Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -dE4T4oBgHgl3EQf3w3V/content/tmp_files/2301.05309v1.pdf.txt +994 -0
- -dE4T4oBgHgl3EQf3w3V/content/tmp_files/load_file.txt +0 -0
- -dFJT4oBgHgl3EQfpiwj/content/tmp_files/2301.11600v1.pdf.txt +1821 -0
- -dFJT4oBgHgl3EQfpiwj/content/tmp_files/load_file.txt +0 -0
- .gitattributes +54 -0
- 0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss +3 -0
- 0dAzT4oBgHgl3EQftv1g/vector_store/index.pkl +3 -0
- 19AyT4oBgHgl3EQfofjr/content/tmp_files/2301.00510v1.pdf.txt +1599 -0
- 19AyT4oBgHgl3EQfofjr/content/tmp_files/load_file.txt +0 -0
- 19AzT4oBgHgl3EQf8_5O/vector_store/index.faiss +3 -0
- 29E4T4oBgHgl3EQf0A2b/vector_store/index.faiss +3 -0
- 29FIT4oBgHgl3EQf5SvC/vector_store/index.faiss +3 -0
- 2dE1T4oBgHgl3EQfSANm/content/tmp_files/2301.03060v1.pdf.txt +1666 -0
- 2dE1T4oBgHgl3EQfSANm/content/tmp_files/load_file.txt +0 -0
- 2tE0T4oBgHgl3EQfdwDZ/content/2301.02382v1.pdf +3 -0
- 2tE0T4oBgHgl3EQfdwDZ/vector_store/index.faiss +3 -0
- 49FAT4oBgHgl3EQfmR1P/content/2301.08622v1.pdf +3 -0
- 49FAT4oBgHgl3EQfmR1P/vector_store/index.faiss +3 -0
- 49FAT4oBgHgl3EQfmR1P/vector_store/index.pkl +3 -0
- 6tFKT4oBgHgl3EQf_i4o/content/2301.11962v1.pdf +3 -0
- 6tFKT4oBgHgl3EQf_i4o/vector_store/index.faiss +3 -0
- A9E2T4oBgHgl3EQfRQfr/content/2301.03780v1.pdf +3 -0
- A9E2T4oBgHgl3EQfRQfr/vector_store/index.faiss +3 -0
- A9FRT4oBgHgl3EQfujgS/content/tmp_files/2301.13631v1.pdf.txt +1164 -0
- A9FRT4oBgHgl3EQfujgS/content/tmp_files/load_file.txt +0 -0
- CNE4T4oBgHgl3EQf5g54/content/2301.05324v1.pdf +3 -0
- CNE4T4oBgHgl3EQf5g54/vector_store/index.faiss +3 -0
- CNE4T4oBgHgl3EQf5g54/vector_store/index.pkl +3 -0
- CtAzT4oBgHgl3EQfiP1R/content/2301.01496v1.pdf +3 -0
- CtAzT4oBgHgl3EQfiP1R/vector_store/index.pkl +3 -0
- E9FLT4oBgHgl3EQfFi_K/vector_store/index.faiss +3 -0
- G9AzT4oBgHgl3EQfxf6F/content/tmp_files/2301.01739v1.pdf.txt +1866 -0
- G9AzT4oBgHgl3EQfxf6F/content/tmp_files/load_file.txt +0 -0
- GdFIT4oBgHgl3EQfWysJ/content/2301.11240v1.pdf +3 -0
- GtFAT4oBgHgl3EQftR52/content/2301.08663v1.pdf +3 -0
- GtFAT4oBgHgl3EQftR52/vector_store/index.faiss +3 -0
- GtFAT4oBgHgl3EQftR52/vector_store/index.pkl +3 -0
- INE1T4oBgHgl3EQfXwS1/content/tmp_files/2301.03131v1.pdf.txt +1508 -0
- INE1T4oBgHgl3EQfXwS1/content/tmp_files/load_file.txt +0 -0
- INE3T4oBgHgl3EQfugsS/vector_store/index.faiss +3 -0
- KtE0T4oBgHgl3EQfzgKz/content/2301.02674v1.pdf +3 -0
- KtE0T4oBgHgl3EQfzgKz/vector_store/index.faiss +3 -0
- KtFRT4oBgHgl3EQfDzfl/content/tmp_files/2301.13474v1.pdf.txt +603 -0
- KtFRT4oBgHgl3EQfDzfl/content/tmp_files/load_file.txt +291 -0
- MNE3T4oBgHgl3EQfBAmd/vector_store/index.faiss +3 -0
- MNFAT4oBgHgl3EQfxB7a/vector_store/index.pkl +3 -0
- NdFPT4oBgHgl3EQflzWN/content/tmp_files/2301.13123v1.pdf.txt +1848 -0
- NdFPT4oBgHgl3EQflzWN/content/tmp_files/load_file.txt +0 -0
- PtFJT4oBgHgl3EQfJCwC/content/tmp_files/2301.11458v1.pdf.txt +1913 -0
- PtFJT4oBgHgl3EQfJCwC/content/tmp_files/load_file.txt +0 -0
-dE4T4oBgHgl3EQf3w3V/content/tmp_files/2301.05309v1.pdf.txt
ADDED
|
@@ -0,0 +1,994 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Planning Visual Inspection Tours for a 3D Dubins Airplane
|
| 2 |
+
Model in an Urban Environment
|
| 3 |
+
Collin Hague ∗, Andrew Willis †, Dipankar Maity ‡, Artur Wolek §
|
| 4 |
+
University of North Carolina at Charlotte, Charlotte, North Carolina, 28223
|
| 5 |
+
This paper investigates the problem of planning a minimum-length tour for a three-
|
| 6 |
+
dimensional Dubins airplane model to visually inspect a series of targets located on the ground
|
| 7 |
+
or exterior surface of objects in an urban environment. Objects are 2.5D extruded polygons
|
| 8 |
+
representing buildings or other structures. A visibility volume defines the set of admissible
|
| 9 |
+
(occlusion-free) viewing locations for each target that satisfy feasible airspace and imaging con-
|
| 10 |
+
straints. The Dubins traveling salesperson problem with neighborhoods (DTSPN) is extended
|
| 11 |
+
to three dimensions with visibility volumes that are approximated by triangular meshes. Four
|
| 12 |
+
sampling algorithms are proposed for sampling vehicle configurations within each visibility
|
| 13 |
+
volume to define vertices of the underlying DTSPN. Additionally, a heuristic approach is pro-
|
| 14 |
+
posed to improve computation time by approximating edge costs of the 3D Dubins airplane
|
| 15 |
+
with a lower bound that is used to solve for a sequence of viewing locations. The viewing
|
| 16 |
+
locations are then assigned pitch and heading angles based on their relative geometry. The
|
| 17 |
+
proposed sampling methods and heuristics are compared through a Monte-Carlo experiment
|
| 18 |
+
that simulates view planning tours over a realistic urban environment.
|
| 19 |
+
I. Introduction
|
| 20 |
+
U
|
| 21 |
+
nmanned aerial vehicles (UAVs) are routinely used in applications such as visual reconnaissance, infrastructure
|
| 22 |
+
inspection, and aerial photography to image a series of points of interest (henceforth referred to as targets). In
|
| 23 |
+
three-dimensional environments (e.g., an urban city, mountainous terrain) the targets must be imaged from particular
|
| 24 |
+
vantage points to avoid occlusions from surrounding objects (e.g., buildings, trees). Additional requirements, such as
|
| 25 |
+
airspace restrictions and image resolution, further constrain the three-dimensional visibility volume from which an image
|
| 26 |
+
of a target may be obtained. This paper investigates the problem of planning a path to image a set of targets by flying
|
| 27 |
+
through their corresponding visibility volumes in minimum time. The UAV is modeled as a Dubins airplane [1, 2] and
|
| 28 |
+
the environment consists of extruded polygonal objects with targets located on the ground or on the surface of objects.
|
| 29 |
+
A. Relation to Prior Work
|
| 30 |
+
The view planning problem considered here is related to the Dubins traveling salesperson problem (DTSP [3]) of
|
| 31 |
+
constructing a minimum-time tour for a constant-speed planar Dubins vehicle model [4] to travel through a series of
|
| 32 |
+
planar points (with arbitrary heading). The set of points to visit can be generalized to arbitrary planar regions (e.g.,
|
| 33 |
+
polygons) to give the DTSP with neighborhoods (DTSPN [5]) wherein the Dubins vehicle must visit at least one point in
|
| 34 |
+
each region/neighborhood. One application of the DTSPN is to plan visual inspection tours for an airplane to visit
|
| 35 |
+
planar polygonal regions at a constant altitude to image ground targets [6]. More recently, the Dubins airplane model
|
| 36 |
+
[1, 2] that includes additional degrees of freedom (altitude and pitch angle) was used to extend the DTSPN to three
|
| 37 |
+
dimensions. Planning three-dimensional Dubins tours have typically assumed that the desired viewing regions have
|
| 38 |
+
relatively simple geometries, such as spheres [7] or cylinders [8]. In contrast, this work admits more complex target
|
| 39 |
+
visibility volumes that are approximated as triangular meshes.
|
| 40 |
+
B. Contributions
|
| 41 |
+
This paper formulates a view planning problem for a 3D Dubins airplane model to observe a set of targets occluded
|
| 42 |
+
by objects in an urban environment. The contributions of the paper are: (1) four sampling algorithms that extend
|
| 43 |
+
∗Graduate student, Department of Mechanical Engineering and Engineering Science
|
| 44 |
+
†Associate Professor, Department of Electrical and Computer Engineering
|
| 45 |
+
‡Assistant Professor, Department of Electrical and Computer Engineering
|
| 46 |
+
§Assistant Professor, Department of Mechanical Engineering and Engineering Science, Member AIAA
|
| 47 |
+
1
|
| 48 |
+
arXiv:2301.05309v1 [eess.SY] 12 Jan 2023
|
| 49 |
+
|
| 50 |
+
two-dimensional Dubins-based view planning to three dimensions with visibility volumes that have an arbitrary geometry
|
| 51 |
+
approximated by a triangular mesh, and (2) a heuristic approach that solves for a tour using a modified Euclidean
|
| 52 |
+
distance TSP (METSP) with edge costs that are lower bounds for the 3D Dubins path length and using the geometry of
|
| 53 |
+
consecutive viewing locations in the METSP tour to assign heading and pitch angles. The relative performance of the
|
| 54 |
+
algorithms are characterized through a Monte-Carlo experiment.
|
| 55 |
+
C. Paper Organization
|
| 56 |
+
The remainder of the paper is organized as follows. Section II describes the airplane motion model, the environment
|
| 57 |
+
model, the target visibility volumes, and states the view planning problem. Section III describes a method for
|
| 58 |
+
approximately computing the target visibility volumes and path planning for constant-altitude 2D tours. Section IV
|
| 59 |
+
introduces 3D path planning algorithms and proposes heuristics to reduce computation time. Section V describes the
|
| 60 |
+
results of a Monte-Carlo experiment that compares the 2D and 3D algorithms. The paper is concluded in Sec. VI.
|
| 61 |
+
II. Problem Formulation
|
| 62 |
+
This section formulates the problem of planning a minimum time path for an unmanned airplane to visually inspect
|
| 63 |
+
a set of targets in the presence of occluding structures. The vehicle motion model, environmental model, and target
|
| 64 |
+
visibility volumes are introduced, and the view planning problem is formally stated.
|
| 65 |
+
A. Airplane Motion Model
|
| 66 |
+
This work considers the three-dimensional Dubins airplane model [9, 10]:
|
| 67 |
+
������������
|
| 68 |
+
�𝑥
|
| 69 |
+
�𝑦
|
| 70 |
+
�𝑧
|
| 71 |
+
�𝜓
|
| 72 |
+
�𝛾
|
| 73 |
+
������������
|
| 74 |
+
=
|
| 75 |
+
������������
|
| 76 |
+
𝑣 cos 𝜓 cos 𝛾
|
| 77 |
+
𝑣 sin 𝜓 cos 𝛾
|
| 78 |
+
𝑣 sin 𝛾
|
| 79 |
+
𝑢𝜓
|
| 80 |
+
𝑢𝛾
|
| 81 |
+
������������
|
| 82 |
+
,
|
| 83 |
+
(1)
|
| 84 |
+
where (𝑥, 𝑦, 𝑧) ∈ R3 is the inertial position of the airplane expressed in an east-north-up coordinate system, 𝑣 is the
|
| 85 |
+
vehicle’s speed, 𝜓 is the heading angle, and 𝛾 is the pitch angle (see Fig. 1). The control inputs are the turn-rate 𝑢𝜓 and
|
| 86 |
+
the pitch-angle-rate 𝑢𝛾. The Dubins airplane model travels in the direction it is pointed so that the pitch angle 𝛾 is
|
| 87 |
+
Fig. 1
|
| 88 |
+
The model for a Dubins airplane flying at speed 𝑣 where (𝑥, 𝑦, 𝑧) is the inertial position, 𝜓 is the heading
|
| 89 |
+
angle, and 𝛾 is the pitch angle.
|
| 90 |
+
equivalent to the flight path angle and is constrained between a minimum and maximum angle, 𝛾 ∈ [𝛾min, 𝛾max]. The
|
| 91 |
+
controls are constrained such that the path curvature 𝜌min is bounded [11]:
|
| 92 |
+
𝜌min ≤
|
| 93 |
+
1
|
| 94 |
+
√︃
|
| 95 |
+
𝑢2
|
| 96 |
+
𝜓 cos2 𝛾 + 𝑢2𝛾
|
| 97 |
+
.
|
| 98 |
+
(2)
|
| 99 |
+
2
|
| 100 |
+
|
| 101 |
+
Let the vehicle’s configuration be denoted 𝒒 = (𝑥, 𝑦, 𝑧, 𝜓, 𝛾) ∈ 𝑄 where 𝑄 = R3 × S2 is the configuration space.
|
| 102 |
+
An example 2D Dubins path (modified with a constant pitch angle to join two altitudes) and a 3D Dubins path that
|
| 103 |
+
join 𝒒𝑖 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗, 𝜓 𝑗, 𝛾 𝑗) and 𝒒 𝑗 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗, 𝜓 𝑗, 𝛾 𝑗) are shown in Fig. 2. The modified 2D Dubins path uses a
|
| 104 |
+
constant pitch angle 𝛾𝑐 that is computed from the change in altitude and planar displacement between the start and end
|
| 105 |
+
configurations. The modified 2D Dubins path does not satisfy the required pitch angle at the start/end configurations and
|
| 106 |
+
may violate pitch angle constraints along the path when the change in altitude is large relative to the planar displacement.
|
| 107 |
+
Instead, a 3D Dubins path can join two configurations while limiting the pitch angle along the path to within the
|
| 108 |
+
allowable bounds. The 3D Dubins paths are generated according to [10] by decomposing the 3D path into two decoupled
|
| 109 |
+
2D Dubins paths. First, a 2D horizontal Dubins path is constructed in the 𝑥𝑦 plane to join the 2D Dubins configurations
|
| 110 |
+
(𝑥𝑖, 𝑦𝑖, 𝜓𝑖) and (𝑥 𝑗, 𝑦 𝑗, 𝜓 𝑗) using a horizontal turn radius that is twice the minimum turn radius 𝜌h = 2𝜌min. Next, a 2D
|
| 111 |
+
vertical path is constructed, with vertical plane turn radius 𝜌v that is found from [10]
|
| 112 |
+
𝜌−2
|
| 113 |
+
min = 𝜌−2
|
| 114 |
+
h + 𝜌−2
|
| 115 |
+
v
|
| 116 |
+
,
|
| 117 |
+
(3)
|
| 118 |
+
to join the 2D Dubins configurations (𝑠𝑖, 𝑧𝑖, 𝛾𝑖) and (𝑠 𝑗, 𝑧 𝑗, 𝛾 𝑗) where 𝑠𝑖 and 𝑠 𝑗 are the initial and final arc-lengths
|
| 119 |
+
along the Dubins path in the 𝑥𝑦 plane (where 𝑠𝑖 = 0). The turn radii, 𝜌h and 𝜌v, are iteratively varied while satisfying
|
| 120 |
+
(3) to meet the acceptable pitch angle constraint while minimizing the path length as described in [10]. The length of a
|
| 121 |
+
3D Dubins path between two configurations, 𝒒𝑖, 𝒒 𝑗 ∈ 𝑄 is denoted 𝐷(𝒒𝑖, 𝒒 𝑗) : 𝑄2 → R.
|
| 122 |
+
Start
|
| 123 |
+
End
|
| 124 |
+
Modified 2D
|
| 125 |
+
Dubins Path
|
| 126 |
+
3D Dubins Path
|
| 127 |
+
Fig. 2
|
| 128 |
+
An example 3D Dubins airplane path (green) [10] joining configurations 𝒒1 = (0, 0, 0, 𝜋
|
| 129 |
+
6 , 0) and 𝒒2 =
|
| 130 |
+
(0, 300 m, 400 m, 0, 0) is compared to a modified 2D Dubins path (red) that join the same pair of locations and
|
| 131 |
+
heading angles. The modified 2D Dubins path is shorter (523 m compared to 1184 m) but violates the pitch angle
|
| 132 |
+
constraint since a large altitude change is required over a relatively short distance. The paths are constructed
|
| 133 |
+
with the parameters: 𝜌min = 40 m, 𝛾min = −𝜋/12, and 𝛾max = 𝜋/9.
|
| 134 |
+
B. Environment
|
| 135 |
+
The airplane operates in an urban environment that consists of a ground plane and a collection of 2.5-dimensional
|
| 136 |
+
objects representing buildings or other structures. Let 𝑂 = {𝑂0, . . . , 𝑂𝑁𝑂−1} be the set of 𝑁𝑂 objects, where 𝑂𝑖 ⊂ R3
|
| 137 |
+
for each 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1}. The 𝑖th object is an extruded polygon 𝑂𝑖 = {(𝑥, 𝑦, 𝑧) ∈ R3 | (𝑥, 𝑦) ∈ 𝐴𝑖 and 𝑧 ∈ [0, ℎ𝑖]}
|
| 138 |
+
where 𝐴𝑖 ⊂ 𝑅2 is the object’s footprint and ℎ𝑖 is the height of the object. The set of points along the boundary of 𝐴𝑖 is a
|
| 139 |
+
simple two-dimensional polygon denoted 𝜕𝐴𝑖 whose shape is defined by an ordered set of points with a positive signed
|
| 140 |
+
area. Points on the interior of 𝐴𝑖 belong to the set denoted int(𝐴𝑖). The polygonal areas of each object do not intersect
|
| 141 |
+
int(𝐴𝑖) ∩ int(𝐴 𝑗) = ∅ for all 𝑖 ≠ 𝑗 with 𝑖, 𝑗 ∈ {0, . . . , 𝑁𝑂 − 1}. The height of the tallest object in 𝑂 is denoted ℎmax,
|
| 142 |
+
and the airplane is constrained to fly in a feasible airspace
|
| 143 |
+
𝐹 = 𝐷 × [𝑧min, 𝑧max] − 𝑂 ,
|
| 144 |
+
(4)
|
| 145 |
+
where 𝐷 ⊂ R2 is the planar region containing the polygonal objects, i.e., 𝐴𝑖 ⊂ 𝐷 for all 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1}, 𝑧min and
|
| 146 |
+
𝑧max > 𝑧min are the minimum and maximum operating altitudes of the airplane. The union of all the objects is subtracted
|
| 147 |
+
from the rectangular volume 𝐷 × [𝑧min, 𝑧max] in (4). To ensure that 3D Dubins paths joining two configurations does not
|
| 148 |
+
exceed the feasible airspace or encounter obstacles, the feasible airspace and set of objects can be artificially contracted
|
| 149 |
+
and inflated, respectively. This work assumes that the minimum altitude 𝑧min is constrained to be above the tallest
|
| 150 |
+
3
|
| 151 |
+
|
| 152 |
+
building, 𝑧min > ℎmax + 2𝜌min, such that the airplane’s feasible airspace is free of objects and there is enough vertical
|
| 153 |
+
space to maneuver without collision.
|
| 154 |
+
C. Target Visibility Volumes
|
| 155 |
+
The airplane is assumed to be equipped with a gimbaled camera and is tasked with inspecting a set of 𝑀 targets
|
| 156 |
+
located at the points 𝑃 = { 𝒑0, . . . , 𝒑𝑀−1}. Each target 𝒑 = (𝑝𝑥, 𝑝𝑦, 𝑝𝑧) ∈ 𝑃 is located in an unobstructed area of the
|
| 157 |
+
ground plane or on the exposed surface of an object. That is, each target has planar location (𝑝𝑥, 𝑝𝑦) ∈ 𝐷 and altitude
|
| 158 |
+
𝑝𝑧 satisfying the following cases: (i) if (𝑝𝑥, 𝑝𝑦) ∩ 𝐴𝑖 = ∅ for all 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1} then the target is on the ground
|
| 159 |
+
plane with 𝑝𝑧 = 0, (ii) if 𝑝𝑦 ∩ 𝜕𝐴𝑖 ≠ ∅ for some 𝑖 ∈ {0, . . . , 𝑁𝑂 − 1} then the target is located on the vertical wall of the
|
| 160 |
+
𝑖th object and 𝑝𝑧 ∈ [0, ℎ𝑖], or (iii) if 𝑝𝑦 ∩ int(𝐴𝑖) ≠ ∅ then 𝑝𝑧 = ℎ𝑖 such that the target is on top of the 𝑖th object. For
|
| 161 |
+
each target, a target visibility volume 𝑉𝑖 is defined as the set of points 𝒈 ∈ R3 that have a direct line-of-sight to the target
|
| 162 |
+
(i.e., not obscured by buildings). Let
|
| 163 |
+
𝐿(𝜏; 𝒈, 𝒑) = ( 𝒑 − 𝒈)𝜏 + 𝒈 for 𝜏 ∈ [0, 1]
|
| 164 |
+
(5)
|
| 165 |
+
denote a line segment that joints two points 𝒈, 𝒑 ∈ R3 where 𝜏 is a normalized arc-length. The visibility volume for a
|
| 166 |
+
target located at 𝒑 = (𝑝𝑥, 𝑝𝑦, 𝑝𝑧) is the subset of the feasible airspace that is within direct line-of-sight to the target,
|
| 167 |
+
within a maximum range 𝑑max relative to the target, and at least a distance ℎview above the target:
|
| 168 |
+
𝑉( 𝒑; 𝐹, 𝑂, 𝑑max, ℎview) = {𝒈 = (𝑔𝑥, 𝑔𝑦, 𝑔𝑧) ∈ 𝐹 such that || 𝒑 − 𝒈|| ≤ 𝑑max, ℎview + 𝑝𝑧 ≤ 𝑔𝑧 and
|
| 169 |
+
𝐿(𝜏; 𝒈, 𝒑) ∩ 𝑂 𝑗 = ∅ for all 𝜏 ∈ [0, 1] and 𝑗 ∈ {0, . . . , 𝑁𝑂 − 1}} .
|
| 170 |
+
(6)
|
| 171 |
+
For brevity, visibility volumes (6) are henceforth denoted 𝑉( 𝒑). The maximum range 𝑑max constraint models minimum
|
| 172 |
+
image resolution requirements. The minimum height-above-target ℎview < 𝑑max constraint ensures images are captured
|
| 173 |
+
with sufficient surrounding context (e.g., the point target may actually represent an extended body that should be
|
| 174 |
+
contained in the image) or to reduce gimbal pointing speed and precision requirements. For the problem to be well
|
| 175 |
+
posed, there should always exist at least one valid viewing point above each target. This condition may be satisfied by
|
| 176 |
+
the following parameter constraints:
|
| 177 |
+
𝑧min ≤ ℎview + ℎmax ≤ 𝑧max ,
|
| 178 |
+
(7)
|
| 179 |
+
𝑧min ≤ 𝑑max ,
|
| 180 |
+
(8)
|
| 181 |
+
2𝑑max < || 𝒑𝑖 − 𝒑 𝑗||
|
| 182 |
+
for all 𝒑𝑖, 𝒑𝑖 ∈ 𝑃 with 𝒑𝑖 ≠ 𝒑 𝑗 .
|
| 183 |
+
(9)
|
| 184 |
+
If a target is located on top of the highest object, then constraint (7) ensures that a viewing point exists that is below the
|
| 185 |
+
maximum feasible altitude and above the minimum feasible altitude. For targets that are located on the ground plane,
|
| 186 |
+
constraint (8) ensures that the sensor range is sufficiently large to view the target from the minimum feasible altitude.
|
| 187 |
+
Lastly, constraint (9) is a simplifying assumption that guarantees targets are spaced sufficiently far apart such that their
|
| 188 |
+
visibility volumes do not intersect 𝑉( 𝒑𝑖) ∩ 𝑉( 𝒑 𝑗) = ∅ for all 𝑖, 𝑗 ∈ {0, . . . , 𝑀 − 1} with 𝑖 ≠ 𝑗.
|
| 189 |
+
D. View-planning Problem Statement
|
| 190 |
+
Let 𝐵(𝒒) be a mapping from a configuration 𝒒 = (𝑥, 𝑦, 𝑧, 𝜓, 𝛾) ∈ 𝑄 to an integer in the set {0, . . . , 𝑀 − 1} that
|
| 191 |
+
identifies the visibility volume corresponding to 𝒒, i.e., the integer 𝐵(𝒒) corresponds to the target 𝒑𝐵(𝒒) ∈ 𝑃 for which
|
| 192 |
+
(𝑥, 𝑦, 𝑧) ∈ 𝑉( 𝒑𝐵(𝒒)). If 𝒒 is not contained in any visibility volume then 𝐵(𝒒) = ∅. The optimization problem is to find
|
| 193 |
+
the sequence of vehicle configurations 𝒒0, . . . , 𝒒𝑀−1 that
|
| 194 |
+
minimize
|
| 195 |
+
𝑀−1
|
| 196 |
+
∑︁
|
| 197 |
+
𝑖=0
|
| 198 |
+
𝐷(𝒒𝑖, 𝒒𝑖+1) + 𝐷(𝒒𝑀−1, 𝒒0) ,
|
| 199 |
+
(10)
|
| 200 |
+
subject to
|
| 201 |
+
𝐵(𝒒𝑖) ≠ 𝐵(𝒒 𝑗),
|
| 202 |
+
for all 𝑖, 𝑗 ∈ {0, . . . , 𝑀 − 1} with 𝑖 ≠ 𝑗 ,
|
| 203 |
+
(11)
|
| 204 |
+
𝐵(𝒒0) ∪ · · · ∪ 𝐵(𝒒𝑀−1) = {0, . . . , 𝑀 − 1} ,
|
| 205 |
+
(12)
|
| 206 |
+
where the cost function (10) is the total length of the 3D Dubins paths in the tour, the constraint (11 ensures that each
|
| 207 |
+
vehicle configuration lies within a unique visibility volume and the constraint 12) ensures that all visibility volumes
|
| 208 |
+
are visited. The view planning problem (10)–(12) is a mixed continuous/combinatorial optimization problem with a
|
| 209 |
+
nonlinear cost function and constraints. Since the vehicle travels at a constant speed the minimum-length tour is also the
|
| 210 |
+
minimum-time tour.
|
| 211 |
+
4
|
| 212 |
+
|
| 213 |
+
III. 2D Algorithms
|
| 214 |
+
In this section, a target visibility volume mesh approximation is described (Sec. III.A) followed by a description of
|
| 215 |
+
two-dimensional algorithms (Sec. III.B and Sec. III.C) that solve the view planning problem (10)–(12). The algorithms
|
| 216 |
+
discussed here include (i) traveling directly over each target (i.e., formulating a Dubins traveling salesperson problem
|
| 217 |
+
(DTSP) [12]), and (ii) the DTSP with neighborhoods (DTSPN) to visit one point in a set of visibility polygons
|
| 218 |
+
corresponding to the targets [6] that is modified to use an optimized altitude for defining the visibility polygons
|
| 219 |
+
A. Target Visibility Volume Approximation
|
| 220 |
+
Volumes in 3D are commonly approximated by a triangular mesh [13]. While many prior works on the DTSP
|
| 221 |
+
have assumed simplified 3D geometries (e.g., spheres, cylinders), we propose to use triangular meshes since they can
|
| 222 |
+
represent arbitrary geometries. The 𝑖th target visibility volume 𝑉𝑖 is approximated with 𝑁𝐹 triangular mesh elements
|
| 223 |
+
resulting in the mesh ˆ𝑉𝑖. Let | ˆ𝑉𝑖| denote the total number of mesh elements. The 𝑗th mesh element in ˆ𝑉𝑖 is defined
|
| 224 |
+
as a set of vectors ˆ𝑉𝑖 𝑗 = {𝒄0
|
| 225 |
+
𝑖 𝑗, 𝒄1
|
| 226 |
+
𝑖 𝑗, 𝒄2
|
| 227 |
+
𝑖 𝑗, 𝒏𝑖 𝑗} where the vectors 𝒄0
|
| 228 |
+
𝑖 𝑗, 𝒄1
|
| 229 |
+
𝑖 𝑗, 𝒄2
|
| 230 |
+
𝑖 𝑗 ∈ R3 are the positions of the vertices of a
|
| 231 |
+
triangular mesh element, and 𝒏𝑖 𝑗 ∈ R3 is an outward pointing normal vector, as illustrated in Fig. 3. The mesh-based
|
| 232 |
+
target visibility volumes ˆ𝑉𝑖 are computed using the painter’s algorithm [14]. A sphere centered on each target is
|
| 233 |
+
decomposed into six mutually perpendicular views, and each view looks out from the target point location with a
|
| 234 |
+
90-degree field-of-view thereby covering one of the six sides of a cube enclosing the point. OpenGL [15] and a special
|
| 235 |
+
version of the geometric depth map, i.e., inverse depth, is used to capture the depth of scene objects in the direction of
|
| 236 |
+
each view. After calculating the depth values, those that are less than or equal to 𝑑max are tessellated into a preliminary
|
| 237 |
+
3D visibility volume mesh. This mesh is genus-0 [13], i.e., a deformation of the sphere, and is also a manifold surface
|
| 238 |
+
amenable to constructive solid geometry (CSG) Boolean operations. Next, the mesh is intersected with the feasible
|
| 239 |
+
airspace 𝐹 and the minimum viewing distance constraint ℎmin is imposed using CSG Boolean intersection operations.
|
| 240 |
+
To reduce the number of vertices in the resulting mesh a decimation procedure is applied [13].
|
| 241 |
+
Fig. 3
|
| 242 |
+
Example target visibility region with a mesh element defined by three vertices 𝒄0, 𝒄1, 𝒄2 and outward
|
| 243 |
+
pointing normal vector 𝒏.
|
| 244 |
+
B. Baseline Algorithm: Dubins Traveling Salesperson Problem (DTSP)
|
| 245 |
+
The DTSP is the problem of finding the shortest planar tour that visits all points in a graph once using points that are
|
| 246 |
+
connected with 2D Dubins paths. Since the objects considered here are extruded polygons, there are no features that can
|
| 247 |
+
block viewing targets from above (e.g., bridges or tunnels are not admissible). Consequently, the view planning problem
|
| 248 |
+
(10)–(12) can be solved with the DTSP by flying at a fixed altitude directly over each target. All feasible altitudes (i.e.,
|
| 249 |
+
that are common to all visibility volumes) lead to identical cost tours. To account for the different possible heading
|
| 250 |
+
angles at each overhead location the heading-angle-discretized DTSP is adopted [16]. An example solution is shown in
|
| 251 |
+
Fig. (4a).
|
| 252 |
+
5
|
| 253 |
+
|
| 254 |
+
C. Optimized Altitude DTSP with Neighborhoods (DTSPN)
|
| 255 |
+
A more sophisticated approach developed by Obermeyer et al. [6] considers the fixed altitude slices of the target
|
| 256 |
+
visibility volumes (i.e., planar visibility polygons). Vehicle configurations in each visibility polygon are sampled and a
|
| 257 |
+
DTSPN [5, 6] is formulated to visit one configuration in each visibility polygon. In [6], two sampling algorithms were
|
| 258 |
+
proposed: entry pose sampling—wherein samples are made along the edge of the polygon with heading angles that are
|
| 259 |
+
tangent or inward pointing (Fig. 4b)—and interior pose sampling—wherein samples are placed uniformly in a grid on
|
| 260 |
+
the interior of the visibility polygons with uniformly sampled heading angles. In [6], entry pose sampling gave lower
|
| 261 |
+
cost solutions than interior pose sampling. Thus, the entry pose sampling method is adopted here. The constraints of
|
| 262 |
+
the view planning problem (7)–(9) allow for visibility volumes to occupy disjoint segments of altitude. That is, there
|
| 263 |
+
may not exist an altitude 𝑧∗ ∈ [𝑧min, 𝑧max] that is common to all visibility volumes. While this does not pose an issue
|
| 264 |
+
for some of the 3D algorithms proposed later, these cases cannot be solved by the 2D (constant-altitude) algorithms
|
| 265 |
+
described here. However, introducing the additional constraint
|
| 266 |
+
ℎmax + ℎview ≤ 𝑑max
|
| 267 |
+
(13)
|
| 268 |
+
ensures that the visibility volumes for a target located on the ground plane and for a target located atop the highest
|
| 269 |
+
object have at least one common altitude at 𝑧∗ = 𝑑max. In general, there is a range of admissible altitudes 𝑧∗ that may
|
| 270 |
+
be chosen. The choice of altitude impacts the 2D DTSPN algorithm since visibility polygons change in shape and
|
| 271 |
+
size as the altitude varies. Intuitively, larger polygons are preferred over smaller ones since this increases the set of
|
| 272 |
+
candidate configurations. This work proposes to identify an optimal working altitude for the 2D algorithm as follows.
|
| 273 |
+
First, 𝑛slice polygons are generated from each visibility volume mesh (i.e., for all targets) using the method described
|
| 274 |
+
in [17]. Let P = polygonFromMesh( ˆ𝑉, 𝑧) denote the polygon that results from slicing mesh ˆ𝑉 at altitude 𝑧 and let
|
| 275 |
+
polygonArea(P) denote the corresponding area. The optimal altitude 𝑧∗ is chosen as the one that maximizes the sum
|
| 276 |
+
of polygonal areas across all visibility polygons:
|
| 277 |
+
𝑧∗ = argmax
|
| 278 |
+
𝑧∈𝑍
|
| 279 |
+
𝑀−1
|
| 280 |
+
∑︁
|
| 281 |
+
𝑖=0
|
| 282 |
+
polygonArea(polygonFromMesh( ˆ𝑉𝑖, 𝑧))
|
| 283 |
+
(14)
|
| 284 |
+
where 𝑍 = {𝑧0, . . . , 𝑧𝑛slice−1} is a set of altitudes at which the polygons are computed. Note that all altitudes 𝑧 ∈ 𝑍 are
|
| 285 |
+
constrained such that 𝑧min ≤ 𝑧 ≤ 𝑧max. Also, note that 𝑧0 and 𝑧slice−1 are not 𝑧min and 𝑧max respectively, instead 𝑧0 and
|
| 286 |
+
𝑧slice−1 are slightly offset into the body to avoid floating point error. The selection of 𝑧∗ is visualized in Fig 5a.
|
| 287 |
+
(a) 2D Dubins traveling salesperson problem (DTSP)
|
| 288 |
+
(b) 2D DTSP with neighborhoods (DTSPN)
|
| 289 |
+
Fig. 4
|
| 290 |
+
Example solutions to the view-planning problem using 2D constant-altitude algorithms. The green
|
| 291 |
+
regions are visibility polygons for a chosen altitude 𝑧∗ while the black arrows represent the heading angle at
|
| 292 |
+
sampling points. The multicolored line is the solution path of the TSPs with increasing path length represented
|
| 293 |
+
by color changes from red to purple. The DTSP (a) is solved with entry pose sampling using eight headings
|
| 294 |
+
samples directly over the targets, while the 2D DTSPN (b) uses eight sample locations around the perimeter of
|
| 295 |
+
the polygon with four heading angles that are tangent or point into the corresponding visibility polygons.
|
| 296 |
+
IV. 3D Algorithms
|
| 297 |
+
Inspection tours that admit three-dimensional maneuvering can potentially lead to path length reductions when
|
| 298 |
+
compared to two-dimensional (constant-altitude) tours. The solution techniques in this work all use a transformation
|
| 299 |
+
6
|
| 300 |
+
|
| 301 |
+
approach to solve the (2D or 3D) DTSPN according to the following steps: compute the approximation of the
|
| 302 |
+
target visibility volume (Sec. III.A), sample the visibility volumes to create graph vertices corresponding to vehicle
|
| 303 |
+
configurations, calculate edge costs between vertices using the 3D Dubins path planning algorithm, and solve for a
|
| 304 |
+
DTSPN tour. Section IV.A details three algorithms to sample the target visibility volumes: random face sampling, 3D
|
| 305 |
+
edge sampling, and global weighted face. Section IV.B.2 then introduces a heuristic approach that improves the edge
|
| 306 |
+
cost computation time using a modified Euclidean distance edge cost and a geometric approach to assign heading and
|
| 307 |
+
pitch angles at each configuration in the tour.
|
| 308 |
+
(a) Optimized altitude with entry pose sampling
|
| 309 |
+
(b) Random face sampling
|
| 310 |
+
(c) 3D edge sampling
|
| 311 |
+
(d) Global weighted face sampling
|
| 312 |
+
Fig. 5
|
| 313 |
+
Visualizations of the four different sampling algorithms: optimized altitude with entry pose sampling,
|
| 314 |
+
random face sampling, 3D edge sampling, and global weighted face sampling. Two-dimensional representations
|
| 315 |
+
of the visibility volumes are in gray, altitude slices are orange lines, and sampled configurations are blue circular
|
| 316 |
+
markers.
|
| 317 |
+
A. Sampling Strategies
|
| 318 |
+
1. Random Face Sampling
|
| 319 |
+
The random face sampling algorithm extends the 2D entry pose strategy from [6] to sample 3D vehicle configurations
|
| 320 |
+
across the surface of the target visibility volume with a uniform distribution. The approach is detailed in Algorithm 1
|
| 321 |
+
and visualized in Fig. 5b. The algorithm randomly finds 𝑛pts three-dimensional points on the faces of each triangular
|
| 322 |
+
mesh in the set of triangular meshes ˆ𝑉0:𝑀−1 = { ˆ𝑉1, . . . , ˆ𝑉𝑀−1} and assigns to each point a set of configurations with
|
| 323 |
+
𝑛𝜓 and 𝑛𝛾 unique heading and pitch angles, respectively. The sampling method returns a total of 𝑛pts𝑛𝜓𝑛𝛾 vehicle
|
| 324 |
+
configurations per visibility volume. First, the set of configurations Q is initialized as an empty set, and the area of
|
| 325 |
+
each face in the mesh is calculated (lines 3-6). The area of each triangular face element, 𝑎𝑖 𝑗, is calculated by the
|
| 326 |
+
elementArea function using
|
| 327 |
+
𝑎𝑖 𝑗 = elementArea( ˆ𝑉𝑖 𝑗) = 1
|
| 328 |
+
2 ||(𝒄0
|
| 329 |
+
𝑖 𝑗 − 𝒄1
|
| 330 |
+
𝑖 𝑗) × (𝒄0
|
| 331 |
+
𝑖 𝑗 − 𝒄2
|
| 332 |
+
𝑖 𝑗)|| ,
|
| 333 |
+
(15)
|
| 334 |
+
where × is the vector cross product and 𝒄0
|
| 335 |
+
𝑖 𝑗, 𝒄1
|
| 336 |
+
𝑖 𝑗, and 𝒄2
|
| 337 |
+
𝑖 𝑗 are the three vertices contained in the triangular face element
|
| 338 |
+
ˆ𝑉𝑖 𝑗. Next, the proportion of each face area to the total surface area of the mesh ˆ𝑉𝑖 is calculated using element-wise
|
| 339 |
+
division (line 7). The randomSetOfIndices function identifies 𝑛pts random faces by sampling faces with probability
|
| 340 |
+
in proportion to the weights 𝒘𝐹 (line 8). The use of the proportional surface area during the random selection process
|
| 341 |
+
gives every point on the surface of the target visibility region an equal chance of being selected. For each selected
|
| 342 |
+
triangular face, a point on the face is randomly selected using a Barycentric coordinate system [18] (lines 10-12). The
|
| 343 |
+
Barycentric coordinate system allows for the mapping of two random numbers 𝑟0 and 𝑟1 sampled uniformly from the
|
| 344 |
+
interval [0, 1] onto a triangle, embedded in R3, with the weighted sum of its vertices [18]. The random numbers 𝑟0 and
|
| 345 |
+
𝑟1 are first sampled (line 11) and then a position on the chosen triangular face is determined (line 12). For each position,
|
| 346 |
+
𝑛𝜓 heading angles sampled uniformly between 0 and 2𝜋 as well as 𝑛𝛾 pitch angles between 𝛾min and 𝛾max are sampled
|
| 347 |
+
uniformly then added to the set of vehicle configurations. The runtime of the algorithm is dominated by the nested for
|
| 348 |
+
loops on lines 2 and 4 running 𝑀| ˆ𝑉|max times—where | ˆ𝑉|max = max𝑖∈{0,1,...,𝑀−1}(| ˆ𝑉𝑖|) is the maximum number of
|
| 349 |
+
7
|
| 350 |
+
|
| 351 |
+
faces in a single mesh—and the collections of nested loops on lines 13-14 which run 𝑀𝑛pts𝑛𝜓𝑛𝛾. When the number of
|
| 352 |
+
mesh faces in a visibility volume is greater than the number of samples collected | ˆ𝑉|max > 𝑛pts𝑛𝜓𝑛𝛾 the runtime is
|
| 353 |
+
𝑂(𝑀| ˆ𝑉|max).
|
| 354 |
+
Algorithm 1 Random Face Sampling
|
| 355 |
+
function: RandomFaceSampling( ˆ𝑉0:𝑀−1, 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝛾max, 𝛾min)
|
| 356 |
+
input: target visibility volume mesh ˆ𝑉0:𝑀−1, number of points to sample 𝑛pts, number of heading angles 𝑛𝜓, number of
|
| 357 |
+
pitch angles 𝑛𝛾, max pitch angle 𝛾max, min pitch angle 𝛾min
|
| 358 |
+
output: a set of vehicle configurations for each target Q
|
| 359 |
+
1: Q ← ∅
|
| 360 |
+
2: for ˆ𝑉𝑖 ∈ ˆ𝑉0:𝑀−1 do
|
| 361 |
+
3:
|
| 362 |
+
Q𝑖 ← ∅, 𝒂𝑖 ← ∅
|
| 363 |
+
4:
|
| 364 |
+
for ˆ𝑉𝑖 𝑗 ∈ ˆ𝑉𝑖 do
|
| 365 |
+
5:
|
| 366 |
+
𝒂𝑖 ← 𝒂𝑖 ∪ elementArea( ˆ𝑉𝑖 𝑗)
|
| 367 |
+
6:
|
| 368 |
+
end for
|
| 369 |
+
7:
|
| 370 |
+
𝒘𝐹 = 𝒂𝑖/�|𝒂𝑖 |−1
|
| 371 |
+
𝑗=0
|
| 372 |
+
𝑎𝑖 𝑗
|
| 373 |
+
8:
|
| 374 |
+
𝐼 ← randomSetOfIndices(𝑛pts, 𝒘𝐹)
|
| 375 |
+
9:
|
| 376 |
+
for 𝑖 ∈ 𝐼 do
|
| 377 |
+
10:
|
| 378 |
+
𝒄0
|
| 379 |
+
𝑖 𝑗, 𝒄1
|
| 380 |
+
𝑖 𝑗, 𝒄2
|
| 381 |
+
𝑖 𝑗 ← getVertices( ˆ𝑉𝑖 𝑗)
|
| 382 |
+
11:
|
| 383 |
+
𝑟0 ∼ U[0,1], 𝑟1 ∼ U[0,1]
|
| 384 |
+
12:
|
| 385 |
+
𝒔 ← 𝒄0
|
| 386 |
+
𝑖 𝑗 (1 − √𝑟0) + 𝒄1
|
| 387 |
+
𝑖 𝑗
|
| 388 |
+
√𝑟0(1 − 𝑟1) + 𝒄2
|
| 389 |
+
𝑖 𝑗
|
| 390 |
+
√𝑟0𝑟1
|
| 391 |
+
13:
|
| 392 |
+
for 𝑗 ∈ {0, . . . , 𝑛𝜓 − 1} do
|
| 393 |
+
14:
|
| 394 |
+
for 𝑘 ∈ {0, . . . , 𝑛𝛾 − 1} do
|
| 395 |
+
15:
|
| 396 |
+
Q𝑖 ← Q𝑖 ∪ �𝒔, 2𝑗𝜋/𝑛𝜓, 𝛾min + 𝑘(𝛾max − 𝛾min)/max(𝑛𝛾 − 1, 1)�
|
| 397 |
+
16:
|
| 398 |
+
end for
|
| 399 |
+
17:
|
| 400 |
+
end for
|
| 401 |
+
18:
|
| 402 |
+
end for
|
| 403 |
+
19:
|
| 404 |
+
Q ← Q ∪ Q𝑖
|
| 405 |
+
20: end for
|
| 406 |
+
2. 3D Edge Sampling
|
| 407 |
+
The second sampling strategy proposed is 3D edge sampling wherein the 2D entry pose strategy from [6] is extended
|
| 408 |
+
to sample 3D vehicle configurations across the lowest feasible altitude. For the visibility volume shapes studied here this
|
| 409 |
+
is also the altitude where the cross-sectional area is largest for each shape. The 3D edge sampling algorithm, detailed
|
| 410 |
+
in Algorithm 2 and visualized in Fig. 5c, finds 𝑛pts three-dimensional points on the polygon created by slicing the
|
| 411 |
+
triangular mesh along the lowest feasible altitude and distributing points uniformly along the perimeters. The algorithm
|
| 412 |
+
then assigns a set of configurations to each point with 𝑛𝜓 and 𝑛𝛾 unique heading and pitch angles, respectively. The
|
| 413 |
+
sampling method returns a total of 𝑛pts𝑛𝜓𝑛𝛾 vehicle configurations per visibility volume. First, the set of configurations
|
| 414 |
+
Q is initialized as an empty set (line 1). Then, for each visibility volume a subset of points contained in that volume
|
| 415 |
+
is initialized (line 3). Next, the 𝑧 minimum altitude for the triangular mesh is found by finding the minimum height
|
| 416 |
+
coordinate in the set of vertices in the mesh ˆ𝑉 𝑧
|
| 417 |
+
𝑖 (line 4). After, the polygonFromMesh algorithm takes the triangular
|
| 418 |
+
mesh and the 𝑧min altitude and returns a polygonal slice of the mesh (line 5). A set of points, 𝝀 ∈ R2, placed uniformly
|
| 419 |
+
along the edge of the polygon is found using the uniformPerimeterPoints which takes a polygon and the number
|
| 420 |
+
of points desired as arguments (line 6). Note that lines 4–6 can be modified to produce samples at multiple altitude
|
| 421 |
+
slices if desired. Next, the algorithm iterates through each sampled point and assigns heading and pitch angles. To
|
| 422 |
+
ensure inward-pointing heading angles, the direction of the line segment containing the sample point is found using the
|
| 423 |
+
tangentAngle function (line 8). The points in the polygon defined by polygonFromMesh have a positive signed area.
|
| 424 |
+
Thus, the inward-pointing heading angles are the angles from [0, 𝜋] measured counter-clockwise from the tangent angle.
|
| 425 |
+
For each position, 𝑛𝜓 heading angles between 𝜓𝑞 and 𝜓𝑞 + 𝜋 and 𝑛𝛾 pitch angles between 𝛾min and 𝛾max are sampled
|
| 426 |
+
uniformly and returned as part of the vehicle configurations (lines 9-15). To achieve 𝑛 equally spaced angle samples,
|
| 427 |
+
including the minimum and maximum angle, the range is divided into 𝑛 − 1 sub-sections. The max function, on lines 10
|
| 428 |
+
and 12, ensures the range is never divided by zero (the case where 𝑛𝛾 or 𝑛𝜓 is one). The runtime complexity is dominated
|
| 429 |
+
8
|
| 430 |
+
|
| 431 |
+
by the for loops on lines 2-18 which have a worst-case running time complexity of 𝑂(𝑀𝑘), where 𝑘 = | ˆ𝑉|2
|
| 432 |
+
max + 𝑛pts𝑛𝜓𝑛𝛾.
|
| 433 |
+
| ˆ𝑉|2
|
| 434 |
+
max is the runtime of the polygonFromMesh algorithm while 𝑛pts𝑛𝜓𝑛𝛾 is the runtimes for the nested for loops (lines
|
| 435 |
+
9-15). For a typical choice of parameters, the number of faces in the target visibility volume mesh squared is greater
|
| 436 |
+
than the total number of configurations returned, | ˆ𝑉|2
|
| 437 |
+
max > 𝑛pts𝑛𝛾𝑛𝜓 and the overall time-complexity is 𝑂(𝑀| ˆ𝑉|2
|
| 438 |
+
max).
|
| 439 |
+
Algorithm 2 3D Edge Sampling
|
| 440 |
+
function: 3DEdgeSampling( ˆ𝑉0:𝑀−1, 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝛾max, 𝛾min)
|
| 441 |
+
input: target visibility volume mesh ˆ𝑉0:𝑀−1, number of points to sample 𝑛pts, number of heading angles 𝑛𝜓, number of
|
| 442 |
+
pitch angles 𝑛𝛾, max pitch angle 𝛾max, min pitch angle 𝛾min
|
| 443 |
+
output: a set of vehicle configurations for each target Q
|
| 444 |
+
1: Q ← ∅
|
| 445 |
+
2: for ˆ𝑉𝑖 ∈ ˆ𝑉0:𝑀−1 do
|
| 446 |
+
3:
|
| 447 |
+
Q𝑖 ← ∅
|
| 448 |
+
4:
|
| 449 |
+
𝑧min ← min( ˆ𝑉 𝑧
|
| 450 |
+
𝑖 )
|
| 451 |
+
5:
|
| 452 |
+
P ← polygonFromMesh(𝑧min, ˆ𝑉𝑖)
|
| 453 |
+
6:
|
| 454 |
+
{𝝀0, . . . , 𝝀𝑛pts−1} ← uniformPerimeterPoints(P, 𝑛pts)
|
| 455 |
+
7:
|
| 456 |
+
for 𝑚 ∈ {0, . . . , 𝑛pts − 1} do
|
| 457 |
+
8:
|
| 458 |
+
𝜓𝑞 ← tangentAngle(𝝀𝑚, P)
|
| 459 |
+
9:
|
| 460 |
+
for 𝑗 ∈ {0, . . . , 𝑛𝜓 − 1} do
|
| 461 |
+
10:
|
| 462 |
+
𝜓 ← 𝜓𝑞 + 𝑗𝜋/max(𝑛𝜓 − 1, 1)
|
| 463 |
+
11:
|
| 464 |
+
for 𝑘 ∈ {0, . . . , 𝑛𝛾 − 1} do
|
| 465 |
+
12:
|
| 466 |
+
𝛾 ← 𝛾min + 𝑘(𝛾max − 𝛾min)/max(𝑛𝛾 − 1, 1)
|
| 467 |
+
13:
|
| 468 |
+
Q𝑖 ← Q𝑖 ∪ (𝝀𝑚, 𝑧min, 𝜓, 𝛾)
|
| 469 |
+
14:
|
| 470 |
+
end for
|
| 471 |
+
15:
|
| 472 |
+
end for
|
| 473 |
+
16:
|
| 474 |
+
end for
|
| 475 |
+
17:
|
| 476 |
+
Q ← Q𝑖 ∪ Q
|
| 477 |
+
18: end for
|
| 478 |
+
3. Global Weighted Face Sampling
|
| 479 |
+
The third proposed sampling strategy is global weighted face sampling. Rather than sampling the visibility volumes
|
| 480 |
+
at the lowest altitude, all target visibility volumes are sampled along a common set of altitude planes and the number of
|
| 481 |
+
samples allocated to each plane is determined by the cross-sectional perimeter distribution of each altitude summed
|
| 482 |
+
across all target visibility volumes. This approach places more samples at altitudes common to all targets that, on
|
| 483 |
+
average, also have large cross-sectional areas. This sampling method is detailed in Algorithm 3 and visualized in Fig. 5d.
|
| 484 |
+
The algorithm takes a set of target visibility meshes ˆ𝑉0:𝑀−1 and returns a set of vehicle configurations Q for each mesh
|
| 485 |
+
given the parameters 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝑛slice, 𝛾max, and 𝛾min where 𝑛slice ≥ 2 is the number of altitude slices to consider. Let
|
| 486 |
+
ˆ𝑉 𝑧
|
| 487 |
+
0:𝑀−1 denote the set of all 𝑧 heights for every vertex contained across the 𝑀 meshes ˆ𝑉0:𝑀−1. First, the global minimum,
|
| 488 |
+
the global maximum altitude, and the slicing altitude step size are found (lines 1-2). Then a vector 𝝁 is initialized
|
| 489 |
+
with zeros, denoted as 0𝑛slice×1 (line 3), and later stores the total perimeter summed across all visibility polygons at the
|
| 490 |
+
corresponding altitude slice. The target visibility volumes are sliced into polygons with fixed altitude (i.e. parallel to
|
| 491 |
+
the 𝑥𝑦 plane) using the polygonFromMesh function, lines 4-9. The lowest 𝑧 plane is the visibility volumes’ global
|
| 492 |
+
minimum 𝑧 height (𝜁min) and the highest 𝑧 plane is the visibility volumes’ global maximum 𝑧 height (𝜁max), line 1. The
|
| 493 |
+
nominal set of altitude planes is then 𝑍 = {𝑧0, . . . , 𝑧𝑛slice−1} where 𝑧0 = 𝜁min, 𝑧𝑛slice−1 = 𝜁max and 𝑧𝑖+1 − 𝑧𝑖 = 𝐿. At each
|
| 494 |
+
plane 𝑧 ∈ 𝑍, polygons are created from the target visibility volume and the polygons’ perimeters are accumulated, line 7.
|
| 495 |
+
The sample points in each 𝑧 plane are then distributed in proportion to the accumulated perimeters, lines 11-29. The
|
| 496 |
+
function iteratePerimeters takes six arguments: the mesh to iterate across, a perimeter distribution, the minimum
|
| 497 |
+
altitude, the maximum altitude, the step size, and the total number of sample points. It returns a variable number of
|
| 498 |
+
𝑛𝑧 ≤ 𝑛slice elements where each element is a pair consisting of a 𝑧𝑟 altitude and the number of points to sample at that
|
| 499 |
+
altitude, 𝑛𝑟. An altitude slice 𝑧𝑟 is either an element of 𝑍 and/or an altitude located at the top or bottom of each visibility
|
| 500 |
+
volume. At each altitude 𝑧𝑟 the corresponding value of 𝝁 is determined (or interpolated, in the special case that 𝑧𝑟 ∉ 𝑍)
|
| 501 |
+
and the 𝑛pts are distributed to each 𝑧𝑟 in proportion to the result. In the event that no slices intersect the visibility mesh
|
| 502 |
+
9
|
| 503 |
+
|
| 504 |
+
then 𝑛𝑧 = 2 and the heights 𝑧𝑟 are returned corresponding to the top and bottom of the target visibility volume. Next,
|
| 505 |
+
samples 𝝀 ∈ {𝝀0, ..., 𝝀𝑛𝑟−1} are placed uniformly around the perimeter of each polygon created by the intersection of
|
| 506 |
+
the 𝑧𝑟 planes and the target visibility volume with the function uniformPerimeterPoints, line 16. The heading and
|
| 507 |
+
pitch angles are sampled in the same way as entry pose sampling [6], pointing tangent or inward with respect to the
|
| 508 |
+
polygon. The angle tangent to each point 𝝀 on the perimeter of the polygon is found with the tangentAngle function.
|
| 509 |
+
The pitch angles are uniformly sampled within the pitch angle constraints. The runtime complexity is dominated by the
|
| 510 |
+
for loops on lines 11-29 which have a worst-case running time complexity of 𝑂(𝑀𝑛slice𝑘), where 𝑘 = | ˆ𝑉|2
|
| 511 |
+
max + 𝑛𝑟𝑛𝛾𝑛𝜓.
|
| 512 |
+
For a typical choice of parameters, the number of faces in the target visibility volume mesh squared is greater than the
|
| 513 |
+
total number of configurations returned, | ˆ𝑉|2
|
| 514 |
+
max > 𝑛𝑟𝑛𝛾𝑛𝜓 and the overall time-complexity is 𝑂(𝑀𝑛slice| ˆ𝑉|2
|
| 515 |
+
max).
|
| 516 |
+
Algorithm 3 Global Weighted Face
|
| 517 |
+
function: GlobalWeightedFace( ˆ𝑉0:𝑀−1, 𝑛pts, 𝑛𝜓, 𝑛𝛾, 𝑛slice, 𝛾max, 𝛾min)
|
| 518 |
+
input: set of triangular meshes ˆ𝑉0:𝑀−1, number of points to sample 𝑛pts, number of heading angles 𝑛𝜓, number of pitch
|
| 519 |
+
angles 𝑛𝛾, number of altitude slices 𝑛slice, max pitch angle 𝛾max, min pitch angle 𝛾min
|
| 520 |
+
output: a set of vehicle configurations for each target Q
|
| 521 |
+
1: 𝜁max ← max( ˆ𝑉 𝑧
|
| 522 |
+
0:𝑀−1), 𝜁min ← min( ˆ𝑉 𝑧
|
| 523 |
+
0:𝑀−1)
|
| 524 |
+
2: 𝐿 ← (𝜁max − 𝜁min)/(𝑛slice − 1)
|
| 525 |
+
3: 𝝁 ← 0𝑛slice×1
|
| 526 |
+
4: for 𝑖 ∈ {0, . . . , 𝑛slice − 1} do
|
| 527 |
+
5:
|
| 528 |
+
for ˆ𝑉𝑖 ∈ ˆ𝑉0:𝑀−1 do
|
| 529 |
+
6:
|
| 530 |
+
P ← polygonFromMesh(𝜁min + 𝐿𝑖, ˆ𝑉𝑖)
|
| 531 |
+
7:
|
| 532 |
+
𝜇𝑖 ← 𝜇𝑖 + perimeter(P)
|
| 533 |
+
8:
|
| 534 |
+
end for
|
| 535 |
+
9: end for
|
| 536 |
+
10: Q ← ∅
|
| 537 |
+
11: for ˆ𝑉𝑖 ∈ ˆ𝑉1:𝑀 do
|
| 538 |
+
12:
|
| 539 |
+
(𝑧𝑟, 𝑛𝑟)𝑛𝑧−1
|
| 540 |
+
𝑟=0
|
| 541 |
+
← iteratePerimeters( ˆ𝑉𝑖, 𝝁, 𝜁min, 𝜁max, 𝐿, 𝑛pts)
|
| 542 |
+
13:
|
| 543 |
+
Q𝑖 ← ∅
|
| 544 |
+
14:
|
| 545 |
+
for 𝑟 ∈ {0, . . . , 𝑛𝑧 − 1} do
|
| 546 |
+
15:
|
| 547 |
+
P ← polygonFromMesh(𝑧𝑟, ˆ𝑉𝑖)
|
| 548 |
+
16:
|
| 549 |
+
{𝝀0, . . . , 𝝀𝑛𝑟−1} ← uniformPerimeterPoints(P, 𝑛𝑟)
|
| 550 |
+
17:
|
| 551 |
+
for 𝑚 ∈ {0, . . . , 𝑛𝑟 − 1} do
|
| 552 |
+
18:
|
| 553 |
+
𝜓𝑞 ← tangentAngle(𝝀𝑚, ˆ𝑉𝑖)
|
| 554 |
+
19:
|
| 555 |
+
for 𝑗 ∈ {0, . . . , 𝑛𝜓 − 1} do
|
| 556 |
+
20:
|
| 557 |
+
for 𝑘 ∈ {0, . . . , 𝑛𝛾 − 1} do
|
| 558 |
+
21:
|
| 559 |
+
𝜓 ← 𝜓𝑞 + 𝑘𝜋/max(𝑛𝜓 − 1, 1)
|
| 560 |
+
22:
|
| 561 |
+
𝛾 ← 𝛾min + 𝑘(𝛾max − 𝛾min)/max(𝑛𝛾 − 1, 1)
|
| 562 |
+
23:
|
| 563 |
+
Q𝑖 ← Q𝑖 ∪ (𝝀𝑚, 𝑧𝑟, 𝜓, 𝛾)
|
| 564 |
+
24:
|
| 565 |
+
end for
|
| 566 |
+
25:
|
| 567 |
+
end for
|
| 568 |
+
26:
|
| 569 |
+
end for
|
| 570 |
+
27:
|
| 571 |
+
end for
|
| 572 |
+
28:
|
| 573 |
+
Q ← Q𝑖 ∪ Q
|
| 574 |
+
29: end for
|
| 575 |
+
B. Proposed Heuristics
|
| 576 |
+
1. Modified Euclidean Distance Traveling Salesperson Problem with Neighborhoods (METSPN)
|
| 577 |
+
A bottleneck in the 3D DTSPN algorithms is the computation of the edge costs that require solving for a 3D
|
| 578 |
+
Dubins path between two configurations 𝒒𝑖 = (𝑥𝑖, 𝑦𝑖, 𝑧𝑖, 𝜓𝑖, 𝛾𝑖) and 𝒒 𝑗 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗, 𝜓 𝑗, 𝛾 𝑗). Since the Dubins path is
|
| 579 |
+
asymmetric the corresponding edge cost must be computed for each direction. Here, we propose an approximation to
|
| 580 |
+
10
|
| 581 |
+
|
| 582 |
+
this edge cost
|
| 583 |
+
ˆ𝐷(𝒒𝑖, 𝒒 𝑗) = max
|
| 584 |
+
�
|
| 585 |
+
|𝛿𝑧|
|
| 586 |
+
sin 𝛾limit
|
| 587 |
+
, ∥𝒔𝑖 − 𝒔 𝑗 ∥2
|
| 588 |
+
�
|
| 589 |
+
,
|
| 590 |
+
(16)
|
| 591 |
+
where 𝛿𝑧 = 𝑧 𝑗 − 𝑧𝑖, 𝛾limit = 𝛾max if 𝛿𝑧 > 0 and 𝛾limit = 𝛾min otherwise, 𝒔𝑖 = (𝑥𝑖, 𝑦𝑖, 𝑧𝑖) and 𝒔 𝑗 = (𝑥 𝑗, 𝑦 𝑗, 𝑧 𝑗). The
|
| 592 |
+
calculation is visualized in Fig. 6. The distance (16) is a lower bound on the actual 3D Dubins path length, i.e.,
|
| 593 |
+
Fig. 6
|
| 594 |
+
Visualization of the modified Euclidean distance. The Euclidean distance shown in blue with a pitch
|
| 595 |
+
angle 𝛾 > 𝛾limit is modified by extending the distance traveled in the 𝑥𝑦 plane resulting in the red line with pitch
|
| 596 |
+
angle 𝛾limit. ˆ𝐷𝑥𝑦 refers to the length of the Dubins path projected onto the 𝑥𝑦 plane.
|
| 597 |
+
ˆ𝐷(𝒒0, 𝒒1) ≤ ���(𝒒0, 𝒒1), and is significantly faster to compute than solving for the Dubins path. Using this edge cost
|
| 598 |
+
leads to a variant of the DTSPN we refer to as the modified Euclidean distance traveling salesperson problem (METSPN).
|
| 599 |
+
Solving the METSPN gives a tour of 3D locations to visit. Once a tour is found for the METSPN it is converted into a
|
| 600 |
+
feasible sequence of Dubins paths by assigning heading and pitch angles as follows.
|
| 601 |
+
2. Bisecting Angle Approximation
|
| 602 |
+
To assign heading and pitch angles a heuristic is adopted that extends the mean angle algorithm developed in [19] to
|
| 603 |
+
three dimensions. The approach is summarized in Algorithm 4. The proposed bisecting angle approximation takes
|
| 604 |
+
as parameters: 𝑽 a 𝑀 × 3 matrix corresponding to the sequence of vertices in the METSPN tour and the problem
|
| 605 |
+
parameters: 𝜌min, 𝛾min, and 𝛾max. The algorithm returns a set of vehicle configurations Q at each point in 𝑽 with
|
| 606 |
+
heading and pitch angles defined as the angle bisector of each consecutive triplet of vertices (for points spaced far apart)
|
| 607 |
+
or as a straight segment (for points spaced close together).
|
| 608 |
+
To obtain the angle bisector at each vertex, calculate vectors from the preceding vertex 𝒖 = 𝑽𝑖 − 𝑽𝑖−1 = (𝑢𝑥, 𝑢𝑦, 𝑢𝑧)
|
| 609 |
+
and to the following vertex 𝒘 = 𝑽𝑖+1 − 𝑽𝑖 = (𝑤𝑥, 𝑤𝑦, 𝑤𝑧) (line 3). The vector 𝒃 = 𝒘 + 𝒖 = (𝑏𝑥, 𝑏𝑦, 𝑏𝑧) determines the
|
| 610 |
+
heading angle 𝜓 in the 𝑥𝑦 plane computed with the four-quadrant arctangent function (line 4). A visualization of the
|
| 611 |
+
calculation can be seen in Fig. 7. The circular indexing of 𝑽, a 𝑀 by 3 matrix, allows for the index −1 to refer to the last
|
| 612 |
+
Fig. 7
|
| 613 |
+
The notation used to determine the bisector vector for a triplet of three points: 𝑽𝑖−1, 𝑽𝑖, 𝑽𝑖+1. The
|
| 614 |
+
orientation of the vectors 𝒖 = 𝑽𝑖 − 𝑽𝑖−1 and 𝒘 = 𝑽𝑖+1 − 𝑽𝑖 are summed and normalized resulting in the vector
|
| 615 |
+
𝒗. The heading angle 𝜓 is the component of 𝒃 in the 𝑥𝑦 plane while the pitch angle 𝛾 is measured from the 𝑥𝑦
|
| 616 |
+
plane.
|
| 617 |
+
column of 𝑽 and the index 𝑛 to refer to the first element of 𝑽. The pitch angle bisector is the angle between the vector 𝒃
|
| 618 |
+
11
|
| 619 |
+
|
| 620 |
+
and the 𝑥𝑦 plane (line 5). The resulting angle is saturated to be within the pitch angle bounds on line 6. If vertices are
|
| 621 |
+
close together then curve-curve-curve (CCC) Dubins paths may be created. This should be avoided because the cost of
|
| 622 |
+
(CCC) Dubins paths is much greater than the Euclidean distance. The likelihood of CCC paths occurring is reduced by
|
| 623 |
+
setting the heading and pitch in the direction of the line between two vertices. If the distance between two vertices is
|
| 624 |
+
small (less than the long path case in [20]), then heading and pitch angles are aligned with the while loop on lines 10-21.
|
| 625 |
+
To align the headings of two configurations, the vector between the internal coordinates is found. The angle of this
|
| 626 |
+
vector, 𝒘, about the 𝑧 axis is used as the heading angle. Then, the angle between the 𝑥𝑦 plane and the vector 𝒘 is found
|
| 627 |
+
and saturated between 𝛾min and 𝛾max to set the pitch angle. Inside the loop, the index is advanced once but it is also
|
| 628 |
+
advanced a second time if the current vertex and the next vertex are within 4𝜌min units of each other (worst case for
|
| 629 |
+
the long path case [20]). The second index advance is required to pass over the next configuration because it was just
|
| 630 |
+
modified.
|
| 631 |
+
Algorithm 4 Bisect Angle Approximation
|
| 632 |
+
function: BisectAngleApprox(𝑽, 𝜌min, 𝛾min, 𝛾max)
|
| 633 |
+
input: 𝑽 is a 𝑛 by 3 matrix of vertices that solve the METSPN, minimum turn radius 𝜌min, minimum pitch angle 𝛾min,
|
| 634 |
+
maximum pitch angle 𝛾max
|
| 635 |
+
output: set of configurations solving a DTSP Q
|
| 636 |
+
1: Q ← ∅
|
| 637 |
+
2: for 𝑖 ∈ {0, 1, 2 . . . 𝑀 − 1} do
|
| 638 |
+
3:
|
| 639 |
+
𝒃 ← 𝑽𝑖+1 + 𝑽𝑖−1// indexing into 𝑽 is circular
|
| 640 |
+
4:
|
| 641 |
+
𝜓 ← atan2(𝑏𝑥, 𝑏𝑦)
|
| 642 |
+
5:
|
| 643 |
+
𝛾 ← atan2(𝑏𝑧,
|
| 644 |
+
√︃
|
| 645 |
+
𝑏2𝑥 + 𝑏2𝑦)
|
| 646 |
+
6:
|
| 647 |
+
𝛾 ← max(min(𝛾, 𝛾max), 𝛾min)
|
| 648 |
+
7:
|
| 649 |
+
Q ← Q ∪ (𝑽𝑖, 𝜓, 𝛾)
|
| 650 |
+
8: end for
|
| 651 |
+
9: 𝑖 ← 0
|
| 652 |
+
10: while 𝑖 < |𝑽| do
|
| 653 |
+
11:
|
| 654 |
+
if ||𝑽𝑖 − 𝑽𝑖+1|| < 4𝜌min then
|
| 655 |
+
12:
|
| 656 |
+
𝒘 ← 𝑽𝑖+1 − 𝑽𝑖
|
| 657 |
+
13:
|
| 658 |
+
𝜓 ← atan2(𝑢𝑥, 𝑢𝑦,)
|
| 659 |
+
14:
|
| 660 |
+
𝛾 ← atan2(𝑢𝑧,
|
| 661 |
+
√︃
|
| 662 |
+
𝑢2𝑥 + 𝑢2𝑦)
|
| 663 |
+
15:
|
| 664 |
+
𝛾 ← max(min(𝛾, 𝛾max), 𝛾min)
|
| 665 |
+
16:
|
| 666 |
+
Q𝑖𝜓 ← 𝜓, Q(𝑖+1) 𝜓 ← 𝜓
|
| 667 |
+
17:
|
| 668 |
+
Q𝑖𝛾 ← 𝛾, Q(𝑖+1)𝛾 ← 𝛾
|
| 669 |
+
18:
|
| 670 |
+
𝑖 ← 𝑖 + 1
|
| 671 |
+
19:
|
| 672 |
+
end if
|
| 673 |
+
20:
|
| 674 |
+
𝑖 ← 𝑖 + 1
|
| 675 |
+
21: end while
|
| 676 |
+
C. Illustrative Examples
|
| 677 |
+
An example of a view planning solution for five targets scattered around a city model of Charlotte, North Carolina
|
| 678 |
+
is shown in Fig. 8a. The example was constructed assuming a Dubins airplane model having a curvature radius of
|
| 679 |
+
𝜌min = 40 m and pitch angle constraints 𝛾 ∈ [−𝜋/12, 𝜋/9]. The random-face algorithm was used with 𝑛pts = 8 samples
|
| 680 |
+
per visibility volume, 𝑛𝜓 = 4 heading angles per sample, and 𝑛𝛾 = 1 pitch angle per sample-heading angle pair. The
|
| 681 |
+
visibility volumes for targets that had no occlusions had a common dome shape, whereas targets located closer to objects
|
| 682 |
+
had more arbitrary shapes. Another example Fig. 8b illustrates the solution for five targets in a model of New York City,
|
| 683 |
+
New York. This example compares the three-dimensional random-face algorithm with 𝑛pts = 32, 𝑛𝜓 = 8, and 𝑛𝛾 = 3
|
| 684 |
+
pitch angles, to the two-dimensional optimized altitude entry pose sampling algorithm with 𝑛pts = 32, 𝑛𝜓 = 8. The
|
| 685 |
+
3D path can change altitude which allowed the algorithm to find a lower cost path of 3920m while the 2D algorithm
|
| 686 |
+
maintained constant altitude and found a path of cost 4285m, a 10.9% reduction in path cost.
|
| 687 |
+
12
|
| 688 |
+
|
| 689 |
+
(a) 3D DTSP with neighborhoods (DTSPN) in Charlotte,
|
| 690 |
+
North Carolina
|
| 691 |
+
(b) 3D DTSP with neighborhoods (DTSPN) in New York
|
| 692 |
+
City, New York
|
| 693 |
+
Fig. 8
|
| 694 |
+
Solutions to the 3D Dubins traveling salesperson problem with neighborhoods. Panel (a) was computed
|
| 695 |
+
using the random face algorithm in light blue with 8 samples per target visibility volume, four heading angles
|
| 696 |
+
per sample, and one pitch angle per sample-heading angle pair. Panel (b) was computed using the random face
|
| 697 |
+
sampling algorithm in dark blue with 𝑛pts = 32 samples per target visibility volume, 𝑛𝜓 = 8 heading angles per
|
| 698 |
+
sample, and 𝑛𝛾 = 3 pitch angles per sample-heading pair; the two-dimensional entry pose sampling from [6] in
|
| 699 |
+
magenta with 𝑛pts = 32 samples per target visibility volume and 𝑛𝜓 = 4 heading angles per sample. The target
|
| 700 |
+
visibility volume is translucent white with black edges and the targets are red spheres. The green spheres are
|
| 701 |
+
the vehicle configurations for the solution to the DTSPN. The environment shown is a section of New York City,
|
| 702 |
+
New York obtained from the OpenStreetMap database. Building heights are indicated by the varying color
|
| 703 |
+
scale from yellow to purple.
|
| 704 |
+
V. Numerical Performance Study
|
| 705 |
+
The 2D algorithms from Sec. III were compared to the 3D algorithms from Sec. IV through a Monte-Carlo
|
| 706 |
+
experiment that randomized target locations and a number of targets located in an urban environment. This section
|
| 707 |
+
describes the implementation of the algorithms, the design of the Monte-Carlo study, and discusses the results.
|
| 708 |
+
A. Implementation
|
| 709 |
+
The algorithms in this work were written in python 3.9 ∗[21] using a number of packages, including Shapely [22]
|
| 710 |
+
for polygonal operations and NumPy [23] for working with matrices. The GLKH traveling salesperson solver [24] was
|
| 711 |
+
used to solve the generalized traveling salesperson problems that arise from DTSPs. The target visibility volumes were
|
| 712 |
+
created with data from OpenStreetMap [25], inverse depth calculations from the target location using OpenGL [15], and
|
| 713 |
+
Blender [26] was used for intersecting the triangular meshes within the feasible airspace 𝐹 as well as decimating the
|
| 714 |
+
meshes (i.e., reducing the number of triangular faces). This work uses [27] to compute 2D Dubins paths for the 2D
|
| 715 |
+
algorithms. The algorithm simulations were performed on an AMD Threadripper 3990X running Ubuntu 20.04 with
|
| 716 |
+
one thread allocated to the algorithm.
|
| 717 |
+
B. Monte-Carlo Experiment
|
| 718 |
+
A Monte-Carlo experiment was designed using the environments described in Table 1. The environments were
|
| 719 |
+
created by capturing all of the buildings in a rectangular area in New York City with the OpenStreetMap database and
|
| 720 |
+
limiting the building heights to 300 m. Target locations were randomized for each trial and determined by sampling
|
| 721 |
+
the environment and placing targets on the ground, the wall of buildings, or the roofs of buildings according to a
|
| 722 |
+
user-defined distribution. The radius of the target visibility volumes was 300 m with each target being at least 600
|
| 723 |
+
m apart. The proposed sampling methods and heuristics are independent and studied here in different combinations.
|
| 724 |
+
The algorithms parameters were varied as follows: the number of samples per visibility volume was varied between
|
| 725 |
+
𝑛pts = {2, 4, 8, 16, 32}, the number of heading angles per sample was 𝑛𝜓 = {2, 4, 8}. To reduce the number of trials,
|
| 726 |
+
only one pitch angle (𝑛𝛾 = 1) of 0◦ was used by passing 0◦ for 𝛾min and 𝛾max to the random face sampling (Sec. IV.A.1),
|
| 727 |
+
3D edge sampling (Sec. IV.A.2), and global weighted face sampling (Sec. IV.A.3) algorithms. The Dubins airplane had
|
| 728 |
+
∗The implementation of this study can be found at https://github.com/robotics-uncc/VisualTour3DDubins.
|
| 729 |
+
13
|
| 730 |
+
|
| 731 |
+
Table 1
|
| 732 |
+
Description of environments obtained from an OpenStreetMap database for New York City, USA, and
|
| 733 |
+
used for the Monte-Carlo experiment.
|
| 734 |
+
Number of Targets
|
| 735 |
+
Number of objects
|
| 736 |
+
Width
|
| 737 |
+
Depth
|
| 738 |
+
5
|
| 739 |
+
5624
|
| 740 |
+
1986 m
|
| 741 |
+
2090 m
|
| 742 |
+
10
|
| 743 |
+
9202
|
| 744 |
+
2809 m
|
| 745 |
+
2857 m
|
| 746 |
+
15
|
| 747 |
+
11584
|
| 748 |
+
3440 m
|
| 749 |
+
3621 m
|
| 750 |
+
20
|
| 751 |
+
12119
|
| 752 |
+
3972 m
|
| 753 |
+
4181 m
|
| 754 |
+
a minimum curvature radius of 𝜌min = 40 m and a pitch angle constrained between -𝜋/12 and 𝜋/9, similar to [10]. A
|
| 755 |
+
total of 80 configurations of targets were generated, divided evenly among groups of 5, 10, 15, and 20 targets. Every
|
| 756 |
+
combination of algorithm parameters was evaluated with the 80 configurations. The normalized tour cost (total length
|
| 757 |
+
of the tour divided by the turn radius) and the computation time were recorded. The algorithms are denoted by acronyms
|
| 758 |
+
wherein the prefix is either 2D-DTSP, 2D-DTSPN, 3D-DTSPN, or 3D-METSPN corresponding to the algorithms of
|
| 759 |
+
Sections III.B, III.C, IV.A, and IV.B.1, respectively. The 2D-DTSP is followed by a dash and an integer representing the
|
| 760 |
+
number of heading angles. The remaining two algorithms are described by a sampling method acronym: entry pose
|
| 761 |
+
sampling (ETRY) from Sec. III.C, random face sampling (RFAC) from Sec. IV.A.1, 3D edge sampling (E3D) from
|
| 762 |
+
Sec. IV.A.2, or global weighted face sampling (GWF) from Sec. IV.A.3 followed by a dash and an integer representing
|
| 763 |
+
the number of heading angles and another dash and an integer representing the number of samples per target visibility
|
| 764 |
+
volume (i.e., 2D-DTSPN-ETRY-4-16 corresponds to a 2D DSTPN using entry pose sampling with 4 heading angles and
|
| 765 |
+
16 sample points per target visibility region).
|
| 766 |
+
1. Analysis of Monte-Carlo Study
|
| 767 |
+
In general, two-dimensional methods at a fixed altitude performed better if the targets are all located at similar
|
| 768 |
+
heights; whereas, 3D methods trended towards better tour cost when targets occupy a wide range of altitudes. The
|
| 769 |
+
median path length, normalized by dividing the cost by the minimum curvature radius, of each view-planning tour (i.e.,
|
| 770 |
+
cost) of the Monte-Carlo runs for an increasing number of targets, the number of heading angles is held at 𝑛𝜓 = 8, and
|
| 771 |
+
the number of pitch angles is held at 𝑛𝛾 = 1 is plotted in Fig. 9. The DTSP algorithms that only visit a single point
|
| 772 |
+
(gray) have one location sample per visibility volume but the lines were extended along the abscissa for comparison.
|
| 773 |
+
The DTSP is inefficient in our problem because shorter paths can be obtained between targets by flying through the
|
| 774 |
+
boundary of their corresponding visibility volumes rather than requiring the paths to pass through the visibility volume
|
| 775 |
+
centers. As the number of heading angles increases the mean cost of the solution decreases, as expected. The METSPN
|
| 776 |
+
algorithms have a similar cost to the eight sampled heading angle solutions. Most of the medians for different algorithms
|
| 777 |
+
approach an asymptote, suggesting that they are converging towards a fixed median tour cost (i.e., further increasing
|
| 778 |
+
the number of samples has diminishing returns). For a large number of samples, the proposed random face sampling
|
| 779 |
+
algorithm yields a lower tour cost than the optimized altitude 2D algorithm. However, the median of the 3D edge
|
| 780 |
+
sampling algorithm is less than the optimal altitude 2D algorithm for all numbers of samples greater than 2. This may
|
| 781 |
+
be due to the 3D algorithms spreading their samples across another dimension (altitude). The 3D algorithms that spread
|
| 782 |
+
the samples along the vertical dimension of each visibility volume perform worse than the algorithm that only samples
|
| 783 |
+
one altitude slice. This suggests that distributing the points in the horizontal plane is more important than distributing
|
| 784 |
+
them in the vertical direction for this particular environment and visibility volume. The sensor model creates visibility
|
| 785 |
+
volumes with the most horizontal variation at the bottom of the shape as seen in Fig. 8; therefore, sampling the visibility
|
| 786 |
+
volumes at the bottom is the best way to produce samples with the greatest horizontal variation.
|
| 787 |
+
To isolate the effects of the different sampling methods, the results are examined for the case where the number
|
| 788 |
+
of samples is held at 𝑛pts = 32, the number of heading angles is held at 𝑛𝜓 = 8, and the number of pitch angles is
|
| 789 |
+
𝑛𝛾 = 1. Box plots of those trials can be seen in Fig. 10. The medians of the 3D methods (black bar in the middle
|
| 790 |
+
of the colored box) are lower than the medians of the 2D methods suggesting that the 3D methods are able to more
|
| 791 |
+
consistently find lower-cost solutions. The difference between medians of 2D and 3D methods grows as the number of
|
| 792 |
+
target visibility volumes increases. The range of solutions for the different methods, denoted by the vertical black bars,
|
| 793 |
+
is large and suggests that the difference between the solutions produced by the 2D and 3D cases is variable and sensitive
|
| 794 |
+
to the environment. The time for each algorithm to execute on a single thread is shown in Fig. 10. It can be seen that
|
| 795 |
+
14
|
| 796 |
+
|
| 797 |
+
2 4
|
| 798 |
+
8
|
| 799 |
+
16
|
| 800 |
+
32
|
| 801 |
+
Samples per Target
|
| 802 |
+
170
|
| 803 |
+
180
|
| 804 |
+
190
|
| 805 |
+
200
|
| 806 |
+
Tour Cost (nondim.)
|
| 807 |
+
5 Targets
|
| 808 |
+
2 4
|
| 809 |
+
8
|
| 810 |
+
16
|
| 811 |
+
32
|
| 812 |
+
Samples per Target
|
| 813 |
+
225
|
| 814 |
+
250
|
| 815 |
+
275
|
| 816 |
+
Tour Cost (nondim.)
|
| 817 |
+
10 Targets
|
| 818 |
+
2 4
|
| 819 |
+
8
|
| 820 |
+
16
|
| 821 |
+
32
|
| 822 |
+
Samples per Target
|
| 823 |
+
270
|
| 824 |
+
300
|
| 825 |
+
330
|
| 826 |
+
360
|
| 827 |
+
Tour Cost (nondim.)
|
| 828 |
+
15 Targets
|
| 829 |
+
2 4
|
| 830 |
+
8
|
| 831 |
+
16
|
| 832 |
+
32
|
| 833 |
+
Samples per Target
|
| 834 |
+
325
|
| 835 |
+
350
|
| 836 |
+
375
|
| 837 |
+
400
|
| 838 |
+
425
|
| 839 |
+
450
|
| 840 |
+
475
|
| 841 |
+
Tour Cost (nondim.)
|
| 842 |
+
20 Targets
|
| 843 |
+
Algorithm
|
| 844 |
+
2D-DTSP
|
| 845 |
+
2D-DTSPN-ETRY
|
| 846 |
+
3D-DTSPN-E3D
|
| 847 |
+
3D-DTSPN-GWF
|
| 848 |
+
3D-DTSPN-RFAC
|
| 849 |
+
3D-METSPN-E3D
|
| 850 |
+
3D-METSPN-GWF
|
| 851 |
+
3D-METSPN-RFAC
|
| 852 |
+
Fig. 9
|
| 853 |
+
The line plots show the median non-dimensional tour cost of the different algorithms as the number of
|
| 854 |
+
samples per target visibility volume increases.
|
| 855 |
+
the algorithms that only consider one point per region have lower execution times than the algorithms that consider
|
| 856 |
+
neighborhoods. The 2D ETRY method has a similar execution time to the 3D DTSPN methods. However, the heuristic
|
| 857 |
+
METSPN algorithm has a lower execution time compared to the other 3D methods because the graph that it creates
|
| 858 |
+
is smaller and less computationally expensive. The results suggest that for a large number of samples the METSPN
|
| 859 |
+
algorithm outperforms the 3D DTSPN algorithms since it produces tours of similar cost but with a computation time
|
| 860 |
+
that is approximately two orders of magnitude lower.
|
| 861 |
+
VI. Conclusion
|
| 862 |
+
This paper studied the view planning problem of using a 3D Dubins airplane model to inspect points of interest in
|
| 863 |
+
an urban environment in minimum time. Triangular meshes were used to compute approximate visibility volumes that
|
| 864 |
+
correspond to locations where an unobstructed view of the target can be obtained while satisfying imaging and altitude
|
| 865 |
+
constraints. The mesh-based approach for computing visibility volumes is flexible and can represent more complex
|
| 866 |
+
geometries than have previously been considered. A range-based sensor model was assumed here, however mesh-based
|
| 867 |
+
view planning can potentially support other sensor models, sensing modalities, and encode sensing performance
|
| 868 |
+
15
|
| 869 |
+
|
| 870 |
+
100
|
| 871 |
+
150
|
| 872 |
+
200
|
| 873 |
+
250
|
| 874 |
+
Tour Cost (nondim.)
|
| 875 |
+
5 Targets
|
| 876 |
+
250
|
| 877 |
+
300
|
| 878 |
+
350
|
| 879 |
+
Tour Cost (nondim.)
|
| 880 |
+
10 Targets
|
| 881 |
+
200
|
| 882 |
+
225
|
| 883 |
+
250
|
| 884 |
+
Tour Cost (nondim.)
|
| 885 |
+
15 Targets
|
| 886 |
+
325
|
| 887 |
+
350
|
| 888 |
+
375
|
| 889 |
+
400
|
| 890 |
+
Tour Cost (nondim.)
|
| 891 |
+
20 Targets
|
| 892 |
+
5
|
| 893 |
+
10
|
| 894 |
+
15
|
| 895 |
+
20
|
| 896 |
+
Number of Targets
|
| 897 |
+
100
|
| 898 |
+
101
|
| 899 |
+
102
|
| 900 |
+
103
|
| 901 |
+
104
|
| 902 |
+
Time (s)
|
| 903 |
+
Algorithm
|
| 904 |
+
2D-DTSP
|
| 905 |
+
2D-DTSPN-ETRY
|
| 906 |
+
3D-DTSPN-E3D
|
| 907 |
+
3D-DTSPN-GWF
|
| 908 |
+
3D-DTSPN-RFAC
|
| 909 |
+
3D-METSPN-E3D
|
| 910 |
+
3D-METSPN-GWF
|
| 911 |
+
3D-METSPN-RFAC
|
| 912 |
+
Fig. 10
|
| 913 |
+
The box plots show the range of cost across all sets of target visibility volumes when the number of
|
| 914 |
+
samples per target visibility is held at 𝑛pts = 32, the number of heading angles is held at 𝑛𝜓 = 8 and the number
|
| 915 |
+
of pitch angles is held at 𝑛𝛾 = 1. The vertical black bars show the upper and lower quartiles of the data while
|
| 916 |
+
the colored sections show the middle quartiles. The black bar in the middle of the box plots is the median of
|
| 917 |
+
the data set. The black diamonds are outliers. The line graph shows the increase in computation time as the
|
| 918 |
+
number of target visibility volumes increases on a log10 scale. The shaded region around each line shows the
|
| 919 |
+
range of computation time.
|
| 920 |
+
characteristics. The 3D Dubins airplane model used in this work can, in some circumstances, produce more efficient
|
| 921 |
+
inspection tours by exploiting altitude changes that are otherwise not possible with constant-altitude Dubins path tours.
|
| 922 |
+
In cases where visibility volumes occupy disjoint altitude segments, the 3D algorithms provide a feasible solution where
|
| 923 |
+
the 2D algorithms are not feasible. However, the pitch angle constraints of a Dubins airplane limit the change in altitude
|
| 924 |
+
over a tour. Altitude changes are accompanied by an increase in path length and thus are only efficient when they greatly
|
| 925 |
+
improve access to the visibility volume.
|
| 926 |
+
This work introduced a heuristic that computes edge costs by replacing the 3D Dubins path computation with a
|
| 927 |
+
simpler lower bound and assigning heading and pitch angles based on the geometric relation of successive points in a
|
| 928 |
+
tour. This strategy provides a similar tour cost to other 3D algorithms that use the exact 3D Dubins path planner for
|
| 929 |
+
edge cost computation but with computation time reduced by two orders of magnitude. Future work may consider the
|
| 930 |
+
view planning problem in the presence of obstacles that must be avoided, with target visibility volumes that overlap,
|
| 931 |
+
and/or with uncertain moving targets to be inspected.
|
| 932 |
+
Acknowledgments
|
| 933 |
+
This work was supported by the William States Lee College of Engineering at the University of North Carolina at
|
| 934 |
+
Charlotte through the Multidisciplinary Team Initiation (MTI) Grant.
|
| 935 |
+
16
|
| 936 |
+
|
| 937 |
+
References
|
| 938 |
+
[1] Chitsaz, H., and LaValle, S. M., “Time-optimal paths for a Dubins airplane,” 46th IEEE Conference on Decision and Control,
|
| 939 |
+
IEEE, 2007, pp. 2379–2384. https://doi.org/10.1109/CDC.2007.4434966.
|
| 940 |
+
[2] Ambrosino, G., Ariola, M., Ciniglio, U., Corraro, F., De Lellis, E., and Pironti, A., “Path generation and tracking in 3-D for UAVs,”
|
| 941 |
+
Transactions on Control Systems Technology, Vol. 17, No. 4, 2009, pp. 980–988. https://doi.org/10.1109/TCST.2009.2014359.
|
| 942 |
+
[3] Ny, J. L., Feron, E., and Frazzoli, E., “On the Dubins traveling salesman problem,” Transactions on Automatic Control, Vol. 57,
|
| 943 |
+
No. 1, 2012, pp. 265–270. https://doi.org/10.1109/TAC.2011.2166311.
|
| 944 |
+
[4] Dubins, L. E., “On curves of minimal length with a constraint on average curvature, and with prescribed initial and terminal
|
| 945 |
+
positions and tangents,” American Journal of Mathematics, Vol. 79, No. 3, 1957, pp. 497–516. https://doi.org/10.2307/2372560.
|
| 946 |
+
[5] Isaacs, J. T., Klein, D. J., and Hespanha, J. P., “Algorithms for the traveling salesman problem with neighborhoods involving a
|
| 947 |
+
Dubins vehicle,” American Control Conference, 2011, pp. 1704–1709. https://doi.org/10.1109/ACC.2011.5991501.
|
| 948 |
+
[6] Obermeyer, K. J., Oberlin, P., and Darbha, S., “Sampling-based path planning for a visual reconnaissance unmanned air vehicle,”
|
| 949 |
+
Journal of Guidance, Control, and Dynamics, Vol. 35, 2012, pp. 619–631. https://doi.org/10.2514/1.48949.
|
| 950 |
+
[7] Faigl, J., and Váňa, P., “Surveillance planning with Bézier curves,” Robotics and Automation Letters, Vol. 3, No. 2, 2018, pp.
|
| 951 |
+
750–757. https://doi.org/10.1109/LRA.2018.2789844.
|
| 952 |
+
[8] Váňa, P., Sláma, J., and Faigl, J., “The Dubins traveling salesman problem with neighborhoods in the three-dimensional space,”
|
| 953 |
+
International Conference on Robotics and Automation, IEEE, 2018, pp. 374–379. https://doi.org/10.1109/ICRA.2018.8460957.
|
| 954 |
+
[9] Owen, M., Beard, R. W., and McLain, T. W., “Implementing Dubins airplane paths on fixed-wing UAVs,” Handbook of
|
| 955 |
+
Unmanned Aerial Vehicles, 2015, pp. 1677–1701. https://doi.org/10.1007/978-90-481-9707-1_120.
|
| 956 |
+
[10] Vana, P., Neto, A. A., Faigl, J., and Macharet, D. G., “Minimal 3D Dubins path with bounded curvature and pitch angle,”
|
| 957 |
+
IEEE International Conference on Robotics and Automation, 2020, pp. 8497–8503. https://doi.org/10.1109/ICRA40945.2020.
|
| 958 |
+
9197084.
|
| 959 |
+
[11] Wang, Y., Wang, S., Tan, M., Zhou, C., and Wei, Q., “Real-time dynamic Dubins-helix method for 3-D trajectory smoothing,”
|
| 960 |
+
Transactions on Control Systems Technology, Vol. 23, 2015, pp. 730–736. https://doi.org/10.1109/TCST.2014.2325904.
|
| 961 |
+
[12] Savla, K., Frazzoli, E., and Bullo, F., “Traveling salesperson problems for the Dubins vehicle,” Transactions on Automatic
|
| 962 |
+
Control, Vol. 53, 2008, pp. 1378–1391. https://doi.org/10.1109/TAC.2008.925814.
|
| 963 |
+
[13] Botsch, M., Kobbelt, L., Pauly, M., Alliez, P., and Lévy, B., Polygon Mesh Processing, AK Peters / CRC Press, 2010.
|
| 964 |
+
https://doi.org/10.1201/b10688.
|
| 965 |
+
[14] Berg, M., Cheong, O., Kreveld, M., and Overmars, M., Binary Space Partitions, Springer Berlin Heidelberg, Berlin, Heidelberg,
|
| 966 |
+
2008, pp. 259–281. https://doi.org/10.1007/978-3-540-77974-2_12.
|
| 967 |
+
[15] Segal, M., and Akeley, K., “The OpenGL graphics system: a specification (version 4.6 (core profile)),” https://www.opengl.org,
|
| 968 |
+
2019.
|
| 969 |
+
[16] Medeiros, A. C., and Urrutia, S., “Discrete optimization methods to determine trajectories for Dubins’ vehicles,” Electronic
|
| 970 |
+
Notes in Discrete Mathematics, Vol. 36, 2010, pp. 17–24. https://doi.org/10.1016/j.endm.2010.05.003.
|
| 971 |
+
[17] Jiantao, P., Yi, L., Guyu, X., Hongbin, Z., Weibin, L., and Uehara, Y., “3D model retrieval based on 2D slice similarity
|
| 972 |
+
measurements,” 2nd International Symposium on 3D Data Processing, Visualization and Transmission, 2004, pp. 95–101.
|
| 973 |
+
https://doi.org/10.1109/TDPVT.2004.1335181.
|
| 974 |
+
[18] Turk, G., Graphics Gems, Academic Press Professional, Inc., USA, 1990, Chap. Generating Random Points in Triangles, p.
|
| 975 |
+
24–28.
|
| 976 |
+
[19] Macharet, D. G., Neto, A. A., Neto, V. F. D. C., and Campos, M. F. M., “Data gathering tour optimization for Dubins’ vehicles,”
|
| 977 |
+
IEEE, 2012, pp. 1–8. https://doi.org/10.1109/CEC.2012.6256477.
|
| 978 |
+
[20] Shkel, A. M., and Lumelsky, V., “Classification of the Dubins set,” Robotics and Autonomous Systems, Vol. 34, 2001, pp.
|
| 979 |
+
179–202. https://doi.org/10.1016/S0921-8890(00)00127-5.
|
| 980 |
+
[21] Python Software Foundation, “Python 3.9,” www.python.org, 2020–.
|
| 981 |
+
17
|
| 982 |
+
|
| 983 |
+
[22] Gillies, S., et al., “Shapely: manipulation and analysis of geometric objects,” https://github.com/shapely/shapely, 2007–.
|
| 984 |
+
[23] Harris, C. R., Millman, K. J., van der Walt, S. J., and et. al., “Array programming with NumPy,” Nature, Vol. 585, 2020, p.
|
| 985 |
+
357–362. https://doi.org/10.1038/s41586-020-2649-2.
|
| 986 |
+
[24] Helsguan, K., “Solving the equality generalized traveling salesman problem using the Lin–Kernighan–Helsgaun algorithm,”
|
| 987 |
+
Mathematical Programming Computation, Vol. 7, 2015, pp. 269–287. https://doi.org/10.1007/s12532-015-0080-8.
|
| 988 |
+
[25] OpenStreetMap contributors, “Planet dump retrieved from "https://planet.osm.org",” https://www.openstreetmap.org, 2017.
|
| 989 |
+
[26] Blender Online Community, “Blender - a 3D modelling and rendering package,” http://www.blender.org, 2018.
|
| 990 |
+
[27] Tang, G., Wang, Z., and Williams, A. L., “On the construction of an optimal feedback control law for the shortest
|
| 991 |
+
path problem for the Dubins car-like robot,” 30th Southeastern Symposium on Systems Theory, 1998, pp. 280–284.
|
| 992 |
+
https://doi.org/10.1109/SSST.1998.660075.
|
| 993 |
+
18
|
| 994 |
+
|
-dE4T4oBgHgl3EQf3w3V/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
-dFJT4oBgHgl3EQfpiwj/content/tmp_files/2301.11600v1.pdf.txt
ADDED
|
@@ -0,0 +1,1821 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Creative beyond TikToks: Investigating Adolescents’ Social
|
| 2 |
+
Privacy Management on TikTok
|
| 3 |
+
Nico Ebert
|
| 4 |
+
nico.ebert@zhaw.ch
|
| 5 |
+
Zurich University of Applied Sciences,
|
| 6 |
+
School of Management and Law
|
| 7 |
+
Winterthur, Zurich, Switzerland
|
| 8 |
+
Tim Geppert
|
| 9 |
+
Zurich University of Applied Sciences,
|
| 10 |
+
School of Management and Law
|
| 11 |
+
Winterthur, Zurich, Switzerland
|
| 12 |
+
Joanna Strycharz
|
| 13 |
+
University of Amsterdam, Faculty of
|
| 14 |
+
Social and Behavioural Sciences
|
| 15 |
+
Amsterdam, North Holland
|
| 16 |
+
Netherlands
|
| 17 |
+
Melanie Knieps
|
| 18 |
+
University of Zurich, Digital Society
|
| 19 |
+
Initiative
|
| 20 |
+
Zurich, Zurich, Switzerland
|
| 21 |
+
Michael Hönig
|
| 22 |
+
Zurich University of Applied Sciences,
|
| 23 |
+
School of Management and Law
|
| 24 |
+
Winterthur, Zurich, Switzerland
|
| 25 |
+
Elke Brucker-Kley
|
| 26 |
+
Zurich University of Applied Sciences,
|
| 27 |
+
School of Management and Law
|
| 28 |
+
Winterthur, Zurich, Switzerland
|
| 29 |
+
ABSTRACT
|
| 30 |
+
TikTok has been criticized for its low privacy standards, but lit-
|
| 31 |
+
tle is known about how its adolescent users protect their privacy.
|
| 32 |
+
Based on interviews with 54 adolescents in Switzerland, this study
|
| 33 |
+
provides a comprehensive understanding of young TikTok users’
|
| 34 |
+
privacy management practices related to the creation of videos.
|
| 35 |
+
The data were explored using the COM-B model, an established
|
| 36 |
+
behavioral analysis framework adapted for sociotechnical privacy
|
| 37 |
+
research. Our overall findings are in line with previous research
|
| 38 |
+
on other social networks: adolescents are aware of privacy related
|
| 39 |
+
to their online social connections (social privacy) and perform
|
| 40 |
+
conscious privacy management. However, we also identified new
|
| 41 |
+
patterns related to the central role of algorithmic recommenda-
|
| 42 |
+
tions potentially relevant for other social networks. Adolescents
|
| 43 |
+
are aware that TikTok’s special algorithm, combined with the app’s
|
| 44 |
+
high prevalence among their peers, could easily put them in the spot-
|
| 45 |
+
light. Some adolescents also reduce TikTok, which was originally
|
| 46 |
+
conceived as a social network, to its extensive audio-visual capabil-
|
| 47 |
+
ities and share TikToks via more private channels (e.g., Snapchat)
|
| 48 |
+
to manage audiences and avoid identification by peers. Young users
|
| 49 |
+
also find other creative ways to protect their privacy such as identi-
|
| 50 |
+
fying stalkers or maintaining multiple user accounts with different
|
| 51 |
+
privacy settings to establish granular audience management. Based
|
| 52 |
+
on our findings, we propose various concrete measures to develop
|
| 53 |
+
interventions that protect the privacy of adolescents on TikTok.
|
| 54 |
+
KEYWORDS
|
| 55 |
+
TikTok, adolescent, video, privacy management, social privacy,
|
| 56 |
+
COM-B, Behavior Change Wheel
|
| 57 |
+
1
|
| 58 |
+
INTRODUCTION
|
| 59 |
+
The global popularity and rapid growth of TikTok are accompanied
|
| 60 |
+
by problems that are the subject of public debate. The platform has
|
| 61 |
+
been criticized for several privacy issues such collecting personal
|
| 62 |
+
This work is licensed under the Creative Commons Attribu-
|
| 63 |
+
tion 4.0 International License. To view a copy of this license
|
| 64 |
+
visit https://creativecommons.org/licenses/by/4.0/ or send a
|
| 65 |
+
letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.
|
| 66 |
+
Proceedings on Privacy Enhancing Technologies 2023(2), 1–15
|
| 67 |
+
© 2023 Copyright held by the owner/author(s).
|
| 68 |
+
https://doi.org/XXXXXXX.XXXXXXX
|
| 69 |
+
data from minors under the age of 13 [29, 33] or transferring U.S.
|
| 70 |
+
minor’s data to China [70]. These issues are especially alarming as
|
| 71 |
+
a large number of platform users are underage [74]. As a result, the
|
| 72 |
+
private space of children such as the bedrooms from which they
|
| 73 |
+
create their videos becomes visible to the world [43]. TikTok has
|
| 74 |
+
reacted to public criticism by introducing several features to better
|
| 75 |
+
protect the privacy of adolescents [75].
|
| 76 |
+
Implicit to the current debate is the apparent consensus that
|
| 77 |
+
adolescents lack the awareness or skill set to consider the possible
|
| 78 |
+
privacy implications of their platform use. In fact, however, little
|
| 79 |
+
evidence is publicly available on how TikTok is used by adolescents
|
| 80 |
+
[63] and how they manage their privacy on the platform [40]. As
|
| 81 |
+
short videos are the platform’s key purpose, this immediately raises
|
| 82 |
+
the question of how younger users protect their privacy when they
|
| 83 |
+
create videos. In this paper, we aim to answer the following re-
|
| 84 |
+
search question: "How and why do adolescents manage their privacy
|
| 85 |
+
when creating videos on TikTok?" We build on the COM-B model for
|
| 86 |
+
behavioral analysis, an established conceptual framework for be-
|
| 87 |
+
havior change widely applied in health communication and beyond
|
| 88 |
+
[62]. This model allows us to explore not only privacy behavior, but
|
| 89 |
+
also related users’ motivations, skills and desires. To explore adoles-
|
| 90 |
+
cents’ privacy management in video creation from the perspective
|
| 91 |
+
of their capabilities, motivations, and opportunities, we conducted
|
| 92 |
+
interviews with 54 adolescent TikTok users in Switzerland, where
|
| 93 |
+
TikTok has gained popularity among young people [6].
|
| 94 |
+
This study contributes to the growing body of research that ad-
|
| 95 |
+
dresses how adolescents manage their privacy on social networks.
|
| 96 |
+
This topic, which is often viewed (and judged) through the moral
|
| 97 |
+
lens of adults, is usually met with a sense of alarm. Empirical evi-
|
| 98 |
+
dence that could serve as a better fact base about adolescents’ online
|
| 99 |
+
privacy behavior is largely based on platforms that cater to a more
|
| 100 |
+
general population (e.g., Facebook, Twitter). However, TikTok is
|
| 101 |
+
not only explicitly geared towards a younger audience [47], but also
|
| 102 |
+
strongly encourages the sharing of short personal videos. Although
|
| 103 |
+
adding text is possible on TikTok, it takes a back seat in favor of
|
| 104 |
+
video content. Given the particularly sensitive nature of one’s image
|
| 105 |
+
and its link to an individual’s personal development [28], TikTok
|
| 106 |
+
strikes us as a particularly relevant but under-researched new use
|
| 107 |
+
case with the potential to enrich the ongoing debate about how –
|
| 108 |
+
if at all – teenagers perceive and manage their privacy [40].
|
| 109 |
+
1
|
| 110 |
+
arXiv:2301.11600v1 [cs.SI] 27 Jan 2023
|
| 111 |
+
|
| 112 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 113 |
+
Ebert et al.
|
| 114 |
+
This study is the first to examine how adolescents between the
|
| 115 |
+
ages of 12 and 18 manage their privacy on TikTok when it comes
|
| 116 |
+
to personal videos. Our findings are based on original data from
|
| 117 |
+
personal interviews and offer unique insights into how privacy
|
| 118 |
+
concerns influence young people’s online behavior. The qualitative
|
| 119 |
+
nature of our study helped us to understand the components that
|
| 120 |
+
shape sharing behavior on TikTok. Ultimately, this allowed us to
|
| 121 |
+
make concrete suggestions on how to effectively promote privacy-
|
| 122 |
+
protective behavior among adolescents on TikTok (e.g., specific
|
| 123 |
+
training, improved app features, and policy enforcement).
|
| 124 |
+
2
|
| 125 |
+
RELATED WORK
|
| 126 |
+
2.1
|
| 127 |
+
TikTok and Privacy Issues
|
| 128 |
+
As with many social media platforms, TikTok has come under
|
| 129 |
+
scrutiny for its handling of personal data. TikTok is a video-focused
|
| 130 |
+
social network originally started as U.S.-based musical.ly but later
|
| 131 |
+
bought by Beijing ByteDance Technology Ltd. The TikTok app
|
| 132 |
+
(available for Android and iOS) allows users to create short videos
|
| 133 |
+
(which may only be a few seconds long) and live streams [42]. Like
|
| 134 |
+
YouTube, TikTok is a manifestation of user-generated media where
|
| 135 |
+
content is not primarily created by a limited number of producers
|
| 136 |
+
but by a myriad of users [44]. Compared to other social networks
|
| 137 |
+
such as Facebook or Instagram, users on TikTok do not need to
|
| 138 |
+
communicate with each other to find a community. They can simply
|
| 139 |
+
visit the “For You” default page to find like-minded users [16, 42, 43,
|
| 140 |
+
87]. Via the primary button at the center of the home screen, users
|
| 141 |
+
can easily record and edit short videos, apply various effects and
|
| 142 |
+
sounds, and reuse content produced by other users. Videos can be
|
| 143 |
+
saved as drafts or published immediately to be viewed by different
|
| 144 |
+
audiences (myself, followers, everybody) [56]. As of September
|
| 145 |
+
2021, 1 billion monthly active users were reported [79], and 740
|
| 146 |
+
million first-time installs were estimated in 2021 [73]. Cloudflare, a
|
| 147 |
+
provider of content delivery networks, ranked TikTok as the most
|
| 148 |
+
popular website of 2021, before Google [68]. TikTok is currently
|
| 149 |
+
also gaining in popularity among users below the official age limit
|
| 150 |
+
of 13 years [19]. In Switzerland, three-quarters of all adolescents
|
| 151 |
+
had a TikTok account in 2020 (behind Instagram and Snapchat with
|
| 152 |
+
both over 90%) [6]. Younger adolescents (12-15 years) were even
|
| 153 |
+
more likely to have a TikTok account than older adolescents (16-19
|
| 154 |
+
years). Slightly more girls (78%) used it than boys (68%). 51% of all
|
| 155 |
+
adolescents stated to use it at least multiple times per week, and 38%
|
| 156 |
+
daily [6]. However, little is known about how young users think
|
| 157 |
+
about the data they share on the platform.
|
| 158 |
+
The app has raised numerous severe security and privacy con-
|
| 159 |
+
cerns (e.g., [5, 23, 24, 46, 84]) and caught the attention of the inter-
|
| 160 |
+
national authorities in the U.S. and EU [29, 69, 70]. For example, an
|
| 161 |
+
analysis of the app revealed extensive aggressive user tracking (e.g.,
|
| 162 |
+
including techniques such as fingerprinting) and data sharing with
|
| 163 |
+
other websites (e.g., sharing searches with Facebook) [24]. The app
|
| 164 |
+
could also potentially collect other personal data from the user’s
|
| 165 |
+
smartphone (e.g., data from the clipboard [23]). Since young people
|
| 166 |
+
have always been an important user group of TikTok, concerns
|
| 167 |
+
have been raised about ByteDance’s handling of their personal
|
| 168 |
+
data. For example, in February 2019 ByteDance was fined USD
|
| 169 |
+
5.7 million by the U.S. Federal Trade Commission (FTC) because
|
| 170 |
+
musical.ly had collected information from minors under the age
|
| 171 |
+
of 13 in violation of the Children’s Online Privacy Protection Act
|
| 172 |
+
[33]. Due to the death of a 10-year-old TikTok user, the Italian data
|
| 173 |
+
protection authority has banned TikTok from processing the data
|
| 174 |
+
of users whose age could not be determined with full certainty [29].
|
| 175 |
+
Also, the transfer of minors’ data to China after the acquisition
|
| 176 |
+
of U.S.-based musical.ly had caused a serious backlash in the US
|
| 177 |
+
and EU [69, 70]. As recent as June 2022, evidence surfaced that
|
| 178 |
+
ByteDance has repeatedly accessed U.S. user data from China –
|
| 179 |
+
a practice that they had denied three years earlier when similar
|
| 180 |
+
criticism was raised [26].
|
| 181 |
+
TikTok has reacted to public criticism with several privacy-
|
| 182 |
+
related updates to the original app. As part of its settlement with
|
| 183 |
+
the FTC, the platform introduced an age-verification process for
|
| 184 |
+
its users based on self-declaration, meaning users can provide a
|
| 185 |
+
false age [48]. Further changes included extended parental control
|
| 186 |
+
features [41] and privacy settings contingent on the app users’ age
|
| 187 |
+
statement [75]. While children below 13 cannot use the app, ado-
|
| 188 |
+
lescents between the ages of 13 and 15 are automatically switched
|
| 189 |
+
to a “private account” as a default option, limiting those who can
|
| 190 |
+
view their videos to approved followers. When 16- and 17-year-old
|
| 191 |
+
users imitate an existing video in the form of a “duet” (split-screen
|
| 192 |
+
video) or “stitch” (video incorporating a short clip of someone else’s
|
| 193 |
+
content), these are automatically restricted to “friends only”. Only
|
| 194 |
+
users who are 18 and older can buy and send virtual gifts. However,
|
| 195 |
+
it is unclear if and how TikTok’s efforts have affected users’ privacy
|
| 196 |
+
management.
|
| 197 |
+
2.2
|
| 198 |
+
Adolescents’ Privacy Management on
|
| 199 |
+
Social Media
|
| 200 |
+
From the moment adolescents started to use online social network-
|
| 201 |
+
ing sites, “online privacy” has been a major topic of discussion [31].
|
| 202 |
+
Informational privacy can be defined as “the claim of individuals,
|
| 203 |
+
groups or institutions to determine for themselves when, how, and
|
| 204 |
+
to what extent information about them is communicated to others”
|
| 205 |
+
[81]. Research on online privacy and adolescents can be divided
|
| 206 |
+
into two categories: “institutional privacy” and "social privacy"
|
| 207 |
+
[67]. Institutional privacy refers to the data collection practices by
|
| 208 |
+
organizations (e.g., for commercial purposes) [67, 85]. The focus of
|
| 209 |
+
this paper is social privacy, i.e., issues related to sharing personal
|
| 210 |
+
information with others (e.g., friends and family). According to the
|
| 211 |
+
theory of "networked privacy," individuals do not have complete
|
| 212 |
+
control over the sharing of their personal information within social
|
| 213 |
+
connections (e.g., on social media) because privacy is not managed
|
| 214 |
+
by individuals alone, but by networks of individuals collectively
|
| 215 |
+
[58].
|
| 216 |
+
Young people are often seen as particularly vulnerable social
|
| 217 |
+
media users with limited capacities to protect their privacy [15, 58].
|
| 218 |
+
At the same time, they are also portrayed as individuals who put
|
| 219 |
+
themselves and others at risk with their naive and reckless social
|
| 220 |
+
media behavior [18]. Following this logic, numerous guides for
|
| 221 |
+
parents emphasize the importance of modifying privacy settings
|
| 222 |
+
and monitoring their children’s behavior (e.g., [37]). However, there
|
| 223 |
+
has also been a pushback to this alarmist perspective by scholars
|
| 224 |
+
who suggest that adolescents’ online privacy should be addressed
|
| 225 |
+
based on empirical research rather than paternal instinct [83].
|
| 226 |
+
2
|
| 227 |
+
|
| 228 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 229 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 230 |
+
Empirical evidence from social networks other than TikTok (e.g.,
|
| 231 |
+
Facebook) suggests that adolescents are aware of their social privacy
|
| 232 |
+
and actively manage their privacy on social media. As described
|
| 233 |
+
by boyd [9], adolescents want to avoid surveillance from parents,
|
| 234 |
+
teachers, friends and other meaningful persons in their lives (that
|
| 235 |
+
is what “online privacy” means to them). Adolescents’ social media
|
| 236 |
+
use seems to generally prompt increased disclosure of personal
|
| 237 |
+
information [72]. However, frequent sharing of content does not
|
| 238 |
+
imply that adolescents share indiscriminately, nor that the content
|
| 239 |
+
is intended for a wider audience [58]. Indeed, adolescents are con-
|
| 240 |
+
cerned about their privacy and capable of protecting it [1, 8, 17, 53].
|
| 241 |
+
Contrary to conventional wisdom, young people are, in fact, more
|
| 242 |
+
likely to protect their privacy on social media than older people
|
| 243 |
+
[8]. Madden et. al found several strategies adolescents use on social
|
| 244 |
+
media to manage their identity and protect sensitive information
|
| 245 |
+
[57]. These strategies include deleting friends, faking names, delet-
|
| 246 |
+
ing content, withholding/faking information, and changing privacy
|
| 247 |
+
settings [20, 35, 64]. They also employed different “zones of privacy”
|
| 248 |
+
by using different channels for disclosing personal information to
|
| 249 |
+
maintain intimacy with friends while protecting their privacy from
|
| 250 |
+
their parents and strangers [50]. Privacy management can also
|
| 251 |
+
mean modifying social media content to shield it from audiences
|
| 252 |
+
[57, 64]. This practice is referred to as “social steganography” or en-
|
| 253 |
+
coding a message for a defined audience [58]. Adolescents’ privacy
|
| 254 |
+
management is influenced by various factors such as their social
|
| 255 |
+
environment (e.g., friends, parents), prior (negative) experiences as
|
| 256 |
+
well as the saliency of privacy settings [53, 86].
|
| 257 |
+
Despite the existing evidence on adolescents’ social media use
|
| 258 |
+
on other social networks, researchers argue that existing findings
|
| 259 |
+
might not be directly applicable to TikTok [63]. Compared to other
|
| 260 |
+
networks such as Facebook or Instagram, TikTok mainly thrives
|
| 261 |
+
on content exploration and (re)-creation [87]. The focus is not on
|
| 262 |
+
the interaction between users and their social network but the
|
| 263 |
+
interaction with users’ videos proposed by an algorithm [7]. The
|
| 264 |
+
main feature, the “For You” page, presents an endless stream of
|
| 265 |
+
personalized, publicly available videos. Seeing them will motivate
|
| 266 |
+
users to react and create similar content (e.g., through features such
|
| 267 |
+
as “duet” or “stitch”). TikTok might therefore pose a particular threat
|
| 268 |
+
to adolescents’ privacy because a space previously conceptualized
|
| 269 |
+
as private and safe can easily become a space of public visibility,
|
| 270 |
+
surveillance, and judgment (such as in the case of a teenager being
|
| 271 |
+
seen to perform a dance routine in their bedroom) [43].
|
| 272 |
+
Only a few studies have investigated adolescents’ privacy man-
|
| 273 |
+
agement on TikTok. There is some evidence that privacy manage-
|
| 274 |
+
ment on TikTok is considered as crucial by adolescents [16] and
|
| 275 |
+
becomes more stringent at higher perceived risks [40]. However,
|
| 276 |
+
it is unclear how and why adolescents manage their privacy on
|
| 277 |
+
TikTok.
|
| 278 |
+
2.3
|
| 279 |
+
COM-B Model
|
| 280 |
+
As we were interested in the components that shape privacy be-
|
| 281 |
+
havior, we chose the COM-B model, which has been used in ex-
|
| 282 |
+
ploratory studies (e.g., [32]) and a series of contexts to change
|
| 283 |
+
behavior (e.g., [3]), as the conceptual framework for our analysis.
|
| 284 |
+
Many behavioral theories have been developed, often with overlap-
|
| 285 |
+
ping but differently named constructs [60] and limited guidance on
|
| 286 |
+
Capability
|
| 287 |
+
Motivation
|
| 288 |
+
Opportunity
|
| 289 |
+
Behavior
|
| 290 |
+
Reflective
|
| 291 |
+
Automatic
|
| 292 |
+
Psychological
|
| 293 |
+
Physical
|
| 294 |
+
Social
|
| 295 |
+
Physical
|
| 296 |
+
Environment
|
| 297 |
+
Individual
|
| 298 |
+
Figure 1: The COM-B model [62]. The three components capa-
|
| 299 |
+
bility (C), opportunity (O) and motivation (M) must be present for a
|
| 300 |
+
behavior (B) to occur. They interact over time and form a dynamic
|
| 301 |
+
system with positive and negative feedback loops [80].
|
| 302 |
+
choosing an appropriate theory for a particular, real-world context
|
| 303 |
+
[62]. As a consequence, theories are often under-used to under-
|
| 304 |
+
stand real-world contexts and to design real-world solutions, which
|
| 305 |
+
makes replication, implementation, evaluation, and improvements
|
| 306 |
+
difficult [25, 62]. Researchers have argued that a comprehensive
|
| 307 |
+
meta-model or “supra-theory” model of behavior – like the COM-B
|
| 308 |
+
model – is needed that is applicable across contexts [25, 62]. As a
|
| 309 |
+
meta-model of behavior, the COM-B model does not come with a
|
| 310 |
+
pre-determined set of context-specific predictions that are common
|
| 311 |
+
for many behavioral theories. COM-B is based on several exist-
|
| 312 |
+
ing social cognition models and has a broader understanding of
|
| 313 |
+
behavior, having "also [...] automatic processing at its heart [like
|
| 314 |
+
emotions and habits], broadening the understanding of behaviour
|
| 315 |
+
beyond the more reflective, systematic cognitive processes that
|
| 316 |
+
have been the focus of much behavioural research [...] (for example,
|
| 317 |
+
social cognition models such as the Theory of Planned Behaviour)"
|
| 318 |
+
[62]. Its comprehensive nature and flexibility made it a good fit
|
| 319 |
+
for the exploratory nature of our study that was not constrained
|
| 320 |
+
by the conceptual boundaries of a single theoretical framework.
|
| 321 |
+
Furthermore, the model comes with hands-on actionable advice on
|
| 322 |
+
appropriate interventions in a given context in form of a holistic
|
| 323 |
+
behavior change framework (“Behavior Change Wheel”) (see [62]).
|
| 324 |
+
As illustrated in Figure 1, the COM-B model is based on three
|
| 325 |
+
components – capability (C), opportunity (O), and motivation (M)
|
| 326 |
+
– that shape a person’s behavior (B) [62]. Firstly, capability is a
|
| 327 |
+
subject’s psychological ability (including necessary comprehension,
|
| 328 |
+
knowledge, and skills) as well as the physical ability (e.g., control
|
| 329 |
+
of the body) to engage in a behavior. Secondly, motivation can
|
| 330 |
+
be defined as the subject’s mental processes that energize and di-
|
| 331 |
+
rect behavior. It includes the reflective motivation that involves
|
| 332 |
+
conscious processes (e.g., goals, plans, and evaluations) as well as
|
| 333 |
+
automatic processes (i.e., habitual, instinctive, drive-related, and
|
| 334 |
+
affective processes). Finally, opportunity is defined as an attribute
|
| 335 |
+
of the environmental system (unlike capability and motivation)
|
| 336 |
+
3
|
| 337 |
+
|
| 338 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 339 |
+
Ebert et al.
|
| 340 |
+
that enables or facilitates a behavior. Opportunities can be physical
|
| 341 |
+
(e.g., technical features of an app, material, financial, and time) and
|
| 342 |
+
social (e.g., norms and culture). In this study, we analyzed the par-
|
| 343 |
+
ticipants’ capabilities, opportunities, and motivation to engage in
|
| 344 |
+
privacy behaviors.
|
| 345 |
+
Firstly, capability is a subject’s psychological ability (including
|
| 346 |
+
necessary comprehension, knowledge, and skills) as well as the
|
| 347 |
+
physical ability (e.g., control of the body) to engage in a behavior.
|
| 348 |
+
Secondly, motivation can be defined as the subject’s mental pro-
|
| 349 |
+
cesses that energize and direct behavior. It includes the reflective
|
| 350 |
+
motivation that involves conscious processes (e.g., goals, plans, and
|
| 351 |
+
evaluations) as well as automatic processes (i.e., habitual, instinctive,
|
| 352 |
+
drive-related, and affective processes). Finally, opportunity is de-
|
| 353 |
+
fined as an attribute of the environmental system (unlike capability
|
| 354 |
+
and motivation) that enables or facilitates a behavior. Opportunities
|
| 355 |
+
can be physical (e.g., technical features of an app, material, financial,
|
| 356 |
+
and time) and social (e.g., norms and culture).
|
| 357 |
+
In our exploratory study, we did not focus on identifying inter-
|
| 358 |
+
actions between COM-B components that explain a specific target
|
| 359 |
+
behavior. Rather, our scope was first to learn about the full range
|
| 360 |
+
of behaviors and explanatory factors associated with adolescents’
|
| 361 |
+
privacy management.
|
| 362 |
+
3
|
| 363 |
+
METHODOLOGY
|
| 364 |
+
3.1
|
| 365 |
+
Research Ethics
|
| 366 |
+
This paper is based on semi-structured, one-to-one interviews with
|
| 367 |
+
adolescents in the Canton of Zurich, Switzerland, conducted in
|
| 368 |
+
November 2021. In total, we visited two secondary schools (one
|
| 369 |
+
in the city of Zurich and one in the greater Zurich area) and three
|
| 370 |
+
youth centers (all in the city of Zurich). All interviews were audio-
|
| 371 |
+
recorded and transcribed verbatim. Ethical approval was obtained
|
| 372 |
+
from our university’s institutional review board. Study participants
|
| 373 |
+
provided written informed consent. For subjects below the age
|
| 374 |
+
of 16, additional consent was sought from the parents. The in-
|
| 375 |
+
terviews were voluntary and conducted at the institutions from
|
| 376 |
+
which the subjects had been recruited. Digital, personalized shop-
|
| 377 |
+
ping vouchers with a value of CHF 20 (~USD 19) were offered to
|
| 378 |
+
study participants as compensation. The amount and type of the
|
| 379 |
+
vouchers was determined beforehand together with the adolescents’
|
| 380 |
+
supervisors (i.e., teachers, social workers) in order to not create an
|
| 381 |
+
inappropriate but still sufficient incentive. After the interviews, in
|
| 382 |
+
agreement with the participants, WhatsApp was used to deliver
|
| 383 |
+
the individualized vouchers to the participants and to allow them
|
| 384 |
+
to review their personal interview transcripts.
|
| 385 |
+
Several steps were taken to protect the participants identity with-
|
| 386 |
+
out compromising the transparency of our research process. To
|
| 387 |
+
begin with, all personally identifiable information was removed
|
| 388 |
+
(e.g., references to persons, locations) and participants’ names were
|
| 389 |
+
replaced with pseudonyms. Furthermore, the study data was stored
|
| 390 |
+
in line with our university’s storage policy and only the involved re-
|
| 391 |
+
searchers had access to the files. Finally, the original audio files were
|
| 392 |
+
deleted from all devices half a year after recording together with
|
| 393 |
+
other remaining personal data (e.g., phone numbers, WhatsApp
|
| 394 |
+
chats, digital vouchers).
|
| 395 |
+
3.2
|
| 396 |
+
Sample and Procedure
|
| 397 |
+
Due to the lack of research on this topic, we chose a highly ex-
|
| 398 |
+
ploratory approach. To identify information-rich cases and make
|
| 399 |
+
optimal use of available resources, we drew a purposive sample
|
| 400 |
+
[27]. We used social media and search engines to find institutions
|
| 401 |
+
in the Canton of Zurich (e.g., secondary schools, youth work, youth
|
| 402 |
+
associations, museums) with contact with adolescents between 12
|
| 403 |
+
and 18 years of age. Afterward, principals of participating insti-
|
| 404 |
+
tutions recruited interested teachers and social workers. They, in
|
| 405 |
+
turn, contacted interested TikTok users in the required age group.
|
| 406 |
+
To extend the participant base, we applied snowballing among the
|
| 407 |
+
interested TikTok users. Based on our primary aim (i.e., to explore
|
| 408 |
+
how adolescent TikTok users manage their privacy), we chose to
|
| 409 |
+
sample based on study participants’ age and gender (equally dis-
|
| 410 |
+
tributed). We decided to ignore other demographic information such
|
| 411 |
+
as ethnic identity. Following a pragmatic definition of theoretical
|
| 412 |
+
saturation [55], no new information emerged after approximately
|
| 413 |
+
40 interviews, and we ended data collection after the 54th interview.
|
| 414 |
+
We chose to employ semi-structured interviews for our study
|
| 415 |
+
because it encourages two-way communication and provides the
|
| 416 |
+
interviewer with the opportunity to learn the reasons behind an
|
| 417 |
+
answer. Some of the questions were part of the interviewer’s guide
|
| 418 |
+
(see Appendix), others were addressed at the moment. The inter-
|
| 419 |
+
view guide was developed based on a previous study that applied
|
| 420 |
+
the COM-B model in a qualitative setting [14] and adopted to the
|
| 421 |
+
context of the current study. After asking for demographic informa-
|
| 422 |
+
tion, we first explored general TikTok usage and motivation. The
|
| 423 |
+
other questions followed the COM-B structure and were related to
|
| 424 |
+
privacy-related behaviors as well as the explanatory components
|
| 425 |
+
related to the target behavior “video creation”. We finished the
|
| 426 |
+
interviews with questions about commercial privacy aspects (i.e.,
|
| 427 |
+
targeted advertising and user tracking). After the interview pro-
|
| 428 |
+
cess was completed, study participants received a copy of their
|
| 429 |
+
interview transcript via WhatsApp and were invited to add infor-
|
| 430 |
+
mation or make amendments. Minimal revisions were made by one
|
| 431 |
+
participant.
|
| 432 |
+
To analyze the content of the interviews, we used a two-step pro-
|
| 433 |
+
cedure that first divided each statement into one of the four COM-B
|
| 434 |
+
components (behavior, capability, opportunity, motivation) before
|
| 435 |
+
further subdividing them into privacy-specific content. For phase
|
| 436 |
+
one, we used a directed content analysis approach [38] to analyze
|
| 437 |
+
the statements. To counter the subjectivity inherent to qualitative
|
| 438 |
+
data analysis, three researchers read and coded all statements into
|
| 439 |
+
the four COM-B domains (behavior, capability, opportunity, motiva-
|
| 440 |
+
tion). On the grounds of economy in both cost and effort, we decided
|
| 441 |
+
against using "intercoder reliability" (ICR). As full replication of
|
| 442 |
+
results was deemed unnecessary due to the exploratory and quali-
|
| 443 |
+
tative nature of data collection and analysis, we instead followed
|
| 444 |
+
guidelines suggesting the use of "multiple coding" which allows
|
| 445 |
+
independent researchers to cross check their coding strategies and
|
| 446 |
+
interpretation of data [2]. The authors engaged in researcher tri-
|
| 447 |
+
angulation [21] by discussing the emerging codes during the open
|
| 448 |
+
coding process of the first three interviews and developed cod-
|
| 449 |
+
ing guidelines. Disagreements were discussed and resolved. Using
|
| 450 |
+
the MAXQDA 2020 software, all responses were coded consistent
|
| 451 |
+
4
|
| 452 |
+
|
| 453 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 454 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 455 |
+
with six COM-B labels1 (behavior, psychological capability, auto-
|
| 456 |
+
matic/reflective motivation, social/physical opportunity). To ensure
|
| 457 |
+
continued adherence to the agreed coding guidelines, the three
|
| 458 |
+
researchers regularly communicated to ensure coding consistency.
|
| 459 |
+
In phase two, all statements – previously labeled as one of the
|
| 460 |
+
COM-B components – were further analyzed for their privacy-
|
| 461 |
+
specific content. Therefore, an inductive thematic analysis [11]
|
| 462 |
+
to identify themes within similarly coded statements was con-
|
| 463 |
+
ducted (see Appendix for coding scheme). One researcher identified
|
| 464 |
+
themes across identically coded statements and discussed them
|
| 465 |
+
with the other researchers. A theme reflects a collection of similar
|
| 466 |
+
responses from at least two different study participants. For exam-
|
| 467 |
+
ple, responses that were coded under the COM-B label “reflective
|
| 468 |
+
motivation” such as “I would be afraid of stupid remarks.”, “I have
|
| 469 |
+
no desire to be bullied.”, and “I can do without being ridiculed in
|
| 470 |
+
my class’s WhatsApp group.” were allocated to the privacy-specific
|
| 471 |
+
theme “negative reaction avoidance”. This step resulted in a list
|
| 472 |
+
of themes within each of the six COM-B labels. Ultimately, the
|
| 473 |
+
researchers reviewed and discussed the emerging themes, merged
|
| 474 |
+
similar themes, and re-labeled others. By playing the “devil’s ad-
|
| 475 |
+
vocate” – a common way to scrutinize identified themes [2] – we
|
| 476 |
+
sought to exploit the full potential of multiple coding to furnish
|
| 477 |
+
alternative interpretations of our findings. The anonymized, coded
|
| 478 |
+
interview transcripts are publicly available at osf.io/z8d3w.
|
| 479 |
+
4
|
| 480 |
+
RESULTS
|
| 481 |
+
A total of 54 adolescents aged between 12-18 years (15 ± 1.82 years)
|
| 482 |
+
were interviewed, of which half (27) were female (see Table 1).
|
| 483 |
+
Interviews ranged from 5 to 21 minutes in length, with a mean of
|
| 484 |
+
12.6 min per interview (SD = 3.91). Most users attended secondary
|
| 485 |
+
school, and 80% had used the app for more than one year. Half
|
| 486 |
+
of the study participants admitted using TikTok between one and
|
| 487 |
+
three hours per day.
|
| 488 |
+
Table 1: Characteristics of one-to-one interview participants
|
| 489 |
+
(n = 54)
|
| 490 |
+
Variables
|
| 491 |
+
% (n)
|
| 492 |
+
Gender (% of females)
|
| 493 |
+
50% (27)
|
| 494 |
+
Age
|
| 495 |
+
15 ± 1.82
|
| 496 |
+
Educational level
|
| 497 |
+
Primary level
|
| 498 |
+
2% (1)
|
| 499 |
+
Lower secondary level
|
| 500 |
+
54% (29)
|
| 501 |
+
Upper secondary level
|
| 502 |
+
44% (24)
|
| 503 |
+
User since
|
| 504 |
+
One year or less
|
| 505 |
+
20% (11)
|
| 506 |
+
Between one and two years
|
| 507 |
+
33% (18)
|
| 508 |
+
More than two years
|
| 509 |
+
46% (25)
|
| 510 |
+
Current app usage
|
| 511 |
+
Daily >= 3h
|
| 512 |
+
17% (9)
|
| 513 |
+
Daily >= 1 and <3h
|
| 514 |
+
50% (27)
|
| 515 |
+
Daily < 1h
|
| 516 |
+
28% (15)
|
| 517 |
+
Less than daily
|
| 518 |
+
6% (3)
|
| 519 |
+
1We did not need to code “physical capability” as the participants did not have physical
|
| 520 |
+
impairments.
|
| 521 |
+
Building on the conceptional framework of the COM-B model,
|
| 522 |
+
we identified 13 themes from the data analysis that described how
|
| 523 |
+
and why adolescents protect their privacy on TikTok (see Table 2).
|
| 524 |
+
These are described in more detail in the following. No weighting
|
| 525 |
+
was associated with the themes in terms of their overall contribu-
|
| 526 |
+
tion.
|
| 527 |
+
4.1
|
| 528 |
+
Behavior
|
| 529 |
+
4.1.1
|
| 530 |
+
Proactive privacy. The participants in our study mentioned
|
| 531 |
+
various ways to control the content of their TikToks2 and their
|
| 532 |
+
audience. Publishing content to audiences was described as reflec-
|
| 533 |
+
tive and non-automatic (as opposed to a habitual, non-reflective
|
| 534 |
+
publication of TikToks). This behavior is also referred to as the “ap-
|
| 535 |
+
proach” privacy strategy [58]. For example, regarding the content,
|
| 536 |
+
study participants described what they consider to be too sensitive
|
| 537 |
+
for publication on TikTok and would not publish (e.g., TikToks that
|
| 538 |
+
reveal too much about them). Lima (F, 14) creates public videos
|
| 539 |
+
and has 50 different accounts. She has clear privacy boundaries
|
| 540 |
+
regarding the video content: “I would not post TikToks where you
|
| 541 |
+
can see a lot of myself. I wouldn’t post videos in which I’m drunk.”.
|
| 542 |
+
Another form of restriction is to define who can see which type of
|
| 543 |
+
content on the platform. This includes TikTok users making drafts
|
| 544 |
+
only visible to themselves or blocking selected users from watching
|
| 545 |
+
videos. Bärbel (F, 13) actively tries to keep her parents from seeing
|
| 546 |
+
her videos: “To prevent my parents from seeing my videos, I can
|
| 547 |
+
simply block them.”.
|
| 548 |
+
We identified two subthemes within the proactive privacy theme:
|
| 549 |
+
private creators (19 persons, 35% of the sample) and public creators
|
| 550 |
+
(11 persons, 20%). Private creators create videos only for themselves
|
| 551 |
+
or close friends but do not publish them for a broad audience. A few
|
| 552 |
+
users described the practice of posting videos that are just visible to
|
| 553 |
+
themselves, only to be able to then repost them on “more private”
|
| 554 |
+
social media such as Snapchat or WhatsApp for a selected group
|
| 555 |
+
of people: “I don’t post my videos. I download them, save them
|
| 556 |
+
under photos, then send them on WhatsApp, for example. I only
|
| 557 |
+
use TikTok for editing.” (Amy, F, 17).
|
| 558 |
+
Public creators regularly create videos for their followers or the
|
| 559 |
+
general public. An extreme case is Joy (F, 13), who has used TikTok
|
| 560 |
+
since she was nine years old (when the app was still musical.ly). She
|
| 561 |
+
maintains 50 thematic user accounts with different age settings and
|
| 562 |
+
distinct followings (e.g., some accounts for gaming-related videos
|
| 563 |
+
and others for YouTube reposts). In addition to managing multiple
|
| 564 |
+
accounts, public creator Lima (F, 14) also uses the live feature. It
|
| 565 |
+
is available to users with at least 1,000 followers and allows them
|
| 566 |
+
to create personal live streams and interact with users in real time.
|
| 567 |
+
Lima had to set her age to 16 years to enable the live feature.
|
| 568 |
+
4.1.2
|
| 569 |
+
Avoidance. Some study participants reported that they do
|
| 570 |
+
not publish videos on TikTok at all to protect their privacy. In the
|
| 571 |
+
literature, this is referred to as the avoidance privacy strategy [58].
|
| 572 |
+
Peter (M, 14), one of 24 study participants (44%) we classified as a
|
| 573 |
+
pure consumer, stated: “I’ve never created a TikTok. I don’t even
|
| 574 |
+
know how to do it.”. Tim (M, 12) published once but decided to
|
| 575 |
+
only watch TikToks afterward: “To try it out, I uploaded something
|
| 576 |
+
2The term “TikToks” is used synonymously with videos.
|
| 577 |
+
5
|
| 578 |
+
|
| 579 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 580 |
+
Ebert et al.
