -22=2-18r -6 \bar{r}$ \\ \hline \end{tabular}} \end{center}\label{E631} \end{table} \section{3d $\mathcal{N}=2$ $E_7$ gauge theory} Finally, we investigate the 3d $\mathcal{N}=2$ $E_7$ gauge theory with $F$ fundamental matters. The fundamental representation is $\mathbf{56}$ dimensional whereas the adjoint representation is denoted by $\mathbf{133}$. The 3d s-confinement phase appears for $F=3$, where the index constraint \eqref{3dscon_ind} is satisfied. The Higgs branch\footnote{The Higgs branch for higher $F$ is not completely understood since there are very complicated syzygies between the Higgs branch coordinates. This makes the understanding of the exceptional Seiberg duality difficult even in 4d.} is studied in 4d \cite{Cho:1997am, Grinstein:1998bu, Pouliot:2001iw} and its coordinates for $F=3$ are summarized in Table \ref{E7}. We here focus on the analysis of the Coulomb branch in the 3d $\mathcal{N}=2$ $E_7$ gauge theory, which is absent in 4d. The Coulomb branch denoted by $Z_{SO(12)}$ corresponds to the gauge symmetry breaking \begin{align} E_7 & \rightarrow so(12) \times u(1) \label{E7breaking} \\ \mathbf{56} & \rightarrow \mathbf{12}_{\pm 1} + \mathbf{32'}_{0} \\ \mathbf{133} & \rightarrow \mathbf{66}_{0} + \mathbf{1}_{0} + \mathbf{1}_{\pm 2} + \mathbf{32}_{\pm 1} \end{align} where $Z_{SO(12)}$ corresponds to the unbroken $U(1)$ subgroup. This Coulomb branch was studied in \cite{Davies:2000nw} to study the 4d $\mathcal{N}=1$ $E_7$ pure SYM theory without a matter on a circle. In this breaking, the massless component $\mathbf{32'}_{0}$ from the fundamental representations can make the low-energy vacuum of the $Spin(12)$ gauge theory stable and supersymmetric. Therefore, this branch can be exactly massless after including the quantum corrections. The mixed Chern-Simons terms are generated due to the one-loop diagrams of the massive components which have non-zero $U(1)$ charges. This leads to a non-trivial mixing between the $U(1)$ global and topological symmetries. The components $\mathbf{12}_{\pm 1}$ generate $12$ fermion zero-modes around the monopole background associated with $Z_{SO(12)}$. The massive components $\mathbf{1}_{\pm 2} + \mathbf{32}_{\pm 1}$ from the gaugino field have the $34$ adjoint zero-modes around the monopole. These zero-modes give rise to the non-zero charges to the Coulomb branch operator $Z_{SO(12)}$ as in Table \ref{E7}. Although we will not explicitly write down the effective superpotential of the s-confining phase for $F=3$, the Coulomb branch $Z_{SO(12)}$ linearly couples to a homogeneous function of the Higgs branch operators with degree $Q^{36}$ in the superpotential. By flowing to the Higgs branch, we can find the consistency of the Coulomb branch introduced above. When a single fundamental matter obtains a non-zero vacuum expectation value such that $\braket{B_4}$ is non-zero, the $E_7$ gauge group is higgsed into the $E_6$ gauge group. The fundamental $\mathbf{56}$ matter reduces to the (anti-)fundamental flavors $\mathbf{27}+\overline{\mathbf{27}}$ (plus two singlets) and the Higgs mechanism eats a single set of $\mathbf{27}+\overline{\mathbf{27}}$. Therefore, the theory flows to the 3d $\mathcal{N}=2$ $E_6$ gauge theory with two (anti-)fundamental flavors. This theory was studied in the previous section, which exhibited the s-confinement phase. From a viewpoint of the above breaking \eqref{E7breaking}, giving a vev to $\mathbf{56}$ corresponds to a vev for $ \mathbf{32'}_{0}$, which breaks $SO(12)$ into $SU(6)$. This is consistent with the Coulomb branch $Z_{SU(6)}$ of the $E_6$ theory. The two sets of massive vectors $\mathbf{12}_{\pm 1} $ (one set of $\mathbf{12}_{\pm 1}$ is eaten via the Higgs mechanism.) create $24$ fermion zero-modes and exactly the same as the zero-modes of the $E_6$ Coulomb branch. The low- and high-energy Coulomb branches are related as \begin{align} Z_{SO(12)} v^{12} \sim Z_{SU(6)}, \end{align} where $v$ is a vev for the fundamental matter $\mathbf{56}$. We can introduce another expectation value to $M_2$ (a composite constructed from an anti-symmetric invariant tensor $f^{\alpha \beta}$), where the theory flows to the 3d $\mathcal{N}=2$ $Spin(11)$ theory with five vectors and one spinor. As studied in \cite{Nii:2018wwj}, the low-energy dynamics of the $Spin(11)$ theory exhibits s-confinement. This is another test of our analysis. \begin{table}[H]\caption{3d $\mathcal{N}=2$ $E_7$ gauge theory for $F=3$} \begin{center} \scalebox{1}{ \begin{tabular}{|c||c|c|c|c| } \hline &$E_7$&$SU(3)$&$U(1)$&$U(1)_R$ \\ \hline $Q$&$\mathbf{56}$&${\tiny \yng(1)}$&1&$r$ \\ $\lambda$&$\mathbf{133}$&1&0&$1$ \\ $\eta=\Lambda^b$&1&1&36&$36r$ \\ \hline $M_2:=Q^2$&1&${\tiny \overline{\yng(1)}}$&2&$2r$ \\ $B_4:=Q^4$&1&${\tiny \yng(4)}$&4&$4r$ \\ $B_6:=Q^6$&1&${\tiny \overline{\yng(3)}}$&6&$6r$ \\ $B_8:=Q^{8}$&1&${\tiny \yng(2)}$&8&$8r$ \\ $B_{12}:=Q^{12}$&1&1&12&$12r$ \\ $B_{18}:=Q^{18}$&1&1&18&$18r$ \\ \hline $Z_{SO(12)}$&1&1&$-12F=-36$& $-12F(r-1) -34=2-36r$ \\ \hline \end{tabular}} \end{center}\label{E7} \end{table} We can connect the 3d theory to the 4d $\mathcal{N}=1$ $E_7$ gauge theory with three fundamental matters. The 4d low-energy dynamics exhibits a quantum-deformed moduli space with a single constraint \cite{Cho:1997am, Grinstein:1998bu}. By putting the 4d theory on a circle-compactified manifold $\mathbb{S}^1 \times \mathbb{R}^3$, we can connect the low-energy 3d and 4d dynamics. When the 4d theory is defined on a circle, we have an additional monopole configuration known as a KK-monopole (or called a twisted instanton) which generates a non-perturbative superpotential \cite{Lee:1997vp, Aharony:1997bx, Davies:2000nw} \begin{align} W= \eta Z, \end{align} where we defined $\eta:= \Lambda^b$. $\Lambda$ is a dynamical scale of the 4d gauge interaction and $b$ is a coefficient of the one-loop beta function. By adding this potential to the 3d s-confinement phase and integrating over the Coulomb branch operator which is absent in a 4d limit, we can recover the 4d deformed moduli space studied in \cite{Cho:1997am, Grinstein:1998bu}. \section{Summary and Discussion} In this paper, we found the s-confinement phases for the 3d $\mathcal{N}=2$ exceptional gauge theories with fundamental matters by identifying the quantum Coulomb branch operators which are stable and exactly massless. We observed that the s-confinement phases appear when the index constraint \eqref{3dscon_ind} is satisfied. Those new examples include $F_4$, $E_6$ and $E_7$ gauge groups, where the Coulomb branch operators preserve $USp(6)$, $SU(6)$ and $SO(12)$ gauge symmetries, respectively. We argued that the Coulomb branch operators discussed here are connected to each other via the Higgs branch flow. By giving a non-zero vev to the other Higgs branch coordinate, we can also flow to the known s-confinement phases of the 3d $\mathcal{N}=2$ $Spin(N)$ gauge theories \cite{Nii:2018wwj}. For the $E_6$ cases, we studied the ``chiral'' and ``vector-like'' theories with fundamental and anti-fundamental matters. By introducing the non-perturbative superpotential from the KK-monopole (a twisted instanton on $\mathbb{S}^1 \times \mathbb{R}^3$), we reproduced the quantum-deformed moduli space of the corresponding 4d theories. In this paper, we focused on the s-confinement phases of the exceptional gauge theories. Therefore, the number of the fundamental flavors was restricted from above. For the theory with more flavors, it will be anticipated that the theory has a non-abelian Coulomb phase and hence the moduli space will include singularities which signal that there are additional massless degrees of freedom along the singularities. As we briefly explained in the $F_4$ case, the Coulomb branch for the theory with more fundamental matters can have additional Coulomb branch and the low-energy analysis will become more complicated. It would be important to investigate those phases. This additional Coulomb branch is consistent with the analysis of the 3d $Spin(N)$ gauge theories \cite{Nii:2018wwj} where we need to introduce various Coulomb branch operators depending on the number of spinor matters. As a further check of this, we can compute the superconformal indices \cite{Bhattacharya:2008bja, Kim:2009wb, Kapustin:2011jm} by employing a localization technique. This will be left as a future work. For the exceptional gauge groups, the self-dualities were proposed in 4d \cite{Pouliot:1995zc, Ramond:1996ku, Distler:1996ub, Karch:1997jp} although they do not satisfy the 't Hooft anomaly matching conditions of the discrete symmetries except for the $G_2$ case \cite{Csaki:1997aw}. The resolution of this mismatch is to consider the Kutasov-type duality \cite{Kutasov:1995ve, Kutasov:1995np, Csaki:1997aw} which is a Seiberg duality with a tree-level superpotential breaking the discrete symmetries. However, it is not clear whether or not this way out completely cures the problem. It is worthwhile studying the 3d and 4d dualities for the exceptional gauge theories and more rigorously test the validity of the proposed dualities. \section*{Acknowledgments} This work is supported by the Swiss National Science Foundation (SNF) under grant number PP00P2\_183718/1. \bibliographystyle{ieeetr}
\section{Introduction} Anderson localization in random Schr\"odinger operators is quite well understood. Mathematical proofs of this phenomenon have been given under a variety of conditions. See the recent book by Aizenman and Warzel for an overview of the state-of-the-art \cite{aizenman:2015}. The physical phenomenon is a drastic slowdown of transport in the system's dynamics, which is seen as the consequence of a change in the nature of the spectrum from continuous spectrum (extended states) to pure point spectrum (localized states). The problem of Many-Body Localization (MBL) is the question of what happens to localization properties in the presence of interactions. Although Anderson in his work that started the subject of localization \cite{anderson:1958} envisioned the phenomenon for interacting systems, research on MBL picked up only relatively recently stimulated by papers by Basko, Aleiner, and Altshuler \cite{basko:2006}, Oganesyan and Huse \cite{oganesyan:2007}, and Pal and Huse \cite{pal:2010}. Quantum spin system with, for example, nearest neighbor interactions, are among the simplest interacting quantum many-body systems and much of the recent work on MBL dealt with one of just three one-dimensional quantum spin models: the $XY$ chain, the quantum Ising chain, and the $XXZ$ chain. The small number of rigorous results that have been obtained so far are also mostly restricted to these three models. Exponential dynamical localization, uniformly in time, was proved for a class of disordered $XY$ chains by exploiting their connection to Anderson models \cite{hamza:2012,sims:2016,abdul-rahman:2017}. Imbrie studied the quantum Ising chain with random couplings and fields \cite{imbrie:2016}. Localization properties in the low-energy region, called the droplet-regime, of the ferromagnetic XXZ chain were proved in \cite{elgart:2018b,elgart:2018,elgart:2018a,beaud:2017,beaud:2018}. For a single quantum particle, the study of localization for a long time focused on spectral properties. i.e., proving the occurrence of point spectrum with associated eigenvectors that satisfy exponential decay. Later, multi-scale analysis \cite{germinet:2001} and the fractional-moment method \cite{aizenman:1993} emerged as two powerful tools to study dynamical localization. Systems of $N$ interacting particles can be analyzed by extending these methods, as along as $N$ is fixed \cite{chulaevsky:2009,aizenman:2009}. The first main result of this work is the proof of a relation between uniform dynamical localization and the existence of Local Integrals of Motion (LIOM). The LIOM picture \cite{serbyn:2013a,chandran:2015} has been proposed as the mechanism by which systems exhibiting MBL do not thermalize under their own (closed system) dynamics and, in particular, that violate the Eigenfunction Thermalization Hypothesis (ETH). We give two definitions of LIOMs, consistent with the different ways this concept has been considered in the literature. For lack of a better name, we call them LIOMs of the first kind {Definition \ref{def:LIOM}} and LIOMS of the second kind (Definition \ref{def:LIOM2}). The first kind implies dynamical localization of the form generically expected for strongly disordered quantum spin chains. The second kind, as we show, exist when we have uniform-in-time dynamical localization, such as has been proved to occur in the random $XY$ chain \cite{hamza:2012}. In interacting many-body systems it is most natural to express localization in terms of dynamical properties directly. A good (but not typcial) example is the zero-velocity Lieb-Robinson bound proved for the disordered $XY$ chain in \cite{hamza:2012}. In this work, we introduce the notion of {\em transmission time}, as the smallest time a signal or disturbance can reach a prescribed strength a given distance away from the source. See Definition \ref{def:transmission_time}. For exponentially localized systems, we expect transmission times grow exponentially with the distance. We then prove that exponentially localized systems perturbed by sparse disorder, have transmission times that grow at least as a power law and we we give a lower bound for the power that diverges with increasing sparseness of the perturbation. A large power indicates sub-diffusive behavior. We model the sparse disorder by adding a uniformly bounded but otherwise arbitrary nearest-neighbor term to the Hamiltoian at locations determined by a Bernoulli process with small probability of success. De Roeck and coworkers have argued that MBL, interpreted as the complete absence of transport, is only possible in one-dimensional systems. They argue that diffusion of energy is inevitable in higher dimensions \cite{de-roeck:2015,de-roeck:2016,de-roeck:2017,de-roeck:2017a,luitz:2017,thiery:2018}. We only study one dimensional systems in this work, and therefore we do not have results that either support or contradict these arguments. Rather, for one-dimensional systems our results implies a degree of robustness of localization phenomena in the sense of slow propagation. Others have investigated stability of MBL in spin chains under the influence of regions of low disorder or coupling to a heat bath \cite{goihl:2019}, in a kicked quantum spin chain model \cite{braun:2019} and by extensive numerical calculation for the Heisenberg chain \cite{suntajs:2019}. The latter studies consider properties of the spectral form factor (i.e., the Fourier transform of a two-point function) to look for an indicator of an MBL-type transition. It would be interesting to supplement these studies with information about transmission times in these models. In Section \ref{sec:mainresults} we introduce several definitions related to MBL and describe our main results. The proofs are in Section \ref{sec:proofs}. Two applications are discussed in Section \ref{sec:applications}. Some auxiliary facts are collected in an appendix. \section{Many-body localization properties and main results}\label{sec:mainresults} In this section we define several properties associated with localized many-body systems. We focus on characteristics of the dynamics in terms of which our main results are formulated and restrict ourselves to the one-dimensional setting. All notions make sense for multi-dimensional systems but, as discussed in the introduction, the phenomenon of many-body localization as it is commonly understood may well be restricted to one dimension. We will consider subsystems of a chain of quantum systems labeled by $x\in\mathbb{Z}$, with a finite-dimensional Hilbert space $\H_x$ for each $x\in\mathbb{Z}$. The Hilbert space of the subsystem associated with a finite set $X\subset\mathbb{Z}$, is given by $\H_X=\bigotimes_{x\in X} \H_x$, and the observables measurable in this subsystem are given by $\mathcal{A}_X:=\mathcal{B}(\H_X)$. The elements of $\mathcal{A}^{\text loc}:= \bigcup_{X\subset\mathbb{Z}} \mathcal{A}_X$, where the union is over finite subsets, are called the {\em local observables}, whereas the norm completion of $\mathcal{A}^{\text loc}$, denoted by $\mathcal{A}_\mathbb{Z}$, is the algebra of quasi-local observables. We denote the closed unit ball of $\mathcal{A}_X$ by $\mathcal{A}_X^1$. A convenient way to specify a model is with an interaction, which is a map $\Phi$ assigning to each finite set $X\subset\mathbb{Z}$ an element $\Phi(X)=\Phi(X)^*\in \mathcal{A}_X$. Associated to the interaction $\Phi$ is the family of local Hamiltonians $H_\Lambda=\sum_{X\subset\Lambda}\Phi(X)\in\mathcal{A}_\Lambda$, defined for each finite subset $\Lambda\subset\mathbb{Z}$. The Heisenberg dynamics generated by a family of local Hamiltonians determined by an interaction $\Phi$ is defined in the usual way: \begin{equation} \tau_t^{H_\Lambda}(A)=e^{itH_\Lambda}Ae^{-itH_\Lambda} \end{equation} The interactions $\Phi$ may be random, meaning the following: There is a probability space $(\Omega,\mathcal{F},\mathbb{P})$, and to each $\omega\in\Omega$ there is assigned an interaction $\Phi(\omega)$. We assume weak measurability of the random operators $\omega\mapsto \Phi(\omega)(X)$ for each finite $X\subset\mathbb{Z}$. A finite range interaction is one for which there exists $R\geq 0$ such that $\Phi(X)=0$ unless $\mathop{\rm diam} X \leq R$. $R$ is then the {\em range} of the interaction. A common way to introduce a model with a finite-range interaction is to specify self-adjoint $h_x\in \mathcal{A}_{[x,x+R]}$, for each $x\in \mathbb{Z}$. \subsection{Dynamical Localization} In the single-particle setting, dynamical localization refers to the absence of ballistic or diffusive propagation in the system's Schr\"{o}dinger evolution. Initially localized wave functions remain localized for all time under the dynamics. A natural analogue of this property in the setting of quantum spin chains is localization of the Heisenberg dynamics. We consider a general notion of dynamical localization expressed by the following definition. \begin{definition}\label{def:dynlocaliz} Let $F:\mathbb{Z}_+\to (0,\infty)$ be a non-increasing function with the property $\lim_{x\to\infty}F(x)=0$.