diff --git a/-NFAT4oBgHgl3EQfqB2B/content/tmp_files/2301.08644v1.pdf.txt b/-NFAT4oBgHgl3EQfqB2B/content/tmp_files/2301.08644v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..728e77c4d42c90bfc0200252cd213a163e212b7b --- /dev/null +++ b/-NFAT4oBgHgl3EQfqB2B/content/tmp_files/2301.08644v1.pdf.txt @@ -0,0 +1,5266 @@ +ANALYSIS OF THE SMOOTHLY AMNESIA-REINFORCED +MULTIDIMENSIONAL ELEPHANT RANDOM WALK +JIAMING CHEN AND LUCILE LAULIN +Abstract. In this work, we discuss the smoothly amnesia-reinforced multidimensional elephant +random walk (MARW). The scaling limit of the MARW is shown to exist in the diffusive, critical +and superdiffusive regimes. We also establish the almost sure convergence in all of the three +regimes. The quadratic strong law is displayed in the diffusive regime as well as in the critical +regime. The mean square convergence towards a non-Gaussian random variable is established +in the superdiffusive regime. Similar results for the barycenter process are also derived. Finally, +the last two Sections are devoted to a discussion of the convergence velocity of the mean square +displacement and the Cram´er moderate deviations. +Contents +1. +Introduction +1 +2. +The amnesia-reinforced elephant random walk +4 +3. +A correlated martingale approach +6 +4. +Scaling limit and convergence +7 +5. +Scaling limit of the barycenter process +13 +6. +Velocity of quadratic mean displacement +21 +7. +Cram´er moderate deviations +23 +Appendix A. +Technical Lemmas +24 +References +35 +1. Introduction +The study of reinforced processes and reinforced random walks has known a growing interest +over the last decades. In particular, random walks on graphs, or more precisely edge [37] or vertex +[39] reinforced random walks, have been the subject of a great number of contributions, see also +[1, 12, 27] and the references therein. The insight of introducing reinforcement mechanisms to +stochastic processes has also shed light on more applied models. In [30], the adaptive strategy of +an agent who plays a two-armed bandit machine was described as a self-reinforced random walk. +The philosophy of stochastic reinforcement has also been discussed in the topics of evolutionary +ecology [4] and machine learning theory [17]. Another manifestation of reinforced P´olya urn models +on financial economics can be found in [35]. We also refer the readers to [38] for a comprehensive +and extensive survey on the subject. +The Elephant Random Walk (ERW) is a discrete-time random walk, introduced by Sch¨utz and +Trimper [40] in 2004. It was referred to as the ERW in allusion to the traditional saying that +elephants can always remember anywhere they have been. As it was pointed out [12] by Bertoin +2010 Mathematics Subject Classification. 60G50, 60G42, 62M09. +Key words and phrases. Reinforced random walk, scaling limit, Cram´er moderate deviation, martingale. +1 +arXiv:2301.08644v1 [math.PR] 20 Jan 2023 + +2 +JIAMING CHEN AND LUCILE LAULIN +(a) Diffusive regime +(b) Critical regime +(c) Superdiffusive regime +Figure 1. The two-dimensional ERW with amnesia (in blue) and its barycenter +(in red). +who relied on K¨ursten’s work [29], the ERW is a special case of step-reinforced random walk. In +fact, the ERW is reinforced because its behavior is influenced by its past : the ERW may have +a tendency to do the same thing over and over, or on the contrary, it may try to compensate its +previous steps. This different types of behavior, here-called regimes, are ruled by the memory +parameter p and it is well-known that the ERW shows three regimes of behavior and that the +critical value is p = 3/4. +The ERW in dimension d = 1 has received a lot of attention from mathematicians and physicists +over the last two decades. +The almost sure convergence and the asymptotic normality of the +position of the ERW were established in the diffusive regime p < 3/4 and the critical regime +p = 3/4, see [3, 9, 16] and the references therein. In the superdiffusive regime p > 3/4, Bercu +[5] proved that the limit of the position of the ERW is not Gaussian and Kubota and Takei [28] +showed that the fluctuation of the ERW around this limit is Gaussian. To obtain those asymptotics, +various approaches have been followed : Baur and Bertoin [3] went with the connection to P´olya- +type urns while martingales were used by Bercu [5] and Coletti et al. [16] and the construction of +random trees with Bernoulli percolation have been explicited by K¨ursten [29] and Businger [13]. +Other quantities of interest regarding the ERW have been studied. For example, Fan et al. +[20] provided the Cramer moderate deviations associated with the ERW in dimension 1 and, more +recently, Hayashi et al. [26] studied the rate of quadratic mean displacement. +Bercu and Laulin [9] introduced the multidimensional ERW (MERW), where d ≥ 1, and estab- +lished the natural extensions of the results [5] in dimension d = 1. Then, they investigated the +center of mass of the MERW [8]. In both papers, they extensively used a martingale approach. +Bertenghi [10] made use of the connection to P´olya-type urns in order to establish functional +results for the MERW. +Finally, the ERW with changing memory has also been introduced. The ERW with linearly +reinforced memory has been studied by Baur [1] via the urn approach, and Laulin [31] using +martingales. Gut and Stadm¨uller [25] proposed an amnesic ERW where the elephant could stop +and only remember the first (and second) step it tooks. They also investigated the case where +the elephant only remembered a fixed or time-evolving portion of its past (recent or distant) +[24]. In the recent work [32], Laulin introduced smooth amnesia to the memory of the ERW and +established the asymptotic behavior of this new process. +The idea of our paper is to generalise the work [32] in dimension 1 to the dimension d ≥ 1. +In other words, we introduce smooth amnesia to the memory of the multidimensional elephant +random walk. + +40 +19 +30 +20 +10 +0 +-10 +-20 +0 +10 +20 +30 +40 +50 +60400 +300 +200 +100 +0 +0 +50 +100 +150 +200 +250 +35060 +50 +40 +30 +20 +10 +0 +0 +200 +400 +600 +800MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +3 +Our paper is organized as follows. In Section 2, we introduce the basic setting of the elephant +random walk (Sn)n∈N placed under an amnesia reinforcement mechanism, which is controlled +by the memory sequence (βn)n∈N. This type of multidimensional reinforced random walked is +named as the multidimensional amnesia-reinforced elephant random walk (MARW). Similar to +the ERW with the amnesia reinforcement, the MARW also admits a martingale structure, which +is discussed in Section 2. Unlike the usual ERW, the additional amnesia-reinforcement induces +two discrete-time martingales, instead of a single martingale, which are strongly correlated in a +nontrivial fashion. Such strong correlation of martingales will eventually pose some computational +difficulties when we analyze the limiting behavior of the MARW in Section 4. For instance, when +we compute the pointwise limit and the scaling limit of (Sn)n∈N in the diffusive regime, the two +strongly correlated martingales have to be dealt with separately, see [8, 31, 32] for the same +methodology. +As a courtesy to our readers, we give a preview of some of our main results, whose proofs will +be deferred to Theorem 4.1, Theorem 4.2, and Theorem 4.3. In the diffusive regime, we have the +almost sure convergence, +1 +nSn → 0 +as +n → ∞ +P − a.s. +Another logarithmic scaling to the MARW yields the quadratic strong law, +1 +log n +n +� +k=1 +SkST +k +k2 +→ C(p, (βn)n∈N) · 1 +dId +as +n → ∞ +P-a.s. +where the constant C(p, (βn)n∈N) > 0 depends only on the parameter p and the control sequence +(βn)n∈N of the amnesia-reinforcement. +Using square-root scaling factor, we observe that the +MARW also admits a scaling limit in the diffusive regime, or convergence in distribution, in the +Skorokhod space D(R+) of c`adl`ag functions, in the sense that +� 1 +√nS⌊nt⌋, t ≥ 0 +� +=⇒ +� +Wt, t ≥ 0 +� +where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process such that W0 = 0 and with +covariance structure given in (4.6). +It is also of interest to look at the barycenter process (Gn)n∈N of the MARW. Its definition as +well as its limiting behavior are discussed in Section 5. Similar to the discussion of the MARW, +we obtain its pointwise convergence, quadratic strong law, and its scaling limit. In particular, +Theorem 5.5 states that the barycenter process admits a scaling limit at the diffusive regime, or +convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that +� 1 +√nG⌊nt⌋, t ≥ 0 +� +=⇒ +� +1 +� +0 +Wtr dr, t ≥ 0 +� +where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process defined in Theorem 4.3 with +its covariance structure defined in (4.6). +A natural question to ask is how fast the limiting Theorems in Section 4 are carried on. Section +6 provides a quantitative estimate on the mean square convergence velocity of the pointwise limit, +quadratic strong law, and the scaling limit of the MARW. It should be possible to derive similar +convergence velocity to the barycenter process, which is not computed in this work. In Section +7, we end this work with a discussion on the Cram´er moderate deviations of the MARW in the +diffusive and critical regimes. As a preview of our result in this Section, let (ϑn)n∈N ⊆ R be a +non-decreasing sequence so that ϑn/√n → 0 as n → ∞, and wn the sequence with asymptotic + +4 +JIAMING CHEN AND LUCILE LAULIN +behavior described in Lemma A.1. Take any non-empty Borel set B ⊆ Rd, then we have +− +inf +x∈int B +1 +2∥x∥2 ≤ lim inf +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≤ lim sup +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≤ − inf +x∈cl B +1 +2∥x∥2, +(1.1) +where int B and cl B denote the interior and the closure of B ⊆ Rd, respectively. This is the +Cram´er moderate deviations for the MARW in the diffusive and critical regimes. +Moreover, we chose to postpone some technicalities regarding the analysis of the random walk +to the Appendix A. That way, the reader can focus on the main Theorems and the ideas of their +proofs. However, some analogous technicalities are displayed in the proof of the Theorems on the +barycenter such that the reader can also have a complete overview of the work needed. +Other probabilistic aspects of interest to the MARW include the statistical inference and an +analysis on the Fisher information, see [7], as well as the Wasserstein distance of the reinforced +random walk, see [21]. Perturbations of the amnesia intensity and its stability for the MARW is +also of independent interest. A similar topic for another type of stochastic process, the Schramn- +Loewner evolution, has been considered in [2, 15]. The transience and recurrence property of the +MARW remains unknown, to the best of our knowledge. Readers are referred to [11, 20] for an +exposition on the ERW without the amnesia reinforcement mechanism. +2. The amnesia-reinforced elephant random walk +To begin with, let us properly introduce the MARW. It is the natural extension to higher +dimensions of the one-dimensional MARW, defined in [31]. For an arbitrarily given dimension +d ≥ 1, let (Sn)n∈N be a (reinforced) random walk on Zd starting from the origin at time n = 0, +i.e. S0 = 0. At time n = 1, the reinforced random walk moves to one of the 2d nearest-neighbors +with equal probability 1/2d. After that, at time n ≥ 1, the reinforced random walk chooses at +random an integer 1 ≤ k ≤ n among the past times and performs the same step with probabily p, +or goes in any of the 2d − 1 other directions with probability (1 − p)/(2d − 1). This random walk +possesses the amnesia property, in the sense that it remembers its most recent past steps better +than its remote past steps. Colloquially, this random walk has higher probability to choose its +recent steps than its earlier steps. +From a mathematical perspective, the position of this reinforced random walk at time n+1 ≥ 1 +is given by +Sn+1 = Sn + Xn+1 +with Xn+1 being defined as the step of this random walk at time n + 1, satisfying +Xn+1 = An+1Xβn+1. +Here An+1 is a random d × d matrix given by +P(An = +Id) = p, +and, for all 1 ≤ k ≤ d − 1, +P(An = −Id) = P(An = +Jk +d ) = P(An = −Jk +d ) = 1 − p +2d − 1 +where Id is the identity matrix of order d, Id = (δi,j)d and Jd = C(0, 1, 0, . . . , 0) is the circulant +matrix of order d such that J = (δi+1,j)d. It is easy to observe that the fixed permutation matrix +Jd satisfied Jd +d = Id. The distribution of the memory βn of the reinforced random walk is such + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +5 +that the probability of choosing a fixed past time k ∈ N decays approximately with rate kβ/nβ+1, +where β ≥ 0 is the amnesia parameter. +(a) n = 10 +(b) n = 100 +Figure 2. Evolution of the distribution of the memory β depending on the value +of β and the time. +To be precise, this random walk chooses βn+1 according to +P +� +βn+1 = k +� += (β + 1)Γ(β + k)Γ(n) +Γ(k)Γ(β + n + 1) += β + 1 +n +· +µk +µn+1 +for all +1 ≤ k ≤ n, +where +µn = +n−1 +� +k=1 +� +1 + β +k +� += +Γ(β + n) +Γ(n)Γ(β + 1). +(2.1) +(a) d = 1 +(b) d = 2 +(c) d = 3 +(d) d = 10 +Figure 3. Competition between the dimension and the amnesia. +Figure 3 aims to give a better understanding on how amnesia affects the MARW in various +dimensions. The horizontal axis corresponds to p (from 0 to 1) and the vertical axis corresponds to +β (from 0 to 10, arbitrary chosen). The diffusive regime, ie. when p < 4dβ+2d+1 +4d(β+1) +or a < 1− +1 +2(β+1), +is in blue while the superdiffusive regime is in red, see Lemma A.1 for the definition of the regimes. +One can observe that when the amnesia parameter β grows, the superdiffusive regime tends to be +less represented. It should also be noted that when the dimension grows the superdiffusive regime +is more important. Hence, the amnesia is somehow leading the MARW to a behavior closer to +the one in dimension 1. When β vanishes, i.e. β = 0, the MARW reduces to the multidimensional +elephant random walk (MERW) introduced in [9]. +The two random variables An and βn are constructed to be conditionally independent. At each +time n, define the σ-algebra Fn = σ(X1, . . . , Xn). Then (Fn)n∈N is a discrete-time filtration to +which the MARW is clearly adapted. + +β= 0 +0.5 +β= 1 +β= 2 +0.4 +β= 5 +β= 10 +0.3 +0.2 +0.1 +0.0 +2 +4 +9 +00 +100.10 +β= 0 +β= 1 +0.08 +β= 2 +β= 5 +0.06 +β= 10 +0.04- +0.02 +0.00 +0 +20 +40 +60 +80 +10010 +8 - +6 +4 +2 - +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +p10 +8 - +6 +B +4 ++0 +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +p10 +8 - +6 +B +4 +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +p10 +8 - +6 +B +4 ++0 +0.0 +0.2 +0.4 +0.6 +0.8 +1.0 +p6 +JIAMING CHEN AND LUCILE LAULIN +Since An and βn are conditionally independent, we clearly have +E +� +Xn+1|Fn +� += E +� +An +� +E +� +Xβn+1|Fn +� += 2dp − 1 +2d − 1 E +� +n +� +k=1 +Xk1{βn+1=k}|Fn +� += 2dp − 1 +2d − 1 · β + 1 +nµn+1 +n +� +k=1 +µkXk. +(2.2) +We further denote +a = 2dp − 1 +2d − 1 +and +Yn = +n +� +k=1 +µkXk +(2.3) +such that +E +� +Yn+1|Fn +� += +� +1 + a(β + 1) +n +� +Yn = γnYn +with γn = 1 + a(β + 1)/n. Hereafter, for each n ≥ 1, let +an = +n−1 +� +k=1 +γ−1 +k += Γ(n)Γ(a(β + 1) + 1) +Γ(a(β + 1) + n) +and +wn = +n +� +k=1 +(akµk)2. +(2.4) +From a Gamma function estimate, also see in [31], we have that +na(β+1)an → Γ(a(β + 1) + 1) +as +n → ∞ +(2.5) +and +n−βµn → Γ(β + 1)−1 +as +n → ∞. +(2.6) +3. A correlated martingale approach +Define the following two Rd-valued processes by +Mn = anYn +and +Nn = Sn + +a(β + 1) +β − a(β + 1)µ−1 +n Yn. +(3.1) +Proposition 3.1. The Rd-valued processes (Mn)n∈N and (Nn)n∈N defined in (3.1) are locally +square-integrable martingales adapted to (Fn)n∈N. +Proof. Since, both Mn and Nn are finite sums for each n ≥ 1, the square-integrability and adapt- +ness are immediate. By (2.3) and (2.4), we have +E +� +Mn+1|Fn +� += anγ−1 +n Yn + anµnγ−1 +n E +� +Xn+1|Fn +� += anYn. +And by (2.2), we have +E +� +Nn+1|Fn +� += E +� +Sn+1 + +a(β + 1) +β − a(β + 1)µ−1 +n+1Yn+1|Fn +� += Sn + +a(β + 1) +β − a(β + 1)µ−1 +n Yn. +Hence the assertion is verified. +□ +Notice that via introducing the martingales (Mn)n∈N and (Nn)n∈N, we can write Sn as +Sn = Nn − +a(β + 1) +β − a(β + 1)(anµn)−1Mn. +(3.2) +This writing is the key on which rely all of our analysis and our martingale approach. +Moreover, the asymptotic behavior of (Mn)n∈N is closely related to wn defined in (2.4). In fact, +we have the following asymptotic result, which states the three regimes of the MARW. +Lemma 3.1. In the diffusive regime when p < 4dβ+2d+1 +4d(β+1) +or a < 1 − +1 +2(β+1), we have +wn +n1−2(a(β+1)−β) → l(β) +as +n → ∞ +(3.3) + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +7 +with +l(β) = +1 +1 + 2(β − a(β + 1)) +�Γ(a(β + 1) + 1) +Γ(β + 1) +�2 +. +In the critical regime when p = 4dβ+2d+1 +4d(β+1) +or a = 1 − +1 +2(β+1), we have +wn +log n → +�Γ(β + 1 + 1 +2) +Γ(β + 1) +�2 +as +n → ∞. +(3.4) +In the superdiffusive regime when p > 4dβ+2d+1 +4d(β+1) +or a > 1 − +1 +2(β+1), we have +wn → +∞ +� +k=1 +�Γ(a(β + 1) + 1)Γ(β + k) +Γ(a(β + 1) + k)Γ(β + 1) +�2 +< ∞ +as +n → ∞. +(3.5) +In order to investigate the asymptotic behavior of (Sn)n∈N, we first introduce an arbitrarily +fixed test non-zero vector u ∈ Rd and we define +Mn(u) = uT Mn +and +Nn(u) = uT Nn +for each +n ∈ N. +It is then clear that (Mn(u))n∈N (Nn(u))n∈N are real-valued locally square-integrable martingales +for each fixed u ∈ Rd. +We further infer that (Sn(u))n∈N satisfies an equation analogous to (3.2). In +this setting, we have reduced the multidimensional martingales to real-valued martingales without +loss of generality. This technique greatly simplifies our martingale analysis. From now on, we fix +the test vector u ∈ Rd and we introduce the two-dimensional martingale (Ln(u))n∈N defined as +Ln(u) = +� +Nn(u) +Mn(u) +� +for each +n ∈ N. +(3.6) +Denote the martingale increment ϵn+1 = Yn+1 − γnYn for each n. +Then (ϵn)n∈N satisfies the +martingale difference relation E[ϵn+1|Fn] = 0. We obtain that +∆Ln+1(u) = Ln+1(u) − Ln(u) = +� +Sn+1(u) − Sn(u) + +a(β+1) +β−a(β+1) +� +µ−1 +n+1Yn+1(u) − µ−1 +n Yn(u) +� +an+1Yn+1(u) − anYn(u) +� += +� +βµ−1 +n+1 +β−a(β+1) +� +µn+1Xn+1(u) − (γn − 1)Yn(u) +� +an+1ϵn+1(u) +� += +� +βµ−1 +n+1 +β−a(β+1) +an+1 +� +ϵn+1(u). +(3.7) +4. Scaling limit and convergence +In this section, we discuss the scaling limit as well as the almost sure convergence in the +diffusive, critical and the superdiffusive regimes, depending on the value of p with respect to +(4dβ +2d+1)/(4d(β +1)). We also give the quadratic strong law in the diffusive regime as well as +in the critical regime. Afterwards, the mean square convergence is established in the superdiffusive +regime. +4.1. The diffusive regime. +Theorem 4.1. We have the almost sure convergence +1 +nSn → 0 +as +n → ∞ +P-a.s. + +8 +JIAMING CHEN AND LUCILE LAULIN +Proof. We have from [18, Theorem 4.3.15] again that, for all γ > 0, +∥Mn∥2 +λmax⟨M⟩n += o +�� +log Tr⟨M⟩n +�1+γ� +P-a.s. +(4.1) +From equation (A.9) and the fact that λmax⟨M⟩n ≤ Tr⟨M⟩n ≤ wn, we get +∥Mn∥2 = o +� +wn +� +log wn +�1+γ� +P-a.s. +(4.2) +By (3.3), we observe +∥Mn∥2 = o +� +n1−2(a(β+1)−β)� +log n +�1+γ� +P-a.s. +Since Mn = anYn, we have from equations (2.5) and (2.6) +∥Yn∥2 +(nµn+1)2 = o +� +n−1� +log n +�1+γ� +P-a.s. +which implies +Yn +nµn+1 +→ 0 +as +n → ∞ +P-a.s. +By (A.10) and [18, Theorem 4.3.15] again, we find that +∥Nn∥2 = o +� +n +� +log n +�1+γ� +P-a.s. +(4.3) +Moreover, we obtain from equation (3.2) +1 +n2 +����Sn + +a(β + 1) +(β − a(β + 1))µn+1 +Yn +���� +2 += o +� +n−1� +log n +�1+γ� +P-a.s. +Hence, we conclude that +Sn +n + +a(β + 1) +β − a(β + 1) · +Yn +nµn+1 +→ 0 +as +n → ∞ +P-a.s. +and the proof is complete. +□ +Theorem 4.2. We have the quadratic strong law +1 +log n +n +� +k=1 +SkST +k +k2 +→ +2β + 1 − a +(1 − a)(1 − 2(a(β + 1) − β)) · 1 +dId +as +n → ∞ +P-a.s. +Proof. We will check that all the conditions of [32, Theorem A.3] are satisfied, see also [14, 41]. +The condition (H.1) is satisfied thanks to Lemma A.4 while the condition (H.2) directly follows +from Lemma A.5 and the condition (H.4) is exactly the statement of Lemma A.7. Therefore, +1 +log +� +det V −1 +n +�2 +n +� +k=1 +�(det Vk)2 − (det Vk+1)2 +(det Vk)2 +� +VkLk(u)Lk(u)T V T +k → 1 +duT uVt=1 +as n → ∞ P-a.s. On the one hand, we have from (A.24) that +1 +log n +n +� +k=1 +�(det Vk)2 − (det Vk+1)2 +(det Vk)2 +� +VkLk(u)Lk(u)T V T +k → 2(1 − a)(β + 1) +d +uT uVt=1 +(4.4) +as n → ∞ P-a.s. On the other hand, by (2.5), (2.6) and (A.24), we have +n +�(det Vn)2 − (det Vn+1)2 +(det Vn)2 +� +→ 2(1 − a)(β + 1) +as +n → ∞ +P-a.s. +Finally, we obtain from (A.17) and (4.4) that +1 +log n +n +� +k=1 +uT SkST +k u +k2 += +1 +log n +n +� +k=1 +vT VkLk(u)Lk(u)T V T +k v +k +→ vT Vt=1v · 1 +duT u +(4.5) + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +9 +as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (4.5). +□ +Theorem 4.3. The MARW admits a scaling limit at the diffusive regime, or convergence in +distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that +� 1 +√nS⌊nt⌋, t ≥ 0 +� +=⇒ +� +Wt, t ≥ 0 +� +where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process such that W0 = 0 and with +covariance +E +� +WsW T +t +� += +a(β + 1)(1 − a) + aβ +(2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a)s +� t +s +�a−β(1−a) +· 1 +dId ++ +β +(β(1 − a) − a)(1 − a)s · 1 +dId +for all +0 ≤ s ≤ t < ∞. +(4.6) +Proof. We will check that all the conditions of [32, Theorem A.2] are satisfied, see also [14, 41]. +The condition (H.1) is satisfied thanks to Lemma A.4 while the condition (H.2) directly follows +from Lemma A.5 and the condition (H.3) is exactly the statement of Lemma A.6. Consequently, +we have the convergence in distribution in the Skorokhod space D(R+) such that +� +VnL⌊nt⌋(u), t ≥ 0 +� +=⇒ +� +Wt(u), t ≥ 0 +� +where (Wt(u))t≥0 is a continuous R2-valued centered Gaussian process such that W0 = 0 and with +covariance +E +� +Ws(u)Wt(u)T � += 1 +duT uVs +for all +0 ≤ s ≤ t < ∞. +From (2.5), (2.6), and (3.2), we see that S⌊nt⌋(u) is asymptotically equivalent to +N⌊nt⌋(u) + tβ−a(β+1) +a(β + 1) +β − a(β + 1)(anµn)−1M⌊nt⌋(u) +P-a.s. +Multiplying on the left side by vt = (1, ta(β+1)−β)T , we obtain +� 1 +√nS⌊nt⌋(u), t ≥ 0 +� +=⇒ +� +Wt(u), t ≥ 0 +� +with Wt(u) = vT +t Wt(u). Hereafter, when 0 ≤ s ≤ t < ∞, we have the covariance +E +� +Ws(u)Wt(u)T � += vT +s E +� +Ws(u)Wt(u)T � +vt = 1 +d(uT u)vT +s Vsvt. +(4.7) +Solving (4.7), we have +E +� +WsW T +t +� += 1 +dvT +s Vsvt +for all +0 ≤ s ≤ t < ∞ +and the assertion (4.6) is verified. +□ +4.2. The critical regime. +Theorem 4.4. We have the almost sure convergence +1 +√n log nSn → 0 +as +n → ∞ +P-a.s. +Proof. We still have (4.1) and (4.2) such that +∥Mn∥2 = o +� +wn +� +log wn +�1+γ� +for all +γ > 0 +P-a.s. +However, in the critical regime, we have (3.4) rather than (3.3), and +wn +log n → +�Γ(β + 1 + 1 +2) +Γ(β + 1) +�2 +as +n → ∞. + +10 +JIAMING CHEN AND LUCILE LAULIN +Since (2.5), (2.6), and since Mn = anYn, we observe for all γ > 0 that +∥Yn∥2 +n(log n)2µ2n += o +� +(log n)−1� +log log n +�1+γ� +P-a.s. +In this regard +Yn +√n log nµn +→ 0 +as +n → ∞ +P-a.s. +(4.8) +Similarly, we still have (A.10) and +∥Nn∥2 = o +� +n +� +log n +�1+γ� +for all +γ > 0 +P-a.s. +Then +∥Nn∥2 +n(log n)2 = o +� +(log n)γ−1� +for all +γ ∈ (0, 1) +P-a.s. +and therefore +Nn +√n log n → 0 +as +n → ∞ +P-a.s. +By (3.2), we can hereafter conclude that +Sn +√n log n + +a(β + 1) +β − a(β + 1) · +Yn +√n log nµn +→ 0 +as +n → ∞ +P-a.s. +Combining with (4.8), the assertion is verified. +□ +Theorem 4.5. We have the quadratic strong law +1 +log log n +n +� +k=1 +SkST +k +(k log k)2 → (2β + 1)2 · 1 +dId +as +n → ∞ +P-a.s. +Proof. We will check that all the conditions of [32, Theorem A.3] are satisfied. The condition +(H.1) is satisfied thanks to Lemma A.8 while the condition (H.2) directly follows from Lemma +A.9 and the condition (H.4) is exactly the statement of Lemma A.10. Therefore, +1 +log +� +det W −1 +n +�2 +n +� +k=1 +�(det Wk)2 − (det Wk+1)2 +(det Wk)2 +� +WkLk(u)Lk(u)T W T +k → 1 +duT uW +(4.9) +as n → ∞ P-a.s. On the one hand, we have from (A.34) +1 +log log n +n +� +k=1 +�(det Wk)2 − (det Wk+1)2 +(det Wk)2 +� +WkLk(u)Lk(u)T W T +k → 1 +duT uW +as n → ∞ P-a.s. On the other hand, by (2.5), (2.6), and (A.33), we have +n log n +�(det Wk)2 − (det Wk+1)2 +(det Wk)2 +� +→ (2β + 1)2 +as +n → ∞ +P-a.s. +Then, we obtain from (A.17) and (4.9) that +1 +log log n +n +� +k=1 +uT SkST +k u +(k log k)2 = +1 +log log n +n +� +k=1 +wT WkLk(u)Lk(u)T W T +k w +k log k +→ (2β + 1)2 +d +uT u +(4.10) +as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (4.10). +□ +Theorem 4.6. The MARW admits a scaling limit at the critical regime, or convergence in dis- +tribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that +� +1 +� +nt log n +S⌊nt⌋, t ≥ 0 +� +=⇒ +� +(2β + 1)Bt, t ≥ 0 +� + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +11 +where (Bt)t≥0 is a continuous d-dimensional canonical Brownian motion with covariance +E +� +BsBT +t +� += s · 1 +dId +for all +0 ≤ s ≤ t < ∞. +Proof. We will check that all the three conditions of [32, Theorem A.2] are satisfied, see also [42, +Theorem 1]. First of all, by (3.4) and (A.7) we know that +w−1/2 +n +⟨M(u)⟩⌊nt⌋w−1/2 +n +→ t +d · uT u +as +n → ∞ +P-a.s. +(4.11) +Hence the condition (H.1) is satisfied. Notice that +⌊nt⌋ +� +k=1 +1 +wn +E +� +∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1 +� +≤ +⌊nt⌋ +� +k=1 +�w⌊nt⌋ +wn +�2 +1 +ϵ2w2 +⌊nt⌋ +E +� +∆Mk(u)4|Fk−1 +� +, +(4.12) +since (2.5), (2.6), and (A.21), we observe that +⌊nt⌋ +� +k=1 +��∆Mk(u)4�� ≤ C1(β)∥u∥4 +⌊nt⌋ +� +k=1 +(akµk)4 ≤ C2(β)∥u∥4 +⌊nt⌋ +� +k=1 +1 +k2 +P-a.s. +(4.13) +with constants C1(β), C2(β) > 0. Therefore, by (4.12) and (4.13), we have +⌊nt⌋ +� +k=1 +1 +wn +E +� +∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1 +� +≤ C3(β)∥u∥4 · t2 +ϵ2 · +1 +nt(log nt)2 +P-a.s. +Simplifying the above expression, we obtain +⌊nt⌋ +� +k=1 +1 +wn +E +� +∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1 +� +→ 0 +as +n → ∞ +P-a.s. +(4.14) +Then the condition (H.2), or the Lindeberg condition, is satisfied by (4.14). In this particular case +at critical regime, (4.11) implies that the condition (H.3) is satisfied. Hence +� +1 +√wn +M⌊nt⌋(u), t ≥ 0 +� +=⇒ +� +Bt(u), t ≥ 0 +� +where (Bt(u))t≥0 is a continuous real-valued centered Gaussian process such that B0(u) = 0 and +with covariance +E +� +Bs(u)Bt(u) +� += s +d · uT u +for all +0 ≤ s ≤ t < ∞. +In the critical regime, from (3.2) we can write +S⌊nt⌋(u) = N⌊nt⌋(u) + (2β + 1) M⌊nt⌋(u) +a⌊nt⌋µ⌊nt⌋ +. +(4.15) +From (A.8) we know that +⟨N(u)⟩⌊nt⌋ +nt log n +→ 0 +and +N⌊nt⌋(u) +� +nt log n +→ 0 +as +n → ∞ +P-a.s. +(4.16) +Using (2.5), (2.6), and (3.4) again, we conclude that +� +1 +� +nt log n +S⌊nt⌋(u), t ≥ 0 +� +=⇒ +� +(2β + 1)Bt(u), t ≥ 0 +� +with +E +� +Bs(u)Bt(u) +� += s · uT u +d +for all +0 ≤ s ≤ t. +(4.17) +Solving (4.17), we get +E +� +BsBT +t +� += s · 1 +dId +for all +0 ≤ s ≤ t. + +12 +JIAMING CHEN AND LUCILE LAULIN +which completes the proof. +□ +4.3. The superdiffusive regime. +Theorem 4.7. We have the almost sure convergence +1 +na(β+1)−β Sn → Lβ +as +n → ∞ +P-a.s. +where the limiting Lβ is an Rd-valued random variable. +Remark 4.1. In fact, from Theorem 4.8 below, we will see the random vector Lβ is non-degenerate. +Proof. From (3.5) and (A.7), in the superdiffusive regime, we have +Tr⟨M⟩n ≤ wn ≤ +∞ +� +k=1 +�Γ(a(β + 1) + 1)Γ(β + k) +Γ(a(β + 1) + k)Γ(β + 1) +�2 +< ∞ +for all +n ∈ N. +By [18, Theorem 4.3.15], this leads to +Mn → M +as +n → ∞ +P-a.s. +with +M = +∞ +� +k=1 +akϵk. +By (3.1), Mn = anYn, and by (2.5), we observe that +Yn +na(β+1) → +1 +Γ(a(β + 1) + 1)M +as +n → ∞ +P-a.s. +(4.18) +Moreover, equations (4.3) still holds and, as 2a(β + 1) > 2β + 1 in the superdiffusive regime, we +find that +1 +n2(a(β+1)−β) +����Sn + +a(β + 1) +(β − a(β + 1))µn+1 +Yn +���� +2 += o +� +n−(1−2a(β+1)+2β)� +log n +�1+γ� +P-a.s. +Thanks to (2.6), we obtain +Sn +na(β+1)−β + +a(β + 1) +β − a(β + 1) · Γ(β + 1)Yn +na(β+1) +→ 0 +as +n → ∞ +P-a.s. +(4.19) +Combining (4.18), it yields +Sn +na(β+1)−β → Lβ +as +n → ∞ +P-a.s. +where +Lβ = +a(β + 1) +a(β + 1) − β · +Γ(β + 1) +Γ(a(β + 1) + 1)M +(4.20) +and the assertion follows. +□ +Theorem 4.8. We have the following mean square convergence +E +����� +1 +na(β+1)−β Sn − Lβ +���� +2� +→ 0 +as +n → ∞. +(4.21) +Proof. For each test vector u ∈ Rd, we have +E +� +Mn(u)2� += E +� +⟨M(u)⟩n +� +≤ 1 +dwnuT u +for all +n ∈ N. +From (3.5), we obtain +sup +n≥1 +E +� +Mn(u)2� +< ∞ +which implies that (Mn(u))n∈N is a martingale bounded in L2. Therefore +E +� +|Mn(u) − M(u)|2� +→ 0 +as +n → ∞. +(4.22) + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +13 +Moreover, on the one hand (4.22) together with (4.18) implies that +E +����� +1 +na(β+1) Yn(u) − Y (u) +���� +2� +→ 0 +as +n → ∞. +(4.23) +On the other hand, from (A.8) we know that +E +� +Nn(u)2� += E +� +⟨N(u)⟩n +� +≤ 1 +d +� +β +β − a(β + 1) +�2 +nuT u +for all +n ∈ N. +Since a(β + 1) > β + 1 +2 in the superdiffusive regime, we have +E +����� +1 +na(β+1)−β Nn(u) +���� +2� +→ 0 +as +n → ∞. +(4.24) +The proof is complete by combining (4.23) and (4.24). +□ +Remark 4.2. The expected value of Lβ is +E +� +Lβ +� += 0 +(4.25) +whereas its quadratic deviation is +E +� +LβLT +β +� += +� +a(β + 1) +β − a(β + 1) +�2 Γ(β + 1)2Γ(2(a − 1)(β + 1) + 1) +Γ((2a − 1)(β + 1) + 1)2 +· 1 +dId. +(4.26) +Theorem 4.9. The MARW admits a scaling limit at the superdiffusive regime, or convergence in +distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that +� +1 +na(β+1)−β S⌊nt⌋, t ≥ 0 +� +=⇒ +� +Qt, t ≥ 0 +� +(4.27) +with the limiting Qt = ta(β+1)−βLβ for all t ≥ 0. +Proof. For all t ≥ 0 and from (4.19), we observe that +S⌊nt⌋ +⌊nt⌋a(β+1)−β + +a(β + 1) +β − a(β + 1) · +Y⌊nt⌋ +⌊nt⌋a(β+1) → 0 +as +n → ∞ +P-a.s. +which implies +1 +na(β+1)−β Sn → ta(β+1)−βLβ +as +n → ∞ +P-a.s. +(4.28) +The P-a.s. convergence in (4.28)holds in all finite-dimensional distributions which characterizes +the Skorokhod space topology. Hence, we have (4.27) and the assertion is verified. +□ +5. Scaling limit of the barycenter process +The study of the scaling limit of the MARW (Sn)n∈N gives us some information on its asymptotic +behavior. +Nonetheless, to understand its pathwise geometric features, we need to discuss its +barycenter, or center of mass process. Such topics have been raised and discussed in [36, 43]. In +this Section, we turn our attention to the above-mentioned barycenter process (Gn)n∈N defined +by +Gn := 1 +n +n +� +k=1 +Sk +(5.1) +Our work contains the discussion on the scaling limit and the almost sure convergence in the +diffusive, critical and superdiffusive regimes. The quadratic strong law in the diffusive and crit- +ical regimes is also discussed while the mean square convergence in the superdiffusive regime is +established. + +14 +JIAMING CHEN AND LUCILE LAULIN +5.1. Almost sure convergence. The barycenter process was discussed in [8] for the elephant +random walk in dimension d, which is a special case of the process we study here when β = 0. We +first begin with the almost sure convergence. +Theorem 5.1. We have the almost sure convergence, in the diffusive regime, +1 +nGn → 0 +as +n → ∞ +P-a.s. +(5.2) +while in the critical regime, +1 +√n log nGn → 0 +as +n → ∞ +P-a.s. +(5.3) +and, in the superdiffusive regime, +1 +na(β+1)−β Gn → +1 +1 + a(β + 1) − β Lβ +as +n → ∞ +P-a.s. +(5.4) +where Lβ was characterized in Theorems 4.7 and 4.2. +Proof. In the diffusive regime, from (5.1) we observe that +1 +nGn = +n +� +k=1 +k +n2 · 1 +k Sk = +n +� +k=1 +1 +k Ska′ +n,k +with +a′ +n,k = k +n2 . +Since �n +k=1 a′ +n,k ≤ 1 for all n ∈ N and the almost sure convergence in Theorem 4.1, from Lemma +A.12 we can conclude that +1 +nGn = +n +� +k=1 +1 +k Ska′ +n,k → 0 +as +n → ∞ +P-a.s. +such that (5.2) is verified. In the critical regime, we have from (5.1) that +1 +√n log nGn = +1 +n3/2 log n +n +� +k=1 +Sk = +n +� +k=1 +1 +√ +k log k +Ska′′ +n,k +with +a′′ +n,k = k1/2 log k +n3/2 log n. +Since �n +k=1 a′′ +n,k ≤ 1 for all n ∈ N and the almost sure convergence in Theorem 4.4 holds, we get +from Lemma A.12 hat +1 +√n log nGn = +n +� +k=1 +1 +√ +k log k +Ska′′ +n,k → 0 +as +n → ∞ +P-a.s. +and we obtain (5.3). Finally, in the superdiffusive regime, we also get from (5.1) that +1 +na(β+1)−β Gn = +1 +n1+a(β+1)−β +n +� +k=1 +Sn = +n +� +k=1 +1 +ka(β+1)−β Ska′′′ +n,k +with +a′′′ +n,k = +ka(β+1)−β +n1+a(β+1)−β . +Since +n +� +k=1 +a′′′ +n,k → +1 +1 + a(β + 1) − β +as +n → ∞ +by a simple calculation, and because of the almost sure convergence in Theorem 4.7, we can +conclude using Lemma A.13 +1 +na(β+1)−β Gn → +1 +1 + a(β + 1) − β Lβ +as +n → ∞ +P-a.s. +and (5.4) is verified. +□ +5.2. Quadratic strong law. + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +15 +Theorem 5.2. In the diffusive regime, we have the quadratic strong law +1 +log n +n +� +k=1 +GkGT +k +k2 +→ 4I(a, β) · 1 +dId +as +n → ∞ +P-a.s. +where I(a, β) is given explicitly +I(a, β) = +1 +Γ(a(β + 1) + 1)2Γ(β + 1)2 · +2a2(1 − a)(β + 1)3 +3(β − a(β + 1))2(1 − a(β + 1) + β). +Proof. We will check that all the three conditions of [32, Theorem A.2] are satisfied. Looking back +to (5.1), we observe that +Gn = 1 +n +n +� +k=1 +Nk − 1 +n +a(β + 1) +β − a(β + 1) +n +� +k=1 +1 +akµk +Mk = 1 +n +n +� +k=1 +Nk − 1 +n +a(β + 1) +β − a(β + 1) +n +� +k=1 +1 +akµk +k +� +l=1 +alϵl. +Then, changing the order of summation, we have +Gn = 1 +n +n +� +k=1 +Nk − 1 +n +a(β + 1) +β − a(β + 1) +n +� +k=1 +akϵk +n +� +l=k +1 +alϵl += 1 +n +n +� +k=1 +Nk − 1 +n +a(β + 1) +β − a(β + 1) +n +� +k=1 +ak(δn − δk−1)ϵk +where we define δn = �n +k=1(akµk)−1 for all n ∈ N. Moreover, we denote +Zn = +n +� +k=1 +Nk − +a(β + 1) +β − a(β + 1) +n +� +k=1 +akδk−1ϵk. +such that we have +Gn = 1 +nZn − δn +n · +a(β + 1) +β − a(β + 1) +n +� +k=1 +akϵk = 1 +n +� +Zn − +a(β + 1) +β − a(β + 1)δnMn +� +. +For a fixed text vector u ∈ Rd, we define +Hn(u) = +� +Zn(u) +Mn(u) +� +for all +n ∈ N. +(5.5) +which implies +∆Hn(u) = Hn+1(u) − Hn(u) = +� +Nn+1(u)ϵn+1(u)−1 − +a(β+1) +β−a(β+1)an+1δn +an+1 +� +ϵn+1(u). +Then, let +Vn = +1 +n3/2 +� +1 +0 +0 +a(β+1) +β−a(β+1)δn +� +and +v = +� +1 +−1 +� +. +Then it is immediate that +vT VnHn(u) = +1 +√nGn +for all +n ∈ N +(5.6) +and that +lim +n→∞ Vn⟨H(u)⟩nV T +n = lim +n→∞ +1 +n3 +� +1 +−1 +−1 +1 +� n−1 +� +k=1 +� +a(β + 1) +β − a(β + 1) +�2 +δ2 +ka2 +k+1E +� +ϵk+1(u)2|Fk +� += lim +n→∞ +1 +n3 · +a2(1 − a)(β + 1)3uT u +d(β − a(β + 1))2(1 − a(β + 1) + β) +� +1 +−1 +−1 +1 +� n−1 +� +k=1 +δ2 +ka2 +k+1µ2 +k+1 +P-a.s. + +16 +JIAMING CHEN AND LUCILE LAULIN +By (2.5) and (2.6), we know that +n−(1+a(β+1)−β)δn → +1 +1 + a(β + 1) − β · +1 +Γ(a(β + 1) + 1)Γ(β + 1) +as +n → ∞. +Hence the above calculation leads us to +Vn⟨H(u)⟩nV T +n → I(a, β)uT u · 1 +d +� +1 +−1 +−1 +1 +� +as +n → ∞ +P-a.s. +(5.7) +where +I(a, β) = +1 +1 − 2(a(β + 1) − β) · +a2(1 − a)(β + 1)3 +(β − a(β + 1))2(1 − a(β + 1) + β). +(5.8) +Consequently, (5.7) ensures that the condition (H.1) is satisfied. Notice that by (2.3) and (3.1), +there exists some constant C1(a, β) > 0 and similarly, by (2.5), (2.6), (A.22), there exists some +other constant C2(a, β) > 0 such that +∥Nn∥2 ≤ C1(a, β)n2 +and +a2 +kϵk(u)2 ≤ C2(a, β)n2δ−2 +n +for all +1 ≤ k ≤ n. +Moreover, notice that for all 1 ≤ k ≤ n, +Vn∆Hk(u) = +1 +n3/2 +� +Nk(u)ϵk(u)−1 − +a(β+1) +β−a(β+1)akδk−1 +a(β+1) +β−a(β+1)akδn +� +ϵk(u). +Hence, for all 1 ≤ k ≤ n, we observe that +∥Vn∆Hk(u)∥2 ≤ 4a2 +k +n3 +� +a(β + 1) +β − a(β + 1) +�2��β − a(β + 1) +aka(β + 1) +Nk(u) +ϵk(u) +�2 ++ δ2 +k−1 + δ2 +n +� +ϵk(u)2 ≤ C(a, β) +n +(5.9) +for some constant C(a, β) > 0. Consequently, we +n +� +k=1 +E +� +∥Vn∆Hk(u)∥4� +≤ 1 +nC(a, β) → 0 +as +n → ∞ +P-a.s. +since, for all ϵ > 0, +n +� +k=1 +E +� +∥Vn∆Hk(u)∥21{∥Vn∆Hk(u)∥>ϵ}|Fk−1 +� +≤ 1 +ϵ2 +n +� +k=1 +E +� +∥Vn∆Hk(u)∥4� +→ 0 +as +n → ∞ +P-a.s. +(5.10) +Then the condition (H.2), or the Lindeberg condition, is satisfied by (5.10). Hereafter, by (2.5), +(2.6), and by the definition of δn, we know there exists some constant C′(a, β) ̸= 0 such that +log +� +det V −1 +n +�2 +log n +→ C′(a, β) +as +n → ∞. +This ensures that there exists some other constant C′′(a, β) > 0 such that +∞ +� +n=1 +1 +� +log +� +det V −1 +n +�2�2 E +� +∥Vn∆Hn(u)∥4|Fn−1 +� +≤ C2(a, β) +∞ +� +n=1 +1 +(log n)2 E +� +∥Vn∆Hn(u)∥4|Fn−1 +� +. +Finally, using (5.9) leads to +∞ +� +n=1 +1 +(log n)2 ∥Vn∆Hn(u)∥4 ≤ C(a, β) +∞ +� +n=1 +1 +(n log n)2 < ∞ +P-a.s. + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +17 +for some constant C(a, β) > 0 depending only on a and β. The condition (H.4) is satisfied by +combining the above with (5.10). On the one hand, +1 +log +� +det V −1 +n +�2 +n +� +k=1 +�(det Vk)2 − (det Vk+1)2 +(det Vk)2 +� +VkHk(u)Hk(u)T V T +k → 1 +duT uV +(5.11) +as n → ∞ P-a.s. where +V = +� +1 +−1 +−1 +1 +� +I(a, β) +and I(a, β) has been specified in (5.8). Then, we have +1 +log n +n +� +k=1 +�(det Vk)2 − (det Vk+1)2 +(det Vk)2 +� +VkHk(u)Hk(u)T V T +k → 4 − 2(a(β + 1) − β) +d +uT uV +as n → ∞ P-a.s. since +log n +log +� +det V −1 +n +�2 → 4 − 2(a(β + 1) − β) +as +n → ∞. +On the other hand, by (2.5) and (2.6), we have +n +�(det Vn)2 − (det Vn+1)2 +(det Vn)2 +� +→ 4 − 2 +� +a(β + 1) − β +� +as +n → ∞ +P-a.s. +Using (5.6) and (5.11), we observe that +1 +log n +n +� +k=1 +uT GkGT +k u +k2 += +1 +log n +n +� +k=1 +vT VkHk(u)Hk(u)T V T +k v +k +→ vT V v · 1 +duT u +as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (4.5). +□ +Theorem 5.3. In the critical regime, we have the quadratic strong law +1 +log log n +n +� +k=1 +GkGT +k +(k log k)2 → 4(2β + 1)2 +9 +· 1 +dId +as +n → ∞ +P-a.s. +Proof. We will check that all the three conditions of [32, Theorem A.2] are satisfied. Denote +Wn = +1 +n√n log n +� +1 +0 +0 +a(β+1) +β−a(β+1)δn +� +and +w = +� +1 +−1 +� +. +Then, for H defined in (5.5), it is clear that +wT WnHn(u) = +1 +√n log nGn +for all +n ∈ N +and that +lim +n→∞ Wn⟨H(u)⟩nW T +n = lim +n→∞ +1 +n3 log n +� +1 +−1 +−1 +1 +� n−1 +� +k=1 +(2β + 1)2δ2 +ka2 +k+1E +� +ϵk+1(u)2|Fk +� += lim +n→∞ +(2β + 1)2 +n3 log n · uT u +d +� +1 +−1 +−1 +1 +� n−1 +� +k=1 +δ2 +ka2 +k+1µ2 +k+1 +P-a.s. +By (2.5) and (2.6), we know that +n−3/2δn → 2 +3 · +Γ(β + 1) +Γ(β + 1 + 1 +2) +as +n → ∞. + +18 +JIAMING CHEN AND LUCILE LAULIN +Hence, the above calculation leads us to +Wn⟨H(u)⟩nW T +n → I(β)uT u · 1 +d +� +1 +−1 +−1 +1 +� +as +n → ∞ +P-a.s. +with +I(β) = 4(2β + 1)2 +9 +. +(5.12) +Consequently, the condition (H.1) is satisfied thanks to (5.12). Notice that by (2.3) and (3.1), +there exists some constant C1(β) > 0 and similarly, there exists some constant C2(β) > 0 such +that +∥Nn∥2 ≤ C1(β)n2 +and +a2 +kϵk(u)2 ≤ C2(β)n2δ−2 +n log n +for all +1 ≤ k ≤ n. +Then, notice for all 1 ≤ k ≤ n that +Wn∆Hk(u) = +1 +n√n log n +� +Nk(u)ϵk(u)−1 − +a(β+1) +β−a(β+1)akδk−1 +a(β+1) +β−a(β+1)akδn +� +ϵk(u). +The ensures that, for all 1 ≤ k ≤ n, +∥Wn∆Hk(u)∥2 ≤ +4a2 +k +n3 log n(2β + 1)2 +�� +(2β + 1)−2 Nk(u) +ϵk(u) +�2 + δ2 +k−1 + δ2 +n +� +ϵk(u)2 ≤ C(β) +n +(5.13) +for some constant C(β) > 0. Hence, +n +� +k=1 +E +� +∥Wn∆Hk(u)∥4� +≤ 1 +nC(β) → 0 +as +n → ∞ +P-a.s. +since, for all ϵ > 0, +n +� +k=1 +E +� +∥Wn∆Hk(u)∥21{∥Wn∆Hk(u)∥>ϵ}|Fk−1 +� +≤ 1 +ϵ2 +n +� +k=1 +E +� +∥Wn∆Hk(u)∥4� +→ 0 +as +n → ∞. +(5.14) +Therefore, the condition (H.2), or the Lindeberg condition, is satisfied using (5.14). Hereafter, we +know that +log +� +det W −1 +n +�2 +log log n +→ 4 +as +n → ∞. +This ensures that there exists some constant C2(β) > 0 such that +∞ +� +n=1 +1 +� +log +� +det W −1 +n +�2�2 E +� +∥Wn∆Hn(u)∥4|Fn−1 +� +≤ +∞ +� +n=1 +C2(β) +(log log n)2 E +� +∥Wn∆Hn(u)∥4|Fn−1 +� +. +(5.15) +We get from (5.13) that +∞ +� +n=1 +1 +(log log n)2 ∥Wn∆Hn(u)∥4 ≤ C(β) +∞ +� +n=1 +1 +(n log n log log n)2 < ∞ +P-a.s. +for some constant C(β) > 0 depending only onβ. The condition (H.4) is satisfied using the above +together with (5.15). Then, +1 +log +� +det W −1 +n +�2 +n +� +k=1 +�(det Wk)2 − (det Wk+1)2 +(det Wk)2 +� +WkHk(u)Hk(u)T W T +k → 1 +duT uW +as n → ∞ P-a.s. where +W = 4(2β + 1)2 +9 +� +1 +−1 +−1 +1 +� +. + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +19 +Furthermore, on the one hand we have +1 +log log n +n +� +k=1 +�(det Wk)2 − (det Wk+1)2 +(det Wk)2 +� +WkHk(u)Hk(u)T W T +k → 1 +duT uW +as n → ∞ P-a.s. since +log log n +log +� +det W −1 +n +�2 → 1 +4 +as +n → ∞. +On the other hand, we have +n log n +�(det Wn)2 − (det Wn+1)2 +(det Wn)2 +� +→ 1 +as +n → ∞ +P-a.s. +By (5.6) and (5.11), we observe that +1 +log log n +n +� +k=1 +uT GkGT +k u +(k log k)2 = +1 +log log n +n +� +k=1 +wT WkHk(u)Hk(u)T W T +k w +4k log k +→ wT Ww · 1 +4duT u +(5.16) +as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (5.16). +□ +Theorem 5.4. In the superdiffusive regime, we have the mean square convergence, given by +E +����� +1 +na(β+1)−β Gn − +1 +1 + a(β + 1) − β Lβ +���� +2� +→ 0 +as +n → ∞. +(5.17) +Proof. For all test vector u ∈ Rd, it is immediate that +E +����� +1 +na(β+1)−β Gn(u) − +1 +1 + a(β + 1) − β Lβ(u) +���� +2� +≤ 2E +����� +1 +n1+a(β+1)−β Zn(u) +���� +2� ++ 2E +����� +1 +n1+a(β+1)−β · +a(β + 1) +a(β + 1) − β δnMn − +1 +1 + a(β + 1) − β Lβ +���� +2� +. +(5.18) +By (4.20) and (5.7), the second term converges to zero. Looking back to the first term in (5.18), +we observe +E +����� +1 +n1+a(β+1)−β Zn(u) +���� +2� +≤ +4 +n1+2(a(β+1)−β) +n +� +k=1 +E +� +Nk(u)2� ++ +4 +n1+2(a(β+1)−β) +� +a(β + 1) +a(β + 1) − β +�2 +E +������ +n +� +k=1 +akδk−1ϵk(u) +����� +2� +. +(5.19) +The first term in (5.19) converges to zero because E[Nk(u)] ≤ (uT u)n for all 1 ≤ k ≤ n, and +moreover, in the superdiffusive regime we have a(β +1) > β +1/2. The second term in (5.19) also +converges to zero because +n−(1+a(β+1)−β)δn → +1 +1 + a(β + 1) − β · +1 +Γ(1 + a(β + 1))Γ(β + 1) +as +n → ∞. +Finally, using the above and that M(u) = �∞ +k=1 akϵk(u) is bounded in L2, the assertion follows. +□ +5.3. Scaling limit. +Theorem 5.5. The barycenter process admits a scaling limit at the diffusive regime, or conver- +gence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that +� 1 +√nG⌊nt⌋, t ≥ 0 +� +=⇒ +� +1 +� +0 +Wtr dr, t ≥ 0 +� + +20 +JIAMING CHEN AND LUCILE LAULIN +where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process define in Theorem 4.3 with its +covariance defined in (4.6). In particular, +E +�� +1 +� +0 +Wsv dv +�� +1 +� +0 +Wtu du +�T � += +β +3(β(1 − a) − a)(1 − a)s · 1 +dId ++ +2(a(β + 1)(1 − a) + aβ) +3(2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a)(1 + (1 − a)(β + 1))ta−β(1−a)s1−a+β(1−a) · 1 +dId +(5.20) +for all 0 ≤ s ≤ t < ∞. +Proof. An easy calculation leads to +lim +n→∞ +1 +√nG⌊nt⌋ = lim +n→∞ +1 +� +0 +1 +√nS⌊ntr⌋ dr =⇒ +1 +� +0 +Wtr dr +which ensures that G⌊nt⌋ is a continuous function of S⌊ntr⌋ in D([0, 1]). Then, the last convergence +in law is due to the functional central limit Theorem 4.3, with (Wt)t≥0 defined there. Hence, the +barycenter process (Gn)n∈N admits a Gaussian scaling limit in the diffusive regime as well, with +covariance +E +�� +1 +� +0 +Wsv dv +�� +1 +� +0 +Wtu du +�T � += 2 +1 +� +0 +u +� +0 +E +� +WsvW T +tu +� +dv du. +Using (4.6), the formula (5.20) and the assertion follows. +□ +Theorem 5.6. The barycenter process admits a scaling limit at the critical regime, or convergence +in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that +� +1 +� +nt log n +G⌊nt⌋, t ≥ 0 +� +=⇒ +� +1 +� +0 +(2β + 1)Btr dr, t ≥ 0 +� +where (Bt)t≥0 is a continuous Rd-valued centered Gaussian process define in Theorem 4.6 with its +covariance defined in (4.17). +Proof. For each r ∈ [0, 1], (3.2) and (4.11) implies that +lim +n→∞ +1 +� +nt log n +· M⌊ntr⌋(u) +a⌊ntr⌋µ⌊ntr⌋ += lim +n→∞ +1 +� +nt log n +� +ntr(log n + r +t log r) +�1/2Btr(u) +P-a.s. +for all u ∈ Rd. Moreover, (4.16) yields +lim +n→∞ +1 +� +nt log n +N⌊ntr⌋(u) = lim +n→∞ r1/2 · +1 +� +ntr log n +N⌊ntr⌋(u) = 0 +P-a.s. +for all u ∈ Rd. By (4.15), we have +� +1 +� +nt log n +S⌊ntr⌋(u), t ≥ 0 +� +=⇒ +� +(2β + 1)Btr(u), t ≥ 0 +� +for all u ∈ Rd and r ∈ [0, 1]. Hence, we use again +lim +n→∞ +1 +� +nt log n +G⌊nt⌋ = lim +n→∞ +1 +� +0 +1 +� +nt log n +S⌊ntr⌋ dr =⇒ +1 +� +0 +(2β + 1)Btr dr +and the assertion is verified. +□ + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +21 +Theorem 5.7. The barycenter process admits a scaling limit at the superdiffusive regime, or +convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that +� +1 +na(β+1)−β G⌊nt⌋, t ≥ 0 +� +=⇒ +� +1 +� +0 +Qtr dr, t ≥ 0 +� +with the covariance specified in (5.3) and the limiting Lβ characterized in Theorem 4.8 and Qt = +ta(β+1)−βLβ characterized in Theorem 4.9 for all t ≥ 0. +Proof. Again, we find that +lim +n→∞ +1 +na(β+1)−β G⌊nt⌋ = +1 +� +0 +1 +na(β+1)−β S⌊ntr⌋ dr =⇒ +1 +� +0 +Qtr dr +which ensures that G⌊nt⌋ is a continuous function of S⌊ntr⌋ in D([0, 1]). Then, the last convergence +in law is due to the functional central limit Theorem 4.9. Hence the barycenter process (Gn)n∈N +admits a non-degenerate scaling limit in the superdiffusive regime as well, with covariance +E +�� +1 +� +0 +Qsv dv +�� +1 +� +0 +Qtu du +�T � += 2 +1 +� +0 +u +� +0 +E +� +QsvQT +tu +� +dv du = ta(β+1)−βsa(β+1)−β +(1 + a(β + 1) − β)2 E +� +LβLT +β +� += ta(β+1)−βsa(β+1)−β +(1 + a(β + 1) − β)2 +� +a(β + 1) +β − a(β + 1) +�2 Γ(2(a − 1)(β + 1) + 1) +Γ((2a − 1)(β + 1) + 1)2 · 1 +dId +for all 0 ≤ s ≤ t < ∞. +□ +6. Velocity of quadratic mean displacement +In this Section, we investigate the velocity of the mean square displacement of the MARW. +This quantitative estimates give us the information on how fast the limit Theorems in Section 4 +are carried on. Similar convergence velocities have been discussed in [20, 26], where the authors +analyzed the convergence velocity of the moments of a one-dimensional elephant random walk of +all orders. In the superdiffusive regime, the convergence velocity was discussed in [6]. Here, only +the rate of quadratic moment convergence for the MARW in all of the three (diffusive, critical, +and superdiffusive) regimes are discussed. +Following the limit Theorems in Section 4, we expect the asymptotic behavior of the mean +square displacement is as follows, +E +� +SnST +n +� +∼ +� +� +� +� +� +� +� +� +� +� +� +n · +(a−2β)(1−a)(β+1)+β(a+1) +(2(β+1)(1−a)−1)(a−β(1−a))(1−a) · 1 +dId +when +a < 1 − +1 +2(β+1) +n log n · (2β + 1)2 · 1 +dId +when +a = 1 − +1 +2(β+1) +n2(a(β+1)−β) · +� +a(β+1) +β−a(β+1) +�2 +Γ(2(a−1)(β+1)+1) +Γ((2a−1)(β+1)+1)2 · 1 +dId +when +a > 1 − +1 +2(β+1), +(6.1) +where the notation ∼ indicates two sequences an ∼ bn if and only if an/bn → 1 as n → ∞. +The aim of this Section is not only to show that the above estimates (6.1) are valid, but also +to investigate the exact velocity of their convergence in the diffusive and critical regime. +6.1. Diffusive regime. +Theorem 6.1. For all p < (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞, +1 +nE +� +SnST +n +� +− +(a − 2β)(1 − a)(β + 1) + β(a + 1) +(2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a) · 1 +dId +∼ −(C1n−2(1−a)(β+1) + C2n−1) · 1 +dId. + +22 +JIAMING CHEN AND LUCILE LAULIN +Proof. Take the vector v = (1, −1)T and Vn ∈ R2×2 as in (A.16). Then, +1 +√nSn(u) = vT VnLn(u), +where Ln(u) = (Nn(u), Mn(u))T is as in (3.6). In particular, +1 +nuT E +� +SnST +n +� +u = vT VnE +� +Ln(u)Ln(u)T � +V T +n v += vT VnE +� � +E +� +Nn(u)2� +E +� +Nn(u)Mn(u) +� +E +� +Mn(u)Nn(u) +� +E +� +Mn(u)2� +� � +V T +n v += vT VnE +� � +E +� +⟨N(u)⟩n +� +E +� +⟨N(u), M(u)⟩n +� +E +� +⟨M(u), N(u)⟩n +� +E +� +⟨M(u)⟩n +� +� � +V T +n v. +Therefore, +1 +nuT E +� +SnST +n +� +u = 1 +nE +� +⟨N(u)⟩n +� ++ +1 +na2nµ2n +� +a(β + 1) +β − a(β + 1) +�2 +E +� +⟨M(u)⟩n +� +− +2 +nanµn +� +a(β + 1) +β − a(β + 1) +� +E +� +⟨M(u), N(u)⟩n +� +. +Since the test vector u ∈ Rd is taken arbitrarily, we get from Lemmas A.15 and A.16 that +1 +nE +� +SnST +n +� +− +(a − 2β)(1 − a)(β + 1) + β(a + 1) +(2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a) · 1 +dId +∼ −(C1n−2(1−a)(β+1) + C2n−1) · 1 +dId +as +n → ∞. +□ +6.2. Critical regime. +Theorem 6.2. When p = (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞, +1 +n log nE +� +SnST +n +� +− (2β + 1)2 · 1 +dId ∼ −(C1(log n)−1 + C2n−1) · 1 +dId. +Proof. Take w = (1, −1)T and Wn ∈ R2×2 as in (A.28). Then +1 +√n log nSn(u) = wT WnLn(u) as in +(A.29) for all u ∈ Rd. In particular, +1 +n log nuT E +� +SnST +n +� +u = wT WnE +� +Ln(u)Ln(u)T � +W T +n w. +Hence, +1 +n log nuT E +� +SnST +n +� +u = wT WnE +� � +E +� +⟨N(u)⟩n +� +E +� +⟨N(u), M(u)⟩n +� +E +� +⟨M(u), N(u)⟩n +� +E +� +⟨M(u)⟩n +� +� � +W T +n w. +Therefore, we get by (3.4) as n → ∞, +1 +n log nuT E +� +SnST +n +� +u = +1 +n log n +� +E +� +⟨N(u)⟩n +� ++ (2β + 1)2 +a2nµ2n +E +� +⟨M(u)⟩n +�� +, +which implies +1 +n log nE +� +SnST +n +� +− (2β + 1)2 · 1 +dId ∼ −(C1(log n)−1 + C2n−1) · 1 +dId +as +n → ∞. +□ +6.3. Superdiffusive regime. + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +23 +Theorem 6.3. When p > (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞, +1 +n2(a(β+1)−β) E +� +SnST +n +� +− +� +a(β + 1) +β − a(β + 1) +�2 Γ(2(a − 1)(β + 1) + 1) +Γ((2a − 1)(β + 1) + 1)2 · 1 +dId +∼ −(C1n−4(a(β+1)−β)+1 + C2n−2(a(β+1)−β)). +Proof. Similar to previous computations for the diffusive regime, we have for all u ∈ Rd, +1 +n2(a(β+1)−β) uT E +� +SnST +n +� +u = +1 +n2(a(β+1)−β) E +� +⟨N(u)⟩n +� ++ +1 +n2(a(β+1)−β)a2nµ2n +� +a(β + 1) +β − a(β + 1) +�2 +E +� +⟨M(u)⟩n +� +− +2 +n2(a(β+1)−β)anµn +� +a(β + 1) +β − a(β + 1) +� +E +� +⟨M(u), N(u)⟩n +� +. +Hence, by (2.5), (2.6), (3.5) and since u ∈ Rd is arbitrary, +1 +n2(a(β+1)−β) E +� +SnST +n +� +− +� +a(β + 1) +β − a(β + 1) +�2 Γ(2(a − 1)(β + 1) + 1) +Γ((2a − 1)(β + 1) + 1)2 · 1 +dId +∼ −(C1n−4(a(β+1)−β)+1 + C2n−2(a(β+1)−β)) +as +n → ∞. +□ +7. Cram´er moderate deviations +In this Section, we discuss the Cram´er moderate deviations for the multidimensional reinforced +random walk (Sn)n∈N. The similar statistical quantity as well as the Berry-Esseen bound for the +one-dimensional elephant random walk (ERW) without amnesia-reinforcement has been given in +[20]. Our derivation of Cram´er moderate deviations for the MARW does not rely on a Berry- +Esseen bound. The discussion of such statistical quantities is expected to reveal the transience +property and the central limit Theorems for the MARW. For this direction, readers are refereed +to [3, 16]. Thanks to Lemma A.21 and Lemma A.22, we can properly state the Cram´er moderate +deviations principles for the MARW. +Theorem 7.1. In the diffusive and critical regimes, we have the following Cram´er moderate +deviations for the MARW. Let (ϑn)n∈N ⊆ R be a non-decreasing sequence so that ϑn/√n → 0 as +n → ∞. Take any non-empty Borel set B ⊆ Rd, then we have +− +inf +x∈int B +1 +2∥x∥2 ≤ lim inf +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≤ lim sup +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≤ − inf +x∈cl B +1 +2∥x∥2, +where int B and cl B denote the interior and the closure of B ⊆ Rd, respectively. +Proof. Our proof will only present the Cram´er moderate deviations for the MARW in the diffusive +regime. The same property for the critical regime follows from exactly the same steps. First, take +xB = infx∈B ∥x∥. +Then it is obvious that infx∈cl B ∥x∥ ≤ xB and infx∈cl B ∥x∥2/2 ≤ x2 +B/2. +Henceforth, +P +�anµnSn +ϑn√wn +∈ B +� +≤ +d +� +j=1 +P +����� +anµnSj +n +√wn +���� ≥ ϑnxB +d +� +≤ +� +1 − Φ(ϑnxB) +� +F(B, ϑ, n), +(7.1) + +24 +JIAMING CHEN AND LUCILE LAULIN +where we write +F(B, ϑ, n) := 2Cd · exp +� +1 +√n +� ϑnxB +2d +�3 + 1 +n +� ϑnxB +2d +�2 + +1 +√n(1 + 1 +2 log n)(1 + ϑnxB +2d ) +� ++ 2Cd · exp +� +1 +√n +� ϑnxB +2d +�3 + +1 +n2(1−a)(β+1) +� ϑnxB +2d +�2 + +1 +√n(1 + 1 +2 log n)(n1/2−(1−a)(β+1) + ϑnxB +2d ) +� +. +Hence, +lim sup +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≤ −1 +2x2 +B ≤ − inf +x∈cl B +1 +2∥x∥2. +To achieve the asymptotic lower bound, we first notice that this assertion automatically holds if +int B = ∅, whence − infx∈∅ ∥x∥2/2 = −∞. Consequently, we assume that int B ̸= ∅. Notice that +int B is open in Rd. Hence, for all ϵ∗ > 0 sufficiently small, we could find x∗ ∈ int B with +0 < 1 +2∥x∗∥2 < +inf +x∈int B +1 +2∥x∥2 + ϵ∗ +and +0 < min +���xj +∗ +�� : 1 ≤ j ≤ d +� +. +Choose ϵ∗∗ sufficient small such that 0 < ϵ∗∗ < +���xj +∗ +��� for each j = 1, . . . , d. Then, +U(x∗, ϵ∗∗) ⊆ int B ⊆ B, +where +U(x∗, ϵ∗∗) := +� +x ∈ Rd : +��xj − xj +∗ +�� < ϵ∗∗ for all j +� +. +On the other hand, +P +�anµnSn +ϑn√wn +∈ B +� +≥ P +�anµnSn +√wn +∈ ϑn · U(x∗, ϵ∗∗) +� +≥ +d +� +j=1 +P +� +ϑn(xj +∗ + ϵ∗∗) ≥ anµnSj +n +√wn +≥ ϑn(xj +∗ − ϵ∗∗) +� +. +From Lemma A.21 and Lemma A.22, we know that +lim +n→∞ P +�anµnSj +n +√wn +≥ ϑn(xj +∗ + ϵ∗∗) +�� +P +�anµnSj +n +√wn +≥ ϑn(xj +∗ − ϵ∗∗) +� += 0 +for each +j. +Similar to (7.1), +lim inf +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≥ −1 +2∥x∗ − ϵ∗∗∥2. +Letting ϵ∗∗ → 0, we observe that +lim inf +n→∞ ϑ−2 +n log P +�anµnSn +ϑn√wn +∈ B +� +≥ −1 +2∥x∗∥2 ≥ − +inf +x∈int B +1 +2∥x∥2 − ϵ∗. +Since ϵ∗ > 0 was take arbitrarily, letting ϵ∗ → 0, we verify the assertion. +□ +Appendix A. Technical Lemmas +A.1. Asymptotics of the processes. We start by introducing the following processes that are +of great influence on the behavior of the random walk. Let (e1, e2, . . . , ed) denote a canonical +Euclidean basis of Rd. For each n ∈ N and 1 ≤ j ≤ d, define +N X +n (j) = +n +� +k=1 +1{Xj +k̸=0}µk +and +Σn = +d +� +j=1 +N X +n (j)ejeT +j , +(A.1) +such that (Σn)n∈N is a matrix-valued process. +Lemma A.1. We have the following almost sure convergence in the three regimes. +1 +nµn+1 +Σn → +1 +d(β + 1)Id +as +n → ∞ +P-a.s. +(A.2) + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +25 +Proof. For each n ∈ N and 1 ≤ j ≤ d, define +ΛX +n (j) = N X +n (j) +n +. +(A.3) +It follows from (A.1) that +ΛX +n+1(j) = +n +n + 1ΛX +n (j) + +1 +n + 11{Xj +n+1̸=0}µn+1. +Moreover, we observe thanks to (A.12) that +ΛX +n+1(j) = +n +n + 1 · γnΛX +n (j) + +1 +n + 11{Xj +n+1̸=0}µn+1 − a(β + 1) +n + 1 ΛX +n (j) += +n +n + 1 · γnΛX +n (j) + µn+1 +n +δX +n+1(j) + (1 − a)µn+1 +d(n + 1) +with +δX +n+1(j) = 1{Xj +n+1̸=0} − P +� +Xj +n+1 ̸= 0|Fn +� +. +Then, by (2.4) we know +ΛX +n (j) = +1 +nan +� +ΛX +1 (j) + 1 − a +d +n +� +k=2 +akµk + HX +n (j) +� +(A.4) +with +HX +n (j) = +n +� +k=2 +akµkδX +k (j). +It is clear that for a fixed 1 ≤ j ≤ d, the real-valued process (HX +n (j))n∈N is locally square-integrable +since it is a finite sum. Afterwards, this process appears to be a martingale adapted to (Fn)n∈N +because (δX +n (j))n∈N satisfied the martingale difference relation E[δX +n+1(j)|Fn] = 0. It is obvious +that +⟨HX(j)⟩n ≤ wn = +n +� +k=1 +(akµk)2 +P-a.s. +Hence, we get by [18, Theorem 4.3.15] that for all γ > 0 +HX +n (j)2 +⟨HX(j)⟩n += o +�� +log⟨HX(j)⟩n +�1+γ� +P-a.s. +(A.5) +Since ⟨HX(j)⟩n ≤ wn and by (A.5), we obtain that +HX +n (j)2 = o +� +wn +� +log wn +�1+γ� +P-a.s. +In the diffusive regime, by Lemma A.1 and (3.3), we have +HX +n (j)2 = o +� +n1−2(a(β+1)−β)� +log n +�1+γ� +P-a.s. +By (2.5) and (2.6), we observe that +� HX +n (j) +nanµn+1 +�2 += o +� +n−1� +log n +�1+γ� +P-a.s. +Hence +HX +n (j) +nanµn+1 +→ 0 +as +n → ∞ +P-a.s. +By (2.5) and (2.6) again, we observe further +1 +nanµn+1 +n +� +k=1 +akµk → +1 +(1 − a)(β + 1) +as +n → ∞. +(A.6) + +26 +JIAMING CHEN AND LUCILE LAULIN +Hence, we have +µ−1 +n+1ΛX +n (j) →→ +1 +β + 1 +as +n → ∞. +By (A.3) and (A.4), we can then conclude that +1 +nµn+1 +Σn → +1 +d(β + 1)Id +as +n → ∞ +P-a.s. +in the diffusive regime. In the critical regime, where a = 1 − +1 +2(β+1), we have from (3.4)) +HX +n (j)2 = o +� +log n +� +log log n +�1+γ� +P-a.s. +Hence +� HX +n (j) +nanµn+1 +�2 += o +� +n−1 log n +� +log log n +�1+γ� +P-a.s. +which implies that +HX +n (j) +nanµn+1 +→ 0 +as +n → ∞ +P-a.s. +Similar to the convergence in (A.6), in the critical regime, we observe +1 +nanµn+1 +n +� +k=1 +akµk → 1 +2 +P-a.s. +Hence, we conclude that +µ−1 +n+1ΛX +n (j) → +1 +d(β + 1) +and +1 +nµn+1 +Σn → +1 +d(β + 1)Id +as +n → ∞ +P-a.s. +which proves (A.2). In the superdiffusive regime, we have +HX +n (j)2 = o +� +1 +� +P-a.s. +and then +� HX +n (j) +nanµn+1 +�2 += o +� +n−2(1−a)(β+1)� +P-a.s. +which implies +HX +n (j) +nanµn+1 +→ 0 +as +n → ∞ +P-a.s. +We can similarly show that +µ−1 +n+1ΛX +n (j) → +1 +β + 1 +as +n → ∞. +which then ensures that +1 +nµn+1 +Σn → +1 +d(β + 1)Id +as +n → ∞ +P-a.s. +Consequently, the assertion is verified. +□ +The next result follows directly from the definition of Mn and Nn +Lemma A.2. We have the following formulas for the predictable matrix-valued quadratic varia- +tions +⟨M⟩n = (a1µ1)2E +� +X1XT +1 +� ++ +n−1 +� +k=1 +a(β + 1) +ka−2 +k+1 +µk+1Σk + 1 − a +da−2 +k+1 +µ2 +k+1Id − +�γk − 1 +a−1 +k+1 +�2 +YkY T +k , +(A.7) +and +⟨N⟩n = +� +β +β − a(β + 1) +�2 +E +� +X1XT +1 +� ++ +n−1 +� +k=1 +a(β + 1) +kµk+1 +Σk + 1 − a +d +Id − +�γk − 1 +µk+1 +�2 +YkY T +k . +(A.8) + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +27 +In particular, we have +Tr⟨M⟩n = wn − +n +� +k=1 +(γk − 1)2a2 +k+1∥Yk∥2, +(A.9) +and +Tr⟨N⟩n = +� +β +β − a(β + 1) +�2 +n − +n−1 +� +k=1 +�a(β + 1) +kµk+1 +�2 +∥Yk∥2. +(A.10) +Lemma A.3. We have the following estimate for the matrix-valued conditional expectation. +E +� +ϵn+1ϵT +n+1|Fn +� += a(β + 1) +n +µn+1Σn + 1 − a +d +µ2 +n+1Id − (γn − 1)2YnY T +n . +And as a consequence +E +� +∥ϵn+1∥2|Fn +� += µ2 +n+1 − (γn − 1)2∥Yn∥2. +Proof. Observe that +E +� +ϵn+1ϵT +n+1|Fn +� += E +� +Yn+1Y T +n+1|Fn +� +− γ2 +nYnY T +n +with +E +� +Yn+1Y T +n+1|Fn +� += YnY T +n + 2µn+1YnE +� +XT +n+1|Fn +� ++ µ2 +n+1E +� +Xn+1XT +n+1|Fn +� += +� +1 + 2a(β + 1) +n +� +YnY T +n + µ2 +n+1E +� +Xn+1XT +n+1|Fn +� +. +(A.11) +For all k ≥ 1, we know that XkXT +k = �d +j=1 1{Xj +k̸=0}ejeT +j . Then +P +� +Xj +n+1 ̸= 0|Fn +� += +n +� +k=1 +P +� +βn+1 = k +� +· P +� +(AnXk)j ̸= 0|Fn +� += +n +� +k=1 +1{Xj +k̸=0}P +� +An = ±Id +� +· (β + 1)µk +nµn+1 ++ +n +� +k=1 +� +1 − 1{Xj +k̸=0} +� +P +� +An = ±Jd +� +· (β + 1)µk +nµn+1 +. +Hence +P +� +Xj +n+1 ̸= 0|Fn +� += β + 1 +nµn+1 +· +� +P +� +An = +Id +� +− P +� +An = +Jd +�� +N X +n (j) + 2P +� +An = +Jd +� += a(β + 1) +nµn+1 +N X +n (j) + 1 − a +d +. +(A.12) +Therefore +E +� +Xn+1XT +n+1|Fn +� += +d +� +j=1 +P +� +Xj +n+1 ̸= 0|Fn +� +ejeT +j = a(β + 1) +nµn+1 +Σn + 1 − a +d +Id. +(A.13) +And from (A.11) and (A.13) we can conclude that +E +� +ϵn+1ϵT +n+1|Fn +� += E +� +Yn+1Y T +n+1|Fn +� +− γ2 +nYnY T +n += +� +1 + 2a(β + 1) +n +� +YnY T +n + a(β + 1) +n +µn+1Σn + 1 − a +d +µ2 +n+1Id − γ2 +nYnY T +n += a(β + 1) +n +µn+1Σn + 1 − a +d +µ2 +n+1Id − (γn − 1)2YnY T +n . +(A.14) +On the other hand +Tr(Σn) = nµn+1 +β + 1 . +(A.15) +Taking traces in (A.14) and by (A.15), we have +E +� +∥ϵn+1∥2|Fn +� += µ2 +n+1 − (γn − 1)2∥Yn∥2 +which ensures that the assertion is verified. +□ + +28 +JIAMING CHEN AND LUCILE LAULIN +A.2. Scaling limits of the random walk and the barycenter. +A.2.1. The diffusive regime. +Lemma A.4. For each n ∈ N and test vector u ∈ Rd, let +Vn = +1 +√n +� +1 +0 +0 +a(β+1) +β−a(β+1)(anµn)−1 +� +and +v = +� +1 +−1 +� +. +(A.16) +Then +vT VnLn(u) = +1 +√nSn(u). +(A.17) +And for all t ≥ 0, we have +Vn⟨L(u)⟩⌊nt⌋V T +n → uT u +d Vt +as +n → ∞ +P-a.s. +(A.18) +where +Vt = +1 +(β − a(β + 1))2 +� +β2t +aβ +1−at1+β−a(β+1) +aβ +1−at1+β−a(β+1) +a2(β+1)2 +1−2a(β+1)+2β t1+2β−2a(β+1) +� +. +(A.19) +Proof. From Lemma A.3 and the fact that ⟨M(u)⟩n = uT ⟨M⟩nu, we see that +⟨M(u)⟩⌊nt⌋ = a2 +1µ2 +1uT E +� +X1XT +1 +� +u ++ +⌊nt⌋−1 +� +k=1 +a(β + 1) +k +a2 +k+1µk+1uT Σku + 1 − a +d +a2 +k+1µ2 +k+1uT u − (γk − 1)2a2 +k+1uT YkY T +k u +and +⟨N(u)⟩⌊nt⌋ = +� +β +β − a(β + 1) +�2 +uT E +� +X1XT +1 +� +u ++ +� +β +β − a(β + 1) +�2 ⌊nt⌋−1 +� +k=1 +a(β + 1) +kµk+1 +uT Σku + 1 − a +d +uT u − +�γk − 1 +µk+1 +�2 +uT YkY T +k u. +Using a similar token and Lemma A.1, we can work out the off-diagonal entries in ⟨L(u)⟩⌊nt⌋, and +we obtain that +lim +n→∞ Vn⟨L(u)⟩⌊nt⌋V T +n += lim +n→∞ +uT u +nd(β − a(β + 1))2 +� +� +� +β2⌊nt⌋ +a(β+1)β +anµn +�⌊nt⌋−1 +k=0 +ak+1µk+1 +a(β+1)β +anµn +�⌊nt⌋−1 +k=0 +ak+1µk+1 +� +a(β+1) +anµn +�2 �⌊nt⌋−1 +k=0 +(ak+1µk+1)2 +� +� +� += +uT u +d(β − a(β + 1))2 +� +β2t +aβ +1−at1−(a(β+1)−β) +aβ +1−at1−(a(β+1)−β) +a2(β+1)2 +1−2(a(β+1)−β)t1−2(a(β+1)−β) +� += uT u +d Vt +P-a.s. +where the last equality is due to (2.5) and (2.6). Thus, it implies that +1 +nanµn +n +� +k=1 +akµk → +1 +1 − (a(β + 1) − β) +and +1 +n(anµn)2 +n +� +k=1 +(akµk)2 → +1 +1 − 2(a(β + 1) − β) +as n → ∞. Hence, equation (A.18) holds and the assertion is then verified. +□ +Lemma A.5. The MARW satisfies the Lindeberg condition in the diffusive regime. That is, for +all t ≥ 0 and all ϵ > 0, +⌊nt⌋ +� +k=1 +E +� +∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1 +� +→ 0 +as +n → ∞ +P-a.s. + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +29 +Proof. On the one hand, it is easy to compute from (3.7) and (A.16) that, for all 1 ≤ k ≤ n, +Vn∆Lk(u) = +1 +√n(β − a(β + 1))µn +� +β µn +µk +a ak +an +� +ϵk(u) +which implies +∥Vn∆Lk(u)∥2 = +1 +n(β − a(β + 1))2 +�β2 +µ2 +k ++ +a2a2 +k +(anµn)2 +� +ϵk(u)2. +Hence +∥Vn∆Lk(u)∥4 ≤ +2 +n2(β − a(β + 1))4 +�β4 +µ4 +k ++ +a4a4 +k +(anµn)4 +� +ϵk(u)4. +(A.20) +On the other hand, from (2.5) we observe that +1 +na2n +n +� +k=1 +a2 +k ≤ C1(a, β)−1 +and +1 +na4n +n +� +k=1 +a4 +k ≤ C2(a, β)−1 +for all +n ∈ N +(A.21) +and where C1(a, β), C2(a, β) > 0 are constants depending only on a and β. Moreover, we get that +sup +1≤k≤n +|ϵk(u)| ≤ +sup +1≤k≤n +∥ϵk∥∥u∥ ≤ +sup +1≤k≤n +(β + 2)µk∥u∥ ≤ (β + 2)µn∥u∥. +(A.22) +Hence, we deduce from (A.21) and (A.22) +n +� +k=1 +∥Vn∆Lk(u)∥4 ≤ +2 +n2(β − a(β + 1))4 +�� +β(β + 2) +�4∥u∥4 + +� +a(β + 2) +�4∥u∥4 +C2(a, β) +� +→ 0 +(A.23) +as n → ∞ P-a.s. This implies that +n +� +k=1 +E +� +∥Vn∆Lk(u)∥4|Fk−1 +� +→ 0 +as +n → ∞ +P-a.s. +Therefore, for all ϵ > 0, we obtain +n +� +k=1 +E +� +∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1 +� +≤ 1 +ϵ2 +n +� +k=1 +E +� +∥Vn∆Lk(u)∥4|Fk−1 +� +→ 0 +as n → ∞ P-a.s. This yields finally +⌊nt⌋ +� +k=1 +E +� +∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1 +� +≤ 1 +ϵ2 +⌊nt⌋ +� +k=1 +E +����(VnV −1 +⌊nt⌋)V⌊nt⌋∆Lk(u) +��� +4 +|Fk−1 +� +→ 0 +as n → ∞ P-a.s. since VnV −1 +⌊nt⌋ converges as n → ∞. +□ +Lemma A.6. The deterministic matrix Vt defined in (A.19) can be rewritten as +Vt = tα1K1 + tα2K2 + · · · + tαqKq +with q ∈ N, αj > 0 and each Kj is a symmetric matrix for all 1 ≤ j ≤ 1. +Proof. A direct computation analoguous to the one in [32] shows that Vt = tα1K1+tα2K2+tα3K3, +where +α1 = 1, +α2 = 1 − a(β + 1) > 0, +α3 = 1 − 2a(β + 1) > 0 +since a < 1 − +1 +2(β+1) is in the diffusive regime. Moreover +K1 = +β2 +(a(β + 1) − β)2 +� +1 +0 +0 +0 +� +, +K2 = +aβ +(1 − a)(a(β + 1) − β)2 +� +0 +1 +1 +0 +� +, +K3 = +a2(β + 1)2 +(1 − 2a(β + 1) + 2β)(a(β + 1) − β)2 +� +0 +0 +0 +1 +� +. + +30 +JIAMING CHEN AND LUCILE LAULIN +□ +Lemma A.7. Given the matrix-valued process (Vn)n∈N define in (A.16), we have +∞ +� +n=1 +1 +� +log +� +det V −1 +n +�2�2 E +� +∥Vn∆Ln(u)∥4|Fn−1 +� +< ∞ +P-a.s. +Proof. From (A.16), it is immediate that +det V −1 +n += β − a(β + 1) +a(β + 1) +nanµn. +(A.24) +By (2.5) and (2.6), we obtain +log +� +det V −1 +n +�2 +log n +→ 2(1 − a)(β + 1) +as +n → ∞ +P-a.s. +(A.25) +Hence there exists a constant C(a, β) > 0 depending only on a and β such that +∞ +� +n=1 +1 +� +log +� +det V −1 +n +�2�2 E +� +∥Vn∆Ln(u)∥4|Fn−1 +� +≤ C(a, β) +∞ +� +n=1 +1 +(log n)2 E +� +∥Vn∆Ln(u)∥4|Fn−1 +� +. +(A.26) +Hereafter, equations (A.20), (A.22), (A.23) together imply that +∞ +� +n=1 +1 +(log n)2 ∥Vn∆Ln(u)∥4 ≤ C′(a, β) +∞ +� +n=1 +1 +(n log n)2 < ∞ +P-a.s. +(A.27) +for some other constant C′(a, β) > 0 depending only on a and β. Consequently, equation (A.27) +together (A.26) ensures that the assertion is verified. +□ +A.2.2. The critical regime. +Lemma A.8. For each n ∈ N and test vector u ∈ Rd, let +Wn = +1 +√n log n +� +1 +0 +0 +2β+1 +anµn +� +and +w = +� +1 +−1 +� +. +(A.28) +Then for all t ≥ 0, we have +wT WnLn(u) = +1 +√n log nSn(u) +(A.29) +and +Wn⟨L(u)⟩nW T +n → uT u +d W +as +n → ∞ +P-a.s. +where +Wt = (2β + 1)2 +� +0 +0 +0 +1 +� +. +(A.30) +Proof. It is clear that (A.29) follows from (3.2). Using a similar token than for the proof Lemma +A.4, we have +lim +n→∞ Wn⟨L(u)⟩nW T +n += lim +n→∞ +4uT u +(n log n)d +� +� +� +β2n +β(β+ 1 +2 ) +anµn +�n−1 +k=0 ak+1µk+1 +β(β+ 1 +2 ) +anµn +�n−1 +k=0 ak+1µk+1 +� +β+ 1 +2 +anµn +�2 �n−1 +k=0(ak+1µk+1)2 +� +� +� += 4uT u +d +� +0 +0 +0 +� +β + 1 +2 +�2 +� += uT u +d W +P-a.s. +and the proof is complete. +□ + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +31 +Lemma A.9. The MARW satisfies the Lindeberg condition in the critical regime. That is, for all +t ≥ 0 and all ϵ > 0, given the (Wn)n∈N defined in (A.16), it satisfies +n +� +k=1 +E +� +∥Wn∆Lk(u)∥21{∥WnLk(u)∥2>ϵ}|Fk−1 +� +→ 0 +as +n → ∞ +P-a.s. +Proof. We state that equations (A.20) and (A.21) remain true with Vn replaced by Wn. More +precisely, they can be rewritten as +∥Wn∆Lk(u)∥4 ≤ +32 +(n log n)2 +�β4 +µ4 +k ++ +a4a4 +k +(anµn)4 +� +ϵk(u)4 +(A.31) +and +1 +na4n +n +� +k=1 +a4 +k ≤ C(a, β)−1 +for all +n ∈ N +where C(a, β) > 0 is a constant depending only on t, a, and β. Since (A.22) is not affected by +switching regimes, we have that +n +� +k=1 +∥Wn∆Lk(u)∥4 ≤ +32 +(n log n)2 +�� +β(β + 2) +�4∥u∥4 + +� +a(β + 2) +�4∥u∥4 +C(t, a, β) +� +→ 0 +(A.32) +as n → ∞ P-a.s. This implies +n +� +k=1 +E +� +∥Wn∆Lk(u)∥4|Fk−1 +� +→ 0 +as +n → ∞ +P-a.s. +Therefore, for all ϵ > 0, we obtain +n +� +k=1 +E +� +∥Wn∆Lk(u)∥21{∥WnLk(u)∥2>ϵ}|Fk−1 +� +≤ 1 +ϵ2 +n +� +k=1 +E +� +∥Wn∆Lk(u)∥4|Fk−1 +� +→ 0 +as n → ∞ P-a.s. and the assertion is verified. +□ +Lemma A.10. Given the matrix-valued sequence (Wn)n∈N define in (A.28), we have +∞ +� +n=1 +1 +� +log +� +det W −1 +n +�2�2 E +� +∥Wn∆Ln(u)∥4|Fn−1 +� +< ∞ +P-a.s. +Proof. From (A.28), it is immediate that +det W −1 +n += +1 +2β + 1 +� +n log n · anµn. +(A.33) +Then, we obtain by (2.5) and (2.6) that +log +� +det W −1 +n +�2 +log log n +→ 1 +as +n → ∞ +P-a.s. +(A.34) +Hence, there exists a constant C(a, β) > 0 depending only on a and β such that +∞ +� +n=1 +1 +� +log +� +det W −1 +n +�2�2 E +� +∥Wn∆Ln(u)∥4|Fn−1 +� +≤ +∞ +� +n=1 +C(a, β) +(log log n)2 E +� +∥Wn∆Ln(u)∥4|Fn−1 +� +. +(A.35) +Hereafter, (A.31) together with (A.32) imply that +∞ +� +n=1 +1 +(log log n)2 ∥Wn∆Ln(u)∥4 ≤ C′(a, β) +∞ +� +n=1 +1 +(n log n log log n)2 < ∞ +P-a.s. +for some other constant C′(a, β) > 0 depending only on a and β. Finally, using the above equation +together with (A.35) completes the proof. +□ + +32 +JIAMING CHEN AND LUCILE LAULIN +Lemma A.11. Fix the test vector u ∈ Rd. The growth rate of the compensator of the partial sum +of (Nn(u)2)n∈N is less than cubic growth, in the sense that +1 +n3 +n−1 +� +k=1 +E +� +Nk+1(u)2|Fn +� +→ 0 +as +n → ∞ +P-a.s. +Proof. The law of iterated expectations and (A.8) yields +1 +nE +� +E +� +Nn+1(u)2|Fn +�� += 1 +nE +� +⟨N(u)⟩n +� +→ +� +β +β − a(β + 1) +�2 +uT u +as +n → ∞ +P-a.s. +The strong law of large numbers then yields +1 +n +n−1 +� +k=1 +1 +k E +� +Nk+1(u)2|Fk +� +→ +� +β +β − a(β + 1) +�2 +uT u +as +n → ∞ +P-a.s. +Hence +1 +n3 +n−1 +� +k=1 +E +� +Nk+1(u)2|Fn +� +≤ 1 +n2 +n−1 +� +k=1 +1 +k E +� +Nk+1(u)2|Fk +� +→ 0 +as +n → ∞ +P-a.s. +□ +A.2.3. The barycenter process. For the following Toeplitz Lemmas, see [18] and [33]. +Lemma A.12. [33, Theorem 1.1 Part I] Let (an,k)1≤k≤kn, n∈N be a double array of real numbers +such that for all k ≥ 1, we have an,k → 0 as n → ∞ and supn∈N +�kn +k=1 |an,k| < ∞. Let (xn)n∈N +be a real sequence. If xn → 0 as n → ∞, then �kn +k=1 an,kxk → 0 as n → ∞. +Lemma A.13. [33, Theorem 1.1 Part II] Let (an,k)1≤k≤kn, n∈N be a double array of real numbers +such that for all k ≥ 1, we have an,k → 0 as n → ∞ and supn∈N +�kn +k=1 |an,k| < ∞. Let (xn)n∈N +be a real sequence. If xn → x as n → ∞ with x ∈ R and �kn +k=1 an,k = 1, then �kn +k=1 an,kxk → x +as n → ∞. +A.3. Quadratic rate estimates. Our first result is about the convergence rate of the process +(Yn)n∈N defined in (2.3). +Lemma A.14. For all p ∈ (0, 1), then we have, as n → ∞, +E[YnY T +n ] ∼ +n2a(β+1) +Γ(1 + 2a(β + 1)) · 1 +dId + +n1+2β +Γ(β + 1)2(1 + 2β − 2a(β + 1))(β + 1) · 1 +dId. +Proof. From (A.11) and (A.13), we see +E +� +Yn+1Y T +n+1|Fn +� += +� +1 + 2a(β + 1) +n +� +YnY T +n + µ2 +n+1 +�a(β + 1) +nµn+1 +Σn + 1 − a +d +Id +� +. +Then, remember that +E +� +Σn +� += +d +� +j=1 +E +� +N X +n (j) +� +ejeT +j = +d +� +j=1 +n +� +k=1 +P +� +Xj +k ̸= 0 +� +µk · ejeT +j . +Lemma A.1 yields E[(nµn+1)−1Σn] ∼ (β + 1)−1 · 1 +dId. Hence, +E +� +Yn+1Y T +n+1 +� +∼ +� +1 + 2a(β + 1) +n +� +E +� +YnY T +n +� ++ µ2 +n+1 +β + 1 · 1 +dId. + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +33 +A recursive argument then gives +E +� +YnY T +n +� +∼ +Γ(n + 2a(β + 1)) +Γ(n)Γ(1 + 2a(β + 1))E +� +Y1Y T +1 +� ++ +n−1 +� +j=1 +µ2 +j +β + 1 · +�n−1 +k=1(1 + k−12a(β + 1)) +�j−1 +k=1(1 + k−12a(β + 1)) +· 1 +dId +∼ +Γ(n + 2a(β + 1)) +Γ(n)Γ(1 + 2a(β + 1)) · 1 +dId + +n−1 +� +j=1 +µ2 +j +β + 1 · Γ(n + 2a(β + 1))Γ(j) +Γ(j + 2a(β + 1))Γ(n) · 1 +dId. +Employing the asymptotics in (2.1) and (2.6), the assertion follows. +□ +The process Yn = �n +k=1 µkXk differs from Sn by a multiplicative factor at each step. When +there is no amnesia, the asymptotics of these two processes coincide. However, when β ≥ 0, we +have to treat the general case in another way. +Lemma A.15. For all p ∈ (0, 1) and test vector u ∈ Rd, we have, as n → ∞, +E +� +⟨M(u)⟩n +� +∼ wnuT u − (C1n−1 + C2n−2(a(β+1)−β))uT u, +and +E +� +⟨N(u)⟩n +� +∼ +� +β +β − a(β + 1) +�2 +nuT u − (C1n1−2(1−a)(β+1) + C2)uT u. +Proof. By Lemma A.2 +E +� +⟨M(u)⟩n +� += E +� +Tr⟨M⟩n +� +uT u = wnuT u − +n +� +k=1 +(γk − 1)2a2 +k+1uT E +� +YkY T +k +� +u. +By Lemma A.14 and a finite summation, +E +� +⟨M(u)⟩n +� +∼ wnuT u − +n−1 +� +k=1 +a2(β + 1)2 +k2 +(k + 1)−2a(β+1)(C1k2a(β+1) + C2k1+2β)uT u +∼ wnuT u − (C1n−1 + C2n−2(a(β+1)−β))uT u. +Similarly, +E +� +⟨N(u)⟩n +� += E +� +Tr⟨N⟩n +� +uT u = +� +β +β − a(β + 1) +�2 +nuT u − +n−1 +� +k=1 +a2(β + 1)2 +k2 +µ−2 +k+1uT E +� +YkY T +k +� +u. +Hence, using Lemma A.14 again, we observe +E +� +⟨N(u)⟩n +� +∼ +� +β +β − a(β + 1) +�2 +nuT u − +n−1 +� +k=1 +a2(β + 1)2 +k2 +(k + 1)−2β(C1k2a(β+1) + C2k1+2β)uT u +∼ +� +β +β − a(β + 1) +�2 +nuT u − (C1n1−2(1−a)(β+1) + C2)uT u. +□ +Lemma A.16. For all p ∈ (0, 1) and test vector u ∈ Rd, we have, as n → ∞, +E +� +⟨M(u), N(u)⟩n +� +∼ +β +β − a(β + 1) · Γ(β + 1)Γ(a(β + 1) + 1) +(1 − a)(β + 1) +n(1−a)(β+1)uT u +− (C1n−(1−a)(β+1) + C2n(1−a)(β+1)−1)uT u. +Proof. By (3.7) and Lemma A.2, for all test vector u ∈ Rd +∆Ln+1(u) = +� +βµ−1 +n+1 +β − a(β + 1) +�T +ϵn+1(u), + +34 +JIAMING CHEN AND LUCILE LAULIN +and therefore, +⟨M(u), N(u)⟩n = +n +� +k=1 +β +β − a(β + 1)akµ−1 +k E +� +ϵk(u)ϵk(u)T |Fk−1 +� +. +Taking the trace will give us +Tr⟨M, N⟩n = +β +β − a(β + 1) +n +� +k=1 +akµk − +β +β − a(β + 1) +n +� +k=1 +akµ−1 +k (γk − 1)2∥Yk∥2. +Taking the expectation and using Lemma A.14 completes the proof. +□ +A.4. Moderate deviations. +Lemma A.17. For all p ∈ (0, 1) and for all j = 1, . . . , d, +��∆M j +n +�� ≤ +� +a(β + 1) + 1 +� +anµn +for all +n ∈ N. +(A.36) +Proof. By (2.3) and (3.1), +∆M j +n = anY j +n − an−1Y j +n−1 = anµnXj +n − (an − an−1) +n−1 +� +k=1 +µkXj +k. +Since ∥Xk∥ = 1 for eack k ≤ n, then by (2.4), +��∆M j +n +�� ≤ anµn + (n − 1)(an−1 − an)µn−1 ≤ anµn + a(β + 1)anµn. +And the assertion is verified. +□ +Lemma A.18. For all p ∈ (0, 1) and for all j = 1, . . . , d, +��∆N j +n +�� ≤ 2a(β + 1) + +β +β − a(β + 1) +for all +n ∈ N. +Proof. By (2.3) and (3.6), +∆N j +n = +βµ−1 +n+1 +β − a(β + 1)ϵj +n+1 = +βµ−1 +n+1 +β − a(β + 1) · +� +µn+1Xj +n+1 + (1 − γn) +n +� +k=1 +Xj +kµk +� +. +Taking absolute value on both sides, and the assertion is verified. +□ +Lemma A.19. For all p ∈ (0, 1) and for all j = 1, . . . , d, +���� +1 +√wn +∆M j +k +���� ≤ +� +a(β + 1) + 1 +�anµn +√wn +for each +1 ≤ k ≤ n, +(A.37) +and in the diffusive and critical regime, +���� +1 +wn +⟨M j⟩n − 1 +���� ≤ +� +� +� +C · n−1 +when +a < 1 − +1 +2(β+1) +C · (log n)−1 +when +a = 1 − +1 +2(β+1). +Proof. Dividing by √wn from both sides of (A.36), we get (A.37). Moreover, by (A.9), +��⟨M j⟩n − wn +�� ≤ +n +� +k=1 +(γk − 1)2a2 +k+1∥Yk∥2 ≤ C +n +� +k=1 +wk +k2 . +Dividing both sides by wn and following (3.3), (3.4), the assertion is verified. +□ +Lemma A.20. For all p ∈ (0, 1) and for all j = 1, . . . , d, +���� +anµn +√wn +∆N j +k +���� ≤ +� +2a(β + 1) + +β +β − a(β + 1) +�anµn +√wn +for each +1 ≤ k ≤ n, +(A.38) + +MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK +35 +and in both the diffusive and critical regime, +���� +a2 +nµ2 +n +wn +⟨N j⟩n − 1 +���� ≤ +� +� +� +C · n−2(1−a)(β+1) +when +a < 1 − +1 +2(β+1) +C · (n log n)−1 +when +a = 1 − +1 +2(β+1). +Proof. Dividing by √wn and multiplied by anµu from both sides of (A.18), we get (A.38). Then, +by (A.10), we make use of the estimates and the inequalities hold. +□ +Denote by Φ(·) := (2π)−1/2 � · +−∞ e−t2/2 dt the cumulative distribution of the standard normal +random variable. The following lemmas are straightforward derivations from [19, Theorem 1], see +also [22]. +Lemma A.21. There exists an absolute constant α′(p, β) > 0 depending only on p, β such that +for all j = 1, . . . , d and all 0 ≤ x ≤ α′(p, β) · n−1/2, in the diffusive and critical regime, +P(M j +n/√wn ≥ x) +1 − Φ(x) += P(M j +n/√wn ≤ −x) +1 − Φ(−x) += +� +� +� +C · exp +� +x3 +√n + x2 +n + +1 +√n(1 + 1 +2 log n)(1 + x) +� +when +a < 1 − +1 +2(β+1) +C · exp +� +x3 +√n + +x2 +log n + ( +1 +√log n + +1 +2√n log n)(1 + x) +� +when +a = 1 − +1 +2(β+1). +Lemma A.22. There exists an absolute constant α′′(p, β) > 0 depending only on p, β such that +for all j = 1, . . . , d and all 0 ≤ x ≤ α′′(p, β) · n−1/2, in the diffusive and critical regime, +P(anµnN j +n/√wn ≥ x) +1 − Φ(x) += P(anµnN j +n/√wn ≤ −x) +1 − Φ(−x) += +� +� +� +C · exp +� +x3 +√n + +x2 +n2(1−a)(β+1) + +1 +√n(n1/2−(1−a)(β+1) + 1 +2 log n)(1 + x) +� +when +a < 1 − +1 +2(β+1) +C · exp +� +x3 +√n + +x2 +n log n + ( +1 +√n log n + +1 +2√n log n)(1 + x) +� +when +a = 1 − +1 +2(β+1). +Acknowledgements. The authors wish to thank Jean Bertoin and Pierre Tarres for numerous +discussions and insightful comments. +References +[1] E. Baur. On a class of random walks with reinforced memory. J. Stat. Phys. 181 (2020), 772–802. +[2] M. Bauer, D. Bernard, K. Kyt¨ol¨a. Multiple Schramm-Loewner Evolutions and Statistical Mechanics Martin- +gales. J. Stat. Phys., 120: 1125–1163, 2005. +[3] E. Baur, J. Bertoin. Elephant random walks and their connection to P´olya-type urns. Phys. Rev. E, 94 (5): +052134, 2016. +[4] M. Bena¨ım, S. J. Schreiber, P. Tarr`es. Generalized urn models of evolutionary processes. Ann. Appl. Probab., +14 (3): 1455–1478, 2004. +[5] B. Bercu. A martingale approach for the elephant random walk. J. Phys. A: Math. Theor., 51: 015201, 2017. +[6] B. Bercu, M.-L. Chabanol, J.-J. Ruch. Hypergeometric identities arising from the elephant random walk. J. +Math. Anal. Appl., 488: 123360, 2019. +[7] B. Bercu, L. Laulin. How to estimate the memory of the elephant random walk. Commun. Stat. Theor. Method., +2022. +[8] B. Bercu, L. Laulin. On the center of mass of the elephant random walk. Sto. Proces. Appl., 133: 111–128, +2021. +[9] B. Bercu, L. Laulin. On the Multi-dimensional Elephant Random Walk. J. Stat. Phys., 175: 1146–1163, 2019. +[10] M. Bertenghi. Functional limit Theorems for the multi-dimensional elephant random walk. Sto. Model., 38 (1): +37–50. 2022. +[11] J. Bertoin. Counting the zeros of an elephant random walk. Trans. Am. Math. Soc., 375 (8): 5539–5560, 2022. +[12] J. Bertoin. Scaling exponents of step-reinforced random walks. Probab. Theor. Rel. Field., 179 (1): 295–315, +2021. +[13] S. Businger. The shark random swim (L´evy flight with memory). J. Stat. Phys. 172, 3 (2018), 701–717. + +36 +JIAMING CHEN AND LUCILE LAULIN +[14] F. Chaabane, F. Maaouia. Th´eor`emes limites avec poids pour les martingales vectorielles. ESAIM Prob. Stat., +4: 137–189, 2000. +[15] J. Chen, V. Margarint. Perturbations of multiple Schramm–Loewner evolution with two non-colliding Dyson +Brownian motions. Sto. Proces. Appl., 151: 553–570, 2022. +[16] C. F. Coletti, R. Gava, G. M. Sch¨utz. Central limit Theorem and related results for the elephant random walk. +J. Math. Phys., 58 (5): 053303, 2017. +[17] P. Dai Pra, P. Louis, I. Minelli. Synchronization via Interacting Reinforcement. J. Appl. Probab., 51 (2): +556–568, 2014. +[18] M. Duflo. Random iterative models. Appl. Math. Springer-Verlag, Berlin, 34, 1997. +[19] X. Fan, I. Grama, Q. Liu. Cram´er Moderate Deviation Expansion for Martingales with One-Sided Sakhanenko’s +Condition and Its Applications. J. Theor. Prob., 33: 749–787, 2020. +[20] X. Fan, H. Hu, X. Ma. Cram´er moderate deviations for the elephant random walk. J. Stat. Mech., 023402, +2021. +[21] X. Ma, M. E. Machkouri, X. Fan. On Wasserstein-1 distance in the central limit Theorem for elephant random +walk. J. Math. Phys., 63: 013301, 2022. +[22] I. Grama, E. Haeusler. Large deviations for martingales via Cram´er’s method. Sto. Proces. Appl., 85: 279–293, +2000. +[23] K. Grill. On the average of a random walk. Stat. Probab. Lett., 6 (5): 357–361, 1988. +[24] A. Gut, U. Stadtm¨uller. The elephant random walk with gradually increasing memory. arXiv:2110.13497 +(2021). +[25] A. Gut, U. Stadtm¨uller. Variations of the elephant random walk. J. Appl. Probab. 58, 3 (2021), 805–829 +[26] M. Hayashi, S. Oshiro, M. Takei. Rate of moment convergence in the central limit Theorem for elephant +random walks. arXiv preprint, arXiv: 2205.00651, 2022. +[27] G. Kozma Reinforced random walk. In European Congress of Mathematics. Eur. Math. Soc., Z¨urich, 2013, +pp. 429–443. +[28] N. Kubota, M. Takei. Gaussian fluctuation for superdiffusive elephant random walks. J. Stat. Phys. 177, 6 +(2019), 1157–1171. +[29] R. K¨ursten. Random recursive trees and the elephant random walk. Physical Review E 93, 032111 (2016). +[30] D. Lamberton, G. Pag`es, P. Tarr`es. When Can the Two-Armed Bandit Algorithm Be Trusted? Ann. Appl. +Probab., 14 (3): 1424–1454, 2004. +[31] L. Laulin. Introducing smooth amnesia to the memory of the Elephant Random Walk. Electron. Commun. +Prob., 27: 1–12, 2022. +[32] L. Laulin. New Insights on the Reinforced Elephant Random Walk Using a Martingale Approach. J. Stat. +Phys., 186, 9, 2022. +[33] J. Li, Z. Hu. Toeplitz Lemma, Complete Convergence and Complete Moment Convergence. Commun. Stat.- +Theor. Method., 46 (4): 1731–1743, 2017. +[34] C. H. Lo, A. R. Wade. On the centre of mass of a random walk. Sto. Proces. Appl., 129 (11): 4663–4686, 2019. +[35] R. Marcaccioli, G. Livan. A P´olya urn approach to information filtering in complex networks. Nat. Commun., +10, 745 (2019). +[36] J. McRedmond, A. R. Wade. The convex hull of a planar random walk: perimeter, diameter, and shape. +Electron. J. Probab. 23: 1–24, 2018. +[37] F. Merkl, S. W. W. Rolles. Linearly edge-reinforced random walks. IMS Lect Note - Mon. Ser. Dyn. Sto., 48: +66–77, 2006. +[38] R. Pemantle. A survey of random processes with reinforcement. Probab. Surveys 4 (2007), 1–79. +[39] R. Pemantle. Vertex-reinforced random walk. Probab. Theor. Rel. Field., 92: 117–136, 1992. +[40] G. M. Sch¨utz, S. Trimper. Elephants can always remember: +Exact long-range memory effects in a non- +markovian random walk. Physical review. E 70, 045101 (2004). +[41] C. Sheng. Arzela-Ascoli’s Theorem and Applications. Preprint., 2022100209, 2022. +[42] A. Touati. Sur la convergence en loi fonctionnelle de suites de semimartingales vers un m´elange de mouvements +browniens. Teor. Veroyatnost. i Primenen., 36 (4): 744–763, 1991. +[43] A. R. Wade, C. Xu. Convex hulls of planar random walks with drift. Proc. Amer. Math. Soc., 143 (1): 433–445, +2015. +Departement Mathematik, ETH Z¨urich +Current address: 101, R¨amistrasse, CH-8092 Z¨urich, Switzerland +Email address: jiamchen@student.ethz.ch +Laboratoire de Math´ematiques Jean Leray, Nantes Universit´e +Current address: 2 Chem. de la Houssini`ere, 44322 Nantes, France +Email address: lucile.laulin@math.cnrs.fr + diff --git a/-NFAT4oBgHgl3EQfqB2B/content/tmp_files/load_file.txt b/-NFAT4oBgHgl3EQfqB2B/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..be1e41d6cd49d12d1af8178976c5533c2a4c8310 --- /dev/null +++ b/-NFAT4oBgHgl3EQfqB2B/content/tmp_files/load_file.txt @@ -0,0 +1,1637 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf,len=1636 +page_content='ANALYSIS OF THE SMOOTHLY AMNESIA-REINFORCED MULTIDIMENSIONAL ELEPHANT RANDOM WALK JIAMING CHEN AND LUCILE LAULIN Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In this work, we discuss the smoothly amnesia-reinforced multidimensional elephant random walk (MARW).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The scaling limit of the MARW is shown to exist in the diffusive, critical and superdiffusive regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We also establish the almost sure convergence in all of the three regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The quadratic strong law is displayed in the diffusive regime as well as in the critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The mean square convergence towards a non-Gaussian random variable is established in the superdiffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar results for the barycenter process are also derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, the last two Sections are devoted to a discussion of the convergence velocity of the mean square displacement and the Cram´er moderate deviations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Contents 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Introduction 1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The amnesia-reinforced elephant random walk 4 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A correlated martingale approach 6 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling limit and convergence 7 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling limit of the barycenter process 13 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Velocity of quadratic mean displacement 21 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Cram´er moderate deviations 23 Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Technical Lemmas 24 References 35 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Introduction The study of reinforced processes and reinforced random walks has known a growing interest over the last decades.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In particular, random walks on graphs, or more precisely edge [37] or vertex [39] reinforced random walks, have been the subject of a great number of contributions, see also [1, 12, 27] and the references therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The insight of introducing reinforcement mechanisms to stochastic processes has also shed light on more applied models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In [30], the adaptive strategy of an agent who plays a two-armed bandit machine was described as a self-reinforced random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The philosophy of stochastic reinforcement has also been discussed in the topics of evolutionary ecology [4] and machine learning theory [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Another manifestation of reinforced P´olya urn models on financial economics can be found in [35].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We also refer the readers to [38] for a comprehensive and extensive survey on the subject.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The Elephant Random Walk (ERW) is a discrete-time random walk, introduced by Sch¨utz and Trimper [40] in 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It was referred to as the ERW in allusion to the traditional saying that elephants can always remember anywhere they have been.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' As it was pointed out [12] by Bertoin 2010 Mathematics Subject Classification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 60G50, 60G42, 62M09.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Key words and phrases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Reinforced random walk, scaling limit, Cram´er moderate deviation, martingale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='08644v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='PR] 20 Jan 2023 2 JIAMING CHEN AND LUCILE LAULIN (a) Diffusive regime (b) Critical regime (c) Superdiffusive regime Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The two-dimensional ERW with amnesia (in blue) and its barycenter (in red).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' who relied on K¨ursten’s work [29], the ERW is a special case of step-reinforced random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In fact, the ERW is reinforced because its behavior is influenced by its past : the ERW may have a tendency to do the same thing over and over, or on the contrary, it may try to compensate its previous steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This different types of behavior, here-called regimes, are ruled by the memory parameter p and it is well-known that the ERW shows three regimes of behavior and that the critical value is p = 3/4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The ERW in dimension d = 1 has received a lot of attention from mathematicians and physicists over the last two decades.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The almost sure convergence and the asymptotic normality of the position of the ERW were established in the diffusive regime p < 3/4 and the critical regime p = 3/4, see [3, 9, 16] and the references therein.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the superdiffusive regime p > 3/4, Bercu [5] proved that the limit of the position of the ERW is not Gaussian and Kubota and Takei [28] showed that the fluctuation of the ERW around this limit is Gaussian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' To obtain those asymptotics, various approaches have been followed : Baur and Bertoin [3] went with the connection to P´olya- type urns while martingales were used by Bercu [5] and Coletti et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [16] and the construction of random trees with Bernoulli percolation have been explicited by K¨ursten [29] and Businger [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Other quantities of interest regarding the ERW have been studied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For example, Fan et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [20] provided the Cramer moderate deviations associated with the ERW in dimension 1 and, more recently, Hayashi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [26] studied the rate of quadratic mean displacement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bercu and Laulin [9] introduced the multidimensional ERW (MERW), where d ≥ 1, and estab- lished the natural extensions of the results [5] in dimension d = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, they investigated the center of mass of the MERW [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In both papers, they extensively used a martingale approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bertenghi [10] made use of the connection to P´olya-type urns in order to establish functional results for the MERW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, the ERW with changing memory has also been introduced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The ERW with linearly reinforced memory has been studied by Baur [1] via the urn approach, and Laulin [31] using martingales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Gut and Stadm¨uller [25] proposed an amnesic ERW where the elephant could stop and only remember the first (and second) step it tooks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' They also investigated the case where the elephant only remembered a fixed or time-evolving portion of its past (recent or distant) [24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the recent work [32], Laulin introduced smooth amnesia to the memory of the ERW and established the asymptotic behavior of this new process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The idea of our paper is to generalise the work [32] in dimension 1 to the dimension d ≥ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In other words, we introduce smooth amnesia to the memory of the multidimensional elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 40 19 30 20 10 0 10 20 0 10 20 30 40 50 60400 300 200 100 0 0 50 100 150 200 250 35060 50 40 30 20 10 0 0 200 400 600 800MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 3 Our paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In Section 2, we introduce the basic setting of the elephant random walk (Sn)n∈N placed under an amnesia reinforcement mechanism, which is controlled by the memory sequence (βn)n∈N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This type of multidimensional reinforced random walked is named as the multidimensional amnesia-reinforced elephant random walk (MARW).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar to the ERW with the amnesia reinforcement, the MARW also admits a martingale structure, which is discussed in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Unlike the usual ERW, the additional amnesia-reinforcement induces two discrete-time martingales, instead of a single martingale, which are strongly correlated in a nontrivial fashion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Such strong correlation of martingales will eventually pose some computational difficulties when we analyze the limiting behavior of the MARW in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For instance, when we compute the pointwise limit and the scaling limit of (Sn)n∈N in the diffusive regime, the two strongly correlated martingales have to be dealt with separately, see [8, 31, 32] for the same methodology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' As a courtesy to our readers, we give a preview of some of our main results, whose proofs will be deferred to Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2, and Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the diffusive regime, we have the almost sure convergence, 1 nSn → 0 as n → ∞ P − a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Another logarithmic scaling to the MARW yields the quadratic strong law, 1 log n n � k=1 SkST k k2 → C(p, (βn)n∈N) · 1 dId as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where the constant C(p, (βn)n∈N) > 0 depends only on the parameter p and the control sequence (βn)n∈N of the amnesia-reinforcement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Using square-root scaling factor, we observe that the MARW also admits a scaling limit in the diffusive regime, or convergence in distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that � 1 √nS⌊nt⌋, t ≥ 0 � =⇒ � Wt, t ≥ 0 � where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process such that W0 = 0 and with covariance structure given in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is also of interest to look at the barycenter process (Gn)n∈N of the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Its definition as well as its limiting behavior are discussed in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar to the discussion of the MARW, we obtain its pointwise convergence, quadratic strong law, and its scaling limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In particular, Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5 states that the barycenter process admits a scaling limit at the diffusive regime, or convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that � 1 √nG⌊nt⌋, t ≥ 0 � =⇒ � 1 � 0 Wtr dr, t ≥ 0 � where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process defined in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3 with its covariance structure defined in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A natural question to ask is how fast the limiting Theorems in Section 4 are carried on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Section 6 provides a quantitative estimate on the mean square convergence velocity of the pointwise limit, quadratic strong law, and the scaling limit of the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It should be possible to derive similar convergence velocity to the barycenter process, which is not computed in this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In Section 7, we end this work with a discussion on the Cram´er moderate deviations of the MARW in the diffusive and critical regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' As a preview of our result in this Section, let (ϑn)n∈N ⊆ R be a non-decreasing sequence so that ϑn/√n → 0 as n → ∞, and wn the sequence with asymptotic 4 JIAMING CHEN AND LUCILE LAULIN behavior described in Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Take any non-empty Borel set B ⊆ Rd, then we have − inf x∈int B 1 2∥x∥2 ≤ lim inf n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≤ lim sup n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≤ − inf x∈cl B 1 2∥x∥2, (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) where int B and cl B denote the interior and the closure of B ⊆ Rd, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This is the Cram´er moderate deviations for the MARW in the diffusive and critical regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, we chose to postpone some technicalities regarding the analysis of the random walk to the Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' That way, the reader can focus on the main Theorems and the ideas of their proofs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' However, some analogous technicalities are displayed in the proof of the Theorems on the barycenter such that the reader can also have a complete overview of the work needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Other probabilistic aspects of interest to the MARW include the statistical inference and an analysis on the Fisher information, see [7], as well as the Wasserstein distance of the reinforced random walk, see [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Perturbations of the amnesia intensity and its stability for the MARW is also of independent interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A similar topic for another type of stochastic process, the Schramn- Loewner evolution, has been considered in [2, 15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The transience and recurrence property of the MARW remains unknown, to the best of our knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Readers are referred to [11, 20] for an exposition on the ERW without the amnesia reinforcement mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The amnesia-reinforced elephant random walk To begin with, let us properly introduce the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is the natural extension to higher dimensions of the one-dimensional MARW, defined in [31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For an arbitrarily given dimension d ≥ 1, let (Sn)n∈N be a (reinforced) random walk on Zd starting from the origin at time n = 0, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' S0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' At time n = 1, the reinforced random walk moves to one of the 2d nearest-neighbors with equal probability 1/2d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' After that, at time n ≥ 1, the reinforced random walk chooses at random an integer 1 ≤ k ≤ n among the past times and performs the same step with probabily p, or goes in any of the 2d − 1 other directions with probability (1 − p)/(2d − 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This random walk possesses the amnesia property, in the sense that it remembers its most recent past steps better than its remote past steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Colloquially, this random walk has higher probability to choose its recent steps than its earlier steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From a mathematical perspective, the position of this reinforced random walk at time n+1 ≥ 1 is given by Sn+1 = Sn + Xn+1 with Xn+1 being defined as the step of this random walk at time n + 1, satisfying Xn+1 = An+1Xβn+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Here An+1 is a random d × d matrix given by P(An = +Id) = p, and, for all 1 ≤ k ≤ d − 1, P(An = −Id) = P(An = +Jk d ) = P(An = −Jk d ) = 1 − p 2d − 1 where Id is the identity matrix of order d, Id = (δi,j)d and Jd = C(0, 1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , 0) is the circulant matrix of order d such that J = (δi+1,j)d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is easy to observe that the fixed permutation matrix Jd satisfied Jd d = Id.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The distribution of the memory βn of the reinforced random walk is such MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 5 that the probability of choosing a fixed past time k ∈ N decays approximately with rate kβ/nβ+1, where β ≥ 0 is the amnesia parameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (a) n = 10 (b) n = 100 Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Evolution of the distribution of the memory β depending on the value of β and the time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' To be precise, this random walk chooses βn+1 according to P � βn+1 = k � = (β + 1)Γ(β + k)Γ(n) Γ(k)Γ(β + n + 1) = β + 1 n µk µn+1 for all 1 ≤ k ≤ n, where µn = n−1 � k=1 � 1 + β k � = Γ(β + n) Γ(n)Γ(β + 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) (a) d = 1 (b) d = 2 (c) d = 3 (d) d = 10 Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Competition between the dimension and the amnesia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Figure 3 aims to give a better understanding on how amnesia affects the MARW in various dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The horizontal axis corresponds to p (from 0 to 1) and the vertical axis corresponds to β (from 0 to 10, arbitrary chosen).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The diffusive regime, ie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' when p < 4dβ+2d+1 4d(β+1) or a < 1− 1 2(β+1), is in blue while the superdiffusive regime is in red, see Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1 for the definition of the regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' One can observe that when the amnesia parameter β grows, the superdiffusive regime tends to be less represented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It should also be noted that when the dimension grows the superdiffusive regime is more important.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, the amnesia is somehow leading the MARW to a behavior closer to the one in dimension 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' When β vanishes, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' β = 0, the MARW reduces to the multidimensional elephant random walk (MERW) introduced in [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The two random variables An and βn are constructed to be conditionally independent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' At each time n, define the σ-algebra Fn = σ(X1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , Xn).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then (Fn)n∈N is a discrete-time filtration to which the MARW is clearly adapted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' β= 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5 β= 1 β= 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 β= 5 β= 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 2 4 9 00 100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10 β= 0 β= 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='08 β= 2 β= 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='06 β= 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='04- 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='00 0 20 40 60 80 10010 8 - 6 4 2 - 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 p10 8 - 6 B 4 +0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 p10 8 - 6 B 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 p10 8 - 6 B 4 +0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='0 p6 JIAMING CHEN AND LUCILE LAULIN Since An and βn are conditionally independent, we clearly have E � Xn+1|Fn � = E � An � E � Xβn+1|Fn � = 2dp − 1 2d − 1 E � n � k=1 Xk1{βn+1=k}|Fn � = 2dp − 1 2d − 1 · β + 1 nµn+1 n � k=1 µkXk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) We further denote a = 2dp − 1 2d − 1 and Yn = n � k=1 µkXk (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) such that E � Yn+1|Fn � = � 1 + a(β + 1) n � Yn = γnYn with γn = 1 + a(β + 1)/n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hereafter, for each n ≥ 1, let an = n−1 � k=1 γ−1 k = Γ(n)Γ(a(β + 1) + 1) Γ(a(β + 1) + n) and wn = n � k=1 (akµk)2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) From a Gamma function estimate, also see in [31], we have that na(β+1)an → Γ(a(β + 1) + 1) as n → ∞ (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and n−βµn → Γ(β + 1)−1 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A correlated martingale approach Define the following two Rd-valued processes by Mn = anYn and Nn = Sn + a(β + 1) β − a(β + 1)µ−1 n Yn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The Rd-valued processes (Mn)n∈N and (Nn)n∈N defined in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) are locally square-integrable martingales adapted to (Fn)n∈N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since, both Mn and Nn are finite sums for each n ≥ 1, the square-integrability and adapt- ness are immediate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4), we have E � Mn+1|Fn � = anγ−1 n Yn + anµnγ−1 n E � Xn+1|Fn � = anYn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' And by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2), we have E � Nn+1|Fn � = E � Sn+1 + a(β + 1) β − a(β + 1)µ−1 n+1Yn+1|Fn � = Sn + a(β + 1) β − a(β + 1)µ−1 n Yn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Notice that via introducing the martingales (Mn)n∈N and (Nn)n∈N, we can write Sn as Sn = Nn − a(β + 1) β − a(β + 1)(anµn)−1Mn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) This writing is the key on which rely all of our analysis and our martingale approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, the asymptotic behavior of (Mn)n∈N is closely related to wn defined in (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In fact, we have the following asymptotic result, which states the three regimes of the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the diffusive regime when p < 4dβ+2d+1 4d(β+1) or a < 1 − 1 2(β+1), we have wn n1−2(a(β+1)−β) → l(β) as n → ∞ (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 7 with l(β) = 1 1 + 2(β − a(β + 1)) �Γ(a(β + 1) + 1) Γ(β + 1) �2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the critical regime when p = 4dβ+2d+1 4d(β+1) or a = 1 − 1 2(β+1), we have wn log n → �Γ(β + 1 + 1 2) Γ(β + 1) �2 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) In the superdiffusive regime when p > 4dβ+2d+1 4d(β+1) or a > 1 − 1 2(β+1), we have wn → ∞ � k=1 �Γ(a(β + 1) + 1)Γ(β + k) Γ(a(β + 1) + k)Γ(β + 1) �2 < ∞ as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) In order to investigate the asymptotic behavior of (Sn)n∈N, we first introduce an arbitrarily fixed test non-zero vector u ∈ Rd and we define Mn(u) = uT Mn and Nn(u) = uT Nn for each n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is then clear that (Mn(u))n∈N (Nn(u))n∈N are real-valued locally square-integrable martingales for each fixed u ∈ Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We further infer that (Sn(u))n∈N satisfies an equation analogous to (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In this setting, we have reduced the multidimensional martingales to real-valued martingales without loss of generality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This technique greatly simplifies our martingale analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From now on, we fix the test vector u ∈ Rd and we introduce the two-dimensional martingale (Ln(u))n∈N defined as Ln(u) = � Nn(u) Mn(u) � for each n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) Denote the martingale increment ϵn+1 = Yn+1 − γnYn for each n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then (ϵn)n∈N satisfies the martingale difference relation E[ϵn+1|Fn] = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We obtain that ∆Ln+1(u) = Ln+1(u) − Ln(u) = � Sn+1(u) − Sn(u) + a(β+1) β−a(β+1) � µ−1 n+1Yn+1(u) − µ−1 n Yn(u) � an+1Yn+1(u) − anYn(u) � = � βµ−1 n+1 β−a(β+1) � µn+1Xn+1(u) − (γn − 1)Yn(u) � an+1ϵn+1(u) � = � βµ−1 n+1 β−a(β+1) an+1 � ϵn+1(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling limit and convergence In this section, we discuss the scaling limit as well as the almost sure convergence in the diffusive, critical and the superdiffusive regimes, depending on the value of p with respect to (4dβ +2d+1)/(4d(β +1)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We also give the quadratic strong law in the diffusive regime as well as in the critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Afterwards, the mean square convergence is established in the superdiffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the almost sure convergence 1 nSn → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 8 JIAMING CHEN AND LUCILE LAULIN Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have from [18, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15] again that, for all γ > 0, ∥Mn∥2 λmax⟨M⟩n = o �� log Tr⟨M⟩n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) From equation (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9) and the fact that λmax⟨M⟩n ≤ Tr⟨M⟩n ≤ wn, we get ∥Mn∥2 = o � wn � log wn �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) By (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3), we observe ∥Mn∥2 = o � n1−2(a(β+1)−β)� log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since Mn = anYn, we have from equations (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) ∥Yn∥2 (nµn+1)2 = o � n−1� log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' which implies Yn nµn+1 → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10) and [18, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15] again, we find that ∥Nn∥2 = o � n � log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) Moreover, we obtain from equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) 1 n2 ����Sn + a(β + 1) (β − a(β + 1))µn+1 Yn ���� 2 = o � n−1� log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, we conclude that Sn n + a(β + 1) β − a(β + 1) · Yn nµn+1 → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and the proof is complete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the quadratic strong law 1 log n n � k=1 SkST k k2 → 2β + 1 − a (1 − a)(1 − 2(a(β + 1) − β)) · 1 dId as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We will check that all the conditions of [32, Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3] are satisfied, see also [14, 41].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) is satisfied thanks to Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 while the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) directly follows from Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5 and the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) is exactly the statement of Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, 1 log � det V −1 n �2 n � k=1 �(det Vk)2 − (det Vk+1)2 (det Vk)2 � VkLk(u)Lk(u)T V T k → 1 duT uVt=1 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the one hand, we have from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='24) that 1 log n n � k=1 �(det Vk)2 − (det Vk+1)2 (det Vk)2 � VkLk(u)Lk(u)T V T k → 2(1 − a)(β + 1) d uT uVt=1 (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the other hand, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='24), we have n �(det Vn)2 − (det Vn+1)2 (det Vn)2 � → 2(1 − a)(β + 1) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, we obtain from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) that 1 log n n � k=1 uT SkST k u k2 = 1 log n n � k=1 vT VkLk(u)Lk(u)T V T k v k → vT Vt=1v · 1 duT u (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 9 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since u ∈ Rd is arbitrary, the assertion follows from (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The MARW admits a scaling limit at the diffusive regime, or convergence in distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that � 1 √nS⌊nt⌋, t ≥ 0 � =⇒ � Wt, t ≥ 0 � where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process such that W0 = 0 and with covariance E � WsW T t � = a(β + 1)(1 − a) + aβ (2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a)s � t s �a−β(1−a) 1 dId + β (β(1 − a) − a)(1 − a)s · 1 dId for all 0 ≤ s ≤ t < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We will check that all the conditions of [32, Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2] are satisfied, see also [14, 41].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) is satisfied thanks to Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 while the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) directly follows from Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5 and the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) is exactly the statement of Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Consequently, we have the convergence in distribution in the Skorokhod space D(R+) such that � VnL⌊nt⌋(u), t ≥ 0 � =⇒ � Wt(u), t ≥ 0 � where (Wt(u))t≥0 is a continuous R2-valued centered Gaussian process such that W0 = 0 and with covariance E � Ws(u)Wt(u)T � = 1 duT uVs for all 0 ≤ s ≤ t < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2), we see that S⌊nt⌋(u) is asymptotically equivalent to N⌊nt⌋(u) + tβ−a(β+1) a(β + 1) β − a(β + 1)(anµn)−1M⌊nt⌋(u) P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Multiplying on the left side by vt = (1, ta(β+1)−β)T , we obtain � 1 √nS⌊nt⌋(u), t ≥ 0 � =⇒ � Wt(u), t ≥ 0 � with Wt(u) = vT t Wt(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hereafter, when 0 ≤ s ≤ t < ∞, we have the covariance E � Ws(u)Wt(u)T � = vT s E � Ws(u)Wt(u)T � vt = 1 d(uT u)vT s Vsvt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) Solving (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7), we have E � WsW T t � = 1 dvT s Vsvt for all 0 ≤ s ≤ t < ∞ and the assertion (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the almost sure convergence 1 √n log nSn → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We still have (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) such that ∥Mn∥2 = o � wn � log wn �1+γ� for all γ > 0 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' However, in the critical regime, we have (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) rather than (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3), and wn log n → �Γ(β + 1 + 1 2) Γ(β + 1) �2 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 10 JIAMING CHEN AND LUCILE LAULIN Since (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), and since Mn = anYn, we observe for all γ > 0 that ∥Yn∥2 n(log n)2µ2n = o � (log n)−1� log log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In this regard Yn √n log nµn → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8) Similarly, we still have (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10) and ∥Nn∥2 = o � n � log n �1+γ� for all γ > 0 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then ∥Nn∥2 n(log n)2 = o � (log n)γ−1� for all γ ∈ (0, 1) P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and therefore Nn √n log n → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2), we can hereafter conclude that Sn √n log n + a(β + 1) β − a(β + 1) · Yn √n log nµn → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Combining with (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8), the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the quadratic strong law 1 log log n n � k=1 SkST k (k log k)2 → (2β + 1)2 · 1 dId as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We will check that all the conditions of [32, Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3] are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) is satisfied thanks to Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 while the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) directly follows from Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9 and the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) is exactly the statement of Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, 1 log � det W −1 n �2 n � k=1 �(det Wk)2 − (det Wk+1)2 (det Wk)2 � WkLk(u)Lk(u)T W T k → 1 duT uW (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the one hand, we have from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='34) 1 log log n n � k=1 �(det Wk)2 − (det Wk+1)2 (det Wk)2 � WkLk(u)Lk(u)T W T k → 1 duT uW as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the other hand, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='33), we have n log n �(det Wk)2 − (det Wk+1)2 (det Wk)2 � → (2β + 1)2 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, we obtain from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9) that 1 log log n n � k=1 uT SkST k u (k log k)2 = 1 log log n n � k=1 wT WkLk(u)Lk(u)T W T k w k log k → (2β + 1)2 d uT u (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since u ∈ Rd is arbitrary, the assertion follows from (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The MARW admits a scaling limit at the critical regime, or convergence in dis- tribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that � 1 � nt log n S⌊nt⌋, t ≥ 0 � =⇒ � (2β + 1)Bt, t ≥ 0 � MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 11 where (Bt)t≥0 is a continuous d-dimensional canonical Brownian motion with covariance E � BsBT t � = s · 1 dId for all 0 ≤ s ≤ t < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We will check that all the three conditions of [32, Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2] are satisfied, see also [42, Theorem 1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' First of all, by (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) we know that w−1/2 n ⟨M(u)⟩⌊nt⌋w−1/2 n → t d · uT u as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) Hence the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Notice that ⌊nt⌋ � k=1 1 wn E � ∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1 � ≤ ⌊nt⌋ � k=1 �w⌊nt⌋ wn �2 1 ϵ2w2 ⌊nt⌋ E � ∆Mk(u)4|Fk−1 � , (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12) since (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21), we observe that ⌊nt⌋ � k=1 ��∆Mk(u)4�� ≤ C1(β)∥u∥4 ⌊nt⌋ � k=1 (akµk)4 ≤ C2(β)∥u∥4 ⌊nt⌋ � k=1 1 k2 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13) with constants C1(β), C2(β) > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, by (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13), we have ⌊nt⌋ � k=1 1 wn E � ∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1 � ≤ C3(β)∥u∥4 · t2 ϵ2 · 1 nt(log nt)2 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Simplifying the above expression, we obtain ⌊nt⌋ � k=1 1 wn E � ∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14) Then the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2), or the Lindeberg condition, is satisfied by (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In this particular case at critical regime, (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) implies that the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence � 1 √wn M⌊nt⌋(u), t ≥ 0 � =⇒ � Bt(u), t ≥ 0 � where (Bt(u))t≥0 is a continuous real-valued centered Gaussian process such that B0(u) = 0 and with covariance E � Bs(u)Bt(u) � = s d · uT u for all 0 ≤ s ≤ t < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the critical regime, from (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) we can write S⌊nt⌋(u) = N⌊nt⌋(u) + (2β + 1) M⌊nt⌋(u) a⌊nt⌋µ⌊nt⌋ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15) From (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8) we know that ⟨N(u)⟩⌊nt⌋ nt log n → 0 and N⌊nt⌋(u) � nt log n → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16) Using (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) again, we conclude that � 1 � nt log n S⌊nt⌋(u), t ≥ 0 � =⇒ � (2β + 1)Bt(u), t ≥ 0 � with E � Bs(u)Bt(u) � = s · uT u d for all 0 ≤ s ≤ t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17) Solving (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17), we get E � BsBT t � = s · 1 dId for all 0 ≤ s ≤ t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 12 JIAMING CHEN AND LUCILE LAULIN which completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The superdiffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the almost sure convergence 1 na(β+1)−β Sn → Lβ as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where the limiting Lβ is an Rd-valued random variable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In fact, from Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 below, we will see the random vector Lβ is non-degenerate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7), in the superdiffusive regime, we have Tr⟨M⟩n ≤ wn ≤ ∞ � k=1 �Γ(a(β + 1) + 1)Γ(β + k) Γ(a(β + 1) + k)Γ(β + 1) �2 < ∞ for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By [18, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15], this leads to Mn → M as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' with M = ∞ � k=1 akϵk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1), Mn = anYn, and by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), we observe that Yn na(β+1) → 1 Γ(a(β + 1) + 1)M as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18) Moreover, equations (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) still holds and, as 2a(β + 1) > 2β + 1 in the superdiffusive regime, we find that 1 n2(a(β+1)−β) ����Sn + a(β + 1) (β − a(β + 1))µn+1 Yn ���� 2 = o � n−(1−2a(β+1)+2β)� log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Thanks to (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), we obtain Sn na(β+1)−β + a(β + 1) β − a(β + 1) · Γ(β + 1)Yn na(β+1) → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19) Combining (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18), it yields Sn na(β+1)−β → Lβ as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where Lβ = a(β + 1) a(β + 1) − β · Γ(β + 1) Γ(a(β + 1) + 1)M (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20) and the assertion follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the following mean square convergence E ����� 1 na(β+1)−β Sn − Lβ ���� 2� → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For each test vector u ∈ Rd, we have E � Mn(u)2� = E � ⟨M(u)⟩n � ≤ 1 dwnuT u for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), we obtain sup n≥1 E � Mn(u)2� < ∞ which implies that (Mn(u))n∈N is a martingale bounded in L2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore E � |Mn(u) − M(u)|2� → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22) MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 13 Moreover, on the one hand (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22) together with (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18) implies that E ����� 1 na(β+1) Yn(u) − Y (u) ���� 2� → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='23) On the other hand, from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8) we know that E � Nn(u)2� = E � ⟨N(u)⟩n � ≤ 1 d � β β − a(β + 1) �2 nuT u for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since a(β + 1) > β + 1 2 in the superdiffusive regime, we have E ����� 1 na(β+1)−β Nn(u) ���� 2� → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='24) The proof is complete by combining (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='23) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='24).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The expected value of Lβ is E � Lβ � = 0 (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='25) whereas its quadratic deviation is E � LβLT β � = � a(β + 1) β − a(β + 1) �2 Γ(β + 1)2Γ(2(a − 1)(β + 1) + 1) Γ((2a − 1)(β + 1) + 1)2 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='26) Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The MARW admits a scaling limit at the superdiffusive regime, or convergence in distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that � 1 na(β+1)−β S⌊nt⌋, t ≥ 0 � =⇒ � Qt, t ≥ 0 � (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='27) with the limiting Qt = ta(β+1)−βLβ for all t ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all t ≥ 0 and from (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19), we observe that S⌊nt⌋ ⌊nt⌋a(β+1)−β + a(β + 1) β − a(β + 1) · Y⌊nt⌋ ⌊nt⌋a(β+1) → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' which implies 1 na(β+1)−β Sn → ta(β+1)−βLβ as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='28) The P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' convergence in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='28)holds in all finite-dimensional distributions which characterizes the Skorokhod space topology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, we have (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='27) and the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling limit of the barycenter process The study of the scaling limit of the MARW (Sn)n∈N gives us some information on its asymptotic behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Nonetheless, to understand its pathwise geometric features, we need to discuss its barycenter, or center of mass process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Such topics have been raised and discussed in [36, 43].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In this Section, we turn our attention to the above-mentioned barycenter process (Gn)n∈N defined by Gn := 1 n n � k=1 Sk (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) Our work contains the discussion on the scaling limit and the almost sure convergence in the diffusive, critical and superdiffusive regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The quadratic strong law in the diffusive and crit- ical regimes is also discussed while the mean square convergence in the superdiffusive regime is established.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 14 JIAMING CHEN AND LUCILE LAULIN 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Almost sure convergence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The barycenter process was discussed in [8] for the elephant random walk in dimension d, which is a special case of the process we study here when β = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We first begin with the almost sure convergence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the almost sure convergence, in the diffusive regime, 1 nGn → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) while in the critical regime, 1 √n log nGn → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and, in the superdiffusive regime, 1 na(β+1)−β Gn → 1 1 + a(β + 1) − β Lβ as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) where Lβ was characterized in Theorems 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7 and 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the diffusive regime, from (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) we observe that 1 nGn = n � k=1 k n2 · 1 k Sk = n � k=1 1 k Ska′ n,k with a′ n,k = k n2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since �n k=1 a′ n,k ≤ 1 for all n ∈ N and the almost sure convergence in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1, from Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12 we can conclude that 1 nGn = n � k=1 1 k Ska′ n,k → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' such that (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the critical regime, we have from (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) that 1 √n log nGn = 1 n3/2 log n n � k=1 Sk = n � k=1 1 √ k log k Ska′′ n,k with a′′ n,k = k1/2 log k n3/2 log n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since �n k=1 a′′ n,k ≤ 1 for all n ∈ N and the almost sure convergence in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4 holds, we get from Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12 hat 1 √n log nGn = n � k=1 1 √ k log k Ska′′ n,k → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and we obtain (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, in the superdiffusive regime, we also get from (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) that 1 na(β+1)−β Gn = 1 n1+a(β+1)−β n � k=1 Sn = n � k=1 1 ka(β+1)−β Ska′′′ n,k with a′′′ n,k = ka(β+1)−β n1+a(β+1)−β .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since n � k=1 a′′′ n,k → 1 1 + a(β + 1) − β as n → ∞ by a simple calculation, and because of the almost sure convergence in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7, we can conclude using Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13 1 na(β+1)−β Gn → 1 1 + a(β + 1) − β Lβ as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Quadratic strong law.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 15 Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the diffusive regime, we have the quadratic strong law 1 log n n � k=1 GkGT k k2 → 4I(a, β) · 1 dId as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where I(a, β) is given explicitly I(a, β) = 1 Γ(a(β + 1) + 1)2Γ(β + 1)2 · 2a2(1 − a)(β + 1)3 3(β − a(β + 1))2(1 − a(β + 1) + β).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We will check that all the three conditions of [32, Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2] are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Looking back to (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1), we observe that Gn = 1 n n � k=1 Nk − 1 n a(β + 1) β − a(β + 1) n � k=1 1 akµk Mk = 1 n n � k=1 Nk − 1 n a(β + 1) β − a(β + 1) n � k=1 1 akµk k � l=1 alϵl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, changing the order of summation, we have Gn = 1 n n � k=1 Nk − 1 n a(β + 1) β − a(β + 1) n � k=1 akϵk n � l=k 1 alϵl = 1 n n � k=1 Nk − 1 n a(β + 1) β − a(β + 1) n � k=1 ak(δn − δk−1)ϵk where we define δn = �n k=1(akµk)−1 for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, we denote Zn = n � k=1 Nk − a(β + 1) β − a(β + 1) n � k=1 akδk−1ϵk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' such that we have Gn = 1 nZn − δn n · a(β + 1) β − a(β + 1) n � k=1 akϵk = 1 n � Zn − a(β + 1) β − a(β + 1)δnMn � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For a fixed text vector u ∈ Rd, we define Hn(u) = � Zn(u) Mn(u) � for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) which implies ∆Hn(u) = Hn+1(u) − Hn(u) = � Nn+1(u)ϵn+1(u)−1 − a(β+1) β−a(β+1)an+1δn an+1 � ϵn+1(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, let Vn = 1 n3/2 � 1 0 0 a(β+1) β−a(β+1)δn � and v = � 1 −1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then it is immediate that vT VnHn(u) = 1 √nGn for all n ∈ N (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) and that lim n→∞ Vn⟨H(u)⟩nV T n = lim n→∞ 1 n3 � 1 −1 −1 1 � n−1 � k=1 � a(β + 1) β − a(β + 1) �2 δ2 ka2 k+1E � ϵk+1(u)2|Fk � = lim n→∞ 1 n3 · a2(1 − a)(β + 1)3uT u d(β − a(β + 1))2(1 − a(β + 1) + β) � 1 −1 −1 1 � n−1 � k=1 δ2 ka2 k+1µ2 k+1 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 16 JIAMING CHEN AND LUCILE LAULIN By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), we know that n−(1+a(β+1)−β)δn → 1 1 + a(β + 1) − β · 1 Γ(a(β + 1) + 1)Γ(β + 1) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence the above calculation leads us to Vn⟨H(u)⟩nV T n → I(a, β)uT u · 1 d � 1 −1 −1 1 � as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) where I(a, β) = 1 1 − 2(a(β + 1) − β) · a2(1 − a)(β + 1)3 (β − a(β + 1))2(1 − a(β + 1) + β).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8) Consequently, (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) ensures that the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Notice that by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1), there exists some constant C1(a, β) > 0 and similarly, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22), there exists some other constant C2(a, β) > 0 such that ∥Nn∥2 ≤ C1(a, β)n2 and a2 kϵk(u)2 ≤ C2(a, β)n2δ−2 n for all 1 ≤ k ≤ n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, notice that for all 1 ≤ k ≤ n, Vn∆Hk(u) = 1 n3/2 � Nk(u)ϵk(u)−1 − a(β+1) β−a(β+1)akδk−1 a(β+1) β−a(β+1)akδn � ϵk(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, for all 1 ≤ k ≤ n, we observe that ∥Vn∆Hk(u)∥2 ≤ 4a2 k n3 � a(β + 1) β − a(β + 1) �2��β − a(β + 1) aka(β + 1) Nk(u) ϵk(u) �2 + δ2 k−1 + δ2 n � ϵk(u)2 ≤ C(a, β) n (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9) for some constant C(a, β) > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Consequently, we n � k=1 E � ∥Vn∆Hk(u)∥4� ≤ 1 nC(a, β) → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' since, for all ϵ > 0, n � k=1 E � ∥Vn∆Hk(u)∥21{∥Vn∆Hk(u)∥>ϵ}|Fk−1 � ≤ 1 ϵ2 n � k=1 E � ∥Vn∆Hk(u)∥4� → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10) Then the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2), or the Lindeberg condition, is satisfied by (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hereafter, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), and by the definition of δn, we know there exists some constant C′(a, β) ̸= 0 such that log � det V −1 n �2 log n → C′(a, β) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This ensures that there exists some other constant C′′(a, β) > 0 such that ∞ � n=1 1 � log � det V −1 n �2�2 E � ∥Vn∆Hn(u)∥4|Fn−1 � ≤ C2(a, β) ∞ � n=1 1 (log n)2 E � ∥Vn∆Hn(u)∥4|Fn−1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, using (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9) leads to ∞ � n=1 1 (log n)2 ∥Vn∆Hn(u)∥4 ≤ C(a, β) ∞ � n=1 1 (n log n)2 < ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 17 for some constant C(a, β) > 0 depending only on a and β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) is satisfied by combining the above with (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the one hand, 1 log � det V −1 n �2 n � k=1 �(det Vk)2 − (det Vk+1)2 (det Vk)2 � VkHk(u)Hk(u)T V T k → 1 duT uV (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where V = � 1 −1 −1 1 � I(a, β) and I(a, β) has been specified in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, we have 1 log n n � k=1 �(det Vk)2 − (det Vk+1)2 (det Vk)2 � VkHk(u)Hk(u)T V T k → 4 − 2(a(β + 1) − β) d uT uV as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' since log n log � det V −1 n �2 → 4 − 2(a(β + 1) − β) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the other hand, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), we have n �(det Vn)2 − (det Vn+1)2 (det Vn)2 � → 4 − 2 � a(β + 1) − β � as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Using (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11), we observe that 1 log n n � k=1 uT GkGT k u k2 = 1 log n n � k=1 vT VkHk(u)Hk(u)T V T k v k → vT V v · 1 duT u as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since u ∈ Rd is arbitrary, the assertion follows from (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the critical regime, we have the quadratic strong law 1 log log n n � k=1 GkGT k (k log k)2 → 4(2β + 1)2 9 1 dId as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We will check that all the three conditions of [32, Theorem A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2] are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Denote Wn = 1 n√n log n � 1 0 0 a(β+1) β−a(β+1)δn � and w = � 1 −1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, for H defined in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), it is clear that wT WnHn(u) = 1 √n log nGn for all n ∈ N and that lim n→∞ Wn⟨H(u)⟩nW T n = lim n→∞ 1 n3 log n � 1 −1 −1 1 � n−1 � k=1 (2β + 1)2δ2 ka2 k+1E � ϵk+1(u)2|Fk � = lim n→∞ (2β + 1)2 n3 log n · uT u d � 1 −1 −1 1 � n−1 � k=1 δ2 ka2 k+1µ2 k+1 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), we know that n−3/2δn → 2 3 · Γ(β + 1) Γ(β + 1 + 1 2) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 18 JIAMING CHEN AND LUCILE LAULIN Hence, the above calculation leads us to Wn⟨H(u)⟩nW T n → I(β)uT u · 1 d � 1 −1 −1 1 � as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' with I(β) = 4(2β + 1)2 9 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12) Consequently, the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) is satisfied thanks to (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Notice that by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1), there exists some constant C1(β) > 0 and similarly, there exists some constant C2(β) > 0 such that ∥Nn∥2 ≤ C1(β)n2 and a2 kϵk(u)2 ≤ C2(β)n2δ−2 n log n for all 1 ≤ k ≤ n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, notice for all 1 ≤ k ≤ n that Wn∆Hk(u) = 1 n√n log n � Nk(u)ϵk(u)−1 − a(β+1) β−a(β+1)akδk−1 a(β+1) β−a(β+1)akδn � ϵk(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The ensures that, for all 1 ≤ k ≤ n, ∥Wn∆Hk(u)∥2 ≤ 4a2 k n3 log n(2β + 1)2 �� (2β + 1)−2 Nk(u) ϵk(u) �2 + δ2 k−1 + δ2 n � ϵk(u)2 ≤ C(β) n (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13) for some constant C(β) > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, n � k=1 E � ∥Wn∆Hk(u)∥4� ≤ 1 nC(β) → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' since, for all ϵ > 0, n � k=1 E � ∥Wn∆Hk(u)∥21{∥Wn∆Hk(u)∥>ϵ}|Fk−1 � ≤ 1 ϵ2 n � k=1 E � ∥Wn∆Hk(u)∥4� → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14) Therefore, the condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2), or the Lindeberg condition, is satisfied using (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hereafter, we know that log � det W −1 n �2 log log n → 4 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This ensures that there exists some constant C2(β) > 0 such that ∞ � n=1 1 � log � det W −1 n �2�2 E � ∥Wn∆Hn(u)∥4|Fn−1 � ≤ ∞ � n=1 C2(β) (log log n)2 E � ∥Wn∆Hn(u)∥4|Fn−1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15) We get from (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13) that ∞ � n=1 1 (log log n)2 ∥Wn∆Hn(u)∥4 ≤ C(β) ∞ � n=1 1 (n log n log log n)2 < ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' for some constant C(β) > 0 depending only onβ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The condition (H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) is satisfied using the above together with (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, 1 log � det W −1 n �2 n � k=1 �(det Wk)2 − (det Wk+1)2 (det Wk)2 � WkHk(u)Hk(u)T W T k → 1 duT uW as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where W = 4(2β + 1)2 9 � 1 −1 −1 1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 19 Furthermore, on the one hand we have 1 log log n n � k=1 �(det Wk)2 − (det Wk+1)2 (det Wk)2 � WkHk(u)Hk(u)T W T k → 1 duT uW as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' since log log n log � det W −1 n �2 → 1 4 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the other hand, we have n log n �(det Wn)2 − (det Wn+1)2 (det Wn)2 � → 1 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11), we observe that 1 log log n n � k=1 uT GkGT k u (k log k)2 = 1 log log n n � k=1 wT WkHk(u)Hk(u)T W T k w 4k log k → wT Ww · 1 4duT u (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since u ∈ Rd is arbitrary, the assertion follows from (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the superdiffusive regime, we have the mean square convergence, given by E ����� 1 na(β+1)−β Gn − 1 1 + a(β + 1) − β Lβ ���� 2� → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all test vector u ∈ Rd, it is immediate that E ����� 1 na(β+1)−β Gn(u) − 1 1 + a(β + 1) − β Lβ(u) ���� 2� ≤ 2E ����� 1 n1+a(β+1)−β Zn(u) ���� 2� + 2E ����� 1 n1+a(β+1)−β · a(β + 1) a(β + 1) − β δnMn − 1 1 + a(β + 1) − β Lβ ���� 2� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18) By (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20) and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7), the second term converges to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Looking back to the first term in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18), we observe E ����� 1 n1+a(β+1)−β Zn(u) ���� 2� ≤ 4 n1+2(a(β+1)−β) n � k=1 E � Nk(u)2� + 4 n1+2(a(β+1)−β) � a(β + 1) a(β + 1) − β �2 E ������ n � k=1 akδk−1ϵk(u) ����� 2� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19) The first term in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19) converges to zero because E[Nk(u)] ≤ (uT u)n for all 1 ≤ k ≤ n, and moreover, in the superdiffusive regime we have a(β +1) > β +1/2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The second term in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19) also converges to zero because n−(1+a(β+1)−β)δn → 1 1 + a(β + 1) − β · 1 Γ(1 + a(β + 1))Γ(β + 1) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, using the above and that M(u) = �∞ k=1 akϵk(u) is bounded in L2, the assertion follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The barycenter process admits a scaling limit at the diffusive regime, or conver- gence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that � 1 √nG⌊nt⌋, t ≥ 0 � =⇒ � 1 � 0 Wtr dr, t ≥ 0 � 20 JIAMING CHEN AND LUCILE LAULIN where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process define in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3 with its covariance defined in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In particular, E �� 1 � 0 Wsv dv �� 1 � 0 Wtu du �T � = β 3(β(1 − a) − a)(1 − a)s · 1 dId + 2(a(β + 1)(1 − a) + aβ) 3(2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a)(1 + (1 − a)(β + 1))ta−β(1−a)s1−a+β(1−a) · 1 dId (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20) for all 0 ≤ s ≤ t < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' An easy calculation leads to lim n→∞ 1 √nG⌊nt⌋ = lim n→∞ 1 � 0 1 √nS⌊ntr⌋ dr =⇒ 1 � 0 Wtr dr which ensures that G⌊nt⌋ is a continuous function of S⌊ntr⌋ in D([0, 1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, the last convergence in law is due to the functional central limit Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3, with (Wt)t≥0 defined there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, the barycenter process (Gn)n∈N admits a Gaussian scaling limit in the diffusive regime as well, with covariance E �� 1 � 0 Wsv dv �� 1 � 0 Wtu du �T � = 2 1 � 0 u � 0 E � WsvW T tu � dv du.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Using (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), the formula (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20) and the assertion follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The barycenter process admits a scaling limit at the critical regime, or convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that � 1 � nt log n G⌊nt⌋, t ≥ 0 � =⇒ � 1 � 0 (2β + 1)Btr dr, t ≥ 0 � where (Bt)t≥0 is a continuous Rd-valued centered Gaussian process define in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6 with its covariance defined in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For each r ∈ [0, 1], (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) implies that lim n→∞ 1 � nt log n M⌊ntr⌋(u) a⌊ntr⌋µ⌊ntr⌋ = lim n→∞ 1 � nt log n � ntr(log n + r t log r) �1/2Btr(u) P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' for all u ∈ Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16) yields lim n→∞ 1 � nt log n N⌊ntr⌋(u) = lim n→∞ r1/2 · 1 � ntr log n N⌊ntr⌋(u) = 0 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' for all u ∈ Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15), we have � 1 � nt log n S⌊ntr⌋(u), t ≥ 0 � =⇒ � (2β + 1)Btr(u), t ≥ 0 � for all u ∈ Rd and r ∈ [0, 1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, we use again lim n→∞ 1 � nt log n G⌊nt⌋ = lim n→∞ 1 � 0 1 � nt log n S⌊ntr⌋ dr =⇒ 1 � 0 (2β + 1)Btr dr and the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 21 Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The barycenter process admits a scaling limit at the superdiffusive regime, or convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that � 1 na(β+1)−β G⌊nt⌋, t ≥ 0 � =⇒ � 1 � 0 Qtr dr, t ≥ 0 � with the covariance specified in (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and the limiting Lβ characterized in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8 and Qt = ta(β+1)−βLβ characterized in Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9 for all t ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Again, we find that lim n→∞ 1 na(β+1)−β G⌊nt⌋ = 1 � 0 1 na(β+1)−β S⌊ntr⌋ dr =⇒ 1 � 0 Qtr dr which ensures that G⌊nt⌋ is a continuous function of S⌊ntr⌋ in D([0, 1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, the last convergence in law is due to the functional central limit Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence the barycenter process (Gn)n∈N admits a non-degenerate scaling limit in the superdiffusive regime as well, with covariance E �� 1 � 0 Qsv dv �� 1 � 0 Qtu du �T � = 2 1 � 0 u � 0 E � QsvQT tu � dv du = ta(β+1)−βsa(β+1)−β (1 + a(β + 1) − β)2 E � LβLT β � = ta(β+1)−βsa(β+1)−β (1 + a(β + 1) − β)2 � a(β + 1) β − a(β + 1) �2 Γ(2(a − 1)(β + 1) + 1) Γ((2a − 1)(β + 1) + 1)2 · 1 dId for all 0 ≤ s ≤ t < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Velocity of quadratic mean displacement In this Section, we investigate the velocity of the mean square displacement of the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This quantitative estimates give us the information on how fast the limit Theorems in Section 4 are carried on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar convergence velocities have been discussed in [20, 26], where the authors analyzed the convergence velocity of the moments of a one-dimensional elephant random walk of all orders.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the superdiffusive regime, the convergence velocity was discussed in [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Here, only the rate of quadratic moment convergence for the MARW in all of the three (diffusive, critical, and superdiffusive) regimes are discussed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Following the limit Theorems in Section 4, we expect the asymptotic behavior of the mean square displacement is as follows, E � SnST n � ∼ � � � � � � � � � � � n · (a−2β)(1−a)(β+1)+β(a+1) (2(β+1)(1−a)−1)(a−β(1−a))(1−a) · 1 dId when a < 1 − 1 2(β+1) n log n · (2β + 1)2 · 1 dId when a = 1 − 1 2(β+1) n2(a(β+1)−β) · � a(β+1) β−a(β+1) �2 Γ(2(a−1)(β+1)+1) Γ((2a−1)(β+1)+1)2 · 1 dId when a > 1 − 1 2(β+1), (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) where the notation ∼ indicates two sequences an ∼ bn if and only if an/bn → 1 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The aim of this Section is not only to show that the above estimates (6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) are valid, but also to investigate the exact velocity of their convergence in the diffusive and critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p < (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞, 1 nE � SnST n � − (a − 2β)(1 − a)(β + 1) + β(a + 1) (2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a) · 1 dId ∼ −(C1n−2(1−a)(β+1) + C2n−1) · 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 22 JIAMING CHEN AND LUCILE LAULIN Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Take the vector v = (1, −1)T and Vn ∈ R2×2 as in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, 1 √nSn(u) = vT VnLn(u), where Ln(u) = (Nn(u), Mn(u))T is as in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In particular, 1 nuT E � SnST n � u = vT VnE � Ln(u)Ln(u)T � V T n v = vT VnE � � E � Nn(u)2� E � Nn(u)Mn(u) � E � Mn(u)Nn(u) � E � Mn(u)2� � � V T n v = vT VnE � � E � ⟨N(u)⟩n � E � ⟨N(u), M(u)⟩n � E � ⟨M(u), N(u)⟩n � E � ⟨M(u)⟩n � � � V T n v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, 1 nuT E � SnST n � u = 1 nE � ⟨N(u)⟩n � + 1 na2nµ2n � a(β + 1) β − a(β + 1) �2 E � ⟨M(u)⟩n � − 2 nanµn � a(β + 1) β − a(β + 1) � E � ⟨M(u), N(u)⟩n � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since the test vector u ∈ Rd is taken arbitrarily, we get from Lemmas A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15 and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16 that 1 nE � SnST n � − (a − 2β)(1 − a)(β + 1) + β(a + 1) (2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a) · 1 dId ∼ −(C1n−2(1−a)(β+1) + C2n−1) · 1 dId as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' When p = (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞, 1 n log nE � SnST n � − (2β + 1)2 · 1 dId ∼ −(C1(log n)−1 + C2n−1) · 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Take w = (1, −1)T and Wn ∈ R2×2 as in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='28).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then 1 √n log nSn(u) = wT WnLn(u) as in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='29) for all u ∈ Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In particular, 1 n log nuT E � SnST n � u = wT WnE � Ln(u)Ln(u)T � W T n w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, 1 n log nuT E � SnST n � u = wT WnE � � E � ⟨N(u)⟩n � E � ⟨N(u), M(u)⟩n � E � ⟨M(u), N(u)⟩n � E � ⟨M(u)⟩n � � � W T n w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, we get by (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) as n → ∞, 1 n log nuT E � SnST n � u = 1 n log n � E � ⟨N(u)⟩n � + (2β + 1)2 a2nµ2n E � ⟨M(u)⟩n �� , which implies 1 n log nE � SnST n � − (2β + 1)2 · 1 dId ∼ −(C1(log n)−1 + C2n−1) · 1 dId as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Superdiffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 23 Theorem 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' When p > (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞, 1 n2(a(β+1)−β) E � SnST n � − � a(β + 1) β − a(β + 1) �2 Γ(2(a − 1)(β + 1) + 1) Γ((2a − 1)(β + 1) + 1)2 · 1 dId ∼ −(C1n−4(a(β+1)−β)+1 + C2n−2(a(β+1)−β)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar to previous computations for the diffusive regime, we have for all u ∈ Rd, 1 n2(a(β+1)−β) uT E � SnST n � u = 1 n2(a(β+1)−β) E � ⟨N(u)⟩n � + 1 n2(a(β+1)−β)a2nµ2n � a(β + 1) β − a(β + 1) �2 E � ⟨M(u)⟩n � − 2 n2(a(β+1)−β)anµn � a(β + 1) β − a(β + 1) � E � ⟨M(u), N(u)⟩n � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and since u ∈ Rd is arbitrary, 1 n2(a(β+1)−β) E � SnST n � − � a(β + 1) β − a(β + 1) �2 Γ(2(a − 1)(β + 1) + 1) Γ((2a − 1)(β + 1) + 1)2 · 1 dId ∼ −(C1n−4(a(β+1)−β)+1 + C2n−2(a(β+1)−β)) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Cram´er moderate deviations In this Section, we discuss the Cram´er moderate deviations for the multidimensional reinforced random walk (Sn)n∈N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The similar statistical quantity as well as the Berry-Esseen bound for the one-dimensional elephant random walk (ERW) without amnesia-reinforcement has been given in [20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Our derivation of Cram´er moderate deviations for the MARW does not rely on a Berry- Esseen bound.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The discussion of such statistical quantities is expected to reveal the transience property and the central limit Theorems for the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For this direction, readers are refereed to [3, 16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Thanks to Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21 and Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22, we can properly state the Cram´er moderate deviations principles for the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theorem 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the diffusive and critical regimes, we have the following Cram´er moderate deviations for the MARW.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Let (ϑn)n∈N ⊆ R be a non-decreasing sequence so that ϑn/√n → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Take any non-empty Borel set B ⊆ Rd, then we have − inf x∈int B 1 2∥x∥2 ≤ lim inf n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≤ lim sup n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≤ − inf x∈cl B 1 2∥x∥2, where int B and cl B denote the interior and the closure of B ⊆ Rd, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Our proof will only present the Cram´er moderate deviations for the MARW in the diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The same property for the critical regime follows from exactly the same steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' First, take xB = infx∈B ∥x∥.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then it is obvious that infx∈cl B ∥x∥ ≤ xB and infx∈cl B ∥x∥2/2 ≤ x2 B/2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Henceforth, P �anµnSn ϑn√wn ∈ B � ≤ d � j=1 P ����� anµnSj n √wn ���� ≥ ϑnxB d � ≤ � 1 − Φ(ϑnxB) � F(B, ϑ, n), (7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) 24 JIAMING CHEN AND LUCILE LAULIN where we write F(B, ϑ, n) := 2Cd · exp � 1 √n � ϑnxB 2d �3 + 1 n � ϑnxB 2d �2 + 1 √n(1 + 1 2 log n)(1 + ϑnxB 2d ) � + 2Cd · exp � 1 √n � ϑnxB 2d �3 + 1 n2(1−a)(β+1) � ϑnxB 2d �2 + 1 √n(1 + 1 2 log n)(n1/2−(1−a)(β+1) + ϑnxB 2d ) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, lim sup n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≤ −1 2x2 B ≤ − inf x∈cl B 1 2∥x∥2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' To achieve the asymptotic lower bound, we first notice that this assertion automatically holds if int B = ∅, whence − infx∈∅ ∥x∥2/2 = −∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Consequently, we assume that int B ̸= ∅.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Notice that int B is open in Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, for all ϵ∗ > 0 sufficiently small, we could find x∗ ∈ int B with 0 < 1 2∥x∗∥2 < inf x∈int B 1 2∥x∥2 + ϵ∗ and 0 < min ���xj ∗ �� : 1 ≤ j ≤ d � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Choose ϵ∗∗ sufficient small such that 0 < ϵ∗∗ < ���xj ∗ ��� for each j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, U(x∗, ϵ∗∗) ⊆ int B ⊆ B, where U(x∗, ϵ∗∗) := � x ∈ Rd : ��xj − xj ∗ �� < ϵ∗∗ for all j � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the other hand, P �anµnSn ϑn√wn ∈ B � ≥ P �anµnSn √wn ∈ ϑn · U(x∗, ϵ∗∗) � ≥ d � j=1 P � ϑn(xj ∗ + ϵ∗∗) ≥ anµnSj n √wn ≥ ϑn(xj ∗ − ϵ∗∗) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21 and Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22, we know that lim n→∞ P �anµnSj n √wn ≥ ϑn(xj ∗ + ϵ∗∗) �� P �anµnSj n √wn ≥ ϑn(xj ∗ − ϵ∗∗) � = 0 for each j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar to (7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1), lim inf n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≥ −1 2∥x∗ − ϵ∗∗∥2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Letting ϵ∗∗ → 0, we observe that lim inf n→∞ ϑ−2 n log P �anµnSn ϑn√wn ∈ B � ≥ −1 2∥x∗∥2 ≥ − inf x∈int B 1 2∥x∥2 − ϵ∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since ϵ∗ > 0 was take arbitrarily, letting ϵ∗ → 0, we verify the assertion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Technical Lemmas A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Asymptotics of the processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We start by introducing the following processes that are of great influence on the behavior of the random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Let (e1, e2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , ed) denote a canonical Euclidean basis of Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For each n ∈ N and 1 ≤ j ≤ d, define N X n (j) = n � k=1 1{Xj k̸=0}µk and Σn = d � j=1 N X n (j)ejeT j , (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) such that (Σn)n∈N is a matrix-valued process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the following almost sure convergence in the three regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 1 nµn+1 Σn → 1 d(β + 1)Id as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2) MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 25 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For each n ∈ N and 1 ≤ j ≤ d, define ΛX n (j) = N X n (j) n .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) It follows from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) that ΛX n+1(j) = n n + 1ΛX n (j) + 1 n + 11{Xj n+1̸=0}µn+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, we observe thanks to (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12) that ΛX n+1(j) = n n + 1 · γnΛX n (j) + 1 n + 11{Xj n+1̸=0}µn+1 − a(β + 1) n + 1 ΛX n (j) = n n + 1 · γnΛX n (j) + µn+1 n δX n+1(j) + (1 − a)µn+1 d(n + 1) with δX n+1(j) = 1{Xj n+1̸=0} − P � Xj n+1 ̸= 0|Fn � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) we know ΛX n (j) = 1 nan � ΛX 1 (j) + 1 − a d n � k=2 akµk + HX n (j) � (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4) with HX n (j) = n � k=2 akµkδX k (j).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is clear that for a fixed 1 ≤ j ≤ d, the real-valued process (HX n (j))n∈N is locally square-integrable since it is a finite sum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Afterwards, this process appears to be a martingale adapted to (Fn)n∈N because (δX n (j))n∈N satisfied the martingale difference relation E[δX n+1(j)|Fn] = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is obvious that ⟨HX(j)⟩n ≤ wn = n � k=1 (akµk)2 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, we get by [18, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15] that for all γ > 0 HX n (j)2 ⟨HX(j)⟩n = o �� log⟨HX(j)⟩n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) Since ⟨HX(j)⟩n ≤ wn and by (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5), we obtain that HX n (j)2 = o � wn � log wn �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the diffusive regime, by Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1 and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3), we have HX n (j)2 = o � n1−2(a(β+1)−β)� log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), we observe that � HX n (j) nanµn+1 �2 = o � n−1� log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence HX n (j) nanµn+1 → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) again, we observe further 1 nanµn+1 n � k=1 akµk → 1 (1 − a)(β + 1) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) 26 JIAMING CHEN AND LUCILE LAULIN Hence, we have µ−1 n+1ΛX n (j) →→ 1 β + 1 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4), we can then conclude that 1 nµn+1 Σn → 1 d(β + 1)Id as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' in the diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the critical regime, where a = 1 − 1 2(β+1), we have from (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4)) HX n (j)2 = o � log n � log log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence � HX n (j) nanµn+1 �2 = o � n−1 log n � log log n �1+γ� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' which implies that HX n (j) nanµn+1 → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similar to the convergence in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), in the critical regime, we observe 1 nanµn+1 n � k=1 akµk → 1 2 P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, we conclude that µ−1 n+1ΛX n (j) → 1 d(β + 1) and 1 nµn+1 Σn → 1 d(β + 1)Id as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' which proves (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In the superdiffusive regime, we have HX n (j)2 = o � 1 � P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and then � HX n (j) nanµn+1 �2 = o � n−2(1−a)(β+1)� P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' which implies HX n (j) nanµn+1 → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We can similarly show that µ−1 n+1ΛX n (j) → 1 β + 1 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' which then ensures that 1 nµn+1 Σn → 1 d(β + 1)Id as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Consequently, the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ The next result follows directly from the definition of Mn and Nn Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the following formulas for the predictable matrix-valued quadratic varia- tions ⟨M⟩n = (a1µ1)2E � X1XT 1 � + n−1 � k=1 a(β + 1) ka−2 k+1 µk+1Σk + 1 − a da−2 k+1 µ2 k+1Id − �γk − 1 a−1 k+1 �2 YkY T k , (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) and ⟨N⟩n = � β β − a(β + 1) �2 E � X1XT 1 � + n−1 � k=1 a(β + 1) kµk+1 Σk + 1 − a d Id − �γk − 1 µk+1 �2 YkY T k .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8) MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 27 In particular, we have Tr⟨M⟩n = wn − n � k=1 (γk − 1)2a2 k+1∥Yk∥2, (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9) and Tr⟨N⟩n = � β β − a(β + 1) �2 n − n−1 � k=1 �a(β + 1) kµk+1 �2 ∥Yk∥2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10) Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We have the following estimate for the matrix-valued conditional expectation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' E � ϵn+1ϵT n+1|Fn � = a(β + 1) n µn+1Σn + 1 − a d µ2 n+1Id − (γn − 1)2YnY T n .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' And as a consequence E � ∥ϵn+1∥2|Fn � = µ2 n+1 − (γn − 1)2∥Yn∥2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Observe that E � ϵn+1ϵT n+1|Fn � = E � Yn+1Y T n+1|Fn � − γ2 nYnY T n with E � Yn+1Y T n+1|Fn � = YnY T n + 2µn+1YnE � XT n+1|Fn � + µ2 n+1E � Xn+1XT n+1|Fn � = � 1 + 2a(β + 1) n � YnY T n + µ2 n+1E � Xn+1XT n+1|Fn � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) For all k ≥ 1, we know that XkXT k = �d j=1 1{Xj k̸=0}ejeT j .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then P � Xj n+1 ̸= 0|Fn � = n � k=1 P � βn+1 = k � P � (AnXk)j ̸= 0|Fn � = n � k=1 1{Xj k̸=0}P � An = ±Id � (β + 1)µk nµn+1 + n � k=1 � 1 − 1{Xj k̸=0} � P � An = ±Jd � (β + 1)µk nµn+1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence P � Xj n+1 ̸= 0|Fn � = β + 1 nµn+1 � P � An = +Id � − P � An = +Jd �� N X n (j) + 2P � An = +Jd � = a(β + 1) nµn+1 N X n (j) + 1 − a d .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12) Therefore E � Xn+1XT n+1|Fn � = d � j=1 P � Xj n+1 ̸= 0|Fn � ejeT j = a(β + 1) nµn+1 Σn + 1 − a d Id.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13) And from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13) we can conclude that E � ϵn+1ϵT n+1|Fn � = E � Yn+1Y T n+1|Fn � − γ2 nYnY T n = � 1 + 2a(β + 1) n � YnY T n + a(β + 1) n µn+1Σn + 1 − a d µ2 n+1Id − γ2 nYnY T n = a(β + 1) n µn+1Σn + 1 − a d µ2 n+1Id − (γn − 1)2YnY T n .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14) On the other hand Tr(Σn) = nµn+1 β + 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15) Taking traces in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14) and by (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15), we have E � ∥ϵn+1∥2|Fn � = µ2 n+1 − (γn − 1)2∥Yn∥2 which ensures that the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 28 JIAMING CHEN AND LUCILE LAULIN A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling limits of the random walk and the barycenter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For each n ∈ N and test vector u ∈ Rd, let Vn = 1 √n � 1 0 0 a(β+1) β−a(β+1)(anµn)−1 � and v = � 1 −1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16) Then vT VnLn(u) = 1 √nSn(u).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17) And for all t ≥ 0, we have Vn⟨L(u)⟩⌊nt⌋V T n → uT u d Vt as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18) where Vt = 1 (β − a(β + 1))2 � β2t aβ 1−at1+β−a(β+1) aβ 1−at1+β−a(β+1) a2(β+1)2 1−2a(β+1)+2β t1+2β−2a(β+1) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3 and the fact that ⟨M(u)⟩n = uT ⟨M⟩nu, we see that ⟨M(u)⟩⌊nt⌋ = a2 1µ2 1uT E � X1XT 1 � u + ⌊nt⌋−1 � k=1 a(β + 1) k a2 k+1µk+1uT Σku + 1 − a d a2 k+1µ2 k+1uT u − (γk − 1)2a2 k+1uT YkY T k u and ⟨N(u)⟩⌊nt⌋ = � β β − a(β + 1) �2 uT E � X1XT 1 � u + � β β − a(β + 1) �2 ⌊nt⌋−1 � k=1 a(β + 1) kµk+1 uT Σku + 1 − a d uT u − �γk − 1 µk+1 �2 uT YkY T k u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Using a similar token and Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1, we can work out the off-diagonal entries in ⟨L(u)⟩⌊nt⌋, and we obtain that lim n→∞ Vn⟨L(u)⟩⌊nt⌋V T n = lim n→∞ uT u nd(β − a(β + 1))2 � � � β2⌊nt⌋ a(β+1)β anµn �⌊nt⌋−1 k=0 ak+1µk+1 a(β+1)β anµn �⌊nt⌋−1 k=0 ak+1µk+1 � a(β+1) anµn �2 �⌊nt⌋−1 k=0 (ak+1µk+1)2 � � � = uT u d(β − a(β + 1))2 � β2t aβ 1−at1−(a(β+1)−β) aβ 1−at1−(a(β+1)−β) a2(β+1)2 1−2(a(β+1)−β)t1−2(a(β+1)−β) � = uT u d Vt P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where the last equality is due to (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Thus, it implies that 1 nanµn n � k=1 akµk → 1 1 − (a(β + 1) − β) and 1 n(anµn)2 n � k=1 (akµk)2 → 1 1 − 2(a(β + 1) − β) as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, equation (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18) holds and the assertion is then verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The MARW satisfies the Lindeberg condition in the diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' That is, for all t ≥ 0 and all ϵ > 0, ⌊nt⌋ � k=1 E � ∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 29 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the one hand, it is easy to compute from (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16) that, for all 1 ≤ k ≤ n, Vn∆Lk(u) = 1 √n(β − a(β + 1))µn � β µn µk a ak an � ϵk(u) which implies ∥Vn∆Lk(u)∥2 = 1 n(β − a(β + 1))2 �β2 µ2 k + a2a2 k (anµn)2 � ϵk(u)2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence ∥Vn∆Lk(u)∥4 ≤ 2 n2(β − a(β + 1))4 �β4 µ4 k + a4a4 k (anµn)4 � ϵk(u)4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20) On the other hand, from (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) we observe that 1 na2n n � k=1 a2 k ≤ C1(a, β)−1 and 1 na4n n � k=1 a4 k ≤ C2(a, β)−1 for all n ∈ N (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21) and where C1(a, β), C2(a, β) > 0 are constants depending only on a and β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, we get that sup 1≤k≤n |ϵk(u)| ≤ sup 1≤k≤n ∥ϵk∥∥u∥ ≤ sup 1≤k≤n (β + 2)µk∥u∥ ≤ (β + 2)µn∥u∥.