|
| 581 |
+
Table 2: Identified themes for adolescents’ video privacy management on TikTok based on the COM-B model. Frequency is
|
| 582 |
+
calculated across 54 interviews.
|
| 583 |
+
Theme
|
| 584 |
+
Description
|
| 585 |
+
Frequency
|
| 586 |
+
Behavior
|
| 587 |
+
Proactive privacy
|
| 588 |
+
Publishing videos with control over the content and the audience
|
| 589 |
+
30
|
| 590 |
+
Avoidance
|
| 591 |
+
Publishing no videos on the platform
|
| 592 |
+
24
|
| 593 |
+
Capability (Psychological)
|
| 594 |
+
Past privacy incidents
|
| 595 |
+
Previous negative experiences related to privacy on the platform (e.g., lost
|
| 596 |
+
account, accidental publication)
|
| 597 |
+
15
|
| 598 |
+
Privacy literacy
|
| 599 |
+
Knowledge and skills related to privacy management in the app (e.g., audience
|
| 600 |
+
understanding and configuration)
|
| 601 |
+
53
|
| 602 |
+
Opportunity (Social)
|
| 603 |
+
Negative feedback
|
| 604 |
+
Negative behavior of others affects privacy management (e.g., observation of
|
| 605 |
+
cyber-bullying)
|
| 606 |
+
16
|
| 607 |
+
Linkability experience
|
| 608 |
+
Observing that online personas can be linked to the personal sphere affects
|
| 609 |
+
privacy management (e.g., my teacher is on the platform)
|
| 610 |
+
39
|
| 611 |
+
Restrictive influence
|
| 612 |
+
Restrictive behavior of others affects privacy management (e.g., restrictive
|
| 613 |
+
parental mediation)
|
| 614 |
+
34
|
| 615 |
+
Opportunity (Physical)
|
| 616 |
+
Platform features
|
| 617 |
+
Privacy-related features of the platform (e.g., audience settings, sharing via
|
| 618 |
+
other social networks)
|
| 619 |
+
46
|
| 620 |
+
Device features
|
| 621 |
+
Privacy-related features of the device (e.g., screen time limits, deleting videos
|
| 622 |
+
on the smartphone)
|
| 623 |
+
17
|
| 624 |
+
Motivation (Automatic)
|
| 625 |
+
Negative emotion avoidance
|
| 626 |
+
Avoidance of negative emotions expected as a result of publication (e.g., shame,
|
| 627 |
+
fear)
|
| 628 |
+
15
|
| 629 |
+
Motivation (Reflective)
|
| 630 |
+
Negative reaction avoidance
|
| 631 |
+
Goal to avoid expected negative consequences of publication
|
| 632 |
+
10
|
| 633 |
+
Privacy identity
|
| 634 |
+
Privacy as a general value (e.g., also on other platforms)
|
| 635 |
+
5
|
| 636 |
+
Publicity avoidance
|
| 637 |
+
Goal to avoid expected publicity of publication
|
| 638 |
+
29
|
| 639 |
+
once, but nothing from me. I thought that was funny. But I prefer
|
| 640 |
+
to watch videos.”
|
| 641 |
+
4.2
|
| 642 |
+
Capability (Psychological)
|
| 643 |
+
4.2.1
|
| 644 |
+
Past privacy incidents. This theme refers to a specific form
|
| 645 |
+
of privacy-related knowledge (cp. [60]) gained after experiencing
|
| 646 |
+
potential or actual privacy incidents. Potential privacy incidents
|
| 647 |
+
are perceived as minor threats but may lead to increased privacy
|
| 648 |
+
awareness. “I posted my very first video by accident. It was only
|
| 649 |
+
seen by three people,” reported Yasmina (F, 15). Lima (F, 14), a public
|
| 650 |
+
creator, remembered: “I was half asleep and accidentally posted a
|
| 651 |
+
TikTok. The next morning, I saw that someone had commented
|
| 652 |
+
on the video. But I thought it was funny and not bad at all.” When
|
| 653 |
+
TikTok updated its app and increased the size of the “publish” button
|
| 654 |
+
to lower the threshold for publication, Lima decided to block app
|
| 655 |
+
updates.
|
| 656 |
+
Users have also realized that some of TikTok’s privacy features
|
| 657 |
+
can be easily bypassed. Their awareness of the platform’s weak-
|
| 658 |
+
nesses has contributed to a greater privacy awareness. An example
|
| 659 |
+
is a feature that allows blocking certain users from viewing videos,
|
| 660 |
+
which can be easily bypassed: “If I block people but they still want
|
| 661 |
+
to see my TikToks, they immediately make an extra fake account
|
| 662 |
+
and continue seeing them.” Roswitha (F, 15). However, she found
|
| 663 |
+
a way to manage her privacy: “Since these users have too few fol-
|
| 664 |
+
lowers, I simply block them again or ignore them depending on the
|
| 665 |
+
video.”.
|
| 666 |
+
A more serious subtheme are actual privacy incidents. Bärbel (F,
|
| 667 |
+
13) had to realize that she was not anonymizing herself sufficiently:
|
| 668 |
+
“I wore a mask on my face in the video, anonymously, so to speak.
|
| 669 |
+
But the people who deal with me every day recognized me by my
|
| 670 |
+
outfit, my room, and my hairstyle and posted the video in the class
|
| 671 |
+
WhatsApp chat.”. Anna (F, 14) reported losing her account and not
|
| 672 |
+
being able to reclaim it through TikTok’s customer support. At the
|
| 673 |
+
same time, other users were still able to watch her videos: “I made
|
| 674 |
+
videos of myself when I was 9 and then lost the account. Now the
|
| 675 |
+
videos are still public, but I can no longer access them.”.
|
| 676 |
+
4.2.2
|
| 677 |
+
Privacy literacy. Privacy literacy can be defined as a com-
|
| 678 |
+
bination of factual or declarative (’knowing that’) and procedural
|
| 679 |
+
(’knowing how’) knowledge about online privacy [76]. Concern-
|
| 680 |
+
ing the publication of videos on the platform, adolescents need to
|
| 681 |
+
have the knowledge and skills to assess and manage audiences and
|
| 682 |
+
content as needed.
|
| 683 |
+
Respondents mentioned, for example, that the algorithm might
|
| 684 |
+
present a video on TikTok’s center stage: “It depends on how pop-
|
| 685 |
+
ular a video is and only then does it appear on the For You Page.”
|
| 686 |
+
(Bärbel (F, 13)) or that public videos can also be watched without
|
| 687 |
+
6
|
| 688 |
+
|
| 689 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 690 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 691 |
+
having a TikTok account: “From Google or Safari you can type in
|
| 692 |
+
TikTok and view the videos.” (Aron (M, 13)). They also described
|
| 693 |
+
how to find out which of their peers used TikTok: “When you post
|
| 694 |
+
a video, it spreads immediately and then you know who has TikTok
|
| 695 |
+
and who does not. Because so many people have TikTok now, it has
|
| 696 |
+
become weird for me to post TikToks.” (Elsa (F, 14)). Respondents
|
| 697 |
+
also described their audience and content management skills. The
|
| 698 |
+
private creator Bea (F,14) only publishes for a strictly curated list
|
| 699 |
+
of followers and therefore has established an approval process that
|
| 700 |
+
allows her to maintain the desired level of privacy: “I get to know
|
| 701 |
+
new classmates first and only then give them my TikTok account.
|
| 702 |
+
Afterward, they tell me they sent a request and I accept them as
|
| 703 |
+
followers in the app.” (Bea (F, 14)). Furthermore, the adolescents
|
| 704 |
+
interviewed were also able to assess different levels of sensitivity of
|
| 705 |
+
content in terms of their privacy and select an adequate audience
|
| 706 |
+
accordingly: “My buddy and I made 10 TikToks in which we share
|
| 707 |
+
our weekend activities with people. Some have 60,000 views. But
|
| 708 |
+
we think carefully what to make public.” (Alex (M, 18)).
|
| 709 |
+
The adolescents also talked about various app settings needed to
|
| 710 |
+
manage the audience, such as the activation of the private account
|
| 711 |
+
“Switching to the private account takes only two minutes. This is
|
| 712 |
+
not difficult.” (Alexandra (F, 12)) or knowing the publication status
|
| 713 |
+
of a video: “A draft is rendered greyish and blurry. When published,
|
| 714 |
+
it is bright and jumps right out at you.” (Alexander (M, 15)). Some
|
| 715 |
+
adolescents also perform “digital housekeeping” activities by re-
|
| 716 |
+
moving content related to a specific event or as a habit: “As I became
|
| 717 |
+
older, I started to delete old videos.” (Ariane (F, 15)).
|
| 718 |
+
4.3
|
| 719 |
+
Opportunity (Social)
|
| 720 |
+
4.3.1
|
| 721 |
+
Negative feedback. Negative feedback refers to expected or
|
| 722 |
+
observed negative feedback from others (such as harsh comments
|
| 723 |
+
to videos). Study participants reported negative reactions on the
|
| 724 |
+
platform (e.g., from strangers or people from the same school) as
|
| 725 |
+
an explanation for their privacy protection behavior. Alexander (M,
|
| 726 |
+
15) mentioned a general culture of mutual criticism: “Many of the
|
| 727 |
+
famous TikTokers sometimes make mistakes. Afterwards, everyone
|
| 728 |
+
makes fun of them in videos.”. Other respondents mentioned nega-
|
| 729 |
+
tive reactions from their peers that had influenced their behavior:
|
| 730 |
+
“A friend went viral with a video. Then she got yelled at on the
|
| 731 |
+
street. It would annoy me.” (Katja (F, 17)).
|
| 732 |
+
4.3.2
|
| 733 |
+
Linkability experience. Similar to the perception of negative
|
| 734 |
+
feedback, the realization of how easily online personas can be linked
|
| 735 |
+
to the personal sphere can also lead to more restrictive publication
|
| 736 |
+
behavior. Study participants perceived the platform as a public space
|
| 737 |
+
shared by acquaintances and strangers. However, by recognizing
|
| 738 |
+
people from their school on their “For You” page, study participants
|
| 739 |
+
realized that they, too, could be easily recognized. As Georg (M,
|
| 740 |
+
15) put it: “There are maybe ten or twenty people in the school
|
| 741 |
+
building who do [public] TikToks regularly. You suddenly realize: I
|
| 742 |
+
know that guy from TikTok. That’s the reason why I don’t publish.”.
|
| 743 |
+
In addition to peers, respondents also described experiences that
|
| 744 |
+
made them understand that acquainted adults in authority positions
|
| 745 |
+
would be able to see their TikTok as well. Sibylle (F, 15) realized
|
| 746 |
+
this: “My music teacher was on TikTok singing a song.”. Therefore,
|
| 747 |
+
Sibylle also does not publish so as not to be recognized by everyone
|
| 748 |
+
on the platform.
|
| 749 |
+
4.3.3
|
| 750 |
+
Restrictive influence. Restrictive influence refers to others
|
| 751 |
+
(e.g., close friends or parents) perceived to be restrictive or restrict-
|
| 752 |
+
ing study participants’ video creation behavior. Some interviewees
|
| 753 |
+
reported that their friends did not publish on TikTok, which in part
|
| 754 |
+
motivated why they did not publish, either. In mentioning his peers,
|
| 755 |
+
Felix (M, 12) stated: “Most of the people I know don’t upload any-
|
| 756 |
+
thing of themselves where they show their face.”. Another example
|
| 757 |
+
is restrictive mediation by parents or relatives: “My eight-year-old
|
| 758 |
+
cousin accidentally posted a video with my smartphone. His uncle
|
| 759 |
+
saw it on his For You page, so I deleted it.” (Sibylle (F, 15)).
|
| 760 |
+
4.4
|
| 761 |
+
Opportunity (Physical)
|
| 762 |
+
4.4.1
|
| 763 |
+
Platform features. Age verification is a key platform feature
|
| 764 |
+
intended to protect the privacy of young users (not limited to cre-
|
| 765 |
+
ating videos) and the subject of much public discussion. In the
|
| 766 |
+
semi-structured interviews, 29 of the interviewed participants were
|
| 767 |
+
also asked what age they provided. Two-thirds admitted that they
|
| 768 |
+
had given a false age when they registered (indicating, e.g., the age
|
| 769 |
+
of their parents). The main motivation for this behavior was to be
|
| 770 |
+
able to use TikTok in general (for those below the age of 13) or all
|
| 771 |
+
its features. Some study participants, like Martin (M, 14), also had
|
| 772 |
+
misconceptions about possible age restrictions: “Because otherwise,
|
| 773 |
+
TikTok won’t let me watch videos.”.
|
| 774 |
+
However, study participants also described how they used TikTok’s
|
| 775 |
+
features for privacy purposes in general. This includes using a nick-
|
| 776 |
+
name instead of their real name, limiting the use of personal infor-
|
| 777 |
+
mation on their profile page, and not linking their TikTok account
|
| 778 |
+
with other social media accounts (e.g., Instagram). While some in-
|
| 779 |
+
terviewees do not use a name at all: “Why should people know my
|
| 780 |
+
name? I have replaced my name and individual letters with an X.”
|
| 781 |
+
(Ali (M, 12)), others actively involve their parents to make use of
|
| 782 |
+
the in-app parental controls that restrict their app access.
|
| 783 |
+
Study participants also reported using various features related to
|
| 784 |
+
audience configuration, such as creating personal drafts, activating
|
| 785 |
+
a private account, deleting videos, or blocking users. Public creators
|
| 786 |
+
sometimes create multiple “privacy-tailored” user accounts with
|
| 787 |
+
specific follower groups for content of special sensitivity. Where the
|
| 788 |
+
features offered by the platform are perceived as too limited or in-
|
| 789 |
+
effective, the adolescents used creative workarounds not originally
|
| 790 |
+
anticipated by the platform provider. For example, it is not easily
|
| 791 |
+
possible to download and share drafts of videos that are not yet
|
| 792 |
+
published. Amy (F, 17), however, described a popular workaround:
|
| 793 |
+
“I post videos on TikTok, but only for me. Afterward, I’m able to
|
| 794 |
+
download them to share them with my friends on WhatsApp.”
|
| 795 |
+
4.4.2
|
| 796 |
+
Device features. As part of the greater sociotechnical system,
|
| 797 |
+
some devices (e.g., smartphones) offer features that affect user pri-
|
| 798 |
+
vacy. For example, study participants make use of the “digital well-
|
| 799 |
+
being” functionality of their smartphone to limit their screentime:
|
| 800 |
+
“I used TikTok three hours a day because I didn’t know anything
|
| 801 |
+
better to do with myself. Now I’m trying to get a handle on this
|
| 802 |
+
with a screen time limit.” stated Matthias (M, 17). Sandra (F, 14)
|
| 803 |
+
was one of the study participants who used smartphone features to
|
| 804 |
+
share videos more selectively: "You can take a screenshot of drafts
|
| 805 |
+
with an iPhone and then send them via WhatsApp or Snapchat.".
|
| 806 |
+
As mentioned earlier, Lima (F, 14) noticed that the size of the red
|
| 807 |
+
“publish” button grew with each new app update compared to the
|
| 808 |
+
7
|
| 809 |
+
|
| 810 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 811 |
+
Ebert et al.
|
| 812 |
+
grey “save as draft” button. Fearing accidental publication, she by-
|
| 813 |
+
passed this potentially manipulative design pattern (“dark pattern”)
|
| 814 |
+
by using an old version of the app, which her operating system
|
| 815 |
+
allowed her to do: “Therefore, I have blocked the updates for TikTok
|
| 816 |
+
on my cell phone.”.
|
| 817 |
+
4.5
|
| 818 |
+
Motivation (Automatic)
|
| 819 |
+
4.5.1
|
| 820 |
+
Negative emotion avoidance. The interviewees describe vari-
|
| 821 |
+
ous negative emotions if they appeared in a video on TikTok. For
|
| 822 |
+
example, they mentioned feelings of discomfort, shame, awkward-
|
| 823 |
+
ness, and annoyance. Milo (M, 12), who does not publish any videos,
|
| 824 |
+
said: “I would be embarrassed to be seen in a video.” Elsa (F, 14)
|
| 825 |
+
reported that her desire to avoid negative emotions had evolved.
|
| 826 |
+
While she had posted videos on musical.ly, she didn’t publish on
|
| 827 |
+
TikTok anymore: “Posting TikToks has become weird for me.”.
|
| 828 |
+
4.6
|
| 829 |
+
Motivation (Reflective)
|
| 830 |
+
4.6.1
|
| 831 |
+
Negative reaction avoidance. Another reason for not pub-
|
| 832 |
+
lishing personal content was negative reactions by others to their
|
| 833 |
+
videos such as being bullied in class (e.g., in the WhatsApp class
|
| 834 |
+
chat). Alexander (M, 15), who does not publish any videos, com-
|
| 835 |
+
mented: “You make a mistake, people from school see it, it gets sent
|
| 836 |
+
on, and you get bullied.”. Avoidance can also relate to the negative
|
| 837 |
+
long-term consequences of sharing personal content. As they get
|
| 838 |
+
older, adolescents who are getting ready to join the job market real-
|
| 839 |
+
ize that their activity on TikTok could harm their career prospects.
|
| 840 |
+
“The Internet never forgets and if I eventually look for an appren-
|
| 841 |
+
ticeship, it may be that my future employer sees that. That’s very
|
| 842 |
+
bad for my reputation.” (Lima (F, 14)).
|
| 843 |
+
4.6.2
|
| 844 |
+
Privacy identity. With privacy identity, we refer to a coher-
|
| 845 |
+
ent set of privacy-related behaviors and personal qualities of an
|
| 846 |
+
individual in a social setting [60]. Some teenagers consider privacy
|
| 847 |
+
as a value in itself and part of their identity. For example, for Yara
|
| 848 |
+
(F, 14), the publication of videos on TikTok is no different from
|
| 849 |
+
any social network activity: “It’s just not my thing. I don’t post in
|
| 850 |
+
general either, not even on Instagram or anything.”. Lena (F, 17)
|
| 851 |
+
explicitly stated that she considers privacy a significant personal
|
| 852 |
+
value: “Privacy is important to me. I keep everything private that
|
| 853 |
+
can be kept private.”.
|
| 854 |
+
4.6.3
|
| 855 |
+
Publicity avoidance. Another motivation for restricting the
|
| 856 |
+
publication of personal videos on the platform is closely related to
|
| 857 |
+
the linkability experience theme: the desire to not attract public
|
| 858 |
+
attention. Study participants explained that publishing on TikTok
|
| 859 |
+
means being in the public eye: “It’s a big platform, and I don’t
|
| 860 |
+
want people around me to see that I make videos.” (Anna (F,14)).
|
| 861 |
+
While in musical.ly, the public was described as a community of
|
| 862 |
+
people with similar interests and ages, on TikTok, it is perceived
|
| 863 |
+
as a heterogenous, superficial place with different people of all
|
| 864 |
+
ages (including strangers, peers from the same school, teachers,
|
| 865 |
+
extended family members, and parents). Lina (F, 17) described how
|
| 866 |
+
the change in the audience had an impact on her behavior: “At
|
| 867 |
+
musical.ly, there were also strangers, but more my age. But TikTok
|
| 868 |
+
is now worldwide and there are adults everywhere. I don’t have
|
| 869 |
+
to post anything there.”. Her comment shows that the platform is
|
| 870 |
+
now perceived as completely public, whereas it used to be a more
|
| 871 |
+
private community.
|
| 872 |
+
5
|
| 873 |
+
DISCUSSION
|
| 874 |
+
Our general observation of adolescents’ on TikTok is in line with
|
| 875 |
+
previous research on other social networks [1, 8, 17, 53]: Contrary
|
| 876 |
+
to public perception which portrays the publication of TikToks
|
| 877 |
+
by young people as automatic and unreflective, the adolescents in
|
| 878 |
+
our sample actively engaged in privacy management. They demon-
|
| 879 |
+
strated a strong awareness of the need to manage their online
|
| 880 |
+
identity and social privacy on the platform. However, the interview
|
| 881 |
+
participants were more concerned with protecting their privacy
|
| 882 |
+
from their immediate social environment than with institutional or
|
| 883 |
+
commercial privacy issues. That is, while they were generally aware
|
| 884 |
+
that TikTok used algorithms to tailor video content to their partic-
|
| 885 |
+
ular online behavior, they were more worried about the tangible
|
| 886 |
+
aspects of the algorithm: that a published video could immediately
|
| 887 |
+
appear on a classmate’s account.
|
| 888 |
+
Next, we will discuss the results in more detail following the
|
| 889 |
+
structure of the COM-B model. While many of our findings are
|
| 890 |
+
consistent with themes found in previous research on other social
|
| 891 |
+
media platforms (e.g., Facebook), a few themes and aspects are
|
| 892 |
+
indeed unique and – best to our knowledge – have not yet been
|
| 893 |
+
studied by researchers on TikTok or other platforms. The qualitative
|
| 894 |
+
nature of our data inform the design of very concrete interventions
|
| 895 |
+
on TikTok (Section 5.7).
|
| 896 |
+
5.1
|
| 897 |
+
Behavior
|
| 898 |
+
In addition to previous research on other social networks [59],
|
| 899 |
+
we were able to identify two very different types of proactive pri-
|
| 900 |
+
vacy behavior: public and private creation. While public creators
|
| 901 |
+
perform privacy management to share videos directly on TikTok,
|
| 902 |
+
private creators merely use the platform to create and edit videos
|
| 903 |
+
to share them on other social networks that they see more appro-
|
| 904 |
+
priate for such content (e.g., Snapchat, WhatsApp). It indicates that
|
| 905 |
+
adolescents have different "imagined audiences" (mental conceptu-
|
| 906 |
+
alization of the people with whom the user is communicating, [49])
|
| 907 |
+
on each social network and curate who sees what by switching
|
| 908 |
+
between networks. A unique finding of our study is that private
|
| 909 |
+
creators essentially reduce TikTok, which was originally conceived
|
| 910 |
+
as a social network, to its extensive audio-visual capabilities and
|
| 911 |
+
share their personal content where social connections already exist
|
| 912 |
+
and a higher degree of perceived control and intimacy exists (e.g.,
|
| 913 |
+
WhatsApp). It is possible that such a practice might also be found
|
| 914 |
+
elsewhere (e.g., Instagram, YouTube). At a time when adolescents’
|
| 915 |
+
increasingly use multiple social media platforms at once, privacy
|
| 916 |
+
perceptions of and management between different platforms has to
|
| 917 |
+
be addressed more comprehensively. That is, privacy management
|
| 918 |
+
can no longer be seen as a single-platform-phenomenon – an obser-
|
| 919 |
+
vation with important research implications. Rather than focusing
|
| 920 |
+
on isolated social networks with their own privacy standards, re-
|
| 921 |
+
searchers should expand their analysis to include a cross-network
|
| 922 |
+
view of privacy management.
|
| 923 |
+
8
|
| 924 |
+
|
| 925 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 926 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 927 |
+
5.2
|
| 928 |
+
Psychological Capabilities
|
| 929 |
+
Similar to previous studies on other social media platforms [1, 52,
|
| 930 |
+
53], we found that adolescents possess knowledge and skills on how
|
| 931 |
+
to manage their privacy on TikTok (see "privacy literacy" theme).
|
| 932 |
+
That is, adolescents were not only able to assess the audience of
|
| 933 |
+
videos but also to actively manage the audience and content of
|
| 934 |
+
their TikToks. As previously noted [58], privacy management can
|
| 935 |
+
be very creative. This finding also holds true for TikTok: some
|
| 936 |
+
of our respondents reported using various accounts for different
|
| 937 |
+
audiences, blocking app updates to avoid receiving less privacy-
|
| 938 |
+
friendly versions of the app, and making an effort to detect fake
|
| 939 |
+
users trying to follow them. An interesting observation that can
|
| 940 |
+
potentially inform other research on social privacy management
|
| 941 |
+
in social networks is that adolescents on TikTok do not only use
|
| 942 |
+
the technical features provided by the social network itself. Instead,
|
| 943 |
+
some are also capable of using physical opportunities provided the
|
| 944 |
+
device (e.g., blocking app updates, screen time management). This
|
| 945 |
+
example illustrates how the existence of these generic physical
|
| 946 |
+
opportunities provided by the operating system can influence the
|
| 947 |
+
privacy management capability of young TikTok users to learn
|
| 948 |
+
about additional ways to protect their privacy.
|
| 949 |
+
In line with previous research we found that negative past expe-
|
| 950 |
+
riences affect future privacy management behaviors [53]. Incidents
|
| 951 |
+
can even serve as a learning opportunity [82]. In our sample, partici-
|
| 952 |
+
pants experienced near or actual privacy incidents (e.g., accidentally
|
| 953 |
+
publishing videos, loss of account with personal videos) that led
|
| 954 |
+
them to adapt their privacy management (e.g., immediately deleting
|
| 955 |
+
accidentally published videos, paying more attention to a publi-
|
| 956 |
+
cation in the future). While our data support the hypothesis that
|
| 957 |
+
incidents serve as learning opportunities, it must be said that cer-
|
| 958 |
+
tain very extreme violations of privacy (e.g., persistent bullying or
|
| 959 |
+
stalking) have not been reported in our study. It is unclear how such
|
| 960 |
+
experiences affect privacy behavior in the long run. Nonetheless,
|
| 961 |
+
our findings inform future research by showing that even minor pri-
|
| 962 |
+
vacy incidents without severe consequences can lead to improved
|
| 963 |
+
capabilities.
|
| 964 |
+
5.3
|
| 965 |
+
Physical Opportunities
|
| 966 |
+
Adolescents in our sample used various features of TikTok and
|
| 967 |
+
the operating system to manage their privacy (themes platform
|
| 968 |
+
features and device features). At the same time, they were aware
|
| 969 |
+
of TikTok’s privacy management limitations (e.g., the ineffective-
|
| 970 |
+
ness of blocking users). Some of the measures TikTok has taken to
|
| 971 |
+
protect the privacy of younger users in response to public criticism
|
| 972 |
+
may not be very effective. Out of 29 study participants with whom
|
| 973 |
+
we discussed the topic, two-thirds used a false age. Many teenagers
|
| 974 |
+
we interviewed have been publishing on TikTok much before the
|
| 975 |
+
legally allowed age of 13. Regardless of the normative standpoint,
|
| 976 |
+
this calls into question TikTok’s fine-grained, age-based privacy
|
| 977 |
+
features. Despite legislative measures such as the Children’s Online
|
| 978 |
+
Privacy Protection Act of 1998, this problem has been described on
|
| 979 |
+
other social networks in the past [51, 54]. Sometimes also parents
|
| 980 |
+
help their underage children to access social networks [10]. Rea-
|
| 981 |
+
sons for using social networks below the specified minimum age
|
| 982 |
+
are diverse (e.g., wanting to stay in touch with classmates, want-
|
| 983 |
+
ing unrestricted access to TikTok’s features) [10]. Consequently,
|
| 984 |
+
technical measures to protect children such as non-public accounts
|
| 985 |
+
or content restrictions are failing [65]. boyd et. al [10] called for
|
| 986 |
+
abandoning ineffective age-based mechanisms. Instead, she advo-
|
| 987 |
+
cates for an honest discussion about children’s use of social media
|
| 988 |
+
and a rethinking of the industry to better incorporate the needs of
|
| 989 |
+
children and parents when developing apps.
|
| 990 |
+
Another issue on social networking sites is account loss [66].
|
| 991 |
+
This issue was also highlighted by several of our respondents who
|
| 992 |
+
reported that they were unable to reclaim a video they had posted
|
| 993 |
+
after losing an account. As a consequence, they were unable to
|
| 994 |
+
revoke their consent from publishing a childhood experiment that
|
| 995 |
+
would now remain online forever. This is particularly problematic
|
| 996 |
+
against the background of increasingly better algorithms for rec-
|
| 997 |
+
ognizing people in images and videos and the resulting linkability
|
| 998 |
+
risk (e.g., Clearview AI [36]). To exercise the "right to be forgotten"
|
| 999 |
+
as embodied in the EU GDPR, for example, the ability to reclaim
|
| 1000 |
+
accounts and delete old videos is essential. It is unclear whether ac-
|
| 1001 |
+
count loss among adolescents is a broader phenomenon or whether
|
| 1002 |
+
other social networks are affected as well.
|
| 1003 |
+
5.4
|
| 1004 |
+
Social Opportunities
|
| 1005 |
+
Our findings on TikTok support previous research demonstrating
|
| 1006 |
+
that the social environment of teenagers shapes their privacy be-
|
| 1007 |
+
haviors [53]. Other social network users as well as the parents are
|
| 1008 |
+
major agents of socialization [31]. Social norms, which emerge as
|
| 1009 |
+
a response to observed behavior or expected attitudes of friends
|
| 1010 |
+
and parents, influence children’s intention to share personal infor-
|
| 1011 |
+
mation [77]. If friends and parents disapprove of such behavior,
|
| 1012 |
+
children tend to share less. A recent study on TikTok described, that
|
| 1013 |
+
restrictive mediation by parents can also lead to more restrictive
|
| 1014 |
+
disclosure behavior in children [40].
|
| 1015 |
+
In our study, we identified similar social influences on TikTok.
|
| 1016 |
+
Observing strangers being publicly criticized for videos (theme
|
| 1017 |
+
negative feedback) resulted in restrictive publication behavior by
|
| 1018 |
+
the adolescents we interviewed. In line with previous research [77],
|
| 1019 |
+
the restrictive norms and behavior of relatives, parents, and friends
|
| 1020 |
+
were also found to have the potential to affect behavior on TikTok
|
| 1021 |
+
(e.g., not publishing or blocking parents from videos).
|
| 1022 |
+
What makes TikTok stand out from other social networks, is its
|
| 1023 |
+
specific content algorithm based on a granular observation of user
|
| 1024 |
+
preferences [45]. The results of our study indicate that prevalent
|
| 1025 |
+
TikTok usage among peers in combination with the platform’s spe-
|
| 1026 |
+
cific algorithm that immediately displays the published content to
|
| 1027 |
+
cohorts with similar attributes – i.e., peers – may increase the social
|
| 1028 |
+
influence of others on adolescents’ privacy behavior (“linkability
|
| 1029 |
+
experience”). Unlike posting a video under a nickname on YouTube
|
| 1030 |
+
that may never be discovered by peers, adolescents were aware that
|
| 1031 |
+
posting on TikTok was potentially more privacy-invasive. They
|
| 1032 |
+
recognized that their videos could become visible to their personal
|
| 1033 |
+
environment (e.g., in the schoolyard). This experience led to re-
|
| 1034 |
+
stricted publication behavior.
|
| 1035 |
+
5.5
|
| 1036 |
+
Automatic and Reflective Motivations
|
| 1037 |
+
Adolescents’ motivations for protecting their privacy on TikTok
|
| 1038 |
+
were based on either wanting to avoid publicity, to avoid nega-
|
| 1039 |
+
tive reactions/emotions, or to actively achieve privacy (themes
|
| 1040 |
+
9
|
| 1041 |
+
|
| 1042 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 1043 |
+
Ebert et al.
|
| 1044 |
+
negative reaction avoidance, publicity avoidance). The adolescents
|
| 1045 |
+
interviewed reported wanting to evade the public eye and feared
|
| 1046 |
+
negative feedback (e.g., public criticism). These are themes previ-
|
| 1047 |
+
ously described on other social networks [53]. To avoid a negative
|
| 1048 |
+
emotional outcome (e.g., shame), they refrain from having a too
|
| 1049 |
+
public profile (theme negative emotion avoidance) (see [13] for a
|
| 1050 |
+
similar finding).
|
| 1051 |
+
For some adolescents, privacy was a personal matter beyond
|
| 1052 |
+
TikTok (theme privacy identity). That is, these teenagers were in-
|
| 1053 |
+
trinsically motivated to keep their information private - a finding
|
| 1054 |
+
that stands in contrast with previous research on other social net-
|
| 1055 |
+
works. Research suggests that, on average, adolescents have fewer
|
| 1056 |
+
privacy concerns than young adults [4, 22]. However, our findings
|
| 1057 |
+
indicate that these concerns can vary greatly across adolescents,
|
| 1058 |
+
and some may place great value on their privacy on social media.
|
| 1059 |
+
Even though the theme was mentioned by only a few participants,
|
| 1060 |
+
it underscores that adolescents are not a homogeneous group when
|
| 1061 |
+
it comes to motives for managing privacy on social media. For some
|
| 1062 |
+
participants’ being private is a personal value and their goal is to
|
| 1063 |
+
achieve a coherent privacy behavior on TikTok and beyond.
|
| 1064 |
+
5.6
|
| 1065 |
+
Methodological Consideration
|
| 1066 |
+
For our study, the COM-B model helped to holistically understand
|
| 1067 |
+
adolescents’ privacy management on TikTok related to the creation
|
| 1068 |
+
of videos. It has a solid theoretical foundation and – according to its
|
| 1069 |
+
authors – can be applied across various contexts. However, much of
|
| 1070 |
+
the research to date has applied the COM-B model to health-related
|
| 1071 |
+
behaviors such as smoking cessation and lowering cardiovascular
|
| 1072 |
+
disease risk [60]. Our study, which showed that the COM-B model is
|
| 1073 |
+
also a suitable analytical framework for studying privacy behavior,
|
| 1074 |
+
provides yet another use case. By demonstrating its relevance to
|
| 1075 |
+
the privacy management of adolescents, we strengthen the model’s
|
| 1076 |
+
extrinsic validity.
|
| 1077 |
+
5.7
|
| 1078 |
+
Possible Approaches for Privacy
|
| 1079 |
+
Interventions
|
| 1080 |
+
Several of the themes we identified can be used as starting points
|
| 1081 |
+
for the development of privacy interventions. The COM-B model is
|
| 1082 |
+
part of a theory-driven intervention development framework called
|
| 1083 |
+
behavior change wheel (BCW), a synthesis of behavior change
|
| 1084 |
+
frameworks [62]. In the logic of the BCW, interventions are di-
|
| 1085 |
+
rected at desired “target behaviors” (e.g., enabling privacy settings).
|
| 1086 |
+
Building on the interview findings and our observations, Figure 2
|
| 1087 |
+
shows different parties and ideas for potential target behaviors af-
|
| 1088 |
+
fecting adolescents’ video privacy management. It focuses on which
|
| 1089 |
+
behaviors to address and does not answer the question of how to
|
| 1090 |
+
design interventions that address these behaviors (e.g., adequate
|
| 1091 |
+
behavior change techniques [61]).
|
| 1092 |
+
Any intervention schemes to improve the privacy of adoles-
|
| 1093 |
+
cent TikTok users should focus on the behavior of the adolescents
|
| 1094 |
+
themselves. The interviews provide concrete suggestions for be-
|
| 1095 |
+
haviors that adolescents already report that improve their privacy
|
| 1096 |
+
protection. This includes encouraging young users to remove in-
|
| 1097 |
+
appropriate videos from the platform and the use of alternative
|
| 1098 |
+
social media apps (e.g., WhatsApp) to share content (theme: proac-
|
| 1099 |
+
tive privacy). Some of our participants reported regular checks if a
|
| 1100 |
+
video with the status “published” should be set to private. They also
|
| 1101 |
+
removed their old TikToks from the app and their smartphone. Our
|
| 1102 |
+
private creators did seldom publish on TikTok but used alternative
|
| 1103 |
+
apps such as Snapchat or WhatsApp with a perceived higher level
|
| 1104 |
+
of privacy and the ability to automatically delete shared TikToks
|
| 1105 |
+
after being watched by their friends. Another possible target behav-
|
| 1106 |
+
ior derived from our observations is “backing up user credentials”
|
| 1107 |
+
(theme: privacy literacy). Some adolescents in our sample who had
|
| 1108 |
+
already created accounts in musical.ly could not delete published
|
| 1109 |
+
videos because they had forgotten their credentials, and were not
|
| 1110 |
+
able to prove their identity to the TikTok support to retrieve their
|
| 1111 |
+
account. An intervention could mitigate account loss, especially
|
| 1112 |
+
in cases where children have multiple accounts. Finally, teenagers
|
| 1113 |
+
should be made aware of the privacy settings (e.g., the private ac-
|
| 1114 |
+
count) and the potential risks of not correctly setting these (theme:
|
| 1115 |
+
reflective motivation). For example, in our interviews, participants
|
| 1116 |
+
accidentally published a TikTok upon their first usage of the app
|
| 1117 |
+
because they were not aware others would immediately see it.
|
| 1118 |
+
The platform must also play an important role in safeguarding
|
| 1119 |
+
the privacy of children and adolescents. Improving features directly
|
| 1120 |
+
related to privacy such as improved age verification, more effec-
|
| 1121 |
+
tive blocking of users, and facilitating access to lost user accounts
|
| 1122 |
+
are promising approaches (theme: platform features). As described
|
| 1123 |
+
earlier, many adolescents in our sample did not use their real age
|
| 1124 |
+
due to various reasons. For example, they were often unaware that
|
| 1125 |
+
the private account would have been activated by default if they
|
| 1126 |
+
had provided their real age. As a result of providing false infor-
|
| 1127 |
+
mation, the privacy settings were much more lenient and TikTok
|
| 1128 |
+
videos would not only be published to followers but to everybody.
|
| 1129 |
+
Following boyd et. al’s [10] philosophy, one possibility would be
|
| 1130 |
+
to abandon TikTok’s age-based mechanism and incorporate the
|
| 1131 |
+
needs of children and parents when developing the app. For TikTok,
|
| 1132 |
+
this could mean taking a certain level of responsibility for its con-
|
| 1133 |
+
tent and giving kids and parents ways to control what videos are
|
| 1134 |
+
shown (e.g., via a content configuration or a separate app similar
|
| 1135 |
+
to YouTube Kids). Even if the app adhered to the age-based privacy
|
| 1136 |
+
concept, describing the consequences of providing real age (e.g.,
|
| 1137 |
+
better privacy protection) might encourage some youth to provide
|
| 1138 |
+
their real age. Another approach has been lately launched by the
|
| 1139 |
+
twin app Douyin [30]. Douyin introduced an age verification that
|
| 1140 |
+
is not based on self-declaration only but requires – unlike the in-
|
| 1141 |
+
ternational counterpart TikTok - user authentication and imposes
|
| 1142 |
+
restrictions on the permitted daily use for users under 14.
|
| 1143 |
+
Some participants also criticized that they could not effectively
|
| 1144 |
+
block users who they wanted to prevent from seeing their videos.
|
| 1145 |
+
The problem persists because blocked users can immediately "respawn"
|
| 1146 |
+
under a different username. TikTok could prevent this issue with
|
| 1147 |
+
a feature that block all accounts of the same user (similar to Insta-
|
| 1148 |
+
gram [39]). Some study participants also reported feeling “nudged”
|
| 1149 |
+
by the user interface design towards publishing TikTok video for a
|
| 1150 |
+
broad audience. Others described publishing personal TikToks acci-
|
| 1151 |
+
dentally. While nudging teenagers towards better privacy behavior
|
| 1152 |
+
is also controversial [78], presenting them with simple alternatives
|
| 1153 |
+
(such as publishing a TikTok vs saving a local draft) could provide a
|
| 1154 |
+
welcome middle ground. Furthermore, TikTok might also do more
|
| 1155 |
+
to educate its users on how to protect their privacy. This suggestion
|
| 1156 |
+
10
|
| 1157 |
+
|
| 1158 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 1159 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 1160 |
+
TikTok
|
| 1161 |
+
Users
|
| 1162 |
+
Family &
|
| 1163 |
+
Friends
|
| 1164 |
+
Schools
|
| 1165 |
+
& Youth
|
| 1166 |
+
Work
|
| 1167 |
+
Policy-
|
| 1168 |
+
Makers &
|
| 1169 |
+
Privacy
|
| 1170 |
+
Advocates
|
| 1171 |
+
Other
|
| 1172 |
+
Platform
|
| 1173 |
+
Users
|
| 1174 |
+
OS
|
| 1175 |
+
Vendors &
|
| 1176 |
+
Other Apps
|
| 1177 |
+
ByteDance
|
| 1178 |
+
(TikTok
|
| 1179 |
+
Creator)
|
| 1180 |
+
Enable
|
| 1181 |
+
privacy
|
| 1182 |
+
settings
|
| 1183 |
+
Share/remove
|
| 1184 |
+
personal content
|
| 1185 |
+
consciously
|
| 1186 |
+
Backup
|
| 1187 |
+
account
|
| 1188 |
+
credentials
|
| 1189 |
+
Share TikToks
|
| 1190 |
+
using other apps
|
| 1191 |
+
(e.g., Whatsapp)
|
| 1192 |
+
Inform each other
|
| 1193 |
+
about privacy
|
| 1194 |
+
possiblities
|
| 1195 |
+
Do not nudge
|
| 1196 |
+
users towards
|
| 1197 |
+
publication
|
| 1198 |
+
Educate children about long-
|
| 1199 |
+
term privacy risks
|
| 1200 |
+
Improve privacy
|
| 1201 |
+
features (e.g.,
|
| 1202 |
+
reclaiming ‘lost’
|
| 1203 |
+
accounts, age
|
| 1204 |
+
verification)
|
| 1205 |
+
Use TikTok yourself to
|
| 1206 |
+
understand privacy
|
| 1207 |
+
issues
|
| 1208 |
+
Educate students early
|
| 1209 |
+
about longterm
|
| 1210 |
+
privacy risks
|
| 1211 |
+
Support childrens’
|
| 1212 |
+
privacy efforts
|
| 1213 |
+
Provide privacy
|
| 1214 |
+
tutorials
|
| 1215 |
+
Create & enforce
|
| 1216 |
+
privacy laws
|
| 1217 |
+
(e.g., transparency
|
| 1218 |
+
about PII usage,
|
| 1219 |
+
age verification)
|
| 1220 |
+
Housekeeping
|
| 1221 |
+
functionality for
|
| 1222 |
+
TikTok
|
| 1223 |
+
Enforce app
|
| 1224 |
+
privacy in OS
|
| 1225 |
+
Explain business
|
| 1226 |
+
model of TikTok
|
| 1227 |
+
Use TikTok yourself to
|
| 1228 |
+
understand privacy
|
| 1229 |
+
issues
|
| 1230 |
+
Explain business
|
| 1231 |
+
model of TikTok
|
| 1232 |
+
Respect the privacy
|
| 1233 |
+
of others
|
| 1234 |
+
(e.g., norms)
|
| 1235 |
+
Figure 2: Different parties and their potential target behaviors relevant for adolescents’ video privacy management on TikTok
|
| 1236 |
+
is based on our observation that capabilities varied between adoles-
|
| 1237 |
+
cents and TikTok users had begun to create such privacy tutorials.
|
| 1238 |
+
The latter indicates a demand for more support (e.g., via privacy
|
| 1239 |
+
tutorials provided by TikTok).
|
| 1240 |
+
Family, friends, schools, and youth workers can also positively in-
|
| 1241 |
+
fluence the privacy management of adolescents (social opportunity
|
| 1242 |
+
themes). In addition to supporting adolescents’ privacy efforts, their
|
| 1243 |
+
social network could use TikTok themselves to better understand
|
| 1244 |
+
specific privacy issues. In our sample, an uncle of an eight-year-old
|
| 1245 |
+
boy used TikTok himself and warned him about the possibility on
|
| 1246 |
+
TikTok of publishing a video by accident. The social environment
|
| 1247 |
+
can also advise about long-term privacy risks to the children and
|
| 1248 |
+
adolescents of which they might not yet be aware. Among a group
|
| 1249 |
+
of adolescents of the same class, we repeatedly heard the narrative
|
| 1250 |
+
of a classmate being recognized on TikTok despite her wearing
|
| 1251 |
+
a mask. Due to this “risk narrative” the whole class was aware
|
| 1252 |
+
of the potential risks of insufficient anonymization on TikTok. A
|
| 1253 |
+
collection of such tales could be used by teachers in the classroom
|
| 1254 |
+
to illustrate the privacy risk associated with the platform.
|
| 1255 |
+
As users do not only interact with each other when they share
|
| 1256 |
+
videos but also with the platform and its owner company, teenagers
|
| 1257 |
+
should also be made aware of commercial privacy issues. Our data
|
| 1258 |
+
confirmed that adolescents’ primary privacy focus was indeed so-
|
| 1259 |
+
cial. To this end, adolescents would need to understand TikTok’s
|
| 1260 |
+
business model, which heavily relies on their personal data, and
|
| 1261 |
+
the organization behind TikTok.
|
| 1262 |
+
Policymakers and privacy advocates are also relevant actors. Not
|
| 1263 |
+
only do they seek to create privacy laws to protect users but also to
|
| 1264 |
+
enforce these laws through, for example, insisting on effective age
|
| 1265 |
+
verification (theme: platform features). Ideally, these actions are
|
| 1266 |
+
guided by evidence in collaboration with researchers, adolescent
|
| 1267 |
+
users, and parents. For example, our findings indicate that ado-
|
| 1268 |
+
lescents did not know that TikTok had taken additional measures
|
| 1269 |
+
to protect them in 2021 [75]. While privacy legislation demands
|
| 1270 |
+
transparency for data subjects – especially for children – this ex-
|
| 1271 |
+
ample shows that there is room for improvement in terms of the
|
| 1272 |
+
implementation of laws.
|
| 1273 |
+
It should also be mentioned that other TikTok users can influence
|
| 1274 |
+
an adolescent’s privacy behavior (social opportunity themes). Older
|
| 1275 |
+
and more experienced teenagers may have capabilities (e.g., based
|
| 1276 |
+
on their negative experiences) that can benefit younger and less
|
| 1277 |
+
experienced users. One of our participants reported having learned
|
| 1278 |
+
about privacy settings from a video on TikTok. Indeed, some more
|
| 1279 |
+
experienced users have already begun to acts as mentors. This
|
| 1280 |
+
includes the user @seansvv with 1.1 million followers, who stated
|
| 1281 |
+
in his biography “I Read ToS [Terms of Service] So That You Don’t
|
| 1282 |
+
Have To” and regularly posts TikTok videos related to privacy topics
|
| 1283 |
+
[71].
|
| 1284 |
+
Finally, our interviews showed that OS vendors and the vendors
|
| 1285 |
+
of other apps contribute to teenagers’ privacy on TikTok (theme:
|
| 1286 |
+
device features). OS vendors have implemented more and more
|
| 1287 |
+
privacy control mechanisms for their end-users (e.g., granular rights
|
| 1288 |
+
management, location sharing notifications). These methods all
|
| 1289 |
+
work on low-level personal data (e.g., IP address, location, and
|
| 1290 |
+
email address). However, videos shared by adolescents on TikTok
|
| 1291 |
+
that possibly contain more sensitive personal data with higher risks
|
| 1292 |
+
involved are not yet covered by these mechanisms. At times when a
|
| 1293 |
+
user publishes a video accidentally, the OS could warn them in the
|
| 1294 |
+
same way that they are warned when sharing their location with
|
| 1295 |
+
the app. In our sample, participants reported also manually cleaning
|
| 1296 |
+
11
|
| 1297 |
+
|
| 1298 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 1299 |
+
Ebert et al.
|
| 1300 |
+
up their TikToks in the app and on their phones. OS vendors could
|
| 1301 |
+
provide housekeeping functionalities that would simplify removing
|
| 1302 |
+
personal content across different social networks and on the phone.
|
| 1303 |
+
5.8
|
| 1304 |
+
Limitations and Future Research
|
| 1305 |
+
As with most qualitative research, our sample is small and was not
|
| 1306 |
+
drawn randomly. Therefore, we cannot claim that the results are
|
| 1307 |
+
representative of all young people in the region under consideration,
|
| 1308 |
+
and certainly not of Switzerland as a whole. Further validation
|
| 1309 |
+
with different samples is needed to strengthen the findings (e.g.,
|
| 1310 |
+
including subjects’ socioeconomic status).
|
| 1311 |
+
Choosing interviews as our data collection methodology was use-
|
| 1312 |
+
ful to learn more about the perspectives of adolescents in Switzer-
|
| 1313 |
+
land. Nevertheless, we are aware of the limitations associated with
|
| 1314 |
+
this method. Primarily, we relied on self-reporting rather than be-
|
| 1315 |
+
havioral observations. Self-reports can be biased due to various
|
| 1316 |
+
influences, such as subjects’ desire to portray themselves in a posi-
|
| 1317 |
+
tive light. Future studies might want to gather data from a wider
|
| 1318 |
+
range of sources, such as direct observations of privacy manage-
|
| 1319 |
+
ment behavior (e.g., through TikTok data donations).
|
| 1320 |
+
Based on our findings, future research could develop and system-
|
| 1321 |
+
atically test privacy interventions based on the BCW methodology.
|
| 1322 |
+
A necessary first step would be to identify appropriate target be-
|
| 1323 |
+
haviors with the greatest potential to improve privacy management
|
| 1324 |
+
among adolescents. Our research could be a starting point for select
|
| 1325 |
+
a “promising” target behavior reported by the adolescents (e.g., ac-
|
| 1326 |
+
tivating the private account) to address in a target population (e.g.,
|
| 1327 |
+
pupils of a local school). To identify a baseline for each of the poten-
|
| 1328 |
+
tial behaviors and to select a target behavior among them, further
|
| 1329 |
+
research would be necessary (e.g., in form of a survey among pupils).
|
| 1330 |
+
Furthermore, additional research is required to select appropriate
|
| 1331 |
+
behavior change techniques (e.g., increasing awareness for privacy
|
| 1332 |
+
settings) and evaluate their effectiveness (e.g., with an experiment).
|
| 1333 |
+
Importantly, such research could also control for factors such as
|
| 1334 |
+
socioeconomic status might also be relevant to explain privacy-
|
| 1335 |
+
related behaviors on TikTok [34]. Given that teenagers may have
|
| 1336 |
+
very heterogeneous privacy management capabilities, motivations,
|
| 1337 |
+
and opportunities, depending on their age and experience regarding
|
| 1338 |
+
the platform, interventions need to be tailored to the specific target
|
| 1339 |
+
group. Large-scale intervention studies using the BCW can help to
|
| 1340 |
+
identify effective and evidence-based policies to improve privacy
|
| 1341 |
+
management among young people on social media platforms like
|
| 1342 |
+
TikTok.
|
| 1343 |
+
Our interviews focused on social aspects of adolescents’ privacy
|
| 1344 |
+
management. That is, our interviewees were more concerned with
|
| 1345 |
+
protecting their privacy from their social environment than from
|
| 1346 |
+
the corporations dealing with their data for commercial purposes;
|
| 1347 |
+
see [53]. Yet, TikTok videos are not only shared with other users
|
| 1348 |
+
but also with ByteDance. Even the users we identified as pure
|
| 1349 |
+
consumers who only view but not create content may have privacy
|
| 1350 |
+
issues. As the video and ad algorithms are known for their high
|
| 1351 |
+
level of customization, they make the platform heavily reliant on
|
| 1352 |
+
personal data including detailed user behavior [45]. Both users’
|
| 1353 |
+
active and passive behavior on the app has consequences: The
|
| 1354 |
+
TikTok pixel allows companies to engage in detailed web tracking
|
| 1355 |
+
of TikTok users on websites (e.g., a user who sees the ad on TikTok
|
| 1356 |
+
might buy the product in the online shop) [12]. Further research
|
| 1357 |
+
could investigate if adolescent users are aware of these commercial
|
| 1358 |
+
privacy aspects and how they manage them.
|
| 1359 |
+
ACKNOWLEDGMENTS
|
| 1360 |
+
The research reported in this article was funded by the Digital
|
| 1361 |
+
Future Fund (DFF), which is part of the Digitalization Initiative of
|
| 1362 |
+
the Zurich Higher Education Institutions (DIZH), Switzerland. We
|
| 1363 |
+
would like to thank all adolescents, teachers, and social workers
|
| 1364 |
+
we contacted in conducting our study. We also thank Frank Wieber,
|
| 1365 |
+
Katja Kurz and Manuel Günther for their helpful comments.
|
| 1366 |
+
REFERENCES
|
| 1367 |
+
[1] Claire Balleys and Sami Coll. 2017. Being Publicly Intimate: Teenagers Managing
|
| 1368 |
+
Online Privacy. Media, Culture & Society 39, 6 (2017), 885–901. https://doi.org/
|
| 1369 |
+
10.1177/0163443716679033
|
| 1370 |
+
[2] Rosaline S Barbour. 2001. Checklists for Improving Rigour in Qualitative Research:
|
| 1371 |
+
A Case of the Tail Wagging the Dog? BMJ: British Medical Journal 322, 7294
|
| 1372 |
+
(2001), 1115–1117.
|
| 1373 |
+
[3] Fiona Barker, Lou Atkins, and Simon de Lusignan. 2016. Applying the COM-B
|
| 1374 |
+
Behaviour Model and Behaviour Change Wheel to Develop an Intervention to
|
| 1375 |
+
Improve Hearing-Aid Use in Adult Auditory Rehabilitation. International Journal
|
| 1376 |
+
of Audiology 55 (2016), S90–S98. Issue sup3. https://doi.org/10.3109/14992027.
|
| 1377 |
+
2015.1120894
|
| 1378 |
+
[4] Susan B. Barnes. 2006. A Privacy Paradox: Social Networking in the United States.
|
| 1379 |
+
First Monday 11, 9 (2006). https://doi.org/10.5210/fm.v11i9.1394
|
| 1380 |
+
[5] Ronen Bergman, Sheera Frenkel, and Raymond Zhong. 2020. Major TikTok
|
| 1381 |
+
Security Flaws Found.
|
| 1382 |
+
[6] Jael Bernath, Lilian Suter, Gregor Waller, Céline Külling, Isabel Willemse, and
|
| 1383 |
+
Daniel Süss. 2020.
|
| 1384 |
+
JAMES: Jugend, Aktivitäten, Medien–Erhebung Schweiz.
|
| 1385 |
+
Working Paper. Zurich University of Applied Sciences, Winterthur.
|
| 1386 |
+
https:
|
| 1387 |
+
//doi.org/10.21256/zhaw-21175
|
| 1388 |
+
[7] Aparajita Bhandari and Sara Bimo. 2020. Tiktok and the “Algorithmized Self”: A
|
| 1389 |
+
New Model of Online Interaction. AoIR Selected Papers of Internet Research (2020).
|
| 1390 |
+
Issue 2020. https://doi.org/10.5210/spir.v2020i0.11172
|
| 1391 |
+
[8] Grant Blank, Gillian Bolsover, and Elizabeth Dubois. 2014. A New Privacy
|
| 1392 |
+
Paradox: Young People and Privacy on Social Network Sites. In Prepared for the
|
| 1393 |
+
Annual Meeting of the American Sociological Association, Vol. 17. San Francisco.
|
| 1394 |
+
http://dx.doi.org/10.2139/ssrn.2479938
|
| 1395 |
+
[9] danah boyd. 2014. It’s Complicated: The Social Lives of Networked Teens. Yale
|
| 1396 |
+
University Press, New Haven, Connecticut, U.S.
|
| 1397 |
+
[10] danah boyd, Eszter Hargittai, Jason Schultz, and John Palfrey. 2011. Why Parents
|
| 1398 |
+
Help Their Children Lie to Facebook about Age: Unintended Consequences
|
| 1399 |
+
of the ’Children’s Online Privacy Protection Act’. First Monday 16, 11 (2011).
|
| 1400 |
+
https://doi.org/10.5210/fm.v16i11.3850
|
| 1401 |
+
[11] Virginia Braun and Victoria Clarke. 2006. Using Thematic Analysis in Psychology.
|
| 1402 |
+
Qualitative Research in Psychology 3, 2 (2006), 77–101. https://doi.org/10.1191/
|
| 1403 |
+
1478088706qp063oa
|
| 1404 |
+
[12] ByteDance Ltd. 2022. Install TikTok Pixel.
|
| 1405 |
+
Retrieved 2022-11-02 from https:
|
| 1406 |
+
//www.tiktokforbusinesseurope.com/resources/installing-pixel-ads-manager
|
| 1407 |
+
[13] Moritz Büchi, Noemi Festic, and Michael Latzer. 2022. The Chilling Effects of
|
| 1408 |
+
Digital Dataveillance: A Theoretical Model and an Empirical Research Agenda.
|
| 1409 |
+
Big Data & Society 9, 1 (2022). https://doi.org/10.1177/20539517211065368
|
| 1410 |
+
[14] Oscar Castro, Ineke Vergeer, Jason Bennie, Jonathan Cagas, and Stuart J. H.
|
| 1411 |
+
Biddle. 2021.
|
| 1412 |
+
Using the Behavior Change Wheel to Understand University
|
| 1413 |
+
Students’ Prolonged Sitting Time and Identify Potential Intervention Strate-
|
| 1414 |
+
gies. International Journal of Behavioral Medicine 28, 3 (2021), 360–371. https:
|
| 1415 |
+
//doi.org/10.1007/s12529-020-09926-0
|
| 1416 |
+
[15] Tom De Leyn, Ralf De Wolf, Mariek Vanden Abeele, and Lieven De Marez.
|
| 1417 |
+
2019. Reframing Current Debates on Young People’s Online Privacy by Tak-
|
| 1418 |
+
ing into Account the Cultural Construction of Youth. In Proceedings of the
|
| 1419 |
+
10th International Conference on Social Media and Society (SMSociety ’19). As-
|
| 1420 |
+
sociation for Computing Machinery, New York, NY, USA, 174–183.
|
| 1421 |
+
https:
|
| 1422 |
+
//doi.org/10.1145/3328529.3328558
|
| 1423 |
+
[16] Tom De Leyn, Ralf De Wolf, Mariek Vanden Abeele, and Lieven De Marez. 2021.
|
| 1424 |
+
In-between Child’s Play and Teenage Pop Culture: Tweens, TikTok & Privacy.
|
| 1425 |
+
Journal of Youth Studies 0, 0 (2021), 1–18. https://doi.org/10.1080/13676261.2021.
|
| 1426 |
+
1939286
|
| 1427 |
+
[17] Ralf De Wolf. 2016. Group Privacy Management Strategies and Challenges
|
| 1428 |
+
in Facebook: A Focus Group Study among Flemish Youth Organizations.
|
| 1429 |
+
Cyberpsychology-Journal of Psychosocial Research on Cyberspace 10, 1 (2016).
|
| 1430 |
+
https://doi.org/10.5817/CP2016-1-5
|
| 1431 |
+
12
|
| 1432 |
+
|
| 1433 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 1434 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 1435 |
+
[18] Ralf De Wolf and Stijn Joye. 2019. Control Responsibility : The Discursive
|
| 1436 |
+
Construction of Privacy, Teens, and Facebook in Flemish Newspapers.
|
| 1437 |
+
IN-
|
| 1438 |
+
TERNATIONAL JOURNAL OF COMMUNICATION 13 (2019), 5505–5524. http:
|
| 1439 |
+
//hdl.handle.net/1854/LU-8631357
|
| 1440 |
+
[19] A Demeulenaere, E Boudry, H Vanwynsberghe, and W De Bonte. 2020. Onder-
|
| 1441 |
+
zoeksrapport: De Digitale Leefwereld van Kinderen. Technical Report. Research
|
| 1442 |
+
report: The digital lifeworld of children. Gent: Mediaraven.
|
| 1443 |
+
[20] Vanessa P. Dennen, Stacey A. Rutledge, Lauren M. Bagdy, Jerrica T. Rowlett,
|
| 1444 |
+
Shannon Burnick, and Sarah Joyce. 2017. Context Collapse and Student Social
|
| 1445 |
+
Media Networks: Where Life and High School Collide. In Proceedings of the 8th
|
| 1446 |
+
International Conference on Social Media & Society (#SMSociety17). Association
|
| 1447 |
+
for Computing Machinery, New York, NY, USA, 1–5. https://doi.org/10.1145/
|
| 1448 |
+
3097286.3097318
|
| 1449 |
+
[21] Norman K Denzin. 2017. Sociological methods: A sourcebook. Routledge, New
|
| 1450 |
+
York, NY, U.S.
|
| 1451 |
+
[22] Amandeep Dhir, Torbjørn Torsheim, Ståle Pallesen, and Cecilie S. Andreassen.
|
| 1452 |
+
2017. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents,
|
| 1453 |
+
Young Adults and Adults? Frontiers in Psychology 8 (2017), 815. https://doi.org/
|
| 1454 |
+
10.3389/fpsyg.2017.00815
|
| 1455 |
+
[23] Io Dodds. 2020. How Popular Apps Can Read Your Phone’s Clipboard without
|
| 1456 |
+
Permission.
|
| 1457 |
+
https://www.telegraph.co.uk/technology/2020/03/30/popular-apps-
|
| 1458 |
+
can-read-phones-clipboard-without-permission/
|
| 1459 |
+
[24] Matthias Eberl. 2019. Privacy Analysis of Tiktok’s App and Website.
|
| 1460 |
+
Re-
|
| 1461 |
+
trieved 2022-11-02 from https://rufposten.de/blog/2019/12/05/privacy-analysis-
|
| 1462 |
+
of-tiktoks-app-and-website/
|
| 1463 |
+
[25] Martin P. Eccles, Jeremy M. Grimshaw, Graeme MacLennan, Debbie Bonetti, Liz
|
| 1464 |
+
Glidewell, Nigel B. Pitts, Nick Steen, Ruth Thomas, Anne Walker, and Marie
|
| 1465 |
+
Johnston. 2012. Explaining Clinical Behaviors Using Multiple Theoretical Models.
|
| 1466 |
+
Implementation Science 7, 1 (2012), 99. https://doi.org/10.1186/1748-5908-7-99
|
| 1467 |
+
[26] Emily Baker-White. 2022. Leaked Audio From 80 Internal TikTok Meetings
|
| 1468 |
+
Shows That US User Data Has Been Repeatedly Accessed From China. Retrieved
|
| 1469 |
+
2022-11-02 from https://www.buzzfeednews.com/article/emilybakerwhite/tiktok-
|
| 1470 |
+
tapes-us-user-data-china-bytedance-access
|
| 1471 |
+
[27] Ilker Etikan, Sulaiman Abubakar Musa, Rukayya Sunusi Alkassim, et al. 2016.
|
| 1472 |
+
Comparison of Convenience Sampling and Purposive Sampling. American journal
|
| 1473 |
+
of theoretical and applied statistics 5, 1 (2016), 1–4.
|
| 1474 |
+
[28] European Court of Human Rights. 2022. Factsheet – Right to the Protection of
|
| 1475 |
+
One’s Image. Retrieved 2022-11-02 from https://www.echr.coe.int/documents/
|
| 1476 |
+
fs{_}own{_}image{_}eng.pdf
|
| 1477 |
+
[29] European Data Protection Board. 2021.
|
| 1478 |
+
Italian DPA Imposes Limita-
|
| 1479 |
+
tion on Processing on TikTok after the Death of a Girl from Palermo
|
| 1480 |
+
| European Data Protection Board.
|
| 1481 |
+
Retrieved 2022-11-02 from
|
| 1482 |
+
https://edpb.europa.eu/news/national-news/2021/italian-dpa-imposes-
|
| 1483 |
+
limitation-processing-tiktok-after-death-girl-palermo{_}pl
|
| 1484 |
+
[30] Coco Feng. 2021. Chinese Version of TikTok Gets 40-Minute Time Limit for Kids
|
| 1485 |
+
under 14. Retrieved 2022-11-02 from https://www.scmp.com/tech/policy/article/
|
| 1486 |
+
3149397/chinese-version-tiktok-limits-kids-under-14-40-minutes-day-adding-
|
| 1487 |
+
fight
|
| 1488 |
+
[31] Yang Feng and Wenjing Xie. 2014. Teens’ Concern for Privacy When Using Social
|
| 1489 |
+
Networking Sites: An Analysis of Socialization Agents and Relationships with
|
| 1490 |
+
Privacy-Protecting Behaviors. Computers in Human Behavior 33 (2014), 153–162.
|
| 1491 |
+
https://doi.org/10.1016/j.chb.2014.01.009
|
| 1492 |
+
[32] Caragh Flannery, Sheena McHugh, Ann Ebere Anaba, E Clifford, Mairead
|
| 1493 |
+
O’Riordan, Louise C Kenny, Fionnuala M McAuliffe, Patricia M Kearney, and M
|
| 1494 |
+
Byrne. 2018. Enablers and barriers to physical activity in overweight and obese
|
| 1495 |
+
pregnant women: an analysis informed by the theoretical domains framework
|
| 1496 |
+
and COM-B model. BMC pregnancy and childbirth 18, 1 (2018), 1–13.
|
| 1497 |
+
[33] FTC. 2019. Video Social Networking App Musical.Ly Agrees to Settle FTC
|
| 1498 |
+
Allegations That It Violated Children’s Privacy Law.
|
| 1499 |
+
Retrieved 2022-11-
|
| 1500 |
+
02 from https://www.ftc.gov/news-events/press-releases/2019/02/video-social-
|
| 1501 |
+
networking-app-musically-agrees-settle-ftc
|
| 1502 |
+
[34] Eszter Hargittai. 2010. Digital Na(t)Ives? Variation in Internet Skills and Uses
|
| 1503 |
+
among Members of the “Net Generation”*. Sociological Inquiry 80, 1 (2010),
|
| 1504 |
+
92–113. https://doi.org/10.1111/j.1475-682X.2009.00317.x
|
| 1505 |
+
[35] Wannes Heirman, Michel Walrave, Anne Vermeulen, Koen Ponnet, Heidi Van-
|
| 1506 |
+
debosch, Joris Van Ouytsel, and Ellen Van Gool. 2016.
|
| 1507 |
+
An Open Book on
|
| 1508 |
+
Facebook? Examining the Interdependence of Adolescents’ Privacy Regula-
|
| 1509 |
+
tion Strategies.
|
| 1510 |
+
Behaviour & Information Technology 35, 9 (2016), 706–719.
|
| 1511 |
+
https://doi.org/10.1080/0144929X.2016.1181210
|
| 1512 |
+
[36] Kashmir Hill. 2020. The Secretive Company That Might End Privacy as We Know
|
| 1513 |
+
It. https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-
|
| 1514 |
+
recognition.html
|
| 1515 |
+
[37] Lisa Hodge. 2020. Parent’s Guide to TikTok - Everything You Need to Know to
|
| 1516 |
+
Keep Your Child Safe. Retrieved 2022-11-02 from https://www.dailyrecord.co.
|
| 1517 |
+
uk/lifestyle/family-kids/parents-guide-tiktok-everything-you-21632471
|
| 1518 |
+
[38] Hsiu-Fang Hsieh and Sarah E Shannon. 2005. Three Approaches to Qualitative
|
| 1519 |
+
Content Analysis. Qualitative health research 15, 9 (2005), 1277–1288.
|
| 1520 |
+
[39] Instagram. 2022. What Happens When I Block Someone on Instagram? Retrieved
|
| 1521 |
+
2022-11-02 from https://help.instagram.com/447613741984126?locale=en{_}US&
|
| 1522 |
+
cms{_}id=447613741984126&published{_}only=true
|
| 1523 |
+
[40] Hyunjin Kang, Wonsun Shin, and Junru Huang. 2021. Teens’ Privacy Management
|
| 1524 |
+
on Video-Sharing Social Media: The Roles of Perceived Privacy Risk and Parental
|
| 1525 |
+
Mediation. Internet Research 32, 1 (2021).
|
| 1526 |
+
[41] Jacob
|
| 1527 |
+
Kastrenakes.
|
| 1528 |
+
2020.
|
| 1529 |
+
TikTok
|
| 1530 |
+
Now
|
| 1531 |
+
Lets
|
| 1532 |
+
Parents
|
| 1533 |
+
Make
|
| 1534 |
+
Their
|
| 1535 |
+
Teens’
|
| 1536 |
+
Accounts
|
| 1537 |
+
More
|
| 1538 |
+
Private.
|
| 1539 |
+
Retrieved
|
| 1540 |
+
2022-11-02
|
| 1541 |
+
from
|
| 1542 |
+
https://www.theverge.com/2020/11/17/21570244/tiktok-parental-controls-
|
| 1543 |
+
family-pairing-private-accounts-search-limits
|
| 1544 |
+
[42] D. Bondy Valdovinos Kaye, Xu Chen, and Jing Zeng. 2021. The Co-Evolution of
|
| 1545 |
+
Two Chinese Mobile Short Video Apps: Parallel Platformization of Douyin and
|
| 1546 |
+
TikTok. Mobile Media & Communication 9, 2 (2021), 229–253. https://doi.org/10.
|
| 1547 |
+
1177/2050157920952120
|
| 1548 |
+
[43] Melanie Kennedy. 2020. ‘If the Rise of the TikTok Dance and e-Girl Aesthetic
|
| 1549 |
+
Has Taught Us Anything, It’s That Teenage Girls Rule the Internet Right Now’:
|
| 1550 |
+
TikTok Celebrity, Girls and the Coronavirus Crisis. European Journal of Cultural
|
| 1551 |
+
Studies 23, 6 (2020), 1069–1076. https://doi.org/10.1177/1367549420945341
|
| 1552 |
+
[44] M. Laeeq Khan. 2017. Social Media Engagement: What Motivates User Participa-
|
| 1553 |
+
tion and Consumption on YouTube? Computers in Human Behavior 66 (2017),
|
| 1554 |
+
236–247. https://doi.org/10.1016/j.chb.2016.09.024
|
| 1555 |
+
[45] Daniel Klug, Yiluo Qin, Morgan Evans, and Geoff Kaufman. 2021. Trick and Please.
|
| 1556 |
+
A Mixed-Method Study On User Assumptions About the TikTok Algorithm. In
|
| 1557 |
+
13th ACM Web Science Conference 2021 (WebSci ’21). Association for Computing
|
| 1558 |
+
Machinery, New York, NY, USA, 84–92. https://doi.org/10.1145/3447535.3462512
|
| 1559 |
+
[46] Felix Krause. 2022. iOS Privacy: Announcing InAppBrowser.Com - See What
|
| 1560 |
+
JavaScript Commands Get Injected through an in-App Browser.
|
| 1561 |
+
Retrieved
|
| 1562 |
+
2022-11-02 from https://krausefx.com/blog/announcing-inappbrowsercom-see-
|
| 1563 |
+
what-javascript-commands-get-executed-in-an-in-app-browser
|
| 1564 |
+
[47] Dami Lee. 2018. The Popular Musical.Ly App Has Been Rebranded as TikTok. Re-
|
| 1565 |
+
trieved 2022-11-02 from https://www.theverge.com/2018/8/2/17644260/musically-
|
| 1566 |
+
rebrand-tiktok-bytedance-douyin
|
| 1567 |
+
[48] Dami Lee. 2019. TikTok Stops Young Users from Uploading Videos after FTC
|
| 1568 |
+
Settlement. Retrieved 2022-11-02 from https://www.theverge.com/2019/2/27/
|
| 1569 |
+
18243510/tiktok-age-young-user-videos-ftc-settlement-13-childrens-privacy-
|
| 1570 |
+
law
|
| 1571 |
+
[49] Eden Litt. 2012. Knock, Knock. Who’s There? The Imagined Audience. Journal
|
| 1572 |
+
of Broadcasting & Electronic Media 56, 3 (2012), 330–345. https://doi.org/10.1080/
|
| 1573 |
+
08838151.2012.705195
|
| 1574 |
+
[50] Sonia Livingstone. 2008. Taking risky opportunities in youthful content creation:
|
| 1575 |
+
teenagers’ use of social networking sites for intimacy, privacy and self-expression.
|
| 1576 |
+
New media & society 10, 3 (2008), 393–411.
|
| 1577 |
+
[51] Sonia Livingstone, Leslie Haddon, Anke Görzig, and Kjartan Ólafsson. 2011. Risks
|
| 1578 |
+
and Safety on the Internet: The Perspective of European Children. Technical Report.
|
| 1579 |
+
LSE, London.
|
| 1580 |
+
[52] Sonia Livingstone and Ellen Helsper. 2010. Balancing Opportunities and Risks
|
| 1581 |
+
in Teenagers’ Use of the Internet: The Role of Online Skills and Internet Self-
|
| 1582 |
+
Efficacy. New Media & Society 12, 2 (2010), 309–329. https://doi.org/10.1177/
|
| 1583 |
+
1461444809342697
|
| 1584 |
+
[53] Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2019. Children’s Data
|
| 1585 |
+
and Privacy Online: Growing up in a Digital Age: An Evidence Review. Technical
|
| 1586 |
+
Report. London School of Economics and Political Science, Department of Media
|
| 1587 |
+
and Communications, London, UK. http://www.lse.ac.uk/my-privacy-uk
|
| 1588 |
+
[54] Sonia Livingstone, Kjartan Ólafsson, and Elisabeth Staksrud. 2011. Social Net-
|
| 1589 |
+
working, Age and Privacy. Technical Report. LSE, London.
|
| 1590 |
+
[55] Jacqueline Low. 2019. A Pragmatic Definition of the Concept of Theoretical
|
| 1591 |
+
Saturation. Sociological Focus 52, 2 (2019), 131–139.
|
| 1592 |
+
https://doi.org/10.1080/
|
| 1593 |
+
00380237.2018.1544514
|
| 1594 |
+
[56] ByteDance Ltd. 2022. Creating Videos | TikTok Help Center. Retrieved 2022-11-02
|
| 1595 |
+
from https://support.tiktok.com/en/using-tiktok/creating-videos
|
| 1596 |
+
[57] Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan,
|
| 1597 |
+
Aaron Smith, and Meredith Beaton. 2013. Teens, Social Media, and Privacy. Pew
|
| 1598 |
+
Research Center 21, 1055 (2013), 2–86.
|
| 1599 |
+
[58] Alice E Marwick and danah boyd. 2014. Networked Privacy: How Teenagers
|
| 1600 |
+
Negotiate Context in Social Media. New Media & Society 16, 7 (2014), 1051–1067.
|
| 1601 |
+
https://doi.org/10.1177/1461444814543995
|
| 1602 |
+
[59] Alice E. Marwick, Diego Murgia-Diaz, and John G. Palfrey. 2010. Youth, Privacy
|
| 1603 |
+
and Reputation (Literature Review). SSRN Scholarly Paper ID 1588163. Social
|
| 1604 |
+
Science Research Network, Rochester, NY. https://papers.ssrn.com/abstract=
|
| 1605 |
+
1588163
|
| 1606 |
+
[60] Susan Michie, Lou Atkins, and Robert West. 2014-05. The Behaviour Change
|
| 1607 |
+
Wheel: A Guide to Designing Interventions. Silverback Publishing, Sutton, U.K.
|
| 1608 |
+
[61] Susan Michie, Michelle Richardson, Marie Johnston, Charles Abraham, Jill Francis,
|
| 1609 |
+
Wendy Hardeman, Martin P. Eccles, James Cane, and Caroline E. Wood. 2013.
|
| 1610 |
+
The Behavior Change Technique Taxonomy (v1) of 93 Hierarchically Clustered
|
| 1611 |
+
Techniques: Building an International Consensus for the Reporting of Behavior
|
| 1612 |
+
Change Interventions. Annals of Behavioral Medicine 46, 1 (2013), 81–95. https:
|
| 1613 |
+
13
|
| 1614 |
+
|
| 1615 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 1616 |
+
Ebert et al.
|
| 1617 |
+
//doi.org/10.1007/s12160-013-9486-6
|
| 1618 |
+
[62] Susan Michie, Maartje M. van Stralen, and Robert West. 2011. The Behaviour
|
| 1619 |
+
Change Wheel: A New Method for Characterising and Designing Behaviour
|
| 1620 |
+
Change Interventions. Implementation Science 6, 1 (2011), 42. https://doi.org/10.
|
| 1621 |
+
1186/1748-5908-6-42
|
| 1622 |
+
[63] Christian Montag, Haibo Yang, and Jon D. Elhai. 2021. On the Psychology of
|
| 1623 |
+
TikTok Use: A First Glimpse From Empirical Findings. Frontiers in Public Health
|
| 1624 |
+
9 (2021).
|
| 1625 |
+
[64] Caron Mullen and Nicola Fox Hamilton. 2016. Adolescents’ Response to Parental
|
| 1626 |
+
Facebook Friend Requests: The Comparative Influence of Privacy Management,
|
| 1627 |
+
Parent-Child Relational Quality, Attitude and Peer Influence. Computers in
|
| 1628 |
+
Human Behavior 60 (2016), 165–172. https://doi.org/10.1016/j.chb.2016.02.026
|
| 1629 |
+
[65] Brian O’Neill. 2013. Who Cares? Practical Ethics and the Problem of Underage
|
| 1630 |
+
Users on Social Networking Sites. Ethics and Information Technology 15, 4 (2013),
|
| 1631 |
+
253–262. https://doi.org/10.1007/s10676-013-9331-4
|
| 1632 |
+
[66] Shailendra Rathore, Pradip Kumar Sharma, Vincenzo Loia, Young-Sik Jeong, and
|
| 1633 |
+
Jong Hyuk Park. 2017. Social Network Security: Issues, Challenges, Threats, and
|
| 1634 |
+
Solutions. Information Sciences 421 (2017), 43–69. https://doi.org/10.1016/j.ins.
|
| 1635 |
+
2017.08.063
|
| 1636 |
+
[67] Kate Raynes-Goldie. 2010. Aliases, Creeping, and Wall Cleaning: Understanding
|
| 1637 |
+
Privacy in the Age of Facebook. First Monday 15, 1 (2010). https://doi.org/10.
|
| 1638 |
+
5210/fm.v15i1.2775
|
| 1639 |
+
[68] Kalhan Rosenblatt. 2022.
|
| 1640 |
+
TikTok Surpasses Google as Most Popu-
|
| 1641 |
+
lar Website of the Year, New Data Suggests.
|
| 1642 |
+
Retrieved 2022-11-
|
| 1643 |
+
02 from https://www.nbcnews.com/tech/tech-news/tiktok-surpasses-google-
|
| 1644 |
+
popular-website-year-new-data-suggests-rcna9648
|
| 1645 |
+
[69] Greg Roumeliotis, Yingzhi Yang, Echo Wang, and Alexandra Alper. 2019. Ex-
|
| 1646 |
+
clusive: U.S. Opens National Security Investigation into TikTok - Sources.
|
| 1647 |
+
Retrieved 2022-11-02 from https://www.reuters.com/article/us-tiktok-cfius-
|
| 1648 |
+
exclusive-idUSKBN1XB4IL
|
| 1649 |
+
[70] Fergus Ryan, Audrey Fritz, and Daria Impiombato. 2020. TikTok Privacy Concerns
|
| 1650 |
+
and Data Collection. Technical Report. Australian Strategic Policy Institute. 36–42
|
| 1651 |
+
pages. jstor:resrep26120.7
|
| 1652 |
+
[71] SEAN [They/Them] (@seansvv). 2022. TikTok.
|
| 1653 |
+
Retrieved 2022-11-02 from
|
| 1654 |
+
https://www.tiktok.com/@seansvv
|
| 1655 |
+
[72] Wonsun Shin and Hyunjin Kang. 2016. Adolescents’ Privacy Concerns and
|
| 1656 |
+
Information Disclosure Online: The Role of Parents and the Internet. Computers
|
| 1657 |
+
in Human Behavior 54 (2016), 114–123. https://doi.org/10.1016/j.chb.2015.07.062
|
| 1658 |
+
[73] Statista. 2021. TikTok Annual Installs 2021. Retrieved 2022-11-02 from https:
|
| 1659 |
+
//www.statista.com/statistics/1089420/tiktok-annual-first-time-installs/
|
| 1660 |
+
[74] Statista. 2021. U.S. TikTok Users by Age 2021.
|
| 1661 |
+
Retrieved 2022-11-02 from
|
| 1662 |
+
https://www.statista.com/statistics/1095186/tiktok-us-users-age/
|
| 1663 |
+
[75] Terri Peters. 2021. How TikTok’s New Kids’ Privacy Settings Will Change the Way
|
| 1664 |
+
They Use It. Retrieved 2022-11-02 from https://www.today.com/parents/tiktok-
|
| 1665 |
+
changes-privacy-settings-kids-under-18-t205733
|
| 1666 |
+
[76] Sabine Trepte, Doris Teutsch, Philipp K. Masur, Carolin Eicher, Mona Fischer,
|
| 1667 |
+
Alisa Hennhöfer, and Fabienne Lind. 2015. Do People Know About Privacy
|
| 1668 |
+
and Data Protection Strategies? Towards the “Online Privacy Literacy Scale”
|
| 1669 |
+
(OPLIS). In Reforming European Data Protection Law, Serge Gutwirth, Ronald
|
| 1670 |
+
Leenes, and Paul de Hert (Eds.). Springer Netherlands, Dordrecht, 333–365. https:
|
| 1671 |
+
//doi.org/10.1007/978-94-017-9385-8{_}14
|
| 1672 |
+
[77] Ellen Van Gool, Joris Van Ouytsel, Koen Ponnet, and Michel Walrave. 2015. To
|
| 1673 |
+
Share or Not to Share? Adolescents’ Self-Disclosure about Peer Relationships on
|
| 1674 |
+
Facebook: An Application of the Prototype Willingness Model. Computers in
|
| 1675 |
+
Human Behavior 44 (2015), 230–239. https://doi.org/10.1016/j.chb.2014.11.036
|
| 1676 |
+
[78] Mariana Veretilnykova and Leyla Dogruel. 2021. Nudging Children and Adoles-
|
| 1677 |
+
cents toward Online Privacy: An Ethical Perspective. Journal of Media Ethics 36,
|
| 1678 |
+
3 (2021), 128–140. https://doi.org/10.1080/23736992.2021.1939031
|
| 1679 |
+
[79] Echo Wang. 2021. TikTok Hits 1 Billion Monthly Active Users Globally - Com-
|
| 1680 |
+
pany.
|
| 1681 |
+
https://www.reuters.com/technology/tiktok-hits-1-billion-monthly-
|
| 1682 |
+
active-users-globally-company-2021-09-27/
|
| 1683 |
+
[80] Robert West and Susan Michie. 2020. A Brief Introduction to the COM-B Model
|
| 1684 |
+
of Behaviour and the PRIME Theory of Motivation [V1]. Retrieved 2022-11-02
|
| 1685 |
+
from https://www.qeios.com/read/WW04E6
|
| 1686 |
+
[81] Alan F Westin. 1967. Privacy and Freedom. Vol. 7. Athenum, New York.
|
| 1687 |
+
[82] Pamela Wisniewski. 2018-03. The Privacy Paradox of Adolescent Online Safety:
|
| 1688 |
+
A Matter of Risk Prevention or Risk Resilience? IEEE Security Privacy 16, 2
|
| 1689 |
+
(2018-03), 86–90. https://doi.org/10.1109/MSP.2018.1870874
|
| 1690 |
+
[83] Pamela J. Wisniewski, Jessica Vitak, and Heidi Hartikainen. 2022. Privacy in
|
| 1691 |
+
Adolescence. In Modern Socio-Technical Perspectives on Privacy, Bart P. Knij-
|
| 1692 |
+
nenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas
|
| 1693 |
+
Proferes, and Jennifer Romano (Eds.). Springer International Publishing, Cham,
|
| 1694 |
+
315–336. https://doi.org/10.1007/978-3-030-82786-1{_}14
|
| 1695 |
+
[84] Queenie Wong. 2019. TikTok Accused of Secretly Gathering User Data and Send-
|
| 1696 |
+
ing It to China. Retrieved 2022-11-02 from https://www.cnet.com/news/privacy/
|
| 1697 |
+
tiktok-accused-of-secretly-gathering-user-data-and-sending-it-to-china/
|
| 1698 |
+
[85] Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy Protection Strategies
|
| 1699 |
+
on Facebook. Information, Communication & Society 16, 4 (2013), 479–500. https:
|
| 1700 |
+
//doi.org/10.1080/1369118X.2013.777757
|
| 1701 |
+
[86] Brahim Zarouali, Karolien Poels, Koen Ponnet, and Michel Walrave. 2018. “Ev-
|
| 1702 |
+
erything under Control?”: Privacy Control Salience Influences Both Critical
|
| 1703 |
+
Processing and Perceived Persuasiveness of Targeted Advertising among Ado-
|
| 1704 |
+
lescents. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 12, 1
|
| 1705 |
+
(2018). https://doi.org/10.5817/CP2018-1-5
|
| 1706 |
+
[87] Diana Zulli and David James Zulli. 2020. Extending the Internet Meme: Concep-
|
| 1707 |
+
tualizing Technological Mimesis and Imitation Publics on the TikTok Platform.
|
| 1708 |
+
New Media & Society 24, 8 (2020). https://doi.org/10.1177/1461444820983603
|
| 1709 |
+
A
|
| 1710 |
+
APPENDIX
|
| 1711 |
+
A.1
|
| 1712 |
+
Interview Guide (translated from German)
|
| 1713 |
+
(1) What’s your first name? How old are you? In what grade
|
| 1714 |
+
are you?
|
| 1715 |
+
(2) How often do you use TikTok? How long have you been
|
| 1716 |
+
using TikTok? When did you start to use TikTok?
|
| 1717 |
+
(3) Do you remember how old you were when you started using
|
| 1718 |
+
the app?
|
| 1719 |
+
(4) How many people do you follow? How many followers do
|
| 1720 |
+
you have?
|
| 1721 |
+
(5) Do you share videos? How many? What types of videos?
|
| 1722 |
+
(Behavior)
|
| 1723 |
+
(a) Why do you/don’t you share videos? (Motivation)
|
| 1724 |
+
(b) If yes: How do you share videos on TikTok? (Psychological
|
| 1725 |
+
capability)
|
| 1726 |
+
(6) Who can see your videos when they are shared? (Psycholog-
|
| 1727 |
+
ical capability)
|
| 1728 |
+
(7) How can you influence who can see your videos? (Psycho-
|
| 1729 |
+
logical capability)
|
| 1730 |
+
(8) Do you restrict who can see your videos? (Behavior)
|
| 1731 |
+
(a) If yes: Why / When do you restrict your videos? (Motiva-
|
| 1732 |
+
tion)
|
| 1733 |
+
(b) If no: Why? Have you ever considered restricting your
|
| 1734 |
+
videos? (Motivation)
|
| 1735 |
+
(9) Do your friends or others restrict their/your videos? (Social
|
| 1736 |
+
Opportunity)
|
| 1737 |
+
(10) Have you ever accidentally posted a video? If yes: What did
|
| 1738 |
+
you do? (Psychological capability)
|
| 1739 |
+
(11) What do you think about TikTok’s features to share/restrict
|
| 1740 |
+
videos? (Physical opportunity)
|
| 1741 |
+
A.2
|
| 1742 |
+
Coding Scheme
|
| 1743 |
+
Table 3 shows the hierarchical coding scheme together with the
|
| 1744 |
+
frequency of each code calculated across the 54 interviews.
|
| 1745 |
+
14
|
| 1746 |
+
|
| 1747 |
+
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
| 1748 |
+
Proceedings on Privacy Enhancing Technologies 2023(2)
|
| 1749 |
+
Table 3: Coding Scheme (translated from German). Frequency is calculated across 54 interviews.
|
| 1750 |
+
Code
|
| 1751 |
+
Description
|
| 1752 |
+
Frequency
|
| 1753 |
+
Usage_since
|
| 1754 |
+
Start of TikTok usage
|
| 1755 |
+
54
|
| 1756 |
+
Usage_frequency
|
| 1757 |
+
Frequency of TikTok usage
|
| 1758 |
+
53
|
| 1759 |
+
App_age
|
| 1760 |
+
Age entered into the app at first use
|
| 1761 |
+
29
|
| 1762 |
+
Video_Behavior
|
| 1763 |
+
Avoidance
|
| 1764 |
+
I normally do not create/publish TikToks.
|
| 1765 |
+
24
|
| 1766 |
+
Proactive
|
| 1767 |
+
PersonalCreator
|
| 1768 |
+
I regularly create/publish TikToks for myself and close friends.
|
| 1769 |
+
19
|
| 1770 |
+
PublicCreator
|
| 1771 |
+
I regularly create/publish TikToks for my followers/the public.
|
| 1772 |
+
11
|
| 1773 |
+
Video_PsyCapability
|
| 1774 |
+
PastPrivacyIncidents
|
| 1775 |
+
Minor
|
| 1776 |
+
I have perceived a potential/minor privacy incident.
|
| 1777 |
+
9
|
| 1778 |
+
Severe
|
| 1779 |
+
I have perceived a severe privacy incident.
|
| 1780 |
+
8
|
| 1781 |
+
PrivacyLiteracy
|
| 1782 |
+
AudienceContentLiteracy
|
| 1783 |
+
I’m aware of different audience/content types and have the ability to manage
|
| 1784 |
+
them.
|
| 1785 |
+
52
|
| 1786 |
+
TechnicalLiteracy
|
| 1787 |
+
I have the technical knowledge and skills to manage my audience.
|
| 1788 |
+
50
|
| 1789 |
+
Video_SocOpportunity
|
| 1790 |
+
NegativeFeedback
|
| 1791 |
+
Others show negative reactions to TikToks, that’s why I’m not active.
|
| 1792 |
+
16
|
| 1793 |
+
LinkabilityExperience
|
| 1794 |
+
Users can be easily recognized in real life.
|
| 1795 |
+
39
|
| 1796 |
+
RestrictiveInfluence
|
| 1797 |
+
I’m not active because others are also restrictive or enforce my privacy.
|
| 1798 |
+
34
|
| 1799 |
+
Video_PhyOpportunity
|
| 1800 |
+
PlatformFeatures
|
| 1801 |
+
TikTok helps to ensure my privacy.
|
| 1802 |
+
46
|
| 1803 |
+
DeviceFeatures
|
| 1804 |
+
The device helps to ensure my privacy.
|
| 1805 |
+
17
|
| 1806 |
+
Video_AutMotivation
|
| 1807 |
+
NegativeEmotionAvoidance
|
| 1808 |
+
I don’t publish content to avoid negative emotions.
|
| 1809 |
+
15
|
| 1810 |
+
Video_RefMotivation
|
| 1811 |
+
NegativeReactionAvoidance
|
| 1812 |
+
I don’t publish content to avoid negative reactions.
|
| 1813 |
+
10
|
| 1814 |
+
PrivacyIdentity
|
| 1815 |
+
I don’t publish content because privacy is important to me.
|
| 1816 |
+
5
|
| 1817 |
+
PublicityAvoidance
|
| 1818 |
+
I don’t publish content because I don’t want to be in the public eye.
|
| 1819 |
+
29
|
| 1820 |
+
15
|
| 1821 |
+
|
-dFJT4oBgHgl3EQfpiwj/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
.gitattributes
CHANGED
|
@@ -8076,3 +8076,57 @@ WtE1T4oBgHgl3EQfJAP_/content/2301.02948v1.pdf filter=lfs diff=lfs merge=lfs -tex
|
|
| 8076 |
adE1T4oBgHgl3EQfwwXB/content/2301.03415v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8077 |
qNAyT4oBgHgl3EQfzfnr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8078 |
UdE1T4oBgHgl3EQfuwU5/content/2301.03391v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 8076 |
adE1T4oBgHgl3EQfwwXB/content/2301.03415v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8077 |
qNAyT4oBgHgl3EQfzfnr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8078 |
UdE1T4oBgHgl3EQfuwU5/content/2301.03391v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8079 |
+
GtFAT4oBgHgl3EQftR52/content/2301.08663v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8080 |
+
GdFIT4oBgHgl3EQfWysJ/content/2301.11240v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8081 |
+
fdE_T4oBgHgl3EQf2RwE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8082 |
+
e9E1T4oBgHgl3EQfegRi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8083 |
+
INE3T4oBgHgl3EQfugsS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8084 |
+
w9FQT4oBgHgl3EQfwTaN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8085 |
+
49FAT4oBgHgl3EQfmR1P/content/2301.08622v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8086 |
+
lNFAT4oBgHgl3EQfbh0y/content/2301.08558v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8087 |
+
htAyT4oBgHgl3EQfkPhd/content/2301.00429v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8088 |
+
qNAyT4oBgHgl3EQfzfnr/content/2301.00704v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8089 |
+
_tE2T4oBgHgl3EQfmwdA/content/2301.04001v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8090 |
+
VtAzT4oBgHgl3EQfYPxj/content/2301.01331v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8091 |
+
49FAT4oBgHgl3EQfmR1P/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8092 |
+
yNE0T4oBgHgl3EQftQGw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8093 |
+
A9E2T4oBgHgl3EQfRQfr/content/2301.03780v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8094 |
+
xNAyT4oBgHgl3EQfOvYK/content/2301.00009v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8095 |
+
2tE0T4oBgHgl3EQfdwDZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8096 |
+
6tFKT4oBgHgl3EQf_i4o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8097 |
+
ltFQT4oBgHgl3EQfoDYc/content/2301.13371v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8098 |
+
E9FLT4oBgHgl3EQfFi_K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8099 |
+
VtAzT4oBgHgl3EQfYPxj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8100 |
+
2tE0T4oBgHgl3EQfdwDZ/content/2301.02382v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8101 |
+
qNE5T4oBgHgl3EQflA99/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8102 |
+
UNAyT4oBgHgl3EQf8fqv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8103 |
+
CtAzT4oBgHgl3EQfiP1R/content/2301.01496v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8104 |
+
Q9E4T4oBgHgl3EQfKgxv/content/2301.04930v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8105 |
+
zNFJT4oBgHgl3EQfiixS/content/2301.11570v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8106 |
+
CNE4T4oBgHgl3EQf5g54/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8107 |
+
nNE0T4oBgHgl3EQfZQD4/content/2301.02320v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8108 |
+
MNE3T4oBgHgl3EQfBAmd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8109 |
+
stAzT4oBgHgl3EQfBPrw/content/2301.00941v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8110 |
+
19AzT4oBgHgl3EQf8_5O/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8111 |
+
6tFKT4oBgHgl3EQf_i4o/content/2301.11962v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8112 |
+
A9E2T4oBgHgl3EQfRQfr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8113 |
+
29FIT4oBgHgl3EQf5SvC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8114 |
+
htAyT4oBgHgl3EQfkPhd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8115 |
+
zNFJT4oBgHgl3EQfiixS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8116 |
+
ZtA0T4oBgHgl3EQfF_9p/content/2301.02040v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8117 |
+
VtE2T4oBgHgl3EQfXwe7/content/2301.03848v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8118 |
+
kdAzT4oBgHgl3EQfpv0l/content/2301.01616v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8119 |
+
nNE0T4oBgHgl3EQfZQD4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8120 |
+
KtE0T4oBgHgl3EQfzgKz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8121 |
+
KtE0T4oBgHgl3EQfzgKz/content/2301.02674v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8122 |
+
QtAyT4oBgHgl3EQf7vqM/content/2301.00844v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8123 |
+
adE1T4oBgHgl3EQfwwXB/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8124 |
+
CNE4T4oBgHgl3EQf5g54/content/2301.05324v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 8125 |
+
29E4T4oBgHgl3EQf0A2b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8126 |
+
stAzT4oBgHgl3EQfBPrw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8127 |
+
GtFAT4oBgHgl3EQftR52/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8128 |
+
e9AzT4oBgHgl3EQf3v7A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8129 |
+
jNAzT4oBgHgl3EQf4_5S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8130 |
+
d9E0T4oBgHgl3EQfoQG6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8131 |
+
ftFKT4oBgHgl3EQfsy6o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 8132 |
+
0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d4c5100ec230a938dfaf187e8a88d0f092a5896255cb89576935267cd2519d7c
|
| 3 |
+
size 262189
|
0dAzT4oBgHgl3EQftv1g/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:34fe2ea1707072e38a9dfa2dbf7422704be0f631f6ab92222b2e7bf811bf1abf
|
| 3 |
+
size 12821
|
19AyT4oBgHgl3EQfofjr/content/tmp_files/2301.00510v1.pdf.txt
ADDED
|
@@ -0,0 +1,1599 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 2 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 3 |
+
Abstract. Among all the dynamical modular curves associated to quadratic polynomial
|
| 4 |
+
maps, we determine which curves have infinitely many quadratic points.
|
| 5 |
+
This yields a
|
| 6 |
+
classification statement on preperiodic points for quadratic polynomials over quadratic fields,
|
| 7 |
+
extending previous work of Poonen, Faber, and the authors.
|
| 8 |
+
1. Introduction
|
| 9 |
+
Let K be a field with algebraic closure K, and let f be a rational function in one variable
|
| 10 |
+
over K. Corresponding to f there are a morphism of algebraic varieties P1
|
| 11 |
+
K → P1
|
| 12 |
+
K and a
|
| 13 |
+
map on point sets P1(K) → P1(K), both of which we also denote by f. A point P ∈ P1(K)
|
| 14 |
+
is called periodic for f if there exists a positive integer n such that f n(P) = P, where f n
|
| 15 |
+
denotes the n-fold composition of f with itself; in that case, the smallest such n is called
|
| 16 |
+
the (exact) period of P. More generally, the point P is preperiodic for f if there exists
|
| 17 |
+
m ≥ 0 such that f m(P) is periodic; the smallest such m is then called the preperiod of P,
|
| 18 |
+
and we call the period of f m(P) the eventual period of P. Here, f 0 is interpreted as the
|
| 19 |
+
identity map, so that periodic points are considered preperiodic.
|
| 20 |
+
For any intermediate field K ⊆ L ⊆ K we define a directed graph G(f, L), called the
|
| 21 |
+
preperiodic portrait of f over L, whose vertices are the points P ∈ P1(L) that are
|
| 22 |
+
preperiodic for f, and whose directed edges are the ordered pairs (P, f(P)) for all vertices
|
| 23 |
+
P. In the terminology of graph theory, G(f, L) is a functional graph, i.e., a directed graph in
|
| 24 |
+
which every vertex has out-degree 1. Throughout this paper we will use the term portrait
|
| 25 |
+
instead of functional graph in order to emphasize our dynamical perspective.
|
| 26 |
+
1.1. Portraits for quadratic maps. Assume henceforth that K is a number field. We will
|
| 27 |
+
primarily, though not exclusively, be interested in the case where K is a quadratic extension
|
| 28 |
+
of Q; we refer to such fields simply as quadratic fields. A type of problem that has received
|
| 29 |
+
much attention in the field of arithmetic dynamics is that of classifying the portraits G(f, K)
|
| 30 |
+
up to graph isomorphism as f is allowed to vary in an infinite family of rational functions.
|
| 31 |
+
An early example of this classification problem is Poonen’s study [43] of the portraits G(f, Q)
|
| 32 |
+
as f varies over the family of all quadratic polynomials with rational coefficients.
|
| 33 |
+
Theorem 1.1 (Poonen [43]). Assume that there is no quadratic polynomial over Q having
|
| 34 |
+
a rational periodic point of period greater than 3.
|
| 35 |
+
Then, for every quadratic polynomial
|
| 36 |
+
f ∈ Q[z], the portrait G(f, Q) is isomorphic to one of the following twelve graphs (using the
|
| 37 |
+
labels from Appendix B):
|
| 38 |
+
∅, 2(1), 3(1, 1), 3(2), 4(1, 1), 4(2), 5(1, 1)a, 6(1, 1), 6(2), 6(3), 8(2, 1, 1), 8(3).
|
| 39 |
+
Date: January 3, 2023.
|
| 40 |
+
2020 Mathematics Subject Classification. Primary 37P05, 37P35; Secondary 37P15, 11G30, 14G05.
|
| 41 |
+
Key words and phrases. Arithmetic dynamics, dynatomic curve, preperiodic portrait, uniform bounded-
|
| 42 |
+
ness conjecture.
|
| 43 |
+
1
|
| 44 |
+
arXiv:2301.00510v1 [math.NT] 2 Jan 2023
|
| 45 |
+
|
| 46 |
+
2
|
| 47 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 48 |
+
Regarding the assumption in Theorem 1.1, it is known that a quadratic polynomial over
|
| 49 |
+
Q cannot have rational periodic points of period 4 (Morton [38]), period 5 (Flynn–Poonen–
|
| 50 |
+
Schaefer [18]), or, assuming that the conclusions of the Birch and Swinnerton-Dyer conjecture
|
| 51 |
+
hold for a certain Jacobian variety, period 6 (Stoll [47]). In addition, a substantial amount
|
| 52 |
+
of empirical evidence supporting the assumption in Poonen’s theorem has been provided by
|
| 53 |
+
Hutz and Ingram [23] and Benedetto et al. [1]. However, it remains an open problem to
|
| 54 |
+
prove that this assumption is valid. Portraits for other families of quadratic maps over Q are
|
| 55 |
+
studied in the articles [3,6,32,33]. The present paper concerns the preperiodic portraits of
|
| 56 |
+
quadratic polynomials defined over quadratic fields, a topic previously explored in [10,12,13].
|
| 57 |
+
1.2. Analogy with torsion points. A guiding principle that has proved fruitful in arith-
|
| 58 |
+
metic dynamics is to regard the set of preperiodic points of a map as being analogous to
|
| 59 |
+
the set of torsion points on an abelian variety. Thus, for instance, the well-known fact that
|
| 60 |
+
the set of K-rational torsion points on an abelian variety is finite is viewed as analogous to
|
| 61 |
+
a theorem of Northcott [41] stating that, for every rational function f over K of degree at
|
| 62 |
+
least 2, the set of K-rational preperiodic points of f is finite.
|
| 63 |
+
Motivated by this analogy, Morton and Silverman formulated the following dynamical
|
| 64 |
+
analogue of a standard uniform boundedness conjecture for abelian varieties. We state the
|
| 65 |
+
dynamical conjecture only in the case of endomorphisms of the projective line, although a
|
| 66 |
+
similar statement applies to arbitrary projective spaces1.
|
| 67 |
+
Conjecture 1.2 (Morton–Silverman [39]). For a number field K and morphism f : P1
|
| 68 |
+
K → P1
|
| 69 |
+
K
|
| 70 |
+
of degree greater than 1, the number of K-rational preperiodic points of f is bounded above
|
| 71 |
+
by a constant depending only on the degree of f and the absolute degree of K.
|
| 72 |
+
This dynamical uniform boundedness conjecture would imply, in particular, that there are
|
| 73 |
+
only finitely many isomorphism classes of portraits G(f, Q) as f ranges over all quadratic
|
| 74 |
+
polynomials with rational coefficients, since the number of vertices in such a portrait is
|
| 75 |
+
uniformly bounded. Theorem 1.1 can thus be seen as a refinement of the conjecture in this
|
| 76 |
+
case, as it provides a (conditionally) complete list of all possible portraits for the family of
|
| 77 |
+
quadratic polynomial maps. In the analogy with torsion points, Poonen’s list of portraits
|
| 78 |
+
corresponds to the list of abelian groups that can be realized as the torsion subgroup of an
|
| 79 |
+
elliptic curve over Q, the latter list being provided by a well-known theorem of Mazur [34].
|
| 80 |
+
Similarly, the Morton–Silverman conjecture would imply that the portraits G(f, K), where
|
| 81 |
+
K is a quadratic field and f is a quadratic polynomial over K, fall into finitely many iso-
|
| 82 |
+
morphism classes. A conjecturally complete list of classes was first proposed in [13], and is
|
| 83 |
+
included here in Appendix B. The list is comprised of 46 portraits, and can be viewed as anal-
|
| 84 |
+
ogous to the list of 26 abelian groups, known by work of Kamienny [25] and Kenku–Momose
|
| 85 |
+
[26], that can arise as torsion subgroups of elliptic curves over quadratic fields.
|
| 86 |
+
1.3. Infinitely occurring portraits. Our primary objective in this paper is to determine,
|
| 87 |
+
under a suitable notion of equivalence of maps, which of the 46 graphs in [13] arise as the
|
| 88 |
+
preperiodic portrait of infinitely many inequivalent quadratic polynomials over quadratic
|
| 89 |
+
fields. In the context of elliptic curves, both over Q and over quadratic fields, the correspond-
|
| 90 |
+
ing question is well understood: every abelian group that arises as the torsion subgroup of
|
| 91 |
+
an elliptic curve can be realized as such by infinitely many non-isomorphic curves (see [24]).
|
| 92 |
+
1Interestingly, work of Fakhruddin [17] shows that the more general Morton–Silverman conjecture in fact
|
| 93 |
+
implies its analogue for abelian varieties. See also [45, §3.3], where Merel’s theorem for elliptic curves is
|
| 94 |
+
shown to follow from Conjecture 1.2
|
| 95 |
+
|
| 96 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 97 |
+
3
|
| 98 |
+
In order to state our questions more precisely, we begin by defining the appropriate equiv-
|
| 99 |
+
alence relation on maps. Two morphisms f, h : P1
|
| 100 |
+
K → P1
|
| 101 |
+
K are called linearly conjugate
|
| 102 |
+
over K if there exists an automorphism σ ∈ PGL2(K) such that
|
| 103 |
+
h = σ−1 ◦ f ◦ σ.
|
| 104 |
+
(Similarly, one can define linear conjugacy over any extension of K.) In that case, a simple
|
| 105 |
+
argument shows that the portraits G(f, K) and G(h, K) are isomorphic as directed graphs;
|
| 106 |
+
hence, the isomorphism class of G(f, K) is determined by the linear conjugacy class of f.
|
| 107 |
+
In the case of quadratic polynomials, it is well known that every such map f ∈ K[z] is
|
| 108 |
+
linearly conjugate to a unique map of the form
|
| 109 |
+
fc(z) := z2 + c,
|
| 110 |
+
where c ∈ K. Thus, in studying the portraits of quadratic polynomials we may restrict
|
| 111 |
+
attention to the one-parameter family of maps fc.
|
| 112 |
+
Returning to the question of portraits arising infinitely often, the case of quadratic poly-
|
| 113 |
+
nomials over Q was answered by Faber, who showed in addition that Poonen’s list in [43]
|
| 114 |
+
does not omit any such portrait.
|
| 115 |
+
Theorem 1.3 (Faber [16]). For a portrait P, the following are equivalent:
|
| 116 |
+
(i) There exist infinitely many c ∈ Q such that G(fc, Q) ∼= P.
|
| 117 |
+
(ii) P is isomorphic to one of the following graphs (using the labels from Appendix B):
|
| 118 |
+
∅, 4(1, 1), 4(2), 6(1, 1), 6(2), 6(3), 8(2, 1, 1).
|
| 119 |
+
Motivated by Faber’s theorem, we now state the main questions to be addressed here.
|
| 120 |
+
Question 1.4. Among the 46 known isomorphism classes of portraits arising as G(fc, K),
|
| 121 |
+
with K a quadratic field and c ∈ K, which ones can be realized as such by infinitely many
|
| 122 |
+
algebraic numbers c? In addition, must every infinitely occurring portrait belong to one of
|
| 123 |
+
the 46 known isomorphism classes?
|
| 124 |
+
1.4. Main results. We define the following sets of portraits using labels as in Appendix B:
|
| 125 |
+
Γ0 := {∅, 4(1, 1), 4(2), 6(1, 1), 6(2), 6(3), 8(2, 1, 1)};
|
| 126 |
+
Γrat := {8(1, 1)a, 8(2)a, 8(4), 10(3, 1, 1), 10(3, 2)};
|
| 127 |
+
Γquad := {8(1, 1)b, 8(2)b, 8(3), 10(2, 1, 1)a/b};
|
| 128 |
+
Γ := Γ0 ∪ Γrat ∪ Γquad.
|
| 129 |
+
We provide two answers to Question 1.4 which differ in their level of specificity. The
|
| 130 |
+
simplest is Theorem 1.5, with Theorems 1.6 and 1.7 providing additional information in
|
| 131 |
+
terms of the above subsets of Γ. For an integer n ≥ 1, we define
|
| 132 |
+
Q(n) := {α ∈ Q : [Q(α) : Q] ≤ n}.
|
| 133 |
+
Theorem 1.5. For a portrait P, the following are equivalent:
|
| 134 |
+
(i) There exist infinitely many c ∈ Q(2) such that G(fc, K) ∼= P for some quadratic field
|
| 135 |
+
K containing c.
|
| 136 |
+
(ii) P ∈ Γ.
|
| 137 |
+
|
| 138 |
+
4
|
| 139 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 140 |
+
Theorem 1.5 can be refined in order to take into account certain subtleties illustrated by
|
| 141 |
+
the following example: We see from Theorem 1.3 that the portrait P = 4(2) is realized as
|
| 142 |
+
G(fc, Q) for infinitely many c ∈ Q. For each such c, the set of preperiodic points for fc is a
|
| 143 |
+
set of bounded height, and therefore fc has only finitely many preperiodic points of algebraic
|
| 144 |
+
degree 2 over Q. Hence, for each of the infinitely many c ∈ Q with G(fc, Q) ∼= P, we must
|
| 145 |
+
also have G(fc, K) ∼= P for all but finitely many quadratic fields K.
|
| 146 |
+
We therefore show that each of the portraits P ∈ Γ is realized infinitely often—even if
|
| 147 |
+
one excludes the infinitely many “trivial” realizations in the sense of the previous paragraph.
|
| 148 |
+
This is done in the next two theorems, which are stated separately in order to distinguish
|
| 149 |
+
between polynomials with rational coefficients and those with quadratic algebraic coefficients.
|
| 150 |
+
Theorem 1.6. For a portrait P, the following are equivalent:
|
| 151 |
+
(i) There exist infinitely many c ∈ Q such that G(fc, Q) ⊊ G(fc, K) ∼= P for some
|
| 152 |
+
quadratic field K.
|
| 153 |
+
(ii) P ∈ Γ ∖ {∅, 6(3)}.
|
| 154 |
+
Theorem 1.7. For a portrait P, the following are equivalent:
|
| 155 |
+
(i) There exist infinitely many c ∈ Q(2) ∖ Q such that G(fc, Q(c)) ∼= P.
|
| 156 |
+
(ii) P ∈ Γ0 ∪ Γquad.
|
| 157 |
+
Note that every portrait in Γ is covered by at least one of Theorems 1.6 and 1.7, since ∅
|
| 158 |
+
and 6(3) are elements of Γ0. In particular, these two theorems together imply Theorem 1.5.
|
| 159 |
+
1.5. Quadratic points on dynamical modular curves. The proofs of our main results
|
| 160 |
+
rely heavily on the concept of a dynamical modular curve. To each of the 46 portraits from
|
| 161 |
+
[13], and more generally to any portrait that could potentially be realized as the preperi-
|
| 162 |
+
odic portrait of a quadratic polynomial over a number field, we associate an algebraic curve
|
| 163 |
+
parametrizing instances of the portrait as a preperiodic portrait G(fc, K). The curve cor-
|
| 164 |
+
responding to a portrait P will be denoted X1(P) by analogy with the classical modular
|
| 165 |
+
curves X1(N) parametrizing elliptic curves with a torsion point of order N. To avoid confu-
|
| 166 |
+
sion, the latter curve will henceforth be denoted Xell
|
| 167 |
+
1 (N). The details of the construction as
|
| 168 |
+
well as basic properties of dynamical modular curves are discussed in [11]. A more general
|
| 169 |
+
construction of dynamical moduli spaces appears in [15].
|
| 170 |
+
The core of our analysis in this paper is a study of basic geometric invariants, such as
|
| 171 |
+
genus and gonality, of the curves X1(P). We then turn this geometric data into arithmetic
|
| 172 |
+
data using Faltings’ theorem on rational points on subvarieties of abelian varieties, via the
|
| 173 |
+
following result of Harris and Silverman:
|
| 174 |
+
Theorem 1.8 (Harris–Silverman [21, Cor. 3]). Let X be a smooth, irreducible, projective
|
| 175 |
+
curve of genus g ≥ 2 defined over a number field K. If X is neither hyperelliptic or bielliptic
|
| 176 |
+
over K, then X has only finitely many points that are quadratic over K.
|
| 177 |
+
In addition, we consider arithmetic questions regarding the fields of definition of quadratic
|
| 178 |
+
points on X1(P). In particular, if X1(P) has a point defined over a quadratic number field
|
| 179 |
+
K, what can be said about basic arithmetic invariants of K, such as discriminant and class
|
| 180 |
+
number? For the curves Xell
|
| 181 |
+
1 (N), arithmetic questions of this kind have been discussed by
|
| 182 |
+
several authors: Momose [35] shows that if K is the field of definition of a quadratic point
|
| 183 |
+
on Xell
|
| 184 |
+
1 (13), then the prime 2 splits in K, and 3 is unramified in K; Bosman et al. [5] show
|
| 185 |
+
that K must be a real quadratic field, an observation also made in [13]. In the case of the
|
| 186 |
+
|
| 187 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 188 |
+
5
|
| 189 |
+
modular curves Xell
|
| 190 |
+
0 (N), Najman and Trbovi´c [40] prove arithmetic results of this type for
|
| 191 |
+
several values of N.
|
| 192 |
+
For the dynamical modular curves X1(P) we prove the following two theorems. Though
|
| 193 |
+
our methods can be applied to several portraits in the set Γ (namely, those for which the
|
| 194 |
+
corresponding modular curve is hyperelliptic), the portraits 8(4) and 10(3,1,1) are highlighted
|
| 195 |
+
here due to their significance in the context of elliptic curves, explained below.
|
| 196 |
+
By a quadratic point on an algebraic curve over a field k, we mean a point whose field
|
| 197 |
+
of definition is a quadratic extension of k.
|
| 198 |
+
Theorem 1.9. Let P denote the portrait 8(4).
|
| 199 |
+
(a) For every prime p and every residue class c ∈ Z/pZ, there exist infinitely many
|
| 200 |
+
squarefree integers d ∈ c such that X1(P) has a quadratic point defined over Q(
|
| 201 |
+
√
|
| 202 |
+
d).
|
| 203 |
+
(b) There exist infinitely many imaginary quadratic fields K with class number divisible
|
| 204 |
+
by 10 such that X1(P) has a quadratic point defined over K.
|
| 205 |
+
As noted in [13], the above curve X1(P) is isomorphic to Xell
|
| 206 |
+
1 (16). Thus, Theorem 1.9
|
| 207 |
+
provides new information about the collection of quadratic fields K such that there exists
|
| 208 |
+
an elliptic curve E/K with a K-rational torsion point of order 16.
|
| 209 |
+
Similarly, taking P = 10(3, 1, 1), the curve X1(P) is known to be isomorphic to Xell
|
| 210 |
+
1 (18).
|
| 211 |
+
The next theorem strengthens earlier results by Kenku–Momose [26] regarding the splitting
|
| 212 |
+
of rational primes in the fields of definition of quadratic points on this curve.
|
| 213 |
+
Theorem 1.10. Let P denote the portrait 10(3, 1, 1) and let K be the field of definition of
|
| 214 |
+
a quadratic point on X1(P).
|
| 215 |
+
(a) The prime 2 splits in K, and 3 is not inert in K.
|
| 216 |
+
(b) There exists an infinite and computable set of primes, denoted π, that is independent
|
| 217 |
+
of K, and such that every prime in π is unramified in K.
|
| 218 |
+
1.6. Points of higher degree. Though our primary focus here is on quadratic fields, we
|
| 219 |
+
make one observation concerning arbitrary number fields. The next result is a straightforward
|
| 220 |
+
consequence of a theorem of Frey [19] together with the main theorem of [14].
|
| 221 |
+
Theorem 1.11. Fix a positive integer n. For any portrait P, let γ(P) denote the set of
|
| 222 |
+
algebraic numbers c ∈ Q(n) such that P ∼= G(fc, K) for some number field K satisfying
|
| 223 |
+
c ∈ K ⊂ Q(n). There are only finitely many portraits P such that γ(P) is infinite.
|
| 224 |
+
Note that Theorem 1.5 is a more refined version of Theorem 1.11 in the case n = 2.
|
| 225 |
+
1.7. Outline of the paper. In Section 2 we define the notion of a generic quadratic portrait
|
| 226 |
+
and discuss basic facts concerning dynamical modular curves associated to such portraits,
|
| 227 |
+
followed by general properties of algebraic curves in Section 3.
|
| 228 |
+
In Section 4, we apply geometric arguments to determine all generic quadratic portraits P
|
| 229 |
+
for which the curve X1(P) has infinitely many quadratic points. This proves, in particular,
|
| 230 |
+
the implication (i) ⇒ (ii) in Theorem 1.5; see Theorem 4.1 and the immediately preceding
|
| 231 |
+
discussion.
|
| 232 |
+
Section 5 addresses the issue that K-rational points on X1(P) correspond to instances
|
| 233 |
+
where G(fc, K) simply contains the portrait P; that is, we need not have an isomorphism
|
| 234 |
+
G(fc, K) ∼= P, and in fact, in many cases we do not. The section culminates with the proofs
|
| 235 |
+
of Theorems 1.6 and 1.7 in §5.3.
|
| 236 |
+
|
| 237 |
+
6
|
| 238 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 239 |
+
Finally, Section 6 is devoted to arithmetic questions concerning the fields of definition of
|
| 240 |
+
quadratic points on the curves X1(P), and in particular to proving Theorems 1.9 and 1.10.
|
| 241 |
+
Acknowledgements. We thank Joe Silverman for helpful comments, and especially for a
|
| 242 |
+
suggestion that led to the more refined statements in Theorems 1.6 and 1.7. The first author
|
| 243 |
+
was partially supported by NSF grant DMS-2112697.
|
| 244 |
+
2. Dynamical modular curves
|
| 245 |
+
2.1. Dynatomic polynomials. If f is a polynomial with coefficients in a field K and α ∈ K
|
| 246 |
+
is a point of exact period n for f, then α is a root of the polynomial f n(z)−z. However, the
|
| 247 |
+
roots of f n(z) − z may have period strictly dividing n, and indeed there is a factorization
|
| 248 |
+
f n(z) − z =
|
| 249 |
+
�
|
| 250 |
+
d|n
|
| 251 |
+
Φd,f(z),
|
| 252 |
+
where (generically) the roots of Φd,f have exact period d for f. M¨obius inversion yields
|
| 253 |
+
Φn,f(z) =
|
| 254 |
+
�
|
| 255 |
+
d|n
|
| 256 |
+
(f d(z) − z)µ(n/d),
|
| 257 |
+
where µ denotes the M¨obius function. We call Φn,f the nth dynatomic polynomial of f.
|
| 258 |
+
More generally, for m, n ≥ 1 we define
|
| 259 |
+
Φm,n,f(z) :=
|
| 260 |
+
Φn,f(f m(z))
|
| 261 |
+
Φn,f(f m−1(z)).
|
| 262 |
+
Then Φm,n,f is a polynomial whose roots are (again, generically) points of preperiod m and
|
| 263 |
+
eventual period n for f. (That Φn,f and Φm,n,f are indeed polynomials is proven in [22,45].)
|
| 264 |
+
Since we are specifically interested in the family fc(z) = z2 + c, we write
|
| 265 |
+
Φn(c, z) := Φn,fc(z)
|
| 266 |
+
and
|
| 267 |
+
Φm,n(c, z) := Φm,n,fc(z).
|
| 268 |
+
Then Φn (resp., Φm,n) is a polynomial in Z[c, z], and the vanishing locus defines an affine
|
| 269 |
+
curve Y1(n) (resp., Y1(m, n)), which we refer to as a dynatomic curve. Thus, for example,
|
| 270 |
+
if α has period n for fc, then (c, α) is a point on the dynatomic curve Y1(n). We denote by
|
| 271 |
+
X1(·) the normalization of the projective closure of the affine curve Y1(·), and we also refer
|
| 272 |
+
to X1(·) as a dynatomic curve.
|
| 273 |
+
2.2. Dynamical modular curves associated to portraits. The dynamical properties
|
| 274 |
+
of quadratic polynomial maps impose certain restrictions on those portraits that may be
|
| 275 |
+
realized as G(f, K) for some number field K and a quadratic polynomial f ∈ K[z]. First,
|
| 276 |
+
no point may have more than two preimages under f. Also, for each positive n ∈ Z, the nth
|
| 277 |
+
dynatomic polynomial for a quadratic polynomial f has degree
|
| 278 |
+
(2.1)
|
| 279 |
+
D(n) := deg Φn,f(z) =
|
| 280 |
+
�
|
| 281 |
+
d|n
|
| 282 |
+
µ(n/d)2d.
|
| 283 |
+
Thus, a quadratic polynomial has at most D(n) points of period n, partitioned into at most
|
| 284 |
+
R(n) := D(n)/n cycles of length n. With these restrictions in mind, we make the following
|
| 285 |
+
definition:
|
| 286 |
+
|
| 287 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 288 |
+
7
|
| 289 |
+
•
|
| 290 |
+
•
|
| 291 |
+
•
|
| 292 |
+
•
|
| 293 |
+
Figure 1. A generic quadratic portrait
|
| 294 |
+
Definition 2.1. A quadratic portrait is a portrait P satisfying the following properties:
|
| 295 |
+
(a) Every vertex of P has in-degree at most 2.
|
| 296 |
+
(b) For each n ≥ 1, the number of n-cycles in P is at most
|
| 297 |
+
R(n) := 1
|
| 298 |
+
n
|
| 299 |
+
�
|
| 300 |
+
d|n
|
| 301 |
+
µ(n/d)2d.
|
| 302 |
+
For any number field K and quadratic polynomial f ∈ K[z], the portrait G(f, K) is
|
| 303 |
+
quadratic. However, for most quadratic polynomials (in a sense that can be made precise),
|
| 304 |
+
we can say more about the structure of the set of K-rational preperiodic points. For the
|
| 305 |
+
model fc(z) = z2 + c, if α is a preperiodic point for fc, then −α is also preperiodic, since
|
| 306 |
+
both are preimages of f(α). Thus, a preperiodic point typically has either no K-rational
|
| 307 |
+
preimages or exactly two K-rational preimages. The exception to this rule occurs when
|
| 308 |
+
α = 0 is a preperiodic point, in which case exactly one preperiodic point (namely, c = fc(0))
|
| 309 |
+
has a single K-rational preimage.
|
| 310 |
+
Along the same lines, if a polynomial fc has a K-rational fixed point β, then β is a root of
|
| 311 |
+
the quadratic polynomial fc(z)−z = z2−z+c; thus, unless we have disc(fc(z)−z) = 1−4c = 0
|
| 312 |
+
(i.e., c = 1/4), there is a second fixed point β′, necessarily defined over K.
|
| 313 |
+
With these observations in mind, we make the following definition.
|
| 314 |
+
Definition 2.2. A generic quadratic portrait is a quadratic portrait P with the following
|
| 315 |
+
additional properties:
|
| 316 |
+
(a) The in-degree of any vertex of P is equal to 0 or 2.
|
| 317 |
+
(b) If P has a fixed point, then P has exactly two fixed points.
|
| 318 |
+
Remark 2.3. We will sometimes refer to the results of [11], in which the term “strongly
|
| 319 |
+
admissible” is used instead of “generic quadratic.”
|
| 320 |
+
Given a quadratic portrait P, there is a dynamical modular curve Y1(P), defined over
|
| 321 |
+
Q, whose K-points—for any extension K/Q—correspond to tuples (c, z1, . . . , zn) such that
|
| 322 |
+
z1, . . . , zn are preperiodic points forming a subportrait of G(fc, K) isomorphic to P. If Q
|
| 323 |
+
is the point on Y1(P) corresponding to such a tuple, then the field of definition of Q is
|
| 324 |
+
Q(c, z1, . . . , zn). We denote by X1(P) the smooth projective curve birational to Y1(P).
|
| 325 |
+
A formal treatment of dynamical modular curves appears in [11], where the curves are de-
|
| 326 |
+
fined only for generic quadratic portraits. We lose no generality in making such a restriction:
|
| 327 |
+
Given any quadratic portrait P, there is a unique portrait P′ that is minimal among generic
|
| 328 |
+
quadratic portraits containing P as a subportrait. In the language of [11], P′ is the generic
|
| 329 |
+
quadratic portrait generated by the vertices of P. It follows from the results of [11, §2] that
|
| 330 |
+
X1(P) ∼= X1(P′), so we may as well assume that P is generic quadratic.
|
| 331 |
+
Rather than formally defining X1(P) (we refer the interested reader to [11] or, for a
|
| 332 |
+
different approach in a more general setting, [15]), we give an example.
|
| 333 |
+
Example 2.4. Consider the generic quadratic portrait P appearing in Figure 1. One could
|
| 334 |
+
construct a curve birational to X1(P) simply by giving one equation for each relation coming
|
| 335 |
+
|
| 336 |
+
8
|
| 337 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 338 |
+
from an edge in P: if we label the vertices 1, 2, 3, 4 from left to right, we have
|
| 339 |
+
z2
|
| 340 |
+
1 + c = z2,
|
| 341 |
+
z2
|
| 342 |
+
2 + c = z3,
|
| 343 |
+
z2
|
| 344 |
+
3 + c = z2,
|
| 345 |
+
z2
|
| 346 |
+
4 + c = z3.
|
| 347 |
+
(2.2)
|
| 348 |
+
Note that we must also impose certain Zariski open conditions of the form zi ̸= zj to remove
|
| 349 |
+
extraneous components; for example, there is a full component of the curve defined by (2.2)
|
| 350 |
+
on which z1, z2, z3, and z4 are all equal. It is this approach that is taken in [15].
|
| 351 |
+
An alternative approach, which is particular to quadratic polynomials, is to note that any
|
| 352 |
+
generic quadratic portrait containing a point of period 2 must necessarily contain P. Thus,
|
| 353 |
+
another (affine) model for X1(P) is the plane curve defined by the vanishing of
|
| 354 |
+
Φ2(c, z) = (z2 + c)2 + c − z
|
| 355 |
+
z2 + c − z
|
| 356 |
+
= z2 + z + c + 1.
|
| 357 |
+
In other words, X1(P) is isomorphic to the dynatomic curve X1(2). This second model has
|
| 358 |
+
the advantage of being defined in a lower-dimensional affine space (A2, rather than A5), and
|
| 359 |
+
it is this second approach which is described in detail in [11].
|
| 360 |
+
We conclude this example by pointing out that X1(P) ∼= X1(2) also has “degenerate”
|
| 361 |
+
points where two or more of the vertices of the portrait P collapse.
|
| 362 |
+
For example, the
|
| 363 |
+
equation Φ2(c, z) = 0 has the solution (c, z) =
|
| 364 |
+
�
|
| 365 |
+
− 3
|
| 366 |
+
4, − 1
|
| 367 |
+
2
|
| 368 |
+
�
|
| 369 |
+
despite the fact that − 1
|
| 370 |
+
2 is a fixed
|
| 371 |
+
point for f−3/4. However, for a given portrait P, there are only finitely many such degenerate
|
| 372 |
+
points on X1(P).
|
| 373 |
+
Before summarizing the required properties of dynamical modular curves, we recall the
|
| 374 |
+
following terminology:
|
| 375 |
+
Definition 2.5. Let X be a smooth, irreducible projective curve defined over a field k.
|
| 376 |
+
The k-gonality of X, denoted gonk(X), is the minimal degree of a nonconstant morphism
|
| 377 |
+
X → P1 defined over k.
|
| 378 |
+
Proposition 2.6. Let P be a generic quadratic portrait, and let k be any field of character-
|
| 379 |
+
istic 0.
|
| 380 |
+
(a) The curve X1(P) is irreducible over k.
|
| 381 |
+
(b) If P′ is a generic quadratic portrait properly contained in P, then there is a finite
|
| 382 |
+
morphism πP,P′ : X1(P) → X1(P′) of degree at least 2 defined over k.
|
| 383 |
+
(c) Given any ordering P1, P2, . . . of all generic quadratic portraits, the k-gonalities of
|
| 384 |
+
the curves X1(Pi) tend to ∞.
|
| 385 |
+
Proof. Parts (a) and (b) are proven in [11, Thm. 1.7] and [11, Prop. 3.3], respectively. Note
|
| 386 |
+
that the morphism πP,P′ is obtained simply by forgetting the preperiodic points correspond-
|
| 387 |
+
ing to vertices of P ∖ P′, hence is defined over the base field k.
|
| 388 |
+
Statement (c) is a slight generalization of, but follows directly from, [14, Thm. 1.1(b)],
|
| 389 |
+
which says that as m + n → ∞, the gonalities of the curves X1(m, n) tend to ∞. Given a
|
| 390 |
+
bound B, there are only finitely many quadratic portraits P such that every vertex v of P
|
| 391 |
+
has preperiod m and eventual period n satisfying m + n ≤ B. In other words, if for every
|
| 392 |
+
generic quadratic portrait P we choose a vertex vP with preperiod mP and eventual period
|
| 393 |
+
nP maximizing the sum mP + nP, we must have mP + nP → ∞ as P ranges over all generic
|
| 394 |
+
quadratic portraits in any order. Since there is a nonconstant morphism from X1(P) to
|
| 395 |
+
X1(mP, nP) (e.g., by part (b)), we have gonk(X1(P)) ≥ gonk(X1(mP, nP)), and the latter
|
| 396 |
+
expression tends to ∞.
|
| 397 |
+
□
|
| 398 |
+
|
| 399 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 400 |
+
9
|
| 401 |
+
Proof of Theorem 1.11. Fix n ≥ 1 and a portrait P, and suppose there are infinitely many
|
| 402 |
+
c ∈ Q(n) such that G(fc, K) ∼= P for some degree-n number field K containing c. Then the
|
| 403 |
+
dynamical modular curve X1(P) has infinitely many points of degree at most n. It follows
|
| 404 |
+
from [19, Prop. 2] (cf. [8, Thm. 5]) that X1(P) must have gonality at most 2n, hence there
|
| 405 |
+
are only finitely many such portraits P by part (c) of Proposition 2.6.
|
| 406 |
+
□
|
| 407 |
+
3. Some useful properties of algebraic curves
|
| 408 |
+
In this section, we collect a few facts about algebraic curves that will be used throughout
|
| 409 |
+
the rest of the paper.
|
| 410 |
+
First, we provide a statement that follows from Hilbert’s irreducibility theorem; see [44,
|
| 411 |
+
§3.4] and [30, §9.2] for details.
|
| 412 |
+
Proposition 3.1. Let K be a number field, let X be a curve defined over K, and let ϕ :
|
| 413 |
+
X → P1 be a dominant morphism of degree d ≥ 2 defined over K. Then the set
|
| 414 |
+
T :=
|
| 415 |
+
�
|
| 416 |
+
P ∈ P1(K) : [K(Q) : K] < d for some Q ∈ ϕ−1(P)
|
| 417 |
+
�
|
| 418 |
+
is a thin subset of P1(K).
|
| 419 |
+
Remark 3.2. Thin subsets T ⊂ P1(K) have density 0, in the sense that
|
| 420 |
+
lim
|
| 421 |
+
N→∞
|
| 422 |
+
���{P ∈ T : h(P) ≤ N}
|
| 423 |
+
���
|
| 424 |
+
���{P ∈ P1(K) : h(P) ≤ N}
|
| 425 |
+
���
|
| 426 |
+
= 0,
|
| 427 |
+
where h is the na¨ıve Weil height on P1(Q). In particular, for any maximal ideal p ∈ Spec OK
|
| 428 |
+
and any mod-p residue class c in P1(K), the set c \ T is infinite.
|
| 429 |
+
Given an elliptic curve E with Weierstrass equation y2 = f(x), where f ∈ K[x] is square-
|
| 430 |
+
free of degree 3, it is easy to construct infinitely many quadratic points on E: For “most”
|
| 431 |
+
x ∈ K, the point (x, y) = (x,
|
| 432 |
+
�
|
| 433 |
+
f(x)) is quadratic over K. More precisely, since f is not a
|
| 434 |
+
square in K[x], it follows from Hilbert irreducibility that f(x0) is a nonsquare in K for all
|
| 435 |
+
x0 outside a thin subset of K. The following result, proven in [13, Lem. 2.2], gives a useful
|
| 436 |
+
characterization of quadratic points (x, y) with x /∈ Q:
|
| 437 |
+
Lemma 3.3. Let E/K be an elliptic curve defined by an equation of the form
|
| 438 |
+
y2 = ax3 + bx2 + cx + d,
|
| 439 |
+
where a, b, c, d ∈ K and a ̸= 0. Suppose (x, y) ∈ E(K) is a quadratic point with x /∈ K.
|
| 440 |
+
Then there exist (x0, y0) ∈ E(K) and t ∈ k such that y = y0 + t(x − x0) and
|
| 441 |
+
x2 + ax0 − t2 + b
|
| 442 |
+
a
|
| 443 |
+
x + ax2
|
| 444 |
+
0 + t2x0 + bx0 − 2y0t + c
|
| 445 |
+
a
|
| 446 |
+
= 0.
|
| 447 |
+
By Theorem 1.8, a curve with infinitely many quadratic points must admit a degree-2
|
| 448 |
+
morphism to either P1 or an elliptic curve, hence must have gonality at most 4. Thus, to
|
| 449 |
+
prove that a curve has finitely many quadratic points, it suffices to show that the gonality
|
| 450 |
+
of the curve is greater than 4. The following inequality is a standard tool for finding lower
|
| 451 |
+
bounds for gonalities.
|
| 452 |
+
|
| 453 |
+
10
|
| 454 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 455 |
+
Proposition 3.4 (Castelnuovo–Severi inequality [46, Thm. 3.11.3]). Let Y , Y1, and Y2 be
|
| 456 |
+
curves of genera gY , g1, and g2, respectively. Suppose we have maps ϕ1 : Y → Y1 and
|
| 457 |
+
ϕ2 : Y → Y2 of degrees d1 and d2, and suppose further that there is not an intermediate
|
| 458 |
+
curve Z and a map ψ : Y → Z of degree greater than 2 such that both ϕ1 and ϕ2 factor
|
| 459 |
+
through ψ. Then
|
| 460 |
+
(3.1)
|
| 461 |
+
gY ≤ d1g1 + d2g2 + (d1 − 1)(d2 − 1).
|
| 462 |
+
4. Dynamical modular curves with infinitely many quadratic points
|
| 463 |
+
The purpose of this section is to prove one direction of Theorem 1.5, namely that if there
|
| 464 |
+
are infinitely many c ∈ Q(2) such that G(fc, K) ∼= P for some quadratic field K containing
|
| 465 |
+
c, then P ∈ Γ. Since any such realization of P as G(fc, K) yields a quadratic point on the
|
| 466 |
+
dynamical modular curve Y1(P), it suffices to prove the following:
|
| 467 |
+
Theorem 4.1. Let P be a generic quadratic portrait.
|
| 468 |
+
Then X1(P) has infinitely many
|
| 469 |
+
quadratic points if and only if P ∈ Γ.
|
| 470 |
+
Remark 4.2. If we just assume that P is a quadratic portrait (i.e., not necessarily generic),
|
| 471 |
+
then X1(P) has infinitely many quadratic points if and only if P is a subportrait of some
|
| 472 |
+
portrait in Γ. This follows from Theorem 4.1 as well as the fact that for any quadratic
|
| 473 |
+
portrait P, if we let P′ be the minimal generic quadratic portrait containing P, then X1(P)
|
| 474 |
+
and X1(P′) are isomorphic over Q. (See the discussion preceding Example 2.4.)
|
| 475 |
+
One direction of Theorem 4.1 is straightforward: For every portrait P ∈ Γ, the curve
|
| 476 |
+
X1(P) is described in at least one of the articles [38,43,48]. All the curves in those articles
|
| 477 |
+
have genus at most 2 and at least one rational point, hence have infinitely many quadratic
|
| 478 |
+
points. Thus, we must show that if P is generic quadratic but not in Γ, then X1(P) has only
|
| 479 |
+
finitely many quadratic points.
|
| 480 |
+
To help organize the arguments in the rest of this section, we introduce some terminology:
|
| 481 |
+
Definition 4.3. The cycle structure of a portrait P is the nonincreasing sequence of cycle
|
| 482 |
+
lengths appearing in P. Note that the empty portrait has cycle structure ( ).
|
| 483 |
+
If K is a quadratic field and c ∈ K, then the cycle structure of G(fc, K) may contain the
|
| 484 |
+
integer 1 at most twice and each of the integers 2, 3, and 4 at most once; for periods 1 and
|
| 485 |
+
2 this follows from the fact that a quadratic polynomial can have at most two fixed points
|
| 486 |
+
and at most one 2-cycle, and for periods 3 and 4 this comes from [10, Cor. 4.16]. More
|
| 487 |
+
precisely, the results of [10] imply that the “period at most 4” portion of the cycle structure
|
| 488 |
+
of G(fc, K) must be (4,1,1), (4,2), or one of the following:
|
| 489 |
+
(4.1)
|
| 490 |
+
( ), (1,1), (2), (3), (4), (2,1,1), (3,1,1), (3,2).
|
| 491 |
+
Moreover, it follows from [13, Cor. 3.48] (resp., [10, Thm. 4.21]) that no portrait with
|
| 492 |
+
both a 4-cycle and a 1-cycle (resp., 4-cycle and a 2-cycle) may be realized infinitely often as
|
| 493 |
+
G(fc, K) for K a quadratic field and c ∈ K. For our purposes, therefore, we may exclude
|
| 494 |
+
the cycle structures (4,1,1) and (4,2) from consideration.