\newline (i) We say that a family $\{H_\Lambda:\Lambda\subset\mathbb{Z} \text{ finite intervals}\}$ of random local Hamiltonians $H_\Lambda\in\mathcal{A}_\Lambda$ exhibits dynamical localization with decay function $F$ if there exists a constant $\beta\geq0$ and a function $\chi:\mathbb{N}\to(0,\infty)$ such that for any sets $X,Y\subseteq \Lambda$ with $Y\subset[\min X,\max X]^c$, the random variable \begin{equation}\label{heislocal} C_{\Lambda;X,Y}\equiv\sup_{t\in\mathbb{R}}\sup_{\substack{A\in\mathcal{A}_X^1\\ B\in\mathcal{A}_Y^1}}\frac{\Vert [\tau_t^{H_\Lambda}(A),B] \Vert}{\chi(|X|)(1+|t|^\beta)} \end{equation} satisfies \begin{equation}\label{uniform_exp_loc} \mathbb{E} C_{\Lambda;X,Y}\leq F(d(X,Y)) \end{equation} Here $d(X,Y)=\min\{|x-y|: x\in X,y\in Y\}$ is the usual set distance. \noindent (ii) If $F$ is of the form $F(x)=e^{-\eta x}$ we say the family $\{H_\Lambda\}$ exhibits exponential dynamical localization. In this case $\eta^{-1}$ is called (a bound for the) {localization length}. \noindent (iii) If $F$ is of the form $F(x)=e^{-\eta x^\rho}$ for some $\rho\in (0,1)$, we say the family $\{H_\Lambda\}$ exhibits stretched exponential dynamical localization. \noindent(iv) We say the family $\{H_\Lambda\}$ exhibits dynamical localization with decay function $F$ uniformly in time if it satisfies (i) with $\beta=0$. \end{definition} The following lemma shows that if a family of local Hamiltonians is dynamically localized and the corresponding family of local dynamics has a thermodynamic limit, then the infinite volume dynamics is also dynamically localized with the same decay function. \begin{lemma} Suppose that $\{H_\Lambda\}$ is a family of dynamically localized Hamiltonians with decay function $F$, and that the corresponding family of dynamics $\{\tau_t^{H_\Lambda}\}$ has a thermodynamic limit. In other words, there is an exhaustive sequence $\Lambda_n\uparrow\mathbb{Z}$ such that almost surely, \begin{equation} \lim_{n\to\infty}\tau_t^{H_{\Lambda_n}}\equiv \tau_t \end{equation} strongly for all $t\in\mathbb{R}$, where $\tau_t$ is a $*$-automorphism of $\mathcal{A}_\mathbb{Z}^\text{loc}$. Then for any finite set $X\subset \mathbb{Z}$ and any set $Y\subseteq [\min X,\max X]^c$, the random variable \begin{equation} C_{X,Y}\equiv\sup_{t\in\mathbb{R}}\sup_{\substack{A\in\mathcal{A}_X^1\\ B\in\mathcal{A}_Y^1}}\frac{\Vert [\tau_t(A),B] \Vert}{\chi(|X|)(1+|t|^\beta)} \end{equation} satisfies \begin{equation} \mathbb{E} C_{X,Y}\leq F(d(X,Y)) \end{equation} \end{lemma} \begin{proof} First let $X,Y\subset\mathbb{Z}$ be finite, with $Y\subset [\min X,\max X]^c$. It follows immediately that, \begin{equation} C_{ X,Y}=\sup_{t\in\mathbb{R}}\sup_{\substack{A\in\mathcal{A}_X^1\\ B\in\mathcal{A}_Y^1}}\frac{\Vert [\tau_t(A),B] \Vert}{\chi(|X|)(1+|t|^\beta)}\leq \liminf_{n\to\infty} C_{\Lambda_n;X,Y}. \end{equation} By Fatou's lemma, $\mathbb{E} C_{ X,Y} \leq F(d(X,Y))$. Now suppose $Y\subseteq[\min X,\max X]^c$ is infinite. For any sequence of finite sets $Y_n\uparrow Y$, by using local approximations and the fact that $C_{X,Y_n}$ is monotone in $n$ we obtain \begin{equation} C_{X,Y}\leq \lim_{n\to\infty} C_{X,Y_n}, \end{equation} which proves the lemma. \end{proof} \subsection{Local Integrals of Motion} The lack of ergodicity seen in MBL systems can be `explained' as a consequence the emergence of an extensive set of local conserved quantities, called local integrals of motion (LIOMs). In this section we propose precise definitions of LIOMs. Heuristic definitions of LIOMs have been given in the physics literature, \cite{huse:2014}, \cite{serbyn:2013}. LIOMs are thought to account for most of the phenomena of MBL. See, for example, the review paper \cite{imbrie:2017}. To address the variety seen in the physics literature we formulate two distinct definitions. Specifically, Definition \ref{def:LIOM} given below is modeled after the discussion in \cite{huse:2014}, while Definition \ref{def:LIOM2} was motivated by \cite{chandran:2015}. We refer to them as LIOMs of the first kind and LIOMs of the second kind, respectively. We briefly discuss the relation between the two at the end of this section. In the following definition we restrict our attention to quantum spin chains, for simplicity. The definition can also be formulated in higher-dimensions. Let $d_x\geq 2$ denote the dimension of the Hilbert space at $x\in\mathbb{Z}$. \begin{definition}[{\bf LIOMs of the first kind}]\label{def:LIOM} Let $H_n\in\mathcal{A}_{[0,n]}$ be a sequence of random Hamiltonians. We say that the sequence $H_n$ has LIOMs of the first kind if the following conditions are satisfied: \begin{enumerate} \item There is a sequence of random unitary maps $U_n\in\mathcal{A}_{[0,n]}$ such that \begin{equation} U_n^*H_nU_n=\sum_{X\subseteq[0,n]}\sum_{{\bf m}\in\prod_{x\in X} \{2,...,d_x\}}\phi_n({\bf m},X)\prod_{x\in X}S_{{\bf m}_x;x}, \end{equation} where $S_{m;x}$ is the operator supported at the site $x$ given by the matrix, \begin{equation} (S_{m;x})_{jk}=\delta_{j,1}\delta_{k,1}-\delta_{j,m}\delta_{k,m} \end{equation} and the $\phi_n({\bf m},X)$ are random variables satisfying \begin{equation}\label{liom2pt} \sup_{n}\, \mathbb{E} \left[\sup_{x,y\in[0,n]} \frac{1}{F(|x-y|)} \sum_{\substack{X\subseteq[0,n]:\\ x,y\in X}}\left\|\sum_{{\bf m}\in\prod_{x\in X} \{2,...,d_x\}}\phi_n({\bf m},X)\prod_{x\in X} S_{{\bf m}_x;x}\right\| \right]<\infty. \end{equation} for some non-increasing function $F:\mathbb{Z}_+\to(0,\infty)$ satisfying $\lim_{x\to\infty}F(x)=0$. \item The sequence of unitary maps $U_n$ is quasi-local, in the sense that for all disjoint finite subsets $X,Y\subset\Gamma$, \begin{equation}\label{liomqloc} \sup_n\mathbb{E} \sup_{\substack{A\in\mathcal{A}_X^1\\ B\in\mathcal{A}_Y}}\|[ U_n^*AU_n,B]\| \leq \sum_{\substack{x\in X\\y\in Y}}G(|x-y|), \end{equation} for some non-increasing function $G:\mathbb{Z}_+\to(0,\infty)$ satisfying $\lim_{x\to\infty}G(x)=0$. \end{enumerate} \end{definition} \begin{Remark} The LIOMs in definition \ref{def:LIOM} are the quasi-local operators $U_nS_{m;x}U_n^*$. The key feature of the family $\{S_{m;x}\}_{m=2}^{d_x}$ is that the operators are uniformly bounded, are mutually commuting, and generate a maximal abelian subalgebra of observables. Any other set of observables with these properties could be used in the definition instead. \end{Remark} The following theorem shows that the Heisenberg dynamics generated by a Hamiltonian with LIOMs of the first kind satisfies the type of propagation bound expressing dynamical localization. \begin{theorem}\label{prop:LIOM_LRbound} Suppose that the sequence of Hamiltonians $H_n$ has LIOMs of the first kind. Let $X$ and $Y$ be finite disjoint subsets of $\mathbb{Z}_+$. For a set $Z\subset\mathbb{Z}_+$, let $Z_{n,\lambda}=\{x\in[0,n]: d(x,Z)\leq \lambda d(X,Y)\}$. Then for $\lambda\in(0,1/2)$, \begin{equation} \sup_{\substack{A\in\mathcal{A}_X^1\\ B\in\mathcal{A}_Y^1}}\|[\tau_t^{H_n}(A),B]\|\leq 2\bigg[ D_{n,X,\lambda}+D_{n,Y,\lambda}+|t|C_n \sum_{\substack{x\in X_{n,\lambda}\\y\in Y_{n,\lambda}}} F(|x-y|)\bigg], \end{equation} where $D_{n,X,\lambda}$ and $D_{n,Y,\lambda}$ are nonnegative random variables satisfying, \begin{align} \mathbb{E} D_{n,X,\lambda}\leq \sum_{\substack{x\in X\\y\in X_{n,\lambda}^c}}G(|x-y|) \text{\,\,\, and\,\,\, }\mathbb{E} D_{n,Y,\lambda}\leq \sum_{\substack{x\in Y\\ y\in Y_{n,\lambda}^c}}G( |x-y|), \end{align} and \begin{equation} C_n(\omega)=\sup_{x,y\in[0,n]} \frac{1}{F(|x-y|)} \sum_{\substack{X\subseteq[0,n]:\\ x,y\in X}}\left\|\sum_{{\bf m}\in\prod_{x\in X} \{2,...,d_x\}}\phi_n({\bf m},X)\prod_{x\in X} S_{{\bf m}_x;x}\right\|, \end{equation} where by the assumptions in Definition \ref{def:LIOM} we have $\sup_n \mathbb{E} C_n<\infty$. \end{theorem} The proof of this theorem is given in Section \ref{sec:proofs_LIOM}. It is natural to ask whether the existence of LIOMs also follows from dynamical localization. Indeed, the existence of LIOMs and dynamical localization are regarded as equivalent properties in the physics literature. It turns out to be convenient to use a slightly different notion of LIOMs to prove a result in this direction. \begin{definition}[{\bf LIOMs of the second kind}]\label{def:LIOM2} Suppose that $\Phi$ is a (random) finite range interaction with a thermodynamic limit $\tau_t$ generated by the derivation $\delta$. We say the interaction has LIOMs of the second kind if there exists a family $\{I_x\}_{x\in\mathbb{Z}}$ of self-adjoint, uniformly bounded quasi-local observables $I_x$ satisfying the following: \begin{enumerate} \item There is a non-increasing function $F:\mathbb{Z}_+\to (0,\infty)$, with $\lim_{n\to\infty} F(n) =0$, such that for all $x\in\mathbb{Z}$, \begin{equation} \mathbb{E} \sup_{A\in\mathcal{A}^1_Y}\|[ I_x,A]\| \leq F(d(x,Y)). \end{equation} \item For each $x\in\mathbb{Z}$, \begin{equation} \delta(I_x)=0. \end{equation} \item For each $A\in\mathcal{A}^\text{loc}$, \begin{equation} \delta(A)=\lim_{n\to\infty} \sum_{x=-n}^n [I_x,A], \end{equation} almost surely, i.e. the family $\sum_{x=-n}^nI_x$ of quasi-local Hamiltonians almost surely generate the same dynamics in the thermodynamic limit as $\Phi$. \end{enumerate} \end{definition} \begin{Remark} In Definition \ref{def:LIOM2} we do not assume that the LIOMs $I_x$ commute. From the time invariance it is necessary that $I_x\in\ker\delta$, thus if $\ker\delta$ is abelian the LIOMs will commute. We expect $\ker\delta$ to be abelian almost surely, generically for continuous randomness. Note that in finite volumes, $\delta(\cdot)=[H,\cdot]$ for a local Hamiltonian $H$, and simplicity of the spectrum of $H$ is equivalent to $\ker\delta$ being an abelian algebra. \end{Remark} The following proposition connects dynamical localization uniform in time with the `canonical LIOMs' introduced in \cite{chandran:2015}. \begin{theorem}\label{thm:thermolioms} Suppose a model with finite-range interactions is dynamically localized with decay function $F$ uniformly in time ($\beta=0$), and that $F$ has a finite first moment: $\sum_{x=1}^\infty xF(x)<\infty$. Then the model has LIOMs of the second kind. Moreover, a LIOM representation (canonical in the sense of \cite{chandran:2015}) can be given explicitly by the following expression: \begin{equation} \tilde h_x = \lim_{n\to\infty} \frac{1}{T_n}\int_0^{T_n} \tau_t (h_x) dt. \label{time_average}\end{equation} where $T_n$ is a suitably chosen (random) strictly increasing sequence in $\mathbb{N}$. The terms $\tilde h_x$ are time-invariant, and there is a constant $C>0$ such that \begin{equation} \mathbb{E} ( \sup_{B\in\mathcal{A}_Y^1}\Vert [ \tilde h_x, B]\Vert ) \leq CF(d(x,Y)) \end{equation} for every $x\in \mathbb{Z}$. \end{theorem} The proof of this result can be found in Section \ref{sec:proofs_LIOM}. In the definition of LIOMs of the first kind, Definition \ref{def:LIOM}, nothing is said on the dependence of the unitaries and the interaction coefficients on the length, $n$, of the chain. One could expect however, that a random interaction $\Phi$ can be defined by \begin{equation} \Phi(X) = \lim_{n\to\infty} \sum_{{\bf m}\in\{1,...,d-1\}^{|X|}}\phi_n({\bf m},X)\prod_{x\in X} S_{{\bf m}_x;x}, \end{equation} where it should be understood that $n$ here refers to a finite spin chain labeled by $[-n,n]$. Using the notion of {\em local convergence in F-norm} (see \cite[Definition 3.7]{nachtergaele:2019}), it is then straightforward to define conditions that ensure the existence of a commuting family of LIOMs of the second kind. \subsection{Transmission Times} \begin{definition}\label{def:transmission_time} Given a Hamiltonian $H\in\mathcal{A}_{[0,n]}$ and an $\epsilon>0$ define the transmission time, $t(\epsilon)$ of $H$ as, \begin{equation} t(\epsilon)=\inf\{|t|: \sup_{\substack{A\in\mathcal{A}_0^1\\ B\in\mathcal{A}_n^1}}\|[\tau_t^H(A),B]\|>\epsilon\}. \end{equation} \end{definition} Suppose we have a sequence $H_n\in\mathcal{A}_{[0,n]}$ of Hamiltonians with associated transmission times $t_n(\epsilon)$. It is reasonable to expect that dispersive effects may cause the commutator defining the transmission time to never exceed some fixed $\epsilon>0$ for large values of $n$. If this occurs then $t_n(\epsilon)$ will cease to be a meaningful quantity. For this reason we should consider a sequence $\epsilon_n$, suitably decaying in $n$, and instead consider the sequence of transmission times $t_n(\epsilon_n)$. We note that some authors prefer the term `scrambling time' instead of transmission time \cite{chen:2019}. A natural question to ask is whether the transmission time is consistent with the propagation bounds imposed by a Lieb-Robinson bound. Suppose that the sequence $H_n$ satisfies, \begin{equation} \sup_{\substack{A\in\mathcal{A}_x^1\\ B\in\mathcal{A}_y^1}}\|[\tau_t^{H_n}(A),B]\|\leq C(e^{\mu v|t|}-1)e^{-\mu|x-y|} \end{equation} for $x\neq y$, uniformly in $n$. Such bounds are known to hold for a broad class of quantum spin models on general lattices \cite{nachtergaele:2006}. The bound implies that, \begin{equation} t_n(\epsilon_n)\geq \frac{1}{\mu v} \log(1+\frac{\epsilon_ne^{\mu n}}{C}), \end{equation} in which case \begin{equation} \limsup_{n\to\infty}\frac{n}{t_n(\epsilon_n)}\leq v \end{equation} provided $\epsilon_n$ decays subexponentially in $n$. We consider slow transport in a quantum spin chain to be characterized by super-linear growth of the transmission time. For stretched exponential dynamically localized spin chains the transmission time grows as a stretched exponential, as the next proposition shows. \begin{proposition} Suppose that a sequence $H_n\in\mathcal{A}_{[0,n]}$ of random Hamiltonians exhibits dynamical localization with decay function $F$ given by $F(x)=e^{-\eta x^\rho}$ for some $\rho\in(0,1]$. Then for any positive $\gamma$ and $\alpha$ such that $\beta\gamma+\alpha<1$, \begin{equation} \frac{e^{\gamma \eta n^\rho}}{t_n(e^{-\alpha\eta n^\rho})}\to0 \end{equation} almost surely. \end{proposition} \begin{proof} For $\beta=0$ it is easy to see that $\mathbb{P} ( t_n(e^{-\alpha \eta n^\rho} )=\infty \text{ eventually} )=1$. Assume $\beta>0$. By assumption, \begin{equation}\label{eq:t_time_prop} \sup_{\substack{A \in \mathcal{A}_0^1\\ B \in \mathcal{A}_n}}\Vert \tau^{H_n}_t(A),B]\Vert\leq \chi(1)C_n(1+|t|^\beta), \end{equation} where $\mathbb{E} C_n \leq e^{-\eta n^\rho}$. Choose any $\delta$ such that $\beta \gamma+\alpha<\delta<1$. Let $$ A_n=\left\{ \chi(1)C_n\leq e^{-\delta \eta n^\rho} \right\}. $$ By Markov's inequality, $$ \mathbb{P}(A_n^c)\leq \chi(1)\frac{\mathbb{E} C_n}{e^{-\delta\eta n^\rho}}\leq \chi(1)e^{-(1-\delta)\eta n^\rho}. $$ It follows from the Borel-Cantelli lemma that $\mathbb{P}(\mathbbm{1}_{A_n}=1 \text{ eventually})=1$. \eqref{eq:t_time_prop} implies that, $$ \mathbbm{1}_{A_n}t_n(e^{-\alpha \eta n^\rho})^\beta\geq \mathbbm{1}_{A_n}\left(\frac{e^{-\alpha \eta n^\rho}}{\chi(1) C_n}-1\right)\geq (e^{(\delta-\alpha) \eta n^\rho}-1)\mathbbm{1}_{A_n} $$ Therefore $$ \mathbbm{1}_{A_n} \frac{e^{\gamma \eta n^\rho}}{t_n(e^{-\alpha \eta n^\rho})}\leq \frac{e^{\gamma \eta n^\rho}}{(e^{(\delta-\alpha)\eta n^\rho}-1)^{1/\beta}} $$ Since $\gamma<(\delta-\alpha)/\beta$ and $\mathbbm{1}_{A_n}=1$ eventually with probability 1, it follows that $\frac{ e^{\gamma\eta n^\rho} }{ t_n(e^{-\alpha \eta n^\rho}) }\to0$ almost surely.\newline \end{proof} In the case of exponential dynamical localization there exists a family of perturbations such that the perturbed model still has long transmission times. These perturbations consist of additional nearest neighbor interactions that occur with low density at random positions. For this class of perturbations we can prove that the transmission time grows super linearly provided the perturbations are sufficiently sparse\footnote{ After this work appeared on the arXiv, similar perturbations were considered by De Roeck, Huveneers, and Olla, who proved subdiffusive dynamics in classical Hamiltonian chains \cite{de-roeck:2020}.}. \begin{theorem}\label{thm:mainthm} Let $H_n^0\in\mathcal{A}_{[0,n]}$ be a sequence of random Hamiltonians defined over the probability space $(\Omega_0,\mathbb{P}_0)$ which are exponentially dynamically localized in the sense of Definition \ref{def:dynlocaliz} ($\rho=1$). Let $(\delta_x)_{x=0}^\infty$ be an i.i.d. sequence of Bernoulli random variables over the probability space $(\Omega_1,\mathbb{P}_1)$, with $\mathbb{P}_1(\delta_0=0)=p\in(0,1]$. Let $(\psi_{x})_{x=0}^\infty$ denote a uniformly bounded sequence with $\psi_{x}\in\mathcal{A}_{[x,x+1]}$ for all $x$. Consider the sequence of random Hamiltonians \begin{equation} H_n(\omega)=H_n^0(\omega_0)+\sum_{x=0}^{n-1} \delta_x(\omega_1) \psi_{x}; \end{equation} over the probability space $\Omega_0\times \Omega_1$ equipped with the product measure. If $t_n$ is the transmission time of $H_n$, then for any $\gamma>0$ and $\alpha\in(0,1/3)$ satisfying \begin{equation} \eta\left(\frac{1-3\alpha}{1-\alpha}\right)> 2[(\beta+1)\gamma-1] \log\left(\frac{1}{p}\right), \end{equation} \begin{equation} \frac{n^\gamma}{t_n(e^{-\alpha \eta n})}\to 0 \end{equation} in probability. \end{theorem} Unfortunately we do not know how to prove a similar robustness result for models with a decay function $F$ that decays slower than exponentially. For example, certain anisotropic XY chains are only known to exhibit stretched exponential dynamical localization, as we note in Section \ref{subsec_xychain} Theorem \ref{thm:mainthm} concerns finite volume Hamiltonians. The following theorem shows that in certain cases one can work directly with the thermodynamic limit. \begin{theorem}\label{thm:thermolimit} Suppose that $\Phi_0$ is a random interaction over the probability space $(\Omega_0,\mathbb{P}_0)$ whose finite volume Hamiltonians are exponentially dynamically localized. Suppose that $(\delta_x)_{x\in \mathbb{Z}}$ is a sequence of i.i.d. Bernoulli random variables over the probability space $(\Omega_1,\mathbb{P}_1)$, with $\mathbb{P}_1(\delta_0=0)=p\in(0,1]$. Let $(\psi_x)_{x\in\mathbb{Z}}$ denote a uniformly bounded sequence with $\psi_x\in\mathcal{A}_{[x,x+1]}$ for all $x$. Let $\Phi_2$ be the random nearest neighbor interaction given by, \begin{equation} \Phi_2(\{x,x+1\})=\delta_x\psi_x \end{equation} for all $x\in\mathbb{Z}$. Define the random interaction $\Phi(\omega)=\Phi_0(\omega_0)+\Phi_1(\omega_1)$ over the probability space $\Omega_0\times\Omega_1$ equipped with the product measure. If, for almost every $\omega_0\in\Omega_0$, there is a (possibly random) $F$-function $F$ such that $\Phi_0$ is $F$-normed, then the thermodynamic limit, $\tau_t$, of $\Phi$ exists almost surely. For any fixed $r\in \mathbb{N}$, define \begin{equation} t_n(\epsilon)=\inf\{|t|: \sup_{\substack{A\in\mathcal{A}^1_{[-r,0]}\\ B\in\mathcal{A}^1_{[n,\infty)}}} \|[\tau_t(A),B]\|>\epsilon\}. \end{equation} Then for any $\gamma>0$ and $\alpha\in(0,1/3)$ satisfying \begin{equation} \eta\left(\frac{1-3\alpha}{1-\alpha}\right)> 2[(\beta+1)\gamma-1] \log\left(\frac{1}{p}\right), \end{equation} \begin{equation} \frac{n^\gamma}{t_n(e^{-\alpha \eta n})}\to 0 \end{equation} in probability. \end{theorem} \section{Proofs of Main Results}\label{sec:proofs} \subsection{Proofs of results about LIOMs }\label{sec:proofs_LIOM} Showing that LIOMs of the fist kind imply dynamical localization is a straightforward application of the quasi-locality properties of the LIOMs. \begin{proof}[Proof of Theorem \ref{prop:LIOM_LRbound}] For any $A\in\mathcal{A}_X^1$, $B\in\mathcal{A}_Y^1$, \begin{equation} \|[\tau_t^{H_n}(A),B]\|=\|[\tau_t^{\tilde{H_n}}(\tilde{A}),\tilde{B}]\|, \end{equation} where $\tilde{O}=U_n^*OU_n$ for an observable $O$. Using the quasi-locality of the unitary $U_n$ specified in Eq. \eqref{liomqloc}, by a standard application of conditional expectations (see, for example, \cite[Section IV.A]{nachtergaele:2019}), we can find (random) local observables ${A}_{\lambda}\in\mathcal{A}_{X_{n,\lambda}}$ and ${B}_{\lambda}\in\mathcal{A}_{Y_{n,\lambda}}$, with $\|A_{n,\lambda}\|,\|B_{n,\lambda}\|\leq 1$ such that, \begin{align} \|\tilde{A}-A_{\lambda}\|\leq D_{n,X,\lambda}\\ \|\tilde{B}-B_{\lambda}\|\leq D_{n,Y,\lambda}, \end{align} where $D_{n,X,\lambda}$ and $D_{n,Y,\lambda}$ have the desired expectation bound. Therefore, \begin{align}\label{eq:liom_LRbound} \|[\tau_t^{\tilde{H_n}}(\tilde{A}),\tilde{B}]\|&\leq 2\left(D_{X,\lambda,n}+D_{Y,\lambda,n}\right)+\|[\tau_t^{\tilde{H}_n}(A_{\lambda}),B_{\lambda}]\|. \end{align} Now, \begin{equation} \|[\tau_t^{\tilde{H}_n}(A_{\lambda}),B_{\lambda}]\|=\|[\tau_t^{\tilde{H}_{X,Y}}(A_{\lambda}),B_{\lambda}]\| \end{equation} where \begin{equation} \tilde{H}_{X,Y}(\omega)=\sum_{\substack{Z\subset[0,n]:\\ Z\cap X_{n,\lambda},Z\cap Y_{n,\lambda}\neq\emptyset}} \sum_{{\bf m}\in\prod_{x\in Z} \{2,...,d_x\}}\phi_n({\bf m},Z)\prod_{z\in Z}S_{{\bf m}_z;z} \end{equation} Note that $\tilde{H}_{X,Y}$ consist of the terms of $\tilde{H}_n$ which do not in general commute with either $A_{\lambda}$ or $B_{\lambda}$. If $f(t)=[\tau_t^{\tilde{H}_{X,Y}}(A_\lambda),B_\lambda]$, then \begin{equation} f'(t)=i[[\tilde{H}_{X,Y},\tau_t^{\tilde{H}_{X,Y}}(A_\lambda)],B_\lambda]=-i[f(t),\tilde{H}_{X,Y}]-i[[B_\lambda,\tilde{H}_{X,Y}],\tau_t^{\tilde{H}_{X,Y}}(A_\lambda)] \end{equation} Since the first term on the right is norm preserving, we have that, \begin{equation} \|[\tau_t^{\tilde{H}_{X,Y}}(A_\lambda),B_\lambda]\|\leq 4 |t| \|\tilde{H}_{X,Y}\|. \end{equation} The estimate, \begin{align*} \|\tilde{H}_{X,Y}\| &\leq \sum_{\substack{Z\subset[0,n]:\\ Z\cap X_{n,\lambda},Z\cap Y_{n,\lambda}\neq\emptyset}} \left\|\sum_{{\bf m}\in\prod_{x\in Z} \{2,...,d_x\}}\phi_n({\bf m},Z)\prod_{z\in Z} S_{{\bf m}_z;z} \right\| \\ &\leq \sum_{\substack{x\in X_{n,\lambda}\\y\in Y_{n,\lambda}}}\sum_{\substack{Z:\\x,y\in Z}} \left\|\sum_{{\bf m}\in\prod_{x\in Z} \{2,...,d_x\}}\phi_n({\bf m},Z)\prod_{z\in Z} S_{{\bf m}_z;z} \right\| \leq C_{n}(\omega) \sum_{\substack{x\in X_{n,\lambda}\\y\in Y_{n,\lambda}}} F(|x-y|), \end{align*} together with \eqref{eq:liom_LRbound} completes the proof. \end{proof} The existence of LIOMs of the second kind for uniform-in-time dynamically localized systems follows from a combination of quasi-locality arguments and compactness. \begin{proof}[Proof of Theorem \ref{thm:thermolioms}] We first show how to construct a sequence $T_n$ for which the limit in \eq{time_average} exists almost surely for any dynamics that is sufficiently localized uniformly in time. For $A\in\mathcal{A}^1_X$ and $T>0$, define $$ A_T = \frac{1}{T}\int_0^T \tau_t(A) dt. $$ $A_T$ is random since $\tau_t$ is. For each $N\in\mathbb{N}$, let $\Pi_N$ denote the conditional expectation $\mathcal{A}^{\rm loc} \to \mathcal{A}_{X(N)}$ defined as the limit of the normalized partial trace over the complement of $X(N)=\{y\in\mathbb{Z}: d(y,X)<N\}$ (see \cite[Section 4.2]{nachtergaele:2019}). Since the dynamics $\tau_t$ is assumed to satisfy \eq{uniform_exp_loc}, we have \begin{equation} \mathbb{E} ( \sup_T\Vert \Pi_N(A_T) -A_T\Vert ) \leq C F(N) \label{quasi-local-time-averages}\end{equation} where $C=2\chi(|X|)$. In particular, $\sum_{N=1}^\infty F(N)<\infty$ implies that \begin{equation}\label{as_convergence} \lim_N \sup_T \Vert \Pi_N(A_T) -A_T\Vert = 0 \text{ almost surely} \end{equation} Since $\mathcal{A}^1_{X(N)} $ is compact, there exists a sequence $(T^{(N)}_n)_{n\geq 1}$, and $A(N) \in \mathcal{A}^1_{X(N)}$ such that $$ \lim_n \Pi_N(A_{T^{(N)}_n})= A(N). $$ We can pick the sequences $(T^{(N)}_n)_{n\geq 1}$ such that $(T^{(N+1)}_n)_{n\geq 1}$ is a subsequence of $(T^{(N)}_n)_{n\geq 1}$, for all $N$. Fix $\epsilon >0$, and let $N\leq M$. Choose $K(N,M) $ such that for all $n\geq K(N,M)$, we have $$ \Vert \Pi_N(A_{T^{(N)}_n}) - A(N)\Vert \leq \epsilon , \ \Vert \Pi_M(A_{T^{(M)}_n}) - A(M)\Vert \leq \epsilon. $$ Since $N\leq M$, $(T^{(M)}_n)_{n\geq 1}$ is a subsequence of $(T^{(N)}_n)_{n\geq 1}$. Therefore, we also have $$ \Vert \Pi_N(A_{T^{(M)}_n}) - A(N)\Vert \leq \epsilon , \text{ for all } n\geq K(N,M). $$ Using these bounds we have \begin{eqnarray*} \Vert A(N) - A(M)\Vert &\leq& 2\epsilon + \Vert \Pi_N(A_{T^{(M)}_n}) - \Pi_M(A_{T^{(M)}_n})\Vert\\ &\leq & 2\epsilon + \Vert \Pi_N(A_{T^{(M)}_n}) - A_{T^{(M)}_n}\Vert + \Vert \Pi_M(A_{T^{(M)}_n}) - A_{T^{(M)}_n}\Vert\\ &\leq& 2\epsilon + \sup_T \Vert \Pi_N(A_T) -A_T\Vert+ \sup_T \Vert \Pi_M(A_T) -A_T\Vert. \end{eqnarray*} Since $\epsilon >0$ is arbitrary, this estimate along with \eq{as_convergence} shows that $(A(N))_N$ is almost surely a Cauchy sequence in $\mathcal{A}_\mathbb{Z}$. Denote its limit by $\tilde A$. We can now pick an increasing sequence $K_N$ such that for all $n \geq K_N$ we have $$ \Vert \Pi_N(A_{T^{(N)}_n}) -A(N)\Vert \leq \frac{1}{N}. $$ Then $$ \lim_N \Pi_N(A_{T^{(N)}_{K_N}}) = \lim_N A(N) = \tilde A. $$ Since we also have $$ \Vert \Pi_N(A_{T^{(N)}_{K_N}}) -A_{T^{(N)}_{K_N}} \Vert \leq \sup_T \Vert \Pi_N(A_T) -A_T\Vert, $$ we can conclude the convergence of the sequence of time averages: \begin{equation}\label{time-average_convergence} \lim_N A_{T^{(N)}_{K_N}} =\tilde A. \end{equation} The time-invariance of $\tilde A$ is obvious from the fact that it is the limit of time averages as in \eq{time-average_convergence}. By taking the $\limsup$ of \eq{quasi-local-time-averages} we also obtain a quasi-locality estimate for $\tilde A$: \begin{equation} \mathbb{E} ( \Vert [\tilde A, B]\Vert ) \leq C F(d(X,\supp B)) \end{equation} We can now apply this to $A=h_x$ and, possibly after taking another subsequence, obtain a sequence of times $T_n$ such that for all $x\in\mathbb{Z}$, \begin{equation} \tilde h_x= \lim_{n\to\infty} \frac{1}{T_n}\int_0^{T_n} \tau_t (h_x) dx. \end{equation} are well-defined, time-invariant, and quasi-local. The model is assumed to be finite range, so the constant $C$ can be chosen to be uniform in $x$. Finally, the quasi-local Hamiltonians $\tilde H_\Lambda$ defined by $$ \tilde H_\Lambda = \sum_{x\in\Lambda} \tilde h_x, $$ generate the same dynamics $\tau_t$ in the thermodynamic limit. To see the last point we once more have to argue we can interchange two limits, which we do next. Let $X$ be finite, $A\in\mathcal{A}_X^1$, and $\epsilon >0$ . Fix a sufficiently large positive integer $M$ such that for all $\Lambda$ containing $X(M)$ we have \begin{eqnarray} \sum_{x\in \Lambda} [h_x,A]=\delta(A). \end{eqnarray} Then, we have \begin{equation}\label{difference1} \Vert \delta(A) - \tilde\delta(A)\Vert \leq \left\Vert \sum_{x\in \Lambda} [h_x , A] - \sum_{x\in \Lambda} [\tilde h_x , A] \right\Vert + \sum_{x\notin\Lambda}\Vert [\tilde h_x, A ] \Vert \end{equation} Then, for any $L,n\in\mathbb{N}$, starting from \eq{difference1}, we obtain the following estimate: \begin{eqnarray*} \Vert \delta(A) - \tilde\delta(A)\Vert &\leq&\left\Vert \sum_{x\in X(M+L)} [h_x , A] - \sum_{x\in X(M+L)} [\tilde h_x , A] \right\Vert +\sum_{x\notin X(M+L)}\Vert [ \tilde h_x, A ] \Vert \\ &=& \left\Vert \left[ \left(\sum_{x\in X(M+L)} \frac{1}{T_n}\int_0^{T_n} \tau^{(X(M+L))}_t(h_x) \right), A\right] - \sum_{x\in X(M+L)} [\tilde h_x , A] \right\Vert \\ &&\quad + \sum_{x\notin X(M+L)}\Vert [ \tilde h_x, A ] \Vert \\ &\leq & \sum_{x\in X(M+L)\setminus X(M)}\left( \sup_{t\in\mathbb{R}} \Vert [\tau_t^{(X(M+L))}( h_x),A]\Vert + \Vert [\tilde{h}_x,A]\|\right)\\ &&\quad + \left\Vert \sum_{x\in X(M)} \left[ \frac{1}{T_n}\int_0^{T_n} \tau_t^{(X(M+L))}(h_x)\,dt-\tilde{h}_x,A\right]\right \Vert +\sum_{x\notin X(M+L)} \Vert [\tilde{h}_x,A] \Vert \end{eqnarray*} Therefore, almost surely \begin{eqnarray*} \Vert\delta(A)-\tilde{\delta}(A)\Vert&\leq& \liminf_{L\to\infty} \sum_{x\notin X(M)} \left( \sup_{t\in\mathbb{R}} \Vert [\tau_t^{(X(M+L))}( h_x),A]\Vert + \Vert [\tilde{h}_x,A]\|\right)\\ &&\quad + \left\Vert \sum_{x\in X(M)} \left[ \frac{1}{T_n}\int_0^{T_n} \tau_t(h_x)\,dt-\tilde{h}_x,A\right]\right \Vert \end{eqnarray*} Letting $n\to\infty$ in this inequality gives, $$ \Vert\delta(A)-\tilde{\delta}(A)\Vert\leq \liminf_{L\to\infty} \sum_{x\notin X(M)} \left( \sup_{t\in\mathbb{R}} \Vert [\tau_t^{(X(M+L))}( h_x),A]\Vert + \Vert [\tilde{h}_x,A]\|\right) $$ almost surely. By Fatou's lemma, $$ \mathbb{E} \liminf_{L\to\infty} \sum_{x\notin X(M)} \left( \sup_{t\in\mathbb{R}} \Vert [\tau_t^{(X(M+L))}( h_x),A]\Vert + \Vert [\tilde{h}_x,A]\|\right)\leq 4C\sum_{d=M}^\infty F(d) $$ This upper bound is summable in $M$, therefore, $$ \lim_{M\to\infty} \liminf_{L\to\infty} \sum_{x\notin X(M)} \left( \sup_{t\in\mathbb{R}} \Vert [\tau_t^{(X(M+L))}( h_x),A]\Vert + \Vert [\tilde{h}_x,A]\|\right)=0 $$ almost surely, which proves that $\delta(A)=\tilde{\delta}(A)$ with probability 1. \end{proof} \subsection{Proofs of results about transmission time} We will prove Theorem \ref{thm:mainthm} by utilizing the interaction picture decomposition of the Heisenberg dynamics $\tau_t^{H_n}=\tau_t^{H^I_n}\circ \tau_t^{H_n^0}$, where $H_n^I$ is the time dependent random Hamiltonian given by, \begin{equation}\label{inthamiltonian} H_n^I(\omega,t)=\sum_{x=0}^{n-1} \delta_x(\omega_1)\tau_t^{H_n^0(\omega_0)}(\psi_{x}) \end{equation} We make use of this decomposition of the dynamics in the following way: for an integer $d_n\in[0,n]$, for any $A\in\mathcal{A}_0^1$ by quasilocality of the the dynamics $\tau_t^{H_n^0}$ we can write \begin{equation}\label{eq:quasiloc} \tau_t^{H_n^0(\omega_0)}(A)=\tilde{A}(\omega_0,t)+E(\omega_0,t), \end{equation} where $\supp(\tilde{A})\subset [0,d_n]$, $\|\tilde A\|\leq1$ and \begin{equation} \| E(\omega_0,t)\|\leq \chi(1)C_{d_n}(\omega_0)(1+|t|^\beta) \end{equation} where $\mathbb{E} C_{d_n}\leq e^{-\eta (d_n+1)}$. Eq. \eqref{eq:quasiloc} gives the following bound, \begin{equation}\label{eq:splitdynamics} \sup_{\substack{A\in\mathcal{A}_0^1\\ B\in\mathcal{A}_n^1} }\| [\tau_t^{H_n(\omega)}(A),B]\| \leq 2\chi(1)C_{d_n}(\omega_0)(1+|t|^\beta)+\sup_{\substack{A\in\mathcal{A}_{[0,d_n]}^1\\ B\in\mathcal{A}_n^1} }\|\tau_t^{H_n^I(\omega)}(A),B]\|. \end{equation} To proceed we will need to derive a suitable Lieb-Robinson bound for the dynamics $\tau_t^{H_n^I}$. The first step in deriving such a bound is to write $H_n^I$ in terms of a suitable time dependent random interaction. First we introduce some notation. Let $\Lambda_n=[0,n]$ and $\Lambda_{n;x}(m)=\{y\in\Lambda_n: d(y,\{x,x+1\})\leq m\}$. We write \begin{equation}\label{ptracedecomp} \tau_t^{H_n^0(\omega_0)}(\psi_{x})=\sum_{m\geq 0}\psi_{n;x}^{(m)}(\omega_0,t), \end{equation} where \begin{equation} \psi_{n;x}^{(m)}(t)=\begin{cases} \text{Tr}_{\mathcal{H}_{\Lambda_n\setminus \Lambda_{n;x}(0)}}\left(\tau_t^{H_n^0}(\psi_{x})\right) & \text{ if }m=0\\ [\text{Tr}_{\mathcal{H}_{\Lambda_n\setminus\Lambda_{n;x}(m)}}-\text{Tr}_{\mathcal{H}_{\Lambda_n\setminus\Lambda_{n;x}(m-1)}}]\left(\tau_t^{H_n^0}(\psi_{x})\right) & \text{ if } m\geq 1 \end{cases} \end{equation} Here $\text{Tr}$ denotes the normalized partial trace operator. Note that the sum in Eq. \eqref{ptracedecomp} is actually a finite sum, since $\psi_{n;x}^{(m)}=0$ for any $m$ such that $\Lambda_{n;x}(m-1)=\Lambda_n$. \begin{proposition}\label{interactiondecay} $\supp(\psi_{n;x}^{(m)}(t))\subseteq \Lambda_{n;x}(m)$ for all $m\geq0$ and \begin{equation} \|\psi_{n;x}^{(m)}(t)\|\leq\begin{cases} \|\psi_{x}\| & \text{ if }m=0\\ \|\psi_{x}\|C_{n;x}^{(m)} (1+|t|^\beta) & \text{ if } m\geq 1 \end{cases} \end{equation} where $C_{n;x}^{(m)}$ is a non-negative random variable satisfying \begin{equation} \mathbb{E} C_{n;x}^{(m)}\leq 2\chi(2)e^{-\eta m} \end{equation} \end{proposition} \begin{proof} $\supp(\psi_{n;x}^{(m)}(t))\subseteq \Lambda_{n;x}(m)$ follows from properties of the partial trace. The bound $\|\psi_{n;x}^{(0)}(t)\|\leq \|\psi_{x}\|$ is immediate. For $m\geq 1$, \begin{align} \|\psi_{n;x}^{(m)}(t)\|&\leq \|\tau_t^{H_n^0}(\psi_{x})-{\rm Tr}_{\mathcal{H}_{\Lambda_n\setminus\Lambda_{n;x}(m)}}\left(\tau_t^{H_n^0}(\psi_{x})\right)\|\\ &+\|\tau_t^{H_n^0}(\psi_{x})-{\rm Tr}_{\mathcal{H}_{\Lambda_n\setminus\Lambda_{n;x}(m-1)}}\left(\tau_t^{H_n^0}(\psi_{x})\right)\|\nonumber\\ &\leq \|\psi_{x}\| \chi(2)\left(C_{\Lambda_n;\Lambda_x,\Lambda_n\setminus \Lambda_{n;x}(m)}+C_{\Lambda_n;\Lambda_x,\Lambda_n\setminus \Lambda_{n;x}(m-1)}\right)|t|^\beta\\ &\equiv \|\psi_{x}\| C_{n;x}^{(m)}(1+ |t|^\beta). \end{align} The expectation bound on $C_{n;x}^{(m)}$ follows from the assumptions. \end{proof} The decomposition given in Eq. \eqref{ptracedecomp} provides a way to write $H_n^I(t)$ in terms of a random interaction. Define $\Phi_n(\omega,t):\mathcal{P}(\Lambda_n)\to \mathcal{A}_{\Lambda_n}$ by, \begin{equation}\label{eq:random_interaction} \Phi_n(\omega,t)(X)=\sum_{\substack{(x,m):\\ \Lambda_{n;x}(m)=X}}\delta_x(\omega_1) \psi_{n;x}^{(m)}(\omega_0,t). \end{equation} Then $H_n^I=\sum_{X\subseteq[0,n]}\Phi_n(X)$ follows from Eq. \eqref{ptracedecomp}. \newline We will use Theorem 3.1 of \cite{nachtergaele:2019} in order to obtain a Lieb-Robinson bound for the dynamics generated by $H_n^I$. If we apply that theorem directly to $\Phi_n$, with a suitable decaying function $F$, we obtain a Lieb-Robinson bound with a time growth factor of \begin{equation}\label{eq:timefactor0} \exp\left( \int_0^t\sup_{x,y\in[0,n]}\frac{1}{F(|x-y|)}\sum_{\substack{X\subseteq[0,n]\\ x,y\in X}} \|\Phi_n(\omega,s)(X)\|ds\right) \end{equation} This will not be of any use to us, as \begin{equation} \sup_{x,y\in[0,n]}\frac{1}{F(|x-y|)}\sum_{\substack{X\subseteq[0,n]\\ x,y\in X}} \|\Phi_n(\omega,s)(X)\| \end{equation} will be of order 1 due to the presence of non-zero $\delta_x$. To remedy this we observe that the methods used in \cite{nachtergaele:2019} produce Lieb-Robinson bounds which are independent of on-site terms in the interaction and also do not depend on the dimension of the Hilbert spaces at each site. This allows us to define a new lattice for the model, which is effectively a subset of $[0,n]$, by identifying certain spins which forces certain interaction terms to become on-site terms. As we explain below, we will be able to obtain a better Lieb-Robinson bound using this method. Specifically, given $\Gamma\subset[0,n]$, we can define the lattice to obtain a Lieb-Robinson bound for the dynamics generated by $H_n^I$ with a time growth factor of \begin{equation}\label{eq:timefactor} \exp\left( \int_0^t\sup_{x,y\in \Gamma}\frac{1}{F(|x-y|)}\sum_{\substack{X\subseteq [0,n]\\x,y\in X}} \|\Phi_n(\omega,s)(X)\|ds\right). \end{equation} Note than in Eq. \eqref{eq:timefactor} the supremum in the exponent is taken over pairs of points $x,y\in \Gamma$, as opposed to in Eq. \eqref{eq:timefactor0} where all possible pairs of points in $[0,n]$ enter. The sum in Eq. \eqref{eq:timefactor} therefore excludes any interaction term whose support does not contain a point of $\Gamma$. The arguments for obtaining such a Lieb-Robinson bound given the subset $\Gamma$ are given in detail in the appendix. It remains to specify how $\Gamma$ should be chosen. We know that intervals $I$ of length $L\sim \log_{1/p}(n)$ with the property that $\delta_x=0$ for all $x\in I$ exist with high probability. The interaction terms $\Phi_n(X)$ decay exponentially in the diameter of $X$, so the sum of all interaction terms linking sites $x,y\in I$ will decay exponentially in the distance $d(\{x,y\},I^c)$. This suggests that we take $\Gamma$ to consist of the intervals $I$ with a collar of length $\ell$ removed from both sides. The interaction terms linking sites $x,y\in \Gamma$ will then decay at least as fast as $e^{-\eta \ell}$. Taking $\ell$ to be a fraction of $L$ leads to power law decay in $n$ of the interaction strength. The following Lemma makes this precise. \begin{lemma}\label{fnormlemma} Fix $n\in\mathbb{N}$ and consider the time dependent random interaction $\Phi_n$ given by Eq. \eqref{eq:random_interaction}. Let $\theta\in (0,1)$ be arbitrary. Consider an event $E\subset\Omega_1$ with the following two properties: \begin{enumerate} \item[(i)] $(\delta_1,...,\delta_{n-1})$ is fixed on $E$ \item[(ii)] There are two disjoint intervals $I_j=[a_j,b_j]$, $j=1,2,$ with $|I_j|\geq \theta \log_{1/p}(n)$ such that $\delta_x\big|_E=0$ for each $x\in I_1\cup I_2$. \end{enumerate} For $\sigma\in [0,1/2)$, let $\ell=\lfloor \sigma \theta \log_{1/p}(n)\rfloor$ and define the collared intervals $\tilde{I}_j=[a_j+\ell,b_j-\ell]$. Then for any $x,y\in \tilde{I}_1\cup \tilde{I}_2$, \begin{equation} \mathbbm{1}_E(\omega_1) \sum_{\substack{X\subseteq[0,n]:\\x,y\in X}}\|\Phi_n(\omega,t)(X)\| \leq B_{E;x,y}(\omega_0)(1+|t|^\beta), \end{equation} where there is a constant $\tilde{C}$, depending only on $\eta$, such that $B_{E;x,y}$ satisfies, \begin{equation} \mathbb{E} B_{E;x,y} \leq \tilde{C} n^{-\frac{\lambda \eta \sigma \theta }{\log(1/p)}}e^{-(1-\lambda){\eta}\frac{|x-y|}{2}} \end{equation} for any $\lambda\in(0,1)$ . \end{lemma} \begin{proof} First note that for any points $x<y$ in $[0,n]$ the following inequality holds, \begin{equation}\label{prefnormbound} \sum_{\substack{X\subseteq[0,n]:\\x,y\in X}}\|\Phi_n(\omega,t)(X)\|\leq \sum_{z=0}^{n-1}\sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}} \delta_z(\omega_1) \|\psi_{n;z}^{(m)}(\omega_0,t)\|. \end{equation} This follows from the fact that $\max\{|z-x|,|z-y+1|\}$ is the smallest integer $m$ such that $x,y\in\Lambda_{n;z}(m)$. Without loss of generality assume $a_1<a_2$, and take $x\leq y\in\tilde{I}_2\cup\tilde{I}_2$. Suppose $x\in \tilde{I}_s$, $y\in\tilde{I}_r$ with $s\leq r$. On the event $E$, $\delta_z(\omega_1)=0$ if $z\in I_1\cup I_2$, so we have the bound \begin{align} &\mathbbm{1}_E(\omega_1)\sum_{z=0}^{n-1}\sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}} \delta_z(\omega_1)\|\psi_{n;z}^{(m)}(\omega_0,t)\|\nonumber\\ &\leq \sum_{z\notin I_1\cup I_2} \sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}\|\psi_{n;z}^{(m)}(\omega_0,t)\|\nonumber\\ &\leq (\sup_{x}\|\psi_{x,x+1}\|)\sum_{z\notin I_r\cup I_s} \sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}C_{n;z}^{(m)}(\omega_0)(1+|t|^\beta)\equiv B_{E;x,y}(\omega_0)(1+|t|^\beta). \end{align} By Proposition \ref{interactiondecay}, \begin{align}\label{Bexpectation} \mathbb{E} B_{E;x,y} \leq 2(\sup_{x}\|\psi_{x}\|)\chi(2)\sum_{z\notin I_r\cup I_s} \sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}e^{-\eta m} \end{align} We have, \begin{align}\label{eq:l32sum} \sum_{z\notin I_r\cup I_s} \sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}e^{-\eta m} &=\left(\sum_{z=0}^{a_r-1}+\sum_{z=b_r+1}^{a_s-1}+\sum_{z=b_s+1}^{n-1}\right)\sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}e^{-\eta m} \end{align} We first estimate, \begin{align} \left(\sum_{z=0}^{a_r-1}+\sum_{z=b_s+1}^{n-1}\right)\sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}e^{-\eta m}&\leq \left[ \sum_{z=0}^{a_r-1} \sum_{m= y-z-1}^\infty e^{-\eta m}+\sum_{z=b_s+1}^{n-1}\sum_{m= z-x}^\infty e^{-\eta m}\right]\nonumber\\ &\leq \sum_{k=y-a_r}^\infty \sum_{m=k}^\infty e^{-\eta m}+\sum_{k=b_s-x}^\infty\sum_{m=k}^\infty e^{-\eta m}\nonumber\\ &= \frac{1}{(1-e^{-\eta})^2} [e^{-{\eta}(y-a_r)}+e^{-{\eta}(b_s-x)}]\nonumber \\ &\leq \frac{1}{(1-e^{-\eta})^2}e^{-{\eta}[(y-x)+\ell]}, \end{align} where we used that $b_s-y,x-a_r\geq \ell$ in the last line. The remaining sum in Eq. \eqref{eq:l32sum} vanishes when $r=s$. If $r<s$ then, \begin{align} \sum_{z=b_r+1}^{a_s-1} \sum_{\substack{m\geq\\ \max\{z-x,y-z-1\}}}e^{-\eta m}&\leq \sum_{z=b_r+1}^{\lceil \frac{y+x-1}{2}\rceil -1}\sum_{m=y-z-1}^\infty e^{-\eta m}+\sum_{z=\lceil\frac{y+x-1}{2}\rceil}^{a_s-1}\sum_{m=z-x}^\infty e^{-\eta m}\nonumber\\ &\leq \sum_{k=y-\lceil \frac{y+x-1}{2}\rceil }^\infty\sum_{m=k}^\infty e^{-\eta m}+ \sum_{k=\lceil \frac{y+x-1}{2}\rceil -x}^\infty \sum_{m=k}^\infty e^{-\eta m}\nonumber\\ &\leq \frac{1}{(1-e^{-\eta})^2}[e^{-{\eta}(y-\lceil \frac{y+x-1}{2}\rceil)}+e^{-{\eta}(\lceil \frac{y+x-1}{2}\rceil-x)}]\nonumber\\ &\leq \frac{1}{(1-e^{-\eta})^2}e^{\frac{\eta}{2}} e^{-{\eta}(\frac{y-x}{2})} \end{align} If $r<s$, then $|x-y|\geq 2\ell$ and \begin{align} e^{-{\eta} (\frac{y-x}{2})}=e^{-{\eta}\lambda ( \frac{y-x}{2})}e^{-{\eta}(1-\lambda)(\frac{y-x}{2})}\leq e^{-\lambda{\eta}\ell}e^{-(1-\lambda){\eta}(\frac{y-x}{2})} \end{align} Therefore, \begin{align} \sum_{z\notin I_1 \cup I_2} \sum_{\substack{m\geq\\ \max\{|z-x|,|z-y+1|\}}}e^{-\eta m}\leq \frac{1}{(1-e^{-\eta})^2}\left(e^{-\eta(|x-y|+\ell)}+(1-\delta_{s,r})e^{\frac{\eta}{2}}e^{-\lambda\eta\ell}e^{-(1-\lambda)\eta\frac{|x-y|}{2}}\right), \end{align} which together with Eq. \eqref{Bexpectation} proves the lemma. \end{proof} We now use Lemma \ref{fnormlemma} to prove that a Lieb-Robinson bound holds for the dynamics $\tau_t^{H_n^I}$ on an event contained in $E$ which has probability nearly that of $E$ for large $n$. \begin{lemma}\label{lemma:intLRbound} Assume the hypotheses and notation of Lemma \ref{fnormlemma}, with the additional assumption that $|I_j|\leq \frac{3}{2}\log_{1/p}(n)$ for $j=1,2$. Then for any $\nu\in(0,1)$ there is an event $W_E\subset\Omega_0$ such that for any $\xi\in(0,1)$ there are positive constants $c_0$ and $c_1$, which depend only on $\nu,\xi,\lambda$ and $\eta$, such that \begin{equation}\label{eq:conditionalLRbound} \mathbbm{1}_{W_E}(\omega_0)\mathbbm{1}_E(\omega_1)\sup_{\substack{A\in\mathcal{A}_{[0,a_1]}^1\\ B\in\mathcal{A}_n^1}}\|[\tau_t^{H^I_n(\omega)}(A),B]\|\leq c_0(e^{c_1 n^{-\frac{\nu\lambda \eta \sigma \theta }{\log(1/p)}}(|t|+|t|^{\beta+1})}-1)e^{-\xi\frac{\nu(1-\lambda)\eta}{2}d(I_1,I_2)}. \end{equation} Furthermore, the event $W_E$ satisfies, \begin{align} \mathbb{P}(W_E)\geq 1- \tilde{C}' n^{-\frac{(1-\nu) \lambda \eta \sigma \theta}{\log(1/p)}} \log_{1/p}(n) \end{align} where \begin{equation} \tilde{C}'=\frac{3\tilde{C}}{1-e^{-\frac{(1-\nu)(1-\lambda)\eta}{2}}} \end{equation} \end{lemma} \begin{proof} For a fixed pair $x,y$ in $\tilde{I}_1\cup \tilde{I}_2$, by Markov's inequality and Lemma \ref{fnormlemma}, \begin{equation} \mathbb{P}(B_{E;x,y}\leq n^{-\frac{\nu \lambda \eta \sigma \theta}{\log(1/p)}}e^{-\nu(1-\lambda)\eta \frac{|y-x|}{2}})\geq 1-\tilde{C} n^{-\frac{(1-\nu) \lambda \eta \sigma \theta}{\log(1/p)}}e^{-(1-\nu)(1-\lambda)\eta \frac{|x-y|}{2}} \end{equation} Let \begin{equation} W_E=\{ B_{E;x,y}\leq n^{-\frac{\nu \lambda \eta \sigma \theta}{\log(1/p)}}e^{-\nu(1-\lambda)\eta \frac{|y-x|}{2}} \text{ for all }x,y\in \tilde{I}_1\cup\tilde{I}_2\} \end{equation} It follows that, \begin{align} \mathbb{P}( W_E)\nonumber&\geq 1-\tilde{C}n^{-\frac{(1-\nu) \lambda \eta \sigma \theta}{\log(1/p)}}\sum_{\substack{x\leq y:\\ x,y\in\tilde{I}_1\cup \tilde{I}_2}}e^{-(1-\nu)(1-\lambda)\eta \frac{|x-y|}{2}}\nonumber\\ &\geq 1- \tilde{C}n^{-\frac{(1-\nu) \lambda \eta \sigma \theta}{\log(1/p)}} \sum_{x\in \tilde{I}_1\cup \tilde{I}_2}\sum_{y=x}^\infty e^{-(1-\nu)(1-\lambda)\eta \frac{|x-y|}{2}}\nonumber\\ &\geq 1-\frac{3\tilde{C}}{1-e^{-\frac{(1-\nu)(1-\lambda)\eta}{2}}} n^{-\frac{(1-\nu) \lambda \eta \sigma \theta}{\log(1/p)}} \log_{1/p}(n) \end{align} Let $F$ be any $F$-function on $\mathbb{Z}$ such that for any $c>0$, \begin{equation} \sup_{x\in \mathbb{Z}} \frac{e^{-c|x|}}{F(|x|)}<\infty. \end{equation} Then by Lemma \ref{fnormlemma} and the definition of $W_E$ we have that, \begin{align} &\mathbbm{1}_{E\cap W_E}(\omega) \sup_{x,y\in \tilde{I}_1\cup \tilde{I}_2} \frac{1}{e^{-\xi \frac{\nu (1-\lambda) \eta}{2}|x-y|}F(|x-y|)}\sum_{\substack{X\subseteq[0,n]:\\x,y\in X}}\|\Phi_n(\omega,t)(X)\|\nonumber\\ &\leq n^{-\frac{\nu \lambda \eta \sigma \theta}{\log(1/p)}}\sup_{x,y\in \tilde{I}_1\cup\tilde{I}_2} \frac{e^{-\nu(1-\xi)(1-\lambda)\eta \frac{|y-x|}{2}}}{F(|x-y|)}\nonumber\\ &\leq n^{-\frac{\nu\lambda\eta \sigma\theta}{\log(1/p)}}\sup_{x\in \mathbb{Z}} \frac{e^{-\frac{\nu(1-\xi)(1-\lambda)\eta}{2}|x|}}{F(|x|)} \end{align} The result now follows from Proposition \ref{LRbound} in the appendix, using the collection $\mathcal{I}=\{\tilde{I}_1,\tilde{I}_2\}$. \end{proof} From Lemma \ref{lemma:intLRbound}, we see that the best Lieb-Robinson bound will be obtained on events $E$ where the intervals $I_1$ and $I_2$ are as far apart as possible. This in fact occurs with high probability: Let $\theta\in(0,1)$ and suppose $F_n$ is the event that there are two intervals of consecutive 0's of length at least $\theta\log_{1/p}(n)$ in $n$ i.i.d. Bernoulli trials, such that the distance $r_n$ between the intervals satisfies $\lim r_n/n=1$. Then the probability of $F_n$ tends to 1 as $n$ tends to infinity. This can be seen by noting that if $\theta'\in (\theta,1)$, then the longest run $R_n$ of zeros in $\lfloor n^{\theta'}\rfloor $ i.i.d. Bernoulli trials has the property that \begin{equation} \frac{R_n}{\theta' \log_{1/p}(n)}\to 1 \end{equation} in probability. Therefore, with a probability tending to 1, there is an interval of length at least $\theta\log_{1/p}(n)$ in both the first and last $\lfloor n^{\theta'}\rfloor$ trials in $n$ Bernoulli trials. The distance between these two intervals is at least $n-2n^{\theta'}$.