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22) Hence, we deduce from (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22) n � k=1 ∥Vn∆Lk(u)∥4 ≤ 2 n2(β − a(β + 1))4 �� β(β + 2) �4∥u∥4 + � a(β + 2) �4∥u∥4 C2(a, β) � → 0 (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='23) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This implies that n � k=1 E � ∥Vn∆Lk(u)∥4|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, for all ϵ > 0, we obtain n � k=1 E � ∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1 � ≤ 1 ϵ2 n � k=1 E � ∥Vn∆Lk(u)∥4|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This yields finally ⌊nt⌋ � k=1 E � ∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1 � ≤ 1 ϵ2 ⌊nt⌋ � k=1 E ����(VnV −1 ⌊nt⌋)V⌊nt⌋∆Lk(u) ��� 4 |Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' since VnV −1 ⌊nt⌋ converges as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The deterministic matrix Vt defined in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19) can be rewritten as Vt = tα1K1 + tα2K2 + · · · + tαqKq with q ∈ N, αj > 0 and each Kj is a symmetric matrix for all 1 ≤ j ≤ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A direct computation analoguous to the one in [32] shows that Vt = tα1K1+tα2K2+tα3K3, where α1 = 1, α2 = 1 − a(β + 1) > 0, α3 = 1 − 2a(β + 1) > 0 since a < 1 − 1 2(β+1) is in the diffusive regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover K1 = β2 (a(β + 1) − β)2 � 1 0 0 0 � , K2 = aβ (1 − a)(a(β + 1) − β)2 � 0 1 1 0 � , K3 = a2(β + 1)2 (1 − 2a(β + 1) + 2β)(a(β + 1) − β)2 � 0 0 0 1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 30 JIAMING CHEN AND LUCILE LAULIN □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Given the matrix-valued process (Vn)n∈N define in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16), we have ∞ � n=1 1 � log � det V −1 n �2�2 E � ∥Vn∆Ln(u)∥4|Fn−1 � < ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16), it is immediate that det V −1 n = β − a(β + 1) a(β + 1) nanµn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='24) By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), we obtain log � det V −1 n �2 log n → 2(1 − a)(β + 1) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='25) Hence there exists a constant C(a, β) > 0 depending only on a and β such that ∞ � n=1 1 � log � det V −1 n �2�2 E � ∥Vn∆Ln(u)∥4|Fn−1 � ≤ C(a, β) ∞ � n=1 1 (log n)2 E � ∥Vn∆Ln(u)∥4|Fn−1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='26) Hereafter, equations (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20), (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22), (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='23) together imply that ∞ � n=1 1 (log n)2 ∥Vn∆Ln(u)∥4 ≤ C′(a, β) ∞ � n=1 1 (n log n)2 < ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='27) for some other constant C′(a, β) > 0 depending only on a and β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Consequently, equation (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='27) together (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='26) ensures that the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For each n ∈ N and test vector u ∈ Rd, let Wn = 1 √n log n � 1 0 0 2β+1 anµn � and w = � 1 −1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='28) Then for all t ≥ 0, we have wT WnLn(u) = 1 √n log nSn(u) (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='29) and Wn⟨L(u)⟩nW T n → uT u d W as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' where Wt = (2β + 1)2 � 0 0 0 1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='30) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' It is clear that (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='29) follows from (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Using a similar token than for the proof Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4, we have lim n→∞ Wn⟨L(u)⟩nW T n = lim n→∞ 4uT u (n log n)d � � � β2n β(β+ 1 2 ) anµn �n−1 k=0 ak+1µk+1 β(β+ 1 2 ) anµn �n−1 k=0 ak+1µk+1 � β+ 1 2 anµn �2 �n−1 k=0(ak+1µk+1)2 � � � = 4uT u d � 0 0 0 � β + 1 2 �2 � = uT u d W P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and the proof is complete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 31 Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The MARW satisfies the Lindeberg condition in the critical regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' That is, for all t ≥ 0 and all ϵ > 0, given the (Wn)n∈N defined in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16), it satisfies n � k=1 E � ∥Wn∆Lk(u)∥21{∥WnLk(u)∥2>ϵ}|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' We state that equations (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21) remain true with Vn replaced by Wn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' More precisely, they can be rewritten as ∥Wn∆Lk(u)∥4 ≤ 32 (n log n)2 �β4 µ4 k + a4a4 k (anµn)4 � ϵk(u)4 (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='31) and 1 na4n n � k=1 a4 k ≤ C(a, β)−1 for all n ∈ N where C(a, β) > 0 is a constant depending only on t, a, and β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22) is not affected by switching regimes, we have that n � k=1 ∥Wn∆Lk(u)∥4 ≤ 32 (n log n)2 �� β(β + 2) �4∥u∥4 + � a(β + 2) �4∥u∥4 C(t, a, β) � → 0 (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='32) as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' This implies n � k=1 E � ∥Wn∆Lk(u)∥4|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Therefore, for all ϵ > 0, we obtain n � k=1 E � ∥Wn∆Lk(u)∥21{∥WnLk(u)∥2>ϵ}|Fk−1 � ≤ 1 ϵ2 n � k=1 E � ∥Wn∆Lk(u)∥4|Fk−1 � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' and the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Given the matrix-valued sequence (Wn)n∈N define in (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='28), we have ∞ � n=1 1 � log � det W −1 n �2�2 E � ∥Wn∆Ln(u)∥4|Fn−1 � < ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='28), it is immediate that det W −1 n = 1 2β + 1 � n log n · anµn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='33) Then, we obtain by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='5) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6) that log � det W −1 n �2 log log n → 1 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='34) Hence, there exists a constant C(a, β) > 0 depending only on a and β such that ∞ � n=1 1 � log � det W −1 n �2�2 E � ∥Wn∆Ln(u)∥4|Fn−1 � ≤ ∞ � n=1 C(a, β) (log log n)2 E � ∥Wn∆Ln(u)∥4|Fn−1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='35) Hereafter, (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='31) together with (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='32) imply that ∞ � n=1 1 (log log n)2 ∥Wn∆Ln(u)∥4 ≤ C′(a, β) ∞ � n=1 1 (n log n log log n)2 < ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' for some other constant C′(a, β) > 0 depending only on a and β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Finally, using the above equation together with (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='35) completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ 32 JIAMING CHEN AND LUCILE LAULIN Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Fix the test vector u ∈ Rd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The growth rate of the compensator of the partial sum of (Nn(u)2)n∈N is less than cubic growth, in the sense that 1 n3 n−1 � k=1 E � Nk+1(u)2|Fn � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The law of iterated expectations and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='8) yields 1 nE � E � Nn+1(u)2|Fn �� = 1 nE � ⟨N(u)⟩n � → � β β − a(β + 1) �2 uT u as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The strong law of large numbers then yields 1 n n−1 � k=1 1 k E � Nk+1(u)2|Fk � → � β β − a(β + 1) �2 uT u as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence 1 n3 n−1 � k=1 E � Nk+1(u)2|Fn � ≤ 1 n2 n−1 � k=1 1 k E � Nk+1(u)2|Fk � → 0 as n → ∞ P-a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The barycenter process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For the following Toeplitz Lemmas, see [18] and [33].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [33, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1 Part I] Let (an,k)1≤k≤kn, n∈N be a double array of real numbers such that for all k ≥ 1, we have an,k → 0 as n → ∞ and supn∈N �kn k=1 |an,k| < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Let (xn)n∈N be a real sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' If xn → 0 as n → ∞, then �kn k=1 an,kxk → 0 as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [33, Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1 Part II] Let (an,k)1≤k≤kn, n∈N be a double array of real numbers such that for all k ≥ 1, we have an,k → 0 as n → ∞ and supn∈N �kn k=1 |an,k| < ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Let (xn)n∈N be a real sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' If xn → x as n → ∞ with x ∈ R and �kn k=1 an,k = 1, then �kn k=1 an,kxk → x as n → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Quadratic rate estimates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Our first result is about the convergence rate of the process (Yn)n∈N defined in (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1), then we have, as n → ∞, E[YnY T n ] ∼ n2a(β+1) Γ(1 + 2a(β + 1)) · 1 dId + n1+2β Γ(β + 1)2(1 + 2β − 2a(β + 1))(β + 1) · 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' From (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='11) and (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13), we see E � Yn+1Y T n+1|Fn � = � 1 + 2a(β + 1) n � YnY T n + µ2 n+1 �a(β + 1) nµn+1 Σn + 1 − a d Id � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, remember that E � Σn � = d � j=1 E � N X n (j) � ejeT j = d � j=1 n � k=1 P � Xj k ̸= 0 � µk · ejeT j .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1 yields E[(nµn+1)−1Σn] ∼ (β + 1)−1 · 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, E � Yn+1Y T n+1 � ∼ � 1 + 2a(β + 1) n � E � YnY T n � + µ2 n+1 β + 1 · 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 33 A recursive argument then gives E � YnY T n � ∼ Γ(n + 2a(β + 1)) Γ(n)Γ(1 + 2a(β + 1))E � Y1Y T 1 � + n−1 � j=1 µ2 j β + 1 · �n−1 k=1(1 + k−12a(β + 1)) �j−1 k=1(1 + k−12a(β + 1)) 1 dId ∼ Γ(n + 2a(β + 1)) Γ(n)Γ(1 + 2a(β + 1)) · 1 dId + n−1 � j=1 µ2 j β + 1 · Γ(n + 2a(β + 1))Γ(j) Γ(j + 2a(β + 1))Γ(n) · 1 dId.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Employing the asymptotics in (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), the assertion follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ The process Yn = �n k=1 µkXk differs from Sn by a multiplicative factor at each step.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' When there is no amnesia, the asymptotics of these two processes coincide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' However, when β ≥ 0, we have to treat the general case in another way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1) and test vector u ∈ Rd, we have, as n → ∞, E � ⟨M(u)⟩n � ∼ wnuT u − (C1n−1 + C2n−2(a(β+1)−β))uT u, and E � ⟨N(u)⟩n � ∼ � β β − a(β + 1) �2 nuT u − (C1n1−2(1−a)(β+1) + C2)uT u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2 E � ⟨M(u)⟩n � = E � Tr⟨M⟩n � uT u = wnuT u − n � k=1 (γk − 1)2a2 k+1uT E � YkY T k � u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14 and a finite summation, E � ⟨M(u)⟩n � ∼ wnuT u − n−1 � k=1 a2(β + 1)2 k2 (k + 1)−2a(β+1)(C1k2a(β+1) + C2k1+2β)uT u ∼ wnuT u − (C1n−1 + C2n−2(a(β+1)−β))uT u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Similarly, E � ⟨N(u)⟩n � = E � Tr⟨N⟩n � uT u = � β β − a(β + 1) �2 nuT u − n−1 � k=1 a2(β + 1)2 k2 µ−2 k+1uT E � YkY T k � u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hence, using Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14 again, we observe E � ⟨N(u)⟩n � ∼ � β β − a(β + 1) �2 nuT u − n−1 � k=1 a2(β + 1)2 k2 (k + 1)−2β(C1k2a(β+1) + C2k1+2β)uT u ∼ � β β − a(β + 1) �2 nuT u − (C1n1−2(1−a)(β+1) + C2)uT u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1) and test vector u ∈ Rd, we have, as n → ∞, E � ⟨M(u), N(u)⟩n � ∼ β β − a(β + 1) · Γ(β + 1)Γ(a(β + 1) + 1) (1 − a)(β + 1) n(1−a)(β+1)uT u − (C1n−(1−a)(β+1) + C2n(1−a)(β+1)−1)uT u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='7) and Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='2, for all test vector u ∈ Rd ∆Ln+1(u) = � βµ−1 n+1 β − a(β + 1) �T ϵn+1(u), 34 JIAMING CHEN AND LUCILE LAULIN and therefore, ⟨M(u), N(u)⟩n = n � k=1 β β − a(β + 1)akµ−1 k E � ϵk(u)ϵk(u)T |Fk−1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Taking the trace will give us Tr⟨M, N⟩n = β β − a(β + 1) n � k=1 akµk − β β − a(β + 1) n � k=1 akµ−1 k (γk − 1)2∥Yk∥2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Taking the expectation and using Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='14 completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moderate deviations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1) and for all j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d, ��∆M j n �� ≤ � a(β + 1) + 1 � anµn for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='36) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='1), ∆M j n = anY j n − an−1Y j n−1 = anµnXj n − (an − an−1) n−1 � k=1 µkXj k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Since ∥Xk∥ = 1 for eack k ≤ n, then by (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4), ��∆M j n �� ≤ anµn + (n − 1)(an−1 − an)µn−1 ≤ anµn + a(β + 1)anµn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' And the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1) and for all j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d, ��∆N j n �� ≤ 2a(β + 1) + β β − a(β + 1) for all n ∈ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' By (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='6), ∆N j n = βµ−1 n+1 β − a(β + 1)ϵj n+1 = βµ−1 n+1 β − a(β + 1) · � µn+1Xj n+1 + (1 − γn) n � k=1 Xj kµk � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Taking absolute value on both sides, and the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1) and for all j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d, ���� 1 √wn ∆M j k ���� ≤ � a(β + 1) + 1 �anµn √wn for each 1 ≤ k ≤ n, (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='37) and in the diffusive and critical regime, ���� 1 wn ⟨M j⟩n − 1 ���� ≤ � � � C · n−1 when a < 1 − 1 2(β+1) C · (log n)−1 when a = 1 − 1 2(β+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Dividing by √wn from both sides of (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='36), we get (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='37).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Moreover, by (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='9), ��⟨M j⟩n − wn �� ≤ n � k=1 (γk − 1)2a2 k+1∥Yk∥2 ≤ C n � k=1 wk k2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Dividing both sides by wn and following (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='3), (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='4), the assertion is verified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' For all p ∈ (0, 1) and for all j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d, ���� anµn √wn ∆N j k ���� ≤ � 2a(β + 1) + β β − a(β + 1) �anµn √wn for each 1 ≤ k ≤ n, (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='38) MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK 35 and in both the diffusive and critical regime, ���� a2 nµ2 n wn ⟨N j⟩n − 1 ���� ≤ � � � C · n−2(1−a)(β+1) when a < 1 − 1 2(β+1) C · (n log n)−1 when a = 1 − 1 2(β+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Dividing by √wn and multiplied by anµu from both sides of (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='18), we get (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='38).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Then, by (A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='10), we make use of the estimates and the inequalities hold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' □ Denote by Φ(·) := (2π)−1/2 � · −∞ e−t2/2 dt the cumulative distribution of the standard normal random variable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The following lemmas are straightforward derivations from [19, Theorem 1], see also [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' There exists an absolute constant α′(p, β) > 0 depending only on p, β such that for all j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d and all 0 ≤ x ≤ α′(p, β) · n−1/2, in the diffusive and critical regime, P(M j n/√wn ≥ x) 1 − Φ(x) = P(M j n/√wn ≤ −x) 1 − Φ(−x) = � � � C · exp � x3 √n + x2 n + 1 √n(1 + 1 2 log n)(1 + x) � when a < 1 − 1 2(β+1) C · exp � x3 √n + x2 log n + ( 1 √log n + 1 2√n log n)(1 + x) � when a = 1 − 1 2(β+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lemma A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' There exists an absolute constant α′′(p, β) > 0 depending only on p, β such that for all j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' , d and all 0 ≤ x ≤ α′′(p, β) · n−1/2, in the diffusive and critical regime, P(anµnN j n/√wn ≥ x) 1 − Φ(x) = P(anµnN j n/√wn ≤ −x) 1 − Φ(−x) = � � � C · exp � x3 √n + x2 n2(1−a)(β+1) + 1 √n(n1/2−(1−a)(β+1) + 1 2 log n)(1 + x) � when a < 1 − 1 2(β+1) C · exp � x3 √n + x2 n log n + ( 1 √n log n + 1 2√n log n)(1 + x) � when a = 1 − 1 2(β+1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Acknowledgements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The authors wish to thank Jean Bertoin and Pierre Tarres for numerous discussions and insightful comments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' References [1] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Baur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On a class of random walks with reinforced memory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 181 (2020), 772–802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [2] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bauer, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bernard, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Kyt¨ol¨a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Multiple Schramm-Loewner Evolutions and Statistical Mechanics Martin- gales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 120: 1125–1163, 2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [3] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Baur, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bertoin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Elephant random walks and their connection to P´olya-type urns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' E, 94 (5): 052134, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [4] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bena¨ım, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Schreiber, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Tarr`es.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Generalized urn models of evolutionary processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 14 (3): 1455–1478, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [5] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bercu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A martingale approach for the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A: Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 51: 015201, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [6] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bercu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Chabanol, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='-J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Ruch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hypergeometric identities arising from the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Anal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 488: 123360, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [7] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bercu, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Laulin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' How to estimate the memory of the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [8] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bercu, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Laulin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the center of mass of the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 133: 111–128, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [9] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bercu, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Laulin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the Multi-dimensional Elephant Random Walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 175: 1146–1163, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [10] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bertenghi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Functional limit Theorems for the multi-dimensional elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 38 (1): 37–50.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [11] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bertoin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Counting the zeros of an elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Am.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 375 (8): 5539–5560, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [12] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Bertoin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Scaling exponents of step-reinforced random walks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Rel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 179 (1): 295–315, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [13] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Businger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The shark random swim (L´evy flight with memory).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 172, 3 (2018), 701–717.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 36 JIAMING CHEN AND LUCILE LAULIN [14] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Chaabane, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Maaouia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Th´eor`emes limites avec poids pour les martingales vectorielles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' ESAIM Prob.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 4: 137–189, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [15] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Chen, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Margarint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Perturbations of multiple Schramm–Loewner evolution with two non-colliding Dyson Brownian motions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 151: 553–570, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [16] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Coletti, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Gava, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sch¨utz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Central limit Theorem and related results for the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 58 (5): 053303, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [17] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Dai Pra, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Louis, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Minelli.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Synchronization via Interacting Reinforcement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 51 (2): 556–568, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [18] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Duflo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Random iterative models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Springer-Verlag, Berlin, 34, 1997.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [19] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Fan, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Grama, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Liu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Cram´er Moderate Deviation Expansion for Martingales with One-Sided Sakhanenko’s Condition and Its Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Prob.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 33: 749–787, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [20] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Fan, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Ma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Cram´er moderate deviations for the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Mech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 023402, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [21] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Ma, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Machkouri, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Fan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On Wasserstein-1 distance in the central limit Theorem for elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 63: 013301, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [22] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Grama, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Haeusler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Large deviations for martingales via Cram´er’s method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 85: 279–293, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [23] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Grill.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the average of a random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 6 (5): 357–361, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [24] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Gut, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stadtm¨uller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The elephant random walk with gradually increasing memory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' arXiv:2110.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='13497 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [25] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Gut, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stadtm¨uller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Variations of the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 58, 3 (2021), 805–829 [26] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hayashi, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Oshiro, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Takei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Rate of moment convergence in the central limit Theorem for elephant random walks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' arXiv preprint, arXiv: 2205.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='00651, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [27] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Kozma Reinforced random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' In European Congress of Mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', Z¨urich, 2013, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 429–443.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [28] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Kubota, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Takei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Gaussian fluctuation for superdiffusive elephant random walks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 177, 6 (2019), 1157–1171.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [29] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' K¨ursten.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Random recursive trees and the elephant random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Physical Review E 93, 032111 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [30] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lamberton, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Pag`es, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Tarr`es.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' When Can the Two-Armed Bandit Algorithm Be Trusted?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 14 (3): 1424–1454, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [31] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Laulin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Introducing smooth amnesia to the memory of the Elephant Random Walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Prob.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 27: 1–12, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [32] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Laulin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' New Insights on the Reinforced Elephant Random Walk Using a Martingale Approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 186, 9, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [33] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Li, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Hu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Toeplitz Lemma, Complete Convergence and Complete Moment Convergence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='- Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 46 (4): 1731–1743, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [34] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Lo, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Wade.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' On the centre of mass of a random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Appl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 129 (11): 4663–4686, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [35] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Marcaccioli, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Livan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A P´olya urn approach to information filtering in complex networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 10, 745 (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [36] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' McRedmond, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Wade.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' The convex hull of a planar random walk: perimeter, diameter, and shape.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Electron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' 23: 1–24, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [37] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Merkl, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Rolles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Linearly edge-reinforced random walks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' IMS Lect Note - Mon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Dyn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 48: 66–77, 2006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [38] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Pemantle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' A survey of random processes with reinforcement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Surveys 4 (2007), 1–79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [39] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Pemantle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Vertex-reinforced random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Probab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Rel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 92: 117–136, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [40] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sch¨utz, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Trimper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Elephants can always remember: Exact long-range memory effects in a non- markovian random walk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Physical review.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' E 70, 045101 (2004).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [41] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sheng.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Arzela-Ascoli’s Theorem and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Preprint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 2022100209, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [42] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Touati.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Sur la convergence en loi fonctionnelle de suites de semimartingales vers un m´elange de mouvements browniens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Teor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Veroyatnost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' i Primenen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 36 (4): 744–763, 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' [43] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Wade, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Xu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Convex hulls of planar random walks with drift.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=', 143 (1): 433–445, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' Departement Mathematik, ETH Z¨urich Current address: 101, R¨amistrasse, CH-8092 Z¨urich, Switzerland Email address: jiamchen@student.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='ethz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='ch Laboratoire de Math´ematiques Jean Leray, Nantes Universit´e Current address: 2 Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content=' de la Houssini`ere, 44322 Nantes, France Email address: lucile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='laulin@math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='cnrs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} +page_content='fr' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/-NFAT4oBgHgl3EQfqB2B/content/2301.08644v1.pdf'} diff --git a/.gitattributes b/.gitattributes index 4fcd1e81a014df51a7ee90e46919b0a0e9a96e78..b7bd54edac54578f9a071610adc8e0f283368542 100644 --- a/.gitattributes +++ b/.gitattributes @@ -8202,3 +8202,70 @@ CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex _NFLT4oBgHgl3EQfvy-O/content/2301.12161v1.pdf filter=lfs diff=lfs merge=lfs -text adE2T4oBgHgl3EQfFAZQ/content/2301.03641v1.pdf filter=lfs diff=lfs merge=lfs -text CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf filter=lfs diff=lfs merge=lfs -text +utE5T4oBgHgl3EQfLg6S/content/2301.05474v1.pdf filter=lfs diff=lfs merge=lfs -text +Q9E3T4oBgHgl3EQfDAmJ/content/2301.04282v1.pdf filter=lfs diff=lfs merge=lfs -text +FtE1T4oBgHgl3EQfEwPV/content/2301.02895v1.pdf filter=lfs diff=lfs merge=lfs -text +oNFKT4oBgHgl3EQfFy2H/content/2301.11722v1.pdf filter=lfs diff=lfs merge=lfs -text +2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +OdE1T4oBgHgl3EQfuAUH/content/2301.03382v1.pdf filter=lfs diff=lfs merge=lfs -text +JdE0T4oBgHgl3EQfSACX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +n9AyT4oBgHgl3EQfY_cz/content/2301.00213v1.pdf filter=lfs diff=lfs merge=lfs -text +k9E2T4oBgHgl3EQfdwdn/content/2301.03909v1.pdf filter=lfs diff=lfs merge=lfs -text +mNE2T4oBgHgl3EQfzAhZ/content/2301.04126v1.pdf filter=lfs diff=lfs merge=lfs -text +T9E0T4oBgHgl3EQf2QLa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +gdE3T4oBgHgl3EQfIAlQ/content/2301.04329v1.pdf filter=lfs diff=lfs merge=lfs -text +d9E0T4oBgHgl3EQfoQG6/content/2301.02524v1.pdf filter=lfs diff=lfs merge=lfs -text +YdE5T4oBgHgl3EQfdg8f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +mNE2T4oBgHgl3EQfzAhZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +IdAyT4oBgHgl3EQfr_me/content/2301.00569v1.pdf filter=lfs diff=lfs merge=lfs -text +gdE3T4oBgHgl3EQfIAlQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf filter=lfs diff=lfs merge=lfs -text +LtE0T4oBgHgl3EQfSgD7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +kNE1T4oBgHgl3EQf0QWt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +utE5T4oBgHgl3EQfLg6S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +OdE1T4oBgHgl3EQfuAUH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +IdE2T4oBgHgl3EQfowif/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +IdAyT4oBgHgl3EQfr_me/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +kNE1T4oBgHgl3EQf0QWt/content/2301.03454v1.pdf filter=lfs diff=lfs merge=lfs -text +KtE3T4oBgHgl3EQfvgte/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf filter=lfs diff=lfs merge=lfs -text +ddFPT4oBgHgl3EQfDDRR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +u9FJT4oBgHgl3EQfeiys/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +qdFJT4oBgHgl3EQfaSwR/content/2301.11535v1.pdf filter=lfs diff=lfs merge=lfs -text +IdE2T4oBgHgl3EQfowif/content/2301.04022v1.pdf filter=lfs diff=lfs merge=lfs -text +PtAzT4oBgHgl3EQflf1o/content/2301.01548v1.pdf filter=lfs diff=lfs merge=lfs -text +5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +i9FAT4oBgHgl3EQf-B7W/content/2301.08761v1.pdf filter=lfs diff=lfs merge=lfs -text +T9E0T4oBgHgl3EQf2QLa/content/2301.02711v1.pdf filter=lfs diff=lfs merge=lfs -text +t9E2T4oBgHgl3EQf2Ain/content/2301.04157v1.pdf filter=lfs diff=lfs merge=lfs -text +59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +iNE_T4oBgHgl3EQf4Byz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +e9E3T4oBgHgl3EQf3AuS/content/2301.04760v1.pdf filter=lfs diff=lfs merge=lfs -text +t9E2T4oBgHgl3EQf2Ain/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +sdFIT4oBgHgl3EQfyyum/content/2301.11362v1.pdf filter=lfs diff=lfs merge=lfs -text +e9E3T4oBgHgl3EQf3AuS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +pdAyT4oBgHgl3EQfZPdk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +adE2T4oBgHgl3EQfFAZQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +n9AyT4oBgHgl3EQfY_cz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +FtE1T4oBgHgl3EQfEwPV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +PtAzT4oBgHgl3EQflf1o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +TNE5T4oBgHgl3EQfaw8F/content/2301.05590v1.pdf filter=lfs diff=lfs merge=lfs -text +8NE5T4oBgHgl3EQfQg5R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +etE1T4oBgHgl3EQfegQF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +sdFIT4oBgHgl3EQfyyum/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +CNA0T4oBgHgl3EQfAP_i/content/2301.01961v1.pdf filter=lfs diff=lfs merge=lfs -text +pdAyT4oBgHgl3EQfZPdk/content/2301.00219v1.pdf filter=lfs diff=lfs merge=lfs -text +KNFOT4oBgHgl3EQfyzQ_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +sNE0T4oBgHgl3EQfrgFB/content/2301.02566v1.pdf filter=lfs diff=lfs merge=lfs -text +PtAyT4oBgHgl3EQf7fqt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +iNE_T4oBgHgl3EQf4Byz/content/2301.08350v1.pdf filter=lfs diff=lfs merge=lfs -text +P9AyT4oBgHgl3EQftvku/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +K9FOT4oBgHgl3EQfzjRn/content/2301.12932v1.pdf filter=lfs diff=lfs merge=lfs -text +vtFAT4oBgHgl3EQfih2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +DNAzT4oBgHgl3EQfwf6z/content/2301.01724v1.pdf filter=lfs diff=lfs merge=lfs -text +qdFJT4oBgHgl3EQfaSwR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text +odFQT4oBgHgl3EQfrDYd/content/2301.13382v1.pdf filter=lfs diff=lfs merge=lfs -text +P9AyT4oBgHgl3EQftvku/content/2301.00599v1.pdf filter=lfs diff=lfs merge=lfs -text +tNAzT4oBgHgl3EQfcvzv/content/2301.01410v1.pdf filter=lfs diff=lfs merge=lfs -text +XNE3T4oBgHgl3EQf1Qsz/content/2301.04744v1.pdf filter=lfs diff=lfs merge=lfs -text diff --git a/19AzT4oBgHgl3EQfe_xt/content/tmp_files/2301.01445v1.pdf.txt b/19AzT4oBgHgl3EQfe_xt/content/tmp_files/2301.01445v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..5fa9c2b2b161bfc0dab2179bce07c3e75be3112c --- /dev/null +++ b/19AzT4oBgHgl3EQfe_xt/content/tmp_files/2301.01445v1.pdf.txt @@ -0,0 +1,1799 @@ +A compositional account of motifs, mechanisms, and dynamics in +biochemical regulatory networks +Rebekah Aduddell +James Fairbanks +Amit Kumar +Pablo S. Ocal +Evan Patterson +Brandon T. Shapiro +Abstract +Regulatory networks depict promoting or inhibiting interactions between molecules in a +biochemical system. We introduce a category-theoretic formalism for regulatory networks, using +signed graphs to model the networks and signed functors to describe occurrences of one network +in another, especially occurrences of network motifs. With this foundation, we establish functorial +mappings between regulatory networks and other mathematical models in biochemistry. We +construct a functor from reaction networks, modeled as Petri nets with signed links, to regulatory +networks, enabling us to precisely define when a reaction network could be a physical mechanism +underlying a regulatory network. Turning to quantitative models, we associate a regulatory +network with a Lotka-Volterra system of differential equations, defining a functor from the +category of signed graphs to a category of parameterized dynamical systems. We extend this +result from closed to open systems, demonstrating that Lotka-Volterra dynamics respects not +only inclusions and collapsings of regulatory networks, but also the process of building up complex +regulatory networks by gluing together simpler pieces. Formally, we use the theory of structured +cospans to produce a lax double functor from the double category of open signed graphs to that +of open parameterized dynamical systems. Throughout the paper, we ground the categorical +formalism in examples inspired by systems biology. +1 +Introduction +The genes, proteins, and RNA molecules that comprise living cells interact in complex, varied ways +to sustain the cell throughout its lifecycle and respond to changes in its environment. Intensive +experimental study of these interactions is distilled in an idealized form as regulatory networks, +a kind of directed graph in which vertices represent molecules and edges represent interactions +between molecules (Figure 1.1). The edges are labeled with a positive or negative sign according to +whether the interaction is activating or inhibiting. Regulatory networks are the subject of a large +body of experimental and theoretical work, notably reviewed by Alon [Alo07; Alo19] and Tyson +et al [TN10; TLK19] among others. Particular attention has been paid to network motifs [Alo07; +TN10], the simple but functionally meaningful patterns that recur frequently in regulatory networks, +and to various quantitative dynamics [TLK19] that can be assigned to the networks. +Although regulatory networks are simple enough to define mathematically—we shall define them +to be directed graphs, possibly with multiple edges and loops, whose edges are assigned a positive +or negative sign—important scientific concepts involving them, such as occurrences of motifs in +networks and biochemical mechanisms generating networks, are often treated imprecisely. Likewise +for relationships between regulatory networks and other mathematical models in biochemistry, +particularly dynamical models based on ordinary or stochastic differential equations. Hence a first +aim of this paper is to put certain concepts and relations concerning regulatory networks on a firm +mathematical footing. To do so, we will use methods from category theory. +1 +arXiv:2301.01445v1 [q-bio.MN] 4 Jan 2023 + +Ash1 +Cdk1/ClbS +Sld2 +Figure 1.1: A small biochemical regulatory network: regulation of Sld2 by Cdk1 or ClbS with Ash1 as a +predicted transcription factor. Adapted from Csikász-Nagy et al [Csi+09, Figure 3C]. +Category theory, in both the small and the large, is a natural tool for this study. In saying that +a motif occurs in a network, one should allow for the possibility that the occurrence is indirect, +involving a sequence of appropriately signed interactions. For example, positive autoregulation +can occur directly but also indirectly through a double-negative feedback loop. Since a small +category is exactly a graph in which consecutive edges can be composed, subject to certain laws, +regulatory networks should be viewed not only as signed graphs (Section 2.1) but also as signed +categories freely generated by those (Section 2.2). Sign-preserving functors, unlike sign-preserving +graph homomorphisms, can express indirect occurrences and are in this sense a better notion of +morphism for regulatory networks. Here we are doing category theory in the small, using categories +as algebraic structures comparable to familiar ones like graphs, groups, and monoids. +Having laid these foundations for regulatory networks, we turn to category theory in the large, a +mathematical theory of structure well suited to describe the passages between regulatory networks +and other mathematical models of biochemical systems. Formally speaking, these passages are +functors into or out of the category of regulatory networks. Making a functor is significantly stronger +than making an objects-only mapping, as is typically done in the literature, since if morphisms +of signed graphs formalize relationships between different regulatory networks, then functorality +requires that these relationships be transported to or from other models of interest. By contrast, +an objects-only mapping is, abstractly speaking, entirely unconstrained and so is capable of acting +highly irregularly across different models of a given class. Functorality thus serves as a kind of +safeguard for model transformation: it does not, on its own, ensure that a transformation makes +good scientific sense but it does impose nontrivial logical constraints and coherences. +A first illustration of this principle is the connection between regulatory networks and biochemical +reaction networks (Section 2.3). When modeling the complex biochemical systems that constitute a +living cell, it is often practically necessary to abstract away certain details of the underlying chemical +processes. Regulatory networks generally do not capture all the species or reactions involved in +a given system; nor can they capture multispecies reactions faithfully because they describe only +pairwise interactions. Given that regulatory networks are, to some degree, phenomenological models, +it is natural to ask whether a given network could arise as a summary of a specific chemical process. +The latter are described by biochemical reaction networks, graph-like structures allowing reactions +or transitions with multiple inputs and outputs. Inspired by graphical syntax from systems biology +[Voi00; Voi13], we formalize reaction networks as “Petri nets with links,” and we construct a functor +from the category of Petri nets with signed links to the category of signed graphs. This functor +enables us to propose a formal definition for when a reaction network could be a mechanism for a +regulatory network, a concept that is rarely if ever treated in a precise way. +This concludes the content of Section 2. In Section 3, we turn from qualitative to quantitative +analysis, seeking a functorial assignment of continuous dynamics to regulatory networks. Although +rarely made explicitly functorial, systematic ways to formulate a model belonging to a mathematically +homogeneous class of models are ubiquitous in science. Voit calls these “canonical representations” +2 + +or “canonical models,”1 and identifies Lotka-Volterra models and BST models/S-systems as two +prominent examples in biology [Voi13, §3]. Reflecting their phenomenological status, regulatory +networks do not admit a single, obvious dynamical interpretation, and so a wide variety of dynamical +models have been considered, spanning the discrete and continuous, deterministic and stochastic +[TLK19]. We consider the Lotka-Volterra systems of ordinary differential equations. While not +necessarily the most biologically plausible, it is among the simplest continuous models and hence a +natural place to begin a functorial study. +A Lotka-Volterra system of equations has the form +˙xi = ρi xi + +n +� +j=1 +βi,j xi xj, +i = 1, . . . , n. +or equivalently, has logarithmic derivatives that are affine functions of the state variables: +d +dt[log xi(t)] = ρi + +n +� +j=1 +βi,j xj(t), +i = 1, . . . , n. +The coefficients ρi specify baseline rates of growth or decay, according to their sign, and the +coefficients βi,j rates of activation or inhibition, according to their sign. We construct a functor +that sends a signed graph (regulatory network) to a Lotka-Volterra model suitably constraining the +signs of the rate coefficients (Section 3.2). As a prerequisite, we define a category of parameterized +dynamical systems (Section 3.1), a construction of intrinsic interest that is by no means confined to +Lotka-Volterra dynamics. +In order to comprehend complex biological systems, we must decompose them into small, readily +understandable pieces and then compose them back together to reproduce the behavior of the +original system. This is the mantra of systems biology, which stresses that compositionality is no +less important than reductionism in biology. With this motivation, a secondary aim of this paper +is to extend the above constructions from closed systems to open ones, which can be composed +together by gluing them along their interfaces. Mathematically, we pass from categories to double +categories [Gra19], two-dimensional categorical structures in which the usual morphisms of systems +compose along one direction (by convention, the “vertical” one) and open systems compose along +the other direction (the “horizontal” one). Among other results, we show that the Lotka-Volterra +dynamics functor extends to a lax double functor from the double category of open signed graphs +to a double category of open parameterized dynamical systems (Section 3.3). +The mathematics developed here is motivated by biochemistry but need not be restricted to it. +Famously, Lotka-Volterra systems originated in ecology to model predator-prey dynamics [Lot25]. +Regulatory networks and Lotka-Volterra systems can be used as generic models of entities that +“regulate” each other in some manner, be it at the scale of individual cells or animal ecosystems. +Regulatory networks are highly reminiscent of the causal loop diagrams in system dynamics [Ste00, +Chapter 5], where the latter explicitly label feedback loops and their polarities. +The language of category theory is indispensable to this work but the level of knowledge assumed +by the reader is not constant. We assume throughout that the reader is familiar with the basic +notions of category theory, such as categories, functors, and natural transformations. Our main +reference for facts about category theory is Riehl’s text [Rie16], although there are many others. +In the definitions and theorems, we have tried to minimize the technical level and explicate the +statements in concrete terms. In the proofs, we have aimed for efficiency and freely use concepts +1This usage of “canonical” should not be confused with the unrelated, in fact incompatible, meaning of “canonical” +in pure mathematics, especially category theory. +3 + +and results from the literature that do not appear in the main text. The reader can omit the proofs +without disrupting the continuity of the paper. +2 +Qualitative analysis: motifs and mechanisms +2.1 +Regulatory networks as signed graphs +To begin, we clarify the notion of graph to be used throughout in this paper. The following definition +is standard among category theorists. In other fields, it might be called a “directed multigraph,” +but we will call it simply a “graph.” +Definition 2.1 (Graphs). The schema for graphs is the category Sch(Graph) freely generated +by two parallel morphisms: +V +E +src +tgt +. +A graph is a functor X : Sch(Graph) → Set. A graph homomorphism from a graph X to another +graph Y is a natural transformation φ : X → Y . Graphs and graph homomorphisms form the +category Graph. +To restate the definition in explicit terms, a graph X consists of +• a set X(V ) of vertices; +• a set X(E) of edges; and +• functions X(src), X(tgt) : X(E) → X(V ), assigning to each edge its source and target. +A graph homomorphism φ : X → Y consists of a function φV : X(V ) → Y (V ), the vertex map, +and another function φE : X(E) → Y (E), the edge map. These maps must preserve sources and +targets, meaning that the following squares commute: +X(E) +X(V ) +Y (E) +Y (V ) +X(src) +φE +Y (src) +φV +X(E) +X(V ) +Y (E) +Y (V ) +X(tgt) +φE +Y (tgt) +φV . +We now turn to the main notion of this section, signed graph. Write Sgn for the set of (nonzero) +signs, whose two elements may be denoted {1, −1} or {+, −}. The set of signs is an abelian group, +isomorphic to the cyclic group Z2, under the usual multiplication. +Definition 2.2 (Signed graphs). The category of signed graphs is the slice category +SgnGraph := Graph/Sgn, +where, by abuse of notation, Sgn is regarded as a graph with one vertex and two loops. +Unpacking the definition, a signed graph is seen to be a graph X equipped with a function +X(sgn) : X(E) → Sgn that assigns a sign to each edge. Given signed graphs X and Y , a morphism +of signed graphs from X to Y is a graph homomorphism φ that preserves signs, meaning that +the following triangle commutes: +X(E) +Y (E) +Sgn +X(sgn) +Y (sgn) +φE +. +4 + +Signed graphs are a mathematical description of the regulatory networks studied in systems +biology [Alo07; TN10]. +For the purposes of this paper, we will simply define a regulatory +network to be a signed graph. The vertices of the graph represent the components of the network, +which could be proteins, genes, or RNA molecules. Signed edges represent interactions between +components, where the source has the effect of either activating/promoting the target (positive sign) +or inhibiting/repressing it (negative sign). As is customary, we denote activation interactions by +arrows with pointed heads (−→) and inhibition interactions by arrows with flat heads (−−⊣). For +instance, the two drawings +x +y ++ +− +↭ +x +y +represent the same network, a negative feedback loop in which x activates y, which in turn inhibits +x [TN10, Scheme 1, Motif B]. +In the literature [TN10], regulatory networks are often modeled as sign-valued matrices. This +approach is a special case of ours in that an n-by-n matrix valued in {+1, −1, 0} can be interpreted +as a simple signed graph on n vertices, with signed edges defined by the nonzero matrix elements. +Unlike the matricial formalism, our formalism allows multiple edges between the same pair of edges, +which can model multiple interactions based on different mechanisms. Allowing multiple edges and +self-loops also ensures that graphs and signed graphs form well behaved categories, as the following +proposition shows. +Proposition 2.3. The category of signed graphs is complete (has all limits) and cocomplete (has +all colimits). +Proof. Because Graph is a copresheaf category, it is complete and cocomplete [Rie16, Proposition +3.3.9]. The slice category SgnGraph = Graph/Sgn is hence also complete and cocomplete [Rie16, +Proposition 3.5.5]; alternatively, this follows because slices of copresheaf categories are again +(equivalent to) copresheaf categories [Str00, Remark p. 303]. +Colimits of signed graphs can be used to construct a category, or rather a double category, of +open signed graphs. Composition of open signed graphs formalizes the process of building large +regulatory networks from smaller pieces, including network motifs. +Proposition 2.4 (Open signed graphs). There is a symmetric monoidal double category of open +signed graphs, Open(SgnGraph), having +• as objects, sets A, B, C, . . . ; +• as vertical arrows, functions f : A → B; +• as horizontal arrows, open signed graphs, which consist of a signed graph X together with +a cospan of sets A0 +ℓ0 +−→ X(V ) +ℓ1 +←− A1; +• as cells, morphisms of open signed graphs (X, ℓ0, ℓ1) → (Y, m0, m1), which consist of a +map of signed graphs φ : X → Y along with functions fi : Ai → Bi, i = 0, 1, making the +following diagram commute: +A0 +X(V ) +A1 +B0 +Y (V ) +B1 +ℓ0 +f0 +ℓ1 +φV +m0 +f1 +m1 +. +5 + +Vertical composition is by composition in Set and in SgnGraph. Horizontal composition and monoidal +products are by pushouts and coproducts in SgnGraph, respectively, viewing the sets in the feet of the +cospans as discrete signed graphs. +Proof. To construct this symmetric monoidal double category, we use the method of structured +cospans [FS07] in its double-categorical form [BC20]. The categories of sets and of signed graphs +are related by an adjoint pair of functors +Set +SgnGraph +Disc +evV +⊣ +. +Here evV : SgnGraph → Set is the evaluation at V functor, sending a signed graph X to its set of +vertices X(V ) and a morphism of signed graphs φ to its vertex map φV , and Disc : Set → SgnGraph +is the discrete signed graph functor, sending a set A to the signed graph with vertex set A and no +edges. We obtain a symmetric monoidal double category of open signed graphs as the L-structured +cospans for the functor L := Disc : Set → SgnGraph [BC20, Theorems 2.3 and 3.9]. +To show that this symmetric monoidal double category is the same one in the proposition +statement, suppose that L ⊣ R : A → X is an adjoint pair of functors, where in our application +L = Disc and R = evV . By the defining bijection of an adjunction, L-structured cospans, i.e., +objects A0 and A1 in A together with a cospan L(A0) → X ← L(A1) in X, correspond exactly +to “R-decorated cospans,” i.e., an object X in X together with a cospan A0 → R(X) ← A1 in A. +Furthermore, by the naturality of this bijection [Rie16, Lemma 4.1.3], morphisms of L-structured +and R-decorated cospans +L(A0) +X +L(A1) +L(B0) +Y +L(B1) +L(f0) +φ +L(f1) +↭ +A0 +R(X) +A1 +B0 +R(Y ) +B1 +f0 +R(φ) +f1 +related by the adjunction are equivalent in that one diagram commutes if and only if the other does. +We will tacitly reuse this reasoning in future constructions, such as Proposition 2.8 below. +A morphism of signed graphs can do two things. Most obviously, it can pick out a signed graph +as a subobject of another one, via a sign-preserving subgraph embedding. A signed graph morphism +can also collapse multiple vertices onto a single vertex, and multiple edges onto a single edge with +the same sign, in the fairly restrictive sense permitted by a graph homomorphism. To illustrate, +consider the following morphism inspired by Alon’s review [Alo07, Figure 5]. +argR +argCBH +argD +argE +argF +argI +−→ +argR +arg∗ +(2.1) +The network in the domain is a “single-input module” in the arginine biosynthesis system, in which +the regulator argR represses five different enzymes (argCHB, argD, etc.) involved in producing +arginine. The morphism above forgets the distinction between these enzymes, collapsing them +into a catch-all entity labeled “arg∗”. These two functions—embedding and collapsing—are all +that a signed graph morphism can do, because any such morphism factors essentially uniquely as +6 + +an epimorphism (morphism with surjective vertex and edge maps) followed by a monomorphism +(morphism with injective vertex and edge maps), using the epi-mono factorization available in any +copresheaf category, or more generally in any topos [MM94, §IV.6]. +2.2 +Refining regulatory networks using signed categories and functors +While morphisms of signed graph have their uses, they do not capture the important idea of refining +regulatory networks, in which an interaction in one network is realized as a composite of several +interactions in another. To express refinement, we must generalize our notion of morphism from +graph homomorphisms to functors. This, in turn, requires the concept of a signed category. +Definition 2.5 (Signed categories). The category of signed categories is the slice category +SgnCat := Cat/Sgn, +where Cat is the category of small categories and the group of signs, Sgn, is regarded as a category +with one object and two morphisms. +Unpacking the definition, a signed category is a category C in which every morphism f is +assigned a sign sgn(f) ∈ {1, −1} in a functorial way, meaning that +sgn(x0 +f1 +−→ x1 +f2 +−→ · · · +fn +−→ xn) = +n +� +i=1 +sgn(fi) +for every n ≥ 0 and every sequence of composable morphisms f1, . . . , fn. In particular (n = 0), the +identity morphisms have positive sign. A morphism of signed categories, or signed functor, +is a functor F : C → D between signed categories that preserves the signs, meaning that +sgnD(F(f)) = sgnC(f) +for every morphism f in C. +Since our aim is to have a more flexible notion of morphism between signed graphs, we will +mostly restrict ourselves to those signed categories that are freely generated by a signed graph. The +free signed category or signed path category functor +Path : SgnGraph → SgnCat +sends a signed graph X to the signed category Path(X) having +• as objects, the vertices of X; +• as morphisms from x to y, the paths in X from x to y, whose sign is defined to be the product +of the signs of the edges comprising the path. +Composition of paths is by concatenation, which clearly preserves the sign. The identity morphism +at x is the empty path at x, which has positive sign. By convention, if X and Y are signed graphs, +we say that a signed functor from X to Y is a signed functor F : Path(X) → Path(Y ) between +the corresponding signed path categories. Since the morphisms of Path(X) are freely generated +by the edges in X, a signed functor from X to Y is uniquely determined by a morphism of signed +graphs from X to the underlying signed graph of Path(Y ). This means that each edge in X is +sent to an appropriately signed path of edges in Y , which can be regarded as a refinement of the +relationship that the edge represents. +7 + +Motif +Generic instance +Positive autoregulation +L+ := +� +• +� +Negative autoregulation +L− := +� +• +� +Coherent feedforward loop +I++ := +� +• +• +� +Incoherent feedforward loop +I± := +� +• +• +� +Positive feedback loop +L++ := +� +• +• +� +Negative feedback loop +L± := +� +• +• +� +Double-negative feedback loop +L−− := +�• +• +� +Table 2.1: Common motifs in biochemical regulation networks [Alo07; TN10] +We now have a precise language with which to classify network motifs and their occurrences. +As a first example, Alon identifies four types of incoherent feedforward loop (FFL) involving three +components, +x +x +x +x +y +y +y +y +z +z +z +z +, +those of type 1, 2, 3, and 4, respectively [Alo07, Figure 2a]. Besides having three components, what +these motifs have in common is that there exists a signed functor into each of them from the signed +graph I± := +� +• +• +� +having two parallel arrows of opposite sign. The network I± is thus the +“generic” incoherent feedforward loop, in the sense that signed functors out of it refine the pattern +in specific ways. A similar situation holds for other common network motifs (Table 2.1), which +motivates the following definition. +Definition 2.6 (Motif instance). Given a signed graph A, regarded as a motif, an instance or +occurrence of the motif A in a network X is a monic signed functor A ↣ X. +Note that a signed functor is a monomorphism exactly when the functor is an embedding of +categories, i.e., an injective-on-objects, faithful functor. Requiring the functor in the definition to +be monic excludes “degenerate instances” of motifs where vertices or edges are identified. +Now, should the incoherent FFL be regarded as a network motif, or is it the more specific types, +such as the incoherent FFL of type 1, that are motifs? From our point of view, they are all equally +motifs but they have different degrees of specificity, and the functorial language clarifies how motifs +are iteratively refined. Specifically, an instance of an incoherent FFL of type 1 in a network X +also gives an instance of an incoherent FFL in X (of unspecified type), simply by composing the +monomorphisms involved: +I± ∼= +� +x +z +� +↣ +� +x +y +z +� +↣ +X. +8 + +Similarly, in the notation of Table 2.1, any instance of double-negative feedback (L−−) also gives an +instance of positive autoregulation (L+) [CP09], via the monomorphism L+ ↣ L−− that sends the +positive loop to the double-negative 2-cycle. +For any choice of motif A, the mapping that sends a regulatory network X to the set of +occurrences of A in X is a functor +HomSgnCatm(Path(A), Path(−)) : SgnGraphm → Set, +where SgnGraphm and SgnCatm denote the wide subcategories of monomorphisms in SgnGraph and +SgnCat, respectively. This functor is almost, but not quite, representable, due to the distinction +between signed graphs and signed categories. More importantly, the existence of this functor means +that a monomorphism between regulatory networks induces a map between instances of A, for any +motif A. +We now extend the construction of open signed graphs to open signed categories. +Proposition 2.7. The category of signed categories is complete and cocomplete. +Proof. Because the category Cat is complete and cocomplete [Rie16, Proposition 3.5.6], its slice +SgnCat = Cat/Sgn is also [Rie16, Proposition 3.5.5]. +Proposition 2.8 (Open signed categories). There is a symmetric monoidal double category of open +signed categories, Open(SgnCat), having +• as objects, sets A, B, C, . . . ; +• as vertical arrows, functions f : A → B; +• as horizontal arrows, open signed categories, which consist of a signed category C together +with a cospan of sets A0 +ℓ0 +−→ Ob(C) +ℓ1 +←− A1; +• as cells, morphisms of open signed categories (C, ℓ0, ℓ1) → (D, m0, m1), which consist of +a signed functor F : C → D along with functions fi : Ai → Bi, i = 0, 1, making the diagram +commute: +A0 +Ob(C) +A1 +B0 +Ob(D) +B1 +ℓ0 +f0 +ℓ1 +Ob(F) +m0 +f1 +m1 +. +Vertical composition is by composition in Set and in SgnCat. Horizontal composition and monoidal +products are by pushouts and coproducts in SgnCat, respectively, viewing the sets in the feet of +cospans as discrete signed categories. +Moreover, the signed path category functor extends to a symmetric monoidal double functor +Path : Open(SgnGraph) → Open(SgnCat). +Proof. We take Open(SgnCat) to be the symmetric monoidal double category of L′-structured +cospans for the functor L′ := Disc : Set → SgnCat involved the composite adjunction +Set +SgnCat += +Set +SgnGraph +SgnCat +Disc +Ob +Disc +evV +U +Path +⊣ +⊣ +⊣ +. +On the right hand side, the first adjunction was already used in the proof of Proposition 2.4, and +the second adjunction is the free-forgetful adjunction between signed graphs and signed categories. +9 + +To prove the last statement, we notice that all functors involved in the commutative square +Set +SgnGraph +Set +SgnCat +L=Disc +L′=Disc +Path +are left adjoints, hence preserve colimits. We can therefore appeal to [BC20, Theorem 4.3] to obtain +a symmetric monoidal double functor +Open(SgnGraph) ∼= LCsp(SgnGraph) → L′Csp(SgnCat) ∼= Open(SgnCat). +2.3 +Mechanistic models as Petri nets with links +However challenging they may be to identify through experiments and data analysis, regulatory +networks still only summarize how the components of a complex biochemical system interact. +Regulatory networks typically include only a subset of the system’s components, and they do not +model individual reactions and processes, only pairwise promoting or inhibiting interactions between +components. In this sense, regulatory networks are not fully mechanistic models, even if they have +a stronger causal interpretation than, say, a correlation matrix. +By contrast, mechanistic models in biochemistry model individual reactions, which requires a +different formalism. Pictures like the following, adapted from Voit’s review [Voi13, Figure 4], are +common in systems biology. +A +B +D +C +− +(2.2) +This diagram possesses two distinctive features. First, directed hyperedges represent reactions +having a number of inputs or outputs different than one. There are, for example, hyperedges from +B and C to D, from nothing to A (an inflow), and from D to nothing (an outflow). If, in lieu of +hyperedges, we introduce a second type of vertex, we obtain a structure similar to a Petri net +A +B +C +D +− +(2.3) +but with the second distinctive feature of having signed links from the first type of vertices (species) +to the second type (transitions), whose signs indicate promotion or inhibition. +In this section, we explain how a Petri net with signed links can provide a mechanism for a +regulatory network. This involves constructing a functor from Petri nets with signed links to signed +graphs, approximating the former as the latter. As a prerequisite, we need a rigorous definition of a +Petri net with links, which seems to be absent from the literature. +10 + +Definition 2.9 (Petri net with links). The schema for Petri nets with links is the category +Sch(LPetri) freely generated by these objects and morphisms: +I +S +O +T +L +srcL +tgtL +srcI +tgtI +tgtO +srcO +. +A Petri nets with links is a functor P : Sch(LPetri) → Set, and a morphism of these is a natural +transformation. A morphism φ : P → Q preserves arities if the naturality squares associated +with the morphisms I → T and O → T are also pullback squares: +P(I) +P(T) +Q(I) +Q(T) +P(tgtI) +φI +φT +P(tgtI) +⌟ +P(O) +P(T) +Q(O) +Q(T) +P(srcO) +φO +φT +P(srcO) +⌟ +. +Petri nets with links and their morphisms form the category LPetri. +To explicate the definition, a Petri net with links P consists of +• a set P(S) of species; +• a set P(T) of transitions; +• a set P(I) of input arcs going from species to transitions, via maps P(srcI) : P(I) → P(S) +and P(tgtI) : P(I) → P(T); +• a set P(O) of output arcs going from transitions to species, via maps P(srcO) : P(O) → P(T) +and P(tgtO) : P(O) → P(S); and finally +• a set P(L) of links going from species to transitions, via maps P(srcL) : P(L) → P(S) and +P(tgtL) : P(L) → P(T). +The property of preserving arities, called “etale” by Kock [Koc22, §3.4], means that a morphism +φ : P → Q of Petri nets with links preserves the input and output arities of all transitions. Namely, +for each transition t in the net P the map φI : P(I) → Q(I) restricts to a bijection between the +input arcs to t and to φT (t), and similarly the map φO : P(O) → Q(O) restricts to a bijection +between the output arcs from t and from φT (t). This property seems appropriate for many purposes, +including in biochemistry, but for mathematical convenience we will not always assume it. +Remark 2.10 (Related literature). Our definition of a Petri net with links, while apparently novel, +is the obvious joint generalization of two existing concepts. Kock has described Petri nets as +copresheaves on a category with objects S, T, I, O [Koc22], calling them whole-grain Petri nets to +distinguish them from classical Petri nets, whose semantics are subtly different [Bae+21]. Meanwhile, +the concept of a link is essential to stock and flow diagrams, originating in the field of system +dynamics [For61; Ste00] and recently given a rigorous categorical account [Bae+22]. We also note +that the Petri nets with catalysts proposed by Baez, Foley, and Moeller [BFM19] differ significantly +from Petri nets with links: the former fix a subset of the species to be catalysts throughout the net, +whereas the latter uses links to make catalyzation specific to individual reactions. +11 + +Remark 2.11 (Petri nets as typed graphs). Like bare Petri nets, Petri nets with links can be described +as graphs with two types of vertices. To see this, take the graph +TLPetri := +� +� +� +� +� +� +� +S +T +I +L +O +� +� +� +� +� +� +� +with vertices S and T and edges I, O, and L. The category of Petri nets with links and natural +transformations is isomorphic to the slice category Graph/TLPetri. Moreover, the schema category +Sch(LPetri) is isomorphic to the category of elements of the functor TLPetri : Sch(Graph) → Set, +exemplifying a general fact about slices of copresheaf categories [Str00, Remark p. 303]. +Petri nets with signed links are defined analogously to signed graphs (Definition 2.2). +Definition 2.12 (Petri nets with signed links). The category of Petri nets with signed links +is the slice category +SgnPetri := LPetri/PSgn, +where PSgn is the Petri net with links having one species, one transition, one input arc, one output +arc, and two links, namely the elements of Sgn. +Incidentally, the morphism P → PSgn defining a Petri net with signed links does not preserve +arities unless every transition in P has exactly one input and one output. +We now turn to the main construction of this section, a functor that “approximates” a Petri net +with signed links as a signed graph. On the example in Equations (2.2) and (2.3), this functor gives +the signed graph +A +B +D +C +. +(2.4) +In general, the resulting signed graph has, as vertices, the Petri net’s species and has signed edges +for each of the four cases: +(a) for every input-output pair to a transition, a positive edge from input to output; +(b) for every input to a transition, a negative self loop, representing consumption by the reaction; +(c) for every signed link, an edge of opposite sign going from the linked species to each input to +the linked transition; +(d) for every signed link, an edge of equal sign going from the linked species to each output from +the linked transition. +All four cases are visible in the example of Equation (2.4). Set-theoretically, each of these cases is +the result of a conjunctive query, or equivalently of a representable functor +HomLPetri(P, −) : LPetri → Set +associated with a particular Petri net with links P, the generic instance for that query. The four +generic instances we need are shown in Figure 2.1. Their sum is a disjoint union of conjunctive +queries, or duc-query for short. +12 + +(a) Input-output pair to tran- +sition +(b) Input to transition +(c) Input to transition with +incident link +(d) Output from transition +with incident link +Figure 2.1: Four different Petri nets with links. For each of these instances P, evaluating the representable +functor HomLPetri(P, −) : LPetri → Set gives the edges for one case in the case analysis that defines the functor +from Petri nets with signed links to signed graphs (Proposition 2.13). +To make the construction just sketched on objects fully precise and functorial, we use Spivak’s +theory of functorial data migration based on duc-queries [Spi21]. In order to apply it, we fully +schematize the definitions of signed graphs and Petri nets with signed links. +The schema for signed graphs is the category Sch(SgnGraph) freely generated by these objects +and morphisms: +V +E +A +neg +src +tgt +sgn +. +A signed graph as in Definition 2.2 is equivalent to a functor X : Sch(SgnGraph) → Set such that +X(A) = Sgn, the set of signs, and X(neg) : Sgn → Sgn is negation (i.e., multiplication by −1). Note +that negation is not needed to define the data of a signed graph but is relevant to the data migration. +A morphism of signed graphs X → Y is a natural transformation φ : X → Y whose component at +A is the identity function, φA = 1Sgn. We thus obtain a category isomorphic to SgnGraph. +Similarly, the schema for Petri nets with signed links is the category Sch(SgnPetri) freely +generated by: +S +I +O +L +A +T +neg +srcL +tgtL +srcI +tgtI +tgtO +srcO +sgn +one +. +A Petri net with signed links, as in Definition 2.12, is equivalent to a functor P : Sch(SgnPetri) → Set +such that P(A) = Sgn, the map P(neg) : Sgn → Sgn is negation, and P(one) : P(T) → Sgn is the +constant map at +1. Again, these maps are needed for data migration, not for the data itself. A +morphism of Petri nets with signed links is a natural transformation φ : P → Q such φA = 1Sgn, +yielding a category isomorphic to SgnPetri. +Proposition 2.13 (Regulatory net induced by Petri net). A functor +Net : SgnPetri → SgnGraph +13 + +is specified by the following functor from Sch(SgnGraph) to the category of duc-queries on Sch(SgnPetri): +Sch(SgnGraph) → ⨿ +�� +SetSch(SgnPetri)�op� +V �→ S +E �→ I ×T O + I + I ×T L + O ×T L +A �→ A +src �→ [srcI ◦πI, srcI, srcL ◦πL, srcL ◦πL] +tgt �→ [tgtO ◦πO, srcI, srcI ◦πI, tgtO ◦πO] +sgn �→ [one ◦πT , neg ◦ one ◦ tgtI, neg ◦ sgn ◦πL, sgn ◦πL] +neg �→ neg . +(2.5) +Proof. We will define the functor Net : SgnPetri → SgnGraph as the restriction of a functor +SetD → SetC between the categories of copresheaves on D := Sch(SgnPetri) and C := Sch(SgnGraph). +In fact, the functor SetD → SetC will be of the special kind known as a parametric right adjoint +[Str00, Definition p. 311]. +According to the theory of data migration [Spi21, Corollary 2.3.6], giving a parametric right +adjoint SetD → SetC is equivalent to giving a functor from C to ⨿((SetD)op), the free coproduct +completion of the free limit completion of D. Our functor C → ⨿((SetD)op) is defined by Equa- +tion (2.5). The assignment of E ∈ C can also be described as the sum of the four representables +associated with the Petri nets with links in Figure 2.1. +Finally, the assignments A �→ A and neg �→ neg ensure that if P is a copresheaf on D with +P(A) = Sgn and P(neg) is negation, then applying this parametric right adjoint functor to P yields +a copresheaf X on C where again X(A) = Sgn and X(neg) is negation. Thus, this functor between +copresheaf categories restricts to a functor SgnPetri → SgnGraph as claimed. +With this construction, we can give a formal account of what it means to have a mechanistic +model for a regulatory network. +Definition 2.14 (Mechanism). A mechanistic model for a regulatory network X is a Petri +net with signed links P together with an occurrence of X in Net(P), i.e., a monic signed functor +X ↣ Net(P). +For example, the Petri net with signed links in Equation (2.3) is a mechanistic model for a +regulatory network in which A and D participate in a positive feedback loop: +A +D . +3 +Quantitative analysis: parameters and dynamics +3.1 +Parameterized dynamical systems +Pioneering the idea of functorial semantics for scientific models, Baez and Pollard extended the +mass-action model of reaction networks to a functor from the category of Petri nets with rates +into a category of dynamical systems [BP17]. In this picture, the reaction rate coefficients are +known constants associated with the reaction network. In practice, however, rate coefficients are +often unknown and must be extracted from existing literature or estimated from experimental data. +We therefore change our perspective slightly and consider dynamical systems not in isolation but +as parameterized families. This shift also turns out to have formal advantages: the category of +14 + +parameterized dynamical systems is better behaved than the category of dynamical systems, which +has too few morphisms. +To begin, we recall the dynamics functor, nearly identical to Baez-Pollard’s [BP17, Lemma 15]: +Lemma 3.1 (Dynamics). There is a functor Dynam : FinSet → VectR that sends +• a finite set S to the vector space of algebraic vector fields v : RS → RS, where algebraic +means that the components of the vector field are polynomials in the state variables; +• a function f : S → S′ between finite sets to the linear transformation +(v : RS → RS) +�→ +(f∗ ◦ v ◦ f∗ : RS′ → RS′), +where the linear map f∗ : RS′ → RS is the pullback along f +f∗(x′)(i) := x′(f(i)), +x′ ∈ RS′, i ∈ S, +and the linear map f∗ : RS → RS′ is the pushforward along f +f∗(x)(i′) := +� +i∈f−1(i′) +x(i), +x ∈ RS, i′ ∈ S′. +Proof. The functor Dynam : FinSet → VectR can be constructed as the composite +FinSet +⟨D,F⟩ +−−−−→ Vectop +R × VectR +Poly(−,−) +−−−−−−→ VectR, +where F : FinSet → VectR is the free vector space functor (restricted to finite sets); D : FinSetop → +VectR is the dual vector space functor (restricted to F), whose underlying set-valued functor is +VectR(F(−), R) ∼= Set(−, R) : FinSetop → Set; +and Poly(−, −) is the VectR-enriched hom-functor that sends a pair of vector spaces to the vector +space of polynomial maps between them.2 +The dynamics functor is the same one studied by Baez and Pollard except that we take the +vector space, rather than merely the set, of vector fields. That is because we are interested in +linearly parameterized dynamical systems. In calling the functor “dynamics,” we implictly identify a +vector field with the differentiable dynamical system that it generates. This common practice is not +entirely innocent since even when a system of differential equations depends linearly on parameters, +its solutions rarely do. We also note that the restriction to algebraic vector fields, as opposed to +smooth or even just continuous ones, is inessential but suffices for us and agrees with Baez-Pollard. +The dynamics functor is the main building block in constructing a category of parameterized +dynamical systems. +Definition 3.2 (Linear parameterizations). The category of linearly parameterized dynami- +cal systems is the comma category +Para(Dynam) := F/ Dynam, +where F : FinSet → VectR, X �→ RX is the free vector space functor restricted to finite sets. +2For a coordinate-free description of polynomial maps between vector spaces, see [Car71, §1.6]. +15 + +So, by definition, a linearly parameterized dynamical system consists of a finite set P, the +parameter variables, and a finite set S, the state variables, together with a linear map +v : RP → Dynam(S) +sending each choice of parameters θ ∈ RP to an algebraic vector field v(θ). In more conventional +notation, we can write v(x; θ) := v(θ)(x) for x ∈ RS and θ ∈ RP . A morphism (P, S, v) → (P ′, S′, v′) +of linearly parameterized dynamical systems is a pair of functions q : P → P ′ and f : S → S′ +making the square +RP +Dynam(S) +RP ′ +Dynam(S′) +v +f∗◦(−)◦f∗ +v′ +q∗ +(3.1) +commute, or equivalently making the equation +f∗(v(f∗(x′); θ)) = v′(x′; q∗(θ)) +hold for all x′ ∈ RS′ and θ ∈ RP . +While certainly not all dynamical models depend linearly on their parameters, a great many +of them do, including several important canonical models in biology and chemistry. The law of +mass action defines dynamical systems that depend linearly on the rate coefficients. The generalized +Lotka-Volterra equations, studied in the next section, are linear in the rate and affinity parameters. +Of course, the mass-action and Lotka-Volterra equations are nonlinear ODEs; linearity of a vector +field in state or in parameters are separate matters. Nevertheless, even for nonlinear models such +as Lotka-Volterra, linearity in parameters is a useful assumption that aides in the identifiability +analysis of the model [SRS14, §5]. +To express important physical constraints and to define a semantics for signed graphs, we will +restrict the dynamical system and its parameters to be nonnegative. This is straightforward enough +but requires a bit of additional formalism. +Write R+ := {x ∈ R : x ≥ 0} for the semiring of nonnegative real numbers. A module over R+ +is called a conical space, and the category of conical spaces and conic-linear (R+-linear) maps is +denoted Con := ModR+. A conical space is a structure in which one can take linear combinations +with nonnegative real coefficients, just as a real vector space (R-module) is a structure in which +one can take linear combinations with arbitrary real coefficients. Any convex cone in a real vector +space is a conical space. Our main example is the nonnegative orthant of RS for some set S: the +function space RS ++ := {x : S → R+}, with conical combinations taken pointwise. A real vector space +can itself be regarded as a conical space; more precisely, the inclusion of semirings R+ �→ R induces +a forgetful functor VectR → Con by restriction of scalars. +Recall that a dynamical system is nonnegative if whenever the initial condition is in the +nonnegative orthant, its trajectory always remains in the nonnegative orthant. A dynamical system +of form ˙x = v(x) is nonnegative if and only if vi(x) ≥ 0 whenever x ≥ 0 componentwise and +xi = 0 [HCH10, Proposition 2.1], in which case the vector field v is called essentially nonnegative +[HCH10, Definition 2.1]. Using this criterion, it is easy to see that a reaction network with mass- +action kinetics is nonnegative assuming the rate constants are nonnegative, as is a Lotka-Volterra +system for any choice of parameters. Hence both systems satisfy the obvious physical constraint +that no species should have negative concentration or population. +Lemma 3.3 (Nonnegative dynamics). There is a functor Dynam+ : FinSet → Con that sends a +finite set S to the conical space of essentially nonnegative, algebraic vector fields v : RS → RS and +sends a function f : S → S′ to the transformation v �→ f∗ ◦ v ◦ f∗. +16 + +Proof. The proof is similar to that of Lemma 3.1. It is clear that the essentially nonnegative functions +are stable under pointwise conical combinations, hence form a conical space. (They are, of course, not +stable under arbitrary linear combinations.) We just need to check that if v : RS → RS is essentially +nonnegative, then so is the transformed vector field f∗ ◦ v ◦ f∗ : RS′ → RS′. Fix x′ ∈ RS′ ++ and i′ ∈ S′, +and suppose that x′(i′) = 0. For every i ∈ f−1(i′), we have f∗(x′)(i) = x′(f(i)) = x′(i′) = 0 and so +v(f∗(x′))(i) ≥ 0, whence the inequality of essential nonnegativity follows: +(f∗ ◦ v ◦ f∗)(x′)(i′) = +� +i∈f−1(i′) +v(f∗(x′))(i) ≥ 0. +We now define the conical analogue of linearly parameterized dynamical systems. +Definition 3.4 (Conical parameterizations). The category of conically parameterized non- +negative dynamical systems is the comma category +Para(Dynam+) := F+/ Dynam+ . +where F+ : FinSet → Con, X �→ RX ++ is the free conical space functor restricted to finite sets. +So, a conically parameterized nonnegative dynamical system consists of finite sets P and S +together with a conic-linear map +v : RP ++ → Dynam+(S). +Proposition 3.5 (Colimits of parameterized dynamical systems). The categories of linearly and +conically parameterized dynamical systems are finitely cocomplete. Moreover, these finite colimits +are computed by colimits in FinSet of the parameter variables and of the state variables. +Proof. The category FinSet has finite colimits and the functors F : FinSet → VectR and F+ : +FinSet → Con preserve finite colimits, since they are composites of the inclusion FinSet �→ Set with +the left adjoints +Set +VectR +F +U +⊣ +and +Set +Con +F+ +U+ +⊣ +to the underlying set functors on vector spaces and conical spaces. By Lemma 3.6 below, the comma +categories Para(Dynam) = F/ Dynam and Para(Dynam+) = F+/ Dynam+ have finite colimits, +which are preserved by the projection functors onto FinSet. +To illustrate, we describe the initial object and binary coproducts in Para(Dynam). The initial +linearly parameterized dynamical system has no parameter variables, no state variables, and the +unique (trivial) vector field on the zero vector space. The coproduct of two linearly parameterized +dynamical systems (P1, S1, v1) and (P2, S2, v2) has parameter variables P1 + P2, state variables +S1 + S2, and parameterized vector field +RP1+P2 ∼= RP1 ⊕ RP2 +v1⊕v2 +−−−−→ Dynam(S1) ⊕ Dynam(S2) +[Dynam(ι1),Dynam(ι2))] +−−−−−−−−−−−−−−−→ Dynam(S1 + S2), +where ι1 : S1 → S1 +S2 and ι2 : S2 → S1 +S2 are the canonical inclusions. In conventional notation, +the coproduct system has parameterized vector field +v +�� +x1 +x2 +� +; +� +θ1 +θ2 +�� += +� +v1(x1; θ1) +v2(x2; θ2) +� +. +The proof of Proposition 3.5, as well as of Theorems 3.7 and 3.8 below, depends on the following +technical lemma about comma categories, which the reader can omit without loss of continuity. +17 + +Lemma 3.6 (Colimits in comma categories). Let C0 +F0 +−→ C +F1 +←− C1 be a cospan of categories such +that C0 and C1 have colimits of shape J and F0 preserves J-shaped colimits. Then the comma category +F0/F1 also has J-shaped colimits, and the projection functors πi : F0/F1 → Ci, i = 0, 1, preserve +those colimits. +Furthermore, a functor G : X → F0/F1 into the comma category preserves J-shaped colimits +whenever the associated functors Gi := πi ◦ G : X → Ci, i = 0, 1, do so. +Proof. Colimits in the comma category F0/F1 are constructed in [RB88, §5.2]. To make the rest of +the proof self-contained, we recall the construction here. +By the universal property of the comma category, a diagram D : J → F0/F1 is equivalent to +diagrams Di := πi ◦ D : J → Ci, i = 0, 1, along with a natural transformation ⃗D : F0 ◦ D0 ⇒ F1 ◦ D1. +Let (ci, λi) be a colimit cocone for the diagram Di in Ci, having legs Di(j) +λi +j +−→ ci for each j ∈ J. +The family of morphisms +F0(D0(j)) +⃗Dj +−−→ F1(D1(j)) +F1(λ1 +j) +−−−−→ F1(c1), +j ∈ J, +is then a cocone under F0 ◦ D0. Since F0 preserves J-shaped limits, (F0(c0), F0 ∗ λ0) is a colimit +cocone for F0 ◦ D0, so by its universal property, there exists a unique morphism f : F0(c0) → F1(c1) +making the squares commute: +F0(D0(j)) +F1(D1(j)) +F0(c0) +F1(c1) +⃗Dj +f +F0(λ0 +j) +F1(λ1 +j) , +j ∈ J. +Setting λ := (λ0 +j, λ1 +j)j∈J, the cocone ((c0, c1, f), λ) can be shown to be a colimit of the diagram D. +To prove the last statement about colimit preservation, let D : J → X be a diagram with colimit +cocone (x, λ), having legs Dj +λj +−→ y for j ∈ J. We must show that its image cocone (G(x), G ∗ λ) is +a colimit of the diagram G ◦ D in F0/F1. By the universal property of the comma category, the +functor G : X → F0/F1 is equivalent to the functors Gi : X → Ci, i = 0, 1, along with a natural +transformation ⃗G : F0 ◦ G0 ⇒ F1 ◦ G1. The image cocone (G(x), G ∗ λ) then amounts to cocones +(G0(x), G0 ∗ λ) and (G1(x), G1 ∗ λ), which by hypothesis are colimits of the diagrams G0 ◦ D and +G1 ◦ D in C0 and C1, together with a family of commutative squares in C: +F0(G0(Dj)) +F1(G1(Dj)) +F0(G0(x)) +F1(G1(x)) +⃗GDj +F0(G0(λj)) +⃗Gx +F1(G1(λj)) , +j ∈ J. +But a morphism ⃗Gx making all these squares commute is already uniquely determined by the +universal property of the colimit cocone (F0(G0(x)), F0 ∗ G0 ∗ λ) for the diagram F0 ◦ G0 ◦ D, using +the hypothesis that F0 preserves J-shaped colimits. Indeed, this is precisely how one constructs the +colimit of the diagram G ◦ D in F0/F1, as shown above. It follows that (G(x), G ∗ λ) is a colimit +cocone for G ◦ D. +18 + +3.2 +The Lotka-Volterra dynamical model +A Lotka-Volterra system with n species has, using matrix notation, the vector field +v(x; ρ, β) := x ⊙ (ρ + βx) = diag(x)(ρ + βx) +with state vector x ∈ Rn and arbitrary real-valued parameters ρ ∈ Rn and β ∈ Rn×n [SMH18, §2.2]. +In coordinates, the vector field is +vi(x; ρ, β) = xi +� +�ρi + +n +� +j=1 +βi,jxj +� +� = ρixi + +n +� +j=1 +βi,jxixj, +i = 1, . . . , n. +The parameter ρi sets the baseline rate of growth (when positive) or decay (when negative) for +species i, whereas βi,j defines a promoting (when positive) or inhibiting (when negative) effect of +species j on species i. In typical applications the signs of the parameters are fixed and known in +advance of any data. For example, in the famous predator-prey Lotka-Volterra system +˙x = ax − bxy +˙y = dxy − cy, +with prey x and predators y, the parameters ρ = +� +a +−c +� +and β = +� +0 +−b +d +0 +� +are specified by nonnegative +real numbers a, b, c, d ≥ 0. +In this section, we define quantitative semantics for graphs and signed graphs using the Lotka- +Volterra dynamical model. To illustrate the main ideas, we first construct a functor from finite +graphs (Definition 2.1) to linearly parameterized dynamical systems (Definition 3.2), giving a +semantics for unlabeled graphs. It is more useful to have a semantics for regulatory networks, which +we have defined to be signed graphs. We therefore construct a second functor from finite signed +graphs (Definition 2.2) to conically parameterized nonnegative dynamical systems (Definition 3.4). +Recall that a graph is finite if its vertex and edge sets are both finite. Let FinGraph denote the +full subcategory of Graph spanned by finite graphs. +Theorem 3.7 (Lotka-Volterra model for finite graphs). There is a functor +LV : FinGraph → Para(Dynam) +that sends +• a finite graph X to the linearly parameterized dynamical system with parameter variables +P := X(V ) + X(E), state variables S := X(V ), and algebraic vector field3 +v(x; ρ, β)(i) := ρ(i) x(i) + +� +(e:i′→i)∈X +β(e) x(i′) x(i), +x ∈ RX(V ), i ∈ X(V ), +parameterized by vectors ρ ∈ RX(V ) and β ∈ RX(E); +• a graph homomorphism φ : X → Y to a morphism of systems with parameter variable map +φV + φE : X(V ) + X(E) → Y (V ) + Y (E) and state variable map φV : X(V ) → Y (V ). +Moreover, the functor LV preserves finite colimits. +3For a fixed graph X and vertex i ∈ X(V ), the notation (e : i′ → i) ∈ X means any edge e ∈ X(tgt)−1(i) incoming +to i, whose source i′ = X(src)(e) varies with e. +19 + +Proof. By the universal property of the comma category Para(Dynam) = F/ Dynam, to give a +functor LV : FinGraph → Para(Dynam) is to give a pair of functors LV0, LV1 : FinGraph → FinSet +along with a natural transformation +⃗ +LV : (F ◦ LV0) ⇒ (Dynam ◦ LV1) : FinGraph → VectR. +We set LV0(X) := X(V ) + X(E) and LV1(X) := X(V ). Using the universal property of the +coproduct in VectR, the components +⃗ +LVX : RX(V ) ⊕ RX(E) ∼= RX(V )+X(E) → Dynam(X(V )). +of the transformation ⃗ +LV themselves decompose into two parts, call them +v0 +X := ⃗ +LV +0 +X : RX(V ) → Dynam(X(V )) +and +v1 +X := ⃗ +LV +1 +X : RX(E) → Dynam(X(V )). +We define these to be +v0 +X(x; ρ)(i) := ρ(i) x(i) +and +v1 +X(x; β)(i) := +� +e∈X(tgt)−1(i) +β(e) x(X(src)(e)) x(i). +Putting the pieces back together reproduces the first statement of the theorem. We just need to +check that the transformation ⃗ +LV is, in fact, natural. +Given a graph homomorphism φ : X → Y , the naturality square for the transformation ⃗ +LV is +RX(V )+X(E) +Dynam(X(V )) +RY (V )+Y (E) +Dynam(Y (V )) +⃗ +LVX +(φV +φE)∗ +(φV )∗◦(−)◦(φV )∗ +⃗ +LVY +, +(3.2) +which decomposes into two squares, +RX(V ) +Dynam(X(V )) +RY (V ) +Dynam(Y (V )) +v0 +X +(φV )∗ +(φV )∗◦(−)◦(φV )∗ +v0 +Y +and +RX(E) +Dynam(X(V )) +RY (E) +Dynam(Y (V )) +v1 +X +(φE)∗ +(φV )∗◦(−)◦(φV )∗ +v1 +Y +. +Let us check that both squares commute. For the first, we have +(φV )∗(v0 +X(φ∗ +V (y); ρ))(j) = +� +i∈φ−1 +V (j) +v0 +X(y ◦ φV ; ρ)(i) = +� +i∈φ−1 +V (j) +ρ(i) y(φV (i)) += +� +� +� +� +i∈φ−1 +V (j) +ρ(i) +� +� +� y(j) = v0 +Y (y; (φV )∗(ρ))(j) +20 + +for all y ∈ RY (V ), ρ ∈ RX(V ), and j ∈ Y (V ). For the second, we have +(φV )∗(v1 +X(φ∗ +V (y); β))(j) = +� +i∈φ−1 +V (j) +v1 +X(y ◦ φV ; β)(i) += +� +i∈φ−1 +V (j) +� +e∈X(tgt)−1(i) +β(e) y(φV (X(src)(e))) y(j) += +� +f∈Y (tgt)−1(j) +� +e∈φ−1 +E (f) +β(e) y(Y (src)(φE(e))) y(j) += +� +f∈Y (tgt)−1(j) +� +� +� +� +e∈φ−1 +E (f) +β(e) +� +� +� y(Y (src)(f))y(j) += v1 +Y (y; (φE)∗(β))(j), +for all y ∈ RY (V ), β ∈ RX(E), and j ∈ Y (V ). When exchanging the order of the summations we +have used the facts that the graph homomorphism φ : X → Y preserves sources and targets, the +latter in its contravariant form +X(E) +X(V ) +Y (E) +Y (V ) +X(tgt) +φE +Y (tgt) +φV +⇝ +P(Y (V )) +P(X(V )) +P(Y (E)) +P(X(E)) +X(tgt)−1 +φ−1 +E +Y (tgt)−1 +φ−1 +V +, +where P(S) denotes the power set of a set S. +Finally, we must verify that the functor LV preserves finite colimits. By Lemma 3.6, that +happens provided both functors LV0, LV1 : FinGraph → FinSet preserve finite colimits. The functor +LV1 = evV is an evaluation functor on a copresheaf category, hence preserves colimits [Rie16, +Proposition 3.3.9]. +Since coproducts commute with colimits, the pointwise coproduct of two +evaluation functors +LV0 = +�FinGraph +⟨evV ,evE⟩ +−−−−−−→ FinSet × FinSet + +−→ FinSet +� +also preserves colimits. This completes the proof. +A quantitative semantics for signed graphs can be defined similarly, subject to a caveat about +the vertex parameters. Our notion of signed graph, designed to capture regulatory networks as +studied in the biochemistry literature, attaches signs only to edges. We are thus led to assume that, +in the Lotka-Volterra dynamical model, all species have baseline rates of decay rather than growth. +This assumption is generally valid for protein regulatory networks, but not for gene regulatory +networks in which mediating proteins are ignored [TN10], nor for predator-prey models in ecology. +More flexible approaches are certainly possible. It would be straightforward to attach signs to +vertices as well as edges and use them in the quantitative semantics. Alternatively, at the expense +of a more cumbersome formalism, one could define dynamical systems with mixed linear-conical +parameterizations, allowing the vertex parameters to be arbitrary reals while the edge parameters +are constrained to be nonnegative.4 For simplicity and uniformity of presentation, we do not describe +these extensions further. +Let FinSgnGraph denote the full subcategory of SgnGraph spanned by finite signed graphs. +4Similar mixed parameterizations are a practical necessity for parametric statistical models, studied in detail in +one author’s PhD thesis [Pat20]. +21 + +Theorem 3.8 (Lotka-Volterra model for finite signed graphs). There is a functor +LV : FinSgnGraph → Para(Dynam+) +that sends a finite signed graph X to the conically parameterized nonnegative dynamical system with +parameter variables P := X(V ) + X(E), state variables S := X(V ), and essentially nonnegative, +algebraic vector field +v(x; ρ, β)(i) := −ρ(i) x(i) + +� +(e:i′→i)∈X +X(sgn)(e) β(e) x(i′) x(i), +x ∈ RX(V ), i ∈ X(V ), +parameterized by ρ ∈ RX(V ) ++ +and β ∈ RX(E) ++ +. Moreover, the functor LV preserves finite colimits. +Proof. Similarly to the previous proof, the functor LV : FinSgnGraph → Para(Dynam+) is defined +by functors LV0, LV1 : FinSgnGraph → FinSet along with a natural transformation +⃗ +LV : F+ ◦ LV0 ⇒ Dynam+ ◦ LV1 : FinSgnGraph → Con, +now having components ⃗ +LVX given by the copairing of +v0 +X := ⃗ +LV +0 +X : RX(V ) ++ +→ Dynam+(X(V )) +and +v1 +X := ⃗ +LV +1 +X : RX(E) ++ +→ Dynam+(X(V )), +where we define +v0 +X(x; ρ)(i) := −ρ(i) x(i) +and +v1 +X(x; β)(i) := +� +e∈X(tgt)−1(i) +X(sgn)(e) β(e) x(X(src)(e)) x(i). +The proof of naturality is essentially the same as before, using the crucial additional fact that +morphisms of signed graphs preserve signs. The proof that the functor LV preserves finite colimits +is unchanged. +To exemplify the theorem, let us see how the Lotka-Volterra dynamics functor acts on a +monomorphism and on an epimorphism of signed graphs. +In order to compare the dynamics of two species A and B involved in a negative feedback loop +versus A and B in isolation, we take the inclusion of signed graphs +A +B +A +B +ι +Labeling the edges in the feedback loop as AB and BA, the morphism LV(ι) sends the conically +parameterized dynamical system +� +vA(x; ρ) = −ρA xA +vB(x; ρ) = −ρB xB +, +ρ ∈ R{A,B} ++ +, +to the parameterized dynamical system +� +vA(x; ρ, β) = −ρA xA − βBA xB xA +vB(x; ρ, β) = −ρB xB + βAB xA xB +, +ρ ∈ R{A,B} ++ +, β ∈ R{AB,BA} ++ +, +by setting the latter’s interaction coefficients to zero: βAB = βBA = 0. +This formalizes the +commonsense fact that the first system is a degenerate case of the second. +22 + +For a more interesting example, we return to the projection map between regulatory networks +given by Equation (2.1) of Section 2.1, inspired by the arginine biosynthesis system. Call this +projection map p, and abbreviate the regulator molecule as R and the enzymes as S := {C, D, E, F, I}. +The morphism LV(p) sends the parameterized dynamical system +� +� +� +� +� +� +� +vR(x; ρ, β) = −ρR xR − βR x2 +R +vC(x; ρ, β) = −ρC xC − βC xR xC +vD(x; ρ, β) = −ρD xD − βD xR xD +vE(x; ρ, β) = −ρE xE − βE xR xE +vF (x; ρ, β) = −ρF xF − βF xR xF +vI(x; ρ, β) = −ρI xI − βI xR xI +with state variables {R} + S and parameters ρ, β ∈ R{R}+S ++ +to the parameterized dynamical system +� +vR(x; ρ, β) = −ρR xR − βR x2 +R +v∗(x; ρ, β) = −ρ∗ x∗ − β∗ xR x∗ +with state variables {R, ∗} and parameters ρ, β ∈ R{R,∗} ++ +, in two different but equivalent ways. The +first way sets the latter system’s coefficients equal to sums of the former’s coefficients, namely +ρ∗ = +� +i∈S +ρi +and +β∗ = +� +i∈S +βi. +The second way substitutes x∗ for each xi, i ∈ S, in the first system and then takes the vector field +v∗ to be the sum of the vi’s, i ∈ S, with these substitutions. The equivalence of these operations +is precisely the condition for LV(p) to be a morphism of parameterized dynamical systems, cf. +Equations (3.1) and (3.2). +3.3 +Composing Lotka-Volterra models +To complete this part of the story, we extend the Lotka-Volterra dynamics functors between +graphs and parameterized dynamical systems, constructed in Theorems 3.7 and 3.8, to double +functors between open graphs and open parameterized dynamical systems. We begin by making +parameterized dynamical systems into open systems. +Proposition 3.9 (Open parameterized dynamical systems). There is a symmetric monoidal double +category of open linearly parameterized dynamical systems, Open(Para(Dynam)), having +• as objects, finite sets A, A′, . . . ; +• as vertical arrows, functions f : A → A′; +• as horizontal arrows, open linearly parameterized dynamical systems, which consist of +a linearly parameterized dynamical system (P, S, v : RP → Dynam(S)) along with a cospan +A0 +ℓ0 +−→ S +ℓ1 +←− A1 whose apex is the set S of state variables; +• as cells, morphisms of such open systems (P, S, v, ℓ0, ℓ1) → (P ′, S′, v′, ℓ′ +0, ℓ′ +1), which +consist of a morphism (q, f) : (P, S, v) → (P ′, S′, v′) between linearly parameterized dynamical +systems along with functions f0 : A0 → A′ +0 and f1 : A1 → A′ +1 making the diagram commute: +A0 +S +A1 +A′ +0 +S′ +A′ +1 +ℓ0 +ℓ1 +f0 +f +ℓ′ +0 +f1 +ℓ′ +1 +. +23 + +Vertical composition is by composition in FinSet and in Para(Dynam). Horizontal composition and +monoidal products are by pushouts and coproducts in Para(Dynam), respectively, interpreting the +finite sets in the feet of the cospans as linearly parameterized dynamical systems with no parameter +variables and identically zero vector fields. +Similarly, there is a symmetric monoidal double category Open(Para(Dynam+)) of open conically +parameterized nonnegative dynamical systems. +Proof. We perform the construction for linearly parameterized dynamical systems. The construction +for conically parameterized nonnegative dynamical systems is perfectly analogous, replacing R with +R+ and vector spaces with conical spaces. +The projection functor πS : Para(Dynam) → FinSet, (P, S, v) �→ S that sends a linearly parame- +terized dynamical systems to its set of state variables has a left adjoint Z : FinSet → Para(Dynam) +that sends a finite set S to the system (∅, S, 0) with empty set of parameter variables. By linearity, its +parameterized vector field 0 ∼= R∅ → Dynam(S) is necessarily the zero vector field. This indeed gives +an adjunction Z ⊣ πS, because to any function f : S → S′ and linearly parameterized dynamical +system (P ′, S′, v′) there corresponds a unique morphism (0P ′, f) : Z(S) → (P ′, S′, v′), where the +required square +0 +Dynam(S) +RP ′ +Dynam(S′) +f∗◦(−)◦f∗ +v′ +commutes trivially, since the zero vector space is initial in VectR. +Since Para(Dynam) has finite colimits (Proposition 3.5), we can construct a symmetric monoidal +double category of Z-structured cospans [BC20, Theorem 3.9]. As we have argued before, it will be +isomorphic to Open(Para(Dynam)). +With this definition, we can construct double functors between open graphs and open param- +eterized dynamical systems, but the vertex parameters under Lotka-Volterra dynamics cause a +twist in the story compared to Baez and Pollard’s compositionality result for mass-action kinetics +[BP17, Theorem 18]. When composing open dynamical systems in the image of the Lotka-Volterra +functor, one takes a coproduct of the parameter variables, i.e., a direct sum of the parameter spaces, +belonging to identified vertices. However, if one composes the open graphs first, then the identified +vertices receive a single copy of the parameters from the Lotka-Volterra functor. Thus this functor +does not preserve composition of open systems, not even up to isomorphism. Nevertheless, there is +a natural (noninvertible) comparison between them: given a pair of parameters in the direct sum, +we can reduce them to a single parameter simply by summing them. In mathematical terms, we get +a lax double functor: a double functor that strictly preserves vertical composition, as usual, but +preserves horizontal composition only up to specified comparison maps.5 +Theorem 3.10 (Open Lotka-Volterra models). There is a symmetric monoidal lax double functor +LV : Open(FinGraph) → Open(Para(Dynam)) +that acts +• on objects and vertical arrows, as the identity; +5The precise definition of a lax double functor can be found in the textbook [Gra19, §3.5], among other sources. +24 + +• on horizontal arrows and cells, by the functor LV : FinGraph → Para(Dynam) on graphs and +graph homomorphisms and as the identity on the associated cospans and cospan morphisms: +� +X, A0 +ℓ0 +−→ X(V ) +ℓ1 +←− A1 +� +�→ +� +LV(X), A0 +ℓ0 +−→ X(V ) +ℓ1 +←− A1 +� +. +The comparison cells are defined using the morphisms of linearly parameterized dynamical systems +αS : Z(S) → LV(Disc S), where +αS := (0S, 1S) : (∅, S, 0) → (S, S, ⃗ +LV(Disc S)), +S ∈ FinSet. +• Given composable open graphs (X, A → X(V ) ← B) and (Y, B → Y (V ) ← C), the comparison +cell for horizontal composition is given by the morphism of systems +LV(X) +Z(B) LV(Y ) +id +αB id +−−−−−−→ LV(X) +LV(Disc B) LV(Y ) +∼ += +−→ LV(X +Disc B Y ). +• Given a finite set A, the comparison cell for the horizontal unit is given by the morphism of +systems αA : Z(A) → LV(Disc A). +Similarly, there is a symmetric monoidal lax double functor +LV : Open(FinSgnGraph) → Open(Para(Dynam+)). +Proof. To construct the lax double functor, we use a lax version of [BC20, Theorem 4.3]. The +family of morphisms αS : Z(S) → LV(Disc S), S ∈ FinSet, in the theorem statement assemble into +a natural transformation +FinSet +FinGraph +FinSet +Para(Dynam) +L=Disc +LV +L′=Z +α +. +The functors involved in this cell all preserve finite colimits: the top and bottom ones because they +are left adjoints and the right one by Theorem 3.7. The hypotheses of [BC20, Theorem 4.3] are +therefore satisfied, except that α is not a natural isomorphism but merely a natural transformation. +By inspection of the proof, the result still holds except that the resulting double functor is lax rather +than pseudo. We obtain a lax double functor +Open(FinGraph) ∼= LCsp(FinGraph) → L′Csp(Para(Dynam)) ∼= Open(Para(Dynam)). +To show that this double functor is the same one in the theorem statement, we once again +use the adjunctions to pass between L-structured and R-decorated cospans (recalling terminology +introduced in the proof of Proposition 2.4). Notice that the natural transformation α has as its +mate [CGR14, §1] the identity transformation ¯α = 1evV : +FinSet +FinGraph +FinSet +Para(Dynam) +R=evV +LV +R′=πS +¯α +. +25 + +Thus the action of the double functor F := LV on L-structured cospans simplifies to the identity +when translated to R-decorated cospans. +L(A0) +X +L(A1) +L′(A0) +F(L(A0)) +F(X) +F(L(A1)) +L′(A1) +↭ +A0 +R(X) +A1 +A0 +R(X) +R′(F(X)) +R(X) +A1 +ℓ0 +ℓ1 +αA0 +F(ℓ0) +F(ℓ1) +αA1 +¯ℓ0 +¯ℓ1 +¯ℓ0 +¯αX +¯αX +¯ℓ1 +A similar statement holds for the action of the double functor on morphisms of L-structured and +R-decorated cospans. +4 +Conclusion +Summary. +Regulatory networks are a minimalistic but widely used tool to describe the interactions +between molecules in biochemical systems. We have made the first functorial study of regulatory +networks, formalized as signed graphs, and their connections with other mathematical models in +biochemistry. Among the latter, we have studied reaction networks, formalized as Petri nets with +signed links, and parameterized dynamical systems, focusing on Lotka-Volterra dynamics. This +project fits into a broader program by applied category theorists and other scientists aiming to +systematize, in a completely precise way, the language and methods of describing, composing, and +transforming scientific models. +The major categories of this paper, and the functors between them, are summarized in the +following diagram, where “LV” is the Lotka-Volterra dynamics functor (§3.2). +SgnCat (§2.2) +SgnGraph (§2.1) +SgnPetri (§2.3) +FinSgnGraph +Para(Dynam+) (§3.1) +Path +U +LV +Net +⊣ +Most of the main results extend from closed systems to open systems, which compose by gluing +along their boundaries. Of the diagram above, we have extended the following parts to double +categories of open systems and double functors between them. +Open(SgnCat) +Open(SgnGraph) +Open(FinSgnGraph) +Open(Para(Dynam+)) (§3.3) +LV +Path +26 + +Future work. +Of many possible directions for future work, we mention a few. As noted in the +introduction, Lotka-Volterra dynamics are only one of numerous dynamics that could be considered +as a canonical model for regulatory networks, and they are not even among the most commonly +studied in the biochemistry literature [TLK19]. It would be desirable to have dynamics functors for +regulatory networks that draw on more flexible or more biologically plausible classes of dynamical +systems. In another direction, the two halves of this paper—qualitative and quantitative—are not as +tightly as integrated as one might hope. How does the presence of a motif in a regulatory network, +such as an incoherent feedforward loop perhaps even of a specific type, manifest in the continuous +dynamics of that network? Put in category-theoretic terms, the Lotka-Volterra dynamics functor is +defined on signed graphs, so how does it relate to the freely generated signed categories in which +motifs are expressed? These intriguing questions are suggestive of “feedback loop analysis” in the +field of system dynamics [Ric95], to which stronger connections should be made. +Acknowledgments. +The authors thank the American Mathematical Society (AMS) for hosting +the 2022 Mathematical Research Community (MRC) on Applied Category Theory, where this +research project began. The AMS MRC was supported by NSF grant 1916439. We thank John Baez, +our group’s mentor at the MRC, for suggesting this project and for much helpful advice along the +way. Authors Fairbanks, Patterson, and Shapiro acknowledge subsequent support from the DARPA +ASKEM and Young Faculty Award programs through grants HR00112220038 and W911NF2110323. +Author Ocal acknowledges subsequent support from an AMS-Simons Travel Grant and from the +Hausdorff Research Institute for Mathematics funded by the German Research Foundation (DFG) +under Germany’s Excellence Strategy - EXC-2047/1 - 390685813. +References +[Alo07] +Uri Alon. “Network motifs: theory and experimental approaches”. Nature Reviews +Genetics 8.6 (2007), pp. 450–461. doi: 10.1038/nrg2102. +[Alo19] +Uri Alon. An introduction to systems biology: design principles of biological circuits. +2nd ed. CRC Press, 2019. doi: 10.1201/9780429283321. +[Bae+21] +John C. Baez, Fabrizio Genovese, Jade Master, and Michael Shulman. “Categories of +nets”. 2021 Symposium on Logic in Computer Science (LICS). 2021, pp. 1–13. doi: +10.1109/LICS52264.2021.9470566. arXiv: 2101.04238. +[Bae+22] +John Baez, Xiaoyan Li, Sophie Libkind, Nathaniel Osgood, and Evan Patterson. “Com- +positional modeling with stock and flow diagrams”. Proceedings of the 2022 Applied +Category Theory Conference. 2022. arXiv: 2205.08373. In press. +[BC20] +John C. Baez and Kenny Courser. “Structured cospans”. Theory and Applications of +Category Theory 35.48 (2020), pp. 1771–1822. arXiv: 1911.04630. url: http://www. +tac.mta.ca/tac/volumes/35/48/35-48abs.html. +[BFM19] +John C. Baez, John Foley, and Joe Moeller. “Network models from Petri nets with +catalysts”. Compositionality 1.4 (2019). doi: 10.32408/compositionality-1-4. arXiv: +1904.03550. +[BP17] +John C. Baez and Blake S. Pollard. “A compositional framework for reaction net- +works”. Reviews in Mathematical Physics 29.9 (2017), p. 1750028. doi: 10.1142/ +S0129055X17500283. +[Car71] +Henri Cartan. Differential calculus. Kershaw Publishing Company, 1971. +27 + +[CGR14] +Eugenia Cheng, Nick Gurski, and Emily Riehl. “Cyclic multicategories, multivariable +adjunctions and mates”. Journal of K-Theory 13.2 (2014), pp. 337–396. doi: 10.1017/ +is013012007jkt250. arXiv: 1208.4520. +[CP09] +Stephen T. Crews and Joseph C. Pearson. “Transcriptional autoregulation in develop- +ment”. Current Biology 19.6 (2009), R241–R246. doi: 10.1016/j.cub.2009.01.015. +[Csi+09] +Attila Csikász-Nagy, Orsolya Kapuy, Attila Tóth, Csaba Pál, Lars J. Jensen, Frank +Uhlmann, John J. Tyson, and Béla Novák. “Cell cycle regulation by feed-forward +loops coupling transcription and phosphorylation”. Molecular Systems Biology 5 (2009), +pp. 236–241. doi: 10.1038/msb.2008.73. +[For61] +Jay W. Forrester. Industrial dynamics. MIT Press, 1961. +[FS07] +José Luiz Fiadeiro and Vincent Schmitt. “Structured co-spans: an algebra of interaction +protocols”. International Conference on Algebra and Coalgebra in Computer Science +(CALCO 2007). 2007, pp. 194–208. doi: 10.1007/978-3-540-73859-6_14. +[Gra19] +Marco Grandis. Higher dimensional categories: From double to multiple categories. World +Scientific, 2019. doi: 10.1142/11406. +[HCH10] +Wassim M. Haddad, VijaySekhar Chellaboina, and Qing Hui. Nonnegative and compart- +mental dynamical systems. Princeton University Press, 2010. +[Koc22] +Joachim Kock. “Whole-grain Petri nets and processes”. Journal of the ACM (2022). doi: +10.1145/3559103. arXiv: 2005.05108. In press. +[Lot25] +Alfred J. Lotka. Elements of physical biology. Williams & Wilkins, 1925. url: https: +//archive.org/details/elementsofphysic017171mbp. +[MM94] +Saunders Mac Lane and Ieke Moerdijk. Sheaves in geometry and logic: A first introduction +to topos theory. Springer, 1994. doi: 10.1007/978-1-4612-0927-0. +[Pat20] +Evan Patterson. “The algebra and machine representation of statistical models”. PhD +thesis. Stanford University, 2020. arXiv: 2006.08945. +[RB88] +David E. Rydeheard and Rod M. Burstall. Computational category theory. Prentice Hall, +1988. url: https://www.cs.man.ac.uk/~david/categories/. +[Ric95] +George P. Richardson. “Loop polarity, loop dominance, and the concept of dominant po- +larity”. System Dynamics Review 11.1 (1995), pp. 67–88. doi: 10.1002/sdr.4260110106. +[Rie16] +Emily Riehl. Category theory in context. Courier Dover Publications, 2016. url: http: +//www.math.jhu.edu/~eriehl/context.pdf. +[SMH18] +Gabor Szederkényi, Attila Magyar, and Katalin M. Hangos. Analysis and control of +polynomial dynamic models with biological applications. Academic Press, 2018. doi: +10.1016/C2015-0-06035-X. +[Spi21] +David I. Spivak. “Functorial aggregation” (2021). arXiv: 2111.10968. +[SRS14] +S. Stanhope, Jonathan E. Rubin, and David Swigon. “Identifiability of linear and linear- +in-parameters dynamical systems from a single trajectory”. SIAM Journal on Applied +Dynamical Systems 13.4 (2014), pp. 1792–1815. doi: 10.1137/130937913. +[Ste00] +John D. Sterman. Business dynamics: systems thinking and modeling for a complex +world. McGraw-Hill, 2000. +[Str00] +Ross Street. “The petit topos of globular sets”. Journal of Pure and Applied Algebra +154.1-3 (2000), pp. 299–315. doi: 10.1016/S0022-4049(99)00183-8. +28 + +[TLK19] +John J. Tyson, Teeraphan Laomettachit, and Pavel Kraikivski. “Modeling the dynamic +behavior of biochemical regulatory networks”. Journal of Theoretical Biology 462 (2019), +pp. 514–527. doi: 10.1016/j.jtbi.2018.11.034. +[TN10] +John J. Tyson and Béla Novák. “Functional motifs in biochemical reaction networks”. +Annual Review of Physical Chemistry 61 (2010), pp. 219–240. doi: 10.1146/annurev. +physchem.012809.103457. +[Voi00] +Eberhard O. Voit. Computational analysis of biochemical systems: A practical guide for +biochemists and molecular biologists. Cambridge University Press, 2000. +[Voi13] +Eberhard O. Voit. “Biochemical systems theory: a review”. International Scholarly +Research Notices 2013 (2013). doi: 10.1155/2013/897658. +29 + diff --git a/19AzT4oBgHgl3EQfe_xt/content/tmp_files/load_file.txt b/19AzT4oBgHgl3EQfe_xt/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..da1b9eed1b8938236ed1755f53de6da67e92fc6c --- /dev/null +++ b/19AzT4oBgHgl3EQfe_xt/content/tmp_files/load_file.txt @@ -0,0 +1,893 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf,len=892 +page_content='A compositional account of motifs, mechanisms, and dynamics in biochemical regulatory networks Rebekah Aduddell James Fairbanks Amit Kumar Pablo S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Ocal Evan Patterson Brandon T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Shapiro Abstract Regulatory networks depict promoting or inhibiting interactions between molecules in a biochemical system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We introduce a category-theoretic formalism for regulatory networks, using signed graphs to model the networks and signed functors to describe occurrences of one network in another, especially occurrences of network motifs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' With this foundation, we establish functorial mappings between regulatory networks and other mathematical models in biochemistry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We construct a functor from reaction networks, modeled as Petri nets with signed links, to regulatory networks, enabling us to precisely define when a reaction network could be a physical mechanism underlying a regulatory network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Turning to quantitative models, we associate a regulatory network with a Lotka-Volterra system of differential equations, defining a functor from the category of signed graphs to a category of parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We extend this result from closed to open systems, demonstrating that Lotka-Volterra dynamics respects not only inclusions and collapsings of regulatory networks, but also the process of building up complex regulatory networks by gluing together simpler pieces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Formally, we use the theory of structured cospans to produce a lax double functor from the double category of open signed graphs to that of open parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Throughout the paper, we ground the categorical formalism in examples inspired by systems biology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 1 Introduction The genes, proteins, and RNA molecules that comprise living cells interact in complex, varied ways to sustain the cell throughout its lifecycle and respond to changes in its environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Intensive experimental study of these interactions is distilled in an idealized form as regulatory networks, a kind of directed graph in which vertices represent molecules and edges represent interactions between molecules (Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The edges are labeled with a positive or negative sign according to whether the interaction is activating or inhibiting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Regulatory networks are the subject of a large body of experimental and theoretical work, notably reviewed by Alon [Alo07;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Alo19] and Tyson et al [TN10;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' TLK19] among others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Particular attention has been paid to network motifs [Alo07;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' TN10], the simple but functionally meaningful patterns that recur frequently in regulatory networks, and to various quantitative dynamics [TLK19] that can be assigned to the networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Although regulatory networks are simple enough to define mathematically—we shall define them to be directed graphs, possibly with multiple edges and loops, whose edges are assigned a positive or negative sign—important scientific concepts involving them, such as occurrences of motifs in networks and biochemical mechanisms generating networks, are often treated imprecisely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Likewise for relationships between regulatory networks and other mathematical models in biochemistry, particularly dynamical models based on ordinary or stochastic differential equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Hence a first aim of this paper is to put certain concepts and relations concerning regulatory networks on a firm mathematical footing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To do so, we will use methods from category theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='01445v1 [q-bio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='MN] 4 Jan 2023 Ash1 Cdk1/ClbS Sld2 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1: A small biochemical regulatory network: regulation of Sld2 by Cdk1 or ClbS with Ash1 as a predicted transcription factor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Adapted from Csikász-Nagy et al [Csi+09, Figure 3C].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Category theory, in both the small and the large, is a natural tool for this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In saying that a motif occurs in a network, one should allow for the possibility that the occurrence is indirect, involving a sequence of appropriately signed interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For example, positive autoregulation can occur directly but also indirectly through a double-negative feedback loop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Since a small category is exactly a graph in which consecutive edges can be composed, subject to certain laws, regulatory networks should be viewed not only as signed graphs (Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) but also as signed categories freely generated by those (Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Sign-preserving functors, unlike sign-preserving graph homomorphisms, can express indirect occurrences and are in this sense a better notion of morphism for regulatory networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Here we are doing category theory in the small, using categories as algebraic structures comparable to familiar ones like graphs, groups, and monoids.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Having laid these foundations for regulatory networks, we turn to category theory in the large, a mathematical theory of structure well suited to describe the passages between regulatory networks and other mathematical models of biochemical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Formally speaking, these passages are functors into or out of the category of regulatory networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Making a functor is significantly stronger than making an objects-only mapping, as is typically done in the literature, since if morphisms of signed graphs formalize relationships between different regulatory networks, then functorality requires that these relationships be transported to or from other models of interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By contrast, an objects-only mapping is, abstractly speaking, entirely unconstrained and so is capable of acting highly irregularly across different models of a given class.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Functorality thus serves as a kind of safeguard for model transformation: it does not, on its own, ensure that a transformation makes good scientific sense but it does impose nontrivial logical constraints and coherences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A first illustration of this principle is the connection between regulatory networks and biochemical reaction networks (Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' When modeling the complex biochemical systems that constitute a living cell, it is often practically necessary to abstract away certain details of the underlying chemical processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Regulatory networks generally do not capture all the species or reactions involved in a given system;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' nor can they capture multispecies reactions faithfully because they describe only pairwise interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Given that regulatory networks are, to some degree, phenomenological models, it is natural to ask whether a given network could arise as a summary of a specific chemical process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The latter are described by biochemical reaction networks, graph-like structures allowing reactions or transitions with multiple inputs and outputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Inspired by graphical syntax from systems biology [Voi00;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Voi13], we formalize reaction networks as “Petri nets with links,” and we construct a functor from the category of Petri nets with signed links to the category of signed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This functor enables us to propose a formal definition for when a reaction network could be a mechanism for a regulatory network, a concept that is rarely if ever treated in a precise way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This concludes the content of Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In Section 3, we turn from qualitative to quantitative analysis, seeking a functorial assignment of continuous dynamics to regulatory networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Although rarely made explicitly functorial, systematic ways to formulate a model belonging to a mathematically homogeneous class of models are ubiquitous in science.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Voit calls these “canonical representations” 2 or “canonical models,”1 and identifies Lotka-Volterra models and BST models/S-systems as two prominent examples in biology [Voi13, §3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Reflecting their phenomenological status, regulatory networks do not admit a single, obvious dynamical interpretation, and so a wide variety of dynamical models have been considered, spanning the discrete and continuous, deterministic and stochastic [TLK19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We consider the Lotka-Volterra systems of ordinary differential equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' While not necessarily the most biologically plausible, it is among the simplest continuous models and hence a natural place to begin a functorial study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A Lotka-Volterra system of equations has the form ˙xi = ρi xi + n � j=1 βi,j xi xj, i = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' , n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' or equivalently, has logarithmic derivatives that are affine functions of the state variables: d dt[log xi(t)] = ρi + n � j=1 βi,j xj(t), i = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' , n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The coefficients ρi specify baseline rates of growth or decay, according to their sign, and the coefficients βi,j rates of activation or inhibition, according to their sign.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We construct a functor that sends a signed graph (regulatory network) to a Lotka-Volterra model suitably constraining the signs of the rate coefficients (Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' As a prerequisite, we define a category of parameterized dynamical systems (Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1), a construction of intrinsic interest that is by no means confined to Lotka-Volterra dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In order to comprehend complex biological systems, we must decompose them into small, readily understandable pieces and then compose them back together to reproduce the behavior of the original system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This is the mantra of systems biology, which stresses that compositionality is no less important than reductionism in biology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' With this motivation, a secondary aim of this paper is to extend the above constructions from closed systems to open ones, which can be composed together by gluing them along their interfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Mathematically, we pass from categories to double categories [Gra19], two-dimensional categorical structures in which the usual morphisms of systems compose along one direction (by convention, the “vertical” one) and open systems compose along the other direction (the “horizontal” one).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Among other results, we show that the Lotka-Volterra dynamics functor extends to a lax double functor from the double category of open signed graphs to a double category of open parameterized dynamical systems (Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The mathematics developed here is motivated by biochemistry but need not be restricted to it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Famously, Lotka-Volterra systems originated in ecology to model predator-prey dynamics [Lot25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Regulatory networks and Lotka-Volterra systems can be used as generic models of entities that “regulate” each other in some manner, be it at the scale of individual cells or animal ecosystems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Regulatory networks are highly reminiscent of the causal loop diagrams in system dynamics [Ste00, Chapter 5], where the latter explicitly label feedback loops and their polarities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The language of category theory is indispensable to this work but the level of knowledge assumed by the reader is not constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We assume throughout that the reader is familiar with the basic notions of category theory, such as categories, functors, and natural transformations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Our main reference for facts about category theory is Riehl’s text [Rie16], although there are many others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In the definitions and theorems, we have tried to minimize the technical level and explicate the statements in concrete terms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In the proofs, we have aimed for efficiency and freely use concepts 1This usage of “canonical” should not be confused with the unrelated, in fact incompatible, meaning of “canonical” in pure mathematics, especially category theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 3 and results from the literature that do not appear in the main text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The reader can omit the proofs without disrupting the continuity of the paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2 Qualitative analysis: motifs and mechanisms 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1 Regulatory networks as signed graphs To begin, we clarify the notion of graph to be used throughout in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The following definition is standard among category theorists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In other fields, it might be called a “directed multigraph,” but we will call it simply a “graph.” Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1 (Graphs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The schema for graphs is the category Sch(Graph) freely generated by two parallel morphisms: V E src tgt .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A graph is a functor X : Sch(Graph) → Set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A graph homomorphism from a graph X to another graph Y is a natural transformation φ : X → Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Graphs and graph homomorphisms form the category Graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To restate the definition in explicit terms, a graph X consists of a set X(V ) of vertices;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' a set X(E) of edges;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' and functions X(src), X(tgt) : X(E) → X(V ), assigning to each edge its source and target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A graph homomorphism φ : X → Y consists of a function φV : X(V ) → Y (V ), the vertex map, and another function φE : X(E) → Y (E), the edge map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' These maps must preserve sources and targets, meaning that the following squares commute: X(E) X(V ) Y (E) Y (V ) X(src) φE Y (src) φV X(E) X(V ) Y (E) Y (V ) X(tgt) φE Y (tgt) φV .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We now turn to the main notion of this section, signed graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Write Sgn for the set of (nonzero) signs, whose two elements may be denoted {1, −1} or {+, −}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The set of signs is an abelian group, isomorphic to the cyclic group Z2, under the usual multiplication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 (Signed graphs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of signed graphs is the slice category SgnGraph := Graph/Sgn, where, by abuse of notation, Sgn is regarded as a graph with one vertex and two loops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Unpacking the definition, a signed graph is seen to be a graph X equipped with a function X(sgn) : X(E) → Sgn that assigns a sign to each edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Given signed graphs X and Y , a morphism of signed graphs from X to Y is a graph homomorphism φ that preserves signs, meaning that the following triangle commutes: X(E) Y (E) Sgn X(sgn) Y (sgn) φE .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 4 Signed graphs are a mathematical description of the regulatory networks studied in systems biology [Alo07;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' TN10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For the purposes of this paper, we will simply define a regulatory network to be a signed graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The vertices of the graph represent the components of the network, which could be proteins, genes, or RNA molecules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Signed edges represent interactions between components, where the source has the effect of either activating/promoting the target (positive sign) or inhibiting/repressing it (negative sign).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' As is customary, we denote activation interactions by arrows with pointed heads (−→) and inhibition interactions by arrows with flat heads (−−⊣).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For instance, the two drawings x y + − ↭ x y represent the same network, a negative feedback loop in which x activates y, which in turn inhibits x [TN10, Scheme 1, Motif B].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In the literature [TN10], regulatory networks are often modeled as sign-valued matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This approach is a special case of ours in that an n-by-n matrix valued in {+1, −1, 0} can be interpreted as a simple signed graph on n vertices, with signed edges defined by the nonzero matrix elements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Unlike the matricial formalism, our formalism allows multiple edges between the same pair of edges, which can model multiple interactions based on different mechanisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Allowing multiple edges and self-loops also ensures that graphs and signed graphs form well behaved categories, as the following proposition shows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of signed graphs is complete (has all limits) and cocomplete (has all colimits).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Because Graph is a copresheaf category, it is complete and cocomplete [Rie16, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The slice category SgnGraph = Graph/Sgn is hence also complete and cocomplete [Rie16, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' alternatively, this follows because slices of copresheaf categories are again (equivalent to) copresheaf categories [Str00, Remark p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 303].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Colimits of signed graphs can be used to construct a category, or rather a double category, of open signed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Composition of open signed graphs formalizes the process of building large regulatory networks from smaller pieces, including network motifs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4 (Open signed graphs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a symmetric monoidal double category of open signed graphs, Open(SgnGraph), having as objects, sets A, B, C, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as vertical arrows, functions f : A → B;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as horizontal arrows, open signed graphs, which consist of a signed graph X together with a cospan of sets A0 ℓ0 −→ X(V ) ℓ1 ←− A1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as cells, morphisms of open signed graphs (X, ℓ0, ℓ1) → (Y, m0, m1), which consist of a map of signed graphs φ : X → Y along with functions fi : Ai → Bi, i = 0, 1, making the following diagram commute: A0 X(V ) A1 B0 Y (V ) B1 ℓ0 f0 ℓ1 φV m0 f1 m1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 5 Vertical composition is by composition in Set and in SgnGraph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Horizontal composition and monoidal products are by pushouts and coproducts in SgnGraph, respectively, viewing the sets in the feet of the cospans as discrete signed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To construct this symmetric monoidal double category, we use the method of structured cospans [FS07] in its double-categorical form [BC20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The categories of sets and of signed graphs are related by an adjoint pair of functors Set SgnGraph Disc evV ⊣ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Here evV : SgnGraph → Set is the evaluation at V functor, sending a signed graph X to its set of vertices X(V ) and a morphism of signed graphs φ to its vertex map φV , and Disc : Set → SgnGraph is the discrete signed graph functor, sending a set A to the signed graph with vertex set A and no edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We obtain a symmetric monoidal double category of open signed graphs as the L-structured cospans for the functor L := Disc : Set → SgnGraph [BC20, Theorems 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3 and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To show that this symmetric monoidal double category is the same one in the proposition statement, suppose that L ⊣ R : A → X is an adjoint pair of functors, where in our application L = Disc and R = evV .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By the defining bijection of an adjunction, L-structured cospans, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=', objects A0 and A1 in A together with a cospan L(A0) → X ← L(A1) in X, correspond exactly to “R-decorated cospans,” i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=', an object X in X together with a cospan A0 → R(X) ← A1 in A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Furthermore, by the naturality of this bijection [Rie16, Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3], morphisms of L-structured and R-decorated cospans L(A0) X L(A1) L(B0) Y L(B1) L(f0) φ L(f1) ↭ A0 R(X) A1 B0 R(Y ) B1 f0 R(φ) f1 related by the adjunction are equivalent in that one diagram commutes if and only if the other does.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We will tacitly reuse this reasoning in future constructions, such as Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='8 below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A morphism of signed graphs can do two things.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Most obviously, it can pick out a signed graph as a subobject of another one, via a sign-preserving subgraph embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A signed graph morphism can also collapse multiple vertices onto a single vertex, and multiple edges onto a single edge with the same sign, in the fairly restrictive sense permitted by a graph homomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To illustrate, consider the following morphism inspired by Alon’s review [Alo07, Figure 5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' argR argCBH argD argE argF argI −→ argR arg∗ (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) The network in the domain is a “single-input module” in the arginine biosynthesis system, in which the regulator argR represses five different enzymes (argCHB, argD, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=') involved in producing arginine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The morphism above forgets the distinction between these enzymes, collapsing them into a catch-all entity labeled “arg∗”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' These two functions—embedding and collapsing—are all that a signed graph morphism can do, because any such morphism factors essentially uniquely as 6 an epimorphism (morphism with surjective vertex and edge maps) followed by a monomorphism (morphism with injective vertex and edge maps), using the epi-mono factorization available in any copresheaf category, or more generally in any topos [MM94, §IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 Refining regulatory networks using signed categories and functors While morphisms of signed graph have their uses, they do not capture the important idea of refining regulatory networks, in which an interaction in one network is realized as a composite of several interactions in another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To express refinement, we must generalize our notion of morphism from graph homomorphisms to functors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This, in turn, requires the concept of a signed category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5 (Signed categories).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of signed categories is the slice category SgnCat := Cat/Sgn, where Cat is the category of small categories and the group of signs, Sgn, is regarded as a category with one object and two morphisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Unpacking the definition, a signed category is a category C in which every morphism f is assigned a sign sgn(f) ∈ {1, −1} in a functorial way, meaning that sgn(x0 f1 −→ x1 f2 −→ · · · fn −→ xn) = n � i=1 sgn(fi) for every n ≥ 0 and every sequence of composable morphisms f1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' , fn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In particular (n = 0), the identity morphisms have positive sign.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A morphism of signed categories, or signed functor, is a functor F : C → D between signed categories that preserves the signs, meaning that sgnD(F(f)) = sgnC(f) for every morphism f in C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Since our aim is to have a more flexible notion of morphism between signed graphs, we will mostly restrict ourselves to those signed categories that are freely generated by a signed graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The free signed category or signed path category functor Path : SgnGraph → SgnCat sends a signed graph X to the signed category Path(X) having as objects, the vertices of X;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as morphisms from x to y, the paths in X from x to y, whose sign is defined to be the product of the signs of the edges comprising the path.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Composition of paths is by concatenation, which clearly preserves the sign.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The identity morphism at x is the empty path at x, which has positive sign.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By convention, if X and Y are signed graphs, we say that a signed functor from X to Y is a signed functor F : Path(X) → Path(Y ) between the corresponding signed path categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Since the morphisms of Path(X) are freely generated by the edges in X, a signed functor from X to Y is uniquely determined by a morphism of signed graphs from X to the underlying signed graph of Path(Y ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This means that each edge in X is sent to an appropriately signed path of edges in Y , which can be regarded as a refinement of the relationship that the edge represents.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 7 Motif Generic instance Positive autoregulation L+ := � � Negative autoregulation L− := � � Coherent feedforward loop I++ := � � Incoherent feedforward loop I± := � � Positive feedback loop L++ := � � Negative feedback loop L± := � � Double-negative feedback loop L−− := �• � Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1: Common motifs in biochemical regulation networks [Alo07;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' TN10] We now have a precise language with which to classify network motifs and their occurrences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' As a first example, Alon identifies four types of incoherent feedforward loop (FFL) involving three components, x x x x y y y y z z z z , those of type 1, 2, 3, and 4, respectively [Alo07, Figure 2a].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Besides having three components, what these motifs have in common is that there exists a signed functor into each of them from the signed graph I± := � � having two parallel arrows of opposite sign.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The network I± is thus the “generic” incoherent feedforward loop, in the sense that signed functors out of it refine the pattern in specific ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A similar situation holds for other common network motifs (Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1), which motivates the following definition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6 (Motif instance).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Given a signed graph A, regarded as a motif, an instance or occurrence of the motif A in a network X is a monic signed functor A ↣ X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Note that a signed functor is a monomorphism exactly when the functor is an embedding of categories, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=', an injective-on-objects, faithful functor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Requiring the functor in the definition to be monic excludes “degenerate instances” of motifs where vertices or edges are identified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Now, should the incoherent FFL be regarded as a network motif, or is it the more specific types, such as the incoherent FFL of type 1, that are motifs?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' From our point of view, they are all equally motifs but they have different degrees of specificity, and the functorial language clarifies how motifs are iteratively refined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Specifically, an instance of an incoherent FFL of type 1 in a network X also gives an instance of an incoherent FFL in X (of unspecified type), simply by composing the monomorphisms involved: I± ∼= � x z � ↣ � x y z � ↣ X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 8 Similarly, in the notation of Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1, any instance of double-negative feedback (L−−) also gives an instance of positive autoregulation (L+) [CP09], via the monomorphism L+ ↣ L−− that sends the positive loop to the double-negative 2-cycle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For any choice of motif A, the mapping that sends a regulatory network X to the set of occurrences of A in X is a functor HomSgnCatm(Path(A), Path(−)) : SgnGraphm → Set, where SgnGraphm and SgnCatm denote the wide subcategories of monomorphisms in SgnGraph and SgnCat, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This functor is almost, but not quite, representable, due to the distinction between signed graphs and signed categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' More importantly, the existence of this functor means that a monomorphism between regulatory networks induces a map between instances of A, for any motif A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We now extend the construction of open signed graphs to open signed categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of signed categories is complete and cocomplete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Because the category Cat is complete and cocomplete [Rie16, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6], its slice SgnCat = Cat/Sgn is also [Rie16, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='8 (Open signed categories).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a symmetric monoidal double category of open signed categories, Open(SgnCat), having as objects, sets A, B, C, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as vertical arrows, functions f : A → B;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as horizontal arrows, open signed categories, which consist of a signed category C together with a cospan of sets A0 ℓ0 −→ Ob(C) ℓ1 ←− A1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as cells, morphisms of open signed categories (C, ℓ0, ℓ1) → (D, m0, m1), which consist of a signed functor F : C → D along with functions fi : Ai → Bi, i = 0, 1, making the diagram commute: A0 Ob(C) A1 B0 Ob(D) B1 ℓ0 f0 ℓ1 Ob(F) m0 f1 m1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Vertical composition is by composition in Set and in SgnCat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Horizontal composition and monoidal products are by pushouts and coproducts in SgnCat, respectively, viewing the sets in the feet of cospans as discrete signed categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Moreover, the signed path category functor extends to a symmetric monoidal double functor Path : Open(SgnGraph) → Open(SgnCat).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We take Open(SgnCat) to be the symmetric monoidal double category of L′-structured cospans for the functor L′ := Disc : Set → SgnCat involved the composite adjunction Set SgnCat = Set SgnGraph SgnCat Disc Ob Disc evV U Path ⊣ ⊣ ⊣ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' On the right hand side, the first adjunction was already used in the proof of Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4, and the second adjunction is the free-forgetful adjunction between signed graphs and signed categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 9 To prove the last statement, we notice that all functors involved in the commutative square Set SgnGraph Set SgnCat L=Disc L′=Disc Path are left adjoints, hence preserve colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We can therefore appeal to [BC20, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3] to obtain a symmetric monoidal double functor Open(SgnGraph) ∼= LCsp(SgnGraph) → L′Csp(SgnCat) ∼= Open(SgnCat).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3 Mechanistic models as Petri nets with links However challenging they may be to identify through experiments and data analysis, regulatory networks still only summarize how the components of a complex biochemical system interact.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Regulatory networks typically include only a subset of the system’s components, and they do not model individual reactions and processes, only pairwise promoting or inhibiting interactions between components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In this sense, regulatory networks are not fully mechanistic models, even if they have a stronger causal interpretation than, say, a correlation matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By contrast, mechanistic models in biochemistry model individual reactions, which requires a different formalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Pictures like the following, adapted from Voit’s review [Voi13, Figure 4], are common in systems biology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A B D C − (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2) This diagram possesses two distinctive features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' First, directed hyperedges represent reactions having a number of inputs or outputs different than one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There are, for example, hyperedges from B and C to D, from nothing to A (an inflow), and from D to nothing (an outflow).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' If, in lieu of hyperedges, we introduce a second type of vertex, we obtain a structure similar to a Petri net A B C D − (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3) but with the second distinctive feature of having signed links from the first type of vertices (species) to the second type (transitions), whose signs indicate promotion or inhibition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In this section, we explain how a Petri net with signed links can provide a mechanism for a regulatory network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This involves constructing a functor from Petri nets with signed links to signed graphs, approximating the former as the latter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' As a prerequisite, we need a rigorous definition of a Petri net with links, which seems to be absent from the literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 10 Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9 (Petri net with links).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The schema for Petri nets with links is the category Sch(LPetri) freely generated by these objects and morphisms: I S O T L srcL tgtL srcI tgtI tgtO srcO .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A Petri nets with links is a functor P : Sch(LPetri) → Set, and a morphism of these is a natural transformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A morphism φ : P → Q preserves arities if the naturality squares associated with the morphisms I → T and O → T are also pullback squares: P(I) P(T) Q(I) Q(T) P(tgtI) φI φT P(tgtI) ⌟ P(O) P(T) Q(O) Q(T) P(srcO) φO φT P(srcO) ⌟ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Petri nets with links and their morphisms form the category LPetri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To explicate the definition, a Petri net with links P consists of a set P(S) of species;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' a set P(T) of transitions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' a set P(I) of input arcs going from species to transitions, via maps P(srcI) : P(I) → P(S) and P(tgtI) : P(I) → P(T);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' a set P(O) of output arcs going from transitions to species, via maps P(srcO) : P(O) → P(T) and P(tgtO) : P(O) → P(S);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' and finally a set P(L) of links going from species to transitions, via maps P(srcL) : P(L) → P(S) and P(tgtL) : P(L) → P(T).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The property of preserving arities, called “etale” by Kock [Koc22, §3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4], means that a morphism φ : P → Q of Petri nets with links preserves the input and output arities of all transitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Namely, for each transition t in the net P the map φI : P(I) → Q(I) restricts to a bijection between the input arcs to t and to φT (t), and similarly the map φO : P(O) → Q(O) restricts to a bijection between the output arcs from t and from φT (t).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This property seems appropriate for many purposes, including in biochemistry, but for mathematical convenience we will not always assume it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='10 (Related literature).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Our definition of a Petri net with links, while apparently novel, is the obvious joint generalization of two existing concepts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Kock has described Petri nets as copresheaves on a category with objects S, T, I, O [Koc22], calling them whole-grain Petri nets to distinguish them from classical Petri nets, whose semantics are subtly different [Bae+21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Meanwhile, the concept of a link is essential to stock and flow diagrams, originating in the field of system dynamics [For61;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Ste00] and recently given a rigorous categorical account [Bae+22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We also note that the Petri nets with catalysts proposed by Baez, Foley, and Moeller [BFM19] differ significantly from Petri nets with links: the former fix a subset of the species to be catalysts throughout the net, whereas the latter uses links to make catalyzation specific to individual reactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 11 Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='11 (Petri nets as typed graphs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Like bare Petri nets, Petri nets with links can be described as graphs with two types of vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To see this, take the graph TLPetri := � � � � � � � S T I L O � � � � � � � with vertices S and T and edges I, O, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of Petri nets with links and natural transformations is isomorphic to the slice category Graph/TLPetri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Moreover, the schema category Sch(LPetri) is isomorphic to the category of elements of the functor TLPetri : Sch(Graph) → Set, exemplifying a general fact about slices of copresheaf categories [Str00, Remark p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 303].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Petri nets with signed links are defined analogously to signed graphs (Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='12 (Petri nets with signed links).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of Petri nets with signed links is the slice category SgnPetri := LPetri/PSgn, where PSgn is the Petri net with links having one species, one transition, one input arc, one output arc, and two links, namely the elements of Sgn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Incidentally, the morphism P → PSgn defining a Petri net with signed links does not preserve arities unless every transition in P has exactly one input and one output.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We now turn to the main construction of this section, a functor that “approximates” a Petri net with signed links as a signed graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' On the example in Equations (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2) and (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3), this functor gives the signed graph A B D C .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4) In general, the resulting signed graph has, as vertices, the Petri net’s species and has signed edges for each of the four cases: (a) for every input-output pair to a transition, a positive edge from input to output;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (b) for every input to a transition, a negative self loop, representing consumption by the reaction;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (c) for every signed link, an edge of opposite sign going from the linked species to each input to the linked transition;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (d) for every signed link, an edge of equal sign going from the linked species to each output from the linked transition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' All four cases are visible in the example of Equation (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Set-theoretically, each of these cases is the result of a conjunctive query, or equivalently of a representable functor HomLPetri(P, −) : LPetri → Set associated with a particular Petri net with links P, the generic instance for that query.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The four generic instances we need are shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Their sum is a disjoint union of conjunctive queries, or duc-query for short.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 12 (a) Input-output pair to tran- sition (b) Input to transition (c) Input to transition with incident link (d) Output from transition with incident link Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1: Four different Petri nets with links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For each of these instances P, evaluating the representable functor HomLPetri(P, −) : LPetri → Set gives the edges for one case in the case analysis that defines the functor from Petri nets with signed links to signed graphs (Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To make the construction just sketched on objects fully precise and functorial, we use Spivak’s theory of functorial data migration based on duc-queries [Spi21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In order to apply it, we fully schematize the definitions of signed graphs and Petri nets with signed links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The schema for signed graphs is the category Sch(SgnGraph) freely generated by these objects and morphisms: V E A neg src tgt sgn .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A signed graph as in Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 is equivalent to a functor X : Sch(SgnGraph) → Set such that X(A) = Sgn, the set of signs, and X(neg) : Sgn → Sgn is negation (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=', multiplication by −1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Note that negation is not needed to define the data of a signed graph but is relevant to the data migration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A morphism of signed graphs X → Y is a natural transformation φ : X → Y whose component at A is the identity function, φA = 1Sgn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We thus obtain a category isomorphic to SgnGraph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Similarly, the schema for Petri nets with signed links is the category Sch(SgnPetri) freely generated by: S I O L A T neg srcL tgtL srcI tgtI tgtO srcO sgn one .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A Petri net with signed links, as in Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='12, is equivalent to a functor P : Sch(SgnPetri) → Set such that P(A) = Sgn, the map P(neg) : Sgn → Sgn is negation, and P(one) : P(T) → Sgn is the constant map at +1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Again, these maps are needed for data migration, not for the data itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A morphism of Petri nets with signed links is a natural transformation φ : P → Q such φA = 1Sgn, yielding a category isomorphic to SgnPetri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='13 (Regulatory net induced by Petri net).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A functor Net : SgnPetri → SgnGraph 13 is specified by the following functor from Sch(SgnGraph) to the category of duc-queries on Sch(SgnPetri): Sch(SgnGraph) → ⨿ �� SetSch(SgnPetri)�op� V �→ S E �→ I ×T O + I + I ×T L + O ×T L A �→ A src �→ [srcI ◦πI, srcI, srcL ◦πL, srcL ◦πL] tgt �→ [tgtO ◦πO, srcI, srcI ◦πI, tgtO ◦πO] sgn �→ [one ◦πT , neg ◦ one ◦ tgtI, neg ◦ sgn ◦πL, sgn ◦πL] neg �→ neg .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We will define the functor Net : SgnPetri → SgnGraph as the restriction of a functor SetD → SetC between the categories of copresheaves on D := Sch(SgnPetri) and C := Sch(SgnGraph).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In fact, the functor SetD → SetC will be of the special kind known as a parametric right adjoint [Str00, Definition p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 311].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' According to the theory of data migration [Spi21, Corollary 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6], giving a parametric right adjoint SetD → SetC is equivalent to giving a functor from C to ⨿((SetD)op), the free coproduct completion of the free limit completion of D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Our functor C → ⨿((SetD)op) is defined by Equa- tion (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The assignment of E ∈ C can also be described as the sum of the four representables associated with the Petri nets with links in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Finally, the assignments A �→ A and neg �→ neg ensure that if P is a copresheaf on D with P(A) = Sgn and P(neg) is negation, then applying this parametric right adjoint functor to P yields a copresheaf X on C where again X(A) = Sgn and X(neg) is negation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Thus, this functor between copresheaf categories restricts to a functor SgnPetri → SgnGraph as claimed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' With this construction, we can give a formal account of what it means to have a mechanistic model for a regulatory network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='14 (Mechanism).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A mechanistic model for a regulatory network X is a Petri net with signed links P together with an occurrence of X in Net(P), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=', a monic signed functor X ↣ Net(P).