|
| 495 |
+
By enumerating generic quadratic portraits with few vertices, one can verify that if P is a
|
| 496 |
+
generic quadratic portrait which is not in Γ, then P has a cycle of length n ≥ 5 or P properly
|
| 497 |
+
contains a portrait in Γ1 or Γ2. We handle these two possibilities separately, showing in each
|
| 498 |
+
case that the dynamical modular curve X1(P) has only finitely many quadratic points.
|
| 499 |
+
|
| 500 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 501 |
+
11
|
| 502 |
+
4.1. Points of period n ≥ 5. If P is a generic portrait with a cycle of length n, then there
|
| 503 |
+
is a dominant morphism X1(P) → X1(n) defined over Q. In particular, every quadratic
|
| 504 |
+
point on X1(P) maps to a rational or quadratic point on X1(n), so we need only show that
|
| 505 |
+
if n ≥ 5, then X1(n) has only finitely many points defined over quadratic fields; this is the
|
| 506 |
+
content of Proposition 4.6.
|
| 507 |
+
For n ≥ 1, the cyclic group Cn acts on X1(n) as follows: Given a point (c, z) ∈ X1(n), we
|
| 508 |
+
also have σn(c, z) := (c, fc(z)) ∈ X1(n), so σ defines an order-n automorphism of X1(n). We
|
| 509 |
+
denote by πn : X1(n) → X0(n) the quotient of X1(n) by this cyclic group action. (The curve
|
| 510 |
+
X0(n) parametrizes maps fc together with a marked cycle of length n.) Let c1,n and c0,n
|
| 511 |
+
denote the maps from X1(n) and X0(n), respectively, to the c-line; note that c1,n = c0,n ◦ πn.
|
| 512 |
+
For a curve X, we will denote by gX its genus; for simplicity, for each n ≥ 1 we will write
|
| 513 |
+
g1,n and g0,n for the genera of X1(n) and X0(n), respectively. Finally, recall that we denote
|
| 514 |
+
by D(n) the degree (in z) of the polynomial Φn(c, z); a formula for D(n) is given in (2.1),
|
| 515 |
+
and using that formula one can show that
|
| 516 |
+
(4.2)
|
| 517 |
+
2n−1 ≤ D(n) ≤ 2n,
|
| 518 |
+
with equality on the right if and only if n = 1 and on the left if and only if n = 2.
|
| 519 |
+
Lemma 4.4. For all n ≥ 5, we have g0,n ≥ 2.
|
| 520 |
+
Proof. In [37, Thm. 13], Morton gives an explicit formula for g0,n as well as the lower bound
|
| 521 |
+
g0,n ≥ 3
|
| 522 |
+
2 +
|
| 523 |
+
�1
|
| 524 |
+
4 − 1
|
| 525 |
+
n
|
| 526 |
+
�
|
| 527 |
+
2n − (n + 1)2n/2−1.
|
| 528 |
+
Rewriting the right-hand expression and using the assumption that n ≥ 5, we have
|
| 529 |
+
g0,n ≥ 3
|
| 530 |
+
2 + 2n/2−1
|
| 531 |
+
��1
|
| 532 |
+
4 − 1
|
| 533 |
+
5
|
| 534 |
+
�
|
| 535 |
+
2n/2+1 − (n + 1)
|
| 536 |
+
�
|
| 537 |
+
= 3
|
| 538 |
+
2 + 2n/2−1
|
| 539 |
+
� 1
|
| 540 |
+
102n/2 − (n + 1)
|
| 541 |
+
�
|
| 542 |
+
.
|
| 543 |
+
The expression
|
| 544 |
+
� 1
|
| 545 |
+
102n/2 − (n + 1)
|
| 546 |
+
�
|
| 547 |
+
is positive for all n ≥ 15, so for all such n we have
|
| 548 |
+
g0,n > 3/2, hence g0,n ≥ 2. Finally, using the explicit formula for g0,n given by Morton,
|
| 549 |
+
we can exactly compute g0,n for all 1 ≤ n ≤ 14, and we find that g0,n < 2 if and only if
|
| 550 |
+
1 ≤ n ≤ 4, in which case g0,n = 0.
|
| 551 |
+
□
|
| 552 |
+
Lemma 4.5. Let n ≥ 6, and let Rn be the ramification divisor of πn. Then deg Rn > 4n.
|
| 553 |
+
Proof. It suffices to replace Rn with R0
|
| 554 |
+
n, the restriction of the ramification divisor to points
|
| 555 |
+
that do not map to ∞ under c1,n. The ramification divisors of the maps c1,n and c0,n are
|
| 556 |
+
explicitly computed by Morton in [37, Thms. 11, 13], from which it follows that
|
| 557 |
+
(4.3)
|
| 558 |
+
deg R0
|
| 559 |
+
n = 1
|
| 560 |
+
2
|
| 561 |
+
�
|
| 562 |
+
d|n
|
| 563 |
+
d<n
|
| 564 |
+
D(d)ϕ(n/d)(n − d).
|
| 565 |
+
If n is prime, then
|
| 566 |
+
deg R0
|
| 567 |
+
n = 1
|
| 568 |
+
2D(1)ϕ(n)(n − 1) = (n − 1)2,
|
| 569 |
+
|
| 570 |
+
12
|
| 571 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 572 |
+
which is greater than 4n when n ≥ 6. If n is composite, then let m be the largest proper
|
| 573 |
+
divisor of n. Since √n ≤ m ≤ n/2, we have
|
| 574 |
+
deg R0
|
| 575 |
+
n ≥ 1
|
| 576 |
+
2D(m)ϕ(n/m)(n − m)
|
| 577 |
+
> 2m−2ϕ(n/m)n
|
| 578 |
+
2
|
| 579 |
+
(by (4.2))
|
| 580 |
+
≥ 2
|
| 581 |
+
√n−3ϕ(n/m)n.
|
| 582 |
+
For all n ≥ 25, we have 2
|
| 583 |
+
√n−3 ≥ 4, thus deg R0
|
| 584 |
+
n > 4n. An explicit computation of deg R0
|
| 585 |
+
n
|
| 586 |
+
for all 6 ≤ n ≤ 25 (using (4.3)) completes the proof.
|
| 587 |
+
□
|
| 588 |
+
Proposition 4.6. Let n ≥ 5. Then X1(n) has only finitely many quadratic points.
|
| 589 |
+
Remark 4.7. The fact that X1(n) has only finitely many quadratic points for sufficiently
|
| 590 |
+
large n follows from Theorem 1.8, together with [14, Thm.
|
| 591 |
+
1.1], which states that the
|
| 592 |
+
gonality of X1(n) tends to infinity with n. For our purposes, however, we need the more
|
| 593 |
+
precise statement of Proposition 4.6.
|
| 594 |
+
Proof of Proposition 4.6. By Theorem 1.8, it suffices to show that for n ≥ 5, the curve X1(n)
|
| 595 |
+
does not admit a degree-2 map to a curve of genus at most 1.
|
| 596 |
+
Let ϕ : X1(n) → C be a dominant morphism, where C is a curve of genus gC ≤ 1. We
|
| 597 |
+
claim that d := deg ϕ > 2.
|
| 598 |
+
First, suppose n ≥ 6.
|
| 599 |
+
In order to apply the Castelnuovo–Severi inequality (Proposi-
|
| 600 |
+
tion 3.4), we consider two cases.
|
| 601 |
+
Case 1: Suppose there is a curve Y such that both πn : X1(n) → X0(n) and ϕ : X1(n) →
|
| 602 |
+
C factor through a map ψ : X1(n) → Y of degree at least 2. Since Y covers X0(n), we have
|
| 603 |
+
gY ≥ 2 > gC by Lemma 4.4, hence the map Y → C has degree at least 2. Therefore, d ≥ 4.
|
| 604 |
+
Case 2: Now suppose that there is no such curve Y , so that we can apply the Castelnuovo–
|
| 605 |
+
Severi inequality to the maps ϕ and πn to get
|
| 606 |
+
g1,n ≤ ng0,n + dgC + (n − 1)(d − 1).
|
| 607 |
+
Rewriting this, we have
|
| 608 |
+
g1,n − ng0,n + n − 1 ≤ d(gC + n − 1).
|
| 609 |
+
By the Riemann–Hurwitz formula, the left hand side is equal to half the degree of the
|
| 610 |
+
ramification divisor Rn, so by Lemma 4.5 we have
|
| 611 |
+
d(gC + n − 1) > 2n.
|
| 612 |
+
Since we assumed gC ≤ 1, this implies that d > 2.
|
| 613 |
+
Finally, we consider n = 5. A calculation in Magma [4] shows that the map X1(5) → P1
|
| 614 |
+
given by Φ2(c, z) = z2 + z + c + 1 has degree 7. If ϕ factors through Φ2, then d ≥ 7. If
|
| 615 |
+
not, then ϕ and Φ2 do not simultaneously factor through a nontrivial intermediate map
|
| 616 |
+
X1(5) → Y , since Φ2 has prime degree. By the Castelnuovo–Severi inequality, we have
|
| 617 |
+
g1,5 ≤ dgC + 6(d − 1).
|
| 618 |
+
The curve X1(5) has genus g1,5 = 14, and we assumed gC ≤ 1, so it follows that d > 2.
|
| 619 |
+
□
|
| 620 |
+
|
| 621 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 622 |
+
13
|
| 623 |
+
•
|
| 624 |
+
•
|
| 625 |
+
•
|
| 626 |
+
•
|
| 627 |
+
•
|
| 628 |
+
•
|
| 629 |
+
•
|
| 630 |
+
•
|
| 631 |
+
•
|
| 632 |
+
•
|
| 633 |
+
•
|
| 634 |
+
Figure 2. The portrait 10(4)
|
| 635 |
+
Remark 4.8. The fact that Φ2 has low degree on X1(5) seems related to the fact that, as
|
| 636 |
+
polynomials in Q[c, z], the dynatomic polynomials Φ2 and Φ5 have no common zeros (c, z).
|
| 637 |
+
In particular, all zeros and poles of Φ2 on X1(5) lie above ∞, which restricts the possible
|
| 638 |
+
number of such points.
|
| 639 |
+
4.2. Generic quadratic portraits properly containing the portraits in Γ1 and Γ2.
|
| 640 |
+
By enumerating portraits with few vertices, one finds that any generic quadratic portrait P
|
| 641 |
+
that has its cycle structure listed in (4.1), but which is not contained in Γ, must properly
|
| 642 |
+
contain a portrait from Γ1 or Γ2, and moreover, P must have a subportrait isomorphic to
|
| 643 |
+
one of the following portraits:
|
| 644 |
+
(4.4)
|
| 645 |
+
10(1,1)a/b, 10(2), 10(3)a/b, 10(4), 12(2,1,1)a/b, or Gn for some 1 ≤ n ≤ 10.
|
| 646 |
+
All portraits listed above appear in Appendix B except 10(4), which is the label we give to
|
| 647 |
+
the subportrait of 12(4) shown in Figure 2.
|
| 648 |
+
Proposition 4.9. For each of the portraits P appearing in (4.4), the curve X1(P) has only
|
| 649 |
+
finitely many quadratic points.
|
| 650 |
+
The cases P = 10(1, 1)b and P = 10(2) form the majority of the proof of Proposition 4.9.
|
| 651 |
+
We include only the proof for 10(1, 1)b, as the argument for 10(2) is very similar.
|
| 652 |
+
Lemma 4.10. Let C ⊂ Spec Q[x, z] be the curve of genus 5 defined by the equation
|
| 653 |
+
�
|
| 654 |
+
z2 − 2(x2 + 1)
|
| 655 |
+
�2 = 2(x2 − 1)2(x3 + x2 − x + 1).
|
| 656 |
+
Let (c, p) ∈ A2(K) be such that p has preperiod 4 and eventual period 1 for fc. Then there
|
| 657 |
+
exists a point (x, z) ∈ C(K) such that c = −2(x2 + 1)/(x2 − 1)2.
|
| 658 |
+
Proof. Let q = fc(p) = p2 + c, so that q has preperiod 3 (and still eventual period 1). A
|
| 659 |
+
calculation in [43, p. 22] shows that there is an element x ∈ K ∖ {±1} such that
|
| 660 |
+
c = −2(x2 + 1)
|
| 661 |
+
(x2 − 1)2
|
| 662 |
+
and q2 = 2(x3 + x2 − x + 1)
|
| 663 |
+
(x2 − 1)2
|
| 664 |
+
.
|
| 665 |
+
Hence we have
|
| 666 |
+
2(x3 + x2 − x + 1) = q2(x2 − 1)2 = (p2 + c)2(x2 − 1)2 =
|
| 667 |
+
�p2(x2 − 1)2 − 2(x2 + 1)
|
| 668 |
+
x2 − 1
|
| 669 |
+
�2
|
| 670 |
+
.
|
| 671 |
+
Letting z = p(x2 − 1) we obtain
|
| 672 |
+
�
|
| 673 |
+
z2 − 2(x2 + 1)
|
| 674 |
+
�2 = (x2 − 1)2 · 2(x3 + x2 − x + 1)
|
| 675 |
+
with x, z ∈ K. Thus (x, z) ∈ C(K).
|
| 676 |
+
□
|
| 677 |
+
|
| 678 |
+
14
|
| 679 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 680 |
+
Proposition 4.11. For the portraits P = 10(1, 1)b and P = 10(2), the set of quadratic
|
| 681 |
+
points on X1(P) is finite.
|
| 682 |
+
Proof. As mentioned above, we only give a proof for P = 10(1, 1)b. By Lemma 4.10, it
|
| 683 |
+
suffices to show that the curve C has only finitely many quadratic points. The latter curve
|
| 684 |
+
admits a dominant map to the elliptic curve with Weierstrass equation w2 = 2(x3+x2−x+1),
|
| 685 |
+
which is the modular curve Xell
|
| 686 |
+
1 (11). Explicitly, a natural map ϕ : C → Xell
|
| 687 |
+
1 (11) is given by
|
| 688 |
+
ϕ(x, z) =
|
| 689 |
+
�
|
| 690 |
+
x, z2 − 2(x2 + 1)
|
| 691 |
+
x2 − 1
|
| 692 |
+
�
|
| 693 |
+
.
|
| 694 |
+
The curve Xell
|
| 695 |
+
1 (11) has exactly four affine rational points, namely, (±1, ±2). Suppose
|
| 696 |
+
that (x, z) is a quadratic point on C with field of definition K. Then x /∈ {±1}, so the
|
| 697 |
+
point ϕ(x, z) cannot be a rational point on X1(11). Thus ϕ(x, z) is a quadratic point, and
|
| 698 |
+
K = Q(ϕ(x, z)). Letting
|
| 699 |
+
(4.5)
|
| 700 |
+
w = z2 − 2(x2 + 1)
|
| 701 |
+
x2 − 1
|
| 702 |
+
,
|
| 703 |
+
we therefore have w2 = 2(x3 + x2 − x + 1) and K = Q(x, w). We now consider two cases.
|
| 704 |
+
Suppose first that x ∈ Q. Then K = Q(w), and by (4.5) we have z2 = 2(x2+1)+(x2−1)w.
|
| 705 |
+
Applying the norm map NK/Q to this equation we obtain
|
| 706 |
+
y2 = 4(x2 + 1)2 − 2(x2 − 1)2(x3 + x2 − x + 1),
|
| 707 |
+
where y = NK/Q(z).
|
| 708 |
+
The above equation defines a hyperelliptic curve of genus 3, and
|
| 709 |
+
therefore has only finitely many rational solutions. We conclude that C has only finitely
|
| 710 |
+
many quadratic points with rational x-coordinate.
|
| 711 |
+
Now suppose that x /∈ Q, so that K = Q(x). By Lemma 3.3 applied to the equation
|
| 712 |
+
w2 = 2(x3 + x2 − x + 1), there is a rational number t and a point (x0, w0) ∈ {(±1, ±2)} such
|
| 713 |
+
that w = w0 + t(x − x0) and
|
| 714 |
+
(4.6)
|
| 715 |
+
x2 + 2x0 − t2 + 2
|
| 716 |
+
2
|
| 717 |
+
x + 2x2
|
| 718 |
+
0 + t2x0 + 2x0 − 2w0t − 2
|
| 719 |
+
2
|
| 720 |
+
= 0.
|
| 721 |
+
For each point (x0, w0) ∈ {(±1, ±2)} we consider the relation
|
| 722 |
+
(4.7)
|
| 723 |
+
z2 = 2(x2 + 1) + (x2 − 1)(w0 + t(x − x0)).
|
| 724 |
+
Using (4.6) we express the right-hand side of (4.7) as a linear combination of 1 and x.
|
| 725 |
+
Applying the norm map NK/Q and letting u = 2 · NK/Q(z), we obtain a relation of the
|
| 726 |
+
form u2 = g(t), where g is a polynomial of degree 7 with integral coefficients and nonzero
|
| 727 |
+
discriminant. Each of the resulting four equations u2 = g(t) defines a hyperelliptic curve of
|
| 728 |
+
genus 3, and therefore has only finitely many rational solutions. Since t has only finitely
|
| 729 |
+
many possible values, (4.6) implies the same for x. Therefore C has finitely quadratic points
|
| 730 |
+
with quadratic x-coordinate.
|
| 731 |
+
□
|
| 732 |
+
Proof of Proposition 4.9. The proposition has already been proven in [13] and [10] for all of
|
| 733 |
+
the portraits except 10(1, 1)b, 10(2), and 10(3)a/b. Moreover, Proposition 4.11 shows that
|
| 734 |
+
the statement is true for the portraits 10(1,1)b and 10(2), so all that remains is to show that
|
| 735 |
+
X1(P) has only finitely many quadratic points when P = 10(3)a or P = 10(3)b.
|
| 736 |
+
Each of the curves X1(P) with P = 10(3)a/b has genus 9, and each admits a degree-2
|
| 737 |
+
map ϕ to the genus-2 curve X1(P′), where P′ = 8(3). Now suppose we have a degree-d map
|
| 738 |
+
ψ : X1(P) → C, where C is a curve of genus gC ≤ 1. Then, by Proposition 3.4, either ψ
|
| 739 |
+
|
| 740 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 741 |
+
15
|
| 742 |
+
factors through ϕ, in which case deg ψ > deg ϕ = 2, or the Castelnuovo–Severi inequality
|
| 743 |
+
(3.1) applies to ϕ and ψ, in which case we have
|
| 744 |
+
4 + dgC + (d − 1) ≥ 9, hence d ≥
|
| 745 |
+
6
|
| 746 |
+
gC + 1 ≥ 3.
|
| 747 |
+
It follows that X1(P) is not hyperelliptic or bielliptic, hence X1(P) has only finitely many
|
| 748 |
+
quadratic points by Theorem 1.8.
|
| 749 |
+
□
|
| 750 |
+
4.3. Proof of Theorem 4.1. We now combine Propositions 4.6 and 4.9 to complete the
|
| 751 |
+
proof of Theorem 4.1, which in turn proves one direction of Theorem 1.5.
|
| 752 |
+
Proof of Theorem 4.1. As mentioned previously, the fact that X1(P) has infinitely many
|
| 753 |
+
quadratic points for each P ∈ Γ follows from the work of Walde–Russo [48] and Poonen
|
| 754 |
+
[43]. Now suppose P is a generic quadratic portrait such that X1(P) has infinitely many
|
| 755 |
+
quadratic points.
|
| 756 |
+
Proposition 4.6 asserts that P cannot have a cycle of length n ≥ 5;
|
| 757 |
+
combining this with the paragraph following Definition 4.3, the cycle structure of P must be
|
| 758 |
+
one of those appearing in (4.1). By simply enumerating all small generic quadratic portraits
|
| 759 |
+
with the allowable cycle structures, one finds that if P is not contained in Γ, then P has
|
| 760 |
+
a subportrait isomorphic to one of the portraits listed in (4.4), hence there is a dominant
|
| 761 |
+
morphism X1(P) → X1(P′) for some P′ in that list. Proposition 4.9 shows that each such
|
| 762 |
+
X1(P′) has only finitely many quadratic points, hence X1(P) does as well.
|
| 763 |
+
□
|
| 764 |
+
5. Preperiodic portraits realized infinitely often over quadratic fields
|
| 765 |
+
In this section, we show that if P ∈ Γ, then there are infinitely many c ∈ Q such that
|
| 766 |
+
G(fc, K) ∼= P for some quadratic field K. We also determine for which portraits P the same
|
| 767 |
+
is true for infinitely many c ∈ Q(2) ∖ Q.
|
| 768 |
+
It follows from Theorem 4.1 that Γ is precisely the set of generic quadratic portraits that
|
| 769 |
+
can be realized infinitely often as a subportrait of G(fc, K); the difficulty is in proving that
|
| 770 |
+
we infinitely often have equality. This step requires two main tools: The first is Hilbert
|
| 771 |
+
irreducibility, and the second is a dynamical result giving an upper bound for the lengths of
|
| 772 |
+
periodic cycles of maps over number fields that depends only on the primes of bad reduction
|
| 773 |
+
of those maps; see, for example, [42,45,49].
|
| 774 |
+
Proposition 5.1. Let K be a number field, and let p ∈ Spec OK be a prime ideal of norm q.
|
| 775 |
+
There exists a bound B := B(q) such that if c ∈ K and vp(c) ≥ 0, then fc has no K-rational
|
| 776 |
+
points of period larger than B.
|
| 777 |
+
We will also repeatedly use the observation that given any portrait P and any bound C,
|
| 778 |
+
there are only finitely many generic portraits P′ that are minimal (relative to inclusion)
|
| 779 |
+
among those generic portraits containing P and have no cycles of length larger than C. This
|
| 780 |
+
is more or less due to the fact that there are only finitely many generic quadratic portraits
|
| 781 |
+
with a given number of vertices.
|
| 782 |
+
5.1. Rational c-values. For any c ∈ Q, there are infinitely many quadratic fields K for
|
| 783 |
+
which G(fc, K) ∼= G(fc, Q).
|
| 784 |
+
This is a consequence of Northcott’s theorem: The set of
|
| 785 |
+
preperiodic points for fc has bounded height, hence there are only finitely many preperiodic
|
| 786 |
+
points which are quadratic over Q, and therefore only finitely many quadratic fields over
|
| 787 |
+
which fc gains new preperiodic points.
|
| 788 |
+
|
| 789 |
+
16
|
| 790 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 791 |
+
Table
|
| 792 |
+
1. For
|
| 793 |
+
each
|
| 794 |
+
pair
|
| 795 |
+
(P, P′),
|
| 796 |
+
there
|
| 797 |
+
is
|
| 798 |
+
a
|
| 799 |
+
degree-2
|
| 800 |
+
morphism
|
| 801 |
+
X1(P) → X1(P′) defined over Q.
|
| 802 |
+
P
|
| 803 |
+
4(1,1)
|
| 804 |
+
4(2)
|
| 805 |
+
6(1,1)
|
| 806 |
+
6(2)
|
| 807 |
+
8(2,1,1)
|
| 808 |
+
P′
|
| 809 |
+
∅
|
| 810 |
+
∅
|
| 811 |
+
4(1,1)
|
| 812 |
+
4(2)
|
| 813 |
+
4(1,1) or 4(2)
|
| 814 |
+
In particular, if a portrait P is realized as G(fc, Q) for infinitely many c ∈ Q, then P must
|
| 815 |
+
also be realized as G(fc, K) for infinitely many c ∈ Q and, for each such c, infinitely many
|
| 816 |
+
quadratic fields K. The portraits realized infinitely often over Q are precisely the portraits
|
| 817 |
+
in Γ0; this is the main result of [16].
|
| 818 |
+
A more interesting problem, then, is to determine the set of portraits P for which there
|
| 819 |
+
are infinitely many c ∈ Q with G(fc, Q) ⊊ P but G(fc, K) ∼= P for some quadratic field K.
|
| 820 |
+
Proposition 5.2. Let P ∈ Γ. Then there exist infinitely many c ∈ Q such that G(fc, K) ∼= P
|
| 821 |
+
for some quadratic field K. Moreover, if P ∈ Γ ∖ {∅, 6(3)}, the infinitely many c ∈ Q may
|
| 822 |
+
be chosen so that
|
| 823 |
+
G(fc, Q) ⊊ G(fc, K) ∼= P.
|
| 824 |
+
Remark 5.3. The portraits ∅ and 6(3) are genuine exceptions to the second statement, as
|
| 825 |
+
asserted in Theorem 1.6 and proven in §5.3.
|
| 826 |
+
Proof of Proposition 5.2. It follows from the discussion preceding the statement of Proposi-
|
| 827 |
+
tion 5.2 that for both P = ∅ and P = 6(3), which are elements of Γ0, there are infinitely
|
| 828 |
+
many c ∈ Q such that G(fc, K) ∼= P for some quadratic field K. We henceforth assume
|
| 829 |
+
P ∈ Γ ∖ {∅, 6(3)} and prove the stronger statement that there are infinitely many c ∈ Q
|
| 830 |
+
such that G(fc, Q) ⊊ G(fc, K) ∼= P for some quadratic field K.
|
| 831 |
+
There is a model for X1(P) of the form y2 = F(x), with F(x) ∈ Q[x] nonconstant and
|
| 832 |
+
squarefree, such that the morphism c : X1(P) → P1 factors through x : X1(P) → P1. If
|
| 833 |
+
X1(P) has genus 0, this is because there is a proper (generic quadratic) subportrait P′ ⊊ P
|
| 834 |
+
for which the natural morphism
|
| 835 |
+
πP,P′ : X1(P) −→ X1(P′)
|
| 836 |
+
described in Proposition 2.6(b) has degree exactly 2; see Table 1 for the list of such pairs
|
| 837 |
+
(P, P′). For the curves of genus 1 or 2, explicit models are given in Appendix A.
|
| 838 |
+
Now fix a portrait P ∈ Γ ∖ {∅, 6(3)}, and let y2 = F(x) be the model for X1(P) described
|
| 839 |
+
in the previous paragraph. Choose any value of x0 ∈ Q, and choose a prime p ∈ Spec Z
|
| 840 |
+
of good reduction for c : X1(P) → P1 such that vp(c(x0)) ≥ 0. Let B = B(p2) be the
|
| 841 |
+
bound from Proposition 5.1, let P1, . . . , Pn be the generic quadratic portraits that properly
|
| 842 |
+
contain P and that have no cycles of length larger than B, and for each i = 1, . . . , n let
|
| 843 |
+
πi := πPi,P : X1(Pi) → X1(P) be the natural projection morphism from Proposition 2.6(b).
|
| 844 |
+
By Hilbert’s Irreducibility Theorem, the sets
|
| 845 |
+
{x ∈ Q :
|
| 846 |
+
�
|
| 847 |
+
F(x) ∈ Q}
|
| 848 |
+
and, for each i = 1, . . . , n,
|
| 849 |
+
�
|
| 850 |
+
x ∈ Q :
|
| 851 |
+
�
|
| 852 |
+
Q
|
| 853 |
+
�
|
| 854 |
+
π−1
|
| 855 |
+
i
|
| 856 |
+
�
|
| 857 |
+
x,
|
| 858 |
+
�
|
| 859 |
+
F(x)
|
| 860 |
+
��
|
| 861 |
+
: Q
|
| 862 |
+
�
|
| 863 |
+
≤ 2
|
| 864 |
+
�
|
| 865 |
+
,
|
| 866 |
+
are thin subsets of P1(Q). Since the residue class
|
| 867 |
+
[x0]p := {x ∈ P1(Q) : x ≡ x0 (mod p)}
|
| 868 |
+
|
| 869 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 870 |
+
17
|
| 871 |
+
is not thin, there are infinitely many x ∈ [x0]p such that K := Q
|
| 872 |
+
��
|
| 873 |
+
F(x)
|
| 874 |
+
�
|
| 875 |
+
is a quadratic
|
| 876 |
+
field and
|
| 877 |
+
�
|
| 878 |
+
x,
|
| 879 |
+
�
|
| 880 |
+
F(x)
|
| 881 |
+
�
|
| 882 |
+
∈ X1(P)(K) does not lift to a K-rational point on X1(Pi) for any
|
| 883 |
+
i = 1, . . . , n.
|
| 884 |
+
Now let c = c(x) for any of the infinitely many x from the previous paragraph. Excluding
|
| 885 |
+
at most finitely many x ∈ [x0]p, we may assume that G(fc, K) is a generic quadratic portrait.
|
| 886 |
+
Since c lifts to a quadratic point Q on X1(P), we have
|
| 887 |
+
G(fc, Q) ⊊ P ⊆ G(fc, K).
|
| 888 |
+
On the other hand, since c does not lift to a quadratic point on X1(Pi) for any i = 1, . . . , n,
|
| 889 |
+
the portrait G(fc, K) is either isomorphic to P or contains a cycle of length greater than B.
|
| 890 |
+
Finally, since vp(c) ≥ 0, G(fc, K) has no cycles of length greater than B, and thus we have
|
| 891 |
+
G(fc, Q) ⊊ G(fc, K) ∼= P.
|
| 892 |
+
□
|
| 893 |
+
5.2. Quadratic c-values. The purpose of this section is to determine which portraits P
|
| 894 |
+
may be realized infinitely often as G(fc, Q(c)) for some quadratic algebraic number c. We
|
| 895 |
+
begin with the simplest case, namely, where X1(P) has genus 0.
|
| 896 |
+
Proposition 5.4. Suppose P ∈ Γ0, and let K/Q be a quadratic field.
|
| 897 |
+
Then there are
|
| 898 |
+
infinitely many c ∈ K ∖ Q such that G(fc, K) ∼= P.
|
| 899 |
+
Proof. Let X := X1(P) ∼=Q P1. Choose an inert prime p ∈ Spec Z such that c : X → P1
|
| 900 |
+
has good reduction at p and such that p > D := deg(c : X → P1). Let p ∈ Spec OK be the
|
| 901 |
+
unique prime lying above p. The good reduction condition implies that the mod-p reduction
|
| 902 |
+
�c of the map c : X → P1 has degree D, and the condition that D < p implies that �c cannot
|
| 903 |
+
map all of P1(Fp2) to P1(Fp). In other words, we may choose a point P0 ∈ X(K) such that
|
| 904 |
+
�
|
| 905 |
+
c(P0) = �c(�
|
| 906 |
+
P0) ∈ P1(Fp2) ∖ P1(Fp). Note that since ∞ ∈ P1(Fp) and �
|
| 907 |
+
c(P0) /∈ P1(Fp), we must
|
| 908 |
+
have vp(c(P0)) ≥ 0. Then, for any P in the residue class [P0]p, c(P) must be in K ∖ Q,
|
| 909 |
+
and vp(c(P)) ≥ 0. In particular, for all P ∈ [P0]p, fc(P) has no K-rational points of period
|
| 910 |
+
greater than B = B(p2), the bound from Proposition 5.1.
|
| 911 |
+
Let P1, . . . , Pn be the complete list of generic quadratic portraits that minimally contain
|
| 912 |
+
P and which have no cycles of length larger than B, and for each i = 1, . . . , n let
|
| 913 |
+
πi := πPi,P : X1(Pi) −→ P1
|
| 914 |
+
be the morphism from Proposition 2.6(b). If P ∈ [P0]P and G(fc(P), K) properly contains
|
| 915 |
+
P, then G(fc(P), K) must contain one of the portraits Pi. By Hilbert irreducibility, the set
|
| 916 |
+
[P0]p ∖
|
| 917 |
+
n�
|
| 918 |
+
i=1
|
| 919 |
+
πi
|
| 920 |
+
�
|
| 921 |
+
X1(Pi)(K)
|
| 922 |
+
�
|
| 923 |
+
is infinite. Thus, there are infinitely many c ∈ K ∖ Q such that G(fc, K) ∼= P.
|
| 924 |
+
□
|
| 925 |
+
We now consider the portraits P ∈ Γ ∖ Γ0; that is, the portraits for which X1(P) has
|
| 926 |
+
genus 1 or 2. We begin with a useful consequence of Theorem 4.1.
|
| 927 |
+
Corollary 5.5. Let P be a generic quadratic portrait such that X1(P) has positive genus.
|
| 928 |
+
If P′ is any generic quadratic portrait properly containing P, then X1(P′) has finitely many
|
| 929 |
+
quadratic points.
|
| 930 |
+
|
| 931 |
+
18
|
| 932 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 933 |
+
Proof. If X1(P′) has infinitely many quadratic points, then so does X1(P), and therefore
|
| 934 |
+
both P and P′ are elements of Γ. By simply inspecting the portraits in Γ, the only way we
|
| 935 |
+
can have P, P′ ∈ Γ and P ⊊ P′ is if P ∈ Γ0; that is, if X1(P) has genus 0.
|
| 936 |
+
□
|
| 937 |
+
Combining Corollary 5.5 and Proposition 5.1 gives us the following sufficient condition for
|
| 938 |
+
P to be realized infinitely often as G(fc, K) over quadratic fields K. For an algebraic curve
|
| 939 |
+
X defined over a field k, we denote by X(k, 2) the set of all points on X of degree at most
|
| 940 |
+
2 over k. For a prime p ∈ Spec Z and an element α ∈ Q, the phrase “vp(α) ≥ 0” should be
|
| 941 |
+
read to mean “there exists some extension p ∈ Spec OQ(α) of p such that vp(α) ≥ 0.”
|
| 942 |
+
Lemma 5.6. Let P be a generic quadratic portrait such that X1(P) has genus 1 or 2. Fix
|
| 943 |
+
a prime p ∈ Spec Z, and consider the set
|
| 944 |
+
Sp,P := {β ∈ X1(P)(Q, 2) : vp(c(β)) ≥ 0}.
|
| 945 |
+
For all but finitely many β ∈ Sp,P, we have G(fc(β), Q(β)) ∼= P.
|
| 946 |
+
Proof. Suppose β ∈ Sp,P, set c := c(β), and let K := Q(β). Removing at most finitely many
|
| 947 |
+
points β ∈ Sp,P, we may assume that G(fc, K) is generic quadratic. Since β ∈ X1(P)(K)
|
| 948 |
+
and G(fc, K) is generic quadratic, G(fc, K) has a subportrait isomorphic to P.
|
| 949 |
+
Let p ∈ Spec OK be a prime lying above p. Since p has norm at most p2, the map fc
|
| 950 |
+
has no K-rational points of period larger than B := B(p2). Thus, as explained following
|
| 951 |
+
Proposition 5.1, if G(fc, K) ̸∼= P, then G(fc, K) must contain one of finitely many portraits
|
| 952 |
+
P1, . . . , Pn properly containing P. But each of the curves X1(Pi) has only finitely many
|
| 953 |
+
quadratic points by Corollary 5.5; this completes the proof.
|
| 954 |
+
□
|
| 955 |
+
Proposition 5.7. Let P ∈ Γrat. If K is a quadratic field and c ∈ K satisfies G(fc, K) ∼= P,
|
| 956 |
+
then c ∈ Q.
|
| 957 |
+
Proof. For P ∈ {8(4), 10(3, 1, 1), 10(3, 2)}, this follows immediately from Theorems 3.16,
|
| 958 |
+
3.25, and 3.28 of [13]. For the remaining portraits P—namely, 8(1,1)a and 8(2)a—the proofs
|
| 959 |
+
are similar, so we only provide the details for 8(1,1)a.
|
| 960 |
+
Let P = 8(1, 1)a. As shown in Appendix A, X1(P) is isomorphic to the elliptic curve E
|
| 961 |
+
with affine model y2 = x3 − x2 + x, which is the curve labeled 24A4 in [9] and 24.a5 in [31].
|
| 962 |
+
We claim that if P = (x, y) is a quadratic point on E, then c(P) = − (x2+1)2
|
| 963 |
+
4x(x−1)2 ∈ Q. This is
|
| 964 |
+
certainly the case if x ∈ Q, so assume that x is quadratic.
|
| 965 |
+
By Lemma 3.3, there exist P0 = (x0, y0) ∈ E(Q) ∖ ∞ and t ∈ Q such that
|
| 966 |
+
(5.1)
|
| 967 |
+
x2 + (x0 − t2 − 1)x + (x2
|
| 968 |
+
0 + t2x0 − x0 − 2y0t + 1) = 0.
|
| 969 |
+
The only affine rational points (x0, y0) on E are (0, 0) and (1, ±1), and for each of these
|
| 970 |
+
points we can use (5.1) to rewrite c(P) as a function of t and x which has degree at most 1
|
| 971 |
+
in x. For the points (0, 0), (1, 1), and (1, −1), respectively, we get
|
| 972 |
+
c = −
|
| 973 |
+
(t2 + 1)2
|
| 974 |
+
4(t − 1)(t + 1),
|
| 975 |
+
c = −t2 (t2 − 2t + 2)
|
| 976 |
+
4(t − 1)2
|
| 977 |
+
, and
|
| 978 |
+
c = −t2 (t2 + 2t + 2)
|
| 979 |
+
4(t + 1)2
|
| 980 |
+
.
|
| 981 |
+
In any case, since t ∈ Q, we must also have c ∈ Q.
|
| 982 |
+
□
|
| 983 |
+
|
| 984 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 985 |
+
19
|
| 986 |
+
Proposition 5.8. For all P ∈ Γ0 ∪ Γquad there exist infinitely many c ∈ Q(2) such that
|
| 987 |
+
G(fc, Q(c)) ∼= P.
|
| 988 |
+
Proof. For the portraits in Γ0, this follows from Proposition 5.4. The proofs for 8(1,1)b and
|
| 989 |
+
8(2)b (resp., 10(2,1,1)a and 10(2,1,1)b) are very similar, so we only provide the details for
|
| 990 |
+
8(1,1)b, 10(2,1,1)a, and 8(3).
|
| 991 |
+
First, let P be the portrait 8(1,1)b. Appendix A shows that X1(P) is isomorphic to the
|
| 992 |
+
curve X with affine model y2 = 2(x3 + x2 − x + 1), with c : X → P1 given by
|
| 993 |
+
c = −
|
| 994 |
+
2(x2 + 1)
|
| 995 |
+
(x + 1)2(x − 1)2.
|
| 996 |
+
Set P0 = (x0, y0) := (1, 2) ∈ X(Q). For t ∈ Q, the line y − 2 = t(x − 1) intersects the curve
|
| 997 |
+
X at P0 and two additional points Pt and P t. Since t and P0 are rational, either Pt and P t
|
| 998 |
+
are rational as well, or Pt and P t are quadratic conjugates. Since X(Q) is finite, we may,
|
| 999 |
+
at the expense of excluding finitely many t, assume that Pt and P t are quadratic Galois
|
| 1000 |
+
conjugates. Let K := Q(Pt), and let τ be the nontrivial element of Gal(K/Q). With this
|
| 1001 |
+
setup, we have Pt + P t = −P0 ̸= O, so y(Pt) ̸= −y(P t) = −y(Pt)τ, and therefore x(Pt) /∈ Q.
|
| 1002 |
+
By calculating the intersection of y − 2 = t(x − 1) with the affine curve X, we find that the
|
| 1003 |
+
minimal polynomial of x(Pt) must be
|
| 1004 |
+
x2 − t2 − 4
|
| 1005 |
+
2
|
| 1006 |
+
x + t2 − 4t + 2
|
| 1007 |
+
2
|
| 1008 |
+
.
|
| 1009 |
+
Thus, we may rewrite c(Pt) as
|
| 1010 |
+
c(Pt) =
|
| 1011 |
+
t + 2
|
| 1012 |
+
8(t − 2)x(Pt) − t5 − 10t3 + 8t2 + 8t + 32
|
| 1013 |
+
16(t − 2)2t
|
| 1014 |
+
.
|
| 1015 |
+
Finally, for any t ∈ Q with t ≡ 1 (mod 3), we see that x(Pt) and c(Pt) are integral at p = 3,
|
| 1016 |
+
so Pt ∈ S3,P. By Lemma 5.6, we conclude that there are infinitely many quadratic c with
|
| 1017 |
+
G(fc, Q(c)) ∼= P.
|
| 1018 |
+
Next, we let P be the portrait 10(2,1,1)a, and we take X to be the curve defined by
|
| 1019 |
+
y2 + xy + y = x3 − x2 − x with map c : X → P1 given by
|
| 1020 |
+
c =
|
| 1021 |
+
x − 2
|
| 1022 |
+
4x(x − 1)y − x4 − x3 + 3x − 1
|
| 1023 |
+
4x2(x − 1)
|
| 1024 |
+
.
|
| 1025 |
+
By Hilbert irreducibility, there are infinitely many points on X with x ∈ Q, x ≡ 2 (mod 3),
|
| 1026 |
+
and y /∈ Q. For all such points P = (x, y), c(P) must be quadratic, and we have P ∈ S3,P.
|
| 1027 |
+
The desired conclusion again follows from Lemma 5.6.
|
| 1028 |
+
Finally, we let P be the portrait 8(3). Let X be the curve y2 = x6−2x4+2x3+5x2+2x+1
|
| 1029 |
+
with c : X → P1 given by
|
| 1030 |
+
c = −x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
|
| 1031 |
+
4x2(x + 1)2
|
| 1032 |
+
.
|
| 1033 |
+
The curve X has two rational points at infinity; we denote these by ∞+ and ∞−. These two
|
| 1034 |
+
points are transposed by the hyperelliptic involution ι : X → X given by ι(x, y) = (x, −y).
|
| 1035 |
+
Let J be the Jacobian of the genus-2 curve X. For a thorough treatment of the arithmetic
|
| 1036 |
+
of genus-2 curves, we recommend [7]; here, we just summarize the necessary properties.
|
| 1037 |
+
|
| 1038 |
+
20
|
| 1039 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 1040 |
+
Points on J correspond to degree-0 divisor classes on X. Moreover, by the Riemann–Roch
|
| 1041 |
+
theorem, every nontrivial divisor class can be written uniquely as
|
| 1042 |
+
{P, Q} := [P + Q − ∞+ − ∞−]
|
| 1043 |
+
with P, Q ∈ X and Q ̸= ι(P), up to swapping P and Q. (The trivial class O is equal to
|
| 1044 |
+
{P, ι(P)} for all P ∈ X.) A point {P, Q} ̸= O is rational if and only if either P and Q are
|
| 1045 |
+
both rational themselves, or P and Q are Galois-conjugate quadratic points.
|
| 1046 |
+
Fix the point
|
| 1047 |
+
P0 :=
|
| 1048 |
+
�
|
| 1049 |
+
−1
|
| 1050 |
+
4
|
| 1051 |
+
�
|
| 1052 |
+
1 +
|
| 1053 |
+
√
|
| 1054 |
+
−15
|
| 1055 |
+
�
|
| 1056 |
+
, − 1
|
| 1057 |
+
16
|
| 1058 |
+
�
|
| 1059 |
+
17 + 9
|
| 1060 |
+
√
|
| 1061 |
+
−15
|
| 1062 |
+
��
|
| 1063 |
+
∈ X(Q, 2),
|
| 1064 |
+
for which we have c(P0) =
|
| 1065 |
+
1
|
| 1066 |
+
48
|
| 1067 |
+
�
|
| 1068 |
+
7 + 8√−15
|
| 1069 |
+
�
|
| 1070 |
+
/∈ Q. If we let
|
| 1071 |
+
P 0 :=
|
| 1072 |
+
�
|
| 1073 |
+
−1
|
| 1074 |
+
4
|
| 1075 |
+
�
|
| 1076 |
+
1 −
|
| 1077 |
+
√
|
| 1078 |
+
−15
|
| 1079 |
+
�
|
| 1080 |
+
, − 1
|
| 1081 |
+
16
|
| 1082 |
+
�
|
| 1083 |
+
17 − 9
|
| 1084 |
+
√
|
| 1085 |
+
−15
|
| 1086 |
+
��
|
| 1087 |
+
be the Galois conjugate of P0, then D0 := {P0, P 0} ∈ J(Q). Note that P 0 ̸= ι(P0), so
|
| 1088 |
+
D0 ̸= O. Poonen showed in [43, Prop. 1] that J(Q) ∼= Z, so D0 has infinite order.
|
| 1089 |
+
The curve X (hence also its Jacobian J) has good reduction at the prime p = 7. A straight-
|
| 1090 |
+
forward computation (e.g., in Magma) shows that the reduction �D0 ∈ J(F7) has order 21,
|
| 1091 |
+
so Dn := (1 + 21n)D0 ≡ D0 (mod 7) for all n ∈ Z. For each n we write Dn = {Pn, P n}
|
| 1092 |
+
with Pn ≡ P0 (mod 7) and P n ≡ P 0 (mod 7). We claim that Pn ∈ S7,P for all n ∈ Z, from
|
| 1093 |
+
which the result follows by Lemma 5.6.
|
| 1094 |
+
Since −15 ≡ −1 (mod 7) is not a square in F7, �
|
| 1095 |
+
P0 is quadratic over F7, thus the same is
|
| 1096 |
+
true for �
|
| 1097 |
+
Pn for all n ∈ Z. This implies that Pn is quadratic over Q for all n.
|
| 1098 |
+
The map c : X → P1 has good reduction at p = 7, so Pn ≡ P0 (mod 7) implies that
|
| 1099 |
+
c(Pn) ≡ c(P0) (mod 7). Arguing as in the previous paragraph, we conclude that c(Pn)
|
| 1100 |
+
is quadratic over Q. Finally, we note that since c(Pn) ≡ c(P0) ̸≡ ∞ (mod 7), we have
|
| 1101 |
+
v7(c(Pn)) ≥ 0, so Pn ∈ S7,P.
|
| 1102 |
+
□
|
| 1103 |
+
5.3. Proofs of Theorems 1.6 and 1.7.
|
| 1104 |
+
Proof of Theorem 1.6. That (ii) implies (i) is precisely the second statement in Proposi-
|
| 1105 |
+
tion 5.2, so it remains only to show that (i) implies (ii).
|
| 1106 |
+
Assume there are infinitely many c ∈ Q such that G(fc, Q) ⊊ G(fc, K) ∼= P for some
|
| 1107 |
+
quadratic field K.
|
| 1108 |
+
Every such occurrence of P as G(fc, K) yields a quadratic point on
|
| 1109 |
+
Y1(P), so there are infinitely many quadratic points on X1(P). Thus P ∈ Γ by Theorem 4.1.
|
| 1110 |
+
All that remains for us to show is that P cannot be isomorphic to ∅ or 6(3). Certainly
|
| 1111 |
+
one cannot have G(fc, Q) ⊊ G(fc, K) ∼= ∅, so we need only show that if c ∈ Q and K is a
|
| 1112 |
+
quadratic field with G(fc, K) ∼= 6(3), then in fact G(fc, Q) ∼= 6(3).
|
| 1113 |
+
Supposing that G(fc, K) ∼= 6(3), the map fc then has a period-3 point α ∈ K, and the six
|
| 1114 |
+
K-rational preperiodic points prescribed by the portrait 6(3) are ±α, ±fc(α), and ±f 2
|
| 1115 |
+
c (α).
|
| 1116 |
+
It therefore suffices to show that α ∈ Q.
|
| 1117 |
+
Let τ be the nontrivial element of the Galois group Gal(K/Q). Since fc is defined over Q,
|
| 1118 |
+
ατ is also a K-rational point of period 3, hence lies in the cycle {α, fc(α), f 2
|
| 1119 |
+
c (α)} (because
|
| 1120 |
+
|
| 1121 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 1122 |
+
21
|
| 1123 |
+
the portrait 6(3) has only one 3-cycle2). Write ατ = f k
|
| 1124 |
+
c (α) for some k ∈ {0, 1, 2}. Then
|
| 1125 |
+
α = (ατ)τ = f k
|
| 1126 |
+
c (ατ) = f 2k
|
| 1127 |
+
c (α).
|
| 1128 |
+
Since α has exact period 3, this implies that k = 0; that is, ατ = α. Thus α ∈ Q, and
|
| 1129 |
+
therefore G(fc, Q) ∼= 6(3).
|
| 1130 |
+
□
|
| 1131 |
+
Proof of Theorem 1.7. First suppose that (i) holds; i.e., there are infinitely many c ∈ Q(2) ∖ Q
|
| 1132 |
+
such that G(fc, Q(c)) ∼= P. The curve X1(P) then has infinitely many quadratic points, and
|
| 1133 |
+
therefore P ∈ Γ by Theorem 4.1. By Proposition 5.7, we must have
|
| 1134 |
+
P ∈ Γ ∖ Γrat = Γ0 ∪ Γquad.
|
| 1135 |
+
Thus, (i) implies (ii). The converse is precisely Proposition 5.8.
|
| 1136 |
+
□
|
| 1137 |
+
6. Fields of definition of quadratic points
|
| 1138 |
+
In this section we address the question of whether the existence of a given preperiodic
|
| 1139 |
+
portrait over a given quadratic field has implications regarding standard arithmetic invariants
|
| 1140 |
+
of that field. In particular, we focus on the portraits that occur infinitely often over quadratic
|
| 1141 |
+
fields, namely those in the set Γ.
|
| 1142 |
+
To be precise, we are interested in arithmetic invariants of the fields of definition of qua-
|
| 1143 |
+
dratic points on dynamical modular curves X1(P). To partially justify the transition from
|
| 1144 |
+
realizations of portraits to simply points on dynamical modular curves, we begin by proving
|
| 1145 |
+
the following result:
|
| 1146 |
+
Proposition 6.1. For a number field K and a generic quadratic portrait P, the following
|
| 1147 |
+
are equivalent:
|
| 1148 |
+
(i) There exist infinitely many c ∈ K such that G(fc, K) ∼= P.
|
| 1149 |
+
(ii) The curve X1(P) has infinitely many K-rational points.
|
| 1150 |
+
Proof. That (i) implies (ii) is immediate from the definition of X1(P), so suppose that
|
| 1151 |
+
X1(P)(K) is infinite. Since X1(P) is irreducible (see Proposition 2.6(a)), this implies that
|
| 1152 |
+
X1(P) is isomorphic over K either to P1 or to an elliptic curve.
|
| 1153 |
+
In the former case, the result follows from essentially the same proof as for Proposition 5.4.
|
| 1154 |
+
In fact, the appropriate modification of that proof shows that there are infinitely many c ∈ K
|
| 1155 |
+
such that Q(c) = K and such that G(fc, K) ∼= P.
|
| 1156 |
+
In the latter case, choose a non-torsion point Q0 ∈ X1(P)(K), and choose a prime p ∈
|
| 1157 |
+
Spec OK of good reduction for the morphism c : X1(P) → P1 such that vp(Q0) ≥ 0. Since Q0
|
| 1158 |
+
is non-torsion, there are infinitely many points Q ∈ X1(P)(K) such that Q ≡ Q0 (mod p),
|
| 1159 |
+
and since the morphism c has good reduction at p, we have c(Q) ≡ c(Q0) (mod p) for every
|
| 1160 |
+
such Q. In particular, we have infinitely many Q ∈ X1(P)(K) such that vp(c(Q)) ≥ 0, so
|
| 1161 |
+
the desired result follows from Lemma 5.6.
|
| 1162 |
+
□
|
| 1163 |
+
We now move on to a result concerning the splitting of rational primes in the quadratic
|
| 1164 |
+
fields over which the portrait 10(3, 1, 1) is realized as a preperiodic portrait. This example
|
| 1165 |
+
is included in order to illustrate our methods, but similar reasoning can be applied to any
|
| 1166 |
+
portrait in Γ for which the corresponding modular curve is hyperelliptic.
|
| 1167 |
+
2In fact, if K is any quadratic field and c ∈ K, then fc has at most one 3-cycle defined pointwise over K.
|
| 1168 |
+
This follows from [36, Thm. 3] when c ∈ Q and [10, Thm. 4.5] in general.
|
| 1169 |
+
|
| 1170 |
+
22
|
| 1171 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 1172 |
+
As noted in [43], the dynamical modular curve corresponding to the portrait 10(3, 1, 1)
|
| 1173 |
+
is isomorphic to Xell
|
| 1174 |
+
1 (18). If K is the field of definition of a quadratic point on this curve,
|
| 1175 |
+
Kenku and Momose [26, Prop. 2.4] show that
|
| 1176 |
+
• either 2 splits or 3 does not split in K;
|
| 1177 |
+
• 3 is not inert in K; and
|
| 1178 |
+
• 5 and 7 are unramified in K.
|
| 1179 |
+
In what follows, for every polynomial f ∈ Z[x], we denote by πf the set of all integer primes
|
| 1180 |
+
p such that f does not have a root modulo p. Extending the results of Kenku and Momose,
|
| 1181 |
+
we prove the following. (Note that this proves Theorem 1.10.)
|
| 1182 |
+
Theorem 6.2. Let K be a quadratic field such that G(fc, K) ∼= 10(3, 1, 1) for some c ∈ K.
|
| 1183 |
+
Then the prime 2 splits in K, 3 is not inert in K, and letting
|
| 1184 |
+
f(x) = x6 + 2x5 + 5x4 + 10x3 + 10x2 + 4x + 1,
|
| 1185 |
+
every prime in the set πf (which includes 5 and 7) is unramified in K. Moreover, πf has
|
| 1186 |
+
Dirichlet density 13/18.
|
| 1187 |
+
For every nonzero rational number r, we let sqf(r) denote the squarefree part of r, i.e.,
|
| 1188 |
+
the unique squarefree integer d such that r/d is the square of a rational number.
|
| 1189 |
+
Lemma 6.3. Let f ∈ Z[x] be a monic polynomial of even degree, and let p be an odd prime.
|
| 1190 |
+
If p ∈ πf, then p is unramified in every quadratic field of the form Q(
|
| 1191 |
+
�
|
| 1192 |
+
f(r)) with r ∈ Q.
|
| 1193 |
+
Proof. Given a quadratic field K = Q(
|
| 1194 |
+
�
|
| 1195 |
+
f(r)), we must show that p does not divide the
|
| 1196 |
+
discriminant of K. Let D = sqf(f(r)), so that K = Q(
|
| 1197 |
+
√
|
| 1198 |
+
D). Since p is odd, it suffices to
|
| 1199 |
+
show that p does not divide D. Set g(x, y) = y2kf(x/y) ∈ Z[x, y], where deg(f) = 2k, and
|
| 1200 |
+
write r = n/d with gcd(n, d) = 1. Then D = sqf(g(n, d)), so that
|
| 1201 |
+
g(n, d) = Ds2,
|
| 1202 |
+
s ∈ Z.
|
| 1203 |
+
We now consider two cases. If d ≡ 0 mod p, then the above equation can be reduced
|
| 1204 |
+
modulo p to obtain n2k ≡ Ds2 mod p. Since p cannot divide n (given that n and d are
|
| 1205 |
+
coprime), we conclude that p does not divide D, as required.
|
| 1206 |
+
Suppose now that d ̸≡ 0 mod p. We can then consider the equation d2kf(n/d) = Ds2 as
|
| 1207 |
+
taking place in the ring Zp. If p | D, then reducing modulo p we obtain f(n/d) ≡ 0 mod p,
|
| 1208 |
+
contradicting the hypothesis that f has no root modulo p. Therefore p cannot divide D.
|
| 1209 |
+
□
|
| 1210 |
+
Proof of Theorem 6.2. By [13, Thm. 3.25], we have K = Q(
|
| 1211 |
+
�
|
| 1212 |
+
f(r)) for some r ∈ Q∖{0, −1}.
|
| 1213 |
+
Writing r = n/d in lowest terms, it follows that K = Q(
|
| 1214 |
+
�
|
| 1215 |
+
g(n, d)), where
|
| 1216 |
+
g(n, d) := d6f(n/d) = n6 + 2n5d + 5n4d2 + 10n3d3 + 10n2d4 + 4nd5 + d6.
|
| 1217 |
+
We claim that g(n, d) ≡ 1 mod 8. If n, d are both odd, then
|
| 1218 |
+
g(n, d) ≡ 1 + 2nd + 5 + 10nd + 10 + 4nd + 1 = 17 + 16nd ≡ 1 mod 8.
|
| 1219 |
+
If n is even and d is odd, then g(n, d) ≡ d6 ≡ 1 mod 8. If n is odd and d is even, then
|
| 1220 |
+
g(n, d) ≡ 1 + 2nd + 5d2 mod 8. Writing n = 2k + 1 for some integer k we see that
|
| 1221 |
+
g(n, d) ≡ 5d2 + 2d + 1 ≡ (d + 1)2 ≡ 1 mod 8,
|
| 1222 |
+
which proves the claim. Letting D = sqf(g(n, d)), the fact that g(n, d) ≡ 1 (mod 8) implies
|
| 1223 |
+
that D ≡ 1 mod 8 and therefore 2 splits in Q(
|
| 1224 |
+
√
|
| 1225 |
+
D) = K.
|
| 1226 |
+
|
| 1227 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 1228 |
+
23
|
| 1229 |
+
Similar reasoning shows that g(n, d) is congruent to either 0 or 1 modulo 3. Considering
|
| 1230 |
+
all possible values of n and d modulo 9, we find that if g(n, d) is divisible by 9, then n and
|
| 1231 |
+
d are both divisible by 3, which is a contradiction; hence 9 ∤ g(n, d). Writing g(n, d) = Ds2
|
| 1232 |
+
for some integer s, this implies that s is not divisible by 3, and therefore g(n, d) ≡ D mod 3.
|
| 1233 |
+
Hence, D is congruent to 0 or 1 modulo 3, and therefore 3 is not inert in K.
|
| 1234 |
+
A computation in Magma based on [27, Thm. 2.1] shows that πf has Dirichlet density
|
| 1235 |
+
13/18. Finally, Lemma 6.3 implies that every odd prime in πf is unramified in K, and we
|
| 1236 |
+
have already shown that 2 is unramified in K.
|
| 1237 |
+
□
|
| 1238 |
+
An argument very similar to the proof of Theorem 6.2 yields the following result, in which
|
| 1239 |
+
the relevant dynamical modular curve is known to be isomorphic to Xell
|
| 1240 |
+
1 (13).
|
| 1241 |
+
Theorem 6.4. Let K be a quadratic field such that G(fc, K) ∼= 10(3, 2) for some c ∈ K.
|
| 1242 |
+
Then the prime 2 splits in K, and every prime in πf is unramified in K, where
|
| 1243 |
+
f(x) = x6 + 2x5 + x4 + 2x3 + 6x2 + 4x + 1.
|
| 1244 |
+
Moreover, the set πf has Dirichlet density 13/18.
|
| 1245 |
+
Our next result concerns the curve Xell
|
| 1246 |
+
1 (16), which is isomorphic to the modular curve for
|
| 1247 |
+
the portrait 8(4); see Section 3.7 of [13]. In contrast to Theorems 6.2 and 6.4, we show that
|
| 1248 |
+
the discriminants of quadratic fields defined by points on Xell
|
| 1249 |
+
1 (16) are not restricted to any
|
| 1250 |
+
residue class. (Note that this proves Theorem 1.9(a).)
|
| 1251 |
+
Theorem 6.5. Let P denote the portrait 8(4). For every prime integer p and every residue
|
| 1252 |
+
class c ∈ Z/pZ, there exist infinitely many squarefree integers d ∈ c such that the curve
|
| 1253 |
+
X1(P) has a quadratic point defined over the field Q(
|
| 1254 |
+
√
|
| 1255 |
+
d).
|
| 1256 |
+
For the proof of the theorem we use the methods of [28] and [29]; the following lemma,
|
| 1257 |
+
which follows from Proposition 14 in [29], collects the main tools to be used.
|
| 1258 |
+
Lemma 6.6. Let f ∈ Z[x] be a squarefree polynomial of degree at least 3, and such that
|
| 1259 |
+
every irreducible factor of f has degree at most 6. Let
|
| 1260 |
+
S(f) = {sqf(f(x)) : x ∈ Q and f(x) ̸= 0}.
|
| 1261 |
+
Let D be the largest integer dividing all integer values of f. Fix a prime p such that f has
|
| 1262 |
+
an irreducible factor whose discriminant is not divisible by p, and let ε = εp ∈ {0, 1} be
|
| 1263 |
+
the parity of ordp(D). Finally, for c ∈ Z/pZ and v ∈ Z, let σ(p, c, v) denote the following
|
| 1264 |
+
statement.
|
| 1265 |
+
(6.1)
|
| 1266 |
+
σ(p, c, v) :
|
| 1267 |
+
�
|
| 1268 |
+
�
|
| 1269 |
+
�
|
| 1270 |
+
�
|
| 1271 |
+
�
|
| 1272 |
+
There exist h ∈ c and x0, y0 ∈ Z satisfying
|
| 1273 |
+
• hy2
|
| 1274 |
+
0 ≡ f(x0) (mod p2(v+ε)+1) and
|
| 1275 |
+
• ordp(y0) = v + ε.
|
| 1276 |
+
Suppose c is nonzero and σ(p, c, v) holds for some v ≥ 0. Then the set S(f) ∩ c is infinite.
|
| 1277 |
+
Proof of Theorem 6.5. By [38, p. 93], the curve X1(P) is hyperelliptic and has an affine
|
| 1278 |
+
model given by y2 = f(x), where f(x) = −x(x2 + 1)(x2 − 2x − 1).
|
| 1279 |
+
In order to prove the theorem it suffices to show that, for every prime p and residue class
|
| 1280 |
+
c ∈ Z/pZ, the set S(f)∩c is infinite. Indeed, if d belongs to this set, we may write dy2
|
| 1281 |
+
0 = f(x0)
|
| 1282 |
+
for some rational numbers x0, y0 with y0 ̸= 0. The pair (x0, y0
|
| 1283 |
+
√
|
| 1284 |
+
d) then represents a quadratic
|
| 1285 |
+
point on X1(P) whose field of definition is Q(
|
| 1286 |
+
√
|
| 1287 |
+
d). Hence, the theorem follows.
|
| 1288 |
+
|
| 1289 |
+
24
|
| 1290 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 1291 |
+
In the notation of Lemma 6.6, for the above polynomial f(x) we have D = 2; moreover,
|
| 1292 |
+
the irreducible factor x of f(x) has discriminant 1, which is coprime to every prime p. It
|
| 1293 |
+
follows in particular that
|
| 1294 |
+
εp =
|
| 1295 |
+
�
|
| 1296 |
+
0
|
| 1297 |
+
if p is odd,
|
| 1298 |
+
1
|
| 1299 |
+
if p = 2.
|
| 1300 |
+
Fix a prime p. For the class c = 0 ∈ Z/pZ, Theorem 2.1 in [28] implies that the set
|
| 1301 |
+
S(f) ∩ c is infinite, as desired. (When p = 2, the hypotheses of the cited theorem are not all
|
| 1302 |
+
satisfied, but the proof still applies.) Next, we claim that
|
| 1303 |
+
for every nonzero c ∈ Z/pZ, either σ(p, c, 0) or σ(p, c, 1) must hold.
|
| 1304 |
+
Assuming this claim for the moment, Lemma 6.6 implies that the set S(f) ∩ c is infinite,
|
| 1305 |
+
completing the proof of the theorem.
|
| 1306 |
+
To prove the claim we consider first the case p = 2: taking c = 1, the statement σ(p, c, 1)
|
| 1307 |
+
can be shown to hold by setting (h, x0, y0) = (1, 16, 4) in (6.1). The remainder of the proof
|
| 1308 |
+
is divided into three cases.
|
| 1309 |
+
Case p ≤ 5: Taking p = 3, we check that σ(p, c, 1) holds for c = 1, 2 by using the tuples
|
| 1310 |
+
(h, x0, y0) = (1, 9, 3)
|
| 1311 |
+
and
|
| 1312 |
+
(h, x0, y0) = (2, 18, 3).
|
| 1313 |
+
Similarly, taking p = 5, we check that σ(p, c, 1) holds for c = 1, 2, 3, 4, respectively, by using
|
| 1314 |
+
the following tuples (h, x0, y0):
|
| 1315 |
+
(1, 25, 5), (2, 18, 5), (3, 75, 5), (4, 7, 5).
|
| 1316 |
+
In the remaining two cases we show that σ(p, c, 0) holds. For r ∈ c, let Xr be the hy-
|
| 1317 |
+
perelliptic curve over Fp defined by the equation ry2 = f(x). Since εp = 0, the statement
|
| 1318 |
+
σ(p, c, 0) is equivalent to the requirement that Xr have an affine point (x0, y0) ∈ Xr(Fp) with
|
| 1319 |
+
y0 ̸= 0; we refer to such points as nontrivial points on Xr. Thus, it remains to show that Xr
|
| 1320 |
+
has at least one nontrivial point.
|
| 1321 |
+
Case 7 ≤ p ≤ 23: A straightforward search for points verifies that #Xr(Fp) ≥ 7 for every
|
| 1322 |
+
nonzero r ∈ Fp. (Note that it suffices to check this for just two values of r, one in each
|
| 1323 |
+
square class modulo p.) The number of affine points (x0, y0) ∈ Xr(Fp) having y0 = 0 is at
|
| 1324 |
+
most 5, so there must exist at least one nontrivial point in Xr(Fp), as required.
|
| 1325 |
+
Case p ≥ 29: For r ∈ Fp ∖ 0, the curve Xr has genus 2, so the Hasse–Weil bound yields
|
| 1326 |
+
#Xr(Fp) ≥ ⌊p + 1 − 4√p⌋ ≥ 7.
|
| 1327 |
+
The same reasoning as in the previous case implies that Xr has a nontrivial Fp-point.
|
| 1328 |
+
□
|
| 1329 |
+
We end the paper by proving Theorem 1.9(b).
|
| 1330 |
+
Proposition 6.7. Let P = 8(4). There exist infinitely many imaginary quadratic fields K
|
| 1331 |
+
with class number divisible by 10, such that X1(P) has a quadratic point defined over K.
|
| 1332 |
+
Proof. As noted earlier, the curve X1(P) is isomorphic to Xell
|
| 1333 |
+
1 (16). The result follows from
|
| 1334 |
+
[20, Cor. 3.2], since the Jacobian J1(16) has a rational torsion point of order 10.
|
| 1335 |
+
□
|
| 1336 |
+
Remark 6.8. Experimental evidence supports a statement stronger than Proposition 6.7:
|
| 1337 |
+
for every imaginary quadratic field K ̸= Q(√−15) that is the field of definition of a point on
|
| 1338 |
+
X1(P), the class number of K is divisible by 10. One approach to proving this is suggested
|
| 1339 |
+
by the methods of [2, 20]; however, the required computational tools (in particular, for
|
| 1340 |
+
computing quotients of abelian varieties) do not seem to be presently available.
|
| 1341 |
+
|
| 1342 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 1343 |
+
25
|
| 1344 |
+
Appendix A. Dynamical modular curves of genera 1 and 2
|
| 1345 |
+
We provide here models for all dynamical modular curves X1(P) of genus 1 or 2, together
|
| 1346 |
+
with an explicit description of the morphism c : X1(P) → P1. Each of these models appears
|
| 1347 |
+
in [43]. Note that in some cases we provide two models—one of the form y2 = F(x), and
|
| 1348 |
+
another that turns out to be more useful for certain aspects of our proofs.
|
| 1349 |
+
Portrait P
|
| 1350 |
+
Model(s) for X1(P)
|
| 1351 |
+
Morphism c : X1(P) → P1
|
| 1352 |
+
8(1,1)a
|
| 1353 |
+
y2 = x3 − x2 + x
|
| 1354 |
+
− (x2 + 1)2
|
| 1355 |
+
4x(x − 1)2
|
| 1356 |
+
8(1,1)b
|
| 1357 |
+
y2 = 2(x3 + x2 − x + 1)
|
| 1358 |
+
−
|
| 1359 |
+
2(x2 + 1)
|
| 1360 |
+
(x + 1)2(x − 1)2
|
| 1361 |
+
8(2)a
|
| 1362 |
+
y2 = x3 − 2x + 1
|
| 1363 |
+
−(x2 − 2x + 2)(x2 + 2x − 2)
|
| 1364 |
+
4x2(x − 1)
|
| 1365 |
+
8(2)b
|
| 1366 |
+
y2 = 2(x3 + x2 − x + 1)
|
| 1367 |
+
−x4 + 2x3 + 2x2 − 2x + 1
|
| 1368 |
+
(x + 1)2(x − 1)2
|
| 1369 |
+
10(2,1,1)a
|
| 1370 |
+
y2 = 5x4 − 8x3 + 6x2 + 8x + 5
|
| 1371 |
+
−(3x2 + 1)(x2 + 3)
|
| 1372 |
+
4(x + 1)2(x − 1)2
|
| 1373 |
+
y2 + xy + y = x3 − x2 − x
|
| 1374 |
+
x − 2
|
| 1375 |
+
4x(x − 1)y − x4 − x3 + 3x − 1
|
| 1376 |
+
4x2(x − 1)
|
| 1377 |
+
10(2,1,1)b
|
| 1378 |
+
y2 = (5x2 − 1)(x2 + 3)
|
| 1379 |
+
−(3x2 + 1)(x2 + 3)
|
| 1380 |
+
4(x + 1)2(x − 1)2
|
| 1381 |
+
y2 + xy + y = x3 + x2
|
| 1382 |
+
−
|
| 1383 |
+
x + 2
|
| 1384 |
+
4x(x + 1)y − x4 + 4x3 + 6x2 + 3x + 1
|
| 1385 |
+
4x2(x + 1)
|
| 1386 |
+
8(3)
|
| 1387 |
+
y2 = x6 − 2x4 + 2x3 + 5x2 + 2x + 1
|
| 1388 |
+
−x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
|
| 1389 |
+
4x2(x + 1)2
|
| 1390 |
+
8(4)
|
| 1391 |
+
y2 = −x(x2 + 1)(x2 − 2x − 1)
|
| 1392 |
+
(x2 − 4x − 1)(x4 + x3 + 2x2 − x + 1)
|
| 1393 |
+
4x(x + 1)2(x − 1)2
|
| 1394 |
+
10(3,1,1)
|
| 1395 |
+
y2 = x6 + 2x5 + 5x4 + 10x3 + 10x2 + 4x + 1
|
| 1396 |
+
−x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
|
| 1397 |
+
4x2(x + 1)2
|
| 1398 |
+
10(3,2)
|
| 1399 |
+
y2 = x6 + 2x5 + x4 + 2x3 + 6x2 + 4x + 1
|
| 1400 |
+
−x6 + 2x5 + 4x4 + 8x3 + 9x2 + 4x + 1
|
| 1401 |
+
4x2(x + 1)2
|
| 1402 |
+
|
| 1403 |
+
26
|
| 1404 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 1405 |
+
Appendix B. Tables of preperiodic portraits
|
| 1406 |
+
B.1. Preperiodic portraits realized over quadratic fields. We list here the 46 portraits
|
| 1407 |
+
known to be realized as G(fc, K) for some quadratic field K and c ∈ K. These were found in
|
| 1408 |
+
the search described in [13]. The label of each portrait is in the form N(ℓ1, ℓ2, . . .), where N
|
| 1409 |
+
is the number of vertices in the portrait and ℓ1, ℓ2, . . . are the lengths of the directed cycles
|
| 1410 |
+
in the portrait in nonincreasing order. If more than one isomorphism class with this data
|
| 1411 |
+
was observed, we add a lowercase Roman letter to distinguish them. For example, the labels
|
| 1412 |
+
5(1,1)a and 5(1,1)b correspond to the two isomorphism classes of portraits observed that
|
| 1413 |
+
have five vertices and two fixed points. In all figures, we omit the vertex corresponding to
|
| 1414 |
+
the fixed point at infinity.
|
| 1415 |
+
0
|
| 1416 |
+
2(1)
|
| 1417 |
+
3(1,1)
|
| 1418 |
+
3(2)
|
| 1419 |
+
4(1)
|
| 1420 |
+
4(1,1)
|
| 1421 |
+
4(2)
|
| 1422 |
+
5(1,1)a
|
| 1423 |
+
5(1,1)b
|
| 1424 |
+
5(2)a
|
| 1425 |
+
5(2)b
|
| 1426 |
+
6(1,1)
|
| 1427 |
+
6(2)
|
| 1428 |
+
6(2,1)
|
| 1429 |
+
6(3)
|
| 1430 |
+
7(1,1)a
|
| 1431 |
+
7(1,1)b
|
| 1432 |
+
7(2,1,1)a
|
| 1433 |
+
|
| 1434 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 1435 |
+
27
|
| 1436 |
+
7(2,1,1)b
|
| 1437 |
+
8(1,1)a
|
| 1438 |
+
8(1,1)b
|
| 1439 |
+
8(2)a
|
| 1440 |
+
8(2)b
|
| 1441 |
+
8(2,1,1)
|
| 1442 |
+
8(3)
|
| 1443 |
+
8(4)
|
| 1444 |
+
9(2,1,1)
|
| 1445 |
+
10(1,1)a
|
| 1446 |
+
10(1,1)b
|
| 1447 |
+
10(2)
|
| 1448 |
+
10(2,1,1)a
|
| 1449 |
+
10(2,1,1)b
|
| 1450 |
+
10(3)a
|
| 1451 |
+
10(3)b
|
| 1452 |
+
10(3,1,1)
|
| 1453 |
+
|
| 1454 |
+
28
|
| 1455 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 1456 |
+
10(3,2)
|
| 1457 |
+
12(2)
|
| 1458 |
+
12(2,1,1)a
|
| 1459 |
+
12(2,1,1)b
|
| 1460 |
+
12(3)
|
| 1461 |
+
12(4)
|
| 1462 |
+
12(4,2)
|
| 1463 |
+
12(6)
|
| 1464 |
+
14(2,1,1)
|
| 1465 |
+
14(3,1,1)
|
| 1466 |
+
14(3,2)
|
| 1467 |
+
|
| 1468 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 1469 |
+
29
|
| 1470 |
+
B.2. Additional portraits. The following portraits are not known to be realized over qua-
|
| 1471 |
+
dratic fields (and, in some cases, have been shown not to be); however, they make an
|
| 1472 |
+
appearance in the discussion in Section 4.2, so we include them here. The labels G1, . . . , G10
|
| 1473 |
+
are taken from [10].
|
| 1474 |
+
G1
|
| 1475 |
+
G2
|
| 1476 |
+
G3
|
| 1477 |
+
G4
|
| 1478 |
+
G5
|
| 1479 |
+
G6
|
| 1480 |
+
G7
|
| 1481 |
+
G8
|
| 1482 |
+
G9
|
| 1483 |
+
G10
|
| 1484 |
+
|
| 1485 |
+
30
|
| 1486 |
+
JOHN R. DOYLE AND DAVID KRUMM
|
| 1487 |
+
References
|
| 1488 |
+
[1] Robert L. Benedetto, Ruqian Chen, Trevor Hyde, Yordanka Kovacheva, and Colin White, Small dy-
|
| 1489 |
+
namical heights for quadratic polynomials and rational functions, Exp. Math. 23 (2014), no. 4, 433–447.
|
| 1490 |
+
MR 3277939
|
| 1491 |
+
[2] Yuri Bilu and Jean Gillibert, Chevalley-Weil theorem and subgroups of class groups, Israel J. Math. 226
|
| 1492 |
+
(2018), no. 2, 927–956. MR 3819714
|
| 1493 |
+
[3] J´er´emy Blanc, Jung Kyu Canci, and Noam D. Elkies, Moduli spaces of quadratic rational maps with
|
| 1494 |
+
a marked periodic point of small order, Int. Math. Res. Not. IMRN (2015), no. 23, 12459–12489.
|
| 1495 |
+
MR 3431627
|
| 1496 |
+
[4] Wieb Bosma, John Cannon, and Catherine Playoust, The Magma algebra system. I. The user language,
|
| 1497 |
+
J. Symbolic Comput. 24 (1997), no. 3-4, 235–265, Computational algebra and number theory (London,
|
| 1498 |
+
1993). MR 1484478
|
| 1499 |
+
[5] Johan Bosman, Peter Bruin, Andrej Dujella, and Filip Najman, Ranks of elliptic curves with prescribed
|
| 1500 |
+
torsion over number fields, Int. Math. Res. Not. IMRN (2014), no. 11, 2885–2923. MR 3214308
|
| 1501 |
+
[6] Jung Kyu Canci and Solomon Vishkautsan, Quadratic maps with a periodic critical point of period 2,
|
| 1502 |
+
Int. J. Number Theory 13 (2017), no. 6, 1393–1417. MR 3656200
|
| 1503 |
+
[7] J. W. S. Cassels and E. V. Flynn, Prolegomena to a middlebrow arithmetic of curves of genus 2,
|
| 1504 |
+
London Mathematical Society Lecture Note Series, vol. 230, Cambridge University Press, Cambridge,
|
| 1505 |
+
1996. MR 1406090 (97i:11071)
|
| 1506 |
+
[8] Pete L. Clark, On the Hasse principle for Shimura curves, Israel J. Math. 171 (2009), 349–365.
|
| 1507 |
+
MR 2520114
|
| 1508 |
+
[9] J. E. Cremona, Algorithms for modular elliptic curves, second ed., Cambridge University Press, Cam-
|
| 1509 |
+
bridge, 1997. MR 1628193 (99e:11068)
|
| 1510 |
+
[10] John R. Doyle, Preperiodic points for quadratic polynomials with small cycles over quadratic fields,
|
| 1511 |
+
Math. Z. 289 (2018), no. 1-2, 729–786. MR 3803810
|
| 1512 |
+
[11]
|
| 1513 |
+
, Dynamical modular curves for quadratic polynomial maps, Trans. Amer. Math. Soc. 371 (2019),
|
| 1514 |
+
no. 8, 5655–5685. MR 3937306
|
| 1515 |
+
[12]
|
| 1516 |
+
, Preperiodic points for quadratic polynomials over cyclotomic quadratic fields, Acta Arith. 196
|
| 1517 |
+
(2020), no. 3, 219–268. MR 4161298
|
| 1518 |
+
[13] John R. Doyle, Xander Faber, and David Krumm, Preperiodic points for quadratic polynomials over
|
| 1519 |
+
quadratic fields, New York J. Math. 20 (2014), 507–605. MR 3218788
|
| 1520 |
+
[14] John R. Doyle and Bjorn Poonen, Gonality of dynatomic curves and strong uniform boundedness of
|
| 1521 |
+
preperiodic points, Compos. Math. 156 (2020), no. 4, 733–743. MR 4065068
|
| 1522 |
+
[15] John R. Doyle and Joseph H. Silverman, Moduli spaces for dynamical systems with portraits, Illinois J.
|
| 1523 |
+
Math. 64 (2020), no. 3, 375–465. MR 4132597
|
| 1524 |
+
[16] Xander Faber, Benedetto’s trick and existence of rational preperiodic structures for quadratic polynomi-
|
| 1525 |
+
als, Proc. Amer. Math. Soc. 143 (2015), no. 2, 685–694. MR 3283655
|
| 1526 |
+
[17] Najmuddin Fakhruddin, Questions on self maps of algebraic varieties, J. Ramanujan Math. Soc. 18
|
| 1527 |
+
(2003), no. 2, 109–122. MR 1995861 (2004f:14038)
|
| 1528 |
+
[18] E. V. Flynn, Bjorn Poonen, and Edward F. Schaefer, Cycles of quadratic polynomials and rational points
|
| 1529 |
+
on a genus-2 curve, Duke Math. J. 90 (1997), no. 3, 435–463. MR 1480542 (98j:11048)
|
| 1530 |
+
[19] Gerhard Frey, Curves with infinitely many points of fixed degree, Israel J. Math. 85 (1994), no. 1-3,
|
| 1531 |
+
79–83. MR 1264340
|
| 1532 |
+
[20] Jean Gillibert and Aaron Levin, Pulling back torsion line bundles to ideal classes, Math. Res. Lett. 19
|
| 1533 |
+
(2012), no. 6, 1171–1184. MR 3091601
|
| 1534 |
+
[21] Joe Harris and Joe Silverman, Bielliptic curves and symmetric products, Proc. Amer. Math. Soc. 112
|
| 1535 |
+
(1991), no. 2, 347–356. MR 1055774
|
| 1536 |
+
[22] Benjamin Hutz, Determination of all rational preperiodic points for morphisms of PN, Math. Comp. 84
|
| 1537 |
+
(2015), no. 291, 289–308. MR 3266961
|
| 1538 |
+
[23] Benjamin Hutz and Patrick Ingram, On Poonen’s conjecture concerning rational preperiodic points of
|
| 1539 |
+
quadratic maps, Rocky Mountain J. Math. 43 (2013), no. 1, 193–204. MR 3065461
|
| 1540 |
+
[24] Daeyeol Jeon, Chang Heon Kim, and Andreas Schweizer, On the torsion of elliptic curves over cubic
|
| 1541 |
+
number fields, Acta Arith. 113 (2004), no. 3, 291–301. MR 2069117
|
| 1542 |
+
|
| 1543 |
+
QUADRATIC POINTS ON DYNAMICAL MODULAR CURVES
|
| 1544 |
+
31
|
| 1545 |
+
[25] S. Kamienny, Torsion points on elliptic curves and q-coefficients of modular forms, Invent. Math. 109
|
| 1546 |
+
(1992), no. 2, 221–229. MR 1172689
|
| 1547 |
+
[26] M. A. Kenku and F. Momose, Torsion points on elliptic curves defined over quadratic fields, Nagoya
|
| 1548 |
+
Math. J. 109 (1988), 125–149. MR 931956
|
| 1549 |
+
[27] David Krumm, A local-global principle in the dynamics of quadratic polynomials, Int. J. Number Theory
|
| 1550 |
+
12 (2016), no. 8, 2265–2297. MR 3562026
|
| 1551 |
+
[28]
|
| 1552 |
+
, Squarefree parts of polynomial values, J. Th´eor. Nombres Bordeaux 28 (2016), no. 3, 699–724.
|
| 1553 |
+
MR 3610693
|
| 1554 |
+
[29] David Krumm and Paul Pollack, Twists of hyperelliptic curves by integers in progressions modulo p,
|
| 1555 |
+
Acta Arith. 192 (2020), no. 1, 63–71. MR 4039488
|
| 1556 |
+
[30] Serge Lang, Fundamentals of Diophantine geometry, Springer-Verlag, New York, 1983. MR 715605
|
| 1557 |
+
[31] The LMFDB Collaboration, The L-functions and modular forms database, http://www.lmfdb.org,
|
| 1558 |
+
2022, [Online; accessed 12 Dec 2022].
|
| 1559 |
+
[32] David Lukas, Michelle Manes, and Diane Yap, A census of quadratic post-critically finite rational func-
|
| 1560 |
+
tions defined over Q, LMS J. Comput. Math. 17 (2014), no. suppl. A, 314–329. MR 3240812
|
| 1561 |
+
[33] Michelle Manes, Q-rational cycles for degree-2 rational maps having an automorphism, Proc. Lond.
|
| 1562 |
+
Math. Soc. (3) 96 (2008), no. 3, 669–696. MR 2407816
|
| 1563 |
+
[34] B. Mazur, Modular curves and the Eisenstein ideal, Inst. Hautes ´Etudes Sci. Publ. Math. (1977), no. 47,
|
| 1564 |
+
33–186 (1978). MR 488287 (80c:14015)
|
| 1565 |
+
[35] Fumiyuki Momose, p-torsion points on elliptic curves defined over quadratic fields, Nagoya Math. J. 96
|
| 1566 |
+
(1984), 139–165. MR 771075
|
| 1567 |
+
[36] Patrick Morton, Arithmetic properties of periodic points of quadratic maps, Acta Arith. 62 (1992), no. 4,
|
| 1568 |
+
343–372. MR 1199627 (93k:12004)
|
| 1569 |
+
[37]
|
| 1570 |
+
, On certain algebraic curves related to polynomial maps, Compositio Math. 103 (1996), no. 3,
|
| 1571 |
+
319–350. MR 1414593 (97m:14030)
|
| 1572 |
+
[38]
|
| 1573 |
+
, Arithmetic properties of periodic points of quadratic maps. II, Acta Arith. 87 (1998), no. 2,
|
| 1574 |
+
89–102. MR 1665198 (2000c:11103)
|
| 1575 |
+
[39] Patrick Morton and Joseph H. Silverman, Rational periodic points of rational functions, Internat. Math.
|
| 1576 |
+
Res. Notices (1994), no. 2, 97–110. MR 1264933 (95b:11066)
|
| 1577 |
+
[40] Filip Najman and Antonela Trbovi´c, Splitting of primes in number fields generated by points on some
|
| 1578 |
+
modular curves, Res. Number Theory 8 (2022), no. 2, Paper No. 28. MR 4412569
|
| 1579 |
+
[41] D. G. Northcott, Periodic points on an algebraic variety, Ann. of Math. (2) 51 (1950), 167–177.
|
| 1580 |
+
MR 0034607 (11,615c)
|
| 1581 |
+
[42] T. Pezda, Polynomial cycles in certain local domains, Acta Arith. 66 (1994), no. 1, 11–22. MR 1262650
|
| 1582 |
+
[43] Bjorn Poonen, The classification of rational preperiodic points of quadratic polynomials over Q: a refined
|
| 1583 |
+
conjecture, Math. Z. 228 (1998), no. 1, 11–29. MR 1617987 (99j:11076)
|
| 1584 |
+
[44] Jean-Pierre Serre, Topics in Galois theory, second ed., Research Notes in Mathematics, vol. 1, A K
|
| 1585 |
+
Peters, Ltd., Wellesley, MA, 2008, With notes by Henri Darmon. MR 2363329
|
| 1586 |
+
[45] Joseph H. Silverman, The arithmetic of dynamical systems, Graduate Texts in Mathematics, vol. 241,
|
| 1587 |
+
Springer, New York, 2007. MR 2316407 (2008c:11002)
|
| 1588 |
+
[46] Henning Stichtenoth, Algebraic function fields and codes, second ed., Graduate Texts in Mathematics,
|
| 1589 |
+
vol. 254, Springer-Verlag, Berlin, 2009. MR 2464941 (2010d:14034)
|
| 1590 |
+
[47] Michael Stoll, Rational 6-cycles under iteration of quadratic polynomials, LMS J. Comput. Math. 11
|
| 1591 |
+
(2008), 367–380. MR 2465796 (2010b:11067)
|
| 1592 |
+
[48] Ralph Walde and Paula Russo, Rational periodic points of the quadratic function Qc(x) = x2 +c, Amer.
|
| 1593 |
+
Math. Monthly 101 (1994), no. 4, 318–331. MR 1270956 (95a:11025)
|
| 1594 |
+
[49] Michael Zieve, Cycles of polynomial mappings, Ph.D. thesis, University of California, Berkeley, 1996.
|
| 1595 |
+
Department of Mathematics, Oklahoma State University, Stillwater, OK 74078
|
| 1596 |
+
Email address: john.r.doyle@okstate.edu
|
| 1597 |
+
URL: http://maths.dk
|
| 1598 |
+
Email address: david.krumm@gmail.com
|
| 1599 |
+
|
19AyT4oBgHgl3EQfofjr/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
19AzT4oBgHgl3EQf8_5O/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:997eab069e25e75af6c80e5900dfb01449ec871ff54a9bd069fa754db58da611
|
| 3 |
+
size 5832749
|
29E4T4oBgHgl3EQf0A2b/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:40daa96fd47e5a1a9c41ca19392dc65dca723329b2e1bbae46d94cbf76a2b884
|
| 3 |
+
size 2818093
|
29FIT4oBgHgl3EQf5SvC/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c31e30024c12ad47670b803556aa969e5b0a51a9e31d0e8a01c43a24967141e1
|
| 3 |
+
size 4128813
|
2dE1T4oBgHgl3EQfSANm/content/tmp_files/2301.03060v1.pdf.txt
ADDED
|
@@ -0,0 +1,1666 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Thermodynamic Correlation Inequality
|
| 2 |
+
Yoshihiko Hasegawa∗
|
| 3 |
+
Department of Information and Communication Engineering,
|
| 4 |
+
Graduate School of Information Science and Technology,
|
| 5 |
+
The University of Tokyo, Tokyo 113-8656, Japan
|
| 6 |
+
(Dated: January 10, 2023)
|
| 7 |
+
Uncertainty relations place fundamental limits on the operations that physical systems can per-
|
| 8 |
+
form. In this Letter, we obtain uncertainty relations that give bounds for the correlation function,
|
| 9 |
+
which measures the relationship between a system’s current state and its future state, in both
|
| 10 |
+
classical and quantum Markov processes. The obtained bounds, referred to as thermodynamic cor-
|
| 11 |
+
relation inequality, state that the change in the correlation function has an upper bound comprising
|
| 12 |
+
the dynamical activity, a measure of the activity of a Markov process. Moreover, applying the ob-
|
| 13 |
+
tained relation to the linear response function, we show that the effect of perturbation has a bound
|
| 14 |
+
comprising the dynamical activity.
|
| 15 |
+
Introduction.—Uncertainty relations imply that there
|
| 16 |
+
are ultimate impossibilities in the physical world that
|
| 17 |
+
cannot be overcome by any technological advances. The
|
| 18 |
+
most well-known example is the Heisenberg uncertainty
|
| 19 |
+
relation [1, 2], which establishes a limit on the precision of
|
| 20 |
+
position-momentum measurement. The quantum speed
|
| 21 |
+
limit is interpreted as the energy-time uncertainty rela-
|
| 22 |
+
tion and places a limit on the speed at which the quan-
|
| 23 |
+
tum state can be changed [3–10] (see [11] for a review).
|
| 24 |
+
It has many applications in quantum computation [12],
|
| 25 |
+
quantum communication [13, 14], and quantum thermo-
|
| 26 |
+
dynamics [5]. Recently, the concept of speed limit has
|
| 27 |
+
also been considered in classical systems [15–17]. In par-
|
| 28 |
+
ticular, the Wasserstein distance can be used to obtain
|
| 29 |
+
the minimum entropy production required for a stochas-
|
| 30 |
+
tic process to transform one probability distribution into
|
| 31 |
+
another [18–22]. Moreover, the speed limit has been gen-
|
| 32 |
+
eralized to the time evolution of the observables [23–27],
|
| 33 |
+
where the speed of the observables is the quantity of in-
|
| 34 |
+
terest. A closely related principle was recently found in
|
| 35 |
+
stochastic thermodynamics, which is known as the ther-
|
| 36 |
+
modynamic uncertainty relation [28–50] (see [51] for a re-
|
| 37 |
+
view), stating that, for thermodynamic systems, higher
|
| 38 |
+
accuracy can be achieved at the expense of larger ther-
|
| 39 |
+
modynamic cost. Nowadays, the thermodynamic uncer-
|
| 40 |
+
tainty relations become a central topic in nonequilibrium
|
| 41 |
+
thermodynamics, and their importance is also recognized
|
| 42 |
+
from a practical standpoint because thermodynamic un-
|
| 43 |
+
certainty relations can be used to infer entropy produc-
|
| 44 |
+
tion without detailed knowledge on the system [52–55].
|
| 45 |
+
In the present Letter, we obtain uncertainty relations
|
| 46 |
+
that confer bounds for the correlation function in classical
|
| 47 |
+
and quantum Markov processes. The correlation function
|
| 48 |
+
is a statistical measure that quantifies the correlation be-
|
| 49 |
+
tween the current state of a system and its future or past
|
| 50 |
+
states. In a Markov process, the correlation function can
|
| 51 |
+
be used to analyze the dependence of the current state on
|
| 52 |
+
past states, and to identify any patterns in the system’s
|
| 53 |
+
∗ hasegawa@biom.t.u-tokyo.ac.jp
|
| 54 |
+
behavior over time. We derive the thermodynamic corre-
|
| 55 |
+
lation inequality stating that the amount of the correla-
|
| 56 |
+
tion change has an upper bound that comprises the dy-
|
| 57 |
+
namical activity, which quantifies the activity of a system
|
| 58 |
+
of interest. Our derivation is based on the continuous ma-
|
| 59 |
+
trix product state representation [56, 57], which is a real-
|
| 60 |
+
ization of the bulk/boundary correspondence in Markov
|
| 61 |
+
processes. It allows us to represent a classical or quan-
|
| 62 |
+
tum Markov process by the corresponding quantum field
|
| 63 |
+
state, where jump events in the Markov process are rep-
|
| 64 |
+
resented by particle creations in the field state. Since the
|
| 65 |
+
dynamics of the continuous matrix product state is as-
|
| 66 |
+
sumed to obey that of quantum mechanics, we can apply
|
| 67 |
+
the techniques developed in quantum information [58].
|
| 68 |
+
The obtained bound exhibits unexpected generality; it
|
| 69 |
+
holds for classical as well as quantum Markov processes.
|
| 70 |
+
Moreover, it can be generalized to multi-point correlation
|
| 71 |
+
functions and multivariate Markov processes. The cor-
|
| 72 |
+
relation function gives the spectral information via the
|
| 73 |
+
Wiener-Khinchin theorem and plays a fundamental role
|
| 74 |
+
in the linear response theory [59]. The linear response
|
| 75 |
+
function can be represented by a time derivative of the
|
| 76 |
+
corresponding correlation function, which is the state-
|
| 77 |
+
ment of the fluctuation-dissipation theorem.
|
| 78 |
+
Applying
|
| 79 |
+
the obtained correlation bound to the linear response
|
| 80 |
+
function, we derive an upper bound to the perturbation.
|
| 81 |
+
Results.—We derive the thermodynamic correlation in-
|
| 82 |
+
equality for a classical Markov process. A quantum gen-
|
| 83 |
+
eralization will be discussed later. Consider a classical
|
| 84 |
+
Markov process with N states B ≡ {B1, B2, · · · , BN}.
|
| 85 |
+
Let {X(t)|t ≥ 0} be a collection of discrete random vari-
|
| 86 |
+
ables that take values in B (that is X(t) ∈ B). Let P(ν; t)
|
| 87 |
+
be the probability that X(t) is Bν at time t and Wνµ be
|
| 88 |
+
the transition rate of X(t) from Bµ to Bν. The time evo-
|
| 89 |
+
lution of P(t) ≡ [P(1; t), . . . , P(N; t)]⊤ is governed by
|
| 90 |
+
the following master equation:
|
| 91 |
+
dP(t)
|
| 92 |
+
dt
|
| 93 |
+
= WP(t),
|
| 94 |
+
(1)
|
| 95 |
+
where W ≡ {Wνµ}. Next, we define the scoring function
|
| 96 |
+
S(·) that takes a state Bi (i ∈ {1, 2, . . . , N}) and returns
|
| 97 |
+
a real value of (−∞, ∞). When it is clear from the con-
|
| 98 |
+
arXiv:2301.03060v1 [quant-ph] 8 Jan 2023
|
| 99 |
+
|
| 100 |
+
2
|
| 101 |
+
State
|
| 102 |
+
Time
|
| 103 |
+
State
|
| 104 |
+
Time
|
| 105 |
+
+1
|
| 106 |
+
-1
|
| 107 |
+
+1
|
| 108 |
+
-1
|
| 109 |
+
(a)
|
| 110 |
+
(b)
|
| 111 |
+
FIG. 1.
|
| 112 |
+
Illustration of Markov processes.
|
| 113 |
+
(a) Classical
|
| 114 |
+
Markov process (dichotomous process) two states {B1, B2}.
|
| 115 |
+
The score function is specified by S(B1) = −1 and S(B2) = 1.
|
| 116 |
+
(b) Quantum Markov process (two level atom driven by a
|
| 117 |
+
classical laser field).
|
| 118 |
+
The time evolution of the quantum
|
| 119 |
+
Markov process consists of continuous evolution induced by
|
| 120 |
+
the effective Hamiltonian Heff and discontinous evolution due
|
| 121 |
+
to the jump operator L.
|
| 122 |
+
The score function is given by
|
| 123 |
+
S(ρ) = 2Tr[ρ |e⟩ ⟨e|] − 1, in which the ground and excited
|
| 124 |
+
states give S(|g⟩ ⟨g|) = −1 and S(|e⟩ ⟨e|) = 1.
|
| 125 |
+
text, we use the notation S(t) ≡ S(X(t)) for simplicity.
|
| 126 |
+
Moreover, we define
|
| 127 |
+
Smax ≡ max
|
| 128 |
+
Bi∈B |S(Bi)|,
|
| 129 |
+
(2)
|
| 130 |
+
which is the maximum absolute value of the score func-
|
| 131 |
+
tion within B. We are interested in the correlation func-
|
| 132 |
+
tion C(t) ≡ ⟨S(0)S(t)⟩, where
|
| 133 |
+
⟨S(0)S(t)⟩ =
|
| 134 |
+
�
|
| 135 |
+
µ,ν
|
| 136 |
+
S(Bν)S(Bµ)P(µ; 0)P(ν; t|µ; 0)
|
| 137 |
+
= 1SeWtSP(0).
|
| 138 |
+
(3)
|
| 139 |
+
Here, P(ν; t|µ; 0) is the conditional probability that
|
| 140 |
+
X(t) = Bν given X(0) = Bµ, 1 ≡ [1, 1, . . . , 1] is the
|
| 141 |
+
trace state, and S ≡ diag[S(B1), . . . , S(BN)]. The cor-
|
| 142 |
+
relation function C(t) is widely explored in the field of
|
| 143 |
+
stochastic process [60, 61]. Recently, the correlation func-
|
| 144 |
+
tion is considered in the context of quantum speed limit
|
| 145 |
+
[26, 62], which is obtained as particular cases of speed
|
| 146 |
+
limit on observables.
|
| 147 |
+
As an example of the classical
|
| 148 |
+
system, Fig. 1(a) shows the dichotomous process, which
|
| 149 |
+
comprises two states {B1, B2}. X(t) in this process ex-
|
| 150 |
+
hibits random switching between B1 and B2. For the di-
|
| 151 |
+
chotomous process, the score function is typically given
|
| 152 |
+
by S(B1) = −1 and S(B2) = 1. To quantify the Markov
|
| 153 |
+
process, we define the dynamical activity A(t) as follows
|
| 154 |
+
[63]:
|
| 155 |
+
A(t) ≡
|
| 156 |
+
� t
|
| 157 |
+
0
|
| 158 |
+
dt′
|
| 159 |
+
�
|
| 160 |
+
ν,µ,ν̸=µ
|
| 161 |
+
P(µ; t′)Wνµ.
|
| 162 |
+
(4)
|
| 163 |
+
A(t) represents the average number of jumps during the
|
| 164 |
+
interval [0, t] and it quantifies the activity of the stochas-
|
| 165 |
+
tic process. The dynamical activity plays a fundamental
|
| 166 |
+
role in classical speed limits [15] and thermodynamic un-
|
| 167 |
+
certainty relations [30, 32].
|
| 168 |
+
In the classical Markov process, we obtain an upper
|
| 169 |
+
bound on the correlation function C(t). For 0 ≤ t1 < t2,
|
| 170 |
+
we obtain the following bound:
|
| 171 |
+
|C(t1) − C(t2)| ≤ 2S2
|
| 172 |
+
max sin
|
| 173 |
+
�
|
| 174 |
+
1
|
| 175 |
+
2
|
| 176 |
+
� t2
|
| 177 |
+
t1
|
| 178 |
+
�
|
| 179 |
+
A(t)
|
| 180 |
+
t
|
| 181 |
+
dt
|
| 182 |
+
�
|
| 183 |
+
,
|
| 184 |
+
(5)
|
| 185 |
+
which holds for 0 ≤ 1
|
| 186 |
+
2
|
| 187 |
+
� t2
|
| 188 |
+
t1
|
| 189 |
+
√
|
| 190 |
+
A(t)
|
| 191 |
+
t
|
| 192 |
+
dt ≤ π
|
| 193 |
+
2 . For t1 and t2
|
| 194 |
+
outside this range, the upper bound is |C(t1) − C(t2)| ≤
|
| 195 |
+
2S2
|
| 196 |
+
max, which holds trivially. Equation (5) is the main
|
| 197 |
+
result of this Letter. It should be emphasized that all
|
| 198 |
+
the quantities appeared in Eq. (5) are physically inter-
|
| 199 |
+
pretable. The proof of Eq. (5) is based on the continuous
|
| 200 |
+
matrix product state and inequalities in quantum infor-
|
| 201 |
+
mation, which is shown in Appendix D. Equation (5)
|
| 202 |
+
holds for an arbitrary time-independent Markov process
|
| 203 |
+
starting from an arbitrary initial probability distribution
|
| 204 |
+
with an arbitrary score function S(Bi).
|
| 205 |
+
Equation (5)
|
| 206 |
+
states that higher dynamical activity allows the system
|
| 207 |
+
to forget its current state more quickly, which agrees with
|
| 208 |
+
our intuition. For a simple consistency check, consider
|
| 209 |
+
the null dynamics (i.e., Wνµ = 0 for all ν and µ), in
|
| 210 |
+
which there is no jump at all. In this case, the dynamical
|
| 211 |
+
activity becomes A(t) = 0 and thus the right-hand side
|
| 212 |
+
of Eq. (5) vanishes to yield ⟨S(0)S(t)⟩ = ⟨S(0)2⟩, which
|
| 213 |
+
is trivially true. For the steady state case, C(t2) − C(t1)
|
| 214 |
+
for t1 < t2 is negative, and hence it seems that we do not
|
| 215 |
+
have to consider absolute operation in Eq. (5). However,
|
| 216 |
+
when the system is not in steady state, this is not the
|
| 217 |
+
case. Note that a weaker bound can be obtained via a
|
| 218 |
+
thermodynamic uncertainty relation derived in Ref. [64].
|
| 219 |
+
Let us consider particular cases of Eq. (5). Simply taking
|
| 220 |
+
t1 = 0 and t2 = t with t > 0, Eq. (5) provides an upper
|
| 221 |
+
bound for |C(0) − C(t)|:
|
| 222 |
+
|C(0) − C(t)| ≤ 2S2
|
| 223 |
+
max sin
|
| 224 |
+
�
|
| 225 |
+
1
|
| 226 |
+
2
|
| 227 |
+
� t
|
| 228 |
+
0
|
| 229 |
+
�
|
| 230 |
+
A(t′)
|
| 231 |
+
t′
|
| 232 |
+
dt′
|
| 233 |
+
�
|
| 234 |
+
,
|
| 235 |
+
(6)
|
| 236 |
+
where 0 ≤
|
| 237 |
+
1
|
| 238 |
+
2
|
| 239 |
+
� t
|
| 240 |
+
0
|
| 241 |
+
√
|
| 242 |
+
A(t′)
|
| 243 |
+
t′
|
| 244 |
+
dt′ ≤
|
| 245 |
+
π
|
| 246 |
+
2 . Moreover, let ϵ be an
|
| 247 |
+
infinitesimally small positive value. Substituting t1 = t−
|
| 248 |
+
ϵ and t2 = t into Eq. (5) and using the Taylor expansion
|
| 249 |
+
to the sinusoidal function, we obtain
|
| 250 |
+
����
|
| 251 |
+
dC(t)
|
| 252 |
+
dt
|
| 253 |
+
���� ≤ S2
|
| 254 |
+
max
|
| 255 |
+
�
|
| 256 |
+
A(t)
|
| 257 |
+
t
|
| 258 |
+
.
|
| 259 |
+
(7)
|
| 260 |
+
Equation (7) states that the absolute change of the corre-
|
| 261 |
+
lation function is determined by the dynamical activity.
|
| 262 |
+
Equation (6) holds for 0 ≤
|
| 263 |
+
1
|
| 264 |
+
2
|
| 265 |
+
� t
|
| 266 |
+
0
|
| 267 |
+
√
|
| 268 |
+
A(t′)
|
| 269 |
+
t′
|
| 270 |
+
dt′ ≤
|
| 271 |
+
π
|
| 272 |
+
2 and
|
| 273 |
+
thus the predictive power of the bound is lost at a finite
|
| 274 |
+
time. An alternative bound to Eq. (5) is given by
|
| 275 |
+
|C(0) − C(t)| ≤ 2S2
|
| 276 |
+
max
|
| 277 |
+
�
|
| 278 |
+
1 − η(t),
|
| 279 |
+
(8)
|
| 280 |
+
where η(t) is the Loschmidt echo [65] between time
|
| 281 |
+
evolved state and the initial state in the continuous
|
| 282 |
+
|
| 283 |
+
3
|
| 284 |
+
(a)
|
| 285 |
+
(b)
|
| 286 |
+
FIG. 2.
|
| 287 |
+
Results of numerical simulations.
|
| 288 |
+
(a) The ratio
|
| 289 |
+
|∂tC(t)|/(S2
|
| 290 |
+
max
|
| 291 |
+
�
|
| 292 |
+
A(t)/t) for the dichotomous process.
|
| 293 |
+
The
|
| 294 |
+
result obtained with W12 = 1, W22 = −1, P(0) = [0, 1] is plot-
|
| 295 |
+
ted by the dashed line. The results obtained by random pa-
|
| 296 |
+
rameters are plotted by the solid lines. The parameter ranges
|
| 297 |
+
for the random realizations are W12 ∈ [0, 1], W21 ∈ [0, 1],
|
| 298 |
+
S(B1) ∈ [−1, 0], and S(B2) ∈ [0, 1].
|
| 299 |
+
The initial distribu-
|
| 300 |
+
tion is first sampled from P1(0) ∈ [0, 1] and P2(0) ∈ [0, 1]
|
| 301 |
+
and then normalize the sampled distribution.
|
| 302 |
+
(b) The ra-
|
| 303 |
+
tio |∂tC(t)|/(S2
|
| 304 |
+
max
|
| 305 |
+
�
|
| 306 |
+
B(t)/t) for the driven two level atom
|
| 307 |
+
model. The results obtained by random parameters are plot-
|
| 308 |
+
ted by the solid lines. The parameter ranges are Ω ∈ [0.1, 1],
|
| 309 |
+
∆ ∈ [0.1, 1], and κ ∈ [0.1, 1]. The initial density is sampled
|
| 310 |
+
from ⟨g|ρ(0)|g⟩ ∈ [0, 1] and ⟨e|ρ(0)|e⟩ ∈ [1, 2] and normalized
|
| 311 |
+
the sampled density (non-diagonal elements are zero).
|
| 312 |
+
matrix product state representation (see Appendix C).
|
| 313 |
+
Equation (8) is the second result of this paper, whose
|
| 314 |
+
proof is provided in Appendix E. Following Ref. [66], we
|
| 315 |
+
can compute η(t) for the classical Markov process as fol-
|
| 316 |
+
lows:
|
| 317 |
+
η(t) ≡
|
| 318 |
+
��
|
| 319 |
+
µ
|
| 320 |
+
P(µ; 0)
|
| 321 |
+
�
|
| 322 |
+
e−t �
|
| 323 |
+
ν(̸=µ) Wνµ
|
| 324 |
+
�2
|
| 325 |
+
,
|
| 326 |
+
(9)
|
| 327 |
+
which can be represented by quantities of the Markov
|
| 328 |
+
process. Note that the Loschmidt echo η(t) constitutes a
|
| 329 |
+
lower bound in a quantum and classical thermodynamic
|
| 330 |
+
uncertainty relation [66].
|
| 331 |
+
The term within the square
|
| 332 |
+
root in η(t) represents the survival probability that there
|
| 333 |
+
is no jump starting from the state Bµ. Therefore, when
|
| 334 |
+
the activity of dynamics is lower, the survival probabil-
|
| 335 |
+
ity becomes higher and in turn η(t) yields a higher value.
|
| 336 |
+
Although the Loschmidt echo η(t) has fewer physical in-
|
| 337 |
+
terpretations than dynamical activity, it has the advan-
|
| 338 |
+
tage over Eq. (5) that the bound of Eq. (8) holds for any
|
| 339 |
+
value of t.
|
| 340 |
+
We can extend Eq. (5) to a quantum Markov pro-
|
| 341 |
+
cess.
|
| 342 |
+
Let ρ(t) be a density operator of a quantum
|
| 343 |
+
Markov process at time t. We assume that the dynamics
|
| 344 |
+
of ρ(t) is governed by the following Lindblad equation
|
| 345 |
+
˙ρ(t) = L(ρ(t)), where L is the Lindblad superoperator
|
| 346 |
+
[67, 68]:
|
| 347 |
+
L(ρ(t)) ≡ −i [H, ρ(t)] +
|
| 348 |
+
�
|
| 349 |
+
m
|
| 350 |
+
D (ρ(t), Lm) .
|
| 351 |
+
(10)
|
| 352 |
+
Here H is a Hamiltonian, D(ρ, L) ≡ LρL† − {L†L, ρ}/2
|
| 353 |
+
is the dissipator, Lm is the mth jump operator.
|
| 354 |
+
We
|
| 355 |
+
can unravel Eq. (10) to obtain a quantum trajectory,
|
| 356 |
+
which is a measurement record when observing the en-
|
| 357 |
+
vironment. The dynamics of the quantum trajectory is
|
| 358 |
+
represented by a stochastic Schr¨odinger equation. Simi-
|
| 359 |
+
lar to the classical case, we assign the score function to
|
| 360 |
+
the quantum state ρ(t) via S(ρ(t)) = Tr[ρ(t)O], where
|
| 361 |
+
O is an Hermitian operator.
|
| 362 |
+
Figure 1(b) illustrates
|
| 363 |
+
an example of a quantum trajectory, which consists of
|
| 364 |
+
continuous state change by the effective Hamiltonian
|
| 365 |
+
Heff ≡ H − (i/2) �
|
| 366 |
+
m L†
|
| 367 |
+
mLm and discontinuous jumps
|
| 368 |
+
by Lm. Let ρ(0) be the initial density operator. Then
|
| 369 |
+
the correlation function C(t) is calculated by
|
| 370 |
+
C(t) = S(ρ(0))S(ρ(t)).
|
| 371 |
+
(11)
|
| 372 |
+
For 0 ≤ t1 < t2, the following relation holds:
|
| 373 |
+
|C(t1) − C(t2)| ≤ 2S2
|
| 374 |
+
max sin
|
| 375 |
+
�
|
| 376 |
+
1
|
| 377 |
+
2
|
| 378 |
+
� t2
|
| 379 |
+
t1
|
| 380 |
+
�
|
| 381 |
+
B(t)
|
| 382 |
+
t
|
| 383 |
+
dt
|
| 384 |
+
�
|
| 385 |
+
,
|
| 386 |
+
(12)
|
| 387 |
+
which holds for 0 ≤ 1
|
| 388 |
+
2
|
| 389 |
+
� t2
|
| 390 |
+
t1
|
| 391 |
+
√
|
| 392 |
+
B(t)
|
| 393 |
+
t
|
| 394 |
+
dt ≤ π
|
| 395 |
+
2 . Here B(t) is the
|
| 396 |
+
quantum dynamical activity defined in Ref. [64], which
|
| 397 |
+
is the quantum generalization of Eq. (4) (see Eq. (F2) in
|
| 398 |
+
Appendix F). B(t) is defined through the quantum Fisher
|
| 399 |
+
information. The quantum dynamical activity plays an
|
| 400 |
+
important role in a speed limit and a thermodynamic
|
| 401 |
+
uncertainty relation [64]. The proof of Eq. (12) is shown
|
| 402 |
+
in Appendix E. Equation (12) is the same as Eq. (5)
|
| 403 |
+
except that A(t) in Eq. (5) is replaced by its quantum
|
| 404 |
+
counter part B(t). Following the same procedure as in
|
| 405 |
+
Eq. (7), we obtain
|
| 406 |
+
����
|
| 407 |
+
dC(t)
|
| 408 |
+
dt
|
| 409 |
+
���� ≤ S2
|
| 410 |
+
max
|
| 411 |
+
�
|
| 412 |
+
B(t)
|
| 413 |
+
t
|
| 414 |
+
.
|
| 415 |
+
(13)
|
| 416 |
+
Moreover, the bound of Eq. (8) also holds for the quan-
|
| 417 |
+
tum Markov process, where the Loschmidt echo for the
|
| 418 |
+
quantum case becomes [66] (Appendix C):
|
| 419 |
+
η(t) =
|
| 420 |
+
��Tr
|
| 421 |
+
�
|
| 422 |
+
e−iHefftρ(0)
|
| 423 |
+
���2 .
|
| 424 |
+
(14)
|
| 425 |
+
The Loschmidt echo shown in Eq. (14) also constitutes
|
| 426 |
+
the lower bound in a quantum thermodynamic uncer-
|
| 427 |
+
tainty relation [66].
|
| 428 |
+
Numerical simulations.—We perform numerical sim-
|
| 429 |
+
ulations to verify the correlation bounds [Eqs. (7) and
|
| 430 |
+
(13)].
|
| 431 |
+
We first demonstrate Eq. (7) with the classical
|
| 432 |
+
dichotomous process [69], which takes only two states
|
| 433 |
+
B = {B1, B2}. The dichotomous process has a number of
|
| 434 |
+
applications in communication engineering and physics.
|
| 435 |
+
We are interested in the ratio between the left and right
|
| 436 |
+
hand sides of Eq. (7), i.e., |∂tC(t)|/(S2
|
| 437 |
+
max
|
| 438 |
+
�
|
| 439 |
+
A(t)/t) which
|
| 440 |
+
must be no larger than 1 according to Eq. (7). We set the
|
| 441 |
+
score function to S(B1) = −1 and S(B2) = 1, in which
|
| 442 |
+
Smax = 1. The transition rate is set to W12 = 1 and
|
| 443 |
+
W22 = −1, where the other elements are set to 0. The
|
| 444 |
+
|
| 445 |
+
4
|
| 446 |
+
initial distribution is P(0) = [0, 1].
|
| 447 |
+
We plot the ratio
|
| 448 |
+
as a function of t in Fig. 2(a) with the dashed line. We
|
| 449 |
+
also randomly determine the score function S(Bi), the
|
| 450 |
+
transition rate Wnm, and the initial distribution P(0)
|
| 451 |
+
and calculate the ratio. The ratio as a function of t for
|
| 452 |
+
the random realizations is plotted by the solid line in
|
| 453 |
+
Fig. 2(a) (the parameter ranges are shown in the cap-
|
| 454 |
+
tion of Fig. 2(a)). We see that all the results are below
|
| 455 |
+
1 (the dotted line), which numerically verifies the bound
|
| 456 |
+
of Eq. (7).
|
| 457 |
+
Next, we consider a simple two-level atom driven by
|
| 458 |
+
a classical laser field to check the correlation bound of
|
| 459 |
+
Eq. (13), whose dynamics is represented by a Lindblad
|
| 460 |
+
equation: H = ∆ |e⟩ ⟨e| + Ω
|
| 461 |
+
2 (|e⟩ ⟨g| + |g⟩ ⟨e|) and L =
|
| 462 |
+
√κ |g⟩ ⟨e|, where ∆, Ω, and κ are model parameters, and
|
| 463 |
+
|e⟩ and |g⟩ are the excited and ground states, respectively.
|
| 464 |
+
For the score function, we choose S(ρ) = 2Tr[ρ |e⟩ ⟨e|]−1,
|
| 465 |
+
which ranges within [−1, 1] and thus Smax = 1. We calcu-
|
| 466 |
+
late |∂tC(t)|/(S2
|
| 467 |
+
max
|
| 468 |
+
�
|
| 469 |
+
B(t)/t), which is the ratio between
|
| 470 |
+
the left and right-hand side of Eq. (13). We randomly de-
|
| 471 |
+
termine the model parameters and the initial state (the
|
| 472 |
+
parameter ranges are shown in the caption of Fig. 2(b)).
|
| 473 |
+
The random realizations are shown by the solid lines in
|
| 474 |
+
Fig. 2(b).
|
| 475 |
+
Different from the classical case, the corre-
|
| 476 |
+
lation oscillates due to the contribution of the effective
|
| 477 |
+
Hamiltonian Heff. Since all the random realizations are
|
| 478 |
+
below 1 (the dotted line), we numerically verify Eq. (13).
|
| 479 |
+
Linear response.—The correlation function C(t) is
|
| 480 |
+
closely related to the linear response theory [59]. Here,
|
| 481 |
+
we apply the correlation bound of Eqs. (5) and (7) to
|
| 482 |
+
the linear response theory (see Appendix G for details).
|
| 483 |
+
Suppose that the Markov process is in the steady state
|
| 484 |
+
Pst = [Pst(1), . . . , Pst(N)], that satisfies WPst = 0. We
|
| 485 |
+
apply a weak perturbation χFf(t) to the master equa-
|
| 486 |
+
tion of Eq. (1), that is W → W + χFf(t) in Eq. (1),
|
| 487 |
+
where 0 < χ ≪ 1 and F is an N × N matrix, and f(t) is
|
| 488 |
+
arbitrary real function of time t. We expand the proba-
|
| 489 |
+
bility distribution as P(t) = Pst +χP1(t), where P1(t) is
|
| 490 |
+
the first-order correction to the probability distribution.
|
| 491 |
+
Collecting the first-order contribution O(χ) in Eq. (1),
|
| 492 |
+
P1(t) is given by
|
| 493 |
+
P1(t) =
|
| 494 |
+
� t
|
| 495 |
+
−∞
|
| 496 |
+
eW(t−t′)FPstf(t′)dt′.
|
| 497 |
+
(15)
|
| 498 |
+
Let us consider a scoring function G(Bn), which may
|
| 499 |
+
be different from S(Bn) at the moment, and define the
|
| 500 |
+
expectation of G(Bn) by
|
| 501 |
+
⟨G⟩ =
|
| 502 |
+
�
|
| 503 |
+
n
|
| 504 |
+
G(Bn)Pst(n) = 1GPst,
|
| 505 |
+
(16)
|
| 506 |
+
where G ≡ diag[G(B1), . . . , G(BN)]. The change in ⟨G⟩
|
| 507 |
+
due to the perturbation, represented by ∆G ≡ 1GP(t)−
|
| 508 |
+
1GPst, is
|
| 509 |
+
∆G(t) = χ
|
| 510 |
+
� ∞
|
| 511 |
+
−∞
|
| 512 |
+
RG(t − t′)f(t′)dt′,
|
| 513 |
+
(17)
|
| 514 |
+
where RG(t) is the linear response function:
|
| 515 |
+
RG(t) =
|
| 516 |
+
�
|
| 517 |
+
1GeWtFPst
|
| 518 |
+
t ≥ 0
|
| 519 |
+
0
|
| 520 |
+
t < 0 .
|
| 521 |
+
(18)
|
| 522 |
+
In the linear response regime, any input-output relation
|
| 523 |
+
can be expressed through RG(t). From Eq. (3), the time
|
| 524 |
+
derivative of C(t) reads ∂tC(t) = 1SeWtWSPst. Com-
|
| 525 |
+
paring Eq (18) and ∂tC(t), when G = S and F = WS,
|
| 526 |
+
∂tC(t) gives the linear response function of Eq. (18),
|
| 527 |
+
which is the statement of the fluctuation-dissipation the-
|
| 528 |
+
orem.
|
| 529 |
+
As a particular case, let us consider the pulse pertur-
|
| 530 |
+
bation, f(t) = δ(t), where δ(t) is the Dirac delta func-
|
| 531 |
+
tion. This perturbation corresponds to the application of
|
| 532 |
+
a sharp pulsatile perturbation at t = 0. Then the change
|
| 533 |
+
of the expectation of S(Bn) under the perturbation F =
|
| 534 |
+
WS, represented by ∆S(p), is ∆S(p)(t) = χ∂tC(t) (the
|
| 535 |
+
superscript (p) represents that it is the pulse response).
|
| 536 |
+
The correlation bound of Eq. (7) gives
|
| 537 |
+
���∆S(p)(t)
|
| 538 |
+
��� ≤ χS2
|
| 539 |
+
max
|
| 540 |
+
�
|
| 541 |
+
a
|
| 542 |
+
t ,
|
| 543 |
+
(19)
|
| 544 |
+
where
|
| 545 |
+
a
|
| 546 |
+
is
|
| 547 |
+
the
|
| 548 |
+
rate
|
| 549 |
+
of
|
| 550 |
+
dynamical
|
| 551 |
+
activity
|
| 552 |
+
a
|
| 553 |
+
≡
|
| 554 |
+
�
|
| 555 |
+
ν,µ,ν̸=µ Pst(µ)Wνµ (note that A(t) = at for a steady
|
| 556 |
+
state). Equation (19) relates the dynamical activity with
|
| 557 |
+
the effect of the pulse perturbation on the Markov pro-
|
| 558 |
+
cess. A step response can be calculated in a similar way.
|
| 559 |
+
We apply a constant perturbation switched on at t = 0,
|
| 560 |
+
which can be modeled by f(t) = Θ(t) with Θ(t) being
|
| 561 |
+
the Heaviside step function. From Eq. (17), we obtain
|
| 562 |
+
∆S(s)(t) = χ
|
| 563 |
+
� t
|
| 564 |
+
0
|
| 565 |
+
RS(t′)dt′.
|
| 566 |
+
(20)
|
| 567 |
+
Equation (20) leads to the following bound:
|
| 568 |
+
|∆S(s)(t)| ≤ 2χS2
|
| 569 |
+
max sin
|
| 570 |
+
�√
|
| 571 |
+
at
|
| 572 |
+
�
|
| 573 |
+
,
|
| 574 |
+
(21)
|
| 575 |
+
which holds for 0 ≤
|
| 576 |
+
√
|
| 577 |
+
at ≤ π/2. For t outside this range,
|
| 578 |
+
the trivial inequality |∆S(s)(t)| ≤ 2χS2
|
| 579 |
+
max holds.
|
| 580 |
+
Generalizations.—So far we have been concerned with
|
| 581 |
+
the two-point correlation function. It is straightforward
|
| 582 |
+
to extend the bounds to the multi-point correlation func-
|
| 583 |
+
tions. Let us consider a J-point correlation function:
|
| 584 |
+
⟨S(t1)S(t2) · · · S(tJ)⟩
|
| 585 |
+
≡
|
| 586 |
+
�
|
| 587 |
+
S(Bn1)S(Bn2) · · · S(BnJ)P(n1; t1)
|
| 588 |
+
× P(n2; t2|n1; t1) · · · P(nJ; tJ|nJ−1; tJ−1),
|
| 589 |
+
(22)
|
| 590 |
+
where 0 ≤ t1 < t2 < · · · < tJ. We can obtain analogous
|
| 591 |
+
relations of Eqs. (6) and (8) for Eq. (22).
|
| 592 |
+
Markov processes are often represented by multiple
|
| 593 |
+
variables.
|
| 594 |
+
For example, in stochastic thermodynam-
|
| 595 |
+
ics, a multipartite process can reveal the relation be-
|
| 596 |
+
tween dissipated heat and information flow [70, 71]. For
|
| 597 |
+
|
| 598 |
+
5
|
| 599 |
+
simplicity, here we consider a bivariate Markov pro-
|
| 600 |
+
cess defined in (X(t), Y (t)), {(X(t), Y (t))|t ≥ 0} that
|
| 601 |
+
satisfies in X(t) ∈ BX and Y (t) ∈ BY .
|
| 602 |
+
Moreover,
|
| 603 |
+
we define different score functions for X(t) and Y (t),
|
| 604 |
+
which are expressed by SX(·) and SY (·), respectively,
|
| 605 |
+
and define SX,max ≡ maxB∈BX SX(B) and SY,max ≡
|
| 606 |
+
maxB∈BY SY (B). We are often interested in the correla-
|
| 607 |
+
tion CXY (t) ≡ ⟨SX(t)SY (0)⟩. Then, |CXY (0) − CXY (t)|
|
| 608 |
+
obeys the same upper bounds of Eqs. (5) and (8) except
|
| 609 |
+
that S2
|
| 610 |
+
max is replaced by SX,maxSY,max, which gives a
|
| 611 |
+
bound that is tighter than or equal to Eqs. (5) and (8).
|
| 612 |
+
Conclusion.—In this Letter, we present a relation be-
|
| 613 |
+
tween the correlation function and dynamical activity in
|
| 614 |
+
classical and quantum Markov processes. The obtained
|
| 615 |
+
bounds hold for arbitrary time-independent transition
|
| 616 |
+
rate starting from an arbitrary initial distribution. By
|
| 617 |
+
applying the obtained bounds to the linear response the-
|
| 618 |
+
ory, we demonstrate that the effect of perturbations on
|
| 619 |
+
a steady state system is bounded by the dynamical ac-
|
| 620 |
+
tivity. We expect that our findings have the potential to
|
| 621 |
+
enhance our understanding of nonequilibrium dynamics,
|
| 622 |
+
as the correlation function plays a fundamental role in
|
| 623 |
+
thermodynamics.
|
| 624 |
+
Appendix A: Continuous matrix product state
|
| 625 |
+
The derivation of the correlation bounds employ the
|
| 626 |
+
continuous matrix product state [56, 57], which bridges
|
| 627 |
+
the quantum field and the stochastic process. The con-
|
| 628 |
+
tinuous matrix product state is a type of tensor net-
|
| 629 |
+
work representation that is used to describe many-body
|
| 630 |
+
quantum systems. In one direction, quantum field states
|
| 631 |
+
are analyzed via the corresponding continuous measure-
|
| 632 |
+
ment problem. In the opposite direction, the continuous
|
| 633 |
+
matrix product state can map a classical or quantum
|
| 634 |
+
Markov process into a quantum field so that we can an-
|
| 635 |
+
alyze trajectory information from the view point of the
|
| 636 |
+
quantum field.
|
| 637 |
+
We consider a Lindblad equation [Eq. (10)]. The clas-
|
| 638 |
+
sical Markov process given by Eq. (1) can be covered by
|
| 639 |
+
the Lindblad equation by setting H = 0 and the jump
|
| 640 |
+
operator to be of the form Lm = Lνµ =
|
| 641 |
+
�
|
| 642 |
+
Wνµ |Bν⟩ ⟨Bµ|,
|
| 643 |
+
where {|Bν⟩}ν constitutes the orthonormal basis, corre-
|
| 644 |
+
sponding to the classical states B = {Bν}ν, and Wνµ is
|
| 645 |
+
the transition rate from |Bµ⟩ to |Bµ⟩.
|
| 646 |
+
Applying the continuous measurement on the Lindblad
|
| 647 |
+
equation [Eq. (10)], we obtain a trajectory Γ, which is a
|
| 648 |
+
record of the measurement, as follows:
|
| 649 |
+
Γ ≡ [(t1, m1), (t2, m2), . . . , (tK, mK)],
|
| 650 |
+
(A1)
|
| 651 |
+
where K is the number of total jumps, tk and mk are
|
| 652 |
+
time and type of the kth jump event, respectively. The
|
| 653 |
+
evolution of ρ(t) in a given trajectory Γ is governed
|
| 654 |
+
by a stochastic Schr¨odinger equation.
|
| 655 |
+
By taking the
|
| 656 |
+
average of all possible measurements in the stochastic
|
| 657 |
+
Schr¨odinger equation, we can recover the original Lind-
|
| 658 |
+
blad equation of Eq. (10).
|
| 659 |
+
Applying continuous measurement, we obtain a par-
|
| 660 |
+
ticular trajectory Γ. In the continuous matrix product
|
| 661 |
+
state, such a trajectory is recorded in the following state:
|
| 662 |
+
|Γ⟩ ≡ φ†
|
| 663 |
+
mK(tK) · · · φ†
|
| 664 |
+
m2(t2)φ†
|
| 665 |
+
m1(t1) |vac⟩ ,
|
| 666 |
+
(A2)
|
| 667 |
+
where φ(t) is the field operator that satisfies the commu-
|
| 668 |
+
tation relation [φm(t), φ†
|
| 669 |
+
m′(t′)] = δmm′δ(t − t′), and |vac⟩
|
| 670 |
+
is the vacuum state of φm(t), where φ†
|
| 671 |
+
m(t) creates a mth
|
| 672 |
+
particle at t. The time evolution of the system and field
|
| 673 |
+
state |Γ⟩ is given by
|
| 674 |
+
|Φ(t)⟩ = U(t; H, {Lm}) |Φ(0)⟩ ,
|
| 675 |
+
(A3)
|
| 676 |
+
where U(t; H, {Lm}) is given by
|
| 677 |
+
U(t; H, {Lm}) ≡ T exp
|
| 678 |
+
�
|
| 679 |
+
−i
|
| 680 |
+
� t
|
| 681 |
+
0
|
| 682 |
+
ds (Heff ⊗ IF
|
| 683 |
+
+
|
| 684 |
+
�
|
| 685 |
+
m
|
| 686 |
+
iLm ⊗ φ†
|
| 687 |
+
m(s))
|
| 688 |
+
�
|
| 689 |
+
,
|
| 690 |
+
(A4)
|
| 691 |
+
In Eq. (A4), the initial state is represented by |Φ(0)⟩ =
|
| 692 |
+
|ψ(0)⟩ ⊗ |vac⟩, with |ψ(0)⟩ being the initial state of the
|
| 693 |
+
system; T is the time ordering operator, and IF is the
|
| 694 |
+
identity operator in the field. |Φ(t)⟩ records the jump
|
| 695 |
+
events occurring within the interval [0, t]. The continuous
|
| 696 |
+
matrix product state |Φ(t)⟩ comprises the system, which
|
| 697 |
+
corresponds to the state of the Markov process, and the
|
| 698 |
+
field, which records jump events. The time of the original
|
| 699 |
+
Lindblad equation is expressed by t while that of the
|
| 700 |
+
continuous matrix product state is by t. All information
|
| 701 |
+
about measurement is recorded by creating particles in
|
| 702 |
+
the quantum field through the application of an operator
|
| 703 |
+
φ†
|
| 704 |
+
m(t) to the vacuum state |vac⟩.
|
| 705 |
+
For a small time increment ∆t, considering the time
|
| 706 |
+
evolution Eq. (A3) and tracing over the field, the time
|
| 707 |
+
evolution of the system is given by the Kraus represen-
|
| 708 |
+
tation:
|
| 709 |
+
ρ(t + ∆t) =
|
| 710 |
+
�
|
| 711 |
+
m
|
| 712 |
+
Vmρ(t)V †
|
| 713 |
+
m,
|
| 714 |
+
(A5)
|
| 715 |
+
where Vm are Kraus operators:
|
| 716 |
+
V0 ≡ I − i∆tH,
|
| 717 |
+
(A6)
|
| 718 |
+
Vm ≡
|
| 719 |
+
√
|
| 720 |
+
∆tLm
|
| 721 |
+
(1 ≤ m).
|
| 722 |
+
(A7)
|
| 723 |
+
Dividing the interval [0, t] into Z ≫ 1 equipartitioned
|
| 724 |
+
intervals, the time evolution from t = 0 to t can be rep-
|
| 725 |
+
resented by successive applications of Eq. (A5):
|
| 726 |
+
ρ(t) =
|
| 727 |
+
�
|
| 728 |
+
mZ
|
| 729 |
+
· · ·
|
| 730 |
+
�
|
| 731 |
+
m1
|
| 732 |
+
VmZ · · · Vm1 |ψ(0)⟩ ⟨ψ(0)| V †
|
| 733 |
+
m1 · · · V †
|
| 734 |
+
mZ.
|
| 735 |
+
(A8)
|
| 736 |
+
Using the continuous matrix product state, we can obtain
|
| 737 |
+
all the information about the Markov processes. Given
|
| 738 |
+
the initial state |ψ(0)⟩, the trajectory probability within
|
| 739 |
+
[0, t] can be obtained via
|
| 740 |
+
P(Γ, t) = ⟨Φ(t)|IS ⊗ |Γ⟩ ⟨Γ| |Φ(t)⟩ .
|
| 741 |
+
(A9)
|
| 742 |
+
|
| 743 |
+
6
|
| 744 |
+
The system state ρ(t) can be computed as follows:
|
| 745 |
+
ρ(t) = TrF [|Φ(t)⟩ ⟨Φ(t)|] ,
|
| 746 |
+
(A10)
|
| 747 |
+
where TrF denotes the trace operation with respect to
|
| 748 |
+
the field state.
|
| 749 |
+
Next, we explain a scaled continuous matrix product
|
| 750 |
+
state, which was recently introduced in Ref. [64].
|
| 751 |
+
We
|
| 752 |
+
want to study the time evolution of the continuous ma-
|
| 753 |
+
trix product state.
|
| 754 |
+
Initially, we might consider using
|
| 755 |
+
the unitary operator defined in Eq. (A4) as the time-
|
| 756 |
+
evolution operator. However, this approach has a prob-
|
| 757 |
+
lem when we try to calculate the fidelity between two
|
| 758 |
+
continuous matrix product states at different times, be-
|
| 759 |
+
cause the integration ranges for |Φ(t1)⟩ and |Φ(t2)⟩ are
|
| 760 |
+
different. Therefore, we instead use the scaled represen-
|
| 761 |
+
tation. Let us define τ > 0, which is the final time of
|
| 762 |
+
the evolution. For 0 ≤ t ≤ τ, the scaled matrix product
|
| 763 |
+
state representation is given by
|
| 764 |
+
|Ψ(t)⟩ = U
|
| 765 |
+
�
|
| 766 |
+
τ; t
|
| 767 |
+
τ H,
|
| 768 |
+
��
|
| 769 |
+
t
|
| 770 |
+
τ Lm
|
| 771 |
+
��
|
| 772 |
+
|Ψ(0)⟩ ,
|
| 773 |
+
(A11)
|
| 774 |
+
where |Ψ(0)⟩ = |ψ(0)⟩ ⊗ |vac⟩. Here, |Φ(t)⟩ and |Ψ(t)⟩
|
| 775 |
+
represent the states of the genuine and scaled continuous
|
| 776 |
+
matrix product states, respectively. In the scaled con-
|
| 777 |
+
tinuous matrix product state [Eq. (A11)], H and Lm are
|
| 778 |
+
scaled as (t/τ)H and
|
| 779 |
+
�
|
| 780 |
+
t/τLm, respectively, which corre-
|
| 781 |
+
sponds to the Lindblad equation that generates dynamics
|
| 782 |
+
that are t/τ times as fast as that of the original dynam-
|
| 783 |
+
ics. The scaling allows us to have the same integration
|
| 784 |
+
range for all values of t, making it possible to evaluate
|
| 785 |
+
the fidelity at different times, that is ⟨Ψ(t2)|Ψ(t1)⟩. As
|
| 786 |
+
mentioned above, since the scaled matrix product state
|
| 787 |
+
is the same as the original one except for their time scale,
|
| 788 |
+
both states provide us with the same information except
|
| 789 |
+
for the time scale. At the final time τ, both the origi-
|
| 790 |
+
nal and the scaled representations give the same state,
|
| 791 |
+
|Φ(τ)⟩ = |Φ(τ)⟩.
|
| 792 |
+
Moreover, |Ψ(0)⟩ corresponds to the
|
| 793 |
+
null dynamics, that is, the dynamics without any state
|
| 794 |
+
change. For instance, the system state can be obtained
|
| 795 |
+
by
|
| 796 |
+
ρ(t) = TrF [|Ψ(t)⟩ ⟨Ψ(t)|] = TrF [|Φ(t)⟩ ⟨Φ(t)|] .
|
| 797 |
+
(A12)
|
| 798 |
+
When deriving the correlation bounds, we employ the
|
| 799 |
+
scaled representation.
|
| 800 |
+
Appendix B: Initially mixed state case
|
| 801 |
+
The continuous matrix product state given by Eq. (A3)
|
| 802 |
+
only considers initially pure state |ψ(0)⟩. Let us consider
|
| 803 |
+
the initially mixed state case. Let ρ(0) be the initial den-
|
| 804 |
+
sity operator, which is mixed in general. Let us consider
|
| 805 |
+
the ancilla A that purifies ρ(0), that is
|
| 806 |
+
ρ(0) = TrA[| ˜ψ(0)⟩ ⟨ ˜ψ(0)|],
|
| 807 |
+
(B1)
|
| 808 |
+
where TrA is the trace operation with respect to the an-
|
| 809 |
+
cilla A. Let us introduce the continuous matrix product
|
| 810 |
+
state operator corresponding to Eq. (A4), that is applied
|
| 811 |
+
to the purified state:
|
| 812 |
+
˜U(t; H, {Lm}) ≡T exp
|
| 813 |
+
�
|
| 814 |
+
−i
|
| 815 |
+
� t
|
| 816 |
+
0
|
| 817 |
+
ds(Heff ⊗ IA ⊗ IF
|
| 818 |
+
+
|
| 819 |
+
�
|
| 820 |
+
m
|
| 821 |
+
iLm ⊗ IA ⊗ φ†
|
| 822 |
+
m(s))
|
| 823 |
+
�
|
| 824 |
+
,
|
| 825 |
+
(B2)
|
| 826 |
+
The Kraus operators corresponding to Eq. (B2) is given
|
| 827 |
+
by
|
| 828 |
+
˜Vm = Vm ⊗ IA,
|
| 829 |
+
(B3)
|
| 830 |
+
where IA is the identity operation in the ancilla and Vm
|
| 831 |
+
are defined in Eqs. (A6) and (A7). Using Eq. (B3), it
|
| 832 |
+
can be confirmed that the one-step evolution yields
|
| 833 |
+
TrA
|
| 834 |
+
��
|
| 835 |
+
m
|
| 836 |
+
˜Vm |˜Ψ(0)⟩ ⟨˜Ψ(0)| ˜V †
|
| 837 |
+
m
|
| 838 |
+
�
|
| 839 |
+
=
|
| 840 |
+
�
|
| 841 |
+
m
|
| 842 |
+
VmTrA
|
| 843 |
+
�
|
| 844 |
+
|˜Ψ(0)⟩ ⟨˜Ψ(0)|
|
| 845 |
+
�
|
| 846 |
+
V †
|
| 847 |
+
m
|
| 848 |
+
=
|
| 849 |
+
�
|
| 850 |
+
m
|
| 851 |
+
Vmρ(0)V †
|
| 852 |
+
m,
|
| 853 |
+
(B4)
|
| 854 |
+
which actually yields the consistent time evolution.