\newline \begin{proof}[Proof of Theorem \ref{thm:mainthm}] We will prove the result for $\beta>0$. The case $\beta=0$ requires only minor modifications. We will show that under the hypotheses of the theorem there is a sequence of events $Q_n$ with $\lim_{n\to \infty}\mathbb{P}(Q_n)=1$, and a deterministic sequence $x_n$ satisfying $\lim_{n\to\infty}n^\gamma/x_n=0$ such that \begin{equation} \mathbbm{1}_{Q_n} t_n(e^{-\alpha \eta n})\geq x_n. \end{equation} From this it easily follows that $n^\gamma/t_n(e^{-\alpha \eta n})\to0$ in probability. \newline Let $\kappa\in (\alpha,1)$. Our starting point is Eq. \eqref{eq:splitdynamics}, with $d_n=\lfloor \kappa n \rfloor$. Consider the event $F_n=\{ 2\chi(1)C_{d_n}\leq n^{-(\gamma\beta+1)} e^{-\alpha \eta n}\}$. By Markov's inequality, \begin{equation}\label{eq:locdynbound} \mathbb{P}(F_n)\geq 1-2\chi(1)n^{\gamma\beta+1}e^{-(\kappa-\alpha)\eta n}. \end{equation} It follows from Eq. \eqref{eq:splitdynamics} that, \begin{equation}\label{eq:splitLRbound} \mathbbm{1}_{F_n}(\omega_0)\sup_{\substack{A\in\mathcal{A}_0^1\\ B\in\mathcal{A}_n^1} }\| [\tau_t^{H_n(\omega)}(A),B]\| \leq (1+|t|^\beta)n^{-\gamma\beta+1}e^{-\alpha\eta n}+\sup_{\substack{A\in\mathcal{A}_{[0,d_n]}^1\\ B\in\mathcal{A}_n^1} }\|\tau_t^{H_n^I(\omega)}(A),B]\|. \end{equation} Choose $\theta\in (0,1)$, and let $G_n\subset \Omega_1$ denote a sequence of events in which there are two runs of zeros in the list $(\delta_{d_n},...,\delta_{n-1})$ of length at least $\theta \log_{1/p}(n)$ and no more than $\tfrac{3}{2}\log_{1/p}(n)$, and such that if $r_n$ denotes the distance between the two runs, $\lim_{n\to\infty}r_n/n\to (1-\kappa)$. We have observed that such a sequence can be chosen with $\lim_{n\to\infty}\mathbb{P}(G_n)=1$. Write, \begin{equation} G_n=\bigsqcup_{E\in\mathcal{F}_n}E, \end{equation} where $\mathcal{F}_n$ is the set of events $E\subset\Omega_1$ on which $(\delta_{d_n},\delta_{d_n+1},...\delta_{n-1})$ is fixed. Consider an event $E\in\mathcal{F}_n$. By Lemma \ref{lemma:intLRbound} we have that, \begin{equation}\label{eq:rintLRbound} \mathbbm{1}_{W_E}(\omega_0)\mathbbm{1}_E(\omega_1)\sup_{\substack{A\in\mathcal{A}_{[0,d_n]}^1\\ B\in\mathcal{A}_n^1}}\|[\tau_t^{H^I_n(\omega)}(A),B]\|\leq c_0(e^{c_1 n^{-\frac{\nu\lambda \eta \sigma \theta }{\log(1/p)}}(|t|+|t|^{\beta+1})}-1)e^{-\xi \frac{\nu (1-\lambda)\eta}{2}r_n}. \end{equation} Note that Eq. \eqref{eq:locdynbound} and Lemma \ref{lemma:intLRbound} imply that for each $E\in \mathcal{F}_n$, \begin{equation}\label{eq:problowerbound} \mathbb{P}(W_E \cap F_n)\geq 1-2\chi(1)n^{\gamma\beta+1}e^{-(\kappa-\alpha)\eta n)}-\tilde{C}'n^{-\frac{(1-\nu) \lambda \eta \sigma \theta}{\log(1/p)}} \log_{1/p}(n)\equiv X_n. \end{equation} Clearly $X_n\to 1$ as $n\to\infty$. Now define $Q_n=\sqcup_{E\in\mathcal{F}_n} E\cap W_E\cap F_n$. By independence and Eq. \eqref{eq:problowerbound}, \begin{equation}\label{eq:highprob} \mathbb{P}(Q_n)=\sum_{E\in\mathcal{F}_n}\mathbb{P}(E)\mathbb{P}(W_E\cap F_n)\geq X_n \sum_{E\in\mathcal{F}_n}\mathbb{P}(E)=X_n\mathbb{P}(G_n), \end{equation} which shows that $\mathbb{P}(Q_n)\to 1$ as $n\to\infty$. \newline We now show that the transmission time has a deterministic lower bound on the event $Q_n$. Eqs. \eqref{eq:splitLRbound} and \eqref{eq:rintLRbound} give the bound, \begin{multline}\label{eq:highprobLRbound} \mathbbm{1}_{Q_n}(\omega)\sup_{\substack{A\in\mathcal{A}_0^1\\ B\in\mathcal{A}_n^1} }\| [\tau_t^{H_n(\omega)}(A),B]\| \leq (1+|t|^\beta)n^{-(\gamma\beta+1)}e^{-\alpha\eta n}\\ +c_0(e^{c_1 n^{-\frac{\nu\lambda \eta \sigma \theta }{\log(1/p)}}(|t|+|t|^{\beta+1})}-1)e^{-\xi \frac{\nu (1-\lambda)\eta}{2}r_n} \end{multline} It follows that \begin{equation} \mathbbm{1}_{Q_n}t_n(e^{-\alpha \eta n})\geq \min\{ (\tfrac{1}{2}n^{\gamma \beta+1}-1)^{\frac{1}{\beta}}, Y_n\}\equiv x_n, \end{equation} where \begin{equation} Y_n=\left[ \frac{n^{\frac{\lambda\eta\sigma\theta}{\log(1/p)}}}{2 c_1}\log \left( 1+\frac{1}{2c_0}e^{(\xi \frac{\nu(1-\lambda)}{2}\frac{r_n}{n}-\alpha)\eta n} \right) \right]^{\frac{1}{\beta+1}}. \end{equation} Since $\lim_{n\to\infty}r_n/n= (1-\kappa)$, we have that \begin{equation}\label{eq:yassymp} \frac{n^{(\frac{\nu\lambda\eta\sigma\theta}{\log(1/p)}+1)/(\beta+1)}}{Y_n} \end{equation} converges to a positive constant, provided \begin{equation}\label{eq:constraint1} \xi\frac{\nu(1-\lambda)(1-\kappa)}{2}>\alpha \end{equation} One can check that Eq. \eqref{eq:constraint1} can be satisfied only if $\alpha<1/3$. In this case, $\nu$ and $\xi$ close to 1 can be chosen so Eq. \eqref{eq:constraint1} is satisfied only if \begin{equation}\label{eq:constraint2} \kappa\in (\alpha,1-2\alpha) \text{ and } \lambda\in (0, 1-\frac{2\alpha}{1-\kappa}). \end{equation} If Eq. \eqref{eq:constraint1} is satisfied, then Eq. \eqref{eq:yassymp} implies that \begin{equation} \lim_{n\to\infty}\frac{n^\gamma}{Y_n}=0 \end{equation} provided \begin{equation}\label{eq:constraint3} \eta>\frac{[\gamma(\beta+1)-1]}{\nu\lambda \sigma\theta}\log(1/p). \end{equation} We conclude that if Eq. \eqref{eq:constraint3} is satisfied, then $n^\gamma/x_n\to 0$.\newline We can choose parameters so Eq. \eqref{eq:constraint3} is satisfied if $\eta$ is larger than \begin{equation} \inf \frac{[\gamma(\beta+1)-1]}{\nu\lambda \sigma\theta}\log(1/p)= \frac{2[\gamma(\beta+1)-1]}{1-\frac{2\alpha}{1-\alpha}}\log(1/p), \end{equation} where the infimum is taken over parameter values satisfying Eqs. \eqref{eq:constraint2} and \eqref{eq:constraint1}. \end{proof} The following general proposition is needed to adapt the proof of Theorem \ref{thm:mainthm} to the thermodynamic limit. \begin{proposition}\label{prop:intpic} Let $\Phi_1,\Phi_2:\mathcal{P}_0(\mathbb{Z})\to\mathcal{A}_\mathbb{Z}^\text{loc}$ are two $F$-norm bounded interactions with respect to some $F$-function. Let $H^j_\Lambda=\sum_{X\subseteq\Lambda}\Phi_j(X)$ denote the corresponding local Hamiltonians for each finite volume $\Lambda\subset\mathbb{Z}$. Let $\tau_t$ denote the thermodynamic limit of the model $\Phi_1+\Phi_2$. Then the following limit holds, \begin{equation} \tau_t=\lim_{\Lambda_2\uparrow\mathbb{Z}}\lim_{\Lambda_1\uparrow\mathbb{Z}} \tau_t^{H_{\Lambda_1}^1+H_{\Lambda_2}^2} \end{equation} where the limits are taken along any increasing, exhaustive sequences of finite subsets of $\mathbb{Z}$. For each finite $\Lambda\subset\mathbb{Z}$, $\lim_{\Lambda_1\uparrow\mathbb{Z}}\tau_t^{H^1_{\Lambda_1}+H_\Lambda^2}$ can be expressed in terms of the interaction picture: \begin{equation}\label{eq:intdecomp} \lim_{\Lambda_1\uparrow\mathbb{Z}} \tau_t^{H_{\Lambda_1}^1+H_\Lambda^2}=\tau_t^{\Lambda,I}\circ\tau_t^0, \end{equation} where $\tau_t^0$ is the thermodynamic limit of the model $\Phi_1$, and $\tau_t^{\Lambda,I}$ is the dynamics generated by the time-dependent, quasi-local Hamiltonian $\tau_t^0(H_\Lambda^2)$. \end{proposition} Armed with Proposition \ref{prop:intpic}, the proof of Theorem \ref{thm:thermolimit} is nearly identical to the proof of Theorem \ref{thm:mainthm}. Using the decomposition \eqref{eq:intdecomp}, one can show that the bound \eqref{eq:conditionalLRbound} in Lemma \ref{lemma:intLRbound} holds with $\tau_t^{H_n^I}$ replaced by $\tau_t^{\Lambda,I}$, uniformly for intervals $\Lambda\supseteq[0,n]$. One can then obtain the bound \eqref{eq:highprobLRbound} with $\tau_t^{H_n}$ replaced by $\tau_t^{I;\Lambda}\circ \tau_t^0$. Taking the limit $\Lambda\uparrow\mathbb{Z}$ gives this bound for the thermodynamic limit, and the proof proceeds exactly as before. \section{Applications}\label{sec:applications} As mentioned before, MBL in the sense of dynamical localization without an energy restriction, has been rigorously established only for the random $XY$ chain and partial results exists for the quantum Ising chain. Naturally, applications of the results in this paper, at the moment, are also restricted to these two models. An extension we will not discuss in detail here is to fermion chains. Our arguments go through without change as long the same obvious analogous conditions are satisfied. Generalizing in another direction, one could consider non-random quasi-periodic chains with localization properties such as the Fibonacci chain \cite{mace:2019} or the fermion models studied by Mastropietro \cite{mastropietro:2017,mastropietro:2017a}. \subsection{The Disordered XY Chain}\label{subsec_xychain} Consider three real-valued sequences $\mu_j,\gamma_j$ and $\omega_j$. These sequences may be random. The finite volume anisotropic XY Hamiltonian in an external field in the $z$-direction is given by the Hamiltonian \begin{equation} H_n^{XY}=\sum_{j=0}^{n-1}\mu_j[(1+\gamma_j)\sigma_j^x\sigma_{j+1}^x+(1-\gamma_j)\sigma_j^y\sigma_{j+1}^y]+\lambda\sum_{j=0}^{n}\omega_j \sigma_j^z, \end{equation} acting on $\bigotimes_{x=0}^n\mathbb{C}^2$. Here $\sigma_j^x,\sigma_j^y,\sigma_j^z\in\mathcal{A}_{j}$ denote the Pauli spin matrices acting on the $j$th spin. It is well known that the many-body XY Hamiltonian can be written in terms of an effective one-body Hamiltonian via the Jordan-Wigner transformation \cite{lieb:1961}: \begin{equation} H_n^{XY}=\mathcal{C}^*M_n\mathcal{C}, \end{equation} where $\mathcal{C}^t=(c_0,...,c_n,c_0^*,...,c_n^*)$ is a column vector of operators $c_j$ given by $$ c_j=\frac{1}{2}(\sigma_j^x-i\sigma_j^y)\prod_{k=0}^{j-1}\sigma_k^{z}, $$ and $M_n$ is a 2$\times$2 block matrix, $$ M_n=\left(\begin{array}{cc}A_n & B_n \\-B_n & -A_n\end{array}\right) $$ with $$ A_n=\left(\begin{array}{ccccc}\omega_0 & -\mu_0 & 0 & 0 & 0 \\-\mu_0 & \ddots & \ddots & 0 & 0 \\0 & \ddots & \ddots & \ddots & 0 \\0 & 0 & \ddots & \ddots & -\mu_n \\0 & 0 & 0 & -\mu_n & \omega_n\end{array}\right), $$ and $$ B_n=\left(\begin{array}{ccccc}0 & -\mu_0\gamma_0 & 0 & 0 & 0 \\\mu_0\gamma_0 & \ddots & \ddots & 0 & 0 \\0 & \ddots & \ddots & \ddots & 0 \\0 & 0 & \ddots & \ddots & -\mu_n\gamma_n \\0 & 0 & 0 & \mu_n\gamma_n & 0\end{array}\right). $$ The following result was proved in \cite{hamza:2012}: \begin{theorem}\label{hamzathm} Suppose that the matrices $M_n$ are exponentially dynamically localized in the following sense: there exist positive constants $C$ and $\eta$ such that for any integers $n\geq 0$ and $j,k\in[0,n+1]$, \begin{equation}\label{xyeff} \mathbb{E} [\sup_{t\in\mathbb{R}} | (e^{-it M_n})_{j,k}|+|(e^{-it M_n})_{j,n+k+1}|]\leq Ce^{-\eta |j-k|}. \end{equation} Then the Heisenberg dynamics $\tau_t^{H_n^{XY}}$ of the $XY$-chain is exponentially dynamically localized, uniformly in time, with $\chi(x)=4^x$. \end{theorem} Theorem \ref{hamzathm} shows that if the sequences $\mu_j,\gamma_j$ and $\omega_j$ are such that dynamical localization for the $M_n$ holds, then Theorem \ref{thm:mainthm} applies to the XY chain. If, in addition $\sup_j \mu_j$ and $\sup_j\gamma_j$ are almost surely finite, then the XY chain satisfies the hypotheses of Theorem \ref{thm:thermolimit}. There are several instances in which the matrices $M_n$ are known to satisfy \eq{xyeff}. For example, if $\gamma_j=0$ and $\mu_j=1$ for all $j$, and the $\omega_j$ are i.i.d. with compactly supported density, then $B_n=0$ and $A_n$ is the finite volume Anderson model. In this case it is well known that \eq{xyeff} holds \cite{kunz:1980}. In \cite{elgart:2014} a large class of random block operators were shown to exhibit exponential dynamical localization at high disorder. Under the assumption that $\mu_j$ and $\gamma_j$ are deterministic and bounded, and that the $\omega_j$ are i.i.d. with sufficiently smooth distribution, this class of random block operators includes $M_n$ and \eq{xyeff} holds for sufficiently large $|\lambda|$. Therefore in these models the conditions of theorems \ref{thm:thermolioms}, \ref{thm:mainthm} and \ref{thm:thermolimit} are satisfied. The anisotropic case was also investigated in \cite{chapman:2015}. The methods there prove localization of the $M_n$ for $\omega_j$ with compactly supported distribution contained in $(-\infty,-2)$ or $(2,\infty)$. For these results smoothness of the distribution is not needed, however the method produces a bound with a stretched exponential, not an exponential as in \eq{xyeff}. This localization bound is shown to imply a uniform in time localization bound for the XY chain where the decay is given by a stretched exponential. Therefore disordered anisotropic XY models have LIOMs, as shown by Theorem \ref{thm:thermolioms}, but our results do not imply robustness of long transmission times under perturbation. \subsection{The Quantum Ising Chain} Another model that has been widely discussed in the literature is the quantum Ising with random coefficients. For concreteness, consider the following family of Hamiltonians for a spin-$1/2$ systems on a chain $[a,b]\subset \mathbb{Z}$: \begin{equation} H_{[a,b]} = \sum_{x=a}^{b-1} J_x \sigma_x^3\sigma_{x+1}^3 + \sum_{x=a}^b \gamma\Gamma_x \sigma_x^1 + h_x\sigma_x^3, \label{QIsingHamiltonian}\end{equation} where $(J_x), (\Gamma_x),$ and $(h_x)$ are three independent sequences of i.i.d. random variables, each with bounded density of compact support. Mathematical work by John Imbrie and a variety of numerical results point towards the existence of a description of this model in terms of LIOMs of the first kind (Definition \ref{def:LIOM}). To state the various claims we need to introduce the assumptions made by Imbrie \cite{imbrie:2016}. Let $\lambda_\alpha^{[a,b]}$ denote an enumeration of the eigenvalues, which are almost surely simple. \noindent {\em Imbrie's Assumption:} There exist $\gamma_0$, such that for all $\gamma \in (-\gamma_0,\gamma_0)$, there exists constants $\nu , C>0$, such that for all $\delta>0,a <b \in \mathbb{Z}$ we have \begin{equation} \mathbb{P} (\min_{\alpha\neq \beta} |\lambda_\alpha^{[a,b]} - \lambda_\beta^{[a,b]}|<\delta)\leq \delta^\nu C^{b-a+1}. \label{ImbriesAssumption}\end{equation} In \cite{imbrie:2016} Imbrie uses a systematic perturbation theory which, under his assumptions, he argues combines with a multi-scale analysis to prove detailed properties about the eigenvectors of the Hamiltonians $H_{[a,b]}$ for sufficiently small $\gamma$, uniformly in the length of the chain. We should note, however, that among experts in the multiscale analysis approach to proving localization there is no agreement that such an argument can indeed be carried out along the lines described in \cite{imbrie:2016}. In the review paper \cite[Section 4.3]{imbrie:2017} the following implications of the perturbation analysis of \cite{imbrie:2016} are stated: $H_{[a,b]}$ is diagonalized by a quasi-local unitary transformation and the resulting energy eigenvalues when labeled by Ising configurations take the form of a random Ising model with multi-spin interactions of strong decay, i.e., something very similar to the LIOM picture we define in Definition \ref{def:LIOM}. The LIOM representation is explained by starting from Imbrie's localization property for the eigenvectors $\psi^{[a,b]}$ which reads as follows: there exists $\kappa>0$ such that for all sufficiently long finite intervals $[a,b]$ containing the origin one has $$ \left| 1- \mathbb{E} \left[ \sum_\alpha \rho_\alpha |\langle\psi_\alpha, \sigma^3_0\psi_\alpha\rangle|\right] \right|\leq \gamma^\kappa, $$ where $\rho_\alpha$ is a probability distribution such as $$ \rho_\alpha = \frac{e^{-\beta \lambda^{[a,b]}_\alpha}}{\sum_\gamma e^{-\beta \lambda^{[a,b]}_\gamma}}. $$ In the spirit of these results it appears that the disordered quantum Ising chain may indeed be a model where the exponential dynamical localization of Definition \ref{def:dynlocaliz} and the LIOM picture of Definition \ref{def:LIOM} indeed both hold.
\section{Algorithms}\label{sec4} Two dynamic synchronous scheduling algorithms with redundancy built into them for scheduling tasks with varying time requirements onto a bunch of IoT nodes are developed. The unique aspects of the algorithms are an adapted publish-subscribe status update scheme, quorum checking, redundancy and the local scheduler which are explained in the following subsections. The main focus of the algorithms is to ensure that synchronous tasks are scheduled to run at the same time across all workers. Tasks are gotten from the application graph and arrive in order of precedence such that a task depending on output data from a previous task cannot be spawned until the previous task has finished executing. One input to the synchronous scheduling algorithms is a set of available tasks. The algorithms are expected to output a schedule of tasks that minimizes the overall execution time and ensures that the desired level of synchronization is met with respect to the quorum requirements. In addition to the notations introduced in Section~\ref{sec3}, the following notations are used in the algorithms. A description of symbols used in this paper is shown in Table~\ref{proj_table}. \begin{table}[!ht] \renewcommand{\arraystretch}{1.2} \caption{Algorithm notations.} \label{proj_table} \centering \begin{tabular}{l|l} \bfseries Symbol & \bfseries Description \\ \hline $T_{curr}$ & current task to be scheduled \\ \hline $T_{rbq}$ & ratio-based quorum check task \\ \hline $T_{cbq}$ & cluster-based quorum check task \\ \hline $T_{update}$ & status update task \\ \hline $t_{avail}$ & available time of a worker \\ \hline $\lambda$ & delay before re-attempting quorum \\ \hline $\delta$ & predicted quorum check time \\ \end{tabular} \end{table} \subsection{Status Update Scheme} Workers need to update the controller of their availability to partake in synchronization upon reaching a synchronization point. The controller processes this information serially due to its single-threaded nature. Thus, the message complexity of the update sending process scales up linearly with the number of workers; thus, increasing the time required to achieve synchronization significantly. To mitigate this problem, the popular publish-subscribe scheme is adapted to reduce the number of update messages sent to the controller. Worker nodes are grouped into clusters and each cluster is assigned a local broker, where all the workers publish their availabilities. They also subscribe to the broker to know the peer availabilities and when a worker detects that the required number of peer workers are present, it will publish a group availability message at the broker. The controller subscribes to the group availability message but not the not local availabilities. So, it ends up processing far less with the broker. \subsection{Quorum Types} Quorum checking is done by workers to probe the controller on whether the required conditions for proceeding to run the synchronization task are met, thus providing some $QoS_{ync}$. Two types of quorum conditions are considered. One based on ratio of workers available and the other on cluster representation. A worker is said to be available if it has finished executing its previous task and is physically present to run the next task. The two types of quorum checking are ratio-based (launched on workers by running $T_{rbq}$) and cluster-based (launched on workers by running $T_{cbq}$) quorums, both of which are presented in the taxonomy in Section~\ref{qcheck}. \subsection{Synchronous Scheduling Scheme} As seen in Fig.~\ref{sequence}, the controller sends a sync call ({\tt syncCall()}) to the workers on getting to a synchronization point. The workers update the controller of their status ({\tt pushStatusUpdate()}) either using a naive scheme where all workers send update messages to the controller or using the adapted publish-subscribe update scheme. The pseudocode for the algorithm is shown in Algorithm~\ref{pseudo}. \begin{figure}[bt] \centering \includegraphics[width=3.3in]{sequence.pdf} \caption{Sequence diagram showing the interactions between the controller and workers at synchronization point.} \label{sequence} \end{figure} The controller computes the predicted quorum check time $\delta$ based on the status update from workers and sends the time to local schedulers on workers ({\tt sendQuorumCheckTime($\delta$)}). The local scheduler on a worker tries to minimize wait time by comparing the available time of the worker with $\delta$ and estimates if a local task (provided there is one in the local task queue) can fit within the gap as shown on~\textit{Line 6} of Algorithm~\ref{pseudo}. The local scheduler ({\tt localSchedule($\delta)$}) is an optimization scheme to minimize the idle time on workers that become available earlier than other workers as shown in Algorithm~\ref{local}. Asynchronous and local worker tasks are scheduled as they become the current task at the earliest available times on workers. \begin{algorithm}[tbp] \SetAlgoLined Let $A$ = {set of available tasks} \textit{SyncSchd(A)}: \tab \textbf{while} $T_{curr} \neq \phi$ \textbf{do}: \stab \textbf{if} \textit{type($T_{curr}$) = $c2w_s$}: \mtab \textit{pushStatusUpdate()} \mtab $\delta$ = \textit{computeQuorumCheckTime()} \mtab \textit{localSchedule($\delta$)} \mtab \textit{revise\_available\_times($t_{avail}$, max\_t\_avail)} \mtab \textit{schedule(quorum check task)} \textbf{\mtab Time-based redundancy:} \mtab r = \textit{getAvailableRatio()} \mtab \textbf{if} \textit{r $>=$ sync degree}: \ltab \textit{schedule($T_{curr}$)} \mtab \textbf{else if} \textit{r $<$ sync degree} \&\& retries available: \ltab \textit{SyncSchd(A, $t_{avail} + \lambda$)} \mtab \textbf{else if} \textit{r $<$ sync degree} \&\& no more retries: \ltab \textit{syncAbort()} \textbf{\mtab Component-based redundancy:} \mtab e = \textit{computeRedundancy()} \mtab \textbf{if} \textit{e $>=$ required redundancy}: \ltab \textit{schedule($T_{curr}$)} \mtab \textbf{else}: \ltab \textit{syncAbort()} \mtab \textit{remove($A, T_{curr}$)} \stab \textbf{else if} \textit{type($T_{curr}$) = $c2w_a$} $\parallel$ \textit{type($T_{curr}$) = $W_l$}: \mtab \textit{revise\_available\_times($t_{avail}$, get\_ctrl\_avail\_time())} \mtab \textit{schedule($T_{curr}$)} \stab \textit{remove($A, T_{curr}$)} \caption{Pseudocode for synchronous scheduling algorithms.