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For example, the Petri net with signed links in Equation (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3) is a mechanistic model for a regulatory network in which A and D participate in a positive feedback loop: A D .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 3 Quantitative analysis: parameters and dynamics 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1 Parameterized dynamical systems Pioneering the idea of functorial semantics for scientific models, Baez and Pollard extended the mass-action model of reaction networks to a functor from the category of Petri nets with rates into a category of dynamical systems [BP17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In this picture, the reaction rate coefficients are known constants associated with the reaction network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In practice, however, rate coefficients are often unknown and must be extracted from existing literature or estimated from experimental data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We therefore change our perspective slightly and consider dynamical systems not in isolation but as parameterized families.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This shift also turns out to have formal advantages: the category of 14 parameterized dynamical systems is better behaved than the category of dynamical systems, which has too few morphisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To begin, we recall the dynamics functor, nearly identical to Baez-Pollard’s [BP17, Lemma 15]: Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1 (Dynamics).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a functor Dynam : FinSet → VectR that sends a finite set S to the vector space of algebraic vector fields v : RS → RS, where algebraic means that the components of the vector field are polynomials in the state variables;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' a function f : S → S′ between finite sets to the linear transformation (v : RS → RS) �→ (f∗ ◦ v ◦ f∗ : RS′ → RS′), where the linear map f∗ : RS′ → RS is the pullback along f f∗(x′)(i) := x′(f(i)), x′ ∈ RS′, i ∈ S, and the linear map f∗ : RS → RS′ is the pushforward along f f∗(x)(i′) := � i∈f−1(i′) x(i), x ∈ RS, i′ ∈ S′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The functor Dynam : FinSet → VectR can be constructed as the composite FinSet ⟨D,F⟩ −−−−→ Vectop R × VectR Poly(−,−) −−−−−−→ VectR, where F : FinSet → VectR is the free vector space functor (restricted to finite sets);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' D : FinSetop → VectR is the dual vector space functor (restricted to F), whose underlying set-valued functor is VectR(F(−), R) ∼= Set(−, R) : FinSetop → Set;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' and Poly(−, −) is the VectR-enriched hom-functor that sends a pair of vector spaces to the vector space of polynomial maps between them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 The dynamics functor is the same one studied by Baez and Pollard except that we take the vector space, rather than merely the set, of vector fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' That is because we are interested in linearly parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In calling the functor “dynamics,” we implictly identify a vector field with the differentiable dynamical system that it generates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This common practice is not entirely innocent since even when a system of differential equations depends linearly on parameters, its solutions rarely do.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We also note that the restriction to algebraic vector fields, as opposed to smooth or even just continuous ones, is inessential but suffices for us and agrees with Baez-Pollard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The dynamics functor is the main building block in constructing a category of parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 (Linear parameterizations).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of linearly parameterized dynami- cal systems is the comma category Para(Dynam) := F/ Dynam, where F : FinSet → VectR, X �→ RX is the free vector space functor restricted to finite sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2For a coordinate-free description of polynomial maps between vector spaces, see [Car71, §1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 15 So, by definition, a linearly parameterized dynamical system consists of a finite set P, the parameter variables, and a finite set S, the state variables, together with a linear map v : RP → Dynam(S) sending each choice of parameters θ ∈ RP to an algebraic vector field v(θ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In more conventional notation, we can write v(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' θ) := v(θ)(x) for x ∈ RS and θ ∈ RP .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A morphism (P, S, v) → (P ′, S′, v′) of linearly parameterized dynamical systems is a pair of functions q : P → P ′ and f : S → S′ making the square RP Dynam(S) RP ′ Dynam(S′) v f∗◦(−)◦f∗ v′ q∗ (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) commute, or equivalently making the equation f∗(v(f∗(x′);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' θ)) = v′(x′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' q∗(θ)) hold for all x′ ∈ RS′ and θ ∈ RP .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' While certainly not all dynamical models depend linearly on their parameters, a great many of them do, including several important canonical models in biology and chemistry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The law of mass action defines dynamical systems that depend linearly on the rate coefficients.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The generalized Lotka-Volterra equations, studied in the next section, are linear in the rate and affinity parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Of course, the mass-action and Lotka-Volterra equations are nonlinear ODEs;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' linearity of a vector field in state or in parameters are separate matters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Nevertheless, even for nonlinear models such as Lotka-Volterra, linearity in parameters is a useful assumption that aides in the identifiability analysis of the model [SRS14, §5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To express important physical constraints and to define a semantics for signed graphs, we will restrict the dynamical system and its parameters to be nonnegative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This is straightforward enough but requires a bit of additional formalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Write R+ := {x ∈ R : x ≥ 0} for the semiring of nonnegative real numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A module over R+ is called a conical space, and the category of conical spaces and conic-linear (R+-linear) maps is denoted Con := ModR+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A conical space is a structure in which one can take linear combinations with nonnegative real coefficients, just as a real vector space (R-module) is a structure in which one can take linear combinations with arbitrary real coefficients.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Any convex cone in a real vector space is a conical space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Our main example is the nonnegative orthant of RS for some set S: the function space RS + := {x : S → R+}, with conical combinations taken pointwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A real vector space can itself be regarded as a conical space;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' more precisely, the inclusion of semirings R+ �→ R induces a forgetful functor VectR → Con by restriction of scalars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Recall that a dynamical system is nonnegative if whenever the initial condition is in the nonnegative orthant, its trajectory always remains in the nonnegative orthant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A dynamical system of form ˙x = v(x) is nonnegative if and only if vi(x) ≥ 0 whenever x ≥ 0 componentwise and xi = 0 [HCH10, Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1], in which case the vector field v is called essentially nonnegative [HCH10, Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Using this criterion, it is easy to see that a reaction network with mass- action kinetics is nonnegative assuming the rate constants are nonnegative, as is a Lotka-Volterra system for any choice of parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Hence both systems satisfy the obvious physical constraint that no species should have negative concentration or population.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3 (Nonnegative dynamics).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a functor Dynam+ : FinSet → Con that sends a finite set S to the conical space of essentially nonnegative, algebraic vector fields v : RS → RS and sends a function f : S → S′ to the transformation v �→ f∗ ◦ v ◦ f∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 16 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The proof is similar to that of Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' It is clear that the essentially nonnegative functions are stable under pointwise conical combinations, hence form a conical space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (They are, of course, not stable under arbitrary linear combinations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=') We just need to check that if v : RS → RS is essentially nonnegative, then so is the transformed vector field f∗ ◦ v ◦ f∗ : RS′ → RS′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Fix x′ ∈ RS′ + and i′ ∈ S′, and suppose that x′(i′) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For every i ∈ f−1(i′), we have f∗(x′)(i) = x′(f(i)) = x′(i′) = 0 and so v(f∗(x′))(i) ≥ 0, whence the inequality of essential nonnegativity follows: (f∗ ◦ v ◦ f∗)(x′)(i′) = � i∈f−1(i′) v(f∗(x′))(i) ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We now define the conical analogue of linearly parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4 (Conical parameterizations).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category of conically parameterized non- negative dynamical systems is the comma category Para(Dynam+) := F+/ Dynam+ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' where F+ : FinSet → Con, X �→ RX + is the free conical space functor restricted to finite sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' So, a conically parameterized nonnegative dynamical system consists of finite sets P and S together with a conic-linear map v : RP + → Dynam+(S).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5 (Colimits of parameterized dynamical systems).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The categories of linearly and conically parameterized dynamical systems are finitely cocomplete.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Moreover, these finite colimits are computed by colimits in FinSet of the parameter variables and of the state variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The category FinSet has finite colimits and the functors F : FinSet → VectR and F+ : FinSet → Con preserve finite colimits, since they are composites of the inclusion FinSet �→ Set with the left adjoints Set VectR F U ⊣ and Set Con F+ U+ ⊣ to the underlying set functors on vector spaces and conical spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6 below, the comma categories Para(Dynam) = F/ Dynam and Para(Dynam+) = F+/ Dynam+ have finite colimits, which are preserved by the projection functors onto FinSet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To illustrate, we describe the initial object and binary coproducts in Para(Dynam).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The initial linearly parameterized dynamical system has no parameter variables, no state variables, and the unique (trivial) vector field on the zero vector space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The coproduct of two linearly parameterized dynamical systems (P1, S1, v1) and (P2, S2, v2) has parameter variables P1 + P2, state variables S1 + S2, and parameterized vector field RP1+P2 ∼= RP1 ⊕ RP2 v1⊕v2 −−−−→ Dynam(S1) ⊕ Dynam(S2) [Dynam(ι1),Dynam(ι2))] −−−−−−−−−−−−−−−→ Dynam(S1 + S2), where ι1 : S1 → S1 +S2 and ι2 : S2 → S1 +S2 are the canonical inclusions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In conventional notation, the coproduct system has parameterized vector field v �� x1 x2 � ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' � θ1 θ2 �� = � v1(x1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' θ1) v2(x2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' θ2) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The proof of Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5, as well as of Theorems 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='7 and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='8 below, depends on the following technical lemma about comma categories, which the reader can omit without loss of continuity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 17 Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6 (Colimits in comma categories).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Let C0 F0 −→ C F1 ←− C1 be a cospan of categories such that C0 and C1 have colimits of shape J and F0 preserves J-shaped colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Then the comma category F0/F1 also has J-shaped colimits, and the projection functors πi : F0/F1 → Ci, i = 0, 1, preserve those colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Furthermore, a functor G : X → F0/F1 into the comma category preserves J-shaped colimits whenever the associated functors Gi := πi ◦ G : X → Ci, i = 0, 1, do so.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Colimits in the comma category F0/F1 are constructed in [RB88, §5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To make the rest of the proof self-contained, we recall the construction here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By the universal property of the comma category, a diagram D : J → F0/F1 is equivalent to diagrams Di := πi ◦ D : J → Ci, i = 0, 1, along with a natural transformation ⃗D : F0 ◦ D0 ⇒ F1 ◦ D1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Let (ci, λi) be a colimit cocone for the diagram Di in Ci, having legs Di(j) λi j −→ ci for each j ∈ J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The family of morphisms F0(D0(j)) ⃗Dj −−→ F1(D1(j)) F1(λ1 j) −−−−→ F1(c1), j ∈ J, is then a cocone under F0 ◦ D0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Since F0 preserves J-shaped limits, (F0(c0), F0 ∗ λ0) is a colimit cocone for F0 ◦ D0, so by its universal property, there exists a unique morphism f : F0(c0) → F1(c1) making the squares commute: F0(D0(j)) F1(D1(j)) F0(c0) F1(c1) ⃗Dj f F0(λ0 j) F1(λ1 j) , j ∈ J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Setting λ := (λ0 j, λ1 j)j∈J, the cocone ((c0, c1, f), λ) can be shown to be a colimit of the diagram D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To prove the last statement about colimit preservation, let D : J → X be a diagram with colimit cocone (x, λ), having legs Dj λj −→ y for j ∈ J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We must show that its image cocone (G(x), G ∗ λ) is a colimit of the diagram G ◦ D in F0/F1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By the universal property of the comma category, the functor G : X → F0/F1 is equivalent to the functors Gi : X → Ci, i = 0, 1, along with a natural transformation ⃗G : F0 ◦ G0 ⇒ F1 ◦ G1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The image cocone (G(x), G ∗ λ) then amounts to cocones (G0(x), G0 ∗ λ) and (G1(x), G1 ∗ λ), which by hypothesis are colimits of the diagrams G0 ◦ D and G1 ◦ D in C0 and C1, together with a family of commutative squares in C: F0(G0(Dj)) F1(G1(Dj)) F0(G0(x)) F1(G1(x)) ⃗GDj F0(G0(λj)) ⃗Gx F1(G1(λj)) , j ∈ J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' But a morphism ⃗Gx making all these squares commute is already uniquely determined by the universal property of the colimit cocone (F0(G0(x)), F0 ∗ G0 ∗ λ) for the diagram F0 ◦ G0 ◦ D, using the hypothesis that F0 preserves J-shaped colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Indeed, this is precisely how one constructs the colimit of the diagram G ◦ D in F0/F1, as shown above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' It follows that (G(x), G ∗ λ) is a colimit cocone for G ◦ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 18 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 The Lotka-Volterra dynamical model A Lotka-Volterra system with n species has, using matrix notation, the vector field v(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) := x ⊙ (ρ + βx) = diag(x)(ρ + βx) with state vector x ∈ Rn and arbitrary real-valued parameters ρ ∈ Rn and β ∈ Rn×n [SMH18, §2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In coordinates, the vector field is vi(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = xi � �ρi + n � j=1 βi,jxj � � = ρixi + n � j=1 βi,jxixj, i = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' , n.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The parameter ρi sets the baseline rate of growth (when positive) or decay (when negative) for species i, whereas βi,j defines a promoting (when positive) or inhibiting (when negative) effect of species j on species i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In typical applications the signs of the parameters are fixed and known in advance of any data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For example, in the famous predator-prey Lotka-Volterra system ˙x = ax − bxy ˙y = dxy − cy, with prey x and predators y, the parameters ρ = � a −c � and β = � 0 −b d 0 � are specified by nonnegative real numbers a, b, c, d ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In this section, we define quantitative semantics for graphs and signed graphs using the Lotka- Volterra dynamical model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To illustrate the main ideas, we first construct a functor from finite graphs (Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) to linearly parameterized dynamical systems (Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2), giving a semantics for unlabeled graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' It is more useful to have a semantics for regulatory networks, which we have defined to be signed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We therefore construct a second functor from finite signed graphs (Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2) to conically parameterized nonnegative dynamical systems (Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Recall that a graph is finite if its vertex and edge sets are both finite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Let FinGraph denote the full subcategory of Graph spanned by finite graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='7 (Lotka-Volterra model for finite graphs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a functor LV : FinGraph → Para(Dynam) that sends a finite graph X to the linearly parameterized dynamical system with parameter variables P := X(V ) + X(E), state variables S := X(V ), and algebraic vector field3 v(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β)(i) := ρ(i) x(i) + � (e:i′→i)∈X β(e) x(i′) x(i), x ∈ RX(V ), i ∈ X(V ), parameterized by vectors ρ ∈ RX(V ) and β ∈ RX(E);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' a graph homomorphism φ : X → Y to a morphism of systems with parameter variable map φV + φE : X(V ) + X(E) → Y (V ) + Y (E) and state variable map φV : X(V ) → Y (V ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Moreover, the functor LV preserves finite colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 3For a fixed graph X and vertex i ∈ X(V ), the notation (e : i′ → i) ∈ X means any edge e ∈ X(tgt)−1(i) incoming to i, whose source i′ = X(src)(e) varies with e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 19 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By the universal property of the comma category Para(Dynam) = F/ Dynam, to give a functor LV : FinGraph → Para(Dynam) is to give a pair of functors LV0, LV1 : FinGraph → FinSet along with a natural transformation ⃗ LV : (F ◦ LV0) ⇒ (Dynam ◦ LV1) : FinGraph → VectR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We set LV0(X) := X(V ) + X(E) and LV1(X) := X(V ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Using the universal property of the coproduct in VectR, the components ⃗ LVX : RX(V ) ⊕ RX(E) ∼= RX(V )+X(E) → Dynam(X(V )).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' of the transformation ⃗ LV themselves decompose into two parts, call them v0 X := ⃗ LV 0 X : RX(V ) → Dynam(X(V )) and v1 X := ⃗ LV 1 X : RX(E) → Dynam(X(V )).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We define these to be v0 X(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ)(i) := ρ(i) x(i) and v1 X(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' β)(i) := � e∈X(tgt)−1(i) β(e) x(X(src)(e)) x(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Putting the pieces back together reproduces the first statement of the theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We just need to check that the transformation ⃗ LV is, in fact, natural.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Given a graph homomorphism φ : X → Y , the naturality square for the transformation ⃗ LV is RX(V )+X(E) Dynam(X(V )) RY (V )+Y (E) Dynam(Y (V )) ⃗ LVX (φV +φE)∗ (φV )∗◦(−)◦(φV )∗ ⃗ LVY , (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2) which decomposes into two squares, RX(V ) Dynam(X(V )) RY (V ) Dynam(Y (V )) v0 X (φV )∗ (φV )∗◦(−)◦(φV )∗ v0 Y and RX(E) Dynam(X(V )) RY (E) Dynam(Y (V )) v1 X (φE)∗ (φV )∗◦(−)◦(φV )∗ v1 Y .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Let us check that both squares commute.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For the first, we have (φV )∗(v0 X(φ∗ V (y);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ))(j) = � i∈φ−1 V (j) v0 X(y ◦ φV ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ)(i) = � i∈φ−1 V (j) ρ(i) y(φV (i)) = � � � � i∈φ−1 V (j) ρ(i) � � � y(j) = v0 Y (y;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (φV )∗(ρ))(j) 20 for all y ∈ RY (V ), ρ ∈ RX(V ), and j ∈ Y (V ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' For the second, we have (φV )∗(v1 X(φ∗ V (y);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' β))(j) = � i∈φ−1 V (j) v1 X(y ◦ φV ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' β)(i) = � i∈φ−1 V (j) � e∈X(tgt)−1(i) β(e) y(φV (X(src)(e))) y(j) = � f∈Y (tgt)−1(j) � e∈φ−1 E (f) β(e) y(Y (src)(φE(e))) y(j) = � f∈Y (tgt)−1(j) � � � � e∈φ−1 E (f) β(e) � � � y(Y (src)(f))y(j) = v1 Y (y;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' (φE)∗(β))(j), for all y ∈ RY (V ), β ∈ RX(E), and j ∈ Y (V ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' When exchanging the order of the summations we have used the facts that the graph homomorphism φ : X → Y preserves sources and targets, the latter in its contravariant form X(E) X(V ) Y (E) Y (V ) X(tgt) φE Y (tgt) φV ⇝ P(Y (V )) P(X(V )) P(Y (E)) P(X(E)) X(tgt)−1 φ−1 E Y (tgt)−1 φ−1 V , where P(S) denotes the power set of a set S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Finally, we must verify that the functor LV preserves finite colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6, that happens provided both functors LV0, LV1 : FinGraph → FinSet preserve finite colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The functor LV1 = evV is an evaluation functor on a copresheaf category, hence preserves colimits [Rie16, Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Since coproducts commute with colimits, the pointwise coproduct of two evaluation functors LV0 = �FinGraph ⟨evV ,evE⟩ −−−−−−→ FinSet × FinSet + −→ FinSet � also preserves colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' A quantitative semantics for signed graphs can be defined similarly, subject to a caveat about the vertex parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Our notion of signed graph, designed to capture regulatory networks as studied in the biochemistry literature, attaches signs only to edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We are thus led to assume that, in the Lotka-Volterra dynamical model, all species have baseline rates of decay rather than growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This assumption is generally valid for protein regulatory networks, but not for gene regulatory networks in which mediating proteins are ignored [TN10], nor for predator-prey models in ecology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' More flexible approaches are certainly possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' It would be straightforward to attach signs to vertices as well as edges and use them in the quantitative semantics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Alternatively, at the expense of a more cumbersome formalism, one could define dynamical systems with mixed linear-conical parameterizations, allowing the vertex parameters to be arbitrary reals while the edge parameters are constrained to be nonnegative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4 For simplicity and uniformity of presentation, we do not describe these extensions further.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Let FinSgnGraph denote the full subcategory of SgnGraph spanned by finite signed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 4Similar mixed parameterizations are a practical necessity for parametric statistical models, studied in detail in one author’s PhD thesis [Pat20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 21 Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='8 (Lotka-Volterra model for finite signed graphs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a functor LV : FinSgnGraph → Para(Dynam+) that sends a finite signed graph X to the conically parameterized nonnegative dynamical system with parameter variables P := X(V ) + X(E), state variables S := X(V ), and essentially nonnegative, algebraic vector field v(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β)(i) := −ρ(i) x(i) + � (e:i′→i)∈X X(sgn)(e) β(e) x(i′) x(i), x ∈ RX(V ), i ∈ X(V ), parameterized by ρ ∈ RX(V ) + and β ∈ RX(E) + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Moreover, the functor LV preserves finite colimits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Similarly to the previous proof, the functor LV : FinSgnGraph → Para(Dynam+) is defined by functors LV0, LV1 : FinSgnGraph → FinSet along with a natural transformation ⃗ LV : F+ ◦ LV0 ⇒ Dynam+ ◦ LV1 : FinSgnGraph → Con, now having components ⃗ LVX given by the copairing of v0 X := ⃗ LV 0 X : RX(V ) + → Dynam+(X(V )) and v1 X := ⃗ LV 1 X : RX(E) + → Dynam+(X(V )), where we define v0 X(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ)(i) := −ρ(i) x(i) and v1 X(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' β)(i) := � e∈X(tgt)−1(i) X(sgn)(e) β(e) x(X(src)(e)) x(i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The proof of naturality is essentially the same as before, using the crucial additional fact that morphisms of signed graphs preserve signs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The proof that the functor LV preserves finite colimits is unchanged.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To exemplify the theorem, let us see how the Lotka-Volterra dynamics functor acts on a monomorphism and on an epimorphism of signed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In order to compare the dynamics of two species A and B involved in a negative feedback loop versus A and B in isolation, we take the inclusion of signed graphs A B A B ι Labeling the edges in the feedback loop as AB and BA, the morphism LV(ι) sends the conically parameterized dynamical system � vA(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ) = −ρA xA vB(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ) = −ρB xB , ρ ∈ R{A,B} + , to the parameterized dynamical system � vA(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρA xA − βBA xB xA vB(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρB xB + βAB xA xB , ρ ∈ R{A,B} + , β ∈ R{AB,BA} + , by setting the latter’s interaction coefficients to zero: βAB = βBA = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This formalizes the commonsense fact that the first system is a degenerate case of the second.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 22 For a more interesting example, we return to the projection map between regulatory networks given by Equation (2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) of Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1, inspired by the arginine biosynthesis system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Call this projection map p, and abbreviate the regulator molecule as R and the enzymes as S := {C, D, E, F, I}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The morphism LV(p) sends the parameterized dynamical system � � � � � � � vR(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρR xR − βR x2 R vC(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρC xC − βC xR xC vD(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρD xD − βD xR xD vE(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρE xE − βE xR xE vF (x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρF xF − βF xR xF vI(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρI xI − βI xR xI with state variables {R} + S and parameters ρ, β ∈ R{R}+S + to the parameterized dynamical system � vR(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρR xR − βR x2 R v∗(x;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ρ, β) = −ρ∗ x∗ − β∗ xR x∗ with state variables {R, ∗} and parameters ρ, β ∈ R{R,∗} + , in two different but equivalent ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The first way sets the latter system’s coefficients equal to sums of the former’s coefficients, namely ρ∗ = � i∈S ρi and β∗ = � i∈S βi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The second way substitutes x∗ for each xi, i ∈ S, in the first system and then takes the vector field v∗ to be the sum of the vi’s, i ∈ S, with these substitutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The equivalence of these operations is precisely the condition for LV(p) to be a morphism of parameterized dynamical systems, cf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3 Composing Lotka-Volterra models To complete this part of the story, we extend the Lotka-Volterra dynamics functors between graphs and parameterized dynamical systems, constructed in Theorems 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='7 and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='8, to double functors between open graphs and open parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We begin by making parameterized dynamical systems into open systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9 (Open parameterized dynamical systems).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a symmetric monoidal double category of open linearly parameterized dynamical systems, Open(Para(Dynam)), having as objects, finite sets A, A′, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as vertical arrows, functions f : A → A′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as horizontal arrows, open linearly parameterized dynamical systems, which consist of a linearly parameterized dynamical system (P, S, v : RP → Dynam(S)) along with a cospan A0 ℓ0 −→ S ℓ1 ←− A1 whose apex is the set S of state variables;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' as cells, morphisms of such open systems (P, S, v, ℓ0, ℓ1) → (P ′, S′, v′, ℓ′ 0, ℓ′ 1), which consist of a morphism (q, f) : (P, S, v) → (P ′, S′, v′) between linearly parameterized dynamical systems along with functions f0 : A0 → A′ 0 and f1 : A1 → A′ 1 making the diagram commute: A0 S A1 A′ 0 S′ A′ 1 ℓ0 ℓ1 f0 f ℓ′ 0 f1 ℓ′ 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 23 Vertical composition is by composition in FinSet and in Para(Dynam).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Horizontal composition and monoidal products are by pushouts and coproducts in Para(Dynam), respectively, interpreting the finite sets in the feet of the cospans as linearly parameterized dynamical systems with no parameter variables and identically zero vector fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Similarly, there is a symmetric monoidal double category Open(Para(Dynam+)) of open conically parameterized nonnegative dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We perform the construction for linearly parameterized dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The construction for conically parameterized nonnegative dynamical systems is perfectly analogous, replacing R with R+ and vector spaces with conical spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The projection functor πS : Para(Dynam) → FinSet, (P, S, v) �→ S that sends a linearly parame- terized dynamical systems to its set of state variables has a left adjoint Z : FinSet → Para(Dynam) that sends a finite set S to the system (∅, S, 0) with empty set of parameter variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By linearity, its parameterized vector field 0 ∼= R∅ → Dynam(S) is necessarily the zero vector field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This indeed gives an adjunction Z ⊣ πS, because to any function f : S → S′ and linearly parameterized dynamical system (P ′, S′, v′) there corresponds a unique morphism (0P ′, f) : Z(S) → (P ′, S′, v′), where the required square 0 Dynam(S) RP ′ Dynam(S′) f∗◦(−)◦f∗ v′ commutes trivially, since the zero vector space is initial in VectR.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Since Para(Dynam) has finite colimits (Proposition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5), we can construct a symmetric monoidal double category of Z-structured cospans [BC20, Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' As we have argued before, it will be isomorphic to Open(Para(Dynam)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' With this definition, we can construct double functors between open graphs and open param- eterized dynamical systems, but the vertex parameters under Lotka-Volterra dynamics cause a twist in the story compared to Baez and Pollard’s compositionality result for mass-action kinetics [BP17, Theorem 18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' When composing open dynamical systems in the image of the Lotka-Volterra functor, one takes a coproduct of the parameter variables, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=', a direct sum of the parameter spaces, belonging to identified vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' However, if one composes the open graphs first, then the identified vertices receive a single copy of the parameters from the Lotka-Volterra functor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Thus this functor does not preserve composition of open systems, not even up to isomorphism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Nevertheless, there is a natural (noninvertible) comparison between them: given a pair of parameters in the direct sum, we can reduce them to a single parameter simply by summing them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In mathematical terms, we get a lax double functor: a double functor that strictly preserves vertical composition, as usual, but preserves horizontal composition only up to specified comparison maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5 Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='10 (Open Lotka-Volterra models).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' There is a symmetric monoidal lax double functor LV : Open(FinGraph) → Open(Para(Dynam)) that acts on objects and vertical arrows, as the identity;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 5The precise definition of a lax double functor can be found in the textbook [Gra19, §3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='5], among other sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 24 on horizontal arrows and cells, by the functor LV : FinGraph → Para(Dynam) on graphs and graph homomorphisms and as the identity on the associated cospans and cospan morphisms: � X, A0 ℓ0 −→ X(V ) ℓ1 ←− A1 � �→ � LV(X), A0 ℓ0 −→ X(V ) ℓ1 ←− A1 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The comparison cells are defined using the morphisms of linearly parameterized dynamical systems αS : Z(S) → LV(Disc S), where αS := (0S, 1S) : (∅, S, 0) → (S, S, ⃗ LV(Disc S)), S ∈ FinSet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Given composable open graphs (X, A → X(V ) ← B) and (Y, B → Y (V ) ← C), the comparison cell for horizontal composition is given by the morphism of systems LV(X) +Z(B) LV(Y ) id +αB id −−−−−−→ LV(X) +LV(Disc B) LV(Y ) ∼ = −→ LV(X +Disc B Y ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Given a finite set A, the comparison cell for the horizontal unit is given by the morphism of systems αA : Z(A) → LV(Disc A).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Similarly, there is a symmetric monoidal lax double functor LV : Open(FinSgnGraph) → Open(Para(Dynam+)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To construct the lax double functor, we use a lax version of [BC20, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The family of morphisms αS : Z(S) → LV(Disc S), S ∈ FinSet, in the theorem statement assemble into a natural transformation FinSet FinGraph FinSet Para(Dynam) L=Disc LV L′=Z α .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The functors involved in this cell all preserve finite colimits: the top and bottom ones because they are left adjoints and the right one by Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The hypotheses of [BC20, Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3] are therefore satisfied, except that α is not a natural isomorphism but merely a natural transformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' By inspection of the proof, the result still holds except that the resulting double functor is lax rather than pseudo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We obtain a lax double functor Open(FinGraph) ∼= LCsp(FinGraph) → L′Csp(Para(Dynam)) ∼= Open(Para(Dynam)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' To show that this double functor is the same one in the theorem statement, we once again use the adjunctions to pass between L-structured and R-decorated cospans (recalling terminology introduced in the proof of Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Notice that the natural transformation α has as its mate [CGR14, §1] the identity transformation ¯α = 1evV : FinSet FinGraph FinSet Para(Dynam) R=evV LV R′=πS ¯α .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 25 Thus the action of the double functor F := LV on L-structured cospans simplifies to the identity when translated to R-decorated cospans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' L(A0) X L(A1) L′(A0) F(L(A0)) F(X) F(L(A1)) L′(A1) ↭ A0 R(X) A1 A0 R(X) R′(F(X)) R(X) A1 ℓ0 ℓ1 αA0 F(ℓ0) F(ℓ1) αA1 ¯ℓ0 ¯ℓ1 ¯ℓ0 ¯αX ¯αX ¯ℓ1 A similar statement holds for the action of the double functor on morphisms of L-structured and R-decorated cospans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 4 Conclusion Summary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Regulatory networks are a minimalistic but widely used tool to describe the interactions between molecules in biochemical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We have made the first functorial study of regulatory networks, formalized as signed graphs, and their connections with other mathematical models in biochemistry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Among the latter, we have studied reaction networks, formalized as Petri nets with signed links, and parameterized dynamical systems, focusing on Lotka-Volterra dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' This project fits into a broader program by applied category theorists and other scientists aiming to systematize, in a completely precise way, the language and methods of describing, composing, and transforming scientific models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The major categories of this paper, and the functors between them, are summarized in the following diagram, where “LV” is the Lotka-Volterra dynamics functor (§3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' SgnCat (§2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2) SgnGraph (§2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) SgnPetri (§2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3) FinSgnGraph Para(Dynam+) (§3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1) Path U LV Net ⊣ Most of the main results extend from closed systems to open systems, which compose by gluing along their boundaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Of the diagram above, we have extended the following parts to double categories of open systems and double functors between them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Open(SgnCat) Open(SgnGraph) Open(FinSgnGraph) Open(Para(Dynam+)) (§3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='3) LV Path 26 Future work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Of many possible directions for future work, we mention a few.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' As noted in the introduction, Lotka-Volterra dynamics are only one of numerous dynamics that could be considered as a canonical model for regulatory networks, and they are not even among the most commonly studied in the biochemistry literature [TLK19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' It would be desirable to have dynamics functors for regulatory networks that draw on more flexible or more biologically plausible classes of dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In another direction, the two halves of this paper—qualitative and quantitative—are not as tightly as integrated as one might hope.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' How does the presence of a motif in a regulatory network, such as an incoherent feedforward loop perhaps even of a specific type, manifest in the continuous dynamics of that network?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Put in category-theoretic terms, the Lotka-Volterra dynamics functor is defined on signed graphs, so how does it relate to the freely generated signed categories in which motifs are expressed?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' These intriguing questions are suggestive of “feedback loop analysis” in the field of system dynamics [Ric95], to which stronger connections should be made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Acknowledgments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The authors thank the American Mathematical Society (AMS) for hosting the 2022 Mathematical Research Community (MRC) on Applied Category Theory, where this research project began.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' The AMS MRC was supported by NSF grant 1916439.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' We thank John Baez, our group’s mentor at the MRC, for suggesting this project and for much helpful advice along the way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Authors Fairbanks, Patterson, and Shapiro acknowledge subsequent support from the DARPA ASKEM and Young Faculty Award programs through grants HR00112220038 and W911NF2110323.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Author Ocal acknowledges subsequent support from an AMS-Simons Travel Grant and from the Hausdorff Research Institute for Mathematics funded by the German Research Foundation (DFG) under Germany’s Excellence Strategy - EXC-2047/1 - 390685813.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' References [Alo07] Uri Alon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Network motifs: theory and experimental approaches”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Nature Reviews Genetics 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6 (2007), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 450–461.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1038/nrg2102.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Alo19] Uri Alon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' An introduction to systems biology: design principles of biological circuits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2nd ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' CRC Press, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1201/9780429283321.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Bae+21] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Baez, Fabrizio Genovese, Jade Master, and Michael Shulman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Categories of nets”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2021 Symposium on Logic in Computer Science (LICS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 1–13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1109/LICS52264.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9470566.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 2101.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='04238.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Bae+22] John Baez, Xiaoyan Li, Sophie Libkind, Nathaniel Osgood, and Evan Patterson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Com- positional modeling with stock and flow diagrams”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Proceedings of the 2022 Applied Category Theory Conference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 2205.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='08373.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [BC20] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Baez and Kenny Courser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Structured cospans”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Theory and Applications of Category Theory 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='48 (2020), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 1771–1822.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 1911.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='04630.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' url: http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' tac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='mta.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='ca/tac/volumes/35/48/35-48abs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [BFM19] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Baez, John Foley, and Joe Moeller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Network models from Petri nets with catalysts”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Compositionality 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4 (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='32408/compositionality-1-4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 1904.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='03550.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [BP17] John C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Baez and Blake S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Pollard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “A compositional framework for reaction net- works”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Reviews in Mathematical Physics 29.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='9 (2017), p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 1750028.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1142/ S0129055X17500283.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Car71] Henri Cartan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Differential calculus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Kershaw Publishing Company, 1971.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 27 [CGR14] Eugenia Cheng, Nick Gurski, and Emily Riehl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Cyclic multicategories, multivariable adjunctions and mates”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Journal of K-Theory 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2 (2014), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 337–396.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1017/ is013012007jkt250.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 1208.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4520.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [CP09] Stephen T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Crews and Joseph C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Pearson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Transcriptional autoregulation in develop- ment”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Current Biology 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='6 (2009), R241–R246.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='cub.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='01.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Csi+09] Attila Csikász-Nagy, Orsolya Kapuy, Attila Tóth, Csaba Pál, Lars J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Jensen, Frank Uhlmann, John J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Tyson, and Béla Novák.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Cell cycle regulation by feed-forward loops coupling transcription and phosphorylation”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Molecular Systems Biology 5 (2009), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 236–241.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1038/msb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [For61] Jay W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Forrester.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Industrial dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' MIT Press, 1961.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [FS07] José Luiz Fiadeiro and Vincent Schmitt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Structured co-spans: an algebra of interaction protocols”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' International Conference on Algebra and Coalgebra in Computer Science (CALCO 2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 2007, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 194–208.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1007/978-3-540-73859-6_14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Gra19] Marco Grandis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Higher dimensional categories: From double to multiple categories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' World Scientific, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1142/11406.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [HCH10] Wassim M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Haddad, VijaySekhar Chellaboina, and Qing Hui.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Nonnegative and compart- mental dynamical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Princeton University Press, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Koc22] Joachim Kock.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Whole-grain Petri nets and processes”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Journal of the ACM (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1145/3559103.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='05108.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' In press.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Lot25] Alfred J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Lotka.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Elements of physical biology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Williams & Wilkins, 1925.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' url: https: //archive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='org/details/elementsofphysic017171mbp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [MM94] Saunders Mac Lane and Ieke Moerdijk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Sheaves in geometry and logic: A first introduction to topos theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Springer, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1007/978-1-4612-0927-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Pat20] Evan Patterson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “The algebra and machine representation of statistical models”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' PhD thesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Stanford University, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 2006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='08945.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [RB88] David E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Rydeheard and Rod M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Burstall.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Computational category theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Prentice Hall, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' url: https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='man.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='uk/~david/categories/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Ric95] George P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Richardson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Loop polarity, loop dominance, and the concept of dominant po- larity”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' System Dynamics Review 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1 (1995), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 67–88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1002/sdr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4260110106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Rie16] Emily Riehl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Category theory in context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Courier Dover Publications, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' url: http: //www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='jhu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='edu/~eriehl/context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='pdf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [SMH18] Gabor Szederkényi, Attila Magyar, and Katalin M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Hangos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Analysis and control of polynomial dynamic models with biological applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Academic Press, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1016/C2015-0-06035-X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Spi21] David I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Spivak.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Functorial aggregation” (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' arXiv: 2111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='10968.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [SRS14] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Stanhope, Jonathan E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Rubin, and David Swigon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Identifiability of linear and linear- in-parameters dynamical systems from a single trajectory”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' SIAM Journal on Applied Dynamical Systems 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='4 (2014), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 1792–1815.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1137/130937913.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Ste00] John D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Sterman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Business dynamics: systems thinking and modeling for a complex world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' McGraw-Hill, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Str00] Ross Street.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “The petit topos of globular sets”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Journal of Pure and Applied Algebra 154.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1-3 (2000), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 299–315.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1016/S0022-4049(99)00183-8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 28 [TLK19] John J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Tyson, Teeraphan Laomettachit, and Pavel Kraikivski.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Modeling the dynamic behavior of biochemical regulatory networks”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Journal of Theoretical Biology 462 (2019), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 514–527.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='jtbi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='034.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [TN10] John J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Tyson and Béla Novák.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Functional motifs in biochemical reaction networks”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Annual Review of Physical Chemistry 61 (2010), pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 219–240.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1146/annurev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' physchem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='012809.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='103457.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Voi00] Eberhard O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Voit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Computational analysis of biochemical systems: A practical guide for biochemists and molecular biologists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Cambridge University Press, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' [Voi13] Eberhard O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' Voit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' “Biochemical systems theory: a review”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' International Scholarly Research Notices 2013 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content='1155/2013/897658.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} +page_content=' 29' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/19AzT4oBgHgl3EQfe_xt/content/2301.01445v1.pdf'} diff --git a/2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss b/2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..37b886883a0b4cc2bb7a7e44adbfc4f926fdbc30 --- /dev/null +++ b/2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:859544ca0890fa51462fefca987aa42898f3dbeaff2743c14cb69d2ec8eb2764 +size 6029357 diff --git a/3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/2301.11392v1.pdf.txt b/3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/2301.11392v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..9b0e0f6254ced7b13ee49387277f68e4711ee3eb --- /dev/null +++ b/3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/2301.11392v1.pdf.txt @@ -0,0 +1,1048 @@ +arXiv:2301.11392v1 [cond-mat.mes-hall] 26 Jan 2023 +Noise and Thermal Depinning of Wigner Crystals +C. Reichhardt and C. J. O. Reichhardt +Theoretical Division and Center for Nonlinear Studies, Los Alamos National +Laboratory, Los Alamos, New Mexico 87545, USA +30 January 2023 +Abstract. +We examine changes in the depinning threshold and conduction noise +fluctuations for driven Wigner crystals in the presence of quenched disorder. At low +temperatures there is a well defined depinning threshold and a strong peak in the noise +power with 1/f noise characteristics. At higher temperatures, the depinning threshold +shifts to lower drives and the noise, which is also reduced in power, becomes more white +in character. At lower temperatures, a washboard frequency appears when the system +depins elastically or forms a moving smectic state; however, this washboard signal is +strongly reduced for higher temperatures and completely disappears above the melting +temperature of a system without quenched disorder. Our results are in good agreement +with recent transport and noise studies for systems where electron crystal depinning is +believed to arise, and also show how noise can be used to distinguish between crystal, +glass, and liquid phases. +1. Introduction +When a collection of interacting particles is driven over quenched disorder, the system +can exhibit a pinned phase, a depinning threshold, and a sliding phase [1, 2]. +The +existence of these phases can be deduced from changes in transport measures such +as the velocity-force and differential resistance curves [1, 2, 3, 4, 5, 6, 7, 8]. +If the +particles maintain the same neighbors during the depinning and sliding process, the +depinning is considered elastic and is associated with specific scaling features in the +velocity-force curves [1, 2, 9, 10], while if there is tearing or mixing of the particles, +the behavior is plastic and can produce multiple steps or jumps in the transport curves +[1, 2, 9, 11]. +In the sliding phase, there can also be dynamical transitions between +different types of plastic flow or fluidlike flow, as well as dynamical ordering transitions +where the driven particles move so rapidly over the substrate that the effectiveness of +the pinning is reduced and a disordered system can organize into a moving crystal or +smectic state [2, 12, 13, 14, 15, 16, 17, 18, 19, 20]. When thermal effects are included, +additional behaviors can occur both during depinning and in the sliding states. +In +general, sharp depinning thresholds become rounded due to thermal creep; however, a +peak in the differential velocity can still arise near the T = 0 depinning threshold due +to a transition from creep to sliding dynamics [1, 2, 13]. If the temperature is higher + +Noise and Thermal Depinning of Wigner Crystals +2 +than the melting temperature of the quenched disorder-free system, a system containing +quenched disorder will always be in a disordered state, and can form a glass phase with +thermal creep or a fluctuating liquid state at high drives [2, 13, 21, 22]. +Another method to examine the driven dynamics is to measure changes in the noise +for systems in which time series of the velocity or density fluctuations can be obtained +as a function of drive [2, 4, 17, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33]. +One of +the most common characterization techniques is to determine the power spectrum of +the fluctuations and to measure the noise power over some frequency range. For elastic +depinning or ordered moving states where the particles maintain a fixed set of neighbors +and travel at speed v, there is typically a narrow band noise signature containing peaks +at specific frequencies ω = 2πv/a that are associated with the average spacing a between +the particles [2, 4]. Additional peaks appear at higher harmonics of these characteristic +frequencies. Narrow band noise signatures have been observed for sliding charge density +waves [4], superconducting vortex lattices [17, 26, 27, 28, 34], moving charge crystals [33], +and skyrmion systems [30, 35]. In some cases it is possible to observe multiple frequencies +when the system is broken up into several large sections that locally behave elastically +but globally provide multiple degrees of freedom, permitting switching behavior to occur +[33, 36]. If the depinning is strongly plastic, the narrow band noise signal is lost and is +typically replaced by 1/f α noise with 0.75 < α < 2.0 [2, 17, 25, 27, 28], while for a fluid +the noise power is often low and the fluctuations have white noise characteristics with +α = 0. In other cases, the fluctuations are Lorentizan and the noise has a 1/f shape at +low frequencies but becomes white above a characteristic frequency ωc that is associated +with the average time between collisions of particles with pinning sites [2]. Broad band +1/f noise has been observed near the depinning transition for superconducting vortices +[2, 17, 25, 28], magnetic skyrmions [30, 32], and charge crystals [33, 37]. The noise +measurements can also be used to identify a transition between different dynamical +states such as plastic flow to dynamically ordered flow. In this case, 1/f noise occurs in +the plastic flow phase just above depinning, but at higher drives there is a crossover to +narrow band noise as dynamical ordering emerges [2, 17, 28, 30]. These different noise +features can be modified significantly when thermal effects become important [2]. +Another example of an assembly of particle-like objects that can be coupled to +quenched disorder and driven is electron crystals or Wigner crystals [38, 39, 40, 41, 42], +where transport measures provide evidence for a conduction threshold that is consistent +with the existence of a depinning transition [39, 40, 43, 44, 45, 46, 36, 47, 48]. Recently, a +growing number of materials have been identified that can support Wigner crystals, such +as moir`e superlattices [49, 50], transition metal dichalcogenide monolayers [51, 52, 53], +and systems where Wigner crystals are stable at zero magnetic field [54]. +It would +be interesting to examine conduction and noise measures as a function of drive and +temperature in these new systems. Previous experiments that showed evidence of a +conduction threshold also revealed a large increase in the conduction noise just above +depinning [46], and previous numerical studies of driven Wigner crystals also showed +both a conduction threshold and 1/f noise features near depinning followed by a + +Noise and Thermal Depinning of Wigner Crystals +3 +crossover to narrow band noise at higher drives [55]. Brussarski et al. [56] examined the +transport and noise of Wigner crystals near depinning as function of temperature, and +found that at low temperature, there is a sharp depinning threshold that is correlated +with a large peak in the noise power. Additionally, the noise near depinning is of 1/f 0.75 +form. As the temperature is increased, the depinning threshold shifts to lower values +and the peak noise power is also reduced. This suggests that at higher temperature, the +system forms a Wigner liquid in which the correlated motion associated with glassy or +plastic flow phases and large noise power is lost. Noise studies have also been performed +near the metal-insulator transition, which could be associated with a change from a +Wigner glass to a Wigner liquid, and a drop in the noise power is observed at higher +temperatures where a fluid phase may be present [57, 58]. Particle-based simulations +across a Wigner glass to Wigner fluid crossover show high power 1/f α noise in the +Wigner glass state and lower noise power with a white spectrum at higher temperatures +in the fluid state [59]. Thermal effects and thermal melting in Wigner crystals have +also been extensively studied [60, 61, 62, 63, 64], so it should be feasible to perform +experimental noise and transport measures across a thermal melting transition while +the system is being driven. +In this work, we consider thermally induced transport and noise measurements for +a two-dimensional (2D) electron system driven over quenched disorder. Previous work +on this system focused on the T = 0 case, and showed that for plastic depinning, there is +strong 1/f noise with a peak in the noise power near the depinning transition, followed +by a drop in the noise power and a transition to white or narrow band noise at high +driving where a moving smectic or moving crystal phase emerges [55, 65]. Here we find +that as we increase the temperature, the depinning threshold decreases and the noise +power drops, in agreement with experiments. Additionally, we find that the narrow +band noise visible for T = 0 at high drives is strongly reduced at higher temperatures +and vanishes above the temperature Tm at which the system melts in the absence of +quenched disorder. This suggests that narrow band noise signals may only be accessible +at temperatures well below melting. +We map out the dynamic phase diagram as a +function of drive versus temperature and show that at Tm there is a divergence in the +drive at which a transition to ordered or partially ordered flow occurs, similar to the +dynamic phase diagram proposed by Koshelev and Vinokur for driven superconducting +vortex systems [13, 22]. For the case of elastic depinning, we find a thermally induced +creep regime in which the lattice moves by one lattice constant at a time, and show +that a narrow band signal can still arise even in the creep regime. The spectral peaks +become sharper and shift to higher frequencies with increasing drive, but the narrow +band signature is lost with increasing temperature even before the system reaches the +clean melting temperature Tm. + +Noise and Thermal Depinning of Wigner Crystals +4 +2. Simulation and System +We model a 2D classical Wigner crystal with charge density n = Ne/L2, where Ne is the +number of electrons and L is the system size. We employ periodic boundary conditions +in the x and y directions, and the sample contains Np randomly placed pinning sites +modeled as short range attractive wells with a density of np = Np/L2. Throughout +this work we fix n = 0.208 and np = 0.25. At T = 0 and in the absence of quenched +disorder, the charges form a triangular lattice that has a well defined melting transition +temperature Tm [66]. Additionally, when T = 0 there is a well defined quenched disorder +strength above which the system disorders [66]. +We represent the charges using a +previously studied model [55, 67, 65, 66, 68, 69, 70, 71], where the equation of motion +for charge i is +αdvi = +N +� +j +∇U(rij) + Fp + FD + FT +i . +(1) +Here αd is a damping term and Ui = q2/r is the long range Coulomb repulsion between +charges of magnitude q. As in previous work [55, 71], we employ a Lekner summation to +evaluate the long range interactions. The second term on the right hand side represents +pinning sites modeled as finite range parabolic traps that impart a maximum pinning +force of Fp at radius rp. The thermal fluctuations are applied with the term FT , which +has the following properties: ⟨F T⟩ = 0 and ⟨F T(ti)F T(t′ +j)⟩ = 2kBTδijδ(t − t′). The +initial positions of the charges are obtained through simulated annealing at zero drive. +Once the system has been initialized, we apply a driving force FD = FDˆx representing +an applied voltage. The drive can be set to a constant value, in which case we wait +for the system to reach a steady state before measuring the average velocity per charge +⟨V ⟩ = +�Ne +i +vi · ˆx or obtaining a time series of the velocity to examine the temporal +fluctuations. By considering a range of drives and measuring the average velocity at +each drive, we can create a current-voltage curve. If there is a magnetic field present, +the changes experience an additional force qB × vi that can create a Hall angle for the +electron motion. This effect is generally small and we neglect it in the present work, +but we have studied it in detail elsewhere [71]. +3. Elastic and Plastic Regimes +In Fig. 1 we plot the fraction P6 of six-fold coordinated charges versus temperature T/Tm +for a system with no quenched disorder. The melting temperature Tm is defined to be the +temperature at which a proliferation of topological defects or non-sixfold coordinated +charges occurs. For T/Tm < 1.0, P6 is close to 1.0, as expected for a triangular lattice, +while for T/Tm > 1.0, a large number of fivefold and sevenfold coordinated charges +appear, causing P6 to drop. +Once we have defined Tm by measuring a clean system, we introduce quenched +disorder in order to study the conduction noise and transport response above and below +Tm for varied disorder strengths Fp. We apply a constant drive with FD = 0.01 to + +Noise and Thermal Depinning of Wigner Crystals +5 +0 +0.5 +1 +1.5 +T/Tm +0.5 +0.6 +0.7 +0.8 +0.9 +1 +P6 +Figure 1. +The average fraction of sixfold-coordinated charges P6 versus temperature +T/Tm in a system with no quenched disorder. Tm is defined to be the temperature at +which a proliferation of non-sixfold coordinated charges occurs in a clean system. +samples with different Fp and measure the time average velocity per charge ⟨V ⟩ over +4 × 106 simulation time steps. When Fp = 0, the charge velocity V0 is identical to the +driving force, V0 = FD = 0.01, so a measurement of ⟨V ⟩/V0 = 1 indicates that the +flow of the charges has reached the pin-free limit. In Fig. 2(a), where we plot ⟨V/V0⟩ +versus Fp, at T/Tm = 0 there is a large drop in ⟨V ⟩/V0 near Fp = 0.75. Figure 2(b) +shows the corresponding values of P6 versus Fp, where for T/Tm = 0 there is a well +defined transition from an ordered Wigner crystal to a disordered Wigner glass, and the +proliferation of defects correlates with the velocity drop in Fig. 2(a). At T/Tm = 0.3, +the overall velocity is higher than for the T/Tm = 0 sample due to the lowering of +the effectiveness of the pinning by the thermal fluctuations. Additionally, the pinning +strength required to disorder the system is shifted upward to a value close to Fp = 0.1, +which is again due to the partial reduction of the pinning effectiveness by the thermal +fluctuations. A similar trend occurs for T/Tm = 0.6, where the velocity is higher. For +T/Tm = 1.03, the system is disordered for all values of Fp and the velocity is even higher +but has a gradual drop with increasing Fp, and the same trend occurs for T/Tm = 1.36. A +more detailed study of the general phase diagram for the disordered and ordered phases +as a function of pinning strength versus temperature appears in Ref. [66]. The results in + +Noise and Thermal Depinning of Wigner Crystals +6 +0 +0.2 +0.4 +0.6 +0.8 +1 +/V0 +0 +0.05 +0.1 +0.15 +Fp +0.5 +0.6 +0.7 +0.8 +0.9 +1 +P6 +Figure 2. (a) The average charge velocity ⟨V ⟩/V0 vs pinning strength Fp at FD = 0.01, +where V0 = FD = 0.01 is the average velocity in a disorder-free system. T/Tm = 0 +(dark blue), 0.3 (light blue), 0.6 (green), 1.03 (yellow) and 1.38 (red). +(b) The +corresponding P6 vs Fp showing that for T/Tm < 1.0, there is a well defined pinning- +induced order to disorder transition. +Fig. 1 and Fig. 2 indicate that the system exhibits three distinct regimes. These are an +ordered or crystal regime containing sixfold-coordinated charges, which occurs at low +temperatures or low pinning strengths; a disordered or plastic regime where the system +has low mobility and is strongly affected by the pinning; and a high temperature fluid +phase where the effectiveness of the pinning is reduced and the system is in a strongly +fluctuating state. In terms of transport, in the presence of pinning the ordered state +exhibits elastic depinning in which the charges maintain their same neighbors. The glass +state undergoes plastic depinning, and the fluid state does not have a pinned phase but +can still have a regime in which the charges are trapped for a time before thermally + +Noise and Thermal Depinning of Wigner Crystals +7 +hopping out of the pinning sites. +4. Transport and Noise in the Plastic Regime +We next examine the noise and transport in the three regimes identified above. We +consider samples with Fp = 0.5, a pinning strength at which the charges are disordered +for T/Tm = 0, so the system is in a strongly disordered glass phase. The T/Tm = 0 +plastic depinning that occurs in this regime was studied in detail in [66], where a pinned +phase, a filamentary flow phase, a disordered flow phase, and a dynamically ordered +moving smectic phase appear in sequence as a function of increasing drive. +In Fig. 3(a) we show a snapshot of the charge locations, pinning site locations, and +trajectories in the plastic flow regime for FD = 0.15 at T/Tm = 0.15, where a portion +of the charges are moving in a series of well defined channels, with occasional jumps +between the channels when certain channels open or close again. In general, for strong +pinning, at low temperature the system exhibits channel flow just above depinning, +similar to that studied in other systems at zero temperature. Figure 3(b) shows the +same system at T/Tm = 0.606 where there is a combination of channel flow and random +thermal hopping, indicating that as the temperature increases, there is a transition +from one-dimensional (1D) channels to two-dimensional (2D) flow. +In Fig. 3(c), at +T/Tm = 1.03 the motion is 2D and fluidlike. For higher temperatures, the images look +similar to what is shown in Fig. 3(c). +In Fig. 4(a) we plot ⟨V ⟩ versus FD for the system in Fig. 3 at T/Tm = 0, 0.606, +0.9, 1.21, 1.81, and 2.42. For the lower temperatures, there is a well-defined depinning +threshold followed by a nonlinear regime, while when T/Tm > 1.0, the threshold is +replaced by a creep regime and the nonlinear regime at higher drives persists. At the +highest drives, all of the curves approach the pin-free limit. In Fig. 4(b) we show the +corresponding d⟨V ⟩/dFD versus FD curves, where for T/Tm ≥ 1.21 there is a peak +in d⟨V ⟩/dFD due to the S shape of the velocity-force curves. +Similar peaks in the +differential conductivity were observed for driven superconducting vortices in the plastic +flow regime [12, 17, 21, 22]. For T/Tm > 1.21, the peaks are lost and a creep regime +appears. The dashed line is the differential conductivity for the pin free system, and +all of the curves approach this value at high drives. We note that for T/Tm = 0, at +low drives there are a number of jumps in the conduction as well as a few regimes of +negative differential conduction. This arises due to a filamentary flow channel effect +that is described in more detail in [65]. For T/Tm > 0.5, the jumps associated with +the filamentary flow phase are lost and a single large peak in d⟨V ⟩/dFD appears in the +plastic flow regime where there is a combination of moving and pinned charges. +In Fig. 5 we plot P6 versus FD for the system in Fig. 4 for T/Tm = 0, 0.303, 0.606, +0.757, 0.91, 1.21, and 2.42. For T/Tm < 1.0 there is an initial dip in P6 at the onset of +plastic flow, and at high drives where d⟨V ⟩/dFD starts to flatten, P6 approaches values +of 0.9 or higher as the system forms a moving smectic phase. In the moving smectic +state, the charges move in well defined channels and a small number of dislocations are + +Noise and Thermal Depinning of Wigner Crystals +8 +x +(a) +y +x +(b) +y +x +(c) +y +Figure 3. +Charge locations (red circles), trajectories (blue lines), and pinning +site locations (black circles) for the system in Fig. 2 at FD = 0.15 and Fp = 0.5. (a) +Filamentary flow at T/Tm = 0.15. (b) Disordered flow with channels at T/Tm = 0.606. +(c) T/Tm = 1.03. +present that have their Burgers vectors aligned with the driving direction [2, 55, 65]. +As T/Tm increases further, the drive at which the smectic state emerges shifts to higher +values of FD, and for T/Tm > 1.0, the system no longer forms a moving smectic but +instead becomes a moving fluid. +From the features in the transport curves and P6 plotted in Figs. 4 and 5, we +construct a dynamic phase diagram of the evolution of the different phases as a function +of FD versus T/Tm in Fig. 6. At low drives we find a pinned or creep regime denoted +C, where d⟨V ⟩/dFD < 0.5. The dynamically ordered moving smectic phase MS appears + +Noise and Thermal Depinning of Wigner Crystals +9 +0 +0.2 +0.4 +0.6 +0.8 +1 + +0 +0.25 +0.5 +0.75 +1 +FD +0 +0.5 +1 +1.5 +d/dFD +(a) +(b) +Figure 4. +(a) Velocity ⟨V ⟩ vs drive FD for the system in Fig. 3 with Fp = 0.5 at +T/Tm = 0.0 (purple), 0.606 (blue), 0.91 (dark green), 1.21 (light green), 1.81 (orange), +and 2.42 (red). (b) The corresponding d⟨V ⟩/dFD vs FD curves. The dashed lines +indicate the pin-free limit. +when P6 > 0.9. The disordered regime is where the system is structurally disordered but +moving, and it can be either a moving glass MG for T/Tm < 1.0, or a moving liquid ML +for T/Tm > 1.0. The overall features of the phase diagram are similar to those observed +in driven superconducting vortex systems with quenched disorder, as first proposed by +Koshelev and Vinokur [13], where the transition between the MG and MS states shifts to +higher drives as T/Tm is approached. In Ref. [13], the transition line from the disordered +to moving ordered phase was argued to be proportional to A/(Tm −T), where A is some +prefactor and the moving ordered phase can be described in terms of having an effective +temperature that is decreasing toward zero. This picture assumes the formation of a + +Noise and Thermal Depinning of Wigner Crystals +10 +0 +0.5 +1 +1.5 +2 +FD +0.4 +0.6 +0.8 +1 +P6 +Figure 5. +P6 vs FD for the system in Fig. 4 with Fp = 0.5 at T/Tm = 0 (purple), +0.303 (dark blue), 0.606 (light blue), 0.757 (green), 0.91 (yellow), 1.21 (orange), and +2.42 (red). The system reaches an ordered state at high drives for T/Tm < 1.0. +moving crystal at high drive, and is somewhat modified in our system since the moving +state we observe is a smectic in which the dynamic fluctuations are anisotropic [16]. We +find that a better fit to the transition line in our case is (Tm − T)−0.7, which is likely +due to the anisotropic nature of the moving smectic. +Now that we have established the dynamic phase diagram as a function of drive +versus temperature, we can ask how the velocity fluctuation power spectra change as a +function of FD and T. The power spectrum as a function of ω = 2πf can be calculated +using the time series v(t) of the velocity fluctuations, +S(ω) = +���� +� +v(t)e−iωt +���� +2 +(2) +At T = 0 the noise has a 1/f α signature with α ≈ 0.8, in agreement with recent +experiments [56]. The noise power is reduced at high drives and shows a crossover to +a narrow band signature when the system forms a moving smectic phase; however, the +experiments do not detect a narrow band noise signature at higher drives, suggesting +that thermal effects could be coming into play. +In Fig. 7 we plot power spectra of the velocity time series for the system in Fig. 6 +at a drive of FD = 0.15 for T/Tm = 0, 0.303, 0.606, and 1.03. For T/Tm = 0, the + +Noise and Thermal Depinning of Wigner Crystals +11 +0 +0.5 +1 +1.5 +T/Tm +0 +1 +2 +3 +4 +FD +MS +ML +MG +C +Figure 6. +Dynamic phase diagram as a function of FD vs T/Tm for the system in +Figs. 4 and 5 with Fp = 0.5. There is a pinned or creep phase C (red), a disordered +moving phase (blue) that is a moving glass, MG, at lower temperatures and a moving +liquid, ML, at higher temperatures, and a moving smectic MS (green). +low frequency noise has a 1/f α form, where the dashed line is a fit with α = −0.8, +while at higher frequencies the noise tail has α = −2.0. At T/Tm = 0.5, the lower +frequency noise power is reduced and α drops closer to α = 0, the value expected for +white noise; however, the high frequency noise still has a 1/f 2 form. For higher T/Tm, +the low frequency noise power is further reduced while the higher frequency noise power +is enhanced, and the spectrum becomes much whiter overall. +To better characterize the system, we measure the noise power S0, which is the +value of the spectral power integrated in a small window around a specific frequency +ω = 20. In Fig. 8 we show S0 versus FD for T/Tm = 0, 0.303, 0.606, and 1.03 on a log- +linear plot. For T = 0 there is a large peak in S0 over the range 0.01 < FD < 0.5, which +corresponds to the appearance of 1/f 0.85 noise. The noise is white for 0.5 < FD < 0.9, +and for FD > 0.9 a narrow band noise signal appears. For T/Tm = 0.303 and 0.606, +there is still a peak in the noise near FD = 0.2, but as the temperature increases, the +peak power diminishes and the peak location shifts to lower drives. This is correlated +with a whitening of the low frequency noise, as shown in Fig. 7. For T/Tm = 1.03, the + +Noise and Thermal Depinning of Wigner Crystals +12 +10 +100 +1000 +ω +10 +-9 +10 +-8 +10 +-7 +10 +-6 +10 +-5 +S(ω) +Figure 7. +Power spectra S(ω) vs ω for the system in Fig. 6 with FD = 0.15 for +T/Tm = 0 (dark blue), 0.303 (light blue), 0.606 (yellow), and 1.03 (red). The spectral +signature changes from 1/f to white at low frequencies as the temperature increases, +while the amount of noise power at higher frequencies increases with increasing T . +sharp noise power peak is lost. At large FD, we find that the noise power increases with +increasing temperature due to the transition from flow through narrow 1D channels +in the smectic state to a 2D Brownian like motion in the liquid state. +The overall +behavior of the noise power that we find is in agreement with experimental observations +[56], where there is a large peak in the noise power near the depinning threshold at +low temperatures, while for higher temperatures the noise power peak is reduced and +shifts to lower drives before disappearing at sufficiently high temperature. +Another +feature that is also observed in the experiments is that the noise power increases with +temperature at large drives. +We next consider thermal effects in the high drive limit where the system forms a +moving smectic at T = 0. In Fig. 9(a) we show S(ω) vs ω for the system from Fig. 6 at +FD = 1.5 and T/Tm = 0, where there are a series of peaks associated with a narrow band +noise signature. At T/Tm = 0.303 in Fig. 9(b), there are still strong peaks associated +with the narrow band noise but the higher harmonic peaks are strongly reduced in +power. In Fig. 9(c) at T/Tm = 0.606, the level of background noise has increased and +the narrow band peaks are diminished in size, while at T/Tm = 1.03 in Fig. 9(d), the + +Noise and Thermal Depinning of Wigner Crystals +13 +0 +0.5 +1 +1.5 +2 +FD +10 +-10 +10 +-9 +10 +-8 +10 +-7 +10 +-6 +10 +-5 +S0 +Figure 8. +The noise power S0 at fixed ω = 20 vs FD for the system in Fig. 7 at +FD = 0.15 for T/Tm = 0 (dark blue), 0.303 (light blue), 0.606 (yellow), and 1.03 (red). +moving smectic phase is lost and the narrow band peaks disappear into the background +noise. To better characterize the change in the narrow band noise signature, in Fig. 10 +we plot the noise power S0 at ω = 323, which is the location of the most pronounced +narrow band noise peak in Fig. 9(a). For T/Tm < 0.5 there is a strong narrow band +noise signal; however, at T/Tm = 0.75 the narrow band noise level is close to the value +of the background noise. This suggests that thermal effects can strongly reduce the +narrow band noise signal even at temperatures well below T/Tm = 1.0, which could +explain why the narrow band noise signals are difficult to see in experiment. To better +understand the origins of the changes in the noise signals, in Fig. 11(a) we plot the +trajectories of the charges at T/Tm = 0.606 where narrow band noise is present. The +system is still in a moving smectic state but the channels have been broadened by the +thermal fluctuations, and there are several regions in which the channel structures are +starting to break down. Figure 11(b) shows the trajectories for T/Tm = 1.07, where +the 1D channel structure is lost, there is a significant amount of transverse diffusion, +and the narrow band noise peaks disappear. This result indicates that the narrow band +noise occurs only when the motion of the charges is mostly 1D in character. + +Noise and Thermal Depinning of Wigner Crystals +14 +0.0 +5.0×10 +-6 +1.0×10 +-5 +1.5×10 +-5 +2.0×10 +-5 +2.5×10 +-5 +S(ω) +0.0 +5.0×10 +-6 +1.0×10 +-5 +1.5×10 +-5 +2.0×10 +-5 +2.5×10 +-5 +S(ω) +0 +1000 +2000 +3000 +ω +0.0 +5.0×10 +-6 +1.0×10 +-5 +1.5×10 +-5 +2.0×10 +-5 +2.5×10 +-5 +S(ω) +0 +1000 2000 3000 4000 5000 +ω +0.0 +5.0×10 +-6 +1.0×10 +-5 +1.5×10 +-5 +S(ω) +(a) +(b) +(c) +(d) +Figure 9. +S(ω) vs ω for the system in Fig. 6 at FD = 1.5 where the system is in the +moving smectic phase. T/Tm = (a) 0, (b) 0.303, (c) 0.606, and (d) 1.03. +5. Thermal Depinning Noise in the Elastic Regime +We next consider the thermal depinning and noise in the elastic regime where the charges +maintain their same neighbors. From Fig. 2 we select a value of Fp = 0.05, well below +the T/Tm = 0 disordering threshold of Fp = 0.075. In Fig. 12(a) we show ⟨V ⟩ versus +FD at Fp = 0.05 for T/Tm = 0, 0.0378, 0.0756, 0.17, 0.303, 0.606, and 1.03, and we plot +the corresponding d⟨V ⟩/dFD curves in Fig. 12(b). As T/Tm increases, the depinning +threshold shifts to lower FD, and in Fig. 12(b), the peak in d⟨V ⟩/dFD that appears for +T = 0 is lost for T/Tm > 0.303. We note that the system remains in an ordered state +up to T/Tm = 1.0 for all values of FD. The d⟨V ⟩/dFD curves also show a multiple peak +feature at high temperatures, with one peak at the finite temperature threshold and a +second peak near the T = 0 depinning threshold. In between these two peaks, the flow +is creep-like in nature. +In Fig. 13 we plot S(ω) versus ω for the system in Fig. 12 at T/Tm = 0.1515 for +different values of FD = 0.025, 0.03, 0.04, 0.046, 0.06, and 0.01. At FD = 0.025, the +motion occurs mostly in the form of avalanches, and no clear narrow band signatures +are present but the low frequency noise has high power. For FD = 0.03, the system +starts to develop a narrow band noise signature that sharpens with increasing drive, +and for FD ≥ 0.06, which is above the zero temperature depinning threshold, the low +frequency noise is strongly suppressed and the narrow band noise peaks become much + +Noise and Thermal Depinning of Wigner Crystals +15 +0 +0.5 +1 +T/Tm +1×10 +-5 +S0 +Figure 10. +The value of the noise power S0 at ω = 323, the frequency of the largest +narrow band noise peak in Fig. 9, vs T/Tm for the system in Fig. 8 with FD = 0.15. +Here the narrow band noise peaks are lost near T/Tm = 0.75. +x +(a) +y +x +(b) +y +Figure 11. +Charge locations (red circles), trajectories (blue lines), and pinning site +locations (black circles) for the system in Figs. 9 and 10 at FD = 1.5 for T/Tm = (a) +0.606 and (b) 1.03. + +Noise and Thermal Depinning of Wigner Crystals +16 +0 +0.01 +0.02 + +0 +0.01 +0.02 +FD +0 +2 +4 +6 +d/dFD +(a) +(b) +Figure 12. (a) ⟨V ⟩ vs FD for a system that exhibits elastic depinning at T/Tm = 0, +where Fp = 0.05. The different curves are for temperatures of T/Tm = 0, 0.0378, +0.0756, 0.17, 0.303, 0.606, and 1.03, from right to left. The dashed line is the expected +curve in the pin free limit. (b) The corresponding d⟨V ⟩/dFD vs FD curves. +sharper. This result shows that in the elastic flow regime, the narrow band noise signal +is more robust than in the plastic phase, and it appears once the system has depinned. +In Fig. 14 we plot S(ω) vs ω for the system in Fig. 13 at T/Tm = 0 and T/Tm = 0.303 +at a drive of FD = 0.02. At T/Tm = 0, there is a strong narrow band noise feature. +Interestingly, at T/Tm = 0.303, although the level of background noise has increased, +the primary narrow band noise peak is enhanced in power. The increase in the narrow +band peak occurs when thermal effects weaken the effectiveness of the pinning and allow +the charges to become better ordered. This effect is diminished in the case of strong +pinning. + +Noise and Thermal Depinning of Wigner Crystals +17 +10 +-10 +10 +-9 +10 +-8 +S(ω) +10 +-10 +10 +-9 +10 +-8 +S(ω) +10 +-10 +10 +-9 +10 +-8 +S(ω) +10 +-10 +10 +-9 +10 +-8 +10 +-7 +S(ω) +10 +0 +10 +1 +10 +2 +10 +3 +10 +4 +ω +10 +-11 +10 +-10 +10 +-9 +10 +-8 +S(ω) +10 +0 +10 +1 +10 +2 +10 +3 +10 +4 +ω +10 +-11 +10 +-10 +10 +-9 +10 +-8 +10 +-7 +S(ω) +(a) +(b) +(c) +(d) +(e) +(f) +Figure 13. +S(ω) vs ω for the system in Fig. 12 with Fp = 0.05 at T/Tm = 0.1515 +for FD = (a) 0.025, (b) 0.03, (c) 0.04, (d) 0.046, (e) 0.06, and (f) 0.01. +To better characterize the narrow band noise behavior for the system in Figs. 12 and +13, in Fig. 15 we plot the noise power S0 versus T/Tm for FD = 0.02 where the system is +always in a moving state at the narrow band peak of ω = 80 and the background noise +signal at ω = 300, along with the difference between these two noise powers. Unlike the +case for strong pinning, the power of the narrow band noise signal generally increases +with increasing T/Tm; however, the background noise power also increases, and the +amount of power in the two signals becomes equal near T/Tm = 1.0. The narrow band +noise peak has the greatest amount of additional power compared to the background +noise near T/Tm = 0.3. This is again due to thermal effects washing out any additional +avalanche-like motion and permitting the charge lattice to become better ordered. +6. Discussion +Narrow band noise has been observed experimentally in superconducting vortex [26, 28], +magnetic skyrmion [32], and charge density wave [4] systems, but has not been seen for +Wigner crystals. There have been reports of periodic noise in charge ordering systems +such as stripe or bubble forming states [33, 37]; however, this noise generally appears at +low frequencies and is probably not associated with the lattice-scale narrow band noise, + +Noise and Thermal Depinning of Wigner Crystals +18 +0 +200 +400 +600 +ω +0 +2×10 +-8 +4×10 +-8 +6×10 +-8 +S(ω) +Figure 14. +The power spectra S(ω) vs ω for the system in Fig. 13 with Fp = 0.05 +at FD = 0.02 in the moving phase for T/Tm = 0 (blue) and T/Tm = 0.303 (green). +At T/Tm = 0.303, although the overall background noise power is higher, there is an +enhancement of the narrow band noise signal. +but instead arises due to the motion of some other periodically moving macroscopic scale +structure. In the experiments of Brussarski et al. [56], the peak noise power decreased +with increasing temperature, similar to what we observe, but no narrow band noise signal +was observed. This could be the result of several possible factors. If the drive applied to +the system is not uniform, there could still be strong plastic flow at low drives; however, +at high drives the system may not form a uniformly ordered moving state but could +instead break into several locally ordered regions that are moving at different speeds. +Related to this, if the quenched disorder has a wide range of strength so that some of +the charges are moving while a small number remain pinned, a disordered flow regime +would emerge in which narrow band noise is absent. A narrow band noise signal could +also be masked by strong background noise. In this case, the signal could be boosted +by applying an additional ac drive. If the frequency of this ac drive is swept, phase +locking or Shapiro steps would appear when the frequency comes into resonance with +the narrow band signal [26]. Another possible issue is that the narrow band frequency +could be too high to detect with the available experimental setup; however, for a system +in the elastic depinning limit, fairly low frequency periodic signals could be generated in +the creep regime. The lack of experimentally observed narrow band noise may suggest + +Noise and Thermal Depinning of Wigner Crystals +19 +0 +0.5 +1 +T/Tm +0 +2×10 +-8 +4×10 +-8 +6×10 +-8 +8×10 +-8 +S0 +Figure 15. +The noise power S0 vs T/Tm for the system in Figs. 12 and 13 with +Fp = 0.05 at FD = 0.02 for the narrow band frequency of ω = 80 (green circles), the +background noise at ω = 300 (red squares), and the difference (blue triangles). +that elastic depinning of the Wigner crystal is not occurring and that the systems are +generally in the disordered or plastic flow regimes where the only available narrow band +noise signals are of the moving smectic type. In principle, we think that the best place +to look for a narrow band noise signature is in a sample with relatively weak pinning just +above the depinning threshold. In our work, we focused on samples that were entirely +within the elastic or plastic regimes; however, close to the transition between the elastic +and plastic regimes, the plastic flow noise may be enhanced. +7. Summary +We have investigated the thermally induced depinning and noise fluctuations for driven +Wigner crystal systems with quenched disorder. We identify an elastic regime in which +the charges maintain the same neighbors at depinning as well as a plastic regime in which +the system is broken up into moving and non-moving regions. In the plastic depinning +regime, the velocity noise has a 1/f shape and there is a peak in the noise power above +the depinning threshold at lower temperatures, while for large temperatures, the noise +power peak is reduced and the spectrum becomes white, in agreement with experiments. +For high drives at low temperatures in the plastic regime, the system forms a moving + +Noise and Thermal Depinning of Wigner Crystals +20 +smectic with a narrow band noise signal. We find that this narrow band signal persists +up to T/Tm = 0.75, where Tm is the temperature at which the charge lattice melts in the +absence of quenched disorder. In the elastic regime, the system remains ordered up to +temperatures approaching T/Tm = 1.0, although thermal effects reduce the depinning +threshold. In the elastic regime, 1/f noise appears only in the creep regime where there +are avalanches or jumps of motion, while in the sliding regime, pronounced narrow band +noise appears that reaches its lowest power at the disorder-free melting temperature. +Our results show that measurements of the velocity noise spectra and noise power can +be used in connection with transport curves to distinguish different phases of driven +Wigner crystals. +Acknowledgments +We gratefully acknowledge the support of the U.S. Department of Energy through +the LANL/LDRD program for this work. +This work was supported by the US +Department of Energy through the Los Alamos National Laboratory. +Los Alamos +National Laboratory is operated by Triad National Security, LLC, for the National +Nuclear Security Administration of the U. S. Department of Energy (Contract No. +892333218NCA000001). +[1] D. S. Fisher. Collective transport in random media: from superconductors to earthquakes. Phys. +Rep., 301:113–150, 1998. +[2] C. Reichhardt and C. J. Olson Reichhardt. +Depinning and nonequilibrium dynamic phases of +particle assemblies driven over random and ordered substrates: a review. +Rep. Prog. Phys., +80(2):026501, 2017. +[3] G. Gr¨uner, A. Zawadowski, and P. M. Chaikin. Nonlinear conductivity and noise due to charge- +density-wave depinning in NbSe3. Phys. Rev. Lett., 46:511–515, 1981. +[4] G. Gr¨uner. The dynamics of charge-density waves. Rev. Mod. Phys., 60:1129–1181, 1988. +[5] A. Pertsinidis and X. S. Ling. Statics and dynamics of 2D colloidal crystals in a random pinning +potential. Phys. Rev. Lett., 100:028303, 2008. +[6] T. Bohlein, J. Mikhael, and C. Bechinger. +Observation of kinks and antikinks in colloidal +monolayers driven across ordered surfaces. Nature Mater., 11(2):126–130, 2012. +[7] T. Schulz, R. Ritz, A. Bauer, M. Halder, M. Wagner, C. Franz, C. Pfleiderer, K. Everschor, +M. Garst, and A. Rosch. Emergent electrodynamics of skyrmions in a chiral magnet. Nature +Phys., 8(4):301–304, 2012. +[8] A. Vanossi, N. Manini, M. Urbakh, S. Zapperi, and E. Tosatti. Colloquium: Modeling friction: +From nanoscale to mesoscale. Rev. Mod. Phys., 85:529–552, 2013. +[9] C. Reichhardt and C. J. Olson. Colloidal dynamics on disordered substrates. Phys. Rev. Lett., +89:078301, 2002. +[10] N. Di Scala, E. Olive, Y. Lansac, Y. Fily, and J. C. Soret. +The elastic depinning transition of +vortex lattices in two dimensions. New J. Phys., 14:123027, 2012. +[11] Y. Fily, E. Olive, N. Di Scala, and J. C. Soret. Critical behavior of plastic depinning of vortex +lattices in two dimensions: Molecular dynamics simulations. Phys. Rev. B, 82:134519, 2010. +[12] S. Bhattacharya and M. J. Higgins. Dynamics of a disordered flux line lattice. Phys. Rev. Lett., +70:2617–2620, 1993. +[13] A. E. Koshelev and V. M. Vinokur. +Dynamic melting of the vortex lattice. +Phys. Rev. Lett., +73:3580–3583, 1994. + +Noise and Thermal Depinning of Wigner Crystals +21 +[14] K. Moon, R. T. Scalettar, and G. T. Zim´anyi. Dynamical phases of driven vortex systems. Phys. +Rev. Lett., 77:2778–2781, 1996. +[15] T. Giamarchi and P. Le Doussal. Moving glass phase of driven lattices. Phys. Rev. Lett., 76:3408– +3411, 1996. +[16] L. Balents, M. C. Marchetti, and L. Radzihovsky. Nonequilibrium steady states of driven periodic +media. Phys. Rev. B, 57:7705–7739, 1998. +[17] C. J. Olson, C. Reichhardt, and F. Nori. +Nonequilibrium dynamic phase diagram for vortex +lattices. Phys. Rev. Lett., 81:3757–3760, 1998. +[18] F. Pardo, F. de la Cruz, P. L. Gammel, E. Bucher, and D. J. Bishop. Observation of smectic and +moving-Bragg-glass phases in flowing vortex lattices. Nature, 396(6709):348–350, 1998. +[19] A. B. Kolton, D. Dom´ınguez, and N. Grønbech-Jensen. Hall noise and transverse freezing in driven +vortex lattices. Phys. Rev. Lett., 83:3061–3064, 1999. +[20] C. Reichhardt, D. Ray, and C. J. Olson Reichhardt. +Collective transport properties of driven +skyrmions with random disorder. Phys. Rev. Lett., 114:217202, 2015. +[21] M. C. Hellerqvist, D. Ephron, W. R. White, M. R. Beasley, and A. Kapitulnik. Vortex dynamics +in two-dimensional amorphous Mo77Ge23 films. Phys. Rev. Lett., 76:4022–4025, 1996. +[22] S. Ryu, M. Hellerqvist, S. Doniach, A. Kapitulnik, and D. Stroud. Dynamical phase transition in +a driven disordered vortex lattice. Phys. Rev. Lett., 77:5114–5117, 1996. +[23] M. B. Weissman. +1 +f noise and other slow, nonexponential kinetics in condensed matter. Rev. Mod. +Phys., 60:537–571, 1988. +[24] I. Bloom, A. C. Marley, and M. B. Weissman. Nonequilibrium dynamics of discrete fluctuators in +charge-density waves in NbSe3. Phys. Rev. Lett., 71:4385–4388, 1993. +[25] A. C. Marley, M. J. Higgins, and S. Bhattacharya. Flux flow noise and dynamical transitions in +a flux line lattice. Phys. Rev. Lett., 74:3029–3032, 1995. +[26] S. Okuma, J. Inoue, and N. Kokubo. Suppression of broadband noise at mode locking in driven +vortex matter. Phys. Rev. B, 76:172503, 2007. +[27] T. J. Bullard, J. Das, G. L. Daquila, and U. C. Tauber. Vortex washboard voltage noise in type-II +superconductors. Eur. Phys. J. B, 65(4):469–484, 2008. +[28] S. Okuma, K. Kashiro, Y. Suzuki, and N. Kokubo. Order-disorder transition of vortex matter in +a-MoxGe1−x films probed by noise. Phys. Rev. B, 77:212505, 2008. +[29] G. Liu, S. Rumyantsev, M. A. Bloodgood, T. T. Salguero, and A. A. Balandin. Low-frequency +current fluctuations and sliding of the charge density waves in two-dimensional materials. Nano +Lett., 18:3630–3636, 2018. +[30] S. A. D´ıaz, C. J. O. Reichhardt, D. P. Arovas, A. Saxena, and C. Reichhardt. Fluctuations and +noise signatures of driven magnetic skyrmions. Phys. Rev. B, 96:085106, 2017. +[31] K. Bennaceur, C. Lupien, B. Reulet, G. Gervais, L. N. Pfeiffer, and K. W. West. +Competing +charge density waves probed by nonlinear transport and noise in the second and third Landau +levels. Phys. Rev. Lett., 120:136801, 2018. +[32] T. Sato, W. Koshibae, A. Kikkawa, T. Yokouchi, H. Oike, Y. Taguchi, N. Nagaosa, Y. Tokura, +and F. Kagawa. +Slow steady flow of a skyrmion lattice in a confined geometry probed by +narrow-band resistance noise. Phys. Rev. B, 100:094410, 2019. +[33] J. Sun, J. Niu, Y. Li, Y. Liu, L. N. Pfeiffer, K. W. West, P. Wang, and X. Lin. Dynamic ordering +transitions in charged solid. Fund. Res., 2:178–183, 2022. +[34] S. Maegochi, K. Ienaga, and S. Okuma. Moving smectic phase and transverse mode locking in +driven vortex matter. Phys. Rev. Res., 4:033085, 2022. +[35] T. Sato, A. Kikkawa, Y. Taguchi, Y. Tokura, and F. Kagawa. Mode locking phenomena of the +current-induced skyrmion-lattice motion in microfabricated MnSi. Phys. Rev. B, 102:180411, +2020. +[36] G. A. Cs´athy, D. C. Tsui, L. N. Pfeiffer, and K. W. West. +Astability and negative differential +resistance of the Wigner solid. Phys. Rev. Lett., 98:066805, 2007. +[37] K. B. Cooper, J. P. Eisenstein, L. N. Pfeiffer, and K. W. West. +Observation of narrow-band + +Noise and Thermal Depinning of Wigner Crystals +22 +noise accompanying the breakdown of insulating states in high Landau levels. Phys. Rev. Lett., +90:226803, 2003. +[38] E. Wigner. On the interaction of electrons in metals. Phys. Rev., 46:1002–1011, 1934. +[39] P. Monceau. Electronic crystals: an experimental overview. Adv. Phys., 61(4):325–581, 2012. +[40] M. Shayegan. Wigner crystals in flat band 2D electron systems. Nature Rev. Phys., 4:212–213, +2022. +[41] E. Y. Andrei, G. Deville, D. C. Glattli, F. I. B. Williams, E. Paris, and B. Etienne. Observation +of a magnetically induced Wigner solid. Phys. Rev. Lett., 60:2765–2768, 1988. +[42] C. J. DaSilva, J. P. Rino, P. F. Damasceno, and E. Ya. Sherman. Two-dimensional Coulomb solid +with interaction anisotropy. Phys. Rev. B, 81:153307, 2010. +[43] V. J. Goldman, M Santos, M Shayegan, and J. E. Cunningham. +Evidence for two-dimentional +quantum Wigner crystal. Phys. Rev. Lett., 65:2189–2192, 1990. +[44] F. I. B. Williams, P. A. Wright, R. G. Clark, E. Y. Andrei, G. Deville, D. C. Glattli, O. Probst, +B. Etienne, C. Dorin, C. T. Foxon, and J. J. Harris. Conduction threshold and pinning frequency +of magnetically induced Wigner solid. Phys. Rev. Lett., 66:3285–3288, 1991. +[45] H. W. Jiang, H. L. Stormer, D. C. Tsui, L. N. Pfeiffer, and K. W. West. Magnetotransport studies +of the insulating phase around ν=1/5 Landau-level filling. Phys. Rev. B, 44:8107–8114, 1991. +[46] Y. P. Li, T. Sajoto, L. W. Engel, D. C. Tsui, and M. Shayegan. +Low-frequency noise in the +reentrant insulating phase around the 1/5 fractional quantum Hall liquid. +Phys. Rev. Lett., +67:1630–1633, 1991. +[47] Y. Kopelevich, R. R. da Silva, A. Rougier, and I. A. Luk’yanchuk. Charge ordering in amorphous +WOx films. Phys. Lett. A, 368:419–422, 2007. +[48] Md. S. Hossain, M. K. Ma, K. A. Villegas-Rosales, Y. J. Chung, L. N. Pfeiffer, K. W. West, K. W. +Baldwin, and M. Shayegan. Anisotropic two-dimensional disordered Wigner solid. Phys. Rev. +Lett., 129:036601, 2022. +[49] Y. Xu, S. Liu, D. A. Rhodes, K. Watanabe, T. Taniguchi, J. Hone, V. Elser, K. F. Mak, and +J. Shan. +Correlated insulating states at fractional fillings of moir`e superlattices. +Nature +(London), 587:214–218, 2020. +[50] H. Li, S. Li, E. C. Regan, D. Wang, W. Zhao, S. Kahn, K. Yumigeta, M. Blei, T. Taniguchi, +K. Watanabe, S. Tongay, A. Zettl, M. F. Crommie, and F. Wang. +Imaging two-dimensional +generalized Wigner crystals. Nature (London), 597:650–654, 2021. +[51] T. Smole´nski, P. E. Dolgirev, C. Kuhlenkamp, A. Popert, Y. Shimazaki, P. Back, X. Lu, M. Kroner, +K. Watanabe, T. Taniguchi, I. Esterlis, E. Demler, and A. Imamoglu. +Signatures of Wigner +crystal of electrons in a monolayer semiconductor. Nature (London), 595:53–57, 2021. +[52] Y. Zhou, J. Sung, E. Brutschea, I. Esterlis, Y. Wang, G. Scuri, R. J. Gelly, H. Heo, T. Taniguchi, +K. Watanabe, G. Zar´and, M. D. Lukin, P. Kim, E. Demler, and H. Park. Bilayer Wigner crystals +in a transition metal dichalcogenide heterostructure. Nature (London), 595:48–52, 2021. +[53] M. Matty and E.-A. Kim. Melting of generalized Wigner crystals in transition metal dichalcogenide +heterobilayer Moir´e systems. Nature Commun., 13:7098, 2022. +[54] J. Falson, I. Sodemann, B. Skinner, D. Tabrea, Y. Kozuka, A. Tsukazaki, M. Kawasaki, +K. von Klitzing, and J. H. Smet. +Competing correlated states around the zero-field Wigner +crystallization transition of electrons in two dimensions. Nature Mater., 21:311–316, 2022. +[55] C. Reichhardt, C. J. Olson, N. Grønbech-Jensen, and F. Nori. Moving Wigner glasses and smectics: +Dynamics of disordered Wigner crystals. Phys. Rev. Lett., 86:4354–4357, 2001. +[56] P. Brussarski, S. Li, S. V. Kravchenko, A. A. Shashkin, and M. P. Sarachik. Transport evidence +for a sliding two-dimensional quantum electron solid. Nature Commun., 9:3803, 2018. +[57] S. Bogdanovich and D. Popovi´c. Onset of glassy dynamics in a two-dimensional electron system +in silicon. Phys. Rev. Lett., 88:236401, 2002. +[58] J. Jaroszy´nski, D. Popovi´c, and T. M. Klapwijk. Universal behavior of the resistance noise across +the metal-insulator transition in silicon inversion layers. Phys. Rev. Lett., 89:276401, 2002. +[59] C. Reichhardt and C. J. Olson Reichhardt. Noise at the crossover from Wigner liquid to Wigner + +Noise and Thermal Depinning of Wigner Crystals +23 +glass. Phys. Rev. Lett., 93:176405, 2004. +[60] Y. P. Chen, G. Sambandamurthy, Z. H. Wang, R. M. Lewis, L. W. Engel, D. C. Tsui, P. D. Ye, +L. N. Pfeiffer, and K. W. West. Melting of a 2D quantum electron solid in high magnetic field. +Nat. Phys., 2(7):452–455, 2006. +[61] T. Knighton, Z. Wu, J. Huang, A. Serafin, J. S. Xia, L. N. Pfeiffer, and K. W. West. Evidence of +two-stage melting of Wigner solids. Phys. Rev. B, 97:085135, 2018. +[62] H. Deng, L. N. Pfeiffer, K. W. West, K. W. Baldwin, L. W. Engel, and M. Shayegan. Probing the +melting of a two-dimensional quantum Wigner crystal via its screening efficiency. Phys. Rev. +Lett., 122:116601, 2019. +[63] M. K. Ma, K. A. Villegas Rosales, H. Deng, Y. J. Chung, L. N. Pfeiffer, K. W. West, K. W. +Baldwin, R. Winkler, and M. Shayegan. Thermal and quantum melting phase diagrams for a +magnetic-field-induced Wigner solid. Phys. Rev. Lett., 125:036601, 2020. +[64] S. Kim, J. Bang, C. Lim, S. Y. Lee, J. Hyun, G. Lee, Y. Lee, J. D. Denlinger, S. Huh, C. Kim, +S. Y. Song, J. Seo, D. Thapa, S.-G. Kim, Y. H. Lee, Y. Kim, and S. W. Kim. Quantum electron +liquid and its possible phase transition. Nature Mater., 21:1269–1274, 2022. +[65] C. Reichhardt and C. J. O. Reichhardt. +Nonlinear dynamics, avalanches, and noise for driven +Wigner crystals. Phys. Rev. B, 106:235417, 2022. +[66] C. Reichhardt and C. J. O. Reichhardt. Melting, reentrant ordering and peak effect for Wigner +crystals with quenched and thermal disorder. 2022, arXiv:2211.11911. +[67] Q. Qian, J. Nakamura, S. Fallahi, G. C. Gardner, and M. J. Manfra. Possible nematic to smectic +phase transition in a two-dimensional electron gas at half-filling. +Nature Commun., 8:1536, +2017. +[68] M.-C. Cha and H. A. Fertig. Topological defects, orientational order, and depinning of the electron +solid in a random potential. Phys. Rev. B, 50:14368–14380, 1994. +[69] M.-C. Cha and H. A. Fertig. Disorder-induced phase transitions in two-dimensional crystals. Phys. +Rev. Lett., 74:4867–4870, 1995. +[70] G. Piacente and F. M. Peeters. Pinning and depinning of a classic quasi-one-dimensional Wigner +crystal in the presence of a constriction. Phys. Rev. B, 72:205208, 2005. +[71] C. Reichhardt and C. J. O. Reichhardt. Drive dependence of the Hall angle for a sliding Wigner +crystal in a magnetic field. Phys. Rev. B, 103:125107, 2021. + diff --git a/3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/load_file.txt b/3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..46786189e9ccee0b579273bb36f2a38373393fbd --- /dev/null +++ b/3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/load_file.txt @@ -0,0 +1,1386 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf,len=1385 +page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='11392v1 [cond-mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='mes-hall] 26 Jan 2023 Noise and Thermal Depinning of Wigner Crystals C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt Theoretical Division and Center for Nonlinear Studies, Los Alamos National Laboratory, Los Alamos, New Mexico 87545, USA 30 January 2023 Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We examine changes in the depinning threshold and conduction noise fluctuations for driven Wigner crystals in the presence of quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At low temperatures there is a well defined depinning threshold and a strong peak in the noise power with 1/f noise characteristics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At higher temperatures, the depinning threshold shifts to lower drives and the noise, which is also reduced in power, becomes more white in character.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At lower temperatures, a washboard frequency appears when the system depins elastically or forms a moving smectic state;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, this washboard signal is strongly reduced for higher temperatures and completely disappears above the melting temperature of a system without quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Our results are in good agreement with recent transport and noise studies for systems where electron crystal depinning is believed to arise, and also show how noise can be used to distinguish between crystal, glass, and liquid phases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Introduction When a collection of interacting particles is driven over quenched disorder, the system can exhibit a pinned phase, a depinning threshold, and a sliding phase [1, 2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The existence of these phases can be deduced from changes in transport measures such as the velocity-force and differential resistance curves [1, 2, 3, 4, 5, 6, 7, 8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' If the particles maintain the same neighbors during the depinning and sliding process, the depinning is considered elastic and is associated with specific scaling features in the velocity-force curves [1, 2, 9, 10], while if there is tearing or mixing of the particles, the behavior is plastic and can produce multiple steps or jumps in the transport curves [1, 2, 9, 11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In the sliding phase, there can also be dynamical transitions between different types of plastic flow or fluidlike flow, as well as dynamical ordering transitions where the driven particles move so rapidly over the substrate that the effectiveness of the pinning is reduced and a disordered system can organize into a moving crystal or smectic state [2, 12, 13, 14, 15, 16, 17, 18, 19, 20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' When thermal effects are included, additional behaviors can occur both during depinning and in the sliding states.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In general, sharp depinning thresholds become rounded due to thermal creep;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, a peak in the differential velocity can still arise near the T = 0 depinning threshold due to a transition from creep to sliding dynamics [1, 2, 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' If the temperature is higher Noise and Thermal Depinning of Wigner Crystals 2 than the melting temperature of the quenched disorder-free system, a system containing quenched disorder will always be in a disordered state, and can form a glass phase with thermal creep or a fluctuating liquid state at high drives [2, 13, 21, 22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Another method to examine the driven dynamics is to measure changes in the noise for systems in which time series of the velocity or density fluctuations can be obtained as a function of drive [2, 4, 17, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' One of the most common characterization techniques is to determine the power spectrum of the fluctuations and to measure the noise power over some frequency range.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For elastic depinning or ordered moving states where the particles maintain a fixed set of neighbors and travel at speed v, there is typically a narrow band noise signature containing peaks at specific frequencies ω = 2πv/a that are associated with the average spacing a between the particles [2, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Additional peaks appear at higher harmonics of these characteristic frequencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Narrow band noise signatures have been observed for sliding charge density waves [4], superconducting vortex lattices [17, 26, 27, 28, 34], moving charge crystals [33], and skyrmion systems [30, 35].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In some cases it is possible to observe multiple frequencies when the system is broken up into several large sections that locally behave elastically but globally provide multiple degrees of freedom, permitting switching behavior to occur [33, 36].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' If the depinning is strongly plastic, the narrow band noise signal is lost and is typically replaced by 1/f α noise with 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75 < α < 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 [2, 17, 25, 27, 28], while for a fluid the noise power is often low and the fluctuations have white noise characteristics with α = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In other cases, the fluctuations are Lorentizan and the noise has a 1/f shape at low frequencies but becomes white above a characteristic frequency ωc that is associated with the average time between collisions of particles with pinning sites [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Broad band 1/f noise has been observed near the depinning transition for superconducting vortices [2, 17, 25, 28], magnetic skyrmions [30, 32], and charge crystals [33, 37].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The noise measurements can also be used to identify a transition between different dynamical states such as plastic flow to dynamically ordered flow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In this case, 1/f noise occurs in the plastic flow phase just above depinning, but at higher drives there is a crossover to narrow band noise as dynamical ordering emerges [2, 17, 28, 30].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' These different noise features can be modified significantly when thermal effects become important [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Another example of an assembly of particle-like objects that can be coupled to quenched disorder and driven is electron crystals or Wigner crystals [38, 39, 40, 41, 42], where transport measures provide evidence for a conduction threshold that is consistent with the existence of a depinning transition [39, 40, 43, 44, 45, 46, 36, 47, 48].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Recently, a growing number of materials have been identified that can support Wigner crystals, such as moir`e superlattices [49, 50], transition metal dichalcogenide monolayers [51, 52, 53], and systems where Wigner crystals are stable at zero magnetic field [54].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' It would be interesting to examine conduction and noise measures as a function of drive and temperature in these new systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Previous experiments that showed evidence of a conduction threshold also revealed a large increase in the conduction noise just above depinning [46], and previous numerical studies of driven Wigner crystals also showed both a conduction threshold and 1/f noise features near depinning followed by a Noise and Thermal Depinning of Wigner Crystals 3 crossover to narrow band noise at higher drives [55].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Brussarski et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [56] examined the transport and noise of Wigner crystals near depinning as function of temperature, and found that at low temperature, there is a sharp depinning threshold that is correlated with a large peak in the noise power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Additionally, the noise near depinning is of 1/f 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75 form.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' As the temperature is increased, the depinning threshold shifts to lower values and the peak noise power is also reduced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This suggests that at higher temperature, the system forms a Wigner liquid in which the correlated motion associated with glassy or plastic flow phases and large noise power is lost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise studies have also been performed near the metal-insulator transition, which could be associated with a change from a Wigner glass to a Wigner liquid, and a drop in the noise power is observed at higher temperatures where a fluid phase may be present [57, 58].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Particle-based simulations across a Wigner glass to Wigner fluid crossover show high power 1/f α noise in the Wigner glass state and lower noise power with a white spectrum at higher temperatures in the fluid state [59].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Thermal effects and thermal melting in Wigner crystals have also been extensively studied [60, 61, 62, 63, 64], so it should be feasible to perform experimental noise and transport measures across a thermal melting transition while the system is being driven.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In this work, we consider thermally induced transport and noise measurements for a two-dimensional (2D) electron system driven over quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Previous work on this system focused on the T = 0 case, and showed that for plastic depinning, there is strong 1/f noise with a peak in the noise power near the depinning transition, followed by a drop in the noise power and a transition to white or narrow band noise at high driving where a moving smectic or moving crystal phase emerges [55, 65].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Here we find that as we increase the temperature, the depinning threshold decreases and the noise power drops, in agreement with experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Additionally, we find that the narrow band noise visible for T = 0 at high drives is strongly reduced at higher temperatures and vanishes above the temperature Tm at which the system melts in the absence of quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This suggests that narrow band noise signals may only be accessible at temperatures well below melting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We map out the dynamic phase diagram as a function of drive versus temperature and show that at Tm there is a divergence in the drive at which a transition to ordered or partially ordered flow occurs, similar to the dynamic phase diagram proposed by Koshelev and Vinokur for driven superconducting vortex systems [13, 22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For the case of elastic depinning, we find a thermally induced creep regime in which the lattice moves by one lattice constant at a time, and show that a narrow band signal can still arise even in the creep regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The spectral peaks become sharper and shift to higher frequencies with increasing drive, but the narrow band signature is lost with increasing temperature even before the system reaches the clean melting temperature Tm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise and Thermal Depinning of Wigner Crystals 4 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Simulation and System We model a 2D classical Wigner crystal with charge density n = Ne/L2, where Ne is the number of electrons and L is the system size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We employ periodic boundary conditions in the x and y directions, and the sample contains Np randomly placed pinning sites modeled as short range attractive wells with a density of np = Np/L2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Throughout this work we fix n = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='208 and np = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='25.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At T = 0 and in the absence of quenched disorder, the charges form a triangular lattice that has a well defined melting transition temperature Tm [66].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Additionally, when T = 0 there is a well defined quenched disorder strength above which the system disorders [66].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We represent the charges using a previously studied model [55, 67, 65, 66, 68, 69, 70, 71], where the equation of motion for charge i is αdvi = N � j ∇U(rij) + Fp + FD + FT i .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (1) Here αd is a damping term and Ui = q2/r is the long range Coulomb repulsion between charges of magnitude q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' As in previous work [55, 71], we employ a Lekner summation to evaluate the long range interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The second term on the right hand side represents pinning sites modeled as finite range parabolic traps that impart a maximum pinning force of Fp at radius rp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The thermal fluctuations are applied with the term FT , which has the following properties: ⟨F T⟩ = 0 and ⟨F T(ti)F T(t′ j)⟩ = 2kBTδijδ(t − t′).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The initial positions of the charges are obtained through simulated annealing at zero drive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Once the system has been initialized, we apply a driving force FD = FDˆx representing an applied voltage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The drive can be set to a constant value, in which case we wait for the system to reach a steady state before measuring the average velocity per charge ⟨V ⟩ = �Ne i vi · ˆx or obtaining a time series of the velocity to examine the temporal fluctuations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' By considering a range of drives and measuring the average velocity at each drive, we can create a current-voltage curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' If there is a magnetic field present, the changes experience an additional force qB × vi that can create a Hall angle for the electron motion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This effect is generally small and we neglect it in the present work, but we have studied it in detail elsewhere [71].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Elastic and Plastic Regimes In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 1 we plot the fraction P6 of six-fold coordinated charges versus temperature T/Tm for a system with no quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The melting temperature Tm is defined to be the temperature at which a proliferation of topological defects or non-sixfold coordinated charges occurs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, P6 is close to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, as expected for a triangular lattice, while for T/Tm > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, a large number of fivefold and sevenfold coordinated charges appear, causing P6 to drop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Once we have defined Tm by measuring a clean system, we introduce quenched disorder in order to study the conduction noise and transport response above and below Tm for varied disorder strengths Fp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We apply a constant drive with FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01 to Noise and Thermal Depinning of Wigner Crystals 5 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 T/Tm 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9 1 P6 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The average fraction of sixfold-coordinated charges P6 versus temperature T/Tm in a system with no quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tm is defined to be the temperature at which a proliferation of non-sixfold coordinated charges occurs in a clean system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' samples with different Fp and measure the time average velocity per charge ⟨V ⟩ over 4 × 106 simulation time steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' When Fp = 0, the charge velocity V0 is identical to the driving force, V0 = FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01, so a measurement of ⟨V ⟩/V0 = 1 indicates that the flow of the charges has reached the pin-free limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 2(a), where we plot ⟨V/V0⟩ versus Fp, at T/Tm = 0 there is a large drop in ⟨V ⟩/V0 near Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Figure 2(b) shows the corresponding values of P6 versus Fp, where for T/Tm = 0 there is a well defined transition from an ordered Wigner crystal to a disordered Wigner glass, and the proliferation of defects correlates with the velocity drop in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 2(a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='3, the overall velocity is higher than for the T/Tm = 0 sample due to the lowering of the effectiveness of the pinning by the thermal fluctuations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Additionally, the pinning strength required to disorder the system is shifted upward to a value close to Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='1, which is again due to the partial reduction of the pinning effectiveness by the thermal fluctuations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A similar trend occurs for T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6, where the velocity is higher.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, the system is disordered for all values of Fp and the velocity is even higher but has a gradual drop with increasing Fp, and the same trend occurs for T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A more detailed study of the general phase diagram for the disordered and ordered phases as a function of pinning strength versus temperature appears in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [66].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The results in Noise and Thermal Depinning of Wigner Crystals 6 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8 1 /V0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15 Fp 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9 1 P6 Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (a) The average charge velocity ⟨V ⟩/V0 vs pinning strength Fp at FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01, where V0 = FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01 is the average velocity in a disorder-free system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' T/Tm = 0 (dark blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='3 (light blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6 (green), 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03 (yellow) and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='38 (red).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (b) The corresponding P6 vs Fp showing that for T/Tm < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, there is a well defined pinning- induced order to disorder transition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 1 and Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 2 indicate that the system exhibits three distinct regimes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' These are an ordered or crystal regime containing sixfold-coordinated charges, which occurs at low temperatures or low pinning strengths;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' a disordered or plastic regime where the system has low mobility and is strongly affected by the pinning;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' and a high temperature fluid phase where the effectiveness of the pinning is reduced and the system is in a strongly fluctuating state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In terms of transport, in the presence of pinning the ordered state exhibits elastic depinning in which the charges maintain their same neighbors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The glass state undergoes plastic depinning, and the fluid state does not have a pinned phase but can still have a regime in which the charges are trapped for a time before thermally Noise and Thermal Depinning of Wigner Crystals 7 hopping out of the pinning sites.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Transport and Noise in the Plastic Regime We next examine the noise and transport in the three regimes identified above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We consider samples with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5, a pinning strength at which the charges are disordered for T/Tm = 0, so the system is in a strongly disordered glass phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The T/Tm = 0 plastic depinning that occurs in this regime was studied in detail in [66], where a pinned phase, a filamentary flow phase, a disordered flow phase, and a dynamically ordered moving smectic phase appear in sequence as a function of increasing drive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 3(a) we show a snapshot of the charge locations, pinning site locations, and trajectories in the plastic flow regime for FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15 at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15, where a portion of the charges are moving in a series of well defined channels, with occasional jumps between the channels when certain channels open or close again.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In general, for strong pinning, at low temperature the system exhibits channel flow just above depinning, similar to that studied in other systems at zero temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Figure 3(b) shows the same system at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 where there is a combination of channel flow and random thermal hopping, indicating that as the temperature increases, there is a transition from one-dimensional (1D) channels to two-dimensional (2D) flow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 3(c), at T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03 the motion is 2D and fluidlike.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For higher temperatures, the images look similar to what is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 3(c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4(a) we plot ⟨V ⟩ versus FD for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 3 at T/Tm = 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='21, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='81, and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For the lower temperatures, there is a well-defined depinning threshold followed by a nonlinear regime, while when T/Tm > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, the threshold is replaced by a creep regime and the nonlinear regime at higher drives persists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At the highest drives, all of the curves approach the pin-free limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4(b) we show the corresponding d⟨V ⟩/dFD versus FD curves, where for T/Tm ≥ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='21 there is a peak in d⟨V ⟩/dFD due to the S shape of the velocity-force curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Similar peaks in the differential conductivity were observed for driven superconducting vortices in the plastic flow regime [12, 17, 21, 22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='21, the peaks are lost and a creep regime appears.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The dashed line is the differential conductivity for the pin free system, and all of the curves approach this value at high drives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We note that for T/Tm = 0, at low drives there are a number of jumps in the conduction as well as a few regimes of negative differential conduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This arises due to a filamentary flow channel effect that is described in more detail in [65].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5, the jumps associated with the filamentary flow phase are lost and a single large peak in d⟨V ⟩/dFD appears in the plastic flow regime where there is a combination of moving and pinned charges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 5 we plot P6 versus FD for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4 for T/Tm = 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='757, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='91, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='21, and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 there is an initial dip in P6 at the onset of plastic flow, and at high drives where d⟨V ⟩/dFD starts to flatten, P6 approaches values of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9 or higher as the system forms a moving smectic phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In the moving smectic state, the charges move in well defined channels and a small number of dislocations are Noise and Thermal Depinning of Wigner Crystals 8 x (a) y x (b) y x (c) y Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Charge locations (red circles), trajectories (blue lines), and pinning site locations (black circles) for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 2 at FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15 and Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (a) Filamentary flow at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (b) Disordered flow with channels at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (c) T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' present that have their Burgers vectors aligned with the driving direction [2, 55, 65].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' As T/Tm increases further, the drive at which the smectic state emerges shifts to higher values of FD, and for T/Tm > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, the system no longer forms a moving smectic but instead becomes a moving fluid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' From the features in the transport curves and P6 plotted in Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4 and 5, we construct a dynamic phase diagram of the evolution of the different phases as a function of FD versus T/Tm in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At low drives we find a pinned or creep regime denoted C, where d⟨V ⟩/dFD < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The dynamically ordered moving smectic phase MS appears Noise and Thermal Depinning of Wigner Crystals 9 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8 1 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75 1 FD 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 d/dFD (a) (b) Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (a) Velocity ⟨V ⟩ vs drive FD for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 3 with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 (purple), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 (blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='91 (dark green), 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='21 (light green), 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='81 (orange), and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='42 (red).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (b) The corresponding d⟨V ⟩/dFD vs FD curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The dashed lines indicate the pin-free limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' when P6 > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The disordered regime is where the system is structurally disordered but moving, and it can be either a moving glass MG for T/Tm < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, or a moving liquid ML for T/Tm > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The overall features of the phase diagram are similar to those observed in driven superconducting vortex systems with quenched disorder, as first proposed by Koshelev and Vinokur [13], where the transition between the MG and MS states shifts to higher drives as T/Tm is approached.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [13], the transition line from the disordered to moving ordered phase was argued to be proportional to A/(Tm −T), where A is some prefactor and the moving ordered phase can be described in terms of having an effective temperature that is decreasing toward zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This picture assumes the formation of a Noise and Thermal Depinning of Wigner Crystals 10 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 2 FD 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8 1 P6 Figure 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P6 vs FD for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4 with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 at T/Tm = 0 (purple), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 (dark blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 (light blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='757 (green), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='91 (yellow), 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='21 (orange), and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='42 (red).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The system reaches an ordered state at high drives for T/Tm < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' moving crystal at high drive, and is somewhat modified in our system since the moving state we observe is a smectic in which the dynamic fluctuations are anisotropic [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We find that a better fit to the transition line in our case is (Tm − T)−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='7, which is likely due to the anisotropic nature of the moving smectic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Now that we have established the dynamic phase diagram as a function of drive versus temperature, we can ask how the velocity fluctuation power spectra change as a function of FD and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The power spectrum as a function of ω = 2πf can be calculated using the time series v(t) of the velocity fluctuations, S(ω) = ���� � v(t)e−iωt ���� 2 (2) At T = 0 the noise has a 1/f α signature with α ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8, in agreement with recent experiments [56].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The noise power is reduced at high drives and shows a crossover to a narrow band signature when the system forms a moving smectic phase;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, the experiments do not detect a narrow band noise signature at higher drives, suggesting that thermal effects could be coming into play.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 7 we plot power spectra of the velocity time series for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 6 at a drive of FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15 for T/Tm = 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm = 0, the Noise and Thermal Depinning of Wigner Crystals 11 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 T/Tm 0 1 2 3 4 FD MS ML MG C Figure 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dynamic phase diagram as a function of FD vs T/Tm for the system in Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 4 and 5 with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' There is a pinned or creep phase C (red), a disordered moving phase (blue) that is a moving glass, MG, at lower temperatures and a moving liquid, ML, at higher temperatures, and a moving smectic MS (green).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' low frequency noise has a 1/f α form, where the dashed line is a fit with α = −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='8, while at higher frequencies the noise tail has α = −2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5, the lower frequency noise power is reduced and α drops closer to α = 0, the value expected for white noise;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, the high frequency noise still has a 1/f 2 form.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For higher T/Tm, the low frequency noise power is further reduced while the higher frequency noise power is enhanced, and the spectrum becomes much whiter overall.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' To better characterize the system, we measure the noise power S0, which is the value of the spectral power integrated in a small window around a specific frequency ω = 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 8 we show S0 versus FD for T/Tm = 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03 on a log- linear plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T = 0 there is a large peak in S0 over the range 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01 < FD < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5, which corresponds to the appearance of 1/f 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='85 noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The noise is white for 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 < FD < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9, and for FD > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='9 a narrow band noise signal appears.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, there is still a peak in the noise near FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='2, but as the temperature increases, the peak power diminishes and the peak location shifts to lower drives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This is correlated with a whitening of the low frequency noise, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, the Noise and Thermal Depinning of Wigner Crystals 12 10 100 1000 ω 10 9 10 8 10 7 10 6 10 5 S(ω) Figure 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Power spectra S(ω) vs ω for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 6 with FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15 for T/Tm = 0 (dark blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 (light blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 (yellow), and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03 (red).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The spectral signature changes from 1/f to white at low frequencies as the temperature increases, while the amount of noise power at higher frequencies increases with increasing T .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' sharp noise power peak is lost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At large FD, we find that the noise power increases with increasing temperature due to the transition from flow through narrow 1D channels in the smectic state to a 2D Brownian like motion in the liquid state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The overall behavior of the noise power that we find is in agreement with experimental observations [56], where there is a large peak in the noise power near the depinning threshold at low temperatures, while for higher temperatures the noise power peak is reduced and shifts to lower drives before disappearing at sufficiently high temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Another feature that is also observed in the experiments is that the noise power increases with temperature at large drives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We next consider thermal effects in the high drive limit where the system forms a moving smectic at T = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9(a) we show S(ω) vs ω for the system from Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 6 at FD = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 and T/Tm = 0, where there are a series of peaks associated with a narrow band noise signature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9(b), there are still strong peaks associated with the narrow band noise but the higher harmonic peaks are strongly reduced in power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9(c) at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, the level of background noise has increased and the narrow band peaks are diminished in size, while at T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03 in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9(d), the Noise and Thermal Depinning of Wigner Crystals 13 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 2 FD 10 10 10 9 10 8 10 7 10 6 10 5 S0 Figure 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The noise power S0 at fixed ω = 20 vs FD for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 7 at FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15 for T/Tm = 0 (dark blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 (light blue), 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 (yellow), and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03 (red).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' moving smectic phase is lost and the narrow band peaks disappear into the background noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' To better characterize the change in the narrow band noise signature, in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 10 we plot the noise power S0 at ω = 323, which is the location of the most pronounced narrow band noise peak in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9(a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For T/Tm < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 there is a strong narrow band noise signal;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75 the narrow band noise level is close to the value of the background noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This suggests that thermal effects can strongly reduce the narrow band noise signal even at temperatures well below T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, which could explain why the narrow band noise signals are difficult to see in experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' To better understand the origins of the changes in the noise signals, in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 11(a) we plot the trajectories of the charges at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 where narrow band noise is present.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The system is still in a moving smectic state but the channels have been broadened by the thermal fluctuations, and there are several regions in which the channel structures are starting to break down.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Figure 11(b) shows the trajectories for T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='07, where the 1D channel structure is lost, there is a significant amount of transverse diffusion, and the narrow band noise peaks disappear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This result indicates that the narrow band noise occurs only when the motion of the charges is mostly 1D in character.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise and Thermal Depinning of Wigner Crystals 14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 S(ω) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 S(ω) 0 1000 2000 3000 ω 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 S(ω) 0 1000 2000 3000 4000 5000 ω 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0×10 5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5×10 5 S(ω) (a) (b) (c) (d) Figure 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S(ω) vs ω for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 6 at FD = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 where the system is in the moving smectic phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' T/Tm = (a) 0, (b) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, (c) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, and (d) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Thermal Depinning Noise in the Elastic Regime We next consider the thermal depinning and noise in the elastic regime where the charges maintain their same neighbors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' From Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 2 we select a value of Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05, well below the T/Tm = 0 disordering threshold of Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='075.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12(a) we show ⟨V ⟩ versus FD at Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05 for T/Tm = 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0378, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0756, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='17, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, and we plot the corresponding d⟨V ⟩/dFD curves in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12(b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' As T/Tm increases, the depinning threshold shifts to lower FD, and in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12(b), the peak in d⟨V ⟩/dFD that appears for T = 0 is lost for T/Tm > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We note that the system remains in an ordered state up to T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0 for all values of FD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The d⟨V ⟩/dFD curves also show a multiple peak feature at high temperatures, with one peak at the finite temperature threshold and a second peak near the T = 0 depinning threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In between these two peaks, the flow is creep-like in nature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 13 we plot S(ω) versus ω for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12 at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='1515 for different values of FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='025, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='04, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='046, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='06, and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='025, the motion occurs mostly in the form of avalanches, and no clear narrow band signatures are present but the low frequency noise has high power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, the system starts to develop a narrow band noise signature that sharpens with increasing drive, and for FD ≥ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='06, which is above the zero temperature depinning threshold, the low frequency noise is strongly suppressed and the narrow band noise peaks become much Noise and Thermal Depinning of Wigner Crystals 15 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 T/Tm 1×10 5 S0 Figure 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The value of the noise power S0 at ω = 323, the frequency of the largest narrow band noise peak in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9, vs T/Tm for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 8 with FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Here the narrow band noise peaks are lost near T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' x (a) y x (b) y Figure 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Charge locations (red circles), trajectories (blue lines), and pinning site locations (black circles) for the system in Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 9 and 10 at FD = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 for T/Tm = (a) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606 and (b) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise and Thermal Depinning of Wigner Crystals 16 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='02 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='02 FD 0 2 4 6 d/dFD (a) (b) Figure 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (a) ⟨V ⟩ vs FD for a system that exhibits elastic depinning at T/Tm = 0, where Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The different curves are for temperatures of T/Tm = 0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0378, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0756, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='17, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='606, and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, from right to left.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The dashed line is the expected curve in the pin free limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' (b) The corresponding d⟨V ⟩/dFD vs FD curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' sharper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This result shows that in the elastic flow regime, the narrow band noise signal is more robust than in the plastic phase, and it appears once the system has depinned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 14 we plot S(ω) vs ω for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 13 at T/Tm = 0 and T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 at a drive of FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At T/Tm = 0, there is a strong narrow band noise feature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Interestingly, at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, although the level of background noise has increased, the primary narrow band noise peak is enhanced in power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The increase in the narrow band peak occurs when thermal effects weaken the effectiveness of the pinning and allow the charges to become better ordered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This effect is diminished in the case of strong pinning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise and Thermal Depinning of Wigner Crystals 17 10 10 10 9 10 8 S(ω) 10 10 10 9 10 8 S(ω) 10 10 10 9 10 8 S(ω) 10 10 10 9 10 8 10 7 S(ω) 10 0 10 1 10 2 10 3 10 4 ω 10 11 10 10 10 9 10 8 S(ω) 10 0 10 1 10 2 10 3 10 4 ω 10 11 10 10 10 9 10 8 10 7 S(ω) (a) (b) (c) (d) (e) (f) Figure 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S(ω) vs ω for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12 with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05 at T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='1515 for FD = (a) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='025, (b) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='03, (c) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='04, (d) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='046, (e) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='06, and (f) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='01.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' To better characterize the narrow band noise behavior for the system in Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12 and 13, in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 15 we plot the noise power S0 versus T/Tm for FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='02 where the system is always in a moving state at the narrow band peak of ω = 80 and the background noise signal at ω = 300, along with the difference between these two noise powers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Unlike the case for strong pinning, the power of the narrow band noise signal generally increases with increasing T/Tm;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, the background noise power also increases, and the amount of power in the two signals becomes equal near T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The narrow band noise peak has the greatest amount of additional power compared to the background noise near T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This is again due to thermal effects washing out any additional avalanche-like motion and permitting the charge lattice to become better ordered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Discussion Narrow band noise has been observed experimentally in superconducting vortex [26, 28], magnetic skyrmion [32], and charge density wave [4] systems, but has not been seen for Wigner crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' There have been reports of periodic noise in charge ordering systems such as stripe or bubble forming states [33, 37];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, this noise generally appears at low frequencies and is probably not associated with the lattice-scale narrow band noise, Noise and Thermal Depinning of Wigner Crystals 18 0 200 400 600 ω 0 2×10 8 4×10 8 6×10 8 S(ω) Figure 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The power spectra S(ω) vs ω for the system in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 13 with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05 at FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='02 in the moving phase for T/Tm = 0 (blue) and T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303 (green).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' At T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='303, although the overall background noise power is higher, there is an enhancement of the narrow band noise signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' but instead arises due to the motion of some other periodically moving macroscopic scale structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In the experiments of Brussarski et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [56], the peak noise power decreased with increasing temperature, similar to what we observe, but no narrow band noise signal was observed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This could be the result of several possible factors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' If the drive applied to the system is not uniform, there could still be strong plastic flow at low drives;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, at high drives the system may not form a uniformly ordered moving state but could instead break into several locally ordered regions that are moving at different speeds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Related to this, if the quenched disorder has a wide range of strength so that some of the charges are moving while a small number remain pinned, a disordered flow regime would emerge in which narrow band noise is absent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A narrow band noise signal could also be masked by strong background noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In this case, the signal could be boosted by applying an additional ac drive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' If the frequency of this ac drive is swept, phase locking or Shapiro steps would appear when the frequency comes into resonance with the narrow band signal [26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Another possible issue is that the narrow band frequency could be too high to detect with the available experimental setup;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, for a system in the elastic depinning limit, fairly low frequency periodic signals could be generated in the creep regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The lack of experimentally observed narrow band noise may suggest Noise and Thermal Depinning of Wigner Crystals 19 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='5 1 T/Tm 0 2×10 8 4×10 8 6×10 8 8×10 8 S0 Figure 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The noise power S0 vs T/Tm for the system in Figs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 12 and 13 with Fp = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='05 at FD = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='02 for the narrow band frequency of ω = 80 (green circles), the background noise at ω = 300 (red squares), and the difference (blue triangles).