|
| 855 |
+
Appendix C: Fidelity calculation of continuous
|
| 856 |
+
matrix product states
|
| 857 |
+
The bounds considered in this Letter relate to the cal-
|
| 858 |
+
culation of the quantum Fisher information. Specifically,
|
| 859 |
+
we need to calculate the following fidelity:
|
| 860 |
+
⟨Ψ(t2)|Ψ(t1)⟩ = TrSF [|Ψ(t1)⟩ ⟨Ψ(t2)|]
|
| 861 |
+
= TrS [ζ(τ; t1, t2)] ,
|
| 862 |
+
(C1)
|
| 863 |
+
where ζ(τ; t1, t2) ≡ TrF [|Ψ(t1)⟩ ⟨Ψ(t2)|]. ζ(τ; t1, t2) sat-
|
| 864 |
+
isfies the two-sided Lindblad equation [72, 73]:
|
| 865 |
+
d
|
| 866 |
+
dtζ(t; t1, t2) = −iH1ζ + iζH2 +
|
| 867 |
+
�
|
| 868 |
+
m
|
| 869 |
+
L1,mζL†
|
| 870 |
+
2,m
|
| 871 |
+
− 1
|
| 872 |
+
2
|
| 873 |
+
�
|
| 874 |
+
m
|
| 875 |
+
�
|
| 876 |
+
L†
|
| 877 |
+
1,mL1,mζ + ζL†
|
| 878 |
+
2,mL2,m
|
| 879 |
+
�
|
| 880 |
+
,
|
| 881 |
+
(C2)
|
| 882 |
+
where H1 ≡ (t1/τ)H and L1,m ≡
|
| 883 |
+
�
|
| 884 |
+
t1/τLm (H2 and
|
| 885 |
+
L2,m are defined in a similar manner).
|
| 886 |
+
Note that
|
| 887 |
+
ζ(τ; t1, t2) is not a density operator, since its trace is not
|
| 888 |
+
necessarily equal to unity. To calculate the fidelity using
|
| 889 |
+
Eq. (C2), we solve Eq. (C2) from t = 0 to t = τ with the
|
| 890 |
+
initial value ζ(0; t1, t2) = ρ(0).
|
| 891 |
+
Using Eq. (C2), we can compute the fidelity between
|
| 892 |
+
two scaled continuous matrix product states:
|
| 893 |
+
η(τ) ≡ |⟨Ψ(τ)|Ψ(0)⟩|2
|
| 894 |
+
(C3)
|
| 895 |
+
|
| 896 |
+
7
|
| 897 |
+
From Eq. (C2), |ζ(t; τ, 0)|2 = η(τ) obeys the following
|
| 898 |
+
equation [66]:
|
| 899 |
+
˙ζ = −iHeffζ = −iHζ − 1
|
| 900 |
+
2
|
| 901 |
+
�
|
| 902 |
+
m
|
| 903 |
+
L†
|
| 904 |
+
mLmζ.
|
| 905 |
+
(C4)
|
| 906 |
+
Then the fidelity is obtained as follows:
|
| 907 |
+
η(τ) =
|
| 908 |
+
��TrS
|
| 909 |
+
�
|
| 910 |
+
e−iHeffτρ(0)
|
| 911 |
+
���2 .
|
| 912 |
+
(C5)
|
| 913 |
+
The classical case can be calculated by setting H = 0
|
| 914 |
+
[66].
|
| 915 |
+
Appendix D: Derivation of Eq. (5)
|
| 916 |
+
Here we provide the derivation of Eq. (5).
|
| 917 |
+
Using
|
| 918 |
+
the scaled continuous matrix product state, a classical
|
| 919 |
+
Markov process can be analyzed via quantum mechan-
|
| 920 |
+
ics, and thus we can take advantage of inequalities in
|
| 921 |
+
quantum information. Let O be an arbitrary Hermitian
|
| 922 |
+
operator, and ⟨O⟩t ≡ Tr[ρ(t)O].
|
| 923 |
+
In the field of quan-
|
| 924 |
+
tum speed limit, the following relation was recently used
|
| 925 |
+
[25, 26]:
|
| 926 |
+
��⟨O⟩t2 − ⟨O⟩t1
|
| 927 |
+
�� = Tr [O(ρ(t2) − ρ(t1))]
|
| 928 |
+
≤ ∥O∥op ∥ρ(t2) − ρ(t1)∥tr
|
| 929 |
+
= 2 ∥O∥op TD (ρ(t2), ρ(t1)) .
|
| 930 |
+
(D1)
|
| 931 |
+
The second line of Eq. (D1) is due to the H¨older inequal-
|
| 932 |
+
ity (see Eq. (H6)). We will use Eq. (D1) for the deriva-
|
| 933 |
+
tion. The sketch of the proof for Eq. (5) is as follows:
|
| 934 |
+
• Consider the scaled continuous matrix product
|
| 935 |
+
state for ρ(t)
|
| 936 |
+
• Assign the Hermitian operator that calculates the
|
| 937 |
+
correlation function for O
|
| 938 |
+
• Obtain an upper bound for the trace distance
|
| 939 |
+
TD (ρ(t2), ρ(t1)) using the dynamical activity
|
| 940 |
+
When considering classical probability and quantum
|
| 941 |
+
spaces in Eq. (D1), Eq. (D1) leads to the classical and
|
| 942 |
+
quantum bounds, respectively.
|
| 943 |
+
We consider Eq. (D1) for the classical probability
|
| 944 |
+
space. Let us assume that two density operators ρ and σ
|
| 945 |
+
only have diagonal elements:
|
| 946 |
+
ρ =
|
| 947 |
+
�
|
| 948 |
+
x
|
| 949 |
+
p(x) |x⟩ ⟨x| ,
|
| 950 |
+
(D2)
|
| 951 |
+
σ =
|
| 952 |
+
�
|
| 953 |
+
x
|
| 954 |
+
q(x) |x⟩ ⟨x| ,
|
| 955 |
+
(D3)
|
| 956 |
+
where p(x) and q(x) are arbitrary probability distribu-
|
| 957 |
+
tions and {|x⟩}x constitutes the orthonormal basis. By
|
| 958 |
+
calculating the trace distance [Eq. (H7)] for Eqs. (D2)
|
| 959 |
+
and (D3), TD(ρ, σ) reduces to the total variation dis-
|
| 960 |
+
tance [Eq. (H12)]:
|
| 961 |
+
TD(ρ, σ) = TVD(p, q).
|
| 962 |
+
(D4)
|
| 963 |
+
Now we consider a particular probability distribution.
|
| 964 |
+
The probability of measuring a trajectory Γ and Bν at
|
| 965 |
+
the end time is
|
| 966 |
+
P(Γ, ν, t) ≡ ⟨Ψ(t)|(|Bν⟩ ⟨Bν| ⊗ |Γ⟩ ⟨Γ|)|Ψ(t)⟩ ,
|
| 967 |
+
(D5)
|
| 968 |
+
where |Ψ(t)⟩ is the scaled continuous matrix product
|
| 969 |
+
state. When considering initially mixed state, we may
|
| 970 |
+
use |˜Ψ(t)⟩.
|
| 971 |
+
Because arccos Bhat(·, ·) constitutes the
|
| 972 |
+
geodesic distance under the Fisher information metric
|
| 973 |
+
[74], the following relation holds [64]:
|
| 974 |
+
1
|
| 975 |
+
2
|
| 976 |
+
� t2
|
| 977 |
+
t1
|
| 978 |
+
�
|
| 979 |
+
A(t)
|
| 980 |
+
t
|
| 981 |
+
dt ≥ arccos [Bhat (P(Γ, ν, t1), P(Γ, ν, t2))] ,
|
| 982 |
+
(D6)
|
| 983 |
+
which yields
|
| 984 |
+
cos
|
| 985 |
+
�
|
| 986 |
+
1
|
| 987 |
+
2
|
| 988 |
+
� t2
|
| 989 |
+
t1
|
| 990 |
+
�
|
| 991 |
+
A(t)
|
| 992 |
+
t
|
| 993 |
+
dt
|
| 994 |
+
�
|
| 995 |
+
≤ Bhat (P(Γ, ν, t1), P(Γ, ν, t2)) ,
|
| 996 |
+
(D7)
|
| 997 |
+
for 0 ≤ 1
|
| 998 |
+
2
|
| 999 |
+
� t2
|
| 1000 |
+
t1
|
| 1001 |
+
√
|
| 1002 |
+
A(t)
|
| 1003 |
+
t
|
| 1004 |
+
dt ≤ π
|
| 1005 |
+
2 . Substituting Eq. (D7) into
|
| 1006 |
+
Eq. (H17) to obtain
|
| 1007 |
+
TVD(P(Γ, ν, t1), P(Γ, ν, t2))
|
| 1008 |
+
≤
|
| 1009 |
+
�
|
| 1010 |
+
1 − Bhat (P(Γ, ν, t1), P(Γ, ν, t2))2
|
| 1011 |
+
≤
|
| 1012 |
+
�
|
| 1013 |
+
�
|
| 1014 |
+
�
|
| 1015 |
+
�1 − cos
|
| 1016 |
+
�
|
| 1017 |
+
1
|
| 1018 |
+
2
|
| 1019 |
+
� t2
|
| 1020 |
+
t1
|
| 1021 |
+
�
|
| 1022 |
+
A(t)
|
| 1023 |
+
t
|
| 1024 |
+
dt
|
| 1025 |
+
�2
|
| 1026 |
+
= sin
|
| 1027 |
+
�
|
| 1028 |
+
1
|
| 1029 |
+
2
|
| 1030 |
+
� t2
|
| 1031 |
+
t1
|
| 1032 |
+
�
|
| 1033 |
+
A(t)
|
| 1034 |
+
t
|
| 1035 |
+
dt
|
| 1036 |
+
�
|
| 1037 |
+
.
|
| 1038 |
+
(D8)
|
| 1039 |
+
From Eqs. (D1), (D4), and (D8), we obtain
|
| 1040 |
+
��⟨O⟩t2 − ⟨O⟩t1
|
| 1041 |
+
��
|
| 1042 |
+
≤ 2 ∥O∥op sin
|
| 1043 |
+
�
|
| 1044 |
+
1
|
| 1045 |
+
2
|
| 1046 |
+
� t2
|
| 1047 |
+
t1
|
| 1048 |
+
�
|
| 1049 |
+
A(t)
|
| 1050 |
+
t
|
| 1051 |
+
dt
|
| 1052 |
+
�
|
| 1053 |
+
,
|
| 1054 |
+
(D9)
|
| 1055 |
+
which holds for 0 ≤ 1
|
| 1056 |
+
2
|
| 1057 |
+
� t2
|
| 1058 |
+
t1
|
| 1059 |
+
√
|
| 1060 |
+
A(t)
|
| 1061 |
+
t
|
| 1062 |
+
dt ≤ π
|
| 1063 |
+
2 . Equation (D9)
|
| 1064 |
+
is the central inequality for deriving the thermodynamic
|
| 1065 |
+
correlation inequality.
|
| 1066 |
+
We now implement the correlation calculation C(τ) =
|
| 1067 |
+
⟨S(0)S(τ)⟩ with an Hermitian operator acting on the
|
| 1068 |
+
scaled continuous matrix product state. Given a trajec-
|
| 1069 |
+
tory Γ and the final state Bν, we can calculate the cor-
|
| 1070 |
+
relation S(0)S(τ) using |Ψ(τ)⟩. We assume that a real
|
| 1071 |
+
function M(Γ, ν) calculates the correlation given such in-
|
| 1072 |
+
formation:
|
| 1073 |
+
M(Γ, ν) ≡ S(X(0))S(X(τ)) = S(0)S(τ).
|
| 1074 |
+
(D10)
|
| 1075 |
+
Now we introduce an Hermitian operator M, whose
|
| 1076 |
+
eigendecomposition reads
|
| 1077 |
+
M =
|
| 1078 |
+
�
|
| 1079 |
+
Γ,ν
|
| 1080 |
+
M(Γ, ν) |Γ, ν⟩ ⟨Γ, ν| .
|
| 1081 |
+
(D11)
|
| 1082 |
+
|
| 1083 |
+
8
|
| 1084 |
+
Since Eq. (D11) is the eigendecomposition of M, from
|
| 1085 |
+
Eq. (H2), the operator norm of M is
|
| 1086 |
+
∥M∥op = max
|
| 1087 |
+
Γ,ν M(Γ, ν)
|
| 1088 |
+
=
|
| 1089 |
+
max
|
| 1090 |
+
Bi,Bj∈B [S(X(0) = Bi)S(X(τ) = Bj)]
|
| 1091 |
+
= S2
|
| 1092 |
+
max,
|
| 1093 |
+
(D12)
|
| 1094 |
+
where Smax is the maximum absolute value of S(Bi) for
|
| 1095 |
+
Bi ∈ B defined in Eq. (2).
|
| 1096 |
+
When we evaluate M in
|
| 1097 |
+
|Ψ(τ)⟩, it gives
|
| 1098 |
+
⟨Ψ(τ)|M|Ψ(τ)⟩ = ⟨Ψ(τ)|
|
| 1099 |
+
�
|
| 1100 |
+
Γ,ν
|
| 1101 |
+
M(Γ, ν) |Γ, ν⟩ ⟨Γ, ν| |Ψ(τ)⟩
|
| 1102 |
+
=
|
| 1103 |
+
�
|
| 1104 |
+
Γ,ν
|
| 1105 |
+
M(Γ, ν)P(Γ, ν, τ)
|
| 1106 |
+
= ⟨S(0)S(τ)⟩ .
|
| 1107 |
+
(D13)
|
| 1108 |
+
Because |Ψ(0)⟩ corresponds to the null dynamics (the
|
| 1109 |
+
state does not evolve at all), ⟨Ψ(0)|M|Ψ(0)⟩ = ⟨S(0)2⟩.
|
| 1110 |
+
In a similar way, when we consider |Ψ(t)⟩ for 0 < t <
|
| 1111 |
+
τ, we have ⟨Ψ(t)|M|Ψ(t)⟩ = ⟨S(0)S(t)⟩.
|
| 1112 |
+
Substituting
|
| 1113 |
+
Eqs. (D12) and (D13) into Eq. (D9), we finally obtain
|
| 1114 |
+
Eq. (5) in the main text.
|
| 1115 |
+
Appendix E: Derivation of Eqs. (8) and (12)
|
| 1116 |
+
In this section, we derive Eqs. (8) and (12). We evalu-
|
| 1117 |
+
ate TD(ρ(τ), ρ(0)) in Eq. (D1). Since continuous matrix
|
| 1118 |
+
product states are pure, we have [Eq. (H10)]
|
| 1119 |
+
TD(|Ψ(t1)⟩ , |Ψ(t2)⟩) =
|
| 1120 |
+
�
|
| 1121 |
+
1 − | ⟨Ψ(t2)|Ψ(t1)⟩ |2.
|
| 1122 |
+
(E1)
|
| 1123 |
+
As explained in Appendix C, the fidelity can be com-
|
| 1124 |
+
puted, which leads to Eq. (8) in the main text.
|
| 1125 |
+
The quantum case can be derived in a similar manner.
|
| 1126 |
+
As explained in Eqs. (D10) and (D11), the correlation
|
| 1127 |
+
function can be computed given a trajectory Γ for the
|
| 1128 |
+
quantum case as well.
|
| 1129 |
+
Then, the quantum version of
|
| 1130 |
+
Eq. (8) is obtained in the same way as the classical bound.
|
| 1131 |
+
We next derive Eq. (12). Since the Bures angle con-
|
| 1132 |
+
stitutes the geodesic length under the quantum Fisher
|
| 1133 |
+
information metric [6, 75], similar to Eq. (D6), the fol-
|
| 1134 |
+
lowing inequality holds [64]:
|
| 1135 |
+
arccos |⟨Ψ(t2)|Ψ(t1)⟩| ≤ 1
|
| 1136 |
+
2
|
| 1137 |
+
� t2
|
| 1138 |
+
t1
|
| 1139 |
+
�
|
| 1140 |
+
B(t)
|
| 1141 |
+
t
|
| 1142 |
+
dt,
|
| 1143 |
+
(E2)
|
| 1144 |
+
where B(t) is the quantum dynamical activity [64] (Ap-
|
| 1145 |
+
pendix F). For 0 ≤ 1
|
| 1146 |
+
2
|
| 1147 |
+
� t2
|
| 1148 |
+
t1
|
| 1149 |
+
√
|
| 1150 |
+
B(t)
|
| 1151 |
+
t
|
| 1152 |
+
dt ≤ π
|
| 1153 |
+
2 , we have
|
| 1154 |
+
cos
|
| 1155 |
+
�
|
| 1156 |
+
1
|
| 1157 |
+
2
|
| 1158 |
+
� t2
|
| 1159 |
+
t1
|
| 1160 |
+
�
|
| 1161 |
+
B(t)
|
| 1162 |
+
t
|
| 1163 |
+
dt
|
| 1164 |
+
�
|
| 1165 |
+
≤ |⟨Ψ(t2)|Ψ(t1)⟩| .
|
| 1166 |
+
(E3)
|
| 1167 |
+
Substituting Eq. (E3) into Eq. (E1), we obtain
|
| 1168 |
+
TD (|Ψ(t1)⟩ , |Ψ(t2)⟩) ≤ sin
|
| 1169 |
+
�
|
| 1170 |
+
1
|
| 1171 |
+
2
|
| 1172 |
+
� t2
|
| 1173 |
+
t1
|
| 1174 |
+
�
|
| 1175 |
+
B(t)
|
| 1176 |
+
t
|
| 1177 |
+
dt
|
| 1178 |
+
�
|
| 1179 |
+
.
|
| 1180 |
+
(E4)
|
| 1181 |
+
From Eqs. (D1) and (E4), we obtain Eq. (12) in the main
|
| 1182 |
+
text.
|
| 1183 |
+
Appendix F: Quantum dynamical activity
|
| 1184 |
+
The quantum dynamical activity B(t) is defined
|
| 1185 |
+
through the quantum Fisher information [64]. The quan-
|
| 1186 |
+
tum Fisher information for the scaled continuous matrix
|
| 1187 |
+
product state is calculated as follows:
|
| 1188 |
+
J (t) =
|
| 1189 |
+
8
|
| 1190 |
+
∆t2 [1 − | ⟨Ψ(t) | Ψ(t + ∆t)⟩ |],
|
| 1191 |
+
(F1)
|
| 1192 |
+
where ∆t is a sufficiently small increment. The fidelity
|
| 1193 |
+
| ⟨Ψ(t) | Ψ(t + ∆t)⟩ | can be computed by the two-sided
|
| 1194 |
+
Lindblad equation [Eq. (C2)]. The quantum dynamical
|
| 1195 |
+
activity is defined by [64]
|
| 1196 |
+
B(t) ≡ J (t)
|
| 1197 |
+
t2 .
|
| 1198 |
+
(F2)
|
| 1199 |
+
Appendix G: Linear response
|
| 1200 |
+
Here, we show detailed calculations of the linear re-
|
| 1201 |
+
sponse theory. Let us consider applying a weak pertur-
|
| 1202 |
+
bation χFf(t) to the master equation (1). Considering
|
| 1203 |
+
the perturbation expansion with respect to χ, upto the
|
| 1204 |
+
first order, the probability distribution is expanded as
|
| 1205 |
+
P(t) = Pst + χP1(t),
|
| 1206 |
+
(G1)
|
| 1207 |
+
where P1(t) is the first-order term. Substituting Eq. (G1)
|
| 1208 |
+
into Eq. (1), we have
|
| 1209 |
+
d
|
| 1210 |
+
dt (Pst + χP1(t)) = (W + χFf(t)) (Pst + χP1(t)) ,
|
| 1211 |
+
(G2)
|
| 1212 |
+
in which collecting the terms with respect to the order of
|
| 1213 |
+
χ yields
|
| 1214 |
+
O(χ0)
|
| 1215 |
+
d
|
| 1216 |
+
dtPst = WPst,
|
| 1217 |
+
(G3)
|
| 1218 |
+
O(χ1)
|
| 1219 |
+
d
|
| 1220 |
+
dtP1(t) = WP1(t) + FPstf(t).
|
| 1221 |
+
(G4)
|
| 1222 |
+
The zeroth order equation vanishes in definition since Pst
|
| 1223 |
+
is assumed to be the stationary solution of Eq. (1). P1(t)
|
| 1224 |
+
is given by Eq. (15) in the main text. In the main text,
|
| 1225 |
+
we consider a scoring function G(Bn) and its expecta-
|
| 1226 |
+
tion given by Eq. (16). The change of ⟨G⟩ due to the
|
| 1227 |
+
perturbation can be represented by
|
| 1228 |
+
∆G(t) ≡ χ1GP1(t)
|
| 1229 |
+
= χ
|
| 1230 |
+
� t
|
| 1231 |
+
−∞
|
| 1232 |
+
1GeW(t−t′)FPstf(t′)dt′
|
| 1233 |
+
= χ
|
| 1234 |
+
� ∞
|
| 1235 |
+
−∞
|
| 1236 |
+
RG(t − t′)f(t′)dt′,
|
| 1237 |
+
(G5)
|
| 1238 |
+
|
| 1239 |
+
9
|
| 1240 |
+
where RG(t) is the linear response function [Eq. (18)].
|
| 1241 |
+
From Eq. (3), the time derivative of C(t) reads
|
| 1242 |
+
d
|
| 1243 |
+
dtC(t) = 1SeWtWSPst.
|
| 1244 |
+
(G6)
|
| 1245 |
+
In the main text, we consider the case G = S and
|
| 1246 |
+
F = WS, which will be assumed in the following. The
|
| 1247 |
+
perturbation WS can be expressed by
|
| 1248 |
+
WS =
|
| 1249 |
+
�
|
| 1250 |
+
����
|
| 1251 |
+
S11W11
|
| 1252 |
+
S22W12
|
| 1253 |
+
· · ·
|
| 1254 |
+
SNNW1N
|
| 1255 |
+
S11W21
|
| 1256 |
+
S22W22
|
| 1257 |
+
SNNW2N
|
| 1258 |
+
...
|
| 1259 |
+
...
|
| 1260 |
+
...
|
| 1261 |
+
S11WN1 S22WN2 · · · SNNWNN
|
| 1262 |
+
�
|
| 1263 |
+
���� .
|
| 1264 |
+
(G7)
|
| 1265 |
+
We immediately obtain
|
| 1266 |
+
RS(t) = d
|
| 1267 |
+
dtC(t).
|
| 1268 |
+
(G8)
|
| 1269 |
+
For the pulse perturbation, f(t) = δ(t), where δ(t) is
|
| 1270 |
+
the Dirac delta function, we obtain
|
| 1271 |
+
∆S(p)(t) = χ
|
| 1272 |
+
� ∞
|
| 1273 |
+
−∞
|
| 1274 |
+
RS(t − t′)δ(t′)dt′
|
| 1275 |
+
= χRS(t)
|
| 1276 |
+
= χ d
|
| 1277 |
+
dtC(t).
|
| 1278 |
+
(G9)
|
| 1279 |
+
Using Eq. (7), we obtain Eq. (19).
|
| 1280 |
+
Next, we consider the step perturbation, i.e., f(t) =
|
| 1281 |
+
Θ(t), where Θ(t) is the Heaviside step function:
|
| 1282 |
+
Θ(t) =
|
| 1283 |
+
�
|
| 1284 |
+
0
|
| 1285 |
+
(t < 0)
|
| 1286 |
+
1
|
| 1287 |
+
(t ≥ 0) .
|
| 1288 |
+
(G10)
|
| 1289 |
+
Then we have
|
| 1290 |
+
∆S(p)(t) = χ
|
| 1291 |
+
� ∞
|
| 1292 |
+
−∞
|
| 1293 |
+
RS(t − t′)Θ(t′)dt′
|
| 1294 |
+
= χ
|
| 1295 |
+
� t
|
| 1296 |
+
0
|
| 1297 |
+
RS(t − t′)dt′
|
| 1298 |
+
= χ
|
| 1299 |
+
� t
|
| 1300 |
+
0
|
| 1301 |
+
RS(t′)dt′
|
| 1302 |
+
= χ
|
| 1303 |
+
� t
|
| 1304 |
+
0
|
| 1305 |
+
dC(t′)
|
| 1306 |
+
dt′
|
| 1307 |
+
dt′
|
| 1308 |
+
= χ (C(t) − C(0)) ,
|
| 1309 |
+
(G11)
|
| 1310 |
+
which yields Eq. (21) in the main text.
|
| 1311 |
+
Appendix H: Norm and distance measures
|
| 1312 |
+
For readers’ convenience, we here review the norm and
|
| 1313 |
+
distance measures for quantum and classical systems. Let
|
| 1314 |
+
A and B be arbitrary Hermitian operators. The Shattan
|
| 1315 |
+
p-norm is defined by
|
| 1316 |
+
∥A∥p ≡
|
| 1317 |
+
�
|
| 1318 |
+
Tr
|
| 1319 |
+
��√
|
| 1320 |
+
A2
|
| 1321 |
+
�p�� 1
|
| 1322 |
+
p =
|
| 1323 |
+
�
|
| 1324 |
+
�
|
| 1325 |
+
�
|
| 1326 |
+
λ∈evals(A)
|
| 1327 |
+
|λ|p
|
| 1328 |
+
�
|
| 1329 |
+
�
|
| 1330 |
+
1
|
| 1331 |
+
p
|
| 1332 |
+
.
|
| 1333 |
+
(H1)
|
| 1334 |
+
For particular p, we have
|
| 1335 |
+
∥A∥op = ∥A∥∞ =
|
| 1336 |
+
max
|
| 1337 |
+
λ∈evals(A) |λ|,
|
| 1338 |
+
(H2)
|
| 1339 |
+
∥A∥tr = ∥A∥1 = Tr
|
| 1340 |
+
�√
|
| 1341 |
+
A2
|
| 1342 |
+
�
|
| 1343 |
+
,
|
| 1344 |
+
(H3)
|
| 1345 |
+
∥A∥hs = ∥A∥2 =
|
| 1346 |
+
�
|
| 1347 |
+
Tr [A2],
|
| 1348 |
+
(H4)
|
| 1349 |
+
where evals(A) gives a set of eigenvalues of A.
|
| 1350 |
+
Equa-
|
| 1351 |
+
tions (H2), (H3), and (H4) are referred to as the opera-
|
| 1352 |
+
tor norm, the trace norm, and the Hilbert-Schmidt norm,
|
| 1353 |
+
respectively. The H¨older inequality states
|
| 1354 |
+
|Tr [AB]| ≤ ∥A∥p ∥B∥q .
|
| 1355 |
+
(H5)
|
| 1356 |
+
where p and q should satisfy 1/p+1/q = 1. When p = q =
|
| 1357 |
+
2, Eq. (H5) reduces to the Cauchy-Schwarz inequality. In
|
| 1358 |
+
particular, we use p = ∞ and q = 1 case:
|
| 1359 |
+
|Tr [AB]| ≤ ∥A∥op ∥B∥tr .
|
| 1360 |
+
(H6)
|
| 1361 |
+
Let us define the trace distance and quantum fidelity:
|
| 1362 |
+
TD(ρ, σ) ≡ 1
|
| 1363 |
+
2 ∥ρ − σ∥1 ,
|
| 1364 |
+
(H7)
|
| 1365 |
+
Fid(ρ, σ) ≡
|
| 1366 |
+
�
|
| 1367 |
+
Tr
|
| 1368 |
+
�√ρσ√ρ
|
| 1369 |
+
�2
|
| 1370 |
+
.
|
| 1371 |
+
(H8)
|
| 1372 |
+
When considering pure states |ψ⟩ and |φ⟩, the fidelity
|
| 1373 |
+
reduces to the inner product:
|
| 1374 |
+
Fid (|ψ⟩ , |φ⟩) = |⟨ψ|φ⟩|2 ,
|
| 1375 |
+
(H9)
|
| 1376 |
+
TD(|ψ⟩ , |φ⟩) =
|
| 1377 |
+
�
|
| 1378 |
+
1 − | ⟨ψ|φ⟩ |2
|
| 1379 |
+
(H10)
|
| 1380 |
+
These two distances are related via
|
| 1381 |
+
TD(ρ, σ) ≤
|
| 1382 |
+
�
|
| 1383 |
+
1 − Fid(ρ, σ).
|
| 1384 |
+
(H11)
|
| 1385 |
+
The equality of Eq. (H11) holds when both ρ and σ are
|
| 1386 |
+
pure [58].
|
| 1387 |
+
Let us introduce related classical probability distance
|
| 1388 |
+
measures. Let p(x) and q(x) be probability distributions.
|
| 1389 |
+
The total variation distance and the Hellinger distance
|
| 1390 |
+
are given, respectively, by
|
| 1391 |
+
TVD(p, q) ≡ 1
|
| 1392 |
+
2
|
| 1393 |
+
�
|
| 1394 |
+
x
|
| 1395 |
+
|p(x) − q(x)|,
|
| 1396 |
+
(H12)
|
| 1397 |
+
Hel2(p, q) ≡ 1
|
| 1398 |
+
2
|
| 1399 |
+
�
|
| 1400 |
+
x
|
| 1401 |
+
��
|
| 1402 |
+
p(x) −
|
| 1403 |
+
�
|
| 1404 |
+
q(x)
|
| 1405 |
+
�2
|
| 1406 |
+
(H13)
|
| 1407 |
+
= 1 − Bhat(p, q)
|
| 1408 |
+
(H14)
|
| 1409 |
+
|
| 1410 |
+
10
|
| 1411 |
+
where Bhat(p, q) is the Bhattacharyya coefficient:
|
| 1412 |
+
Bhat (p, q) ≡
|
| 1413 |
+
�
|
| 1414 |
+
x
|
| 1415 |
+
�
|
| 1416 |
+
p(x)q(x).
|
| 1417 |
+
(H15)
|
| 1418 |
+
Between the total variantion and the Hellinger distances,
|
| 1419 |
+
the following relations are known to hold [76]:
|
| 1420 |
+
Hel2(p, q) ≤ TVD(p, q)
|
| 1421 |
+
(H16)
|
| 1422 |
+
≤
|
| 1423 |
+
�
|
| 1424 |
+
Hel2(p, q)(2 − Hel2(p, q))
|
| 1425 |
+
(H17)
|
| 1426 |
+
≤
|
| 1427 |
+
�
|
| 1428 |
+
2Hel2(p, q).
|
| 1429 |
+
(H18)
|
| 1430 |
+
ACKNOWLEDGMENTS
|
| 1431 |
+
This work was supported by JSPS KAKENHI Grant
|
| 1432 |
+
Number JP22H03659.
|
| 1433 |
+
[1] W. Heisenberg, ¨Uber den anschaulichen inhalt der quan-
|
| 1434 |
+
tentheoretischen kinematik und mechanik, Z. Phys. 43,
|
| 1435 |
+
172 (1927).
|
| 1436 |
+
[2] H. P. Robertson, The uncertainty principle, Phys. Rev.
|
| 1437 |
+
34, 163 (1929).
|
| 1438 |
+
[3] L. Mandelstam and I. Tamm, The uncertainty relation
|
| 1439 |
+
between energy and time in non-relativistic quantum me-
|
| 1440 |
+
chanics, J. Phys. USSR 9, 249 (1945).
|
| 1441 |
+
[4] N. Margolus and L. B. Levitin, The maximum speed of
|
| 1442 |
+
dynamical evolution, Physica D: Nonlinear Phenomena
|
| 1443 |
+
120, 188 (1998).
|
| 1444 |
+
[5] S. Deffner and E. Lutz, Generalized Clausius inequality
|
| 1445 |
+
for nonequilibrium quantum processes, Phys. Rev. Lett.
|
| 1446 |
+
105, 170402 (2010).
|
| 1447 |
+
[6] M. M. Taddei, B. M. Escher, L. Davidovich, and R. L.
|
| 1448 |
+
de Matos Filho, Quantum speed limit for physical pro-
|
| 1449 |
+
cesses, Phys. Rev. Lett. 110, 050402 (2013).
|
| 1450 |
+
[7] A. del Campo, I. L. Egusquiza, M. B. Plenio, and S. F.
|
| 1451 |
+
Huelga, Quantum speed limits in open system dynamics,
|
| 1452 |
+
Phys. Rev. Lett. 110, 050403 (2013).
|
| 1453 |
+
[8] S. Deffner and E. Lutz, Energy-time uncertainty relation
|
| 1454 |
+
for driven quantum systems, J. Phys. A: Math. Theor.
|
| 1455 |
+
46, 335302 (2013).
|
| 1456 |
+
[9] D. P. Pires, M. Cianciaruso, L. C. C´eleri, G. Adesso,
|
| 1457 |
+
and D. O. Soares-Pinto, Generalized geometric quantum
|
| 1458 |
+
speed limits, Phys. Rev. X 6, 021031 (2016).
|
| 1459 |
+
[10] E. O’Connor, G. Guarnieri, and S. Campbell, Action
|
| 1460 |
+
quantum speed limits, Phys. Rev. A 103, 022210 (2021).
|
| 1461 |
+
[11] S. Deffner and S. Campbell, Quantum speed limits: from
|
| 1462 |
+
Heisenberg’s uncertainty principle to optimal quantum
|
| 1463 |
+
control, J. Phys. A: Math. Theor. 50, 453001 (2017).
|
| 1464 |
+
[12] S. Lloyd, Ultimate physical limits to computation, Na-
|
| 1465 |
+
ture 406, 1047 (2000).
|
| 1466 |
+
[13] J. D. Bekenstein, Energy cost of information transfer,
|
| 1467 |
+
Phys. Rev. Lett. 46, 623 (1981).
|
| 1468 |
+
[14] M.
|
| 1469 |
+
Murphy,
|
| 1470 |
+
S.
|
| 1471 |
+
Montangero,
|
| 1472 |
+
V.
|
| 1473 |
+
Giovannetti,
|
| 1474 |
+
and
|
| 1475 |
+
T. Calarco, Communication at the quantum speed limit
|
| 1476 |
+
along a spin chain, Phys. Rev. A 82, 022318 (2010).
|
| 1477 |
+
[15] N. Shiraishi, K. Funo, and K. Saito, Speed limit for clas-
|
| 1478 |
+
sical stochastic processes, Phys. Rev. Lett. 121, 070601
|
| 1479 |
+
(2018).
|
| 1480 |
+
[16] S. Ito, Stochastic thermodynamic interpretation of infor-
|
| 1481 |
+
mation geometry, Phys. Rev. Lett. 121, 030605 (2018).
|
| 1482 |
+
[17] S. Ito and A. Dechant, Stochastic time evolution, in-
|
| 1483 |
+
formation geometry, and the Cram´er-Rao bound, Phys.
|
| 1484 |
+
Rev. X 10, 021056 (2020).
|
| 1485 |
+
[18] A. Dechant and Y. Sakurai, Thermodynamic interpreta-
|
| 1486 |
+
tion of Wasserstein distance, arXiv:1912.08405 (2019).
|
| 1487 |
+
[19] T. Van Vu and Y. Hasegawa, Geometrical bounds of the
|
| 1488 |
+
irreversibility in Markovian systems, Phys. Rev. Lett.
|
| 1489 |
+
126, 010601 (2021).
|
| 1490 |
+
[20] M. Nakazato and S. Ito, Geometrical aspects of en-
|
| 1491 |
+
tropy production in stochastic thermodynamics based on
|
| 1492 |
+
Wasserstein distance, Phys. Rev. Res. 3, 043093 (2021).
|
| 1493 |
+
[21] A. Dechant, Minimum entropy production,
|
| 1494 |
+
detailed
|
| 1495 |
+
balance and Wasserstein distance for continuous-time
|
| 1496 |
+
Markov processes, J. Phys. A: Math. Theor. 55, 094001
|
| 1497 |
+
(2022).
|
| 1498 |
+
[22] T. Van Vu and K. Saito, Thermodynamic unification of
|
| 1499 |
+
optimal transport: Thermodynamic uncertainty relation,
|
| 1500 |
+
minimum dissipation, and thermodynamic speed limits,
|
| 1501 |
+
arXiv:2206.02684 (2022).
|
| 1502 |
+
[23] S. B. Nicholson, L. P. Garcia-Pintos, A. del Campo, and
|
| 1503 |
+
J. R. Green, Time-information uncertainty relations in
|
| 1504 |
+
thermodynamics, Nat. Phys. 16, 1211 (2020).
|
| 1505 |
+
[24] L. P. Garc´ıa-Pintos, S. B. Nicholson, J. R. Green, A. del
|
| 1506 |
+
Campo, and A. V. Gorshkov, Unifying quantum and clas-
|
| 1507 |
+
sical speed limits on observables, Phys. Rev. X 12, 011038
|
| 1508 |
+
(2022).
|
| 1509 |
+
[25] R. Hamazaki, Speed limits for macroscopic transitions,
|
| 1510 |
+
PRX Quantum 3, 020319 (2022).
|
| 1511 |
+
[26] B. Mohan and A. K. Pati, Quantum speed limits for ob-
|
| 1512 |
+
servables, Phys. Rev. A 106, 042436 (2022).
|
| 1513 |
+
[27] N. H¨ornedal, N. Carabba, A. S. Matsoukas-Roubeas, and
|
| 1514 |
+
A. del Campo, Ultimate speed limits to the growth of
|
| 1515 |
+
operator complexity, Commun. Phys. 5, 207 (2022).
|
| 1516 |
+
[28] A. C. Barato and U. Seifert, Thermodynamic uncertainty
|
| 1517 |
+
relation for biomolecular processes, Phys. Rev. Lett. 114,
|
| 1518 |
+
158101 (2015).
|
| 1519 |
+
[29] T. R. Gingrich, J. M. Horowitz, N. Perunov, and J. L.
|
| 1520 |
+
England, Dissipation bounds all steady-state current
|
| 1521 |
+
fluctuations, Phys. Rev. Lett. 116, 120601 (2016).
|
| 1522 |
+
[30] J. P. Garrahan, Simple bounds on fluctuations and un-
|
| 1523 |
+
certainty relations for first-passage times of counting ob-
|
| 1524 |
+
servables, Phys. Rev. E 95, 032134 (2017).
|
| 1525 |
+
[31] A. Dechant and S.-i. Sasa, Current fluctuations and
|
| 1526 |
+
transport efficiency for general Langevin systems, J. Stat.
|
| 1527 |
+
Mech: Theory Exp. 2018, 063209 (2018).
|
| 1528 |
+
[32] I. Di Terlizzi and M. Baiesi, Kinetic uncertainty relation,
|
| 1529 |
+
J. Phys. A: Math. Theor. 52, 02LT03 (2019).
|
| 1530 |
+
|
| 1531 |
+
11
|
| 1532 |
+
[33] Y. Hasegawa and T. Van Vu, Uncertainty relations
|
| 1533 |
+
in stochastic processes: An information inequality ap-
|
| 1534 |
+
proach, Phys. Rev. E 99, 062126 (2019).
|
| 1535 |
+
[34] Y. Hasegawa and T. Van Vu, Fluctuation theorem un-
|
| 1536 |
+
certainty relation, Phys. Rev. Lett. 123, 110602 (2019).
|
| 1537 |
+
[35] T. Van Vu and Y. Hasegawa, Uncertainty relations for
|
| 1538 |
+
underdamped Langevin dynamics, Phys. Rev. E 100,
|
| 1539 |
+
032130 (2019).
|
| 1540 |
+
[36] A. Dechant and S.-i. Sasa, Fluctuation–response inequal-
|
| 1541 |
+
ity out of equilibrium, Proc. Natl. Acad. Sci. U.S.A. 117,
|
| 1542 |
+
6430 (2020).
|
| 1543 |
+
[37] V. T. Vo, T. Van Vu, and Y. Hasegawa, Unified approach
|
| 1544 |
+
to classical speed limit and thermodynamic uncertainty
|
| 1545 |
+
relation, Phys. Rev. E 102, 062132 (2020).
|
| 1546 |
+
[38] T. Koyuk and U. Seifert, Thermodynamic uncertainty re-
|
| 1547 |
+
lation for time-dependent driving, Phys. Rev. Lett. 125,
|
| 1548 |
+
260604 (2020).
|
| 1549 |
+
[39] P. Pietzonka, Classical pendulum clocks break the ther-
|
| 1550 |
+
modynamic uncertainty relation, Phys. Rev. Lett. 128,
|
| 1551 |
+
130606 (2022).
|
| 1552 |
+
[40] P. Erker, M. T. Mitchison, R. Silva, M. P. Woods,
|
| 1553 |
+
N. Brunner, and M. Huber, Autonomous quantum clocks:
|
| 1554 |
+
Does thermodynamics limit our ability to measure time?,
|
| 1555 |
+
Phys. Rev. X 7, 031022 (2017).
|
| 1556 |
+
[41] K. Brandner, T. Hanazato, and K. Saito, Thermody-
|
| 1557 |
+
namic bounds on precision in ballistic multiterminal
|
| 1558 |
+
transport, Phys. Rev. Lett. 120, 090601 (2018).
|
| 1559 |
+
[42] F. Carollo, R. L. Jack, and J. P. Garrahan, Unraveling
|
| 1560 |
+
the large deviation statistics of Markovian open quantum
|
| 1561 |
+
systems, Phys. Rev. Lett. 122, 130605 (2019).
|
| 1562 |
+
[43] J. Liu and D. Segal, Thermodynamic uncertainty relation
|
| 1563 |
+
in quantum thermoelectric junctions, Phys. Rev. E 99,
|
| 1564 |
+
062141 (2019).
|
| 1565 |
+
[44] G. Guarnieri, G. T. Landi, S. R. Clark, and J. Goold,
|
| 1566 |
+
Thermodynamics of precision in quantum nonequilib-
|
| 1567 |
+
rium steady states, Phys. Rev. Research 1, 033021
|
| 1568 |
+
(2019).
|
| 1569 |
+
[45] S. Saryal, H. M. Friedman, D. Segal, and B. K. Agar-
|
| 1570 |
+
walla, Thermodynamic uncertainty relation in thermal
|
| 1571 |
+
transport, Phys. Rev. E 100, 042101 (2019).
|
| 1572 |
+
[46] Y. Hasegawa, Quantum thermodynamic uncertainty re-
|
| 1573 |
+
lation for continuous measurement, Phys. Rev. Lett. 125,
|
| 1574 |
+
050601 (2020).
|
| 1575 |
+
[47] Y. Hasegawa, Thermodynamic uncertainty relation for
|
| 1576 |
+
general open quantum systems, Phys. Rev. Lett. 126,
|
| 1577 |
+
010602 (2021).
|
| 1578 |
+
[48] M. F. Sacchi, Thermodynamic uncertainty relations for
|
| 1579 |
+
bosonic Otto engines, Phys. Rev. E 103, 012111 (2021).
|
| 1580 |
+
[49] A. A. S. Kalaee, A. Wacker, and P. P. Potts, Violating
|
| 1581 |
+
the thermodynamic uncertainty relation in the three-level
|
| 1582 |
+
maser, Phys. Rev. E 104, L012103 (2021).
|
| 1583 |
+
[50] T. Monnai, Thermodynamic uncertainty relation for
|
| 1584 |
+
quantum work distribution: Exact case study for a per-
|
| 1585 |
+
turbed oscillator, Phys. Rev. E 105, 034115 (2022).
|
| 1586 |
+
[51] J. M. Horowitz and T. R. Gingrich, Thermodynamic
|
| 1587 |
+
uncertainty relations constrain non-equilibrium fluctua-
|
| 1588 |
+
tions, Nat. Phys. (2019).
|
| 1589 |
+
[52] J. Li, J. M. Horowitz, T. R. Gingrich, and N. Fakhri,
|
| 1590 |
+
Quantifying dissipation using fluctuating currents, Nat.
|
| 1591 |
+
Commun. 10, 1666 (2019).
|
| 1592 |
+
[53] S. K. Manikandan, D. Gupta, and S. Krishnamurthy, In-
|
| 1593 |
+
ferring entropy production from short experiments, Phys.
|
| 1594 |
+
Rev. Lett. 124, 120603 (2020).
|
| 1595 |
+
[54] T. Van Vu, V. T. Vo, and Y. Hasegawa, Entropy produc-
|
| 1596 |
+
tion estimation with optimal current, Phys. Rev. E 101,
|
| 1597 |
+
042138 (2020).
|
| 1598 |
+
[55] S. Otsubo, S. Ito, A. Dechant, and T. Sagawa, Estimat-
|
| 1599 |
+
ing entropy production by machine learning of short-time
|
| 1600 |
+
fluctuating currents, Phys. Rev. E 101, 062106 (2020).
|
| 1601 |
+
[56] F. Verstraete and J. I. Cirac, Continuous matrix product
|
| 1602 |
+
states for quantum fields, Phys. Rev. Lett. 104, 190405
|
| 1603 |
+
(2010).
|
| 1604 |
+
[57] T. J. Osborne, J. Eisert, and F. Verstraete, Holographic
|
| 1605 |
+
quantum states, Phys. Rev. Lett. 105, 260401 (2010).
|
| 1606 |
+
[58] M. A. Nielsen and I. L. Chuang, Quantum Computation
|
| 1607 |
+
and Quantum Information (Cambridge University Press,
|
| 1608 |
+
New York, NY, USA, 2011).
|
| 1609 |
+
[59] H. Risken, The Fokker–Planck Equation: Methods of So-
|
| 1610 |
+
lution and Applications, 2nd ed. (Springer, 1989).
|
| 1611 |
+
[60] E. Masry, On covariance functions of unit processes,
|
| 1612 |
+
SIAM J. Appl. Math. 23, 28 (1972).
|
| 1613 |
+
[61] W. Whitt, The efficiency of one long run versus indepen-
|
| 1614 |
+
dent replications in steady-state simulation, Manage. Sci.
|
| 1615 |
+
37, 645 (1991).
|
| 1616 |
+
[62] N. Carabba, N. H¨ornedal, and A. del Campo, Quantum
|
| 1617 |
+
speed limits on operator flows and correlation functions,
|
| 1618 |
+
arXiv:2207.05769 .
|
| 1619 |
+
[63] C. Maes, Frenesy: Time-symmetric dynamical activity in
|
| 1620 |
+
nonequilibria, Phys. Rep. 850, 1 (2020).
|
| 1621 |
+
[64] Y.
|
| 1622 |
+
Hasegawa,
|
| 1623 |
+
Thermodynamic
|
| 1624 |
+
bounds
|
| 1625 |
+
via
|
| 1626 |
+
bulk-
|
| 1627 |
+
boundary
|
| 1628 |
+
correspondence:
|
| 1629 |
+
Speed
|
| 1630 |
+
limit,
|
| 1631 |
+
thermody-
|
| 1632 |
+
namic uncertainty relation, and Heisenberg principle,
|
| 1633 |
+
arXiv:2203.12421 (2022).
|
| 1634 |
+
[65] A. Goussev, R. A. Jalabert, H. M. Pastawski, and
|
| 1635 |
+
D. Wisniacki, Loschmidt echo, arXiv:1206.6348 (2012).
|
| 1636 |
+
[66] Y. Hasegawa, Irreversibility, Loschmidt echo, and ther-
|
| 1637 |
+
modynamic uncertainty relation, Phys. Rev. Lett. 127,
|
| 1638 |
+
240602 (2021).
|
| 1639 |
+
[67] G. Lindblad, On the generators of quantum dynamical
|
| 1640 |
+
semigroups, Commun. Math. Phys. 48, 119 (1976).
|
| 1641 |
+
[68] H.-P. Breuer and F. Petruccione, The theory of open
|
| 1642 |
+
quantum systems (Oxford university press, 2002).
|
| 1643 |
+
[69] I. Bena, Dichotomous markov noise: Exact results for
|
| 1644 |
+
out-of-equilibrium systems, Int. J. Mod. Phys. B 20, 2825
|
| 1645 |
+
(2006).
|
| 1646 |
+
[70] J. M. Horowitz and M. Esposito, Thermodynamics with
|
| 1647 |
+
continuous information flow, Phys. Rev. X 4, 031015
|
| 1648 |
+
(2014).
|
| 1649 |
+
[71] J. M. Horowitz, Multipartite information flow for multi-
|
| 1650 |
+
ple Maxwell demons, J. Stat. Mech. 2015, P03006 (2015).
|
| 1651 |
+
[72] S. Gammelmark and K. Mølmer, Fisher information and
|
| 1652 |
+
the quantum Cram´er-Rao sensitivity limit of continuous
|
| 1653 |
+
measurements, Phys. Rev. Lett. 112, 170401 (2014).
|
| 1654 |
+
[73] K. Mølmer, Hypothesis testing with open quantum sys-
|
| 1655 |
+
tems, Phys. Rev. Lett. 114, 040401 (2015).
|
| 1656 |
+
[74] W. K. Wootters, Statistical distance and Hilbert space,
|
| 1657 |
+
Phys. Rev. D 23, 357 (1981).
|
| 1658 |
+
[75] A. Uhlmann, The metric of Bures and the geometric
|
| 1659 |
+
phase, in Groups and Related Topics:
|
| 1660 |
+
Proceedings of
|
| 1661 |
+
the First Max Born Symposium, edited by R. Gielerak,
|
| 1662 |
+
J. Lukierski, and Z. Popowicz (Springer Netherlands,
|
| 1663 |
+
Dordrecht, 1992) pp. 267–274.
|
| 1664 |
+
[76] I. Sason and S. Verd´u, f-divergence inequalities, IEEE
|
| 1665 |
+
Trans. Inf. Theory 62, 5973 (2016).
|
| 1666 |
+
|
2dE1T4oBgHgl3EQfSANm/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2tE0T4oBgHgl3EQfdwDZ/content/2301.02382v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:57f0ee1888905f961cedf414b19770dee3e0130d68f60214151b264adadc5631
|
| 3 |
+
size 4160524
|
2tE0T4oBgHgl3EQfdwDZ/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:bcb3611ce9cd8d075e478bf9fdc5e4b74ab9b34be030d8de5c8db61907120b99
|
| 3 |
+
size 2687021
|
49FAT4oBgHgl3EQfmR1P/content/2301.08622v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:dc1abbadcd522cdab63914f0f917f72dc696e8b4996285351f4832a71c6342c3
|
| 3 |
+
size 521403
|
49FAT4oBgHgl3EQfmR1P/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:de90772324933965c8cd4bbc700a07fb52697aa2da5833dd0c8185d2e0cf8f95
|
| 3 |
+
size 1114157
|
49FAT4oBgHgl3EQfmR1P/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:90995b7c53d2cf24e4b27292da5fec250701f5b53450e786e1c63bc4e4a85430
|
| 3 |
+
size 45308
|
6tFKT4oBgHgl3EQf_i4o/content/2301.11962v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:04462476520e0afafc6102078be0de100019894fc4169a4050f2144846598775
|
| 3 |
+
size 6030957
|
6tFKT4oBgHgl3EQf_i4o/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:7d6be31e3c42e2948f204d9d0ae90309700c4ce413f8e1a4161988f6551fd4bb
|
| 3 |
+
size 4915245
|
A9E2T4oBgHgl3EQfRQfr/content/2301.03780v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:7f5ab15eebbde0e94c393728a19ea6be0d5a1c3b10c1ba1727b2de3aa188225c
|
| 3 |
+
size 759983
|
A9E2T4oBgHgl3EQfRQfr/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:aa76a4aa96629e935fba40b8f22458ad842c40165160bbb6a8f641d3539b6ab8
|
| 3 |
+
size 4259885
|
A9FRT4oBgHgl3EQfujgS/content/tmp_files/2301.13631v1.pdf.txt
ADDED
|
@@ -0,0 +1,1164 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
|
| 3 |
+
TopoBERT: Plug and Play Toponym Recognition Module
|
| 4 |
+
Harnessing Fine-tuned BERT∗
|
| 5 |
+
Bing Zhou
|
| 6 |
+
Department of Geography
|
| 7 |
+
Texas A&M University
|
| 8 |
+
College Station, Texas, US
|
| 9 |
+
spgbarrett@tamu.edu
|
| 10 |
+
Yingjie Hu
|
| 11 |
+
Department of Geography
|
| 12 |
+
University at Buffalo
|
| 13 |
+
Buffalo, New York, US
|
| 14 |
+
yhu42@buffalo.edu
|
| 15 |
+
Lei Zou
|
| 16 |
+
Department of Geography
|
| 17 |
+
Texas A&M University
|
| 18 |
+
College Station, Texas, US
|
| 19 |
+
lzou@tamu.edu
|
| 20 |
+
Yi Qiang
|
| 21 |
+
School of Geoscience
|
| 22 |
+
University of South Florida
|
| 23 |
+
Tampa, Florida, US
|
| 24 |
+
qiangy@usf.edu
|
| 25 |
+
ABSTRACT
|
| 26 |
+
Extracting precise geographical information from textual contents
|
| 27 |
+
is crucial in a plethora of applications. For example, during
|
| 28 |
+
hazardous events, a robust and unbiased toponym extraction
|
| 29 |
+
framework can provide an avenue to tie the location concerned to
|
| 30 |
+
the topic discussed by news media posts and pinpoint humanitarian
|
| 31 |
+
help requests or damage reports from social media. Early studies
|
| 32 |
+
have leveraged rule-based, gazetteer-based, deep learning, and
|
| 33 |
+
hybrid approaches to address this problem. However, the
|
| 34 |
+
performance of existing tools is deficient in supporting operations
|
| 35 |
+
like emergency rescue, which relies on fine-grained, accurate
|
| 36 |
+
geographic information. The emerging pretrained language models
|
| 37 |
+
can better capture the underlying characteristics of text information,
|
| 38 |
+
including place names, offering a promising pathway to optimize
|
| 39 |
+
toponym recognition to underpin practical applications. In this
|
| 40 |
+
paper, TopoBERT, a toponym recognition module based on a one-
|
| 41 |
+
dimensional Convolutional Neural Network (CNN1D) and
|
| 42 |
+
Bidirectional Encoder Representation from Transformers (BERT),
|
| 43 |
+
is proposed and fine-tuned. Three datasets (CoNLL2003-Train,
|
| 44 |
+
Wikipedia3000, WNUT2017) are leveraged to tune the
|
| 45 |
+
hyperparameters, discover the best training strategy, and train the
|
| 46 |
+
model. Another two datasets (CoNLL2003-Test and Harvey2017)
|
| 47 |
+
are used to evaluate the performance. Three distinguished
|
| 48 |
+
classifiers, linear, multi-layer perceptron, and CNN1D, are
|
| 49 |
+
benchmarked to determine the optimal model architecture.
|
| 50 |
+
TopoBERT achieves state-of-the-art performance (f1-score=0.865)
|
| 51 |
+
compared to the other five baseline models and can be applied to
|
| 52 |
+
diverse toponym recognition tasks without additional training.
|
| 53 |
+
KEYWORDS
|
| 54 |
+
Natural Language Processing; Geoparser; Convolutional Neural
|
| 55 |
+
Network; Toponym Recognition; BERT
|
| 56 |
+
|
| 57 |
+
1 Introduction
|
| 58 |
+
Since the emergence of social sensing, scholars have been
|
| 59 |
+
endeavoring to sense the pulse of society with the help of satellite
|
| 60 |
+
images, sensor networks from IoT and various forms of textual
|
| 61 |
+
information from the Internet. Extra attention has been paid to
|
| 62 |
+
mining knowledge from social media because people nowadays are
|
| 63 |
+
consciously or unconsciously sharing their views towards ongoing
|
| 64 |
+
events online, which propels social media to become one of the few
|
| 65 |
+
agents that reflects the real-time societal awareness, reactions and
|
| 66 |
+
impacts of particular events. This trait is a rare feature seldom
|
| 67 |
+
shared by other forms of data sources.
|
| 68 |
+
In the light of this feature, Avvenuti et al. presented an early
|
| 69 |
+
earthquake detecting and warning system using Twitter data, which
|
| 70 |
+
offers prompt detection of events [1]. Several case studies
|
| 71 |
+
processed social media data with geocoding and sentiment analysis
|
| 72 |
+
tools to analyze the spatial patterns of changing public awareness
|
| 73 |
+
and emotions toward hurricanes in different phases of the disaster
|
| 74 |
+
management cycle [2,3]. Huang et al. scrutinized the human
|
| 75 |
+
mobility patterns during the COVID-19 pandemic at multiple
|
| 76 |
+
scales based on geotagged Twitter data [4]. Zhou et al. proposed
|
| 77 |
+
VictimFinder which is capable of harvesting social media help
|
| 78 |
+
requests during hurricanes [5].
|
| 79 |
+
Let alone the fact that geographical information being one of the
|
| 80 |
+
key elements of knowledge generation, the aforementioned studies
|
| 81 |
+
and other similar spatial analysis and modeling are highly
|
| 82 |
+
dependent on the location information of the social media data.
|
| 83 |
+
However, social media users start to pay more attention to user
|
| 84 |
+
privacy, which results in a significant drop of the number of
|
| 85 |
+
geotagged tweets. Simultaneously, Twitter published policies
|
| 86 |
+
forbidding users to attach precise longitudes and latitudes to tweets.
|
| 87 |
+
Moreover, the geographical information bound up with the social
|
| 88 |
+
media posts might not necessarily be equivalent to the place names
|
| 89 |
+
described in the textual content of the post. Thus, extracting
|
| 90 |
+
location information from the textual content of social media data
|
| 91 |
+
has inevitably become an issue that needs to be addressed. This
|
| 92 |
+
breeds the process of geoparsing, a two-step approach which
|
| 93 |
+
includes toponym recognition (identifying place names from texts)
|
| 94 |
+
and toponym resolution (transforming location names to
|
| 95 |
+
geographical coordinates). This paper focuses on the first
|
| 96 |
+
component of geoparsing.
|
| 97 |
+
|
| 98 |
+
|
| 99 |
+
|
| 100 |
+
|
| 101 |
+
|
| 102 |
+
Existing studies on toponym recognition can be categorized into
|
| 103 |
+
four parties based on the character of the solutions, namely rule-
|
| 104 |
+
based, gazetteer-based, statistical learning-based, and hybrid
|
| 105 |
+
approaches. In general, statistical learning and hybrid methods that
|
| 106 |
+
incorporate deep learning techniques render better performance
|
| 107 |
+
than methods that solely rely on rules or gazetteers [6,7,8,9]. Based
|
| 108 |
+
on Bidirectional Long Short-Term Memory (BiLSTM), Wang et al.
|
| 109 |
+
introduced NeuroTPR to extract place names [6]. Qi et al. extended
|
| 110 |
+
CoreNLP and brought about an open-sourced named entity
|
| 111 |
+
recognition python toolkit called Stanza, which is able to detect
|
| 112 |
+
place names and support multiple languages [7]. SAVITR is a
|
| 113 |
+
system that combines both NLP techniques and gazetteers for real-
|
| 114 |
+
time location extraction [8]. Hu et al. addressed the incompleteness
|
| 115 |
+
of gazetteers and fused gazetteers, rules, and deep learning to
|
| 116 |
+
render a reliable place name extractor, GazPNE [9].
|
| 117 |
+
However, those studies suffer from several limitations. First, some
|
| 118 |
+
models do not focus only on place names, so their prediction of
|
| 119 |
+
location name extraction might be disturbed. Second, recurrent
|
| 120 |
+
neural network based deep learning models might suffer from
|
| 121 |
+
information vanishing problems when the input sequence gets
|
| 122 |
+
larger and network deeper. Third, complicated deep neural
|
| 123 |
+
networks frequently require large, annotated datasets and are time-
|
| 124 |
+
consuming to train to achieve promising results.
|
| 125 |
+
To address the aforementioned latent flaws, this paper proposes
|
| 126 |
+
TopoBERT, a toponym recognition module based on a one-
|
| 127 |
+
dimensional
|
| 128 |
+
Convolutional
|
| 129 |
+
Neural
|
| 130 |
+
Network
|
| 131 |
+
(CNN)
|
| 132 |
+
and
|
| 133 |
+
Bidirectional Encoder Representation from Transformers (BERT).
|
| 134 |
+
It contributes in the following directions. First, several classifiers
|
| 135 |
+
were tested and one feasible model and classifier combination
|
| 136 |
+
based on the evaluation result of a standard dataset is determined.
|
| 137 |
+
Second, TopoBERT was tested by an unseen dataset together with
|
| 138 |
+
some other existing tools to verify its generalizability. Third, the
|
| 139 |
+
tool is ready-to-use and the dataset we generated in this study can
|
| 140 |
+
be used by other scholars to train, test, and compare different
|
| 141 |
+
toponym recognition models and tools.
|
| 142 |
+
The remainder of this paper is structured as follows. The datasets
|
| 143 |
+
involved in fine-tuning and testing the framework, a concise
|
| 144 |
+
introduction of the holistic design of the framework, the
|
| 145 |
+
implementation of the framework, and the parameters used in fine-
|
| 146 |
+
tuning the framework are detailed in section 2. The results of the
|
| 147 |
+
experiments conducted are documented in section 3. Section 4
|
| 148 |
+
illustrates the potential limitations of this work and lists several
|
| 149 |
+
future research directions. Section 5 epitomizes the findings of this
|
| 150 |
+
paper and presents the implications of this study.
|
| 151 |
+
2 Methodology
|
| 152 |
+
2.1 Datasets
|
| 153 |
+
Totally four different datasets were utilized to train the module and
|
| 154 |
+
evaluate the performance. CoNLL2003 is a shared task that
|
| 155 |
+
concerns named entity recognition, which has been widely applied
|
| 156 |
+
to training deep learning models [10]. The data contains entities of
|
| 157 |
+
five types: persons (PER), organizations (ORG), locations (LOC)
|
| 158 |
+
and miscellaneous names (MISC) and other words that are
|
| 159 |
+
irrelevant to named entities of the aforementioned four groups (O).
|
| 160 |
+
The prefix “B-” and “I-” are used to tag the beginning of a named
|
| 161 |
+
entity and words that fall inside a named entity [10]. The dataset is
|
| 162 |
+
originally divided into training, validation, and test data which are
|
| 163 |
+
noted
|
| 164 |
+
as
|
| 165 |
+
CoNLL2003-Train,
|
| 166 |
+
CoNLL2003-Validation
|
| 167 |
+
and
|
| 168 |
+
CoNLL2003-Test. Training data is used to train a deep learning
|
| 169 |
+
model, validation data is used to tune the hyperparameters of the
|
| 170 |
+
model, and the test data is used to evaluate the performance of the
|
| 171 |
+
trained model. The data distribution of each label type in the three
|
| 172 |
+
datasets is depicted in Figures 1(a), 1(b), and 1(c), respectively. The
|
| 173 |
+
dataset is later modified to suit the purpose of this study by labeling
|
| 174 |
+
all the named entities as “O” except for the location entities.
|
| 175 |
+
Around 4.1% of the tags are location entities in these datasets.
|
| 176 |
+
|
| 177 |
+
|
| 178 |
+
|
| 179 |
+
(a) (b) (c)
|
| 180 |
+
Figure 1: Data Distribution of CoNLL2003 Dataset
|
| 181 |
+
WNUT2017 is a relatively smaller dataset collected from Twitter
|
| 182 |
+
and manually annotated, the objective of which is to tackle the
|
| 183 |
+
issues caused by novel, emerging, singleton named entities in noisy
|
| 184 |
+
text [11]. It aims to offer support to sustainable named entity
|
| 185 |
+
recognition systems. This dataset contains seven different groups:
|
| 186 |
+
person, location, corporation, product, creative work, group and
|
| 187 |
+
none of the above. Considering the main focus of this paper and
|
| 188 |
+
different tags used to label the dataset, this dataset is preprocessed
|
| 189 |
+
to retain only the location entities tag and to unify the tag symbols
|
| 190 |
+
used based on CoNLL2003 (location entities are tagged with “B-
|
| 191 |
+
LOC” or “I-LOC” while the rest are tagged with “O”). The
|
| 192 |
+
distribution of data under each label type in the modified dataset is
|
| 193 |
+
shown in Figure 2(a). The total number of location names in this
|
| 194 |
+
dataset is 1140.
|
| 195 |
+
|
| 196 |
+
|
| 197 |
+
|
| 198 |
+
|
| 199 |
+
(a)
|
| 200 |
+
(b) (c)
|
| 201 |
+
Figure 2: Data Distribution of WNUT2017, Wiki300 and
|
| 202 |
+
Harvey2017 Dataset
|
| 203 |
+
Wiki3000 is an automatically generated dataset from Wikipedia
|
| 204 |
+
articles by a data producing workflow proposed by Wang et al. [6].
|
| 205 |
+
The proposed auto-annotation approach utilizes the first paragraph
|
| 206 |
+
of Wikipedia articles which usually encompass various entities
|
| 207 |
+
presented with hyperlinks. These hyperlinks are later checked if
|
| 208 |
+
they are associated with a geographical location. If so, the
|
| 209 |
+
|
| 210 |
+
CoNLL2003-TrainDataset
|
| 211 |
+
200000
|
| 212 |
+
169578
|
| 213 |
+
150000
|
| 214 |
+
Count
|
| 215 |
+
100000
|
| 216 |
+
50000
|
| 217 |
+
82971002511128
|
| 218 |
+
4593
|
| 219 |
+
0
|
| 220 |
+
LOCORGPER
|
| 221 |
+
RMISO
|
| 222 |
+
ClassNamesCoNLL2003-ValidationDataset
|
| 223 |
+
50000
|
| 224 |
+
42759
|
| 225 |
+
40000
|
| 226 |
+
Count
|
| 227 |
+
30000
|
| 228 |
+
20000
|
| 229 |
+
10000
|
| 230 |
+
3149
|
| 231 |
+
20942092
|
| 232 |
+
1268
|
| 233 |
+
0
|
| 234 |
+
LOCORG
|
| 235 |
+
PER
|
| 236 |
+
MISC
|
| 237 |
+
ClassNamesCoNLL2003-TestDataset
|
| 238 |
+
4000038323
|
| 239 |
+
30000
|
| 240 |
+
Count
|
| 241 |
+
20000
|
| 242 |
+
10000
|
| 243 |
+
192524962773
|
| 244 |
+
918
|
| 245 |
+
0
|
| 246 |
+
LOCORG
|
| 247 |
+
PER
|
| 248 |
+
MISC
|
| 249 |
+
ClassNamesWNUT2017Dataset
|
| 250 |
+
10673
|
| 251 |
+
10000
|
| 252 |
+
Count
|
| 253 |
+
5000
|
| 254 |
+
1140
|
| 255 |
+
0
|
| 256 |
+
0
|
| 257 |
+
LOC
|
| 258 |
+
ClassNamesWiki3000Dataset
|
| 259 |
+
40466
|
| 260 |
+
40000
|
| 261 |
+
30000
|
| 262 |
+
Count
|
| 263 |
+
20000
|
| 264 |
+
16000
|
| 265 |
+
10000
|
| 266 |
+
0
|
| 267 |
+
0
|
| 268 |
+
LOC
|
| 269 |
+
ClassNamesHarvey2017Dataset
|
| 270 |
+
15295
|
| 271 |
+
15000
|
| 272 |
+
Count
|
| 273 |
+
10000
|
| 274 |
+
5000
|
| 275 |
+
3973
|
| 276 |
+
0
|
| 277 |
+
0
|
| 278 |
+
LOC
|
| 279 |
+
ClassNames
|
| 280 |
+
|
| 281 |
+
|
| 282 |
+
hyperlinked word will be labeled as a toponym. Then the Wikipedia
|
| 283 |
+
article is divided into multiple short sentences within 280
|
| 284 |
+
characters with additional strategies such as random flipping to
|
| 285 |
+
mimic the general patterns of Twitter posts [6]. The distribution of
|
| 286 |
+
data under each label type is shown in Figure 2(b).
|
| 287 |
+
Harvey2017 is a dataset originally collected from the North Texas
|
| 288 |
+
University repository (https://digital.library.unt.edu/ark:/67531
|
| 289 |
+
/metadc993940/), which contains 7,041,866 tweets collected based
|
| 290 |
+
on hashtag query. It was pruned, randomly subsampled and
|
| 291 |
+
manually annotated by Wang et al. to form a new dataset with 1000
|
| 292 |
+
tweets aiming to evaluate NeuroTPR [6]. This dataset is adopted by
|
| 293 |
+
this paper to test the performance of TopoBERT. The distribution
|
| 294 |
+
of data under each label type is shown in Figure 2(c).
|
| 295 |
+
2.2 Framework Design and Implementation
|
| 296 |
+
As mentioned in section 1, there is an acute conflict between robust
|
| 297 |
+
spatial analysis on social media or news media and the diminishing
|
| 298 |
+
availability of geolocated textual context. Additionally, the location
|
| 299 |
+
mentioned in the textual content of the tweets might differ from the
|
| 300 |
+
geotags attached. A reliable and ready-to-use geoparser can be the
|
| 301 |
+
mediator of such conflicts. Therefore, we present a general location
|
| 302 |
+
extractor that can be used upon social media and news media. The
|
| 303 |
+
workflow is shown in Figure 3.
|
| 304 |
+
The existing geotags of the data will be retained, and the textual
|
| 305 |
+
contents will go through a rule-based data preprocessing module
|
| 306 |
+
before they are fed to a zip code extractor and place name extractor.
|
| 307 |
+
Once the place names are pulled out, a geocoding service will be
|
| 308 |
+
applied to transform the place names into precise coordinates. The
|
| 309 |
+
place name extractor is marked with an orange dashed rectangle in
|
| 310 |
+
Figure 3 and serves as the crucial backbone of the entire workflow.
|
| 311 |
+
|
| 312 |
+
|
| 313 |
+
Figure 3: Holistic Design of Location Extraction Framework
|
| 314 |
+
for Textual Contents
|
| 315 |
+
|
| 316 |
+
Figure 4: Demonstration of token classification workflow.
|
| 317 |
+
Identifying location names from input sentences is a token
|
| 318 |
+
classification task (Figure 4), which contains two parts. A language
|
| 319 |
+
model and a classifier. It behaves similar to how human beings
|
| 320 |
+
analyze whether the given words are place names or not. First the
|
| 321 |
+
language model attempts to understand the language by
|
| 322 |
+
transforming the tokenized input data into higher dimensional
|
| 323 |
+
space which captures the meaning of words in a given sentence,
|
| 324 |
+
then the classifier makes predictions based on the transformed
|
| 325 |
+
vectors and determines whether the input word belongs to location
|
| 326 |
+
entity.
|
| 327 |
+
The heart of the proposed toponym recognition module,
|
| 328 |
+
TopoBERT, is the Bidirectional Encoder Representation from
|
| 329 |
+
Transformers (BERT). It is structured by stacking the encoder
|
| 330 |
+
components of the Transformer architecture and is designed to be
|
| 331 |
+
pretrained in an unsupervised manner. BERT takes advantage of
|
| 332 |
+
the Attention [25] mechanism, which resolves the information
|
| 333 |
+
vanishing issue that often upsets recurrent neural networks such as
|
| 334 |
+
Long Short-Term Memory [26] and Gated Recurrent Neural
|
| 335 |
+
Network [27] when the input sequence gets longer. Moreover,
|
| 336 |
+
distinguished from many other bidirectional language models, such
|
| 337 |
+
as ELMo designed by Peters et al. [28], in which the contextual
|
| 338 |
+
representation of every word is the concatenation or summation of
|
| 339 |
+
the forward and backward representations, BERT reads the entire
|
| 340 |
+
sequence of words at once and is trained using a Masked Language
|
| 341 |
+
Model (MLM) approach and a Next Sentence Prediction (NSP)
|
| 342 |
+
approach which genuinely implemented the bidirectional concept
|
| 343 |
+
or unidirectional concept. These two features combined facilitate
|
| 344 |
+
better language understanding and bring the trophy to BERT
|
| 345 |
+
|
| 346 |
+
Geotag
|
| 347 |
+
Geotagged
|
| 348 |
+
Coordinates
|
| 349 |
+
Bounding
|
| 350 |
+
Box
|
| 351 |
+
Center of Bounding
|
| 352 |
+
Box
|
| 353 |
+
Place
|
| 354 |
+
Social Media
|
| 355 |
+
Coordinatesfrom
|
| 356 |
+
Name
|
| 357 |
+
Data
|
| 358 |
+
PlaceName
|
| 359 |
+
No
|
| 360 |
+
4
|
| 361 |
+
ZipCode
|
| 362 |
+
Rule-based
|
| 363 |
+
Extractor
|
| 364 |
+
Data
|
| 365 |
+
Google
|
| 366 |
+
ZipCodes
|
| 367 |
+
NewsMedia
|
| 368 |
+
Geocoding
|
| 369 |
+
Preprocess
|
| 370 |
+
Data
|
| 371 |
+
Toponym
|
| 372 |
+
IdentifiedLocation
|
| 373 |
+
Recognition
|
| 374 |
+
Names
|
| 375 |
+
Coordinatesfrom
|
| 376 |
+
GeocodingTokenClassification
|
| 377 |
+
B-LOC
|
| 378 |
+
I-LOC
|
| 379 |
+
Outputpredictionforeach
|
| 380 |
+
token
|
| 381 |
+
Classifier
|
| 382 |
+
Language Model
|
| 383 |
+
[101,1030,17870,...102,...
|
| 384 |
+
0,
|
| 385 |
+
0,
|
| 386 |
+
0]
|
| 387 |
+
Tokenizer
|
| 388 |
+
#HarveyRescueHoustonTX77074waitingforwater
|
| 389 |
+
rescueintheattic.Pleasehelp!"
|
| 390 |
+
|
| 391 |
+
|
| 392 |
+
|
| 393 |
+
throughout a number of NLP tasks under the General Language
|
| 394 |
+
Understanding Evaluation (GLUE) benchmark [12].
|
| 395 |
+
Off-the-shelf pretrained BERT model weights can be separated into
|
| 396 |
+
several categories based on the size of the model, whether upper
|
| 397 |
+
and lower cases are taken into consideration, the targeted language,
|
| 398 |
+
and
|
| 399 |
+
unique
|
| 400 |
+
training
|
| 401 |
+
strategies
|
| 402 |
+
(https://huggingface.co/transformers/v3.3.1/pretrained_models.ht
|
| 403 |
+
ml). Since place names are highly case sensitive and only the
|
| 404 |
+
English language is involved in this study, ‘bert-base-cased’ and
|
| 405 |
+
‘bert-large-cased’ are selected as the candidate pretrained models
|
| 406 |
+
to be evaluated. The ‘bert-base-cased’ model comprises 12 layers,
|
| 407 |
+
and each hidden layer has 768 nodes, with 12 self-attention heads
|
| 408 |
+
and a total number of 110 million parameters. The ‘bert-large-cased’
|
| 409 |
+
model consists of 24 layers, and each hidden layer has 1024 nodes,
|
| 410 |
+
with 16 self-attention heads and 340 million parameters. The
|
| 411 |
+
parameters are pretrained with English text from BooksCorpus
|
| 412 |
+
(800 million words) and English Wikipedia (2,500 million words).
|
| 413 |
+
By stacking a classifier on top of BERT, the combo can be fine-
|
| 414 |
+
tuned to accomplish this downstream. Recent study showed that
|
| 415 |
+
model performance can be enhanced by applying classifiers more
|
| 416 |
+
complex than simple linear classifier or Conditional Random Field
|
| 417 |
+
(Zhou et al. 2022). Therefore, three classifiers were examined in
|
| 418 |
+
this study, namely linear classifier, multi-layer perceptron (MLP,
|
| 419 |
+
Figure 5) and one-dimensional CNN (CNN1D, Figure 6). The
|
| 420 |
+
simple linear classifier connects the output of the language model
|
| 421 |
+
to the final prediction results with the softmax activation function.
|
| 422 |
+
MLP applied in this study contains three fully connected layers and
|
| 423 |
+
links the language model output with a layer with the input size
|
| 424 |
+
equivalent to the output vector size. The number of hidden layer
|
| 425 |
+
nodes is 256 and the output layer size equals the number of distinct
|
| 426 |
+
labels from the training dataset. The CNN models are competent in
|
| 427 |
+
detecting underlying features [29] and one-dimensional CNN has
|
| 428 |
+
been successfully applied to process natural language [30, 31].
|
| 429 |
+
Realizing
|
| 430 |
+
location
|
| 431 |
+
names
|
| 432 |
+
might
|
| 433 |
+
share
|
| 434 |
+
some
|
| 435 |
+
common
|
| 436 |
+
characteristics, the idea of CNN1D is adopted. The vector output of
|
| 437 |
+
the language model can be considered as a one-dimensional signal
|
| 438 |
+
and a CNN1D with kernel size 3 is applied. The output channel of
|
| 439 |
+
the convolution is 16. Followed by a max pooling layer of size 2,
|
| 440 |
+
which further generalizes the features and reduces model
|
| 441 |
+
complexity. All channels of the max pooling layer output are
|
| 442 |
+
concatenated into a single vector and is fed to a fully connected
|
| 443 |
+
MLP with hidden layer size equals to 128.
|
| 444 |
+
All model combinations were implemented using Python language
|
| 445 |
+
and pertinent packages. The dataset splitting took advantage of the
|
| 446 |
+
ScikitLearn library and the BERT models were implemented based
|
| 447 |
+
on
|
| 448 |
+
the
|
| 449 |
+
huggingface
|
| 450 |
+
Transformer
|
| 451 |
+
library
|
| 452 |
+
(https://huggingface.co/transformers/). The model finetuning
|
| 453 |
+
pipeline was built using PyTorch functions.
|
| 454 |
+
|
| 455 |
+
|
| 456 |
+
|
| 457 |
+
|
| 458 |
+
Figure
|
| 459 |
+
5:
|
| 460 |
+
TopoBERT
|
| 461 |
+
Architecture
|
| 462 |
+
with
|
| 463 |
+
Multi-layer
|
| 464 |
+
Perceptron as Classifier
|
| 465 |
+
|
| 466 |
+
Figure 6: TopoBERT Architecture with One-Dimensional
|
| 467 |
+
Convolutional Neural Network as Classifier
|
| 468 |
+
2.3 Training and Evaluation
|
| 469 |
+
TopoBERT is envisioned to be a ready-to-use module that renders
|
| 470 |
+
optimal performance in toponym recognition. Models with
|
| 471 |
+
different architectures were trained and evaluated with six datasets
|
| 472 |
+
specified in Section 2.1 to determine the best model architecture
|
| 473 |
+
and training strategy. The training process utilized CoNLL2003-
|
| 474 |
+
Train as the training dataset by default and compared to another
|
| 475 |
+
larger dataset fusing CoNLL2003, Wiki3000, and WNUT2017.
|
| 476 |
+
The original dataset is labelled at word-level which cannot be input
|
| 477 |
+
to BERT directly due to BERT’s word-piece encoding, otherwise
|
| 478 |
+
it will lead to large numbers of out of vocabulary words. To tackle
|
| 479 |
+
|
| 480 |
+
BERT
|
| 481 |
+
E(cLs
|
| 482 |
+
En
|
| 483 |
+
ESEP
|
| 484 |
+
StackedTransformerEncoders
|
| 485 |
+
食
|
| 486 |
+
价
|
| 487 |
+
EICLS)
|
| 488 |
+
E
|
| 489 |
+
Em
|
| 490 |
+
ER
|
| 491 |
+
EISER
|
| 492 |
+
[CLS]
|
| 493 |
+
TOKEN 1
|
| 494 |
+
TOKEN.m
|
| 495 |
+
TOKENn
|
| 496 |
+
[SEP]
|
| 497 |
+
Word
|
| 498 |
+
Embeddings
|
| 499 |
+
Multi-layer
|
| 500 |
+
Perceptron
|
| 501 |
+
"TheEuropeanComissionsaidonTuesday...tohumanbeings."Max
|
| 502 |
+
Pooling
|
| 503 |
+
Word
|
| 504 |
+
Embeddings
|
| 505 |
+
Multi-layer
|
| 506 |
+
Convolutional
|
| 507 |
+
Concatenated
|
| 508 |
+
Perceptron
|
| 509 |
+
Layers
|
| 510 |
+
Layers
|
| 511 |
+
BERT
|
| 512 |
+
ECLs
|
| 513 |
+
Ei
|
| 514 |
+
En
|
| 515 |
+
ESEP)]
|
| 516 |
+
StackedTransformerEncoders
|
| 517 |
+
食
|
| 518 |
+
E(cLs)
|
| 519 |
+
E
|
| 520 |
+
E
|
| 521 |
+
En
|
| 522 |
+
E(SEP)
|
| 523 |
+
[CLS]
|
| 524 |
+
TOKEN1
|
| 525 |
+
TOKEN
|
| 526 |
+
TOKENT
|
| 527 |
+
[SEP]
|
| 528 |
+
"The European Comission saidon Tuesday...tohuman beings."
|
| 529 |
+
|
| 530 |
+
|
| 531 |
+
with this issue, we first split the input data at word-level, and
|
| 532 |
+
applied BERT word-piece tokenizer to each word. The same label
|
| 533 |
+
was assigned to each word-piece of a single word. The labeled
|
| 534 |
+
word-pieces are then merged to form the new input data which
|
| 535 |
+
could be processed by BERT. This experiment aimed at measuring
|
| 536 |
+
the performance fluctuations caused by training data size and
|
| 537 |
+
heterogeneity. CoNLL2003-Validation was used during the
|
| 538 |
+
training process to tune several fundamental hyperparameters such
|
| 539 |
+
as training epochs and learning rate. CoNLL2003-Test and
|
| 540 |
+
Harvey2017 datasets were used to evaluate the model performance.
|
| 541 |
+
The Harvey2017 dataset was also used to benchmark TopoBERT
|
| 542 |
+
with five prevailing toponym recognition models, namely Stanford
|
| 543 |
+
NLP [32], spaCy (https://spacy.io/), Bidirectional LSTM-CRF [33],
|
| 544 |
+
DM_NLP [34], and NeuroTPR [6].
|
| 545 |
+
The parameters of the classifier component of the module were
|
| 546 |
+
initialized with random non-zero numbers and the BERT
|
| 547 |
+
component was initialized with pre-trained parameters. The entire
|
| 548 |
+
module was trained with the fine-tuning approach [12], and the
|
| 549 |
+
parameters were updated using a mini-batch gradient descent
|
| 550 |
+
approach with early stopping. The maximum length of the input
|
| 551 |
+
sequence was limited to 128 in this paper. The maximum number
|
| 552 |
+
of training epochs was set to 50. As recommended by the original
|
| 553 |
+
BERT paper, the initial learning rate and the training batch size
|
| 554 |
+
were set to 2e-5 and 32 respectively [12]. Most commonly used loss
|
| 555 |
+
function for multi-class classification task, the cross-entropy loss
|
| 556 |
+
was employed. AdamW was selected as the optimizer during
|
| 557 |
+
training which adjusts the learning rate dynamically to accelerate
|
| 558 |
+
parameter convergence and implements weight decay to lower the
|
| 559 |
+
chance of overfitting. Warm up steps, which is using a very low
|
| 560 |
+
learning rate for the first several weight updating iterations, were
|
| 561 |
+
also introduced during training to reduce the impact of deviating
|
| 562 |
+
the model drastically from sudden exposure to unseen datasets.
|
| 563 |
+
Three commonly used evaluation metrics, precision, recall, and F1-
|
| 564 |
+
score (Equation 1-3), were applied to gauge the performance and
|
| 565 |
+
bias of the models. Precision calculates the percentage of correctly
|
| 566 |
+
identified location names (noted as True Positives, TP) among all
|
| 567 |
+
the location names predicted by the model, which combines both
|
| 568 |
+
TP and False Positives (FP). Recall measures the percentage of
|
| 569 |
+
correctly identified ones amongst all ground truth, which is the
|
| 570 |
+
combination of TP and False Negatives (FN). F1-score is the
|
| 571 |
+
harmonic mean of precision and recall, providing a comprehensive
|
| 572 |
+
metric to evaluate model performance.
|
| 573 |
+
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
|
| 574 |
+
��
|
| 575 |
+
����� (Equation 1)
|
| 576 |
+
𝑅𝑒𝑐𝑎𝑙𝑙 =
|
| 577 |
+
��
|
| 578 |
+
�����
|
| 579 |
+
(Equation 2)
|
| 580 |
+
𝐹1–𝑠𝑐𝑜𝑟𝑒 = 2 ∗
|
| 581 |
+
���������∗ ������
|
| 582 |
+
���������� ������
|
| 583 |
+
(Equation 3)
|
| 584 |
+
|
| 585 |
+
The outputs of BERT models are at word-piece level and they are
|
| 586 |
+
concatenated using the special prefix ‘##’ and the word-level labels
|
| 587 |
+
are assigned base on the starting word-piece of the word. The
|
| 588 |
+
evaluation metrics are based on ‘per-token’ scores. Additionally,
|
| 589 |
+
location name entity consists of two types of labels (B-LOC and I-
|
| 590 |
+
LOC). In order to gauge the comprehensive performance of the
|
| 591 |
+
model on toponym recognition, the evaluation metrics were
|
| 592 |
+
calculated using a micro average approach, which computes a
|
| 593 |
+
global average of precision, recall, and F1-score. It calculates the
|
| 594 |
+
TP, FP and FN by counting the total number of TP, FP and FN
|
| 595 |
+
under each class, namely, “B-LOC” and “I-LOC”.
|
| 596 |
+
|
| 597 |
+
3 Results and Analysis
|
| 598 |
+
The first step of the experiment targeted at determining the optimal
|
| 599 |
+
pretrained parameters for BERT model. We hypothesize that larger
|
| 600 |
+
models outperform smaller models. To verify this hypothesis, the
|
| 601 |
+
performance of the models initialized with ‘bert-base-cased’ and
|
| 602 |
+
‘bert-large-cased’ with a linear classifier stacked on top were tested.
|
| 603 |
+
The results are displayed in Table 1.
|
| 604 |
+
Table 1: Evaluation results for testing on different pretrained
|
| 605 |
+
parameters.
|
| 606 |
+
BERT Model
|
| 607 |
+
Classifie
|
| 608 |
+
r
|
| 609 |
+
Precisio
|
| 610 |
+
n
|
| 611 |
+
Recal
|
| 612 |
+
l
|
| 613 |
+
F1-
|
| 614 |
+
score
|
| 615 |
+
bert-base-cased
|
| 616 |
+
Linear
|
| 617 |
+
0.900
|
| 618 |
+
0.904
|
| 619 |
+
0.902
|
| 620 |
+
bert-large-
|
| 621 |
+
cased
|
| 622 |
+
Linear
|
| 623 |
+
0.934
|
| 624 |
+
0.901
|
| 625 |
+
0.917
|
| 626 |
+
|
| 627 |
+
These two models were trained with CoNLL2003-Train and
|
| 628 |
+
evaluated with CoNLL2003-Test. Compared to ‘bert-base-cased’,
|
| 629 |
+
the precision of the prediction increased from 0.900 to 0.934 by
|
| 630 |
+
using ‘bert-large-cased’ while the recall almost remained static.
|
| 631 |
+
The F1-scores showed that ‘bert-large-cased’ rendered better
|
| 632 |
+
results which is in conformity with the original BERT paper [12]
|
| 633 |
+
and validated our initial hypothesis. Therefore, ‘bert-large-cased’
|
| 634 |
+
was harnessed in all the follow-up experiments.
|
| 635 |
+
The second step of the experiments aimed to measure the influence
|
| 636 |
+
of the training data and determine the optimal classifier. The model
|
| 637 |
+
performances were evaluated using two different datasets,
|
| 638 |
+
CoNLL2003-Test and Harvey2017. We hypothesize that (a) the
|
| 639 |
+
model with CNN1D classifier yield better results and (b) models
|
| 640 |
+
trained with larger datasets perform better in placename recognition.
|
| 641 |
+
Table 2 and Table 3 list the evaluation metrics of all the tests.
|
| 642 |
+
Table 2: Evaluation results with CoNLL2003-Test dataset for
|
| 643 |
+
testing on training data variation and classifier types.
|
| 644 |
+
Training Data
|
| 645 |
+
Classifier
|
| 646 |
+
Precision
|
| 647 |
+
Recall
|
| 648 |
+
F1-score
|
| 649 |
+
CoNLL2003
|
| 650 |
+
Linear
|
| 651 |
+
0.934
|
| 652 |
+
0.901
|
| 653 |
+
0.917
|
| 654 |
+
CoNLL2003
|
| 655 |
+
MLP
|
| 656 |
+
0.904
|
| 657 |
+
0.910
|
| 658 |
+
0.907
|
| 659 |
+
CoNLL2003
|
| 660 |
+
CNN1D
|
| 661 |
+
0.923
|
| 662 |
+
0.920
|
| 663 |
+
0.921
|
| 664 |
+
Combined
|
| 665 |
+
Linear
|
| 666 |
+
0.889
|
| 667 |
+
0.844
|
| 668 |
+
0.866
|
| 669 |
+
Combined
|
| 670 |
+
MLP
|
| 671 |
+
0.941
|
| 672 |
+
0.884
|
| 673 |
+
0.912
|
| 674 |
+
Combined
|
| 675 |
+
CNN1D
|
| 676 |
+
0.942
|
| 677 |
+
0.916
|
| 678 |
+
0.929
|
| 679 |
+
Table 3: Evaluation results with Harvey2017 dataset for
|
| 680 |
+
testing on training data variation and classifier types.
|
| 681 |
+
|
| 682 |
+
|
| 683 |
+
|
| 684 |
+
|
| 685 |
+
|
| 686 |
+
Training Data
|
| 687 |
+
Classifier
|
| 688 |
+
Precision
|
| 689 |
+
Recall
|
| 690 |
+
F1-score
|
| 691 |
+
CoNLL2003
|
| 692 |
+
Linear
|
| 693 |
+
0.895
|
| 694 |
+
0.804
|
| 695 |
+
0.847
|
| 696 |
+
CoNLL2003
|
| 697 |
+
MLP
|
| 698 |
+
0.885
|
| 699 |
+
0.811
|
| 700 |
+
0.846
|
| 701 |
+
CoNLL2003
|
| 702 |
+
CNN1D
|
| 703 |
+
0.898
|
| 704 |
+
0.835
|
| 705 |
+
0.865
|
| 706 |
+
Combined
|
| 707 |
+
Linear
|
| 708 |
+
0.872
|
| 709 |
+
0.589
|
| 710 |
+
0.703
|
| 711 |
+
Combined
|
| 712 |
+
MLP
|
| 713 |
+
0.932
|
| 714 |
+
0.541
|
| 715 |
+
0.685
|
| 716 |
+
Combined
|
| 717 |
+
CNN1D
|
| 718 |
+
0.941
|
| 719 |
+
0.668
|
| 720 |
+
0.781
|
| 721 |
+
The “CoNLL2003” under the Training Data column means
|
| 722 |
+
CoNLL2003-Train dataset and the “Combined” represents the
|
| 723 |
+
dataset merging CoNLL2003-Test, Wiki3000 and WNUT2017.
|
| 724 |
+
In Table 2, when models were trained with CoNLL2003-Train, the
|
| 725 |
+
one with a simple linear classifier produced the best precision
|
| 726 |
+
(0.934), and the one with CNN1D produced the best recall (0.920)
|
| 727 |
+
and F1-score (0.921). MLP performed the worst among the three
|
| 728 |
+
classifiers. When models were trained with a combined dataset, the
|
| 729 |
+
model with CNN1D outperformed the rest in all three metrics with
|
| 730 |
+
precision equal to 0.942, recall of 0.916, and F1-score of 0.929. The
|
| 731 |
+
one with a linear classifier produced the worst results with an F1-
|
| 732 |
+
score of 0.866. In Table 3, when models were trained with
|
| 733 |
+
CoNLL2003-Train, the one with the CNN1D classifier
|
| 734 |
+
outperformed the rest with precision equal to 0.898, recall of 0.835,
|
| 735 |
+
and F1-score of 0.865. When models were trained with a combined
|
| 736 |
+
dataset, the model with CNN1D successfully defended its trophy
|
| 737 |
+
by rendering precision of 0.941, recall of 0.668, and F1-score of
|
| 738 |
+
0.781. The models with MLP worked slightly worse than the ones
|
| 739 |
+
with linear classifiers.
|
| 740 |
+
The above elucidation certifies the hypothesis that models with
|
| 741 |
+
CNN1D generate the optimal performance. It also shows that more
|
| 742 |
+
complicated classifiers like multi-layer perceptron do not
|
| 743 |
+
necessarily render better results.
|
| 744 |
+
However, when viewing Tables 2 and 3 contemporaneously, the
|
| 745 |
+
results from training with different datasets, the metrics indicated
|
| 746 |
+
that the model trained with the combined dataset generally
|
| 747 |
+
performed worse than the ones trained with merely CoNLL2003-
|
| 748 |
+
Train. This phenomenon contradicts the hypothesis that models
|
| 749 |
+
trained with larger datasets perform better. After scrutinizing the
|
| 750 |
+
dataset used for training, we noticed some inconsistencies in the
|
| 751 |
+
labeling criteria of the datasets. Some examples are listed in Table
|
| 752 |
+
4 and the unexpected phenomenon can be interpreted by the
|
| 753 |
+
heterogeneity of the datasets.
|
| 754 |
+
Table 4: Examples of different labels across the datasets used
|
| 755 |
+
for training the model.
|
| 756 |
+
Example Entity
|
| 757 |
+
Dataset
|
| 758 |
+
CoNLL200
|
| 759 |
+
3
|
| 760 |
+
Wiki300
|
| 761 |
+
0
|
| 762 |
+
WNUT201
|
| 763 |
+
7
|
| 764 |
+
"Canadian"
|
| 765 |
+
B-MISC
|
| 766 |
+
O
|
| 767 |
+
B-LOC
|
| 768 |
+
"Planet"
|
| 769 |
+
O
|
| 770 |
+
O
|
| 771 |
+
B-LOC
|
| 772 |
+
"east"
|
| 773 |
+
O
|
| 774 |
+
O
|
| 775 |
+
B-LOC
|
| 776 |
+
"orchard"
|
| 777 |
+
"academy"
|
| 778 |
+
B-ORG/
|
| 779 |
+
I-ORG
|
| 780 |
+
O
|
| 781 |
+
B-LOC/
|
| 782 |
+
I-LOC
|
| 783 |
+
"earth"
|
| 784 |
+
O
|
| 785 |
+
N/A
|
| 786 |
+
B-LOC
|
| 787 |
+
It can be seen from Table 4 that the word “Canadian,” which is
|
| 788 |
+
labeled as “B-MISC” (beginning of a miscellaneous name), is
|
| 789 |
+
identified as “B-LOC” (beginning of a location) in the WNUT2017
|
| 790 |
+
dataset. The words “Planet”, “east,” and “earth” are misclassified
|
| 791 |
+
as locations in the WNUT2017 dataset. The phrase “orchard
|
| 792 |
+
academy,” regarded as an organization under the CoNLL2003
|
| 793 |
+
criteria, is also labeled as a location entity. In this case, combining
|
| 794 |
+
several heterogeneous datasets can be considered adding some
|
| 795 |
+
helpful unseen samples to the original training data while
|
| 796 |
+
introducing a substantial amount of noise.
|
| 797 |
+
Rolnick et al. [13] experimented on several deep learning models
|
| 798 |
+
when trained with noisy data and claimed that the CNN model is
|
| 799 |
+
more resilient to noise than MLP and linear models. The trend of
|
| 800 |
+
performance change shown in Tables 2 and 3 when trained with
|
| 801 |
+
different datasets is in accordance with this statement. It is
|
| 802 |
+
noticeable that the models experience an increase in precision and
|
| 803 |
+
a drastic decrease in recall when trained with a combined dataset.
|
| 804 |
+
This incident can as well be triggered by noisy data. Since deep
|
| 805 |
+
learning models attempt to learn the underlying patterns of the
|
| 806 |
+
training data, the existing noise will confuse the model, resulting in
|
| 807 |
+
a fewer number of positive predictions. This might result in an
|
| 808 |
+
increase in precision and a decrease in recall.
|
| 809 |
+
Based on the observation and interpretation above, the BERT
|
| 810 |
+
model initialized with ‘bert-large-cased’, stacked with a CNN1D
|
| 811 |
+
classifier and fine-tuned with CoNLL2003-Train was selected as
|
| 812 |
+
the finalized TopoBERT module. Table 5 shows a comparison
|
| 813 |
+
between TopoBERT and five other models and tools based on the
|
| 814 |
+
Harvey2017 dataset.
|
| 815 |
+
Table 5: Evaluation results with Harvey2017 dataset for
|
| 816 |
+
comparing TopoBERT with other existing models.
|
| 817 |
+
Model
|
| 818 |
+
Precisio
|
| 819 |
+
n
|
| 820 |
+
Recal
|
| 821 |
+
l
|
| 822 |
+
F1-
|
| 823 |
+
score
|
| 824 |
+
Stanford NER (broad
|
| 825 |
+
location)
|
| 826 |
+
0.729
|
| 827 |
+
0.440
|
| 828 |
+
0.548
|
| 829 |
+
SpaCy NER (broad location)
|
| 830 |
+
0.461
|
| 831 |
+
0.304
|
| 832 |
+
0.366
|
| 833 |
+
BiLSTM-CRF
|
| 834 |
+
0.703
|
| 835 |
+
0.600
|
| 836 |
+
0.649
|
| 837 |
+
DM_NLP
|
| 838 |
+
0.729
|
| 839 |
+
0.680
|
| 840 |
+
0.703
|
| 841 |
+
NeuroTPR
|
| 842 |
+
0.787
|
| 843 |
+
0.678
|
| 844 |
+
0.728
|
| 845 |
+
TopoBERT
|
| 846 |
+
0.898
|
| 847 |
+
0.835
|
| 848 |
+
0.865
|
| 849 |
+
The SpaCy version v3.0 is used with model “en_core_web_sm”
|
| 850 |
+
loaded. Broad location indicates that we include entities in both
|
| 851 |
+
LOCATION and ORGANIZATION for Stanford NER, and we
|
| 852 |
+
include entities in the types of LOC, ORG, FACILITY, and GPE
|
| 853 |
+
for spaCy NER. Evaluation results show that TopoBERT prevailed
|
| 854 |
+
in the competition with precision equals to 0.898, recall 0.835 and
|
| 855 |
+
F1-score 0.865. This result outperformed other baseline models by
|
| 856 |
+
at least 18%.
|
| 857 |
+
TopoBERT has been developed as a ready-to-use module. The
|
| 858 |
+
output data of TopoBERT includes word labels and confidence of
|
| 859 |
+
the prediction. It complies with JSON file format for ease of use.
|
| 860 |
+
|
| 861 |
+
|
| 862 |
+
|
| 863 |
+
|
| 864 |
+
The source code has been uploaded to GitHub and can be accessed
|
| 865 |
+
with the link: https://github.com/SPGBarrett/gearlab_topobert.
|
| 866 |
+
|
| 867 |
+
4 Discussion
|
| 868 |
+
This paper presents a geoparsing framework and breeds a plug and
|
| 869 |
+
play toponym recognition module which can facilitate spatial
|
| 870 |
+
analysis based on social media or news media data. Figure 7 shows
|
| 871 |
+
a practical application of this framework in locating Twitter posts
|
| 872 |
+
under fine-grained topics during hazardous events. The study area
|
| 873 |
+
is the State of Florida, and the dots in multiple colors displayed on
|
| 874 |
+
the map are tweets posted during Hurricane Irma harvested by
|
| 875 |
+
Twitter developer API. The locations of those tweets without
|
| 876 |
+
geotags are retrieved by running TopoBERT and google geocoding
|
| 877 |
+
service. The module also enjoys the potential of being used for
|
| 878 |
+
location name detection for news media to pinpoint the discussed
|
| 879 |
+
topics [14,15] and help to identify fake news [16].
|
| 880 |
+
|
| 881 |
+
|
| 882 |
+
Figure 7: Toponym recognition applied to locate Twitter posts
|
| 883 |
+
during disasters.
|
| 884 |
+
This paper concentrates mainly on designing a novel architecture
|
| 885 |
+
of a reliable and versatile module for toponym recognition.
|
| 886 |
+
However, the performance enhancement can continue by
|
| 887 |
+
addressing the following issues.
|
| 888 |
+
First, the models are trained and evaluated based on well prepared
|
| 889 |
+
datasets. This can be regarded as a best-case scenario compared to
|
| 890 |
+
real life situations. Place name usage can be highly ambiguous and
|
| 891 |
+
random, especially within social media platforms. Typos are
|
| 892 |
+
extremely common which might cause out-of-vocabulary words in
|
| 893 |
+
language models. Place name abbreviations such as “Boulevard”
|
| 894 |
+
and “blvd”, “Drive” and “Dr.”, “Street” and “St.” and so forth are
|
| 895 |
+
frequently utilized interchangeably. People might unconsciously
|
| 896 |
+
ignore the correct upper-case and lower-case usage, such as
|
| 897 |
+
“college station” and “College Station”, “mexico” and “MEXICO”.
|
| 898 |
+
Meticulous data preprocessing methods can be incorporated to
|
| 899 |
+
tackle this problem in order to achieve better overall performance.
|
| 900 |
+
Second, several rule-base approaches can be leveraged to further
|
| 901 |
+
boost the performance. Enlightened by the success of hybrid
|
| 902 |
+
models [9], sets of grammar rules based on the composition of
|
| 903 |
+
nouns, determiners, adjectives, conjunctions, numbers and
|
| 904 |
+
possessive ending can be designed [17]. Additionally, commonly
|
| 905 |
+
used gazetteers such as OpenStreetMap and GeoNames can be used
|
| 906 |
+
as extra named entity matching criteria which will enhance the True
|
| 907 |
+
Positives of the model. Regional criteria can be appended to the
|
| 908 |
+
model while identifying place names by making country name,
|
| 909 |
+
state names, county names, or bounding boxes as input variables of
|
| 910 |
+
the model. This will allow the model to add constraints during
|
| 911 |
+
processing. The top-N words from word embedding models [9,35],
|
| 912 |
+
which are not place names, can be applied to filter words during
|
| 913 |
+
data preprocessing. This will to some extent eliminate the False
|
| 914 |
+
Positives of the prediction.
|
| 915 |
+
Third, due to the data-hungry nature of deep learning, data
|
| 916 |
+
availability and quality are topics being inevitably discussed when
|
| 917 |
+
large complicated deep learning models are involved. It is common
|
| 918 |
+
knowledge in the deep learning world that larger datasets lead to
|
| 919 |
+
better generalizability and performance. However, this statement
|
| 920 |
+
fails to hold true in this paper due to the fact that the larger datasets
|
| 921 |
+
are derived from several distinguished smaller datasets labeled
|
| 922 |
+
under their own unique regime. Therefore, there is an urgent need
|
| 923 |
+
to define criteria and build unified datasets for toponym recognition
|
| 924 |
+
model training, evaluating and benchmarking. The dataset can be
|
| 925 |
+
manually modified based on existing datasets and augmented using
|
| 926 |
+
rule-based methods, gazetteers or Generative Adversarial Network
|
| 927 |
+
[18,19,20].
|
| 928 |
+
Fourth, fine-tuned language models can be few-shot or zero-shot
|
| 929 |
+
learners, which means that the models can be applied directly to
|
| 930 |
+
certain downstream tasks with very little or even no further training
|
| 931 |
+
[21,22,23]. This is because advanced language models can better
|
| 932 |
+
capture the meaning of the text. This claim is also underpinned by
|
| 933 |
+
the result of this paper which leverages BERT to boost the module
|
| 934 |
+
capability. Therefore, incorporating gigantic models such as GPT-
|
| 935 |
+
3 [24] might lead to another round of performance enhancement.
|
| 936 |
+
5 Conclusion
|
| 937 |
+
To further enhance the performance of toponym recognition by
|
| 938 |
+
better understanding natural language, TopoBERT, which
|
| 939 |
+
incorporate pretrained language model, BERT, is introduced.
|
| 940 |
+
Experiments on the pretrained parameters, training dataset
|
| 941 |
+
combinations, and model architecture reveal the following findings.
|
| 942 |
+
First, the toponym recognition model performance is sensitive to
|
| 943 |
+
the architecture of pre-trained language models and classifiers. The
|
| 944 |
+
models initialized with a larger-structured BERT model (“bert-
|
| 945 |
+
large-cased”) show an advantage over the models initialized with a
|
| 946 |
+
basic BERT model (“bert-base-cased”). More complicated
|
| 947 |
+
classifiers like MLP do not necessarily win over simple linear
|
| 948 |
+
classifiers. Second, increasing training data size produces worse
|
| 949 |
+
results, especially for the recall, due to data heterogeneity. The
|
| 950 |
+
model trained with single dataset, CoNLL2003-Train, and stacked
|
| 951 |
+
on top with a CNN1D classifier renders the optimum results both
|
| 952 |
+
on CoNLL2003-Test and Harvey2017 datasets. Finally, the
|
| 953 |
+
developed TopoBERT module outperforms existing models in
|
| 954 |
+
|
| 955 |
+
Hurricane Category
|
| 956 |
+
IrmaRouteLine
|
| 957 |
+
Florida_Census_ Tract_2019
|
| 958 |
+
0
|
| 959 |
+
Human_Help_Florida
|
| 960 |
+
Animal HelpFlorida
|
| 961 |
+
3
|
| 962 |
+
Infrastructure Florida
|
| 963 |
+
ShelterFlorida
|
| 964 |
+
|
| 965 |
+
|
| 966 |
+
|
| 967 |
+
recognizing place names in texts. The clinched TopoBERT with the
|
| 968 |
+
optimal model architecture and training strategy produces reliable
|
| 969 |
+
toponym prediction and achieves F1-score of 0.865 on Harvey2017
|
| 970 |
+
dataset, which surpasses other prevailing models or tools by at least
|
| 971 |
+
18%.
|
| 972 |
+
In nutshell, the discoveries of this paper contribute in determining
|
| 973 |
+
the optimal model structure on toponym recognition tasks and
|
| 974 |
+
urges a large standardized dataset labeled with unified regime to
|
| 975 |
+
support model training and benchmarking. A plug and play module
|
| 976 |
+
is implemented and open sourced to support pertinent applications
|
| 977 |
+
and similar research.
|
| 978 |
+
ACKNOWLEDGMENTS
|
| 979 |
+
The research is supported by a project funded by the U.S. National
|
| 980 |
+
Science Foundation: Reducing the Human Impacts of Flash Floods
|
| 981 |
+
- Development of Microdata and Causal Model to Inform
|
| 982 |
+
Mitigation and Preparedness (Award No. 1931301).
|
| 983 |
+
REFERENCES
|
| 984 |
+
[1] Marco Avvenuti, Stefano Cresci, Mariantonietta La N. Polla, Andrea Marchetti,
|
| 985 |
+
and Maurizio Tesconi. 2014. Earthquake emergency management by Social
|
| 986 |
+
Sensing. 24 - 28 March 2014, Budapest, Hungary. IEEE, Piscataway, NJ.
|
| 987 |
+
[2] Lei Zou, Nina S. N. Lam, Shayan Shams, Heng Cai, Michelle A. Meyer, Seungwon
|
| 988 |
+
Yang, Kisung Lee, Seung-Jong Park, and Margaret A. Reams. 2019. Social and
|
| 989 |
+
geographical disparities in Twitter use during
|
| 990 |
+
[3] Lei Zou, Nina S. N. Lam, Heng Cai, and Yi Qiang. 2018. Mining Twitter Data
|
| 991 |
+
for Improved Understanding of Disaster Resilience. Annals of the American
|
| 992 |
+
Association
|
| 993 |
+
of
|
| 994 |
+
Geographers
|
| 995 |
+
108,
|
| 996 |
+
5,
|
| 997 |
+
1422–1441.
|
| 998 |
+
DOI:
|
| 999 |
+
https://doi.org/10.1080/24694452.2017.1421897.
|
| 1000 |
+
[4] Xiao Huang, Zhenlong Li, Yuqin Jiang, Xiaoming Li, and Dwayne Porter. 2020.
|
| 1001 |
+
Twitter reveals human mobility dynamics during the COVID-19 pandemic. PLoS
|
| 1002 |
+
ONE 15, 11, e0241957. DOI: https://doi.org/10.1371/journal.pone.0241957.
|
| 1003 |
+
[5] Bing Zhou, Lei Zou, Ali Mostafavi, Binbin Lin, Mingzheng Yang, Nasir
|
| 1004 |
+
Gharaibeh, Heng Cai, Joynal Abedin, and Debayan Mandal. 2022. VictimFinder:
|
| 1005 |
+
Harvesting rescue requests in disaster response from social media with BERT.
|
| 1006 |
+
Computers,
|
| 1007 |
+
Environment
|
| 1008 |
+
and
|
| 1009 |
+
Urban
|
| 1010 |
+
Systems
|
| 1011 |
+
95,
|
| 1012 |
+
101824.
|
| 1013 |
+
DOI:
|
| 1014 |
+
https://doi.org/10.1016/j.compenvurbsys.2022.101824.
|
| 1015 |
+
[6] Jimin Wang, Yingjie Hu, and Kenneth Joseph. 2020. NeuroTPR: A neuro‐net
|
| 1016 |
+
toponym recognition model for extracting locations from social media messages.
|
| 1017 |
+
Transactions in GIS 24, 3, 719–735. DOI: https://doi.org/10.1111/tgis.12627.
|
| 1018 |
+
[7] Peng Qi, Yuhao Zhang, Yuhui Zhang, Jason Bolton, and Christopher D. Manning.
|
| 1019 |
+
2020. Stanza: A Python Natural Language Processing Toolkit for Many Human
|
| 1020 |
+
Languages.
|
| 1021 |
+
[8] Ritam Dutt, Kaustubh Hiware, Avijit Ghosh, and Rameshwar Bhaskaran. 2018.
|
| 1022 |
+
SAVITR. In Companion Proceedings of the The Web Conference 2018.
|
| 1023 |
+
International World Wide Web Conferences Steering Committee, [Place of
|
| 1024 |
+
publication
|
| 1025 |
+
not
|
| 1026 |
+
identified],
|
| 1027 |
+
1643–1649.
|
| 1028 |
+
DOI:
|
| 1029 |
+
https://doi.org/10.1145/3184558.3191623.
|
| 1030 |
+
[9] Xuke Hu, Hussein S. Al-Olimat, Jens Kersten, Matti Wiegmann, Friederike Klan,
|
| 1031 |
+
Yeran Sun, and Hongchao Fan. 2022. GazPNE: annotation-free deep learning for
|
| 1032 |
+
place name extraction from microblogs leveraging gazetteer and synthetic data
|
| 1033 |
+
by rules. International Journal of Geographical Information Science 36, 2, 310–
|
| 1034 |
+
337. DOI: https://doi.org/10.1080/13658816.2021.1947507.
|
| 1035 |
+
[10] Sang, Erik F. Tjong Kim and Fien de Meulder. 2003. Introduction to the CoNLL-
|
| 1036 |
+
2003 Shared Task: Language-Independent Named Entity Recognition.
|
| 1037 |
+
[11] Leon Derczynski, Eric Nichols, Marieke van Erp, and Nut Limsopatham. Results
|
| 1038 |
+
of the WNUT2017 Shared Task on Novel and Emerging Entity Recognition. In
|
| 1039 |
+
Proceedings of the 3rd Workshop on Noisy User-generated Text. Association for
|
| 1040 |
+
Computational
|
| 1041 |
+
Linguistics,
|
| 1042 |
+
Stroudsburg,
|
| 1043 |
+
PA,
|
| 1044 |
+
USA,
|
| 1045 |
+
140–147.
|
| 1046 |
+
DOI:
|
| 1047 |
+
https://doi.org/10.18653/v1/W17-4418.
|
| 1048 |
+
[12] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018.
|
| 1049 |
+
BERT Pre-training of Deep Bidirectional Transformers for Language
|
| 1050 |
+
Understanding.
|
| 1051 |
+
[13] David Rolnick, Andreas Veit, Serge Belongie, and Nir Shavit. 2017. Deep
|
| 1052 |
+
Learning
|
| 1053 |
+
is
|
| 1054 |
+
Robust
|
| 1055 |
+
to
|
| 1056 |
+
Massive
|
| 1057 |
+
Label
|
| 1058 |
+
Noise.
|
| 1059 |
+
DOI:
|
| 1060 |
+
https://doi.org/10.48550/arXiv.1705.10694.
|
| 1061 |
+
[14] Youjie Zhou and Jiebo Luo. 2012. Geo-location inference on news articles via
|
| 1062 |
+
multimodal pLSA. In MM'12. The proceedings of the 20th ACM international
|
| 1063 |
+
conference on multimedia, co-located with ACM multimedia 2012, October 29-
|
| 1064 |
+
November 2, 2012, Nara, Japan. Association for Computer Machinery, New
|
| 1065 |
+
York, 741. DOI: https://doi.org/10.1145/2393347.2396301.
|
| 1066 |
+
[15] Mauricio Quezada, Vanessa Peña-Araya, and Barbara Poblete. 2015. Location-
|
| 1067 |
+
Aware Model for News Events in Social Media. In SIGIR 2015. Proceedings of
|
| 1068 |
+
the 38th International ACM SIGIR Conference on Research and Development in
|
| 1069 |
+
Information Retrieval : August 9-13, 2015, Santiago, Chile. ACM, New York,
|
| 1070 |
+
935–938. DOI: https://doi.org/10.1145/2766462.2767815.
|
| 1071 |
+
[16] Kai Shu, Xinyi Zhou, Suhang Wang, Reza Zafarani, and Huan Liu. 2019. The
|
| 1072 |
+
role of user profiles for fake news detection. In ASONAM 2019. Proceedings of
|
| 1073 |
+
the 2019 IEEE/ACM International Conference on Advances in Social Networks
|
| 1074 |
+
Analysis and Mining : FAB 2019, FOSINT-SI 2019, HI-BI-BI 2019 : Vancouver,
|
| 1075 |
+
Canada, 27-30 August, 2019 : workshops held in conjunction with ASONAM
|
| 1076 |
+
2019: the 10th International Workshop on Mining and Analyzing Social
|
| 1077 |
+
Networks for Decision Support (MSNDS 2019), the 9th International Workshop
|
| 1078 |
+
on Social Network Analysis in Applications (SNAA 2019), Workshop on Social
|
| 1079 |
+
Influence (5th edition) (SI 2019), the 4th International Workshop on Social
|
| 1080 |
+
Network Analysis Surveillance Technologies (SNAST 2019), Recommendation
|
| 1081 |
+
and Advertising in Online Social Networks (READNet 2019). IEEE,
|
| 1082 |
+
[Piscataway, NJ], 436–439. DOI: https://doi.org/10.1145/3341161.3342927.
|
| 1083 |
+
[17] Prasanna Giridhar, Tarek Abdelzaher, Jemin George, and Lance Kaplan. 2015 -
|
| 1084 |
+
2015. On quality of event localization from social network feeds. In 2015 IEEE
|
| 1085 |
+
International Conference on Pervasive Computing and Communication
|
| 1086 |
+
Workshops
|
| 1087 |
+
(PerCom
|
| 1088 |
+
Workshops).
|
| 1089 |
+
IEEE,
|
| 1090 |
+
75–80.
|
| 1091 |
+
DOI:
|
| 1092 |
+
https://doi.org/10.1109/PERCOMW.2015.7133997.
|
| 1093 |
+
[18] Connor Shorten, Taghi M. Khoshgoftaar, and Borko Furht. 2021. Text Data
|
| 1094 |
+
Augmentation for Deep Learning. Journal of big data 8, 1, 101. DOI:
|
| 1095 |
+
https://doi.org/10.1186/s40537-021-00492-0.
|
| 1096 |
+
[19] Rui Cao and Roy K.-W. Lee. HateGAN: Adversarial Generative-Based Data
|
| 1097 |
+
Augmentation for Hate Speech Detection. In Proceedings of the 28th
|
| 1098 |
+
International Conference on Computational Linguistics. International Committee
|
| 1099 |
+
on Computational Linguistics, Stroudsburg, PA, USA, 6327–6338. DOI:
|
| 1100 |
+
https://doi.org/10.18653/v1/2020.coling-main.557.
|
| 1101 |
+
[20] Steven Y. Feng, Varun Gangal, Jason Wei, Sarath Chandar, Soroush Vosoughi,
|
| 1102 |
+
Teruko Mitamura, and Eduard Hovy. 2021. A Survey of Data Augmentation
|
| 1103 |
+
Approaches for NLP.
|
| 1104 |
+
[21] Jason Wei, Maarten Bosma, Vincent Y. Zhao, Kelvin Guu, Adams W. Yu, Brian
|
| 1105 |
+
Lester, Nan Du, Andrew M. Dai, and Quoc V. Le. 2021. Finetuned Language
|
| 1106 |
+
Models Are Zero-Shot Learners.
|
| 1107 |
+
[22] Mitchell Wortsman, Gabriel Ilharco, Jong W. Kim, Mike Li, Simon Kornblith,
|
| 1108 |
+
Rebecca Roelofs, Raphael G. Lopes, Hannaneh Hajishirzi, Ali Farhadi,
|
| 1109 |
+
Hongseok Namkoong, and Ludwig Schmidt. 2021. Robust fine-tuning of zero-
|
| 1110 |
+
shot models.
|
| 1111 |
+
[23] Pushpankar K. Pushp and Muktabh M. Srivastava. 2017. Train Once, Test
|
| 1112 |
+
Anywhere: Zero-Shot Learning for Text Classification.
|
| 1113 |
+
[24] Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan,
|
| 1114 |
+
Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda
|
| 1115 |
+
Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom
|
| 1116 |
+
Henighan, Rewon Child, Aditya Ramesh, Daniel M. Ziegler, Jeffrey Wu,
|
| 1117 |
+
Clemens Winter, Christopher Hesse, Mark Chen, Eric Sigler, Mateusz Litwin,
|
| 1118 |
+
Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish,
|
| 1119 |
+
Alec Radford, Ilya Sutskever, and Dario Amodei. 2020. Language Models are
|
| 1120 |
+
Few-Shot Learners.
|
| 1121 |
+
[25] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones,
|
| 1122 |
+
Aidan N.Gomez, and Lukasz Kaiser. Attention Is All You Need. 31st Conference
|
| 1123 |
+
on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA.
|
| 1124 |
+
[26] S. Hochreiter and J. Schmidhuber. 1997. Long short-term memory. Neural
|
| 1125 |
+
computation 9, 8, 1735–1780. DOI: https://doi.org/10.1162/neco.1997.9.8.1735.
|
| 1126 |
+
[27] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural Machine
|
| 1127 |
+
Translation by Jointly Learning to Align and Translate.
|
| 1128 |
+
[28] Matthew E.Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher
|
| 1129 |
+
Clark, Kenton Lee, and Luke Zettlemoyer. Deep contextualized word
|
| 1130 |
+
representations.
|
| 1131 |
+
[29] Lee, J. Y., & Dernoncourt, F. (2016). Sequential Short-Text Classification with
|
| 1132 |
+
Recurrent and Convolutional Neural Networks. https://arxiv.org/pdf/1603.03827
|
| 1133 |
+
[30] Jianfeng Zhao, Xia Mao, and Lijiang Chen. 2019. Speech emotion recognition
|
| 1134 |
+
using deep 1D & 2D CNN LSTM networks. Biomedical Signal Processing and
|
| 1135 |
+
Control 47, 312–323. DOI: https://doi.org/10.1016/j.bspc.2018.08.035.
|
| 1136 |
+
[31] Serkan Kiranyaz, Onur Avci, Osama Abdeljaber, Turker Ince, Moncef Gabbouj,
|
| 1137 |
+
and Daniel J. Inman. 2021. 1D convolutional neural networks and applications:
|
| 1138 |
+
A survey. Mechanical Systems and Signal Processing 151, 107398. DOI:
|
| 1139 |
+
https://doi.org/10.1016/j.ymssp.2020.107398.
|
| 1140 |
+
[32] Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005.
|
| 1141 |
+
Incorporating Non-local Information into Information Extraction Systems by
|
| 1142 |
+
Gibbs Sampling. Proceedings of the 43nd Annual Meeting of the Association for
|
| 1143 |
+
Computational
|
| 1144 |
+
Linguistics
|
| 1145 |
+
(ACL
|
| 1146 |
+
2005), pp.
|
| 1147 |
+
363-
|
| 1148 |
+
370. http://nlp.stanford.edu/~manning/papers/gibbscrf3.pdf
|
| 1149 |
+
[33] Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF Models
|
| 1150 |
+
for Sequence Tagging.
|
| 1151 |
+
|
| 1152 |
+
|
| 1153 |
+
|
| 1154 |
+
|
| 1155 |
+
[34] Chunping Ma, Huafei Zheng, Pengjun Xie, Chen Li, Linlin Li, and Luo Si.
|
| 1156 |
+
DM_NLP at SemEval-2018 Task 8: neural sequence labeling with linguistic
|
| 1157 |
+
features. In Proceedings of The 12th International Workshop on Semantic
|
| 1158 |
+
Evaluation. Association for Computational Linguistics, Stroudsburg, PA, USA,
|
| 1159 |
+
707–711. DOI: https://doi.org/10.18653/v1/S18-1114.
|
| 1160 |
+
[35] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean.
|
| 1161 |
+
Distributed Representations of Words and Phrases and their Compositionality.
|
| 1162 |
+
|
| 1163 |
+
|
| 1164 |
+
|
A9FRT4oBgHgl3EQfujgS/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
CNE4T4oBgHgl3EQf5g54/content/2301.05324v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:1198a89231dcad72df7a47ab1004cfefdbad2af4b6055b9ea303b4aeedf4c2f0
|
| 3 |
+
size 1474690
|
CNE4T4oBgHgl3EQf5g54/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:04683ed10d02803c29ddbc4293f033e2e43c4a6bfe9eeace01572c97851b62d8
|
| 3 |
+
size 3014701
|
CNE4T4oBgHgl3EQf5g54/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:56f7c552f6c02dd17bfdc25d78d718f80528d2b04bc2870c67431b90bafb539d
|
| 3 |
+
size 100039
|
CtAzT4oBgHgl3EQfiP1R/content/2301.01496v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:51882d897b431f99668cbbe76d2b2158b398a7facb5abc0fab113bc222b82a59
|
| 3 |
+
size 219358
|
CtAzT4oBgHgl3EQfiP1R/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:817171b1533148bb90dce75517b67249e1b993a968c6538760a091d636b3890b
|
| 3 |
+
size 99426
|
E9FLT4oBgHgl3EQfFi_K/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:79da0fbd86fe66aae8de6590f3e661f1fc74d4fc5e2fb5ab7d78e65244330e37
|
| 3 |
+
size 2818093
|
G9AzT4oBgHgl3EQfxf6F/content/tmp_files/2301.01739v1.pdf.txt
ADDED
|
@@ -0,0 +1,1866 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
MITP/21-047
|
| 2 |
+
Refactorisation in subleading ¯B → Xsγ
|
| 3 |
+
Tobias Hurtha and Robert Szafron,b
|
| 4 |
+
aPRISMA+ Cluster of Excellence and Institute of Physics (THEP),
|
| 5 |
+
Johannes Gutenberg University, D-55099 Mainz, Germany
|
| 6 |
+
bDepartment of Physics, Brookhaven National Laboratory, Upton, N.Y., 11973, U.S.A.
|
| 7 |
+
Abstract
|
| 8 |
+
We establish refactorisation conditions between the subleading O8-O8 contributions to
|
| 9 |
+
the inclusive ¯B → Xsγ decay suffering from endpoint divergences and prove a factorisa-
|
| 10 |
+
tion theorem for these contributions to all orders in the strong coupling constant.
|
| 11 |
+
This
|
| 12 |
+
allows for higher-order calculations of the resolved contributions and consistent summation
|
| 13 |
+
of large logarithms, consequently reducing the recently found large-scale dependence in these
|
| 14 |
+
contributions. We implement the concept of refactorisation in a heavy flavour application
|
| 15 |
+
of SCET, which includes nonperturbative functions as additional subtlety not present in
|
| 16 |
+
collider applications.
|
| 17 |
+
1
|
| 18 |
+
arXiv:2301.01739v1 [hep-ph] 4 Jan 2023
|
| 19 |
+
|
| 20 |
+
Contents
|
| 21 |
+
1
|
| 22 |
+
Introduction
|
| 23 |
+
3
|
| 24 |
+
2
|
| 25 |
+
General setup
|
| 26 |
+
4
|
| 27 |
+
2.1
|
| 28 |
+
Hard matching
|
| 29 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
| 30 |
+
5
|
| 31 |
+
3
|
| 32 |
+
Bare factorisation theorem
|
| 33 |
+
7
|
| 34 |
+
3.1
|
| 35 |
+
B-type current (direct) contribution . . . . . . . . . . . . . . . . . . . . . . . . . .
|
| 36 |
+
7
|
| 37 |
+
3.2
|
| 38 |
+
A-type (resolved) contribution
|
| 39 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
| 40 |
+
10
|
| 41 |
+
4
|
| 42 |
+
Refactorisation of the endpoint contribution
|
| 43 |
+
12
|
| 44 |
+
4.1
|
| 45 |
+
Refactorisation at leading order . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
| 46 |
+
15
|
| 47 |
+
4.2
|
| 48 |
+
Bare refactorised factorisation theorem . . . . . . . . . . . . . . . . . . . . . . . .
|
| 49 |
+
17
|
| 50 |
+
4.3
|
| 51 |
+
Refactorised factorisation theorem after renormalisation . . . . . . . . . . . . . . .
|
| 52 |
+
17
|
| 53 |
+
5
|
| 54 |
+
Summary and Outlook
|
| 55 |
+
20
|
| 56 |
+
2
|
| 57 |
+
|
| 58 |
+
1
|
| 59 |
+
Introduction
|
| 60 |
+
There has been a general belief that soft-collinear factorisation at subleading power in ΛQCD/mb
|
| 61 |
+
expansion is well established for inclusive B−decay modes such as ¯B → Xsγ, ¯B → Xsℓℓ, or
|
| 62 |
+
¯B → Xuℓ¯ν [1] – in contrast to exclusive B decays where factorisation theorems do not exist at
|
| 63 |
+
the subleading power in general. There are two types of subleading contributions to the inclusive
|
| 64 |
+
¯B → Xsγ decay, direct and resolved ones. In the latter, the photon does not directly couple to an
|
| 65 |
+
effective electroweak vertex, but they contain subprocesses in which the photons couple to light
|
| 66 |
+
partons instead. These subleading corrections are nonlocal in the endpoint region, and they stay
|
| 67 |
+
nonlocal even in the region where the local heavy mass expansion is applicable. In this sense,
|
| 68 |
+
they represent an irreducible uncertainty of this decay mode. Analogous subleading contributions
|
| 69 |
+
exist in the inclusive ¯B → Xsℓℓ decay but not in the inclusive ¯B → Xuℓ¯ν decay because, in this
|
| 70 |
+
case, the leptons can couple to light partons via the W vector boson only.
|
| 71 |
+
The first systematic analysis of resolved contributions to the inclusive ¯B → Xsγ decay [2,3] was
|
| 72 |
+
worked out in Refs. [4,5], the corresponding 1/mb contributions to the inclusive ¯B → Xsℓℓ decay
|
| 73 |
+
were discussed in Refs. [6,7], using soft collinear effective theory (SCET). Recently, the uncertainty
|
| 74 |
+
due to the resolved contribution was reduced with the help of a new hadronic input [8, 9]. But
|
| 75 |
+
these resolved contributions still represent the largest uncertainty in the inclusive ¯B → Xsγ decay.
|
| 76 |
+
Moreover, a large scale dependence and also a large charm mass dependence were identified in
|
| 77 |
+
the lowest order result of the resolved contribution, which calls for a systematic calculation of αs
|
| 78 |
+
corrections and renormalisation group (RG) summation [9]. A mandatory prerequisite for this
|
| 79 |
+
task is an all-order in the strong coupling constant αs factorisation formula for the subleading
|
| 80 |
+
power corrections.
|
| 81 |
+
The factorisation of resolved contributions introduces a new ingredient, namely an anti-
|
| 82 |
+
hardcollinear jet function [4], typically referred to as a radiative or amplitude-level jet function
|
| 83 |
+
in collider and flavour applications [10–18]. They are not represented by cut propagators as the
|
| 84 |
+
usual jet functions but as full propagator functions (both dressed by Wilson lines). But as al-
|
| 85 |
+
ready noticed in Ref. [4], the specific resolved O8 − O8 contribution does not factorise because
|
| 86 |
+
the convolution integral is UV divergent. The authors of Ref. [4] emphasised that there is an
|
| 87 |
+
essential difference between divergent convolution integrals in power-suppressed contributions of
|
| 88 |
+
exclusive B decays and the divergent convolution integrals in the present case, while the former
|
| 89 |
+
were of IR origin, the latter divergence of UV nature. However, a solution at the lowest order
|
| 90 |
+
was established by considering the sum of direct and resolved O8 − O8 contributions, which was
|
| 91 |
+
shown to be scale and scheme dependent by using a hard cut-off in the resolved contribution. But
|
| 92 |
+
the failure of factorisation does not allow for a consistent resummation of large logarithms.
|
| 93 |
+
In this paper, we identify the divergences in the resolved and in the direct contributions
|
| 94 |
+
as endpoint divergences by showing that also the divergence in the direct contribution can be
|
| 95 |
+
traced back to a divergent convolution integral.
|
| 96 |
+
Recently, new techniques were presented in
|
| 97 |
+
specific collider applications of SCET [19–27]. The so-called refactorisation conditions or endpoint
|
| 98 |
+
factorisation [22,23,25–27] allow for an operator-level reshuffling of terms within the factorisation
|
| 99 |
+
formula so that all endpoint divergences cancel out. In this work, we now implement this idea
|
| 100 |
+
in a flavour application of SCETI, which includes nonperturbative soft functions not present in
|
| 101 |
+
collider applications – often referred to as subleading shape functions [28,29].
|
| 102 |
+
As a first step, we derive the matching of the hard function for the two operators involved
|
| 103 |
+
in the O8 − O8 subleading contributions. In the second step, we establish the bare factorisation
|
| 104 |
+
theorem for the direct and the resolved contribution at an operational level. Then we derive
|
| 105 |
+
3
|
| 106 |
+
|
| 107 |
+
the refactorisation conditions to all orders, leading us finally to the renormalised factorisation
|
| 108 |
+
theorem. We present all steps for the inclusive ¯B → Xsγ, but all the details can also be taken
|
| 109 |
+
over for the corresponding ¯B → Xsℓℓ case.
|
| 110 |
+
2
|
| 111 |
+
General setup
|
| 112 |
+
The starting point for all calculations concerning the ¯B → Xsγ decay is the weak effective
|
| 113 |
+
Lagrangian defined at a scale µb parametrically equal to the b-quark mass µb ∼ mb. The weak
|
| 114 |
+
effective Lagrangian is obtained from the SM Lagrangian after integrating out the heavy particles
|
| 115 |
+
like the heavy gauge bosons and the top quark. We use the convention of Ref. [30]. Assuming
|
| 116 |
+
Standard Model CKM unitarity, with λq = VqbV ∗
|
| 117 |
+
qs and λu + λc + λt = 0, the effective Hamiltonian
|
| 118 |
+
may be written as
|
| 119 |
+
Heff = GF
|
| 120 |
+
√
|
| 121 |
+
2
|
| 122 |
+
�
|
| 123 |
+
q=u,c
|
| 124 |
+
λq
|
| 125 |
+
�
|
| 126 |
+
C1 Oq
|
| 127 |
+
1 + C2 Oq
|
| 128 |
+
2 + C7γ O7γ + C8g O8g +
|
| 129 |
+
�
|
| 130 |
+
i=3,...,6
|
| 131 |
+
Ci Oi
|
| 132 |
+
�
|
| 133 |
+
.
|
| 134 |
+
(1)
|
| 135 |
+
Here we concentrate on the O8 operator:
|
| 136 |
+
O8g = − gs
|
| 137 |
+
8π2 mb ¯sσµν(1 + γ5)Gµνb .
|
| 138 |
+
(2)
|
| 139 |
+
Our sign convention is that iDµ = i∂µ+gs taAa
|
| 140 |
+
µ+e qfAµ, where ta are the SU(3) colour generators,
|
| 141 |
+
and Qf is the electric charge of the fermion in units of e. We consider the CP-averaged ¯B → Xsγ
|
| 142 |
+
photon energy spectrum in the endpoint region where Mb − 2Eγ = O(ΛQCD). Soft-collinear-
|
| 143 |
+
effective theory (SCET) offers the appropriate framework for this multi-scale problem.
|
| 144 |
+
The
|
| 145 |
+
kinematics of the decay is given as follows: the initial meson carries momentum pB, and it decays
|
| 146 |
+
into a photon with momentum q and a jet whose total momentum is PX. From pB − q = PX in
|
| 147 |
+
the B meson rest frame, we have 2MBEγ = M 2
|
| 148 |
+
B − M 2
|
| 149 |
+
X. Thus, the jet invariant mass MX is much
|
| 150 |
+
smaller than the photon energy Eγ and jet energy EX. We set PX⊥ = 0 and choose reference
|
| 151 |
+
vectors n2 = n2 = 0, v2 = 1, such that n + ¯n = 2v and nn = 2. Choosing
|
| 152 |
+
qµ = Eγ¯nµ
|
| 153 |
+
and
|
| 154 |
+
pµ
|
| 155 |
+
B = MBvµ ,
|
| 156 |
+
(3)
|
| 157 |
+
we find MB = ¯nPX and MB = nPX + 2Eγ or equivalently
|
| 158 |
+
P µ
|
| 159 |
+
X = (MB − 2Eγ)nµ + MB¯nµ .
|
| 160 |
+
(4)
|
| 161 |
+
Thus, there is only one independent kinematical variable in the ¯B → Xsγ decay. One may choose
|
| 162 |
+
the photon energy Eγ or nPX = MB − 2Eγ.
|
| 163 |
+
Three dynamical scales describe the endpoint region, a hard scale of O(MB), an intermedi-
|
| 164 |
+
ate (anti-)hardcollinear scale of O(
|
| 165 |
+
�
|
| 166 |
+
MBΛQCD), and a soft scale of O(ΛQCD). The expansion
|
| 167 |
+
parameter in our present analysis is defined as λ2 = ΛQCD/MB1. The photon can be treated as
|
| 168 |
+
anti-hardcollinear. The hadronic final state factorises into a hardcollinear jet and soft wide-angle
|
| 169 |
+
radiation. Since the soft modes have parametrically smaller virtuality than the hardcollinear
|
| 170 |
+
1Alternative convention often used in the literature is to define λ = ΛQCD/MB.
|
| 171 |
+
4
|
| 172 |
+
|
| 173 |
+
modes, the problem at hand is described by the SCETI setup [31–34]. Using a shorthand nota-
|
| 174 |
+
tion a ∼ (na, ¯na, a⊥) to indicate the scaling of the momentum components in powers of λ, we
|
| 175 |
+
have: hard momentum scales like phard ∼ (1, 1, 1)mb, a hardcollinear one phc ∼ (λ2, 1, λ)mb, an
|
| 176 |
+
anti-hardcollinear region phc ∼ (1, λ2, λ)mb and a soft momentum psoft ∼ (λ2, λ2, λ2)mb.
|
| 177 |
+
The first step in the derivation of a factorisation theorem is hard matching. We have to match
|
| 178 |
+
the electroweak operator onto SCET. We will see that the direct contribution is represented by a
|
| 179 |
+
next-to-leading power (NLP) B-type current in SCET, i.e. power-suppressed current composed of
|
| 180 |
+
two collinear building blocks. The resolved contribution is represented by a time-ordered product
|
| 181 |
+
of a leading-power (LP) A-type current with a subleading L(1)
|
| 182 |
+
ξq Lagrangian (see Ref. [19, 35–37]
|
| 183 |
+
for a precise definition of the different types of currents).
