jackkuo commited on
Commit
46b4150
·
verified ·
1 Parent(s): efe9ae9

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -dFAT4oBgHgl3EQfqB3j/vector_store/index.faiss +3 -0
  2. -dFAT4oBgHgl3EQfqB3j/vector_store/index.pkl +3 -0
  3. .gitattributes +62 -0
  4. 09E2T4oBgHgl3EQfigc1/content/tmp_files/2301.03958v1.pdf.txt +1608 -0
  5. 09E2T4oBgHgl3EQfigc1/content/tmp_files/load_file.txt +0 -0
  6. 09FIT4oBgHgl3EQf3Sv5/vector_store/index.faiss +3 -0
  7. 09FIT4oBgHgl3EQf3Sv5/vector_store/index.pkl +3 -0
  8. 0tAzT4oBgHgl3EQfevwc/vector_store/index.faiss +3 -0
  9. 1dFRT4oBgHgl3EQfmDfL/content/2301.13600v1.pdf +3 -0
  10. 1dFRT4oBgHgl3EQfmDfL/vector_store/index.pkl +3 -0
  11. 1tE2T4oBgHgl3EQfNQaE/content/2301.03735v1.pdf +3 -0
  12. 1tE2T4oBgHgl3EQfNQaE/vector_store/index.faiss +3 -0
  13. 1tE2T4oBgHgl3EQfNQaE/vector_store/index.pkl +3 -0
  14. 2NAzT4oBgHgl3EQfRvtg/vector_store/index.faiss +3 -0
  15. 2dAyT4oBgHgl3EQf1fnx/content/tmp_files/2301.00738v1.pdf.txt +942 -0
  16. 2dAyT4oBgHgl3EQf1fnx/content/tmp_files/load_file.txt +0 -0
  17. 3tE0T4oBgHgl3EQfvAFe/vector_store/index.faiss +3 -0
  18. 5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/2301.00041v1.pdf.txt +1329 -0
  19. 5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/load_file.txt +0 -0
  20. 5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/2301.01700v1.pdf.txt +1572 -0
  21. 5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/load_file.txt +0 -0
  22. 6dE4T4oBgHgl3EQfcQxJ/content/2301.05081v1.pdf +3 -0
  23. 6dFKT4oBgHgl3EQf_S4j/vector_store/index.faiss +3 -0
  24. 7tE1T4oBgHgl3EQf7QXS/content/2301.03533v1.pdf +3 -0
  25. 7tE1T4oBgHgl3EQf7QXS/vector_store/index.faiss +3 -0
  26. 7tE1T4oBgHgl3EQf7QXS/vector_store/index.pkl +3 -0
  27. 7tE4T4oBgHgl3EQfcwyw/vector_store/index.faiss +3 -0
  28. 89E5T4oBgHgl3EQfQw7M/content/2301.05516v1.pdf +3 -0
  29. 89E5T4oBgHgl3EQfQw7M/vector_store/index.pkl +3 -0
  30. 8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/2301.03535v1.pdf.txt +788 -0
  31. 8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/load_file.txt +456 -0
  32. 8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/2301.02859v1.pdf.txt +1175 -0
  33. 8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/load_file.txt +427 -0
  34. 9NA0T4oBgHgl3EQfO_8B/content/tmp_files/2301.02167v1.pdf.txt +0 -0
  35. 9NA0T4oBgHgl3EQfO_8B/content/tmp_files/load_file.txt +0 -0
  36. ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/2301.01712v1.pdf.txt +2499 -0
  37. ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/load_file.txt +0 -0
  38. BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/2301.00075v1.pdf.txt +597 -0
  39. BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/load_file.txt +187 -0
  40. DtE4T4oBgHgl3EQf6Q5X/vector_store/index.pkl +3 -0
  41. GNE0T4oBgHgl3EQfRQAC/content/tmp_files/2301.02203v1.pdf.txt +1210 -0
  42. GNE0T4oBgHgl3EQfRQAC/content/tmp_files/load_file.txt +0 -0
  43. H9AyT4oBgHgl3EQfffh-/content/2301.00341v1.pdf +3 -0
  44. H9AyT4oBgHgl3EQfffh-/vector_store/index.faiss +3 -0
  45. IdE4T4oBgHgl3EQfIQyU/content/2301.04911v1.pdf +3 -0
  46. IdE4T4oBgHgl3EQfIQyU/vector_store/index.pkl +3 -0
  47. JdE5T4oBgHgl3EQfXg8M/content/2301.05566v1.pdf +3 -0
  48. JdE5T4oBgHgl3EQfXg8M/vector_store/index.faiss +3 -0
  49. JtFRT4oBgHgl3EQfzzhX/content/2301.13651v1.pdf +3 -0
  50. JtFRT4oBgHgl3EQfzzhX/vector_store/index.faiss +3 -0
-dFAT4oBgHgl3EQfqB3j/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d9de282b7373be02df68f70858ea202ebbf6481e4c0bdb0aac631550a7e8b5ef
3
+ size 393261
-dFAT4oBgHgl3EQfqB3j/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f678bbe6717b031958387f12eb56059b71c914055528c912e41ce78d6f57cae6
3
+ size 18226
.gitattributes CHANGED
@@ -8846,3 +8846,65 @@ BtE1T4oBgHgl3EQfVwQu/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
8846
  YtFAT4oBgHgl3EQf3h4G/content/2301.08720v1.pdf filter=lfs diff=lfs merge=lfs -text
8847
  hdFKT4oBgHgl3EQfuS7o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8848
  EtE0T4oBgHgl3EQfywL5/content/2301.02665v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8846
  YtFAT4oBgHgl3EQf3h4G/content/2301.08720v1.pdf filter=lfs diff=lfs merge=lfs -text
8847
  hdFKT4oBgHgl3EQfuS7o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8848
  EtE0T4oBgHgl3EQfywL5/content/2301.02665v1.pdf filter=lfs diff=lfs merge=lfs -text
8849
+ JdE5T4oBgHgl3EQfXg8M/content/2301.05566v1.pdf filter=lfs diff=lfs merge=lfs -text
8850
+ JdE5T4oBgHgl3EQfXg8M/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8851
+ 6dE4T4oBgHgl3EQfcQxJ/content/2301.05081v1.pdf filter=lfs diff=lfs merge=lfs -text
8852
+ -dFAT4oBgHgl3EQfqB3j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8853
+ 3tE0T4oBgHgl3EQfvAFe/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8854
+ kNE0T4oBgHgl3EQfYgB_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8855
+ _NAzT4oBgHgl3EQf_f58/content/2301.01949v1.pdf filter=lfs diff=lfs merge=lfs -text
8856
+ ltAyT4oBgHgl3EQf_vpQ/content/2301.00913v1.pdf filter=lfs diff=lfs merge=lfs -text
8857
+ RtE0T4oBgHgl3EQfkgHa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8858
+ H9AyT4oBgHgl3EQfffh-/content/2301.00341v1.pdf filter=lfs diff=lfs merge=lfs -text
8859
+ 0tAzT4oBgHgl3EQfevwc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8860
+ htFLT4oBgHgl3EQfaS9u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8861
+ otFPT4oBgHgl3EQfLDSW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8862
+ 6dFKT4oBgHgl3EQf_S4j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8863
+ YdAzT4oBgHgl3EQf1_7C/content/2301.01809v1.pdf filter=lfs diff=lfs merge=lfs -text
8864
+ 2NAzT4oBgHgl3EQfRvtg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8865
+ StE5T4oBgHgl3EQfag8H/content/2301.05588v1.pdf filter=lfs diff=lfs merge=lfs -text
8866
+ hdAzT4oBgHgl3EQfMvuF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8867
+ LdE3T4oBgHgl3EQfvwu2/content/2301.04697v1.pdf filter=lfs diff=lfs merge=lfs -text
8868
+ 89E5T4oBgHgl3EQfQw7M/content/2301.05516v1.pdf filter=lfs diff=lfs merge=lfs -text
8869
+ ytE2T4oBgHgl3EQf4AhB/content/2301.04176v1.pdf filter=lfs diff=lfs merge=lfs -text
8870
+ JtFRT4oBgHgl3EQfzzhX/content/2301.13651v1.pdf filter=lfs diff=lfs merge=lfs -text
8871
+ 7tE1T4oBgHgl3EQf7QXS/content/2301.03533v1.pdf filter=lfs diff=lfs merge=lfs -text
8872
+ XtFLT4oBgHgl3EQfUS83/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8873
+ etE4T4oBgHgl3EQfQwzS/content/2301.04985v1.pdf filter=lfs diff=lfs merge=lfs -text
8874
+ ONE4T4oBgHgl3EQf9w4Q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8875
+ h9AyT4oBgHgl3EQfkPiH/content/2301.00430v1.pdf filter=lfs diff=lfs merge=lfs -text
8876
+ QdFAT4oBgHgl3EQf0B72/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8877
+ 1tE2T4oBgHgl3EQfNQaE/content/2301.03735v1.pdf filter=lfs diff=lfs merge=lfs -text
8878
+ vNE2T4oBgHgl3EQfgQds/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8879
+ 7tE1T4oBgHgl3EQf7QXS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8880
+ s9E2T4oBgHgl3EQffgcE/content/2301.03926v1.pdf filter=lfs diff=lfs merge=lfs -text
8881
+ YdAzT4oBgHgl3EQf1_7C/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8882
+ r9E5T4oBgHgl3EQfKA7Y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8883
+ JtFRT4oBgHgl3EQfzzhX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8884
+ 1tE2T4oBgHgl3EQfNQaE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8885
+ s9E2T4oBgHgl3EQffgcE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8886
+ RtE0T4oBgHgl3EQfkgHa/content/2301.02475v1.pdf filter=lfs diff=lfs merge=lfs -text
8887
+ 7tE4T4oBgHgl3EQfcwyw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8888
+ IdE4T4oBgHgl3EQfIQyU/content/2301.04911v1.pdf filter=lfs diff=lfs merge=lfs -text
8889
+ vNAzT4oBgHgl3EQf6_7w/content/2301.01885v1.pdf filter=lfs diff=lfs merge=lfs -text
8890
+ LdE3T4oBgHgl3EQfvwu2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8891
+ eNFJT4oBgHgl3EQfSyxE/content/2301.11501v1.pdf filter=lfs diff=lfs merge=lfs -text
8892
+ u9E2T4oBgHgl3EQfgQcG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8893
+ H9AyT4oBgHgl3EQfffh-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8894
+ QdFPT4oBgHgl3EQfozUy/content/2301.13135v1.pdf filter=lfs diff=lfs merge=lfs -text
8895
+ MNAyT4oBgHgl3EQfT_ea/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8896
+ PdAyT4oBgHgl3EQftfm7/content/2301.00597v1.pdf filter=lfs diff=lfs merge=lfs -text
8897
+ h9AyT4oBgHgl3EQfkPiH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8898
+ 09FIT4oBgHgl3EQf3Sv5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8899
+ mtE0T4oBgHgl3EQfZQBk/content/2301.02318v1.pdf filter=lfs diff=lfs merge=lfs -text
8900
+ ltAyT4oBgHgl3EQf_vpQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8901
+ U9FOT4oBgHgl3EQf6TSQ/content/2301.12957v1.pdf filter=lfs diff=lfs merge=lfs -text
8902
+ a9A0T4oBgHgl3EQfGP_A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8903
+ 1dFRT4oBgHgl3EQfmDfL/content/2301.13600v1.pdf filter=lfs diff=lfs merge=lfs -text
8904
+ tNFJT4oBgHgl3EQfdCxQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8905
+ pdE5T4oBgHgl3EQfJA4W/content/2301.05453v1.pdf filter=lfs diff=lfs merge=lfs -text
8906
+ KdE3T4oBgHgl3EQfXwqt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8907
+ iNAzT4oBgHgl3EQfbPw2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8908
+ UdE4T4oBgHgl3EQfmw2j/content/2301.05171v1.pdf filter=lfs diff=lfs merge=lfs -text
8909
+ MtAyT4oBgHgl3EQfUPcH/content/2301.00119v1.pdf filter=lfs diff=lfs merge=lfs -text
8910
+ UdE4T4oBgHgl3EQfmw2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
09E2T4oBgHgl3EQfigc1/content/tmp_files/2301.03958v1.pdf.txt ADDED
@@ -0,0 +1,1608 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03958v1 [math.AP] 10 Jan 2023
2
+ Rigidity results for the p-Laplacian Poisson problem with Robin
3
+ boundary conditions
4
+ Alba Lia Masiello*, Gloria Paoli
5
+ Abstract
6
+ Let Ω ⊂ Rn be an open, bounded and Lipschitz set. We consider the Poisson problem for
7
+ the p−Laplace operator associated to Ω with Robin boundary conditions. In this setting, we
8
+ study the equality case in the Talenti-type comparison stated in [6]. We prove that the equality
9
+ is achieved only if Ω is a ball and both the function u and the right hand side f of the Poisson
10
+ equation are radial.
11
+ Keywords: Robin boundary conditions, p-Laplace operator, rigidity result, Talenti compari-
12
+ son.
13
+ MSC 2020: 35J92, 35J25, 46E30.
14
+ E-mail address, A.L. Masiello (corresponding author): albalia.masiello@unina.it
15
+ Dipartimento di Matematica e Applicazioni “R. Caccioppoli”, Università degli studi di Napoli
16
+ Federico II, Via Cintia, Complesso Universitario Monte S. Angelo, 80126 Napoli, Italy.
17
+ E-mail address, G. Paoli: gloria.paoli@fau.de
18
+ Department of Data Science (DDS) Chair in Dynamics, Control and Numerics (Alexander von
19
+ Humboldt-Professorship), Cauerstr. 11, 91058 Erlangen, Germany.
20
+ 1
21
+ Introduction
22
+ Symmetrization techniques in the context of qualitative properties of solutions to second-order
23
+ elliptic boundary value problems are introduced by Talenti in [25]. In this seminal paper, the
24
+ author considers an open, bounded and Lipschitz set Ω ⊂ Rn, the ball Ω♯ with the same measure
25
+ as Ω and the solutions u and v to the following problems
26
+ ®
27
+ −∆uD = f
28
+ in Ω,
29
+ uD = 0
30
+ on ∂Ω,
31
+ ®
32
+ −∆vD = f ♯
33
+ in Ω♯,
34
+ vD = 0
35
+ on ∂Ω♯,
36
+ (1)
37
+ where f ∈ L2(Ω) is a positive function and f ♯ is its Schwarz rearrangement of f (see Definition
38
+ 2.3). In this setting, Talenti proves the following point-wise estimate:
39
+ u♯
40
+ D(x) ≤ vD(x),
41
+ for all x ∈ Ω♯.
42
+ (2)
43
+ For sake of completeness, we observe that this result is proved more generally for a uniformly
44
+ elliptic linear operator in divergence form.
45
+ 1
46
+
47
+ 1
48
+ INTRODUCTION
49
+ 2
50
+ A version of this result for nonlinear operators in divergence form is contained in [26], which
51
+ includes as a special instance the case of the p-Laplace operator. Moreover, these results are later
52
+ extended, for instance, to the anisotropic elliptic operators in [2], to the parabolic case in [4], and
53
+ to higher order operators in [9, 28].
54
+ Once a comparison result holds, it is natural to ask whether the equality cases can be character-
55
+ ized and, so, if a rigidity result is in force. In [3], the rigidity result linked to problem (1) is proved.
56
+ Indeed, the authors prove that if equality holds in (2), then Ω is a ball, u is radially symmetric
57
+ and decreasing and f = f ♯. Rigidity results for a generic linear, elliptic second order operator can
58
+ be found in [17] and [18]. To the best of our knowledge, rigidity results for nonlinear operators
59
+ with Dirichlet boundary conditions are not present in the literature. In this paper, we obtain, as a
60
+ corollary of our results, the rigidity for the p−Laplace operator with Dirichlet boundary conditions
61
+ in any dimension (see Corollary 3.3).
62
+ For a long time, it was believed that comparison results could not be proved by means of
63
+ spherical rearrangement argument when dealing with Robin boundary conditions, until the recent
64
+ paper [5]. The authors consider the following problems
65
+
66
+
67
+
68
+
69
+
70
+ −∆u = f
71
+ in Ω,
72
+ ∂u
73
+ ∂ν + βu = 0
74
+ on ∂Ω,
75
+
76
+
77
+
78
+
79
+
80
+ −∆v = f ♯
81
+ in Ω♯,
82
+ ∂v
83
+ ∂ν + βv = 0
84
+ on ∂Ω♯,
85
+ and they prove a comparison result involving Lorentz norms of u and v whenever f is a non negative
86
+ function in L2(Ω) and β is a positive parameter. In particular, in the case f ≡ 1, they prove
87
+ ∥u∥Lp(Ω) ≤ ∥v∥Lp(Ω♯),
88
+ p = 1, 2,
89
+ and, if n = 2, the pointwise comparison holds:
90
+ u♯(x) ≤ v(x),
91
+ for all x ∈ Ω♯.
92
+ (3)
93
+ In [21], it is proved that (3) is rigid, i.e. the equality case is possible if and only if Ω is a ball
94
+ and u is a radial and decreasing function.
95
+ Generalizations of the results contained in [5] can be found for the anisotropic case in [24], for
96
+ mixed boundary conditions in [1], in the case of the Hermite operator in [13].
97
+ In the present paper, we focus our study on the rigidity for p−Laplace operator. In this case,
98
+ the comparison results are obtained in [6] and the setting is the following.
99
+ Let Ω be a bounded, open and Lipschitz set in Rn, with n ≥ 2. Let p ∈ (1, +∞) and let
100
+ f ∈ Lp′(Ω) be a positive function, where p′ = p/(p − 1). The Poisson problem for the p−Laplace
101
+ operator with Robin boundary conditions is
102
+
103
+
104
+
105
+
106
+
107
+ −∆pu := −div(|∇u|p−2∇u) = f
108
+ in Ω
109
+ |∇u|p−2 ∂u
110
+ ∂ν + β|u|p−2u = 0
111
+ on ∂Ω,
112
+ (4)
113
+ where ν is the unit exterior normal to ∂Ω and β > 0. A function u ∈ W 1,p(Ω) is a weak solution
114
+ to (4) if
115
+ ˆ
116
+
117
+ |∇u|p−2∇u∇ϕ dx + β
118
+ ˆ
119
+ ∂Ω
120
+ |u|p−2uϕ dHn−1(x) =
121
+ ˆ
122
+
123
+ fϕ dx,
124
+ ∀ϕ ∈ W 1,p(Ω).
125
+ (5)
126
+
127
+ 1
128
+ INTRODUCTION
129
+ 3
130
+ The symmetrized problem associated to (4) is the following
131
+
132
+
133
+
134
+
135
+
136
+ −∆pv = f ♯
137
+ in Ω♯
138
+ |∇v|p−2 ∂v
139
+ ∂ν + β|v|p−2v = 0
140
+ on ∂Ω♯.
141
+ (6)
142
+ In [6] the authors establish a comparison result between suitable Lorentz norms (see Definition
143
+ 2.4) of the solutions u and v to problems (4) and (6) respectively. In particular, they prove
144
+ ∥u∥Lpk,p(Ω) ≤ ∥v∥Lpk,p(Ω♯),
145
+ ∀ 0 < k ≤
146
+ n(p − 1)
147
+ (n − 2)p + n,
148
+ (7)
149
+ and in the case f ≡ 1, they prove
150
+ u♯(x) ≤ v(x),
151
+ 1 ≤ p ≤
152
+ n
153
+ n − 1
154
+ (8)
155
+ and
156
+ ∥u∥Lpk,p(Ω) ≤ ∥v∥Lpk,p(Ω♯),
157
+ ∀ 0 < k ≤
158
+ n(p − 1)
159
+ (n − 2)p + n,
160
+ ∀p > 1.
161
+ (9)
162
+ In the present paper, we want to characterize the equality case in (7) and (9), answering to
163
+ the open problem contained in [21]. For simplicity, we state the main Theorem only in the case
164
+ f ∈ Lp′(Ω) positive, since in the case f ≡ 1 the proof is analogous, as we observe in Remark 4.1.
165
+ Theorem 1.1. Let Ω ⊂ Rn be a bounded, open and Lipschitz set and let Ω♯ be the ball centered at
166
+ the origin with the same measure as Ω. Let u be the solution to (4) and let v be a solution to (6).
167
+ If
168
+ ∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯),
169
+ for some k ∈
170
+ ò
171
+ 0,
172
+ n(p − 1)
173
+ (n − 2)p + n
174
+ ò
175
+ (10)
176
+ then, there exists x0 ∈ Rn such that
177
+ Ω = Ω♯ + x0,
178
+ u(· + x0) = v(·),
179
+ f(· + x0) = f ♯(·).
180
+ The idea of the proof of Theorem 1.1 is the following. First of all, we prove that hypothesis
181
+ (10) implies that the superlevel sets of u are balls. The main difficulty is to prove that these balls
182
+ are concentric.
183
+ Differently from the case of the Laplace operator with Dirichlet boundary conditions studied in
184
+ [4, 16], we can’t apply directly the steepest descent method introduced in [8], because it strongly
185
+ relays on the continuity of both the solution and of its gradient. In the case of the p−Laplace
186
+ equation, the continuity of the solution up to the boundary depends on the regularity of the given
187
+ datum f. To overcome this regularity issue we show that u is a solution to a suitable Dirichlet
188
+ problem and it satisfies the Pólya-Szegő inequality with equality sign. Then, we can conclude that
189
+ u is radially symmetric and decreasing, using the classical result contained in [10]. We make use
190
+ of Lemma 3.2, where the rigidity of the Poisson problem for the p-Laplace operator with Dirichlet
191
+ boundary condition is proved under the assumption f ∈ Lp′(Ω) and positive. Up to our knowledge,
192
+ Corollary 3.3 seems to be new in the literature.
193
+ The paper is organized as follows. In Section 2 we recall some definitions about rearrangement
194
+ of functions and we state some lemmas that we will need in the proof of the main theorem. Section
195
+ 3 is dedicated to the proof of the main result and we conclude with a list of open problems.
196
+
197
+ 2
198
+ NOTATION AND PRELIMINARIES
199
+ 4
200
+ 2
201
+ Notation and Preliminaries
202
+ Throughout this article we will denote by |Ω| the Lebesgue measure of an open and bounded
203
+ Lipschitz set of Rn, with n ≥ 2, and by P(Ω) the perimeter of Ω. Since we are assuming that
204
+ ∂Ω is Lipschitz, we have that P(Ω) = Hn−1(∂Ω), where Hn−1 denotes the (n − 1)−dimensional
205
+ Hausdorff measure.
206
+ We recall the classical isoperimetric inequality and and we refer the reader, for example, to
207
+ [22, 11, 12, 27] and to the original paper by De Giorgi [15].
208
+ Theorem 2.1 (Isoperimetric Inequality). Let E ⊂ Rn be a set of finite perimeter. Then,
209
+
210
+ 1
211
+ nn |E|
212
+ n−1
213
+ n
214
+ ≤ P(E),
215
+ (11)
216
+ where ωn is the measure of the unit ball in Rn. Equality occurs if and only if E is (equivalent to)
217
+ a Ball.
218
+ For the following theorem, we refer to [7].
219
+ Theorem 2.2 (Coarea formula). Let Ω ⊂ Rn be an open set with Lipschitz boundary. Let f ∈
220
+ W 1,1
221
+ loc (Ω) and let u : Ω → R be a measurable function. Then,
222
+ ˆ
223
+
224
+ u(x)|∇f(x)|dx =
225
+ ˆ
226
+ R
227
+ dt
228
+ ˆ
229
+ Ω∩f−1(t)
230
+ u(y) dHn−1(y).
231
+ (12)
232
+ Let us recall some basic notions about rearrangements. For a general overview, see, for instance,
233
+ [19].
234
+ Definition 2.1. Let u : Ω → R be a measurable function, the distribution function of u is the
235
+ function µ : [0, +∞[ → [0, +∞[ defined as the measure of the superlevel sets of u, i.e.
236
+ µ(t) = |{ x ∈ Ω : |u(x)| > t }|.
237
+ Definition 2.2. Let u : Ω → R be a measurable function, the decreasing rearrangement of u is
238
+ the distribution function of µ. We will denote it by u∗(·).
239
+ Remark 2.1. Let us notice that the function µ(·) is decreasing and right continuous and the
240
+ function u∗(·) is its generalized inverse.
241
+ Definition 2.3. The Schwartz rearrangement of u is the function u♯ whose superlevel sets are
242
+ balls with the same measure as the superlevel sets of u.
243
+ We have the following relation between u♯ and u∗:
244
+ u♯(x) = u∗(ωn|x|n),
245
+ where ωn is the measure of the unit ball in Rn, and one can easily check that the functions u, u∗
246
+ e u♯ are equi-distributed, i.e. they have the same distribution function, and it holds
247
+ ∥u∥Lp(Ω) = ∥u∗∥Lp(0,|Ω|) = ∥u♯∥Lp(Ω♯),
248
+ for all p ≥ 1.
249
+
250
+ 2
251
+ NOTATION AND PRELIMINARIES
252
+ 5
253
+ We also recall the Hardy-Littlewood inequality, an important propriety of the decreasing rear-
254
+ rangement,
255
+ ˆ
256
+
257
+ |h(x)g(x)| dx ≤
258
+ ˆ |Ω|
259
+ 0
260
+ h∗(s)g∗(s) ds.
261
+ So, by choosing h(·) = χ{|u|>t}, one has
262
+ ˆ
263
+ |u|>t
264
+ |g(x)| dx ≤
265
+ ˆ µ(t)
266
+ 0
267
+ g∗(s) ds.
268
+ We now introduce the Lorentz spaces (see [28] for more details on this topic).
269
+ Definition 2.4. Let 0 < p < +∞ and 0 < q ≤ +∞. The Lorentz space Lp,q(Ω) is the space of
270
+ those functions such that the quantity:
271
+ ∥u∥Lp,q =
272
+
273
+
274
+
275
+
276
+
277
+
278
+
279
+ p
280
+ 1
281
+ q
282
+ ň ∞
283
+ 0
284
+ tqµ(t)
285
+ q
286
+ p dt
287
+ t
288
+ ã 1
289
+ q
290
+ 0 < q < ∞
291
+ sup
292
+ t>0
293
+ (tpµ(t))
294
+ q = ∞
295
+ is finite.
296
+ Let us observe that for p = q the Lorentz space coincides with the Lp space, as a consequence
297
+ of the Cavalieri’s Principle
298
+ ˆ
299
+
300
+ |u|p = p
301
+ ˆ +∞
302
+ 0
303
+ tp−1µ(t) dt.
304
+ The solutions u to problem (4) and v to problem (6) are both p-superharmonic and, as a conse-
305
+ quence of the strong maximum principle and the lower semicontinuity (see [29, 20]), they achieve
306
+ their minima on the boundary. If we set
307
+ um = min
308
+ Ω u,
309
+ vm = min
310
+ Ω♯ v
311
+ the positiveness of β and the Robin boundary conditions leads to um ≥ 0 and vm ≥ 0. Hence, u
312
+ and v are strictly positive in the interior of Ω. Moreover, we can observe that
313
+ um = min
314
+ Ω u ≤ min
315
+ Ω♯ v = vm,
316
+ (13)
317
+ indeed,
318
+ vp−1
319
+ m P(Ω♯) =
320
+ ˆ
321
+ ∂Ω♯ v(x)p−1 dHn−1(x) = 1
322
+ β
323
+ ˆ
324
+ Ω♯ f ♯ dx = 1
325
+ β
326
+ ˆ
327
+
328
+ f dx
329
+ =
330
+ ˆ
331
+ ∂Ω
332
+ u(x)p−1 dHn−1(x)
333
+ ≥ up−1
334
+ m P(Ω) ≥ ump−1P(Ω♯).
335
+ Moreover, it holds
336
+ µ(t) ≤ φ(t) = |Ω|,
337
+ ∀t ≤ vm.
338
+ (14)
339
+
340
+ 2
341
+ NOTATION AND PRELIMINARIES
342
+ 6
343
+ Now, for t ≥ 0, we introduce the following notations:
344
+ Ut = {x ∈ Ω : u(x) > t}
345
+ ∂Uint
346
+ t
347
+ = ∂Ut ∩ Ω,
348
+ ∂Uext
349
+ t
350
+ = ∂Ut ∩ ∂Ω,
351
+ µ(t) = |Ut|
352
+ and
353
+ Vt =
354
+
355
+ x ∈ Ω♯ : v(x) > t
356
+ ©
357
+ ,
358
+ ∂V int
359
+ t
360
+ = ∂Vt ∩ Ω,
361
+ ∂V ext
362
+ t
363
+ = ∂Vt ∩ ∂Ω,
364
+ φ(t) = |Vt|.
365
+ Because of the invariance of the p−Laplacian and of the Schwarz rearrangement of f by rotation,
366
+ the solution v to (6) is radial, so the set Vt are balls.
367
+ Now, we recall some technical Lemmas, proved in [6], that we need in what follows. We recall
368
+ the proof of Lemma 2.3 for reader’s convenience, while we omit the proof of Lemma 2.4 and Lemma
369
+ 2.5.
370
+ Lemma 2.3. Let u be the solution to (4) and let v be the solution to (6). Then, for almost every
371
+ t > 0, we have
372
+ γnµ(t)(1− 1
373
+ n)
374
+ p
375
+ p−1 ≤
376
+ Lj µ(t)
377
+ 0
378
+ f ∗(s) ds
379
+ å
380
+ 1
381
+ p−1 Ç
382
+ −µ′(t) +
383
+ 1
384
+ β
385
+ 1
386
+ p−1
387
+ ˆ
388
+ ∂Uext
389
+ t
390
+ 1
391
+ u dHn−1(x)
392
+ å
393
+ (15)
394
+ and
395
+ γnφ(t)(1− 1
396
+ n)
397
+ p
398
+ p−1 =
399
+ Lj φ(t)
400
+ 0
401
+ f ∗(s) ds
402
+ å
403
+ 1
404
+ p−1 Ç
405
+ −φ′(t) +
406
+ 1
407
+ β
408
+ 1
409
+ p−1
410
+ ˆ
411
+ ∂V ext
412
+ t
413
+ 1
414
+ v dHn−1(x)
415
+ å
416
+ .
417
+ (16)
418
+ where γn =
419
+ Ä
420
+ nω1/n
421
+ n
422
+ ä
423
+ p
424
+ p−1.
425
+ Proof. Let t > 0 and h > 0. In the weak formulation (5), we choose the following test function
426
+ ϕ(x) =
427
+
428
+
429
+
430
+
431
+
432
+ 0
433
+ if u < t
434
+ u − t
435
+ if t < u < t + h
436
+ h
437
+ if u > t + h,
438
+ (17)
439
+ obtaining
440
+ ˆ
441
+ Ut\Ut+h
442
+ |∇u|p dx + βh
443
+ ˆ
444
+ ∂Uext
445
+ t+h
446
+ up−1 dHn−1(x) + β
447
+ ˆ
448
+ ∂Uext
449
+ t
450
+ \∂Uext
451
+ t+h
452
+ up−1(u − t) dHn−1(x)
453
+ =
454
+ ˆ
455
+ Ut\Ut+h
456
+ f(u − t) dx + h
457
+ ˆ
458
+ Ut+h
459
+ f dx.
460
+ (18)
461
+ Dividing (18) by h, using coarea formula and letting h go to 0, we have that for a.e. t > 0
462
+ ˆ
463
+ ∂Ut
464
+ g(x) dHn−1 =
465
+ ˆ
466
+ Ut
467
+ f dx,
468
+ where
469
+ ®
470
+ |∇u|p−1
471
+ if x ∈ ∂Uint
472
+ t
473
+ ,
474
+ βup−1
475
+ if x ∈ ∂Uext
476
+ t
477
+ .
478
+ (19)
479
+
480
+ 2
481
+ NOTATION AND PRELIMINARIES
482
+ 7
483
+ Using the isoperimetric inequality, for a.e. t ∈ [0, +∞) we have
484
+
485
+ 1
486
+ nn µ(t)
487
+ n−1
488
+ n
489
+ ≤ P(Ut) =
490
+ ˆ
491
+ ∂Ut
492
+ dHn−1
493
+ (20)
494
+
495
+ ň
496
+ ∂Ut
497
+ g dHn−1(x)
498
+ ã 1
499
+ p Lj
500
+ ∂Ut
501
+ 1
502
+ g
503
+ 1
504
+ p−1
505
+ dHn−1(x)
506
+ å1− 1
507
+ p
508
+ (21)
509
+ =
510
+ ň
511
+ ∂Ut
512
+ g dHn−1(x)
513
+ ã 1
514
+ p Lj
515
+ ∂Uint
516
+ t
517
+ 1
518
+ |∇u| dHn−1(x) +
519
+ 1
520
+ β
521
+ 1
522
+ p−1
523
+ ˆ
524
+ ∂Uext
525
+ t
526
+ 1
527
+ u dHn−1(x)
528
+ å1− 1
529
+ p
530
+ (22)
531
+
532
+ Lj µ(t)
533
+ 0
534
+ f ∗(s) ds
535
+ å 1
536
+ p Ç
537
+ −µ′(t) +
538
+ 1
539
+ β
540
+ 1
541
+ p−1
542
+ ˆ
543
+ ∂Uext
544
+ t
545
+ 1
546
+ u dHn−1(x)
547
+ å1− 1
548
+ p
549
+ ,
550
+ (23)
551
+ and, so, (15) follows. Finally, we notice that, if v is the solution to (6), then all the inequalities
552
+ above are equalities, and, consequently, we have (16).
553
+ Lemma 2.4. For all τ ≥ vm, we have
554
+ ˆ τ
555
+ 0
556
+ tp−1
557
+ Lj
558
+ ∂Uext
559
+ t
560
+ 1
561
+ u(x) dHn−1(x)
562
+ å
563
+ dt ≤ 1
564
+
565
+ ˆ |Ω|
566
+ 0
567
+ f ∗(s) ds.
568
+ (24)
569
+ Moreover,
570
+ ˆ τ
571
+ 0
572
+ tp−1
573
+ ň
574
+ ∂Vt∩∂Ω♯
575
+ 1
576
+ v(x) dHn−1(x)
577
+ ã
578
+ dt = 1
579
+
580
+ ˆ |Ω|
581
+ 0
582
+ f ∗(s) ds,
583
+ (25)
584
+ Lemma 2.5 (Gronwall). Let ξ(τ) be a continuously differentiable function, let q > 1 and let C be
585
+ a non negative constant C such that the following differential inequality holds
586
+ τξ′(τ) ≤ (q − 1)ξ(τ) + C
587
+ ∀τ ≥ τ0 > 0.
588
+ Then, we have
589
+ ξ(τ) ≤
590
+ Å
591
+ ξ(τ0) +
592
+ C
593
+ q − 1
594
+ ã Å τ
595
+ τ0
596
+ ãq−1
597
+
598
+ C
599
+ q − 1
600
+ ∀τ ≥ τ0,
601
+ (26)
602
+ and
603
+ ξ′(τ) ≤
604
+ Å(q − 1)ξ(τ0) + C
605
+ τ0
606
+ ã Å τ
607
+ τ0
608
+ ãq−2
609
+ ∀τ ≥ τ0.
610
+ (27)
611
+ The following Lemma is contained in [4].
612
+ Lemma 2.6. Let f, g ∈ L2(Ω) be two positive functions. If
613
+ ˆ
614
+
615
+ fg dx =
616
+ ˆ
617
+ Ω♯ f ♯g♯ dx,
618
+ (28)
619
+ then, for every τ ≥ 0 there exists t ≥ 0 such that we have, up to zero measure set,
620
+ {g > τ} = {f > t}.
621
+ (29)
622
+
623
+ 3
624
+ PROOF OF THEOREM ??
625
+ 8
626
+ We conclude this preliminary session, recalling the classical results contained in [10] (see The-
627
+ orem 1.1 and Lemma 2.3). In particular, the result contained in (iii) of Lemma (2.7) gives the
628
+ rigidity of the Pólya-Szegő inequality (see [23]):
629
+ ˆ
630
+ Rn |∇u♯|p dx ≤
631
+ ˆ
632
+ Rn |∇u|p dx,
633
+ ∀u ∈ W 1,p(Rn).
634
+ (30)
635
+ Theorem 2.7. Let w ∈ W 1,p(Rn), let σ(t) be its distribution function and let
636
+ wM :=
637
+ ®
638
+ ∥w∥∞
639
+ if w ∈ L∞(Ω)
640
+ +∞
641
+ otherwise.
642
+ Then, the following are true:
643
+ i. For almost all t ∈ (0, wM),
644
+ ∞ > −σ′(t) ≥
645
+ ˆ
646
+ w−1(t)
647
+ 1
648
+ |∇w|dHn−1
649
+ (31)
650
+ ii. σ is absolutely continuous if and only if
651
+ ���
652
+
653
+ |∇w♯| = 0
654
+ ©
655
+
656
+
657
+ 0 < w♯ < wM
658
+ ©��� = 0.
659
+ (32)
660
+ iii. If
661
+ ˆ
662
+ Rn |∇w|p =
663
+ ˆ
664
+ Rn |∇w♯|p,
665
+ (33)
666
+ and (32) holds, then there exist a translate of w♯ which is almost everywhere equal to w.
667
+ Remark 2.2. We observe that in [14], it is proved that the condition
668
+ |{ |∇w| = 0 } ∩ { 0 < w < wM }| = 0
669
+ (34)
670
+ implies (32). So, by (iii) in Lemma 2.7, if we have (33) and (34), there exists a translated of w♯
671
+ which is almost everywhere equal to w.
672
+ Remark 2.3. We observe that the Pólya -Szegő inequality (30) and the relative rigidity result
673
+ (iii) contained in Lemma 2.7 hold also if we assume w ∈ W 1,p
674
+ 0 (Ω). Indeed, it is easily proved that
675
+ for every w ∈ W 1,p
676
+ 0 (Ω) one has w♯ ∈ W 1,p
677
+ 0 (Ω♯).
678
+ 3
679
+ Proof of Theorem 1.1
680
+ In order to prove the main Theorem 1.1, we divide the proof into the following steps. First of all,
681
+ we prove that, under the assumptions of Theorem 1.1, equality holds in (15) and this is the content
682
+ of Proposition 3.1. Then, in Proposition 3.4, we prove that equality in (15) implies the fact that Ω
683
+ is a ball and u and f are radial functions. In order to prove this last step, we need the key Lemma
684
+ 3.2.
685
+
686
+ 3
687
+ PROOF OF THEOREM ??
688
+ 9
689
+ Proposition 3.1. Let u be the solution to (4) and let v be the solution to (6). If there exists k
690
+ k ∈
691
+ ò
692
+ 0,
693
+ n(p − 1)
694
+ (n − 2)p + n
695
+ ò
696
+ such that
697
+ ∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯),
698
+ then equality holds in (15) for almost every t.
699
+ Proof. Since we are assuming that ∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯), we have that
700
+ ˆ +∞
701
+ 0
702
+ tp−1µ(t)
703
+ 1
704
+ k dt =
705
+ ˆ +∞
706
+ 0
707
+ tp−1φ(t)
708
+ 1
709
+ k dt.
710
+ (35)
711
+ Let us multiply (15) by tp−1µ(t)α, where α = 1
712
+ k −
713
+ Å
714
+ 1 − 1
715
+ n
716
+ ã
717
+ p
718
+ p − 1, and let us integrate from 0 to
719
+ +∞:
720
+ γn
721
+ ˆ +∞
722
+ 0
723
+ tp−1µ
724
+ 1
725
+ k (t) dt
726
+
727
+ ˆ +∞
728
+ 0
729
+ Lj µ(t)
730
+ 0
731
+ f ∗(s) ds
732
+ å
733
+ 1
734
+ p−1 Ç
735
+ −µ′(t) +
736
+ 1
737
+ β
738
+ 1
739
+ p−1
740
+ ˆ
741
+ ∂Uext
742
+ t
743
+ 1
744
+ u dHn−1
745
+ å
746
+ tp−1µ(t)α dt
747
+
748
+ ˆ +∞
749
+ 0
750
+ tp−1µ(t)α
751
+ Lj µ(t)
752
+ 0
753
+ f ∗(s) ds
754
+ å
755
+ 1
756
+ p−1
757
+ (−µ′(t)) dt + |Ω|α
758
+
759
+ p
760
+ p−1
761
+ Lj |Ω|
762
+ 0
763
+ f ∗(s) ds
764
+ å
765
+ p
766
+ p−1
767
+ ,
768
+ (36)
769
+ where in the last inequality we have used µ(t) ≤ |Ω| and (24) in Lemma 2.4. As far as v is
770
+ concerned, it holds
771
+ γn
772
+ ˆ +∞
773
+ 0
774
+ tp−1φ
775
+ 1
776
+ k (t) dt
777
+ =
778
+ ˆ +∞
779
+ 0
780
+ Lj φ(t)
781
+ 0
782
+ f ∗(s) ds
783
+ å
784
+ 1
785
+ p−1 Ç
786
+ −φ′(t) +
787
+ 1
788
+ β
789
+ 1
790
+ p−1
791
+ ˆ
792
+ ∂V ext
793
+ t
794
+ 1
795
+ u dHn−1
796
+ å
797
+ tp−1φ(t)α dt
798
+ =
799
+ ˆ +∞
800
+ 0
801
+ tp−1φ(t)α
802
+ Lj φ(t)
803
+ 0
804
+ f ∗(s) ds
805
+ å
806
+ 1
807
+ p−1
808
+ (−φ′(t)) dt + |Ω|α
809
+
810
+ p
811
+ p−1
812
+ Lj |Ω|
813
+ 0
814
+ f ∗(s) ds
815
+ å
816
+ p
817
+ p−1
818
+ .
819
+ (37)
820
+ We observe that the left-hand-side of (36) and the left-hand-side of (37) are equal from (35). So,
821
+ it follows
822
+ ˆ +∞
823
+ 0
824
+ tp−1φ(t)α
825
+ Lj φ(t)
826
+ 0
827
+ f ∗(s) ds
828
+ å
829
+ 1
830
+ p−1
831
+ (−φ′(t)) dt ≤
832
+ ˆ +∞
833
+ 0
834
+ tp−1µ(t)α
835
+ Lj µ(t)
836
+ 0
837
+ f ∗(s) ds
838
+ å
839
+ 1
840
+ p−1
841
+ (−µ′(t)) dt.
842
+ (38)
843
+ Setting F(l) =
844
+ ˆ l
845
+ 0
846
+ ωδ
847
+ �ˆ ω
848
+ 0
849
+ f ∗(s) ds
850
+
851
+ 1
852
+ p−1
853
+ dω, and integrating (38) by parts, we get
854
+ ˆ ∞
855
+ 0
856
+ tp−2F(φ(t)) dt ≤
857
+ ˆ ∞
858
+ 0
859
+ tp−2F(µ(t)) dt,
860
+ being µ(t) = φ(t) = 0 for t > vM. In [6] (see the proof of Theorem 1.1), it is proved that
861
+ ˆ ∞
862
+ 0
863
+ tp−2F(µ(t)) dt ≤
864
+ ˆ ∞
865
+ 0
866
+ tp−2F(φ(t)) dt.
867
+ (39)
868
+
869
+ 3
870
+ PROOF OF THEOREM ??
871
+ 10
872
+ and we recall here the proof for the reader’s convenience. In order to do that, we multiply (15)
873
+ by tp−1F(µ(t))µ(t)− (n−1)p
874
+ n(p−1) and we integrate between 0 and τ > vm. First, we observe that, by
875
+ the hypothesis k ≤
876
+ n(p − 1)
877
+ (n − 2)p + n, it follows that the function h(l) = F(l)l− (n−1)p
878
+ n(p−1) is non decreasing.
879
+ Hence, we obtain
880
+ ˆ τ
881
+ 0
882
+ γntp−1F(µ(t)) dt ≤
883
+ ˆ τ
884
+ 0
885
+
886
+ −µ′(t)
887
+
888
+ tp−1µ(t)− (n−1)p
889
+ n(p−1) F(µ(t))
890
+ Lj µ(t)
891
+ 0
892
+ f ∗(s) ds
893
+ å
894
+ 1
895
+ p−1
896
+ dt
897
+ + F(|Ω|)|Ω|− p(n−1)
898
+ n(p−1)
899
+
900
+ p
901
+ p−1
902
+ Lj |Ω|
903
+ 0
904
+ f ∗(s) ds
905
+ å
906
+ p
907
+ p−1
908
+ .
909
+ If we integrate by parts both sides of the last expression and we set
910
+ C = F(|Ω|)|Ω|− p(n−1)
911
+ n(p−1)
912
+
913
+ p
914
+ p−1
915
+ Lj |Ω|
916
+ 0
917
+ f ∗(s) ds
918
+ å
919
+ p
920
+ p−1
921
+ ,
922
+ we obtain
923
+ τ
924
+ ˆ τ
925
+ 0
926
+ γntp−2F(µ(t)) dt + τHµ(τ) ≤
927
+ ˆ τ
928
+ 0
929
+ ˆ t
930
+ 0
931
+ rp−2F(µ(r)) drdt +
932
+ ˆ τ
933
+ 0
934
+ Hµ(t) dt + C,
935
+ (40)
936
+ where
937
+ Hµ(τ) = −
938
+ ˆ +∞
939
+ τ
940
+ tp−2µ(t)− p(n−1)
941
+ n(p−1) F(µ(t))
942
+ ň µ(t)
943
+ 0
944
+ f ∗(s) ds
945
+ ã
946
+ 1
947
+ p−1
948
+ dµ(t).
949
+ Setting now
950
+ ξ(τ) =
951
+ ˆ τ
952
+ 0
953
+ ˆ t
954
+ 0
955
+ γnrp−2F(µ(r)) dr +
956
+ ˆ t
957
+ 0
958
+ Hµ(t) dt,
959
+ inequality (40) becomes
960
+ τξ′(τ) ≤ ξ(τ) + C.
961
+ So, Lemma 2.5, with τ0 = vm and q=2, gives
962
+ ˆ τ
963
+ 0
964
+ γntp−2F(µ(t)) dt + Hµ(τ) ≤
965
+ ܈ vm
966
+ 0
967
+ tp−2F(µ(t) dt + Hµ(vm) + C
968
+ vm
969
+ ê
970
+ .
971
+ Of course, the inequality holds as equality if we replace µ(t) with φ(t), so we get:
972
+ ˆ τ
973
+ 0
974
+ γntp−2F(µ(t)) dt + Hµ(τ) ≤
975
+ ˆ τ
976
+ 0
977
+ γnF(φ(t)) dt + Hφ(τ),
978
+ keeping in mind that µ(t) ≤ φ(t) = |Ω| for t ≤ vm. Now, letting τ → ∞, one has
979
+ ˆ ∞
980
+ 0
981
+ tp−2F(µ(t))dt ≤
982
+ ˆ ∞
983
+ 0
984
+ tp−2F(φ(t))dt,
985
+ since Hµ(τ), Hφ(τ) → 0.
986
+
987
+ 3
988
+ PROOF OF THEOREM ??
989
+ 11
990
+ So, we get equality in (36) and, consequently, in (15) for almost every t, indeed
991
+ γn
992
+ ˆ +∞
993
+ 0
994
+ tp−1µ
995
+ 1
996
+ k (t) dt
997
+
998
+ ˆ +∞
999
+ 0
1000
+ Lj µ(t)
1001
+ 0
1002
+ f ∗(s) ds
1003
+ å
1004
+ 1
1005
+ p−1 Ç
1006
+ −µ′(t) +
1007
+ 1
1008
+ β
1009
+ 1
1010
+ p−1
1011
+ ˆ
1012
+ ∂Uext
1013
+ t
1014
+ 1
1015
+ u dHn−1
1016
+ å
1017
+ tp−1µ(t)α dt
1018
+
1019
+ ˆ +∞
1020
+ 0
1021
+ tp−2F(µ(t)) dt + |Ω|α
1022
+
1023
+ p
1024
+ p−1
1025
+ Lj |Ω|
1026
+ 0
1027
+ f ∗(s) ds
1028
+ å
1029
+ p
1030
+ p−1
1031
+ =
1032
+ ˆ +∞
1033
+ 0
1034
+ tp−2F(φ(t)) dt + |Ω|α
1035
+
1036
+ p
1037
+ p−1
1038
+ Lj |Ω|
1039
+ 0
1040
+ f ∗(s) ds
1041
+ å
1042
+ p
1043
+ p−1
1044
+ =
1045
+ ˆ +∞
1046
+ 0
1047
+ Lj φ(t)
1048
+ 0
1049
+ f ∗(s) ds
1050
+ å
1051
+ 1
1052
+ p−1 Ç
1053
+ −φ′(t) +
1054
+ 1
1055
+ β
1056
+ 1
1057
+ p−1
1058
+ ˆ
1059
+ ∂V ext
1060
+ t
1061
+ 1
1062
+ v dHn−1
1063
+ å
1064
+ tp−1φ(t)α dt
1065
+ = γn
1066
+ ˆ +∞
1067
+ 0
1068
+ tp−1φ
1069
+ 1
1070
+ k (t) dt = γn
1071
+ ˆ +∞
1072
+ 0
1073
+ tp−1µ
1074
+ 1
1075
+ k (t) dt.
1076
+ In the following Lemma we prove that a solution to a Dirichlet problem, such that its distribu-
1077
+ tion function satisfies the differential equation (42), is necessarily defined on a ball and it has to
1078
+ be radial and decreasing.
1079
+ Lemma 3.2. Let Ω ⊂ Rn be an open, bounded and Lipschitz set. Let f ∈ Lp′(Ω) be a positive
1080
+ function, let w be a weak solution to
1081
+ ®
1082
+ −∆pw = f
1083
+ in Ω
1084
+ w = 0
1085
+ on ∂Ω,
1086
+ (41)
1087
+ and let σ be the distribution function of w. If σ satisfies the following condition
1088
+ γnσ(t)(1− 1
1089
+ n)
1090
+ p
1091
+ p−1 =
1092
+ Lj σ(t)
1093
+ 0
1094
+ f ∗(s) ds
1095
+ å
1096
+ 1
1097
+ p−1 �
1098
+ −σ′(t)
1099
+
1100
+ ,
1101
+ for a.e. t ∈ [0, wM]
1102
+ (42)
1103
+ then, there exists x0 such that
1104
+ Ω = Ω♯ + x0,
1105
+ w(· + x0) = w♯(·),
1106
+ f(· + x0) = f ♯(·).
1107
+ Proof. First of all, we recall that w is a weak solution to (41) if and only if
1108
+ ˆ
1109
+
1110
+ |∇w|p−2∇w∇ϕ dx =
1111
+ ˆ
1112
+
1113
+ fϕ dx,
1114
+ ∀ϕ ∈ W 1,p
1115
+ 0 (Ω).
1116
+ (43)
1117
+ Arguing as in the proof of (15) in Lemma 2.3, choosing the same test function ϕ, defined in (17),
1118
+ ϕ(x) =
1119
+
1120
+
1121
+
1122
+
1123
+
1124
+ 0
1125
+ if w < t
1126
+ w − t
1127
+ if t < w < t + h
1128
+ h
1129
+ if w > t + h,
1130
+
1131
+ 3
1132
+ PROOF OF THEOREM ??
1133
+ 12
1134
+ one obtains
1135
+ ˆ
1136
+ ∂Wt
1137
+ |∇w|p−1 dHn−1 =
1138
+ ˆ
1139
+ Wt
1140
+ f(x) dx ≤
1141
+ ˆ σ(t)
1142
+ 0
1143
+ f ⋆(s) ds,
1144
+ (44)
1145
+ where Wt = {x ∈ Ω : w(x) > t}.
1146
+ If we apply the isoperimetric inequality to the superlevel set Wt, the Hölder inequality and the
1147
+ Hardy-Littlewood inequality, we get, for almost every t,
1148
+
1149
+ 1
1150
+ nn σ(t)
1151
+ n−1
1152
+ n
1153
+ ≤ P(Wt) =
1154
+ ˆ
1155
+ ∂Wt
1156
+ dHn−1
1157
+ (45)
1158
+
1159
+ ň
1160
+ ∂Wt
1161
+ |∇w|p−1 dHn−1(x)
1162
+ ã 1
1163
+ p ň
1164
+ ∂Wt
1165
+ 1
1166
+ |∇w| dHn−1(x)
1167
+ ã1− 1
1168
+ p
1169
+ (46)
1170
+
1171
+ Lj σ(t)
1172
+ 0
1173
+ f ∗(s) ds
1174
+ å 1
1175
+ p �
1176
+ −σ′(t)
1177
+ �1− 1
1178
+ p .
1179
+ (47)
1180
+ So, hypothesis (42) ensures us that equality holds in the isoperimetric inequality (45), in the Hölder
1181
+ inequality (46) and in the Hardy-Littlewood inequality (47).
1182
+ We now divide the proof into three steps.
1183
+ Step 1. Let us prove that the superlevel set { w > t } is a ball for all t ∈ [0, wM). Equality in (45)
1184
+ implies that, for almost every t, Wt is a ball. On the other hand, for all t ∈ [0, wM), there exists a
1185
+ sequence { tk } such that
1186
+ 1. tk → t;
1187
+ 2. tk > tk+1;
1188
+ 3. {w > tk} is a ball for all k.
1189
+ Since { w > t } = ∪k { w > tk } can be written as an increasing union of balls, {w > t} is a ball for
1190
+ all t and, in particular, Ω = {w > 0} is a ball too and we obtain that Ω = x0 + Ω♯.
1191
+ From now on, we can assume without loss of generality that x0 = 0.
1192
+ Step 2. Let us prove that the superlevel sets are concentric balls.
1193
+ Equality in (46) implies also equality in Hölder inequality, i.e.
1194
+ ˆ
1195
+ ∂Wt
1196
+ dHn−1 =
1197
+ ň
1198
+ ∂Wt
1199
+ |∇w|p−1 dHn−1(x)
1200
+ ã 1
1201
+ p ň
1202
+ ∂Wt
1203
+ 1
1204
+ |∇w| dHn−1(x)
1205
+ ã1− 1
1206
+ p
1207
+ .
1208
+ This means that, for almost every t, |∇w| is constant Hn−1−almost everywhere on ∂Wt , and we
1209
+ denote by Ct the (Hn−1−a.e.) constant value of |∇w| on ∂Wt. We claim that Ct ̸= 0 for almost
1210
+ every t. Indeed, (44) and the positivity of f ensure us that
1211
+ P(Wt)Cp−1
1212
+ t
1213
+ =
1214
+ ˆ
1215
+ ∂Wt
1216
+ |∇w|p−1 dHn−1 =
1217
+ ˆ
1218
+ Wt
1219
+ f(x) dx > 0.
1220
+ Integrating (42), we obtain w♯(x) = z(x), for all x ∈ Ω♯, where z is the solution to
1221
+ ®
1222
+ −∆pz = f ♯
1223
+ in Ω♯
1224
+ z = 0
1225
+ on ∂Ω♯,
1226
+ (48)
1227
+
1228
+ 3
1229
+ PROOF OF THEOREM ??
1230
+ 13
1231
+ and it has the following explicit form:
1232
+ z(x) =
1233
+ ˆ |Ω|
1234
+ ωn|x|n
1235
+ 1
1236
+ γn
1237
+ ň s
1238
+ 0
1239
+ f ⋆(r) dr
1240
+ ã1/(p−1)
1241
+ 1
1242
+ s(1−1/n)(p/(p−1)) ds,
1243
+ so it easily follows that
1244
+ ���
1245
+
1246
+ |∇w♯| = 0
1247
+ ©
1248
+
1249
+
1250
+ 0 < w♯ < wM
1251
+ ©��� = 0.
1252
+ (49)
1253
+ Using (ii) in Lemma 2.7, we have that (49) implies the absolutely continuity of σ.
1254
+ Now, we denote by C♯
1255
+ t the (Hn−1−a.e.) constant value of
1256
+ ��∇w♯�� on ∂W ♯
1257
+ t . We recall that it
1258
+ holds
1259
+ −σ′(t) =
1260
+ ˆ
1261
+ ∂W ♯
1262
+ t
1263
+ 1
1264
+ |∇w♯| = P(∂W ♯
1265
+ t )
1266
+ C♯
1267
+ t
1268
+ .
1269
+ and, by the absolutely continuity of σ, we have
1270
+ −σ′(t) =
1271
+ ˆ
1272
+ ∂Wt
1273
+ 1
1274
+ |∇w| = P(∂Wt)
1275
+ Ct
1276
+ .
1277
+ Since w and w♯ are equi-distributed, we have,
1278
+ P(∂Wt)
1279
+ Ct
1280
+ = P(∂W ♯
1281
+ t )
1282
+ C♯
1283
+ t
1284
+ Moreover, since P(∂Wt) = P(∂W ♯
1285
+ t ), we have that Ct = C♯
1286
+ t. So, by the coarea formula, we get
1287
+ ˆ
1288
+
1289
+ |∇w|p dx =
1290
+ ˆ +∞
1291
+ 0
1292
+ ˆ
1293
+ ∂Wt
1294
+ |∇w|p−1 dHn−1 =
1295
+ ˆ +∞
1296
+ 0
1297
+ Cp−1
1298
+ t
1299
+ P(Wt) dt dHn−1
1300
+ =
1301
+ ˆ +∞
1302
+ 0
1303
+ Ä
1304
+ C♯
1305
+ t
1306
+ äp−1 P(Wt) dt dHn−1 =
1307
+ ˆ +∞
1308
+ 0
1309
+ ˆ
1310
+ ∂W ♯
1311
+ t
1312
+ |∇w♯|p−1 dHn−1 =
1313
+ ˆ
1314
+ Ω♯|∇w♯|p dx.
1315
+ By (iii) in Lemma 2.7, we conclude that u = u♯.
1316
+ Step 3. Let us prove that f is radial and decreasing.
1317
+ Equality in (47) reads, for almost every t,
1318
+ ˆ
1319
+ Wt
1320
+ f(x) dx =
1321
+ ˆ σ(t)
1322
+ 0
1323
+ f ∗(s) ds.
1324
+ Moreover, for all τ ∈ [0, wM), there exists a sequence { τk } such that
1325
+ 1. τk → τ;
1326
+ 2. τk > τk+1;
1327
+ 3.
1328
+ ˆ
1329
+ Wτk
1330
+ f(x) dx =
1331
+ ˆ σ(τk)
1332
+ 0
1333
+ f ∗(s) ds,
1334
+
1335
+ 3
1336
+ PROOF OF THEOREM ??
1337
+ 14
1338
+ and, by the continuity of σ(·), we have
1339
+ ˆ σ(τ)
1340
+ 0
1341
+ f ∗(s) ds = lim
1342
+ k
1343
+ ˆ σ(τk)
1344
+ 0
1345
+ f ∗(s) = lim
1346
+ k
1347
+ ˆ
1348
+ Wτk
1349
+ f(x) dx =
1350
+ ˆ
1351
+
1352
+ f(x) dx.
1353
+ By Lemma 2.6, we have that for all τ, there exists ατ such that
1354
+ {w > τ} = {f > ατ}.
1355
+ Consequently, we have that also f is radial and decreasing, so f = f ♯.
1356
+ As a direct consequence of Lemma 3.2, we obtain the rigidity for the p−Laplace operator with
1357
+ Dirichlet boundary conditions.
1358
+ Corollary 3.3. Let Ω ⊂ Rn be an open, bounded and Lipschitz set. Let f ∈ Lp′(Ω) be a positive
1359
+ function and let w and z be weak solutions respectively to
1360
+ ®
1361
+ −∆pw = f
1362
+ in Ω
1363
+ w = 0
1364
+ on ∂Ω,
1365
+ ®
1366
+ −∆pz = f ♯
1367
+ in Ω♯
1368
+ z = 0
1369
+ on ∂Ω♯.
1370
+ (50)
1371
+ If w♯(x) = z(x), for all x ∈ Ω♯, then there exists x0 ∈ Rn such that
1372
+ Ω = Ω♯ + x0,
1373
+ w(· + x0) = z(·),
1374
+ f(· + x0) = f ♯(·).
1375
+ Proof. From the proof of Lemma 3.2, it follows that the distribution function of w, denoted by σ,
1376
+ satisfies
1377
+
1378
+ 1
1379
+ nn σ(t)
1380
+ n−1
1381
+ n
1382
+
1383
+ Lj σ(t)
1384
+ 0
1385
+ f ∗(s) ds
1386
+ å 1
1387
+ p �−σ′(t)�1− 1
1388
+ p .
1389
+ (51)
1390
+ Now, we integrate (51) from 0 to t, obtaining
1391
+ u∗(t) =
1392
+ ˆ |Ω|
1393
+ σ(t)
1394
+ 1
1395
+ γn
1396
+ ň s
1397
+ 0
1398
+ f ⋆(r) dr
1399
+ ã1/(p−1)
1400
+ 1
1401
+ s(1−1/n)(p/(p−1)) ds = z∗(t).
1402
+ So, if w♯ = z, we have w∗ = z∗, and consequently we obtain equality in (51) for almost every
1403
+ t ∈ [0, wM]. We can conclude by applying Lemma 3.2.
1404
+ Now, using Lemma 3.2, we are in position to conclude the proof of the main Theorem.
1405
+ Proposition 3.4. Let Ω ⊂ Rn be an open, bounded and Lipschitz set and let Ω♯ be the ball with the
1406
+ same measure as Ω. Let u be the solution to (4) and let µ be its distribution function. If equality
1407
+ holds in (15), then there exists x0 ∈ Rn such that
1408
+ Ω = Ω♯ + x0,
1409
+ u(· + x0) = v(·),
1410
+ f(· + x0) = f ♯(·).
1411
+
1412
+ 3
1413
+ PROOF OF THEOREM ??
1414
+ 15
1415
+ Proof. Firstly, we claim that the superlevel sets { u > t } are balls for every t ∈ [0, uM). Equality
1416
+ in (15) implies the equality in (20), i.e.
1417
+
1418
+ 1
1419
+ nn µ(t)
1420
+ n−1
1421
+ n
1422
+ = P(Ut),
1423
+ for a. e. t ∈ [0, uM]
1424
+ that means that almost every superlevel set is a ball. Arguing as in Step 1 of Lemma 3.2, we
1425
+ can conclude that every superlevel set is a ball, so, Ω = {u > um} is a ball and we obtain that
1426
+ Ω = x0 + Ω♯.
1427
+ Let us observe that for every t, s ∈ [um, uM] with t < s, as both Ut and Us are balls, we have
1428
+ that ∂Ut ∩ ∂Us contains at most one point. In particular, the function w = u − um is a weak
1429
+ solution to the Dirichlet problem (41) in Ω.
1430
+ We claim that σ(t) = |{ w > t }| satisfies (42).
1431
+ Since { w > t } = { u > t + um }, we have
1432
+ σ(t) = µ(t + um) for all t ∈ [0, uM − um]. Moreover, we have
1433
+ ˆ
1434
+ ∂Ut
1435
+ 1
1436
+ u dHn−1 = 0,
1437
+ ∀t > um
1438
+ So, using the fact that we have equality in (15) by hypothesis, we get
1439
+ γnσ(t)(1− 1
1440
+ n)
1441
+ p
1442
+ p−1 = γnµ(t + um)(1− 1
1443
+ n)
1444
+ p
1445
+ p−1
1446
+ =
1447
+ Lj µ(t+um)
1448
+ 0
1449
+ f ∗(s) ds
1450
+ å
1451
+ 1
1452
+ p−1 Ç
1453
+ −µ′(t + um) +
1454
+ 1
1455
+ β
1456
+ 1
1457
+ p−1
1458
+ ˆ
1459
+ ∂Uext
1460
+ t+um
1461
+ 1
1462
+ u dHn−1(x)
1463
+ å
1464
+ =
1465
+ Lj σ(t)
1466
+ 0
1467
+ f ∗(s) ds
1468
+ å
1469
+ 1
1470
+ p−1 �−σ′(t)� ,
1471
+ for all t ∈ (0, uM − um). So, we can conclude by Lemma 3.2.
1472
+ We conclude now with the proof of the main Theorem.
1473
+ Proof of Theorem 1.1. From Proposition 3.1, we have that the hypothesis of Theorem 1.1
1474
+ ∥u∥Lpk,p(Ω) = ∥v∥Lpk,p(Ω♯),
1475
+ for some k ∈
1476
+ ò
1477
+ 0,
1478
+ n(p − 1)
1479
+ (n − 2)p + n
1480
+ ò
1481
+ implies the following equality for almost every t ∈ (0, uM)
1482
+ γnµ(t)(1− 1
1483
+ n)
1484
+ p
1485
+ p−1 =
1486
+ Lj µ(t)
1487
+ 0
1488
+ f ∗(s) ds
1489
+ å
1490
+ 1
1491
+ p−1 Ç
1492
+ −µ′(t) +
1493
+ 1
1494
+ β
1495
+ 1
1496
+ p−1
1497
+ ˆ
1498
+ ∂Uext
1499
+ t
1500
+ 1
1501
+ u dHn−1(x)
1502
+ å
1503
+ ,
1504
+ where µ(t) is the distribution function of u.
1505
+ Now, we are in position to apply Proposition 3.4, and, so, there exists x0 ∈ Rn such that
1506
+ Ω = Ω♯ + x0,
1507
+ u(· + x0) = v(·),
1508
+ f(· + x0) = f ♯(·).
1509
+
1510
+ 4
1511
+ REMARKS AND OPEN PROBLEMS
1512
+ 16
1513
+ 4
1514
+ Remarks and open problems
1515
+ Remark 4.1. In [6] the authors also prove that in the case f ≡ 1, it holds
1516
+ ∥u∥Lpk,p(Ω) ≤ ∥v∥Lpk,p(Ω♯),
1517
+ if 0 < k ≤
1518
+ n(p − 1)
1519
+ n(p − 1) − p.
1520
+ (52)
1521
+ We stress that the proof of Theorem 1.1 can be adapted to case f ≡ 1, regardless of the fact that
1522
+ now the admissible k varies in a wider range.
1523
+ Open problem 4.2. Below we present a list of open problems and work in progress.
1524
+ • Generalize the rigidity results in the anisotropic setting, starting from the comparison proved
1525
+ in [24].
1526
+ • Generalize the rigidity results to other problems, such as the ones investigated in [1], [13].
1527
+ Acknowledgements
1528
+ The authors Alba Lia Masiello and Gloria Paoli are supported by GNAMPA of INdAM. The
1529
+ author Gloria Paoli is supported by the Alexander von Humboldt Foundation with an Alexander
1530
+ von Humboldt research fellowship.
1531
+ References
1532
+ [1] A. Alvino, F. Chiacchio, C. Nitsch, and C. Trombetti. Sharp estimates for solutions to elliptic
1533
+ problems with mixed boundary conditions. J. Math. Pures Appl., 152:251—261, 2021.
1534
+ [2] A. Alvino, V. Ferone, G. Trombetti, and P.-L. Lions. Convex symmetrization and applications.
1535
+ Ann. Inst. H. Poincaré C Anal. Non Linéaire, 14(2):275–293, 1997.
1536
+ [3] A. Alvino, P.-L. Lions, and G. Trombetti. A remark on comparison results via symmetrization.
1537
+ Proc. Roy. Soc. Edinburgh Sect. A, 102(1-2):37–48, 1986.
1538
+ [4] A. Alvino, P.-L. Lions, and G. Trombetti.
1539
+ Comparison results for elliptic and parabolic
1540
+ equations via Schwarz symmetrization. Ann. Inst. H. Poincaré Anal. Non Linéaire, 7(2):37–
1541
+ 65, 1990.
1542
+ [5] A. Alvino, C. Nitsch, and C. Trombetti. A Talenti comparison result for solutions to elliptic
1543
+ problems with Robin boundary conditions. to appear on Comm. Pure Appl. Math.
1544
+ [6] V. Amato, A. Gentile, and A. L. Masiello.
1545
+ Comparison results for solutions to p-Laplace
1546
+ equations with Robin boundary conditions.
1547
+ Ann. Mat. Pura Appl. (4), 201(3):1189–1212,
1548
+ 2022.
1549
+ [7] L. Ambrosio, N. Fusco, and D. Pallara. Functions of bounded variation and free discontinuity
1550
+ problems. Oxford Mathematical Monographs. The Clarendon Press, Oxford University Press,
1551
+ New York, 2000.
1552
+
1553
+ REFERENCES
1554
+ 17
1555
+ [8] G. Aronsson and G. Talenti. Estimating the integral of a function in terms of a distribution
1556
+ function of its gradient. Boll. Un. Mat. Ital. B (5), 18(3):885–894, 1981.
1557
+ [9] M. S. Ashbaugh and R. D. Benguria. On Rayleigh’s conjecture for the clamped plate and
1558
+ its generalization to three dimensions.
1559
+ In Differential equations and mathematical physics
1560
+ (Birmingham, AL, 1994), pages 17–27. Int. Press, Boston, MA, 1995.
1561
+ [10] J. E. Brothers and W. P. Ziemer. Minimal rearrangements of Sobolev functions. J. Reine
1562
+ Angew. Math., 384:153–179, 1988.
1563
+ [11] Y. D. Burago and V. A. Zalgaller.
1564
+ Geometric inequalities, volume 285 of Grundlehren
1565
+ der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences].
1566
+ Springer-Verlag, Berlin, 1988. Translated from the Russian by A. B. Sosinski˘ı, Springer Series
1567
+ in Soviet Mathematics.
1568
+ [12] I. Chavel. Isoperimetric inequalities, volume 145 of Cambridge Tracts in Mathematics. Cam-
1569
+ bridge University Press, Cambridge, 2001. Differential geometric and analytic perspectives.
1570
+ [13] F. Chiacchio, N. Gavitone, C. Nitsch, and C. Trombetti. Sharp estimates for the gaussian
1571
+ torsional rigidity with Robin boundary conditions. Potential Analysis, pages 1–10, 2022.
1572
+ [14] A. Cianchi and N. Fusco. Steiner symmetric extremals in Pólya-Szegö type inequalities. Adv.
1573
+ Math., 203(2):673–728, 2006.
1574
+ [15] E. De Giorgi. Sulla proprietà isoperimetrica dell’ipersfera, nella classe degli insiemi aventi
1575
+ frontiera orientata di misura finita. Atti Accad. Naz. Lincei Mem. Cl. Sci. Fis. Mat. Natur.
1576
+ Sez. Ia (8), 5:33–44, 1958.
1577
+ [16] A. Ferone and R. Volpicelli. Minimal rearrangements of Sobolev functions: a new proof. Ann.
1578
+ Inst. H. Poincaré C Anal. Non Linéaire, 20(2):333–339, 2003.
1579
+ [17] V. Ferone and M. R. Posteraro. A remark on a comparison theorem. Comm. Partial Differ-
1580
+ ential Equations, 16(8-9):1255–1262, 1991.
1581
+ [18] S. Kesavan. On a comparison theorem via symmetrisation. Proc. Roy. Soc. Edinburgh Sect.
1582
+ A, 119(1-2):159–167, 1991.
1583
+ [19] S. Kesavan. Symmetrization & applications, volume 3 of Series in Analysis. World Scientific
1584
+ Publishing Co. Pte. Ltd., Hackensack, NJ, 2006.
1585
+ [20] P. Lindqvist. On the definition and properties of p-superharmonic functions. J. Reine Angew.
1586
+ Math., 365:67–79, 1986.
1587
+ [21] A. L. Masiello and G. Paoli. A rigidity result for the robin torsion problem. arXiv preprint
1588
+ arXiv:2209.06706, 2022.
1589
+ [22] R. Osserman. The isoperimetric inequality. Bull. Amer. Math. Soc., 84(6):1182–1238, 1978.
1590
+ [23] G. Pólya and G. Szegö. Isoperimetric Inequalities in Mathematical Physics. Annals of Math-
1591
+ ematics Studies, No. 27. Princeton University Press, Princeton, N. J., 1951.
1592
+
1593
+ REFERENCES
1594
+ 18
1595
+ [24] R. Sannipoli. Comparison results for solutions to the anisotropic Laplacian with Robin bound-
1596
+ ary conditions. Nonlinear Anal., 214:Paper No. 112615, 21, 2022.
1597
+ [25] G. Talenti. Elliptic equations and rearrangements. Ann. Scuola Norm. Sup. Pisa Cl. Sci. (4),
1598
+ 3(4):697–718, 1976.
1599
+ [26] G. Talenti. Nonlinear elliptic equations, rearrangements of functions and Orlicz spaces. Ann.
1600
+ Mat. Pura Appl. (4), 120:160–184, 1979.
1601
+ [27] G. Talenti. The standard isoperimetric theorem. In Handbook of convex geometry, Vol. A, B,
1602
+ pages 73–123. North-Holland, Amsterdam, 1993.
1603
+ [28] G. Talenti. Inequalities in rearrangement invariant function spaces. In Nonlinear analysis,
1604
+ function spaces and applications, Vol. 5 (Prague, 1994), pages 177–230. Prometheus, Prague,
1605
+ 1994.
1606
+ [29] J. L. Vázquez. A strong maximum principle for some quasilinear elliptic equations. Appl.
1607
+ Math. Optim., 12(3):191–202, 1984.
1608
+
09E2T4oBgHgl3EQfigc1/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
09FIT4oBgHgl3EQf3Sv5/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:244cc71f04ca1c952747a7388549b4b429c8d9de5d2a39dd2870029a23f5e992
3
+ size 8650797
09FIT4oBgHgl3EQf3Sv5/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ae12c41f4f3627708a618031df39bfc5c07407425a79b837978951c8ac279f3c
3
+ size 256319
0tAzT4oBgHgl3EQfevwc/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b956ea4daebf1a727bffa03e30eab44b4dfb9249b49130cbf58f078ba94376cf
3
+ size 2031661
1dFRT4oBgHgl3EQfmDfL/content/2301.13600v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d2e471768c1f8a08e7895936a3423a268e8b5355984a4780d80ddea4acfa6c24
3
+ size 370918
1dFRT4oBgHgl3EQfmDfL/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b6f555d25857915caadce401427693b8f8e39c7673f9421569e5a6574fbfb034
3
+ size 170353
1tE2T4oBgHgl3EQfNQaE/content/2301.03735v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:07f7203babc2680fee2197573d614332e5f558524e42e3bedc94d91349bb7efa
3
+ size 222528
1tE2T4oBgHgl3EQfNQaE/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:91cc6679b464376e81034a94be28ad8938ae7936389ab6a723a9d3070a912049
3
+ size 2228269
1tE2T4oBgHgl3EQfNQaE/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fbbbf15963a5048ef6c37a2079dd3bea98eed79461d939c584f5ca3160cd9506
3
+ size 90216
2NAzT4oBgHgl3EQfRvtg/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fd17659403de83436f1d1acfa8d1782322a7d6b631b8b888d076c30d813c0b40
3
+ size 6553645
2dAyT4oBgHgl3EQf1fnx/content/tmp_files/2301.00738v1.pdf.txt ADDED
@@ -0,0 +1,942 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Training Differentially Private Graph Neural
2
+ Networks with Random Walk Sampling
3
+ Morgane Ayle
4
+ Technical University of Munich
5
+ morgane.ayle@tum.de
6
+ Jan Schurchardt
7
+ Technical University of Munich
8
+ j.schuchardt@tum.de
9
+ Lukas Gosch
10
+ Technical University of Munich
11
+ l.gosch@tum.de
12
+ Daniel Zügner
13
+ Technical University of Munich
14
+ zuegnerd@in.tum.de
15
+ Stephan Günnemann
16
+ Technical University of Munich
17
+ s.guennemann@tum.de
18
+ Abstract
19
+ Deep learning models are known to put the privacy of their training data at risk,
20
+ which poses challenges for their safe and ethical release to the public. Differentially
21
+ private stochastic gradient descent is the de facto standard for training neural
22
+ networks without leaking sensitive information about the training data. However,
23
+ applying it to models for graph-structured data poses a novel challenge: unlike
24
+ with i.i.d. data, sensitive information about a node in a graph cannot only leak
25
+ through its gradients, but also through the gradients of all nodes within a larger
26
+ neighborhood. In practice, this limits privacy-preserving deep learning on graphs
27
+ to very shallow graph neural networks. We propose to solve this issue by training
28
+ graph neural networks on disjoint subgraphs of a given training graph. We develop
29
+ three random-walk-based methods for generating such disjoint subgraphs and
30
+ perform a careful analysis of the data-generating distributions to provide strong
31
+ privacy guarantees. Through extensive experiments, we show that our method
32
+ greatly outperforms the state-of-the-art baseline on three large graphs, and matches
33
+ or outperforms it on four smaller ones.
34
+ 1
35
+ Introduction
36
+ The introduction of Graph Neural Networks (GNNs) has enabled the training of Deep Learning (DL)
37
+ models on graph-structured data and for various tasks such as node classification, link prediction or
38
+ graph classification. However, similar to DL models trained on image [1] or text data [2, 3], GNNs
39
+ leak information about their training data [4–6], such as the features of a node, or which nodes are
40
+ connected by an edge.
41
+ In this paper, we analyze the privacy of GNNs under the lens of Differential Privacy (DP)
42
+ [7]. In particular, we ensure the privacy of all nodes’ features in a graph. While DP-SGD [8] is the de
43
+ facto standard for training DL models with DP, its transfer to GNNs is not straightforward given the
44
+ non-i.i.d. nature of the data. Indeed, since an L-layer GNN typically uses the L-hop neighborhood
45
+ of a node during the forward pass, the gradient of a node does not depend on that node alone, but
46
+ on all nodes in its neighborhood. While some works [9, 10] have attempted to apply DP to GNNs,
47
+ most of them focus on edge-level DP. Methods that can be applied to feature-level DP suffer from
48
+ 2022 Trustworthy and Socially Responsible Machine Learning (TSRML 2022) co-located with NeurIPS 2022.
49
+ arXiv:2301.00738v1 [cs.LG] 2 Jan 2023
50
+
51
+ loose privacy guarantees [9], or rely on custom GNN architectures [10]. We propose an adaptation
52
+ of DP-SGD to train GNNs with feature-level DP while attenuating the aforementioned problem
53
+ and preserving a high model utility. We experimentally demonstrate that our method can offer
54
+ significantly stronger privacy guarantees than prior work, particularly on large graphs.
55
+ 2
56
+ Background
57
+ 2.1
58
+ Differential privacy
59
+ (ϵ, δ)-DP
60
+ Differential Privacy (DP) [7] is a notion of privacy that allows data analysts to extract
61
+ useful statistics from a dataset, without leaking too much information about the samples in it. More
62
+ formally, given two neighboring datasets D and D′ – denoted D ∼ D′ – that differ by one sample
63
+ (either by deleting, adding or modifying a sample), a randomized algorithm M with co-domain Y
64
+ is (ϵ, δ)-DP if for all O ⊆ Y , and for all D ∼ D′, Pr[M(D) ∈ O] ≤ exp(ϵ)Pr[M(D′) ∈ O] + δ.
65
+ The parameters ϵ and δ are the privacy budget parameters: the smaller their values, the better the
66
+ privacy guarantees.
67
+ (α, γ)-RDP
68
+ An alternative definition of DP is Rényi Differential Privacy (RDP) [11]. A randomized
69
+ algorithm M is said to be γ-RDP of order α – or (α, γ)-RDP – if for any D ∼ D′ it holds that
70
+ Dα(M(D), M(D′)) ≤ γ, where Dα =
71
+ 1
72
+ α−1 log Ex∼Q
73
+
74
+ P (x)
75
+ Q(x)
76
+ �α
77
+ is the Rényi divergence of order α
78
+ which measures the similarity of the distributions P and Q. Note that if M is (α, γ)-RDP, then it
79
+ is also (ϵ, δ)-DP for any 0 < δ < 1 where ϵ = fRDP→DP(α, γ, δ) = γ + log( α−1
80
+ α ) − log δ+log α
81
+ α−1
82
+ [12].
83
+ We rely on (α, γ)-RDP during our analysis, but report our results in terms of (ϵ, δ)-DP following
84
+ prior work.
85
+ The Gaussian mechanism
86
+ Given an algorithm A with real-valued output space A : ND → Rd,
87
+ the Gaussian mechanism privatizes the algorithm by adding Gaussian noise to the outputs of A,
88
+ i.e. M = Gσ (A (D)) = A(D) + N(0, σ2). Given that the ℓ2 sensitivity of A is ∆2A(D) =
89
+ maxD∼D′ ∥A(D) − A(D′)∥2, the mechanism satisfies (α, γ(α))-RDP, with γ(α) = α(∆2A)2
90
+ 2σ2
91
+ .
92
+ Intuitively, this indicates that the larger the sensitivity of the function, the more noise needs to be
93
+ added to obtain a small privacy budget, and therefore the worse the final performance will be. A
94
+ small sensitivity is therefore desirable.
95
+ Amplification by sub-sampling
96
+ A useful property of DP (and RDP) is that, given a mechanism S
97
+ that samples a sub-set of the dataset D, applying a private mechanism to S(D) leads to better privacy
98
+ guarantees than applying it to the entire dataset D. Intuitively, this is due to the fact that subsampling
99
+ introduces a non-zero chance of an added or modified sample to not be processed by the randomized
100
+ algorithm. Typically, S is assumed to be a Poisson or uniform sampling over the dataset. Poisson
101
+ sampling is typically used when the neighboring datasets differ in size, while uniform sampling is
102
+ used otherwise. In this paper, we rely on uniform sampling.
103
+ 2.2
104
+ Differential privacy in deep learning
105
+ Differentially Private Stochastic Gradient Descent (DP-SGD) [13, 14, 8] is the foundation of many
106
+ works [9, 2, 15] that apply DP to deep learning. It privatizes the weights of a model with respect to
107
+ the input dataset at every iteration of training, and then accumulates the privacy budget being spent
108
+ over all iterations. One private training iteration consists of batching a set of samples, computing the
109
+ gradient on each sample independently, clipping the norm of each gradient vector to a maximum norm
110
+ C, calculating the entire gradient by adding calibrated Gaussian noise, and finally performing an
111
+ update step. The clipping step is used to bound the sensitivity of the gradients to changes in the input.
112
+ Then, assuming that two neighboring datasets D and D′ differ in the features of one sample, the
113
+ sensitivity of the total gradient on a batch of i.i.d. samples is bounded by 2C. Through batching (i.e.
114
+ sub-sampling the dataset using a sampling mechanism S), amplification by sub-sampling theorems
115
+ [16, 17] can be exploited to get better privacy guarantees at every iteration. Finally, assuming each
116
+ iteration t is (α, γt)-RDP, the overall training is then (α, �T
117
+ t=0 γt)-RDP [11] where T is the total
118
+ number of iterations.
119
+ 2
120
+
121
+ 2.3
122
+ Graph neural networks
123
+ Definition
124
+ In the following, we define a graph as G = {X, A}, where X ∈ RN×d is the feature
125
+ matrix in which each row corresponds to one node’s feature vector, and A ∈ {0, 1}N×N is the
126
+ adjacency matrix in which Aij is 1 if there exists an edge between nodes i and j and 0 otherwise.
127
+ Note that we only consider undirected graphs, therefore A = AT . Graph Neural Networks (GNNs)
128
+ are a class of models that learn a mapping f : G → Z ∈ RN×d′, where Z is an updated feature
129
+ matrix of G that can be used for various downstream tasks. Each layer of a GNN typically consists of
130
+ two steps: 1) in the aggregation step, information about the neighborhood of every node is gathered;
131
+ 2) in the update step, the feature vector of every node is updated based on its current feature vector
132
+ and the aggregated neighborhood information.
133
+ The receptive field
134
+ The receptive field of a node in a GNN is defined as the region in the input
135
+ graph that influences the GNN’s predictions for that specific node. For a GNN with L layers, the
136
+ receptive field of a node v is the L-hop neighborhood of v. Thus, for a graph with maximum node
137
+ degree K, the largest possible receptive field size of any node v is RF(v) = �L
138
+ l=0 Kl = KL+1−1
139
+ K−1
140
+ ,
141
+ i.e. the receptive field grows exponentially with the number of layers of the GNN.
142
+ 2.4
143
+ Differential privacy in graph neural networks
144
+ Given that graphs contain two types of attributes – node features and edges – multiple levels of DP
145
+ [18, 9, 10] can be considered: edge-level DP, where the edges between nodes are private; feature-level
146
+ DP, where the features of nodes are private; and node-level DP, where both the features and edges of
147
+ nodes are private. In this work, we focus on feature-level DP using DP-SGD. Contrary to traditional
148
+ i.i.d. datasets, samples in a graph (i.e. nodes) are not independent: changing the features of one
149
+ node affects the gradients of all nodes within the receptive field of the modified node. In fact, the
150
+ sensitivity of the total gradient on a graph is bounded by 2 KL+1−1
151
+ K−1
152
+ C (see Appendix A), which
153
+ grows exponentially with the number of layers L. Given that the Gaussian mechanism adds noise
154
+ proportional to the sensitivity of the total gradient, this can lead to large amounts of noise being
155
+ added during training, which in turn leads to poor final model utility.