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' that elastic depinning of the Wigner crystal is not occurring and that the systems are generally in the disordered or plastic flow regimes where the only available narrow band noise signals are of the moving smectic type.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In principle, we think that the best place to look for a narrow band noise signature is in a sample with relatively weak pinning just above the depinning threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In our work, we focused on samples that were entirely within the elastic or plastic regimes;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' however, close to the transition between the elastic and plastic regimes, the plastic flow noise may be enhanced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Summary We have investigated the thermally induced depinning and noise fluctuations for driven Wigner crystal systems with quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We identify an elastic regime in which the charges maintain the same neighbors at depinning as well as a plastic regime in which the system is broken up into moving and non-moving regions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In the plastic depinning regime, the velocity noise has a 1/f shape and there is a peak in the noise power above the depinning threshold at lower temperatures, while for large temperatures, the noise power peak is reduced and the spectrum becomes white, in agreement with experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' For high drives at low temperatures in the plastic regime, the system forms a moving Noise and Thermal Depinning of Wigner Crystals 20 smectic with a narrow band noise signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' We find that this narrow band signal persists up to T/Tm = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='75, where Tm is the temperature at which the charge lattice melts in the absence of quenched disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In the elastic regime, the system remains ordered up to temperatures approaching T/Tm = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='0, although thermal effects reduce the depinning threshold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' In the elastic regime, 1/f noise appears only in the creep regime where there are avalanches or jumps of motion, while in the sliding regime, pronounced narrow band noise appears that reaches its lowest power at the disorder-free melting temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Our results show that measurements of the velocity noise spectra and noise power can be used in connection with transport curves to distinguish different phases of driven Wigner crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Acknowledgments We gratefully acknowledge the support of the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Department of Energy through the LANL/LDRD program for this work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' This work was supported by the US Department of Energy through the Los Alamos National Laboratory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Los Alamos National Laboratory is operated by Triad National Security, LLC, for the National Nuclear Security Administration of the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Department of Energy (Contract No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 892333218NCA000001).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [1] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fisher.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Collective transport in random media: from superconductors to earthquakes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 301:113–150, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [2] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olson Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Depinning and nonequilibrium dynamic phases of particle assemblies driven over random and ordered substrates: a review.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 80(2):026501, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [3] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Gr¨uner, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zawadowski, and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Chaikin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nonlinear conductivity and noise due to charge- density-wave depinning in NbSe3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 46:511–515, 1981.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [4] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Gr¨uner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The dynamics of charge-density waves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 60:1129–1181, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [5] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pertsinidis and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Statics and dynamics of 2D colloidal crystals in a random pinning potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 100:028303, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [6] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bohlein, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Mikhael, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bechinger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Observation of kinks and antikinks in colloidal monolayers driven across ordered surfaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 11(2):126–130, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [7] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Schulz, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ritz, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bauer, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Halder, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wagner, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Franz, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfleiderer, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Everschor, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Garst, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rosch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Emergent electrodynamics of skyrmions in a chiral magnet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 8(4):301–304, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Vanossi, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Manini, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Urbakh, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zapperi, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tosatti.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Colloquium: Modeling friction: From nanoscale to mesoscale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 85:529–552, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [9] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Colloidal dynamics on disordered substrates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 89:078301, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [10] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Di Scala, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olive, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lansac, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fily, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Soret.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' The elastic depinning transition of vortex lattices in two dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' New J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 14:123027, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [11] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fily, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olive, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Di Scala, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Soret.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Critical behavior of plastic depinning of vortex lattices in two dimensions: Molecular dynamics simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 82:134519, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [12] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bhattacharya and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Higgins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dynamics of a disordered flux line lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 70:2617–2620, 1993.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [13] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Koshelev and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Vinokur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dynamic melting of the vortex lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 73:3580–3583, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise and Thermal Depinning of Wigner Crystals 21 [14] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Moon, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Scalettar, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zim´anyi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dynamical phases of driven vortex systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 77:2778–2781, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [15] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Giamarchi and P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Le Doussal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Moving glass phase of driven lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 76:3408– 3411, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [16] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Balents, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Marchetti, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Radzihovsky.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nonequilibrium steady states of driven periodic media.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 57:7705–7739, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [17] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olson, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nori.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nonequilibrium dynamic phase diagram for vortex lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 81:3757–3760, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [18] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pardo, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' de la Cruz, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Gammel, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bucher, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bishop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Observation of smectic and moving-Bragg-glass phases in flowing vortex lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature, 396(6709):348–350, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [19] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kolton, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dom´ınguez, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Grønbech-Jensen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Hall noise and transverse freezing in driven vortex lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 83:3061–3064, 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [20] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ray, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olson Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Collective transport properties of driven skyrmions with random disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 114:217202, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [21] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Hellerqvist, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ephron, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' White, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Beasley, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kapitulnik.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Vortex dynamics in two-dimensional amorphous Mo77Ge23 films.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 76:4022–4025, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [22] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ryu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Hellerqvist, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Doniach, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kapitulnik, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Stroud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dynamical phase transition in a driven disordered vortex lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 77:5114–5117, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [23] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Weissman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 1 f noise and other slow, nonexponential kinetics in condensed matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 60:537–571, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [24] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bloom, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Marley, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Weissman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nonequilibrium dynamics of discrete fluctuators in charge-density waves in NbSe3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 71:4385–4388, 1993.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [25] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Marley, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Higgins, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bhattacharya.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Flux flow noise and dynamical transitions in a flux line lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 74:3029–3032, 1995.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [26] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Okuma, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Inoue, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kokubo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Suppression of broadband noise at mode locking in driven vortex matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 76:172503, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [27] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bullard, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Das, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Daquila, and U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tauber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Vortex washboard voltage noise in type-II superconductors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 65(4):469–484, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [28] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Okuma, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kashiro, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Suzuki, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kokubo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Order-disorder transition of vortex matter in a-MoxGe1−x films probed by noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 77:212505, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [29] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Liu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rumyantsev, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bloodgood, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Salguero, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Balandin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Low-frequency current fluctuations and sliding of the charge density waves in two-dimensional materials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nano Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 18:3630–3636, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [30] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' D´ıaz, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Arovas, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Saxena, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fluctuations and noise signatures of driven magnetic skyrmions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 96:085106, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [31] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bennaceur, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lupien, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reulet, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Gervais, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Competing charge density waves probed by nonlinear transport and noise in the second and third Landau levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 120:136801, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [32] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sato, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Koshibae, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kikkawa, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Yokouchi, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Oike, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Taguchi, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nagaosa, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tokura, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kagawa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Slow steady flow of a skyrmion lattice in a confined geometry probed by narrow-band resistance noise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 100:094410, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [33] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sun, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Niu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Li, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Liu, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wang, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dynamic ordering transitions in charged solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fund.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 2:178–183, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [34] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Maegochi, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ienaga, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Okuma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Moving smectic phase and transverse mode locking in driven vortex matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 4:033085, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [35] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sato, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kikkawa, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Taguchi, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tokura, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kagawa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Mode locking phenomena of the current-induced skyrmion-lattice motion in microfabricated MnSi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 102:180411, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [36] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Cs´athy, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tsui, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Astability and negative differential resistance of the Wigner solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 98:066805, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [37] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Cooper, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Eisenstein, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Observation of narrow-band Noise and Thermal Depinning of Wigner Crystals 22 noise accompanying the breakdown of insulating states in high Landau levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 90:226803, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [38] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wigner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' On the interaction of electrons in metals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 46:1002–1011, 1934.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [39] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Monceau.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Electronic crystals: an experimental overview.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 61(4):325–581, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [40] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shayegan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wigner crystals in flat band 2D electron systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 4:212–213, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [41] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Andrei, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Deville, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Glattli, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Williams, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Paris, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Etienne.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Observation of a magnetically induced Wigner solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 60:2765–2768, 1988.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [42] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' DaSilva, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rino, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Damasceno, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ya.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sherman.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Two-dimensional Coulomb solid with interaction anisotropy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 81:153307, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [43] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Goldman, M Santos, M Shayegan, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Cunningham.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Evidence for two-dimentional quantum Wigner crystal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 65:2189–2192, 1990.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [44] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Williams, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wright, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Clark, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Andrei, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Deville, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Glattli, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Probst, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Etienne, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dorin, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Foxon, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Harris.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Conduction threshold and pinning frequency of magnetically induced Wigner solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 66:3285–3288, 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [45] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Jiang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Stormer, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tsui, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Magnetotransport studies of the insulating phase around ν=1/5 Landau-level filling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 44:8107–8114, 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [46] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Li, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sajoto, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Engel, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tsui, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shayegan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Low-frequency noise in the reentrant insulating phase around the 1/5 fractional quantum Hall liquid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 67:1630–1633, 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [47] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kopelevich, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' da Silva, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rougier, and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Luk’yanchuk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Charge ordering in amorphous WOx films.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A, 368:419–422, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [48] Md.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Hossain, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ma, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Villegas-Rosales, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Chung, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Baldwin, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shayegan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Anisotropic two-dimensional disordered Wigner solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 129:036601, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [49] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Xu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Liu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rhodes, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Watanabe, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Taniguchi, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Hone, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Elser, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Mak, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Correlated insulating states at fractional fillings of moir`e superlattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature (London), 587:214–218, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [50] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Li, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Li, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Regan, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wang, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zhao, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kahn, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Yumigeta, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Blei, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Taniguchi, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Watanabe, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tongay, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zettl, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Crommie, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wang.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Imaging two-dimensional generalized Wigner crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature (London), 597:650–654, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [51] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Smole´nski, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Dolgirev, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kuhlenkamp, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Popert, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shimazaki, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Back, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lu, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kroner, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Watanabe, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Taniguchi, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Esterlis, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Demler, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Imamoglu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Signatures of Wigner crystal of electrons in a monolayer semiconductor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature (London), 595:53–57, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [52] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zhou, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sung, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Brutschea, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Esterlis, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Scuri, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Gelly, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Heo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Taniguchi, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Watanabe, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Zar´and, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lukin, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Demler, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Park.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bilayer Wigner crystals in a transition metal dichalcogenide heterostructure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature (London), 595:48–52, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [53] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Matty and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='-A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Melting of generalized Wigner crystals in transition metal dichalcogenide heterobilayer Moir´e systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 13:7098, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [54] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Falson, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sodemann, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Skinner, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tabrea, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kozuka, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tsukazaki, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kawasaki, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' von Klitzing, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Smet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Competing correlated states around the zero-field Wigner crystallization transition of electrons in two dimensions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 21:311–316, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [55] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olson, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Grønbech-Jensen, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nori.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Moving Wigner glasses and smectics: Dynamics of disordered Wigner crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 86:4354–4357, 2001.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [56] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Brussarski, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Li, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kravchenko, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shashkin, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sarachik.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Transport evidence for a sliding two-dimensional quantum electron solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 9:3803, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [57] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bogdanovich and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Popovi´c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Onset of glassy dynamics in a two-dimensional electron system in silicon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 88:236401, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [58] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Jaroszy´nski, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Popovi´c, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Klapwijk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Universal behavior of the resistance noise across the metal-insulator transition in silicon inversion layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 89:276401, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [59] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Olson Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Noise at the crossover from Wigner liquid to Wigner Noise and Thermal Depinning of Wigner Crystals 23 glass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 93:176405, 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [60] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Chen, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Sambandamurthy, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wang, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lewis, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Engel, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Tsui, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ye, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Melting of a 2D quantum electron solid in high magnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 2(7):452–455, 2006.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [61] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Knighton, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Wu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Huang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Serafin, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Xia, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Evidence of two-stage melting of Wigner solids.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 97:085135, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [62] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Deng, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Baldwin, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Engel, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shayegan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Probing the melting of a two-dimensional quantum Wigner crystal via its screening efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 122:116601, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [63] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Ma, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Villegas Rosales, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Deng, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Chung, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pfeiffer, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' West, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Baldwin, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Winkler, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Shayegan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Thermal and quantum melting phase diagrams for a magnetic-field-induced Wigner solid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 125:036601, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [64] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Bang, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lim, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lee, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Hyun, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lee, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lee, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Denlinger, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Huh, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Song, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Seo, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Thapa, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='-G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lee, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Kim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Quantum electron liquid and its possible phase transition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 21:1269–1274, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [65] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nonlinear dynamics, avalanches, and noise for driven Wigner crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 106:235417, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [66] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Melting, reentrant ordering and peak effect for Wigner crystals with quenched and thermal disorder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' 2022, arXiv:2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='11911.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [67] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Qian, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nakamura, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fallahi, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Gardner, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Manfra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Possible nematic to smectic phase transition in a two-dimensional electron gas at half-filling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Nature Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 8:1536, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [68] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='-C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Cha and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fertig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Topological defects, orientational order, and depinning of the electron solid in a random potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 50:14368–14380, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [69] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content='-C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Cha and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Fertig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Disorder-induced phase transitions in two-dimensional crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=', 74:4867–4870, 1995.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [70] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Piacente and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Peeters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Pinning and depinning of a classic quasi-one-dimensional Wigner crystal in the presence of a constriction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 72:205208, 2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' [71] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Reichhardt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Drive dependence of the Hall angle for a sliding Wigner crystal in a magnetic field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} +page_content=' B, 103:125107, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/3tFIT4oBgHgl3EQf6Cuj/content/2301.11392v1.pdf'} diff --git a/59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf b/59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..f188796331467179cb2efb3f38fda1b112c302e9 --- /dev/null +++ b/59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6c08fddbe9fd8a833a2f9eaefff0d413bc28b0fea5d7cef8c7f9cdd63e6d872b +size 3309581 diff --git a/59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss b/59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..a4e2481a98e36024f5839f45ed0c28e129064c91 --- /dev/null +++ b/59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f7752b589ffadaba691b18ccb9a6662e2b6a7a2f73aacfa5f774ba1be99c4e02 +size 1835053 diff --git a/59AyT4oBgHgl3EQfcfe1/vector_store/index.pkl b/59AyT4oBgHgl3EQfcfe1/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..9f2c616a33c22ab5f29c5162cf70e797a42c4ddd --- /dev/null +++ b/59AyT4oBgHgl3EQfcfe1/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f1604784afc6223526c01d326b0144a6a6fa46e4026bfd07aba6b86adea52751 +size 67501 diff --git a/59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss b/59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..a48cff834c38e3f4b3ab403aac0286815e2f5f51 --- /dev/null +++ b/59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:036c2489b2309ed738d85389271ee73aa43b9cbc65f40e748e05935619718022 +size 3932205 diff --git a/5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf b/5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf new file mode 100644 index 0000000000000000000000000000000000000000..30954f0a7b582a30e4fd031fe1c97b6174ef41b8 --- /dev/null +++ b/5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6f23037ce4f2ae6c10957851cc04ef12e3de5ebc98ab4d2189b254420cf8adc2 +size 20155402 diff --git a/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/2301.02620v1.pdf.txt b/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/2301.02620v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..9d081746b7932d0fbd19474d9b31245275baa766 --- /dev/null +++ b/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/2301.02620v1.pdf.txt @@ -0,0 +1,717 @@ +Information Flow Tracking Methods for Protecting +Cyber-Physical Systems against Hardware Trojans +- a Survey - +Sofia Maragkou +Institute of Computer Technology, TU Wien +Vienna University of Technology +Gusshausstr. 27–29 / 384, 1040 Wien, Austria +sofia.maragkou@tuwien.ac.at +Axel Jantsch +Institute of Computer Technology, TU Wien +Vienna University of Technology +Gusshausstr. 27–29 / 384, 1040 Wien, Austria +axel.jantsch@tuwien.ac.at +Abstract—Cyber-physical systems (CPS) provide profitable +surfaces for hardware attacks such as hardware Trojans. Hard- +ware Trojans can implement stealthy attacks such as leaking +critical information, taking control of devices or harm humans. +In this article we review information flow tracking (IFT) methods +for protecting CPS against hardware Trojans, and discuss their +current limitations. IFT methods are a promising approach for +the detection of hardware Trojans in complex systems because the +detection mechanism does not necessarily rely on potential Trojan +behavior. However, in order to maximize the benefits research +should focus more on black-box design models and consider real- +world attack scenarios. +Index Terms—hardware Trojans, detection, hardware security, +real hardware attacks, information flow tracking, cyber-physical +production systems, cyber-physical systems +I. INTRODUCTION +Hardware security began facing desultory challenges much +later than software [1]. In 1996 a timing attack was published +[2] based on which sensitive information could be leaked from +a cryptographic component. After this point, hardware security +research became more systematic. From 2005 on [1, 3] the +field of hardware security has gained ground in the academic +and the industrial world because it breaks the chain of trust +known so far. +This chain of trust, from the hardware security perspective, +begins at the integrated circuit (IC) supply chain, where +security vulnerabilities are formed by the needs of the market +for fast and cheap technology. The involvement of external en- +tities in the design process and the internationally outsourced +fabrication can create security breaches that can be even +relevant for national security. Design houses, in order to stay +competitive, purchase third-party intellectual property (3PIP) +cores from vendors and outsource the fabrication process +without always verifying the returned product with respect +to hardware security breaches. The reason for that is that the +verification of the purchased cores is an expensive process that +requires resources and time. Those intellectual property (IP) +cores or chips are integrated and distributed to the customers. +Consequently, hardware security has to deal with attacks like +IP piracy, reverse engineering, counterfeit chips and hardware +Trojans. +In a real world scenario, when an IP core is being purchased, +the design house requests some design specification and the +3PIP core vendor replies with the IP core and the specifications +of the IP core. Throughout this information exchange, the only +trusted part is the specification requested by the design house. +The core in return, is considered untrusted and it is treated +as black box. Information flow tracking (IFT) methods are +a promising research direction for the detection of hardware +Trojans because the verification can be based on the security +specification of the application and not only on potentially +malicious designs. Thus, the verification methods can be +adapted based on the application. In addition, those methods +can be flexible regarding new attacks, and can be expandable +in case of the alteration of the security specifications. +A. Known Real World Attacks +The real world hardware attacks are much more complicated +than the attacks developed by the research community, since +real world attacks interact with different layers of the comput- +ing system and communicate with external systems over long +distance. Compared to software, real world hardware attacks +are less frequent. The information that is publicly available +about real world attacks is limited and specific details are +rarely known to the public. +The real world attack that received most attention is the +2007 attack on a Syrian military radar [4, 5]. Even though +the details were not officially revealed, all the indications +suggest that the radar at a nuclear installation in Syria has +been tampered. The attack took place in September 2007 and +the nuclear installation was completely destroyed by Israeli +bombing jets. The Israeli jets, took off from southern Israel, +crossed the Mediterranean Sea and the Syrian-Turkish borders +and returned four hours later. The state of the art radars did not +detect the jets, which raised suspicions for malicious alteration +of their functionality. Adee [4] suspects a kill-switch or a +backdoor in the off-the-shelf microprocessor that could block +a bombing radar by an apparently remote command (trigger) +arXiv:2301.02620v1 [cs.CR] 27 Nov 2022 + +without shutting down the whole system. The difference of +a kill switch and a backdoor is that the kill switch will shut +off a specific chip when triggered, but a backdoor requires +an intruder to implement the same effect. The hypothesis of +the kill switch is more likely and, in order to be implemented, +requires the injection of extra logic. The HW and SW overhead +for such an attack is very small which makes it hard to +detect during testing, and the threat models discussed are +the malicious designer and the malicious manufacturer. The +microprocessor used remains unknown. This is not the only +occasion where microprocessors including a kill switch have +supposedly been used. According to anonymous sources from +U.S defense department, it is known that a European chip +maker is building microprocessors with a kill switch, and the +French defense uses this technology for military applications. +Undocumented microchips were found in the servers assem- +bled by Supermicro [6, 7], that implemented a doorway to the +network of the original system, which incorporated memory, +networking capacity and processing power. The attack aimed +at leaking sensitive information over a long term. +Stuxnet attack provides an example of the real world attack +capabilities in the industrial environment [8]. Stuxnet is a +worm that was introduced in the Microsoft Windows operating +systems and it was targeting specific industrial control systems +of Siemens which were used in Iran to run centrifuges. Until +the target was found the worm was updating itself. The worm +was compromising the targeted system by exploiting ’zero- +day’ vulnerabilities. After monitoring the operation, the worm +was taking the control of the control system and it ran the +centrifuges to the point of failure, returning false feedback to +cover the failure until the damage was irreversible. +Hybrid attacks are very common in real world scenar- +ios. The hybrid attacks can include hardware, software and +firmware parts. Such an attack can be malicious software that +exploits vulnerabilities of the hardware, damaging physical +resources such as Stuxnet [8]. +B. Cyber-Physical Production Systems +Cyber-physical systems (CPS) are sophisticated systems that +combine physical and cyber units. They are used in many +different applications and they are the fundamental units of +the internet of things (IoT) . Their functionality is based on +the information exchange and the interaction with each other. +According to the [9], the nature of the CPS makes them +particularly sensitive to attacks, due to their heterogeneous +nature, their reliance on data and their large scale. +When those systems are integrated in the production envi- +ronment then we refer to them as cyber-physical production +systems (CPPS). Often, CPPS expose a profitable surface to +adversaries for hardware Trojan introduction, because they are +complex, sophisticated structures that manage sensitive infor- +mation with extend communication among them, which facili- +tates malicious functionality to stay hidden. Consequently, we +consider securing the CPPS an emerging, critical issue. +According to [10], the pyramid of the automation hierar- +chy known until recently, is decentralized in the concept of +Industry 4.0. The information processing has been distributed +in many control units which exchanging information with the +goal to optimize the production process. The control units have +moved closer to the technical processes for efficiency, creating +an interactive communication net among heterogeneous sys- +tems. This creates the challenge to secure those components. +Assume that a hardware Trojan is included in one of +the control units. In Industry 4.0 machines use machine +to machine (M2M) communication for sensitive information +exchange. That means that the authentication keys are stored +and processed in the machines. If the hardware Trojan leaks +an authentication key to the adversary, she can take the control +of the unit and possibly the control of the factory. +In such a demanding environment the CPPS should stay +consistent to the security requirements. Availability, integrity +and confidentiality are only the basic guidelines of the prop- +erties that should be taken into consideration. The proof that +the units of those systems comply to those properties and to +more detailed ones can be achieved with IFT methods as we +discuss in the next sections. +C. Scope +The scope of this report is to survey how IFT methodologies +can secure CPS against hardware Trojan attacks and how those +methods need to be further developed in order to be applicable +in real world scenarios. +The remainder of this survey is organised as follows: +Section II provides basic information about hardware Trojans. +Section III refers to basic information for IFT methods and +presents state of the art methodologies against information +leakage. Finally, in section V we compare the IFT methods +and we discuss future steps for research. +II. HARDWARE TROJANS +Hardware Trojans are circuits with hidden, unspecified, +malicious functionality that can be included in any phase +of the IC supply chain. In the environment of Industry 4.0, +stealthy attacks like hardware Trojans can implement any kind +of effect, including information leakage. In this report we are +interested in this kind of malicious activity. +Figure 1 shows a time bomb hardware Trojan from [11]. +This hardware Trojan is activated when the counter reaches +the value 2k − 1. When the trigger is activated, the output +value at ER* becomes different from the initial signal ER. +The circuitry with the counter is the trigger and the circuitry +that changes the value of the signal ER is the payload. This +is a simplified example. More sophisticated mechanisms have +been proposed from the research community like the Trojans +mentioned above. +According to the taxonomy of R. Karri, J. Rajendran, K. +Rosenfeld, M. Tehranipoor [12], a hardware Trojan can be +described by the insertion phase, the abstraction level, the +activation mechanism (trigger), the effects (payload) and the +location in the design. + +… +0 +1 +K-1 +CLK +ER +ER* +Fig. 1. Time bomb hardware Trojan based on [11] +1) Insertion phase: The earlier a hardware Trojan is in- +troduced in the design the broader the range of its impact is +and the lower the cost of the attack is. For instance, assume +that a third party vendor infects an IP core with a hardware +Trojan. This IP core can be integrated in more than one +design, increasing the number of infected systems. On the +other hand, the scenario of the malicious manufacturer is +design-specific. The attacker, in order to introduce a Trojan, +should be aware of the design details which can be acquired by +reverse engineering, a technique that needs special knowledge +and is expensive in time and resources. Consequently, the +phase of the hardware Trojan introduction, in combination +with the value of the protected assets should be taken into +consideration, during the development of countermeasures. +2) Abstraction level: Depending on the abstraction level of +the design, a hardware Trojan can be injected at system level, +at the development environment, at register-transfer level as +soft IP core, at gate level as firm IP core, at transistor level as +hard IP core or at the physical level. +3) Triggers: There are hardware Trojans exploiting don’t +care conditions for their trigger mechanisms [13], or data +patterns in specific memory addresses [14], or even dedicated +input images [15]. Some attacks have even more sophisticated +triggers which are activated during the design flow, leaving no +trigger signal to the possible detection algorithm [16, 17]. +4) Payload: The most common attacks realized by hard- +ware Trojans are sensitive information leakage and denial +of service (DoS) attacks. Other attacks can be functional +alteration, downgrade performance, data corruption, circuit +aging, chip destruction, etc. +5) Attack targets: The most common targets for hardware +Trojan attacks are memory elements [18–21] and crypto- +graphic components [13, 22, 23]. However, there are many +proposals for attacking cores such as UARTs [24] or AXI4- +bus interconnects [25], FPGA LUTs [16], CPUs [26–28], etc. +6) Resources required: For the majority of the Trojans we +study, the attacker needs knowledge of the design and access +to it (e.g. bitstream [29], netlists [30] or access to the design +tools [16, 17, 31]). +III. INFORMATION FLOW TRACKING +The basic idea behind IFT methods is that they track the +influence of information of a system during computation. In +order to achieve that, they assign tags (usually binary values) +for each of the data element of the design and they update +the value of the tag based on the applied method and the +applied security properties. The verification is achieved by the +observation of the value of the tags. +IFT methods can be used with different verification tech- +niques as it is described in the taxonomy in [32]. More +specifically they can verify security properties through static +methods like simulation, formal verification, emulation, and +virtual prototyping or through dynamic methods like runtime +monitoring techniques. +There are many IFT methods used with different verification +techniques and at different abstraction levels and tackling dif- +ferent problems, since not all those methods address hardware +Trojans. +Here in this paper we chose to present different IFT ap- +proaches and discuss their limitations and requirements. We +present IFT static methods that tackle information leakage. +Information leakage is the most common hardware Trojan +effect and in the case of CPS it can cause economic loss or +even set a human life in danger. +As we discussed earlier, the runtime monitoring methods +can be expensive in resources, and the recovery from those +attacks can be costly too. Based on that, we chose to focus +on the static IFT verification methods. Static IFT methods are +applied in design-time, identifying the malicious behavior soon +enough to minimize the recovery cost. Moreover, they do not +add overhead in the original designs resources. +IV. IFT METHODS AGAINST HARDWARE TROJANS +Many methodologies are using theorem proving to verify +the information flow in the designs [33–36]. In those methods +the security properties are expressed as theorems and theorem +proving tools such as Coq are used to verify them. In the +proof-carrying hardware IP (PCHIP) framework [33] the IP +vendors are required to deliver the HDL code of the design +with formal proofs that the code is according to some security +properties predefined among the two parties. For instance, such +a property could describe that an instruction is allowed to +access memory locations, which are defined in its op-code. +With the provided security tags to the signals PCHIP can +track the information flow in the design. The disadvantage +of theorem proving methods is the manual conversion of +the HDL core to the theorem proving language and proof +checking environment (e.g. Coq and CoqIDE). Even though +a conversion from HDL to Coq has been proposed [33, 34], +theorem proving is far from an automated technique. +The approach proposed in [37] addresses black box models. +It is based on information flow security (IFS) verification +which detects violations of security properties. An asset is +modeled as stuck-at-0 and stuck-at-1 faults and, by leverag- +ing the automatic test pattern generation (ATPG), faults are +searched for. When a fault is detected, it means that there +is an information flow from the asset to observation points. +Finally the trigger mechanisms is extracted. This methodology +is based on the fact that the trigger mechanism is injected in +the original circuit. + +The tool Register Transfer Level Information Flow Tracking +(RTLIFT)[38], can be applied directly to HDL code. Secu- +rity tags (or labels) are assigned to every signal. Register +transfer level information flow tracking (RTLIFT) uses IFT +logic to securely propagate the tags throughout the design. +The functionality of the additional IFT logic depends on the +precision required. For instance, the output of an operation can +be tainted when any of the inputs is tainted. If an untainted +input influences the output to be untainted even though the +other input is tainted, a false positive may occur. To avoid +inaccuracies, the modules implementing the flow tracking +logic take such cases into consideration. Based on the required +trade off between complexity and precision, different precision +levels can be achieved. Given the Verilog code, the control +and the data flow precision flags (which define the required +precision level), the tool generates a functionally equivalent +Verilog code including IFT logic (IFT-Verilog code). The IFT- +Verilog code is tested against the security properties requested +for the design through simulation or formal verification. If the +design passes this process, the extra logic is removed and the +design is sent for fabrication. If it fails, the design has to be +altered and to go through this process again. +The methodology described in [39], gate-level information- +flow tracking (GLIFT), can detect hardware Trojans injected +by malicious third-party vendors, that alter the functionality +of the original circuit or leak sensitive information. According +to GLIFT, each data bit is assigned to a security label. This +is implemented with additional tracking logic. It is up to the +designers to define the security properties and use the GLIFT +to verify the cores. For example, assume that the goal is +to track the flow of a cryptographic key in order to ensure +that it does not leak. The security labels of the keys will +take the value ’confidential’ and the security property that +verifies that there is no leakage should ensure that no bit with +’confidential’ label ends up in an output or memory with the +label ’untrusted’. Thus, this technique can identify violations +of confidentiality and integrity and, hence, expose a hardware +Trojan. +Both methods discussed above [38, 39] face the problem of +false positives results, which have to be resolved manually. +The method proposed by Wang et al. [40], called HLIFT, +detects hardware Trojans based on the trigger behavior at +register transfer level (RTL) with the use of control and +data flow graphs (CDFG). The method can identify hardware +Trojans that leak information through specific outputs pins +or side channel, without functional modification and through +unspecified output pins. This approach is based on a feature +matching methodology that captures specific Trojan features. +The features are based on three kind of Trojan triggers: always- +on, immediate-on, sequential-on. This methodology can be +divided in the predefinition flow and the application flow. +During the predefinition flow, statement CDFGs are build +based on already known infected RTL designs. Statement +CDFGs are abstract, high-level and compact RTL netlists. That +way unnecessary information is removed which decreases the +complexity. IFT is applied on the CDFGs and a list of Trojan +IFT features is created. At the application flow, the statement- +level CDFG is extracted from the unknown RTL design, and +it is compared for matches with the list of the extracted Trojan +features. +The methodology proposed in [41] uses virtual prototyping +(SystemC TLM 2.0) to identify information leakage or un- +trusted access. At the behavioral level there is a lack of design +details. Thus, the security properties applied are very strict. +This can lead to false positives. This approach identifies the +vulnerable paths and reports them to the user for inspection. +Consequently, the inspection process is done manually, adding +time overhead. +The approach in [42], creates IFT models and optimizes +them according to specific security properties. The security +properties are compiled to security constraints and assertions, +which are combined with the trimmed IFT model. Finally, the +combination of the IFT model with the security constraints and +assertions is verified through simulation, emulation or formal +verification. +In contrast to the methods presented above, the method in +[43] does not use any of the mentioned verification methods. +The HDL code is converted to an abstract syntax tree (AST) +to identify, track and localize anomaly behavior. The AST is +converted to directed data-flow graph (DFG). This process +automatically recognizes interaction between IP cores. By +identifying the sink and the source signals, the tool detects +vulnerabilities and finally locates the threats. +V. DISCUSSION AND CONCLUSIONS +The development of hardware Trojans is flourishing as they +attract interest from the academia and industry. As counter- +measures, IFT methodologies are very promising, because +they can be flexible, adaptable and expandable based on the +application. +However, the IFT verification methodologies proposed so +far, cannot be applied in real world scenarios. To the best +of our knowledge, usually the purchased IP cores are not in +a white box form (usually the cores are purchased locked +in order to avoid IP piracy), or the specifications of the +cores provided are considered untrusted. Thus, the IP cores +purchased are treated as black boxes. That means that the +internals of the purchased modules are unknown and can +be leveraged from other layers of the systems (firmware or +software) for potential attacks. +Thus, there is a need to explore more IFT methods for black +box designs without the usage of known hardware Trojan +behaviors. The reason we suggest, that the known Trojan +behaviors should not be taken into consideration is because the +attackers want their Trojans to stay hidden, pushing the limits +of the current known Trojan behaviors, in order to make them +more stealthy. A case in point is the development of trigger +mechanisms. In recent years there is the tendency to include +the trigger mechanisms in the design flow, so that the detection +methods searching for trigger behaviors cannot detect them. +On the other hand, methods that are based on security +properties to identify unwanted or unspecified behavior in the + +TABLE I +STATIC IFT METHODS - WB=WHITE BOX, BB=BLACK BOX, +TP=THEOREM PROVING, MC=MODEL CHECKING, GL= GATE LEVEL, +SL=SEQUENCIAL LOGIC +Method +Abstraction +BB/ +Verification +Limitations +level +WB +method +[33] +RTL +WB +TP +based on +conservative +rules [44] +[35] +GL +WB +TP +manual proof +or RTL +construction +[36] +GL +WB +TP +proof of genuine +benchmark , +does not +support SL +[34] +GL +WB +TP and MC +high complexity, +false positives +[37] +GL +BB +partial scan ATPG +based on +analysis +trigger condition +[38] +RTL +WB +simulation or +challenged in +SAT solving +complex +structures +[39] +GL +WB +simulation +creates +false positives +[40] +RTL +WB +feature matching +based on HT +features +[41] +behavioral +WB +virtual prototypes +lack of design +details, +manual inspection +[42] +RTL +WB +assertion based +false positives +or GL +simulation +emulation +[43] +RTL +WB +If-tracker +false positives +designs seem more flexible with respect to unknown attacks. +However, the completeness of the security properties is an +open problem. Another issue is the definition of the security +properties by the engineers. Manual processes can result in +vulnerabilities of the systems which can be leveraged by +adversaries. +Identifying a hardware Trojan in a real world example can +be very challenging, especially since the trigger mechanism is +not necessarily part of the original design. In some concepts +a fault, a vulnerability, or a backdoor may be no different +from a well covered Trojan. From the real world attacks we +can conclude that the attack scenarios implemented are much +more complete than the ones provided by academia. In the +real world examples mentioned above we identify mechanisms +that can communicate at great distance and can affect state of +the art systems. The attacks were sophisticated enough with +complicated mechanisms with more than negligible overhead. +It will be useful for the research community to explore more +complicated attacks, across the levels of a computing system +in order to facilitate corresponding countermeasures. +REFERENCES +[1] S. Bhunia, Hardware security : a hands-on learning +approach. +Morgan Kaufmann, an imprint of Elsevier, +2019. +[2] P. C. Kocher, “Timing attacks on implementations of +diffie-hellman, rsa, dss, and other systems,” in 16th +Annual Int. Cryptology Conference 1996, Proceedings, +vol. 1109. +Springer, 1996. +[3] Xiaoxiao Wang, M. Tehranipoor, and J. Plusquellic, “De- +tecting malicious inclusions in secure hardware: Chal- +lenges and solutions,” in IEEE Int. Workshop on Hardw. +Oriented Secur. Trust, 2008. +[4] S. Adee, “The hunt for the kill switch,” IEEE Spectrum, +vol. 45, no. 5, 2008. +[5] Israel admits striking suspected syrian nuclear reactor +in 2007. [Online]. Available: https://www.bbc.com/news/ +world-middle-east-43481803 +[6] J. Robertson and M. Riley. The big hack: How china +used a tiny chip to infiltrate u.s. companies. +[7] D. Mehta, H. Lu, O. P. Paradis, M. A. M. S., M. T. Rah- +man, Y. Iskander, P. Chawla, D. L. Woodard, M. Tehra- +nipoor, and N. Asadizanjani, “The big hack explained: +Detection and prevention of pcb supply chain implants,” +J. Emerg. Technol. Comput. Syst., vol. 16, no. 4, 2020. +[8] D. Kushner, “The real story of stuxnet,” IEEE Spectrum, +vol. 50, no. 3, pp. 48–53, 2013. +[9] J.-P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche, +A. Chehab, and M. Malli, “Cyber-physical systems secu- +rity: Limitations, issues and future trends,” Microprocess. +Microsyst., vol. 77, p. 103201, 2020. +[10] L. +Monostori, +“Cyber-physical +production +systems: +Roots, expectations and R&D challenges,” Procedia +CIRP, vol. 17, 2014, variety Management in Manufac- +turing. +[11] R. S. Chakraborty, S. Narasimhan, and S. Bhunia, “Hard- +ware trojan: Threats and emerging solutions,” in IEEE +Int. High Level Design Validation and Test Workshop, +2009, pp. 166–171. +[12] R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehra- +nipoor, “Trustworthy hardware: Identifying and classi- +fying hardware trojans,” Computer, vol. 43, pp. 39 – 46, +11 2010. +[13] W. Hu, L. Zhang, A. Ardeshiricham, J. Blackstone, +B. Hou, Y. Tai, and R. Kastner, “Why you should +care about don’t cares: Exploiting internal don’t care +conditions for hardware trojans,” in Proceedings of Int. +Conf. on Comput.-Aided Des. +IEEE Press, 2017, p. +707–713. +[14] M. N. Imtiaz Khan, K. Nagarajan, and S. Ghosh, “Hard- +ware trojans in emerging non-volatile memories,” in +Design, Autom. Test in Europe Conf. Exhibition (DATE), +2019, pp. 396–401. +[15] Y. Zhao, X. Hu, S. Li, J. Ye, L. Deng, Y. Ji, J. Xu, +D. Wu, and Y. Xie, “Memory trojan attack on neural +network accelerators,” in Design, Autom. Test in Europe +Conf. Exhibition (DATE), 2019, pp. 1415–1420. +[16] A. J. Christian Krieg, Clifford Wolf, “Malicious LUT: +A stealthy FPGA trojan injected and triggered by the +design flow,” in IEEE/ACM Int. Conf. on Comput.-Aided +Des. (ICCAD), 2016. + +[17] Q. A. Ahmed, T. Wiersema, and M. Platzner, “Malicious +routing: Circumventing bitstream-level verification for +fpgas,” in Design, Autom. Test in Europe Conf. Exhibition +(DATE), 2021, pp. 1490–1495. +[18] B. Hopkins, J. Shield, and C. North, “Redirecting dram +memory pages: Examining the threat of system memory +hardware trojans,” in IEEE Int. Symp. Hardw. Oriented +Secur. Trust HOST, 2016, pp. 197–202. +[19] M. Kim, S. Kong, B. Hong, L. Xu, W. Shi, and T. Suh, +“Evaluating coherence-exploiting hardware trojan,” in +Design, Autom. Test in Europe Conf. Exhibition (DATE), +2017, pp. 157–162. +[20] X. Hu, Y. Zhao, L. Deng, L. Liang, P. Zuo, J. Ye, Y. Lin, +and Y. Xie, “Practical attacks on deep neural networks +by memory trojaning,” IEEE Trans. Comput.-Aided Des. +Integr. Circuits Syst., vol. 40, no. 6, pp. 1230–1243, 2021. +[21] K. Nagarajan, M. N. I. Khan, and S. Ghosh, “Entt: A +family of emerging nvm-based trojan triggers,” in IEEE +Int. Symp. Hardw. Oriented Secur. Trust HOST, 2019, pp. +51–60. +[22] Y. Liu, Y. Jin, A. Nosratinia, and Y. Makris, “Silicon +demonstration of hardware trojan design and detection +in wireless cryptographic ics,” IEEE Trans. Very Large +Scale Integr. (VLSI) Syst., vol. 25, no. 4, pp. 1506–1519, +2017. +[23] F. Schellenberg, D. R. Gnad, A. Moradi, and M. B. +Tahoori, “An inside job: Remote power analysis attacks +on fpgas,” in Design, Autom. Test in Europe Conf. +Exhibition (DATE), 2018, pp. 1111–1116. +[24] N. Fern and K.-T. T. Cheng, “Detecting hardware trojans +in unspecified functionality using mutation testing,” in +Proceedings of the IEEE/ACM Int. Conf. on Comput.- +Aided Des. +IEEE Press, 2015, p. 560–566. +[25] N. Fern, I. San, c. K. Koc¸, and K.-T. T. Cheng, “Hardware +trojans in incompletely specified on-chip bus systems,” +in Proceedings of Conf. on Design, Autom. & Test in +Europe. +EDA Consortium, 2016, p. 527–530. +[26] M. Gross, N. Jacob, A. Zankl, and G. Sigl, “Breaking +trustzone memory isolation through malicious hardware +on a modern fpga-soc,” in Proceedings of ACM Workshop +on Attacks and Solutions in Hardware Security Work- +shop. +Association for Computing Machinery, 2019, p. +3–12. +[27] A. De, M. Nasim Imtiaz Khan, K. Nagarajan, and +S. Ghosh, “Hartbleed: Using hardware trojans for data +leakage exploits,” IEEE Trans. Very Large Scale Integr. +(VLSI) Syst., vol. 28, no. 4, pp. 968–979, 2020. +[28] J. Zhang, Y. Zhang, H. Li, and J. Jiang, “Hit: A hidden +instruction trojan model for processors,” in Proceedings +of Conf. on Design, Autom. and Test in Europe. +EDA +Consortium, 2020, p. 1271–1274. +[29] P. Swierczynski, M. Fyrbiak, P. Koppe, and C. Paar, +“Fpga trojans through detecting and weakening of cryp- +tographic primitives,” IEEE Trans. Comput.-Aided Des. +Integr. Circuits Syst., vol. 34, no. 8, pp. 1236–1249, 2015. +[30] J. Cruz, Y. Huang, P. Mishra, and S. Bhunia, “An +automated configurable trojan insertion framework for +dynamic trust benchmarks,” in Design, Autom. Test in +Europe Conf. Exhibition (DATE), 2018, pp. 1598–1603. +[31] C. Pilato, K. Basu, F. Regazzoni, and R. Karri, “Black- +hat high-level synthesis: Myth or reality?” IEEE Trans. +Very Large Scale Integr. (VLSI) Syst., vol. 27, no. 4, 2019. +[32] W. Hu, A. Ardeshiricham, and R. Kastner, “Hardware +information flow tracking,” ACM Comput. Surv., vol. 54, +no. 4, 2021. +[33] M.-M. Bidmeshki and Y. Makris, “Toward automatic +proof generation for information flow policies in third- +party hardware ip,” in IEEE Int. Symp. Hardw. Oriented +Secur. Trust HOST, 2015. +[34] X. Guo, R. G. Dutta, P. Mishra, and Y. Jin, “Automatic +code converter enhanced pch framework for soc trust +verification,” IEEE Trans. Very Large Scale Integr. (VLSI) +Syst., vol. 25, no. 12, 2017. +[35] M. Qin, W. Hu, X. Wang, D. Mu, and B. Mao, “Theorem +proof based gate level information flow tracking for +hardware security verification,” Computers & Security, +vol. 85, 2019. +[36] Q. Zhang, J. He, Y. Zhao, and X. Guo, “A formal +framework for gate- level information leakage using +z3,” in Asian Hardw. Oriented Secur. and Trust Symp. +(AsianHOST), 2020, pp. 1–6. +[37] A. Nahiyan, M. Sadi, R. Vittal, G. Contreras, D. Forte, +and M. Tehranipoor, “Hardware trojan detection through +information flow security verification,” in IEEE Interna- +tional Test Conference (ITC), 2017, pp. 1–10. +[38] A. Ardeshiricham, W. Hu, J. Marxen, and R. Kastner, +“Register transfer level information flow tracking for +provably secure hardware design,” in Design, Autom. +Test in Europe Conf. Exhibition (DATE), 2017, 2017, pp. +1691–1696. +[39] W. Hu, B. Mao, J. Oberg, and R. Kastner, “Detecting +hardware trojans with gate-level information-flow track- +ing,” Computer, vol. 49, no. 8, pp. 44–52, 2016. +[40] C. Wang, Y. Cai, and Q. Zhou, “Hlift: A high-level +information flow tracking method for detecting hardware +trojans,” in Asia and South Pacific Design Automation +Conference (ASP-DAC), 2018, pp. 727–732. +[41] M. Hassan, V. Herdt, H. M. Le, D. Große, and R. Drech- +sler, “Early soc security validation by vp-based static +information flow analysis,” in Proceedings of Int. Conf. +on Comput.-Aided Des. +IEEE Press, 2017, p. 400–407. +[42] W. Hu, A. Ardeshiricham, M. S. Gobulukoglu, X. Wang, +and R. Kastner, “Property specific information flow anal- +ysis for hardware security verification,” in Proceedings +of the Int. Conf. Comput.-Aided Des. +Association for +Computing Machinery, 2018. +[43] Z. Liu, O. Arias, W. Fu, Y. Jin, and X. Guo, “Inter-ip ma- +licious modification detection through static information +flow tracking,” in Design, Autom. Test in Europe Conf. +Exhibition (DATE), 2022, pp. 600–603. +[44] W. Hu, C.-H. Chang, A. Sengupta, S. Bhunia, R. Kastner, +and H. Li, “An overview of hardware security and trust: + +Threats, countermeasures, and design tools,” IEEE Trans. +Comput.-Aided Des. Integr. Circuits Syst., vol. 40, no. 6, +2021. + diff --git a/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt b/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..ee3aea52ef289fb729f2a4ecd33078ea2ffa6771 --- /dev/null +++ b/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt @@ -0,0 +1,632 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf,len=631 +page_content='Information Flow Tracking Methods for Protecting Cyber-Physical Systems against Hardware Trojans a Survey - Sofia Maragkou Institute of Computer Technology, TU Wien Vienna University of Technology Gusshausstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 27–29 / 384, 1040 Wien, Austria sofia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='maragkou@tuwien.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='at Axel Jantsch Institute of Computer Technology, TU Wien Vienna University of Technology Gusshausstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 27–29 / 384, 1040 Wien, Austria axel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='jantsch@tuwien.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='at Abstract—Cyber-physical systems (CPS) provide profitable surfaces for hardware attacks such as hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hard- ware Trojans can implement stealthy attacks such as leaking critical information, taking control of devices or harm humans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In this article we review information flow tracking (IFT) methods for protecting CPS against hardware Trojans, and discuss their current limitations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT methods are a promising approach for the detection of hardware Trojans in complex systems because the detection mechanism does not necessarily rely on potential Trojan behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, in order to maximize the benefits research should focus more on black-box design models and consider real- world attack scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Index Terms—hardware Trojans, detection, hardware security, real hardware attacks, information flow tracking, cyber-physical production systems, cyber-physical systems I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' INTRODUCTION Hardware security began facing desultory challenges much later than software [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In 1996 a timing attack was published [2] based on which sensitive information could be leaked from a cryptographic component.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' After this point, hardware security research became more systematic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' From 2005 on [1, 3] the field of hardware security has gained ground in the academic and the industrial world because it breaks the chain of trust known so far.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This chain of trust, from the hardware security perspective, begins at the integrated circuit (IC) supply chain, where security vulnerabilities are formed by the needs of the market for fast and cheap technology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The involvement of external en- tities in the design process and the internationally outsourced fabrication can create security breaches that can be even relevant for national security.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Design houses, in order to stay competitive, purchase third-party intellectual property (3PIP) cores from vendors and outsource the fabrication process without always verifying the returned product with respect to hardware security breaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The reason for that is that the verification of the purchased cores is an expensive process that requires resources and time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Those intellectual property (IP) cores or chips are integrated and distributed to the customers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, hardware security has to deal with attacks like IP piracy, reverse engineering, counterfeit chips and hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In a real world scenario, when an IP core is being purchased, the design house requests some design specification and the 3PIP core vendor replies with the IP core and the specifications of the IP core.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Throughout this information exchange, the only trusted part is the specification requested by the design house.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The core in return, is considered untrusted and it is treated as black box.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Information flow tracking (IFT) methods are a promising research direction for the detection of hardware Trojans because the verification can be based on the security specification of the application and not only on potentially malicious designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, the verification methods can be adapted based on the application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In addition, those methods can be flexible regarding new attacks, and can be expandable in case of the alteration of the security specifications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Known Real World Attacks The real world hardware attacks are much more complicated than the attacks developed by the research community, since real world attacks interact with different layers of the comput- ing system and communicate with external systems over long distance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Compared to software, real world hardware attacks are less frequent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The information that is publicly available about real world attacks is limited and specific details are rarely known to the public.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The real world attack that received most attention is the 2007 attack on a Syrian military radar [4, 5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Even though the details were not officially revealed, all the indications suggest that the radar at a nuclear installation in Syria has been tampered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attack took place in September 2007 and the nuclear installation was completely destroyed by Israeli bombing jets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The Israeli jets, took off from southern Israel, crossed the Mediterranean Sea and the Syrian-Turkish borders and returned four hours later.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The state of the art radars did not detect the jets, which raised suspicions for malicious alteration of their functionality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Adee [4] suspects a kill-switch or a backdoor in the off-the-shelf microprocessor that could block a bombing radar by an apparently remote command (trigger) arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='02620v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='CR] 27 Nov 2022 without shutting down the whole system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The difference of a kill switch and a backdoor is that the kill switch will shut off a specific chip when triggered, but a backdoor requires an intruder to implement the same effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The hypothesis of the kill switch is more likely and, in order to be implemented, requires the injection of extra logic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The HW and SW overhead for such an attack is very small which makes it hard to detect during testing, and the threat models discussed are the malicious designer and the malicious manufacturer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The microprocessor used remains unknown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This is not the only occasion where microprocessors including a kill switch have supposedly been used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to anonymous sources from U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='S defense department, it is known that a European chip maker is building microprocessors with a kill switch, and the French defense uses this technology for military applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Undocumented microchips were found in the servers assem- bled by Supermicro [6, 7], that implemented a doorway to the network of the original system, which incorporated memory, networking capacity and processing power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attack aimed at leaking sensitive information over a long term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Stuxnet attack provides an example of the real world attack capabilities in the industrial environment [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Stuxnet is a worm that was introduced in the Microsoft Windows operating systems and it was targeting specific industrial control systems of Siemens which were used in Iran to run centrifuges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Until the target was found the worm was updating itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The worm was compromising the targeted system by exploiting ’zero- day’ vulnerabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' After monitoring the operation, the worm was taking the control of the control system and it ran the centrifuges to the point of failure, returning false feedback to cover the failure until the damage was irreversible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hybrid attacks are very common in real world scenar- ios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The hybrid attacks can include hardware, software and firmware parts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Such an attack can be malicious software that exploits vulnerabilities of the hardware, damaging physical resources such as Stuxnet [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cyber-Physical Production Systems Cyber-physical systems (CPS) are sophisticated systems that combine physical and cyber units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' They are used in many different applications and they are the fundamental units of the internet of things (IoT) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Their functionality is based on the information exchange and the interaction with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to the [9], the nature of the CPS makes them particularly sensitive to attacks, due to their heterogeneous nature, their reliance on data and their large scale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' When those systems are integrated in the production envi- ronment then we refer to them as cyber-physical production systems (CPPS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Often, CPPS expose a profitable surface to adversaries for hardware Trojan introduction, because they are complex, sophisticated structures that manage sensitive infor- mation with extend communication among them, which facili- tates malicious functionality to stay hidden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, we consider securing the CPPS an emerging, critical issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to [10], the pyramid of the automation hierar- chy known until recently, is decentralized in the concept of Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The information processing has been distributed in many control units which exchanging information with the goal to optimize the production process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The control units have moved closer to the technical processes for efficiency, creating an interactive communication net among heterogeneous sys- tems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This creates the challenge to secure those components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Assume that a hardware Trojan is included in one of the control units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0 machines use machine to machine (M2M) communication for sensitive information exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' That means that the authentication keys are stored and processed in the machines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If the hardware Trojan leaks an authentication key to the adversary, she can take the control of the unit and possibly the control of the factory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In such a demanding environment the CPPS should stay consistent to the security requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Availability, integrity and confidentiality are only the basic guidelines of the prop- erties that should be taken into consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The proof that the units of those systems comply to those properties and to more detailed ones can be achieved with IFT methods as we discuss in the next sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Scope The scope of this report is to survey how IFT methodologies can secure CPS against hardware Trojan attacks and how those methods need to be further developed in order to be applicable in real world scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The remainder of this survey is organised as follows: Section II provides basic information about hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Section III refers to basic information for IFT methods and presents state of the art methodologies against information leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Finally, in section V we compare the IFT methods and we discuss future steps for research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' HARDWARE TROJANS Hardware Trojans are circuits with hidden, unspecified, malicious functionality that can be included in any phase of the IC supply chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In the environment of Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0, stealthy attacks like hardware Trojans can implement any kind of effect, including information leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In this report we are interested in this kind of malicious activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Figure 1 shows a time bomb hardware Trojan from [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This hardware Trojan is activated when the counter reaches the value 2k − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' When the trigger is activated, the output value at ER* becomes different from the initial signal ER.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The circuitry with the counter is the trigger and the circuitry that changes the value of the signal ER is the payload.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This is a simplified example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' More sophisticated mechanisms have been proposed from the research community like the Trojans mentioned above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to the taxonomy of R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Karri, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rajendran, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rosenfeld, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehranipoor [12], a hardware Trojan can be described by the insertion phase, the abstraction level, the activation mechanism (trigger), the effects (payload) and the location in the design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' … 0 1 K-1 CLK ER ER* Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Time bomb hardware Trojan based on [11] 1) Insertion phase: The earlier a hardware Trojan is in- troduced in the design the broader the range of its impact is and the lower the cost of the attack is.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For instance, assume that a third party vendor infects an IP core with a hardware Trojan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This IP core can be integrated in more than one design, increasing the number of infected systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' On the other hand, the scenario of the malicious manufacturer is design-specific.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attacker, in order to introduce a Trojan, should be aware of the design details which can be acquired by reverse engineering, a technique that needs special knowledge and is expensive in time and resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, the phase of the hardware Trojan introduction, in combination with the value of the protected assets should be taken into consideration, during the development of countermeasures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 2) Abstraction level: Depending on the abstraction level of the design, a hardware Trojan can be injected at system level, at the development environment, at register-transfer level as soft IP core, at gate level as firm IP core, at transistor level as hard IP core or at the physical level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 3) Triggers: There are hardware Trojans exploiting don’t care conditions for their trigger mechanisms [13], or data patterns in specific memory addresses [14], or even dedicated input images [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Some attacks have even more sophisticated triggers which are activated during the design flow, leaving no trigger signal to the possible detection algorithm [16, 17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4) Payload: The most common attacks realized by hard- ware Trojans are sensitive information leakage and denial of service (DoS) attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Other attacks can be functional alteration, downgrade performance, data corruption, circuit aging, chip destruction, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 5) Attack targets: The most common targets for hardware Trojan attacks are memory elements [18–21] and crypto- graphic components [13, 22, 23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, there are many proposals for attacking cores such as UARTs [24] or AXI4- bus interconnects [25], FPGA LUTs [16], CPUs [26–28], etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 6) Resources required: For the majority of the Trojans we study, the attacker needs knowledge of the design and access to it (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' bitstream [29], netlists [30] or access to the design tools [16, 17, 31]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' INFORMATION FLOW TRACKING The basic idea behind IFT methods is that they track the influence of information of a system during computation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In order to achieve that, they assign tags (usually binary values) for each of the data element of the design and they update the value of the tag based on the applied method and the applied security properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The verification is achieved by the observation of the value of the tags.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT methods can be used with different verification tech- niques as it is described in the taxonomy in [32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' More specifically they can verify security properties through static methods like simulation, formal verification, emulation, and virtual prototyping or through dynamic methods like runtime monitoring techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' There are many IFT methods used with different verification techniques and at different abstraction levels and tackling dif- ferent problems, since not all those methods address hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Here in this paper we chose to present different IFT ap- proaches and discuss their limitations and requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' We present IFT static methods that tackle information leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Information leakage is the most common hardware Trojan effect and in the case of CPS it can cause economic loss or even set a human life in danger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' As we discussed earlier, the runtime monitoring methods can be expensive in resources, and the recovery from those attacks can be costly too.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Based on that, we chose to focus on the static IFT verification methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Static IFT methods are applied in design-time, identifying the malicious behavior soon enough to minimize the recovery cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Moreover, they do not add overhead in the original designs resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT METHODS AGAINST HARDWARE TROJANS Many methodologies are using theorem proving to verify the information flow in the designs [33–36].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In those methods the security properties are expressed as theorems and theorem proving tools such as Coq are used to verify them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In the proof-carrying hardware IP (PCHIP) framework [33] the IP vendors are required to deliver the HDL code of the design with formal proofs that the code is according to some security properties predefined among the two parties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For instance, such a property could describe that an instruction is allowed to access memory locations, which are defined in its op-code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' With the provided security tags to the signals PCHIP can track the information flow in the design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The disadvantage of theorem proving methods is the manual conversion of the HDL core to the theorem proving language and proof checking environment (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Coq and CoqIDE).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Even though a conversion from HDL to Coq has been proposed [33, 34], theorem proving is far from an automated technique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The approach proposed in [37] addresses black box models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' It is based on information flow security (IFS) verification which detects violations of security properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' An asset is modeled as stuck-at-0 and stuck-at-1 faults and, by leverag- ing the automatic test pattern generation (ATPG), faults are searched for.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' When a fault is detected, it means that there is an information flow from the asset to observation points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Finally the trigger mechanisms is extracted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This methodology is based on the fact that the trigger mechanism is injected in the original circuit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The tool Register Transfer Level Information Flow Tracking (RTLIFT)[38], can be applied directly to HDL code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Secu- rity tags (or labels) are assigned to every signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Register transfer level information flow tracking (RTLIFT) uses IFT logic to securely propagate the tags throughout the design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The functionality of the additional IFT logic depends on the precision required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For instance, the output of an operation can be tainted when any of the inputs is tainted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If an untainted input influences the output to be untainted even though the other input is tainted, a false positive may occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' To avoid inaccuracies, the modules implementing the flow tracking logic take such cases into consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Based on the required trade off between complexity and precision, different precision levels can be achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Given the Verilog code, the control and the data flow precision flags (which define the required precision level), the tool generates a functionally equivalent Verilog code including IFT logic (IFT-Verilog code).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The IFT- Verilog code is tested against the security properties requested for the design through simulation or formal verification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If the design passes this process, the extra logic is removed and the design is sent for fabrication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If it fails, the design has to be altered and to go through this process again.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The methodology described in [39], gate-level information- flow tracking (GLIFT), can detect hardware Trojans injected by malicious third-party vendors, that alter the functionality of the original circuit or leak sensitive information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to GLIFT, each data bit is assigned to a security label.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This is implemented with additional tracking logic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' It is up to the designers to define the security properties and use the GLIFT to verify the cores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For example, assume that the goal is to track the flow of a cryptographic key in order to ensure that it does not leak.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The security labels of the keys will take the value ’confidential’ and the security property that verifies that there is no leakage should ensure that no bit with ’confidential’ label ends up in an output or memory with the label ’untrusted’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, this technique can identify violations of confidentiality and integrity and, hence, expose a hardware Trojan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Both methods discussed above [38, 39] face the problem of false positives results, which have to be resolved manually.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The method proposed by Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [40], called HLIFT, detects hardware Trojans based on the trigger behavior at register transfer level (RTL) with the use of control and data flow graphs (CDFG).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The method can identify hardware Trojans that leak information through specific outputs pins or side channel, without functional modification and through unspecified output pins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This approach is based on a feature matching methodology that captures specific Trojan features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The features are based on three kind of Trojan triggers: always- on, immediate-on, sequential-on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This methodology can be divided in the predefinition flow and the application flow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' During the predefinition flow, statement CDFGs are build based on already known infected RTL designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Statement CDFGs are abstract, high-level and compact RTL netlists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' That way unnecessary information is removed which decreases the complexity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT is applied on the CDFGs and a list of Trojan IFT features is created.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' At the application flow, the statement- level CDFG is extracted from the unknown RTL design, and it is compared for matches with the list of the extracted Trojan features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The methodology proposed in [41] uses virtual prototyping (SystemC TLM 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0) to identify information leakage or un- trusted access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' At the behavioral level there is a lack of design details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, the security properties applied are very strict.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This can lead to false positives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This approach identifies the vulnerable paths and reports them to the user for inspection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, the inspection process is done manually, adding time overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The approach in [42], creates IFT models and optimizes them according to specific security properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The security properties are compiled to security constraints and assertions, which are combined with the trimmed IFT model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Finally, the combination of the IFT model with the security constraints and assertions is verified through simulation, emulation or formal verification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In contrast to the methods presented above, the method in [43] does not use any of the mentioned verification methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The HDL code is converted to an abstract syntax tree (AST) to identify, track and localize anomaly behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The AST is converted to directed data-flow graph (DFG).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This process automatically recognizes interaction between IP cores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' By identifying the sink and the source signals, the tool detects vulnerabilities and finally locates the threats.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' DISCUSSION AND CONCLUSIONS The development of hardware Trojans is flourishing as they attract interest from the academia and industry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' As counter- measures, IFT methodologies are very promising, because they can be flexible, adaptable and expandable based on the application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, the IFT verification methodologies proposed so far, cannot be applied in real world scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' To the best of our knowledge, usually the purchased IP cores are not in a white box form (usually the cores are purchased locked in order to avoid IP piracy), or the specifications of the cores provided are considered untrusted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, the IP cores purchased are treated as black boxes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' That means that the internals of the purchased modules are unknown and can be leveraged from other layers of the systems (firmware or software) for potential attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, there is a need to explore more IFT methods for black box designs without the usage of known hardware Trojan behaviors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The reason we suggest, that the known Trojan behaviors should not be taken into consideration is because the attackers want their Trojans to stay hidden, pushing the limits of the current known Trojan behaviors, in order to make them more stealthy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A case in point is the development of trigger mechanisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In recent years there is the tendency to include the trigger mechanisms in the design flow, so that the detection methods searching for trigger behaviors cannot detect them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' On the other hand,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' methods that are based on security properties to identify unwanted or unspecified behavior in the TABLE I STATIC IFT METHODS - WB=WHITE BOX,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' BB=BLACK BOX,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' TP=THEOREM PROVING,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' MC=MODEL CHECKING,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' GL= GATE LEVEL,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' SL=SEQUENCIAL LOGIC Method Abstraction BB/ Verification Limitations level WB method [33] RTL WB TP based on conservative rules [44] [35] GL WB TP manual proof or RTL construction [36] GL WB TP proof of genuine benchmark ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' does not support SL [34] GL WB TP and MC high complexity,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' false positives [37] GL BB partial scan ATPG based on analysis trigger condition [38] RTL WB simulation or challenged in SAT solving complex structures [39] GL WB simulation creates false positives [40] RTL WB feature matching based on HT features [41] behavioral WB virtual prototypes lack of design details,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' manual inspection [42] RTL WB assertion based false positives or GL simulation emulation [43] RTL WB If-tracker false positives designs seem more flexible with respect to unknown attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, the completeness of the security properties is an open problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Another issue is the definition of the security properties by the engineers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Manual processes can result in vulnerabilities of the systems which can be leveraged by adversaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Identifying a hardware Trojan in a real world example can be very challenging, especially since the trigger mechanism is not necessarily part of the original design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In some concepts a fault, a vulnerability, or a backdoor may be no different from a well covered Trojan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' From the real world attacks we can conclude that the attack scenarios implemented are much more complete than the ones provided by academia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In the real world examples mentioned above we identify mechanisms that can communicate at great distance and can affect state of the art systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attacks were sophisticated enough with complicated mechanisms with more than negligible overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' It will be useful for the research community to explore more complicated attacks, across the levels of a computing system in order to facilitate corresponding countermeasures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' REFERENCES [1] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, Hardware security : a hands-on learning approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Morgan Kaufmann, an imprint of Elsevier, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [2] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kocher, “Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems,” in 16th Annual Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cryptology Conference 1996, Proceedings, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1109.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Springer, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [3] Xiaoxiao Wang, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehranipoor, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Plusquellic, “De- tecting malicious inclusions in secure hardware: Chal- lenges and solutions,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Workshop on Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [4] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Adee, “The hunt for the kill switch,” IEEE Spectrum, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 45, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 5, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [5] Israel admits striking suspected syrian nuclear reactor in 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Available: https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='bbc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='com/news/ world-middle-east-43481803 [6] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Robertson and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Riley.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The big hack: How china used a tiny chip to infiltrate u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [7] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mehta, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Lu, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Paradis, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rah- man, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Iskander, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chawla, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Woodard, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehra- nipoor, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Asadizanjani, “The big hack explained: Detection and prevention of pcb supply chain implants,” J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Emerg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [8] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kushner, “The real story of stuxnet,” IEEE Spectrum, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 50, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 48–53, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [9] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Yaacoub, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Salman, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Noura, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kaaniche, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chehab, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Malli, “Cyber-physical systems secu- rity: Limitations, issues and future trends,” Microprocess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Microsyst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 77, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 103201, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [10] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Monostori, “Cyber-physical production systems: Roots, expectations and R&D challenges,” Procedia CIRP, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 17, 2014, variety Management in Manufac- turing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [11] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chakraborty, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Narasimhan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, “Hard- ware trojan: Threats and emerging solutions,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' High Level Design Validation and Test Workshop, 2009, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 166–171.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [12] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Karri, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rajendran, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rosenfeld, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehra- nipoor, “Trustworthy hardware: Identifying and classi- fying hardware trojans,” Computer, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 43, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 39 – 46, 11 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [13] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Blackstone, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hou, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tai, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Why you should care about don’t cares: Exploiting internal don’t care conditions for hardware trojans,” in Proceedings of Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Press, 2017, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 707–713.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [14] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Imtiaz Khan, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nagarajan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ghosh, “Hard- ware trojans in emerging non-volatile memories,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 396–401.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [15] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhao, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Li, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ye, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Deng, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ji, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wu, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xie, “Memory trojan attack on neural network accelerators,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1415–1420.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [16] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Christian Krieg, Clifford Wolf, “Malicious LUT: A stealthy FPGA trojan injected and triggered by the design flow,” in IEEE/ACM Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (ICCAD), 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [17] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ahmed, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wiersema, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Platzner, “Malicious routing: Circumventing bitstream-level verification for fpgas,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1490–1495.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [18] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hopkins, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Shield, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' North, “Redirecting dram memory pages: Examining the threat of system memory hardware trojans,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust HOST, 2016, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 197–202.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [19] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kim, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kong, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hong, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xu, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Shi, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Suh, “Evaluating coherence-exploiting hardware trojan,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 157–162.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [20] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhao, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Deng, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Liang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zuo, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ye, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Lin, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xie, “Practical attacks on deep neural networks by memory trojaning,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Circuits Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 40, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1230–1243, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [21] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nagarajan, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Khan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ghosh, “Entt: A family of emerging nvm-based trojan triggers,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust HOST, 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 51–60.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [22] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Liu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nosratinia, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Makris, “Silicon demonstration of hardware trojan design and detection in wireless cryptographic ics,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 25, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1506–1519, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [23] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Schellenberg, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Gnad, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Moradi, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tahoori, “An inside job: Remote power analysis attacks on fpgas,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1111–1116.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [24] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fern and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cheng, “Detecting hardware trojans in unspecified functionality using mutation testing,” in Proceedings of the IEEE/ACM Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='- Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Press, 2015, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 560–566.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [25] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fern, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' San, c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Koc¸, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cheng, “Hardware trojans in incompletely specified on-chip bus systems,” in Proceedings of Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' & Test in Europe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' EDA Consortium, 2016, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 527–530.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [26] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Gross, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jacob, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zankl, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Sigl, “Breaking trustzone memory isolation through malicious hardware on a modern fpga-soc,” in Proceedings of ACM Workshop on Attacks and Solutions in Hardware Security Work- shop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Association for Computing Machinery, 2019, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 3–12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [27] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' De, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nasim Imtiaz Khan, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nagarajan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ghosh, “Hartbleed: Using hardware trojans for data leakage exploits,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 28, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 968–979, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [28] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Li, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jiang, “Hit: A hidden instruction trojan model for processors,” in Proceedings of Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' and Test in Europe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' EDA Consortium, 2020, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1271–1274.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [29] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Swierczynski, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fyrbiak, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Koppe, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Paar, “Fpga trojans through detecting and weakening of cryp- tographic primitives,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Circuits Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 34, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1236–1249, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [30] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cruz, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Huang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mishra, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, “An automated configurable trojan insertion framework for dynamic trust benchmarks,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1598–1603.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [31] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Pilato, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Basu, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Regazzoni, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Karri, “Black- hat high-level synthesis: Myth or reality?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 27, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [32] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Hardware information flow tracking,” ACM Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Surv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 54, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [33] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bidmeshki and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Makris, “Toward automatic proof generation for information flow policies in third- party hardware ip,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust HOST, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [34] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Guo, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Dutta, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mishra, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jin, “Automatic code converter enhanced pch framework for soc trust verification,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 25, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 12, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [35] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Qin, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wang, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mu, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mao, “Theorem proof based gate level information flow tracking for hardware security verification,” Computers & Security, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 85, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [36] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' He, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhao, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Guo, “A formal framework for gate- level information leakage using z3,” in Asian Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' and Trust Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (AsianHOST), 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [37] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nahiyan, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Sadi, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Vittal, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Contreras, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Forte, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehranipoor, “Hardware trojan detection through information flow security verification,” in IEEE Interna- tional Test Conference (ITC), 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1–10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [38] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Marxen, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Register transfer level information flow tracking for provably secure hardware design,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2017, 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1691–1696.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [39] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mao, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oberg, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Detecting hardware trojans with gate-level information-flow track- ing,” Computer, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 49, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 44–52, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [40] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cai, and Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhou, “Hlift: A high-level information flow tracking method for detecting hardware trojans,” in Asia and South Pacific Design Automation Conference (ASP-DAC), 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 727–732.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [41] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hassan, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Herdt, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Le, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Große, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Drech- sler, “Early soc security validation by vp-based static information flow analysis,” in Proceedings of Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Press, 2017, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 400–407.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [42] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Gobulukoglu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wang, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Property specific information flow anal- ysis for hardware security verification,” in Proceedings of the Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Association for Computing Machinery, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [43] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Liu, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Arias, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jin, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Guo, “Inter-ip ma- licious modification detection through static information flow tracking,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2022, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 600–603.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [44] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Sengupta, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Li, “An overview of hardware security and trust: Threats, countermeasures, and design tools,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Circuits Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 40, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 6, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} diff --git a/5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss b/5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss new file mode 100644 index 0000000000000000000000000000000000000000..f9ddb193fa122096b119e4ab3f0fc7b02b45c776 --- /dev/null +++ b/5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d4580bd4207f97863d472096ada8744924cbd984cc788827b45dacc7f28afd2a +size 4915245 diff --git a/5dFIT4oBgHgl3EQf7yth/vector_store/index.pkl b/5dFIT4oBgHgl3EQf7yth/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..7e19fb2d23224b4300dcdb35e0388b8782639708 --- /dev/null +++ b/5dFIT4oBgHgl3EQf7yth/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1db5d4e79766c96cb082519833684eea5ef4aa7070025b4b02f50fa45a1cf0ad +size 183446 diff --git a/6NE1T4oBgHgl3EQfmwRz/content/tmp_files/2301.03301v1.pdf.txt b/6NE1T4oBgHgl3EQfmwRz/content/tmp_files/2301.03301v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..3e21afd17a292067ed481683958cc07dd68f1654 --- /dev/null +++ b/6NE1T4oBgHgl3EQfmwRz/content/tmp_files/2301.03301v1.pdf.txt @@ -0,0 +1,824 @@ +Deep Breath: A Machine Learning Browser +Extension to Tackle Online Misinformation +Marc Kydd +School of Design and Informatics +Division of Cyber Security +Abertay University +Dundee, United Kingdom +m.kydd1800@abertay.ac.uk +Lynsay A. Shepherd +School of Design and Informatics +Division of Cyber Security +Abertay University +Dundee, United Kingdom +lynsay.shepherd@abertay.ac.uk +Abstract—Over the past decade, the media landscape has seen +a radical shift. As more of the public stay informed of current +events via online sources, competition has grown as outlets vie +for attention. This competition has prompted some online outlets +to publish sensationalist and alarmist content to grab readers’ +attention. Such practices may threaten democracy by distorting +the truth and misleading readers about the nature of events. +This paper proposes a novel system for detecting, processing, +and warning users about misleading content online to combat the +threats posed by misinformation. By training a machine learning +model on an existing dataset of 32,000 clickbait news article +headlines, the model predicts how sensationalist a headline is and +then interfaces with a web browser extension which constructs +a unique content warning notification based on existing design +principles and incorporates the models’ prediction. This research +makes a novel contribution to machine learning and human- +centred security with promising findings for future research. By +warning users when they may be viewing misinformation, it is +possible to prevent spontaneous reactions, helping users to take +a deep breath and approach online media with a clear mind. +Index Terms—Misinformation, Machine Learning, Human- +Centred Security, Cyber Security, Web Technologies. +I. INTRODUCTION AND BACKGROUND +The Internet has rapidly become the dominant means for +users to stay connected, even more so in the wake of the +COVID-19 pandemic; however, this has led to several prob- +lems [1]. From connecting with friends and family, comment- +ing on recent events, or just being entertained, the Internet +plays an integral role in how we inform and stay informed +[2]. However, in a landscape that rewards attention rather than +quality, some have turned to more dubious practices such as +sensationalism, misinformation, and shocking imagery. +A. The Incentivisation of Misinformation & Clickbait +As more and more content is published every second, focus +shifts from producing quality content to hijacking attention. +When users’ interest is constantly pulled from one article, +video, or image to the next, publishers need to find new +ways to garner clicks. Consequently, this can easily lead +to sensationalism, clickbait, and in the worst case, outright +misinformation without the user being aware. +The constant news cycle of the Information Age presents +difficulties for news outlets to write up each emerging story. +Instead, some outlets adopt the practice of aggregating content, +either lightly editorialising a piece of existing content or +directing users to another source to read the information there. +The method of news aggregation is controversial, with some +feeling that it is blatant theft of content, whilst others see +it as the only viable solution to surviving in a fast-paced +information economy [3] [4]. +B. The Impact of Sharing Misinformation and Clickbait +Regardless of the ethics of clickbait and similar practices, +publishing misinformation can be harmful once it reaches a +broader audience. Many internet users utilise social network- +ing, which compounds misinformation’s effects by allowing +for rapid dissemination of falsehoods and half-truths. Often +this creates a chain-reaction scenario where one user shares +a story with another user, who in turn shares it with another, +and so on. The impact of this phenomenon does not require a +user to have a vast following on social media platforms. Cˆot´e +and Darling [5] found that once a Twitter account surpassed +approximately 1000 followers, it was much more likely to +attract other users from a wide variety of backgrounds, in- +cluding members of the general public, outreach groups, and +even influential decision makers. This dramatically increases +the potential audience that a piece of content can reach - and be +shared by. Such a situation can result in users being presented +with the same information multiple times, albeit being posted +by different users. +Fazio, Rand and Pennycook analysed the effects of +widespread sharing of information [6]. The authors exam- +ined how repeated exposure to information (both true and +false) affects individuals’ perception of the data presented. +Participants were asked to rate a series of statements on a +percentage scale based on their believability. Statements were +presented in two ways: some were shown only once, while +others were repeatedly shown and were interspersed with one- +off statements. Participants’ perception of truth across the +accuracy scale rose without any influencing factor, other than +being repeatedly shown the same information. +When rated by participants, information regarded as the +truth was rated as such. Similarly, information strongly con- +sidered false did not influence participants sufficiently to +arXiv:2301.03301v1 [cs.HC] 9 Jan 2023 + +cross over into the “considered as true” category. This was +noticeable in the 1%-30% bin, where repeated exposure did not +generate a pronounced change in participant opinion. One of +the paper’s key findings relates to information considered to be +ambiguous. Information initially considered unclear gradually +became regarded as accurate and authentic the more the user +was exposed to the statement. This was particularly evident +in the 41-70% bin which saw, on average, an increase of 6 +points compared to their original rating. +Existing research [3]–[6] suggests that, in the current hyper- +social age, users risk having their perceptions warped by +misleading statements, hyperbole, and repeated exposure to +information. This repetition does not have to stem purely from +repeatedly seeing the same news article displayed but also +from the conversation surrounding the topic. Increasingly frag- +mented and confrontational viewpoints presented online com- +plicates how users determine what is true or false. However, +simply stating that a user is ‘misinformed’ or ‘wrong’ does +not make them more inclined to reassess their understanding. +Instead, a more thoughtful approach is required, giving users +a starting point from which to come to their own conclusions. +As Bronstein et al. [7] suggests, interventions catering towards +the promotion of ‘open-minded and analytical thinking’ could +be of benefit in curbing the impact of misinformation. +C. Informing Users of Risk Online +As +misinformation +has +become +more +apparent +and +widespread in recent years, research into warning users when +they are being misled has received increased interest, both in +academia and industry. Many social media sites have taken +steps to curb the impact of misinformation on their respective +platforms, typically by presenting users with a warning label. +This approach offers a simple means of quickly informing +users that the content they are viewing may be misleading; +proving popular with various social media platforms adopting +similar practices including Twitter [8] and Meta’s Facebook +[9]. +Ross et al. [10] analysed the effectiveness of warning labels +adopted by major social platforms. Focusing primarily on the +methods used to dissuade users from sharing misinformation, +the authors tested two different label styles, one replicating +those used by Meta and another informed by contemporary +research. Participants (N = 151) were shown content consisting +of six true and six false stories. Group one were presented +all stories without any warning label. Group two were shown +half the stories with a warning and the other half without. The +participants in each group were then asked to determine which +stories were manipulated or fake and which were unaltered. +The research found that neither of the warning messages +changed user behaviour. Users did not appear to be more +suspicious of labelled content and were just as likely to interact +with the content as that which was unlabelled. +D. Designing Effective Warning Labels +Ross et al. [10] indicate that providing additional context to +the user can be beneficial in curbing the impact of misinfor- +mation. Careful consideration in the design process on what +information is communicated to the user and how could be +instrumental in limiting misinformation’s reach. +Shepherd and Renaud [11] conducted a literature review +on designing effective security warning labels in browsers. +Assessing existing work in this area, the authors found that +time and resources are not adequately allocated to designing +warning labels leading to user frustration and confusion. This +sentiment appeared to be validated by Ross et al. [10]. The au- +thors found that the effectiveness of current solutions differed. +Some warnings wrongly assumed that users had background +knowledge on a topic which decreased their effectiveness, +whilst others were too vague in their language that users did +not understand the ramifications of their choices. +To combat the aforementioned issues, Shepherd and Renaud +[11] concluded with the proposal of a set of design guidelines +for browser warnings. The authors note that warnings designed +for privacy and those designed for security differed, suggesting +that different priorities must be considered depending on the +intended use- case. The proposed guidelines recommend using +simple and concise language to alert users to a potential +issue and using neutral colours to avoid an undue emotional +response. Furthermore, the guidelines propose linking to ad- +ditional resources should the initial description not prove +sufficient. Although the research in question is primarily +targeted toward warning labels for security purposes, there +is still value in applying these recommendations to tackling +misinformation. +E. Designing Effective Browser Warnings and Labels +Much work has been done previously in the field of usable +security concerning the design of warning labels. Early at- +tempts at warning systems typically used contextual measures +such as a small on-page popup informing the user of potential +risk. However, work by Wu, Miller and Garfinkel [12] illus- +trated these popups are often ignored, misunderstood, or users +do not even recognise they are there. +Further research in this area took on a different approach, +utilising interstitial warnings. This approach required users to +interact with the warning label before proceeding, the under- +lying theory of this approach being that making the warning +the central focus of the users’ attention would increase the +likelihood of users reading and making an informed decision +on the contents of the warning. +Until recently, most research on effective warning design +has been limited to web-security topics such as expired cer- +tificates or phishing links. Kaiser et al. [13] examined warning +label design to inform users of potential disinformation online. +Evaluating several different warning design styles, ranging +from information-dense with minimal colouring, to warnings +with a strong visual impact but minimal detail, the authors +assessed how users responded to the designs in a realistic +environment. +In a survey conducted with 238 participants, the authors +found that participants responded most favourably to designs +which featured a reference to the perceived risk (“This page + +contains misinformation”) and the recommended next step +(“Consider finding alternative sources.”). The authors note +that none of the designs evaluated showed any significant +difference in how likely users were to consult a second +or alternative source afterwards. The authors propose that +changes in behaviour were more likely to stem from the +friction caused by having to manually click through a warning +rather than the content of the warning itself. +Multiple factors play a role in shaping how users respond +to warning labels, including the language used within them. +Findings from a research study conducted by Mozilla [14] to +understand how to design better warning labels highlighted +that employing opinionated design was more important than +providing objective information. This means it is more im- +portant to convey the idea of a threat rather than what the +threat is - prior research suggested overly technical warnings +lead to confusion among users. Mozilla implemented this +by simplifying the warning heading to feature abstract but +understandable language. Additionally, for scenarios where +users want to know details of the underlying issue, the warning +provides an accessible description of the risks associated with +the security fault. +The issue of labelling misleading content is a challenging +one. What counts as misinformation must be determined, +and designing warning systems that promote critical thinking +rather than knee-jerk reactions is still an ongoing area of re- +search. Although the means of warning users adopted by major +social platforms may have limited efficacy [10], Shepherd and +Renaud [11] indicate that warning labels can cater to users’ +assumed knowledge and understanding without provoking +undue alarm or concern. Similarly, Kaiser et al. [13] suggest +that such research can be used to combat misinformation. +F. Detecting Clickbait with Machine Learning +The vast array of content posted online every second makes +it impossible for human moderators to assess and review all +dubious uploads. The use of an automated system is merited, +one capable of rapidly and reliably analysing content for +potentially misleading information which can integrate inter- +vention measures. Machine learning’s inherent capabilities for +finding and predicting patterns in information are well-suited +to tackling misinformation. Furthermore, machine learning +has seen renewed interest over the past decade as computing +power and data storage have matured to enable real-world +applications across a host of use cases. +Chen, Conroy and Rubin [15] explored if clickbait, and by +extension, misinformation, could be detected using machine +learning methods. Conducting a holistic view of research in +the field, the authors note four unique means of detecting +clickbait. Initially focusing on the textual content of clickbait +articles, the authors found clickbait often displays lexical and +semantic features unique to its form. The authors cited work +by Lex, Juffinger and Granitzer [16] which analysed clickbait +based upon factors such as word length, word choice, and +terminology, and found that a machine learning model could +be trained to detect clickbait with 77% accuracy regardless of +the topic discussed. +Appealing to users’ innate curiosity by using unresolved +pronouns or alluding to content within the article was also +consistent with clickbait. As a subsequent paper by Rubin et al. +[17] noted, automated fact-checking and verification systems +could help detect language patterns in text and warn users +that the content they are about to read may be misleading. +The authors also note that such a tool could prove helpful +for journalists too, alerting them when they may be conflating +claims or accidentally misleading. +Clickbait is not strictly limited to the text of the article +in question; the authors also found that surrounding factors +such as imagery and how the user interacts with the article +play a key role. Regarding the former, the authors [17] cite +Ecker et al. [18] who found that clickbait articles were likely +to feature images which were incongruent with the headline. +In such articles, an image can be used to grab the would-be +readers’ attention with an impactful but unrelated image or +shape opinion before the article was read. +The authors [17] also noted that previous research had found +clickbait outlets typically aimed to attract user attention before +funnelling them towards sponsored content or advertising. +Additionally, the time difference between “time spent reading +the article” and “time spent sharing and commenting about +the article” could also be a signifier of clickbait. In this +aspect, clickbait articles tend to use alarmist or sensationalist +headlines to provoke knee-jerk responses (whether that be +commenting or sharing) before the user has actually read the +content within. +G. Problem Space +The rapid rise of the information age has led some to +adopt unethical practices to drive engagement. Whether these +practices are deployed purposefully or not, they pose a serious +risk to society. Although existing work has explored the use of +warning labels, depending on how these are designed, these +may be ineffective. Given the amount of content published +every second, it would be impossible to label the accuracy +of content manually. Instead, machine learning offers a com- +pelling alternative. Misinformation poses a severe threat; there- +fore combining advances in machine learning and warning +design means an effective solution can be proposed to keep +users safe. +II. METHODOLOGY +The proposed method consists of two-components: the +machine learning model, for analysing and classifying content, +and the web extension for communicating potential risk to the +user. A simplified pipeline can been seen in Figure 1. +Using TensorFlow [19] and adopting the same dataset as +used by Chakraborty et al. [20], a Sequential Model was +trained on 32,000 news article headlines, labelled as either +‘clickbait’ or ‘non-clickbait’. The model, consisting of four +layers (excluding the input layer), tokenises input text into a +64-dimensional dense vector before running it through a global + +average pooling filter. Output is then fed through a layer of +ReLU nodes, followed by a final layer of Sigmoid nodes to +arrive at a real number between zero (indicating neutral) and +one (indicating strongly misleading). +The model was then connected to a browser extension via a +Native Manifest, which allowed the browser to send portions +of an article (e.g., the headline) to the model to analyse and +generate a rating. The rating is then returned to the browser, +after which a relevant warning can be presented to the user. +Warnings were designed to be informative and actionable for +the user, presenting clear detailing about the perceived risk +and recommended next steps. +A. Developing the machine learning model +1) Dataset: The same dataset used by Chakraborty et al. +[20] was adopted for this project and consisted of 32,000 +news article headlines labelled as either ‘clickbait’ or ‘non- +clickbait’. The dataset offered a robust and relevant base upon +which to build. In particular, clickbait and misinformation rely +on emotional language to provoke a response, suggesting the +dataset would help develop a model well suited to detecting +such language. +2) Model: In practice, the backend of this project cen- +tres around binary classification: Is this piece of text click- +bait/misinformation or not? As such, using a Sequential model +was deemed the most suitable due to its singular input-output +structure, a structure well suited to classification tasks such as +this. +Fig. 1. Example simplified data pipeline. +3) Preprocessing Data : The dataset was split into 26,666 +training samples and 5,334 testing samples which equates to +83% of the dataset for training and the remaining 17% for test- +ing. Before training, the dataset had to be formatted such that +the model could determine distinctions between clickbait and +non-clickbait. This was achieved by converting, the headlines +in the dataset into a vocabulary of word embeddings (Figure +2). To ensure uniformity across the dataset, all sequences +were padded to 24 tokens long which was considered a safe +maximum length for a headline. Headlines longer than 24 +words long were automatically truncated to the maximum +length. +Fig. 2. Example word embedding. +4) Building the Model: The model is visualised in Figure +3, and consists of the input layer, two hidden layers, and +the output layer. The first layer takes the input (a tokenised +sentence) and transforms it into a 64-dimensional dense vector. +The usage of dense vectors allows for the semantic meaning +Fig. 3. Visualisation of the Model. +of the sentence to be compressed, ensuring better general- +isation. Despite their ability to derive underlying meanings +and connections for a given sentence, the aforementioned +dense vectors can result in overfitting if they become too +detailed. To address the issue, the second layer consists of +a Global Average Pool. This layer takes the 64-dimensional +vector and determines the mean of each input channel (the 24- +dimensional token sequences) which allows the model to learn +approximations of embeddings rather than their exact values +(Figure 4). +Fig. 4. Visualisation of 1-Dimensional global average pooling. +At this stage, the input data is now formatted and approx- +imated to limit overfitting, and layers can be constructed, +which will inform the output of the model. The first activation +function of the model uses a rectified linear activation function +(or ‘ReLU’). ReLU ensures that the next layer of the network +receives a positive value as ReLU outputs 0 for input values +equal to or less than 0 or the original value for those greater +than 0. Finally, the data is passed through a Sigmoid activation +layer, ensuring the resultant output falls between 0 and 1, i.e., +“Is this piece of text clickbait or not?”. +The model measures its performance based on the ac- +curacy of its predictions. The task involves classification; + +9 makeup tips you won't believe! +Model + Clickbait: 1If Disney Princesses Were From Florida +[10122 +752 +6586 4 1 737 +0 +0 0 ( +0 ( +0 ( +000000000000( +01input: +[(None, 24)] +InputLayer +output: +[(None, 24)] +input: +(None,24) +Embedding +output: +(None, 24, 64) +input: +(None, 24, 64) +GlobalAveragePooling1D +output: +(None, 64) +input: +(None, 64) +Dense +output: +(None, 2) +input: +(None, 2) +Dense +output: +(None, 1)4 +6 +4 +2 +4Fig. 5. Accuracy graph during model training (Higher is better). +thus, a binary cross-entropy loss function is used. The func- +tion calculates how far the models’ predictions stray from +the dataset’s labels. A gradient descent with a momentum +optimiser (also known as Stochastic Gradient Descent or +SGD) further minimises the loss function. The optimiser helps +improve the model’s training rate by minimising loss across +training iterations. By doing so, it is intended that the model +predictions will gradually trend towards the expected output. +Fig. 6. Loss graph during model training (Lower is better). +The model was trained for 80 epochs with a batch size +of 128. Although batch sizes larger than 32 can lead to +underfitting, it was intended that the larger epoch size would +gradually result in greater accuracy and convergence, which +can be seen in Figures 5 and 6. After the model was compiled, +trained, and evaluated, it was exported for use by the web +extension. +B. Web extension and warning messages +1) Creating the web extension: A web browser extension +was developed to ensure the model could be deployed in a real- +world context. The extension means the model can analyse +news articles as the user views them, providing a warning if +misleading content is found. +Native Manifests [21] were used to allow a web browser to +interface with a native application, passing data back and forth +between the two. These manifests allowed the TensorFlow +model to perform predictions locally on the machine and then +send the resultant prediction to the browser for further analysis +and output. +Within the browser, the analysis begins when the headline +of the page the user has visited is fetched. Initially, white +space and control characters are trimmed. The headline is +processed, and a value is returned indicating how sensationalist +the headline is. +On the user’s device, the program transfers over to the native +application, which handles parsing the headline into a format +suitable for the model before computing a rating which is +returned to the browser. Data from the browser is JSON- +encapsulated and is sent via standard input (stdin), which +the program reads from. Following this, the script begins +importing libraries for loading the model and formatting the +incoming data accordingly. The model is loaded, and the +tokeniser is instantiated to convert the incoming headline. At +this stage, the initial setup is complete and the model is ready +for use. +The core of the script features a loop which waits for a +message from the browser to be received, at which point the +decoding process can take place. Now that the headline of the +article is available, the script tokenises it and provides padding +to ensure compatibility with the model. From here, a standard +model prediction call can be made, encoded, and returned to +the browser for display to the user. +2) Presenting warnings to the user: When the native ap- +plication produces a result, it is returned to the browser. The +browser extension then generates a message sent to the news +article’s page, with the native applications result stored in a +variable. This message is received by the content script, which +is injected into each page by the extension. +The content script dynamically generates a warning label +for the user. This is done by waiting to receive a message +(the result) from the background script. This value is then +multiplied by ten (to accommodate any floating-point issues +that may arise (i.e. converting 0.8 to 8)). To prevent repeatedly +warning the user about innocuous content, only headlines that +score above five out of ten have a warning generated. Scrolling +is disabled whilst the warning is on-screen, ensuring the user +has to acknowledge it. +With regards to this project, the existing literature points +towards interstitial warnings being the most likely to promote +change in user behaviour. Additionally, even if most users do +not appear to actually read the content of a warning label, they +do show a preference for such information being present. +Informed by the papers discussed in Section I-D, the web +extension was designed to ensure strong visual clarity to +effectively convey risks associated with a piece of misleading +content. +The warning adopts a paywall-style design, mimicking an +approach that users will likely already be familiar with from +other news sites. This helps to ensure that the warning is +not overlooked, which can happen with contextual warnings. +To further ensure that the warning is brought to the user’s +attention, an overlay is used to darken the article and scrolling + +model accuracy +tain +0.85 +val +0.80 +0.75 +accuracy +0.70 +0.65 +0.60 +0.55 +0.50 +10 +70 +0 +20 +30 +40 +50 +60 +80 +epochmodel loss +0.70 +tain +val +0.65 +0.60 +los5 +0.55 +0.50 +0.45 +0.40 +10 +20 +30 +40 +50 +0 +70 +60 +80 +epochis prevented while the warning is on screen. The warning +design comes in 5 variants - ranging from most minor to most +severe, depending on the article’s rating. Exemplar designs can +be seen in Figure 7 +Fig. 7. Sample of warning designs. +A vital problem with previous warning designs is the poor +communication of risk, whereby warnings may be obscured +by jargon [13]. The design of the warnings seeks to minimise +existing issues by conveying as much relevant information +as possible in an easy-to-read format. Prominent symbols +represent increasing risk levels based on the article’s rating. +Articles lower on the risk scale are given a more general +’magnifying glass’ symbol, promoting the notion of thinking +more critically about the article’s merit. If an article includes +more severe levels of misinformation, increasingly prominent +’alert’-oriented symbols are deployed, such as warning signs, +stop signs and symbols of authority such as police figures. +Additionally, an oscillating gradient is placed behind the +warning. Depending on the severity of the warning, the colour +used will shift from yellow to orange to red. The subtle +movement of the gradient is intended to draw the user’s eye +to the warning, with the unique colour of each warning also +helping the user understand the associated level of risk. +Ultimately, the extension seeks to change user behaviour +and provide education on meaningful steps users can take to +protect themselves from misinformation in the future. As such, +each warning label features unique phrasing that informs the +user of not just what the perceived risk is but also advice on +actionable next steps. +Two buttons are presented to the user at the bottom of the +warning, allowing them to dismiss the warning and continue, +or navigate away from the page. To indicate the intended +behaviour, the option to navigate away is displayed in promi- +nent green with a ’Recommended’ label included in brackets. +Conversely, the option to dismiss the warning is presented in +red and is slightly faded out to deliberately be obscured against +the background until the user hovers over the button. +III. RESULTS AND DISCUSSION +Fig. 8. Accuracy comparison between training and evaluation. +During training, the model achieved an accuracy of approx- +imately 85% and a loss of 0.39, and when pitted against +the evaluation dataset, the model achieved an accuracy of +approximately 45% with a loss of 1.15 (Figure 8, Figure 9). +This decline in accuracy likely stems from inconsistencies in +the existing evaluation dataset, e.g., improperly formatted data, +such as some of the labels assigned to the headlines do not +appear to be correct. This could be resolved via an additional +data cleaning. Another point of note is that the evaluation +dataset used only binary labels (Is this headline ‘clickbait’ or +‘news’?), which may have also contributed to the discrepancy +in accuracy as the model was producing a result between 0 +and 1 instead of a pure binary output. + +ThisContent PutsYouatRisk +Misleadingarticlescanwarpyourperceptionofevents +Think twice before continuing +Deep Breathhas detectedthatthis article is misleading +and should not be viewed. +Backto safety (Recommended) +Misleading Content Alert +Sensationalistcontentcantrickyouinto consumingfalse +information.Consultmultiplesources +Websites can use sensationalist languageto mislead and +deceive.Deep Breaths detection algorithmbelieves that +this article is misleading. +Dismiss and continue +Back to safety (Recommended) +SensationalistContentWarning +Thispagemaycontainsensationalistormisleading +content.Considerconsulting additionalsources. +Websites can use sensationalist languagetograb your +attention.DeepBreathsdetectionalgorithmbelievesthat +this article may be misleading. +Dismiss and continue +Backto safety (Recommended)100 +90 +85% +80 +70 +Accuracy +60 +50 +45% +40 +30 +20 +10 +0 +Training +Evaluation +(Higher is better.)Fig. 9. Loss comparison between training and evaluation. +With regards to machine learning, the project confirms the +findings of Lex, Juffinger and Granitzer (2010) that clickbait +and misinformation can be detected based upon lexical seman- +tics, namely word choice, word length, and word commonality, +i.e., Word x appears frequently alongside word y. +IV. CONCLUSION AND FUTURE WORK +The model demonstrated in this paper has shown a re- +liable degree of performance, however, it could be refined +further to derive even better results. The models’ accuracy +and loss were still increasing and decreasing, respectively, +suggesting better performance could be obtained before the +curves flattened out. Furthermore, the capability of the model +could be extended further. The model has been trained only on +clickbait-styled headlines, which was effective. However, more +robust results may be achieved by training on the contents of +clickbait articles which would allow the model to develop a +deeper understanding of the article and make a more nuanced +prediction. The model used in this paper is a Sequential model +designed to take a single output and produce a single result. +Although this is effective at classifying a single headline as +used in this paper, greater functionality could be achieved +by allowing multiple inputs and outputs. This could include +assessing the article’s headline but also a selection of sentences +from the article. The rating assigned to content is dynamic; +however, the underlying warning remains static. By expanding +the models’ capabilities, it may also be possible to provide +personalised warnings relevant to the content. In practice, this +could mean warning the user about specific aspects of the +article, such as sensationalist authors, misleading sentences, +and miscaptioned images. Although every effort was taken to +ensure the model made balanced and accurate predictions, no +system is infallible. Conducting user testing and introducing +the option for users to report when the model makes a +perceived miscalculation could help adjust for missteps. +The work presented in this paper makes promising ad- +vances toward tackling the issue of misinformation online +by combining machine learning, human-computer interaction +research, and web technologies. Findings validate and build +upon prior research, and incorporating machine learning with +usable security is still a relatively under-explored area of study. +REFERENCES +[1] H. S. Lallie, L. A. Shepherd, J. R. Nurse, A. Erola, G. Epiphaniou, +C. Maple, and X. Bellekens, “Cyber security in the age of covid-19: +A timeline and analysis of cyber-crime and cyber-attacks during the +pandemic,” Computers & Security, vol. 105, p. 102248, 2021. +[2] A. +Mitchell, +E. +Shearer, +and +G. +Stocking, +“News +on +twitter: +Consumed +by +most +users +and +trusted +by +many,” +2021. +[Online]. Available: https://www.pewresearch.org/journalism/2021/11/ +15/news-on-twitter-consumed-by-most-users-and-trusted-by-many/ +[3] H. I. Chyi, S. C. Lewis, and N. Zheng, “Parasite or partner? coverage +of google news in an era of news aggregation,” Journalism & Mass +Communication Quarterly, vol. 93, no. 4, pp. 789–815, 2016. +[4] M. Coddington, “Gathering evidence of evidence: News aggregation as +an epistemological practice,” Journalism, vol. 21, no. 3, pp. 365–380, +2020. +[5] I. M. Cˆot´e and E. S. Darling, “Scientists on twitter: Preaching to the +choir or singing from the rooftops?” Facets, vol. 3, no. 1, pp. 682–694, +2018. +[6] L. K. Fazio, D. G. Rand, and G. Pennycook, “Repetition increases +perceived truth equally for plausible and implausible statements,” Psy- +chonomic bulletin & review, vol. 26, no. 5, pp. 1705–1710, 2019. +[7] M. V. Bronstein, G. Pennycook, A. Bear, D. G. Rand, and T. D. Can- +non, “Belief in fake news is associated with delusionality, dogmatism, +religious fundamentalism, and reduced analytic thinking,” Journal of +applied research in memory and cognition, vol. 8, no. 1, pp. 108–117, +2019. +[8] Y. +Roth +and +N. +Pickles, +“Updating +our +ap- +proach +to +misleading +information,” +2020, +https://blog.twitter.com/en us/topics/product/2020/updating-our- +approach-to-misleading-information (Accessed 8 February 2022). +[9] Facebook, “Taking Action Against People Who Repeatedly Share +Misinformation,” +2021, +https://about.fb.com/news/2021/05/taking- +action-against-people-who-repeatedly-share-misinformation/ (Accessed +8 February 2022). +[10] B. Ross, A. Jung, J. Heisel, and S. Stieglitz, “Fake news on social media: +The (in) effectiveness of warning messages,” in CIS 2018 Proceedings. +16. +Association for Information Systems, 2018. +[11] L. A. Shepherd and K. Renaud, “How to design browser security +and privacy alerts,” in 2018 AISB Convention: Symposium on Digital +Behaviour Intervention for Cyber Security. +Society for the Study of +Artificial Intelligence and Simulation for . . . , 2018, pp. 21–28. +[12] M. Wu, R. C. Miller, and S. L. Garfinkel, “Do security toolbars actually +prevent phishing attacks?” in Proceedings of the SIGCHI conference on +Human Factors in computing systems, 2006, pp. 601–610. +[13] B. Kaiser, J. Wei, E. Lucherini, K. Lee, J. N. Matias, and J. Mayer, +“Adapting security warnings to counter online disinformation,” in 30th +USENIX Security Symposium (USENIX Security 21), 2021, pp. 1163– +1180. +[14] M. +Walkington, +“Designing +Better +Security +Warnings,” +2019, +https://blog.mozilla.org/ux/2019/03/designing-better-security-warnings/ +(Accessed 8 February 2022). +[15] Y. Chen, N. J. Conroy, and V. L. Rubin, “Misleading online content: +recognizing clickbait as” false news”,” in Proceedings of the 2015 ACM +on workshop on multimodal deception detection, 2015, pp. 15–19. +[16] E. Lex, A. Juffinger, and M. Granitzer, “Objectivity classification in +online media,” in Proceedings of the 21st ACM conference on Hypertext +and hypermedia, 2010, pp. 293–294. +[17] V. L. Rubin, N. Conroy, Y. Chen, and S. Cornwell, “Fake news or +truth? using satirical cues to detect potentially misleading news,” in +Proceedings of the second workshop on computational approaches to +deception detection, 2016, pp. 7–17. +[18] U. K. Ecker, S. Lewandowsky, E. P. Chang, and R. Pillai, “The effects +of subtle misinformation in news headlines.” Journal of experimental +psychology: applied, vol. 20, no. 4, p. 323, 2014. +[19] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S. +Corrado, A. Davis, J. Dean, M. Devin et al., “Tensorflow: Large-scale +machine learning on heterogeneous distributed systems,” arXiv preprint +arXiv:1603.04467, 2016. + +1.2 +1.15 +1.1 +1 +0.9 +0.8 +.Oss +0.7 +0.6 +L +0.5 +0.39 +0.4 +0.3 +0.2 +0.1 +0 +Training +Evaluation +(Lower is better.)