|
| 184 |
+
In the second step, we integrate out the hardcollinear fields, which lead to the appearance of
|
| 185 |
+
jet functions. The latter are, technically speaking, matching coefficients of SCET on the pure
|
| 186 |
+
soft effective field theory. Kinematics forbids the emission of anti-hardcollinear partons. Thus
|
| 187 |
+
anti-hardcollinear fields have to be integrated out at the amplitude level. The physics in the
|
| 188 |
+
anti-hardcollinear direction is similar to the threshold Drell-Yan expansion, where kinematical
|
| 189 |
+
constraints forbid hardcollinear emissions into the final state. For more details on SCET NLP
|
| 190 |
+
factorisation and resummation in the threshold Drell-Yan, see Refs. [13,14,20,38]. In the hard-
|
| 191 |
+
collinear sector, the formalism resembles, for example, the thrust factorisation, where NLP jet
|
| 192 |
+
functions are defined at the cross-section level [15,39–42].
|
| 193 |
+
2.1
|
| 194 |
+
Hard matching
|
| 195 |
+
The electroweak operator O8 matches onto two possible SCET operators. First, we consider the
|
| 196 |
+
A-type current, which enters the resolved contribution. Within the present section, the SCET
|
| 197 |
+
operators are always given before the soft decoupling transformation [32] is performed.
|
| 198 |
+
The
|
| 199 |
+
A-type SCET operator is given by
|
| 200 |
+
OA0
|
| 201 |
+
8g (0) = χhc (0) /n
|
| 202 |
+
2γµ⊥Aµ
|
| 203 |
+
hc⊥ (0) (1 + γ5) h (0) ,
|
| 204 |
+
(5)
|
| 205 |
+
where h is the heavy quark field, and the SCET building blocks are hardcollinear gauge-invariant
|
| 206 |
+
due to the introduction of hardcollinear Wilson lines W. The fermionic building block is χhc =
|
| 207 |
+
W †
|
| 208 |
+
hcξ and gluon field is
|
| 209 |
+
Aµ
|
| 210 |
+
hc⊥ = W †
|
| 211 |
+
hc [Dµ
|
| 212 |
+
hc⊥Whc] = Aaµ
|
| 213 |
+
hc⊥ta.
|
| 214 |
+
(6)
|
| 215 |
+
Note that the colour and Dirac structure for the A-type operator is uniquely fixed.
|
| 216 |
+
For the
|
| 217 |
+
matching, we can use the partonic QCD amplitude b (pb) → s (ps) g (r), where the momenta pb is
|
| 218 |
+
hard, ps anti-hardcollinear and r hardcollinear. The matching condition is given by
|
| 219 |
+
GF
|
| 220 |
+
√
|
| 221 |
+
2λt C8g ⟨Q8g⟩ = CA0 (mb)
|
| 222 |
+
�
|
| 223 |
+
OA0
|
| 224 |
+
8g
|
| 225 |
+
�
|
| 226 |
+
.
|
| 227 |
+
(7)
|
| 228 |
+
The brackets ⟨ ⟩ indicate that the matrix element of the operators is considered. At leading order
|
| 229 |
+
in αs we find
|
| 230 |
+
CA0
|
| 231 |
+
LO (mb) = m2
|
| 232 |
+
b
|
| 233 |
+
4π2
|
| 234 |
+
GF
|
| 235 |
+
√
|
| 236 |
+
2λqC8g .
|
| 237 |
+
5
|
| 238 |
+
|
| 239 |
+
The B-type current which enters the direct contribution is the following SCET operator:2
|
| 240 |
+
OB1
|
| 241 |
+
8g (u) =
|
| 242 |
+
�
|
| 243 |
+
dt
|
| 244 |
+
2πe−iumbtχhc (t¯n) γν⊥ Qs Bν
|
| 245 |
+
hc⊥ (0) γµ⊥ Aµ
|
| 246 |
+
hc⊥ (0) (1 + γ5) h (0) ,
|
| 247 |
+
(8)
|
| 248 |
+
with Qs as the electric charge of the strange quark in units of e and the electromagnetic gauge-
|
| 249 |
+
invariant transverse photon field
|
| 250 |
+
Bν
|
| 251 |
+
hc⊥ = e
|
| 252 |
+
�
|
| 253 |
+
Aν
|
| 254 |
+
⊥ − ∂ν
|
| 255 |
+
⊥
|
| 256 |
+
n∂ nA
|
| 257 |
+
�
|
| 258 |
+
.
|
| 259 |
+
(9)
|
| 260 |
+
We note that beyond the LO, a second operator with an alternative Dirac structure γµγν appears.
|
| 261 |
+
These operators do not mix under renormalisation [43]. We checked by explicit computation at
|
| 262 |
+
the one-loop order that the matching coefficient for the operator with γµγν structure does not
|
| 263 |
+
develop any endpoint divergence.
|
| 264 |
+
We use the partonic QCD amplitude b (pb) → g (r) s (ps) γ (q) to fix the matching coefficient.
|
| 265 |
+
Here the momenta are pb hard, r and ps hardcollinear and q anti-hardcollinear. On the QCD
|
| 266 |
+
side, a time-ordered product of the operator O8 and of the QED current,
|
| 267 |
+
LQED,q (x) = eq Aµ (x) q (x) γµq (x) ,
|
| 268 |
+
(10)
|
| 269 |
+
is needed. The matching condition at the leading order in QED is given by
|
| 270 |
+
GF
|
| 271 |
+
√
|
| 272 |
+
2λtC8g i
|
| 273 |
+
�
|
| 274 |
+
d4x ⟨T [O8g (0) , LQED,b (x) + LQED,s (x)] ⟩ =
|
| 275 |
+
� 1
|
| 276 |
+
0
|
| 277 |
+
duCB1 (mb, u)
|
| 278 |
+
�
|
| 279 |
+
OB1
|
| 280 |
+
8g (u)
|
| 281 |
+
�
|
| 282 |
+
.
|
| 283 |
+
(11)
|
| 284 |
+
We do not consider QED corrections. At leading order in αs, we find that only the QED current
|
| 285 |
+
with an s quark contributes, and we arrive at
|
| 286 |
+
CB1
|
| 287 |
+
LO (mb, u) = (−1)u
|
| 288 |
+
u
|
| 289 |
+
m2
|
| 290 |
+
b
|
| 291 |
+
4π2
|
| 292 |
+
GF
|
| 293 |
+
√
|
| 294 |
+
2λt C8g = (−1)u
|
| 295 |
+
uCA0
|
| 296 |
+
LO (mb) ,
|
| 297 |
+
(12)
|
| 298 |
+
where we use hardcollinear momentum conservation ¯ns + ¯nr = mb and introduce hardcollinear
|
| 299 |
+
momentum fraction u = ¯nps
|
| 300 |
+
mb and u = 1 − u.
|
| 301 |
+
Finally, we compare the different kinematics of the A- and B-type currents in Figure 1. The
|
| 302 |
+
external s-quark carries hardcollinear momentum. Therefore the intermediate propagator is hard.
|
| 303 |
+
This situation is represented in SCET by the B-type current. When the momentum of the external
|
| 304 |
+
s-quark tends to zero, the propagator becomes anti-hardcollinear and cannot be integrated out –
|
| 305 |
+
it must be reproduced by a dynamical field in the low energy EFT. This situation is represented
|
| 306 |
+
in SCET by the time-order product of subleading Lagrangian and the A-type current.
|
| 307 |
+
The
|
| 308 |
+
degeneracy in the EFT description is the reason why the SCET develops divergencies in the
|
| 309 |
+
convolution integrals.
|
| 310 |
+
2Note that this operator is equal to J2 (τ) in Ref. [43] (eq. 16), with J2 (τ) = 2mbOB1
|
| 311 |
+
8g (τ).
|
| 312 |
+
6
|
| 313 |
+
|
| 314 |
+
<latexit sha1_base64="Hx/r8
|
| 315 |
+
GtOrCEGLJO0ZHaQF1Z9vU=">AOBHicrVdbc9tEFHZLgGItPDIi
|
| 316 |
+
4YkQ0u3RpLtOHnwTJu205bJNGlLmzJR8KzktaXJ6pLVyq3Z2Vce+S
|
| 317 |
+
W8AY/0iT/Bv+GsLra8crnMoLGd1Tnf+c5lzx4pbkKDlJvmn5cuv7Px
|
| 318 |
+
7nvX/mg/eFHmx9/cvXapy/SOGMe7FNGYvXZwSGkTkOQ84JS8TR
|
| 319 |
+
nDoUnLint9V+pMZYWkQR9/yeULOQjyNgkngYQ6i0bWNLx2XTINITM
|
| 320 |
+
LJKBEigmZR1OGE1+2DWOpzEVfyevWwEQD8wboQAtySiZcBYKuiw
|
| 321 |
+
5ULM40RwC/Eu4iDdWaCxS6jYdjw/GN3dlmDYVF6MUtDwbqGpKYTjY
|
| 322 |
+
WrckSPhJIQlhicBF1vSaOeomRgTL2ad1McJGXoB8yhBhQgyo2Q8hNB
|
| 323 |
+
LSPADGXa5H3jnUswghn9JQMKEz+scezkHygMcbh+N9rYR7YyHJrCq
|
| 324 |
+
+AtW0Dgh5j5ELw7l9+K6dUPl8DowLmSJR/Zs2V4dv/4Cj8P5x0l1
|
| 325 |
+
vLgqnPoe4o7qJYOb/IMDs38C3oRtqu7ZdbrASCZ/g2RxEqlWHFq
|
| 326 |
+
dvtKhRZWg7VgImqUjouZ8L089DQYk2HudWmvtg3lqSd+zOocFKsF
|
| 327 |
+
ygbfNhoVoZQ9d4UhyG+sdwLtSxUW5UJ6n23ZnSrCQr4dNRHkbeaI
|
| 328 |
+
WTHLKayQwqoTo5YXGCp5jHrL2SVAXu7Fb5+V+v+N/OVSkRQRGYte
|
| 329 |
+
DSBdB2HI9s50XJK56oapE5c17Sx3NjmogVGyvQ6Jx7ai3q/t8Loyub
|
| 330 |
+
pkdM7+M5sIqF1ut8joeXbvyhzOvSwkEfcoTtNTy0z4mcCMB9B5QJ
|
| 331 |
+
+lJMHeOZ6SU1hGOCTpmchHmjR2QDI2JjGDb8SNXFq3EDhM03noAlJ1
|
| 332 |
+
fKrlHCd7jTjk70zEURJBjXwCkeTjBo8NtR8NMYBIx6nc1hgjwUQq
|
| 333 |
+
+H5mGPwxRd8ZJCUj4ZyzZcTkReTH0FVTMwTSV6jfx8SiVmu7tKpI
|
| 334 |
+
oHfwGNI40XczGUhTz70iulE6EGeUBi19JLQrA3gG+ah7ckbKhf1zT
|
| 335 |
+
P16jP6rpldtVwFECIT3RzY6SR5qVrq7rv2mw3j+JYhauBAZn9R6hH
|
| 336 |
+
BsHxtCwGhZhdv9E4bPRidQ1bqFwdRtMn719i+j9hc7h5DUXJNTOIQ
|
| 337 |
+
n7JO792SxGldAJVp1ZTjx4al1JmrjZgtSUE3jMkE7vPWFmMYoVNG
|
| 338 |
+
SCQFm0LUcLKQCeMC/som0qUZPKmfPjiQwuoi9bH6GgzI5guHiq/Un
|
| 339 |
+
Pr3QO2Bzk0Z9u3UP7RyLwaxO71kd3rIru7p6MOlmGZEBJ8m0yHav7
|
| 340 |
+
UgLbVA6oBsvu2Dn0Kh6tMch8qgSxTr0XBtsTZfSCzbUW4JgNV3Cq43
|
| 341 |
+
V20t56tDvwbviOGo+kiCdtCgx7q9dYyrkL7UD5LfRvujzOW0Aq30
|
| 342 |
+
XdPrJsfV8LyhWo3bMgQnNdCb8jlMJoqFzbakdQ0/OjZ8+eapsHsEj
|
| 343 |
+
HYWrtYK1O4BK7gNSd3z8sIKYUL0B6tr6CXQpzC+pjkZ+dAqzQpifk
|
| 344 |
+
FV03s0auOjwJjY/HA1ilVwTGxdbo6FL6Ro8vD3D4wzrBpV4jYU3x5
|
| 345 |
+
EOz2XrsyQNcDkVmujlyNAsarNkvdW6Ci3HStOGwQHT4EpUIFehsPEa
|
| 346 |
+
UrXCukKmaMsVeXvNBQhMlQkSjm1JW96G6v7W4n7lCzHT2KFSP0
|
| 347 |
+
vIBLSIJeA2QaICbymHtqar+CwoTEMJ7j6W/5TQXL+yOtdvpPult3T4
|
| 348 |
+
o34CutD5vfdG63rJag9bt1sPWcet5y9v4aePXjd83mz+uPnz5i+b
|
| 349 |
+
vxXQy5dKm89aK9fm78ADbYEJA=</latexit>
|
| 350 |
+
h/hc
|
| 351 |
+
b
|
| 352 |
+
�hc
|
| 353 |
+
O8
|
| 354 |
+
ghc
|
| 355 |
+
shc
|
| 356 |
+
Figure 1: The full theory LO diagram which induces an endpoint divergence in SCET, see text.
|
| 357 |
+
3
|
| 358 |
+
Bare factorisation theorem
|
| 359 |
+
The derivation of the factorisation theorem follows the standard approach. [44, 45].
|
| 360 |
+
We first
|
| 361 |
+
perform the soft decoupling transformation [32], but we do not use a new notation for the hard-
|
| 362 |
+
collinear fields after decoupling.
|
| 363 |
+
The decay rate is obtained from the imaginary part of the
|
| 364 |
+
current-current correlator. The states factorise and thus allow taking matrix elements separately
|
| 365 |
+
in hardcollinear, anti-hardcollinear and soft sectors.
|
| 366 |
+
The common to both A- and B-type contributions is the anticollinear matrix element of the
|
| 367 |
+
photon. It is given by a discontinuity of the photon propagator
|
| 368 |
+
−gµν
|
| 369 |
+
⊥ e2 Jγ
|
| 370 |
+
�
|
| 371 |
+
q2�
|
| 372 |
+
=
|
| 373 |
+
1
|
| 374 |
+
2πi Disc[ i
|
| 375 |
+
�
|
| 376 |
+
d4xeiqx ⟨0| T [Bµ
|
| 377 |
+
hc⊥ (x) , Bν
|
| 378 |
+
hc⊥ (0)] |0⟩ ]
|
| 379 |
+
(13)
|
| 380 |
+
= −gµν
|
| 381 |
+
⊥ e2 δ
|
| 382 |
+
�
|
| 383 |
+
q2�
|
| 384 |
+
θ
|
| 385 |
+
�
|
| 386 |
+
q0�
|
| 387 |
+
= −gµν
|
| 388 |
+
⊥ e2 δ+ �
|
| 389 |
+
p2�
|
| 390 |
+
(14)
|
| 391 |
+
Since we are only interested in the photon-final state, the above expression is exact to all orders
|
| 392 |
+
in perturbation theory.
|
| 393 |
+
3.1
|
| 394 |
+
B-type current (direct) contribution
|
| 395 |
+
There are several functions entering the factorisation formula of the direct contribution with the
|
| 396 |
+
B-type current. The soft function – the leading power shape function – is defined as
|
| 397 |
+
S (ω) =
|
| 398 |
+
1
|
| 399 |
+
2mB
|
| 400 |
+
�
|
| 401 |
+
dt
|
| 402 |
+
2πe−iωt ⟨B| h (tn) Sn (tn) S†
|
| 403 |
+
n (0) h (0) |B⟩ ,
|
| 404 |
+
(15)
|
| 405 |
+
or with open indices [46,47]3
|
| 406 |
+
1
|
| 407 |
+
2mB
|
| 408 |
+
�
|
| 409 |
+
dt
|
| 410 |
+
2πe−iωt ⟨B| [hα (tn) Sn (tn)]i
|
| 411 |
+
�
|
| 412 |
+
S†
|
| 413 |
+
n (0) hβ (0)
|
| 414 |
+
�
|
| 415 |
+
j |B⟩ = δij
|
| 416 |
+
2 Nc
|
| 417 |
+
�1 + /v
|
| 418 |
+
2
|
| 419 |
+
�
|
| 420 |
+
βα
|
| 421 |
+
S (ω) .
|
| 422 |
+
(16)
|
| 423 |
+
3We use Greek for spinor indices and Latin for colour indices.
|
| 424 |
+
7
|
| 425 |
+
|
| 426 |
+
The hardcollinear jet function is a genuine NLP object. In analogy to the LP jet function, we
|
| 427 |
+
define it as a vacuum matrix element of a product of hardcollinear fields
|
| 428 |
+
J
|
| 429 |
+
�
|
| 430 |
+
p2, u, u′�
|
| 431 |
+
= (−1)
|
| 432 |
+
2Nc
|
| 433 |
+
1
|
| 434 |
+
2π
|
| 435 |
+
�
|
| 436 |
+
dtdt′
|
| 437 |
+
(2π)2 d4x e−imb(ut−u′t′)+ipx
|
| 438 |
+
(17)
|
| 439 |
+
Disc
|
| 440 |
+
�
|
| 441 |
+
⟨0| tr
|
| 442 |
+
�1 + /v
|
| 443 |
+
2
|
| 444 |
+
(1 − γ5) /Ahc⊥ (x) γν
|
| 445 |
+
⊥χhc (t′¯n + x) χhc (t¯n) γν⊥ /Ahc⊥ (0) (1 + γ5)
|
| 446 |
+
�
|
| 447 |
+
|0]⟩
|
| 448 |
+
�
|
| 449 |
+
.
|
| 450 |
+
The field operators are time- or anti-time-ordered according to the Keldysh formalism.4
|
| 451 |
+
The
|
| 452 |
+
trace is taken both with respect to colour and spinor spaces. Using projection properties of the
|
| 453 |
+
hardcollinear fields and 2/v = /n+ + /n− the Dirac algebra in eq.(17) can be simplified to
|
| 454 |
+
J
|
| 455 |
+
�
|
| 456 |
+
p2, u, u′�
|
| 457 |
+
= (−1)
|
| 458 |
+
2Nc
|
| 459 |
+
1
|
| 460 |
+
2π
|
| 461 |
+
�
|
| 462 |
+
dtdt′
|
| 463 |
+
(2π)2 d4x e−imb(ut−u′t′)+ipx (d − 2)2
|
| 464 |
+
(18)
|
| 465 |
+
Disc
|
| 466 |
+
�
|
| 467 |
+
⟨0| tr
|
| 468 |
+
�/¯n
|
| 469 |
+
4(1 − γ5)Aµ
|
| 470 |
+
hc⊥ (x) χhc (t′¯n + x) χhc (t¯n) Ahc⊥
|
| 471 |
+
µ
|
| 472 |
+
(0) (1 + γ5)
|
| 473 |
+
�
|
| 474 |
+
|0⟩
|
| 475 |
+
�
|
| 476 |
+
where, as mentioned before, the trace is also applied in the colour space.
|
| 477 |
+
With these definitions, we find the bare factorisation theorem for the direct contribution
|
| 478 |
+
dΓ
|
| 479 |
+
dEγ
|
| 480 |
+
= NB
|
| 481 |
+
� 1
|
| 482 |
+
0
|
| 483 |
+
duCB1 (mb, u)
|
| 484 |
+
� 1
|
| 485 |
+
0
|
| 486 |
+
du′CB1∗ (mb, u′)
|
| 487 |
+
� Λ
|
| 488 |
+
−p+
|
| 489 |
+
dωJ (MB (p+ + ω) , u, u′) S (ω)
|
| 490 |
+
(19)
|
| 491 |
+
with the prefactor
|
| 492 |
+
NB = [(2π)] [e2Q2
|
| 493 |
+
s] [
|
| 494 |
+
1
|
| 495 |
+
(2π)3 2 Eγ
|
| 496 |
+
E2
|
| 497 |
+
γ 4π] = e2Q2
|
| 498 |
+
s
|
| 499 |
+
Eγ
|
| 500 |
+
2π
|
| 501 |
+
(20)
|
| 502 |
+
The three pieces of the prefactor correspond to the phase space factors of the photon, to its
|
| 503 |
+
charges and to the redefinition of the jet function with a 2π factor.
|
| 504 |
+
Finally, we prove to all orders in αs that the jet-function is symmetric in u and u′ up to
|
| 505 |
+
complex conjugation:
|
| 506 |
+
J(p2, u, u′) = J∗(p2, u′, u).
|
| 507 |
+
(21)
|
| 508 |
+
This can be read off from the factorisation theorem of the direct contribution. The photon energy
|
| 509 |
+
spectrum is real. The leading power shape function is also real to all orders. This can be shown
|
| 510 |
+
by complex conjugation of Eq.(15) and by using translation invariance [4]. Then the jet function
|
| 511 |
+
inherits the symmetry property given in Eq.(21), from the product of the Wilson coefficients,
|
| 512 |
+
CB1 (mb, u) CB1∗ (mb, u′), in the convolution integral. An anti-symmetric part of the jet function
|
| 513 |
+
would cancel out in the convolution integral. We emphasise that this property is also valid when
|
| 514 |
+
the other B-type operator with the reversed Dirac structure is present. In particular, the sum of
|
| 515 |
+
the two mixed terms has this property. In the latter terms, the reduction of the Dirac structure
|
| 516 |
+
leads to (4 − d) (d − 2), and hence these terms vanish for d = 4.
|
| 517 |
+
The symmetry property is crucial for the refactorisation because it implies that no double
|
| 518 |
+
subtraction regarding the variables u and u′ is needed in the B-type (direct) current contribution.
|
| 519 |
+
This can be seen in the following way. We showed above that the integrand of the convolution
|
| 520 |
+
integral of the Wilson coefficients and the jet function in the two variables u and ¯u is real, so the
|
| 521 |
+
4For a brief summary, see appendix of Ref. [48].
|
| 522 |
+
8
|
| 523 |
+
|
| 524 |
+
complete integrand is symmetric in u and u′. Then the subsequent rearrangement is possible (we
|
| 525 |
+
here only write the convolution variables u and u′):
|
| 526 |
+
� 1
|
| 527 |
+
0
|
| 528 |
+
duCB1 (u)
|
| 529 |
+
� 1
|
| 530 |
+
0
|
| 531 |
+
du′CB1∗ (u′) J (u, u′) = 2
|
| 532 |
+
� 1
|
| 533 |
+
0
|
| 534 |
+
duCB1 (u)
|
| 535 |
+
� 1
|
| 536 |
+
u
|
| 537 |
+
du′CB1∗ (u′) J (u, u′) .
|
| 538 |
+
(22)
|
| 539 |
+
As the endpoint divergence manifests for small u and u′, we need to ensure that only the last
|
| 540 |
+
integral over u is rendered finite by an appropriate subtraction.
|
| 541 |
+
At the leading order, the jet function is real, and we find that the jet function is symmetric
|
| 542 |
+
in u and u′. Explicitly, we find using the dimensional MS regulator (µ2ϵ → µ2ϵ exp(γEϵ)/(4π)ϵ):
|
| 543 |
+
J
|
| 544 |
+
�
|
| 545 |
+
p2, u, u′�
|
| 546 |
+
= CF
|
| 547 |
+
αs
|
| 548 |
+
4π mb
|
| 549 |
+
θ(p2) A(ϵ) δ(u − u′)u1−ϵ(1 − u)−ϵ
|
| 550 |
+
�p2
|
| 551 |
+
µ2
|
| 552 |
+
�−ϵ
|
| 553 |
+
,
|
| 554 |
+
(23)
|
| 555 |
+
with
|
| 556 |
+
A(ϵ) = (2 − 2ϵ)2 (1 − 1/2 ϵ) Γ(1 − ϵ)−1 exp(γEϵ) = 4 − 10ϵ + O(ϵ2) .
|
| 557 |
+
(24)
|
| 558 |
+
We compute the convolution integrals explicitly5 using this leading order result for the jet
|
| 559 |
+
function and also the hard function at leading order, Eq.(12),
|
| 560 |
+
dΓ
|
| 561 |
+
dEγ
|
| 562 |
+
|B = 2NB
|
| 563 |
+
��CA0
|
| 564 |
+
LO (mb)
|
| 565 |
+
��2 � 1
|
| 566 |
+
0
|
| 567 |
+
du ¯u
|
| 568 |
+
u
|
| 569 |
+
� 1
|
| 570 |
+
u
|
| 571 |
+
du′ ¯u′
|
| 572 |
+
u′
|
| 573 |
+
(25)
|
| 574 |
+
CFA(ϵ)
|
| 575 |
+
αs
|
| 576 |
+
(4π) mb
|
| 577 |
+
� Λ
|
| 578 |
+
−p+
|
| 579 |
+
dω S (ω)
|
| 580 |
+
�mb(p+ + ω)
|
| 581 |
+
µ2
|
| 582 |
+
�−ϵ
|
| 583 |
+
u1−ϵ(1 − u)−ϵδ(u − u′)
|
| 584 |
+
= NB
|
| 585 |
+
��CA0
|
| 586 |
+
LO (mb)
|
| 587 |
+
��2 CF
|
| 588 |
+
αs
|
| 589 |
+
(4π) mb
|
| 590 |
+
� Λ
|
| 591 |
+
−p+
|
| 592 |
+
dω S(ω) A(ϵ)B(3 − ϵ, −ϵ)
|
| 593 |
+
�mb(ω + p+)
|
| 594 |
+
µ2
|
| 595 |
+
�−ϵ
|
| 596 |
+
,
|
| 597 |
+
where B(x, y) denotes the Beta function. We see that the divergence in the direct contribution
|
| 598 |
+
is now identified as an endpoint point divergence in the convolution integral of the hard and the
|
| 599 |
+
jet function in the u integration for u ≪ 1.
|
| 600 |
+
We emphasise that this endpoint divergence can be regularised within the dimensional regu-
|
| 601 |
+
larisation scheme6. This leads to additional poles after performing the convolution. Consequently,
|
| 602 |
+
due to endpoint divergences, the bare factorisation formula is already invalid for the d → 4 limit
|
| 603 |
+
at the leading order.
|
| 604 |
+
5Symmetry of the original integral implies that
|
| 605 |
+
� 1
|
| 606 |
+
u du′δ(u − u′) = θ(0) with θ(0) = 1/2, for u ∈ [0, 1].
|
| 607 |
+
6We note that we do not confirm the leading order result of the direct contribution of Ref. [4] in the dimensional
|
| 608 |
+
regularisation scheme. In the notation of Ref. [4] we get
|
| 609 |
+
F (a)
|
| 610 |
+
88 (Eγ, µ) = CF αs(µ)
|
| 611 |
+
4π
|
| 612 |
+
� mb
|
| 613 |
+
2Eγ
|
| 614 |
+
�2 � ¯Λ
|
| 615 |
+
−p+
|
| 616 |
+
dω
|
| 617 |
+
�2
|
| 618 |
+
9 ln mb(ω + p+)
|
| 619 |
+
µ2
|
| 620 |
+
+ 2
|
| 621 |
+
9
|
| 622 |
+
�
|
| 623 |
+
S(ω, µ) .
|
| 624 |
+
9
|
| 625 |
+
|
| 626 |
+
3.2
|
| 627 |
+
A-type (resolved) contribution
|
| 628 |
+
For the resolved contribution with the A-type current, we start with the time-ordered product
|
| 629 |
+
OTξq = i
|
| 630 |
+
�
|
| 631 |
+
ddxT
|
| 632 |
+
�
|
| 633 |
+
Lξq (x) , OA0
|
| 634 |
+
8g (0)
|
| 635 |
+
�
|
| 636 |
+
= i
|
| 637 |
+
�
|
| 638 |
+
ddxT
|
| 639 |
+
�
|
| 640 |
+
qs (x+) Sn(x+)
|
| 641 |
+
�
|
| 642 |
+
Qs /Bhc⊥ + /Ahc⊥
|
| 643 |
+
�
|
| 644 |
+
(x) χhc (x) ,
|
| 645 |
+
χhc (0) S†
|
| 646 |
+
n(0)Sn(0)/n
|
| 647 |
+
2 /Ahc⊥(0) (1 + γ5) S†
|
| 648 |
+
n(0)h (0)
|
| 649 |
+
�
|
| 650 |
+
.
|
| 651 |
+
(26)
|
| 652 |
+
The operator in the hardcollinear sector contains only gluon fields. Hence the standard leading
|
| 653 |
+
power gluon jet function appears
|
| 654 |
+
−g2
|
| 655 |
+
sδabgµν
|
| 656 |
+
⊥ Jg
|
| 657 |
+
�
|
| 658 |
+
p2�
|
| 659 |
+
=
|
| 660 |
+
1
|
| 661 |
+
2πi Disc
|
| 662 |
+
�
|
| 663 |
+
i
|
| 664 |
+
�
|
| 665 |
+
d4xeipx ⟨0| T
|
| 666 |
+
�
|
| 667 |
+
Aaµ
|
| 668 |
+
hc⊥ (x) , Abν
|
| 669 |
+
hc⊥ (0)
|
| 670 |
+
�
|
| 671 |
+
|0⟩
|
| 672 |
+
�
|
| 673 |
+
.
|
| 674 |
+
(27)
|
| 675 |
+
At leading order we find the standard result Jg (p2) = δ+ (p2).
|
| 676 |
+
Besides photons, there are no energetic particles emitted in the anti-hardcollinear directions.
|
| 677 |
+
Thus, the anti-hardcollinear jet function is defined at the amplitude level:
|
| 678 |
+
OTξq =
|
| 679 |
+
�
|
| 680 |
+
dω
|
| 681 |
+
�
|
| 682 |
+
dt
|
| 683 |
+
2πe−itω [qs]α (tn)
|
| 684 |
+
�
|
| 685 |
+
J (ω)
|
| 686 |
+
�a νµ
|
| 687 |
+
αβ
|
| 688 |
+
Qs Bν
|
| 689 |
+
hc⊥ (0) Aµ
|
| 690 |
+
hc⊥ (0) [h (0)]β .
|
| 691 |
+
(28)
|
| 692 |
+
The anti-hardcollinear jet function can be decomposed as
|
| 693 |
+
�
|
| 694 |
+
J (ω)
|
| 695 |
+
�a νµ
|
| 696 |
+
αβ = J (ω) ta
|
| 697 |
+
�
|
| 698 |
+
γν
|
| 699 |
+
⊥γµ
|
| 700 |
+
⊥
|
| 701 |
+
/¯n/n
|
| 702 |
+
4
|
| 703 |
+
�
|
| 704 |
+
αβ
|
| 705 |
+
,
|
| 706 |
+
(29)
|
| 707 |
+
to all orders. The other structure γµ
|
| 708 |
+
⊥γν
|
| 709 |
+
⊥ does not appear as one can read off from the structure of
|
| 710 |
+
the T product in eq. (26) and the fact that the gluon and heavy quark fields are only spectators.
|
| 711 |
+
The Dirac structure can then be simplified at the level of the cross-section with the help of the
|
| 712 |
+
following relation:
|
| 713 |
+
�
|
| 714 |
+
γν
|
| 715 |
+
⊥γµ
|
| 716 |
+
⊥
|
| 717 |
+
/¯n/n
|
| 718 |
+
4
|
| 719 |
+
�
|
| 720 |
+
αβ
|
| 721 |
+
�
|
| 722 |
+
γµ
|
| 723 |
+
⊥γν
|
| 724 |
+
⊥
|
| 725 |
+
/n/¯n
|
| 726 |
+
4
|
| 727 |
+
�
|
| 728 |
+
α′β′
|
| 729 |
+
= (d − 2)2
|
| 730 |
+
�/¯n/n
|
| 731 |
+
4
|
| 732 |
+
�
|
| 733 |
+
αβ
|
| 734 |
+
�/n/¯n
|
| 735 |
+
4
|
| 736 |
+
�
|
| 737 |
+
α′β′
|
| 738 |
+
.
|
| 739 |
+
(30)
|
| 740 |
+
At leading order, the anti-hardcollinear jet function is given by
|
| 741 |
+
�
|
| 742 |
+
J (ω)
|
| 743 |
+
�a νµ
|
| 744 |
+
αβ =
|
| 745 |
+
ta
|
| 746 |
+
(ω + i ϵ)
|
| 747 |
+
�
|
| 748 |
+
γν
|
| 749 |
+
⊥γµ
|
| 750 |
+
⊥
|
| 751 |
+
/¯n/n
|
| 752 |
+
4
|
| 753 |
+
�
|
| 754 |
+
αβ
|
| 755 |
+
.
|
| 756 |
+
(31)
|
| 757 |
+
Having defined hardcollinear and anti-hardcollinear functions, we now focus on the soft sector.
|
| 758 |
+
The operatorial definition of the soft function in position space with open Dirac indices is
|
| 759 |
+
Sαβ,α′β′ (u, t, t′) =
|
| 760 |
+
= g2
|
| 761 |
+
s ⟨B|
|
| 762 |
+
�
|
| 763 |
+
h (un) (1 − γ5)
|
| 764 |
+
�
|
| 765 |
+
α′
|
| 766 |
+
�
|
| 767 |
+
Sn (un) taS†
|
| 768 |
+
n (un)
|
| 769 |
+
�
|
| 770 |
+
S¯n (un)
|
| 771 |
+
�
|
| 772 |
+
S†
|
| 773 |
+
¯n (t′¯n + un) qs (t′¯n + un)
|
| 774 |
+
�
|
| 775 |
+
β′
|
| 776 |
+
× [qs (t¯n) S¯n (t¯n)]α S†
|
| 777 |
+
¯n (0)
|
| 778 |
+
�
|
| 779 |
+
Sn (0) taS†
|
| 780 |
+
n (0)
|
| 781 |
+
�
|
| 782 |
+
[(1 + γ5)h (0)]�� |B⟩ / (2mB) .
|
| 783 |
+
(32)
|
| 784 |
+
10
|
| 785 |
+
|
| 786 |
+
We can now plug in all the objects into the matrix element squared, and we find the resolved
|
| 787 |
+
contribution
|
| 788 |
+
dΓ
|
| 789 |
+
dEγ
|
| 790 |
+
= NA
|
| 791 |
+
��CA0 (mb)
|
| 792 |
+
��2 � Λ
|
| 793 |
+
−p+
|
| 794 |
+
dωJg (mb (p+ + ω))
|
| 795 |
+
�
|
| 796 |
+
dω1
|
| 797 |
+
�
|
| 798 |
+
dω2J (ω1) J
|
| 799 |
+
∗ (ω2) S (ω, ω1, ω2) ,
|
| 800 |
+
(33)
|
| 801 |
+
with the prefactor
|
| 802 |
+
NA = NB ≡ N ,
|
| 803 |
+
(34)
|
| 804 |
+
and the scalar soft function obtained after contracting spinor indices according to
|
| 805 |
+
S (u, t, t′) = (d − 2)2g2
|
| 806 |
+
s ⟨B| h (un) (1 − γ5)
|
| 807 |
+
�
|
| 808 |
+
Sn (un) taS†
|
| 809 |
+
n (un)
|
| 810 |
+
�
|
| 811 |
+
S¯n (un) S†
|
| 812 |
+
¯n (t′¯n + un)
|
| 813 |
+
(35)
|
| 814 |
+
/n/¯n
|
| 815 |
+
4 qs (t′¯n + un) qs (t¯n) /¯n/n
|
| 816 |
+
4 S¯n (t¯n) S†
|
| 817 |
+
¯n (0)
|
| 818 |
+
�
|
| 819 |
+
Sn (0) taS†
|
| 820 |
+
n (0)
|
| 821 |
+
�
|
| 822 |
+
(1 + γ5) h (0) |B⟩ / (2mB) .
|
| 823 |
+
The soft function in momentum space, which appears in eq. (33), is obtained through the Fourier
|
| 824 |
+
transform of the position space expression according to
|
| 825 |
+
S (ω, ω1, ω2) =
|
| 826 |
+
� du
|
| 827 |
+
2πe−iuω
|
| 828 |
+
�
|
| 829 |
+
dt
|
| 830 |
+
2πe−itω1
|
| 831 |
+
� dt′
|
| 832 |
+
2πeit′ω2S (u, t, t′) .
|
| 833 |
+
(36)
|
| 834 |
+
As the NLP jet function in u and u′ variables, the soft function S (ω, ω1, ω2) is symmetric in
|
| 835 |
+
ω1 and ω2 up to complex conjugation:
|
| 836 |
+
S (ω, ω1, ω2) = S∗ (ω, ω2, ω2) .
|
| 837 |
+
(37)
|
| 838 |
+
This property stems from the fact that the gluon jet function is real to all orders. Thus, the
|
| 839 |
+
soft function inherits the symmetry property from the product of the anti-hardcollinear jet func-
|
| 840 |
+
tions, J (ω1) J
|
| 841 |
+
∗ (ω2) in the factorisation formula of the resolved contribution. Any anti-symmetric
|
| 842 |
+
part would cancel in the convolution integral. This symmetry property implies that within the
|
| 843 |
+
refactorisation, a double-subtraction regarding the variables ω1 and ω2 in the A-type current
|
| 844 |
+
contribution is not needed either. The symmetry implies that the integrand in the convolution
|
| 845 |
+
integral between anti-hardcollinear jet functions and soft function in the two variables ω1 and ω2
|
| 846 |
+
is real and symmetric and allows for the following rearrangement of the convolution integral
|
| 847 |
+
� ∞
|
| 848 |
+
−∞
|
| 849 |
+
dω1
|
| 850 |
+
� ∞
|
| 851 |
+
−∞
|
| 852 |
+
dω2J (ω1) J
|
| 853 |
+
∗ (ω2) S (ω1, ω2) = 2
|
| 854 |
+
� ∞
|
| 855 |
+
−∞
|
| 856 |
+
dω1
|
| 857 |
+
� ω1
|
| 858 |
+
−∞
|
| 859 |
+
dω2J (ω1) J
|
| 860 |
+
∗ (ω2) S (ω1, ω2) ,
|
| 861 |
+
(38)
|
| 862 |
+
which is motivated by the fact in the resolved contribution. As we will see explicitly in section 4.1,
|
| 863 |
+
the convolution integral of the jet and shape function is logarithmically divergent for ω1,2 → ∞.
|
| 864 |
+
At leading order, we find the factorisation formula in case of the A-type current (resolved)
|
| 865 |
+
contribution:7
|
| 866 |
+
dΓ
|
| 867 |
+
dEγ
|
| 868 |
+
= 2N
|
| 869 |
+
��CA0
|
| 870 |
+
LO (mb)
|
| 871 |
+
��2 � Λ
|
| 872 |
+
−p+
|
| 873 |
+
dωδ (mb (p+ + ω))
|
| 874 |
+
� ∞
|
| 875 |
+
−∞
|
| 876 |
+
dω1
|
| 877 |
+
� ω1
|
| 878 |
+
−∞
|
| 879 |
+
dω2
|
| 880 |
+
1
|
| 881 |
+
(ω1 − iϵ)
|
| 882 |
+
1
|
| 883 |
+
(ω2 + iϵ) S (ω, ω1, ω2) .
|
| 884 |
+
(39)
|
| 885 |
+
We keep the soft function unevaluated at this point since this is a nonperturbative object. For
|
| 886 |
+
ω1,2 ≫ ω, the soft function can be shown to be asymptotically constant, which leads to endpoint
|
| 887 |
+
divergence in the convolution integrals for large ω1,2 (see section 4.1).
|
| 888 |
+
7This confirms the leading order result of the resolved contribution of Ref. [4] when the asymptotic limit of the
|
| 889 |
+
soft function is not yet considered.
|
| 890 |
+
11
|
| 891 |
+
|
| 892 |
+
Figure 2: Scales relevant to refactorisation of the endpoint divergent contribution. The left part of
|
| 893 |
+
the diagram represents the standard hierarchy of three scales for SCETI. Near the endpoint, when
|
| 894 |
+
the momentum fraction u is no longer u ∼ O(1), i.e. u ≪ 1, we introduce additional, unphysical
|
| 895 |
+
scales which make it possible to factorise further objects appearing in the bare factorisation
|
| 896 |
+
theorem.
|
| 897 |
+
4
|
| 898 |
+
Refactorisation of the endpoint contribution
|
| 899 |
+
We here state the three refactorisation relations, which are based on the fact that in the limits
|
| 900 |
+
u ∼ u′ ≪ 1 and ω1 ∼ ω2 ≫ ω the two terms of the subleading O8−O8 contribution have the same
|
| 901 |
+
structure. The refactorisation relations are operatorial relations that guarantee the cancellation
|
| 902 |
+
of endpoint divergences between the two terms to all orders in αs.
|
| 903 |
+
The refactorisation conditions result from the overlap between soft and hardcollinear modes.
|
| 904 |
+
The hierarchy of scales near the endpoint is shown in Fig. 2.
|
| 905 |
+
We will refer to these overlap
|
| 906 |
+
modes as softcollinear modes.
|
| 907 |
+
They play a similar role as the z-SCET modes introduced in
|
| 908 |
+
Ref. [24] to prove the refactorisation of the B1-type matching coefficients.
|
| 909 |
+
The parameter z
|
| 910 |
+
corresponds to the momentum fraction u in the present analysis. On the one hand, we can think
|
| 911 |
+
of the softcollinear mode as a limit of hardcollinear mode when the large momentum fraction
|
| 912 |
+
tends to zero8.
|
| 913 |
+
On the other hand, the softcollinear modes can be understood as a limit of
|
| 914 |
+
the soft modes when the n+k momentum component becomes much larger than the remaining
|
| 915 |
+
components, mb ≫ n+k ≫ λ2mb. We want to emphasise that softcollinear and u-hardcollinear
|
| 916 |
+
modes are not physical but help introduce refactorisation. The softcollinear fields obey the same
|
| 917 |
+
projection properties and have the same transformation properties regarding gauge invariance as
|
| 918 |
+
their hardcollinear counterparts.
|
| 919 |
+
• Following Refs. [22–24], we find that in the limit u → 0, the matching coefficient can be
|
| 920 |
+
8Thus, they do not appear in the leading power problems, where only operators with a single hardcollinear
|
| 921 |
+
field in each direction occur.
|
| 922 |
+
12
|
| 923 |
+
|
| 924 |
+
2
|
| 925 |
+
hard
|
| 926 |
+
B1
|
| 927 |
+
CAO 7
|
| 928 |
+
umb
|
| 929 |
+
u-hardcollinear
|
| 930 |
+
hardcollinear
|
| 931 |
+
J&S→J,3
|
| 932 |
+
softcollinear
|
| 933 |
+
S↑
|
| 934 |
+
softfurther factorised
|
| 935 |
+
�
|
| 936 |
+
CB1 (mb, u)
|
| 937 |
+
�
|
| 938 |
+
= (−1)CA0 (mb) mbJ (umb) ,
|
| 939 |
+
(40)
|
| 940 |
+
where �g(u)� only denotes the leading term of a function g(u) in the limit u → 0 and
|
| 941 |
+
without any higher power corrections in u ≪ 1. The function J (umb), which appears here,
|
| 942 |
+
is exactly the same radiative jet function (29) we introduced before in the context of A-type
|
| 943 |
+
contribution.
|
| 944 |
+
This refactorisation condition stems from the fact that in the limit u → 0, the amplitude
|
| 945 |
+
used in the matching of the B-type current can be represented by a time-ordered product
|
| 946 |
+
[24],
|
| 947 |
+
CB1 (mb, u)
|
| 948 |
+
�
|
| 949 |
+
OB1
|
| 950 |
+
8g (u)
|
| 951 |
+
� ���
|
| 952 |
+
u→0 = CA0 (mb) i
|
| 953 |
+
�
|
| 954 |
+
ddxe−i (nx/2) umb
|
| 955 |
+
�
|
| 956 |
+
T
|
| 957 |
+
�
|
| 958 |
+
L(1)
|
| 959 |
+
ξqsc (x) , OA0−u
|
| 960 |
+
8g
|
| 961 |
+
(0)
|
| 962 |
+
��
|
| 963 |
+
,
|
| 964 |
+
(41)
|
| 965 |
+
of the leading power current OA0−u
|
| 966 |
+
8g
|
| 967 |
+
(0) = χu−hc(0) S†
|
| 968 |
+
n(0) Sn(0) /n
|
| 969 |
+
2 /Au−hc⊥(0) (1 + γ5) S†
|
| 970 |
+
n(0) h(0) ,
|
| 971 |
+
equal to (5) up to a replacement of the hardcollinear fields by the u-hardcollinear fields, and
|
| 972 |
+
subleading Lagrangian
|
| 973 |
+
L(1)
|
| 974 |
+
ξqsc (x) = qsc(x+)S†
|
| 975 |
+
n(0) Sn(0)
|
| 976 |
+
�
|
| 977 |
+
Qs /Bu−hc⊥ + /Au−hc⊥
|
| 978 |
+
�
|
| 979 |
+
χu−hc(x) + h.c.
|
| 980 |
+
(42)
|
| 981 |
+
The jet-function J (umb) appears after integrating out the u-anti-hardcollinear quark fields.
|
| 982 |
+
We note a close resemblance to the structure of the resolved contribution, where a similar
|
| 983 |
+
time-ordered product appears (see Eq. (26)).
|
| 984 |
+
• We find the new soft function �S (ω, ω1, ω2) which corresponds to the function S (ω, ω1, ω2) in
|
| 985 |
+
the limit ω1 ∼ ω2 ≫ ω. In this limit, we can consider the light soft quarks to be softcollinear
|
| 986 |
+
qs → qsc. In this function �S (ω, ω1, ω2) higher power corrections in ω/ω1,2 are neglected.
|
| 987 |
+
• In the limit, where the momentum fractions u → 0 and u′ → 0, the jet function
|
| 988 |
+
J (mb (p+ + ω) , u, u′) fulfills the following relation
|
| 989 |
+
� Λ
|
| 990 |
+
−p+
|
| 991 |
+
dω �J (mb (p+ + ω) , u, u′) S(ω)� =
|
| 992 |
+
� Λ
|
| 993 |
+
−p+
|
| 994 |
+
dωJg(mb(p+ + ω)) �S(ω, mbu, mbu′) ,
|
| 995 |
+
(43)
|
| 996 |
+
where the brackets indicate that the u → 0 and u′ → 0 limits have to be taken and that the
|
| 997 |
+
hardcollinear quark fields in J are regarded as softcollinear fields, χhc → qsc in accordance
|
| 998 |
+
with (41).
|
| 999 |
+
It is crucial that the soft function �S (ω, ω1, ω2) appears both in the A-type contribution in
|
| 1000 |
+
the limit ω1 ∼ ω2 ≫ ω and in the B-current term if one expands for small u and u′.
|
| 1001 |
+
Before we proceed, let us comment on the structure of �S. In the asymptotic regime, where
|
| 1002 |
+
ω1,2 ≫ ω, we can match the �S on the leading power shape function
|
| 1003 |
+
�S (ω, ω1, ω2) =
|
| 1004 |
+
�
|
| 1005 |
+
dω′K(ω, ω′, ω1, ω2)S(ω′) .
|
| 1006 |
+
(44)
|
| 1007 |
+
13
|
| 1008 |
+
|
| 1009 |
+
<latexit sha1_base64=
|
| 1010 |
+
"8NS72uabtAGARICdIYfKMVjgCLQ=">AONHicrV
|
| 1011 |
+
fNbtGEFZSt03Vuk3aYy9EbQNJsxFISrLsg4DYSZC
|
| 1012 |
+
kMGInaeIUlisqZVIePnj5UqJutjX6rGnvkSB3toe
|
| 1013 |
+
m2foLH8kcsm0KBDCFJYz38w3Mzs7pJ2Y+gk3zd+uX
|
| 1014 |
+
P1g48OPr72SfvTzY/+L6jS9fJtGcueSFG9GIvX
|
| 1015 |
+
JwQqgfkhfc5S8ihnBgUPJqXNxT+lPF4QlfhR+z5c
|
| 1016 |
+
xOQ/wLPSnvos5iMY3Nk5HDpn5oZgG06lPiRTsgxn
|
| 1017 |
+
DMebBvGWpmKvpU3rYGJBuYt0IEW5JRMufAt5HeRb
|
| 1018 |
+
8uVmEex4BbiXcRBurNCY4dQsT1yPX98b1uCYV15OU
|
| 1019 |
+
5Aw7uZpqQIxdT40COxSgmLDZcCbjIkY7RS3EhLgR
|
| 1020 |
+
6yQejsnQ9ZlLCcpEkBklkyEJYr7MRYn/ExlaNvd89
|
| 1021 |
+
wKlBMPtUYC5BxziSHG8Y1L+aO4ad2S24h2JkNTig
|
| 1022 |
+
XE+57IDsy1V5Vr5rUaRcZexJLj0f9ntlJmIL/gyh
|
| 1023 |
+
4HyTdRswf+Zx2CMUdVGkyC/nmF0Y+A50Lm2X9tbJ
|
| 1024 |
+
m0GJhEfwYok4CVXbDq1OX+nQqkrQoiwAzWrbHMyE5
|
| 1025 |
+
6ahJ/6EDFPWtb3aNpSmHnsRj8KMJFuvUDZw2GiRh1
|
| 1026 |
+
D06QwHAYb6R3CG1BFTNKrVKvzOg8d5bDZ+M0jLQ
|
| 1027 |
+
pM5IUs1kAZVQXR+zKMYzCPWriRVgDu9VX5l9u3U
|
| 1028 |
+
g4oz4zdiuxCAsGywEiKU8DsWzdzstSlT0Q1GNn
|
| 1029 |
+
NFz31FLs6OaCGVbPCLhpDQa2sVzOkfG17fMjpleRn
|
| 1030 |
+
1h5YutVn6djG9c+3U0idx5QELuUpwkZ5YZ83OBGfe
|
| 1031 |
+
h+8D9PCExdi/wjJzBMsQBSc5FOgKlsQOSiTGNGNwh
|
| 1032 |
+
N1Jp2ULgIEmWgQNI1fWJrlPCJt3ZnE/3zoUfxnOog
|
| 1033 |
+
ZsRTefU4JGh5qkx8RlxOV3CArvMh1gN18Muxymbo
|
| 1034 |
+
UlgaQ8MpFtuEYhe1G0FtQsRGmiVS/sYfHidR071a
|
| 1035 |
+
RWOng16dRqOkiNpEim5fHslI6Ecwp91n0WmpRAPYA
|
| 1036 |
+
/BUz4UDKmv5JSf+kQX9c0ivaKuA4hpCe6mbH8WPNS
|
| 1037 |
+
leX9d/VvD4DSMWVAKDI3CfUI6NQ2NoWDWLYP7gVO
|
| 1038 |
+
Hn41Opa5xM4eg2mD5/9xbRByvdiJM3XJBAT+MI3sh
|
| 1039 |
+
P792X2WpSAJWoSmWMoqMz61yURs4WpKCaZjQhU3hOW
|
| 1040 |
+
1tMYIzOGCGhFGwGUcPJQmZnF25T1pEOncOb/dnDQy
|
| 1041 |
+
msLlJ/Vl+DgbPlylcP5bfUaN374O1hCk297Vso/dO
|
| 1042 |
+
cuSWI3esju9dFdndPRx2uwzIhJLjrno7U/CkBbasH
|
| 1043 |
+
rgbI7ts69BkcrjzJfagEsky9Fpm3Nc7ugzPbVg4bM
|
| 1044 |
+
lDFLYLb3UV7zd7KwH/xd8xwOFslYVto0EO9XqPHKr
|
| 1045 |
+
QP5bPUXaM/mbOYFrj9Lur2kWXr+5q5rEDtngURmk0
|
| 1046 |
+
l/IFQCqOhoLbVjqA68+Pnz59pmwewQS0dhSu1grU7
|
| 1047 |
+
gEruA1InPnlUQEyo3gB1bf0EOhTml1RHIz06mVkmT
|
| 1048 |
+
E9IFZ12swbOryOTQ9HzbFKro6Nsq3R0Lm0AQ9f2/
|
| 1049 |
+
A6w7pBIW6wcJc41OGprDlLUgPnU6GOXo8MzaI0S5q
|
| 1050 |
+
tmiq0Hit1GwYHTIMrUYasQmHjNaRqhaZCJkmtLEVX
|
| 1051 |
+
536hoYxRGAsRjm9LWTwH6vnO6nhCLHQvYeBepXmL
|
| 1052 |
+
2gRSsBrgFgD3FaEpbeq+q8piEI3z2W/pVTX7y0O9
|
| 1053 |
+
Zup/u0t3X3MP8Cutb6uvVN62bLag1ad1uPWietFy1
|
| 1054 |
+
345eNPzf+3ni7+fPm75t/bP6VQa9eyW2+alWuzbf/
|
| 1055 |
+
AOWNFyQ=</latexit>
|
| 1056 |
+
hc
|
| 1057 |
+
b
|
| 1058 |
+
�hc
|
| 1059 |
+
L(1)
|
| 1060 |
+
⇠q
|
| 1061 |
+
A0
|
| 1062 |
+
ghc
|
| 1063 |
+
ssoft
|
| 1064 |
+
<latexit sha1_base64="ke1ahY2petCU6YEqZ2lA2p1ZoA=">AOBnicrVdbc9tEFHZLgBINPDIi
|
| 1065 |
+
4akMy3dGl3suHnwTJu205bJNGlLmzJR8KzktaXJ6tLVyq3Z2Xce+SW8AY/0gT/Bv+GsLra8coHOoLGd1Tnf+c5lzx4pXkrDjJvmXxcuvrfx/gcfXvpo8+NPtj797PL258+zJGc+eYnNGEvPJwRGsbkGQ85JS9SR
|
| 1066 |
+
nDkUXLind9R+pMZYVmYxN/xeUrOIjyNw0noYw6i0fbGNdcj0zAWk2gyCSmRYkLm8ZThNJCbhrFUFqKv5VrYKBeQ10oAU5JRMuQguFDgptuRDzJBXcQtxBHKRXFmjsESp2XT8IR3d2JRi2lS9HGWi4U2oaCuH6m
|
| 1067 |
+
Bq35Ui4KWGp4UvAJZY0AKhgMzEmfsK6WYBTMvRD5lOCShGkRsl4CLFXkPBHMnR4EPrnUswgiP9IQKUz5scl2QoCLE4e6BtYtodzw0gVUlULKCwo0wDyB8cSh/EFetayqJ16HxUlZ49O6erTp8+18cRf+HE2e5ty
|
| 1068 |
+
ycBhwKjxIHJcr5yxyzcwPfgHakm40N86odViIREDybI05i1YtDq9tXOrSoEvQdi0BTV9L1MBOBX4SehWMyLwu7dW2oSL1NEh4EpdOyvUCZYMPu/DRbL4pjiIM9U/gYKhzo9yoVlL9e2VK84qsgk9HRhFp5VOCs
|
| 1069 |
+
hqJjOohGrlCUpnmKeMC2rGt3dqxMvlkJYLcgUa1YhmCkdjOKbBGFXUWhM9tlFHUz1KWovflvKaTZVR2Eyv1STxuHPbN+r6YDKPLO2bXLC6jvbCqxU6nuo5H25f+dMeJn0ck5j7FWXZqmSk/E5jxEFoP6POMpN
|
| 1070 |
+
g/x1NyCsYRyQ7E8VQk8YVkIyNScLgG3OjkDYtBI6ybB5gFQtn+k6JVynO835OaZCOM0hxr4paNJTg2eGpCGuOQEZ/TOSywz0KI1fADzLDPY6ueMkgqYCM5SZcbkxe+Qk0FlTMxTST6jcN8CiTmu7tKpIqHfy
|
| 1071 |
+
GNIk1XcLGUpQT8EiulE5EOeUhS15JLQrA3ga+eiDclrKlf9TQP1qjP2roldtVwFEKIT3WzY7Sh5qVrm7qv2x3juJExatBAaH9S6hHBsHxtCwWhZRfu9E4fPRidQ1XqnwdBtMn759i+i9hc7l5DUXJNLTOIRn7OM
|
| 1072 |
+
7d2W5GtdAJVp1ZbjJ4al1JhrzZgdSUE3jskE7ovWFmOYoVNGSCwFm0LUcLKQCeMC/so20qM5PKuf3D+QwnKQ+lh9DQZk8wVXD1Vfqbn17wLb/QJasO1bqPhoZH4DYvf6yO45yHZu6qiDZVgmhATfNtOhmj8NoG3
|
| 1073 |
+
1gGqA7L6tQ5/A4aqS3IdKIMvUa1GyLXF2H8hsWxGuyUAVtw5ubw/dXM/WBP4D3xHD8XSRhG2hQ/1emsZV6F9KJ+lvi3xzlLaY3bd5DTR5at72tJuQK1exZEaK4r4feEUhgNtWtb7Qhqe3749OkTbfMANmilo3CN
|
| 1074 |
+
VrD2BlDJfUDqjo8f1BATqjdAjq2fQI/C/JLqaBRHpzQrhcUJWUX3ayByw5vY4vD0SJWybWxSbk1GrqSrsHD+zM8zrBuUIvXWPhzHOvwQrY+S9ICV1OhjV6ODM2iMUvW62r0HKstG0YHDANrkQlchUKG68hVSus
|
| 1075 |
+
K2SWtcpSd3XFCw1luHEqRDy6LmV9H6n7G4v7mSfETGePI/UorR7QIpaA1wCpBriuHDaequr/oCgFIbz3WPpbTnvx3O5ae13ncW/n1kH1BnSp82Xnq87VjtUZdG51HnSO86/sbPG79t/LHxZunrV+2ft36vYRe
|
| 1076 |
+
vFDZfNFZube/A3n4wQ+</latexit>
|
| 1077 |
+
b
|
| 1078 |
+
�hc
|
| 1079 |
+
B1
|
| 1080 |
+
ghc
|
| 1081 |
+
shc
|
| 1082 |
+
Figure 3:
|
| 1083 |
+
The SCET representations of the full theory diagram in Fig.1, see text.
|
| 1084 |
+
The matching kernel K(ω, ω′, ω1, ω2) introduced in (44) can be computed perturbatively, i.e. to
|
| 1085 |
+
extract K, we can replace B-meson state by a b-quark in the definition of the soft function and
|
| 1086 |
+
calculate both sides of the equation on the partonic level. The LP soft function here appears
|
| 1087 |
+
since the limit ω1,2 → ∞ is equivalent to the treatment of t and t′ as infinitesimal variables in
|
| 1088 |
+
(32) and, consequently, the soft Wilson lines obtained from decoupling in the anti-hardcollinear
|
| 1089 |
+
direction Sn cancel. At the same time, the softcollinear quark field produces an additional soft
|
| 1090 |
+
Wilson line associated with the hardcollinear direction Sn because we require the softcollinear
|
| 1091 |
+
quark to have the same gauge transformation as a hardcollinear field. Finally, the structure of
|
| 1092 |
+
the soft function corresponds to LP shape function S(ω). Consistency of the second and third
|
| 1093 |
+
refactorisation conditions, which approach the softcollinear limit from two different directions as
|
| 1094 |
+
shown in Figure 2, leads to
|
| 1095 |
+
� Λ
|
| 1096 |
+
−p+
|
| 1097 |
+
dω �J (mb (p+ + ω) , u, u′) S(ω)� =
|
| 1098 |
+
� Λ
|
| 1099 |
+
−p+
|
| 1100 |
+
dωJg(mb(p+ + ω))
|
| 1101 |
+
�
|
| 1102 |
+
dω′K(ω, ω′, ω1, ω2)S(ω′).
|
| 1103 |
+
(45)
|
| 1104 |
+
This relation implies that the kernel K can be obtained from the quark-gluon jet function in the
|
| 1105 |
+
limit when momentum fraction of the quark tends to zero. Furthermore, it confirms that the
|
| 1106 |
+
kernel K is a perturbative object and that the softcollinear scale can be treated perturbatively.
|
| 1107 |
+
Finally, we note that softcollinear quarks must appear on both sides of the cut. Fermion num-
|
| 1108 |
+
ber conservation implies that only in this case we get a non-vanishing decay rate. Consequently,
|
| 1109 |
+
the endpoint divergences only appear in the limit when both u and u′ are small or when ω1 and
|
| 1110 |
+
ω2 are large.
|
| 1111 |
+
Figure 3 shows that the A- and B-type current have the same structure in the refactorisation
|
| 1112 |
+
limit. On the left, the s-quark is soft and emitted through the insertion of the subleading power
|
| 1113 |
+
Lagrangian. On the right, the s-quark is hardcollinear and emitted directly from the hard B-type
|
| 1114 |
+
vertex. When the fraction of the hardcollinear momentum of the s-quark tends to zero, the B-type
|
| 1115 |
+
current refactorises into the time-ordered product represented on the left, and both diagrams rep-
|
| 1116 |
+
resent the same full theory configuration. This duality in the description leads to the appearance
|
| 1117 |
+
of the endpoint divergences. A similar problem has already been identified in Refs. [49,50], in the
|
| 1118 |
+
context of QED corrections in Bs → µ+µ− due to O7 operator at the amplitude level.
|
| 1119 |
+
14
|
| 1120 |
+
|
| 1121 |
+
4.1
|
| 1122 |
+
Refactorisation at leading order
|
| 1123 |
+
Based on the refactorisation conditions, we first discuss the procedure of refactorisation at the
|
| 1124 |
+
leading order. We explicitly verify the conditions using the leading order results. Starting with the
|
| 1125 |
+
last refactorisation condition, we consider the factorisation theorem of the A-type contribution
|
| 1126 |
+
when the soft function is considered in the limit ω1 ∼ ω2 ≫ ω. This asymptotic limit of the
|
| 1127 |
+
soft function can be analysed by means of semi-perturbative methods [51], where the energetic
|
| 1128 |
+
softcollinear quarks are treated perturbatively, while ordinary soft modes are assumed to be
|
| 1129 |
+
nonperturbative. In the leading order, this corresponds to the replacement of the softcollinear
|
| 1130 |
+
quarks by a cut propagator. We anticipate the endpoint divergence in the convolution of the
|
| 1131 |
+
soft and the anti-hardcollinear jet functions and use dimensional MS regularisation within the
|
| 1132 |
+
calculation. We find the following expression of the asymptotic soft function at leading order [51],:
|
| 1133 |
+
�S (ω, ω1, ω2) = CFA(ϵ) αs
|
| 1134 |
+
(4π) ω1−ϵ
|
| 1135 |
+
1
|
| 1136 |
+
δ(ω1 − ω2)
|
| 1137 |
+
� Λ
|
| 1138 |
+
ω
|
| 1139 |
+
dω′ S(ω′)
|
| 1140 |
+
�(ω′ − ω)
|
| 1141 |
+
µ2
|
| 1142 |
+
�−ϵ
|
| 1143 |
+
,
|
| 1144 |
+
(46)
|
| 1145 |
+
which includes the leading power shape function S(ω). Note that this expression, in principle,
|
| 1146 |
+
receives corrections of higher order in αs and ΛQCD/ω1,2, which we do not take into account in
|
| 1147 |
+
the leading order analysis within this section. A(ϵ) was defined in eq. (24) 9
|
| 1148 |
+
We convolute the asymptotic soft function with the anti-hardcollinear jet functions for large
|
| 1149 |
+
ω1 and ω2 only by restricting the limits of the ω1 integral to mb and +∞. These integration
|
| 1150 |
+
limits will become clear once we consider the B-type current contribution. Starting with the
|
| 1151 |
+
factorisation formula of the A type current given in eq. (39), the asymptotic contribution of the
|
| 1152 |
+
A type current reads at leading order:
|
| 1153 |
+
dΓ
|
| 1154 |
+
dEγ
|
| 1155 |
+
|asy
|
| 1156 |
+
A
|
| 1157 |
+
= 2N |CA0
|
| 1158 |
+
LO(mb)|2
|
| 1159 |
+
� Λ
|
| 1160 |
+
−p+
|
| 1161 |
+
dωJLO
|
| 1162 |
+
g
|
| 1163 |
+
(mb(p+ + ω))
|
| 1164 |
+
� ∞
|
| 1165 |
+
mb
|
| 1166 |
+
dω1JLO(ω1)
|
| 1167 |
+
� ω1
|
| 1168 |
+
0
|
| 1169 |
+
dω2J
|
| 1170 |
+
∗
|
| 1171 |
+
LO(ω2) �S(ω, ω1, ω2)
|
| 1172 |
+
= N|CA0
|
| 1173 |
+
LO (mb) |2 αsCF
|
| 1174 |
+
(4π) mb
|
| 1175 |
+
1
|
| 1176 |
+
ϵA(ϵ)
|
| 1177 |
+
� Λ
|
| 1178 |
+
−p+
|
| 1179 |
+
dω SLO(ω′)
|
| 1180 |
+
�mb(ω + p+)
|
| 1181 |
+
µ2
|
| 1182 |
+
�−ϵ
|
| 1183 |
+
.
|
| 1184 |
+
(47)
|
| 1185 |
+
The 1
|
| 1186 |
+
ϵ pole is the manifestation of the endpoint divergence in the resolved contribution in the
|
| 1187 |
+
limit ω1 ∼ ω2 ≫ ω. In the next step, we will see that the specific choice mb as a lower limit of
|
| 1188 |
+
the ω1 integration is induced by the refactorisation conditions. The lower limit in the ω2 integral
|
| 1189 |
+
can be chosen to be non-negative due to the delta function δ(ω1 − ω2).
|
| 1190 |
+
Now we take the limit u → 0 in the factorisation theorem of the B-type current at leading
|
| 1191 |
+
order, which we derived in eq. (25) before performing the integrals over u and u′. This leads to
|
| 1192 |
+
dΓ
|
| 1193 |
+
dEγ
|
| 1194 |
+
|u,u′→0
|
| 1195 |
+
B
|
| 1196 |
+
= −N
|
| 1197 |
+
��CA0
|
| 1198 |
+
LO (mb)
|
| 1199 |
+
��2
|
| 1200 |
+
αsCF
|
| 1201 |
+
(4π) mb
|
| 1202 |
+
1
|
| 1203 |
+
ϵ A(ϵ)
|
| 1204 |
+
� Λ
|
| 1205 |
+
−p+
|
| 1206 |
+
dω SLO(ω)
|
| 1207 |
+
�mb(ω + p+)
|
| 1208 |
+
µ2
|
| 1209 |
+
�−ϵ
|
| 1210 |
+
.
|
| 1211 |
+
(48)
|
| 1212 |
+
This result differs from eq. (47) only by an overall sign. The sum of these two terms is finite and
|
| 1213 |
+
equal to zero. This leading-order result is a special case of the all-order relation, which follows
|
| 1214 |
+
from refactorisation conditions. In the ω1 ∼ ω2 ≫ ω (asymptotic) limit of the A-type current
|
| 1215 |
+
(with integration limits over ω1 from mb to +∞), we exactly single out the same term as in the
|
| 1216 |
+
9We note that we do not confirm the leading order result of the asymptotic soft function of Ref. [4] in the
|
| 1217 |
+
dimensional regularisation scheme.
|
| 1218 |
+
15
|
| 1219 |
+
|
| 1220 |
+
u → 0 of the B-type current up to a minus sign. This reflects the fact that in the limits u → 0
|
| 1221 |
+
and ω1 ∼ ω2 ≫ ω the two terms of the subleading O8 − O8 contribution have the same structure.
|
| 1222 |
+
Moreover, we see that with the relations mbu = ω1 and mbu′ = ω2, the u, u′ → 1 limit corresponds
|
| 1223 |
+
to the limit ω1, ω2 → mb, which fixes the integration limit in the subtraction term of the A-type
|
| 1224 |
+
current.
|
| 1225 |
+
We can summarise the relation we just verified at LO as
|
| 1226 |
+
dΓ
|
| 1227 |
+
dEγ
|
| 1228 |
+
|asy
|
| 1229 |
+
A
|
| 1230 |
+
= (−1) dΓ
|
| 1231 |
+
dEγ
|
| 1232 |
+
|u,u′→0
|
| 1233 |
+
B
|
| 1234 |
+
.
|
| 1235 |
+
(49)
|
| 1236 |
+
The refactorisation conditions guarantee that the eq. (49) holds to all orders in perturbation
|
| 1237 |
+
theory. To make this relation useful for the reshuffling of the factorisation theorem, let us consider
|
| 1238 |
+
an integral of �S(ω1, ω2, ω)J(ω1)J
|
| 1239 |
+
∗(ω2) over the ω1,2 ∈ [0, ∞]. Since �S(ω1, ω2, ω) is expanded for
|
| 1240 |
+
ω1,2 ≫ ω, this integral is scaleless and equal to zero in dimensional regularisation. We then
|
| 1241 |
+
perform the following manipulations of the integration limits
|
| 1242 |
+
0 =
|
| 1243 |
+
� ∞
|
| 1244 |
+
0
|
| 1245 |
+
dω1
|
| 1246 |
+
� ∞
|
| 1247 |
+
0
|
| 1248 |
+
dω2 = 2
|
| 1249 |
+
� ∞
|
| 1250 |
+
0
|
| 1251 |
+
dω1
|
| 1252 |
+
� ω1
|
| 1253 |
+
0
|
| 1254 |
+
dω2 = 2
|
| 1255 |
+
�� mb
|
| 1256 |
+
0
|
| 1257 |
+
dω1 +
|
| 1258 |
+
� ∞
|
| 1259 |
+
mb
|
| 1260 |
+
dω1
|
| 1261 |
+
� � ω1
|
| 1262 |
+
0
|
| 1263 |
+
dω2.
|
| 1264 |
+
(50)
|
| 1265 |
+
In the second step, we made use of the fact that the integrand is symmetric in ω1 and ω2 as we
|
| 1266 |
+
derived to all orders in eq. (38). Finally, we split the integration region into two parts suitable
|
| 1267 |
+
for the subtraction.
|
| 1268 |
+
The term integrated over ω1 from mb to ∞ is already in the form suitable for the subtraction
|
| 1269 |
+
of the A-type term and equal to (47). To bring the second term into the form of eq. (48), we
|
| 1270 |
+
perform substitutions ω1 = mb u and ω2 = mb u′, use (40) to replace J(ω1) by the singular part
|
| 1271 |
+
of the CB1 matching coefficient and then use the second refactorisation condition to derive
|
| 1272 |
+
2N
|
| 1273 |
+
��CA0
|
| 1274 |
+
LO(mb)
|
| 1275 |
+
��2 � mb
|
| 1276 |
+
0
|
| 1277 |
+
dω1JLO(ω1)
|
| 1278 |
+
� ω1
|
| 1279 |
+
0
|
| 1280 |
+
dω2J
|
| 1281 |
+
∗
|
| 1282 |
+
LO(ω2)
|
| 1283 |
+
� Λ
|
| 1284 |
+
−p+
|
| 1285 |
+
dωJLO
|
| 1286 |
+
g
|
| 1287 |
+
(mb(p+ + ω)) �S(ω, ω1, ω2)
|
| 1288 |
+
= 2N
|
| 1289 |
+
� 1
|
| 1290 |
+
0
|
| 1291 |
+
du
|
| 1292 |
+
�
|
| 1293 |
+
CB1
|
| 1294 |
+
LO (mb, u)
|
| 1295 |
+
� � 1
|
| 1296 |
+
u
|
| 1297 |
+
du′ �
|
| 1298 |
+
CB1
|
| 1299 |
+
LO (mb, u′)
|
| 1300 |
+
� � Λ
|
| 1301 |
+
−p+
|
| 1302 |
+
dω �JLO (mb (p+ + ω) , u, u′) SLO(ω)� (51)
|
| 1303 |
+
We rewrite Eq. (49) using the functions which enter the factorisation theorem:
|
| 1304 |
+
2N
|
| 1305 |
+
��CA0
|
| 1306 |
+
LO(mb)
|
| 1307 |
+
��2 � ∞
|
| 1308 |
+
mb
|
| 1309 |
+
dω1JLO(ω1)
|
| 1310 |
+
� ω1
|
| 1311 |
+
0
|
| 1312 |
+
dω2J
|
| 1313 |
+
∗
|
| 1314 |
+
LO(ω2)
|
| 1315 |
+
� Λ
|
| 1316 |
+
−p+
|
| 1317 |
+
dωJLO
|
| 1318 |
+
g
|
| 1319 |
+
(mb(p+ + ω)) �S(ω, ω1, ω2)
|
| 1320 |
+
= − 2N
|
| 1321 |
+
� 1
|
| 1322 |
+
0
|
| 1323 |
+
du
|
| 1324 |
+
�
|
| 1325 |
+
CB1
|
| 1326 |
+
LO (mb, u)
|
| 1327 |
+
� � 1
|
| 1328 |
+
u
|
| 1329 |
+
du′ �
|
| 1330 |
+
CB1
|
| 1331 |
+
LO (mb, u′)
|
| 1332 |
+
� � Λ
|
| 1333 |
+
−p+
|
| 1334 |
+
dω �JLO (mb (p+ + ω) , u, u′) SLO(ω)� .
|
| 1335 |
+
(52)
|
| 1336 |
+
We see with the help of (51) that the fact that the sum of asymptotic contributions is equal to
|
| 1337 |
+
zero is a consequence of our refactorisation conditions. It is now clear that these two subtraction
|
| 1338 |
+
terms, which add up to zero, make it possible to reshuffle the factorisation theorem and cancel
|
| 1339 |
+
the endpoint divergences at the leading order.
|
| 1340 |
+
16
|
| 1341 |
+
|
| 1342 |
+
4.2
|
| 1343 |
+
Bare refactorised factorisation theorem
|
| 1344 |
+
The generalisation of the LO order result to all orders is straightforward.
|
| 1345 |
+
Since we are still
|
| 1346 |
+
working in d-dimensons with bare objects, we can insert a scaleless expression into the factorisation
|
| 1347 |
+
theorem using the integral manipulations we performed at LO, see eq. (50)
|
| 1348 |
+
Using the all-orders refactorisation conditions discussed at the beginning of this section, we
|
| 1349 |
+
then can cast the subtraction term into the following form with the help of the same manipulations
|
| 1350 |
+
as in the LO case and generalise eq. (52) to all orders:
|
| 1351 |
+
0 = 2N
|
| 1352 |
+
��CA0 (mb)
|
| 1353 |
+
��2 � Λ
|
| 1354 |
+
−p+
|
| 1355 |
+
dωJg (mb (p+ + ω))
|
| 1356 |
+
� ∞
|
| 1357 |
+
mb
|
| 1358 |
+
dω1J (ω1)
|
| 1359 |
+
� ω1
|
| 1360 |
+
0
|
| 1361 |
+
dω2J
|
| 1362 |
+
∗ (ω2) �S (ω, ω1, ω2)
|
| 1363 |
+
+ 2N
|
| 1364 |
+
� 1
|
| 1365 |
+
0
|
| 1366 |
+
du
|
| 1367 |
+
�
|
| 1368 |
+
CB1 (mb, u′)
|
| 1369 |
+
� � 1
|
| 1370 |
+
u
|
| 1371 |
+
du′ �
|
| 1372 |
+
CB1∗ (mb, u′)
|
| 1373 |
+
� � Λ
|
| 1374 |
+
−p+
|
| 1375 |
+
dω �J (mb (p+ + ω) , u, u′) S(ω)� . (53)
|
| 1376 |
+
Starting from the all-order bare factorisation theorem
|
| 1377 |
+
dΓ
|
| 1378 |
+
dEγ
|
| 1379 |
+
= 2N
|
| 1380 |
+
��CA0 (mb)
|
| 1381 |
+
��2 � ∞
|
| 1382 |
+
−∞
|
| 1383 |
+
dω1J (ω1)
|
| 1384 |
+
� ω1
|
| 1385 |
+
−∞
|
| 1386 |
+
dω2J
|
| 1387 |
+
∗ (ω2)
|
| 1388 |
+
� Λ
|
| 1389 |
+
−p+
|
| 1390 |
+
dωJg (mb (p+ + ω)) S (ω, ω1, ω2)
|
| 1391 |
+
+ 2N
|
| 1392 |
+
� 1
|
| 1393 |
+
0
|
| 1394 |
+
duCB1 (mb, u)
|
| 1395 |
+
� 1
|
| 1396 |
+
u
|
| 1397 |
+
du′CB1∗ (mb, u′)
|
| 1398 |
+
� Λ
|
| 1399 |
+
−p+
|
| 1400 |
+
dωJ (mb (p+ + ω) , u, u′) S(ω)
|
| 1401 |
+
(54)
|
| 1402 |
+
and subtracting eq. (53) we arrive at
|
| 1403 |
+
dΓ
|
| 1404 |
+
dEγ
|
| 1405 |
+
|A+B = 2N
|
| 1406 |
+
� Λ
|
| 1407 |
+
−p+
|
| 1408 |
+
dω
|
| 1409 |
+
�
|
| 1410 |
+
Jg(mb(p+ + ω))
|
| 1411 |
+
��CA0 (mb)
|
| 1412 |
+
��2
|
| 1413 |
+
(55)
|
| 1414 |
+
×
|
| 1415 |
+
� ∞
|
| 1416 |
+
−∞
|
| 1417 |
+
dω1
|
| 1418 |
+
� ω1
|
| 1419 |
+
−∞
|
| 1420 |
+
dω2J(ω1) J
|
| 1421 |
+
∗(ω2)
|
| 1422 |
+
�
|
| 1423 |
+
S (ω, ω1, ω2) − θ(ω1 − mb)θ(ω2) �S(ω, ω1, ω2)
|
| 1424 |
+
�
|
| 1425 |
+
+
|
| 1426 |
+
� 1
|
| 1427 |
+
0
|
| 1428 |
+
du
|
| 1429 |
+
� 1
|
| 1430 |
+
u
|
| 1431 |
+
du′ �
|
| 1432 |
+
CB1
|
| 1433 |
+
LO (mb, u) CB1∗ (mb, u′) J (mb (p+ + ω) , u, u′) S (ω)
|
| 1434 |
+
−
|
| 1435 |
+
�
|
| 1436 |
+
CB1 (mb, u)
|
| 1437 |
+
� �
|
| 1438 |
+
CB1∗ (mb, u′)
|
| 1439 |
+
�
|
| 1440 |
+
�J (mb (p+ + ω) , u, u′) S(ω)�
|
| 1441 |
+
��
|
| 1442 |
+
,
|
| 1443 |
+
where �J (mb (p+ + ω) , u, u′) S(ω)� = Jg(mb(p+ + ω)) �S(ω, mbu, mbu′) and
|
| 1444 |
+
�
|
| 1445 |
+
CB1 (mb, u′)
|
| 1446 |
+
�
|
| 1447 |
+
= (−1)CA0 (mb) mbJ (umb). We note here that the second term effectively restricts the integration
|
| 1448 |
+
range over ω1 to a finite range in the first line and consequently removes endpoint divergence.
|
| 1449 |
+
Thus these terms need to be added together before the ω1 integral is performed. Similarly, the
|
| 1450 |
+
last term removes the endpoint divergence of the third term, and therefore u integration has to be
|
| 1451 |
+
performed after these two terms are added up. In addition, we note that the integrals in the first
|
| 1452 |
+
term are finite for large negative values of ω1 and ω2 due to nonperturbative dynamics [4]. At this
|
| 1453 |
+
point, the convolutions integrals in the A- and B-type contributions are no longer divergent, and
|
| 1454 |
+
we can renormalise the functions entering the factorisation theorem and take the limit d → 4.
|
| 1455 |
+
4.3
|
| 1456 |
+
Refactorised factorisation theorem after renormalisation
|
| 1457 |
+
We achieved refactorisation at the level of the bare factorisation theorem. It has been pointed
|
| 1458 |
+
out that refactorisation and renormalisation do not commute in general [23, 52]. Therefore, for
|
| 1459 |
+
17
|
| 1460 |
+
|
| 1461 |
+
the result to be helpful for the resummation of the large logarithms, we must prove that we
|
| 1462 |
+
can express the factorisation theorem in terms of renormalised objects. To this end, we have to
|
| 1463 |
+
replace bare quantities with renormalised ones. The renormalisation of hard matching coefficients
|
| 1464 |
+
is well-established
|
| 1465 |
+
CA0
|
| 1466 |
+
bare(mb) = ZA0(µ) CA0
|
| 1467 |
+
ren(µ, mb) ,
|
| 1468 |
+
(56)
|
| 1469 |
+
CB1
|
| 1470 |
+
bare(u) =
|
| 1471 |
+
� 1
|
| 1472 |
+
0
|
| 1473 |
+
du′ ZB1(µ, u, u′) CB1
|
| 1474 |
+
ren(µ.u′) ,
|
| 1475 |
+
(57)
|
| 1476 |
+
where the one-loop renormalisation factors can be found in Ref. [43]. The LP jet function is
|
| 1477 |
+
renormalised according to
|
| 1478 |
+
Jbare
|
| 1479 |
+
g
|
| 1480 |
+
(p2) =
|
| 1481 |
+
� p2
|
| 1482 |
+
o
|
| 1483 |
+
dp′2 ZJg(µ, p2 − p′2) Jren
|
| 1484 |
+
g (µ, p′2) ,
|
| 1485 |
+
(58)
|
| 1486 |
+
with the ZJg factor given in Refs. [53, 54] up to the three-loop order. Similarly, the LP shape
|
| 1487 |
+
function
|
| 1488 |
+
Sbare(ω) =
|
| 1489 |
+
�
|
| 1490 |
+
dω′ ZS(µ, ω − ω′) Sren(µ, ω′)
|
| 1491 |
+
(59)
|
| 1492 |
+
is well-known [55]
|
| 1493 |
+
Much less is known about NLP objects. The radiative jet function is a notable example which
|
| 1494 |
+
appeared before in the context of B → γℓν [12]. It has recently been computed at the two-loop
|
| 1495 |
+
order in Ref. [17]. The most important detail is that the time-like (ω > 0) and space-like (ω < 0)
|
| 1496 |
+
radiative jet functions do not mix under renormalisation
|
| 1497 |
+
J
|
| 1498 |
+
+
|
| 1499 |
+
bare/ren(ω) = θ(ω)Jbare/ren(ω) ,
|
| 1500 |
+
(60)
|
| 1501 |
+
J
|
| 1502 |
+
−
|
| 1503 |
+
bare/ren(ω) = θ(−ω)Jbare/ren(ω) ,
|
| 1504 |
+
(61)
|
| 1505 |
+
and
|
| 1506 |
+
J
|
| 1507 |
+
+
|
| 1508 |
+
bare(ω) =
|
| 1509 |
+
� ∞
|
| 1510 |
+
0
|
| 1511 |
+
dω′ Z+
|
| 1512 |
+
J (µ, ω, ω′) , J
|
| 1513 |
+
+
|
| 1514 |
+
ren(µ, ω′) ,
|
| 1515 |
+
(62)
|
| 1516 |
+
J
|
| 1517 |
+
−
|
| 1518 |
+
bare(ω) =
|
| 1519 |
+
� 0
|
| 1520 |
+
−∞
|
| 1521 |
+
dω′ Z−
|
| 1522 |
+
J (µ, ω, ω′) J
|
| 1523 |
+
−
|
| 1524 |
+
ren(µ, ω′) .
|
| 1525 |
+
(63)
|
| 1526 |
+
This separation into time-like and spec-like jet functions is necessary since we choose to integrate
|
| 1527 |
+
the subtraction term only over non-negative values of ω1,2. Finally, we define the renormalisation
|
| 1528 |
+
of the NLP soft and jet functions
|
| 1529 |
+
Sbare(ω, ω1, ω2) =
|
| 1530 |
+
�
|
| 1531 |
+
dω′dω′
|
| 1532 |
+
1dω′
|
| 1533 |
+
2 ZS(µ, ω, ω′, ω1, ω′
|
| 1534 |
+
1, ω2, ω′
|
| 1535 |
+
2) Sren(µ, ω′, ω′
|
| 1536 |
+
1, ω′
|
| 1537 |
+
2) ,
|
| 1538 |
+
(64)
|
| 1539 |
+
Jbare(p2, u1, u2) =
|
| 1540 |
+
�
|
| 1541 |
+
dp′2
|
| 1542 |
+
� 1
|
| 1543 |
+
0
|
| 1544 |
+
du′
|
| 1545 |
+
1
|
| 1546 |
+
� 1
|
| 1547 |
+
0
|
| 1548 |
+
du′
|
| 1549 |
+
2 ZJ(µ, p2 − p′2, u1, u′
|
| 1550 |
+
1, u2, u′
|
| 1551 |
+
2) Jren(p′2, u′
|
| 1552 |
+
1, u′
|
| 1553 |
+
2) .
|
| 1554 |
+
(65)
|
| 1555 |
+
These renormalisation kernels are currently unknown.
|
| 1556 |
+
18
|
| 1557 |
+
|
| 1558 |
+
We require that A- and B-type contributions are separately RG invariant (see Ref. [56] for
|
| 1559 |
+
analogous treatment). This leads to the following conditions on the renormalisation kernels
|
| 1560 |
+
|ZA0|2
|
| 1561 |
+
�
|
| 1562 |
+
dω
|
| 1563 |
+
�
|
| 1564 |
+
dω1
|
| 1565 |
+
�
|
| 1566 |
+
dω2 ZJg(ω − ω′)ZJ(ω1, ω′
|
| 1567 |
+
1) Z†
|
| 1568 |
+
J(ω2, ω′
|
| 1569 |
+
2) ZS(ω, ω′′, ω1, ω′′
|
| 1570 |
+
1, ω2, ω′′
|
| 1571 |
+
2)
|
| 1572 |
+
=δ(ω′ − ω′′) δ(ω′
|
| 1573 |
+
1 − ω′′
|
| 1574 |
+
1) δ(ω′
|
| 1575 |
+
2 − ω′′
|
| 1576 |
+
2) ,
|
| 1577 |
+
(66)
|
| 1578 |
+
and
|
| 1579 |
+
� 1
|
| 1580 |
+
0
|
| 1581 |
+
du1
|
| 1582 |
+
� 1
|
| 1583 |
+
0
|
| 1584 |
+
du2
|
| 1585 |
+
�
|
| 1586 |
+
dω ZB1(u1, u′
|
| 1587 |
+
1) ZB1†(u2, u′
|
| 1588 |
+
2) ZJ(ω − ω′, u1, u′
|
| 1589 |
+
1, u2, u′
|
| 1590 |
+
2) ZS(ω − ω′′)
|
| 1591 |
+
= δ(ω′ − ω′′) δ(u′
|
| 1592 |
+
1 − u′′
|
| 1593 |
+
1) δ(u′
|
| 1594 |
+
2 − u′′
|
| 1595 |
+
2) ;
|
| 1596 |
+
(67)
|
| 1597 |
+
and further, RG invariance of the subtraction term leads to
|
| 1598 |
+
|ZA0|2
|
| 1599 |
+
� ∞
|
| 1600 |
+
0
|
| 1601 |
+
dω1
|
| 1602 |
+
� ∞
|
| 1603 |
+
0
|
| 1604 |
+
dω2
|
| 1605 |
+
�
|
| 1606 |
+
dω Z+
|
| 1607 |
+
J (ω1, ω′
|
| 1608 |
+
1) Z+†
|
| 1609 |
+
J (ω2, ω′
|
| 1610 |
+
2) ZJg(ω − ω′) Z�S(ω − ω′′, ω1, ω′′
|
| 1611 |
+
1, ω2, ω′′
|
| 1612 |
+
2)
|
| 1613 |
+
= δ(ω′ − ω′′) δ(ω′
|
| 1614 |
+
1 − ω′′
|
| 1615 |
+
1) δ(ω′
|
| 1616 |
+
2 − ω′′
|
| 1617 |
+
2) .
|
| 1618 |
+
(68)
|
| 1619 |
+
These conditions are sufficient to prove that renormalisation and refactorisation commute and
|
| 1620 |
+
there is no leftover term.
|
| 1621 |
+
We can now insert the above definitions into eq. (55),
|
| 1622 |
+
dΓ
|
| 1623 |
+
dEγ
|
| 1624 |
+
|A+B = 2N
|
| 1625 |
+
� Λ
|
| 1626 |
+
−p+
|
| 1627 |
+
dω
|
| 1628 |
+
�
|
| 1629 |
+
Jren
|
| 1630 |
+
g (mb(p+ + ω))
|
| 1631 |
+
��CA0
|
| 1632 |
+
ren (mb)
|
| 1633 |
+
��2
|
| 1634 |
+
(69)
|
| 1635 |
+
×
|
| 1636 |
+
� ∞
|
| 1637 |
+
−∞
|
| 1638 |
+
dω1
|
| 1639 |
+
� ω1
|
| 1640 |
+
−∞
|
| 1641 |
+
dω2J
|
| 1642 |
+
+
|
| 1643 |
+
ren(ω1) J
|
| 1644 |
+
+∗
|
| 1645 |
+
ren(ω2)
|
| 1646 |
+
�
|
| 1647 |
+
Sren (ω, ω1, ω2) − θ(ω1 − mb)θ(ω2) �Sren(ω, ω1, ω2)
|
| 1648 |
+
�
|
| 1649 |
+
+
|
| 1650 |
+
� 1
|
| 1651 |
+
0
|
| 1652 |
+
du
|
| 1653 |
+
� 1
|
| 1654 |
+
u
|
| 1655 |
+
du′ �
|
| 1656 |
+
CB1
|
| 1657 |
+
ren (mb, u) CB1∗
|
| 1658 |
+
ren (mb, u′) Jren (mb (p+ + ω) , u, u′) Sren (ω)
|
| 1659 |
+
−
|
| 1660 |
+
�
|
| 1661 |
+
CB1
|
| 1662 |
+
ren (mb, u)
|
| 1663 |
+
� �
|
| 1664 |
+
CB1∗
|
| 1665 |
+
ren (mb, u′)
|
| 1666 |
+
�
|
| 1667 |
+
�Jren (mb (p+ + ω) , u, u′) Sren(ω)�
|
| 1668 |
+
��
|
| 1669 |
+
.
|
| 1670 |
+
This is our final result. Endpoint divergences are manifestly absent, assuming one performs
|
| 1671 |
+
the integrals over ω1 after adding the first and second terms together. Similarly, the integrals
|
| 1672 |
+
over u should be performed after adding the last two lines.
|
| 1673 |
+
This renormalised factorisation
|
| 1674 |
+
theorem allows for a consistent resummation of large logarithms within the resolved O8 − O8,
|
| 1675 |
+
using standard RG methods owing to the fact that each object appearing in the above equation
|
| 1676 |
+
is a single scale object. However, a judicious choice of scale might be necessary.
|
| 1677 |
+
19
|
| 1678 |
+
|
| 1679 |
+
5
|
| 1680 |
+
Summary and Outlook
|
| 1681 |
+
In the present paper, we identified the divergences in the resolved, but also in the direct subleading
|
| 1682 |
+
O8 − O8 as endpoint divergences which lead to a breakdown of the factorisation theorem already
|
| 1683 |
+
at leading order in four space-time dimensions. The failure of naive factorisation does not allow
|
| 1684 |
+
for consistent separation of scales and, consequently, resummation of large logarithms.
|
| 1685 |
+
However, it was recently shown [9] that the resolved contributions still represent the most
|
| 1686 |
+
significant uncertainty in the inclusive ¯B → Xsγ decay. Large scale dependence and also a large
|
| 1687 |
+
charm mass dependence were identified in the lowest order result of the resolved contribution,
|
| 1688 |
+
which calls for a systematic calculation of αs corrections and RG summation of all resolved
|
| 1689 |
+
contributions [9]. A mandatory input for this task is a well-defined factorisation formula for these
|
| 1690 |
+
subleading corrections. This critical step was established in this paper. The next step consists of
|
| 1691 |
+
computing renormalisation kernels for the NLP soft and jet functions, extracting the anomalous
|
| 1692 |
+
dimensions and solving the RG equations to resum large logarithms.
|
| 1693 |
+
Recent intensive studies of the power corrections in collider applications of SCET [19,22–24,
|
| 1694 |
+
42,52] lead to the development of new techniques that allow for a reshuffling of terms within the
|
| 1695 |
+
factorisation formula so that all endpoint divergences cancel out. We used these new techniques in
|
| 1696 |
+
our flavour application which includes nonperturbative functions typically not present in collider
|
| 1697 |
+
applications of SCET. Unlike in the h → γγ decay [22], in the considered SCETI problem, there
|
| 1698 |
+
are no leftover terms present after renormalisation.
|
| 1699 |
+
To derive a consistent factorisation theorem, we first established the bare factorisation theorem
|
| 1700 |
+
for the resolved and direct contributions on the operatorial level. Then we derived the all-orders
|
| 1701 |
+
refactorisation conditions applicable to our process. This idea is based on the fact that in certain
|
| 1702 |
+
limits, the two terms of the subleading O8 − O8 contribution have the same structure, which
|
| 1703 |
+
guarantees that the endpoint divergences cancel between the two terms to all orders. Finally, we
|
| 1704 |
+
proved that we could express the factorisation theorem in terms of renormalised objects so that the
|
| 1705 |
+
result can be used for the resummation of the large logarithms within the resolved contributions.
|
| 1706 |
+
Acknowledgements
|
| 1707 |
+
We thank Martin Beneke and Matthias Neubert for their valuable discussions. RS would also like
|
| 1708 |
+
to thank Mathias Garny and Jian Wang for many discussions on power corrections in SCET and
|
| 1709 |
+
Mikolaj Misiak for a discussion on the theoretical predictions for B → Xsγ. TH is grateful to
|
| 1710 |
+
Michael Benzke for uncounted discussions on the resolved contributions. RS is supported by the
|
| 1711 |
+
United States Department of Energy under Grant Contract DESC0012704. TH is supported by
|
| 1712 |
+
the Cluster of Excellence “Precision Physics, Fundamental Interactions, and Structure of Matter"
|
| 1713 |
+
(PRISMA+ EXC 2118/1) funded by the German Research Foundation (DFG) within the German
|
| 1714 |
+
Excellence Strategy (Project ID 39083149), as well as by the BMBF Verbundprojekt 05H2018 -
|
| 1715 |
+
Belle II. TH also thanks the CERN theory group for its hospitality during his regular visits to
|
| 1716 |
+
CERN where part of the work was done.
|
| 1717 |
+
20
|
| 1718 |
+
|
| 1719 |
+
References
|
| 1720 |
+
[1] M. Beneke, “Soft-collinear factorization in B decays,” Nucl. Part. Phys. Proc. 261-262, 311-
|
| 1721 |
+
337 (2015) [arXiv:1501.07374 [hep-ph]].
|
| 1722 |
+
[2] M. Misiak, H. M. Asatrian, R. Boughezal, M. Czakon, T. Ewerth, A. Ferroglia, P. Fiedler,
|
| 1723 |
+
P. Gambino, C. Greub and U. Haisch, et al. “Updated NNLO QCD predictions for the weak
|
| 1724 |
+
radiative B-meson decays,” Phys. Rev. Lett. 114, no.22, 221801 (2015) [arXiv:1503.01789
|
| 1725 |
+
[hep-ph]].
|
| 1726 |
+
[3] T. Hurth and M. Nakao, “Radiative and Electroweak Penguin Decays of B Mesons,” Ann.
|
| 1727 |
+
Rev. Nucl. Part. Sci. 60, 645-677 (2010) [arXiv:1005.1224 [hep-ph]].
|
| 1728 |
+
[4] M. Benzke, S. J. Lee, M. Neubert and G. Paz, “Factorization at Subleading Power and
|
| 1729 |
+
Irreducible Uncertainties in ¯B → Xsγ Decay,” JHEP 08, 099 (2010) [arXiv:1003.5012 [hep-
|
| 1730 |
+
ph]].
|
| 1731 |
+
[5] M. Benzke, S. J. Lee, M. Neubert and G. Paz, “Long-Distance Dominance of the CP Asym-
|
| 1732 |
+
metry in B → Xs,d + γ Decays,” Phys. Rev. Lett. 106, 141801 (2011) [arXiv:1012.3167
|
| 1733 |
+
[hep-ph]].
|
| 1734 |
+
[6] T. Hurth, M. Fickinger, S. Turczyk and M. Benzke, “Resolved Power Corrections to the Inclu-
|
| 1735 |
+
sive Decay ¯B → Xsℓ+ℓ−,” Nucl. Part. Phys. Proc. 285-286, 57-62 (2017) [arXiv:1711.01162
|
| 1736 |
+
[hep-ph]].
|
| 1737 |
+
[7] M. Benzke, T. Hurth and S. Turczyk, “Subleading power factorization in ¯B → Xsℓ+ℓ−,”
|
| 1738 |
+
JHEP 10, 031 (2017) [arXiv:1705.10366 [hep-ph]].
|
| 1739 |
+
[8] A. Gunawardana and G. Paz, “Reevaluating uncertainties in B → Xsγ decay,” JHEP 11,
|
| 1740 |
+
141 (2019) [arXiv:1908.02812 [hep-ph]].
|
| 1741 |
+
[9] M. Benzke and T. Hurth, “Resolved 1/mb contributions to ¯B → Xs,dℓ+ℓ− and ¯B → Xsγ,”
|
| 1742 |
+
Phys. Rev. D 102, 114024 (2020) [arXiv:2006.00624 [hep-ph]].
|
| 1743 |
+
[10] E. Lunghi, D. Pirjol and D. Wyler, “Factorization in leptonic radiative B → γeν decays,”
|
| 1744 |
+
Nucl. Phys. B 649, 349-364 (2003) [arXiv:hep-ph/0210091 [hep-ph]].
|
| 1745 |
+
[11] M. Beneke and T. Feldmann, “Factorization of heavy to light form-factors in soft collinear
|
| 1746 |
+
effective theory,” Nucl. Phys. B 685, 249-296 (2004) doi:10.1016/j.nuclphysb.2004.02.033
|
| 1747 |
+
[arXiv:hep-ph/0311335 [hep-ph]].
|
| 1748 |
+
[12] S. W. Bosch, R. J. Hill, B. O. Lange and M. Neubert, “Factorization and Sudakov resumma-
|
| 1749 |
+
tion in leptonic radiative B decay,” Phys. Rev. D 67, 094014 (2003) [arXiv:hep-ph/0301123
|
| 1750 |
+
[hep-ph]].
|
| 1751 |
+
[13] M. Beneke, A. Broggio, M. Garny, S. Jaskiewicz, R. Szafron, L. Vernazza and J. Wang,
|
| 1752 |
+
“Leading-logarithmic threshold resummation of the Drell-Yan process at next-to-leading
|
| 1753 |
+
power,” JHEP 03, 043 (2019) [arXiv:1809.10631 [hep-ph]].
|
| 1754 |
+
[14] M. Beneke, A. Broggio, S. Jaskiewicz and L. Vernazza, “Threshold factorization of the Drell-
|
| 1755 |
+
Yan process at next-to-leading power,” JHEP 07, 078 (2020) [arXiv:1912.01585 [hep-ph]].
|
| 1756 |
+
21
|
| 1757 |
+
|
| 1758 |
+
[15] I. Moult, I. W. Stewart and G. Vita, “Subleading Power Factorization with Radiative Func-
|
| 1759 |
+
tions,” JHEP 11, 153 (2019) [arXiv:1905.07411 [hep-ph]].
|
| 1760 |
+
[16] E. Laenen, J. Sinninghe Damsté, L. Vernazza, W. Waalewijn and L. Zoppi, “Towards all-
|
| 1761 |
+
order factorization of QED amplitudes at next-to-leading power,” Phys. Rev. D 103, no.3,
|
| 1762 |
+
034022 (2021) [arXiv:2008.01736 [hep-ph]].
|
| 1763 |
+
[17] Z. L. Liu and M. Neubert, “Two-Loop Radiative Jet Function for Exclusive B-Meson and
|
| 1764 |
+
Higgs Decays,” JHEP 06, 060 (2020) [arXiv:2003.03393 [hep-ph]].
|
| 1765 |
+
[18] Z. L. Liu, M. Neubert, M. Schnubel and X. Wang, “Radiative quark jet function with an
|
| 1766 |
+
external gluon,” JHEP 02, 075 (2022) [arXiv:2112.00018 [hep-ph]].
|
| 1767 |
+
[19] M. Beneke, M. Garny, R. Szafron and J. Wang, “Violation of the Kluberg-Stern-Zuber the-
|
| 1768 |
+
orem in SCET,” JHEP 09, 101 (2019) [arXiv:1907.05463 [hep-ph]].
|
| 1769 |
+
[20] M. Beneke, M. Garny, S. Jaskiewicz, R. Szafron, L. Vernazza and J. Wang, “Leading-
|
| 1770 |
+
logarithmic threshold resummation of Higgs production in gluon fusion at next-to-leading
|
| 1771 |
+
power,” JHEP 01, 094 (2020) [arXiv:1910.12685 [hep-ph]].
|
| 1772 |
+
[21] J. Wang, “Resummation of double logarithms in loop-induced processes with effective field
|
| 1773 |
+
theory,” [arXiv:1912.09920 [hep-ph]].
|
| 1774 |
+
[22] Z. L. Liu and M. Neubert, “Factorization at subleading power and endpoint-divergent con-
|
| 1775 |
+
volutions in h → γγ decay,” JHEP 04, 033 (2020) [arXiv:1912.08818 [hep-ph]].
|
| 1776 |
+
[23] Z. L. Liu, B. Mecaj, M. Neubert and X. Wang, “Factorization at subleading power and
|
| 1777 |
+
endpoint divergences in h → γγ decay. Part II. Renormalization and scale evolution,” JHEP
|
| 1778 |
+
01, 077 (2021) [arXiv:2009.06779 [hep-ph]].
|
| 1779 |
+
[24] M. Beneke, M. Garny, S. Jaskiewicz, R. Szafron, L. Vernazza and J. Wang, “Large-x resum-
|
| 1780 |
+
mation of off-diagonal deep-inelastic parton scattering from d-dimensional refactorization,”
|
| 1781 |
+
JHEP 10, 196 (2020) [arXiv:2008.04943 [hep-ph]].
|
| 1782 |
+
[25] M. Beneke, M. Garny, S. Jaskiewicz, J. Strohm, R. Szafron, L. Vernazza and J. Wang, “Next-
|
| 1783 |
+
to-leading power endpoint factorization and resummation for off-diagonal “gluon” thrust,”
|
| 1784 |
+
JHEP 07, 144 (2022) [arXiv:2205.04479 [hep-ph]].
|
| 1785 |
+
[26] Z. L. Liu, M. Neubert, M. Schnubel and X. Wang, “Factorization at Next-to-Leading Power
|
| 1786 |
+
and Endpoint Divergences in gg → h Production,” [arXiv:2212.10447 [hep-ph]].
|
| 1787 |
+
[27] C. Cornella, M. König and M. Neubert, “Structure-Dependent QED Effects in Exclusive B
|
| 1788 |
+
Decays at Subleading Power,” [arXiv:2212.14430 [hep-ph]].
|
| 1789 |
+
[28] M. Beneke, F. Campanario, T. Mannel and B. D. Pecjak, “Power corrections to anti-B —>
|
| 1790 |
+
X(u) l anti-nu (X(s) gamma) decay spectra in the ’shape-function’ region,” JHEP 06, 071
|
| 1791 |
+
(2005) [arXiv:hep-ph/0411395 [hep-ph]].
|
| 1792 |
+
[29] S. W. Bosch, M. Neubert and G. Paz, “Subleading shape functions in inclusive B decays,”
|
| 1793 |
+
JHEP 11, 073 (2004) [arXiv:hep-ph/0409115 [hep-ph]].
|
| 1794 |
+
22
|
| 1795 |
+
|
| 1796 |
+
[30] M. Beneke, G. Buchalla, M. Neubert and C. T. Sachrajda, “QCD factorization in B —>
|
| 1797 |
+
pi K, pi pi decays and extraction of Wolfenstein parameters,” Nucl. Phys. B 606, 245-321
|
| 1798 |
+
(2001) [arXiv:hep-ph/0104110 [hep-ph]].
|
| 1799 |
+
[31] C. W. Bauer, S. Fleming, D. Pirjol and I. W. Stewart, “An Effective field theory for collinear
|
| 1800 |
+
and soft gluons:
|
| 1801 |
+
Heavy to light decays,” Phys. Rev. D 63, 114020 (2001) [arXiv:hep-
|
| 1802 |
+
ph/0011336 [hep-ph]].
|
| 1803 |
+
[32] C. W. Bauer, D. Pirjol and I. W. Stewart, “Soft collinear factorization in effective field
|
| 1804 |
+
theory,” Phys. Rev. D 65, 054022 (2002) [arXiv:hep-ph/0109045 [hep-ph]].
|
| 1805 |
+
[33] M. Beneke, A. P. Chapovsky, M. Diehl and T. Feldmann, “Soft collinear effective theory
|
| 1806 |
+
and heavy to light currents beyond leading power,” Nucl. Phys. B 643, 431-476 (2002)
|
| 1807 |
+
[arXiv:hep-ph/0206152 [hep-ph]].
|
| 1808 |
+
[34] M. Beneke and T. Feldmann, “Multipole expanded soft collinear effective theory with non-
|
| 1809 |
+
Abelian gauge symmetry,” Phys. Lett. B 553, 267-276 (2003) [arXiv:hep-ph/0211358 [hep-
|
| 1810 |
+
ph]].
|
| 1811 |
+
[35] M. Beneke, M. Garny, R. Szafron and J. Wang, “Anomalous dimension of subleading-power
|
| 1812 |
+
N-jet operators,” JHEP 03, 001 (2018) [arXiv:1712.04416 [hep-ph]].
|
| 1813 |
+
[36] M. Beneke, M. Garny, R. Szafron and J. Wang, “Subleading-power N-jet operators and the
|
| 1814 |
+
LBK amplitude in SCET,” PoS RADCOR2017, 048 (2017) [arXiv:1712.07462 [hep-ph]].
|
| 1815 |
+
[37] M. Beneke, M. Garny, R. Szafron and J. Wang, “Anomalous dimension of subleading-power
|
| 1816 |
+
N-jet operators. Part II,” JHEP 11, 112 (2018) [arXiv:1808.04742 [hep-ph]].
|
| 1817 |
+
[38] S. Jaskiewicz, “Next-to-leading power threshold factorization for Drell-Yan production,”
|
| 1818 |
+
[arXiv:1912.08882 [hep-ph]].
|
| 1819 |
+
[39] D. W. Kolodrubetz, I. Moult and I. W. Stewart, “Building Blocks for Subleading Helicity
|
| 1820 |
+
Operators,” JHEP 05, 139 (2016) [arXiv:1601.02607 [hep-ph]].
|
| 1821 |
+
[40] I. Feige, D. W. Kolodrubetz, I. Moult and I. W. Stewart, “A Complete Basis of Helicity
|
| 1822 |
+
Operators for Subleading Factorization,” JHEP 11, 142 (2017) [arXiv:1703.03411 [hep-ph]].
|
| 1823 |
+
[41] I. Moult, I. W. Stewart, G. Vita and H. X. Zhu, “First Subleading Power Resummation for
|
| 1824 |
+
Event Shapes,” JHEP 08, 013 (2018) [arXiv:1804.04665 [hep-ph]].
|
| 1825 |
+
[42] I. Moult, I. W. Stewart, G. Vita and H. X. Zhu, “The Soft Quark Sudakov,” JHEP 05, 089
|
| 1826 |
+
(2020) [arXiv:1910.14038 [hep-ph]].
|
| 1827 |
+
[43] M. Beneke and D. Yang, “Heavy-to-light B meson form-factors at large recoil energy:
|
| 1828 |
+
Spectator-scattering corrections,” Nucl. Phys. B 736, 34-81 (2006) [arXiv:hep-ph/0508250
|
| 1829 |
+
[hep-ph]].
|
| 1830 |
+
[44] G. Vita, “QCD Beyond Leading Power,” [arXiv:2008.10606 [hep-ph]].
|
| 1831 |
+
[45] S. E. Jaskiewicz, “Factorization and Resummation at Subleading Powers,” (Doctoral disser-
|
| 1832 |
+
tation, Technische Universität München)
|
| 1833 |
+
23
|
| 1834 |
+
|
| 1835 |
+
[46] M. Neubert, “Analysis of the photon spectrum in inclusive B —> X(s) gamma decays,” Phys.
|
| 1836 |
+
Rev. D 49 (1994), 4623-4633 [arXiv:hep-ph/9312311 [hep-ph]].
|
| 1837 |
+
[47] G. Paz,
|
| 1838 |
+
“Subleading Jet Functions in Inclusive B Decays,”
|
| 1839 |
+
JHEP 06,
|
| 1840 |
+
083 (2009)
|
| 1841 |
+
[arXiv:0903.3377 [hep-ph]].
|
| 1842 |
+
[48] T. Becher, M. Neubert and G. Xu, “Dynamical Threshold Enhancement and Resummation
|
| 1843 |
+
in Drell-Yan Production,” JHEP 07, 030 (2008) [arXiv:0710.0680 [hep-ph]].
|
| 1844 |
+
[49] M. Beneke, C. Bobeth and R. Szafron, “Enhanced electromagnetic correction to the rare
|
| 1845 |
+
B-meson decay Bs,d → µ+µ−,” Phys. Rev. Lett. 120, no.1, 011801 (2018) [arXiv:1708.09152
|
| 1846 |
+
[hep-ph]].
|
| 1847 |
+
[50] M. Beneke, C. Bobeth and R. Szafron, “Power-enhanced leading-logarithmic QED corrections
|
| 1848 |
+
to Bq → µ+µ−,” JHEP 10, 232 (2019) [erratum: JHEP 11, 099 (2022)] [arXiv:1908.07011
|
| 1849 |
+
[hep-ph]].
|
| 1850 |
+
[51] S. W. Bosch, B. O. Lange, M. Neubert and G. Paz, “Factorization and shape function effects
|
| 1851 |
+
in inclusive B meson decays,” Nucl. Phys. B 699, 335-386 (2004) [arXiv:hep-ph/0402094
|
| 1852 |
+
[hep-ph]].
|
| 1853 |
+
[52] Z. L. Liu, B. Mecaj, M. Neubert and X. Wang, “Factorization at subleading power, Sudakov
|
| 1854 |
+
resummation, and endpoint divergences in soft-collinear effective theory,” Phys. Rev. D 104,
|
| 1855 |
+
no.1, 014004 (2021) [arXiv:2009.04456 [hep-ph]].
|
| 1856 |
+
[53] T. Becher and G. Bell, “The gluon jet function at two-loop order,” Phys. Lett. B 695, 252-258
|
| 1857 |
+
(2011) [arXiv:1008.1936 [hep-ph]].
|
| 1858 |
+
[54] P. Banerjee, P. K. Dhani and V. Ravindran, “Gluon jet function at three loops in QCD,”
|
| 1859 |
+
Phys. Rev. D 98, no.9, 094016 (2018) [arXiv:1805.02637 [hep-ph]].
|
| 1860 |
+
[55] A. G. Grozin and G. P. Korchemsky, “Renormalized sum rules for structure functions of
|
| 1861 |
+
heavy mesons decays,” Phys. Rev. D 53, 1378-1390 (1996) [arXiv:hep-ph/9411323 [hep-ph]].
|
| 1862 |
+
[56] Z. L. Liu, B. Mecaj, M. Neubert, X. Wang and S. Fleming, “Renormalization and Scale
|
| 1863 |
+
Evolution of the Soft-Quark Soft Function,” JHEP 07, 104 (2020) [arXiv:2005.03013 [hep-
|
| 1864 |
+
ph]].
|
| 1865 |
+
24
|
| 1866 |
+
|
G9AzT4oBgHgl3EQfxf6F/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
GdFIT4oBgHgl3EQfWysJ/content/2301.11240v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:8d07c6c4d8019ce7558bc4f7c31885615c2d3a16a36283af10fa3cf986440b3a
|
| 3 |
+
size 1119430
|
GtFAT4oBgHgl3EQftR52/content/2301.08663v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b47189ec99c16168c721b6e3324cbee377cf8a9912476498cd3e1b929322881d
|
| 3 |
+
size 188892
|
GtFAT4oBgHgl3EQftR52/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c490381f8e57ec78a8f9df4560ce522c3a7a700d888381102a1bc28b97a7d5a5
|
| 3 |
+
size 1835053
|
GtFAT4oBgHgl3EQftR52/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:ae0ef3568b437e6de5835e95c65183698118060d61452310f0272b8a7dcb2f2b
|
| 3 |
+
size 77716
|
INE1T4oBgHgl3EQfXwS1/content/tmp_files/2301.03131v1.pdf.txt
ADDED
|
@@ -0,0 +1,1508 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.03131v1 [math.AT] 9 Jan 2023
|
| 2 |
+
INTRINSIC CONVERGENCE OF THE HOMOLOGICAL TAYLOR TOWER FOR
|
| 3 |
+
r-IMMERSIONS IN Rn
|
| 4 |
+
GREGORY ARONE AND FRANJO ˇSARˇCEVI´C
|
| 5 |
+
Abstract. For an integer r ≥ 2, the space of r-immersions of M in Rn is defined to be the
|
| 6 |
+
space of immersions of M in Rn such that at most r − 1 points of M are mapped to the same
|
| 7 |
+
point in Rn. The space of r-immersions lies “between” the embeddings and the immersions.
|
| 8 |
+
We calculate the connectivity of the layers in the homological Taylor tower for the space of r-
|
| 9 |
+
immersions in Rn (modulo immersions), and give conditions that guarantee that the connectivity
|
| 10 |
+
of the maps in the tower approaches infinity as one goes up the tower. We also compare the
|
| 11 |
+
homological tower with the homotopical tower, and show that up to degree 2r − 1 there is a
|
| 12 |
+
“Hurewicz isomorphism” between the first non-trivial homotopy groups of the layers of the two
|
| 13 |
+
towers.
|
| 14 |
+
Contents
|
| 15 |
+
1.
|
| 16 |
+
Introduction
|
| 17 |
+
1
|
| 18 |
+
2.
|
| 19 |
+
Prerequisites
|
| 20 |
+
5
|
| 21 |
+
2.1.
|
| 22 |
+
Cubical diagrams
|
| 23 |
+
5
|
| 24 |
+
2.2.
|
| 25 |
+
Manifold calculus of functors
|
| 26 |
+
6
|
| 27 |
+
2.3.
|
| 28 |
+
Spectra
|
| 29 |
+
9
|
| 30 |
+
3.
|
| 31 |
+
The homological Taylor tower for reduced r-immersions in Rn
|
| 32 |
+
12
|
| 33 |
+
4.
|
| 34 |
+
r-configuration spaces in Rn as complements of subspace arrangements
|
| 35 |
+
13
|
| 36 |
+
5.
|
| 37 |
+
Total fiber of a retractive cubical diagram
|
| 38 |
+
16
|
| 39 |
+
6.
|
| 40 |
+
The cube of r-configuration spaces is retractive
|
| 41 |
+
18
|
| 42 |
+
7.
|
| 43 |
+
Connectivity of the cube of (co)homologies of r-configuration spaces
|
| 44 |
+
19
|
| 45 |
+
8.
|
| 46 |
+
Convergence result
|
| 47 |
+
22
|
| 48 |
+
9.
|
| 49 |
+
Comparing with the unstable tower
|
| 50 |
+
23
|
| 51 |
+
10.
|
| 52 |
+
Further questions
|
| 53 |
+
26
|
| 54 |
+
References
|
| 55 |
+
27
|
| 56 |
+
1. Introduction
|
| 57 |
+
Let M be a smooth manifold of dimension m, and fix an integer r ≥ 2. An r-immersion of M
|
| 58 |
+
in Rn is an immersion of M in Rn such that the preimage of every point in Rn contains at most
|
| 59 |
+
r − 1 points of M. The space of r-immersions of M in Rn is denoted by rImm(M, Rn). For
|
| 60 |
+
2020 Mathematics Subject Classification. Primary: 57R42; Secondary: 55R80, 57R40, 55P42.
|
| 61 |
+
Key words and phrases. calculus of functors, manifold calculus, Taylor tower, embeddings, immersions, r-
|
| 62 |
+
immersions, homotopy of spectra, homological convergence, partial configuration space.
|
| 63 |
+
Acknowledgements. F. ˇSarˇcevi´c was partially supported by the grant P20 01109 (JUNTA/FEDER, UE).
|
| 64 |
+
1
|
| 65 |
+
|
| 66 |
+
r = 2, 2-immersions are the same thing as injective immersions, which are essentially the same
|
| 67 |
+
as embeddings in nice cases. In any case, we have inclusions of subspaces
|
| 68 |
+
Emb(M, Rn) ⊆ 2 Imm(M, Rn) ⊂ 3 Imm(M, Rn) ⊂ · · · ⊂ rImm(M, Rn) ⊂ · · · ⊂ Imm(M, Rn).
|
| 69 |
+
In this paper we study the homological Taylor tower of the r-immersions functor. The “Taylor
|
| 70 |
+
tower” is meant in the sense of manifold calculus (also known as embedding calculus) developed
|
| 71 |
+
by Weiss [Wei99] and Goodwillie-Weiss [GW99].
|
| 72 |
+
The basic idea of manifold calculus is the following. In order to study the homotopy type of a space
|
| 73 |
+
such as rImm(M, Rn), one views it as a particular value of the presheaf rImm(−, Rn) defined on
|
| 74 |
+
M (one can also consider more general target manifolds than Rn, but we will content ourselves
|
| 75 |
+
with maps into Rn). A presheaf is a contravariant functor on the poset O(M) of open subsets
|
| 76 |
+
of M. Inside O(M) there is a sequence of subposets O1(M) ⊂ · · ·Ok(M) ⊂ · · · ⊂ O∞(M),
|
| 77 |
+
where Ok(M) is the poset of open subsets of M that are diffeomorphic to the disjoint union of
|
| 78 |
+
at most k copies of Rm. By restricting a presheaf F to Ok(M) and then extrapolating back to
|
| 79 |
+
O(M) one obtains a tower of approximations to F, which is usually denoted as follows
|
| 80 |
+
F → (T∞F → · · · → TkF → Tk−1F → · · · T0F).
|
| 81 |
+
This is called the “Taylor tower” of F. Manifold calculus, and the Taylor tower in particular, has
|
| 82 |
+
had many consequences and applications [Mun05], [Vol06], [ALV07], [Mun11], [DH12], [ST16],
|
| 83 |
+
[BdBW18].
|
| 84 |
+
In this paper we investigate the Taylor tower that calculates the homology of the space rImm(M, Rn).
|
| 85 |
+
In practice, this means the following. First of all, it is convenient to replace the space of r-
|
| 86 |
+
immersions with r-immersions modulo immersions. Let us suppose that we fix a basepoint in
|
| 87 |
+
Imm(M, Rn), and let rImm(M, Rn) be the homotopy fiber of the inclusion map rImm(M, Rn) →
|
| 88 |
+
Imm(M, Rn). Let HZ denote the Eilenberg-MacLane spectrum. We are interested in the Taylor
|
| 89 |
+
tower of the presheaf of Spectra, defined by the formula
|
| 90 |
+
U �→ HZ ∧ rImm(U, Rn).
|
| 91 |
+
(more precise definitions are given in Section 2).
|
| 92 |
+
Our main result concerns the rate of convergence of the Taylor tower of this functor.
|
| 93 |
+
The
|
| 94 |
+
question of convergence is a fundamental one.
|
| 95 |
+
We will distinguish between two aspects of
|
| 96 |
+
convergence: how strongly the tower converges to its limit, and what it converges to. We will
|
| 97 |
+
say that the Taylor tower of a functor F converges intrinsically at M if the connectivity of the
|
| 98 |
+
map TkF(M) → Tk−1F(M) approaches ∞ as k approaches ∞. We say that the Taylor tower
|
| 99 |
+
of F converges strongly to F(M) if the connectivity of the map F(M) → TkF(M) approaches
|
| 100 |
+
∞ as k approaches ∞. Strong convergence implies intrinsic convergence, but the converse does
|
| 101 |
+
not have to be true. In practice it seems that for “natural” functors that we know, whenever the
|
| 102 |
+
Taylor tower of F converges intrinsically, it converges strongly to F. But intrinsic convergence
|
| 103 |
+
is usually much easier to prove than strong convergence.
|
| 104 |
+
Before we state our main result, let us recall, for context, that one of the deepest results in
|
| 105 |
+
functor calculus is the Goodwillie-Klein-Weiss convergence theorem [GW99], [GK08], [GK15].
|
| 106 |
+
Theorem 1.1 (Convergence of the Taylor tower for spaces of embeddings). If M is a smooth
|
| 107 |
+
closed manifold of dimension m, and N is a smooth manifold of dimension n, then the map
|
| 108 |
+
Emb(M, N) → Tk Emb(M, N)
|
| 109 |
+
2
|
| 110 |
+
|
| 111 |
+
is
|
| 112 |
+
k(n − m − 2) + 1 − m-connected.
|
| 113 |
+
In particular, if n−m−2 > 0, then the connectivities grow with k and the Taylor tower therefore
|
| 114 |
+
converges strongly to Emb(M, N).
|
| 115 |
+
There is an easier, but also important convergence result for the homological version of the tower,
|
| 116 |
+
which is more directly relevant to this paper. Define Emb(M, Rn) to be the homotopy fiber of
|
| 117 |
+
the inclusion Emb(M, Rn) → Imm(M, Rn). Consider the contravariant functor from O(M) to
|
| 118 |
+
Spectra that sends U to HZ ∧ Emb(U, Rn). This functor represents the homology of the space
|
| 119 |
+
of embeddings modulo immersions. The Taylor tower of this functor is known to converge when
|
| 120 |
+
n > 2m + 1 [Wei04].
|
| 121 |
+
Now let us state our main result
|
| 122 |
+
Theorem 1.2. Let M be m-dimensional. Assume that n ≥ 2. If r ≤ n + 1, the Taylor tower
|
| 123 |
+
for HZ ∧ rImm(M, Rn) converges intrinsically when
|
| 124 |
+
n > rm + 1
|
| 125 |
+
r − 1 .
|
| 126 |
+
If r ≥ n + 1 then the Taylor tower converges intrinsically when n > m + 1.
|
| 127 |
+
Remarks 1.3.
|
| 128 |
+
(1) When r = n + 1 the two statements are equivalent.
|
| 129 |
+
Indeed, the function f(n) =
|
| 130 |
+
n2 − nm − m − 1, n ∈ N, is positive only for n > m + 1.
|
| 131 |
+
(2) When r = 2 we get the condition n > 2m + 1, which is the known condition for the
|
| 132 |
+
convergence of the Taylor tower of HZ ∧ Emb(M, Rn).
|
| 133 |
+
(3) The condition n > rm+1
|
| 134 |
+
r−1 is equivalent to rm−(r−1)n < −1. The number rm−(r−1)n
|
| 135 |
+
equals, at least when it is positive, to the dimension of the intersection of r copies of Rm
|
| 136 |
+
embedded in Rn in a general position.
|
| 137 |
+
Next let us discuss the proof. Let F be a presheaf defined on a suitable category of m-dimensional
|
| 138 |
+
manifolds and codimension zero embeddings. The basic building blocks in the construction of
|
| 139 |
+
the Taylor tower of F are spaces of the form F(�
|
| 140 |
+
i Rm), for i = 0, 1, 2, . . .. The homotopy fiber
|
| 141 |
+
of the map TkF → Tk−1F depends on the total homotopy fiber of the following cubical diagram,
|
| 142 |
+
indexed by the poset of subsets of k = {1, . . . , k}:
|
| 143 |
+
(1)
|
| 144 |
+
S �→ F
|
| 145 |
+
|
| 146 |
+
�
|
| 147 |
+
k\S
|
| 148 |
+
Rm
|
| 149 |
+
|
| 150 |
+
|
| 151 |
+
This homotopy fiber is sometimes called the k-th derivative (or the k-th cross-effect) of F at
|
| 152 |
+
∅. The following fact is particularly important for analysing intrinsic convergence. Recall that a
|
| 153 |
+
cubical diagram is called c-cartesian if the map from the initial object to the homotopy limit of the
|
| 154 |
+
rest of the cubical diagram is c-connected. Suppose the cubical diagram (1) is ck-cartesian. Then
|
| 155 |
+
the map TkF(M) → Tk−1F(M) is ck − mk-connected. Thus the Taylor tower of F converges
|
| 156 |
+
intrinsically at M if the number ck − mk approaches ∞ as k approaches ∞.
|
| 157 |
+
When F(M) = Emb(M, Rn), there is a well-known equivalence Emb(�
|
| 158 |
+
k Rm, Rn) ≃ Conf(k, Rn),
|
| 159 |
+
where Conf(k, Rn) is the configuration space of ordered k-tuples of pairwise distinct points in Rn.
|
| 160 |
+
3
|
| 161 |
+
|
| 162 |
+
Similarly, there is an equivalence between rImm(�
|
| 163 |
+
k Rm, Rn) and the so-called r-configuration
|
| 164 |
+
space, also called no r-equal configuration space, defined by
|
| 165 |
+
rConf(k, Rn) := rImm(k, Rn).
|
| 166 |
+
This is the space of ordered k-tuples of points in Rn where at most r −1 are allowed to be equal.
|
| 167 |
+
A proof of the equivalence
|
| 168 |
+
rImm(
|
| 169 |
+
�
|
| 170 |
+
k
|
| 171 |
+
Rm, Rn)
|
| 172 |
+
≃−→ rConf(k, Rn)
|
| 173 |
+
is given in [AˇS22]. Thus r-configuration spaces are basic building blocks in the Taylor tower of
|
| 174 |
+
rImm(M, Rn).
|
| 175 |
+
To analyse the intrinsic convergence of the Taylor tower of the functor HZ ∧ rImm(−, Rn), one
|
| 176 |
+
needs to calculate how cartesian the following k-dimensional cubical diagram is
|
| 177 |
+
(2)
|
| 178 |
+
S �→ HZ ∧ rConf(k \ S, Rn).
|
| 179 |
+
The space rConf(i, Rn) is the complement of a subspace arrangement in Rni. It follows that the
|
| 180 |
+
homology of r-configuration spaces is accessible by means of the Goresky-MacPherson formula
|
| 181 |
+
and other such tools. The homology of r-configuration spaces was studied by a number of people,
|
| 182 |
+
starting with Bj¨orner and Welker [BW95].
|
| 183 |
+
Using the Goresky-MacPherson formula and the results in [BW95] we prove the following result
|
| 184 |
+
(it is combining Proposition 7.7 and Theorem 8.1)
|
| 185 |
+
Theorem 1.4. When r ≤ n + 1, the cube (2) is k(n − 1) +
|
| 186 |
+
� k
|
| 187 |
+
r
|
| 188 |
+
�
|
| 189 |
+
(r − n − 1)-cartesian, and the
|
| 190 |
+
map
|
| 191 |
+
pk : TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn)
|
| 192 |
+
is
|
| 193 |
+
k
|
| 194 |
+
�
|
| 195 |
+
nr − 1
|
| 196 |
+
r
|
| 197 |
+
− m − 1
|
| 198 |
+
r
|
| 199 |
+
�
|
| 200 |
+
− (k mod r)
|
| 201 |
+
r
|
| 202 |
+
(r − n − 1)-connected.
|
| 203 |
+
Here (k mod r) := k − r
|
| 204 |
+
� k
|
| 205 |
+
r
|
| 206 |
+
�
|
| 207 |
+
.
|
| 208 |
+
When r ≥ n + 1, the cube (2) is k(n − 1) + r − n − 1-cartesian, and the map pk is
|
| 209 |
+
k(n − m − 1) + r − n − 1-connected.
|
| 210 |
+
Theorem 1.2 follows easily from Theorem 1.4.
|
| 211 |
+
In Section 9 we compare the tower of the homological functor HZ ∧ rImm(M, Rn) with that of
|
| 212 |
+
the tower of the homotopical functor rImm(M, Rn). Let us suppose that we chose a basepoint in
|
| 213 |
+
the space rImm(M, Rn). In this case the presheaf rImm(−, Rn) takes values in pointed spaces,
|
| 214 |
+
and we have the following diagram of presheaves:
|
| 215 |
+
(3)
|
| 216 |
+
rImm(−, Rn)
|
| 217 |
+
i←− rImm(−, Rn)
|
| 218 |
+
h−→ Ω∞HZ ∧ rImm(−, Rn).
|
| 219 |
+
It is well-known that the map i induces an equivalence of all layers except the first one. Indeed,
|
| 220 |
+
the map i is the homotopy fiber of the map from rImm(−, Rn) to its linear approximation. Thus
|
| 221 |
+
we can view the map h as a map from the higher layers/derivatives of rImm(−, Rn) to the
|
| 222 |
+
corresponding layers/derivatives of Ω∞HZ∧rImm(−, Rn), which are essentially the same as the
|
| 223 |
+
layers/derivatives of HZ ∧ rImm(−, Rn), since Ω∞ commutes with Taylor approximations.
|
| 224 |
+
4
|
| 225 |
+
|
| 226 |
+
When r = 2, the second derivative of rImm(−, Rn) is equivalent to Sn−1, and the second
|
| 227 |
+
derivative of HZ ∧ rImm(−, Rn) is HZ ∧ Sn−1. It follows that in the case r = 2, the map h
|
| 228 |
+
in (3) induces the Hurewicz homomorphism from the second derivatives of rImm(−, Rn) to the
|
| 229 |
+
second derivative of HZ ∧ rImm(−, Rn). In particular, it follows that the connectivity of the
|
| 230 |
+
quadratic layers of the Taylor towers of rImm(−, Rn) and of HZ ∧ rImm(−, Rn) is the same,
|
| 231 |
+
and their first non-trivial homotopy groups are isomorphic.
|
| 232 |
+
By contrast, at degrees higher than 2, the layers of the homotopical tower rImm(−, Rn) and of
|
| 233 |
+
the homological tower of the functor HZ ∧ rImm(−, Rn) have different connectivities, and there
|
| 234 |
+
is no Hurewicz type isomorphism between them.
|
| 235 |
+
And again by contrast, in Section 9 we show that for r > 2 the map h in diagram (3) induces
|
| 236 |
+
a Hurewicz type isomorphism between first non-trivial homotopy groups of layers roughly up to
|
| 237 |
+
degree 2r − 1. See Theorem 9.1 for precise statement.
|
| 238 |
+
Organization of the paper. In Section 2 we review some background material on cubical diagrams,
|
| 239 |
+
manifold calculus and spectra. In Section 3 we introduce the homological Taylor tower that is
|
| 240 |
+
the main subject of this paper.
|
| 241 |
+
In Section 4 we make an excursion into the subspace arrangements. We describe r-configuration
|
| 242 |
+
spaces via subspace arrangements and compute their cohomology using the Goresky-MacPherson
|
| 243 |
+
theorem.
|
| 244 |
+
In Section 5 we define the notion of a retractive cubical diagram. This is a diagram where the
|
| 245 |
+
maps have sections that satisfy a certain hypothesis. We prove that the homotopy groups of
|
| 246 |
+
the total homotopy fiber of a retractive cube are isomorphic to the total kernel of the cube of
|
| 247 |
+
homotopy groups.
|
| 248 |
+
In Section 6 we prove that the cube of r-configuration spaces that controls the layers in the Taylor
|
| 249 |
+
tower is retractive. In Section 7 we prove our main result about the homological connectivity
|
| 250 |
+
of the cube of r-configuration spaces. In Section 8 we prove the main result about the intrinsic
|
| 251 |
+
convergence of the Taylor tower of HZ ∧ rImm(M, Rn).
|
| 252 |
+
In Section 9 we compare the tower of HZ ∧ rImm(M, Rn) with the tower of rImm(M, Rn) in
|
| 253 |
+
low degrees. We prove that the layers in the two towers have the same connectivity up to degree
|
| 254 |
+
2r − 1 (with some exceptions in the cases r = 2, 3).
|
| 255 |
+
In Section 10 we discuss some possible directions for further exploration.
|
| 256 |
+
2. Prerequisites
|
| 257 |
+
2.1. Cubical diagrams. Cubical diagrams play an important role in functor calculus, and in this
|
| 258 |
+
paper in particular, so we will recall a few elementary facts about them. All the results in this
|
| 259 |
+
subsection, and much more, can be found in [Goo92].
|
| 260 |
+
Let k denote the standard set with k elements {1, . . . , k}. Let P(k), or just P(k), denote the
|
| 261 |
+
poset of subsets of k. A k-dimensional cubical diagram in a category C is a functor χ: P → C.
|
| 262 |
+
It is easy to see that P(k) is equivalent to P(k)op, so a contravariant functor from P(k) to C is
|
| 263 |
+
called a cubical diagram as well. We will mostly consider cubical diagrams in (pointed) spaces
|
| 264 |
+
and spectra, and also in abelian groups.
|
| 265 |
+
5
|
| 266 |
+
|
| 267 |
+
Given a cubical diagram χ in topological spaces or spectra, there is a natural map
|
| 268 |
+
iχ : χ(∅) → holim
|
| 269 |
+
∅̸=S⊂k χ(S).
|
| 270 |
+
We say that χ is c-cartesian, if this map is c-connected. The homotopy fiber of this map is called
|
| 271 |
+
the total homotopy fiber of χ. The total homotopy fiber of χ is denoted by tfiber(χ). Clearly if
|
| 272 |
+
χ is c-cartesian then tfiber(χ) is c−1-connected. The converse always holds for cubical diagrams
|
| 273 |
+
of spectra, and it holds for spaces under the additional assumption that iχ is surjective on path
|
| 274 |
+
components.
|
| 275 |
+
One can identify a k-dimensional cubical diagram with a map of two k − 1-dimensional cubical
|
| 276 |
+
diagrams. Given a k-dimensional cubical diagram χ, let us define two k − 1-dimensional cubical
|
| 277 |
+
diagrams χ1 and χ2 as follows: χ1(U) = χ(U), and χ2(U) = χ(U ∪ {k}). Then χ can be
|
| 278 |
+
identified with the map of cubes χ1 → χ2. Furthermore, there is a homotopy fibration sequence
|
| 279 |
+
whose meaning is that total homotopy fiber can be calculated as an iterated homotopy fiber
|
| 280 |
+
tfiber(χ) ≃ hofiber(tfiber(χ1) → tfiber(χ2)).
|
| 281 |
+
When χ is a cubical diagram of abelian groups, we de��ne the total kernel of χ to be
|
| 282 |
+
tkernel(χ) := ker(χ(∅) →
|
| 283 |
+
k
|
| 284 |
+
�
|
| 285 |
+
i=1
|
| 286 |
+
χ({i})).
|
| 287 |
+
Just as with total fibers, the total kernel can be calculated as an iterated kernel. There is a
|
| 288 |
+
natural isomorphism
|
| 289 |
+
tkernel(χ) ∼= ker(tkernel(χ1) → tkernel(χ2)).
|
| 290 |
+
When χ is a cubical diagram of spaces or spectra, there is a natural homomorphism of graded
|
| 291 |
+
groups
|
| 292 |
+
π∗(tfiber χ) → tkernel(π∗χ).
|
| 293 |
+
This homomorphism is not an isomorphism in general. In Section 5 we will investigate a condition
|
| 294 |
+
on a cubical diagram that guarantees for it to be an isomorphism.
|
| 295 |
+
2.2. Manifold calculus of functors. Let M be a smooth manifold of dimension m. Define
|
| 296 |
+
O(M) to be the poset category of open subsets of M. Objects of O(M) are open sets U ⊆ M,
|
| 297 |
+
and morphisms U → V are the inclusions U ⊆ V .
|
| 298 |
+
Manifold calculus of functors, developed by Weiss [Wei99] and Goodwillie-Weiss [GW99], studies
|
| 299 |
+
contravariant functors from O(M) to a category that supports a reasonable notion of homo-
|
| 300 |
+
topy. In their foundational papers, Goodwillie and Weiss only considered functors with values in
|
| 301 |
+
topological spaces, and maybe spectra. Nowadays it is natural to let the target category to be
|
| 302 |
+
an ∞-category. We will content ourselves with functors with values in (pointed) spaces and in
|
| 303 |
+
spectra.
|
| 304 |
+
Technically speaking, manifold calculus applies to functors that are good, in the sense that they
|
| 305 |
+
satisfy the following two conditions:
|
| 306 |
+
(i) they are isotopy functors, and
|
| 307 |
+
(ii) they are finitary.
|
| 308 |
+
A functor is an isotopy functor if it takes isotopy equivalences to weak homotopy equivalences
|
| 309 |
+
(for the definition of isotopy equivalence see [MV15, Definition 10.2.2]). It is finitary if for every
|
| 310 |
+
6
|
| 311 |
+
|
| 312 |
+
monotone union �
|
| 313 |
+
i Ui (where Ui ⊂ Ui+1 for i = 1, 2, ...) the canonical map from F(�
|
| 314 |
+
i Ui) to
|
| 315 |
+
holimi F(Ui) is a weak homotopy equivalence.
|
| 316 |
+
If F is a ”half-good” contravariant functor (cofunctor), i.e. an isotopy functor which is not a
|
| 317 |
+
finitary functor, then we need to tame this functor. We call V ∈ O(M) tame if V is the interior
|
| 318 |
+
of a compact smooth codimension zero submanifold of M. As mentioned in [GKW01], property
|
| 319 |
+
(ii) ensures that a good cofunctor F on O(M) is essentially determined by its behavior on tame
|
| 320 |
+
open subsets of M.