} \label{pseudo} \end{algorithm} The two types of the dynamic synchronous scheduling algorithm are the time-based redundancy where synchronization is attempted based on waiting and a capped number of retries, and the component-based redundancy where at least a certain number of workers within a group are expected to be present before quorum can be passed. \subsubsection{Synchronous Scheduling Algorithm with Time-Based Redundancy}\label{timeAlgo} Here, the synchronization degree represents the ratio of workers that must be available before the synchronous task can be run. Whenever the ratio-based quorum check task $T_{rbq}$ is scheduled (\textit{Line 9}), the controller computes the ratio of available workers. If the ratio of available workers is greater than or equal to the expected synchronization degree~(\textit{Line 12}), the controller computes the expected synchronous task start time and the synchronous task is scheduled. If the synchronization degree is not met and there are more retries left (\textit{Line 14}), execution is delayed for time $\lambda$ and the process is retried. However, if the synchronization degree is not met and there are no more retries left, the synchronous task is failed (\textit{Line 17}). An example where time-based redundancy is useful is in bridge health monitoring. If while trying to take measurements a failure occurs, the application can proceed with its processing and repeat the bridge strain measurement at a later point in time. \subsubsection{Synchronous Scheduling Algorithm with Component-Based Redundancy} Here, workers are always part of a logical cluster as they move around in the system (e.g., vehicles). At a synchronization point, after the update of the workers' status at the controller (\textit{Line 5}) and the triggering of the local schedulers (\textit{Line 7}), the workers run the quorum check task ($T_{cbq}$). The controller computes and checks whether the required level of redundancy is met by each cluster (\textit{Line 19-20}). This computation is done by comparing the number of workers available in each cluster with the expected number of devices per cluster. In the event of a successful quorum, the synchronous task is scheduled to run. If the desired level of redundancy is not met, the synchronous task is failed (\textit{Line 23}). In this algorithm, a synchronous task is marked as successfully completed if and only if at least the required number of workers per cluster returns a result after executing the synchronous task. Thus, the synchronization result is abstracted at the cluster level. If the desired redundancy in output is not met, the synchronous task is considered to have failed. An example of where component-based redundancy is useful is in the drone transportation scheme. The drones are expected not to perform the transportation task if the desired number of backup drones are not available. \subsection{Local Scheduler} The local scheduling is an optimization scheme developed to minimize the waiting of workers that get to the synchronization point earlier than other workers. Since the workers do not communicate directly with each other but only with the controller, workers on getting to a synchronization point have no information about other workers. So, by running a local scheduler, a worker compares its current time with the predicted finish time $\delta$ across all workers as shown in Algorithm~\ref{local}. The local scheduler would run a local task if the gap between the predicted availability of the other workers $\delta$ and the local node's availability $t_{avail}$ is greater than the local task's length. Otherwise, the local scheduler would not schedule any local task and let the worker sit idle. \begin{algorithm}[htbp] \SetAlgoLined \textit{localSchedule($\delta$)}: \textit{L} = \{local worker task queue\} \textbf{while} \textit{get\_tasks(L) =} $T_{local}$ and $T_{local} \neq \phi$ \textbf{do}: \tab \textbf{if} $t_{avail}$ + $t_l \leq \delta$: \stab \textit{schedule($T_{local}$)} \stab \textit{revise\_available\_times($t_{avail}$, max\_t\_avail)} \tab \textbf{else}: \stab continue \caption{Local scheduling algorithm for minimizing idle time} \label{local} \end{algorithm} \section{System Architecture}\label{sec3} In the system, nodes are organized into a multi-level controller-worker tree as shown in Fig.~\ref{model} with the cloud at the topmost level of the tree and worker nodes at the leaves of the tree. Workers could be fixed or mobile. Fogs are located between the cloud and workers. The cloud controller has a global view of the entire system while the fog-level sub-controllers have limited view but are located closer to the workers. This architecture is suitable for achieving synchronization in IoT because it permits worker nodes to join, leave or move around, thus, changing membership one sub-controller to the other. The fog-level controllers provide localized and low latency services to the worker which is necessary for getting synchronization in IoT. Multiple levels of sub-controllers could exist between the cloud and the workers, the sub-controllers could be at the fog and device level. Tight clock synchronization is assumed across all the levels in the tree by leveraging the hierarchical architecture and the recent advancements in clock synchronization schemes~\cite{ademaj2007time}. Our controller-worker model is inspired by systems such as multi-robot systems~\cite{gautam2012review}, software defined networking (SDN)~\cite{kreutz2015software} and fog computing systems. \subsection{Node Model} Both the controllers and workers in our system follow a single-threaded execution model (i.e., they can only run a single task at a time). Worker nodes are isolated from each other and thus, no direct link exists between them. Workers only communicate with the sub-controller or controller to which they are connected. Communication between a worker and controller is bi-directional, that is data can flow both ways. The scope of the task being run determines what level of controller the workers communicate with. A global scope will require communication to exist between the main controller (cloud-level controller) and workers either directly or through sub-controllers. A non-global scope involves workers communicating with the fog-level controller while a much more localized scope involves workers communicating and working with only the device-level controller. \begin{figure}[b] \centering \includegraphics[height=2.2in]{archi} \caption{Multi-level hierarchical node model showing controller, sub-controllers and worker nodes.} \label{model} \end{figure} A heterogeneous system is assumed where worker nodes have varying processing and computational capabilities, thus, worker nodes are expected to have different execution times for the same task. Due to network disruptions, mobility or node failures, disconnections can occur between worker nodes and controllers. Disconnected workers can rejoin the system by connecting to a controller and new workers can only join the system if they connect to a controller. \subsection{Application and Task Model} An application written for this model consists of remote and local function calls. The remote function calls invoked by the controllers on sub-controllers and workers are downcalls while calls by the workers on controllers at any level (i.e., one or more of the cloud, fog, device levels) are upcalls. For instance, the root controller can downcall to the fog-level or device-level. \begin{figure}[t] \centering \includegraphics[height=1.7in]{taskModel} \caption{Task model showing synchronous, asynchronous and local calls between controllers and workers.} \label{task} \end{figure} The upcalls and downcalls can either be synchronous or asynchronous as shown in Fig.~\ref{task}. A synchronous call blocks the calling node until the remote execution completes while an asynchronous call is non-blocking. Because the upward and downward calls can involve multiple workers, the synchronous execution of the calls is not simple. In particular, the conditions under which the group would provide a valid execution for a synchronous call needs to be defined. When a controller makes a synchronous downcall, workers individually sign up for executing the function. Once the controller receives commitments from sufficient number of workers to run the function, the controller will proceed with running the function on the workers. The requirement is to start the execution precisely (assuming the underlying clocks are synchronized) at the same time across all the workers. This is a hard problem because even the signed-up workers can become available to execute the function at different times. Therefore, the function execution needs to be scheduled across the workers such that the start time skew and idle times at the workers are simultaneously minimized. Tasks are classified based on function calls into the following categories. \begin{enumerate} \item \textbf{Controller-to-worker asynchronous call}: This is a call from a controller to its worker nodes to run a task without having strict timing conditions, that is, the controller does not wait during this period. This task is denoted as $c2w_{a}$. \item \textbf{Controller-to-worker synchronous call}: The controller sends a command to all its worker nodes to start executing a task at the same point in time. The controller waits until all worker nodes have finished executing the task and returned an output. This task is denoted as $c2w_s$. \item \textbf{Worker-to-controller asynchronous call}: This is a call from a worker node to one of its controllers to run a task. The worker does not wait during this period and continues with its own execution plan. This task is denoted as $w2c_a$ \item \textbf{Worker-to-controller synchronous call}: The worker node waits for an acknowledgement from the controller that it has finished executing the task associated with the call. This task is denoted as $w2c_s$ \item \textbf{Self calls}: This is a call from a node to itself. It could be either a worker node calling itself or a controller calling itself. A self triggered worker task is called a local worker task and is denoted as $w_l$ while a self triggered controller task is denoted as $c_l$. \end{enumerate} \section{Background and Motivation}\label{sec2} Synchronization is a well studied topic in computer science. In gang scheduling~\cite{karatza2006scheduling} and coscheduling ~\cite{sobalvarro1998dynamic} where tasks of a parallel job are scheduled and executed at the same dedicated node, synchronization is achieved by using busy waiting. In parallel computing models such as the bulk synchronous parallel (BSP) model~\cite{valiant1990bridging} where the execution model is broken into computation and communication super steps, synchronization is achieved by using barriers. Barrier synchronization involves processes stopping at the barrier until all other processes reach the barrier~\cite{khayyat2013mizan, jakovits2012stratus}. Thus, faster processes have to wait for slower processes, with the bottleneck being the slowest process. Time slotting has been adopted as a way of achieving synchronization in wireless sensor networks~\cite{vogli2015fast, ozil2007time}. Dedicated synchronization time slots are chosen and devices attempt to perform synchronization tasks only in the dedicated time slots. Time slotting suffers from stragglers as with barrier synchronization. Slow workers will miss the dedicated synchronization slot and will result in the synchronization failing. Synchronization schemes in distributed systems cannot be directly applied to IoT due to the following factors. (i) Node connectivity could be highly unstable in IoT due to mobility and disconnections unlike distributed systems where stable connection exists among nodes. Synchronization schemes in distributed systems are developed based on this assumption and are thus not suitable for highly dynamic systems. (ii) The network topology rapidly changes due to nodes joining and leaving in IoT unlike distributed systems. (iii) There is an interaction with physical things that have real-time window constraints in IoT unlike traditional distributed systems which do not necessarily affect real world systems. (iv) Nodes in IoT could be highly heterogeneous e.g., sensors, mobile phones, cars etc., unlike distributed systems where nodes have similar characteristics. \subsection{Definition and Taxonomy of Synchronization in IoT}\label{definition} Synchronization in IoT in the scope of this work is defined as the coordination of a set of IoT nodes to harmonize on the execution of a task at the same point or at multiple points in time. Classification of synchronization in IoT is done based on unique attributes and requirements of synchronization in IoT. The taxonomy of synchronization in IoT is shown in Fig.~\ref{taxonomy} and the classification is as follows. \begin{figure*}[htbp] \centering \includegraphics[width=6.2in]{taxonomyIoT.pdf} \caption{Taxonomy of synchronization in IoT.} \label{taxonomy} \end{figure*} \subsubsection{Total number of controllers} The number of controllers in an IoT system could be single or many depending on the scope of the system. In the case of a single controller, all workers must be connected to the controller to be part of the system. In a multi-controller system, workers connect to the controller that is closest to them or assigned to their physical vicinity. Workers can change controller membership as they move around. \subsubsection{Number of controllers at synchronization point} Synchronization could be at a global scale or local scale. In a global synchronization, all the controllers in the system must ensure that the devices under them synchronize their activities on the given sync task. In a local synchronization, only a subset of controllers that are affected by the synchronization are involved in the synchronization process. \subsubsection{Synchronization point time alignment} All the controllers participating in the synchronization can either orchestrate the devices under them to start the execution of the sync task at the same time or at different times. Thus, a single controller system can only permit an aligned sync point time while a multi-controller system can permit both an aligned and a non-aligned sync point time. \subsubsection{Node participation} Some synchronization tasks require either all or some specified number of the devices connected to a controller to partake in the synchronization process. The participation of devices is dependent on their availability to run the sync task and the requirements of the sync task itself. \subsubsection{Node types} Synchronization in IoT is affected by node types. Nodes could be homogeneous, having similar attributes or heterogeneous, having different attributes. \subsubsection{Node mobility} Mobility is an important factor affecting synchronization in IoT. Nodes could be mobile, such as hand-held devices, cars etc, or fixed such as nodes placed on lamp posts. \subsubsection{Quorum requirement}\label{qcheck} The conditions at which synchronization can occur are either having at least the required fraction of nodes available to run the synchronous task (\textit{ratio-based quorum}) or having the desired representation per group of clustered nodes (\textit{cluster-based quorum}). The $QoS_{ync}$ is defined by the quorum requirement conditions. \subsubsection{Synchronicity} In atomic synchronization, a sync task is executed or not depending on the quorum success or failure. In eventual synchronization, the sync task is run regardless of whether the nodes are synchronized, synchronicity is expected to increase with time. \subsection{Synchronization Use Cases} The use cases for synchronization in IoT are identifies as follows: \subsubsection{Capacity pool} IoT and other smart devices are usually limited in their computing and sensing capabilities. Thus, there is a need for cooperation among several devices to solve a much bigger problem than can be solved by an individual device. The devices must pool their resources together in a coordinated manner in order to be successful. An example is autonomous drones pooling their lifting capacities to carry a large package from one point to another. \subsubsection{Data capture synchrony} Data synchronization~\cite{liu2015} is an important problem in IoT data acquisition. Using synchronous tasks for capturing data allows us to precisely control the relative timing relations among the data points. In data capture synchrony, different subset of nodes can be made to synchronize at different points in time thus achieving some level of data ordering. \subsubsection{Resource usage synchrony} IoT devices consume resources (e.g. power) for their operation; therefore, there is a need for subset synchronization to sequence the operating order of the IoT devices to minimize the maximum resource usage profile. Take for example a smart lighting system consisting of a large number of bulbs, to light up (cover) a particular area, only a subset of the bulbs need to be turned on at the same time. Synchronization can be used to incrementally change the lighting intensity or maintain a constant lighting intensity. \subsection{Example Deployment Scenarios} Three application scenarios where synchronization among devices is of high importance are given. \subsubsection{Drone Delivery System} Drone transportation~\cite{chalupnivckova2014use} is becoming increasingly popular and lots of research and industrial effort is going into using drones as a means of transporting humans, goods (e.g. Amazon and UPS), vaccines and other products. In goods transportation, rather than use a large drone, smaller drones could be deployed and coordinated to carry heavy goods from one facility to another. Drone transportation is an example of capacity pooling where the required number of drones is pooled from the available drones with component-based redundancy included to cater for failures. Time, location and redundancy are important factors in drone transportation. A certain number of drones are needed at the start location before a lift could commence. Predictive models can be used to estimate the availabilities of the drones at different locations and times which can be used to improve the overall transportation schedule. \subsubsection{Smart Cars and Self Driving} A smart (autonomous) car carries enormous amount of computing, storage and sensing capacities~\cite{glancy2015autonomous}. With fast wireless networks and fog computing, smart cars can share their capacities with other cars or with the road side infrastructure and vice-versa. Such a swarm of cars will have significantly augmented capabilities; that is, a smart car could have more capabilities (i.e., higher level autonomy~\cite{hasan2011intelligent}) on a smart highway (SH) than what is capable of on a normal highway. Smart cars need up-to-date information about the status of the road (presence of other cars and the road condition) and other driving conditions (such as weather) to drive safely. The SH can be divided into segments with each segment providing virtual resources to the swarm of smart cars within its range. The shared pool of resources including video cameras, pressure sensors, and speed monitors need to operate synchronously to tackle the tasks in real time without creating backlogs (i.e., a { \em capacity pool} use case for multi-point synchronization). The challenge here is to deal with coalitions that are short-lived (i.e., coalitions created and destroyed as cars move by) with low synchronization overhead. \subsubsection{Bridge Health Monitoring} This is an example of the~\textit{data capture synchrony} use case. Strain measurement at bridge joints and other important points in the structure is required to maintain a close watch on the health of a bridge structure. To make high quality measurements, it is necessary to coordinate the data capture operations such that they are made when the loading is at a particular configuration. The loading configuration would be measured by the position of the vehicles on the bridge at that instant and their weight. The most accurate way of doing such a measurement is to actuate all involved devices (sensors and vehicles) to run the measurement function at the same time instant. If different devices run the measurement function at different time points, a complex reconstruction procedure need to be executed to determine the concurrent loading. The fine-grained measurements are only of interest while the vehicles are on the bridge. That is, they do not need to continue to take fine grained position measurements and report them when they are not on the bridge. \section{Conclusions and Future Work}\label{sec8} The need for synchronization in edge-enabled IoT is motivated with application scenarios and use cases. A system model is developed for mapping applications with and without synchronization requirements onto an edge-enabled IoT system. Two dynamic scheduling algorithms are proposed for mapping applications with different quorum requirements. The applications can have synchronous, asynchronous and local tasks in them. The tasks are mapped onto a group of single-threaded heterogeneous