[20] A. Chakraborty, B. Paranjape, S. Kakarla, and N. Ganguly, “Stop +clickbait: Detecting and preventing clickbaits in online news media,” +in Advances in Social Networks Analysis and Mining (ASONAM), 2016 +IEEE/ACM International Conference on. +IEEE, 2016, pp. 9–16. +[21] Mozilla, “Native Manifests,” 2022, https://developer.mozilla.org/en- +US/docs/Mozilla/Add-ons/WebExtensions/Native manifests +(Accessed +5 March 2022). + diff --git a/6NE1T4oBgHgl3EQfmwRz/content/tmp_files/load_file.txt b/6NE1T4oBgHgl3EQfmwRz/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..81b11cbcea52d8bd974617c68b6b97ac06e4d08a --- /dev/null +++ b/6NE1T4oBgHgl3EQfmwRz/content/tmp_files/load_file.txt @@ -0,0 +1,493 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf,len=492 +page_content='Deep Breath: A Machine Learning Browser Extension to Tackle Online Misinformation Marc Kydd School of Design and Informatics Division of Cyber Security Abertay University Dundee, United Kingdom m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='kydd1800@abertay.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='uk Lynsay A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Shepherd School of Design and Informatics Division of Cyber Security Abertay University Dundee, United Kingdom lynsay.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='shepherd@abertay.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='uk Abstract—Over the past decade, the media landscape has seen a radical shift.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' As more of the public stay informed of current events via online sources, competition has grown as outlets vie for attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This competition has prompted some online outlets to publish sensationalist and alarmist content to grab readers’ attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Such practices may threaten democracy by distorting the truth and misleading readers about the nature of events.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This paper proposes a novel system for detecting, processing, and warning users about misleading content online to combat the threats posed by misinformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' By training a machine learning model on an existing dataset of 32,000 clickbait news article headlines, the model predicts how sensationalist a headline is and then interfaces with a web browser extension which constructs a unique content warning notification based on existing design principles and incorporates the models’ prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This research makes a novel contribution to machine learning and human- centred security with promising findings for future research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' By warning users when they may be viewing misinformation, it is possible to prevent spontaneous reactions, helping users to take a deep breath and approach online media with a clear mind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Index Terms—Misinformation, Machine Learning, Human- Centred Security, Cyber Security, Web Technologies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' INTRODUCTION AND BACKGROUND The Internet has rapidly become the dominant means for users to stay connected, even more so in the wake of the COVID-19 pandemic;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' however, this has led to several prob- lems [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' From connecting with friends and family, comment- ing on recent events, or just being entertained, the Internet plays an integral role in how we inform and stay informed [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' However, in a landscape that rewards attention rather than quality, some have turned to more dubious practices such as sensationalism, misinformation, and shocking imagery.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The Incentivisation of Misinformation & Clickbait As more and more content is published every second, focus shifts from producing quality content to hijacking attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' When users’ interest is constantly pulled from one article, video, or image to the next, publishers need to find new ways to garner clicks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Consequently, this can easily lead to sensationalism, clickbait, and in the worst case, outright misinformation without the user being aware.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The constant news cycle of the Information Age presents difficulties for news outlets to write up each emerging story.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Instead, some outlets adopt the practice of aggregating content, either lightly editorialising a piece of existing content or directing users to another source to read the information there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The method of news aggregation is controversial, with some feeling that it is blatant theft of content, whilst others see it as the only viable solution to surviving in a fast-paced information economy [3] [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The Impact of Sharing Misinformation and Clickbait Regardless of the ethics of clickbait and similar practices, publishing misinformation can be harmful once it reaches a broader audience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Many internet users utilise social network- ing, which compounds misinformation’s effects by allowing for rapid dissemination of falsehoods and half-truths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Often this creates a chain-reaction scenario where one user shares a story with another user, who in turn shares it with another, and so on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The impact of this phenomenon does not require a user to have a vast following on social media platforms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Cˆot´e and Darling [5] found that once a Twitter account surpassed approximately 1000 followers, it was much more likely to attract other users from a wide variety of backgrounds, in- cluding members of the general public, outreach groups, and even influential decision makers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This dramatically increases the potential audience that a piece of content can reach - and be shared by.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Such a situation can result in users being presented with the same information multiple times, albeit being posted by different users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Fazio, Rand and Pennycook analysed the effects of widespread sharing of information [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors exam- ined how repeated exposure to information (both true and false) affects individuals’ perception of the data presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Participants were asked to rate a series of statements on a percentage scale based on their believability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Statements were presented in two ways: some were shown only once, while others were repeatedly shown and were interspersed with one- off statements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Participants’ perception of truth across the accuracy scale rose without any influencing factor, other than being repeatedly shown the same information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' When rated by participants, information regarded as the truth was rated as such.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Similarly, information strongly con- sidered false did not influence participants sufficiently to arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='03301v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='HC] 9 Jan 2023 cross over into the “considered as true” category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This was noticeable in the 1%-30% bin, where repeated exposure did not generate a pronounced change in participant opinion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' One of the paper’s key findings relates to information considered to be ambiguous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Information initially considered unclear gradually became regarded as accurate and authentic the more the user was exposed to the statement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This was particularly evident in the 41-70% bin which saw, on average, an increase of 6 points compared to their original rating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Existing research [3]–[6] suggests that, in the current hyper- social age, users risk having their perceptions warped by misleading statements, hyperbole, and repeated exposure to information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This repetition does not have to stem purely from repeatedly seeing the same news article displayed but also from the conversation surrounding the topic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Increasingly frag- mented and confrontational viewpoints presented online com- plicates how users determine what is true or false.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' However, simply stating that a user is ‘misinformed’ or ‘wrong’ does not make them more inclined to reassess their understanding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Instead, a more thoughtful approach is required, giving users a starting point from which to come to their own conclusions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' As Bronstein et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [7] suggests, interventions catering towards the promotion of ‘open-minded and analytical thinking’ could be of benefit in curbing the impact of misinformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Informing Users of Risk Online As misinformation has become more apparent and widespread in recent years, research into warning users when they are being misled has received increased interest, both in academia and industry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Many social media sites have taken steps to curb the impact of misinformation on their respective platforms, typically by presenting users with a warning label.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This approach offers a simple means of quickly informing users that the content they are viewing may be misleading;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' proving popular with various social media platforms adopting similar practices including Twitter [8] and Meta’s Facebook [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Ross et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [10] analysed the effectiveness of warning labels adopted by major social platforms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Focusing primarily on the methods used to dissuade users from sharing misinformation, the authors tested two different label styles, one replicating those used by Meta and another informed by contemporary research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Participants (N = 151) were shown content consisting of six true and six false stories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Group one were presented all stories without any warning label.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Group two were shown half the stories with a warning and the other half without.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The participants in each group were then asked to determine which stories were manipulated or fake and which were unaltered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The research found that neither of the warning messages changed user behaviour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Users did not appear to be more suspicious of labelled content and were just as likely to interact with the content as that which was unlabelled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Designing Effective Warning Labels Ross et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [10] indicate that providing additional context to the user can be beneficial in curbing the impact of misinfor- mation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Careful consideration in the design process on what information is communicated to the user and how could be instrumental in limiting misinformation’s reach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Shepherd and Renaud [11] conducted a literature review on designing effective security warning labels in browsers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Assessing existing work in this area, the authors found that time and resources are not adequately allocated to designing warning labels leading to user frustration and confusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This sentiment appeared to be validated by Ross et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The au- thors found that the effectiveness of current solutions differed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Some warnings wrongly assumed that users had background knowledge on a topic which decreased their effectiveness, whilst others were too vague in their language that users did not understand the ramifications of their choices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' To combat the aforementioned issues, Shepherd and Renaud [11] concluded with the proposal of a set of design guidelines for browser warnings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors note that warnings designed for privacy and those designed for security differed, suggesting that different priorities must be considered depending on the intended use- case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The proposed guidelines recommend using simple and concise language to alert users to a potential issue and using neutral colours to avoid an undue emotional response.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Furthermore, the guidelines propose linking to ad- ditional resources should the initial description not prove sufficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Although the research in question is primarily targeted toward warning labels for security purposes, there is still value in applying these recommendations to tackling misinformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Designing Effective Browser Warnings and Labels Much work has been done previously in the field of usable security concerning the design of warning labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Early at- tempts at warning systems typically used contextual measures such as a small on-page popup informing the user of potential risk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' However, work by Wu, Miller and Garfinkel [12] illus- trated these popups are often ignored, misunderstood, or users do not even recognise they are there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Further research in this area took on a different approach, utilising interstitial warnings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This approach required users to interact with the warning label before proceeding, the under- lying theory of this approach being that making the warning the central focus of the users’ attention would increase the likelihood of users reading and making an informed decision on the contents of the warning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Until recently, most research on effective warning design has been limited to web-security topics such as expired cer- tificates or phishing links.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Kaiser et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [13] examined warning label design to inform users of potential disinformation online.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Evaluating several different warning design styles, ranging from information-dense with minimal colouring, to warnings with a strong visual impact but minimal detail, the authors assessed how users responded to the designs in a realistic environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' In a survey conducted with 238 participants, the authors found that participants responded most favourably to designs which featured a reference to the perceived risk (“This page contains misinformation”) and the recommended next step (“Consider finding alternative sources.”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors note that none of the designs evaluated showed any significant difference in how likely users were to consult a second or alternative source afterwards.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors propose that changes in behaviour were more likely to stem from the friction caused by having to manually click through a warning rather than the content of the warning itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Multiple factors play a role in shaping how users respond to warning labels, including the language used within them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Findings from a research study conducted by Mozilla [14] to understand how to design better warning labels highlighted that employing opinionated design was more important than providing objective information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This means it is more im- portant to convey the idea of a threat rather than what the threat is - prior research suggested overly technical warnings lead to confusion among users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Mozilla implemented this by simplifying the warning heading to feature abstract but understandable language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Additionally, for scenarios where users want to know details of the underlying issue, the warning provides an accessible description of the risks associated with the security fault.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The issue of labelling misleading content is a challenging one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' What counts as misinformation must be determined, and designing warning systems that promote critical thinking rather than knee-jerk reactions is still an ongoing area of re- search.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Although the means of warning users adopted by major social platforms may have limited efficacy [10], Shepherd and Renaud [11] indicate that warning labels can cater to users’ assumed knowledge and understanding without provoking undue alarm or concern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Similarly, Kaiser et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [13] suggest that such research can be used to combat misinformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Detecting Clickbait with Machine Learning The vast array of content posted online every second makes it impossible for human moderators to assess and review all dubious uploads.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The use of an automated system is merited, one capable of rapidly and reliably analysing content for potentially misleading information which can integrate inter- vention measures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Machine learning’s inherent capabilities for finding and predicting patterns in information are well-suited to tackling misinformation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Furthermore, machine learning has seen renewed interest over the past decade as computing power and data storage have matured to enable real-world applications across a host of use cases.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chen, Conroy and Rubin [15] explored if clickbait, and by extension, misinformation, could be detected using machine learning methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Conducting a holistic view of research in the field, the authors note four unique means of detecting clickbait.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Initially focusing on the textual content of clickbait articles, the authors found clickbait often displays lexical and semantic features unique to its form.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors cited work by Lex, Juffinger and Granitzer [16] which analysed clickbait based upon factors such as word length, word choice, and terminology, and found that a machine learning model could be trained to detect clickbait with 77% accuracy regardless of the topic discussed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Appealing to users’ innate curiosity by using unresolved pronouns or alluding to content within the article was also consistent with clickbait.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' As a subsequent paper by Rubin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [17] noted, automated fact-checking and verification systems could help detect language patterns in text and warn users that the content they are about to read may be misleading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors also note that such a tool could prove helpful for journalists too, alerting them when they may be conflating claims or accidentally misleading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Clickbait is not strictly limited to the text of the article in question;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' the authors also found that surrounding factors such as imagery and how the user interacts with the article play a key role.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Regarding the former, the authors [17] cite Ecker et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [18] who found that clickbait articles were likely to feature images which were incongruent with the headline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' In such articles, an image can be used to grab the would-be readers’ attention with an impactful but unrelated image or shape opinion before the article was read.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The authors [17] also noted that previous research had found clickbait outlets typically aimed to attract user attention before funnelling them towards sponsored content or advertising.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Additionally, the time difference between “time spent reading the article” and “time spent sharing and commenting about the article” could also be a signifier of clickbait.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' In this aspect, clickbait articles tend to use alarmist or sensationalist headlines to provoke knee-jerk responses (whether that be commenting or sharing) before the user has actually read the content within.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Problem Space The rapid rise of the information age has led some to adopt unethical practices to drive engagement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Whether these practices are deployed purposefully or not, they pose a serious risk to society.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Although existing work has explored the use of warning labels, depending on how these are designed, these may be ineffective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Given the amount of content published every second, it would be impossible to label the accuracy of content manually.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Instead, machine learning offers a com- pelling alternative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Misinformation poses a severe threat;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' there- fore combining advances in machine learning and warning design means an effective solution can be proposed to keep users safe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' METHODOLOGY The proposed method consists of two-components: the machine learning model, for analysing and classifying content, and the web extension for communicating potential risk to the user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A simplified pipeline can been seen in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Using TensorFlow [19] and adopting the same dataset as used by Chakraborty et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [20], a Sequential Model was trained on 32,000 news article headlines, labelled as either ‘clickbait’ or ‘non-clickbait’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model, consisting of four layers (excluding the input layer), tokenises input text into a 64-dimensional dense vector before running it through a global average pooling filter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Output is then fed through a layer of ReLU nodes, followed by a final layer of Sigmoid nodes to arrive at a real number between zero (indicating neutral) and one (indicating strongly misleading).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model was then connected to a browser extension via a Native Manifest, which allowed the browser to send portions of an article (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=', the headline) to the model to analyse and generate a rating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The rating is then returned to the browser, after which a relevant warning can be presented to the user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Warnings were designed to be informative and actionable for the user, presenting clear detailing about the perceived risk and recommended next steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Developing the machine learning model 1) Dataset: The same dataset used by Chakraborty et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [20] was adopted for this project and consisted of 32,000 news article headlines labelled as either ‘clickbait’ or ‘non- clickbait’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The dataset offered a robust and relevant base upon which to build.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' In particular, clickbait and misinformation rely on emotional language to provoke a response, suggesting the dataset would help develop a model well suited to detecting such language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 2) Model: In practice, the backend of this project cen- tres around binary classification: Is this piece of text click- bait/misinformation or not?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' As such, using a Sequential model was deemed the most suitable due to its singular input-output structure, a structure well suited to classification tasks such as this.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Example simplified data pipeline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 3) Preprocessing Data : The dataset was split into 26,666 training samples and 5,334 testing samples which equates to 83% of the dataset for training and the remaining 17% for test- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Before training, the dataset had to be formatted such that the model could determine distinctions between clickbait and non-clickbait.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This was achieved by converting, the headlines in the dataset into a vocabulary of word embeddings (Figure 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' To ensure uniformity across the dataset, all sequences were padded to 24 tokens long which was considered a safe maximum length for a headline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Headlines longer than 24 words long were automatically truncated to the maximum length.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Example word embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 4) Building the Model: The model is visualised in Figure 3, and consists of the input layer, two hidden layers, and the output layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The first layer takes the input (a tokenised sentence) and transforms it into a 64-dimensional dense vector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The usage of dense vectors allows for the semantic meaning Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Visualisation of the Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' of the sentence to be compressed, ensuring better general- isation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Despite their ability to derive underlying meanings and connections for a given sentence, the aforementioned dense vectors can result in overfitting if they become too detailed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' To address the issue, the second layer consists of a Global Average Pool.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This layer takes the 64-dimensional vector and determines the mean of each input channel (the 24- dimensional token sequences) which allows the model to learn approximations of embeddings rather than their exact values (Figure 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Visualisation of 1-Dimensional global average pooling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' At this stage, the input data is now formatted and approx- imated to limit overfitting, and layers can be constructed, which will inform the output of the model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The first activation function of the model uses a rectified linear activation function (or ‘ReLU’).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' ReLU ensures that the next layer of the network receives a positive value as ReLU outputs 0 for input values equal to or less than 0 or the original value for those greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Finally, the data is passed through a Sigmoid activation layer, ensuring the resultant output falls between 0 and 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=', “Is this piece of text clickbait or not?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model measures its performance based on the ac- curacy of its predictions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The task involves classification;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=" 9 makeup tips you won't believe!" metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Model Clickbait: 1If Disney Princesses Were From Florida [10122 752 6586 4 1 737 0 0 0 ( 0 ( 0 ( 000000000000( 01input: [(None, 24)] InputLayer output: [(None, 24)] input: (None,24) Embedding output: (None, 24, 64) input: (None, 24, 64) GlobalAveragePooling1D output: (None, 64) input: (None, 64) Dense output: (None, 2) input: (None, 2) Dense output: (None, 1)4 6 4 2 4Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Accuracy graph during model training (Higher is better).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' thus, a binary cross-entropy loss function is used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The func- tion calculates how far the models’ predictions stray from the dataset’s labels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A gradient descent with a momentum optimiser (also known as Stochastic Gradient Descent or SGD) further minimises the loss function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The optimiser helps improve the model’s training rate by minimising loss across training iterations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' By doing so, it is intended that the model predictions will gradually trend towards the expected output.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Loss graph during model training (Lower is better).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model was trained for 80 epochs with a batch size of 128.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Although batch sizes larger than 32 can lead to underfitting, it was intended that the larger epoch size would gradually result in greater accuracy and convergence, which can be seen in Figures 5 and 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' After the model was compiled, trained, and evaluated, it was exported for use by the web extension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Web extension and warning messages 1) Creating the web extension: A web browser extension was developed to ensure the model could be deployed in a real- world context.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The extension means the model can analyse news articles as the user views them, providing a warning if misleading content is found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Native Manifests [21] were used to allow a web browser to interface with a native application, passing data back and forth between the two.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' These manifests allowed the TensorFlow model to perform predictions locally on the machine and then send the resultant prediction to the browser for further analysis and output.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Within the browser, the analysis begins when the headline of the page the user has visited is fetched.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Initially, white space and control characters are trimmed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The headline is processed, and a value is returned indicating how sensationalist the headline is.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' On the user’s device, the program transfers over to the native application, which handles parsing the headline into a format suitable for the model before computing a rating which is returned to the browser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Data from the browser is JSON- encapsulated and is sent via standard input (stdin), which the program reads from.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Following this, the script begins importing libraries for loading the model and formatting the incoming data accordingly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model is loaded, and the tokeniser is instantiated to convert the incoming headline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' At this stage, the initial setup is complete and the model is ready for use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The core of the script features a loop which waits for a message from the browser to be received, at which point the decoding process can take place.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Now that the headline of the article is available, the script tokenises it and provides padding to ensure compatibility with the model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' From here, a standard model prediction call can be made, encoded, and returned to the browser for display to the user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 2) Presenting warnings to the user: When the native ap- plication produces a result, it is returned to the browser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The browser extension then generates a message sent to the news article’s page, with the native applications result stored in a variable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This message is received by the content script, which is injected into each page by the extension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The content script dynamically generates a warning label for the user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This is done by waiting to receive a message (the result) from the background script.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This value is then multiplied by ten (to accommodate any floating-point issues that may arise (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' converting 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='8 to 8)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' To prevent repeatedly warning the user about innocuous content, only headlines that score above five out of ten have a warning generated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Scrolling is disabled whilst the warning is on-screen, ensuring the user has to acknowledge it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' With regards to this project, the existing literature points towards interstitial warnings being the most likely to promote change in user behaviour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Additionally, even if most users do not appear to actually read the content of a warning label, they do show a preference for such information being present.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Informed by the papers discussed in Section I-D, the web extension was designed to ensure strong visual clarity to effectively convey risks associated with a piece of misleading content.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The warning adopts a paywall-style design, mimicking an approach that users will likely already be familiar with from other news sites.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This helps to ensure that the warning is not overlooked, which can happen with contextual warnings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' To further ensure that the warning is brought to the user’s attention, an overlay is used to darken the article and scrolling model accuracy tain 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='85 val 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='80 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='75 accuracy 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='70 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='65 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='60 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='55 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='50 10 70 0 20 30 40 50 60 80 epochmodel loss 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='70 tain val 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='65 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='60 los5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='55 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='50 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='45 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='40 10 20 30 40 50 0 70 60 80 epochis prevented while the warning is on screen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The warning design comes in 5 variants - ranging from most minor to most severe, depending on the article’s rating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Exemplar designs can be seen in Figure 7 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Sample of warning designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A vital problem with previous warning designs is the poor communication of risk, whereby warnings may be obscured by jargon [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The design of the warnings seeks to minimise existing issues by conveying as much relevant information as possible in an easy-to-read format.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Prominent symbols represent increasing risk levels based on the article’s rating.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Articles lower on the risk scale are given a more general ’magnifying glass’ symbol, promoting the notion of thinking more critically about the article’s merit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' If an article includes more severe levels of misinformation, increasingly prominent ’alert’-oriented symbols are deployed, such as warning signs, stop signs and symbols of authority such as police figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Additionally, an oscillating gradient is placed behind the warning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Depending on the severity of the warning, the colour used will shift from yellow to orange to red.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The subtle movement of the gradient is intended to draw the user’s eye to the warning, with the unique colour of each warning also helping the user understand the associated level of risk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Ultimately, the extension seeks to change user behaviour and provide education on meaningful steps users can take to protect themselves from misinformation in the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' As such, each warning label features unique phrasing that informs the user of not just what the perceived risk is but also advice on actionable next steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Two buttons are presented to the user at the bottom of the warning, allowing them to dismiss the warning and continue, or navigate away from the page.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' To indicate the intended behaviour, the option to navigate away is displayed in promi- nent green with a ’Recommended’ label included in brackets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Conversely, the option to dismiss the warning is presented in red and is slightly faded out to deliberately be obscured against the background until the user hovers over the button.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' RESULTS AND DISCUSSION Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Accuracy comparison between training and evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' During training, the model achieved an accuracy of approx- imately 85% and a loss of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='39, and when pitted against the evaluation dataset, the model achieved an accuracy of approximately 45% with a loss of 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='15 (Figure 8, Figure 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This decline in accuracy likely stems from inconsistencies in the existing evaluation dataset, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=', improperly formatted data, such as some of the labels assigned to the headlines do not appear to be correct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This could be resolved via an additional data cleaning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Another point of note is that the evaluation dataset used only binary labels (Is this headline ‘clickbait’ or ‘news’?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' ), which may have also contributed to the discrepancy in accuracy as the model was producing a result between 0 and 1 instead of a pure binary output.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' ThisContent PutsYouatRisk Misleadingarticlescanwarpyourperceptionofevents Think twice before continuing Deep Breathhas detectedthatthis article is misleading and should not be viewed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Backto safety (Recommended) Misleading Content Alert Sensationalistcontentcantrickyouinto consumingfalse information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='Consultmultiplesources Websites can use sensationalist languageto mislead and deceive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='Deep Breaths detection algorithmbelieves that this article is misleading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Dismiss and continue Back to safety (Recommended) SensationalistContentWarning Thispagemaycontainsensationalistormisleading content.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='Considerconsulting additionalsources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Websites can use sensationalist languagetograb your attention.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='DeepBreathsdetectionalgorithmbelievesthat this article may be misleading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Dismiss and continue Backto safety (Recommended)100 90 85% 80 70 Accuracy 60 50 45% 40 30 20 10 0 Training Evaluation (Higher is better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=')Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Loss comparison between training and evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' With regards to machine learning, the project confirms the findings of Lex, Juffinger and Granitzer (2010) that clickbait and misinformation can be detected based upon lexical seman- tics, namely word choice, word length, and word commonality, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=', Word x appears frequently alongside word y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' CONCLUSION AND FUTURE WORK The model demonstrated in this paper has shown a re- liable degree of performance, however, it could be refined further to derive even better results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The models’ accuracy and loss were still increasing and decreasing, respectively, suggesting better performance could be obtained before the curves flattened out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Furthermore, the capability of the model could be extended further.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model has been trained only on clickbait-styled headlines, which was effective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' However, more robust results may be achieved by training on the contents of clickbait articles which would allow the model to develop a deeper understanding of the article and make a more nuanced prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The model used in this paper is a Sequential model designed to take a single output and produce a single result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Although this is effective at classifying a single headline as used in this paper, greater functionality could be achieved by allowing multiple inputs and outputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' This could include assessing the article’s headline but also a selection of sentences from the article.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The rating assigned to content is dynamic;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' however, the underlying warning remains static.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' By expanding the models’ capabilities, it may also be possible to provide personalised warnings relevant to the content.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' In practice, this could mean warning the user about specific aspects of the article, such as sensationalist authors, misleading sentences, and miscaptioned images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Although every effort was taken to ensure the model made balanced and accurate predictions, no system is infallible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Conducting user testing and introducing the option for users to report when the model makes a perceived miscalculation could help adjust for missteps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' The work presented in this paper makes promising ad- vances toward tackling the issue of misinformation online by combining machine learning, human-computer interaction research, and web technologies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Findings validate and build upon prior research, and incorporating machine learning with usable security is still a relatively under-explored area of study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' REFERENCES [1] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Lallie, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Shepherd, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Nurse, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Erola, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Epiphaniou, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Maple, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Bellekens, “Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Computers & Security, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 105, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 102248, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Mitchell, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Shearer, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Stocking, “News on twitter: Consumed by most users and trusted by many,” 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Available: https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='pewresearch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='org/journalism/2021/11/ 15/news-on-twitter-consumed-by-most-users-and-trusted-by-many/ [3] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chyi, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Lewis, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Zheng, “Parasite or partner?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' coverage of google news in an era of news aggregation,” Journalism & Mass Communication Quarterly, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 93, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 789–815, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [4] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Coddington, “Gathering evidence of evidence: News aggregation as an epistemological practice,” Journalism, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 21, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 365–380, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [5] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Cˆot´e and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Darling, “Scientists on twitter: Preaching to the choir or singing from the rooftops?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Facets, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 3, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 682–694, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [6] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Fazio, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Rand, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Pennycook, “Repetition increases perceived truth equally for plausible and implausible statements,” Psy- chonomic bulletin & review, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 26, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 1705–1710, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Bronstein, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Pennycook, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Bear, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Rand, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Can- non, “Belief in fake news is associated with delusionality, dogmatism, religious fundamentalism, and reduced analytic thinking,” Journal of applied research in memory and cognition, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 8, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 108–117, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [8] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Roth and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Pickles, “Updating our ap- proach to misleading information,” 2020, https://blog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='twitter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='com/en us/topics/product/2020/updating-our- approach-to-misleading-information (Accessed 8 February 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [9] Facebook, “Taking Action Against People Who Repeatedly Share Misinformation,” 2021, https://about.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='fb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='com/news/2021/05/taking- action-against-people-who-repeatedly-share-misinformation/ (Accessed 8 February 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [10] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Ross, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Jung, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Heisel, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Stieglitz, “Fake news on social media: The (in) effectiveness of warning messages,” in CIS 2018 Proceedings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Association for Information Systems, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [11] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Shepherd and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Renaud, “How to design browser security and privacy alerts,” in 2018 AISB Convention: Symposium on Digital Behaviour Intervention for Cyber Security.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Society for the Study of Artificial Intelligence and Simulation for .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' , 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 21–28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [12] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Wu, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Miller, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Garfinkel, “Do security toolbars actually prevent phishing attacks?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' in Proceedings of the SIGCHI conference on Human Factors in computing systems, 2006, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 601–610.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [13] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Kaiser, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Wei, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Lucherini, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Lee, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Matias, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Mayer, “Adapting security warnings to counter online disinformation,” in 30th USENIX Security Symposium (USENIX Security 21), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 1163– 1180.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [14] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Walkington, “Designing Better Security Warnings,” 2019, https://blog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='mozilla.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='org/ux/2019/03/designing-better-security-warnings/ (Accessed 8 February 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [15] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chen, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Conroy, and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Rubin, “Misleading online content: recognizing clickbait as” false news”,” in Proceedings of the 2015 ACM on workshop on multimodal deception detection, 2015, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 15–19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [16] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Lex, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Juffinger, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Granitzer, “Objectivity classification in online media,” in Proceedings of the 21st ACM conference on Hypertext and hypermedia, 2010, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 293–294.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [17] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Rubin, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Conroy, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chen, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Cornwell, “Fake news or truth?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' using satirical cues to detect potentially misleading news,” in Proceedings of the second workshop on computational approaches to deception detection, 2016, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 7–17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [18] U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Ecker, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Lewandowsky, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chang, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Pillai, “The effects of subtle misinformation in news headlines.” Journal of experimental psychology: applied, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 20, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 4, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 323, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [19] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Abadi, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Agarwal, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Barham, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Brevdo, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chen, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Citro, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Corrado, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Davis, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Dean, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Devin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=', “Tensorflow: Large-scale machine learning on heterogeneous distributed systems,” arXiv preprint arXiv:1603.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='04467, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='15 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='1 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='9 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='8 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='Oss 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='6 L 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='39 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='1 0 Training Evaluation (Lower is better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' )[20] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Chakraborty, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Paranjape, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Kakarla, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' Ganguly, “Stop clickbait: Detecting and preventing clickbaits in online news media,” in Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' IEEE, 2016, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' 9–16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content=' [21] Mozilla, “Native Manifests,” 2022, https://developer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='mozilla.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} +page_content='org/en- US/docs/Mozilla/Add-ons/WebExtensions/Native manifests (Accessed 5 March 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/6NE1T4oBgHgl3EQfmwRz/content/2301.03301v1.pdf'} diff --git a/79E1T4oBgHgl3EQfBwKM/vector_store/index.pkl b/79E1T4oBgHgl3EQfBwKM/vector_store/index.pkl new file mode 100644 index 0000000000000000000000000000000000000000..c346188160cf618f0ceed173587dd21de3e779e1 --- /dev/null +++ b/79E1T4oBgHgl3EQfBwKM/vector_store/index.pkl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ad31a4232d7e603450018ddb759702565b183fa1afa2aa92c4c4fae4625239e2 +size 163491 diff --git a/79E4T4oBgHgl3EQfCgub/content/tmp_files/2301.04861v1.pdf.txt b/79E4T4oBgHgl3EQfCgub/content/tmp_files/2301.04861v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..a54e0cd0b6f4a6c82c5511334088524c9d1f1b0f --- /dev/null +++ b/79E4T4oBgHgl3EQfCgub/content/tmp_files/2301.04861v1.pdf.txt @@ -0,0 +1,1150 @@ +arXiv:2301.04861v1 [cs.IT] 12 Jan 2023 +Grant-Free Random Access of IoT devices in +Massive MIMO with Partial CSI +Gilles Callebaut1, Franc¸ois Rottenberg1, Liesbet Van der Perre1, and Erik G. Larsson2 +1Department of Electrical Engineering (ESAT-DRAMCO), KU Leuven, 9000 Ghent, Belgium +2Department of Electrical Engineering (ISY), Link¨oping University, Link¨oping, Sweden +Abstract—The number of wireless devices is drastically in- +creasing, resulting in many devices contending for radio re- +sources. In this work, we present an algorithm to detect ac- +tive devices for unsourced random access, i.e., the devices are +uncoordinated. The devices use a unique, but non-orthogonal +preamble, known to the network, prior to sending the payload +data. They do not employ any carrier sensing technique and +blindly transmit the preamble and data. To detect the active +users, we exploit partial channel state information (CSI), which +could have been obtained through a previous channel estimate. +For static devices, e.g., Internet of Things nodes, it is shown that +CSI is less time-variant than assumed in many theoretical works. +The presented iterative algorithm uses a maximum likelihood +approach to estimate both the activity and a potential phase +offset of each known device. The convergence of the proposed +algorithm is evaluated. The performance in terms of probability +of miss detection and false alarm is assessed for different qualities +of partial CSI and different signal-to-noise ratio. +Index Terms—activity detection, grant-free, massive MIMO, +maximum likelihood, random access. +I. INTRODUCTION +Massive machine-typed communication (mMTC) is envi- +sioned to enable low-power connectivity to a very large +number of devices and open up new applications. While it +has been put forward as a key building block in 5G and +beyond, it has so far received less attention than enhanced +Mobile Broadband (eMBB) and Ultra-Reliable Low Latency +Communications (URLLC). The challenge in mMTC, and +in general Internet of Things (IoT) systems, resides in the +low-power operation, sporadic nature of the traffic and a +large amount of uncoordinated devices. As these devices are +often battery-powered, they are constrained in the signalling +overhead they can handle [2]. Furthermore, they are often +deployed in remote areas, where network coverage is low or +non-existent [2, 3]. To address this, novel protocols need to +be designed tailored to the low-power, sporadic and massive +nature of mMTC traffic. One promising direction, and the +focus of this work, is the use of massive MIMO, where a +large number of antennas is present at the base station. +Two multiple access approaches can be taken, grant-based +and grant-free random access. The former requires the devices +to obtain a grant from the network, where after it can use a +The research reported herein was partly funded by the European Union’s +Horizon 2020 research and innovation programme under grant agreement No +101013425. +This paper is presented at IEEE WCNC 2023. G. Callebaut, F. Rottenberg, +L. Van der Perre, and E. G. Larsson, “Grant-Free random access of IoT devices +in massive MIMO with partial CSI,” in 2023 IEEE Wireless Communications +and Networking Conference (WCNC) (IEEE WCNC 2023), Glasgow, United +Kingdom (Great Britain), Mar. 2023 +collision-free radio resource to transmit its data. The disadvan- +tage of this approach for IoT and mMTC is that devices need +to compete for grants, requiring, e.g., dedicated preambles or a +lot of signalling for collision resolution. Due to the number of +competing devices such schemes are not practical and scalable. +Therefore, grant-free approaches are advocated over grant- +based solutions [4–6]. In grant-free random access, devices +do not contend for a grant, but just access the network when +required. Often these devices are unaware of the other devices +in the system and operate in an uncoordinated fashion, which +is called unsourced grant-free random access [6]. Different +approaches have been studied to detect the active devices in +massive MIMO systems. Detecting active devices is facilitated +when each device uses a unique and orthogonal preamble +sequence. This entails that each preamble should have the +same length as the number of devices to have no collisions, +which is unpractical. Therefore a number of studies have +considered a pool of orthogonal pilots [7] or the use of non- +orthogonal pilots. Both of these strategies have been elaborated +in [4], where they formulate the device-activity detection +problem as a compressed sensing problem, where the sparsity +of the active devices at each time slot is exploited. However, +compressed sensing requires the preamble length to be larger +than the active devices, increasing the energy expenditure of +data transfer. To combat this, in [6, 8] a covariance-based +method is suggested using two estimators for device activity +recovery, i.e., maximum-likelihood (ML) and non-negative +least squares (NNLS). This work is generalized by Ganesan, +Bjornson, and Larsson [9, 10] to the cell-free case where mul- +tiple access points (APs) are geographically distributed. They +considered different large-scale fading coefficients per APs. +They employed a simplification of their proposed algorithm +by including only the AP with the strongest contribution. They +concluded that co-located massive MIMO is highly sensitive to +low signal-to-noise ratios (SNRs), while cell-free deployment +is better suited against shadowing fading effects. +Contributions. Inspired by these works, we propose a +new algorithm exploiting the static nature of IoT devices. As +demonstrated in [11] and elaborated in Secion II, the channel +state information (CSI) can remain almost invariant over large +period of times (hours) for scenarios with low mobility. This +was not yet leveraged by practical algorithms in the literature +to the best of our knowledge. Given that the base station +knows a part of the CSI of each device the performance of +the device activity scheme can be improved. To do so, we +formulate the maximum-likelihood activity detection problem +using partial CSI. Furthermore, a phase offset can be estimated +which occurs due to carrier frequency offset (CFO) (when + +the CFO is static over the preamble duration). We validate +the convergence of the iterative algorithm, study the impact +of different initialization vectors for the device activity, the +impact of the quality of the partial CSI and the SNR on the +performance of the algorithm. +The +used +mathematical +notations +are +described +in +https://github.com/wavecore-research/math-notations. +II. MOTIVATION – RECURRENCE IN CSI +IoT technologies are often put in the field with a deploy- +and-forget strategy, where the devices remain immobile after- +wards. As such, we can expect that the channel conditions +are less time-variant than typically assumed in literature [12, +13]. An experimental campaign to investigate the long-term +behavior of the channel is presented in [11]. The long- +term behavior is measured by taking the channel correlation +δi,j = |¯hH +i ·¯hj|/∥¯hi∥∥¯hj∥ of the first channel estimate and the +other channel N measurements, i.e., δ1,j for j ∈ {1, . . ., N}. +The observed channel correlations are depicted in Fig. 1. +It illustrates that most of the time the correlation coefficient +is close to 1, indicating that the channel is highly correlated +with the first estimate and thus can be considered static. It also +shows that, while in some occasions the correlation drops, +the channel quickly becomes again highly correlated with +the first channel instance. More than 90% of the measured +channels1 have a correlation coefficient higher than 0.9. This +demonstrates the potential of re-using channel estimates in IoT +contexts.2 +0 +0.2 +0.4 +0.6 +0.8 +1 +0.6 +0.8 +1 +Sample index +Channel Correlation δ1,j +Node 1 +Node 2 +Figure 1: Channel correlation over a full day (9h24-17h48) with over 10 000 +channel instances, with an average correlation of 0.935/0.968 and a standard +deviation of 0.06/0.03 for Node 1/Node 2. +III. SYSTEM MODEL +There is a total of K single-antenna devices and a total of M +co-located base station (BS) antennas. The set of active users +trying to access the network is denoted by Ka, with |Ka| ≤ K. +To access the network, each active device k ∈ Ka sends a +unique, non-orthogonal preamble of length T , known to the +network. The pilot symbol of the preamble sent by device k at +pilot symbol t is denoted by sk,t. The channel vector between +the receive antenna m and user k is denoted by hk,m ∈ C, and +1More specifically, 91% and 95% for Node 1 and Node 2, respectively. +2We use here the term “re-using” to indicate that we no longer operate in +a block fading model with independent channel realizations. Typically, these +blocks are considered in the order of 50 ms. +is considered fixed over the preamble duration. The received +symbol at the m-th BS antenna at time t is +yt,m = +K−1 +� +k=0 +hk,msk,tγk + wt,m, +(1) +where γk is an unknown complex scalar and wt,m ∈ C is +independently and identically distributed (i.i.d.) zero mean +circularly symmetric complex Gaussian (ZMCSCG) noise with +variance σ2. The unknown complex scalar γk can be developed +as +γk = √ρkakejφk, +(2) +where ρk ∈ R+ is the transmit power of device k, ak ∈ {0, 1} +is the device activity and φk models a potential phase offset. +This offset φk can account for a CFO, where the phase is +considered constant over the preamble duration. This occurs +when no frequency drift has occurred during the preamble +duration, which is a feasible assumption as the CFO is +typically low, yielding negligible phase rotations during the +preamble interval. By assuming that all M antennas are +perfectly synchronized, this offset is only dependent on the +device. In case the device is inactive, γk will be zero. We will +introduce the term activity indicator to denote γk. +Let us consider that the BS knows a part of the CSI, i.e., +gk,m in +hk,m = gk,m + λkǫk,m, +(3) +where ǫk,m are i.i.d. ZMCSCG variables with unit variance, +and λk ∈ R+ models the unknown part of the CSI. The large- +scale fading coefficient of user k is βk = E(∥hk∥2 /M) = +∥gk∥2 /M +λ2 +k. The factor λk models the quality of the known +CSI. Hence, it quantifies the correlation of the actual channel +hk,m to the known partial CSI gk,m. In the extreme case with +λk = 0, the CSI is perfectly known and there is no uncertainty +left, as was studied in [11]. This could be the case in a +fully static environment and if the CSI estimates are noiseless. +However, for a realistic IoT scenario, even for static devices, +CSI is not perfect due to i) environment dynamics and ii) noisy +estimates. The parameter λk then quantifies this imperfection. +It is here assumed to be known3. Another extreme case, +as considered in [8, 10], is obtained when gk,m = 0, ∀m, +implying that only the large scale fading coefficient of user k +is known, i.e., λk = √βk. +IV. DEVICE ACTIVITY DETECTION +This section describes the proposed activity detection al- +gorithm. First, the log-likelihood of the received preamble is +derived. Then, given its non-convex expression, an iterative +approach is proposed to estimate the parameters γk ∀k. Finally, +activity detection is performed. +A. Log-Likelihood of the Received Symbols +Combining (1) and (3), the symbol, received at BS antenna +m and for pilot symbol t, is given by +yt,m = +K−1 +� +k=0 +(gk,m + ǫk,mλk)st,kγk + wt,m. +3It could be set to a certain value depending on the user activity profile +and/or tracked for each user over time. + +Stacking the observations at antenna m gives +ym = +K−1 +� +k=0 +gk,mskγk + +K−1 +� +k=0 +ǫk,mλkskγk + wm, +where +ym = + + + +y0,m +... +yT −1,m + + + , sk = + + + +s0,k +... +sT −1,k + + + , wm = + + + +wm,0 +... +wT −1,m + + + . +For a given value of γk, ym|γk has a circularly symmetric +Gaussian distribution with mean �K−1 +k=0 gk,mskγk. After defin- +ing the vector θm = �K−1 +k=0 ǫk,mλkskγk+wm, the covariance +matrix is +C = E +� +θmθH +m +� += +K−1 +� +k=0 +λ2 +k|γk|2sksH +k + σ2IT , +(4) +where we used the fact that ǫk,m were assumed to be i.i.d. and +the additive noise is white. Note that this covariance matrix +does not depend on the antenna index m and is thus valid for +all ym. Defining the vector γ = (γ0, ..., γK−1)T , and Θm = +ym − �K−1 +k=0 gk,mskγk the log-likelihood of the observation +vector ym is +log p(ym|γ) = − ln (|C|) − T ln(π) − ΘH +mC−1Θm. +Given the conditional independence of ǫk,m and wt,m over the +antennas, the different ym are independent as well. Hence, the +log-likelihood of the aggregated observations at all antennas +y = (yT +0 , ..., yT +M−1)T becomes +log p(y|γ) = −M ln (|C|) − MT ln(π) − +M−1 +� +m=0 +ΘH +mC−1Θm. +(5) +B. Iterative Algorithm for Maximizing Likelihood +The maximum likelihood estimator of γ is obtained by +maximizing +ˆγML = arg max +γ +log p(y|γ). +This problem is not trivial to solve given the nonlinear and +non-convex dependence of the log-likelihood, more specifi- +cally the covariance matrix C, in γ. An idea to maximize +the likelihood is to use an iterative approach, similarly as [8, +10]: at each iteration, all γk are kept fixed but one, which is +optimized and updated. This way, they get updated one by +one until convergence is attained, i.e., a maximum number of +iterations or a certain tolerance is reached. A block diagram +of the algorithm is given in Figure 2 and the pseudocode is +summarized in Algorithm 1. +Let us consider that the complex-valued γk′ needs to be +updated. Using the definition introduced in (2), we can rewrite +γk′ with a phase-amplitude decomposition: γk′ = rk′eφk′, +with rk′ = |γk′| = √ρk′ak′. The optimization with respect +to γk′ is done in the following in several steps: i) optimizing +the phase φk′ for a fixed value of rk′, ii) re-inserting this +expression in the objective function to remove the dependence +in φk′ and iii) optimizing the amplitude rk′. +1) Phase optimization: To highlight the dependence of the +objective function in γk′ for constant values of other γk, k ̸= +k′, let us define the vector +yk′,m = ym − +K−1 +� +k=0,k̸=k′ +gk,mskγk, +(8) +which can be seen as a cancellation of device interference to +isolate the contribution from device k′. Hence, the objective +function to maximize can be written as in (7)4. +where we explicitly express the dependence in (rk′, φk′) +while the other (rk, φk), k ̸= k′ do not appear since they are +considered constant. Note that the matrix C, defined in (4), +does not depend on φk′ but only rk′. In the extreme case of no +prior CSI, i.e., gk′,m = 0 ∀m, the dependence of f(rk′, φk′) +in φk′ disappears and there is an underdetermination and no +estimate of the phase offset can be obtained. In other cases, +we can find that, after some manipulations, +ˆφk′ = ∠sH +k′C−1 +M−1 +� +m=0 +g∗ +k′,myk′,m. +(9) +This result has an intuitive understanding: the optimal phase +φ′ +k tends to align the partial CSI with the observations due to +device k′. +2) Removing the phase dependence: Inserting this optimal +value in the objective function f(rk′, φk′) makes the depen- +dence in φk′ vanish and gives (6). +3) Amplitude optimization: To alleviate the dependence on +rk′ in (6), let us define +C−k′ = C − λ2 +k′|γk′|2sk′sH +k′ +(10) += +� +k\k′ +λ2 +k|γk|2sksH +k + σ2IT , +which does not depend on rk′ and is full rank, thus invertible. +Applying the Sherman-Morrison formulas [14] to C−1 and +C−1sk′ gives +C−1 = C−1 +−k′ − C−1 +−k′sk′sH +k′C−1 +−k′r2 +k′λ2 +k′ +1 + sH +k′C−1 +−k′sk′r2 +k′λ2 +k′ +(11) +We insert these expressions in (6) and we omit terms that +do not depend on rk′, which will vanish after taking the +derivative. This gives +˜f(rk′) = −M ln (|C|) + αr2 +k′ + βrk′ +1 + δr2 +k′ +, +(12) +where we defined the constants (independent of rk′) α, β and +δ, as +α = +M−1 +� +m=0 +|yH +k′,mC−1 +−k′sk′|2λ2 +k′ − sH +k′C−1 +−k′sk′ +M−1 +� +m=0 +|gk′,m|2 +β = 2 +����� +M−1 +� +m=0 +yH +k′,mC−1 +−k′sk′gk′,m +����� +δ = sH +k′C−1 +−k′sk′λ2 +k′. +(13) +4For clarity, we omit in the following the constant term MT ln(π) which +does not affect optimization as it does not depend on γ and vanishes after +differentiation. + +f(rk′) = −M ln (|C|) − +M−1 +� +m=0 +yH +k′,mC−1yk′,m − r2 +k′sH +k′C−1sk′ +M−1 +� +m=0 +|gk′,m|2 + 2 +����� +M−1 +� +m=0 +yH +k′,mC−1sk′gk′,m +����� rk′ +(6) +f(rk′, φk′) = −M ln (|C|) − +M−1 +� +m=0 +� +yk′,m − gk′,msk′rk′eφk′�H C−1 � +yk′,m − gk′,msk′rk′eφk′� +(7) +Inputs +σ2, λk, gm,k, +ym ∀m, k +Initialization +k′ ← 0, ˆγ ← ˆγinit +Amplitude Optimization +(14), (16) or (17) +ˆrk′ ← arg max ˜f(rk′) +Phase Optimization (9) +ˆφk′ ← ∠sH +k′C−1 �M−1 +m=0 g∗ +k′,myk′,m +Converged? +Iterative maximum likelihood estimator +Tolerance +Max iteration +Activity Detection +ˆγk ≤ γth,k ∀k +No +Yes +k′ ← k′ + 1 mod K +Updated ˆγk′ ← ˆrk′eφk′ +ˆγ +Figure 2: Block diagram of the iterative maximum likelihood estimator and activity detection. +One can note that ˜f(rk′) in (12) can now be differentiated +with respect to rk′, using the differential rule ∂(log |A|) = +tr[A−1∂A]. Setting the derivative to zero gives, noting that +the denominator is always strictly positive, +0 = −r3 +k′2Mδ2 − r2 +k′βδ + rk′(−2Mδ + 2α) + β, +(14) +which is a polynomial of degree 3 in rk′. There are closed- +form solutions for the roots of such polynomials. Following +Descarte’s rule of signs, (14) has only one real and positive +root, as required, in case the terms are non-zero. Below we +discuss the special cases when the terms are not non-zero, i.e., +when there is no or complete CSI knowledge. +The algorithm is summarized in the pseudocode Algo- +rithm 1. At each iteration, the constants α, β and δ can +be easily re-evaluated based on (13). They require the matrix +inversion C−1 +−k′. To avoid re-computing a full inverse at each +iteration, one can rely on the Sherman-Morrison formula and +on the current knowledge of C−1, which is updated at the end +of each iteration by inserting the obtained value of rk′ in (11). +Using (10), we find +C−1 +−k′ = C−1 + λ2 +k′|γk′|2C−1sk′sH +k′C−1 +1 − λ2 +k′|γk′|2sH +k′C−1sk′ . +(15) +Moreover, computations can be optimized as several quantities +appear multiple times and can be computed only once. The +complexity of the proposed algorithm is O(IMT 2), where I +is the number of iterations.5 +We now investigate two particular cases, to gain further +insights. +Algorithm 1 Iterative maximum likelihood device activity +detector +Require: σ2, λk, ym, gk,m, ˆγinit ∀k, m +k′ ← 0 +ˆγ ← ˆγinit +C−1 ← +��K−1 +k=0 λ2 +k|ˆγk|2sksH +k + σ2IT +�−1 +while Not converged do +Compute yk′,m, C−1 +−k′, α, β and δ based on (8), (15) and +(13) +ˆrk′ ← arg max ˜f(rk′) +⊲ Update amplitude based on (14), +(16) or (17) +ˆφk′ ← ∠sH +k′C−1 �M−1 +m=0 g∗ +k′,myk′,m +⊲ Update phase +ˆγk′ ← ˆrk′e ˆφk′ +C−1 ← C−1 +−k′ − +C−1 +−k′ sk′ sH +k′ C−1 +−k′ r2 +k′ λ2 +k′ +1+sH +k′ C−1 +−k′ sk′ r2 +k′ λ2 +k′ +k′ ← k′ + 1 mod K +end while +a) Particular case: device with no CSI: Now consider +that, for a given k′, gk′,m = 0 ∀m. This could be because +this device is new or moving a lot, such that its CSI is +outdated. Only, its parameter λk′ is known, which is equal +5Note that I will in practice depend on K as we will iterate N times over +all users K, but this is not a requirement. + +to the large-scale fading coefficient √βk′. At iteration of user +k′, evaluating (13) for gk′,m = 0 ∀m implies that β = 0. +Hence, (14) simplifies to +0 = 2rk′(−r2 +k′Mδ2 − Mδ + α), +which has a trivial solution in rk′ = 0. One of the other roots +is always negative. Keeping only the positive one, we find the +amplitude update +ˆrk′ = +� +α − Mδ +Mδ2 +. +(16) +If this root is imaginary, we set ˆrk′ to zero. As discussed +before introducing the phase update equation (9), in the case +of no prior CSI, the phase ambiguity cannot be resolved. +This particular case gives an update relatively similar to the +maximum likelihood estimator derived in [8, (23)], where +their ML expression estimates the error, while ours estimates +directly the coefficient ˆrk′, given the same estimate of γk′ at +each iteration. +b) Particular case: device with complete prior CSI: Now, +consider that, for a given k′, λk′ = 0, so that the CSI is +perfectly known. Only the phase shift and the transmit power +are unknown. At iteration of user k′, evaluating (13) for λk′ = +0 implies that δ = 0. Hence, (14) simplifies to a linear equation +0 = rk′2α + β, which gives the following amplitude update +ˆrk′ = −β +2α = +|sH +k′C−1 �M−1 +m=0 g∗ +k′,myk′,m| +sH +k′C−1sk′ � +m′ |gk′,m′|2 +, +(17) +while the phase is updated according to (9). +4) Initialization: To start the iterative algorithm, we con- +sider different choices to initialize ˆγinit. A simple choice is +to initialize to zero, i.e., ˆγ0 +init = 0. Another choice is to +initialize solely based on the available prior CSI, considering +that λk ≈ 0, ∀k. The estimator is similar to [11], except that, +here, prior CSI is used instead of complete CSI. +If λk ≈ 0, ∀k, the covariance matrix C, defined in (4), +simplifies to C = σ−2IT , which is independent of γk. Hence, +many terms of the log-likelihood in (5) become independent +of γ. Maximizing (5) becomes equivalent to the following +minimization +max +γ +log p(y|γ) = min +γ +M−1 +� +m=0 +�����ym − +K−1 +� +k=0 +gk,mskγk +����� +2 += min +γ ∥y − Γγ∥2 , +where we defined the vector and matrix notations +y = +�y0 . . . yM−1 +�T , Γ = +�Γ0 . . . ΓM−1 +�T , +Γm = +�s0 . . . sK−1 +� +diag(g0,m . . . gK−1,m). +This minimization problem is a quadratic function of γ, which +is a least squares problem. The estimate has the following +closed-form expression +ˆγZF +init = +� +ΓHΓ +�−1 +ΓHy. +(18) +This last estimator can be seen as a zero-forcing (ZF) es- +timator, which requires a matrix inversion. To avoid ill- +conditioning, a first necessary condition is that K ≤ MT . +This condition is not sufficient as the channel and preamble +of two devices could be correlated, especially when K is on +the order of MT . Moreover, if no prior information is available +for a given user k′, i.e., gk′,m = 0, ∀m, the inverse will also +be ill-conditioned. This implies that the k′-th column of Γ +becomes null and thus Γ is rank deficient. Moreover, the prior +CSI might be noisy, leading to unstable results. +To make initialization more robust, we can use an least +minimum mean square error (LMMSE) criterion. To do this, +some prior knowledge must be assumed on the statistics of +γ, more specifically, its first and second order moments. +We here make the following assumptions: i) the activity of +each device is independent of one another, ii) the average +activity and average transmit power of each device is known +and iii) no prior information is known on the phase offset +so that φk is considered uniformly distributed between 0 +and 2π. Under these assumptions, we have E(γ) = 0 and +D = E(γγH) = diag (E(a0)E(ρ0), ..., E(aK−1)E(ρK−1)). +Hence, for the linear observation model y = Γγ + w, still +considering that λk ≈ 0, ∀k, the LMMSE estimator of γ is +then given by [15] +ˆγLMMSE +init += +� +ΓHΓ + σ2D−1�−1 +ΓHy. +(19) +Note that the matrix to be inverted is always well-conditioned. +Finally, a matched filter (MF) estimator could be used to avoid +the need for matrix inversion. +ˆγMF +init = +� +diag(ΓHΓ) + σ2D−1�−1 +ΓHy. +(20) +C. Activity Detection +A non-negative activity threshold γth,k is applied for each +device k. A device is considered active if |ˆγk| ≥ γth,k. The +real-valued threshold is defined as, +γth,k = v +� +SNRk +−1, +(21) +where v is chosen to have a desired probability of false alarm +and miss detection performance and with SNRk = Mβk/σ2 = +E(∥hk∥2)/σ2 = (∥gk∥2 + Mλ2 +k)/σ2. +Miss detection happens when a device was undetected, +while it was actually transmitting. Equivalently, a false alarm +occurs if a device is considered active by the algorithm but +was not. We define the probability of miss detection as the +average ratio of undetected devices to the number of active +devices Pmd = 1 − +����Ka ∩ ˆKa +��� / |Ka| +� +, where Ka is the set +of active devices and ˆKa = {k|ˆak = 1, ∀ ∈ [1, K]} denotes +the estimated set of active devices. Note that on average +|Ka| = Ka. Similarly, the probability of false alarm is the ratio +of inactive devices considered active to the number of inactive +devices and is given by Pfa = +���� ˆKa \ Ka +��� /(K − |Ka|) +� +. +A trade-off can be made between the two probabilities +by varying v in (21). A lower v yields a lower activity +threshold, resulting in more devices considered active. This in +turn lowers the probability of miss detection, while increasing +the probability of generating a false alarm. In the simulations, +the parameter v is swept across the range [−40, 40]dB. + +Table I: Simulation parameter set with default values. +Parameter +Symbol +Default value +Number of devices +K +500 +Number of total BS antennas +M +64 +Signal-to-noise ratio +SNR +20 dB +Device activity probability +ǫa +0.1 +Pilot sequence +sk +∼ CN (0, 1) +Pilot length +τp +10 symbols +Phase offset +φk +∼ U[0,2π] +Number of simulations +Nsim +>10 000 +Number of algorithm iterations +Niter +K · 4 +Initialization vector +ˆ +γinit +ˆγLMMSE +init +(19) +Unknown part of the CSI +λ +0.3 +V. NUMERICAL ASSESSMENT +The default simulation configurations are summarized in +Table I. The device activity profile is generated randomly and +independently for each device with a probability ǫa = 0.1, +meaning that on average ǫaK = 50 devices are active simul- +taneously. Or equivalently, the devices have an average duty +cycle of 10%, which is high for typical IoT applications [2]. +The channel between the BS and device k is modelled as +in (3). The pilot sequence is randomly generated from a +complex Gaussian distribution sk ∼ CN (0, 1), and is assumed +to be known by the BS. Each device uses a pilot sequence +of 10 symbols. A random phase offset φk +∼ U[0,2π] is +generated to simulate a carrier frequency offset (considered +time-invariant over the preamble duration). The source code +for all simulations can be accessed online6. +A. Convergence of different initialization vectors +The convergence of different initializations is evaluated with +respect to the genie-aided approach. In the genie-aided case, +the algorithm is initialized with the real activity indicators, i.e., +γ. The convergence is assessed via the likelihood (5) and the +mean square error (MSE). The former should monotonically +increase with each iteration, while the MSE can vary as it can +not directly be minimized. The performance of the different +initialization vectors for ˆγinit are depicted in Figure 3. The +bottom figures zoom in on a smaller region to distinguish +the performance of the initialization vectors when converging +closer to the genie-aided case. While all initialization methods +approximate the genie-aided case, the initialization vector has +a non-negligible impact on the performance of the algorithm. +An intuitive approach is to initialize with 0 because the activity +probability is low and hence, on average, 90 % of the devices +are expected to be inactive. As illustrated in Figure 3, ˆγinit = 0 +requires considerably more iterations to approach the other +initialization methods. +B. Impact of the quality of prior CSI +Figure 4 illustrates the performance of the detector algo- +rithms for different correlations between the actual channel +and the known CSI, i.e., λ. With increased λ, and thus +decreased channel knowledge, both the LMMSE estimator +and the proposed algorithm have an increased probability of +miss detection. The figure also demonstrates the gain of the +6https://github.com/wavecore-research/grant-free-random-access-partial-csi +0 +5 +10 +15 +20 +−8,000 +−6,000 +−4,000 +−2,000 +log p(y|γ) (5) +LMMSE (19) +ZF (18) +MF (20) +zeros +genie (γ) +0 +5 +10 +15 +20 +−8,000 +−6,000 +−4,000 +−2,000 +log p(y|γ) (5) +LMMSE (19) +ZF (18) +MF (20) +zeros +genie (γ) +0 +5 +10 +15 +20 +10−2 +10−1 +100 +101 +Number of iterations (Niter/K) +MSE(ˆγ) +0 +5 +10 +15 +20 +10−2 +10−1 +100 +101 +Number of iterations (Niter/K) +MSE(ˆγ) +Figure 3: The log-likelihood (5) and MSE of the estimated activity indicators +for different initialization vectors. While with all initialization vectors the +genie-aided case is approximated, different number of iterations are required. +0.3 +0.4 +0.5 +0.6 +0.7 +0.8 +0.9 +10−4 +10−3 +10−2 +10−1 +λ +Pmd +Pfa +0.1 +0.01 +0.001 +Figure 4: Performance of the proposed algorithm ( +) versus the LMMSE +estimator ( +) for different values of channel knowledge. The probability +of miss detection is shown for different values of Pfa (10 %, 1 %, 0.1 %). +proposed algorithm with respect to the LMMSE estimator. The +algorithm outperforms the LMMSE estimator for all λ and +is most effective when the prior CSI has a strong correlation +with the actual channel, and diminishes with decreased channel +knowledge. +C. Impact of the signal-to-noise ratio +Figure 5 shows the false alarm and miss detection prob- +ability of the LMMSE estimator and the iterative maximum +likelihood device activity detector for different device SNRs. +The full CSI case is included as a baseline for comparison, + +10−5 +10−4 +10−3 +10−2 +10−5 +10−4 +10−3 +10−2 +21x +Pfa +Pmd +−6.67 dB +6.67 dB +20 dB +Figure 5: The probability of false alarm and miss detection for different device +SNRs for the LMMSE estimator when having full CSI ( +) and partial CSI +( +), and the proposed iterative algorithm with partial CSI ( +). No +miss detection or false alarm occurred in the full CSI case for SNR values of +−6.67 dB and 20 dB. +where the full CSI is known instead of only a portion (λ). +Fig. 5 demonstrates the large performance gain of the proposed +algorithm with respect to the LMMSE estimator. The graph +demonstrates that the iterative algorithm lowers the probability +of miss detection by a factor of 21 for the same probability +of false alarm.7 The performance is only marginally increased +for very low SNRs (below zero). +VI. CONCLUSION +We formulated an iterative maximum-likelihood (ML) al- +gorithm to detect active devices using prior channel state +information (CSI) when performing grant-free random access. +Previous experimental work has demonstrated that, in many +massive machine-typed communication (mMTC) applications, +the CSI is less time-variant than assumed in theoretical models. +Given the static nature of Internet of Things (IoT) devices, we +have exploited this feature in the activity detection estimator. +During grant-free access, the devices transmit a unique, but +non-orthogonal preamble, which is used for activity detection. +Next to this, the algorithm is also able to detect a device- +specific phase offset, which could be caused by carrier fre- +quency offset (CFO). The algorithm is numerically evaluated +and compared to the conventional least minimum mean square +error (LMMSE) estimator with full channel knowledge and +partial CSI. The presented results indicate that the iterative al- +gorithm converges and outperforms the conventional LMMSE +estimator. For a signal-to-noise ratio (SNR) of 6.67 dB, the +probability of not detecting an active device is 21 times lower +for the proposed iterative ML estimator than the LMMSE +estimator for the same probability of wrongly considering an +inactive device as an active device. +This work can be extended to the cell-free or distributed case +with geographically distributed access points. In that case, the +partial CSI becomes access point-dependent. +7Notably, the LMMSE estimator does not employ an iterative approach. +Therefore, our proposed algorithm will be compared in future work with +other iterative approaches. +REFERENCES +[1] +G. Callebaut, F. Rottenberg, L. Van der Perre, and E. G. Larsson, +“Grant-Free random access of IoT devices in massive MIMO with +partial CSI,” in 2023 IEEE Wireless Communications and Networking +Conference (WCNC) (IEEE WCNC 2023), Glasgow, United Kingdom +(Great Britain), Mar. 2023. +[2] +G. Callebaut, G. Leenders, J. Van Mulders, G. Ottoy, L. De Strycker, +and L. Van der Perre, “The Art of Designing Remote IoT De- +vices—Technologies and Strategies for a Long Battery Life,” Sensors, +vol. 21, no. 3, 2021, ISSN: 1424-8220. DOI: 10.3390/s21030913. +[Online]. Available: https://www.mdpi.com/1424-8220/21/3/913. +[3] +S. Wielandt and B. Dafflon, “A local lora based network pro- +tocol with low power redundant base stations enabling remote +environmental +monitoring,” in 2020 54th Asilomar Conference +on Signals, Systems, and Computers, 2020, pp. 520–523. +DOI: +10.1109/IEEECONF51394.2020.9443344. +[4] +L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanovic, and E. de +Carvalho, “Sparse signal processing for grant-free massive connectiv- +ity: A future paradigm for random access protocols in the internet of +things,” IEEE Signal Process Mag., vol. 35, no. 5, pp. 88–99, Sep. +2018, ISSN: 1053-5888, 1558-0792. DOI: 10.1109/msp.2018.2844952. +[Online]. Available: https://doi.org/10.1109/msp.2018.2844952. +[5] +J. Ding, D. Qu, H. Jiang, and T. Jiang, “Success probability of +grant-free random access with massive MIMO,” IEEE Internet of +Things Journal, vol. 6, no. 1, pp. 506–516, Feb. 2019, ISSN: 2327- +4662, 2372-2541. DOI: 10.1109/jiot.2018.2869003. [Online]. Avail- +able: https://doi.org/10.1109/jiot.2018.2869003. +[6] +A. +Fengler, +S. +Haghighatshoar, +P. +Jung, +and +G. +Caire, +“Grant-free +massive +random +access +with +a +massive +MIMO +receiver,” +in +2019 +53rd +Asilomar +Conference +on +Signals, +Systems, +and Computers, +IEEE, Nov. 2019, pp. 23–30. +DOI: +10.1109/ieeeconf44664.2019.9049039. +[Online]. +Available: +https://doi.org/10.1109/ieeeconf44664.2019.9049039. +[7] +Q. +Zhang, +S. +Jin, +and +H. +Zhu, +“A +hybrid-grant +random +access +scheme +in +massive +MIMO +systems +for +IoT,” +IEEE +Open +Access, +vol. +8, +pp. +88 487–88 497, +2020, +ISSN: 2169- +3536. +DOI: +10.1109/access.2020.2993597. +[Online]. +Available: +https://doi.org/10.1109/access.2020.2993597. +[8] +A. Fengler, S. Haghighatshoar, P. Jung, and G. Caire, “Non-Bayesian +activity detection, large-scale fading coefficient estimation, and un- +sourced random access with a massive MIMO receiver,” IEEE Trans. +Inf. Theory, vol. 67, no. 5, pp. 2925–2951, May 2021, ISSN: 0018- +9448, 1557-9654. DOI: 10.1109/tit.2021.3065291. [Online]. Available: +https://doi.org/10.1109/tit.2021.3065291. +[9] +U. K. Ganesan, E. Bjornson, and E. G. Larsson, “An algo- +rithm for grant-free random access in cell-free massive MIMO,” +in 2020 IEEE 21st International Workshop on Signal Processing +Advances in Wireless Communications (SPAWC), IEEE, May 2020, +pp. 1–5. DOI: 10.1109/spawc48557.2020.9154288. [Online]. Avail- +able: https://doi.org/10.1109/spawc48557.2020.9154288. +[10] +——, “Clustering-based activity detection algorithms for grant-free +random access in cell-free massive MIMO,” IEEE Trans. Commun., +vol. 69, no. 11, pp. 7520–7530, Nov. 2021, +ISSN: 0090-6778, +1558-0857. DOI: 10.1109/tcomm.2021.3102635. [Online]. Available: +https://doi.org/10.1109/tcomm.2021.3102635. +[11] +G. +Callebaut, +L. Van der Perre, +and +F. Rottenberg, +“Grant- +Free +Random +Access +in +Massive +MIMO +for +Static +Low- +Power +IoT +Nodes,” +pp. +46–51, +2021. +[Online]. +Available: +arXiv%20preprint%20arXiv:2110.07927. +[12] +E. Bj¨ornson, J. Hoydis, and L. Sanguinetti, “Massive mimo net- +works: Spectral, energy, and hardware efficiency,” Foundations and +Trends® in Signal Processing, vol. 11, no. 3-4, pp. 154–655, 2017, +ISSN: 1932-8346. +DOI: 10.1561/2000000093. [Online]. Available: +http://dx.doi.org/10.1561/2000000093. +[13] +T. L. Marzetta, E. G. Larsson, H. Yang, and H. Q. Ngo, Fundamentals +of Massive MIMO. Cambridge University Press, 2016. +[14] +J. Sherman and W. J. Morrison, “Adjustment of an inverse matrix +corresponding to a change in one element of a given matrix,” The +Annals of Mathematical Statistics, vol. 21, no. 1, pp. 124–127, 1950. +[15] +S. +Nandi +and +D. +Kundu, +Statistical +Signal +Processing, +Fre- +quency Estimation. Springer Singapore, 2020, ISBN: 9789811562792, +9789811562808. DOI: 10.1007/978-981-15-6280-8. [Online]. Avail- +able: https://doi.org/10.1007/978-981-15-6280-8. + diff --git a/79E4T4oBgHgl3EQfCgub/content/tmp_files/load_file.txt b/79E4T4oBgHgl3EQfCgub/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..2bc6376af27425aea3165fd4abaf083819a5a163 --- /dev/null +++ b/79E4T4oBgHgl3EQfCgub/content/tmp_files/load_file.txt @@ -0,0 +1,575 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf,len=574 +page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='04861v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='IT] 12 Jan 2023 Grant-Free Random Access of IoT devices in Massive MIMO with Partial CSI Gilles Callebaut1, Franc¸ois Rottenberg1, Liesbet Van der Perre1, and Erik G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Larsson2 1Department of Electrical Engineering (ESAT-DRAMCO), KU Leuven, 9000 Ghent, Belgium 2Department of Electrical Engineering (ISY), Link¨oping University, Link¨oping, Sweden Abstract—The number of wireless devices is drastically in- creasing, resulting in many devices contending for radio re- sources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In this work, we present an algorithm to detect ac- tive devices for unsourced random access, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', the devices are uncoordinated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The devices use a unique, but non-orthogonal preamble, known to the network, prior to sending the payload data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' They do not employ any carrier sensing technique and blindly transmit the preamble and data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To detect the active users, we exploit partial channel state information (CSI), which could have been obtained through a previous channel estimate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' For static devices, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', Internet of Things nodes, it is shown that CSI is less time-variant than assumed in many theoretical works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The presented iterative algorithm uses a maximum likelihood approach to estimate both the activity and a potential phase offset of each known device.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The convergence of the proposed algorithm is evaluated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The performance in terms of probability of miss detection and false alarm is assessed for different qualities of partial CSI and different signal-to-noise ratio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Index Terms—activity detection, grant-free, massive MIMO, maximum likelihood, random access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' INTRODUCTION Massive machine-typed communication (mMTC) is envi- sioned to enable low-power connectivity to a very large number of devices and open up new applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' While it has been put forward as a key building block in 5G and beyond, it has so far received less attention than enhanced Mobile Broadband (eMBB) and Ultra-Reliable Low Latency Communications (URLLC).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The challenge in mMTC, and in general Internet of Things (IoT) systems, resides in the low-power operation, sporadic nature of the traffic and a large amount of uncoordinated devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' As these devices are often battery-powered, they are constrained in the signalling overhead they can handle [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Furthermore, they are often deployed in remote areas, where network coverage is low or non-existent [2, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To address this, novel protocols need to be designed tailored to the low-power, sporadic and massive nature of mMTC traffic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' One promising direction, and the focus of this work, is the use of massive MIMO, where a large number of antennas is present at the base station.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Two multiple access approaches can be taken, grant-based and grant-free random access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The former requires the devices to obtain a grant from the network, where after it can use a The research reported herein was partly funded by the European Union’s Horizon 2020 research and innovation programme under grant agreement No 101013425.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This paper is presented at IEEE WCNC 2023.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Callebaut, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Rottenberg, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Van der Perre, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Larsson, “Grant-Free random access of IoT devices in massive MIMO with partial CSI,” in 2023 IEEE Wireless Communications and Networking Conference (WCNC) (IEEE WCNC 2023), Glasgow, United Kingdom (Great Britain), Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2023 collision-free radio resource to transmit its data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The disadvan- tage of this approach for IoT and mMTC is that devices need to compete for grants, requiring, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', dedicated preambles or a lot of signalling for collision resolution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Due to the number of competing devices such schemes are not practical and scalable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Therefore, grant-free approaches are advocated over grant- based solutions [4–6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In grant-free random access, devices do not contend for a grant, but just access the network when required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Often these devices are unaware of the other devices in the system and operate in an uncoordinated fashion, which is called unsourced grant-free random access [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Different approaches have been studied to detect the active devices in massive MIMO systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Detecting active devices is facilitated when each device uses a unique and orthogonal preamble sequence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This entails that each preamble should have the same length as the number of devices to have no collisions, which is unpractical.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Therefore a number of studies have considered a pool of orthogonal pilots [7] or the use of non- orthogonal pilots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Both of these strategies have been elaborated in [4], where they formulate the device-activity detection problem as a compressed sensing problem, where the sparsity of the active devices at each time slot is exploited.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' However, compressed sensing requires the preamble length to be larger than the active devices, increasing the energy expenditure of data transfer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To combat this, in [6, 8] a covariance-based method is suggested using two estimators for device activity recovery, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', maximum-likelihood (ML) and non-negative least squares (NNLS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This work is generalized by Ganesan, Bjornson, and Larsson [9, 10] to the cell-free case where mul- tiple access points (APs) are geographically distributed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' They considered different large-scale fading coefficients per APs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' They employed a simplification of their proposed algorithm by including only the AP with the strongest contribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' They concluded that co-located massive MIMO is highly sensitive to low signal-to-noise ratios (SNRs), while cell-free deployment is better suited against shadowing fading effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Contributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Inspired by these works, we propose a new algorithm exploiting the static nature of IoT devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' As demonstrated in [11] and elaborated in Secion II, the channel state information (CSI) can remain almost invariant over large period of times (hours) for scenarios with low mobility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This was not yet leveraged by practical algorithms in the literature to the best of our knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Given that the base station knows a part of the CSI of each device the performance of the device activity scheme can be improved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To do so, we formulate the maximum-likelihood activity detection problem using partial CSI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Furthermore, a phase offset can be estimated which occurs due to carrier frequency offset (CFO) (when the CFO is static over the preamble duration).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' We validate the convergence of the iterative algorithm, study the impact of different initialization vectors for the device activity, the impact of the quality of the partial CSI and the SNR on the performance of the algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The used mathematical notations are described in https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='com/wavecore-research/math-notations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' MOTIVATION – RECURRENCE IN CSI IoT technologies are often put in the field with a deploy- and-forget strategy, where the devices remain immobile after- wards.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' As such, we can expect that the channel conditions are less time-variant than typically assumed in literature [12, 13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' An experimental campaign to investigate the long-term behavior of the channel is presented in [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The long- term behavior is measured by taking the channel correlation δi,j = |¯hH i ·¯hj|/∥¯hi∥∥¯hj∥ of the first channel estimate and the other channel N measurements, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', δ1,j for j ∈ {1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', N}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The observed channel correlations are depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' It illustrates that most of the time the correlation coefficient is close to 1, indicating that the channel is highly correlated with the first estimate and thus can be considered static.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' It also shows that, while in some occasions the correlation drops, the channel quickly becomes again highly correlated with the first channel instance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' More than 90% of the measured channels1 have a correlation coefficient higher than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This demonstrates the potential of re-using channel estimates in IoT contexts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='8 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='8 1 Sample index Channel Correlation δ1,j Node 1 Node 2 Figure 1: Channel correlation over a full day (9h24-17h48) with over 10 000 channel instances, with an average correlation of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='935/0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='968 and a standard deviation of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='06/0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='03 for Node 1/Node 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' SYSTEM MODEL There is a total of K single-antenna devices and a total of M co-located base station (BS) antennas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The set of active users trying to access the network is denoted by Ka, with |Ka| ≤ K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To access the network, each active device k ∈ Ka sends a unique, non-orthogonal preamble of length T , known to the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The pilot symbol of the preamble sent by device k at pilot symbol t is denoted by sk,t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The channel vector between the receive antenna m and user k is denoted by hk,m ∈ C, and 1More specifically, 91% and 95% for Node 1 and Node 2, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2We use here the term “re-using” to indicate that we no longer operate in a block fading model with independent channel realizations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Typically, these blocks are considered in the order of 50 ms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' is considered fixed over the preamble duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The received symbol at the m-th BS antenna at time t is yt,m = K−1 � k=0 hk,msk,tγk + wt,m, (1) where γk is an unknown complex scalar and wt,m ∈ C is independently and identically distributed (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=') zero mean circularly symmetric complex Gaussian (ZMCSCG) noise with variance σ2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The unknown complex scalar γk can be developed as γk = √ρkakejφk, (2) where ρk ∈ R+ is the transmit power of device k, ak ∈ {0, 1} is the device activity and φk models a potential phase offset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This offset φk can account for a CFO, where the phase is considered constant over the preamble duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This occurs when no frequency drift has occurred during the preamble duration, which is a feasible assumption as the CFO is typically low, yielding negligible phase rotations during the preamble interval.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' By assuming that all M antennas are perfectly synchronized, this offset is only dependent on the device.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In case the device is inactive, γk will be zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' We will introduce the term activity indicator to denote γk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Let us consider that the BS knows a part of the CSI, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', gk,m in hk,m = gk,m + λkǫk,m, (3) where ǫk,m are i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' ZMCSCG variables with unit variance, and λk ∈ R+ models the unknown part of the CSI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The large- scale fading coefficient of user k is βk = E(∥hk∥2 /M) = ∥gk∥2 /M +λ2 k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The factor λk models the quality of the known CSI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, it quantifies the correlation of the actual channel hk,m to the known partial CSI gk,m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In the extreme case with λk = 0, the CSI is perfectly known and there is no uncertainty left, as was studied in [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This could be the case in a fully static environment and if the CSI estimates are noiseless.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' However, for a realistic IoT scenario, even for static devices, CSI is not perfect due to i) environment dynamics and ii) noisy estimates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The parameter λk then quantifies this imperfection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' It is here assumed to be known3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Another extreme case, as considered in [8, 10], is obtained when gk,m = 0, ∀m, implying that only the large scale fading coefficient of user k is known, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', λk = √βk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DEVICE ACTIVITY DETECTION This section describes the proposed activity detection al- gorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' First, the log-likelihood of the received preamble is derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Then, given its non-convex expression, an iterative approach is proposed to estimate the parameters γk ∀k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Finally, activity detection is performed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Log-Likelihood of the Received Symbols Combining (1) and (3), the symbol, received at BS antenna m and for pilot symbol t, is given by yt,m = K−1 � k=0 (gk,m + ǫk,mλk)st,kγk + wt,m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 3It could be set to a certain value depending on the user activity profile and/or tracked for each user over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Stacking the observations at antenna m gives ym = K−1 � k=0 gk,mskγk + K−1 � k=0 ǫk,mλkskγk + wm, where ym = \uf8eb \uf8ec \uf8ed y0,m .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' yT −1,m \uf8f6 \uf8f7 \uf8f8 , sk = \uf8eb \uf8ec \uf8ed s0,k .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' sT −1,k \uf8f6 \uf8f7 \uf8f8 , wm = \uf8eb \uf8ec \uf8ed wm,0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' wT −1,m \uf8f6 \uf8f7 \uf8f8 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' For a given value of γk, ym|γk has a circularly symmetric Gaussian distribution with mean �K−1 k=0 gk,mskγk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' After defin- ing the vector θm = �K−1 k=0 ǫk,mλkskγk+wm, the covariance matrix is C = E � θmθH m � = K−1 � k=0 λ2 k|γk|2sksH k + σ2IT , (4) where we used the fact that ǫk,m were assumed to be i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' and the additive noise is white.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Note that this covariance matrix does not depend on the antenna index m and is thus valid for all ym.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Defining the vector γ = (γ0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', γK−1)T , and Θm = ym − �K−1 k=0 gk,mskγk the log-likelihood of the observation vector ym is log p(ym|γ) = − ln (|C|) − T ln(π) − ΘH mC−1Θm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Given the conditional independence of ǫk,m and wt,m over the antennas, the different ym are independent as well.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, the log-likelihood of the aggregated observations at all antennas y = (yT 0 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', yT M−1)T becomes log p(y|γ) = −M ln (|C|) − MT ln(π) − M−1 � m=0 ΘH mC−1Θm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (5) B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Iterative Algorithm for Maximizing Likelihood The maximum likelihood estimator of γ is obtained by maximizing ˆγML = arg max γ log p(y|γ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This problem is not trivial to solve given the nonlinear and non-convex dependence of the log-likelihood, more specifi- cally the covariance matrix C, in γ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' An idea to maximize the likelihood is to use an iterative approach, similarly as [8, 10]: at each iteration, all γk are kept fixed but one, which is optimized and updated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This way, they get updated one by one until convergence is attained, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', a maximum number of iterations or a certain tolerance is reached.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A block diagram of the algorithm is given in Figure 2 and the pseudocode is summarized in Algorithm 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Let us consider that the complex-valued γk′ needs to be updated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Using the definition introduced in (2), we can rewrite γk′ with a phase-amplitude decomposition: γk′ = rk′e\uf6beφk′, with rk′ = |γk′| = √ρk′ak′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The optimization with respect to γk′ is done in the following in several steps: i) optimizing the phase φk′ for a fixed value of rk′, ii) re-inserting this expression in the objective function to remove the dependence in φk′ and iii) optimizing the amplitude rk′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 1) Phase optimization: To highlight the dependence of the objective function in γk′ for constant values of other γk, k ̸= k′, let us define the vector yk′,m = ym − K−1 � k=0,k̸=k′ gk,mskγk, (8) which can be seen as a cancellation of device interference to isolate the contribution from device k′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, the objective function to maximize can be written as in (7)4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' where we explicitly express the dependence in (rk′, φk′) while the other (rk, φk), k ̸= k′ do not appear since they are considered constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Note that the matrix C, defined in (4), does not depend on φk′ but only rk′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In the extreme case of no prior CSI, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', gk′,m = 0 ∀m, the dependence of f(rk′, φk′) in φk′ disappears and there is an underdetermination and no estimate of the phase offset can be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In other cases, we can find that, after some manipulations, ˆφk′ = ∠sH k′C−1 M−1 � m=0 g∗ k′,myk′,m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (9) This result has an intuitive understanding: the optimal phase φ′ k tends to align the partial CSI with the observations due to device k′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2) Removing the phase dependence: Inserting this optimal value in the objective function f(rk′, φk′) makes the depen- dence in φk′ vanish and gives (6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 3) Amplitude optimization: To alleviate the dependence on rk′ in (6), let us define C−k′ = C − λ2 k′|γk′|2sk′sH k′ (10) = � k\\k′ λ2 k|γk|2sksH k + σ2IT , which does not depend on rk′ and is full rank, thus invertible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Applying the Sherman-Morrison formulas [14] to C−1 and C−1sk′ gives C−1 = C−1 −k′ − C−1 −k′sk′sH k′C−1 −k′r2 k′λ2 k′ 1 + sH k′C−1 −k′sk′r2 k′λ2 k′ (11) We insert these expressions in (6) and we omit terms that do not depend on rk′, which will vanish after taking the derivative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This gives ˜f(rk′) = −M ln (|C|) + αr2 k′ + βrk′ 1 + δr2 k′ , (12) where we defined the constants (independent of rk′) α, β and δ, as α = M−1 � m=0 |yH k′,mC−1 −k′sk′|2λ2 k′ − sH k′C−1 −k′sk′ M−1 � m=0 |gk′,m|2 β = 2 ����� M−1 � m=0 yH k′,mC−1 −k′sk′gk′,m ����� δ = sH k′C−1 −k′sk′λ2 k′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (13) 4For clarity, we omit in the following the constant term MT ln(π) which does not affect optimization as it does not depend on γ and vanishes after differentiation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' f(rk′) = −M ln (|C|) − M−1 � m=0 yH k′,mC−1yk′,m − r2 k′sH k′C−1sk′ M−1 � m=0 |gk′,m|2 + 2 ����� M−1 � m=0 yH k′,mC−1sk′gk′,m ����� rk′ (6) f(rk′, φk′) = −M ln (|C|) − M−1 � m=0 � yk′,m − gk′,msk′rk′e\uf6beφk′�H C−1 � yk′,m − gk′,msk′rk′e\uf6beφk′� (7) Inputs σ2, λk, gm,k, ym ∀m, k Initialization k′ ← 0, ˆγ ← ˆγinit Amplitude Optimization (14), (16) or (17) ˆrk′ ← arg max ˜f(rk′) Phase Optimization (9) ˆφk′ ← ∠sH k′C−1 �M−1 m=0 g∗ k′,myk′,m Converged?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Iterative maximum likelihood estimator Tolerance Max iteration Activity Detection ˆγk ≤ γth,k ∀k No Yes k′ ← k′ + 1 mod K Updated ˆγk′ ← ˆrk′e\uf6beφk′ ˆγ Figure 2: Block diagram of the iterative maximum likelihood estimator and activity detection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' One can note that ˜f(rk′) in (12) can now be differentiated with respect to rk′, using the differential rule ∂(log |A|) = tr[A−1∂A].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Setting the derivative to zero gives, noting that the denominator is always strictly positive, 0 = −r3 k′2Mδ2 − r2 k′βδ + rk′(−2Mδ + 2α) + β, (14) which is a polynomial of degree 3 in rk′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' There are closed- form solutions for the roots of such polynomials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Following Descarte’s rule of signs, (14) has only one real and positive root, as required, in case the terms are non-zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Below we discuss the special cases when the terms are not non-zero, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', when there is no or complete CSI knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The algorithm is summarized in the pseudocode Algo- rithm 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' At each iteration, the constants α, β and δ can be easily re-evaluated based on (13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' They require the matrix inversion C−1 −k′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To avoid re-computing a full inverse at each iteration, one can rely on the Sherman-Morrison formula and on the current knowledge of C−1, which is updated at the end of each iteration by inserting the obtained value of rk′ in (11).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Using (10), we find C−1 −k′ = C−1 + λ2 k′|γk′|2C−1sk′sH k′C−1 1 − λ2 k′|γk′|2sH k′C−1sk′ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (15) Moreover, computations can be optimized as several quantities appear multiple times and can be computed only once.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The complexity of the proposed algorithm is O(IMT 2), where I is the number of iterations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='5 We now investigate two particular cases, to gain further insights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Algorithm 1 Iterative maximum likelihood device activity detector Require: σ2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' λk,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' ym,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' gk,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='m,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' ˆγinit ∀k,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' m k′ ← 0 ˆγ ← ˆγinit C−1 ← ��K−1 k=0 λ2 k|ˆγk|2sksH k + σ2IT �−1 while Not converged do Compute yk′,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='m,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' C−1 −k′,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' α,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' β and δ based on (8),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (15) and (13) ˆrk′ ← arg max ˜f(rk′) ⊲ Update amplitude based on (14),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (16) or (17) ˆφk′ ← ∠sH k′C−1 �M−1 m=0 g∗ k′,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='myk′,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='m ⊲ Update phase ˆγk′ ← ˆrk′e\uf6be ˆφk′ C−1 ← C−1 −k′ − C−1 −k′ sk′ sH k′ C−1 −k′ r2 k′ λ2 k′ 1+sH k′ C−1 −k′ sk′ r2 k′ λ2 k′ k′ ← k′ + 1 mod K end while a) Particular case: device with no CSI: Now consider that,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' for a given k′,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' gk′,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='m = 0 ∀m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This could be because this device is new or moving a lot, such that its CSI is outdated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Only, its parameter λk′ is known, which is equal 5Note that I will in practice depend on K as we will iterate N times over all users K, but this is not a requirement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' to the large-scale fading coefficient √βk′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' At iteration of user k′, evaluating (13) for gk′,m = 0 ∀m implies that β = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, (14) simplifies to 0 = 2rk′(−r2 k′Mδ2 − Mδ + α), which has a trivial solution in rk′ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' One of the other roots is always negative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Keeping only the positive one, we find the amplitude update ˆrk′ = � α − Mδ Mδ2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (16) If this root is imaginary, we set ˆrk′ to zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' As discussed before introducing the phase update equation (9), in the case of no prior CSI, the phase ambiguity cannot be resolved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This particular case gives an update relatively similar to the maximum likelihood estimator derived in [8, (23)], where their ML expression estimates the error, while ours estimates directly the coefficient ˆrk′, given the same estimate of γk′ at each iteration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' b) Particular case: device with complete prior CSI: Now, consider that, for a given k′, λk′ = 0, so that the CSI is perfectly known.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Only the phase shift and the transmit power are unknown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' At iteration of user k′, evaluating (13) for λk′ = 0 implies that δ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, (14) simplifies to a linear equation 0 = rk′2α + β, which gives the following amplitude update ˆrk′ = −β 2α = |sH k′C−1 �M−1 m=0 g∗ k′,myk′,m| sH k′C−1sk′ � m′ |gk′,m′|2 , (17) while the phase is updated according to (9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 4) Initialization: To start the iterative algorithm, we con- sider different choices to initialize ˆγinit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A simple choice is to initialize to zero, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', ˆγ0 init = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Another choice is to initialize solely based on the available prior CSI, considering that λk ≈ 0, ∀k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The estimator is similar to [11], except that, here, prior CSI is used instead of complete CSI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' If λk ≈ 0, ∀k, the covariance matrix C, defined in (4), simplifies to C = σ−2IT , which is independent of γk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, many terms of the log-likelihood in (5) become independent of γ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Maximizing (5) becomes equivalent to the following minimization max γ log p(y|γ) = min γ M−1 � m=0 �����ym − K−1 � k=0 gk,mskγk ����� 2 = min γ ∥y − Γγ∥2 , where we defined the vector and matrix notations y = �y0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' yM−1 �T , Γ = �Γ0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' ΓM−1 �T , Γm = �s0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' sK−1 � diag(g0,m .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' gK−1,m).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This minimization problem is a quadratic function of γ, which is a least squares problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The estimate has the following closed-form expression ˆγZF init = � ΓHΓ �−1 ΓHy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (18) This last estimator can be seen as a zero-forcing (ZF) es- timator, which requires a matrix inversion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To avoid ill- conditioning, a first necessary condition is that K ≤ MT .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This condition is not sufficient as the channel and preamble of two devices could be correlated, especially when K is on the order of MT .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Moreover, if no prior information is available for a given user k′, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', gk′,m = 0, ∀m, the inverse will also be ill-conditioned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This implies that the k′-th column of Γ becomes null and thus Γ is rank deficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Moreover, the prior CSI might be noisy, leading to unstable results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To make initialization more robust, we can use an least minimum mean square error (LMMSE) criterion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' To do this, some prior knowledge must be assumed on the statistics of γ, more specifically, its first and second order moments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' We here make the following assumptions: i) the activity of each device is independent of one another, ii) the average activity and average transmit power of each device is known and iii) no prior information is known on the phase offset so that φk is considered uniformly distributed between 0 and 2π.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Under these assumptions, we have E(γ) = 0 and D = E(γγH) = diag (E(a0)E(ρ0), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', E(aK−1)E(ρK−1)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hence, for the linear observation model y = Γγ + w, still considering that λk ≈ 0, ∀k, the LMMSE estimator of γ is then given by [15] ˆγLMMSE init = � ΓHΓ + σ2D−1�−1 ΓHy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (19) Note that the matrix to be inverted is always well-conditioned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Finally, a matched filter (MF) estimator could be used to avoid the need for matrix inversion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' ˆγMF init = � diag(ΓHΓ) + σ2D−1�−1 ΓHy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' (20) C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Activity Detection A non-negative activity threshold γth,k is applied for each device k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A device is considered active if |ˆγk| ≥ γth,k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The real-valued threshold is defined as, γth,k = v � SNRk −1, (21) where v is chosen to have a desired probability of false alarm and miss detection performance and with SNRk = Mβk/σ2 = E(∥hk∥2)/σ2 = (∥gk∥2 + Mλ2 k)/σ2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Miss detection happens when a device was undetected, while it was actually transmitting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Equivalently, a false alarm occurs if a device is considered active by the algorithm but was not.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' We define the probability of miss detection as the average ratio of undetected devices to the number of active devices Pmd = 1 − ����Ka ∩ ˆKa ��� / |Ka| � , where Ka is the set of active devices and ˆKa = {k|ˆak = 1, ∀ ∈ [1, K]} denotes the estimated set of active devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Note that on average |Ka| = Ka.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Similarly, the probability of false alarm is the ratio of inactive devices considered active to the number of inactive devices and is given by Pfa = ���� ˆKa \\ Ka ��� /(K − |Ka|) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A trade-off can be made between the two probabilities by varying v in (21).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A lower v yields a lower activity threshold, resulting in more devices considered active.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This in turn lowers the probability of miss detection, while increasing the probability of generating a false alarm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In the simulations, the parameter v is swept across the range [−40, 40]dB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Table I: Simulation parameter set with default values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Parameter Symbol Default value Number of devices K 500 Number of total BS antennas M 64 Signal-to-noise ratio SNR 20 dB Device activity probability ǫa 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1 Pilot sequence sk ∼ CN (0, 1) Pilot length τp 10 symbols Phase offset φk ∼ U[0,2π] Number of simulations Nsim >10 000 Number of algorithm iterations Niter K · 4 Initialization vector ˆ γinit ˆγLMMSE init (19) Unknown part of the CSI λ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3 V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' NUMERICAL ASSESSMENT The default simulation configurations are summarized in Table I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The device activity profile is generated randomly and independently for each device with a probability ǫa = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1, meaning that on average ǫaK = 50 devices are active simul- taneously.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Or equivalently, the devices have an average duty cycle of 10%, which is high for typical IoT applications [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The channel between the BS and device k is modelled as in (3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The pilot sequence is randomly generated from a complex Gaussian distribution sk ∼ CN (0, 1), and is assumed to be known by the BS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Each device uses a pilot sequence of 10 symbols.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A random phase offset φk ∼ U[0,2π] is generated to simulate a carrier frequency offset (considered time-invariant over the preamble duration).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The source code for all simulations can be accessed online6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Convergence of different initialization vectors The convergence of different initializations is evaluated with respect to the genie-aided approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In the genie-aided case, the algorithm is initialized with the real activity indicators, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', γ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The convergence is assessed via the likelihood (5) and the mean square error (MSE).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The former should monotonically increase with each iteration, while the MSE can vary as it can not directly be minimized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The performance of the different initialization vectors for ˆγinit are depicted in Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The bottom figures zoom in on a smaller region to distinguish the performance of the initialization vectors when converging closer to the genie-aided case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' While all initialization methods approximate the genie-aided case, the initialization vector has a non-negligible impact on the performance of the algorithm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' An intuitive approach is to initialize with 0 because the activity probability is low and hence, on average, 90 % of the devices are expected to be inactive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' As illustrated in Figure 3, ˆγinit = 0 requires considerably more iterations to approach the other initialization methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Impact of the quality of prior CSI Figure 4 illustrates the performance of the detector algo- rithms for different correlations between the actual channel and the known CSI, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', λ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' With increased λ, and thus decreased channel knowledge, both the LMMSE estimator and the proposed algorithm have an increased probability of miss detection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The figure also demonstrates the gain of the 6https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='com/wavecore-research/grant-free-random-access-partial-csi 0 5 10 15 20 −8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 −6,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 −4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 −2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 log p(y|γ) (5) LMMSE (19) ZF (18) MF (20) zeros genie (γ) 0 5 10 15 20 −8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 −6,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 −4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 −2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='000 log p(y|γ) (5) LMMSE (19) ZF (18) MF (20) zeros genie (γ) 0 5 10 15 20 10−2 10−1 100 101 Number of iterations (Niter/K) MSE(ˆγ) 0 5 10 15 20 10−2 10−1 100 101 Number of iterations (Niter/K) MSE(ˆγ) Figure 3: The log-likelihood (5) and MSE of the estimated activity indicators for different initialization vectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' While with all initialization vectors the genie-aided case is approximated, different number of iterations are required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9 10−4 10−3 10−2 10−1 λ Pmd Pfa 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='001 Figure 4: Performance of the proposed algorithm ( ) versus the LMMSE estimator ( ) for different values of channel knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The probability of miss detection is shown for different values of Pfa (10 %, 1 %, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1 %).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' proposed algorithm with respect to the LMMSE estimator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The algorithm outperforms the LMMSE estimator for all λ and is most effective when the prior CSI has a strong correlation with the actual channel, and diminishes with decreased channel knowledge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Impact of the signal-to-noise ratio Figure 5 shows the false alarm and miss detection prob- ability of the LMMSE estimator and the iterative maximum likelihood device activity detector for different device SNRs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The full CSI case is included as a baseline for comparison, 10−5 10−4 10−3 10−2 10−5 10−4 10−3 10−2 21x Pfa Pmd −6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='67 dB 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='67 dB 20 dB Figure 5: The probability of false alarm and miss detection for different device SNRs for the LMMSE estimator when having full CSI ( ) and partial CSI ( ), and the proposed iterative algorithm with partial CSI ( ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' No miss detection or false alarm occurred in the full CSI case for SNR values of −6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='67 dB and 20 dB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' where the full CSI is known instead of only a portion (λ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 5 demonstrates the large performance gain of the proposed algorithm with respect to the LMMSE estimator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The graph demonstrates that the iterative algorithm lowers the probability of miss detection by a factor of 21 for the same probability of false alarm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='7 The performance is only marginally increased for very low SNRs (below zero).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' CONCLUSION We formulated an iterative maximum-likelihood (ML) al- gorithm to detect active devices using prior channel state information (CSI) when performing grant-free random access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Previous experimental work has demonstrated that, in many massive machine-typed communication (mMTC) applications, the CSI is less time-variant than assumed in theoretical models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Given the static nature of Internet of Things (IoT) devices, we have exploited this feature in the activity detection estimator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' During grant-free access, the devices transmit a unique, but non-orthogonal preamble, which is used for activity detection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Next to this, the algorithm is also able to detect a device- specific phase offset, which could be caused by carrier fre- quency offset (CFO).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The algorithm is numerically evaluated and compared to the conventional least minimum mean square error (LMMSE) estimator with full channel knowledge and partial CSI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' The presented results indicate that the iterative al- gorithm converges and outperforms the conventional LMMSE estimator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' For a signal-to-noise ratio (SNR) of 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='67 dB, the probability of not detecting an active device is 21 times lower for the proposed iterative ML estimator than the LMMSE estimator for the same probability of wrongly considering an inactive device as an active device.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' This work can be extended to the cell-free or distributed case with geographically distributed access points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' In that case, the partial CSI becomes access point-dependent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 7Notably, the LMMSE estimator does not employ an iterative approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Therefore, our proposed algorithm will be compared in future work with other iterative approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' REFERENCES [1] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Callebaut, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Rottenberg, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Van der Perre, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Larsson, “Grant-Free random access of IoT devices in massive MIMO with partial CSI,” in 2023 IEEE Wireless Communications and Networking Conference (WCNC) (IEEE WCNC 2023), Glasgow, United Kingdom (Great Britain), Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2023.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [2] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Callebaut, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Leenders, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Van Mulders, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Ottoy, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' De Strycker, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Van der Perre, “The Art of Designing Remote IoT De- vices—Technologies and Strategies for a Long Battery Life,” Sensors, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 21, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 3, 2021, ISSN: 1424-8220.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3390/s21030913.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='mdpi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='com/1424-8220/21/3/913.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [3] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Wielandt and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Dafflon, “A local lora based network pro- tocol with low power redundant base stations enabling remote environmental monitoring,” in 2020 54th Asilomar Conference on Signals, Systems, and Computers, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 520–523.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/IEEECONF51394.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9443344.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [4] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Liu, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Larsson, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Yu, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Popovski, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Stefanovic, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' de Carvalho, “Sparse signal processing for grant-free massive connectiv- ity: A future paradigm for random access protocols in the internet of things,” IEEE Signal Process Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 35, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 88–99, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2018, ISSN: 1053-5888, 1558-0792.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/msp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2844952.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/msp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2844952.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [5] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Ding, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Qu, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Jiang, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Jiang, “Success probability of grant-free random access with massive MIMO,” IEEE Internet of Things Journal, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 6, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 506–516, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2019, ISSN: 2327- 4662, 2372-2541.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/jiot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2869003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Avail- able: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/jiot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2869003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [6] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Fengler, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Haghighatshoar, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Jung, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Caire, “Grant-free massive random access with a massive MIMO receiver,” in 2019 53rd Asilomar Conference on Signals, Systems, and Computers, IEEE, Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 23–30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/ieeeconf44664.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9049039.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/ieeeconf44664.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9049039.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [7] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Zhang, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Jin, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Zhu, “A hybrid-grant random access scheme in massive MIMO systems for IoT,” IEEE Open Access, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 88 487–88 497, 2020, ISSN: 2169- 3536.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2993597.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2993597.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Fengler, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Haghighatshoar, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Jung, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Caire, “Non-Bayesian activity detection, large-scale fading coefficient estimation, and un- sourced random access with a massive MIMO receiver,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Inf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Theory, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 67, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2925–2951, May 2021, ISSN: 0018- 9448, 1557-9654.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/tit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3065291.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/tit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3065291.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [9] U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Ganesan, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Bjornson, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Larsson, “An algo- rithm for grant-free random access in cell-free massive MIMO,” in 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), IEEE, May 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 1–5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/spawc48557.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9154288.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Avail- able: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/spawc48557.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='9154288.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [10] ——, “Clustering-based activity detection algorithms for grant-free random access in cell-free massive MIMO,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 69, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 7520–7530, Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 2021, ISSN: 0090-6778, 1558-0857.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/tcomm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3102635.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1109/tcomm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='3102635.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [11] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Callebaut, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Van der Perre, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Rottenberg, “Grant- Free Random Access in Massive MIMO for Static Low- Power IoT Nodes,” pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 46–51, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: arXiv%20preprint%20arXiv:2110.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='07927.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [12] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Bj¨ornson, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Hoydis, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Sanguinetti, “Massive mimo net- works: Spectral, energy, and hardware efficiency,” Foundations and Trends® in Signal Processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 11, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 3-4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 154–655, 2017, ISSN: 1932-8346.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1561/2000000093.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Available: http://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1561/2000000093.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [13] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Marzetta, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Larsson, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Yang, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Ngo, Fundamentals of Massive MIMO.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Cambridge University Press, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [14] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Sherman and W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Morrison, “Adjustment of an inverse matrix corresponding to a change in one element of a given matrix,” The Annals of Mathematical Statistics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 21, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' 124–127, 1950.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [15] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Nandi and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Kundu, Statistical Signal Processing, Fre- quency Estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Springer Singapore, 2020, ISBN: 9789811562792, 9789811562808.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1007/978-981-15-6280-8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content=' Avail- able: https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} +page_content='1007/978-981-15-6280-8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/79E4T4oBgHgl3EQfCgub/content/2301.04861v1.pdf'} diff --git a/89FQT4oBgHgl3EQfIjX8/content/tmp_files/2301.13253v1.pdf.txt b/89FQT4oBgHgl3EQfIjX8/content/tmp_files/2301.13253v1.pdf.txt new file mode 100644 index 0000000000000000000000000000000000000000..20d01d1e4eaabec76146447a0f0e5caac141e226 --- /dev/null +++ b/89FQT4oBgHgl3EQfIjX8/content/tmp_files/2301.13253v1.pdf.txt @@ -0,0 +1,5775 @@ +Dense Nuclear Matter Equation of State from Heavy-Ion Collisions +Agnieszka Sorensen +Institute for Nuclear Theory, University of Washington, Seattle, WA 98195, USA +Kshitij Agarwal +Physikalisches Institut, Eberhard Karls Universit¨at T¨ubingen, D-72076 T¨ubingen, Germany +Kyle W. Brown +Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA and +Department of Chemistry, Michigan State University, East Lansing, MI 48824, USA +Zbigniew Chajecki +Department of Physics, Western Michigan University, Kalamazoo, MI, 49008, USA +Pawe�l Danielewicz, William G. Lynch, Scott Pratt, and ManYee Betty Tsang +Department of Physics and Astronomy and Facility for Rare Isotope +Beams Michigan State University, East Lansing, MI 48824 USA +Christian Drischler +Department of Physics and Astronomy and Institute of Nuclear +and Particle Physics, Ohio University, Athens, OH 45701, USA +Stefano Gandolfi and Ingo Tews +Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545, USA +Jeremy W. Holt and Che-Ming Ko +Department of Physics and Astronomy and Cyclotron Institute, +Texas A&M University, College Station, TX 77843, USA +Matthias Kaminski +Department of Physics and Astronomy, University of Alabama, Tuscaloosa, AL 35487, USA +Rohit Kumar +Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA +Bao-An Li and William Newton +Texas A& M University-Commerce, Commerce, TX 75429, USA +Alan B. McIntosh +Cyclotron Institute, Texas A&M University, College Station, Texas 77843, USA +Oleh Savchuk +Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA and +Bogolyubov Institute for Theoretical Physics, 03680 Kyiv, Ukraine +Maria Stefaniak +GSI Helmholtz Centre for Heavy-ion Research, Planckstr. 1, 64291 Darmstadt, Germany +arXiv:2301.13253v1 [nucl-th] 30 Jan 2023 + +2 +Ramona Vogt +Nuclear and Chemical Sciences Division, Lawrence Livermore +National Laboratory, Livermore, CA 94551, USA and +Department of Physics and Astronomy, University of California, Davis, CA 95616, USA +Hermann Wolter +Faculty of Physics, University of Munich, D-85748 Garching, Germany +Hanna Zbroszczyk +Faculty of Physics, Warsaw University of Technology, Koszykowa 75, Warsaw, Poland +Endorsing authors: +Anton Andronic +Westf¨alische Wilhelms-Universit¨at M¨unster, Institut f¨ur Kernphysik, 48149 M¨unster, Germany +Steffen A. Bass +Department of Physics, Duke University, Durham NC 27708 +Abdelouahad Chbihi +GANIL, CEA/DRF-CNRS/IN2P3, Boulevard Henri Becquerel, F-14076 Caen Cedex, France +Maria Colonna +INFN-LNS, Laboratori Nazionali del Sud, 95123 Catania, Italy +Mircea Dan Cozma +IFIN-HH, Reactorului 30, 077125 Mˇagurele-Bucharest, Romania +Veronica Dexheimer +Department of Physics, Kent State University, Kent OH 44242 USA +Xin Dong, Jørgen Randrup, and Nu Xu +Lawrence Berkeley National Laboratory, Berkeley, CA 94720 +Travis Dore +Fakult¨at f¨ur Physik, Universit¨at at Bielefeld, D-33615 Bielefeld, Germany +Lipei Du +Department of Physics, McGill University, Montreal, Quebec H3A 2T8, Canada +Steven P. Harris, Larry McLerran, and Sanjay Reddy +Institute for Nuclear Theory, University of Washington, Seattle, WA 98195, USA +Huan Zhong Huang +University of California, Los Angeles, CA 90095 + +3 +Jos´e C. Jim´enez +Instituto de F´ısica, Universidade de S˜ao Paulo, Rua do Mat˜ao 1371, 05508–090 S˜ao Paulo-SP, Brazil +Joseph Kapusta +School of Physics and Astronomy, University of Minnesota, Minneapolis, Minnesota 55455 USA +Arnaud Le F`evre, Christian Sturm, and Wolfgang Trautmann +GSI Helmholtz Centre for Heavy-ion Research, Planckstr. 1, 64291 Darmstadt, Germany +Jacquelyn Noronha-Hostler +University of Illinois at Urbana-Champaign, Urbana, IL 61801 +Christopher Plumberg +Natural Science Division, Pepperdine University, Malibu, CA 90263, USA +Hans-Rudolf Schmidt +Physikalisches Institut, Eberhard Karls Universit¨at T¨ubingen, D-72076 T¨ubingen, Germany and +GSI Helmholtz Centre for Heavy-ion Research, Planckstr. 1, 64291 Darmstadt, Germany +Peter Senger +Facility for Antiproton and Ion Research, Planckstr. 1, Darmstadt, Germany +Richard Seto +University of California-Riverside, Riverside, California 92521, USA +Chun Shen +Department of Physics and Astronomy, Wayne State University, Detroit, Michigan 48201, USA and +RIKEN BNL Research Center, Brookhaven National Laboratory, Upton, NY 11973, USA +Jan Steinheimer +Frankfurt Institute for Advanced Studies, Ruth-Moufang-Str. 1, D-60438 Frankfurt am Main, Germany +Joachim Stroth +Institut f¨ur Kernphysik, Goethe-Universit¨at, 60438 Frankfurt, Germany and +GSI Helmholtz Centre for Heavy-ion Research, Planckstr. 