|
| 321 |
+
In particular, suppose F is a cofunctor from O(M) to Top having property (i). Then the functor
|
| 322 |
+
defined by
|
| 323 |
+
F #(V ) := holimtame U⊂V F(U)
|
| 324 |
+
for V ∈ O(M) has also property (ii), i.e. F # is a good cofunctor on O(M). We call F # the
|
| 325 |
+
taming of F.
|
| 326 |
+
There exists a natural transformation F → F #. The map F(V ) → F #(V ) is an equivalence
|
| 327 |
+
whenever either F or V is tame.
|
| 328 |
+
The motivating example for the development of the manifold calculus of functors is the embedding
|
| 329 |
+
functor.
|
| 330 |
+
Definition 2.1. (Space of embeddings) Let M and N be smooth manifolds.
|
| 331 |
+
• A smooth embedding of M in N is a smooth map f : M → N such that
|
| 332 |
+
1. the map of tangent spaces
|
| 333 |
+
Dxf : TxM → Tf(x)N
|
| 334 |
+
is an injection for all x ∈ M, i.e. the derivative of f is a fiberwise injection, and
|
| 335 |
+
2. f : M → f(M) is a homeomorphism.
|
| 336 |
+
• The space of embeddings, Emb(M, N), is the subspace of the space of smooth maps
|
| 337 |
+
from M to N consisting of smooth embeddings of M in N. The space Emb(M, N) is
|
| 338 |
+
topologized using Whitney C∞-topology; for an explanation see [MV15, Appendix A.2.2]).
|
| 339 |
+
An important example of a space of embeddings with very rich theory is the space of classical
|
| 340 |
+
knots defined to be the space Emb(S1, R3).
|
| 341 |
+
Definition 2.2. (Embedding functor)
|
| 342 |
+
For a smooth n-dimensional manifold N, the embedding functor Emb(−, N) : O(M) → Top is
|
| 343 |
+
a contravariant functor given by U �→ Emb(U, N).
|
| 344 |
+
The contravariance follows from the fact that an inclusion of open subsets of a manifold M gives
|
| 345 |
+
a restriction map of embedding spaces of manifolds.
|
| 346 |
+
A related notion is the space of immersions Imm(M, N), which is a space of smooth maps
|
| 347 |
+
f : M → N such that just the derivative of f is a fiberwise injection, (property 1.
|
| 348 |
+
from
|
| 349 |
+
Definition 2.1). If M is a compact manifold and f is an injective immersion M → N, then f is
|
| 350 |
+
an embedding.
|
| 351 |
+
The corresponding functor is the immersion functor Imm(−, N) : O(M) → Top given by
|
| 352 |
+
U �→ Imm(U, N).
|
| 353 |
+
Functors Emb(−, N) and Imm(−, N) are examples of good functors (see [Wei99] and [GKW01]).
|
| 354 |
+
7
|
| 355 |
+
|
| 356 |
+
The idea of the manifold calculus of functors is to approximate a good functor with simpler,
|
| 357 |
+
polynomial functors.
|
| 358 |
+
Definition 2.3. (Polynomial functor)
|
| 359 |
+
A good contravariant functor F : O(M) → Top is called polynomial of degree ≤ k if for all
|
| 360 |
+
U ∈ O(M) and for all pairwise disjoint closed subsets A0, ..., Ak ⊂ U, the (k + 1)-cube
|
| 361 |
+
P(k + 1) → Top
|
| 362 |
+
S �→ F(U −
|
| 363 |
+
�
|
| 364 |
+
i∈S
|
| 365 |
+
Ai)
|
| 366 |
+
is homotopy cartesian; equivalently, the map F(U) → holimS̸=∅ F(U − �
|
| 367 |
+
i∈S Ai) is a homotopy
|
| 368 |
+
equivalence. Here P(k + 1) is the poset category of all subsets of the set k + 1 = {1, ..., k + 1}
|
| 369 |
+
with ⊂ as the relation of partial order. Its shape is an (k + 1)-dimensional cubical diagram.
|
| 370 |
+
It is well known that a polynomial f : R → R of degree k such that f(0) = 0 is uniquely
|
| 371 |
+
determined by its values on k distinct points. In analogy, a polynomial functor is completely
|
| 372 |
+
determined by its values on the category of at most k open discs.
|
| 373 |
+
[Mun10] provides more
|
| 374 |
+
analogies between the ordinary calculus of functions and the manifold calculus of functors.
|
| 375 |
+
More precisely, let Ok(M) be the full subcategory of M consisting of open subsets of M diffeo-
|
| 376 |
+
morphic to ≤ k disjoint discs. We have the following theorem due to Weiss ([Wei99, Theorem
|
| 377 |
+
5.1]).
|
| 378 |
+
Theorem 2.4. Suppose F, G : O(M) −→ Top are good functors that are polynomials of degree
|
| 379 |
+
≤ k. If T : F → G is a natural transformation that is an equivalence for all U ∈ Ok(M), then
|
| 380 |
+
T is an equivalence for all U ∈ O(M).
|
| 381 |
+
Example 2.5.
|
| 382 |
+
• The functor U �→ Imm(U, N) is a polynomial of degree ≤ 1.
|
| 383 |
+
• The functor U �→ Emb(U, N) is not a polynomial of degree ≤ k for any k.
|
| 384 |
+
For the details, see [MV15, Example 10.2.10], [Wei99, Example 2.3], [Mun10, Examples 4.7 and
|
| 385 |
+
4.8].
|
| 386 |
+
Definition 2.6. (Polynomial approximations)
|
| 387 |
+
For a good functor F, define for each U ∈ O(M) the kth polynomial approximation of F to be
|
| 388 |
+
TkF(U) = holimV ∈Ok(U) F(V ).
|
| 389 |
+
As Weiss proved in [Wei99, Theorems 3.9. and 6.1], such defined TkF is polynomial of degree
|
| 390 |
+
≤ k. Also, higher derivatives of such defined polynomial functors vanish and derivatives of a
|
| 391 |
+
functor and derivatives of its kth polynomial approximation agree up to kth degree, where the
|
| 392 |
+
derivatives of functors are defined as follows:
|
| 393 |
+
Definition 2.7. (Derivative of a functor)
|
| 394 |
+
Let Dm
|
| 395 |
+
1 , ..., Dm
|
| 396 |
+
k be pairwise disjoint open discs in M. Define a k-cube of spaces by the rule
|
| 397 |
+
S �→ F(�
|
| 398 |
+
i/∈S Dm
|
| 399 |
+
i ). We define the kth derivative of F at the empty set, denoted F (k)(∅), to be
|
| 400 |
+
the total homotopy fiber of the cube S �→ F(�
|
| 401 |
+
i/∈S Dm
|
| 402 |
+
i ).
|
| 403 |
+
8
|
| 404 |
+
|
| 405 |
+
For example, the 1st derivative of embeddings are immersions. Also, the linearization of the space
|
| 406 |
+
of embeddings is the space of immersions, namely there exists an equivalence T1 Emb(−, N) ≃
|
| 407 |
+
Imm(−, N) ([Wei99]).
|
| 408 |
+
For more details and intuition behind this, see Munson’s survey [Mun10]. For other relevant
|
| 409 |
+
results, see [MV15, Theorem 10.2.16] and [Wei99].
|
| 410 |
+
The inclusion Ok−1(U) → Ok(U) induces a map TkF(U) → Tk−1F(U) and so we obtain a tower
|
| 411 |
+
of functors, called the manifold calculus Taylor tower of F:
|
| 412 |
+
(4)
|
| 413 |
+
F(−)
|
| 414 |
+
�❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥
|
| 415 |
+
�
|
| 416 |
+
�▼
|
| 417 |
+
▼
|
| 418 |
+
▼
|
| 419 |
+
▼
|
| 420 |
+
▼
|
| 421 |
+
▼
|
| 422 |
+
▼
|
| 423 |
+
▼
|
| 424 |
+
▼
|
| 425 |
+
▼
|
| 426 |
+
�❳
|
| 427 |
+
❳
|
| 428 |
+
❳
|
| 429 |
+
❳
|
| 430 |
+
❳
|
| 431 |
+
❳
|
| 432 |
+
❳
|
| 433 |
+
❳
|
| 434 |
+
❳
|
| 435 |
+
❳
|
| 436 |
+
❳
|
| 437 |
+
❳
|
| 438 |
+
❳
|
| 439 |
+
❳
|
| 440 |
+
❳
|
| 441 |
+
❳
|
| 442 |
+
❳
|
| 443 |
+
❳
|
| 444 |
+
❳
|
| 445 |
+
❳
|
| 446 |
+
❳
|
| 447 |
+
❳
|
| 448 |
+
❳
|
| 449 |
+
❳
|
| 450 |
+
❳
|
| 451 |
+
❳
|
| 452 |
+
❳
|
| 453 |
+
❳
|
| 454 |
+
❳
|
| 455 |
+
❳
|
| 456 |
+
❳
|
| 457 |
+
T0F(−)
|
| 458 |
+
· · ·
|
| 459 |
+
�
|
| 460 |
+
Tk−1F(−)
|
| 461 |
+
�
|
| 462 |
+
TkF(−)
|
| 463 |
+
�
|
| 464 |
+
· · ·
|
| 465 |
+
�
|
| 466 |
+
T∞F(−)
|
| 467 |
+
�
|
| 468 |
+
Here T∞F denotes the homotopy inverse limit of this tower. TkF is also called the kth stage of
|
| 469 |
+
the Tower.
|
| 470 |
+
By evaluating diagram (4) on U ∈ O(M), we get a diagram of spaces with maps between the
|
| 471 |
+
stages that are fibrations. In particular, we can set U = M.
|
| 472 |
+
Definition 2.8. (Layer)
|
| 473 |
+
Define the kth layer of the manifold calculus Taylor tower of F to be the homotopy fiber of the
|
| 474 |
+
map between two successive stages of the tower, that is,
|
| 475 |
+
LkF = hofiber(TkF → Tk−1F).
|
| 476 |
+
We need to work here with a based Taylor tower. It can be accomplished by choosing a basepoint
|
| 477 |
+
in the space F(M) which then also bases the spaces TkF(U) for all k and U.
|
| 478 |
+
One of the fundamental results, which is a consequence of the Classification of homogeneous
|
| 479 |
+
functors theorem ([Wei99, Theorem 8.5], see also [MV15, Theorem 10.2.23 and Proposition
|
| 480 |
+
10.2.26]) is the following
|
| 481 |
+
Proposition 2.9. For a good functor F defined on m-dimensional manifolds, if the cube
|
| 482 |
+
S �→ F
|
| 483 |
+
|
| 484 |
+
�
|
| 485 |
+
k\S
|
| 486 |
+
Dm
|
| 487 |
+
|
| 488 |
+
|
| 489 |
+
is ck-cartesian, then the map TkF(M) → Tk−1F(M) is ck − km-connected. More generally, if
|
| 490 |
+
U has handle dimension j, then the map TkF(U) → Tk−1F(U) is (ck − kj)-connected.
|
| 491 |
+
For the definition of handle dimension, see [MV15, Appendix A.2.1].
|
| 492 |
+
It follows that the Taylor tower of F converges intrinsically at M if the number ck−mk approaches
|
| 493 |
+
∞ as k approaches ∞.
|
| 494 |
+
2.3. Spectra. The subject of this paper is a functor that represents homology. We had a choice
|
| 495 |
+
between working with chain complexes and the singular chains functor, or working with spectra
|
| 496 |
+
and using smash product with the Eilenberg-MacLane spectrum to represent homology. We chose
|
| 497 |
+
the latter.
|
| 498 |
+
9
|
| 499 |
+
|
| 500 |
+
We adopt a naive, old-fashioned view of spectra as sequences of spaces equipped with structure
|
| 501 |
+
maps between them.
|
| 502 |
+
Definition 2.10. (Spectrum)
|
| 503 |
+
A spectrum E is a sequence of based spaces {En}n∈N0 together with basepoint-preserving maps
|
| 504 |
+
(called structure maps)
|
| 505 |
+
(5)
|
| 506 |
+
ΣEn → En+1,
|
| 507 |
+
or, equivalently, the maps
|
| 508 |
+
(6)
|
| 509 |
+
En → ΩEn+1,
|
| 510 |
+
where Σ and Ω denote suspension and loop space, respectively.
|
| 511 |
+
If the maps (6) are weak equivalences, then E is called an Ω-spectrum.
|
| 512 |
+
Each En from an
|
| 513 |
+
Ω-spectrum is called an infinite loop space.
|
| 514 |
+
Example 2.11. (Eilenberg-MacLane spectrum)
|
| 515 |
+
Let n be an arbitrary positive integer and G be an arbitrary group, abelian for n > 1. Then there
|
| 516 |
+
exists a CW complex X such that
|
| 517 |
+
(7)
|
| 518 |
+
πn(X) ∼= G and πk(X) is trivial for k ̸= n.
|
| 519 |
+
A topological space X with property (7) is called an Eilenberg-MacLane space K(G, n). For
|
| 520 |
+
example, K(Z, 1) ≃ S1.
|
| 521 |
+
For an abelian group G, the Eilenberg-MacLane spectrum, denoted by HG, is defined to be the
|
| 522 |
+
spectrum {En}n∈N0 with En = K(G, n + 1) and maps
|
| 523 |
+
(8)
|
| 524 |
+
K(G, n + 1) → ΩK(G, n + 2).
|
| 525 |
+
The maps (8) are weak equivalences, hence HG is an Ω-spectrum.
|
| 526 |
+
Since for a spectrum E there exist maps
|
| 527 |
+
πi+n(En) → πi+n+1(En+1)
|
| 528 |
+
(for details, see [Hat02, Section 4.F]), it makes sense to define the ith homotopy group of the
|
| 529 |
+
spectrum E as
|
| 530 |
+
πi(E) = colimn πi+n(En).
|
| 531 |
+
Definition 2.12. A map of spectra f : E → F is a collection of maps
|
| 532 |
+
fn : En → Fn, n ≥ 0
|
| 533 |
+
that commute with the structure maps in E = {En} and F = {Fn}.
|
| 534 |
+
Taking spectra as objects and maps of spectra as morphisms we can define the category of
|
| 535 |
+
spectra. It is denoted by Spectra.
|
| 536 |
+
A spectrum can be smashed with a pointed space.
|
| 537 |
+
Definition 2.13. Let E = {En} be a spectrum and X be a based space. The spectrum E ∧ X
|
| 538 |
+
is defined by
|
| 539 |
+
(E ∧ X)n = En ∧ X.
|
| 540 |
+
10
|
| 541 |
+
|
| 542 |
+
Since Σ(En ∧ X) ∼= (ΣEn) ∧ X, the structure maps in the spectrum E ∧ X are the products of
|
| 543 |
+
structure maps in E and the identity map. For a spectrum E∧X the homotopy groups πi(E∧X)
|
| 544 |
+
are the groups colimn πi+n(En∧X). These groups define a generalized reduced homology theory,
|
| 545 |
+
determined by E.
|
| 546 |
+
The following result is a consequence of Proposition 4F.2 in [Hat02]. See also [Whi62] for more
|
| 547 |
+
details on representing generalized homology theories with spectra.
|
| 548 |
+
Proposition 2.14. For the Eilenberg-MacLane spectrum HZ there exists an isomorphism
|
| 549 |
+
πi(X ∧ HZ) ∼= �Hi(X; Z).
|
| 550 |
+
If a spectrum E = {En}n≥0 is an Ω-spectrum, then πn(E) is
|
| 551 |
+
πn(E) =
|
| 552 |
+
�
|
| 553 |
+
πn(E0),
|
| 554 |
+
for n ≥ 0
|
| 555 |
+
π0(E−n),
|
| 556 |
+
for n ≤ 0
|
| 557 |
+
Let us note that smash product with a spectrum can be extended from pointed to unpointed
|
| 558 |
+
spaces.
|
| 559 |
+
Definition 2.15. Let E be a spectrum and X an unpointed space. Define the smash product
|
| 560 |
+
of E and X to be the homotopy fiber of the map
|
| 561 |
+
E ∧ X+ → E
|
| 562 |
+
induced by the canonical map X+ → S0.
|
| 563 |
+
For any choice of basepoint in X, there is a canonical equivalence between the new and the old
|
| 564 |
+
definition E ∧ X. But the new definition does not depend on a choice of basepoint. This is a
|
| 565 |
+
variant of the fact that reduced homology can be defined as relative homology to a basepoint,
|
| 566 |
+
but also can be defined independently of basepoint, using the augmented chain complex.
|
| 567 |
+
However, it is also important to note that without a choice of basepoint in X, there is no natural
|
| 568 |
+
map X → Ω∞HZ ∧ X representing the Hurewicz homomorphism. Such a map is defined only
|
| 569 |
+
with a choice of basepoint.
|
| 570 |
+
We can assume that each spectrum is an Ω-spectrum up to weak equivalence. Precisely, the
|
| 571 |
+
following result holds.
|
| 572 |
+
Proposition 2.16. Every spectrum is weakly equivalent to an Ω-spectrum.
|
| 573 |
+
If two spectra E and F are weak equivalent, we write E ≃ F.
|
| 574 |
+
Operation Σ∞ which assigns to a based space X its suspension spectrum Σ∞X, defined by
|
| 575 |
+
En = ΣnX with identities as structure maps, is a functor
|
| 576 |
+
Σ∞ : Top∗ → Spectra.
|
| 577 |
+
Its adjoint functor
|
| 578 |
+
Ω∞ : Spectra → Top∗
|
| 579 |
+
is defined to be the functor which takes a spectrum E = {En}n≥0, then replaces it by an
|
| 580 |
+
equivalent Ω-spectrum F = {Fn}n≥0 (which exists using proposition 2.16) and finally picks off
|
| 581 |
+
the first place F0. In short, Ω∞(E) = F0 where F = {Fn}n≥0 ≃ E. This F0 is an infinite loop
|
| 582 |
+
space, which explains the notation.
|
| 583 |
+
11
|
| 584 |
+
|
| 585 |
+
It follows from the results and comments above that nth homotopy group of a spectrum E equals
|
| 586 |
+
the nth homotopy group of the space Ω∞(E).
|
| 587 |
+
Finally, let us mention that in addition to the smash product of a spectrum with a space, there is
|
| 588 |
+
a very important notion of smash product of spectra. For our purposes, the most naive version
|
| 589 |
+
of the construction suffices. Given two spectra E = {En} and F = {Fn}, we define their smash
|
| 590 |
+
product E ∧ F by the formulas (E ∧ F)2n = En ∧ Fn, and (E ∧ F)2n+1 = En+1 ∧ Fn, with
|
| 591 |
+
the structure maps being induced from the structure maps in E and F in the obvious way. The
|
| 592 |
+
sphere spectrum is the unit (up to homotopy) for this smash product.
|
| 593 |
+
One feature of smash product of spectra that plays a role in this paper is that unlike smash
|
| 594 |
+
product of spaces, smash product with a fixed spectrum commutes with finite homotopy limits
|
| 595 |
+
of spectra. More generally, it commutes with homotopy limits over a category whose classifying
|
| 596 |
+
space is compact. This is discussed in some detail in [LRV03]. The significance for us is that
|
| 597 |
+
if F is a good presheaf of spectra on M, and E is a fixed spectrum, then there are natural
|
| 598 |
+
equivalences
|
| 599 |
+
E ∧ TkF ≃ TkE ∧ F
|
| 600 |
+
and
|
| 601 |
+
E ∧ LkF ≃ LkE ∧ F.
|
| 602 |
+
3. The homological Taylor tower for reduced r-immersions in Rn
|
| 603 |
+
The main goal of this paper is to give a convergence result about the homological Taylor tower
|
| 604 |
+
for the space of r-immersions of a smooth manifold M in Rn. As is often the case, when studying
|
| 605 |
+
the homological tower, it is convenient to replace the functor of r-immersions by r-immersions
|
| 606 |
+
��modulo immersions”. This enables us to express the layers in the Taylor tower in terms of
|
| 607 |
+
r-configuration spaces.
|
| 608 |
+
Let M be a smooth manifold. Assume that a basepoint in the space Imm(M, Rn) is chosen, and
|
| 609 |
+
therefore the functor U �→ Imm(U, Rn) is a presheaf of pointed spaces on M. Recall that for
|
| 610 |
+
U ⊂ M, rImm(U, Rn) denotes the homotopy fiber of the map rImm(U, Rn) → Imm(U, Rn).
|
| 611 |
+
Let HZ denote the Eilenberg-Mac Lane spectrum. The functor
|
| 612 |
+
X �→ HZ ∧ X
|
| 613 |
+
represents reduced homology, in the sense that there is a natural isomorphism
|
| 614 |
+
(9)
|
| 615 |
+
π∗(HZ ∧ X) ∼= �H∗(X; Z).
|
| 616 |
+
Furthermore, recall that the functor can be extended to unpointed spaces, by defining HZ ∧ X
|
| 617 |
+
for unpointed X to be the homotopy fiber of the map HZ ∧ X+ → HZ. In this paper we study
|
| 618 |
+
the following functor
|
| 619 |
+
HZ ∧ rImm(−, Rn):
|
| 620 |
+
O(M)
|
| 621 |
+
→
|
| 622 |
+
Spectra
|
| 623 |
+
U
|
| 624 |
+
�→
|
| 625 |
+
HZ ∧ rImm(U, Rn)
|
| 626 |
+
This functor is representing the homology of rImm(−, Rn).
|
| 627 |
+
12
|
| 628 |
+
|
| 629 |
+
Remark 3.1. Instead of using spectra and the functor HZ ∧ − to represent homology, we could
|
| 630 |
+
have used chain complexes and the singular chains functor. One reason for choosing spectra is
|
| 631 |
+
their topological nature. The category of spectra, and of HZ-module spectra, is tensored and
|
| 632 |
+
cotensored over topological spaces, while the category of chain complexes is not. Of course,
|
| 633 |
+
this is a minor technical issue that can be overcome, but anyway it was one reason for us to
|
| 634 |
+
work with HZ-modules rather than chain complexes. Another reason is that working with HZ-
|
| 635 |
+
modules readily points to generalizations. In particular, most of our results about the functor
|
| 636 |
+
HZ ∧ rImm(−, Rn) can be extended to the functor Σ∞rImm(−, Rn), which in turn can be used
|
| 637 |
+
to obtain information about the unstable Taylor tower of rImm(−, Rn).
|
| 638 |
+
Remark 3.2. In [GKW01] and [Wei04], Goodwillie, Weiss and Klein point out that for a con-
|
| 639 |
+
travariant functor F : O(M) → Top, the cofunctor λJF given by
|
| 640 |
+
U �→ F(U)+ ∧ J
|
| 641 |
+
for a fixed spectrum J is only ”half-good”, even if F is good. Namely, it is an isotopy functor
|
| 642 |
+
but it fails to be finitary. As mentioned in Section 2.2, to fix this they suggest to use the taming
|
| 643 |
+
of λJF. We will denote the taming of a functor such as λJF by λJF #. The functor λJF # is
|
| 644 |
+
a good cofunctor, and there is a natural transformation λJF → λJF #, which is an equivalence
|
| 645 |
+
when evaluated on a tame subset of M, where by a tame subset we mean an open subset which
|
| 646 |
+
is diffeomorphic to the interior of a compact manifold with boundary. From now on, whenever
|
| 647 |
+
we write HZ ∧ rImm(−, Rn) we really mean the taming of this functor. In practice it makes no
|
| 648 |
+
difference since we only are interested in evaluating our functors on tame manifolds.
|
| 649 |
+
So we need to figure out the connectivity of the kth layer of the Taylor tower for the space
|
| 650 |
+
HZ∧rImm(M, Rn). By Proposition 2.9, this is determined by the homotopy fiber of the cubical
|
| 651 |
+
diagram, indexed by subsets of {1, . . . , k},
|
| 652 |
+
S �→ HZ ∧ rImm
|
| 653 |
+
|
| 654 |
+
�
|
| 655 |
+
k\S
|
| 656 |
+
Dm, Rn
|
| 657 |
+
|
| 658 |
+
.
|
| 659 |
+
There is a natural map rImm(�
|
| 660 |
+
k\S Dm, Rn) → rConf(k \ S, Rn), which is the composition of
|
| 661 |
+
the natural map into rImm(�
|
| 662 |
+
k\S Dm, Rn), followed by evaluation at the centers of the discs.
|
| 663 |
+
By the main result of [AˇS22], this map is an equivalence. It follows that the connectivity of the
|
| 664 |
+
layers of HZ ∧ rImm(M, Rn) is determined by the connectivity of the total fiber of the cubical
|
| 665 |
+
diagram
|
| 666 |
+
S �→ HZ ∧ rConf(k \ S, Rn).
|
| 667 |
+
To analyze the total fiber of this cube, we need to review some facts about the homology of
|
| 668 |
+
r-configuration spaces. This will be done in the next section.
|
| 669 |
+
4. r-configuration spaces in Rn as complements of subspace arrangements
|
| 670 |
+
We saw in the previous section that the convergence of the Taylor tower of the functor HZ ∧
|
| 671 |
+
rImm(−, Rn) is determined by the homology of r-configuration spaces rConf(k, Rn). These con-
|
| 672 |
+
figuration spaces can be interpreted as the complement of an arrangement of subspaces of (Rn)k.
|
| 673 |
+
The combinatorics and topology (in particular, homology and cohomology) of subspace arrange-
|
| 674 |
+
ments and their complements are well studied. Some of main references are [OS80], [GM80],
|
| 675 |
+
[GM83a], [GM83b], [BEZ90]. In particular, the (co)homology of r-configuration was studied from
|
| 676 |
+
13
|
| 677 |
+
|
| 678 |
+
this perspective first by Bj¨orner and Welker in [BW95], and by a number of people after that.
|
| 679 |
+
In this section we review a qualitative description of the cohomology of r-configuration spaces,
|
| 680 |
+
based on the Goresky-MacPherson formula. We will also describe the effect on cohomology of
|
| 681 |
+
restriction maps between configuration spaces.
|
| 682 |
+
Recall that an r-configuration space of k points in Rn is defined to be the space
|
| 683 |
+
rConf(k, Rn) = {(v1, ..., vk) ∈ (Rn)k : ∄1 ≤ i1 < · · · < ir ≤ k such that vi1 = ... = vir}.
|
| 684 |
+
The space rConf(k, Rn) is an example of the complement of a subspace arrangement. Let us
|
| 685 |
+
now recall some formal definitions.
|
| 686 |
+
Definition 4.1. Suppose I is an r-tuple of integers I = (i1, . . . , ir), where 1 ≤ i1 < · · · < ir ≤ k.
|
| 687 |
+
Let us denote the set of all such r-tuples by
|
| 688 |
+
�k
|
| 689 |
+
r
|
| 690 |
+
�
|
| 691 |
+
. De���ne
|
| 692 |
+
AI = {(v1, . . . , vk) ∈ (Rn)k | vi1 = · · · = vir}.
|
| 693 |
+
Let A =
|
| 694 |
+
�
|
| 695 |
+
AI | I ∈
|
| 696 |
+
�k
|
| 697 |
+
r
|
| 698 |
+
��
|
| 699 |
+
. When we need to make the set k explicit, we write Ak. More generally,
|
| 700 |
+
for any set T define AT to be the set of “r-equal” diagonals in (Rn)T.
|
| 701 |
+
Note that one can identify rConf(k, Rn) with the complement of the union of the AIs:
|
| 702 |
+
rConf(k, Rn) = (Rn)k \
|
| 703 |
+
�
|
| 704 |
+
I∈(k
|
| 705 |
+
r)
|
| 706 |
+
AI.
|
| 707 |
+
Example 4.2.
|
| 708 |
+
• If k < r, rConf(k, Rn) ∼= (Rn)k ≃ ∗
|
| 709 |
+
• If k = r, rConf(k, Rn) ∼= (Rn)r − ∆ ≃ S(r−1)n−1, where ∆ is the thin diagonal in (Rn)r
|
| 710 |
+
and S(r−1)n−1 is the sphere of dimension (r − 1)n − 1.
|
| 711 |
+
The collection A of linear subspaces of Rnk is an example of a subspace arrangement. Recall
|
| 712 |
+
that the intersection lattice of A is the poset LA consisting of all the intersections AI1 ∩· · ·∩AIt
|
| 713 |
+
of elements of A, ordered by reverse inclusion. We include in LA the “empty intersection” of
|
| 714 |
+
AIs, which is Rnk. The space Rnk is the minimal element of LA. It will be denoted by ˆ0. The
|
| 715 |
+
maximal element of LA is the intersection of all the AI, which, assuming k ≥ r, is the diagonal
|
| 716 |
+
copy of Rn in Rnk. We denote the maximal elements of LA by ˆ1.
|
| 717 |
+
The poset LA is isomorphic to the poset Πk,r of partitions of {1, . . . , k} whose every block is
|
| 718 |
+
either a singleton or contains at least r elements. We call elements of Πk,r r-equal partitions
|
| 719 |
+
of {1, . . . , k}. The partitions are ordered from finer to coarser. The isomorphism Πk,r → LA
|
| 720 |
+
sends a partition λ of {1, . . . , k} to the space of k-tuples of vectors (v1, . . . , vk) ∈ (Rn)k with
|
| 721 |
+
the property that vi = vj whenever i and j are in the same block of λ. Equivalently, one can
|
| 722 |
+
say that λ is sent to the space of functions from k to Rn that are constant on each block of λ.
|
| 723 |
+
From now on we will identify the posets LA and Πk,r.
|
| 724 |
+
Because LA is a partially ordered set, we can define the open interval (x, y) in LA to be the set
|
| 725 |
+
(x, y) = {z ∈ LA | x < z < y}.
|
| 726 |
+
Definition 4.3. The order complex ∆(x, y) of an open interval (x, y) in LA, is the abstract
|
| 727 |
+
simplicial complex whose vertices are the elements of (x, y) and whose p-simplices are the chains
|
| 728 |
+
x0 < ... < xp in (x, y).
|
| 729 |
+
14
|
| 730 |
+
|
| 731 |
+
Let �Hi(x, y) denote the ith reduced simplicial homology group of ∆(x, y) with integer coefficients.
|
| 732 |
+
Similarly, �H
|
| 733 |
+
i(x, y) denotes the ith reduced cohomology group of ∆(x, y).
|
| 734 |
+
The (reduced) cohomology groups of the space rConf(k, Rn) = Rnk\�
|
| 735 |
+
I∈(k
|
| 736 |
+
r) AI can be described
|
| 737 |
+
in terms of (reduced) homology groups of the order complex of intervals in the intersection lattice
|
| 738 |
+
of A. This is known as the Goresky-MacPherson formula. For the original proof of the Goresky-
|
| 739 |
+
MacPherson formula by means of stratified Morse theory see [GM88, Part III]. An elementary
|
| 740 |
+
proof was given by Ziegler and ˇZivaljevi´c in [ZˇZ93]. For the original calculation of the cohomology
|
| 741 |
+
rConf(k, Rn) using the Goresky-MacPherson formula see [BW95]. Here is the statement, in the
|
| 742 |
+
case relevant to us.
|
| 743 |
+
Theorem 4.4 (Special case of Goresky-MacPherson formula). There is an isomorphism
|
| 744 |
+
(10)
|
| 745 |
+
�H
|
| 746 |
+
i(rConf(k, Rn)) ∼=
|
| 747 |
+
�
|
| 748 |
+
x∈L>ˆ0
|
| 749 |
+
A
|
| 750 |
+
�Hcodim(x)−2−i(ˆ0, x)
|
| 751 |
+
Here, the direct sum is indexed by all x ̸= ˆ0 in LA, and codim(x) is the codimension of the space
|
| 752 |
+
x as the subspace of Rnk.
|
| 753 |
+
For each diagonal x ∈ LA, let c(x) denote the number of components of the partition of k which
|
| 754 |
+
determines the diagonal x. Obviously, dimension of x in (Rn)k is dim(x) = n · c(x), so
|
| 755 |
+
(11)
|
| 756 |
+
codim(x) = n(k − c(x)).
|
| 757 |
+
The following easy example of 3-configuration spaces of 4 points illustrates the application of
|
| 758 |
+
formula (10).
|
| 759 |
+
Example 4.5. Let A is the set of all (at least 3)-diagonals in (Rn)4. Then 3 Conf(4, Rn) =
|
| 760 |
+
(Rn)4 − A. The intersection lattice LA of A is pictured in Figure 1. Using Theorem 4.4, we find
|
| 761 |
+
that for every n > 1,
|
| 762 |
+
H0(3 Conf(4, Rn)) ∼= Z,
|
| 763 |
+
H2n−1(3 Conf(4, Rn)) ∼= Z4,
|
| 764 |
+
H3n−2(3 Conf(4, Rn)) ∼= Z3,
|
| 765 |
+
and other cohomology groups are trivial. For n = 1, the formula is still valid, except that in this
|
| 766 |
+
case 2n−1 = 3n−2 = 1, so the two cohomology groups add together. So H0(3 Conf(4, R)) ∼= Z
|
| 767 |
+
and H1(3 Conf(4, R)) ∼= Z7. For n = 1, 2, the cohomology of 3 Conf(4, Rn) can be read off the
|
| 768 |
+
tables at the end of [BW95].
|
| 769 |
+
For the purpose of analysing the layers in the homological Taylor tower for r-immersions it also is
|
| 770 |
+
desirable to know the effect of restriction maps between r-configuration spaces on cohomology.
|
| 771 |
+
Suppose we have a subset T ⊂ {1, . . . , k}. Then we have a restriction map rConf(k, Rn) →
|
| 772 |
+
rConf(T, Rn). We want to describe the induced homomorphism on cohomology, in terms of
|
| 773 |
+
formula (10). The inclusion T ֒→ {1, . . . , k} induces an inclusion of the poset of r-equal partitions
|
| 774 |
+
of T into the poset of r-equal partitions of {1, . . . , k}, by making each element of {1, . . . , k} \ T
|
| 775 |
+
into a singleton. Notice that for every r-equal partition of T, the codimension of the corresponding
|
| 776 |
+
diagonal is the same whether it is considered a diagonal in (Rn)T or in (Rn)k. This is so because
|
| 777 |
+
the codimension of a diagonal determined by a partition is determined by the difference between
|
| 778 |
+
15
|
| 779 |
+
|
| 780 |
+
(1)(2)(3)(4)
|
| 781 |
+
(1)(2, 3, 4)
|
| 782 |
+
(1, 2, 3, 4)
|
| 783 |
+
(2)(1, 2, 3)
|
| 784 |
+
(3)(1, 2, 4)
|
| 785 |
+
(4)(1, 2, 3)
|
| 786 |
+
Figure 1. Intersection lattice for 3 Conf(4, Rn), also known as Π4,3
|
| 787 |
+
the cardinality of the set and the number of blocks of the partition, by formula (11). This number
|
| 788 |
+
remains unchanged if one adds some singletons to a partition. Thus we have a homomorphism
|
| 789 |
+
(12)
|
| 790 |
+
�
|
| 791 |
+
x∈L>ˆ0
|
| 792 |
+
AT
|
| 793 |
+
�Hcodim(x)−2−i(ˆ0, x) →
|
| 794 |
+
�
|
| 795 |
+
x∈L>ˆ0
|
| 796 |
+
Ak
|
| 797 |
+
�Hcodim(x)−2−i(ˆ0, x)
|
| 798 |
+
which is defined by the inclusion L>ˆ0
|
| 799 |
+
AT ֒→ L>ˆ0
|
| 800 |
+
Ak, and uses the fact that for every x ∈ L>ˆ0
|
| 801 |
+
AT , the
|
| 802 |
+
number codim(x) is the same whether x is considered an element of L>ˆ0
|
| 803 |
+
AT or of L>ˆ0
|
| 804 |
+
Ak.
|
| 805 |
+
Lemma 4.6. The homomorphism �H
|
| 806 |
+
i(rConf(T, Rn)) → �H
|
| 807 |
+
i(rConf(k, Rn)) corresponds, under
|
| 808 |
+
the isomorphism (10), to the homomorphism (12) that we just described.
|
| 809 |
+
Proof. This follows easily from the fact that the Goresky-MacPherson formula is natural with
|
| 810 |
+
respect to inclusions of subarrangements [Hu94, Corollary 2.1]
|
| 811 |
+
□
|
| 812 |
+
5. Total fiber of a retractive cubical diagram
|
| 813 |
+
In general homotopy groups do not commute with total homotopy fibers of cubical diagrams.
|
| 814 |
+
In this section we will show that for a class of cubes that we call retractive they do commute.
|
| 815 |
+
More precisely, we show that for retractive cubes, the homotopy groups of the total fiber are
|
| 816 |
+
canonically isomorphic to the total kernel of the cube of homotopy groups.
|
| 817 |
+
Suppose we have a two-dimensional cubical diagram of spaces or spectra
|
| 818 |
+
(13)
|
| 819 |
+
E∅
|
| 820 |
+
i∅,1 �
|
| 821 |
+
i∅,2
|
| 822 |
+
�
|
| 823 |
+
E1
|
| 824 |
+
i1,12
|
| 825 |
+
�
|
| 826 |
+
E2
|
| 827 |
+
i2,12
|
| 828 |
+
� E12
|
| 829 |
+
16
|
| 830 |
+
|
| 831 |
+
Suppose that all the maps in the square (13) have homotopy sections, so that the square of
|
| 832 |
+
sections
|
| 833 |
+
E12
|
| 834 |
+
s12,1 �
|
| 835 |
+
s12,2
|
| 836 |
+
�
|
| 837 |
+
E1
|
| 838 |
+
s1,∅
|
| 839 |
+
�
|
| 840 |
+
E2
|
| 841 |
+
s2,∅
|
| 842 |
+
� E0
|
| 843 |
+
commutes up to homotopy, and so that the following mixed square
|
| 844 |
+
E2
|
| 845 |
+
i2,12 �
|
| 846 |
+
s2,∅
|
| 847 |
+
�
|
| 848 |
+
E12
|
| 849 |
+
s12,1
|
| 850 |
+
�
|
| 851 |
+
E0
|
| 852 |
+
i∅,1
|
| 853 |
+
� E1
|
| 854 |
+
also commutes up to homotopy. Note that the vertical maps in the mixed square are sections,
|
| 855 |
+
while the horizontal maps are from the original square.
|
| 856 |
+
Let us call a square (13) with such sections a retractive square.
|
| 857 |
+
More generally, let us define a retractive cubical diagram as follows.
|
| 858 |
+
Definition 5.1. Let χ be a k-dimensional cubical diagram. We say that χ is retractive if for
|
| 859 |
+
every U ⊂ {1, . . . , k} and every i /∈ U, the map χ(U) → χ(U ∪ {i}) has a homotopy section,
|
| 860 |
+
the cube of sections commutes up to homotopy, and furthermore whenever U ⊂ {1, . . . , k}, and
|
| 861 |
+
i, j ∈ {1, . . . , k} \ U, with i < j, the following mixed square commutes up to homotopy
|
| 862 |
+
χ(U ∪ {j})
|
| 863 |
+
�
|
| 864 |
+
�
|
| 865 |
+
χ(U ∪ {i, j})
|
| 866 |
+
�
|
| 867 |
+
χ(U)
|
| 868 |
+
� χ(U ∪ {i})
|
| 869 |
+
.
|
| 870 |
+
Lemma 5.2. Let χ be a retractive k-dimensional cubical diagram of spectra. Let E∗ be any
|
| 871 |
+
homology theory, and let E∗ be a cohomology theory. Then E∗(tfiber χ) (resp. E∗(tfiber χ)) is a
|
| 872 |
+
direct summand of E∗(χ(∅)) (resp. of E∗(χ(∅))). Moreover, the following natural homomorphism
|
| 873 |
+
is an isomorphism:
|
| 874 |
+
E∗(tfiber χ)
|
| 875 |
+
∼
|
| 876 |
+
=−→ tkernel (E∗χ) .
|
| 877 |
+
Similarly, there is a natural isomorphism
|
| 878 |
+
tcokernel(E∗χ)
|
| 879 |
+
∼
|
| 880 |
+
=−→ E∗(tfiber χ).
|
| 881 |
+
Proof. We will prove the claim for homology. The proof of the cohomological statement is the
|
| 882 |
+
same, reversing all arrows. The proof is by induction on k, starting with with the case k = 1,
|
| 883 |
+
which is elementary and well-known. Let us review it anyway. A retractive 1-dimensional cube
|
| 884 |
+
is a map χ(∅) → χ(1), together with a homotopy section χ(1) → χ(∅). The total fiber of
|
| 885 |
+
the cube is the homotopy fiber of the map χ(∅) → χ(1). By homotopy section we mean that
|
| 886 |
+
the composition χ(1) → χ(∅) → χ(1) is a weak equivalence. It follows that the composition
|
| 887 |
+
E∗χ(1) → E∗χ(∅) → E∗χ(1) is an isomorphism. From here it readily follows that the long
|
| 888 |
+
exact sequence in E∗ associated with the fibration sequence tfiber χ → χ(∅) → χ(1) splits as a
|
| 889 |
+
17
|
| 890 |
+
|
| 891 |
+
direct sum of split short exact sequences in each degree. Furthermore it readily follows that the
|
| 892 |
+
following homomorphisms are isomorphisms
|
| 893 |
+
E∗ tfiber χ
|
| 894 |
+
∼
|
| 895 |
+
=−→ ker (E∗χ(∅) → E∗χ(1))
|
| 896 |
+
∼
|
| 897 |
+
=−→ coker (E∗χ(1) → E∗(χ(∅))) .
|
| 898 |
+
Now suppose the lemma holds for cubes of dimension less than k and let χ be a retractive
|
| 899 |
+
cube of dimension k. Let χ1 and χ2 be k − 1-dimensional cubes defined by χ1(U) = χ(U)
|
| 900 |
+
and χ2(U) = χ(U ∪ {k}). Then χ can be identified with the natural map of cubes χ1 → χ2.
|
| 901 |
+
The cubes χ1 and χ2 are retractive, so by induction hypothesis, the lemma holds for them. The
|
| 902 |
+
retractions do not quite define a map of cubes χ2 → χ1, because we only assumed that the mixed
|
| 903 |
+
squares commute up to homotopy. But they do define a homomorphism of cubes E∗χ2 → E∗χ1,
|
| 904 |
+
which is a section of the homomorphism of cubes E∗χ1 → E∗χ2. We have the following diagram
|
| 905 |
+
E∗ tfiber χ
|
| 906 |
+
E∗ tfiber χ1
|
| 907 |
+
E∗ tfiber χ2
|
| 908 |
+
tkernel E∗χ2
|
| 909 |
+
tkernel E∗χ1
|
| 910 |
+
tkernel E∗χ2
|
| 911 |
+
∼
|
| 912 |
+
=
|
| 913 |
+
∼
|
| 914 |
+
=
|
| 915 |
+
∼
|
| 916 |
+
=
|
| 917 |
+
The top row is induced by applying E∗ to a fibration sequence of spectra. The vertical homomor-
|
| 918 |
+
phisms are isomorphisms by induction hypothesis. It follows that the upper right homomorphism
|
| 919 |
+
is a split surjection, and the top row is a split short exact sequence in each dimension. Fur-
|
| 920 |
+
thermore, E∗ tfiber χ maps isomorphically onto the kernel of the bottom right map, which is
|
| 921 |
+
tkernel E∗χ.
|
| 922 |
+
□
|
| 923 |
+
6. The cube of r-configuration spaces is retractive
|
| 924 |
+
Lemma 6.1. The k-cube of spaces
|
| 925 |
+
S �→ rConf(k \ S, Rn)
|
| 926 |
+
is retractive for n ≥ 2.
|
| 927 |
+
Proof. Let T be a finite set and suppose x /∈ T. Our first step it to construct a section to the
|
| 928 |
+
restriction map
|
| 929 |
+
rT∪{x},T : rConf(T ∪ {x}, Rn) → rConf(T, Rn).
|
| 930 |
+
Let p1: Rn → R be projection onto the first coordinate. Define a map
|
| 931 |
+
sT,T∪{x}: rConf(T, Rn) → rConf(T ∪ {x}, Rn)
|
| 932 |
+
as follows. An element of rConf(T, Rn) is a function f : T → Rn with the property that no r
|
| 933 |
+
points of T go to the same point. Extend f to a function from T ∪ {x} by sending x to
|
| 934 |
+
(max{p1f(t) | t ∈ T} + 1, 0, . . . , 0).
|
| 935 |
+
In words, x is sent to the point of Rn whose first coordinate is one more than the maximal
|
| 936 |
+
first coordinate of the existing points, and all other coordinates are zero. It is clear that the
|
| 937 |
+
image of x is different from all the other points in the configuration.
|
| 938 |
+
Thus if f was an r-
|
| 939 |
+
immersion, then the resulting map T ∪ {x} → Rn is still an r-immersion. We have defined a
|
| 940 |
+
18
|
| 941 |
+
|
| 942 |
+
map sT,T∪{x}: rConf(T, Rn) → rConf(T ∪ {x}, Rn). It is clear that the following composition
|
| 943 |
+
is the identity (not even just homotopic to the identity but is the actual identity map)
|
| 944 |
+
rConf(T, Rn)
|
| 945 |
+
sT,T ∪{x}
|
| 946 |
+
−−−−−→ rConf(T ∪ {x}, Rn)
|
| 947 |
+
rT ∪{x},T
|
| 948 |
+
−−−−−→ rConf(T, Rn).
|
| 949 |
+
It follows that sT,T∪{x} is a section of rT∪{x},T. Next, we need to show that whenever x, y /∈ T,
|
| 950 |
+
the following diagram commutes up to homotopy
|
| 951 |
+
rConf(T, Rn)
|
| 952 |
+
�
|
| 953 |
+
�
|
| 954 |
+
rConf(T ∪ {x}, Rn)
|
| 955 |
+
�
|
| 956 |
+
rConf(T ∪ {y}, Rn)
|
| 957 |
+
� rConf(T ∪ {x, y}, Rn)
|
| 958 |
+
It is for this step that we need to assume n ≥ 2.
|
| 959 |
+
Let f : T → Rn represent an element
|
| 960 |
+
of rConf(T, Rn). The images of f in rConf(T ∪ {x, y}, Rn) under the two ways around the
|
| 961 |
+
diagram are two extensions of f from T to T ∪ {x, y}.
|
| 962 |
+
One of the extensions sends x to
|
| 963 |
+
(max{p1f(t) | t ∈ T} + 1, 0, . . . , 0), and sends y to (max{p1f(t) | t ∈ T} + 2, 0, . . . , 0). The
|
| 964 |
+
other extension does the same thing, with x and y switched. It is clear that one can write a
|
| 965 |
+
homotopy between the two maps, by swapping the images of x and y along a circle in the plane
|
| 966 |
+
spanned by the first two coordinates of Rn.
|
| 967 |
+
Finally we need to check that the following mixed square commutes up to homotopy
|
| 968 |
+
rConf(T ∪ {x}, Rn)
|
| 969 |
+
�
|
| 970 |
+
�
|
| 971 |
+
rConf(T, Rn)
|
| 972 |
+
�
|
| 973 |
+
rConf(T ∪ {x, y}, Rn)
|
| 974 |
+
� rConf(T ∪ {y}, Rn)
|
| 975 |
+
.
|
| 976 |
+
This, too, is clear. In fact, it is easy to check that there is a well-defined straight line homotopy
|
| 977 |
+
between the two maps around the square.
|
| 978 |
+
We have shown that the section maps that we have defined make the cube of r-configuration
|
| 979 |
+
spaces and restriction maps between them into a retractive cube.
|
| 980 |
+
□
|
| 981 |
+
7. Connectivity of the cube of (co)homologies of r-configuration spaces
|
| 982 |
+
We have seen that the cube of spaces S �→ rConf(k \ S, Rn), where S ranges over the subsets
|
| 983 |
+
of {1, . . . , k} is retractive (Lemma 6.1). It follows that the cube of spectra obtained by applying
|
| 984 |
+
the suspension spectrum functor to it, i.e., the cube
|
| 985 |
+
(14)
|
| 986 |
+
S �→ Σ∞ rConf(k \ S, Rn),
|
| 987 |
+
is also retractive.
|
| 988 |
+
Our goal is to analyse how cartesian is the cube S �→ HZ∧Σ∞ rConf(k\S, Rn). Smash product
|
| 989 |
+
commutes with total fibers of cubical diagrams of spectra. Therefore, the answer is the same
|
| 990 |
+
as for the cubical diagram (14). However, we want to use the description of the cohomology
|
| 991 |
+
of r-configuration spaces given by the Goresky-MacPherson formula. The following lemma says
|
| 992 |
+
that the homology and cohomology groups of the relevant spectrum are isomorphic.
|
| 993 |
+
Lemma 7.1. The homology and cohomology groups of the total fiber of (14) are (non-canonically)
|
| 994 |
+
isomorphic.
|
| 995 |
+
19
|
| 996 |
+
|
| 997 |
+
Proof. It is known, for example by the results of [BW95], that the homology groups of the space
|
| 998 |
+
rConf(k, Rn), and therefore also of the suspension spectrum of this space, are finitely generated
|
| 999 |
+
free abelian groups. Since the cube Σ∞ rConf(k \ S, Rn) is retractive, it follows by Lemma 5.2
|
| 1000 |
+
that the homology of the total fiber of the cube Σ∞ rConf(k \ S, Rn) is a direct summand of
|
| 1001 |
+
the homology of Σ∞ rConf(k, Rn). Therefore, the homology groups of the total fiber are also
|
| 1002 |
+
finitely generated free abelian groups. Therefore they are isomorphic to the cohomology groups
|
| 1003 |
+
of the total fiber, by the universal coefficients theorem.
|
| 1004 |
+
□
|
| 1005 |
+
It follows that the homological connectivity of the total fiber of (14) is equivalent to the coho-
|
| 1006 |
+
mological connectivity. Next, we give a qualitative description of the cohomology of the total
|
| 1007 |
+
fiber, in the style of Theorem 4.4.
|
| 1008 |
+
Let Π≥r(k) denote the set partitions of k with the property that each component has at least r
|
| 1009 |
+
elements (i.e., elements of Πk,r without singletons).
|
| 1010 |
+
Lemma 7.2. The i-th cohomology group of the total fiber of the cube (14) is isomorphic to the
|
| 1011 |
+
following direct sum:
|
| 1012 |
+
(15)
|
| 1013 |
+
�
|
| 1014 |
+
x∈Π≥r(k)
|
| 1015 |
+
�Hcodim (x)−2−i(ˆ0, x)
|
| 1016 |
+
Proof. The cube (14) is retractive. Using the cohomological part of Lemma 5.2, we conclude
|
| 1017 |
+
that the i-th cohomology of the total fiber is isomorphic to the cokernel of the homomorphism
|
| 1018 |
+
k
|
| 1019 |
+
�
|
| 1020 |
+
i=1
|
| 1021 |
+
�H
|
| 1022 |
+
i rConf(k \ {i}, Rn) → �H
|
| 1023 |
+
i rConf(k, Rn).
|
| 1024 |
+
By Lemma 4.6, this homomorphism can be identified with the following homomorphism
|
| 1025 |
+
(16)
|
| 1026 |
+
k
|
| 1027 |
+
�
|
| 1028 |
+
i=1
|
| 1029 |
+
�
|
| 1030 |
+
x∈L>ˆ0
|
| 1031 |
+
Ak\{i}
|
| 1032 |
+
�Hcodim(x)−2−i(ˆ0, x) →
|
| 1033 |
+
�
|
| 1034 |
+
x∈L>ˆ0
|
| 1035 |
+
Ak
|
| 1036 |
+
�Hcodim(x)−2−i(ˆ0, x)
|
| 1037 |
+
The homomorphism maps each summand in the source isomorphically onto a summand in the tar-
|
| 1038 |
+
get (some summands in the source go to the same summand in the target, so the homomorphism
|
| 1039 |
+
is not injective). The image of the homomorphism is the sum of terms corresponding to r-equal
|
| 1040 |
+
partitions with at least one singleton. The cokernel is the direct sum of terms corresponding to
|
| 1041 |
+
r-equal partitions that do not have a singleton.
|
| 1042 |
+
□
|
| 1043 |
+
It follows from Lemma 7.2 that to find how cartesian the cube (14) is, we need to find the
|
| 1044 |
+
smallest i for which the homology group
|
| 1045 |
+
(17)
|
| 1046 |
+
�Hcodim(x)−2−i(ˆ0, x)
|
| 1047 |
+
is non-trivial for some x ∈ Π≥r(k).
|
| 1048 |
+
Throughout this section, let x be a partition of {1, . . . , k} where each block has at least r
|
| 1049 |
+
elements. Recall that c(x) denotes the number of blocks of x. Note that if k1, . . . , kc(x) are the
|
| 1050 |
+
sizes of the blocks of x, then k1 + · · · + kc(x) = k. Let [ˆ0, x] be the closed interval in Πk,r.
|
| 1051 |
+
Lemma 7.3. Let x be as above. Suppose x has c(x) blocks, of sizes k1, . . . , kc(x). Then there
|
| 1052 |
+
is an isomorphism of posets
|
| 1053 |
+
[ˆ0, x] ∼= Πk1,r × · · · × Πkc(x),r.
|
| 1054 |
+
20
|
| 1055 |
+
|
| 1056 |
+
Proof. The interval [ˆ0, x] consists of r-equal partitions of {1, . . . , k} that are refinements of x.
|
| 1057 |
+
This is the same data as an r-equal partition of each block of x, which is the same as an element
|
| 1058 |
+
of Πk1,r × · · · × Πkc(x),r.
|
| 1059 |
+
□
|
| 1060 |
+
Given a poset P with a minimum and maximum element, let P0 be the poset P with the minimum
|
| 1061 |
+
and maximum removed.
|
| 1062 |
+
Corollary 7.4. Let x be as in the previous lemma. Then there is a homotopy equivalence (∗
|
| 1063 |
+
denotes joint)
|
| 1064 |
+
|∆(ˆ0, x)| ≃ Σc(x)−1|Π0
|
| 1065 |
+
k1,r| ∗ · · · ∗ |Π0
|
| 1066 |
+
kc(x),r|.
|
| 1067 |
+
Proof. This follows from the lemma, and the well-known fact that given two posets P and Q
|
| 1068 |
+
with minimum and maximum objects, there is a homotopy equivalence [Wal88, Theorem 5.1 (d)]
|
| 1069 |
+
|(P × Q)0| ≃ Σ|P0| ∗ |Q0|.
|
| 1070 |
+
□
|
| 1071 |
+
Lemma 7.5. Let x be as in the previous lemma and corollary. Then |∆(ˆ0, x)| is homotopy
|
| 1072 |
+
equivalent to a complex of dimension k−c(x)(r−1)−2. Furthermore, the homology of |∆(ˆ0, x)|
|
| 1073 |
+
in dimension k − c(x)(r − 1) − 2 is non zero.
|
| 1074 |
+
Proof. By the corollary, the space |∆(ˆ0, x)| is homotopy equivalent to Σc(x)−1|Π0
|
| 1075 |
+
k1,r| ∗ · · · ∗
|
| 1076 |
+
|Π0
|
| 1077 |
+
kc(x),r|. By the results of [BW95], |Π0
|
| 1078 |
+
k,r| is homotopy equivalent to a wedge of spheres, not all
|
| 1079 |
+
of the same dimension, and the top homology of this space occurs in dimension k − r − 1. It
|
| 1080 |
+
follows that the space Σc(x)−1|Π0
|
| 1081 |
+
k1,r|∗· · ·∗|Π0
|
| 1082 |
+
kc(x),r| is a wedge of spheres, with the top homology
|
| 1083 |
+
occurring in dimension
|
| 1084 |
+
c(x) − 1 + (k1 − r − 1) + · · · + (kc(x) − r − 1) + c(x) − 1 = k − c(x)(r − 1) − 2.
|
| 1085 |
+
□
|
| 1086 |
+
Example 7.6. If r ≤ k < 2r, there is only one summand x in (15) - this is the partition {k}, or
|
| 1087 |
+
in other words the thin diagonal. For this x, dim ∆(ˆ0, x) = k − r − 1.
|
| 1088 |
+
Now we can state and prove the main result of this section
|
| 1089 |
+
Proposition 7.7. When r ≤ n + 1, the cube (14) is k(n − 1) +
|
| 1090 |
+
� k
|
| 1091 |
+
r
|
| 1092 |
+
�
|
| 1093 |
+
(r − n − 1)-cartesian.
|
| 1094 |
+
When r ≥ n + 1, the cube (14) is k(n − 1) + r − n − 1-cartesian.
|
| 1095 |
+
Remark 7.8. Note that when r = n+1 both formulas say that the cube (14) is k(n−1)-cartesian.
|
| 1096 |
+
Proof. Given x, the smallest i for which the homology (17) might be non-trivial is one that
|
| 1097 |
+
satisfies codim(x)−2−i = dim ∆(ˆ0, x). Using Lemma 7.5 we have that the smallest i for which
|
| 1098 |
+
the total cokernel (15) might be non-trivial is one that satisfies
|
| 1099 |
+
codim(x) − 2 − i = k − c(x)(r − 1) − 2.
|
| 1100 |
+
Because codim(x) = n(k − c(x)) for x ∈ Π≥r(k), it follows that
|
| 1101 |
+
(18)
|
| 1102 |
+
i = k(n − 1) + c(x)(r − n − 1).
|
| 1103 |
+
21
|
| 1104 |
+
|
| 1105 |
+
We have to see for which x this number i is the smallest possible. We distinguish between two
|
| 1106 |
+
overlapping cases, depending on the sign of r − n − 1.
|
| 1107 |
+
1) When r − n − 1 ≤ 0, i.e. when r ≤ n + 1, finding i as small as possible is the same as finding
|
| 1108 |
+
x ∈ Π≥r(k) with the biggest number c(x) of components. Since all components have to be of
|
| 1109 |
+
the size at least r, the largest number of them is attained when there is a maximum number of
|
| 1110 |
+
them of the size r. In that case, c(x) =
|
| 1111 |
+
� k
|
| 1112 |
+
r
|
| 1113 |
+
�
|
| 1114 |
+
, so the smallest i is
|
| 1115 |
+
i = k(n − 1) +
|
| 1116 |
+
�k
|
| 1117 |
+
r
|
| 1118 |
+
�
|
| 1119 |
+
(r − n − 1).
|
| 1120 |
+
So in this case, the cubical diagram (14) is k(n − 1) +
|
| 1121 |
+
� k
|
| 1122 |
+
r
|
| 1123 |
+
�
|
| 1124 |
+
(r − n − 1)-cartesian.
|
| 1125 |
+
2) When r − n − 1 ≥ 0, i.e. r ≥ n + 1, finding i as small as possible is the same as finding
|
| 1126 |
+
x ∈ Π≥r(k) with the smallest number c(x) of components. Thus we need c(x) to be equal to 1.
|
| 1127 |
+
This x is actually the thin diagonal in the space (Rn)k that corresponds to the partition {k} of
|
| 1128 |
+
k. In that case,
|
| 1129 |
+
i = k(n − 1) + r − n − 1,
|
| 1130 |
+
hence (14) is k(n − 1) + r − n − 1-cartesian.
|
| 1131 |
+
□
|
| 1132 |
+
8. Convergence result
|
| 1133 |
+
Let M be a smooth manifold of dimension m. Now we finally can calculate the connectivity of
|
| 1134 |
+
the map
|
| 1135 |
+
(19)
|
| 1136 |
+
TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn).
|
| 1137 |
+
Knowing that ck-connectivity of the total fiber of the cube (14) implies (ck−km+1)-connectivity
|
| 1138 |
+
of the map (19), we can find the conditions under which the Taylor tower converges, using results
|
| 1139 |
+
from Section 7. There are three different cases.
|
| 1140 |
+
1) For r − n − 1 < 0, the connectivity of the map (19) is
|
| 1141 |
+
(20)
|
| 1142 |
+
k(n − 1) +
|
| 1143 |
+
�k
|
| 1144 |
+
r
|
| 1145 |
+
�
|
| 1146 |
+
(r − n − 1) − 1 − mk + 1 = k(n − m − 1) +
|
| 1147 |
+
�k
|
| 1148 |
+
r
|
| 1149 |
+
�
|
| 1150 |
+
(r − n − 1)
|
| 1151 |
+
= k(n − m − 1) +
|
| 1152 |
+
�k
|
| 1153 |
+
r − k mod r
|
| 1154 |
+
r
|
| 1155 |
+
�
|
| 1156 |
+
(r − n − 1)
|
| 1157 |
+
= k
|
| 1158 |
+
�
|
| 1159 |
+
n − m − n
|
| 1160 |
+
r − 1
|
| 1161 |
+
r
|
| 1162 |
+
�
|
| 1163 |
+
− k mod r
|
| 1164 |
+
r
|
| 1165 |
+
(r − n − 1)
|
| 1166 |
+
= k
|
| 1167 |
+
�
|
| 1168 |
+
nr − 1
|
| 1169 |
+
r
|
| 1170 |
+
− m − 1
|
| 1171 |
+
r
|
| 1172 |
+
�
|
| 1173 |
+
− k mod r
|
| 1174 |
+
r
|
| 1175 |
+
(r − n − 1)
|
| 1176 |
+
where we noted that
|
| 1177 |
+
� k
|
| 1178 |
+
r
|
| 1179 |
+
�
|
| 1180 |
+
= k/r − (k mod r)/r. Note now that
|
| 1181 |
+
−k mod r
|
| 1182 |
+
r
|
| 1183 |
+
(r − n − 1)
|
| 1184 |
+
22
|
| 1185 |
+
|
| 1186 |
+
is nonnegative since r − n − 1 < 0. This means that, as long as
|
| 1187 |
+
nr − 1
|
| 1188 |
+
r
|
| 1189 |
+
− m − 1
|
| 1190 |
+
r > 0,
|
| 1191 |
+
the connectivities increase with k.
|
| 1192 |
+
2) For r − n − 1 = 0, the connectivity of the map (19) is
|
| 1193 |
+
(21)
|
| 1194 |
+
k(n − 1) − 1 − mk + 1 = k(n − m − 1),
|
| 1195 |
+
which goes to +∞ as k −→ +∞ if n − m − 1 > 0.
|
| 1196 |
+
3) For r − n − 1 > 0, the connectivity of the map (19) is
|
| 1197 |
+
(22)
|
| 1198 |
+
k(n − 1) + r − n − 2 − mk + 1 = k(n − m − 1) + r − n − 1,
|
| 1199 |
+
which goes to +∞ as k −→ +∞ if n − m − 1 > 0.
|
| 1200 |
+
Thus we proved the following theorem.
|
| 1201 |
+
Theorem 8.1. (Homological convergence of the Taylor tower for r-immersions in Rn)
|
| 1202 |
+
Let M be an m-dimensional smooth manifold and Rn the n-dimensional Euclidean space. Assume
|
| 1203 |
+
n > 1. Let rImm(M, Rn) be the space of r-immersions of M in Rn. Consider the map
|
| 1204 |
+
pk : TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn).
|
| 1205 |
+
a) For r ≤ n + 1 the map pk is
|
| 1206 |
+
k
|
| 1207 |
+
�
|
| 1208 |
+
nr − 1
|
| 1209 |
+
r
|
| 1210 |
+
− m − 1
|
| 1211 |
+
r
|
| 1212 |
+
�
|
| 1213 |
+
− k mod r
|
| 1214 |
+
r
|
| 1215 |
+
(r − n − 1)
|
| 1216 |
+
-connected. The tower converges intrinsically if n > rm+1
|
| 1217 |
+
r−1 .
|
| 1218 |
+
b) For r ≥ n + 1 the map pk is k(n − m − 1) + r − n − 1-connected. The tower converges
|
| 1219 |
+
intrinsically if n > m + 1.
|
| 1220 |
+
Proof. Only the assertions regarding intrinsic convergence remain to be checked.
|
| 1221 |
+
The tower
|
| 1222 |
+
converges intrinsically if the connectivity of pk approaches ∞ with k. In the case r ≤ n+1, since
|
| 1223 |
+
(k mod r) is a bounded function of k, this is equivalent to the condition nr−1
|
| 1224 |
+
r
|
| 1225 |
+
− m − 1
|
| 1226 |
+
r > 0,
|
| 1227 |
+
which is the same as n > rm+1
|
| 1228 |
+
r−1 . In the case r ≥ n + 1, the formula for the connectivity of pk
|
| 1229 |
+
clearly tells us that the connectivity goes to ∞ if n > m + 1.
|
| 1230 |
+
□
|
| 1231 |
+
9. Comparing with the unstable tower
|
| 1232 |
+
In this section we will compare the layers, and the connectivities of the maps in the Taylor tower
|
| 1233 |
+
of HZ ∧ rImm(M, Rn) with those in the Taylor tower of the unstabilized functor rImm(M, Rn).
|
| 1234 |
+
We will show that roughly up to degree 2r − 1 the connectivities of the maps in the two towers
|
| 1235 |
+
are the same, and the first non-trivial homotopy groups of the layers are isomorphic.
|
| 1236 |
+
23
|
| 1237 |
+
|
| 1238 |
+
In this section, let us assume that we chose a basepoint in rImm(M, Rn) rather than just in
|
| 1239 |
+
Imm(M, Rn), so that the presheaf rImm(−, Rn) takes values in pointed spaces. We have a
|
| 1240 |
+
diagram of presheaves
|
| 1241 |
+
(23)
|
| 1242 |
+
rImm(−, Rn)
|
| 1243 |
+
i←− rImm(−, Rn)
|
| 1244 |
+
s−→ Ω∞Σ∞rImm(−, Rn)
|
| 1245 |
+
h−→ Ω∞HZ ∧ rImm(−, Rn).
|
| 1246 |
+
The map i induces an equivalence of derivatives and layers beyond the first one. The map h
|
| 1247 |
+
induces the Hurewicz homomorphism. In particular, it induces a Hurewicz isomorphism on the
|
| 1248 |
+
first non-trivial homotopy group of each layer. We focus on the question for which k the map s,
|
| 1249 |
+
and therefore also h ◦ s, induces an isomorphism on the first nontrivial homotopy group of the
|
| 1250 |
+
k-th layer. When r = 2, the answer is known to be: only for k = 2. We show that for r > 2 the
|
| 1251 |
+
answer is: for all k ≤ 2r − 1, with a small caveat for r = 3.
|
| 1252 |
+
Theorem 9.1. Assume 0 < dim(M) < n, r > 2.
|
| 1253 |
+
For 1 < k < r, the following maps are equivalences:
|
| 1254 |
+
Tk rImm(M, Rn) → T1 rImm(M, Rn) ≃ Imm(M, Rn)
|
| 1255 |
+
and
|
| 1256 |
+
TkHZ ∧ rImm(M, Rn) → T1HZ ∧ rImm(M, Rn) ≃ ∗.
|
| 1257 |
+
For r ≤ k ≤ 2r − 1, the connectivity of the map Tk rImm(M, Rn) → Tk−1 rImm(M, Rn) is the
|
| 1258 |
+
same as the connectivity of the map TkHZ ∧ rImm(M, Rn) → Tk−1HZ ∧ rImm(M, Rn).
|
| 1259 |
+
When r = 3, k = 2r − 1 = 5, the map s, and therefore also h ◦ s in diagram (23), induces an
|
| 1260 |
+
epimorphism on the first non-trivial homotopy group of the k-th layer. In all other cases when
|
| 1261 |
+
r > 2, r ≤ k ≤ 2r − 1, the maps s and h ◦ s induce an isomorphism on the first non-trivial
|
| 1262 |
+
homotopy group of the k-th layer.
|
| 1263 |
+
Remark 9.2. The case k = r, r + 1 of the last assertion of the theorem can be obtained by
|
| 1264 |
+
comparing our Theorem 8.1 with the calculations done in [SˇSV20].
|
| 1265 |
+
Proof. The assertion that T1 rImm(M, Rn) ≃ Imm(M, Rn) follows from the fact that when
|
| 1266 |
+
M = Dm, the following maps are equivalences [AˇS22]
|
| 1267 |
+
Emb(Dm, Rn)
|
| 1268 |
+
���−→ rImm(Dm, Rn)
|
| 1269 |
+
≃−→ Imm(Dm, Rn),
|
| 1270 |
+
together with the fact that the functor Imm(−, Rn) is linear, at least on manifolds whose handle
|
| 1271 |
+
dimension is less than n.
|
| 1272 |
+
The assertion that both towers are constant for k < r follows from the fact that the derivatives of
|
| 1273 |
+
both functors vanish below degree r. Indeed, the k-th layer in the Taylor tower of rImm(M, Rn)
|
| 1274 |
+
is determined by the following k-dimensional cubical diagram
|
| 1275 |
+
S �→ rImm(
|
| 1276 |
+
�
|
| 1277 |
+
k\S
|
| 1278 |
+
Dm, Rm).
|
| 1279 |
+
By the result of [AˇS22], this cubical diagram is equivalent to the diagram
|
| 1280 |
+
S �→ L(Rm, Rn)k\S × rConf(k \ S, Rn).
|
| 1281 |
+
24
|
| 1282 |
+
|
| 1283 |
+
Here L(Rm, Rn) is the space of injective linear maps from Rm to Rn. This is the “tangential
|
| 1284 |
+
data” of an immersion. When k > 1 the tangential data cancels out, and the last cube is as
|
| 1285 |
+
cartesian as the following cube
|
| 1286 |
+
(24)
|
| 1287 |
+
S �→ rConf(k \ S, Rn).
|
| 1288 |
+
On the other hand, the k-th layer in the Taylor tower of Ω∞Σ∞ rImm(M, Rn) is determined by
|
| 1289 |
+
the following k-dimensional cubical diagram
|
| 1290 |
+
(25)
|
| 1291 |
+
S �→ Ω∞Σ∞ rConf(k \ S, Rn).
|
| 1292 |
+
To prove the assertion about the connectivities of the maps in the two towers, we need to
|
| 1293 |
+
show that the cubical diagram (24) is as cartesian as the diagram (25) in the indicated cases.
|
| 1294 |
+
Furthermore, we want to prove that the map s in (23) induces an isomorphism/epimorphism on
|
| 1295 |
+
the first non-trivial homotopy groups of the total homotopy fibers in the appropriate cases.
|
| 1296 |
+
The map s induces the following map of cubical diagrams, indexed by the poset of subsets S ⊂ k,
|
| 1297 |
+
(26)
|
| 1298 |
+
rConf(k \ S, Rn)
|
| 1299 |
+
s−→ Ω∞Σ∞ rConf(k \ S, Rn).
|
| 1300 |
+
The spaces rConf(k \ S, Rn) are (r − 1)n − 2-connected. By Freudenthal suspension theorem,
|
| 1301 |
+
the maps (26) are 2(r−1)n−3-connected. On the other hand, both cubes are retractive cubes by
|
| 1302 |
+
Lemma 6.1. It follows that the homotopy groups of the total homotopy fibers of both cubes are
|
| 1303 |
+
isomorphic to the total kernels of the corresponding cubes of homotopy groups. Proposition 7.7
|
| 1304 |
+
tells us the connectivity of the total homotopy fiber of (25), and therefore also the connectivity
|
| 1305 |
+
of the total kernel of the corresponding cube of homotopy groups. If this connectivity is smaller
|
| 1306 |
+
than (resp. equals to) the connectivity of the maps in (26), then (26) induces an isomorphism
|
| 1307 |
+
(resp: an epimorphism) between the first non-trivial homotopy groups of the total homotopy
|
| 1308 |
+
fibers. So we have to check that the range provided by Proposition 7.7 is smaller than (or equals
|
| 1309 |
+
to) 2(r − 1)n − 3 in the cases indicated in the statement that we are trying to prove.
|
| 1310 |
+
Suppose first that r > n+ 1. In this case, Proposition 7.7 says that (25) is k(n−1) + r −n−1-
|
| 1311 |
+
cartesian. So we have to check that the inequality
|
| 1312 |
+
k(n − 1) + r − n − 1 < 2(r − 1)n − 3
|
| 1313 |
+
holds whenever k < 2r. Simplifying, we obtain the inequality
|
| 1314 |
+
k < (2n − 1)r − 3
|
| 1315 |
+
n − 1
|
| 1316 |
+
− 1.
|
| 1317 |
+
So it is enough to check the inequality
|
| 1318 |
+
2r ≤ (2n − 1)r − 3
|
| 1319 |
+
n − 1
|
| 1320 |
+
− 1.
|
| 1321 |
+
Multiplying by n − 1 we obtain the inequality
|
| 1322 |
+
2r(n − 1) ≤ (2n − 1)r − 3 − n + 1,
|
| 1323 |
+
which is equivalent to r ≥ n + 2, which is what we assumed.
|
| 1324 |
+
Now suppose that r ≤ n + 1. Then Proposition 7.7 says that (25) is k(n − 1) +
|
| 1325 |
+
� k
|
| 1326 |
+
r
|
| 1327 |
+
�
|
| 1328 |
+
(r − n − 1)-
|
| 1329 |
+
cartesian. So we have to check that the inequality
|
| 1330 |
+
k(n − 1) +
|
| 1331 |
+
�k
|
| 1332 |
+
r
|
| 1333 |
+
�
|
| 1334 |
+
(r − n − 1) < 2(r − 1)n − 3
|
| 1335 |
+
25
|
| 1336 |
+
|
| 1337 |
+
holds when r ≤ k < 2r, with the exception that when r = 3, k = 5 it is in fact an equality. The
|
| 1338 |
+
reader can check that in this case we do indeed obtain the equality
|
| 1339 |
+
5(n − 1) +
|
| 1340 |
+
�5
|
| 1341 |
+
3
|
| 1342 |
+
�
|
| 1343 |
+
(3 − n − 1) = 4n − 3.
|
| 1344 |
+
In other cases, the assumption r ≤ k < 2r implies
|
| 1345 |
+
� k
|
| 1346 |
+
r
|
| 1347 |
+
�
|
| 1348 |
+
= 1. So we have to check the inequality
|
| 1349 |
+
k(n − 1) + r − n − 1 < 2(r − 1)n − 3.
|
| 1350 |
+
We can rewrite the inequality as follows
|
| 1351 |
+
k(n − 1) < (2r − 1)(n − 1) + r − 3,
|
| 1352 |
+
or equivalently
|
| 1353 |
+
k < 2r − 1 + r − 3
|
| 1354 |
+
n − 1.
|
| 1355 |
+
For r = 3 this inequality is equivalent to k < 5. For 3 < r ≤ n + 1, this holds for all k ≤ 2r − 1,
|
| 1356 |
+
as stated.
|
| 1357 |
+
□
|
| 1358 |
+
10. Further questions
|
| 1359 |
+
1. We gave conditions on the m and n that guarantee intrinsic convergence of the Taylor tower
|
| 1360 |
+
of HZ ∧ rImm(M, Rn). The next question is, what does the Taylor tower from Theorem 8.1
|
| 1361 |
+
converge to? It is natural to guess that whenever the Taylor tower converges intrinsically, it
|
| 1362 |
+
actually converges to HZ ∧ rImm(M, Rn).
|
| 1363 |
+
2.
|
| 1364 |
+
What can one say about the convergence of the Taylor tower for the unstable functor
|
| 1365 |
+
rImm(M, Rn)? The question of intrinsic convergence of the unstable tower might be tractable,
|
| 1366 |
+
and is a good place to start. One can use the methods of this paper to describe the layers
|
| 1367 |
+
of the functor Σ∞rImm(M, Rn). Given this, one can try to analyse the layers of the functor
|
| 1368 |
+
rImm(M, Rn) via the cobar construction
|
| 1369 |
+
cobar(Ω∞, Σ∞Ω∞, Σ∞rImm(M, Rn)),
|
| 1370 |
+
in the style of [AC11]. It is conceivable that one can use these methods to obtain conditions on
|
| 1371 |
+
m, n, and r that guarantee that the tower converges intrinsically.
|
| 1372 |
+
Then there is a question of what the tower actually converges to. Once again, it seems reasonable
|
| 1373 |
+
to guess that whenever the Taylor tower of a “natural” functor converges intrinsically, then it
|
| 1374 |
+
actually converges to the functor.
|
| 1375 |
+
3. What can one say about r-immersions into a general manifold N? In order to understand the
|
| 1376 |
+
layers of the tower of the functor Σ∞rImm(M, N) one needs to understand (the stable homotopy
|
| 1377 |
+
type of) the homotopy fiber of the map rConf(k, N) → Nk. For r = 2 this homotopy fiber was
|
| 1378 |
+
analysed in [Aro09], and it seems likely that a similar analysis can be done for general r.
|
| 1379 |
+
4. Construct interesting invariants/obstructions to existence of r-immersions, using the Taylor
|
| 1380 |
+
tower. In this paper we focused on situations where the connectivity of the k-th layer in the
|
| 1381 |
+
tower goes to infinity as k goes to infinity. But situations when the connectivity does not go to
|
| 1382 |
+
infinity also can be interesting. Of particular potential interest are situations where the layers are
|
| 1383 |
+
all either −1-connected or −2-connected. In the former case, the bottom homotopy groups of
|
| 1384 |
+
the layers give invariants, in the latter case they give obstructions to existence.
|
| 1385 |
+
26
|
| 1386 |
+
|
| 1387 |
+
For example, it follows from Theorem 8.1 that when n = m+1 and r = n+1, then all the layers
|
| 1388 |
+
of HZ∧(n+ 1) Imm(M, Rn) are −1-connected. The 0-th homotopy groups of the layers should
|
| 1389 |
+
give invariants of r-immersions. In the case n = 2, and say M = S1, 3 Imm(S1, R2) is the space
|
| 1390 |
+
of smooth curves in R2 that do not have triple intersections. Spaces of such curves were studied
|
| 1391 |
+
quite intensely, starting with Arnol’d [Arn94, Tab96, Shu95]. In particular, Arnol’d developed the
|
| 1392 |
+
theory of finite type invariants for such curves. We expect these invariants to show up in the
|
| 1393 |
+
Taylor tower of HZ ∧ 3 Imm(S1, R2). In particular we speculate that the first non-trivial layer of
|
| 1394 |
+
the tower, which by Theorem 9.1 is the third layer, detects the “Strangeness” invariant, defined
|
| 1395 |
+
in [Arn94] and studied further in [Tab96] and [Shu95].
|
| 1396 |
+
References
|
| 1397 |
+
[AC11]
|
| 1398 |
+
Greg Arone and Michael Ching. Operads and chain rules for the calculus of functors. Ast´erisque
|
| 1399 |
+
338:vi+158, 2011.
|
| 1400 |
+
[ALV07]
|
| 1401 |
+
Gregory Arone, Pascal Lambrechts, and Ismar Voli´c. Calculus of functors, operad formality, and rational
|
| 1402 |
+
homology of embedding spaces. Acta Math. 1999(2):153–198, 2007.
|
| 1403 |
+
[Arn94]
|
| 1404 |
+
V. I. Arnol’d. Plane curves, their invariants, perestroikas and classifications. In Singularities and bi-
|
| 1405 |
+
furcations, volume 21 of Adv. Soviet Math., pages 33–91. Amer. Math. Soc., Providence, RI. 1994.
|
| 1406 |
+
With an appendix by F. Aicardi.
|
| 1407 |
+
[Aro09]
|
| 1408 |
+
Gregory Arone. Derivatives of embedding functors. I. The stable case. J. Topol., 2(3):461–516, 2009.
|
| 1409 |
+
[AˇS22]
|
| 1410 |
+
Gregory Arone and Franjo ˇSarˇcevi´c. The space of r-immersions of a union of discs in Rn. 2022.
|
| 1411 |
+
arXiv:2212.09809
|
| 1412 |
+
[BdBW18] Pedro Boavida de Brito and Michael Weiss. Spaces of smooth embeddings and configuration categories.
|
| 1413 |
+
J. Topol., 11(1):65–143, 2018.
|
| 1414 |
+
[BEZ90]
|
| 1415 |
+
Anders Bj¨orner, Paul H. Edelman, and G¨unter M. Ziegler. Hyperplane arrangements with a lattice of
|
| 1416 |
+
regions. Discrete Comput. Geom., 5(3):263–288, 1990.
|
| 1417 |
+
[BW95]
|
| 1418 |
+
Anders Bj¨orner and Volkmar Welker. The Homology of ”k-Equal” Manifolds and Related Partition
|
| 1419 |
+
Lattices. Adv. Math., 110(2):277–313, 1995.
|
| 1420 |
+
[DH12]
|
| 1421 |
+
William Dwyer and Kathryn Hess. Long knots and maps between operads. Geom. Topol., 16(2):919–
|
| 1422 |
+
955, 2012.
|
| 1423 |
+
[GK08]
|
| 1424 |
+
Thomas G. Goodwillie and John R. Klein. Multiple disjunction for spaces of Poincar´e embeddings. J.
|
| 1425 |
+
Topol., 1(4):761–803, 2008.
|
| 1426 |
+
[GK15]
|
| 1427 |
+
Thomas G. Goodwillie and John R. Klein. Multiple disjunction for spaces of smooth embeddings. J.
|
| 1428 |
+
Topol., 8(3):651–674, 2015.
|
| 1429 |
+
[GKW01]
|
| 1430 |
+
Thomas G. Goodwillie, John R. Klein, and Michael S. Weiss. Spaces of smooth embeddings, disjunction
|
| 1431 |
+
and surgery. In Surveys on surgery theory, Vol. 2, volume 149 of Ann. of Math. Stud., pages 221–284.
|
| 1432 |
+
Princeton Univ. Press, Princeton, NJ, 2001.
|
| 1433 |
+
[GM80]
|
| 1434 |
+
Mark Goresky and Robert MacPherson. Intersection homology theory. Topology, 19(2):135–162, 1980.
|
| 1435 |
+
[GM83a]
|
| 1436 |
+
Mark Goresky and Robert MacPherson. Intersection homology II. Invent. Math., 72(1):77–129, 1983.
|
| 1437 |
+
[GM83b]
|
| 1438 |
+
Mark Goresky and Robert MacPherson. Morse theory and intersection homology theory. In Analyse
|
| 1439 |
+
et topologie sur les espaces singuliers (II-III) - 6 - 10 juillet 1981, no. 101–102 in Ast´erisque, pages
|
| 1440 |
+
135–192. Soci´et´e math´ematique de France, 1983.
|
| 1441 |
+
[GM88]
|
| 1442 |
+
Mark Goresky and Robert MacPherson. Stratified Morse Theory. Springer, Berlin-Heidelberg, 1988.
|
| 1443 |
+
[Goo92]
|
| 1444 |
+
Thomas G. Goodwillie. Calculus II: Analytic functors. K-Theory, 5(4):295–332. 1991/92.
|
| 1445 |
+
[GW99]
|
| 1446 |
+
Thomas G. Goodwillie and Michael Weiss. Embeddings from the point of view of immersion theory
|
| 1447 |
+
II. Geom. Topol., 3:103–118 (electronic), 1999.
|
| 1448 |
+
[Hat02]
|
| 1449 |
+
Allen Hatcher. Algebraic topology. Cambridge University Press, Cambridge, 2002.
|
| 1450 |
+
[Hu94]
|
| 1451 |
+
Yi Hu. On the homology of complements of arrangements of subspaces and spheres. Proc. Amer.
|
| 1452 |
+
Math. Soc., 122(1):285–290, 1994.
|
| 1453 |
+
[LRV03]
|
| 1454 |
+
Wolfgang L¨uck, Holger Reich and Marco Varisco. Commuting homotopy limits and smash products.
|
| 1455 |
+
K-Theory, 30(2):137–165, 2003.
|
| 1456 |
+
27
|
| 1457 |
+
|
| 1458 |
+
[Mun05]
|
| 1459 |
+
Brian A. Munson. Embeddings in the 3/4 range. Topology, 44(6):1133–1157, 2005.
|
| 1460 |
+
[Mun10]
|
| 1461 |
+
Brian A. Munson. Introduction to the manifold calculus of Goodwillie-Weiss. Morfismos, 14(1):1–50,
|
| 1462 |
+
2010.
|
| 1463 |
+
[Mun11]
|
| 1464 |
+
Brian A. Munson. Derivatives of the identity and generalizations of Milnor’s invariants. J. Topol.,
|
| 1465 |
+
4(2):383–405, 2011.
|
| 1466 |
+
[MV15]
|
| 1467 |
+
Brian A. Munson and Ismar Voli´c. Cubical homotopy theory, volume 25 of New Mathematical Mono-
|
| 1468 |
+
graphs. Cambridge University Press, Cambridge, 2015.
|
| 1469 |
+
[OS80]
|
| 1470 |
+
Peter Orlik and Louis Solomon. Combinatorics and topology of complements of hyperplanes. Invent.
|
| 1471 |
+
Math., 56(2):167–189, 1980.
|
| 1472 |
+
[Shu95]
|
| 1473 |
+
Alexander Shumakovich. Explicit formulas for the strangeness of plane curves. Algebra i Analiz,
|
| 1474 |
+
7(3):165–199, 1995.
|
| 1475 |
+
[SˇSV20]
|
| 1476 |
+
Bridget Schreiner, Franjo ˇSarˇcevi´c, and Ismar Voli´c. Low stages of the Taylor tower for r-immersions
|
| 1477 |
+
Involve, a J. of Math., 13(1):51–75, 2020.
|
| 1478 |
+
[ST16]
|
| 1479 |
+
Paul Arnaud Songhafouo Tsopm´en´e. The rational homology of spaces of long links. Algebr. Geom.
|
| 1480 |
+
Topol., 16(2):757–782, 2016.
|
| 1481 |
+
[Tab96]
|
| 1482 |
+
Serge Tabachnikov. Invariants of smooth triple point free plane curves. J. Knot Theory Ramif.,
|
| 1483 |
+
5(4):531–552, 1996.
|
| 1484 |
+
[Vol06]
|
| 1485 |
+
Ismar Voli´c. Finite type knot invariants and the calculus of functors. Compos. Math., 142(1):222–250,
|
| 1486 |
+
2006.
|
| 1487 |
+
[Wal88]
|
| 1488 |
+
James W. Walker. Canonical homeomorphisms of posets. Eur. J. Comb., 9(2):97–107, 1988.
|
| 1489 |
+
[Wei99]
|
| 1490 |
+
Michael S. Weiss. Embeddings from the point of view of immersion theory I. Geom. Topol., 3:67–101
|
| 1491 |
+
(electronic), 1999.
|
| 1492 |
+
[Wei04]
|
| 1493 |
+
Michael S. Weiss. Homology of spaces of smooth embeddings. Q. J. Math., 55(4):499–504, 2004.
|
| 1494 |
+
[Whi62]
|
| 1495 |
+
George W. Whitehead. Generalized Homology Theories. Trans. Am. Math. Soc., 102(2):227–283,
|
| 1496 |
+
1962.
|
| 1497 |
+
[ZˇZ93]
|
| 1498 |
+
G¨unter Ziegler and Rade ˇZivaljevi´c. Homotopy types of subspace arrangements via diagrams of spaces.
|
| 1499 |
+
Math. Ann., 295:527–548, 1993.
|
| 1500 |
+
Gregory Arone
|
| 1501 |
+
Department of Mathematics, Stockholm University
|
| 1502 |
+
Email address: gregory.arone@math.su.se
|
| 1503 |
+
Franjo ˇSarˇcevi´c
|
| 1504 |
+
Department of Mathematics, University of Sarajevo
|
| 1505 |
+
Email address: franjo.sarcevic@live.de
|
| 1506 |
+
URL: pmf.unsa.ba/franjos
|
| 1507 |
+
28
|
| 1508 |
+
|
INE1T4oBgHgl3EQfXwS1/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
INE3T4oBgHgl3EQfugsS/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:aaaeef02dc8465720e976678e21ac4b2611a2352463c6d4fdd2c18056ed5c6b9
|
| 3 |
+
size 2293805
|
KtE0T4oBgHgl3EQfzgKz/content/2301.02674v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:4557865cd7d2681ff8587a8f1d1aba1e7a860e6acd74bcfd99a1e1b8765569c9
|
| 3 |
+
size 8520311
|
KtE0T4oBgHgl3EQfzgKz/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:3b40867abe79da9ca87dc9c3d320e082cc4d6f7f413005a0b31872078d7a820a
|
| 3 |
+
size 10027053
|
KtFRT4oBgHgl3EQfDzfl/content/tmp_files/2301.13474v1.pdf.txt
ADDED
|
@@ -0,0 +1,603 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.13474v1 [math.NT] 31 Jan 2023
|
| 2 |
+
GENERALIZED FRUIT DIOPHANTINE EQUATION AND
|
| 3 |
+
HYPERELLIPTIC CURVES
|
| 4 |
+
OM PRAKASH AND KALYAN CHAKRABORTY
|
| 5 |
+
Abstract. We show the insolvability of the Diophantine equation axd −y2 −z2 +xyz −
|
| 6 |
+
b = 0 in Z for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3, where d is an
|
| 7 |
+
odd integer and is a multiple of 3. Further, we investigate the more general family with
|
| 8 |
+
b = 2da − 3r, where r is a positive odd integer. As a consequence, we found an infinite
|
| 9 |
+
family of hyperelliptic curves with trivial torsion over Q. We conclude by providing some
|
| 10 |
+
numerical evidence corroborating the main results.
|
| 11 |
+
1. Introduction
|
| 12 |
+
One of the earliest topics in number theory is the study of Diophantine equations. In
|
| 13 |
+
the third century, Greek mathematician Diophantus of ‘Alexandria’ began this study. A
|
| 14 |
+
polynomial equation of the form
|
| 15 |
+
P(x1, x2, · · · , xn) = 0
|
| 16 |
+
is known as a Diophantine equation. Finding all of its integer solutions, or all of the
|
| 17 |
+
n−tuples (x1, x2, · · · , xn) ∈ Z that satisfy the above equation, is of prime interest. The
|
| 18 |
+
main task is to investigate whether solutions exist for a given Diophantine equation. If
|
| 19 |
+
they do, it would be the aim to know how many are there and how to find all. There
|
| 20 |
+
are certain Diophantine equations which has no non zero integer solutions, for example,
|
| 21 |
+
Fermat’s equation xn + yn = zn for n ≥ 3. The tenth of Hilbert’s 23 problems, which
|
| 22 |
+
he presented in 1900, dealt with Diophantine equations. Hilbert asked, is there an al-
|
| 23 |
+
gorithm to determine weather a given Diophantine equation has a solution or not? and
|
| 24 |
+
Matiyasevich in 1970 answered it negatively.
|
| 25 |
+
We investigate a class of Diophantine equations of the form axd−y2−z2+xyz−b = 0 for
|
| 26 |
+
fixed a and b. Due to its emergence when attempting to solve an equation involving fruits,
|
| 27 |
+
this type of Diophantine equations were given the name “Fruit Diophantine equation” by
|
| 28 |
+
B. Sury and D. Majumdar [5] and they proved the following:
|
| 29 |
+
2010 Mathematics Subject Classification. Primary: 11D41, 11D72. Secondary: 11G30.
|
| 30 |
+
Key words and phrases. Diophantine equation, Quadratic residue, Elliptic curves, Hyperelliptic curves.
|
| 31 |
+
1
|
| 32 |
+
|
| 33 |
+
2
|
| 34 |
+
OM PRAKASH AND KALYAN CHAKRABORTY
|
| 35 |
+
Theorem 1.1. [5] The equation
|
| 36 |
+
y2 − xyz + z2 = x3 − 5
|
| 37 |
+
has no integer solution in x, y and z.
|
| 38 |
+
Similar type of equations were previously studied by F. Luca and A. Togb´e. In particu-
|
| 39 |
+
lar, Luca and Togb´e [4] studied the solution of the Diophantine equation x3+by+1−xyz =
|
| 40 |
+
0 and later, Togb´e [7] independently studied the equation x3 + by + 4 − xyz = 0.
|
| 41 |
+
As a consequence of Theorem 1.1 Majumdar and Sury proved the following:
|
| 42 |
+
Theorem 1.2. [5] For any integer m, the elliptic curve
|
| 43 |
+
Em : y2 − mxy = x3 + m2 + 5
|
| 44 |
+
has no integral point.
|
| 45 |
+
L. Vaishya and R. Sharma expanded on Majumdar and Sury’s work in [8]. A class of
|
| 46 |
+
fruit Diophantine equations without an integer solution was found by them. In particular
|
| 47 |
+
Vaishya and Sharma showed,
|
| 48 |
+
Theorem 1.3. [8] For fixed integers a and b with a ≡ 1 (mod 12) and b = 8a − 3. The
|
| 49 |
+
Diophantine equation
|
| 50 |
+
ax3 − y2 − z2 + xyz − b = 0
|
| 51 |
+
has no integer solution.
|
| 52 |
+
Using Nagell-Lutz theorem [6] and Theorem 1.3 they got hold of an infinite family of
|
| 53 |
+
elliptic curves with torsion-free Mordell-Weil group over Q.
|
| 54 |
+
Theorem 1.4. [8] Let a and b be as in Theorem 1.3.
|
| 55 |
+
• For any even integer m the elliptic curve
|
| 56 |
+
Ee
|
| 57 |
+
m,a,b : y2 = x3 + 1
|
| 58 |
+
4m2x2 − a2 �
|
| 59 |
+
m2 + b
|
| 60 |
+
�
|
| 61 |
+
has torsion-free Mordell-Weil group.
|
| 62 |
+
• For any odd integer m the elliptic curve
|
| 63 |
+
Eo
|
| 64 |
+
m,a,b : y2 = x3 + m2x2 − 64a2 �
|
| 65 |
+
m2 + b
|
| 66 |
+
�
|
| 67 |
+
has torsion-free Mordell-Weil group.
|
| 68 |
+
|
| 69 |
+
GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
|
| 70 |
+
3
|
| 71 |
+
We extend Vaishya and Sharma’s results [8] for higher exponents. We obtain a family
|
| 72 |
+
of hyperelliptic curves, by carrying out some appropriate transformations. In 2013, D.
|
| 73 |
+
Grant gave an analogue of Nagell-Lutz theorem for hyperelliptic curves [3], using which
|
| 74 |
+
we conclude that the Mordell-Weil group of each member of the corresponding family of
|
| 75 |
+
hyperelliptic curves is torsion-free.
|
| 76 |
+
2. Insolvability
|
| 77 |
+
Here we state and prove the main theorem and derive a couple of interesting corollaries.
|
| 78 |
+
We end this section by looking into a couple of examples.
|
| 79 |
+
Theorem 2.1. The equation
|
| 80 |
+
axd − y2 − z2 + xyz − b = 0
|
| 81 |
+
has no integer solutions for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3,
|
| 82 |
+
where d is an odd integer and divisible by 3.
|
| 83 |
+
Proof. Consider
|
| 84 |
+
axd − y2 − z2 + xyz − b = 0.
|
| 85 |
+
(2.1)
|
| 86 |
+
If possible, let (x, y, z) be an integer solution of (2.1). Let us fix x = α. Then (2.1) can
|
| 87 |
+
be re-written as,
|
| 88 |
+
y2 + z2 + b = aαd + αyz.
|
| 89 |
+
(2.2)
|
| 90 |
+
We consider the cases of α being even or odd separately.
|
| 91 |
+
Case 1. If α is even. Then, we write (2.2) as:
|
| 92 |
+
�
|
| 93 |
+
y − αz
|
| 94 |
+
2
|
| 95 |
+
�2
|
| 96 |
+
−
|
| 97 |
+
�α2
|
| 98 |
+
4 − 1
|
| 99 |
+
�
|
| 100 |
+
z2 = aαd − b
|
| 101 |
+
(2.3)
|
| 102 |
+
and set Y = y − αz
|
| 103 |
+
2 , β = α
|
| 104 |
+
2 and z = Z. Thus (2.3) becomes,
|
| 105 |
+
Y 2 −
|
| 106 |
+
�
|
| 107 |
+
β2 − 1
|
| 108 |
+
�
|
| 109 |
+
Z2 = aαd − b = 2dβda − b.
|
| 110 |
+
(2.4)
|
| 111 |
+
• If β is even, say β = 2n for some integer n, then reducing (2.4) modulo 4 gives,
|
| 112 |
+
Y 2 + Z2 ≡ 3
|
| 113 |
+
(mod 4),
|
| 114 |
+
(2.5)
|
| 115 |
+
which is not possible in Z/4Z.
|
| 116 |
+
|
| 117 |
+
4
|
| 118 |
+
OM PRAKASH AND KALYAN CHAKRABORTY
|
| 119 |
+
• If β is odd, then β = 2n + 1 for some integer n. Reduction of (2.4) modulo 4
|
| 120 |
+
entails,
|
| 121 |
+
Y 2 ≡ 3
|
| 122 |
+
(mod 4)
|
| 123 |
+
(2.6)
|
| 124 |
+
which is impossible.
|
| 125 |
+
Case 2. If α is odd, say, α = 2n + 1 for some integer n. Then,
|
| 126 |
+
y2 + z2 + b
|
| 127 |
+
=
|
| 128 |
+
aαd + αyz
|
| 129 |
+
y2 + z2 + a2d − 3
|
| 130 |
+
=
|
| 131 |
+
a (2n + 1)d + αyz
|
| 132 |
+
y2 + z2 − (2n + 1) yz
|
| 133 |
+
=
|
| 134 |
+
a (2n + 1)d − a2d + 3.
|
| 135 |
+
Now
|
| 136 |
+
y2 + z2 + yz
|
| 137 |
+
≡
|
| 138 |
+
a + 3
|
| 139 |
+
(mod 2),
|
| 140 |
+
⇒ y2 + z2 + yz
|
| 141 |
+
≡
|
| 142 |
+
0
|
| 143 |
+
(mod 2).
|
| 144 |
+
Note that y2 + z2 + yz ≡ a + 3 (mod 2) has only solution y ≡ 0 ≡ z in Z/2Z, that is, y
|
| 145 |
+
and z are even. Thus (2.3) becomes
|
| 146 |
+
aαd − b ≡ 0
|
| 147 |
+
(mod 4).
|
| 148 |
+
If we write a = 12l + 1 for some integer l, then,
|
| 149 |
+
αd −
|
| 150 |
+
�
|
| 151 |
+
a2d − 3
|
| 152 |
+
�
|
| 153 |
+
≡
|
| 154 |
+
0
|
| 155 |
+
(mod 4),
|
| 156 |
+
⇒ αd + 3
|
| 157 |
+
≡
|
| 158 |
+
0
|
| 159 |
+
(mod 4),
|
| 160 |
+
⇒ αd
|
| 161 |
+
≡
|
| 162 |
+
1
|
| 163 |
+
(mod 4),
|
| 164 |
+
⇒ α
|
| 165 |
+
≡
|
| 166 |
+
1
|
| 167 |
+
(mod 4).
|
| 168 |
+
Let us consider
|
| 169 |
+
�
|
| 170 |
+
y − αz
|
| 171 |
+
2
|
| 172 |
+
�2
|
| 173 |
+
−
|
| 174 |
+
�α2
|
| 175 |
+
4 − 1
|
| 176 |
+
�
|
| 177 |
+
z2
|
| 178 |
+
=
|
| 179 |
+
aαd − b,
|
| 180 |
+
i.e.
|
| 181 |
+
�
|
| 182 |
+
y − αz
|
| 183 |
+
2
|
| 184 |
+
�2
|
| 185 |
+
−
|
| 186 |
+
�
|
| 187 |
+
α2 − 4
|
| 188 |
+
� �z
|
| 189 |
+
2
|
| 190 |
+
�2
|
| 191 |
+
=
|
| 192 |
+
aαd − b.
|
| 193 |
+
Further, we set Y = y − αz
|
| 194 |
+
2 and Z = z
|
| 195 |
+
2. Then,
|
| 196 |
+
Y 2 −
|
| 197 |
+
�
|
| 198 |
+
α2 − 4
|
| 199 |
+
�
|
| 200 |
+
Z2 = aαd − b
|
| 201 |
+
(2.7)
|
| 202 |
+
where α ≡ 1 (mod 4), a ≡ 1 (mod 12) and b = a2d − 3. Three sub cases need to be
|
| 203 |
+
considered.
|
| 204 |
+
|
| 205 |
+
GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
|
| 206 |
+
5
|
| 207 |
+
Sub-case 1. If α ≡ 1 (mod 12), write α = 12l + 1 for some integer l. Then,
|
| 208 |
+
α ≡ 1
|
| 209 |
+
(mod 3)
|
| 210 |
+
⇒ α + 2 ≡ 0
|
| 211 |
+
(mod 3).
|
| 212 |
+
Substituting α = 12l + 1 in 2.7, we get
|
| 213 |
+
Y 2 −
|
| 214 |
+
�
|
| 215 |
+
(12l + 1)2 − 4
|
| 216 |
+
�
|
| 217 |
+
Z2
|
| 218 |
+
=
|
| 219 |
+
aαd − b,
|
| 220 |
+
⇒ Y 2 ≡ aαd − b
|
| 221 |
+
(mod 3),
|
| 222 |
+
⇒ Y 2 ≡ a (12l + 1)d − a2d + 3
|
| 223 |
+
(mod 3),
|
| 224 |
+
⇒ Y ≡ 1 − 2d
|
| 225 |
+
(mod 3),
|
| 226 |
+
⇒ Y 2 ≡ 2
|
| 227 |
+
(mod 3).
|
| 228 |
+
A contradiction as 2 is not square modulo 3.
|
| 229 |
+
Sub-case 2. If α ≡ 9 (mod 12). Then, there is a prime factor p ≡ 5 or 7 (mod 12) of
|
| 230 |
+
(α − 2). Let p ≡ 5 or 7 (mod 12) be a prime factor of (α − 2). Thus,
|
| 231 |
+
Y 2 ≡ aαd − b
|
| 232 |
+
(mod p).
|
| 233 |
+
Let α = pl + 2 for some integer l. Then,
|
| 234 |
+
Y 2
|
| 235 |
+
≡
|
| 236 |
+
a (pl + 2)d − b
|
| 237 |
+
(mod p),
|
| 238 |
+
⇒ Y 2
|
| 239 |
+
≡
|
| 240 |
+
3
|
| 241 |
+
(mod p).
|
| 242 |
+
This leads to a contradiction as 3 is not a quadratic residue modulo p.
|
| 243 |
+
Sub-case 3. When α ≡ 5 (mod 12), we substitute α = 3k + 2 for some integer k and
|
| 244 |
+
get,
|
| 245 |
+
Y 2 −
|
| 246 |
+
�
|
| 247 |
+
(3l + 2)2 − 4
|
| 248 |
+
�
|
| 249 |
+
Z2
|
| 250 |
+
=
|
| 251 |
+
(12l + 1) (3k + 2) − 2d (12l + 1) + 3,
|
| 252 |
+
⇒ Y 2
|
| 253 |
+
≡
|
| 254 |
+
2 − 2d ≡ 0
|
| 255 |
+
(mod 3),
|
| 256 |
+
⇒ Y
|
| 257 |
+
≡
|
| 258 |
+
0
|
| 259 |
+
(mod 3).
|
| 260 |
+
|
| 261 |
+
6
|
| 262 |
+
OM PRAKASH AND KALYAN CHAKRABORTY
|
| 263 |
+
Further, we substitute Y = 3m and α = 12n + 5 for some integers n and m in 2.7 and
|
| 264 |
+
arrive onto,
|
| 265 |
+
9m2 − (12n + 3) (12n + 7) Z2
|
| 266 |
+
=
|
| 267 |
+
a (12n + 5)d − b,
|
| 268 |
+
⇒ − (n + 1) Z2
|
| 269 |
+
≡
|
| 270 |
+
d−1
|
| 271 |
+
�
|
| 272 |
+
i=0
|
| 273 |
+
(12n + 5)d−1−i 2i
|
| 274 |
+
(mod 3),
|
| 275 |
+
⇒ − (n + 1) Z2
|
| 276 |
+
≡
|
| 277 |
+
1
|
| 278 |
+
(mod 3),
|
| 279 |
+
⇒ n
|
| 280 |
+
≡
|
| 281 |
+
1
|
| 282 |
+
(mod 3).
|
| 283 |
+
Hence, α ≡ 17 (mod 36).
|
| 284 |
+
Note that 3 divides (α − 2). Thus there is a prime factor p ≡ 5 or 7 (mod 12) of (α−2)
|
| 285 |
+
3
|
| 286 |
+
,
|
| 287 |
+
otherwise it would mean that α−2
|
| 288 |
+
3
|
| 289 |
+
is congruent to ±1, which is not the case. Therefore,
|
| 290 |
+
α − 2 ≡ 0
|
| 291 |
+
(mod p).
|
| 292 |
+
Thus,
|
| 293 |
+
Y 2 ≡ aαd − b
|
| 294 |
+
(mod p).
|
| 295 |
+
Substituting α = pl + 2 for some integer l, we have
|
| 296 |
+
Y 2 ≡ 3
|
| 297 |
+
(mod p),
|
| 298 |
+
which contradicts the fact that 3 is quadratic residue modulo p if p ≡ ±1 (mod 12).
|
| 299 |
+
□
|
| 300 |
+
Remark 1. The result of Sury and Majumdar [5] follows by substituting a = 1 and d = 3
|
| 301 |
+
in Theorem 2.1. The particular case d = 3 in the same theorem deduces the results of
|
| 302 |
+
Vaishya and Sharma [8].
|
| 303 |
+
By increasing the exponents in the expression for b to 3, we will now examine the
|
| 304 |
+
Diophantine equation with a little more generality. The potential of a solution in this
|
| 305 |
+
scenario is described by the following two corollaries, along with a few examples.
|
| 306 |
+
Corollary 2.1. The equation
|
| 307 |
+
axd − y2 − z2 + xyz − b = 0
|
| 308 |
+
has no integer solution (x, y, z) with x even for fixed integers a and b such that a ≡ 1
|
| 309 |
+
(mod 12) and b = 2da − 3r with positive odd integers r and d as in Theorem 2.1.
|
| 310 |
+
|
| 311 |
+
GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
|
| 312 |
+
7
|
| 313 |
+
Proof. We follow exactly the same steps as in Case 1 of Theorem 2.1. Suppose there is a
|
| 314 |
+
solution with x = α even, then we write (2.2) as:
|
| 315 |
+
�
|
| 316 |
+
y − αz
|
| 317 |
+
2
|
| 318 |
+
�2
|
| 319 |
+
−
|
| 320 |
+
�α2
|
| 321 |
+
4 − 1
|
| 322 |
+
�
|
| 323 |
+
z2 = aαd − b.
|
| 324 |
+
(2.8)
|
| 325 |
+
Let Y = y − αz
|
| 326 |
+
2 , β = α
|
| 327 |
+
2 and z = Z. Then (2.8) can be written as,
|
| 328 |
+
Y 2 −
|
| 329 |
+
�
|
| 330 |
+
β2 − 1
|
| 331 |
+
�
|
| 332 |
+
Z2 = aαd − b = 2dβda − b.
|
| 333 |
+
(2.9)
|
| 334 |
+
• If β is even, say β = 2n for some integer n, then the reduction modulo 4 of (2.9)
|
| 335 |
+
will give,
|
| 336 |
+
Y 2 + Z2 ≡ 3r ≡ 3
|
| 337 |
+
(mod 4),
|
| 338 |
+
(2.10)
|
| 339 |
+
which is not feasible in Z/4Z.
|
| 340 |
+
• If β is odd, say β = 2n + 1 for some integer n. Then, the reduction modulo 4 of
|
| 341 |
+
(2.9) provides,
|
| 342 |
+
Y 2 ≡ 3r ≡ 3
|
| 343 |
+
(mod 4),
|
| 344 |
+
(2.11)
|
| 345 |
+
which again is not possible.
|
| 346 |
+
□
|
| 347 |
+
The following corollary deals with solutions having x, an odd integer:
|
| 348 |
+
Corollary 2.2. The equation
|
| 349 |
+
axd − y2 − z2 + xyz − b = 0
|
| 350 |
+
has no integer solution in x, y and z with x ≡ 1 or 9 (mod 12), for fixed integers a, b
|
| 351 |
+
such that a ≡ 1 (mod 12) and b = 2da − 3r, for r and d as in Corollary 2.1.
|
| 352 |
+
Proof. Analogous steps as in Sub-case 2 and 3 of Theorem 2.1 will give the proof.
|
| 353 |
+
□
|
| 354 |
+
Remark 2. Corollary 2.2 says that, if there is a solution of axd − y2 − z2 + xyz − b = 0
|
| 355 |
+
with a and b as described in the Corollary 2.2, then x must be 5 modulo 12.
|
| 356 |
+
We will see some examples.
|
| 357 |
+
Example 1. For a = 25, d = 3 and r = 3. The equation
|
| 358 |
+
25x3 − y2 − z2 + xyz − 173 = 0
|
| 359 |
+
(2.12)
|
| 360 |
+
has no integer solution.
|
| 361 |
+
|
| 362 |
+
8
|
| 363 |
+
OM PRAKASH AND KALYAN CHAKRABORTY
|
| 364 |
+
Example 2 shows that the equation may not have solution even with x ≡ 5 (mod 12).
|
| 365 |
+
However, the next examples tell us the other possibility as well.
|
| 366 |
+
Example 2. If a = 13, d = 3 and r = 3, then
|
| 367 |
+
13x3 − y2 − z2 + xyz − 77 = 0
|
| 368 |
+
(2.13)
|
| 369 |
+
has an integer solution (5, = 18, −102).
|
| 370 |
+
Remark 3. The condition that r should be odd is rigid.
|
| 371 |
+
Example 3. For a = 13, d = 3 and r = 2, the equation
|
| 372 |
+
13x3 − y2 − z2 + xyz − 95 = 0
|
| 373 |
+
(2.14)
|
| 374 |
+
has an integer solution (2, −10, −7).
|
| 375 |
+
3. Hyperelliptic curves
|
| 376 |
+
A hyperelliptic curve H over Q is a smooth projective curve associated to an affine plane
|
| 377 |
+
curve given by the equation y2 = f (x), where f is a square-free polynomial of degree at
|
| 378 |
+
least 5. If the degree of f is 2g + 1 or 2g + 2, then the curve has genus g. We write H (Q)
|
| 379 |
+
for the set of Q-points on H. Determining rational points on hyperelliptic curve is one
|
| 380 |
+
of the major problems in mathematics. The following is the general result regarding the
|
| 381 |
+
size of H (Q), which was conjectured by Mordell and was proved by Faltings:
|
| 382 |
+
Theorem 3.1. [2] If C is a smooth, projective and absolutely irreducible curve over Q of
|
| 383 |
+
genus at least 2, then C (Q) is finite.
|
| 384 |
+
We may thus, at least theoretically, write down the finite set C (Q). It is still a signifi-
|
| 385 |
+
cant unresolved problem to perform this practically for a given curve.
|
| 386 |
+
Given a hyperelliptic curve H, we can define the height (classical) function to be the
|
| 387 |
+
maximum of absolute values of the coefficients. The Northcott property tells us that there
|
| 388 |
+
are finitely many equations with bounded height. Thus, one may talk about the density
|
| 389 |
+
and averages. In this regard, Bhargava [1] has proved that most of the hyperelliptic curve
|
| 390 |
+
over Q has no rational point. So, most of the times calculating H (Q) means proving
|
| 391 |
+
H (Q) = φ.
|
| 392 |
+
In this section, we construct hyperelliptic curves corresponding to the equation axd −
|
| 393 |
+
y2 − z2 + xyz − b = 0 with a and b as mentioned in Theorem 2.1.
|
| 394 |
+
Then, we prove
|
| 395 |
+
that H (Q) = φ (corroborating Bhargava [1]). The main ingredient to prove this is the
|
| 396 |
+
following Nagell-Lutz type theorem (Theorem 3, [3]) proved by D. Grant.
|
| 397 |
+
|
| 398 |
+
GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
|
| 399 |
+
9
|
| 400 |
+
Theorem 3.2. [3] Let C be a nonsingular projective curve of genus g ≥ 1 given by
|
| 401 |
+
y2 = x2g+1 + b1x2g + · · · + b2gx + b2g+1, where bi ∈ Z. Suppose
|
| 402 |
+
ψ : C (Q) → J (Q)
|
| 403 |
+
be the Abel-Jacobi map, defined by ψ (p) = [p − ∞], where J (Q) is the Jacobian variety.
|
| 404 |
+
If p = (x, y) ∈ C (Q) \ {∞} and ψ (p) ∈ J (Q)tors, then, x, y ∈ Z and either y = 0 or y2
|
| 405 |
+
divides discriminant of the polynomial x2g+1 + b1x2g + · · · + b2gx + b2g+1.
|
| 406 |
+
For fixed m we define hyperelliptic curves,
|
| 407 |
+
Hm,a,b : y2 − mxy = axd − m2 − b.
|
| 408 |
+
• Suppose m is even. Then write (2.1) as:
|
| 409 |
+
�
|
| 410 |
+
y − mx
|
| 411 |
+
2
|
| 412 |
+
�2
|
| 413 |
+
− m2x2
|
| 414 |
+
4
|
| 415 |
+
= axd − m2 − b.
|
| 416 |
+
(3.1)
|
| 417 |
+
Multiplying (3.1) by ad−1 throughout, and using the fact that d is odd and divisible
|
| 418 |
+
by 3, we have,
|
| 419 |
+
��
|
| 420 |
+
y − mx
|
| 421 |
+
2
|
| 422 |
+
�
|
| 423 |
+
a
|
| 424 |
+
d−1
|
| 425 |
+
2
|
| 426 |
+
�2
|
| 427 |
+
− ad−1m2x2
|
| 428 |
+
4
|
| 429 |
+
= (ax)d − m2ad−1 − bad−1.
|
| 430 |
+
(3.2)
|
| 431 |
+
We get the following hyperelliptic curve by substituting
|
| 432 |
+
��
|
| 433 |
+
y − mx
|
| 434 |
+
2
|
| 435 |
+
�
|
| 436 |
+
a
|
| 437 |
+
d−1
|
| 438 |
+
2
|
| 439 |
+
�
|
| 440 |
+
= Y and
|
| 441 |
+
ax = X,
|
| 442 |
+
He
|
| 443 |
+
m,a,b : Y 2 − ad−3m2X2
|
| 444 |
+
4
|
| 445 |
+
= Xd − m2ad−1 − bad−1.
|
| 446 |
+
(3.3)
|
| 447 |
+
• Now if m is odd, multiply (3.2) by 4d throughout to get
|
| 448 |
+
��
|
| 449 |
+
y − mx
|
| 450 |
+
2
|
| 451 |
+
�
|
| 452 |
+
a
|
| 453 |
+
d−1
|
| 454 |
+
2 2d�2
|
| 455 |
+
− (4a)d−1 m2x2 = (4ax)d − m2ad−14d − bad−14d.
|
| 456 |
+
Finally substitute
|
| 457 |
+
��
|
| 458 |
+
y − mx
|
| 459 |
+
2
|
| 460 |
+
�
|
| 461 |
+
a
|
| 462 |
+
d−1
|
| 463 |
+
2 2d�
|
| 464 |
+
= Y and 4ax = X, to get
|
| 465 |
+
Ho
|
| 466 |
+
m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.
|
| 467 |
+
(3.4)
|
| 468 |
+
Let,
|
| 469 |
+
Hm,a,b =
|
| 470 |
+
|
| 471 |
+
|
| 472 |
+
|
| 473 |
+
He
|
| 474 |
+
m,a,b
|
| 475 |
+
if m is even
|
| 476 |
+
Ho
|
| 477 |
+
m,a,b
|
| 478 |
+
if m is odd,
|
| 479 |
+
(3.5)
|
| 480 |
+
be the hyperelliptic curves.
|
| 481 |
+
Theorem 3.3. Let a and b be as defined in Theorem 2.1. For any m ∈ N, the hyperelliptic
|
| 482 |
+
curve Hm,a,b has torsion-free Mordell-Weil group over Q.
|
| 483 |
+
|
| 484 |
+
10
|
| 485 |
+
OM PRAKASH AND KALYAN CHAKRABORTY
|
| 486 |
+
Proof. Let a and b be fixed positive integers with a ≡ 1 (mod 12) and b = 2da − 3.
|
| 487 |
+
• For any even integer m, consider the hyperelliptic curve
|
| 488 |
+
He
|
| 489 |
+
m,a,b : Y 2 − ad−3m2X2
|
| 490 |
+
4
|
| 491 |
+
= Xd − m2ad−1 − bad−1.
|
| 492 |
+
(3.6)
|
| 493 |
+
By Theorem 3 of [3], if (3.6) has an integer solution (X0, Y0),
|
| 494 |
+
then
|
| 495 |
+
�
|
| 496 |
+
aX0,
|
| 497 |
+
��
|
| 498 |
+
Y0 − mX0
|
| 499 |
+
2
|
| 500 |
+
�
|
| 501 |
+
a
|
| 502 |
+
d−1
|
| 503 |
+
2
|
| 504 |
+
�
|
| 505 |
+
, m
|
| 506 |
+
�
|
| 507 |
+
is a solution of (2.1). However, in Theorem
|
| 508 |
+
2.1 we have proved that it has no integer solutions.
|
| 509 |
+
• For an odd integer m, consider the hyperelliptic curve
|
| 510 |
+
Ho
|
| 511 |
+
m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.
|
| 512 |
+
(3.7)
|
| 513 |
+
Suppose (3.7) has a solution (X0, Y0), then
|
| 514 |
+
�
|
| 515 |
+
4aX0,
|
| 516 |
+
��
|
| 517 |
+
Y0 − mX0
|
| 518 |
+
2
|
| 519 |
+
�
|
| 520 |
+
a
|
| 521 |
+
d−1
|
| 522 |
+
2 2d�
|
| 523 |
+
, m
|
| 524 |
+
�
|
| 525 |
+
is a
|
| 526 |
+
solution of (2.1), which is a contradiction.
|
| 527 |
+
□
|
| 528 |
+
4. Numerical examples
|
| 529 |
+
In this section we give some numerical examples corroborating our results in Corollary
|
| 530 |
+
2.2 and Remark 2.
|
| 531 |
+
a
|
| 532 |
+
d
|
| 533 |
+
r
|
| 534 |
+
Equation
|
| 535 |
+
Solution
|
| 536 |
+
1
|
| 537 |
+
3
|
| 538 |
+
3
|
| 539 |
+
x3 − y2 − z2 + xyz + 19 = 0
|
| 540 |
+
(5, 0, −12)
|
| 541 |
+
1
|
| 542 |
+
3
|
| 543 |
+
5
|
| 544 |
+
x3 − y2 − z2 + xyz + 235 = 0
|
| 545 |
+
(29, 12, −60)
|
| 546 |
+
1
|
| 547 |
+
3
|
| 548 |
+
7
|
| 549 |
+
x3 − y2 − z2 + xyz + 2179 = 0
|
| 550 |
+
(5, 0, −48)
|
| 551 |
+
1
|
| 552 |
+
3
|
| 553 |
+
9
|
| 554 |
+
x3 − y2 − z2 + xyz + 19675 = 0
|
| 555 |
+
(−31, 12, −30)
|
| 556 |
+
13
|
| 557 |
+
3
|
| 558 |
+
3
|
| 559 |
+
13x3 − y2 − z2 + xyz − 77 = 0
|
| 560 |
+
(5, −18, −102)
|
| 561 |
+
13
|
| 562 |
+
3
|
| 563 |
+
5
|
| 564 |
+
13x3 − y2 − z2 + xyz + 139 = 0
|
| 565 |
+
(5, 0, −42)
|
| 566 |
+
13
|
| 567 |
+
3
|
| 568 |
+
7
|
| 569 |
+
13x3 − y2 − z2 + xyz + 2083 = 0
|
| 570 |
+
?
|
| 571 |
+
25
|
| 572 |
+
3
|
| 573 |
+
3
|
| 574 |
+
25x3 − y2 − z2 + xyz − 173 = 0
|
| 575 |
+
(5, 0, −42)
|
| 576 |
+
Acknowledgement
|
| 577 |
+
This work is done during the first author’s visit to Institute of Mathematical Sci-
|
| 578 |
+
ences (IMSc), Chennai, and he is grateful to the Institute for the hospitality and the
|
| 579 |
+
wonderful working ambience. Both the authors are grateful to Kerala School of Mathe-
|
| 580 |
+
matics(KSoM), Kozhikode, for it’s support and wonderful ambience.
|
| 581 |
+
|
| 582 |
+
GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES
|
| 583 |
+
11
|
| 584 |
+
References
|
| 585 |
+
[1] M. Bhargava, Most hyperelliptic curve over Q have no rational point, arXiv:1308.0395.
|
| 586 |
+
[2] G. Faltings, “Finiteness theorems for abelian varieties over number fields”, Invent. Math., 73 (1983),
|
| 587 |
+
349–366.
|
| 588 |
+
[3] D. Grant, On an analogue of the Lutz-Nagell theorem for hyperelliptic curves, J. Number Theory,
|
| 589 |
+
133 (2013), 963–969.
|
| 590 |
+
[4] F. Luca and A. Togb´e, On the positive integral solution of the Diophantine equation x3+by+1−xyz,
|
| 591 |
+
Bull. Malays. Math. Sci. Soc., 31 (2008), 129–134.
|
| 592 |
+
[5] D. Majumdar and B. Sury, Fruit Diophantine Equation,https://arxiv.org/abs/2108.02640.
|
| 593 |
+
[6] J.H. Silverman, , J.T. Tate, Rational Points on Elliptic Curves, Undergraduate Texts in Mathematics.
|
| 594 |
+
Springer-Verlag, New York (1992).
|
| 595 |
+
[7] A. Togb´e, On the positive integral solution of the Diophantine equation x3 + by + 4 − xyz, Afr.
|
| 596 |
+
Diaspora J. Math., 8 (2009), 81–89.
|
| 597 |
+
[8] L. Vaishya and R. Sharma, A class of fruit Diophantine equations, Monatshefte f¨ur Mathematik, 199
|
| 598 |
+
(2022), 899–907.
|
| 599 |
+
Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.
|
| 600 |
+
Email address: omprakash@ksom.res.in
|
| 601 |
+
Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.
|
| 602 |
+
Email address: kalychak@ksom.res.in
|
| 603 |
+
|
KtFRT4oBgHgl3EQfDzfl/content/tmp_files/load_file.txt
ADDED
|
@@ -0,0 +1,291 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf,len=290
|
| 2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 3 |
+
page_content='13474v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 4 |
+
page_content='NT] 31 Jan 2023 GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES OM PRAKASH AND KALYAN CHAKRABORTY Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 5 |
+
page_content=' We show the insolvability of the Diophantine equation axd −y2 −z2 +xyz − b = 0 in Z for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3, where d is an odd integer and is a multiple of 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 6 |
+
page_content=' Further, we investigate the more general family with b = 2da − 3r, where r is a positive odd integer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 7 |
+
page_content=' As a consequence, we found an infinite family of hyperelliptic curves with trivial torsion over Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 8 |
+
page_content=' We conclude by providing some numerical evidence corroborating the main results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 9 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 10 |
+
page_content=' Introduction One of the earliest topics in number theory is the study of Diophantine equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 11 |
+
page_content=' In the third century, Greek mathematician Diophantus of ‘Alexandria’ began this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 12 |
+
page_content=' A polynomial equation of the form P(x1, x2, · · · , xn) = 0 is known as a Diophantine equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 13 |
+
page_content=' Finding all of its integer solutions, or all of the n−tuples (x1, x2, · · · , xn) ∈ Z that satisfy the above equation, is of prime interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 14 |
+
page_content=' The main task is to investigate whether solutions exist for a given Diophantine equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 15 |
+
page_content=' If they do, it would be the aim to know how many are there and how to find all.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 16 |
+
page_content=' There are certain Diophantine equations which has no non zero integer solutions, for example, Fermat’s equation xn + yn = zn for n ≥ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 17 |
+
page_content=' The tenth of Hilbert’s 23 problems, which he presented in 1900, dealt with Diophantine equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 18 |
+
page_content=' Hilbert asked, is there an al- gorithm to determine weather a given Diophantine equation has a solution or not?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 19 |
+
page_content=' and Matiyasevich in 1970 answered it negatively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 20 |
+
page_content=' We investigate a class of Diophantine equations of the form axd−y2−z2+xyz−b = 0 for fixed a and b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 21 |
+
page_content=' Due to its emergence when attempting to solve an equation involving fruits, this type of Diophantine equations were given the name “Fruit Diophantine equation” by B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 22 |
+
page_content=' Sury and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 23 |
+
page_content=' Majumdar [5] and they proved the following: 2010 Mathematics Subject Classification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 24 |
+
page_content=' Primary: 11D41, 11D72.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 25 |
+
page_content=' Secondary: 11G30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 26 |
+
page_content=' Key words and phrases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 27 |
+
page_content=' Diophantine equation, Quadratic residue, Elliptic curves, Hyperelliptic curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 28 |
+
page_content=' 1 2 OM PRAKASH AND KALYAN CHAKRABORTY Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 29 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 30 |
+
page_content=' [5] The equation y2 − xyz + z2 = x3 − 5 has no integer solution in x, y and z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 31 |
+
page_content=' Similar type of equations were previously studied by F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 32 |
+
page_content=' Luca and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 33 |
+
page_content=' Togb´e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 34 |
+
page_content=' In particu- lar, Luca and Togb´e [4] studied the solution of the Diophantine equation x3+by+1−xyz = 0 and later, Togb´e [7] independently studied the equation x3 + by + 4 − xyz = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 35 |
+
page_content=' As a consequence of Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 36 |
+
page_content='1 Majumdar and Sury proved the following: Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 37 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 38 |
+
page_content=' [5] For any integer m, the elliptic curve Em : y2 − mxy = x3 + m2 + 5 has no integral point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 39 |
+
page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 40 |
+
page_content=' Vaishya and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 41 |
+
page_content=' Sharma expanded on Majumdar and Sury’s work in [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 42 |
+
page_content=' A class of fruit Diophantine equations without an integer solution was found by them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 43 |
+
page_content=' In particular Vaishya and Sharma showed, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 44 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 45 |
+
page_content=' [8] For fixed integers a and b with a ≡ 1 (mod 12) and b = 8a − 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 46 |
+
page_content=' The Diophantine equation ax3 − y2 − z2 + xyz − b = 0 has no integer solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 47 |
+
page_content=' Using Nagell-Lutz theorem [6] and Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 48 |
+
page_content='3 they got hold of an infinite family of elliptic curves with torsion-free Mordell-Weil group over Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 49 |
+
page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 50 |
+
page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 51 |
+
page_content=' [8] Let a and b be as in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 52 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 53 |
+
page_content=' For any even integer m the elliptic curve Ee m,a,b : y2 = x3 + 1 4m2x2 − a2 � m2 + b � has torsion-free Mordell-Weil group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 54 |
+
page_content=' For any odd integer m the elliptic curve Eo m,a,b : y2 = x3 + m2x2 − 64a2 � m2 + b � has torsion-free Mordell-Weil group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 55 |
+
page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 3 We extend Vaishya and Sharma’s results [8] for higher exponents.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 56 |
+
page_content=' We obtain a family of hyperelliptic curves, by carrying out some appropriate transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 57 |
+
page_content=' In 2013, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 58 |
+
page_content=' Grant gave an analogue of Nagell-Lutz theorem for hyperelliptic curves [3], using which we conclude that the Mordell-Weil group of each member of the corresponding family of hyperelliptic curves is torsion-free.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 59 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 60 |
+
page_content=' Insolvability Here we state and prove the main theorem and derive a couple of interesting corollaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 61 |
+
page_content=' We end this section by looking into a couple of examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 62 |
+
page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 63 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 64 |
+
page_content=' The equation axd − y2 − z2 + xyz − b = 0 has no integer solutions for fixed a and b such that a ≡ 1 (mod 12) and b = 2da − 3, where d is an odd integer and divisible by 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 65 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 66 |
+
page_content=' Consider axd − y2 − z2 + xyz − b = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 67 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 68 |
+
page_content='1) If possible, let (x, y, z) be an integer solution of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 69 |
+
page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 70 |
+
page_content=' Let us fix x = α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 71 |
+
page_content=' Then (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 72 |
+
page_content='1) can be re-written as, y2 + z2 + b = aαd + αyz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 73 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 74 |
+
page_content='2) We consider the cases of α being even or odd separately.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 75 |
+
page_content=' Case 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 76 |
+
page_content=' If α is even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 77 |
+
page_content=' Then, we write (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 78 |
+
page_content='2) as: � y − αz 2 �2 − �α2 4 − 1 � z2 = aαd − b (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 79 |
+
page_content='3) and set Y = y − αz 2 , β = α 2 and z = Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 80 |
+
page_content=' Thus (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 81 |
+
page_content='3) becomes, Y 2 − � β2 − 1 � Z2 = aαd − b = 2dβda − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 82 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 83 |
+
page_content='4) If β is even, say β = 2n for some integer n, then reducing (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 84 |
+
page_content='4) modulo 4 gives, Y 2 + Z2 ≡ 3 (mod 4), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 85 |
+
page_content='5) which is not possible in Z/4Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 86 |
+
page_content=' 4 OM PRAKASH AND KALYAN CHAKRABORTY If β is odd, then β = 2n + 1 for some integer n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 87 |
+
page_content=' Reduction of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 88 |
+
page_content='4) modulo 4 entails, Y 2 ≡ 3 (mod 4) (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 89 |
+
page_content='6) which is impossible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 90 |
+
page_content=' Case 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 91 |
+
page_content=' If α is odd, say, α = 2n + 1 for some integer n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 92 |
+
page_content=' Then, y2 + z2 + b = aαd + αyz y2 + z2 + a2d − 3 = a (2n + 1)d + αyz y2 + z2 − (2n + 1) yz = a (2n + 1)d − a2d + 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 93 |
+
page_content=' Now y2 + z2 + yz ≡ a + 3 (mod 2), ⇒ y2 + z2 + yz ≡ 0 (mod 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 94 |
+
page_content=' Note that y2 + z2 + yz ≡ a + 3 (mod 2) has only solution y ≡ 0 ≡ z in Z/2Z, that is, y and z are even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 95 |
+
page_content=' Thus (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 96 |
+
page_content='3) becomes aαd − b ≡ 0 (mod 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 97 |
+
page_content=' If we write a = 12l + 1 for some integer l, then, αd − � a2d − 3 � ≡ 0 (mod 4), ⇒ αd + 3 ≡ 0 (mod 4), ⇒ αd ≡ 1 (mod 4), ⇒ α ≡ 1 (mod 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 98 |
+
page_content=' Let us consider � y − αz 2 �2 − �α2 4 − 1 � z2 = aαd − b, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 99 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 100 |
+
page_content=' � y − αz 2 �2 − � α2 − 4 � �z 2 �2 = aαd − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 101 |
+
page_content=' Further, we set Y = y − αz 2 and Z = z 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 102 |
+
page_content=' Then, Y 2 − � α2 − 4 � Z2 = aαd − b (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 103 |
+
page_content='7) where α ≡ 1 (mod 4), a ≡ 1 (mod 12) and b = a2d − 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 104 |
+
page_content=' Three sub cases need to be considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 105 |
+
page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 5 Sub-case 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 106 |
+
page_content=' If α ≡ 1 (mod 12), write α = 12l + 1 for some integer l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 107 |
+
page_content=' Then, α ≡ 1 (mod 3) ⇒ α + 2 ≡ 0 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 108 |
+
page_content=' Substituting α = 12l + 1 in 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 109 |
+
page_content='7, we get Y 2 − � (12l + 1)2 − 4 � Z2 = aαd − b, ⇒ Y 2 ≡ aαd − b (mod 3), ⇒ Y 2 ≡ a (12l + 1)d − a2d + 3 (mod 3), ⇒ Y ≡ 1 − 2d (mod 3), ⇒ Y 2 ≡ 2 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 110 |
+
page_content=' A contradiction as 2 is not square modulo 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 111 |
+
page_content=' Sub-case 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 112 |
+
page_content=' If α ≡ 9 (mod 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 113 |
+
page_content=' Then, there is a prime factor p ≡ 5 or 7 (mod 12) of (α − 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 114 |
+
page_content=' Let p ≡ 5 or 7 (mod 12) be a prime factor of (α − 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 115 |
+
page_content=' Thus, Y 2 ≡ aαd − b (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 116 |
+
page_content=' Let α = pl + 2 for some integer l.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 117 |
+
page_content=' Then, Y 2 ≡ a (pl + 2)d − b (mod p), ⇒ Y 2 ≡ 3 (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 118 |
+
page_content=' This leads to a contradiction as 3 is not a quadratic residue modulo p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 119 |
+
page_content=' Sub-case 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 120 |
+
page_content=' When α ≡ 5 (mod 12), we substitute α = 3k + 2 for some integer k and get, Y 2 − � (3l + 2)2 − 4 � Z2 = (12l + 1) (3k + 2) − 2d (12l + 1) + 3, ⇒ Y 2 ≡ 2 − 2d ≡ 0 (mod 3), ⇒ Y ≡ 0 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 121 |
+
page_content=' 6 OM PRAKASH AND KALYAN CHAKRABORTY Further, we substitute Y = 3m and α = 12n + 5 for some integers n and m in 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 122 |
+
page_content='7 and arrive onto, 9m2 − (12n + 3) (12n + 7) Z2 = a (12n + 5)d − b, ⇒ − (n + 1) Z2 ≡ d−1 � i=0 (12n + 5)d−1−i 2i (mod 3), ⇒ − (n + 1) Z2 ≡ 1 (mod 3), ⇒ n ≡ 1 (mod 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 123 |
+
page_content=' Hence, α ≡ 17 (mod 36).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 124 |
+
page_content=' Note that 3 divides (α − 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 125 |
+
page_content=' Thus there is a prime factor p ≡ 5 or 7 (mod 12) of (α−2) 3 , otherwise it would mean that α−2 3 is congruent to ±1, which is not the case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 126 |
+
page_content=' Therefore, α − 2 ≡ 0 (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 127 |
+
page_content=' Thus, Y 2 ≡ aαd − b (mod p).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 128 |
+
page_content=' Substituting α = pl + 2 for some integer l, we have Y 2 ≡ 3 (mod p), which contradicts the fact that 3 is quadratic residue modulo p if p ≡ ±1 (mod 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 129 |
+
page_content=' □ Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 130 |
+
page_content=' The result of Sury and Majumdar [5] follows by substituting a = 1 and d = 3 in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 131 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 132 |
+
page_content=' The particular case d = 3 in the same theorem deduces the results of Vaishya and Sharma [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 133 |
+
page_content=' By increasing the exponents in the expression for b to 3, we will now examine the Diophantine equation with a little more generality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 134 |
+
page_content=' The potential of a solution in this scenario is described by the following two corollaries, along with a few examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 135 |
+
page_content=' Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 136 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 137 |
+
page_content=' The equation axd − y2 − z2 + xyz − b = 0 has no integer solution (x, y, z) with x even for fixed integers a and b such that a ≡ 1 (mod 12) and b = 2da − 3r with positive odd integers r and d as in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 138 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 139 |
+
page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 7 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 140 |
+
page_content=' We follow exactly the same steps as in Case 1 of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 141 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 142 |
+
page_content=' Suppose there is a solution with x = α even, then we write (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 143 |
+
page_content='2) as: � y − αz 2 �2 − �α2 4 − 1 � z2 = aαd − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 144 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 145 |
+
page_content='8) Let Y = y − αz 2 , β = α 2 and z = Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 146 |
+
page_content=' Then (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 147 |
+
page_content='8) can be written as, Y 2 − � β2 − 1 � Z2 = aαd − b = 2dβda − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 148 |
+
page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 149 |
+
page_content='9) If β is even, say β = 2n for some integer n, then the reduction modulo 4 of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 150 |
+
page_content='9) will give, Y 2 + Z2 ≡ 3r ≡ 3 (mod 4), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 151 |
+
page_content='10) which is not feasible in Z/4Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 152 |
+
page_content=' If β is odd, say β = 2n + 1 for some integer n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 153 |
+
page_content=' Then, the reduction modulo 4 of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 154 |
+
page_content='9) provides, Y 2 ≡ 3r ≡ 3 (mod 4), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 155 |
+
page_content='11) which again is not possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 156 |
+
page_content=' □ The following corollary deals with solutions having x, an odd integer: Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 157 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 158 |
+
page_content=' The equation axd − y2 − z2 + xyz − b = 0 has no integer solution in x, y and z with x ≡ 1 or 9 (mod 12), for fixed integers a, b such that a ≡ 1 (mod 12) and b = 2da − 3r, for r and d as in Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 159 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 160 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 161 |
+
page_content=' Analogous steps as in Sub-case 2 and 3 of Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 162 |
+
page_content='1 will give the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 163 |
+
page_content=' □ Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 164 |
+
page_content=' Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 165 |
+
page_content='2 says that, if there is a solution of axd − y2 − z2 + xyz − b = 0 with a and b as described in the Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 166 |
+
page_content='2, then x must be 5 modulo 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 167 |
+
page_content=' We will see some examples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 168 |
+
page_content=' Example 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 169 |
+
page_content=' For a = 25, d = 3 and r = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 170 |
+
page_content=' The equation 25x3 − y2 − z2 + xyz − 173 = 0 (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 171 |
+
page_content='12) has no integer solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 172 |
+
page_content=' 8 OM PRAKASH AND KALYAN CHAKRABORTY Example 2 shows that the equation may not have solution even with x ≡ 5 (mod 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 173 |
+
page_content=' However, the next examples tell us the other possibility as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 174 |
+
page_content=' Example 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 175 |
+
page_content=' If a = 13, d = 3 and r = 3, then 13x3 − y2 − z2 + xyz − 77 = 0 (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 176 |
+
page_content='13) has an integer solution (5, = 18, −102).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 177 |
+
page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 178 |
+
page_content=' The condition that r should be odd is rigid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 179 |
+
page_content=' Example 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 180 |
+
page_content=' For a = 13, d = 3 and r = 2, the equation 13x3 − y2 − z2 + xyz − 95 = 0 (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 181 |
+
page_content='14) has an integer solution (2, −10, −7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 182 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 183 |
+
page_content=' Hyperelliptic curves A hyperelliptic curve H over Q is a smooth projective curve associated to an affine plane curve given by the equation y2 = f (x), where f is a square-free polynomial of degree at least 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 184 |
+
page_content=' If the degree of f is 2g + 1 or 2g + 2, then the curve has genus g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 185 |
+
page_content=' We write H (Q) for the set of Q-points on H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 186 |
+
page_content=' Determining rational points on hyperelliptic curve is one of the major problems in mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 187 |
+
page_content=' The following is the general result regarding the size of H (Q), which was conjectured by Mordell and was proved by Faltings: Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 188 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 189 |
+
page_content=' [2] If C is a smooth, projective and absolutely irreducible curve over Q of genus at least 2, then C (Q) is finite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 190 |
+
page_content=' We may thus, at least theoretically, write down the finite set C (Q).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 191 |
+
page_content=' It is still a signifi- cant unresolved problem to perform this practically for a given curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 192 |
+
page_content=' Given a hyperelliptic curve H, we can define the height (classical) function to be the maximum of absolute values of the coefficients.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 193 |
+
page_content=' The Northcott property tells us that there are finitely many equations with bounded height.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 194 |
+
page_content=' Thus, one may talk about the density and averages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 195 |
+
page_content=' In this regard, Bhargava [1] has proved that most of the hyperelliptic curve over Q has no rational point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 196 |
+
page_content=' So, most of the times calculating H (Q) means proving H (Q) = φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 197 |
+
page_content=' In this section, we construct hyperelliptic curves corresponding to the equation axd − y2 − z2 + xyz − b = 0 with a and b as mentioned in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 198 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 199 |
+
page_content=' Then, we prove that H (Q) = φ (corroborating Bhargava [1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 200 |
+
page_content=' The main ingredient to prove this is the following Nagell-Lutz type theorem (Theorem 3, [3]) proved by D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 201 |
+
page_content=' Grant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 202 |
+
page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 9 Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 203 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 204 |
+
page_content=' [3] Let C be a nonsingular projective curve of genus g ≥ 1 given by y2 = x2g+1 + b1x2g + · · · + b2gx + b2g+1, where bi ∈ Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 205 |
+
page_content=' Suppose ψ : C (Q) → J (Q) be the Abel-Jacobi map, defined by ψ (p) = [p − ∞], where J (Q) is the Jacobian variety.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 206 |
+
page_content=' If p = (x, y) ∈ C (Q) \\ {∞} and ψ (p) ∈ J (Q)tors, then, x, y ∈ Z and either y = 0 or y2 divides discriminant of the polynomial x2g+1 + b1x2g + · · · + b2gx + b2g+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 207 |
+
page_content=' For fixed m we define hyperelliptic curves, Hm,a,b : y2 − mxy = axd − m2 − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 208 |
+
page_content=' Suppose m is even.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 209 |
+
page_content=' Then write (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 210 |
+
page_content='1) as: � y − mx 2 �2 − m2x2 4 = axd − m2 − b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 211 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 212 |
+
page_content='1) Multiplying (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 213 |
+
page_content='1) by ad−1 throughout, and using the fact that d is odd and divisible by 3, we have, �� y − mx 2 � a d−1 2 �2 − ad−1m2x2 4 = (ax)d − m2ad−1 − bad−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 214 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 215 |
+
page_content='2) We get the following hyperelliptic curve by substituting �� y − mx 2 � a d−1 2 � = Y and ax = X, He m,a,b : Y 2 − ad−3m2X2 4 = Xd − m2ad−1 − bad−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 216 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 217 |
+
page_content='3) Now if m is odd, multiply (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 218 |
+
page_content='2) by 4d throughout to get �� y − mx 2 � a d−1 2 2d�2 − (4a)d−1 m2x2 = (4ax)d − m2ad−14d − bad−14d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 219 |
+
page_content=' Finally substitute �� y − mx 2 � a d−1 2 2d� = Y and 4ax = X, to get Ho m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 220 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 221 |
+
page_content='4) Let, Hm,a,b = \uf8f1 \uf8f2 \uf8f3 He m,a,b if m is even Ho m,a,b if m is odd, (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 222 |
+
page_content='5) be the hyperelliptic curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 223 |
+
page_content=' Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 224 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 225 |
+
page_content=' Let a and b be as defined in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 226 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 227 |
+
page_content=' For any m ∈ N, the hyperelliptic curve Hm,a,b has torsion-free Mordell-Weil group over Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 228 |
+
page_content=' 10 OM PRAKASH AND KALYAN CHAKRABORTY Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 229 |
+
page_content=' Let a and b be fixed positive integers with a ≡ 1 (mod 12) and b = 2da − 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 230 |
+
page_content=' For any even integer m, consider the hyperelliptic curve He m,a,b : Y 2 − ad−3m2X2 4 = Xd − m2ad−1 − bad−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 231 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 232 |
+
page_content='6) By Theorem 3 of [3], if (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 233 |
+
page_content='6) has an integer solution (X0, Y0), then � aX0, �� Y0 − mX0 2 � a d−1 2 � , m � is a solution of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 234 |
+
page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 235 |
+
page_content=' However, in Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 236 |
+
page_content='1 we have proved that it has no integer solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 237 |
+
page_content=' For an odd integer m, consider the hyperelliptic curve Ho m,a,b : Y 2 − (4a)d−3 m2X2 = Xd − m2ad−14d − bad−14d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 238 |
+
page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 239 |
+
page_content='7) Suppose (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 240 |
+
page_content='7) has a solution (X0, Y0), then � 4aX0, �� Y0 − mX0 2 � a d−1 2 2d� , m � is a solution of (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 241 |
+
page_content='1), which is a contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 242 |
+
page_content=' □ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 243 |
+
page_content=' Numerical examples In this section we give some numerical examples corroborating our results in Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 244 |
+
page_content='2 and Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 245 |
+
page_content=' a d r Equation Solution 1 3 3 x3 − y2 − z2 + xyz + 19 = 0 (5, 0, −12) 1 3 5 x3 − y2 − z2 + xyz + 235 = 0 (29, 12, −60) 1 3 7 x3 − y2 − z2 + xyz + 2179 = 0 (5, 0, −48) 1 3 9 x3 − y2 − z2 + xyz + 19675 = 0 (−31, 12, −30) 13 3 3 13x3 − y2 − z2 + xyz − 77 = 0 (5, −18, −102) 13 3 5 13x3 − y2 − z2 + xyz + 139 = 0 (5, 0, −42) 13 3 7 13x3 − y2 − z2 + xyz + 2083 = 0 ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 246 |
+
page_content=' 25 3 3 25x3 − y2 − z2 + xyz − 173 = 0 (5, 0, −42) Acknowledgement This work is done during the first author’s visit to Institute of Mathematical Sci- ences (IMSc), Chennai, and he is grateful to the Institute for the hospitality and the wonderful working ambience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 247 |
+
page_content=' Both the authors are grateful to Kerala School of Mathe- matics(KSoM), Kozhikode, for it’s support and wonderful ambience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 248 |
+
page_content=' GENERALIZED FRUIT DIOPHANTINE EQUATION AND HYPERELLIPTIC CURVES 11 References [1] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 249 |
+
page_content=' Bhargava, Most hyperelliptic curve over Q have no rational point, arXiv:1308.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 250 |
+
page_content='0395.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 251 |
+
page_content=' [2] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 252 |
+
page_content=' Faltings, “Finiteness theorems for abelian varieties over number fields”, Invent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 253 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 254 |
+
page_content=', 73 (1983), 349–366.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 255 |
+
page_content=' [3] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 256 |
+
page_content=' Grant, On an analogue of the Lutz-Nagell theorem for hyperelliptic curves, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 257 |
+
page_content=' Number Theory, 133 (2013), 963–969.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 258 |
+
page_content=' [4] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 259 |
+
page_content=' Luca and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 260 |
+
page_content=' Togb´e, On the positive integral solution of the Diophantine equation x3+by+1−xyz, Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 261 |
+
page_content=' Malays.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 262 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 263 |
+
page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 264 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 265 |
+
page_content=', 31 (2008), 129–134.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 266 |
+
page_content=' [5] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 267 |
+
page_content=' Majumdar and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 268 |
+
page_content=' Sury, Fruit Diophantine Equation,https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 269 |
+
page_content='org/abs/2108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 270 |
+
page_content='02640.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 271 |
+
page_content=' [6] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 272 |
+
page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 273 |
+
page_content=' Silverman, , J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 274 |
+
page_content='T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 275 |
+
page_content=' Tate, Rational Points on Elliptic Curves, Undergraduate Texts in Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 276 |
+
page_content=' Springer-Verlag, New York (1992).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 277 |
+
page_content=' [7] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 278 |
+
page_content=' Togb´e, On the positive integral solution of the Diophantine equation x3 + by + 4 − xyz, Afr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 279 |
+
page_content=' Diaspora J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 280 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 281 |
+
page_content=', 8 (2009), 81–89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 282 |
+
page_content=' [8] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 283 |
+
page_content=' Vaishya and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 284 |
+
page_content=' Sharma, A class of fruit Diophantine equations, Monatshefte f¨ur Mathematik, 199 (2022), 899–907.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 285 |
+
page_content=' Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 286 |
+
page_content=' Email address: omprakash@ksom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 287 |
+
page_content='res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 288 |
+
page_content='in Kerala School of Mathematics, Kozhikode - 673571, Kerala, India.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 289 |
+
page_content=' Email address: kalychak@ksom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 290 |
+
page_content='res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
| 291 |
+
page_content='in' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/KtFRT4oBgHgl3EQfDzfl/content/2301.13474v1.pdf'}
|
MNE3T4oBgHgl3EQfBAmd/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:0aa18c9fdf8bc8ea10c4432f15219a675424e60cc18266f3d160f42f5e898796
|
| 3 |
+
size 3080237
|
MNFAT4oBgHgl3EQfxB7a/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d31bb317a7aa665bf352388bcbf9c13185b2e2f37690e3b1b1973a576bf005c7
|
| 3 |
+
size 188349
|
NdFPT4oBgHgl3EQflzWN/content/tmp_files/2301.13123v1.pdf.txt
ADDED
|
@@ -0,0 +1,1848 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Exploring Current Constraints on Antineutrino Production by 241Pu and Paths Towards the
|
| 2 |
+
Precision Reactor Flux Era
|
| 3 |
+
Yoshi Fujikake, Bryce Littlejohn,* and Ohana B. Rodrigues†
|
| 4 |
+
Physics Department, Illinois Institute of Technology, Chicago, IL 60616, USA
|
| 5 |
+
Pranava Teja Surukuchi‡
|
| 6 |
+
Wright Laboratory, Yale University, New Haven, CT 06520, USA
|
| 7 |
+
By performing global fits to inverse beta decay (IBD) yield measurements from existing neutrino experi-
|
| 8 |
+
ments based at highly 235U enriched reactor cores and conventional low-enriched cores, we explore current
|
| 9 |
+
direct bounds on neutrino production by the sub-dominant fission isotope 241Pu. For this nuclide, we determine
|
| 10 |
+
an IBD yield of σ241 = 8.16 ± 3.47 cm2/fission, a value (135 ± 58)% that of current beta conversion models.