156
+ 3
157
+ Related work
158
+ In [19], a node-level differentially private GNN is trained by perturbing features and edges locally
159
+ before sending them to a global server. This setup is called local DP, and differs from our notion of
160
+ DP where a central learner is trusted with the real data. The authors in [15] propose to split the graph
161
+ into disjoint sub-graphs using uniform node sampling, then treat each sub-graph as an independent
162
+ sample. Note that, contrary to our method which considers privacy at the individual node feature
163
+ level, their approach treats the entire graph as a datapoint to privatize, rather than providing privacy
164
+ for the individual nodes in the graph. The method in [10] privatizes GNNs at both the node-level
165
+ and edge-level. However, their approach only applies to the GNN architecture they propose and
166
+ not to arbitrary GNNs, unlike our proposed method. Furthermore, it does not resolve the issue of
167
+ exponentially growing sensitivity in transductive learning scenarios. For a survey on DP on graph
168
+ data, refer to [20]. Finally, the authors of [9] propose to reduce the sensitivity of a GNN’s gradients
169
+ by bounding the maximum degree K of the graph. However, this does not resolve the exponential
170
+ growth with the number of layers. Therefore, they still obtain loose privacy guarantees (ϵ = 20).
171
+ Since this method is the closest to our setup, we compare our approach to theirs in our experiments.
172
+ 4
173
+ Methodology
174
+ 4.1
175
+ Approach
176
+ We propose to adapt DP-SGD to the graph domain to ensure that the weights of a GNN are private
177
+ with respect to the nodes’ features, while overcoming the problem of requiring exponentially more
178
+ noise with a growing network depth. In the following, we define two graphs G and G′ as neighbors if
179
+ they share the same structure A and number of nodes N but differ in one row of the feature matrix
180
+ X corresponding to the modified node ˜v. We want to train the GNN such that for all G ∼ G′,
181
+ 3
182
+
183
+ Figure 1: Our general sampling method. Starting with a graph, we generate subgraphs by first
184
+ sampling a root node (depicted in red), and then sampling one or more random walks starting from
185
+ the root node. Every node appears in exactly one subgraph. Before every iteration, we batch m many
186
+ subgraphs, where m = 2 in this case. Root nodes are used as training nodes, while remaining nodes
187
+ are used for aggregation in the GNN only.
188
+ Dα(M(G), M(G′)) ≤ γ, where M is a randomized algorithm that returns the weights of the GNN.
189
+ To adapt DP-SGD to the graph domain, we propose to pre-process the graph into sets of
190
+ independent subgraphs that do not affect each others’ gradients, so that the sensitivity of the total
191
+ gradient on any batch depends on the gradient of one subgraph only. We summarize our training
192
+ procedure in Algorithm 1. More precisely, we pre-process the graph into a set of M disjoint
193
+ subgraphs GS = {s1, s2, . . . , sM}, i.e. subgraphs that do not have any nodes in common, using
194
+ sampling method S. Each subgraph si consists of two components: 1) one training node vi, and
195
+ 2) a set of neighbors N (vi) that is used for the aggregation step of the GNN. At training time, for
196
+ every iteration t, we create a batch by sampling m subgraphs uniformly at random from the set of
197
+ subgraphs GS. We then compute the gradients ∇wtL(vj, N (vj)) on all training nodes and clip
198
+ the norm of each to a value C. We compute the total gradient by summing individual gradients and
199
+ adding Gaussian noise. Finally, we update the weights.
200
+ Due to the disjointness of subgraphs, changing one node’s features – whether it is a train-
201
+ ing node or a neighbor – will affect at most one subgraph (i.e. sample) in the batch, which reduces
202
+ the upper bound on the sensitivity of the total gradient to 2C. Since we sample subgraphs uniformly
203
+ at random, we can leverage the strong amplification by sub-sampling theorem [17], i.e. account for
204
+ the possibility of the gradient not being affected if the modified node ˜v is not part of the batch.
205
+ We generate these disjoint subgraphs via random walk sampling, which is an effective way
206
+ of training GNNs [21]. We choose random walk sampling, since it ensures that nodes form a
207
+ connected subgraph of a training node’s neighborhood, while limiting the number of nodes being
208
+ sampled from that neighborhood (i.e. from the receptive field). In the following, we propose three
209
+ different random-walk-based sampling methods, which we later compare in our experimental results.
210
+ Furthermore, we derive for each sampling method a tight upper bound on the probability of sampling
211
+ the modified node ˜v in a batch, which is required for applying the amplification by subsampling
212
+ theorem in [17].
213
+ 4.2
214
+ Sampling methods
215
+ Our three sampling methods consist of pre-processing the graph into a set of M disjoint subgraphs
216
+ GS = {s1, s2, . . . , sM}, and then generating a batch B ⊆ GS by sampling m subgraphs uniformly
217
+ at random. An overview of our general approach is depicted in Figure 1. Given a graph with M
218
+ generated disjoint subgraphs, the true probability of sampling node ˜v is P[˜v] =
219
+ 1
220
+ M , since we know
221
+ that a node is in exactly one of the M subgraphs. However, to ensure differential privacy, we require
222
+ a bound that holds for all possible graphs and any run of the sampling procedure. Thus, we use the
223
+ upper bound P[˜v] =
224
+ 1
225
+ M ≤
226
+ 1
227
+ Mmin where Mmin is the minimum number of subgraphs that can be
228
+ generated in any graph of N nodes. Then, the probability of sampling ˜v in a batch of m subgraphs
229
+ using sampling mechanism S is at most PS[˜v] ≤
230
+ m
231
+ Mmin .
232
+ 4
233
+
234
+ pre-process
235
+ batchAlgorithm 1 DP-SGD with random walk sampling
236
+ Input: Graph G = {V, E}, sampling method S, loss function L, initial model weights w0, noise
237
+ standard deviation σ, gradient clipping norm C, number of iterations T, frequency at which to
238
+ re-sample subgraphs in DRW-D i
239
+ GS = S(G)
240
+ ▷ Generate subgraphs from graph G using sampling method S
241
+ for t in [0, T) do
242
+ if t % i == 0 and S == DRW-D then
243
+ GS = S(G)
244
+ end if
245
+ Sample m subgraphs uniformly at random from GS to form batch B
246
+ for sj in B do
247
+ ▷ sj is a subgraph
248
+ Compute ∇wtL(vj, N (vj))
249
+ gt(vj) = clip (∇wtL (vj, N (vj)) , C)
250
+ ▷ Compute and clip individual gradients in B
251
+ end for
252
+ gt(B) =
253
+ 1
254
+ |B|
255
+ ���
256
+ sj∈B gt(vj)
257
+
258
+ + N(0, σ2)
259
+
260
+ ▷ Add noise to the gradients
261
+ wt+1 = update(wt, gt(B))
262
+ ▷ Update weights based on optimizer being used
263
+ end for
264
+ Disjoint random walks
265
+ The first sampling method we propose is called Disjoint Random Walks
266
+ (DRW). We pre-process the graph once before training and then generate batches at every iteration
267
+ using the same set of subgraphs. Each subgraph consists of one random walk of length L (refer to
268
+ Appendix B for a pseudo-code). A random walk of length L contains at most L + 1 nodes, and
269
+ generating random walks that all have maximal length would result in the minimum number of
270
+ random walks, since a node can only appear in one random walk. Therefore, we get Mmin = ⌈ N
271
+ L+1⌉
272
+ and P[˜v] ≤
273
+ 1
274
+
275
+ N
276
+ L+1 ⌉. Finally, the upper bound probability of sampling a node ˜v is PDRW[˜v] ≤
277
+ m
278
+
279
+ N
280
+ L+1 ⌉.
281
+ Disjoint random walks with restarts
282
+ To create better subgraphs that contain more nodes for
283
+ aggregation, we also propose Disjoint Random Walks with Restarts (DRW-R). Similary to DRW,
284
+ this sampling method generates subgraphs once before training by using random walks, but instead
285
+ of sampling one random walk per training node we sample R of them (refer to Appendix B for a
286
+ pseudo-code). Given a random walk length of L and R restarts, the minimum number of subgraphs
287
+ is Mmin = ⌈
288
+ N
289
+ 1+R×L⌉ where 1 + R × L is the maximum size of one subgraph when all random
290
+ walks have length L, and the probability of sampling node u in a batch of size m is therefore
291
+ PDRW-R[u] ≤
292
+ m
293
+
294
+ N
295
+ 1+R×L ⌉.
296
+ Disjoint random walks with dynamic re-sampling
297
+ Finally, we propose a third sampling method
298
+ in which we pre-process the graph into disjoint subgraphs every ith iteration instead of once before
299
+ training, where i is a hyper-parameter that is chosen based on the cost of the sampling procedure
300
+ on each dataset. This allows us to increase the diversity of subgraphs used for training, and prevent
301
+ overfitting on the subgraphs generated in one run of the sampling procedure. We call this procedure
302
+ DRW-D, where D stands for Dynamically re-sampling random walks. The probability of sampling
303
+ node ˜v is the same as in DRW, namely PDRW-D[˜v] = PDRW[˜v] ≤
304
+ m
305
+
306
+ N
307
+ L+1 ⌉. Note that this method
308
+ consists simply of re-running the subgraph generation process DRW at every ith iteration instead of
309
+ once before training, which is reflected in Algorithm 1.
310
+ 5
311
+ Experimental results
312
+ Experimental setup
313
+ We report our results on seven datasets, both in the transductive and the
314
+ inductive settings. The dataset sizes in terms of total nodes range from small (Cora [22], Citeseer
315
+ [22]) to medium (PPI [21], Pubmed [22]) to large (Flickr [21], Arxiv [21], Reddit [21]), or in number
316
+ of training nodes from small (Pubmed, Citeseer, Cora) to medium (PPI) to large (Flickr, Arxiv,
317
+ Reddit). We report the exact number of nodes as well as some additional dataset characteristics
318
+ in Appendix C. We focus on the node classification task, and report our results in terms of F1
319
+ Micro score, a metric equivalent to accuracy except on PPI which is a multi-label classification task.
320
+ Following prior work, we report our privacy budget using ϵ and a fixed δ per dataset (see Appendix
321
+ 5
322
+
323
+ Table 1: Comparison between the F1 Micro score (%) achieved by a basic GCN and MLP, the FDP
324
+ baseline, and our proposed method with multiple sampling methods. All DP methods are trained with
325
+ a target budget of ϵ ≤ 8.
326
+ Layers
327
+ Width
328
+ Dataset
329
+ Cora
330
+ CiteSeer
331
+ PPI
332
+ PubMed
333
+ Flickr
334
+ Arxiv
335
+ Reddit
336
+ GCN (non-DP)
337
+ 1
338
+ -
339
+ 69.8
340
+ 59.5
341
+ 46.2
342
+ 68.7
343
+ 45.6
344
+ 59.7
345
+ 92.5
346
+ 2
347
+ 256
348
+ 77.3
349
+ 63.7
350
+ 58.9
351
+ 72.9
352
+ 51.3
353
+ 69.1
354
+ 94.7
355
+ 512
356
+ 76.6
357
+ 62.2
358
+ 60.7
359
+ 72.9
360
+ 51.3
361
+ 69.5
362
+ 94.7
363
+ MLP (non-DP)
364
+ 1
365
+ -
366
+ 43.0
367
+ 37.6
368
+ 45.2
369
+ 61.3
370
+ 45.7
371
+ 52.3
372
+ 67.7
373
+ 2
374
+ 256
375
+ 47.3
376
+ 36.1
377
+ 52.1
378
+ 61.5
379
+ 36.2
380
+ 52.6
381
+ 69.8
382
+ 512
383
+ 44.8
384
+ 39.3
385
+ 53.6
386
+ 63.3
387
+ 38.4
388
+ 52.0
389
+ 69.7
390
+ FDP (DP)
391
+ 1
392
+ -
393
+ 17.1
394
+ 17.5
395
+ 38.4
396
+ 39.6
397
+ 33.6
398
+ 43.8
399
+ 56.7
400
+ 2
401
+ 256
402
+ 17.6
403
+ 21.5
404
+ 40.7
405
+ 41.4
406
+ 42.5
407
+ 31.9
408
+ 43.7
409
+ 512
410
+ 23.2
411
+ 22.1
412
+ 40.0
413
+ 41.2
414
+ 42.4
415
+ 30.2
416
+ 42.3
417
+ Ours
418
+ DRW (DP)
419
+ 1
420
+ -
421
+ 19.9
422
+ 20.6
423
+ 40.2
424
+ 41.7
425
+ 42.1
426
+ 59.2
427
+ 81.4
428
+ 2
429
+ 256
430
+ 17.2
431
+ 20.9
432
+ 38.7
433
+ 40.3
434
+ 48.7
435
+ 59.6
436
+ 80.2
437
+ 512
438
+ 24.9
439
+ 21.3
440
+ 37.9
441
+ 41.1
442
+ 47.9
443
+ 59.2
444
+ 81.8
445
+ DRW-D (DP)
446
+ 1
447
+ -
448
+ 19.8
449
+ 20.6
450
+ 40.1
451
+ 41.7
452
+ 42.2
453
+ 59.2
454
+ 81.4
455
+ 2
456
+ 256
457
+ 17.2
458
+ 21.3
459
+ 38.6
460
+ 40.2
461
+ 48.5
462
+ 59.7
463
+ 80.2
464
+ 512
465
+ 25.0
466
+ 21.7
467
+ 37.9
468
+ 41.2
469
+ 47.8
470
+ 59.3
471
+ 81.5
472
+ DRW-R (DP)
473
+ 1
474
+ -
475
+ 18.3
476
+ 19.2
477
+ 40.0
478
+ 40.3
479
+ 42.3
480
+ 59.1
481
+ 82.0
482
+ 2
483
+ 256
484
+ 17.3
485
+ 20.7
486
+ 38.2
487
+ 40.4
488
+ 48.3
489
+ 59.7
490
+ 81.0
491
+ 512
492
+ 24.5
493
+ 21.3
494
+ 36.9
495
+ 40.4
496
+ 48.5
497
+ 59.4
498
+ 82.2
499
+ C). Given a target ϵ, we keep training while tracking the (α, γt) privacy budget being spent until we
500
+ reach ϵ = fRDP→DP(α, �T ′
501
+ t=0 γt, δ) at iteration T ′.
502
+ We compare our proposed methodology with each sampling method to three baselines: 1) A basic
503
+ GCN trained with random walk sampling; 2) A basic MLP trained with uniform node sampling; and
504
+ 3) The method proposed in [9] which we call FDP for Feature-level DP. Note that while they train
505
+ their models up to an ϵ of 20, we only train them until ϵ = 8, since a very large ϵ does not have much
506
+ value in terms of privacy.
507
+ Discussion
508
+ Table 5 summarizes our results. A GCN trained without DP always outperforms the
509
+ ones trained with DP, which is expected since clipping gradients and especially adding Gaussian noise
510
+ decreases the utility of the final model. However, in some cases our method can almost match the
511
+ utility of the basic GCN, whereas the FDP baseline struggles. For example, DRW sampling on Flickr
512
+ can reach up to 48.7% accuracy – which corresponds to 95% of the baseline GCN’s performance
513
+ – whereas FDP reaches only 42.5% accuracy – which corresponds to 83% of the baseline GCN’s
514
+ performance. Similarly, our method achieves 87% of the GCN’s performance on the challenging
515
+ dataset Reddit, while FDP can only reach 60% of the GCN’s performance. This shows that our
516
+ sub-sampling approach is effective at solving the exponential growth of the receptive field while
517
+ approaching the utility of the non-DP GCN baseline, which makes our method attractive for real
518
+ world applications. That being said, our method uses a smaller amount of training nodes than what
519
+ is available at every iteration, even when computational complexity is not an issue (i.e. on small
520
+ graphs). The effect of this reduction in training training samples is exacerbated on small graphs that
521
+ do not require batching in non-DP training, which leads to our method performing on-par with the
522
+ FDP baseline on small datasets.
523
+ Comparison with variable privacy budget
524
+ Finally, in Figure 2 we expand on our previous results
525
+ by reporting the accuracy at various ϵ checkpoints during training. We report the best results that
526
+ our method achieved across all sampling methods and compare to the FDP baseline. On all datasets,
527
+ our method largely outperforms FDP across multiple epsilon values. Moreover, FDP cannot achieve
528
+ an epsilon lower than 2, whereas our method does while sometimes outperforming FDP at higher
529
+ privacy budgets.
530
+ 6
531
+
532
+ (a)
533
+ (b)
534
+ (c)
535
+ Figure 2: F1 Micro Score vs. epsilon achieved by FDP and our best sampling method for a) Flickr, b)
536
+ Arxiv and c) Reddit datasets.
537
+ 6
538
+ Conclusion
539
+ We proposed a novel way of training differentially private graph neural networks. Since graphs
540
+ consist of inter-connected nodes that influence each other’s gradients during training, naively adapting
541
+ traditional DP methods to graph neural networks can result in unnecessarily large amounts of noise
542
+ being added to the model during training, which in turn leads to poor utility of the model. We
543
+ proposed an adapted version of DP-SGD that uses random-walk based sub-sampling to overcome
544
+ this problem and introduced three sampling methods that generate disjoint subgraphs. For each
545
+ sampling method, we derived an upper bound on the probability of sampling a modified node in
546
+ a batch to apply the amplification by sub-sampling theorem and obtain tighter privacy guarantees.
547
+ Our method achieves a better privacy-utility trade-off compared to the state-of-the-art baseline FDP
548
+ across multiple datasets, especially for large datasets. A necessary future work direction in this field
549
+ is to attempt to solve the performance issue on small datasets, which is especially exacerbated on
550
+ GNNs. For example, pre-training the models on public datasets [2] or using variable signal-to-noise
551
+ ratios during training are ways of improving the utility in DP. Moreover, different sampling methods
552
+ that do not necessarily focus on random walks can be explored.
553
+ References
554
+ [1] Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. Model inversion attacks that exploit
555
+ confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC
556
+ conference on computer and communications security, pages 1322–1333, 2015.
557
+ [2] Xuechen Li, Florian Tramer, Percy Liang, and Tatsunori Hashimoto. Large language mod-
558
+ els can be strong differentially private learners. In International Conference on Learning
559
+ Representations, 2021.
560
+ [3] Rohan Anil, Badih Ghazi, Vineet Gupta, Ravi Kumar, and Pasin Manurangsi. Large-scale
561
+ differentially private bert. arXiv preprint arXiv:2108.01624, 2021.
562
+ [4] Fan Wu, Yunhui Long, Ce Zhang, and Bo Li. Linkteller: Recovering private edges from graph
563
+ neural networks via influence analysis. arXiv preprint arXiv:2108.06504, 2021.
564
+ [5] Iyiola E Olatunji, Wolfgang Nejdl, and Megha Khosla. Membership inference attack on graph
565
+ neural networks. In 2021 Third IEEE International Conference on Trust, Privacy and Security
566
+ in Intelligent Systems and Applications (TPS-ISA), pages 11–20. IEEE, 2021.
567
+ [6] Zaixi Zhang, Qi Liu, Zhenya Huang, Hao Wang, Chengqiang Lu, Chuanren Liu, and Enhong
568
+ Chen. Graphmi: Extracting private graph data from graph neural networks. arXiv preprint
569
+ arXiv:2106.02820, 2021.
570
+ [7] Cynthia Dwork, Aaron Roth, et al. The algorithmic foundations of differential privacy. Founda-
571
+ tions and Trends® in Theoretical Computer Science, 9(3–4):211–407, 2014.
572
+ [8] Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar,
573
+ and Li Zhang. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC
574
+ conference on computer and communications security, pages 308–318, 2016.
575
+ 7
576
+
577
+ 0.48
578
+ FDP
579
+ Ours
580
+ 0.46
581
+ F1 Micro Score
582
+ 0.44
583
+ 0.42
584
+ 0.40
585
+ 0.38
586
+ 0.36
587
+ 0.34
588
+ 1
589
+ 2
590
+ 3
591
+ 4
592
+ 5
593
+ 6
594
+ 7
595
+ 8
596
+ Epsilon0.60
597
+ 0.55
598
+ 0.50
599
+ Micro Score
600
+ 0.45
601
+ 0.40
602
+ 0.35
603
+ F1
604
+ 0.30
605
+ FDP
606
+ 0.25
607
+ Ours
608
+ 0.20
609
+ 1
610
+ 2
611
+ 3
612
+ 4
613
+ 5
614
+ 6
615
+ 7
616
+ 8
617
+ Epsilon0.8
618
+ FDP
619
+ Ours
620
+ 0.7
621
+ Fl Micro Score
622
+ 0.6
623
+ 0.5
624
+ 0.4
625
+ 0.3
626
+ 1
627
+ 2
628
+ 3
629
+ 4
630
+ 5
631
+ 6
632
+ 7
633
+ 8
634
+ Epsilon[9] Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal,
635
+ and Prateek Jain. Node-level differentially private graph neural networks. In ICLR 2022
636
+ Workshop on PAIR, 2022.
637
+ [10] Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, and Daniel Gatica-Perez. Gap:
638
+ Differentially private graph neural networks with aggregation perturbation. arXiv preprint
639
+ arXiv:2203.00949, 2022.
640
+ [11] Ilya Mironov. Rényi differential privacy. In 2017 IEEE 30th computer security foundations
641
+ symposium (CSF), pages 263–275. IEEE, 2017.
642
+ [12] Borja Balle, Gilles Barthe, Marco Gaboardi, Justin Hsu, and Tetsuya Sato. Hypothesis test-
643
+ ing interpretations and renyi differential privacy. In International Conference on Artificial
644
+ Intelligence and Statistics, pages 2496–2506. PMLR, 2020.
645
+ [13] Shuang Song, Kamalika Chaudhuri, and Anand D Sarwate. Stochastic gradient descent with
646
+ differentially private updates. In 2013 IEEE global conference on signal and information
647
+ processing, pages 245–248. IEEE, 2013.
648
+ [14] Raef Bassily, Adam Smith, and Abhradeep Thakurta. Private empirical risk minimization:
649
+ Efficient algorithms and tight error bounds. In 2014 IEEE 55th annual symposium on foundations
650
+ of computer science, pages 464–473. IEEE, 2014.
651
+ [15] Timour Igamberdiev and Ivan Habernal. Privacy-Preserving Graph Convolutional Networks for
652
+ Text Classification. In Proceedings of the 13th Language Resources and Evaluation Conference,
653
+ page (to appear), Marseille, France, 2022. European Language Resources Association.
654
+ [16] Borja Balle, Gilles Barthe, and Marco Gaboardi. Privacy amplification by subsampling: Tight
655
+ analyses via couplings and divergences. Advances in Neural Information Processing Systems,
656
+ 31, 2018.
657
+ [17] Yu-Xiang Wang, Borja Balle, and Shiva Prasad Kasiviswanathan. Subsampled rényi differential
658
+ privacy and analytical moments accountant. In The 22nd International Conference on Artificial
659
+ Intelligence and Statistics, pages 1226–1235. PMLR, 2019.
660
+ [18] Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal,
661
+ and Prateek Jain. Node-level differentially private graph neural networks. arXiv preprint
662
+ arXiv:2111.15521, 2021.
663
+ [19] Sina Sajadmanesh and Daniel Gatica-Perez. Locally private graph neural networks. In Proceed-
664
+ ings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages
665
+ 2130–2145, 2021.
666
+ [20] Tamara T Mueller, Dmitrii Usynin, Johannes C Paetzold, Daniel Rueckert, and Georgios Kaissis.
667
+ Sok: Differential privacy on graph-structured data. arXiv preprint arXiv:2203.09205, 2022.
668
+ [21] Hanqing Zeng, Hongkuan Zhou, Ajitesh Srivastava, Rajgopal Kannan, and Viktor Prasanna.
669
+ Graphsaint: Graph sampling based inductive learning method. arXiv preprint arXiv:1907.04931,
670
+ 2019.
671
+ [22] Prithviraj Sen, Galileo Mark Namata, Mustafa Bilgic, Lise Getoor, Brian Gallagher, and Tina
672
+ Eliassi-Rad. Collective classification in network data. AI Magazine, 29(3):93–106, 2008.
673
+ A
674
+ Upper Bound on Gradient Sensitivity
675
+ We show how to derive the upper bound on the sensitivity of the total gradient on a batch, where gt
676
+ is the function that takes a batch B as input and returns the gradients at iteration t, B and B′ are
677
+ neighboring batches that differ by one sample ˜v, Lv is the loss function on a node v, ∇wLv is the
678
+ 8
679
+
680
+ gradient of the loss on v with respect to the weights of the model, and I[˜v ∈ B] is the indicator
681
+ function which is 1 if ˜v is in the batch and 0 otherwise.
682
+ ∆2gt = ∥gt(B) − gt(B′)∥2
683
+ = ∥
684
+
685
+ v∈B
686
+ ∇wLv −
687
+
688
+ v∈B′
689
+ ∇wLv∥2
690
+ = ∥(∇wL˜v +
691
+
692
+ u∈RF (˜v)\{˜v}
693
+ ∇wLu)I[˜v ∈ B] − (∇wL˜v′ +
694
+
695
+ u∈RF (˜v′)\{˜v′}
696
+ ∇wLu)I[˜v′ ∈ B′]∥2
697
+ ≤ ∥(∇wL˜v +
698
+
699
+ u∈RF (˜v)\{˜v}
700
+ ∇wLu)I[˜v ∈ B]∥2 + ∥(∇wL˜v′ +
701
+
702
+ u∈RF (˜v′)\{˜v′}
703
+ ∇wL˜v′)I[˜v′ ∈ B′]∥2
704
+ ≤ ∥∇wL˜v +
705
+
706
+ u∈RF (˜v)\{˜v}
707
+ ∇wLu∥2 + ∥∇wL˜v′ +
708
+
709
+ u∈RF (˜v′)\{˜v′}
710
+ ∇wLu∥2
711
+ ≤ ∥∇wL˜v∥2 +
712
+
713
+ u∈RF (˜v)\{˜v}
714
+ ∥∇wLu∥2 + ∥∇wL˜v′∥2 +
715
+
716
+ u∈RF (˜v′)\{˜v′}
717
+ ∥∇wLu∥2
718
+ ≤ 2|RF(˜v)|C
719
+ ≤ 2KL+1 − 1
720
+ K − 1
721
+ C
722
+ (1)
723
+ 9
724
+
725
+ B
726
+ Algorithms
727
+ B.1
728
+ DRW Sampler
729
+ The following algorithm shows how to generate disjoint subgraphs using the Disjoint Random Walks
730
+ (DRW) sampling method (see Section 4.2). To generate a subgraph, we first sample a node v from
731
+ the set of remaining nodes, then remove it from this set. We then construct the set of valid neighbors
732
+ of v, which consists of all nodes that have not been already sampled. We sample the next node v in
733
+ the subgraph from the set of valid neighbors, and repeat the process until we get a random walk of
734
+ length L. We iterate this process until all nodes are included in one subgraph.
735
+ Algorithm 2 DRW Sampler
736
+ Input: Graph G = {V, E}, random walk length L.
737
+ Output: Set of all disjoint subgraphs = ()
738
+ remaining_nodes = {v1, v2, . . . , vN}
739
+ while len(remaining_nodes) != 0 do
740
+ subgraph = []
741
+ v = sample(remaining_nodes, 1)
742
+ ▷ uniformly sample over non-sampled nodes
743
+ subgraph.append(v)
744
+ remaining_nodes.remove(v)
745
+ l = 0
746
+ while l < L do
747
+ valid_neighbors = Neighbors(v)
748
+ ▷ Neighbors returns all neighbors of a node
749
+ for u in valid_neighbors do
750
+ if u not in remaining_nodes then
751
+ valid_neighbors.remove(u)
752
+ end if
753
+ end for
754
+ if len(valid_neighbors) != 0 then
755
+ v = sample(valid_neighbors, 1)
756
+ ▷ uniformly sample a neighbor of v
757
+ else
758
+ break
759
+ end if
760
+ random_walk.append(v)
761
+ remaining_nodes.remove(v)
762
+ l = l + 1
763
+ end while
764
+ subgraphs.add(subgraph)
765
+ end while
766
+ B.2
767
+ DRW-R Sampler
768
+ The following algorithm shows how to generate disjoint subgraphs using the Disjoint Random Walks
769
+ with restarts (DRW-R) sampling method (see 4.2). The main difference to the DRW sampler is that,
770
+ instead of stopping the subgraph generation after one random walk, we sample multiple random
771
+ walks rooted at the same node by re-initializing the starting node of the random walk to the same root
772
+ node of the subgraph R times.
773
+ 10
774
+
775
+ Algorithm 3 DRW-R Sampler
776
+ Input: Graph G = {V, E}, random walk length L.
777
+ Output: Set of all disjoint subgraphs = ()
778
+ remaining_nodes = {v1, v2, . . . , vN}
779
+ while len(remaining_nodes) != 0 do
780
+ subgraph = []
781
+ root = sample(remaining_nodes, 1)
782
+ ▷ uniformly sample over non-sampled nodes
783
+ subgraph.append(root)
784
+ remaining_nodes.remove(root)
785
+ for r in range(R) do
786
+ v = root
787
+ l = 0
788
+ while l < L do
789
+ valid_neighbors = Neighbors(v)
790
+ ▷ Neighbors returns all neighbors of a node
791
+ for u in valid_neighbors do
792
+ if u not in remaining_nodes then
793
+ valid_neighbors.remove(u)
794
+ end if
795
+ end for
796
+ if len(valid_neighbors) != 0 then
797
+ v = sample(valid_neighbors, 1)
798
+ ▷ uniformly sample a neighbor of v
799
+ else
800
+ break
801
+ end if
802
+ subgraph.append(v)
803
+ remaining_nodes.remove(v)
804
+ l = l + 1
805
+ end while
806
+ subgraphs.add(subgraph)
807
+ end for
808
+ end while
809
+ 11
810
+
811
+ C
812
+ Training Hyperparameters
813
+ We run all experiments with three different seeds, Adam optimizer and ReLU activation. We
814
+ summarize the number of roots used for different sampling scenarios in Table 4. For the non-DP
815
+ trainings, we fix the learning rate to 0.01. We perform a grid hyper-parameter search for the trainings
816
+ on all datasets. We experiment with the following hyper-parameters for both DP and non-DP trainings:
817
+ • Number of layers in {1, 2}
818
+ • Width of hidden layers in {256, 512}
819
+ • Maximum graph degree in {2 , 4} for the FDP baseline
820
+ We use the follow hyper-parameters for the DP specific trainings:
821
+ • Learning rate in {0.01, 0.1, 0.2}
822
+ • Clip norm percentage C% in {0.001, 0.01, 0.1}.
823
+ • Noise multiplier λ in {1, 2, 4, 8}. The noise multiplier is the ratio of the standard deviation
824
+ σ of the Gaussian noise added to the gradients to the sensitivity ∆2f of the function f.
825
+ Instead of tuning σ, we tune λ, then fix σ = λ × ∆2f.
826
+ • Delta value δ: we summarize the values used in Table 3
827
+ Table 2: Characteristics of the datasets that we use in our experiments. (s) indicates a single-label
828
+ classification problem, and (m) a multi-label one.
829
+ Nodes
830
+ Feature Size
831
+ Classes
832
+ Training Nodes
833
+ Type
834
+ Cora
835
+ 2,708
836
+ 1,433
837
+ 7 (s)
838
+ 140
839
+ Transductive
840
+ Citeseer
841
+ 3,327
842
+ 3,703
843
+ 6 (s)
844
+ 120
845
+ Transductive
846
+ PPI
847
+ 14,755
848
+ 50
849
+ 121 (m)
850
+ 9,716
851
+ Inductive
852
+ Pubmed
853
+ 19,717
854
+ 500
855
+ 3 (s)
856
+ 60
857
+ Transductive
858
+ Flickr
859
+ 89,250
860
+ 500
861
+ 7 (s)
862
+ 44,625
863
+ Inductive
864
+ Arxiv
865
+ 169,343
866
+ 128
867
+ 40 (s)
868
+ 90,941
869
+ Inductive
870
+ Reddit
871
+ 232,965
872
+ 602
873
+ 41 (s)
874
+ 153,932
875
+ Inductive
876
+ Table 3: δ value used for each dataset.
877
+ Dataset
878
+ Cora
879
+ Citeseer
880
+ PPI
881
+ Pubmed
882
+ Flickr
883
+ Arxiv
884
+ Reddit
885
+ δ
886
+ 1e-5
887
+ 1e-5
888
+ 1e-5
889
+ 1e-6
890
+ 1e-6
891
+ 1e-7
892
+ 1e-7
893
+ Table 4: Batch sizes used for training based on the sampler, depth of the model, and dataset. Note
894
+ that as a general rule, we used around 20% of total number of training nodes for the large datasets,
895
+ and 50% for the small datasets.
896
+ Sampler
897
+ Depth
898
+ Dataset
899
+ Cora
900
+ CiteSeer
901
+ PPI
902
+ PubMed
903
+ Flickr
904
+ Arxiv
905
+ Reddit
906
+ RW, uniform, PreDRW,
907
+ 1
908
+ 70
909
+ 60
910
+ 2,000
911
+ 30
912
+ 10,000
913
+ 20,000
914
+ 30,000
915
+ PreDRW-D, DynDRW
916
+ 2
917
+ 46
918
+ 40
919
+ 2,000
920
+ 20
921
+ 10,000
922
+ 20,000
923
+ 30,000
924
+ PreDRW-R
925
+ 1
926
+ 46
927
+ 40
928
+ 2,000
929
+ 20
930
+ 10,000
931
+ 20,000
932
+ 30,000
933
+ 2
934
+ 28
935
+ 24
936
+ 1,800
937
+ 12
938
+ 8,000
939
+ 18,000
940
+ 30,000
941
+ 12
942
+
2dAyT4oBgHgl3EQf1fnx/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
3tE0T4oBgHgl3EQfvAFe/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bea7e67c20ba3bc55372bc3eebd829cb15d32ffb4b83f54494acb00f8e29fa0c
3
+ size 3342381
5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/2301.00041v1.pdf.txt ADDED
@@ -0,0 +1,1329 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ HIP-2022-35/TH
2
+ Vector dark matter in supercooled Higgs portal models
3
+ Mads T. Frandsen∗ and Mattias E. Thing†
4
+ CP3-Origins, University of Southern Denmark, Denmark
5
+ Matti Heikinheimo‡ and Kimmo Tuominen§
6
+ Department of Physics, University of Helsinki,
7
+ P.O.Box 64, FI-00014 University of Helsinki, Finland and
8
+ Helsinki Institute of Physics, P.O.Box 64,
9
+ FI-00014 University of Helsinki, Finland
10
+ Martin Rosenlyst¶
11
+ Rudolf Peierls Centre for Theoretical Physics, University of Oxford,
12
+ 1 Keble Road, Oxford OX1 3NP, United Kingdom
13
+ We consider extensions of the Standard Model by a hidden sector consisting of a
14
+ gauge field coupled with a scalar field. Assuming the absence of dimensionful param-
15
+ eters in the tree level potential, radiative symmetry breaking will make the hidden
16
+ sector gauge field massive and induce the electroweak scale of the Standard Model.
17
+ We consider separately dark sector gauge groups U(1)D and SU(2)D, and focus on
18
+ probing the models with a combination of direct detection experiments and gravita-
19
+ tional wave observatories. We find that recent dark matter direct detection results
20
+ significantly constrain the parameter space of the models where they can account for
21
+ the observed dark matter relic density via freeze-out. The gravitational wave signals
22
+ originating from strongly first order electroweak phase transition in these models can
23
+ be probed in future gravitational wave observatories such as LISA. We show how
24
+ the projected results compliment direct detection experiments and can help probe
25
+ parameter space near the neutrino floor of direct detection.
26
+ I.
27
+ INTRODUCTION
28
+ Despite the success of the Standard Model (SM) of particle physics, there are many phenomena
29
+ that it does not explain and that appear to require new particles and interactions. One enigmatic
30
+ phenomenon is the problem of missing mass, which emerged in a wide range of astrophysical
31
+ systems including galaxy clusters [1] and galaxies [2]. One possible solution to the missing mass
32
+ problem is cold dark matter (DM), constituted by a new stable and neutral massive particle. This
33
+ hypothesis provides an excellent parametrisation for 26% of the energy density of the universe in
34
+ addition to the components parametrised as baryonic matter and dark energy [3]. On the other
35
+ hand, the non-gravitational nature of dark matter (DM) remains unknown [4–6].
36
+ The cosmological observations on the light element abundance and cosmic microwave back-
37
+ ground radiation spectrum imply that the Standard Model (SM) degrees of freedom must have
38
+ been in thermal equilibrium in the early universe [7–11]. Whether DM was ever part of the same
39
+ heat bath is not known.
40
+ However, assuming that this was the case, allows for the abundance of dark matter to arise as a
41
+ relic from thermal decoupling in the early universe via interactions between the DM and the SM.
42
+ ∗ frandsen@cp3.sdu.dk
43
+ † thing@cp3.sdu.dk
44
+ ‡ matti.heikinheimo@helsinki.fi
45
+ § kimmo.i.tuominen@helsinki.fi
46
+ ¶ martin.jorgensen@physics.ox.ac.uk
47
+ arXiv:2301.00041v1 [hep-ph] 30 Dec 2022
48
+
49
+ 2
50
+ Moreover, these interactions offer the prospect of detecting DM in direct detection experiments.
51
+ The most studied example of this paradigm is Weakly Interacting Massive Particle (WIMP). How-
52
+ ever, simplest WIMP models are now very strongly constrained by direct detection experiments.
53
+ It is therefore worthwhile to explore the phenomenology of different types of simple benchmark
54
+ hidden sectors instead coupled with the SM via portal interactions.
55
+ In this paper we analyze two simple models of vector DM, that feature scale invariance of the
56
+ tree-level Lagrangian and are coupled to the SM via the Higgs portal, where one scalar mass
57
+ eigenstate is SM-like, with mass 125.46 ± 0.16 GeV [12]. The other eigenstate is massless at tree
58
+ level but obtains its mass via loop corrections as an effect of radiative symmetry breaking [13].
59
+ This framework of classically scale invariant DM models that feature radiative symmetry breaking,
60
+ mediated to the SM via the Higgs portal, has been explored in literature, see e.g. [14–24].
61
+ In this paper we aim to clarify how simple U(1)D and SU(2)D models of this type can be tested
62
+ with a combination of direct detection and gravitational wave observations.
63
+ Direct detection
64
+ experiments have provided very stringent constraints on interactions of weak scale dark matter
65
+ with nuclei. Currently, the most stringent constraints come from the recent PandaX-4T and LZ
66
+ (2022) experiments [25, 26]. It is well known that radiative symmetry breaking in classically scale
67
+ invariant models typically results in a strongly first order electroweak phase transition (EWPT).
68
+ Such a first order EWPT could be relevant for baryogenesis and produces gravitational wave signals
69
+ which could be observable in upcoming gravitational wave experiments such as LISA [27].
70
+ We present a careful examination of the first order phase transition using different numerical
71
+ packages in order to characterise the theoretical uncertainty in the predictions.
72
+ II.
73
+ DEFINITIONS OF THE MODELS
74
+ We consider two models where the SM is extended with a hidden sector gauge group and a
75
+ new scalar field charged under the gauge group. Spontaneous symmetry breaking of the hidden
76
+ sector gauge group via this scalar leads to new massive vector DM candidates. The first model we
77
+ consider is an U(1)D extension defined by the Langrangian [22],
78
+ LU(1)D = L0
79
+ SM − 1
80
+ 4VµνV µν + (DµS)∗(DµS) − V (H, S),
81
+ (1)
82
+ where L0
83
+ SM is the SM Lagrangian without the Higgs potential.
84
+ The covariant derivative is
85
+ Dµ = ∂µ + igVµ and the field strength tensor of the U(1)D vector field is Vµν = ∂µVν − ∂νVµ.
86
+ The scalar potential is given by
87
+ V (H, S) = 1
88
+ 6λH(H†H)2 + 1
89
+ 6λS(S∗S)2 + 2λHS(H†H)(S∗S).
90
+ (2)
91
+ In principle a kinetic mixing term BµνVµν could be present, but we assume this does not arise. For
92
+ example, the mixing term can be explicitly prohibited by a Z2 symmetry under which Vµ → −Vµ
93
+ and all other fields are singlets. In the unitary gauge the scalar fields are written as
94
+ H = 1
95
+
96
+ 2
97
+
98
+ 0
99
+ v1 + h1
100
+
101
+ ,
102
+ S = 1
103
+
104
+ 2(v2 + h2),
105
+ (3)
106
+ and upon symmetry breaking vi, (i = 1, 2), becomes nonzero. The SM gauge boson masses are
107
+ determined by the vacuum expectation value (VEV) v1 = 246 GeV while the DM mass is related
108
+ to the VEV v2 via M 2
109
+ V = g2v2
110
+ 2.
111
+ The second model we consider is the similar SU(2)D extension defined by the Langrangian [24]
112
+ LSU(2)D = L0
113
+ SM − 1
114
+ 4V i
115
+ µνV µν
116
+ i
117
+ + (DµS)†(DµS) − V (H, S),
118
+ (4)
119
+
120
+ 3
121
+ where the DM candidate is now the SU(2)D vector triplet V i
122
+ µ. The covariant derivative and the
123
+ field strength tensor take the forms
124
+ Dµ = ∂µ + igV i
125
+ µti,
126
+ V i
127
+ µν = ∂µV i
128
+ ν − ∂νV i
129
+ µ + gϵi
130
+ jkV j
131
+ µ V k
132
+ ν ,
133
+ (5)
134
+ where ti = σi/2 is the SU(2) generator. In this non-Abelian model, the kinetic mixing is forbidden
135
+ by gauge symmetry. The normalization of the scalar potential is here chosen as
136
+ V (H, S) = λH(H†H)2 + λS(S†S)2 + λHS(H†H)(S†S),
137
+ (6)
138
+ where the scalars are now both complex SU(2) doublets, and in the unitary gauge given by
139
+ H = 1
140
+
141
+ 2
142
+
143
+ 0
144
+ v1 + h1
145
+
146
+ ,
147
+ S = 1
148
+
149
+ 2
150
+
151
+ 0
152
+ v2 + h2
153
+
154
+ .
155
+ (7)
156
+ In both of the above models the two neutral scalar states mix and the resulting mass eigenstates
157
+ are connected to the gauge eigenstates via a mixing matrix of the form
158
+
159
+ h
160
+ hS
161
+
162
+ =
163
+
164
+ cos α − sin α
165
+ sin α
166
+ cos α
167
+ � �
168
+ h1
169
+ h2
170
+
171
+ ,
172
+ (8)
173
+ where the mixing angle α describes the mixing between the SM and DM sectors. Generally, this
174
+ angle is restricted to small values, sin α ≲ 0.1.
175
+ The parameters of these models can be written in uniform notation as,
176
+ v2 = cV MV
177
+ g
178
+ ,
179
+ sin α = v1
180
+ v
181
+ (9)
182
+ λH = 3M 2
183
+ h
184
+ v2
185
+ 1
186
+ cos2 α,
187
+ λS = 3M 2
188
+ h
189
+ v2
190
+ 2
191
+ sin2 α,
192
+ λHS = − M 2
193
+ h
194
+ 2v1v2
195
+ sin α cos α,
196
+ (10)
197
+ where MV is the mass of the DM candidate, Mh is the SM-Higgs mass and cV = 2 for the SU(2)D
198
+ model and cV = 1 for the U(1)D. We have also defined v2 = v2
199
+ 1 + v2
200
+ 2.
201
+ The tree-level potential has a flat direction along the scalon hS field direction, while the SM-like
202
+ Higgs h is perpendicular to the flat direction. We can thus consider the loop corrections in the flat
203
+ direction as per the Gildener-Weinberg formalism [13]. The first order loop corrections lead to an
204
+ effective potential of the general form,
205
+ V 1
206
+ eff(hS) =
207
+ 1
208
+ 64π2
209
+ n
210
+
211
+ s=1
212
+ gsM 4
213
+ s
214
+
215
+ ln
216
+ �M 2
217
+ s
218
+ Λ2
219
+
220
+ − Ci
221
+
222
+ ,
223
+ (11)
224
+ where Ms refers to tree level masses, gs is the degrees of freedom (with positive values for bosons
225
+ and negative for fermions), n is the number of states, and Λ is a renormalization scale. The scalon
226
+ field is massless at tree level, but obtains a mass from the loop corrections, given by
227
+ M 2
228
+ S =
229
+ 1
230
+ 8π2v2
231
+
232
+ gV M 4
233
+ V + 3M 4
234
+ Z + 6M 4
235
+ W + M 4
236
+ h − 12m4
237
+ t
238
+
239
+ ,
240
+ (12)
241
+ where gV is the degrees of freedom for the vector boson: gV = 9 for the SU(2)D model and gV = 3
242
+ for the U(1)D. Here MS is the scalon mass for each respective model and MV is the DM candidate.
243
+ Notice that Equation (12) relates the scalon and DM masses. In order for the scalon mass to be
244
+ non-negative, this sets a lower bound for the DM masses. The bound is MV > 240 GeV for the
245
+ SU(2)D model and MV > 185 GeV for the U(1)D model.
246
+
247
+ 4
248
+ III.
249
+ FREEZE-OUT RELIC DENSITY
250
+ The dark matter abundance in the model is determined via the freeze-out mechanism. While
251
+ other possibilities, namely super-cool DM and filtered DM have been considered in the context of
252
+ radiative symmetry breaking models such as those under the present study [28–31], we will see
253
+ that the freeze-out mechanism is operational throughout the parameter space considered in this
254
+ work.
255
+ To see how the observed DM abundance Ωh2 = 0.120 ± 0.001 [3] is generated via the freeze-out
256
+ mechanism, we recall the basic formalism below. The present-day dark matter density is obtained
257
+ from the Boltzmann equation
258
+ dnV
259
+ dt + 3HnV = − ⟨σav⟩
260
+
261
+ n2
262
+ V − n2
263
+ V,eq
264
+
265
+ ,
266
+ (13)
267
+ where nV is the number density of the dark matter, which in equilibrium in the broken phase is
268
+ given as
269
+ neq
270
+ V (T) = gV
271
+ �MV T
272
+
273
+ �3/2
274
+ e�� MV
275
+ T .
276
+ (14)
277
+ Here H is the Hubble parameter and ⟨σav⟩ is the thermally averaged annihilation cross section.
278
+ Equation (13) can be rewritten using entropy conservation, the yield YV = nV
279
+ s , and x = MV
280
+ T
281
+ into
282
+ the form
283
+ dYV
284
+ dx =
285
+ 1
286
+ 3H
287
+ ds
288
+ dx ⟨σav⟩
289
+
290
+ Y 2
291
+ V − Y 2
292
+ V,eq
293
+
294
+ ,
295
+ (15)
296
+ and solving this equation we obtain the present day yield Y 0
297
+ V that links to the abundance as
298
+ Ωh2 = MV s0Y 0
299
+ V h2
300
+ ρc
301
+ 0
302
+ ≃ 2.755 · 108MV s0Y 0
303
+ V GeV−1,
304
+ (16)
305
+ where
306
+ s0 = 2.8912 · 109 m−3,
307
+ ρc
308
+ 0 = 10.537h2 GeVm−3 for H = h100 km/s/Mpc,
309
+ (17)
310
+ and h = 0.678.
311
+ To solve the Boltzmann equation numerically we use the micrOMEGA package [32]. This software
312
+ uses CalcHEP input files with the models Feynman rules to compute the thermally averaged cross
313
+ section, which we generate with the LanHEP package [33, 34]. The numerical results for the relic
314
+ density for both models can be seen in Figure 1. To asses the validity of the numerical results
315
+ we have compared these to the analytical result, obtained in the non-relativistic limit and under
316
+ the approximation of instantaneous freeze-out. Both of these approximations tend to overestimate
317
+ the relic density. Nevertheless, the analytical result only deviates up to around 10% for the U(1)D
318
+ model and slightly more for the SU(2)D model, considering only the leading annihilation processes
319
+ σ (V V → hShS) for the U(1)D model and σ (V iV j → hShS) plus the semi-annihilation process
320
+ σ
321
+
322
+ V iV j → V khS
323
+
324
+ for the SU(2)D model.
325
+ From Figure 1 it is evident that both models can reproduce the observed relic density. A larger
326
+ coupling g leads to more efficient annihilation of the vector DM candidate V into scalons hS and
327
+ thus the correct abundance is obtained for a correspondingly higher vector mass MV . In the non-
328
+ Abelian model the semi-annihilation process is taken into account in the analytic approximation
329
+ by defining the effective thermally averaged total annihilation cross section as
330
+ ⟨σav⟩ = ⟨σannv⟩ + 1
331
+ 2 ⟨σsemi−annv⟩ ,
332
+ (18)
333
+
334
+ 5
335
+ (a) The DM relic density as a function of the mass of
336
+ the U(1)D vector DM candidate for different coupling
337
+ constants, including the Planck collaboration result.
338
+ (b) The DM relic density as a function of the mass of
339
+ the SU(2)D vector DM candidate for different coupling
340
+ constants, including the Planck collaboration result.
341
+ FIG. 1. The red line representing the Planck collaboration result of Ωh2 = 0.120 ± 0.001 is shown in red,
342
+ and both models can match it via a freeze-out relic density [3].
343
+ where the first term is the annihilation and the second term is the semi-annihilation cross section.
344
+ The addition of the semi-annihilation generally leads to more efficient annihilation, and thus
345
+ one would expect the relic density to be lower. However, the SU(2)D result in Figure 1(b) is very
346
+ close to the U(1)D result in Figure 1(a), which indicates that there is not much difference in the
347
+ abundance for the two models considered. The origin of this is that that while the additional
348
+ degrees of freedom in the non-Abelian model increase the relic density, this is balanced by the
349
+ reducing effect of the semi-annihilations. Concretely, the semi-annihilations increases the overall
350
+ thermally averaged total annihilation cross section only by roughly 15%.
351
+ Finally, we comment on the possibility of a freeze-in origin for the DM abundance in these
352
+ models. In the freeze-in regime the DM particle V needs to be feebly coupled to the visible sector,
353
+ so that it does not reach equilibrium with the SM thermal bath in the early universe. To achieve
354
+ this, either the gauge coupling g needs to be very small so that the vector remains decoupled while
355
+ the scalar S is in equilibrium, or the portal coupling λHS can be very small, so that both the vector
356
+ and the scalar remain decoupled from the SM.
357
+ In the first scenario, the typical scale for the gauge coupling would be g ∼ O(10−7), as seen
358
+ from the approximate relation [35]
359
+ YV (T) ∼ g2Mpl
360
+ T ,
361
+ (19)
362
+ where Mpl is the reduced Planck mass. Since this process is IR dominated, the dominant production
363
+ would be at the lowest kinematically allowed temperature T ∼ MV . Thus we can approximate the
364
+ abundance by the replacement T = MV in the above to obtain
365
+ Y 0
366
+ V ∼ g2Mpl
367
+ MV
368
+ .
369
+ (20)
370
+ Consider now the relationship between the coupling and DM mass in Equations (10) and (12).
371
+ If the coupling is g ∼ O(10−7) as necessary for the freeze-in mechanism to work, the VEV, v2,
372
+
373
+ RelicDensity of U(1)pModel
374
+ g= 0.5
375
+ g = 0.7
376
+ g= 0.9
377
+ 100
378
+ Planck
379
+ 10~1
380
+ 10~2
381
+ 250500
382
+ 1000
383
+ 1500
384
+ 2000
385
+ 2500
386
+ 3000
387
+ 3500
388
+ 4000
389
+ Mv[GeV]RelicDensity of SU(2)p Model
390
+ 101
391
+ g=0.5
392
+ g= 0.7
393
+ g= 0.9
394
+ Planck
395
+ 100
396
+ 10-1
397
+ 10~2
398
+ 250500
399
+ 1000
400
+ 1500
401
+ 2000
402
+ 2500
403
+ 3000
404
+ 3500
405
+ 4000
406
+ My[GeV]6
407
+ becomes very large and the scalon mass, MS, is approximately zero.
408
+ The presence of a very
409
+ light scalar in the spectrum is potentially problematic, e.g. due to Higgs invisible decays, unless
410
+ suppressed by a small portal coupling. On the other hand, the scenario where the portal coupling
411
+ would be very small, would also require a large hidden sector VEV v2 ≫ v1. If the gauge coupling
412
+ is not very small, then this implies that the DM mass MV becomes very large. In this case the
413
+ hidden sector can only be effectively populated in the broken phase, as there is no scalar mixing in
414
+ the unbroken phase. However, in this scenario there will be large supercooling, as discussed below,
415
+ and the DM production should take place after reheating from thermal inflation. Now the scalar
416
+ VEV is mostly in the S-direction v2 ≫ v1, so that the energy stored in the inflaton field mostly
417
+ goes into S-quanta, but since these are feebly coupled to the SM, the reheating will be very slow
418
+ and the reheating temperature suppressed. Thus, the heavy DM can not be efficiently produced
419
+ after reheating, since Tr ≪ MV . While there might be some way to overcome these apparent
420
+ problems with freeze-in, we do not consider this scenario further in this work.
421
+ IV.
422
+ INFLATION, REHEATING AND SUPERCOOLING
423
+ In the previous section, we discussed the DM abundance in the standard freeze-out scenario.
424
+ The situation may however be more complicated [28, 30, 36, 37], due to a possible phase of thermal
425
+ inflation characteristic of classically scale invariant models with radiative symmetry breaking. The
426
+ thermal history in the models can be summarised in terms of the following temperature thresholds:
427
+ • TFO: The freeze-out temperature of the DM candidate defined roughly by neq
428
+ V ⟨σv⟩ = H.
429
+ • Tn: The nucleation temperature when the probability to nucleate an expanding bubble of
430
+ the broken phase vacuum inside a Hubble horizon becomes of O(1), approximately the
431
+ temperature at which the phase transition completes.
432
+ • Tinf: The temperature at the beginning of thermal inflation defined by ρV = ρrad, where
433
+ ρV is the energy density of the false unbroken vacuum (i.e. the difference in the potential
434
+ between the local minimum at V (S) = 0 and the true minimum at V (S = v)), and ρrad is
435
+ the energy density of the radiation dominated universe. When ρV begins to dominate the
436
+ energy density, inflation begins.
437
+ In the case of the two vector DM models discussed in this paper, the finite temperature potential
438
+ includes the thermal integral summing over the bosons and fermions [38],
439
+ V 1
440
+ eff(hS, T) =
441
+ n
442
+
443
+ s=1
444
+ gs
445
+
446
+ 1
447
+ 64π2M 4
448
+ s
449
+
450
+ ln
451
+ �M 2
452
+ s
453
+ Λ2
454
+
455
+ − Ci
456
+
457
+ + T 4
458
+ 2π2
459
+ � ∞
460
+ 0
461
+ x2 ln
462
+
463
+ 1 ∓ e−√
464
+ x2±M2s /T 2�
465
+ dx
466
+
467
+ .
468
+ (21)
469
+ For some models, it might be necessary to consider the additional ring diagrams for the bosons, but
470
+ for this investigation they can be ignored as they are insignificant [39]. This thermal potential is
471
+ not amenable to an analytic solution, but can be approximated using modified Bessel functions of
472
+ the second kind [23]. We compute the freeze-out temperature, TFO, numerically with micrOMEGA,
473
+ and the nucleation temperature, Tn, numerically using CosmoTransitions and Bubbleprofiler
474
+ (for cross-checking) [32, 40, 41].
475
+ Let us now consider the thermal history of the model depending on the order of the above three
476
+ temperature thresholds. If Tn > TFO, the phase transition completes before DM freeze-out, and
477
+ the freeze-out then takes place as usual in the broken phase. This means that we can calculate
478
+ the relic abundance as presented in the previous section.
479
+ In the opposite case, Tn < TFO there are three scenarios to consider. The filtered DM scenario
480
+ takes place for the ordering TFO > Tn > Tinf. In this situation, there is no thermal inflation, as the
481
+
482
+ 7
483
+ phase transition completes before inflation would begin, but the DM annihilations are immediately
484
+ out of equilibrium after the phase transition, and therefore the abundance is set by the amount of
485
+ DM particles that are able to enter the boundary to the broken phase, as described in [30].
486
+ The supercool DM scenario [28], takes place for TFO > Tinf > Tn. In this situation, there is a
487
+ period of thermal inflation, which ends at Tn. After inflation, the latent heat stored in the false
488
+ vacuum is released to reheat the universe back to temperature Tinf, under the assumption of instant
489
+ reheating, or to a lower reheating temperature for delayed reheating. However, since TFO > Tinf,
490
+ no DM is produced in reheating and the abundance is set by the amount that was present before
491
+ inflation, diluted by the expansion of the scale factor and by the filtering effect as in the above
492
+ scenario.
493
+ Finally, there is the case where Tinf > TFO. In this situation, assuming instant reheating, the
494
+ reheating will bring DM back to equilibrium, and the relic abundance is again obtained via the
495
+ usual freeze-out mechanism as presented in the previous section.
496
+ The inflation temperature is obtained by solving for Tinf from
497
+ ∆V (Tinf) = V high
498
+ eff
499
+ (hS, Tinf) − V low
500
+ eff (0, Tinf) = g∗π2
501
+ 30 T 4
502
+ inf,
503
+ (22)
504
+ where V high
505
+ eff
506
+ (hS, T) is the true vacuum and V low
507
+ eff (0, T) is the false vacuum. We find that throughout
508
+ the parameter space of interest in this work, we are either in the first or the last situation described
509
+ above, and the DM abundance is thus obtained via the usual freeze-out mechanism in both cases.
510
+ See Appendix A for more on the reheating.
511
+ V.
512
+ DIRECT DETECTION
513
+ In this section, we present the direct detection constraints on the two models. We will see
514
+ that the recent results from the LZ experiment significantly affect the SU(2)D model and that the
515
+ U(1)D model is already very constrained.
516
+ To compute the direct detection cross section, we again use the micrOMEGA package [32]. The
517
+ DM coupling to nucleons arises from the scalar mixing and is mediated via exchange of the SM-like
518
+ Higgs and the scalon in the t-channel leading to a spin-independent cross section with negligible
519
+ difference between protons and neutrons. The results of this computation for both models are
520
+ shown in Figure 2. The correct relic abundance is obtained along the red solid line.
521
+ The purple region is excluded by LHC constraints on to Higgs decays into two scalons [44, 45].
522
+ This process becomes kinetically forbidden for larger DM mass, as larger DM mass leads to larger
523
+ scalon mass as shown in Equation (12). In the orange region, the DM-nucleon cross section is below
524
+ the neutrino floor, and the yellow regions indicate the exclusion limit due to the LZ experiment
525
+ [26], providing a significant improvement over the XENON1T experiment shown in green [42].
526
+ Finally, the grey region shows the projected exclusion limit from XENONnT [43].
527
+ Starting with the U(1)D model we see a small gap in the direct detection limits at the resonance
528
+ region, Mh ≃ 2MV , where the DM mass is around 0.9-1 TeV and the coupling 0.65 ≤ g ≤ 0.7. In
529
+ the middle of this range the direct detection cross section falls below the neutrino floor. Outside of
530
+ the resonance region, the model can not produce an O(1)-fraction of DM without being excluded
531
+ by direct detection, unless the DM mass is well above 10 TeV.
532
+ For the SU(2)D model the new constraints from LZ alter the picture compared to the situation
533
+ with the previous XENON1T limits: the relic abundance line above the resonance region is now
534
+ excluded for DM masses below 7.5 TeV, while prior to the LZ result there were no constraints
535
+ beyond 1 TeV. In the resonance region, we find the nucleation temperature for the phase transition
536
+ below the QCD-scale. This alters the computation for the gravitational wave signal, as the phase
537
+ transition will be completed in conjunction with the QCD phase transition, as discussed in [46, 47].
538
+ This picture slightly changes when including additional scalar self-energy corrections for the SU(2)
539
+
540
+ 8
541
+ (a) Constraints for the the U(1)D model.
542
+ (b) Constraints for the the SU(2)D model.
543
+ FIG. 2. The red line shows the correct relic abundance, Ωh2 = 0.12 [3]. The yellow region is excluded by
544
+ the LZ (2022) experiment [26], the green region is the XENON1T experiment [42], the purple region is
545
+ the LHC constraint for exotic Higgs decay, the orange region is the neutrino floor and the gray region is
546
+ the projected 90% CL constraint from the XENONnT experiment [43].
547
+ model [48]. First, the scalon mass is slightly larger than in our leading order analysis, pushing
548
+ the resonance region in figure 2(b) to the right. Additionally, the correction appears to slightly
549
+ increase the nucleation temperature compared to our results. However, we find that overall the
550
+ resulting gravitational wave (GW) signal is not significantly affected, and the GW signal prediction
551
+ remains comparable to our results presented in the next section.
552
+ For DM mass above 7.5 TeV the model is again allowed by direct detection. In Figure 2 we
553
+ have marked three benchmark points allowed by direct detection with the blue, indigo, and purple
554
+ markers. These points will be used as examples for analyzing the GW signals in the next section.
555
+ VI.
556
+ GRAVITATIONAL WAVES
557
+ The strongly first order phase transition possible in classically scale invariant models is inter-
558
+ esting due to the implications for baryogenesis [49], and due to potentially observable gravitational
559
+ wave (GW) signal.
560
+ To explore the gravitational wave signals, we consider the finite temperature potential in Equa-
561
+ tion (21). This potential contains a barrier between the unbroken false vacuum and the broken
562
+ phase minimum, leading to a first order phase transition. At the nucleation temperature Tn, the
563
+ phase transition will complete via the formation of bubbles of the true vacuum. The expanding
564
+ and colliding bubbles deposit energy in the surrounding plasma, generating gravitational waves as
565
+ described in [50–52].
566
+ For the purpose of solving Equation
567
+ (21) and obtaining the parameters that describe the
568
+ gravitational wave signal, we use the Python package CosmoTransitions[40], with custom modifi-
569
+ cations including a method of computing the β value. The relevant parameters are the latent heat
570
+ normalized with respect to the radiation energy, α, the inverse duration of the phase transition,
571
+
572
+ Constraints ofU(1)p Model
573
+ 1.0
574
+ Qh2 = 0.12
575
+ 0.9
576
+ 0.8
577
+ 9 0.7
578
+ LZ(2022)
579
+ 0.6
580
+ LHC
581
+ KENONIT
582
+ 0.5
583
+ XENONnT
584
+ 0.4
585
+ 300
586
+ 1000
587
+ 2000
588
+ 3000
589
+ 4000
590
+ Mv[GeV]ConstraintsofSU(2)pModel
591
+ 2.0
592
+ Qh2 = 0.12
593
+ 1.8
594
+ 1.6
595
+ 1.4
596
+ 1.0
597
+ XENONIT
598
+ 0.8
599
+ 0.6
600
+ 0.4
601
+ 300
602
+ 1000
603
+ 2000
604
+ 4000
605
+ 8000
606
+ My[GeV]9
607
+ Model
608
+ Benchmark point Parameter CosmoTransitions BubbleProfiler
609
+ U(1)D
610
+ g = 0.66
611
+ MV = 911 GeV
612
+ Tc = 303 GeV
613
+ α
614
+ 20740
615
+ 92180
616
+ β
617
+ 23.8
618
+ 39.2
619
+ Tn
620
+ 7.04 GeV
621
+ 4.78 GeV
622
+ U(1)D
623
+ g = 0.7
624
+ MV = 1028 GeV
625
+ Tc = 336 GeV
626
+ α
627
+ 1497
628
+ 4597
629
+ β
630
+ 36.8
631
+ 49.5
632
+ Tn
633
+ 15.3 GeV
634
+ 11.4 GeV
635
+ SU(2)D
636
+ g = 2.0
637
+ MV = 7530 GeV
638
+ Tc = 2345 GeV
639
+ α
640
+ 0.16
641
+ 0.22
642
+ β
643
+ 289
644
+ 301
645
+ Tn
646
+ 1430 GeV
647
+ 1446 GeV
648
+ .
649
+ FIG. 3. Table with benchmark points used for the discussion of gravitaitonal wave signals. The two first
650
+ benchmark points are from the U(1)D model and the last is from the SU(2)D model.
651
+ β, and the nucleation temperature, Tn, defined as [24, 53],
652
+ α ≡ 1
653
+ ρ
654
+
655
+ ∆V − T
656
+ 4
657
+ d∆V
658
+ dT
659
+ � ����
660
+ Tn
661
+ ,
662
+ β
663
+ H ≡ T d(S/T)
664
+ dT
665
+ ����
666
+ Tn
667
+ ,
668
+ (23)
669
+ where,
670
+ ∆V = V high
671
+ eff
672
+ (hS, T) − V low
673
+ eff (hS, T),
674
+ ρ = geπ2
675
+ 30 T 4
676
+ n,
677
+ (24)
678
+ where the ge ≈ 103 is the number of effective degrees of freedom during the nucleation at the
679
+ temperature Tn. Finally the Euclidean action is defined as,
680
+ S = 4π
681
+ � ∞
682
+ 0
683
+ r2
684
+
685
+ 1
686
+ 2
687
+ �dhφ/S
688
+ dr
689
+ �2
690
+ + Veff(hφ/S)
691
+
692
+ dr,
693
+ (25)
694
+ where r is the radial distance from the center of the true vacuum bubble.
695
+ In order to assess the reliability of the results, we make use of two different numerical tools
696
+ for computing the nucleation temperature and the β and α parameters. The parameters α and β
697
+ depend heavily on the nucleation temperature, Tn, so that possible errors on Tn will propagate to
698
+ α and β. For the computation we use CosmoTransitions and BubbleProfiler[40, 41]. As shown
699
+ in the appendix, we obtain a smaller numerical error with CosmoTransitions, but the results of
700
+ both numerical computations agree within uncertainty. In general, we find that for sub-TeV DM
701
+ masses the nucleation temperature in the BubbleProfiler implementation tends to be smaller
702
+ than in CosmoTransitions.
703
+ In Figure 2, we identify three benchmark points allowed by all constraints. These benchmark
704
+ points are shown in 3 corresponding to the indigo diamond, blue square and purple hexagon shown
705
+ in Figure 2.
706
+ Notice that the first point is below one TeV, the trend we observed regarding the performance of
707
+ the two simulation tools is noticeable, and the BubbleProfiler nucleation temperature is signifi-
708
+ cantly below the value obtained from CosmoTransitions, affecting also the α and β parameters.
709
+ At this point, the critical temperature is Tc = 303.
710
+ In summary, both CosmoTransitions and BubbleProfiler show similar behavior for both
711
+ models and are in reasonable agreement. For high masses the latter tool yields slightly higher
712
+ nucleation temperatures and therefore α is also a bit lower and β as indicated by Equation 23.
713
+
714
+ 10
715
+ Having computed the relevant parameters for calculating gravitational waves (GW) spectra, we
716
+ can consider the following equation for computing the total signal,
717
+ Ωtoth2 = Ωcolh2 + Ωswh2 + Ωturbh2,
718
+ (26)
719
+ where the first term is the collision term, the second term is the sound wave term, and the last
720
+ term is the turbulence term. The collisions from the bubbles themselves contribute to the GW
721
+ spectra, but they do not give the most significant contribution. The collisions also produce bulk
722
+ motion in the fluid. This causes sound waves that result in the primary contribution to the GW
723
+ spectra. Finally, there is also some turbulence caused by the collisions which contribute to the
724
+ GW spectra [23, 52, 54]. The relevant equations for computing the collision term are,
725
+ Ωcolh2(f) = 1.67 · 10−5
726
+
727
+ α
728
+ 1 + α
729
+ �2 H2
730
+ β2
731
+ � ge
732
+ 100
733
+ �− 1
734
+ 3 0.11κ2
735
+ vv3
736
+ b
737
+ 0.42 + v2
738
+ b
739
+ Scol
740
+ Scol(f) =
741
+ 3.8
742
+
743
+ f
744
+ fcol
745
+ �2.8
746
+ 2.8
747
+
748
+ f
749
+ fcol
750
+ �3.8
751
+ + 1
752
+ fcol = 16.5 µHz
753
+ 0.62
754
+ v2
755
+ b − 0.1vb + 1.8
756
+ β
757
+ H
758
+ Tn
759
+ 100 GeV
760
+ � ge
761
+ 100
762
+ � 1
763
+ 6 ,
764
+ (27)
765
+ similarly, the equations for the sound wave term are
766
+ Ωswh2(f) = 2.65 · 10−6
767
+
768
+ α
769
+ 1 + α
770
+ �2 H
771
+ β
772
+ � ge
773
+ 100
774
+ �− 1
775
+ 3 κ2
776
+ vvbSsw
777
+ Ssw(f) =
778
+ � f
779
+ fsw
780
+ �3
781
+
782
+
783
+
784
+ 7
785
+ 3
786
+
787
+ f
788
+ fsw
789
+ �2
790
+ + 4
791
+
792
+
793
+
794
+ 3.5
795
+ fsw = 19 µHz 1
796
+ vb
797
+ β
798
+ H
799
+ Tn
800
+ 100 GeV
801
+ � ge
802
+ 100
803
+ � 1
804
+ 6 ,
805
+ (28)
806
+ and lastly, the equations for the turbulence term are
807
+ Ωturbh2(f) = 3.35 · 10−4
808
+ �κturbα
809
+ 1 + α
810
+ � 3
811
+ 2 H
812
+ β
813
+ � ge
814
+ 100
815
+ �− 1
816
+ 3 vbSturb
817
+ Sturb(f) =
818
+
819
+ f
820
+ fturb
821
+ �3
822
+
823
+ 1 + 8πf
824
+ h∗
825
+ � �
826
+ 1 +
827
+ f
828
+ fturb
829
+ � 11
830
+ 3
831
+ fturb = 22.7 µHz 1
832
+ vb
833
+ β
834
+ H
835
+ Tn
836
+ 100 GeV
837
+ � ge
838
+ 100
839
+ � 1
840
+ 6 ,
841
+ (29)
842
+ where the inverse Hubble time, h∗, red-shifted to today, at the GW production is given as
843
+ h∗ = 1.65 · 10−5
844
+ Tn
845
+ 100 GeV
846
+ � ge
847
+ 100
848
+ � 1
849
+ 6 ,
850
+ (30)
851
+
852
+ 11
853
+ FIG. 4. The GW spectra for two different sets of transition parameters for the U(1)D model and one
854
+ for the SU(2)D model (g = 2.0, MV = 7530) computed with CosmoTransitions, dashed lines, and
855
+ BubbleProfiler, dotted lines. The sensitivity curves (C1-C4) of the LISA detector are also shown [27].
856
+ According to this result, the signals from this model are strong enough for LISA to detect the GW signal
857
+ from the phase transition.
858
+ and the two modified efficiency factors can be written as,
859
+ κv =
860
+ α
861
+ 0.73 + 0.083√α + α,
862
+ κturb = 0.05κv.
863
+ (31)
864
+ The result of this computation can be seen in Figure 4 for the three benchmark points, two
865
+ from the U(1)D model and one from the SU(2)D.
866
+ The marker shape indicates the parameter as shown in Figure 2. The diamond and square
867
+ shapes are from the U(1)D model. For SU(2)D model we have the high mass case marked by
868
+ the hexagon shape. The projected sensitivity curves (for the configurations C1-C4) for the LISA
869
+ detector are also shown [27], and one can see that for the U(1)D model the signal should be
870
+ detectable by three out of four configurations, but for the SU(2)D model the mass becomes too
871
+ high and we need other future experiments to detect such high DM mass models such as the
872
+ proposed TianQin detector [55].
873
+ VII.
874
+ DISCUSSION AND CONCLUSIONS
875
+ We have investigated two vector DM models in light of existing DM direct detection experiments
876
+ and future GW experiments. Both of the models investigated in this work are already strongly
877
+ constrained by direct detection. For the SU(2)D model this is in particular due to recent results
878
+
879
+ Gravitational wavespectra of selectedpoints
880
+ 10-5
881
+ 10
882
+ 10~9
883
+ yo
884
+ 10-11
885
+ 10-13
886
+ C1
887
+ g = 0.66 My= 911 [GeV]
888
+ 10-15
889
+ C2
890
+ g= 0.70 My = 1028 [GeV]
891
+ C3
892
+ g = 2.0 My = 7530 [GeV]
893
+ C4
894
+ 10~17
895
+ 10-4
896
+ 10-3
897
+ 10-2
898
+ 10-1
899
+ f[Hz]12
900
+ from the LZ experiment which has ruled out most of parameter space consistent with a full relic
901
+ abundance from freeze-out in the range MV ∈ (1 − 10) TeV and with XENONnT the DM will
902
+ either be detected or the entire parameter space above the neutrino floor will be ruled out as shown
903
+ in Figure 2.
904
+ GW signals in both models have been discussed in earlier literature. In our analysis we find
905
+ that results differ significantly between different numerical implementations. Recently, the SU(2)D
906
+ model was discussed in [48], and we find that their results for the α and Tn parameters agree with
907
+ our findings.
908
+ Regarding the U(1)D model, it was previously suggested that GW signals could be used to probe
909
+ the model in case the direct detection cross section remains below the neutrino floor [23]. We agree
910
+ with this conclusion, but numerically we find differences to [23] in the GW parameters. While we
911
+ can reproduce the critical temperature reported, the nucleation temperature and the α and β
912
+ parameters differ from those reported in [23]. Their results were obtained with the AnyBubble
913
+ package [56], for which we failed to obtain results in agreement with the other two numerical
914
+ implementations used in this work.
915
+ This raises the question of comparability between the phase transition parameters obtained via
916
+ the various numerical implementations available. This issue has been investigated in [41], where
917
+ a fairly good agreement between BubbleProfiler and CosmoTransitions is observed. This is
918
+ compatible with our findings.
919
+ The finite temperature potential in both cases leads to a strong first order electroweak phase
920
+ transition. The U(1)D model can produce significant GW signals, which can be detected by LISA
921
+ [27] and future experiments would be able to test the SU(2)D model also in the high DM mass
922
+ regime.
923
+ ACKNOWLEDGMENTS
924
+ The financial support from Academy of Finland, project #342777, is gratefully acknowledged.
925
+ MTF and MR acknowledge partial funding from The Independent Research Fund Denmark, grant
926
+ numbers DFF 6108-00623 and DFF 1056-00027B, respectively. MET acknowledges funding from
927
+ Augustinus Fonden, application #22−19584, to cover part of the expenses associated with visiting
928
+ the University of Helsinki for half a year.
929
+ Appendix A: Supercooling, inflation and reheating
930
+ The investigation of the GW spectra leads to the discussion of supercooling in the models
931
+ presented. As shown in the GW section there are orders of magnitude in the difference between
932
+ the critical and nucleation temperature at the low mass scale. As discussed in the other papers, this
933
+ can lead to different kinds of phenomena including inflation, filtering and, reheating [28, 30, 37].
934
+ These effects are expected to affect the GW signal for low masses, and it might effects some of
935
+ the results even presented in Figure 4, but it is beyond this paper to look at the details of this.
936
+ As discussed in a recent paper, the universe could escape inflation via bubble nucleation or via
937
+ quantum tunneling, two different scenarios leading to different GW signals [36].
938
+ We would however like to highlight the fact that strong supercooling from hundreds of GeV to
939
+ the QCD scale might not be a big issue for the models. The bigger the supercooling the greater
940
+ the inflation as the scalon Higgs field will be stuck in a false vacuum acting like a cosmological
941
+ constant. The main constraint for any possible is lover than the max number of e-folds,
942
+ Nmax = 23.8 + ln TR
943
+ TeV,
944
+ (A1)
945
+
946
+ 13
947
+ where TR is the reheating temperature after the inflationary epoch and one finds that this limits the
948
+ temperature to TR < 6.6· 1015 GeV [36]. To compute the reheating temperature, we are interested
949
+ in computing the decay of the inflaton-like field which in this case is the scalon Higgs field S for the
950
+ U(1)D model. Due to the mass constraints, only the scalon Higgs is kinetically allowed to decay
951
+ as Γ(hS → h, h), but this requires a DM mas of MV > 1 TeV. From the Lagrangian, we find that
952
+ the Feynman rule for this vertex and this yields the decay,
953
+ Γ(hS → 2h) =
954
+
955
+ M 2
956
+ S − 4M 2
957
+ h
958
+ 32πM 2
959
+ S
960
+ |M|2,
961
+ (A2)
962
+ where,
963
+ |M|2 =
964
+ �M 2
965
+ h
966
+ 4v1
967
+ (5 + 3 cos(4α)) sin(α)
968
+ �2
969
+ .
970
+ (A3)
971
+ We can furthermore include decays into quarks and leptons,
972
+ Γ(hS → f ¯f/ℓ¯ℓ) = NC
973
+
974
+ m2
975
+ b
976
+ v2
977
+ 1
978
+ MS
979
+
980
+ 1 − 4m2
981
+ b
982
+ M 2
983
+ φ
984
+ sin(α)2.
985
+ (A4)
986
+ where NC = 3 for fermions and NC = 1 for leptons. Using the decays one can calculate the
987
+ reheating temperature, TR, using the following equation [57],
988
+ TR ≈ 0.2
989
+ �200
990
+ g∗
991
+ �1/4 �
992
+ ΓMpl,
993
+ (A5)
994
+ where Mpl is the reduced Planck mass and g∗ = 103.
995
+ Considering a rather low mixing value
996
+ 0 ≤ α ≤
997
+ π
998
+ 64 and a mass range of 250 GeV ≤ MV ≤ 2500 GeV the reheating temperature is
999
+ somewhere around 0.1-1.6 PeV yielding mass of the scalon field around 1 GeV < MS < 200 GeV.
1000
+ This is so hot that the universe will reheat back to a temperature much hotter than the scales
1001
+ of freeze-out. It also satisfies the constraint from Equation (A1), thus it is not too hot and not
1002
+ causing too much inflation. One can repeat this exercise for the SU(2)D, but the result is roughly
1003
+ the same with the main differences being a slightly heavier scalon mass, 1 GeV < MS < 350 GeV,
1004
+ and higher reheating temperature 0.1-2 PeV. Conclusively, dark matter production can take place
1005
+ via freeze-out as the universe subsequently cools down again.
1006
+ Appendix B: Model implementation in CosmoTransitions
1007
+ For the implementation of the model in CosmoTransitions we feed in the tree level potentials
1008
+ as shown in Equation (2) and (6). Then we manually implement the mass matrix with the massive
1009
+ SM bosons, plus the new bosons, and the top quark,
1010
+ M 2
1011
+ W = g2
1012
+ W
1013
+ 4 h2
1014
+ 1,
1015
+ M 2
1016
+ Z = g2
1017
+ W + g2
1018
+ Z
1019
+ 4
1020
+ h2
1021
+ 1,
1022
+ m2
1023
+ t = λ2
1024
+ t
1025
+ 2 h2
1026
+ 1,
1027
+ (B1)
1028
+ where the Yukawa coupling of the top quark is λt = 1. The DM candidate have their respective
1029
+ implementations for each model where,
1030
+ M 2
1031
+ V = cV g2h2
1032
+ 2,
1033
+ (B2)
1034
+
1035
+ 14
1036
+ with cV = 1 (1/4) for the U(1)D (SU(2)D) model, and then the scalar mass matrices yield,
1037
+ M 2
1038
+ h,S(U(1)D) = 1
1039
+ 4
1040
+
1041
+ h2
1042
+ 1 (λh + 2λφh) + h2
1043
+ 2(λφ + 2λφh)
1044
+ ±
1045
+
1046
+ h4
1047
+ 1 (λh − 2λφh)2 + h4
1048
+ 2 (λφ − 2λφh)2 + 2h2
1049
+ 1h2
1050
+ 2
1051
+
1052
+ 2λhλφh + 28λ2
1053
+ φh − λhλφ + 2λφλφh
1054
+
1055
+
1056
+ (B3)
1057
+ M 2
1058
+ h,S(SU(2)D) = 1
1059
+ 4
1060
+
1061
+ h2
1062
+ 1 (6λH + λHS) + h2
1063
+ 2(6λS + λHS)
1064
+ ±
1065
+
1066
+ h4
1067
+ 1 (λHS − 6λH)2 + h4
1068
+ 2 (λHS − 6λS)2 + 2h2
1069
+ 1h2
1070
+ 2 (6λH(λHS − 6λHS) + λHS(7λHS + 6λS))
1071
+
1072
+ , (B4)
1073
+ A custom solution is made for computing the beta value. This is done by simply calculating the
1074
+ action divided by the temperature around the point of the nucleation temperature, making a fit
1075
+ to those plots, and taken the derivative etc. Some tweaks have been done to the source code to
1076
+ make this work, and also to improve the precision at low nucleation temperatures.
1077
+ Appendix C: Model implementation in BubbleProfiler
1078
+ For this package, we give it the full thermal potential in Equation (21), but instead of evaluating
1079
+ the thermal integral an approximation is made using Bessel function[23]. Specifically we use the
1080
+ modified Bessel functions, K2(kx), as follows
1081
+ � ∞
1082
+ 0
1083
+ x2 ln
1084
+
1085
+ 1 ∓ e−√
1086
+ x2±M2s /T 2�
1087
+ dx = −
1088
+ 3
1089
+
1090
+ k=1
1091
+ x2
1092
+ k2K2(kx) −
1093
+ 2
1094
+
1095
+ k=1
1096
+ (−1)kx2
1097
+ k2
1098
+ K2(kx).
1099
+ (C1)
1100
+ The BubbleProfiler is written in C++, but comes with a command line interface (CLI). Using
1101
+ this one can implement simple potentials like polynomials. In order to avoid implementing all
1102
+ these functions, we created a python interface where we implement the model in python. Then
1103
+ we create a higher order polynomial fit to the full potential.
1104
+ This polynomial is then fed to
1105
+ BubbleProfiler via the CLI together with other relevant parameters. We compute several points
1106
+ around the nucleation temperature and make a fit to that and from there we determine the β and
1107
+ Tn value, and the latter is then used to find α.
1108
+ Appendix D: Computing parameters of the EWPT
1109
+ The essential computation for the phase transition is finding the relationship between the action
1110
+ and temperature. The nucleation temperature condition is defined as
1111
+ S(T)
1112
+ T
1113
+ ����
1114
+ Tn
1115
+ ≈ 140,
1116
+ (D1)
1117
+ thus when the action divided by the temperature is equal to 140. We can compute the action and
1118
+ by dividing by the temperature a plot of this relationship can be obtained as seen in Figure 5.
1119
+ Given some data points, it is possible to make a fit, and from that read off the Tn value.
1120
+ Furthermore, the fit is also a function of S(T)/T, which can thus be used to compute β. Now
1121
+
1122
+ 15
1123
+ (a) Using BubbleProfiler for computing parameters.
1124
+ (b) Using CosmoTransitions for computing
1125
+ parameters.
1126
+ FIG. 5. A comparison of the apparent error when computing the β and Tn parameter when computing
1127
+ the EWPT parameters in U(1)D model for g = 0.75 and MV = 1184. Note the temperature range is
1128
+ different for the implementation, thus the range is different in the plots.
1129
+ recall that α is evaluated at the nucleation temperature and α ∝ 1/T 4
1130
+ n, thus, the value of α
1131
+ is also highly dependent on the nucleation temperature.
1132
+ Since our BubbleProfiler result in
1133
+ general yields a slightly higher nucleation temperature we get a lower value of α as discussed in
1134
+ the GW section. For lower masses the BubbleProfiler result yield significantly lower nucleation
1135
+ temperatures suggesting that our implementation might not be as good in this regime.
1136
+ Looking at Figure 5, we see that the apparent error of the BubbleProfiler is significantly
1137
+ higher than the error from the CosmoTransitions result. This may be attributed to the fact that
1138
+ we used an approximated potential via our custom Python interface instead of implementing the
1139
+ model using C++. This leads us to consider the CosmoTransitions as the better result in this
1140
+ paper even though BubbleProfiler is claimed to be more accurate [41].
1141
+ [1] Fritz Zwicky. The redshift of extragalactic nebulae. Helvetica Physica Acta, 1933.