1, 64291 Darmstadt, Germany +Kai-Jia Sun +Institute of Modern Physics, Fudan University, 200438,Shanghai,China +Giuseppe Verde +INFN Sezione di Catania, 64 Via Santa Sofia, I-95123 Catania, Italy +Volodymyr Vovchenko +Physics Department, University of Houston, Box 351550, Houston, TX 77204, USA +(Dated: February 1, 2023) + +4 +Executive Summary +The nuclear equation of state (EOS) is at the center of numerous theoretical and experimental +efforts in nuclear physics, motivated by its crucial role in our understanding of the properties of +nuclear matter found on Earth, in neutron stars, and in neutron-star mergers. With advances in +microscopic theories for nuclear interactions, the availability of experiments probing nuclear matter +under conditions not reached before, and the advent of multi-messenger astronomy, the next decade +will bring new opportunities for determining the nuclear matter EOS. +• Profound questions challenging our understanding of strong interactions remain +unanswered: It is still unknown whether the transition between a hadronic gas and a +quark-gluon plasma, which at zero baryon density is known to be consistent with a crossover +transition predicted by Lattice QCD, becomes of first order in the finite-density region of +the QCD phase diagram accessible in terrestrial experiments. The isospin-dependence of +the EOS, crucial to our understanding of both the structure of neutron-rich nuclei and the +properties of neutron stars, is poorly known above nuclear saturation density. Moreover, +recent observations of very heavy compact stars indicate that the EOS in neutron-rich mat- +ter becomes very stiff at densities of the order of a few times saturation density, leading to +values of the speed of sound exceeding 1/ +√ +3 of the speed of light (breaking the conformal +limit). Not only is the mechanism behind this striking behavior not known, but it is also +unknown whether a similar stiffening occurs in symmetric or nearly-symmetric nuclear mat- +ter. Resolving these and other questions about the properties of dense nuclear +matter is possible by taking advantage of the unique opportunities for studying +the nuclear matter EOS in heavy-ion collision experiments. +• Among controlled terrestrial experiments, collisions of heavy nuclei at interme- +diate beam energies (from a few tens of MeV/nucleon to about 25 GeV/nucleon +in the fixed-target frame) probe the widest ranges of baryon density and tem- +perature, enabling studies of nuclear matter from a few tenths to about 5 times the nuclear +saturation density and for temperatures from a few to well above a hundred MeV, respec- +tively. In the next decade, numerous efforts worldwide will be devoted to uncovering the +dense nuclear matter EOS through heavy-ion collisions, including studies at FRIB where +the isospin-dependence of the EOS can be probed in energetic collisions of rare isotopes. +Modern detectors and refined analysis techniques will yield measurements that +will elucidate the dependence of the EOS on density, temperature, and isospin +asymmetry. +• Hadronic transport simulations are currently the only means of interpreting +observables measured in heavy-ion collision experiments at intermediate beam +energies. This means that capitalizing on the enormous scientific effort aimed at uncovering +the dense nuclear matter EOS, both at RHIC and at FRIB, depends on the continued +development of state-of-the-art hadronic transport simulations. Support for the hadronic +transport community, and in particular for viable career pathways for early +career researchers, is imperative to maintain the health of and diversify the U.S. +hadronic transport community, and to fully realize the potential of U.S. efforts +leading the exploration of the dense nuclear matter EOS. + +5 +CONTENTS +I. Introduction +7 +A. Constraining the nuclear matter EOS using heavy-ion collisions +8 +B. Connections to fundamental questions in nuclear physics +9 +C. Upcoming opportunities +11 +D. Needs +12 +II. The equation of state from 0 to 5n0 +13 +A. Transport model simulations of heavy-ion collisions +13 +1. Transport theory +14 +2. Selected constraints on the EOS obtained from heavy-ion collisions +17 +3. Challenges and opportunities +19 +B. Microscopic calculations of the EOS +25 +1. Status +25 +2. Challenges and opportunities +27 +C. Neutron star theory +28 +1. Status +28 +2. Challenges and opportunities +31 +III. Heavy-ion collision experiments +33 +A. Experiments to extract the EOS of symmetric nuclear matter +35 +1. Measurements sensitive to the EOS +35 +2. Experiments probing densities between 1–2.5n0 +36 +3. Experiments probing densities above 2.5n0 +38 +4. Challenges and opportunities +39 +B. Experiments to extract the symmetry energy +42 +1. Experiments that probe low densities +42 +2. Measurements to extract symmetry energy up to 1.5n0 +42 +3. Selected constraints on the symmetry energy around 1.5n0 +44 +4. Challenges and opportunities +46 +IV. The equation of state from combined constraints +50 +A. Constraints +51 +B. EOS obtained by combining various constraint sets +53 +V. Connections to other areas of nuclear physics +54 +A. Applications of hadronic transport +54 +1. Detector design +55 +2. Space exploration, radiation therapy, and nuclear data +55 +B. Hydrodynamics +57 +1. Status +57 +2. Range of applicability +58 +3. Challenges and opportunities +60 +VI. Exploratory directions +60 +A. Dense nuclear matter EOS meeting extreme gravity and dark matter in supermassive +neutron stars +60 +B. Nuclear EOS with reduced spatial dimensions +61 + +6 +C. Interplay between nucleonic and partonic degrees of freedom: SRC effects on nuclear +EOS, heavy-ion reactions, and neutron stars +62 +D. High-density symmetry energy above 2n0 +63 +E. Density-dependence of neutron-proton effective mass splitting in neutron-rich matter +66 +Acknowledgments +68 +References +68 + +7 +I. +INTRODUCTION +The equation of state (EOS) is a fundamental property of nuclear matter, describing its emergent +macroscopic properties originating from the underlying strong interactions. Around the saturation +density of nuclear matter, the EOS controls the structure of nuclei through the binding energy and +the incompressibility. The EOS also determines, among other things, the neutron-skin thickness +in neutron-rich nuclei as well as the properties of nuclear matter at extreme densities and/or tem- +peratures, corresponding to conditions produced in experiments colliding heavy nuclei or observed +in neutron stars and neutron star mergers. Far beyond describing the properties of matter com- +posed of only protons and neutrons, the EOS can also reflect the appearance of new degrees of +freedom, e.g., strange particles in the cores of neutron stars or quarks and gluons in ultrarelativistic +heavy-ion collisions, or the emergence of new states of matter, e.g., chirally-restored matter, meson +condensates, or quarkyonic matter. +In heavy-ion collision experiments, the EOS is studied by detecting particles emerging from the +collision zone and measuring observables sensitive to the properties of nuclear matter. Crucially, +any interpretation of these observables, including quantitative constraints on the EOS, requires +comparisons of experimentally measured observables to results obtained in dynamic simulations. +This white paper highlights the essential role of hadronic transport simulations of +heavy-ion collisions in advancing our understanding of the EOS. It also elucidates the +many connections between inferences of the EOS from heavy-ion collision data and +other efforts aiming to describe and understand the properties of nuclear matter. +FIG. 1. Schematic depiction of the ranges of density and temperature probed in experiments and astronom- +ical observations sensitive to the EOS of nuclear matter (counterclockwise from bottom left): neutron star +crust physics, including nuclear pasta structures; properties of nuclei; structure of neutron stars; dynamics of +neutron star mergers; and outcomes of heavy-ion collisions which can probe both symmetric and asymmetric +matter. Figures adapted from [1–5]. + +100 +HIC (sym) +temperature [MeV] +10 +HIC (asym) +S +ROOKHAVEN +NS mergers +.NS crust +nuclear +properties +0.1 +Z +neutron stars (NS) +0 +1 +2 +3 +4 +5 +density np/no8 +A. +Constraining the nuclear matter EOS using heavy-ion collisions +FIG. 2. +Constraints on the zeroth (Sv) and +first (L) coefficient of the symmetry energy ex- +pansion. +Experimental constraints are derived +from heavy-ion collisions (HIC) [6], neutron-skin +thicknesses of Sn isotopes [7], giant dipole res- +onances (GDR) [8], the dipole polarizability of +208Pb [9, 10], nuclear masses [11], and isovector +skins (IAS+∆R) [12]. Also shown are constraints +from χEFT (GP-B) [13], microscopic neutron- +matter calculations (H, G) [14, 15], and from the +unitary gas limit (UG) [16]. Figure from [13]. +The last decade has brought tremendous progress +in extracting the EOS as a function of baryon den- +sity nB, temperature T, and the isospin asymme- +try δ (or, equivalently, the proton fraction) from +a variety of experimental and astronomical data as +well as theoretical calculations. Many-body theory, +based on sophisticated approaches with input from +nucleon scattering or nuclear structure data, can +now state the EOS below and near the saturation +density n0 with meaningful uncertainties (see Sec- +tion II B, “Microscopic calculations of the EOS”). +New classes of experiments have extracted the thick- +ness of neutron skins in nuclei, shedding light on the +isospin-dependence of the EOS (or, equivalently, the +symmetry energy) near or below n0. +High-energy +heavy-ion collisions have constrained the EOS of the +quark-gluon plasma at high temperatures and small +baryon densities, while ongoing experimental efforts +worldwide focus on the EOS of nearly-symmetric +dense baryonic matter, probed in collisions at in- +termediate energies. Meanwhile, collisions at lower +energies have led to experimental constraints on the +symmetry energy at sub- and suprasaturation den- +sities. +Most remarkably, a revolution in the qual- +ity and breadth of astronomical observations, high- +lighted by the first simultaneous detection of grav- +itational waves and electromagnetic signals from a +neutron-star merger, ushered in a new era of multi- +messenger astronomy (see Section II C, “Neutron +star theory”). Together with the newly available ex- +perimental capabilities at the Facility for Rare Iso- +tope Beams (FRIB), there are unprecedented oppor- +tunities to probe the isospin-dependence of the EOS +through astronomical and terrestrial measurements. +Among the experimental efforts discussed above, heavy-ion collisions probe the widest range +of baryon densities and, moreover, represent the only means to address the EOS away from n0 +in controlled terrestrial experiments, see Fig. 1. +Indeed, heavy-ion reactions at beam energies +from a few tens of MeV/nucleon to about 25 GeV/nucleon in the fixed-target frame probe the +EOS of hadronic matter at baryon densities from a few tenths to about 5 times n0. Controlling the +properties of matter produced in these experiments is possible by varying the beam energy, collision +geometry, and isotopic composition of the target and projectile. Insights and constraints obtained +from transport model analyses of these experiments are relevant both for our understanding of +nuclear matter as found on Earth and for our understanding of neutron stars from crust to core. +Within ongoing efforts, the STAR experiment’s Beam Energy Scan (BES) fixed-target (FXT) +program at the Relativistic Heavy Ion Collider (RHIC) at the Brookhaven National Laboratory +(BNL), which collided gold nuclei at intermediate beam energies and which completed data taking +in 2022, leads the US effort to constrain the EOS of nearly-symmetric nuclear matter at high + +100 +Constraints on S-L +HIC +80 +△R +X +AS +60 +GP-B +G +40 +H +Masses +pb +20 + Skin +UG +Analytic +UG +GDR +0 +26 +28 +30 +32 +34 +Symmetry Energy S [MeV9 +0.5 +1.0 +1.5 +2.0 +2.5 +3.0 +Prior +Astro + HIC +Pressure P (MeV fm–3) +100 +101 +102 +Number density n (nsat) +FIG. 3. +Pressure in neutron star matter as +a function of density from a Bayesian analysis +combining nuclear theory and data from multi- +messenger neutron-star observations and heavy- +ion collisions [17]: the dark blue and light blue +region corresponds to the 68% and 95% credible +interval, respectively, while the gray dashed line +shows the 95% bound obtained in χEFT calcu- +lations and used as a prior. Figure from [17]. +baryon densities up to around 5n0, corresponding +to densities present in the deep interiors of neu- +tron stars. +Among comparable efforts in Europe, +the HADES experiment at GSI, Germany, probes +matter at densities up to 2.5n0. Preliminary results +from these contemporary efforts, as well as measure- +ments from other heavy-ion collision experiments +in the past, have led to competitive constraints on +the EOS of symmetric nuclear matter, with future +measurements expected to shed more light on its +high-density behavior. Detailed constraints on the +isospin-dependence of the EOS can be obtained by +varying the isospin content of the target and pro- +jectile nuclei. +Here, the ability to use radioactive +isotopes, as in, e.g., intermediate-energy heavy-ion +collision experiments at RIKEN and FRIB, is cru- +cial to resolve the subtle effects arising from changes +in the isospin asymmetry of the colliding systems. +Above all, obtaining constraints on the +EOS from heavy-ion measurements would not +have been possible if not for advances in theory, and in particular for the collaborative +effort to test the robustness and quantify the uncertainties of hadronic transport sim- +ulations (see Section II A, “Transport model simulations of heavy-ion collisions”). At the same +time, much remains to be learned, as tight constraints on both the symmetric and asymmetric +EOS at higher densities have so far remained elusive. This is predominantly due to model uncer- +tainties, which themselves are rooted in the inherent complexity of nucleus-nucleus collisions and +the challenging task of describing all processes contributing to the final state observables. +B. +Connections to fundamental questions in nuclear physics +The wealth of data from efforts conducted in recent years not only helps to get a better grasp +on the nuclear matter EOS, but also has brought forward fascinating questions challenging our +understanding of strong interactions. +Following the successful BES-I campaign at RHIC, questions remain about the structure of the +QCD phase diagram at finite baryon densities, where the sign problem prevents obtaining predic- +tions with lattice QCD calculations. Surprisingly, the expected disappearance of the quark-gluon +plasma signatures has not been observed in BES-I, with some observables suggesting that the +QCD first-order phase transition may be located within the region probed by BES-II experiments, +including the region probed by the currently analyzed BES FXT data. If this is the case, then +constraining the EOS at lower densities and describing the approach to the transition from the +hadronic side, which would manifest as a softening of the EOS, will be crucial for a robust inter- +pretation BES-II measurements. Importantly, due to the largely out-of-equilibrium evolution of +collision systems probing that region of the QCD phase diagram, hadronic transport simulations +will play a dominant role in describing the dynamics of the collisions, and therefore in constraining +the EOS of nearly-symmetric dense nuclear matter. +Understanding the physics of neutron-rich matter across a range of densities is necessary not only +to explain the properties of rare neutron-rich isotopes and the structure of neutron stars, but also +to constrain microscopic interactions in isospin-asymmetric nuclear matter. At low densities, this + +10 +0.1 +− +0 +0.1 +0.2 +0.3 +0.4 +0.5 +0.6 +'=0 +y'y +d +/ +1 +v +d +(AuAu) Protons (10-30%) +HADES +=0.25-0.45) +0 +(AuAu) Protons (b +FOPI +(AuAu) Z=1 (b=2-5.5fm) +FOPI +(AuAu) Z=1 +Plastic Ball +(AuAu) Z=1 (b=2-5.5fm) +INDRA +(AuAu) Protons (12-25%) +E895 +(AuAu) Protons +E877 +� +(AuAu) h +E877 +(AuAu) Protons (10-40%) +Star FXT +(AuAu) Protons (10-25%) +Star FXT +(AuAu) Protons (10-40%) +Star BES +(PbPb) Protons (12.5-33.5%) +NA49 +(PbPb) Protons (15-35%) +NA61/SHINE +1 +− +10 +1 +10 +2 +10 +(GeV) +N +-2m +NN +s +0.1 +− +0.05 +− +0 +0.05 +0.1 +2 +v +out-of-plane +in-plane +(AuAu) Protons (10-30%) +HADES +(AuAu) Protons (15-29%) +FOPI +(AuAu) Z=1 (20-30%) +FOPI +(AuAu) Z=1 (b=5.5-7.5fm) +INDRA +(AuAu) Protons +EOS +(AuAu) Protons (12-25%) +E895 +(AuAu) Protons +E877 +� +(AuAu) h +E877 +(AuAu) Protons (10-40%) +Star FXT +(AuAu) Protons (0-30%) +Star FXT +(AuAu) Protons (10-40%) +Star BES +(10-20%) +� +(AuAu) h +Star BES +(0-60%) +� +(AuAu) h +Star +(0-60%) +� +(AuAu) h +PHOBOS +(PbPb) Protons (12.5-33.5%) +NA49 +(10-30%) +� +(PbPb) h +WA98 +� +(PbAu) h +CERES +FIG. 4. Compilation of the world data on the slope of +the directed flow at mid-rapidity (dv1/dy|y′=0, top) and +the elliptic flow (v2, bottom) as functions of the reduced +center-of-mass energy √sNN − 2mN for protons, Z = 1 +nuclei, and inclusive charged particles. Figure from [18]. +challenge is addressed by experimental and +theoretical analyses of nuclear structure ob- +servables. An important objective of nuclear +many-body theorists is to accurately calcu- +late these observables and reliably deduce +the EOS using microscopic interactions de- +rived within the framework of chiral effective +field theory (χEFT). Probing the symmetry +energy over a range of densities wider than +found in nuclei is possible through heavy-ion +collisions and neutron star studies. Often, +knowledge of the isospin-asymmetric EOS is +encoded in terms of constraints on the Tay- +lor expansion coefficients of the symmetry +energy around n0. Numerous analyses yield +consistent constraints on the first few expan- +sion coefficients (see, e.g., Fig. 2), although +they rely on an assumption that the expan- +sion remains accurate away from n0. The re- +cent advent of Bayesian inference techniques +allows one to pursue a different approach, +within which the isospin-asymmetric EOS is +described in terms of the dependence of the +pressure on baryon density (see, e.g., Fig. 3). +Moreover, Bayesian analyses can shed more +light on densities at which measurements +constrain the symmetry energy and quan- +tify the uncertainties of the extracted EOS. +As a result, combining diverse measurements +and using advanced analysis techniques can +lead to significantly tighter constraints, es- +pecially on the high-density behavior of the +symmetry energy (or, equivalently, on the +higher-order symmetry energy expansion co- +efficients), which is so far poorly known. +Constraints on the EOS of neutron-rich +matter at high densities have been dramat- +ically affected by discoveries of heavy neutron stars. Combined with the properties of all known +compact stars, these observations indicate that while the EOS of neutron-rich matter is relatively +soft around (1–2)n0, the pressure steeply rises with density for nB >∼ 2n0. In fact, multiple analyses +show that describing the known population of neutron stars is only possible for EOSs in which the +speed of sound in neutron-star matter breaks the conformal limit at high densities, that is exceeds +1/ +√ +3 of the speed of light c for nB >∼ 2n0. This striking behavior remains to be understood. In par- +ticular, it is currently not known whether the speed of sound exceeds c/ +√ +3 above certain densities +at all isospin fractions of nuclear matter or, alternatively, only in neutron-rich matter. Importantly, +robust constraints on the symmetric matter EOS at nB >∼ 2n0, obtained from heavy-ion collisions +at intermediate to high beam energies, would also put constraints on the isospin-dependent part of +the EOS through comparisons with the EOS inferred from neutron star studies, thus uncovering +the magnitude of isospin-related effects at high baryon density. + +11 +C. +Upcoming opportunities +The next decade will be an era of high-luminosity heavy-ion collision experiments at high baryon +density with modern detector and analysis procedures, as well as detailed studies of the symmetry +energy with collisions of proton- and neutron-rich isotopes. +Many of the discoveries of the BES program in ultra-relativistic heavy-ion collisions at RHIC, +e.g., the discovery of the triangular flow and elliptic flow fluctuations, illustrate that modern +analyses of heavy-ion collisions bring new quality to the understanding of the underlying processes. +Because of this, revisiting the intermediate to high beam energies, previously explored at the +AGS at BNL as well as at SIS18 at GSI and now explored by the STAR FXT program and +the HADES experiment, is imperative to enable putting tighter constraints on the EOS of dense +nuclear matter. Moreover, the future CBM experiment at the Facility for Antiproton and Ion +Research (FAIR), Germany, will be able to measure interaction rates exceeding those currently +used by several orders of magnitude, allowing for exploration of multiple high-statistics observables. +Furthermore, the explored beam energy range is where lower-order flow observables, reflecting the +collective motion of the colliding system due to the underlying hadronic EOS, are particularly +0.4 0.6 0.8 1.0 1.2 1.4 1.6 +1.8 +2.0150 +200 +250 +300 +350 +400 +450 +0.2 +0.3 +0.4 +0.5 +0.6 +Incompressibility (MeV) +dv1/dy'|y +'=0 +In-medium Xsection modification factor + free protons + free neutrons +Au+Au, Ebeam/A=1.23 GeV +b=6-9 fm +HADES data: 0.46+0.03 +−0.03 +0.4 0.6 0.8 1.0 1.2 1.4 +1.6 +1.8 +2.0150 +200 +250 +300 +350 +400 +450 +-0.08 +-0.06 +-0.04 +-0.02 +0.00 +Incompressibility (MeV) +v2 +In-medium Xsection modification factor + free protons + free neutrons +Au+Au, Ebeam/A=1.23 GeV +b=6-9 fm, |ycm|<0.05, pt>0.3 GeV/c +HADES data: -0.06+0.01 +−0.01 +FIG. 5. Predicted slope of the directed flow at mid- +rapidity (dv1/dy|y′=0, top) and elliptic flow (v2, bot- +tom) as functions of the incompressibility and the in- +medium nucleon-nucleon scattering cross section mod- +ification factor, generated in simulations of Au+Au +reactions using the isospin-dependent BUU (IBUU) +transport model [19, 20]. Figure from Ref. [21]. +prominent (see Fig. 4). +Therefore, the cor- +responding precision measurements carry with +them the opportunity to bring a richer perspec- +tive and a better understanding of the physics +underlying the complex dynamics of nuclear +matter at extreme conditions (see Section III A, +“Experiments to extract the EOS of symmetric +nuclear matter”). This advancement can only +occur provided a simultaneous development of +hadronic transport simulations, as only a de- +tailed understanding of various factors affect- +ing the dynamics of heavy-ion collisions can +lead to meaningful descriptions of the exper- +imental data, and, consequently, more robust +constraints on the EOS of nearly-symmetric +nuclear matter (see Section II A, “Transport +model simulations of heavy-ion collisions”). As +an example of the sensitivity of observables to +various details of the underlying physics, Fig. 5 +shows the dependence of the slope of the di- +rected flow (top panel) and of the elliptic flow +at midrapidity (bottom panel) on the stiffness +of the EOS, parametrized by the incompress- +ibility, and on the in-medium nucleon-nucleon +scattering cross-section modification factor. +Unprecedented possibilities are on the hori- +zon for studies of the isospin-dependence of the +EOS, which is critical for connecting heavy-ion +physics measurements to astrophysical obser- +vations. +The difficulties in using nuclei with +significant variations in the isospin asymme- +try, along with the paucity of neutron measure- +ments at midrapidity, have in the past greatly + +12 +restricted the capability to put tight constrains on the EOS of asymmetric nuclear matter. Fortu- +nately, at this time modern neutron detectors are available for heavy-ion measurements in many +facilities, including at accelerators performing collisions at high beam energies such as GSI, while +radioactive beam measurements are entering a new era at RIKEN and FRIB. FRIB will provide +proton- and neutron-rich beams of not only the highest-intensity worldwide, but also characterized +by the widest currently accessible range of the isospin asymmetry. Establishing a strong heavy-ion +program at FRIB will therefore enable previously inaccessible exploration of the symmetry en- +ergy (see Section III B, “Experiments to extract the symmetry energy”). Moreover, the proposed +FRIB400 beam energy upgrade would not only allow exploration of densities up to around 2n0, +but it would also provide increased resolution of the isospin-dependence of the EOS. In particular, +among observables sensitive to the symmetry energy, both charged pion yields and the absolute +magnitude of the elliptic flow (see Fig. 4) significantly increase between the current top FRIB +energy of 200 MeV/nucleon and the proposed 400 MeV/nucleon [22]. +The increase in available computing power and advances in statistical methods make it possible +to perform wide-ranging comparisons of heavy-ion collision simulations with experimental data +(e.g., using Bayesian analysis), allowing one to vary multiple model assumptions at the same +time as well as to put robust uncertainties on the obtained constraints. Furthermore, given the +wealth of the upcoming independent data, e.g., from heavy-ion collision experiments, neutron star +observations, and microscopic nuclear theory calculations, global analyses of complementary efforts +have likewise a strong potential for putting tight constraints on the EOS (see Section IV, “The +EOS from combined constraints”). +Beyond the much-needed interpretation of intermediate energy heavy-ion collisions, advances +in transport theory can lead to significant contributions to other areas of nuclear physics. +In +particular, recently attention has been given to cross-cutting opportunities for employing state- +of-the-art hadronic transport codes in studies supporting space exploration and advanced medical +treatments (see Section V A, “Applications of hadronic transport”). Transport theories may also be +used in tests of extensions of hydrodynamic approaches supporting far-from-equilibrium evolution +(see Section V B, “Hydrodynamics”), which are a focus of intense studies due to their importance +for modeling heavy-ion collisions at high energies. Finally, constraining the dense nuclear matter +EOS through interpretations of heavy-ion collision measurements may have other profound conse- +quences, including helping to answer fundamental questions about the possible existence of dark +matter in the cores of neutron stars or providing the impetus for studies of nuclear systems in +fractional dimensions (see Section VI, “Exploratory directions”). +D. +Needs +The next-generation experimental measurements of observables sensitive to the nuclear matter +EOS are imminent, and further progress in resolving the nuclear matter EOS is contingent on +enhanced theory support. In particular, the development of transport theories based on +microscopic hadronic degrees of freedom, which are the only means of interpreting +measurements from heavy-ion collision experiments at intermediate to high beam +energies, must be strengthened and expanded to fully realize the potential of the +U.S. facilities leading the exploration of the dense nuclear matter EOS. Support for +both individual scientists and collaborations, and in particular for viable career pathways for early +career researchers, is imperative to maintain the health of and diversify the U.S. hadronic transport +community, and to fully capitalize on the U.S. efforts exploring the dense nuclear matter EOS. + +13 +II. +THE EQUATION OF STATE FROM 0 TO 5n0 +Efforts to determine the equation of state (EOS) of nuclear matter are at the forefront of nuclear +physics. An EOS contains fundamental information about the properties of a many-body system +(see, e.g., Section I B), and is, in essence, any nontrivial relation between the thermodynamic +properties of a given type of matter. In nuclear physics, the form of the EOS that is most often +pursued is the relation between energy per baryon or pressure and baryon density nB, isospin +excess δ, and temperature T. For symmetric matter, the isospin excess vanishes (δ = 0), and +for asymmetric matter the energy per baryon or pressure are commonly partitioned into a part +corresponding to symmetric matter and the remainder, which contains all information about the +isospin-dependence of the EOS. Due to the charge invariance of strong interactions, the latter +part is (to a very good accuracy) quadratic in the isospin excess δ at densities relevant to nuclear +experiments and astrophysical observations. The quadratic coefficients in the expansion around +δ = 0 are independent of δ, and are often referred to as the symmetry energy (denoted as S(nB) +at T = 0) or symmetry pressure, respectively. These, together with the EOS of symmetric matter, +are then sufficient to describe the EOS of nuclear matter at any isospin asymmetry. +While many approaches to constraining the nuclear matter EOS are pursued, here we describe +three research areas which have the capability to constrain the EOS over wide ranges of density: +inferences of the EOS from comparisons of experimental measurements to model simulations of +heavy-ion collisions (Section II A), microscopic calculations of the EOS using chiral effective field +theory (Section II B), and EOS inferences from neutron star studies (Section II C). +A. +Transport model simulations of heavy-ion collisions +soft EOS +hard EOS +temperature [MeV] +0 +50 +100 +150 +200 +250 +300 +density nB/n0 +0 +2 +4 +6 +8 +12.8 AGeV + 6.4 AGeV + 3.2 AGeV + 1.6 AGeV + 0.8 AGeV + 0.4 AGeV + 0.2 AGeV +FIG. 6. Phase diagram trajectories of the central re- +gion in Au+Au collisions at zero impact parameter, +obtained from UrQMD simulations with a soft or a hard +(characterized by K0 = 200 or K0 = 380 MeV, respec- +tively) EOS [23, 24]. The trajectories follow the evolu- +tion at times when temperature is fairly well-defined, +from the moment of the highest compression to densi- +ties around 0.5n0. +Heavy-ion collisions at very low to interme- +diate beam energies provide the means to probe +nuclear matter at different densities (from sub- +saturation to several times the saturation den- +sity), temperatures (from a few MeV to well +above one hundred), and neutron to proton +ratios (from near symmetric nuclear matter, +where Nn/Np ≈ 1, up to Nn/Np ≈ 2); see Fig. 6 +for an illustrative calculation of heavy-ion col- +lision trajectories in the T-nB phase diagram +from simulations using two schematic EOSs. +These wide ranges of system properties ac- +cessed in heavy-ion collisions position them as a +perfect tool to extract the nuclear matter EOS, +test predictions and extrapolations from regions +of the QCD phase diagram accessed by other +approaches, and provide a necessary input to +nuclear theory and nuclear astrophysics calcu- +lations. For example, the density-dependence +of both the symmetric and asymmetric EOS +can shed light on modeling effective nuclear in- +teractions in the medium [15, 25–27] or con- +strain approaches using the density functional +theory [28–30]. + +14 +However, systems created in heavy-ion collisions are short-lived, and their dynamic evolution +is out of equilibrium over significant fractions of the total collision time. +The evolution of a +colliding system depends on the energy and centrality of the collision, and progresses through initial +compression, growth of the compression zone, development of flows, and overall decompression +with a gradual local equilibration during the process, see Fig. 7. +The inherent complexity of +the evolution means that the corresponding transport equations cannot be solved directly due to +their high non-linearity, and therefore detailed inferences from heavy-ion collision experiments, +where the non-equilibrium evolution probes nuclear matter over substantial ranges of density, +require comparisons to results of collision simulations in transport models. Beyond modeling the +dynamics of the collisions, transport models provide a connection to the equilibrium limit allowing +for inferring the EOS [31], transport coefficients [32], as well as the in-medium properties and +cross-sections of hadrons [33–35]. +1. +Transport theory +At its core, transport theory aims to describe the time evolution of the one-body phase-space +distribution function in a semi-classical approximation for a dissipative system composed of a large +number of particles, here in particular for a system of two heavy nuclei colliding at an energy per +nucleon which is typically larger than the Fermi energy. The theoretical foundations of transport +theory include the BBGKY hierarchy of coupled equations for reduced density matrices [36] as well +as the equations of the nonequilibrium Green’s function theory [37, 38] such as obtained in Martin- +Schwinger (also known as Schwinger-Keldysh) formalism for non-equilibrium Green’s function (see +also Section V B). +To arrive at transport equations, one employs (among others) a Wigner transformation and +coarse-graining as well as a gradient expansion. The Wigner transformation and coarse-graining +nB +FIG. 7. Contour plots of the system-frame baryon density nB (top row) and local excitation energy E∗/A +(bottom row) at times t = 0, 5, 10, 15, and 20 fm/c (columns from left to right), obtained from a transport +simulation [39] of a 124Sn+124Sn reaction at beam energy Elab = 800 AMeV (√sNN = 2.24 GeV) and impact +parameter b = 5 fm. The contour lines for the density use increments of 0.4n0, starting from 0.1n0, while +the contour lines for the local excitation energy correspond to the values of E∗/A = {5, 20, 40, 80, 120} MeV; +for statistical reasons, contour plots for the energy have been suppressed for baryon densities nB < 0.1n0. + +15 +-0.5 +0.0 +0.5 +0 +100 +200 +300 +dN/dy +y + (GeV/c) +132Sn+ +124Sn +-0.5 +0.0 +0.5 +-0.1 +0.0 +0.1 +y + IBUU + pBUU + RVUU + SMF + IQMD + IQMD-BNU + IQMD-IMP + TuQMD +-0.5 +0.0 +0.5 +0 +100 +200 +300 +dN/dy +y + (GeV/c) +132Sn+ +124Sn +-0.5 +0.0 +0.5 +-0.1 +0.0 +0.1 +y + IBUU + pBUU + RVUU + SMF + IQMD + IQMD-BNU + IQMD-IMP + TuQMD +-0.5 +0.0 +0.5 +0 +100 +200 +300 +dN/dy +y + (GeV/c) +132Sn+ +124Sn +-0.5 +0.0 +0.5 +-0.1 +0.0 +0.1 +y + IBUU + pBUU + RVUU + SMF + IQMD + IQMD-BNU + IQMD-IMP + TuQMD +-0.5 +0.0 +0.5 +0 +100 +200 +300 +dN/dy +y + (GeV/c) +132Sn+ +124Sn +-0.5 +0.0 +0.5 +-0.1 +0.0 +0.1 +y + IBUU + pBUU + RVUU + SMF + IQMD + IQMD-BNU + IQMD-IMP + TuQMD +-0.5 +0.0 +0.5 +0 +100 +200 +300 +dN/dy +y + (GeV/c) +132Sn+ +124Sn +-0.5 +0.0 +0.5 +-0.1 +0.0 +0.1 +y + IBUU + pBUU + RVUU + SMF + IQMD + IQMD-BNU + IQMD-IMP + TuQMD +FIG. 8. +Comparison of results for rapidity distri- +butions (top) and transverse flow of nucleons (bot- +tom) as functions of the scaled rapidity, obtained +with different transport codes (identified in the leg- +end) within the TMEP initiative. The results shown +were obtained for 132Sn+124Sn collisions at Elab = +270 AMeV (√sNN = 2.01 GeV) and impact param- +eter b = 4 fm, using controlled input models for the +EOS and the cross sections as well as identically ini- +tialized nuclei [40]. +lead to positive-definite phase-space distribu- +tions [41] that can be efficiently sampled with +Monte-Carlo techniques, while the gradient ex- +pansion yields, for each particle species, the force +acting on a particle and the particle’s veloc- +ity as gradients of its total energy with respect +to the spatial position and momentum, respec- +tively. Knowledge of the kinematics of all parti- +cles, together with the elementary collision rates, +drives the evolution in the phase space. Finally, +to arrive at a set of Vlasov-Boltzmann–like equa- +tions, one employs the quasi-particle approxima- +tion, neglecting details of the spectral functions +and treating all particles as on-shell (we note +here that while there are some transport codes +with off-shell particle treatment, e.g., [42, 43], +this approach is still an outstanding challenge in +the transport theory, as will be discussed further +below). Alternative approaches to arriving at a +transport theory for heavy-ion collisions include +using the relativistic Landau quasiparticle the- +ory [44] or, in approaches starting from a molec- +ular picture, representing the global wavefunc- +tion as a product (sometimes antisymmetrized) +of single-particle Gaussian wavepackets [45]. +The particle species considered in transport +theory depend on the collision energy and may +range from nucleons, through pions and the delta +resonances, to higher resonances, kaons, and hy- +perons. Some transport formulations further in- +corporate light clusters (e.g., deuterons, tritons, +and 3He nuclei) as independent degrees of free- +dom, with recent extensions also including alpha +particles [46] which appear abundantly in exper- +iments and are of particular importance for colli- +sions at fixed-target beam energies on the order +of hundreds of MeV/nucleon. In some of these approaches, clusters are produced through multi- +particle reactions, as discussed further below. +For the lowest energy collisions, nonrelativistic +formulations of the transport theory may be employed, but the majority of the available codes are +relativistic, with many addressing collisions at energies from tens of MeV/nucleon to at least a few +GeV/nucleon (see [35, 47, 48] for reviews). +Transport approaches can be generally divided into those concentrating on a single-particle +characterization of the colliding system and those attempting to describe many-particle correla- +tions. Both types of approaches are highly complex and nonlinear, and the relevant equations are +solved by simulations. The single-particle approaches typically solve a set of Boltzmann-Vlasov– +type equations [47, 49] (also known as the Boltzmann-Uehling-Uhlenbeck, or BUU equations) in +which the evolution of the system is governed by a mean-field evolution of the phase space distribu- +tion (Vlasov equations) and a collision term which drives the dissipation (the Boltzmann collision +term). While, in principle, the Boltzmann-Vlasov equation is deterministic, numerical solutions + +16 +contain numerically-induced fluctuations due to the fact that the evolution is obtained using the +method of test particles, in which the continuous distribution function is represented by a large, +but finite, number of test particles sampling the phase space. To include fluctuations of a physi- +cal origin, one can add a fluctuation term to the two-particle collision term, thus arriving at the +Boltzmann-Langevin formulation [35, 50]. +In contrast, quantum molecular dynamics (QMD) approaches include classical many-body cor- +relations in the ansatz of the many-body wave function [47, 51], which is postulated as a product of +single-particle wave packets of a fixed width, with the width regulating the amount of fluctuations +and correlations in QMD. In Anti-Symmetrized Molecular Dynamics (AMD) [45], the product wave +function is anti-symmetrized and the formulation includes Pauli correlations in the propagation as +well as in, to a certain extent, the collision term. +The fact that hadronic transport approaches are built on firm theoretical foundations has been +crucial for the continued development of simulation frameworks. Reaching back to the roots of +the nuclear transport theory has made it possible to resolve ambiguities which would be otherwise +hard to tackle by purely phenomenological means, including descriptions of cluster production [52], +low relative-velocity correlations (Hanbury–Brown-Twiss correlations) [53], and off-shell transport +[42, 49, 54, 55]. +The strong theoretical foundation of transport theory has also been effective +in ensuring covariance of the theory and preserving conservation laws in case of interactions that +stray beyond outcomes of field-theoretic models, in particular interactions employing energy density +functionals [44, 56–58] which are often needed for realistic descriptions of bulk properties of nuclear +matter. +An important effort to validate conclusions reached from comparing transport model results +to data has been recently intensified by the formation of the Transport Model Evaluation Project +(TMEP) [47]. Within this endeavor, predictions from different models are compared in controlled +settings (e.g., ensuring the same physical input such as the EOS, initial densities, and cross sec- +tions), oftentimes with comparisons to known results that can be achieved analytically or by other +methods. Similar controlled comparisons of complex simulations have been done in other fields +of physics: from atomic traps, through ultra-relativistic heavy-ion collisions, to core-collapse su- +pernova calculations [59–62], and they are known to be very fruitful for their respective fields. +The TMEP analyses not only enable identifying models that produce outlier predictions, but also +determine details of implementation or physical assumptions behind the diverging results. An ex- +ample of such a comparison of codes for simulations of heavy-ion collisions at lower energies, with +controlled input, can be seen in Fig. 8, showing results for rapidity distributions (left) and the +transverse flow (right) [40]. In general, the codes agree with each other reasonably well, however, +differences between the codes are visible and, moreover, can be traced to specific model choices +in the simulations. For example, the generally lower values of the transverse flow in the case of +QMD codes are a result of an approximation used in the evaluation of a non-linear term in the +mean-fields, which becomes relevant when density fluctuations become large, as often occurs in +QMD. Beyond identifying this and similar problems, the Project has yielded recommendations +for optimal algorithms used in transport codes, e.g., for ensuring obeying the Pauli principle in +elementary two-body collisions [63] or for integration of equations of motion with mean-fields [64]. +Moreover, the project has identified a set of tests for transport codes that ensure their credibility +when addressing different heavy-ion collision observables. Stringent tests of hadronic transport +codes are especially important for studies aimed at constraining the nuclear symmetry energy, +which, compared to other model parameters, has a comparatively weak effect on heavy-ion observ- +ables and which therefore demands maximal precision from transport simulations. Below, we will +also discuss the role that such comparisons can play in determining the uncertainty of transport +model investigations. + +17 +2. +Selected constraints on the EOS obtained from heavy-ion collisions +A selection of important constraints on the EOS obtained from heavy-ion collisions can be found +in Fig. 9 for both symmetric matter (pressure as a function of density, left panel) and asymmetric +matter (symmetry energy as a function of density, right panel). +We note here that while many results are reported in terms of constraints on the incompress- +ibility K0, in the context of heavy-ion collision studies of the EOS, K0 should be understood as +a parameter which specifies the behavior of the EOS in the range of densities probed by a given +study. For example, in the case of experiments probing mostly densities above 2n0, constraints on +K0 are only indicative of the behavior of the EOS above 2n0, and in particular do not constrain +the behavior of the EOS around n0. This subtle, and often confusing, point is a consequence of +simple parametrizations of the EOS used in many transport codes, where the only parameter con- +trolling the behavior of the EOS both around n0 and at higher densities is K0. Recently, flexible +parametrizations of the EOS have been developed (see, e.g., [57, 58]) and implemented (e.g., in +hadronic transport code SMASH [75, 76]) which allow one to vary the incompressibility K0 and the +high-density behavior of the EOS independently. +The collective behavior of matter created in the collisions, especially the directed and elliptic +flow, has been shown to be a very sensitive probe of the EOS [31, 67, 77–79]. +In contrast to +collisions at the Fermi energies, where all nucleons within nuclei participate in the collisions, and +unlike in collisions at ultrarelativistic energies, where the evolution of the colliding nuclei can be +understood in terms of participant nucleons, at intermediate energies the interplay between the +expanding collision zone and the dynamics of the spectators are key ingredients to understanding +Le Fèvre et al. +Lynch et al. from Fuchs et al. +Oliinychenko et al. +Danielewicz et al. +Walecka model +Fermi gas +pressure [MeV/fm3] +1 +10 +100 +baryon density nB/n0 +1 +2 +3 +4 +5 +HIC(isodiff) +HIC(n/p) +mass(Skyrme) +IAS +mass(DFT) +PREX II +HIC(π) +Tsang et al. +ASY-EOS +FOPI-LAND +symmetry energy S(nB) [MeV] +0 +20 +40 +60 +80 +baryon density nB/n0 +0 +0.5 +1 +1.5 +2 +FIG. 9. Left: Selected constraints on the symmetric EOS obtained from comparisons of experimental data to +hadronic transport simulations in [31] (region with black horizontal stripes), [65, 66] (region with red forward +stripes), [67] (region with blue backward stripes), and [58] (region with green vertical stripes); see text for +more details. Also shown are results of analytical calculations for the free Fermi gas (green dotted line) +and in the linear Walecka model (pink dashed line). Right: Selected constraints on the symmetry energy +obtained from comparisons of hadronic transport simulations to experimental data in [6] (region with purple +forward stripes), [68] (region with green backward stripes), [69] (the solid orange region), and [70] (the red +circle, square, and triangle symbols). Also shown are symmetry energy constraints obtained in [70] based on +a novel interpretation of analyses of nuclear masses in DFTs [11, 71] (cyan diamond symbol) and in Skyrme +models [72] (cyan star symbol), of Isobaric Analog States (IAS) energies [73] (magenta plus symbol), and of +PREX-II experiment [74] (blue inverted triangle symbol). + +18 +experimental results. +A seminal constraint on the symmetric nuclear matter EOS [31] in the +density range (2–4.5)n0 was obtained by comparing measurements of collective flow from heavy- +ion collisions [80–83] at beam energies Elab = 0.15–10 AGeV (corresponding to nucleon-nucleon +center-of-mass energies √sNN = 1.95–4.72 GeV) with results from hadronic transport simulations +using EOSs with different values of the incompressibility at saturation density K0. The outcome of +this study suggests a symmetric-matter EOS to lie between those labeled with K0 = 210 MeV and +K0 = 300 MeV (see the region with black horizontal stripes in the left panel of Fig. 9). For densities +in the range (1.0–2.5) n0, probed in collisions below Elab <∼ 1.5 AGeV (√sNN <∼ 2.5 GeV), the EOS +may be inferred from meson yields [84–86]. Indeed, subthreshold production of strange mesons +(specifically, K+ and K0), which interact weakly with nuclear matter, depends on the highest +densities sampled in the collision, which in turn depend on the stiffness of the EOS [87]. In [65], +ratios of experimentally measured kaon yields in Au+Au and C+C collisions have been reproduced +in hadronic transport simulations with soft mean-field interactions yielding K0 = 200 MeV and +an EOS [66] consistent with the constraint from [31] (see the region with red forward stripes +in the left panel of Fig. 9). +In [67], the elliptic flow data measured at Elab = 0.4–1.5 AGeV +(√sNN = 2.07–2.52 GeV) by the FOPI collaboration [88] were used together with simulations +from Isospin Quantum Molecular Dynamics (IQMD) [23, 89] to constrain the incompressibility at +K0 = 190 ± 30MeV, again indicating a rather soft EOS (see the region with blue backward stripes +in the left panel of Fig. 9). Recently, new measurements by the STAR collaboration from the fixed +target (FXT) program at RHIC have become available, providing an opportunity to expand the +set of world data utilized to deduce the baryonic EOS. A Bayesian analysis study [58], in which the +speed of sound was independently varied in specified intervals of baryon density (thus providing +a more flexible EOS at higher densities), suggests a tension between the E895 [83, 90–92] and +STAR [93, 94] data. Using only the STAR measurements, the study [58] further found that EOSs +which simultaneously describe the slope of the directed flow and the elliptic flow, in the considered +energy range of Elab = 2.9–9 AGeV (√sNN = 3.0–4.5 GeV), are relatively stiff at lower densities +and relatively soft at higher densities (see the region with green vertical stripes in the left panel of +Fig. 9). However, the model used in that work did not include the momentum dependence of the +EOS, which likely results in a spuriously stiff EOS at intermediate densities. As such, the study +should be treated as a proof of principle that a tight constraint on the EOS at high densities can +be achieved by using a combination of precise data, flexible forms of the EOS used in simulations, +state-of-the-art models, and advances in analysis techniques. +The symmetry energy contribution to the EOS can be studied at low collision energies Elab <∼ +1.0 AGeV (√sNN <∼ 2.32 GeV), where in particular observables such as charged pion yields [95] or +neutron and proton flow [96, 97] have been proposed as sensitive to the asymmetric contribution +to the EOS. Some of the constraints derived from such studies are shown in the right panel of +Fig. 9, where, in addition to the usual EOS constraint bands, symbols with uncertainty bars +represent results from analyses in which the symmetry energy has been determined for the most +sensitive density of a given measurement. At incident energies below Elab = 100 AMeV (√sNN = +1.93 GeV), low densities are probed after the initial impact and compression of the projectile and +target [6, 98]. Since the symmetry potentials for neutrons and protons have opposite signs, emission +of a particular nucleon type is enhanced or suppressed depending on the asymmetry. A comparison +of the experimental measurements of isospin diffusion and the ratio of neutron and proton spectra in +collisions of 112Sn+124Sn at Elab = 50 AMeV (√sNN = 1.90 GeV) to results from ImQMD simulations +produced a constraint on the symmetry energy for densities (0.3–1) n0 [6] (see the region with purple +forward stripes in the right panel of Fig. 9). Collisions at higher energies (Elab > 200 AMeV, or +√sNN > 1.97 GeV) probe the EOS at n > n0. In the FOPI-LAND experiment, constraints on +the symmetry energy were obtained from studies of the ratio of the elliptic flow of neutrons and +hydrogen nuclei in Au+Au collisions at Elab = 0.4 AGeV (√sNN = 2.07GeV) [68], while the ASY- + +19 +EOS experiment used neutron to charged fragments ratios measured in Au+Au collisions [69] (see +the region with green backward stripes and the solid orange region, respectively, in the right panel +of Fig. 9). In [70], a comprehensive analysis was performed with the goal of identifying the values of +the symmetry energy at densities to which given experiments are most sensitive. Using the isospin +diffusion in collision systems with different proton to neutron ratios [99], neutron to proton energy +spectra in Sn+Sn systems [100], and spectral pion ratios measured by the SπRIT collaboration in +Sn+Sn collisions at Elab = 270 AMeV (√sNN = 2.01 GeV) [101, 102], that work [70] put constraints +on the values of the symmetry energy at about 0.2n0, 0.4n0, and 1.5n0, respectively (see the red +circle, square, and triangle symbols in the right panel of Fig. 9). Also shown in the right panel +of Fig. 9 are symmetry energy constraints obtained in [70] based on a novel interpretation of the +analyses of nuclear masses in DFTs [11, 71] (cyan diamond symbol) and in Skyrme models [72] +(cyan star symbol), of the Isobaric Analog State (IAS) energies [73] (magenta plus symbol), and +of the PREX-II experiment result [74] (blue inverted triangle symbol). +3. +Challenges and opportunities +Selected results presented in Fig. 9 showcase significant achievements in determining the EOS +and, simultaneously, the need to develop improved transport models to obtain tighter and more +reliable constraints. Answering this need will require support for a sustained collaborative effort +within the community to address remaining challenges in modeling collisions, in particular in the +intermediate energy range (Elab ≈ 0.1–25 AGeV, or √sNN ≈ 1.9–7.1 GeV). In the following, we +will address selected areas where we see the need for such developments: (1) comprehensive treat- +ment of both mean-field potentials and the collision term in transport codes, (2) use of microscopic +information on mean fields and in-medium cross sections, such as discussed in Section II B, in trans- +port, (3) better description of the initial state of heavy-ion collisions in hadronic transport codes, +(4) deeper understanding of fluctuations in transport approaches, which affect many aspects of +simulations, (5) inclusion of correlations beyond the mean field into transport, which is crucial for +a realistic description of light-cluster production, (6) treatment of short-range-correlations (SRCs) +in transport, which are tightly connected to multi-particle collisions as well as off-shell transport, +(7) sub-threshold particle production, (8) the study of new observables, e.g., azimuthally resolved +spectra, to obtain tighter constraints on the EOS, (9) the question of quantifying the uncertainty of +results obtained in transport simulations, and (10) the use of emulators and flexible parametriza- +tions for wide-ranging explorations of all possible EOSs. Fortunately, advances in transport theory +as well as the greater availability of high-performance computing make many of these improvements +possible. Support for these developments will lead to a firm control and greater understanding of +multiple complex aspects of the collision dynamics, allowing comparisons of transport model cal- +culations and heavy-ion experiment measurements to provide an important contribution to the +determination of the EOS of dense nuclear matter, which, in particular, cannot be determined by +any other method at intermediate densities (1–5)n0. +Comprehensive treatment of mean-field potentials and the collision term +Notably, driven by specific experimental needs over the last two decades, the refinement of +hadronic transport codes has diverged into two complementary branches: Codes which were ap- +plied to describing experiments at very low to low energies (Elab <∼ 1.5 AGeV, or √sNN <∼ 2.5 GeV), +such as IQMD, AMD and pBUU, have become progressively better at describing the momentum- and +isospin-dependence of the interaction, while codes which were primarily used as afterburners for +simulations of ultra-relativistic heavy-ion collisions (Elab >∼ 25 AGeV, or √sNN >∼ 7 GeV), such +as SMASH [75] or UrQMD, were developed to offer a fully relativistic evolution as well as scattering + +20 +and decay modes taking into account all established particle and resonance species. As heavy-ion +collisions are entering an era of precision data on symmetric nuclear matter at higher densities +(e.g., in experiments at HADES, BES FXT, and future CBM) and on asymmetric nuclear mat- +ter at normal and supranormal densities (e.g., at FRIB and future FRIB400), where features of +both diverging branches of hadronic transport codes are important, a vigorous development of +transport models is needed. In particular, numerous studies show the importance of including +the momentum-dependence of the interactions, which is observed in elastic scattering of hadrons +off nuclei. +Moreover, momentum-dependence naturally occurs in microscopic effective interac- +tions [38, 103] where it contributes to the calculated mean fields, whether near or away from sat- +uration density. Incorporating single-particle energies with momentum dependence different than +that in free space, which is often quantified with effective masses, is crucial in hadronic transport +both for studies of symmetric nuclear matter [31, 79, 104, 105] as well as studies of the symmetry +energy and its relation to effects such as the neutron-proton effective mass splitting [106–108] (see +also Section VI E for more discussion on effective masses and the nuclear symmetry energy). Some +of the theoretical and implementation solutions have already been established, while others will +require devising new approaches. When possible, the best practices need to be carried over across +the domains, as has been exemplified in, e.g., the development of the SMASH code, which uses many +implementation solutions from pBUU. +Microscopic input to transport +One of the most prominent opportunities for improvement in transport models concerns imple- +mentations of the EOS informed by state-of-the-art many-body studies. Such efforts are especially +timely given that sophisticated microscopic calculations of the properties of nuclear matter are +currently becoming available for large ranges of baryon density, temperature, and isospin fraction +(see Section II B for more details). To incorporate the effects of the resulting EOSs in hadronic +transport calculations, the corresponding Lorentz-covariant single-particle potentials as well as the +in-medium interactions (both as functions of density, asymmetry, and momentum) are needed. A +particular challenge is to determine the connection between the EOS inferred from a transport +calculation and the zero-temperature EOS obtained from microscopic calculations [109], or even +the finite-temperature EOSs that are becoming increasingly available [110, 111]. In a heavy-ion +collision, the medium progresses through a set of non-equilibrium states that relax toward a local +equilibrium, however, the nature of the local equilibrium also evolves during the collision due to the +system expansion, so that even if the system approaches a local equilibrium at any given moment +of the evolution, that agreement is only temporary. Errors incurred due to differences between +non-equilibrium and equilibrium states of high-density matter contribute to the systematic error in +inferring the EOS when comparing transport to experimental data (see Fig. 9 and [31]). Here, the +availability of state-of-the-art microscopic calculations at finite temperature could reduce system- +atic errors in connecting the finite- and zero-temperature EOSs. Moreover, the use of microscopic +input would provide a consistency between the effective in-medium cross sections in the collision +term and the mean fields used in the propagation of the phase space distribution. It could also +help address the question of the extent to which nonlocalities in the microscopic theory should +be reflected in the propagation and the collision term [112, 113] (where, in particular, departures +from standard approaches modify the entropy to take a form different than that obtained in the +Landau quasiparticle theory [44, 114]). To accelerate progress at the interface of the transport +description of heavy-ion collisions and microscopic nuclear matter theory, direct collaboration of +practitioners in the two research areas is required to assess how the needs of transport simulations +can be answered by what can be currently calculated in microscopic theories. Conversely, the use +of microscopic interactions in transport could validate the many-body theory results in regions of +density and temperature which are only accessible by heavy-ion collisions [115]. + +21 +Initial state +Numerous studies point toward the dependence of outcomes of heavy-ion collision experiments +on details of the initial conditions. In ultrarelativistic heavy-ion collisions, understanding these +effects have led to the discovery of higher order flow harmonics [116, 117] and flow fluctuations [118]. +(Interestingly, the importance of the initial state for experimental outcomes also positions heavy-ion +collisions at high energies as an unusual, but complementary probe of nuclear structure, see, e.g., a +white paper on Imaging the initial condition of heavy-ion collisions and nuclear structure across the +nuclide chart [119].) Given the high sensitivity of flow observables to both the EOS and the initial +state of collisions, the impact of the initial conditions on outcomes of heavy-ion collisions needs to +be thoroughly understood in order to narrow the constraints on the EOS of both symmetric and +asymmetric matter. Aspects of initial conditions that need to be considered include event-by-event +fluctuations of the initial state [116–118], relative distributions of neutrons and protons and shell +effects [120], and correlations tied to deformation [121] or short-range correlations [122]. Some of +these elements will be further discussed below in the context of the dynamics of heavy-ion collisions. +Fluctuations +Fluctuations of the phase space distribution are an important ingredient of transport simula- +tions. In particular, fluctuations of the one-body density are important for including the conse- +quences of the dissipation-fluctuation theorem in the reaction dynamics as well as for describing +effects due to the largely unknown, neglected many-body correlations, thus going beyond the mean- +field description. The question of how to include them properly and of their consistency with the +nucleon-nucleon correlations explicitly implemented in transport theories, however, has not been +completely clarified. As discussed above, fluctuations are included in a different manner in the two +families of transport approaches. While in the BUU transport fluctuations can be introduced by +the Langevin extension of the Boltzmann-Vlasov equation, which adds a fluctuation term to the +collision term (and which is still rarely implemented), in the molecular dynamics approach fluctu- +ations are introduced in a classical way by using finite-size particles, the width of which regulates +the amount of fluctuations. Fluctuations then affect the outcome of simulations in many ways, in- +cluding by regulating the formation of intermediate-mass fragments (IMFs) which appear through +the growth of fluctuations in regions of spinodal instability. It was also shown in box calculations +that fluctuations have a strong influence on the efficiency of Pauli-blocking [63] and even on the +calculation of the force in the Vlasov term for QMD codes in which non-linear parametrizations of +the fields are used [64]. +Correlations +Correlations in transport simulations strive to address intermediate-range correlations beyond +the mean-field picture. Physically, such correlations are also a source of fluctuations, but at the +same time have other additional impacts, including, e.g., influencing the production of light clusters +(LCs), that is light nuclei up to the alpha particle which are copiously produced in heavy-ion +collisions. The mean-field models used in transport calculations are usually not detailed enough to +realistically describe very light nuclei with their particular spin-isospin structure reflecting strong +quantum effects. An additional complication results from the fact that in a collision, clusters often +appear in the nuclear medium where their properties are drastically changed (e.g., the binding +energy of clusters is reduced with increasing density until the Mott point, at which they dissolve). +Currently, most codes describe the production of clusters by using a cluster-finding algorithm, +based on particle proximity in coordinate and/or momentum space (coalescence) toward the end +of the evolution, which in more advanced versions also takes into account criteria related to the +binding energy of the produced clusters [123]. However, these late-stage algorithms do not take into +account the dynamic role played by both correlations and LCs in the evolution of the collision. One + +22 +of the known approaches to this problem has been to consider LCs as separate degrees of freedom, +with their own distribution functions and corresponding transport equations, where the collision +terms can lead to creation or destruction of clusters (pBUU, SMASH) and which in particular can +also take into account the in-medium modifications of clusters. However, this approach becomes +increasingly complex as heavier clusters are characterized by more and more production channels, +and consequently it is significantly challenging to include, e.g., alpha particles. Another approach +is to modify the phase space of the correlated nucleons according to the Wigner function of the +cluster, but then to propagate them after the collision again as nucleons (as is done in, e.g., AMD +[41]), which still requires using a cluster-finding step at the end. In both cases, the production and +destruction of clusters necessarily requires multi-particle collisions to ensure energy-momentum +conservation. Finally, at lower incident energies the LC production can also be described in terms +of the catalyzing effect of spectator nucleons in few-particle collisions [46, 124]. To explain LC +production in high-energy collisions, where LCs are produced in numbers that cannot be obtained +through nucleon catalysis due to the relatively few nucleons present in the final stages of these +collisions, a similar mechanism of catalysis by pions [52, 125, 126] can be invoked. +Short-range correlations +A particular aspect of describing correlations in transport simulations is the treatment of short- +range-correlations (SRCs), which have been measured in nucleon knock-out experiments [127–130]. +Along with the experiments, microscopic many-body calculations show that SRCs introduce a +high-momentum tail (HMT) into the nucleon momentum distribution and, moreover, reduce the +kinetic symmetry energy relative to the Fermi gas kinetic energy, which is a consequence of the fact +that SRCs are more pronounced in symmetric relative to asymmetric matter [131–138] (see also +Section VI C). Phenomenological methods have been used to include SRCs in transport models, +e.g., by initializing nuclei with a HMT, but such a procedure does not take into account the dynamic +role of SRCs in the initial state, which in the case of the on-shell semiclassical equations of motion +results in obtaining nonstationary, excited states of nuclei. In on-shell transport approaches, three- +and many-body collisions, incorporated into transport codes within varying approximations, have +been suggested as a way of treating SRCs. In particular, in an investigation [139] of three-body +collisions for pion production processes (e.g., NNN → NN∆), it was found that SRCs between +two of the incident nucleons give a noticeable contribution to pion yields. Another approach [140], +based on a mean-free-path approximation to the collision integral, observed large effects also on +bulk observables. The incorporation of n-body collisions in transport equations within a schematic +cluster approximation was also studied [141], however, there the effects were found to be rather +small. +So far, none of these methods have been widely exploited in the description of heavy- +ion reactions. +Since HMTs are tied to the tails of the nucleon spectral functions (away from +the quasiparticle peaks), a consistent description of SRCs should involve an off-shell transport +formulation. Dynamical spectral functions of all considered particles, including those which are +stable in free space like nucleons, have been accounted for in the off-shell transport approaches +implemented, with some differences in detail, in the codes GiBUU [42] and PHSD [43]. A subsequent +study [142] demonstrated that the momentum distribution automatically develops a HMT within +the approach used in GiBUU. Differences in the results from the two approaches have yet to be +investigated systematically, including the impact on symmetry energy inferences from heavy-ion +collision data based on, e.g., charged pion subthreshold production yields. Fully quantum transport +approaches with SRCs (or equivalent content), without any semi-classical expansions as are present +in current off-shell transport approaches, remain a long-term goal, and progress in this area has +not ventured yet beyond schematic models [143, 144]. However, increasing computational power +combined with emulation techniques may make such efforts more realistic and enable, e.g., a +seamless integration of the treatment of shell effects in the initial state and collision dynamics. + +23 +Threshold effects +An important influence of mean-field potentials in heavy-ion transport appears in the form +of threshold shifts and the related subthreshold production of particles. Thresholds of particle +production are modified in a medium since the mean-field potentials have to be taken into account in +the energy-momentum balance of a two-body collision. Specifically, when the mean-field potentials +are momentum-dependent and/or as a consequence of other model assumptions for the mean-field +potentials of the produced particles, the thresholds are shifted away from their free-space values. +This may strongly change the production rates of particles. Moreover, the threshold shifts make +it necessary to involve other nucleons, besides the two collision partners in the process, to ensure +the energy-momentum conservation. Various schemes to achieve this locally or globally have been +in use [115, 145]. Indeed, explaining recent heavy-ion collision subthreshold pion yields, measured +by the SπRIT Collaboration [102], required invoking many-body elementary effects in the form of +mean-field effects on thresholds in two-particle collisions [86, 101]. However, because the physics +invoked in describing the threshold effects is similar to that invoked for other multi-particle effects, +alternative multi-particle options remain to be investigated, including producing pion degrees of +freedom in multi-particle collisions or in the aftermath of an off-shell propagation between binary +collisions. (We note here that there is a physics overlap between these mechanisms and the impact +of SRCs on pion production [42, 122, 139].) Notably, theoretical explorations find sequences of +on-shell binary processes to dominate the production at higher beam energies [43, 55, 139], and +no comparable difficulties have been encountered in describing the data [146, 147] by transport +models without multi-particle effects. +The contrasting struggles of transport models which do +not include threshold or other multi-particle effects of this type [102] , together with expected +further theoretical explorations and future measurements of the subthreshold production in heavy- +ion collisions, offer exciting possibilities for gaining understanding of the more exotic in-medium +processes. +New observables +Upcoming precision data will further bring unprecedented observables that could be previously +considered only in theory, such as triple-differential spectra tied to a fixed orientation of the reaction +plane [18, 148–150] not only for protons and most abundant mesons, but also for deuterons,tritons, +light nuclei, and hypernuclei. The potential of such spectra for the determination of the EOS +is still to be fully explored, but a preliminary investigation [149] indicates a rich structure with +spectra which exhibit a maximum away from the beam direction, characterized by slopes dependent +on azimuthal angle and slope discontinuities. Models that might have agreed with each other in +describing low-order Fourier coefficients of flow will likely find describing such detailed observables +difficult. Challenges remain even at the level of the low-order coefficients, as many models now +reproduce proton flow, but not Lambda or pion flow (see, e.g., Fig. 14). Understanding the relations +between observables for various particle species will lead to constraints on the physics driving +the evolution of heavy-ion collisions in simulations and, through that, to understanding cluster +formation, hyperon yields, in-medium interactions with of strange hadrons, and more (see also the +white paper on QCD Phase Structure and Interactions at High Baryon Density: Continuation of +BES Physics Program with CBM at FAIR [151]). +Quantifying uncertainties of transport predictions +In the era of multi-messenger physics, where information on the EOS is derived from different +areas of physics such as nuclear structure, nuclear reactions, and astrophysics, the ability to assess +the uncertainty of a particular result is of crucial importance. This problem is especially relevant for +evaluations of constraints on the EOS from transport simulations of heavy-ion reactions, since it has +been found that using different transport models to describe the same data can lead to very different + +24 +conclusions. As found in the TMEP comparisons (see [47] for a review), even with controlled input +the results from different models may vary considerably due to different implementation strategies +which in themselves are not dictated by the underlying physics. In such a situation, calculating +the mean and variance of different model predictions is not a reliable way of determining the +uncertainties. An approach currently considered for ensuring a robust quality control in combining +inferences from different models is to weigh the models with a Bayesian weight which could be +based, e.g., on the performance of a given model in benchmark tests and/or its ability to reproduce +all key observables of a given reaction (for example, flow observables, particle multiplicities, and +spectra). Bayesian analysis can be also used for model selection through a comparison of results +from a list of available models with data, during which one assigns to each model a probability +of being correct based on the quality of the fit. However, this approach implicitly assumes that +among the considered models there is at least one “true” model (also known as the M-closed +assumption), which is often not fulfilled. Efforts have been taken to analyze data with an M-open +assumption, where the existence of a perfect model is not assumed. For nuclear physics efforts, +this is being attempted within the Bayesian Analysis of Nuclear Dynamics (BAND) group [152] by +using Bayesian model mixing, where information from different models is combined for inference. +Emulators and flexible EOS parametrizations +Robust explorations of the possible physics underlying various observables often necessitate +repeating the calculations many times for different combinations of physics parameters. When high +event statistics is needed, the computational task can easily overwhelm the available computational +resources. +An additional computational strain often arises from assessing Bayesian probability +distributions for any conclusions. Increasingly, emulators are going to be used for this task, with +some steps having been already made [58, 102, 153]. Notably, similar issues emerge in the area of +applications of hadronic transport [154] (see also Section V A). +For explorations focused on the EOS, it may be of advantage to fit various possible EOSs with +flexible relativistic density functionals as suggested in [57, 76]. This approach, given the complete +freedom in varying both the functional form of the EOS as well as the EOS parameters, is particu- +larly amenable to Bayesian analyses (see, e.g., [58] for a Bayesian analysis with a parametrization +of the EOS in terms of the functional dependence of the speed of sound on density). +The above list of issues facing the application of transport theory to heavy-ion collisions high- +lights the fact that this approach to putting tighter constraints on the EOS rests on overcoming +certain challenges. In simple terms, one attempts here to use a very dynamic and complex non- +equilibrium process to obtain information describing a relatively simple and well-defined system, +namely the equilibrated EOS of nuclear matter for different densities, temperatures, and isospin +asymmetries. To achieve this in a reliable way, multiple complex issues of many-body physics have +to be well controlled. On the other hand, several of the needed improvements are relatively well- +understood, and tackling some of the unresolved problems poses an exciting intellectual challenge. +As a reward for undertaking this effort, one gains the opportunity to obtain information on the EOS +in a region which cannot be accessed through any other means: For densities below saturation, +there is strongly constraining information from nuclear structure, with significant contributions +coming also from low-energy heavy-ion collisions. Astrophysical observations on neutron stars and +neutron star mergers are mainly sensitive to densities above about 3n0. The gap between these +domains can only be filled with intermediate energy heavy-ion collisions, and transport studies are +the essential tool to extract the information on the EOS from experimental data. + +25 +B. +Microscopic calculations of the EOS +Over the past decade, many-body nuclear theory has made significant progress in deriving +microscopic constraints on the nuclear EOS at low densities from chiral effective field theory +(χEFT) [155–158]. The progress has been driven by improved two-nucleon (NN) and three-nucleon +(3N) interactions, rigorous uncertainty quantification, and algorithmic and computational advances +in the frameworks used to solve the many-body Schr¨odinger equation with these interactions (see +also the recent white paper on Dense matter theory for heavy-ion collisions and neutron stars [159]). +1. +Status +Chiral EFT [160–164] provides a systematic way to construct nuclear interactions consistent with +the low-energy symmetries of QCD, using nucleons (N’s), pions (π’s), and (in the case of delta-full +χEFT), ∆-resonances (∆’s) as the relevant effective degrees of freedoms. Nuclear interactions in +χEFT are expanded in powers of momenta or the pion mass over a hard scale at which χEFT breaks +down; this breakdown scale is expected to be of the order of the ρ-meson mass, Λb ≈ 600 MeV. +At each order in the EFT expansion, only a finite number of diagrams enter the description of the +interaction according to a chosen power counting scheme, of which the Weinberg power counting +has been predominant. +For example, at the leading-order (LO) in Weinberg’s power counting +one includes contribution from the one-π exchange between two nucleons as well as momentum- +independent contact interactions, which allow one to describe key features of the nuclear interaction +already at the lowest order. At next-to-leading-order (NLO), two-π exchanges are included as well +as momentum-dependent contact interactions, and similarly, more involved terms appear at higher +orders. The various low-energy coupling constants are determined from fits to experimental data, +e.g., the π-N couplings are fit to π-N scattering, while those describing NN short-range interactions +are fit to NN scattering data. The advantage of χEFT over phenomenological approaches is that +multi-nucleon interactions, such as the important 3N interactions, naturally emerge in the EFT +expansion and, moreover, are consistent with the NN sector. Forces involving increasingly more +nucleons are correspondingly more suppressed, e.g., the leading contribution to 3N forces (four- +nucleon (4N) forces) appears at N2LO (at N3LO) in Weinberg’s power counting. Furthermore, there +are only two new low-energy couplings appearing in the three- and four-body forces to N3LO, which +govern the strengths of the intermediate- and short-range contribution to the leading 3N forces, +respectively. Consequently, χEFT 3N and 4N interactions at N3LO are completely determined by +constraints on the coupling constants obtained from NN and π-N scattering”, usually resulting in +tight constraints on very neutron-rich matter from χEFT. +Another key feature of χEFT is that order-by-order calculations in the χEFT expansion have +enabled estimation of theoretical uncertainties due to truncating the chiral expansion at a fi- +nite order [13, 158, 165, 166]. Quantifying and propagating these EFT truncation errors enables +meaningful comparisons between competing nuclear theory predictions, see Fig. 10, and/or con- +straints from nuclear experiments and neutron-star observations in the multi-messenger astron- +omy era [167]. Such comparisons are facilitated by Bayesian methods in a statistically rigorous +way [158, 167, 168] to take full advantage of the great variety of empirical EOS constraints we +anticipate in the next decade. +Chiral EFT also provides nuclear Hamiltonians governing the interactions in nuclear systems. +However, to calculate properties of a many-body system, computational methods able to solve the +Schroedinger equation for this system are necessary. Among various frameworks used to solve the +nuclear many-body problem in dense matter, quantum Monte Carlo (QMC) methods and many- +body perturbation theory (MBPT) have been the main tools employed to study the physics of + +26 +FIG. 10. Comparison of the energy per particle E/N (left) and the pressure P (right) as functions of density +for pure neutron matter in different many-body calculations using interactions from χEFT. The left panel +also shows low-density QMC results of Ref. [169] and the conjectured unitary-gas lower bound on the energy +per particle of pure neutron matter from Ref. [16]. Figure from Ref. [170]. +neutron-star matter in recent years. Both methods have recently made tremendous advances in +predicting properties of nuclei and calculating the nuclear matter EOS [156, 158, 171–175]. +QMC frameworks, such as the auxiliary field Diffusion Monte Carlo (AFDMC) method, are +based on imaginary-time propagation of a many-body wave function and enable us to extract +ground-state properties of a nuclear many-body system with high statistical precision [156, 171]. +Their nonperturbative nature also allows for the treatment of nuclear interactions at high mo- +mentum cutoffs, providing important insights into nuclear interactions at relatively short distances +that may help to improve the modelling of χEFT interactions. QMC calculations of binding en- +ergies, radii, and electroweak transitions of nuclei up to A = 16 [176–182] using χEFT NN and +3N interactions are in very good agreement with experimental data [183–186]. +QMC methods +were also used to calculate the EOSs of matter up to about twice the nuclear saturation density +n ≈ 2 n0 [187–191]. The calculated EOSs include estimates of systematic truncation uncertainties, +and are commonly used to constrain properties of neutron stars [188, 192, 193]. +The past decade has also seen a renaissance for many-body perturbation theory (MBPT) calcu- +lations in nuclear physics [158, 175]. Key to this development has been the discovery that nuclear +potentials with momentum-space cutoffs in the range 400 MeV <∼ Λ <∼ 500 MeV (not to be confused +with the breakdown scale of χEFT, Λb) are sufficiently soft to justify the use of perturbation theory +methods [194] (see [195] for a Weinberg eigenvalue analysis). Such low-momentum potentials can +be obtained from renormalization group methods [196] or by directly constructing chiral effective +field theory potentials at a coarse resolution scale. Furthermore, recent advances in automatic +diagram generation [197] combined with automatic code generation [198] and high-performance +computing have led to a fully automated approach to MBPT calculations in nuclear physics [158], +in which chiral two- and multi-nucleon forces can be included to high orders in the chiral and +MBPT expansions. MBPT has been demonstrated to be a computationally efficient and versatile +tool for studying the nuclear EOS as a function of baryon number density nB, isospin asymmetry +δ = (nn −np)/(nn +np), and temperature T [110, 111, 199, 200] with implications for neutron star +structure [158] and astrophysical simulations [201]; here, nn and np correspond to the neutron and + +25 +5 +Hebeler et al.,ApJ (2013) +Hebeler et al.,ApJ(2013) +Tews et al.,PRL(2013) +Tewsetal.,PRL(2013) +Lynn et al.,PRL (2016) +Lynn et al., PRL (2016) +20 +4 +Drischler et al.,PRL (2019) +Drischler et al.,PRL (2019) +Drischler et al.,GP-B (2020) +Drischler et al.,GP-B (2020) +Gezerlis, Carlson, PRC (2010) +Unitary gas (s = 0.376) +3 +fm +[MeV +10 +P2 +5 +1 +0 +0. +0 +0.05 +0.1 +0.15 +0.2 +0 +0.05 +0.1 +0.15 +0.2 +n [fm-3] +n [fm-3]27 +proton densities, respectively. In particular, MBPT allows us to compute the EOS of neutron-star +(i.e., β-equilibrated) matter explicitly, which can help improve isospin asymmetry expansions of +the low-density nuclear EOS such as the standard quadratic expansion [199, 202–206]. MBPT also +allows us to study nuclear properties other than the nuclear EOS, including the linear response +and transport coefficients that could be used to inform more accurate numerical simulations of +supernovae and neutron-star mergers [207]. Furthermore, MBPT for (infinite) nuclear matter has +been used to construct a microscopic global optical potential with quantified uncertainties based +on χEFT NN and 3N interactions [208, 209]. +Altogether, MBPT calculations of nuclear matter +properties can provide important constraints that enable microscopic interpretations of future nu- +clear reaction experiments [210] (e.g., at the Facility for Rare Isotope Beams) and neutron star +observations. +To date, theoretical predictions for the nuclear EOS, optical potentials, and in-medium NN +scattering cross sections have been computed at finite temperature at various levels of approxi- +mation starting from fundamental two- and multi-nucleon forces. These quantities are inputs to +transport model simulations [89, 211] of heavy-ion collisions used to extract constraints on the +properties of hot and dense nuclear matter (see Section II A for more details). In transport simu- +lations, the EOS, single-particle potentials, and in-medium NN cross sections are usually obtained +from effective phenomenological interactions [212, 213] that are fitted to the properties of finite +nuclei and cold nuclear matter, and then extrapolated into the finite-temperature regime. Recently, +some effort has been devoted to benchmarking [109] the temperature dependence of these effective +interactions against predictions from χEFT or directly using EFT constraints in fitting effective +interactions [207, 214, 215]. To enable such comparisons, the free energy of homogeneous nuclear +matter as a function of temperature, baryon number density, and isospin asymmetry has been cal- +culated using χEFT interactions up to second order in many-body perturbation theory [110] and +within the Self-Consistent Green’s Function (SCGF) approach [216], which resums particle-particle +and hole-hole ladder diagrams to all orders. The resulting EOS has been shown to be consistent +with the critical endpoint of the symmetric nuclear matter liquid-gas phase transition [110, 216] as +well as the low-density/high-temperature pure neutron matter EOS from the virial expansion [204]. +Furthermore, single-particle potentials have been computed at finite temperature at the Hartree- +Fock level [217], from G-matrix effective interactions [218], and in SCGF theory [201, 219]. Of +particular importance is the associated nucleon effective mass, which is obtained from a momen- +tum derivative of the single-particle energy. The nucleon effective mass is directly related to the +density of states and hence governs entropy generation at finite temperature, with consequences for +the dynamical evolution of core-collapse supernovae and neutron star mergers. Finally, in-medium +NN scattering cross sections have been computed at finite density and zero [220] as well as at +finite [218] temperature using high-precision nuclear forces. In the next decade, the use of effective +field theory methods will enable a consistent framework for describing all of these quantities with +uncertainty estimates for input into transport simulations of heavy-ion collisions and astrophysical +simulations. +2. +Challenges and opportunities +To fully capitalize on experimental and observational data and extract key information on fun- +damental questions in nuclear physics, continued progress in nuclear theory is crucial. The combi- +nation of χEFT with modern computational approaches like machine learning, artifical intelligence, +emulators, and Bayesian inference have provided EOS results for a wide range of densities, and at +various proton-to-neutron asymmetries and temperatures, with quantified uncertainties [111, 166]. +Future progress in the development of fundamental interactions, combined with these tools, will + +28 +increase the precision of the results and enable us to answer open problems in chiral EFT. Among +these, the most pressing is at which densities and how χEFT breaks down [166, 188]. In particular, +for studies of neutron-star mergers it is of great importance to describe dense matter at finite +temperatures [200, 201, 204], however, these might influence the breakdown of the theory in dense +matter. In the next decade, it will be crucial to reliably determine how far one can push the χEFT +approach in nucleonic matter. +While microscopic calculations have been very successful in calculating properties of nuclei and +homogeneous matter at densities up to 1-2 times the nuclear saturation density, we need improved +microscopic descriptions of neutron-rich dense matter beyond that regime, at a few times nuclear +saturation density and finite temperatures, with quantified uncertainties. This can be achieved +by employing models derived within relativistic mean-field or density functional theory that are +firmly rooted in microscopic theory at lower densities. Such models will be very important to +connect theoretical calculations within the framework of χEFT to heavy-ion collision experiments +at accelerator facilities around the world. Heavy-ion collision experiments at intermediate beam +energies bridge the low- and high-density regimes of the EOS and provide complimentary informa- +tion to that obtained from nuclear structure or neutron-star studies [17] (see Section II A). Robust +inferences from the experimental data will require more accurate predictions from transport the- +ory, which strongly depend on, among others, mean-field or density functional models. It will be +imperative to test and constrain such models for the EOS with more rigorous microscopic calcu- +lations. Beyond their use in hadronic transport simulations, these models are also a crucial input +for calculations of properties of neutron star crusts (see Section II C). +Additional theoretical constraints might be provided by high-density calculations within the +framework of perturbative QCD (pQCD) [221], which can be applied at very high densities of +the order of 40 times the nuclear saturation density, where the strong interactions among quarks +become perturbative. Constraints on the EOS based on pQCD, together with assumptions on +causality and stability, have been used to constrain the EOS at lower densities probed in the core +of neutron stars [222–225]. +However, it has been found that the constraining power of pQCD +calculations is strongly dependent on the way in which they are implemented [225, 226]. Future +studies have to establish to what extent pQCD constraints are robust at densities of the order of +several times nuclear saturation density, and how constraining future higher-order calculations may +become. In this regard, improved microscopic calculations of the nuclear EOS using the functional +renormalization group [227, 228] will provide important insights. +C. +Neutron star theory +1. +Status +Measurements of the EOS, masses of neutron-rich isotopes far from the band of stability, and +experimental constraints on nucleon effective masses provide essential input into neutron star mod- +els, progressing our understanding of the structure and dynamics of these astronomically important +objects. Several properties of neutron stars, including the mass-radius relation and their tidal de- +formabilities, can be calculated once the EOS is provided. This, in turn, enables us to constrain +the EOS once those properties are observed [229]. +Nuclear EOSs for neutron stars can be constructed from, for example, ab initio calculations and +density functionals [230–233] or, more schematically, from meta-models [234–236] parameterized +by nuclear matter parameters, which can be used to make contact with heavy-ion collisions [17]. +Ab initio calculations take into account more fundamental properties of the nuclear force (see Sec- +tion II B), but prohibit the calculation of large ensembles of EOSs spanning the nuclear parameter + +29 +FIG. 11. Impact of nuclear physics theory and experiment, and +different astrophysical measurements on constraining the cold +neutron-star EOS. Blue lines show a family of EOS that are con- +strained by chiral EFT at low densities. At higher densities, the +EOS can then be constrained using GWs from inspirals of neutron +star mergers, data from radio and X-ray observations of pulsars, +and electromagnetic signals associated with neutron star mergers. +The indicated boundaries between regions affected by these mea- +surements are not strict and depend on the EOS and properties +of the astrophysical system. Figure from [237]. +space. +Meta-models allow rapid +computation of such large ensem- +bles, but encode mainly bulk prop- +erties of nuclear matter, which ex- +cludes them from being used to +model finite nuclei. +Density func- +tionals represent a compromise, al- +lowing both rapid computation of +EOSs and use in finite nuclear mod- +els, and thus are more suited to +combining nuclear experimental and +astrophysical information. +Many +of these models can be smoothly +extrapolated from the saturation- +density to arbitrarily high density, +in which case astronomical obser- +vations can be used to constrain +the saturation-density nuclear mat- +ter parameters and their density de- +pendence [236, 238]. This extrapo- +lation, however, is model-dependent, +as different density functionals have +different dependence on density. Ad- +ditionally, this extrapolation might +not be physically well-founded. +As densities inside neutron stars +can reach up to several times nuclear saturation density, at some (as-yet not determined) density a +description in terms of purely nucleonic degrees of freedom is expected to break down. Heavy-ion +collisions can help us constrain that point, and the nature of any phase transitions that occur above +saturation density. The nuclear EOSs can be then combined with models describing the EOS at +higher densities. Models that explicitly include a range of possible high-density degrees of freedom, +such as hyperons and quarks, can be constructed; the predicted neutron star compositions are then +dependent on the particular model used. Another approach is to use more general models that give +up the explicit dependence on the underlying degrees of freedom, thus losing information on, e.g., +appearance of exotic particles at high densities, in favor of spanning the full space of physically con- +sistent EOSs, reducing the model dependence of inferences from astrophysical observations [239]. +These schemes include piecewise polytropes [14, 240–242], line segments [192, 243], speed-of-sound +models [188, 189, 244–246], spectral models [247] and non-parametric models generated from Gaus- +sian processes (GPs) [168, 248–251] or machine learning techniques [252]. If these more general +approaches are used down to the nuclear saturation density, extra modeling is required to connect +them to the microscopic nuclear EOS and nuclear observables [253]. +Once the EOS is specified, the solution of the Tolman-Oppenheimer-Volkov equations and their +extensions including rotation, determining the structure of a neutron star through balancing the +attractive force of gravity and the repulsion coming from the EOS, provide predictions for bulk +properties of the neutron star such as radii, tidal deformabilities, moments of inertia, and break-up +frequencies of neutron stars as a function of their mass. All of these properties can be compared +with multi-messenger observations, including gravitational waves and electromagnetic signals from +neutron-star mergers and isolated neutron stars [193]. +The systematic construction of neutron star EOS models and statistical inference of EOS pa- + +103 +8 +102 +[Mev fm +EM: Kilonovae / GRB +GWs (post-merger) +Pressure +101 +GWs (inspiral) +Radio and X-ray pulsars +100 +Nuclear Physics +Experiment and Theory +2 +4 +6 +8 +Number density [nsat30 +rameters from data is an endeavor that is just over a decade old [14, 240–242]. This effort has +matured in the current era of multi-messenger astronomy with a large push to explore the model- +dependence of EOS inferences [244, 254] and ways of connecting the EOS with astrophysical and +nuclear data [17, 167, 193, 245, 246, 255]. Different choices of which observables to include or infer +can be made. For example, astrophysical observations can be used to infer the EOS, which can +then be connected to nuclear models to inform their parameters and predict nuclear observables. +Conversely, nuclear observables can be used to infer nuclear parameters, which can then inform +the neutron star models and predict astrophysical observables. The future lies in combining more +and more sets of data of both types to understand nuclear and neutron star models better. +Exciting progress has been made in gathering astrophysical data to constrain our dense matter +theories (see Fig. 11 for an illustration of density regions affected by different observables). Neutron- +star data from the last 5 years identified the heaviest neutron star known to date with a mass of +2.08(7)M⊙ [256, 257] (where M⊙ is the solar mass), while the kilonova AT2017gfo, associated with +GW170817, has placed an upper limit on the maximum mass to be on the order of 2.3M⊙ [258, +259]. +The detection of GW170817 by the LIGO-Virgo Collaboration has enabled us to place +constraints on the tidal deformability of this system, ˜ΛGW170817 ≤ 720 [260, 261]. Neutron Star +Interior Composition Explorer Mission (NICER) has provided two mass-radius measurements by +observing X-ray emission from several hot spots on the neutron star surface, finding a radius of +13.02+1.24 +−1.06km for a star with mass 1.44+0.15 +−0.14M⊙ (PSR J0030+0451) and 13.7+2.6 +−1.5km for a star with +mass 2.08(7)M⊙ (PSR J0740+6620) in the analyses of Refs. [255, 262–264]. X-ray observations of +the temperature of the neutron star in the Cas A supernova remnant have revealed core cooling +on the timescale of years, hinting at the possible superfluid properties of the core [265]. These +observations have enabled meaningful constraints on the EOS to be set and have already allowed us +fascinating glimpses into the possible properties of high-density matter. For example, perturbative +QCD predicts that the speed of sound squared approaches the conformal limit of 1/3 from below +as the density becomes arbitrarily high. +Meanwhile, inferences of the neutron star EOS from +observational data indicate that the speed of sound rises in the core to significantly above c2 +s = +1/3 [188, 266–269]. Consequently, this suggests that the speed of sound has a non-trivial behavior +with increasing density [188, 221, 270]. At the same time, tentative evidence for quark matter in +neutron star cores, which in turn indicates a softening of the EOS, has likewise been suggested [246]. +If we want to leverage the substantial data we have on neutron star cooling and dynamical +evolution, additional EOS quantities need to be supplied consistently for each EOS model, such +as the effective masses (see also Section VI E) and superfluid neutron and proton gaps, essential +for modeling thermal and dynamical properties of neutron stars. For example, the mutual friction +of the core – the strength of the coupling between the charged particles (electrons, protons) and +superfluid neutrons – depends on the effective neutron mass and the proton fraction [271], which +both also correlate with the symmetry energy [108]. A consistent extraction of both symmetry +energy parameters and effective masses from heavy-ion collision data is therefore required. +In contrast to efforts devoted to systematic, statistically meaningful inferences of the EOS in the +cores of neutron stars, modeling the neutron star crust is still in its infancy: The first calculations +of large ensembles of systematically parameterized crust models and their use in statistical analysis +have only been carried out recently [272–276]. However, much more nuclear experimental data can +be brought to directly bear on crust physics, and we have entered an era where we can access +information about the crust with unprecedented fidelity. For example, we have now observed the +same neutron-star crust as it first cooled, then became heated by accreted matter, and then cooled +again [277–281]. We have followed a pulsar through a glitch – a sudden change in the rotation period +of the pulsar – and glitch recovery with a resolution of a few seconds [282]. These observations +have provided very strong evidence that the crust is solid, that there exist superfluid neutrons in +the inner crust which can be decoupled from the nuclei in the crustal lattice, and that nuclear + +31 +reactions from accreted material sinking into the crust provide deep crustal heating [279, 283, 284]. +Additionally, models of the neutron star crust predict that, prior to the transition to homoge- +neous matter, isolated nuclei in the crust fuse to form cylindrical, planar, and more exotic shapes, +termed “nuclear pasta”, that can affect neutron-star observations [285–287]. This crust-core bound- +ary region, often referred to as the mantle, is likely a complex fluid. Density functional theory and +molecular dynamics calculations of these structures reveal a complex energy landscape with many +coexisting shapes, and correspondingly complex mechanical and transport properties [288–294], +which are strongly influenced by the EOS at around 0.5n0 through the pressure, proton fraction, +and surface energy of the structures. +These properties can also be studied in multifragmenta- +tion reactions, which probe, among others, the competition between nuclear surface energy and +Coulomb energy at sub-saturation density [295–297]. +Inhomogeneous matter in the crust of a neutron star, including the dripped neutrons expected in +the inner crust, can be modeled using a variety of nuclear theory techniques. These usually involve +calculations within a single, repeating unit (Wigner-Seitz cell) of matter, typically containing a sin- +gle nucleus [298–300]. The compressible liquid drop model (CLDM) treats the nuclear matter inside +and outside of nuclei as homogeneous and described by the bulk matter EOS, while the surface +energy is specified by a separate function with additional parameters [288, 300–303]. The surface +parameters and those that define the dimensions of the cell and nucleus are minimized to obtain +the ground state. The Thomas-Fermi model employs the local density approximation, modeling +matter with a specified form of the inhomogeneous nuclear matter density in the unit cell; here, +the parameters of the density distribution are varied to obtain the ground state configuration [304]. +Microscopic approaches to describing inhomogeneous nuclear matter, in which individual neutrons +and protons are the degrees of freedom, include quantum Hartree-Fock or Relativistic Mean Field +models [305–310], and semi-classical molecular dynamics approaches [292, 311]. +There is a great need for nuclear physics input into models of the neutron star crust, which +analyses of heavy-ion collision data can provide. For example, the thickness, mass and moment +of inertia of the crust depend on the higher-order symmetry energy parameters L, Ksym, and +Qsym [272, 274, 312]. Thus measurements of the symmetry energy parameters up to third order +in heavy-ion collision experiments are essential to understand the properties of the crust. The +symmetry energy, effective masses, and surface energies of nuclear clusters strongly affect the +proton fraction on either side of the crust-core transition density, the extent of nuclear pasta near +the crust-core boundary, the mechanical and transport properties, the thermal conductivity and +specific heat, the electrical conductivity, and the shear modulus of the crust [298, 304, 309, 313]. +Nuclear experiment can thus constrain neutron star crust models, and astrophysical observables +associated with the crust can measure nuclear observables as well as measurements of neutron star +bulk properties. For example, the symmetry energy can be constrained by combining nuclear data +with crust and core observables, e.g., through a potential multi-messenger measurement of the +resonant frequency of crust-core interface oscillations [276]. +2. +Challenges and opportunities +The next decade will provide a wealth of new data on neutron stars, as the LIGO-VIRGO- +KAGRA detectors are expected to observe many new binary neutron-star mergers, some of them +with electromagnetic counterparts [314–316]. As NICER continues to measure more neutron star +masses and radii, next-generation X-ray timing missions such as Strobe-X [317] and radio tele- +scopes such as the Square-Kilometer Array will increase the number of pulsars we see and are able +to measure by an order of magnitude. Long-timescale observations of individual pulsars (using +radio timing) and persistent gravitational waves from deformations of neutron stars will lead to + +32 +measurements of their moments of inertia. These new data points might enable us to pin down +the nuclear matter EOS, to discover or rule out the existence of phase transitions to exotic forms +of matter in the cores of neutron stars, and to reliably constrain microscopic interactions between +fundamental particles. +Although model-agnostic extrapolations to higher densities such as through the use of poly- +tropes [194, 240], speed of sound schemes [188, 244, 318], Gaussian processes [249, 250] and spectral +methods [247], combined with robust data analysis, will eventually allow us to pin down the dense- +matter EOS, they cannot answer the question about the relevant microscopic degrees of freedom at +high densities. Hence, it is crucial to develop improved microscopic models with well-quantified un- +certainties in this regime. At the same time, creating ensembles of outer core and crust models that +allow for inclusion of astrophysical and nuclear data requires underlying nuclear models to have +enough freedom to explore a large region of parameter space, and allow fast computation of relevant +quantities that also capture the essential physics. Currently, it is energy density functionals like +Skyrme, Gogny, and Relativistic Mean Field models that provide these properties. Consequently, +progress could be made by making a stronger connection between these models and microscopic +approaches, e.g., connecting energy-density functionals to ab initio calculations allowing a more +direct link to χEFT [299, 319, 320]. In the same spirit, EFT calculations of the EOS can be used as +a “low-density limit” to calibrate higher-density models for neutron stars and heavy-ion collisions. +The crust can be modeled consistently with nucleonic matter in the core using density functional +theory to model both. When choosing a model, a compromise must be made between accurate +modeling of microscopic quantum effects, such as shell effects in the nucleus and surrounding +neutron gas, and the computational expediency required to construct large ensembles of crust +models needed for statistical inference. For example, quantum shell effects strongly determine the +evolution of the mass and charge number of nuclei with density, alter the effective mass of dripped +neutrons, and drive the complex energy landscape of nuclear pasta. Fully microscopic quantum +calculations include shell effects self-consistently, but are computationally expensive. The CLDM +approach can be used to construct large numbers of crust models, but requires shell effects to be +added by hand. Future work needs to develop schemes of incorporating such microscopic effects in +large ensembles of crust models. The method that may allow that is the Extended Thomas-Fermi +method, incorporating shell effects through the Strutinsky Integral: see, e.g., [321]. +Models should also incorporate nuclear pasta, as its extended structures may contribute to the +mechanical and thermal properties of matter at the crust-core boundary. It is computationally +demanding to model transport and mechanical properties of the crust microscopically or in simula- +tions [322], particularly in the nuclear pasta phases, and it is unrealistic to include these quantities +in large ensembles of crust models. Simpler schemes that extrapolate the mechanical and trans- +port properties across the parameters space based on microscopic models could be developed. Also, +representative crust models inferred from data can be used to calculate these crust properties. +There is also a need for a balance between accuracy and precision. A model can be accurate +but not precise (predicting the correct value of a physical quantity but having large error bars), +or precise but not accurate predicting very small error bars, but not predicting the correct value +of some physical observable). +Individual crust models can be created from mass models that +are precisely fit to data and which predict precise values for, for example, the symmetry energy +parameters. However, to make accurate inferences of nuclear matter parameters from astrophysical +observables, and to include their experimentally measured ranges, ensembles of models spanning +the parameter space should be employed. +Both strategies are important, and the precision-fit +models can act as benchmarks against which we assess the outcomes of statistical inferences. +When older neutron stars accrete matter in the crust the matter gets gradually pushed down +into the core and replaced by the accreted matter. The temperatures in the crust are well below +the nuclear potential energies, so the replacement crust cannot easily attain nuclear statistical + +33 +equilibrium. Ensembles of accreted crust models are yet to be constructed, but are necessary to +correctly account for deep crustal heating and therefore to fully utilize the observations of cooling +of accreted crusts in low mass X-ray binaries. +In all this work, effort must be made to calculate the different observables consistently as well +as to combine different data sets in a well-controlled way. This is expanded upon in Section IV. +III. +HEAVY-ION COLLISION EXPERIMENTS +Establishing the equation of state (EOS) of nuclear matter has been a major focus of heavy-ion +collision experiments. While very low energy collisions can probe nuclear matter at densities smaller +than the saturation density n0, highly-compressed nuclear matter is produced in the laboratory +by colliding heavy nuclei at relativistic velocities. At even higher energies, in the ultra-relativistic +regime, quarks in the colliding nuclei become almost transparent to each other and therefore escape +the collision region, which means that matter measured at midrapidity is characterized by a nearly- +zero net baryon number. Heavy-ion collision experiments at top beam energies at the Relativistic +Heavy Ion Collider (RHIC) and Large Hadron Collider (LHC) provided convincing evidence that +at high temperatures and near-zero baryon density, nuclear matter becomes a quark-gluon plasma +(QGP) [323–329], a deconfined but strongly-interacting state composed of color charges, confirming +Lattice QCD (LQCD) calculations of the EOS at zero density [330–332]. +While the region of the QCD phase diagram explored in ultra-relativistic heavy-ion collisions +is relatively well understood, the EOS of dense nuclear matter at moderate-to-high temperatures +and moderate-to-high baryon densities is not known well due to the break-down of first-principle +approaches in this regime. Answering pressing questions about the QCD EOS in this region, such as +whether the quark-hadron transition becomes of first-order at high densities or what is the minimal +energy required to produce the QGP, is the driving force behind Phase II of the Beam Energy Scan +(BES) program at RHIC, the HADES experiment at GSI, and the future Compressed Baryonic +Matter (CBM) experiment at the Facility for Antiproton and Ion Research (FAIR), Germany. +This renewed interest in the nuclear matter EOS at high densities, accessible in heavy-ion +collisions at intermediate energies, coincides with an increased effort to constrain the EOS of +neutron-rich matter, probed in studies of neutron stars and neutron star mergers (see Section II C +as well as recent white papers on QCD Phase Structure and Interactions at High Baryon Den- +sity: Continuation of BES Physics Program with CBM at FAIR [151] and Dense matter theory for +heavy-ion collisions and neutron stars [159]). Furthermore, studies show that heavy-ion collisions +in this regime and neutron star mergers probe similar temperatures and baryon densities [333, 334]. +However, while matter created in collisions of heavy-ions has comparable numbers of protons and +neutrons, matter inside neutron stars is neutron-rich. Establishing the much needed connection +between the studies of the nuclear EOS as probed in heavy-ion collisions and as inferred from +neutron star observations is possible by leveraging the experimental capabilities of the newly com- +missioned Facility for Rare Ion Beams (FRIB), where energetic beams of proton- and neutron-rich +nuclei can be produced. Heavy-ion collision experiments at FRIB can put tight constraints on the +dependence of the nuclear matter EOS on the relative proton and neutron abundances [22], and +thus enable a description of both dense nuclear and dense neutron-rich matter within a unified +framework. +Indeed, if we assume that the core of a neutron star is composed of mostly uniform nucleonic +matter, then nuclear matter and neutron stars should be described by a common EOS, specifying +the relationship between the pressure and the temperature, density, and isospin content. +The +theoretical construct of symmetric nuclear matter consisting of equal amounts of neutrons and + +34 +Number density +Astro +HIC(asym) +Nuclei properties +Theory +Crust +HIC(SNM) +FIG. 12. This schematic plot illustrates the approximate density +ranges that are explored in the studies of chiral effective field +theory, nuclei properties, heavy-ion collision experiments, and +observations of neutron stars and their crusts in astronomy. +protons has been successful to derive +properties of symmetric matter such +as the saturation density and bind- +ing energy, however, an additional +term in the EOS is needed to de- +scribe nuclear matter with unequal +neutron-proton composition. +This +second term depends on the asymme- +try δ, defined as δ = (nn − np)/nB, +where nn, np, and nB are the neu- +tron, proton, and total baryon densi- +ties, respectively. Consequently, one +can view the asymmetry as the neu- +tron excess fraction. Mathematically, +the energy per nucleon can be then +expressed as a sum of two terms: +ϵ(nn, np) = ϵSNM(n) + S(n)δ2. Here, the first term represents the energy per nucleon of symmetric +nuclear matter, while the second term accounts for the correction needed when δ ̸= 0. Therefore, +δ is a crucial parameter that distinguishes neutron stars (with δ >∼ 0.8) from most nuclei (with +δ <∼ 0.25). Given the relatively small values of the asymmetry δ for nuclei, in heavy-ion collision +experiments it is easier to constrain the coefficients of the EOS of symmetric matter, ϵSNM(nB). In +contrast, the energy contribution from the asymmetric term, also known as the symmetry energy, +constitutes a small fraction of the total energy of a nucleus even for neutron-rich heavy radioactive +isotopes (< 5% in the liquid drop model), and its determination requires precise measurements. +Furthermore, because the isospin effects in any observable tend to diminish with temperature, it +may be difficult to measure the symmetry energy at very high densities, which require high-energy +heavy-ion reactions. Therefore, symmetry energy is best probed in heavy-ion collisions of highly +asymmetric isotopes at low to intermediate energies. +Fig. 12 shows schematically the baryon density regions explored by different areas in nuclear +physics studies. Recent breakthroughs in astronomical observations with state-of-the-art instru- +ments led to the first detection of a binary neutron-star merger and the unprecedented radii mea- +surements of neutron stars with accurately known masses (see Section II C). The neutron star +mass-radius relationship provides an insight into the EOS at high densities above twice saturation +density (>∼ 2n0), as represented by the red arrow (labelled “Astro”) in the upper right corner. Labo- +ratory experiments, especially those using heavy-ion collisions, are essential to provide information +on the dependence of the EOS on density and the asymmetry (see also Section II A). High-energy +heavy-ion collisions can provide insight into the symmetric nuclear matter EOS as represented +by the gold right-pointing arrow (labeled “HIC(SNM)”), while current probes of the symmetry +energy are more suited for measurements of lower energy heavy-ion reactions (<∼ 600 AMeV) as +represented by the left-pointing gold arrow (labeled “HIC(asym)”). Many properties of nuclei, +such as masses and radii, have been shown to be mainly sensitive to densities around (2/3)n0, +however, with a careful selection of nuclear observables, the symmetry energy has been probed +over densities of 0.3n0 < nB < n0 using Pearson correlation methods [12, 335] (green left-pointing +arrow). Recent advances in chiral effective field theory (see Section II B) enabled extrapolations +of the EOS to be extended up to ≈ 1.5n0 [13], but the uncertainty increases exponentially with +density for densities that are higher than n0. It is not clear what is the maximum density up to +which such extrapolations can succeed. Finally, one of the most interesting regions is at very low +densities (<∼ 0.5n0), corresponding to the crust of a neutron star where matter is not uniform (see +Section II C). There, matter changes with increasing density from a Coulomb-dominated lattice to + +L +0.0 +0.5 +1.0 +1.5 +2.0 +2.5 +3.035 +nuclear pasta and, ultimately, to uniform matter. The density and nature of these transformations +are again dictated largely by the EOS. +Measurements made in heavy-ion collisions at intermediate energies, probing high densities +or, equivalently, small nucleon separations, will yield key insights into the nature of the nuclear +force, including the density-dependence of the nuclear symmetry energy. Experimental efforts to +determine the EOS for symmetric matter and the symmetry energy are described in Section III A +and III B, respectively. +Please note that all beam energies Elab quoted in this section are the single-beam kinetic energies +per nucleon, in units of AMeV or AGeV. (Alternatively, Elab is also sometimes denoted by other +authors as E/A, with units of MeV or GeV). Additionally, while many results are reported in +terms of their constraints on the incompressibility K0, one should refrain from interpreting them +as constraining the behavior of the EOS around the saturation density (see Section II A 2 for more +details). +A. +Experiments to extract the EOS of symmetric nuclear matter +Heavy-ion collision experiments worldwide have extensively studied the EOS of symmetric +nuclear matter at supra-saturation densities over the past four decades. Experiments based at +the Schwerionensynchrotron-18 (SIS-18) ring accelerator at the GSI Helmholtz Centre for Heavy +Ion Research (GSI) have probed Au+Au collisions at energies between Elab = 0.09–1.5 AGeV +(√sNN = 1.92–2.52 GeV), corresponding to fireball densities 1–2.5n0. Further experimental efforts +with Au+Au collisions were carried out at higher energies, Elab = 2–10 AGeV (√sNN = 2.70– +4.72 GeV), at the Alternating Gradient Synchrotron (AGS) at the Brookhaven National Laboratory +(BNL) to probe fireball densities 2.5–5n0. Complementing the densities reached at AGS-BNL is the +Beam Energy Scan (BES) program of the Solenoidal Tracker at RHIC (STAR) experiment at RHIC +in BNL, where high-statistics Au+Au collisions were performed at energies between Elab = 2.9– +30.0 AGeV (√sNN = 3–7.7 GeV) in the fixed-target mode. A selection of constraints on the EOS +extracted from the above experiments is shown in Fig. 9. Below, we describe the observables stud- +ied to extract the symmetric nuclear matter EOS, experiments probing the aforementioned density +ranges, and inferences for the hadronic transport codes. +1. +Measurements sensitive to the EOS +Collisions of heavy nuclei at relativistic energies lead to a rapid compression and heating of +matter trapped in the collision region, followed by its dynamic expansion and cooling (see Fig. 7). +The EOS governs both the compression as well as the expansion of the hot and dense nuclear matter, +which in turn affect measured particle distributions. For example, a stiffer EOS (characterizing +matter that is more incompressible) leads to a relatively smaller compression and, consequently, +smaller heating, but a faster transverse expansion. The smaller temperatures reached in the fireball +lead to smaller thermal dilepton and photon yields (see, e.g., [336–338]), while the faster expansion +manifests itself in relatively higher mean transverse momenta (see, e.g., [24]) and a shorter lifetime +of the fireball, the latter of which can be probed by a combination of the femtoscopic radii, R2 +out − +R2 +side, shown to be proportional to the duration of particle emission [339, 340]. +The EOS also plays a large role in the interplay between the initial geometry of the system, +the expansion of matter originating from nucleons trapped in the collision zone (participants), +and the propagation of nucleons which are either still incoming into the collision region or whose +trajectories do not directly cross the collision region (spectators). In systems colliding at beam +energies for which the speed of the fireball expansion is comparable with the speed of the spectators, + +36 +the resulting complex dynamical evolution affects the transverse expansion of the system and, +therefore, the angular particle distributions in the transverse plane dN/dφ. In particular, moments +of the angular momentum distribution, known as the collective flow coefficients and defined as +vn = +� dφ cos(nφ) (dN/dφ)/ +� dφ (dN/dφ), describe the collective motion of the system and are +highly sensitive to the EOS, as shown in numerous hydrodynamic [77, 341–346] and hadronic +transport [31, 67, 78, 79, 347, 348] models. At the same time, collective flow observables can be +measured with high precision, making them primary observables used to constrain the EOS. +In off-central collisions, the initial collision zone has an approximately elliptical shape, and the +pressure gradients within the collision zone are larger along its short axis. If the spectator nucleons +move out of the way before the fireball expands, the pressure gradients in the collision zone lead to +particle distributions around midrapidity which have maxima coincident with the reaction plane +(“in-plane” emission). If, however, the spectators stand in the way of the fireball expansion, this +leads to a preferential emission along the long axis of the collision zone (“out-of-plane” emission, +also referred to as “squeeze-out” due to the role that the spectators play in the expansion). The +preferential emission in either in-plane or out-of-plane direction is described by the second Fourier +coefficient of flow v2, also known as the elliptic flow, which is positive in the former case and +negative in the latter case (see the lower panel of Fig. 4). The magnitude of the elliptic flow, +as well as the energy at which v2 changes sign, are intrinsically connected to the stiffness of the +EOS: for example, a stiffer EOS results in both a faster expansion and a more forceful blocking by +spectators, which leads to a larger squeeze-out and a more negative v2. +The rapidity-dependence of the first Fourier coefficient of flow, the directed flow v1, is also +sensitive to the EOS as it measures the degree of spectator deflection due to the interaction with +the collision zone [349]. In the center-of-mass frame, the spectators from a nucleus moving in the +positive beam direction will be deflected to one side, while the spectators from the other nucleus, +moving in the negative beam direction, will be deflected to the opposite side, resulting in a positive +v1 at positive rapidities and a negative v2 at negative rapidities (here, the sign of v1 is a matter of +convention; see [58] for a more detailed explanation). The magnitude of the directed flow in each +region and, therefore, its slope at midrapidity are directly related to the EOS: for example, a softer +EOS leads to a smaller deflection and a smaller slope of v1 at midrapidity, where in particular a +sufficiently soft EOS can even lead to a negative slope of v1 [343, 350]. We note that spectators +are necessary to obtain substantial magnitudes of the slope of the directed flow, as can be seen by +its small values at high collision energies (see the upper panel of Fig. 4). +Beyond the collective flow phenomena, the EOS also has an effect on hadron production. In +particular, much attention has been given to production of hadrons in heavy-ion collision at energies +below the nominal production threshold in NN reactions (“sub-threshold” production), which +requires multiple sequential hadron-hadron collisions to occur. The probability of these collisions +is significantly higher in the high-density regions, and consequently the yield of sub-threshold +probes is expected to be substantially enhanced if higher densities are reached in the collision. +Of particular importance for the EOS studies is sub-threshold production of K+ mesons, which +undergo few final-state interactions with the nuclear medium and therefore mostly leave the fireball +unperturbed, making them a sensitive probe of the highest densities reached and, consequently, of +the nuclear EOS [87]. +2. +Experiments probing densities between 1–2.5n0 +As described above, sub-threshold particle yields can be used as probes of the EOS. In partic- +ular, due to their low in-medium cross-section, K+ mesons produced at energies lower than the +production threshold of Elab = 1.58 GeV (√sNN = 2.55 GeV) can carry unperturbed informa- + +37 +0.8 +1.0 +1.2 +1.4 +1.6 +Elab [GeV] +1 + 2 + 3 + 4 + 5 + 6 + 7 +(MK+/A)Au+Au / (MK+/A)C+C +0.8 +1.0 +1.2 +1.4 +1.6 +Elab [GeV] +1 + 2 + 3 + 4 + 5 + 6 + 7 +(MK+/A)Au+Au / (MK+/A)C+C +soft EOS, pot ChPT +hard EOS, pot ChPT +soft EOS, IQMD, pot RMF +hard EOS, IQMD, pot RMF +KaoS +soft EOS, IQMD, Giessen cs +hard EOS, IQMD, Giessen cs +❑HM +▲ SM +● FOPI +Au+Au +protons +0.4 +0.6 +0.8 +1.0 +1.2 +1.4 +1.6 +0.05 +0.10 +0.15 +0.20 +0.25 +0.30 + 0.25 +beam energy (A GeV) +0.4 +v2n(0.8) +FIG. 13. Left panel: Beam energy dependence of K+ yield ratios in inclusive Au+Au collisions and C+C +collisions between Elab = 0.8–1.5 AGeV (√sNN = 2.24–2.52 GeV). A comparison of RQMD [84] and IQMD [354] +model calculations indicates a soft EOS (K0 = 200 MeV, red symbols) instead of a hard EOS (K0 = +380 MeV, blue symbols) when compared to KaoS data [353] (black symbols). Figure from [351]. Right +panel: Beam-energy dependence of the elliptic flow for protons in Au+Au collisions at Elab = 0.4 AGeV +(√sNN = 2.07 GeV) (black symbols) as measured by the FOPI experiment [88]. +Comparison to IQMD +transport calculations with momentum dependence prefers a soft EOS (blue triangles) over a hard EOS (red +squares), yielding K0 = 190 ± 30 MeV. Figure from [67]. +tion on the fireball density and the stiffness of the EOS [351]. The Kaon Spectrometer (KaoS) +Experiment [352] at SIS18 in GSI studied the subthreshold production of K+ mesons at beam +energies between Elab = 0.6–2.0 AGeV (√sNN = 2.16–2.70 GeV), and established it as a sensitive +probe to the underlying EOS of the hot and dense nuclear matter. To reduce the experimental +and model uncertainties, the production of K+ mesons in a heavier Au+Au system was compared +with the production in a lighter C+C system [353]. Analyzing the experimental results together +with transport model calculations in the RQMD [84] and IQMD [354] model enabled extraction of the +EOS of symmetric nuclear matter characterized by an incompressibility of K0 = 200 MeV (see also +Fig. 9). Both models included effects due to the momentum-dependence of the EOS by including +K+/−N potentials, i.e., a repulsive mean field for K+ and an attractive mean field for K−, which +are required to reproduce the K+ and K− emission pattern [355] (see Fig. 13). +Collective behavior in heavy-ion collisions is likewise a very sensitive probe of the underlying +EOS and has been extensively studied since its discovery by the Plastic Ball spectrometer at the +Bevalac in Lawrence Berkeley National Laboratory [356, 357]. In particular, the elliptic flow v2 is +highly sensitive to both the initial geometry of the collisions and pressure gradients experienced +throughout the evolution of the created systems [77, 358]. The Four Pi (FOPI) Experiment at SIS18 +in GSI carried out extensive measurements of the beam energy dependence of the elliptic flow of +protons and light fragments (such as deuterons, tritons, and 3He) over the entire range of SIS18 +energies, Elab = 0.09–1.5 AGeV (√sNN = 1.92–2.52 GeV) [88, 359]. The nucler EOS extracted from +a comparison to IQMD simulations [67] is characterized by an incompressibility K0 = 190 ± 30 MeV +when momentum-dependent interactions are taken into consideration. This constraint is consistent +with the KaoS incompressibility inferences and suggests a soft EOS for symmetric nuclear matter +at 1-2.5n0 (see Fig. 13 and also Fig. 9). + +38 +K+ SMASH +K- SMASH +K+ UrQMD +K+ JAM +v2 +−0.08 +−0.04 +0 +0.04 +y - ycm +−1 +−0.5 +0 +0.4 < pT < 1.6 GeV/c +K+ +K- +−0.4 +−0.2 +0 +π+ SMASH +π- SMASH +π+ UrQMD +π+ JAM +v2 +−0.08 +−0.04 +0 +0.04 +y - ycm +−1 +−0.5 +0 +0.2 < pT < 1.6 GeV/c +π+ +π- +−0.4 +−0.2 +0 +p SMASH +p UrQMD +p JAM +Λ SMASH +Λ UrQMD +Λ JAM +v2 +−0.08 +−0.04 +0 +0.04 +y - ycm +−1 +−0.5 +0 +0.4 < pT < 2.0 GeV/c +√sNN = 3 GeV 10-40% +Au+Au collisions +p +Λ +v1 +−0.4 +−0.2 +0 +FIG. 14. Directed (v1, top) and elliptic (v2, bottom) flow of protons and lambda baryons (left panels), pions +(middle panels), and kaons (right panels) as a function of rapidity. Measurements from STAR [94] (symbols) +were performed with Au+Au collisions at √sNN = 3 GeV (Elab = 2.91 AGeV) and 10–40% centrality. +Results from UrQMD (blue bands), JAM (green bands), and SMASH (orange bands) hadronic transport models +were obtained using a relatively hard EOS at moderate densities (characterized by K0 = 300 in SMASH +and K0 = 380 MeV in JAM and UrQMD), with the EOS used in SMASH becoming significantly softer at high +densities (see [58, 94] for more details). +3. +Experiments probing densities above 2.5n0 +Pioneering proton directed and elliptic flow measurements were performed in Au+Au colli- +sions for beam energies Elab = 2–10 AGeV (√sNN = 2.70–4.72 GeV) by the E895 [83, 90] and +E877 [82] experiments at AGS-BNL. Notably, it was observed that around Elab ≈ 4 AGeV +(√sNN ≈ 3.32 GeV), the proton v2 changes from a preferential out-of-plane emission, reflecting +a complex interplay between the spectators, the expanding collision zone, and the EOS, to an in- +plane emission (see the lower panel of Fig. 4). The experimental results were used in a comparison +with the pBUU transport model to extract the EOS for densities between 2–5n0, which constrained +the EOS to those described by values of the nuclear incompressibility between K0 = 210–300 MeV, +ruling out extremely soft and extremely hard EOSs [31] (see Fig. 9). This rather broad constraint +on K0 reflects the fact that the experimental results for the collective flow could not be reproduced +with one EOS. +The STAR Experiment at RHIC-BNL with its Beam Energy Scan (BES) program [360, 361] +performed Au+Au collisions for √sNN = 3–200 GeV. +In terms of the freeze-out temperature +and chemical potential, (Tfo, µfo), this allowed STAR to comprehensively scan the QCD phase +diagram from (80, 760) MeV to (166, 25) MeV, respectively. Probing the phase diagram at high +densities was possible at RHIC in part due to STAR’s capability to shift from a standard collider +to a fixed-target (FXT) mode, which was used to scan through the lower energies √sNN = 3– +13.7 GeV (Elab = 2.91–99.06 AGeV), thereby establishing a substantial overlap with the previously + +39 +discussed AGS experiments [362]. Recently, STAR measured collective flow (v1, v2) in collisions at +√sNN = 3.0 GeV [94] and √sNN = 4.5 GeV [93]. A comparison of results from the √sNN = 3.0 GeV +data (see Fig. 14) with UrQMD and JAM simulations indicates a relatively hard EOS (characterized by +K0 = 380 MeV) [94]; similarly, a recent Bayesian analysis of the STAR flow data based on a flexible +parametrization of the EOS used in the SMASH transport code results in a relatively hard EOS at +moderate densities (characterized by K0 = 300 ± 60 MeV) with a substantial softening at higher +densities [58]. However, both UrQMD and SMASH do not currently include momentum-dependent +interactions, which are crucial for a correct description of the transverse-momentum-dependence +of the elliptic flow [31]. Moreover, while the above models reproduce the proton v1, v2 well, none +of the models can simultaneously describe the flow of Lambda baryons and mesons (see Fig. 14). +4. +Challenges and opportunities +Experiments probing densities between 1–2.5n0 +The High Acceptance Di-Electron Spectrometer (HADES) Experiment [363] at SIS-18 in GSI +has performed collective flow measurements in Au+Au collisions at Elab = 1.23 AGeV (√sNN = +2.42 GeV). The high acceptance and high statistics of HADES measurements allow one to per- +form multi-differential studies of flow harmonics, ranging from v1 up to v6, which in turn enables +reconstruction of a full 3D-picture of the emission pattern in the momentum space [18, 148] (see +Fig. 15). In addition to the collective flow measurement capabilities, HADES can also precisely +measure the dielectron excess yield, which was used to extract the fireball temperature, finding +it to be 71.8 ± 2.1 MeV/kB [364]. These precise measurements of the fireball temperature and +the underlying dielectron spectra allow HADES to investigate the presence of a first-order phase +transition at SIS-18 energies and look for signs of a potential change of degrees of freedom [365]. +During its 2024 beam campaign, HADES will be in a unique position to measure the fireball +caloric curve and the beam energy dependence of the collective flow from Au+Au collisions at +Elab = 0.4–0.8 AGeV (√sNN = 2.07–2.24 GeV). Furthermore, there are ongoing efforts to establish +systematic consistency between results from FOPI and HADES, including understanding various +1 +− +0.5 +− +0 +0.5 +1 +cm +y +0.4 +− +0.3 +− +0.2 +− +0.1 +− +0 +0.1 +0.2 +2 +v +Protons +Centrality 20-30% +) +c +(GeV/ +tp +0.35 - 0.40 +0.55 - 0.60 +0.75 - 0.80 +0.95 - 1.00 +1.15 - 1.20 +1.35 - 1.40 +1.55 - 1.60 +1.75 - 1.80 +1.95 - 2.00 += 2.4 GeV +NN +s +Au+Au +HADES +Protons +1.0 < p +t < 1.5 GeV/c +Centrality 20-30% + = 2.4 GeV +NN +s +HADES +Au+Au + 0.0 + 0.2 + 0.4 + 0.6 + 0.8 +ycm +0.5 +1.0 +1.5 +2.0 + = 0 +φ +π +2 +1 +π +π +3 +2 + 0.0 + 0.2 +- 0.2 +- 0.4 +- 0.6 + 0.4 + 0.6 + 0.8 + = 0 +φ +π +2 +1 +π +π +2 +3 +ycm +FIG. 15. Left: Rapidity-dependence of proton elliptic flow (v2) in semi-central Au+Au collisions at Elab = +1.23 AGeV (√sNN = 2.42 GeV) for various pT bins (see legend) as measured by the HADES experiment. +Figure from [18]. +Right: 3D-picture of the proton angular emission pattern in momentum space (flow +coefficients from v1 to v6) for HADES data in semi-central Au+Au collisions at Elab = 1.23 AGeV (√sNN = +2.42 GeV). Figure from [148]. + +40 +detector-related effects. +This is highlighted by the observed discrepancy in pion multiplicities +between FOPI and HADES, which could be partially explained by different methods used by the +respective experiments to estimate the number of participant nucleons [366]. +The abundance of available and future data presents an opportunity to benchmark transport +model simulations with measurements from KaoS, FOPI, and HADES experiments by enabling +systematic studies of the symmetric nuclear matter EOS. A recent comparison between FOPI +measurements and dcQMD transport code [86], using the transverse rapidity [367] and flow spec- +tra [88] of protons and light clusters at Elab = 0.15–0.80 AGeV (√sNN = 1.95–2.24 GeV), has +further tightened the constraints on the nuclear EOS at the probed densities to one characterized +by an incompressibility K0 = 236 ± 6 MeV. The dcQMD analysis for the FOPI data is planned +to be extended up to Elab = 1.5 AGeV (√sNN = 2.52 GeV), probing densities above 2n0, by +taking into account an improved description of reaction dynamics through using more accurate +approximations for 3-body terms in the interaction and considering multi-pion decay channels for +the resonances [368]. +Moreover, perfect-fluid hydrodynamic calculations for binary-neutron-star mergers and heavy- +ion collisions at SIS-18 energies show that comparable temperatures (T ≈ 50 MeV) and densities +(nB ≈ 2n0) are reached in both systems [333, 334]. This has led to increasing efforts to use the +existing constraints on the EOS of symmetric nuclear matter from KaoS and FOPI experiments +in a multi-physics effort to constraint neutron star properties [17, 369, 370]. Such multi-physics +constraints are discussed in detail in Section IV. +Experiments probing densities above 2.5n0 +While collective flow can be used to deduce the geometry of the colliding system and its prop- +erties in an indirect way (see Figs. 14 and 15), a more direct method – femtoscopy – can provide +a direct handle on the space-time evolution of the fireball [371]. Here, the time of the particles’ +emission ∆τ is also a probe of the underlying EOS, with larger values of ∆τ corresponding to a +softer EOS [338] (see Fig. 16). Access to this information is provided by measurements of femto- +scopic radii Rlong, Rout, Rside [372], where the relation between Rout to Rside is strongly correlated +with ∆τ. The sensitivity of pion emission to the EOS has already been studied [338, 373], however, +experimental uncertainties are still too big to make precise comparisons with model calculations. +Ongoing studies of proton femtoscopy at STAR are expected to bring new, substantial references +for such investigations of the EOS. +In addition to studying the EOS of dense nuclear matter, the STAR BES program also aims to +search for a potential first-order phase transition from hadronic to partonic phase at higher baryonic +densities. This search can provide an input on collision energies at which hadronic transport models +should take into consideration new degrees of freedom. Among the explored observables, number- +of-constituent-quark (NCQ) scaling was used as an important evidence of creation of QGP at the +highest RHIC energy of √sNN = 200 GeV (Elab = 21, 300.0 AGeV) [374]. Recent results point to +the breaking of the NCQ scaling in Au+Au collisions at √sNN = 3 GeV (Elab = 2.91 AGeV) [94]. +Other observables that can hint at the possible existence of a first-order phase transition include +the thermodynamic susceptibilities of pressure, which are predicted to fluctuate in the vicinity of a +critical point and manifest as a specific behavior of higher-order moments of conserved quantities +(such as baryon number, strangeness, and electrical charge) with the beam energy [375, 376]. +STAR [377, 378] and HADES [379] have observed tentative non-monotonic behavior in the beam- +energy-dependence of the fourth-order net-proton cumulant (a proxy for the net-baryon number +cumulant) in Au+Au collisions at √sNN = 7.7–27.0 GeV (Elab = 2.91–400 AGeV). +The experimental effort to uncover the symmetric nuclear matter EOS will be further strength- +ened by the Compressed Baryonic Matter (CBM) experiment [49, 380] at the currently-under- +construction Facility for Antiproton and Ion Research (FAIR) in Darmstadt, Germany. The CBM + +41 +16 +18 +20 +22 + +Freeze-out time 〈t〉 (fm/c) +Au+Au 0%-10% π +2 +3 +4 +5 +6 +7 +8 +9 +- + Cascade + Hard EoS + CMF EoS + CMF_PT2 EoS + CMF_PT3 EoS +√s NN (GeV) +2 +3 +4 +5 +6 +7 +8 +9 +-12 +-8 +-4 +0 +4 +8 +12 +16 +Au+Au +0%-10% +|yππ|<0.35 +kT=(275±25) MeV/c +HADES π-π- +E895 π-π- +E866 π-π- +STAR π-π- +STAR π-π-+π+π+ +RO +2-RS +2 (fm2) +√sNN (GeV) +FIG. 16. Left: Beam energy dependence of the π− freeze-out time as extracted from UrQMD simulations for +different EOSs. The CMF PT2 and CMF PT3 EOS soften at low and high baryon density, respectively, by +introducing a first-order phase transition, and the pure cascade mode can be considered as an extremely +soft EOS. Figure from [338]. Right: Comparison of the beam energy dependence of R2 +out − R2 +side for π− +extracted from experiments and UrQMD simulations with different EOSs. Figure from [338]. +experiment, which at the time of writing is expected to become operational in 2028-29, aims to +use nucleus-nucleus collisions to precisely explore the QCD phase diagram with Au+Au collisions +in the energy range of √sNN = 2.9–4.9 GeV (Elab = 2.49–11.1 AGeV). Other particle beams, +such as Z = N species and protons can also be used at Elab = 15 AGeV (√sNN = 5.62 GeV) +and Elab = 30 AGeV (√sNN = 7.73 GeV), respectively. This will be enabled by using primary +heavy-ion beams from the Schwerionensynchrotron-100 (SIS-100) ring accelerator operating at an +intensity of 109 ions/s [381]. CBM will operate at unprecedentedly high peak interaction rates of up +to 10 MHz, which will be further complemented by a novel trigger-less data acquisition scheme and +online event selection. This will allow CBM to perform systematic, multi-differential measurements +of the dependence of observables on the beam energy and system size. The most promising observ- +ables to explore are: (i) event-by-event fluctuations, (ii) thermal radiation (photons and dileptons), +(iii) (multi-)strangeness, (iv) hypernuclei, and (v) charm production (recent physics performance +results can be found in [382, 383]). Moreover, the HADES Experiment will be moved to the SIS-100 +beamline in the CBM experimental cave to complement the overarching CBM physics program in +2031 [384]. The HADES detector, given its large polar angle acceptance (18◦ ≤ θ ≤ 85◦), will +perform reference measurements for CBM at lower SIS-100 energies. This will be done with light +collision systems, e.g., proton beams and heavy-ion beams with moderate particle multiplicities +(such as Ni+Ni or Ag+Ag collisions) [380]. Altogether, CBM represents an opportunity to link +the physics programs at SIS-18 and RHIC, thereby leading to a continuation of the Beam Energy +Scan program (see also the white paper on QCD Phase Structure and Interactions at High Baryon +Density: Continuation of BES Physics Program with CBM at FAIR [151]). +Overall, STAR-FXT and CBM-FAIR are capable of performing high-statistics multi-differential +measurements of the relevant EOS observables. However, a successful inference of the EOS depends +on comparisons to transport simulations. Although many transport codes are available for describ- +ing heavy-ion collisions in different energy ranges and extracting the underlying EOS (see [47] for +a review), currently none of the available codes can reproduce all proposed experimental observ- +ables (see, e.g., Fig. 14). A meaningful description of experimental data in the STAR-FXT and + +O +米O +米42 +CBM-FAIR range will require transport codes to incorporate physics allowing reproducing all of +the above-mentioned key measurements and more, see Section II A. +B. +Experiments to extract the symmetry energy +The energy contribution from the isospin dependence term, also known as the symmetry energy, +is a small fraction of the total energy of a nucleus even for neutron-rich heavy radioactive isotopes +(< 5% in the liquid drop model). However, due to the large isospin asymmetry in neutron stars, +the density dependence of the symmetry energy is very important, determining many neutron star +properties, including their size and the cooling pathways via neutrino emission. While experimental +inferences of the symmetry energy pose significant challenges, researchers have developed methods +to elucidate the relatively small effects that the asymmetry has on isospin-dependent observables, +e.g., by measuring ratios of neutron and proton observables or charged pion observables. Exper- +imental as well as theoretical systematic errors are further minimized by taking double ratios of +the same observable using two reactions that differ mainly in the neutron/proton content, as in +the measurement of isoscaling. To reach the widest range of asymmetry between reactions, intense +radioactive beams are necessary. Large experiments designed to measure symmetry energy can re- +quire large collaborations. However, small-scale experiments can likewise have an impact on some +of the outstanding problems. Consequently, many groups contribute to the diverse experimental +results. +1. +Experiments that probe low densities +At beam energies below Elab = 100 AMeV (√sNN = 1.93 GeV), the colliding nuclei overlap +briefly and then expand, with most of the detected particles being emitted during the expansion +stage. The rates of emission of neutrons and protons during the expansion are influenced by the +symmetry energy. Some nucleons emerge within fragments or clusters that are formed and emitted +throughout the reactions. Nearly all theory studies require the symmetry energy to be zero at zero +density. However, before matter reaches zero density, at low densities of (0.002 ≤ n/n0 ≤ 0.02) +many nucleons combine into clusters and preserve the information about the symmetry energy at +those low densities. In the estimation of Wada et al. [385, 386], clustering has a significant impact +on the symmetry energy below 0.03 nucleons/fm3, see Fig. 17 (we note here that this conclusion +depends on the definition of the symmetry energy). Overall, the presence of clusters changes the +characterization of the symmetry energy. Nonetheless, low-density clusterization is an important +ingredient in supernova matter and for the EOS in the neutrino sphere. It is also relevant to the +nature of proto-neutron star matter as it cools and the crust crystallizes [387]. +2. +Measurements to extract symmetry energy up to 1.5n0 +In the past decade, many studies have been conducted to extract the symmetry energy and +symmetry pressure [70], mostly at low densities. Since the nuclear EOS should give a good de- +scription of the properties of the nuclei, including the masses or binding energies, the large nuclear +mass data base provides a great resource to determine the symmetry energy at about (2/3)n0 from +(1) masses of double magic nuclei using Skyrme density functional [72], (2) nuclear masses using +density functional theory [71], and (3) the energies of isobaric analogue states [12]. +By nature, a heavy nucleus has excess neutrons which are needed to overcome the Coulomb +repulsion from the protons inside the nucleus. The symmetry-energy forces the excess neutrons + +43 +FIG. 17. The symmetry energy of clustered matter at very +low densities. Figure from [385]. +to the surface. +This surface layer of ex- +cess neutrons is referred to as a neutron +skin. +Thickness of this neutron skin re- +flects the symmetry pressure, or equiv- +alently the slope of the symmetry en- +ergy at the saturation density. The long- +awaited measurements of the neutron skin +of the 208Pb nucleus inferred from par- +ity violation in electron scattering were +recently published by the PREX collab- +oration [74, 388]. +The measured value +of 0.283 ± 0.071 fm, corresponding to the +symmetry pressure of 2.38±0.75 MeV/fm3 +at (2/3)n0, is rather large and disagrees +with most theoretical predictions. Subse- +quently, the PREX/CREX collaboration +measured the neutron skin of 48Ca to be +0.121 ± 0.026 (exp) ± 0.024 (model) fm +[389], which is much thinner than the +208Pb skin. +However, the 48Ca value is +much closer to the theoretical predictions. +The discrepancies between the two results and the expectations from models have not been re- +solved, and the CREX collaboration has not released official values for the slope of the symmetry +energy or symmetry pressure, even though there have been many attempts by outside groups to +resolve the apparent discrepancies between the two skin measurements [390–392]. +In the last few years, an alternative way to measure skin thickness has been proposed [393]. +In the limit of an exact charge symmetry, the proton radius of a given nucleus is identical to the +neutron radius of its mirror partner. Thus the neutron skin for a given nucleus may be determined +from the difference in proton radii measured in these mirror pairs. In reality, there are relativistic +and finite-size corrections, as well as corrections from the Coulomb force which breaks the isospin +symmetry. In principle, these corrections can be calculated within the energy density functional +theory. While larger neutron skins are expected in heavier nuclei due to the larger neutron excess, +making them a better probe, proton-rich mirrors of heavy nuclei is typically far beyond the limits +of existence. Thus this technique is limited to species of relatively low mass and isospin. Even with +the use of high-intensity isotope beams near the proton driplines, it is still a challenge to do such +experiments. The most recent result with this technique is from the 54Ni-Fe mirror pair [394]. +Complementary to structure experiments, heavy-ion collisions have probed the symmetry en- +ergy and pressure over a wide density range. +At incident energies below Elab = 100 AMeV +(√sNN ≤ 1.93 GeV), low densities (estimated to be around (1/3)n0) are reached when matter +expands after the initial impact and compression of the projectile and target. +Therefore, the +corresponding experimental observables primarily reflect the symmetry energy at sub-saturation +densities [6, 98]. The transport of neutrons and protons allows systems with isospin gradients to +equilibrate, where the degree of equilibration depends on the strength of the potential experienced +by the nucleons and the duration of transport. The technique of equilibration chronometry al- +lows the visualization of the time evolution of the neutron excess. Signatures of neutron-proton +equilibration obeying first-order kinetics are observed both in experimental data [395–398] and in +transport calculations +[399]. Since the equilibration depends on the neutron and proton chem- +ical potentials, this technique offers new experimental data to constrain the sub-saturation EOS +through comparisons with simulations [6, 47, 400]. + +25 +20 +15 +(MeV) +10 +5 +0 +10-3 +10-2 +10-1 +p(N +/fm3) +nucleon44 +Isoscaling was first observed in central 124Sn+124Sn and central 112Sn+112Sn collisions at beam +energy Elab = 50 AMeV (√sNN = 1.90 GeV) [401, 402]. Isoscaling describes a simple scaling law +governing the ratios of isotope yields from two systems which differ mainly in their neutron-proton +composition. It arises from the differences in the neutron and proton chemical potentials of the +two reactions and is, therefore, sensitive to the symmetry energy. The isospin diffusion, derived +from the isoscaling observable, reflects the driving forces arising from the asymmetry term of the +EOS [6, 400, 403, 404] and provides a measurement of the symmetry energy at around (1/3)n0 [70]. +Other observables used to study the symmetry energy with light charged particles include both +n/p and t/3He ratios and their double ratios obtained from two reactions with different isospin +content [47, 95, 96, 100, 405]. Due to the difficulties in measuring neutrons, neutron data is not +widely available. However, recent isoscaling measurements have allowed the construction of “pseudo +neutrons”, that is a reconstruction of neutron yields from light particle ratios such as t/3He [406]. In +particular, this method allows for a reconstruction of low-energy neutrons. However, due to the lack +of high-energy charged particles data, it is a challenge to reconstruct high-energy neutron spectra +in this way. Therefore, to study the symmetry energy at supranormal densities, neutron arrays +constructed with new advanced materials will be needed in the next generation of experiments. +In experiments utilizing central 124Sn+124Sn and central 112Sn+112Sn collisions at Elab = +120 AMeV (√sNN = 1.94 GeV) [407], the spectra of neutrons emitted to 90 degrees in the center- +of-mass frame are compared to the corresponding proton spectra. Transport calculations predict +that if the effective masses of neutrons and protons satisfy m∗ +n < m∗ +p, then fast neutrons coming +from the compressed participant region experience a more repulsive potential and a higher accel- +eration than do fast protons at the same momentum, resulting in an enhanced ratio of neutron +over proton (n/p) spectra at high energies. In contrast, calculations for m∗ +n > m∗ +p predict that the +effective masses enhance the acceleration of protons relative to neutrons, resulting in a lower n/p +spectral ratio. Bayesian analysis of the experimental results [98] compared to ImQMD calculations +shows that the values of the first two Taylor expansion coefficients of the symmetry energy, S0 +and L, depend on both the symmetry energy and to the effective mass splitting. More examples +of Bayesian analyses used to simultaneously constrain multiple parameters will be discussed in +Section IV B, where methods to extract multiple transport model input parameters are discussed. +3. +Selected constraints on the symmetry energy around 1.5n0 +Current constraints on the symmetry energy above saturation are obtained with large uncer- +tainties, mainly at densities around 1.5n0. This is the area of future opportunities, and we discuss +this in more detail here to illustrate the complexity of the experiments and analyses as well as the +central role played by transport models. +The nucleon elliptic flow is sensitive to the pressure generated in nuclear collisions and, there- +fore, to the EOS. Since a higher symmetry pressure will yield a larger magnitude of the elliptic flow +at midrapidity for neutrons than for protons, comparisons of the neutron and proton elliptic flows +provide sensitivity to the density-dependence of the symmetry energy [95]. The neutron and hydro- +gen elliptic flow from Au+Au collisions at a beam energy of Elab = 0.4 AGeV (√sNN = 2.07 GeV) +were measured in the FOPI-LAND and Asymmetric-Matter EOS (ASY-EOS) experiments, using +the Land Area Neutron Detector (LAND) for the measurement of the neutron flow. A comparison +of data to UrQMD simulations, shown in Fig. 18, was used to extract the dependence of the sym- +metry energy on density, parametrized as proportional to (nB/n0)γasy, and the symmetry energy +slope parameter L. The FOPI-LAND experiment reported γasy = 0.9 ± 0.4 and L = 83 ± 26 MeV +[68], whereas the ASY-EOS obtained γasy = 0.72 ± 0.19 and L = 72 ± 13 MeV [69], indicating +a moderately soft symmetry energy (see Fig. 18 and also Fig. 9). The analysis also illustrates + +45 +FIG. 18. Ratio of the elliptic flows of neutrons over +charged particles vn +2 /vch +2 +as a function of transverse +momentum per number of constituent nucleons pt/A +in Au+Au collisions at Elab = 0.4 AGeV (√sNN = +2.07 GeV). The comparison between ASY-EOS mea- +surements (square black symbols) and UrQMD trans- +port model calculations with a soft (pink dots) and +hard (green triangles) symmetry potentials shows a +preference for a soft symmetry energy; solid red line +indicates γasy = 0.75 ± 0.10. Figure from [69]. +the dependence of S0 and L on other in- +put parameters of the EOS, such as γasy. +A +subsequent comparison of data with dcQMD +model [408] gives a value of L = 85 ± 32 MeV +at n = 1.5n0. +In addition to the ASY-EOS experiment, +another effort that explores this density region +is the SAMURAI Pion-Reconstruction and Ion- +Tracker (SπRIT) experiment, performed with +radioactive tin isotopes at RIKEN, Japan. For +constraining the symmetry energy at supra- +saturation densities, pion yield ratios are con- +sidered as a unique observable since they do +not form composite particles with other parti- +cles. +This makes their yields independent of +clusterization processes which can affect the +symmetry energy (see Section III B 1). Further- +more, pion observables are predicted to be sen- +sitive to the nuclear EOS at high densities due +to their unique production mechanism: Above +Elab = 200 AMeV (√sNN = 1.97 GeV), some of +the interactions occurring in central collisions +are energetic enough to form excited ∆(1232) baryon resonances (through the NN ↔ N∆ scatter- +ing process), which then promptly decay into pions and nucleons. The high production threshold of +the ∆(1232) resonance ensures that pions originate from the early stages of the reaction, and there- +fore from regions characterized by a high density. The SπRIT collaboration measured charged pion +emission from systems characterized by a wide range of asymmetry [102] by colliding tin isotope +beams of 108,112,124,132Sn with isotopically enriched targets of 112,124Sn). +The production of π− strongly depends on n-n collisions in the high-density region, while π+ +production largely depends on p-p collisions (the production of π− and π+ is equally likely in n-p +collisions). It follows that the relative production of π− and π+ depends on the relative numbers +of neutrons and protons and, therefore, is sensitive to the symmetry energy in the high-density +region. Assuming a ∆-resonance model for pion production, one would expect that the pion yield +ratio Y (π−)/Y (π+) follows a (N/Z)2 dependence [95, 367]. However, the measured total pion yield +ratio follows N/Z with a best-fitted power index of 3.4, as shown in Fig. 19, where yield ratios +without a transverse momentum cut are depicted by yellow crosses with circle markers. The radius +of the circle in the center of each cross represents the experimental uncertainty, showcasing very +good experimental accuracy of the measurement in which systematic errors are reduced by taking +pion yield ratios. Moreover, comparisons of systems with different N/Z measured in the same ex- +periment reduces systematic errors [409]. The discrepancy between the theoretical expectation and +experimental data indicates the presence of dynamical factors beyond a simple ∆-resonance model, +while the large measured exponent suggests that the ratios are strongly affected by the symmetry +energy. When a transverse momentum cut of pT > 180 MeV/c is imposed, the result (represented +in Fig. 19 by blue crosses with circle markers) still shows the same (N/Z)3.4 dependence, suggesting +that effects due to the symmetry energy persist in high-momentum pions. Interestingly, current +transport models do not seem to be able to reproduce the strong N/Z dependence [102]. +While Fig. 19 shows the total yield, the left panel of Fig. 20 focuses on the pT -dependence of the +single ratio spectrum SR(π−/π+) = [dN(π−)/dpT ]/[dN(π+)/dpT ] for two extreme cases: reactions +of neutron rich (132Sn+124Sn) and of near-symmetric (108Sn+112Sn) systems. The data is compared + +E +1.3 +1.2 +y=0.75±0.10 +1.1 +2 +0.9 +stiff +0.8 +T +0.7 +0.6 +0.5 +soft +0.4 +0.3 +0.4 +0.5 +0.6 +0.7 +p/A (GeV/c)46 +1.2 +1.3 +1.4 +1.5 +1.6 +N/Z +1 +2 +3 +4 +5 +6 +Y( +)/Y( ++ ) +pT > 0 MeV/c +pT > 180 MeV/c +y = 1.1(N/Z)3.4 +y = 0.5(N/Z)3.4 +FIG. 19. Ratios of yields of π− over yields of π+ in +central (b < 3 fm) events for pions with pz > 0 in the +center-of-mass frame, plotted as a function of N/Z. +The yellow crosses show yield ratios with no transverse +momentum cut, while the blue crosses show yield ra- +tios for pT > 180 MeV/c. +The radius of the circle +inside each cross represents the statistical uncertainty +of the ratio. The dashed blue and dotted blue line cor- +responds to the best-fitted power functions of N/Z for +pT > 0 and pT > 180 MeV/c pion ratios, respectively. +Figure from [410]. +with the dcQMD model [145, 408], a Quantum +Molecular Dynamic transport model that in- +cludes total energy conservation and other ad- +vanced features. To extract the EOS, the dcQMD +model was used to predict single ratios with +12 different parameter sets in the (L, ∆m∗ +np) +space, forming a regular lattice; here, L is the +slope of the symmetry energy and ∆m∗ +np is the +neutron-proton effective mass splitting. +The +value of L in the lattice is either 15, 60, 106, +or 151 MeV and ∆m∗ +np/δ is either -0.33, 0, or +0.33. All other input parameters in the dcQMD +have been fixed by comparing to FOPI data, +as well as by comparing the predictions to the +total yield of the charged pions and the aver- +age pT obtained from the pion spectra. +De- +tails of the comparison can be found in Ref. +[101]. +The left panel in Fig. 20 shows a few +selected calculations and the measured single +ratios. +The (L, ∆m∗ +np) values for the solid +blue line are (60, −0.33δ), for the dashed blue +line are (60, 0.33δ), for the solid red line are +(151, −0.33δ), and for the dashed red line are +(151, 0.33δ). Coulomb effects dominate the low pT region, causing a steep rise in the measured +ratios at pT < 200 MeV/c. All calculations at pT < 200 MeV/c disagree with data, which could be +caused by inaccuracies in the simulation of Coulomb interactions or of the pion optical potential +above the saturation density. At pT > 200 MeV/c, the Coulomb and pion potential effects diminish +and the ratios should be good probes of the symmetry energy effects. +The predicted single ratios at pT > 200 MeV/c are interpolated with 2D cubic splines over +the (L, ∆m∗ +np) space, and the interpolated predictions are then compared to experimental mea- +surements through a chi-square analysis. The resultant multivariate constraint on L and ∆m∗ +np is +shown in the right panel of Fig. 20, where the green shaded region is the 1σ confidence interval +and the area enclosed by the two blue dashed curves is the 2σ confidence interval. The corre- +lation between ∆m∗ +np and L occurs because both parameters influence the nucleon momenta; L +influences the momenta through its isospin-dependent contribution to the nucleon potential en- +ergy, and ∆m∗ +np influences the momenta via its isospin-dependent impact on the nucleonic kinetic +energy. Either increasing L or decreasing ∆m∗ +np will increase the energies of neutrons relative to +protons. This increases the numbers of n-n collisions relative to p-p collisions at energies above +the pion production threshold and enhances the production of π− relative to that for π+. +4. +Challenges and opportunities +Experiment and theory +Currently, there are few experiments that aim at inferring the symmetry energy and symmetry +pressure from heavy-ion collisions probing densities of 1–2n0. Furthermore, the available constraints +have very large uncertainties, especially for the symmetry pressure. It is worth noting that heavy- +ion collision experiments do not measure the symmetry energy or pressure directly, but rather +they depend on comparisons with transport model simulations that describe the dynamics of the + +47 +0 +100 +200 +300 +400 +pT (MeV/c) +100 +101 +Single Ratio (SR) +132Sn + 124Sn, E/A = 270 MeV +0 +100 +200 +300 +400 +pT (MeV/c) +108Sn + 112Sn, E/A = 270 MeV + L(MeV) m * +np +60 -0.33 +60 0.33 +151 -0.33 +151 0.33 +50 +100 +150 +L (MeV) +−0.3 +−0.2 +−0.1 +0.0 +0.1 +0.2 +0.3 +∆m∗ +np/δ +1-σ +2-σ +FIG. 20. Left panel: Single pion spectral ratios for 132Sn+124Sn (top) and 108Sn+112Sn (bottom) reac- +tions with four selected dcQMD predictions overlaid [86]. Right panel: Correlation constraint between L +and ∆m∗ +np/δ, extracted from pion single ratios at pT > 200 MeV/c in collisions of both neutron-deficient +108Sn+112Sn and neutron-rich 132Sn+124Sn systems. The light blue shaded region (dashed blue lines) cor- +responds to 68% (95%) confidence interval [101]. +collisions [47]. +The large uncertainties in available constraints mainly arise from the intrinsic +uncertainties of the transport models and the accuracy of determining the parameters used as an +input in these models. For example, a general feature of low-energy heavy-ion collisions is that +more nucleons are emitted in light clusters than are emitted as free neutrons and protons, while +the reverse is true of most transport model simulations of these reactions. Theoretical approaches +to this issue have been proposed (see Section II A), but are rarely implemented to model the +coalescence of nucleons in the medium into the observed distribution of clusters, and therefore it is +not clear to what extent these approaches are valid. The current inaccuracy in cluster production +complicates and limits the scientific conclusions that can be drawn by comparing data to transport +theory, and therefore improving the accuracy of cluster production in transport theory would be a +very significant achievement, enabling more stringent constraints on the symmetry energy. +It is important to quantify major sources of systematic uncertainties in the transport model +implementations and in the model parameters. Due to the quality as well as technical details of +solutions adopted in different models, it may not be realistic to establish all uncertainties for all +transport models. Nonetheless, developing methods to validate transport models and performing +these validations remains a primary goal for the Transport Model Evaluation Project (TMEP) +collaboration, and it is essential to extracting reliable constraints on the EOS from heavy-ion +collisions (see Section II A). +The current capabilities at FRIB, using beam energies up to Elab = 200 AMeV (√sNN = +1.97 GeV), allow for exploration of densities up to 1.5n0, and the neutron excess can be varied +over a wide range by changing the composition of the rare isotope beams and targets, allowing +to more closely recreate the matter found in extreme astrophysical environments (e.g., neutron +stars). From the dense collision region in heavy-ion collisions, pions and free nucleons are emitted +with high transverse momentum. The relative yields of these particles, especially as a function of +energy, as well as particle elliptic flow contain information about the dense collision zone and thus +can be used to constrain the EOS that governs supra-saturation matter. Individual efforts based +on small-scale experiments, which are the strength of the field, have provided a diversity of results. +However, in order to take advantage of multiple-parameter Bayesian analyses, described below, +and given the tight allotment of the expensive (and coveted) beam time, future experiments should +utilize detectors that provide large coverage. The development of the time projection chamber + +48 +(TPC) detector at FRIB is essential to measure both pions and charged particles. The detector +can be coupled with an upgraded or a new Large Neutron Array (LANA) to measure both charged +particles and neutrons. Additionally, putting the TPC detector at the target position of the High +Rigidity Spectrometer (HRS) enables coincident measurement of projectile-like fragments. The +determination of the centrality and the reaction plane, required, e.g., for the elliptic flow studies, +would benefit from a construction of a 4π detector placed around the target when the silicon +detectors are used to identify the charged particles before the completion of the HRS. Such a +detector would have to measure the energies of the emitted fragments and nucleons as well as their +multiplicities with minimal energy losses. +Reaching higher densities requires the energy upgrade to Elab = 400 AMeV (√sNN = 2.07 GeV). +With the capability for producing high-intensity rare isotope beams with a wide range of asymme- +tries, FRIB400 is essential for the U.S. effort to lead in the determination of the density-dependence +of the symmetry energy [22]. +The beams available at FRIB, being complementary to those that can be accelerated at Eu- +ropean facilities, may represent a unique opportunity to conduct nuclear transport investigations +also by the international nuclear physics community. As described above, the development of de- +tector arrays with high isotopic resolution over a wide dynamic range, from light particles to heavy +fragments, provides the prospect of measuring observables (especially in the context of isospin +diffusion and drift as well as in collective motion phenomena) that can amplify the sensitivity to +the symmetry energy. Coupled with its capability to use high-quality radioactive beams, FRIB +may represent a focus of interest for a wider community, stimulating the need for international +discussions and collaborations in the coming years. Such an interest may concern also theoretical +physicists that have been collaborating with FRIB colleagues within the Transport Model Evalu- +ation Project (TMEP) initiative, aimed at improving investigations of the isospin-dependent EOS +with comparisons to experimental observables (see also Section II A). +Multiple Parameter Bayesian analysis +The EOS is only one of many input parameters in transport models used to simulate heavy-ion +collisions. Often, multiple measurements probing different parts of the collisions are needed to +constrain other parameters of these models, such as the momentum-dependence of the isovector +mean-field potential, or the in-medium isospin-dependent cross sections. However, constraining +transport model parameters with experimental results is a delicate endeavor. The outcomes of +nuclear collisions are influenced by a multitude of processes, and therefore the experimentally +measured final stage observables can depend simultaneously on values of multiple parameters. +However, carefully chosen observables may only be sensitive to just a few specific parameters. The +full extent of the dependence of a given transport model on input parameters can only be tested +empirically after performing a complete series of simulations of heavy-ion collisions. +Bayesian statistical methods provide means to quantify the relation between observable values +and physical parameters. They also provide a systematic way of constraining multiple nuclear +properties and utilizing prior knowledge from different experiments, prior constraints from other +sources, and results from new experimental measurements. For example, in the n/p ratio exper- +iment mentioned above, measuring the yield ratios of neutron and protons spectra, a Bayesian +analysis comparing the experimental results [98] to ImQMD calculations determines both ∆m∗ +np and +the relationship between S0 and L, even though the uncertainties are large. More precise measure- +ments in the future will enable a better resolution. +In the long term, it is important to develop Bayesian analyses of multiple observables to de- +termine multiple parameters simultaneously. +As an example, in the SπRIT experiment many +observables have been measured with four reaction systems. Eight observables in total, including +the directed flow, elliptical flow, and the stopping observable from different reactions, are fitted si- + +49 +FIG. 21. Posterior distribution obtained from a Bayesian analysis of ImQMD simulation results and experi- +mental data from SπRIT experiments [410]. Eight available observables are used for Bayesian analysis. The +values for median and 68% confidence interval of the marginalized distribution are tabulated on the upper +right-hand side of the figure. Figure from [410]. +multaneously by varying five transport model input parameters (two pertaining to the shape of the +symmetry energy term in the nuclear matter EOS, two pertaining to the nuclear effective masses, +and one pertaining to the nuclear in-medium cross-section). The posterior distribution shows a +weak constraining power on the symmetry energy terms, but a strong sensitivity to effective masses +and in-medium cross-section [410], see Fig. 21. +The posterior parameter distributions are generated from repeated sampling of transport model +predictions for hundreds of thousands of times, each with different parameter values. If carried out +directly, this process would consume an unreasonable amount of computational resources. This can +be alleviated with an effective, efficient, and capable model emulator which emulates the behavior +of transport models at all points of the allowed parameter space from predictions at just a few tens +of parameter values. Gaussian processes are readily available and commonly used in emulators, +but the procedures for tuning hyperparameters vary across analyses. Numerous heuristics and cost +functions are proposed for the optimization of hyperparameters, and one can also marginalize over +all nuisance parameters with a Markov chain Monte Carlo. + +50 +(MeV) +S +30 +150 +(MeV) +100 +50 +1.0 +Nu/ +0.8 +Nu/ +1.00 +0.75 +0.25 +0.00 +n +-0.25 +30 +40 +50 +50 100 150 +0.8 +1.0 0.75 1.00 -0.25 0.00 +0.25 +So (MeV) +L (MeV) +ms /mN +m,/mN +n50 +IV. +THE EQUATION OF STATE FROM COMBINED CONSTRAINTS +Nuclear +Neutron star +Isospin diffusion in HICs +Masses and radii +Dipole polarizability +Tidal deformability +Spectral ratios of light clusters +Moment of inertia +Nuclear masses and radii +Gravitational binding energy +Isobaric analog states +Cooling of young neutron stars +n/p ratios in HICs +Bulk oscillation modes +Neutron skins +Crust cooling +Mirror nuclei +Pulsar glitches +Giant resonances +Lower and upper limits on neutron star spin periods +Flow of particles in HICs +Torsional crust oscillations +Charged pion ratios in HICs +Crust-core interface modes +TABLE I. Illustrative list of nuclear and astrophysical observables. +There have been many attempts to extract the equation of state (EOS) as a function of density +from both nuclear experiments and astronomical observations. In Table I, we provide an illustrative +list of relevant experimental and observational measurements. Importantly, these observables probe +the EOS at different densities: a few probe the EOS near the saturation density n0, but many probe +densities that are significantly higher or lower. For example, nuclear structure typically probes +densities that are somewhat lower than n0, while analyses of heavy-ion collisions or properties of +neutron stars probe larger density ranges, as schematically illustrated in Figs. 12 and 22. +Comparing constraints based on different measurements allows one to test their consistency and +ultimately find tight constraints on the EOS over the full range of densities that can be probed +either by experiments or by astronomical observations. Techniques of Bayesian inference or Pearson +correlation analyses are well-suited to this endeavor and can provide more readily useful and +Astro (M,R,Λ)� +HIC� +Astro: crust observables� +Chiral EFT� +Nuclear masses, � +Δrnp, αD, ….