nodes that can possibly disconnect from each other. The challenge for the synchronization algorithms is to keep synchrony between the task executions despite disconnections. The synchronization scheduling algorithms use two ideas: time-based and component-based redundancies. It was observed that time-based redundancy is suitable for applications where repeating the task executions is acceptable. Whereas the component-based redundancy is needed for applications that cannot wait for task re-executions. Experiments are conducted to evaluate the performance of the proposed algorithms and to explore the different trade-offs between the two approaches. Updating the controller with the progress in task executions is important for synchronization scheduling. It was found that using a publish-subscribe update scheme reduces the communication load on controllers; thus, effectively reducing the overall execution times of the synchronous tasks. It was observed that increasing the level of redundancy for component-based redundancy decreases the runtime and reduces the percentage of sync task failures. Likewise, the prediction accuracy of the finish time of tasks on the workers has a significant impact on the runtime and synchronization task failure. The proposed algorithms have shorter runtimes than barrier synchronization and have less synchronization task failures when compared to time slotted synchronization. One area of future work is applying machine learning for completion time prediction and incorporating that into synchronization scheduling. Another is to handle device mobility across the fogs. In particular, with vehicular clouds, it is possible to have vehicles joining and leaving different fog zones as they travel. The synchronization scheduler needs to control the vehicle to fog associations to minimize synchronization task failures due to mobility. \section{Implementation and Observations}\label{sec6} \subsection{Implementation Details} The time-based redundancy algorithm (shown in Section~\ref{timeAlgo}) is used to implement {\em multi-point} synchronization in JAMScript. JAMScript is a polyglot language; it brings together C and JavaScript with some additional constructs needed to implement the programming model. The C side implements the {\em worker} side of the programming model and JavaScript side implements the {\em controller} side. This means the C side runs at the lowest level of the system. For instance, embedded devices (e.g., sensors and actuators) will be running the C component. This allows us to target memory constrained devices (planned for the future). The JavaScript running in a NodeJS runtime is responsible for implementing the controllers. The NodeJS based controller can run from low power devices to all the way to cloud servers. This implementation is achieved in two stages. In the first stage, a single-point synchronization scheme is realized, where only one controller orchestrates the operation of all workers. At this time, the single-point synchronization is basic and lacks the {\em local scheduler} optimization to minimize the idle time in the workers. Therefore, the local, asynchronous, and synchronous task order is kept the same as that specified in the program. In the second stage, the single-point synchronizer is used to create a multi-point synchronizer by using a hierarchy of controllers. For instance, by placing a controller at \texttt{C1} the operations are synchronized across all the workers in Fig.~\ref{model}. Alternatively, if the controllers are placed at \texttt{F1} and \texttt{F2}, which themselves are coordinated by a super controller at \texttt{C1}, then the workers can be synchronized in two sub groups: \texttt{G2} and \texttt{G3}. \subsection{Example JAMScript Program Snippets} Listing 1 shows the controller side of the example JAMScript program. The {\tt trytellid()} function is responsible for calling the synchronous function {\tt tellid()} on the worker nodes. The {\tt trytellid} function is a conditional function that only runs at the fogs. That is, when the given JAMScript program is run in a resource configuration shown in Fig.~\ref{model}, the {\tt trytellid} runs only in Fogs {\tt F1} and {\tt F2}. {\tt F1} would synchronize {\tt G2} and {\tt F2} would synchronize {\tt G3}. However, workers in {\tt G2} and {\tt G3} would not be synchronized with each other; thus, presenting multi-point synchronization. \lstinputlisting[language=JavaScript,firstnumber=1, caption=Controller side of the JAMScript example.]{code.js}\label{listing1} \lstinputlisting[language=C, caption=Worker side of the JAMScript example.]{code.c}\label{listing2} \subsection{Preliminary Experiments and Discussions} \begin{figure}[b] \centering \includegraphics[height=1.85in]{implement} \caption{Observed execution time(s) for the implementation of the dynamic synchronous scheduling algorithm on JAMScript with the number of workers varying from \textit{2} to \textit{200}.} \label{implementation} \end{figure} Fig.~\ref{implementation} shows the performance of single-point synchronization of a JAMScript program when it is deployed in Docker containers. A task graph with synchronous and asynchronous tasks whose execution times on nodes follow a normal distribution with a mean of $1s$ and a variance of $0.25s$ is used. A normal distribution with a mean of $25ms$ and a variance of $10ms$ is used to represent the network delay. The number of nodes is varied from $2$ to $200$. As part of the future work, an optimized implementation that should reduce the overhead using publish-subscribe and local scheduling will be implemented. It is worthy to note that while JAMScript is used to show the feasibility in implementing the synchronous scheduling algorithms, other controller-centric programming frameworks can be used to implement the algorithms. \section{Introduction}\label{sec1} \IEEEPARstart{I}{oT} come in many shapes and sizes. Because each IoT component will be handling a part of a problem domain, cooperative computing among the IoT components is essential for solving many interesting problems~\cite{abedin2015fog}. For example, consider a situation where a swarm of drones is required to take a snapshot of a search area. A synchronization mechanism is required to ensure that the autonomous drones capture a specified part of the search area at the same time. If the drones do not follow strict timing alignments, it will lead to a poor reconstruction of the search area. As another example take an autonomous car, the car could form a swarm with other cars and road side units. To drive successfully, the car needs assurance that data is collected within a short time interval by the sensing and processing components of the swarm. The car thus needs support from the swarm to ensure that its tasks are run simultaneously across the different constituents. Cooperating IoT need to run tasks of the application in a coordinated manner. One such coordination is running the tasks at the same time. For instance drones lifting a workload need to exert the force at the same time so the effort adds up. To run the tasks at the same time, there is a need for synchronization primitives that would launch the tasks with the start times lined up at all IoT devices. Just having synchronized clocks~\cite{wu2011clock,guo2016psync} is not sufficient because even with an earlier agreed start time, the IoT devices could fail, disconnect from the swarm~\cite{lee2014swarm}, or be busy with a prior task. With tighter synchronization schemes, fine-grained tasks can be run across the cooperating IoT. In this paper, a controller-based scheme for synchronizing the execution of the tasks across a cooperating set of IoT devices is presented. With a controller-based scheme, one of the issues is the location of the controller itself. The recent emergence of fog computing as a major complementary technology to IoT is making it an ideal candidate to host our controller. Fogs are placed closer to the IoT devices they serve, placing the controller on a fog makes it accessible with the lowest possible latency from all IoT devices in the cooperating set~\cite{bonomi2012fog}. The primary focus of this paper is on developing such synchronization schemes that guarantees the desired \textit{quality of synchronization}, $QoS_{ync}$ subject to the conditions under which synchronization is deemed successful. The synchronization scheme has to ensure that the constituent tasks of an application (asynchronous, synchronous and local tasks) are scheduled onto a bunch of cooperating devices while ensuring that the $QoS_{ync}$ is met. The major contributions of this work are as follows: \begin{enumerate} \item A hierarchical system with a controller-worker model for running tasks with strict coordination among cooperating IoT components is presented. \item Two redundancy-based dynamic synchronous scheduling algorithms with different synchrony requirements to handle synchronous, asynchronous and local tasks are developed. \item The practicability of the synchronous scheduling scheme is shown by implementing the time-based redundancy algorithm in JAMScript -- ``a programming language and framework developed for Cloud of Things~\cite{wenger2016programming}''. \end{enumerate} Hereafter, IoT devices are referred to as \textit{workers} and {\em sync} is used to refer to ``synchronization'' or ``synchronous''. The rest of this paper is structured as follows. A background and motivation for this paper is given in Section~\ref{sec2}. The system architecture comprising of the node, application and task models is presented in Section~\ref{sec3}. The algorithms and experimental results are presented in Sections~\ref{sec4} and ~\ref{sec5} respectively. Section~\ref{sec6} provides details on implementation and the observations made. The related work is given in Section~\ref{sec7}. \section{Related work}\label{sec7} Biologically inspired synchronization schemes have been well studied such as pulse coupled oscillator (PCO) synchronization~\cite{hong2005scalable, yadav2017self}. Synchronization in PCO is achieved through a consensus among participating nodes. Assumptions made in PCO are periodic pulse, a mesh connectivity and a zero-communication time. A synchronization scheme combining heartbeat synchronization and a firefly inspired model or overlay networks was proposed in~\cite{babaoglu2007firefly}. The proposed protocol has two main parts, nodes selecting their peer list and processing a flash message received in order to achieve synchronization. An emergent broadcast slot synchronization scheme inspired by firefly algorithms was proposed in~\cite{yadav2017self} for Internet of Things (IoT). Each node maintains a time window that it can be awake during a steady state. Nodes in the network go through three states in order to achieve synchronization. The first state is the initialization state where nodes start their random timers and identify their neighbours. The nodes then transition to the synchronization state, here, the nodes coordinate their synchronization error tolerance window with their neighbours using a Pulse Coupled Oscillator (PCO) model with a phase advancement function. A node becomes synchronized if its synchronicity is greater than the synchronization threshold. Thereafter, the node moves into the steady duty cycle state. In this phase, nodes only wake up during their synchronization error tolerance window to exchange messages. In real time computing systems, synchronization is handled using time-triggered controls where all synchronous activities are executed at some predefined points in time~\cite{vrancic2006synchronization}. Synchronized clocks are used to achieve synchronization in the systems by making each node have a common notion of time. Time synchronization schemes~\cite{guo2016psync, elsts2017temperature} have been developed for IoT to allow devices have a common notion of time. In~\cite{guo2016psync}, a visible light produced by light emitting diodes (LEDs) are used by devices within that vicinity to synchronize. Synchronization is achieved by allowing a number of LEDs to send out binary signals at the same time and at predefined intervals, and devices synchronize when there is a phase transition. In~\cite{elsts2017temperature}, a time synchronization protocol was proposed to mitigate the effect of temperature change on hardware clocks in IoT networks using time-slotted channel hopping. Preemptive synchronized scheduling policies~\cite{nemati2009multiprocessor, zeng2014scheduling} have been proposed for synchronization tasks that share common attributes. In~\cite{nemati2009multiprocessor}, a preemptive synchronized scheduling policy was proposed for synchronization tasks that share same mutual exclusion resources under homogeneous processors. Tasks are allowed to share resources based on a mutual exclusion policy. Tasks that share mutually exclusive logical resources are grouped into the same component and have a local scheduler. Whenever a global scheduler decides on a component to be executed, the local scheduler decides which task gets the resource access. In~\cite{zeng2014scheduling}, tasks are partitioned based on communication, synchronization and mutex. Synchronization tasks having the same priority are expected to arrive at the synchronization point (SP) at the same time and cannot be preempted. The synchronization task with the maximum execution time before the SP is scheduled to run first, while that with the maximum execution time after the SP is scheduled to run immediately after the SP. The synchronization-aware algorithm proposed in~\cite{lakshmanan2009coordinated} bundles tasks by size or mutex-sharing and attempts to schedule them onto a processor. Bundles that do not directly fit into a processor are put in a separate queue and sorted based on their cost (the penalty of transforming a local mutex into a global mutex) in increasing order. The bundle with the smallest cost is broken down into pieces with the largest piece determined by the size of the largest possible space in the processors. If the process is not successful, a new processor is added, and the partitioning process is repeated. In coscheduling~\cite{sobalvarro1998dynamic} and gang scheduling (a stricter form of coscheduling)~\cite{karatza2006scheduling, batat2000gang}, tasks of a parallel job (or gang) are scheduled and executed at the same pre-defined time slot. Time slotting is a fundamental notion in gang scheduling where all or none of the members of the gang are run at any time slot. The Ousterhout matrix (OM) is a model for dividing the resources in the space and time dimensions and mapping jobs to them~\cite{batat2000gang}. The OM for gang scheduling represents processing nodes as columns and time slot as rows. Synchronization is achieved in coscheduling and gang scheduling using busy waiting~\cite{karatza2006scheduling}. \vspace{7px} \noindent\textbf{Comparison of this Paper and Related Work} \vspace{5px} This work focuses on task and controller driven synchronization. There is a combination of local, asynchronous and synchronous tasks that need to be scheduled unlike the firefly-based (PCO) synchronization schemes ~\cite{hong2005scalable, yadav2017self, babaoglu2007firefly} where synchronization is on a single flash message. The proposed algorithms guarantee atomic $QoS_{ync}$ through quorum checking. That is, the execution of a synchronous task cannot proceed unless the synchronicity conditions are met. Whereas in firefly-based (PCO) synchronization, eventual synchronization is sought for. Preemption is not allowed in our scheme unlike in co- and gang scheduling ~\cite{karatza2006scheduling, sobalvarro1998dynamic} where tasks that have already started execution can be called back. The proposed synchronization schemes are different from barrier synchronization in that there is no need to wait indefinitely for stragglers as synchronization can proceed once the conditions for quorum are met or the necessary precautions taken if quorum fails. The proposed schemes have dynamic synchronization points that can be adjusted based on the availabilities of workers unlike time slotted synchronization where the synchronization points are predefined. This work extends beyond time synchronization ~\cite{guo2016psync, elsts2017temperature} in that nodes need not only have the same notion of time, but there is a need for the right availability of nodes before executing a synchronous task. Tasks are not bundled to be scheduled together on the same processor in our scheme as in ~\cite{lakshmanan2009coordinated}, rather, the same set of tasks are run across all participating nodes. Node disconnections, leaving and joining are catered for by introducing quorum checking to verify the availability and participation of nodes before executing a synchronous task. Fault tolerance is achieved by introducing time and component redundancy. \section{Experiments and Results}\label{sec5} First, experiments are performed to measure the impact of controller location (i.e., fog or cloud) on synchronization. Then, further experiments are conducted to measure specific attributes of the performance of the proposed synchronization algorithms. Finally, the performance of the proposed synchronization algorithms are evaluated by comparing them with barrier synchronization~\cite{khayyat2013mizan, jakovits2012stratus} and time slotted synchronization~\cite{vogli2015fast}. \subsection{Impact of Controller Location on Synchronization} In this experiment, traces from the OpenCloud Hadoop cluster from Carnegie Mellon University Parallel Data Lab \footnote{http://ftp.pdl.cmu.edu/pub/datasets/hla/dataset.html} are used. The workload is split into short tasks ranging from 0.5s to 4s and long tasks ranging from 5s to 12s. The controller-worker delay is varied from 5ms to 500ms. Performance is measured using synchronization rate (SR) which is the number of synchronizations per unit time. \begin{figure}[t] \centering \includegraphics[width=0.7\linewidth]{edgecloud.pdf}\par\caption{Maximum synchronization rate per 10s for varying controller-worker delays.}\label{edgecloud} \end{figure} From Fig.~\ref{edgecloud}, it can be observed that a task graph consisting of short jobs has much higher SR compared to a task graph consisting of long tasks. Also, increasing the controller-worker delay from 5ms to 500ms has very little on impact on the task graph with long tasks compared to short tasks because the long tasks take a significant portion of the overall runtime thus minimizing the impact of the controller-worker delay. A task graph with short tasks consisting of synchronous, asynchronous and local tasks has a higher SR compared to one consisting of only synchronous tasks. This is because with only synchronization tasks, status updates and quorum checking needs to be performed at each synchronization point therefore adding more overhead to the overall runtime. Having controllers closer to the workers increases the SR for short running tasks, thus, making the case for fog-resident controllers as opposed to cloud-resident controllers. \subsection{Configuration of Synchronization Experiments} The following configurations are used to define the system, applications and environmental parameters. The wide range of parameter variation allows for a higher degree of exploration into many aspects of the system. Measurement traces from experiments using Dropbox between the period of 28th June to 3rd July 2012~\cite{gracia2013actively} are used as the task dataset. The execution times vary with a minimum time of 23$s$ and a maximum time of 269$s$. To model the mobility of worker nodes, the Shanghai (China) taxi GPS report for Feb 20, 2007~\cite{liu2010towards} is used. The report consists of 4316 taxis reporting their location, speed, angle of movement and occupancy at given intervals over a period of 24 hours. Each taxi has a unique identification number. The taxi traces are pre-processed and only the location and timestamp details are extracted. The taxis upload their details at irregular intervals in trace, varying from 15s to 63s. Re-sampling is done at 30s and the position of the taxis are gotten at regular intervals, thus having a total of 2880 time points. The parameters used in the simulations are as follows. (i) \textit{Synchronization degree}: ratio of the total machines required to pass quorum. (ii) \textit{Minimum cluster size}: the minimum number of workers that must be present in a cluster before it can be formed. (iii) \textit{Wait time}: The amount of time that should elapse before attempting quorum checking again. (iv) \textit{Quorum retries}: the maximum number of times quorum checking is allowed. (v) \textit{Worker size}: The maximum number of workers that can be present in the system at any point in time. (vi) \textit{Number of clusters}: The maximum number of clusters that can be formed at any point in time. (vii) \textit{Prediction accuracy}: A measure of how accurately the predictor predicts the finish time of tasks across all workers prior to the synchronization point. \subsection{Default Parameter Values and Measurements} The following parameters are fixed in the simulations unless otherwise stated. The number of independent runs of each simulation is $100$ while each task graph is continuously run in each simulation for $200$ times, the communication cost between machines is set to $200ms$, status update cost is set to $1s$, synchronization degree is set to $0.7$ and $\lambda$ set to $20s$. Workers randomly fail with a probability of $0.1$ after each task. The probability of a new machine joining is set at $0.1$, but machines can only join at the start of the execution of a new run of the task graph. This is done to ensure that joining machines will have all the necessary data required to run all tasks down the task graph. Task graphs consist of $30$ tasks in total with varying number of synchronous tasks. $10$ task graphs are used to represent different applications in our simulation runs. Heterogeneity among the worker nodes is introduced by making the execution time of a task on multiple workers follow a Gaussian distribution. The following parameters are measured in the simulations. (i) \textit{Runtime}: the time taken for a single run of a task graph. It is gotten by dividing the total execution time of a simulation by the number of runs. In our results, the execution time is normalized by the number of sync points. (ii) \textit{Extra quorum attempts}: the total number of times the quorum check process was attempted after the initial attempt at all synchronization points. (iii) \textit{Failed sync tasks}: The total number of sync tasks that failed after exceeding the total number of quorum retries or due to incomplete results from clusters. \subsection{Experiments, Results and Discussions} \subsubsection{Scalability of the adapted publish-subscribe update scheme} \begin{figure}[b] \centering \includegraphics[width=0.7\linewidth]{pbTime}\par\caption{Runtime per sync point comparing all-worker update sending and the publish-subscribe update scheme for time-based redundancy.