1142
+ [2] Vera
1143
+ C.
1144
+ Rubin.
1145
+ The
1146
+ rotation
1147
+ of
1148
+ spiral
1149
+ galaxies.
1150
+ Science,
1151
+ 1983,
1152
+ https://www.science.org/doi/pdf/10.1126/science.220.4604.1339.
1153
+ URL
1154
+ https://www.science.
1155
+ org/doi/abs/10.1126/science.220.4604.1339.
1156
+ [3] The Planck Collaboration. Planck 2018 results. Astronomy & Astrophysics, Sep 2020, 1807.06209.
1157
+ ISSN 1432-0746.
1158
+ [4] Lars Bergstr¨om. Nonbaryonic dark matter: Observational evidence and detection methods. Rept.
1159
+ Prog. Phys., 2000, hep-ph/0002126.
1160
+ [5] Gianfranco Bertone and Dan Hooper. History of dark matter. Rev. Mod. Phys., 2018, 1605.04909.
1161
+ [6] Jaco de Swart, Gianfranco Bertone, and Jeroen van Dongen. How Dark Matter Came to Matter.
1162
+ Nature Astron., 2017, 1703.00013.
1163
+ [7] M. Kawasaki, Kazunori Kohri, and Naoshi Sugiyama. MeV scale reheating temperature and ther-
1164
+ malization of neutrino background. Phys. Rev. D, 2000, astro-ph/0002127.
1165
+ [8] Steen Hannestad. What is the lowest possible reheating temperature? Phys. Rev. D, 2004, astro-
1166
+
1167
+ S(T)/T plot
1168
+ data points
1169
+ 160
1170
+ fit
1171
+ 155
1172
+ 150
1173
+ 145
1174
+ /(L)S
1175
+ 140
1176
+ 135
1177
+ 130
1178
+ 125
1179
+ 22.5
1180
+ 25.0
1181
+ 27.5
1182
+ 30.0
1183
+ 32.5
1184
+ 35.0
1185
+ 37.5
1186
+ 40.0
1187
+ Temperature[GeV]S(T)/T plot
1188
+ data points
1189
+ 200
1190
+ fit
1191
+ 180
1192
+ 160
1193
+ /()S
1194
+ 140
1195
+ 120
1196
+ 100
1197
+ 10
1198
+ 20
1199
+ 30
1200
+ 40
1201
+ 50
1202
+ 60
1203
+ 70
1204
+ 80
1205
+ Temperature[GeV]16
1206
+ ph/0403291.
1207
+ [9] Kazuhide Ichikawa, Masahiro Kawasaki, and Fuminobu Takahashi. The Oscillation effects on ther-
1208
+ malization of the neutrinos in the Universe with low reheating temperature. Phys. Rev. D, 2005,
1209
+ astro-ph/0505395.
1210
+ [10] Francesco De Bernardis, Luca Pagano, and Alessandro Melchiorri. New constraints on the reheating
1211
+ temperature of the universe after WMAP-5. Astropart. Phys., 2008.
1212
+ [11] N. Aghanim et al. Planck 2018 results. VI. Cosmological parameters. Astron. Astrophys., 2020,
1213
+ 1807.06209. [Erratum: Astron.Astrophys. 652, C4 (2021)].
1214
+ [12] The CMS Collaboration. A measurement of the higgs boson mass in the diphoton decay channel.
1215
+ Phys. Lett. B, 2020. https://arxiv.org/pdf/2002.06398.pdf.
1216
+ [13] Eldad Gildener and Steven Weinberg. Symmetry breaking and scalar bosons. Phys. Rev. D, Jun
1217
+ 1976. https://link.aps.org/doi/10.1103/PhysRevD.13.3333.
1218
+ [14] We-Fu Chang, John N. Ng, and Jackson M. S. Wu. Shadow Higgs from a scale-invariant hidden
1219
+ U(1)(s) model. Phys. Rev. D, 2007, hep-ph/0701254.
1220
+ [15] Robert Foot, Archil Kobakhidze, and Raymond R. Volkas. Electroweak Higgs as a pseudo-Goldstone
1221
+ boson of broken scale invariance. Phys. Lett. B, 2007, 0704.1165.
1222
+ [16] Krzysztof A. Meissner and Hermann Nicolai. Conformal Symmetry and the Standard Model. Phys.
1223
+ Lett. B, 2007, hep-th/0612165.
1224
+ [17] Jose Ramon Espinosa and Mariano Quiros. Novel Effects in Electroweak Breaking from a Hidden
1225
+ Sector. Phys. Rev. D, 2007, hep-ph/0701145.
1226
+ [18] Thomas Hambye. Hidden vector dark matter. Journal of High Energy Physics, jan 2009, 0811.0172.
1227
+ [19] Christopher D. Carone and Raymundo Ramos. Classical scale-invariance, the electroweak scale and
1228
+ vector dark matter. Phys. Rev. D, 2013, 1307.8428.
1229
+ [20] Christoph Englert, Joerg Jaeckel, V. V. Khoze, and Michael Spannowsky. Emergence of the elec-
1230
+ troweak scale through the higgs portal. JHEP, 2013, 1301.4224.
1231
+ [21] Emidio Gabrielli, Matti Heikinheimo, Kristjan Kannike, Antonio Racioppi, Martti Raidal, and Chris-
1232
+ tian Spethmann. Towards Completing the Standard Model: Vacuum Stability, EWSB and Dark
1233
+ Matter. Phys. Rev. D, 2014, 1309.6632.
1234
+ [22] Seyed Yaser Ayazi and Ahmad Mohamadnejad. Conformal vector dark matter and strongly first-
1235
+ order electroweak phase transition. Journal of High Energy Physics, Mar 2019, 1901.04168. ISSN
1236
+ 1029-8479.
1237
+ [23] Ahmad Mohamadnejad. Gravitational waves from scale-invariant vector dark matter model: probing
1238
+ below the neutrino-floor. The European Physical Journal C, Mar 2020, 1907.08899. ISSN 1434-6052.
1239
+ [24] Thomas Hambye and Alessandro Strumia. Dynamical generation of the weak and dark matter scale.
1240
+ Physical Review D, Sep 2013, 1306.2329. ISSN 1550-2368.
1241
+ [25] Yue Meng et al. Dark matter search results from the PandaX-4t commissioning run. Physical Review
1242
+ Letters, dec 2021, 2107.13438.
1243
+ [26] The LUX-ZEPLIN (LZ) Collaboration). First dark matter search results from the lux-zeplin (lz)
1244
+ experiment, 2022. https://arxiv.org/pdf/1907.08899.pdf.
1245
+ [27] Chiara Caprini, Mark Hindmarsh, Stephan Huber, Thomas Konstandin, Jonathan Kozaczuk, Ger-
1246
+ mano Nardini, Jose Miguel No, Antoine Petiteau, Pedro Schwaller, G´eraldine Servant, and et al.
1247
+ Science with the space-based interferometer elisa. ii: gravitational waves from cosmological phase
1248
+ transitions. Journal of Cosmology and Astroparticle Physics, Apr 2016, 1512.06239. ISSN 1475-7516.
1249
+ [28] Thomas Hambye, Alessandro Strumia, and Daniele Teresi. Super-cool dark matter. Journal of High
1250
+ Energy Physics, Aug 2018, 1805.01473. ISSN 1029-8479.
1251
+ [29] Dongjin Chway, Tae Hyun Jung, and Chang Sub Shin. Dark matter filtering-out effect during a
1252
+ first-order phase transition. Phys. Rev. D, 2020, 1912.04238.
1253
+ [30] Michael J. Baker, Joachim Kopp, and Andrew J. Long. Filtered dark matter at a first order phase
1254
+ transition. Physical Review Letters, Oct 2020, 1912.02830. ISSN 1079-7114.
1255
+ [31] Iason Baldes, Yann Gouttenoire, Filippo Sala, and G´eraldine Servant. Supercool composite Dark
1256
+
1257
+ 17
1258
+ Matter beyond 100 TeV. JHEP, 2022, 2110.13926.
1259
+ [32] D. Barducci et al.
1260
+ The user’s manual, version 5.2, March 2020.
1261
+ https://lapth.cnrs.fr/
1262
+ micromegas/v5.2/manual_5.2.pdf.
1263
+ [33] A. Semenov. Lanhep - a package for automatic generation of feynman rules from the lagrangian.
1264
+ updated version 3.2, 2014, 1412.5016.
1265
+ [34] Alexander Belyaev, Neil D. Christensen, and Alexander Pukhov. Calchep 3.4 for collider physics
1266
+ within and beyond the standard model. Computer Physics Communications, Jul 2013, 1207.6082.
1267
+ ISSN 0010-4655.
1268
+ [35] Lawrence J. Hall, Karsten Jedamzik, John March-Russell, and Stephen M. West. Freeze-in production
1269
+ of fimp dark matter. Journal of High Energy Physics, Mar 2010, 0911.1120. ISSN 1029-8479.
1270
+ [36] Marek Lewicki, Oriol Pujol`as, and Ville Vaskonen. Escape from supercooling with or without bubbles:
1271
+ gravitational wave signatures. The European Physical Journal C, Sep 2021, 2106.09706. ISSN 1434-
1272
+ 6052.
1273
+ [37] Iason Baldes, Yann Gouttenoire, Filippo Sala, and G´eraldine Servant. Supercool composite dark
1274
+ matter beyond 100 tev, 2021, 2110.13926.
1275
+ [38] L. Dolan and R. Jackiw. Symmetry behavior at finite temperature. Phys. Rev. D, Jun 1974. https:
1276
+ //link.aps.org/doi/10.1103/PhysRevD.9.3320.
1277
+ [39] M. E. Carrington. Effective potential at finite temperature in the standard model. Phys. Rev. D,
1278
+ Apr 1992. https://link.aps.org/doi/10.1103/PhysRevD.45.2933.
1279
+ [40] Carroll L. Wainwright. Cosmotransitions: Computing cosmological phase transition temperatures
1280
+ and bubble profiles with multiple fields. Computer Physics Communications, Sep 2012, 1109.4189.
1281
+ ISSN 0010-4655.
1282
+ [41] Peter Athron, Csaba Bal´azs, Michael Bardsley, Andrew Fowlie, Dylan Harries, and Graham White.
1283
+ Bubbleprofiler: Finding the field profile and action for cosmological phase transitions. Computer
1284
+ Physics Communications, Nov 2019, 1901.03714. ISSN 0010-4655.
1285
+ [42] E. et al. Aprile. First dark matter search results from the xenon1t experiment. Physical Review
1286
+ Letters, Oct 2017, 1705.06655. ISSN 1079-7114.
1287
+ [43] E. et al. Aprile. Projected wimp sensitivity of the xenonnt dark matter experiment. Journal of
1288
+ Cosmology and Astroparticle Physics, Nov 2020, 2007.08796. ISSN 1475-7516.
1289
+ [44] Georges Aad et al. Search for invisible Higgs-boson decays in events with vector-boson fusion sig-
1290
+ natures using 139 fb−1 of proton-proton data recorded by the ATLAS experiment. JHEP, 2022,
1291
+ 2202.07953.
1292
+ [45] Armen Tumasyan et al. Search for invisible decays of the Higgs boson produced via vector boson
1293
+ fusion in proton-proton collisions at s=13 TeV. Phys. Rev. D, 2022, 2201.11585.
1294
+ [46] Satoshi Iso, Pasquale D. Serpico, and Kengo Shimada. QCD-Electroweak First-Order Phase Transi-
1295
+ tion in a Supercooled Universe. Phys. Rev. Lett., 2017, 1704.04955.
1296
+ [47] Benedict von Harling and Geraldine Servant. QCD-induced Electroweak Phase Transition. JHEP,
1297
+ 2018, 1711.11554.
1298
+ [48] Maciej Kierkla, Alexandros Karam, and Bogumila Swiezewska. Conformal model for gravitational
1299
+ waves and dark matter: A status update, 2022. https://arxiv.org/pdf/2210.07075.pdf.
1300
+ [49] A. D. Sakharov. Violation of cp invariance, c asymmetry, and baryon asymmetry of the universe.
1301
+ Pisma Zh. Eksp. Teor. Fiz., 1967.
1302
+ [50] Stephan J Huber and Thomas Konstandin. Gravitational wave production by collisions: more bub-
1303
+ bles. Journal of Cosmology and Astroparticle Physics, Sep 2008, 0806.1828. ISSN 1475-7516.
1304
+ [51] Riccardo Apreda, Michele Maggiore, Alberto Nicolis, and Antonio Riotto. Gravitational waves from
1305
+ electroweak phase transitions. Nuclear Physics B, Jun 2002, gr-qc/0107033. ISSN 0550-3213.
1306
+ [52] Marc Kamionkowski, Arthur Kosowsky, and Michael S. Turner. Gravitational radiation from first-
1307
+ order phase transitions. Physical Review D, Mar 1994, astro-ph/9310044. ISSN 0556-2821.
1308
+ [53] John Ellis, Marek Lewicki, Jos´e Miguel No, and Ville Vaskonen. Gravitational wave energy budget in
1309
+ strongly supercooled phase transitions. Journal of Cosmology and Astroparticle Physics, Jun 2019,
1310
+
1311
+ 18
1312
+ 1903.09642. ISSN 1475-7516.
1313
+ [54] Tommi Alanne, Thomas Hugle, Moritz Platscher, and Kai Schmitz. A fresh look at the gravitational-
1314
+ wave signal from cosmological phase transitions.
1315
+ Journal of High Energy Physics, Mar 2020,
1316
+ 1909.11356. ISSN 1029-8479.
1317
+ [55] Jun Luo, Li-Sheng Chen, Hui-Zong Duan, Yun-Gui Gong, Shoucun Hu, Jianghui Ji, Qi Liu, Jianwei
1318
+ Mei, Vadim Milyukov, Mikhail Sazhin, Cheng-Gang Shao, Viktor T Toth, Hai-Bo Tu, Yamin Wang,
1319
+ Yan Wang, Hsien-Chi Yeh, Ming-Sheng Zhan, Yonghe Zhang, Vladimir Zharov, and Ze-Bing Zhou.
1320
+ TianQin: a space-borne gravitational wave detector.
1321
+ Classical and Quantum Gravity, jan 2016,
1322
+ 1512.02076.
1323
+ [56] Ali Masoumi, Ken D. Olum, and Jeremy M. Wachter.
1324
+ Approximating tunneling rates in multi-
1325
+ dimensional field spaces. Journal of Cosmology and Astroparticle Physics, Oct 2017, 1702.00356.
1326
+ ISSN 1475-7516.
1327
+ [57] Kai Schmitz and Gilles Vertongen. Reheating and preheating after inflation : an introduction, 2010.
1328
+ https://www.desy.de/~westphal/workshop_seminar_fall_2010/reheating.pdf.
1329
+
5NAyT4oBgHgl3EQfQPZ4/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/2301.01700v1.pdf.txt ADDED
@@ -0,0 +1,1572 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01700v1 [cs.GT] 4 Jan 2023
2
+ Non-Adaptive Matroid Prophet Inequalities
3
+ Kanstantsin Pashkovich, Alice Sayutina
4
+ University of Waterloo
5
+ Department of Combinatorics & Optimization
6
+ 200 University Avenue West
7
+ Waterloo, ON, Canada
8
+ N2L 3G1
9
+ Abstract
10
+ We consider the matroid prophet inequality problem. This problem
11
+ has been extensively studied in the case of adaptive mechanisms. In par-
12
+ ticular, there is a tight 2-competitive mechanism for all matroids [KW12].
13
+ However, it is not known what classes of matroids admit non-adaptive
14
+ mechanisms with constant guarantee.
15
+ Recently, in [CGKM20] it was
16
+ shown that there are constant-competitive non-adaptive mechanisms for
17
+ graphic matroids. In this work, we show that various known classes of
18
+ matroids admit constant-competitive non-adaptive mechanisms.
19
+ 1
20
+ Introduction
21
+ Let us consider the classical prophet inequality problem [KS77].
22
+ A gambler
23
+ observes a sequence of non-negative independent random variables X1, X2, . . . ,
24
+ Xn, which correspond to a sequence of values for n items. The gambler knows
25
+ the distributions of X1, X2, . . . , Xn. The gambler is allowed to accept at most
26
+ one item; and the gambler is interested in maximizing the value of the accepted
27
+ item. However, the gambler cannot simply select an item of the maximum value,
28
+ because the values of the n items are revealed to the gambler one by one; and
29
+ each time a value of the current item is revealed the gambler has to make an
30
+ irrevocable choice whether to accept the current item or not.
31
+ What stopping rule the gambler should use to maximize the expected value of
32
+ the item they accept? The gambler knows only the distributions of X1, X2, . . . ,
33
+ Xn while a prophet knows the realization of X1, X2, . . . , Xn. Thus, in contrast
34
+ to the gambler the prophet can always obtain the maximum item’s value. The
35
+ seminal result of Krengel and Sucheston [KS77] showed that the gambler can
36
+ obtain at least a half of the expected value obtained by the prophet.
37
+ The classical prophet inequality problem led to a series of works on different
38
+ variants of the problem. A natural variant of the problem is the generalization
39
+ 1
40
+
41
+ of the problem where a gambler can buy more than one item, but the set of
42
+ bought items should satisfy a known feasibility constraint. Formally, let us be
43
+ given a collection S ⊆ 2[n] of item sets. Then both gambler and prophet can
44
+ select any item set S from S. So S defines a feasibility constraint for selecting
45
+ items. In most standard examples of feasibility constraints, S can be defined as
46
+ a collection of all item sets with cardinality at most k for some natural number k.
47
+ More generally S can be defined as a collection of all independent sets in some
48
+ matroid, in this case we speak about the matroid prophet inequality problem.
49
+ The result in [SC84] showed that in the single-item setting a gambler can
50
+ obtain at least half of the prophet value by using the following threshold-rule:
51
+ determine a constant T as a function of known distributions and accept the first
52
+ item exceeding T . This rule results in a 2-competitive mechanism, similar to
53
+ the adaptive approach of [KS77]. Note, that this approximation guarantee is
54
+ known to be tight. There is also another method to set a threshold presented in
55
+ [KW12], which also results in a 2-competitive mechanism. This was extended
56
+ by Chawla et al. in [CHMS10] and [CGKM20] to the setting of several items.
57
+ The results presented in [KW12] further extend to the matroid prophet in-
58
+ equalities, where accepted items need to form an independent set in a known
59
+ matroid. It leads to a 2-competitive mechanism for every matroid, matching
60
+ the single-item setting result. However, unlike the mechanism in the single-item
61
+ setting, the mechanism for matroids is adaptive: the thresholds for items are
62
+ computed based on the previously accepted items. By [KW12], there also exists
63
+ a constant-competitive adaptive mechanism for feasibility constraints defined as
64
+ an intersection of constant number of matroids. The mechanism by Kleinberg
65
+ and Weinberg was further extended to a 2-competitive mechanism for polyma-
66
+ troids by Dütting and Kleinberg in [DK15].
67
+ Gravin and Wang [GW19] studied the bipartite matching version of this
68
+ problem: in their version, the arriving items are the edges of the (known) bi-
69
+ partite graph. Gravin and Wang obtained a 3-competitive non-adaptive mech-
70
+ anism, which assigns thresholds to each vertex in the graph and an edge is
71
+ accepted only if its weight is at least the sum of the thresholds associated with
72
+ its endpoints.
73
+ Feldman, Svensson and Zenklusen [FSZ16] studied online item selection
74
+ mechanisms called “online contention resolution schemes" (OCRS). They showed
75
+ that given special properties, OCRS translate directly into a constant-competitive
76
+ prophet inequality for the same problem against almighty adversary, i.e. an ad-
77
+ versary which knows in advance realizations of all the items and the random
78
+ bits generated by an algorithm. As a result, they develop a constant-competitive
79
+ mechanism for prophet inequalities of the intersection of a constant number of
80
+ matroids, knapsack and matching constraints. Those mechanisms are “almost”
81
+ non-adaptive in a sense that they fix thresholds for all items, however their mech-
82
+ anisms also impose a subconstraint: an item cannot be accepted if together with
83
+ previously accepted items it forms one of the fixed forbidden sets.
84
+ Finally, in a later version of their paper [FSZ21], they prove that pure non-
85
+ adaptive mechanisms cannot achieve a constant-competitive approximation even
86
+ against a “normal” adversary. They construct a family of gammoid matroids
87
+ 2
88
+
89
+ showing a lower bound of Ω(log n/ log log n) for a guarantee of non-adaptive
90
+ mechanisms on gammoids with n elements.
91
+ There have been works studying similar setups with other goals. Chawla
92
+ et al. [CHMS10] studied a Bayesian item selection process in a fixed item ar-
93
+ rival order or against an adversary in control of the order. They studied it
94
+ from a perspective of the revenue maximization for the auctioneer. The per-
95
+ formance is constant-competitive compared to the well-known Myerson mech-
96
+ anism
97
+ [Mye81], which achieves the largest possible expected revenue among
98
+ truthful mechanisms. The mechanism by Chawla et al. [CHMS10] has an ad-
99
+ vantage that it determines static thresholds together with a subconstraint so
100
+ that each agent can be offered take-it-or-leave-it prices in an online fashion.
101
+ Recently, Chawla et al. [CGKM20] developed a 32-competitive non-adaptive
102
+ mechanism for graphic matroids against adversary item ordering.
103
+ 1.1
104
+ Our results
105
+ First, we list the known results for non-adaptive mechanism that were mentioned
106
+ in the previous section.
107
+ Theorem 1 (Uniform Rank 1 Matroid [SC84]). There exists a 2-competitive
108
+ non-adaptive mechanism for single-item setting.
109
+ Theorem 2 (Graphic Matroid [CGKM20]). There exists a 32-competitive
110
+ non-adaptive mechanism for graphic matroids.
111
+ Now let us list our results. In case of a simple graph, i.e. a graph with no
112
+ parallel edges or loops, we can slightly improve the above theorem by considering
113
+ essentially the same mechanism as [CGKM20] but considering a different scaling
114
+ of a point from the matroid polytope. We provide this result for the sake of
115
+ completeness.
116
+ Theorem 3. There exists a 16-competitive non-adaptive mechanism for graphic
117
+ matroids in the case of simple graphs.
118
+ Furthermore, the mechanism [CGKM20] can be generalized to the setting of
119
+ k-column sparse matroids. This result we need later to obtain Theorem 8.
120
+ Theorem 4 (k-Column Sparse Matroids). There exists a (2k+2k)-competitive
121
+ non-adaptive mechanism for k-column sparse matroids.
122
+ Note, that Theorem 2 of [CGKM20] follows from Theorem 4, since a graphic
123
+ matroid is also a 2-column sparse matroid over F2.
124
+ Using analogous approach to the one in [Sot13], we also develop a mechanism
125
+ for cographic matroids.
126
+ Theorem 5 (Cographic Matroids). There exists a 6-competitive non-adaptive
127
+ mechanism for cographic matroids.
128
+ The approach in [Sot13] immediately leads to the following result for γ-sparse
129
+ matroids.
130
+ 3
131
+
132
+ Theorem 6 (γ-Sparse Matroids). There exists a γ-competitive non-adaptive
133
+ mechanism for γ-sparse matroids.
134
+ Combining the above results and using classic Seymour’s decomposition re-
135
+ sults we obtain the following theorem.
136
+ Theorem 7 (Regular Matroids). There exists a 256-competitive non-adaptive
137
+ mechanism for regular matroids.
138
+ Subject to the Structural Hypothesis 1 due to Geelen, Gerards and Whittle,
139
+ which is stated later, we can also derive the following result.
140
+ Theorem 8. Subject to the Structural Hypothesis 1, for every prime number p
141
+ there exists a constant-competitive mechanism for every proper minor-closed
142
+ class of matroids representable over Fp.
143
+ We also would like to observe that some of the recent results on “single
144
+ sample prophet inequalities” (SSPI) lead to non-adaptive constant-competitive
145
+ mechanisms. For this, the single sample required by the gambler in SSPI can
146
+ be directly sampled by our gambler from the available distributions. In partic-
147
+ ular, the results in [AKW19] and [CFPP21] on laminar matroids and truncated
148
+ partition matroids inspired by the mechanism in [MTW16] lead to non-adaptive
149
+ mechanisms for prophet inequalities. To obtain these results, it is crucial that
150
+ the mechanism in [MTW16] does not involve subconstraints, i.e. each item is
151
+ accepted as long as the item is not in the “observation phase”, the item passes
152
+ its threshold based only on the “observation phase” and the item forms an in-
153
+ dependent set with previously accepted items. In comparison, it is not clear
154
+ how from the results on regular matroids in [AKW19] based on the mechanism
155
+ in [DK14] one can obtain non-adaptive mechanisms.
156
+ So the following results can be directly obtained from [AKW19] and [CFPP21],
157
+ respectively.
158
+ Theorem 9 (Laminar Matroid). There exists a 9.6-competitive non-adaptive
159
+ mechanism for laminar matroids.
160
+ Theorem 10 (Truncated Partition Matroid). There exists an 8-competitive
161
+ non-adaptive mechanism for truncated partition matroids.
162
+ 2
163
+ Comparison to known results
164
+ Our results for cographic matroids and k-column sparse matroids are obtained
165
+ through modifications of the arguments in [Sot13] and [CGKM20], respectively.
166
+ The results on regular matroids and minor-closed families of matroids follow the
167
+ approach outlined in [HN20] for the secretary problem. As necessary building
168
+ blocks we use our results for cographic and 2-column sparse matroids. Note that
169
+ a biggest challenge for us is the compatibility of non-adaptive thresholds with
170
+ contractions. Indeed, standard tools for deriving mechanisms for contraction
171
+ 4
172
+
173
+ minors need subconstraints, while subconstraints are not permitted in non-
174
+ adaptive mechanisms. To obtain our results, we resolve this issue only in the
175
+ context of matroids representable over finite fields, see arguments in Lemma 8.
176
+ It would be interesting to see whether analogous results for contraction minors
177
+ hold with no assumption about representability over finite fields.
178
+ 3
179
+ Preliminaries
180
+ In this paper, we consider the matroid prophet inequality problem, where items
181
+ arrive online in adversarial order. Here, the adversary knows the distributions
182
+ of all X1, X2, . . . , Xn and knows the gambler’s mechanism, but the realization
183
+ of X1, X2, . . . , Xn is not known to the adversary.
184
+ Based on the available
185
+ information, the adversary can decide on the order in which items and their
186
+ values are observed by the gambler.
187
+ 3.1
188
+ Prophet inequality
189
+ Definition 1. Let M be a matroid on the ground set [n] := {1, . . . , n}, where
190
+ [n] corresponds to n items. Let ⃗X := (X1, . . . , Xn) be non-negative independent
191
+ random variables representing the values of these n items.
192
+ • For every subset of items S ⊆ [n] we define its weight as follows
193
+ w(S) :=
194
+
195
+ i∈S
196
+ Xi.
197
+ • Let PROPHM be the random variable corresponding to the value obtained
198
+ by the prophet
199
+ PROPHM :=
200
+ max
201
+ S∈I(M) w(S) ,
202
+ where I(M) is a collection of independent sets for M.
203
+ • Let EPROPHM be the expectation of the value obtained by prophet
204
+ EPROPHM := E[PROPHM] .
205
+ Definition 2. Let us be given a number α > 0.
206
+ • We call a mechanism α-competitive (alternatively, we say that the mech-
207
+ anism guarantees an α-approximation) on the matroid M if the expected
208
+ value obtained by the gambler via this mechanism is at least 1
209
+ αEPROPHM.
210
+ • We call a mechanism α-competitive (alternatively, we say that the mech-
211
+ anism guarantees an α-approximation) on the matroid class M if this
212
+ mechanism is α-competitive for every matroid M ∈ M.
213
+ 5
214
+
215
+ 3.2
216
+ Non-adaptive mechanism
217
+ We say that a mechanism is non-adaptive if it has the following structure:
218
+ • Given the distributions of ⃗X = (X1, . . . , Xn), the mechanism determines
219
+ the values of thresholds ⃗T = (T1, . . . , Tn), where each Ti, i ∈ [n] is a real
220
+ number or +∞.
221
+ • If the value of item i ∈ [n] is observed, the gambler accepts the item i if
222
+ and only both conditions hold:
223
+ 1. the observed value of Xi is at least Ti
224
+ 2. the item i together with all previously selected items forms an inde-
225
+ pendent set with respect to the matroid M.
226
+ Note, that a non-adaptive mechanism does not change thresholds during
227
+ its course.
228
+ So, none of the thresholds depends on the realization of ⃗X =
229
+ (X1, . . . , Xn).
230
+ Another crucial feature of a non-adaptive mechanism is that the mechanism
231
+ works only with the original matroid M. A non-adaptive mechanism does not
232
+ allow us to define a new matroid M ′, such that a set of items is independent in
233
+ M ′ only if it is independent in M, and modify the condition (2) based on M ′.
234
+ In this work, we focus on non-adaptive mechanisms. From here and later we
235
+ use the term mechanism to refer to non-adaptive mechanisms exclusively.
236
+ Remark 1. In this work, non-adaptive mechanisms are allowed to make non-
237
+ deterministic decisions. Hence, we allow a non-adaptive mechanism to construct
238
+ the thresholds ⃗T = (T1, . . . , Tn) non-deterministically.
239
+ To measure the performance of such a mechanism we use the expected total
240
+ value, where the expectation is taken not only with respect to ⃗X = (X1, . . . , Xn)
241
+ but also with respect to ⃗T = (T1, . . . , Tn).
242
+ 3.3
243
+ Matroids
244
+ We provide a review of matroids here.
245
+ Experienced readers should consider
246
+ skipping or skimming this section. For further results about matroids, consider
247
+ consulting [Oxl06].
248
+ A matroid M = (E, S) is a pair of a finite ground set E and a collection S ⊆
249
+ 2E of independent sets. The collection S ⊆ 2E of subsets of E satisfies the
250
+ following conditions:
251
+ (i) Empty set is an independent set, so ∅ ∈ S.
252
+ (ii) The collection S is closed with respect to taking subsets, so for all A ⊆
253
+ B ⊆ E if B is in S then A is in S.
254
+ (iii) The collection S satisfies so called augmenation property. In other words,
255
+ for all A, B ⊆ E such that A, B ∈ S and |A| > |B|, there exists c ∈ A \ B
256
+ such that B ∪ {c} ∈ S.
257
+ 6
258
+
259
+ A subset of E is called dependent if it is not in S. The inclusion-maximal
260
+ independent sets are called bases and the inclusion-minimal dependent sets are
261
+ called circuits.
262
+ For every two bases, their cardinalities are equal: for every
263
+ bases A and B of M we have |A| = |B|. A rank function for the matroid M is
264
+ a function rM : 2E → N such that for every A ⊆ E the value rM(A) equals the
265
+ cardinality of an inclusion-maximal independent subset of A. In the cases when
266
+ the choice of the matroid is clear from the context, we write r instead of rM.
267
+ Given a matroid M, we can define the dual matroid M ∗ over the same ground
268
+ set E. A set A is independent for matroid M ∗ if and only if E \ A contains a
269
+ basis of M. An element c ∈ E is called a loop in M if rM(c) = 0. An element
270
+ c ∈ E is called a free element in M if rM∗(c) = 0. To put it another way, an
271
+ element c is free, if and only if for every set A, which is independent in M,
272
+ A∪{c} is also independent in M. We say that elements c and d ∈ E are parallel
273
+ in matroid M, denoted by c ∥ d, if rM(c) = rM(d) = rM({c, d}) = 1. One
274
+ can show that “being parallel” defines an equivalence relation on the non-loop
275
+ elements of M. A matroid is called simple if it has no loops and no parallel
276
+ edges.
277
+ Let M = (E, S) be a matroid and A ⊆ E. The contraction of M by A, de-
278
+ noted as M/A, is a matroid over ground set E\A with the following independent
279
+ sets
280
+ {S ⊆ E \ A : S ∪ A′ ∈ S} ,
281
+ where A′ is an inclusion-maximal independent subset of A.
282
+ The restriction of M to A, denoted as M |A or M \ A, is a matroid over
283
+ the ground set A where a set S ⊆ A is independent in M |A if and only if it is
284
+ independent in M.
285
+ A matroid M ′ is called a simple version of M if M ′ is obtained from M by
286
+ deleting all loops and contracting every parallel class of elements into a single
287
+ element.
288
+ For matroids M, N, we say that N is a minor of M = (E, S) if N is
289
+ isomorphic to M/A\B for some disjoint sets A, B ⊆ E. A matroid class M is
290
+ called minor-closed if for any M ∈ M every minor of M is also in M.
291
+ Let us now list some of the classical examples of matroids, which were ex-
292
+ tensively studied in the context of various mathematical fields.
293
+ • A uniform matroid M = (E, S) of rank k is matroid where
294
+ S := {A ⊆ E : |A| ≤ k} .
295
+ When |E| = n, we denote the uniform matroid of rank k as Uk,n.
296
+ • A graphic matroid over graph G = (V, E) is a matroid M = (E, S), where
297
+ S := {A ⊆ E : A is acyclic} .
298
+ The graphic matroid over graph G is denoted as M(G).
299
+ 7
300
+
301
+ • A cographic matroid over graph G = (V, E) is a dual matroid M = (E, S)
302
+ to the graphic matroid over the same graph G. In this case we have
303
+ S := {A ⊆ E : (V, E\A) has the same number of components as (V, E)} .
304
+ • A vector matroid M = (E, S) is a matroid such that there is a vector
305
+ space V and a map φ : E → V satisfying
306
+ S := {A ⊆ E : multiset φ(A) is linearly independent} .
307
+ Given a field F, we say that M is representable over field F if M is iso-
308
+ morphic to the vector matroid where V is a vector space over field F.
309
+ A matroid is called regular if it is representable over every field. A matroid
310
+ is called binary if it is representable over F2.
311
+ • A k-column sparse matroid M = (E, S) is a matroid such that there is a
312
+ field F and dimension m and a map φ : E → Fm such that
313
+ S := {A ⊆ E : multiset φ(A) is linearly independent over F} ;
314
+ and moreover φ(c) ∈ Fm has at most k nonzero coordinates for every
315
+ c ∈ E.
316
+ • A γ-sparse matroid M = (E, S) is a matroid such that the inequality
317
+ |S| ⩽ γrM(S) holds for every S ⊆ E.
318
+ • A laminar matroid M = (E, S) is a matroid such that there exists a
319
+ laminar family F over the ground set E and there are numbers cF ∈ N,
320
+ F ∈ F such that
321
+ S := {A ⊆ E : |A ∩ F| ≤ cF for every F ∈ F} .
322
+ Moreover, if F = {E, E1, . . . , Ek}, where E1, . . . , Ek form a partition of
323
+ the ground set E, then M is called a truncated partition matroid. Recall,
324
+ that a family F is called laminar if for every A, B ∈ F we have A ⊆ B or
325
+ B ⊆ A or A ∩ B = ∅.
326
+ Given a matroid M = (E, S) we can define the corresponding polytope
327
+ PM ⊆ RE as the convex hull of points corresponding to the characteristic vectors
328
+ of independent sets. The polytope PM is known to admit the following outer
329
+ description [Sch03].
330
+ PM = {x ∈ RE : x ≥ 0 and
331
+ x(S) ≤ rM(S) for every S ⊆ E} ,
332
+ where x(S) stands for �
333
+ c∈S xc.
334
+ For a matroid M = (E, S) and a set A ⊆ E we can define the closure of A
335
+ as the following set
336
+ clM(A) := {c ∈ E | rM(A ∪ {c}) = rM(A)} .
337
+ 8
338
+
339
+ For a matroid M = (E, S), we call the following function ⊓M : E × E → Z
340
+ a local connectivity function
341
+ ⊓M(X, Y ) = r(X) + r(Y ) − r(X ∪ Y ) .
342
+ The following function λM : E → Z⩾0 is called a connectivity function
343
+ λM(X) := ⊓M(X, E \ X) = r(X) + r(E \ X) − r(E) .
344
+ Informally, connectivity functions measure dependence with respect to the
345
+ matroid between parts of the ground set. To illustrate it, let us consider the
346
+ connectivity function for vector matroids.
347
+ Suppose M = (E, S) is a vector
348
+ matroid defined by a vector space V and a map φ : E → V . Then we have
349
+ λM(S) =r(S) + r(E \ S) − r(E) =
350
+ dim(span φ(S)) + dim(span φ(E \ S)) − dim(φ(E)) =
351
+ dim ((span φ(S)) ∩ (span φ(E \ S))) .
352
+ 3.4
353
+ Ex-ante relaxation to the matroid polytope
354
+ The goal of ex-ante relaxation [FSZ16] or [CGKM20] is to reduce the origi-
355
+ nal problem to the problem where item values are distributed as independent
356
+ Bernoulli random variables. Note, that both problems are using the same ma-
357
+ troid.
358
+ In the original problem item values ⃗X = (X1, . . . , Xn) are independent ran-
359
+ dom variables with known distributions. For i ∈ [n] let Fi be the cumulative
360
+ distribution function of Xi. The reduction of the original problem to a new
361
+ problem is done using a point p in the matroid polytope PM. Let us first show
362
+ that there is a point p ∈ PM with properties that prove to be desirable later
363
+ following the argumentation in [CGKM20].
364
+ Lemma 1. Given a matroid M over the ground set [n] and random variables
365
+ ⃗X = (X1, . . . , Xn), there exists p ∈ PM such that
366
+ EPROPHM ⩽
367
+ n
368
+
369
+ i=1
370
+ piti ,
371
+ where ti := E[Xi | Xi ⩾ F −1
372
+ i
373
+ (1 − pi)] for every i ∈ [n]1.
374
+ Proof. Let Iopt be a random variable indicating an optimal independent set
375
+ in M with respect to ⃗X = (X1, . . . , Xn). In case when for some realization
376
+ of ⃗X = (X1, . . . , Xn) there are several optimal independent sets, Iopt can be
377
+ selected as any of these sets. For i ∈ [n], let pi be the probability that element
378
+ 1Here, we assume that for every i ∈ [n] the event Xi = F −1
379
+ i
380
+ (1 − pi) happens with the zero
381
+ probability, which is true for all continuous distributions. In case of discrete distributions one
382
+ needs to introduce appropriate tie-breaking.
383
+ 9
384
+
385
+ i is in Iopt. Note that p = (p1, . . . , pm) is a convex combination of independent
386
+ sets of M, and so lies in PM.
387
+ Due to EPROPHM = E[�
388
+ i∈Iopt Xi], it remains to show that
389
+ E[
390
+
391
+ i∈Iopt
392
+ Xi] ⩽
393
+ n
394
+
395
+ i=1
396
+ piti .
397
+ We have
398
+ E[
399
+
400
+ i∈Iopt
401
+ Xi] =
402
+ n
403
+
404
+ i=1
405
+ P[i ∈ Iopt]E[Xi | i ∈ Iopt] =
406
+ n
407
+
408
+ i=1
409
+ piE[Xi | i ∈ Iopt] .
410
+ For every i ∈ [n] we have that ti and E[Xi | i ∈ Iopt] are expectations of the
411
+ same random variable Xi but conditioned on the event Xi ⩾ F −1
412
+ i
413
+ (1−pi) and on
414
+ the event i ∈ Iopt, respectively. Note, that the probability of both these events
415
+ equals pi. However, the expectation of Xi conditioned on Xi ⩾ F −1
416
+ i
417
+ (1 − pi) is
418
+ the “largest” conditional expectation of Xi on an event of probability pi. Thus,
419
+ we have piE[Xi | i ∈ Iopt] ⩽ piti for every i ∈ [n] and so we get the desired
420
+ inequality
421
+ n
422
+
423
+ i=1
424
+ piE[Xi | i ∈ Iopt] ⩽
425
+ n
426
+
427
+ i=1
428
+ piti .
429
+ Let us show how one can use the point p = (p1, . . . , pn) guaranteed by
430
+ Lemma 1 to reduce the original problem. Let us define independent Bernoulli
431
+ random variables ⃗X′ = (X′
432
+ 1, . . . , X′
433
+ n) as follows, for each i ∈ [n]
434
+ X′
435
+ i =
436
+
437
+ ti
438
+ with probability pi
439
+ 0
440
+ with probability 1 − pi ,
441
+ where ti := E[Xi | Xi ⩾ F −1
442
+ i
443
+ (1 − pi)].
444
+ Let us assume that we have a non-adaptive mechanism for the original ma-
445
+ troid M and item values ⃗X′ = (X′
446
+ 1, . . . , X′
447
+ n), which sets nonnegative thresholds
448
+ ⃗T ′ = (T ′
449
+ 1, . . . , T ′
450
+ n). By definition of ⃗X′ = (X′
451
+ 1, . . . , X′
452
+ n), for every i ∈ [n] the
453
+ exact value of T ′
454
+ i is not relevant per se, but it is crucial whether ti ≥ T ′
455
+ i or
456
+ ti < T ′
457
+ i. If for some i ∈ [n] we have T ′
458
+ i > ti then this item i is “inactive” and so
459
+ is never selected by the gambler working with M and ⃗X′ = (X′
460
+ 1, . . . , X′
461
+ n).
462
+ The key is to construct a non-adaptive mechanism for the original matroid M
463
+ and item values ⃗X′ = (X′
464
+ 1, . . . , X′
465
+ n) with positive thresholds ⃗T ′ = (T ′
466
+ 1, . . . , T ′
467
+ n)
468
+ such that for each item i ∈ [n] the probability that i is selected by the gambler
469
+ is at least αpi. Now we can use such a non-adaptive mechanism for the original
470
+ matroid M and item values ⃗X′ = (X′
471
+ 1, . . . , X′
472
+ n) to construct a non-adaptive
473
+ α-competitive mechanism for the same matroid M and random variables ⃗X =
474
+ 10
475
+
476
+ (X1, . . . , Xn). Let us define the thresholds ⃗T = (T1, . . . , Tn) as follows, for every
477
+ i ∈ [n]
478
+ Ti :=
479
+
480
+ +∞
481
+ if ti < T ′
482
+ i
483
+ F −1
484
+ i
485
+ (1 − pi)
486
+ otherwise .
487
+ To see that the thresholds ⃗T = (T1, . . . , Tn) lead to an α-competitive mech-
488
+ anism for M and ⃗X = (X1, . . . , Xn), let us couple random variables X′
489
+ i with
490
+ random variables Xi as follows
491
+ X′
492
+ i :=
493
+
494
+ ti
495
+ if Xi ≥ F −1
496
+ i
497
+ (1 − pi)
498
+ 0
499
+ otherwise.
500
+ Note that ⃗X′ = (X′
501
+ 1, . . . , X′
502
+ n) are independent Bernoulli random variables,
503
+ where for each i ∈ [n] the variable X′
504
+ i equals ti with probability pi and equals 0
505
+ with probability 1 − pi. When ⃗X′ are coupled with ⃗X this way, Xi and X′
506
+ i have
507
+ the same expected value when conditioned on X′
508
+ i being ti. The mechanism with
509
+ thresholds ⃗T selects an item i ∈ [n] when run for ⃗X only if the mechanism with
510
+ thresholds ⃗T ′ selects the item i when run for ⃗X′. Moreover, for both of these
511
+ algorithms, conditionally on the event that the item i is selected the expected
512
+ value of i equals ti. Now, α-competitiveness guarantee of the thresholds ⃗T for
513
+ M and ⃗X follows from Lemma 1.
514
+ 4
515
+ Graphic and k-column sparse matroids
516
+ First, we construct a 16-competitive non-adaptive mechanism for graphic ma-
517
+ troids without parallel edges. Our construction is done through the ex-ante re-
518
+ laxation to the matroid polytope, following the works in [FSZ16] or [CGKM20].
519
+ Later, we present a constant-competitive non-adaptive mechanism for k-column
520
+ sparse matroids whenever k is constant.
521
+ 4.1
522
+ Graphic matroids
523
+ Now we are ready to provide a 16-competitive non-adaptive mechanism for
524
+ graphic matroid. The provided mechanism is essentially the one constructed
525
+ in [CGKM20] but with saving a factor of 2 in the guarantee, which is achieved
526
+ by rescaling the point from the matroid polytope by 2 and not by 4.
527
+ Let us be given a simple graph G = (V, E) and let us consider the corre-
528
+ sponding graphic matroid M over the ground set E. Recall that a subset of E
529
+ is independent with respect to M if and only if it is acyclic in G. Let us also
530
+ assume that the graph G has n edges and so E = {e1, e2, . . . , en}.
531
+ Lemma 2. Let p = (p1, . . . , pn) be a point in the polytope PM. Thus we assume
532
+ that for every i ∈ [n] the coordinate pi of p corresponds to the edge ei. Then
533
+ there exists an orientation of edges E = {e1, e2, . . . , en} in the graph G = (V, E)
534
+ such that for every vertex v ∈ V we have �
535
+ i∈[n]:ei∈δ−(v) pi ≤ 2.
536
+ 11
537
+
538
+ Proof. Observe that the average degree of a vertex in a forest on |V | vertices is
539
+ at most (2|V | − 2)/|V | = 2 − 1/|V | ⩽ 2.
540
+ Let us use this fact to prove the desired statement by induction on the
541
+ number of vertices in the graph G.
542
+ If the graph G has at most two vertices then the orientation is trivial. Other-
543
+ wise, since p is a convex combination of points corresponding to forests in G, we
544
+ have that the average of the value �
545
+ i∈[n]:ei∈δ(v) pi over all vertices v ∈ V is at
546
+ most 2. Thus there exists a vertex v ∈ V such that we have �
547
+ i∈[n]:ei∈δ(v) pi ≤ 2.
548
+ We orient all edges incident to v as edges in δ−(v), so these edges are incoming
549
+ with respect to v. Then we remove the vertex v and all edges incident to it
550
+ and orient the remaining edges according to the orientation guaranteed by the
551
+ inductive hypothesis.
552
+ Now we present an algorithm for graphic matroids of simple graphs.
553
+ Algorithm 1 A non-adaptive 16-competitive mechanisms for graphic matroids
554
+ of a simple graph
555
+ 1: Let p be a point in the polytope PM so that the statement of Lemma 1 is
556
+ satisfied.
557
+ 2: Let the edges of the original graph G = (V, E) be oriented so that the
558
+ statement of Lemma 2 is satisfied.
559
+ 3: For every edge ei ∈ E, i ∈ [n], mark the edge ei as “discarded" independently
560
+ at random with probability 1/2.
561
+ 4: Select a cut S ⊆ V uniformly at random, mark all edges not in [S; S] as
562
+ “discarded". Here, [S; S] stands for the set of edges which are oriented such
563
+ that their tail is in S and their head is in S.
564
+ 5: Set thresholds ⃗T = (T1, . . . , Tn) as follows, for each i ∈ [n]
565
+ Ti :=
566
+
567
+ +∞
568
+ if ei is “discarded”
569
+ F −1
570
+ i
571
+ (1 − pi)
572
+ otherwise .
573
+ Lemma 3. For every i ∈ [n], we have
574
+ P[ei is selected | Xi ≥ Ti and ei is not “discarded”] ≥ 1/2 .
575
+ Proof. Let us assume that the vertex v is the head of the oriented edge ei. Let
576
+ us also assume that ei is not marked as “discarded” and Xi ≥ Ti.
577
+ Since the edge ei is not “discarded”, the edge ei is in the selected set [S; S].
578
+ Hence, every not “discarded” edge incident to v has the vertex v as its head.
579
+ Thus, as long as no other edge with the head at the vertex v is selected by
580
+ the gambler, the gambler has to select ei. We claim, that with probability at
581
+ least 1/2 no other edge with the head at v was selected by the gambler.
582
+ Let I be the event indicating that "the gambler selected an edge ej, j ̸= i
583
+ such that v is the head of ej", in other words “there is j ∈ [n], j ̸= i such that
584
+ 12
585
+
586
+ v is the head of ej and Xj ≥ Tj and ej is not “discarded”". Let J indicate the
587
+ event that "ei is not marked as “discarded” after the selection of the cut", in
588
+ other words, "the head of ei is in S and the tail of ei is in S".
589
+ Let us show
590
+ P[I | J] ≤ 1/2 .
591
+ By the union bound, we have
592
+ P[I | J] ⩽
593
+
594
+ j∈[n]\{i}:ej∈δ−(v)
595
+ P[Xj ≥ Tj and ej is not “discarded” | J]
596
+ Note that for each edge ej ∈ δ−(v) we have P[Xj ≥ Tj|J] = pj and we also
597
+ have P[ej is not “discarded”|J] = 1/4. Note that any edge is not “discarded”
598
+ in Step 3 of Algorithm 1 with probability 1/2, and not “discarded” in Step 4
599
+ of Algorithm 1 with probability 1/4. However, since the probabilities are with
600
+ respect to the edge ej ∈ δ−(v) and are counted conditioned on the event J,
601
+ the conditioned probability of not being “discarded” in Step 4 of Algorithm 1
602
+ is 1/2. Moreover, even conditioned on J the events "Xj ≥ Tj" and "ej is not
603
+ “discarded”" are independent events. Thus we have
604
+
605
+ j∈[n]\{i}:ej∈δ−(v)
606
+ P[Xj ≥ Tj and ej is not “discarded” | J] ≤
607
+
608
+ j∈[n]\{i}:ej∈δ−(v)
609
+ pj/4 ⩽ 1/2 ,
610
+ where the last inequality follows from the orientation.
611
+ We are ready to prove Theorem 3 by showing that Algorithm 1 is a 16-
612
+ competitive for graphic matroids without parallel edges.
613
+ Proof of Theorem 3. By Lemma 3 for every i ∈ [n] the probability of edge ei
614
+ being accepted conditional on Xi ≥ Ti and being not “discarded” is at least 1/2.
615
+ Overall, the probability of edge ei being accepted is at least
616
+ 1
617
+ 16pi. Thus
618
+ mechanism guarantees at least �n
619
+ i=1
620
+ 1
621
+ 16piti of the expected total value.
622
+ By
623
+ Lemma 1, we have �
624
+ i∈[n]
625
+ 1
626
+ 16piti ⩾
627
+ 1
628
+ 16EPROPHM, finishing the proof.
629
+ 4.2
630
+ k-column sparse matroids
631
+ There are known constant-competitive mechanisms for k-column sparse ma-
632
+ troids in the context of the secretary problem [Sot13]. However they do not
633
+ immediately lead to a non-adaptive mechanism of constant competitiveness
634
+ guarantee. The reason for that are not the updated thresholds but implicit
635
+ changes to the considered matroid.
636
+ Here, we present a constant competitive mechanism for k-column sparse
637
+ matroid class for each constant k.
638
+ Note, graphic matroids form a subclass
639
+ of 2-column sparse matroids . Because of their significance, 2-column sparse
640
+ matroids are also known in literature as represented frame matroids. Later, we
641
+ use 2-column sparse matroids to prove results in Section 6.4.
642
+ 13
643
+
644
+ Suppose M is a k-column sparse matroid over field F. In this section, we
645
+ prove that there exists a (2k+2k)-competitive mechanism for M.
646
+ Suppose a k-sparse representation of M = (E, S) is defined by a map φ :
647
+ E → Fd. Note, if for some element t ∈ E the vector φ(t) is a zero vector then c
648
+ is a loop and therefore can be removed from consideration.
649
+ Now we consider an undirected hyper-multigraph G with vertex set [d]. Each
650
+ matroid element t ∈ E induces a hyperedge et in this graph between non-zero
651
+ coordinates of φ(t). Formally, the hyperedge et is defined as follows et := {i ∈
652
+ [d] : φ(t)i ̸= 0}. We say that a vertex i ∈ [d] of the hyper-multigraph G is
653
+ incident to every edge e of G such that i ∈ e. For a vertex i ∈ [d] we denote
654
+ the collection of incident hyperedges by δ(i). The degree of a vertex i in the
655
+ hyper-multigraph G equals |δ(i)|.
656
+ Claim 1. Suppose I is an independent set of the matroid M. Then the average
657
+ degree of a vertex is at most k when one considers the hyper-multigraph with
658
+ vertices [d] and hyperedges {et : t ∈ I}.
659
+ Proof. Observe that |I| ⩽ d because having more than d vectors in d-dimensional
660
+ vector space Fd leads to a a linear dependency.
661
+ Since M is k-column sparse, we have that every edge in {et : t ∈ I} is
662
+ incident to at most k vertices in [d]. Hence, the total degree is at most kd and
663
+ thus the average degree of a vertex is at most k.
664
+ Now we consider orientations of the graph G. An orientation of the graph
665
+ G is a function ϕ which maps every edge et into one vertex of G incident to et.
666
+ We call ϕ(et) to be the head of the edge et, and all other vertices, if any, to
667
+ be tails. For every vertex i ∈ [d] we denote the set of incoming edges by δ−(i),
668
+ formally δ−(i) = {et : ϕ(et) = i, t ∈ E}.
669
+ Lemma 4. Let p be a point in the polytope PM. We assume that for every
670
+ t ∈ E, the coordinate pt of p corresponds to the element t. Then there exists
671
+ an orientation ϕ of hyperedges in the hyper-mulrigraph G such that for every
672
+ vertex i ∈ [d] we have �
673
+ t∈E:et∈δ−(i) pt ⩽ k.
674
+ The proof of Lemma 4 is analogous to the proof of Lemma 2. Now let us
675
+ describe an algorithm for k-column sparse matroids.
676
+ Lemma 5. For every t ∈ E we have
677
+ P[t is selected | Xt ≥ Tt and t is not “discarded”] ≥ 1/2 .
678
+ Proof. Note that item t ∈ E is accepted whenever Xt ≥ Tt and no other item
679
+ was selected from non-discarded edges in δ−(ϕ(t)). By the union bound, for
680
+ every event J we can upper bound the probability that
681
+ P[there j ∈ E \ {t} such that j is selected and ej ∈ δ−(ϕ(t)) | J] ⩽
682
+
683
+ j∈E\{t}:ej∈δ−(ϕ(t))
684
+ P[ej is not “discarded” and Xj ≥ Tj | J] .
685
+ 14
686
+
687
+ Algorithm 2 A non-adaptive 2k+2k-competitive mechanisms for k-column
688
+ sparse matroids
689
+ 1: Let p be a point in the polytope PM so that the statement of Lemma 1 is
690
+ satisfied.
691
+ 2: Let the edges of the hyper-multigraph G be oriented so that the statement
692
+ of Lemma 4 is satisfied.
693
+ 3: For every edge ei ∈ E, i ∈ [n], mark the edge ei as “discarded" independently
694
+ at random with probability 1 −
695
+ 1
696
+ 2k.
697
+ 4: Select a cut S ⊆ [d] uniformly at random, mark all edges not in [S; S] as
698
+ “discarded”. Here, [S; S] stands for the set of edges which are oriented such
699
+ that all their tails are in S and their head is in S. In particular, for t ∈ E we
700
+ say that et lies in a cut [S; S] with respect to the orientation ϕ if ϕ(et) ∈ S
701
+ and for every i ∈ et \ {ϕ(et)} we have i ∈ S.
702
+ 5: Set thresholds {Tt : t ∈ E} as follows, for each t ∈ E
703
+ Tt :=
704
+
705
+ +∞
706
+ if t is “discarded”
707
+ F −1
708
+ t
709
+ (1 − pt)
710
+ otherwise .
711
+ Let J indicate the event that "et is not marked as “discarded” after the selection
712
+ of the cut". Then for each j ∈ E \{t} we have P[ej is not “discarded” and Xj ≥
713
+ Tj | J] ≤
714
+ 1
715
+ 2kpj. By Lemma 4, we have �
716
+ j∈E:ej∈δ−(ϕ(t)) pj ⩽ k, leading to the
717
+ desired inequality.
718
+ Note that the proof of Lemma 5 is analogous to the proof of Lemma 3. We are
719
+ ready to prove Theorem by showing that the Algorithm 2 is a 2k+2k-competitive
720
+ for k-column sparse matroids.
721
+ Proof of Theorem 4. For every item t ∈ E we have P[Xt ≥ Tt] = pt and
722
+ P[t is not “discarded”] ≥
723
+ 1
724
+ 2k+1k. By Lemma 5, we have that with probability
725
+ at least 1/2 the item t is selected when it is not “discarded” and Xt ≥ Tt. Thus
726
+ the expected total value of Algorithm 2 is at least �
727
+ j∈E
728
+ 1
729
+ 2k+2kpjtj which is at
730
+ least
731
+ 1
732
+ 2k+2kEPROPHM by Lemma 1.
733
+ 5
734
+ Cographic and gamma-sparse matroids
735
+ 5.1
736
+ Cographic matroids
737
+ Let us revisit a mechanism of Soto [Sot13] for the cographic matroid secretary
738
+ problem which is based on the following corollary of Edmond’s matroid parti-
739
+ tioning theorem [Edm65]. This mechanism leads to a non-adaptive mechanism
740
+ for cographic matroids.
741
+ 15
742
+
743
+ Proposition 1. Let G = (V, E) be a three edge-connected graph. Then there
744
+ exist spanning trees H1, H2, H3 in G such that the union of their complements
745
+ contains all the edges E, i.e. E = (E \ H1) ∪ (E \ H2) ∪ (E \ H3).
746
+ Algorithm 3 A non-adaptive 3-competitive mechanisms for cographic matroids
747
+ in the case of three edge-connectivity
748
+ 1: Let H1, H2 and H3 be the spanning trees as in Proposition 6.
749
+ 2: Uniformly at random select a spanning tree H∗ from H1, H2 and H3. Set
750
+ thresholds {Te : e ∈ E} as follows, for each e ∈ E
751
+ Te :=
752
+
753
+ +∞
754
+ if e is not in H∗
755
+ 0
756
+ otherwise .
757
+ Lemma 6. Let G = (V, E) be a three edge-connected graph and let M be the
758
+ cographic matroid over G. Then Algorithm 3 is a 3-competitive non-adaptive
759
+ mechanism for the matroid M.
760
+ Proof. The expected total value of the mechanism provided by Algorithm 3
761
+ equals E[�
762
+ e∈E\H∗ Xe] which can be estimated as follows
763
+ E[
764
+
765
+ e∈E\H∗
766
+ Xe] = 1
767
+ 3E[
768
+
769
+ i∈[3]
770
+
771
+ e∈E\Hi
772
+ Xe] ≥ 1
773
+ 3E[
774
+
775
+ e∈E
776
+ Xe] ≥ 1
777
+ 3EPROPHM .
778
+ The next theorem provides a proof for Theorem 5.
779
+ Theorem 11. Let G = (V, E) be a graph and let M be the cographic matroid
780
+ over G. Then Algorithm 4 is a 6-competitive non-adaptive mechanism for the
781
+ matroid M.
782
+ Proof. We can assume that G does not have bridges, because every such bridge
783
+ is a loop in M. Thus these edges can be selected neither by the gambler nor by
784
+ the prophet. So we can assume G = G′ and M = M ′.
785
+ In the case when each connected component of G is three edge-connected,
786
+ then Algorithm 4 runs Algorithm 3 for each component to obtain a 3-competitive
787
+ non-adaptive mechanism.
788
+ Otherwise, there is one or more pairs of edges e,e′ such that {e, e′} corre-
789
+ sponds to a cut in G. In this case, the edges e,e′ correspond to parallel elements
790
+ of the cographic matroid M.
791
+ Algorithm 4 considers the partition of E into classes of parallel elements C1,
792
+ C2, . . . , Ck. Let us construct the matroid M ′′ from M by contracting all but
793
+ one edge in each class C1, C2, . . . , Ck. Note, that the ground set of M ′′ has k
794
+ elements. Abusing the notation we refer to these elements of the ground set as
795
+ 16
796
+
797
+ Algorithm 4 A non-adaptive 6-competitive mechanisms for cographic matroids
798
+ 1: Delete all loops of M to obtain a matroid M ′. Remove all bridges from
799
+ G = (V, E) and obtain a graph G′ = (V ′, E′).
800
+ 2: Let C1,. . . , Ck be equivalence classes of M ′ with respect to the relation of
801
+ being parallel. Construct the matroid M ′′ from M ′ by contracting all but
802
+ one edge in each class C1, C2, . . . , Ck. Note, that the ground set of M ′′
803
+ has k elements and matroid M ′′ is the cographic matroid over a graph G′′,
804
+ where each connected component of G′′ is three edge-connected. Abusing
805
+ the notation we refer to the elements of the ground set of M ′′ as C1, C2,
806
+ . . . , Ck.
807
+ 3: Let H1, H2 and H3 be forests in G′′ such that the restriction of H1, H2
808
+ and H3 to each connected component of G′′ satisfies Proposition 6 for the
809
+ respective connected component.
810
+ 4: Uniformly at random select a forest H∗ from H1, H2 and H3.
811
+ 5: For each i ∈ [k] select thresholds T e, e ∈ Ci according to Theorem 1 when
812
+ the gambler is allowed to accept only one item of Ci and the distributions
813
+ of Xe, e ∈ Ci are the same as original distributions of values for e ∈ Ci.
814
+ 6: Set thresholds {Te : e ∈ E} as follows, for each e ∈ E
815
+ Te :=
816
+
817
+ T e
818
+ if e ∈ Ci and Ci ∈ H∗ for some i ∈ [k]
819
+ +∞
820
+ otherwise .
821
+ C1, C2, . . . , Ck. The matroid M ′′ is isomorphic to the cographic matroid over
822
+ a graph G′′, where each connected component of G′′ is three edge-connected.
823
+ Following Lemma 6, Algorithm 4 constructs forests H1, H2, H3 for the graph G′′.
824
+ So Algorithm 4 leads us to a 6-competitive mechanism. Indeed, the prophet
825
+ with M and with the original distributions of Xe, e ∈ E performs exactly
826
+ as the prophet with M ′′ and with the corresponding distributions of X′′
827
+ i :=
828
+ maxe∈Ci Xe, i ∈ [k]. By selecting forests in Algorithm 4 the gambler acheives
829
+ in expectation E[�
830
+ i∈[k] X′′
831
+ i ]/3 when all classes C1, C2, . . . , Ck are singletons.
832
+ However, for classes that are not singletons we need to take into account an-
833
+ other 2 approximation factor with respect to the prophet, who can achieve the
834
+ expected value E[X′′
835
+ i ] for each i ∈ [k], while the gambler is guaranteed in ex-
836
+ pectation to achieve only E[X′′
837
+ i ]/2 for each i ∈ [k].
838
+ 5.2
839
+ Gamma-sparse matroids
840
+ Let us also revisit a mechanism of Soto [Sot13] for γ-sparse matroids to verify
841
+ that it directly leads to a non-adaptive mechanism.
842
+ Theorem 12. Let M = (E, S) be a γ-sparse matroid.
843
+ There exists a γ-
844
+ competitive non-adaptive mechanism for M.
845
+ Proof. First observe that the point x := 1/γ lies in the matroid polytope PM.
846
+ 17
847
+
848
+ Indeed, it is non-negative and for every set S ⊆ E(M) we have x(S) = |S|/γ ⩽
849
+ rM(S).
850
+ Then x can be expressed as a convex combination of indicator variables
851
+ corresponding to the independent sets of M.
852
+ In other words, we have x =
853
+
854
+ S∈S αS1S for some α ⩾ 0, �
855
+ S∈S αS = 1, where 1S refers to the characteristic
856
+ vector of S.
857
+ Now sample an independent set S in matroid M randomly with probabil-
858
+ ity αS. Let the gambler select all items in S and let the gambler leave all the
859
+ items not in S unselected.
860
+ If Xe is the random variable corresponding to the weight of element e ∈
861
+ E(M), then this mechanism results in a total expected value as follows
862
+
863
+ S∈S
864
+ αS
865
+
866
+ e∈S
867
+ E[Xe] =
868
+
869
+ e∈E
870
+ (1/γ)E[Xe] = E[
871
+
872
+ e∈E
873
+ Xe]/γ ⩾ EPROPH/γ ,
874
+ finishing the proof.
875
+ Observe that Proposition 1 implies that for a three edge-connected graph G,
876
+ the cographic matroid of G is 3-sparse. Thus Lemma 6 is a corollary of Theo-
877
+ rem 12.
878
+ Similarly, for a planar graph G the graphic matroid is 3-sparse, leading us
879
+ to the following corollary.
880
+ Corollary 1. Let G is a planar graph and let M be the corresponding graphic
881
+ matroid. There is a 3-competitive non-adaptive mechanism for M.
882
+ 6
883
+ Representable matroids
884
+ Many results in the theory of matroids make use of minors coming from re-
885
+ strictions and contractions. To get access to the toolbox provided by matroid
886
+ theory, we need to understand how prophet inequality guarantees change when
887
+ we consider minors.
888
+ 6.1
889
+ Preliminaries
890
+ Lemma 7. Let M be a matroid and let matroid N be a restriction of the ma-
891
+ troid M. If there exists an α-competitive non-adaptive mechanism on M, then
892
+ there is an α-competitive non-adaptive mechanism for N.
893
+ Proof. To obtain a mechanism for the matroid N, we can impose thresholds +∞
894
+ for the items that were removed from the ground set to obtain the restriction N
895
+ from the matroid M. The remaining items are assigned the same thresholds in
896
+ both mechanisms.
897
+ A similar result for contractions is harder to obtain in the case of non-
898
+ adaptive mechanisms.
899
+ Indeed, a straightforward approach would require us
900
+ to impose the thresholds +∞ for the contracted items, while using the given
901
+ 18
902
+
903
+ mechanism on the remaining items. Unfortunately, this would also require us
904
+ to “change" the underlying matroid, in other words a gambler might be forced
905
+ to reject an item even though its value is over the assigned threshold and its
906
+ addition to the currently selected items keeps the selected set independent with
907
+ respect to M.
908
+ Because of this difficulty, in this work we provide a matching result for
909
+ contractions only for matroids representable over a finite field. This result is
910
+ sufficient for the purpose of this work.
911
+ Lemma 8. Let M = (E, S) be a matroid representable over the field Fp for
912
+ some p. Let T ⊆ E be a subset of the ground set such that λM(T ) ⩽ k for
913
+ some k.
914
+ Then there exists S ⊆ T so that every set that is independent in M |S is also
915
+ independent in M/T and
916
+ EPROPHM|S ⩾
917
+ 1
918
+ pk+1 EPROPHM/T .
919
+ Recall that T stands for the complement of T with respect to the ground set E.
920
+ Proof. Consider the representation of the matroid M over Fp. Let φ : E → Fm
921
+ p
922
+ be the map describing the representation of M. Thus, for every S ⊆ E we have
923
+ that the set φ(S) = {φ(e) ∈ Fm
924
+ p : e ∈ S} is independent over the field Fp if and
925
+ only if S is an independent set for the matroid M.
926
+ Since λM(T ) ⩽ k holds, by definition of λM we have
927
+ rM(T ) + rM(T ) − rM(E) ⩽ k .
928
+ We have rM(R) = dim span(φ(R)) for every R ⊆ E. Thus, we have
929
+ dim span φ(E) = dim span φ(T )+dim span φ(T )−dim
930
+
931
+ (span φ(T )) ∩ (span φ(T))
932
+
933
+ .
934
+ and so
935
+ dim
936
+
937
+ (span φ(T )) ∩ (span φ(T ))
938
+
939
+ ⩽ k .
940
+ Since we are working over the field Fp, the linear space L := (span φ(T )) ∩
941
+ (span φ(T )) has at most pk vectors. Let C be the orthogonal complement of
942
+ the linear space L in the space span φ(T ). Thus, we can represent span φ(T ) as
943
+ L ⊕ C. For every vector v ∈ span φ(T ) we denote v orthogonal projection to L
944
+ and C by v |L and v |C, respectively.
945
+ For each vector a ∈ L, define the set Ta := {t ∈ T : φ(t) |L= a, φ(t) ̸= a}.
946
+ Note that by definition for every a ∈ L we have Ta ∩ L = ∅. Now let us select
947
+ a uniformly at random from L.
948
+ Claim 2. Ea[EPROPHM|Ta ] ��
949
+ 1
950
+ pk EPROPHM/T .
951
+ Proof. To prove the desired inequality, we prove the corresponding inequality
952
+ for any realization of item values. From now on we consider the realization of
953
+ item values fixed and thus we prove the following inequality
954
+ Ea[PROPHM|Ta] ≥ 1
955
+ pk PROPHM/T
956
+ 19
957
+
958
+ Let us consider the set Iopt on which the prophet achieves PROPHM/T .
959
+ Note that the set Iopt does not contain any item e such that φ(e) is in L, because
960
+ every such an item e is a loop in M/T . Thus, the set Iopt can be partitioned
961
+ into sets Iopt,a, a ∈ L where Iopt,a is a subset of Ta.
962
+ The set Iopt is independent in M/T and so Iopt is also independent in M.
963
+ Hence the sets Iopt,a, a ∈ L are also independent in M. Thus for every a ∈ L,
964
+ PROPHM|Ta ⩾ w(Iopt,a). Then we have
965
+ Ea[PROPHM|Ta] ⩾
966
+
967
+ a∈L w(Iopt,a)
968
+ |L|
969
+ = 1
970
+ |L|w(Iopt) ⩾ 1
971
+ pk PROPHM/T ,
972
+ finishing the proof of the claim.
973
+ Let us now select a∗ ∈ L such that EPROPHM|Ta is maximized. By the
974
+ previous claim, we have
975
+ PROPHM|Ta∗ ⩾ 1
976
+ pk PROPHM/T .
977
+ Now for every c ∈ C define set Hc := {t ∈ Ta∗ : (φ(t) |C) · c = 1}. Now let us
978
+ select c uniformly at random from C.
979
+ Claim 3. Ec[EPROPHM|Hc ] ≥ 1
980
+ pEPROPHM|T a∗ .
981
+ Proof. To prove the desired inequality, we prove the corresponding inequality
982
+ for any realization of item values. From now on we consider the realization of
983
+ item values fixed and thus we prove the following inequality
984
+ Ec[PROPHM|Hc ] ≥ 1
985
+ pPROPHM|T a∗ .
986
+ Let Iopt be the set corresponding to PROPHM|Ta∗ . Thus, we have that for
987
+ every e ∈ Iopt, φ(e) is not in L and hence φ(e) |C is not the zero vector. Due to
988
+ Pc[c · t = 1] = 1/p, for every t ∈ Ta∗, we have
989
+ Ec[w(Iopt∩Hc)] =
990
+
991
+ t∈Iopt
992
+ Pc[c·t = 1]w(t) = 1
993
+ p
994
+
995
+ t∈Iopt
996
+ w(t) = 1
997
+ pw(Iopt) = PROPHM|Ta∗ .
998
+ Finally, since Iopt is independent in M so is Iopt ∩ Hc. Thus, we have
999
+ Ec[PROPHM|Hc ] ≥ 1
1000
+ pPROPHM|T a∗ ,
1001
+ finishing the proof of the claim.
1002
+ Now let us select c∗ so that EPROPHM|Hc is maximized and let S∗ := Hc∗.
1003
+ Then we have EPROPH(M |S∗) ⩾
1004
+ 1
1005
+ pk+1 EPROPH(M/T ).
1006
+ Finally, we need to show that every set independent in M |S∗ is an indepen-
1007
+ dent set in M/T . Suppose the contrary, i.e. there exists a set that is independent
1008
+ 20
1009
+
1010
+ in M |S∗ but is not an independent set in M/T . Then span S∗ has a non-trivial
1011
+ intersection with span T, suppose x ∈ (span φ(S∗)) ∪ (span φ(T )). Let us show
1012
+ that x is a zero vector. Since x ∈ span S∗, we have x = �
1013
+ s∈S∗ αsφ(s) for some
1014
+ αs ∈ Fp, s ∈ S∗.
1015
+ Let us consider the projections of x on C and L. Since x ∈ span φ(T ) we have
1016
+ that x lies in L and so x |C is the zero vector. Thus x |C= �
1017
+ s∈S∗ αs(φ(s) |C)
1018
+ is the zero vector.
1019
+ Note that by definition, φ(s) |L= a∗ and c∗ · (φ(s) |C) = 1 hold for every s ∈
1020
+ S∗ . Thus over the field Fp we have
1021
+
1022
+ s∈S∗
1023
+ αs =
1024
+
1025
+ s∈S∗
1026
+ αs(c∗ · (φ(s) |C)) = c∗ ·
1027
+ � �
1028
+ s∈S∗
1029
+ αs(φ(s) |C)
1030
+
1031
+ =
1032
+ c∗ · (x |C) = 0 .
1033
+ Now let us consider x |L. We have
1034
+ x |L=
1035
+
1036
+ s∈S∗
1037
+ αs(φ(s) |L) =
1038
+ � �
1039
+ s∈S∗
1040
+ αs
1041
+
1042
+ a∗ ,
1043
+ where the last expression equals the zero vector since �
1044
+ s∈S∗ αs = 0. Thus we
1045
+ have a vector x ∈ L ⊕ C such that both projections x |L and x |C are the zero
1046
+ vector. Hence, the vector x is the zero vector, finishing the proof.
1047
+ 6.2
1048
+ Tree Decompositions
1049
+ Similarly to the approach [HN20] for the matroid secretary problem, we exten-
1050
+ sively use the tree decomposition of matroids. A tree decomposition of bounded
1051
+ thickness allows us to construct non-adaptive mechanisms with good approxi-
1052
+ mation ratios. Before proceeding with these constructions, let us introduce tree
1053
+ decompositions.
1054
+ A tree decomposition of a matroid M = (E, S) is a pair (T, X) where T is
1055
+ a tree and X = {Xv ⊆ E : v ∈ V (T )}, where sets in X form a partition of
1056
+ E. Here, we refer to the vertex and edge sets of the tree T as V (T ) and E(T ),
1057
+ respectively.
1058
+ Given an edge e = {v1, v2} ∈ E(T ) of the tree T , let T1 and T2 be two
1059
+ connected components of T − e, in other word the removal of the edge e from
1060
+ T leads to two connected components T1 and T2. The thickness of the edge
1061
+ e = (v1, v2) is denoted as λ(e) and is defined as follows
1062
+ λ(e) := λM(∪v∈V (T1)Xv) .
1063
+ The thickness of the tree decomposition is the maximum thickness of the edge e
1064
+ in E(T ).
1065
+ Let M be a family of matroids, M be a matroid and (T, X) be a tree decom-
1066
+ position of M. We say that tree decomposition (T, X) is M-tree decomposition
1067
+ 21
1068
+
1069
+ if M |clM(Xv)∈ M holds for every v ∈ V (T ). Let tk(M) be a set of matroids
1070
+ which have M-tree decomposition of thickness at most k.
1071
+ Theorem 13. Let Mα,p be the family of matroids which admit α-competitive
1072
+ non-adaptive mechanisms and are representable over the finite field Fp. Then
1073
+ for every natural number k and every matroid M in tk(Mα,p), the matroid M
1074
+ has an (αpk+1)-competitive non-adaptive mechanism.
1075
+ Proof. For a natural number m, let tk,m(Mα,p) be the set of matroids which
1076
+ have an Mα,p-tree decomposition (T, X) of thickness at most k satisfying |V (T )| =
1077
+ m.
1078
+ Let us prove the statement of the lemma by induction on m.
1079
+ The base
1080
+ case follows from the definition of the family Mα,p and the fact that Mα,p =
1081
+ tk,1(Mα,p).
1082
+ Let us now show how to do the inductive step. Let us assume m ≥ 2 and
1083
+ consider a matroid M = (E, S) in tk,m(Mα,p) with its Mα,p-tree decomposition
1084
+ (T, X) of thickness at most k and with |V (T )| = m. Let ℓ be a leaf of the tree T
1085
+ and let u be the neighbour of the vertex ℓ in the tree T .
1086
+ Observe that the tree (V (T ) \ {ℓ}, E(T )\ {ℓu}) together with the subfamily
1087
+ {Xw : w ∈ V (T ) \ {ℓ}} defines an Mα,p-tree decomposition of the matroid
1088
+ M \ Xℓ. Thus the matroid M \ Xℓ is in M ∈ tk,m−1(Mα,p). Hence, by the
1089
+ inductive hypothesis there are thresholds T ′
1090
+ e, e ∈ E \ Xℓ guaranteeing αpk+1-
1091
+ competitiveness of the gambler in comparison to the prophet on the matroid M \
1092
+ Xℓ.
1093
+ Claim 4. There are thresholds T ′′
1094
+ e , e ∈ Xℓ leading to an (α · pk+1)-competitive
1095
+ non-adaptive mechanism for matroid M |Xℓ, such that the gambler always selects
1096
+ a set that is independent in M/Xℓ.
1097
+ Proof. By Lemma 8 there exists a set S ⊆ Xl such that every set independent
1098
+ in M |S is also independent in the matroid M/Xℓ and
1099
+ EPROPHM|S ⩾
1100
+ 1
1101
+ pk+1 EPROPHM/Xℓ .
1102
+ By definition of Mα,p and the appearance of Xℓ in the tree decomposition, we
1103
+ have that M |Xℓ is in the family Mα,p. By Lemma 7, since S is a subset of Xℓ
1104
+ the matroid M |S is also in the family Mα,p. Thus, there are thresholds T ′′
1105
+ e ,
1106
+ e ∈ S that lead to an α-competitive non-adaptive mechanism on M |S. The
1107
+ thresholds T ′′
1108
+ e , e ∈ Xℓ \ S can be defined as +∞, finishing the proof of the
1109
+ claim.
1110
+ Now we can define thresholds Te, e ∈ E for all elements of the matroid M
1111
+ as follows
1112
+ Te :=
1113
+
1114
+ T ′
1115
+ e
1116
+ if e ̸∈ Xℓ
1117
+ T ′′
1118
+ e
1119
+ otherwise.
1120
+ Let us now demonstrate that such thresholds Te, e ∈ E lead to an (αpk+1)-
1121
+ competitive non-adaptive mechanism for M.
1122
+ 22
1123
+
1124
+ First, by the above claim the selected items from Xℓ always form an inde-
1125
+ pendent set in M/Xℓ when used with the thresholds Te, e ∈ Xℓ on the matroid
1126
+ M |Xℓ. Thus the definition of the thresholds guarantees that in expectation the
1127
+ value of selected items from Xℓ is at least EPROPHM|Xℓ/(αpk+1); and in ex-
1128
+ pectation the value of selected items from E\Xℓ is at least EPROPHM\Xℓ/(αpk+1).
1129
+ To finish the proof, note that we have
1130
+ PROPHM|Xℓ + PROPHM\Xℓ ≥ PROPHM
1131
+ and so
1132
+ EPROPHM|Xℓ + EPROPHM\Xℓ ≥ EPROPHM .
1133
+ 6.3
1134
+ Regular matroids
1135
+ In this section, we prove Theorem 7. Before we proceed to the proof, let us
1136
+ define key notions related to regular matroids.
1137
+ A subset of the matroid’s ground set is called a circuit, if it is an inclusion-
1138
+ minimal dependent set. A cycle is a subset of the ground set which can be
1139
+ partitioned into a disjoint union of circuits.
1140
+ Let M1 = (E1, S1), M2 = (E2, S2) be two binary matroids. Then the matroid
1141
+ sum M1△M2 has the ground set E1△E2 and the cycles of M1△M2 are all sets
1142
+ of the form C1△C2, where C1 is a cycle for M1 and C2 is a cycle for M2.
1143
+ Definition 3. Consider two binary matroids M1 = (E1, S1), M2 = (E2, S2)
1144
+ and M = M1△M2.
1145
+ 1. If |E1 ∩ E2| = 0, and E1 ̸= ∅, E2 ̸= ∅, M is called a 1-sum of M1 and
1146
+ M2.
1147
+ 2. If |E1 ∩ E2| = 1, |E1| ≥ 3, |E2| ≥ 3 and E1 ∩ E2 is not a loop of M1 or
1148
+ M2 or their dual matroids, M is called a 2-sum of M1 and M2.
1149
+ 3. If |E1 ∩ E2| = 3, |E1| ≥ 7, |E2| ≥ 7 and E1 ∩ E2 is a circuit in both M1
1150
+ and M2, and E1 ∩ E2 does not contain a circuit in their dual matroids,
1151
+ then M is called a 3-sum of M1 and M2.
1152
+ Proof of Theorem 7. By Seymour’s regular matroid decomposition theorem [Sey80],
1153
+ every regular matroid M can be obtained from graphic, cographic or a special
1154
+ matroid R10 through a sequence of 1-sums, 2-sums or 3-sums.
1155
+ This gives a tree decomposition (T, X) of thickness at most 2 so that each M |Xv,
1156
+ v ∈ V (T ) is either a graphic, cographic or a special matroid R10.
1157
+ By performing parallel extensions of the elements to be deleted before each
1158
+ 2-sum and 3-sum, we construct a matroid M ′, so that M is a restriction of M ′
1159
+ and M ′ has a tree decomposition (T, X ′) so that each M ′ |clM′ (X′v), v ∈ V (T )
1160
+ is either graphic, cographic or a parallel extension of R10.
1161
+ 23
1162
+
1163
+ By Theorem 2, every graphic matroid has a 32-competitive non-adaptive
1164
+ mechanism. By Theorem 5, every cographic matroid has a 6-competitive non-
1165
+ adaptive mechanism. Since matroid R10 has ground set of size 10, by Theorem 1
1166
+ every parallel extension of R10 has a 20-competitive non-adaptive mechanism.
1167
+ Note that by definition every regular matroid is representable over finite
1168
+ field F2. Thus, by Theorem 13 with p = 2, k = 2 and α = 32 there is a 256-
1169
+ competitive non-adaptive mechanism for matroid M ′. Since M is a restriction
1170
+ of M ′, by Lemma 7, there is a 256-competitive non-adaptive mechanism for M,
1171
+ finishing the proof.
1172
+ 6.4
1173
+ Minor-closed representable matroid families
1174
+ In this section we show that every minor-clossed subclass of matroids repre-
1175
+ sentable over Fp has a constant-competitive non-adaptive mechanism, where
1176
+ the constant is a function only of p. The proof of this fact is analogous to the
1177
+ proof in [HN20].
1178
+ Theorem 14 (Theorem 4.3 in [Gee11]). Given natural numbers q ⩾ 2 and
1179
+ n ⩾ 1, let M = (E, S) be a matroid with no U2,q+2 or M(Kn) minors. Then
1180
+ we have |E| ≤ qq3nrM(E).
1181
+ Corollary 2. Given natural numbers q ⩾ 2 and n ⩾ 1, let M = (E, S) be a
1182
+ matroid with no U2,q+2 or M(Kn) minors. Then there exists a qq3n-competitive
1183
+ non-adaptive mechanism for M.
1184
+ Proof. If M has no U2,q+2 or M(Kn) minors, then every restriction of M also
1185
+ has no U2,q+2 or M(Kn) minors.
1186
+ Thus for every X ⊆ E we have |X| ⩽
1187
+ qq3nrM(X). So, M is a qq3n-sparse matroid and by Theorem 12 there exists
1188
+ a qq3n-competitive non-adaptive mechanism for M.
1189
+ 6.4.1
1190
+ Projections and lifts
1191
+ Let M be a matroid and x be an element of the ground set, which is a not a
1192
+ loop and not a free element of the matroid M. Then M/x is called a projection
1193
+ of M \ x; M \ x is called a lift of M/x. Note that here and later we write M/x
1194
+ and M \ x instead of M/{x} and M \ {x}, repsectively.
1195
+ Let M and N be two matroids with the same ground set. We say that the
1196
+ distance between M and N is t, denoted by dist(M, N) = t if t is the smallest
1197
+ integer such that there exists a sequence of matroids P0, P1, . . . , Pt where
1198
+ P0 = M and Pt = N and for every i ∈ [t] the matroid Pi is either a lift or a
1199
+ projection of Pi−1.
1200
+ Lemma 9. Let N be a lift of the matroid M. If there is an α-competitive non-
1201
+ adaptive mechanism for M then there exists a (2α+2)-competitive non-adaptive
1202
+ mechanism for N.
1203
+ 24
1204
+
1205
+ Proof. Since N is a lift of M, there exists a matroid L = (E, S) and an element
1206
+ x of its ground set, such that M = L/x, N = L\x. Here, x is not a loop and
1207
+ not a free element of L.
1208
+ Let P be the set of elements in L that are parallel to x, in other words P :=
1209
+ {x′ ∈ E : x′ ∥ x}. Note that N |P \{x} is a uniform matroid of rank 1. Note also
1210
+ that elements in P \{x} are loops in M and so EPROPHM = EPROPHM\P .
1211
+ Let T ′
1212
+ e, e ∈ E \ {x} be the thresholds imposed by an α-competitive non-
1213
+ adaptive mechanism for the matroid M.