� +FIG. 22. An ensemble of EOSs that range over crust and +core uncertainties consistently. Ranges over which differ- +ent nuclear and astrophysical probes provide information +about the neutron star EOS are indicated. Figure modified +from [411]. +testable +information +on +the +density- +dependence of the EOS than, e.g., statis- +tical comparisons or combining the Taylor +expansion coefficients (such as S0, L, and +Ksym) obtained from individual analyses. +Key to this approach is the determination +of the density that each experimental ob- +servable most accurately probes. +Away +from that density, weaker constraints on +the EOS are possible, but the analysis is +more complex. +In this section, we review the variety of +observables that have been used to place +constraints on the EOS; heavy-ion collision +experiments, which produce many of these +constraints, are described in Section III. +We then discuss recent attempts at com- +bining various constraints that result in +meaningful EOSs with quantified uncer- +tainties. + +???? +Outer Crust +Outer +Inner Core +Neutron Drip +Inner Crust +Crust/Core Transition +Core +1036. +pressure (Dyne/cm2) +1034 +1032 +1030 +J, L, Ksym +in1! +n2 +1011 +1012 +1013 +1014 +1015 +1016 +energy density (g/cm3)51 +A. +Constraints +As discussed in Section III, experiments are often designed to explore certain aspects of the EOS. +Accordingly, we classify the constraints obtained from laboratory measurements as sensitive to +either the symmetric nuclear matter EOS or the symmetry energy. In addition to the experimental +inferences, constraints on the EOS can be also obtained from neutron star observations as well as +from chiral EFT theory at low densities. The list of constraints discussed here is not exhaustive. +Rather, it represents a slice of widely acknowledged constraints at the moment of writing. We note +that some of the constraints reviewed here have already been presented in Sections II and III, to +which we refer when appropriate. +Symmetric matter constraints from laboratory experiments +Some properties of the symmetric nuclear matter are fairly well-known near n0. For exam- +ple, the generally accepted values of n0 and binding energy at saturation E0 are 0.16 fm−3 and +−16 MeV [198, 203], respectively, to within 4%. The incompressibility parameter, K0, has been +determined from giant monopole resonance (GMR) experiments [412] to be 231±5 MeV. However, +subsequent GMR measurements of the Sn isotopes cast larger uncertainties on K0 [213]. While +these larger uncertainties are consistent with values of K0 determined from heavy-ion collision +experiments [67, 353, 413], we note here that these experiments derive their constraints on K0 +based on density functionals that are parametrized with K0, but used to describe the high-density +behavior of the EOSs (i.e., these experiments do not probe the incompressibility at saturation; see +also a similar discussion in Section II A 2). Measurements of the collective flow from high energy +Au+Au collisions have constrained the EOS for symmetric nuclear matter at densities spanning +(1–4.5)n0 [31, 58, 66, 67] (see the left panel in Fig. 9), as described in Sections II A 2 and III A. +Symmetry energy constraints from laboratory experiments +In the past decade, many studies have been conducted to extract the symmetry energy and +the symmetry pressure, and some of the widely-known constraints are plotted in the right panel +of Fig. 9, which includes both the usual EOS constraint bands as well as symbols located at +densities which a novel analysis in Ref. [70] identified as the most sensitive densities for a given +measurement. At (2/3)n0, precise symmetry energy constraints have been obtained from studies +on nuclear masses using Skyrme density functional forms for the EOS. These are labeled in the +right panel of Fig. 9 as “mass(Skyrme)” [72] and “mass(DFT)” [71], respectively. In this density +region there are also precise constraints obtained from the energies of isobaric analogue states [12], +indicated in the right panel of Fig. 9 by a data point labelled as “IAS”. The dipole polarizability +αD, reflecting the response of a nucleus to the presence of an external electric field, also helps to +constrain the symmetry energy at low densities. Constraints on the symmetry pressure Psym, which +is proportional to the derivative of the symmetry energy with respect to density, have been recently +provided by the measurements of the neutron skin of 208Pb in the Lead Radius EXperiment (PREX +and PREX-II) [74, 388, 414] and of the neutron skin of 48Ca in the Calcium Radius EXperiment +(CREX) [389–391], both at Jefferson Lab, which use parity-violating weak neutral interactions to +probe the neutron distribution in 208Pb and 48Ca. A range of other scattering experiments have +measured the neutron skins of a number of neutron-rich isotopes and likewise used them to constrain +the symmetry energy [7, 415, 416]. Giant dipole resonances and polarizabilities [9, 417, 418] in +neutron-rich isotopes provide another source of information about the symmetry energy [335, 419– +424], as do mirror nuclei [393, 394]. At densities far from (2/3)n0, heavy-ion collisions have been +used to probe the symmetry energy, as is described in Sections II A 2 and III B 3, and shown in the +right panel of Fig. 9. + +52 +Constraints from astronomical observations +The bulk properties of neutron stars (such as their maximum mass, radii, tidal deformabilities, +moments of inertia, limits on the rotation frequency, and binding energy) depend strongly on the +distribution of matter throughout the star, therefore providing a measure of the EOS integrated +over the range of densities present in the star. The mass-radius relationship has a one-to-one corre- +spondence to the neutron star EOS [425], and it is known that the radius, the tidal deformability, +and the moment of inertia provide the strongest constraints on the EOS above 2n0 [251, 426], +while the maximum measured mass of neutron stars constrains the EOS at the highest densities. +Together, the tidal deformability measured in GW170817, the mass of J0740+6620, and the two +mass-radius measurements of NICER, discussed in Section II C, form the current gold standard in +measuring the neutron star properties using astronomical observations. +A number of astronomical observables also probe the neutron star crust physics, which results +in constraints on the pure neutron matter EOS, and in particular on the symmetry energy. This +is because the neutrons provide the hydrostatic pressure that supports the inner crust, and the +interplay between these neutrons and the lattice of nuclei that makes up the crust determines the +crust-core boundary as well as the possible nuclear pasta shapes that appear near that boundary. +The crust physics also depends, more weakly, on the symmetric matter EOS. The nuclear EOS +at subsaturation densities, down to where the neutron drip begins (nB ≈ 10−4n0), is therefore an +essential ingredient in crust models. +Due to the complexity of crust physics, extracting rigorous EOS constraints from observations +of crust-associated neutron star behavior is in its early stages, and it is an area where substantial +progress can be made over the next decade. Here we list some constraints on the symmetry energy +as an illustration of this potential, but, at the same time, we note that they are very tentative and +do not have well-quantified errors; indeed, some of them are mutually exclusive, emphasizing the +need to make progress in applying microscopic nuclear physics models to these observations. +Constraints on the symmetry energy and its slope can be obtained from studying the following +phenomena: A study of the cooling of the neutron star in the Cas A supernova remnant [312], +which has been observed to cool on a timescale of decades, implies that the neutron star core may +have superfluid properties [265, 427, 428]. Studying the temperatures of the population of neutron +stars whose surface X-ray emission is observable leads to constraints on the neutron star masses +and radii and the composition of the core [429]. Constraints from quasi-periodic oscillations in +the X-ray tail of gamma-ray flares from soft gamma-ray repeaters [285, 430, 431], which could be +a signature of torsional oscillations of the crust. Potential measurements of the crustal moment +of inertia from glitches – sudden changes in rotation frequency – of radio pulsars and some X-ray +pulsars [432–437]. +Limits on the longest and shortest observed periods of neutron stars probe +physics such as the magnetic field evolution in the crust [438] and the development of rotation- +induced instabilities in oscillations such as r-modes [439, 440]. During the last few seconds of an +inspiral prior to the merger of two neutron stars or a neutron star with a black hole, tidal forces +may shatter the crust, causing a gamma-ray flare: in this scenario, coincident timing of the flare +with the gravitational wave signal measures the resonant frequency of crust-core interface modes +and sets constrains on the symmetry energy [276, 441]. The cooling of the crusts of quiescent +low-mass X-ray binaries promises to provide a source of constraints on the composition and size of +the neutron star crust and the extent of nuclear pasta phases therein [283, 442–444]. The expected +accurate measurement of the moment of inertia of pulsar J0737-3039a [445] will set constraints on +the EOS competitive with the current radius constraints [446–450]. The heat capacity of a neutron +star core can be measured by using inferences of the core temperature of transiently-accreting +neutron stars, and strongly suggests that a core dominated by a color-flavor-locked quark phase is +ruled out [451]. Some such objects are observed to have efficient cooling in the core, constraining +superfluid gap models and the symmetry energy [452]. + +53 +Constraints from nuclear theory +In recent years, many-body nuclear theory such as chiral effective field theory (χEFT), discussed +in Section II B, has made significant progress to be considered as the canonical nuclear matter +EOS at low densities with rigorous uncertainty quantification [155–158]. Even though the theory +is developed mainly for densities below saturation, it has been extended to 2n0, and it is a popular +constraint for studies that focus mainly on astronomical observations. +B. +EOS obtained by combining various constraint sets +Each of the nuclear and astrophysical observables discussed above provides vital information +about the EOS over some density range, that can be combined with other constraints to globally +constrain the density-dependence of the EOS from sub-saturation to supra-saturation densities. +Such analysis techniques are relatively new, but several of such global constraints now exist, and +a selection of studies is briefly described below to illustrate their potential. +Beloin et al. [429] used relativistic mean-field models of the nuclear interaction to model the +structure and cooling of neutron stars. +This analysis consistently combines nuclear data, neu- +tron star mass-radius measurements, and neutron star cooling measurements within a Bayesian +framework. +Legred et al. [251] performed nonparametric EOS inference based on Gaussian processes. It +combines information from X-ray, radio, and gravitational wave observations of neutron stars. +Their results are plotted in Fig. 23 and labelled as “Legred et al.”. +These Bayesian analyses +incorporate astrophysical data and provide constraints on the neutron star EOS at higher densities. +Drischler et al. [453] performed a Bayesian analysis of correlated effective field theory truncation +errors based on order-by-order calculations up to next-to-next-to-next-to-leading order in the χEFT +expansion. The neutron star matter pressure calculated with these EOS is shown in Fig. 23 and +labeled as “Drischler et al.”. +Huth et al. [17] combined nuclear theory via χEFT calculations (constraining the EOS below +1.5n0), EOS inferences from heavy-ion collisions via the FOPI (constraining the symmetric matter +EOS up to 2n0) and ASY-EOS (constraining the symmetry energy at around 1.5n0) experiments, +Huth et al. +Drischler et al. +Legred et al. +Pressure [MeV/fm3] +0.1 +1 +10 +100 +baryon density nB/n0 +0.5 +1 +1.5 +2 +2.5 +3 +FIG. 23. The pressure of neutron star matter as a func- +tion of number density nB, as obtained by Huth et al. [17], +Drischler et al. [453], and Legred et al. [251] at 95%, 95%, +and 90% confidence interval, respectively. +and astrophysical data on bulk neutron star +properties (constraining the total neutron +star EOS above 2n0). The EOS models were +extended to high densities using a speed- +of-sound model. +The results are shown in +Fig. 23 and labeled as “Huth et al.”. +Yue et al. [454] constructed neutron star +models using a Skyrme energy-density func- +tional, which allowed them to consistently +calculate the neutron skin of +208Pb and +combine constraints from heavy-ion colli- +sions, measurements of the neutron skin, and +astrophysical constraints within the same +model. +Neill et al. [411] followed a similar strat- +egy as the example above, using Skyrme +models which were extended to the crust. +This allowed them to combine neutron skin +measurements, NICER/LIGO observations, + +54 +a crust observable (the resonant frequency of the crustal i-mode), and nuclear mass data to con- +strain both the core and crust properties as well as the EOS. By calculating all these quantities +using the same underlying Skyrme energy density functional (and polytrope parametrizations at +the highest densities), some poorly controlled modeling uncertainties were eliminated. This work +demonstrated the complementarity of different observables: within the particular model used, nu- +clear masses constrain mainly the zeroth and first symmetry energy expansion coefficients, S0 +and L, the crust observable has the largest impact on the inferred values of L and the second +expansion coefficient Ksym, and the neutron star radius and tidal deformability have the largest +impact on the inferred values of Ksym and two polytrope parameters. Thus, when combined, dif- +ferent observables provide complementary information that can contribute to a complete picture +of the EOS. The ranges of these overlapping data are depicted in Fig. 22. +Without crust observables, neutron star radii and tidal deformabilities tend to give weaker +constraints on Ksym and stronger constraints on L (see the analysis of a large number of studies +in [455]). +However, the relative constraints on the symmetry energy parameters change when +the used priors include the criterion that the crust is stable and incorporate potential data from +crust observables [411]. While this result is model-dependent and correlations with higher-order +symmetry parameters need to be investigated, it demonstrates the way in which crust observables +could significantly contribute to constraining the EOS, and motivates the need for improving models +to consistently combine crust and core observables with nuclear data. +One of the defining strengths of the global constraint analysis is that one or more additional +constraint(s) can be always included as long as an assessment of the corresponding statistical and +systematic uncertainties is also provided. Moreover, the more data from nuclear and astrophysical +observables can be meaningfully included in such EOS inferences, the greater the ability to deliver +a robust EOS. Therefore, constraining the EOS by combining various inferences is highly promising +and, furthermore, well-suited for the coming era of multi-differential observables from heavy-ion +collisions and multi-messenger astronomical observations. +V. +CONNECTIONS TO OTHER AREAS OF NUCLEAR PHYSICS +A. +Applications of hadronic transport +In addition to the use of transport codes to study fundamental nuclear physics, their ability +to describe the transport and interactions of particles in a material also make them valuable for +applications that benefit society. +Examples include the design of nuclear physics experiments, +detector development and simulations of detector performance, as well as medical applications and +radiation shielding in accelerator and space exploration. Some of these uses are outlined here. +Transport models are widely used to simulate particle emission from nucleus-nucleus collisions. +In these simulations, the four-momentum of every emitted particle is tracked, making it possible +to generate double differential distributions, the particle spectra at various emission angles. These +distributions are particularly important for applications. +Most transport models are optimized for describing physics in certain energy ranges. The type +of code required can be tailored to the desired application. For example, some models perform best +at energies of a few hundred MeV and below, which is near the peak of the cosmic ray flux [456], +while others are more applicable for GeV-scale energies and above, in the tail of the cosmic ray +flux. Over the entire experimental energy range, from intermediate energies through the highest +collider energies, transport codes have been successfully employed to design complex detectors, +optimize experimental setups, and carry out analyses of experimental data, including assessing the +detector efficiencies and background contributions. + +55 +1. +Detector design +In high-energy experiments, the code packages most commonly used for detector development +and data analysis are Geant3 [457], Geant4 [458], and FLUKA [459]. Most of these simulation +packages use cascade codes, that is codes without mean-field potentials, to describe particle trans- +port through matter. Modern transport codes that can cover a wide range of energies such as +PHITS (Particle and Heavy-Ion Transport code System) can, however, provide a more complex +description of particle transport [47]. +Aside from heavy-ion collisions, transport simulations play an important role for a variety of fun- +damental physics experiments. For example, long-baseline neutrino experiments need to determine +the incoming neutrino energy in order to extract the neutrino mixing parameters, CP violating +phases, and neutrino mass ordering [460]. However, because the neutrino beam is generated from +fixed-target proton-nucleus interactions producing secondary π and K mesons with neutrino decay +products, there are large uncertainties on the energy of the interacting neutrinos. The neutrino +energy must be reconstructed from the measurement of the final state [461, 462] which is often mod- +eled by simple Monte-Carlo cascade approaches. Reliable transport descriptions could significantly +improve these studies for the Deep Underground Neutrino Experiment (DUNE) [463], as well as +for the ongoing experiments NuMI Off-axis νe Appearance (NOvA) [464] and Tokai to Kamioka +(T2K) [465]. Other experiments that require transport simulations of backgrounds include dark +matter searches [466], semi-inclusive electron scattering such as (e,e′p) on nuclear targets at Jef- +ferson Lab to search for color transparency, short-range correlations [467], and hadronization in a +nuclear medium [468]. +2. +Space exploration, radiation therapy, and nuclear data +Transport models can also be used in applications relevant to space exploration to understand +and mitigate the harmful effects of the space radiation environment on electronics and astronauts. +Collisions of galactic cosmic rays (GCRs) with nuclei, whether in the Earth’s atmosphere or in +the material of a spacecraft above it, can generate showers of particles, including pions, muons, +neutrinos, electrons, and photons as well as protons and neutrons. GCRs cover a wide range of +energies, from tens or hundreds of MeV up to the TeV scale, and ion species, spanning elements +1 ≤ Z < 28 [475], making it challenging to determine all their potential effects in a given material. +The penetrating power of the initial GCRs and the secondaries generated by their interaction +with matter can have a serious impact on the safety and viability of space exploration. The 1% +of GCR primaries which are heavier than Helium nuclei can pose an especially serious problem, +given that the damage they inflict scales as Z2. The secondary particles generated from GCR +interactions with spacecraft materials [476] such as aluminum, polyethylene, and composites can +harm astronauts and disrupt or even disable electronic systems. Moreover, spacecraft shielding +designed to reduce the GCR flux is itself a target that can increase the secondary flux. Because +of the wide variety of possible shielding materials and thicknesses, transport models are essential +to determine the sensitivity of the secondaries (regarding both their flux and composition) to +different shielding configurations, as well as the subsequent harmful impact of those secondaries on +electronic systems [477] and humans [478]. A pictorial overview of applications transport modelling +and nuclear data in space missions is given in Fig. 24. +Due to the lack of data at the appropriate energies, simulations of space radiation effects have +large uncertainties. The space research community has generally relied on phenomenological nu- +clear reaction models such as the Double Differential Fragmentation model (DDFRG) [479], which +consists of a sum of multiple exponential distributions with parameters fit to data. Many of these + +56 +models employ abrasion-ablation models [480, 481] (where abrasion and ablation refer to parti- +cle removal in ion-ion interactions and nuclear de-excitation following abrasion, respectively) or +semi-empirical parametrizations, see Ref. [482]. +Researchers modeling these interactions could +benefit from transport codes discussed in this White Paper. The use of hadronic transport models +such as the Ultrarelativistic Quantum Molecular Dynamics (UrQMD) code [482], which was shown +to correctly predict proton and deuteron yields from the BNL Alternating Gradient Synchrotron +measurements of collisions of protons on Be and Au targets at Elab = 15 AGeV [483, 484], see +Fig. 25, could significantly advance simulations of collisions relevant for space exploration. For +further information about the needs for space applications, see Refs. [485, 486]. +Similar transport modeling needs arise in charged particle therapy for medical applications such +as cancer treatment. In this case, the ion beam is tuned to penetrate the tissue at the tumor location +so that the Bragg peak, or maximal dose, is delivered to the tumor site while minimizing the spread +of the charged particle beams into surrounding tissue due to target fragmentation and secondary +scattering [487]. Transport models can play an important role in improving the effectiveness and +safety of charged particle therapy in cancer treatment [487, 488]. Moreover, if ions such as carbon +are used instead of protons, the beam may also fragment and spread in the body. These interactions +are also studied employing abrasion-ablation models. Better models of projectile fragmentation +are needed to determine the effect of ion beams on normal tissue. Recently, the Stochastic Mean +Field (SMF) [489] and Boltzmann-Langevin One Body (BLOB) [490] models have been coupled with +Geant4 for studies related to radiation therapy [491]. +The nuclear information required for applications falls under the general umbrella term of +FIG. 24. Some of the applications of hadronic transport calculations and nuclear data in space exploration +research (counterclockwise from top left): energy production in outer space, such as with the TOPAZ +nuclear reactor [469] or the proposed fission surface power system on the Moon KRUSTY [470]; nuclear +thermal rocket propulsion [471]; planetary exploration [472]; and dose and shielding calculations of ions +passing through electronics and humans (left: a heavy-ion interaction with a shielding structure [473], right: +particle spectra calculated for an incident solar minimum GCR iron spectrum [474]). + +Nuclear reactors +Dose/Shielding calculations for electronics & humans +in outer space +Cosmic ray track +Geant4 +104 +FLUKA +PHITS +Metal + Metal +neutrons +10 +3DHZETRN (N=1) +3DHZETRN (N=22) + Glass +102 +0 g/cm? +Gate +10 +Field +10° +oxide +-Drain +Source +protons (xo.1) +Depletion +10° +Positive region +10 +He (x0.05) +well +10° +- Funneling +10 +TOPAZ +region +Substrate +105 +10-2 +10-1 +100 +10l +102 +103 +104 +Kinetic energy (MeV/n) +Nuclear propulsion +Planetary exploration +Passive (n, xy) +rays +Cosmic +Fast +Natural +KRUSTY +neutrons +radioactivity57 +−1.0−0.50.0 0.5 1.0 1.5 2.0 2.5 3.0 +y +10−5 +10−4 +10−3 +10−2 +10−1 +100 +101 +102 +103 +dN +dy +p+Be +UrQMD, protons +UrQMD, deuterons +E802, protons +E802, deuterons +−1.0−0.50.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 +y +p+Au, minb., 14.6 A GeV +FIG. 25. Rapidity distributions of protons and deuterons in +minimum bias p+Be (left) and p+Au (right) collisions at +a beam energy of Elab = 14.6 AGeV. Blue dashed and red +solid lines show results for protons and deuterons, respec- +tively, obtained from the UrQMD model, compared to data +from the E892 experiment (blue and red dots for protons +and deuterons, respectively) [484]. Figure from Ref. [483]. +“nuclear data”. The Geant3, Geant4, and +FLUKA codes all utilize information taken +directly from nuclear data libraries. How- +ever, standard nuclear databases cover +almost exclusively neutron-induced reac- +tions, while few charged-particle data are +available. +In addition, the energy range +covered by these databases typically only +extends to 20 MeV. In higher energy +databases such as the GSI-ESA-NASA +database [482], there are essentially no +data for light ions beyond Elab = 3 AGeV +and scant data for heavy ions beyond a +few hundred AMeV [482]. Transport mod- +els such as Quantum Molecular Dynamics +(QMD) [492] and PHITS [493, 494] have +been used to simulate higher-energy colli- +sions to fill the gaps in data. Experiments +at nuclear accelerators are needed to verify +these calculations. +The +US +Nuclear +Science +Advisory +Committee (NSAC) has been charged to “assess challenges, opportunities and priorities for ef- +fective stewardship of nuclear data”. +As part of the development of the Long Range Plan for +nuclear science, town halls involving different sub-fields of the US nuclear physics community have +adopted nuclear data resolutions, including a recommendation to identify cross-cutting opportuni- +ties with other programs. We suggest that one of these opportunities is the use of transport codes +to advance and enhance high-energy applications, such as space research and advanced medical +treatments. +B. +Hydrodynamics +Relativistic hydrodynamics (Landau-Lifshitz hydrodynamics [495]) can be defined as the effec- +tive field theory (EFT) describing fluids on energy scales much smaller than the fluid tempera- +ture [496]. Hydrodynamic equations encode the evolution of conserved charges, such as energy +density and electric charge density, in spacetime. Solving the hydrodynamic equations requires +the EOS as a crucial ingredient. Thus, in turn, hydrodynamics can be used to constrain the EOS. +For example, this has been done or is of relevance for the quark-gluon plasma (QGP) generated +in heavy-ion collisions [329, 497, 498] (recently, prospects of constraints on the EOS for nuclear +matter forming the primordial QGP emerged [499]), for (proto)neutron stars [500–505], as well as +for neutron star mergers [506–511]. +1. +Status +Hydrodynamics has had a great success describing nuclear matter generated in heavy-ion col- +lisions over a wide range of energies [512, 513]. Remarkably, hydrodynamics applies to various +system sizes accessible in heavy-ion collisions [514], with ALICE, ATLAS, and CMS experiments +showing collective fluid behavior in proton-ion [515–517] and even proton-proton collisions [518– +520], which was also successfully reproduced hydrodynamically [521]. Collective behavior in small + +58 +systems was also observed at RHIC by the PHENIX and STAR experiments [522, 523]. +It was realized early on that first-order hydrodynamics (in Landau or Eckart frame) is causality +violating and unstable [524]. At this time, the standard solution to this problem is the M¨uller- +Israel-Stewart (MIS) theory [525–527], or versions thereof [528, 529], which are used in most hy- +drodynamic codes modeling heavy-ion collisions. In the MIS theory, transient modes are added as +regulators ensuring a causal time evolution [530]. The behavior of such transient modes depends on +the way they are introduced [528, 530]. Since they are generally not associated with any conserved +quantities, their behavior is not what hydrodynamics aims to describe. MIS thus relies on these +transient modes to decay sufficiently fast for the observables to behave hydrodynamically. This +poses a problem for MIS at early times in a heavy-ion collision, when the regulator transient modes +are still present, because observables sensitive to the early times may reflect the physics of these +regulators. In addition, the causality violation [531] and stability [532] in these setups has to be +monitored when modeling, for example, heavy-ion collisions. +Alternatively, a more direct approach to constructing causal viscous hydrodynamics is based +on the realization that hydrodynamics is causal when considered in a general frame (and not, +e.g., Landau frame or Eckart frame). In that case it is not necessary to introduce any regulator +or auxiliary fields, as the differential equations governing the hydrodynamic fields (temperature, +fluid velocity, and chemical potential) are hyperbolic (i.e., there exists a solution for all times) and +their time evolution is causal by construction. This leads to the Bemfica-Disconzi-Noronha-Kovtun +(BDNK) theory [533–538], which is capable of, for example, modeling neutron star mergers [537]. +BDNK also has a practical use in constructing manifestly causal numerical codes solving hyperbolic +equations. Note, however, that BDNK is merely a causal formulation of hydrodynamics, and thus +BDNK is still not expected to be a good approximation at early times. +Finally, a rigorous field-theory formulation of hydrodynamics was achieved, which expresses +it as an EFT based on a generating functional [539–545], for a summary see Ref. [546]. +This +approach employs the Schwinger-Keldysh formalism of thermal field theory. As applications of +this formulation, effects of stochastic interactions on hydrodynamic correlation functions [547] +as well as a theory of non-linear diffusion were derived, taking into account large hydrodynamic +fluctuations (for example, leading to the dependence of transport coefficients on fluctuations of the +hydrodynamic fields) [548, 549]. +2. +Range of applicability +Many factors influence whether a system may be described hydrodynamically. Most impor- +tantly, like any EFT, hydrodynamics requires a separation of scales between the microscopic physics +and the scales on which the system is described. Let us focus on two remarkable results regarding +the range of applicability of hydrodynamics: +1) The unreasonable effectiveness of hydrodynamics far away from equilibrium. +2) Systematic extensions of hydrodynamics, extending its range of applicability. +Regarding 1), the applicability of hydrodynamics has been historically tied to a requirement +of a near-equilibrium state, near-isotropy, and small gradients. Astonishingly, heavy-ion collisions, +where neither of these three conditions is met, were successfully described hydrodynamically, which +is often referred to as the unreasonable effectiveness of hydrodynamics [550]. As a possible expla- +nation, hydrodynamic attractors were proposed [551] in a supersymmetric conformal theory, and +subsequently studied for heavy-ion collisions [552–561]. +The underlying reason for the attrac- +tor behavior is proposed to be kinematic, i.e., owed to a fast expansion in the boost-invariant +plasma [554, 562, 563]. Since systems cease to be boost invariant as the collision energy is lowered, + +59 +FIG. 26. Example of an extension of the regime of applica- +bility of hydrodynamics: spin hydrodynamics. While stan- +dard hydrodynamics is valid at small frequencies and mo- +menta (labeled as “pure hydro regime”, indicated by cyan +blue region), in the presence of spin degrees of freedom spin +hydrodynamics is valid in an extended regime (labeled as +“spin hydro regime”, indicated by a pink region). This is +facilitated by adding the slowly relaxing spin modes (green +curves) to the spectrum of standard hydrodynamic shear +(red solid curve) and sound (blue solid curve) modes. HY- +DRO+ is constructed in a similar way by adding modes +which relax slower and slower when approaching the criti- +cal point in the QCD phase diagram, bearing implications +for the EOS [564, 565]. Figure adapted from [566]. +this may pose a challenge to the develop- +ment of hydrodynamic attractors in nu- +clear matter at low to intermediate ener- +gies. +Within a certain class of models (in- +spired by the gauge/gravity correspon- +dence), the position-space hydrodynamic +expansion (in proper time) around the +Bjorken flow within the MIS theory was +shown to diverge factorially [551]. +In +contrast, for the same theory Fourier- +transformed into the momentum space +there is a finite convergence radius lim- +ited by the branch point singularity closest +to the origin in the complex momentum +plane [567–571]. This inspired the formu- +lation of hydrodynamics far from equilib- +rium via resummation [572]. +Regarding 2), a standard method to ex- +tend the regime of validity of hydrodynam- +ics is to add one or several mode(s). In +fact, promoting the shear tensor to an aux- +iliary field (regulator) adds a mode to the +spectrum of first-order hydrodynamic for- +mulation yielding the MIS model. In an- +other crucial example, critical fluctuations +need to be taken into account near the crit- +ical point in the QCD phase diagram, and +a set of slow modes can be added to the hydrodynamic modes yielding HYDRO+ [573, 574], which +in turn bears implications for the EOS and the speed of sound [564, 565]. Furthermore, Lambda +hyperon polarization data [575] indicates that the QGP is highly vortical and polarized [576– +578], which motivated the inclusion of spin in various hydrodynamic descriptions [566, 579–588] +(see, e.g., Fig. 26). Within a different systematic extension of hydrodynamics, dynamical elec- +tromagnetic fields can be added, leading to versions of magnetohydrodynamics which couple the +hydrodynamic conservation equations to Maxwell’s equations [589–591], and which can also include +the chiral anomaly [592–594], relevant for neutron stars [594]. Finally, another natural extension of +hydrodynamics is the simultaneous inclusion of multiple conserved charges, in particular, baryon +number B, strangeness S, and electric charge Q (BSQ charges) [532]. This renders transport coef- +ficients matrix-valued, which means that gradients in one charge may lead to diffusion of another +charge [595, 596]. +Modern hydrodynamics has been developed in close relation to the gauge/gravity correspon- +dence (a.k.a., AdS/CFT or holography). This development, which notably yielded the only consis- +tent theoretical description of fluids with η/s as low as found in heavy-ion data [597–599], began +with the insight that a lower bound on entropy production per degree of freedom (η/s) for a cer- +tain class of theories is related to black branes in the Anti de Sitter (AdS) spacetime [600]. The +fluid/gravity correspondence [601] as a systematic construction tool led to the discovery of the +chiral vortical effect [602, 603] and the re-discovery of the chiral magnetic effect [603, 604]. Holo- +graphic models are also suitable for exploration of plasmas at high densities [605], phase transitions +(in particular a holographic version of the QCD critical point [606]), neutron stars [607], taking + +[w(k)l = frequency scale +non-conserved +quantities +disappear fast +fast modes +(transient) +Non-hydro regime +T +IWsound(k)l +[Wshear(k)| +approximately +[Wspin,I (k) +conserved +charges diffuse +[W spin,(k)I +himois +spin +relaxdtion +rate +Spin hydro regime +S +conserved charges +diffuse slowly +Pure hydro regime +0 +k = wave number60 +into account finite coupling [608, 609], and for investigating the far-from-equilibrium regime of +holographic plasmas [610–612]. +3. +Challenges and opportunities +Given the recent developments described above, there are strong reasons to assume that hydro- +dynamics either is valid or can be extended to be valid for the description of dense nuclear matter +at intermediate energy scales, even in small systems with large gradients, far from equilibrium, +and near the QCD critical point. Such (extended) versions of hydrodynamics may well overlap +with the regime of validity of hadronic transport simulations, which needs to be studied. Here, +in particular, further development of hybrid approaches using both hydrodynamics and hadronic +transport will contribute to a better description of intermediate energy heavy-ion collisions. +The way ahead will require pushing forward the development of the rigorous theoretical for- +mulation of hydrodynamics, as well as testing its applicability with exactly solvable models (e.g., +constructed using the gauge/gravity correspondence) and, most importantly, against experimental +data. By continuing the development of hydrodynamics in parallel with gauge/gravity models, +the proposed versions of spin hydrodynamics can be tested and constructed rigorously using the +correspondence; the same statement also applies to versions of magnetohydrodynamics. In the +context of (magneto)hydrodynamics, one may also explore the interplay of multiple conserved +charge currents and anomalous currents, leading to novel transport phenomena [593, 613–617]. +For an efficient modeling of heavy-ion collisions (as well as neutron stars and neutron star merg- +ers), the BDNK approach needs to be developed and implemented in standard codes for data +analysis. At high densities, it becomes necessary to describe the propagation of multiple conserved +charges, in particular, the BSQ charges [532]. Consequently, the initial state used in numerical +hydrodynamic simulations must be modified to include BSQ degrees of freedom [618–620]. Sim- +ilarly, the EOS [621, 622] and the exact charge conservation when particles are formed (see, e.g., +Ref. [623, 624]) need to take into account BSQ charges. Beyond describing all conserved charges, +theoretical consistency on one hand and the need to describe systems far-from-equilibrium on the +other hand both necessitate a rigorous treatment of hydrodynamic fluctuations, which has been +done using a deterministic approach to fluctuations [625–628]. As a viable future complementary +approach, hydrodynamic fluctuations can be included using the Schwinger-Keldysh formulation +of hydrodynamics [546]. These goals are in line with two recent white papers: Snowmass The- +ory Frontier: Effective Field Theory Topical Group Summary [629] and Snowmass White Paper: +Effective Field Theories for Condensed Matter Systems [630]. +VI. +EXPLORATORY DIRECTIONS +A. +Dense nuclear matter EOS meeting extreme gravity and dark matter in supermassive +neutron stars +Do we need an independent determination of the nuclear EOS using terrestrial experiments in +the era of high-precision multi-messenger astronomy? While it is often emphasized that combined +data analyses of heavy-ion reactions and neutron star observations within a unified EOS theory +framework are a powerful tool to study the EOS (see Section IV), the independent extraction of +the nuclear EOS from heavy-ion reactions alone is fundamentally important. This assertion is +motivated by a well-known degeneracy [631] between the EOS of dense matter (including hadronic +and/or quark matter, and dark matter) and strong-field gravity in studies aimed at understanding + +61 +properties of super-massive neutron stars, the minimum mass of black holes, and properties of dark +matter [632–639]. +In the Astro2020 Science White Paper on Extreme Gravity and Fundamental Physics [640], +future gravitational wave (GW) observations are envisioned to enable unprecedented and unique +science related to +• The nature of gravity: Can we prove Einstein wrong? What building-block principles and +symmetries in nature invoked in the description of gravity can be challenged? +• The nature of dark matter: Is dark matter composed of particles, dark objects, or modifica- +tions of gravitational interactions? +• The nature of compact objects: Are black holes and neutron stars the only astrophysical +extreme compact objects in the Universe? What is the EOS of densest matter? +An independent determination of the EOS of dense nuclear matter from terrestrial experiments, +which are free from gravitational effects, will address the question of whether exotic physics, such +as modified gravity, is necessary to describe the behavior and phenomena of supermassive stars. +Thus constraining the EOS from heavy-ion collision experiments will help realize the astrophysical +science goals. +The fundamental questions listed above are among the eleven greatest physics questions for the +new century identified by the U.S. National Research Council in 2003 [641]. While gravity was the +first force discovered in nature, the quest to unify it with other fundamental forces remains elusive, +partially because of its apparent weakness at short distances [642, 643]. Moreover, while Einstein’s +general relativity (GR) theory for gravity has successfully passed all observational tests so far, it is +still not fully tested in the strong-field domain [644]. Searches for evidence of possible deviations +from GR are at the forefront of several fields in natural sciences. It is fundamentally important to +test whether GR will break down at the strongest possible gravitational fields reachable. For this +goal, supermassive neutron stars are among the ideal testing sites [645, 646]. However, as already +mentioned above, their properties can be accounted for by either modifying gravity, adding dark +matter, and/or adjusting the nuclear EOS. Thus, an independent inference of the nuclear EOS +from terrestrial experiments is fundamentally important for breaking the degeneracy between the +EOS of supermassive neutron stars and the strong-field gravity. +There are already some indications that the EOS of dense neutron-rich matter may play a +significant role in understanding the nature of gravity [647–650]. Effects of the nuclear symmetry +energy on the gravitational binding energy [651], surface curvature, and red shift [652], which are +normally used to measure the strength of gravity of massive stars in GR, as well as examples of +mass-radius relations in several classes of modified gravity theories are reviewed briefly in Ref. [653]. +More precise information about the dense nuclear matter EOS from terrestrial experiments will +enable further progress in this direction. +B. +Nuclear EOS with reduced spatial dimensions +Nuclear systems under constraints, with high degrees of symmetry and/or collectivity, may +be considered as effectively moving in spaces with reduced spatial dimensions. +Historically, in +developing modern methodologies, the spatial dimension d has been considered to be either a +continuous or a discrete variable. Many exciting and fundamentally new experimental discoveries +in reduced dimensions have been made in recent years in material sciences (e.g., the graphene [654] +and topological insulator [655, 656]) and cold atom physics (e.g., the superfluidity in a strongly +correlated 2D Fermi gas [657] and the generalized hydrodynamics in a strongly interacting 1D Bose +gas [658]). + +62 +The EOS of neutron-rich matter in spaces with reduced dimensions can be linked to that in the +conventional 3-dimensional (3D) space by the ϵ-expansion (ϵ = d − 4) [659–661]. The latter is a +perturbative approach that has been successfully used in treating second-order phase transitions +and related critical phenomena in solid state physics and, more recently, in studying the EOS of +cold atoms in 1D, 2D, and two-species Fermi and/or Bose gases with mixed dimensions [662, 663]. +The energy per nucleon E(nB, δ, d) in cold nuclear matter of dimension d at density nB and isospin +asymmetry δ can be expanded around nB = n0, δ = 0, and d = 3. In cold symmetric nuclear +matter, the E(nB, δ = 0, d) is predicted to decrease with decreasing d, indicating that nuclear +matter with a smaller d tends to be more bound but, at the same time, saturates at a higher +3D-equivalent density. The symmetry energy was also found to become smaller in spaces with +lower dimensions compared to the conventional 3D case [664]. +Can we find or make 1D and/or 2D nuclear systems in our 3D world? Can nucleons in neutron- +skins of heavy nuclei be considered as living in spaces with reduced spatial dimensions, and if so, +can we discover the related effects in heavy-ion collisions? Can some of the objects (e.g., lasagna) in +the predicted pasta phase [291, 312, 665] of the neutron star crust be described as nuclear systems +with 1D, 2D, or fractional dimensions? What are the roles of the dimension-dependent EOS in +multi-dimensional models of late stellar evolution? If 1D/2D simulations using 3D EOS do not +lead to supernova explosions, what will happen if the corresponding 1D/2D EOSs are used instead? +Answers to these questions may provide new perspectives on the EOS of neutron-rich matter in +3D and help solve some of the unresolved puzzles. +C. +Interplay between nucleonic and partonic degrees of freedom: SRC effects on nuclear +EOS, heavy-ion reactions, and neutron stars +Short-range correlations (SRCs) in nuclei, that is correlations in the nuclear ground-state wave +function, are mostly due to isosinglet neutron-proton pairs that have temporally fluctuated into +a high-relative-momentum state with approximately zero total center-of mass-momentum and a +spatial separation of about 1 fm [128, 129, 666–669]. Subnucleonic degrees of freedom are expected +to play an important role in understanding SRC-related phenomena. Altered quark momentum +distributions in nucleons embedded in nuclei with respect to those in free nucleons, known as +the EMC effect, have been studied extensively since 1983 [670]. +SRCs have been proposed as +one of the two leading causes of the EMC effect [671, 672]. Recent experiments found that the +strength of SRCs and the EMC effect are strongly correlated [673, 674] and that they both depend +strongly on the isospin asymmetry of the nuclei. Moreover, strong evidence was found that only +the momentum distributions of quarks in SRC nucleon pairs in nuclei are modified with respect +to free nucleons. Furthermore, the distributions of quarks in protons of neutron-rich nuclei are +modified more than in neutrons, implying that, on average, u quarks are modified more than d +quarks in neutron-rich nuclei [674], in analogy to an earlier finding that SRCs make protons mover +faster than neutrons in neutron-rich nuclei [675]. These phenomena reflect profound QCD effects +in the nuclear medium. Studying the flavour- and spin-dependence of nucleon structure functions +is at the forefront of QCD and is a major science driver of future EIC experiments. An example +of a correlation formed on short-range QCD length scales are quark-quark correlations known as +diquarks. It was recently proposed that diquark formation across two nucleons via the attractive +QCD quark-quark potential is the underlying QCD-level source of SRCs in nuclear matter and the +cause of the EMC effect [676]. +The SRC-related effects have consequences for the nuclear structure, high-energy quark dis- +tributions (the EMC effect), and high-density nuclear matter, including its EOS and in-medium +nucleon-nucleon scattering cross sections. Better understanding of SRC effects in dense neutron- + +63 +rich medium through heavy-ion reactions may have important ramifications. The profound conse- +quences of SRCs on the nuclear matter EOS can be easily seen when one considers the well-known +Hugenholtz-Van Hove (HVH) theorem, which was derived by assuming there are sharp Fermi sur- +faces for nucleons. The theorem provides intrinsic connections among the nuclear symmetry energy, +momentum dependences of both isoscalar and isovector nucleon potentials, and the corresponding +nucleon isoscalar effective mass and neutron-proton effective mass splitting in neutron-rich mat- +ter [677]. However, due to the SRCs nucleons do not have sharp Fermi surfaces, but extended +high-momentum tails, as evidenced by many experiments at the Jefferson Laboratory (JLAB) and +Brookhaven National Laboratory (BNL), see, e.g., Refs. [127–130] for recent reviews. Therefore, +the above relations may be completely altered by the isospin-dependence of SRCs induced by the +nuclear tensor force, which is much stronger in the symmetric nuclear matter than in pure neu- +tron matter [135, 678, 679]. Consequently, the composition of the symmetry energy itself (e.g., +the ratio of its kinetic over potential parts) may also be very different from the one without con- +sidering the SRCs [131]. Most of the parametrizations of the nuclear symmetry energy used so +far in both nuclear physics and astrophysics adopt the kinetic symmetry energy predicted by the +free Fermi gas model. However, such parametrizations neglect SRC effects that may lead to a +reduced or even negative kinetic symmetry energy. This effect originates in the fact that SRCs +are dominated by isosinglet neutron-proton pairs. As the system becomes more neutron-rich, an +increasingly larger fraction of protons, compared to neutrons, are found in the high momentum +tail [128, 129, 674]. Consequently, the kinetic symmetry energy is reduced compared to the free +Fermi gas model prediction [131–138]. +Interesting indications have been found very recently of SRC effects on the cooling of protoneu- +tron stars, the formation of baryon resonances, dark matter, and nuclear pasta as well as on tidal +deformation and mass-radius correlation in neutron stars [680–687], and also on several features of +nuclear matter and heavy-ion reactions [688–695]. However, much more work remains to be done +to systematically and consistently address the SRC-related issues in hadronic transport simulations +(see Section II A). Investigations of SRC effects on the nuclear EOS using heavy-ion collisions at +FRIB and FRIB400 will complement the ongoing and planned SRC research programs at JLAB, +GSI, and EIC at BNL. Together, these efforts will reveal new knowledge about the spin-isospin +dependence of three-body and tensor forces in dense neutron-rich matter. At short distances, these +forces are mostly due to the ρ-meson exchange [696]. The in-medium ρ-meson mass, determined +by QCD, may be significantly different from its free-space value [696–698]. Such modification in +the ρ-meson mass has been found to significantly affect the high-density behavior of the nuclear +symmetry energy [131, 699]. However, effects of the QCD quark-quark potential and the modified +tensor or three-body force on in-medium nucleon-nucleon cross sections remain to be explored. +D. +High-density symmetry energy above 2n0 +Section III B has primarily focused on the physics of nuclear symmetry energy up to ≈ 2n0. This +is because of substantial experimental challenges for measuring the symmetry energy using more +energetic beams. +However, at higher densities, but below the hadron-quark transition density, +there are also many interesting issues to be addressed [97, 705]. Therefore, it is worthwhile to +explore possible future directions to attack this problem (see also the white paper on QCD Phase +Structure and Interactions at High Baryon Density: Continuation of BES Physics Program with +CBM at FAIR [151]). +Experiments at FRIB400, FAIR, and other high-energy rare isotope beam facilities around the +world are expected to provide tremendous resolving power for determining the symmetry energy +at densities >∼ 2n0. While both the magnitude Esym(n0) and slope L of the symmetry energy + +64 +1 +2 +3 +0 +30 +60 +90 +120 +150 + Neutron Star + Observations +Esym (MeV) +ρ� +ρ0 + NL-RMF(18) + PC-RMF(3) + RHF(2) + DD-RMF(2) + Gogny-HF(2) + SHF(33) +� +� +� +� + BHF (Vidana) + BHF (Z.H. Li) + DBHF (Fuchs) + DBHF (Sammarruca) + Chiral EFT-N3LO450 + Chiral EFT-N3LO600 + VMB-APR + VMB-FP + VMB-WFF1 + VMB-WFF2 + VMB-WFF3 +FIG. 27. Left: Symmetry energy as a function of baryon density as obtained within 60 example models, +selected from 6 classes of over 520 phenomenological models and/or energy density functionals. +Right: +Symmetry energy as a function of baryon density as obtained within 11 examples from microscopic and/or +ab initio theories. Thick blue lines are the upper and lower boundaries of symmetry energy from analyses +of neutron star observables. Figure from Refs. [700–704]. +at n0 have been relatively well determined (Esym(n0) ≈ 31.7 ± 3.2 MeV and L ≈ 58 ± 19 MeV +[506, 700, 706, 707], in very good agreement with χEFT calculations [13, 166, 206, 253]), the +curvature Ksym and skewness Jsym of the nuclear symmetry energy are still poorly known. In +particular, Ksym is most critical for determining the crust-core transition density and pressure in +neutron stars [708–710]. Besides the importance for astrophysics, an experimental determination +20 +30 +40 +50 +60 +70 +80 +Esym(2ρ0) (MeV) +FOPI-LAND (2011) +ASY-EOS (2016) +Xie & Li (2019) +Zhang & Li (2019) +Zhou et al. (2019) +d’Etivaux (2019) +Nakazat & Suzuki (2019) +Symmetry energy at 2ρ0 from analyzing terrestrial and astrophysical data +2021 fiducial value=51 ± 13 MeV +Xie & Li (2020) +Tsang et al. (2020) +Yue et al.(2021) +Heavy-ion reactions +Neutron stars +Zhang et al. (2020) +FIG. 28. +Symmetry energy at twice the saturation +density from both heavy-ion reactions and neutron +stars. Figure modified from figures in Refs. [700, 711]. +of the high-density behavior of the nuclear sym- +metry energy will provide important guidance +for developing high-density nuclear many-body +theories. +Indeed, the density region explored +in heavy-ion reactions at BES, HADES, and in +the future at FRIB400 and FAIR is mostly be- +yond the current validity range of χEFT, and +it is also where the EOSs predicted by vari- +ous nuclear many-body theories, especially the +symmetry energy contributions, start to diverge +broadly (see Fig. 27). +Recent neutron star observations have led +to some progress in constraining the symme- +try energy at suprasaturation densities. Shown +in Fig. 28 is a compilation of recent results on +the symmetry energy at 2n0 from two analyses + +65 +of heavy-ion reactions at GSI and nine independent analyses of neutron star properties by sev- +eral groups. These analyses give a mean value of Esym(2n0) ≈ 51 ± 13 MeV at 68% confidence +level, as indicated by the green line. Interestingly, χEFT+MBPT calculations predict a value of +Esym(2n0) ≈ 45±3 MeV [158]. Similarly, quantum Monte Carlo calculations using local interactions +derived from the χEFT up to next-to-next-to-leading order predict a value of Esym(2n0) ≈ 46 ± 4 +MeV [184]. Evidently, the mean value of Esym(2n0) from the analyses mentioned above is consis- +tent with the χEFT predictions, albeit with large uncertainties. As noted before, 2n0 is near the +upper validity limit of the current χEFT theories. Thus, more precise measurements of Esym(2n0) +will help to test χEFT predictions. +Inspecting the results shown in Fig. 28 shows clearly that more work is necessary to reduce the +error bars. Most of the neutron star constraints are extracted from radii and tidal deformations of +canonical neutron stars with masses around 1.4M⊙. These observables are known to be sensitive +mostly to the values of pressure around (1-2)n0 in neutron stars, and therefore their constraints +on Esym(nB) around and above 2n0 are not strong. +Observables from more massive neutron stars were expected to place stronger constraints on +the high-density symmetry energy. To illustrate how the recent NICER+XMM-Newton’s mea- +surements of both the radius and mass of PSR J0740+6620 can influence the constraint on the +symmetry energy at densities above 2n0, the upper panel of Fig. 29 shows the extracted lower +limits of Esym(nB) obtained from directly inverting the TOV equation within a 3-dimensional +high-density EOS parameter space [238] for two cases: for the case where only the mass is ob- +served (green line), and for the case where both the mass and radius are observed (red line using +the 68% confidence lower radius limit reported by Riley et al. [264] and blue line using the radius +reported by Miller et al. [255]). The orange line is the upper limit of the symmetry energy from +0 +20 +40 +60 +80 +100 +120 +1.0 +1.5 +2.0 +2.5 +3.0 +3.5 +4.0 +0.00 +0.03 +0.06 +0.09 +0.12 + Causality & M +max +=2.01 M +sun + Causality & R +2.01 +=11.41 km + Causality & R +2.01 +=12.2 km + Causality & L +1.4 +=427 + + +E +sym + [MeV] +11.1% + + +X +p +r/r0 +FIG. 29. Constraints on the high-density sym- +metry energy and proton fraction in neutron +stars from analyzing the tidal polarizability of +GW170817 and NICER’s observation of PSR +J0740+6620. Figure from Ref. [238]. +analyzing the upper limit (68% confidence) of tidal +deformation of GW170817 [236]. The upper limits +of the symmetry energy from the upper radius limits +reported by both Riley et al. and Miller et al. are +far above the upper limit of symmetry energy from +GW170817. +The lower panel in Fig. 29 shows the correspond- +ing proton fractions in PSR J0740+6620. The in- +fluence of knowing both the mass and radius of +this most massive neutron star currently known is +seen by comparing the green line with the red or +blue line, while the difference between the red and +blue lines indicates the systematic error from the +two independent analyses of the same observational +data. Although the estimates of Esym(nB) around +(2-3)n0 from these analyses are useful compared to +the model predictions shown in Fig. 27, much more +precise constraints on the Esym(nB) above 2n0 are +needed. +Pinning down the symmetry energy above 2n0 +will be very challenging, but achieving this goal will +bring a great reward. For example, without a reli- +able knowledge of the symmetry energy at suprasat- +uration densities, the density profile of the proton +fraction in the core of neutron stars (which has to +be higher than about 11% for the fast cooling to oc- + +66 +cur) at β−equilibrium is not determined. Consequently, whether the fast cooling of protoneutron +stars occurs through the direct URCA process remains uncertain. Heavy-ion reactions, especially +with high-energy radioactive beams, will provide the much-needed data to calibrate nuclear many- +body theories and constrain nuclear symmetry energy at densities >∼ 2n0. These efforts, in concert +with astrophysical research using high-precision X-rays from massive neutron stars (e.g., NICER +and STROBE-X [317]), GWs from new LIGO/VIRGO runs, and future detection of post-merger +high-frequency GWs, will better constrain Esym(nB) at densities around and above 2n0. For these +efforts to be fruitful, it is imperative to explore potential observables carrying undistorted infor- +mation on the symmetry energy above 2n0 from neutron stars and their mergers as well as in +high-energy heavy-ion reactions. +E. +Density-dependence of neutron-proton effective mass splitting in neutron-rich matter +0 +0.2 +0.4 +0.6 +0.8 +1 +1.2 +1.4 +<ρ/ρ0> +0.6 +0.7 +0.8 +0.9 +1 + (GeV) +0.2 +0.4 +0.6 +0.8 +1 +1.2 +m +* +τ (GeV) +0 +200 +400 +600 +dN/dm (GeV) +−1 +n +p +n +p +132Sn+ +124Sn, E/A=50 MeV, b=5 fm +t=10 fm/c +FIG. 30. +Correlation between the average nu- +cleon effective mass and the average nucleon +density (top), and the distribution of nucleon +effective masses (bottom) in the reaction of +132Sn+124 Sn at 10 fm/c with a beam energy +Elab = 50 AMeV and an impact parameter +b = 5 fm, as simulated within the IBUU trans- +port model with an explicitly isospin-dependent +single-nucleon potential. Figure from Ref. [712]. +The nucleon effective mass is a fundamental +quantity characterizing the propagation of a nucleon +in a nuclear medium [713–716], accounting (to lead- +ing order) for effects such as the space-time non- +locality of the effective nuclear interactions or Pauli +exchange effects. +The magnitude and sign of the +difference (splitting) between the effective masses +of neutrons and protons ∆m∗ +np have essential con- +sequences for cosmology, astrophysics, and nuclear +physics through influencing, e.g., the equilibrium +neutron to proton ratio in the early universe and +primordial nucleosynthesis [717], properties of mir- +ror nuclei [718], and the location of drip-lines [719]. +In heavy-ion reactions, ∆m∗ +np is of importance for +isospin-sensitive observables [100, 107, 720–725]. +The momentum-dependence of the single-nucleon +potential is normally characterized by the nucleon +effective mass m∗ +τ that can be decomposed into an +isoscalar and an isovector component [108, 726, 727]. +Due to our poor knowledge of the momentum de- +pendence of isovector interactions, the isovector nu- +cleon effective mass measured by using the neutron- +proton effective mass splitting ∆m∗ +np [706] has not +been constrained well [108, 728]. Based on the HVH +theorem, ∆m∗ +np was found approximately propor- +tional to the isospin asymmetry δ of the medium, +with a coefficient depending on the density as well +as momentum-dependence of both the isoscalar and +isovector nucleon potential [706]. Over the last decade, significant efforts have been made to extract +this coefficient at n0. A recent survey [729] of model analyses using data from mostly nucleon- +nucleus scattering and giant resonances of heavy nuclei suggests that the ∆m∗ +np, scaled by the +average nucleon mass in free space, ranges from 0 to about 0.5δ [208, 677, 706, 730–735]. +While experimental efforts to better constrain ∆m∗ +np at n0 using heavy-ion reactions with in- +termediate energy stable beams are ongoing (see, e.g., Ref. [98]), future experiments at FRIB +and FRIB400 will enable more sensitive probes of not only ∆m∗ +np at n0, but also of its density- + +67 +FIG. 31. Top: Density dependence of the nuclear sym- +metry energy for two typical symmetry energy func- +tionals used in the IBUU simulations. Bottom: Density +dependence of the isospin asymmetry δ in 132Sn+124 +Sn collisions at 20 fm/c with a beam energy of 400 +MeV/A and an impact parameter of 1 fm, and in the +core of neutron stars at β-equilibrium (inset). Taken +from Refs. [95, 736]. +dependence (which cannot be probed by the +nucleon-nucleus +scattering +and +giant +reso- +nances) up to about 2n0. +As an illustration, +shown in Fig. 30 are the density dependence +of the average nucleon effective mass (top) +and the distribution of the nucleon effective +masses (bottom) during a typical FRIB reac- +tion as simulated [712] within the IBUU trans- +port model with an explicitly isospin-dependent +single-nucleon potential [106, 720]. +From the +top panel, it is seen that the neutron-proton ef- +fective mass splitting is positive and increases +with the density up to about 1.3n0, consistent +with recent χEFT calculations [208]. To reach +higher densities, more energetic beams are re- +quired. +Heavy-ion reactions at FRIB400 will extend +the ranges of both density and isospin asymme- +try of the medium formed. Shown in the lower +panel of Fig. 31 are the isospin asymmetry δ +as a function of density during a typical reac- +tion at FRIB400 (main) and in neutron stars +at β-equilibrium (inset), calculated using the +same two typical symmetry energy functionals, +shown in the upper panel. The δ-nB relations in +both systems show the same isospin fractiona- +tion phenomena, e.g., reaching a higher isospin +asymmetry when a density functional with a +lower symmetry energy is used. One can also +see that generally, the low-density regions are +more neutron-rich than the high-density regions. These δ-nB relations are the fundamental origins +of all isospin-sensitive observables in both heavy-ion reactions and neutron stars. +A number of observables in heavy-ion reactions have been proposed as promising messengers of +the underlying momentum-dependence of the isovector potential and the corresponding neutron- +proton effective mass splitting, see, e.g., [20, 737, 738] for reviews. The momentum dependence of +the single-nucleon potential affects the reaction dynamics directly through the equations of motion +and indirectly through the scattering term of nucleons. As the in-medium nucleon-nucleon cross +section is proportional to the square of the reduced effective mass of the two colliding nucleons, +the nucleon effective mass will affect the nuclear stopping power (which is also described in the +literature in terms of the nucleon mean free path especially for nucleon-nucleus scattering) [739]. +Consequently, the reaction dynamics and observables of heavy-ion reactions are expected to bear +useful information about the density-dependence of the neutron-proton effective mass splitting in +neutron-rich matter. The challenge is to find such observables that are both robust and sensitive +to the variations of the neutron-proton effective mass splitting with density. The nucleon effective +mass affects also transport properties of neutron stars, see, e.g., Refs. [233, 740–744]. Neutron +star observables, e.g., neutrino emission and torsional oscillations of neutron stars, may also pro- +vide useful information about the density-dependence of neutron-proton effective mass splitting in +neutron-rich matter. Explorations of these issues are invaluable. + +68 +ACKNOWLEDGMENTS +This White Paper has benefited from talks and discussions at the workshop on Dense nuclear +matter equation of state in heavy-ion collisions that took place at the Institute for Nuclear Theory, +University of Washington (December 5-9, 2022). +K.A. thanks Hans-Rudolf Schmidt and Arnaud Le F`evre, and M.S. thanks Daniel Cebra for +insightful discussions. P.D. and B.T. thank Abdou Chbihi, Maria Colonna, Arnaud Le F`evre, and +Giuseppe Verde for discussing complementary international efforts. +K.A. and M.S. thank Peter Senger and Richard Seto for helpful comments on the draft of +Section III A. M.K. thanks Navid Abbasi, David Blaschke, Casey Cartwright, Saso Grozdanov, +and Misha Stephanov for helpful comments on the draft of Section V B. +[1] M. E. Caplan and C. J. Horowitz, “Nuclear pasta in neutron stars,” https://astrobites.org/2017/ +10/05/nuclear-pasta-in-neutron-stars/ (2017), accessed: 2023-01-15. +[2] National Nuclear Data Center, “Chart of Nuclides,” https://www.nndc.bnl.gov/nudat3/ (2008), +accessed: 2023-01-26. +[3] Casey Reed, Penn State University, “Artist’s illustration of an isolated neutron star,” https://www. +nndc.bnl.gov/nudat3/ (2017), accessed: 2023-01-15. +[4] Mark Garlick/University of Warwick, “Artist’s impression of merging neutron stars,” https://www. +eso.org/public/images/eso1733s/ (2017), accessed: 2023-01-26. +[5] Brookhaven National Laboratory, “Gold Beam Collision Recorded at STAR,” https://flickr.com/ +photos/11304375@N07/6799740261 (2012), accessed: 2023-01-26. +[6] M. B. Tsang, Y. Zhang, P. Danielewicz, M. Famiano, Z. Li, W. G. Lynch, and A. W. Steiner, Phys. +Rev. Lett. 102, 122701 (2009), arXiv:0811.3107 [nucl-ex]. +[7] L.-W. Chen, C. M. Ko, B.-A. Li, +and J. Xu, Phys. Rev. C 82, 024321 (2010), arXiv:1004.4672 +[nucl-th]. +[8] L. Trippa, G. Colo, and E. Vigezzi, Phys. Rev. C 77, 061304 (2008), arXiv:0802.3658 [nucl-th]. +[9] A. Tamii et al., Phys. Rev. Lett. 107, 062502 (2011), arXiv:1104.5431 [nucl-ex]. +[10] X. Roca-Maza, M. Centelles, X. Vi˜nas, M. Brenna, G. Col`o, B. K. Agrawal, N. Paar, J. Piekarewicz, +and D. Vretenar, Phys. Rev. C 88, 024316 (2013), arXiv:1307.4806 [nucl-th]. +[11] M. Kortelainen, T. Lesinski, J. More, W. Nazarewicz, J. Sarich, N. Schunck, M. V. Stoitsov, +and +S. Wild, Phys. Rev. C 82, 024313 (2010), arXiv:1005.5145 [nucl-th]. +[12] P. Danielewicz, P. Singh, and J. Lee, Nucl. Phys. A 958, 147 (2017), arXiv:1611.01871 [nucl-th]. +[13] C. Drischler, R. J. Furnstahl, J. A. Melendez, and D. R. Phillips, Phys. Rev. Lett. 125, 202702 (2020), +arXiv:2004.07232 [nucl-th]. +[14] K. Hebeler, J. M. Lattimer, C. J. Pethick, +and A. Schwenk, Phys. Rev. Lett. 105, 161102 (2010), +arXiv:1007.1746 [nucl-th]. +[15] S. Gandolfi, J. Carlson, and S. Reddy, Phys. Rev. C 85, 032801 (2012), arXiv:1101.1921 [nucl-th]. +[16] I. Tews, J. M. Lattimer, A. Ohnishi, +and E. E. Kolomeitsev, Astrophys. J. 848, 105 (2017), +arXiv:1611.07133 [nucl-th]. +[17] S. Huth et al., Nature 606, 276 (2022), arXiv:2107.06229 [nucl-th]. +[18] J. Adamczewski-Musch et al. (HADES), (2022), arXiv:2208.02740 [nucl-ex]. +[19] B.-A. Li, C. M. Ko, and W. Bauer, Int. J. Mod. Phys. E 7, 147 (1998), arXiv:nucl-th/9707014. +[20] B.-A. Li, L.-W. Chen, and C. M. Ko, Phys. Rept. 464, 113 (2008), arXiv:0804.3580 [nucl-th]. +[21] B.-A. Li and W.-J. Xie, (in preparation, 2023). +[22] FRIB Science Community, “FRIB400: The scientific case for the 400 mev/u energy upgrade of FRIB,” +(2019). +[23] C. Hartnack, R. K. Puri, J. Aichelin, J. Konopka, S. A. Bass, H. Stoecker, +and W. Greiner, Eur. +Phys. J. A 1, 151 (1998), arXiv:nucl-th/9811015. +[24] J. Steinheimer, A. Motornenko, A. Sorensen, Y. Nara, V. Koch, and M. Bleicher, Eur. Phys. J. C + +69 +82, 911 (2022), arXiv:2208.12091 [nucl-th]. +[25] K. Hebeler, J. M. Lattimer, C. J. Pethick, +and A. Schwenk, Astrophys. J. 773, 11 (2013), +arXiv:1303.4662 [astro-ph.SR]. +[26] G. Hagen, T. Papenbrock, A. Ekstr¨om, K. A. Wendt, G. Baardsen, S. Gandolfi, M. Hjorth-Jensen, +and C. J. Horowitz, Phys. Rev. C 89, 014319 (2014), arXiv:1311.2925 [nucl-th]. +[27] S. Gandolfi, A. Gezerlis, and J. Carlson, Ann. Rev. Nucl. Part. Sci. 65, 303 (2015), arXiv:1501.05675 +[nucl-th]. +[28] J. Erler, C. J. Horowitz, W. Nazarewicz, M. Rafalski, and P. G. Reinhard, Phys. Rev. C 87, 044320 +(2013), arXiv:1211.6292 [nucl-th]. +[29] S. Goriely, N. Chamel, and J. M. Pearson, Phys. Rev. C 88, 024308 (2013). +[30] W.-C. Chen and J. Piekarewicz, Phys. Rev. C 90, 044305 (2014), arXiv:1408.4159 [nucl-th]. +[31] P. Danielewicz, R. Lacey, and W. G. Lynch, Science 298, 1592 (2002), arXiv:nucl-th/0208016. +[32] B. Barker and P. Danielewicz, Phys. Rev. C 99, 034607 (2019), arXiv:1612.04874 [nucl-th]. +[33] F. Gulminelli, W. Trautmann, S. Yennello, and P. Chomaz, Eur. Phys. J. A 30, 1 (2006). +[34] J. Xu, Prog. Part. Nucl. Phys. 106, 312 (2019), arXiv:1904.00131 [nucl-th]. +[35] M. Colonna, Prog. Part. Nucl. Phys. 113 (2020), 10.1016/j.ppnp.2020.103775, arXiv:2003.02500 [nucl- +th]. +[36] D. B. Boercker and J. W. Dufty, Annals of Physics 119, 43 (1979). +[37] P. Danielewicz, Annals Phys. 152, 239 (1984). +[38] W. Botermans and R. Malfliet, Phys. Rept. 198, 115 (1990). +[39] L. Shi, P. Danielewicz, and R. Lacey, Phys. Rev. C 64, 034601 (2001), arXiv:nucl-th/0104074. +[40] J. Xu et al. (TMEP Collaboration), (in preparation, 2023). +[41] M. Hillery, R. F. O’Connell, M. O. Scully, and E. P. Wigner, Phys. Rept. 106, 121 (1984). +[42] M. Effenberger and U. Mosel, Phys. Rev. C 60, 051901 (1999), arXiv:nucl-th/9906085. +[43] W. Cassing and S. Juchem, Nucl. Phys. A 672, 417 (2000), arXiv:nucl-th/9910052. +[44] G. Baym and S. A. Chin, Nucl. Phys. A 262, 527 (1976). +[45] A. Ono, H. Horiuchi, T. Maruyama, and A. Ohnishi, Prog. Theor. Phys. 87, 1185 (1992). +[46] A. Ono, Prog. Part. Nucl. Phys. 105, 139 (2019), arXiv:1903.00608 [nucl-th]. +[47] H. Wolter et al. (TMEP Collaboration), Prog. Part. Nucl. Phys. 125, 103962 (2022), arXiv:2202.06672 +[nucl-th]. +[48] T. Reichert, A. Elz, T. Song, G. Coci, M. Winn, E. Bratkovskaya, J. Aichelin, J. Steinheimer, and +M. Bleicher, J. Phys. G 49, 055108 (2022), arXiv:2111.07652 [nucl-th]. +[49] B. Friman, C. Hohne, J. Knoll, S. Leupold, J. Randrup, R. Rapp, +and P. Senger, eds., The CBM +physics book: Compressed baryonic matter in laboratory experiments, Vol. 814 (2011). +[50] H. Lin and P. Danielewicz, Phys. Rev. C 99, 024612 (2019), arXiv:1807.05673 [nucl-th]. +[51] P.-C. Li, Y.-J. Wang, Q.-F. Li, and H.-F. Zhang, Nucl. Sci. Tech. 29, 177 (2018). +[52] J. Staudenmaier, D. Oliinychenko, J. M. Torres-Rincon, +and H. Elfner, Phys. Rev. C 104, 034908 +(2021), arXiv:2106.14287 [hep-ph]. +[53] P. Danielewicz and P. Schuck, Phys. Lett. B 274, 268 (1992). +[54] W. Cassing and S. Juchem, Nucl. Phys. A 665, 377 (2000), arXiv:nucl-th/9903070. +[55] W. Cassing and S. Juchem, Nucl. Phys. A 677, 445 (2000), arXiv:nucl-th/0003002. +[56] P. Danielewicz, Nucl. Phys. A 673, 375 (2000), arXiv:nucl-th/9912027. +[57] A. Sorensen and V. Koch, Phys. Rev. C 104, 034904 (2021), arXiv:2011.06635 [nucl-th]. +[58] D. Oliinychenko, A. Sorensen, V. Koch, and L. McLerran, (2022), arXiv:2208.11996 [nucl-th]. +[59] Z. Xu and C. Greiner, Phys. Rev. C 71, 064901 (2005), arXiv:hep-ph/0406278. +[60] T. Lepers, D. Davesne, S. Chiacchiera, +and M. Urban, Phys. Rev. A 82, 023609 (2010), +arXiv:1004.5241 [cond-mat.quant-gas]. +[61] E. O’Connor et al., J. Phys. G 45, 104001 (2018), arXiv:1806.04175 [astro-ph.HE]. +[62] O. Just, R. Bollig, H.-T. Janka, M. Obergaulinger, R. Glas, and S. Nagataki, Mon. Not. Roy. Astron. +Soc. 481, 4786 (2018), arXiv:1805.03953 [astro-ph.HE]. +[63] Y.-X. Zhang et al. (TMEP Collaboration), Phys. Rev. C 97, 034625 (2018), arXiv:1711.05950 [nucl-th]. +[64] M. Colonna et al. (TMEP Collaboration), Phys. Rev. C 104, 024603 (2021), arXiv:2106.12287 [nucl- +th]. +[65] C. Fuchs, Prog. Part. Nucl. Phys. 53, 113 (2004), arXiv:nucl-th/0312052. +[66] W. G. Lynch, M. B. Tsang, Y. Zhang, P. Danielewicz, M. Famiano, Z. Li, and A. W. Steiner, Prog. + +70 +Part. Nucl. Phys. 62, 427 (2009), arXiv:0901.0412 [nucl-ex]. +[67] A. Le F`evre, Y. Leifels, W. Reisdorf, J. Aichelin, and C. Hartnack, Nucl. Phys. A 945, 112 (2016), +arXiv:1501.05246 [nucl-ex]. +[68] P. Russotto et al., Phys. Lett. B 697, 471 (2011), arXiv:1101.2361 [nucl-ex]. +[69] P. Russotto et al., Phys. Rev. C 94, 034608 (2016), arXiv:1608.04332 [nucl-ex]. +[70] W. G. Lynch and M. B. Tsang, Phys. Lett. B 830, 137098 (2022), arXiv:2106.10119 [nucl-th]. +[71] M. Kortelainen, J. McDonnell, W. Nazarewicz, P. G. Reinhard, J. Sarich, N. Schunck, M. V. Stoitsov, +and S. M. Wild, Phys. Rev. C 85, 024304 (2012), arXiv:1111.4344 [nucl-th]. +[72] B. A. Brown, Phys. Rev. Lett. 111, 232502 (2013), arXiv:1308.3664 [nucl-th]. +[73] P. Danielewicz and J. Lee, Nucl. Phys. A 922, 1 (2014), arXiv:1307.4130 [nucl-th]. +[74] D. Adhikari et al. (PREX), Phys. Rev. Lett. 126, 172502 (2021), arXiv:2102.10767 [nucl-ex]. +[75] J. Weil et al., Phys. Rev. C 94, 054905 (2016), arXiv:1606.06642 [nucl-th]. +[76] A. M. Sorensen, Density Functional Equation of State and Its Application to the Phenomenology +of Heavy-Ion Collisions, Ph.D. thesis, UCLA, Los Angeles (main), UCLA (2021), arXiv:2109.08105 +[nucl-th]. +[77] H. Stoecker, J. A. Maruhn, and W. Greiner, Phys. Rev. Lett. 44, 725 (1980). +[78] C. Hartnack, J. Aichelin, H. Stoecker, and W. Greiner, Phys. Lett. B 336, 131 (1994). +[79] Y. Nara and A. Ohnishi, Phys. Rev. C 105, 014911 (2022), arXiv:2109.07594 [nucl-th]. +[80] H. A. Gustafsson, H. H. Gutbrod, J. Harris, B. V. Jacak, K. H. Kampert, B. Kolb, A. M. Poskanzer, +H. G. Ritter, and H. R. Schmidt, Mod. Phys. Lett. A 3, 1323 (1988). +[81] M. D. Partlan et al. (EOS), Phys. Rev. Lett. 75, 2100 (1995). +[82] J. Barrette et al. (E877), Phys. Rev. C 56, 3254 (1997), arXiv:nucl-ex/9707002. +[83] H. Liu et al. (E895), Phys. Rev. Lett. 84, 5488 (2000), arXiv:nucl-ex/0005005. +[84] C. Fuchs, A. Faessler, E. Zabrodin, and Y.-M. Zheng, Phys. Rev. Lett. 86, 1974 (2001), arXiv:nucl- +th/0011102. +[85] Y. Liu, Y. Wang, Y. Cui, C.-J. Xia, Z. Li, Y. Chen, Q. Li, and Y. Zhang, Phys. Rev. C 103, 014616 +(2021), arXiv:2006.15861 [nucl-th]. +[86] M. D. Cozma and M. B. Tsang, Eur. Phys. J. A 57, 309 (2021), arXiv:2101.08679 [nucl-th]. +[87] J. Aichelin and C. M. Ko, Phys. Rev. Lett. 55, 2661 (1985). +[88] W. Reisdorf et al. (FOPI), Nucl. Phys. A 876, 1 (2012), arXiv:1112.3180 [nucl-ex]. +[89] J. Aichelin, Phys. Rept. 202, 233 (1991). +[90] C. Pinkenburg et al. (E895), Phys. Rev. Lett. 83, 1295 (1999), arXiv:nucl-ex/9903010. +[91] P. Chung et al. (E895), Phys. Rev. C 66, 021901 (2002), arXiv:nucl-ex/0112002. +[92] J. L. Klay et al. (E895), Phys. Rev. Lett. 88, 102301 (2002), arXiv:nucl-ex/0111006. +[93] J. Adam et al. (STAR), Phys. Rev. C 103, 034908 (2021), arXiv:2007.14005 [nucl-ex]. +[94] M. S. Abdallah et al. (STAR), Phys. Lett. B 827, 137003 (2022), arXiv:2108.00908 [nucl-ex]. +[95] B.-A. Li, Phys. Rev. Lett. 88, 192701 (2002), arXiv:nucl-th/0205002. +[96] B.-A. Li, Phys. Rev. Lett. 85, 4221 (2000), arXiv:nucl-th/0009069. +[97] B.-A. Li, A. Ramos, G. Verde, and I. Vidana, Eur. Phys. J. A 50, 9 (2014). +[98] P. Morfouace et al., Phys. Lett. B 799, 135045 (2019), arXiv:1904.12471 [nucl-ex]. +[99] Y. X. Zhang, P. Danielewicz, M. Famiano, Z. Li, W. G. Lynch, M. B. Tsang, and Z. Li, Phys. Lett. +B 664, 145 (2008), arXiv:0708.3684 [nucl-th]. +[100] Y. Zhang, M. B. Tsang, Z. Li, and H. Liu, Phys. Lett. B 732, 186 (2014), arXiv:1402.3790 [nucl-th]. +[101] J. Estee et al. (SπRIT), Phys. Rev. Lett. 126, 162701 (2021), arXiv:2103.06861 [nucl-ex]. +[102] G. Jhang et al. (SπRIT, TMEP), Phys. Lett. B 813, 136016 (2021), arXiv:2012.06976 [nucl-ex]. +[103] F. Sammarruca and R. Millerson, Phys. Rev. C 104, 064312 (2021), arXiv:2109.01985 [nucl-th]. +[104] C. Gale, G. Bertsch, and S. Das Gupta, Phys. Rev. C 35, 1666 (1987). +[105] J. Aichelin, A. Rosenhauer, G. Peilert, H. Stoecker, and W. Greiner, Phys. Rev. Lett. 58, 1926 (1987). +[106] C. B. Das, S. D. Gupta, C. Gale, and B.-A. Li, Phys. Rev. C 67, 034611 (2003), arXiv:nucl-th/0212090. +[107] B.-A. Li, C. B. Das, S. Das Gupta, +and C. Gale, Phys. Rev. C 69, 011603 (2004), arXiv:nucl- +th/0312032. +[108] B.-A. Li, B.-J. Cai, L.-W. Chen, and J. Xu, Prog. Part. Nucl. Phys. 99, 29 (2018), arXiv:1801.01213 +[nucl-th]. +[109] J. Xu, A. Carbone, Z. Zhang, +and C. M. Ko, Phys. Rev. C 100, 024618 (2019), arXiv:1904.09669 +[nucl-th]. + +71 +[110] C. Wellenhofer, J. W. Holt, N. Kaiser, and W. Weise, Phys. Rev. C 89, 064009 (2014), arXiv:1404.2136 +[nucl-th]. +[111] J. Keller, K. Hebeler, and A. Schwenk, (2022), arXiv:2204.14016 [nucl-th]. +[112] P. Danielewicz and S. Pratt, Phys. Rev. C 53, 249 (1996), arXiv:nucl-th/9507002. +[113] K. Morawetz, P. Lipavsky, V. Spicka, and N.-H. Kwong, Phys. Rev. C 59, 3052 (1999). +[114] D. Pines and P. Nozi`eres, The theory of quantum liquids, The Theory of Quantum Liquids No. v. 1 +(W.A. Benjamin, 1966). +[115] Z. Zhang and C. M. Ko, Phys. Rev. C 98, 054614 (2018). +[116] A. P. Mishra, R. K. Mohapatra, P. S. Saumia, and A. M. Srivastava, Phys. Rev. C 77, 064902 (2008), +arXiv:0711.1323 [hep-ph]. +[117] P. Sorensen, J. Phys. G 37, 094011 (2010), arXiv:1002.4878 [nucl-ex]. +[118] P. Sorensen, “Elliptic Flow: +A Study of Space-Momentum Correlations In Relativistic Nuclear +Collisions,” in Quark-gluon plasma 4, edited by R. C. Hwa and X.-N. Wang (2010) pp. 323–374, +arXiv:0905.0174 [nucl-ex]. +[119] B. Bally et al., (2022), arXiv:2209.11042 [nucl-ex]. +[120] J. R. Stone, P. Danielewicz, and Y. Iwata, Phys. Rev. C 96, 014612 (2017), arXiv:1706.01582 [nucl-th]. +[121] X. G. Cao, G. Q. Zhang, X. Z. Cai, Y. G. Ma, W. Guo, J. G. Chen, W. D. Tian, D. Q. Fang, and +H. W. Wang, Phys. Rev. C 81, 061603 (2010), arXiv:1005.4783 [nucl-th]. +[122] P. Danielewicz, Phys. Rev. C 42, 1564 (1990). +[123] A. Le F`evre, J. Aichelin, C. Hartnack, +and Y. Leifels, Phys. Rev. C 100, 034904 (2019), +arXiv:1906.06162 [nucl-th]. +[124] P. Danielewicz and G. F. Bertsch, Nucl. Phys. A 533, 712 (1991). +[125] D. Oliinychenko, L.-G. Pang, H. Elfner, +and V. Koch, Phys. Rev. C 99, 044907 (2019), +arXiv:1809.03071 [hep-ph]. +[126] K.-J. Sun, R. Wang, C. M. Ko, Y.-G. Ma, and C. Shen, (2021), arXiv:2106.12742 [nucl-th]. +[127] J. Arrington, D. W. Higinbotham, G. Rosner, +and M. Sargsian, Prog. Part. Nucl. Phys. 67, 898 +(2012), arXiv:1104.1196 [nucl-ex]. +[128] O. Hen et al., Science 346, 614 (2014), arXiv:1412.0138 [nucl-ex]. +[129] O. Hen, G. A. Miller, E. Piasetzky, +and L. B. Weinstein, Rev. Mod. Phys. 89, 045002 (2017), +arXiv:1611.09748 [nucl-ex]. +[130] J. +Arrington, +N. +Fomin, +and +A. +Schmidt, +(2022), +10.1146/annurev-nucl-102020-022253, +arXiv:2203.02608 [nucl-ex]. +[131] C. Xu, A. Li, and B.-A. Li, J. Phys. Conf. Ser. 420, 012090 (2013), arXiv:1207.1639 [nucl-th]. +[132] I. Vidana, A. Polls, and C. Providencia, Phys. Rev. C 84, 062801 (2011), arXiv:1107.5412 [nucl-th]. +[133] A. Carbone, A. Polls, and A. Rios, EPL 97, 22001 (2012), arXiv:1111.0797 [nucl-th]. +[134] A. Carbone, A. Polls, C. Providencia, A. Rios, +and I. Vidana, Eur. Phys. J. A 50, 13 (2014), +arXiv:1308.1416 [nucl-th]. +[135] A. Rios, A. Polls, and W. H. Dickhoff, Phys. Rev. C 89, 044303 (2014), arXiv:1312.7307 [nucl-th]. +[136] O. Hen, B.-A. Li, W.-J. Guo, L. B. Weinstein, and E. Piasetzky, Phys. Rev. C 91, 025803 (2015), +arXiv:1408.0772 [nucl-ex]. +[137] B.-A. Li, W.-J. Guo, and Z. Shi, Phys. Rev. C 91, 044601 (2015), arXiv:1408.6415 [nucl-th]. +[138] B.-J. Cai and B.-A. Li, Phys. Rev. C 93, 014619 (2016), arXiv:1509.09290 [nucl-th]. +[139] G. F. Bertsch and P. Danielewicz, Phys. Lett. B 367, 55 (1996), arXiv:nucl-th/9510003. +[140] A. Bonasera and F. Gulminelli, Phys. Lett. B 275, 24 (1992). +[141] G. Batko, J. Randrup, and T. Vetter, Nucl. Phys. A 536, 786 (1992). +[142] J. Lehr, M. Effenberger, H. Lenske, S. Leupold, +and U. Mosel, Phys. Lett. B 483, 324 (2000), +arXiv:nucl-th/0002013. +[143] A. Arrizabalaga, J. Smit, and A. Tranberg, Phys. Rev. D 72, 025014 (2005), arXiv:hep-ph/0503287. +[144] H. Lin, H. Mahzoon, A. Rios, and P. Danielewicz, Annals Phys. 420, 168272 (2020), arXiv:1912.11069 +[nucl-th]. +[145] M. D. Cozma, Phys. Lett. B 753, 166 (2016), arXiv:1409.3110 [nucl-th]. +[146] W. Reisdorf et al. (FOPI), Nucl. Phys. A 781, 459 (2007), arXiv:nucl-ex/0610025. +[147] J. Hong and P. Danielewicz, Phys. Rev. C 90, 024605 (2014), arXiv:1307.7654 [nucl-th]. +[148] J. Adamczewski-Musch et al. (HADES), Phys. Rev. Lett. 125, 262301 (2020), arXiv:2005.12217 [nucl- +ex]. + +72 +[149] P. Danielewicz and M. Kurata-Nishimura, Phys. Rev. C 105, 034608 (2022), arXiv:2109.02626 [nucl- +th]. +[150] R. Berkowitz, APS Physics 15, s26 (2022). +[151] D. Almaalol et al., (2022), arXiv:2209.05009 [nucl-ex]. +[152] D. R. Phillips et al., J. Phys. G 48, 072001 (2021), arXiv:2012.07704 [nucl-th]. +[153] D. Liyanage, Y. Ji, D. Everett, M. Heffernan, U. Heinz, S. Mak, and J.-F. Paquet, Phys. Rev. C 105, +034910 (2022), arXiv:2201.07302 [nucl-th]. +[154] A. Ciardiello et al., Phys. Medica 73, 65 (2020), arXiv:2004.04961 [physics.comp-ph]. +[155] K. Hebeler, J. D. Holt, J. Menendez, +and A. Schwenk, Ann. Rev. Nucl. Part. Sci. 65, 457 (2015), +arXiv:1508.06893 [nucl-th]. +[156] J. E. Lynn, I. Tews, S. Gandolfi, +and A. Lovato, Ann. Rev. Nucl. Part. Sci. 69, 279 (2019), +arXiv:1901.04868 [nucl-th]. +[157] C. Drischler and S. K. Bogner, Few Body Syst. 62, 109 (2021), arXiv:2108.03771 [nucl-th]. +[158] C. Drischler, J. W. Holt, +and C. Wellenhofer, Ann. Rev. Nucl. Part. Sci. 71, 403 (2021), +arXiv:2101.01709 [nucl-th]. +[159] A. Lovato et al., (2022), arXiv:2211.02224 [nucl-th]. +[160] E. Epelbaum, H.-W. Hammer, and U.-G. Meissner, Rev. Mod. Phys. 81, 1773 (2009), arXiv:0811.1338 +[nucl-th]. +[161] R. Machleidt and D. R. Entem, Phys. Rept. 503, 1 (2011), arXiv:1105.2919 [nucl-th]. +[162] H. W. Hammer, S. K¨onig, and U. van Kolck, Rev. Mod. Phys. 92, 025004 (2020), arXiv:1906.12122 +[nucl-th]. +[163] E. Epelbaum, H. Krebs, and P. Reinert, Front. in Phys. 8, 98 (2020), arXiv:1911.11875 [nucl-th]. +[164] M. Piarulli and I. Tews, Front. in Phys. 7, 245 (2020), arXiv:2002.00032 [nucl-th]. +[165] E. Epelbaum, H. Krebs, and U. G. Meißner, Eur. Phys. J. A 51, 53 (2015), arXiv:1412.0142 [nucl-th]. +[166] C. Drischler, J. A. Melendez, R. J. Furnstahl, and D. R. Phillips, Phys. Rev. C 102, 054315 (2020), +arXiv:2004.07805 [nucl-th]. +[167] R. Essick, I. Tews, P. Landry, and A. Schwenk, Phys. Rev. Lett. 127, 192701 (2021), arXiv:2102.10074 +[nucl-th]. +[168] R. Essick, I. Tews, P. Landry, S. Reddy, +and D. E. Holz, Phys. Rev. C 102, 055803 (2020), +arXiv:2004.07744 [astro-ph.HE]. +[169] A. Gezerlis and J. Carlson, Phys. Rev. C 81, 025803 (2010), arXiv:0911.3907 [nucl-th]. +[170] S. Huth, C. Wellenhofer, and A. Schwenk, Phys. Rev. C 103, 025803 (2021), arXiv:2009.08885 [nucl- +th]. +[171] J. Carlson, S. Gandolfi, F. Pederiva, S. C. Pieper, R. Schiavilla, K. E. Schmidt, and R. B. Wiringa, +Rev. Mod. Phys. 87, 1067 (2015), arXiv:1412.3081 [nucl-th]. +[172] I. Tews, Front. in Phys. 8, 153 (2020). +[173] S. Gandolfi, D. Lonardoni, A. Lovato, and M. Piarulli, Front. in Phys. 8, 117 (2020), arXiv:2001.01374 +[nucl-th]. +[174] B. Hu et al., Nature Phys. 18, 1196 (2022), arXiv:2112.01125 [nucl-th]. +[175] A. Tichai, R. Roth, and T. Duguet, Front. in Phys. 8, 164 (2020), arXiv:2001.10433 [nucl-th]. +[176] A. Gezerlis, I. Tews, E. Epelbaum, S. Gandolfi, K. Hebeler, A. Nogga, and A. Schwenk, Phys. Rev. +Lett. 111, 032501 (2013), arXiv:1303.6243 [nucl-th]. +[177] A. Gezerlis, I. Tews, E. Epelbaum, M. Freunek, S. Gandolfi, K. Hebeler, A. Nogga, and A. Schwenk, +Phys. Rev. C 90, 054323 (2014), arXiv:1406.0454 [nucl-th]. +[178] J. E. Lynn, I. Tews, J. Carlson, S. Gandolfi, A. Gezerlis, K. E. Schmidt, and A. Schwenk, Phys. Rev. +C 96, 054007 (2017), arXiv:1706.07668 [nucl-th]. +[179] I. Tews, D. Lonardoni, and S. Gandolfi, Few Body Syst. 62, 111 (2021), arXiv:2108.10452 [nucl-th]. +[180] M. Piarulli, L. Girlanda, R. Schiavilla, R. Navarro P´erez, J. E. Amaro, and E. Ruiz Arriola, Phys. +Rev. C 91, 024003 (2015), arXiv:1412.6446 [nucl-th]. +[181] M. Piarulli, L. Girlanda, R. Schiavilla, A. Kievsky, A. Lovato, L. E. Marcucci, S. C. Pieper, M. Viviani, +and R. B. Wiringa, Phys. Rev. C 94, 054007 (2016), arXiv:1606.06335 [nucl-th]. +[182] A. Baroni et al., Phys. Rev. C 98, 044003 (2018), arXiv:1806.10245 [nucl-th]. +[183] D. Lonardoni, J. Carlson, S. Gandolfi, J. E. Lynn, K. E. Schmidt, A. Schwenk, and X. Wang, Phys. +Rev. Lett. 120, 122502 (2018), arXiv:1709.09143 [nucl-th]. +[184] D. Lonardoni, I. Tews, S. Gandolfi, and J. Carlson, Phys. Rev. Res. 2, 022033 (2020), arXiv:1912.09411 + +73 +[nucl-th]. +[185] M. Piarulli et al., Phys. Rev. Lett. 120, 052503 (2018), arXiv:1707.02883 [nucl-th]. +[186] G. B. King, L. Andreoli, S. Pastore, M. Piarulli, R. Schiavilla, R. B. Wiringa, J. Carlson, +and +S. Gandolfi, Phys. Rev. C 102, 025501 (2020), arXiv:2004.05263 [nucl-th]. +[187] J. E. Lynn, I. Tews, J. Carlson, S. Gandolfi, A. Gezerlis, K. E. Schmidt, and A. Schwenk, Phys. Rev. +Lett. 116, 062501 (2016), arXiv:1509.03470 [nucl-th]. +[188] I. Tews, J. Carlson, S. Gandolfi, +and S. Reddy, Astrophys. J. 860, 149 (2018), arXiv:1801.01923 +[nucl-th]. +[189] I. Tews, J. Margueron, and S. Reddy, Phys. Rev. C 98, 045804 (2018), arXiv:1804.02783 [nucl-th]. +[190] M. Piarulli, I. Bombaci, D. Logoteta, A. Lovato, and R. B. Wiringa, Phys. Rev. C 101, 045801 (2020), +arXiv:1908.04426 [nucl-th]. +[191] A. Lovato, I. Bombaci, D. Logoteta, M. Piarulli, and R. B. Wiringa, Phys. Rev. C 105, 055808 (2022), +arXiv:2202.10293 [nucl-th]. +[192] M. Al-Mamun, A. W. Steiner, J. N¨attil¨a, J. Lange, R. O’Shaughnessy, I. Tews, S. Gandolfi, C. Heinke, +and S. Han, Phys. Rev. Lett. 126, 061101 (2021), arXiv:2008.12817 [astro-ph.HE]. +[193] T. Dietrich, M. W. Coughlin, P. T. H. Pang, M. Bulla, J. Heinzel, L. Issa, I. Tews, and S. Antier, +Science 370, 1450 (2020), arXiv:2002.11355 [astro-ph.HE]. +[194] K. Hebeler and A. Schwenk, Phys. Rev. C 82, 014314 (2010), arXiv:0911.0483 [nucl-th]. +[195] J. Hoppe, C. Drischler, R. J. Furnstahl, K. Hebeler, and A. Schwenk, Phys. Rev. C 96, 054002 (2017), +arXiv:1707.06438 [nucl-th]. +[196] S. K. Bogner, R. J. Furnstahl, and A. Schwenk, Prog. Part. Nucl. Phys. 65, 94 (2010), arXiv:0912.3688 +[nucl-th]. +[197] P. Arthuis, A. Tichai, J. Ripoche, +and T. Duguet, Comput. Phys. Commun. 261, 107677 (2021), +arXiv:2007.01661 [nucl-th]. +[198] C. Drischler, K. Hebeler, +and A. Schwenk, Phys. Rev. Lett. 122, 042501 (2019), arXiv:1710.08220 +[nucl-th]. +[199] C. Wellenhofer, Isospin-Asymmetry Dependence of the Thermodynamic Nuclear Equation of State in +Many-Body Perturbation Theory, Ph.D. thesis, Munich, Tech. U. (2017), arXiv:1707.09222 [nucl-th]. +[200] J. Keller, C. Wellenhofer, K. Hebeler, +and A. Schwenk, Phys. Rev. C 103, 055806 (2021), +arXiv:2011.05855 [nucl-th]. +[201] A. Carbone and A. Schwenk, Phys. Rev. C 100, 025805 (2019), arXiv:1904.00924 [nucl-th]. +[202] C. Drischler, V. Soma, and A. Schwenk, Phys. Rev. C 89, 025806 (2014), arXiv:1310.5627 [nucl-th]. +[203] C. Drischler, K. Hebeler, and A. Schwenk, Phys. Rev. C 93, 054314 (2016), arXiv:1510.06728 [nucl-th]. +[204] C. Wellenhofer, J. W. Holt, and N. Kaiser, Phys. Rev. C 92, 015801 (2015), arXiv:1504.00177 [nucl- +th]. +[205] P. Wen and J. W. Holt, Phys. Rev. C 103, 064002 (2021), arXiv:2012.02163 [nucl-th]. +[206] R. Somasundaram, C. Drischler, I. Tews, +and J. Margueron, Phys. Rev. C 103, 045803 (2021), +arXiv:2009.04737 [nucl-th]. +[207] X. Du, A. W. Steiner, and J. W. Holt, Phys. Rev. C 105, 035803 (2022), arXiv:2107.06697 [nucl-th]. +[208] T. R. Whitehead, Y. Lim, and J. W. Holt, Phys. Rev. Lett. 127, 182502 (2021), arXiv:2009.08436 +[nucl-th]. +[209] J. W. Holt and T. R. Whitehead, (2022), arXiv:2201.13404 [nucl-th]. +[210] C. Hebborn et al., (2022), arXiv:2210.07293 [nucl-th]. +[211] G. F. Bertsch and S. Das Gupta, Phys. Rept. 160, 189 (1988). +[212] J. Xu, L.-W. Chen, and B.-A. Li, Phys. Rev. C 91, 014611 (2015), arXiv:1410.1604 [nucl-th]. +[213] M. Dutra, O. Lourenco, J. S. Sa Martins, A. Delfino, J. R. Stone, and P. D. Stevenson, Phys. Rev. +C 85, 035201 (2012), arXiv:1202.3902 [nucl-th]. +[214] B. A. Brown and A. Schwenk, Phys. Rev. C 89, 011307 (2014), [Erratum: Phys.Rev.C 91, 049902 +(2015)], arXiv:1311.3957 [nucl-th]. +[215] Z. Zhang, Y. Lim, J. W. Holt, and C. M. Ko, Phys. Lett. B 777, 73 (2018), arXiv:1703.00866 [nucl-th]. +[216] A. Carbone, A. Polls, and A. Rios, Phys. Rev. C 98, 025804 (2018), arXiv:1807.00596 [nucl-th]. +[217] E. Rrapaj, J. W. Holt, A. Bartl, S. Reddy, +and A. Schwenk, Phys. Rev. C 91, 035806 (2015), +arXiv:1408.3368 [nucl-th]. +[218] A. Schnell, G. Ropke, U. Lombardo, and H. J. Schulze, Phys. Rev. C 57, 806 (1998). +[219] A. Rios, Front. in Phys. 8, 387 (2020), arXiv:2006.10610 [nucl-th]. + +74 +[220] F. Sammarruca, Eur. Phys. J. A 50, 22 (2014), arXiv:1307.5373 [nucl-th]. +[221] A. Kurkela, P. Romatschke, +and A. Vuorinen, Phys. Rev. D 81, 105021 (2010), arXiv:0912.1856 +[hep-ph]. +[222] A. Kurkela, E. S. Fraga, J. Schaffner-Bielich, +and A. Vuorinen, Astrophys. J. 789, 127 (2014), +arXiv:1402.6618 [astro-ph.HE]. +[223] E. Annala, T. Gorda, A. Kurkela, +and A. Vuorinen, Phys. Rev. Lett. 120, 172703 (2018), +arXiv:1711.02644 [astro-ph.HE]. +[224] O. Komoltsev and A. Kurkela, Phys. Rev. Lett. 128, 202701 (2022), arXiv:2111.05350 [nucl-th]. +[225] T. Gorda, O. Komoltsev, and A. Kurkela, (2022), arXiv:2204.11877 [nucl-th]. +[226] R. Somasundaram, I. Tews, and J. Margueron, (2022), arXiv:2204.14039 [nucl-th]. +[227] M. Leonhardt, M. Pospiech, B. Schallmo, J. Braun, C. Drischler, K. Hebeler, and A. Schwenk, Phys. +Rev. Lett. 125, 142502 (2020), arXiv:1907.05814 [nucl-th]. +[228] J. Braun, A. Geißel, and B. Schallmo, (2022), arXiv:2206.06328 [nucl-th]. +[229] J. M. Lattimer, Ann. Rev. Nucl. Part. Sci. 71, 433 (2021). +[230] Y. Lim and J. W. Holt, Eur. Phys. J. A 55, 209 (2019), arXiv:1902.05502 [nucl-th]. +[231] F. Zhang and G.-C. Yong, Eur. Phys. J. A 52, 350 (2016), arXiv:1605.03656 [nucl-th]. +[232] B. Biswas, Astrophys. J. 921, 63 (2021), arXiv:2105.02886 [astro-ph.HE]. +[233] M. G. Alford, L. Brodie, A. Haber, and I. Tews, Phys. Rev. C 106, 055804 (2022), arXiv:2205.10283 +[nucl-th]. +[234] J. Margueron, +R. Hoffmann Casali, +and F. Gulminelli, Phys. Rev. C 97, 025805 (2018), +arXiv:1708.06894 [nucl-th]. +[235] J. Margueron, +R. Hoffmann Casali, +and F. Gulminelli, Phys. Rev. C 97, 025806 (2018), +arXiv:1708.06895 [nucl-th]. +[236] N.-B. Zhang, B.-A. Li, and J. Xu, Astrophys. J. 859, 90 (2018), arXiv:1801.06855 [nucl-th]. +[237] P. T. H. Pang et al., (2022), arXiv:2205.08513 [astro-ph.HE]. +[238] N.-B. Zhang and B.-A. Li, Astrophys. J. 921, 111 (2021), arXiv:2105.11031 [nucl-th]. +[239] I. Tews, J. Margueron, and S. Reddy, Eur. Phys. J. A 55, 97 (2019), arXiv:1901.09874 [nucl-th]. +[240] J. S. Read, B. D. Lackey, B. J. Owen, +and J. L. Friedman, Phys. Rev. D 79, 124032 (2009), +arXiv:0812.2163 [astro-ph]. +[241] F. Ozel and D. Psaltis, Phys. Rev. D 80, 103003 (2009), arXiv:0905.1959 [astro-ph.HE]. +[242] A. W. Steiner, J. M. Lattimer, +and E. F. Brown, Astrophys. J. 722, 33 (2010), arXiv:1005.0811 +[astro-ph.HE]. +[243] A. W. Steiner, C. O. Heinke, S. Bogdanov, C. Li, W. C. G. Ho, A. Bahramian, and S. Han, Mon. +Not. Roy. Astron. Soc. 476, 421 (2018), arXiv:1709.05013 [astro-ph.HE]. +[244] S. K. Greif, G. Raaijmakers, K. Hebeler, A. Schwenk, and A. L. Watts, Mon. Not. Roy. Astron. Soc. +485, 5363 (2019), arXiv:1812.08188 [astro-ph.HE]. +[245] G. Raaijmakers, S. K. Greif, K. Hebeler, T. Hinderer, S. Nissanke, A. Schwenk, T. E. Riley, A. L. +Watts, J. M. Lattimer, +and W. C. G. Ho, Astrophys. J. Lett. 918, L29 (2021), arXiv:2105.06981 +[astro-ph.HE]. +[246] E. Annala, T. Gorda, A. Kurkela, J. N¨attil¨a, +and A. Vuorinen, Nature Phys. 16, 907 (2020), +arXiv:1903.09121 [astro-ph.HE]. +[247] L. Lindblom, Phys. Rev. D 82, 103011 (2010), arXiv:1009.0738 [astro-ph.HE]. +[248] P. Landry and R. Essick, Phys. Rev. D 99, 084049 (2019), arXiv:1811.12529 [gr-qc]. +[249] P. Landry, R. Essick, +and K. Chatziioannou, Phys. Rev. D 101, 123007 (2020), arXiv:2003.04880 +[astro-ph.HE]. +[250] R. Essick, P. Landry, +and D. E. Holz, Phys. Rev. D 101, 063007 (2020), arXiv:1910.09740 [astro- +ph.HE]. +[251] I. Legred, K. Chatziioannou, R. Essick, S. Han, and P. Landry, Phys. Rev. D 104, 063003 (2021), +arXiv:2106.05313 [astro-ph.HE]. +[252] M. a. Ferreira and C. Providˆencia, JCAP 07, 011 (2021), arXiv:1910.05554 [nucl-th]. +[253] R. Essick, P. Landry, A. Schwenk, and I. Tews, Phys. Rev. C 104, 065804 (2021), arXiv:2107.05528 +[nucl-th]. +[254] I. Legred, K. Chatziioannou, R. Essick, +and P. Landry, Phys. Rev. D 105, 043016 (2022), +arXiv:2201.06791 [astro-ph.HE]. +[255] M. C. Miller et al., Astrophys. J. Lett. 918, L28 (2021), arXiv:2105.06979 [astro-ph.HE]. + +75 +[256] E. Fonseca et al., Astrophys. J. Lett. 915, L12 (2021), arXiv:2104.00880 [astro-ph.HE]. +[257] H. T. Cromartie et al. (NANOGrav), Nature Astron. 4, 72 (2019), arXiv:1904.06759 [astro-ph.HE]. +[258] B. Margalit and B. D. Metzger, Astrophys. J. Lett. 850, L19 (2017), arXiv:1710.05938 [astro-ph.HE]. +[259] L. Rezzolla, E. R. Most, +and L. R. Weih, Astrophys. J. Lett. 852, L25 (2018), arXiv:1711.00314 +[astro-ph.HE]. +[260] S. De, D. Finstad, J. M. Lattimer, D. A. Brown, E. Berger, and C. M. Biwer, Phys. Rev. Lett. 121, +091102 (2018), [Erratum: Phys.Rev.Lett. 121, 259902 (2018)], arXiv:1804.08583 [astro-ph.HE]. +[261] B. P. Abbott et al. (LIGO Scientific, Virgo), Phys. Rev. Lett. 121, 161101 (2018), arXiv:1805.11581 +[gr-qc]. +[262] M. C. Miller et al., Astrophys. J. Lett. 887, L24 (2019), arXiv:1912.05705 [astro-ph.HE]. +[263] T. E. Riley et al., Astrophys. J. Lett. 887, L21 (2019), arXiv:1912.05702 [astro-ph.HE]. +[264] T. E. Riley et al., Astrophys. J. Lett. 918, L27 (2021), arXiv:2105.06980 [astro-ph.HE]. +[265] P. S. Shternin, D. D. Ofengeim, W. C. G. Ho, C. O. Heinke, M. J. P. Wijngaarden, +and D. J. +Patnaude, Mon. Not. Roy. Astron. Soc. 506, 709 (2021), arXiv:2106.05692 [astro-ph.HE]. +[266] P. Bedaque and A. W. Steiner, Phys. Rev. Lett. 114, 031103 (2015), arXiv:1408.5116 [nucl-th]. +[267] M. G. Alford, G. F. Burgio, S. Han, G. Taranto, and D. Zappal`a, Phys. Rev. D 92, 083002 (2015), +arXiv:1501.07902 [nucl-th]. +[268] Y. Fujimoto, K. Fukushima, +and K. Murase, Phys. Rev. D 101, 054016 (2020), arXiv:1903.03400 +[nucl-th]. +[269] M. Marczenko, L. McLerran, K. Redlich, and C. Sasaki, (2022), arXiv:2207.13059 [nucl-th]. +[270] H. Tan, T. Dore, V. Dexheimer, J. Noronha-Hostler, and N. Yunes, Phys. Rev. D 105, 023018 (2022), +arXiv:2106.03890 [astro-ph.HE]. +[271] N. Andersson, K. Glampedakis, and L. Samuelsson, Mon. Not. Roy. Astron. Soc. 396, 894 (2009), +arXiv:0812.2417 [astro-ph]. +[272] T. Carreau, F. Gulminelli, +and J. Margueron, Eur. Phys. J. A 55, 188 (2019), arXiv:1902.07032 +[nucl-th]. +[273] L. E. Balliet, W. G. Newton, S. Cantu, and S. Budimir, Astrophys. J. 918, 79 (2021), arXiv:2009.07696 +[astro-ph.HE]. +[274] H. D. Thi, T. Carreau, A. F. Fantina, +and F. Gulminelli, Astron. Astrophys. 654, A114 (2021), +arXiv:2109.13638 [nucl-th]. +[275] W. G. Newton, R. Preston, L. Balliet, +and M. Ross, Phys. Lett. B 834, 137481 (2022), +arXiv:2111.07969 [nucl-th]. +[276] D. Neill, W. G. Newton, and D. Tsang, Mon. Not. Roy. Astron. Soc. 504, 1129 (2021), [Erratum: +Mon.Not.Roy.Astron.Soc. 513, 310–310 (2022), Erratum: Mon.Not.Roy.Astron.Soc. 513, 310 (2022)], +arXiv:2012.10322 [astro-ph.HE]. +[277] R. Wijnands, J. Homan, J. M. Miller, +and W. H. G. Lewin, Astrophys. J. Lett. 606, L61 (2004), +arXiv:astro-ph/0310612. +[278] E. M. Cackett, R. Wijnands, M. Linares, J. M. Miller, J. Homan, +and W. Lewin, Mon. Not. Roy. +Astron. Soc. 372, 479 (2006), arXiv:astro-ph/0605490. +[279] E. M. Cackett, R. Wijnands, J. M. Miller, E. F. Brown, and N. Degenaar, Astrophys. J. Lett. 687, +L87 (2008), arXiv:0806.1166 [astro-ph]. +[280] E. M. Cackett, E. F. Brown, A. Cumming, N. Degenaar, J. K. Fridriksson, J. Homan, J. M. Miller, +and R. Wijnands, Astrophys. J. 774, 131 (2013), arXiv:1306.1776 [astro-ph.HE]. +[281] A. S. Parikh et al., Astron. Astrophys. 624, A84 (2019), arXiv:1810.05626 [astro-ph.HE]. +[282] G. Ashton, P. D. Lasky, V. Graber, +and J. Palfreyman, +(2019), 10.1038/s41550-019-0844-6, +arXiv:1907.01124 [astro-ph.HE]. +[283] E. F. Brown and A. Cumming, Astrophys. J. 698, 1020 (2009), arXiv:0901.3115 [astro-ph.SR]. +[284] R. Wijnands, N. Degenaar, +and D. Page, Mon. Not. Roy. Astron. Soc. 432, 2366 (2013), +arXiv:1208.4273 [astro-ph.HE]. +[285] H. Sotani, Mon. Not. Roy. Astron. Soc. 417, L70 (2011), arXiv:1106.2621 [astro-ph.HE]. +[286] M. Gearheart, W. G. Newton, J. Hooker, and B.-A. Li, Mon. Not. Roy. Astron. Soc. 418, 2343 (2011), +arXiv:1106.4875 [astro-ph.SR]. +[287] A. S. Schneider, C. J. Horowitz, J. Hughto, +and D. K. Berry, Phys. Rev. C 88, 065807 (2013), +arXiv:1307.1678 [nucl-th]. +[288] G. Watanabe, K. Iida, +and K. Sato, Nucl. Phys. A 676, 455 (2000), [Erratum: Nucl.Phys.A 726, + +76 +357–365 (2003)], arXiv:astro-ph/0001273. +[289] D. K. Berry, M. E. Caplan, C. J. Horowitz, G. Huber, and A. S. Schneider, Phys. Rev. C 94, 055801 +(2016), arXiv:1509.00410 [nucl-th]. +[290] A. I. Chugunov and C. J. Horowitz, Mon. Not. Roy. Astron. Soc. 407, L54 (2010), arXiv:1006.2279 +[astro-ph.SR]. +[291] M. E. Caplan and C. J. Horowitz, Rev. Mod. Phys. 89, 041002 (2017), arXiv:1606.03646 [astro-ph.HE]. +[292] M. E. Caplan, A. S. Schneider, +and C. J. Horowitz, Phys. Rev. Lett. 121, 132701 (2018), +arXiv:1807.02557 [nucl-th]. +[293] C. J. Pethick and A. Y. Potekhin, Phys. Lett. B 427, 7 (1998), arXiv:astro-ph/9803154. +[294] C. J. Pethick, Z. Zhang, and D. N. Kobyakov, Phys. Rev. C 101, 055802 (2020), arXiv:2003.13430 +[cond-mat.mtrl-sci]. +[295] A. S. Botvina, N. Buyukcizmeci, M. Erdogan, J. Lukasik, I. N. Mishustin, R. Ogul, and W. Traut- +mann, Phys. Rev. C 74, 044609 (2006), arXiv:nucl-th/0606060. +[296] S. R. Souza, M. B. Tsang, R. Donangelo, W. G. Lynch, and A. W. Steiner, Phys. Rev. C 78, 014605 +(2008), arXiv:0804.1352 [nucl-th]. +[297] R. Ogul et al., Phys. Rev. C 83, 024608 (2011), [Erratum: +Phys.Rev.C 85, 019903 (2012)], +arXiv:1006.3723 [nucl-ex]. +[298] N. Chamel and P. Haensel, Living Rev. Rel. 11, 10 (2008), arXiv:0812.3955 [astro-ph]. +[299] Y. Lim and J. W. Holt, Phys. Rev. C 95, 065805 (2017), arXiv:1702.02898 [nucl-th]. +[300] I. Tews, Phys. Rev. C 95, 015803 (2017), arXiv:1607.06998 [nucl-th]. +[301] G. Baym, H. A. Bethe, and C. Pethick, Nucl. Phys. A 175, 225 (1971). +[302] M. M. Forbes, S. Bose, S. Reddy, D. Zhou, A. Mukherjee, +and S. De, Phys. Rev. D 100, 083010 +(2019), arXiv:1904.04233 [astro-ph.HE]. +[303] W. G. Newton, M. Gearheart, +and B.-A. Li, Astrophys. J. Suppl. 204, 9 (2013), arXiv:1110.4043 +[astro-ph.SR]. +[304] K. Oyamatsu and K. Iida, Phys. Rev. C 75, 015801 (2007), arXiv:nucl-th/0609040. +[305] P. Magierski and P.-H. Heenen, Phys. Rev. C 65, 045804 (2002), arXiv:nucl-th/0112018. +[306] P. Gogelein and H. Muther, Phys. Rev. C 76, 024312 (2007), arXiv:0704.1984 [nucl-th]. +[307] W. G. Newton and J. R. Stone, Phys. Rev. C 79, 055801 (2009). +[308] B. Schuetrumpf, C. Zhang, +and W. Nazarewicz, “Clustering and pasta phases in nuclear density +functional theory,” in Nuclear Particle Correlations and Cluster Physics, edited by W.-U. Schr¨oder +(2017) pp. 135–153, arXiv:1607.01372 [nucl-th]. +[309] F. J. Fattoyev, C. J. Horowitz, and B. Schuetrumpf, Phys. Rev. C 95, 055804 (2017), arXiv:1703.01433 +[nucl-th]. +[310] W. G. Newton, M. A. Kaltenborn, S. Cantu, S. Wang, A. Stinson, and J. Rikovska Stone, Phys. Rev. +C 105, 025806 (2022), arXiv:2104.11835 [nucl-th]. +[311] O. Lopez et al., Phys. Rev. C 90, 064602 (2014), [Erratum: +Phys.Rev.C 90, 069903 (2014)], +arXiv:1409.0735 [nucl-ex]. +[312] W. G. Newton, J. Hooker, M. Gearheart, K. Murphy, D.-H. Wen, F. J. Fattoyev, and B.-A. Li, Eur. +Phys. J. A 50, 41 (2014), arXiv:1506.02207 [nucl-th]. +[313] W. G. Newton, M. Gearheart, J. Hooker, +and B.-A. Li, “The nuclear symmetry energy, the inner +crust, and global neutron star modeling,” (2011) arXiv:1112.2018 [astro-ph.SR]. +[314] V. Baibhav, E. Berti, D. Gerosa, M. Mapelli, N. Giacobbo, Y. Bouffanais, and U. N. Di Carlo, Phys. +Rev. D 100, 064060 (2019), arXiv:1906.04197 [gr-qc]. +[315] A. Colombo, O. S. Salafia, F. Gabrielli, G. Ghirlanda, B. Giacomazzo, A. Perego, +and M. Colpi, +Astrophys. J. 937, 79 (2022), arXiv:2204.07592 [astro-ph.HE]. +[316] B. Patricelli, M. G. Bernardini, M. Mapelli, P. D’Avanzo, F. Santoliquido, G. Cella, M. Razzano, and +E. Cuoco, Mon. Not. Roy. Astron. Soc. 513, 4159 (2022), [Erratum: Mon.Not.Roy.Astron.Soc. 514, +3395 (2022)], arXiv:2204.12504 [astro-ph.HE]. +[317] P. S. Ray et al. (STROBE-X Science Working Group), (2019), arXiv:1903.03035 [astro-ph.IM]. +[318] H. Tan, J. Noronha-Hostler, and N. Yunes, Phys. Rev. Lett. 125, 261104 (2020), arXiv:2006.16296 +[astro-ph.HE]. +[319] F. Marino, C. Barbieri, A. Carbone, G. Col`o, A. Lovato, F. Pederiva, X. Roca-Maza, and E. Vigezzi, +Phys. Rev. C 104, 024315 (2021), arXiv:2103.14480 [nucl-th]. +[320] C. J. Yang, W. G. Jiang, S. Burrello, +and M. Grasso, Phys. Rev. C 106, L011305 (2022), + +77 +arXiv:2110.01959 [nucl-th]. +[321] M. Shelley and A. Pastore, Phys. Rev. C 103, 035807 (2021), arXiv:2104.02408 [nucl-th]. +[322] I. Sagert, O. Korobkin, I. Tews, B.-J. Tsao, H. Lim, M. J. Falato, +and J. Loiseau, +(2022), +arXiv:2211.01927 [astro-ph.IM]. +[323] U. W. Heinz and M. Jacob, (2000), arXiv:nucl-th/0002042. +[324] I. Arsene et al. (BRAHMS), Nucl. Phys. A 757, 1 (2005), arXiv:nucl-ex/0410020. +[325] K. Adcox et al. (PHENIX), Nucl. Phys. A 757, 184 (2005), arXiv:nucl-ex/0410003. +[326] B. B. Back et al. (PHOBOS), Nucl. Phys. A 757, 28 (2005), arXiv:nucl-ex/0410022. +[327] J. Adams et al. (STAR), Nucl. Phys. A 757, 102 (2005), arXiv:nucl-ex/0501009. +[328] B. Muller, J. Schukraft, and B. Wyslouch, Ann. Rev. Nucl. Part. Sci. 62, 361 (2012), arXiv:1202.3233 +[hep-ex]. +[329] S. Pratt, E. Sangaline, P. Sorensen, +and H. Wang, Phys. Rev. Lett. 114, 202301 (2015), +arXiv:1501.04042 [nucl-th]. +[330] A. Bazavov et al. (HotQCD), Phys. Lett. B 795, 15 (2019), arXiv:1812.08235 [hep-lat]. +[331] Y. Aoki, Z. Fodor, S. D. Katz, and K. K. Szabo, Phys. Lett. B 643, 46 (2006), arXiv:hep-lat/0609068. +[332] S. Borsanyi, Z. Fodor, J. N. Guenther, R. Kara, S. D. Katz, P. Parotto, A. Pasztor, C. Ratti, and +K. K. Szabo, Phys. Rev. Lett. 125, 052001 (2020), arXiv:2002.02821 [hep-lat]. +[333] M. Hanauske, J. Steinheimer, A. Motornenko, V. Vovchenko, L. Bovard, E. R. Most, L. J. Papenfort, +S. Schramm, and H. St¨ocker, Particles 2, 44 (2019). +[334] E. R. Most, A. Motornenko, J. Steinheimer, V. Dexheimer, M. Hanauske, L. Rezzolla, and H. Stoecker, +(2022), arXiv:2201.13150 [nucl-th]. +[335] Z. Zhang and L.-W. Chen, Phys. Rev. C 92, 031301 (2015), arXiv:1504.01077 [nucl-th]. +[336] P. Huovinen, P. V. Ruuskanen, +and J. Sollfrank, Nucl. Phys. A 650, 227 (1999), arXiv:nucl- +th/9807076. +[337] O. Savchuk, A. Motornenko, J. Steinheimer, V. Vovchenko, M. Bleicher, M. Gorenstein, +and +T. Galatyuk, (2022), arXiv:2209.05267 [nucl-th]. +[338] P. Li, J. Steinheimer, T. Reichert, A. Kittiratpattana, M. Bleicher, and Q. Li, Sci. China Phys. Mech. +Astron. 66, 232011 (2023), arXiv:2209.01413 [nucl-th]. +[339] G. F. Bertsch, Nucl. Phys. A 498, 173C (1989). +[340] S. Pratt, T. Csorgo, and J. Zimanyi, Phys. Rev. C 42, 2646 (1990). +[341] J.-Y. Ollitrault, Phys. Rev. D 46, 229 (1992). +[342] D. H. Rischke, Y. P¨urs¨un, J. A. Maruhn, H. Stoecker, and W. Greiner, Acta Phys. Hung. A 1, 309 +(1995), arXiv:nucl-th/9505014. +[343] H. Stoecker, Nucl. Phys. A 750, 121 (2005), arXiv:nucl-th/0406018. +[344] J. Brachmann, S. Soff, A. Dumitru, H. Stoecker, J. A. Maruhn, W. Greiner, L. V. Bravina, and D. H. +Rischke, Phys. Rev. C 61, 024909 (2000), arXiv:nucl-th/9908010. +[345] L. P. Csernai and D. Rohrich, Phys. Lett. B 458, 454 (1999), arXiv:nucl-th/9908034. +[346] Y. B. Ivanov and A. A. Soldatov, Phys. Rev. C 91, 024915 (2015), arXiv:1412.1669 [nucl-th]. +[347] B.-A. Li and C. M. Ko, Phys. Rev. C 58, R1382 (1998), arXiv:nucl-th/9807088. +[348] Y. Wang, C. Guo, Q. Li, A. Le F`evre, Y. Leifels, and W. Trautmann, Phys. Lett. B 778, 207 (2018), +arXiv:1804.04293 [nucl-th]. +[349] S. A. Voloshin, A. M. Poskanzer, and R. Snellings, Landolt-Bornstein 23, 293 (2010), arXiv:0809.2949 +[nucl-ex]. +[350] C. Zhang, J. Chen, X. Luo, F. Liu, and Y. Nara, Phys. Rev. C 97, 064913 (2018), arXiv:1803.02053 +[nucl-ex]. +[351] C. Fuchs, Prog. Part. Nucl. Phys. 56, 1 (2006), arXiv:nucl-th/0507017. +[352] P. Senger, Particles 5, 21 (2022). +[353] C. T. Sturm et al. (KAOS), Phys. Rev. Lett. 86, 39 (2001), arXiv:nucl-ex/0011001. +[354] C. Hartnack, H. Oeschler, and J. Aichelin, Phys. Rev. Lett. 96, 012302 (2006), arXiv:nucl-th/0506087. +[355] F. Uhlig et al., Phys. Rev. Lett. 95, 012301 (2005), arXiv:nucl-ex/0411021. +[356] H. A. Gustafsson et al., Phys. Rev. Lett. 52, 1590 (1984). +[357] H. H. Gutbrod, B. W. Kolb, H. R. Schmidt, A. M. Poskanzer, H. G. Ritter, +and K. H. Kampert, +Phys. Lett. B 216, 267 (1989). +[358] H. Stoecker and W. Greiner, Phys. Rept. 137, 277 (1986). +[359] A. Andronic et al. (FOPI), Phys. Lett. B 612, 173 (2005), arXiv:nucl-ex/0411024. + +78 +[360] STAR Collaboration, “Studying the Phase Diagram of QCD Matter at RHIC,” https://drupal. +star.bnl.gov/STAR/starnotes/public/sn0598 (2014), accessed: 2023-01-01. +[361] A. Bzdak, S. Esumi, V. Koch, J. Liao, M. Stephanov, +and N. Xu, Phys. Rept. 853, 1 (2020), +arXiv:1906.00936 [nucl-th]. +[362] P. Tribedy, “Highlights from the star experiment,” https://indico.cern.ch/event/895086/ +contributions/4314628/ (2022), accessed: 2023-01-01. +[363] G. Agakishiev et al. (HADES), Eur. Phys. J. A 41, 243 (2009), arXiv:0902.3478 [nucl-ex]. +[364] J. Adamczewski-Musch et al. (HADES), Nature Phys. 15, 1040 (2019). +[365] F. Seck, T. Galatyuk, A. Mukherjee, R. Rapp, J. Steinheimer, J. Stroth, and M. Wiest, Phys. Rev. +C 106, 014904 (2022), arXiv:2010.04614 [nucl-th]. +[366] J. Adamczewski-Musch et al. (HADES), Eur. Phys. J. A 56, 259 (2020), arXiv:2005.08774 [nucl-ex]. +[367] W. Reisdorf et al. (FOPI), Nucl. Phys. A 848, 366 (2010), arXiv:1005.3418 [nucl-ex]. +[368] D. Cozma, “The equation of state of symmetric nuclear matter from intermediate energy heavy-ion +data,” https://www.int.washington.edu/program/schedule/1155 (2022), accessed: 2023-01-01. +[369] S. Ghosh, D. Chatterjee, and J. Schaffner-Bielich, Eur. Phys. J. A 58, 37 (2022), arXiv:2107.09371 +[astro-ph.HE]. +[370] S. Ghosh, B. K. Pradhan, D. Chatterjee, and J. Schaffner-Bielich, Front. Astron. Space Sci. 9, 864294 +(2022), arXiv:2203.03156 [astro-ph.HE]. +[371] M. A. Lisa, S. Pratt, R. Soltz, +and U. Wiedemann, Ann. Rev. Nucl. Part. Sci. 55, 357 (2005), +arXiv:nucl-ex/0505014. +[372] S. Pratt and J. Vredevoogd, Phys. Rev. C 78, 054906 (2008), [Erratum: Phys.Rev.C 79, 069901 +(2009)], arXiv:0809.0516 [nucl-th]. +[373] P. Batyuk, I. Karpenko, R. Lednicky, L. Malinina, K. Mikhaylov, O. Rogachevsky, and D. Wielanek, +Phys. Rev. C 96, 024911 (2017), arXiv:1703.09628 [nucl-th]. +[374] L. Adamczyk et al. (STAR), Phys. Rev. Lett. 116, 062301 (2016), arXiv:1507.05247 [nucl-ex]. +[375] M. A. Stephanov, Phys. Rev. Lett. 102, 032301 (2009), arXiv:0809.3450 [hep-ph]. +[376] M. A. Stephanov, Phys. Rev. Lett. 107, 052301 (2011), arXiv:1104.1627 [hep-ph]. +[377] J. Adam et al. (STAR), Phys. Rev. Lett. 126, 092301 (2021), arXiv:2001.02852 [nucl-ex]. +[378] M. Abdallah et al. (STAR), Phys. Rev. C 104, 024902 (2021), arXiv:2101.12413 [nucl-ex]. +[379] J. Adamczewski-Musch et al. (HADES), Phys. Rev. C 102, 024914 (2020), arXiv:2002.08701 [nucl-ex]. +[380] T. Ablyazimov et al. (CBM), Eur. Phys. J. A 53, 60 (2017), arXiv:1607.01487 [nucl-ex]. +[381] M. Durante et al., Phys. Scripta 94, 033001 (2019), arXiv:1903.05693 [nucl-th]. +[382] K. Agarwal (CBM), Acta Phys. Polon. Supp. 16, 1 (2023), arXiv:2207.14585 [hep-ex]. +[383] CBM Collaboration, “Exploring the high-density region of the QCD phase diagram with CBM at +FAIR: Input for the NuPECC Long Range Plan 2024,” https://indico.ph.tum.de/event/7050/ +contributions/6344/ (2022), accessed: 2023-01-01. +[384] P. Gasik, “CBM: status & response to the ”First-Science and Staging Review of the FAIR Project”,” +https://indico.gsi.de/event/13777/contributions/67251/ (2022), accessed: 2023-01-01. +[385] R. Wada et al., Phys. Rev. C 85, 064618 (2012), arXiv:1110.3341 [nucl-ex]. +[386] K. Hagel, J. B. Natowitz, and G. R¨opke, Eur. Phys. J. A 50, 39 (2014), arXiv:1401.2074 [nucl-ex]. +[387] H. Pais, S. Chiacchiera, +and C. Providˆencia, Phys. Rev. C 91, 055801 (2015), arXiv:1504.03964 +[nucl-th]. +[388] B. T. Reed, F. J. Fattoyev, C. J. Horowitz, and J. Piekarewicz, Phys. Rev. Lett. 126, 172503 (2021), +arXiv:2101.03193 [nucl-th]. +[389] D. Adhikari et al. (CREX), Phys. Rev. Lett. 129, 042501 (2022), arXiv:2205.11593 [nucl-ex]. +[390] P.-G. Reinhard, X. Roca-Maza, +and W. Nazarewicz, Phys. Rev. Lett. 129, 232501 (2022), +arXiv:2206.03134 [nucl-th]. +[391] Z. Zhang and L.-W. Chen, (2022), arXiv:2207.03328 [nucl-th]. +[392] P. Papakonstantinou (2022) arXiv:2210.02696 [nucl-th]. +[393] B. A. Brown, Phys. Rev. Lett. 119, 122502 (2017). +[394] S. V. Pineda et al., Phys. Rev. Lett. 127, 182503 (2021), arXiv:2106.10378 [nucl-ex]. +[395] A. B. McIntosh and S. J. Yennello, Prog. Part. Nucl. Phys. 108, 103707 (2019). +[396] A. Jedele et al., Phys. Rev. Lett. 118, 062501 (2017). +[397] A. Rodriguez Manso, A. B. McIntosh, A. Jedele, K. Hagel, L. Heilborn, Z. Kohley, L. W. May, +A. Zarrella, and S. J. Yennello, Phys. Rev. C 95, 044604 (2017). + +79 +[398] A. Hannaman et al., Phys. Rev. C 101, 034605 (2020). +[399] B. Harvey et al., Phys. Rev. C 102, 064625 (2020). +[400] M. B. Tsang et al., Phys. Rev. Lett. 92, 062701 (2004). +[401] M. B. Tsang et al., Phys. Rev. C 64, 054615 (2001). +[402] M. B. Tsang, W. A. Friedman, C. K. Gelbke, W. G. Lynch, G. Verde, and H. Xu, Phys. Rev. Lett. +86, 5023 (2001), arXiv:nucl-ex/0103010. +[403] T. X. Liu et al., Phys. Rev. C 76, 034603 (2007), arXiv:nucl-ex/0610013. +[404] Z. Y. Sun et al., Phys. Rev. C 82, 051603 (2010), arXiv:1009.1669 [nucl-ex]. +[405] D. D. S. Coupland, W. G. Lynch, M. B. Tsang, P. Danielewicz, +and Y. Zhang, Phys. Rev. C 84, +054603 (2011), arXiv:1107.3709 [nucl-th]. +[406] Z. Chajecki et al., (2014), arXiv:1402.5216 [nucl-ex]. +[407] D. D. S. Coupland et al., Phys. Rev. C 94, 011601 (2016), arXiv:1406.4546 [nucl-ex]. +[408] M. D. Cozma, Eur. Phys. J. A 54, 40 (2018), arXiv:1706.01300 [nucl-th]. +[409] J. Estee, Charged Pion Emission From Neutron-Rich Heavy Ion Collisions for Studies on the Symmetry +Energy, Ph.D. thesis, Michigan State University (2020). +[410] C. Y. Tsang, Constrain neutron star properties with SπRIT experiment, Ph.D. thesis, Michigan State +University (2021). +[411] D. Neill, R. Preston, W. G. Newton, and D. Tsang, (2022), arXiv:2208.00994 [astro-ph.HE]. +[412] D. H. Youngblood, H. L. Clark, and Y. W. Lui, Phys. Rev. Lett. 82, 691 (1999). +[413] C. Fuchs, A. Faessler, S. El-Basaouny, K. M. Shekhter, E. Zabrodin, and Y. M. Zheng, J. Phys. G +28, 1615 (2002), arXiv:nucl-th/0103036. +[414] S. Abrahamyan et al., Phys. Rev. Lett. 108, 112502 (2012), arXiv:1201.2568 [nucl-ex]. +[415] J. Xu, W.-J. Xie, and B.-A. Li, Phys. Rev. C 102, 044316 (2020), arXiv:2007.07669 [nucl-th]. +[416] W. G. Newton and G. Crocombe, Phys. Rev. C 103, 064323 (2021), arXiv:2008.00042 [nucl-th]. +[417] A. Klimkiewicz et al., AIP Conf. Proc. 1012, 250 (2008). +[418] J. Birkhan et al., Phys. Rev. Lett. 118, 252501 (2017), arXiv:1611.07072 [nucl-ex]. +[419] A. Carbone, G. Colo, A. Bracco, L.-G. Cao, P. F. Bortignon, F. Camera, and O. Wieland, Phys. Rev. +C 81, 041301 (2010), arXiv:1003.3580 [nucl-th]. +[420] T. Hashimoto et al., Phys. Rev. C 92, 031305 (2015), arXiv:1503.08321 [nucl-ex]. +[421] X. Roca-Maza, X. Vi˜nas, M. Centelles, B. K. Agrawal, G. Colo’, N. Paar, J. Piekarewicz, +and +D. Vretenar, Phys. Rev. C 92, 064304 (2015), arXiv:1510.01874 [nucl-th]. +[422] J. Piekarewicz, Phys. Rev. C 104, 024329 (2021), arXiv:2105.13452 [nucl-th]. +[423] P.-G. Reinhard, X. Roca-Maza, +and W. Nazarewicz, Phys. Rev. Lett. 127, 232501 (2021), +arXiv:2105.15050 [nucl-th]. +[424] I. Daoutidis and S. Goriely, Phys. Rev. C 84, 027301 (2011). +[425] L. Lindblom, Astrophys. J. 398, 569 (1992). +[426] M. C. Miller, C. Chirenti, +and F. K. Lamb, +(2019), 10.3847/1538-4357/ab4ef9, arXiv:1904.08907 +[astro-ph.HE]. +[427] P. S. Shternin, D. G. Yakovlev, C. O. Heinke, W. C. G. Ho, +and D. J. Patnaude, Mon. Not. Roy. +Astron. Soc. 412, L108 (2011), arXiv:1012.0045 [astro-ph.SR]. +[428] D. Page, M. Prakash, J. M. Lattimer, +and A. W. Steiner, Phys. Rev. Lett. 106, 081101 (2011), +arXiv:1011.6142 [astro-ph.HE]. +[429] S. Beloin, S. Han, A. W. Steiner, +and K. Odbadrakh, Phys. Rev. C 100, 055801 (2019), +arXiv:1812.00494 [nucl-th]. +[430] A. W. Steiner and A. L. Watts, Phys. Rev. Lett. 103, 181101 (2009), arXiv:0902.1683 [astro-ph.HE]. +[431] H. Sotani, K. Nakazato, K. Iida, +and K. Oyamatsu, Phys. Rev. Lett. 108, 201101 (2012), +arXiv:1202.6242 [astro-ph.HE]. +[432] B. Link, R. I. Epstein, and J. M. Lattimer, Phys. Rev. Lett. 83, 3362 (1999), arXiv:astro-ph/9909146. +[433] N. Andersson, K. Glampedakis, W. C. G. Ho, +and C. M. Espinoza, Phys. Rev. Lett. 109, 241103 +(2012), arXiv:1207.0633 [astro-ph.SR]. +[434] N. Chamel, Phys. Rev. Lett. 110, 011101 (2013), arXiv:1210.8177 [astro-ph.HE]. +[435] J. Piekarewicz, F. J. Fattoyev, and C. J. Horowitz, Phys. Rev. C 90, 015803 (2014), arXiv:1404.2660 +[nucl-th]. +[436] J. Hooker, W. G. Newton, +and B.-A. Li, Mon. Not. Roy. Astron. Soc. 449, 3559 (2015), +arXiv:1308.0031 [astro-ph.SR]. + +80 +[437] W. G. Newton, S. Berger, +and B. Haskell, Mon. Not. Roy. Astron. Soc. 454, 4400 (2015), +arXiv:1506.01445 [astro-ph.SR]. +[438] J. A. Pons, D. Vigano’, and N. Rea, Nature Phys. 9, 431 (2013), arXiv:1304.6546 [astro-ph.SR]. +[439] D.-H. Wen, W. G. Newton, and B.-A. Li, Phys. Rev. C 85, 025801 (2012), arXiv:1110.5985 [astro- +ph.SR]. +[440] I. Vidana, Phys. Rev. C 85, 045808 (2012), [Erratum: Phys.Rev.C 90, 029901 (2014)], arXiv:1202.4731 +[nucl-th]. +[441] D. Tsang, J. S. Read, T. Hinderer, A. L. Piro, +and R. Bondarescu, Phys. Rev. Lett. 108, 011102 +(2012), arXiv:1110.0467 [astro-ph.HE]. +[442] C. J. Horowitz, D. K. Berry, C. M. Briggs, M. E. Caplan, A. Cumming, and A. S. Schneider, Phys. +Rev. Lett. 114, 031102 (2015), arXiv:1410.2197 [astro-ph.HE]. +[443] M. J. P. Wijngaarden, W. C. G. Ho, P. Chang, C. O. Heinke, D. Page, M. Beznogov, +and D. J. +Patnaude, Mon. Not. Roy. Astron. Soc. 484, 974 (2019), arXiv:1901.01012 [astro-ph.HE]. +[444] S. Lalit, Z. Meisel, +and E. F. Brown, (2019), 10.3847/1538-4357/ab338c, arXiv:1906.01535 [astro- +ph.HE]. +[445] M. Kramer et al., Phys. Rev. X 11, 041050 (2021), arXiv:2112.06795 [astro-ph.HE]. +[446] J. M. Lattimer and B. F. Schutz, Astrophys. J. 629, 979 (2005), arXiv:astro-ph/0411470. +[447] F. J. Fattoyev and J. Piekarewicz, Phys. Rev. C 82, 025810 (2010), arXiv:1006.3758 [nucl-th]. +[448] A. W. Steiner, S. Gandolfi, F. J. Fattoyev, +and W. G. Newton, Phys. Rev. C 91, 015804 (2015), +arXiv:1403.7546 [nucl-th]. +[449] C. A. Raithel, F. Ozel, and D. Psaltis, Phys. Rev. C 93, 032801 (2016), [Addendum: Phys.Rev.C 93, +049905 (2016)], arXiv:1603.06594 [astro-ph.HE]. +[450] S. K. Greif, K. Hebeler, J. M. Lattimer, C. J. Pethick, +and A. Schwenk, Astrophys. J. 901, 155 +(2020), arXiv:2005.14164 [astro-ph.HE]. +[451] A. Cumming, E. F. Brown, F. J. Fattoyev, C. J. Horowitz, D. Page, and S. Reddy, Phys. Rev. C 95, +025806 (2017), arXiv:1608.07532 [astro-ph.HE]. +[452] M. Mendes, F. J. Fattoyev, A. Cumming, and C. Gale, in 16th Marcel Grossmann Meeting on Recent +Developments in Theoretical and Experimental General Relativity, Astrophysics and Relativistic Field +Theories (2021) arXiv:2110.11077 [nucl-th]. +[453] C. Drischler, S. Han, J. M. Lattimer, M. Prakash, S. Reddy, and T. Zhao, Phys. Rev. C 103, 045808 +(2021), arXiv:2009.06441 [nucl-th]. +[454] T.-G. Yue, L.-W. Chen, Z. Zhang, and Y. Zhou, Phys. Rev. Res. 4, L022054 (2022), arXiv:2102.05267 +[nucl-th]. +[455] A. Li, Z. Miao, S. Han, and B. Zhang, Astrophys. J. 913, 27 (2021), arXiv:2103.15119 [astro-ph.HE]. +[456] T. C. Slaba, A. A. Bahadori, B. D. Reddell, R. C. Singleterry, M. S. Clowdsley, and S. R. Blattnig, +Life Sciences in Space Research 12, 1 (2017). +[457] R. Brun, F. Bruyant, M. Maire, A. C. McPherson, and P. Zanarini, (1987). +[458] S. Agostinelli et al. (GEANT4), Nucl. Instrum. Meth. A 506, 250 (2003). +[459] C. Ahdida et al., Front. in Phys. 9, 788253 (2022). +[460] M. V. Diwan, V. Galymov, X. Qian, +and A. Rubbia, Ann. Rev. Nucl. Part. Sci. 66, 47 (2016), +arXiv:1608.06237 [hep-ex]. +[461] U. Mosel, Ann. Rev. Nucl. Part. Sci. 66, 171 (2016), arXiv:1602.00696 [nucl-th]. +[462] U. Mosel and K. Gallmeister, Phys. Rev. C 96, 015503 (2017), [Addendum: Phys.Rev.C 99, 035502 +(2019)], arXiv:1708.04528 [nucl-th]. +[463] B. Abi et al. (DUNE), (2018), arXiv:1807.10334 [physics.ins-det]. +[464] M. A. Acero et al. (NOvA), Phys. Rev. D 106, 032004 (2022), arXiv:2108.08219 [hep-ex]. +[465] K. Abe et al. (T2K), Nature 580, 339 (2020), [Erratum: Nature 583, E16 (2020)], arXiv:1910.03887 +[hep-ex]. +[466] P. H. Adrian et al. (HPS), Phys. Rev. D 98, 091101 (2018), arXiv:1807.11530 [hep-ex]. +[467] N. Wright, A. Papadopoulou, J. R. Pybus, S. Gardiner, M. Roda, F. Hauenstein, A. Ashkenazi, +L. Weinstein, A. Schmidt, and O. Hen, (2021), arXiv:2104.05090 [nucl-th]. +[468] S. Moran et al. (CLAS), Phys. Rev. C 105, 015201 (2022), arXiv:2109.09951 [nucl-ex]. +[469] I. N. Laboratory, “The multimegawatt program taking space reactors to the next level,” https://inl. +gov/wp-content/uploads/2017/08/AtomicPowerInSpaceII-AHistory_2015_chapters6-10.pdf +(2015), accessed: 2023-01-14. + +81 +[470] NASA, +“Kilopower,” https://www.nasa.gov/directorates/spacetech/kilopower +(2021), +ac- +cessed: 2023-01-14. +[471] NASA, +“Nuclear +thermal +propulsion,” +https://www.nasa.gov/mission_pages/tdm/ +nuclear-thermal-propulsion/index.html (2021), accessed: 2023-01-14. +[472] LLNL, “Mini device set to analyze mysterious psyche,” https://str.llnl.gov/2019-05/burks +(2019), accessed: 2023-01-14. +[473] J. Broline and N. van Vonno, “Hardening and testing semiconductor devices in the space radiation +environment,” +https://www.electronicdesign.com/technologies/analog/article/21798644/ +hardening-and-testing-semiconductor-devices-in-the-space-radiation-environment +(2013), accessed: 2023-01-14. +[474] J. W. Wilson, T. C. Slaba, F. F. Badavi, B. D. Reddell, and A. A. Bahadori, Life Sciences in Space +Research 4, 46 (2015). +[475] G. D. Badhwar and P. M. O’Neill, Int. J. Rad. Applications Instrumentation. Part D. Nuclear Tracks +and Radiation Measurements 20, 403 (1992). +[476] M. +M. +Finckenor, +“Materials +for +spacecraft,” +in +Aerospace +Materials +and +Appli- +cations +(American +Inst. +Aeronautics +Astronautics, +2018) +Chap. +6, +pp. +403–434, +https://arc.aiaa.org/doi/pdf/10.2514/5.9781624104893.0403.0434. +[477] S. K. H¨oeffgen, S. Metzger, and M. Steffens, Frontiers in Physics 8 (2020), 10.3389/fphy.2020.00318. +[478] M. Durante and F. A. Cucinotta, Rev. Mod. Phys. 83, 1245 (2011). +[479] J. W. Norbury, Nucl. Instrum. Meth. A 986, 164681 (2021). +[480] J. Hufner, K. Schafer, and B. Schurmann, Phys. Rev. C 12, 1888 (1975). +[481] C. Werneth, W. de Wet, L. Townsend, K. Maung, J. Norbury, T. Slaba, R. Norman, S. Blattnig, and +W. Ford, Nuclear Instruments and Methods in Physics Research Section B: Beam Interactions with +Materials and Atoms 502, 118 (2021). +[482] F. Luoni et al., New J. Phys. 23, 101201 (2021), arXiv:2105.11981 [nucl-th]. +[483] S. Sombun, K. Tomuang, A. Limphirat, P. Hillmann, C. Herold, J. Steinheimer, Y. Yan, and M. Ble- +icher, Phys. Rev. C 99, 014901 (2019), arXiv:1805.11509 [nucl-th]. +[484] T. Abbott et al. (E-802), Phys. Rev. D 45, 3906 (1992). +[485] K. Kolos et al., Phys. Rev. Res. 4, 021001 (2022). +[486] M. S. Smith, R. Vogt, and K. LaBel, “Nuclear data for high energy ion interactions and secondary +particle production,” (2022). +[487] M. Durante and H. Paganetti, Reports on Progress in Physics 79, 096702 (2016). +[488] T. D. Malouff, A. Mahajan, S. Krishnan, C. Beltran, D. S. Seneviratne, and D. M. Trifiletti, Frontiers +in Oncology 10 (2020), 10.3389/fonc.2020.00082. +[489] M. Colonna, M. Di Toro, A. Guarnera, S. Maccarone, M. Zielinska-Pfab´e, and H. H. Wolter, Nucl. +Phys. A 642, 449 (1998). +[490] P. Napolitani and M. Colonna, Phys. Lett. B 726, 382 (2013), arXiv:1302.0241 [nucl-th]. +[491] C. Mancini-Terracciano, M. Asai, B. Caccia, G. Cirrone, A. Dotti, R. Faccini, P. Napolitani, L. Pan- +dola, D. Wright, and M. Colonna, Physica Medica 67, 116 (2019). +[492] J. Aichelin, Prog. Part. Nucl. Phys. 30, 191 (1993). +[493] T. +Sato +et +al., +Journal +of +Nuclear +Science +and +Technology +50, +913 +(2013), +https://doi.org/10.1080/00223131.2013.814553. +[494] T. Sato et al., Annals Nucl. Energy 82, 110 (2015). +[495] L. D. Landau and E. M. Lifshitz, Fluid Mechanics (Pergamon Press, 1987). +[496] P. Kovtun, J. Phys. A 45, 473001 (2012), arXiv:1205.5040 [hep-th]. +[497] W. Busza, K. Rajagopal, +and W. van der Schee, Ann. Rev. Nucl. Part. Sci. 68, 339 (2018), +arXiv:1802.04801 [hep-ph]. +[498] X. An et al., Nucl. Phys. A 1017, 122343 (2022), arXiv:2108.13867 [nucl-th]. +[499] A. Addazi, T. Lundberg, A. Marcian`o, R. Pasechnik, and M. ˇSumbera, Universe 8 (2022), 10.3390/uni- +verse8090451. +[500] M. Prakash, I. Bombaci, M. Prakash, P. J. Ellis, J. M. Lattimer, and R. Knorren, Phys. Rept. 280, +1 (1997), arXiv:nucl-th/9603042. +[501] J. A. Pons, S. Reddy, M. Prakash, J. M. Lattimer, and J. A. Miralles, Astrophys. J. 513, 780 (1999), +arXiv:astro-ph/9807040. +[502] J. M. Lattimer and M. Prakash, Science 304, 536 (2004), arXiv:astro-ph/0405262. + +82 +[503] J. M. Lattimer and M. Prakash, Phys. Rept. 442, 109 (2007), arXiv:astro-ph/0612440. +[504] J. M. Lattimer and M. Prakash, Phys. Rept. 621, 127 (2016), arXiv:1512.07820 [astro-ph.SR]. +[505] G. F. Burgio, H. J. Schulze, I. Vidana, and J. B. Wei, Prog. Part. Nucl. Phys. 120, 103879 (2021), +arXiv:2105.03747 [nucl-th]. +[506] M. Oertel, M. Hempel, T. Kl¨ahn, and S. Typel, Rev. Mod. Phys. 89, 015007 (2017), arXiv:1610.03361 +[astro-ph.HE]. +[507] L. Baiotti and L. Rezzolla, Rept. Prog. Phys. 80, 096901 (2017), arXiv:1607.03540 [gr-qc]. +[508] J. A. Font, Living Rev. Rel. 11, 7 (2008). +[509] R. Oechslin, H. T. Janka, and A. Marek, Astron. Astrophys. 467, 395 (2007), arXiv:astro-ph/0611047. +[510] M. Marczenko, D. Blaschke, K. Redlich, +and C. Sasaki, Astron. Astrophys. 643, A82 (2020), +arXiv:2004.09566 [astro-ph.HE]. +[511] K. Chatziioannou, Gen. Rel. Grav. 52, 109 (2020), arXiv:2006.03168 [gr-qc]. +[512] U. Heinz and R. Snellings, Ann. Rev. Nucl. Part. Sci. 63, 123 (2013), arXiv:1301.2826 [nucl-th]. +[513] C. Gale, S. Jeon, and B. Schenke, Int. J. Mod. Phys. A 28, 1340011 (2013), arXiv:1301.5893 [nucl-th]. +[514] K. Dusling, W. Li, +and B. Schenke, Int. J. Mod. Phys. E 25, 1630002 (2016), arXiv:1509.07939 +[nucl-ex]. +[515] B. Abelev et al. (ALICE), Phys. Lett. B 719, 29 (2013), arXiv:1212.2001 [nucl-ex]. +[516] G. Aad et al. (ATLAS), Phys. Rev. Lett. 110, 182302 (2013), arXiv:1212.5198 [hep-ex]. +[517] V. Khachatryan et al. (CMS), Phys. Rev. Lett. 115, 012301 (2015), arXiv:1502.05382 [nucl-ex]. +[518] J. Adam et al. (ALICE), Nature Phys. 13, 535 (2017), arXiv:1606.07424 [nucl-ex]. +[519] G. Aad et al. (ATLAS), Phys. Rev. Lett. 116, 172301 (2016), arXiv:1509.04776 [hep-ex]. +[520] V. Khachatryan et al. (CMS), Phys. Rev. Lett. 116, 172302 (2016), arXiv:1510.03068 [nucl-ex]. +[521] R. D. Weller and P. Romatschke, Phys. Lett. B 774, 351 (2017), arXiv:1701.07145 [nucl-th]. +[522] A. Adare et al. (PHENIX), Phys. Rev. Lett. 111, 212301 (2013), arXiv:1303.1794 [nucl-ex]. +[523] +(2022), arXiv:2210.11352 [nucl-ex]. +[524] W. A. Hiscock and L. Lindblom, Phys. Rev. D 31, 725 (1985). +[525] I. Muller, Z. Phys. 198, 329 (1967). +[526] W. Israel, Annals Phys. 100, 310 (1976). +[527] W. Israel and J. M. Stewart, Annals Phys. 118, 341 (1979). +[528] G. S. Denicol, H. Niemi, E. Molnar, and D. H. Rischke, Phys. Rev. D 85, 114047 (2012), [Erratum: +Phys.Rev.D 91, 039902 (2015)], arXiv:1202.4551 [nucl-th]. +[529] R. Baier, P. Romatschke, D. T. Son, A. O. Starinets, and M. A. Stephanov, JHEP 04, 100 (2008), +arXiv:0712.2451 [hep-th]. +[530] W. Florkowski, M. P. Heller, and M. Spalinski, Rept. Prog. Phys. 81, 046001 (2018), arXiv:1707.02282 +[hep-ph]. +[531] C. Plumberg, D. Almaalol, T. Dore, J. Noronha, and J. Noronha-Hostler, Phys. Rev. C 105, L061901 +(2022), arXiv:2103.15889 [nucl-th]. +[532] D. Almaalol, T. Dore, and J. Noronha-Hostler, (2022), arXiv:2209.11210 [hep-th]. +[533] F. S. Bemfica, M. M. Disconzi, and J. Noronha, Phys. Rev. D 98, 104064 (2018), arXiv:1708.06255 +[gr-qc]. +[534] F. S. Bemfica, F. S. Bemfica, M. M. Disconzi, M. M. Disconzi, J. Noronha, and J. Noronha, Phys. +Rev. D 100, 104020 (2019), [Erratum: Phys.Rev.D 105, 069902 (2022)], arXiv:1907.12695 [gr-qc]. +[535] P. Kovtun, JHEP 10, 034 (2019), arXiv:1907.08191 [hep-th]. +[536] R. E. Hoult and P. Kovtun, JHEP 06, 067 (2020), arXiv:2004.04102 [hep-th]. +[537] F. S. Bemfica, M. M. Disconzi, and J. Noronha, Phys. Rev. X 12, 021044 (2022), arXiv:2009.11388 +[gr-qc]. +[538] N. Abbasi and S. Tahery, (2022), arXiv:2212.14619 [hep-th]. +[539] K. Jensen, M. Kaminski, P. Kovtun, R. Meyer, A. Ritz, and A. Yarom, Phys. Rev. Lett. 109, 101601 +(2012), arXiv:1203.3556 [hep-th]. +[540] N. Banerjee, J. Bhattacharya, S. Bhattacharyya, S. Jain, S. Minwalla, and T. Sharma, JHEP 09, 046 +(2012), arXiv:1203.3544 [hep-th]. +[541] S. Grozdanov and J. Polonyi, Phys. Rev. D 91, 105031 (2015), arXiv:1305.3670 [hep-th]. +[542] P. Kovtun, JHEP 07, 028 (2016), arXiv:1606.01226 [hep-th]. +[543] F. M. Haehl, R. Loganayagam, and M. Rangamani, JHEP 05, 060 (2015), arXiv:1502.00636 [hep-th]. +[544] M. Crossley, P. Glorioso, and H. Liu, JHEP 09, 095 (2017), arXiv:1511.03646 [hep-th]. + +83 +[545] K. Jensen, R. Marjieh, N. Pinzani-Fokeeva, +and A. Yarom, SciPost Phys. 5, 053 (2018), +arXiv:1804.04654 [hep-th]. +[546] H. Liu and P. Glorioso, PoS TASI2017, 008 (2018), arXiv:1805.09331 [hep-th]. +[547] A. Jain and P. Kovtun, Phys. Rev. Lett. 128, 071601 (2022), arXiv:2009.01356 [hep-th]. +[548] X. Chen-Lin, L. V. Delacr´etaz, +and S. A. Hartnoll, Phys. Rev. Lett. 122, 091602 (2019), +arXiv:1811.12540 [hep-th]. +[549] N. Abbasi, M. Kaminski, and O. Tavakol, (2022), arXiv:2212.11499 [hep-th]. +[550] J. Noronha-Hostler, J. Noronha, and M. Gyulassy, Nucl. Phys. A 956, 890 (2016), arXiv:1512.07135 +[nucl-th]. +[551] M. P. Heller and M. Spalinski, Phys. Rev. Lett. 115, 072501 (2015), arXiv:1503.07514 [hep-th]. +[552] P. Romatschke, JHEP 12, 079 (2017), arXiv:1710.03234 [hep-th]. +[553] J.-P. Blaizot and L. Yan, Annals Phys. 412, 167993 (2020), arXiv:1904.08677 [nucl-th]. +[554] A. Kurkela, W. van der Schee, U. A. Wiedemann, and B. Wu, Phys. Rev. Lett. 124, 102301 (2020), +arXiv:1907.08101 [hep-ph]. +[555] G. Giacalone, +A. Mazeliauskas, +and S. Schlichting, Phys. Rev. Lett. 123, 262301 (2019), +arXiv:1908.02866 [hep-ph]. +[556] D. Almaalol, A. Kurkela, and M. Strickland, Phys. Rev. Lett. 125, 122302 (2020), arXiv:2004.05195 +[hep-ph]. +[557] J.-P. Blaizot and L. Yan, Phys. Lett. B 820, 136478 (2021), arXiv:2006.08815 [nucl-th]. +[558] V. E. Ambrus, S. Busuioc, J. A. Fotakis, K. Gallmeister, and C. Greiner, Phys. Rev. D 104, 094022 +(2021), arXiv:2102.11785 [nucl-th]. +[559] J.-P. Blaizot and L. Yan, Phys. Rev. C 104, 055201 (2021), arXiv:2106.10508 [nucl-th]. +[560] C. Chattopadhyay, S. Jaiswal, L. Du, U. Heinz, +and S. Pal, Phys. Lett. B 824, 136820 (2022), +arXiv:2107.05500 [nucl-th]. +[561] S. Jaiswal, C. Chattopadhyay, L. Du, U. Heinz, +and S. Pal, Phys. Rev. C 105, 024911 (2022), +arXiv:2107.10248 [hep-ph]. +[562] J.-P. Blaizot and L. Yan, Phys. Lett. B 780, 283 (2018), arXiv:1712.03856 [nucl-th]. +[563] M. Spali´nski, in 29th International Conference on Ultra-relativistic Nucleus-Nucleus Collisions (2022) +arXiv:2209.13849 [hep-ph]. +[564] K. Rajagopal, G. Ridgway, R. Weller, and Y. Yin, Phys. Rev. D 102, 094025 (2020), arXiv:1908.08539 +[hep-ph]. +[565] N. Abbasi and M. Kaminski, Phys. Rev. D 106, 016004 (2022), arXiv:2112.14747 [nucl-th]. +[566] M. Hongo, X.-G. Huang, M. Kaminski, M. Stephanov, +and H.-U. Yee, JHEP 11, 150 (2021), +arXiv:2107.14231 [hep-th]. +[567] S. Grozdanov, P. K. Kovtun, A. O. Starinets, +and P. Tadi´c, Phys. Rev. Lett. 122, 251601 (2019), +arXiv:1904.01018 [hep-th]. +[568] M. P. Heller, A. Serantes, M. Spali´nski, V. Svensson, and B. Withers, SciPost Phys. 10, 123 (2021), +arXiv:2012.15393 [hep-th]. +[569] M. P. Heller, A. Serantes, M. Spali´nski, V. Svensson, +and B. Withers, Phys. Rev. D 104, 066002 +(2021), arXiv:2007.05524 [hep-th]. +[570] M. P. Heller, A. Serantes, M. Spali´nski, V. Svensson, +and B. Withers, Phys. Rev. X 12, 041010 +(2022), arXiv:2112.12794 [hep-th]. +[571] B. Withers, JHEP 06, 059 (2018), arXiv:1803.08058 [hep-th]. +[572] P. Romatschke, Phys. Rev. Lett. 120, 012301 (2018), arXiv:1704.08699 [hep-th]. +[573] M. Stephanov and Y. Yin, Phys. Rev. D 98, 036006 (2018), arXiv:1712.10305 [nucl-th]. +[574] M. A. Stephanov, Prog. Theor. Phys. Suppl. 153, 139 (2004), arXiv:hep-ph/0402115. +[575] L. Adamczyk et al. (STAR), Nature 548, 62 (2017), arXiv:1701.06657 [nucl-ex]. +[576] I. Karpenko and F. Becattini, Eur. Phys. J. C 77, 213 (2017), arXiv:1610.04717 [nucl-th]. +[577] F. Becattini and I. Karpenko, Phys. Rev. Lett. 120, 012302 (2018), arXiv:1707.07984 [nucl-th]. +[578] F. Becattini, M. Buzzegoli, G. Inghirami, I. Karpenko, and A. Palermo, Phys. Rev. Lett. 127, 272302 +(2021), arXiv:2103.14621 [nucl-th]. +[579] W. Florkowski, B. Friman, A. Jaiswal, +and E. Speranza, Phys. Rev. C 97, 041901 (2018), +arXiv:1705.00587 [nucl-th]. +[580] D. Montenegro and G. Torrieri, Phys. Rev. D 102, 036007 (2020), arXiv:2004.10195 [hep-th]. +[581] S. Bhadury, W. Florkowski, A. Jaiswal, A. Kumar, +and R. Ryblewski, Phys. Rev. D 103, 014030 + +84 +(2021), arXiv:2008.10976 [nucl-th]. +[582] N. Weickgenannt, E. Speranza, X.-l. Sheng, Q. Wang, +and D. H. Rischke, Phys. Rev. Lett. 127, +052301 (2021), arXiv:2005.01506 [hep-ph]. +[583] K. Fukushima and S. Pu, Phys. Lett. B 817, 136346 (2021), arXiv:2010.01608 [hep-th]. +[584] S. Li, M. A. Stephanov, +and H.-U. Yee, Phys. Rev. Lett. 127, 082302 (2021), arXiv:2011.12318 +[hep-th]. +[585] A. D. Gallegos, U. G¨ursoy, and A. Yarom, SciPost Phys. 11, 041 (2021), arXiv:2101.04759 [hep-th]. +[586] A. D. Gallegos, U. Gursoy, and A. Yarom, (2022), arXiv:2203.05044 [hep-th]. +[587] D.-L. Wang, X.-Q. Xie, S. Fang, +and S. Pu, Phys. Rev. D 105, 114050 (2022), arXiv:2112.15535 +[hep-ph]. +[588] N. Weickgenannt, D. Wagner, E. Speranza, +and D. H. Rischke, Phys. Rev. D 106, 096014 (2022), +arXiv:2203.04766 [nucl-th]. +[589] S. Grozdanov, D. M. Hofman, +and N. Iqbal, Phys. Rev. D 95, 096003 (2017), arXiv:1610.07392 +[hep-th]. +[590] J. Hernandez and P. Kovtun, JHEP 05, 001 (2017), arXiv:1703.08757 [hep-th]. +[591] J. Armas and A. Jain, JHEP 01, 041 (2020), arXiv:1811.04913 [hep-th]. +[592] K. Hattori, Y. Hirono, H.-U. Yee, and Y. Yin, Phys. Rev. D 100, 065023 (2019), arXiv:1711.08450 +[hep-th]. +[593] A. Das, N. Iqbal, and N. Poovuttikul, (2022), arXiv:2212.09787 [hep-th]. +[594] S. Vardhan, S. Grozdanov, S. Leutheusser, and H. Liu, (2022), arXiv:2207.01636 [astro-ph.HE]. +[595] M. Greif, J. A. Fotakis, G. S. Denicol, +and C. Greiner, Phys. Rev. Lett. 120, 242301 (2018), +arXiv:1711.08680 [hep-ph]. +[596] J. A. Fotakis, M. Greif, C. Greiner, G. S. Denicol, and H. Niemi, Phys. Rev. D 101, 076007 (2020), +arXiv:1912.09103 [hep-ph]. +[597] M. Gyulassy and L. McLerran, Nucl. Phys. A 750, 30 (2005), arXiv:nucl-th/0405013. +[598] B. Muller and J. L. Nagle, Ann. Rev. Nucl. Part. Sci. 56, 93 (2006), arXiv:nucl-th/0602029. +[599] M. Luzum and P. Romatschke, Phys. Rev. C 78, 034915 (2008), [Erratum: Phys.Rev.C 79, 039903 +(2009)], arXiv:0804.4015 [nucl-th]. +[600] P. Kovtun, D. T. Son, and A. O. Starinets, JHEP 10, 064 (2003), arXiv:hep-th/0309213. +[601] S. Bhattacharyya, V. E. Hubeny, S. Minwalla, +and M. Rangamani, JHEP 02, 045 (2008), +arXiv:0712.2456 [hep-th]. +[602] J. Erdmenger, M. Haack, M. Kaminski, and A. Yarom, JHEP 01, 055 (2009), arXiv:0809.2488 [hep- +th]. +[603] D. T. Son and P. Surowka, Phys. Rev. Lett. 103, 191601 (2009), arXiv:0906.5044 [hep-th]. +[604] D. Kharzeev, Phys. Lett. B 633, 260 (2006), arXiv:hep-ph/0406125. +[605] D. T. Son and A. O. Starinets, JHEP 03, 052 (2006), arXiv:hep-th/0601157. +[606] O. DeWolfe, S. S. Gubser, and C. Rosen, Phys. Rev. D 83, 086005 (2011), arXiv:1012.1864 [hep-th]. +[607] M. J¨arvinen, Eur. Phys. J. C 82, 282 (2022), arXiv:2110.08281 [hep-ph]. +[608] S. Grozdanov and W. van der Schee, Phys. Rev. Lett. 119, 011601 (2017), arXiv:1610.08976 [hep-th]. +[609] S. Grozdanov, A. O. Starinets, and P. Tadi´c, JHEP 06, 180 (2021), arXiv:2104.11035 [hep-th]. +[610] R. A. Janik and R. B. Peschanski, Phys. Rev. D 74, 046007 (2006), arXiv:hep-th/0606149. +[611] P. M. Chesler and L. G. Yaffe, Phys. Rev. Lett. 106, 021601 (2011), arXiv:1011.3562 [hep-th]. +[612] P. M. Chesler, JHEP 03, 146 (2016), arXiv:1601.01583 [hep-th]. +[613] D. E. Kharzeev and H.-U. Yee, Phys. Rev. D 83, 085007 (2011), arXiv:1012.6026 [hep-th]. +[614] Y. Neiman and Y. Oz, JHEP 03, 023 (2011), arXiv:1011.5107 [hep-th]. +[615] K. Jensen, P. Kovtun, and A. Ritz, JHEP 10, 186 (2013), arXiv:1307.3234 [hep-th]. +[616] M. Ammon, S. Grieninger, J. Hernandez, M. Kaminski, R. Koirala, J. Leiber, and J. Wu, JHEP 04, +078 (2021), arXiv:2012.09183 [hep-th]. +[617] M. J. Landry and H. Liu, (2022), arXiv:2212.09757 [hep-ph]. +[618] C. Shen and B. Schenke, Phys. Rev. C 97, 024907 (2018), arXiv:1710.00881 [nucl-th]. +[619] M. Martinez, M. D. Sievert, D. E. Wertepny, +and J. Noronha-Hostler, +(2019), arXiv:1911.10272 +[nucl-th]. +[620] P. Carzon, M. Martinez, M. D. Sievert, D. E. Wertepny, and J. Noronha-Hostler, Phys. Rev. C 105, +034908 (2022), arXiv:1911.12454 [nucl-th]. +[621] A. Monnai, B. Schenke, and C. Shen, Phys. Rev. C 100, 024907 (2019), arXiv:1902.05095 [nucl-th]. + +85 +[622] J. Noronha-Hostler, P. Parotto, C. Ratti, +and J. M. Stafford, Phys. Rev. C 100, 064910 (2019), +arXiv:1902.06723 [hep-ph]. +[623] D. Oliinychenko and V. Koch, Phys. Rev. Lett. 123, 182302 (2019), arXiv:1902.09775 [hep-ph]. +[624] D. Oliinychenko, S. Shi, and V. Koch, Phys. Rev. C 102, 034904 (2020), arXiv:2001.08176 [hep-ph]. +[625] X. An, G. Basar, M. Stephanov, and H.-U. Yee, Phys. Rev. C 100, 024910 (2019), arXiv:1902.09517 +[hep-th]. +[626] X. An, G. Ba¸sar, M. Stephanov, and H.-U. Yee, Phys. Rev. C 102, 034901 (2020), arXiv:1912.13456 +[hep-th]. +[627] X. An, G. Ba¸sar, M. Stephanov, and H.-U. Yee, Phys. Rev. Lett. 127, 072301 (2021), arXiv:2009.10742 +[hep-th]. +[628] X. An, G. Basar, M. Stephanov, and H.-U. Yee, (2022), arXiv:2212.14029 [hep-th]. +[629] M. Baumgart et al., in 2022 Snowmass Summer Study (2022) arXiv:2210.03199 [hep-ph]. +[630] T. Brauner, S. A. Hartnoll, P. Kovtun, H. Liu, M. Mezei, A. Nicolis, R. Penco, S.-H. Shao, and D. T. +Son, in 2022 Snowmass Summer Study (2022) arXiv:2203.10110 [hep-th]. +[631] L. Shao, AIP Conf. Proc. 2127, 020016 (2019), arXiv:1901.07546 [gr-qc]. +[632] G. Bertone and M. Fairbairn, Phys. Rev. D 77, 043515 (2008), arXiv:0709.1485 [astro-ph]. +[633] C. Kouvaris, Phys. Rev. D 77, 023006 (2008), arXiv:0708.2362 [astro-ph]. +[634] B. Bertoni, A. E. Nelson, and S. Reddy, Phys. Rev. D 88, 123505 (2013), arXiv:1309.1721 [hep-ph]. +[635] D. McKeen, A. E. Nelson, S. Reddy, +and D. Zhou, Phys. Rev. Lett. 121, 061802 (2018), +arXiv:1802.08244 [hep-ph]. +[636] C. J. Horowitz and S. Reddy, Phys. Rev. Lett. 122, 071102 (2019), arXiv:1902.04597 [astro-ph.HE]. +[637] D. Singh, A. Gupta, E. Berti, S. Reddy, and B. S. Sathyaprakash, (2022), arXiv:2210.15739 [gr-qc]. +[638] H. C. Das, A. Kumar, B. Kumar, S. Kumar Biswal, T. Nakatsukasa, A. Li, and S. K. Patra, Mon. +Not. Roy. Astron. Soc. 495, 4893 (2020), arXiv:2002.00594 [nucl-th]. +[639] Z. Miao, Y. Zhu, A. Li, and F. Huang, Astrophys. J. 936, 69 (2022), arXiv:2204.05560 [astro-ph.HE]. +[640] B. S. Sathyaprakash et al., (2019), arXiv:1903.09221 [astro-ph.HE]. +[641] National Research Council, “Connecting Quarks with the Cosmos: Eleven Science Questions for the +New Century,” https://doi.org/10.17226/10079 (2003). +[642] N. Arkani-Hamed, S. Dimopoulos, +and G. R. Dvali, Phys. Lett. B 429, 263 (1998), arXiv:hep- +ph/9803315. +[643] C. D. Hoyle, Nature 421, 899 (2003). +[644] D. Psaltis, Living Rev. Rel. 11, 9 (2008), arXiv:0806.1531 [astro-ph]. +[645] N. Yunes, D. Psaltis, F. Ozel, and A. Loeb, Phys. Rev. D 81, 064020 (2010), arXiv:0912.2736 [gr-qc]. +[646] J. C. Jim´enez, J. M. Z. Pretel, E. S. Fraga, S. E. Jor´as, and R. R. R. Reis, JCAP 07, 017 (2022), +arXiv:2112.09950 [gr-qc]. +[647] D.-H. Wen, B.-A. Li, and L.-W. Chen, Phys. Rev. Lett. 103, 211102 (2009), arXiv:0908.1922 [nucl-th]. +[648] P. G. Krastev and B.-A. Li, Phys. Rev. C 76, 055804 (2007), arXiv:nucl-th/0702080. +[649] J. Xu, B.-A. Li, L.-W. Chen, and H. Zheng, J. Phys. G 40, 035107 (2013), arXiv:1203.2678 [astro- +ph.SR]. +[650] W.-Z. Jiang, B.-A. Li, and L.-W. Chen, Astrophys. J. 756, 56 (2012), arXiv:1207.1686 [astro-ph.SR]. +[651] W. G. Newton and B.-a. Li, Phys. Rev. C 80, 065809 (2009), arXiv:0908.1731 [astro-ph.SR]. +[652] X.-T. He, F. J. Fattoyev, B.-A. Li, +and W. G. Newton, Phys. Rev. C 91, 015810 (2015), +arXiv:1408.0857 [nucl-th]. +[653] B.-A. Li, P. G. Krastev, D.-H. Wen, +and N.-B. Zhang, Eur. Phys. J. A 55, 117 (2019), +arXiv:1905.13175 [nucl-th]. +[654] S. Sarma, S. Adam, E. Hwang, and E. Rossi, Reviews of Modern Physics 83, 407 (2011). +[655] M. Hasan and C. Kane, Reviews of Modern Physics 82, 3045 (2010). +[656] X. Qi and S. Zhang, Reviews of Modern Physics 83, 1057 (2011). +[657] L. Sobirey and et al., Science 372, 844 (2021). +[658] N. Malvania and et al., Science 373, 1129 (2021). +[659] K. G. Wilson and J. B. Kogut, Phys. Rept. 12, 75 (1974). +[660] S. Ma, Westview Press, 1976, Chap.VII. +[661] D. Wallace, in Phase Transitions and Critical Phenomena edited by C. Domb and M. Green, Academic +Press, 1976. +[662] Y. Nishida and D. T. Son, Phys. Rev. Lett. 97, 050403 (2006), arXiv:cond-mat/0604500. + +86 +[663] Y. Nishida and S. Tan, Phys. Rev. Lett. 101, 170401 (2008), arXiv:0806.2668 [cond-mat.other]. +[664] B.-J. Cai and B.-A. Li, Annals Phys. 444, 169062 (2022), arXiv:2206.15314 [nucl-th]. +[665] J. A. Lopez, C. O. Dorso, and G. A. Frank, Front. Phys. (Beijing) 16, 24301 (2021), arXiv:2007.07417 +[nucl-th]. +[666] K. A. Brueckner, R. J. Eden, and N. C. Francis, Phys. Rev. 98, 1445 (1955). +[667] H. A. Bethe, Ann. Rev. Nucl. Part. Sci. 21, 93 (1971). +[668] L. L. Frankfurt and M. I. Strikman, Phys. Rept. 76, 215 (1981). +[669] C. Ciofi degli Atti, Phys. Rept. 590, 1 (2015). +[670] J. J. Aubert et al. (European Muon), Phys. Lett. B 123, 275 (1983). +[671] C. Ciofi degli Atti and S. Liuti, Phys. Rev. C 44, R1269 (1991). +[672] C. Ciofi degli Atti and S. Liuti, Phys. Rev. C 41, 1100 (1990). +[673] L. B. Weinstein, E. Piasetzky, D. W. Higinbotham, J. Gomez, O. Hen, and R. Shneor, Phys. Rev. +Lett. 106, 052301 (2011), arXiv:1009.5666 [hep-ph]. +[674] B. Schmookler et al. (CLAS), Nature 566, 354 (2019), arXiv:2004.12065 [nucl-ex]. +[675] M. Duer et al. (CLAS), Nature 560, 617 (2018). +[676] J. R. West, Nucl. Phys. A 1029, 122563 (2023), arXiv:2009.06968 [hep-ph]. +[677] C. Xu, B.-A. Li, and L.-W. Chen, Phys. Rev. C 82, 054607 (2010), arXiv:1006.4321 [nucl-th]. +[678] A. Rios, A. Polls, and W. H. Dickhoff, Phys. Rev. C 79, 064308 (2009), arXiv:0904.2183 [nucl-th]. +[679] R. J. Charity, L. G. Sobotka, and W. H. Dickhoff, Phys. Rev. Lett. 97, 162503 (2006), arXiv:nucl- +ex/0605026. +[680] L. A. Souza, R. Negreiros, M. Dutra, D. P. Menezes, +and O. Louren¸co, +(2020), arXiv:2004.10309 +[nucl-th]. +[681] L. A. Souza, M. Dutra, C. H. Lenzi, +and O. Louren¸co, Phys. Rev. C 101, 065202 (2020), +arXiv:2003.04471 [nucl-th]. +[682] O. Louren¸co, T. Frederico, and M. Dutra, Phys. Rev. D 105, 023008 (2022), arXiv:2112.07716 [nucl- +th]. +[683] B. Hong, Z. Ren, and X.-L. Mu, Chin. Phys. C 46, 065104 (2022). +[684] M. R. Pelicer, D. P. Menezes, M. Dutra, and O. Louren¸co, (2022), arXiv:2211.14002 [nucl-th]. +[685] M. Dutra, C. H. Lenzi, +and O. Louren¸co, Mon. Not. Roy. Astron. Soc. 517, 4265 (2022), +arXiv:2211.10263 [nucl-th]. +[686] H. Lu, Z. Ren, and D. Bai, Nucl. Phys. A 1011, 122200 (2021). +[687] H. Lu, Z. Ren, and D. Bai, Nucl. Phys. A 1021, 122408 (2022). +[688] G.-C. Yong and B.-A. Li, Phys. Rev. C 96, 064614 (2017), arXiv:1709.08692 [nucl-th]. +[689] W.-M. Guo, B.-A. Li, and G.-C. Yong, Phys. Rev. C 104, 034603 (2021), arXiv:2106.08242 [nucl-th]. +[690] K. Hagel and J. B. Natowitz, (2021), arXiv:2111.09399 [nucl-ex]. +[691] Z. Wang, C. Xu, Z. Ren, and C. Gao, Phys. Rev. C 96, 054603 (2017). +[692] B.-J. Cai and B.-A. Li, Phys. Rev. C 105, 064607 (2022), arXiv:2203.12773 [nucl-th]. +[693] S. Burrello and S. Typel, Eur. Phys. J. A 58, 120 (2022), arXiv:2203.14635 [nucl-th]. +[694] B.-J. Cai and B.-A. Li, (2022), arXiv:2210.10924 [nucl-th]. +[695] F. Zhang and G.-C. Yong, Phys. Rev. C 106, 054603 (2022), arXiv:2211.07990 [nucl-th]. +[696] G. E. Brown and M. Rho, Phys. Lett. B 237, 3 (1990). +[697] G. E. Brown and M. Rho, Phys. Rev. Lett. 66, 2720 (1991). +[698] R. Rapp, R. Machleidt, J. W. Durso, and G. E. Brown, Phys. Rev. Lett. 82, 1827 (1999), arXiv:nucl- +th/9706006. +[699] C. Xu and B.-A. Li, Phys. Rev. C 81, 064612 (2010), arXiv:0910.4803 [nucl-th]. +[700] B.-A. Li, B.-J. Cai, W.-J. Xie, and N.-B. Zhang, Universe 7, 182 (2021), arXiv:2105.04629 [nucl-th]. +[701] L.-W. Chen, Nucl. Phys. Rev. 34, 20 (2017), arXiv:1708.04433 [nucl-th]. +[702] N.-B. Zhang and B.-A. Li, Eur. Phys. J. A 55, 39 (2019), arXiv:1807.07698 [nucl-th]. +[703] N.-B. Zhang and B.-A. Li, Astrophys. J. 902, 38 (2020), arXiv:2007.02513 [astro-ph.HE]. +[704] W.-J. Xie and B.-A. Li, Astrophys. J. 883, 174 (2019), arXiv:1907.10741 [astro-ph.HE]. +[705] B.-A. Li, AIP Conf. Proc. 1852, 030005 (2017), arXiv:1610.00549 [nucl-th]. +[706] B.-A. Li and X. Han, Phys. Lett. B 727, 276 (2013), arXiv:1304.3368 [nucl-th]. +[707] B.-A. Li, Nucl. Phys. News 27, 7 (2017), arXiv:1701.03564 [nucl-th]. +[708] J. Xu, L.-W. Chen, B.-A. Li, and H.-R. Ma, Astrophys. J. 697, 1549 (2009), arXiv:0901.2309 [astro- +ph.SR]. + +87 +[709] C. Providˆencia, S. S. Avancini, R. Cavagnoli, S. Chiacchiera, C. Ducoin, F. Grill, J. Margueron, D. P. +Menezes, A. Rabhi, and I. Vida˜na, Eur. Phys. J. A 50, 44 (2014), arXiv:1307.1436 [nucl-th]. +[710] N.-B. Zhang and B.-A. Li, J. Phys. G 46, 014002 (2019), arXiv:1808.07955 [nucl-th]. +[711] W.-J. Xie and B.-A. Li, Astrophys. J. 899, 4 (2020), arXiv:2005.07216 [astro-ph.HE]. +[712] B.-A. Li and L.-W. Chen, Phys. Rev. C 72, 064611 (2005), arXiv:nucl-th/0508024. +[713] J. P. Jeukenne, A. Lejeune, and C. Mahaux, Phys. Rept. 25, 83 (1976). +[714] M. Jaminon and C. Mahaux, Phys. Rev. C 40, 354 (1989). +[715] O. Sjoberg, Nucl. Phys. A 265, 511 (1976). +[716] E. N. E. van Dalen, C. Fuchs, +and A. Faessler, Phys. Rev. Lett. 95, 022302 (2005), arXiv:nucl- +th/0502064. +[717] G. Steigman, Int. J. Mod. Phys. E 15, 1 (2006), arXiv:astro-ph/0511534. +[718] J. A. Nolen, Jr. and J. P. Schiffer, Ann. Rev. Nucl. Part. Sci. 19, 471 (1969). +[719] P. J. Woods and C. N. Davids, Ann. Rev. Nucl. Part. Sci. 47, 541 (1997). +[720] B.-A. Li, C. B. Das, S. Das Gupta, and C. Gale, Nucl. Phys. A 735, 563 (2004), arXiv:nucl-th/0312054. +[721] J. Rizzo, M. Colonna, and M. Di Toro, Phys. Rev. C 72, 064609 (2005), arXiv:nucl-th/0508008. +[722] V. Giordano, M. Colonna, M. Di Toro, V. Greco, +and J. Rizzo, Phys. Rev. C 81, 044611 (2010), +arXiv:1001.4961 [nucl-th]. +[723] Z.-Q. Feng, Nucl. Phys. A 878, 3 (2012), arXiv:1110.1515 [nucl-th]. +[724] Z.-Q. Feng, Phys. Lett. B 707, 83 (2012), arXiv:1111.3590 [nucl-th]. +[725] W.-J. Xie and F.-S. Zhang, Phys. Lett. B 735, 250 (2014). +[726] R. Sartor and C. Mahaux, Phys. Rev. C 21, 1546 (1980), [Erratum: Phys.Rev.C 25, 677–677 (1982)]. +[727] C. Mahaux and R. Sartor, Physics Reports 211, 53 (1992). +[728] B.-A. Li, Phys. Rev. C 69, 064602 (2004), arXiv:nucl-th/0404040. +[729] B.-A. Li, B.-J. Cai, L.-W. Chen, W.-J. Xie, J. Xu, and N.-B. Zhang, Nuovo Cim. C 45, 54 (2022), +arXiv:2201.09133 [nucl-th]. +[730] R. J. Charity, W. H. Dickhoff, L. G. Sobotka, and S. J. Waldecker, Eur. Phys. J. A 50, 23 (2014), +[Erratum: Eur.Phys.J.A 50, 64 (2014)], arXiv:1306.6309 [nucl-th]. +[731] X.-H. Li, W.-J. Guo, B.-A. Li, L.-W. Chen, F. J. Fattoyev, and W. G. Newton, Phys. Lett. B 743, +408 (2015), arXiv:1403.5577 [nucl-th]. +[732] Z. Zhang and L.-W. Chen, Phys. Rev. C 93, 034335 (2016), arXiv:1507.04675 [nucl-th]. +[733] H.-Y. Kong, J. Xu, L.-W. Chen, B.-A. Li, +and Y.-G. Ma, Phys. Rev. C 95, 034324 (2017), +arXiv:1701.04502 [nucl-th]. +[734] J. Xu, J. Zhou, Z. Zhang, W.-J. Xie, and B.-A. Li, Phys. Lett. B 810, 135820 (2020), arXiv:2006.05217 +[nucl-th]. +[735] J. Xu and W.-T. Qin, Phys. Rev. C 102, 024306 (2020), arXiv:2007.11194 [nucl-th]. +[736] B.-A. Li, Nucl. Phys. A 708, 365 (2002), arXiv:nucl-th/0206053. +[737] V. Baran, M. Colonna, V. Greco, +and M. Di Toro, Phys. Rept. 410, 335 (2005), arXiv:nucl- +th/0412060. +[738] M. Di Toro, S. J. Yennello, and B. A. Li, Eur. Phys. J. A 30, 153 (2006). +[739] J. W. Negele and K. Yazaki, Phys. Rev. Lett. 47, 71 (1981). +[740] S. Reddy, M. Prakash, and J. M. Lattimer, Phys. Rev. D 58, 013009 (1998), arXiv:astro-ph/9710115. +[741] P. T. P. Hutauruk, H. Gil, S.-i. Nam, +and C. H. Hyun, Phys. Rev. C 106, 035802 (2022), +arXiv:2204.02061 [nucl-th]. +[742] K. Sumiyoshi, Eur. Phys. J. A 57, 331 (2021), arXiv:2112.11159 [astro-ph.HE]. +[743] X. L. Shang, P. Wang, W. Zuo, and J. M. Dong, Phys. Lett. B 811, 135963 (2020), arXiv:2101.07551 +[nucl-th]. +[744] X. L. Shang, A. Li, Z. Q. Miao, G. F. Burgio, and H. J. Schulze, Phys. Rev. C 101, 065801 (2020), +arXiv:2001.03859 [nucl-th]. + diff --git a/89FQT4oBgHgl3EQfIjX8/content/tmp_files/load_file.txt b/89FQT4oBgHgl3EQfIjX8/content/tmp_files/load_file.txt new file mode 100644 index 0000000000000000000000000000000000000000..6915ea2fa2afd4df5c7cbe1e6446c7f706e92724 --- /dev/null +++ b/89FQT4oBgHgl3EQfIjX8/content/tmp_files/load_file.txt @@ -0,0 +1,8273 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf,len=8272 +page_content='Dense Nuclear Matter Equation of State from Heavy-Ion Collisions Agnieszka Sorensen Institute for Nuclear Theory, University of Washington, Seattle, WA 98195, USA Kshitij Agarwal Physikalisches Institut, Eberhard Karls Universit¨at T¨ubingen, D-72076 T¨ubingen, Germany Kyle W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Brown Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA and Department of Chemistry, Michigan State University, East Lansing, MI 48824, USA Zbigniew Chajecki Department of Physics, Western Michigan University, Kalamazoo, MI, 49008, USA Pawe�l Danielewicz, William G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Lynch, Scott Pratt, and ManYee Betty Tsang Department of Physics and Astronomy and Facility for Rare Isotope Beams Michigan State University, East Lansing, MI 48824 USA Christian Drischler Department of Physics and Astronomy and Institute of Nuclear and Particle Physics, Ohio University, Athens, OH 45701, USA Stefano Gandolfi and Ingo Tews Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545, USA Jeremy W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Holt and Che-Ming Ko Department of Physics and Astronomy and Cyclotron Institute, Texas A&M University, College Station, TX 77843, USA Matthias Kaminski Department of Physics and Astronomy, University of Alabama, Tuscaloosa, AL 35487, USA Rohit Kumar Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA Bao-An Li and William Newton Texas A& M University-Commerce, Commerce, TX 75429, USA Alan B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' McIntosh Cyclotron Institute, Texas A&M University, College Station, Texas 77843, USA Oleh Savchuk Facility for Rare Isotope Beams, Michigan State University, East Lansing, MI 48824, USA and Bogolyubov Institute for Theoretical Physics, 03680 Kyiv, Ukraine Maria Stefaniak GSI Helmholtz Centre for Heavy-ion Research, Planckstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1, 64291 Darmstadt, Germany arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='13253v1 [nucl-th] 30 Jan 2023 2 Ramona Vogt Nuclear and Chemical Sciences Division,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Lawrence Livermore National Laboratory,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Livermore,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' CA 94551,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' USA and Department of Physics and Astronomy,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' University of California,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Davis,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' CA 95616,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' USA Hermann Wolter Faculty of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' University of Munich,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' D-85748 Garching,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Germany Hanna Zbroszczyk Faculty of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Warsaw University of Technology,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Koszykowa 75,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Warsaw,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Poland Endorsing authors: Anton Andronic Westf¨alische Wilhelms-Universit¨at M¨unster,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Institut f¨ur Kernphysik,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 48149 M¨unster,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Germany Steffen A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Bass Department of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Duke University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Durham NC 27708 Abdelouahad Chbihi GANIL,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' CEA/DRF-CNRS/IN2P3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Boulevard Henri Becquerel,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' F-14076 Caen Cedex,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' France Maria Colonna INFN-LNS,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Laboratori Nazionali del Sud,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 95123 Catania,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Italy Mircea Dan Cozma IFIN-HH,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Reactorului 30,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 077125 Mˇagurele-Bucharest,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Romania Veronica Dexheimer Department of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Kent State University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Kent OH 44242 USA Xin Dong,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Jørgen Randrup,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' and Nu Xu Lawrence Berkeley National Laboratory,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Berkeley,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' CA 94720 Travis Dore Fakult¨at f¨ur Physik,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Universit¨at at Bielefeld,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' D-33615 Bielefeld,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Germany Lipei Du Department of Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' McGill University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Montreal,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Quebec H3A 2T8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Canada Steven P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Harris, Larry McLerran, and Sanjay Reddy Institute for Nuclear Theory, University of Washington, Seattle, WA 98195, USA Huan Zhong Huang University of California, Los Angeles, CA 90095 3 Jos´e C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Jim´enez Instituto de F´ısica, Universidade de S˜ao Paulo, Rua do Mat˜ao 1371, 05508–090 S˜ao Paulo-SP, Brazil Joseph Kapusta School of Physics and Astronomy, University of Minnesota, Minneapolis, Minnesota 55455 USA Arnaud Le F`evre, Christian Sturm, and Wolfgang Trautmann GSI Helmholtz Centre for Heavy-ion Research, Planckstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1, 64291 Darmstadt, Germany Jacquelyn Noronha-Hostler University of Illinois at Urbana-Champaign, Urbana, IL 61801 Christopher Plumberg Natural Science Division, Pepperdine University, Malibu, CA 90263, USA Hans-Rudolf Schmidt Physikalisches Institut, Eberhard Karls Universit¨at T¨ubingen, D-72076 T¨ubingen, Germany and GSI Helmholtz Centre for Heavy-ion Research, Planckstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1, 64291 Darmstadt, Germany Peter Senger Facility for Antiproton and Ion Research, Planckstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1, Darmstadt, Germany Richard Seto University of California-Riverside, Riverside, California 92521, USA Chun Shen Department of Physics and Astronomy, Wayne State University, Detroit, Michigan 48201, USA and RIKEN BNL Research Center, Brookhaven National Laboratory, Upton, NY 11973, USA Jan Steinheimer Frankfurt Institute for Advanced Studies, Ruth-Moufang-Str.