}\label{pbtime} \end{figure} \begin{figure*}[t] \begin{multicols}{3} \includegraphics[width=\linewidth]{redunIncomplete.pdf}\par\caption{CDF showing percentage of sync task failures due to incomplete results from clusters for minimum cluster sizes ranging from $1$ to $4$ for component-based redundancy.}\label{redunincomplete} \includegraphics[width=\linewidth]{redunQuorum.pdf}\par\caption{CDF for the percentage of sync task failures caused by failed quorum for different minimum cluster sizes for component-based redundancy.}\label{redunquorum} \includegraphics[width=\linewidth]{accuracyTF.pdf}\par\caption{Runtime per synchronization and percentage synchronization task failure for task finish time prediction accuracy varying from $80$\% to $100$\%.}\label{accuracyTF} \end{multicols} \end{figure*} On getting to a synchronization point, workers update their associated controller of their availability for running synchronous tasks. The updates are serially processed by the controllers due to their single-threaded nature. This can pose a serious bottleneck problem as the number of workers increase. To alleviate this, a publish-subscribe mechanism is adapted. The benefits of the mechanism for are shown in Fig.~\ref{pbtime} while varying the number of workers from $10$ to $4000$. Fig.~\ref{pbtime} shows the runtime per synchronization point for the publish-subscribe and all-worker update methods for the ratio-based quorum checking. From the graph, it can be observed that as the number of workers increase the runtime per synchronization point increases at a similar rate with respect to the number of workers for the all-worker update while for the publish-subscribe update there is no significant increase in the runtime per synchronization point as the number of workers increase. This is because regardless of the number of workers in the system, only a constant number of update messages is being sent to the controller in the publish-subscribe update method. \subsubsection{Component redundancy} In component-based redundancy, the workers are grouped into clusters. To reach a quorum to execute a synchronous task, at least a given number of workers must be available in each cluster. The synchronization task is considered successful if at least one worker from the number of workers in the cluster completes the execution of the task and returns the expected output to the controller, otherwise, the synchronous task is failed. The minimum required number of worker(s) per cluster is varied from $1$ to $4$, the synchronization task failures are measured and shown in Figs.~\ref{redunincomplete} -~\ref{redunquorum}. Figs.~\ref{redunincomplete} and~\ref{redunquorum} show the synchronization tasks failure percentage due to failed quorum and incomplete results from clusters, respectively. The percentage of synchronization task failure due to failed quorum and incomplete results from clusters both decrease as the minimum cluster size increases. This is due to the fact that the probability of having workers show up during quorum increases as the minimum cluster size increases. \subsubsection{Impact of finish time prediction accuracy} The local scheduler uses the predicted availability of the workers to determine whether it can schedule a local task before starting the synchronous task. In Fig.~\ref{accuracyTF}, the impact of finish time prediction accuracy on the runtime per synchronization point and the synchronization task failure rate with component-based redundancy and publish-subscribe update schemes are measured. When the prediction accuracy is $100$\%, it was observed that the smallest runtime per synchronization is $4940s$ and the smallest synchronous task failure rate of $8$\%. While at a finish time prediction accuracy of $80$\%, an average of $5730s$ was observed for the runtime per synchronization point and a $30$\% synchronization task failure. The runtime per synchronization point increases by $16$\% while the percentage synchronization task failure increases by $263.3$\% as the finish time prediction accuracy reduces from $100$\% to $80$\%. This shows the high impact that the finish time prediction accuracy has on the success of the synchronization task. \subsubsection{Performance Evaluation} \begin{figure}[b] \centering \includegraphics[width=0.7\linewidth]{timeTime.pdf}\par\caption{Runtime per sync point comparing the proposed time-redundant synchronization algorithm with barrier and time slotted synchronizations.}\label{timeTime} \end{figure} \begin{figure*}[t] \begin{multicols}{3} \includegraphics[width=\linewidth]{timeFail.pdf}\par\caption{Percentage of sync task failures caused by failed quorum for time-redundant synchronization algorithm vs time slotted synchronization.}\label{timeFail} \includegraphics[width=\linewidth]{componentTime.pdf}\par\caption{Runtime per sync point comparing the proposed component-redundant synchronization algorithm with barrier and time slotted synchronizations.}\label{componentTime} \includegraphics[width=\linewidth]{componentFail.pdf}\par\caption{Percentage of sync task failures caused by failed quorum for component-redundant synchronization algorithm vs time slotted synchronization..}\label{componentFail} \end{multicols} \end{figure*} The performance of the proposed synchronization schemes (time-redundant and component-redundant synchronization) is evaluated by comparing them with barrier synchronization and time slotted synchronization. In barrier synchronization, on getting to a sync point, workers send update message to the controller and wait until a signal is received from the controller saying that they can proceed to run the sync task. The condition for proceeding with the barrier execution is that all the workers must reach the sync point. In time slotted synchronization, the workers' executions are split into time slots. Dedicated synchronization time slots are chosen with the hope that workers will be available to run the sync task at the specified time slot. The dedicated synchronization time slots are chosen by fixing the slots at $\mu + 1.5\sigma$ (accounts for a 86.6\% accuracy), where $\mu$ is the average execution time and $\sigma$ is the standard deviation. Figs.~\ref{timeTime} -~\ref{componentFail} show the runtime per synchronization point and percentage synchronization task failure for the synchronous scheduling algorithm with the proposed time-redundant and component-redundant synchronization algorithms, barrier synchronization and time slotted synchronization, respectively. The minimum cluster size for component redundancy is fixed as 3 while comparing the synchronization schemes. It can be observed from Figs.~\ref{timeTime} and~\ref{componentTime} that barrier synchronization has the highest runtime, followed by the time-redundant synchronization algorithm and then time slotted synchronization. Barrier synchronization takes longer because faster workers need to wait for stragglers at the barrier and cannot proceed until the slowest worker reaches the barrier. This is unlike the time-redundant synchronization algorithm that was proposed here, where the synchronization point is moved dynamically depending on the availabilities of workers and also, the local scheduling mechanism is used to minimize wasted work cycles due to waiting. Time slotted synchronization is faster because there are dedicated synchronization slots that are not moved regardless of workers availabilities. Figs.~\ref{timeFail} and~\ref{componentFail} show the percentage synchronization task failure due to failed quorum for the proposed time-redundant and component-redundant algorithms, and the time slotted synchronization scheme. The percentage of sync task failures for the time slotted synchronization scheme is higher than that for the proposed time-redundant and component-redundant synchronization algorithms as shown in Figs.~\ref{timeFail} and~\ref{componentFail} respectively. In Fig.~\ref{componentFail}, it can be observed that the percentage of sync task failures reduces as the number of workers increase. This is because there are more devices per cluster and thus, there are more redundant devices which increases the chances of reaching quorum. Time slotted synchronization have higher sync task failure rates because the synchronization slots are fixed, and when there are straggling workers synchronization cannot proceed.
\section{Introduction and Preliminaries}\label{se1} Stochastic ageing is one of the important concepts in reliability theory and survival analysis. It broadly describes the pattern in which a system ages/degrades with time. In the literature, three different types of ageing notions were introduced, namely, positive ageing, negative ageing and no ageing. Positive ageing means that the residual lifetime of a system decreases with time, stochastically, whereas the negative ageing describes the completely opposite phenomenon. On the other hand, no ageing means that the system does not age with time. Based on these three ageing notions, different types of ageing classes (namely, IFR, DFR, IFRA, DFRA, ILR, DLR, to name a few) have been proposed in the literature in order to study different ageing characteristics of a system. For more discussion on this topic, the reader may go through Barlow and Proschan~\cite{bp}, and Lai and Xie~\cite{lx}. Apart from these ageing concepts, relative ageing is an another useful notion which has tremendous applications in the study of system reliability. Relative ageing measures how a sytem improves/deteriorates over time with respect to another system. \\\hspace*{0.2 in}There are many real-life scenarios where we deal with more than one system of the same type (for example, television sets of different companies, CPUs produced by different brands, etc.). In such cases, we often come across the following question: How to measure if one system ages faster compared to others as time progresses? An effective solution to this question is provided through the notion of relative ageing. Another aspect of the relative ageing is found to be useful when we deal with the phenomenon of crossing hazards/mean residual lifetimes problems. These kinds of problems occur in many real-life situations. For example, Pocock et al.~\cite{pgk} noticed the crossing hazards phenomenon when they were dealing with the survival data on the effects of two different treatments to breast cancer patients. Further, Champlin et al.~\cite{cmeg} also reported some instances where the supremacy of a treatment over another treatment stays for a while. Thus, the above discussion suggests that the increasing/decreasing hazard ratio models could be considered as a reasonable choice in many real-life situations. Indeed, Kalashnikov and Rachev~\cite{kr} introduced a realtive ageing notion (called ageing faster order in the hazard rate) based on monotonicity of the ratio of two hazard rate functions. In the same spirit, Sengupta and Deshpande~\cite{sd} proposed another notion which is defined on monotonicity of the ratio of two cumulative hazard rate functions. Later, Di Crescenzo~\cite{d} developed two relative ageing notions based on monotonicities of the ratios of two reversed hazard and two cumulative reversed hazard functions, whereas Finkelstein~\cite{f6} proposed a notion based on the concept of mean residual lifetime functions. Furthermore, Hazra and Nanda~\cite{hn0} introduced some relative ageing notions based on some generalized functions. \\\hspace*{0.2 in} In what follows, we discuss coherent systems. A system is said to be coherent if each of its components is relevant, and its structure function is monotonically nondecreasing with respect to each argument (see Barlow and Prochan~\cite{bp} for the definition). The so called $k$-out-of-$n$ system is a special case of the coherent system. A $k$-out-of-$n$ system is a system, formed by $n$ components, that functions as long as at least $k$ of its $n$ components function. Further, the series ($n$-out-of-$n$) and the parallel ($1$-out-of-$n$) systems are special cases of the $k$-out-of-$n$ system. Moreover, the lifetime of a $k$-out-of-$n$ system is the same as $(n-k+1)$-th order statistic of the lifetimes of $n$ components. Thus, the study of a $k$-out-of-$n$ system and the study of an $(n-k+1)$-th order statistic (of nonnegative random variables) are basically the same. \\\hspace*{0.2 in}It is meaningful to study coherent systems because these are the skeletons of most of the real-life systems. Thus, the study of different reliability properties of coherent systems is considered as one of the important problems in reliability theory. The problem, which we focus here, is the study of relative ageing of coherent systems. There exists a vast literurate on various stochastic comparisons of $k$-out-of-$n$ systems (in particular, series and parallel systems) with independent components (see, for instance, Pledger and Proschan~\cite{pp}, Proschan and Sethuraman~\cite{ps}, Balakrishnan and Zhao~\cite{bz}, and the references therein). Further, the same problem for coherent systems was considered in Esary and Proschan~\cite{ep}, Nanda et al.~\cite{njs}, Kochar et al.~\cite{kms}, Belzunce et al.~\cite{bfrr}, Navarro and Rubio~\cite{nr}, Navarro et al.~\cite{nass1, nass3, npd}, Samaniego and Navarro~\cite{sn}, Amini-Seresht et al.~\cite{azb}, to name a few. However, all of these studies were done in terms of traditional stochastic orders, namely, usual stochastic order, hazard rate order, reversed hazard rate order, likelihood ratio order, etc. There are a few articles where ageing faster orders were considered to compare two coherent systems. The study of $k$-out-of-$n$ systems using ageing faster orders (in the hazard and the reversed hazard rates) was done by Misra and Francis~\cite{mf}, Li and Li~\cite{ll6}, and Ding and Zhang~\cite{dz}, whereas a similar study for coherent systems was done by Ding et al.~\cite{dfz}, and Hazra and Misra~\cite{hm}. Recently, Misra and Francis~\cite{mf2} studied $k$-out-of-$n$ systems with independent components in terms of ageing faster orders (in the cumulative hazard and the cumulative reversed hazard rates). However, this problem is not yet considered for coherent systems with dependent components. Thus, the goal of this paper is to study coherent systems with dependent components in terms of ageing faster orders in the cumulative hazard and the cumulative reversed hazard rates. \\\hspace*{0.2 in}Now, we will introduce some notation and acronyms that will be used throughout the paper. For a random variable $W$ (with absolutely continuous distribution function), we denote its probability density function (pdf) by $f_W(\cdot)$, the cumulative distribution function (cdf) by $F_W(\cdot)$, the survival/reliability function by $\bar F_W(\cdot)\equiv 1-F_W(\cdot)$, the hazard rate function by $r_W(\cdot)\equiv f_W(\cdot)/\bar F_W(\cdot)$, the reversed hazard rate function by $\tilde r_W(\cdot)\equiv f_W(\cdot)/F_W(\cdot)$, the cumulative hazard rate function by $\Delta_W(\cdot)\equiv -\ln \bar F_W(\cdot)$, and the cumulative reversed hazard rate function by $\widetilde\Delta_W(\cdot)\equiv -\ln F_W(\cdot)$. Further, for any two random variables $U$ and $V$, we write $U\stackrel{d}=V$ to mean that $U$ and $V$ are identically distributed. Furthermore, we denote the set of real numbers by $\mathbb{R}$. By $a\stackrel{\rm sgn}=b$ we mean that $a$ and $b$ have the same sign, whereas $a\stackrel{\rm def.}=b$ means that $b$ is defined as $a$. We use two acronyms i.i.d and d.i.d. for `independent and identically distributed' and `dependent and identically distributed', respectively. \\\hspace*{0.2 in}Let $\tau\left(\mbox{\boldmath$X$}\right)$ be a random variable representing the lifetime of a coherent system made up of $n$ components with the lifetime vector $\mbox{\boldmath$X$}=(X_1,X_2,\dots,X_n)$, where $X_i$'s are d.i.d. For the sake of notational simplicity, let us assume that $X_i\stackrel{d}=X$, $i=1,2,\dots,n$, for some non-negative random variable $X$. Then the joint reliability function of $\mbox{\boldmath$X$}$ can be written as \begin{eqnarray*} \bar F_{\mathbf{X}}(x_1,x_2,\dots,x_n)&=&P\left(X_1>x_1,X_2>x_2,\dots,X_n>x_n\right) \\&=&K\left(\bar F_{X}(x_1),\bar F_{X}(x_2),\dots,\bar F_{X}(x_n)\right),\quad x_i\in \mathbb{R},\;i=1,2,\dots,n, \end{eqnarray*} where $K(\cdot,\cdot,\dots,\cdot)$ is a survival copula. It is worthwhile to mention here that this representation indeed follows from Sklar's Theorem (see Nelsen~\cite{n}). The survival copula describes the dependency structure among components of a system. In the literature, different types of survival copulas have been proposed, for example, Farlie-Gumbel-Morgenstern (FGM) copula, Archimedean copula with different generators, Clayton-Oakes (CO) copula, etc. (see Nelsen~\cite{n} for more discussion on this topic). Below we give a useful lemma that represents a relation between the reliability function of a system and the reliability functions of its corresponding components. \begin{lem}[Navarro et al.~\cite{nass1}]\label{II} Let $\tau\left(\mbox{\boldmath$X$}\right)$ be the lifetime of a coherent system formed by $n$ d.i.d. components with the lifetime vector $\mbox{\boldmath$X$}=(X_1,X_2,\dots,X_n)$. Then the reliability function of $\tau\left(\mbox{\boldmath$X$}\right)$ can be written as $$\bar F_{\tau\left(\mbox{\boldmath$X$}\right)}(x)=P(\tau\left(\mbox{\boldmath$X$}\right)>x)=h\left(\bar F_{X}(x)\right),\quad x\in \mathbb{R},$$ where $h(\cdot):[0,1]\rightarrow [0,1]$, called the domination (or dual distortion) function, depends on the structure function $\phi(\cdot)$ (see Barlow and Proschan~\cite{bp} for definition) and on the survival copula $K$ of $X_1,X_2,\dots,X_n$. Furthermore, $h(\cdot)$ is an increasing continuous function in $[0,1]$ such that $h(0)=0$ and $h(1)=1$. $\hfill\Box$ \end{lem} \hspace*{0.2 in} In what follows, we discuss some preliminary concepts that will be helpful in better understanding of the paper. We begin with the notion of stochastic orders which are effectively used to compare the lifetimes of two systems. In the literature, different types of stochastic orders have been developed to compare two random variables describing two different random phenomena in different branches of mathematics and statistics. The detailed discussion on this topic could be found in the monographs written by Shaked and Shanthikumar~\cite{ss}, and Belzunce et al.~\cite{bmr}. Below we give the definitions of stochastic orders that are used in this paper. \begin{d1}\label{de1} Let $X$ and $Y$ be two random variables with absolutely continuous distribution functions supported on $[l_X,u_X]$ and $[l_Y,u_Y]$, respectively, where $u_X$ and $u_Y$ may be $\infty$, and $l_X$ and $l_Y$ may be $-\infty$, with the convention that $[-\infty, a]\stackrel{\rm def.}=(-\infty,a]$ for all $a\in\mathbb{R}$, and $[b,\infty]\stackrel{\rm def.}=[b,\infty)$ for all $b\in\mathbb{R}$. Then, $X$ is said to be smaller than $Y$ in the \begin{enumerate} \item [$(a)$] hazard rate (hr) order, denoted as $X\leq_{hr}Y$, if $${\bar F_Y(x)}/{\bar F_X(x)}\;\text{ is increasing in } x \in (-\infty,max[u_X,u_Y]);$$ \item [$(b)$] reversed hazard rate (rh) order, denoted as $X\leq_{rh}Y$, if $$ {F_Y(x)}/{ F_X(x)}\;\text{ is increasing in } x \in(min[l_X,l_Y],\infty);$$ \item [$(c)$] usual stochastic (st) order, denoted as $X\leq_{st}Y$, if $$\bar F_X(x)\leq \bar F_Y(x) \text{ for all, }x\in \mathbb{R};$$ \end{enumerate} here, for any positive real constant $a$, $a/0\stackrel{\rm def.