1214
+ Let T ′′
1215
+ e , e ∈ P be the thresholds
1216
+ guaranteeing 2-competitive non-adaptive mechanism as in Theorem 1 for the
1217
+ uniform matroid of rank 1 on the ground set P \{x}; and let T ′′
1218
+ e , e ∈ E\(P ∪{x})
1219
+ be +∞. We select one of these two sets of thresholds for the matroid N as
1220
+ described below. The constructed mechanism for the matroid N selects one
1221
+ of those two sets at random, where first set of thresholds T ′
1222
+ e, e ∈ E \ {x} is
1223
+ selected with probability γ := α/(α + 1) and the second set T ′′
1224
+ e , e ∈ E \ {x}
1225
+ with probability 1 − γ = 1/(α + 1).
1226
+ Next part is dedicated to the analysis of how thresholds T ′
1227
+ e, e ∈ E \ {x}
1228
+ perform on the matroid N.
1229
+ Note, that these thresholds are coming from a
1230
+ mechanism for the matroid M, while they are used for the matroid N with
1231
+ probability γ. We show that the total expected value achieved by thresholds
1232
+ T ′
1233
+ e, e ∈ E \ {x} on N is at least the total expected value achieved by these
1234
+ thresholds on M. For this we can assume that for every realization of item
1235
+ values, the orders of items in matroid N and M are the same. To see that
1236
+ this assumption is valid, we can assume that the order for N is chosen in an
1237
+ adversarial way and is used also as the items order for M.
1238
+ Claim 5. Let us assume that the items order for M and N is the same for
1239
+ a given realization of item values. Let us also assume that for every item e ∈
1240
+ E \ {x} the threshold T ′
1241
+ e is used. Then the gambler with matroid N selects all
1242
+ items that the gambler with matroid M selects.
1243
+ Proof. We fix the item values realization and items order. Let e1, e2,. . . , ek be
1244
+ the items with their values being at least their threshold and with the corre-
1245
+ sponding order.
1246
+ Now we need to show that if the gambler with matroid N selects items
1247
+ greedily from e1, e2,. . . , ek starting from e1, then the set of selected items is a
1248
+ superset of the items greedily selected by the gambler with matroid M. If both
1249
+ gamblers end up selecting exactly the same set of items, then proof of the claim
1250
+ is complete. Otherwise consider the first index i ∈ [k] such that the item ei is
1251
+ selected by exactly one of the two gamblers. Since N = L\x and M = L/x we
1252
+ have that it is only possible if ei is selected by the gambler with the matroid N
1253
+ and rejected by the gambler with the matroid M.
1254
+ Now we claim that every subsequent item, in other words an item in ei+1, . . . ,
1255
+ ek, is either selected by both gamblers or rejected by both gamblers. Suppose
1256
+ the contrary and consider the first item ej, i + 1 ≤ j ≤ k that is selected by
1257
+ one gambler and rejected by another gambler. Let S := {e1, e2, . . . , ej−1} and
1258
+ let T be the set of items selected by the gambler with M from the set S. Thus
1259
+ 25
1260
+
1261
+ the gambler with N selected T ∪ {ei} from the set S. So T ∪ {ei} is a basis of
1262
+ (L\x) |S and T is a basis of (L/x) |S. Thus, both T ∪{ei} and T ∪{x} are bases
1263
+ of L |S. If only one of the two gamblers accepts the item sj then the matroid
1264
+ L |S∪{sj} has two bases of different cardinality, attaining a contradiction and
1265
+ finishing the proof.
1266
+ Thus we have that the thresholds T ′
1267
+ e, e ∈ E\{x} guarantee at least EPROPHM
1268
+ as the expected total value of the gambler with N. To prove that the constructed
1269
+ mechanism is 1/(2α + 2)-competitive it is enough to show the following claim.
1270
+ Note that in our construction we used α-competitive non-adaptive mechanism
1271
+ for the matroid M and 2-competitive non-adaptive mechanism for the uniform
1272
+ matroid of rank 1 on P \ {x}.
1273
+ Claim 6. γ 1
1274
+ αEPROPHM + (1 − γ) 1
1275
+ 2EPROPHP \{x} ⩾
1276
+ 1
1277
+ 2α+2EPROPHN
1278
+ Proof. Let us consider the inclusion-maximal set Iopt on which the prophet
1279
+ achieves PROPHN. Let Copt be a random variable corresponding to the unique
1280
+ circuit of Iopt ∪ {x} in L. Recall that x is not a free element of L so such a
1281
+ circuit exists and is unique and contains x.
1282
+ First consider the events when |Copt| ⩾ 3.
1283
+ Note that by definition of a
1284
+ circuit, for every y ∈ Copt \ {x} the set (Iopt ∪ {x}) \ {y} is independent in
1285
+ L. Hence, for every y ∈ Copt \ {x} the set Iopt \ {y} is independent in M. So
1286
+ we have that conditioned on |Copt| ⩾ 3 we have PROPHM ≥ w(Iopt \ {y})
1287
+ for every y ∈ Copt \ {x}.
1288
+ Let yopt be the random variable representing the
1289
+ element in Copt \{x} of smallest value. Then conditioned on |Copt| ⩾ 3, we have
1290
+ w(Copt \ {yopt, x}) ≥ w(C \ {x})/2. Thus, conditioned on |Copt| ⩾ 3 we have
1291
+ PROPHM ⩾ w(Iopt \ {yopt}) = w(Iopt \ Copt) + w(Copt \ {yopt})
1292
+ ≥ w(Iopt \ Copt) + 1
1293
+ 2w(Copt \ {x}) ≥ 1
1294
+ 2w(Iopt) = 1
1295
+ 2PROPHN .
1296
+ Second consider the event that |Copt| < 3. Since x is not a loop of L by
1297
+ definition, we have |Copt| = 2 and so Copt = {x, xopt} for some random variable
1298
+ element xopt ∈ P \{x}. For the event |Copt| ≥ 3 let us define the random variable
1299
+ element xopt to be an arbitrary element in Copt \ {x}. Thus, if |Copt| < 3 we
1300
+ have PROPHP \{x} ≥ w(xopt). Now let us define Jopt := Iopt \ {xopt} and note
1301
+ that Jopt is independent in the matroid M. Moreover, since Iopt is the set on
1302
+ which the prophet achieves PROPHN, we have that conditioned on |Copt| < 3
1303
+ the prophet achieves PROPHM on the set Jopt.
1304
+ Combining everything together we have
1305
+ γ 1
1306
+ αEPROPHM + (1 − γ)1
1307
+ 2EPROPHP \{x} =
1308
+ 1
1309
+ α + 1EPROPHM +
1310
+ 1
1311
+ 2α + 2EPROPHP \{x} ≥
1312
+ E
1313
+ �w(xopt)
1314
+ 2α + 2 + PROPHM
1315
+ α + 1
1316
+ ���� |Copt| < 3
1317
+
1318
+ P [|Copt| < 3]
1319
+ 26
1320
+
1321
+ + E
1322
+ �PROPHM
1323
+ α + 1
1324
+ ���� |Copt| ⩾ 3
1325
+
1326
+ P [|Copt| ⩾ 3] =
1327
+ E
1328
+ �w(xopt)
1329
+ 2α + 2 + w(Iopt \ {xopt})
1330
+ α + 1
1331
+ ���� |Copt| < 3
1332
+
1333
+ P [|Copt| < 3]
1334
+ + E
1335
+ �PROPHM
1336
+ α + 1
1337
+ ���� |Copt| ⩾ 3
1338
+
1339
+ P [|Copt| ⩾ 3] ≥
1340
+ E
1341
+ �PROPHN
1342
+ 2α + 2
1343
+ ���� |Copt| < 3
1344
+
1345
+ P [|Copt| < 3]
1346
+ + E
1347
+ �PROPHM
1348
+ α + 1
1349
+ ���� |Copt| ⩾ 3
1350
+
1351
+ P [|Copt| ⩾ 3] ≥
1352
+ 1
1353
+ 2α + 2EPROPHN .
1354
+ Lemma 10. Let N be a matroid obtained from a matroid M by a sequence of
1355
+ t projections. Let L be the set of loops in the matroid N. Let there exist an
1356
+ α-competitive non-adaptive mechanism for the matroid M. Then there exists
1357
+ a non-adaptive mechanism for N\L such that the expected total value of this
1358
+ mechanism is at least
1359
+ 1
1360
+ α·3t EPROPHM\L.
1361
+ In the context of Lemma 10, every set that is independent for the matroid N\
1362
+ L is also independent for the matroid M \ L. Hence, we have EPROPHM\L ≥
1363
+ EPROPHN\L. Thus in case t = 1, Lemma 10 leads us to the following corol-
1364
+ lary.
1365
+ Corollary 3. Let N be a projection of the matroid M.
1366
+ If there is an α-
1367
+ competitive non-adaptive mechanism for M then there exists a 3α-competitive
1368
+ non-adaptive mechanism for N.
1369
+ Proof of Lemma 10. Let us prove the statement by induction.
1370
+ Of course, in
1371
+ case t = 0 we have M = N and the statement is trivially true.
1372
+ Let us now assume that t is at least 1. Let N ′ be a matroid such that N ′
1373
+ is obtained from the matroid M by a sequence of t − 1 projections and N is a
1374
+ projection of N ′. Since N is a projection of N ′ there is a matroid P = (E, S)
1375
+ and x ∈ E such that P \ x = N ′ and P/x = N. Let L′ be the set of loops in
1376
+ the matroid N ′.
1377
+ By induction hypothesis, there exist thresholds T ′
1378
+ e, e ∈ E \ (L′ ∪ {x}) such
1379
+ that the gambler with the matroid N ′\L′ achieves at least
1380
+ 1
1381
+ α·3t−1 EPROPHM\L′
1382
+ as the expected total value.
1383
+ Let us assume that to compute thresholds T ′
1384
+ e,
1385
+ e ∈ E \(L′ ∪{x}) the values of items in L were set to be 0 while the distribution
1386
+ of values for other items remain the same. Since L′ ⊆ L, analogously to Lemma 7
1387
+ we can define thresholds
1388
+ T ′′
1389
+ e :=
1390
+
1391
+ +∞
1392
+ if e ∈ L
1393
+ T ′
1394
+ e
1395
+ otherwise
1396
+ 27
1397
+
1398
+ such that the gambler with the matroid N ′\L achieves at least
1399
+ 1
1400
+ α·3t−1 EPROPHM\L
1401
+ as the expected total value. Let T ′′′
1402
+ e , e ∈ E \(L∪{x}) be the thresholds guaran-
1403
+ teeing 2-competitive non-adaptive mechanism as in Theorem 1 for the uniform
1404
+ matroid of rank 1 on the ground set E \ (L ∪ {x}).
1405
+ The constructed mechanism for the matroid N\L selects one of two threshohold
1406
+ sets at random, where first set of thresholds T ′′
1407
+ e , e ∈ E \ (L ∪ {x}) is selected
1408
+ with probability 1/3 and the thresholds T ′′′
1409
+ e , e ∈ E \ (L ∪ {x}) with probability
1410
+ 2/3. Note that the thresholds T ′′
1411
+ e , e ∈ E \ (L ∪ {x}) were designed for the
1412
+ matroid N ′ \ L but are used for the matroid N \ L; hence less items might be
1413
+ selected than when it is used for N ′ \ L. Also note, that the thresholds T ′′′
1414
+ e ,
1415
+ e ∈ E \ (L ∪ {x}) are used for N \ L but were designed for the uniform matroid
1416
+ of rank 1.
1417
+ For the analysis, let Ialg be the random variable indicating the items set
1418
+ selected by the gambler with matroid N ′ \ L when the thresholds T ′′
1419
+ e , e ∈
1420
+ E \ (L ∪ {x}) are used. Analogously to a claim in the proof of Lemma 9, we can
1421
+ assume that when the thresholds T ′′
1422
+ e , e ∈ E\(L∪{x}) are used the gambler with
1423
+ N \L select all items in Ialg with an exception for possibly one item. Let xopt be
1424
+ the random variable indicating the element of maximum value in E \ (L ∪ {x}).
1425
+ To finish the proof it is enough to show the following inequality
1426
+ 1
1427
+ 3E[w(Ialg) − w(xopt)] + 2
1428
+ 3
1429
+ 1
1430
+ 2E[w(xopt)] ≥
1431
+ 1
1432
+ α · 3t EPROPHM\L .
1433
+ To obtain this inequality we can do estimations as follows
1434
+ 1
1435
+ 3E[w(Ialg)−w(xopt)]+2
1436
+ 3
1437
+ 1
1438
+ 2E[w(xopt)] = 1
1439
+ 3E[w(Ialg)] ≥ 1
1440
+ 3
1441
+ 1
1442
+ α · 3t−1 EPROPHM\L .
1443
+ Now let us combine Corollary 3 and Lemma 9.
1444
+ Lemma 11. Let M and N be matroids such that dist(M, N) ≤ t. If there exists
1445
+ an α-competitive non-adaptive mechanism for the matroid M with α ≥ 2 then
1446
+ there exists a 3tα-competitive non-adaptive mechanism for the matroid N.
1447
+ Proof. Note that for α ≥ 2 we have 3α ≥ 2α + 2. Since N can be obtained
1448
+ from M by a sequence of t projection and lift steps, we can use Corollary 3 or
1449
+ Lemma 9 for each of these steps to obtain the desired competitiveness ratio.
1450
+ 6.4.2
1451
+ Minor-closed families theorem
1452
+ Lemma 12 (Lemma 6 in [HN20]). Let p and n be integers such that p ⩽ n − 2
1453
+ and p is prime. The matroid U2,n is not representable over the field Fp.
1454
+ The following Structural Hypothesis is due to Geelen, Gerards and Whittle.
1455
+ The proof of this Structural Hypothesis has not appeared in print.
1456
+ 28
1457
+
1458
+ Hypothesis 1. Let p be a prime number and M is a proper minor-closed class
1459
+ of matroids representable over Fp.
1460
+ Then there exist k, n, t such that every M ∈ M is a restriction of an Fp-
1461
+ representable matroid M ′ having a full tree-decomposition (T, X) of thickness at
1462
+ most k so that for every v ∈ V (T ) if M ′ |clM′(Xv) has a M(Kn) minor, then
1463
+ there exists a 2-column sparse matroid N with dist(M ′ |clM′ (Xv), N) ⩽ t.
1464
+ Proof of Theorem 8. Let k, n, t are as stated in the Structural Hypothesis 1 on
1465
+ M.
1466
+ Let M1 be the set of matroids on distance t or less from some 2-column
1467
+ sparse matroid and are representable over Fp.
1468
+ By Theorem 4 all 2-column
1469
+ sparse matroids have a 32-competitive non-adaptive mechanism. By Lemma 11
1470
+ there exists a (3t · 32)-competitive mechanism for matroids in M1.
1471
+ Let M2 be the set of matroids without M(Kn) minor and are representable
1472
+ over Fp. By Lemma 12 all matroids in M2 do not have U2,p+2 as a minor.
1473
+ Then by Corollary 2, we have that there is a pp3n-competitive non-adaptive
1474
+ mechanism for every matroid in M2.
1475
+ By the Structural Hypothesis 1 we have that every M ∈ M is a restriction
1476
+ of some M ′ with a full tree-decomposition (T, X) of thickness at most k so that
1477
+ for every v ∈ V (T ) M ′ |clM′ (Xv)∈ M1 ∪ M2.
1478
+ Thus by Theorem 13, matroid M ′ has a γ := (max(3t · 32, pp3n) · pk+1)-
1479
+ competitive non-adaptive mechanism. By Lemma 7 the matroid M has also a
1480
+ γ-competitive non-adaptive mechanism.
1481
+ 29
1482
+
1483
+ References
1484
+ [AKW19]
1485
+ Pablo D. Azar, Robert Kleinberg, and S. Matthew Weinberg. Prior
1486
+ independent mechanisms via prophet inequalities with limited in-
1487
+ formation. Games and Economic Behavior, 118:511–532, 2019.
1488
+ [CFPP21]
1489
+ Constantine Caramanis, Matthew Faw, Orestis Papadigenopoulos,
1490
+ and Emmanouil Pountourakis. Single-sample prophet inequalities
1491
+ revisited. ArXiv, abs/2103.13089, 2021.
1492
+ [CGKM20] Shuchi Chawla, Kira Goldner, Anna R Karlin, and J Benjamin
1493
+ Miller. Non-adaptive matroid prophet inequalities. arXiv preprint
1494
+ arXiv:2011.09406, 2020.
1495
+ [CHMS10] Shuchi Chawla, Jason D Hartline, David L Malec, and Balasubra-
1496
+ manian Sivan. Multi-parameter mechanism design and sequential
1497
+ posted pricing. In Proceedings of the forty-second ACM symposium
1498
+ on Theory of computing, pages 311–320, 2010.
1499
+ [DK14]
1500
+ Michael Dinitz and Guy Kortsarz. Matroid secretary for regular and
1501
+ decomposable matroids. SIAM Journal on Computing, 43(5):1807–
1502
+ 1830, 2014.
1503
+ [DK15]
1504
+ Paul Dütting and Robert Kleinberg. Polymatroid prophet inequal-
1505
+ ities. In Algorithms-ESA 2015, pages 437–449. Springer, 2015.
1506
+ [Edm65]
1507
+ Jack Edmonds. Minimum partition of a matroid into independent
1508
+ subsets. J. Res. Nat. Bur. Standards Sect. B, 69:67–72, 1965.
1509
+ [FSZ16]
1510
+ Moran Feldman, Ola Svensson, and Rico Zenklusen. Online con-
1511
+ tention resolution schemes.
1512
+ In Proceedings of the twenty-seventh
1513
+ annual ACM-SIAM symposium on Discrete algorithms, pages 1014–
1514
+ 1033. SIAM, 2016.
1515
+ [FSZ21]
1516
+ Moran Feldman, Ola Svensson, and Rico Zenklusen. Online con-
1517
+ tention resolution schemes with applications to bayesian selection
1518
+ problems. SIAM Journal on Computing, 50(2):255–300, 2021.
1519
+ [Gee11]
1520
+ Jim Geelen.
1521
+ Small cocircuits in matroids.
1522
+ European Journal of
1523
+ Combinatorics, 32(6):795–801, 2011.
1524
+ [GW19]
1525
+ Nikolai Gravin and Hongao Wang. Prophet inequality for bipartite
1526
+ matching: Merits of being simple and non adaptive. In Proceedings
1527
+ of the 2019 ACM Conference on Economics and Computation, pages
1528
+ 93–109, 2019.
1529
+ [HN20]
1530
+ Tony Huynh and Peter Nelson.
1531
+ The matroid secretary problem
1532
+ for minor-closed classes and random matroids. SIAM Journal on
1533
+ Discrete Mathematics, 34(1):163–176, 2020.
1534
+ 30
1535
+
1536
+ [KS77]
1537
+ Ulrich Krengel and Louis Sucheston.
1538
+ Semiamarts and finite val-
1539
+ ues. Bulletin of the American Mathematical Society, 83(4):745–747,
1540
+ 1977.
1541
+ [KW12]
1542
+ Robert Kleinberg and Seth Matthew Weinberg. Matroid prophet
1543
+ inequalities. In Proceedings of the forty-fourth annual ACM sympo-
1544
+ sium on Theory of computing, pages 123–136, 2012.
1545
+ [MTW16]
1546
+ Tengyu Ma, Bo Tang, and Yajun Wang. The simulated greedy algo-
1547
+ rithm for several submodular matroid secretary problems. Theory
1548
+ of Computing Systems, 58(4):681–706, 2016.
1549
+ [Mye81]
1550
+ Roger B Myerson. Optimal auction design. Mathematics of opera-
1551
+ tions research, 6(1):58–73, 1981.
1552
+ [Oxl06]
1553
+ James G. Oxley. Matroid Theory. Oxford graduate texts in mathe-
1554
+ matics. Oxford University Press, 2006.
1555
+ [SC84]
1556
+ Ester Samuel-Cahn. Comparison of threshold stop rules and maxi-
1557
+ mum for independent nonnegative random variables. the Annals of
1558
+ Probability, pages 1213–1216, 1984.
1559
+ [Sch03]
1560
+ A. Schrijver.
1561
+ Combinatorial Optimization:
1562
+ Polyhedra and Effi-
1563
+ ciency. Number Bd. 1 in Algorithms and Combinatorics. Springer,
1564
+ 2003.
1565
+ [Sey80]
1566
+ Paul D Seymour. Decomposition of regular matroids. Journal of
1567
+ combinatorial theory, Series B, 28(3):305–359, 1980.
1568
+ [Sot13]
1569
+ José A Soto. Matroid secretary problem in the random-assignment
1570
+ model. SIAM Journal on Computing, 42(1):178–211, 2013.
1571
+ 31
1572
+
5dAzT4oBgHgl3EQfu_2Z/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6dE4T4oBgHgl3EQfcQxJ/content/2301.05081v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1b578983b5d04843cefafc656ac55156b252ba7b6e555eedc94dc7f2c7a8061d
3
+ size 4197471
6dFKT4oBgHgl3EQf_S4j/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1cbb132d84aa07ce0e4235d50bd04b5ee7c75fa79e33b06241f3eecceaff7d40
3
+ size 7864365
7tE1T4oBgHgl3EQf7QXS/content/2301.03533v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8d097e678466f9dea9040b7488dfe778d37eff1a909b32a3fde95a0afc52484d
3
+ size 199998
7tE1T4oBgHgl3EQf7QXS/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:38e9e8b08c5814bc3e9f06311b3dd272507fd8895f01f268e948859686fc7917
3
+ size 2752557
7tE1T4oBgHgl3EQf7QXS/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:08ffd57712673db789a6ec07fa30fca884a204ce3071e9539c6a10a384ffcf86
3
+ size 94285
7tE4T4oBgHgl3EQfcwyw/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:34369c63ddb1c9de9bf2c2aeba94a4917e766800b2f4e91883b4e152d94656af
3
+ size 12976173
89E5T4oBgHgl3EQfQw7M/content/2301.05516v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:844441ab6d789bf4e735856923103939250577b0123f9109d5234065491ce52f
3
+ size 448607
89E5T4oBgHgl3EQfQw7M/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:045592dc5c9c9a92983f712b7f7400e63b8a2a7479787a87b0bbf5291981e472
3
+ size 197763
8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/2301.03535v1.pdf.txt ADDED
@@ -0,0 +1,788 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ RISs and Sidelink Communications in Smart Cities:
3
+ The Key to Seamless Localization and Sensing
4
+ Hui Chen, Member, IEEE, Hyowon Kim, Member, IEEE, Mustafa Ammous, Student Member, IEEE,
5
+ Gonzalo Seco-Granados, Senior Member, IEEE, George C. Alexandropoulos, Senior Member, IEEE,
6
+ Shahrokh Valaee, Fellow, IEEE, and Henk Wymeersch, Senior Member, IEEE
7
+ Abstract—A smart city involves, among other elements, intelli-
8
+ gent transportation, crowd monitoring, and digital twins, each of
9
+ which requires information exchange via wireless communication
10
+ links and localization of connected devices and passive objects
11
+ (including people). Although localization and sensing (L&S) are
12
+ envisioned as core functions of future communication systems,
13
+ they have inherently different demands in terms of infrastructure
14
+ compared to communications. Wireless communications gener-
15
+ ally requires a connection to only a single access point (AP),
16
+ while L&S demand simultaneous line-of-sight propagation paths
17
+ to several APs, which serve as location and orientation anchors.
18
+ Hence, a smart city deployment optimized for communication
19
+ will be insufficient to meet stringent L&S requirements. In this
20
+ article, we argue that the emerging technologies of reconfigurable
21
+ intelligent surfaces (RISs) and sidelink communications constitute
22
+ the key to providing ubiquitous coverage for L&S in smart cities
23
+ with low-cost and energy-efficient technical solutions. To this end,
24
+ we propose and evaluate AP-coordinated and self-coordinated
25
+ RIS-enabled L&S architectures and detail three groups of appli-
26
+ cation scenarios, relying on low-complexity beacons, cooperative
27
+ localization, and full-duplex transceivers. A list of practical issues
28
+ and consequent open research challenges of the proposed L&S
29
+ systems is also provided.
30
+ Index Terms—Smart cities, reconfigurable intelligent surfaces,
31
+ localization, sensing, sidelink communication.
32
+ I. INTRODUCTION
33
+ The emerging concept of smart cities aims to improve ac-
34
+ cessibility to public services, advance digitization of the urban
35
+ environment, and monitor various human-oriented processes
36
+ as well as assets, by harmonizing diverse digital technologies
37
+ at a city level [1]. This broad concept integrates various
38
+ independent applications to bring improvements both at the
39
+ societal level (such as smart homes, smart transportation, sup-
40
+ ply chains, and environment monitoring), and at the individual
41
+ level (such as indoor navigation and extended reality (XR)). To
42
+ realize the concept of smart cities, reliable, low-latency, and
43
+ high-speed communication systems (to support information
44
+ exchange and management among interconnected devices), as
45
+ well as accurate localization and sensing (L&S) (to support
46
+ communication and provide situation-awareness services), are
47
+ of great importance. In this article, we use the term localization
48
+ to indicate the position (and possibly orientation) estimation of
49
+ a target user equipment (UE), and the term sensing to specify
50
+ the position estimation of passive objects (i.e., objects without
51
+ networking infrastructure or non-cooperating ones).
52
+ By exploiting the large antenna array sizes and wide
53
+ bandwidth of millimeter-wave/THz systems, recent research
54
+ activities in industry and academia on integrated sensing,
55
+ localization, and communication (ISLAC) are growing. ISLAC
56
+ is able to utilize communication infrastructures and signals
57
+ to enable synergies with L&S for diverse applications. To
58
+ this end, several standardization efforts and 3GPP activities
59
+ have been recently studied, such as the definition of new
60
+ radio positioning requirements, evaluation methodologies, and
61
+ techniques (dependent on radio access technology and not), in
62
+ TR 38.855 [2] as well as the development of Wi-Fi sensing
63
+ technology (in both sub-7 GHz and mmWave spectrum), in
64
+ the IEEE 802.11bf standard [3].
65
+ While high angular and delay resolution (due to large
66
+ arrays and wide signal bandwidths) facilitate L&S tasks,
67
+ signal coverage is one of the major challenges, especially
68
+ for high-frequency systems which suffer from high path loss
69
+ and high blockage probability. In contrast to communications,
70
+ which is possible to work with only one point-to-point link,
71
+ L&S functions necessitate access to multiple access points
72
+ (APs). Reflective reconfigurable intelligent surfaces (RISs)
73
+ constitute a promising emerging technology for extending
74
+ coverage and dynamically programming signal propagation
75
+ with almost zero-energy consumption [4], thus, supporting,
76
+ or even enabling in certain cases, wireless communications,
77
+ as well as L&S tasks in various scenarios [5]. However, since
78
+ they are incapable of generating their own signals and only
79
+ modify the analog waveforms impinging on them, separate
80
+ signal generation sources are needed.
81
+ The sources generating signals for RIS-assisted L&S can
82
+ be: i) APs with full communication capabilities, ii) low-
83
+ complexity beacons that broadcast or receive L&S reference
84
+ signals; or iii) the UEs themselves that are involved in the
85
+ L&S tasks. The latter two cases are particularly relevant when
86
+ power-hungry APs, whose deployment is usually costly, needs
87
+ to be avoided. To fulfill the ubiquitous L&S requirements in
88
+ out-of-coverage areas or partially-covered ones (e.g., indoor
89
+ UEs and vehicles in tunnels), sidelink communications via
90
+ the PC5 interface can be particularly useful [6], as mentioned
91
+ in the 3GPP TR 38.845 report [7]. In addition, cooperative
92
+ localization between several UEs can be employed to enhance
93
+ or enable L&S. Furthermore, when a UE is equipped with
94
+ a full-duplex transceiver [8] —a technology that is widely
95
+ discussed in ISLAC for sensing purposes—, it can both
96
+ simultaneously transmit and receive the signal to localize itself
97
+ with a single RIS anchor.
98
+ In this article, we argue that RIS technology in conjunction
99
+ with sidelink communications can provide seamless L&S so-
100
+ lutions, speeding up the intelligent transformation of cities into
101
+ arXiv:2301.03535v1 [eess.SP] 9 Jan 2023
102
+
103
+ 2
104
+ Beacon-Assisted Localization
105
+ Beacon
106
+ Self-L&S with
107
+ a Full-Duplex
108
+ Transceiver
109
+ Beacon-UE Channel
110
+ RIS Anchor Channel
111
+ RIS Localization Channel
112
+ Sidelink Channel
113
+ Sensing Channel
114
+ Scenarios
115
+ Cooperative Localization
116
+ RIS
117
+ A2
118
+ A1
119
+ B1
120
+ B2
121
+ C1
122
+ C2
123
+ C3
124
+ RIS-attached
125
+ Vehicle
126
+ AP
127
+ A3
128
+ B3
129
+ Figure elements by macrovector on Freepik
130
+ Fig. 1. RIS-enabled seamless L&S scenarios in smart cities: a) beacon-assisted localization, b) cooperative localization, and c) self-L&S with a full-duplex
131
+ transceiver.
132
+ smart entities. We particularly elaborate on the representative
133
+ RIS-enabled L&S scenarios illustrated in Figure 1: beacon-
134
+ assisted localization, cooperative localization, and self-L&S
135
+ with a full-duplex transceiver, describing both AP-coordinated
136
+ and AP-free architectures for different coverage scenarios. We
137
+ discuss the open challenges with the proposed green (low-
138
+ cost and energy-efficient) L&S systems in smart cities and list
139
+ potential directions for future research.
140
+ II. L&S ARCHITECTURES AND PROTOCOLS
141
+ In this section, we describe the different entity types of the
142
+ proposed L&S system for smart cities, relying on RISs and
143
+ sidelink communications, as well as its enabling architectures,
144
+ depending on whether an AP is present for L&S coordination.
145
+ A. Entity Types and Overall Architecture
146
+ In the proposed RIS-enabled L&S system, there are several
147
+ types of entities: APs, beacons, RISs, and UEs, as shown in
148
+ Figure 2. The APs (e.g., a gNB macro base station) provide
149
+ cellular services to the devices in coverage. A beacon could be
150
+ a roadside unit (RSU) that is capable of sending and receiving
151
+ L&S reference signals via sidelink communications. In this
152
+ way, the explicit involvement of expensive and power-hungry
153
+ APs with full communication protocols is not needed for L&S
154
+ purposes. RISs serve as reference anchors to assist ISLAC
155
+ tasks, and are controlled by a dedicated entity responsible
156
+ for realizing communication functions. Finally, UEs may have
157
+ different hardware capabilities (e.g., single/multiple antennas,
158
+ half-/full-duplex) that play different roles in L&S (e.g., a target
159
+ UE to be localized, an assistant UE with known or measured
160
+ location to assist L&S, or a server/coordinator in performing
161
+ L&S tasks). Although all the devices involved in the targeted
162
+ tasks will have sidelink communication capabilities, beacons
163
+ usually have fewer power constraints than UEs, while the
164
+ controllers of reflective RISs are expected to work in low-
165
+ power mode without sending or processing L&S reference
166
+ signals [4]. We further consider that RISs coordinate their
167
+ reflective beamforming, either using time division or phase
168
+ profile codes in the time domain.
169
+ For the scenarios considered in this article, we propose two
170
+ different architectures: one based on AP coordination and the
171
+ other on self-coordination. The former architecture works for
172
+ UEs (and other L&S-related devices) inside a coverage area or
173
+ in partial-covered areas (where sidelink is available), requiring
174
+ a specific AP to serve as a L&S coordinator, e.g., interact
175
+ with the location management function (LMF) via the NR
176
+ positioning protocol A (NRPPa) [9]. The self-coordinated ar-
177
+ chitecture relies explicitly on sidelink communications, being
178
+ particularly suitable for UEs in the out-of-coverage of APs, or
179
+ for UEs connected to APs that cannot meet the latency and
180
+ spatial resolution requirements (e.g., legacy 3G/4G APs). In
181
+ both architectures, L&S signals can be generated by a beacon,
182
+ an assistant UE, or a target UE, depending on the network
183
+ topologies and the specific application scenario.
184
+
185
+ 3
186
+ Beacon-UE Channel
187
+ Sidelink Channel
188
+ RIS Channel
189
+ AP-Coordinated Control Link
190
+ Self-Coordinated Control Link
191
+ L&S Coordinator
192
+ Controller
193
+ RIS-1
194
+ In-coverage
195
+ Partial coverage
196
+ Out-of-coverage
197
+ AP
198
+ Beacon
199
+ UE-1
200
+ UE-2
201
+ UE-3
202
+ UE-4
203
+ UE-5
204
+ RIS-2
205
+ RIS-3
206
+ Fig. 2. UEs performing L&S in different coverage areas. The AP-coordinated
207
+ architecture can be used for UEs located in in-coverage or partial-coverage
208
+ (sidelink communications required) areas. When the UEs and all the L&S
209
+ devices cannot access any surrounding APs (i.e., lying in out-of-coverage
210
+ areas), the self-coordinated architecture is the only option for L&S services.
211
+ B. AP-Coordinated Architecture
212
+ This architecture relies on one or several APs to allocate
213
+ the available radio resources and ensure timing among the
214
+ connected devices, which are the UEs, the RIS controllers, and
215
+ dedicated beacon nodes. This network management scheme is
216
+ similar to the mode-1 in sidelink communications [6], and the
217
+ L&S protocols can be summarized into the following 6 steps:
218
+ 1) The target UE triggers an L&S request to the AP (which
219
+ is selected as the task coordinator).
220
+ 2) The coordinator exchanges related location information
221
+ with the core network (e.g., via the NRPPa), determines
222
+ L&S configurations (e.g., broadcasting, sidelink, and
223
+ RIS phase profiles), as well as selects and notifies nearby
224
+ beacons, UEs, and RISs that are involved in the L&S
225
+ task.
226
+ 3) The coordinator allocates time-frequency resources for
227
+ L&S to all involved devices and triggers the RIS con-
228
+ troller(s) to configure their phase profiles for the whole
229
+ duration of the estimation process.
230
+ 4) The beacons and/or UEs transmit L&S reference signals,
231
+ which are reflected by the involved RIS(s) and received
232
+ by the target UE.
233
+ 5) The collected measurements are used by the target UE
234
+ for the localization, and/or sensing tasks. Alternatively,
235
+ this computation can be offloaded at the localization
236
+ server (e.g., the coordinating AP or another UE with
237
+ high computational power).
238
+ 6) The target UE updates the task coordinator with the
239
+ estimated L&S results; this optional step can serve as
240
+ prior information for future use.
241
+ For the partial-coverage scenarios, the out-of-coverage UEs
242
+ need to establish sidelink communications with devices that
243
+ are covered by APs. Then, the L&S tasks can be performed
244
+ similarly to the aforementioned steps.
245
+ C. Self-Coordinated Architecture
246
+ An AP-free architecture is required for cases where the
247
+ devices involved in L&S tasks are located in out-of-coverage
248
+ areas. Similar to the mode-2 sidelink communications [6],
249
+ L&S tasks can be autonomously realized by selecting a
250
+ specific device as the localization coordinator, as follows:
251
+ 1) The target UE discovers nearby devices (e.g., beacons,
252
+ RISs, and other UEs) and obtains their location infor-
253
+ mation (if available).
254
+ 2) Based on the discovered neighbors, the target UE de-
255
+ termines a L&S task coordinator (could be itself) and
256
+ notifies it of the L&S configurations.
257
+ 3) The target UE triggers a L&S request to the coordi-
258
+ nator and performs the same actions as with the AP-
259
+ coordinated architecture (i.e., steps 2)–6)).
260
+ III. RIS-ENABLED L&S SCENARIOS
261
+ In this section, we will present three representative RIS-
262
+ enabled L&S scenarios for smart city applications relying on
263
+ the aforementioned architectures and protocols. We mainly
264
+ focus on localization applications and list potential position-
265
+ ing scenarios in systems with minimum infrastructure and
266
+ resources. For example, if positioning can be done with a
267
+ single antenna, it can also be achieved using a multi-antenna
268
+ array. The same applies to narrowband (NB)/wideband (WB)
269
+ signals, single/multiple anchors, and availability/unavailability
270
+ of a line-of-sight (LOS) path between the UE and the active
271
+ signal source.
272
+ A. Beacon-Assisted Localization
273
+ With low-complexity beacons, high flexibility in the in-
274
+ stallation and deployment of L&S systems is feasible. A
275
+ typical use case could be a train station with multiple low-
276
+ cost beacons broadcasting L&S reference signals to UEs to
277
+ navigate indoors, via the support of RISs. In this category, we
278
+ consider UE localization (with the aid of one or more RISs)
279
+ and RIS localization (with the aid of several beacons).
280
+ A1) Single-RIS-Enabled UE Localization: In a WB system
281
+ where the LOS channel is available, the delays of the LOS
282
+ and RIS paths can be estimated based on the L&S reference
283
+ signals sent from a beacon. Assuming the RIS and beacon
284
+ states are known, the angle-of-departure (AOD) at the RIS
285
+ can also be estimated. The target UE can then be localized
286
+ by the intersection of a hyperbola (i.e., time-difference-of-
287
+ arrival (TDOA) of the LOS and RIS paths) and the line in
288
+ the direction of the AOD at the RIS. When the target UE
289
+ is equipped with an antenna array, 3D orientation can also
290
+ be estimated based on the estimated angle-of-arrivals (AOAs).
291
+ This is the basic RIS-enabled localization scenario that only
292
+ requires a single low-complexity beacon [10].
293
+ A2) Multi-RIS-Enabled UE Localization: If multiple RISs
294
+ are simultaneously available, the requirements for LOS and
295
+ WB are unnecessary. The AODs from different RISs can be
296
+ estimated and used to localize the UE by intersecting the AOD
297
+ lines. In this way, localization tasks can be completed using
298
+ NB signals, which saves bandwidth resources for communi-
299
+ cations. Figure 3 shows the position error bound (PEB) of the
300
+ target UE with different positions inside a 5 × 10 m2 area. As
301
+ shown, with multiple RISs, the UE is localizable even under
302
+ blockage of the LOS path between the beacon and the UE.
303
+
304
+ 4
305
+ -5
306
+ -4
307
+ -3
308
+ -2
309
+ -1
310
+ 0
311
+ 1
312
+ 2
313
+ 3
314
+ 4
315
+ 5
316
+ x axis [m]
317
+ 0
318
+ 1
319
+ 2
320
+ 3
321
+ 4
322
+ 5
323
+ y axis [m]
324
+ Beacon
325
+ RIS
326
+ Wall
327
+ 0.001
328
+ 0.01
329
+ 0.1
330
+ 1 [m]
331
+ Fig. 3. Scenarios A1 and A2: PEB (in meters) with different UE locations
332
+ in a multi-RIS-aided localization scenario. The target UE can be localized
333
+ with one RIS and a beacon-UE LOS path, or with at least 2 RISs under LOS
334
+ blockage conditions.
335
+ However, the localization tasks cannot be performed when
336
+ only one anchor (beacon or RIS) is visible to the UE (see
337
+ the yellow triangular area around the point [3, 3] m).
338
+ A3) RIS Localization via Multi-Static Sensing: In a
339
+ scenario where passive UEs or objects are coated with RISs,
340
+ the localization (or sensing, depending on scenarios) can be
341
+ performed semi-passively with only a small amount of energy
342
+ needed for localization coordination and RIS phase profile
343
+ control. Such localization tasks can estimate the positions (and
344
+ orientations) of RIS-coated objects by using several beacons
345
+ with known positions. Note that the geometrical constraints
346
+ can largely reduce the difficulties in these scenarios. For
347
+ example, the orientation of an RIS can be assumed as 1D
348
+ (e.g., placed on the top of a car facing up). In addition, the
349
+ adoption of antenna arrays at the beacons can further simplify
350
+ the RIS localization problem.
351
+ B. Cooperative Localization
352
+ Sidelink communications (e.g., device-to-device (D2D)
353
+ communications, or the vehicular version known as vehicle-
354
+ to-everything (V2X) communications) has been introduced in
355
+ the millimeter-wave band for information exchange between
356
+ vehicles, opening the road for numerous use cases, such
357
+ as platooning, collision avoidance and autonomous driving
358
+ [6]. The combination of RISs and sidelink is expected to
359
+ provide low-latency and high-reliability communications [11].
360
+ Interestingly, it can also be exploited to assist L&S. Sidelink
361
+ communications enables UEs to participate in a cooperative
362
+ manner in the sharing of position and surrounding information
363
+ within a local network, and in performing relative location
364
+ estimation using sidelink signals [12]. We will focus on the
365
+ latter case, where the absolute location can be estimated
366
+ using RIS anchors (i.e., with known position and orientation
367
+ information), without any APs or beacons. A typical scenario
368
+ could be cooperative vehicular networks in urban areas with
369
+ severe AP and GPS signal blockages.
370
+ We next discuss single- and multi-RIS-involved localization
371
+ scenarios, where single-antenna UEs cooperate to estimate
372
+ their positions via WB sidelink signals. We also consider a
373
+ more general scenario where RIS-coated objects are involved,
374
+ resulting in cooperative RIS localization.
375
+ B1) Single-RIS-Enabled Cooperative Localization: Con-
376
+ sider a scenario with several UEs and one RIS anchor, where
377
+ the UEs wish to estimate their positions. We assume that each
378
+ UE can send sidelink signals (i.e., being the transmitter (TX))
379
+ to other UEs, which arrive at the receiver (RX) UEs via two
380
+ paths (i.e., the UE-UE and UE-RIS-UE paths). By proper
381
+ control of the RIS elements, those two paths can be separated,
382
+ and thus, two delay measurements can be obtained. Due to the
383
+ unknown states of the UEs, both the AOD and AOA at the
384
+ RIS for every TX-RX pair of UEs are unknown and cannot
385
+ be directly estimated. However, we can estimate the spatial
386
+ frequency information at the RIS for every TX-RX pair. This
387
+ scenario requires at least three UEs to cooperate and render
388
+ their locations feasibly without ambiguities. Figure 4 compares
389
+ the PEBs for three UEs in an RIS-enabled versus beacon-aided
390
+ (equipped with an antenna array) 3D cooperative localization
391
+ scenario as a function of the number of RIS elements.
392
+ B2) Multi-RIS-Enabled One-Way Sidelink Localization:
393
+ In the scenario with at least two RISs, one-way sidelink
394
+ communications is sufficient to localize both the TX and RX
395
+ UEs. Assume that one UE takes the role of the TX and the
396
+ other UE is the RX. With two RISs, three delay measurements
397
+ can be obtained between the TX and RX via the LOS and
398
+ the two RIS paths. However, that would require an optimal
399
+ joint design of the reflection elements at both RISs to be able
400
+ to separate the paths at the RX. In addition, once the RIS
401
+ paths are separated, we can also estimate the spatial frequency
402
+ information at each RIS. Thus, those collected measurements
403
+ can be utilized to estimate the locations of the TX and RX.
404
+ B3) Cooperative RIS Localization: Let us consider a more
405
+ general scenario where one RIS (or several) with a known state
406
+ is used to localize multiple UEs (with sidelink capabilities) and
407
+ objects (coated with an RIS). This scenario is challenging due
408
+ to the high complexity of the network and a large number of
409
+ unknowns. However, with a proper design of all the involved
410
+ RIS profiles and the transmission protocol, this problem can
411
+ be decomposed into a cooperative localization (see B1) and
412
+ an RIS localization (see A3) problems. Similar to B1, at least
413
+ several UEs (depending on scenarios) need to take the role
414
+ of the TX, and transmit sidelink signals to the other UEs via
415
+ the direct and indirect paths. Once the UEs are localized, the
416
+ RIS localization task can be solved similarly to A3, and the
417
+ estimation results can be refined by processing all the available
418
+ information.
419
+ C. Self-L&S with a Full-Duplex Transceiver
420
+ When a UE is equipped with a full-duplex transceiver (like
421
+ radar) [8], the multi-RIS setup and cooperation between UEs
422
+ are unnecessary. Instead, this UE can perform self-positioning
423
+ with a single RIS and use the multipath components to map the
424
+ environment over time; this process is known as monostatic
425
+ simultaneous localization and mapping (SLAM). It is noted
426
+ that SLAM is not limited to full-duplex UEs, and bistatic
427
+ SLAM can also be performed in use cases A1-A3 and B1-
428
+ B3.
429
+ We next present three beacon-free L&S scenarios with a
430
+ full-duplex UE.
431
+
432
+ 5
433
+ 0
434
+ 20
435
+ 40
436
+ 60
437
+ 80
438
+ 100
439
+ 120
440
+ 140
441
+ 160
442
+ 0
443
+ 0.5
444
+ 1
445
+ 1.5
446
+ UE-1 (RIS)
447
+ UE-1 (beacon)
448
+ UE-2 (RIS)
449
+ UE-2 (beacon)
450
+ UE-3 (RIS)
451
+ UE-3 (beacon)
452
+ Number of RIS Elements
453
+ PEB [m]
454
+ Fig. 4.
455
+ PEBs of RIS-enabled vs. beacon-aided cooperative localization for
456
+ different RIS sizes and a fixed random phase profile setup. It is shown that,
457
+ with a sufficient number of RIS elements, an active anchor can be replaced
458
+ with a passive one (RIS) without performance degradation.
459
+ C1) RIS-Enabled Self-Localization: Consider a system
460
+ with a single-antenna UE and an RIS, where the UE transmits
461
+ L&S reference signals and receives their back-scattered ver-
462
+ sions, i.e., the UE-RIS-UE (controlled path) and UE-landmark-
463
+ UE (uncontrolled path) signals. One option for the RIS phase
464
+ profiles is to consider directional reflective beams, which can
465
+ be efficiently designed when the UE position uncertainty (even
466
+ under mobility cases) is available [13]. The delay and angle
467
+ information at the RIS of the UE-RIS-UE channel can be
468
+ estimated for this scenario, and then used to localize the UE. In
469
+ Figure 5, beampatterns at the RIS with two different phase pro-
470
+ files are illustrated, focusing on the UE uncertainty region. As
471
+ demonstrated, the optimized phase profiles of [13] can provide
472
+ sufficient beamforming gain, compared with directional phase
473
+ profiles. This gain can offer improved L&S performance.
474
+ C2) RIS-Enabled SLAM: If a UE is equipped with a
475
+ full-duplex multiple-input multiple-output (MIMO) antenna
476
+ array [8], SLAM can be enabled. Similar to scenario C1, the
477
+ signals from different paths can be resolvable with optimized
478
+ RIS phase profiles and precoders/combiners. The following
479
+ channel parameters can be estimated: i) the signal propagation
480
+ delay, the AOD at the RIS, and the AOA at the UE for the
481
+ UE-RIS-UE channel; as well as ii) the delay and AOA at
482
+ the UE for each UE-landmark-UE channel. In addition to the
483
+ position information obtained from the controlled path (as in
484
+ scenario C1), the angular resolution offered by the UE array
485
+ can be leveraged to map/sense the environment. With multiple
486
+ estimations, the localization and radio mapping performance
487
+ can be improved using state-of-the-art filters (e.g., Poisson
488
+ multi-Bernoulli filter).
489
+ C3) RIS Localization with a Full-Duplex Array: Consider
490
+ the more general scenario from C1 including one anchor
491
+ RIS mounted on a wall, a UE equipped with a full-duplex
492
+ MIMO transceiver, and several objects coated with RISs (e.g.,
493
+ mounted on the front and rear side of a vehicle). In addition to
494
+ the signals reflected from the anchor RIS (as also in scenario
495
+ C1), the UE also receives single-bounce reflected signals from
496
+ the RISs mounted on the objects. The time delay, AOA, and
497
+ the amplitude of the channel gain for each signal path can be
498
+ estimated, which can be used for the localization of both itself
499
+ and the RISs-coated objects. When multiple UEs are present
500
+ and cooperate in the estimation process, the orientation of the
501
+ (a) Directional Phase Profiles
502
+ (b) Optimized Phase Profiles
503
+ Fig. 5. The reflective beamforming gain (in dB) with a 50 × 50 RIS using
504
+ (a) a directional phase profile, and (b) an optimized phase profile via [13].
505
+ The red squares represent the UE angular uncertainty region, which needs to
506
+ be fully covered by an effective beampattern design.
507
+ RISs-coated objects can also be obtained. In a scenario without
508
+ any anchors, this RIS localization can also help in estimating
509
+ the relative locations of the active UE and passive UEs.
510
+ IV. OPEN RESEARCH CHALLENGES
511
+ With the assistance of low-complexity beacons, cooperative
512
+ localization, and full-duplex radios, the L&S coverage for
513
+ smart city applications can be significantly extended. However,
514
+ there exist several practical issues that need to be thoroughly
515
+ investigated. In this section, we discuss the most critical
516
+ challenges with the proposed RIS-enabled L&S system and
517
+ list possible directions for future research.
518
+ A. Anchor Deployment Optimization
519
+ The placement of the anchors (e.g., beacons and RISs) is
520
+ critical to meet the L&S key performance indicator (KPI) re-
521
+ quirements within a service area (e.g., error bounds lower than
522
+ a certain threshold, as shown in Figure 3). The deployment
523
+ involves both the position and orientation optimization of the
524
+ anchors, taking into account the blockage in the surrounding
525
+ environment. RIS-aided SLAM can help in creating such an
526
+ environment map, which can be supported by cooperative
527
+ sidelink UEs. Heuristic optimization solutions can then be
528
+ applied for finding optimal anchor sites, extending approaches
529
+ from the literature [14].
530
+
531
+ e.100100150evation20
532
+ Gro40
533
+ .M06080J60
534
+ azllBeaiot0
535
+ muthele100100150evation20
536
+ G[o]40
537
+ .=060
538
+ B80ncertain60
539
+ azilReaiol
540
+ Vmuth6
541
+ B. Resource Allocation and Coordination
542
+ RIS-aided L&S systems involve APs, beacons, RISs, and
543
+ UEs, making them inherently heterogeneous. Resource al-
544
+ location for L&S tasks, including power allocation, time-
545
+ frequency allocation, beamforming design, and scheduling
546
+ must be carefully designed to ensure a favorable trade-off
547
+ with conventional communication services. Depending on the
548
+ KPI requirements of the applications that send L&S ser-
549
+ vice requests, new objectives that consider integrated L&S
550
+ and communications should be formulated and satisfied. An
551
+ important part of resource allocation is RIS phase profile
552
+ optimization and multiplexing [10]. Broad RIS beams lead to
553
+ coverage reduction, while narrow pencil beams are sensitive to
554
+ misalignment. Hence, highly adaptive RIS profile designs are
555
+ needed, relying, when possible, on prior UE and object state
556
+ information. When RISs are large, the near-field effects need
557
+ to be taken into consideration and the beamforming designs
558
+ should account for the curvature of arrival, resulting in beam-
559
+ focusing designs. RIS multiplexing can be addressed by time
560
+ multiplexing, temporal coding, and making use of high path
561
+ loss for spatial reuse. The afore-described resource allocation
562
+ problems can be tackled by a combination of traditional
563
+ optimization-based methods (e.g., convex optimization) and
564
+ learning-based methods (e.g., reinforcement learning).
565
+ C. Estimation Algorithms
566
+ From an algorithmic perspective, there are challenges re-
567
+ lated to channel parameter estimation, tracking in dynamic
568
+ environments, and calibration. Channel parameter estimation
569
+ in the presence of severe multipath is difficult since almost
570
+ passive reflective RISs have no local signal processing capa-
571
+ bilities. Moreover, in cooperative localization (scenarios B1
572
+ and B2) and RIS localization (e.g., scenarios A3, B3, and
573
+ C3) tasks, the AOAs/AODs at the RISs are coupled, meaning
574
+ that we can no longer estimate them independently. Instead,
575
+ only spatial frequencies (containing coupled AOAs and AODs
576
+ information) can be obtained, requiring novel algorithms for
577
+ further processing. More refined channel parameter estimation
578
+ also requires accurate channel models and the RISs’ impact
579
+ on them, such as the near-field effect, beam squint effect, RIS
580
+ element failures, and anchor calibration errors.
581
+ Due to mobility, difficult conditions such as signal blockage,
582
+ unresolvable signal paths, and severe path loss will affect L&S
583
+ performance. Multiple RISs can be involved to handle such
584
+ blockages, offering coverage extension. As the carrier fre-
585
+ quency increases, the signal resolutions become higher, and the
586
+ effect of the severe path loss can be mitigated by adopting RISs
587
+ with larger sizes or active RISs with reflection amplification
588
+ capabilities [15]. Sensing also suffers from inherent complica-
589
+ tions, such as an unknown number of objects, unknown types
590
+ of objects, unknown detection probabilities for signal paths,
591
+ extended objects, and multi-bounce observations. Dedicated
592
+ filters should be developed to address these complications and
593
+ get integrated into the L&S framework.
594
+ Finally, in terms of calibration, anchor geometry error and
595
+ hardware impairments (HWIs) are two important aspects. We
596
+ note that the geometrical calibration of an RIS is similar to RIS
597
+ localization (as described in scenarios A3, B3, and C3), which
598
+ requires a calibration agent that incorporates other sources of
599
+ localization estimations (i.e., sensor fusion). While for HWIs,
600
+ the channel model could be too complicated when considering
601
+ each specific impairment (e.g., mutual coupling and phase
602
+ noise), learning-based methods can be considered to unveil
603
+ their impact and drive practical algorithmic designs.
604
+ D. Understanding Anchor Hardware Alternatives
605
+ There are also opportunities to improve L&S coverage via
606
+ variations of the hardware deployed at the beacons, RISs, and
607
+ UEs. On the beacon and UE sides, multi-panel arrays (i.e., 3D
608
+ arrays) could be implemented for further coverage extension.
609
+ On the RIS side, new types of RISs are emerging beyond
610
+ almost passive reflective RISs [15]. As previously mentioned,
611
+ an active RIS can be used to boost the signal energy (i.e.,
612
+ change both the amplitude and phase of the incident signal) for
613
+ improved coverage. A receiving RIS (also known as a hybrid
614
+ RIS or a simultaneously reflecting and sensing RIS) can enable
615
+ parameter estimation at the RIS side, offering extra degrees
616
+ of freedom for the design of L&S estimation approaches.
617
+ Omni-directional RISs, intended to realize simultaneous reflec-
618
+ tion and refraction (i.e., 360◦ coverage), enable simultaneous
619
+ indoor and outdoor 3D localization. A non-reciprocal RIS
620
+ that integrates nonreciprocal phase shifters allows full-duplex
621
+ communications, and a delay-adjustable RIS is capable of
622
+ adjusting the delays of signals reflected by different RIS
623
+ elements, which contributes to the alleviation of the beam
624
+ squint effect. All of these alternatives have implications on
625
+ L&S services and merit further study.
626
+ E. Privacy, Security, and Social Acceptance Issues
627
+ Cooperative L&S require extensive information exchange of
628
+ local measurements between devices, which may cause privacy
629
+ issues. For example, the RX in scenario B2 can estimate the
630
+ position of the TX with a one-way pilot signal transmission. In
631
+ addition, different types of cyber attacks can reduce the L&S
632
+ service availability, or even provide an undetected erroneous
633
+ location estimation, which is unacceptable for safety-critical
634
+ applications. Currently, several security management systems
635
+ have been standardized (e.g., IEEE 1609.2), and security
636
+ threats have been identified for sidelink communications.
637
+ However, the discussions on L&S task-related security issues
638
+ are still at the initial stage, and potential threats need to
639
+ be explored and eliminated. A final aspect related to the
640
+ widespread adoption of RISs lies in their social acceptance.
641
+ RISs should be integrated in a way that they blend into
642
+ the environment (ideally, be transparent). To this end, the
643
+ benefits of RISs to improve safety and reduce electromagnetic
644
+ emissions should be demonstrated and disseminated.
645
+ V. CONCLUSION AND OUTLOOK
646
+ The smart city paradigm constitutes the epitome of the
647
+ widespread adoption of digital services for societal needs.
648
+ It is envisioned to profit people and city-level businesses,
649
+ offering efficient, safe, and comfortable living spaces as well
650
+
651
+ 7
652
+ as everyday-life smart-living applications. To achieve this
653
+ overarching goal, seamless wireless communications among
654
+ diverse devices and L&S are of paramount importance, en-
655
+ abling information exchange, device localization, and mapping
656
+ of the environment. In this article, we discussed the key
657
+ to achieving low-cost and energy-efficient seamless L&S,
658
+ namely, reflective RISs in conjunction with sidelink commu-
659
+ nications. We presented AP-coordinated and AP-free system
660
+ architectures and detailed three RIS-enabled L&S scenarios,
661
+ each including several use cases and most relying on sidelink
662
+ communications. As became apparent, instead of using APs
663
+ with full communication capabilities, low-complexity beacons
664
+ and RISs can be widely-deployed to enable green L&S smart
665
+ city applications. In addition, when multiple UEs with sidelink
666
+ communication capabilities can be connected in the same
667
+ network, cooperative localization can relieve the requirement
668
+ for multiple anchors. Furthermore, when devices are equipped
669
+ with full-duplex transceivers, they can localize themself and
670
+ map their surrounding environment with only a single RIS
671
+ anchor. Finally, an extended list of open research challenges
672
+ relevant to the proposed RIS-enabled seamless L&S concept
673
+ was presented, including the necessity for anchor deployment
674
+ optimization and optimized resource allocation schemes, al-
675
+ gorithmic and privacy issues, as well as the role of multi-
676
+ functional RISs.
677
+ ACKNOWLEDGMENTS
678
+ This work was supported, in part, by the European Com-
679
+ mission through the EU H2020 RISE-6G project under grant
680
+ 101017011, and by the 6G-Cities project from Chalmers
681
+ Transport Area of Advance.
682
+ REFERENCES
683
+ [1] S. Kisseleff et al., “Reconfigurable intelligent surfaces for smart cities:
684
+ Research challenges and opportunities,” IEEE Open J. Commun. Soc.,
685
+ vol. 1, pp. 1781–1797, Nov. 2020.
686
+ [2] “3GPP
687
+ TR
688
+ 38.855
689
+ V16.0.0:
690
+ Study
691
+ on
692
+ NR
693
+ positioning
694
+ support
695
+ (Release
696
+ 16)
697
+ (accessed
698
+ on
699
+ 28-Dec-2022),”
700
+ Mar.
701
+ 2019.
702
+ [On-
703
+ line]. Available: https://portal.3gpp.org/desktopmodules/Specifications/
704
+ SpecificationDetails.aspx?specificationId=3501
705
+ [3] C. Chen et al., “Wi-Fi sensing based on IEEE 802.11bf,” IEEE Commun.
706
+ Mag., (Early Access), 2022.
707
+ [4] E. Strinati Calvanese et al., “Reconfigurable, intelligent, and sustainable
708
+ wireless environments for 6G smart connectivity,” IEEE Commun. Mag.,
709
+ vol. 59, no. 10, pp. 99–105, Oct. 2021.
710
+ [5] H. Wymeersch et al., “Radio localization and mapping with recon-
711
+ figurable intelligent surfaces: Challenges, opportunities, and research
712
+ directions,” IEEE Veh. Technol. Mag., vol. 15, no. 4, pp. 52–61, Oct.
713
+ 2020.
714
+ [6] M. H. C. Garcia et al., “A tutorial on 5G NR V2X communications,”
715
+ IEEE Commun. Surveys Tuts., vol. 23, no. 3, pp. 1972–2026, Feb. 2021.
716
+ [7] “3GPP TR 38.845 V17.0.0: Study on scenarios and requirements of
717
+ in-coverage, partial coverage, and out-of-coverage NR positioning
718
+ use
719
+ cases
720
+ (Release
721
+ 17)
722
+ (accessed
723
+ on
724
+ 28-Dec-2022),”
725
+ Sep.
726
+ 2021.
727
+ [Online].
728
+ Available:
729
+ https://portal.3gpp.org/desktopmodules/
730
+ Specifications/SpecificationDetails.aspx?specificationId=3806
731
+ [8] G. C. Alexandropoulos et al., “Full-duplex massive multiple-input,
732
+ multiple-output architectures: Recent advances, applications, and future
733
+ directions,” IEEE Veh. Technol. Mag., vol. 17, no. 4, pp. 83–91, Oct.
734
+ 2022.
735
+ [9] “3GPP
736
+ TS
737
+ 38.455
738
+ V17.2.0:
739
+ NR
740
+ Positioning
741
+ Protocol
742
+ A
743
+ (NRPPa)
744
+ (Release
745
+ 17)
746
+ (accessed
747
+ on
748
+ 28-Dec-2022),”
749
+ Sep.
750
+ 2022.
751
+ [Online].
752
+ Available:
753
+ https://portal.3gpp.org/desktopmodules/
754
+ Specifications/SpecificationDetails.aspx?specificationId=3256
755
+ [10] K. Keykhosravi et al., “RIS-enabled SISO localization under user mo-
756
+ bility and spatial-wideband effects,” IEEE J. Sel. Topics Signal Process,
757
+ vol. 16, no. 5, pp. 1125–1140, May. 2022.
758
+ [11] X. Gu et al., “Intelligent surface aided D2D-V2X system for low-
759
+ latency and high-reliability communications,” IEEE Trans. Veh. Technol.,
760
+ vol. 71, no. 11, pp. 11 624–11 636, Jul. 2022.
761
+ [12] S.-W. Ko et al., “V2X-based vehicular positioning: Opportunities, chal-
762
+ lenges, and future directions,” IEEE Wireless Commun., vol. 28, no. 2,
763
+ pp. 144–151, Mar. 2021.
764
+ [13] H. Kim et al., “RIS-enabled and access-point-free simultaneous radio
765
+ localization and mapping,” arXiv preprint arXiv:2212.07141, 2022.
766
+ [14] A. Albanese et al., “LOKO: localization-aware roll-out planning for
767
+ future mobile networks,” IEEE Trans. Mobile Comput., (Early Access),
768
+ 2022.
769
+ [15] M. Jian et al., “Reconfigurable intelligent surfaces for wireless commu-
770
+ nications: Overview of hardware designs, channel models, and estima-
771
+ tion techniques,” Intell. Converged Netw., vol. 3, no. 1, pp. 1–32, Mar.
772
+ 2022.
773
+ Hui Chen (hui.chen@chalmers.se) is a postdoctoral researcher at Chalmers
774
+ University of Technology, Sweden.
775
+ Hyowon Kim (hyowon@chalmers.se) is a postdoctoral researcher at Chalmers
776
+ University of Technology, Sweden.
777
+ Mustafa Ammous (mustafa.ammous@mail.utoronto.ca) is a Ph.D. student at
778
+ University of Toronto, Canada.
779
+ Gonzalo Seco-Granados (gonzalo.seco@uab.cat) is a professor at Universitat
780
+ Autonoma of Barcelona, Spain.
781
+ George C. Alexandropoulos (alexandg@di.uoa.gr) is an assistant professor
782
+ at the Department of Informatics and Telecommunications, National and
783
+ Kapodistrian University of Athens, Greece.
784
+ Shahrokh Valaee (valaee@ece.utoronto.ca) is a professor at University of
785
+ Toronto, Canada.
786
+ Henk Wymeersch (henkw@chalmers.se) is a professor at Chalmers Univer-
787
+ sity of Technology, Sweden.
788
+
8NE1T4oBgHgl3EQf7gWJ/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,456 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf,len=455
2
+ page_content='1 RISs and Sidelink Communications in Smart Cities: The Key to Seamless Localization and Sensing Hui Chen, Member, IEEE, Hyowon Kim, Member, IEEE, Mustafa Ammous, Student Member, IEEE, Gonzalo Seco-Granados, Senior Member, IEEE, George C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
3
+ page_content=' Alexandropoulos, Senior Member, IEEE, Shahrokh Valaee, Fellow, IEEE, and Henk Wymeersch, Senior Member, IEEE Abstract—A smart city involves, among other elements, intelli- gent transportation, crowd monitoring, and digital twins, each of which requires information exchange via wireless communication links and localization of connected devices and passive objects (including people).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
4
+ page_content=' Although localization and sensing (L&S) are envisioned as core functions of future communication systems, they have inherently different demands in terms of infrastructure compared to communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
5
+ page_content=' Wireless communications gener- ally requires a connection to only a single access point (AP), while L&S demand simultaneous line-of-sight propagation paths to several APs, which serve as location and orientation anchors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
6
+ page_content=' Hence, a smart city deployment optimized for communication will be insufficient to meet stringent L&S requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
7
+ page_content=' In this article, we argue that the emerging technologies of reconfigurable intelligent surfaces (RISs) and sidelink communications constitute the key to providing ubiquitous coverage for L&S in smart cities with low-cost and energy-efficient technical solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
8
+ page_content=' To this end, we propose and evaluate AP-coordinated and self-coordinated RIS-enabled L&S architectures and detail three groups of appli- cation scenarios, relying on low-complexity beacons, cooperative localization, and full-duplex transceivers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
9
+ page_content=' A list of practical issues and consequent open research challenges of the proposed L&S systems is also provided.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
10
+ page_content=' Index Terms—Smart cities, reconfigurable intelligent surfaces, localization, sensing, sidelink communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
11
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
12
+ page_content=' INTRODUCTION The emerging concept of smart cities aims to improve ac- cessibility to public services, advance digitization of the urban environment, and monitor various human-oriented processes as well as assets, by harmonizing diverse digital technologies at a city level [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
13
+ page_content=' This broad concept integrates various independent applications to bring improvements both at the societal level (such as smart homes, smart transportation, sup- ply chains, and environment monitoring), and at the individual level (such as indoor navigation and extended reality (XR)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
14
+ page_content=' To realize the concept of smart cities, reliable, low-latency, and high-speed communication systems (to support information exchange and management among interconnected devices), as well as accurate localization and sensing (L&S) (to support communication and provide situation-awareness services), are of great importance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
15
+ page_content=' In this article, we use the term localization to indicate the position (and possibly orientation) estimation of a target user equipment (UE), and the term sensing to specify the position estimation of passive objects (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
16
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
17
+ page_content=', objects without networking infrastructure or non-cooperating ones).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
18
+ page_content=' By exploiting the large antenna array sizes and wide bandwidth of millimeter-wave/THz systems, recent research activities in industry and academia on integrated sensing, localization, and communication (ISLAC) are growing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
19
+ page_content=' ISLAC is able to utilize communication infrastructures and signals to enable synergies with L&S for diverse applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
20
+ page_content=' To this end, several standardization efforts and 3GPP activities have been recently studied, such as the definition of new radio positioning requirements, evaluation methodologies, and techniques (dependent on radio access technology and not), in TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
21
+ page_content='855 [2] as well as the development of Wi-Fi sensing technology (in both sub-7 GHz and mmWave spectrum), in the IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
22
+ page_content='11bf standard [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
23
+ page_content=' While high angular and delay resolution (due to large arrays and wide signal bandwidths) facilitate L&S tasks, signal coverage is one of the major challenges, especially for high-frequency systems which suffer from high path loss and high blockage probability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
24
+ page_content=' In contrast to communications, which is possible to work with only one point-to-point link, L&S functions necessitate access to multiple access points (APs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
25
+ page_content=' Reflective reconfigurable intelligent surfaces (RISs) constitute a promising emerging technology for extending coverage and dynamically programming signal propagation with almost zero-energy consumption [4], thus, supporting, or even enabling in certain cases, wireless communications, as well as L&S tasks in various scenarios [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
26
+ page_content=' However, since they are incapable of generating their own signals and only modify the analog waveforms impinging on them, separate signal generation sources are needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
27
+ page_content=' The sources generating signals for RIS-assisted L&S can be: i) APs with full communication capabilities, ii) low- complexity beacons that broadcast or receive L&S reference signals;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
28
+ page_content=' or iii) the UEs themselves that are involved in the L&S tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
29
+ page_content=' The latter two cases are particularly relevant when power-hungry APs, whose deployment is usually costly, needs to be avoided.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
30
+ page_content=' To fulfill the ubiquitous L&S requirements in out-of-coverage areas or partially-covered ones (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
31
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
32
+ page_content=', indoor UEs and vehicles in tunnels), sidelink communications via the PC5 interface can be particularly useful [6], as mentioned in the 3GPP TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
33
+ page_content='845 report [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
34
+ page_content=' In addition, cooperative localization between several UEs can be employed to enhance or enable L&S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
35
+ page_content=' Furthermore, when a UE is equipped with a full-duplex transceiver [8] —a technology that is widely discussed in ISLAC for sensing purposes—, it can both simultaneously transmit and receive the signal to localize itself with a single RIS anchor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
36
+ page_content=' In this article, we argue that RIS technology in conjunction with sidelink communications can provide seamless L&S so- lutions, speeding up the intelligent transformation of cities into arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
37
+ page_content='03535v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
38
+ page_content='SP] 9 Jan 2023 2 Beacon-Assisted Localization Beacon Self-L&S with a Full-Duplex Transceiver Beacon-UE Channel RIS Anchor Channel RIS Localization Channel Sidelink Channel Sensing Channel Scenarios Cooperative Localization RIS A2 A1 B1 B2 C1 C2 C3 RIS-attached Vehicle AP A3 B3 Figure elements by macrovector on Freepik Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
39
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
40
+ page_content=' RIS-enabled seamless L&S scenarios in smart cities: a) beacon-assisted localization, b) cooperative localization, and c) self-L&S with a full-duplex transceiver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
41
+ page_content=' smart entities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
42
+ page_content=' We particularly elaborate on the representative RIS-enabled L&S scenarios illustrated in Figure 1: beacon- assisted localization, cooperative localization, and self-L&S with a full-duplex transceiver, describing both AP-coordinated and AP-free architectures for different coverage scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
43
+ page_content=' We discuss the open challenges with the proposed green (low- cost and energy-efficient) L&S systems in smart cities and list potential directions for future research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
44
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
45
+ page_content=' L&S ARCHITECTURES AND PROTOCOLS In this section, we describe the different entity types of the proposed L&S system for smart cities, relying on RISs and sidelink communications, as well as its enabling architectures, depending on whether an AP is present for L&S coordination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
46
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
47
+ page_content=' Entity Types and Overall Architecture In the proposed RIS-enabled L&S system, there are several types of entities: APs, beacons, RISs, and UEs, as shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
48
+ page_content=' The APs (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
49
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
50
+ page_content=', a gNB macro base station) provide cellular services to the devices in coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
51
+ page_content=' A beacon could be a roadside unit (RSU) that is capable of sending and receiving L&S reference signals via sidelink communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
52
+ page_content=' In this way, the explicit involvement of expensive and power-hungry APs with full communication protocols is not needed for L&S purposes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
53
+ page_content=' RISs serve as reference anchors to assist ISLAC tasks, and are controlled by a dedicated entity responsible for realizing communication functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
54
+ page_content=' Finally, UEs may have different hardware capabilities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
55
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
56
+ page_content=', single/multiple antennas, half-/full-duplex) that play different roles in L&S (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
57
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
58
+ page_content=', a target UE to be localized, an assistant UE with known or measured location to assist L&S, or a server/coordinator in performing L&S tasks).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
59
+ page_content=' Although all the devices involved in the targeted tasks will have sidelink communication capabilities, beacons usually have fewer power constraints than UEs, while the controllers of reflective RISs are expected to work in low- power mode without sending or processing L&S reference signals [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
60
+ page_content=' We further consider that RISs coordinate their reflective beamforming, either using time division or phase profile codes in the time domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
61
+ page_content=' For the scenarios considered in this article, we propose two different architectures: one based on AP coordination and the other on self-coordination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
62
+ page_content=' The former architecture works for UEs (and other L&S-related devices) inside a coverage area or in partial-covered areas (where sidelink is available), requiring a specific AP to serve as a L&S coordinator, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
63
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
64
+ page_content=', interact with the location management function (LMF) via the NR positioning protocol A (NRPPa) [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
65
+ page_content=' The self-coordinated ar- chitecture relies explicitly on sidelink communications, being particularly suitable for UEs in the out-of-coverage of APs, or for UEs connected to APs that cannot meet the latency and spatial resolution requirements (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
66
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
67
+ page_content=', legacy 3G/4G APs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
68
+ page_content=' In both architectures, L&S signals can be generated by a beacon, an assistant UE, or a target UE, depending on the network topologies and the specific application scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
69
+ page_content=' 3 Beacon-UE Channel Sidelink Channel RIS Channel AP-Coordinated Control Link Self-Coordinated Control Link L&S Coordinator Controller RIS-1 In-coverage Partial coverage Out-of-coverage AP Beacon UE-1 UE-2 UE-3 UE-4 UE-5 RIS-2 RIS-3 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
70
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
71
+ page_content=' UEs performing L&S in different coverage areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
72
+ page_content=' The AP-coordinated architecture can be used for UEs located in in-coverage or partial-coverage (sidelink communications required) areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
73
+ page_content=' When the UEs and all the L&S devices cannot access any surrounding APs (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
74
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
75
+ page_content=', lying in out-of-coverage areas), the self-coordinated architecture is the only option for L&S services.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
76
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
77
+ page_content=' AP-Coordinated Architecture This architecture relies on one or several APs to allocate the available radio resources and ensure timing among the connected devices, which are the UEs, the RIS controllers, and dedicated beacon nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
78
+ page_content=' This network management scheme is similar to the mode-1 in sidelink communications [6], and the L&S protocols can be summarized into the following 6 steps: 1) The target UE triggers an L&S request to the AP (which is selected as the task coordinator).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
79
+ page_content=' 2) The coordinator exchanges related location information with the core network (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
80
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
81
+ page_content=', via the NRPPa), determines L&S configurations (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
82
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
83
+ page_content=', broadcasting, sidelink, and RIS phase profiles), as well as selects and notifies nearby beacons, UEs, and RISs that are involved in the L&S task.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
84
+ page_content=' 3) The coordinator allocates time-frequency resources for L&S to all involved devices and triggers the RIS con- troller(s) to configure their phase profiles for the whole duration of the estimation process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
85
+ page_content=' 4) The beacons and/or UEs transmit L&S reference signals, which are reflected by the involved RIS(s) and received by the target UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
86
+ page_content=' 5) The collected measurements are used by the target UE for the localization, and/or sensing tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
87
+ page_content=' Alternatively, this computation can be offloaded at the localization server (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
88
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
89
+ page_content=', the coordinating AP or another UE with high computational power).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
90
+ page_content=' 6) The target UE updates the task coordinator with the estimated L&S results;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
91
+ page_content=' this optional step can serve as prior information for future use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
92
+ page_content=' For the partial-coverage scenarios, the out-of-coverage UEs need to establish sidelink communications with devices that are covered by APs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
93
+ page_content=' Then, the L&S tasks can be performed similarly to the aforementioned steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
94
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
95
+ page_content=' Self-Coordinated Architecture An AP-free architecture is required for cases where the devices involved in L&S tasks are located in out-of-coverage areas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
96
+ page_content=' Similar to the mode-2 sidelink communications [6], L&S tasks can be autonomously realized by selecting a specific device as the localization coordinator, as follows: 1) The target UE discovers nearby devices (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
97
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
98
+ page_content=', beacons, RISs, and other UEs) and obtains their location infor- mation (if available).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
99
+ page_content=' 2) Based on the discovered neighbors, the target UE de- termines a L&S task coordinator (could be itself) and notifies it of the L&S configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
100
+ page_content=' 3) The target UE triggers a L&S request to the coordi- nator and performs the same actions as with the AP- coordinated architecture (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
101
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
102
+ page_content=', steps 2)–6)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
103
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
104
+ page_content=' RIS-ENABLED L&S SCENARIOS In this section, we will present three representative RIS- enabled L&S scenarios for smart city applications relying on the aforementioned architectures and protocols.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
105
+ page_content=' We mainly focus on localization applications and list potential position- ing scenarios in systems with minimum infrastructure and resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
106
+ page_content=' For example, if positioning can be done with a single antenna, it can also be achieved using a multi-antenna array.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
107
+ page_content=' The same applies to narrowband (NB)/wideband (WB) signals, single/multiple anchors, and availability/unavailability of a line-of-sight (LOS) path between the UE and the active signal source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
108
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
109
+ page_content=' Beacon-Assisted Localization With low-complexity beacons, high flexibility in the in- stallation and deployment of L&S systems is feasible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
110
+ page_content=' A typical use case could be a train station with multiple low- cost beacons broadcasting L&S reference signals to UEs to navigate indoors, via the support of RISs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
111
+ page_content=' In this category, we consider UE localization (with the aid of one or more RISs) and RIS localization (with the aid of several beacons).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
112
+ page_content=' A1) Single-RIS-Enabled UE Localization: In a WB system where the LOS channel is available, the delays of the LOS and RIS paths can be estimated based on the L&S reference signals sent from a beacon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
113
+ page_content=' Assuming the RIS and beacon states are known, the angle-of-departure (AOD) at the RIS can also be estimated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
114
+ page_content=' The target UE can then be localized by the intersection of a hyperbola (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
115
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
116
+ page_content=', time-difference-of- arrival (TDOA) of the LOS and RIS paths) and the line in the direction of the AOD at the RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
117
+ page_content=' When the target UE is equipped with an antenna array, 3D orientation can also be estimated based on the estimated angle-of-arrivals (AOAs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
118
+ page_content=' This is the basic RIS-enabled localization scenario that only requires a single low-complexity beacon [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
119
+ page_content=' A2) Multi-RIS-Enabled UE Localization: If multiple RISs are simultaneously available, the requirements for LOS and WB are unnecessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
120
+ page_content=' The AODs from different RISs can be estimated and used to localize the UE by intersecting the AOD lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
121
+ page_content=' In this way, localization tasks can be completed using NB signals, which saves bandwidth resources for communi- cations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
122
+ page_content=' Figure 3 shows the position error bound (PEB) of the target UE with different positions inside a 5 × 10 m2 area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
123
+ page_content=' As shown, with multiple RISs, the UE is localizable even under blockage of the LOS path between the beacon and the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
124
+ page_content=' 4 5 4 3 2 1 0 1 2 3 4 5 x axis [m] 0 1 2 3 4 5 y axis [m] Beacon RIS Wall 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
125
+ page_content='001 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
126
+ page_content='01 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
127
+ page_content='1 1 [m] Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
128
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
129
+ page_content=' Scenarios A1 and A2: PEB (in meters) with different UE locations in a multi-RIS-aided localization scenario.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
130
+ page_content=' The target UE can be localized with one RIS and a beacon-UE LOS path, or with at least 2 RISs under LOS blockage conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
131
+ page_content=' However, the localization tasks cannot be performed when only one anchor (beacon or RIS) is visible to the UE (see the yellow triangular area around the point [3, 3] m).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
132
+ page_content=' A3) RIS Localization via Multi-Static Sensing: In a scenario where passive UEs or objects are coated with RISs, the localization (or sensing, depending on scenarios) can be performed semi-passively with only a small amount of energy needed for localization coordination and RIS phase profile control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
133
+ page_content=' Such localization tasks can estimate the positions (and orientations) of RIS-coated objects by using several beacons with known positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
134
+ page_content=' Note that the geometrical constraints can largely reduce the difficulties in these scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
135
+ page_content=' For example, the orientation of an RIS can be assumed as 1D (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
136
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
137
+ page_content=', placed on the top of a car facing up).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
138
+ page_content=' In addition, the adoption of antenna arrays at the beacons can further simplify the RIS localization problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
139
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
140
+ page_content=' Cooperative Localization Sidelink communications (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
141
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
142
+ page_content=', device-to-device (D2D) communications, or the vehicular version known as vehicle- to-everything (V2X) communications) has been introduced in the millimeter-wave band for information exchange between vehicles, opening the road for numerous use cases, such as platooning, collision avoidance and autonomous driving [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
143
+ page_content=' The combination of RISs and sidelink is expected to provide low-latency and high-reliability communications [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
144
+ page_content=' Interestingly, it can also be exploited to assist L&S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
145
+ page_content=' Sidelink communications enables UEs to participate in a cooperative manner in the sharing of position and surrounding information within a local network, and in performing relative location estimation using sidelink signals [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
146
+ page_content=' We will focus on the latter case, where the absolute location can be estimated using RIS anchors (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
147
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
148
+ page_content=', with known position and orientation information), without any APs or beacons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
149
+ page_content=' A typical scenario could be cooperative vehicular networks in urban areas with severe AP and GPS signal blockages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
150
+ page_content=' We next discuss single- and multi-RIS-involved localization scenarios, where single-antenna UEs cooperate to estimate their positions via WB sidelink signals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
151
+ page_content=' We also consider a more general scenario where RIS-coated objects are involved, resulting in cooperative RIS localization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
152
+ page_content=' B1) Single-RIS-Enabled Cooperative Localization: Con- sider a scenario with several UEs and one RIS anchor, where the UEs wish to estimate their positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
153
+ page_content=' We assume that each UE can send sidelink signals (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
154
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
155
+ page_content=', being the transmitter (TX)) to other UEs, which arrive at the receiver (RX) UEs via two paths (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
156
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
157
+ page_content=', the UE-UE and UE-RIS-UE paths).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
158
+ page_content=' By proper control of the RIS elements, those two paths can be separated, and thus, two delay measurements can be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
159
+ page_content=' Due to the unknown states of the UEs, both the AOD and AOA at the RIS for every TX-RX pair of UEs are unknown and cannot be directly estimated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
160
+ page_content=' However, we can estimate the spatial frequency information at the RIS for every TX-RX pair.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
161
+ page_content=' This scenario requires at least three UEs to cooperate and render their locations feasibly without ambiguities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
162
+ page_content=' Figure 4 compares the PEBs for three UEs in an RIS-enabled versus beacon-aided (equipped with an antenna array) 3D cooperative localization scenario as a function of the number of RIS elements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
163
+ page_content=' B2) Multi-RIS-Enabled One-Way Sidelink Localization: In the scenario with at least two RISs, one-way sidelink communications is sufficient to localize both the TX and RX UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
164
+ page_content=' Assume that one UE takes the role of the TX and the other UE is the RX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
165
+ page_content=' With two RISs, three delay measurements can be obtained between the TX and RX via the LOS and the two RIS paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
166
+ page_content=' However, that would require an optimal joint design of the reflection elements at both RISs to be able to separate the paths at the RX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
167
+ page_content=' In addition, once the RIS paths are separated, we can also estimate the spatial frequency information at each RIS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
168
+ page_content=' Thus, those collected measurements can be utilized to estimate the locations of the TX and RX.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
169
+ page_content=' B3) Cooperative RIS Localization: Let us consider a more general scenario where one RIS (or several) with a known state is used to localize multiple UEs (with sidelink capabilities) and objects (coated with an RIS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
170
+ page_content=' This scenario is challenging due to the high complexity of the network and a large number of unknowns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
171
+ page_content=' However, with a proper design of all the involved RIS profiles and the transmission protocol, this problem can be decomposed into a cooperative localization (see B1) and an RIS localization (see A3) problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
172
+ page_content=' Similar to B1, at least several UEs (depending on scenarios) need to take the role of the TX, and transmit sidelink signals to the other UEs via the direct and indirect paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
173
+ page_content=' Once the UEs are localized, the RIS localization task can be solved similarly to A3, and the estimation results can be refined by processing all the available information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
174
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
175
+ page_content=' Self-L&S with a Full-Duplex Transceiver When a UE is equipped with a full-duplex transceiver (like radar) [8], the multi-RIS setup and cooperation between UEs are unnecessary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
176
+ page_content=' Instead, this UE can perform self-positioning with a single RIS and use the multipath components to map the environment over time;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
177
+ page_content=' this process is known as monostatic simultaneous localization and mapping (SLAM).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
178
+ page_content=' It is noted that SLAM is not limited to full-duplex UEs, and bistatic SLAM can also be performed in use cases A1-A3 and B1- B3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
179
+ page_content=' We next present three beacon-free L&S scenarios with a full-duplex UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
180
+ page_content=' 5 0 20 40 60 80 100 120 140 160 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
181
+ page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
182
+ page_content='5 UE-1 (RIS) UE-1 (beacon) UE-2 (RIS) UE-2 (beacon) UE-3 (RIS) UE-3 (beacon) Number of RIS Elements PEB [m] Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
183
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
184
+ page_content=' PEBs of RIS-enabled vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
185
+ page_content=' beacon-aided cooperative localization for different RIS sizes and a fixed random phase profile setup.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
186
+ page_content=' It is shown that, with a sufficient number of RIS elements, an active anchor can be replaced with a passive one (RIS) without performance degradation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
187
+ page_content=' C1) RIS-Enabled Self-Localization: Consider a system with a single-antenna UE and an RIS, where the UE transmits L&S reference signals and receives their back-scattered ver- sions, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
188
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
189
+ page_content=', the UE-RIS-UE (controlled path) and UE-landmark- UE (uncontrolled path) signals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
190
+ page_content=' One option for the RIS phase profiles is to consider directional reflective beams, which can be efficiently designed when the UE position uncertainty (even under mobility cases) is available [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
191
+ page_content=' The delay and angle information at the RIS of the UE-RIS-UE channel can be estimated for this scenario, and then used to localize the UE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
192
+ page_content=' In Figure 5, beampatterns at the RIS with two different phase pro- files are illustrated, focusing on the UE uncertainty region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
193
+ page_content=' As demonstrated, the optimized phase profiles of [13] can provide sufficient beamforming gain, compared with directional phase profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
194
+ page_content=' This gain can offer improved L&S performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
195
+ page_content=' C2) RIS-Enabled SLAM: If a UE is equipped with a full-duplex multiple-input multiple-output (MIMO) antenna array [8], SLAM can be enabled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
196
+ page_content=' Similar to scenario C1, the signals from different paths can be resolvable with optimized RIS phase profiles and precoders/combiners.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
197
+ page_content=' The following channel parameters can be estimated: i) the signal propagation delay, the AOD at the RIS, and the AOA at the UE for the UE-RIS-UE channel;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
198
+ page_content=' as well as ii) the delay and AOA at the UE for each UE-landmark-UE channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
199
+ page_content=' In addition to the position information obtained from the controlled path (as in scenario C1), the angular resolution offered by the UE array can be leveraged to map/sense the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
200
+ page_content=' With multiple estimations, the localization and radio mapping performance can be improved using state-of-the-art filters (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
201
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
202
+ page_content=', Poisson multi-Bernoulli filter).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
203
+ page_content=' C3) RIS Localization with a Full-Duplex Array: Consider the more general scenario from C1 including one anchor RIS mounted on a wall, a UE equipped with a full-duplex MIMO transceiver, and several objects coated with RISs (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
204
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
205
+ page_content=', mounted on the front and rear side of a vehicle).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
206
+ page_content=' In addition to the signals reflected from the anchor RIS (as also in scenario C1), the UE also receives single-bounce reflected signals from the RISs mounted on the objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
207
+ page_content=' The time delay, AOA, and the amplitude of the channel gain for each signal path can be estimated, which can be used for the localization of both itself and the RISs-coated objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
208
+ page_content=' When multiple UEs are present and cooperate in the estimation process, the orientation of the (a) Directional Phase Profiles (b) Optimized Phase Profiles Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
209
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
210
+ page_content=' The reflective beamforming gain (in dB) with a 50 × 50 RIS using (a) a directional phase profile, and (b) an optimized phase profile via [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
211
+ page_content=' The red squares represent the UE angular uncertainty region, which needs to be fully covered by an effective beampattern design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
212
+ page_content=' RISs-coated objects can also be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
213
+ page_content=' In a scenario without any anchors, this RIS localization can also help in estimating the relative locations of the active UE and passive UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
214
+ page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
215
+ page_content=' OPEN RESEARCH CHALLENGES With the assistance of low-complexity beacons, cooperative localization, and full-duplex radios, the L&S coverage for smart city applications can be significantly extended.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
216
+ page_content=' However, there exist several practical issues that need to be thoroughly investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
217
+ page_content=' In this section, we discuss the most critical challenges with the proposed RIS-enabled L&S system and list possible directions for future research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
218
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
219
+ page_content=' Anchor Deployment Optimization The placement of the anchors (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
220
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
221
+ page_content=', beacons and RISs) is critical to meet the L&S key performance indicator (KPI) re- quirements within a service area (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
222
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
223
+ page_content=', error bounds lower than a certain threshold, as shown in Figure 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
224
+ page_content=' The deployment involves both the position and orientation optimization of the anchors, taking into account the blockage in the surrounding environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
225
+ page_content=' RIS-aided SLAM can help in creating such an environment map, which can be supported by cooperative sidelink UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
226
+ page_content=' Heuristic optimization solutions can then be applied for finding optimal anchor sites, extending approaches from the literature [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
227
+ page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
228
+ page_content='100100150evation20 Gro40 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
229
+ page_content='M06080J60 azllBeaiot0 muthele100100150evation20 G[o]40 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
230
+ page_content='=060 B80ncertain60 azilReaiol Vmuth6 B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
231
+ page_content=' Resource Allocation and Coordination RIS-aided L&S systems involve APs, beacons, RISs, and UEs, making them inherently heterogeneous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
232
+ page_content=' Resource al- location for L&S tasks, including power allocation, time- frequency allocation, beamforming design, and scheduling must be carefully designed to ensure a favorable trade-off with conventional communication services.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
233
+ page_content=' Depending on the KPI requirements of the applications that send L&S ser- vice requests, new objectives that consider integrated L&S and communications should be formulated and satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
234
+ page_content=' An important part of resource allocation is RIS phase profile optimization and multiplexing [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
235
+ page_content=' Broad RIS beams lead to coverage reduction, while narrow pencil beams are sensitive to misalignment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
236
+ page_content=' Hence, highly adaptive RIS profile designs are needed, relying, when possible, on prior UE and object state information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
237
+ page_content=' When RISs are large, the near-field effects need to be taken into consideration and the beamforming designs should account for the curvature of arrival, resulting in beam- focusing designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
238
+ page_content=' RIS multiplexing can be addressed by time multiplexing, temporal coding, and making use of high path loss for spatial reuse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
239
+ page_content=' The afore-described resource allocation problems can be tackled by a combination of traditional optimization-based methods (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
240
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
241
+ page_content=', convex optimization) and learning-based methods (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
242
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
243
+ page_content=', reinforcement learning).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
244
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
245
+ page_content=' Estimation Algorithms From an algorithmic perspective, there are challenges re- lated to channel parameter estimation, tracking in dynamic environments, and calibration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
246
+ page_content=' Channel parameter estimation in the presence of severe multipath is difficult since almost passive reflective RISs have no local signal processing capa- bilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
247
+ page_content=' Moreover, in cooperative localization (scenarios B1 and B2) and RIS localization (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
248
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
249
+ page_content=', scenarios A3, B3, and C3) tasks, the AOAs/AODs at the RISs are coupled, meaning that we can no longer estimate them independently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
250
+ page_content=' Instead, only spatial frequencies (containing coupled AOAs and AODs information) can be obtained, requiring novel algorithms for further processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
251
+ page_content=' More refined channel parameter estimation also requires accurate channel models and the RISs’ impact on them, such as the near-field effect, beam squint effect, RIS element failures, and anchor calibration errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
252
+ page_content=' Due to mobility, difficult conditions such as signal blockage, unresolvable signal paths, and severe path loss will affect L&S performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
253
+ page_content=' Multiple RISs can be involved to handle such blockages, offering coverage extension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
254
+ page_content=' As the carrier fre- quency increases, the signal resolutions become higher, and the effect of the severe path loss can be mitigated by adopting RISs with larger sizes or active RISs with reflection amplification capabilities [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
255
+ page_content=' Sensing also suffers from inherent complica- tions, such as an unknown number of objects, unknown types of objects, unknown detection probabilities for signal paths, extended objects, and multi-bounce observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
256
+ page_content=' Dedicated filters should be developed to address these complications and get integrated into the L&S framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
257
+ page_content=' Finally, in terms of calibration, anchor geometry error and hardware impairments (HWIs) are two important aspects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
258
+ page_content=' We note that the geometrical calibration of an RIS is similar to RIS localization (as described in scenarios A3, B3, and C3), which requires a calibration agent that incorporates other sources of localization estimations (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
259
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
260
+ page_content=', sensor fusion).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
261
+ page_content=' While for HWIs, the channel model could be too complicated when considering each specific impairment (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
262
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
263
+ page_content=', mutual coupling and phase noise), learning-based methods can be considered to unveil their impact and drive practical algorithmic designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
264
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
265
+ page_content=' Understanding Anchor Hardware Alternatives There are also opportunities to improve L&S coverage via variations of the hardware deployed at the beacons, RISs, and UEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
266
+ page_content=' On the beacon and UE sides, multi-panel arrays (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
267
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
268
+ page_content=', 3D arrays) could be implemented for further coverage extension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
269
+ page_content=' On the RIS side, new types of RISs are emerging beyond almost passive reflective RISs [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
270
+ page_content=' As previously mentioned, an active RIS can be used to boost the signal energy (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
271
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
272
+ page_content=', change both the amplitude and phase of the incident signal) for improved coverage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
273
+ page_content=' A receiving RIS (also known as a hybrid RIS or a simultaneously reflecting and sensing RIS) can enable parameter estimation at the RIS side, offering extra degrees of freedom for the design of L&S estimation approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
274
+ page_content=' Omni-directional RISs, intended to realize simultaneous reflec- tion and refraction (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
275
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
276
+ page_content=', 360◦ coverage), enable simultaneous indoor and outdoor 3D localization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
277
+ page_content=' A non-reciprocal RIS that integrates nonreciprocal phase shifters allows full-duplex communications, and a delay-adjustable RIS is capable of adjusting the delays of signals reflected by different RIS elements, which contributes to the alleviation of the beam squint effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
278
+ page_content=' All of these alternatives have implications on L&S services and merit further study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
279
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
280
+ page_content=' Privacy, Security, and Social Acceptance Issues Cooperative L&S require extensive information exchange of local measurements between devices, which may cause privacy issues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
281
+ page_content=' For example, the RX in scenario B2 can estimate the position of the TX with a one-way pilot signal transmission.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
282
+ page_content=' In addition, different types of cyber attacks can reduce the L&S service availability, or even provide an undetected erroneous location estimation, which is unacceptable for safety-critical applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
283
+ page_content=' Currently, several security management systems have been standardized (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
284
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
285
+ page_content=', IEEE 1609.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
286
+ page_content='2), and security threats have been identified for sidelink communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
287
+ page_content=' However, the discussions on L&S task-related security issues are still at the initial stage, and potential threats need to be explored and eliminated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
288
+ page_content=' A final aspect related to the widespread adoption of RISs lies in their social acceptance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
289
+ page_content=' RISs should be integrated in a way that they blend into the environment (ideally, be transparent).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
290
+ page_content=' To this end, the benefits of RISs to improve safety and reduce electromagnetic emissions should be demonstrated and disseminated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
291
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
292
+ page_content=' CONCLUSION AND OUTLOOK The smart city paradigm constitutes the epitome of the widespread adoption of digital services for societal needs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
293
+ page_content=' It is envisioned to profit people and city-level businesses, offering ef���cient, safe, and comfortable living spaces as well 7 as everyday-life smart-living applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
294
+ page_content=' To achieve this overarching goal, seamless wireless communications among diverse devices and L&S are of paramount importance, en- abling information exchange, device localization, and mapping of the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
295
+ page_content=' In this article, we discussed the key to achieving low-cost and energy-efficient seamless L&S, namely, reflective RISs in conjunction with sidelink commu- nications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
296
+ page_content=' We presented AP-coordinated and AP-free system architectures and detailed three RIS-enabled L&S scenarios, each including several use cases and most relying on sidelink communications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
297
+ page_content=' As became apparent, instead of using APs with full communication capabilities, low-complexity beacons and RISs can be widely-deployed to enable green L&S smart city applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
298
+ page_content=' In addition, when multiple UEs with sidelink communication capabilities can be connected in the same network, cooperative localization can relieve the requirement for multiple anchors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
299
+ page_content=' Furthermore, when devices are equipped with full-duplex transceivers, they can localize themself and map their surrounding environment with only a single RIS anchor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
300
+ page_content=' Finally, an extended list of open research challenges relevant to the proposed RIS-enabled seamless L&S concept was presented, including the necessity for anchor deployment optimization and optimized resource allocation schemes, al- gorithmic and privacy issues, as well as the role of multi- functional RISs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
301
+ page_content=' ACKNOWLEDGMENTS This work was supported, in part, by the European Com- mission through the EU H2020 RISE-6G project under grant 101017011, and by the 6G-Cities project from Chalmers Transport Area of Advance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
302
+ page_content=' REFERENCES [1] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
303
+ page_content=' Kisseleff et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
304
+ page_content=', “Reconfigurable intelligent surfaces for smart cities: Research challenges and opportunities,” IEEE Open J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
305
+ page_content=' Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
306
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
307
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
308
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
309
+ page_content=' 1781–1797, Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
310
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
311
+ page_content=' [2] “3GPP TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
312
+ page_content='855 V16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
313
+ page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
314
+ page_content='0: Study on NR positioning support (Release 16) (accessed on 28-Dec-2022),” Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
315
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
316
+ page_content=' [On- line].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
317
+ page_content=' Available: https://portal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
318
+ page_content='3gpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
319
+ page_content='org/desktopmodules/Specifications/ SpecificationDetails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
320
+ page_content='aspx?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
321
+ page_content='specificationId=3501 [3] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
322
+ page_content=' Chen et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
323
+ page_content=', “Wi-Fi sensing based on IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
324
+ page_content='11bf,” IEEE Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
325
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
326
+ page_content=', (Early Access), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
327
+ page_content=' [4] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
328
+ page_content=' Strinati Calvanese et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
329
+ page_content=', “Reconfigurable, intelligent, and sustainable wireless environments for 6G smart connectivity,” IEEE Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
330
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
331
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
332
+ page_content=' 59, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
333
+ page_content=' 10, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
334
+ page_content=' 99–105, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
335
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
336
+ page_content=' [5] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
337
+ page_content=' Wymeersch et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
338
+ page_content=', “Radio localization and mapping with recon- figurable intelligent surfaces: Challenges, opportunities, and research directions,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
339
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
340
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
341
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
342
+ page_content=' 15, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
343
+ page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
344
+ page_content=' 52–61, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
345
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
346
+ page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
347
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
348
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
349
+ page_content=' Garcia et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
350
+ page_content=', “A tutorial on 5G NR V2X communications,” IEEE Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
351
+ page_content=' Surveys Tuts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
352
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
353
+ page_content=' 23, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
354
+ page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
355
+ page_content=' 1972–2026, Feb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
356
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
357
+ page_content=' [7] “3GPP TR 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
358
+ page_content='845 V17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
359
+ page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
360
+ page_content='0: Study on scenarios and requirements of in-coverage, partial coverage, and out-of-coverage NR positioning use cases (Release 17) (accessed on 28-Dec-2022),” Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
361
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
362
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
363
+ page_content=' Available: https://portal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
364
+ page_content='3gpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
365
+ page_content='org/desktopmodules/ Specifications/SpecificationDetails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
366
+ page_content='aspx?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
367
+ page_content='specificationId=3806 [8] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
368
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
369
+ page_content=' Alexandropoulos et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
370
+ page_content=', “Full-duplex massive multiple-input, multiple-output architectures: Recent advances, applications, and future directions,” IEEE Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
371
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
372
+ page_content=' Mag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
373
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
374
+ page_content=' 17, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
375
+ page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
376
+ page_content=' 83–91, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
377
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
378
+ page_content=' [9] “3GPP TS 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
379
+ page_content='455 V17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
380
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
381
+ page_content='0: NR Positioning Protocol A (NRPPa) (Release 17) (accessed on 28-Dec-2022),” Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
382
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
383
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
384
+ page_content=' Available: https://portal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
385
+ page_content='3gpp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
386
+ page_content='org/desktopmodules/ Specifications/SpecificationDetails.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
387
+ page_content='aspx?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
388
+ page_content='specificationId=3256 [10] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
389
+ page_content=' Keykhosravi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
390
+ page_content=', “RIS-enabled SISO localization under user mo- bility and spatial-wideband effects,” IEEE J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
391
+ page_content=' Sel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
392
+ page_content=' Topics Signal Process, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
393
+ page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
394
+ page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
395
+ page_content=' 1125–1140, May.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
396
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
397
+ page_content=' [11] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
398
+ page_content=' Gu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
399
+ page_content=', “Intelligent surface aided D2D-V2X system for low- latency and high-reliability communications,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
400
+ page_content=' Veh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
401
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
402
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
403
+ page_content=' 71, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
404
+ page_content=' 11, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
405
+ page_content=' 11 624–11 636, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
406
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
407
+ page_content=' [12] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
408
+ page_content='-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
409
+ page_content=' Ko et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
410
+ page_content=', “V2X-based vehicular positioning: Opportunities, chal- lenges, and future directions,” IEEE Wireless Commun.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
411
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
412
+ page_content=' 28, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
413
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
414
+ page_content=' 144–151, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
415
+ page_content=' 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
416
+ page_content=' [13] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
417
+ page_content=' Kim et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
418
+ page_content=', “RIS-enabled and access-point-free simultaneous radio localization and mapping,” arXiv preprint arXiv:2212.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
419
+ page_content='07141, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
420
+ page_content=' [14] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
421
+ page_content=' Albanese et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
422
+ page_content=', “LOKO: localization-aware roll-out planning for future mobile networks,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
423
+ page_content=' Mobile Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
424
+ page_content=', (Early Access), 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
425
+ page_content=' [15] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
426
+ page_content=' Jian et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
427
+ page_content=', “Reconfigurable intelligent surfaces for wireless commu- nications: Overview of hardware designs, channel models, and estima- tion techniques,” Intell.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
428
+ page_content=' Converged Netw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
429
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
430
+ page_content=' 3, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
431
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
432
+ page_content=' 1–32, Mar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
433
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
434
+ page_content=' Hui Chen (hui.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
435
+ page_content='chen@chalmers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
436
+ page_content='se) is a postdoctoral researcher at Chalmers University of Technology, Sweden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
437
+ page_content=' Hyowon Kim (hyowon@chalmers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
438
+ page_content='se) is a postdoctoral researcher at Chalmers University of Technology, Sweden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
439
+ page_content=' Mustafa Ammous (mustafa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
440
+ page_content='ammous@mail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
441
+ page_content='utoronto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
442
+ page_content='ca) is a Ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
443
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
444
+ page_content=' student at University of Toronto, Canada.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
445
+ page_content=' Gonzalo Seco-Granados (gonzalo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
446
+ page_content='seco@uab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
447
+ page_content='cat) is a professor at Universitat Autonoma of Barcelona, Spain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
448
+ page_content=' George C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
449
+ page_content=' Alexandropoulos (alexandg@di.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
450
+ page_content='uoa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
451
+ page_content='gr) is an assistant professor at the Department of Informatics and Telecommunications, National and Kapodistrian University of Athens, Greece.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
452
+ page_content=' Shahrokh Valaee (valaee@ece.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
453
+ page_content='utoronto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
454
+ page_content='ca) is a professor at University of Toronto, Canada.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
455
+ page_content=' Henk Wymeersch (henkw@chalmers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
456
+ page_content='se) is a professor at Chalmers Univer- sity of Technology, Sweden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NE1T4oBgHgl3EQf7gWJ/content/2301.03535v1.pdf'}
8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/2301.02859v1.pdf.txt ADDED
@@ -0,0 +1,1175 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ D-Optimal and Nearly D-Optimal Exact Designs for
2
+ Binary Response on the Ball
3
+ Martin Radloff† and Rainer Schwabe‡
4
+ Abstract: In this paper the results of Radloff and Schwabe (2019a) will be
5
+ extended for a special class of symmetrical intensity functions. This includes
6
+ binary response models with logit and probit link. To evaluate the position
7
+ and the weights of the two non-degenerated orbits on the k-dimensional ball
8
+ usually a system of three equations has to be solved. The symmetry allows
9
+ to reduce this system to a single equation. As a further result, the number of
10
+ support points can be reduced to the minimal number. These minimally sup-
11
+ ported designs are highly efficient. The results can be generalized to arbitrary
12
+ ellipsoidal design regions.