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1, D-60438 Frankfurt am Main, Germany Joachim Stroth Institut f¨ur Kernphysik, Goethe-Universit¨at, 60438 Frankfurt, Germany and GSI Helmholtz Centre for Heavy-ion Research, Planckstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 64291 Darmstadt,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Germany Kai-Jia Sun Institute of Modern Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fudan University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 200438,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='Shanghai,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='China Giuseppe Verde INFN Sezione di Catania,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 64 Via Santa Sofia,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' I-95123 Catania,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Italy Volodymyr Vovchenko Physics Department,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' University of Houston,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Box 351550,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Houston,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' TX 77204,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' USA (Dated: February 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 2023) 4 Executive Summary The nuclear equation of state (EOS) is at the center of numerous theoretical and experimental efforts in nuclear physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' motivated by its crucial role in our understanding of the properties of nuclear matter found on Earth,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' in neutron stars,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' and in neutron-star mergers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' With advances in microscopic theories for nuclear interactions, the availability of experiments probing nuclear matter under conditions not reached before, and the advent of multi-messenger astronomy, the next decade will bring new opportunities for determining the nuclear matter EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Profound questions challenging our understanding of strong interactions remain unanswered: It is still unknown whether the transition between a hadronic gas and a quark-gluon plasma, which at zero baryon density is known to be consistent with a crossover transition predicted by Lattice QCD, becomes of first order in the finite-density region of the QCD phase diagram accessible in terrestrial experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The isospin-dependence of the EOS, crucial to our understanding of both the structure of neutron-rich nuclei and the properties of neutron stars, is poorly known above nuclear saturation density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, recent observations of very heavy compact stars indicate that the EOS in neutron-rich mat- ter becomes very stiff at densities of the order of a few times saturation density, leading to values of the speed of sound exceeding 1/ √ 3 of the speed of light (breaking the conformal limit).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Not only is the mechanism behind this striking behavior not known, but it is also unknown whether a similar stiffening occurs in symmetric or nearly-symmetric nuclear mat- ter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Resolving these and other questions about the properties of dense nuclear matter is possible by taking advantage of the unique opportunities for studying the nuclear matter EOS in heavy-ion collision experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Among controlled terrestrial experiments, collisions of heavy nuclei at interme- diate beam energies (from a few tens of MeV/nucleon to about 25 GeV/nucleon in the fixed-target frame) probe the widest ranges of baryon density and tem- perature, enabling studies of nuclear matter from a few tenths to about 5 times the nuclear saturation density and for temperatures from a few to well above a hundred MeV, respec- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the next decade, numerous efforts worldwide will be devoted to uncovering the dense nuclear matter EOS through heavy-ion collisions, including studies at FRIB where the isospin-dependence of the EOS can be probed in energetic collisions of rare isotopes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Modern detectors and refined analysis techniques will yield measurements that will elucidate the dependence of the EOS on density, temperature, and isospin asymmetry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Hadronic transport simulations are currently the only means of interpreting observables measured in heavy-ion collision experiments at intermediate beam energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This means that capitalizing on the enormous scientific effort aimed at uncovering the dense nuclear matter EOS, both at RHIC and at FRIB, depends on the continued development of state-of-the-art hadronic transport simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Support for the hadronic transport community, and in particular for viable career pathways for early career researchers, is imperative to maintain the health of and diversify the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' hadronic transport community, and to fully realize the potential of U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' efforts leading the exploration of the dense nuclear matter EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 5 CONTENTS I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Introduction 7 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Constraining the nuclear matter EOS using heavy-ion collisions 8 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Connections to fundamental questions in nuclear physics 9 C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Upcoming opportunities 11 D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Needs 12 II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The equation of state from 0 to 5n0 13 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Transport model simulations of heavy-ion collisions 13 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Transport theory 14 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Selected constraints on the EOS obtained from heavy-ion collisions 17 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities 19 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Microscopic calculations of the EOS 25 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Status 25 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities 27 C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Neutron star theory 28 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Status 28 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities 31 III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Heavy-ion collision experiments 33 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments to extract the EOS of symmetric nuclear matter 35 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Measurements sensitive to the EOS 35 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments probing densities between 1–2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 36 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments probing densities above 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 38 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities 39 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments to extract the symmetry energy 42 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments that probe low densities 42 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Measurements to extract symmetry energy up to 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 42 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Selected constraints on the symmetry energy around 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 44 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities 46 IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The equation of state from combined constraints 50 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Constraints 51 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' EOS obtained by combining various constraint sets 53 V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Connections to other areas of nuclear physics 54 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Applications of hadronic transport 54 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Detector design 55 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Space exploration, radiation therapy, and nuclear data 55 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Hydrodynamics 57 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Status 57 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Range of applicability 58 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities 60 VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Exploratory directions 60 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Dense nuclear matter EOS meeting extreme gravity and dark matter in supermassive neutron stars 60 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Nuclear EOS with reduced spatial dimensions 61 6 C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Interplay between nucleonic and partonic degrees of freedom: SRC effects on nuclear EOS, heavy-ion reactions, and neutron stars 62 D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' High-density symmetry energy above 2n0 63 E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Density-dependence of neutron-proton effective mass splitting in neutron-rich matter 66 Acknowledgments 68 References 68 7 I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' INTRODUCTION The equation of state (EOS) is a fundamental property of nuclear matter, describing its emergent macroscopic properties originating from the underlying strong interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Around the saturation density of nuclear matter, the EOS controls the structure of nuclei through the binding energy and the incompressibility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The EOS also determines, among other things, the neutron-skin thickness in neutron-rich nuclei as well as the properties of nuclear matter at extreme densities and/or tem- peratures, corresponding to conditions produced in experiments colliding heavy nuclei or observed in neutron stars and neutron star mergers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Far beyond describing the properties of matter com- posed of only protons and neutrons, the EOS can also reflect the appearance of new degrees of freedom, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', strange particles in the cores of neutron stars or quarks and gluons in ultrarelativistic heavy-ion collisions, or the emergence of new states of matter, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', chirally-restored matter, meson condensates, or quarkyonic matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In heavy-ion collision experiments, the EOS is studied by detecting particles emerging from the collision zone and measuring observables sensitive to the properties of nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Crucially, any interpretation of these observables, including quantitative constraints on the EOS, requires comparisons of experimentally measured observables to results obtained in dynamic simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This white paper highlights the essential role of hadronic transport simulations of heavy-ion collisions in advancing our understanding of the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' It also elucidates the many connections between inferences of the EOS from heavy-ion collision data and other efforts aiming to describe and understand the properties of nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Schematic depiction of the ranges of density and temperature probed in experiments and astronom- ical observations sensitive to the EOS of nuclear matter (counterclockwise from bottom left): neutron star crust physics, including nuclear pasta structures;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' properties of nuclei;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' structure of neutron stars;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' dynamics of neutron star mergers;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' and outcomes of heavy-ion collisions which can probe both symmetric and asymmetric matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figures adapted from [1–5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 100 HIC (sym) temperature [MeV] 10 HIC (asym) S ROOKHAVEN NS mergers .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='NS crust nuclear properties 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 Z neutron stars (NS) 0 1 2 3 4 5 density np/no8 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Constraining the nuclear matter EOS using heavy-ion collisions FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Constraints on the zeroth (Sv) and first (L) coefficient of the symmetry energy ex- pansion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experimental constraints are derived from heavy-ion collisions (HIC) [6], neutron-skin thicknesses of Sn isotopes [7], giant dipole res- onances (GDR) [8], the dipole polarizability of 208Pb [9, 10], nuclear masses [11], and isovector skins (IAS+∆R) [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Also shown are constraints from χEFT (GP-B) [13], microscopic neutron- matter calculations (H, G) [14, 15], and from the unitary gas limit (UG) [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figure from [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The last decade has brought tremendous progress in extracting the EOS as a function of baryon den- sity nB, temperature T, and the isospin asymme- try δ (or, equivalently, the proton fraction) from a variety of experimental and astronomical data as well as theoretical calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Many-body theory, based on sophisticated approaches with input from nucleon scattering or nuclear structure data, can now state the EOS below and near the saturation density n0 with meaningful uncertainties (see Sec- tion II B, “Microscopic calculations of the EOS”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' New classes of experiments have extracted the thick- ness of neutron skins in nuclei, shedding light on the isospin-dependence of the EOS (or, equivalently, the symmetry energy) near or below n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' High-energy heavy-ion collisions have constrained the EOS of the quark-gluon plasma at high temperatures and small baryon densities, while ongoing experimental efforts worldwide focus on the EOS of nearly-symmetric dense baryonic matter, probed in collisions at in- termediate energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Meanwhile, collisions at lower energies have led to experimental constraints on the symmetry energy at sub- and suprasaturation den- sities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Most remarkably, a revolution in the qual- ity and breadth of astronomical observations, high- lighted by the first simultaneous detection of grav- itational waves and electromagnetic signals from a neutron-star merger, ushered in a new era of multi- messenger astronomy (see Section II C, “Neutron star theory”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Together with the newly available ex- perimental capabilities at the Facility for Rare Iso- tope Beams (FRIB), there are unprecedented oppor- tunities to probe the isospin-dependence of the EOS through astronomical and terrestrial measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Among the experimental efforts discussed above, heavy-ion collisions probe the widest range of baryon densities and, moreover, represent the only means to address the EOS away from n0 in controlled terrestrial experiments, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Indeed, heavy-ion reactions at beam energies from a few tens of MeV/nucleon to about 25 GeV/nucleon in the fixed-target frame probe the EOS of hadronic matter at baryon densities from a few tenths to about 5 times n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Controlling the properties of matter produced in these experiments is possible by varying the beam energy, collision geometry, and isotopic composition of the target and projectile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Insights and constraints obtained from transport model analyses of these experiments are relevant both for our understanding of nuclear matter as found on Earth and for our understanding of neutron stars from crust to core.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Within ongoing efforts,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' the STAR experiment’s Beam Energy Scan (BES) fixed-target (FXT) program at the Relativistic Heavy Ion Collider (RHIC) at the Brookhaven National Laboratory (BNL),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' which collided gold nuclei at intermediate beam energies and which completed data taking in 2022,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' leads the US effort to constrain the EOS of nearly-symmetric nuclear matter at high 100 Constraints on S-L HIC 80 △R X AS 60 GP-B G 40 H Masses pb 20 Skin UG Analytic UG GDR 0 26 28 30 32 34 Symmetry Energy S [MeV9 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 Prior Astro + HIC Pressure P (MeV fm–3) 100 101 102 Number density n (nsat) FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Pressure in neutron star matter as a function of density from a Bayesian analysis combining nuclear theory and data from multi- messenger neutron-star observations and heavy- ion collisions [17]: the dark blue and light blue region corresponds to the 68% and 95% credible interval, respectively, while the gray dashed line shows the 95% bound obtained in χEFT calcu- lations and used as a prior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figure from [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' baryon densities up to around 5n0, corresponding to densities present in the deep interiors of neu- tron stars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Among comparable efforts in Europe, the HADES experiment at GSI, Germany, probes matter at densities up to 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Preliminary results from these contemporary efforts, as well as measure- ments from other heavy-ion collision experiments in the past, have led to competitive constraints on the EOS of symmetric nuclear matter, with future measurements expected to shed more light on its high-density behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Detailed constraints on the isospin-dependence of the EOS can be obtained by varying the isospin content of the target and pro- jectile nuclei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Here, the ability to use radioactive isotopes, as in, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', intermediate-energy heavy-ion collision experiments at RIKEN and FRIB, is cru- cial to resolve the subtle effects arising from changes in the isospin asymmetry of the colliding systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Above all, obtaining constraints on the EOS from heavy-ion measurements would not have been possible if not for advances in theory, and in particular for the collaborative effort to test the robustness and quantify the uncertainties of hadronic transport sim- ulations (see Section II A, “Transport model simulations of heavy-ion collisions”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At the same time, much remains to be learned, as tight constraints on both the symmetric and asymmetric EOS at higher densities have so far remained elusive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This is predominantly due to model uncer- tainties, which themselves are rooted in the inherent complexity of nucleus-nucleus collisions and the challenging task of describing all processes contributing to the final state observables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Connections to fundamental questions in nuclear physics The wealth of data from efforts conducted in recent years not only helps to get a better grasp on the nuclear matter EOS, but also has brought forward fascinating questions challenging our understanding of strong interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Following the successful BES-I campaign at RHIC, questions remain about the structure of the QCD phase diagram at finite baryon densities, where the sign problem prevents obtaining predic- tions with lattice QCD calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Surprisingly, the expected disappearance of the quark-gluon plasma signatures has not been observed in BES-I, with some observables suggesting that the QCD first-order phase transition may be located within the region probed by BES-II experiments, including the region probed by the currently analyzed BES FXT data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' If this is the case, then constraining the EOS at lower densities and describing the approach to the transition from the hadronic side, which would manifest as a softening of the EOS, will be crucial for a robust inter- pretation BES-II measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Importantly, due to the largely out-of-equilibrium evolution of collision systems probing that region of the QCD phase diagram, hadronic transport simulations will play a dominant role in describing the dynamics of the collisions, and therefore in constraining the EOS of nearly-symmetric dense nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Understanding the physics of neutron-rich matter across a range of densities is necessary not only to explain the properties of rare neutron-rich isotopes and the structure of neutron stars, but also to constrain microscopic interactions in isospin-asymmetric nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At low densities, this 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 − 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content="6 '=0 y'y d / 1 v d (AuAu) Protons (10-30%) HADES =0." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='25-0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='45) 0 (AuAu) Protons (b FOPI (AuAu) Z=1 (b=2-5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5fm) FOPI (AuAu) Z=1 Plastic Ball (AuAu) Z=1 (b=2-5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5fm) INDRA (AuAu) Protons (12-25%) E895 (AuAu) Protons E877 � (AuAu) h E877 (AuAu) Protons (10-40%) Star FXT (AuAu) Protons (10-25%) Star FXT (AuAu) Protons (10-40%) Star BES (PbPb) Protons (12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5-33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5%) NA49 (PbPb) Protons (15-35%) NA61/SHINE 1 − 10 1 10 2 10 (GeV) N 2m NN s 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 − 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='05 − 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 2 v out-of-plane in-plane (AuAu) Protons (10-30%) HADES (AuAu) Protons (15-29%) FOPI (AuAu) Z=1 (20-30%) FOPI (AuAu) Z=1 (b=5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5-7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5fm) INDRA (AuAu) Protons EOS (AuAu) Protons (12-25%) E895 (AuAu) Protons E877 � (AuAu) h E877 (AuAu) Protons (10-40%) Star FXT (AuAu) Protons (0-30%) Star FXT (AuAu) Protons (10-40%) Star BES (10-20%) � (AuAu) h Star BES (0-60%) � (AuAu) h Star (0-60%) � (AuAu) h PHOBOS (PbPb) Protons (12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5-33.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5%) NA49 (10-30%) � (PbPb) h WA98 � (PbAu) h CERES FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Compilation of the world data on the slope of the directed flow at mid-rapidity (dv1/dy|y′=0, top) and the elliptic flow (v2, bottom) as functions of the reduced center-of-mass energy √sNN − 2mN for protons, Z = 1 nuclei, and inclusive charged particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figure from [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' challenge is addressed by experimental and theoretical analyses of nuclear structure ob- servables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An important objective of nuclear many-body theorists is to accurately calcu- late these observables and reliably deduce the EOS using microscopic interactions de- rived within the framework of chiral effective field theory (χEFT).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Probing the symmetry energy over a range of densities wider than found in nuclei is possible through heavy-ion collisions and neutron star studies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Often, knowledge of the isospin-asymmetric EOS is encoded in terms of constraints on the Tay- lor expansion coefficients of the symmetry energy around n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Numerous analyses yield consistent constraints on the first few expan- sion coefficients (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 2), although they rely on an assumption that the expan- sion remains accurate away from n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The re- cent advent of Bayesian inference techniques allows one to pursue a different approach, within which the isospin-asymmetric EOS is described in terms of the dependence of the pressure on baryon density (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, Bayesian analyses can shed more light on densities at which measurements constrain the symmetry energy and quan- tify the uncertainties of the extracted EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As a result, combining diverse measurements and using advanced analysis techniques can lead to significantly tighter constraints, es- pecially on the high-density behavior of the symmetry energy (or, equivalently, on the higher-order symmetry energy expansion co- efficients), which is so far poorly known.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Constraints on the EOS of neutron-rich matter at high densities have been dramat- ically affected by discoveries of heavy neutron stars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Combined with the properties of all known compact stars, these observations indicate that while the EOS of neutron-rich matter is relatively soft around (1–2)n0, the pressure steeply rises with density for nB >∼ 2n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In fact, multiple analyses show that describing the known population of neutron stars is only possible for EOSs in which the speed of sound in neutron-star matter breaks the conformal limit at high densities, that is exceeds 1/ √ 3 of the speed of light c for nB >∼ 2n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This striking behavior remains to be understood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In par- ticular, it is currently not known whether the speed of sound exceeds c/ √ 3 above certain densities at all isospin fractions of nuclear matter or, alternatively, only in neutron-rich matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Importantly, robust constraints on the symmetric matter EOS at nB >∼ 2n0, obtained from heavy-ion collisions at intermediate to high beam energies, would also put constraints on the isospin-dependent part of the EOS through comparisons with the EOS inferred from neutron star studies, thus uncovering the magnitude of isospin-related effects at high baryon density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 11 C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Upcoming opportunities The next decade will be an era of high-luminosity heavy-ion collision experiments at high baryon density with modern detector and analysis procedures, as well as detailed studies of the symmetry energy with collisions of proton- and neutron-rich isotopes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Many of the discoveries of the BES program in ultra-relativistic heavy-ion collisions at RHIC, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', the discovery of the triangular flow and elliptic flow fluctuations, illustrate that modern analyses of heavy-ion collisions bring new quality to the understanding of the underlying processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Because of this, revisiting the intermediate to high beam energies, previously explored at the AGS at BNL as well as at SIS18 at GSI and now explored by the STAR FXT program and the HADES experiment, is imperative to enable putting tighter constraints on the EOS of dense nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, the future CBM experiment at the Facility for Antiproton and Ion Research (FAIR), Germany, will be able to measure interaction rates exceeding those currently used by several orders of magnitude, allowing for exploration of multiple high-statistics observables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, the explored beam energy range is where lower-order flow observables, reflecting the collective motion of the colliding system due to the underlying hadronic EOS, are particularly 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0150 200 250 300 350 400 450 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content="6 Incompressibility (MeV) dv1/dy'|y '=0 In-medium Xsection modification factor free protons free neutrons Au+Au, Ebeam/A=1." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='23 GeV b=6-9 fm HADES data: 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='46+0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='03 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='03 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0150 200 250 300 350 400 450 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='00 Incompressibility (MeV) v2 In-medium Xsection modification factor free protons free neutrons Au+Au, Ebeam/A=1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='23 GeV b=6-9 fm, |ycm|<0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='05, pt>0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='3 GeV/c HADES data: -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='06+0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='01 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='01 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Predicted slope of the directed flow at mid- rapidity (dv1/dy|y′=0, top) and elliptic flow (v2, bot- tom) as functions of the incompressibility and the in- medium nucleon-nucleon scattering cross section mod- ification factor, generated in simulations of Au+Au reactions using the isospin-dependent BUU (IBUU) transport model [19, 20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figure from Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' prominent (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Therefore, the cor- responding precision measurements carry with them the opportunity to bring a richer perspec- tive and a better understanding of the physics underlying the complex dynamics of nuclear matter at extreme conditions (see Section III A, “Experiments to extract the EOS of symmetric nuclear matter”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This advancement can only occur provided a simultaneous development of hadronic transport simulations, as only a de- tailed understanding of various factors affect- ing the dynamics of heavy-ion collisions can lead to meaningful descriptions of the exper- imental data, and, consequently, more robust constraints on the EOS of nearly-symmetric nuclear matter (see Section II A, “Transport model simulations of heavy-ion collisions”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As an example of the sensitivity of observables to various details of the underlying physics, Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 5 shows the dependence of the slope of the di- rected flow (top panel) and of the elliptic flow at midrapidity (bottom panel) on the stiffness of the EOS, parametrized by the incompress- ibility, and on the in-medium nucleon-nucleon scattering cross-section modification factor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Unprecedented possibilities are on the hori- zon for studies of the isospin-dependence of the EOS, which is critical for connecting heavy-ion physics measurements to astrophysical obser- vations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The difficulties in using nuclei with significant variations in the isospin asymme- try, along with the paucity of neutron measure- ments at midrapidity, have in the past greatly 12 restricted the capability to put tight constrains on the EOS of asymmetric nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fortu- nately, at this time modern neutron detectors are available for heavy-ion measurements in many facilities, including at accelerators performing collisions at high beam energies such as GSI, while radioactive beam measurements are entering a new era at RIKEN and FRIB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' FRIB will provide proton- and neutron-rich beams of not only the highest-intensity worldwide, but also characterized by the widest currently accessible range of the isospin asymmetry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Establishing a strong heavy-ion program at FRIB will therefore enable previously inaccessible exploration of the symmetry en- ergy (see Section III B, “Experiments to extract the symmetry energy”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, the proposed FRIB400 beam energy upgrade would not only allow exploration of densities up to around 2n0, but it would also provide increased resolution of the isospin-dependence of the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, among observables sensitive to the symmetry energy, both charged pion yields and the absolute magnitude of the elliptic flow (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 4) significantly increase between the current top FRIB energy of 200 MeV/nucleon and the proposed 400 MeV/nucleon [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The increase in available computing power and advances in statistical methods make it possible to perform wide-ranging comparisons of heavy-ion collision simulations with experimental data (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', using Bayesian analysis), allowing one to vary multiple model assumptions at the same time as well as to put robust uncertainties on the obtained constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, given the wealth of the upcoming independent data, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', from heavy-ion collision experiments, neutron star observations, and microscopic nuclear theory calculations, global analyses of complementary efforts have likewise a strong potential for putting tight constraints on the EOS (see Section IV, “The EOS from combined constraints”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Beyond the much-needed interpretation of intermediate energy heavy-ion collisions, advances in transport theory can lead to significant contributions to other areas of nuclear physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, recently attention has been given to cross-cutting opportunities for employing state- of-the-art hadronic transport codes in studies supporting space exploration and advanced medical treatments (see Section V A, “Applications of hadronic transport”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Transport theories may also be used in tests of extensions of hydrodynamic approaches supporting far-from-equilibrium evolution (see Section V B, “Hydrodynamics”), which are a focus of intense studies due to their importance for modeling heavy-ion collisions at high energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Finally, constraining the dense nuclear matter EOS through interpretations of heavy-ion collision measurements may have other profound conse- quences, including helping to answer fundamental questions about the possible existence of dark matter in the cores of neutron stars or providing the impetus for studies of nuclear systems in fractional dimensions (see Section VI, “Exploratory directions”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Needs The next-generation experimental measurements of observables sensitive to the nuclear matter EOS are imminent, and further progress in resolving the nuclear matter EOS is contingent on enhanced theory support.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, the development of transport theories based on microscopic hadronic degrees of freedom, which are the only means of interpreting measurements from heavy-ion collision experiments at intermediate to high beam energies, must be strengthened and expanded to fully realize the potential of the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' facilities leading the exploration of the dense nuclear matter EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Support for both individual scientists and collaborations, and in particular for viable career pathways for early career researchers, is imperative to maintain the health of and diversify the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' hadronic transport community, and to fully capitalize on the U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' efforts exploring the dense nuclear matter EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 13 II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' THE EQUATION OF STATE FROM 0 TO 5n0 Efforts to determine the equation of state (EOS) of nuclear matter are at the forefront of nuclear physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An EOS contains fundamental information about the properties of a many-body system (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', Section I B), and is, in essence, any nontrivial relation between the thermodynamic properties of a given type of matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In nuclear physics, the form of the EOS that is most often pursued is the relation between energy per baryon or pressure and baryon density nB, isospin excess δ, and temperature T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For symmetric matter, the isospin excess vanishes (δ = 0), and for asymmetric matter the energy per baryon or pressure are commonly partitioned into a part corresponding to symmetric matter and the remainder, which contains all information about the isospin-dependence of the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Due to the charge invariance of strong interactions, the latter part is (to a very good accuracy) quadratic in the isospin excess δ at densities relevant to nuclear experiments and astrophysical observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The quadratic coefficients in the expansion around δ = 0 are independent of δ, and are often referred to as the symmetry energy (denoted as S(nB) at T = 0) or symmetry pressure, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These, together with the EOS of symmetric matter, are then sufficient to describe the EOS of nuclear matter at any isospin asymmetry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' While many approaches to constraining the nuclear matter EOS are pursued, here we describe three research areas which have the capability to constrain the EOS over wide ranges of density: inferences of the EOS from comparisons of experimental measurements to model simulations of heavy-ion collisions (Section II A), microscopic calculations of the EOS using chiral effective field theory (Section II B), and EOS inferences from neutron star studies (Section II C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Transport model simulations of heavy-ion collisions soft EOS hard EOS temperature [MeV] 0 50 100 150 200 250 300 density nB/n0 0 2 4 6 8 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 AGeV 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 AGeV 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 AGeV 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 AGeV 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 AGeV 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 AGeV 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 AGeV FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Phase diagram trajectories of the central re- gion in Au+Au collisions at zero impact parameter, obtained from UrQMD simulations with a soft or a hard (characterized by K0 = 200 or K0 = 380 MeV, respec- tively) EOS [23, 24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The trajectories follow the evolu- tion at times when temperature is fairly well-defined, from the moment of the highest compression to densi- ties around 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Heavy-ion collisions at very low to interme- diate beam energies provide the means to probe nuclear matter at different densities (from sub- saturation to several times the saturation den- sity), temperatures (from a few MeV to well above one hundred), and neutron to proton ratios (from near symmetric nuclear matter, where Nn/Np ≈ 1, up to Nn/Np ≈ 2);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 6 for an illustrative calculation of heavy-ion col- lision trajectories in the T-nB phase diagram from simulations using two schematic EOSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These wide ranges of system properties ac- cessed in heavy-ion collisions position them as a perfect tool to extract the nuclear matter EOS, test predictions and extrapolations from regions of the QCD phase diagram accessed by other approaches, and provide a necessary input to nuclear theory and nuclear astrophysics calcu- lations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, the density-dependence of both the symmetric and asymmetric EOS can shed light on modeling effective nuclear in- teractions in the medium [15, 25–27] or con- strain approaches using the density functional theory [28–30].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 14 However, systems created in heavy-ion collisions are short-lived, and their dynamic evolution is out of equilibrium over significant fractions of the total collision time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The evolution of a colliding system depends on the energy and centrality of the collision, and progresses through initial compression, growth of the compression zone, development of flows, and overall decompression with a gradual local equilibration during the process, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The inherent complexity of the evolution means that the corresponding transport equations cannot be solved directly due to their high non-linearity, and therefore detailed inferences from heavy-ion collision experiments, where the non-equilibrium evolution probes nuclear matter over substantial ranges of density, require comparisons to results of collision simulations in transport models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Beyond modeling the dynamics of the collisions, transport models provide a connection to the equilibrium limit allowing for inferring the EOS [31], transport coefficients [32], as well as the in-medium properties and cross-sections of hadrons [33–35].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Transport theory At its core, transport theory aims to describe the time evolution of the one-body phase-space distribution function in a semi-classical approximation for a dissipative system composed of a large number of particles, here in particular for a system of two heavy nuclei colliding at an energy per nucleon which is typically larger than the Fermi energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The theoretical foundations of transport theory include the BBGKY hierarchy of coupled equations for reduced density matrices [36] as well as the equations of the nonequilibrium Green’s function theory [37, 38] such as obtained in Martin- Schwinger (also known as Schwinger-Keldysh) formalism for non-equilibrium Green’s function (see also Section V B).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To arrive at transport equations, one employs (among others) a Wigner transformation and coarse-graining as well as a gradient expansion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The Wigner transformation and coarse-graining nB FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Contour plots of the system-frame baryon density nB (top row) and local excitation energy E∗/A (bottom row) at times t = 0, 5, 10, 15, and 20 fm/c (columns from left to right), obtained from a transport simulation [39] of a 124Sn+124Sn reaction at beam energy Elab = 800 AMeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='24 GeV) and impact parameter b = 5 fm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The contour lines for the density use increments of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4n0, starting from 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1n0, while the contour lines for the local excitation energy correspond to the values of E∗/A = {5, 20, 40, 80, 120} MeV;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' for statistical reasons, contour plots for the energy have been suppressed for baryon densities nB < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0 100 200 300 dN/dy y (GeV/c) 132Sn+ 124Sn 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 y IBUU pBUU RVUU SMF IQMD IQMD-BNU IQMD-IMP TuQMD 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0 100 200 300 dN/dy y (GeV/c) 132Sn+ 124Sn 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 y IBUU pBUU RVUU SMF IQMD IQMD-BNU IQMD-IMP TuQMD 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0 100 200 300 dN/dy y (GeV/c) 132Sn+ 124Sn 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 y IBUU pBUU RVUU SMF IQMD IQMD-BNU IQMD-IMP TuQMD 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0 100 200 300 dN/dy y (GeV/c) 132Sn+ 124Sn 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 y IBUU pBUU RVUU SMF IQMD IQMD-BNU IQMD-IMP TuQMD 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0 100 200 300 dN/dy y (GeV/c) 132Sn+ 124Sn 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 y IBUU pBUU RVUU SMF IQMD IQMD-BNU IQMD-IMP TuQMD FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Comparison of results for rapidity distri- butions (top) and transverse flow of nucleons (bot- tom) as functions of the scaled rapidity, obtained with different transport codes (identified in the leg- end) within the TMEP initiative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The results shown were obtained for 132Sn+124Sn collisions at Elab = 270 AMeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='01 GeV) and impact param- eter b = 4 fm, using controlled input models for the EOS and the cross sections as well as identically ini- tialized nuclei [40].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' lead to positive-definite phase-space distribu- tions [41] that can be efficiently sampled with Monte-Carlo techniques, while the gradient ex- pansion yields, for each particle species, the force acting on a particle and the particle’s veloc- ity as gradients of its total energy with respect to the spatial position and momentum, respec- tively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Knowledge of the kinematics of all parti- cles, together with the elementary collision rates, drives the evolution in the phase space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Finally, to arrive at a set of Vlasov-Boltzmann–like equa- tions, one employs the quasi-particle approxima- tion, neglecting details of the spectral functions and treating all particles as on-shell (we note here that while there are some transport codes with off-shell particle treatment, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', [42, 43], this approach is still an outstanding challenge in the transport theory, as will be discussed further below).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Alternative approaches to arriving at a transport theory for heavy-ion collisions include using the relativistic Landau quasiparticle the- ory [44] or, in approaches starting from a molec- ular picture, representing the global wavefunc- tion as a product (sometimes antisymmetrized) of single-particle Gaussian wavepackets [45].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The particle species considered in transport theory depend on the collision energy and may range from nucleons, through pions and the delta resonances, to higher resonances, kaons, and hy- perons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Some transport formulations further in- corporate light clusters (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', deuterons, tritons, and 3He nuclei) as independent degrees of free- dom, with recent extensions also including alpha particles [46] which appear abundantly in exper- iments and are of particular importance for colli- sions at fixed-target beam energies on the order of hundreds of MeV/nucleon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In some of these approaches, clusters are produced through multi- particle reactions, as discussed further below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For the lowest energy collisions, nonrelativistic formulations of the transport theory may be employed, but the majority of the available codes are relativistic, with many addressing collisions at energies from tens of MeV/nucleon to at least a few GeV/nucleon (see [35, 47, 48] for reviews).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Transport approaches can be generally divided into those concentrating on a single-particle characterization of the colliding system and those attempting to describe many-particle correla- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Both types of approaches are highly complex and nonlinear, and the relevant equations are solved by simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The single-particle approaches typically solve a set of Boltzmann-Vlasov– type equations [47, 49] (also known as the Boltzmann-Uehling-Uhlenbeck, or BUU equations) in which the evolution of the system is governed by a mean-field evolution of the phase space distribu- tion (Vlasov equations) and a collision term which drives the dissipation (the Boltzmann collision term).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' While, in principle, the Boltzmann-Vlasov equation is deterministic, numerical solutions 16 contain numerically-induced fluctuations due to the fact that the evolution is obtained using the method of test particles, in which the continuous distribution function is represented by a large, but finite, number of test particles sampling the phase space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To include fluctuations of a physi- cal origin, one can add a fluctuation term to the two-particle collision term, thus arriving at the Boltzmann-Langevin formulation [35, 50].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In contrast, quantum molecular dynamics (QMD) approaches include classical many-body cor- relations in the ansatz of the many-body wave function [47, 51], which is postulated as a product of single-particle wave packets of a fixed width, with the width regulating the amount of fluctuations and correlations in QMD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In Anti-Symmetrized Molecular Dynamics (AMD) [45], the product wave function is anti-symmetrized and the formulation includes Pauli correlations in the propagation as well as in, to a certain extent, the collision term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The fact that hadronic transport approaches are built on firm theoretical foundations has been crucial for the continued development of simulation frameworks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Reaching back to the roots of the nuclear transport theory has made it possible to resolve ambiguities which would be otherwise hard to tackle by purely phenomenological means, including descriptions of cluster production [52], low relative-velocity correlations (Hanbury–Brown-Twiss correlations) [53], and off-shell transport [42, 49, 54, 55].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The strong theoretical foundation of transport theory has also been effective in ensuring covariance of the theory and preserving conservation laws in case of interactions that stray beyond outcomes of field-theoretic models, in particular interactions employing energy density functionals [44, 56–58] which are often needed for realistic descriptions of bulk properties of nuclear matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An important effort to validate conclusions reached from comparing transport model results to data has been recently intensified by the formation of the Transport Model Evaluation Project (TMEP) [47].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Within this endeavor, predictions from different models are compared in controlled settings (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', ensuring the same physical input such as the EOS, initial densities, and cross sec- tions), oftentimes with comparisons to known results that can be achieved analytically or by other methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Similar controlled comparisons of complex simulations have been done in other fields of physics: from atomic traps, through ultra-relativistic heavy-ion collisions, to core-collapse su- pernova calculations [59–62], and they are known to be very fruitful for their respective fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The TMEP analyses not only enable identifying models that produce outlier predictions, but also determine details of implementation or physical assumptions behind the diverging results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An ex- ample of such a comparison of codes for simulations of heavy-ion collisions at lower energies, with controlled input, can be seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 8, showing results for rapidity distributions (left) and the transverse flow (right) [40].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In general, the codes agree with each other reasonably well, however, differences between the codes are visible and, moreover, can be traced to specific model choices in the simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, the generally lower values of the transverse flow in the case of QMD codes are a result of an approximation used in the evaluation of a non-linear term in the mean-fields, which becomes relevant when density fluctuations become large, as often occurs in QMD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Beyond identifying this and similar problems, the Project has yielded recommendations for optimal algorithms used in transport codes, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', for ensuring obeying the Pauli principle in elementary two-body collisions [63] or for integration of equations of motion with mean-fields [64].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, the project has identified a set of tests for transport codes that ensure their credibility when addressing different heavy-ion collision observables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Stringent tests of hadronic transport codes are especially important for studies aimed at constraining the nuclear symmetry energy, which, compared to other model parameters, has a comparatively weak effect on heavy-ion observ- ables and which therefore demands maximal precision from transport simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Below, we will also discuss the role that such comparisons can play in determining the uncertainty of transport model investigations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 17 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Selected constraints on the EOS obtained from heavy-ion collisions A selection of important constraints on the EOS obtained from heavy-ion collisions can be found in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9 for both symmetric matter (pressure as a function of density, left panel) and asymmetric matter (symmetry energy as a function of density, right panel).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' We note here that while many results are reported in terms of constraints on the incompress- ibility K0, in the context of heavy-ion collision studies of the EOS, K0 should be understood as a parameter which specifies the behavior of the EOS in the range of densities probed by a given study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, in the case of experiments probing mostly densities above 2n0, constraints on K0 are only indicative of the behavior of the EOS above 2n0, and in particular do not constrain the behavior of the EOS around n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This subtle, and often confusing, point is a consequence of simple parametrizations of the EOS used in many transport codes, where the only parameter con- trolling the behavior of the EOS both around n0 and at higher densities is K0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Recently, flexible parametrizations of the EOS have been developed (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', [57, 58]) and implemented (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', in hadronic transport code SMASH [75, 76]) which allow one to vary the incompressibility K0 and the high-density behavior of the EOS independently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The collective behavior of matter created in the collisions, especially the directed and elliptic flow, has been shown to be a very sensitive probe of the EOS [31, 67, 77–79].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In contrast to collisions at the Fermi energies, where all nucleons within nuclei participate in the collisions, and unlike in collisions at ultrarelativistic energies, where the evolution of the colliding nuclei can be understood in terms of participant nucleons, at intermediate energies the interplay between the expanding collision zone and the dynamics of the spectators are key ingredients to understanding Le Fèvre et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Lynch et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' from Fuchs et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Oliinychenko et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Danielewicz et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Walecka model Fermi gas pressure [MeV/fm3] 1 10 100 baryon density nB/n0 1 2 3 4 5 HIC(isodiff) HIC(n/p) mass(Skyrme) IAS mass(DFT) PREX II HIC(π) Tsang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' ASY-EOS FOPI-LAND symmetry energy S(nB) [MeV] 0 20 40 60 80 baryon density nB/n0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 2 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Left: Selected constraints on the symmetric EOS obtained from comparisons of experimental data to hadronic transport simulations in [31] (region with black horizontal stripes), [65, 66] (region with red forward stripes), [67] (region with blue backward stripes), and [58] (region with green vertical stripes);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' see text for more details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Also shown are results of analytical calculations for the free Fermi gas (green dotted line) and in the linear Walecka model (pink dashed line).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Right: Selected constraints on the symmetry energy obtained from comparisons of hadronic transport simulations to experimental data in [6] (region with purple forward stripes), [68] (region with green backward stripes), [69] (the solid orange region), and [70] (the red circle, square, and triangle symbols).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Also shown are symmetry energy constraints obtained in [70] based on a novel interpretation of analyses of nuclear masses in DFTs [11, 71] (cyan diamond symbol) and in Skyrme models [72] (cyan star symbol), of Isobaric Analog States (IAS) energies [73] (magenta plus symbol), and of PREX-II experiment [74] (blue inverted triangle symbol).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 18 experimental results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A seminal constraint on the symmetric nuclear matter EOS [31] in the density range (2–4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5)n0 was obtained by comparing measurements of collective flow from heavy- ion collisions [80–83] at beam energies Elab = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='15–10 AGeV (corresponding to nucleon-nucleon center-of-mass energies √sNN = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='95–4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='72 GeV) with results from hadronic transport simulations using EOSs with different values of the incompressibility at saturation density K0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The outcome of this study suggests a symmetric-matter EOS to lie between those labeled with K0 = 210 MeV and K0 = 300 MeV (see the region with black horizontal stripes in the left panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For densities in the range (1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0–2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5) n0, probed in collisions below Elab <∼ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 AGeV (√sNN <∼ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 GeV), the EOS may be inferred from meson yields [84–86].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Indeed, subthreshold production of strange mesons (specifically, K+ and K0), which interact weakly with nuclear matter, depends on the highest densities sampled in the collision, which in turn depend on the stiffness of the EOS [87].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In [65], ratios of experimentally measured kaon yields in Au+Au and C+C collisions have been reproduced in hadronic transport simulations with soft mean-field interactions yielding K0 = 200 MeV and an EOS [66] consistent with the constraint from [31] (see the region with red forward stripes in the left panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In [67], the elliptic flow data measured at Elab = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4–1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 AGeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='07–2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='52 GeV) by the FOPI collaboration [88] were used together with simulations from Isospin Quantum Molecular Dynamics (IQMD) [23, 89] to constrain the incompressibility at K0 = 190 ± 30MeV, again indicating a rather soft EOS (see the region with blue backward stripes in the left panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Recently, new measurements by the STAR collaboration from the fixed target (FXT) program at RHIC have become available, providing an opportunity to expand the set of world data utilized to deduce the baryonic EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A Bayesian analysis study [58], in which the speed of sound was independently varied in specified intervals of baryon density (thus providing a more flexible EOS at higher densities), suggests a tension between the E895 [83, 90–92] and STAR [93, 94] data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Using only the STAR measurements, the study [58] further found that EOSs which simultaneously describe the slope of the directed flow and the elliptic flow, in the considered energy range of Elab = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='9–9 AGeV (√sNN = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0–4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 GeV), are relatively stiff at lower densities and relatively soft at higher densities (see the region with green vertical stripes in the left panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, the model used in that work did not include the momentum dependence of the EOS, which likely results in a spuriously stiff EOS at intermediate densities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As such, the study should be treated as a proof of principle that a tight constraint on the EOS at high densities can be achieved by using a combination of precise data, flexible forms of the EOS used in simulations, state-of-the-art models, and advances in analysis techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The symmetry energy contribution to the EOS can be studied at low collision energies Elab <∼ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 AGeV (√sNN <∼ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='32 GeV), where in particular observables such as charged pion yields [95] or neutron and proton flow [96, 97] have been proposed as sensitive to the asymmetric contribution to the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Some of the constraints derived from such studies are shown in the right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9, where, in addition to the usual EOS constraint bands, symbols with uncertainty bars represent results from analyses in which the symmetry energy has been determined for the most sensitive density of a given measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At incident energies below Elab = 100 AMeV (√sNN = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='93 GeV), low densities are probed after the initial impact and compression of the projectile and target [6, 98].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Since the symmetry potentials for neutrons and protons have opposite signs, emission of a particular nucleon type is enhanced or suppressed depending on the asymmetry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A comparison of the experimental measurements of isospin diffusion and the ratio of neutron and proton spectra in collisions of 112Sn+124Sn at Elab = 50 AMeV (√sNN = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='90 GeV) to results from ImQMD simulations produced a constraint on the symmetry energy for densities (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='3–1) n0 [6] (see the region with purple forward stripes in the right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Collisions at higher energies (Elab > 200 AMeV, or √sNN > 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='97 GeV) probe the EOS at n > n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the FOPI-LAND experiment, constraints on the symmetry energy were obtained from studies of the ratio of the elliptic flow of neutrons and hydrogen nuclei in Au+Au collisions at Elab = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 AGeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='07GeV) [68], while the ASY- 19 EOS experiment used neutron to charged fragments ratios measured in Au+Au collisions [69] (see the region with green backward stripes and the solid orange region, respectively, in the right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In [70], a comprehensive analysis was performed with the goal of identifying the values of the symmetry energy at densities to which given experiments are most sensitive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Using the isospin diffusion in collision systems with different proton to neutron ratios [99], neutron to proton energy spectra in Sn+Sn systems [100], and spectral pion ratios measured by the SπRIT collaboration in Sn+Sn collisions at Elab = 270 AMeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='01 GeV) [101, 102], that work [70] put constraints on the values of the symmetry energy at about 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2n0, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4n0, and 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0, respectively (see the red circle, square, and triangle symbols in the right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Also shown in the right panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9 are symmetry energy constraints obtained in [70] based on a novel interpretation of the analyses of nuclear masses in DFTs [11, 71] (cyan diamond symbol) and in Skyrme models [72] (cyan star symbol), of the Isobaric Analog State (IAS) energies [73] (magenta plus symbol), and of the PREX-II experiment result [74] (blue inverted triangle symbol).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities Selected results presented in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9 showcase significant achievements in determining the EOS and, simultaneously, the need to develop improved transport models to obtain tighter and more reliable constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Answering this need will require support for a sustained collaborative effort within the community to address remaining challenges in modeling collisions, in particular in the intermediate energy range (Elab ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1–25 AGeV, or √sNN ≈ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='9–7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 GeV).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the following,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' we will address selected areas where we see the need for such developments: (1) comprehensive treat- ment of both mean-field potentials and the collision term in transport codes,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (2) use of microscopic information on mean fields and in-medium cross sections,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' such as discussed in Section II B,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' in trans- port,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (3) better description of the initial state of heavy-ion collisions in hadronic transport codes,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (4) deeper understanding of fluctuations in transport approaches,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' which affect many aspects of simulations,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (5) inclusion of correlations beyond the mean field into transport,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' which is crucial for a realistic description of light-cluster production,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (6) treatment of short-range-correlations (SRCs) in transport,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' which are tightly connected to multi-particle collisions as well as off-shell transport,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (7) sub-threshold particle production,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (8) the study of new observables,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', azimuthally resolved spectra, to obtain tighter constraints on the EOS, (9) the question of quantifying the uncertainty of results obtained in transport simulations, and (10) the use of emulators and flexible parametriza- tions for wide-ranging explorations of all possible EOSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fortunately, advances in transport theory as well as the greater availability of high-performance computing make many of these improvements possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Support for these developments will lead to a firm control and greater understanding of multiple complex aspects of the collision dynamics, allowing comparisons of transport model cal- culations and heavy-ion experiment measurements to provide an important contribution to the determination of the EOS of dense nuclear matter, which, in particular, cannot be determined by any other method at intermediate densities (1–5)n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Comprehensive treatment of mean-field potentials and the collision term Notably, driven by specific experimental needs over the last two decades, the refinement of hadronic transport codes has diverged into two complementary branches: Codes which were ap- plied to describing experiments at very low to low energies (Elab <∼ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 AGeV, or √sNN <∼ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 GeV), such as IQMD, AMD and pBUU, have become progressively better at describing the momentum- and isospin-dependence of the interaction, while codes which were primarily used as afterburners for simulations of ultra-relativistic heavy-ion collisions (Elab >∼ 25 AGeV, or √sNN >∼ 7 GeV), such as SMASH [75] or UrQMD, were developed to offer a fully relativistic evolution as well as scattering 20 and decay modes taking into account all established particle and resonance species.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As heavy-ion collisions are entering an era of precision data on symmetric nuclear matter at higher densities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', in experiments at HADES, BES FXT, and future CBM) and on asymmetric nuclear mat- ter at normal and supranormal densities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', at FRIB and future FRIB400), where features of both diverging branches of hadronic transport codes are important, a vigorous development of transport models is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, numerous studies show the importance of including the momentum-dependence of the interactions, which is observed in elastic scattering of hadrons off nuclei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, momentum-dependence naturally occurs in microscopic effective interac- tions [38, 103] where it contributes to the calculated mean fields, whether near or away from sat- uration density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Incorporating single-particle energies with momentum dependence different than that in free space, which is often quantified with effective masses, is crucial in hadronic transport both for studies of symmetric nuclear matter [31, 79, 104, 105] as well as studies of the symmetry energy and its relation to effects such as the neutron-proton effective mass splitting [106–108] (see also Section VI E for more discussion on effective masses and the nuclear symmetry energy).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Some of the theoretical and implementation solutions have already been established, while others will require devising new approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' When possible, the best practices need to be carried over across the domains, as has been exemplified in, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', the development of the SMASH code, which uses many implementation solutions from pBUU.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Microscopic input to transport One of the most prominent opportunities for improvement in transport models concerns imple- mentations of the EOS informed by state-of-the-art many-body studies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Such efforts are especially timely given that sophisticated microscopic calculations of the properties of nuclear matter are currently becoming available for large ranges of baryon density, temperature, and isospin fraction (see Section II B for more details).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To incorporate the effects of the resulting EOSs in hadronic transport calculations, the corresponding Lorentz-covariant single-particle potentials as well as the in-medium interactions (both as functions of density, asymmetry, and momentum) are needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A particular challenge is to determine the connection between the EOS inferred from a transport calculation and the zero-temperature EOS obtained from microscopic calculations [109], or even the finite-temperature EOSs that are becoming increasingly available [110, 111].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In a heavy-ion collision, the medium progresses through a set of non-equilibrium states that relax toward a local equilibrium, however, the nature of the local equilibrium also evolves during the collision due to the system expansion, so that even if the system approaches a local equilibrium at any given moment of the evolution, that agreement is only temporary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Errors incurred due to differences between non-equilibrium and equilibrium states of high-density matter contribute to the systematic error in inferring the EOS when comparing transport to experimental data (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9 and [31]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Here, the availability of state-of-the-art microscopic calculations at finite temperature could reduce system- atic errors in connecting the finite- and zero-temperature EOSs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, the use of microscopic input would provide a consistency between the effective in-medium cross sections in the collision term and the mean fields used in the propagation of the phase space distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' It could also help address the question of the extent to which nonlocalities in the microscopic theory should be reflected in the propagation and the collision term [112, 113] (where, in particular, departures from standard approaches modify the entropy to take a form different than that obtained in the Landau quasiparticle theory [44, 114]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To accelerate progress at the interface of the transport description of heavy-ion collisions and microscopic nuclear matter theory, direct collaboration of practitioners in the two research areas is required to assess how the needs of transport simulations can be answered by what can be currently calculated in microscopic theories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Conversely, the use of microscopic interactions in transport could validate the many-body theory results in regions of density and temperature which are only accessible by heavy-ion collisions [115].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 21 Initial state Numerous studies point toward the dependence of outcomes of heavy-ion collision experiments on details of the initial conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In ultrarelativistic heavy-ion collisions, understanding these effects have led to the discovery of higher order flow harmonics [116, 117] and flow fluctuations [118].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (Interestingly, the importance of the initial state for experimental outcomes also positions heavy-ion collisions at high energies as an unusual, but complementary probe of nuclear structure, see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', a white paper on Imaging the initial condition of heavy-ion collisions and nuclear structure across the nuclide chart [119].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=') Given the high sensitivity of flow observables to both the EOS and the initial state of collisions, the impact of the initial conditions on outcomes of heavy-ion collisions needs to be thoroughly understood in order to narrow the constraints on the EOS of both symmetric and asymmetric matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Aspects of initial conditions that need to be considered include event-by-event fluctuations of the initial state [116–118], relative distributions of neutrons and protons and shell effects [120], and correlations tied to deformation [121] or short-range correlations [122].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Some of these elements will be further discussed below in the context of the dynamics of heavy-ion collisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fluctuations Fluctuations of the phase space distribution are an important ingredient of transport simula- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, fluctuations of the one-body density are important for including the conse- quences of the dissipation-fluctuation theorem in the reaction dynamics as well as for describing effects due to the largely unknown, neglected many-body correlations, thus going beyond the mean- field description.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The question of how to include them properly and of their consistency with the nucleon-nucleon correlations explicitly implemented in transport theories, however, has not been completely clarified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As discussed above, fluctuations are included in a different manner in the two families of transport approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' While in the BUU transport fluctuations can be introduced by the Langevin extension of the Boltzmann-Vlasov equation, which adds a fluctuation term to the collision term (and which is still rarely implemented), in the molecular dynamics approach fluctu- ations are introduced in a classical way by using finite-size particles, the width of which regulates the amount of fluctuations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fluctuations then affect the outcome of simulations in many ways, in- cluding by regulating the formation of intermediate-mass fragments (IMFs) which appear through the growth of fluctuations in regions of spinodal instability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' It was also shown in box calculations that fluctuations have a strong influence on the efficiency of Pauli-blocking [63] and even on the calculation of the force in the Vlasov term for QMD codes in which non-linear parametrizations of the fields are used [64].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Correlations Correlations in transport simulations strive to address intermediate-range correlations beyond the mean-field picture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Physically, such correlations are also a source of fluctuations, but at the same time have other additional impacts, including, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', influencing the production of light clusters (LCs), that is light nuclei up to the alpha particle which are copiously produced in heavy-ion collisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The mean-field models used in transport calculations are usually not detailed enough to realistically describe very light nuclei with their particular spin-isospin structure reflecting strong quantum effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An additional complication results from the fact that in a collision, clusters often appear in the nuclear medium where their properties are drastically changed (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', the binding energy of clusters is reduced with increasing density until the Mott point, at which they dissolve).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Currently, most codes describe the production of clusters by using a cluster-finding algorithm, based on particle proximity in coordinate and/or momentum space (coalescence) toward the end of the evolution, which in more advanced versions also takes into account criteria related to the binding energy of the produced clusters [123].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, these late-stage algorithms do not take into account the dynamic role played by both correlations and LCs in the evolution of the collision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' One 22 of the known approaches to this problem has been to consider LCs as separate degrees of freedom, with their own distribution functions and corresponding transport equations, where the collision terms can lead to creation or destruction of clusters (pBUU, SMASH) and which in particular can also take into account the in-medium modifications of clusters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, this approach becomes increasingly complex as heavier clusters are characterized by more and more production channels, and consequently it is significantly challenging to include, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', alpha particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Another approach is to modify the phase space of the correlated nucleons according to the Wigner function of the cluster, but then to propagate them after the collision again as nucleons (as is done in, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', AMD [41]), which still requires using a cluster-finding step at the end.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In both cases, the production and destruction of clusters necessarily requires multi-particle collisions to ensure energy-momentum conservation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Finally, at lower incident energies the LC production can also be described in terms of the catalyzing effect of spectator nucleons in few-particle collisions [46, 124].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To explain LC production in high-energy collisions, where LCs are produced in numbers that cannot be obtained through nucleon catalysis due to the relatively few nucleons present in the final stages of these collisions, a similar mechanism of catalysis by pions [52, 125, 126] can be invoked.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Short-range correlations A particular aspect of describing correlations in transport simulations is the treatment of short- range-correlations (SRCs), which have been measured in nucleon knock-out experiments [127–130].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Along with the experiments, microscopic many-body calculations show that SRCs introduce a high-momentum tail (HMT) into the nucleon momentum distribution and, moreover, reduce the kinetic symmetry energy relative to the Fermi gas kinetic energy, which is a consequence of the fact that SRCs are more pronounced in symmetric relative to asymmetric matter [131–138] (see also Section VI C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Phenomenological methods have been used to include SRCs in transport models, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', by initializing nuclei with a HMT, but such a procedure does not take into account the dynamic role of SRCs in the initial state, which in the case of the on-shell semiclassical equations of motion results in obtaining nonstationary, excited states of nuclei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In on-shell transport approaches, three- and many-body collisions, incorporated into transport codes within varying approximations, have been suggested as a way of treating SRCs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, in an investigation [139] of three-body collisions for pion production processes (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', NNN → NN∆), it was found that SRCs between two of the incident nucleons give a noticeable contribution to pion yields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Another approach [140], based on a mean-free-path approximation to the collision integral, observed large effects also on bulk observables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The incorporation of n-body collisions in transport equations within a schematic cluster approximation was also studied [141], however, there the effects were found to be rather small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' So far, none of these methods have been widely exploited in the description of heavy- ion reactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Since HMTs are tied to the tails of the nucleon spectral functions (away from the quasiparticle peaks), a consistent description of SRCs should involve an off-shell transport formulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Dynamical spectral functions of all considered particles, including those which are stable in free space like nucleons, have been accounted for in the off-shell transport approaches implemented, with some differences in detail, in the codes GiBUU [42] and PHSD [43].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A subsequent study [142] demonstrated that the momentum distribution automatically develops a HMT within the approach used in GiBUU.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Differences in the results from the two approaches have yet to be investigated systematically, including the impact on symmetry energy inferences from heavy-ion collision data based on, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', charged pion subthreshold production yields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fully quantum transport approaches with SRCs (or equivalent content), without any semi-classical expansions as are present in current off-shell transport approaches, remain a long-term goal, and progress in this area has not ventured yet beyond schematic models [143, 144].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, increasing computational power combined with emulation techniques may make such efforts more realistic and enable, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', a seamless integration of the treatment of shell effects in the initial state and collision dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 23 Threshold effects An important influence of mean-field potentials in heavy-ion transport appears in the form of threshold shifts and the related subthreshold production of particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Thresholds of particle production are modified in a medium since the mean-field potentials have to be taken into account in the energy-momentum balance of a two-body collision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Specifically, when the mean-field potentials are momentum-dependent and/or as a consequence of other model assumptions for the mean-field potentials of the produced particles, the thresholds are shifted away from their free-space values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This may strongly change the production rates of particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Moreover, the threshold shifts make it necessary to involve other nucleons, besides the two collision partners in the process, to ensure the energy-momentum conservation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Various schemes to achieve this locally or globally have been in use [115, 145].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Indeed, explaining recent heavy-ion collision subthreshold pion yields, measured by the SπRIT Collaboration [102], required invoking many-body elementary effects in the form of mean-field effects on thresholds in two-particle collisions [86, 101].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, because the physics invoked in describing the threshold effects is similar to that invoked for other multi-particle effects, alternative multi-particle options remain to be investigated, including producing pion degrees of freedom in multi-particle collisions or in the aftermath of an off-shell propagation between binary collisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (We note here that there is a physics overlap between these mechanisms and the impact of SRCs on pion production [42, 122, 139].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=') Notably, theoretical explorations find sequences of on-shell binary processes to dominate the production at higher beam energies [43, 55, 139], and no comparable difficulties have been encountered in describing the data [146, 147] by transport models without multi-particle effects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The contrasting struggles of transport models which do not include threshold or other multi-particle effects of this type [102] , together with expected further theoretical explorations and future measurements of the subthreshold production in heavy- ion collisions, offer exciting possibilities for gaining understanding of the more exotic in-medium processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' New observables Upcoming precision data will further bring unprecedented observables that could be previously considered only in theory, such as triple-differential spectra tied to a fixed orientation of the reaction plane [18, 148–150] not only for protons and most abundant mesons, but also for deuterons,tritons, light nuclei, and hypernuclei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The potential of such spectra for the determination of the EOS is still to be fully explored, but a preliminary investigation [149] indicates a rich structure with spectra which exhibit a maximum away from the beam direction, characterized by slopes dependent on azimuthal angle and slope discontinuities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Models that might have agreed with each other in describing low-order Fourier coefficients of flow will likely find describing such detailed observables difficult.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges remain even at the level of the low-order coefficients, as many models now reproduce proton flow, but not Lambda or pion flow (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 14).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Understanding the relations between observables for various particle species will lead to constraints on the physics driving the evolution of heavy-ion collisions in simulations and, through that, to understanding cluster formation, hyperon yields, in-medium interactions with of strange hadrons, and more (see also the white paper on QCD Phase Structure and Interactions at High Baryon Density: Continuation of BES Physics Program with CBM at FAIR [151]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Quantifying uncertainties of transport predictions In the era of multi-messenger physics, where information on the EOS is derived from different areas of physics such as nuclear structure, nuclear reactions, and astrophysics, the ability to assess the uncertainty of a particular result is of crucial importance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This problem is especially relevant for evaluations of constraints on the EOS from transport simulations of heavy-ion reactions, since it has been found that using different transport models to describe the same data can lead to very different 24 conclusions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As found in the TMEP comparisons (see [47] for a review), even with controlled input the results from different models may vary considerably due to different implementation strategies which in themselves are not dictated by the underlying physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In such a situation, calculating the mean and variance of different model predictions is not a reliable way of determining the uncertainties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An approach currently considered for ensuring a robust quality control in combining inferences from different models is to weigh the models with a Bayesian weight which could be based, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', on the performance of a given model in benchmark tests and/or its ability to reproduce all key observables of a given reaction (for example, flow observables, particle multiplicities, and spectra).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Bayesian analysis can be also used for model selection through a comparison of results from a list of available models with data, during which one assigns to each model a probability of being correct based on the quality of the fit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, this approach implicitly assumes that among the considered models there is at least one “true” model (also known as the M-closed assumption), which is often not fulfilled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Efforts have been taken to analyze data with an M-open assumption, where the existence of a perfect model is not assumed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For nuclear physics efforts, this is being attempted within the Bayesian Analysis of Nuclear Dynamics (BAND) group [152] by using Bayesian model mixing, where information from different models is combined for inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Emulators and flexible EOS parametrizations Robust explorations of the possible physics underlying various observables often necessitate repeating the calculations many times for different combinations of physics parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' When high event statistics is needed, the computational task can easily overwhelm the available computational resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' An additional computational strain often arises from assessing Bayesian probability distributions for any conclusions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Increasingly, emulators are going to be used for this task, with some steps having been already made [58, 102, 153].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Notably, similar issues emerge in the area of applications of hadronic transport [154] (see also Section V A).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For explorations focused on the EOS, it may be of advantage to fit various possible EOSs with flexible relativistic density functionals as suggested in [57, 76].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This approach, given the complete freedom in varying both the functional form of the EOS as well as the EOS parameters, is particu- larly amenable to Bayesian analyses (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', [58] for a Bayesian analysis with a parametrization of the EOS in terms of the functional dependence of the speed of sound on density).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The above list of issues facing the application of transport theory to heavy-ion collisions high- lights the fact that this approach to putting tighter constraints on the EOS rests on overcoming certain challenges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In simple terms, one attempts here to use a very dynamic and complex non- equilibrium process to obtain information describing a relatively simple and well-defined system, namely the equilibrated EOS of nuclear matter for different densities, temperatures, and isospin asymmetries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To achieve this in a reliable way, multiple complex issues of many-body physics have to be well controlled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' On the other hand, several of the needed improvements are relatively well- understood, and tackling some of the unresolved problems poses an exciting intellectual challenge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As a reward for undertaking this effort, one gains the opportunity to obtain information on the EOS in a region which cannot be accessed through any other means: For densities below saturation, there is strongly constraining information from nuclear structure, with significant contributions coming also from low-energy heavy-ion collisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Astrophysical observations on neutron stars and neutron star mergers are mainly sensitive to densities above about 3n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The gap between these domains can only be filled with intermediate energy heavy-ion collisions, and transport studies are the essential tool to extract the information on the EOS from experimental data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 25 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Microscopic calculations of the EOS Over the past decade, many-body nuclear theory has made significant progress in deriving microscopic constraints on the nuclear EOS at low densities from chiral effective field theory (χEFT) [155–158].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The progress has been driven by improved two-nucleon (NN) and three-nucleon (3N) interactions, rigorous uncertainty quantification, and algorithmic and computational advances in the frameworks used to solve the many-body Schr¨odinger equation with these interactions (see also the recent white paper on Dense matter theory for heavy-ion collisions and neutron stars [159]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Status Chiral EFT [160–164] provides a systematic way to construct nuclear interactions consistent with the low-energy symmetries of QCD, using nucleons (N’s), pions (π’s), and (in the case of delta-full χEFT), ∆-resonances (∆’s) as the relevant effective degrees of freedoms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Nuclear interactions in χEFT are expanded in powers of momenta or the pion mass over a hard scale at which χEFT breaks down;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' this breakdown scale is expected to be of the order of the ρ-meson mass, Λb ≈ 600 MeV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At each order in the EFT expansion, only a finite number of diagrams enter the description of the interaction according to a chosen power counting scheme, of which the Weinberg power counting has been predominant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, at the leading-order (LO) in Weinberg’s power counting one includes contribution from the one-π exchange between two nucleons as well as momentum- independent contact interactions, which allow one to describe key features of the nuclear interaction already at the lowest order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At next-to-leading-order (NLO), two-π exchanges are included as well as momentum-dependent contact interactions, and similarly, more involved terms appear at higher orders.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The various low-energy coupling constants are determined from fits to experimental data, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', the π-N couplings are fit to π-N scattering, while those describing NN short-range interactions are fit to NN scattering data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The advantage of χEFT over phenomenological approaches is that multi-nucleon interactions, such as the important 3N interactions, naturally emerge in the EFT expansion and, moreover, are consistent with the NN sector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Forces involving increasingly more nucleons are correspondingly more suppressed, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', the leading contribution to 3N forces (four- nucleon (4N) forces) appears at N2LO (at N3LO) in Weinberg’s power counting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, there are only two new low-energy couplings appearing in the three- and four-body forces to N3LO, which govern the strengths of the intermediate- and short-range contribution to the leading 3N forces, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Consequently, χEFT 3N and 4N interactions at N3LO are completely determined by constraints on the coupling constants obtained from NN and π-N scattering”, usually resulting in tight constraints on very neutron-rich matter from χEFT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Another key feature of χEFT is that order-by-order calculations in the χEFT expansion have enabled estimation of theoretical uncertainties due to truncating the chiral expansion at a fi- nite order [13, 158, 165, 166].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Quantifying and propagating these EFT truncation errors enables meaningful comparisons between competing nuclear theory predictions, see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 10, and/or con- straints from nuclear experiments and neutron-star observations in the multi-messenger astron- omy era [167].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Such comparisons are facilitated by Bayesian methods in a statistically rigorous way [158, 167, 168] to take full advantage of the great variety of empirical EOS constraints we anticipate in the next decade.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Chiral EFT also provides nuclear Hamiltonians governing the interactions in nuclear systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, to calculate properties of a many-body system, computational methods able to solve the Schroedinger equation for this system are necessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Among various frameworks used to solve the nuclear many-body problem in dense matter, quantum Monte Carlo (QMC) methods and many- body perturbation theory (MBPT) have been the main tools employed to study the physics of 26 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Comparison of the energy per particle E/N (left) and the pressure P (right) as functions of density for pure neutron matter in different many-body calculations using interactions from χEFT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The left panel also shows low-density QMC results of Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' [169] and the conjectured unitary-gas lower bound on the energy per particle of pure neutron matter from Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figure from Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' [170].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' neutron-star matter in recent years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Both methods have recently made tremendous advances in predicting properties of nuclei and calculating the nuclear matter EOS [156, 158, 171–175].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' QMC frameworks, such as the auxiliary field Diffusion Monte Carlo (AFDMC) method, are based on imaginary-time propagation of a many-body wave function and enable us to extract ground-state properties of a nuclear many-body system with high statistical precision [156, 171].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Their nonperturbative nature also allows for the treatment of nuclear interactions at high mo- mentum cutoffs, providing important insights into nuclear interactions at relatively short distances that may help to improve the modelling of χEFT interactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' QMC calculations of binding en- ergies, radii, and electroweak transitions of nuclei up to A = 16 [176–182] using χEFT NN and 3N interactions are in very good agreement with experimental data [183–186].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' QMC methods were also used to calculate the EOSs of matter up to about twice the nuclear saturation density n ≈ 2 n0 [187–191].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The calculated EOSs include estimates of systematic truncation uncertainties, and are commonly used to constrain properties of neutron stars [188, 192, 193].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The past decade has also seen a renaissance for many-body perturbation theory (MBPT) calcu- lations in nuclear physics [158, 175].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Key to this development has been the discovery that nuclear potentials with momentum-space cutoffs in the range 400 MeV <∼ Λ <∼ 500 MeV (not to be confused with the breakdown scale of χEFT, Λb) are sufficiently soft to justify the use of perturbation theory methods [194] (see [195] for a Weinberg eigenvalue analysis).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Such low-momentum potentials can be obtained from renormalization group methods [196] or by directly constructing chiral effective field theory potentials at a coarse resolution scale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, recent advances in automatic diagram generation [197] combined with automatic code generation [198] and high-performance computing have led to a fully automated approach to MBPT calculations in nuclear physics [158], in which chiral two- and multi-nucleon forces can be included to high orders in the chiral and MBPT expansions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' MBPT has been demonstrated to be a computationally efficient and versatile tool for studying the nuclear EOS as a function of baryon number density nB, isospin asymmetry δ = (nn −np)/(nn +np), and temperature T [110, 111, 199, 200] with implications for neutron star structure [158] and astrophysical simulations [201];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' here, nn and np correspond to the neutron and 25 5 Hebeler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',ApJ (2013) Hebeler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',ApJ(2013) Tews et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',PRL(2013) Tewsetal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',PRL(2013) Lynn et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',PRL (2016) Lynn et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', PRL (2016) 20 4 Drischler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',PRL (2019) Drischler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',PRL (2019) Drischler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',GP-B (2020) Drischler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=',GP-B (2020) Gezerlis, Carlson, PRC (2010) Unitary gas (s = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='376) 3 fm [MeV 10 P2 5 1 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 n [fm-3] n [fm-3]27 proton densities, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, MBPT allows us to compute the EOS of neutron-star (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', β-equilibrated) matter explicitly, which can help improve isospin asymmetry expansions of the low-density nuclear EOS such as the standard quadratic expansion [199, 202–206].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' MBPT also allows us to study nuclear properties other than the nuclear EOS, including the linear response and transport coefficients that could be used to inform more accurate numerical simulations of supernovae and neutron-star mergers [207].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, MBPT for (infinite) nuclear matter has been used to construct a microscopic global optical potential with quantified uncertainties based on χEFT NN and 3N interactions [208, 209].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Altogether, MBPT calculations of nuclear matter properties can provide important constraints that enable microscopic interpretations of future nu- clear reaction experiments [210] (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', at the Facility for Rare Isotope Beams) and neutron star observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To date, theoretical predictions for the nuclear EOS, optical potentials, and in-medium NN scattering cross sections have been computed at finite temperature at various levels of approxi- mation starting from fundamental two- and multi-nucleon forces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These quantities are inputs to transport model simulations [89, 211] of heavy-ion collisions used to extract constraints on the properties of hot and dense nuclear matter (see Section II A for more details).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In transport simu- lations, the EOS, single-particle potentials, and in-medium NN cross sections are usually obtained from effective phenomenological interactions [212, 213] that are fitted to the properties of finite nuclei and cold nuclear matter, and then extrapolated into the finite-temperature regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Recently, some effort has been devoted to benchmarking [109] the temperature dependence of these effective interactions against predictions from χEFT or directly using EFT constraints in fitting effective interactions [207, 214, 215].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' To enable such comparisons, the free energy of homogeneous nuclear matter as a function of temperature, baryon number density, and isospin asymmetry has been cal- culated using χEFT interactions up to second order in many-body perturbation theory [110] and within the Self-Consistent Green’s Function (SCGF) approach [216], which resums particle-particle and hole-hole ladder diagrams to all orders.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The resulting EOS has been shown to be consistent with the critical endpoint of the symmetric nuclear matter liquid-gas phase transition [110, 216] as well as the low-density/high-temperature pure neutron matter EOS from the virial expansion [204].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, single-particle potentials have been computed at finite temperature at the Hartree- Fock level [217], from G-matrix effective interactions [218], and in SCGF theory [201, 219].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Of particular importance is the associated nucleon effective mass, which is obtained from a momen- tum derivative of the single-particle energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The nucleon effective mass is directly related to the density of states and hence governs entropy generation at finite temperature, with consequences for the dynamical evolution of core-collapse supernovae and neutron star mergers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Finally, in-medium NN scattering cross sections have been computed at finite density and zero [220] as well as at finite [218] temperature using high-precision nuclear forces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the next decade, the use of effective field theory methods will enable a consistent framework for describing all of these quantities with uncertainty estimates for input into transport simulations of heavy-ion collisions and astrophysical simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities To fully capitalize on experimental and observational data and extract key information on fun- damental questions in nuclear physics, continued progress in nuclear theory is crucial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The combi- nation of χEFT with modern computational approaches like machine learning, artifical intelligence, emulators, and Bayesian inference have provided EOS results for a wide range of densities, and at various proton-to-neutron asymmetries and temperatures, with quantified uncertainties [111, 166].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Future progress in the development of fundamental interactions, combined with these tools, will 28 increase the precision of the results and enable us to answer open problems in chiral EFT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Among these, the most pressing is at which densities and how χEFT breaks down [166, 188].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, for studies of neutron-star mergers it is of great importance to describe dense matter at finite temperatures [200, 201, 204], however, these might influence the breakdown of the theory in dense matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the next decade, it will be crucial to reliably determine how far one can push the χEFT approach in nucleonic matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' While microscopic calculations have been very successful in calculating properties of nuclei and homogeneous matter at densities up to 1-2 times the nuclear saturation density, we need improved microscopic descriptions of neutron-rich dense matter beyond that regime, at a few times nuclear saturation density and finite temperatures, with quantified uncertainties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This can be achieved by employing models derived within relativistic mean-field or density functional theory that are firmly rooted in microscopic theory at lower densities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Such models will be very important to connect theoretical calculations within the framework of χEFT to heavy-ion collision experiments at accelerator facilities around the world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Heavy-ion collision experiments at intermediate beam energies bridge the low- and high-density regimes of the EOS and provide complimentary informa- tion to that obtained from nuclear structure or neutron-star studies [17] (see Section II A).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Robust inferences from the experimental data will require more accurate predictions from transport the- ory, which strongly depend on, among others, mean-field or density functional models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' It will be imperative to test and constrain such models for the EOS with more rigorous microscopic calcu- lations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Beyond their use in hadronic transport simulations, these models are also a crucial input for calculations of properties of neutron star crusts (see Section II C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Additional theoretical constraints might be provided by high-density calculations within the framework of perturbative QCD (pQCD) [221], which can be applied at very high densities of the order of 40 times the nuclear saturation density, where the strong interactions among quarks become perturbative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Constraints on the EOS based on pQCD, together with assumptions on causality and stability, have been used to constrain the EOS at lower densities probed in the core of neutron stars [222–225].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, it has been found that the constraining power of pQCD calculations is strongly dependent on the way in which they are implemented [225, 226].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Future studies have to establish to what extent pQCD constraints are robust at densities of the order of several times nuclear saturation density, and how constraining future higher-order calculations may become.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In this regard, improved microscopic calculations of the nuclear EOS using the functional renormalization group [227, 228] will provide important insights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Neutron star theory 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Status Measurements of the EOS, masses of neutron-rich isotopes far from the band of stability, and experimental constraints on nucleon effective masses provide essential input into neutron star mod- els, progressing our understanding of the structure and dynamics of these astronomically important objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Several properties of neutron stars, including the mass-radius relation and their tidal de- formabilities, can be calculated once the EOS is provided.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This, in turn, enables us to constrain the EOS once those properties are observed [229].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Nuclear EOSs for neutron stars can be constructed from, for example, ab initio calculations and density functionals [230–233] or, more schematically, from meta-models [234–236] parameterized by nuclear matter parameters, which can be used to make contact with heavy-ion collisions [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Ab initio calculations take into account more fundamental properties of the nuclear force (see Sec- tion II B), but prohibit the calculation of large ensembles of EOSs spanning the nuclear parameter 29 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Impact of nuclear physics theory and experiment, and different astrophysical measurements on constraining the cold neutron-star EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Blue lines show a family of EOS that are con- strained by chiral EFT at low densities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At higher densities, the EOS can then be constrained using GWs from inspirals of neutron star mergers, data from radio and X-ray observations of pulsars, and electromagnetic signals associated with neutron star mergers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The indicated boundaries between regions affected by these mea- surements are not strict and depend on the EOS and properties of the astrophysical system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Figure from [237].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Meta-models allow rapid computation of such large ensem- bles, but encode mainly bulk prop- erties of nuclear matter, which ex- cludes them from being used to model finite nuclei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Density func- tionals represent a compromise, al- lowing both rapid computation of EOSs and use in finite nuclear mod- els, and thus are more suited to combining nuclear experimental and astrophysical information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Many of these models can be smoothly extrapolated from the saturation- density to arbitrarily high density, in which case astronomical obser- vations can be used to constrain the saturation-density nuclear mat- ter parameters and their density de- pendence [236, 238].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This extrapo- lation, however, is model-dependent, as different density functionals have different dependence on density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Ad- ditionally, this extrapolation might not be physically well-founded.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As densities inside neutron stars can reach up to several times nuclear saturation density, at some (as-yet not determined) density a description in terms of purely nucleonic degrees of freedom is expected to break down.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Heavy-ion collisions can help us constrain that point, and the nature of any phase transitions that occur above saturation density.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The nuclear EOSs can be then combined with models describing the EOS at higher densities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Models that explicitly include a range of possible high-density degrees of freedom, such as hyperons and quarks, can be constructed;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' the predicted neutron star compositions are then dependent on the particular model used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Another approach is to use more general models that give up the explicit dependence on the underlying degrees of freedom, thus losing information on, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', appearance of exotic particles at high densities, in favor of spanning the full space of physically con- sistent EOSs, reducing the model dependence of inferences from astrophysical observations [239].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These schemes include piecewise polytropes [14, 240–242], line segments [192, 243], speed-of-sound models [188, 189, 244–246], spectral models [247] and non-parametric models generated from Gaus- sian processes (GPs) [168, 248–251] or machine learning techniques [252].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' If these more general approaches are used down to the nuclear saturation density, extra modeling is required to connect them to the microscopic nuclear EOS and nuclear observables [253].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Once the EOS is specified, the solution of the Tolman-Oppenheimer-Volkov equations and their extensions including rotation, determining the structure of a neutron star through balancing the attractive force of gravity and the repulsion coming from the EOS, provide predictions for bulk properties of the neutron star such as radii, tidal deformabilities, moments of inertia, and break-up frequencies of neutron stars as a function of their mass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' All of these properties can be compared with multi-messenger observations, including gravitational waves and electromagnetic signals from neutron-star mergers and isolated neutron stars [193].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The systematic construction of neutron star EOS models and statistical inference of EOS pa- 103 8 102 [Mev fm EM: Kilonovae / GRB GWs (post-merger) Pressure 101 GWs (inspiral) Radio and X-ray pulsars 100 Nuclear Physics Experiment and Theory 2 4 6 8 Number density [nsat30 rameters from data is an endeavor that is just over a decade old [14, 240–242].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This effort has matured in the current era of multi-messenger astronomy with a large push to explore the model- dependence of EOS inferences [244, 254] and ways of connecting the EOS with astrophysical and nuclear data [17, 167, 193, 245, 246, 255].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Different choices of which observables to include or infer can be made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, astrophysical observations can be used to infer the EOS, which can then be connected to nuclear models to inform their parameters and predict nuclear observables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Conversely, nuclear observables can be used to infer nuclear parameters, which can then inform the neutron star models and predict astrophysical observables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The future lies in combining more and more sets of data of both types to understand nuclear and neutron star models better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Exciting progress has been made in gathering astrophysical data to constrain our dense matter theories (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 11 for an illustration of density regions affected by different observables).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Neutron- star data from the last 5 years identified the heaviest neutron star known to date with a mass of 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='08(7)M⊙ [256, 257] (where M⊙ is the solar mass), while the kilonova AT2017gfo, associated with GW170817, has placed an upper limit on the maximum mass to be on the order of 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='3M⊙ [258, 259].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The detection of GW170817 by the LIGO-Virgo Collaboration has enabled us to place constraints on the tidal deformability of this system, ˜ΛGW170817 ≤ 720 [260, 261].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Neutron Star Interior Composition Explorer Mission (NICER) has provided two mass-radius measurements by observing X-ray emission from several hot spots on the neutron star surface, finding a radius of 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='02+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='24 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='06km for a star with mass 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='44+0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='15 −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='14M⊙ (PSR J0030+0451) and 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='7+2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5km for a star with mass 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='08(7)M⊙ (PSR J0740+6620) in the analyses of Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' [255, 262–264].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' X-ray observations of the temperature of the neutron star in the Cas A supernova remnant have revealed core cooling on the timescale of years, hinting at the possible superfluid properties of the core [265].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These observations have enabled meaningful constraints on the EOS to be set and have already allowed us fascinating glimpses into the possible properties of high-density matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, perturbative QCD predicts that the speed of sound squared approaches the conformal limit of 1/3 from below as the density becomes arbitrarily high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Meanwhile, inferences of the neutron star EOS from observational data indicate that the speed of sound rises in the core to significantly above c2 s = 1/3 [188, 266–269].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Consequently, this suggests that the speed of sound has a non-trivial behavior with increasing density [188, 221, 270].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At the same time, tentative evidence for quark matter in neutron star cores, which in turn indicates a softening of the EOS, has likewise been suggested [246].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' If we want to leverage the substantial data we have on neutron star cooling and dynamical evolution, additional EOS quantities need to be supplied consistently for each EOS model, such as the effective masses (see also Section VI E) and superfluid neutron and proton gaps, essential for modeling thermal and dynamical properties of neutron stars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, the mutual friction of the core – the strength of the coupling between the charged particles (electrons, protons) and superfluid neutrons – depends on the effective neutron mass and the proton fraction [271], which both also correlate with the symmetry energy [108].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A consistent extraction of both symmetry energy parameters and effective masses from heavy-ion collision data is therefore required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In contrast to efforts devoted to systematic, statistically meaningful inferences of the EOS in the cores of neutron stars, modeling the neutron star crust is still in its infancy: The first calculations of large ensembles of systematically parameterized crust models and their use in statistical analysis have only been carried out recently [272–276].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, much more nuclear experimental data can be brought to directly bear on crust physics, and we have entered an era where we can access information about the crust with unprecedented fidelity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, we have now observed the same neutron-star crust as it first cooled, then became heated by accreted matter, and then cooled again [277–281].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' We have followed a pulsar through a glitch – a sudden change in the rotation period of the pulsar – and glitch recovery with a resolution of a few seconds [282].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These observations have provided very strong evidence that the crust is solid, that there exist superfluid neutrons in the inner crust which can be decoupled from the nuclei in the crustal lattice, and that nuclear 31 reactions from accreted material sinking into the crust provide deep crustal heating [279, 283, 284].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Additionally, models of the neutron star crust predict that, prior to the transition to homoge- neous matter, isolated nuclei in the crust fuse to form cylindrical, planar, and more exotic shapes, termed “nuclear pasta”, that can affect neutron-star observations [285–287].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This crust-core bound- ary region, often referred to as the mantle, is likely a complex fluid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Density functional theory and molecular dynamics calculations of these structures reveal a complex energy landscape with many coexisting shapes, and correspondingly complex mechanical and transport properties [288–294], which are strongly influenced by the EOS at around 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 through the pressure, proton fraction, and surface energy of the structures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These properties can also be studied in multifragmenta- tion reactions, which probe, among others, the competition between nuclear surface energy and Coulomb energy at sub-saturation density [295–297].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Inhomogeneous matter in the crust of a neutron star, including the dripped neutrons expected in the inner crust, can be modeled using a variety of nuclear theory techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These usually involve calculations within a single, repeating unit (Wigner-Seitz cell) of matter, typically containing a sin- gle nucleus [298–300].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The compressible liquid drop model (CLDM) treats the nuclear matter inside and outside of nuclei as homogeneous and described by the bulk matter EOS, while the surface energy is specified by a separate function with additional parameters [288, 300–303].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The surface parameters and those that define the dimensions of the cell and nucleus are minimized to obtain the ground state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The Thomas-Fermi model employs the local density approximation, modeling matter with a specified form of the inhomogeneous nuclear matter density in the unit cell;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' here, the parameters of the density distribution are varied to obtain the ground state configuration [304].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Microscopic approaches to describing inhomogeneous nuclear matter, in which individual neutrons and protons are the degrees of freedom, include quantum Hartree-Fock or Relativistic Mean Field models [305–310], and semi-classical molecular dynamics approaches [292, 311].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' There is a great need for nuclear physics input into models of the neutron star crust, which analyses of heavy-ion collision data can provide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, the thickness, mass and moment of inertia of the crust depend on the higher-order symmetry energy parameters L, Ksym, and Qsym [272, 274, 312].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Thus measurements of the symmetry energy parameters up to third order in heavy-ion collision experiments are essential to understand the properties of the crust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The symmetry energy, effective masses, and surface energies of nuclear clusters strongly affect the proton fraction on either side of the crust-core transition density, the extent of nuclear pasta near the crust-core boundary, the mechanical and transport properties, the thermal conductivity and specific heat, the electrical conductivity, and the shear modulus of the crust [298, 304, 309, 313].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Nuclear experiment can thus constrain neutron star crust models, and astrophysical observables associated with the crust can measure nuclear observables as well as measurements of neutron star bulk properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, the symmetry energy can be constrained by combining nuclear data with crust and core observables, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', through a potential multi-messenger measurement of the resonant frequency of crust-core interface oscillations [276].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Challenges and opportunities The next decade will provide a wealth of new data on neutron stars, as the LIGO-VIRGO- KAGRA detectors are expected to observe many new binary neutron-star mergers, some of them with electromagnetic counterparts [314–316].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' As NICER continues to measure more neutron star masses and radii, next-generation X-ray timing missions such as Strobe-X [317] and radio tele- scopes such as the Square-Kilometer Array will increase the number of pulsars we see and are able to measure by an order of magnitude.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Long-timescale observations of individual pulsars (using radio timing) and persistent gravitational waves from deformations of neutron stars will lead to 32 measurements of their moments of inertia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' These new data points might enable us to pin down the nuclear matter EOS, to discover or rule out the existence of phase transitions to exotic forms of matter in the cores of neutron stars, and to reliably constrain microscopic interactions between fundamental particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Although model-agnostic extrapolations to higher densities such as through the use of poly- tropes [194, 240], speed of sound schemes [188, 244, 318], Gaussian processes [249, 250] and spectral methods [247], combined with robust data analysis, will eventually allow us to pin down the dense- matter EOS, they cannot answer the question about the relevant microscopic degrees of freedom at high densities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Hence, it is crucial to develop improved microscopic models with well-quantified un- certainties in this regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At the same time, creating ensembles of outer core and crust models that allow for inclusion of astrophysical and nuclear data requires underlying nuclear models to have enough freedom to explore a large region of parameter space, and allow fast computation of relevant quantities that also capture the essential physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Currently, it is energy density functionals like Skyrme, Gogny, and Relativistic Mean Field models that provide these properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Consequently, progress could be made by making a stronger connection between these models and microscopic approaches, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', connecting energy-density functionals to ab initio calculations allowing a more direct link to χEFT [299, 319, 320].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the same spirit, EFT calculations of the EOS can be used as a “low-density limit” to calibrate higher-density models for neutron stars and heavy-ion collisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The crust can be modeled consistently with nucleonic matter in the core using density functional theory to model both.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' When choosing a model, a compromise must be made between accurate modeling of microscopic quantum effects, such as shell effects in the nucleus and surrounding neutron gas, and the computational expediency required to construct large ensembles of crust models needed for statistical inference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, quantum shell effects strongly determine the evolution of the mass and charge number of nuclei with density, alter the effective mass of dripped neutrons, and drive the complex energy landscape of nuclear pasta.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fully microscopic quantum calculations include shell effects self-consistently, but are computationally expensive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The CLDM approach can be used to construct large numbers of crust models, but requires shell effects to be added by hand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Future work needs to develop schemes of incorporating such microscopic effects in large ensembles of crust models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The method that may allow that is the Extended Thomas-Fermi method, incorporating shell effects through the Strutinsky Integral: see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', [321].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Models should also incorporate nuclear pasta, as its extended structures may contribute to the mechanical and thermal properties of matter at the crust-core boundary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' It is computationally demanding to model transport and mechanical properties of the crust microscopically or in simula- tions [322], particularly in the nuclear pasta phases, and it is unrealistic to include these quantities in large ensembles of crust models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Simpler schemes that extrapolate the mechanical and trans- port properties across the parameters space based on microscopic models could be developed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Also, representative crust models inferred from data can be used to calculate these crust properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' There is also a need for a balance between accuracy and precision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A model can be accurate but not precise (predicting the correct value of a physical quantity but having large error bars), or precise but not accurate predicting very small error bars, but not predicting the correct value of some physical observable).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Individual crust models can be created from mass models that are precisely fit to data and which predict precise values for, for example, the symmetry energy parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, to make accurate inferences of nuclear matter parameters from astrophysical observables, and to include their experimentally measured ranges, ensembles of models spanning the parameter space should be employed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Both strategies are important, and the precision-fit models can act as benchmarks against which we assess the outcomes of statistical inferences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' When older neutron stars accrete matter in the crust the matter gets gradually pushed down into the core and replaced by the accreted matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The temperatures in the crust are well below the nuclear potential energies, so the replacement crust cannot easily attain nuclear statistical 33 equilibrium.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Ensembles of accreted crust models are yet to be constructed, but are necessary to correctly account for deep crustal heating and therefore to fully utilize the observations of cooling of accreted crusts in low mass X-ray binaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In all this work, effort must be made to calculate the different observables consistently as well as to combine different data sets in a well-controlled way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This is expanded upon in Section IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' HEAVY-ION COLLISION EXPERIMENTS Establishing the equation of state (EOS) of nuclear matter has been a major focus of heavy-ion collision experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' While very low energy collisions can probe nuclear matter at densities smaller than the saturation density n0, highly-compressed nuclear matter is produced in the laboratory by colliding heavy nuclei at relativistic velocities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At even higher energies, in the ultra-relativistic regime, quarks in the colliding nuclei become almost transparent to each other and therefore escape the collision region, which means that matter measured at midrapidity is characterized by a nearly- zero net baryon number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Heavy-ion collision experiments at top beam energies at the Relativistic Heavy Ion Collider (RHIC) and Large Hadron Collider (LHC) provided convincing evidence that at high temperatures and near-zero baryon density, nuclear matter becomes a quark-gluon plasma (QGP) [323–329], a deconfined but strongly-interacting state composed of color charges, confirming Lattice QCD (LQCD) calculations of the EOS at zero density [330–332].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' While the region of the QCD phase diagram explored in ultra-relativistic heavy-ion collisions is relatively well understood, the EOS of dense nuclear matter at moderate-to-high temperatures and moderate-to-high baryon densities is not known well due to the break-down of first-principle approaches in this regime.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Answering pressing questions about the QCD EOS in this region, such as whether the quark-hadron transition becomes of first-order at high densities or what is the minimal energy required to produce the QGP, is the driving force behind Phase II of the Beam Energy Scan (BES) program at RHIC, the HADES experiment at GSI, and the future Compressed Baryonic Matter (CBM) experiment at the Facility for Antiproton and Ion Research (FAIR), Germany.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This renewed interest in the nuclear matter EOS at high densities,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' accessible in heavy-ion collisions at intermediate energies,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' coincides with an increased effort to constrain the EOS of neutron-rich matter,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' probed in studies of neutron stars and neutron star mergers (see Section II C as well as recent white papers on QCD Phase Structure and Interactions at High Baryon Den- sity: Continuation of BES Physics Program with CBM at FAIR [151] and Dense matter theory for heavy-ion collisions and neutron stars [159]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, studies show that heavy-ion collisions in this regime and neutron star mergers probe similar temperatures and baryon densities [333, 334].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' However, while matter created in collisions of heavy-ions has comparable numbers of protons and neutrons, matter inside neutron stars is neutron-rich.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Establishing the much needed connection between the studies of the nuclear EOS as probed in heavy-ion collisions and as inferred from neutron star observations is possible by leveraging the experimental capabilities of the newly com- missioned Facility for Rare Ion Beams (FRIB), where energetic beams of proton- and neutron-rich nuclei can be produced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Heavy-ion collision experiments at FRIB can put tight constraints on the dependence of the nuclear matter EOS on the relative proton and neutron abundances [22], and thus enable a description of both dense nuclear and dense neutron-rich matter within a unified framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Indeed, if we assume that the core of a neutron star is composed of mostly uniform nucleonic matter, then nuclear matter and neutron stars should be described by a common EOS, specifying the relationship between the pressure and the temperature, density, and isospin content.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The theoretical construct of symmetric nuclear matter consisting of equal amounts of neutrons and 34 Number density Astro HIC(asym) Nuclei properties Theory Crust HIC(SNM) FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This schematic plot illustrates the approximate density ranges that are explored in the studies of chiral effective field theory, nuclei properties, heavy-ion collision experiments, and observations of neutron stars and their crusts in astronomy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' protons has been successful to derive properties of symmetric matter such as the saturation density and bind- ing energy, however, an additional term in the EOS is needed to de- scribe nuclear matter with unequal neutron-proton composition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' This second term depends on the asymme- try δ, defined as δ = (nn − np)/nB, where nn, np, and nB are the neu- tron, proton, and total baryon densi- ties, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Consequently, one can view the asymmetry as the neu- tron excess fraction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Mathematically, the energy per nucleon can be then expressed as a sum of two terms: ϵ(nn, np) = ϵSNM(n) + S(n)δ2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Here, the first term represents the energy per nucleon of symmetric nuclear matter, while the second term accounts for the correction needed when δ ̸= 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Therefore, δ is a crucial parameter that distinguishes neutron stars (with δ >∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8) from most nuclei (with δ <∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='25).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Given the relatively small values of the asymmetry δ for nuclei, in heavy-ion collision experiments it is easier to constrain the coefficients of the EOS of symmetric matter, ϵSNM(nB).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In contrast, the energy contribution from the asymmetric term, also known as the symmetry energy, constitutes a small fraction of the total energy of a nucleus even for neutron-rich heavy radioactive isotopes (< 5% in the liquid drop model), and its determination requires precise measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Furthermore, because the isospin effects in any observable tend to diminish with temperature, it may be difficult to measure the symmetry energy at very high densities, which require high-energy heavy-ion reactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Therefore, symmetry energy is best probed in heavy-ion collisions of highly asymmetric isotopes at low to intermediate energies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 12 shows schematically the baryon density regions explored by different areas in nuclear physics studies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Recent breakthroughs in astronomical observations with state-of-the-art instru- ments led to the first detection of a binary neutron-star merger and the unprecedented radii mea- surements of neutron stars with accurately known masses (see Section II C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The neutron star mass-radius relationship provides an insight into the EOS at high densities above twice saturation density (>∼ 2n0), as represented by the red arrow (labelled “Astro”) in the upper right corner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Labo- ratory experiments, especially those using heavy-ion collisions, are essential to provide information on the dependence of the EOS on density and the asymmetry (see also Section II A).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' High-energy heavy-ion collisions can provide insight into the symmetric nuclear matter EOS as represented by the gold right-pointing arrow (labeled “HIC(SNM)”), while current probes of the symmetry energy are more suited for measurements of lower energy heavy-ion reactions (<∼ 600 AMeV) as represented by the left-pointing gold arrow (labeled “HIC(asym)”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Many properties of nuclei, such as masses and radii, have been shown to be mainly sensitive to densities around (2/3)n0, however, with a careful selection of nuclear observables, the symmetry energy has been probed over densities of 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='3n0 < nB < n0 using Pearson correlation methods [12, 335] (green left-pointing arrow).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Recent advances in chiral effective field theory (see Section II B) enabled extrapolations of the EOS to be extended up to ≈ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 [13], but the uncertainty increases exponentially with density for densities that are higher than n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' It is not clear what is the maximum density up to which such extrapolations can succeed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Finally, one of the most interesting regions is at very low densities (<∼ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0), corresponding to the crust of a neutron star where matter is not uniform (see Section II C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' There, matter changes with increasing density from a Coulomb-dominated lattice to L 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='035 nuclear pasta and, ultimately, to uniform matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The density and nature of these transformations are again dictated largely by the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Measurements made in heavy-ion collisions at intermediate energies, probing high densities or, equivalently, small nucleon separations, will yield key insights into the nature of the nuclear force, including the density-dependence of the nuclear symmetry energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experimental efforts to determine the EOS for symmetric matter and the symmetry energy are described in Section III A and III B, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Please note that all beam energies Elab quoted in this section are the single-beam kinetic energies per nucleon, in units of AMeV or AGeV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' (Alternatively, Elab is also sometimes denoted by other authors as E/A, with units of MeV or GeV).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Additionally, while many results are reported in terms of their constraints on the incompressibility K0, one should refrain from interpreting them as constraining the behavior of the EOS around the saturation density (see Section II A 2 for more details).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments to extract the EOS of symmetric nuclear matter Heavy-ion collision experiments worldwide have extensively studied the EOS of symmetric nuclear matter at supra-saturation densities over the past four decades.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments based at the Schwerionensynchrotron-18 (SIS-18) ring accelerator at the GSI Helmholtz Centre for Heavy Ion Research (GSI) have probed Au+Au collisions at energies between Elab = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='09–1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5 AGeV (√sNN = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='92–2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='52 GeV), corresponding to fireball densities 1–2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Further experimental efforts with Au+Au collisions were carried out at higher energies, Elab = 2–10 AGeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='70– 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='72 GeV), at the Alternating Gradient Synchrotron (AGS) at the Brookhaven National Laboratory (BNL) to probe fireball densities 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5–5n0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Complementing the densities reached at AGS-BNL is the Beam Energy Scan (BES) program of the Solenoidal Tracker at RHIC (STAR) experiment at RHIC in BNL, where high-statistics Au+Au collisions were performed at energies between Elab = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='9– 30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 AGeV (√sNN = 3–7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='7 GeV) in the fixed-target mode.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' A selection of constraints on the EOS extracted from the above experiments is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Below, we describe the observables stud- ied to extract the symmetric nuclear matter EOS, experiments probing the aforementioned density ranges, and inferences for the hadronic transport codes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Measurements sensitive to the EOS Collisions of heavy nuclei at relativistic energies lead to a rapid compression and heating of matter trapped in the collision region, followed by its dynamic expansion and cooling (see Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The EOS governs both the compression as well as the expansion of the hot and dense nuclear matter, which in turn affect measured particle distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' For example, a stiffer EOS (characterizing matter that is more incompressible) leads to a relatively smaller compression and, consequently, smaller heating, but a faster transverse expansion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The smaller temperatures reached in the fireball lead to smaller thermal dilepton and photon yields (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', [336–338]), while the faster expansion manifests itself in relatively higher mean transverse momenta (see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=', [24]) and a shorter lifetime of the fireball, the latter of which can be probed by a combination of the femtoscopic radii, R2 out − R2 side, shown to be proportional to the duration of particle emission [339, 340].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The EOS also plays a large role in the interplay between the initial geometry of the system, the expansion of matter originating from nucleons trapped in the collision zone (participants), and the propagation of nucleons which are either still incoming into the collision region or whose trajectories do not directly cross the collision region (spectators).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In systems colliding at beam energies for which the speed of the fireball expansion is comparable with the speed of the spectators, 36 the resulting complex dynamical evolution affects the transverse expansion of the system and, therefore, the angular particle distributions in the transverse plane dN/dφ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, moments of the angular momentum distribution, known as the collective flow coefficients and defined as vn = � dφ cos(nφ) (dN/dφ)/ � dφ (dN/dφ), describe the collective motion of the system and are highly sensitive to the EOS, as shown in numerous hydrodynamic [77, 341–346] and hadronic transport [31, 67, 78, 79, 347, 348] models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' At the same time, collective flow observables can be measured with high precision, making them primary observables used to constrain the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In off-central collisions, the initial collision zone has an approximately elliptical shape, and the pressure gradients within the collision zone are larger along its short axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' If the spectator nucleons move out of the way before the fireball expands, the pressure gradients in the collision zone lead to particle distributions around midrapidity which have maxima coincident with the reaction plane (“in-plane” emission).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' If, however, the spectators stand in the way of the fireball expansion, this leads to a preferential emission along the long axis of the collision zone (“out-of-plane” emission, also referred to as “squeeze-out” due to the role that the spectators play in the expansion).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The preferential emission in either in-plane or out-of-plane direction is described by the second Fourier coefficient of flow v2, also known as the elliptic flow, which is positive in the former case and negative in the latter case (see the lower panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The magnitude of the elliptic flow, as well as the energy at which v2 changes sign, are intrinsically connected to the stiffness of the EOS: for example, a stiffer EOS results in both a faster expansion and a more forceful blocking by spectators, which leads to a larger squeeze-out and a more negative v2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The rapidity-dependence of the first Fourier coefficient of flow, the directed flow v1, is also sensitive to the EOS as it measures the degree of spectator deflection due to the interaction with the collision zone [349].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In the center-of-mass frame, the spectators from a nucleus moving in the positive beam direction will be deflected to one side, while the spectators from the other nucleus, moving in the negative beam direction, will be deflected to the opposite side, resulting in a positive v1 at positive rapidities and a negative v2 at negative rapidities (here, the sign of v1 is a matter of convention;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' see [58] for a more detailed explanation).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The magnitude of the directed flow in each region and, therefore, its slope at midrapidity are directly related to the EOS: for example, a softer EOS leads to a smaller deflection and a smaller slope of v1 at midrapidity, where in particular a sufficiently soft EOS can even lead to a negative slope of v1 [343, 350].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' We note that spectators are necessary to obtain substantial magnitudes of the slope of the directed flow, as can be seen by its small values at high collision energies (see the upper panel of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Beyond the collective flow phenomena, the EOS also has an effect on hadron production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In particular, much attention has been given to production of hadrons in heavy-ion collision at energies below the nominal production threshold in NN reactions (“sub-threshold” production), which requires multiple sequential hadron-hadron collisions to occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' The probability of these collisions is significantly higher in the high-density regions, and consequently the yield of sub-threshold probes is expected to be substantially enhanced if higher densities are reached in the collision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Of particular importance for the EOS studies is sub-threshold production of K+ mesons, which undergo few final-state interactions with the nuclear medium and therefore mostly leave the fireball unperturbed, making them a sensitive probe of the highest densities reached and, consequently, of the nuclear EOS [87].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' Experiments probing densities between 1–2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='5n0 As described above, sub-threshold particle yields can be used as probes of the EOS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content=' In partic- ular, due to their low in-medium cross-section, K+ mesons produced at energies lower than the production threshold of Elab = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='58 GeV (√sNN = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='55 GeV) can carry unperturbed informa- 37 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 Elab [GeV] 1 2 3 4 5 6 7 (MK+/A)Au+Au / (MK+/A)C+C 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 Elab [GeV] 1 2 3 4 5 6 7 (MK+/A)Au+Au / (MK+/A)C+C soft EOS, pot ChPT hard EOS, pot ChPT soft EOS, IQMD, pot RMF hard EOS, IQMD, pot RMF KaoS soft EOS, IQMD, Giessen cs hard EOS, IQMD, Giessen cs ❑HM ▲ SM FOPI Au+Au protons 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='15 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='30 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/89FQT4oBgHgl3EQfIjX8/content/2301.13253v1.pdf'} +page_content='25 beam energy (A GeV)