|
| 11 |
+
This constraint is shown to derive from the non-linear relationship between burn-in of 241Pu and 239Pu in con-
|
| 12 |
+
ventional reactor fuel. By considering new hypothetical neutrino measurements at high-enriched, low-enriched,
|
| 13 |
+
mixed-oxide, and fast reactor facilities, we investigate the feasible limits of future knowledge of IBD yields
|
| 14 |
+
for 235U, 238U, 239Pu, 241Pu, and 240Pu. We find that first direct measurement of the 240Pu IBD yield can be
|
| 15 |
+
performed at plutonium-burning fast reactors, while a suite of correlated measurements at multiple reactor types
|
| 16 |
+
can achieve a precision in direct 238U, 239Pu, and 241Pu yield knowledge that meets or exceeds that of current
|
| 17 |
+
theoretical predictions.
|
| 18 |
+
I.
|
| 19 |
+
INTRODUCTION
|
| 20 |
+
A nuclear reactor primarily generates thermal energy as
|
| 21 |
+
product nuclei inherit (as kinetic energy) and deposit (through
|
| 22 |
+
repeated elastic collisions) excess rest mass energy from the
|
| 23 |
+
fission of heavy nuclides in the reactor’s fuel, such as 235U,
|
| 24 |
+
238U, 239Pu, 241Pu, and more. Successive decays of these
|
| 25 |
+
neutron-rich product nuclei release additional energy in the
|
| 26 |
+
form of beta particles, gamma-rays, and antineutrinos. While
|
| 27 |
+
the two former product types are additional, sub-dominant
|
| 28 |
+
contributors to heat generation in a reactor, the antineutri-
|
| 29 |
+
nos (νe ) and their associated kinetic energy entirely escape
|
| 30 |
+
the reactor core, offering an attractive avenue for studying
|
| 31 |
+
the properties of neutrinos [1–3], interrogating state-of-the-
|
| 32 |
+
art nuclear data [4], and non-intrusively monitoring nuclear
|
| 33 |
+
reactor cores [5]. Reactor-based νe detectors have demon-
|
| 34 |
+
strated that neutrinos have mass [6–9], and have searched for
|
| 35 |
+
the existence of new heavy neutrino states [10–15] and other
|
| 36 |
+
new physics phenomena [16–23]. By observing discrepan-
|
| 37 |
+
cies with respect to existing theoretical νe flux and energy
|
| 38 |
+
spectrum predictions, they have also highlighted limitations of
|
| 39 |
+
and/or inaccuracies in community fission yield and beta decay
|
| 40 |
+
databases [7, 9, 24–32]. Antineutrino monitoring case studies
|
| 41 |
+
have explored a variety of potential use case scenarios, such
|
| 42 |
+
as thermal power load-following and determination of reactor
|
| 43 |
+
fissile inventory [33–37], and existing νe detectors have con-
|
| 44 |
+
firmed the feasibility of some of these activities [25, 38, 39].
|
| 45 |
+
The average number of antineutrinos released or detected
|
| 46 |
+
per nuclear fission depends on the fission isotope in question:
|
| 47 |
+
different fission isotopes have different fission product yields,
|
| 48 |
+
with each product varying in its distance from the line of sta-
|
| 49 |
+
bility and having its own unique nuclear structure and decay
|
| 50 |
+
* blittlej@iit.edu
|
| 51 |
+
† obenevidesrodrigues@iit.edu
|
| 52 |
+
‡ pranavateja.surukuchi@yale.edu
|
| 53 |
+
scheme. Thus, reactor cores with differing fuel compositions
|
| 54 |
+
are expected to differ in their rate of νe output. These ex-
|
| 55 |
+
pected differences have been explicitly demonstrated in recent
|
| 56 |
+
νe experiments using the inverse beta decay (IBD) interaction
|
| 57 |
+
process, p + νe → e++ n, which has a 1.8 MeV interaction
|
| 58 |
+
threshold and a precisely-predicted cross-section, σIBD(Eν),
|
| 59 |
+
versus νe energy Eν [40]. For these experiments, measured
|
| 60 |
+
νe fluxes have been expressed in terms of an IBD yield per
|
| 61 |
+
fission σf [1]:
|
| 62 |
+
σf(t) =
|
| 63 |
+
�
|
| 64 |
+
i
|
| 65 |
+
Fi(t)σi.
|
| 66 |
+
(1)
|
| 67 |
+
In this expression, Fi(t) is the fraction of fissions contributed
|
| 68 |
+
by isotope i in the sampled reactor core(s) during the experi-
|
| 69 |
+
ment’s measurement period and σi its IBD yield per fission,
|
| 70 |
+
σi =
|
| 71 |
+
�
|
| 72 |
+
Si(Eν)σIBD(Eν)dEν.
|
| 73 |
+
(2)
|
| 74 |
+
Here, Si(Eν) is the true produced νe energy (Eν) spectrum
|
| 75 |
+
per fission for isotope i, and σIBD is the inverse beta decay
|
| 76 |
+
interaction cross-section.
|
| 77 |
+
In a straightforward demonstration of variations in νe emis-
|
| 78 |
+
sion between fission isotopes, reported IBD yields σf are
|
| 79 |
+
clearly offset [41] between measurements at 235U-burning
|
| 80 |
+
highly enriched reactor cores [42–48] and measurements per-
|
| 81 |
+
formed at commercial cores burning a mixture of 235U, 238U,
|
| 82 |
+
239Pu, and 241Pu [7, 49–56]. In a separate demonstration, the
|
| 83 |
+
Daya Bay and RENO experiments have compared IBD yields
|
| 84 |
+
measured in the same detectors at differing points in their sam-
|
| 85 |
+
pled commercial reactors’ fuel cycles, observing higher yields
|
| 86 |
+
during periods with higher (lower) 235U (239Pu) fission frac-
|
| 87 |
+
tions [25, 55].
|
| 88 |
+
By performing fits to a set of σf measurements at reactors
|
| 89 |
+
of well-known fission fraction Fi, one can use Equations 1
|
| 90 |
+
and 2 to directly determine the isotopic IBD yield σi of one
|
| 91 |
+
or more fission isotopes. With a single HEU-based experi-
|
| 92 |
+
ment, the IBD yield for 235U, σ235, can be trivially deter-
|
| 93 |
+
mined as σ235 = σf, since F235 approaches unity for these
|
| 94 |
+
arXiv:2301.13123v1 [hep-ph] 30 Jan 2023
|
| 95 |
+
|
| 96 |
+
2
|
| 97 |
+
cores. On their own, HEU-based σ235 measurements exhibit
|
| 98 |
+
deficits [57] with respect to commonly-used beta-conversion
|
| 99 |
+
predictions [58, 59], indicating issues in modeling either the
|
| 100 |
+
core’s νe emissions or νe behavior during propagation [60].
|
| 101 |
+
Daya Bay and RENO σf measurements, which encompass
|
| 102 |
+
multiple data points with differing LEU fuel composition
|
| 103 |
+
F235, 238, 239, 241, when combined with modest theoretical
|
| 104 |
+
constraints on σ238, 241, yields from the sub-dominant iso-
|
| 105 |
+
topes 238U and 241Pu, enable determination of isotopic yields
|
| 106 |
+
for both 235U and 239Pu [25, 55]. These measurements show
|
| 107 |
+
a deficit with respect to 235U conversion predictions, but no
|
| 108 |
+
such deficit for 239Pu, providing further credence to the νe
|
| 109 |
+
emission mis-modelling hypothesis. Going further, global fits
|
| 110 |
+
of both LEU and HEU datasets can be used to simultaneously
|
| 111 |
+
determine σ235, 238, 239 [61]: the measured σ238 shows a sig-
|
| 112 |
+
nificant (33±14)% deficit [62] with respect to summation pre-
|
| 113 |
+
dictions based on community-standard nuclear databases [59],
|
| 114 |
+
suggesting potential issues in current 238U fission yield mea-
|
| 115 |
+
surements or evaluations. Future direct determination of iso-
|
| 116 |
+
topic IBD yields for a wider array of fission isotopes beyond
|
| 117 |
+
235U, 239Pu, and 238U, as well as improved precision for these
|
| 118 |
+
three isotopes, can lead to further understanding or improve-
|
| 119 |
+
ment of existing nuclear data, reactor νe models, and reactor-
|
| 120 |
+
based fundamental physics studies.
|
| 121 |
+
Improved isotopic IBD yield measurements also hold po-
|
| 122 |
+
tential benefits for future νe -based applications. Some ad-
|
| 123 |
+
vanced reactor technologies present unique safeguards chal-
|
| 124 |
+
lenges that may be satisfied by near-field νe -based monitor-
|
| 125 |
+
ing capabilities [63]. However, neutrino emissions have never
|
| 126 |
+
been measured at advanced reactor cores, some of which dif-
|
| 127 |
+
fer substantially from measured HEU and LEU reactor types
|
| 128 |
+
in both fuel composition and core neutronics [35, 64, 65].
|
| 129 |
+
For example, mixed-oxide reactor fuels, which, unlike con-
|
| 130 |
+
ventional low-enriched fuel, are produced from a mixture of
|
| 131 |
+
uranium and plutonium isotopes, may be deployed in future
|
| 132 |
+
reactors to realize a closed nuclear fuel cycle or as a means of
|
| 133 |
+
disposing of existing plutonium stockpiles. Fast fission reac-
|
| 134 |
+
tor technologies, which, unlike conventional thermal reactors,
|
| 135 |
+
rely on fast neutron induced fission to maintain criticality, may
|
| 136 |
+
offer safety and sustainability advantages with respect to con-
|
| 137 |
+
ventional reactor types. For these reactors, better direct deter-
|
| 138 |
+
minations of true underlying σi can enable more robust and
|
| 139 |
+
reliable future monitoring capabilities than would be possible
|
| 140 |
+
using existing demonstrably imperfect models of νe produc-
|
| 141 |
+
tion per fission.
|
| 142 |
+
In this paper, we study how existing and potential future
|
| 143 |
+
IBD measurements can provide first direct glimpses at νe
|
| 144 |
+
production by previously unexplored fission isotopes and im-
|
| 145 |
+
prove our precision in understanding of the more-studied iso-
|
| 146 |
+
topes 235U, 239Pu, and 238U. By performing loosely con-
|
| 147 |
+
strained fits of isotopic IBD yields to existing LEU and HEU
|
| 148 |
+
datasets, we demonstrate the feasibility of achieving non-
|
| 149 |
+
trivial future bounds on νe production by 241Pu. By applying
|
| 150 |
+
the same fit techniques to hypothetical future high-precision
|
| 151 |
+
IBD yield measurements at HEU, LEU, MOX, and fast fis-
|
| 152 |
+
sion reactors, we show that direct IBD yield determinations
|
| 153 |
+
for all four primary fission isotopes (235U, 238U, 239Pu, and
|
| 154 |
+
241Pu) can meet or exceed the claimed precision of exist-
|
| 155 |
+
ing conversion-based predictions while also placing the first
|
| 156 |
+
meaningful bounds on 240Pu νe production.
|
| 157 |
+
We begin in Section II with a description of the global fit
|
| 158 |
+
and existing and hypothetical future IBD yield datasets. Re-
|
| 159 |
+
sults of the fit to existing datasets and studies of 241Pu limits
|
| 160 |
+
are presented and discussed in Sections III. In Section IV, we
|
| 161 |
+
describe the set of considered future hypothetical experiments
|
| 162 |
+
and the result of applying global fits to the hypothetical re-
|
| 163 |
+
sults of these experiments. Main results are then summarized
|
| 164 |
+
in Section V.
|
| 165 |
+
II.
|
| 166 |
+
GLOBAL DATASETS AND FIT TECHNIQUE
|
| 167 |
+
In this analysis we perform fits to a set of IBD rate measure-
|
| 168 |
+
ments with varying degrees of systematic correlation between
|
| 169 |
+
each measurement set. For an individual measurement, the
|
| 170 |
+
number of IBD interactions N detected per time interval t can
|
| 171 |
+
be described as:
|
| 172 |
+
N = NpεP(L)
|
| 173 |
+
4πL2
|
| 174 |
+
� Wth(t)σf(t)
|
| 175 |
+
¯E(t)
|
| 176 |
+
dt,
|
| 177 |
+
(3)
|
| 178 |
+
where Np is the number of target protons, ε is the efficiency
|
| 179 |
+
of detecting IBDs, P(L) is the survival probability due to
|
| 180 |
+
neutrino oscillations, and L is the core-detector distance. Of
|
| 181 |
+
the time-dependent quantities, Wth(t) is the reactor’s thermal
|
| 182 |
+
power, ¯E(t) = �
|
| 183 |
+
i Fi(t)ei is the core’s average energy re-
|
| 184 |
+
leased per fission, ei is the average energy released per fission
|
| 185 |
+
of isotope i, and Fi(t) and σf(t), as in Equations 1 and 2, are
|
| 186 |
+
the fission yields and IBD yields of isotope i. In order to per-
|
| 187 |
+
form one or multiple measurements of σf, a reactor νe flux
|
| 188 |
+
experiment must measure N while characterizing the other
|
| 189 |
+
reactor and detector inputs in Equation 3.
|
| 190 |
+
A.
|
| 191 |
+
Existing Datasets
|
| 192 |
+
Many experiments have successfully measured σf values
|
| 193 |
+
and associated statistical and systematic uncertainties. As in-
|
| 194 |
+
put for this study, we include time-integrated IBD yield mea-
|
| 195 |
+
surements and uncertainties reported by the Goesgen, Bugey-
|
| 196 |
+
3, Bugey-4, Rovno, Palo Verde, CHOOZ, and Double Chooz
|
| 197 |
+
LEU-based experiments and the ILL, Savannah River, Kras-
|
| 198 |
+
noyarsk, Nucifer and STEREO HEU-based experiments, as
|
| 199 |
+
well as the highly-correlated datasets at varying Fi from the
|
| 200 |
+
Daya Bay and RENO experiments. Calculated fission frac-
|
| 201 |
+
tions and measured yields for these experiments, as well as as-
|
| 202 |
+
sociated uncertainties and cross-measurement systematic cor-
|
| 203 |
+
relations, have been summarized in Ref. [66], and are used
|
| 204 |
+
for portions of this paper’s analysis. Input data tables are pro-
|
| 205 |
+
vided in the public GitHub repository [67] provided by the
|
| 206 |
+
authors as an accompaniment to this analysis. Since we do
|
| 207 |
+
not consider short-baseline oscillations as part of this analysis,
|
| 208 |
+
reactor-detector baselines are not used in analysis of existing
|
| 209 |
+
datasets, but are nonetheless provided in these tables.
|
| 210 |
+
|
| 211 |
+
3
|
| 212 |
+
B.
|
| 213 |
+
Hypothetical Future Datasets
|
| 214 |
+
For this study, we also generate hypothetical future IBD
|
| 215 |
+
yield datasets and uncertainty budgets matching the expected
|
| 216 |
+
capabilities of experimental deployments at HEU, LEU, MOX
|
| 217 |
+
and fast reactor types. These are also provided in the GitHub
|
| 218 |
+
supplementary materials, along with assumed uncertainty co-
|
| 219 |
+
variance matrices for all considered hypothetical measure-
|
| 220 |
+
ments.
|
| 221 |
+
Hypothetical IBD yield measurements are Asimov
|
| 222 |
+
datasets free of statistical and systematic fluctuations that are
|
| 223 |
+
generated according to Equation 3. As input to this equa-
|
| 224 |
+
tion, fission fractions are required for each host reactor and
|
| 225 |
+
are described below.
|
| 226 |
+
To match general indications from
|
| 227 |
+
recent summations [32] and fission beta [68], and νe flux
|
| 228 |
+
evolution [25] measurements, and matching the approach in
|
| 229 |
+
Ref. [61], we choose input ‘true’ IBD yield values match-
|
| 230 |
+
ing a scenario where Huber-Mueller modelled yields [69]
|
| 231 |
+
are only incorrect for 235U: (σ235, σ238, σ239, σ241) =
|
| 232 |
+
(6.05,10.10,4.40,6.03) ×10−43 cm2/fission.
|
| 233 |
+
The yield for
|
| 234 |
+
240Pu has not been predicted in the literature to our knowl-
|
| 235 |
+
edge, so we estimate it by applying a 3Z-A scaling suggested
|
| 236 |
+
in Ref. [70] to the four previously-mentioned isotopes; the
|
| 237 |
+
determined central value is σ240 = 4.96 ×10−43 cm2/fission.
|
| 238 |
+
Other experimental assumptions regarding detector, reactor,
|
| 239 |
+
and experimental layout parameters are then required to de-
|
| 240 |
+
fine the statistical and systematic uncertainties associated with
|
| 241 |
+
each hypothetical IBD yield measurement.
|
| 242 |
+
The HEU-based measurement is modeled after the HFIR
|
| 243 |
+
facility at Oak Ridge National Laboratory, sporting 85 MW
|
| 244 |
+
of thermal power, a 100% 235U fission fraction, and a 7 m
|
| 245 |
+
reactor-detector center-to-center distance. LEU-based mea-
|
| 246 |
+
surements are assumed to occur at a 20 m center-to-center dis-
|
| 247 |
+
tance from a core following the attributes of a 2.9 GWth Daya
|
| 248 |
+
Bay core with an 18 month fuel cycle. Assumed fission frac-
|
| 249 |
+
tions are chosen to fall roughly in the middle of the range
|
| 250 |
+
reported for Daya Bay’s cores in Fig. 1 of Ref. [75], and cor-
|
| 251 |
+
respond to a fully-loaded core with roughly 1/3 of its rods con-
|
| 252 |
+
taining fresh (pure uranium oxide at start-up) fuel; this level
|
| 253 |
+
of partial reloading is customary when operating cores of this
|
| 254 |
+
type.
|
| 255 |
+
MOX-based measurements are modelled after the MOX
|
| 256 |
+
reactor studies of Ref. [72], and is assumed to occur 20 m
|
| 257 |
+
from a core with a 3.2 GWth thermal power and 18 month cy-
|
| 258 |
+
cle length, and fission fractions matching those of the sim-
|
| 259 |
+
ulated 50% weapons-grade MOX-burning core.
|
| 260 |
+
Weapons-
|
| 261 |
+
grade (WG) plutonium is characterized by low 240Pu and
|
| 262 |
+
241Pu isotopic fractions, and thus a low F241 fission fraction
|
| 263 |
+
at reactor start-up. These WG-MOX core parameters corre-
|
| 264 |
+
spond to a realizable operational scenario implemented for
|
| 265 |
+
the goal of plutonium stockpile disposition in a commercial
|
| 266 |
+
reactor core. We will also reference a similar case where 50%
|
| 267 |
+
reactor-grade (RG) MOX fuel is used in the same reactor type;
|
| 268 |
+
these parameters correspond to an operational scenario for a
|
| 269 |
+
commercial complex operated as part of a closed nuclear fuel
|
| 270 |
+
cycle program. Following recommendations of the authors
|
| 271 |
+
of Ref. [72], fission fractions for the WG-MOX core exam-
|
| 272 |
+
ple are assumed to match the reported fission fractions for the
|
| 273 |
+
first third of pictured 50% WG-MOX running in Ref. [72],
|
| 274 |
+
while fractions from the RG-MOX case are assumed to match
|
| 275 |
+
the those of 50% WG-MOX running between days 800 and
|
| 276 |
+
1350 [76]; fission fractions were extracted by interpolating
|
| 277 |
+
fission rates from this reference and normalizing such that the
|
| 278 |
+
sum for the four primary fission isotopes is equal to unity.
|
| 279 |
+
It should be stressed that modeled fuel content evolution for
|
| 280 |
+
LEU and MOX cores is highly dependent on the initial condi-
|
| 281 |
+
tions of the fuel, on the neutronics of the involved core type,
|
| 282 |
+
and on reactor operations. In this study, we include one spe-
|
| 283 |
+
cific fission fraction set for each fuel type – LEU, WG-MOX,
|
| 284 |
+
and RG-MOX; the impact or potential benefits of further vari-
|
| 285 |
+
ations between LEU or MOX core types is not considered.
|
| 286 |
+
Finally, two experiments are assumed to occur at the base-
|
| 287 |
+
lines of 20 m and 7 m distances from the primarily plutonium-
|
| 288 |
+
burning 1.25 GWth PFBR fast breeder reactor in India [73]
|
| 289 |
+
and the 300 GWth Versatile Test Reactor fast reactor [74] re-
|
| 290 |
+
spectively. The former reactor plays a central role in plans for
|
| 291 |
+
realization of an independent, sustainable nuclear fuel cycle
|
| 292 |
+
in India, while the latter has been developed as a US-based
|
| 293 |
+
reactor materials and irradiation R&D facility based at Idaho
|
| 294 |
+
National Laboratory [64]. Assumed reactor and site parame-
|
| 295 |
+
ters for all measurements are summarized in Table I; fission
|
| 296 |
+
fraction values for all hypothetical measurement data points
|
| 297 |
+
used in this study are illustrated in Figure 1.
|
| 298 |
+
0
|
| 299 |
+
5
|
| 300 |
+
10
|
| 301 |
+
15
|
| 302 |
+
20
|
| 303 |
+
25
|
| 304 |
+
30
|
| 305 |
+
Data Points
|
| 306 |
+
0
|
| 307 |
+
0.2
|
| 308 |
+
0.4
|
| 309 |
+
0.6
|
| 310 |
+
0.8
|
| 311 |
+
1
|
| 312 |
+
Fission Fraction
|
| 313 |
+
Fission fractions in PROS HEU+LEU+WGMOX+RGMOX+VTRRx+PFBR
|
| 314 |
+
U235
|
| 315 |
+
U238
|
| 316 |
+
Pu239
|
| 317 |
+
Pu240
|
| 318 |
+
Pu241
|
| 319 |
+
HEU
|
| 320 |
+
LEU
|
| 321 |
+
WG MOX
|
| 322 |
+
RG MOX
|
| 323 |
+
VTR
|
| 324 |
+
PFBR
|
| 325 |
+
FIG. 1. Fission fractions used for hypothetical future measurement
|
| 326 |
+
data points described in this section. See text for details.
|
| 327 |
+
For all experiments, an IBD detector matching qualities of
|
| 328 |
+
the 4 ton PROSPECT reactor νe detector are used [77]; rel-
|
| 329 |
+
evant parameters are also listed in Table I. In some cases, a
|
| 330 |
+
1 ton detector with otherwise similar experimental parame-
|
| 331 |
+
ters is also considered; this case enables investigation of the
|
| 332 |
+
value of using a near-future compact νe monitoring detector,
|
| 333 |
+
such as the Mobile Antineutrino Demonstrator [78] (MAD),
|
| 334 |
+
to perform IBD yield benchmarking measurements at multi-
|
| 335 |
+
ple reactor locations. In all cases, the statistical uncertain-
|
| 336 |
+
ties associated with each datapoint for each reactor-detector
|
| 337 |
+
combination are estimated using the associated detector and
|
| 338 |
+
reactor parameters quoted in Table. I and lie between 0.15
|
| 339 |
+
% and 0.2 %. For simplicity, we do not consider statistical
|
| 340 |
+
|
| 341 |
+
4
|
| 342 |
+
Parameter
|
| 343 |
+
HEU LEU MOX Fast (PFBR) Fast (VTR)
|
| 344 |
+
Reactor
|
| 345 |
+
Thermal Power (MWth)
|
| 346 |
+
85
|
| 347 |
+
2900 3200
|
| 348 |
+
1250
|
| 349 |
+
300
|
| 350 |
+
Burnup Profile
|
| 351 |
+
-
|
| 352 |
+
[71]
|
| 353 |
+
[72]
|
| 354 |
+
[73]
|
| 355 |
+
[74]
|
| 356 |
+
Reactor Cycle Length
|
| 357 |
+
24 d
|
| 358 |
+
1.5 y 1.5 y
|
| 359 |
+
1.5 y
|
| 360 |
+
100 d
|
| 361 |
+
Experimental
|
| 362 |
+
Core-Detector Distance (m)
|
| 363 |
+
7 m
|
| 364 |
+
20 m 20 m
|
| 365 |
+
20 m
|
| 366 |
+
20 m
|
| 367 |
+
Data-Taking Length
|
| 368 |
+
3 y
|
| 369 |
+
1.5 y 1.5 y
|
| 370 |
+
1 y
|
| 371 |
+
100 d
|
| 372 |
+
Detector
|
| 373 |
+
Active Mass
|
| 374 |
+
4 ton (1 ton)
|
| 375 |
+
Target Protons
|
| 376 |
+
2×1029 (0.5×1029)
|
| 377 |
+
IBD Detection Efficiency
|
| 378 |
+
40%
|
| 379 |
+
Uncertainty, Reactor
|
| 380 |
+
Thermal Power
|
| 381 |
+
1.0% 0.5% 0.5%
|
| 382 |
+
1.0%
|
| 383 |
+
1.0%
|
| 384 |
+
Fission Fractions
|
| 385 |
+
-
|
| 386 |
+
0.6% 0.6%
|
| 387 |
+
0.6%
|
| 388 |
+
0.6%
|
| 389 |
+
Energy per Fission
|
| 390 |
+
0.1% 0.2% 0.2%
|
| 391 |
+
0.2%
|
| 392 |
+
0.2%
|
| 393 |
+
Uncertainty, Detector
|
| 394 |
+
Target Protons
|
| 395 |
+
1.0%
|
| 396 |
+
Detection Efficiency
|
| 397 |
+
0.75%
|
| 398 |
+
IBD Cross Section
|
| 399 |
+
0.1%
|
| 400 |
+
Total Reactor Systematic
|
| 401 |
+
0.5% 0.8% 0.8%
|
| 402 |
+
1.2%
|
| 403 |
+
1.2%
|
| 404 |
+
Total Detector Systematic
|
| 405 |
+
1.3%
|
| 406 |
+
TABLE I. Assumed reactor and site parameters for the hypothetical future short-baseline reactor experiments described in the text.
|
| 407 |
+
and systematic uncertainty contributions from IBD-like back-
|
| 408 |
+
grounds; for a PROSPECT-like detector expecting signal-to-
|
| 409 |
+
background ratios of better than 4 (10) deployed on-surface at
|
| 410 |
+
an HEU (LEU) reactor [79], IBD counts would be expected to
|
| 411 |
+
dominate measurement statistical uncertainties.
|
| 412 |
+
Hypothetical measurements should also be accompanied by
|
| 413 |
+
predicted reactor- and detector-related systematic uncertain-
|
| 414 |
+
ties, which are also summarized in Table I. Systematics for
|
| 415 |
+
most cores are dominated by the uncertainty in the thermal
|
| 416 |
+
power produced by the operating core. Commercial reactor
|
| 417 |
+
companies have provided sub-percent precision in reported
|
| 418 |
+
thermal powers for existing IBD yield measurements at nu-
|
| 419 |
+
merous reactor sites [80, 81]; for this reason, we choose 0.5%
|
| 420 |
+
uncertainty for LEU and MOX cores. While similar thermal
|
| 421 |
+
power measurement devices and strategies could be applied
|
| 422 |
+
to HEU facilities, in practice, legacy systems used in exist-
|
| 423 |
+
ing HEU facilities have recently provided thermal power un-
|
| 424 |
+
certainties closer to 2% [48]; for this analysis, we optimisti-
|
| 425 |
+
cally assume implementation of upgraded measurement sys-
|
| 426 |
+
tems or techniques capable of providing 1% precision at an
|
| 427 |
+
HEU core. Advanced technologies for time-stable and high-
|
| 428 |
+
precision thermal power monitoring in sodium-cooled fast re-
|
| 429 |
+
actors like PFBR and VTR are under active development, due
|
| 430 |
+
to the difficulties associated with the coolant’s high temper-
|
| 431 |
+
ature and chemical corrosiveness; given the lack of available
|
| 432 |
+
quantitatively demonstrated capabilities, we also assume a 1%
|
| 433 |
+
thermal power uncertainty for this core type. While thermal
|
| 434 |
+
power uncertainties for different reactors are assumed to be
|
| 435 |
+
uncorrelated, this uncertainty is correlated between multiple
|
| 436 |
+
measurements at the same core. Measured IBD yields for an
|
| 437 |
+
experiment will also be uncertain due to the limits in knowl-
|
| 438 |
+
edge of fission fractions in the core, which is defined via de-
|
| 439 |
+
tailed reactor core simulations. In the absence of these cal-
|
| 440 |
+
culations for all core types, we will assume an uncertianty
|
| 441 |
+
of 0% for the HEU experiment and 0.6% for all other cores,
|
| 442 |
+
following the value quoted by Daya Bay and others for LEU
|
| 443 |
+
cores [71]. This uncertainty is also assumed to be uncorre-
|
| 444 |
+
lated between cores, but correlated between measurements at
|
| 445 |
+
the same core. Isotopic energy release per fission ei – re-
|
| 446 |
+
quired for calculating expected experiment statistics – have
|
| 447 |
+
minor IBD yield uncertainty contributions of 0.1% to 0.2%
|
| 448 |
+
depending on core fuel content [82]; the ei central value and
|
| 449 |
+
uncertainty for 240Pu is assumed to match that of 241Pu.
|
| 450 |
+
On the detector side, uncertainties are dominated by the
|
| 451 |
+
limited knowledge of IBD detection efficiency, assumed to be
|
| 452 |
+
known with 0.75% precision, as well as knowledge of the to-
|
| 453 |
+
tal number of protons within the detector’s target region, as-
|
| 454 |
+
sumed to be known to 1%; these chosen values reflect those
|
| 455 |
+
achieved in a range of recent large- and small-detector IBD
|
| 456 |
+
experiments [48, 55, 83, 84]. In this analysis, we consider
|
| 457 |
+
the possibility of moving a single reactor neutrino detector to
|
| 458 |
+
multiple reactor core types to perform systematically corre-
|
| 459 |
+
lated IBD yield measurements; for this reason, unless other-
|
| 460 |
+
wise mentioned, we treat detector systematic uncertainties as
|
| 461 |
+
correlated between all measurements.
|
| 462 |
+
|
| 463 |
+
5
|
| 464 |
+
C.
|
| 465 |
+
Global Fit Approach
|
| 466 |
+
To obtain isotopic IBD yields in this analysis, we use a
|
| 467 |
+
least-squares test statistic:
|
| 468 |
+
χ2 =
|
| 469 |
+
�
|
| 470 |
+
a,b
|
| 471 |
+
�
|
| 472 |
+
σf,a − r
|
| 473 |
+
�
|
| 474 |
+
i
|
| 475 |
+
Fi,aσi
|
| 476 |
+
�
|
| 477 |
+
V−1
|
| 478 |
+
ab
|
| 479 |
+
�
|
| 480 |
+
σf,b − r
|
| 481 |
+
�
|
| 482 |
+
i
|
| 483 |
+
Fi,bσi
|
| 484 |
+
�
|
| 485 |
+
+
|
| 486 |
+
�
|
| 487 |
+
j,k
|
| 488 |
+
(σth
|
| 489 |
+
j − σj)V−1
|
| 490 |
+
ext,jk(σth
|
| 491 |
+
k − σk).
|
| 492 |
+
(4)
|
| 493 |
+
In this fit, experimental inputs Fi and σf are as described
|
| 494 |
+
above, and the sum i is run over five fission isotopes, 235U,
|
| 495 |
+
238U, 239Pu, 241Pu, and 240Pu, with five attendant IBD yield
|
| 496 |
+
fit parameters.
|
| 497 |
+
The experimental covariance matrix V de-
|
| 498 |
+
fines the uncertainties for each experiment and their cross-
|
| 499 |
+
correlations, as described in the previous-subsection.
|
| 500 |
+
The
|
| 501 |
+
final term is used to constrain fitted σi values to theoreti-
|
| 502 |
+
cal predictions by adding a penalty that increases as the two
|
| 503 |
+
quantities diverge.
|
| 504 |
+
In contrast to most recent global IBD
|
| 505 |
+
yield fits [25, 57, 85], we are interested in examining weakly-
|
| 506 |
+
constrained or un-constrained simultaneous fits of all relevant
|
| 507 |
+
fission isotopes’ IBD yields. For this reason, j and k sum only
|
| 508 |
+
over the three sub-dominant isotopes, 238U, 241Pu, and 240Pu,
|
| 509 |
+
and the 3×3 V−1
|
| 510 |
+
ext is diagonal (no assumed uncertainty correla-
|
| 511 |
+
tion between isotopes), with elements set to achieve wide 1σ
|
| 512 |
+
theoretical constraints of 75% of the predicted yield. To com-
|
| 513 |
+
pare to previous IBD yield fits [61, 86], we occasionally con-
|
| 514 |
+
sider the much tighter (2.6%) bounds on σ241 quoted by the
|
| 515 |
+
Huber model [58]. For fits not involving fast reactor datasets,
|
| 516 |
+
σ240 is pegged to the theoretically-predicted value, and has no
|
| 517 |
+
effect on the subsequent 4-parameter fit.
|
| 518 |
+
III.
|
| 519 |
+
FITS TO EXISTING DATASETS AND 241PU IBD
|
| 520 |
+
YIELD CONSTRAINTS
|
| 521 |
+
We first consider IBD yield fits applied to the existing
|
| 522 |
+
global yield datasets described briefly in Section II A. By first
|
| 523 |
+
applying tight 2.6% constraint on 241Pu, we largely reproduce
|
| 524 |
+
unconstrained 235U, 238U, and 239Pu yield best-fit values re-
|
| 525 |
+
ported for the oscillation-free fit in Ref. [86]. Test statistic
|
| 526 |
+
values with respect to the best-fit (∆χ2) versus input value
|
| 527 |
+
are shown for each isotope in Figure 2, while minimizing over
|
| 528 |
+
the three other isotopic yield parameters. We observe a best-
|
| 529 |
+
fit 235U yield more than 3σ (5%) below the Huber-predicted
|
| 530 |
+
value, and a best-fit 238U yield that deviates from the pre-
|
| 531 |
+
dicted central value by (36±20), slightly more than in previ-
|
| 532 |
+
ous fits [86]. As in previous fits, the 239Pu yield is found to be
|
| 533 |
+
consistent with Huber-predicted values within a 5%, ∼ 1σ un-
|
| 534 |
+
certainty band. This similarity in results indicates that the rel-
|
| 535 |
+
atively new STEREO data point [48], while qualitatively bol-
|
| 536 |
+
stering confidence in historical observations of a ∼5% yield
|
| 537 |
+
deficit at HEU cores [87], has fairly modest quantitative im-
|
| 538 |
+
pact on the primary issues surrounding data-model agreement
|
| 539 |
+
for conversion-predicted uranium IBD yields.
|
| 540 |
+
With consistency established with respect to previous anal-
|
| 541 |
+
yses, we proceed with loosening of yield constraints for all
|
| 542 |
+
0.4
|
| 543 |
+
0.5
|
| 544 |
+
0.6
|
| 545 |
+
0.7
|
| 546 |
+
0.8
|
| 547 |
+
0.9
|
| 548 |
+
1
|
| 549 |
+
1.1 1.2
|
| 550 |
+
i
|
| 551 |
+
R
|
| 552 |
+
0
|
| 553 |
+
1
|
| 554 |
+
2
|
| 555 |
+
3
|
| 556 |
+
4
|
| 557 |
+
5
|
| 558 |
+
6
|
| 559 |
+
7
|
| 560 |
+
8
|
| 561 |
+
9
|
| 562 |
+
10
|
| 563 |
+
2
|
| 564 |
+
χ
|
| 565 |
+
|
| 566 |
+
∆
|
| 567 |
+
0.013
|
| 568 |
+
±
|
| 569 |
+
= 0.953
|
| 570 |
+
235
|
| 571 |
+
σ
|
| 572 |
+
0.201
|
| 573 |
+
±
|
| 574 |
+
= 0.642
|
| 575 |
+
238
|
| 576 |
+
σ
|
| 577 |
+
0.044
|
| 578 |
+
±
|
| 579 |
+
= 1.047
|
| 580 |
+
239
|
| 581 |
+
σ
|
| 582 |
+
0.026
|
| 583 |
+
±
|
| 584 |
+
= 1.001
|
| 585 |
+
241
|
| 586 |
+
σ
|
| 587 |
+
0.6
|
| 588 |
+
0.8
|
| 589 |
+
1
|
| 590 |
+
1.2
|
| 591 |
+
1.4
|
| 592 |
+
1.6
|
| 593 |
+
i
|
| 594 |
+
R
|
| 595 |
+
0
|
| 596 |
+
1
|
| 597 |
+
2
|
| 598 |
+
3
|
| 599 |
+
4
|
| 600 |
+
5
|
| 601 |
+
6
|
| 602 |
+
7
|
| 603 |
+
8
|
| 604 |
+
9
|
| 605 |
+
10
|
| 606 |
+
2
|
| 607 |
+
χ
|
| 608 |
+
|
| 609 |
+
∆
|
| 610 |
+
0.013
|
| 611 |
+
±
|
| 612 |
+
= 0.953
|
| 613 |
+
235
|
| 614 |
+
σ
|
| 615 |
+
0.264
|
| 616 |
+
±
|
| 617 |
+
= 0.730
|
| 618 |
+
238
|
| 619 |
+
σ
|
| 620 |
+
0.252
|
| 621 |
+
±
|
| 622 |
+
= 0.910
|
| 623 |
+
239
|
| 624 |
+
σ
|
| 625 |
+
0.426
|
| 626 |
+
±
|
| 627 |
+
= 1.353
|
| 628 |
+
241
|
| 629 |
+
σ
|
| 630 |
+
FIG. 2. Isotopic IBD yield fit results for the existing global dataset
|
| 631 |
+
with tight (top, 2.6%) and loose (bottom, 75%) external constraints
|
| 632 |
+
on the 241Pu yield. Test statistic values with respect to the best-fit
|
| 633 |
+
(∆χ2) are shown versus input value for each of the four primary
|
| 634 |
+
fission isotopes. For each isotope’s curve, the fit is marginalized over
|
| 635 |
+
the other isotopes.
|
| 636 |
+
fission isotopes. Figure 2 shows reported isotopic ∆χ2 test
|
| 637 |
+
statistic values versus input σ value for each isotope while
|
| 638 |
+
applying a looser constraint on 241Pu of 75%. Best-fit param-
|
| 639 |
+
eters and 1σ ranges are found to be:
|
| 640 |
+
σ235 = 6.37 ± 0.08;
|
| 641 |
+
σ238 = 7.37 ± 1.95;
|
| 642 |
+
σ239 = 4.00 ± 1.01;
|
| 643 |
+
σ241 = 8.16 ± 3.47.
|
| 644 |
+
(5)
|
| 645 |
+
The best-fit χ2
|
| 646 |
+
min is found to be 26.2 for 38 degrees of free-
|
| 647 |
+
dom (41 data points, 3 fit parameters), indicating an accept-
|
| 648 |
+
|
| 649 |
+
6
|
| 650 |
+
able goodness-of-fit.
|
| 651 |
+
However, this value is only slightly
|
| 652 |
+
lower than that provided by the more-constrained fit (χ2
|
| 653 |
+
min
|
| 654 |
+
= 26.6), indicating that this enhanced freedom has not sub-
|
| 655 |
+
stantially improved data-model agreement.
|
| 656 |
+
Central values
|
| 657 |
+
of 235U, 238U, and 239Pu fit parameters are relatively sta-
|
| 658 |
+
ble, remaining within 15% of those provided by the more-
|
| 659 |
+
constrained fit. Meanwhile, the newly freed 241Pu yield in-
|
| 660 |
+
creases by 35%, although σ241 nonetheless remains consistent
|
| 661 |
+
with its model-predicted value within its large 43% relative
|
| 662 |
+
uncertainty band. Thus it appears that the current global IBD
|
| 663 |
+
yield dataset does not have the statistical power to provide
|
| 664 |
+
meaningful tests of underlying modelling issues for 241Pu.
|
| 665 |
+
The disappointing lack of new insight should not be too sur-
|
| 666 |
+
prising, given the small (O(5%) or less) fractional contribu-
|
| 667 |
+
tion of 241Pu fissions in all existing measured reactor cores.
|
| 668 |
+
However, it is interesting to note that σ241 1σ error bands
|
| 669 |
+
are found to be tighter than the externally-applied constraint.
|
| 670 |
+
This indicates that there are features in the existing global
|
| 671 |
+
dataset that provide the power to specifically constrain 241Pu.
|
| 672 |
+
To attempt to identify these features, we examined correla-
|
| 673 |
+
tions between fitted isotopic yields, which are depicted in Fig-
|
| 674 |
+
ure 3 as best-fit parameter space regions in two dimensions be-
|
| 675 |
+
tween 241Pu and the other three isotopes. Substantial 241Pu-
|
| 676 |
+
239Pu and 241Pu-238U degeneracies can be observed, with the
|
| 677 |
+
former reflected in a more than five-fold increase in uncertain-
|
| 678 |
+
ties on σ239 between the more-constrained (4% uncertainty)
|
| 679 |
+
and less-constrained (25% uncertainty) fits. Degeneracies can
|
| 680 |
+
also be expressed by calculating correlation coefficients be-
|
| 681 |
+
tween the fitted yield parameters, which are also given in the
|
| 682 |
+
legends of Fig 3:
|
| 683 |
+
ρσi,σj = (σi − σi)(σj − σi)
|
| 684 |
+
σσiσσj
|
| 685 |
+
(6)
|
| 686 |
+
The extreme 241Pu-239Pu correlation can be understood by
|
| 687 |
+
observing the fission fraction evolution trends experienced by
|
| 688 |
+
LEU reactors, as depicted in Figure 1. In these cores, F239
|
| 689 |
+
and F241 rise in tandem with reactor fuel burn-up, making it
|
| 690 |
+
hard for unconstrained fits to simultaneously determine both
|
| 691 |
+
σ239 and σ241. It can also be understood as a simple reality
|
| 692 |
+
of underlying nuclear physics in the core: 241Pu is produced
|
| 693 |
+
by via multi-neutron capture on 239Pu, and thus its build-up in
|
| 694 |
+
the core is dependent on the build-up of the latter. In aspects
|
| 695 |
+
of previous multi-datapoint LEU analyses, such as those of
|
| 696 |
+
Daya Bay [25, 88] and RENO [55], 241Pu and 239Pu fission
|
| 697 |
+
fractions are treated as explicitly linearly correlated.
|
| 698 |
+
We examine the limits of this linear correlation by gener-
|
| 699 |
+
ating hypothetical LEU reactor IBD yield datasets following
|
| 700 |
+
the method described in Section II B and fission yields from
|
| 701 |
+
Figure 1: one dataset assumes isotopic yields matching the
|
| 702 |
+
best-fit for the existing global dataset, and the other assumes
|
| 703 |
+
true 241Pu and 239Pu yields close to the axis of anti-correlation
|
| 704 |
+
between the two datasets, but beyond the 1σ bounds allowed
|
| 705 |
+
by the data. Chosen true yields for this test are illustrated
|
| 706 |
+
in the right panel of Figure 3; the 238U yield for this case,
|
| 707 |
+
8.8 cm2/fission, was chosen to vertically align the two yield
|
| 708 |
+
datasets for easier comparison of trends. Hypothetical yields
|
| 709 |
+
for these two cases are pictured in Figure 4. The test cases
|
| 710 |
+
clearly differ in the change in slope, or curvature, present in
|
| 711 |
+
the LEU data points, providing an indication of the primary
|
| 712 |
+
source of unique 241Pu yield information in current and fu-
|
| 713 |
+
ture experimental data. The extreme 239Pu-241Pu yield offset
|
| 714 |
+
in this example amplifies the impact of a modest non-constant
|
| 715 |
+
relationship between F239 and F241 in LEU-based datasets,
|
| 716 |
+
which is also illustrated in Figure 4. To test the validity of
|
| 717 |
+
this hypothesis with existing datasets, we perform a fit to only
|
| 718 |
+
the RENO and Daya Bay LEU datasets while applying loose
|
| 719 |
+
75% external constraints on all four isotopes. While large un-
|
| 720 |
+
certainty increases are seen in σ235 and σ238, σ239 and σ241
|
| 721 |
+
fractional uncertainties are altered by <30%, and fractional
|
| 722 |
+
bounds on σ241 (43%) remain tighter than the 75% external
|
| 723 |
+
constraint. Thus, in the existing global dataset, it does ap-
|
| 724 |
+
pear that that the Daya Bay and RENO LEU data points are
|
| 725 |
+
responsible for the modest breaking of degeneracy between
|
| 726 |
+
239Pu and 241Pu yields.
|
| 727 |
+
Adding this to previously-established trends, it is straight-
|
| 728 |
+
forward to recount the independent features of the global IBD
|
| 729 |
+
yield dataset that enable determination of all four isotopes’
|
| 730 |
+
IBD yields:
|
| 731 |
+
• HEU-based experiments’ σf measurements directly
|
| 732 |
+
constrain σ235 [57].
|
| 733 |
+
• The measured relative linear σf slope versus fuel
|
| 734 |
+
burn-up at LEU-based experiments directly constrains
|
| 735 |
+
σ239 [25].
|
| 736 |
+
• The time-integrated offset in σf between HEU and LEU
|
| 737 |
+
cores constrains σ238 [61].
|
| 738 |
+
• The curvature of σf slope versus fuel burn-up at LEU
|
| 739 |
+
experiments constrains σ241.
|
| 740 |
+
As we move on to consider possible future IBD yield mea-
|
| 741 |
+
surement scenarios, these high-level principles serve to guide
|
| 742 |
+
attention toward those with particular promise for improving
|
| 743 |
+
global knowledge of isotopic yields. In particular, we will
|
| 744 |
+
look to explore new multi-dataset measurements that can pro-
|
| 745 |
+
vide an enhanced view of σf curvature with host reactor fuel
|
| 746 |
+
evolution.
|
| 747 |
+
We end this Section by noting that within the current global
|
| 748 |
+
dataset, Daya Bay contains currently-unexploited potential.
|
| 749 |
+
Ref. [75] indicates O(5%) F241/F239 variations between re-
|
| 750 |
+
actor cycles that are averaged out in its current fuel content
|
| 751 |
+
binning scheme. To estimate the achievable gains in the fis-
|
| 752 |
+
sion yields, we generate an Asimov IBD yield dataset with fis-
|
| 753 |
+
sion fractions taken from a combination of rates, RENO and
|
| 754 |
+
Daya Bay-like experiment is divided into two halves; one with
|
| 755 |
+
the default fission fractions while the other having F241/F239
|
| 756 |
+
relatively reduced by 2.5%. The systematic and statistical un-
|
| 757 |
+
certainties are assumed to match the existing global dataset
|
| 758 |
+
and the yields are generated using best-fit results from the
|
| 759 |
+
global dataset. Such a joint fit provides a modest improvement
|
| 760 |
+
in the precision of fission yield of (σ235, σ238, σ239, σ241) =
|
| 761 |
+
(1.3%, 24.8%, 19.7%, 39.2%) compared to the precision of
|
| 762 |
+
(1.3%, 26.4%, 25.2%, 42.6%) for the existing global dataset.
|
| 763 |
+
If we further double the statistics of the Daya Bay Asimov
|
| 764 |
+
data–as expected from the full Daya Bay dataset—in conjunc-
|
| 765 |
+
tion with the modified binning in fission fractions, we find
|
| 766 |
+
|
| 767 |
+
7
|
| 768 |
+
0
|
| 769 |
+
1
|
| 770 |
+
2
|
| 771 |
+
3
|
| 772 |
+
4
|
| 773 |
+
5
|
| 774 |
+
6
|
| 775 |
+
7
|
| 776 |
+
8
|
| 777 |
+
/fission]
|
| 778 |
+
2
|
| 779 |
+
cm
|
| 780 |
+
-43
|
| 781 |
+
[10
|
| 782 |
+
239
|
| 783 |
+
σ
|
| 784 |
+
0
|
| 785 |
+
2
|
| 786 |
+
4
|
| 787 |
+
6
|
| 788 |
+
8
|
| 789 |
+
10
|
| 790 |
+
12
|
| 791 |
+
14
|
| 792 |
+
16
|
| 793 |
+
18
|
| 794 |
+
20
|
| 795 |
+
22
|
| 796 |
+
/fission]
|
| 797 |
+
2
|
| 798 |
+
cm
|
| 799 |
+
-43
|
| 800 |
+
[10
|
| 801 |
+
241
|
| 802 |
+
σ
|
| 803 |
+
Correlation: -0.990
|
| 804 |
+
6
|
| 805 |
+
6.2
|
| 806 |
+
6.4
|
| 807 |
+
6.6
|
| 808 |
+
6.8
|
| 809 |
+
/fission]
|
| 810 |
+
2
|
| 811 |
+
cm
|
| 812 |
+
-43
|
| 813 |
+
[10
|
| 814 |
+
235
|
| 815 |
+
σ
|
| 816 |
+
0
|
| 817 |
+
2
|
| 818 |
+
4
|
| 819 |
+
6
|
| 820 |
+
8
|
| 821 |
+
10
|
| 822 |
+
12
|
| 823 |
+
14
|
| 824 |
+
16
|
| 825 |
+
18
|
| 826 |
+
20
|
| 827 |
+
22
|
| 828 |
+
/fission]
|
| 829 |
+
2
|
| 830 |
+
cm
|
| 831 |
+
-43
|
| 832 |
+
[10
|
| 833 |
+
241
|
| 834 |
+
σ
|
| 835 |
+
Correlation: 0.013
|
| 836 |
+
0
|
| 837 |
+
2
|
| 838 |
+
4
|
| 839 |
+
6
|
| 840 |
+
8
|
| 841 |
+
10
|
| 842 |
+
12
|
| 843 |
+
14
|
| 844 |
+
/fission]
|
| 845 |
+
2
|
| 846 |
+
cm
|
| 847 |
+
-43
|
| 848 |
+
[10
|
| 849 |
+
238
|
| 850 |
+
σ
|
| 851 |
+
0
|
| 852 |
+
2
|
| 853 |
+
4
|
| 854 |
+
6
|
| 855 |
+
8
|
| 856 |
+
10
|
| 857 |
+
12
|
| 858 |
+
14
|
| 859 |
+
16
|
| 860 |
+
18
|
| 861 |
+
20
|
| 862 |
+
22
|
| 863 |
+
/fission]
|
| 864 |
+
2
|
| 865 |
+
cm
|
| 866 |
+
-43
|
| 867 |
+
[10
|
| 868 |
+
241
|
| 869 |
+
σ
|
| 870 |
+
Correlation: 0.757
|
| 871 |
+
FIG. 3. Isotopic IBD yield fits for the existing global dataset with loose (75%) external constraints on the 241Pu IBD yield, σ241. Contours
|
| 872 |
+
are pictured for σ241 relative to the other isotopic yields, with the fit marginalized over the non-pictured isotopes. Correlation coefficients
|
| 873 |
+
between fitted σ241 and the other yields are given in the plot legends. Also shown in dashed lines are the theoretical IBD yields predicted by
|
| 874 |
+
the Huber-Mueller model. Stars indicate IBD yields chosen for illustration in Fig. 4.
|
| 875 |
+
5.65
|
| 876 |
+
5.7
|
| 877 |
+
5.75
|
| 878 |
+
5.8
|
| 879 |
+
5.85
|
| 880 |
+
5.9
|
| 881 |
+
5.95
|
| 882 |
+
6
|
| 883 |
+
6.05
|
| 884 |
+
6.1
|
| 885 |
+
/fission]
|
| 886 |
+
2
|
| 887 |
+
cm
|
| 888 |
+
-43
|
| 889 |
+
IBD yield [10
|
| 890 |
+
Nominal IBD yields
|
| 891 |
+
Modified IBD yields
|
| 892 |
+
0.45
|
| 893 |
+
0.5
|
| 894 |
+
0.55
|
| 895 |
+
0.6
|
| 896 |
+
0.65
|
| 897 |
+
0.7
|
| 898 |
+
0.75
|
| 899 |
+
235
|
| 900 |
+
F
|
| 901 |
+
0.14
|
| 902 |
+
0.16
|
| 903 |
+
0.18
|
| 904 |
+
0.2
|
| 905 |
+
0.22
|
| 906 |
+
0.24
|
| 907 |
+
239
|
| 908 |
+
/F
|
| 909 |
+
241
|
| 910 |
+
F
|
| 911 |
+
Daya Bay
|
| 912 |
+
RENO
|
| 913 |
+
FIG. 4. Top: IBD yield sets for two hypothetical LEU measure-
|
| 914 |
+
ments: one assuming measurements align with isotopic IBD yields
|
| 915 |
+
matching the best-fit for the existing global dataset, and another as-
|
| 916 |
+
suming alignment with σ239 and σ241 values matching those indi-
|
| 917 |
+
cated in Figure 3. The latter scenario’s values lie outside of the 1
|
| 918 |
+
σ region preferred by the global IBD yield dataset; for this scenario,
|
| 919 |
+
σ238 is reduced to enable better vertical alignment of the two datasets
|
| 920 |
+
and easier comparison of slopes. Bottom: Ratio (F241/F239) of the
|
| 921 |
+
fission yields of 241Pu and239Pu for the hypothetical LEU dataset.
|
| 922 |
+
Realized F235 ranges for RENO and Daya Bay datasets are also pic-
|
| 923 |
+
tured.
|
| 924 |
+
a further improvement in precision to (1.3%, 21.7%, 16.4%,
|
| 925 |
+
30.8%). Thus, we conclude that it may be worthwhile for
|
| 926 |
+
Daya Bay to consider a more diversified fuel content binning
|
| 927 |
+
scheme in a future analysis of its final full-statistics IBD yield
|
| 928 |
+
dataset. This observation may also be applicable to other high-
|
| 929 |
+
statistics datasets spanning many LEU reactor cycles, such as
|
| 930 |
+
those recorded by RENO and DANSS [12].
|
| 931 |
+
IV.
|
| 932 |
+
FUTURE IMPROVEMENTS FROM NEW
|
| 933 |
+
MEASUREMENTS AT MULTIPLE CORE TYPES
|
| 934 |
+
We now turn to consideration of future improvements in
|
| 935 |
+
global knowledge of isotopic IBD yields by performing new
|
| 936 |
+
measurements at a range of different reactor core types. We
|
| 937 |
+
will begin by considering the most imminently-achievable
|
| 938 |
+
next steps: short baseline measurements of a single LEU
|
| 939 |
+
core over a full fuel cycle, and a subsequent systematically-
|
| 940 |
+
correlated measurement at an HEU using the same νe de-
|
| 941 |
+
tector.
|
| 942 |
+
We will then proceed to study possible improve-
|
| 943 |
+
ments gained by making measurements at mixed-oxide and
|
| 944 |
+
plutonium-burning fast reactor core types.
|
| 945 |
+
A.
|
| 946 |
+
Benefits of New HEU and LEU Measurements
|
| 947 |
+
Some benefits of new measurements of IBD yields at short
|
| 948 |
+
distances from a full LEU reactor core cycle have already been
|
| 949 |
+
discussed in the literature [61], and have served as part of the
|
| 950 |
+
physics motivation for the NEOS-II experiment [89]. In par-
|
| 951 |
+
ticular, this configuration enables access to a wider range of
|
| 952 |
+
F239 and F235 values beyond those achieved at θ13 exper-
|
| 953 |
+
iments sampling multiple cores, which should result in im-
|
| 954 |
+
proved σ239 constraints. When coupled with a systematically-
|
| 955 |
+
correlated HEU-based measurement, which could be achieved
|
| 956 |
+
|
| 957 |
+
8
|
| 958 |
+
via two site deployments of the same detector system, di-
|
| 959 |
+
rect constraints on σ238 may exceed the claimed precision
|
| 960 |
+
of the summation prediction of Mueller et al. [59]. Multi-
|
| 961 |
+
ple current or near-future efforts, such as PROSPECT-II [79]
|
| 962 |
+
or MAD [78], are well-suited to realize part or all of this com-
|
| 963 |
+
bined LEU-HEU measurement program.
|
| 964 |
+
Such a setup would also broaden access to LEU fuel content
|
| 965 |
+
regimes with less linear relationships between F239 and F241,
|
| 966 |
+
allowing for improved constraint of σ241. This improvement
|
| 967 |
+
was demonstrated above for the hypothetical LEU measure-
|
| 968 |
+
ments in Figure 4. Realized effective F239 ranges for Daya
|
| 969 |
+
Bay and RENO are also highlighted with shaded bands; we
|
| 970 |
+
note that offsets in median F235 (and, while not pictured, also
|
| 971 |
+
F241/F239) between hypothetical LEU and Daya Bay/RENO
|
| 972 |
+
cases is due to the specifics of the single cycle core loading
|
| 973 |
+
simulated in Ref. [71]. A new short-baseline LEU measure-
|
| 974 |
+
ment set can capture periods earlier and later in the fuel cycle
|
| 975 |
+
of a conventional LEU core with respect to RENO and Daya
|
| 976 |
+
Bay, when relative contributions of 239Pu and
|
| 977 |
+
241Pu fissions
|
| 978 |
+
deviate most strongly from their cycle-integrated mean. For
|
| 979 |
+
the hypothetical short-baseline LEU measurement, F239/F241
|
| 980 |
+
varies roughly 6%, from 17% to 23%, over a cycle. Daya
|
| 981 |
+
Bay’s and RENO’s F241/F239 ratios, meanwhile vary by only
|
| 982 |
+
3% or less, with maximums and minimums of 20% and 17%,
|
| 983 |
+
respectively [25, 55].
|
| 984 |
+
The extent to which these HEU and LEU measurements can
|
| 985 |
+
improve constraints on σ241 has so far not been investigated in
|
| 986 |
+
the literature. To do so, we apply the four-parameter yield fit
|
| 987 |
+
of Eq. 5 to the hypothetical HEU and LEU datasets described
|
| 988 |
+
in Section II B, Table I, and Figure 1. Table II gives the result-
|
| 989 |
+
ing precision in measurements of the four isotopic IBD yields
|
| 990 |
+
probed by this new HEU+LEU dataset. The most striking dif-
|
| 991 |
+
ference with respect to the current global dataset is the sub-
|
| 992 |
+
stantial improvement in knowledge of 239Pu and 241Pu yields.
|
| 993 |
+
Uncertainties in σ239 and σ241 are improved from 25.2% and
|
| 994 |
+
42.6% in the existing dataset to 4.6% and 10.5%, respectively,
|
| 995 |
+
greater than four-fold improvement in both values. As illus-
|
| 996 |
+
trated in Figure 5, this improvement can be partially attributed
|
| 997 |
+
to the reduction in degeneracy between these two isotopes’ fis-
|
| 998 |
+
sion fraction variations over a full LEU fuel cycle. If all mea-
|
| 999 |
+
surements are instead performed with a 1 ton detector, more
|
| 1000 |
+
closely approximating the expected size of the MAD detec-
|
| 1001 |
+
tor, uncertainties are similar in size, with σ235,238,239,241 shift-
|
| 1002 |
+
ing from (1.6%, 11.2%, 4.6%, 10.5%) for the PROSPECT-II
|
| 1003 |
+
sized detector case to (1.62%, 11.7%, 6.1%, 14.6%) for the
|
| 1004 |
+
MAD detector case. Thus, the HEU+LEU deployment sce-
|
| 1005 |
+
nario may yield major benefits for both physics-oriented or
|
| 1006 |
+
smaller applications-oriented future detectors.
|
| 1007 |
+
As noted in Ref. [61], σ238 constraints are also significantly
|
| 1008 |
+
improved, primarily due to the correlated nature of the detec-
|
| 1009 |
+
tor systematics assumed between the HEU and LEU measure-
|
| 1010 |
+
ments. If this correlation is removed, or if the chosen opti-
|
| 1011 |
+
mistic 1% HEU thermal power uncertainties are increased to
|
| 1012 |
+
the currently-achievable 2% level, precision in knowledge of
|
| 1013 |
+
the 238U yield is substantially reduced – to 18.1% and 17.2%
|
| 1014 |
+
for these two cases, respectively – while precision in knowl-
|
| 1015 |
+
edge of the 241Pu yield is virtually unchanged. Thus, follow-
|
| 1016 |
+
ing the next generation of short-baseline HEU and LEU mea-
|
| 1017 |
+
surements, the precision of knowledge of the 241Pu yield may
|
| 1018 |
+
rival that of its sub-dominant 238U counterpart, and will be
|
| 1019 |
+
less dependent on a detailed understanding of host reactors’
|
| 1020 |
+
thermal powers and on movement-induced changes in detec-
|
| 1021 |
+
tor response. At this point, direct νe -based measurements of
|
| 1022 |
+
241Pu fission attributes may begin to have useful application
|
| 1023 |
+
in testing the general accuracy of nuclear data knowledge for
|
| 1024 |
+
this isotope – similar to the value provided by νe -based con-
|
| 1025 |
+
straints of 238U from the current global dataset.
|
| 1026 |
+
B.
|
| 1027 |
+
Benefits from MOX Reactor Measurements
|
| 1028 |
+
Reactors burning mixed-oxide (MOX) fuels are another
|
| 1029 |
+
promising venue for performing IBD yield measurements
|
| 1030 |
+
with unique Fi combinations.
|
| 1031 |
+
In particular, the RG-MOX
|
| 1032 |
+
measurement case may be an imminently realizable one, given
|
| 1033 |
+
the presence and operation of RG-MOX commercial cores in
|
| 1034 |
+
Europe and Japan. The 50% reactor-grade mixed-oxide (RG-
|
| 1035 |
+
MOX) core described in Section II B features F239 far higher
|
| 1036 |
+
than an LEU core and broad variations in F241 from nearly
|
| 1037 |
+
15% at reactor start-up to roughly 25% after one cycle. Ra-
|
| 1038 |
+
tios F239/F241 vary much more widely from cycle beginning
|
| 1039 |
+
(27%) to end (45%) compared to the LEU reactor case above.
|
| 1040 |
+
Amidst these substantial fission fraction variations, 238U frac-
|
| 1041 |
+
tions remain relatively consistent between LEU and RG-MOX
|
| 1042 |
+
cases, offering further opportunity for reduction in degeneracy
|
| 1043 |
+
between 238U and the other isotopes.
|
| 1044 |
+
Addition of a hypothetical ten-datapoint IBD yield dataset
|
| 1045 |
+
from this RG-MOX reactor core provides substantial enhance-
|
| 1046 |
+
ments in IBD yield precision when added to those of the short-
|
| 1047 |
+
baseline HEU and LEU datasets, which are also summarized
|
| 1048 |
+
in Table II. Expected precision of yields σ239 and σ241 are im-
|
| 1049 |
+
proved by another factor of ∼ 2 and ∼ 3 respectively when the
|
| 1050 |
+
hypothetical RG-MOX is added to the fit alongside the hypo-
|
| 1051 |
+
thetical HEU and LEU datasets. Meanwhile, σ238 yield preci-
|
| 1052 |
+
sion is also tightened to 9.7% expected relative uncertainty.
|
| 1053 |
+
Correlations between yield fit parameters for this case are
|
| 1054 |
+
also pictured in Figure 5, and appear further reduced between
|
| 1055 |
+
239Pu and 241Pu with respect to the hypothetical HEU+LEU
|
| 1056 |
+
case. As with the HEU+LEU case, if measurements are per-
|
| 1057 |
+
formed instead with a MAD-sized 1 ton detector target, only
|
| 1058 |
+
modest degradation in precision is seen: σ235,238,239,241 un-
|
| 1059 |
+
certainties shift from (1.6%, 9.7%, 2.2%, 3.4%) for a 4 ton
|
| 1060 |
+
target to (1.6%, 10.3%, 2.5%, 3.9%) for a 1 ton target. un-
|
| 1061 |
+
certainty. On the other hand, if the correlation between the
|
| 1062 |
+
reactor measurements are removed, or if the chosen opti-
|
| 1063 |
+
mistic 1% HEU thermal power uncertainties are increased to
|
| 1064 |
+
the currently-achievable 2% level, precision in knowledge of
|
| 1065 |
+
the 238U and 241Pu yields are reduced—to 14.9%, 15.4% and
|
| 1066 |
+
4.3%, 5.0% respectively— and are moderately worse than the
|
| 1067 |
+
theoretical yields. Comparing this with the HEU+LEU case
|
| 1068 |
+
where the precision achievable on 238U yield is 11.1%, the
|
| 1069 |
+
improvement provided by the addition of RG-MOX reactor
|
| 1070 |
+
data doesn’t fully compensate for the loss in precision due to
|
| 1071 |
+
the lack of correlation or a reduction in thermal power uncer-
|
| 1072 |
+
tainty.
|
| 1073 |
+
With measurements at three reactor types – HEU, LEU, and
|
| 1074 |
+
|
| 1075 |
+
9
|
| 1076 |
+
Case
|
| 1077 |
+
Description
|
| 1078 |
+
Precision on σi (%)
|
| 1079 |
+
235U 238U 239Pu 240Pu 241Pu
|
| 1080 |
+
-
|
| 1081 |
+
Existing Global Data
|
| 1082 |
+
1.3
|
| 1083 |
+
26.4
|
| 1084 |
+
25.2
|
| 1085 |
+
-
|
| 1086 |
+
42.6
|
| 1087 |
+
1
|
| 1088 |
+
HEU + LEU
|
| 1089 |
+
1.6
|
| 1090 |
+
11.1
|
| 1091 |
+
4.6
|
| 1092 |
+
-
|
| 1093 |
+
10.5
|
| 1094 |
+
3
|
| 1095 |
+
HEU + LEU + RG-MOX
|
| 1096 |
+
1.6
|
| 1097 |
+
9.7
|
| 1098 |
+
2.2
|
| 1099 |
+
-
|
| 1100 |
+
3.4
|
| 1101 |
+
2
|
| 1102 |
+
HEU + LEU + WG-MOX
|
| 1103 |
+
1.6
|
| 1104 |
+
9.9
|
| 1105 |
+
2.5
|
| 1106 |
+
-
|
| 1107 |
+
3.6
|
| 1108 |
+
4
|
| 1109 |
+
HEU + LEU + Fast
|
| 1110 |
+
1.6
|
| 1111 |
+
10.9
|
| 1112 |
+
4.6
|
| 1113 |
+
27.2
|
| 1114 |
+
10.3
|
| 1115 |
+
5
|
| 1116 |
+
All
|
| 1117 |
+
1.6
|
| 1118 |
+
9.5
|
| 1119 |
+
2.1
|
| 1120 |
+
23.6
|
| 1121 |
+
3.3
|
| 1122 |
+
6
|
| 1123 |
+
All, Uncorrelated
|
| 1124 |
+
1.5
|
| 1125 |
+
14.3
|
| 1126 |
+
2.1
|
| 1127 |
+
36.2
|
| 1128 |
+
4.2
|
| 1129 |
+
-
|
| 1130 |
+
Model Uncertainty [66]
|
| 1131 |
+
2.1
|
| 1132 |
+
8.2
|
| 1133 |
+
2.5
|
| 1134 |
+
-
|
| 1135 |
+
2.2
|
| 1136 |
+
TABLE II. Constraints on IBD yields of 235U, 238U, 239Pu, 240Pu, and 241Pu, from future hypothetical datasets from LEU and HEU reactors,
|
| 1137 |
+
given as a percentage of the best fit yield. For all cases unless noted, detector systematic uncertainties are assumed to be correlated between
|
| 1138 |
+
measurements, and a 75% external constraint is used for 241Pu and for 240Pu when applicable. The ‘All’ case considers inclusion of HEU, LEU,
|
| 1139 |
+
RG-MOX, VTR and PFBR yield measurements employing the same detector. Model prediction uncertainties from [66] are also provided.
|
| 1140 |
+
5.8
|
| 1141 |
+
6
|
| 1142 |
+
6.2
|
| 1143 |
+
6.4
|
| 1144 |
+
/fission]
|
| 1145 |
+
2
|
| 1146 |
+
cm
|
| 1147 |
+
-43
|
| 1148 |
+
[10
|
| 1149 |
+
235
|
| 1150 |
+
σ
|
| 1151 |
+
7
|
| 1152 |
+
8
|
| 1153 |
+
9
|
| 1154 |
+
10
|
| 1155 |
+
11
|
| 1156 |
+
12
|
| 1157 |
+
13
|
| 1158 |
+
14
|
| 1159 |
+
/fission]
|
| 1160 |
+
2
|
| 1161 |
+
cm
|
| 1162 |
+
-43
|
| 1163 |
+
[10
|
| 1164 |
+
238
|
| 1165 |
+
σ
|
| 1166 |
+
Correlation: -0.383
|
| 1167 |
+
5.8
|
| 1168 |
+
6
|
| 1169 |
+
6.2
|
| 1170 |
+
6.4
|
| 1171 |
+
/fission]
|
| 1172 |
+
2
|
| 1173 |
+
cm
|
| 1174 |
+
-43
|
| 1175 |
+
[10
|
| 1176 |
+
235
|
| 1177 |
+
σ
|
| 1178 |
+
4
|
| 1179 |
+
4.1
|
| 1180 |
+
4.2
|
| 1181 |
+
4.3
|
| 1182 |
+
4.4
|
| 1183 |
+
4.5
|
| 1184 |
+
4.6
|
| 1185 |
+
4.7
|
| 1186 |
+
4.8
|
| 1187 |
+
/fission]
|
| 1188 |
+
2
|
| 1189 |
+
cm
|
| 1190 |
+
-43
|
| 1191 |
+
[10
|
| 1192 |
+
239
|
| 1193 |
+
σ
|
| 1194 |
+
Correlation: 0.772
|
| 1195 |
+
5.8
|
| 1196 |
+
6
|
| 1197 |
+
6.2
|
| 1198 |
+
6.4
|
| 1199 |
+
/fission]
|
| 1200 |
+
2
|
| 1201 |
+
cm
|
| 1202 |
+
-43
|
| 1203 |
+
[10
|
| 1204 |
+
235
|
| 1205 |
+
σ
|
| 1206 |
+
5.2
|
| 1207 |
+
5.4
|
| 1208 |
+
5.6
|
| 1209 |
+
5.8
|
| 1210 |
+
6
|
| 1211 |
+
6.2
|
| 1212 |
+
6.4
|
| 1213 |
+
6.6
|
| 1214 |
+
6.8
|
| 1215 |
+
/fission]
|
| 1216 |
+
2
|
| 1217 |
+
cm
|
| 1218 |
+
-43
|
| 1219 |
+
[10
|
| 1220 |
+
241
|
| 1221 |
+
σ
|
| 1222 |
+
Correlation: 0.727
|
| 1223 |
+
7
|
| 1224 |
+
8
|
| 1225 |
+
9
|
| 1226 |
+
10
|
| 1227 |
+
11
|
| 1228 |
+
12
|
| 1229 |
+
13
|
| 1230 |
+
14
|
| 1231 |
+
/fission]
|
| 1232 |
+
2
|
| 1233 |
+
cm
|
| 1234 |
+
-43
|
| 1235 |
+
[10
|
| 1236 |
+
238
|
| 1237 |
+
σ
|
| 1238 |
+
4
|
| 1239 |
+
4.1
|
| 1240 |
+
4.2
|
| 1241 |
+
4.3
|
| 1242 |
+
4.4
|
| 1243 |
+
4.5
|
| 1244 |
+
4.6
|
| 1245 |
+
4.7
|
| 1246 |
+
4.8
|
| 1247 |
+
/fission]
|
| 1248 |
+
2
|
| 1249 |
+
cm
|
| 1250 |
+
-43
|
| 1251 |
+
[10
|
| 1252 |
+
239
|
| 1253 |
+
σ
|
| 1254 |
+
Correlation: -0.511
|
| 1255 |
+
7
|
| 1256 |
+
8
|
| 1257 |
+
9
|
| 1258 |
+
10
|
| 1259 |
+
11
|
| 1260 |
+
12
|
| 1261 |
+
13
|
| 1262 |
+
14
|
| 1263 |
+
/fission]
|
| 1264 |
+
2
|
| 1265 |
+
cm
|
| 1266 |
+
-43
|
| 1267 |
+
[10
|
| 1268 |
+
238
|
| 1269 |
+
σ
|
| 1270 |
+
5.2
|
| 1271 |
+
5.4
|
| 1272 |
+
5.6
|
| 1273 |
+
5.8
|
| 1274 |
+
6
|
| 1275 |
+
6.2
|
| 1276 |
+
6.4
|
| 1277 |
+
6.6
|
| 1278 |
+
6.8
|
| 1279 |
+
/fission]
|
| 1280 |
+
2
|
| 1281 |
+
cm
|
| 1282 |
+
-43
|
| 1283 |
+
[10
|
| 1284 |
+
241
|
| 1285 |
+
σ
|
| 1286 |
+
Correlation: -0.681
|
| 1287 |
+
4
|
| 1288 |
+
4.1 4.2
|
| 1289 |
+
4.3
|
| 1290 |
+
4.4
|
| 1291 |
+
4.5
|
| 1292 |
+
4.6
|
| 1293 |
+
4.7
|
| 1294 |
+
4.8
|
| 1295 |
+
/fission]
|
| 1296 |
+
2
|
| 1297 |
+
cm
|
| 1298 |
+
-43
|
| 1299 |
+
[10
|
| 1300 |
+
239
|
| 1301 |
+
σ
|
| 1302 |
+
5.2
|
| 1303 |
+
5.4
|
| 1304 |
+
5.6
|
| 1305 |
+
5.8
|
| 1306 |
+
6
|
| 1307 |
+
6.2
|
| 1308 |
+
6.4
|
| 1309 |
+
6.6
|
| 1310 |
+
6.8
|
| 1311 |
+
/fission]
|
| 1312 |
+
2
|
| 1313 |
+
cm
|
| 1314 |
+
-43
|
| 1315 |
+
[10
|
| 1316 |
+
241
|
| 1317 |
+
σ
|
| 1318 |
+
Correlation: 0.490
|
| 1319 |
+
FIG. 5. Isotopic IBD yield contours for a combined fit of hypothetical HEU, LEU, and RG-MOX datasets. In each panel, fits are marginalized
|
| 1320 |
+
over the undepicted isotopes. Correlation coefficients between each pair of isotopes are provided in the legend.
|
| 1321 |
+
MOX – with a common detector, direct IBD-based constraints
|
| 1322 |
+
on νe production by the four primary fission isotopes may
|
| 1323 |
+
be expected to rival or exceed the precision of conversion-
|
| 1324 |
+
based predictions. Most of these direct isotopic yield uncer-
|
| 1325 |
+
tainties are also smaller and more well-defined in origin than
|
| 1326 |
+
the O(5%) uncertainty attributed to summation predictions for
|
| 1327 |
+
these isotopes. Thus, with a global HEU+LEU+MOX dataset,
|
| 1328 |
+
one could generate IBD-based reactor νe flux predictions for
|
| 1329 |
+
many existing or future reactor types free from biases known
|
| 1330 |
+
to be present in conversion-predicted models without sacrific-
|
| 1331 |
+
ing relative model precision.
|
| 1332 |
+
Expected isotopic IBD yield measurement precision de-
|
| 1333 |
+
livered by instead combining a ten datapoint weapons-grade
|
| 1334 |
+
mixed-oxide (WG-MOX) measurement with the hypothetical
|
| 1335 |
+
HEU and LEU datasets has also been considered. IBD yield
|
| 1336 |
+
uncertainties for a HEU+LEU+WG-MOX measurement set
|
| 1337 |
+
are slightly worse than a HEU+LEU+RG-MOX set for σ238,
|
| 1338 |
+
σ239, and σ241 as shown in Table II. Similarity in results be-
|
| 1339 |
+
tween MOX fuel types should not be too surprising, since both
|
| 1340 |
+
WG-MOX and RG-MOX cycles roughly span a ∼ 16−17%
|
| 1341 |
+
|
| 1342 |
+
10
|
| 1343 |
+
range in F239/F241 fission fraction ratios.
|
| 1344 |
+
It is worth noting that wide variations in F239/F241 should
|
| 1345 |
+
also expected to be provided by conventional LEU cores burn-
|
| 1346 |
+
ing entirely fresh fuel, such as would occur upon first oper-
|
| 1347 |
+
ation of a new commercial power plant [90]. In this case,
|
| 1348 |
+
F239/F241 fission fraction ratios should be expected to vary
|
| 1349 |
+
by well over 10% over course of a fuel cycle [76]. Thus, in
|
| 1350 |
+
lieu of MOX-based options, IBD yield measurement regimes
|
| 1351 |
+
including newly started commercial cores likely serve as an-
|
| 1352 |
+
other promising avenue for producing precise constraints on
|
| 1353 |
+
all main fission isotopes.
|
| 1354 |
+
C.
|
| 1355 |
+
Benefits from Fast Reactor Measurements
|
| 1356 |
+
Since fast fission cross-sections of many minor actinides
|
| 1357 |
+
– particularly 240Pu – are substantially higher than ther-
|
| 1358 |
+
mal fission cross-sections, fission fractions in the VTR and
|
| 1359 |
+
PFBR fast reactors are substantially different than those of
|
| 1360 |
+
the high-MOX-fraction conventional core configurations de-
|
| 1361 |
+
scribed in [72]. In particular, 240Pu fissions now compose a
|
| 1362 |
+
non-negligible fraction of the total, and, as a result, 241Pu fis-
|
| 1363 |
+
sion fractions are substantially lower. The addition of the two
|
| 1364 |
+
fast reactor dataset to the hypothetical HEU and LEU datasets
|
| 1365 |
+
is also summarized in Table II. The most striking product of
|
| 1366 |
+
introducing these datasets to the fit is the potential for set-
|
| 1367 |
+
ting the first-ever meaningful constraints on νe production
|
| 1368 |
+
by 240Pu. We find roughly comparable 240Pu yield measure-
|
| 1369 |
+
ments when either VTR or PFBR are fitted separately with the
|
| 1370 |
+
other datasets. Such a measurement could prompt new and
|
| 1371 |
+
deeper study of fission yields and decay data for this minor
|
| 1372 |
+
actinide, which plays a major role in the operation of next-
|
| 1373 |
+
generation fast reactor systems. The level of achievable preci-
|
| 1374 |
+
sion in the σ240 measurement is primarily driven by the preci-
|
| 1375 |
+
sion in understanding the thermal output of these fast reactor
|
| 1376 |
+
cores – an instrumentation challenge under active investiga-
|
| 1377 |
+
tion in the nuclear engineering community.
|
| 1378 |
+
Inclusion of fast reactor datasets generates only minor im-
|
| 1379 |
+
provements in the knowledge of σi for the other primary
|
| 1380 |
+
fission isotopes beyond that achievable with the HEU+LEU
|
| 1381 |
+
measurement scenario. While this results primarily from the
|
| 1382 |
+
general lack of knowledge of the value of σ240, it also high-
|
| 1383 |
+
lights the value delivered by multiple highly systematically
|
| 1384 |
+
correlated measurements at differing fuel composition, like
|
| 1385 |
+
that provided by the MOX reactor cases, in contrast to the sin-
|
| 1386 |
+
gle measurement provided by the relatively static composition
|
| 1387 |
+
of these fast reactor cores. Were F240 to evolve in a meaning-
|
| 1388 |
+
ful way for either core, it is likely that the isotopic IBD yield
|
| 1389 |
+
knowledge delivered by this core would be substantially im-
|
| 1390 |
+
proved.
|
| 1391 |
+
V.
|
| 1392 |
+
DISCUSSION AND SUMMARY
|
| 1393 |
+
After observing that the current global IBD yield dataset
|
| 1394 |
+
exhibits some capability to constrain antineutrino production
|
| 1395 |
+
by 235U, 238U, 239Pu, and 241Pu, we have investigated how
|
| 1396 |
+
suites of future systematically-correlated measurements at di-
|
| 1397 |
+
verse reactor core types can improve knowledge for these
|
| 1398 |
+
and other fission isotopes. We have observed that with the
|
| 1399 |
+
simplest combination of correlated HEU and LEU measure-
|
| 1400 |
+
ments using a PROSPECT-sized or MAD-sized IBD detec-
|
| 1401 |
+
tor, an IBD yield measurement precision of 12% or better can
|
| 1402 |
+
be achieved for all four fission isotopes. With a combina-
|
| 1403 |
+
tion of HEU, LEU, and RG-MOX datasets, all isotopic yields
|
| 1404 |
+
can be directly measured with a precision rivaling or exceed-
|
| 1405 |
+
ing the precision claimed by conversion-predicted models. If
|
| 1406 |
+
measurements of fast reactors are also included in the global
|
| 1407 |
+
dataset, first constraints of order 25% precision can be placed
|
| 1408 |
+
on antineutrino production by 240Pu. Beyond future measure-
|
| 1409 |
+
ments, we also noted other avenues for improving knowledge
|
| 1410 |
+
of isotopic IBD yields with current data: in particular, mea-
|
| 1411 |
+
surements performed over multiple LEU fuel cycles, such as
|
| 1412 |
+
Daya Bay and DANSS, can benefit from exploiting known
|
| 1413 |
+
variations in 241Pu between cycles.
|
| 1414 |
+
With a combined global dataset in hand from multiple
|
| 1415 |
+
reactor types, one can generate IBD-based reactor νe flux
|
| 1416 |
+
predictions for many existing or future reactor types free
|
| 1417 |
+
from biases known to be present in conversion-predicted
|
| 1418 |
+
models without sacrificing in relative model precision.
|
| 1419 |
+
If
|
| 1420 |
+
one considers the full suite of correlated HEU, LEU, RG-
|
| 1421 |
+
MOX and fast reactor measurements (the “All” scenario
|
| 1422 |
+
in Table II), the resultant data-based model would include
|
| 1423 |
+
(σ235, σ238, σ239, σ240, σ241,) uncertainties of (1.6, 9.5, 2.1,
|
| 1424 |
+
23.6, 3.3)%.
|
| 1425 |
+
The correlation between these achievable
|
| 1426 |
+
directly-constrained uncertainties has also been calculated,
|
| 1427 |
+
and can be seen in Figure 6, alongside those of the Huber-
|
| 1428 |
+
Mueller model [91]. Besides representing the similar mag-
|
| 1429 |
+
nitudes in uncertainty, Figure 6 shows direct measurements’
|
| 1430 |
+
reduced correlations between 235U, 239Pu, and 241Puwith re-
|
| 1431 |
+
spect to conversion predictions, which are primarily caused
|
| 1432 |
+
by the common experimental apparatus used at ILL for input
|
| 1433 |
+
fission beta measurements [92, 93].
|
| 1434 |
+
This kind of direct and precise understanding of all of the
|
| 1435 |
+
major fission isotopes’ contributions to reactor antineutrino
|
| 1436 |
+
emissions would represent movement into an era of ‘preci-
|
| 1437 |
+
sion flux physics’ offering many potential pure and applied
|
| 1438 |
+
physics benefits. On the applications side, it would enable
|
| 1439 |
+
unbiased, high-fidelity monitoring, and performing of robust
|
| 1440 |
+
case studies for, a broad array of current and future reactor
|
| 1441 |
+
types. Well-measured isotopic antineutrino fluxes could be
|
| 1442 |
+
compared to summation-predicted ones to provide enhanced
|
| 1443 |
+
benchmarking and improvement of nuclear data associated
|
| 1444 |
+
with the main fission isotopes and their daughters, as well
|
| 1445 |
+
as the first meaningful integral datasets for validating the nu-
|
| 1446 |
+
clear data of 240Pu.
|
| 1447 |
+
These models and correlated datasets
|
| 1448 |
+
would allow for precise independent tests of each of the four
|
| 1449 |
+
IBD yield predictions provided by the Huber-Mueller model,
|
| 1450 |
+
enabling thorough investigation of the hypothesis that mis-
|
| 1451 |
+
modelling of one or more isotopes’ yields is responsible for
|
| 1452 |
+
the reactor antineutrino anomaly. Precise and reliable IBD-
|
| 1453 |
+
based flux constraints would also improve the reach of be-
|
| 1454 |
+
yond standard model searches with signal-dominated coherent
|
| 1455 |
+
neutrino-nucleus scattering detectors [3]. Finally, by probing
|
| 1456 |
+
for persistent residual IBD yield deficits common to all iso-
|
| 1457 |
+
|
| 1458 |
+
11
|
| 1459 |
+
1.6
|
| 1460 |
+
-2.4
|
| 1461 |
+
1.6
|
| 1462 |
+
3.6
|
| 1463 |
+
2.0
|
| 1464 |
+
-2.4
|
| 1465 |
+
9.5
|
| 1466 |
+
-3.2
|
| 1467 |
+
-12.8
|
| 1468 |
+
-4.6
|
| 1469 |
+
1.6
|
| 1470 |
+
-3.2
|
| 1471 |
+
2.1
|
| 1472 |
+
3.6
|
| 1473 |
+
1.9
|
| 1474 |
+
3.6
|
| 1475 |
+
-12.8
|
| 1476 |
+
3.6
|
| 1477 |
+
23.6
|
| 1478 |
+
7.0
|
| 1479 |
+
2.0
|
| 1480 |
+
-4.6
|
| 1481 |
+
1.9
|
| 1482 |
+
7.0
|
| 1483 |
+
3.3
|
| 1484 |
+
|
| 1485 |
+
235
|
| 1486 |
+
U
|
| 1487 |
+
|
| 1488 |
+
238
|
| 1489 |
+
U
|
| 1490 |
+
|
| 1491 |
+
239
|
| 1492 |
+
Pu
|
| 1493 |
+
|
| 1494 |
+
240
|
| 1495 |
+
Pu
|
| 1496 |
+
|
| 1497 |
+
241
|
| 1498 |
+
Pu
|
| 1499 |
+
|
| 1500 |
+
|
| 1501 |
+
235
|
| 1502 |
+
U
|
| 1503 |
+
|
| 1504 |
+
238
|
| 1505 |
+
U
|
| 1506 |
+
|
| 1507 |
+
239
|
| 1508 |
+
Pu
|
| 1509 |
+
|
| 1510 |
+
240
|
| 1511 |
+
Pu
|
| 1512 |
+
|
| 1513 |
+
241
|
| 1514 |
+
Pu
|
| 1515 |
+
|
| 1516 |
+
15
|
| 1517 |
+
−
|
| 1518 |
+
10
|
| 1519 |
+
−
|
| 1520 |
+
5
|
| 1521 |
+
−
|
| 1522 |
+
0
|
| 1523 |
+
5
|
| 1524 |
+
10
|
| 1525 |
+
15
|
| 1526 |
+
20
|
| 1527 |
+
25
|
| 1528 |
+
Uncertainty [%]
|
| 1529 |
+
2.4
|
| 1530 |
+
2.6
|
| 1531 |
+
2.5
|
| 1532 |
+
8.2
|
| 1533 |
+
2.6
|
| 1534 |
+
2.9
|
| 1535 |
+
2.7
|
| 1536 |
+
100.0
|
| 1537 |
+
2.5
|
| 1538 |
+
2.7
|
| 1539 |
+
2.6
|
| 1540 |
+
|
| 1541 |
+
235
|
| 1542 |
+
U
|
| 1543 |
+
|
| 1544 |
+
238
|
| 1545 |
+
U
|
| 1546 |
+
|
| 1547 |
+
239
|
| 1548 |
+
Pu
|
| 1549 |
+
|
| 1550 |
+
240
|
| 1551 |
+
Pu
|
| 1552 |
+
|
| 1553 |
+
241
|
| 1554 |
+
Pu
|
| 1555 |
+
|
| 1556 |
+
|
| 1557 |
+
235
|
| 1558 |
+
U
|
| 1559 |
+
|
| 1560 |
+
238
|
| 1561 |
+
U
|
| 1562 |
+
|
| 1563 |
+
239
|
| 1564 |
+
Pu
|
| 1565 |
+
|
| 1566 |
+
240
|
| 1567 |
+
Pu
|
| 1568 |
+
|
| 1569 |
+
241
|
| 1570 |
+
Pu
|
| 1571 |
+
|
| 1572 |
+
15
|
| 1573 |
+
−
|
| 1574 |
+
10
|
| 1575 |
+
−
|
| 1576 |
+
5
|
| 1577 |
+
−
|
| 1578 |
+
0
|
| 1579 |
+
5
|
| 1580 |
+
10
|
| 1581 |
+
15
|
| 1582 |
+
20
|
| 1583 |
+
25
|
| 1584 |
+
Uncertainty [%]
|
| 1585 |
+
FIG. 6. Left: Uncertainties in isotopic IBD yield measurements based on a hypothetical global dataset including HEU, LEU, RG-MOX, and
|
| 1586 |
+
fast reactor IBD yield measurements. Diagonal elements correspond to the uncertainty in isotopic yields given for the “All” case in Table II,
|
| 1587 |
+
while off-diagonal elements describe the correlations between them. The values are extracted by taking the square root of the corresponding
|
| 1588 |
+
elements of the correlation matrix and are assigned a negative value where the correlations are negative. Full covariance matrices are provided
|
| 1589 |
+
in the supplementary materials accompanying this paper. Right: Uncertainties in IBD yields predicted by the Huber-Mueller model [66]. Since
|
| 1590 |
+
there are no theoretical models predicting σ240, we assign 100% uncertainty on it.
|
| 1591 |
+
topes with respect to conversion or summation models, the
|
| 1592 |
+
community can search for enduring hints of sterile neutrino
|
| 1593 |
+
oscillations, even in the presence of other confounding effects,
|
| 1594 |
+
such as neutrino decay or wave packet de-coherence [94]. We
|
| 1595 |
+
encourage the use of the forecasted flux uncertainty matrix
|
| 1596 |
+
provided above and in the supplementary materials as input
|
| 1597 |
+
for future physics sensitivity and use case studies; these ex-
|
| 1598 |
+
ercises would help to directly demonstrate the value of this
|
| 1599 |
+
achievable advance reactor neutrino flux knowledge.
|
| 1600 |
+
VI.
|
| 1601 |
+
ACKNOWLEDGEMENTS
|
| 1602 |
+
This work was supported by DOE Office of Science, un-
|
| 1603 |
+
der award No. DE-SC0008347, as well as by the IIT College
|
| 1604 |
+
of Science. We thank Anna Erickson, Jon Link, and Patrick
|
| 1605 |
+
Huber for useful comments and discussion, and Nathaniel
|
| 1606 |
+
Bowden and Carlo Giunti for comments on early manuscript
|
| 1607 |
+
drafts.
|
| 1608 |
+
[1] C. Bemporad, G. Gratta, and P. Vogel, Rev.Mod.Phys. 74, 297
|
| 1609 |
+
(2002).
|
| 1610 |
+
[2] X. Qian and J.-C. Peng, Rept. Prog. Phys. 82, 036201 (2019),
|
| 1611 |
+
arXiv:1801.05386 [hep-ex].
|
| 1612 |
+
[3] O. A. Akindele et al. (CONNIE, CHILLAX, CONUS), in 2022
|
| 1613 |
+
Snowmass Summer Study (2022) arXiv:2203.07214 [hep-ex].
|
| 1614 |
+
[4] C. Romano et al., “Nuclear Data to Reduce Uncertain-
|
| 1615 |
+
ties
|
| 1616 |
+
in
|
| 1617 |
+
Reactor
|
| 1618 |
+
Antineutrino
|
| 1619 |
+
Measurements:
|
| 1620 |
+
Summary
|
| 1621 |
+
Report
|
| 1622 |
+
of
|
| 1623 |
+
the
|
| 1624 |
+
Workshop
|
| 1625 |
+
on
|
| 1626 |
+
Nuclear
|
| 1627 |
+
Data
|
| 1628 |
+
for
|
| 1629 |
+
Reac-
|
| 1630 |
+
tor Antineutrino Measurements (WoNDRAM),”
|
| 1631 |
+
(2022),
|
| 1632 |
+
https://www.osti.gov/servlets/purl/1842423/.
|
| 1633 |
+
[5] A. Bernstein, N. Bowden, B. L. Goldblum, P. Huber, I. Jo-
|
| 1634 |
+
vanovic, and J. Mattingly, Rev. Mod. Phys. 92, 011003 (2020),
|
| 1635 |
+
arXiv:1908.07113 [physics.soc-ph].
|
| 1636 |
+
[6] K. Eguchi et al. (KamLAND), Phys. Rev. Lett. 90, 021802
|
| 1637 |
+
(2003), arXiv:hep-ex/0212021.
|
| 1638 |
+
[7] F. An et al. (Daya Bay), Phys. Rev. Lett. 108, 171803 (2012),
|
| 1639 |
+
arXiv:1203.1669 [hep-ex].
|
| 1640 |
+
[8] J. Ahn et al. (RENO Collaboration), Phys. Rev. Lett. 108,
|
| 1641 |
+
191802 (2012).
|
| 1642 |
+
[9] Y. Abe et al. (Double Chooz), JHEP 10, 086 (2014), [Erratum:
|
| 1643 |
+
JHEP 02, 074 (2015)], arXiv:1406.7763 [hep-ex].
|
| 1644 |
+
[10] Y. Declais et al., Nucl. Phys. B 434, 503 (1995).
|
| 1645 |
+
[11] Y. Ko et al. (NEOS), Phys. Rev. Lett. 118, 121802 (2017),
|
| 1646 |
+
arXiv:1610.05134 [hep-ex].
|
| 1647 |
+
[12] I. Alekseev et al. (DANSS), Phys. Lett. B 787, 56 (2018),
|
| 1648 |
+
arXiv:1804.04046 [hep-ex].
|
| 1649 |
+
[13] H. Almaz´an et al. (STEREO), Phys. Rev. D 102, 052002
|
| 1650 |
+
(2020), arXiv:1912.06582 [hep-ex].
|
| 1651 |
+
[14] M. Andriamirado et al. (PROSPECT), Phys. Rev. D 103,
|
| 1652 |
+
032001 (2021), arXiv:2006.11210 [hep-ex].
|
| 1653 |
+
[15] F. An et al. (Daya Bay), Phys. Rev. Lett. 113, 141802 (2014),
|
| 1654 |
+
arXiv:1407.7259 [hep-ex].
|
| 1655 |
+
[16] C. Hagner, M. Altmann, F. von Feilitzsch, L. Oberauer, Y. De-
|
| 1656 |
+
clais, and E. Kajfasz, Phys. Rev. D 52, 1343 (1995).
|
| 1657 |
+
|
| 1658 |
+
12
|
| 1659 |
+
[17] M. Deniz et al. (TEXONO), Phys. Rev. D 82, 033004 (2010),
|
| 1660 |
+
arXiv:1006.1947 [hep-ph].
|
| 1661 |
+
[18] Y. Abe et al. (Double Chooz), Phys. Rev. D 86, 112009 (2012),
|
| 1662 |
+
arXiv:1209.5810 [hep-ex].
|
| 1663 |
+
[19] D. Adey et al. (Daya Bay), Phys. Rev. D 98, 092013 (2018),
|
| 1664 |
+
arXiv:1809.04660 [hep-ex].
|
| 1665 |
+
[20] L. Singh et al. (TEXONO), Phys. Rev. D 99, 032009 (2019),
|
| 1666 |
+
arXiv:1808.02719 [hep-ph].
|
| 1667 |
+
[21] A. Aguilar-Arevalo et al. (CONNIE), JHEP 04, 054 (2020),
|
| 1668 |
+
arXiv:1910.04951 [hep-ex].
|
| 1669 |
+
[22] M.
|
| 1670 |
+
Andriamirado
|
| 1671 |
+
et
|
| 1672 |
+
al.
|
| 1673 |
+
(PROSPECT),
|
| 1674 |
+
(2021),
|
| 1675 |
+
arXiv:2104.11219 [hep-ex].
|
| 1676 |
+
[23] H. Almaz´an et al., Phys. Rev. Lett. 128, 061801 (2022),
|
| 1677 |
+
arXiv:2111.01519 [hep-ex].
|
| 1678 |
+
[24] J. Choi et al. (RENO), Phys. Rev. Lett. 116, 211801 (2016),
|
| 1679 |
+
arXiv:1511.05849 [hep-ex].
|
| 1680 |
+
[25] F. An et al. (Daya Bay), Phys. Rev. Lett. 118, 251801 (2017),
|
| 1681 |
+
arXiv:1704.01082 [hep-ex].
|
| 1682 |
+
[26] J. Ashenfelter et al. (PROSPECT), Phys. Rev. Lett. 122, 251801
|
| 1683 |
+
(2019), arXiv:1812.10877 [nucl-ex].
|
| 1684 |
+
[27] H. Almaz´an Molina et al. (STEREO), Journal of Physics G 48,
|
| 1685 |
+
075107 (2021), arXiv:2010.01876 [hep-ex].
|
| 1686 |
+
[28] F. P. An et al. (Daya Bay), (2022), arXiv:2203.06686 [hep-ex].
|
| 1687 |
+
[29] M. Fallot et al., Phys. Rev. Lett. 109, 202504 (2012),
|
| 1688 |
+
arXiv:1208.3877 [nucl-ex].
|
| 1689 |
+
[30] A. A. Sonzogni, E. A. McCutchan, T. D. Johnson, and P. Dim-
|
| 1690 |
+
itriou, Phys. Rev. Lett. 116, 132502 (2016).
|
| 1691 |
+
[31] T. Yoshida, T. Tachibana, S. Okumura,
|
| 1692 |
+
and S. Chiba, Phys.
|
| 1693 |
+
Rev. C 98, 041303 (2018).
|
| 1694 |
+
[32] M. Estienne et al., Phys. Rev. Lett. 123, 022502 (2019),
|
| 1695 |
+
arXiv:1904.09358 [nucl-ex].
|
| 1696 |
+
[33] E. Christensen, P. Huber, P. Jaffke, and T. E. Shea, Phys. Rev.
|
| 1697 |
+
Lett. 113, 042503 (2014), arXiv:1403.7065 [physics.ins-det].
|
| 1698 |
+
[34] E. Christensen, P. Huber,
|
| 1699 |
+
and P. Jaffke, Science and Global
|
| 1700 |
+
Security 23, 20 (2015).
|
| 1701 |
+
[35] A. Bernstein, N. S. Bowden, and A. S. Erickson, Phys. Rev.
|
| 1702 |
+
Applied 9, 014003 (2018).
|
| 1703 |
+
[36] P. Jaffke and P. Huber, Phys. Rev. Applied 8, 034005 (2017),
|
| 1704 |
+
arXiv:1612.06494 [physics.ins-det].
|
| 1705 |
+
[37] C. Stewart, A. Abou-Jaoude, and A. Erickson, Nature Com-
|
| 1706 |
+
mun. 10, 3527 (2019).
|
| 1707 |
+
[38] Y. Klimov, V. Kopeikin, L. Mikaelyan, K. Ozerov, and V. Sinev,
|
| 1708 |
+
Atomic Energy 76, 123 (1994).
|
| 1709 |
+
[39] N. Bowden, A. Bernstein, S. Dazeley, R. Svoboda, A. Mis-
|
| 1710 |
+
ner,
|
| 1711 |
+
and T. Palmer, J. Appl. Phys. 105, 064902 (2009),
|
| 1712 |
+
arXiv:0808.0698 [nucl-ex].
|
| 1713 |
+
[40] P. Vogel and J. F. Beacom, Phys. Rev. D 60, 053003 (1999).
|
| 1714 |
+
[41] J. M. Berryman and P. Huber, JHEP 01, 167 (2021),
|
| 1715 |
+
arXiv:2005.01756 [hep-ph].
|
| 1716 |
+
[42] G. Vidyakin, V. Vyrodov, I. Gurevich, Y. Kozlov, V. Marte-
|
| 1717 |
+
myanov, S. Sukhotin, V. Tarasenkov, and S. Khakimov, Sov.
|
| 1718 |
+
Phys. JETP 66, 243 (1987).
|
| 1719 |
+
[43] G. Vidyakin, V. Vyrodov, I. Gurevich, Y. Kozlov, V. Marte-
|
| 1720 |
+
myanov, S. Sukhotin, V. Tarasenkov, and S. Khakimov, Sov.
|
| 1721 |
+
Phys. JETP 71, 424 (1990).
|
| 1722 |
+
[44] Y. Kozlov, S. Khalturtsev, I. Machulin, A. Martemyanov,
|
| 1723 |
+
V. Martemyanov, S. Sukhotin, V. Tarasenkov, E. Turbin, and
|
| 1724 |
+
V. Vyrodov, Phys. Atom. Nucl. 63, 1016 (2000), arXiv:hep-
|
| 1725 |
+
ex/9912047.
|
| 1726 |
+
[45] H. Kwon, F. Boehm, A. Hahn, H. Henrikson, J. Vuilleumier,
|
| 1727 |
+
J. Cavaignac, D. Koang, B. Vignon, F. Von Feilitzsch,
|
| 1728 |
+
and
|
| 1729 |
+
R. Mossbauer, Phys. Rev. D 24, 1097 (1981).
|
| 1730 |
+
[46] G. Boireau et al. (NUCIFER), Phys. Rev. D 93, 112006 (2016),
|
| 1731 |
+
arXiv:1509.05610 [physics.ins-det].
|
| 1732 |
+
[47] Z. Greenwood et al., Phys. Rev. D 53, 6054 (1996).
|
| 1733 |
+
[48] H. Almaz´an et al. (STEREO), Phys. Rev. Lett. 125, 201801
|
| 1734 |
+
(2020), arXiv:2004.04075 [hep-ex].
|
| 1735 |
+
[49] G. Zacek et al. (CALTECH-SIN-TUM), Phys. Rev. D 34, 2621
|
| 1736 |
+
(1986).
|
| 1737 |
+
[50] A. I. Afonin et al., Sov. Phys. JETP 67, 213 (1988).
|
| 1738 |
+
[51] A. Kuvshinnikov et al., JETP Lett. 54, 253 (1991).
|
| 1739 |
+
[52] Y. Declais et al., Phys. Lett. B 338, 383 (1994).
|
| 1740 |
+
[53] B. Achkar et al., Phys. Lett. B 374, 243 (1996).
|
| 1741 |
+
[54] M. Apollonio et al. (CHOOZ), Phys. Lett. B 466, 415 (1999),
|
| 1742 |
+
arXiv:hep-ex/9907037.
|
| 1743 |
+
[55] G. Bak et al. (RENO), Phys. Rev. Lett. 122, 232501 (2019),
|
| 1744 |
+
arXiv:1806.00574 [hep-ex].
|
| 1745 |
+
[56] H. de Kerret et al. (Double Chooz), Nature Phys. 16, 558
|
| 1746 |
+
(2020), arXiv:1901.09445 [hep-ex].
|
| 1747 |
+
[57] C. Giunti, Phys. Lett. B 764, 145 (2017), arXiv:1608.04096
|
| 1748 |
+
[hep-ph].
|
| 1749 |
+
[58] P. Huber, Phys. Rev. C 84, 024617 (2011), [Erratum:
|
| 1750 |
+
Phys.Rev.C 85, 029901 (2012)], arXiv:1106.0687 [hep-ph].
|
| 1751 |
+
[59] T. A. Mueller et al., Phys. Rev. C 83, 054615 (2011).
|
| 1752 |
+
[60] G. Mention, M. Fechner, T. Lasserre, T. Mueller, D. Lhuil-
|
| 1753 |
+
lier, M. Cribier, and A. Letourneau, Phys. Rev. D 83, 073006
|
| 1754 |
+
(2011), arXiv:1101.2755 [hep-ex].
|
| 1755 |
+
[61] Y. Gebre, B. Littlejohn, and P. Surukuchi, Phys. Rev. D 97,
|
| 1756 |
+
013003 (2018), arXiv:1709.10051 [hep-ph].
|
| 1757 |
+
[62] C. Giunti, X. Ji, M. Laveder, Y. Li, and B. Littlejohn, JHEP 10,
|
| 1758 |
+
143 (2017), arXiv:1708.01133 [hep-ph].
|
| 1759 |
+
[63] O.
|
| 1760 |
+
Akindele
|
| 1761 |
+
et
|
| 1762 |
+
al.,
|
| 1763 |
+
(2021),
|
| 1764 |
+
10.2172/1826602,
|
| 1765 |
+
arXiv:2112.12593 [hep-ph].
|
| 1766 |
+
[64] J. Roglans-Ribas, K. Pasamehmetoglu,
|
| 1767 |
+
and T. J. O’Connor,
|
| 1768 |
+
Nuclear Science and Engineering 196, 1 (2022).
|
| 1769 |
+
[65] B. Littlejohn, A. Conant, D. Dwyer, A. Erickson, I. Gustafson,
|
| 1770 |
+
and
|
| 1771 |
+
K.
|
| 1772 |
+
Hermanek,
|
| 1773 |
+
Phys.
|
| 1774 |
+
Rev.
|
| 1775 |
+
D
|
| 1776 |
+
97,
|
| 1777 |
+
073007
|
| 1778 |
+
(2018),
|
| 1779 |
+
arXiv:1803.01787 [nucl-th].
|
| 1780 |
+
[66] S. Gariazzo, C. Giunti, M. Laveder, and Y. Li, JHEP 06, 135
|
| 1781 |
+
(2017), arXiv:1703.00860 [hep-ph].
|
| 1782 |
+
[67] https://github.com/iit-neutrino/AGRIYA.
|
| 1783 |
+
[68] V. Kopeikin, M. Skorokhvatov, and O. Titov, Phys. Rev. D 104,
|
| 1784 |
+
L071301 (2021), arXiv:2103.01684 [nucl-ex].
|
| 1785 |
+
[69] K. Abazajian et al., (2012), arXiv:1204.5379 [hep-ph].
|
| 1786 |
+
[70] A. Sonzogni, T. Johnson, and E. McCutchan, Phys. Rev. C 91,
|
| 1787 |
+
011301 (2015).
|
| 1788 |
+
[71] F. P. An et al. (Daya Bay), Chin. Phys. C 41, 013002 (2017),
|
| 1789 |
+
arXiv:1607.05378 [hep-ex].
|
| 1790 |
+
[72] A. Bernstein, N. S. Bowden, and A. S. Erickson, Phys. Rev.
|
| 1791 |
+
Applied 9, 014003 (2018), arXiv:1612.00540 [nucl-ex].
|
| 1792 |
+
[73] S. P. Behera, D. K. Mishra, and L. M. Pant, Phys. Rev. D 102,
|
| 1793 |
+
013002 (2020), arXiv:2007.00392 [hep-ph].
|
| 1794 |
+
[74] M. Bergevin et al., (2019), arXiv:1911.06834 [hep-ex].
|
| 1795 |
+
[75] D. Adey et al. (Daya Bay), Phys. Rev. Lett. 123, 111801 (2019),
|
| 1796 |
+
arXiv:1904.07812 [hep-ex].
|
| 1797 |
+
[76] A. Erickson, personal communication.
|
| 1798 |
+
[77] J. Ashenfelter et al. (PROSPECT), Nucl. Instrum. Meth. A 922,
|
| 1799 |
+
287 (2019), arXiv:1808.00097 [physics.ins-det].
|
| 1800 |
+
[78] N. S. Bowden, J. M. Link, and W. Wang (NF07 Applications
|
| 1801 |
+
Topical Group Community), in 2022 Snowmass Summer Study
|
| 1802 |
+
(2022) arXiv:2209.07483 [hep-ex].
|
| 1803 |
+
[79] M. Andriamirado et al., (2021), arXiv:2107.03934 [hep-ex].
|
| 1804 |
+
[80] J. Cao, Nucl. Phys. B Proc. Suppl. 229-232, 205 (2012),
|
| 1805 |
+
arXiv:1101.2266 [hep-ex].
|
| 1806 |
+
[81] A. Conant,
|
| 1807 |
+
Ph.D. Thesis, Georgia Institute of Technol-
|
| 1808 |
+
ogy
|
| 1809 |
+
(2019),
|
| 1810 |
+
https://prospect.yale.edu/sites/
|
| 1811 |
+
default/files/conant-dissertation-2019.
|
| 1812 |
+
pdf.
|
| 1813 |
+
|
| 1814 |
+
13
|
| 1815 |
+
[82] X. B. Ma et al., Phys. Rev. C 88, 014605 (2013).
|
| 1816 |
+
[83] D. Adey et al. (Daya Bay), Phys. Rev. D 100, 052004 (2019),
|
| 1817 |
+
arXiv:1808.10836 [hep-ex].
|
| 1818 |
+
[84] H. de Kerret et al. (Double Chooz), Nature Phys. 16, 558
|
| 1819 |
+
(2020), arXiv:1901.09445 [hep-ex].
|
| 1820 |
+
[85] C. Giunti, Phys. Rev. D 96, 033005 (2017), arXiv:1704.02276
|
| 1821 |
+
[hep-ph].
|
| 1822 |
+
[86] C. Giunti, Y. Li, B. Littlejohn, and P. Surukuchi, Phys. Rev. D
|
| 1823 |
+
99, 073005 (2019), arXiv:1901.01807 [hep-ph].
|
| 1824 |
+
[87] H. Almaz´an et al. (STEREO), Phys. Rev. Lett. 125, 201801
|
| 1825 |
+
(2020), arXiv:2004.04075 [hep-ex].
|
| 1826 |
+
[88] F. P. An et al. (Daya Bay), Chin. Phys. C 45, 073001 (2021),
|
| 1827 |
+
arXiv:2102.04614 [hep-ex].
|
| 1828 |
+
[89] Y. Jeong et al. (NEOS II), J. Korean Phys. Soc. 77, 1118 (2020),
|
| 1829 |
+
arXiv:2009.13355 [physics.ins-det].
|
| 1830 |
+
[90] A schedule of forecasted reactor facility start-ups world-
|
| 1831 |
+
wide
|
| 1832 |
+
are
|
| 1833 |
+
given
|
| 1834 |
+
at
|
| 1835 |
+
https://world-nuclear.org/information-
|
| 1836 |
+
library/current-and-future-generation/plans-for-new-reactors-
|
| 1837 |
+
worldwide.aspx.
|
| 1838 |
+
[91] Both hypothetical future and Huber-Mueller model IBD yield
|
| 1839 |
+
covariance matrices are included in supplementary materials
|
| 1840 |
+
accompanying this paper.
|
| 1841 |
+
[92] F. Von Feilitzsch, A. A. Hahn,
|
| 1842 |
+
and K. Schreckenbach,
|
| 1843 |
+
Phys.Lett. B118, 162 (1982).
|
| 1844 |
+
[93] A. A. Hahn et al., Phys.Lett. B218, 365 (1989).
|
| 1845 |
+
[94] C. A. Arg¨uelles, I. Esteban, M. Hostert, K. J. Kelly, J. Kopp,
|
| 1846 |
+
P. A. N. Machado, I. Martinez-Soler, and Y. F. Perez-Gonzalez,
|
| 1847 |
+
(2021), arXiv:2111.10359 [hep-ph].
|
| 1848 |
+
|
NdFPT4oBgHgl3EQflzWN/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
PtFJT4oBgHgl3EQfJCwC/content/tmp_files/2301.11458v1.pdf.txt
ADDED
|
@@ -0,0 +1,1913 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Superconductivity of anomalous pseudospin
|
| 2 |
+
Han Gyeol Suh1, Yue Yu1,2, Tatsuya Shishidou1, Michael Weinert1, P. M. R. Brydon3, and Daniel F. Agterberg1
|
| 3 |
+
1Department of Physics, University of Wisconsin, Milwaukee, Wisconsin 53201, USA
|
| 4 |
+
2Department of Physics, Stanford University, 476 Lomita Mall, Stanford, CA 94305, USA and
|
| 5 |
+
3Department of Physics and MacDiarmid Institute for Advanced Materials and Nanotechnology,
|
| 6 |
+
University of Otago, P.O. Box 56, Dunedin 9054, New Zealand
|
| 7 |
+
In materials with both time-reversal (T) and inversion symmetry (I), superconductivity is formed
|
| 8 |
+
by pairing fermion pseudospin partners at momenta k and −k. Typically, pseudospin shares the
|
| 9 |
+
same symmetry properties as usual spin-1/2. Here we consider non-symmorphic materials with mo-
|
| 10 |
+
mentum space spin-textures that exhibit an anomalous pseudospin with different symmetry prop-
|
| 11 |
+
erties than usual spin-1/2. We provide a comprehensive list of space groups for which anomalous
|
| 12 |
+
pseudospin occurs on planes in momentum space and carry out a complete categorization and anal-
|
| 13 |
+
ysis of superconductivity for Fermi surfaces centered on all possible T, I invariant momenta (TRIM)
|
| 14 |
+
in these planes. We show that superconductivity from this anomalous pseudospin leads to a vari-
|
| 15 |
+
ety of unusual consequences for superconductivity including: extremely large Pauli limiting fields
|
| 16 |
+
and residual Knight shifts for pseudospin singlet superconductors; field induced pair density wave
|
| 17 |
+
states; field induced pseudospin singlet to pseudospin triplet transitions; fully gapped ‘nodal’ super-
|
| 18 |
+
conductors; and additional insight into the breakdown of Blount’s theorem for pseudospin triplet
|
| 19 |
+
superconductors. We apply our results to UPt3, BiS2-based superconductors, Fe-based supercon-
|
| 20 |
+
ductors, and paramagnetic UCoGe.
|
| 21 |
+
I.
|
| 22 |
+
INTRODUCTION
|
| 23 |
+
Momentum space spin-textures of electronic bands are known to underlie spintronic and superconducting properties of
|
| 24 |
+
quantum materials [1–3]. In the spintronics context, Rashba-like spin textures allow control of electronic spin through
|
| 25 |
+
applied electric fields [1, 3].
|
| 26 |
+
In superconductors, these same spin textures lead to unusual and counter-intuitive
|
| 27 |
+
magnetic response, such as the robustness of spin-singlet superconductivity to applied magnetic fields, pair density
|
| 28 |
+
wave states, and singlet-triplet mixing [2]. While such spin-textures are common when inversion symmetry is broken,
|
| 29 |
+
it has been realized that these can occur when inversion symmetry is present. This has lead to the notion of hidden
|
| 30 |
+
spin-textures [4] and locally non-centrosymmetric superconductivity [5], where inversion related sectors each allow a
|
| 31 |
+
Rashba-like spin-texture due to the local inversion symmetry breaking. These spin-textures are of opposite sign on
|
| 32 |
+
the two sectors, so that global inversion symmetry is restored. These hidden spin-textures allows the novel physics
|
| 33 |
+
associated with spin-orbit coupling (SOC) to emerge even when inversion symmetry is not broken. It further allows
|
| 34 |
+
for new physics to emerge. One notable example is a field induced transition from an even-parity (pseudospin singlet)
|
| 35 |
+
to odd-parity (pseudospin triplet) observed in CeRh2As2 [6–9].
|
| 36 |
+
Key to observing novel physics associated with these spin-textures in inversion symmetric materials, is that the
|
| 37 |
+
inversion related sectors are weakly coupled [5, 9–11]. Theoretical proposals for how to achieve this fall under two
|
| 38 |
+
approaches: the first is to tailor weak coupling between the inversion related sectors, for example by separating two
|
| 39 |
+
inversion symmetry related layers so that the interlayer coupling is weak [6]; the second is to exploit symmetries that
|
| 40 |
+
ensure that this inter-sector coupling vanishes. The symmetry based approach has been applied to points and lines
|
| 41 |
+
in momentum space. Examples include two-dimensional (2D) transition metal dichalcogenides near the K-point [12]
|
| 42 |
+
and non-symmorphic symmetries near the X −M line in BaNiS2 with space group 129 (P4/nmm) [10]. In these cases,
|
| 43 |
+
the only energy splitting between the inversion-related sectors is due to SOC - a situation conceptually similar to
|
| 44 |
+
materials with broken inversion symmetry, where the usual two-fold pseudopsin degeneracy is broken solely by SOC.
|
| 45 |
+
Here we generalize this symmetry based approach by identifying electronic band degeneracies that are split solely
|
| 46 |
+
by SOC in materials with both inversion, I, and time-reversal, T, symmetries. This requires bands that are at least
|
| 47 |
+
four-fold degenerate when SOC is ignored. Such band degeneracies are not generic and require symmetries beyond the
|
| 48 |
+
usual two-fold pseudospin (or Kramers) degeneracy that arises from TI symmetry. Here we focus on 2D momentum
|
| 49 |
+
planes, nodal planes, where this occurs. This is the largest region in momentum space for which the required four-
|
| 50 |
+
fold electronic degeneracies can appear when SOC is ignored. As discussed in a variety of contexts [13–16], such
|
| 51 |
+
nodal planes arise in non-symmorphic crystal structures. Here we provide a complete list of space groups for which
|
| 52 |
+
this occurs and provide symmetry based kp theories for all time-reversal-invariant momenta (TRIM) on these nodal
|
| 53 |
+
planes. As discussed later, many relevant superconductors exhibit Fermi surfaces near these TRIM. We find that the
|
| 54 |
+
SOC-split electronic states on these nodal planes generically exhibit a pseudospin that has a different symmetry than
|
| 55 |
+
that of usual spin-1/2 fermions (this generalizes a result we found for space group P4/nmm [9]). Here we name this
|
| 56 |
+
anomalous pseudospin and examine the consequences of this anomalous pseudospin on superconductivity. We find
|
| 57 |
+
that this anomalous pseudospin plays a central role on the superconducting magnetic response and on the properties
|
| 58 |
+
arXiv:2301.11458v1 [cond-mat.supr-con] 26 Jan 2023
|
| 59 |
+
|
| 60 |
+
2
|
| 61 |
+
of spin-triplet superconductivity. Our results complement and provide further insight on earlier nodal and topological
|
| 62 |
+
classifications of superconductivity in non-symmorphic materials [17–21].
|
| 63 |
+
In this paper we begin by defining anomalous pseudospin on nodal momenta planes, we then characterize all possible
|
| 64 |
+
symmetry based kp theories near TRIM points on these nodal planes. Using these kp theories, we analyse the magnetic
|
| 65 |
+
response and nodal excitations of superconducting states formed from anomalous pseudospin. We apply this analysis
|
| 66 |
+
to a series of materials that exhibit Fermi surfaces that lie on or near these nodal planes. More specifically we reveal
|
| 67 |
+
how anomalous pseudospin: explains critical fields that far exceed the Pauli field in BiS2-based materials [22] and the
|
| 68 |
+
observed magnetic response 3D Fe-based superconductors [23]; identifies which space groups and TRIM are ideal to
|
| 69 |
+
find a field induced even parity to odd parity transition akin to that observed in CeRh2As2 [7]; provides insight into
|
| 70 |
+
the gap symmetry of UPt3 [24]; and shines new light on re-entrant superconductivity in UCoGe [25].
|
| 71 |
+
II.
|
| 72 |
+
ANOMALOUS PSEUDOSPIN: SYMMETRY ORIGIN
|
| 73 |
+
Our aim is to exploit symmetry to find nodal plane band degeneracies that are lifted solely by SOC. As discussed
|
| 74 |
+
below, once these band degeneracies are lifted, a two-fold pseudospin degeneracy will remain. We find that generically,
|
| 75 |
+
the pseudospin that results from this procedure does not share the same symmetry properties as usual spin 1/2 and
|
| 76 |
+
hence we name this anomalous pseudospin.
|
| 77 |
+
Pseudospin describes the two-fold Kramers degeneracy that arises at each momentum point k when the product of
|
| 78 |
+
time-reversal T and inversion I symmetries, TI, is present. The product TI is anti-unitary and for fermions satisfies
|
| 79 |
+
(TI)2 = −1, ensuring at least a two-fold degeneracy. It is often the case that this pseudospin behaves as spin-1/2
|
| 80 |
+
under rotations [26]. However, when symmetries beyond TI are present, it is possible that this is not the case. One
|
| 81 |
+
example of this is the angular momentum jz = ±3/2 electronic states that arise when cubic symmetry or a three-fold
|
| 82 |
+
rotation axis is present [2, 27, 28]. In the latter case, this gives rise to so-called type-II Ising superconductivity in 2D
|
| 83 |
+
materials [28, 29] where large in-plane critical fields appear when the Fermi surface is sufficiently close to momentum
|
| 84 |
+
points with this three-fold rotation symmetry. In our case, the anomalous pseudospin appears on momentum planes
|
| 85 |
+
in the Brillouin zone, allowing a larger phase space for the physical properties of anomalous pseudospin to manifest.
|
| 86 |
+
To ensure the requisite band degeneracy on a nodal plane, consider the symmetry elements that keep a momentum
|
| 87 |
+
point on the plane invariant (here taken to be normal to the ˆn axis). These are {E, ˜
|
| 88 |
+
Mˆn, TI, T ˜C2,ˆn}, where
|
| 89 |
+
˜
|
| 90 |
+
Mˆn
|
| 91 |
+
is a translation mirror symmetry and ˜C2,ˆn is a translation two-fold rotation symmetry. Their point group rotation
|
| 92 |
+
and translation component can be denoted using Seitz notation, for example ˜
|
| 93 |
+
Mˆn = {Mˆn|t1, t2, t3} where Mˆn is a
|
| 94 |
+
point group mirror symmetry along ˆn and (t1, t2, t3) is a fractional translation vector. Since we are searching for a
|
| 95 |
+
degeneracy that appears without SOC, we consider orbital or sublattice degrees of freedom for which (TI)2 = 1. The
|
| 96 |
+
only remaining symmetry that can enforce a two-fold degeneracy is T ˜C2,ˆn, since this is anti-unitary, it must satisfy
|
| 97 |
+
(T ˜C2,ˆn)2 = −1 to do so. Since T commutes with rotations, this implies ˜C2
|
| 98 |
+
2,ˆn = −1. When operating on orbital or
|
| 99 |
+
sublattice degrees of freedom, ˜C2
|
| 100 |
+
2,ˆn is typically 1, suggesting it is not possible to have the required degeneracy. However,
|
| 101 |
+
in non-symmorphic groups, ˜C2,ˆn can be a screw axis, for which it is possible to satisfy ˜C2
|
| 102 |
+
2,ˆn = −1. In particular, using
|
| 103 |
+
Seitz notation ˜C2,ˆn = {C2ˆn|t1, t2, 1/2} (here t1 and t2 correspond to either a half in-plane translation vector or to no
|
| 104 |
+
translation) we have ( ˜C2,ˆn)2 = {E|0, 0, 1}. When operating on a state carrying momentum k, ( ˜C2,ˆn)2 is represented
|
| 105 |
+
by eik·ˆn. Hence if the nodal plane sits at momentum k · ˆn = π, then ˜C2
|
| 106 |
+
2,ˆn = −1 and a two-fold orbital or sublattice
|
| 107 |
+
degeneracy is ensured. When spin-degeneracy is also included, these states are then four-fold degenerate when SOC
|
| 108 |
+
is ignored.
|
| 109 |
+
When SOC is included, it is possible to show that the TI pseudospin partners have the same Mˆn mirror eigenvalue
|
| 110 |
+
(this result is generalization of that given in Ref. [9] where t1 = 0 and t2 = 0 was used). That is, labeling the two
|
| 111 |
+
Kramers degenerate states as |+⟩ and TI|+⟩, both belong to the same eigenstate of ˜
|
| 112 |
+
Mˆn. As a consequence, all Pauli
|
| 113 |
+
matrices ˜σi made from the two states |+⟩ TI|+⟩ must all be invariant under ˜
|
| 114 |
+
Mˆn. It is this feature that differs from
|
| 115 |
+
usual spin-1/2. Of the three Pauli matrices σi, constructed from usual spin-1/2 states, two will be odd under ˜
|
| 116 |
+
Mˆn and
|
| 117 |
+
one will be even under ˜
|
| 118 |
+
Mˆn. It is this symmetry distinction between the anomalous pseudospin operators (˜σi) and
|
| 119 |
+
usual spin 1/2 operators (σi) that underlie the unusual superconducting properties discussed below.
|
| 120 |
+
The above argument can also be applied to nodal lines generated by the symmetry elements {E, ˜C2,ˆn, TI, T ˜
|
| 121 |
+
Mˆn}
|
| 122 |
+
with (T ˜
|
| 123 |
+
Mˆn)2 = −1 when applied to orbital or sublattice degrees of freedom.
|
| 124 |
+
In this case, repeating the same
|
| 125 |
+
arguments above show that SOC will also split the band degeneracy and lead to anomalous pseudospin. Here, due
|
| 126 |
+
to the larger available momentum phase space, we restrict our analysis and classification to nodal planes and leave
|
| 127 |
+
an analysis of nodal lines to a later work. For all space groups that host nodal planes, we develop symmetry-based
|
| 128 |
+
kp theories valid near all TRIM on theses nodal planes. We emphasis these TRIM since Cooper pairs are formed by
|
| 129 |
+
pairing states at momenta k and −k with the momentum origin given by a TRIM. We then consider Fermi surfaces
|
| 130 |
+
|
| 131 |
+
3
|
| 132 |
+
Z
|
| 133 |
+
E
|
| 134 |
+
B
|
| 135 |
+
D
|
| 136 |
+
Y
|
| 137 |
+
C
|
| 138 |
+
A
|
| 139 |
+
Γ
|
| 140 |
+
FIG. 1.