13
+ Key words and phrases: Binary response models, D-optimality, k-dimensional
14
+ ball, logit and probit model, multiple regression models, simplex.
15
+ 1. Introduction
16
+ Spherical design spaces can occur in engineering or physics problems where the validity of
17
+ a model may be assumed on a spherical region around a target value. So (linear) models
18
+ on spherical design spaces were investigated early in publications like Kiefer (1961) and
19
+ Farrell et al (1967) which discuss polynomial regression on the ball. These ideas were
20
+ followed up by papers in which also only linear problems were focused. So Lau (1988)
21
+ fitted polynomials on the k-dimensional unit ball by using canonical moments. In Dette
22
+ et al (2005, 2007) and Hirao et al (2015) harmonic polynomials and Zernike polynomials
23
+ were used to be fit on the unit disc (2-dimensional unit ball), the 3- and k-dimensional
24
+ unit ball. On the other hand generalized linear models are also well-examined and used
25
+ in practical application. Logit and probit models, for example, in one dimension on an
26
+ interval have already been investigated by Ford et al (1992) and Biedermann et al (2006).
27
+ But there seems to be no available literature which combines both topics.
28
+ In our publication Radloff and Schwabe (2019b) we took the first step to bring non-
29
+ linearity or generalized linear models, respectively, and spherical design regions together.
30
+ These results were extended to a wider class of non-linear models in our follow-up paper
31
+ Radloff and Schwabe (2019a).
32
+ †corresponding author: Martin Radloff, Institute for Mathematical Stochastics, Otto-von-Guericke-
33
+ University, PF 4120, 39016 Magdeburg, Germany, martin.radloff@ovgu.de
34
+ ‡Rainer Schwabe, Institute for Mathematical Stochastics, Otto-von-Guericke-University, PF 4120,
35
+ 39016 Magdeburg, Germany, rainer.schwabe@ovgu.de
36
+ arXiv:2301.02859v1 [stat.ME] 7 Jan 2023
37
+
38
+ Martin Radloff, Rainer Schwabe
39
+ Exact Designs on the Ball
40
+ For better comprehensibility, we will start with the model description and give a brief
41
+ overview of the findings so far. Then we will consider a special class of intensity func-
42
+ tions which allows to reduce the the complexity of finding (locally) D-optimal designs.
43
+ Afterwards we will tackle the problem, that the optimal designs are not exact designs in
44
+ general, by establishing highly efficient designs on the ball.
45
+ 2. General Model Description
46
+ As in Radloff and Schwabe (2019b) and Radloff and Schwabe (2019a), where we described
47
+ (locally) D-optimal designs for two special classes of linear and non-linear models on a
48
+ k-dimensional unit ball Bk = {x ∈ Rk : x2
49
+ 1 + . . . + x2
50
+ k ≤ 1} with k ∈ N, we solely focus
51
+ (non-linear) multiple regression models, which means the linear predictor is
52
+ f(x)⊤β = β0 + β1x1 + . . . + βkxk
53
+ with regression function f : Bk → Rk+1, x �→ (1, x1, . . . , xk)⊤, and parameter vector
54
+ β = (β0, β1, . . . , βk)⊤ ∈ Rk+1. The one-support-point (or elemental) information matrix
55
+ should be representable in the form
56
+ M(x, β) = λ
57
+
58
+ f(x)⊤β
59
+
60
+ f(x)f(x)⊤
61
+ with an intensity (or efficiency) function λ which only depends on the value of the linear
62
+ predictor f(x)⊤β. These one-support-point (or elemental) information matrices are the
63
+ base for the information matrix of a (generalized) design ξ with independent observations
64
+ M(ξ, β) =
65
+
66
+ M(x, β) ξ(dx) =
67
+
68
+ λ
69
+
70
+ f(x)⊤β
71
+
72
+ f(x)f(x)⊤ξ(dx) .
73
+ Here generalized design means an arbitrary probability measure on the design region Bk.
74
+ These information matrices allow to define the (local) D-optimality, which is one of the
75
+ most popular criteria in experimental design theory. A design ξ∗
76
+ β0 with regular infor-
77
+ mation matrix M(ξ∗
78
+ β0, β0) is called (locally) D-optimal (at β0) if det(M(ξ∗
79
+ β0, β0)) ≥
80
+ det(M(ξ, β0)) holds for all suitable probability measures ξ on the design space — here
81
+ Bk. This optimality criterion can be interpreted as the minimization of the volume of the
82
+ (asymptotic) confidence ellipsoid.
83
+ 3. Prior Results
84
+ In Radloff and Schwabe (2016) we stated results on equivariance and invariance.
85
+ By
86
+ rotating the design space Bk — the k-dimensional unit ball — and the parameter space
87
+ Rk+1 in an analogous way the linear predictor of the multiple regression problem reduces
88
+ to
89
+ f(x)⊤β = β0 + β1x1
90
+ and
91
+ β1 ≥ 0 .
92
+ (3.1)
93
+ Using the rotation invariance with fixed x1, this means the invariance to all orthogonal
94
+ transformations in O(k) which let the x1-component unchanged, the (locally) D-optimal
95
+ (generalized) design ξ∗ can be decomposed (ξ∗ = ξ∗
96
+ 1 ⊗ η) in a marginal probability measure
97
+ ξ∗
98
+ 1 on [−1, 1] for x1 and a probability kernel η given x1. For fixed x1 the kernel η(x1, ·) is
99
+ 2
100
+
101
+ Martin Radloff, Rainer Schwabe
102
+ Exact Designs on the Ball
103
+ the uniform distribution on the surface of a (k − 1)-dimensional ball with radius
104
+
105
+ 1 − x2
106
+ 1
107
+ — the orbit at position x1.
108
+ As a consequence the multidimensional problem collapses to a one-dimensional marginal
109
+ problem. Only the positions of the orbits and their weights have to be determined. To get
110
+ an exact design the uniform orbits have to be discretized, for example, by using regular
111
+ simplices.
112
+ In our first paper — Radloff and Schwabe (2019b) — we started with models where the
113
+ intensity function belongs to the class of monotonous functions. Such models have already
114
+ been investigated in one dimension, for example, by Konstantinou et al (2014) and on
115
+ multidimensional cuboids or orthants by Schmidt and Schwabe (2017). These authors
116
+ gave the following four conditions on the intensity function λ:
117
+ (A1) λ is positive on R and twice continuously differentiable.
118
+ (A2) The first derivative λ′ is positive on R.
119
+ (A3) The second derivative u′′ of u = 1
120
+ λ is injective on R.
121
+ (A4) The function λ′
122
+ λ is non-increasing.
123
+ Condition (A2) is the motivation for the name class of monotonous intensity functions.
124
+ The intensity functions of this class have to satisfy always (A1) to (A3). (A4) is an extra
125
+ condition to guarantee uniqueness. For a concise notation
126
+ q(x1) = λ(β0 + β1x1)
127
+ is used and the properties (A1), (A2), (A3) and (A4) transfer to q for β1 > 0, respectively,
128
+ and vice versa. Poisson regression with intensity function qP(x1) = exp(β0 + β1x1) and
129
+ negative binomial regression as well as special proportional hazard models with censoring,
130
+ see Schmidt and Schwabe (2017), satisfy all four conditions.
131
+ If β1 = 0 then the intensity function q is always a constant. This yields to a (locally)
132
+ D-optimal design as it can be found in linear models. In Pukelsheim (1993, section 15.12)
133
+ such a design consists of the equally weighted vertices of a regular simplex inscribed in the
134
+ unit sphere, the boundary of the design space. The orientation of the simplex is arbitrary.
135
+ The main result for β1 > 0 in Radloff and Schwabe (2019b) is recited for the readers’
136
+ convenience.
137
+ Theorem 1. There is a (locally) D-optimal design for the multiple regression prob-
138
+ lem (3.1) with β1 > 0 and intensity function satisfying (A1)-(A3) which has one support
139
+ point equal to (1, 0, . . . , 0)⊤ and the other k support points are the vertices of an arbi-
140
+ trarily rotated (k − 1)-dimensional regular simplex which is maximally inscribed in the
141
+ intersection of the k-dimensional unit ball and a hyperplane with x1 = x∗
142
+ 12.
143
+ • For k ≥ 2 the position x∗
144
+ 12 ∈ (−1, 1) is solution of
145
+ q′(x∗
146
+ 12)
147
+ q(x∗
148
+ 12) = 2 (1 + kx∗
149
+ 12)
150
+ k (1 − x∗ 2
151
+ 12 ) .
152
+ If additionally (A4) is satisfied, the solution x∗
153
+ 12 is unique.
154
+ 3
155
+
156
+ Martin Radloff, Rainer Schwabe
157
+ Exact Designs on the Ball
158
+ • For k = 1 the position x∗
159
+ 12 ∈ [−1, 1) is either solution of
160
+ q′(x∗
161
+ 12)
162
+ q(x∗
163
+ 12) =
164
+ 2
165
+ 1 − x∗
166
+ 12
167
+ ,
168
+ if such a solution exists in [−1, 1), or otherwise x∗
169
+ 12 = −1.
170
+ If additionally (A4) is satisfied, the solution x∗
171
+ 12 is unique.
172
+ The design is equally weighted with
173
+ 1
174
+ k+1.
175
+ It should be noted, that for fixed β this theorem does not need (A1) to (A4) on the
176
+ entire real line R. It is enough to have it in the ball and so on x1 ∈ [−1, 1] for q and on
177
+ [β0 − β1, β0 + β1] for λ, respectively. But the model has to satisfy the conditions always
178
+ on the whole real line.
179
+ In our second paper — Radloff and Schwabe (2019a) — the conditions (A2) and (A3)
180
+ were replaced by (A2′) and (A3′) and a fifth property (A5) was added.
181
+ (A2′) λ is unimodal with mode c(A2′)
182
+ λ
183
+ ∈ R.
184
+ (A3′) There exists a threshold c(A3′)
185
+ λ
186
+ ∈ R so that the second derivative u′′ of u = 1
187
+ λ is
188
+ both injective on (−∞, c(A3′)
189
+ λ
190
+ ] and injective on [c(A3′)
191
+ λ
192
+ , ∞).
193
+ (A5) u = 1
194
+ λ dominates z2 asymptotically for z → ∞.
195
+ In this context condition (A2′) means that there exists a c(A2′)
196
+ λ
197
+ ∈ R so that λ′ is positive
198
+ on (−∞, c(A2′)
199
+ λ
200
+ ) and negative on (c(A2′)
201
+ λ
202
+ , ∞).
203
+ Hence, there is only one local maximum
204
+ which is simultaneously the global maximum. So the class of intensity functions, which
205
+ satisfy (A1), (A2′) and (A3′), is called class of unimodal intensity functions.
206
+ Indeed (A2) or (A3) do not imply (A2′) or (A3′), respectively. As mentioned before, we
207
+ only focus on the unit ball and the interval x1 ∈ [−1, 1] for q or [β0 − β1, β0 + β1] for λ.
208
+ So in our special case (A2) and (A3) can be transferred to (A2′) and (A3′) by using an
209
+ arbitrary cλ > β0 + β1, which means that cq lies outside the interval [−1, 1] and only one
210
+ branch of the function is considered.
211
+ Property (A5) means
212
+ lim
213
+ z→∞
214
+ ����
215
+ u(z)
216
+ z2
217
+ ���� = ∞ .
218
+ This means that u(z) =
219
+ 1
220
+ λ(z) goes faster to (±) infinity than z2 for z → ∞.
221
+ As (A1) to (A4) the conditions (A2′), (A3′) and (A5) transfer from the intensity function
222
+ λ to the abbreviated form q for β1 > 0 and vice versa — analogously c(·)
223
+ q
224
+ =
225
+ c(·)
226
+ λ −β0
227
+ β1
228
+ with
229
+ (·) is (A2′), (A3′) or empty.
230
+ The logit model has the intensity function
231
+ qlogit(x1) =
232
+ exp(β0 + β1x1)
233
+ (1 + exp(β0 + β1x1))2
234
+ and probit model has
235
+ qprobit(x1) =
236
+ φ2(β0 + β1x1)
237
+ Φ(β0 + β1x1) · (1 − Φ(β0 + β1x1))
238
+ 4
239
+
240
+ Martin Radloff, Rainer Schwabe
241
+ Exact Designs on the Ball
242
+ with the density function φ and cumulative distribution function Φ of the standard normal
243
+ distribution. Both models satisfy all five conditions (A1), (A2′), (A3′), (A4), (A5) and
244
+ share a common c(A2′)
245
+ λ
246
+ = c(A3′)
247
+ λ
248
+ = 0, say cλ = 0. Analogously cq = − β0
249
+ β1 for q.
250
+ Beside these two models other models like the complementary log-log model, see Ford
251
+ et al (1992), with intensity function λcomp log log(z) =
252
+ exp(2z)
253
+ exp(exp(z))−1 satisfy all five conditions
254
+ with c(A2′)
255
+ λ
256
+ ≈ 0.466011 and c(A3′)
257
+ λ
258
+ ≈ 0.049084, but here mode c(A2′)
259
+ λ
260
+ and threshold c(A3′)
261
+ λ
262
+ do
263
+ not coincide.
264
+ We showed that if the (concise) intensity function q satisfies (A1), (A2′), (A3′) and (A5)
265
+ the (locally) D-optimal design ξ∗ = ξ∗
266
+ 1 ⊗η is concentrated on exactly two orbits, which are
267
+ the support points of the marginal design ξ∗
268
+ 1. The idea of the proof is based on Biedermann
269
+ et al (2006) and Konstantinou et al (2014).
270
+ The next theorem is the main result of our second paper — Radloff and Schwabe (2019a)
271
+ — and is reproduced for the readers’ convenience. It characterizes the positions of the
272
+ two support points of the optimal marginal design ξ∗
273
+ 1.
274
+ Theorem 2. For k ≥ 2 the simplified problem (3.1) with β1 > 0 and intensity function q
275
+ satisfying (A1), (A2′), (A3′) and (A5) has a (locally) D-optimal marginal design ξ∗
276
+ 1 with
277
+ exactly 2 support points x∗
278
+ 11 and x∗
279
+ 12 with x∗
280
+ 11 > x∗
281
+ 12 and weights w1 = ξ∗
282
+ 1(x∗
283
+ 11) and w2 =
284
+ ξ∗
285
+ 1(x∗
286
+ 12).
287
+ There are 3 cases:
288
+ (a) If c(A2′)
289
+ q
290
+ > 1 and c(A3′)
291
+ q
292
+ /∈ [−1, 1], then x∗
293
+ 11 = 1, w1 =
294
+ 1
295
+ k+1, w2 =
296
+ k
297
+ k+1 and x∗
298
+ 12 ∈ (−1, 1)
299
+ is solution of
300
+ q′(x∗
301
+ 12)
302
+ q(x∗
303
+ 12) = 2 (1 + kx∗
304
+ 12)
305
+ k (1 − x∗ 2
306
+ 12 ) .
307
+ (3.2)
308
+ If additionally (A4) is satisfied, the solution x∗
309
+ 12 is unique.
310
+ (b) If c(A2′)
311
+ q
312
+ < −1 and c(A3′)
313
+ q
314
+ /∈ [−1, 1], then x∗
315
+ 12 = −1, w1 =
316
+ k
317
+ k+1, w2 =
318
+ 1
319
+ k+1 and
320
+ x∗
321
+ 11 ∈ (−1, 1) is solution of
322
+ q′(x∗
323
+ 11)
324
+ q(x∗
325
+ 11) = 2 (−1 + kx∗
326
+ 11)
327
+ k (1 − x∗ 2
328
+ 11 )
329
+ .
330
+ (3.3)
331
+ If additionally (A4) is satisfied, the solution x∗
332
+ 11 is unique.
333
+ (c) Otherwise c(A2′)
334
+ q
335
+ ∈ [−1, 1] or c(A3′)
336
+ q
337
+ ∈ [−1, 1].
338
+ Let x, y ∈ R with x > y and α ∈
339
+
340
+ − 1
341
+ 2, 1
342
+ 2
343
+
344
+ be solution of the equation system:
345
+ q′(x)
346
+ q(x) +
347
+ 2
348
+ x−y + (k−1) q′(x) (1−x2) ( 1
349
+ 2 −α) + q(x) (−2 x) ( 1
350
+ 2 −α)
351
+ q(x) (1−x2) ( 1
352
+ 2 −α) + q(y) (1−y2) ( 1
353
+ 2 +α) = 0
354
+ (3.4)
355
+ q′(y)
356
+ q(y) −
357
+ 2
358
+ x−y + (k−1) q′(y) (1−y2) ( 1
359
+ 2 +α) + q(y) (−2 y) ( 1
360
+ 2 +α)
361
+ q(x) (1−x2) ( 1
362
+ 2 −α) + q(y) (1−y2) ( 1
363
+ 2 +α) = 0
364
+ (3.5)
365
+ 1
366
+ 1
367
+ 2 −α −
368
+ 1
369
+ 1
370
+ 2 +α + (k−1)
371
+ q(x) (1−x2) − q(y) (1−y2)
372
+ q(x) (1−x2) ( 1
373
+ 2 −α) + q(y) (1−y2) ( 1
374
+ 2 +α) = 0
375
+ (3.6)
376
+ 5
377
+
378
+ Martin Radloff, Rainer Schwabe
379
+ Exact Designs on the Ball
380
+ Figure 1: Logit model for k = 3 and β1 = 1: Dependence of x∗
381
+ 11 and x∗
382
+ 12 (solid lines) and
383
+ the corresponding weights w1 and w2 = 1 − w1 (dashed lines) on −β0 = − β0
384
+ β1 =
385
+ cq ∈ [−1.2, 1.2].
386
+ (c0) If x, y ∈ (−1, 1) with x > y and α ∈ (− 1
387
+ 2, 1
388
+ 2) is a solution of the equation
389
+ system, the orbit positions are x∗
390
+ 11 = x, x∗
391
+ 12 = y with weights w1 =
392
+ 1
393
+ 2 − α
394
+ and w2 = 1
395
+ 2 + α.
396
+ (c1) If x
397
+
398
+ 1 and y
399
+
400
+ (−1, 1), then x∗
401
+ 11
402
+ =
403
+ 1, w1
404
+ =
405
+ 1
406
+ k+1, w2
407
+ =
408
+ k
409
+ k+1
410
+ and x∗
411
+ 12 ∈ (−1, 1) is the solution of the equation (3.2).
412
+ (c2) If y ≤ −1 and x ∈ (−1, 1), then x∗
413
+ 12 = −1, w1 =
414
+ k
415
+ k+1, w2 =
416
+ 1
417
+ k+1
418
+ and x∗
419
+ 11 ∈ (−1, 1) is the solution of the equation (3.3).
420
+ Remark 1. Instead of reproducing the whole theorem for k = 1, only the two main
421
+ changes in case (c) should be mentioned. So the weights are always w1 = w2 = 1
422
+ 2 and the
423
+ equation system (3.4)–(3.6) is replaced by
424
+ q′(x)
425
+ q(x) +
426
+ 2
427
+ x − y = 0
428
+ and
429
+ q′(y)
430
+ q(y) −
431
+ 2
432
+ x − y = 0 .
433
+ (3.7)
434
+ To illustrate this complex issue we revisit the logit model in dimension k = 3 with β1 = 1.
435
+ We (numerically) plot the orbit positions x∗
436
+ 11 and x∗
437
+ 12 and corresponding weights w1 and
438
+ w2 = 1 − w1 depending on −β0 = − β0
439
+ β1 = cq, see Figure 1. The cases (a) and (b) go along
440
+ with Theorem 1 and the results from Radloff and Schwabe (2019b). The cases (c1) and
441
+ (c2) yield marginal extremum solutions which are identical to (a) and (b). So for these
442
+ four cases there is always an exact minimally supported (locally) D-optimal design. As
443
+ described in Theorem 1, it consists of a pole point in x1 = −1 or else x1 = 1 and the k
444
+ vertices of a (regular) simplex which is maximally inscribed in the non-degenerated orbit.
445
+ But the problematic case is (c0) because the (locally) D-optimal (generalized) design
446
+ consists of two non-degenerated orbits and additionally the weights are rarely appropriate
447
+ for a discretization. In Radloff and Schwabe (2019a) we showed two examples for the logit
448
+ model (k = 3, β1 = 1) from which we derived (nearly) exact designs.
449
+ For −β0 = 0 the two orbit positions are symmetrical around 0, that is x∗
450
+ 11 = −x∗
451
+ 12 ≈ 0.52,
452
+ and the weights are ξ∗
453
+ 1(x∗
454
+ 11) = ξ∗
455
+ 1(x∗
456
+ 12) =
457
+ 1
458
+ 2. These two orbits were discretized by two
459
+ 6
460
+
461
+ Martin Radloff, Rainer Schwabe
462
+ Exact Designs on the Ball
463
+ 2-dimensional simplices — overall 6 equally weighted support points; see Figure 2 (left
464
+ image).
465
+ For −β0 = −0.1 it is x∗
466
+ 11 ≈ 0.42, x∗
467
+ 12 ≈ −0.62 and ξ∗
468
+ 1(x∗
469
+ 11) ≈ 0.4297, while 0.4297 ≈ 3
470
+ 7.
471
+ We took the rounded design ξ≈ with the same support points x∗
472
+ 11 and x∗
473
+ 12 but with the
474
+ marginal design ξ≈
475
+ 1 (x∗
476
+ 11) = 3
477
+ 7 and ξ≈
478
+ 1 (x∗
479
+ 12) = 4
480
+ 7. So it was possible to substitute one orbit
481
+ by the vertices of a 2-dimensional simplex (3 points — an equilateral triangle) and one
482
+ by the vertices of a 2-dimensional cube or cross polytope (4 points — a square). Because
483
+ of rounding the design ξ≈ is not optimal but exact and has a high D-efficiency, which
484
+ compares the rounded design ξ≈ and the optimal design ξ∗
485
+ β0 with respect to β0 — here
486
+ p = k + 1 = 4 and β0 = (0.1, 1, 0, 0)⊤:
487
+ EffD(ξ≈, β0) =
488
+
489
+ det(M(ξ≈, β0))
490
+ det(M(ξ∗
491
+ β0, β0))
492
+ �1
493
+ p
494
+ ≈ 0.999757 .
495
+ These designs are not very satisfactory. On the one hand the number of support points
496
+ is not minimal. On the other hand only special cases have appropriate rational weights
497
+ which allow a discretization or otherwise the optimality is lost by rounding. Therefore we
498
+ want to establish minimal supported exact designs for the case (c0) in this paper. Mostly
499
+ these designs wont be optimal but (highly) efficient.
500
+ But we start with the reduction of the system of three equations in Theorem 2 to only one
501
+ single equation for special unimodal intensity functions — symmetrical unimodal intensity
502
+ functions — which can be found, for example, in binary response models with logit and
503
+ probit link.
504
+ 4. Optimal Design for Symmetrical Unimodal
505
+ Intensity Functions
506
+ An interesting observation was made in the discussion section in Radloff and Schwabe
507
+ (2019a). For models with unimodal intensity function in which the mode and threshold
508
+ coincide (c(A2′)
509
+ λ
510
+ = c(A3′)
511
+ λ
512
+ = cλ) and which are symmetrical, also the two orbit positions are
513
+ symmetrical in a certain way, which we want to investigate here. For one dimension this
514
+ has been considered and shown in Ford et al (1992, Section 6.5 and 6.6), but this proof
515
+ cannot be extended to higher dimensions directly.
516
+ Definition 1. An unimodal intensity function in which the mode and threshold coincide
517
+ (c(A2′)
518
+ λ
519
+ = c(A3′)
520
+ λ
521
+ = cλ) will be called symmetrical to cλ if
522
+ λ(cλ + z) = λ(cλ − z)
523
+ for all z ∈ R.
524
+ The intensity functions of the logit and probit models are symmetrical with cλ = 0. But
525
+ the unimodal intensity function of the complementary log-log model has c(A2′)
526
+ λ
527
+ ̸= c(A3′)
528
+ λ
529
+ and cannot be symmetrical for this reason.
530
+ Lemma 1. Let the intensity function λ be symmetrical to cλ in the situation of Theo-
531
+ rem 2 (c0).
532
+ 7
533
+
534
+ Martin Radloff, Rainer Schwabe
535
+ Exact Designs on the Ball
536
+ • For given β0 ̸= cλ let r solve
537
+ λ′(cλ+r)
538
+ λ(cλ+r) = −
539
+ −2 k r2 (β2
540
+ 1 +c2−r2)+(β2
541
+ 1 −c2−r2)2−4 c2 r2
542
+ +(β2
543
+ 1 −c2+r2)
544
+
545
+ (β2
546
+ 1 −c2−r2)2+4 (k2−1) c2 r2
547
+ (k+1) r (r+c−β1)(r+c+β1)(r−c+β1)(r−c−β1)
548
+ (4.8)
549
+ with c := cλ − β0. Then
550
+ x = c
551
+ β1
552
+ + r
553
+ β1
554
+ ,
555
+ (4.9)
556
+ y = c
557
+ β1
558
+ − r
559
+ β1
560
+ ,
561
+ (4.10)
562
+ α =
563
+ −(β2
564
+ 1 −c2−r2)+
565
+
566
+ (β2
567
+ 1 −c2−r2)2+4 (k2−1) c2 r2
568
+ 4 (k+1) c r
569
+ (4.11)
570
+ is a solution of the equation system (3.4)–(3.6).
571
+ • For given β0 = cλ it is x =
572
+ r
573
+ β1, y = − r
574
+ β1 and α = 0. Here r is the solution of
575
+ λ′(cλ + r)
576
+ λ(cλ + r) = −
577
+ 2 (β2
578
+ 1 − k r2)
579
+ (k + 1) r (β2
580
+ 1 − r2) .
581
+ (4.12)
582
+ Remark 2. For k = 1, see Remark 1, let λ be symmetrical to cλ. Then x = cλ−β0
583
+ β1
584
+ +
585
+ r
586
+ β1
587
+ and y = cλ−β0
588
+ β1
589
+ − r
590
+ β1 with r is solution of
591
+ λ′(cλ + r)
592
+ λ(cλ + r) = −1
593
+ r
594
+ (4.13)
595
+ solve the equation system (3.7).
596
+ Lemma 1, whose proof sketch can be found in Appendix B, and Remark 2 in combination
597
+ with Theorem 2 give (locally) D-optimal designs for models with symmetrical unimodal
598
+ intensity functions. As a result we reduced the system of equations (3.4)–(3.6) to only
599
+ one single equation (4.8).
600
+ But now there is the question if condition (A4) can guarantee a unique solution as in
601
+ Theorem 1 or in Theorem 2 (a) and (b) because Theorem 2 (c), especially (c0), tells
602
+ nothing about uniqueness. But we want to add a remark about the values of r before.
603
+ Remark 3. Since the system of equations (3.4)–(3.6) in Theorem 2 (c0) should have a
604
+ solution with two inner support points for the marginal design, x, y ∈ (−1, 1) is required.
605
+ So
606
+ −1 < cλ − β0
607
+ β1
608
+ ± r
609
+ β1
610
+ < 1
611
+ must be valid. This leads with β1 > 0 to r ∈ (−(cλ − β0) − β1, −(cλ − β0) + β1) and r ∈
612
+ ((cλ − β0) − β1, (cλ − β0) + β1). Consequently, both intervals must overlap. This happens
613
+ for cλ − β0 > 0 at 0 < cλ − β0 < β1 and for cλ − β0 < 0 at −β1 < cλ − β0 < 0.
614
+ Thus cλ − β0 ∈ (−β1, β1) and in particular β2
615
+ 1 > (cλ − β0)2 must hold. Then r is in the
616
+ interval (|cλ − β0| − β1, −|cλ − β0| + β1). But Theorem 2 (c) need x > y and consequently
617
+ r > 0. Hence, r ∈ (0, −|cλ − β0| + β1).
618
+ This remains valid in particular for β0 = cλ, i. e. cλ − β0 = 0. So r ∈ (−β1, β1). With
619
+ r > 0 it is r ∈ (0, β1).
620
+ 8
621
+
622
+ Martin Radloff, Rainer Schwabe
623
+ Exact Designs on the Ball
624
+ Lemma 2. In situation of Lemma 1 let the intensity function λ additionally satisfy
625
+ condition (A4), then equation (4.8), whose right hand side is continuously continued
626
+ in −|cλ − β0| + β1, has a unique solution in r ∈ (0, |cλ − β0| + β1).
627
+ This also holds for β0 = cλ and equation (4.12), which has exactly one solution in r ∈
628
+ (0, β1).
629
+ Remark 4. For k = 1, see Remark 2, and for an intensity function satisfying (A4) there
630
+ is only one solution of (4.13).
631
+ The proof sketch of Lemma 2 can be found in Appendix B. Lemma 2 guarantees a unique
632
+ solution in r ∈ (0, |cλ − β0| + β1). But Remark 3 points out that for Theorem 2 (c0)
633
+ we need r ∈ (0, −|cλ − β0| + β1). This means that the unique solution can result in the
634
+ two-orbit case or in the one-orbit one-pole case of Theorem 2 (c).
635
+ 5. Minimally Supported Designs
636
+ In the situation of Theorem 1 and Theorem 2 (a), (b), (c1) and (c2) the designs have
637
+ always the minimal number of support points to estimate the parameter vector β. These
638
+ are k + 1 support points.
639
+ In Radloff and Schwabe (2019a) revisited here in the introductory section we indicated
640
+ exemplarily a (locally) D-optimal design for the logit model on the 3-dimensional ball
641
+ with −β0 = 0 and β1 = 1.
642
+ This design consists of six support points which are the
643
+ vertices of two regular 2-dimensional simplices — equilateral triangles; see Figure 2 (left
644
+ image). But this is not the minimum of support points to estimate the four parameters.
645
+ So the question arises whether it is possible to reduce the number of support points as it
646
+ can be found in the concept of fractional factorial designs, see, for example, Pukelsheim
647
+ (1993, section 15.11). Instead of using all vertices of the hypercube [−1, 1]k as in the
648
+ full factorial design the fractional factorial design picks only a special percentage of these
649
+ points. For k = 3
650
+ (−1, −1, 1)⊤, (−1, 1, −1)⊤, (1, −1, −1)⊤, (1, 1, 1)⊤
651
+ represent a 23−1-fractional factorial design.
652
+ In our issue we do not want to pick four of the six points, but we want to use the
653
+ orthogonality of the spaces spanned by the points (without the x1-component) in the
654
+ two orbits (x1 = −1 and x1 = 1) of the given 23−1-fractional factorial design.
655
+ Here
656
+ span{(−1, 1)⊤, (1, −1)⊤} ⊥ span{(−1, −1)⊤, (1, 1)⊤}.
657
+ The idea for our problem is il-
658
+ lustrated in Figure 2 (right image).
659
+ The spanned spaces by points (without the x1-
660
+ component) in the orbits are orthogonal to each other. And all points span a simplex.
661
+ As stated above a (generalized) design ξ which is rotation invariant with fixed x1 —
662
+ invariant with respect to all orthogonal transformations in O(k) which do not change
663
+ the x1-component — and which has all mass on the unit sphere can be decomposed
664
+ into a marginal design ξ1 on [−1, 1] and a probability kernel η (conditional design), i. e.
665
+ ξ = ξ1 ⊗ η. For fixed x1 the kernel η(x1, ·) is the uniform distribution on the surface of a
666
+ (k − 1)-dimensional ball with radius
667
+
668
+ 1 − x2
669
+ 1 — the orbit at position x1. If x1 ∈ {−1, 1},
670
+ the (k − 1)-dimensional ball with the uniform distribution reduces to a single point and
671
+ represents only a one-point-measure.
672
+ Remembering q(x1) = λ(β0 + β1x1) the related
673
+ 9
674
+
675
+ Martin Radloff, Rainer Schwabe
676
+ Exact Designs on the Ball
677
+ information matrix, see Radloff and Schwabe (2019b), is
678
+ M(ξ1 ⊗ η, β0) =
679
+
680
+
681
+
682
+
683
+ q dξ1
684
+
685
+ q id dξ1
686
+
687
+ q id dξ1
688
+
689
+ q id2 dξ1
690
+ O2×(k−1)
691
+ O(k−1)×2
692
+ 1
693
+ k−1
694
+
695
+ q (1 − id2) dξ1 Ik−1
696
+
697
+
698
+
699
+ (5.14)
700
+ with β0 = (β0, β1, 0, . . . , 0)⊤.
701
+ The information matrix for a design on the k-dimensional unit sphere Sk−1, which is
702
+ based on exactly two orbits, can be determined analogously to this result. Additionally
703
+ the uniform distribution does not cover the the full orbits but only sub-spheres.
704
+ Lemma 3. Let ξ1 be the two-point-measure in x11 and x12 with ξ1(x11) =
705
+ 1
706
+ 2 − α and
707
+ ξ1(x12) =
708
+ 1
709
+ 2 + α with α ∈
710
+
711
+ − 1
712
+ 2, 1
713
+ 2
714
+
715
+ . Further let η(x11, ·) be a uniform distribution on
716
+ Sm−2
717
+ ��
718
+ 1 − x2
719
+ 11
720
+
721
+ × {0}k−m and likewise η(x12, ·) be a uniform distribution on {0}m−1 ×
722
+ Sk−m−1
723
+ ��
724
+ 1 − x2
725
+ 12
726
+
727
+ . Then the information matrix is
728
+ M(ξ1 ⊗ η, β0) =
729
+
730
+
731
+
732
+
733
+
734
+
735
+ q dξ1
736
+
737
+ q id dξ1
738
+
739
+ q id dξ1
740
+
741
+ q id2 dξ1
742
+ O2×(k−1)
743
+ O(k−1)×2
744
+ c1 Im−1
745
+ O(m−1)×(k−m)
746
+ O(k−m)×(m−1)
747
+ c2 Ik−m
748
+
749
+
750
+
751
+
752
+
753
+ (5.15)
754
+ with c1 =
755
+ 1
756
+ m−1 q(x11) (1−x2
757
+ 11) ( 1
758
+ 2 −α) and c2 =
759
+ 1
760
+ k−m q(x12) (1−x2
761
+ 12) ( 1
762
+ 2 +α).
763
+ Now the optimality case in Theorem 2 (c0) on two orbits should be used to investigate
764
+ when both information matrices (5.14) und (5.15) are identical. With that both related
765
+ (generalized) designs would be (locally) D-optimal.
766
+ Lemma 4. Both information matrices (5.14) and (5.15) are identical in the situation of
767
+ Theorem 2 (c0) if and only if α = 1
768
+ 2 −
769
+ m
770
+ k+1.
771
+ The proof can be found in Appendix B.
772
+ Consequently both orbits need the weights ξ1(x11) =
773
+ m
774
+ k+1 and ξ1(x12) = k−m+1
775
+ k+1
776
+ to coincide
777
+ both information matrices. This allows an experimental design, which has the same value
778
+ for the D-optimality criterion, consisting of two orbits with m and with k −m+1 support
779
+ Figure 2: Logit model for k = 3 and β1 = 1 and −β0 = 0: discretized (locally) D-optimal
780
+ designs with 6 or 4 support points.
781
+ 10
782
+
783
+ 1Martin Radloff, Rainer Schwabe
784
+ Exact Designs on the Ball
785
+ Figure 3: D-efficiency for the logit model with k = 3 and β1 = 1: comparison of designs
786
+ with exactly k+1 = 4 equally weighted support points in −β0 ∈ (−0.403, 0.403)
787
+ (rounded).
788
+ points. This can be done by two regular simplices — one simplex in dimension m − 1
789
+ and one in dimension k − m.
790
+ So the simplices are the discretizations of the uniform
791
+ distributions on Sm−2
792
+ ��
793
+ 1 − x2
794
+ 11
795
+
796
+ × {0}k−m and on {0}m−1 × Sk−m−1
797
+ ��
798
+ 1 − x2
799
+ 12
800
+
801
+ .
802
+ Let Sm ∈ Rm×(m+1) be a matrix, where the columns represent the m + 1 vertices of an
803
+ m-dimensional regular simplex (in Rm). Then the columns of the matrix
804
+
805
+
806
+
807
+ x111⊤
808
+ m
809
+ x121⊤
810
+ k−m+1
811
+ R1 Sm−1
812
+ O(m−1)×(k−m+1)
813
+ O(k−m)×m
814
+ R2 Sk−m
815
+
816
+
817
+
818
+ with arbitrary orthogonal transformations R1 ∈ O(m − 1) and R2 ∈ O(k − m) represent
819
+ the support points of such a minimal supported design.
820
+ ��
821
+ m + 1
822
+ m
823
+ Im + 1 − √m + 1
824
+ m√m
825
+ 1m1⊤
826
+ m
827
+ ����� −
828
+ 1
829
+ √m 1m
830
+
831
+ ∈ Rm×(m+1)
832
+ is an example for Sm. In this notation Im stands for the standard simplex which needs
833
+ to be scaled and shifted appropriately so that it is in combination with the last vertex
834
+ − 1
835
+ √m 1m (last column) a regular simplex on the unit sphere Sm−1.
836
+ Finally, we want to look at the D-efficiency, here with β0 = (β0, β1, 0, . . . , 0)⊤,
837
+ EffD(ξ, β0) =
838
+
839
+ det(M(ξ, β0))
840
+ det(M(ξ∗
841
+ β0, β0))
842
+ �1
843
+ p
844
+ ∈ [0, 1]
845
+ for designs ξ with exactly p = k + 1 equally weighted support points in the region where
846
+ two non-degenerated orbits occur.
847
+ As an example, the logit model with β1 = 1 is used to determine the D-efficiency in
848
+ dimensions k = 3 and k = 6. In Figure 3 and Figure 4 only the regions for −β0 with
849
+ 11
850
+
851
+ Martin Radloff, Rainer Schwabe
852
+ Exact Designs on the Ball
853
+ two non-degenerated orbits in the optimal design (case (c0) in Theorem 2), i. e. −β0 ∈
854
+ (−0.403, 0.403) (rounded) for k = 3 and −β0 ∈ (−0.480, 0.480) (rounded) for k = 6, are
855
+ plotted.
856
+ For this purpose, three different types of exact designs are compared with the (locally)
857
+ D-optimal design ξ∗
858
+ β0.
859
+ The optimal design is a generalized design with real weights.
860
+ Therefore it cannot be discretized as an exact design in general.
861
+ First, the two optimal exact designs with one pole and one orbit, which are discretized as
862
+ a regular (k−1)-dimensional simplex, are used for comparison. The orbit position remains
863
+ unchanged and is determined at the boundary values −β0 ≈ ±0.403 or −β0 ≈ ±0.480.
864
+ See the solid lines in both figures.
865
+ Second, the designs with the same orbit position as the associated design which is (locally)
866
+ optimal for −β0 are the next alternative.
867
+ Only the weights were rounded/shifted to
868
+ integral multiples of
869
+ 1
870
+ k+1. See the dotted lines.
871
+ Third, the designs with fixed design weights which are integral multiples of
872
+ 1
873
+ k+1 represent
874
+ the last model category. So only the positions of the orbits have to be optimized with
875
+ these fixed design weights. This can be done by solving only the equations (3.4) and (3.5)
876
+ with the selected weights in Theorem 2 (c). Equation (3.6) is omitted. See the dashed
877
+ lines in both plots.
878
+ The Figure 3 reveals for dimension k = 3 that there are only three positions in the
879
+ range −β0 ∈ [−0.403, 0.403] (rounded) where (locally) D-optimal designs with the min-
880
+ imal number of support points — four points — exists. For −β0 ≈ −0.403 this is the
881
+ design consisting of the pole x∗
882
+ 12 = −1 and one orbit at x∗
883
+ 11 with three points as vertices
884
+ of an equilateral triangle. Then for −β0 = 0 there are two orbits with two points each.
885
+ And, at −β0 ≈ 0.403 the design consists of one orbit at x∗
886
+ 12 with three equally weighted
887
+ support points and the pole x∗
888
+ 11 = 1. In the span between these optimality positions the
889
+ considered discretizations provide a fairly high efficiency. Using the transition directly
890
+ from pole and orbit to orbit and pole, the efficiency is always greater than 0.988 (intersec-
891
+ tion of the solid lines). If the two orbits are also discretized in between, the efficiency is
892
+ greater than 0.993 (intersection of dotted line and solid lines) or even greater than 0.997
893
+ (intersection of dashed line and solid lines).
894
+ For dimension k = 6, see figure 4, an efficiency of more than 0.986 is possible by stepping
895
+ directly from pole and orbit with six support points to orbit with six design points and
896
+ pole. If the intermediate steps — two orbits with 2 and 5 points, 3 and 4 points, 4 and
897
+ 3 points as well as 5 and 2 points — are used, then by simple rounding of the weights to
898
+ integral multiples of
899
+ 1
900
+ k+1 an efficiency greater than 0.995 (dotted lines) and with additional
901
+ optimization of the orbit positions even greater than 0.999 (dashed lines) can be achieved.
902
+ 6. Conclusion
903
+ In summary it can be postulated that very efficient designs are generated based on only
904
+ k + 1 design points which is the minimal number of support points to estimate the pa-
905
+ rameter vector. It seems that higher dimensions enable designs with higher D-efficiency,
906
+ in particular using the third option of discretization. Here we only considered designs
907
+ with exactly two orbits. Thus it cannot be excluded that there are designs with a better
908
+ efficiency or even (locally) optimal designs which are supported by exactly k + 1 points.
909
+ Maybe these designs have support points which lie not on the orbit but are jittered a little
910
+ bit. This as well as a potential lower efficiency bound needs further investigations.
911
+ 12
912
+
913
+ Martin Radloff, Rainer Schwabe
914
+ Exact Designs on the Ball
915
+ Figure 4: D-efficiency for the logit model with k = 6 and β1 = 1: comparison of designs
916
+ with exactly k+1 = 7 equally weighted support points in −β0 ∈ (−0.480, 0.480)
917
+ (rounded).
918
+ On the other side the reduction of the equation system to one single equation for deter-
919
+ mining (locally) D-optimal design for symmetrical unimodal intensity functions is a nice
920
+ feature and can help to decrease computing costs.
921
+ Also the question of optimal designs on the ball with respect to other optimality criteria
922
+ should be considered in future.
923
+ Finally, we want to emphasize that the established designs do not only work for the
924
+ unit ball. By using the concept of equivariance for linear transformations, say scaling,
925
+ reflecting and rotating, the class of design spaces can be extended to k-dimensional balls
926
+ with arbitrary radius or any k-dimensional ellipsoid.
927
+ Appendix A
928
+ Notation
929
+ Bk
930
+ k-dimensional unit ball
931
+ Bk(r)
932
+ k-dimensional ball with radius r
933
+ Sk−1
934
+ unit sphere, which is the surface of Bk
935
+ Sk−1(r)
936
+ sphere with radius r, which is the surface of Bk(r)
937
+ Ok
938
+ k-dimensional zero-vector
939
+ Ok1×k2
940
+ (k1 × k2)-dimensional zero-matrix
941
+ 1k
942
+ k-dimensional one-vector
943
+ Ik
944
+ (k × k)-dimensional identity matrix
945
+ id
946
+ identity function
947
+ 13
948
+
949
+ Martin Radloff, Rainer Schwabe
950
+ Exact Designs on the Ball
951
+ Appendix B
952
+ Proofs
953
+ Proof sketch of Lemma 1. By plugging (4.9) and (4.10) into (3.6) and using the sym-
954
+ metry to simplify, we get
955
+ −2 α (4 c r α+(β2
956
+ 1 −c2−r2))+4 (k−1) c r
957
+ � 1
958
+ 2 −α
959
+ � � 1
960
+ 2 +α
961
+
962
+ � 1
963
+ 2 −α
964
+ � � 1
965
+ 2 +α
966
+
967
+ (4 c r α+(β2
968
+ 1 −c2−r2))
969
+ = 0 .
970
+ In the numerator there is a polynomial of degree two in α with the two roots α∓(r)
971
+ depending on r:
972
+ α∓(r) :=
973
+ − (β2
974
+ 1 − c2 − r2) ∓
975
+
976
+ (β2
977
+ 1 − c2 − r2)2 + 4 (k + 1) (k − 1) c2 r2
978
+ 4 (k + 1) c r
979
+ .
980
+ Now we examine the values of α∓(r) depending on r. Only −|c| − β1, |c| − β1, −|c| + β1
981
+ or |c| + β1 can solve the expression α∓(r) = ± 1
982
+ 2. But −|c| − β1 and |c| + β1 are not in the
983
+ interesting region for r. We have
984
+ α− (±(|c| − β1)) = ±1
985
+ 2 sign(c)
986
+ and
987
+ α+ (±(|c| − β1)) = ∓1
988
+ 2 sign(c) k − 1
989
+ k + 1 .
990
+ Because of limr↗0 α− (r) = sign(c)∞ and limr↘0 α− (r) = − sign(c)∞ the root α−(r) has
991
+ in the interval r ∈ [|c| − β1, −|c| + β1] only values outside (− 1
992
+ 2, 1
993
+ 2). Hence, α−(r) is not a
994
+ relevant root.
995
+ Since limr→0 α+ (r) = 0 the discontinuity of the root α+(r) in r = 0 can be removed.
996
+ So α+(r) has only values in (− 1
997
+ 2, 1
998
+ 2) on the interval r ∈ [|c| − β1, −|c| + β1] and α+(r),
999
+ which is (4.11), is the only relevant root.
1000
+ After inserting (4.9) and (4.10) into (3.4) as well as (4.9) and (4.10) into (3.5) and sub-
1001
+ tracting both obtained equations and simplifying by using the symmetry, we get
1002
+ (k + 1) λ′(cλ + r)
1003
+ λ(cλ + r)
1004
+ = −(k − 1)
1005
+ −2 r + α · 4 c
1006
+ (β2
1007
+ 1 − c2 − r2) + α · 4 c r − 2
1008
+ r .
1009
+ Equation (4.8) follows by plugging α+(r) as α into it and by some simplifications.
1010
+ For β0 = cλ, i. e. c = cλ − β0 = 0, we get directly α = 0 by inserting x =
1011
+ r
1012
+ β1 and y = − r
1013
+ β1
1014
+ in (3.6) and exploiting the symmetry. This is inserted in (3.4) and in (3.5). The difference
1015
+ between these two equations results in (4.12).
1016
+ Proof sketch of Lemma 2. This proof is a lot of curve sketching. We start with β0 ̸=
1017
+ cλ. The denominator of the right hand side of (4.8) has five roots in r. −|cλ −β0|−β1 < 0
1018
+ and |cλ − β0| − β1 < 0 are not in the considered interval (0, |cλ − β0| + β1). In r = −|cλ −
1019
+ β0| + β1 there is a discontinuity which can be removed. In r = 0 and in r = |cλ − β0| + β1
1020
+ there are two poles. Analyzing these poles for the considered interval we see that the
1021
+ values start from −∞ (r ↘ 0) and go up to +∞ (r ↗ |cλ − β0| + β1). Sophisticated
1022
+ curve sketching shows that the right hand side of (4.8) is strictly monotonically increasing
1023
+ on (0, |cλ − β0| + β1). So it is strictly monotonically increasing and covers (−∞, ∞). In
1024
+ combination with (A4) for the left hand side of (4.8) (monotonically decreasing) there is
1025
+ exactly one solution.
1026
+ For β0 = cλ we can mention that the right hand side of (4.12) is also strictly monotonically
1027
+ increasing on (0, β1). Hence, there is only one solution.
1028
+ An analogue result holds for the situation in Remark 4.
1029
+ 14
1030
+
1031
+ Martin Radloff, Rainer Schwabe
1032
+ Exact Designs on the Ball
1033
+ Proof of Lemma 4. Rearranging equation (3.6) equivalently in two ways gives
1034
+ q(x12) (1−x2
1035
+ 12) ( 1
1036
+ 2 +α) = q(x11) (1−x2
1037
+ 11) ( 1
1038
+ 2 −α) k ( 1
1039
+ 2 +α)−( 1
1040
+ 2 −α)
1041
+ k ( 1
1042
+ 2 −α)−( 1
1043
+ 2 +α)
1044
+ and
1045
+ q(x11) (1−x2
1046
+ 11) ( 1
1047
+ 2 −α) = q(x12) (1−x2
1048
+ 12) ( 1
1049
+ 2 +α) k ( 1
1050
+ 2 −α)−( 1
1051
+ 2 +α)
1052
+ k ( 1
1053
+ 2 +α)−( 1
1054
+ 2 −α) .
1055
+ The two denominators are zero if and only if α = 1
1056
+ 2 −
1057
+ 1
1058
+ k+1 and α = 1
1059
+ 2 −
1060
+ k
1061
+ k+1, respectively.
1062
+ But this cannot happen to non-degenerated orbits because 1
1063
+ 2 −
1064
+ k
1065
+ k+1 < α < 1
1066
+ 2 −
1067
+ 1
1068
+ k+1.
1069
+ Putting both equations into the diagonal entry of the information matrix (5.14) yield
1070
+ 1
1071
+ k − 1
1072
+
1073
+ q (1 − id2) dξ1
1074
+ = q(x11) (1−x2
1075
+ 11) ( 1
1076
+ 2 −α)
1077
+
1078
+ 1
1079
+ k − 1 +
1080
+ 1
1081
+ k − 1 · k ( 1
1082
+ 2 +α)−( 1
1083
+ 2 −α)
1084
+ k ( 1
1085
+ 2 −α)−( 1
1086
+ 2 +α)
1087
+
1088
+ and
1089
+ 1
1090
+ k − 1
1091
+
1092
+ q (1 − id2) dξ1
1093
+ = q(x12) (1−x2
1094
+ 12) ( 1
1095
+ 2 −α)
1096
+
1097
+ 1
1098
+ k − 1 · k ( 1
1099
+ 2 −α)−( 1
1100
+ 2 +α)
1101
+ k ( 1
1102
+ 2 +α)−( 1
1103
+ 2 −α) +
1104
+ 1
1105
+ k − 1
1106
+
1107
+ They are identical to the diagonal entries of the information matrix (5.15) in Lemma 3 if
1108
+ and only if
1109
+ 1
1110
+ k−1 +
1111
+ 1
1112
+ k−1 · k ( 1
1113
+ 2 +α)−( 1
1114
+ 2 −α)
1115
+ k ( 1
1116
+ 2 −α)−( 1
1117
+ 2 +α) =
1118
+ 1
1119
+ m−1 and
1120
+ 1
1121
+ k−1 · k ( 1
1122
+ 2 −α)−( 1
1123
+ 2 +α)
1124
+ k ( 1
1125
+ 2 +α)−( 1
1126
+ 2 −α) +
1127
+ 1
1128
+ k−1 =
1129
+ 1
1130
+ k−m
1131
+ which are both equivalent to α = 1
1132
+ 2 −
1133
+ m
1134
+ k+1.