}=\infty$. \end{d1} It is worthwhile to mention here that $$ X\leq_{hr [rh]}Y \implies X\leq_{st}Y.$$ \hspace*{0.2 in}Apart from above discussed stochastic orders, there are two more sets of stochastic orders which are frequently used to study the relative ageings of two systems. One of them is the set of transform orders (for example, convex transform order, super-additive order, star-shaped order, DMRL order, $s$-IFR order, $s$-IFRA orders, etc.) which are defined based on different ageing concepts, namely, increasing failure rate, increasing failure rate in average, new better than used, etc. (see, for instance, Barlow and Proschan~\cite{bp}, Deshpande and Kochar~\cite{dk}, Bartoszewicz~\cite{b}, Kochar and Wiens~\cite{kw}, and Nanda et al.~\cite{nhag}). The other one is the set of ageing faster orders that describe whether a system is ageing faster than another one in terms of the hazard rate, the cumulative hazard rate, the reversed hazard rate, the cumulative reversed hazard rate, etc. (see, Kalashnikov and Rachev~\cite{kr}, Sengupta and Deshpande~\cite{sd}, Di Crescenzo~\cite{d}, Finkelstein~(\cite{f6}, \cite{f8}), Razaei et al.~\cite{rgi}, Hazra and Nanda~\cite{hn0}, Misra et al.~\cite{mfn}, Kayid et al.~\cite{kiz}, Misra and Francis~\cite{mf2}, and the references therein). For the sake of completeness in our presentation, we give the definitions of following stochastic orders. \begin{d1} Let $X$ and $Y$ be two random variables with absolutely continuous distribution functions supported on $[0,\infty)$. Then $X$ is said to be ageing faster than $Y$ in the \begin{enumerate} \item [$(a)$] hazard rate, denoted as $X\underset{ c}{\prec} Y$, if $$r_X(x)/r_Y(x)\text{ is increasing in }x\in[0,\infty);$$ \item [$(b)$] reversed hazard rate, denoted as $X\underset{ b}{\prec} Y$, if $$\tilde r_X(x)/\tilde r_Y(x)\text{ is decreasing in }x\in[0,\infty);$$ \item [$(c)$] cumulative hazard rate, denoted as $X\underset{ c^*}{\prec} Y$, if $$\Delta_X(x)/\Delta_Y(x)\text{ is increasing in }x\in[0,\infty);$$ \item [$(d)$] cumulative reversed hazard rate, denoted as $X\underset{ b^*}{\prec} Y$, if $$\widetilde \Delta_X(x)/\widetilde \Delta_Y(x)\text{ is decreasing in }x\in[0,\infty).$$ \end{enumerate} \end{d1} It is known that $$ X\underset{ c}{\prec} Y \implies X\underset{ c^*}{\prec} Y,\text{ and }X\underset{ b}{\prec} Y \implies X\underset{ b^*}{\prec} Y.$$ \hspace*{0.2 in}Relative ageing of $k$-out-of-$n$ systems comprising of components having i.i.d. lifetimes has been studied by many researchers (for references see the paragraph preceding Definition 1.2). Under the i.i.d. set-up, Misra and Francis~\cite{mf2} established the following results: \begin{itemize} \item [$(a)$] $ X\underset{ c^*}{\prec} Y$ and $Y\leq_{st}X$ $\implies$ $X_{k:n}\underset{ c^*}{\prec}Y_{k:n},\quad k=1,2,\dots,n$, \item [$(b)$] $ X\underset{ b^*}{\prec} Y$ and $X\leq_{st}Y$ $\implies$ $X_{k:n}\underset{ b^*}{\prec}Y_{k:n},\quad k=1,2,\dots,n$, \end{itemize} where $X_{k:n}$ (resp. $Y_{k:n}$) denotes the $k$-th order statistic based on i.i.d. observations $X_1,X_2,\dots,X_n$ (resp. $Y_1,Y_2,\dots,Y_n$). The purpose of this paper is to derive more general results that accommodate general coherent systems comprising of components having d.i.d. lifetimes. \\\hspace*{0.2 in}In what follows, we give the definitions of TP$_2$ and RR$_2$ functions which are used in the proofs of the main results (cf. Karlin~\cite{k}). \begin{d1} Let $\mathcal{X}$ and $\mathcal{Y}$ be two linearly ordered sets. Then, a real-valued and nonnegative function $\kappa(\cdot,\cdot)$, defined on $\mathcal{X}\times\mathcal{Y}$, is said to be TP$_2$ (resp. RR$_2$) if $$\kappa(x_1,y_1)\kappa(x_2,y_2)\geq(\text{resp. }\leq)\;\kappa(x_1,y_2)\kappa(x_2,y_1),$$ for all $x_1\leq x_2$ and $y_1\leq y_2$.$\hfill \Box$ \end{d1} \hspace*{0.2 in} Throughout the paper, the words increasing, decreasing, positive and negative are not used in the strict sense. All random variables considered in this paper are assumed to have absolutely continuous distribution functions supported on $[0,\infty)$. Further, we use bold symbols to represent vectors (e.g., $\mbox{\boldmath$b$}=(b_1,b_2,\dots,b_p)$, $b_i\in \mathbb{R}$, $i=1,2,\dots,p$). For positive integers $k,l,m$ and $n$ ($1\leq k\leq n$, $1\leq l\leq m$), we use $\tau_{k|n}$ and $\tau_{l|m}$ to represent the lifetimes of $k$-out-of-$n$ and $l$-out-of-$m$ systems, respectively. \\\hspace*{0.2 in}The rest of the paper is organized as follows. In Section~\ref{s2}, we discuss some important lemmas that are used in proving the main results. In Section~\ref{s3}, we discuss main results. Here, we provide some sufficient conditions under which one coherent system performs better than another one with respect to ageing faster orders in terms of the cumulative hazard and the cumulative reversed hazard rates. Further, we show that the proposed results hold for the well known $k$-out-of-$n$ systems thereby generalizing the results of Misra and Francis~\cite{mf2} to the situations where we have general coherent systems comprising of components with d.i.d. lifetimes. We also provide some examples to illustrate the applications of the proposed results. \\\hspace*{0.2 in}All proofs of lemmas and theorems, wherever given, are deferred to the Appendix. \section{Useful Lemmas}~\label{s2} In this section we present some lemmas which will be used in proving the main results. The first lemma is borrowed from Karlin~(\cite{k}, Theorem 11.2, pp. 324-325), and Hazra and Nanda~(\cite{hnx}, Lemma 3.5), whereas next two lemmas were obtained in Hazra and Misra~\cite{hm}. \begin{lem}\label{l0} Let $\kappa(x,y)>0$, defined on $\mathcal{X}\times \mathcal{Y}$, be RR$_2$ (resp. TP$_2$), where $\mathcal{X}$ and $\mathcal{Y}$ are subsets of the real line. Assume that a function $f(\cdot,\cdot)$ defined on $\mathcal{X}\times\mathcal{Y}$ is such that \begin{itemize} \item [$(i)$] for each $x\in \mathcal{X}$, $f(x,y)$ changes sign at most once, and if the change of sign does occur, it is from positive to negative, as $y$ traverses $\mathcal{Y}$; \item [$(ii)$] for each $y \in \mathcal{Y}$, $f(x,y)$ is increasing (resp. decreasing) in $x\in \mathcal{X}$; \item [$(iii)$] $\omega(x)=\int\limits_{\mathcal{Y}}\kappa(x,y)f(x,y)d\mu(y)$ exists absolutely and defines a continuous function of $x$, where $\mu$ is a sigma-finite measure. \end{itemize} Then $\omega(x)$ changes sign at most once, and if the change of sign does occur, it is from negative (resp. positive) to positive (resp. negative), as $x$ traverses $\mathcal{X}$. \end{lem} \begin{lem}\label{l3} Let $h_{k|n}(\cdot)$ and $h_{l|m}(\cdot)$ be the reliability functions of the $k$-out-of-$n$ and the $l$-out-of-$m$ systems with i.i.d. components, respectively, where $1\leq k\leq n$ and $1\leq l\leq m$. Further, let $H_{k|n}(p)=ph_{k|n}'(p)/h_{k|n}(p)$ and $H_{l|m}(p)=ph_{l|m}'(p)/h_{l|m}(p)$, for all $p\in(0,1)$. Then the following results hold. \begin{itemize} \item [$(i)$] ${H_{k|n}(p)}/{H_{l|m}(p)}$ is decreasing in $p\in(0,1)$, for all $k\leq l$ and $m-l\leq n-k$; \item [$(ii)$] $(1-p){H_{k|n}'(p)}/{H_{k|n}(p)}$ is negative and decreasing in $p\in (0,1)$. \end{itemize} \end{lem} \begin{lem}\label{l4} Let $h_{k|n}(\cdot)$ and $h_{l|m}(\cdot)$ be the reliability functions of the $k$-out-of-$n$ and the $l$-out-of-$m$ systems with i.i.d. components, respectively, where $1\leq k\leq n$ and $1\leq l\leq m$. Further, let $R_{k|n}(p)=(1-p)h_{k|n}'(p)/(1-h_{k|n}(p))$ and $R_{l|m}(p)=(1-p)h_{l|m}'(p)/(1-h_{l|m}(p))$, for all $p\in(0,1)$. Then the following results hold. \begin{itemize} \item [$(i)$] ${R_{k|n}(p)}/{R_{l|m}(p)}$ is increasing in $p\in(0,1)$, for all $l\leq k$ and $n-k\leq m-l$; \item [$(ii)$] $p{R_{k|n}'(p)}/{R_{k|n}(p)}$ is positive and decreasing in $p\in (0,1)$. \end{itemize} \end{lem} \section{Main Results}\label{s3} Let $\tau_1\left(\mbox{\boldmath$X$}\right)$ and $\tau_2\left(\mbox{\boldmath$Y$}\right)$ be the lifetimes of two coherent systems formed by two different sets of d.i.d. components with the lifetime vectors $\mbox{\boldmath$X$}=(X_1,X_2,\dots,X_{n})$ and $\mbox{\boldmath$Y$}=(Y_1,Y_2,\dots,Y_{m})$, respectively. For the sake of simplicity of notation, let us assume that $X_i\stackrel{\rm d}=X$, $i=1,2,\dots,n,$ and $Y_j\stackrel{\rm d}=Y$, $j=1,2,\dots,m,$ for some non-negative random variables $X$ and $Y$. Further, let $h_1(\cdot)$ and $h_2(\cdot)$ be the domination functions of $\tau_1\left(\mbox{\boldmath$X$}\right)$ and $\tau_2\left(\mbox{\boldmath$Y$}\right)$, respectively. In what follows, we use the following notation: $$H_i(p)=\frac{ph_i'(p)}{h_i(p)}\text{ and }R_i(p)=\frac{(1-p)h_i'(p)}{1-h_i(p)},\quad p\in(0,1),\;i=1,2.$$ Note that when $m=n$ and the two coherent systems have the same structure function as well as the same survival copula (i.e., the two coherent systems are identical), then $\tau_1(\cdot)=\tau_2(\cdot)=\tau(\cdot)$ (say), $h_1(\cdot)=h_2(\cdot)=h(\cdot)$ (say), $H_1(\cdot)=H_2(\cdot)=H(\cdot)$ (say) and $R_1(\cdot)=R_2(\cdot)=R(\cdot)$ (say). \subsection{Relative ageing based on cumulative hazard functions} In this subsection, we compare two coherent systems in terms of ageing faster order in the cumulative hazard rate. \\\hspace*{0.2 in} In the following proposition we consider a coherent system and provide sufficient conditions under which use of components with lifetimes vector $\mbox{\boldmath$X$}$ in the coherent system makes it age faster than if components with lifetimes vector $\mbox{\boldmath$Y$}$ are used in the coherent system. \begin{pro}\label{t1} Assume that $m=n$ and that the two coheret systems have the same structure function and the same survival copula. Further suppose that the following conditions hold: \begin{itemize} \item [$(i)$] $(1-p){H'(p)}/{H(p)}$ is negative and decreasing in $p\in (0,1)$; \item [$(ii)$] $X\underset{ c^*}{\prec} Y$ and $Y\leq_{st} X $. \end{itemize} Then $\tau\left(\mbox{\boldmath$X$}\right)\underset{ c^*}{\prec}\tau\left(\mbox{\boldmath$Y$}\right)$.$\hfill\Box$ \end{pro} \hspace*{0.3 in}In the following theorem we compare two coherent systems with different domination functions, and generalize the result of Proposition~\ref{t1}. Note that the domination functions of two coherent systems differ when they have either different structure functions or different dependency relations among components, or both. The proof of the theorem follows from Proposition~3.1 of Hazra and Misra~\cite{hm}, Proposition~\ref{t1} and by using the facts that $\underset{ c^*}{\prec}$ is transitive and $\underset{ c}{\prec}\implies \underset{ c^*}{\prec}$. \begin{thm}\label{t11} Suppose that $\{(i),(ii),(iv)\}$ or $\{(i),(iii),(iv)\}$ holds: \begin{itemize} \item [$(i)$] ${H_1(p)}/{H_2(p)}$ is decreasing in $p\in(0,1)$; \item [$(ii)$] $(1-p){H_1'(p)}/{H_1(p)}$ is negative and decreasing in $p\in (0,1)$; \item [$(iii)$] $(1-p){H_2'(p)}/{H_2(p)}$ is negative and decreasing in $p\in (0,1)$; \item [$(iv)$] $X\underset{ c^*}{\prec} Y$ and $Y\leq_{st} X $. \end{itemize} Then $\tau_1\left(\mbox{\boldmath$X$}\right)\underset{ c^*}{\prec}\tau_2\left(\mbox{\boldmath$Y$}\right)$. \end{thm} \begin{remark} It is worth mentioning here that the results stated in Proposition~\ref{t1} and Theorem~\ref{t11} also follow from Theorem 3.1 of Hazra and Misra~\cite{hm} under the same set of conditions, as in Theorem~\ref{t11}, except that there condition $(iv)$ of Theorem~\ref{t11} is replaced by the condition $X\underset{ c}{\prec} Y$ and $Y\leq_{rh} X $. Note that this assumption is much stronger as compared to $(iv)$ because $\underset{ c}{\prec}\implies \underset{ c^*}{\prec}$ and $ \leq_{rh} \implies \leq_{st}$, and the reverse implications are not necessarily true. The methodology used in the proofs of this paper differs from that in Hazra and Misra~\cite{hm}. Thus, it is meaningful to study the results given in Proposition~\ref{t1} and Theorem~\ref{t11}.$\hfill\Box$ \end{remark} \hspace*{0.2 in} The following corollary follows from Theorem~\ref{t11} and Lemma~\ref{l3}. It shows that the result stated in Theorem~\ref{t11} indeed holds for $k$-out-of-$n$ systems with i.i.d. components. Further, it is to be noted that Theorem 3.1 of Misra and Francis~\cite{mf2} is a particular case of this corollary ($k=l$ and $m=n$). \begin{cor}\label{c1} Suppose that the $X_i$'s are i.i.d., and that the $Y_j$'s are i.i.d. If $X\underset{ c^*}{\prec} Y$ and $Y\leq_{st} X $, then ${\tau_{k|n}\left(\mbox{\boldmath$X$}\right)}\underset{ c^*}{\prec}$ ${\tau_{l|m}\left(\mbox{\boldmath$Y$}\right)}$, for all $k\leq l$ and $m-l\leq n-k$.$\hfill\Box$ \end{cor} \hspace*{0.2 in} Below we give an example to demonstrate the applications of Proposition~\ref{t1} and Theorem~\ref{t11}. \begin{ex}\label{e1} Let us consider two coherent systems $\tau_1(\mbox{\boldmath$X$})=\min\{X_1,\max\{X_2,X_3\}\}$ and $\tau_2(\mbox{\boldmath$Y$})=\min\{Y_1,Y_2,Y_3\}$ formed by two different sets of components with the lifetime vectors $\mbox{\boldmath$X$}=(X_1,X_2,X_3)$ and $\mbox{\boldmath$Y$}=(Y_1,Y_2,Y_3)$, respectively. Assume that $X_i\stackrel{d}=X$ and $Y_i\stackrel{d}=Y$, for all $i=1,2,3,$ and for some non-negative random variables $X$ and $Y$. Further, let $\bar F_X(x)=\exp\{-\alpha_1\left(x+\beta x^2\right)\}$, $x>0$, and $\bar F_Y(x)=\exp\{-\alpha_2\left(x+\beta x^2\right)\}$, $x>0$, where $0<\alpha_1\leq \alpha_2$ and $\beta>0$. Then, it can easily be verified that $X\underset{ c^*}{\prec} Y$ and $Y\leq_{st} X $. Assume that $Y_1,Y_2$ and $Y_3$ are independent whereas $X_1,X_2$ and $X_3$ are dependent and their joint survival function is described by the FGM copula $$K(p_1,p_2,p_3)=p_1p_2p_3(1+\theta (1-p_1)(1-p_2)(1-p_3)),$$ where $p_i\in(0,1)$, $i=1,2,3$, and $\theta\in [-1,1]$. Then the domination functions of $\tau_1(\mbox{\boldmath$X$})$ and $\tau_2(\mbox{\boldmath$Y$})$ are given by \begin{eqnarray*} h_1(p)=2p^2-p^3-\theta p^3 (1-p)^3 \text{ and }h_2(p)=p^3,\quad 0<p<1, \end{eqnarray*} respectively. From the above expressions, we get \begin{eqnarray*} \frac{(1-p)H_2'(p)}{H_2(p)}=0 \text{ and }\frac{H_1(p)}{H_2(p)}=\frac{4-3(1+\theta)p+12\theta p^2-15\theta p^3+6\theta p^4}{6-3(1+\theta)p+9\theta p^2-9\theta p^3+3\theta p^4}, \quad 0<p<1. \end{eqnarray*} Note that condition ($i$) of Theorem~\ref{t1} holds (see Example 3.1 of Navarro et al.~\cite{nass1}) whereas condition ($iii$) of Theorem~\ref{t1} is vaciously satisfied. Hence $\tau_1\left(\mbox{\boldmath$X$}\right)\underset{ c^*}{\prec}\tau_2\left(\mbox{\boldmath$Y$}\right)$ follows from Theorem~\ref{t1}. \end{ex} \begin{remark} It is to be noted that the condition $Y\leq_{st} X $ given in Proposition~\ref{t1}, Theorem~\ref{t11} and Corollary~\ref{c1} cannot be dropped as illustrated in Example 3.2 of Misra and Francis~\cite{mf2}. \end{remark} \subsection{Relative ageing based on cumulative reversed hazard functions} In this subsection, we compare two coherent systems with respect to the ageing faster order in the cumulative reversed hazard rate. \\\hspace*{0.2 in} In the following proposition we consider the situation where $m=n$ and the two coherent systems have the same structure function as well as the same survival copula, i.e., the two coherent systems are identical. We derive sufficient conditions under which use of components having lifetimes vector $\mbox{\boldmath$X$}$ makes the system age faster than if the components with lifetimes vector $\mbox{\boldmath$Y$}$ are used. \begin{pro}\label{t2} Assume that $m=n$ and that the two coherent systems have the same structure function and the same survival copula. Further suppose that the following conditions hold: \begin{itemize} \item [$(i)$] $p{R'(p)}/{R(p)}$ is positive and decreasing in $p\in (0,1)$; \item [$(ii)$] $X\underset{ b^*}{\prec} Y$ and $X\leq_{st} Y $. \end{itemize} Then $\tau\left(\mbox{\boldmath$X$}\right)\underset{ b^*}{\prec}\tau\left(\mbox{\boldmath$Y$}\right)$.$\hfill\Box$ \end{pro} \hspace*{0.3 in}The following theorem is an extension of the above result. Here we compare two coherent systems with different domination functions. The proof follows from Proposition 3.2 of Hazra and Misra~\cite{hm} and Proposition~\ref{t2} and by using the facts that $\underset{ b^*}{\prec}$ is transitive and $\underset{ b}{\prec}\implies \underset{ b^*}{\prec}$. \begin{thm}\label{t22} Suppose that $\{(i),(ii),(iv)\}$ or $\{(i),(iii),(iv)\}$ holds: \begin{itemize} \item [$(i)$] ${R_1(p)}/{R_2(p)}$ is increasing in $p\in(0,1)$; \item [$(ii)$] $p{R_1'(p)}/{R_1(p)}$ is positive and decreasing in $p\in (0,1)$; \item [$(iii)$] $p{R_2'(p)}/{R_2(p)}$ is positive and decreasing in $p\in (0,1)$; \item [$(iv)$] $X\underset{ b^*}{\prec} Y$ and $X\leq_{st} Y$. \end{itemize} Then $\tau_1\left(\mbox{\boldmath$X$}\right)\underset{ b^*}{\prec}\tau_2\left(\mbox{\boldmath$Y$}\right)$. \end{thm} \begin{remark} It is to be mentioned here that the results given in Proposition~\ref{t2} and Theorem~\ref{t22} also follow from Theorem~3.2 of Hazra and Misra~\cite{hm} under the same set of conditions, as in Theorem~\ref{t22}, except that there condition $(iv)$ above is replaced by $X\underset{ b}{\prec} Y$ and $X\leq_{hr} Y $. Note that this assumption is much stronger as compared to $(iv)$ because $\underset{ b}{\prec}\implies \underset{ b^*}{\prec}$ and $ \leq_{hr} \implies \leq_{st}$, and the reverse implications are not necessarily true. Thus, the study of the results given in Proposition~\ref{t2} and Theorem \ref{t22} is worthy of investigation.$\hfill\Box$ \end{remark} \hspace*{0.2 in} The following corollary immediately follows from Theorem~\ref{t22} and Lemma~\ref{l4}. Note that Theorem 4.1 of Misra and Francis~\cite{mf2} is a particular case of this corollary ($k=l$ and $m=n$). \begin{cor}\label{c2} Suppose that the $X_i$'s are i.i.d., and that the $Y_j$'s are i.i.d. If $X\underset{ b^*}{\prec} Y$ and $X\leq_{st} Y $, then ${\tau_{k|n}\left(\mbox{\boldmath$X$}\right)}\underset{ b^*}{\prec}$ ${\tau_{l|m}\left(\mbox{\boldmath$Y$}\right)}$, for all $l\leq k$ and $ n-k\leq m-l$.$\hfill\Box$ \end{cor} \hspace*{0.2 in}The following example illustrates the results given in Proposition~\ref{t2} and Theorem \ref{t22}. \begin{ex} Let us consider two coherent systems $\tau_1(\mbox{\boldmath$X$})=\min\{X_1,X_2,\dots,X_m\}$ and $\tau_2(\mbox{\boldmath$Y$})=\min\{Y_1,Y_2,\dots,Y_n\}$ formed by two different sets of components with the lifetime vectors $\mbox{\boldmath$X$}=(X_1,X_2,$ $\dots,X_m)$ and $\mbox{\boldmath$Y$}=(Y_1,Y_2,\dots,Y_n)$, respectively, where $n\leq m$. Assume that $X_i\stackrel{d}=X$, $i=1,2,\dots,m$, and $Y_j\stackrel{d}=Y$, $j=1,2,\dots,n$, for some non-negative random variables $X$ and $Y$. Further, let $\bar F_X(x)=\exp\{-3x\}$, $x>0$, and $\bar F_Y(x)=\exp\{-2x\}$, $x>0$. Then, it can easily be verified that $X\underset{ b}{\prec} Y$, and hence $X\underset{ b^*}{\prec} Y$. Also, note that $X\leq_{st} Y $. Let us assume that $\mbox{\boldmath$X$}=(X_1,X_2,\dots,X_m)$ has the Gumbel-Hougard survival copula given by $$K(p_1,p_2,\dots,p_{m})=\exp\left\{-\left(\sum\limits_{i=1}^{m}(-\ln p_i)^\theta\right)^{1/\theta}\right\},\quad \theta\geq 1\text{ and }0<p_i<1,\text{ for }i=1,2,\dots,m,$$ and $\mbox{\boldmath$Y$}=(Y_1,Y_2,\dots,Y_n)$ has the Gumbel-Hougard survival copula given by $$K(p_1,p_2,\dots,p_{n})=\exp\left\{-\left(\sum\limits_{i=1}^{n}(-\ln p_i)^\theta\right)^{1/\theta}\right\},\quad \theta\geq 1\text{ and }0<p_i<1,\text{ for }i=1,2,\dots,n.$$ Then the domination functions of ${\tau_1\left(\mbox{\boldmath$X$}\right)}$ and $\tau_2(\mbox{\boldmath$Y$})$ are given by $h_1(p)=p^{a}$ and $h_2(p)=p^{b}$, respectively, where $a=m^{1/\theta}$ and $b=n^{1/\theta}$, and $1\leq b\leq a<\infty$. Thus we have $$R_1(p)=\frac{a(1-p)p^{a-1}}{1-p^a}\text{ and }R_2(p)=\frac{b(1-p)p^{b-1}}{1-p^b},\quad 0<p<1\text{ and }1\leq b\leq a<\infty.$$ Let $d=a-b$ $(0\leq d<a)$. Then, from the above expressions, we get $$l(p)\stackrel{\rm def.}=\frac{R_1(p)}{R_2(p)}=\frac{a}{b}\left(1-\frac{1-p^d}{1-p^a}\right),\quad 0<p<1, \;1\leq b\leq a<\infty \text{ and } 0\leq d<a,$$ and $$\frac{pR_1'(p)}{R_1(p)}=\frac{a-1-ap+p^a}{1-p-p^a+p^{a+1}},\quad 0<p<1\text{ and }1\leq a<\infty.$$ Now, $$l'(p)=\frac{a}{b}\left[\frac{d(1-p^a)p^{d-1}-a(1-p^d)p^{a-1}}{(1-p^a)^2}\right],\quad 0<p<1, \;1\leq b\leq a<\infty \text{ and } 0\leq d<a.$$ Since, for $0\leq d<a$, $$\frac{1-p^a}{1-p^d}\geq \frac{a}{d}p^{a-d},\quad0<p<1,$$ it follows that $l'(p)\geq 0$, for all $0<p<1$, and hence $R_1(p)/R_2(p)$ is increasing in $p\in(0,1)$. Further, Example 4.1 of Hazra and Misra~\cite{hm} shows that $pR_1'(p)/R_1(p)$ is positive and decreasing in $p\in(0,1)$. Thus, $\tau_1\left(\mbox{\boldmath$X$}\right)\underset{ b^*}{\prec}\tau_2\left(\mbox{\boldmath$Y$}\right)$ follows Theorem~\ref{t22}. \end{ex} \begin{remark} It is to be noted that the condition $X\leq_{st} Y $ given in Proposition~\ref{t2}, Theorem~\ref{t22} and Corollary~\ref{c2} cannot be relaxed as shown in Example 4.2 of Misra and Francis~\cite{mf2}. \end{remark} \subsection*{Acknowledgments} \hspace*{0.2 in}The first author sincerely acknowledges the financial support received from IIT Jodhpur, India.