|
| 141 |
+
Example from space group 14 where the green shading reveals the planes and lines in momentum space on which
|
| 142 |
+
anomalous pseudospin exists. A Fermi surface located near the momentum plane kz = π (as depicted by the dark Fermi surface
|
| 143 |
+
near the Z point) will have its superconducting properties governed by pairing of anomalous pseudospin. However, Fermi
|
| 144 |
+
surfaces far from these planes (such as that depicted near the Γ point) will exhibit more usual superconducting properties.
|
| 145 |
+
near these TRIM and discuss the resultant superconducting properties. Figure 1 illustrates our approach. Here, in
|
| 146 |
+
green, we show the nodal planes and lines that exhibit anomalous pseudospin. Here we examine the properties of
|
| 147 |
+
superconductivity for a Fermi surface near the Z point, which is a TRIM on the nodal plane. The properties of
|
| 148 |
+
superconductivity for a Fermi surface near the Γ point, for which pseudospin is typically not anomalous, are described
|
| 149 |
+
in earlier review articles [30, 31]. We note that many superconducting materials, including the examples discussed in
|
| 150 |
+
this paper, exhibit Fermi surfaces near nodal planes.
|
| 151 |
+
III.
|
| 152 |
+
NODAL PLANE SPACE GROUPS AND SINGLE-PARTICLE kp HAMILTONIANS
|
| 153 |
+
Here we identify all space groups that allow anomalous pseudospin on nodal planes and construct the corresponding
|
| 154 |
+
symmetry-based kp-like Hamiltonians for all TRIM on these planes.
|
| 155 |
+
A.
|
| 156 |
+
Space groups with nodal planes
|
| 157 |
+
To identify these nodal planes, all space groups containing inversion symmetry I = {I|0, 0, 0} and the screw axis
|
| 158 |
+
˜C2,ˆn = {C2ˆn|t1, t2, 1/2} (where t1 = 0, 1/2 and t2 = 0, 1/2) were identified. For these space groups, the nodal planes
|
| 159 |
+
lie on the Brillouin zone boundary. Table 1 lists the resultant space groups, point groups, nodal planes, and types
|
| 160 |
+
of kp theories allowed for these space groups. As discussed in the previous section, the degeneracies of these nodal
|
| 161 |
+
planes is generically lifted by SOC, yielding anomalous pseudospin.
|
| 162 |
+
B.
|
| 163 |
+
Symmetry based kp theories near TRIM
|
| 164 |
+
To understand the consequences of anomalous pseudospin on superconductivity requires a theory for the normal
|
| 165 |
+
state. Cooper pairs rely on the degeneracy between states of momenta k and −k and this degeneracy is ensured by
|
| 166 |
+
both T and I symmetries. For this reason, we develop symmetry-based kp theories expanded around TRIM. To derive
|
| 167 |
+
these kp-like Hamiltonians, we have used the real representations for the TRIM given in the Bilbao Crystallographic
|
| 168 |
+
|
| 169 |
+
4
|
| 170 |
+
Crystal Type
|
| 171 |
+
Number
|
| 172 |
+
Name
|
| 173 |
+
Nodal planes
|
| 174 |
+
kp theory classes
|
| 175 |
+
Monoclinic (C2h)
|
| 176 |
+
11
|
| 177 |
+
P21/m
|
| 178 |
+
(u, 1/2, w)
|
| 179 |
+
Ctype1
|
| 180 |
+
2h,1
|
| 181 |
+
14
|
| 182 |
+
P21/c
|
| 183 |
+
(u, 1/2, w)
|
| 184 |
+
Ctype1
|
| 185 |
+
2h,1 , Ctype2
|
| 186 |
+
2h,2
|
| 187 |
+
Orthorhombic (D2h)
|
| 188 |
+
51
|
| 189 |
+
Pmma
|
| 190 |
+
(1/2, v, w)
|
| 191 |
+
Dtype1
|
| 192 |
+
2h,3
|
| 193 |
+
52
|
| 194 |
+
Pnna
|
| 195 |
+
(u, 1/2, w)
|
| 196 |
+
Dtype1
|
| 197 |
+
2h,3 , Dtype2
|
| 198 |
+
2h,4 , 8-fold
|
| 199 |
+
53
|
| 200 |
+
Pmna
|
| 201 |
+
(u, v, 1/2)
|
| 202 |
+
Dtype1
|
| 203 |
+
2h,3 , Dtype2
|
| 204 |
+
2h,4
|
| 205 |
+
54
|
| 206 |
+
Pcca
|
| 207 |
+
(1/2, v, w)
|
| 208 |
+
Dtype1
|
| 209 |
+
2h,3 , 8-fold
|
| 210 |
+
55
|
| 211 |
+
Pbam
|
| 212 |
+
(1/2, v, w), (u, 1/2, w)
|
| 213 |
+
Dtype2
|
| 214 |
+
2h,2 , Dtype1
|
| 215 |
+
2h,3
|
| 216 |
+
56
|
| 217 |
+
Pccn
|
| 218 |
+
(1/2, v, w), (u, 1/2, w)
|
| 219 |
+
Dtype1
|
| 220 |
+
2h,1 , Dtype2
|
| 221 |
+
2h,2 , Dtype1
|
| 222 |
+
2h,3 , 8-fold
|
| 223 |
+
57
|
| 224 |
+
Pbcm
|
| 225 |
+
(u, v, 1/2), (u, 1/2, w)
|
| 226 |
+
Dtype1
|
| 227 |
+
2h,3 , 8-fold
|
| 228 |
+
58
|
| 229 |
+
Pnnm
|
| 230 |
+
(1/2, v, w), (u, 1/2, w)
|
| 231 |
+
Dtype1
|
| 232 |
+
2h,1 , Dtype2
|
| 233 |
+
2h,2 , Dtype1
|
| 234 |
+
2h,3 , Dtype2
|
| 235 |
+
2h,4
|
| 236 |
+
59
|
| 237 |
+
Pmmn
|
| 238 |
+
(1/2, v, w), (u, 1/2, w)
|
| 239 |
+
Dtype1
|
| 240 |
+
2h,1 , Dtype1
|
| 241 |
+
2h,3
|
| 242 |
+
60
|
| 243 |
+
Pbcn
|
| 244 |
+
(1/2, v, w), (u, v, 1/2)
|
| 245 |
+
Dtype1
|
| 246 |
+
2h,3 , Dtype2
|
| 247 |
+
2h,4 , 8-fold
|
| 248 |
+
61
|
| 249 |
+
Pbca
|
| 250 |
+
(1/2, v, w), (u, v, 1/2), (u, 1/2, w)
|
| 251 |
+
Dtype1
|
| 252 |
+
2h,3 , 8-fold
|
| 253 |
+
62
|
| 254 |
+
Pnma
|
| 255 |
+
(1/2, v, w), (u, v, 1/2), (u, 1/2, w)
|
| 256 |
+
Dtype1
|
| 257 |
+
2h,1 , Dtype1
|
| 258 |
+
2h,3 , 8-fold
|
| 259 |
+
63
|
| 260 |
+
Cmcm
|
| 261 |
+
(u, v, 1/2)
|
| 262 |
+
Ctype1
|
| 263 |
+
2h,1 , Dtype1
|
| 264 |
+
2h,3
|
| 265 |
+
64
|
| 266 |
+
Cmce
|
| 267 |
+
(u, v, 1/2)
|
| 268 |
+
Ctype2
|
| 269 |
+
2h,2 , Dtype1
|
| 270 |
+
2h,3
|
| 271 |
+
Tetragonal (D4h)
|
| 272 |
+
127
|
| 273 |
+
P4/mbm
|
| 274 |
+
(u, 1/2, w)
|
| 275 |
+
Dtype1
|
| 276 |
+
2h,3 , Dtype2
|
| 277 |
+
4h,2 , Dtype2
|
| 278 |
+
4h,4
|
| 279 |
+
128
|
| 280 |
+
P4/mnc
|
| 281 |
+
(u, 1/2, w)
|
| 282 |
+
Dtype1
|
| 283 |
+
2h,3 , Dtype2
|
| 284 |
+
2h,4 , Dtype2
|
| 285 |
+
4h,2 , Dtype2
|
| 286 |
+
4h,4 , Dtype1
|
| 287 |
+
4h,5 , 8-fold
|
| 288 |
+
129
|
| 289 |
+
P4/nmm
|
| 290 |
+
(u, 1/2, w)
|
| 291 |
+
Dtype1
|
| 292 |
+
2h,3 , Dtype1
|
| 293 |
+
4h,1 , Dtype1
|
| 294 |
+
4h,3
|
| 295 |
+
130
|
| 296 |
+
P4/ncc
|
| 297 |
+
(u, 1/2, w)
|
| 298 |
+
Dtype1
|
| 299 |
+
2h,3 , Dtype1
|
| 300 |
+
4h,1 , Dtype1
|
| 301 |
+
4h,3 , 8-fold
|
| 302 |
+
135
|
| 303 |
+
P42/mbc
|
| 304 |
+
(u, 1/2, w)
|
| 305 |
+
Dtype1
|
| 306 |
+
2h,3 , Dtype2
|
| 307 |
+
4h,2 , Dtype2
|
| 308 |
+
4h,4 , 8-fold
|
| 309 |
+
136
|
| 310 |
+
P42/mnm
|
| 311 |
+
(u, 1/2, w)
|
| 312 |
+
Dtype1
|
| 313 |
+
2h,3 , Dtype2
|
| 314 |
+
2h,4 , Dtype1
|
| 315 |
+
4h,1 , Dtype2
|
| 316 |
+
4h,2 , Dtype1
|
| 317 |
+
4h,3 , Dtype2
|
| 318 |
+
4h,4
|
| 319 |
+
137
|
| 320 |
+
P42/nmc
|
| 321 |
+
(u, 1/2, w)
|
| 322 |
+
Dtype1
|
| 323 |
+
2h,3 , Dtype1
|
| 324 |
+
4h,1 , Dtype1
|
| 325 |
+
4h,3 , Dtype1
|
| 326 |
+
4h,5 , 8-fold
|
| 327 |
+
138
|
| 328 |
+
P42/ncm
|
| 329 |
+
(u, 1/2, w)
|
| 330 |
+
Dtype1
|
| 331 |
+
2h,3 , Dtype1
|
| 332 |
+
4h,1 , Dtype2
|
| 333 |
+
4h,2 , Dtype1
|
| 334 |
+
4h,3 , Dtype2
|
| 335 |
+
4h,4 , 8-fold
|
| 336 |
+
Hexagonal (C6h)
|
| 337 |
+
176
|
| 338 |
+
P63/m
|
| 339 |
+
(u, v, 1/2)
|
| 340 |
+
Ctype1
|
| 341 |
+
2h,1 , Ctype1
|
| 342 |
+
6h
|
| 343 |
+
, 8-fold
|
| 344 |
+
Hexagonal (D6h)
|
| 345 |
+
193
|
| 346 |
+
P63/mcm
|
| 347 |
+
(u, v, 1/2)
|
| 348 |
+
Dtype1
|
| 349 |
+
2h,3 , Dtype1
|
| 350 |
+
6h
|
| 351 |
+
, 8-fold
|
| 352 |
+
194
|
| 353 |
+
P63/mmc
|
| 354 |
+
(u, v, 1/2)
|
| 355 |
+
Dtype1
|
| 356 |
+
2h,3 , Dtype1
|
| 357 |
+
6h
|
| 358 |
+
, 8-fold
|
| 359 |
+
Cubic (Th)
|
| 360 |
+
205
|
| 361 |
+
Pa3
|
| 362 |
+
(u, 1/2, w)
|
| 363 |
+
Dtype1
|
| 364 |
+
2h,3 , 8-fold
|
| 365 |
+
TABLE I. Space groups with nodal planes
|
| 366 |
+
server [32–34]. For these TRIM, we initially consider space group irreducible representations that do not include spin,
|
| 367 |
+
which, for simplicity, we name orbital representations. These representations are either 2-fold or 4-fold degenerate
|
| 368 |
+
(when spin is added, these becomes 4-fold and 8-fold degenerate respectively). The full kp-like Hamiltonians are only
|
| 369 |
+
listed for the 2-fold degenerate representations. We present a partial classification of the 4-fold degenerate orbital
|
| 370 |
+
representations near the end of this paper.
|
| 371 |
+
In constructing the kp theories for the 2-fold orbital degenerate TRIM points, we choose τi to be Pauli matrices that
|
| 372 |
+
encode the orbital degrees of freedom, and σi to be spin Pauli matrices. We take T = τ0(iσy)K where K is the complex
|
| 373 |
+
conjugation operator, hence the τ2 operator is odd under time-reversal. For a given doubly degenerate space group
|
| 374 |
+
representation on a TRIM, constructing its direct product leads to four irreducible point group representations. These
|
| 375 |
+
four representations each correspond to an orbital operator τi, and this partially dictates the momentum dependencies
|
| 376 |
+
of symmetry allowed terms in the kp Hamiltonian. We present our results for the kp Hamiltonians in Table 2. The
|
| 377 |
+
first row of each box gives the type of the kp theory class and the point group representations of the orbital operators
|
| 378 |
+
that are given by Pauli matrices τi. In this decomposition, the square brackets correspond to the antisymmetric τ2
|
| 379 |
+
operator and remaining terms correspond to τ0, τ1, and τ3. The second row of a box gives the kp Hamiltonian, and
|
| 380 |
+
the last part of a box lists the space groups and TRIM points representations that belong to the kp Hamiltonian class.
|
| 381 |
+
We have tabulated the kp Hamiltonians for 122 TRIM points and we find that only 13 different kp theories appear.
|
| 382 |
+
These are of two types, which we call type 1 and type 2. Type 1 kp theories have degenerate even and odd parity
|
| 383 |
+
orbital basis functions. Type 2 kp theories has two degenerate orbital basis functions with the same parity symmetry.
|
| 384 |
+
The generic form of these kp theories are
|
| 385 |
+
H(k) = ε0,k + t1,kτ1 + tα,kτα + τβ(λk · σ) = ε0,k + Hδ(k) ,
|
| 386 |
+
(1)
|
| 387 |
+
|
| 388 |
+
5
|
| 389 |
+
(I, τα, τβ) =
|
| 390 |
+
�
|
| 391 |
+
(τ1, τ2, τ3)
|
| 392 |
+
for type 1 ,
|
| 393 |
+
(τ0, τ3, τ2)
|
| 394 |
+
for type 2 ,
|
| 395 |
+
(2)
|
| 396 |
+
where Hδ(k) = H(k) − ε0,k and α and β are type indices will be used the remaining context. For parity mixed, type
|
| 397 |
+
1, kp theories, the degeneracy at TRIM points is not broken by SOC. This is because the non-symmorphic symmetries
|
| 398 |
+
combined with topological arguments imply these TRIM must have an odd number of Dirac lines passing through
|
| 399 |
+
them [35]. These Dirac lines lie in the nodal plane. Elsewhere in the nodal plane, SOC lifts the 4-fold degeneracy.
|
| 400 |
+
We will discuss some consequences of these Dirac lines later. The non trivial inversion symmetry for type 1, I = τ1,
|
| 401 |
+
implies the parity of the momentum functions that ε0,k = ε0,−k, t1,k = t1,−k, t2,k = −t2,−k, and λk = −λ−k.
|
| 402 |
+
This form of Hamiltonian has often been used to understand locally non-centrosymmetric superconductors [2] and
|
| 403 |
+
hidden spin polarization in inversion symmetric materials [11].
|
| 404 |
+
In these contexts, the orbital degrees of freedom
|
| 405 |
+
reside on different sectors that are related by inversion symmetry and there is typically no symmetry requirement
|
| 406 |
+
that ensures the SOC dominates. The τ3 matrix is odd under inversion symmetry, allowing the odd-parity SOC
|
| 407 |
+
λk to appear. Many superconductors of interest have Fermi surfaces near type 1 TRIM points, examples include:
|
| 408 |
+
Fe-based superconductors, which often have electron pockets near the M point in space group 129 (classes Dtype1
|
| 409 |
+
4h,1
|
| 410 |
+
or
|
| 411 |
+
Dtype1
|
| 412 |
+
4h,3 ) [23], in this context the high Tc superconductor monolayer FeSe is of interest, since it only has Fermi surfaces
|
| 413 |
+
near the M point [36]; CeRh2As2 which exhibits a field induced transition from an even parity to an odd-parity
|
| 414 |
+
superconducting state [7, 8] and has Fermi surfaces near the M point in space group 129 (classes Dtype1
|
| 415 |
+
4h,1
|
| 416 |
+
or Dtype1
|
| 417 |
+
4h,3 );
|
| 418 |
+
BiS2-based superconductors [22] which has superconductivity that survives to very high fields and which has electron
|
| 419 |
+
pockets near the X point in space group 129 (class Dtype1
|
| 420 |
+
2h,3 ); the odd-parity heavy fermion superconductor UPt3
|
| 421 |
+
[24] which has a pancake-like Fermi surface at kz = π/c in space group 193 (class Dtype1
|
| 422 |
+
6h
|
| 423 |
+
); and the ferromagnetic
|
| 424 |
+
superconductor UCoGe [25] with space group 62 and a Fermi surface near the T point (class Dtype1
|
| 425 |
+
2h,1 ).
|
| 426 |
+
For type 2 kp theories, the 4-fold degeneracy is sometimes already split into 2 at the TRIM point when SOC is
|
| 427 |
+
added, unlike what occurs for type 1 kp theories. This happens in classes Ctype2
|
| 428 |
+
2h,2
|
| 429 |
+
and Dtype2
|
| 430 |
+
2h,1 . For the other type 2
|
| 431 |
+
classes, this degeneracy at the TRIM point is not split. In these cases, an even number of Dirac lines pass through
|
| 432 |
+
the TRIM point. These Dirac lines lie in the nodal plane. Since I = τ0 for type 2, all terms in the Hamiltonian are
|
| 433 |
+
even parity, that is, unchanged under k → −k. One example where type 2 kp theories apply is in strain induced
|
| 434 |
+
superconductivity in RuO2[37, 38]. Without strain, RuO2 is thought to be a non-superconducting altermagnet [39].
|
| 435 |
+
When strain is applied, bands near the X-M-R-A Brillouin zone face are most strongly affected [37]. RuO2 has space
|
| 436 |
+
group 136 with the R and M points belonging to classes Dtype2
|
| 437 |
+
2h,4 , Dtype2
|
| 438 |
+
4h,2 , or Dtype2
|
| 439 |
+
4h,4 . Later we discuss the ferromagnetic
|
| 440 |
+
superconductor UCoGe with space group 62 [25]. In this example we highlight the role of 8-fold degenerate points
|
| 441 |
+
which exhibit some properties similar to that found for type 2 TRIM points.
|
| 442 |
+
Type 1 and type 2 kp Hamiltonians share some common features that play an important role in understanding
|
| 443 |
+
the properties of the superconducting states. The first is that the non-symmorphic symmetry dictates that these
|
| 444 |
+
Hamiltonians are best described as two-band systems with eigenenergies given by
|
| 445 |
+
E±(k) = ε0,k ±
|
| 446 |
+
�
|
| 447 |
+
t2
|
| 448 |
+
1,k + t2
|
| 449 |
+
α,k + |λk|2 = ε0,k ± εδ,k ,
|
| 450 |
+
(3)
|
| 451 |
+
where α is the type index in Eq. 2. The second feature is that both simplify dramatically on the nodal plane, where
|
| 452 |
+
only the coefficient functions ε0,k and λk·ˆn are non-vanishing (that is t1,k = t2,k = t3,k = |λk׈n| = 0). This property
|
| 453 |
+
is a direct consequence of the anomalous pseudopspin. The symmetry arguments discussed in the previous section
|
| 454 |
+
enforce this condition. In particular, for momenta on the nodal plane, the mirror operator through the nodal plane,
|
| 455 |
+
UM, takes the from UM = −iτβ(σ · ˆn). The requirement that these Hamiltonians obey time-reversal and inversion
|
| 456 |
+
symmetries and commute with UM lead to this simple form of the kp theories in the nodal plane. The final important
|
| 457 |
+
property of these kp Hamiltonians is that the SOC terms are often the leading order terms in the kp expansions, that
|
| 458 |
+
is, they appear with the lowest powers of ki. This is the case for classes Ctype2
|
| 459 |
+
2h,2 , Dtype1
|
| 460 |
+
2h,1 , Dtype2
|
| 461 |
+
2h,4 , Dtype1
|
| 462 |
+
4h,2 , Dtype1
|
| 463 |
+
4h,3 , and
|
| 464 |
+
Dtype1
|
| 465 |
+
4h,5 . This feature ensures that there exists a limit in which the SOC is the dominant single-particle interaction on
|
| 466 |
+
the Fermi surface and hence the unusual magnetic superconducting response we later discuss must exist.
|
| 467 |
+
IV.
|
| 468 |
+
SUPERCONDUCTING STATES
|
| 469 |
+
In the previous section, complete symmetry-dictated kp theories were found for anomalous pseudospin.
|
| 470 |
+
These
|
| 471 |
+
theories are complete in the sense that they include all operators of the form τiσj allowed by symmetry. For super-
|
| 472 |
+
conductivity, the orbital degree of freedom enlarges the corresponding space of possible gap functions compared to
|
| 473 |
+
the usual even-parity (pseudospin-singlet) ˜∆(k) = ψk(iσy) and odd-parity (pseudospin-triplet) ˜∆(k) = dk · σ(iσy)
|
| 474 |
+
|
| 475 |
+
6
|
| 476 |
+
Class
|
| 477 |
+
Symmetry
|
| 478 |
+
Hamiltonian
|
| 479 |
+
Space Group Momenta
|
| 480 |
+
Ctype1
|
| 481 |
+
2h,1
|
| 482 |
+
Ag + Bg + [Au] + Bu
|
| 483 |
+
H = ϵ0 + (t1xkx + t1zkz)kyτ1 + t2kyτ2
|
| 484 |
+
+ τ3[λxkyσx + (λyxkx + λyzkz)σy + λzkyσz]
|
| 485 |
+
11(C1, D1, E1, Z1), 14(Z1),
|
| 486 |
+
63(R1(yz)), 176(L1(yz))
|
| 487 |
+
Ctype2
|
| 488 |
+
2h,2
|
| 489 |
+
Ag + 2Bg + [Ag]
|
| 490 |
+
H = ϵ0 + (t1xkx + t1zkz)kyτ1 + (t3xkx + t3zkz)kyτ3
|
| 491 |
+
+τ2[(λxxkx + λxzkz)kyσx + λyσy + (λzxkx + λzzkz)kyσz]
|
| 492 |
+
14(D±
|
| 493 |
+
1 D±
|
| 494 |
+
2 ), 64(R±
|
| 495 |
+
1 R±
|
| 496 |
+
2 (yz))
|
| 497 |
+
Dtype1
|
| 498 |
+
2h,1
|
| 499 |
+
Ag + B1g + [Au] + B1u
|
| 500 |
+
H = ϵ0 + t1kxkyτ1 + t2kxkykzτ2
|
| 501 |
+
+ τ3[λxkyσx + λykxσy + λzkxkykzσz]
|
| 502 |
+
56(S1,2), 58(R1,2)
|
| 503 |
+
59(S1,2, R1,2), 62(T1,2(xz))
|
| 504 |
+
Dtype2
|
| 505 |
+
2h,2
|
| 506 |
+
Ag + 2B1g + [Ag]
|
| 507 |
+
H = ϵ0 + t1kxkyτ1 + t3kxkyτ3
|
| 508 |
+
+ τ2[λxkykzσx + λykxkzσy + λzkxkyσz]
|
| 509 |
+
55(S±
|
| 510 |
+
1 S±
|
| 511 |
+
2 , S±
|
| 512 |
+
3 S±
|
| 513 |
+
4 , R±
|
| 514 |
+
1 R±
|
| 515 |
+
2 , R±
|
| 516 |
+
3 R±
|
| 517 |
+
4 )
|
| 518 |
+
56(R±
|
| 519 |
+
1 R±
|
| 520 |
+
2 , R±
|
| 521 |
+
3 R±
|
| 522 |
+
4 ), 58(S±
|
| 523 |
+
1 S±
|
| 524 |
+
2 , S±
|
| 525 |
+
3 S±
|
| 526 |
+
4 )
|
| 527 |
+
Dtype1
|
| 528 |
+
2h,3
|
| 529 |
+
Ag + B2g + [B1u] + B3u
|
| 530 |
+
H = ϵ0 + t1kxkzτ1 + t2kzτ2
|
| 531 |
+
+ τ3[λxkxkykzσx + λykzσy + λzkyσz]
|
| 532 |
+
51(X1,2, S1,2, U1,2, R1,2), 52(R1,2(xy), Y1,2(xyz))
|
| 533 |
+
53(Z1,2(zyx), T1,2(zyx)), 54(X1,2, S1,2)
|
| 534 |
+
55(U1,2(yz), X1,2(yz), Y1,2(xyz), T1,2(xyz))
|
| 535 |
+
56(X1,2, Y1,2(xy))
|
| 536 |
+
57(S1,2(xyz), Y1,2(xyz), Z1,2(zyx), U1,2(zyx))
|
| 537 |
+
58(X1,2(yz), Y1,2(xyz))
|
| 538 |
+
59(X1,2, U1,2, T1,2(xy), Y1,2(xy)), 60(X1,2, Z1,2(zyx))
|
| 539 |
+
61(X1,2, Y1,2(xyz), Z1,2(zyx))
|
| 540 |
+
62(X1,2, Z1,2(xz), Y1,2(xyz))
|
| 541 |
+
63(T1,2(zyx), Z1,2(zyx)), 64(T1,2(zyx), Z1,2(zyx))
|
| 542 |
+
127(X1,2(xyz), R1,2(xyz)), 128(X1,2(xyz))
|
| 543 |
+
129(X1,2(xy), R1,2(xy)), 130(X1,2(xy))
|
| 544 |
+
135(X1,2(xyz), R1,2(xyz)), 136(X1,2(xyz))
|
| 545 |
+
137(R1,2(xy), X1,2(xy)), 138(X1,2(xy))
|
| 546 |
+
193(L1,2), 194(L1,2(xy))
|
| 547 |
+
205(X1,2(xyz))
|
| 548 |
+
Dtype2
|
| 549 |
+
2h,4
|
| 550 |
+
Ag + B1g + B3g + [B2g]
|
| 551 |
+
H = ϵ0 + t1kxkyτ1 + t3kykzτ3
|
| 552 |
+
+ τ2[λxkxkyσx + λyσy + λzkykzσz]
|
| 553 |
+
52(T ±
|
| 554 |
+
1 ), 53(U ±
|
| 555 |
+
1 (yz), R±
|
| 556 |
+
1 (yz))
|
| 557 |
+
58(T ±
|
| 558 |
+
1 , U ±
|
| 559 |
+
1 (xy)), 60(S±
|
| 560 |
+
1 (xy))
|
| 561 |
+
128(R±
|
| 562 |
+
1 ), 136(R±
|
| 563 |
+
1 )
|
| 564 |
+
Dtype1
|
| 565 |
+
4h,1
|
| 566 |
+
A1g + B2g + [A1u] + B2u
|
| 567 |
+
H = ϵ0 + t1kxkyτ1 + t2kxkykz(k2
|
| 568 |
+
x − k2
|
| 569 |
+
y)τ2
|
| 570 |
+
+ τ3[λx(kxσy + kyσx) + λ3kxkykzσz]
|
| 571 |
+
129(M1,2, A1,2), 130(M1,2)
|
| 572 |
+
136(A3,4), 137(M1,2), 138(M1,2)
|
| 573 |
+
Dtype2
|
| 574 |
+
4h,2
|
| 575 |
+
A1g + 2B2g + [A1g]
|
| 576 |
+
H = ϵ0 + t1kxkyτ1 + t3kxkyτ3
|
| 577 |
+
+ τ2[λx(kykzσx + kxkzσy) + λzkxky(k2
|
| 578 |
+
x − k2
|
| 579 |
+
y)σz]
|
| 580 |
+
127(M ±
|
| 581 |
+
1 M ±
|
| 582 |
+
4 , M ±
|
| 583 |
+
2 M ±
|
| 584 |
+
3 , A±
|
| 585 |
+
1 A±
|
| 586 |
+
4 , A±
|
| 587 |
+
2 A±
|
| 588 |
+
3 )
|
| 589 |
+
128(M ±
|
| 590 |
+
1 M ±
|
| 591 |
+
4 , M ±
|
| 592 |
+
2 M ±
|
| 593 |
+
3 ), 135(M ±
|
| 594 |
+
1 M ±
|
| 595 |
+
4 , M ±
|
| 596 |
+
2 M ±
|
| 597 |
+
3 )
|
| 598 |
+
136(M ±
|
| 599 |
+
1 M ±
|
| 600 |
+
4 , M ±
|
| 601 |
+
2 M ±
|
| 602 |
+
3 ), 138(A±
|
| 603 |
+
1 A±
|
| 604 |
+
4 , A±
|
| 605 |
+
2 A±
|
| 606 |
+
3 )
|
| 607 |
+
Dtype1
|
| 608 |
+
4h,3
|
| 609 |
+
A1g + B2g + [B1u] + A2u
|
| 610 |
+
H = ϵ0 + t1kxkyτ1 + t2kxkykzτ2
|
| 611 |
+
+ τ3[λx(kxσy − kyσx) + λzkxkykz(k2
|
| 612 |
+
x − k2
|
| 613 |
+
y)σz]
|
| 614 |
+
129(M3,4, A3,4), 130(M3,4)
|
| 615 |
+
136(A1,2), 137(M3,4), 138(M3,4)
|
| 616 |
+
Dtype2
|
| 617 |
+
4h,4
|
| 618 |
+
A1g + A2g + B2g + [B1g]
|
| 619 |
+
H = ϵ0 + t1kxky(k2
|
| 620 |
+
x − k2
|
| 621 |
+
y)τ1 + t3kxkyτ3
|
| 622 |
+
+ τ2[λx(kykzσx + kxkzσy) + λzkxkyσz]
|
| 623 |
+
127(M ±
|
| 624 |
+
5 , A±
|
| 625 |
+
5 ), 128(M ±
|
| 626 |
+
5 )
|
| 627 |
+
135(M ±
|
| 628 |
+
5 ), 136(M ±
|
| 629 |
+
5 ), 138(A±
|
| 630 |
+
5 )
|
| 631 |
+
Dtype1
|
| 632 |
+
4h,5
|
| 633 |
+
A1g + A2g + [B1u] + B2u
|
| 634 |
+
H = ϵ0 + t1kxky(k2
|
| 635 |
+
x − k2
|
| 636 |
+
y)τ1 + t2kxkykzτ2
|
| 637 |
+
+ τ3[λx(kxσy + kyσx) + λzkxkykzσz]
|
| 638 |
+
128(A1,2), 137(A1,2)
|
| 639 |
+
Ctype1
|
| 640 |
+
6h
|
| 641 |
+
Ag + Bg + [Au] + Bu
|
| 642 |
+
H = ϵ0 + (t1xkx(k2
|
| 643 |
+
x − 3k2
|
| 644 |
+
y) + t1yky(3k2
|
| 645 |
+
x − k2
|
| 646 |
+
y))kzτ1
|
| 647 |
+
+ t2kzτ2 + τ3[λxkz(2kxkyσx + (k2
|
| 648 |
+
x − k2
|
| 649 |
+
y)σy)
|
| 650 |
+
+ (λzxkx(k2
|
| 651 |
+
x − 3k2
|
| 652 |
+
y) + λzyky(3k2
|
| 653 |
+
x − k2
|
| 654 |
+
y))σz]
|
| 655 |
+
176(A1)
|
| 656 |
+
Dtype1
|
| 657 |
+
6h
|
| 658 |
+
A1g + B2g + [A2u] + B1u
|
| 659 |
+
H = ϵ0 + t1kxkz(k2
|
| 660 |
+
x − 3k2
|
| 661 |
+
y)τ1 + t2kzτ2
|
| 662 |
+
+τ3[λxkz(2kxkyσx + (k2
|
| 663 |
+
x − k2
|
| 664 |
+
y)σy) + λzky(3k2
|
| 665 |
+
x − k2
|
| 666 |
+
y)σz]
|
| 667 |
+
193(A1,2), 194(A1,2(xy))
|
| 668 |
+
TABLE II. Classification of kp theories. Subscript numbering of momenta represents different real representations on the same
|
| 669 |
+
momentum point, and a permutation of the axes is denoted by the cyclic notation. For example, 128(X1,2(xyz)) represents
|
| 670 |
+
that there are two representations X1 and X2 on X = (0, 1/2, 0) space group 128, and their local theory is obtained by
|
| 671 |
+
Dtype1
|
| 672 |
+
2h,3
|
| 673 |
+
Hamiltonian under x → y → z → x relabelling. The representation convention is following Bilbao Crystallographic
|
| 674 |
+
servera[32–34] except for the L point in 193 and 194.
|
| 675 |
+
a https://www.cryst.ehu.es/ Representations and Applications → Point and Space Groups → - Representations → SG Physically
|
| 676 |
+
irreducible representations given in a real basis
|
| 677 |
+
|
| 678 |
+
7
|
| 679 |
+
states that appear in single-band theories [30, 31]. Nevertheless, it is possible to understand some general properties
|
| 680 |
+
of the allowed pairing states.
|
| 681 |
+
To deduce the symmetry properties of possible pairing channels in this larger space of electronic states, it is useful
|
| 682 |
+
to define gap function differently than usual [40, 41]. In particular, we take
|
| 683 |
+
H =
|
| 684 |
+
�
|
| 685 |
+
i,j,k
|
| 686 |
+
Hij(k)c†
|
| 687 |
+
k,ick,j + 1
|
| 688 |
+
2
|
| 689 |
+
�
|
| 690 |
+
i,j,k
|
| 691 |
+
[∆ij(k)c†
|
| 692 |
+
k,i˜c†
|
| 693 |
+
k,j + h.c.].
|
| 694 |
+
(4)
|
| 695 |
+
where i, j are combined spin and orbital indices, h.c. means Hermitian conjugate, ck(c†
|
| 696 |
+
k) is the Fermionic spin-half
|
| 697 |
+
particle creation(annihilation) operator, and ˜ck(˜c†
|
| 698 |
+
k) is the time reversed partner of ck(c†
|
| 699 |
+
k). In the usual formulation ˜c†
|
| 700 |
+
k,j
|
| 701 |
+
is replaced c†
|
| 702 |
+
−k,j which leads a different gap function ˜∆ij and to difficulties in interpreting the symmetry transformation
|
| 703 |
+
properties of this gap function [40, 41]. For a single-band, these new gap functions become ∆(k) = ψkσ0 for even-
|
| 704 |
+
parity and ∆(k) = dk · σ for odd-parity. The key use of Eq. 4 is that the ∆ij(k) transform under rotations in the
|
| 705 |
+
same way as the Hij(k), allowing the symmetry properties of the gap functions to be deduced. The disadvantage of
|
| 706 |
+
this approach is that the antisymmetry of the gap functions that follows from the Pauli exclusion principle is not as
|
| 707 |
+
readily apparent compared to the usual formulation [40, 41].
|
| 708 |
+
Enforcing the Pauli exclusion principle leads to eight types of gap functions that generalize the pseudospin-singlet
|
| 709 |
+
and pseudospin-triplet of single-band gap functions. Six of these are simple generalizations of the single-band gap
|
| 710 |
+
functions: τiψk and τi(dk · σ) for i = 0, 1, and 3 where ψ−k = ψk and d−k = −dk. Two are new gap functions:
|
| 711 |
+
τ2(ψk · σ) and τ2dk with ψ−k = ψk and d−k = −dk. It is possible to determine whether these gaps functions are
|
| 712 |
+
either even or odd-parity and this depends upon whether the kp Hamiltonian is type 1 or type 2. These gap functions
|
| 713 |
+
and their parity symmetry are listed in Table III. Without further consideration of additional symmetries, the gap
|
| 714 |
+
function will in general be a linear combination all the even (or odd) parity gap functions.
|
| 715 |
+
To gain an understanding of the relative importance of these pairing states it is useful to project these gaps onto the
|
| 716 |
+
band basis. Such a projection is meaningful if the energy separation between the two bands is much larger than the gap
|
| 717 |
+
magnitude. For many of the kp Hamiltonians, due to the presence of Dirac lines, there will exist regions in momentum
|
| 718 |
+
space for which this condition is not satisfied. However, these regions represent a small portion of the Fermi surface
|
| 719 |
+
when the SOC energies are much larger than the gap energies, so that an examination of the projected gap is still
|
| 720 |
+
qualitatively useful in this limit. Provided the superconducting state does not break time-reversal symmetry, the
|
| 721 |
+
projected gap magnitude on band a can be found through [42]
|
| 722 |
+
˜∆2
|
| 723 |
+
± = Tr[|{Hδ, ∆}|2P±]
|
| 724 |
+
Tr[|Hδ|2]
|
| 725 |
+
.
|
| 726 |
+
(5)
|
| 727 |
+
where P±(k) = 1
|
| 728 |
+
2(1 ± Hδ(k)/εδ,k) which is a projection operator onto ± band by the energy dispersion Eq. 3. This
|
| 729 |
+
projected gap magnitude is related to superconducting fitness [43, 44]: if it vanishes, the corresponding gap function
|
| 730 |
+
is called unfit and will have a Tc = 0 in the weak coupling limit. Table III gives the projected gap functions for
|
| 731 |
+
the pairing states discussed above. The projection generally reduces the size of the gap, with the exception of the
|
| 732 |
+
usual even-parity τ0ψk state (interestingly, the odd-parity τ0(dk ·σ) state has a gap that is generically reduced). This
|
| 733 |
+
reduction strongly suppresses the Tc of the pairings state, where it enters exponentially in the weak-coupling limit.
|
| 734 |
+
We later examine the different kp classes to identify fit gap functions since the Tc of these states will be the largest,
|
| 735 |
+
given a fixed attractive interaction strength.
|
| 736 |
+
On the nodal plane, the projected gap functions, shown in Table III, simplify considerably since only ε0 and λk · ˆn
|
| 737 |
+
are non-zero. For both type 1 and type 2 Hamiltonians, this leads to two gap functions that are fully fit, that is,
|
| 738 |
+
not reduced by the projection. For type 1 Hamiltonians, these fully fit states are τ0ψk and τ3ψk. The state τ0ψk is
|
| 739 |
+
even-parity and the state τ3ψk is odd-parity and, as discussed later, these two states play an important role in the
|
| 740 |
+
appearance of a field-induced transition from even to odd parity superconductivity as observed in CeRh2As2. For
|
| 741 |
+
gap functions described by vectors, for example dk, the projected gaps on the nodal plane are of the form |dk · ˆn|2
|
| 742 |
+
or |dk × ˆn|2. This is qualitatively different than the usual odd-parity single-band gap, where the gap magnitude is
|
| 743 |
+
|dk|2. The latter requires that all three components of dk must vanish to have nodes. For the projected gaps on the
|
| 744 |
+
nodal planes, this requirement less stringent: only one or two components of dk need to vanish to have nodes. This
|
| 745 |
+
is closely related to the violation of Blount’s theorem on the nodal planes.
|
| 746 |
+
A.
|
| 747 |
+
Gap projection and the violation of Blount’s theorem
|
| 748 |
+
Blount’s theorem states that time-reversal symmetric odd-parity superconductors cannot have line nodes when SOC
|
| 749 |
+
is present [40]. Key to Blount’s theorem is the assumption that pseudsopsin shares the same symmetry properties
|
| 750 |
+
|
| 751 |
+
8
|
| 752 |
+
Type 1
|
| 753 |
+
Type 2
|
| 754 |
+
Gap function Inversion
|
| 755 |
+
Gap projection
|
| 756 |
+
Gap on nodal plane Inversion
|
| 757 |
+
Gap projection
|
| 758 |
+
Gap on nodal plane
|
| 759 |
+
τ0ψ
|
| 760 |
+
+
|
| 761 |
+
|ψ|2
|
| 762 |
+
|ψ|2
|
| 763 |
+
+
|
| 764 |
+
|ψ|2
|
| 765 |
+
|ψ|2
|
| 766 |
+
τ0(d · σ)
|
| 767 |
+
−
|
| 768 |
+
(t2
|
| 769 |
+
1 + t2
|
| 770 |
+
2)|d|2 + |d · λ|2
|
| 771 |
+
t2
|
| 772 |
+
1 + t2
|
| 773 |
+
2 + |λ|2
|
| 774 |
+
|d · ˆn|2
|
| 775 |
+
−
|
| 776 |
+
(t2
|
| 777 |
+
1 + t2
|
| 778 |
+
2)|d|2 + |d · λ|2
|
| 779 |
+
t2
|
| 780 |
+
1 + t2
|
| 781 |
+
2 + |λ|2
|
| 782 |
+
|d · ˆn|2
|
| 783 |
+
τ3ψ
|
| 784 |
+
−
|
| 785 |
+
|λ|2|ψ|2
|
| 786 |
+
t2
|
| 787 |
+
1 + t2
|
| 788 |
+
2 + |λ|2
|
| 789 |
+
|ψ|2
|
| 790 |
+
+
|
| 791 |
+
t2
|
| 792 |
+
3|ψ|2
|
| 793 |
+
t2
|
| 794 |
+
1 + t2
|
| 795 |
+
3 + |λ|2
|
| 796 |
+
0
|
| 797 |
+
τ3(d · σ)
|
| 798 |
+
+
|
| 799 |
+
|d · λ|2
|
| 800 |
+
t2
|
| 801 |
+
1 + t2
|
| 802 |
+
2 + |λ|2
|
| 803 |
+
|d · ˆn|2
|
| 804 |
+
−
|
| 805 |
+
t2
|
| 806 |
+
3|d|2 + |d × λ|2
|
| 807 |
+
t2
|
| 808 |
+
1 + t2
|
| 809 |
+
3 + |λ|2
|
| 810 |
+
|d × ˆn|2
|
| 811 |
+
τ1ψ
|
| 812 |
+
+
|
| 813 |
+
t2
|
| 814 |
+
1|ψ|2
|
| 815 |
+
t2
|
| 816 |
+
1 + t2
|
| 817 |
+
2 + |λ|2
|
| 818 |
+
0
|
| 819 |
+
+
|
| 820 |
+
t2
|
| 821 |
+
1|ψ|2
|
| 822 |
+
t2
|
| 823 |
+
1 + t2
|
| 824 |
+
3 + |λ|2
|
| 825 |
+
0
|
| 826 |
+
τ1(d · σ)
|
| 827 |
+
−
|
| 828 |
+
t2
|
| 829 |
+
1|d|2 + |d × λ|2
|
| 830 |
+
t2
|
| 831 |
+
1 + t2
|
| 832 |
+
2 + |λ|2
|
| 833 |
+
|d × ˆn|2
|
| 834 |
+
−
|
| 835 |
+
t2
|
| 836 |
+
1|d|2 + |d × λ|2
|
| 837 |
+
t2
|
| 838 |
+
1 + t2
|
| 839 |
+
2 + |λ|2
|
| 840 |
+
|d × ˆn|2
|
| 841 |
+
τ2d
|
| 842 |
+
+
|
| 843 |
+
t2
|
| 844 |
+
2|d|2
|
| 845 |
+
t2
|
| 846 |
+
1 + t2
|
| 847 |
+
2 + |λ|2
|
| 848 |
+
0
|
| 849 |
+
−
|
| 850 |
+
|λ|2|d|2
|
| 851 |
+
t2
|
| 852 |
+
1 + t2
|
| 853 |
+
3 + |λ|2
|
| 854 |
+
|d|2
|
| 855 |
+
τ2(ψ · σ)
|
| 856 |
+
−
|
| 857 |
+
t2
|
| 858 |
+
2|ψ|2 + |ψ × λ|2
|
| 859 |
+
t2
|
| 860 |
+
1 + t2
|
| 861 |
+
2 + |λ|2
|
| 862 |
+
|ψ × ˆn|2
|
| 863 |
+
+
|
| 864 |
+
|ψ · λ|2
|
| 865 |
+
t2
|
| 866 |
+
1 + t2
|
| 867 |
+
3 + |λ|2
|
| 868 |
+
|ψ · ˆn|2
|
| 869 |
+
TABLE III. Classification of allowed pairing states for the kp theories. For both type I and II TRIMs we give the symmetry
|
| 870 |
+
under inversion, the gap projection onto the Fermi surface, and the gap on the nodal plane. The momentum subscript indices
|
| 871 |
+
k of the coefficient functions are omitted here.
|
| 872 |
+
as usual spin [40]. While the violation of Blount’s theorem in non-symmorphic space groups has been demonstrated
|
| 873 |
+
earlier [18, 20, 21], here we present a simple proof that closely links anomalous pseudopsin to the violation of Blount’s
|
| 874 |
+
theorem.
|
| 875 |
+
The existence of anomalous pseudospin requires the presence of the translation mirror symmetry ˜
|
| 876 |
+
Mˆn. Consequently,
|
| 877 |
+
the gap function can be classified as even or odd under this symmetry. Momenta on the nodal plane are invariant
|
| 878 |
+
under ˜
|
| 879 |
+
Mˆn. Hence, for these momenta, U †
|
| 880 |
+
M∆(k)UM = ±∆(k) where the + (−) holds for a mirror-even (mirror-odd)
|
| 881 |
+
gap function. For our basis choice UM = −iτβ(σ · ˆn). Importantly, for both types the kp theories on the nodal plane
|
| 882 |
+
are given by H(k) = ε0,k +iUM(λk · ˆn). This defines the two bands E±(k) = ε0,k ±|λk · ˆn|. Written in the band basis,
|
| 883 |
+
we can divide the pairing potential into intraband and interband components. On the nodal plane the intraband gap
|
| 884 |
+
functions are explicitly given by
|
| 885 |
+
P±∆P± = 1
|
| 886 |
+
4(−UM ± i sgn(λk · ˆn)){UM, ∆} ,
|
| 887 |
+
(6)
|
| 888 |
+
while the interband components are
|
| 889 |
+
P±∆P∓ = 1
|
| 890 |
+
4(−UM ± i sgn(λk · ˆn))[UM, ∆]
|
| 891 |
+
(7)
|
| 892 |
+
We observe that since a mirror-even gap function satisfies [UM, ∆] = 0, the interband gap components must vanish
|
| 893 |
+
on the nodal plane, i.e. the pairing only involves particles from the same band. The general form of the BdG energy
|
| 894 |
+
dispersion relation is then
|
| 895 |
+
±′ �
|
| 896 |
+
(ε0,k ± |λk · ˆn|)2 + |∆±±|2 ,
|
| 897 |
+
(8)
|
| 898 |
+
where intraband gap magnitude |∆±±|2 =
|
| 899 |
+
1
|
| 900 |
+
4Tr[|P±∆P±|2] and ±′ is the particle-hole symmetry index which is
|
| 901 |
+
independent of band index ±. Since there is no requirement that |∆±±|2 = 0, line nodes are therefore not expected
|
| 902 |
+
on the nodal plane, but rather we should generically find two-gap behavior with different size gaps on the two bands.
|
| 903 |
+
In contrast, for the mirror-odd gap functions we have {UM, ∆} = 0, so there is no intraband pairing on the nodal
|
| 904 |
+
plane. The eigenenergies for this interband pairing state are then
|
| 905 |
+
±′ �
|
| 906 |
+
±|λk · ˆn| +
|
| 907 |
+
�
|
| 908 |
+
ϵ2
|
| 909 |
+
0,k + |∆±∓|2
|
| 910 |
+
�
|
| 911 |
+
,
|
| 912 |
+
(9)
|
| 913 |
+
where intraband gap magnitude |∆±∓|2 = 1
|
| 914 |
+
4Tr[|P±∆P∓|2]. The gap has line nodes provided |λk · ˆn|2 > |∆±∓|2. This
|
| 915 |
+
result depends only on the mirror-odd symmetry of the gap, and not on the parity symmetry. Since gaps which are
|
| 916 |
+
odd under both mirror and parity symmetry are allowed, this result shows that odd-parity gaps can have line nodes,
|
| 917 |
+
thus demonstrating a violation of Blount’s theorem.
|
| 918 |
+
|
| 919 |
+
9
|
| 920 |
+
The origin of these nodes due to purely interband pairing implies that the nodes are shifted off the Fermi surface
|
| 921 |
+
[45]. If the spin-orbit coupling is too weak, i.e. |λk · ˆn|2 < |∆±∓|2, the nodes can annihilate with each other and are
|
| 922 |
+
absent. This possibility has been discussed in the context of monolayer FeSe [46] and UPt3 [47]. The analysis above
|
| 923 |
+
is valid even when Dirac lines pass through the TRIM points, as is the case in most of the derived kp theories. On
|
| 924 |
+
the Dirac lines, the condition |λk · ˆn|2 < |∆±∓|2 must occur and the spectrum is therefore gapped. In the Appendix
|
| 925 |
+
A we present exact expressions for the energy eigenstates on the nodal plane for all possible combinations of mirror
|
| 926 |
+
and parity gap symmetries.
|
| 927 |
+
B.
|
| 928 |
+
Unconventional pairing states from electron-phonon interactions
|
| 929 |
+
To highlight how pairing of anomalous pseudospin can differ from the single-band superconductivity, it is instructive
|
| 930 |
+
to consider an attractive U Hubbard model. Such a model is often used to capture the physics of electron-phonon
|
| 931 |
+
driven s-wave superconductivity in single-band models. Here we show that this coupling also allows unconventional
|
| 932 |
+
pairings states. In particular, odd-parity states in type 1 kp Hamiltonians. Such a state has recently likley been
|
| 933 |
+
observed in CeRh2As2.
|
| 934 |
+
Here we consider a local Hubbard-U attraction on each site of the lattice and do not consider any longer range
|
| 935 |
+
Coulomb interactions. These sites are defined by their Wyckoff positions. Importantly, for the non-symmorphic groups
|
| 936 |
+
we have considered here, each Wyckoff position has a multiplicity greater than one. Here we limit our discussion to
|
| 937 |
+
Wyckoff positions with multiplicity two, which implies that there are two inequivalent atoms per unit cell.
|
| 938 |
+
An
|
| 939 |
+
attractive U on these sites stabilizes a local spin-singlet Cooper pair. Since there are two sites per unit cell this
|
| 940 |
+
implies that there are two stable superconducting degrees of freedom per unit cell. These two superconducting states
|
| 941 |
+
can be constructed by setting the phase of Cooper pair wavefunction on each site to be the same or opposite. Since
|
| 942 |
+
only local interactions are included, both these two states will have the same pairing interaction. The in-phase state
|
| 943 |
+
is a usual s-wave τ0ψk state. Identifying the other, out of phase, superconducting state requires an understanding of
|
| 944 |
+
the relationship between the basis states for the kp Hamiltonians and orbitals located at the Wyckoff positions. In
|
| 945 |
+
general, this will depend on the specific orbitals included in the theory. However, the condition that the resultant
|
| 946 |
+
pairing states must be spin-singlet and local in space (hence momentum independent) allows only two possibilities
|
| 947 |
+
for this additional pairing state: it is either a τ1ψk or a τ3ψk pairing state. Of these states, for two reasons, the τ3ψk
|
| 948 |
+
state for type 1 Hamiltonains is of particular interest. The first reason is that this state is odd-parity and therefore
|
| 949 |
+
offers a route towards topological superconductivity [48, 49]. The second reason is that of the four possible states
|
| 950 |
+
(τ1ψk or τ3ψk for type 1 or type 2 Hamiltonians), this is the only state that is fully fit on the nodal plane (as can be
|
| 951 |
+
seen in Table III, the other three states have zero gap projection on the nodal plane). This implies that for type 1
|
| 952 |
+
Hamiltonians, the odd-parity τ3ψk and the s-wave τ0ψk states can have comparable Tc since they both have the same
|
| 953 |
+
pairing interaction. In practice, the τ3ψk state will have a lower Tc than the τ0ψk state since it will not be fully fit away
|
| 954 |
+
from the nodal plane. Table III reveals that this projection is given by the ratio |λk|2/(t2
|
| 955 |
+
1,k +t2
|
| 956 |
+
2,k +|λk|2). For classes
|
| 957 |
+
Dtype1
|
| 958 |
+
2h,1 , Dtype1
|
| 959 |
+
4h,1 , Dtype1
|
| 960 |
+
4h,3 , and Dtype1
|
| 961 |
+
4h,5 , this ratio is nearly one since the SOC terms are the largest in the kp Hamiltonian.
|
| 962 |
+
This suggests that these classes offer a promising route towards stabilizing odd-parity superconductivity. We stress
|
| 963 |
+
that because |λk|2/(t2
|
| 964 |
+
1,k + t2
|
| 965 |
+
2,k + |λk|2) is slightly less than one, the Tc of the odd-parity τ3ψk will be comparable but
|
| 966 |
+
less than that of the usual s-wave state. However, as we discuss later, the τ3ψk state can be stabilized over the usual
|
| 967 |
+
s-wave τ0ψk state in an applied field. The identification of classes Dtype1
|
| 968 |
+
2h,1 , Dtype1
|
| 969 |
+
4h,1 , Dtype1
|
| 970 |
+
4h,3 , and Dtype1
|
| 971 |
+
4h,5
|
| 972 |
+
that maximize
|
| 973 |
+
the Tc of odd-parity pairing from electron-phonon interactions allows the earlier theory for a field induced even to
|
| 974 |
+
odd parity transition CeRh2As2 [9] (with space group 129) to be generalized to many other space groups.
|
| 975 |
+
While the above odd-parity state is only relevant for type 1 Hamiltonians, for type 2 Hamiltonians, the usual s-wave
|
| 976 |
+
interaction can develop a novel structure. In particular, for the classes Ctype2
|
| 977 |
+
2h,2
|
| 978 |
+
and Dtype2
|
| 979 |
+
2h,4 , Table II shows that the
|
| 980 |
+
state τ2σy is maximally fit and has s-wave symmetry. Consequently, this state will admix with the usual s-wave τ0ψ
|
| 981 |
+
state. The theory describing this admixture formally resembles that of a Hund pairing mechanism proposed to explain
|
| 982 |
+
the appearance of nodes in the likely s-wave superconductor KFe2As2 [50]. The results of this analysis and a follow
|
| 983 |
+
up analysis [51] allows some of the properties of this state to be understood. An important conclusion of these works
|
| 984 |
+
is that an s-wave superconducting state can emerge even when pairing for the usual s-wave state is repulsive (that is
|
| 985 |
+
for the Hubbard U > 0). This holds if two conditions are met: the effective interaction for the τ2σy state is attractive
|
| 986 |
+
(to first approximation, this effective interaction does not depend upon U [50, 51]) and the two bands that emerge in
|
| 987 |
+
the kp theory both cross the chemical potential. This s-wave pairing state naturally lead to nodes.
|
| 988 |
+
|
| 989 |
+
10
|
| 990 |
+
V.
|
| 991 |
+
ROLE OF MAGNETIC FIELDS
|
| 992 |
+
The role of anomalous pseudopsin is perhaps most unusual in response to magnetic fields. In many superconductors,
|
| 993 |
+
there has been a push to drive up the magnetic field at which these are operational. Ising superconductors are one
|
| 994 |
+
class of materials for which this has been successful, the in-plane critical field far surpasses the Pauli field, opening
|
| 995 |
+
the door to applications [52]. Another relevant example is the field induced transition from an even parity to an
|
| 996 |
+
odd-parity state observed in CeRh2As2 [7, 8].
|
| 997 |
+
Recently, a powerful method to examine the response of superconductors to time-reversal symmetry-breaking fields
|
| 998 |
+
has been developed by the projection onto the band-basis[42]. The form of the kp theories we have developed allows
|
| 999 |
+
for the direct application of this projection method. The response of superconductivity to time-reversal symmetry-
|
| 1000 |
+
breaking is described by a time-reversal symmetry-breaking interaction Hh(k). A common form of TRSB Hamiltonian,
|
| 1001 |
+
and the one we emphasize here, is the Zeeman field interaction term, which is represented by
|
| 1002 |
+
Hh(k) = τ0(h · σ) ,
|
| 1003 |
+
(10)
|
| 1004 |
+
where h is a magnetic field parameter in the system. We note that our qualitative results apply to a broader range of
|
| 1005 |
+
TRSB Hamiltonians. In particular, this is true if the TRSB field shares the same symmetry properties as a Zeeman
|
| 1006 |
+
field (for example if Hh(k) describes the coupling between orbital angular momentum and an applied field).
|
| 1007 |
+
The theory introduces two parameters that quantify the response of superconductivity to time-reversal symmetry-
|
| 1008 |
+
breaking. The first parameter is an effective g-factor given by
|
| 1009 |
+
˜g2
|
| 1010 |
+
±,k,h = 2Tr[|{Hδ, Hh}|2P±]
|
| 1011 |
+
Tr[|Hδ|2]Tr[|Hh|2] .
|
| 1012 |
+
(11)
|
| 1013 |
+
The second parameter is the field-fitness, given by
|
| 1014 |
+
˜F±,k,h =
|
| 1015 |
+
Tr[|{{Hδ, ˜∆}, {Hδ, Hh}}|2P±]
|
| 1016 |
+
2Tr[|{Hδ, Hh}|2P±]Tr[|{Hδ, ˜∆}|2P±]
|
| 1017 |
+
.
|
| 1018 |
+
(12)
|
| 1019 |
+
This field-fitness function ranges in value from zero to one. When the field-fitness is zero, the superconducting state
|
| 1020 |
+
is not suppressed by the time-reversal symmetry breaking perturbation. With these two parameters, the response of
|
| 1021 |
+
superconductivity to applied fields and the temperature dependence of magnetic susceptibility in the superconducting
|
| 1022 |
+
state can be determined. With the choice of the time-reversal symmetry-breaking field as the Zeeman field, Eq. 10,
|
| 1023 |
+
one finds
|
| 1024 |
+
˜g2
|
| 1025 |
+
±,k,h =
|
| 1026 |
+
t2
|
| 1027 |
+
1,k + t2
|
| 1028 |
+
α,k + (λk · ˆh)2
|
| 1029 |
+
t2
|
| 1030 |
+
1,k + t2
|
| 1031 |
+
α,k + λ2
|
| 1032 |
+
k
|
| 1033 |
+
(13)
|
| 1034 |
+
where α is a type index that is 2 for type 1 and 3 for type 2. This agrees with results in [53] derived for Hamiltonians
|
| 1035 |
+
that resemble type 1 Hamiltonians. We note that the band index ± and the magnitude of field h in the field-fitness
|
| 1036 |
+
and the g-factor do not change the outcome, thus they will be omitted in the subsequent sections and they will be
|
| 1037 |
+
denoted by ˜F 2
|
| 1038 |
+
k,ˆh and ˜g2
|
| 1039 |
+
k,ˆh.
|
| 1040 |
+
A.
|
| 1041 |
+
Even parity superconductors
|
| 1042 |
+
It can be shown that the field-fitness parameter in Eq. 12 is 1 for all even parity states. Consequently, the magnetic
|
| 1043 |
+
response is governed solely by the generalized g-factor given in Eq. 13. For momenta on the nodal plane, where
|
| 1044 |
+
t1,k = t2,k = t3,k = λk × ˆn = 0, the g-factor vanishes for magnetic fields orthogonal to ˆn. This is a direct consequence
|
| 1045 |
+
of the anomalous pseudospin, since the symmetries of the Pauli matrices formed from anomalous pseudospin do
|
| 1046 |
+
not allow any coupling to a Zeeman field perpendicular to ˆn. An immediate consequence is that superconductivity
|
| 1047 |
+
survives to much stronger fields than expected for these field orientations. However, momenta that do not sit on
|
| 1048 |
+
the nodal plane also contribute to the superconducting state and their contribution needs to be included as well. To
|
| 1049 |
+
quantify this, we solve for the Pauli limiting field within weak coupling theory at T = 0. For an isotropic s-wave
|
| 1050 |
+
superconductor, we find
|
| 1051 |
+
ln
|
| 1052 |
+
hP,ˆh
|
| 1053 |
+
h0
|
| 1054 |
+
= −⟨ln |˜gk,ˆh|⟩k
|
| 1055 |
+
(14)
|
| 1056 |
+
|
| 1057 |
+
11
|
| 1058 |
+
-1.0
|
| 1059 |
+
-0.5
|
| 1060 |
+
0.0
|
| 1061 |
+
0.5
|
| 1062 |
+
1.0
|
| 1063 |
+
Γ
|
| 1064 |
+
X
|
| 1065 |
+
M
|
| 1066 |
+
(a)
|
| 1067 |
+
Energy (eV)
|
| 1068 |
+
-1.0
|
| 1069 |
+
-0.5
|
| 1070 |
+
0.0
|
| 1071 |
+
0.5
|
| 1072 |
+
1.0
|
| 1073 |
+
Γ
|
| 1074 |
+
X
|
| 1075 |
+
M
|
| 1076 |
+
(b)
|
| 1077 |
+
FIG. 2.
|
| 1078 |
+
DFT bands of BiS2 near the X point (a) without and (b) with the SOC. The bands highlighted in the box are our
|
| 1079 |
+
focus.
|
| 1080 |
+
for field along direction ˆh, where h0 is the usual Pauli limiting field (found when the SOC is ignored), and ⟨·⟩k means
|
| 1081 |
+
an average over the Fermi surface weighted by the density of states. Below, we apply this formula to BiS2-based
|
| 1082 |
+
superconductors. We note that the spin susceptibility in the superconducting state can also be expressed using ˜gk,ˆh
|
| 1083 |
+
as well [42], and this shows that a non-zero spin susceptibility is predicted at zero temperature whenever the critical
|
| 1084 |
+
field surpasses h0.
|
| 1085 |
+
1.
|
| 1086 |
+
Enhanced in plane field Pauli for BiS2-based superconductors
|
| 1087 |
+
Here we turn to recent experimental results on BiS2-based superconductors [22, 54]. This material has the tetragonal
|
| 1088 |
+
space group 129 (P4/nmm) and it exhibits two electron pockets about the two equivalent X points [55]. When S is
|
| 1089 |
+
replaced with Se, it has been observed that the in-plane upper critical field surpasses the usual Pauli limiting field by
|
| 1090 |
+
a factor of 7 [54]. While it has been suggested that the local non-centrosymmetric structure is the source of this large
|
| 1091 |
+
critical field [54], there has been no quantitative calculation for this. Here we apply Eq. 14 to the kp theory at the
|
| 1092 |
+
X-point to see if it is possible to account for this large critical field. The X point in space group 129 belongs to class
|
| 1093 |
+
Dtype1
|
| 1094 |
+
2h,3 .For BiS2, the dispersion is known to be strongly two-dimensional (2D) [22, 55] so we consider the kp theory in
|
| 1095 |
+
the 2D limit. This kp theory is
|
| 1096 |
+
HBiS2 = ¯h2
|
| 1097 |
+
2m
|
| 1098 |
+
�
|
| 1099 |
+
k2
|
| 1100 |
+
x + γ2k2
|
| 1101 |
+
y
|
| 1102 |
+
�
|
| 1103 |
+
− µ + t2kyτ2 + λxkyτ3σx + λykxτ3σy.
|
| 1104 |
+
(15)
|
| 1105 |
+
Assuming s-wave superconductivity and accounting for the two equivalent pockets yields
|
| 1106 |
+
hP,ˆx = h0
|
| 1107 |
+
�
|
| 1108 |
+
t2
|
| 1109 |
+
2 + λ2x + |γλy|
|
| 1110 |
+
�
|
| 1111 |
+
|t2| + |γλy|(t2
|
| 1112 |
+
2 + λ2x)1/4
|
| 1113 |
+
(16)
|
| 1114 |
+
where h0 is the usual Pauli limiting field. For simplicity we consider γ = 1 in the following. Eq. 16 reveals that a large
|
| 1115 |
+
enhancement of the limiting field is possible and requires two conditions. The first is that t2 << λx, λy and second is
|
| 1116 |
+
that these is substantial anisotropy in λx and λy. To understand if these conditions are reasonable, we have carried
|
| 1117 |
+
out density-functional theory (DFT) calculations on LaO1/2F1/2BiS2 with and without SOC. DFT calculations for
|
| 1118 |
+
LaO1/2F1/2BiS2 were carried out by the full-potential linearized augmented plane wave method [56]. The Perdew-
|
| 1119 |
+
Burke-Ernzerhof form of the exchange correlation functional [57], wave function and potential energy cutoffs of 14 and
|
| 1120 |
+
200 Ry, respectively, muffin-tin sphere radii of 1.15, 1.2, 1.3, 1.0 ˚A for Bi, S, La, O atoms, respectively, the experimental
|
| 1121 |
+
lattice parameters [58], and an 15 × 15 × 5 k-point mesh were employed for the self-consistent field calculation. The
|
| 1122 |
+
virtual crystal approximation was used by setting the nuclear charge Z = 8.5 at O(F) sites. The resultant bands are
|
| 1123 |
+
shown in Fig. 2. Without SOC, the band splitting along Γ to X yields an estimate for t2. When SOC is present, the
|
| 1124 |
+
band splitting along the X to M yields λy and the band splitting along Γ to X yields
|
| 1125 |
+
�
|
| 1126 |
+
λ2x + t2
|
| 1127 |
+
2. The DFT calculated
|
| 1128 |
+
splittings suggest that λx is the largest parameter by a factor of 3-4, while t2 and λy are comparable. This suggests
|
| 1129 |
+
that the conditions to achieve a large critical field are realistic in BiS2-based superconductors. Note that the largest
|
| 1130 |
+
|
| 1131 |
+
12
|
| 1132 |
+
observed Pauli fields are found when the S is substituted by Se [54]. Se has a larger SOC than S, suggesting that the
|
| 1133 |
+
λi parameters will be increased from what we estimate here. This is currently under exploration.
|
| 1134 |
+
It is worthwhile contrasting the above theory with that for Fe-based materials in which electron pockets exist near
|
| 1135 |
+
the M point of space group 129. The M-point is described by class Dtype1
|
| 1136 |
+
4h,1 . In this case, an analysis similar to to
|
| 1137 |
+
BiS2 gives an enhancement of only
|
| 1138 |
+
√
|
| 1139 |
+
2 of the Pauli field for in-plane fields. For c-axis fields, this class implies a
|
| 1140 |
+
significantly enhanced Pauli limiting field. These results are consistent with experimental fits to upper critical fields
|
| 1141 |
+
in Fe-based superconductors that reveal that the upper critical field for in-plane fields are Pauli suppressed while those
|
| 1142 |
+
for field along the c-axis are not [59]. The contrast bewteen Fe-based materials and BiS2-based materials highlights the
|
| 1143 |
+
importance of the different classes. In particular, the lower orthorhombic symmetry of the X point allows protection
|
| 1144 |
+
to in-plane fields not afforded to the M point, where the theory is strongly constrained by tetragonal symmetry.
|
| 1145 |
+
2.
|
| 1146 |
+
Pair density wave states
|
| 1147 |
+
In BCS theory, a spin-singlet superconductor is suppressed by the Zeeman effect.
|
| 1148 |
+
Under a sufficiently strong
|
| 1149 |
+
magnetic field, the pairing susceptibility can be peaked at non-zero Cooper pair momenta, leading to a pair density
|
| 1150 |
+
wave or FFLO state [60–62]. A schematic phase diagram for a centrosymmetric system is shown in the left panel
|
| 1151 |
+
of Fig.3. The typically first order phase transition (double solid line) between the uniform and FFLO state ends at
|
| 1152 |
+
a bicritical point (Tb, Hb), i.e. FFLO state only exists for T < Tb. A weak-coupling calculation reveals that for the
|
| 1153 |
+
usual FFLO phase, Tb/Tc = 0.56
|
| 1154 |
+
It is known that for locally non-centrosymmetric superconductors, FFLO-like phases can appear at lower fields Hb
|
| 1155 |
+
and higher temperatures Tb than the usual FFLO-like instability [5]. This is closely linked to the symmetry required
|
| 1156 |
+
instability to a pair density wave state for non-centrosymmetric superconductors when a field is applied [2]. For a
|
| 1157 |
+
non-centrosymmetric system under magnetic field, both inversion and time-reversal symmetry are broken. As a result,
|
| 1158 |
+
the pairing susceptibility is generically peaked at non-zero momentum and Tb = Tc. For locally non-centrosymmtric
|
| 1159 |
+
superconductors, inversion symmetry is locally broken on each sublattice. In an extreme case, if the two sublattices
|
| 1160 |
+
are decoupled, then the system effectively becomes non-centrosymmetric, and under a small magnetic field, an FFLO
|
| 1161 |
+
state can exists right below the zero-field superconducting Tc. However, these sublattices are generically coupled so
|
| 1162 |
+
that Tb = Tc is not realized in practice. Here we show that for type 1 Hamiltonians, FFLO-like states can in principle
|
| 1163 |
+
exist up to Tb = Tc.
|
| 1164 |
+
FIG. 3. Schematic phase diagram for a spin-singlet superconductor under Zeeman effect. Single solid lines denote continuous
|
| 1165 |
+
phase transitions while double solid lines denote first-order phase transitions.
|
| 1166 |
+
To show this, we consider the 2D version of class Dtype1
|
| 1167 |
+
4h,1
|
| 1168 |
+
and use the pairing susceptibility to calculate Tb and Hb.
|
| 1169 |
+
In 2D, class Dtype1
|
| 1170 |
+
4h,1
|
| 1171 |
+
has the following normal state Hamiltonian:
|
| 1172 |
+
HD4h,1 = ¯h2
|
| 1173 |
+
2m(k2
|
| 1174 |
+
x + k2
|
| 1175 |
+
y) − µ + t1kxkyτ1 + λxτ3(kyσx + kxσy) + Hxσx
|
| 1176 |
+
(17)
|
| 1177 |
+
λx denotes the strength of the local inversion symmetry breaking (local Rashba SOC), while t1 is the inter-sublattice
|
| 1178 |
+
|
| 1179 |
+
13
|
| 1180 |
+
coupling. The pairing susceptibility for an s-wave state with gap function τ0ψk is
|
| 1181 |
+
χpairing(Q) = − 1
|
| 1182 |
+
β
|
| 1183 |
+
�
|
| 1184 |
+
ωn
|
| 1185 |
+
�
|
| 1186 |
+
(p,p+Q)∈FS
|
| 1187 |
+
Tr [G0(Q + p, ωn)G0(p, ωn)] ,
|
| 1188 |
+
(18)
|
| 1189 |
+
where G0 is the normal state Green’s function written in Nambu space. The FFLO state is favored, if the pairing
|
| 1190 |
+
susceptibility is peaked at non-zero Q. We examine the position of the bicritical point (Tb, Hb), as a function of
|
| 1191 |
+
λx/(t1kF ). We use the following two equations to locate the bicritical point: (1) The bicritical point lies on the BCS
|
| 1192 |
+
transition for the uniform superconductivity. (2) The bicritical point is a continuous phase transition between uniform
|
| 1193 |
+
and FFLO superconductivity, where ∇2
|
| 1194 |
+
Qχpairing(Q) = 0. The result is in Fig. 4. 1000 × 1000 points are sampled in
|
| 1195 |
+
the 2D Brillouin zone. Other parameters are t1 = 0.2, t = µ = 1. An energy cutoff of Ec = 0.1 is applied to determine
|
| 1196 |
+
the position of the Fermi surface.
|
| 1197 |
+
0
|
| 1198 |
+
0.02
|
| 1199 |
+
0.04
|
| 1200 |
+
0.06
|
| 1201 |
+
0.08
|
| 1202 |
+
0.1
|
| 1203 |
+
x/t 1/kF
|
| 1204 |
+
0
|
| 1205 |
+
0.2
|
| 1206 |
+
0.4
|
| 1207 |
+
0.6
|
| 1208 |
+
0.8
|
| 1209 |
+
1
|
| 1210 |
+
Tb/Tc
|
| 1211 |
+
0
|
| 1212 |
+
0.02
|
| 1213 |
+
0.04
|
| 1214 |
+
0.06
|
| 1215 |
+
0.08
|
| 1216 |
+
0.1
|
| 1217 |
+
x/t 1/kF
|
| 1218 |
+
0
|
| 1219 |
+
0.2
|
| 1220 |
+
0.4
|
| 1221 |
+
0.6
|
| 1222 |
+
0.8
|
| 1223 |
+
1
|
| 1224 |
+
Hb/Hb( x=0)
|
| 1225 |
+
FIG. 4. The position of the bicritical point (Tb, Hb), as a function of λx/kF t1.
|
| 1226 |
+
These results show that for zero λx/kF t1, a usual FFLO phase is found (that is Tb/Tc ≈ 0.56). As the SOC λx
|
| 1227 |
+
increases or equivalently, as kF decreases, Tb increases and approaches the zero-field critical temperature. In the
|
| 1228 |
+
meantime, Hb monotonically decreases.
|
| 1229 |
+
We have shown that the FFLO phase can exist up to Tb = Tc for a 2D version of class Dtype1
|
| 1230 |
+
4h,1 . Key is that SOC is
|
| 1231 |
+
the leading order term in the kp theory and this is also the case for other type 1 Hamiltonians. Hence the optimal
|
| 1232 |
+
conditions for an enhanced FFLO phase to occur are when fields are applied in-plane (perpendicular to the c-axis)
|
| 1233 |
+
for classes Dtype1
|
| 1234 |
+
2h,1 , Dtype1
|
| 1235 |
+
4h,1 , Dtype1
|
| 1236 |
+
4h,3 , and Dtype1
|
| 1237 |
+
4h,5 .
|
| 1238 |
+
B.
|
| 1239 |
+
Odd-parity superconductors
|
| 1240 |
+
For odd parity superconductors, the field fitness parameter ˜Fk,ˆh can become less than 1 [42]. Of particular interest
|
| 1241 |
+
is when ˜Fk,ˆh = 0 since this implies that Tc is unchanged by the time-reversal symmetry breaking field (this is
|
| 1242 |
+
independent of the effective g-factor) [42]. For anomalous pseudospin this possibility leads to two consequences not
|
| 1243 |
+
expected for spin-triplet states made from usual spin-1/2 fermions. The first is a field induced transition from an
|
| 1244 |
+
even to an odd parity state. The second is that, in spite of the presence of strong SOC, the superconducting state is
|
| 1245 |
+
immune to magnetic fields for all field orientations. We discuss these each in turn.
|
| 1246 |
+
1.
|
| 1247 |
+
Field induced even to odd parity transitions
|
| 1248 |
+
In CeRh2As2, a field induced even to odd parity transition has been observed for the field oriented along the c-axis
|
| 1249 |
+
in this tetragonal material [7, 8]. Earlier, we argued that this was due the anomalous pseudospin that arises on the
|
| 1250 |
+
Brillouin zone faces in the non-symmorphic space group P4/nmm [9]. Here we show how this can be generalized
|
| 1251 |
+
to other space groups that admit type 1 kp theories and determine which classes are optimal for observing such a
|
| 1252 |
+
transition. As discussed in Section IV C, an attractive electron-phonon like interaction gives rise to both both a usual
|
| 1253 |
+
|
| 1254 |
+
14
|
| 1255 |
+
s-wave τ0ψk state and an odd-parity τ3ψk state. These two states have the same pairing interaction, but the gap
|
| 1256 |
+
projected onto the band basis is generally smaller for the τ3ψk state than for the τ0ψk state, implying that τ0ψk state
|
| 1257 |
+
has the higher Tc. For the type 1 classes Dtype1
|
| 1258 |
+
2h,1 , Dtype1
|
| 1259 |
+
4h,1 , Dtype1
|
| 1260 |
+
4h,3 , and Dtype1
|
| 1261 |
+
4h,5 , anomalous pseudospin leads to Tc’s that
|
| 1262 |
+
are nearly the same for the even τ0ψ and odd-parity τ3ψ states. These classes are therefore promising for observing
|
| 1263 |
+
a field induced transition from an even-parity to an odd-parity state.
|
| 1264 |
+
To determine if a such a field induced transition occurs we compute ˜Fk,ˆh for a pairing state ˜∆ = τ3. We find for
|
| 1265 |
+
type 1 kp theories
|
| 1266 |
+
˜Fk,ˆh =
|
| 1267 |
+
(ˆh · λk)2(t2
|
| 1268 |
+
1,k + t2
|
| 1269 |
+
2,k + |λk|2)
|
| 1270 |
+
|λk|2[ˆh2(t2
|
| 1271 |
+
1,k + t2
|
| 1272 |
+
2,k) + (ˆh · λk)2]
|
| 1273 |
+
.
|
| 1274 |
+
(19)
|
| 1275 |
+
Notice if ˆh · λk = 0, then ˜Fk,ˆh = 0 which maximizes Tc. To determine the field orientations for which ˜Fk,ˆh = 0, we
|
| 1276 |
+
examine the form of λk in the type 1 classes discussed above. In all these classes, the λz,k component appears with a
|
| 1277 |
+
higher power of momenta than the other components. Consequently, the field should be applied along the ˆz direction.
|
| 1278 |
+
As an example, consider the class Dtype1
|
| 1279 |
+
4h,3 . Here λz,k ∝ kxkykz(k2
|
| 1280 |
+
x − k2
|
| 1281 |
+
y) while λx,k ∝ ky and λy,k ∝ ky. In this case
|
| 1282 |
+
λk will be in-plane to an excellent approximation, and an even to odd-parity transition can be expected for the field
|
| 1283 |
+
along the c-axis. Consequently, classes Dtype1
|
| 1284 |
+
2h,1 , Dtype1
|
| 1285 |
+
4h,1 , Dtype1
|
| 1286 |
+
4h,3 , and Dtype1
|
| 1287 |
+
4h,5
|
| 1288 |
+
and, hence, space groups 56, 58, 59, 62,
|
| 1289 |
+
128, 129, 130, 136, 137, and 138 are promising for realizing a field-induced even to odd parity transition.
|
| 1290 |
+
2.
|
| 1291 |
+
Field immune odd-parity superconductivity
|
| 1292 |
+
For a conventional spin-triplet superconductor (with ∆ = dk · σ) formed from usual spin-1/2 pseudospin, SOC
|
| 1293 |
+
typically pins the direction of the vector dk. If the applied field is perpendicular to dk, that is if dk · ˆh = 0, then the
|
| 1294 |
+
Tc for this field orientation is unchanged [63–65]. Since there exists at least one field direction for which dk · ˆh ̸= 0, it
|
| 1295 |
+
is not expected that usual spin-triplet superconductors are immune to fields applied in all directions. For anomalous
|
| 1296 |
+
pseudopsin, this is not the case, it is possible for an odd-parity state to be robust against suppression for arbitrarily
|
| 1297 |
+
oriented magnetic fields. To show how this is possible, we calculate ˜Fk,ˆh for ∆ = τ0(dk · σ) for type 1 kp theories,
|
| 1298 |
+
this yields
|
| 1299 |
+
˜Fk,ˆh =
|
| 1300 |
+
[(t2
|
| 1301 |
+
1,k + t2
|
| 1302 |
+
2,k)dk · ˆh + (dk · λk)(λk · ˆh)]2
|
| 1303 |
+
[(t2
|
| 1304 |
+
1,k + t2
|
| 1305 |
+
2,k)ˆh2 + (λk · ˆh)2][(t2
|
| 1306 |
+
1,k + t2
|
| 1307 |
+
2,k)|dk|2 + (dk · λk)2]
|
| 1308 |
+
.
|
| 1309 |
+
(20)
|
| 1310 |
+
We first note that near the nodal plane, the effective g-factor is small for in-plane fields ˆn·⃗h = 0, so that for these field
|
| 1311 |
+
orientations superconductivity is not strongly suppressed (this is true for both even and odd-parity superconducting
|
| 1312 |
+
states). Hence, to show that an odd-parity state survives for all field orientations, we need to show that ˜Fk,ˆh ≈ 0
|
| 1313 |
+
for a field applied along the nodal plane normal where λk · ˆh becomes maximal. Near the plane we expect that
|
| 1314 |
+
λk · ˆh ≫
|
| 1315 |
+
�
|
| 1316 |
+
t2
|
| 1317 |
+
1,k + t2
|
| 1318 |
+
2,k. Also, (t2
|
| 1319 |
+
1,k + t2
|
| 1320 |
+
2,k) is small compared to λ2
|
| 1321 |
+
k, so ˜Fk,ˆh is dominated by the dk · λk term in the
|
| 1322 |
+
numerator. Hence if the denominator |t1,2dk| is much bigger than dk ·λk, then ˜Fk,ˆh ≈ 0. Given that λˆn is the largest
|
| 1323 |
+
SOC component, this requirement is equivalent to λ⊥ ≪ t1,2 and dk ⊥ ˆn (where λ⊥ is the magnitude of the SOC
|
| 1324 |
+
perpendicular to ˆn).
|
| 1325 |
+
As a relevant example of the above mechanism we consider UPt3 [24]. The superconducting state in UPt3 is believed
|
| 1326 |
+
to be an E2u state, with order parameter ∆ = ηp(σxky + σykx) + ηfσzkzkxky (we only include one component of
|
| 1327 |
+
this two-component order parameter since similar arguments hold for the second component). In general, since the
|
| 1328 |
+
p-wave and f-wave components have the same symmetry, both ηp and ηf are non-zero. However, theories based on
|
| 1329 |
+
the usual pseudospin typically require ηp = 0 due to the experimental observations discussed below [66–68]. Below we
|
| 1330 |
+
further show that ηp = 0 is not required for these experimental observations when anomalous pseudospin is considered.
|
| 1331 |
+
Indeed, these experiments are consistent with ηf = 0 and ηp ̸= 0 if pairing occurs predominantly near the nodal plane
|
| 1332 |
+
kz = π/c.
|
| 1333 |
+
Thermal conductivity experiments suggest the existence of line nodes [24]. For usual pseudospin, the state σxky +
|
| 1334 |
+
σykx is either fully gapped or has only point nodes. This is one reason to expect that ηp = 0. However, as illustrated
|
| 1335 |
+
in Table II, line nodes are expected for this state on the kz = π/c plane (note this conclusion also follows from
|
| 1336 |
+
Refs [18, 19, 21]). This is relevant for UPt3 since it is known to have the ‘starfish’ Fermi surface near this nodal plane
|
| 1337 |
+
[24] which belongs to class Dtype1
|
| 1338 |
+
6h
|
| 1339 |
+
In terms of paramagnetic suppression, the superconducting state is known to be more robust under B ⊥ z compared
|
| 1340 |
+
to B ∥ z [68]. For the usual pseudospin, this requires dk ∥ z, and thus ηp = 0. However, on the ‘starfish’ Fermi
|
| 1341 |
+
|
| 1342 |
+
15
|
| 1343 |
+
surface, the small g-factor for B ⊥ z can serve to protect the p-wave state against paramagnetic suppression. As
|
| 1344 |
+
discussed above, the suppression from B ∥ z depends on the ratio λx,y/t1,2, while the g-factor for B ⊥ z depends
|
| 1345 |
+
on the ratio (t1,2, λx,y)/λz. The requirement λx,y/t1,2 > (t1,2, λx,y)/λz is thus sufficient to match the observations
|
| 1346 |
+
on the upper critical fields. If both ratios are much smaller than one, the p-wave state is immune to paramagnetic
|
| 1347 |
+
suppression for field along arbitrary directions. This could be relevant to the approximately unchanged Knight shift
|
| 1348 |
+
in the superconducting state [69]. We note that the use of ˜Fk,ˆh to determine the magnetic response relies on the
|
| 1349 |
+
validity of projection to a single band. However, for class Dtype1
|
| 1350 |
+
6h
|
| 1351 |
+
band degeneracies exist along three Dirac lines for
|
| 1352 |
+
which this projection is not valid. In Appendix B we include a detailed numerical calculation that includes interband
|
| 1353 |
+
effects.
|
| 1354 |
+
VI.
|
| 1355 |
+
8-FOLD DEGENERATE POINTS: APPLICATION TO UCOGE
|
| 1356 |
+
The arguments presented above relied on the 4-fold degeneracy at TRIM points when SOC is not present. However,
|
| 1357 |
+
some of these TRIM points have an 8-fold degeneracy without SOC. It is reasonable to ask if the conclusions found for
|
| 1358 |
+
kp theories of 4-fold degenerate points discussed above survive to 8-fold degenerate points. To address this, we have
|
| 1359 |
+
determined the symmetries of all orbital operators in Appendix C. We find that in most cases, the 8-fold degeneracy
|
| 1360 |
+
at these TRIM is split by a single SOC term of the form Oσi where O is a momentum independent 4 by 4 orbital
|
| 1361 |
+
matrix. In Table.IV, we give the direction of the spin component σi that appears in this SOC term at the TRIM point.
|
| 1362 |
+
The existence of this single SOC term ensures small effective g-factors for fields perpendicular to the spin-component
|
| 1363 |
+
direction. Consequently, the conclusions associated with the effective g-factor anisotropy discussed in Section V still
|
| 1364 |
+
hold for these 8-fold degenerate points. We note that the 8-fold degeneracy at the A point of space groups 130 and
|
| 1365 |
+
135 are not split by SOC and these points provide examples of double Dirac points examined in [70, 71].
|
| 1366 |
+
Spin Alignment
|
| 1367 |
+
Space Group Momenta
|
| 1368 |
+
σx
|
| 1369 |
+
54(U1U2),54(R1R2),56(U1U2),60(R1R2),61(S1S2),62(S1S2),205(M1M2)
|
| 1370 |
+
σy
|
| 1371 |
+
52(S1S2),56(T1T2),57(T1T2),57(R1R2),61(T1T2),130(R1R2),138(R1R2)
|
| 1372 |
+
σz
|
| 1373 |
+
60(T1T2),60(U1U2),61(U1U2),62(R1R2),128(A3A4),137(A3A4),176(A2A3),193(A3),194(A3)
|
| 1374 |
+
TABLE IV. Spin alignment of 8-fold degenerate TRIM.
|
| 1375 |
+
One material for which these 8-fold degenerate points are likely to be relevant is the ferromagetic superconductor
|
| 1376 |
+
UCoGe, which crystalizes in space group 62 (Pnma) [25]. UCoGe is believed to be a possibly topological odd-parity
|
| 1377 |
+
superconductor [17, 25]. Our Fermi surface (given in Figure 3) reveals that all Fermi surface sheets lie near nodal
|
| 1378 |
+
planes with anomalous pseudospin and further reveal tube-shaped pockets that enclose the zone-boundary S point
|
| 1379 |
+
and stretch along the S-R axis. Here we focus on these Fermi surfaces. This feature reasonably agrees with previous
|
| 1380 |
+
works [72–74] using local density approximation and the existence of these tube shaped Fermi surfaces is consistent
|
| 1381 |
+
with quantum oscillation measurements [75]. Here density-functional theory calculations for UCoGe were carried
|
| 1382 |
+
out by the full-potential linearized augmented plane wave method [56]. Perdew-Burke-Ernzerhof form of exchange
|
| 1383 |
+
correlation functional [57], wave function and potential energy cutoffs of 16 and 200 Ry, respectively, muffin-tin sphere
|
| 1384 |
+
radii of 1.4 ˚A for U and 1.2 ˚A for Co and Ge, respectively, the experimental lattice parameters [76], and an 8 × 12 × 8
|
| 1385 |
+
k-point mesh were employed for the self-consistent field calculation. Spin-orbit was fully taken into account in the
|
| 1386 |
+
assumed nonmagnetic state. Fermi surface was determined on a dense 30 × 50 × 30 k-point mesh and visualized by
|
| 1387 |
+
using FermiSurfer [77].
|
| 1388 |
+
Both the R and S points are 8-fold degenerate TRIM when SOC is not included for space group 62. Interestingly,
|
| 1389 |
+
from Table IV, the effective g-factors for fields along ˆy and ˆz directions are zero at the S-point and are zero for fields
|
| 1390 |
+
along ˆx and ˆy directions at the R-point. This indicates that superconductivity (both even and odd-parity) on the
|
| 1391 |
+
tube-shaped Fermi surfaces will be robust against magnetic fields applied along the ˆy direction. This is the field
|
| 1392 |
+
direction for which the upper critical field is observed to be the highest and for which an unusual S-shaped critical
|
| 1393 |
+
field curve appears [25]. We leave a detailed examination of the consequences of anomalous pseudospin in space group
|
| 1394 |
+
62 on superconductivity to a later work.
|
| 1395 |
+
VII.
|
| 1396 |
+
CONCLUSIONS
|
| 1397 |
+
Non-symmorphic symmetries allow the existence of nodal planes at Brillouin zone edges when no SOC is present.
|
| 1398 |
+
When SOC is added, the pseudospin on these nodal planes has different symmetry properties than usual pseudospin-
|
| 1399 |
+
|
| 1400 |
+
16
|
| 1401 |
+
X
|
| 1402 |
+
U
|
| 1403 |
+
Z
|
| 1404 |
+
Y
|
| 1405 |
+
S
|
| 1406 |
+
R
|
| 1407 |
+
!
|
| 1408 |
+
T
|
| 1409 |
+
FIG. 5.
|
| 1410 |
+
DFT Fermi surface of UCoGe.
|
| 1411 |
+
1/2. Here we have classified all space groups and effective single-particle theories near TRIM points on these nodal
|
| 1412 |
+
planes and examined the consequences of this anomalous pseudospin on the superconducting state. We have shown
|
| 1413 |
+
how this enhances the Tc for odd-parity superconducting states due to attractive interactions, leads to unexpected
|
| 1414 |
+
superconducting nodal properties, allows large Pauli limiting fields and pair density wave states for spin-singlet
|
| 1415 |
+
superconductors, gives rise to field immune odd-parity superconductivity, and to field driven even to odd-parity
|
| 1416 |
+
superconducting transitions. While we have emphasized nodal planes on which anomalous pseudospin exists, there
|
| 1417 |
+
are also materials for which anomalous pseudospin develops on nodal lines and not on nodal planes. Some such
|
| 1418 |
+
materials also exhibit unusual response to magnetic fields [78–80], suggesting a broader range of applicability for
|
| 1419 |
+
anomalous pseudospin superconductivity.
|
| 1420 |
+
VIII.
|
| 1421 |
+
ACKNOWLEDGEMENTS
|
| 1422 |
+
DFA, HGS, and YY were supported by the US Department of Energy, Office of Basic Energy Sciences, Division of
|
| 1423 |
+
Materials Sciences and Engineering under Award DE-SC0021971 and by a UWM Discovery and Innovation Grant.
|
| 1424 |
+
MW and TS were supported by the US Department of Energy, Office of Basic Energy Sciences, Division of Materials
|
| 1425 |
+
Sciences and Engineering under Award DE-SC0017632. PMRB was supported by the Marsden Fund Council from
|
| 1426 |
+
Government funding, managed by Royal Society Te Aparangi. We acknowledge useful discussions with Mark Fischer,
|
| 1427 |
+
Elena Hassinger, Seunghyun Khim, Igor Mazin, and Manfred Sigrist.
|
| 1428 |
+
[1] A. Manchon, H. C. Koo, J. Nitta, S. M. Frolov, and R. A. Duine, New perspectives for rashba spin–orbit coupling, Nature
|
| 1429 |
+
Materials 14, 871 (2015).
|
| 1430 |
+
[2] M. Smidman, M. B. Salamon, H. Q. Yuan, and D. F. Agterberg, Superconductivity and spin–orbit coupling in non-
|
| 1431 |
+
centrosymmetric materials: a review, Reports on Progress in Physics 80, 036501 (2017).
|
| 1432 |
+
[3] V. Baltz, A. Manchon, M. Tsoi, T. Moriyama, T. Ono, and Y. Tserkovnyak, Antiferromagnetic spintronics, Rev. Mod.
|
| 1433 |
+
Phys. 90, 015005 (2018).
|
| 1434 |
+
[4] X. Zhang, Q. Liu, J.-W. Luo, A. J. Freeman, and A. Zunger, Hidden spin polarization in inversion-symmetric bulk crystals,
|
| 1435 |
+
Nature Physics 10, 387 (2014).
|
| 1436 |
+
[5] M. H. Fischer,
|
| 1437 |
+
M. Sigrist,
|
| 1438 |
+
D. F. Agterberg, and Y. Yanase, Superconductivity and local inversion-symmetry
|
| 1439 |
+
breaking, Annual Review of Condensed Matter Physics 14,
|
| 1440 |
+
10.1146/annurev-conmatphys-040521-042511 (2023),
|
| 1441 |
+
https://doi.org/10.1146/annurev-conmatphys-040521-042511.
|
| 1442 |
+
[6] T. Yoshida, M. Sigrist, and Y. Yanase, Pair-density wave states through spin-orbit coupling in multilayer superconductors,
|
| 1443 |
+
Phys. Rev. B 86, 134514 (2012).
|
| 1444 |
+
[7] S. Khim, J. F. Landaeta, J. Banda, N. Bannor, M. Brando, P. M. R. Brydon, D. Hafner, R. K¨uchler, R. Cardoso-
|
| 1445 |
+
Gil, U. Stockert, A. P. Mackenzie, D. F. Agterberg, C. Geibel, and E. Hassinger, Field-induced transition within the
|
| 1446 |
+
superconducting state of CeRh2As2, Science 373, 1012 (2021), https://www.science.org/doi/pdf/10.1126/science.abe7518.
|
| 1447 |
+
|
| 1448 |
+
717
|
| 1449 |
+
[8] J. F. Landaeta, P. Khanenko, D. C. Cavanagh, C. Geibel, S. Khim, S. Mishra, I. Sheikin, P. M. R. Brydon, D. F. Agterberg,
|
| 1450 |
+
M. Brando, and E. Hassinger, Field-Angle Dependence Reveals Odd-Parity Superconductivity in CeRh2As2, Phys. Rev.
|
| 1451 |
+
X 12, 031001 (2022).
|
| 1452 |
+
[9] D. C. Cavanagh, T. Shishidou, M. Weinert, P. M. R. Brydon, and D. F. Agterberg, Nonsymmorphic symmetry and
|
| 1453 |
+
field-driven odd-parity pairing in CeRh2As2, Physical Review B 105, 10.1103/physrevb.105.l020505 (2022).
|
| 1454 |
+
[10] L. Yuan, Q. Liu, X. Zhang, J.-W. Luo, S.-S. Li, and A. Zunger, Uncovering and tailoring hidden rashba spin–orbit splitting
|
| 1455 |
+
in centrosymmetric crystals, Nature Communications 10, 10.1038/s41467-019-08836-4 (2019).
|
| 1456 |
+
[11] P. Li and I. Appelbaum, Illuminating ”spin-polarized” bloch wave-function projection from degenerate bands in decom-
|
| 1457 |
+
posable centrosymmetric lattices, Phys. Rev. B 97, 125434 (2018).
|
| 1458 |
+
[12] Y. Nakamura and Y. Yanase, Odd-parity superconductivity in bilayer transition metal dichalcogenides, Phys. Rev. B 96,
|
| 1459 |
+
054501 (2017).
|
| 1460 |
+
[13] B.-J. Yang, T. A. Bojesen, T. Morimoto, and A. Furusaki, Topological semimetals protected by off-centered symmetries
|
| 1461 |
+
in nonsymmorphic crystals, Physical Review B 95, 10.1103/physrevb.95.075135 (2017).
|
| 1462 |
+
[14] J. Zhang, Y.-H. Chan, C.-K. Chiu, M. G. Vergniory, L. M. Schoop, and A. P. Schnyder, Topological band crossings in
|
| 1463 |
+
hexagonal materials, Physical Review Materials 2, 10.1103/physrevmaterials.2.074201 (2018).
|
| 1464 |
+
[15] M. M. Hirschmann, A. Leonhardt, B. Kilic, D. H. Fabini, and A. P. Schnyder, Symmetry-enforced band crossings in
|
| 1465 |
+
tetragonal materials: Dirac and weyl degeneracies on points, lines, and planes, Physical Review Materials 5, 10.1103/phys-
|
| 1466 |
+
revmaterials.5.054202 (2021).
|
| 1467 |
+
[16] A. Leonhardt, M. M. Hirschmann, N. Heinsdorf, X. Wu, D. H. Fabini, and A. P. Schnyder, Symmetry-enforced topological
|
| 1468 |
+
band crossings in orthorhombic crystals: Classification and materials discovery, Physical Review Materials 5, 10.1103/phys-
|
| 1469 |
+
revmaterials.5.124202 (2021).
|
| 1470 |
+
[17] A. Daido, T. Yoshida, and Y. Yanase, Z4 topological superconductivity in ucoge, Phys. Rev. Lett. 122, 227001 (2019).
|
| 1471 |
+
[18] S. Sumita and Y. Yanase, Unconventional superconducting gap structure protected by space group symmetry, Physical
|
| 1472 |
+
Review B 97, 10.1103/physrevb.97.134512 (2018).
|
| 1473 |
+
[19] S. Kobayashi, Y. Yanase, and M. Sato, Topologically stable gapless phases in nonsymmorphic superconductors, Physical
|
| 1474 |
+
Review B 94, 10.1103/physrevb.94.134512 (2016).
|
| 1475 |
+
[20] S. Kobayashi, K. Shiozaki, Y. Tanaka, and M. Sato, Topological blount’s theorem of odd-parity superconductors, Physical
|
| 1476 |
+
Review B 90, 10.1103/physrevb.90.024516 (2014).
|
| 1477 |
+
[21] T. Micklitz and M. R. Norman, Odd parity and line nodes in nonsymmorphic superconductors, Phys. Rev. B 80, 100506
|
| 1478 |
+
(2009).
|
| 1479 |
+
[22] Y. Mizuguchi, Review of superconductivity in BiS2-based layered materials, Journal of Physics and Chemistry of Solids
|
| 1480 |
+
84, 34 (2015), focus issue on the Study of matter at extreme conditions and related phenomena.
|
| 1481 |
+
[23] G. R. Stewart, Superconductivity in iron compounds, Rev. Mod. Phys. 83, 1589 (2011).
|
| 1482 |
+
[24] R. Joynt and L. Taillefer, The superconducting phases of UPt3, Rev. Mod. Phys. 74, 235 (2002).
|
| 1483 |
+
[25] D. Aoki, K. Ishida, and J. Flouquet, Review of U-based Ferromagnetic Superconductors: Comparison between UGe2,
|
| 1484 |
+
URhGe, and UCoGe, Journal of the Physical Society of Japan 88, 022001 (2019).
|
| 1485 |
+
[26] L. Fu, Parity-breaking phases of spin-orbit-coupled metals with gyrotropic, ferroelectric, and multipolar orders, Phys. Rev.
|
| 1486 |
+
Lett. 115, 026401 (2015).
|
| 1487 |
+
[27] P. Brydon, L. Wang, M. Weinert, and D. Agterberg, Pairing of j = 3/2 fermions in half-heusler superconductors, Physical
|
| 1488 |
+
Review Letters 116, 10.1103/physrevlett.116.177001 (2016).
|
| 1489 |
+
[28] C. Wang, B. Lian, X. Guo, J. Mao, Z. Zhang, D. Zhang, B.-L. Gu, Y. Xu, and W. Duan, Type-II Ising superconductivity
|
| 1490 |
+
in two-dimensional materials with spin-orbit coupling, Phys. Rev. Lett. 123, 126402 (2019).
|
| 1491 |
+
[29] J. Falson, Y. Xu, M. Liao, Y. Zang, K. Zhu, C. Wang, Z. Zhang, H. Liu, W. Duan, K. He, H. Liu, J. H. Smet, D. Zhang,
|
| 1492 |
+
and Q.-K. Xue, Type-II Ising pairing in few-layer stanene, Science 367, 1454 (2020).
|
| 1493 |
+
[30] M. Sigrist and K. Ueda, Phenomenological theory of unconventional superconductivity, Rev. Mod. Phys. 63, 239 (1991).
|
| 1494 |
+
[31] L. P. Gor’kov and E. I. Rashba, Superconducting 2D System with Lifted Spin Degeneracy: Mixed Singlet-Triplet State,
|
| 1495 |
+
Phys. Rev. Lett. 87, 037004 (2001).
|
| 1496 |
+
[32] M. I. Aroyo, J. M. Perez-Mato, C. Capillas, E. Kroumova, S. Ivantchev, G. Madariaga, A. Kirov, and H. Wondratschek,
|
| 1497 |
+
Bilbao crystallographic server: I. databases and crystallographic computing programs, Zeitschrift f¨ur Kristallographie -
|
| 1498 |
+
Crystalline Materials 221, 15 (2006).
|
| 1499 |
+
[33] M. I. Aroyo, A. Kirov, C. Capillas, J. M. Perez-Mato, and H. Wondratschek, Bilbao Crystallographic Server. II. Represen-
|
| 1500 |
+
tations of crystallographic point groups and space groups, Acta Crystallographica Section A 62, 115 (2006).
|
| 1501 |
+
[34] H. T. Stokes, B. J. Campbell, and R. Cordes, Tabulation of irreducible representations of the crystallographic space groups
|
| 1502 |
+
and their superspace extensions, Acta Crystallographica Section A 69, 388 (2013).
|
| 1503 |
+
[35] Y. X. Zhao and A. P. Schnyder, Nonsymmorphic symmetry-required band crossings in topological semimetals, Physical
|
| 1504 |
+
Review B 94, 10.1103/physrevb.94.195109 (2016).
|
| 1505 |
+
[36] D. Huang and J. E. Hoffman, Monolayer FeSe on SrTiO3, Annual Review of Condensed Matter Physics 8, 311 (2017),
|
| 1506 |
+
https://doi.org/10.1146/annurev-conmatphys-031016-025242.
|
| 1507 |
+
[37] J. P. Ruf, H. Paik, N. J. Schreiber, H. P. Nair, L. Miao, J. K. Kawasaki, J. N. Nelson, B. D. Faeth, Y. Lee, B. H. Goodge,
|
| 1508 |
+
B. Pamuk, C. J. Fennie, L. F. Kourkoutis, D. G. Schlom, and K. M. Shen, Strain-stabilized superconductivity, Nature
|
| 1509 |
+
Communications 12, 10.1038/s41467-020-20252-7 (2021).
|
| 1510 |
+
[38] M. Uchida, T. Nomoto, M. Musashi, R. Arita, and M. Kawasaki, Superconductivity in Uniquely Strained RuO2 Films,
|
| 1511 |
+
Phys. Rev. Lett. 125, 147001 (2020).
|
| 1512 |
+
|
| 1513 |
+
18
|
| 1514 |
+
[39] L. ˇSmejkal, J. Sinova, and T. Jungwirth, Emerging Research Landscape of Altermagnetism, Phys. Rev. X 12, 040501
|
| 1515 |
+
(2022).
|
| 1516 |
+
[40] E. I. Blount, Symmetry properties of triplet superconductors, Phys. Rev. B 32, 2935 (1985).
|
| 1517 |
+
[41] K. Samokhin, On the pseudospin description of the electron bloch bands, Annals of Physics 407, 179 (2019).
|
| 1518 |
+
[42] D. C. Cavanagh, D. F. Agterberg, and P. M. R. Brydon, Pair-breaking in superconductors with strong spin-orbit coupling
|
| 1519 |
+
(2022).
|
| 1520 |
+
[43] A. Ramires and M. Sigrist, Identifying detrimental effects for multiorbital superconductivity: Application to Sr2RuO4,
|
| 1521 |
+
Physical Review B 94, 10.1103/physrevb.94.104501 (2016).
|
| 1522 |
+
[44] A. Ramires, D. F. Agterberg, and M. Sigrist, Tailoring Tc by symmetry principles: The concept of superconducting fitness,
|
| 1523 |
+
Physical Review B 98, 10.1103/physrevb.98.024501 (2018).
|
| 1524 |
+
[45] A. V. Chubukov, O. Vafek, and R. M. Fernandes, Displacement and annihilation of Dirac gap nodes in d-wave iron-based
|
| 1525 |
+
superconductors, Phys. Rev. B 94, 174518 (2016).
|
| 1526 |
+
[46] D. Agterberg, T. Shishidou, J. O’Halloran, P. Brydon, and M. Weinert, Resilient Nodeless d -Wave Superconductivity in
|
| 1527 |
+
Monolayer FeSe, Physical Review Letters 119, 10.1103/physrevlett.119.267001 (2017).
|
| 1528 |
+
[47] Y. Yanase and K. Shiozaki, M¨obius topological superconductivity in UPt3, Phys. Rev. B 95, 224514 (2017).
|
| 1529 |
+
[48] L. Fu and E. Berg, Odd-Parity Topological Superconductors: Theory and Application to CuxBi2Se3, Phys. Rev. Lett. 105,
|
| 1530 |
+
097001 (2010).
|
| 1531 |
+
[49] S. Qin, C. Fang, F.-c. Zhang, and J. Hu, Spin-triplet superconductivity in nonsymmorphic crystals (2022).
|
| 1532 |
+
[50] O. Vafek and A. V. Chubukov, Hund interaction, spin-orbit coupling, and the mechanism of superconductivity in strongly
|
| 1533 |
+
hole-doped iron pnictides, Physical Review Letters 118, 10.1103/physrevlett.118.087003 (2017).
|
| 1534 |
+
[51] A. K. C. Cheung and D. F. Agterberg, Superconductivity in the presence of spin-orbit interactions stabilized by hund
|
| 1535 |
+
coupling, Physical Review B 99, 10.1103/physrevb.99.024516 (2019).
|
| 1536 |
+
[52] C. Wang, Y. Xu, and W. Duan, Ising Superconductivity and Its Hidden Variants, Accounts of Materials Research 2, 526
|
| 1537 |
+
(2021), https://doi.org/10.1021/accountsmr.1c00068.
|
| 1538 |
+
[53] A. Skurativska, M. Sigrist, and M. H. Fischer, Spin response and topology of a staggered-rashba superconductor, Phys.
|
| 1539 |
+
Rev. Research 3, 033133 (2021).
|
| 1540 |
+
[54] K. Hoshi, R. Kurihara, Y. Goto, M. Tokunaga, and Y. Mizuguchi, Extremely high upper critical field in BiCh2-based (Ch:
|
| 1541 |
+
S and Se) layered superconductor LaO0.5F0.5BiS2−xSex (x = 0.22 and 0.69), Scientific Reports 12, 10.1038/s41598-021-
|
| 1542 |
+
04393-3 (2022).
|
| 1543 |
+
[55] H. Usui, K. Suzuki, and K. Kuroki, Minimal electronic models for superconducting BiS2 layers, Phys. Rev. B 86, 220501
|
| 1544 |
+
(2012).
|
| 1545 |
+
[56] M. Weinert, G. Schneider, R. Podloucky, and J. Redinger, FLAPW: Applications and implementations, J. Phys. Condens.
|
| 1546 |
+
Matter 21, 084201 (2009).
|
| 1547 |
+
[57] J. P. Perdew, K. Burke, and M. Ernzerhof, Generalized Gradient Approximation Made Simple, Phys. Rev. Lett. 77, 3865
|
| 1548 |
+
(1996).
|
| 1549 |
+
[58] Y. Mizuguchi, S. Demura, K. Deguchi, Y. Takano, H. Fujihisa, Y. Gotoh, H. Izawa, and O. Miura, Superconductivity in
|
| 1550 |
+
Novel BiS2-Based Layered Superconductor LaO1−xFxBiS2, Journal of the Physical Society of Japan 81, 114725 (2012),
|
| 1551 |
+
https://doi.org/10.1143/JPSJ.81.114725.
|
| 1552 |
+
[59] J. lei Zhang, L. Jiao, Y. Chen, and H. qiu Yuan, Universal behavior of the upper critical field in iron-based superconductors,
|
| 1553 |
+
Frontiers of Physics 6, 463 (2011).
|
| 1554 |
+
[60] P. Fulde and R. A. Ferrell, Superconductivity in a strong spin-exchange field, Phys. Rev. 135, A550 (1964).
|
| 1555 |
+
[61] A. Larkin and Y. Ovchinnikov, Inhomogeneous state of superconductors, Sov. Phys. JETP 20, 762 (1965).
|
| 1556 |
+
[62] D. F. Agterberg, J. S. Davis, S. D. Edkins, E. Fradkin, D. J. Van Harlingen, S. A. Kivelson, P. A. Lee, L. Radzihovsky,
|
| 1557 |
+
J. M. Tranquada, and Y. Wang, The physics of pair-density waves: Cuprate superconductors and beyond, Annual Review
|
| 1558 |
+
of Condensed Matter Physics 11, 231 (2020).
|
| 1559 |
+
[63] M.
|
| 1560 |
+
Sigrist,
|
| 1561 |
+
Introduction
|
| 1562 |
+
to
|
| 1563 |
+
Unconventional
|
| 1564 |
+
Superconductivity,
|
| 1565 |
+
AIP
|
| 1566 |
+
Conference
|
| 1567 |
+
Proceedings
|
| 1568 |
+
789,
|
| 1569 |
+
165
|
| 1570 |
+
(2005),
|
| 1571 |
+
https://aip.scitation.org/doi/pdf/10.1063/1.2080350.
|
| 1572 |
+
[64] V. Mineev and K. Samokhin, Introduction to Unconventional Superconductivity (Gordon and Breach Science Publishers,
|
| 1573 |
+
1999).
|
| 1574 |
+
[65] K. Machida, T. Ohmi, and M.-a. Ozaki, Anisotropy of Upper Critical Fields for d- and p-Wave Pairing Superconductivity,
|
| 1575 |
+
Journal of the Physical Society of Japan 54, 1552 (1985), https://doi.org/10.1143/JPSJ.54.1552.
|
| 1576 |
+
[66] J. Sauls, The order parameter for the superconducting phases of UPt3, Advances in Physics 43, 113 (1994).
|
| 1577 |
+
[67] Y. Yanase, Nonsymmorphic Weyl superconductivity in UPt3 based on E2u representation, Phys. Rev. B 94, 174502 (2016).
|
| 1578 |
+
[68] C. H. Choi and J. A. Sauls, Identification of odd-parity superconductivity in UPt3 from paramagnetic effects on the upper
|
| 1579 |
+
critical field, Phys. Rev. Lett. 66, 484 (1991).
|
| 1580 |
+
[69] H. Tou, Y. Kitaoka, K. Asayama, N. Kimura, Y. ¯Onuki, E. Yamamoto, and K. Maezawa, Odd-Parity Superconductivity
|
| 1581 |
+
with Parallel Spin Pairing in UPt3: Evidence from 195Pt Knight Shift Study, Phys. Rev. Lett. 77, 1374 (1996).
|
| 1582 |
+
[70] B. J. Wieder, Y. Kim, A. M. Rappe, and C. L. Kane, Double dirac semimetals in three dimensions, Phys. Rev. Lett. 116,
|
| 1583 |
+
186402 (2016).
|
| 1584 |
+
[71] B.
|
| 1585 |
+
Bradlyn,
|
| 1586 |
+
J.
|
| 1587 |
+
Cano,
|
| 1588 |
+
Z.
|
| 1589 |
+
Wang,
|
| 1590 |
+
M.
|
| 1591 |
+
G.
|
| 1592 |
+
Vergniory,
|
| 1593 |
+
C.
|
| 1594 |
+
Felser,
|
| 1595 |
+
R.
|
| 1596 |
+
J.
|
| 1597 |
+
Cava,
|
| 1598 |
+
and
|
| 1599 |
+
B.
|
| 1600 |
+
A.
|
| 1601 |
+
Bernevig,
|
| 1602 |
+
Beyond
|
| 1603 |
+
dirac and weyl fermions:
|
| 1604 |
+
Unconventional quasiparticles in conventional crystals, Science 353, aaf5037 (2016),
|
| 1605 |
+
https://www.science.org/doi/pdf/10.1126/science.aaf5037.
|
| 1606 |
+
[72] M. Samsel-Czeka�la, S. Elgazzar, P. M. Oppeneer, E. Talik, W. Walerczyk, and R. Tro´c, The electronic structure of UCoGe
|
| 1607 |
+
by ab initio calculations and XPS experiment, Journal of Physics: Condensed Matter 22, 015503 (2009).
|
| 1608 |
+
|
| 1609 |
+
19
|
| 1610 |
+
[73] S.-i. Fujimori, T. Ohkochi, I. Kawasaki, A. Yasui, Y. Takeda, T. Okane, Y. Saitoh, A. Fujimori, H. Yamagami, Y. Haga,
|
| 1611 |
+
E. Yamamoto, and Y. ¯Onuki, Electronic structures of ferromagnetic superconductors UGe2 and UCoGe studied by angle-
|
| 1612 |
+
resolved photoelectron spectroscopy, Phys. Rev. B 91, 174503 (2015).
|
| 1613 |
+
[74] A. Daido, T. Yoshida, and Y. Yanase, Z4 Topological Superconductivity in UCoGe, Phys. Rev. Lett. 122, 227001 (2019).
|
| 1614 |
+
[75] G. Bastien, A. Gourgout, D. Aoki, A. Pourret, I. Sheikin, G. Seyfarth, J. Flouquet, and G. Knebel, Lifshitz Transitions in
|
| 1615 |
+
the Ferromagnetic Superconductor UCoGe, Phys. Rev. Lett. 117, 206401 (2016).
|
| 1616 |
+
[76] F. Canepa, P. Manfrinetti, M. Pani, and A. Palenzona, Structural and transport properties of some UTX compounds
|
| 1617 |
+
where T = Fe, Co, Ni and X = Si, Ge, Journal of Alloys and Compounds 234, 225 (1996).
|
| 1618 |
+
[77] M. Kawamura, FermiSurfer: Fermi-surface viewer providing multiple representation schemes, Computer Physics Commu-
|
| 1619 |
+
nications 239, 197 (2019).
|
| 1620 |
+
[78] Y. Shimizu, D. Braithwaite, D. Aoki, B. Salce, and J.-P. Brison, Spin-Triplet p-Wave Superconductivity Revealed under
|
| 1621 |
+
High Pressure in UBe13, Phys. Rev. Lett. 122, 067001 (2019).
|
| 1622 |
+
[79] K. Ma, K. Gornicka, R. Lef`e vre, Y. Yang, H. M. Rønnow, H. O. Jeschke, T. Klimczuk, and F. O. von Rohr, Supercon-
|
| 1623 |
+
ductivity with High Upper Critical Field in the Cubic Centrosymmetric η-Carbide Nb4Rh2C1−δ, ACS Materials Au 1, 55
|
| 1624 |
+
(2021).
|
| 1625 |
+
[80] B.-B. Ruan, M.-H. Zhou, Q.-S. Yang, Y.-D. Gu, M.-W. Ma, G.-F. Chen, and Z.-A. Ren, Superconductivity with a Violation
|
| 1626 |
+
of Pauli Limit and Evidences for Multigap in η-Carbide Type Ti4Ir2O, Chinese Physics Letters 39, 027401 (2022).
|
| 1627 |
+
|
| 1628 |
+
20
|
| 1629 |
+
Appendix A: Full excitation spectrum on the nodal plane
|
| 1630 |
+
On the nodal plane, the Bogoliubov de-Gennes Hamiltonian takes the form
|
| 1631 |
+
H =
|
| 1632 |
+
�
|
| 1633 |
+
k
|
| 1634 |
+
Ψ†
|
| 1635 |
+
k
|
| 1636 |
+
�
|
| 1637 |
+
ε0,k + τ3(λk · ˆn)(σ · ˆn)
|
| 1638 |
+
∆k
|
| 1639 |
+
Ơ
|
| 1640 |
+
k
|
| 1641 |
+
−ε0,k − τ3(λk · ˆn)(σ · ˆn)
|
| 1642 |
+
�
|
| 1643 |
+
Ψk,
|
| 1644 |
+
(A1)
|
| 1645 |
+
It is possible to classify the gap symmetry as even or odd under both inversion and mirror symmetries. For momenta
|
| 1646 |
+
on the nodal surface we have,
|
| 1647 |
+
U †
|
| 1648 |
+
P ∆kUP = ± ∆−k
|
| 1649 |
+
U †
|
| 1650 |
+
M∆kUM = ± ∆k
|
| 1651 |
+
(A2)
|
| 1652 |
+
where for type 1 TRIM UP = τ1 and UM = −iτ3σz and for type 2 TRIM UP = τ0 and UM = −iτ2σz. We label the
|
| 1653 |
+
gaps as ∆1(2),i,j where i = ± labels the parity symmetry and j = ± labels the mirror symmetry. Here, for clarity,
|
| 1654 |
+
we drop the k labels (note that k is unchanged by the mirror symmetry). For the type 1 TRIM, we write the gap
|
| 1655 |
+
functions in terms of the complete set of gap functions with the correct symmetries given in Table III as
|
| 1656 |
+
∆1,++ =
|
| 1657 |
+
ψ0τ0 + (dz · ˆn)(σ · ˆn)τ3
|
| 1658 |
+
∆1,+− =
|
| 1659 |
+
ψxτ1 + (dz × ˆn) · (σ × ˆn)τ3 + dyτ2
|
| 1660 |
+
∆1,−+ =(d0 · ˆn)(σ · ˆn)τ0 + (dx × ˆn) · (σ × ˆn)τ1 + ψzτ3 + (ψ × ˆn) · (σ × ˆn)τ2
|
| 1661 |
+
∆1,−− =
|
| 1662 |
+
(d0 × ˆn) · (σ × ˆn)τ0 + (dx · ˆn)(σ · ˆn)τ1 + (ψ · ˆn)(σ · ˆn)τ2
|
| 1663 |
+
(A3)
|
| 1664 |
+
where di are odd functions of k and ψi are even functions of k.
|
| 1665 |
+
Using Eq. A1, the corresponding quasiparticle
|
| 1666 |
+
excitation energies can be found to be
|
| 1667 |
+
E1,++ =
|
| 1668 |
+
±′ �
|
| 1669 |
+
(ϵ0 ± λ · ˆn)2 + (ψ0 ± dz · ˆn)2
|
| 1670 |
+
E1,+− =
|
| 1671 |
+
±′ ��
|
| 1672 |
+
ϵ2
|
| 1673 |
+
0 + ψ2x + (dz × ˆn)2 + d2y ± λ · ˆn
|
| 1674 |
+
�
|
| 1675 |
+
E1,−+ = ±′ �
|
| 1676 |
+
(ϵ0 ± λ · ˆn)2 + (ψz ± d0 · ˆn)2 + (dx × ˆn)2 + (ψ × ˆn)2 ± 2(dx × ψ) · ˆn
|
| 1677 |
+
E1,−− =
|
| 1678 |
+
±′ ��
|
| 1679 |
+
ϵ2
|
| 1680 |
+
0 + (d0 × ˆn)2 + (dx · ˆn)2 + (ψ · ˆn)2 ± λ · ˆn
|
| 1681 |
+
�
|
| 1682 |
+
(A4)
|
| 1683 |
+
where the prime denotes independent choices of the sign. For type 2 TRIM we similarly have
|
| 1684 |
+
∆2,++ =
|
| 1685 |
+
ψ0τ0 + (ψ · ˆn)(σ · ˆn)τ2
|
| 1686 |
+
∆2,+− =
|
| 1687 |
+
ψxτ1 + ψzτ3 + (ψ × ˆn) · (σ × ˆn)τ2
|
| 1688 |
+
∆2,−+ =(d0 · ˆn)(σ · ˆn)τ0 + (dx × ˆn) · (σ × ˆn)τ1 + (dz × ˆn) · (σ × ˆn)τ3 + dyτ2
|
| 1689 |
+
∆2,−− =
|
| 1690 |
+
(d0 × ˆn) · (σ × ˆn)τ0 + (dx · ˆn)(σ · ˆn)τ1 + (dz · ˆn)(σ · ˆn)τ3
|
| 1691 |
+
(A5)
|
| 1692 |
+
The quasiparticle excitation spectra for these states are
|
| 1693 |
+
E2,++ =
|
| 1694 |
+
±′ �
|
| 1695 |
+
(ϵ0 ± λ · ˆn)2 + (ψ0 ± ψ · ˆn)2
|
| 1696 |
+
E2,+− =
|
| 1697 |
+
±′ ��
|
| 1698 |
+
ϵ2
|
| 1699 |
+
0 + ψ2x + ψ2z + (ψ × ˆn)2 ± λ · ˆn
|
| 1700 |
+
�
|
| 1701 |
+
E2,−+ = ±′ �
|
| 1702 |
+
(ϵ0 ± λ · ˆn)2 + (dy ± d0 · ˆn)2 + (dx × ˆn)2 + (dz × ˆn)2 ± 2(dx × dz) · ˆn
|
| 1703 |
+
E2,−− =
|
| 1704 |
+
±′ ��
|
| 1705 |
+
ϵ2
|
| 1706 |
+
0 + (d0 × ˆn)2 + (dx · ˆn)2 + (dz · ˆn)2 ± λ · ˆn
|
| 1707 |
+
�
|
| 1708 |
+
(A6)
|
| 1709 |
+
|
| 1710 |
+
21
|
| 1711 |
+
Appendix B: Magnetic susceptibility UPt3
|
| 1712 |
+
In the main text, we illustrated how the p-wave state in UPt3 is immune to the magnetic field along arbitrary
|
| 1713 |
+
directions.
|
| 1714 |
+
An important step is to consider the small g-factor for field B ⊥ z.
|
| 1715 |
+
However, the discussion is not
|
| 1716 |
+
complete. In the normal state, there exist 4-fold degenerate Dirac lines on the plane kz = π/c, where the g-factor is
|
| 1717 |
+
not small. In terms of the field fitness, Eq.20 in the main text only considered doubly degenerate bands. In principle,
|
| 1718 |
+
extra terms in the field fitness are needed for to describe these Dirac lines. However, the Fermi surface is not right
|
| 1719 |
+
on the nodal plane. This can make the Dirac lines unimportant. In this section, we will explicitly check the field
|
| 1720 |
+
response in the superconducting state through a numerical calculation on a tight-binding model for UPt3.
|
| 1721 |
+
In the following calculations, we will focus on the Knight shift (spin-susceptibility). Knight shift measures spin
|
| 1722 |
+
polarization at atom sites. By extracting spin susceptibility χs, one can determine pairing functions of an uncon-
|
| 1723 |
+
ventional superconductor. For a single-band spin-triplet superconductor, the change of Knight shift depends on the
|
| 1724 |
+
orientation of magnetic field with respect to the d-vector of the superconducting state. If the magnetic field is per-
|
| 1725 |
+
pendicular to the d-vector, the Knight shift should be a constant across superconducting Tc. If the magnetic field is
|
| 1726 |
+
parallel to the d-vector, the Knight shift will decrease to zero as temperature approaches zero. For the multi-band
|
| 1727 |
+
non-symmorphic superconductor UPt3, Knight shift is almost unchanged for all field orientations, suggesting the
|
| 1728 |
+
importance of spin-orbit coupling in this heavy fermion material.
|
| 1729 |
+
One of the Fermi surfaces (‘starfish’) of UPt3 is flat and located near the high symmetry plane kz = π/c. Zeeman
|
| 1730 |
+
terms Bxσx and Byσy then becomes inter-band. From non-generate perturbation theory, spin susceptibilities are
|
| 1731 |
+
inversely proportional to the band gap. This is different from the intra-band Zeeman effect, where susceptibilities are
|
| 1732 |
+
proportional to the density of states on Fermi surface, according to degenerate perturbation theory.
|
| 1733 |
+
Since the superconducting gap is much smaller than the band gap, inter-band susceptibilities will be unchanged
|
| 1734 |
+
across Tc. If the superconductivity is mainly developed on the above flat Fermi surface, then Knight shift is expected
|
| 1735 |
+
to be unchanged for in-plane magnetic fields, regardless of the superconducting pairing symmetry. If the d-vector is
|
| 1736 |
+
in-plane, then Knight shift will also be unchanged for a perpendicular magnetic field. In this section, we will explicitly
|
| 1737 |
+
illustrate this idea to understand the experimental results on UPt3.
|
| 1738 |
+
FIG. 6. Crystal structure of UPt3 with the unit vector e1 = (1, 0, 0).
|
| 1739 |
+
The 4 × 4 normal state Hamiltonian reads [67]:
|
| 1740 |
+
H = ε(k) + gz(k)σzτ3 + a1(k)τ1 + a2(k)τ2 + [gx(k)σx + gy(k)σy] τ3
|
| 1741 |
+
εk = 2t
|
| 1742 |
+
�
|
| 1743 |
+
i=1,2,3
|
| 1744 |
+
cos k∥ · ei + 2t3 cos kz − µ,
|
| 1745 |
+
gz(k) = gz0
|
| 1746 |
+
�
|
| 1747 |
+
i
|
| 1748 |
+
sin k∥ · ei
|
| 1749 |
+
a1(k) = 2t′ sin kz
|
| 1750 |
+
2
|
| 1751 |
+
�
|
| 1752 |
+
i=1,2,3
|
| 1753 |
+
sin k∥ · ri,
|
| 1754 |
+
a2(k) = 2t′ sin kz
|
| 1755 |
+
2
|
| 1756 |
+
�
|
| 1757 |
+
i=1,2,3
|
| 1758 |
+
cos k∥ · ri
|
| 1759 |
+
gx(k) = gx0fxfy sin kz,
|
| 1760 |
+
gy(k) = gy0(f 2
|
| 1761 |
+
x − f 2
|
| 1762 |
+
y ) sin kz
|
| 1763 |
+
fx ≡ sin k∥ · e1 − sin k∥ · e2 + sin k∥ · e3
|
| 1764 |
+
2
|
| 1765 |
+
,
|
| 1766 |
+
fy ≡
|
| 1767 |
+
√
|
| 1768 |
+
3 sin k∥ · e2 − sin k∥ · e3,
|
| 1769 |
+
(B1)
|
| 1770 |
+
here (kx, ky, kz) are relative to the high symmetry point (0, 0, π). Relevant vectors ei and ri can be found in Fig.6.
|
| 1771 |
+
τi matrices live in the sublattice space. On the high-symmetry plane kz = 0, the inter-sublattice hopping a1,2 and
|
| 1772 |
+
the spin-flip SOC gx,y vanish. |k, m = 1, ↑⟩ and |k, m = 2, ↓⟩ states form a pseudospin band, while |k, m = 2, ↑⟩ and
|
| 1773 |
+
|k, m = 1, ↓⟩ states form another band.
|
| 1774 |
+
|
| 1775 |
+
22
|
| 1776 |
+
We now study spin susceptibilities. We will focus on a p-wave state in the E2u channel. Its d-vector is in-plane:
|
| 1777 |
+
d = ∆(T)(fx, −fy, 0). fx and fy are introduced in Eq.B1, and they transform as kx and ky. The gap magnitude is
|
| 1778 |
+
taken to be ∆(T) = ∆0
|
| 1779 |
+
�
|
| 1780 |
+
1 − T/Tc. t = 1, t3 = −4, gz0 = 2, µ = 12 and ∆0 = Tc = 0.001 is taken in the calculation.
|
| 1781 |
+
0
|
| 1782 |
+
0.2
|
| 1783 |
+
0.4
|
| 1784 |
+
0.6
|
| 1785 |
+
0.8
|
| 1786 |
+
1
|
| 1787 |
+
T/Tc
|
| 1788 |
+
0
|
| 1789 |
+
0.02
|
| 1790 |
+
0.04
|
| 1791 |
+
0.06
|
| 1792 |
+
0.08
|
| 1793 |
+
0.1
|
| 1794 |
+
t'=0, gx0=gy0=0
|
| 1795 |
+
x
|
| 1796 |
+
z
|
| 1797 |
+
0
|
| 1798 |
+
0.2
|
| 1799 |
+
0.4
|
| 1800 |
+
0.6
|
| 1801 |
+
0.8
|
| 1802 |
+
1
|
| 1803 |
+
T/Tc
|
| 1804 |
+
0
|
| 1805 |
+
0.02
|
| 1806 |
+
0.04
|
| 1807 |
+
0.06
|
| 1808 |
+
0.08
|
| 1809 |
+
0.1
|
| 1810 |
+
t'=0, gx0=gy0=0.1
|
| 1811 |
+
x
|
| 1812 |
+
z
|
| 1813 |
+
x,inter
|
| 1814 |
+
z,inter
|
| 1815 |
+
0
|
| 1816 |
+
0.2
|
| 1817 |
+
0.4
|
| 1818 |
+
0.6
|
| 1819 |
+
0.8
|
| 1820 |
+
1
|
| 1821 |
+
T/Tc
|
| 1822 |
+
0
|
| 1823 |
+
0.02
|
| 1824 |
+
0.04
|
| 1825 |
+
0.06
|
| 1826 |
+
0.08
|
| 1827 |
+
0.1
|
| 1828 |
+
t'=0.1, gx0=gy0=0
|
| 1829 |
+
x
|
| 1830 |
+
z
|
| 1831 |
+
x,inter
|
| 1832 |
+
z,inter
|
| 1833 |
+
FIG. 7. Spin susceptibilities as a function of temperature, for (left) a1 = a2 = gx = gy = 0, which would be the case if the
|
| 1834 |
+
Fermi surface exactly lied on the high-symmetry plane. (middle) non-zero spin-flip SOC but zero inter-sublattice hopping.
|
| 1835 |
+
(right) non-zero inter-sublattice hopping but zero spin-flip SOC.
|
| 1836 |
+
To illustrate the effect of the anomalous pseudospin, we start with a toy model with zero inter-sublattice hopping
|
| 1837 |
+
and spin-flip SOC: t′ = gx0 = gy0. The corresponding four terms vanish in the normal state Hamiltonian: a1 = a2 =
|
| 1838 |
+
gx = gy = 0. In this extreme case, the spin susceptibilities are unchanged across Tc, as shown in the left panel of
|
| 1839 |
+
Fig.7.
|
| 1840 |
+
We now turn on the spin-flip SOC (gx0 and gy0), while keeping the inter-sublattice hopping t′ to be zero. hxσx
|
| 1841 |
+
develops an intra-band component, which will be suppressed in the superconducting state. As a result, the total
|
| 1842 |
+
χx deep in the superconducting state starts to decrease as function of temperature. For χz, spin-flip SOC induces
|
| 1843 |
+
higher-order terms in the E2u channel. The d-vector develops non-zero z-component in the band basis. This causes
|
| 1844 |
+
a decrease in χz. The result for gx0 = gy0 can be found in the middle panel of Fig.7. The inter-band susceptibilities
|
| 1845 |
+
in the normal state are included in dashed lines.
|
| 1846 |
+
We now turn on the inter-sublattice hopping t′, while keeping the spin-flip SOC (gx0 and gy0) to be zero. A similar
|
| 1847 |
+
effect is expected for χx due to the intra-band contribution. For χz, since σz is a good quantum number, χz will be
|
| 1848 |
+
unchanged. The result can be found in the right panel of Fig.7.
|
| 1849 |
+
Experimentally, the superconducting state is known to be more robust under B ∥ x compared to B ∥ z. In other
|
| 1850 |
+
words, the decrease in χx needs to be smaller than χz. This scenario is closer to the second limit.
|
| 1851 |
+
|
| 1852 |
+
23
|
| 1853 |
+
Appendix C: 8-fold Representations
|
| 1854 |
+
Here, we list the symmetries of all orbital operators near the 8-fold degenerate points. The point group that keeps
|
| 1855 |
+
the TRIM point invariant can be found in the title. The bracket notation [·] is also used for antisymmetric operators
|
| 1856 |
+
which was τ2 in the main context, but in 8-fold cases, the antisymmtric component is not unique due to the higher
|
| 1857 |
+
degrees of freedom.
|
| 1858 |
+
Space group momenta
|
| 1859 |
+
Point group D2h
|
| 1860 |
+
54(U1U2)
|
| 1861 |
+
Ag + 2B1g + 2B2g + B3g + 2Au + B1u + B2u + [Ag] + [B3g] + [B1u] + [B2u] + 2[B3u]
|
| 1862 |
+
54(R1R2)
|
| 1863 |
+
Ag + 2B1g + 2B2g + B3g + 2Au + B1u + B2u + [Ag] + [B3g] + [B1u] + [B2u] + 2[B3u]
|
| 1864 |
+
56(U1U2)
|
| 1865 |
+
Ag + 2B1g + 2B2g + B3g + 2Au + B1u + B2u + [Ag] + [B3g] + [B1u] + [B2u] + 2[B3u]
|
| 1866 |
+
60(R1R2)
|
| 1867 |
+
Ag + 2B1g + 2B2g + B3g + Au + 2B2u + B3u + [Ag] + [B3g] + [Au] + 2[B1u] + [B3u]
|
| 1868 |
+
61(S1S2)
|
| 1869 |
+
Ag + 2B1g + 2B2g + B3g + Au + 2B1u + B3u + [Ag] + [B3g] + [Au] + 2[B2u] + [B3u]
|
| 1870 |
+
62(S1S2)
|
| 1871 |
+
Ag + 2B1g + 2B2g + B3g + Au + 2B1u + B3u + [Ag] + [B3g] + [Au] + 2[B2u] + [B3u]
|
| 1872 |
+
205(M1M2)
|
| 1873 |
+
Ag + 2B1g + 2B2g + B3g + Au + 2B1u + B3u + [Ag] + [B3g] + [Au] + 2[B2u] + [B3u]
|
| 1874 |
+
52(S1S2)
|
| 1875 |
+
Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
|
| 1876 |
+
56(T1T2)
|
| 1877 |
+
Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
|
| 1878 |
+
57(T1T2)
|
| 1879 |
+
Ag + 2B1g + B2g + 2B3g + Au + B2u + 2B3u + [Ag] + [B2g] + [Au] + 2[B1u] + [B2u]
|
| 1880 |
+
57(R1R2)
|
| 1881 |
+
Ag + 2B1g + B2g + 2B3g + Au + B2u + 2B3u + [Ag] + [B2g] + [Au] + 2[B1u] + [B2u]
|
| 1882 |
+
61(T1T2)
|
| 1883 |
+
Ag + 2B1g + B2g + 2B3g + Au + B2u + 2B3u + [Ag] + [B2g] + [Au] + 2[B1u] + [B2u]
|
| 1884 |
+
130(R1R2)
|
| 1885 |
+
Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
|
| 1886 |
+
138(R1R2)
|
| 1887 |
+
Ag + 2B1g + B2g + 2B3g + 2Au + B1u + B3u + [Ag] + [B2g] + [B1u] + 2[B2u] + [B3u]
|
| 1888 |
+
60(T1T2)
|
| 1889 |
+
Ag + B1g + 2B2g + 2B3g + 2Au + B2u + B3u + [Ag] + [B1g] + 2[B1u] + [B2u] + [B3u]
|
| 1890 |
+
60(U1U2)
|
| 1891 |
+
Ag + B1g + 2B2g + 2B3g + Au + B1u + 2B2u + [Ag] + [B1g] + [Au] + [B1u] + 2[B3u]
|
| 1892 |
+
61(U1U2)
|
| 1893 |
+
Ag + B1g + 2B2g + 2B3g + Au + B1u + 2B2u + [Ag] + [B1g] + [Au] + [B1u] + 2[B3u]
|
| 1894 |
+
62(R1R2)
|
| 1895 |
+
Ag + B1g + 2B2g + 2B3g + 2B1u + B2u + B3u + [Ag] + [B1g] + 2[Au] + [B2u] + [B3u]
|
| 1896 |
+
Space group momenta
|
| 1897 |
+
Point group D4h
|
| 1898 |
+
128(A3A4)
|
| 1899 |
+
A1g + A2g + 2B1g + 2B2g + A1u + A2u + 2B2u + [A1g] + [A2g] + [A1u] + [A2u] + 2[B1u]
|
| 1900 |
+
137(A3A4)
|
| 1901 |
+
A1g + A2g + 2B1g + 2B2g + A1u + A2u + 2B2u + [A1g] + [A2g] + [A1u] + [A2u] + 2[B1u]
|
| 1902 |
+
Space group momenta
|
| 1903 |
+
Point group C6h
|
| 1904 |
+
176(A2A3)
|
| 1905 |
+
Ag + Bg + E1g + E2g + Au + Bu + E1u + [Ag] + [Bg] + [Au] + [Bu] + [E2u]
|
| 1906 |
+
Space group momenta
|
| 1907 |
+
Point group D6h
|
| 1908 |
+
193(A3)
|
| 1909 |
+
A1g + B2g + E1g + E2g + A1u + B1u + E1u + [A2g] + [B1g] + [A2u] + [B2u] + [E2u]
|
| 1910 |
+
194(A3)
|
| 1911 |
+
A1g + B1g + E1g + E2g + A1u + B2u + E1u + [A2g] + [B2g] + [A2u] + [B1u] + [E2u]
|
| 1912 |
+
TABLE V. Symmetries of orbital operators at the 8-fold degenerate points.
|
| 1913 |
+
|
PtFJT4oBgHgl3EQfJCwC/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|