1135
+ References
1136
+ Biedermann S, Dette H, Zhu W (2006) Optimal designs for dose-response models with
1137
+ restricted design spaces. Journal of the American Statistical Association 101:747–759
1138
+ Dette H, Melas VB, Pepelyshev A, et al (2005) Optimal designs for three-dimensional
1139
+ shape analysis with spherical harmonic descriptors. The Annals of Statistics 33:2758–
1140
+ 2788
1141
+ Dette H, Melas VB, Pepelyshev A (2007) Optimal designs for statistical analysis with
1142
+ zernike polynomials. Statistics 41:453–470
1143
+ Farrell RH, Kiefer J, Walbran A (1967) Optimum multivariate designs. In: Proceedings
1144
+ of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume
1145
+ 1: Statistics. University of California Press, Berkeley, Calif., pp 113–138
1146
+ Ford I, Torsney B, Wu C (1992) The use of a canonical form in the construction of locally
1147
+ optimal designs for non-linear problems. Journal of the Royal Statistical Society: Series
1148
+ B (Statistical Methodology) 54:569–583
1149
+ 15
1150
+
1151
+ Martin Radloff, Rainer Schwabe
1152
+ Exact Designs on the Ball
1153
+ Hirao M, Sawa M, Jimbo M (2015) Constructions of φp-optimal rotatable designs on the
1154
+ ball. Sankhya A : The Indian Journal of Statistics 77:211–236
1155
+ Kiefer JC (1961) Optimum experimental designs v, with applications to systematic and
1156
+ rotatable designs. In: Proceedings of the Fourth Berkeley Symposium on Mathematical
1157
+ Statistics and Probability, Univ of California Press, pp 381–405
1158
+ Konstantinou M, Biedermann S, Kimber A (2014) Optimal designs for two-parameter
1159
+ nonlinear models with application to survival models. Statistica Sinica 24:415–428
1160
+ Lau TS (1988) d-optimal designs on the unit q-ball. Journal of statistical planning and
1161
+ inference 19:299–315
1162
+ Pukelsheim F (1993) Optimal Design of Experiments. Wiley Series in Probability and
1163
+ Statistics
1164
+ Radloff M, Schwabe R (2016) Invariance and equivariance in experimental design for
1165
+ nonlinear models. In: Kunert J, Müller CH, Atkinson AC (eds) mODa 11-Advances in
1166
+ Model-Oriented Design and Analysis. Springer, p 217–224
1167
+ Radloff M, Schwabe R (2019a) Locally d-optimal designs for a wider class of non-linear
1168
+ models on the k-dimensional ball with applications to logit and probit models. Statis-
1169
+ tical Papers 60:165–177
1170
+ Radloff M, Schwabe R (2019b) Locally d-optimal designs for non-linear models on the
1171
+ k-dimensional ball. Journal of Statistical Planning and Inference 203:106–116
1172
+ Schmidt D, Schwabe R (2017) Optimal design for multiple regression with information
1173
+ driven by the linear predictor. Statistica Sinica 27:1371–1384
1174
+ 16
1175
+
8tE1T4oBgHgl3EQfCAKJ/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,427 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf,len=426
2
+ page_content='D-Optimal and Nearly D-Optimal Exact Designs for Binary Response on the Ball Martin Radloff† and Rainer Schwabe‡ Abstract: In this paper the results of Radloff and Schwabe (2019a) will be extended for a special class of symmetrical intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
3
+ page_content=' This includes binary response models with logit and probit link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
4
+ page_content=' To evaluate the position and the weights of the two non-degenerated orbits on the k-dimensional ball usually a system of three equations has to be solved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
5
+ page_content=' The symmetry allows to reduce this system to a single equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
6
+ page_content=' As a further result, the number of support points can be reduced to the minimal number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
7
+ page_content=' These minimally sup- ported designs are highly efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
8
+ page_content=' The results can be generalized to arbitrary ellipsoidal design regions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
9
+ page_content=' Key words and phrases: Binary response models, D-optimality, k-dimensional ball, logit and probit model, multiple regression models, simplex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
10
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
11
+ page_content=' Introduction Spherical design spaces can occur in engineering or physics problems where the validity of a model may be assumed on a spherical region around a target value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
12
+ page_content=' So (linear) models on spherical design spaces were investigated early in publications like Kiefer (1961) and Farrell et al (1967) which discuss polynomial regression on the ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
13
+ page_content=' These ideas were followed up by papers in which also only linear problems were focused.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
14
+ page_content=' So Lau (1988) fitted polynomials on the k-dimensional unit ball by using canonical moments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
15
+ page_content=' In Dette et al (2005, 2007) and Hirao et al (2015) harmonic polynomials and Zernike polynomials were used to be fit on the unit disc (2-dimensional unit ball), the 3- and k-dimensional unit ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
16
+ page_content=' On the other hand generalized linear models are also well-examined and used in practical application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
17
+ page_content=' Logit and probit models, for example, in one dimension on an interval have already been investigated by Ford et al (1992) and Biedermann et al (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
18
+ page_content=' But there seems to be no available literature which combines both topics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
19
+ page_content=' In our publication Radloff and Schwabe (2019b) we took the first step to bring non- linearity or generalized linear models, respectively, and spherical design regions together.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
20
+ page_content=' These results were extended to a wider class of non-linear models in our follow-up paper Radloff and Schwabe (2019a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
21
+ page_content=' †corresponding author: Martin Radloff, Institute for Mathematical Stochastics, Otto-von-Guericke- University, PF 4120, 39016 Magdeburg, Germany, martin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
22
+ page_content='radloff@ovgu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
23
+ page_content='de ‡Rainer Schwabe, Institute for Mathematical Stochastics, Otto-von-Guericke-University, PF 4120, 39016 Magdeburg, Germany, rainer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
24
+ page_content='schwabe@ovgu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
25
+ page_content='de arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
26
+ page_content='02859v1 [stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
27
+ page_content='ME] 7 Jan 2023 Martin Radloff, Rainer Schwabe Exact Designs on the Ball For better comprehensibility, we will start with the model description and give a brief overview of the findings so far.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
28
+ page_content=' Then we will consider a special class of intensity func- tions which allows to reduce the the complexity of finding (locally) D-optimal designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
29
+ page_content=' Afterwards we will tackle the problem, that the optimal designs are not exact designs in general, by establishing highly efficient designs on the ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
30
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
31
+ page_content=' General Model Description As in Radloff and Schwabe (2019b) and Radloff and Schwabe (2019a), where we described (locally) D-optimal designs for two special classes of linear and non-linear models on a k-dimensional unit ball Bk = {x ∈ Rk : x2 1 + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
32
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
33
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
34
+ page_content=' + x2 k ≤ 1} with k ∈ N, we solely focus (non-linear) multiple regression models, which means the linear predictor is f(x)⊤β = β0 + β1x1 + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
35
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
36
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
37
+ page_content=' + βkxk with regression function f : Bk → Rk+1, x �→ (1, x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
38
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
39
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
40
+ page_content=' , xk)⊤, and parameter vector β = (β0, β1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
41
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
42
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
43
+ page_content=' , βk)⊤ ∈ Rk+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
44
+ page_content=' The one-support-point (or elemental) information matrix should be representable in the form M(x, β) = λ � f(x)⊤β � f(x)f(x)⊤ with an intensity (or efficiency) function λ which only depends on the value of the linear predictor f(x)⊤β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
45
+ page_content=' These one-support-point (or elemental) information matrices are the base for the information matrix of a (generalized) design ξ with independent observations M(ξ, β) = � M(x, β) ξ(dx) = � λ � f(x)⊤β � f(x)f(x)⊤ξ(dx) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
46
+ page_content=' Here generalized design means an arbitrary probability measure on the design region Bk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
47
+ page_content=' These information matrices allow to define the (local) D-optimality, which is one of the most popular criteria in experimental design theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
48
+ page_content=' A design ξ∗ β0 with regular infor- mation matrix M(ξ∗ β0, β0) is called (locally) D-optimal (at β0) if det(M(ξ∗ β0, β0)) ≥ det(M(ξ, β0)) holds for all suitable probability measures ξ on the design space — here Bk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
49
+ page_content=' This optimality criterion can be interpreted as the minimization of the volume of the (asymptotic) confidence ellipsoid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
50
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
51
+ page_content=' Prior Results In Radloff and Schwabe (2016) we stated results on equivariance and invariance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
52
+ page_content=' By rotating the design space Bk — the k-dimensional unit ball — and the parameter space Rk+1 in an analogous way the linear predictor of the multiple regression problem reduces to f(x)⊤β = β0 + β1x1 and β1 ≥ 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
53
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
54
+ page_content='1) Using the rotation invariance with fixed x1, this means the invariance to all orthogonal transformations in O(k) which let the x1-component unchanged, the (locally) D-optimal (generalized) design ξ∗ can be decomposed (ξ∗ = ξ∗ 1 ⊗ η) in a marginal probability measure ξ∗ 1 on [−1, 1] for x1 and a probability kernel η given x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
55
+ page_content=' For fixed x1 the kernel η(x1, ·) is 2 Martin Radloff, Rainer Schwabe Exact Designs on the Ball the uniform distribution on the surface of a (k − 1)-dimensional ball with radius � 1 − x2 1 — the orbit at position x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
56
+ page_content=' As a consequence the multidimensional problem collapses to a one-dimensional marginal problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
57
+ page_content=' Only the positions of the orbits and their weights have to be determined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
58
+ page_content=' To get an exact design the uniform orbits have to be discretized, for example, by using regular simplices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
59
+ page_content=' In our first paper — Radloff and Schwabe (2019b) — we started with models where the intensity function belongs to the class of monotonous functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
60
+ page_content=' Such models have already been investigated in one dimension, for example, by Konstantinou et al (2014) and on multidimensional cuboids or orthants by Schmidt and Schwabe (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
61
+ page_content=' These authors gave the following four conditions on the intensity function λ: (A1) λ is positive on R and twice continuously differentiable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
62
+ page_content=' (A2) The first derivative λ′ is positive on R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
63
+ page_content=' (A3) The second derivative u′′ of u = 1 λ is injective on R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
64
+ page_content=' (A4) The function λ′ λ is non-increasing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
65
+ page_content=' Condition (A2) is the motivation for the name class of monotonous intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
66
+ page_content=' The intensity functions of this class have to satisfy always (A1) to (A3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
67
+ page_content=' (A4) is an extra condition to guarantee uniqueness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
68
+ page_content=' For a concise notation q(x1) = λ(β0 + β1x1) is used and the properties (A1), (A2), (A3) and (A4) transfer to q for β1 > 0, respectively, and vice versa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
69
+ page_content=' Poisson regression with intensity function qP(x1) = exp(β0 + β1x1) and negative binomial regression as well as special proportional hazard models with censoring, see Schmidt and Schwabe (2017), satisfy all four conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
70
+ page_content=' If β1 = 0 then the intensity function q is always a constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
71
+ page_content=' This yields to a (locally) D-optimal design as it can be found in linear models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
72
+ page_content=' In Pukelsheim (1993, section 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
73
+ page_content='12) such a design consists of the equally weighted vertices of a regular simplex inscribed in the unit sphere, the boundary of the design space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
74
+ page_content=' The orientation of the simplex is arbitrary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
75
+ page_content=' The main result for β1 > 0 in Radloff and Schwabe (2019b) is recited for the readers’ convenience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
76
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
77
+ page_content=' There is a (locally) D-optimal design for the multiple regression prob- lem (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
78
+ page_content='1) with β1 > 0 and intensity function satisfying (A1)-(A3) which has one support point equal to (1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
79
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
80
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
81
+ page_content=' , 0)⊤ and the other k support points are the vertices of an arbi- trarily rotated (k − 1)-dimensional regular simplex which is maximally inscribed in the intersection of the k-dimensional unit ball and a hyperplane with x1 = x∗ 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
82
+ page_content=' For k ≥ 2 the position x∗ 12 ∈ (−1, 1) is solution of q′(x∗ 12) q(x∗ 12) = 2 (1 + kx∗ 12) k (1 − x∗ 2 12 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
83
+ page_content=' If additionally (A4) is satisfied, the solution x∗ 12 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
84
+ page_content=' 3 Martin Radloff, Rainer Schwabe Exact Designs on the Ball For k = 1 the position x∗ 12 ∈ [−1, 1) is either solution of q′(x∗ 12) q(x∗ 12) = 2 1 − x∗ 12 , if such a solution exists in [−1, 1), or otherwise x∗ 12 = −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
85
+ page_content=' If additionally (A4) is satisfied, the solution x∗ 12 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
86
+ page_content=' The design is equally weighted with 1 k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
87
+ page_content=' It should be noted, that for fixed β this theorem does not need (A1) to (A4) on the entire real line R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
88
+ page_content=' It is enough to have it in the ball and so on x1 ∈ [−1, 1] for q and on [β0 − β1, β0 + β1] for λ, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
89
+ page_content=' But the model has to satisfy the conditions always on the whole real line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
90
+ page_content=' In our second paper — Radloff and Schwabe (2019a) — the conditions (A2) and (A3) were replaced by (A2′) and (A3′) and a fifth property (A5) was added.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
91
+ page_content=' (A2′) λ is unimodal with mode c(A2′) λ ∈ R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
92
+ page_content=' (A3′) There exists a threshold c(A3′) λ ∈ R so that the second derivative u′′ of u = 1 λ is both injective on (−∞, c(A3′) λ ] and injective on [c(A3′) λ , ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
93
+ page_content=' (A5) u = 1 λ dominates z2 asymptotically for z → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
94
+ page_content=' In this context condition (A2′) means that there exists a c(A2′) λ ∈ R so that λ′ is positive on (−∞, c(A2′) λ ) and negative on (c(A2′) λ , ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
95
+ page_content=' Hence, there is only one local maximum which is simultaneously the global maximum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
96
+ page_content=' So the class of intensity functions, which satisfy (A1), (A2′) and (A3′), is called class of unimodal intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
97
+ page_content=' Indeed (A2) or (A3) do not imply (A2′) or (A3′), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
98
+ page_content=' As mentioned before, we only focus on the unit ball and the interval x1 ∈ [−1, 1] for q or [β0 − β1, β0 + β1] for λ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
99
+ page_content=' So in our special case (A2) and (A3) can be transferred to (A2′) and (A3′) by using an arbitrary cλ > β0 + β1, which means that cq lies outside the interval [−1, 1] and only one branch of the function is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
100
+ page_content=' Property (A5) means lim z→∞ ���� u(z) z2 ���� = ∞ .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
101
+ page_content=' This means that u(z) = 1 λ(z) goes faster to (±) infinity than z2 for z → ∞.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
102
+ page_content=' As (A1) to (A4) the conditions (A2′), (A3′) and (A5) transfer from the intensity function λ to the abbreviated form q for β1 > 0 and vice versa — analogously c(·) q = c(·) λ −β0 β1 with (·) is (A2′), (A3′) or empty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
103
+ page_content=' The logit model has the intensity function qlogit(x1) = exp(β0 + β1x1) (1 + exp(β0 + β1x1))2 and probit model has qprobit(x1) = φ2(β0 + β1x1) Φ(β0 + β1x1) · (1 − Φ(β0 + β1x1)) 4 Martin Radloff, Rainer Schwabe Exact Designs on the Ball with the density function φ and cumulative distribution function Φ of the standard normal distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
104
+ page_content=' Both models satisfy all five conditions (A1), (A2′), (A3′), (A4), (A5) and share a common c(A2′) λ = c(A3′) λ = 0, say cλ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
105
+ page_content=' Analogously cq = − β0 β1 for q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
106
+ page_content=' Beside these two models other models like the complementary log-log model, see Ford et al (1992), with intensity function λcomp log log(z) = exp(2z) exp(exp(z))−1 satisfy all five conditions with c(A2′) λ ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
107
+ page_content='466011 and c(A3′) λ ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
108
+ page_content='049084, but here mode c(A2′) λ and threshold c(A3′) λ do not coincide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
109
+ page_content=' We showed that if the (concise) intensity function q satisfies (A1), (A2′), (A3′) and (A5) the (locally) D-optimal design ξ∗ = ξ∗ 1 ⊗η is concentrated on exactly two orbits, which are the support points of the marginal design ξ∗ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
110
+ page_content=' The idea of the proof is based on Biedermann et al (2006) and Konstantinou et al (2014).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
111
+ page_content=' The next theorem is the main result of our second paper — Radloff and Schwabe (2019a) — and is reproduced for the readers’ convenience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
112
+ page_content=' It characterizes the positions of the two support points of the optimal marginal design ξ∗ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
113
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
114
+ page_content=' For k ≥ 2 the simplified problem (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
115
+ page_content='1) with β1 > 0 and intensity function q satisfying (A1), (A2′), (A3′) and (A5) has a (locally) D-optimal marginal design ξ∗ 1 with exactly 2 support points x∗ 11 and x∗ 12 with x∗ 11 > x∗ 12 and weights w1 = ξ∗ 1(x∗ 11) and w2 = ξ∗ 1(x∗ 12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
116
+ page_content=' There are 3 cases: (a) If c(A2′) q > 1 and c(A3′) q /∈ [−1, 1], then x∗ 11 = 1, w1 = 1 k+1, w2 = k k+1 and x∗ 12 ∈ (−1, 1) is solution of q′(x∗ 12) q(x∗ 12) = 2 (1 + kx∗ 12) k (1 − x∗ 2 12 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
117
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
118
+ page_content='2) If additionally (A4) is satisfied, the solution x∗ 12 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
119
+ page_content=' (b) If c(A2′) q < −1 and c(A3′) q /∈ [−1, 1], then x∗ 12 = −1, w1 = k k+1, w2 = 1 k+1 and x∗ 11 ∈ (−1, 1) is solution of q′(x∗ 11) q(x∗ 11) = 2 (−1 + kx∗ 11) k (1 − x∗ 2 11 ) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
120
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
121
+ page_content='3) If additionally (A4) is satisfied, the solution x∗ 11 is unique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
122
+ page_content=' (c) Otherwise c(A2′) q ∈ [−1, 1] or c(A3′) q ∈ [−1, 1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
123
+ page_content=' Let x, y ∈ R with x > y and α ∈ � − 1 2, 1 2 � be solution of the equation system: q′(x) q(x) + 2 x−y + (k−1) q′(x) (1−x2) ( 1 2 −α) + q(x) (−2 x) ( 1 2 −α) q(x) (1−x2) ( 1 2 −α) + q(y) (1−y2) ( 1 2 +α) = 0 (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
124
+ page_content='4) q′(y) q(y) − 2 x−y + (k−1) q′(y) (1−y2) ( 1 2 +α) + q(y) (−2 y) ( 1 2 +α) q(x) (1−x2) ( 1 2 −α) + q(y) (1−y2) ( 1 2 +α) = 0 (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
125
+ page_content='5) 1 1 2 −α − 1 1 2 +α + (k−1) q(x) (1−x2) − q(y) (1−y2) q(x) (1−x2) ( 1 2 −α) + q(y) (1−y2) ( 1 2 +α) = 0 (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
126
+ page_content='6) 5 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Figure 1: Logit model for k = 3 and ��1 = 1: Dependence of x∗ 11 and x∗ 12 (solid lines) and the corresponding weights w1 and w2 = 1 − w1 (dashed lines) on −β0 = − β0 β1 = cq ∈ [−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
127
+ page_content='2, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
128
+ page_content='2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
129
+ page_content=' (c0) If x, y ∈ (−1, 1) with x > y and α ∈ (− 1 2, 1 2) is a solution of the equation system, the orbit positions are x∗ 11 = x, x∗ 12 = y with weights w1 = 1 2 − α and w2 = 1 2 + α.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
130
+ page_content=' (c1) If x ≥ 1 and y ∈ (−1, 1), then x∗ 11 = 1, w1 = 1 k+1, w2 = k k+1 and x∗ 12 ∈ (−1, 1) is the solution of the equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
131
+ page_content='2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
132
+ page_content=' (c2) If y ≤ −1 and x ∈ (−1, 1), then x∗ 12 = −1, w1 = k k+1, w2 = 1 k+1 and x∗ 11 ∈ (−1, 1) is the solution of the equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
133
+ page_content='3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
134
+ page_content=' Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
135
+ page_content=' Instead of reproducing the whole theorem for k = 1, only the two main changes in case (c) should be mentioned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
136
+ page_content=' So the weights are always w1 = w2 = 1 2 and the equation system (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
137
+ page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
138
+ page_content='6) is replaced by q′(x) q(x) + 2 x − y = 0 and q′(y) q(y) − 2 x − y = 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
139
+ page_content=' (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
140
+ page_content='7) To illustrate this complex issue we revisit the logit model in dimension k = 3 with β1 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
141
+ page_content=' We (numerically) plot the orbit positions x∗ 11 and x∗ 12 and corresponding weights w1 and w2 = 1 − w1 depending on −β0 = − β0 β1 = cq, see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
142
+ page_content=' The cases (a) and (b) go along with Theorem 1 and the results from Radloff and Schwabe (2019b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
143
+ page_content=' The cases (c1) and (c2) yield marginal extremum solutions which are identical to (a) and (b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
144
+ page_content=' So for these four cases there is always an exact minimally supported (locally) D-optimal design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
145
+ page_content=' As described in Theorem 1, it consists of a pole point in x1 = −1 or else x1 = 1 and the k vertices of a (regular) simplex which is maximally inscribed in the non-degenerated orbit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
146
+ page_content=' But the problematic case is (c0) because the (locally) D-optimal (generalized) design consists of two non-degenerated orbits and additionally the weights are rarely appropriate for a discretization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
147
+ page_content=' In Radloff and Schwabe (2019a) we showed two examples for the logit model (k = 3, β1 = 1) from which we derived (nearly) exact designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
148
+ page_content=' For −β0 = 0 the two orbit positions are symmetrical around 0, that is x∗ 11 = −x∗ 12 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
149
+ page_content='52, and the weights are ξ∗ 1(x∗ 11) = ξ∗ 1(x∗ 12) = 1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
150
+ page_content=' These two orbits were discretized by two 6 Martin Radloff, Rainer Schwabe Exact Designs on the Ball 2-dimensional simplices — overall 6 equally weighted support points;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
151
+ page_content=' see Figure 2 (left image).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
152
+ page_content=' For −β0 = −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
153
+ page_content='1 it is x∗ 11 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
154
+ page_content='42, x∗ 12 ≈ −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
155
+ page_content='62 and ξ∗ 1(x∗ 11) ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
156
+ page_content='4297, while 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
157
+ page_content='4297 ≈ 3 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
158
+ page_content=' We took the rounded design ξ≈ with the same support points x∗ 11 and x∗ 12 but with the marginal design ξ≈ 1 (x∗ 11) = 3 7 and ξ≈ 1 (x∗ 12) = 4 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
159
+ page_content=' So it was possible to substitute one orbit by the vertices of a 2-dimensional simplex (3 points — an equilateral triangle) and one by the vertices of a 2-dimensional cube or cross polytope (4 points — a square).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
160
+ page_content=' Because of rounding the design ξ≈ is not optimal but exact and has a high D-efficiency, which compares the rounded design ξ≈ and the optimal design ξ∗ β0 with respect to β0 — here p = k + 1 = 4 and β0 = (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
161
+ page_content='1, 1, 0, 0)⊤: EffD(ξ≈, β0) = � det(M(ξ≈, β0)) det(M(ξ∗ β0, β0)) �1 p ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
162
+ page_content='999757 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
163
+ page_content=' These designs are not very satisfactory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
164
+ page_content=' On the one hand the number of support points is not minimal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
165
+ page_content=' On the other hand only special cases have appropriate rational weights which allow a discretization or otherwise the optimality is lost by rounding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
166
+ page_content=' Therefore we want to establish minimal supported exact designs for the case (c0) in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
167
+ page_content=' Mostly these designs wont be optimal but (highly) efficient.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
168
+ page_content=' But we start with the reduction of the system of three equations in Theorem 2 to only one single equation for special unimodal intensity functions — symmetrical unimodal intensity functions — which can be found, for example, in binary response models with logit and probit link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
169
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
170
+ page_content=' Optimal Design for Symmetrical Unimodal Intensity Functions An interesting observation was made in the discussion section in Radloff and Schwabe (2019a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
171
+ page_content=' For models with unimodal intensity function in which the mode and threshold coincide (c(A2′) λ = c(A3′) λ = cλ) and which are symmetrical, also the two orbit positions are symmetrical in a certain way, which we want to investigate here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
172
+ page_content=' For one dimension this has been considered and shown in Ford et al (1992, Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
173
+ page_content='5 and 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
174
+ page_content='6), but this proof cannot be extended to higher dimensions directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
175
+ page_content=' Definition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
176
+ page_content=' An unimodal intensity function in which the mode and threshold coincide (c(A2′) λ = c(A3′) λ = cλ) will be called symmetrical to cλ if λ(cλ + z) = λ(cλ − z) for all z ∈ R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
177
+ page_content=' The intensity functions of the logit and probit models are symmetrical with cλ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
178
+ page_content=' But the unimodal intensity function of the complementary log-log model has c(A2′) λ ̸= c(A3′) λ and cannot be symmetrical for this reason.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
179
+ page_content=' Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
180
+ page_content=' Let the intensity function λ be symmetrical to cλ in the situation of Theo- rem 2 (c0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
181
+ page_content=' 7 Martin Radloff, Rainer Schwabe Exact Designs on the Ball For given β0 ̸= cλ let r solve λ′(cλ+r) λ(cλ+r) = − −2 k r2 (β2 1 +c2−r2)+(β2 1 −c2−r2)2−4 c2 r2 +(β2 1 −c2+r2) � (β2 1 −c2−r2)2+4 (k2−1) c2 r2 (k+1) r (r+c−β1)(r+c+β1)(r−c+β1)(r−c−β1) (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
182
+ page_content='8) with c := cλ − β0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
183
+ page_content=' Then x = c β1 + r β1 , (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
184
+ page_content='9) y = c β1 − r β1 , (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
185
+ page_content='10) α = −(β2 1 −c2−r2)+ � (β2 1 −c2−r2)2+4 (k2−1) c2 r2 4 (k+1) c r (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
186
+ page_content='11) is a solution of the equation system (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
187
+ page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
188
+ page_content='6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
189
+ page_content=' For given β0 = cλ it is x = r β1, y = − r β1 and α = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
190
+ page_content=' Here r is the solution of λ′(cλ + r) λ(cλ + r) = − 2 (β2 1 − k r2) (k + 1) r (β2 1 − r2) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
191
+ page_content=' (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
192
+ page_content='12) Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
193
+ page_content=' For k = 1, see Remark 1, let λ be symmetrical to cλ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
194
+ page_content=' Then x = cλ−β0 β1 + r β1 and y = cλ−β0 β1 − r β1 with r is solution of λ′(cλ + r) λ(cλ + r) = −1 r (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
195
+ page_content='13) solve the equation system (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
196
+ page_content='7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
197
+ page_content=' Lemma 1, whose proof sketch can be found in Appendix B, and Remark 2 in combination with Theorem 2 give (locally) D-optimal designs for models with symmetrical unimodal intensity functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
198
+ page_content=' As a result we reduced the system of equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
199
+ page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
200
+ page_content='6) to only one single equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
201
+ page_content='8).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
202
+ page_content=' But now there is the question if condition (A4) can guarantee a unique solution as in Theorem 1 or in Theorem 2 (a) and (b) because Theorem 2 (c), especially (c0), tells nothing about uniqueness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
203
+ page_content=' But we want to add a remark about the values of r before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
204
+ page_content=' Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
205
+ page_content=' Since the system of equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
206
+ page_content='4)–(3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
207
+ page_content='6) in Theorem 2 (c0) should have a solution with two inner support points for the marginal design, x, y ∈ (−1, 1) is required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
208
+ page_content=' So −1 < cλ − β0 β1 ± r β1 < 1 must be valid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
209
+ page_content=' This leads with β1 > 0 to r ∈ (−(cλ − β0) − β1, −(cλ − β0) + β1) and r ∈ ((cλ − β0) − β1, (cλ − β0) + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
210
+ page_content=' Consequently, both intervals must overlap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
211
+ page_content=' This happens for cλ − β0 > 0 at 0 < cλ − β0 < β1 and for cλ − β0 < 0 at −β1 < cλ − β0 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
212
+ page_content=' Thus cλ − β0 ∈ (−β1, β1) and in particular β2 1 > (cλ − β0)2 must hold.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
213
+ page_content=' Then r is in the interval (|cλ − β0| − β1, −|cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
214
+ page_content=' But Theorem 2 (c) need x > y and consequently r > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
215
+ page_content=' Hence, r ∈ (0, −|cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
216
+ page_content=' This remains valid in particular for β0 = cλ, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
217
+ page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
218
+ page_content=' cλ − β0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
219
+ page_content=' So r ∈ (−β1, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
220
+ page_content=' With r > 0 it is r ∈ (0, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
221
+ page_content=' 8 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
222
+ page_content=' In situation of Lemma 1 let the intensity function λ additionally satisfy condition (A4), then equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
223
+ page_content='8), whose right hand side is continuously continued in −|cλ − β0| + β1, has a unique solution in r ∈ (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
224
+ page_content=' This also holds for β0 = cλ and equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
225
+ page_content='12), which has exactly one solution in r ∈ (0, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
226
+ page_content=' Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
227
+ page_content=' For k = 1, see Remark 2, and for an intensity function satisfying (A4) there is only one solution of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
228
+ page_content='13).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
229
+ page_content=' The proof sketch of Lemma 2 can be found in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
230
+ page_content=' Lemma 2 guarantees a unique solution in r ∈ (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
231
+ page_content=' But Remark 3 points out that for Theorem 2 (c0) we need r ∈ (0, −|cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
232
+ page_content=' This means that the unique solution can result in the two-orbit case or in the one-orbit one-pole case of Theorem 2 (c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
233
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
234
+ page_content=' Minimally Supported Designs In the situation of Theorem 1 and Theorem 2 (a), (b), (c1) and (c2) the designs have always the minimal number of support points to estimate the parameter vector β.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
235
+ page_content=' These are k + 1 support points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
236
+ page_content=' In Radloff and Schwabe (2019a) revisited here in the introductory section we indicated exemplarily a (locally) D-optimal design for the logit model on the 3-dimensional ball with −β0 = 0 and β1 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
237
+ page_content=' This design consists of six support points which are the vertices of two regular 2-dimensional simplices — equilateral triangles;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
238
+ page_content=' see Figure 2 (left image).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
239
+ page_content=' But this is not the minimum of support points to estimate the four parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
240
+ page_content=' So the question arises whether it is possible to reduce the number of support points as it can be found in the concept of fractional factorial designs, see, for example, Pukelsheim (1993, section 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
241
+ page_content='11).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
242
+ page_content=' Instead of using all vertices of the hypercube [−1, 1]k as in the full factorial design the fractional factorial design picks only a special percentage of these points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
243
+ page_content=' For k = 3 (−1, −1, 1)⊤, (−1, 1, −1)⊤, (1, −1, −1)⊤, (1, 1, 1)⊤ represent a 23−1-fractional factorial design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
244
+ page_content=' In our issue we do not want to pick four of the six points, but we want to use the orthogonality of the spaces spanned by the points (without the x1-component) in the two orbits (x1 = −1 and x1 = 1) of the given 23−1-fractional factorial design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
245
+ page_content=' Here span{(−1, 1)⊤, (1, −1)⊤} ⊥ span{(−1, −1)⊤, (1, 1)⊤}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
246
+ page_content=' The idea for our problem is il- lustrated in Figure 2 (right image).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
247
+ page_content=' The spanned spaces by points (without the x1- component) in the orbits are orthogonal to each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
248
+ page_content=' And all points span a simplex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
249
+ page_content=' As stated above a (generalized) design ξ which is rotation invariant with fixed x1 — invariant with respect to all orthogonal transformations in O(k) which do not change the x1-component — and which has all mass on the unit sphere can be decomposed into a marginal design ξ1 on [−1, 1] and a probability kernel η (conditional design), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
250
+ page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
251
+ page_content=' ξ = ξ1 ⊗ η.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
252
+ page_content=' For fixed x1 the kernel η(x1, ·) is the uniform distribution on the surface of a (k − 1)-dimensional ball with radius � 1 − x2 1 — the orbit at position x1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
253
+ page_content=' If x1 ∈ {−1, 1}, the (k − 1)-dimensional ball with the uniform distribution reduces to a single point and represents only a one-point-measure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
254
+ page_content=' Remembering q(x1) = λ(β0 + β1x1) the related 9 Martin Radloff, Rainer Schwabe Exact Designs on the Ball information matrix, see Radloff and Schwabe (2019b), is M(ξ1 ⊗ η, β0) = � � � � q dξ1 � q id dξ1 � q id dξ1 � q id2 dξ1 O2×(k−1) O(k−1)×2 1 k−1 � q (1 − id2) dξ1 Ik−1 � � � (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
255
+ page_content='14) with β0 = (β0, β1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
256
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
257
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
258
+ page_content=' , 0)⊤.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
259
+ page_content=' The information matrix for a design on the k-dimensional unit sphere Sk−1, which is based on exactly two orbits, can be determined analogously to this result.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
260
+ page_content=' Additionally the uniform distribution does not cover the the full orbits but only sub-spheres.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
261
+ page_content=' Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
262
+ page_content=' Let ξ1 be the two-point-measure in x11 and x12 with ξ1(x11) = 1 2 − α and ξ1(x12) = 1 2 + α with α ∈ � − 1 2, 1 2 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
263
+ page_content=' Further let η(x11, ·) be a uniform distribution on Sm−2 �� 1 − x2 11 � × {0}k−m and likewise η(x12, ·) be a uniform distribution on {0}m−1 × Sk−m−1 �� 1 − x2 12 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
264
+ page_content=' Then the information matrix is M(ξ1 ⊗ η, β0) = � � � � � � q dξ1 � q id dξ1 � q id dξ1 � q id2 dξ1 O2×(k−1) O(k−1)×2 c1 Im−1 O(m−1)×(k−m) O(k−m)×(m−1) c2 Ik−m � � � � � (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
265
+ page_content='15) with c1 = 1 m−1 q(x11) (1−x2 11) ( 1 2 −α) and c2 = 1 k−m q(x12) (1−x2 12) ( 1 2 +α).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
266
+ page_content=' Now the optimality case in Theorem 2 (c0) on two orbits should be used to investigate when both information matrices (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
267
+ page_content='14) und (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
268
+ page_content='15) are identical.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
269
+ page_content=' With that both related (generalized) designs would be (locally) D-optimal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
270
+ page_content=' Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
271
+ page_content=' Both information matrices (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
272
+ page_content='14) and (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
273
+ page_content='15) are identical in the situation of Theorem 2 (c0) if and only if α = 1 2 − m k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
274
+ page_content=' The proof can be found in Appendix B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
275
+ page_content=' Consequently both orbits need the weights ξ1(x11) = m k+1 and ξ1(x12) = k−m+1 k+1 to coincide both information matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
276
+ page_content=' This allows an experimental design, which has the same value for the D-optimality criterion, consisting of two orbits with m and with k −m+1 support Figure 2: Logit model for k = 3 and β1 = 1 and −β0 = 0: discretized (locally) D-optimal designs with 6 or 4 support points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
277
+ page_content=' 10 1Martin Radloff, Rainer Schwabe Exact Designs on the Ball Figure 3: D-efficiency for the logit model with k = 3 and β1 = 1: comparison of designs with exactly k+1 = 4 equally weighted support points in −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
278
+ page_content='403, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
279
+ page_content='403) (rounded).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
280
+ page_content=' points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
281
+ page_content=' This can be done by two regular simplices — one simplex in dimension m − 1 and one in dimension k − m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
282
+ page_content=' So the simplices are the discretizations of the uniform distributions on Sm−2 �� 1 − x2 11 � × {0}k−m and on {0}m−1 × Sk−m−1 �� 1 − x2 12 � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
283
+ page_content=' Let Sm ∈ Rm×(m+1) be a matrix, where the columns represent the m + 1 vertices of an m-dimensional regular simplex (in Rm).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
284
+ page_content=' Then the columns of the matrix � � � x111⊤ m x121⊤ k−m+1 R1 Sm−1 O(m−1)×(k−m+1) O(k−m)×m R2 Sk−m � � � with arbitrary orthogonal transformations R1 ∈ O(m − 1) and R2 ∈ O(k − m) represent the support points of such a minimal supported design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
285
+ page_content=' �� m + 1 m Im + 1 − √m + 1 m√m 1m1⊤ m ����� − 1 √m 1m � ∈ Rm×(m+1) is an example for Sm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
286
+ page_content=' In this notation Im stands for the standard simplex which needs to be scaled and shifted appropriately so that it is in combination with the last vertex − 1 √m 1m (last column) a regular simplex on the unit sphere Sm−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
287
+ page_content=' Finally, we want to look at the D-efficiency, here with β0 = (β0, β1, 0, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
288
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
289
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
290
+ page_content=' , 0)⊤, EffD(ξ, β0) = � det(M(ξ, β0)) det(M(ξ∗ β0, β0)) �1 p ∈ [0, 1] for designs ξ with exactly p = k + 1 equally weighted support points in the region where two non-degenerated orbits occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
291
+ page_content=' As an example, the logit model with β1 = 1 is used to determine the D-efficiency in dimensions k = 3 and k = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
292
+ page_content=' In Figure 3 and Figure 4 only the regions for −β0 with 11 Martin Radloff, Rainer Schwabe Exact Designs on the Ball two non-degenerated orbits in the optimal design (case (c0) in Theorem 2), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
293
+ page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
294
+ page_content=' −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
295
+ page_content='403, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
296
+ page_content='403) (rounded) for k = 3 and −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
297
+ page_content='480, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
298
+ page_content='480) (rounded) for k = 6, are plotted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
299
+ page_content=' For this purpose, three different types of exact designs are compared with the (locally) D-optimal design ξ∗ β0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
300
+ page_content=' The optimal design is a generalized design with real weights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
301
+ page_content=' Therefore it cannot be discretized as an exact design in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
302
+ page_content=' First, the two optimal exact designs with one pole and one orbit, which are discretized as a regular (k−1)-dimensional simplex, are used for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
303
+ page_content=' The orbit position remains unchanged and is determined at the boundary values −β0 ≈ ±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
304
+ page_content='403 or −β0 ≈ ±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
305
+ page_content='480.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
306
+ page_content=' See the solid lines in both figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
307
+ page_content=' Second, the designs with the same orbit position as the associated design which is (locally) optimal for −β0 are the next alternative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
308
+ page_content=' Only the weights were rounded/shifted to integral multiples of 1 k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
309
+ page_content=' See the dotted lines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
310
+ page_content=' Third, the designs with fixed design weights which are integral multiples of 1 k+1 represent the last model category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
311
+ page_content=' So only the positions of the orbits have to be optimized with these fixed design weights.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
312
+ page_content=' This can be done by solving only the equations (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
313
+ page_content='4) and (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
314
+ page_content='5) with the selected weights in Theorem 2 (c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
315
+ page_content=' Equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
316
+ page_content='6) is omitted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
317
+ page_content=' See the dashed lines in both plots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
318
+ page_content=' The Figure 3 reveals for dimension k = 3 that there are only three positions in the range −β0 ∈ [−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
319
+ page_content='403, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
320
+ page_content='403] (rounded) where (locally) D-optimal designs with the min- imal number of support points — four points — exists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
321
+ page_content=' For −β0 ≈ −0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
322
+ page_content='403 this is the design consisting of the pole x∗ 12 = −1 and one orbit at x∗ 11 with three points as vertices of an equilateral triangle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
323
+ page_content=' Then for −β0 = 0 there are two orbits with two points each.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
324
+ page_content=' And, at −β0 ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
325
+ page_content='403 the design consists of one orbit at x∗ 12 with three equally weighted support points and the pole x∗ 11 = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
326
+ page_content=' In the span between these optimality positions the considered discretizations provide a fairly high efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
327
+ page_content=' Using the transition directly from pole and orbit to orbit and pole, the efficiency is always greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
328
+ page_content='988 (intersec- tion of the solid lines).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
329
+ page_content=' If the two orbits are also discretized in between, the efficiency is greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
330
+ page_content='993 (intersection of dotted line and solid lines) or even greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
331
+ page_content='997 (intersection of dashed line and solid lines).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
332
+ page_content=' For dimension k = 6, see figure 4, an efficiency of more than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
333
+ page_content='986 is possible by stepping directly from pole and orbit with six support points to orbit with six design points and pole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
334
+ page_content=' If the intermediate steps — two orbits with 2 and 5 points, 3 and 4 points, 4 and 3 points as well as 5 and 2 points — are used, then by simple rounding of the weights to integral multiples of 1 k+1 an efficiency greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
335
+ page_content='995 (dotted lines) and with additional optimization of the orbit positions even greater than 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
336
+ page_content='999 (dashed lines) can be achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
337
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
338
+ page_content=' Conclusion In summary it can be postulated that very efficient designs are generated based on only k + 1 design points which is the minimal number of support points to estimate the pa- rameter vector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
339
+ page_content=' It seems that higher dimensions enable designs with higher D-efficiency, in particular using the third option of discretization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
340
+ page_content=' Here we only considered designs with exactly two orbits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
341
+ page_content=' Thus it cannot be excluded that there are designs with a better efficiency or even (locally) optimal designs which are supported by exactly k + 1 points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
342
+ page_content=' Maybe these designs have support points which lie not on the orbit but are jittered a little bit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
343
+ page_content=' This as well as a potential lower efficiency bound needs further investigations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
344
+ page_content=' 12 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Figure 4: D-efficiency for the logit model with k = 6 and β1 = 1: comparison of designs with exactly k+1 = 7 equally weighted support points in −β0 ∈ (−0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
345
+ page_content='480, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
346
+ page_content='480) (rounded).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
347
+ page_content=' On the other side the reduction of the equation system to one single equation for deter- mining (locally) D-optimal design for symmetrical unimodal intensity functions is a nice feature and can help to decrease computing costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
348
+ page_content=' Also the question of optimal designs on the ball with respect to other optimality criteria should be considered in future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
349
+ page_content=' Finally, we want to emphasize that the established designs do not only work for the unit ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
350
+ page_content=' By using the concept of equivariance for linear transformations, say scaling, reflecting and rotating, the class of design spaces can be extended to k-dimensional balls with arbitrary radius or any k-dimensional ellipsoid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
351
+ page_content=' Appendix A Notation Bk k-dimensional unit ball Bk(r) k-dimensional ball with radius r Sk−1 unit sphere, which is the surface of Bk Sk−1(r) sphere with radius r, which is the surface of Bk(r) Ok k-dimensional zero-vector Ok1×k2 (k1 × k2)-dimensional zero-matrix 1k k-dimensional one-vector Ik (k × k)-dimensional identity matrix id identity function 13 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Appendix B Proofs Proof sketch of Lemma 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
352
+ page_content=' By plugging (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
353
+ page_content='9) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
354
+ page_content='10) into (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
355
+ page_content='6) and using the sym- metry to simplify, we get −2 α (4 c r α+(β2 1 −c2−r2))+4 (k−1) c r � 1 2 −α � � 1 2 +α � � 1 2 −α � � 1 2 +α � (4 c r α+(β2 1 −c2−r2)) = 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
356
+ page_content=' In the numerator there is a polynomial of degree two in α with the two roots α∓(r) depending on r: α∓(r) := − (β2 1 − c2 − r2) ∓ � (β2 1 − c2 − r2)2 + 4 (k + 1) (k − 1) c2 r2 4 (k + 1) c r .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
357
+ page_content=' Now we examine the values of α∓(r) depending on r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
358
+ page_content=' Only −|c| − β1, |c| − β1, −|c| + β1 or |c| + β1 can solve the expression α∓(r) = ± 1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
359
+ page_content=' But −|c| − β1 and |c| + β1 are not in the interesting region for r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
360
+ page_content=' We have α− (±(|c| − β1)) = ±1 2 sign(c) and α+ (±(|c| − β1)) = ∓1 2 sign(c) k − 1 k + 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
361
+ page_content=' Because of limr↗0 α− (r) = sign(c)∞ and limr↘0 α− (r) = − sign(c)∞ the root α−(r) has in the interval r ∈ [|c| − β1, −|c| + β1] only values outside (− 1 2, 1 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
362
+ page_content=' Hence, α−(r) is not a relevant root.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
363
+ page_content=' Since limr→0 α+ (r) = 0 the discontinuity of the root α+(r) in r = 0 can be removed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
364
+ page_content=' So α+(r) has only values in (− 1 2, 1 2) on the interval r ∈ [|c| − β1, −|c| + β1] and α+(r), which is (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
365
+ page_content='11), is the only relevant root.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
366
+ page_content=' After inserting (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
367
+ page_content='9) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
368
+ page_content='10) into (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
369
+ page_content='4) as well as (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
370
+ page_content='9) and (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
371
+ page_content='10) into (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
372
+ page_content='5) and sub- tracting both obtained equations and simplifying by using the symmetry, we get (k + 1) λ′(cλ + r) λ(cλ + r) = −(k − 1) −2 r + α · 4 c (β2 1 − c2 − r2) + α · 4 c r − 2 r .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
373
+ page_content=' Equation (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
374
+ page_content='8) follows by plugging α+(r) as α into it and by some simplifications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
375
+ page_content=' For β0 = cλ, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
376
+ page_content=' e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
377
+ page_content=' c = cλ − β0 = 0, we get directly α = 0 by inserting x = r β1 and y = − r β1 in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
378
+ page_content='6) and exploiting the symmetry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
379
+ page_content=' This is inserted in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
380
+ page_content='4) and in (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
381
+ page_content='5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
382
+ page_content=' The difference between these two equations results in (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
383
+ page_content='12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
384
+ page_content=' Proof sketch of Lemma 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
385
+ page_content=' This proof is a lot of curve sketching.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
386
+ page_content=' We start with β0 ̸= cλ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
387
+ page_content=' The denominator of the right hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
388
+ page_content='8) has five roots in r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
389
+ page_content=' −|cλ −β0|−β1 < 0 and |cλ − β0| − β1 < 0 are not in the considered interval (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
390
+ page_content=' In r = −|cλ − β0| + β1 there is a discontinuity which can be removed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
391
+ page_content=' In r = 0 and in r = |cλ − β0| + β1 there are two poles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
392
+ page_content=' Analyzing these poles for the considered interval we see that the values start from −∞ (r ↘ 0) and go up to +∞ (r ↗ |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
393
+ page_content=' Sophisticated curve sketching shows that the right hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
394
+ page_content='8) is strictly monotonically increasing on (0, |cλ − β0| + β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
395
+ page_content=' So it is strictly monotonically increasing and covers (−∞, ∞).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
396
+ page_content=' In combination with (A4) for the left hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
397
+ page_content='8) (monotonically decreasing) there is exactly one solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
398
+ page_content=' For β0 = cλ we can mention that the right hand side of (4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
399
+ page_content='12) is also strictly monotonically increasing on (0, β1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
400
+ page_content=' Hence, there is only one solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
401
+ page_content=' An analogue result holds for the situation in Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
402
+ page_content=' 14 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Proof of Lemma 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
403
+ page_content=' Rearranging equation (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
404
+ page_content='6) equivalently in two ways gives q(x12) (1−x2 12) ( 1 2 +α) = q(x11) (1−x2 11) ( 1 2 −α) k ( 1 2 +α)−( 1 2 −α) k ( 1 2 −α)−( 1 2 +α) and q(x11) (1−x2 11) ( 1 2 −α) = q(x12) (1−x2 12) ( 1 2 +α) k ( 1 2 −α)−( 1 2 +α) k ( 1 2 +α)−( 1 2 −α) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
405
+ page_content=' The two denominators are zero if and only if α = 1 2 − 1 k+1 and α = 1 2 − k k+1, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
406
+ page_content=' But this cannot happen to non-degenerated orbits because 1 2 − k k+1 < α < 1 2 − 1 k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
407
+ page_content=' Putting both equations into the diagonal entry of the information matrix (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
408
+ page_content='14) yield 1 k − 1 � q (1 − id2) dξ1 = q(x11) (1−x2 11) ( 1 2 −α) � 1 k − 1 + 1 k − 1 · k ( 1 2 +α)−( 1 2 −α) k ( 1 2 −α)−( 1 2 +α) � and 1 k − 1 � q (1 − id2) dξ1 = q(x12) (1−x2 12) ( 1 2 −α) � 1 k − 1 · k ( 1 2 −α)−( 1 2 +α) k ( 1 2 +α)−( 1 2 −α) + 1 k − 1 � They are identical to the diagonal entries of the information matrix (5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
409
+ page_content='15) in Lemma 3 if and only if 1 k−1 + 1 k−1 · k ( 1 2 +α)−( 1 2 −α) k ( 1 2 −α)−( 1 2 +α) = 1 m−1 and 1 k−1 · k ( 1 2 −α)−( 1 2 +α) k ( 1 2 +α)−( 1 2 −α) + 1 k−1 = 1 k−m which are both equivalent to α = 1 2 − m k+1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
410
+ page_content=' References Biedermann S, Dette H, Zhu W (2006) Optimal designs for dose-response models with restricted design spaces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
411
+ page_content=' Journal of the American Statistical Association 101:747–759 Dette H, Melas VB, Pepelyshev A, et al (2005) Optimal designs for three-dimensional shape analysis with spherical harmonic descriptors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
412
+ page_content=' The Annals of Statistics 33:2758– 2788 Dette H, Melas VB, Pepelyshev A (2007) Optimal designs for statistical analysis with zernike polynomials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
413
+ page_content=' Statistics 41:453–470 Farrell RH, Kiefer J, Walbran A (1967) Optimum multivariate designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
414
+ page_content=' In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
415
+ page_content=' University of California Press, Berkeley, Calif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
416
+ page_content=', pp 113–138 Ford I, Torsney B, Wu C (1992) The use of a canonical form in the construction of locally optimal designs for non-linear problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
417
+ page_content=' Journal of the Royal Statistical Society: Series B (Statistical Methodology) 54:569–583 15 Martin Radloff, Rainer Schwabe Exact Designs on the Ball Hirao M, Sawa M, Jimbo M (2015) Constructions of φp-optimal rotatable designs on the ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
418
+ page_content=' Sankhya A : The Indian Journal of Statistics 77:211–236 Kiefer JC (1961) Optimum experimental designs v, with applications to systematic and rotatable designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
419
+ page_content=' In: Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Univ of California Press, pp 381–405 Konstantinou M, Biedermann S, Kimber A (2014) Optimal designs for two-parameter nonlinear models with application to survival models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
420
+ page_content=' Statistica Sinica 24:415–428 Lau TS (1988) d-optimal designs on the unit q-ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
421
+ page_content=' Journal of statistical planning and inference 19:299–315 Pukelsheim F (1993) Optimal Design of Experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
422
+ page_content=' Wiley Series in Probability and Statistics Radloff M, Schwabe R (2016) Invariance and equivariance in experimental design for nonlinear models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
423
+ page_content=' In: Kunert J, Müller CH, Atkinson AC (eds) mODa 11-Advances in Model-Oriented Design and Analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
424
+ page_content=' Springer, p 217–224 Radloff M, Schwabe R (2019a) Locally d-optimal designs for a wider class of non-linear models on the k-dimensional ball with applications to logit and probit models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
425
+ page_content=' Statis- tical Papers 60:165–177 Radloff M, Schwabe R (2019b) Locally d-optimal designs for non-linear models on the k-dimensional ball.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
426
+ page_content=' Journal of Statistical Planning and Inference 203:106–116 Schmidt D, Schwabe R (2017) Optimal design for multiple regression with information driven by the linear predictor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
427
+ page_content=' Statistica Sinica 27:1371–1384 16' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfCAKJ/content/2301.02859v1.pdf'}
9NA0T4oBgHgl3EQfO_8B/content/tmp_files/2301.02167v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
9NA0T4oBgHgl3EQfO_8B/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/2301.01712v1.pdf.txt ADDED
@@ -0,0 +1,2499 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01712v1 [math.PR] 4 Jan 2023
2
+ 1
3
+ Mesoscopic eigenvalue statistics for Wigner-type matrices
4
+ Volodymyr Riabov∗
5
+ Institute of Science and Technology Austria
6
+ volodymyr.riabov@ist.ac.at
7
+ Abstract. We prove a universal mesoscopic central limit theorem for linear eigenvalue statistics of a Wigner-
8
+ type matrix inside the bulk of the spectrum with compactly supported twice continuously differentiable test
9
+ functions. The main novel ingredient is an optimal local law for the two-point function T(z, ζ) and a general
10
+ class of related quantities involving two resolvents at nearby spectral parameters.
11
+ Date: January 5, 2023
12
+ Keywords and phrases: Wigner-type matrix, mesoscopic eigenvalue statistics, central limit theorem
13
+ 2010 Mathematics Subject Classification: 60B20, 15B52
14
+ 1
15
+ Introduction
16
+ In the study of the eigenvalue distribution of large random matrices, the most celebrated analog of
17
+ the Law of Large Numbers is the Wigner semicircle law [25]. It states that the empirical density of
18
+ eigenvalues converges to a deterministic limit known as the semicircle distribution ρsc. More explicitly,
19
+ if H is an N ×N Wigner matrix and f is a sufficiently smooth test function, then the linear eigenvalue
20
+ statistics N −1 Tr f(H) converge in probability to
21
+
22
+ R f(x)ρsc(x)dx in the large N limit.
23
+ The corresponding Central Limit Theorem (CLT) asserts that the asymptotic fluctuations of the
24
+ linear eigenvalue statistics Tr f(H)−E [Tr f(H)] are Gaussian. The absence of the N −1/2 normalization
25
+ factor, appearing in the classical CLT, can be viewed as a manifestation of the strongly-correlated
26
+ nature of the eigenvalues. For the special case of f(x) = (x − z)−1 with Im z ̸= 0, this result was
27
+ obtained by Khorunzhy, Khoruzhenko and Pastur [16]. Johansson obtained the CLT for invariant
28
+ ensembles with arbitrary polynomial potentials in [15].
29
+ In [4], Bai and Yao used martingale CLT
30
+ to establish the result for Wigner matrices with analytic test functions. The proof for bounded test
31
+ functions f with bounded derivatives appeared in the work of Lytova and Pastur [22]. In subsequent
32
+ works, different moment conditions on the matrix and regularity conditions on the test function were
33
+ studied extensively by many authors, e.g., [6, 18, 23, 24].
34
+ While fixed test functions represent macroscopic averaging in the spectrum, one can introduce N-
35
+ dependent scaling and consider scaled test functions of the form f(x) = g(η−1
36
+ 0 (x − E0)), where E0
37
+ is a fixed reference energy in the bulk, η0 ≡ η0(N) ≪ 1 is a scaling parameter, and g is compactly
38
+ supported. Then Tr f(H) involves only about Nη0 eigenvalues of H. In particular, on mesoscopic
39
+ scales, corresponding to N −1 ≪ η0 ≪ 1, the limiting variance is given by the square of the
40
+ ˙H1/2
41
+ norm of g.
42
+ Mesoscopic test functions were first studied by Boutet de Monvel and Khorunzhy in
43
+ [7] for the Gaussian Orthogonal Ensemble, with subsequent extension to real Wigner matrices in [8]
44
+ with N −1/8 ≪ η0 ≪ 1. In [13], He and Knowles proved the CLT for Wigner matrices with general
45
+ mesoscopic test functions for all scaling parameters N −1 ≪ η0 ≪ 1.
46
+ ∗Supported by the ERC Advanced Grant ”RMTBeyond” No. 101020331
47
+
48
+ The result was extended to ensembles of greater generality in the more recent works, see, e.g., [5]
49
+ and [20]. In particular, Li and Xu obtained mesoscopic CLT for generalized Wigner matrices 1 in the
50
+ bulk and at the spectral edge with C2
51
+ c test functions in the full range of scales [21].
52
+ Finally, Landon, Lopatto, and Sosoe proved the bulk CLT for the much more general ensemble
53
+ of Wigner-type matrices in [17] for two classes of C∞ test functions. For a special class of globally
54
+ supported regularized bump functions , the proof is performed via resolvent techniques for large scales
55
+ and extended to the entire mesoscopic range using Dyson Brownian motion (DBM) dynamics. For
56
+ the more conventional compactly supported scaled test functions, the bulk CLT is established on all
57
+ mesoscopic scales N −1 ≪ η0 ≪ 1 using a combination of DBM and Green’s function comparison.
58
+ Wigner-type matrices were first introduced in [2]; they have centered entries Hjk independent up
59
+ to the symmetry constraint H = H∗. The matrix of variances S, defined by Sjk := E
60
+
61
+ |Hjk|2�
62
+ , is
63
+ assumed to be flat, i.e., Sjk ∼ N −1 and satisfy a piece-wise H¨older regularity condition (see (B)).
64
+ As the main step towards CLT in the present paper, we prove the optimal averaged and entry-wise
65
+ local laws (Corollary 3.3) for the two-point function T , defined by
66
+ Txy(z, ζ) :=
67
+
68
+ a̸=y
69
+ SxaGay(z)Gya(ζ),
70
+ x, y ∈ {1, . . ., N},
71
+ (1.1)
72
+ where G(z) is the resolvent of H. The corresponding result in the simpler setting of generalized Wigner
73
+ matrices was obtained in [21]. Using the optimal local law for T (z, ζ), we prove the bulk mesoscopic
74
+ CLT for Wigner-type matrices in the full range of scales N −1 ≪ η0 ≪ 1 for compactly supported C2
75
+ scaled test functions (Theorem 2.2). Our proof relies entirely on resolvent methods, circumventing the
76
+ DBM dynamics used in [17].
77
+ Understanding T (z, ζ) is the crucial ingredient for the CLT as it was realized in [17]. In fact, a
78
+ suboptimal entry-wise local law for Txy(z, ζ) was proved in Proposition 5.1 of [17]. If one relies solely
79
+ on resolvent methods, this local law provides sufficient control for mesoscopic CLT only on scales
80
+ η0 ≫ N −1/5. The main reason for this limitation is that the error term in [17] contains the norm of
81
+ the inverted stability operator (defined in (4.5)). In the present paper, we show that this factor can be
82
+ removed by separating the destabilizing eigendirection corresponding to the smallest eigenvalue of the
83
+ stability operator. Using this method, we prove a local law for a general class of quantities involving
84
+ two resolvents (Theorem 3.2) and deduce the optimal averaged and entry-wise local laws for T (z, ζ).
85
+ In particular, this allows us to obtain the CLT on all mesoscopic scales without relying on DBM.
86
+ The main difficulty lies in the fact that the deterministic approximation of the resolvent for Wigner-
87
+ type matrices is not a multiple of the identity matrix, contrary to the generalized Wigner case [21].
88
+ Consequently, the destabilizing direction is no longer parallel to the vector of ones, and generally, no
89
+ closed-form expression is known for the corresponding eigenprojector. It is important to note that for
90
+ the deformed Wigner matrices studied in [20], the deterministic approximation is also not a multiple
91
+ of the identity, but Sjk = N −1. Therefore, the two-point function can be expressed as the square of
92
+ the resolvent and can be studied using the local law, similarly to the standard Wigner case.
93
+ Instead of approximating the destabilizing direction to circumvent this difficulty, we use a contour
94
+ integral representation for the eigenprojector. It allows us to extend the decomposition approach of
95
+ [21] to the Wigner-type ensembles. This method benefits from yielding an integral representation for
96
+ the variance on all mesoscopic scales, under weaker regularity conditions on the test function than in
97
+ [17], and relying only on resolvent methods.
98
+ The paper is organized in the following way. Section 2 contains the precise definition of the model
99
+ and the statement of our main mesoscopic CLT result, Theorem 2.2. In Section 3, we present our main
100
+ technical result, the optimal local law for two-point functions in Theorem 3.2. In Section 4, we collect
101
+ notations and preliminary results to which we refer throughout the paper. In Section 5, we deduce
102
+ Theorem 2.2 from Propositions 5.1 and 5.2, and prove Proposition 5.1 using a local law for T (z, ζ)
103
+ (Corollary 3.3) as an input. The proofs of Theorem 3.2 and Corollary 3.3 are presented in Section 6.
104
+ In Section 7, we prove Proposition 5.2, which relates the variance of the linear eigenvalue statistics to
105
+ the ˙H1/2-norm.
106
+ Acknowledgments.
107
+ I would like to express my gratitude to L´aszl´o Erd˝os for suggesting the project and supervising my
108
+ work. I am also thankful to Yuanyuan Xu and Oleksii Kolupaiev for many helpful discussions.
109
+ 1Generalized Wigner matrices are characterized by a flat doubly-stochastic matrix of variances S. Unlike the Wigner
110
+ case, the entries Sjk are not assumed to be equal. The limiting eigenvalue distribution remains semicircular.
111
+ 2
112
+
113
+ 2
114
+ Model and Main Result
115
+ We begin with the definition of Wigner-type matrices originally introduced in Section 1.1 of [2].
116
+ Definition 2.1 (Wigner-type matrices). Let H = (Hjk)N
117
+ j,k=1 be an N × N matrix with independent
118
+ entries up to the Hermitian symmetry condition H = H∗ satisfying
119
+ E [Hjk] = 0.
120
+ (2.1)
121
+ We consider both real and complex Wigner-type matrices. In case the matrix H is complex we assume
122
+ additionally that Re Hjk and Im Hjk are independent and E[H2
123
+ jk] = 0 for k ̸= j.
124
+ Denote by S the matrix of variances Sjk := E[|Hjk|2], and assume it satisfies
125
+ cinf
126
+ N
127
+ ≤ Sjk ≤ Csup
128
+ N ,
129
+ (A)
130
+ for all j, k ∈ {1, . . ., N} and some strictly positive constants Csup, cinf.
131
+ We assume a uniform bound on all other moments of
132
+
133
+ NHjk, that is, for any p ∈ N there exists
134
+ a positive constant Cp such that
135
+ E
136
+
137
+ |
138
+
139
+ NHjk|p�
140
+ ≤ Cp
141
+ (2.2)
142
+ holds for all j, k ∈ {1, . . ., N}.
143
+ Additionally, we assume that S satisfies a H¨older regularity condition1, that is,
144
+ |Sjk − Sj′k′| ≤ L
145
+ N
146
+ �|j − j′| + |k − k′|
147
+ N
148
+ �1/2
149
+ ,
150
+ (B)
151
+ for all j, j′, k, k′ ∈ {1, . . ., N} and some positive constant L. The constants cinf, Csup, Cp and L are
152
+ independent of N.
153
+ 2.1
154
+ Central Limit Theorem for Mesoscopic Linear Eigenvalue Statistics
155
+ Theorem 2.2. (c.f. Theorem 2.5 in [17]) Let g be a C2
156
+ c (R) test function. Let ε0 be a small fixed
157
+ constant and let N −1+ε0 ≤ η0 ≤ N −ε0, and let E0 be a fixed reference energy in the bulk of the
158
+ spectrum, that is, ρ(E0) ≥ ε0 (here ρ is the density of states to be defined in (3.3) below ). Define the
159
+ scaled test function f to be
160
+ f(x) := g
161
+ �x − E0
162
+ η0
163
+
164
+ ,
165
+ (2.3)
166
+ then
167
+ Tr f(H) − E [Tr f(H)]
168
+ d−→ N
169
+
170
+ 0,
171
+ 1
172
+ 2βπ2 ∥g∥2
173
+ ˙H1/2
174
+ ��
175
+ ,
176
+ (2.4)
177
+ where β = 1 and β = 2 corresponds to real symmetric and complex Hermitian H, respectively.
178
+ Remark 2.3. We remark that the universal limiting variance in (2.4) coincides with the corre-
179
+ sponding formulas for standard Wigner matrices [13], where Sjk = N −1, mj(z) = msc(z) for all
180
+ j, k ∈ {1, . . . , N}, and msc(z) is the Stieltjes transform of the semicircle law.
181
+ 1As stated in [2], assumption (B) can be weakened to piece-wise 1/2-H¨older regularity condition for some positive
182
+ constant L on finitely many intervals, in the sense that
183
+ max
184
+ a,b
185
+ max
186
+ j,j′∈(NIb)
187
+ max
188
+ k,k′∈(NIa) N3/2
189
+ |Sjk − Sj′k′|
190
+ |j − j′|1/2 + |k − k′|1/2 ≤ L,
191
+ where {Ia}n
192
+ a=1 is a fixed finite partition of [0, 1] into smaller intervals, and (NIa) denotes the set of positive integers j
193
+ such that j/N lies in Ia.
194
+ 3
195
+
196
+ 3
197
+ Local Laws for the Two-point Functions
198
+ In this section, we introduce our main technical result, local laws for quantities that involve two
199
+ resolvents of a Wigner-type matrix. Our prime motivation is to study the function T (z, ζ) defined in
200
+ (1.1), but our methods allow us to estimate a more general class of quantities, namely
201
+
202
+ a̸=y
203
+ waGαa(z)Gaβ(ζ),
204
+
205
+ b
206
+
207
+ a̸=b
208
+ WabGba(z)Gab(ζ),
209
+ (3.1)
210
+ for fixed indices α, β, y, and deterministic weights wa, Wab satisfying |wa|, |Wab| ≤ cN −1 for some
211
+ constant c > 0.
212
+ Here G(z) := (H − z)−1 denotes the resolvent of H.
213
+ Objects of this type were
214
+ first studied in [11] in the setting of random band matrices. We obtain the estimates in the sense of
215
+ stochastic domination.
216
+ Definition 3.1. (Definition 2.1 in [12]) Let X = X (N)(u) and Y = Y(N)(u) be two families of random
217
+ variables possibly depending on a parameter u ∈ U (N). We say that Y stochastically dominates X
218
+ uniformly in u if for any ε > 0 and D > 0 there exists N0(ε, D) such that for any N ≥ N0(ε, D),
219
+ sup
220
+ u∈U(N) P
221
+
222
+ X (N)(u) > N εY(N)(u)
223
+
224
+ < N −D.
225
+ We denote this relation by X ≺ Y or X = O≺(Y).
226
+ We consider spectral parameters z lying in the domain D, defined by
227
+ D := {z ∈ C : N −1+τ ≤ | Im z| ≤ τ −1, | Re z| ≤ τ −1},
228
+ (3.2)
229
+ for a fixed τ > 0. As in Theorem 2.2, our analysis is limited to the bulk of the spectrum, which we
230
+ define via the self-consistent density of states ρ(E) ≡ ρN(E). The density ρ(E) is recovered by the
231
+ Stieltjes inversion formula,
232
+ ρ(E) := π−1 lim
233
+ η→+0 Im m(E + iη),
234
+ (3.3)
235
+ where m(z) := N −1 �N
236
+ j=1 mj(z), and m(z) = (mj(z))N
237
+ j=1 is the unique (Theorem 4.1 in [2]) solution
238
+ to the vector Dyson equation
239
+ −1
240
+ m(z) = z + Sm(z),
241
+ Im m(z) Im z > 0.
242
+ (3.4)
243
+ Let I be the set on which ρ(E) is positive. Theorem 4.1 of [2] guarantees that I consists of a finite
244
+ union of open intervals (a(j), b(j)). Then for κ > 0, we define the bulk domain by
245
+ Dκ := {z ∈ D : Re z ∈ Iκ},
246
+ Iκ :=
247
+
248
+ j
249
+ [a(j) + κ, b(j) − κ].
250
+ (3.5)
251
+ In particular, for all z ∈ Dκ, ρ(z) ≥ C(κ) for some constant C(κ) > 0. Given E0 as in Theorem 2.2,
252
+ we choose κ so that E0 ∈ I2κ.
253
+ Theorem 3.2. There exists a positive constant ǫ = ǫκ which is independent of N, such that for all
254
+ z, ζ in Dκ with | Re ζ − Re z| ≤ ǫ, and deterministic vectors w ∈ CN satisfying ∥w∥∞ ≤ cN −1, the
255
+ following estimate holds,
256
+
257
+ a̸=y
258
+ waGαa(z)Gaβ(ζ) = δαβ
259
+
260
+ m(z)m(ζ)
261
+
262
+ 1 − Sm(z)m(ζ)
263
+ �−1w
264
+
265
+ α − δαβδαy[m(z)m(ζ)w]α
266
+ + O≺
267
+
268
+ (Ψ(z) + Ψ(ζ))(Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0} min{Θ(z), Θ(ζ)})
269
+
270
+ ,
271
+ (3.6)
272
+ where the vector m is identified with the diagonal operator diag (m).
273
+ Under the same conditions on z, ζ, for any deterministic N ×N matrix W satisfying |Wab| ≤ cN −1
274
+ for all a, b, the following estimate holds,
275
+
276
+ b
277
+
278
+ a̸=b
279
+ WabGba(z)Gab(ζ) = Tr
280
+
281
+ m(z)m(ζ)Sm(z)m(ζ)
282
+
283
+ 1 − Sm(z)m(ζ)
284
+ �−1W
285
+
286
+ + NO≺
287
+
288
+ (Ψ(z) + Ψ(ζ))Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0}Θ(z)Θ(ζ)
289
+
290
+ .
291
+ (3.7)
292
+ 4
293
+
294
+ Here Ψ(z) and Θ(z) denote control parameters defined as
295
+ Ψ(z) :=
296
+
297
+ | Im m(z)|
298
+ N|η|
299
+ +
300
+ 1
301
+ N|η|,
302
+ Θ(z) :=
303
+ 1
304
+ N|η|,
305
+ z = E + iη ∈ C\R.
306
+ (3.8)
307
+ Theorem 3.2 implies the following averaged and entry-wise local laws for T (z, ζ) from (1.1) .
308
+ Corollary 3.3. Let z, ζ satisfy the assumptions of Theorem 3.2.
309
+ The entries Txy(z, ζ) admit the
310
+ estimate
311
+ Txy(z, ζ) =
312
+
313
+ (Sm(z)m(ζ))2 �
314
+ 1 − Sm(z)m(ζ)
315
+ �−1�
316
+ xy
317
+ + O≺
318
+
319
+ (Ψ(z) + Ψ(ζ))
320
+
321
+ Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0} min{Θ(z), Θ(ζ)}
322
+ ��
323
+ .
324
+ (3.9)
325
+ Furthermore, for all deterministic N × N matrices A, the following equality holds
326
+ Tr[A T (z, ζ)] = Tr[A
327
+
328
+ 1 − Sm(z)m(ζ)
329
+ �−1�
330
+ Sm(z)m(ζ)
331
+ �2]
332
+ + N ∥A∥ℓ∞→ℓ∞ O≺
333
+
334
+ (Ψ(z) + Ψ(ζ))Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0}Θ(z)Θ(ζ)
335
+
336
+ .
337
+ (3.10)
338
+ Remark 3.4. The error estimates in the entry-wise local law (3.6), and hence in (3.9) are optimal.
339
+ Indeed, for Sjk := N −1, which corresponds to the standard Wigner matrices, and ζ = ¯z, a simple
340
+ calculation using the Ward identity shows that
341
+ Txy(z, ¯z) = N −1| Im z|−1 Im msc(z) − N −1|msc(z)|2 + O≺
342
+
343
+ Θ(z)Ψ(z)
344
+
345
+ .
346
+ (3.11)
347
+ The error estimate in (3.7) is not optimal; it can be improved to
348
+ O≺
349
+
350
+ N(Ψ(z) + Ψ(ζ))2�
351
+ Ψ(z)Ψ(ζ) + 1{Im z Im ζ<0}NΘ(z)Θ(ζ)
352
+ ��
353
+ (3.12)
354
+ However, (3.7) is sufficient for establishing the CLT, so for the sake of brevity, we do not present the
355
+ proof of (3.12) in full detail. We only indicate the necessary ingredients in Remark 6.8 below.
356
+ 4
357
+ Notations and Preliminaries
358
+ 4.1
359
+ Notations
360
+ For a vector x = (xj)N
361
+ j=1 ∈ CN we use the standard definitions of ℓ2 and ℓ∞ norms, namely,
362
+ ∥x∥2 =
363
+ � N
364
+
365
+ j=1
366
+ |xj|2
367
+ �1/2
368
+ ,
369
+ ∥x∥∞ = max
370
+ j
371
+ |xj|.
372
+ For a linear operator T : CN → CN, we denote its matrix norms induced by ℓ2 and ℓ∞ norms,
373
+ respectively, by
374
+ ∥T ∥ℓ2→ℓ2 =
375
+ sup
376
+ ∥x∥2=1
377
+ ∥T x∥2 ,
378
+ ∥T ∥ℓ∞→ℓ∞ =
379
+ sup
380
+ ∥x∥∞=1
381
+ ∥T x∥∞ .
382
+ For two vectors x, y ∈ CN we use angle brackets to denote the ℓ2 scalar product, while for a single
383
+ vector x ∈ CN angle brackets denote the average of its coordinates
384
+ ⟨x, y⟩ =
385
+ N
386
+
387
+ j=1
388
+ ¯xjyj,
389
+ ⟨x⟩ = 1
390
+ N
391
+ N
392
+
393
+ j=1
394
+ xj.
395
+ We use xy to denote a coordinate-wise product of vectors x and y,
396
+ (xy)j = xjyj,
397
+ j ∈ {1, . . . , N}.
398
+ Similarly, for a given vector x with non-zero entries, 1x denotes a coordinate-wise multiplicative inverse
399
+ � 1
400
+ x
401
+
402
+ j
403
+ = 1
404
+ xj
405
+ ,
406
+ j ∈ {1, . . ., N}.
407
+ 5
408
+
409
+ We use 1 to denote the vector of ones (1, . . . , 1)t in CN.
410
+ For a measurable function f : R → R we use the standard definition of the Lp norms for p ≥ 1,
411
+ and the following definition of the ˙H1/2 norm
412
+ ∥f∥ ˙H1/2 =
413
+
414
+
415
+ ��
416
+ R2
417
+ |f(x) − f(y)|2
418
+ |x − y|2
419
+ dxdy
420
+
421
+
422
+ 1/2
423
+ .
424
+ For two deterministic quantities X, Y ∈ R depending on N, we write X ≪ Y if there exists ε, N0 > 0
425
+ such that |X| ≤ N −ε|Y | for all N ≥ N0. Similarly, we write X ≲ Y if there exists a constant C, N0 > 0
426
+ such that |X| ≤ C|Y | for all N ≥ N0, and X ∼ Y if both X ≲ Y and Y ≲ X hold.
427
+ We use C and c to denote constants, the precise value of which is irrelevant and may change from
428
+ line to line.
429
+ 4.2
430
+ Local Law for the Resolvent
431
+ In this subsection, we summarize the facts on Wigner-type matrices that we use throughout our proofs.
432
+ Majority of these results were obtained in [1] (see also [3]), but we refer to their concise versions from
433
+ [2] adapted for the Wigner-type setting.
434
+ Lemma 4.1. (Theorem 4.1 in [2]) The solution m(z) of (3.4) satisfies the following properties:
435
+ (1) For every j ∈ {1, . . ., N} there exists a generating probability measure νj(dx) such that
436
+ mj(z) =
437
+
438
+ R
439
+ νj(dx)
440
+ x − z .
441
+ (4.1)
442
+ (2) If the matrix of variances S satisfies conditions (A) and (B), then for all z ∈ C\R, the solution
443
+ admits the following bounds
444
+ ∥m(z)∥∞ ≤
445
+ c
446
+ 1 + |z|,
447
+ ����
448
+ 1
449
+ m(z)
450
+ ����
451
+
452
+ ≤ C(1 + |z|).
453
+ (4.2)
454
+ We now state the optimal averaged and isotropic local laws for Wigner-type matrices.
455
+ Theorem 4.2. (Corollary 1.8 in [2]) Let w, x, y be deterministic vectors in CN satisfying ∥w∥∞ = 1
456
+ and ∥x∥2 = ∥y∥2 = 1. Then the following estimates hold uniformly in z ∈ D:
457
+ N −1��Tr
458
+
459
+ w(G(z) − m(z))
460
+ ��� ≺ Θ(z),
461
+ ��⟨x, (G(z) − m(z))y⟩
462
+ �� ≺ Ψ(z),
463
+ (4.3)
464
+ where vectors m and w are associated with corresponding diagonal matrices.
465
+ In particular, it follows from the isotropic local law (4.3) that for any j, k ∈ {1, . . ., N},
466
+ |Gjk(z) − δjkmj(z)| ≺ Ψ(z).
467
+ (4.4)
468
+ 4.3
469
+ Preliminary Bounds on the Stability Operator
470
+ A significant part of our proof revolves around the stability operator, originally introduced in [1], that
471
+ emerges when studying the two-point function T (z, ζ) defined in (1.1). In this subsection, we collect
472
+ the known bounds on the stability and related operators.
473
+ The stability operator (1 − Sm(z)m(ζ)) is defined by the matrix with entries
474
+ (1 − Sm(z)m(ζ))jk := δjk − Sjkmk(z)mk(ζ),
475
+ j, k ∈ {1, . . ., N},
476
+ z, ζ ∈ C\R.
477
+ (4.5)
478
+ Throughout this paper we use m (and various functions of m, such as Im m, |m|, m−1, m′) to
479
+ denote both a vector (mj)N
480
+ j=1 and the corresponding multiplication operator, i.e., diag
481
+
482
+ (mj)N
483
+ j=1
484
+
485
+ . Note
486
+ that this notation agrees with the point-wise multiplication of two vectors if the first multiplicand is
487
+ interpreted as an operator. We stress which interpretation is used whenever ambiguity may arise.
488
+ 6
489
+
490
+ The analysis of the stability operator relies on the corresponding saturated self-energy operator F,
491
+ studied in [17], that depends on two spectral parameters z, ζ, and is defined as
492
+ Fjk(z, ζ) := |mj(z)mj(ζ)|1/2Sjk|mk(z)mk(ζ)|1/2,
493
+ j, k ∈ {1, . . ., N},
494
+ z, ζ ∈ C\R.
495
+ (4.6)
496
+ The following statements encompass the main properties of F and preliminary bounds on the stability
497
+ operator.
498
+ Proposition 4.3. (Proposition 4.3 in [17], c.f. Proposition 7.2.9 and Lemma 7.4.4 in [9]) For any
499
+ z, ζ ∈ C, the principal eigenvalue of F defined in (4.6) is positive and simple, the corresponding ℓ2-
500
+ normalized eigenvector v(z, ζ) has strictly positive entries. The norm of F admits the following upper
501
+ bound
502
+ ∥F(z, ζ)∥ℓ2→ℓ2 ��� 1 − 1
503
+ 2
504
+
505
+ | Im z| ⟨v(z, z), |m(z)|⟩
506
+ ⟨v(z, z), | Im m(z)|
507
+ |m(z)| ⟩
508
+ + | Im ζ| ⟨v(ζ, ζ), |m(ζ)|⟩
509
+ ⟨v(ζ, ζ), | Im m(ζ)|
510
+ |m(ζ)| ⟩
511
+
512
+ .
513
+ (4.7)
514
+ If |z|, |ζ| ≲ 1, then the entries of v(z, ζ) are comparable in size, that is
515
+ cκ ≤
516
+
517
+ Nvj(z, ζ) ≤ Cκ,
518
+ j ∈ {1, . . ., N},
519
+ (4.8)
520
+ and moreover, let Gap (F) denote the difference between the two largest eigenvalues of |F| =
521
+
522
+ FF ∗,
523
+ then Gap (F) admits the bound
524
+ Gap (F) ≥ �δ,
525
+ (4.9)
526
+ where �δ is a constant that depends only on the constants in conditions (A), (B) and κ.
527
+ Furthermore, for a fixed κ > 0 and z, ζ ∈ Dκ there exists a positive constant �cκ such that
528
+ ∥F(z, ζ)∥ℓ2→ℓ2 ≤ 1 − �cκ (| Im z| + | Im ζ|) ,
529
+ (4.10)
530
+ Proposition 4.4. (Proposition 4.6 and Lemma 4.7 in [17]) Let z, ζ ∈ C, such that |z|, |ζ| ≲ 1 and
531
+ Re z, Re ζ ∈ Iκ, then
532
+ ��(1 − Sm(z)m(ζ))−1��
533
+ ℓ2→ℓ2 +
534
+ ��(1 − Sm(z)m(ζ))−1��
535
+ ℓ∞→ℓ∞ ≲
536
+ 1
537
+ | Im z| + | Im ζ|.
538
+ (4.11)
539
+ If additionally Im z Im ζ > 0, the estimate is improved to
540
+ ��(1 − Sm �m)−1��
541
+ ℓ∞→ℓ∞ ≤ Cκ,
542
+ (4.12)
543
+ where Cκ > 0 is a positive constants dependent on κ.
544
+ Finally, we state the bounds on the stability operator in the special case of ζ = z, which is related
545
+ to the derivative of m via the (vector) identity m′(z) = (1 − m2(z)S)−1m2(z), obtained by taking the
546
+ derivative of (3.4).
547
+ Lemma 4.5. (Lemma 5.9 in [1], Lemma 7.3.2 in [9]) Let C > 0 be a positive constant, then for
548
+ z ∈ C\R with |z| ≤ C we have
549
+ ��(1 − m2(z)S)−1��
550
+ ℓ2→ℓ2 +
551
+ ��(1 − m2(z)S)−1��
552
+ ℓ∞→ℓ∞ ≲ |ρ(z)|−2,
553
+ (4.13)
554
+ where ρ(z) = π−1⟨Im m(z)⟩ is the harmonic extension of ρ(E) defined in (3.3).
555
+ Therefore for all z ∈ C\R with Re z ∈ Iκ we have
556
+ ∥m′(z)∥∞ ≲ 1.
557
+ (4.14)
558
+ 4.4
559
+ Cumulant Expansion Formula
560
+ Lemma 4.6. (Section II in [7], Lemma 3.1 in [13]) Let h be a real-valued random variable with finite
561
+ moments, let f be a C∞(R) function. Then for any ℓ ∈ N the following expansion holds,
562
+ E [h · f(h)] =
563
+
564
+
565
+ j=0
566
+ 1
567
+ j!c(j+1)(h) E
568
+ � dj
569
+ dhj f(h)
570
+
571
+ + Rℓ+1,
572
+ (4.15)
573
+ 7
574
+
575
+ where c(j) is the j-th cumulant of h defined by
576
+ c(j)(h) = (−i)j dj
577
+ dtj
578
+
579
+ log E
580
+
581
+ eith������
582
+ t=0
583
+ ,
584
+ and the remainder term Rℓ+1 satisfies
585
+ |Rℓ+1| ≤ Cl E
586
+
587
+ |h|ℓ+2�
588
+ sup
589
+ |x|≤M
590
+ |f (ℓ+1)(x)| + Cl E
591
+
592
+ |h|ℓ+2 · 1|h|>M
593
+ � ���f (ℓ+1)(x)
594
+ ���
595
+ ∞ ,
596
+ (4.16)
597
+ for any M > 0.
598
+ We apply formula (4.15) with h equal to the matrix element Hjk. Correspondingly, in the real
599
+ case (β = 1), C(p) denotes the matrix of p-th cumulants of H, C(p)
600
+ jk := C(p)(Hjk). In the complex case
601
+ (β = 2), C(p) is used as a notational shortcut and denotes the sum of matrices of p-th cumulants of
602
+ real and imaginary parts of H, that is C(p)
603
+ jk := C(p)(Re Hjk) + C(p)(Im Hjk).
604
+ 5
605
+ Proof of the Main Result
606
+ Proof of Theorem 2.2. We divide the proof into two parts contained in the following propositions. We
607
+ indicate their analogs in the settings of [21] and [17] in parenthesis.
608
+ Proposition 5.1. (c.f. Theorem 2.2 in [21] and (5.76) in [17]) Let η0, ε0 > 0 and E0 satisfy the
609
+ assumptions of Theorem 2.2, let f be a scaled test function defined in (2.3), and let φ(λ) be the
610
+ characteristic function of Tr f(H) − E [Tr f(H)],
611
+ φ(λ) := E [exp{iλ (Tr f(H) − E [Tr f(H)])}] ,
612
+ λ ∈ R.
613
+ (5.1)
614
+ Then its derivative φ′(λ) satisfies the following equation,
615
+ φ′(λ) = −λφ(λ)V (f) + O≺
616
+
617
+ N −1/2η−1/2
618
+ 0
619
+ (1 + |λ|4) + (1 + |λ|)N −ε0/2�
620
+ ,
621
+ λ ∈ R,
622
+ (5.2)
623
+ provided c ≤ V (f) ≤ C for some positive N-independent constants c and C.
624
+ Here the variance V (f) for a scaled test function f is defined by
625
+ V (f) := 1
626
+ π2
627
+
628
+ Ω0
629
+
630
+ Ω′
631
+ 0
632
+ ∂ �f(ζ)
633
+ ∂¯ζ
634
+ ∂ �f(z)
635
+ ∂¯z
636
+ K(z, ζ)d¯ζdζd¯zdz,
637
+ (5.3)
638
+ where for z, ζ ∈ C/R the kernel K(z, ζ) is defined by
639
+ K(z, ζ) := 2
640
+ β
641
+
642
+ ∂ζ Tr
643
+ �m′(z)
644
+ m(z)
645
+
646
+ 1 − Sm(z)m(ζ)
647
+ �−1
648
+
649
+ +
650
+
651
+ 1 − 2
652
+ β
653
+
654
+ Tr [Sm′(z)m′(ζ)] + 1
655
+ 2
656
+ ∂2
657
+ ∂z∂ζ
658
+
659
+ m(z)m(ζ), C(4)m(z)m(ζ)
660
+
661
+ ,
662
+ (5.4)
663
+ with C(4) denoting the matrix of fourth cumulants C(4)
664
+ jk . The integration domains Ω0, Ω′
665
+ 0 in (5.3) are
666
+ defined as
667
+ Ω0 := {z ∈ C : | Im z| > N −ε0/2η0},
668
+ Ω′
669
+ 0 := {z ∈ C : | Im z| > 2N −ε0/2η0},
670
+ (5.5)
671
+ and �f is the quasi-analytic extension of f, defined by
672
+ �f(x + iη) = χ(η) (f(x) + iηf ′(x)) ,
673
+ (5.6)
674
+ where χ : R → [0, 1] is an even C∞
675
+ c (R) function supported on [−1, 1], satisfying χ(η) = 1 for |η| < 1/2.
676
+ Proposition 5.2. (c.f. Lemma 6.7 in [17]) Let E0, η0 satisfy the conditions of Theorem 2.2. Let f be
677
+ the scaled test function with g ∈ C2
678
+ c (R) given in (2.3), and let V (f) be the variance defined in (5.3),
679
+ then
680
+ V (f) =
681
+ 1
682
+ 2βπ2 ∥g∥2
683
+ ˙H1/2 + O
684
+
685
+ η0 log N + N −ε0�
686
+ .
687
+ (5.7)
688
+ 8
689
+
690
+ Proposition 5.2 implies that V (f) satisfies the condition of Proposition 5.1, hence
691
+ φ′(λ) = −λφ(λ)V (f) + o (1) ,
692
+ (5.8)
693
+ as N → ∞, for any fixed λ ∈ R. It then follows by L´evy’s continuity theorem that Tr f(H)−E [Tr f(H)]
694
+ converges in distribution to a centered Gaussian with variance (2βπ2)−1 ∥g∥2
695
+ ˙H1/2. Therefore, to estab-
696
+ lish Theorem 2.2, it suffices to show that Propositions 5.1 and 5.2 hold, which is done in Sections 5.1
697
+ and 7, respectively.
698
+ Remark 5.3. We restrict the proof to the real symmetric (β = 1) matrices for the sake of presentation.
699
+ The complex Hermitian (β = 2) case differs solely in replacing the cumulant expansion formula (Lemma
700
+ 4.6) with its complex analog. The obvious modifications are left to the reader.
701
+ 5.1
702
+ Characteristic Function of Linear Eigenvalue Statistics
703
+ Proof of Proposition 5.1. Using standard techniques of the characteristic function method imported
704
+ from, e.g., Section 5.2 of [17] (see also Section 4.2 of [19] and references therein), we can obtain the
705
+ following series of estimates on the characteristic function of the linear eigenvalue statistics φ(λ) and
706
+ its derivative φ′(λ). The proof is a relatively straightforward modification of similar arguments in [17],
707
+ so we defer it to Appendix A.
708
+ Lemma 5.4. Let φ(λ) be the characteristic function defined in (5.1), then, under the conditions of
709
+ Theorem 2.2, the following estimates hold
710
+ φ(λ) = E [�e(λ)] + O≺
711
+
712
+ N −ε0/2�
713
+ ,
714
+ φ′(λ) = i
715
+ π
716
+
717
+ Ω0
718
+ ∂ �f
719
+ ∂¯z E [�e(λ) {1 − E} [Tr G(z)]] d¯zdz + O≺
720
+
721
+ |λ|N −ε0/2�
722
+ ,
723
+ (5.9)
724
+ where
725
+ �e(λ) := exp
726
+ �iλ
727
+ π
728
+
729
+ Ω′
730
+ 0
731
+ ∂ �f
732
+ ∂¯z {1 − E} [Tr G(z)] d¯zdz
733
+
734
+ .
735
+ (5.10)
736
+ Furthermore, for all z ∈ Dκ, we have
737
+ E [�e(λ) {1 − E} [Tr G(z)]] = E [�e(λ) {1 − E} T (z, z)] + 2iλ
738
+ π E
739
+
740
+ �e(λ)
741
+
742
+ Ω′
743
+ 0
744
+ ∂ �f
745
+ ∂¯ζ
746
+
747
+ ∂ζ T (z, ζ)d¯ζdζ
748
+
749
+ + iλ
750
+ π E [�e(λ)]
751
+
752
+ Ω′
753
+ 0
754
+ ∂ �f
755
+ ∂¯ζ Tr [Sm′(z)m′(ζ)] d¯ζdζ
756
+ + iλ
757
+ 2π E [�e(λ)]
758
+
759
+ Ω′
760
+ 0
761
+ ∂ �f
762
+ ∂¯ζ
763
+ ∂2
764
+ ∂z∂ζ
765
+
766
+ m(z)m(ζ), C(4)m(z)m(ζ)
767
+
768
+ d¯ζdζ
769
+ + O≺
770
+
771
+ (1 + |λ|4)(NΨ(z)Θ(z) + Ψ(z)η−1/2
772
+ 0
773
+ )
774
+
775
+ ,
776
+ (5.11)
777
+ where the random function T (z, ζ) is defined as
778
+ T (z, ζ) := Tr
779
+ �m′(z)
780
+ m(z) T (z, ζ)
781
+
782
+ .
783
+ (5.12)
784
+ We now proceed to estimate the first two terms on the right-hand side of (5.11) in such a way
785
+ that E [�e(λ)] factors out. By definition of the scaled test function (2.3), the support of �f is contained
786
+ inside a vertical strip centered at E0 of width ∼ η0, hence we limit the further analysis to the regime
787
+ | Re ζ − Re z| ≲ η0 ≪ ǫ, where ǫ is defined in the statement of Theorem 3.2. We estimate the function
788
+ T (z, ζ) using Corollary 3.3 with weight matrix A := m′(z)
789
+ m(z) . It follows from the bounds (4.2) and (4.14)
790
+ that ∥A∥ℓ∞→ℓ∞ ≲ 1, hence for all z, ζ ∈ Dκ with Re z, Re ζ ∈ supp(f),
791
+ T (z, ζ) = Tr
792
+ �m′(z)
793
+ m(z)
794
+
795
+ 1 − Sm(z)m(ζ)
796
+ �−1�
797
+ Sm(z)m(ζ)
798
+ �2
799
+
800
+ + E(z, ζ),
801
+ (5.13)
802
+ 9
803
+
804
+ where the error term E(z, ζ) is analytic in both variables and admits the bound
805
+ E(z, ζ) ≺ NΨ2(z)Ψ(ζ) + NΨ(z)Ψ2(ζ) + 1{Im z Im ζ<0}NΘ(z)Θ(ζ).
806
+ (5.14)
807
+ It follows from (5.13) and (5.14) for ζ = z that
808
+ E [�e(λ){1 − E} [T (z, z)]] ≺ NΨ(z)3,
809
+ (5.15)
810
+ yielding the desired bound on the first term on the right-hand side of (5.11).
811
+ We now estimate the second term in (5.11). Fix z ∈ Dκ, and consider ζ that lie in Ω′
812
+ 0 defined in
813
+ (5.5). Differentiating (5.13) with respect to ζ yields
814
+
815
+ ∂ζ T (z, ζ) = ∂
816
+ ∂ζ Tr
817
+ �m′(z)
818
+ m(z)
819
+
820
+ 1 − Sm(z)m(ζ)
821
+ �−1�
822
+ Sm(z)m(ζ)
823
+ �2
824
+
825
+ + ∂
826
+ ∂ζ E(z, ζ).
827
+ (5.16)
828
+ To bound the derivative of the error term E(z, ζ), we use the following technical lemma.
829
+ Lemma 5.5. (Lemma 5.5 in [17]) Let K(z) be a holomorphic function on C\R, then for all z ∈ C\R
830
+ and any p ∈ N,
831
+ ����
832
+ ∂pK
833
+ ∂zp (z)
834
+ ���� ≤ Cp| Im z|−p
835
+ sup
836
+ |ζ−z|≤| Im z|/2
837
+ |K(ζ)|,
838
+ (5.17)
839
+ where Cp > 0 is a constant depending only on p.
840
+ Lemma 5.5 applied to the estimate (5.14) implies that the error term ∂ζE(z, ζ) admits the bound
841
+
842
+ ∂ζ E(z, ζ) ≺ N| Im ζ|−1�
843
+ Ψ(z)2Ψ(ζ) + Ψ(z)Ψ(ζ)2 + Θ(z)Θ(ζ)
844
+
845
+ .
846
+ (5.18)
847
+ To proceed we require another technical lemma.
848
+ Lemma 5.6. (c.f. Lemma 4.4 in [19]) Let f be the scaled test function defined in (2.3). Let Ω be a
849
+ domain of the form
850
+ Ω := {z ∈ C : cN −τ ′η0 < | Im z| < 1, a < Re z < b},
851
+ (5.19)
852
+ such that supp(f) ⊂ (a, b) and τ ′, c are positive constants. Let K(z) be a holomorphic function on Ω
853
+ satisfying
854
+ |K(z)| ≤ C| Im z|−s,
855
+ z ∈ Ω,
856
+ (5.20)
857
+ for some 0 ≤ s ≤ 2. Then there exists a constant C′ > 0 depending only on g in (2.3), χ in (5.6), and
858
+ s, such that
859
+ ����
860
+
861
+
862
+ ∂ �f
863
+ ∂¯z (x + iy)K(x + iy)dxdy
864
+ ���� ≤ CC′η1−s
865
+ 0
866
+ log N.
867
+ (5.21)
868
+ Proof of Lemma 5.6. It follows from (2.3) that ∥f∥1 ∼ η0, ∥f ′∥1 ∼ 1, ∥f ′′∥1 ∼ η−1
869
+ 0 . In case 1 ≤ s ≤ 2
870
+ the inequality (5.21) follows from Lemma 4.4 in [19]. For 0 ≤ s < 1, the proof is conducted along the
871
+ same lines, except the integration by parts is performed twice in the regime η0 ≤ | Im z| ≤ 1.
872
+ Lemma 5.6 and the matrix identity (1−X)−1X2 = (1−X)−1−X −1 yield the following expression.
873
+ E
874
+
875
+ �e(λ)
876
+
877
+ Ω′
878
+ 0
879
+ ∂ �f
880
+ ∂¯ζ
881
+ ∂T
882
+ ∂ζ d¯ζdζ
883
+
884
+ = E [�e(λ)]
885
+
886
+ Ω′
887
+ 0
888
+ ∂ �f
889
+ ∂¯ζ
890
+
891
+ ∂ζ Tr
892
+ �m′(z)
893
+ m(z)
894
+
895
+ 1 − Sm(z)m(ζ)
896
+ �−1
897
+
898
+ d¯ζdζ
899
+ − E [�e(λ)]
900
+
901
+ Ω′
902
+ 0
903
+ ∂ �f
904
+ ∂¯ζ Tr
905
+
906
+ Sm′(z)m′(ζ)
907
+
908
+ d¯ζdζ
909
+ +O≺
910
+
911
+ N 1/2Ψ(z)2η−1/2
912
+ 0
913
+ + Ψ(z)η−1
914
+ 0
915
+ + Θ(z)η−1
916
+ 0
917
+
918
+ ,
919
+ (5.22)
920
+ Finally, from (5.11) and (5.22), combined with (5.9) we conclude that
921
+ φ′(λ) = −λV (f) E [�e(λ)] + �E(λ),
922
+ (5.23)
923
+ 10
924
+
925
+ where V (f) is defined in (5.3), and �E(λ) is the total error term collected from previous derivations
926
+ and integrated over d¯zdz. Lemma 5.6 together with error estimates in (5.9), (5.11), (5.15) and (5.18)
927
+ provides the following bound on the error term
928
+ �E = O≺
929
+
930
+ N −1/2η−1/2
931
+ 0
932
+ (1 + |λ|4) + |λ|N −ε0/2�
933
+ .
934
+ (5.24)
935
+ Under the conditions of Proposition 5.1 V (f) is bounded, hence we conclude from the first estimate
936
+ in (5.9) and (5.23) that (5.2) holds. This concludes the proof of Proposition 5.1.
937
+ 6
938
+ Proof of the Local Laws for Two-point Functions
939
+ In this section, we derive all the tools necessary to prove Theorem 3.2 and its specification for the two-
940
+ point function T (z, ζ), Corollary 3.3. To make the notation more concise we introduce the convention
941
+ G ≡ G(z), �G ≡ G(ζ), m ≡ m(z), �m ≡ m(ζ), �Ψ ≡ Ψ(ζ), Ψ ≡ Ψ(z), Θ ≡ Θ(z), �Θ ≡ Θ(ζ).
942
+ For a deterministic matrix W with entries |Wab| ≲ N −1, the quantity �
943
+ a̸=y WaxGαa �Gaβ can be
944
+ readily estimated in two special cases. First, if each column of W is proportional to the vector of ones,
945
+ i.e., Wab = wb depends only on b, then the summation over a yields wx([G �G]αβ − Gαy �Gyβ), and the
946
+ estimate follows from the resolvent identity and the local laws in Theorem 4.2. Second, if the entries
947
+ of X := (1 − Sm �m)−1W are bounded by CN −1, then one can obtain the estimate from Lemma 6.1
948
+ below. We show that these two special cases are exhaustive in the sense that any W can be represented
949
+ as their linear combination with controlled coefficients.
950
+ To this end, we prove that in the relevant regime, the operator (1 − Sm �m) has a very small
951
+ destabilizing eigenvalue and an order one spectral gap above it. Moreover, if Π is the eigenprojector
952
+ corresponding to the principal eigenvalue of (1 − Sm �m), then the ℓ∞ → ℓ∞-norm of the restriction
953
+ of (1 − Sm �m)−1 to the kernel of Π is also an order one quantity. Finally, we show that the vector of
954
+ ones 1 is sufficiently separated from the kernel of Π.
955
+ 6.1
956
+ Stable Direction Local Law
957
+ For any N × N deterministic matrix W, and any indices x, y, α, β, we define the quantities
958
+ Fxy
959
+ αβ(W) :=
960
+
961
+ a̸=y
962
+ WaxGαa �Gaβ,
963
+ f xy
964
+ α (W) := mα �mα([(1 − Sm �m)−1W]αx − δαyWαx).
965
+ (6.1)
966
+ We prove the following estimate.
967
+ Lemma 6.1. For any z, ζ ∈ Dκ and any deterministic N × N matrix X,
968
+ Fxy
969
+ αβ((1 − Sm �m)X) = δαβf xy
970
+ α ((1 − Sm �m)X) + O≺
971
+
972
+ N ∥X∥max Ψ�Ψ(Ψ + �Ψ)
973
+
974
+ .
975
+ (6.2)
976
+ provided ∥X∥max := max
977
+ j,k |Xjk| ≲ 1.
978
+ We use the following self-improving mechanism for stochastic domination bounds, borrowed, e.g.,
979
+ from [14].
980
+ Lemma 6.2. (Lemma 6.3 in [14]) Let X be a random variable such that 0 ≤ X ≺ N C for some C > 0,
981
+ and let Ξ ≥ 0 be a deterministic quantity. Suppose there exists a constant q ∈ [0, 1), such that for any
982
+ Φ satisfying Ξ ≤ Φ ≤ N C, and any d ∈ N, we have the implication
983
+ X ≺ Φ
984
+ =⇒
985
+ E
986
+
987
+ |X|2d�
988
+
989
+ 2d
990
+
991
+ k=1
992
+
993
+ ΦqΞ1−q)k E
994
+
995
+ |X|2d−k�
996
+ ,
997
+ (6.3)
998
+ then X ≺ Ξ.
999
+ Proof of Lemma 6.1. Let Y := (1 − Sm �m)X, then the quantity we need to estimate is [GY ]yx =
1000
+ Fxy
1001
+ yy (Y ). It follows from the local law in the form (4.4) that
1002
+ Fxy
1003
+ αβ(Y ) ≺ N ∥X∥max Ψ�Ψ =: Λ.
1004
+ (6.4)
1005
+ 11
1006
+
1007
+ Let Φ be a deterministic control parameter admitting the bounds (Ψ + �Ψ)Λ ≤ Φ ≤ Λ, such that
1008
+ Fxy
1009
+ αβ(Y ) − δαβf xy
1010
+ α (Y ) ≺ Φ.
1011
+ (6.5)
1012
+ It follows trivially from (6.4) and (6.5) that
1013
+ Fxy
1014
+ αβ(Y ) ≺ Φ + δαβΛ.
1015
+ (6.6)
1016
+ Let ∂jk denote the partial derivative with respect to the matrix element Hjk, then the partial derivatives
1017
+ of Fxy
1018
+ αβ are given by
1019
+ ∂abFxy
1020
+ αβ(Y ) = −(1 + δab)−1(GαaFxy
1021
+ bβ (Y ) + GαbFxy
1022
+ aβ(Y ) + Fxy
1023
+ αb (Y ) �Gaβ + Fxy
1024
+ αa(Y ) �Gbβ).
1025
+ (6.7)
1026
+ We combine the vector Dyson equation (3.4) and the resolvent identity zG = HG − 1 to obtain
1027
+ �Gaβ = − �ma
1028
+
1029
+ b
1030
+
1031
+ Hab �Gbβ + Sab �mb �Gaβ
1032
+
1033
+ + �maδaβ.
1034
+ (6.8)
1035
+ Let d ∈ N, define P ≡ P(d − 1, d) := (Fxy
1036
+ αβ(Y ) − δαβf xy
1037
+ α (Y ))d−1(Fxy
1038
+ αβ(Y ) − δαβf xy
1039
+ α (Y ))d. For any
1040
+ p ∈ N, define Mp := E
1041
+
1042
+ |Fxy
1043
+ αβ(Y ) − δαβf xy
1044
+ α (Y )|p�
1045
+ . Plugging (6.8) into the definition (6.1) and applying
1046
+ the cumulant expansion formula of Lemma 4.6, we obtain
1047
+ E
1048
+
1049
+ Fxy
1050
+ αβ(X)P
1051
+
1052
+ =
1053
+
1054
+ a̸=y
1055
+ ma �maXax E
1056
+
1057
+ Fay
1058
+ αβ(S)P
1059
+
1060
+ + δαβf xy
1061
+ α (Y ) E[P] + δαβδβySyym2
1062
+ y �m2
1063
+ yXyx E[P]
1064
+ (6.9a)
1065
+ + E
1066
+ ��
1067
+ a̸=y
1068
+
1069
+ b
1070
+ �maXaxSab
1071
+
1072
+ Gαa( �Gbb − �mb) �Gaβ + Gαb(Gaa − ma) �Gbβ
1073
+ �P
1074
+
1075
+ (6.9b)
1076
+ + E
1077
+ ��
1078
+ a̸=y
1079
+
1080
+ b̸=a
1081
+ �maXaxSabGαa
1082
+
1083
+ Gba + �Gba
1084
+ � �GbβP
1085
+
1086
+ + R2
1087
+ (6.9c)
1088
+ +
1089
+
1090
+ a̸=y
1091
+ Xaxma �maSay E
1092
+ ��
1093
+ Gαy �Gyβ − δαyδyβmy �my
1094
+ �P
1095
+
1096
+ (6.9d)
1097
+ + δβ̸=y �mβXβx E
1098
+
1099
+ (Gαβ − δαβmβ)P
1100
+
1101
+ − E
1102
+ ��
1103
+ a̸=y
1104
+ �maXaxGαa
1105
+
1106
+ b
1107
+ Sab �Gbβ∂abP
1108
+
1109
+ ,
1110
+ (6.9e)
1111
+ where R2 is the total error coming from the higher order cumulants, and all unrestricted summations
1112
+ are from 1 to N. We successively bound the terms (6.9b)-(6.9e) appearing on the right-hand side of
1113
+ (6.9). By condition (A), local law (4.4), upper bound (4.2), and (6.5), it follows that the terms (6.9b)
1114
+ and the first term in (6.9c) are bounded by O≺((Ψ + �Ψ)ΛM2d−1). Similarly, the term (6.9d) and the
1115
+ first term in (6.9e) are bounded by O≺(∥X∥max (Ψ + �Ψ)M2d−1).
1116
+ We bound the second term in (6.9e). It follows by (A), (4.4), bounds (4.2), (6.6), and (6.7) that
1117
+
1118
+ b
1119
+ Sab �Gbβ∂abP ≺ (Ψ + �Ψ + δαa + δaβ)�ΨΦM2d−2.
1120
+ (6.10)
1121
+ Hence, the second term in (6.9e) is bounded by O≺
1122
+
1123
+ (Ψ + �Ψ)ΛΦM2d−2
1124
+
1125
+ . Finally, it is easy to check
1126
+ using estimates (4.16), (6.6) and identity (6.7), together with condition (A) and (4.2), that the error
1127
+ term R2 ≺ (Ψ + �Ψ)ΛM2d−1 + (Ψ + �Ψ)ΛΦM2d−2 + (Ψ + �Ψ)ΛΦ2M2d−3.
1128
+ Observe that the first term on the right-hand side of (6.9a) can be expressed as
1129
+
1130
+ a̸=y
1131
+ ma �maXax E
1132
+
1133
+ Fay
1134
+ αβ(S)P
1135
+
1136
+ = E
1137
+
1138
+ Fay
1139
+ αβ(X)P
1140
+
1141
+ − E
1142
+
1143
+ Fay
1144
+ αβ(Y )P
1145
+
1146
+ − my �myXyx E
1147
+
1148
+ Fyy
1149
+ αβ(S)P
1150
+
1151
+ ,
1152
+ (6.11)
1153
+ where the last term is bounded by O≺(N −1ΛM2d−1). Combining (6.9) and (6.11) yields
1154
+ E
1155
+
1156
+ |Fxy
1157
+ αβ(Y ) − δαβf xy
1158
+ α (Y )|2d�
1159
+
1160
+
1161
+ Ψ + �Ψ
1162
+
1163
+ ΛΦ2M2d−3,
1164
+ (6.12)
1165
+ for any control parameter Φαβ,y satisfying (6.5). Hence, by Lemma 6.2,
1166
+ Fxy
1167
+ αβ(Y ) = δαβf xy
1168
+ α (Y ) + O≺
1169
+
1170
+ Λ(Ψ + �Ψ)
1171
+
1172
+ ,
1173
+ (6.13)
1174
+ which concludes the proof of Lemma 6.1.
1175
+ 12
1176
+
1177
+ Remark 6.3. If z and ζ are in the same (upper or lower) half-plane, Lemma 6.1 implies Theorem 3.2.
1178
+ Indeed, the bound (4.12) in Proposition 4.4 shows that provided η�η > 0, X := (1−Sm �m)−1W satisfies
1179
+ |Xjk| ≲ N −1. Applying Lemma 6.1 to X = (1 − Sm �m)−1W then yields (3.6), and (3.7) follows by
1180
+ summing (3.6). We turn to the case of z and ζ lying in different (upper and lower) half-planes.
1181
+ 6.2
1182
+ Stability Operator Analysis
1183
+ In this subsection we obtain all the properties of the stability operator (1 − Sm(z)m(ζ)) that we use
1184
+ in combination with Lemma 6.1 to finish the proof of Theorem 3.2 for z, ζ lying in opposite half-planes,
1185
+ as outlined in the beginning of Section 6.
1186
+ For two spectral parameters z, ζ, let η := Im z, and �η := Im ζ. Without loss of generality, we assume
1187
+ in the following that Re z ∈ Iκ, η > 0 and Re ζ ∈ Iκ, �η < 0. For the remainder of this subsection, we
1188
+ use the following notation
1189
+ F ≡ F(z) := |m(z)|S|m(z)|,
1190
+ B ≡ B(z, ζ) := 1 − Sm(z)m(ζ),
1191
+ B0 ≡ B0(z) := 1 − S|m(z)|2 = |m(z)|−1(1 − F)|m(z)|.
1192
+ (6.14)
1193
+ We view the operator B as a perturbation of B0 = B(z, ¯z), since |ζ − ¯z| is small. We deduce the
1194
+ desired properties of B from those of B0, which, in turn, follow from the lower bound on the spectral
1195
+ gap of F found in (4.9).
1196
+ Let {ψj}N
1197
+ j=1 denote the eigenvalues of F (with multiplicity) in descending order. Then, by Per-
1198
+ ron–Frobenius theorem, the principal eigenvalue ψ1 is real, and it coincides with the spectral radius
1199
+ ∥F∥ℓ2→ℓ2. Furthermore, by taking the imaginary part of the vector Dyson equation (3.4) and multi-
1200
+ plying both sides by |m| coordinate-wise, we obtain
1201
+
1202
+ 1 − F
1203
+ �Im m
1204
+ |m| = η|m|.
1205
+ (6.15)
1206
+ Furthermore, by condition (A), for every j we have (S Im m)j ∼ ⟨Im m(z)⟩ ∼ ρ(z), where ρ(z) is
1207
+ the harmonic extension of the self-consistent density of states ρ(x) defined in (3.3) into C. Hence by
1208
+ taking the imaginary part of (3.4), we get
1209
+ Im mj
1210
+ |mj|
1211
+ ∼ |mj|(ρ(z) + η), ,
1212
+ j ∈ {1, . . . , N}.
1213
+ (6.16)
1214
+ Therefore, by (6.15) and (6.16), 1 − ψ1 ≲ η. Together with an upper bound (4.10) on ∥F∥ℓ2→ℓ2, this
1215
+ implies that 1 − ψ1 ∼ η. It follows from (4.9) that the principal eigenvalue of F is separated from the
1216
+ rest of the spectrum by an annulus, i.e., there exist r > 0 and δ > 0 independent of z and N such that
1217
+ |1 − ψ1| < r − δ,
1218
+ and
1219
+ |1 − ψj| > r + δ,
1220
+ j ∈ {2, . . . , N}.
1221
+ (6.17)
1222
+ In the remainder of this subsection, we show that for all ζ sufficiently close to ¯z, the eigenvalue of
1223
+ B with the smallest modulus is also separated from the rest of the spectrum by an annulus of order
1224
+ one width.
1225
+ Using the argument principle and Jacobi’s formula, one can express the number of eigenvalues
1226
+ (with multiplicity) of a matrix X inside a domain Ω by a contour integral
1227
+ NX(Ω) =
1228
+ 1
1229
+ 2πi
1230
+
1231
+ ∂Ω
1232
+ Tr(w − X)−1dw.
1233
+ (6.18)
1234
+ To show the eigenvalue separation for B, we begin by estimating the norm of the resolvent of B inside
1235
+ the annulus
1236
+ Ar,δ := {w ∈ C : r − 3δ/4 ≤ |w| ≤ r + 3δ/4},
1237
+ (6.19)
1238
+ with r and δ as in (6.17).
1239
+ 13
1240
+
1241
+ Claim 6.4. There exists ε1 > 0 and �C > 0 independent of N and z such that
1242
+ ���(w − B(z, ζ))−1��� ≤ �C
1243
+ (6.20)
1244
+ holds for all w ∈ Ar,δ and all ζ such that Re ζ ∈ Iκ, Im ζ < 0 and |ζ − ¯z| ≤ ε1. (The norm ∥·∥ is
1245
+ induced by either ℓ2 or ℓ∞.)
1246
+ Proof. Observe that
1247
+ ��(w − B)−1�� ≤
1248
+ ���
1249
+
1250
+ 1 − (w − B0)−1(B − B0)
1251
+ �−1���
1252
+ ��(w − B0)−1��.
1253
+ Since (w − B0)−1 = −|m|−1(1 − w − F)−1|m| and |m| ∼ 1, (6.17) implies that
1254
+ ��(w − B0)−1�� ≤
1255
+ C
1256
+ min
1257
+ j
1258
+ |ψj − w| ≤ 4C
1259
+ δ ,
1260
+ w ∈ Ar,δ.
1261
+ (6.21)
1262
+ From the uniform bounds (4.2), (4.14) on |m| and |m′| we have ∥B − B0∥ ≲ |ζ − ¯z|, which implies
1263
+ that there exists ε1 > 0 such that
1264
+ ∀ζ : |ζ − ¯z| ≤ ε1, ∥B − B0∥ ≤
1265
+ δ
1266
+ 8C ,
1267
+ (6.22)
1268
+ where C is the constant in (6.21).
1269
+ It follows immediately that
1270
+ ���
1271
+
1272
+ 1 − (w − B0)−1(B − B0)
1273
+ �−1��� ≤ 2 and hence
1274
+ ��(w − B)−1�� ≤ 8C
1275
+ δ .
1276
+ (6.23)
1277
+ Claim 6.4 implies that for any sufficiently large fixed N the integrand in (6.18) with X := B is
1278
+ uniformly bounded in Ω := Ar,δ for all ζ such that |ζ − ¯z| ≤ ε1, hence by analyticity
1279
+ NB(z,ζ)(Ar,δ) = 0,
1280
+ |ζ − ¯z| ≤ ε1.
1281
+ (6.24)
1282
+ Since the eigenvalues of B(z, ζ) are continuous in ζ, (6.24) implies that no eigenvalue can move between
1283
+ the two connected components of C\Ar,δ, which together with (6.17) yields the following claim.
1284
+ Claim 6.5. For any sufficiently large N, the equalities
1285
+ NB({|w| < r − 3δ/4}) = NB0({|w| < r − 3δ/4}) = 1,
1286
+ NB({|w| > r + 3δ/4}) = NB0({|w| > r + 3δ/4}) = N − 1,
1287
+ (6.25)
1288
+ hold for any ζ such that Re ζ ∈ Iκ, Im ζ < 0 and |ζ − ¯z| ≤ ε1.
1289
+ Claim 6.5 now allows us to define the principal eigenprojector Π of B as a contour integral
1290
+ Π ≡ Π(z, ζ) :=
1291
+ 1
1292
+ 2πi
1293
+
1294
+ |ξ|=r
1295
+ (ξ − B(z, ζ))−1dξ.
1296
+ (6.26)
1297
+ Claim 6.5 asserts that the contour {|ξ| = r} encircles exactly one eigenvalue of B with multiplicity,
1298
+ hence Π is a rank one eigenprojector.
1299
+ We now prove that the restriction of B−1 to the range of (1 − Π) is bounded by a constant.
1300
+ Claim 6.6. For all z, ζ such that Re z, Re ζ ∈ Iκ, Im z Im ζ < 0 and |ζ − ¯z| ≤ ε1,
1301
+ ��B−1(1 − Π)
1302
+ ��
1303
+ ℓ∞→ℓ∞ ≤ �c,
1304
+ (6.27)
1305
+ where �c depends only on the constants in conditions (A), (B) and κ.
1306
+ Proof. By expression (6.26) for Π we have
1307
+ B−1(1 − Π) = − 1
1308
+ 2πi
1309
+
1310
+ |ξ|=r
1311
+ 1
1312
+ ξ (ξ − B)−1dξ
1313
+ (6.28)
1314
+ 14
1315
+
1316
+ Hence the norm of B−1(1 − Π) is bounded by
1317
+ ��B−1(1 − Π)
1318
+ ��
1319
+ ℓ∞→ℓ∞ ≤ 1
1320
+
1321
+
1322
+
1323
+ 0
1324
+ ���
1325
+
1326
+ reiθ − B
1327
+ �−1���
1328
+ ℓ∞→ℓ∞ dθ ≤ 8C
1329
+ δ ,
1330
+ (6.29)
1331
+ using the bound in Claim 6.4 on the circle {|ξ| = r} which lies inside Ar,δ.
1332
+ Finally, we show that the vector of ones is sufficiently separated from the kernel of Π. This ensures
1333
+ a stable decomposition of the space into the direct sum of the range of (1 − Π) and the span of 1, so
1334
+ we can apply the local laws to each of the components separately.
1335
+ Claim 6.7. There exists ε > 0 independent of N and z such that for all ζ with Re ζ ∈ Iκ, Im ζ < 0
1336
+ and |ζ − ¯z| ≤ ε,
1337
+ ∥Π1∥∞
1338
+ ∥Π∥ℓ∞→ℓ∞ ≥ c,
1339
+ (6.30)
1340
+ where c > 0 is a constant independent of N and z.
1341
+ Proof. Define the projector Π0 corresponding to B0 via (6.26). Then Π0 = |m|−1�Π0|m|, where �Π0 is
1342
+ the orthoprojector corresponding to the principal eigenvalue of the Hermitian operator F.
1343
+ Since |m| ∼ 1 we have ∥Π0∥ℓ∞→ℓ∞ ≤ C0. Moreover, by Proposition 4.3, the ℓ2-normalized eigenvector
1344
+ v corresponding to the principal eigenvalue of F has entries vj ≥ 0 with vj ∼ N −1/2, hence
1345
+ ∥Π01∥∞ =
1346
+ ���|m|−1�Π0|m|1
1347
+ ���
1348
+ ∞ =
1349
+ ��|m|−1v
1350
+ ��
1351
+ ∞ ⟨v, |m|⟩ ≥ c0,
1352
+ (6.31)
1353
+ where c0 > 0 is a constant independent of N and z.
1354
+ Similarly to the proof of (6.22), for any γ ∈ (0, 1] there exists εγ > 0, such that the bound
1355
+ ∥B − B0∥ℓ∞→ℓ∞ ≤ γ δ
1356
+ 8C
1357
+ (6.32)
1358
+ holds for all ζ ∈ D−
1359
+ κ with |ζ − ¯z| ≤ εγ. Here δ is defined in (6.17) and C > 0 is the constant in (6.21).
1360
+ We choose εγ to be smaller than ε1 of Claim 6.4, then for all ζ with Re ζ ∈ Iκ, Im ζ < 0 such that
1361
+ |ζ − ¯z| ≤ εγ we have
1362
+ ∥Π − Π0∥ℓ∞→ℓ∞ ≤ r
1363
+
1364
+
1365
+
1366
+ 0
1367
+ ��(reiθ − B)−1 − (reiθ − B0)−1��
1368
+ ℓ∞→ℓ∞ dθ
1369
+ ≤ r
1370
+
1371
+
1372
+
1373
+ 0
1374
+ ��(reiθ − B)−1(B − B0)(reiθ − B0)−1��
1375
+ ℓ∞→ℓ∞ dθ
1376
+ ≤ r · 8C
1377
+ δ · γ δ
1378
+ 8C · 4C
1379
+ δ
1380
+ = γ 4Cr
1381
+ δ
1382
+ .
1383
+ (6.33)
1384
+ Here we used inequalities (6.21) and (6.23) in the second to last step. We set the value of γ to be
1385
+ γ0 := min
1386
+
1387
+ 1, c0δ
1388
+ 8Cr
1389
+
1390
+ , which guarantees that
1391
+ ∥Π1∥∞ ≥
1392
+ ��∥Π01∥∞ − ��Π − Π0∥ℓ∞→ℓ∞ ∥1∥∞
1393
+ �� ≥ c0 − γ0
1394
+ 4Cr
1395
+ δ
1396
+ ≥ c0
1397
+ 2 .
1398
+ (6.34)
1399
+ Finally, observe that
1400
+ ∥Π∥ℓ∞→ℓ∞ ≤ ∥Π0∥ℓ∞→ℓ∞ + ∥Π − Π0∥ℓ∞→ℓ∞ ≤ C0 + c0/2.
1401
+ (6.35)
1402
+ This proves the claim with c := c0/(2C0 + c0).
1403
+ 15
1404
+
1405
+ 6.3
1406
+ Finishing the Proof of Theorem 3.2
1407
+ Proof of Theorem 3.2. Recall that the objective is to estimate the quantities defined in (3.1).
1408
+ In-
1409
+ stead of estimating �
1410
+ a̸=y waGαa �Gaβ directly, it is more convenient to work with objects of the type
1411
+
1412
+ a̸=y WaxGαa �Gaβ, since they generalize quantities appearing in both (3.6) and (3.7). The redundant
1413
+ index x can be eliminated by setting Wax := wa.
1414
+ In the case Im z Im ζ > 0, (3.6) and (3.7) follow immediately from (4.12) and Lemma 6.1 (see
1415
+ Remark 6.3). Therefore, we focus on the case Im z Im ζ < 0.
1416
+ Since Π has rank one and Claim 6.7 asserts that Π1 ̸= 0, the kernel of Π together with 1 span
1417
+ CN. Therefore we can decompose each column of the matrix W into a linear combination of 1 and an
1418
+ element of ker Π, that is, there exists an N × N matrix Y and a vector s ∈ CN such that
1419
+ W = Y + 1s∗,
1420
+ ΠY = 0.
1421
+ (6.36)
1422
+ We multiply the first equality in (6.36) by Π from the left, apply both sides to the a-th standard basis
1423
+ vector ea of CN and take the ℓ∞-norm to deduce
1424
+ ∥ΠWea∥∞ = |sa| ∥Π1∥∞ ,
1425
+ a ∈ {1, . . ., N}.
1426
+ (6.37)
1427
+ By assumption, ∥W∥max ≲ N −1, hence ∥Wea∥∞ ≲ N −1. Using Claim 6.7 we get
1428
+ |sa| ≲ N −1 ∥Π∥ℓ∞→ℓ∞
1429
+ ∥Π1∥∞
1430
+ ≲ N −1,
1431
+ a ∈ {1, . . . , N}.
1432
+ (6.38)
1433
+ We combine (6.36) and the resolvent identity in the form (z − ζ)G �G = G − �G to obtain
1434
+
1435
+ a̸=y
1436
+ WaxGαa �Gaβ =
1437
+
1438
+ a̸=y
1439
+ YaxGαa �Gaβ + gy
1440
+ αβ¯sx,
1441
+ gy
1442
+ αβ := Gαβ − �Gαβ
1443
+ z − ζ
1444
+ − Gαy �Gyβ.
1445
+ (6.39)
1446
+ Define the N × N matrix X := (1 − Sm �m)−1 Y . It follows from (6.36) that Y = (1 − Π)Y , hence
1447
+ X = (1 − Sm �m)−1(1 − Π)Y . Furthermore, estimates ∥W∥max ≲ N −1, (6.36), and (6.38) imply that
1448
+ |Yab| ≲ N −1 for all a and b. Since by Claim 6.6
1449
+ ��(1 − Sm �m)−1(1 − Π)
1450
+ ��
1451
+ ℓ∞→ℓ∞ ≲ 1, we conclude that
1452
+ ∥X∥max = max
1453
+ a,b |Xab| ≲ N −1.
1454
+ (6.40)
1455
+ First, using (6.40), we can apply Lemma 6.1 to the first term in (6.39) to obtain
1456
+
1457
+ a̸=y
1458
+ YaxGαa �Gaβ = δαβmα �mα([(1 − Sm �m)−1Y ]αx − δαyYαx) + O≺
1459
+
1460
+ Ψ2 �Ψ + Ψ�Ψ2�
1461
+ .
1462
+ (6.41)
1463
+ Using (6.36), we proceed by computing
1464
+ mα �mα[(1 − Sm �m)−1Y ]αx =
1465
+
1466
+ m �m
1467
+
1468
+ 1 − Sm �m
1469
+ �−1 (W − 1s∗)
1470
+
1471
+ αx
1472
+ =
1473
+
1474
+ m �m
1475
+
1476
+ 1 − Sm �m
1477
+ �−1W
1478
+
1479
+ αx −
1480
+
1481
+ m �m
1482
+
1483
+ 1 − Sm �m
1484
+ �−11
1485
+
1486
+ α¯sx.
1487
+ (6.42)
1488
+ Finally, it follows from subtracting the vector Dyson equations (3.4) for z and ζ that
1489
+ m �m
1490
+
1491
+ 1 − Sm �m
1492
+ �−11 = m − �m
1493
+ z − ζ .
1494
+ (6.43)
1495
+ Next, we estimate the second term in (6.39). Applying the local law in the form (4.4), we obtain
1496
+ gy
1497
+ αβ = δαβ
1498
+ mα − �mα
1499
+ z − ζ
1500
+ − δαβδαymα �mα + O≺
1501
+
1502
+ (|η| + |�η|)−1(Ψ + �Ψ)
1503
+
1504
+ ,
1505
+ (6.44)
1506
+ where we used that |z − ζ| ≥ |η| + |�η|, since η�η < 0. Combining (6.38), (6.39), and (6.41)-(6.44) yields
1507
+
1508
+ a̸=y
1509
+ WaxGαa �Gaβ = δαβ
1510
+
1511
+ m �m
1512
+
1513
+ 1 − Sm �m
1514
+ �−1W
1515
+
1516
+ αx − δαβδαy[m �mW]αx
1517
+ + O≺
1518
+
1519
+ (Ψ + �Ψ)(Ψ�Ψ + min{Θ, �Θ})
1520
+
1521
+ ,
1522
+ (6.45)
1523
+ 16
1524
+
1525
+ which proves (3.6) by setting Wax := wa.
1526
+ To prove (3.7), we observe that by setting x = y = α = β = b in (6.39) and summing over b yields
1527
+
1528
+ b
1529
+
1530
+ a̸=b
1531
+ WabGba �Gab =
1532
+
1533
+ b
1534
+
1535
+ a̸=b
1536
+ YabGaa �Gab+⟨s, g⟩,
1537
+ gb := Gbb − �Gbb
1538
+ z − ζ
1539
+ −Gbb �Gbb, b ∈ {1, . . ., N}. (6.46)
1540
+ To estimate ⟨s, g⟩, we use (6.38) and the averaged local law (4.3) to obtain
1541
+
1542
+ s, g
1543
+
1544
+ =
1545
+
1546
+ s, m − �m
1547
+ z − ζ
1548
+ − m �m
1549
+
1550
+ + O≺
1551
+
1552
+ (|η| + |�η|)−1(Θ + �Θ)
1553
+
1554
+ ,
1555
+ (6.47)
1556
+ where we used that |z − ζ| ≥ |η| + |�η|, since η�η < 0.
1557
+ Setting x = y = α = β = b in (6.41), summing over b, using the identities (6.42) and (6.43), and
1558
+ combining the result with (6.47), we deduce that
1559
+
1560
+ b
1561
+
1562
+ a̸=b
1563
+ WabGba �Gab = Tr
1564
+
1565
+ m �mSm �m
1566
+
1567
+ 1 − Sm �m
1568
+ �−1W
1569
+
1570
+ + NO≺
1571
+
1572
+ Ψ�Ψ(Ψ + �Ψ) + Θ�Θ
1573
+
1574
+ ,
1575
+ (6.48)
1576
+ where we used that (|η| + |�η|)−1(Θ + �Θ) = NΘ�Θ. This establishes (3.7) and concludes the proof of
1577
+ Theorem 3.2.
1578
+ Remark 6.8. We outline the steps needed to achieve the optimal error estimate (3.12). First, one
1579
+ needs to adapt the proof of Theorem 3.2. More specifically, replace the decomposition (6.36) with
1580
+ W = Y + 1s∗ + q1∗, such that Π(z, ζ)Y = Y Πt(ζ, z) = 0,
1581
+ (6.49)
1582
+ where Π(z, ζ) is the destabilizing eigenprojector defined in (6.26). The terms involving s and q are
1583
+ handled using the averaged local law (4.3), similarly to (6.47).
1584
+ For the remaining term, R := �
1585
+ y Fyy
1586
+ yy , we adapt the mechanism of Lemma 6.1 by using the
1587
+ following iterative scheme.
1588
+ In the first step, we apply an expansion similar to (6.9) to the partial
1589
+ derivative ∂jkR. This improves the error in the estimate on R by a factor of (Ψ + �Ψ)1/2. If we expand
1590
+ ∂lp∂jkR in a similar manner, we gain another (Ψ + �Ψ)1/4. Iterating this approach we can estimate R
1591
+ with an error stochastically dominated by NΨ�Ψ(Ψ + �Ψ)2−2−d for any given integer d (where d is the
1592
+ maximal order of expanded partial derivatives). By Definition 3.1, this is sufficient to establish (3.12).
1593
+ Similar arguments in the context of random band matrices can be found in [10].
1594
+ Proof of Corollary 3.3. Estimate (3.9) on Txy(ζ, z) follows from (3.6) by setting α = β = y and
1595
+ wa := Sxa. Estimate (3.10) on Tr[AT (z, ζ)] follows from (3.7) by setting W := SAt, which satisfies
1596
+ |Wab| ≲ N −1 ∥A∥ℓ∞→ℓ∞. This concludes the proof of Corollary 3.3.
1597
+ Remark 6.9. Note that estimates (3.6) and (3.7) (also with the improved error term (3.12)) hold
1598
+ without omission of indices in the a summation. Indeed, it follows from Theorems 3.2 and 4.2 that
1599
+
1600
+ a
1601
+ waGαa �Gaβ = δαβ
1602
+
1603
+ m �m
1604
+
1605
+ 1 − Sm �m
1606
+ �−1w
1607
+
1608
+ α + O≺
1609
+
1610
+ (Ψ + �Ψ)(Ψ�Ψ + 1{η�η<0} min{Θ, �Θ})
1611
+
1612
+ ,
1613
+
1614
+ a,b
1615
+ WabGba �Gab = Tr
1616
+
1617
+ m �m
1618
+
1619
+ 1 − Sm �m
1620
+ �−1W
1621
+
1622
+ + O≺
1623
+
1624
+ N(Ψ + �Ψ)Ψ�Ψ + 1{η�η<0}NΘ�Θ
1625
+
1626
+ .
1627
+ (6.50)
1628
+ 7
1629
+ Proof of Proposition 5.2
1630
+ In this section, we compute the variance V (f) defined in (5.3) for mesoscopic C2
1631
+ c test functions f. In
1632
+ [17], the limiting variance was computed for several types of C∞ test functions, including compactly
1633
+ supported ones; however, V (f) is computed with an O(1) error (see, e.g., Lemma 6.7 in [17]), which
1634
+ is not negligible in the setting of the present paper. To obtain effective error bounds, we augment the
1635
+ proof laid out in [17] by performing further integration by parts in the integral representation of V (f),
1636
+ thus eliminating the f ′ terms, improving the error by a factor of O(η0).
1637
+ Throughout this section, we adhere to the notation m ≡ m(z), �m ≡ m(ζ), η := Im z, �η := Im ζ.
1638
+ 17
1639
+
1640
+ The stability operator (1 − Sm �m) can be expressed in terms of the self-saturated energy operator
1641
+ F, defined in (4.6), via the following identity
1642
+ 1 − Sm �m = |m �m|−1/2 (U∗ − F(z, ζ)) |m �m|1/2U,
1643
+ U := m �m
1644
+ |m �m|.
1645
+ (7.1)
1646
+ Furthermore, by (4.9), the operator F can be decomposed such that
1647
+ F(z, ζ) = ψ1(z, ζ) v(z, ζ)
1648
+
1649
+ v(z, ζ)
1650
+ �∗ + A(z, ζ),
1651
+ A(z, ζ)v(z, ζ) = 0,
1652
+ ∥A(z, ζ)∥ℓ2→ℓ2 ≤ 1 − �δ,
1653
+ (7.2)
1654
+ where ψ1, v is the principal eigenvalue-eigenvector pair of F, and �δ is the constant in (4.9).
1655
+ Let R ≡ R(z, ζ) denote (U∗(z, ζ) − A(z, ζ))−1. In the sequel, we drop the arguments and write
1656
+ A ≡ A(z, ζ). Lower bound (4.8) and the inequality in (7.2) imply that
1657
+ ∥R∥ℓ2→ℓ2 + ∥R∥ℓ∞→ℓ∞ ≲ 1.
1658
+ (7.3)
1659
+ In the following lemma, we collect the perturbative estimates on the saturated self-energy operator F
1660
+ and related quantities established in [17].
1661
+ Lemma 7.1. (Proposition 6.5, (6.52), (6.60), (6.71), and (6.67) in [17]) Let w, ζ1, ζ2 be spectral
1662
+ parameters in Iκ + i[−1, 1], and let F be the operator defined in (4.6), then the principal eigenvalue-
1663
+ eigenvector pair ψ1, v of F satisfies
1664
+ ∥v(w, ζ1) − v(w, ζ2)∥ℓ2→ℓ2 + |ψ1(w, ζ1) − ψ1(w, ζ2)| ≲ |ζ1 − ζ2|.
1665
+ (7.4)
1666
+ Furthermore, for operator A defined in (7.2), we have the estimate
1667
+ ∥F(w, ζ1) − F(w, ζ2)∥ℓ2→ℓ2 + ∥A(w, ζ1) − A(w, ζ2)∥ℓ2→ℓ2 ≲ |ζ1 − ζ2|.
1668
+ (7.5)
1669
+ Let z := x + iη, ζ := y − iη, with x, y ∈ Iκ, 0 ≤ η ≤ 1, then
1670
+ ψ1
1671
+
1672
+ v, Rm′
1673
+ m U∗Rv
1674
+
1675
+ = ψ1(z, z)
1676
+
1677
+ v(z, z)m′
1678
+ m v(z, z)
1679
+
1680
+ + O(|x − y|)
1681
+ (7.6)
1682
+ Let ω ≡ ω(z, ζ) := 1 − ψ1⟨v, Rv⟩, then
1683
+ ω(z, ζ) = 1 − ψ1(z, z) + ψ1(z, z)(x − y)
1684
+
1685
+ v(z, z)m′
1686
+ m v(z, z)
1687
+
1688
+ + O(|x − y|2),
1689
+ (7.7)
1690
+ Moreover, there exists ε > 0 independent of N, such that for all x, y ∈ Iκ satisfying |x − y| ≤ ε,
1691
+ |ω(z, ζ)| ≳ η + |x − y|.
1692
+ (7.8)
1693
+ Finally, for z := x + iη with x ∈ Iκ, the following identity holds
1694
+ lim
1695
+ η→+0
1696
+
1697
+ v(z, z)m′
1698
+ m v(z, z)
1699
+
1700
+ = iπ
1701
+ 2 ρ(x)
1702
+ ����
1703
+ Im m(x + i0)
1704
+ |m(x)|
1705
+ ����
1706
+ −2
1707
+ 2
1708
+ (7.9)
1709
+ By our choice of κ, E0 is in the interior of the bulk interval Iκ, defined in (3.5) , hence if we define
1710
+ ˆε := min{ε/4, dist(E0, R\Iκ)}, then ˆε ∼ 1. Furthermore, since the function g is compactly supported,
1711
+ we assume that supp(f) ⊂ [E0 − ˆε, E0 + ˆε] for large N.
1712
+ Lemma 7.2. Let η∗ ≡ η∗(N) satisfy 0 < η∗ ≤ N −100, then V (f), defined in (5.3), admits the estimate
1713
+ V (f) =
1714
+ 1
1715
+ 4π2
1716
+ ��
1717
+ [E0−ˆε,E0+ˆε]2
1718
+ (f(y) − f(x))2 �K(x + iη∗, y − iη∗)dxdy + O
1719
+
1720
+ η0 + N −ε0�
1721
+ ,
1722
+ (7.10)
1723
+ where
1724
+ �K(z, ζ) := −2 Re Tr
1725
+ �m′
1726
+ m (1 − Sm �m)−1Sm �m′(1 − Sm �m)−1
1727
+
1728
+ .
1729
+ (7.11)
1730
+ 18
1731
+
1732
+ In preparation for the proof of Lemma 7.2 we define an auxiliary function L(z, ζ)
1733
+ L(z, ζ) := Llog(z, ζ) + L1(z, ζ),
1734
+ Llog(z, ζ) := −2 log det {1 − Sm �m} ,
1735
+ L1(z, ζ) := − Tr [Sm �m] + 1
1736
+ 2
1737
+
1738
+ m �m, C(4)m ��m
1739
+
1740
+ ,
1741
+ (7.12)
1742
+ where log is the principal branch of the complex logarithm, and C(4) is the matrix of the fourth cumu-
1743
+ lants of H. By Jacobi’s formula for the derivative of the determinant, it follows from the definitions
1744
+ of L and K, that for all z, ζ ∈ C\R
1745
+ ∂2
1746
+ ∂ζ∂z L(z, ζ) = K(z, ζ).
1747
+ (7.13)
1748
+ Furthermore, by condition (A) and the upper bound (4.2), it follows that
1749
+ |Llog(z, ζ)| ≤π + log |det {1 − Sm �m}| ≲ 1 + Tr
1750
+
1751
+ (1 − Sm �m)∗ (1 − Sm �m) − I
1752
+
1753
+ ≲ 1,
1754
+ (7.14)
1755
+ where in the last line we used
1756
+
1757
+ (1 − Sm �m)∗ (1 − Sm �m) − I
1758
+
1759
+ jj ≲ N −1.
1760
+ The partial derivatives of L1 contribute only sub-leading terms to L. Indeed, we have the estimates
1761
+ L1(z, ζ) ≲ 1,
1762
+
1763
+ ∂zL1(z, ζ) ≲ 1,
1764
+ ∂2
1765
+ ∂ζ∂z L1(z, ζ) ≲ 1,
1766
+ (7.15)
1767
+ where we used the moment condition (2.2) to bound Sjk and C(4)
1768
+ jk , (4.2) to get the upper bound
1769
+ m, �m ≲ 1, and (4.14) to obtain m′, �m′ ≲ 1, since [E0 + ˆε, E0 − ˆε] ⊂ Iκ.
1770
+ The following claim collects the bounds on K and ∂zL that together with (7.14) enable integration
1771
+ by parts in the definition (5.3) of the variance V (f), which is the essence of Lemma 7.2.
1772
+ Claim 7.3. (Proposition 6.2 and Proposition 6.6 in [17]) Let K(z, ζ) and L(z, ζ) be as defined in (5.4)
1773
+ (with β = 1) and (7.12) respectively, then for all z, ζ ∈ C\R with Re z, Re ζ ∈ [E0 − ˆε, E0 + ˆε] and
1774
+ | Im z|, | Im ζ| ≤ 1 we have
1775
+ K(z, ζ) ≲ 1 + 1{η�η<0}(|η| + |�η|)−2,
1776
+
1777
+ ∂z L(z, ζ) ≲ 1 + (| Re z − Re ζ| + |η| + |�η|)−1,
1778
+ (7.16)
1779
+ where η := Im z, �η := Im ζ.
1780
+ Proof of Lemma 7.2. Define Ω∗ := {z ∈ C : 1 > | Im z| > η∗}. Recall the definition of V (f) from (5.3).
1781
+ First, we prove that
1782
+ V (f) = 1
1783
+ π2
1784
+
1785
+ Ω∗
1786
+
1787
+ Ω∗
1788
+ ∂ �f(ζ)
1789
+ ∂¯ζ
1790
+ ∂ �f(z)
1791
+ ∂¯z
1792
+ K(z, ζ)d¯ζdζd¯zdz + O
1793
+
1794
+ N −ε0�
1795
+ .
1796
+ (7.17)
1797
+ It follows from (5.6) that
1798
+ ∂ �f
1799
+ ∂¯z = 1
1800
+ 2
1801
+
1802
+ −ηχ′(η)f ′(x) + i
1803
+
1804
+ ηχ(η)f ′′(x) + χ′(η)f(x)
1805
+ ��
1806
+ .
1807
+ (7.18)
1808
+ Moreover, for all z with | Im z| < 1/2, (7.18) and the properties of χ in (5.6) imply
1809
+ ∂ �f
1810
+ ∂¯z = i Im z
1811
+ 2
1812
+ f ′′(Re z).
1813
+ (7.19)
1814
+ Let V∗(f) denote the integral on right hand side of (7.17), and define η1 := N −ε0/2η0. It follows
1815
+ from the first inequality in (7.16), and (7.19) that
1816
+ |V (f) − V∗(f)| ≲
1817
+ ��
1818
+ R2
1819
+ |f ′′(x)f ′′(y)| dxdy
1820
+ η1
1821
+
1822
+ η∗
1823
+ 2η1
1824
+
1825
+ η∗
1826
+ η�η
1827
+ (η + �η)2 d�ηdη.
1828
+ (7.20)
1829
+ 19
1830
+
1831
+ Note that η�η ≤ (η + �η)2/4, hence the integral over d�ηdη is bounded by η2
1832
+ 1/2, and since ∥f ′′∥1 ∼ η−1
1833
+ 0 ,
1834
+ (7.17) is established.
1835
+ We write z := x + iη, ζ := y + i�η and plug (7.13) into the expression (7.17) for V (f). Using the
1836
+ fact that ∂zu = −i∂ηu for any holomorphic function u(z), and integrating by parts in η, we obtain
1837
+ V (f) = i
1838
+ π2
1839
+ ��
1840
+ R2
1841
+ dxdy
1842
+
1843
+ |�η|>η∗
1844
+ ∂ �f(ζ)
1845
+ ∂¯ζ
1846
+
1847
+ |η|>η∗
1848
+ ∂2 �f(z)
1849
+ ∂η∂¯z
1850
+
1851
+ ∂ζ L(z, ζ)d�ηdη
1852
+ − i
1853
+ π2
1854
+ ��
1855
+ R2
1856
+ dxdy
1857
+
1858
+ |�η|>η∗
1859
+ ∂ �f(ζ)
1860
+ ∂¯ζ
1861
+
1862
+ η=±η∗
1863
+ ∂ �f
1864
+ ∂¯z (x + iη) ∂
1865
+ ∂ζ L(z, ζ)d�η + O
1866
+
1867
+ N −ε0�
1868
+ .
1869
+ (7.21)
1870
+ The second estimate in (7.16), expression (7.18) and the estimates ∥f ′′∥1 ∼ η−1
1871
+ 0 , ∥f ′∥1 ∼ 1, ∥f∥1 ∼ η0
1872
+ imply that the boundary term in (7.21) is dominated by O≺(η∗η−2
1873
+ 0 ), which is smaller than O (N −ε0).
1874
+ Similarly, integrating the first term on the right hand side of (7.21) by parts in �η we get
1875
+ V (f) = − 1
1876
+ π2
1877
+
1878
+ Ω∗
1879
+
1880
+ Ω∗
1881
+ ∂2 �f(z)
1882
+ ∂¯z∂η
1883
+ ∂2 �f(ζ)
1884
+ ∂¯ζ∂�η L(z, ζ)d¯ζdζd¯zdz
1885
+ + 1
1886
+ π2
1887
+ ��
1888
+ R2
1889
+ dxdy
1890
+
1891
+ |η|>η∗
1892
+ ∂2 �f(z)
1893
+ ∂η∂¯z
1894
+
1895
+ �η=±η∗
1896
+ ∂ �f
1897
+ ∂¯ζ (y + i�η)L(z, y + i�η)dη + O
1898
+
1899
+ N −ε0�
1900
+ .
1901
+ (7.22)
1902
+ It follows from (7.14) and the expression (7.18) that the boundary term (the second line of (7.22)) is
1903
+ again dominated by O≺(N −ε0).
1904
+ We apply Stokes’ theorem to (7.22) twice: once in z and once in ζ. Considering that ∂η �f(z) vanishes
1905
+ on the boundary of Ω∗ except for the lines {Im z = ±η∗}, this results in
1906
+ V (f) = 1
1907
+ 4π2
1908
+ ��
1909
+ R2
1910
+
1911
+ η,�η=±η∗
1912
+ sign (η�η) ∂ �f(x + iη)
1913
+ ∂η
1914
+ ∂ �f(y + i�η)
1915
+ ∂�η
1916
+ L(x + iη, y + i�η)dxdy + O
1917
+
1918
+ N −ε0�
1919
+ = −
1920
+ 1
1921
+ 2π2
1922
+ ��
1923
+ R2
1924
+ f ′(x)f ′(y) �L(x, y)dxdy + O
1925
+
1926
+ N −ε0�
1927
+ ,
1928
+ (7.23)
1929
+ where
1930
+ �L(x, y) := Re [L(x + iη∗, y + iη∗) − L(x + iη∗, y − iη∗)]
1931
+ (7.24)
1932
+ We restrict the integrations in (7.23) to [E0 − ˆε, E0 + ˆε], since this interval contains the support of f.
1933
+ Furthermore, for all y ∈ supp(f), y − E0 ≲ η0, hence |y − E0 ± ˆε| ∼ 1. By symmetry of L(z, ζ), and
1934
+ the second estimate in (7.16) it follows that
1935
+
1936
+ ∂y
1937
+ �L(E0 ± ˆε, y) ≲ 1,
1938
+ y ∈ supp(f).
1939
+ (7.25)
1940
+ We write f ′(y) = ∂y (f(y) − f(x)), perform integration by parts in y and integrate the boundary term
1941
+ by parts in x to obtain
1942
+ V (f) = 1
1943
+ 2π2
1944
+ E0+ˆε
1945
+
1946
+ E0−ˆε
1947
+ E0+ˆε
1948
+
1949
+ E0−ˆε
1950
+ f ′(x) (f(y) �� f(x)) ∂
1951
+ ∂y
1952
+ �L(x, y)dxdy
1953
+ +
1954
+ 1
1955
+ 4π2
1956
+ E0+ˆε
1957
+
1958
+ E0−ˆε
1959
+ (f(x))2 ∂
1960
+ ∂x
1961
+
1962
+ �L(x, E0 + ˆε) − �L(x, E0 − ˆε)
1963
+
1964
+ dx + O
1965
+
1966
+ N −ε0�
1967
+ .
1968
+ (7.26)
1969
+ Since ∥f∥2
1970
+ 2 ≲ η0, it follows from (7.25) that the second integral in (7.26) is O (η0).
1971
+ Similarly,
1972
+ integrating (7.26) by parts in x and using (7.26) to substitute one of the emerging itegrals for
1973
+ −V (f) + O (N −ε0 + η0), we get
1974
+ 2V (f) = 1
1975
+ 2π2
1976
+ E0+ˆε
1977
+
1978
+ E0−ˆε
1979
+ E0+ˆε
1980
+
1981
+ E0−ˆε
1982
+ (f(y) − f(x))2
1983
+ ∂2
1984
+ ∂x∂y
1985
+ �L(x, y)dxdy + O
1986
+
1987
+ η0 + N −ε0�
1988
+ ,
1989
+ (7.27)
1990
+ 20
1991
+
1992
+ where we again used (7.25) to estimate the boundary term. For any holomorphic function u(z) of
1993
+ z = x + iη, we have ∂xu = Re[∂zu], hence ∂x∂y �L(x, y) = Re [K(x + iη∗, y + iη∗) − K(x + iη∗, y − iη∗)].
1994
+ Finally, in view of in view of the first estimate in (7.16), ∂z∂ζLlog(x + iη∗, y + iη∗) ≲ 1, so its
1995
+ contribution is also bounded by O≺(η0 ∥g∥2
1996
+ 2 + η2
1997
+ 0 ∥g∥2
1998
+ 1). Moreover, it follows from the last estimate in
1999
+ (7.15) that we can replace K(x+iη∗, y −iη∗) by ∂z∂ζLlog(x+iη∗, y −iη∗), since the contribution of the
2000
+ remaining terms is bounded by O≺(η0 ∥g∥2
2001
+ 2 + η2
2002
+ 0 ∥g∥2
2003
+ 1). This concludes the proof of Lemma 7.2.
2004
+ Once Lemma 7.2 is established, we can follow the method of Lemma 6.7 in [17] to finish the proof
2005
+ of Proposition 5.2.
2006
+ Fix x, y ∈ [E0 − ˆε, E0 + ˆε] and write z := x + iη∗, ζ := y − iη∗, as in (7.10). It follows from (7.1)
2007
+ and (7.2) that the kernel �K(z, ζ) can be written as
2008
+ �K(z, ζ) = −2 Re Tr
2009
+ �m′
2010
+ m U∗�
2011
+ R + ψ1
2012
+ ω Rvv∗R
2013
+
2014
+ F �m′
2015
+ �m
2016
+
2017
+ R + ψ1
2018
+ ω Rvv∗R
2019
+ ��
2020
+ ,
2021
+ (7.28)
2022
+ where ω is defined in (7.7). Expanding the brackets in (7.28), collecting like terms according to the
2023
+ powers of ω−1, and using the cyclic property of trace yields
2024
+ �K(z, ζ) = −2 Re
2025
+ �ψ2
2026
+ 1
2027
+ ω2
2028
+
2029
+ v, Rm′
2030
+ m U∗Rv
2031
+ ��
2032
+ v, RF �m′
2033
+ �m Rv
2034
+ ��
2035
+ + O
2036
+
2037
+ 1 + ω−1�
2038
+ ,
2039
+ (7.29)
2040
+ since Tr
2041
+ � m′
2042
+ m U∗RF �
2043
+ m′
2044
+
2045
+ m R
2046
+
2047
+ , Tr
2048
+ � m′
2049
+ m U∗RF �
2050
+ m′
2051
+
2052
+ m Rvv∗R
2053
+
2054
+ , and Tr
2055
+ � m′
2056
+ m U∗Rvv∗RF �
2057
+ m′
2058
+
2059
+ m R
2060
+
2061
+ are all O(1). The first
2062
+ scalar product in (7.29) can be estimated using (7.6).
2063
+ We compute the second scalar product in (7.29). It follows from uniform bounds (4.2) and (4.14)
2064
+ that ∥m(z)− m(¯ζ)∥∞ ≲ |x− y|, and hence ∥U(z, ζ) − 1∥ℓ2→ℓ2 ≲ |x− y|. Together with estimates (7.5)
2065
+ and (7.4), this yields
2066
+ ψ1
2067
+
2068
+ v, RF �m′
2069
+ �m Rv
2070
+
2071
+ = ⟨v(ζ, ζ), F(ζ, ζ) �
2072
+ m′
2073
+ �m v(ζ, ζ)
2074
+
2075
+ + O(|x − y|),
2076
+ (7.30)
2077
+ where we used the identity R(¯ζ, ζ)v(ζ, ζ) = (1 − A(ζ, ζ))−1v(ζ, ζ) = v(ζ, ζ).
2078
+ It follows from the estimate on v in (7.4) that ∥v(ζ, ζ) − v(y, y)∥2 ≲ η∗. Vector v(y, y) is the ℓ2-
2079
+ normalization of |m(y)|−1 Im m(y + i0), hence it satisfies F(y, y)v(y, y) = v(y, y) by (3.4). Therefore
2080
+ using (4.14) and the lower bound in (7.5), we obtain
2081
+ ∥F(ζ, ζ)v(ζ, ζ) − v(ζ, ζ)∥2 ≲ η∗.
2082
+ (7.31)
2083
+ Substituting (7.31) into (7.30) yields
2084
+ ψ1
2085
+
2086
+ v, RF �m′
2087
+ �m Rv
2088
+
2089
+ = ⟨v(ζ, ζ), �m′
2090
+ �m v(ζ, ζ)
2091
+
2092
+ + O(|x − y| + η∗),
2093
+ (7.32)
2094
+ Combining (7.28) with estimates (7.4), (7.6), (7.8) and (7.32) yield
2095
+ �K(z, ζ) = −2 Re
2096
+ �ψ1(z, z)ψ1(ζ, ζ)
2097
+ ω2
2098
+
2099
+ v(z, z)m′
2100
+ m v(z, z)
2101
+
2102
+ ⟨v(ζ, ζ), �m′
2103
+ �m v(ζ, ζ)
2104
+ ��
2105
+ + O(1 + ω−1).
2106
+ (7.33)
2107
+ It follows by (7.9) and (7.7) that
2108
+ lim
2109
+ η∗→+0
2110
+ �K(x + iη∗, y − iη∗) = 2|x − y|−2 + O(|x − y|−1).
2111
+ (7.34)
2112
+ Since f ∈ C2
2113
+ c (R), (7.33) implies that the integrand in (7.10) is uniformly bounded in η∗ ∈ [0, N −100].
2114
+ Therefore, we can take the limit η∗ → 0 in (7.10), and apply the boundary estimate (7.34) to obtain.
2115
+ V (f) =
2116
+ 1
2117
+ 2π2
2118
+ ��
2119
+ [E0−ˆε,E0+ˆε]2
2120
+ (f(x) − f(y))2
2121
+ (x − y)2
2122
+ dxdy + O
2123
+
2124
+ η0 log N + N −ε0�
2125
+ ,
2126
+ (7.35)
2127
+ because the contribution of O(|x − y|−1) to the integral (7.10) is bounded by O(η0 log N).
2128
+ 21
2129
+
2130
+ Finally, the contribution of the regime (x, y) /∈ [E0 − ˆε, E0 + ˆε]2 to the integral
2131
+ ��
2132
+ R2
2133
+ (f(x) − f(y))2
2134
+ (x − y)2
2135
+ dxdy = ∥f∥2
2136
+ ˙H1/2 = ∥g∥2
2137
+ ˙H1/2 ,
2138
+ (7.36)
2139
+ is bounded by O≺(η0), therefore
2140
+ V (f) =
2141
+ 1
2142
+ 2π2 ∥g∥2
2143
+ ˙H1/2 + O
2144
+
2145
+ η0 log N + N −ε0�
2146
+ .
2147
+ (7.37)
2148
+ This concludes the proof of Proposition 5.2.
2149
+ Appendix A
2150
+ Proof of Lemma 5.4
2151
+ We use the Helffer–Sj¨ostrand representation to express the linear eigenvalue statistics in terms of the
2152
+ resolvent of H (see Section 4.2 in [19] for references),
2153
+ {1 − E} [Tr f(H)] = 1
2154
+
2155
+
2156
+ C
2157
+ ∂ �f
2158
+ ∂¯z {1 − E} [Tr G(z)] d¯zdz.
2159
+ (A.1)
2160
+ The characteristic function φ then admits the form
2161
+ φ(λ) = E [e(λ)] ,
2162
+ e(λ) := exp
2163
+
2164
+ iλ 1
2165
+
2166
+
2167
+ C
2168
+ ∂ �f
2169
+ ∂¯z {1 − E} [Tr G(z)] d¯zdz
2170
+
2171
+ ,
2172
+ λ ∈ R,
2173
+ (A.2)
2174
+ and its derivative φ′ is given by
2175
+ φ′(λ) = E
2176
+
2177
+ e(λ) i
2178
+
2179
+
2180
+ C
2181
+ ∂ �f
2182
+ ∂¯z {1 − E} [Tr G(z)] d¯zdz
2183
+
2184
+ ,
2185
+ λ ∈ R.
2186
+ (A.3)
2187
+ As observed in [19], the regime | Im z| ≤ N −ε0/2η0, referred to as the ultra-local scales, does not
2188
+ contribute to the integrals in (A.2) and (A.3). This yields the estimates (5.9) (see equations (4.21)
2189
+ and (4.22) in [19] for further detail).
2190
+ It remains to show that (5.11) holds.
2191
+ Applying the cumulant expansion formula (4.15) to the
2192
+ quantity E [�e(λ) {1 − E} [Gjj(z)]] yields the following lemma.
2193
+ Lemma A.1. (Lemma 5.7 in [17]) For all z ∈ D defined in (3.2) and j ∈ {1, . . ., N} we have
2194
+ −1
2195
+ mj(z) E [�e(λ) {1 − E} [Gjj(z)]] = − mj(z)
2196
+ N
2197
+
2198
+ k=1
2199
+ Sjk E [�e(λ) {1 − E} [Gkk(z)]]
2200
+ − E [�e(λ) {1 − E} [Tjj(z, z)]]
2201
+ + E
2202
+ � N
2203
+
2204
+ k=1
2205
+ SjkGkj(z)∂�e(λ)
2206
+ ∂Hjk
2207
+
2208
+ − 1
2209
+ 2
2210
+ N
2211
+
2212
+ k=1
2213
+ C(4)
2214
+ jk mj(z)mk(z) E
2215
+ �∂2�e(λ)
2216
+ ∂H2
2217
+ jk
2218
+
2219
+ + O≺
2220
+
2221
+ (1 + |λ|4)
2222
+
2223
+ Ψ(z)Θ(z) + N −1Ψ(z)η−1/2
2224
+ 0
2225
+ ��
2226
+ ,
2227
+ (A.4)
2228
+ where η0 is from (2.3), and for a, b ∈ {1, . . ., N}, z, ζ ∈ C\R, Txy(z, ζ) is defined in (1.1).
2229
+ Let gj := E [�e(λ) {1 − E} [Gjj(z)]] and let rj denote the right-hand side of (A.4) without the first
2230
+ term, then (A.4) reads
2231
+ ��
2232
+ 1 − Sm2(z)
2233
+ �g
2234
+
2235
+ j = −mj(z)rj. The operator
2236
+
2237
+ 1 − Sm2(z)
2238
+
2239
+ can be inverted to
2240
+ 22
2241
+
2242
+ deduce that gj = −
2243
+ ��
2244
+ 1 − Sm2(z)
2245
+ �−1 m(z)r
2246
+
2247
+ j, where m(z) is interpreted as a multiplication operator
2248
+ acting on the vector r. Summing over j, we obtain
2249
+ E [�e(λ) {1 − E} [Tr G(z)]] =
2250
+ N
2251
+
2252
+ j=1
2253
+ gj = −
2254
+ N
2255
+
2256
+ j,k=1
2257
+ ��
2258
+ 1 − Sm2(z)
2259
+ �−1�
2260
+ jk mk(z)r k = −
2261
+ N
2262
+
2263
+ j=1
2264
+ m′
2265
+ j(z)
2266
+ mj(z)rj,
2267
+ (A.5)
2268
+ where in the last step we applied the identity m′(z)/m2(z) = (1 − Sm2(z))−11. The second term on
2269
+ the right-hand side of (A.4) contributes the first term to the right hand side of (5.11), which, as we
2270
+ show in Section 6, is negligible. Therefore, it suffices to estimate the contribution of the third and
2271
+ fourth terms on the right-hand side. The necessary estimates on the partial derivatives of �e(λ) are
2272
+ collected in the following lemma.
2273
+ Lemma A.2. (Lemma 5.6 in [17]) For all j, k ∈ {1, . . . , N} we have
2274
+ ∂�e(λ)
2275
+ ∂Hjk
2276
+ = −iλ
2277
+ π
2278
+ 2
2279
+ 1 + δjk
2280
+ �e(λ)
2281
+
2282
+ Ω′
2283
+ 0
2284
+ ∂ �f
2285
+ ∂¯ζ
2286
+ ∂Gkj(ζ)
2287
+ ∂ζ
2288
+ d¯ζdζ.
2289
+ (A.6)
2290
+ Moreover, for all p ∈ N, the following bound holds
2291
+ ����
2292
+ ∂p�e(λ)
2293
+ ∂Hp
2294
+ jk
2295
+ ���� = O≺
2296
+
2297
+ (1 + |λ|)p�
2298
+ ,
2299
+ (A.7)
2300
+ and for k ̸= j
2301
+ ����
2302
+ ∂�e(λ)
2303
+ ∂Hjk
2304
+ ���� = O≺
2305
+
2306
+ N −1/2(1 + |λ|)η−1/2
2307
+ 0
2308
+
2309
+ .
2310
+ (A.8)
2311
+ Second derivatives with k ̸= j are given by
2312
+ ∂2�e(λ)
2313
+ ∂H2
2314
+ jk
2315
+ = 2iλ
2316
+ π �e(λ)
2317
+
2318
+ Ω′
2319
+ 0
2320
+ ∂ �f
2321
+ ∂¯ζ
2322
+ ∂ {mj(ζ)mk(ζ)}
2323
+ ∂ζ
2324
+ d¯ζdζ + O≺
2325
+
2326
+ N −1/2(1 + |λ|)2η−1/2
2327
+ 0
2328
+
2329
+ .
2330
+ (A.9)
2331
+ The form in which we write the error terms in Lemmas A.1 and A.2 slightly differs from their
2332
+ original form in [17] because we have already applied the estimate ∥f ′′∥1 ∼ η−1
2333
+ 0 . The leading term in
2334
+ (A.9) results in the third line of (5.11).
2335
+ Using Lemmas A.2 and 5.6 we proceed to estimate the third term on the right hand side of (A.4).
2336
+ Lemma A.3. (c.f. Equation (5.65) of Lemma 5.8 in [17]) For all z ∈ D defined in (3.2) and all
2337
+ j ∈ {1, . . . , N} we have
2338
+ E
2339
+ � N
2340
+
2341
+ k=1
2342
+ SjkGkj(z)∂�e(λ)
2343
+ ∂Hjk
2344
+
2345
+ = − 2iλ
2346
+ π E
2347
+
2348
+ �e(λ)
2349
+
2350
+ Ω′
2351
+ 0
2352
+ ∂ �f
2353
+ ∂¯ζ
2354
+ ∂Tjj(z, ζ)
2355
+ ∂ζ
2356
+ d¯ζdζ
2357
+
2358
+ − iλ
2359
+ π Sjj E [�e(λ)]
2360
+
2361
+ Ω′
2362
+ 0
2363
+ ∂ �f
2364
+ ∂¯ζ m′
2365
+ j(ζ)mj(z)d¯ζdζ + O≺
2366
+ �Ψ(z)(1 + |λ|)
2367
+ Nη1/2
2368
+ 0
2369
+
2370
+ .
2371
+ (A.10)
2372
+ Proof of Lemma A.3. In view of (1.1), multiplying (A.6) by SjkGkj(z), summing over k ̸= j and
2373
+ taking expectations gives the first term on the right hand side of (A.4). For the remaining k = j term,
2374
+ observe that the function K(ζ) := Gjj(ζ) − mj(ζ) is analytic in C\R and is stochastically dominated
2375
+ by Ψ(ζ) in D. Applying Lemma 5.5 with p = 1 to K(ζ), we obtain
2376
+ ∂Gjj(ζ)
2377
+ ∂ζ
2378
+ = m′
2379
+ j(ζ) + O≺
2380
+
2381
+ | Im ζ|−1Ψ(ζ)
2382
+
2383
+ .
2384
+ (A.11)
2385
+ Plugging (A.11) into (A.6) with k = j and applying Lemma 5.6 with K(ζ) := ∂ζGjj(ζ) − m′
2386
+ j(ζ) with
2387
+ s = 3/2, we get
2388
+ ∂�e(λ)
2389
+ ∂Hjj
2390
+ = −iλ
2391
+ π �e(λ)
2392
+
2393
+ Ω′
2394
+ 0
2395
+ ∂ �f
2396
+ ∂¯ζ m′
2397
+ j(ζ)d¯ζdζ + O≺
2398
+
2399
+ 1 + |λ|)N −1/2η−1/2
2400
+ 0
2401
+
2402
+ .
2403
+ (A.12)
2404
+ 23
2405
+
2406
+ where we used the the fact that |e(λ)| = 1 and the first line of (5.9) to bound |�e(λ)| by O≺(1).
2407
+ Multiplying (A.12) by SjjGjj(z) and using the local law (4.4) to estimate Gjj(z) gives the second
2408
+ term on the right hand side of (A.4). Application of the local law (4.4) is justified by (A.7) with p = 1.
2409
+ This concludes the proof of Lemma A.3.
2410
+ Summing up the leading terms in (A.10) results in the second and third terms on the right-hand
2411
+ side of (5.11). Collecting all the error terms, the estimate in (5.11) now follows from (4.13), (A.5),
2412
+ (A.7) (A.9) and Lemma A.3. This concludes the proof of Lemma 5.4.
2413
+ References
2414
+ [1]
2415
+ Oskari Ajanki, L´aszl´o Erd˝os, and Torben Kr¨uger. Quadratic Vector Equations On Complex
2416
+ Upper Half-Plane. Memoirs of the American Mathematical Society 261.1261 (2019).
2417
+ [2]
2418
+ Oskari Ajanki, L´aszl´o Erd˝os, and Torben Kr¨uger. Universality for general Wigner-type matrices.
2419
+ Probability Theory and Related Fields 169 (2015), pp. 667–727.
2420
+ [3]
2421
+ Oskari Ajanki, Torben Kr¨uger, and L´aszl´o Erd˝os. Singularities of Solutions to Quadratic Vector
2422
+ Equations on the Complex Upper Half-Plane. Communications on Pure and Applied Mathematics
2423
+ 70 (2017), pp. 1672–1705.
2424
+ [4]
2425
+ Zhidong Bai and Jian-Feng Yao. On the convergence of the spectral empirical process of Wigner
2426
+ matrices. Bernoulli 11 (2005), pp. 1059–1092.
2427
+ [5]
2428
+ Zhigang Bao, Kevin Schnelli, and Yuanyuan Xu. Central Limit Theorem for Mesoscopic Eigen-
2429
+ value Statistics of the Free Sum of Matrices. International Mathematics Research Notices 2022.7
2430
+ (2020), pp. 5320–5382.
2431
+ [6]
2432
+ Zhigang Bao and Junshan Xie. CLT for Linear Spectral Statistics of Hermitian Wigner Matrices
2433
+ with General Moment Conditions. Theory of Probability & Its Applications 60.2 (2016), pp. 187–
2434
+ 206.
2435
+ [7]
2436
+ Anne Marie Boutet de Monvel and Alexei Khorunzhy. Asymptotic distribution of smoothed
2437
+ eigenvalue density. I. Gaussian random matrices. Random Oper. Stochastic Equations 7 (1999),
2438
+ pp. 1–22.
2439
+ [8]
2440
+ Anne Marie Boutet de Monvel and Alexei Khorunzhy. Asymptotic distribution of smoothed
2441
+ eigenvalue density. II. Wigner random matrices. Random Oper. Stochastic Equations 7 (1999),
2442
+ pp. 149–168.
2443
+ [9]
2444
+ L´aszl´o Erd˝os. The matrix Dyson equation and its applications for random matrices. Random
2445
+ matrices. Vol. 26. IAS/Park City Math. Ser. 2019, pp. 75–158.
2446
+ [10]
2447
+ L´aszl´o Erd˝os, Antti Knowles, and Horng-Tzer Yau. Averaging Fluctuations in Resolvents of
2448
+ Random Band Matrices. Annales Henri Poincar´e 14 (2013), pp. 1837–1926.
2449
+ [11]
2450
+ L´aszl´o Erd˝os, Antti Knowles, Horng-Tzer Yau, and Jun Yin. Delocalization and Diffusion Profile
2451
+ for Random Band Matrices. Communications in Mathematical Physics 323 (2013), 367––416.
2452
+ [12]
2453
+ L´aszl´o Erd˝os, Antti Knowles, Horng-Tzer Yau, and Jun Yin. The local semicircle law for a general
2454
+ class of random matrices. Electronic Journal of Probability 18.none (2013), pp. 1–58.
2455
+ [13]
2456
+ Yukun He and Antti Knowles. Mesoscopic eigenvalue statistics of Wigner matrices. The Annals
2457
+ of Applied Probability 27 (2017), pp. 1510–1550.
2458
+ [14]
2459
+ Yukun He and Matteo Marcozzi. Diffusion profile for random band matrices: a short proof. J.
2460
+ Stat. Phys. 177 (2019), pp. 666–716.
2461
+ [15]
2462
+ Kurt Johansson. On fluctuations of eigenvalues of random Hermitian matrices. Duke Mathemat-
2463
+ ical Journal 91 (1998), pp. 151–204.
2464
+ [16]
2465
+ Alexei Khorunzhy, Boris Khoruzhenko, and Leonid Pastur. Asymptotic properties of large ran-
2466
+ dom matrices with independent entries. Journal of Mathematical Physics 37 (1996), pp. 5033–
2467
+ 5060.
2468
+ [17]
2469
+ Benjamin Landon, Patrick Lopatto, and Philippe Sosoe. Single eigenvalue fluctuations of general
2470
+ Wigner-type matrices. 2021. arXiv:2105.01178.
2471
+ 24
2472
+
2473
+ [18]
2474
+ Benjamin Landon and Philippe Sosoe. Almost-optimal bulk regularity conditions in the CLT for
2475
+ Wigner matrices. 2022. arXiv:2204.03419.
2476
+ [19]
2477
+ Benjamin Landon and Philippe Sosoe. Applications of mesoscopic CLTs in random matrix theory.
2478
+ The Annals of Applied Probability 30 (2020), pp. 2769–2795.
2479
+ [20]
2480
+ Yiting Li, Kevin Schnelli, and Yuanyuan Xu. Central limit theorem for mesoscopic eigenvalue
2481
+ statistics of deformed Wigner matrices and sample covariance matrices. Annales de l’Institut
2482
+ Henri Poincar´e, Probabilit´es et Statistiques 57 (2021), pp. 506–546.
2483
+ [21]
2484
+ Yiting Li and Yuanyuan Xu. On fluctuations of global and mesoscopic linear statistics of gener-
2485
+ alized Wigner matrices. Bernoulli 27 (2021), pp. 1057–1076.
2486
+ [22]
2487
+ Anna Lytova and Leonid Pastur. Central limit theorem for linear eigenvalue statistics of random
2488
+ matrices with independent entries. The Annals of Probability 37 (2009), pp. 1778–1840.
2489
+ [23]
2490
+ Mariya Shcherbina. Central Limit Theorem for linear eigenvalue statistics of the Wigner and
2491
+ sample covariance random matrices. Zh. Mat. Fiz. Anal. Geom. 7 (2011), pp. 176–192.
2492
+ [24]
2493
+ Philippe Sosoe and Percy Wong. Regularity conditions in the CLT for linear eigenvalue statistics
2494
+ of Wigner matrices. Advances in Mathematics 249 (2013), pp. 37–87.
2495
+ [25]
2496
+ Eugene Wigner. Characteristics Vectors of Bordered Matrices with Infinite Dimensions II. Annals
2497
+ of Mathematics 65.2 (1957), pp. 203–207.
2498
+ 25
2499
+
ANAzT4oBgHgl3EQfvv6Q/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/2301.00075v1.pdf.txt ADDED
@@ -0,0 +1,597 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ s
2
+ er
3
+ ne
4
+ ngi
5
+ E
6
+ al
7
+ ci
8
+ han
9
+ c
10
+ e
11
+ M
12
+ of Iranian Society of
13
+
14
+ ce
15
+ en
16
+ er
17
+ f
18
+ Con
19
+
20
+ al
21
+ on
22
+ i
23
+ nat
24
+ nter
25
+ I
26
+ ual
27
+ n
28
+ An
29
+
30
+ th
31
+ 30
32
+ The
33
+
34
+ 10 to 12 May, 2022, Tehran, Iran.
35
+
36
+
37
+ ISME2022-IC1332
38
+
39
+
40
+ 10 to 12 May, 2022
41
+
42
+
43
+ Optimal Motion Generation of the Bipedal Under-Actuated Planar Robot for Stair Climbing
44
+
45
+ Aref Amiri 1, Hassan Salarieh 2
46
+
47
+ 1Graduate Student, Sharif University of Technology, Tehran; aref.amiri@mech.sharif.edu
48
+ 2Professor, Sharif University of Technology, Tehran; salarieh@sharif.edu
49
+
50
+ Abstract
51
+ The importance of humanoid robots in today's world is
52
+ undeniable, one of the most important features of
53
+ humanoid robots is the ability to maneuver in
54
+ environments such as stairs that other robots can not
55
+ easily cross. A suitable algorithm to generate the path
56
+ for the bipedal robot to climb is very important. In this
57
+ paper, an optimization-based method to generate an
58
+ optimal stairway for under-actuated bipedal robots
59
+ without an ankle actuator is presented. The generated
60
+ paths are based on zero and non-zero dynamics of the
61
+ problem, and according to the satisfaction of the zero
62
+ dynamics constraint in the problem, tracking the path is
63
+ possible, in other words, the problem can be
64
+ dynamically feasible. The optimization method used in
65
+ the problem is a gradient-based method that has a
66
+ suitable
67
+ number
68
+ of
69
+ function
70
+ evaluations
71
+ for
72
+ computational processing. This method can also be
73
+ utilized to go down the stairs.
74
+
75
+ Keywords: Bipedal robot, under-actuated, optimization,
76
+ motion planning
77
+
78
+ Introduction
79
+ Inspired by human body physics, bipedal robots have
80
+ many degrees of freedom and can perform various
81
+ actions with their joint movements. Bipedal robots can
82
+ adapt to different environments that other wheeled
83
+ robots are unable to move. The study of path (trajectory)
84
+ generation methods as a reference for the output of the
85
+ control problem of bipedal robots in this regard is
86
+ essential. For the bipedal robot to climb the stairs, it is
87
+ necessary to analyze the movement of them ascending
88
+ the stairs and to examine the method of planning the
89
+ bipedal robot to move and to determine the position of
90
+ feet for walking on the stairs [1].
91
+ So far, researches have been done on how to go up
92
+ and downstairs and find a suitable or optimal path for
93
+ bipedal robots. Various papers using optimization
94
+ algorithms and considering the robot angles as
95
+ polynomial functions tried to design an optimal path for
96
+ a 6-degree bipedal robot [2]. Some articles have even
97
+ paths planned for multi-legged robots to cross the stairs
98
+ [3]. Some articles also used stability criteria such as
99
+ ZMP in designing their paths [4-7]. But this method is
100
+ only appliable for robots that have feet (soles) with ankle
101
+ joint actuators, which often have much lower speed in
102
+ maneuvering than under-actuated robots without feet,
103
+ and of course, due to the relatively large feet have more
104
+ wasted energy. Some articles also derive their initial path
105
+ using data based on motion capturing and then try to
106
+ optimize their results by combining optimization
107
+ methods [8]. However, according to the existing
108
+ literature, few articles have attempted to design a
109
+ holonomic path for under-actuated bipedal robots
110
+ without feet. Due to the importance of optimal motion
111
+ planning, a lot of work has been done in recent years in
112
+ this area.
113
+ In this paper, the problem of motion planning is
114
+ investigated to find the optimal paths for under-actuated
115
+ bipedal robots to step on the stairs, the results obtained
116
+ as a control output will cause the robot to move properly
117
+ and optimally. This article consists of three sections. In
118
+ the first part, the dynamic model of the bipedal robot is
119
+ derived. In the second part, the constraints of the
120
+ optimization problem are examined, in the third part, the
121
+ cost function and method of optimal problem solving
122
+ and finding a suitable movement gate are examined. In
123
+ the fourth section, the results are presented and
124
+ discussed, and at the end, the research of this article is
125
+ summarized as the conclusion.
126
+
127
+ Dynamics equation
128
+ The dynamic model of the robot is shown in Figure
129
+ 1. The robot has 7 degrees of freedom and 5 links,
130
+ each leg has two joints (one in the knee and the
131
+ other in the hip) and 3 degrees of freedom. We
132
+ assume that the contact of the tip of the leg is the
133
+ point.
134
+
135
+ Figure 1. Planar bipedal robot
136
+
137
+
138
+ 0.2
139
+ 10 to 12 May, 2022
140
+ The robot's motion is planar and the robot has 4
141
+ actuators, two actuators at the knees and two actuators
142
+ at the junction of the hip and the trunk so that there is
143
+ one actuator between each leg and trunk. It is assumed
144
+ that by hitting the tip of the swing leg on the ground, the
145
+ other leg rises from the ground, in other words, the
146
+ robot has no double support phase. So, when moving on
147
+ the stairs, no time is wasted for placing both feet on the
148
+ ground. Therefore, the hybrid dynamic equations of a
149
+ robot are a combination of a single support phase and
150
+ collision phase. The equations of the hybrid model are
151
+ as follows:
152
+ ( )
153
+ ( )
154
+ :
155
+ (
156
+ )
157
+ x
158
+ f x
159
+ g x u
160
+ x
161
+ x
162
+ x
163
+ x
164
+
165
+
166
+
167
+
168
+  
169
+
170
+ 
171
+
172
+  
173
+  
174
+ 
175
+ 
176
+ (1)
177
+ The vector
178
+ : (
179
+ ,
180
+ )
181
+ T
182
+ T T
183
+ x
184
+ q q
185
+
186
+ consists of the vector of
187
+ generalized coordinates and their derivatives.  is a map
188
+ to find the states of the system exactly after the collision,
189
+ and the positive and negative symbols indicate the states
190
+ of the system before and after the collision. The switch
191
+ condition is as follows:
192
+
193
+
194
+ 2
195
+ 2
196
+ ( , )
197
+ |
198
+ ( )
199
+ 0,
200
+ ( )
201
+ 0
202
+ v
203
+ h
204
+ q q
205
+ x P q
206
+ P
207
+ q
208
+  
209
+
210
+
211
+
212
+ (2)
213
+ In equation (2),
214
+ 2
215
+ h
216
+ P represents the horizontal position
217
+ of the swing leg and
218
+ 2
219
+ v
220
+ P represents its vertical position.
221
+ The dynamic equations of the robot before and after
222
+ the collision and in the single support phase can be
223
+ written as follows:
224
+  
225
+ ( )
226
+ ( , )
227
+ ( )
228
+ q
229
+ q q
230
+ q
231
+ q
232
+ M
233
+ q
234
+ C
235
+ q
236
+ G
237
+ B u
238
+
239
+
240
+
241
+ (3)
242
+ Matrix B is also a pre-multiplication matrix in the
243
+ torque vector and is not a square matrix due to the
244
+ under-actuation of the system.
245
+ In Equation 1, there is an expression called zero
246
+ dynamics, and it is easy to separate this term if the
247
+ generalized coordinates of the system are written in
248
+ relative terms (as has been done in this paper). The
249
+ satisfaction of this constraint is important in two ways.
250
+ First, if this constraint is not satisfied, the problem of
251
+ optimizing the input torques is practically ambiguous,
252
+ because these torques are not really applicable to the
253
+ problem. Although it may lead to a feasible kinematic
254
+ equation (kinematically possible), it is not feasible in
255
+ terms of control (open-loop), i.e. it is not dynamically
256
+ possible.
257
+
258
+ Optimization problem
259
+ The most important constraint of the problem, called
260
+ zero dynamics, was introduced in the previous section.
261
+ Other constraints in this issue are important to plan the
262
+ robot movement in the best way; the constraints of the
263
+ optimization problem are generally classified into two
264
+ general modes of constraints based on dynamics and
265
+ constraints based on kinematics.
266
+
267
+ 1. Dynamic constraints:
268
+ Torque limit: because the torque generators have a
269
+ certain limit (inequality constraint).
270
+ Zero dynamic: the importance of which was
271
+ mentioned earlier (equality constraint).
272
+ Coefficient of friction limit: for the robot to move on
273
+ real environments, the ratio of horizontal force to
274
+ vertical force should not be more or less than a certain
275
+ limit. In other words, the coefficient of friction required
276
+ for stepping should not exceed a certain limit that can
277
+ not be implemented in real environments. (inequality
278
+ constraint).
279
+ 2. Kinematic constraints:
280
+ Configuration: As an initial and final condition, the
281
+ robot needs to move from an initial configuration to a
282
+ final configuration. The best option is for the initial and
283
+ final state to be the same so that the robot has
284
+ periodicity in its movement and the best footprint is in
285
+ the middle of each stair Figure 2 (equality constraint).
286
+
287
+ height
288
+ width
289
+ clearance
290
+ best
291
+ footprint
292
+ r1
293
+ r2
294
+
295
+ Figure 2. Stair properties
296
+
297
+ Angular velocity limit: Because motors have limited
298
+ angular velocity production. (inequality constraint)
299
+ Contact in single support phase: The robot is in
300
+ contact with the ground during the single support phase
301
+ and the acceleration of the contact point in the
302
+ horizontal and vertical direction during this period is
303
+ zero. (equality constraint)
304
+ Swing leg collision: The robot swing leg during the
305
+ single-phase phase, except at the beginning and end of
306
+ the phase, should not collide with the ground, on the
307
+ other hand, should have a suitable distance to the
308
+ obstacles.
309
+ Knees movement limitation: To create maximum
310
+ similarity to human movement, the robot knee should
311
+ not be opened and closed too much.
312
+ Failure to satisfy any of the above constraints will cause
313
+ problems
314
+ in
315
+ creating
316
+ optimal
317
+ and
318
+ appropriate
319
+ movement.
320
+
321
+ Optimization method
322
+ This optimization is a nonlinear, constrained, and single-
323
+ objective problem.
324
+ Cost function: To find the optimal path, various cost
325
+ functions are considered, for example, the norm of
326
+ torque input, system input energy, and cost of transport
327
+ are common options. In this paper, we consider the
328
+ norm of torque inputs as the cost function. By this
329
+ choice, the torques are rational in size and will have
330
+ proper distribution (If the optimization problem is
331
+ solved properly).
332
+ 4
333
+ 2
334
+ 0
335
+ 0
336
+ (
337
+ ( ))
338
+ T
339
+ i
340
+ i
341
+ J
342
+ u
343
+ d
344
+
345
+
346
+
347
+
348
+
349
+
350
+ (4)
351
+ In the above equation, T is the length of the time
352
+ period.
353
+ Selection of optimization variables: Optimization
354
+ variables can have different types, one of the best
355
+ choices
356
+ is
357
+ the
358
+ paths
359
+ followed
360
+ by
361
+ generalized
362
+ coordinates. Here our choice is a time-varying path as a
363
+ function of polynomials. The polynomial functions are
364
+
365
+
366
+ 10 to 12 May, 2022
367
+ uniform and smooth, and they are also simple for
368
+ deriving.
369
+ 4
370
+ ,
371
+ 0
372
+ ( )
373
+ n
374
+ i
375
+ k
376
+ k i
377
+ i
378
+ q t
379
+ t
380
+
381
+
382
+
383
+ 
384
+ (5)
385
+ The degree of this polynomial must be chosen in
386
+ such a way that the number of optimization parameters,
387
+ which are the same as the number of polynomial
388
+ coefficients, are appropriate (minimum value to have a
389
+ smooth motion satisfied the mentioned constraints). In
390
+ this article, we choose the function of order 4 to have
391
+ freedom of action in terms of the optimization problem
392
+ and also not to make the number of optimization
393
+ parameters of the problem irrational and complicated.
394
+ Method of solving the optimization problem: This
395
+ optimization problem is solved by Variable Metric
396
+ methods for constrained optimization. This method is a
397
+ gradient-based method, which provides a desirable and
398
+ fast solution. Another advantage of this method is to not
399
+ get out easily from the feasible area [9].
400
+
401
+ Results and Discussion
402
+ Following the model and algorithm presented above, a
403
+ bipedal robot has been simulated to climb the stairs. The
404
+ height of the stairs is considered 20cm and the width of
405
+ the stairs is 40cm. The robot model specifications are in
406
+ accordance with Table 1. The initial and final angles of
407
+ the bipedal robot as a configuration are given in Table
408
+ 2. Here the initial and final configurations are intuitively
409
+ obtained from the human configuration. The speed of
410
+ crossing each step is .5 seconds. The torque limit
411
+ applied to the system is 150 N.m and the maximum
412
+ angular velocity of the motors 10 rad/sec can be.
413
+
414
+
415
+ Table 1. Rabbit robot properties [10]
416
+ Symbol
417
+ Value
418
+ m1, m5
419
+ 3.2 kg
420
+ m2, m4
421
+ 6.8 kg
422
+ m3
423
+ 20 kg
424
+ I1, I5
425
+ 0.93 kg-m2
426
+ I2, I4
427
+ 1.08 kg-m2
428
+ I3
429
+ 2.22 kg-m2
430
+ l1, l5
431
+ 0.4 m
432
+ l2, l4
433
+ 0.4 m
434
+ l3
435
+ 0.625 m
436
+ d1, d5
437
+ 0.128 m
438
+ d2, d4
439
+ 0.163 m
440
+ d3
441
+ 0.2 m
442
+
443
+
444
+
445
+ Table 2. The initial and final configuration
446
+ Parameters
447
+ Initial value(rad)
448
+ Final value(rad)
449
+ q1
450
+ 0.2618
451
+ 0.1964
452
+ q2
453
+ 1.3140
454
+ 0
455
+ q3
456
+ -1.2267
457
+ 0.0219
458
+ q4
459
+ -0.0219
460
+ 1.2267
461
+ q5
462
+ 0
463
+ 1.3140
464
+
465
+
466
+ Figure 3. Input torques
467
+
468
+ According to Figure 3, the torques have a good
469
+ margin from the saturation and compared to other
470
+ articles and research reviewed in the introduction, more
471
+ optimal results have been obtained, also zero dynamics
472
+ (
473
+ v ) in a very good way is satisfied.
474
+
475
+ Figure 4. Friction coefficient
476
+
477
+ According to Figure 4, it is clear that the generated
478
+ path needs the maximum coefficient of friction .69 to
479
+ slip, so on all surfaces that have a coefficient of friction
480
+ higher than .69 there is the ability to move.
481
+
482
+ Figure 5. Angles vs. angular velocities
483
+
484
+ According to Figure 5, the generated paths, due to
485
+ the nature of the polynomial functions, have a smooth
486
+
487
+
488
+ 10 to 12 May, 2022
489
+ and non-breaking behavior, and the angular velocities
490
+ are far from their saturation limit.
491
+
492
+
493
+ Figure 6. Stick diagram of the climbing a stair up
494
+
495
+ As can be seen in Figure 6, the robot's movement is
496
+ quite normal and very similar to human movement. The
497
+ trunk is kept in a good position and also the tip of the
498
+ feet and other links do not touch the surfaces except at
499
+ the beginning and at the end of the movement.
500
+ According to the sum of the presented results, the
501
+ generated path is an optimal path for the proper gait of
502
+ the under-actuated bipedal robot.
503
+
504
+ Conclusions
505
+ In this article, we present a method to generate optimal
506
+ motion for a bipedal robot, we used this method to find
507
+ the paths that the 'rabbit' robot by tracking them can
508
+ optimally climb stairs. This process consists of 3 parts:
509
+ robot dynamic extraction (because optimization is based
510
+ on the model), design of constraints based on dynamics
511
+ and kinematics, and optimization. As a result of the
512
+ problem, a series of virtual holonomic paths were
513
+ extracted in which the zero hybrid dynamics of the
514
+ problem is also satisfied, so tracking the paths are
515
+ possible for under-actuated robots.
516
+ In the future, we plan to use a new method called impact
517
+ invariance to design the above path, which guarantees
518
+ the periodicity of the proposed paths.
519
+
520
+
521
+ References
522
+
523
+ [1] Goldfarb, Nathaniel, Charles Bales, and Gregory S.
524
+ Fischer. "Toward Generalization of Bipedal Gait
525
+ Cycle During Stair Climbing Using Learning From
526
+ Demonstration." IEEE Transactions on Medical
527
+ Robotics and Bionics 3.2 (2021): 446-454.
528
+ [2] Kweon Soo Jeon, Ohung Kwon, Jong Hyeon Park.
529
+ Optimal trajectory generation for a biped robot
530
+ walking
531
+ a
532
+ staircase
533
+ based
534
+ on
535
+ genetic
536
+ algorithms[C]//Proceedings
537
+ of
538
+ 2004
539
+ IEEE/RSJ
540
+ International Conference on Intelligent Robots and
541
+ Systems, Sendai, Japan: IEEE, 2004: 2837- 2842.
542
+ [3] Cebe, Oguzhan, et al. "Online dynamic trajectory
543
+ optimization and control for a quadruped robot."
544
+ 2021 IEEE International Conference on Robotics
545
+ and Automation (ICRA). IEEE, 2021.
546
+ [4] Kim, Eun-Su, Jo-Hwan Kim, and Jong-Wook Kim.
547
+ "Generation of optimal trajectories for ascending
548
+ and descending a stair of a humanoid based on
549
+ uDEAS." 2009 IEEE International Conference on
550
+ Fuzzy Systems. IEEE, 2009.
551
+ [5] Sugahara, Yusuke, et al. "Walking up and down
552
+ stairs carrying a human by a biped locomotor with
553
+ parallel mechanism." 2005 IEEE/RSJ International
554
+ Conference on Intelligent Robots and Systems.
555
+ IEEE, 2005.
556
+ [6] Zhang, Qin, et al. "Action generation of a biped
557
+ robot climbing stairs." 2013 IEEE International
558
+ Conference on Mechatronics and Automation.
559
+ IEEE, 2013.
560
+ [7] Kim, E., T. Kim, and J-W. Kim. "Three-dimensional
561
+ modelling of a humanoid in three planes and a
562
+ motion scheme of biped turning in standing." IET
563
+ control theory & applications 3.9 (2009): 1155-
564
+ 1166.
565
+ [8] Powell, Matthew J., Huihua Zhao, and Aaron D.
566
+ Ames. "Motion primitives for human-inspired
567
+ bipedal robotic locomotion: walking and stair
568
+ climbing." 2012 IEEE International Conference on
569
+ Robotics and Automation. IEEE, 2012.Misc, A.,
570
+ 2003. Miscellaneous Title. On the WWW, May.
571
+ URL http://www.abc.edu.
572
+ [9] Powell, Michael JD. "A fast algorithm for
573
+ nonlinearly constrained optimization calculations."
574
+ Numerical analysis. Springer, Berlin, Heidelberg,
575
+ 1978. 144-157..
576
+ [10] Chevallereau, Christine, et al. "Rabbit: A testbed for
577
+ advanced control theory." IEEE Control Systems
578
+ Magazine 23.5 (2003): 57-79.
579
+
580
+
581
+
582
+
583
+
584
+
585
+
586
+
587
+
588
+ 2
589
+ 1.5
590
+ 0.5
591
+ -0.5
592
+ -0.5
593
+ 0
594
+ 0.5
595
+ 1
596
+ 1.5
597
+ 2
BtAyT4oBgHgl3EQfR_cQ/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,187 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf,len=186
2
+ page_content='s er ne ngi E al ci han c e M of Iranian Society of ce en er f Con al on i nat nter I ual n An th 30 The 10 to 12 May, 2022, Tehran, Iran.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
3
+ page_content=' ISME2022-IC1332 10 to 12 May, 2022 Optimal Motion Generation of the Bipedal Under-Actuated Planar Robot for Stair Climbing Aref Amiri 1, Hassan Salarieh 2 1Graduate Student, Sharif University of Technology, Tehran;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
4
+ page_content=' aref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
5
+ page_content='amiri@mech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
6
+ page_content='sharif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
7
+ page_content='edu 2Professor, Sharif University of Technology, Tehran;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
8
+ page_content=' salarieh@sharif.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
9
+ page_content="edu Abstract The importance of humanoid robots in today's world is undeniable, one of the most important features of humanoid robots is the ability to maneuver in environments such as stairs that other robots can not easily cross." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
10
+ page_content=' A suitable algorithm to generate the path for the bipedal robot to climb is very important.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
11
+ page_content=' In this paper, an optimization-based method to generate an optimal stairway for under-actuated bipedal robots without an ankle actuator is presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
12
+ page_content=' The generated paths are based on zero and non-zero dynamics of the problem, and according to the satisfaction of the zero dynamics constraint in the problem, tracking the path is possible, in other words, the problem can be dynamically feasible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
13
+ page_content=' The optimization method used in the problem is a gradient-based method that has a suitable number of function evaluations for computational processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
14
+ page_content=' This method can also be utilized to go down the stairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
15
+ page_content=' Keywords: Bipedal robot, under-actuated, optimization, motion planning Introduction Inspired by human body physics, bipedal robots have many degrees of freedom and can perform various actions with their joint movements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
16
+ page_content=' Bipedal robots can adapt to different environments that other wheeled robots are unable to move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
17
+ page_content=' The study of path (trajectory) generation methods as a reference for the output of the control problem of bipedal robots in this regard is essential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
18
+ page_content=' For the bipedal robot to climb the stairs, it is necessary to analyze the movement of them ascending the stairs and to examine the method of planning the bipedal robot to move and to determine the position of feet for walking on the stairs [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
19
+ page_content=' So far, researches have been done on how to go up and downstairs and find a suitable or optimal path for bipedal robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
20
+ page_content=' Various papers using optimization algorithms and considering the robot angles as polynomial functions tried to design an optimal path for a 6-degree bipedal robot [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
21
+ page_content=' Some articles have even paths planned for multi-legged robots to cross the stairs [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
22
+ page_content=' Some articles also used stability criteria such as ZMP in designing their paths [4-7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
23
+ page_content=' But this method is only appliable for robots that have feet (soles) with ankle joint actuators, which often have much lower speed in maneuvering than under-actuated robots without feet, and of course, due to the relatively large feet have more wasted energy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
24
+ page_content=' Some articles also derive their initial path using data based on motion capturing and then try to optimize their results by combining optimization methods [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
25
+ page_content=' However, according to the existing literature, few articles have attempted to design a holonomic path for under-actuated bipedal robots without feet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
26
+ page_content=' Due to the importance of optimal motion planning, a lot of work has been done in recent years in this area.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
27
+ page_content=' In this paper, the problem of motion planning is investigated to find the optimal paths for under-actuated bipedal robots to step on the stairs, the results obtained as a control output will cause the robot to move properly and optimally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
28
+ page_content=' This article consists of three sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
29
+ page_content=' In the first part, the dynamic model of the bipedal robot is derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
30
+ page_content=' In the second part, the constraints of the optimization problem are examined, in the third part, the cost function and method of optimal problem solving and finding a suitable movement gate are examined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
31
+ page_content=' In the fourth section, the results are presented and discussed, and at the end, the research of this article is summarized as the conclusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
32
+ page_content=' Dynamics equation The dynamic model of the robot is shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
33
+ page_content=' The robot has 7 degrees of freedom and 5 links, each leg has two joints (one in the knee and the other in the hip) and 3 degrees of freedom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
34
+ page_content=' We assume that the contact of the tip of the leg is the point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
35
+ page_content=' Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
36
+ page_content=' Planar bipedal robot 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
37
+ page_content="2 10 to 12 May, 2022 The robot's motion is planar and the robot has 4 actuators, two actuators at the knees and two actuators at the junction of the hip and the trunk so that there is one actuator between each leg and trunk." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
38
+ page_content=' It is assumed that by hitting the tip of the swing leg on the ground, the other leg rises from the ground, in other words, the robot has no double support phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
39
+ page_content=' So, when moving on the stairs, no time is wasted for placing both feet on the ground.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
40
+ page_content=' Therefore, the hybrid dynamic equations of a robot are a combination of a single support phase and collision phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
41
+ page_content=' The equations of the hybrid model are as follows: ( ) ( ) : ( ) x f x g x u x x x x \uf02d \uf02b \uf02d \uf02d \uf0ec \uf03d \uf02b \uf0cf\uf047 \uf0ef \uf053 \uf0ed \uf03d \uf044 \uf0ce\uf047 \uf0ef\uf0ee (1) The vector : ( , ) T T T x q q \uf03d consists of the vector of generalized coordinates and their derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
42
+ page_content=' \uf044 is a map to find the states of the system exactly after the collision, and the positive and negative symbols indicate the states of the system before and after the collision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
43
+ page_content=' The switch condition is as follows: \uf07b \uf07d 2 2 ( , ) | ( ) 0, ( ) 0 v h q q x P q P q \uf047 \uf03d \uf0ce \uf03d \uf03e (2) In equation (2), 2 h P represents the horizontal position of the swing leg and 2 v P represents its vertical position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
44
+ page_content=' The dynamic equations of the robot before and after the collision and in the single support phase can be written as follows: \uf028 \uf029 ( ) ( , ) ( ) q q q q q M q C q G B u \uf02b \uf02b \uf03d (3) Matrix B is also a pre-multiplication matrix in the torque vector and is not a square matrix due to the under-actuation of the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
45
+ page_content=' In Equation 1, there is an expression called zero dynamics, and it is easy to separate this term if the generalized coordinates of the system are written in relative terms (as has been done in this paper).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
46
+ page_content=' The satisfaction of this constraint is important in two ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
47
+ page_content=' First, if this constraint is not satisfied, the problem of optimizing the input torques is practically ambiguous, because these torques are not really applicable to the problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
48
+ page_content=' Although it may lead to a feasible kinematic equation (kinematically possible), it is not feasible in terms of control (open-loop), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
49
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
50
+ page_content=' it is not dynamically possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
51
+ page_content=' Optimization problem The most important constraint of the problem, called zero dynamics, was introduced in the previous section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
52
+ page_content=' Other constraints in this issue are important to plan the robot movement in the best way;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
53
+ page_content=' the constraints of the optimization problem are generally classified into two general modes of constraints based on dynamics and constraints based on kinematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
54
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
55
+ page_content=' Dynamic constraints: Torque limit: because the torque generators have a certain limit (inequality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
56
+ page_content=' Zero dynamic: the importance of which was mentioned earlier (equality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
57
+ page_content=' Coefficient of friction limit: for the robot to move on real environments, the ratio of horizontal force to vertical force should not be more or less than a certain limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
58
+ page_content=' In other words, the coefficient of friction required for stepping should not exceed a certain limit that can not be implemented in real environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
59
+ page_content=' (inequality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
60
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
61
+ page_content=' Kinematic constraints: Configuration: As an initial and final condition, the robot needs to move from an initial configuration to a final configuration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
62
+ page_content=' The best option is for the initial and final state to be the same so that the robot has periodicity in its movement and the best footprint is in the middle of each stair Figure 2 (equality constraint).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
63
+ page_content=' height width clearance best footprint r1 r2 Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
64
+ page_content=' Stair properties Angular velocity limit: Because motors have limited angular velocity production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
65
+ page_content=' (inequality constraint) Contact in single support phase: The robot is in contact with the ground during the single support phase and the acceleration of the contact point in the horizontal and vertical direction during this period is zero.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
66
+ page_content=' (equality constraint) Swing leg collision: The robot swing leg during the single-phase phase, except at the beginning and end of the phase, should not collide with the ground, on the other hand, should have a suitable distance to the obstacles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
67
+ page_content=' Knees movement limitation: To create maximum similarity to human movement, the robot knee should not be opened and closed too much.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
68
+ page_content=' Failure to satisfy any of the above constraints will cause problems in creating optimal and appropriate movement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
69
+ page_content=' Optimization method This optimization is a nonlinear, constrained, and single- objective problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
70
+ page_content=' Cost function: To find the optimal path, various cost functions are considered, for example, the norm of torque input, system input energy, and cost of transport are common options.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
71
+ page_content=' In this paper, we consider the norm of torque inputs as the cost function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
72
+ page_content=' By this choice, the torques are rational in size and will have proper distribution (If the optimization problem is solved properly).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
73
+ page_content=' 4 2 0 0 ( ( )) T i i J u d \uf074 \uf074 \uf03d \uf03d \uf0e5 \uf0f2 (4) In the above equation, T is the length of the time period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
74
+ page_content=' Selection of optimization variables: Optimization variables can have different types, one of the best choices is the paths followed by generalized coordinates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
75
+ page_content=' Here our choice is a time-varying path as a function of polynomials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
76
+ page_content=' The polynomial functions are 10 to 12 May, 2022 uniform and smooth, and they are also simple for deriving.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
77
+ page_content=' 4 , 0 ( ) n i k k i i q t t \uf061 \uf03d \uf03d \uf03d\uf0e5 (5) The degree of this polynomial must be chosen in such a way that the number of optimization parameters, which are the same as the number of polynomial coefficients, are appropriate (minimum value to have a smooth motion satisfied the mentioned constraints).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
78
+ page_content=' In this article, we choose the function of order 4 to have freedom of action in terms of the optimization problem and also not to make the number of optimization parameters of the problem irrational and complicated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
79
+ page_content=' Method of solving the optimization problem: This optimization problem is solved by Variable Metric methods for constrained optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
80
+ page_content=' This method is a gradient-based method, which provides a desirable and fast solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
81
+ page_content=' Another advantage of this method is to not get out easily from the feasible area [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
82
+ page_content=' Results and Discussion Following the model and algorithm presented above, a bipedal robot has been simulated to climb the stairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
83
+ page_content=' The height of the stairs is considered 20cm and the width of the stairs is 40cm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
84
+ page_content=' The robot model specifications are in accordance with Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
85
+ page_content=' The initial and final angles of the bipedal robot as a configuration are given in Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
86
+ page_content=' Here the initial and final configurations are intuitively obtained from the human configuration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
87
+ page_content=' The speed of crossing each step is .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
88
+ page_content='5 seconds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
89
+ page_content=' The torque limit applied to the system is 150 N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
90
+ page_content='m and the maximum angular velocity of the motors 10 rad/sec can be.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
91
+ page_content=' Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
92
+ page_content=' Rabbit robot properties [10] Symbol Value m1, m5 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
93
+ page_content='2 kg m2, m4 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
94
+ page_content='8 kg m3 20 kg I1, I5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
95
+ page_content='93 kg-m2 I2, I4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
96
+ page_content='08 kg-m2 I3 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
97
+ page_content='22 kg-m2 l1, l5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
98
+ page_content='4 m l2, l4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
99
+ page_content='4 m l3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
100
+ page_content='625 m d1, d5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
101
+ page_content='128 m d2, d4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
102
+ page_content='163 m d3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
103
+ page_content='2 m Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
104
+ page_content=' The initial and final configuration Parameters Initial value(rad) Final value(rad) q1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
105
+ page_content='2618 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
106
+ page_content='1964 q2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
107
+ page_content='3140 0 q3 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
108
+ page_content='2267 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
109
+ page_content='0219 q4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
110
+ page_content='0219 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
111
+ page_content='2267 q5 0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
112
+ page_content='3140 Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
113
+ page_content=' Input torques According to Figure 3, the torques have a good margin from the saturation and compared to other articles and research reviewed in the introduction, more optimal results have been obtained, also zero dynamics ( v\uf074 ) in a very good way is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
114
+ page_content=' Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
115
+ page_content=' Friction coefficient According to Figure 4, it is clear that the generated path needs the maximum coefficient of friction .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
116
+ page_content='69 to slip, so on all surfaces that have a coefficient of friction higher than .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
117
+ page_content='69 there is the ability to move.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
118
+ page_content=' Figure 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
119
+ page_content=' Angles vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
120
+ page_content=' angular velocities According to Figure 5, the generated paths, due to the nature of the polynomial functions, have a smooth 10 to 12 May, 2022 and non-breaking behavior, and the angular velocities are far from their saturation limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
121
+ page_content=' Figure 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
122
+ page_content=" Stick diagram of the climbing a stair up As can be seen in Figure 6, the robot's movement is quite normal and very similar to human movement." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
123
+ page_content=' The trunk is kept in a good position and also the tip of the feet and other links do not touch the surfaces except at the beginning and at the end of the movement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
124
+ page_content=' According to the sum of the presented results, the generated path is an optimal path for the proper gait of the under-actuated bipedal robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
125
+ page_content=" Conclusions In this article, we present a method to generate optimal motion for a bipedal robot, we used this method to find the paths that the 'rabbit' robot by tracking them can optimally climb stairs." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
126
+ page_content=' This process consists of 3 parts: robot dynamic extraction (because optimization is based on the model), design of constraints based on dynamics and kinematics, and optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
127
+ page_content=' As a result of the problem, a series of virtual holonomic paths were extracted in which the zero hybrid dynamics of the problem is also satisfied, so tracking the paths are possible for under-actuated robots.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
128
+ page_content=' In the future, we plan to use a new method called impact invariance to design the above path, which guarantees the periodicity of the proposed paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
129
+ page_content=' References [1] Goldfarb, Nathaniel, Charles Bales, and Gregory S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
130
+ page_content=' Fischer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
131
+ page_content=' "Toward Generalization of Bipedal Gait Cycle During Stair Climbing Using Learning From Demonstration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
132
+ page_content='" IEEE Transactions on Medical Robotics and Bionics 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
133
+ page_content='2 (2021): 446-454.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
134
+ page_content=' [2] Kweon Soo Jeon, Ohung Kwon, Jong Hyeon Park.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
135
+ page_content=' Optimal trajectory generation for a biped robot walking a staircase based on genetic algorithms[C]//Proceedings of 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan: IEEE, 2004: 2837- 2842.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
136
+ page_content=' [3] Cebe, Oguzhan, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
137
+ page_content=' "Online dynamic trajectory optimization and control for a quadruped robot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
138
+ page_content='" 2021 IEEE International Conference on Robotics and Automation (ICRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
139
+ page_content=' IEEE, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
140
+ page_content=' [4] Kim, Eun-Su, Jo-Hwan Kim, and Jong-Wook Kim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
141
+ page_content=' "Generation of optimal trajectories for ascending and descending a stair of a humanoid based on uDEAS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
142
+ page_content='" 2009 IEEE International Conference on Fuzzy Systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
143
+ page_content=' IEEE, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
144
+ page_content=' [5] Sugahara, Yusuke, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
145
+ page_content=' "Walking up and down stairs carrying a human by a biped locomotor with parallel mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
146
+ page_content='" 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
147
+ page_content=' IEEE, 2005.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
148
+ page_content=' [6] Zhang, Qin, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
149
+ page_content=' "Action generation of a biped robot climbing stairs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
150
+ page_content='" 2013 IEEE International Conference on Mechatronics and Automation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
151
+ page_content=' IEEE, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
152
+ page_content=' [7] Kim, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
153
+ page_content=', T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
154
+ page_content=' Kim, and J-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
155
+ page_content=' Kim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
156
+ page_content=' "Three-dimensional modelling of a humanoid in three planes and a motion scheme of biped turning in standing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
157
+ page_content='" IET control theory & applications 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
158
+ page_content='9 (2009): 1155- 1166.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
159
+ page_content=' [8] Powell, Matthew J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
160
+ page_content=', Huihua Zhao, and Aaron D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
161
+ page_content=' Ames.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
162
+ page_content=' "Motion primitives for human-inspired bipedal robotic locomotion: walking and stair climbing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
163
+ page_content='" 2012 IEEE International Conference on Robotics and Automation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
164
+ page_content=' IEEE, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
165
+ page_content='Misc, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
166
+ page_content=', 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
167
+ page_content=' Miscellaneous Title.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
168
+ page_content=' On the WWW, May.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
169
+ page_content=' URL http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
170
+ page_content='abc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
171
+ page_content='edu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
172
+ page_content=' [9] Powell, Michael JD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
173
+ page_content=' "A fast algorithm for nonlinearly constrained optimization calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
174
+ page_content='" Numerical analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
175
+ page_content=' Springer, Berlin, Heidelberg, 1978.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
176
+ page_content=' 144-157.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
177
+ page_content='. [10] Chevallereau, Christine, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
178
+ page_content=' "Rabbit: A testbed for advanced control theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
179
+ page_content='" IEEE Control Systems Magazine 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
180
+ page_content='5 (2003): 57-79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
181
+ page_content=' 2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
182
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
183
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
184
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
185
+ page_content='5 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
186
+ page_content='5 1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
187
+ page_content='5 2' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BtAyT4oBgHgl3EQfR_cQ/content/2301.00075v1.pdf'}
DtE4T4oBgHgl3EQf6Q5X/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cf0d72c9bccb4522409c7786e281982bd48758a4e9b8d380d8450d0a67dcd820
3
+ size 98708
GNE0T4oBgHgl3EQfRQAC/content/tmp_files/2301.02203v1.pdf.txt ADDED
@@ -0,0 +1,1210 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02203v1 [math.CO] 5 Jan 2023
2
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC
3
+ GROUP BY PRIME POWERS
4
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
5
+ In memory of Chandra Sekhar Raju
6
+ Abstract. Let k be a positive integer. We show that, as n goes to infinity, almost every
7
+ entry of the character table of Sn is divisible by k. This proves a conjecture of Miller.
8
+ 1. Introduction
9
+ It is a standard fact that the irreducible characters of Sn take only integer values for every
10
+ natural number n. In 2017, Miller [11] computed the character tables of Sn for all n ≤ 38
11
+ and looked at various statistical properties of these integers as n grew. His computations
12
+ suggested that
13
+ (1) the density of even entries seemed to tend to 1,
14
+ (2) the density of entries divisible by 3, the density of entries divisible by 5, and the
15
+ density of entries divisible by 7 seemed to increase as n grew,
16
+ (3) about half of the nonzero entries were positive,
17
+ (4) and the density of zeros in the character table seemed to decrease as n grew, but not
18
+ very quickly.
19
+ Based on this first observation, Miller [11, 13] conjectured that as n goes to infinity, almost
20
+ every entry of the character table of the symmetric group Sn is even.
21
+ Following partial
22
+ progress due to McKay [10], Gluck [5], and Morotti [14], the first author proved this conjec-
23
+ ture in [15]. Based on the second observation, Miller [11, 13] also conjectured, more generally,
24
+ that for any fixed prime p, almost every entry of the character table of Sn is a multiple of
25
+ p as n goes to infinity. We proved this conjecture in [16], with a uniform upper bound for
26
+ the number of entries not divisible by a fixed prime. Recently, Miller [12] conjectured, even
27
+ more generally, that for any fixed prime power q, almost every entry of the character table
28
+ of Sn is a multiple of q as n goes to infinity. In this paper, we prove this most general of
29
+ Miller’s conjectures.
30
+ Theorem 1.1. Let n be large and q ≤ 10−3 log n/(log log n)2 be a prime power. The number
31
+ of entries in the character table of Sn that are not divisible by q is at most
32
+ O
33
+
34
+ p(n)2 exp(−(log log n)2)
35
+
36
+ .
37
+ It follows immediately from Theorem 1.1 and the union bound that almost every entry of
38
+ the character table of Sn is divisible by any fixed integer as n goes to infinity.
39
+ Corollary 1.2. Let k be any positive integer. Then, as n goes to infinity, the proportion of
40
+ entries in the character table of Sn that are not divisible by k tends to 0.
41
+ Our methods do not seem to shed any light on Miller’s third and fourth observations.
42
+ Most interesting to us is the question of what proportion of character table entries are zero,
43
+ 1
44
+
45
+ 2
46
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
47
+ and it is not clear from Miller’s data whether the proportion is decreasing to zero or some
48
+ positive constant. Combining the Murnaghan–Nakayama rule and an old result of Erd˝os
49
+ and Lehner [2] on the distribution of the largest part of a uniformly random partition of n
50
+ produces a proportion of
51
+ 1
52
+ log n zeros in the character table of Sn, and it appears that no lower
53
+ bound of a larger order of magnitude is known. In the related setting of finite simple groups
54
+ of Lie type, Larsen and Miller [7] have shown that almost every character table entry is zero
55
+ as the rank goes to infinity.
56
+ Acknowledgments.
57
+ The first author is partially supported by the NSF Mathematical
58
+ Sciences Postdoctoral Research Fellowship Program under Grant No. DMS-1903038 and by
59
+ the Oswald Veblen Fund. The second author is partially supported by a grant from the
60
+ National Science Foundation, and a Simons Investigator Grant from the Simons Foundation.
61
+ We thank David Speyer for drawing our attention to Lemma 2.1.
62
+ 2. Proof outline
63
+ For any partitions λ and µ of n, let χλ
64
+ µ denote the value of the irreducible character of
65
+ Sn corresponding to λ on the conjugacy class of elements with cycle type corresponding to
66
+ µ. In [16], our argument proceeded by combining two key facts: (i) if µ contains a part
67
+ substantially larger than the typical largest part of a random partition, then χλ
68
+ µ = 0 for
69
+ almost every λ, and (ii) if ν is another partition of n that is obtained from µ by combining
70
+ p parts of the same size m into one part of size pm, then χλ
71
+ µ ≡ χλ
72
+ ν (mod p) for every λ.
73
+ We showed that, for almost every µ, repeatedly combining p parts of the same size in this
74
+ manner produces a partition �µ containing a very large part, large enough so that χλ
75
+ �µ must
76
+ be zero for almost every λ. Our main result on the divisibility of character values by primes
77
+ then followed from the fact that χλ
78
+ µ ≡ χλ
79
+ �µ (mod p) for every λ.
80
+ The second key fact generalizes to a congruence of character value modulo prime powers
81
+ in a straightforward manner.
82
+ Lemma 2.1. Let pr be a power of the prime p. Suppose that µ is a partition of n, and that
83
+ ν is another partition of n obtained from µ by replacing pr parts of the same size m by pr−1
84
+ parts of size pm. Then for all partitions λ of n, we have
85
+ χλ
86
+ µ ≡ χλ
87
+ ν
88
+ (mod pr).
89
+ However, when r > 1, it is no longer the case that starting from a typical partition µ of n
90
+ and repeatedly combining pr parts of the same size m into pr−1 parts of size pm produces a
91
+ partition �µ containing a part substantially larger than the largest part of a typical partition
92
+ of n. The argument from [16] that worked for primes thus breaks down for all other prime
93
+ powers.
94
+ The key idea used to overcome this barrier is a new condition for character values of the
95
+ symmetric group to be divisible by a fixed prime power, which we prove by exploiting certain
96
+ symmetries that appear after applying the Murnaghan–Nakayama rule multiple times.
97
+ Theorem 2.2. Let n, m1, . . . , mr be distinct positive integers. Let µ be a partition of n
98
+ containing parts of size m1, . . . , mr, each appearing at least pr−1 times. If λ is a (�r
99
+ i=1 kimi)-
100
+ core partition of n for all r-tuples (k1, . . . , kr) of integers 0 ≤ k1, . . . , kr ≤ pr−1 for which
101
+ some ki = pr−1, then
102
+ pr | χλ
103
+ µ.
104
+
105
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
106
+ 3
107
+ Starting with a partition µ of n, repeatedly combine pr parts of the same size m into pr−1
108
+ parts of size pm, until the process terminates in a partition �µ where no part appears more
109
+ than pr − 1 times. As a preliminary to applying Theorem 2.2 we show that for a typical
110
+ partition µ, the resulting partition �µ will have r parts that are suitably large, and with each
111
+ appearing at least pr−1 times.
112
+ Proposition 2.3. Starting with a partition µ of n, repeatedly replace every occurrence of pr
113
+ parts of the same size m by pr−1 parts of size pm until we arrive at a partition ˜µ where no
114
+ part appears more than pr − 1 times. Then, except for
115
+ O
116
+
117
+ p(n) exp
118
+
119
+ −n1/20pr��
120
+ initial partitions µ, the partition �µ contains at least r distinct parts m1, . . . , mr, each appear-
121
+ ing at least pr−1 times and satisfying
122
+ pr−1mj >
123
+
124
+ 1 + 1
125
+ 6pr
126
+ �√
127
+ 6
128
+
129
+ √n log n.
130
+ This holds uniformly for pr ≤ 10−3 log n/(log log n)2.
131
+ The significance of the lower bound on pr−1mj in Proposition 2.3 is that it lies beyond the
132
+ threshold of values t such that almost every partition of n is a t-core.
133
+ Lemma 2.4. Let 1 ≤ L ≤ log n/ log log n be a real number. Then, for any given integer t
134
+ with
135
+ t ≥
136
+
137
+ 1 + 1
138
+ L
139
+ �√
140
+ 6
141
+
142
+ √n log n,
143
+ all but
144
+ O
145
+
146
+ p(n) log n
147
+ n1/2L
148
+
149
+ partitions of n are t-cores.
150
+ We can swiftly deduce our main result, Theorem 1.1, from the results stated above.
151
+ Deducing Theorem 1.1. Let µ be a partition of n, and suppose that �µ is as in Proposition 2.3.
152
+ Then, for all but at most
153
+ O
154
+
155
+ p(n) exp
156
+
157
+ −n1/20pr��
158
+ choices of µ, the partition �µ contains at least r distinct parts m1, . . . , mr, each appearing at
159
+ least pr−1 times and satisfying
160
+ (2.1)
161
+ pr−1mj >
162
+
163
+ 1 + 1
164
+ 6pr
165
+ �√
166
+ 6
167
+
168
+ √n log n.
169
+ Consider any r-tuple (k1, . . . , kr) with 0 ≤ k1, . . . , kr ≤ pr−1 and ki = pr−1 for some i.
170
+ Then k1m1 + . . . + krmr also exceeds the bound in (2.1), so that by Lemma 2.4 all but
171
+ O(p(n)(log n)/n
172
+ 1
173
+ 2L) partitions λ of n are (k1m1 + . . . + krmr)-cores. Since there are at most
174
+ r(pr−1 + 1)r−1 such r-tuples (k1, . . . , kr), by the union bound we see that all but at most
175
+ O
176
+
177
+ p(n) log n
178
+ n1/12pr r
179
+
180
+ pr−1 + 1
181
+ �r−1
182
+
183
+ partitions λ of n are (k1m1 + . . . + krmr)-cores for all choices of the r-tuple (k1, . . . , kr).
184
+
185
+ 4
186
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
187
+ Theorem 2.2 now shows that pr divides χλ
188
+ �µ, and since χλ
189
+ µ ≡ χλ
190
+ �µ (mod pr) by Lemma 2.1, it
191
+ also follows that pr divides χλ
192
+ µ. Putting everything together, we conclude that the number
193
+ of partitions λ and µ with pr ∤ χλ
194
+ µ is at most
195
+ O
196
+
197
+ p(n)2�
198
+ exp(−n1/(20pr)) +
199
+ 1
200
+ n1/13pr r
201
+
202
+ pr−1 + 1
203
+ �r−1 ��
204
+ = O
205
+
206
+ p(n)2 exp(−(log log n)2)
207
+
208
+ ,
209
+ in the range pr ≤ 10−3 log n/(log log n)2.
210
+
211
+ The rest of the paper is organized as follows.
212
+ We will prove Lemmas 2.1 and 2.4 in
213
+ Section 3, Theorem 2.2 in Sections 4, 5, 6, and 7, and Proposition 2.3 in Sections 8 and 9.
214
+ 3. Proofs of Lemmas 2.1 and 2.4
215
+ We begin by proving the two lemmas stated in the previous section.
216
+ Proof of Lemma 2.1. We claim that if Q ∈ Z[x1, . . . , xk] is a polynomial with integer coeffi-
217
+ cients, then
218
+ Q(x1, . . . , xk)pr ≡ Q(xp
219
+ 1, . . . , xp
220
+ k)pr−1
221
+ (mod pr).
222
+ As is well known, we may write
223
+ (3.1)
224
+ Q(x1, . . . , xk)p = Q(xp
225
+ 1, . . . , xp
226
+ k) + p · R(x1, . . . , xk)
227
+ for some R ∈ Z[x1, . . . , xk], which establishes the claim when r = 1. For r > 1, raise both
228
+ sides of (3.1) to the power pr−1, and expand using the binomial theorem:
229
+ Q(x1, . . . , xk)pr = (Q(xp
230
+ 1, . . . , xp
231
+ k) + p · R(x1, . . . , xk))pr−1
232
+ = Q(xp
233
+ 1, . . . , xp
234
+ k)pr−1 +
235
+ pr−1
236
+
237
+ ℓ=1
238
+ �pr−1
239
+
240
+
241
+ Q(xp
242
+ 1, . . . , xp
243
+ k)pr−1−ℓ(pR(x1, . . . , xk))ℓ.
244
+ Note that for 1 ≤ ℓ ≤ pr−1
245
+ pℓ
246
+ �pr−1
247
+
248
+
249
+ = pℓpr−1
250
+
251
+ �pr−1 − 1
252
+ ℓ − 1
253
+
254
+ ≡ 0
255
+ (mod pr),
256
+ since the power of p dividing ℓ is certainly at most ℓ − 1. This establishes our claim.
257
+ The lemma now follows by applying this observation to the polynomials appearing in
258
+ Frobenius’s formula for the character values χλ
259
+ µ and χλ
260
+ ν (see Chapter 4 of [4]).
261
+
262
+ Proof of Lemma 2.4. The proof is essentially identical to that of Proposition 1 of [16], but
263
+ we include the short argument for completeness. Since every partition of n is a t-core for
264
+ t > n, we may naturally assume that t ≤ n. From Lemma 5 of [14], we know that at most
265
+ (t + 1)p(n − t) partitions of n are not t-cores. By the asymptotic formula
266
+ p(m) ∼
267
+ 1
268
+ 4
269
+
270
+ 3m exp
271
+ � 2π
272
+
273
+ 6
274
+ √m
275
+
276
+ for the partition function, we have
277
+ (t + 1)p(n − t) ≪
278
+ t + 1
279
+ n − t + 1 exp
280
+ � 2π
281
+
282
+ 6
283
+
284
+ n − t
285
+
286
+
287
+ t + 1
288
+ n − t + 1 exp
289
+ � 2π
290
+
291
+ 6
292
+ √n −
293
+ πt
294
+
295
+ 6n
296
+
297
+ .
298
+
299
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
300
+ 5
301
+ In the range n ≥ t ≥ (1 + 1/L)
302
+
303
+ 6
304
+
305
+ √n log n, the right-hand side above is maximized at the
306
+ lower endpoint t = (1 + 1/L)
307
+
308
+ 6
309
+
310
+ √n log n. It follows that the number of partitions of n that
311
+ are not t-cores is
312
+ ≪ log n
313
+ √n n−(1+1/L)/2 exp
314
+ � 2π
315
+
316
+ 6
317
+ √n
318
+
319
+ ≪ p(n) log n
320
+ n1/2L ,
321
+ where the last step uses again the asymptotic for the partition function.
322
+
323
+ 4. Partitions and Abaci
324
+ The proof of Theorem 2.2 requires the machinery of the abacus associated to a partition.
325
+ A good reference for this theory is Section 2.7 of of [6], and we recall some salient facts
326
+ below.
327
+ 4.1. The notion of an abacus. An abacus is a bi-infinite sequence of 0’s and 1’s beginning
328
+ with an infinite sequence of 1’s and ending with an infinite sequence of 0’s.
329
+ More formally, let
330
+ S := {s : Z → {0, 1} : there exists a k ≥ 0 such that s(−i) = 1 and s(i) = 0 for all i ≥ k}
331
+ denote the set of all sequences of 0’s and 1’s indexed using the integers, that begin with an
332
+ infinite sequence of 1’s and end with an infinite sequence of 0’s. For example,
333
+ . . . , 1, . . . , 1, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 0, . . ., 0, . . .
334
+ is in S. We consider two sequences s and s′ in S to be equivalent if there is some integer j
335
+ such that s(i) = s′(i − j) for all i, that is, if s′ can be produced by shifting the terms in s by
336
+ j. This is an equivalence relation, and an abacus refers to an equivalence class in S under
337
+ this relation. We denote by A the set of such abaci, so that by an element a of A we mean
338
+ the equivalence class consisting of some sequence s ∈ S together with all its shifts.
339
+ 4.2. The abacus associated to a partition. We now show how abaci are in one-to-one
340
+ correspondence with partitions of integers. Starting with an integer partition λ, we construct
341
+ an abacus aλ ∈ A as follows. Draw the Young diagram of λ, and trace out the boundary of
342
+ the diagram, moving from the lower left-hand corner to the upper right-hand corner, writing
343
+ a 0 for each horizontal move and a 1 for each vertical move. Then prepend an infinite string of
344
+ 1’s and append an infinite string of 0’s to find a representative of the corresponding element
345
+ aλ of A.
346
+ This procedure is easily reversed, and starting with an abacus a in A we obtain a Young
347
+ diagram, which corresponds to a partition λ. If s ∈ S is a representative of a, then the
348
+ partition λ is a partition of the integer n(a) which counts the number of pairs of indices (i, j)
349
+ with i < j such that s(i) = 0 and s(j) = 1.
350
+ To illustrate, consider the partition (6, 5, 3, 1, 1, 1), whose Young diagram is pictured in
351
+ Figure 1.
352
+ If we start in the lower left-hand corner of this diagram and move along the
353
+ boundary to the upper right-hand corner, we move right, up three times, right twice, up,
354
+ right twice, up, right, and up. The correspondence described above produces the string
355
+ (4.1)
356
+ 0, 1, 1, 1, 0, 0, 1, 0, 0, 1, 0, 1,
357
+ which we can turn into a bi-infinite sequence by adding an infinite sequence of 1’s to the
358
+ beginning and an infinite sequence of 0’s to the end:
359
+ (4.2)
360
+ . . . , 1, . . . , 1, 1, 1, 0, 1, 1, 1, 0, 0, 1, 0, 0, 1, 0, 1, 0, 0, 0, . . ., 0, . . . .
361
+
362
+ 6
363
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
364
+ Figure 1. The Young diagram of (6, 5, 3, 1, 1, 1)
365
+ The equivalence class of this sequence is the abacus associated to (6, 5, 3, 1, 1, 1).
366
+ 4.3. Hooks and border strips. Let λ be a partition. The hook h associated to a box b
367
+ in the Young diagram of λ consists of the box b together with all the boxes directly to its
368
+ right and directly below it. The hook-length of h, denoted by ℓ(h), is the number of boxes
369
+ contained in the hook. The height of the hook h, denoted by ht(h), is one less than the
370
+ number of rows in the Young diagram of λ that contain a box of h. Associated to each hook
371
+ is a border strip (also known as a skew hook), denoted bs(h), which is the connected region
372
+ of boundary boxes of the Young diagram running from the rightmost to the bottommost box
373
+ of h. Removing such a border strip leaves behind a smaller Young diagram. These notions
374
+ play a prominent role in the representation theory of the symmetric group, and in particular
375
+ feature in the Murnaghan–Nakayama rule for computing character values, which we next
376
+ recall (see Theorem 2.4.7 of [6], and also Chapter 4 of [4]).
377
+ Theorem 4.1 (The Murnaghan–Nakayama rule). Let n and t be positive integers, with
378
+ t ≤ n. Let σ ∈ Sn be of the form σ = τ · ρ, where ρ is a t-cycle, and τ is a permutation of
379
+ Sn with support disjoint from ρ. Let λ be a partition of n. Then
380
+ (4.3)
381
+ χλ(σ) =
382
+
383
+ h∈λ
384
+ ℓ(h)=t
385
+ (−1)ht(h)χλ\bs(h)(τ).
386
+ Above, χλ(σ) denotes the value of the character of the irreducible representation of Sn
387
+ corresponding to the partition λ, evaluated on the conjugacy class of σ, λ \ bs(h) denotes
388
+ the partition of n − t obtained by removing the border strip bs(h) from the Young diagram
389
+ of λ, and χλ\bs(h)(τ) denotes the character value of the irreducible representation of Sn−t
390
+ corresponding to the partition λ \ bs(h) evaluated on the conjugacy class of τ.
391
+ The abacus notation helps with thinking about hook lengths and border strips. Let λ be a
392
+ partition, let aλ denote the corresponding abacus, and let s be a representative in S for the
393
+ abacus aλ. Each hook h in the Young diagram of λ is in natural one-to-one correspondence
394
+ with a pair of indices (i, j), i < j, with s(i) = 0 and s(j) = 1. The length of the hook h is
395
+ j − i. In particular, the partition λ contains no hooks of length t (that is, λ is a t-core) if
396
+ and only if there is no pair of indices (i, i + t) with s(i) = 0 and s(i + t) = 1. The height of
397
+ the hook h equals the number of 1’s in the sequence s lying strictly between the 0 at index
398
+ i and the 1 at index j:
399
+ ht(h) = # {i < k < j : s(k) = 1} .
400
+
401
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
402
+ 7
403
+ 11 7
404
+ 6
405
+ 4
406
+ 3
407
+ 1
408
+ 9
409
+ 5
410
+ 4
411
+ 2
412
+ 1
413
+ 6
414
+ 2
415
+ 1
416
+ 3
417
+ 2
418
+ 1
419
+ Figure 2. Hook-lengths for (6, 5, 3, 1, 1, 1)
420
+ ,
421
+ Figure 3. The Young diagram of (6, 2, 1, 1, 1, 1)
422
+ Further, the abacus notation gives an easy description of the result of removing a border
423
+ strip from a partition. Define, for any pair of distinct integers (i, j) the operator Tij : S → S
424
+ that swaps the terms indexed by i and j in a bi-infinite sequence s ∈ S and leaves all other
425
+ entries fixed. Thus for s ∈ S
426
+ (Tijs)(k) =
427
+
428
+
429
+
430
+
431
+
432
+ s(k)
433
+ k ̸= i, j
434
+ s(j)
435
+ k = i
436
+ s(i)
437
+ k = j.
438
+ With this notation in place, suppose λ is a partition, and s ∈ aλ is a representative of the
439
+ abacus of λ. Let h be a hook of λ, corresponding to the pair of indices (i, j) (with i < j) in
440
+ s. Then Tijs is a representative of the abacus associated to λ \ bs(h).
441
+ Returning to our example of the partition (6, 5, 3, 1, 1, 1), Figure 2 contains its Young
442
+ diagram again, but now with each box filled in with the corresponding hook-length. The
443
+ unique hook h of length 5 in the diagram corresponds to the pair of indices (5, 10) of the
444
+ sequence (4.1). If we remove the corresponding border strip, we obtain the diagram pictured
445
+ in Figure 3, which corresponds to the partition (6, 5, 3, 1, 1, 1) \ bs(h) = (6, 2, 1, 1, 1, 1) and
446
+ the bi-infinite sequence
447
+ . . . , 1, . . . , 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 0, 0, 0, 0, 1, 0, 0, 0 . . ., 0, . . .
448
+ of 0’s and 1’s.
449
+ Note that if we swap the 0 and 1 corresponding to the hook h in the
450
+ representative (4.2) of a(6,5,3,1,1,1), then we get an equivalent bi-infinite sequence.
451
+ 4.4. Removing several hooks in succession. In our work below, we will need to remove
452
+ several hooks (more precisely, the border strips corresponding to those hooks) in succession
453
+
454
+ 8
455
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
456
+ from a partition. By removing a sequence of hooks h1, . . ., hR from a partition λ, we mean
457
+ the following: h1 is a hook of λ, h2 is a hook of λ \ bs(h1), h3 is a hook of λ \ bs(h1) \ bs(h2),
458
+ and so on, until we arrive at hR which is a hook of λ \ bs(h1) . . . \ bs(hR−1), and when this
459
+ is removed we obtain the final partition λ′ = λ \ bs(h1) . . . \ bs(hR).
460
+ Let s be a representative of the abacus aλ associated to λ. Let (i1, j1) denote the pair of
461
+ indices in s corresponding to the hook h1, (i2, j2) the corresponding pair to h2 (which,
462
+ recall, is a hook of λ \ bs(h1) corresponding to the bi-infinite sequence Ti1,j1s), and so
463
+ on.
464
+ Thus, the sequence of hooks h1, . . ., hR may be encoded by the R-tuple of pairs
465
+ ((i1, j1), (i2, j2), . . . , (iR, jR)), and the process of removing these hooks results in the sequence
466
+ s′ = TiR,jRTiR−1,jR−1 · · · Ti1,j1s.
467
+ The sequence s′ is a representative of the abacus aλ′ associated to the partition λ′.
468
+ Of particular interest for us will be the situation where all the hooks have the same length,
469
+ m say. Here jk = ik + m for all 1 ≤ k ≤ R, and we may encode the sequence of hooks by
470
+ simply the R-tuple (i1, . . . , iR). Note that the indices i1, . . ., iR may contain repeats, but
471
+ there are also constraints, such as i2 ̸= i1 (since (i1, i1 + m) is a hook in s and so it cannot
472
+ be a hook in Ti1,i1+ms).
473
+ 5. Plan of the proof of Theorem 2.2
474
+ We begin by restating Theorem 2.2 in terms of values of irreducible characters at elements
475
+ of Sn, which will make the notation involved in its proof cleaner.
476
+ Theorem 5.1 (An equivalent formulation of Theorem 2.2). Let n, m1, . . . , mr be distinct
477
+ positive integers. Let σ ∈ Sn be a permutation of the form
478
+ σ = τ ·
479
+ r�
480
+ i=1
481
+ pr−1
482
+
483
+ j=1
484
+ ρ(j)
485
+ i ,
486
+ where each ρ(j)
487
+ i
488
+ is a cycle of length mi, the supports of all the cycles ρ(j)
489
+ i
490
+ are disjoint, and
491
+ τ ∈ Sn is a permutation with support disjoint from those of the ρ(j)
492
+ i ’s. Suppose that λ is a
493
+ (�r
494
+ i=1 kimi)-core partition of n for all r-tuples (k1, . . . , kr) of integers 0 ≤ k1, . . . , kr ≤ pr−1
495
+ for which some ki = pr−1. Then
496
+ pr | χλ(σ).
497
+ The proof of Theorem 5.1 rests on the following crucial proposition, which is based on
498
+ applying the Murnaghan–Nakayama rule pr−1 times.
499
+ Proposition 5.2. Let r, m and n be positive integers. Let σ ∈ Sn be of the form
500
+ σ = τ ·
501
+ pr−1
502
+
503
+ j=1
504
+ ρ(j),
505
+ where each ρ(j) is an m-cycle, with all the cycles ρ(j) being disjoint, and with τ ∈ Sn being
506
+ a permutation whose support is disjoint from all the cycles ρ(j). Denote by L the set of
507
+ partitions of n − pr−1m that can be obtained from λ by removing, in succession, pr−1 border
508
+ strips of length m. If λ is a pr−1m-core partition of n, then
509
+ χλ(σ) = p
510
+
511
+ λ′∈L
512
+ ǫλ′χλ′(τ),
513
+
514
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
515
+ 9
516
+ where each ǫλ′ is an integer.
517
+ We will quickly deduce Theorem 5.1 (and hence Theorem 2.2) from Proposition 5.2 and
518
+ the following simple observation.
519
+ Lemma 5.3. Let n, t and m be positive integers. Let λ be a partition of n which is both a
520
+ t-core and a (t + m)-core. Let λ′ be a partition of n − m that can be obtained by removing a
521
+ border strip of length m from λ. Then λ′ is a t-core.
522
+ Proof. If λ has no hook (and thus no border strip) of length m then the lemma holds
523
+ vacuously. Suppose that λ′ arises from removing the border strip corresponding to the hook
524
+ h of length m in λ. Let aλ be the abacus of λ, and s be a representative bi-infinite sequence
525
+ in aλ. Suppose the hook h corresponds to the pair of indices (i, i + m) with s(i) = 0 and
526
+ s(i + m) = 1, so that the partition λ′ corresponds to the abacus containing s′ = Ti,i+ms.
527
+ If λ′ is not a t-core, then there must exist a pair of indices (j, j + t) with s′(j) = 0 and
528
+ s′(j + t) = 1. Since the entries of s and s′ differ only at the indices i and i + m, and since
529
+ λ is a t-core, we must have either j = i + m, or j + t = i. If j = i + m, then s(i) = 0 and
530
+ s(i + t + m) = s′(j + t) = 1 which contradicts the assumption that λ is a (t + m)-core. If
531
+ j = i−t, then s(i−t) = s′(j) = 0 and s(i+m) = 1, which again contradicts the assumption
532
+ that λ is a (t + m)-core.
533
+
534
+ Deducing Theorem 5.1 from Proposition 5.2. Apply Proposition 5.2 first with m = mr to
535
+ obtain
536
+ χλ(σ) = p
537
+
538
+ λ′∈L
539
+ ǫλ′χλ′�
540
+ τ
541
+ r−1
542
+
543
+ i=1
544
+ pr−1
545
+
546
+ j=1
547
+ ρ(j)
548
+ i
549
+
550
+ .
551
+ If t is any number of the form t = �r−1
552
+ i=1 kimi where the ki lie in [0, pr−1] with at least one
553
+ of them being pr−1, then λ is a (t + krmr)-core for all 0 ≤ kr ≤ pr−1. Since any λ′ ∈ L
554
+ arises from λ by removing pr−1 border strips of length mr, it follows by pr−1 applications of
555
+ Lemma 5.3 that λ′ is a t-core.
556
+ We may now repeat this argument, applying Proposition 5.2 to each λ′ ∈ L and now
557
+ removing pr−1 border strips of length mr−1. Applications of Lemma 5.3 show that the new
558
+ partitions λ′′ that arise are (�r−2
559
+ i=1 kimi)-cores for all choices of 0 ≤ ki ≤ pr−1 with some
560
+ ki = pr−1.
561
+ Carrying this argument out r times, we obtain the desired result.
562
+
563
+ The proof of Proposition 5.2 depends on the following two lemmas, which we shall prove
564
+ in the next two sections.
565
+ Lemma 5.4. Let λ be a partition, and let λ′ be obtained from λ by removing a sequence of
566
+ R border strips of the same length m. Let h1, . . ., hR be a sequence of R hooks of length m
567
+ which may be removed from the initial partition λ to result in the final partition λ′. Then
568
+ (−1)ht(h1)+...+ht(hR) = ǫ(λ, λ′)
569
+ where the sign ǫ(λ, λ′) = ±1 depends only on the initial and final partitions λ and λ′ and is
570
+ the same for all such possible sequences of hooks.
571
+ Lemma 5.5. Let λ be a pr−1m-core partition, and let λ′ be a partition that can be obtained
572
+ from λ by removing R = pr−1 border strips of length m. The number of tuples (i1, . . . , iR)
573
+ such that
574
+ s′ = TiR,iR+mTiR−1,iR−1+m · · ·Ti1,i1+ms
575
+
576
+ 10
577
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
578
+ is a multiple of p. Here s is a representative of the abacus of λ, and the partition λ′ corre-
579
+ sponds to the abacus containing s′
580
+ Once Lemmas 5.4 and 5.5 are in place, it is a simple matter to deduce Proposition 5.2.
581
+ Deducing Proposition 5.2. We apply the Murnaghan–Nakayama rule repeatedly while re-
582
+ moving in succession R = pr−1 hooks of length m from λ. This will result in an expression
583
+ for χλ(σ) of the form �
584
+ λ′∈L cλ′χλ′(τ), for suitable integers cλ′ which we must show are
585
+ multiples of p. Now
586
+ cλ′ =
587
+
588
+ (i1,...,iR)
589
+ (−1)ht(h1)+...+ht(hR)
590
+ where the sum is over all R-tuples (i1, . . . , iR) corresponding to hooks h1, . . ., hR, which
591
+ when removed from λ in order result in the partition λ′. Lemma 5.4 tells us that the sign
592
+ (−1)ht(h1)+...+ht(hR) is the same for all suitable tuples (i1, . . . , iR), and Lemma 5.5 tells us that
593
+ the number of such R-tuples is a multiple of p.
594
+
595
+ 6. Parity of heights of hooks: Proof of Lemma 5.4
596
+ Let λ be a partition, and s a representative of the abacus aλ associated to λ. Augment s
597
+ by coloring a finite number N of 1’s in s with distinct colors, taking care to color all the 1’s
598
+ appearing to the right of the first zero in s. The 1’s appearing to the left of the first 0 are
599
+ unimportant, but we allow the flexibility of coloring some of them since this situation may
600
+ arise at an intermediate step when we remove hooks from λ. Note that the number of 1’s
601
+ appearing to the right of the first zero equals the number of rows in the partition λ. Thus
602
+ N is at least the number of rows in λ. Color these 1’s in the order of their appearance in s
603
+ using the colors c1, . . ., cN. Call the augmented sequence �s.
604
+ We begin with a general observation on removing hooks. Suppose (i, j) is a pair of indices
605
+ corresponding to a hook h in s (at the moment the hook can have any length j−i). Removing
606
+ this hook produces the sequence Ti,js.
607
+ Considering the augmented sequence �s, we have
608
+ the corresponding augmented sequence Ti,j�s after removing this hook. If we consider the
609
+ sequence of colors among the 1’s in this sequence, we obtain a permutation πij, say, of the
610
+ original sequence of colors (c1, . . . , cN) — the 1 appearing in (Ti,j�s)(i) has the color of the 1
611
+ in �s(j), and all other 1’s in Tij(�s) retain their color in �s. If the height of the hook removed
612
+ is k, then note that �s had k colored 1’s between s(i) = 0 and s(j) = 1 and the permutation
613
+ πij can be obtained by making k-transpositions, each time swapping the color of the 1 at
614
+ position j by the color immediately preceding it. Thus (−1)k = (−1)ht(h) equals the sign of
615
+ the permutation πij.
616
+ If we remove hooks h1, . . ., hℓ in succession (again, their lengths could be arbitrary), then
617
+ the associated permutations of colors multiply, and therefore so do the signs of these permu-
618
+ tations. Thus, after removing these hooks in succession we would arrive at a permutation π
619
+ of the sequence of colors (c1, . . . , cN) and
620
+ (−1)ht(h1)+ht(h2)+...+ht(hℓ) = sgn(π).
621
+ We now turn to the situation of the lemma, where a sequence h1, . . ., hR of R hooks
622
+ is removed all of length m.
623
+ Our observation above shows that removing these hooks in
624
+ order leads to the sequence �s ′ where the color of the 1’s is given by a permutation π of the
625
+ original sequence of colors c1, . . ., cN. Further the sign of this permutation sgn(π) equals
626
+ (−1)ht(h1)+...+ht(hR).
627
+
628
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
629
+ 11
630
+ To complete the proof, we will show that every way of removing R hooks of length m
631
+ that leads to the partition λ′ results in the same permutation of colors π. Consider the
632
+ subsequence of �s obtained by restricting to a progression (mod m): namely, (�s(a + ℓm))ℓ∈Z.
633
+ There are m such subsequences corresponding to a = 1, . . ., m. Since the hooks removed all
634
+ have length m, each removal of a hook affects only the terms within one of these subsequences,
635
+ leaving all the other subsequences unaltered. Further within any particular subsequence
636
+ (�s(a + ℓm))ℓ∈Z, it is impossible to alter the original sequence of colors by removing any
637
+ sequence of hooks of length m.
638
+ Therefore we can determine uniquely the color of any
639
+ element in �s ′: the 1’s appearing in this sequence in the progression a (mod m) have colors
640
+ determined by their order of appearance in the original sequence s.
641
+ 7. Proof of Lemma 5.5
642
+ Let λ be a pr−1m-core partition, and let s be a representative of its abacus. Let s′ be the
643
+ sequence obtained by removing a sequence of R = pr−1 border strips of length m from λ,
644
+ and let λ′ be the partition associated to s′. Our goal is to show that the number of ways of
645
+ reaching λ′ starting from λ is a multiple of p.
646
+ Let us first note that when r = 1, it is impossible to remove a border strip of length m
647
+ from λ, since λ is m-core by assumption. Thus the number of ways here is 0, and the lemma
648
+ holds (vacuously). Henceforth, assume that r ≥ 2.
649
+ For each a = 1, . . ., m, consider the subsequences of s and s′ obtained by restricting to
650
+ the progression a (mod m): thus, set
651
+ s(a; m) = (s(a + ℓm))ℓ∈Z,
652
+ s′(a; m) = (s′(a + ℓm))ℓ∈Z.
653
+ We may think of s(a; m) and s′(a; m) as corresponding to partitions λ(a; m) and λ′(a; m), and
654
+ note that a hook of length m in the partition λ corresponds to a hook of length 1 (or simply
655
+ a border square) in the partition λ(a; m) (for some choice of a). Since λ′(a; m) arises from
656
+ λ(a; m) by removing some number of hooks of length 1, the Young diagram of the partition
657
+ λ′(a; m) is contained in the Young diagram of the partition λ(a; m) (that is, λi(a; m) ≥
658
+ λ′
659
+ i(a; m) for all i). The difference between the Young diagram of λ(a; m) and λ′(a; m) (in
660
+ other words, the boxes in λ(a; m) that are not in λ′(a; m)) is a skew diagram, which we
661
+ denote by λ(a; m)/λ′(a; m). Let ℓa denote the size of this skew diagram |λ(a; m)/λ′(a; m)|,
662
+ so that ℓa hooks of length 1 must be removed from λ(a; m) to reach λ′(a; m). Since a total
663
+ of R = pr−1 hooks of length m are removed to go from λ to λ′, note that
664
+ R = pr−1 =
665
+ m
666
+
667
+ a=1
668
+ ℓa.
669
+ The number of ways to go from λ(a; m) to λ′(a; m) by removing successively ℓa hooks
670
+ of length 1 equals the number of standard Young tableaux of skew shape λ(a; m)/λ′(a; m),
671
+ which we denote (in the usual notation) by fλ(a;m)/λ′(a;m). Recall that a standard Young
672
+ tableau of this skew shape is a numbering of the boxes in the skew diagram using the
673
+ numbers 1 to ℓa such that the entries are increasing from left to right in each row, and
674
+ increasing down each column. Each such tableau corresponds to a way of removing hooks,
675
+ by removing boxes in descending order of their entries.
676
+ We can now count the number of ways of going from λ to λ′ by removing R hooks of
677
+ length m. Note that removing a hook from one subsequence s(a; m) has no impact on the
678
+
679
+ 12
680
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
681
+ hooks in any of the other subsequences. Therefore the desired number of ways to proceed
682
+ from λ to λ′ equals
683
+
684
+ pr−1
685
+ ℓ1, ℓ2, . . . , ℓm
686
+ � m
687
+
688
+ a=1
689
+ fλ(a;m)/λ′(a;m).
690
+ The multinomial coefficient
691
+
692
+ pr−1
693
+ ℓ1,ℓ2,...,ℓm
694
+
695
+ is a multiple of p, except in the situation where
696
+ ℓa = pr−1 for some a (and all other ℓj are 0). Thus we are left with the case when all the
697
+ hooks of length m in going from λ to λ′ are confined to one subsequence s(a; m). So far, we
698
+ have not made use of the condition that λ is a pr−1m-core, and it is only in this case that
699
+ we need this assumption. The assumption implies that λ(a; m) is pr−1-core, and so the skew
700
+ diagram λ(a; m)/λ′(a; m) (which has size ℓa = pr−1) cannot be a border strip of λ(a; m). In
701
+ this situation, it turns out that fλ(a;m)/λ′(a;m) is a multiple of p. This is implied by our next
702
+ lemma, which is perhaps of independent interest.
703
+ Lemma 7.1. Let π and τ be two partitions, with the Young diagram of π containing the
704
+ Young diagram of τ (thus πi ≥ τi for all i). Suppose the skew diagram π/τ is not a border
705
+ strip of the partition π (equivalently, either π/τ is disconnected, or it contains a 2×2 square),
706
+ and that |π/τ| = pt is a prime power. Then the number of standard Young tableaux of skew
707
+ shape π/τ, denoted fπ/τ, is a multiple of p.
708
+ Proof. First suppose that π/τ is disconnected, and is composed of k ≥ 2 maximally connected
709
+ skew shapes S1, . . ., Sk, with |Sj| = sj ≥ 1. Then
710
+ fπ/τ =
711
+
712
+ pt
713
+ s1, . . . , sk
714
+
715
+ fS1 · · · fSk,
716
+ is clearly a multiple of p.
717
+ Now suppose that π/τ is a connected skew shape, but contains a 2 × 2 square so that it
718
+ is not a border strip of π. Since fπ/τ depends only on the shape π/τ, we may assume that π
719
+ is minimal, having only as many rows and columns as needed for the skew shape π/τ. Then
720
+ the maximal hook length of π equals the number of border squares of π, which is strictly
721
+ smaller than |π/τ| = pt (since π/τ is not a border strip by assumption).
722
+ It is a basic fact (see Section I.9 of [8], for example — the identity below follows from
723
+ equation (9.1) of [8] by taking the Hall inner product of both sides with the symmetric
724
+ function ept
725
+ 1 ) that
726
+ fπ/τ =
727
+
728
+ ν⊢pt
729
+ fνcπ
730
+ τν,
731
+ where the sum is over partitions ν of |π/τ| = pt, fν = χν
732
+ (1,...,1) is the degree of the irreducible
733
+ character corresponding to ν and the cπ
734
+ τν are the Littlewood–Richardson coefficients (which
735
+ are integers). By Lemma 2.1, fν ≡ χν
736
+ (pt) (mod p), so that p | fν unless ν is a hook of length
737
+ pt. Suppose now that ν is a hook of length pt. Here we use that the Littlewood–Richardson
738
+ coefficient cπ
739
+ τν is zero unless the Young diagram of the partition ν is contained in that of π
740
+ (see Section I.9 of [8] once again). But all the hooks of π have length < pt, and therefore π
741
+ cannot contain a hook ν of length pt. Thus either cπ
742
+ τν = 0 or p|fν, and therefore the lemma
743
+ follows.
744
+
745
+
746
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
747
+ 13
748
+ 8. Preliminaries for the proof of Proposition 2.3
749
+ As in [16], let �p(k) denote the number of partitions of a nonnegative integer k into powers
750
+ of p, with the convention that �p(0) = 1. Denote by Fp(t) the associated generating function
751
+ Fp(t) :=
752
+
753
+
754
+ k=0
755
+ �p(k)e−k/t =
756
+
757
+
758
+ j=0
759
+
760
+ 1 − e−pj/t�−1
761
+ ,
762
+ where t > 0 is a real number. We begin by recalling some estimates from our prior work [16].
763
+ Lemma 8.1 (Lemma 2 of [16]). When 0 < t ≤ 1, we have Fp(t) = O(1), and when t ≥ 1,
764
+ we have
765
+ (log t)2
766
+ 2 log p + 1
767
+ 2 log t + O(1) ≤ log Fp(t) ≤ (log t)2
768
+ 2 log p + 1
769
+ 2 log t + 1
770
+ 8 log p + O(1).
771
+ More precise results are known for fixed primes p, as partitions into prime powers have
772
+ been studied extensively since the work of Mahler [9] and de Bruijn [1]. We will only require
773
+ the estimates of Lemma 8.1, which are cruder but uniform in p.
774
+ Given a partition µ of k into powers of p, let �µ denotes the partition obtained by repeatedly
775
+ replacing every occurrence of pr parts of the same size pj by pr−1 parts of size pj+1 until no
776
+ part appears more than pr − 1 times. For every nonnegative integer s, define �p(k; s) to be
777
+ the number of partitions µ of k into powers of p such that �µ does not contain (at least) pr−1
778
+ parts of the same size pj for any j ≥ s. The second lemma of this section gives a useful lower
779
+ bound for the difference between �p(k) and �p(k; s).
780
+ Lemma 8.2. For all s ≥ 2 and k ≥ pr+s−1(1 + 4/s), we have
781
+ �p(k) − �p(k; s) ≥ ps(s−1)/2
782
+ (s − 1)s−1.
783
+ Proof. We will construct at least ps(s−1)/2/(s − 1)s−1 partitions of k counted in �p(k) but not
784
+ in �p(k; s). For each 1 ≤ i ≤ s − 1, pick an integer ai in the range
785
+ 0 ≤ ai ≤ ps−i
786
+ s − 1.
787
+ Each choice of a1, . . . , as−1 gives a partition µ counted in �p(k) by using ai copies of pi for
788
+ 1 ≤ i ≤ s − 1 and k − �s−1
789
+ i=1 aipi copies of 1. The number of such partitions is
790
+ s−1
791
+
792
+ i=1
793
+ � ps−i
794
+ s − 1
795
+
796
+
797
+ s−1
798
+
799
+ i=1
800
+ ps−i
801
+ s − 1 =
802
+ ps(s−1)/2
803
+ (s − 1)s−1.
804
+ Note that if i > s − log(s − 1)/ log p, then ai must be zero, so that all of these partitions
805
+ have largest part at most
806
+ ps
807
+ s−1.
808
+ We must check that each such µ is not counted in �p(k; s); that is, that the corresponding
809
+ �µ contains at least pr−1 copies of some part pj with j ≥ s. Suppose that this is not the
810
+ case. Notice that, by construction, the number of times any part appears in µ is congruent
811
+ modulo pr−1 to the number of times it appears in �µ. Since no part can appear more than
812
+ pr − 1 times in �µ, it follows that any part that appears fewer than pr−1 times or more than
813
+ pr − pr−1 times in �µ must have appeared in the original partition µ. Since all the parts of µ
814
+ are below ps/(s − 1), we conclude that �µ can contain (i) at most pr − 1 copies of any part pj
815
+
816
+ 14
817
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
818
+ with pj ≤ ps/(s −1), (ii) at most pr −pr−1 copies of any part pj with ps/(s −1) < pj ≤ ps−1,
819
+ and (iii) no parts of size pj with j ≥ s. But these constraints imply that
820
+ k = |�µ| ≤ (pr − 1)
821
+
822
+ pj≤ps/(s−1)
823
+ pj + (pr − pr−1)
824
+
825
+ ps/(s−1)<pj≤ps−1
826
+ pj
827
+ < (pr−1 − 1)
828
+ ps
829
+ (s − 1)
830
+
831
+ 1 − 1
832
+ p
833
+ �−1
834
+ + (pr − pr−1)ps−1�
835
+ 1 − 1
836
+ p
837
+ �−1
838
+ < pr+s−1�
839
+ 1 + 4
840
+ s
841
+
842
+ ,
843
+ which contradicts our assumption on the size of k.
844
+
845
+ 9. Proof of Proposition 2.3
846
+ Let L be a set of positive integers coprime to p, and define p(n; L, s) to be the number of
847
+ partitions µ of n for which �µ contains fewer than pr−1 parts of the same size ℓpj for every
848
+ ℓ ∈ L and j ≥ s. We will prove Proposition 2.3 by obtaining an upper bound for p(n; L, s)
849
+ for well-chosen L and s.
850
+ Lemma 9.1. Suppose that n is large and pr ≤ 10−3 log n/ log log n. Put
851
+ (9.1)
852
+ x =
853
+
854
+ 6n
855
+ π ,
856
+ s =
857
+ �log √n
858
+ epr
859
+
860
+ ,
861
+ and let L be the set of integers in the interval [L, L + x/pr+s−1] that are coprime to p, where
862
+ L is a parameter lying in the range
863
+ (9.2)
864
+
865
+ 6n
866
+ 2πpr+s−1 ≤ L ≤
867
+
868
+ 1 + 1
869
+ 5pr
870
+
871
+
872
+ 6n
873
+ 2πpr+s−1 log n.
874
+ Then
875
+ p(n; L, s) ≪ p(n)n
876
+ 3
877
+ 4 exp(−n
878
+ 1
879
+ 16pr ).
880
+ Before proving the lemma, let us see how Proposition 2.3 would follow. Choose r distinct
881
+ values Lj (with 1 ≤ j ≤ r) all in the range
882
+
883
+ 1 + 1
884
+ 6pr
885
+
886
+
887
+ 6n
888
+ 2πpr+s−1 log n ≤ Lj ≤
889
+
890
+ 1 + 1
891
+ 5pr
892
+
893
+
894
+ 6n
895
+ 2πpr+s−1 log n,
896
+ such that the corresponding sets Lj are all disjoint. A partition µ for which �µ does not
897
+ contain r distinct parts m1, . . ., mr each appearing at least pr−1 times and suitably large as
898
+ desired in the proposition, must be counted among some p(n; Lj, s) with 1 ≤ j ≤ r. Thus
899
+ by Lemma 9.1 the number of such bad partitions µ is
900
+
901
+ r
902
+
903
+ j=1
904
+ p(n; Lj, s) ≪ rp(n)n
905
+ 3
906
+ 4 exp(−n
907
+ 1
908
+ 16pr ) ≪ p(n)n exp(−n
909
+ 1
910
+ 16pr ) ≪ p(n) exp(−n
911
+ 1
912
+ 20pr ),
913
+ as claimed.
914
+ Proof of Lemma 9.1. Consider the process of going from a partition µ to �µ by combining pr
915
+ parts of the same size m into pr−1 parts of size pm. Suppose that ℓ is coprime to p, and that
916
+ the sum of all parts of the form ℓpj appearing in µ equals ℓk. Restricting our attention to
917
+ these parts, we may think of µ as giving rise to a partition of k into powers of p, and then �µ
918
+ correspondingly gives a partition of k into powers of p obtained by repeatedly combining pr
919
+
920
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
921
+ 15
922
+ parts of size pj into pr−1 parts of size pj+1. It follows that p(n; L, s) is the coefficient of zn
923
+ in the generating function
924
+
925
+ ℓ/∈L
926
+ (ℓ,p)=1
927
+
928
+
929
+ j=0
930
+
931
+ 1 − zℓpj�−1 �
932
+ ℓ∈L
933
+
934
+
935
+
936
+ k=0
937
+ �p(k; s)zℓk�
938
+ ,
939
+ which equals
940
+
941
+
942
+ i=1
943
+
944
+ 1 − zi�−1 �
945
+ ℓ∈L
946
+ ��∞
947
+ k=0 �p(k; s)zℓk
948
+ �∞
949
+ k=0 �p(k)zℓk
950
+
951
+ .
952
+ Since all of the coefficients in the generating function for p(n; L, s) are nonnegative, we must
953
+ have, for any 0 < z < 1,
954
+ (9.3)
955
+ p(n; L, s) ≤ 1
956
+ zn
957
+
958
+
959
+ i=1
960
+
961
+ 1 − zi�−1 �
962
+ ℓ∈L
963
+ ��∞
964
+ k=0 �p(k; s)zℓk
965
+ �∞
966
+ k=0 �p(k)zℓk
967
+
968
+ .
969
+ Recall that x =
970
+
971
+ 6n/π, and take z = e−1/x in the bound (9.3). Then, by the asymptotic
972
+ formula for the partition function and basic estimates for the generating function of the
973
+ number of partitions (see Section VIII.6 of [3]), we obtain
974
+ (9.4)
975
+ p(n; L, s) ≪ n3/4p(n)
976
+
977
+ ℓ∈L
978
+ ��∞
979
+ k=0 �p(k; s)zℓk
980
+ �∞
981
+ k=0 �p(k)zℓk
982
+
983
+ ≪ n3/4p(n) exp(−∆),
984
+ where
985
+ ∆ :=
986
+
987
+ ℓ∈L
988
+ 1
989
+ Fp(x/ℓ)
990
+
991
+
992
+ k=0
993
+ (�p(k) − �p(k; s))e−ℓk/x.
994
+ Our work so far applies to any set L of integers that are coprime to p, and we now proceed
995
+ to the situation at hand. The lower bound on L and our choice of x give, for all ℓ ∈ L, the
996
+ bound
997
+ Fp
998
+ �x
999
+
1000
+
1001
+ ≤ Fp
1002
+ � x
1003
+ L
1004
+
1005
+ ≤ Fp
1006
+ �2pr+s−1
1007
+ log n
1008
+
1009
+ .
1010
+ From this estimate, our choice of L, and Lemma 8.2 it follows that
1011
+ (9.5)
1012
+ ∆ ≥
1013
+ 1
1014
+ Fp(2pr+s−1/ log n)
1015
+
1016
+ L≤ℓ≤L+x/pr+s−1
1017
+ (ℓ,p)=1
1018
+
1019
+ k≥pr+s−1(1+4/s)
1020
+ ps(s−1)/2
1021
+ (s − 1)s−1e−ℓk/x.
1022
+ For ℓ in the range L ≤ ℓ ≤ L + x/pr+s−1, we have
1023
+
1024
+ k≥pr+s−1(1+4/s)
1025
+ e−ℓk/x ≥ exp
1026
+
1027
+ − ℓpr+s−1
1028
+ x
1029
+
1030
+ 1 + 4
1031
+ s
1032
+ ��
1033
+ e−ℓ/x
1034
+ 1 − e−ℓ/x
1035
+ ≥ x
1036
+ 2L exp
1037
+
1038
+
1039
+ �Lpr+s−1
1040
+ x
1041
+ + 1
1042
+ ��
1043
+ 1 + 4
1044
+ s
1045
+ ��
1046
+ .
1047
+ Inserting this into the right-hand side of (9.5) and noting that (since pr+s−1 is small in
1048
+ comparison to x)
1049
+ |L| ≥
1050
+
1051
+ 1 − 1
1052
+ p
1053
+
1054
+ x
1055
+ pr+s−1 − 2 ≥
1056
+ x
1057
+ 3pr+s−1,
1058
+
1059
+ 16
1060
+ SARAH PELUSE AND KANNAN SOUNDARARAJAN
1061
+ we obtain (using our choice of x and the range for L)
1062
+ ∆ ≥
1063
+ 1
1064
+ Fp(2pr+s−1/ log n) · ps(s−1)/2
1065
+ (s − 1)s−1 ·
1066
+ x
1067
+ 3pr+s−1 · x
1068
+ 2L exp
1069
+
1070
+
1071
+ �Lpr+s−1
1072
+ x
1073
+ + 1
1074
+ ��
1075
+ 1 + 4
1076
+ s
1077
+ ��
1078
+ ≥ 1
1079
+ 6
1080
+ 1
1081
+ Fp(2pr+s−1/ log n) · ps(s−1)/2
1082
+ (s − 1)s−1 ·
1083
+ x
1084
+ log n · exp
1085
+
1086
+
1087
+ �Lpr+s−1
1088
+ x
1089
+ + 1
1090
+ ��
1091
+ 1 + 4
1092
+ s
1093
+ ��
1094
+ .
1095
+ Using Lemma 8.1 and the bound pr ≤ log √n, it follows that
1096
+ log Fp
1097
+ �2pr+s−1
1098
+ log n
1099
+
1100
+
1101
+ 1
1102
+ 2 log p
1103
+
1104
+ log pr+s−1
1105
+ log √n
1106
+ �2
1107
+ + 1
1108
+ 2 log pr+s−1
1109
+ log √n + 1
1110
+ 8 log p + O(1)
1111
+
1112
+ 1
1113
+ 2 log p
1114
+
1115
+ log pr+s−1
1116
+ log √n
1117
+ �2
1118
+ + s
1119
+ 2 log p + O(1).
1120
+ Therefore
1121
+ log
1122
+ ps(s−1)/2
1123
+ Fp(2pr+s−1/ log n)(s − 1)s−1 ≥ s2
1124
+ 2 log p −
1125
+ 1
1126
+ 2 log p
1127
+
1128
+ log pr+s−1
1129
+ log √n
1130
+ �2
1131
+ − s log ps + O(1)
1132
+ ≥ s log log √n
1133
+ prs
1134
+ − (log log √n)2
1135
+ 2 log p
1136
+ + O(1).
1137
+ Recalling our choice of s, we conclude that
1138
+ log ∆ ≥ s log log √n
1139
+ prs
1140
+ + log √n − (log log √n)2
1141
+ 2 log p
1142
+ − log log n − Lpr+s−1
1143
+ x
1144
+
1145
+ 1 + 4
1146
+ s
1147
+
1148
+ + O(1)
1149
+
1150
+
1151
+ 1 + 1
1152
+ epr
1153
+
1154
+ log √n − Lpr+s−1
1155
+ x
1156
+ − log log n − (log log √n)2
1157
+ 2 log p
1158
+ + O(1)
1159
+
1160
+ � 1
1161
+ epr − 1
1162
+ 5pr
1163
+
1164
+ log √n − (log log n)2 + O(1) ≥ log n
1165
+ 15pr − (log log n)2 + O(1),
1166
+ upon using the upper bound on L in (9.2). In the range pr ≤ 10−3 log n/(log log n)2 we find
1167
+ log ∆ ≥ log n
1168
+ 16pr + O(1),
1169
+ which when used in (9.4) yields the lemma.
1170
+
1171
+ References
1172
+ [1] N. G. de Bruijn. On Mahler’s partition problem. Nederl. Akad. Wetensch., Proc., 51:659–669 = Inda-
1173
+ gationes Math. 10, 210–220 (1948), 1948.
1174
+ [2] P. Erd˝os and J. Lehner. The distribution of the number of summands in the partitions of a positive
1175
+ integer. Duke Math. J., 8:335–345, 1941.
1176
+ [3] P. Flajolet and R. Sedgewick. Analytic combinatorics. Cambridge University Press, Cambridge, 2009.
1177
+ [4] W. Fulton and J. Harris. Representation theory, volume 129 of Graduate Texts in Mathematics. Springer-
1178
+ Verlag, New York, 1991. A first course, Readings in Mathematics.
1179
+ [5] D. Gluck. Parity in columns of the character table of Sn. Proc. Amer. Math. Soc., 147(3):1005–1011,
1180
+ 2019.
1181
+ [6] G. James and A. Kerber. The representation theory of the symmetric group, volume 16 of Encyclopedia
1182
+ of Mathematics and its Applications. Addison-Wesley Publishing Co., Reading, Mass., 1981.
1183
+ [7] M. J. Larsen and A. R. Miller. The sparsity of character tables of high rank groups of Lie type. Represent.
1184
+ Theory, 25:173–192, 2021.
1185
+
1186
+ DIVISIBILITY OF CHARACTER VALUES OF THE SYMMETRIC GROUP
1187
+ 17
1188
+ [8] I. G. Macdonald. Symmetric functions and Hall polynomials. Oxford Mathematical Monographs. The
1189
+ Clarendon Press, Oxford University Press, New York, second edition, 1995. With contributions by A.
1190
+ Zelevinsky, Oxford Science Publications.
1191
+ [9] K. Mahler. On a special functional equation. J. London Math. Soc., 15:115–123, 1940.
1192
+ [10] J. McKay. Irreducible representations of odd degree. J. Algebra, 20:416–418, 1972.
1193
+ [11] A. R. Miller. Note on parity and the irreducible characters of the symmetric group. preprint, 2017.
1194
+ arXiv:1708.03267.
1195
+ [12] A. R. Miller. Congruences in character tables of symmetric groups. preprint, 2019. arXiv:1908.03741.
1196
+ [13] A. R. Miller. On parity and characters of symmetric groups. J. Combin. Theory Ser. A, 162:231–240,
1197
+ 2019.
1198
+ [14] L. Morotti. On divisibility by primes in columns of character tables of symmetric groups. Arch. Math.
1199
+ (Basel), 114(4):361–365, 2020.
1200
+ [15] S. Peluse. On even entries in the character table of the symmetric group. preprint,
1201
+ 2020.
1202
+ arXiv:2007.06652.
1203
+ [16] S. Peluse and K. Soundararajan. Almost all entries in the character table of the symmetric group are
1204
+ multiples of any given prime. J. Reine Angew. Math., 786:45–53, 2022.
1205
+ School of Mathematics, Institute for Advanced Study, Princeton, NJ, USA, & Depart-
1206
+ ment of Mathematics, Princeton University, Princeton, NJ, USA
1207
+ Email address: speluse@princeton.edu
1208
+ Department of Mathematics, Stanford University, Stanford, CA, USA
1209
+ Email address: ksound@stanford.edu
1210
+
GNE0T4oBgHgl3EQfRQAC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
H9AyT4oBgHgl3EQfffh-/content/2301.00341v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4e5e4fedec3b2b50f5f1c9636712cb522b0c3eba6428208b999d715077c5dcff
3
+ size 186984
H9AyT4oBgHgl3EQfffh-/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9e8c949905f3d9f9608832804f2e070a5590c03b98d127ce695c6f51aa670160
3
+ size 2228269
IdE4T4oBgHgl3EQfIQyU/content/2301.04911v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d34cdefa0e1222397eacb834f311805cffc3382caa0b542a6ed171a9aca85c57
3
+ size 268500
IdE4T4oBgHgl3EQfIQyU/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:33ef4ea0fd6e6b2d3beedec570697d235225078363f4599da00ac5787ee28d9d
3
+ size 129590
JdE5T4oBgHgl3EQfXg8M/content/2301.05566v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:861ed499245a7eaebaaea5831abe31a86998625d3efae4d79ce20fd32e4e2d44
3
+ size 222119
JdE5T4oBgHgl3EQfXg8M/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c710af33abba7d8ba4bc2710764af8f7f09449c1ca7e4eb79f977f0cb46a281a
3
+ size 2031661
JtFRT4oBgHgl3EQfzzhX/content/2301.13651v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0d708ed6c88dd16206dc8fc77643e2378c6674b6ed0d9c1c0f0a224685c020bc
3
+ size 2973975
JtFRT4oBgHgl3EQfzzhX/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6f5656ed89b8d8f522e9d9e3abc994c86ba1334ec7bdd475441ff97fe802f1ba
3
+ size 4128813